104
D8.1 – Exploitation and Dissemination Plan (a) Due Date: September 30 th , 2015 Actual Submission Date: March, 2, 2016 Lead Beneficiary in charge of the Deliverable: LUTECH Revision: V2.0 Grant Agreement: 607729 Project Acronym: C2-SENSE Project Title: Interoperability Profiles for Command/Control Systems and Sensor Systems in Emergency Management Funding Scheme: SEC-2013.5.3-1 Project Start Date: Duration: April 01, 2014 36 months Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013) Dissemination Level PU Public PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) X CO Confidential, only for members of the consortium (including the Commission Services)

D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a)

Due Date: September 30th, 2015 Actual Submission Date: March, 2, 2016 Lead Beneficiary in charge of the Deliverable: LUTECH Revision: V2.0 Grant Agreement: 607729 Project Acronym: C2-SENSE Project Title: Interoperability Profiles for Command/Control Systems and

Sensor Systems in Emergency Management Funding Scheme: SEC-2013.5.3-1 Project Start Date: Duration:

April 01, 2014 36 months

Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013)

Dissemination Level

PU Public

PP Restricted to other programme participants (including the Commission Services)

RE Restricted to a group specified by the consortium (including the Commission Services) X

CO Confidential, only for members of the consortium (including the Commission Services)

Page 2: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 2/104

Document History:

Version Date Changes From Review

V0.1 26.03.2015 Initial Document Raul Arisi (LUTECH) All

V0.2 27.06.2015 Contacts updated Raul Arisi (LUTECH) All

V0.3 09.07.2015 Exploitation part added Raul Arisi (LUTECH) All

V0.4 12.07.2015 Dissemination part added Raul Arisi (LUTECH) All

V0.5 05.08.2015 Updated info Raul Arisi (LUTECH) All

V0.6 07.08.2015 Exploitation plan updated Raul Arisi (LUTECH) All

V0.7 20.09.2015 Exploitation Team Updated Raul Arisi (LUTECH) All

V0.8 28.09.2015 Dissemination Team Updated Raul Arisi (LUTECH) All

V0.9 29.09.2015 Dissemination Updated Raul Arisi (LUTECH) All

V1.0 16.12.2015 Exploitation and Dissemination Updated Raul Arisi (LUTECH) All

V1.1 27.01.2016 Dissemination Strategy added Raul Arisi (LUTECH) All

V1.2 01.02.2016 Exploitation Market Analysis added Raul Arisi (LUTECH) All

V1.3 02.02.2016 Exploitation External activities descriptions added

Raul Arisi (LUTECH) All

V1.4 05.02.2016 LUTECH Exploitation’s individual contribution added

Raul Arisi (LUTECH) All

V1.5 19.02.2016 AIT and SRDC Exploitation’s individual contributions added

Raul Arisi (LUTECH) All

V1.6 23.02.2016 REGOLA Exploitation’s individual contributions added

Raul Arisi (LUTECH) All

V1.7 25.02.2016 INNOVA Exploitation’s individual contributions added

Raul Arisi (LUTECH) All

V1.8 25.02.2016 LUTECH Exploitation’s individual contribution updated

Raul Arisi (LUTECH) All

V1.9 29.02.2016 AIT Exploitation’s individual contribution updated

Raul Arisi (LUTECH) All

V2.0 01.03.2016 Second version submitted Coordinator

Page 3: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 3/104

Contributors:

SAGEM: Caroline Senzier, Francois GENDRY

LUTECH: Raul Arisi

AIT: Gerald Schimak

SRDC: Yildiray Kabak, Mert Gencturk

REGIONE PUGLIA: Pierluigi Loiacono

INNOVA PUGLIA: Agostino Palmitessa, Marco Di Ciano

PIAP: Jan Piwinski, Roman Szewczyk

REGOLA: Biagio Lanziani

Responsible Author Raul Arisi Email [email protected]

Beneficiary LUTECH Phone 0039 335 7893249

Page 4: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 4/104

Quality Control

Role Name Date

Work Package Leader Raul Arisi (LUTECH) 29.09.2015

Work Package Leader Raul Arisi (LUTECH) 15.12.2015

Work Package Leader Raul Arisi (LUTECH) 26.02.2016

Coordinator Caroline Senzier (SAGEM) 01.03.2016

Security Scrutiny Committee Review

Comments

No security sensitivity issues.

Recommended Distribution

RE, Consortium.

Date 02.03.2016

Page 5: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 5/104

EXECUTIVE SUMMARY

Exploitation and Dissemination activities are performed within WP8 Dissemination, Exploitation, Standardization and Innovation Related Activities. In particular, Exploitation activities are ruled under Task 8.1- Exploitation and Dissemination activities under Task 8.2 - Dissemination: both these two tasks cover the whole duration of the project. This document covers all activities that are planned for the first reporting period (M1-M18). The main objective in this period is to promote and use project results. In parallel, we will continue to increase the visibility and impact of the C2-SENSE research community at both European and global levels, through scientific publications at conferences and in journals, promotion and organization of workshops, events involving both industry and academic entities. Each WP will have specific dissemination activities and WP8 integrates all of them by using C2-SENSE web site as the main consolidation tool and dissemination channel. The IPR management will play a major role in deciding whether a particular outcome of the project should be disseminated, exploited or both. Regarding Exploitation Activities, the Exploitation Principles and Organization paragraph reports where and how exploitation principles have been included in the DOW and in the CA of C2-SENSE as well as how the consortium was organized in order to cope with exploitation activities. The paragraph Market Analysis reports a preliminary market analysis mostly based on IoT and its application in the SENSE of Real World crisis/emergency events and in the C2 of interoperable Digital World crisis/emergency organizations, in the context of digitalization of industry and government. The paragraph C2SENSE Exploitable Assets analyses C2-SENSE results in an exploitation context and identifies four main packages which could drive our next exploitation strategy: Consultancy, Open Source, ICT (Proprietary) and Pilot Showcase. Finally the paragraph Joint and Individual Exploitations depicts first ideas about joint exploitation and illustrates the updated individual exploitation plans with respect to the intentions expressed in the DOW.

Page 6: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 6/104

TABLE OF CONTENTS

1 EXPLOITATION ACTIVITIES ........................... .............................................................................. 11 1.1 Exploitation Principles and Organization ......................................................................... 12

1.1.1 Approach .......................................................................................................................... 12

1.2 Exploitation Team (ET) .................................................................................................... 13 1.3 Exploitation Flowchart (EF) ............................................................................................. 14 1.4 Exploitation Sheet (ESHEET) .......................................................................................... 15 1.5 Exploitation Stakeholders (ES) ......................................................................................... 16 1.6 Market Analysis: Internet of Things for SENSE and Digitizing C2 ................................ 17

1.6.1 ICT solutions for IoT and Real World Sensing (IoT for SENSE) .................................... 19

1.6.2 ICT solutions for Digitizing and Interoperating PA & Government (ICT for C2) ........... 21

1.7 C2SENSE Exploitable Assets ........................................................................................... 22 1.8 Joint and Individual Exploitations .................................................................................... 24

1.8.1 Joint Exploitation – All the Partners ................................................................................. 25 1.8.2 Individual Exploitation - Sagem Défense Sécurité (SAGEM) ......................................... 26

1.8.3 Individual Exploitation - Lutech SpA (Lutech) ................................................................ 27 1.8.4 Individual Exploitation - Austrian Institute of Technology GmbH (AIT) ....................... 31

1.8.5 Individual Exploitation - Software Research, Development and Consultancy Ltd. (SRDC) 34

1.8.6 Individual Exploitation - Servizio Protezione Civile Regione Puglia (RegionePuglia) ... 36

1.8.7 Individual Exploitation - InnovaPuglia SpA (InnovaPuglia)............................................ 37

1.8.8 Individual Exploitation - Industrial Research Institute for Automation and Measurements (PIAP) 39 1.8.9 Individual Exploitation - REGOLA S.r.l (REGOLA) ...................................................... 40

2 DISSEMINATION................................................................................................................................ 42

2.1 Dissemination Approach .................................................................................................. 42 2.2 Dissemination Strategy ..................................................................................................... 43 2.3 Dissemination Team (DT) ................................................................................................ 44 2.4 Dissemination Flowchart (DT) ......................................................................................... 45 2.5 Dissemination Sheet (DSHEET) ...................................................................................... 46 2.6 Dissemination Stakeholders (DS) ..................................................................................... 47 2.7 Dissemination Channels & Tools & Materials (DCTM) .................................................. 49

2.8 Communication strategy and target audience ................................................................... 51 2.9 Internal Dissemination - Internal project website ............................................................. 52

2.9.1 Internal project website (Achieved) .................................................................................. 52 2.9.2 Internal project website (Future developments) ............................................................... 52

2.10 Internal Dissemination - Internal presentations within Partner’s organization................. 53

2.10.1 Internal presentations within Partner’s organization (Proposed) ...................................... 53

2.11 External Dissemination - Public Project website .............................................................. 54 2.11.1 Public Project website (Current status) ............................................................................. 54 2.11.2 Public Project website (Future developments) ................................................................. 55

2.12 External Dissemination - Publications (Short communications, Journals, Newsletters, Social networks) .......................................................................................................................................... 56

2.12.1 Publications - Short communications (Achieved) ............................................................ 56 2.12.2 Publications - Short communications (Future developments) .......................................... 56

2.12.3 Publications - Journals (Achieved) ................................................................................... 57 2.12.4 Publications - Journals (Proposed) ................................................................................... 58 2.12.5 Publications - Newsletters (Achieved) ............................................................................. 60 2.12.6 Publications - Newsletters (Proposed) .............................................................................. 60 2.12.7 Publications - Social Networks (Achieved) ...................................................................... 61 2.12.8 Publications - Social Networks (Future developments).................................................... 62

2.12.9 Coordination with other research projects (Achieved) ..................................................... 63 2.12.10 Coordination with other research projects (Proposed) ..................................................... 63

2.13 External Dissemination – Events (Conferences, Workshops) .......................................... 64

Page 7: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 7/104

2.13.1 Events - Conferences (Achieved) ..................................................................................... 64 2.13.2 Events - Conferences (Proposed) ...................................................................................... 78 2.13.3 Events - Workshops (Achieved) ....................................................................................... 88 2.13.4 Events - Workshops (Proposed) ....................................................................................... 91 2.13.5 Events - Surveys (Achieved) ............................................................................................ 92

3 ANNEX I - EXPLOITATION SHEET ............................................................................................... 99

4 ANNEX II - DISSEMINATION SHEET .......................................................................................... 100

5 ANNEX III - C2-SENSE LOGO ....................................................................................................... 101

6 ANNEX IV - LUTECH FLYER ........................................................................................................ 102

7 ANNEX V - AIT POSTER ................................................................................................................. 103

8 ANNEX VI – PROJECT PRESENTATIONS ................................................................................. 104

Page 8: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 8/104

LIST OF FIGURES

Figure 1 – Exploitation Flowchart (EF) .......................................................................................................... 14

Figure 2 – Exploitation Sheet (ESHEET) ........................................................................................................ 15

Figure 3 – IDC report – Market Forecast ........................................................................................................ 17

Figure 4 – IDC report – Smart Environments ................................................................................................. 18

Figure 5 – IDC report - Priorities .................................................................................................................... 20

Figure 6 – Exploitable Assets .......................................................................................................................... 23

Figure 7 – CAP workshop audience ................................................................................................................ 37

Figure 8 – CAP workshop speaker .................................................................................................................. 38

Figure 9 – Dissemination Sheet (DSHEET) .................................................................................................... 45

Figure 10 – Dissemination Sheet (DSHEET) .................................................................................................. 46

Figure 11 – Internal project website ................................................................................................................ 52

Figure 12 – C2-SENSE public web site .......................................................................................................... 54

Figure 13 - Newsletter ..................................................................................................................................... 60 Figure 14 – Facebook mock-up ....................................................................................................................... 61

Figure 15 - Twitter mock-up ........................................................................................................................... 61

Figure 16 - YouTube mock-up ........................................................................................................................ 61

Figure 17 – IWEI - web site ............................................................................................................................ 65

Figure 18 – IWEI - paper ................................................................................................................................. 65

Figure 19 – IWEI - workshop title ................................................................................................................... 66

Figure 20 – IWEI - speaker ............................................................................................................................. 66

Figure 21 – IWEI - audience ........................................................................................................................... 66

Figure 22 – Workshop web site ....................................................................................................................... 67

Figure 23 – Workshop slides ........................................................................................................................... 67

Figure 24 – Workshop agenda ......................................................................................................................... 67

Figure 25 – IIWAS - web site .......................................................................................................................... 68

Figure 26 – IIWAS - paper .............................................................................................................................. 69

Figure 27 – IIWAS - slide ............................................................................................................................... 69

Figure 28 – OGC – web site ............................................................................................................................ 70

Figure 29 – OGC – slide .................................................................................................................................. 71

Figure 30 – GWF – web site ............................................................................................................................ 72

Figure 31 – GWF – paper ................................................................................................................................ 73

Figure 32 – GWF – slide ................................................................................................................................. 73

Figure 33 – GWF – speaker ............................................................................................................................. 74

Figure 34 – ISESS - web site ........................................................................................................................... 75

Figure 35 – ISESS - agenda ............................................................................................................................. 75

Figure 36 – ISESS - paper ............................................................................................................................... 76

Figure 37 – ISESS - slide ................................................................................................................................ 77

Figure 38 – ISESS - audience .......................................................................................................................... 77

Figure 39 – Forum Risk - web site .................................................................................................................. 82

Figure 40 – Forum Risk - flyer ........................................................................................................................ 82

Figure 41 – HACKETON - web site ............................................................................................................... 83

Figure 42 – HACKETON - slides ................................................................................................................... 83

Figure 43 – eChalleges - web site .................................................................................................................... 84

Figure 44 – eChalleges - agenda...................................................................................................................... 84

Figure 45 – eChalleges - paper ........................................................................................................................ 85

Figure 46 – I-ESA – web site .......................................................................................................................... 86

Figure 47 – I-ESA – paper ............................................................................................................................... 86

Figure 48 – PIAP – workshop audience .......................................................................................................... 90

Figure 49 – INNOVA – workshop audience ................................................................................................... 93

Figure 50 – INNOVA – workshop slide .......................................................................................................... 93

Figure 51 – INNOVA – workshop speaker ..................................................................................................... 93

Figure 52 – INNOVA – meeting location ....................................................................................................... 95

Page 9: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 9/104

Figure 53 – INNOVA – meeting slide ............................................................................................................. 95

Figure 54 – INNOVA – meeting audience ...................................................................................................... 96

Figure 55 – INNOVA – meeting attendees ..................................................................................................... 96

Figure 56 – INNOVA – questionnaire ............................................................................................................ 97

Figure 57 – INNOVA – questionnaire ............................................................................................................ 98

Figure 58 – C2-SENSE – LOGO .................................................................................................................. 101

Figure 59 – LUTECH - flyer ......................................................................................................................... 102

Figure 60 – AIT - poster ................................................................................................................................ 103

Figure 61 – C2-SENSE – ONESLIDE Project Presentation ......................................................................... 104

Page 10: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 10/104

LIST OF TABLES

Table 1 – Exploitation Team (ET) ................................................................................................................... 13

Table 2 – Dissemination Team (DT) ............................................................................................................... 44

Table 3 – Dissemination Stakeholders (DS) .................................................................................................... 47

Table 4 – Dissemination Channels & Tools & Materials (DCTM) ................................................................. 49 Table 5 – Dissemination Objectives ................................................................................................................ 51

Table 6 – Conference (Achieved) .................................................................................................................... 64

Table 7 – Conference (Proposed) .................................................................................................................... 81

Page 11: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 11/104

1 EXPLOITATION ACTIVITIES

This Chapter aims at defining approach, plan and actions related to the exploitation of C2-SENSE methodological, technological and applicative assets. It presents the principles of the C2-SENSE approach to exploitation, mostly included in the DOW and in the Consortium Agreement as well as how the consortium was organized to cope with such a challenge. The nucleus of this section has been already presented in the previous release of this D8.1 deliverable, but important extensions and expansions have been included to better clarify C2-SENSE approach. The following sections of this are instead original new contributions of the present release if D8.1 and provide the basis on which to develop our exploitation strategy for the following period of the project. In particular:

• The paragraph Market Analysis: a draft market analysis is presented as well as a preliminary (M18 visibility) positioning of C2-SENSE project. For this first release we took the approach to consider two main market segments: the provision and adoption of IoT solutions to SENSE the real world; the provision and adoption of ICT solutions to interoperate C2 centres.

