Upload
james-newman
View
215
Download
1
Tags:
Embed Size (px)
Citation preview
EDUSAFE System Exploitation next steps
Assoc. Professor Katerina PramatariVasileios Mantzios (ESR10)
Athens University of Economics and Business (AUEB)22 June 2015
WP 5 Overview (1/4)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
WP5: Technology assessment and Exploitation
• This WP studies how a technology prototype, in this case prepared for the CERN extreme environment:– can be transferred to other industry sectors, and– how to develop and introduce a planning tech-development
strategy which incorporates possible technology transfer potential from the start
WP 5 Overview (2/4)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
• After having analyzed the output of the first Testing Campaign
• Perform comprehensive Technology Assessment of final prototype
• Identify Capabilities• Identify Exploitable benefits• Gather Market input• Evaluate the input and markets• Target the system and operations of a potential spin off to
serve these markets
WP 5 Overview (3/4)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Deliverable reports
D5.1 Market study, tech assess. & initial business model D5.2 Annual appraisal of research progress and training D5.3 Technol. assessment & reverse engineering
potential D5.4 Business plan, Financial plan, IPR protection plan D5.5 Market feedback on prototype and demonstration D5.6 Presentation of Fellow’s research at end conference
WP 5 Overview (4/4)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Milestone reports
MS26 Technology assessment and framework + market study
MS27 Reverse engineering methodology completed MS28 Local specific trainings completed MS29 Exploitation plan accepted by all partners
Exploitation model alternatives
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Patent and Licensing to companies Research collaboration projects with potential future
companies-users Spin-off company, holding the whole IP
In case of no quorum interest, the excluded partners will be treated fairly according to FP7 regulation
This option may be of more interest, provided that we have an ICT project (harder to patent) and we espouse Open Innovation model
Exploitation opportunities
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Medical Applications
Maintenance process instruction tool
Medical Applications
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
South by South-west: Interactive
• Numerous pitching events• Entrepreneurship meetups• High technologies expos from USA labs• Knowledge Transfer Units from Research Organizations (NASA
etc.)• International high tech startups presentations (Metaio and ODG)• International Companies representatives• Capital Investors• Well-known startups• Workshops• Networking events
The 2nd most important event for innovation, high tech and entrepreneurship
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
EDUSAFE @ SXSW
Challenging experience
• 3 pitches in public• Numerous contacts and
networking• Great exposure for EDUSAFE work
and all partners
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Exploitation opportunity
During public pitching event
A Director from Samsung USA expressed high interest in our system
We organized a site visit at Austin Fab for further discussion.
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Samsung Wafers Cleanroom
• Very clean and good lighted environment• Complex maintenance procedure• No computer aided process has been applied• No robotic process can be applied• Big monetary impact of faulty maintenance process• No monitoring in the maintenance process• High cost for expert trained maintenance personnel• Operates 24/7
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
Samsung High level requirements
Non technical requirements• Equipment must be lightweight and comfortable with safety glasses• Use server located in Samsung premises• Potential future integration with Samsung systems
Functional requirements• Read instructions• Project augmented content for maintenance process• Project specific technical info (tolerance values)• Verify (with computer vision) if the work performed is correct (tolerance
values) • Verify component positions (using computer vision),• Record snapshots, record video at server• voice commands for user interface• stream live video to 'supervisor'• hear 'supervisor' advice/comments real time
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
EDUSAFE System components for Samsung
• PTU hardware• Augmented reality glasses• Computer vision
algorithms• Server /DAQ• Authoring tool
No need, for the time being, for gamma imaging camera
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
15
High Level Architecture
AR/Supervision camera and LEDs
AR glasses
PTU and sensor modules
Server
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
16
Future further collaboration with Samsung
• Other electronics manufacturers (intel etc)• Samsung Shipyards• Physical security control systems
• Communicate with Samsung Korea for further funding and exploitation in other applications (in nuclear industry as well)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
17
Technicalities and contract
• As a private company, they need to sign contract with a private legal entity
• The formulation of a spin-off which will hold the EDUSAFE IP is the best option
• This entity will sign the contract and be the technology and integration provider of EDUSAFE
They are about to invest good money (based on my feeling) for our technology, so they need to exclude any bureaucratic procedure.
