Jaarboek van de afstudeerders van HAS hogeschool, opleiding Food design 2016 met hun concepten ingedeeld in schakels van de keten: - In het deel Agri & Ingredients zijn ingrediënten en agrarische producten zoals groenten, peulvruchten als startpunt genomen van innovatie. - In het deel Factory treft u technologische innovaties en ontwikkelingen gericht op product, proces en kwaliteitsborging. - In het deel Channel kunt u innovaties in het marktkanaal, zoals blurring, omnichannel en online fooddiensten verwachten. - In het hoofdstuk Consumer zijn concepten te vinden die gericht zijn op specifieke doelgroepen, zoals ouderen, mensen met anosmie en stoeremannen.
MULTIFILE
When everything is destined to be designed, design disappears into the everyday. We simply don’t see it anymore because it’s everywhere. This is the vanishing act of design. At this moment design registers its redundancy: our products, environments and services have been comprehensively improved. Everything has been designed to perfection and is under a permanent upgrade regime. Within such a paradigm, design is enmeshed with the capitalist logic of reproduction. But this does not come without conflicts, struggles and tensions. Chief among these is the situation of design in a planetary procession toward decay. Our dispense culture prompts a yearning for longevity. The computational compulsion to delete brings alive a desire to retrieve objects, ideas and experiences that refuse obsolescence. Society is growing more aware of sustainability and alert to the depletion of this world. For the ambitious designer, it’s time to take the next step: designing the future as a collective relation attuned to life.
MULTIFILE
Coastal nourishments, where sand from offshore is placed near or at the beach, are nowadays a key coastal protection method for narrow beaches and hinterlands worldwide. Recent sea level rise projections and the increasing involvement of multiple stakeholders in adaptation strategies have resulted in a desire for nourishment solutions that fit a larger geographical scale (O 10 km) and a longer time horizon (O decades). Dutch frontrunner pilot experiments such as the Sandmotor and Ameland inlet nourishment, as well as the Hondsbossche Dunes coastal reinforcement project have all been implemented from this perspective, with the specific aim to encompass solutions that fit in a renewed climate-resilient coastal protection strategy. By capitalizing on recent large-scale nourishments, the proposed Coastal landSCAPE project C-SCAPE will employ and advance the newly developed Dynamic Adaptive Policy Pathways (DAPP) approach to construct a sustainable long-term nourishment strategy in the face of an uncertain future, linking climate and landscape scales to benefits for nature and society. Novel long-term sandy solutions will be examined using this pathways method, identifying tipping points that may exist if distinct strategies are being continued. Crucial elements for the construction of adaptive pathways are 1) a clear view on the long-term feasibility of different nourishment alternatives, and 2) solid, science-based quantification methods for integral evaluation of the social, economic, morphological and ecological outcomes of various pathways. As currently both elements are lacking, we propose to erect a Living Lab for Climate Adaptation within the C-SCAPE project. In this Living Lab, specific attention is paid to the socio-economic implications of the nourished landscape, as we examine how morphological and ecological development of the large-scale nourishment strategies and their design choices (e.g. concentrated vs alongshore uniform, subaqueous vs subaerial, geomorphological features like artificial lagoons) translate to social acceptance.
The production, use, disposal and recovery of packaging not only generates massive volumes of waste, it also consumes raw materials, water and energy (Fitzpatrick et al. 2012). Simultaneously, consumers have shown an increasing interest in products incorporating sustainable and social attributes (Kletzan et al., 2006). As a result, environmentally friendly packaging, also called ecofriendly or sustainable packaging, has become mainstream. In this context, packaging is more than just ensuring the product's protection and easing transportation, it is also a communicative tool (Palmer, 2000) and it becomes associated with multiple drivers of the purchasing process. Consequently, companies face pressure to innovate responding to consumer demands, and focusing on sustainable solutions that reduce harmful materials and favour green alternatives for both, the product and the packaging. Although the above has triggered research on consumer choice for sustainable products and alternatives on sustainable packaging, the relation between sustainable packaging and consumer behaviour remains underexplored. This research unpacks this relationship, i.e., empirically verifies which dimensions (recyclability, biodegradability, reusability) of sustainable packaging are perceived and valued by consumers. Put differently, this research investigates consumer behaviour towards the functions of sustainable packaging in terms of product protection, convenience, reliability of information and promotion, and scrutinises the perceived credibility of the associated ethical responsibility claims. It aims to identify those packaging materials and/or sustainability characteristics perceived as more sustainable by consumers as well as the factors influencing actual consumer choice towards sustainable packaged products. We aim to gain more insights in the perceptual frame that different types of consumers apply when exposed to sustainable packaging. To this end, we will make use of revealed preference methods to measure consumer valuations of sustainable packaged products. This game-theoretic approach should provide a more complete depiction of consumers' perceptions and preferences.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.