• The paragraph C2SENSE Exploitable Assets: the C2-SENSE value proposition to the market has been described thanks to 4 main exploitation packages grouping the project outcomes described in detail in D8.5 with their ownership and IPR. A Consultancy Package will form our ice breaking exploitation asset to convince stakeholders about C2-SENSE socio-business positive impact. Two ICT-based Packages, one Open Source about collaboration and interoperability, one proprietary including advanced models and solutions, are being described. Finally, a Pilot Showcase Package will expand the ecosystem of C2-SENSE trials in a leading-by-example manner to other administrations and Countries

• The paragraph Joint and Individual Exploitations: it will finally describe the current discussion about our joint exploitation strategy and include the partners’ exploitation plans as an evolution of their initial intentions expressed in the DOW.

Page 12: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 12/104

1.1 Exploitation Principles and Organization

1.1.1 Approach As explained in 3.2.2. Exploitation of the DOW, effective response to emergencies, crises and disasters depends on timely available, reliable and intelligible information and this can only be achieved through effective coordination and communication among the first responders.

Two main interrelated aspects of the project have been therefore identified and will be the basis also for our exploitation: the SENSE part (answering needs related to timely, reliable and intelligible management of events, data, information) and the C2 part (answering needs for coordination and interoperability of diverse organizational bodies involved in crisis/emergency management).

In the SENSE part, the main challenge is the vertical interoperability required by the digitalization of Real World to Digital World and how Internet of Things, Event Driven Architectures, Big Data Analytics and Cloud Computing could contribute to fill the interoperability gaps addressed in WP3; in the C2 part, the main challenge is the horizontal interoperability among emergency/crisis management centers and Interoperability Profiles, Process re-engineering, Digital Innovation techniques could fill the challenges addressed in WP4. At M24, with the presence of the WP3-WP4 main deliverables, the consortium will better detail its exploitation strategy both in terms of SENSE / C2 exploitation assets and targets.

At M30, with the integration performed in WP5 this initial exploitation perception will be made more tangible and benefits measurable, leading to substantial concrete exploitation initiatives to SENSE and C2 stakeholders.

Currently, the coordination and communication in crisis situations has a number of crucial problems as specified in the section “How the emergency management problems depicted in the scenarios will be addressed by C2-SENSE”. The exploitation philosophy of the C2-SENSE Project lies in the fact that these problems have severe effects and governments invest considerable amount of budget to overcome them. Furthermore, there are already existing emergency management systems and they are not interoperable, which also causes a communication bottleneck. In this respect, C2-SENSE’s exploitation strategy will be towards this direction and the possible targets for the project are governmental institutes, emergency management system providers, healthcare institutes and public safety organizations.

Throughout the project duration, the exploitation activities of the project consortium cover the assessment of the market, assessment of the related technological developments and the business potential especially by the industrial partners. This guarantees an immediate feedback not only on the project work but also on the Dissemination and Use Plan, which will describe the overall exploitation of the project by the C2-SENSE consortium. Such an operational model is essential for a software development project on the cutting edge of the technology in acting on a fast changing environment.

A second aspect of the exploitation approach of C2-SENSE concerns the internal organization of the consortium, in order to effectively implement its exploitation strategy. In fact, to properly define an Organisation able to deliver an Exploitation Plan, it’s necessary to define:

- Exploitation Team (ET), the human resources acting as catalysts in the beneficiaries for the exploitation activities

- Exploitation Flowchart (EF), the processes and procedures to be followed - Exploitation Sheet (ESHEET), a detailed common template where to submit contributions and

extract information and knowledge - Exploitation Stakeholders (ES), an indication of communities and targets of our exploitation

Page 13: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 13/104

1.2 Exploitation Team (ET)

The C2-SENSE Exploitation Team comprises one Exploitation Manager that collects and consolidates all the contributions from Exploitation Owners in charge of any beneficiary. Here following the resources allocated on the different roles:

Table 1 – Exploitation Team (ET)

Exploitation Team (ET) Participant number Participant short name Resource name Resource Role

2 LUTECH Raul Arisi Exploitation Manager

1 SAGEM Caroline Senzier Exploitation Owner 2 LUTECH Raul Arisi Exploitation Owner 3 AIT Gerald Schimak Exploitation Owner 4 SRDC Yildiray Kabak Exploitation Owner 5 REGIONE PUGLIA Pierluigi Loiacono Exploitation Owner 6 INNOVA PUGLIA Agostino Palmitessa Exploitation Owner 7 PIAP Jan Piwinski Exploitation Owner

8 REGOLA Biagio Lanziani Exploitation Owner

The members of the Team have been identified from the very beginnning. In particular, the Exploitation Manager has been identified from the DoW and confirmed during the very first meeting of the Consoritum, the KOM (Kick Off Meeting) held in Paris (France) on 13th 14th May 2014. All the Partners have been required to identify the Exploitation Owners during the KOM (Kick Off Meeting) held in Paris in 13-14 May 2014. All the Partners have made their proposals during the Consortium Meeting held in Valenzano (Italy) on 15th Oct 2014, and they’ve finally been confirmed via email by 31st Oct 2014. There is only one Exploitation Owner per partner, who talks to the Exploitation Manager, in order to have a coherent flow of information. That is: Exploitation Owner is the only contact point inside the partner that collects internally all the information to pass to the Exploitation Manager. The Exploitation Team require all the members to meet during every Consortium Meeting, in order to update the Exploitation Sheet (ESHEET), share the updates with all the othe members, collect feedbacks and eventually plan additional activities. The meetings during which the Exploitation Team has met are:

- Conf calls with every Partner during Nov 2014 - Ankara (Turkey) 26th March 2015 - Warsaw (Poland) – 25-26th Jun 2015 - Milan (Italy) – 12-14th Oct 2015 (to be hold) - Brussels (Belgium) – 15th Dec 2015 (to be hold)

Page 14: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 14/104

1.3 Exploitation Flowchart (EF)

The Exploitation Owners in every partner are in charge of collecting all the contributions, suggestions, directives that, related to the main vision and strategy of the partner, they consider worth doing as an exploitation activity. The Exploitation Owners collects all the contributions in the Exploitation Sheet (ESHEET) and pass it to the Exploitation Manager. The Exploitation Manager consolidates all the contributions in a larger and more comprehensive Consolidated Exploitation Sheet (CESHEET), that will be presented to the Project Officer by the Project Coordinator.

Figure 1 – Exploitation Flowchart (EF)

Page 15: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 15/104

1.4 Exploitation Sheet (ESHEET)

The Exploitation Owners collects all the contributions in the Exploitation Sheet (ESHEET). Here following an example of a possible ESHEET:

Figure 2 – Exploitation Sheet (ESHEET)

Here following the main sections of the ESHEET:

- Owner o It’s to be filled with the information regarding the main focal point of the Partner in charge

of collecting all the contributions internal to the Partner - Activity details

o It’s the label, description and some additional info of the atomic item to decide upon. o The “Name” column is the short description of the activity. o The “Description” column should list the extensive description of that particular activity.

- Partners involved o Here all the involved Partners should be highlighted.

- Activity Type o It’s the category of the activity.

- Activity Purpose o It’s the goal of the activity.

- Activity Area o It’s the application area of the activity.

- Exploitation Stakeholders (ES) o It’s the target audience of the activity.

For the current Exploitation Sheet: please see Annex I Exploitation Sheet. From this working sheet, a more summarized and actionable table is extracted and detailed in the following sections.

Page 16: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 16/104

1.5 Exploitation Stakeholders (ES)

C2-SENSE exploitation strategy is addressing diverse communities of external stakeholders. The methods and tools developed to implement both vertical (Real-to-Digital) and horizontal interoperability could be part of a Consultancy Exploitation Package targeting C2 competence centers but also be of interest for relevant scientific communities, maybe engaged in H2020 proposals in the same or adjacent domains. The IT solutions could be categorized as Open Source single components addressing “IT for crisis management” developers communities (Open Source Exploitation Package) and as proprietary Integrated IT Solutions (Integrated Platforms Exploitation Package) addressing system integrators and targeting C2 centers and monitoring networks managing authorities. Finally the experience and lessons learned by the Apulian use case could be collected in a C2 Centers Exploitation Package showcase to attract new final customers. Stakeholders can be therefore segmented into Communities with similar needs: - Scientific/Academic/IT Communities (Consultancy & IT Packages)

� Research Institutes, mostly in the field of IoT for crisis/emergency management, like for instance the IERC cluster AC3 about application pilots led by Maurizio Spirito of ISMB Turin, the IVLAB TG2 Enterprise Interoperability for Crisis management led by Dr. Frederick Benaben (Ecole des Mines Albi-Carmaux)

� Standardization Bodies (norm-related committees and meetings, specifically OASIS and HL7) � Alliances and Foundations, as the AIOTI alliance for IoT Innovation and its WG10 Smart

Environment led by Raoul Mallart SIGFOX � Other EC-funded Projects, in the ICT and Security work programs � C2-SENSE Scientific Partners: other departments, other laboratories

- Industrial/Commercial Communities (C2 Centers Package)

� Public Sector (Local, Regional and National Governments) � HealthCare � Industry Trade & Services � Defense (Police departments, municipal authorities) � Civil Security & Protection � Energy � C2-SENSE Consortium Partners

Page 17: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 17/104

1.6 Market Analysis: Internet of Things for SENSE and Digitizing C2

In this present preliminary Exploitation Plan, we will present just a preliminary market analysis mostly focusing on Internet of Things and its application to SENSE and C2 domains. In the next release of C2-SENSE exploitation plan we will extend the scope also to other C2-SENSE technologies and we will look into competition. The key document we are going to comment has been recently issued by IDC EMEA in response to a DG CNECT call of tender Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination.

The IoT (Internet of Things) is a pervasive innovative technology building on the universal connectivity of things and people, now moving in Europe from the pioneer phase to widespread adoption. In combination

with cloud computing and Big Data the IoT is opening the new age of the hyper-connected society and acting as a powerful driver of business innovation, but also facing equally strong barriers in terms of security risks,

concerns about privacy protection, and resistance to organizational change. C2-SENSE is addressing the Real Time Data Acquisition and Processing challenge in its SENSE part and the IoT Interoperability challenge in its C2 part. IDC market forecast are really promising, as depicted in the figure below, but not so exciting for the Smart Environment domain (see other picture). This is mostly due to the “public” nature of C2-SENSE which could slow down the IoT innovation pace typical of industry and smart manufacturing (Industrie 4.0) and smart cities.

Figure 3 – IDC report – Market Forecast

The key results from the IDC model show a baseline scenario with the following characteristics: • The number of IoT connections within the EU28 will increase from approximately 1.8 billion in

2013 (the base year) to almost 6 billion in 2020. As a consequence of more things becoming connected, the installed base is expected to increase at a Compound Average Growth Rate (CAGR) of 18.7% over the period.

• IoT revenues in the EU28 will increase from more than €307 billion in 2013 to more than €1,181 billion in 2020. As the installed base increases so revenues follow suit, albeit with a slight time lag. Revenues will come from the complete lifecycle of an IoT solution as they would do from any ICT deployment (i.e. Plan, Build, Operate, and Maintain) although the mix will change across

Page 18: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 18/104

time. Hence we expect to see a greater weighting towards professional services and design as part of planning and or building IoT solutions in the early years of the forecast period. Later service revenues in the Operate and Maintain categories are expected to dominate.

All vertical sectors in the economy will participate the IoT revolution, but again those that have traditionally invested more in ICT are expected to enjoy more of the revenues and sooner than those that have not. This greater and lesser propensity to invest in ICT is factored into IDC forecasts. Manufacturing will also represent the biggest IoT market in 2020, followed by the Finance. To meaningfully compare eight identified Smart Environments, IDC have focused on two fundamental variables:

• the estimated size of each Smart Environment in terms of IoT spending in 2020; • the estimated growth of each Smart Environment in terms of IoT spending over the period 2014-

2020. A visualization of the eight Smart Environments against these two variables is presented in the following Figure

Figure 4 – IDC report – Smart Environments

The following paragraph will look into more detail about IoT for Smart Government / Environment.

Page 19: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 19/104

1.6.1 ICT solutions for IoT and Real World Sensing (IoT for SENSE)

The government sector has been one of the first areas in which IoT technologies have been successfully deployed. When we think of IoT in government, we immediately have in mind smart cities' examples with their new waste management systems, innovative parking and traffic solutions, but also environmental monitoring tools. In fact, use cases like Automated Public Transit have been around for years and will continue to feature a pivotal role in smart government in the near future. Public Safety and Emergency Response is another use case that will gain in importance and represent a sizable opportunity in 2020. In this case IoT is used for command and control operations for police, fire, and search and rescue to predict, prevent, and reduce crime, and allocate resources more effectively. The region of Asturias in Spain, for instance, has recently launched a pilot programme to monitor liquid and gas levels through sensors or unmanned aerial vehicles to detect flood, fire, and other risks. As an example, water level variations in rivers, lakes, seas, dams, and reservoirs will help monitor flood risks and trigger automatic emergency alerts. While not particularly important at the time of writing, Environmental Monitoring & Detection and Traffic Control are two additional use cases that will grow in importance by 2020. Environmental monitoring employs meteorological, chemical, biological, radiological, and other sensors to make informed decisions - from stopping or diverting traffic, limiting access to certain geographical areas, or to trigger immediate actions if harmful substances are detected in certain areas. The city of Paris, for example, has recently launched a pilot programme installing sensors in plants and trees located in public parks or streets to optimize maintenance and detect bacteria that can harm the health of trees and grass. In urban areas, the health of trees has implications that go well beyond providing a pleasant view as tree shade makes the environment more livable in very hot days and increases the life of tarmac road surfaces. Research indicates that 20% tree shade limit pavement surface deterioration by 11% or 30% resurfacing cost savings over 30 years. Traffic control, on the other hand, uses sensors deployed on roads, railways, bridges and transport infrastructures to communicate with citizens, motorists and passengers and send alerts in case of collisions, traffic jams, and propose alternatives. The cities of Cologne in Germany and Eindhoven in the Netherlands have recently started two traffic control pilot projects. C2-SENSE Preliminary positioning. At M24 C2-SENSE will deliver first concrete solutions in WP3 and WP4 while a preliminary positioning and SWOT analysis performed vs. the “IoT for SENSE” solutions will follow at M30 when WP5 integrated platforms will be available. As IDC report is underlying, Public Safety Emergency Response and Environmental Monitoring and Detection processes will remain at the highest priority levels in Smart Gov / Environment domain, so the potential of integrated (WP5) C2-SENSE solutions remains confirmed and will drive our exploitation plans. However, owing to the not exciting positioning of Smart Gov / Environment in the two dimensional diagram (CAGR% and market Growth) presented, we plan to open an IoT-oriented technological cross-domain exploitation path derived from WP3 and WP4 results and targeting other application domains which use the same technological foundation as our domain, with special focus on Open Source solutions and Open Platforms.

