29
EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB) 22 June 2015

EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Embed Size (px)

Citation preview

Page 1: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

EDUSAFE System Exploitation next steps

Assoc. Professor Katerina PramatariVasileios Mantzios (ESR10)

Athens University of Economics and Business (AUEB)22 June 2015

Page 2: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

WP 5 Overview (1/4)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

WP5: Technology assessment and Exploitation

• This WP studies how a technology prototype, in this case prepared for the CERN extreme environment:– can be transferred to other industry sectors, and– how to develop and introduce a planning tech-development

strategy which incorporates possible technology transfer potential from the start

Page 3: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

WP 5 Overview (2/4)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

• After having analyzed the output of the first Testing Campaign

• Perform comprehensive Technology Assessment of final prototype

• Identify Capabilities• Identify Exploitable benefits• Gather Market input• Evaluate the input and markets• Target the system and operations of a potential spin off to

serve these markets

Page 4: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

WP 5 Overview (3/4)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Deliverable reports

D5.1 Market study, tech assess. & initial business model D5.2 Annual appraisal of research progress and training D5.3 Technol. assessment & reverse engineering

potential D5.4 Business plan, Financial plan, IPR protection plan D5.5 Market feedback on prototype and demonstration D5.6 Presentation of Fellow’s research at end conference

Page 5: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

WP 5 Overview (4/4)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Milestone reports

MS26 Technology assessment and framework + market study

MS27 Reverse engineering methodology completed MS28 Local specific trainings completed MS29 Exploitation plan accepted by all partners

Page 6: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Exploitation model alternatives

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Patent and Licensing to companies Research collaboration projects with potential future

companies-users Spin-off company, holding the whole IP

In case of no quorum interest, the excluded partners will be treated fairly according to FP7 regulation

This option may be of more interest, provided that we have an ICT project (harder to patent) and we espouse Open Innovation model

Page 7: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Exploitation opportunities

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Medical Applications

Maintenance process instruction tool

Page 8: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Medical Applications

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 9: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

South by South-west: Interactive

• Numerous pitching events• Entrepreneurship meetups• High technologies expos from USA labs• Knowledge Transfer Units from Research Organizations (NASA

etc.)• International high tech startups presentations (Metaio and ODG)• International Companies representatives• Capital Investors• Well-known startups• Workshops• Networking events

The 2nd most important event for innovation, high tech and entrepreneurship

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 10: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

EDUSAFE @ SXSW

Challenging experience

• 3 pitches in public• Numerous contacts and

networking• Great exposure for EDUSAFE work

and all partners

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 11: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Exploitation opportunity

During public pitching event

A Director from Samsung USA expressed high interest in our system

We organized a site visit at Austin Fab for further discussion.

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 12: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Samsung Wafers Cleanroom

• Very clean and good lighted environment• Complex maintenance procedure• No computer aided process has been applied• No robotic process can be applied• Big monetary impact of faulty maintenance process• No monitoring in the maintenance process• High cost for expert trained maintenance personnel• Operates 24/7

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 13: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

Samsung High level requirements

Non technical requirements• Equipment must be lightweight and comfortable with safety glasses• Use server located in Samsung premises• Potential future integration with Samsung systems

Functional requirements• Read instructions• Project augmented content for maintenance process• Project specific technical info (tolerance values)• Verify (with computer vision) if the work performed is correct (tolerance

values) • Verify component positions (using computer vision),• Record snapshots, record video at server• voice commands for user interface• stream live video to 'supervisor'• hear 'supervisor' advice/comments real time

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 14: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

EDUSAFE System components for Samsung

• PTU hardware• Augmented reality glasses• Computer vision

algorithms• Server /DAQ• Authoring tool

No need, for the time being, for gamma imaging camera

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 15: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

15

High Level Architecture

AR/Supervision camera and LEDs

AR glasses

PTU and sensor modules

Server

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 16: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

16

Future further collaboration with Samsung

• Other electronics manufacturers (intel etc)• Samsung Shipyards• Physical security control systems

• Communicate with Samsung Korea for further funding and exploitation in other applications (in nuclear industry as well)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 17: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

17

Technicalities and contract

• As a private company, they need to sign contract with a private legal entity

• The formulation of a spin-off which will hold the EDUSAFE IP is the best option

• This entity will sign the contract and be the technology and integration provider of EDUSAFE

They are about to invest good money (based on my feeling) for our technology, so they need to exclude any bureaucratic procedure.