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
18
Current state of communications
• We initiated the process at SXSW• Exchanged initial email to establish contact• Their legal department sent via email a signed
NDA
• They are waiting for a Draft DoW ASAP in order to finalize it after some iterations by the end of Summer
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
19
Proposition for internal next steps
• Agree upon an internal Project Leader– AUEB, as the Exploitation Leader and because of its experience,
volunteer to invest this effort
• Gather the interest of partners in the formulation of such a spin-off by the end of this week.
• Work collaboratively and efficiently to finalize the draft DoW that we will send them.
• EDUSAFE Coordinator (Olga) will send the email having in cc the rest consortium and internal PL.
• Internal PL will continue investing effort on this direction informing in parallel all the interested partners and Olga
• Examine the possibility to protect the Spin-off IPR– Partners not interested in the Spin-off will be treated fairly and according to
FP7 policy
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
20
Technologies used
• UBItrack• IMU (Sensor fusion)• EPFL algorithm• WRM algorithm• Sensor board• Sensors board software• PTU hardware• PTU software
• Display hardware• Display software• Control unit (touch screen
etc.)• Data Base hardware• Data Base software• Server hardware• Server software• Gamma imaging camera• Gamma imaging camera
software
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
21
Technology Assessment Strategy
Perform the following assessment to the final technologies to be used based on the feedback we had after the Testing Campaign.
• Functional Assessment• Technical Assessment• Non Technical Assessment• Cost-Benefit Analysis• Exploitation Assessment
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
22
Functional Assessment
Based on agreed final functional requirements• Operational Safety
– Level of radiation to which the user is exposed– Time of radiation exposure during use– Physical implications due to extensive use– Mental implications due to extensive use– Long term health implications
• Training Requirements– Number of training hours required– Training material and equipment required– Special knowledge fields required
• User Acceptance– Usability of Interfaces (both operator and supervisor)– Physical usability of wearable device– Functionality testing on the field
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
23
Technical Assessment• Technical Specifications
– Number of processors (Gum-stick board and Server)– Processors speed (Gum stick and Server)– Number of servers– System Memory (RAM)– Database capacity– Network Speed
• Performance Specifications– concurrent users are expected (peak and normal)– Application Workload Mix of each system component (% of
activities performed simultaneously)– Maximum acceptable response time for a given activity– Simultaneous users can be served (for a specific network
infrastructure)
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
24
Technical Assessment (cont.)
• System Security Assessment– How can the system be accessed (network, modem,
wireless)?– Are there appropriate controls and protection in place
(Firewalls, Intrusion Detection Systems etc)?– How can the system be accessed (ids, passwords, other
identification methods)?– Are data encrypted?– Are there any monitoring processes for data manipulation?– What are the processes for system and file back-ups?– What are the processes for managing system outages and
recovery?
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
25
Non Technical Assessment
• Applicability Assessment– Hardware infrastructure hardness– Communication protocols and infrastructure effectiveness
• Scalability Assessment– Installation time for a specific Organization (render time,
augmented content creation, security settings etc.)– Level of dependency in client used technology (current WiFi
network, 3D CAD etc.)– Level of client acceptance towards the field penetration needed with
markers
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
26
Cost Benefit Analysis
In terms of:
• Calculation and comparison of benefits and costs related to the product– Financial cost reduction or income generated from the use of
the product versus– costs related to the acquisition, training and operational
maintenance of the product.
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
27
Exploitation Assessment
Roadmap• Identification of System capabilities• Identification of System benefits to specific setting• Identification of exploitable benefits• Measure market needs• Form a spin-off• Transfer all the IP• Design specific services and applications for every
interesting industry
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
28
Next Steps
Based on the feedback of Testing Campaign we will:• Decide upon the technology to be used in the final
prototype• Evaluate the ability to serve the initially identified
industries• Finalize the list of industries and companies to contact• Agree upon the contacts list to send an information email
– We need to exploit our Partners‘ contacts and network
• Gather and evaluate this feedback• Examine the possibility to conduct some (phone)
interviews• Finalize the Technology Assessment, business plan and
market study by January 2016– Ideally utilizing the outcome from final TC of EDUSAFE prototype
WP5 - Vasileios Mantzios – AUEB – 22 June 2015
29
For your
attention
!WP5 - Vasileios Mantzios – AUEB – 22 June 2015