Page 20: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 20/104

Figure 5 – IDC report - Priorities

Page 21: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 21/104

1.6.2 ICT solutions for Digitizing and Interoperating PA & Government (ICT for C2)

Government organizations are realizing that they must not only deal with the coming Big Data deluge but also make sense of the data in all aspects of information and services delivery — from reducing operational costs to enhancing mission efficiency and delivering new and innovative citizen services — all the while preventing fraud, waste, and abuse. IDC observes that the data-driven revolution is starting to take hold across all government entities at the national and local levels, not merely in departments and agencies that have missions involving science and research but also through departments that provide national security and public safety, public health, tax collection, and welfare payments. The fundamental challenge for government executives is less about how to capture the information (or even how to store it) but more about how to provide consistency across the entire enterprise, filter through the mass of information to discover the important bits, and then analyze and process data in such a way as to provide insights to proactively optimize, orchestrate, and reinvent services. Governments that want to realize the benefits of digital transformation should treat data as a strategic asset to understand how digital transformation is affecting information management from five points of view: the strategic intent, processes and governance, people competencies and culture, data architecture, and technology infrastructure. Placing new demands on the technology is the need to sift through increasing volumes and variety of data, turn entity-attributes relationship upside down, provision and scale real-time analytics, and deliver insights at the point of decision making. N-tiered event-driven architectures that leverage the power of hybrid cloud for data management will be necessary to decouple data from application logic, use Big Data and analytics to automate decision management, and deliver information and insights to any device (including mobile and wearables) at the right time and location (context) for analysis and decision making. Some government domains will transition more rapidly toward the ""foresight"" information management paradigm. In the IDC worldwide FutureScape study, we predicted that, ""To optimize decision making, by 2020, 50% of BDA investment will focus on citizen service, public health, smart cities, and reducing fraud, waste, and abuse."" Fraud, waste, and abuse will be a particularly urgent priority in the short term. In fact, current economic conditions have caused declining revenue for government entities in many countries and at all levels of government. Governments are realizing that preventing abuse through fraudulent procurements, improper welfare payments, Innovative government executives will increasingly deploy flexible, cloud-based IT architectures to integrate services without the expense and time required to merge organizations. They will forge new relationships, collaborating across traditional boundaries, and breaking through silos to get things done. With cloud computing, government organizations will provision more agile access to up-to-date contextual information. Cloud coupled with analytics can transform government entities by providing real-time information to decision makers, regardless of their locations or functional roles, enabling optimal mission delivery. Decision makers are developing more sophisticated uses of analytics and cloud to improve operational economics and citizen services and accelerate innovation. In addition to providing scalable processing required for running predictive and security analytics, cloud allows governments to gain insights that can help them manage assets more effectively, make considerable cost savings, and unleash asset efficiency. C2-SENSE Preliminary positioning. At M24 C2-SENSE will deliver first concrete solutions in WP3 and WP4 while a preliminary positioning and SWOT analysis performed vs. the “IoT for C2” solutions will follow at M30 when WP5 integrated platforms will be available. At that time, C2 state-of-the-art Interoperability solutions will be compared with C2-SENSE profiles and our positioning vs. competition more clear and evidenced. In terms of impact, we must however consider that this part of the C2-SENSE solution will probably need more time in order to properly fill the gap between Research and Innovation and reach the market.

Page 22: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 22/104

1.7 C2SENSE Exploitable Assets

In parallel with the achievements about IPR management of single elementary assets reported in D8.5, this D8.1 has tried to cluster such results in homogenous groups which could drive our exploitation considerations:

a. A Methodological / Technological Consultancy Package will allow C2-SENSE partners to approach the target market of Public Administrations and other bodies engaged in the governance and management of emergencies and crises situations. Awareness of needs, challenges and requirements as well as evidence of how C2-SENSE was able to solve it are the key Unique Selling Points of this value Proposition. A first release of C2-SENSE deliverables in WP2 has already started the process of populating this package now at M18. This package is practically the C2-SENSE business card which needs to be carefully complemented by the results and benefits achieved during our experimentation (see bullet d.) and by proper dissemination and communication means, such as leaflets, brochures, posters and multimedia material;

b. An Open Source ICT Package will form the horizontal platform on which to build specific Emergency management solutions. This OS platform will complement and extend existing larger scale OSS initiatives such as FIWARE community and foundation (www.fiware.org recently formed during the Mobile World Congress and counting thousands of developers) and IOT Open Platform repository (http://open-platforms.eu/). First components and tools of this package will be identified and extracted from WP3 and WP4 deliverables starting from M24. The exploitation strategy of these OS components is to make them integral part of bigger OS initiatives and to create a broad ecosystem of developers around them. For instance, in FIWARE we already had in Phase I the project Safecity1 and a very interesting use case about emergency management in the tunnel joining Arlanda airport and Stockholm. We already preliminarily contacted some of the Safecity partners (e.g. Telecom Italia, AIT, VTT, Everis) to check how C2-SENSE open source solutions available from M24 could extend the current portfolio of FIWARE components in this domain. Regarding instead the IOT Open Platform community (preliminarily contacted through ISMB Turin who is leading the ALMANAC project and the Cluster Activity Chain #3 about pilots), we already have cases related to explosives and hazardous gases management as well as Earthquake and Landslides prevention and emergency management. As soon as C2-SENSE will deliver its OS WP34 and WP4 results we will go in depth with our contact with this community.

c. A C2-SENSE ICT Solutions Package will form the vertical part of our ICT results and include as background several proprietary tools and components brought by our beneficiaries. This package will be the ICT backbone of our Value Proposition to PAs and C2 centres and will be available in first release at M24 with the WP3 and WP4 deliverables (see point b. above). Different business models will be operated according to the exploitation models of the C2-SENSE ICT solution providers (e.g. SRDC, LUTECH, REGOLA, SAGEM) which are now preliminarily sketched in the individual exploitation plan sections. Cloud-enabled aaS models seem however the most suitable way to attract a large number of Emergency Management practitioners without heavy investments in infrastructure and ICT licenses.

d. A C2-SENSE Pilot Showcase Package will form our leading-by-example Value proposition. In this package, just preliminarily sketched at M18 in WP7 and finalised at M36 with the final field experimentations and lessons learned, we will collect all the material necessary to give evidence of the tangible and intangible positive effects derived from the adoption of C2-SENSE. A well-founded generalisation method will be developed in order to be able to estimate social and business benefits in other domains and contexts than those addressed by our Apulian experimentation. In this respect, it is of fundamental relevance to be in touch with users’ communities starting from the Countries represented by C2-SENSE partners: France (North-West EU) Italy (South-West EU) Turkey (South-East EU) Poland (East EU) Austria (Central EU) and expanding them to other EU Countries.

In the following schema we have represented the four main packages in different colours with their basic deliverables and availability time. All the details about the composition of these packages and the IPR issues related to them are being fully addressed in D8.5. Once that IPR agreements are established among the 1 http://cordis.europa.eu/fp7/ict/netinnovation/deliverables/safecity/safecity-final-report.pdf

Page 23: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 23/104

owners of background and foreground in D8.5 final release (the process is obviously still ongoing and depending on the effective effort put by the partners for the release of the relevant deliverables especially those after M24), we will be fully ready to unleash our joint exploitation plans and promote our Joint Exploitation Packages. For the moment, we are now just able to describe individual exploitations, derived from direct contributions of our partners to the overall C2-SENSE solution. METHODOLOGICAL PACKAGE (METH) NAME DESCRIPTION SOURCE AVAILABILITY LICENSE B Model

METH ASSET #1 (MA.1) Technological State-of-the-Art and

Reference Architecture for SENSE +

C2 ICT solutions

This asset is the technological and

architactural basis for a C2-SENSE

Consultancy about how to develop a SENSE

+ C2 ICT solution

WP2 deliverables D2.1 and D2.3 M8 Knowledge Assets

(Creative Commons?)

Business Consultancy

(hours of consultancy)

METH ASSET #2 (MA.2) Requirements Engineering

Methodology for SENSE + C2 ICT

solutions

This asset is the applicative and domain-

specific basis for a consultancy in the

adoption of a SENSE + C2 ICT System

WP2 D2.2 scenarios and

requirements elicitation; D5.3

Validation Methods and kPIs;

D6.1 D6.2 testing methods and

tools; D6.4 Certification methods

M18 (first) M36

(final)

Knowledge Assets

(Creative Commons?)

Business Consultancy

(hours of consultancy)

ICT OPEN SOURCE PACKAGE (ICT OSS) NAME DESCRIPTION SOURCE AVAILABILITY LICENSE B Model

OSS ASSET #1 (OSS.1) SENSE IoT Open Platform This asset is the OSS part of the C2-SENSE

IoT architecture implemented in WP3

WP3 D3.2 D3.3 D3.4 D3.5 Physical,

Protocol, Data, Information,

Knowledge Vertical

Interoperability

M24 Various OSS (see D8.5

for details and

compatibility)

Open Source Business

Models to be defined

OSS ASSET #2 (OSS.2) C2 Interoperability Open Platform This asset is the OSS part of the C2-SENSE

Interoperability architecture implemented

in WP4

WP4 D4.1 D4.2 Strategy and

Alignment of procedures and

processes, Horizontal

Interoperability

M24 Various OSS (see D8.5

for details and

compatibility)

Open Source Business

Models to be defined

ICT C2-SENSE PACKAGE (ICT C2-SENS) NAME DESCRIPTION SOURCE AVAILABILITY LICENSE B Model

C2-SENS ASSET #2 (C2-SENS.1) SENSE IoT Proprietary Platform This asset is the Proprietary part of the C2-

SENSE IoT architecture implemented in

WP3

WP3 D3.2 D3.3 D3.4 D3.5 Physical,

Protocol, Data, Information,

Knowledge Vertical

Interoperability

M24 Proprietary to be

defined

License+maintenance,

subscription, aaS

C2-SENS ASSET #1 (C2-SENS.2) C2 Interoperability Proprietary

Platform

This asset is the Proprietary part of the C2-

SENSE Interoperability architecture

implemented in WP4

WP4 D4.1 D4.2 Strategy and

Alignment of procedures and

processes, Horizontal

Interoperability

M24 Proprietary to be

defined

License+maintenance,

subscription, aaS

C2-SENS ASSET #3 (C2-SENS.3) C2SENSE Integrated Solution This asset integrates proprietary and open

C2-SENSE assets into an overall integrated

solution ready to be exploited and

replicated in other cases

WP5 - D5.1 and D5.2 integrated

solutions

M30 Proprietary to be

defined

License+maintenance,

subscription, aaS

PILOT PLATFORMS and EXPERIENCES NAME DESCRIPTION SOURCE AVAILABILITY LICENSE B Model

PILOT ASSET #1 (PILOT.1) Pilot requirements lifecycle

management, scenarios, validation

In the C2-SENSE pilot, this exploitable

assets include the experiences, lessons

learned, guidelines for expansion and

replication

WP7 - D7.1 , D7.4 and D7.5; WP5 -

D5.4

M18 (first) M36

(final)

Confidential body of

knowledge and public

lessons learned and

communication

material

Extension and replication

of the current experiment

in similar adjacent

domains. Pilot Project

PILOT ASSET #2 (PILOT.2) Pilot Design of the ICT system,

Deployment and Adoption

In the C2-SENSE pilot, this exploitable

assets include the customisation of the

integrated solution (C2-SENS.3) for the

Apulian Pilot

WP7 - D7.2; D7.3 M18 (first) M36

(final)

Confidential ICT

integrated system

including proprietary

pilot's knowledge and

models

Extension and replication

of the current experiment

in similar adjacent

domains. Pilot Project

Figure 6 – Exploitable Assets

Page 24: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 24/104

1.8 Joint and Individual Exploitations

Here following the contributions to the Exploitation Plan, both jointly and individually, from all the Consortium Partners.

Page 25: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 25/104

1.8.1 Joint Exploitation – All the Partners

During the Consortium Meeting in Warsaw (Poland) – 25-26th Jun 2015 we have shared a first approach to the Exploitation Activities. In particular, the Partners have shared 2 main approaches: - First 2 years after the end of the Project (1st Apr 2017- 31st Mar 2019):

� the Partners will manage with a case-by-case approach, in order to understand if the market really needs the C2-SENSE Framework, and see which are the sound an real opportunities for the C2-SENSE Framework.

- After the first 2 years after the end of the Project (starting 1st Apr 2019):

� the Consortium will evaluate the results of the previous 2 years, in order to understand if to proceed with the same case-by-case approach or with a different one (i.e. the opportunities have become more consistent and frequent: the constitution of a stable company could be considered and evaluated).

These 2 proposals have to be further investigated in the next meetings of the Exploitation Team. In particular, some feedbacks are expected to share during the next meeting in Milan (Italy) – 12-14th Oct 2015 (to be hold). During conf calls held in Sept 2015 with some of the Partners, some draft feedbacks have come out:

- SAGEM: they have to talk internally with the Top Managers, in order to understand if ther are any internal obstacles to proceed with these proposals, and, in case there are any, which could be these obstacles.

- AIT: they’re quite positive with the proposals, even if also themselves they have to talk internally with the Top Managers.

Page 26: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 26/104

1.8.2 Individual Exploitation - Sagem Défense Sécurité (SAGEM)

Sagem will plan and perform activities to exploit issues addressed by the C2-SENSE project: - Technical results will directly be exploited and integrated in on-going projects: area wireless sensor

networking, defense C4I programs (related to NEC warfare), civilian protection programs and security application (for example equipment for first responders); software modules will be integrated to develop interoperable solutions in these areas.

- Extension for new products and new markets, such as area sensor networks, UAV/UGV sensor

management, as well as unattended ground surveillance systems will be considered; - Finally, as interoperability is one of the key factors for future competitive industry, participation in

standardization activities in this area will be considered. Standardization may include Software Defined Network and 5G.