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 18: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

18

Current state of communications

• We initiated the process at SXSW• Exchanged initial email to establish contact• Their legal department sent via email a signed

NDA

• They are waiting for a Draft DoW ASAP in order to finalize it after some iterations by the end of Summer

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 19: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

19

Proposition for internal next steps

• Agree upon an internal Project Leader– AUEB, as the Exploitation Leader and because of its experience,

volunteer to invest this effort

• Gather the interest of partners in the formulation of such a spin-off by the end of this week.

• Work collaboratively and efficiently to finalize the draft DoW that we will send them.

• EDUSAFE Coordinator (Olga) will send the email having in cc the rest consortium and internal PL.

• Internal PL will continue investing effort on this direction informing in parallel all the interested partners and Olga

• Examine the possibility to protect the Spin-off IPR– Partners not interested in the Spin-off will be treated fairly and according to

FP7 policy

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 20: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

20

Technologies used

• UBItrack• IMU (Sensor fusion)• EPFL algorithm• WRM algorithm• Sensor board• Sensors board software• PTU hardware• PTU software

• Display hardware• Display software• Control unit (touch screen

etc.)• Data Base hardware• Data Base software• Server hardware• Server software• Gamma imaging camera• Gamma imaging camera

software

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 21: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

21

Technology Assessment Strategy

Perform the following assessment to the final technologies to be used based on the feedback we had after the Testing Campaign.

• Functional Assessment• Technical Assessment• Non Technical Assessment• Cost-Benefit Analysis• Exploitation Assessment

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 22: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

22

Functional Assessment

Based on agreed final functional requirements• Operational Safety

– Level of radiation to which the user is exposed– Time of radiation exposure during use– Physical implications due to extensive use– Mental implications due to extensive use– Long term health implications

• Training Requirements– Number of training hours required– Training material and equipment required– Special knowledge fields required

• User Acceptance– Usability of Interfaces (both operator and supervisor)– Physical usability of wearable device– Functionality testing on the field

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 23: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

23

Technical Assessment• Technical Specifications

– Number of processors (Gum-stick board and Server)– Processors speed (Gum stick and Server)– Number of servers– System Memory (RAM)– Database capacity– Network Speed

• Performance Specifications– concurrent users are expected (peak and normal)– Application Workload Mix of each system component (% of

activities performed simultaneously)– Maximum acceptable response time for a given activity– Simultaneous users can be served (for a specific network

infrastructure)

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 24: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

24

Technical Assessment (cont.)

• System Security Assessment– How can the system be accessed (network, modem,

wireless)?– Are there appropriate controls and protection in place

(Firewalls, Intrusion Detection Systems etc)?– How can the system be accessed (ids, passwords, other

identification methods)?– Are data encrypted?– Are there any monitoring processes for data manipulation?– What are the processes for system and file back-ups?– What are the processes for managing system outages and

recovery?

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 25: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

25

Non Technical Assessment

• Applicability Assessment– Hardware infrastructure hardness– Communication protocols and infrastructure effectiveness

• Scalability Assessment– Installation time for a specific Organization (render time,

augmented content creation, security settings etc.)– Level of dependency in client used technology (current WiFi

network, 3D CAD etc.)– Level of client acceptance towards the field penetration needed with

markers

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 26: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

26

Cost Benefit Analysis

In terms of:

• Calculation and comparison of benefits and costs related to the product– Financial cost reduction or income generated from the use of

the product versus– costs related to the acquisition, training and operational

maintenance of the product.

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 27: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

27

Exploitation Assessment

Roadmap• Identification of System capabilities• Identification of System benefits to specific setting• Identification of exploitable benefits• Measure market needs• Form a spin-off• Transfer all the IP• Design specific services and applications for every

interesting industry

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 28: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

28

Next Steps

Based on the feedback of Testing Campaign we will:• Decide upon the technology to be used in the final

prototype• Evaluate the ability to serve the initially identified

industries• Finalize the list of industries and companies to contact• Agree upon the contacts list to send an information email

– We need to exploit our Partners‘ contacts and network

• Gather and evaluate this feedback• Examine the possibility to conduct some (phone)

interviews• Finalize the Technology Assessment, business plan and

market study by January 2016– Ideally utilizing the outcome from final TC of EDUSAFE prototype

WP5 - Vasileios Mantzios – AUEB – 22 June 2015

Page 29: EDUSAFE System Exploitation next steps Assoc. Professor Katerina Pramatari Vasileios Mantzios (ESR10) Athens University of Economics and Business (AUEB)

29

For your

attention

!WP5 - Vasileios Mantzios – AUEB – 22 June 2015