Horizon scanning: Identification of Target Applications Sample Clauses

Horizon scanning: Identification of Target Applications. ‌ The first phase of the NANoREG foresight system is the identification of the target application/s. Since we are dealing with a MNM that has a set of potential applications, there is the need to evaluate the range of applications to identify what can be of interest for stakeholder, regulators in primis. The main source of information to draw the whole picture of graphene applications is the graphene European strategic roadmap written by Xxxxxxx et al. (2015) in the context of the European graphene flagship. The selection of this source is based on the credibility of the content, the amount of reviewed papers and sources (2344), and the link to a European initiative. An overall picture of the uses of graphene and the timeline for their implementation is in Figure 17. Figure 17. Summary of graphene applications and timeline for their implementation. From Ferrari et al., 2015. Without entering into details that can be retrieved from the roadmap, the main application fields are: electronics, energy, and composites. In turn, the products and applications that can be foreseen may find place in different industry sectors, such as automotive, sport goods, health and medicine, environmental monitoring and remediation, ITC, consumer electronic devices, military and defence, just to name few. Looking into the roadmap, a summary table with all applications and timeline was compiled (Table 6). Table 6. Overview of development of graphene applications, and examples of industry sectors. Sector 2018 2020 2024 and > Industry sectors Electronics Flexible screens and foils (e.g. OLED) Flexible screens and foils (e.g. OLED) Transistors Electronic consumer goods (mobile phones, computers, wearable electronics, ITC) Electronic industry applications Spintronics CMOS devices, data storage CMOS devices, data storage Electronic consumer goods (mobile phones, computers, wearable electronics, ITC) Electronic industry applications Photonics and optoelectronics Photodetectors Fibre lasers Photodetectors Plasmon detectors Systems implementation (e.g. spectrometers, optoelectronic systems) Sensors Mass sensors Pressure sensors Chemical sensors Plasmonic read sensors Environmental monitoring Piezoresistive devices Health and Safety Defence Capacitative devices Biological safety Magnetic field sensors Flexible electronics Wearable smart devices for sensing and connectivity Chemical and biosensors Flexible and portable devices Flexible energy harvesting and storage devices RFD connectivity...
AutoNDA by SimpleDocs

Related to Horizon scanning: Identification of Target Applications

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Identification Badges Identification badges will be supplied by Advanced Behavioral Health (ABH) to all credentialed individuals who are providing services to children. Badges must be presented to the child/youth and any present adults at the time of service and must be worn for the duration of the service. Badges will be updated every two years during the re- credentialing process. Any individual or agency who fails to submit a photo ID to ABH within the designated timeframe will have their credentialing status terminated.

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • Identification Card Any cards issued to Members are for identification only.

Time is Money Join Law Insider Premium to draft better contracts faster.