Page 27: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 27/104

1.8.3 Individual Exploitation - Lutech SpA (Lutech)

1.8.3.1 Existing and New Customers

The R&D areas covered by the C2-SENSE project (specifically interoperability, standard based information representation and transmission, information automatic processing and manipulation, inter-organizations processes automation) are at the core of the business of ICT players like Lutech. These R&D areas will increase their relevance and criticality in the near future on all the market segments in which Lutech operates and, in particular, for the Lutech Security & IT Governance Competence Center, the Industry Trade & Services, and the Public Administration units. Security & IT Governance Competence Center unit counts over 15 years of experience and a portfolio of over 120 Case Histories, mainly concerning Tier-1 Clients. The approach is based on a Security Risk Management Framework that identifies the best cost-benefit countermeasures, compared to Reference Architecture and the Security Life Cycle model. The operating approach, ongoing investments in R&D and Cyber Threat Research, product engineering and differentiating services, and Technology Scouting converge to enable the Security Competence Center to provide Clients with an avant-garde vision that can guide Security Innovation investments and oversee Security Operations. This Competence expresses this value with a team of over 50 Certified Security Professionals and alliances with Business & Technology Partner leaders in the following areas:

� CONSULTING • Business Impact Analysis, Compliance & Risk Assessment • Business Continuity, Security Policy & Strategy, Security Metrics • Ethical Hacking & Security Audit • Forensics & Intelligence • Compromise & Response Readiness Assessment • SOC / CERT Advisory

� SOLUTIONS • Infrastructure Security • Data Protection • Application Security • Endpoint & Mobile Security • Security Monitoring, Analysis & Response • Identity & Access Governance

� SERVICES R&D by Security Lab • Security Governance as a Service • Security Awareness Services (anti-phishing, anti-leakage, etc.) • Threat Management Services • Breach Detection & Incident Response (TMS/BDIR) • Cyber Threat Intelligence & Fraud Management (TMS/CTI) • Vulnerability Management as a Service (TMS/VuMaaS) • Security Incident Recovery & Digital Investigation

L-TMS (Lutech – Threat Management System) is a proprietary platform: an innovative module of Breach Detection, Intelligence & Response, currently operating on many customers, that is the result of the R&D of the Lutech’s Security Competence Center. C2-SENSE will exploit this asset, and vice versa the C2-SENSE ESB (Enterprise Service Bus) will allow further improvements of the L-TMS itself. In particular, in the Security & IT Governance area (namely: cybercrimes), interoperability and correlation of information is becoming more and more king, since cyberattacks are evolving and transforming in multifaceted formats, previously unknown. In order to prevent and/or manage and mitigate as much as possible these situations, having different tools intercommunicating among each other is fundamental to immediately react from the very beginning of the attack, to contain the damage. C2-SENSE will use as a background L-TMS (Lutech – threat Management System): this will allow to further improve L-TMS itself, enlarging its core engine to an area of application (i.e. Emergency Management) that is contiguous to the

Page 28: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 28/104

core one (i.e. Logical Security), in order to improve the Consultancy Services we already provide to our main existing customers (e.g. major Italian banks,…). In the Industry Trade & Services, more and more companies have multiple systems (sometimes even legacy ones) in place that do not talk each other and exchange information and data in an easy and straightforward way. To improve this interconnection among various and disparate systems, C2-SENSE framework can be leveraged. Public Administrations more and more strive to streamline the costs related to dispersed and heterogeneous systems. The potential customers towards whom Lutech will expand its offering exploiting C2-SENSE Framework are: - Public Sector: e.g. Regione Lazio, Azienda Sanitaria Unica Marche, Istituto Superiore di Sanità,

Ministero Ambiente,…. - Hospitals: e.g. IEO, HUMANITAS… - Emergency Entities: e.g. Civil Protection - Regione Puglia, Civil Protection – Regione Sicilia,…. Public

Entities supporting population during critical situations, Fire Brigade,… - Utilities: e.g. ENEL, ENI, AEEGSI,…. C2-SENSE, therefore, constitutes for Lutech not only a significant project from which to gather solutions and technologies for improving its offer, but also the possibility to expand its offering even toward new customers (e.g. Civil Protection - Regione Puglia,…) or outside its traditional market segments. In particular, Lutech plans to leverage its investments in C2-SENSE by adapting or integrating the software components developed within the project within its middleware components and solutions. The knowledge developed working with the highly qualified partners of the project (in particular REGOLA, AIT, SRDC and INNOVA), and the developed solutions, will generate a significant growth of the Lutech competitiveness on the market.

1.8.3.2 Ecosystem of emergency players

One of the ways to exploit C2-SENSE is to create an ecosystem of players active in the emergency market (e.g. SIA srl - Società d'Informatica Avanzata srl providing rugged devices for harsh environments,…), in order to leverage the full stack of communications in emergency scenarios.

1.8.3.3 Collaboration with Universities

The collaboration liaisons established thanks to the C2-SENSE project, both with the project’s partners as well as with other R&D projects and R&D communities, will provide to Lutech the opportunity of contacts with new ideas, technologies and methodologies, and of new R&D activities and businesses. The exploitation activities are strictly related to the ones of the dissemination and represent the next step with respect to the dissemination activities: this step is therefore necessary to promote the main relevant results in order to transfer the C2-SENSE outcomes to the market. The collaboration between Lutech and some Italian and foreign universities (i.e. Politecnico Milano, Università Statale di Pavia, Università Statale di Milano,….) will be another channel used in the exploitation activities: working and partnering with Universities has always been a major topic for Lutech. Lutech believes that covering the gap between official and standardized education (i.e. Universities) and the business market (i.e. Private Companies) can foster the improvement of the market overall, since universities are the source of strength in the knowledge-based economy. To cover the gap, it’s necessary to create and manage activities of mutual interest (e.g. hackathons, workshops, Company premises visits, talks with SMEs,...), in order to engage students and drive their attention towards the future entities in which the student will bring their added value, through these extracurricular activities.

Page 29: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 29/104

One of these activities are the so-called “Career-Day” Event (e.g. Career Day - Politecnico di Milano, Porte aperte alle imprese – Career Day Università Statale di Pavia, ICT Career Day – Career Day dell’Università Statale di Milano,…), an annual great chance to meet and get in touch with talented, enterprising future workforce, that are more and more eager of finding companies where constant innovation in product and service development is king: so, the choice of their future company can be more informed.

1.8.3.4 LUTECH - C2-SENS ASSET #2 (C2-SENS.1)

C2-SENSE will expose the functionality of already existing emergency systems and applications by wrapping and exposing them as semantically enriched Web Services using Web service protocols for the protocol level interoperability. In many fields of emergency applications there are a lot of legacy applications provided from a lot of different organizations, that rely on their own protocols for exchanging messages, this could be trivial for coordinating operations during a crisis. Thanks to C2-SENSE it will be possible to introduce a layer for standardizing and for sharing information, a focal element in this architecture is the message broker Apache Kafka. Another fundamental component of this layer are the Data Integrators also developed by Lutech, that is in charge to receive, convert and send messages that are in a not compliant format. Those components with others constitute the Enterprise Service Bus and the Messaging and Communication Platform in C2-SENSE. Apache Kafka, which is a message broker that has a lot of characteristic that are very useful in an emergency scenario like the speed, the durability, the availability and the scalability of its infrastructure. It will support the translation of the communication in different protocols like for example: HTTP, FTP, REST, SOAP, JSON, DCOM, CORBA... Lutech has many different customers could use the depicted technologies in different sectors. Thanks to the result of this task, Lutech will also able to integrate them in its projects like L-TMS and wHospital.

1.8.3.5 LUTECH - OSS ASSET #1 (OSS.1)

Apache Kafka is an open source component distributed with the Apache License 2.0.: due to that, the software development done on the base of Apache Kafka will be Open Source, and in this way exploited accordingly (towards SENSE IoT solutions), even if for the time being the licensing model has not been defined yet.

1.8.3.6 LUTECH - C2-SENS ASSET #1 (C2-SENS.2)

One of the main targets of C2-SENSE is to have an Aligned Procedures and Operations layer used to make familiar each emergency partner with each other’s processes and to align their operations. In this layer, the concept of profiling is fundamental. Profiling Approach is an analysis to clarify actors and their peculiarities, actions, relationship about entities and interactions involved in a specific context. Profiling is typically executed progressively at various levels and profiles of each level provide a more detailed vision of the general context. A profile can describe an actor (for example an end-user) and its interactions with other actors. The profiles are coded in a machine-readable format that specific software can interpret and execute to support interactions that profiles represent. It is important to have an engine that is in charge to execute those profiles. Lutech will develop a Profile Execution Engine that has as a main task to execute profiles. In this layer it is also fundamental the negotiation of the Service Level Agreement, that are a formal contract regarding services within different organizations. The process of negotiation will be supported by the SLA Negotiation Tools developed by Lutech. Lutech developed a lot of projects based on profiles’ execution (BPMN) through the support of strong partnerships with the main firms of Workflow Management World. Also thanks to the expertise matured with C2-SENSE in Profile and in SLA negotiation, Lutech will apply the results to its customers to increase market effectiveness.

1.8.3.7 LUTECH - OSS ASSET #2 (OSS.2)

Apache Kafka is an open source component distributed with the Apache License 2.0.: due to that, the software development done on the base of Apache Kafka will be Open Source, and in this way exploited

Page 30: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 30/104

accordingly (towards C2 Interoperability architectures), even if for the time being the licensing model has not been defined yet.

1.8.3.8 LUTECH - C2-SENS ASSET #3 (C2-SENS.3)

After the implementation of the software components, it will be necessary to consolidate all the parts in an integrated system. The term "integration" refers to a software development activity in which separate software components are combined into a whole. All the developer partners will develop their components using previously defined interfaces based on well accepted standards. Lutech will use its experience, gained in many years, to support the integration of all the parts. Furthermore, it will facilitate the integration providing software like Maven, that it has an Apache License. Lutech will also provide a repository with SVN, for collecting the different version of the software parts. It will create the architecture for combining all the produced software because it has itself a lot of experience in software integrations. It is one of the main Italian players, in fact most of its projects are the integration of different software provided by different vendors and organization.

Page 31: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 31/104

1.8.4 Individual Exploitation - Austrian Institute of Tec hnology GmbH (AIT)

Internally the C2-SENSE project will enhance the development of AIT technologies in the field of integration of Sensor Technology (also related to Sensor Web Enablement and Semantic Web Technologies), which are focused on crisis and disaster management, into a new direction building on new findings of C2-SENSE framework. C2-SENSE will enhance our tools and technologies through the possibility of interoperability and evaluation providing a better understanding of them. This will relate to better market and business opportunities for AITs but enables also other customers to improve their products in the same way as we do. This means further that externally, the enhancement of our systems will positively influence our market leadership in Austria as the combination of our systems with C2-SENSE brings added value to our customers (mainly authorities, who will have to work cross-administration borders) and will bring up new customers from other domains. AIT is a strategic research partner having a strong link to the market especially to regional, national governments as well as to mayor Austrian Cities. AIT has a strong interest to exploit its research developments to regional and national governments as well as to provide enabling technology to SMEs in Austria. AIT intends to strengthen their actual business and foster its future ones mainly through the following activities: • Preparedness for upcoming technologies by participation in the C2-SENSE and other research projects • Commercialization of C2-SENSE (technology) • Consulting for decision makers using C2-SENSE results • Resource integrator for C2-SENSE • Enhance AIT’s scientific reputation through conferences and papers • Apply C2-SENSE results to the AIT customers to increase market effectiveness (e.g. performance, cost reductions, enabling technology)

1.8.4.1 National, Regional Government and Major Austrian Cities

AIT intends to invite decision makers from Regional Governments (e.g. provincial environmental agencies in Upper Austria, Lower Austria, Burgenland, etc.) to a workshop and present the overall results of C2-Sense. A: Especially AIT will demonstrate to them the tools developed in C2-Sense facilitating collaboration as well as sensor protocol adapter and enhancements of ANYSen, which is of special interests to them related to the fact that all of them are engaged in environmental monitoring issues and have to connect different devices in their monitoring networks.

On national level contacts will be established with / Brochures / Workshop-Invitations will be sent to:

Umweltbundesamt (Austrian Environmental Protection Agency): Jürgen Schneider (Head of Sales) and Günter Pfaff (IT-Solutions)

On Regional Level contacts will be established with / Brochures / Workshop-Invitations will be sent to:

Province of Upper Austria (Environmental Protection Agency / Dept. Air Monitoring): Elisabeth Danninger Province of Lower Austria (Environmental Protection Agency / Dept. Air Monitoring): Elisabeth Scheicher Province of Burgenland (Environmental Protection Agency / Dept. Air Quality Monitoring): Franz Bauer

B: AIT will also exploit the tools developed in C2-Sense facilitating collaboration related to the management and decision making process in crises situation by introducing the Emergency Maps Tool and the underlying repository to:

Page 32: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 32/104

Representatives of the Ministry of Interior, Federal Ministry of Defense and the Research Department of Landesverteitigungsakademie (Vienna) C: AIT will also exploit C2-Sense results to related civil protection organizations of major cities in Austria: For example for the

City of Vienna, Magistrat 68 (https://www.wien.gv.at/menschen/sicherheit/feuerwehr/katastrophenschutz/) which is responsible for FireBrigades and Civil Protection (e.g. related to floods, storms, heavy rainfalls, etc.) but also to associated Organizations coordinating a multitude of Organizations (the “K-Kreis” http://www.diehelferwiens.at/k-kreis/ i.e. a platform for organizations cooperating in cases of Crises and Disasters) https://www.wien.gv.at/menschen/sicherheit/feuerwehr/katastrophenschutz/

1.8.4.2 C2 ASSET #3 (C2.3) - Interoperability - Maps Knowledge - Frequentis AG

Frequentis AG is a leading provider of command and control centre solutions for the police, ambulance and fire & rescue services. AIT is cooperation with Frequentis in different projects. AIT will invite Frequentis for a knowledge exchange and introduce the C2-Sense framework and results. AIT will ask for collaboration on joint marketing of C2-Sense Emergency Maps Tool. Contact: Christian Falchberger

1.8.4.3 Christian Hassmann – Enviornmental Monitoring

(http://www.hassmann-cc.com/) Hassmann Company is planning, installing, extending, maintaining, operating and integrating existing installations into a regional, national or international monitoring network(s) is always done within with a close study and in close co-operation the client. AIT in cooperating with Hassmann in Indonesia. AIT will have the possibility to exploit C2-Sense as a whole but also only selective C2-Sense tools into the east-Asia region. AIT will contact Hassmann to examine together exploitation possibilities and markets related to the objectives of C2-Sense in Asia.

1.8.4.4 Other research project #1 - EPISECC

EPISECC (https://www.episecc.eu/). EPISECC is a Collaborative Project which will “Establish a Pan-European Information Space to Enhance seCurity of Citizens”.

In short: C2-Sense motivation for collaboration and information exchange are the very similar topics addressed in EPISECC related to Interoperability, as formulated in the objectives of EPISECC (see section “Coordination with other Projects).

1.8.4.5 C2 ASSET #3 (C2.3) - Interoperability - Maps Knowledge

The EMT (Emergency Maps Tool) is built in a modular way and also as stand-alone module, which can be easily adapted to the end-users needs. It provides relevant information in one application to allow a proper decision making on a crises event. It provides a quick overview about all actual incoming and outgoing messages as well as various measurement values (of different sensor types).

Currently it is only as prototype available but AIT intends to provide it beyond the project as a front end for decision making in the crises and disaster management field, collaborating with the above mentioned SMEs but also with C2-Sense partners if needs arise. The development of EMT was solely done by AIT.

