Safety and Security - 2013
What if we had super-humanitarians that could throw the weight and attention of thousands at a problem without rest or respite? What if we had an army of inexhaustible helpers? What about crowd sourcing saviors through the use of drones?
This concept is born out of the desire to deliver an army of volunteers where needed the most. Many of us have a deep interest in their fellow humans but perhaps cannot relocate to troubled or needed areas in order to support our interests. Imagine a retired fire fighter physically unable to assist in control or support of ...
Increase in TERRORISM, THREATS & UNLAWFUL ACTIVITIES calls for High Mobility CIVILIAN SECURITY MANAGEMENT.
To counter and defeat the ever looming and evolving terror threats to civilian & military forces, the Police forces require a truly flexible and rapidly deployed defense and security system.
MMPV (Multi Mission Police Vehicle) is the Ultimate vehicle where Mobility can be integrated into a network enabled force structure and be coordinated with Early Warning Command and Control system with remote surveillance (UAV) , mass screening and Bomb Disposal Robots etc.
MMPV can be at instantaneously deployed to the area of conflict and the ...
In large-scale disasters, the sanitizing and remediation of trauma sites is vital to public health. Recent death toll numbers show the need for mass casualty response gear to protect the public from biological hazards and terrorism.
Natural biological decomposition may expose people and animals to pathogenic bacteria. Failure to immediately remove or treat dangerous materials such as blood, bodily fluids, skin tissues and waste, can have very serious consequences. Bodily fluids potentially harbor disease and infections can go undetected for weeks or more before symptoms appear.
Tuberculosis and Hepatitis are two infectious diseases that can exist on the ...
In parallel with the advantages that the NFC functionality of credit cards offers to the customers, some weak points, which can be used by criminal subjects for money (information) theft, exist. In the crowds, trams, trains, queues..etc., criminals can easily, simply holding their NFC devices close to the wallet (pocket, bag) of the offer, scan and extract the data of the credit/security/health insurance/ID cards and after that use it for criminal acts. I have invented a simple and secure solution to solve the mentioned problem.
The patent application "NFC jammer" is filled and registered under the identifier EP12195187.
Rebound damping materials in pad to attach to the headrest of the car, protecting against neck injuries for men and women in rear impacts. The shock-absorbing material was selected in tests financed by the Swedish Transport Administration, which also has recommended the pillow for its rebound damping properties. Idea occurred when the headrests were introduced in cars, headrests fitted with elastic at the front leading to neck injuries in rear ...
1. windshield mounted camera, image recognition software and interface to both operator controls and vehicle speed controls.
2. user engages controller which recognizes road-side speed signs and sets vehicle speed and annunciates speed change to user.
3. similar to a cruise control, but reacts to changes in posted speed limits.
4. operator controls set, release, over ride of ...
Panoramic photography is a well-known technique, used by photographers who want to take pictures with a huge field of view. The maximum field of view is represented by a sphere. There are a lot of pc-based (and phone-based also) software that allows the user to load single images and combine them in a static panoramic view: in Figure 1 you can see three circular fisheye images combined into an equirectangular view, covering a field of view of 360°x180°. Furthermore does exist software that allow us navigate in a spherical panorama just moving the mouse over the image (let’s think ...
Pars is an Aerial robot which is designed and made for saving human
lives. The first purpose of building the robot is the relief of people
drowning near coastlines. By developing its applications, it can be
used in ships and off shore reliefs. It can also be used in other
applications such as monitoring of marine and off shore structures,
recording films and pictures from dangerous path ways for rescue
missions, precise positioning and monitoring of off shore disasters
and aid in firefighting.
The designed robot uses new technologies for guidance and navigation.
Some of the technologies used ...
This security object can save your life, your car, and your security. This pepper color gas comes in different designs, so that the robber cannot distinguish the product that you have. When a robber wants to take your car, they ask you to give them your keys, or to throw the keys to them. Well, this design works in this type of emergency, the only thing you have to do is press the buttom (it has a security feature that avoids pressing it by mistake) while taking the keys out of your bag. Once you give the keys away, ...
Power Fingerprinting (PFP) is a cyber security solution capable of directly detecting malicious intrusions in critical infrastructure and Industrial Control Systems (ICS). PFP allows the monitoring of platforms with limited computational resources and memory, often found in ICSs and Programmable Logic Controllers (PLCs), which would not have the resources to support a traditional security monitoring approaches, such as anti-virus.
A cyber attack to critical infrastructure can have devastating consequences to national security. Yet, solutions capable of monitoring the execution of ICSs are notoriously absent or deficient. Current cyber security solutions for ICSs focus on patching, peripheral defenses (firewalls, access ...