Page 33: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 33/104

1.8.4.6 Commercialisation #2 (Sensor Protocol Adapter)

Sensor integration belongs to the core business of AIT. The sensor protocol adapter allow to connect sensor (various types: from air, water, soil, meteo and others) into a monitoring and decision making system. In C2-Sense the so-called AnySen will be used to connect ad-hoc sensors into the C2-Sense framework. This adapter supports various protocols for different sensors as mentioned before it is suitable for various environmental domains. It has already a high Technology Readiness Level so a commercialization could start early after the project ends.

The development of EMT was solely done by AIT.

1.8.4.7 SENS ASSET #3 (SENS.3) - Interoperability - OOI Knowledge

The Object of Interest (OOI) database is tightly connected to the EMT and stores all information relevant to be displayed in the EMT, i.e. all resources integrated in the framework, which are all messages (including alarms) sent over the C2-Sense system as well as all measurement values (from sensor) relevant for decision making.

The development of EMT was solely done by AIT.

1.8.4.8 Consulting for decision makers #1 (Red Cross)

AIT has a long connection to the Red Cross and collaborated in some national security projects, related to crowd sourcing and –tasking as well as volunteer management in Austria. Thus we have a well-established connection to the Austrian Red Cross, especially to the chief-commander of Austria Gerry Foitik.

AIT will introduce to the Austrian Red Cross the Emergency Maps Tool for decision making and provide pro-actively consulting assistance.

1.8.4.9 Consulting for decision makers #2 (Landeswarnzentralen/Fire Brigades)

AIT has connection to the Landeswarnzentralen including FireBrigades in the Provinces and in cities like the City of Vienna. Some of them involved as project partners in other EC funded projects, where also AIT is partner. For example Landeswarnzentrale of Styria (in the INKA a national security project) project. Contact point (in Styria): Günter Hohenberger

AIT will introduce to the Landeswarnzentralen (and related organizations) in different Austrian Provinces the principles of decision making related to the Emergency Maps Tool in a Command and Control environment and if needed provide consulting assistance for the integration of resources.

1.8.4.10 Resource integrator

Generally spoken, AIT acts as integrator and provides knowledge to external resource integrators when needed (externally or internal).

But related to C2-Sense AIT will provide knowledge gained through the course of the project to system integrators and/or end-users related to local and dedicated resource integration, which means integration of e.g. remote or legacy systems, sensors, or senor networks, maps, information, reports, messages into the framework of C2-Sense or directly into the Decision Support tool (i.e. EMT and the Object of Interest (OOI) Database).

Page 34: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 34/104

1.8.5 Individual Exploitation - Software Research, Development and Consultancy Ltd. (SRDC)

SRDC already has a customer base in Turkey including State Planning Organization, Turkish Coast Guards, the Ministry of Health (MoH), Revenue Administration of Turkey, the Ministry of Finance (MoF) thanks to its extensive Research and Technical Development (RTD) work on the interoperability solutions. C2-SENSE project will give SRDC the opportunity to extend its customer base thanks to the tools and profiles to be developed during the project life-time. C2-SENSE project will give SRDC the prospect to enhance its technology base by developing a profile definition tool (PDT) which will enable standardization organizations to develop, update, manage and maintain profiles in an easier way in Web environment. In this regard, SRDC aims to sell the tool to related standardization organizations. SRDC is already member CEN (European Committee for Standardization) and one of the contributors of Business Interoperability Interfaces Profiles (CEN BII profiles). Currently, CEN BII profiles are only presented in Word documents. SRDC foresees that it will be much easier to make further updates on CEN BII profiles through PDT. In addition, SRDC has already made its application to become a member of OASIS (Advancing open standards for the information society) Emergency Management Committee, where SRDC will present the defined Emergency Interoperability Profiles within the scope of standardization activities. Similar application will be made to OGC (Open Geospatial Consortium). SRDC aims to follow the same business strategy in exploiting PDT in OASIS and OGC as well after the Emergency Interoperability Profiles will get accepted by these bodies. SRDC will also intensify its exploitation strategy towards certification and testing of emergency management systems. In this respect, SRDC will improve the market of its TestBATN™ conformance and interoperability testing tool. SRDC has already used TestBATN in eHealth domain successfully. After necessary certification mechanisms are generated in WP6, these will be presented to standardization organizations mentioned above. If accepted, SRDC aims to get fee per test case. In this regard, SRDC will create necessary business models (as 100 EUR for registration and 5 EUR for each test case) in the final phase of the project. One of the main responsibilities of SRDC in C2-SENSE project is to provide information interoperability for emergency organizations. SRDC provides the solution by introducing a Semantic Interoperability Suite, where SRDC extends its SemanticMDR (Semantic Metadata Registry) Tool to C2-SENSE purposes. Semantic MDR is a web-based metadata management and data modelling tool to create and maintain common data models collaboratively either based on imported standard content models or from scratch. In C2-SENSE it will be extended and used as part of Semantic Interoperability Suite in order to enable organizations that do not conform to any content model standard specified in Emergency Interoperability Profiles to exchange data with other organizations. SRDC has already signed a contract with Turkish State Meteorological Service (TSMS) for the use of its Semantic Interoperability Suite by TSMS to first collect all the information inside TSMS in a flexible data model and then make them conformant to or interoperable with world-wide used content model standards. Furthermore, SRDC has been informed that Republic of Turkey Prime Ministry Disaster & Emergency Management Authority (AFAD) will go out to tender to gather all the emergency management systems in Turkey under a single roof. SRDC will make a bid for this tender which exactly desires the Semantic Interoperability Suite of C2-SENSE. C2-SENSE will assure that applications follow standard interface specifications as described through the profiles addressing all levels of the interoperability stack so that the standalone systems can interoperate without tedious integration efforts constitute good marketing opportunities for SRDC for the exploiting the project results where the main target organization is Turkish Coast Guards which is already a customer of SRDC. SRDC aims to exploit sensor related profiles to Turkish Coast Guards for the standard based interoperability of command and control systems with sensors deployed on the field. In this regard, set of meetings will be arranged with Turkish Coast Guards Operations Command after implementation phase of C2-SENSE is finished.

Page 35: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 35/104

The successful implementations to be realized in C2-SENSE will be the basis of the successful expansion of the company into other areas including interoperability solutions in the emergency management. In fact, the positive results of C2-SENSE and possibly with other parallel research results like those coming from SRDC R&D programs may provide sustainable advantage to SRDC with respect to other competitors on the emergency and security market and the market positioning of SRDC products could be much improved and possibly placed in areas where SRDC can be on the leading edge.

Page 36: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 36/104

1.8.6 Individual Exploitation - Servizio Protezione Civile Regione Puglia (RegionePuglia)

The relevance of the C2-SENSE project for the Apulian Regional Civil Protection Service is self-evident. Advanced ICT solutions able to support this subject both in managing emergency situations and, in particular, in improving its capability to cooperate and interoperate with other subjects. In particular, Technical specifications of the C2-SENSE project will be used as a base for procurements for other European Project funding.

Page 37: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 37/104

1.8.7 Individual Exploitation - InnovaPuglia SpA (InnovaPuglia)

Due to the institutional role InnovaPuglia has in providing ICT solutions to Apulian public administrations and operators as well as in assuring their connectivity and interoperability toward national agencies and administrations, the C2-SENSE project has specific relevance for assessing and evaluate new technologies and solutions that can, at the same time, increase the InnovaPuglia knowhow and contribute to improve their systems and services, in particular for the ones devoted to support the Protezione Civile regional department and the regional health subjects (118 Emergency Centre, reginal Health System and structures, etc.). InnovaPuglia, therefore, plans to improve the already implemented services with new functionalities arising from the research activities carried out on interoperability frameworks for mission-oriented security systems, especially for features related to the use of international standards for information management in emergency situations and for interoperability services. To this end InnovaPuglia will pay particular attention on, and be involved in, both the definition of standard-based interoperability profiles and operating procedures based on novel technological solutions, guidelines and recommendations, as well as in their validation in a real world context. To the periodically organized emergency drills held in the Apulia region will provide useful input and a relevant test bed for the C2-SENSE project and will enable InnovaPuglia, with the other regional operative subjects involved in the project (e.g. Protezione Civile Regione Puglia) to acquire all relevant information for an exploitation of the project results within its ICT solutions and infrastructure.

1.8.7.1 Collaboration with regional Fire Department

InnovaPuglia has started a collaboration with regional Fire Department to share its exchange knowledge in term of interfacing ad information sharing with Regional Fire Department. Collaboration was promoted jointly by Marco Di Ciano, Agostino Palmitessa and the regional directorate of Fire Department. A first formal technical discussion started with the participation of InnovaPuglia as invited auditor to the international CAP workshops https://www.wmo.int/pages/prog/amp/pwsp/CAP_WKshop_2015_en.htm

Figure 7 – CAP workshop audience

which was followed by successive confcalls with the technical managers of the regional Fire Department. Following the due assessments was assessed positively the possibility of exchanging exchange knowledge with Regional Fire Department in order to allow the exchange of information relating to emergency situations in the course to allow interaction between the information system of the department and C2- SENSE system by the use of the CAP protocol.

Page 38: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 38/104

Figure 8 – CAP workshop speaker

Page 39: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 39/104

1.8.8 Individual Exploitation - Industrial Research Insti tute for Automation and Measurements (PIAP)

PIAP will promote results of C2-SENSE towards Polish ICT services in national and regional level to support their implementation. The institute will use the technological results gained as a baseline for further research and PIAP will increase the specific multimodal urban transport domain knowledge, to be exploited in cooperation with Civil Protection Institutions in Poland. The exploitation type differs on the achieved research result and on the exploitation activity. Some of activities could use direct technical improvements and usually have a direct impact within a short time frame, while others influence research results with a long term impact on the further research directions and networking community to derive strategic guidelines. PIAP is an industrial partner, hence it exploits technical improvements internally. A company uses the acquired know-how to shorten turn-around times from the project results to produce new version, for example to reduce time–to-market and improve its business position or to outperform competitors through the quality of immediately forthcoming new products. PIAP focusing its exploitation activities on improving their current operation and position in existing markets, and on the creation of and preparation for new markets, with the intention to obtain a leadership position. PIAP main role will be maintenance and support of developed communication network infrastructure and networked devices under physical layer. Moreover, though its role in implementation of C2-SENSE acquired technology and knowledge will be used for enhancing and extending existing product portfolio.

1.8.8.1 Further research #1 - Division of Hydrology and Water Resources, Warsaw University of Life Sciences – SGGW and Warsaw University of Technology

Complementary to activities written above PIAP will exploit project results among the scientific community through different curriculum programmes namely: 1. Warsaw University of Technology (WUT) at Mechatronics Faculty – by performing student’s evaluation of the system capabilities and engaging them in contribution in testing the developed system. This will be done under “Intelligent Measurement Devices” – a new course in the Electronic Measurement Systems specialization on engineering degree. During this course students gain comprehensive skills: knowledge about the intelligent sensors, measurements devices and systems operation rules. 2. Warsaw University of Life Sciences. Division of Hydrology and Water Resources - by performing student’s evaluation of the system capabilities and engaging them in contribution in testing the developed system. This will be done under environmental engineering curriculum programme. Results of C2-SENSE project in academic community and academic partners will continue to gain increased visibility and improve research of teaching processes. This academic exploitation of strategic guidelines, naturally, has a longer time horizon. The future research agenda will be prepared based on the results achieved by C2-SENSE, and potential problems that have to be solved will be identified, in order to strengthen the project impact. The long run result of the efforts of the academic partners will be to promote the approaches project results in the mainstream of teaching in areas of electronic measurements and environmental engineering in higher education environment.

Page 40: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 40/104

1.8.9 Individual Exploitation - REGOLA S.r.l (REGOLA)

Regola is a producer of C2 System mainly focused on the Emergency Medical Response but it is growing towards the management of critical domain like Fire, Police and civil protection. These fields were object of minor product development but nowadays Regola is ready to take deal with this important domains. Our market is mainly European and Italian specifically but is going to be worldwide thanks to strong partnership with USA and Austrian company. Interoperability it’s an important challenge for us. Every customer has specific and complex needs that require a proper answer. C2Sense is a project with several categories of outcomes, and, according to the Regola’s vision, the most important ones are those listed below:

• The KnowHow: it’s possible to extend the DOW analysis identifying several area of interest:

• KnowHow from the real user of the Pilot application: The C2Sense Pilot application is a great opportunity for Regola to improve the knowledge on the Civil Protection Field. The C2Sense Pilot application is a complex application mainly build on the civil protection world

• Integration profile : The integration profile approach in Emergency is something new in IT literature. The integration profile approach is extremely powerful (we know and use IHE integration profile) and it’s the correct approach to design complex integration solution among different organization/system. Regola will re-use this approach in implementing the new solution to the customer worldwide.

• KnowHow from the organizations: the harmonization activity of WP 4 it’s a great opportunity to study and learn many procedural and organizational aspects. This specific knowhow will be used by Regola to increase the awareness of the domain where its product are sold and used.

• The partnership: The project is a great opportunity for a PMI like Regola to meet new partner for

future collaborations with research centers like AIT, SRDC or PIAP. Typically, it’s quite hard for a PMI to have contacts with such reality, for this reason this point is a worth Regola will exploit in the future with B2B meeting.

• The technology: C2Sense consortium will produce a set of tools that are able to ease the problem of the technical interoperability among organizations. These project outcomes can be successfully applied in all the Regola’s client perspectives as a standard-based platform to enhance communication and cooperation of field operators and the operative organizations. Ensuring permanent communication among all operative central’s systems

Detailed exploitation action per outcome and typology:

Outcome Exploitation strategy Know-How • Internal Training: The C2Sense project approach of the ‘integration profile’ into

the emergency domain will be object of internal training to all SW and Solution Architect.

• New Product Requirement. A the end of the project will be produced the list of the application requirement Regola will implement on one or more product. This new requirement will be shared also with InnovaPuglia and Regione Puglia The requirement will be inserted in the product roadmap2.

• Participation to new call of H2020 project where C2Sense outcome can be reused and extended.

Partnership • Regola will try to have private initiative with other partner in order to

2 This is an extension of the DOW exploitation descripting (page 111) where it’s written that Regola will enhance his product only with the technology to acquire sensor data.

Page 41: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 41/104

investigate for future collaboration. Knowhow reuse, reselling or commercial partnership are possibility that will be interesting to analyze.

Technology Regola will evaluate if the tool developed by the C2Sense consortium can be used on the client in respect of their needs and budget. The outcome of the project will be illustrated to our largest client that are: 118 Piemonte, EMS Lithuania.

1.8.9.1 New H2020 EU project

Regola participated to the submission of a H2020 project call:

Call: H2020-DRS-2015 Type of action: IA Topic : DRS-01-2015

The project title is ‘RACE NOW’ and the Leading partner is UBIMET. Regola is involved for the integration layer necessary to connect all the C2System involved and the sensor network. C2Sense project is directly referenced. ‘RACE NOW’ project will contribute to extend the C2Sense project as well as the C2Sense outcome will be re-used and improved into the project RACE-NOW. In this new project Regola will reference SRDC, in subcontracting, which is particularly skilled on integration profile. The project was submitted to EU commission in august 2015 with proposal number: 700273

1.8.9.2 Partnership

At the moment the following initiative are planned

• Private meeting with AIT in order to find new business idea. The meeting is planned of the 4/2/2016 • Regola asked SRDC a participation in subcontracting to participate a new EU project Call (see

detail) • Private meeting with Lutech in order to share experience, project, products

1.8.9.3 Training to our client

In order to show the project result the intention of Regola is to have two specific training sessions with our biggest clients which are : - 118 Piemonte : is the emergency medical Dispatch of Regione Piemonte (Italy):

http://www.sis118.it/regioni/piemonte.htm

- EMS Lithuania: http://greitojipagalba.lt/

This training will be near the end of the project in order to show to the clients a consolidated and tested set of tool and technology.

Page 42: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 42/104

2 DISSEMINATION

2.1 Dissemination Approach

Dissemination goal is to raise awareness (especially in the first period of the project) about the approach and the results of the project as well as to prepare the ground for the exploitation (especially in the second period of the project) of C2-SENSE results. It will seek synergies with other initiatives and will establish cooperation links with them. The dissemination plans will define the consortium strategy and the list of actions for disseminating the project results and will ensure wide dissemination of research and practical outcomes to related standards bodies, research communities and the industry. Dissemination activities performed within Task 8.2 span over the whole duration of the project. This document covers all dissemination activities that are planned for the first reporting period (M1-M18). The main objective in this period was to promote project results. In parallel we will continue to increase the visibility and impact of the C2-SENSE research community at both European and global level through scientific publications at top conferences and in journals, promotion and organization of workshops, conferences, events involving industry and special issues in journals. WP8 integrates specific dissemination activities using C2-SENSE web site as the main dissemination channel. In this chapter, we present dissemination activities that are planned for C2-SENSE. These actions scale from the pure technical ones, like presentation of papers in conferences and journals, to social networks, such as a Facebook C2-SENSE group. In the next sections, achieved and planned activities are described in detail, and are followed by presentation of dissemination achievements in 1st period of the project. The dissemination of the C2-SENSE project concepts and results in the 1st period of the project was active and diverse. In the 2nd period, this activity will continue, becoming even richer, as the project is maturing and several tangible outcomes will be delivered. C2-SENSE project dissemination aims to promote project outputs to both industrial and emergency domain sector, deploying vertical dissemination plan. In addition C2-SENSE website, social network dissemination and newsletters will be used throughout the whole duration of the project. However, in time, as the project activities go along and as the project outputs emerge, dissemination activities will focus on more formal publications such as journals, conferences and industrial events. To properly define a Dissemination Plan, it’s necessary to define:

- Dissemination Strategy - Dissemination Team (DT) - Dissemination Flowchart (DF) - Dissemination Sheet (DSHEET) - Dissemination Stakeholders (DS) - Dissemination Channels & Tools & Materials (DCTM)

Page 43: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 43/104

2.2 Dissemination Strategy

Communication activities include all actions that will help to disseminate the project’s results beyond the consortium and the direct stakeholders, maximizing in such a way the project’s contribution to industry innovation and research and attracting a wide range of stakeholders that are invited to embrace and benefit from the C2-SENSE advancements. In this direction, the project has started to:

1. identify the target audiences and stakeholders and define concrete and measurable objectives for each such group

2. implement a solid, modern and inclusive communication strategy, accompanied by a realistic plan to reach the above mentioned objectives

3. set up the different channels, tools and mechanisms that will be used to implement the communication plan and reach the targeted audiences

4. closely monitor the impact of the communication in order to be able to apply corrective actions whenever necessary and identify opportunities that can maximize visibility.

Even though the project’s activities are more oriented towards organisations, it is essential to include also the general public into the communication loop, especially as the outcomes of the project are foreseen to impact Citizens as well, thus going beyond the research communities.

Page 44: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 44/104

2.3 Dissemination Team (DT)

The Dissemination Team will comprise Dissemination Manager that will collect and consolidate all the contributions from Dissemination Owners

Table 2 – Dissemination Team (DT)

Dissemination Team (DT) Participant number Participant short name Resource name Resource Role

7 PIAP Jan Piwinski, Roman Szewczyk Dissemination Manager

1 SAGEM Francois GENDRY Dissemination Owner 2 LUTECH Raul Arisi Dissemination Owner 3 AIT Gerald Schimak Dissemination Owner 4 SRDC Mert Gencturk Dissemination Owner 5 REGIONE PUGLIA Pierluigi Loiacono Dissemination Owner 6 INNOVA PUGLIA Marco Di Ciano Dissemination Owner 7 PIAP Jan Piwinski, Roman Szewczyk Dissemination Owner

8 REGOLA Biagio Lanziani Dissemination Owner The members of the Team have been identified from the very beginnning. In particular, the Dissemination Manager has been identified from the DoW and confirmed during the very first meeting of the Consoritum, the KOM (Kick Off Meeting) held in Paris (France) on 13th 14th May 2014. All the Partners have been required to identify the Dissemination Owners during the KOM (Kick Off Meeting) held in Paris in 13-14 May 2014. All the Partners have made their proposals during the Consortium Meeting held in Valenzano (Italy) on 15th Oct 2014, and they’ve finally been confirmed via email by 31st Oct 2014. There is only one Dissemination Owner per partner, who talks to the Dissemination Manager, in order to have a coherent flow of information. That is: Dissemination Owner is the only contact point inside the partner that collects internally all the information to pass to the Dissemination Manager. The Dissemination Team require all the members to meet during every Consortium Meeting, in order to update the Dissemination Sheet (DSHEET), share the updates with all the othe members, collect feedbacks and eventually plan additional activities. The meetings during which the Dissemination Team has met are:

- Conf calls with every Partner during Nov 2014 - Ankara (Turkey) 26th March 2015 - Warsaw (Poland) – 25-26th Jun 2015 - Milan (Italy) – 12-14th Oct 2015 (to be hold) - Brussels (Belgium) – 15th Dec 2015 (to be hold)

Page 45: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 45/104

2.4 Dissemination Flowchart (DT)

The Dissemination Owners in every partner are in charge of collecting all the contributions, suggestions, directives that, related to the main vision and strategy of the partner, they consider worth doing as a dissemination activity. The Dissemination Owners collects all the contributions in the Dissemination Sheet (DSHEET) and pass it to the Dissemination Manager. The Dissemination Manager consolidates all the contributions in a larger and more comprehensive Consolidated Dissemination Sheet (CDSHEET), that will be presented to the Project Officer by the Project Coordinator.

Figure 9 – Dissemination Sheet (DSHEET)

Page 46: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 46/104

2.5 Dissemination Sheet (DSHEET)

The Dissemination Owners collects all the contributions in the Dissemination Sheet (DSHEET). Here following an example of a possible working DSHEET:

Figure 10 – Dissemination Sheet (DSHEET)

Here following the main sections of the DSHEET:

- Owner o It’s to be filled with the information regarding the main focal point of the Partner in charge

of collecting all the contributions internal to the Partner - Activity details

o It’s the label, description and some additional info of the atomic item to decide upon. o The “Name” column is the short description of the activity. o The “Description” column should list the extensive description of that particular activity.

- Partners involved o Here all the involved Partners should be highlighted.

- Target o It’s used to describe in a more quantitative way (if possible) the target of the activity.

- Supporting Materials o If any supporting material is planned to be used, list it here.

- Supporting Tools o If any supporting tool is planned to be used, list it here.

- Activity Purpose o It’s the goal of the activity.

- Activity Type o It’s the category of the activity.

- Activity Audience o It’s the target audience of the activity.

For the current Dissemination Sheet: please see Annex II - Dissemination Sheet. From this working sheet, a more summarized and actionable table is extracted and detailed in the following sections.

Page 47: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 47/104

2.6 Dissemination Stakeholders (DS)

As identified above, the first step towards developing a successful and sustainable communication plan is identifying the audience and setting out the objectives that should be met in order to maximize the project's exposure and provide a fertile ground for the use of the project's results. In this context, the potential target groups of the audience of the c2-SENSE project, have been initially identified in the following table:

Table 3 – Dissemination Stakeholders (DS)

Target Group Description Interest in the project

A – C2 Emergency

Mgmt Organizations

Players belonging to Public Administrations, Civil Protection, Law Enforcement Agencies but also entrepreneurs, operating in the smart city domain (service developers, city operators & telco operators)and in the IT sector

• Utilization of project's results in everyday operations

• Enhance ICT driven innovation via blending with in-house artefact and existing platforms.

B –IOT FI & 5G PPP

Programmes Stakeholders

Participants, project partners and relevant stakeholders active in the IOT-5G-FI European projects (both from FP7 and H2020)

• Identification of common topics • Synergies and collaborations for results

promotion • Enhancing innovation through results

combination

C – Smart Cities & Telecom/IoT Stakeholders

Smart cities networks and communities, regions and initiatives (like European Innovation Partnership on Smart Cities and Communities, FIWARE Open and Agile Smart Cities (OASC), ICLEI, ERRIN, EUROCITIES), City officers

• Exploitation of results to promote sustainability and social innovation

• Synergies and collaborations with Smart Factories in their territory

• Dissemination of project's results to other Smart Cities / their members

D - Technology Clusters

European initiatives and clusters (like IERC, FIWARE, BDV PPP Digital Business Innovation, FIRE, Digital Agenda, Innovation Union), research communities, associations, federations (like AIOTI, NetWorks, US IGNITE, IMS, EFFRA, IFIP, IEEE…)

• Inclusion of project's results to collaborative research activities (roadmap, white papers…)

• Dissemination of project's results to their members

• Participation in project's events for knowledge exchange

E – Entrepreneurs,

Software Engineers

Software designers and developers of solutions for Emergency Management / Crisis Management / Smart Cities

• Participation in hackathons and project's competitions and events

• Inspiration for new ideas and applications in a Smart City / Emergency Mgmt context

F - Researchers and Academics

Researchers and academics working in universities, research centres, R&D departments of PAs

• Advancing research post-project • Training personnel & students • Porting results to real-life industry cases

through the re-use of results

G - Policy Makers

Policy-makers at any level like EC Directorates and Units, Ministries and Governments, Regulatory Agencies, Standardization Organizations (CEN, ISO, ETSI, 3GPP, etc.)

• Evaluation of the project's Social-Technological-Economic-Environmental-Political (STEEP) aspects

• Definition of future research and innovation directions based on project's acquired knowledge

• Input for standardization activities

H - General Public

General public and anyone interested in the project

• Understand and influence the future applications in the C2-SENSE domains.

• Participate in hackathons and project's competitions and events

• Understand the current research and

Page 48: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 48/104

innovation activities and the benefits offered by C2-SENSE

Page 49: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 49/104

2.7 Dissemination Channels & Tools & Materials (DCTM)

The communication measures, which have been identified and considered, are tightly coupled with the different dissemination activities, and are presented in the table below, which provides also the expected impact of each measure, the target audience and a tentative schedule for the delivery of these methods and also for their utilization. It has to be noted that during the first period of the project, activities will focus on the creating awareness by presenting the project to main communities, using conventional measures such as flyers, posters, etc., Web2.0 channels such as the project’s website, the use of social media channels, etc. and though participation in events where the community is present. As the initial results will be available, the utilization of the aforementioned measures will be focused more on the communication of these results, while the consortium will promote these events though participation in industry fairs, scientific events (conferences, workshops) and through the organization of dedicated training and demonstration events (webinars, demonstrators, etc.)

Table 4 – Dissemination Channels & Tools & Materials (DCTM)

Measures Description Expected impact Target Audience Usage Span

Project Logo, presentation,

templates.

- A HR professional logo

- Professional Presentation Template for all partners

- Visual identity & branding

- Unified experience for the audience targeted

All Target Audience Groups

Throughout the project

Project Factsheet

- A double sided A4 page - basic project information.

- Instant information about the project

All Target Audience Groups

Updated Throughout the project

Project Website

- A Web2.0 website, providing information about the project, the trials and the results, showcasing project's news and acting as a communication channel with the stakeholder

- Main online information point

- Communication of project news, events results

- Liaisons with other initiative, projects through links

All Target Audience Groups

Updated Throughout the project

Videos & Multimedia

- 1 video presenting the project profile and general concept

- 1 video presenting the project results and their application

- Information pills with focused messages (YouTube target).

- Ad-hoc multimedia material to support presence in booths, fairs and events

- Communicating project’s concept, general info and results in a clear, easy to understand manner

- Attracting the interest of high level stakeholders

- Awareness raising of the general public

All Target Audience Groups

Throughout the project

Newsletters

- Information loaded electronic newsletters - project's status, developments and other events of interest

- Attainment of interest of stakeholders subscribed and website/social media

All Target Audience Groups

Throughout the project -

updated quarterly

External stakeholder

- The external stakeholder

- Engagement of End users and general public to co-

Targets Audience A,

Updated Throughout

Page 50: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 50/104

engagement platforms

engagement and interaction platform – professional social network & e-survey (EvalMaster).

design and co-create performing Smart City-Smart Factory apps

F the project

Social Channels

- 1 Twitter account - information, general domain news and communicating directly with parties #C2-SENSE

- 1 LinkedIn community group to gather all interested stakeholders

- 1 Slideshare account for sharing all presentations www.slideshare.net/C2-SENSE

- 1 YouTube account for hosting the videos & other clips

- Increasing visibility to stakeholders in Web2.0

- Creation of stakeholders’ communities around the project’s concepts

- Viral marketing by spread “word of mouth” through the social followers

- Direct communication mechanism

All Target Audience Groups

Updated Throughout the project

Traditional Communication

Material

- Posters/Banners which will present the project's concept

- Trial specific posters/banners

- Flyers that will contain general project information and ad-hoc information for events

- Improved communication of results and information provision during events

- Strengthening the visual identity of the project

- Ad-hoc diffusion on information based on identified opportunities

All Target Audience Groups

Throughout the project - updated as

needed

Demonstrations, show cases

exhibition stand

- Events where C2-SENSE will demonstrate its results through live demos of the trial use cases

- Attraction of potential clients and adopters

- Attraction of potential future partners for research collaboration

Targets Audience A,

B, C

As appropriate

Page 51: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 51/104

2.8 Communication strategy and target audience

To get in contact with the identified target audiences and reinforce the visibility and recognition of the project, specific communication actions will be defined and responsibilities will be distributed and documented in the project dissemination and exploitation plan, which will be prepared at the beginning of the project. The dissemination manager has the resources for communication management and the required expertise.

Table 5 – Dissemination Objectives

Communication Objectives Objectives' Description

Target Groups A B C D E F G H

COM.Obj. 1 Provide clear view of the project goals and results X X X X X X X X

COM.Obj. 2 Create an active community of potential users and collect knowledge to be taken into account by the project's activities. Consolidate challenges & requirements.

X X X X X X X X

COM.Obj. 3 Prepare the ground for the exploitation of project's results towards the industry. Consolidate business value X X X X

COM.Obj. 4 Create awareness of the project among the full range of potential adopters, users and usages

X X X X X X

COM.Obj. 5 Establish liaisons with other projects and initiatives for knowledge and innovation transfer

X X X X

COM.Obj. 6 Support the dissemination and exploitation of results by formulating adapted key messages, and prepare adapted communication material.

X X X

COM.Obj. 7 Recognition of the results among the research communities, standardization bodies, users, policy-maker institutions.

X X X X X

Additionally, a communication plan with precise measures will be set up in the next few months to support the achievements of the project objectives. To achieve the stated objectives, all the partners commit to undertake the activities that will be defined at the beginning of the project and that will be revised along the project as needed to maximize the expected impact of these activities and well-defined procedures will be set up to ensure the quality of the communication in terms of the form and the content. The communication strategy of the project will assign responsibilities to partners that will participate in these activities, appointing specific partners as representatives of the project to specific communities (according to their domain of expertise and existing liaisons), while other partners will take over activities that have to do with the publication of the project results to various sources.

Page 52: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 52/104

2.9 Internal Dissemination - Internal project website

The internal website has been set up and is used to ensure for all partners proper information availability and visibility of activities’ progression.

2.9.1 Internal project website (Achieved)

It is used as a database and knowledge management tool for gathering knowledge on C2-SENSE related scientific topics, reports, state-of-the-art and outputs of the project, along with any information on specific resources that is available to all the different partners. Access to these materials is restricted to partners of the Consortium and the EC and it is protected by user authentication. This internal website is to be regularly updated with all the information developed during the whole project. AIT is in charge of the hosting and technical maintenance for this internal web site.

Figure 11 – Internal project website

2.9.2 Internal project website (Future developments)

The structure of the internal web site has been proven solid and suitable enough to accomadote all the working needs: i.e. continuous updates on a daily basis with working versions of documents,…. So, for the time being, no major improvements in the structure have been planned: the Partners will proceed just with the updates of the contents.

Page 53: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 53/104

2.10 Internal Dissemination - Internal presentations within Partner’s organization

Besides the external presentations, a number of project partners have also the possibility to disseminate C2-SENSE project results internally within their own organizations. This part of dissemination includes seminars and internal meetings where the most recent project developments are presented in order to obtain a solid basis for exploitation.

2.10.1 Internal presentations within Partner’s organization (Proposed)

15. 2. 2016: AIT-Internal Workshop related to the Emergency Map Tool (EMT) and the Object of Interest (OOI) Repository. EMT is one of the key componenent in C2-Sense collaboration evnronment. Speaker: Peter Kutschera 29. 2. 2016: AIT – Internal Workshop realted to Deploy-R. A method suitable for development of software for limit monitoring in environmental as well as crises and disaster management. Speaker: Refiz Duro

Page 54: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 54/104

2.11 External Dissemination - Public Project website

Project Web site as one of the most important media for dissemination of project’s activities is continuously developed and updated through first period both internal and public dissemination. The C2-SENSE public website presents general project information, scientific publications done during the project, news about the project, events organized and public deliverables. Public documents, made available through this website, can be utilized by third parties to enhance their projects but also give these third parties the possibility to provide feedback and thus further improve results of the project. Up-to-date project news, outcomes, collaboration activities, meetings, progress reports etc. will be available on the web site. The web site will also provide reference point for other publication and dissemination activities. Web site will be updated constantly during the whole project duration.

2.11.1 Public Project website (Current status)

Public web site has a special section for downloading public materials. This site will be kept updated and improved along the project lifetime, adding new content and functionality, under the responsibility of the Coordinator (SAGEM) supported through Dissemination Manager (PIAP) and Website Administrator (AIT). The main contributor in the web site design has been AIT (instead of SAGEM as declared in the DoW, due to technical, security and resources issues at SAGEM site). AIT is also in charge of the hosting, domain registration and technical maintenance for the public web site with partners contributing by providing specific contents related to their specific assignments. Public web site includes public information relevant for the project and useful for dissemination activities. More specifically, information regarding project’s objectives and public deliverable reports as well as the papers from conference proceedings, presented by project’s partners is included. Here following, the home page of the web site:

Figure 12 – C2-SENSE public web site

Page 55: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 55/104

2.11.2 Public Project website (Future developments)

We will continue to update and strengthen the web site on a regular basis. The current activities are already moving in the direction of more aggressive networking and dissemination by including the most widely used social media, first and foremost Facebook and Twitter, but also LinkedIn as a more professionally and scientific oriented media. As is a natural process for a project as is C2-SENSE, its second period will be more marked by concrete results that are more attractive for the public and expert community. Therefore, the audience will see more results in form of publications, reports, graphs and illustrations, all disseminated by the project’s News page, and streamed to social media. A restricted area where to share the most relevant documents with the large public will be created, in order to collect the details of interested audience.

Page 56: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 56/104

2.12 External Dissemination - Publications (Short communications, Journals, Newsletters, Social networks)

In 1st period of the project we continuously update and develop new materials to further present the Consortium and the main objectives and achievements of the project and also to establish an identity of its own to the research program. We plan to use this activity throughout the whole duration of the project in order to offer short, up-to-date information about project progress. We include into the means to disseminate information among the others: short letters, leaflets, newspapers, social networks activities and posters to be presented on expos, conferences etc.. The goal of this activity is to distribute and publish project info and outputs in a concise and short form, available either for electronic or hardcopy distribution. Project results and novelties have been and will be actively submitted for publication in scientific journals, conferences, and workshops relevant to the topic of the research activity carried out during the project. The submission of papers jointly written by project partners is strongly encouraged and will be pursued as much as possible.

2.12.1 Publications - Short communications (Achieved)

2.12.1.1 Flyers

Flyers, as important support material for dissemination at conferences and other venues, are also available on the public website section for download (Annex 3).

2.12.1.2 Posters

A general informative poster of the C2-SENSE has been prepared by the Consortium. This poster is updated and adopted for project presentation at specific occasions (Annex 4).

2.12.2 Publications - Short communications (Future developments)

The Consortium is planning to create various additional alternate formats: - Flyers - Posters - Leaflets - Project Presentations (LONG, SHORT, THREESLIDE, ONESLIDE formats (see ANNEX VI for a mock-

up)) - ….

dedicated to different stakeholders and audiences: - Scientific audience - Business audience - …

Page 57: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 57/104

2.12.3 Publications - Journals (Achieved)

Project aims to publish in top-level journals covering the practices for security and emergency domain as well as computer engineering. Journal publications are planned in matured phases of the project when the state-of-the art and innovative output of the project research activities emerge: so, as of 30th Sept 2015, no journal publications have been achieved.

Page 58: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 58/104

2.12.4 Publications - Journals (Proposed)

Event name Date Venue Description

Springer Book Spring 2016

This book focuses on the outcome of the C2-SENSE project presented through the scientific-technical contributions and aims to be available to a wide scientific community. This book provides information about the project structure and different activities around the project. Book will be indexed in the Springer Web of Science

Journal: Environmental Modeling &

Software

2016 “Validation of Semantic Time Series Processing in Climate Change and Human Health”, by Bojan Bozic, Refiz Duro et al.

Journal Name Impact Factor Frequency Short Aims and Scope

Journal of Contingencies and Crisis Management

0.568 quarterly

The Journal of Contingencies and Crisis Management is an invaluable source of information on all aspects of contingency planning, scenario analysis and crisis management in both corporate and public sectors. It focuses on the opportunities and threats facing organizations and presents analysis and case studies of crisis prevention, crisis planning, recovery and turnaround management. With contributions from world-wide sources including corporations, governmental agencies, think tanks and influential academics, this publication provides a vital platform for the exchange of strategic and operational experience, information and knowledge

Journal of Flood Risk Management

1.119 annual

Journal of Flood Risk Management provides an international platform for knowledge sharing in all areas related to flood risk. Its explicit aim is to disseminate ideas across the range of disciplines where flood related research is carried out and it provides content ranging from leading edge academic papers to applied content with the practitioner in mind. Readers and authors come from a wide background and include hydrologists, meteorologists, geographers, geomorphologists, conservationists, civil engineers, social scientists, policy makers, insurers and practitioners. They share an interest in managing the complex interactions between the many skills and disciplines that underpin the management of flood risk across the world.

Software and Systems Modeling

1.408 quarterly Software and System Modeling (SoSyM) is a quarterly international journal that focuses

Page 59: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 59/104

on theoretical and practical issues in the development and application of software and system modeling languages, techniques, and methods, such as the Unified Modeling Language. The aim of SoSyM is to publish high-quality works that further understanding of the theoretical underpinnings of modeling languages and techniques, present rigorous analyses of modeling experiences, and present scalable modeling techniques and processes that facilitate rigorous and economic development of software. SoSyM is unique in its emphasis on theoretical foundations of modeling languages and techniques and on rigorous analysis of "real-world" modeling experiences. The balance of theoretical and experience-based works provides insights that can lead to better modeling languages and techniques. In addition, modeling practitioners can gain a deeper understanding of languages and techniques that can lead to more effective applications.

International Journal of Emergency Management

quarterly

IJEM provides a refereed international forum bringing the latest research to bear on the issues involved, with a focus on contingencies and emergencies as well as crisis and disaster management and planning.

Journal of Homeland Security and Emergency Management

0.481 quarterly

JHSEM is an online journal that publishes original, innovative, and timely articles describing and assessing research and practice in the fields of homeland security and emergency management

International Journal of Technology Management

0.49 Monthly

IJTM aims to provide a refereed and authoritative source of information in the field of managing with technology, and the management of engineering, science and technology. It seeks to establish channels of communication between government departments, technology executives in industry, commerce and related business, and academic experts in the field.

Page 60: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 60/104

2.12.5 Publications - Newsletters (Achieved)

As declared in the DoW, the Partners have agreed on a draft format of the newsletter as following:

Figure 13 - Newsletter

comprising 3 main sections: - Highlights: dedicated to subjects of particular interest and/or relevance to C2-SENSE - News: dedicated to the most recent news to dissemination to the General Public. - Events: dedicated to the most recent and/or near-future planes events during which the Consortium will

disseminate the C2-SENSE Project.

2.12.6 Publications - Newsletters (Proposed)

The Consortium has agreed on monitoring the feedbacks we will receive from the audience, and we will update accordingly the newsletter format.

Page 61: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 61/104

2.12.7 Publications - Social Networks (Achieved)

We will create the following social channels in the next coming months: - Facebook: https://www.facebook.com/c2sense/

here following a potential mock-up:

Figure 14 – Facebook mock-up

- Twitter: https://twitter.com/c2_sense

here following a potential mock-up:

Figure 15 - Twitter mock-up

- YouTube: https://www.youtube.com/channel/

here following a potential mock-up:

Figure 16 - YouTube mock-up

All the Partners agree on using their own social channels to amplify the message coming from C2-SENSE channels, and vice versa. Some of the Partners (i.e. Regione Puglia) will further investigate their chance to use social channels, since there are constraints related to the fact that Regione Puglia is a public entity, and may use social channels for communications to the general public just during real emergency situations.

Page 62: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 62/104

2.12.8 Publications - Social Networks (Future developments)

After the creation of the above mentioned social channels, also the following will be taken in to consideration: - WikiPedia page - LinkedIN account - SlideShare channel

Page 63: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 63/104

2.12.9 Coordination with other research projects (Achieved)

Special care will be taken in the transfer of C2-SENSE results to other European collaborative projects. This will be mainly done through FP7/H2020 events, collaborations and scientific networks.

2.12.10 Coordination with other research projects (Proposed)

EPISECC (https://www.episecc.eu/). EPISECC is a Collaborative Project which will “Establish a Pan-European Information Space to Enhance seCurity of Citizens”. In short: C2-Sense motivations for collaboration and information exchange are the very similar topics addressed in EPISECC related to Interoperability, as formulated in the objectives of EPISECC: e.g. The project EPISECC is aiming at developing a concept of a common “European Information Space”. This information space is dedicated to become the key element in a future integrated pan-European crisis and disaster response capacity. Besides the development of a common Taxonomy and an ontology model, aimed at addressing the Semantic Interoperability issue, EPISECC will focus on the establishment of Interoperability at Physical (i.e. network) and Syntactical (i.e. automated information exchange) levels. One of the main purposes of the EPISECC approach is to allow analysis of interoperability at all levels.” Thus both projects expressed their will to exchange its knowledge related to the various layers of the interoperability stack as well as their standardization activities and semantic interoperability issues. Note: EPISECC is co-financed from the EU funds under grant agreement no. 607078 within the Seventh Framework Programme.

Page 64: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 64/104

2.13 External Dissemination – Events (Conferences, Workshops)

In this chapter we present dissemination activities related to publishing articles at conferences and journals (Achieved and Proposed). The goal of this activity is to raise the awareness of this project in the scientific and security community throughout the world. Conferences will be used to cover the big-picture project outputs and specific focused impacts of project findings.

2.13.1 Events - Conferences (Achieved)

Here following the list of the Conference where Partners have been present:

Table 6 – Conference (Achieved)

Par

tner

Nam

e

Uni

que

ID

Des

crip

tion

Yea

r

Dat

e: F

rom

Dat

e: T

o

Loca

tion

Cou

ntry

Web

Site

LUTECH + SRDC + INNOVA

IWEI 2015 C2-SENSE-1

6th International IFIP Working Conference on Enterprise Interoperability (every 2 years) 2015

27 May 2015 29 May 2015 Nimes FRANCE http://iwei2015.mines-ales.fr/

LUTECH

Sicurezza per la Pubblica Amministrazione LUT-2

Lutech’s offering in Healthcare and Security & IT Governance 2015 6 July 2015 6 July 2015

Valenzano (BA) ITALY

http://www.tecnopolispst.it/news.asp?opzione=2&idnews=93

AIT + INNOVA iiWAS C2-SENSE-2

A Social Networking Platform for Semantic Time Series Processing 2014 4-dec-14 6-dec-14 Hanoi VIETNAM

http://www.iiwas.org/conferences/iiwas2014/home

AIT OGC AIT-1 OGC Technical Committee 2015

9 March

2015 13 March

2015 Barcelona SPAIN http://www.opengeospatial.org/event/1503tc

AIT GWF AIT-2 7th GWF - INSPIRE-GWF-2015 2015 25-may-15 29-may-15 Lisbon PORTUGAL

http://geospatialworldforum.org/

AIT + SRDC

ISESS 2015 C2-SENSE-3

International Symposium on Environmental Software Systems 2015 25-mar-15 27-mar-15 Melbourne Australia http://www.isess2015.org/index.php

Page 65: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 65/104

2.13.1.1 C2-SENSE-1 - 6th International IFIP Working Conference on Enterprise Interoperability (IWEI 2015)

Goal: The IWEI series of conferences aim at identifying and discussing challenges and solutions with respect to enterprise interoperability, both at the business and the technical level. Website: All the information about this conference can be found on the official web site: http://iwei2015.mines-ales.fr/

Figure 17 – IWEI - web site

Paper: The presented paper was titled:

Figure 18 – IWEI - paper

Paper was written by: • Mert Genkturk, Yildiray Kabak (SRDC) • Raul Arisi, Lorenzo Toscano (Lutech) • Marco Di Ciano, Agostino Palmitessa (InnovaPuglia)

The workshop, during which the paper was presented, was titled:

Page 66: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 66/104

Figure 19 – IWEI - workshop title

Speaker: In particular, the speaker was Raul Arisi (LUTECH):

Figure 20 – IWEI - speaker

presenting to an audience of several entities/communities:

Figure 21 – IWEI - audience

Interested outputs: There were several researchers interested in the project, and in particular among others: - Iosif Alver,s (DSS, lab, NTUA) - Mikel Uriarte (Nextel) - A.Gonzales (Innovalia Association) - Klaus Fischer (DFKI)

Page 67: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 67/104

2.13.1.2 LUT-2 - Lutech’s offering in Healthcare and Security & IT Governance

Goal: Presentation of Lutech Company (Overview, Offering in HealthCare and Security) to the Puglia market, in order to provide support to local Customers, with a particular focus on Security (Safety Emergency Management (C2-SENSE)) and HealthCare. Website: All the information about this conference can be found on the official web site:

http://www.tecnopolispst.it/news.asp?opzione=2&idnews=93

Figure 22 – Workshop web site

The presented slides were:

…..

Figure 23 – Workshop slides

The workshop’s agenda was:

Figure 24 – Workshop agenda

In particular, the speaker was Francesco Faenzi (LUTECH), presenting to an audience of Public entitites.

Page 68: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 68/104

2.13.1.3 C2-SENSE-2 - 16th International Conference on Information Integration and Web-based Applications & Services

All the information about this conference can be found on the official web site:

http://www.iiwas.org/conferences/iiwas2014/

Figure 25 – IIWAS - web site

The presented paper was titled: A Social Networking Platform for Semantic Time Series Processing; Authors: Bojan Bozic, Werner Miniwarter, Marco DiCiano; Austrian Institute of Technology, University of Vienna, InnovaPuglia S.p.A.; Austria, Italy

Page 69: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 69/104

Figure 26 – IIWAS - paper

The conference session, during which the paper was presented, was titled: iiWAS Session 4; Social Network, Profiling and Recommendation II

Figure 27 – IIWAS - slide

In particular, the speaker was Bojan Bozic (AIT)

presenting to an audience of several entities/communities:

Approx. 30 participants from the fields of semantic web, data engineering, social media platform

development, web development, and other similar areas. There were several researchers interested in the project, and in particular among others:

• Chuan Xiao Nagoya University, Japan • Tim Weninger University of Notre Dame, USA • Anselmo Paiva Federal University of Maranhão, Brazil

Page 70: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 70/104

2.13.1.4 AIT-1 - C2-SENSE Presented at OGC Technical Committee in Barcelona

Goal: Introduction to C2-Sense and awareness raising of the objectives and the ideas about using OGC standards.

Website: All the information about this workshop can be found on the official web site: http://www.opengeospatial.org/event/1503tc

Figure 28 – OGC – web site

Presentation: The powerpoint presentations was titled: C2-SENSE (http://c2-sense.eu/wp-content/uploads/2015/03/2015_Barcelona_Presentation_Refiz_Duro.pdf) The workshop, during which the paper was presented, was titled: 94th OGC Technical Committee Meeting.

Page 71: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 71/104

Figure 29 – OGC – slide

Speaker: In particular, the speaker was Duro Refiz.

Audience: presenting to an audience of several entities/communities: The C2-SENSE project was presented in the Emergency and Disaster Management session (EDM DWG). The EDM DWG provides a forum for uniting communities of users including government agencies, industry, research organizations, non-government organizations and others in various phases of emergency and disaster activities. The audience of ca. 40 (on site and online) persons, included main representatives of the OGC group, among others the Director for European Services of the Open Geospatial Consortium, Athina Trakas. Interested outputs: Since the project was in a phase where the software and framework architecture were being defined, the implementation results could not yet be represented. The audience therefore expressed their interest in the project itself, and the coming results.

Page 72: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 72/104

2.13.1.5 AIT-2 - Geospatial World Forum

All of the information about the conference can be found on the official web site for year 2015:

http://geospatialworldforum.org/2015/index.htm

Figure 30 – GWF – web site

The presented paper was titled: C2-SENSE: The Emergency Interoperability Framework and Knowledge Management Authors: Refiz Duro (AIT), Gerald Schimak (AIT) & C2-SENSE Consortium

Page 73: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 73/104

Figure 31 – GWF – paper

The conference session, during which the paper was presented, was titled: “Urban Resilience and Sustainability”.

Figure 32 – GWF – slide

Page 74: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 74/104

In particular, the speaker was Refiz Duro (AIT):

Figure 33 – GWF – speaker

presenting to an audience of several entities/communities (e.g. Scientific and Research Community related to crises and disaster management, Smart and resiliant cities). The audience included chief police/resilience representatives from Italy and Portugal. Approximatly 40 participants were present in the room. There were several researchers and end-users interested in the project, and in particular among others:

• Athina Trakas, Director for European Services, Open Geospatial Consortium, Germany • Slayer Kuo-Yu Chuang, Co-Founder/CEO of GeoThings, Taiwan, with whom we have continued

cooperation in field of disaster management • Juan Luis Cardoso Santos, GeoWeb Project Manager of Tracasa, Spain

Page 75: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 75/104

2.13.1.6 C2-SENSE-3 - International Symposium on Environmental Software Systems

Goal: ISESS, the International Symposium on Environmental Software Systems, was initiated in 1995 as a forum to present and discuss the fundamentals, progress and actual trends in this area in terms of methods, tools and state-of-the-art environmental informatics applications. Web Site: All the information about this conference can be found on the official web site:

http://www.isess2015.org

Figure 34 – ISESS - web site

Figure 35 – ISESS - agenda

Title of the paper: Requirements Engineering for Semantic Sensors in Crisis and Disaster Management

Page 76: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 76/104

Authors: Bojan Bozic (AIT), Mert Gencturk (SRDC), Refiz Duro (AIT), Yildiray Kabak (SRDC), Gerald Schimak (AIT)

Figure 36 – ISESS - paper

Note: The authors submitted an abstract to ISESS 2015 conference about requirements engeneering approach followed in C2-SENSE project, which has been accepted for presentation and published in the series IFIP Advances in Information and Communication Technology of Springer. The conference session, during which the paper was presented, was titled: Requirements, software engineering and software tools

Page 77: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 77/104

Figure 37 – ISESS - slide

In particular, the speaker was Gerald Schimak (AIT):

Figure 38 – ISESS - audience

presenting to an audience of several entities/communities: Scientific and Research Community related to crises and disaster management incl. audience of the bureau of metorology. Approximatly 40 participants in the room. There were several researchers interested in the project, and in particular among others:

• Robert Argent, Scientist, Bureau of Meteorology, Melbourne • Brian Miles, Research Scientist / Institute for the Environment /University of North Carolina • Kerry Taylor, Principal Research Scientist /Digital Productivity, CSIRO

2.13.1.7 Prof. Jiří Hřebíček, Faculity of Science, Masaryk University, Brno, Czech Republic

Page 78: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 78/104

2.13.2 Events - Conferences (Proposed)

Here following a list of the proposals shared among the Partners:

Conference name Scope

IESA 2016 conference

I-ESA concerns researchers and practitioners in the area of enterprise interoperability: it is a unique forum for the exchange of visions, ideas, research results and industrial experiences, dealing with a wealth of interoperability research subjects for business, enterprise applications and software.

EENA conference

Praga – Apr 2016 The EENA Conference welcomed participants representing emergency services, public authorities, researchers and industry representatives. Emergency services and public authorities representatives joined us from all over Europe http://www.eena.org/events/eena-conference-2016#.Vs2FGfnhBhE

PDC Navigator

Washington - 27/29 – April PDC (Priority Dispatch Corporation) is the leader company of Dispatch software. It organizes every year ‘navigator’ which is an event where all the PDC client and partner participate to share experience into the emergency domain.

Infosecurity Europe 2016 Conference and exhibition event dedicated to new and innovative services and products related to information security.

EDBT/ICDT 2016 Joint Conference 2016 - International Conference on Distributed Computing Engineering

Data Management and Data Centers, Algorithm and Theory, Fault Tolerance and Dependability, Distributed Operating Systems and Middleware, Network/Internet Protocols and Applications, Security and Privacy, Sensor Networks and Ubiquitous Computing

IFSEC INTERNATIONAL 2016

leading Annual Security exhibition that presents products and services in categories such as: CCTV, Access Control, Intruder Alarms, Fire Safety, Integrated Security/IP Networks, Lone Worker, Fire Solutions, Public Security (incorporating physical and counter terror solutions).

Page 79: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 79/104

International Conference on Security and Cryptography (SECRYPT 2016)

SECRYPT is an annual international conference covering research in information and communication security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

The 12th Conference on Availability, Reliability and Security (ARES 2016)

The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.

SBA Research hosts CCS 2016

The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. From its inception, CCS has established itself as a high standard research conference in its area.

ISAF 2016 (Security, Fire, Safety & Health, Smart Homes, IT Security)

ISAF 2016 (Security, Fire, Safety & Health, Smart Homes, IT Security) will be held in Istanbul, Turkey in September 2016 (Not Final).

AGILE 2016 Association of Geographic Information Laboratories in Europe (2016, Finland) with topics as Disaster and Risk Management, Spatial Data Infrastructures: Data and Service Sharing, etc.

iEMSs 2016 8th International Congress on Environmental Modelling and Software in Toulouse, France, on July 10-14, 2016 including also Emergency and Disaster Management Tools and Decision Support Systems. (http://www.iemss.org/sites/iemss2016/)

Page 80: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 80/104

IDRC 2016 6th International Disaster and Risk Conference IDRC Davos 2016 - "Integrative Risk Management - towards resilient societies" 28 August - 01 September 2016. The International Disaster and Risk Conferences IDRC are the world biggest gatherings for integrative disaster risk management.

Event name Date Venue Description

Federated Conference

on Computer Science and Information

Systems

11-14 September. 2016

Gdańsk, Poland

The 2016 Federated Conference on Computer Science and Information Systems cordially invites you to consider contributing an Event (conference, symposium, workshop, consortium meeting, project dissemination meeting, special session, etc.). The FedCSIS multi-conference consists of a significant number of recurring Events. The FedCSIS Events provide a platform for bringing together researchers, practitioners, and academia to present and discuss ideas, challenges, and potential solutions on established or emerging topics related to research and practice in computer science and information systems. Since 2012, Proceedings of the FedCSIS conference are indexed in the Thomson Reuters Web of Science

18th International Conference on Disaster

and Emergency

Management

February 15-16, 2016 Istanbul, Turkey

Conference aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results about all aspects of Disaster and Emergency Management. It also provides the premier interdisciplinary forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in the field of Disaster and Emergency Management.

Forum Pa 05/24-26/2016 Rome

(ITALY)

Every year Apulia Region takes part at this Forum with its own booth with the collaboration of different regional structures. Here it will be possible to distribute brochures and other material to the general public.

Fiera del Levante

September 2016 Bari

(ITALY)

http://www.fieradellevante.it/index.php/it/ Apulia Region will take part to this event with a dedicated booth, so it’s possible to organize workshops and demonstrations of the project and the pilot application.

Summer national

meeting of the Civil

Protection’s volunteer

September 2016 Bari

(ITALY)

Every year, all the Civil Protection volunteers gather together in order to exchange information, taking part into emergency drills. It will be a great opportunity of visibility for the C2-SENSE Project, since there will be entities from all Italian regions.

Page 81: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 81/104

Among the above, the mainly considered ones are:

Table 7 – Conference (Proposed)

Par

tner

Nam

e

Uni

que

ID

Des

crip

tion

Yea

r

Dat

e:

Fro

m

Dat

e: T

o

Loca

tion

Cou

ntry

Web

Site

LUTECH

10° Forum Risk Management in Sanità

LUT-3

Technologies and best practices applied to the security domain in Healthcare 2015

24 November

2015 27 November

2015 Arezzo ITALY http://www.forumriskmanagement.it/

LUTECH

HACKETON UNIMI

LUT-4

Cyber Threat Intelligence, Breach Detection & Incident Response 2015

17 December

2015 17 December

2015 Milan ITALY

http://www.smappo.com/event/565c712f2df56_cyber-threat-intelligence-breach-detection-incident-response-lutech-spa.html

SRDC eChallenges 2015

SRDC-2

25th annual technology research conference 2015 25-nov-15 27-nov-15 Vilnius Lithuania https://www.echallenges.org/e2015/

SRDC I-ESA 2016

SRDC-3

8th International Conference on Interoperability for Enterprise Systems and Applications 2016 29-mar-16 1-apr-16 Guimaraes Portugal http://i-esa.org

Page 82: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 82/104

2.13.2.1 LUT-3 - Forum Risk Management in Sanità

Goal: Presentation of Lutech Company (Overview, Offering) and a good chance to network and disseminate. All the information about this conference can be found on the official web site: http://www.forumriskmanagement.it/index.php/home

Figure 39 – Forum Risk - web site

In particular, LUTECH will distribute the C2-SENSE’s flyer:

Figure 40 – Forum Risk - flyer

In order to collect contacts interested in the project. The main entities we are interested to meet during the event are the following: - Regione Lazio - Azienda Sanitaria Unica Marche - Istituto Superiore di Sanità

Page 83: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 83/104

2.13.2.2 LUT-4 - HACKETON UNIMI - Cyber Threat Intelligence, Breach Detection & Incident Response

Goal: The aim of the hackathon is to present Lutech’s offering to a university-oriented audience, in order to recruit future resources as Lutech’s employees. The hackathon format is particularly suitable for Universities: so, we expect to attract several participants. During the presentation, the speaker will explain C2-SENSE giving an overview of the Project. Website: All the information about this conference can be found on the official web site:

https://www.smappo.com/event/565c712f2df56_cyber-threat-intelligence-breach-detection-incident-response-lutech-spa.html

Figure 41 – HACKETON - web site

The slides to be presented are:

…..

Figure 42 – HACKETON - slides

In particular, the speaker will be Francesco Faenzi (LUTECH).

Page 84: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 84/104

2.13.2.3 SRDC-2 - eChallenges 2015

Goal: eChallenges is the twenty-fifth in a series of annual technology research conferences supported by the European Commission and hosted by national governments. The goals of eChallenges e-2015 are to promote ICT Entrepreneurship and Innovation, facilitate Information Society and Applied ICT related knowledge sharing between government, industry and research stakeholders, raise awareness of the current state of eAdoption in developing countries, stimulate rapid take-up of RTD results by the public and private sectors, and identify opportunities for ICT related research and innovation collaboration under Horizon 2020. Website: All the information about this conference can be found on the official web site:

https://www.echallenges.org/e2015/

Figure 43 – eChalleges - web site

Figure 44 – eChalleges - agenda

Title of the paper: Interoperability Profiles for Disaster Management and Maritime Surveillance Authors: Mert Gencturk (SRDC), Refiz Duro (AIT), Yildiray Kabak (SRDC), Bojan Bozic (AIT), Kubilay Kahveci (SRDC), Burcu Yilmaz Note: The authors submitted an abstract to eChallenges 2015 conference about interoperability profiles developed in C2-SENSE project, which has been accepted for presentation and will be published in the eChallenges 2015 Conference Proceedings in IEEE Xplore.

Page 85: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 85/104

Abstract: Nowadays, many different Command and Control (C2) Systems and Sensor Systems take part in disaster management and maritime surveillance activities. In order to manage disasters effectively and achieve powerful surveillance, it is essential for C2 and Sensor Systems to cooperate and exchange timely available, reliable and intelligible information. Although globally accepted standards are used commonly in C2 and Sensor domains, there is no single specification of using these standards together for cooperation of disparate systems, which creates a crucial interoperability challenge. To address this challenge, profiling is a practical approach to achieve seamless interoperability among C2 and Sensor Systems. In this paper we describe how profiling approach can address the interoperability challenge among C2 and Sensor Systems, and present 13 identified profiles to be used by organizations with their C2 and Sensor Systems in disaster management and maritime surveillance activities. Presentation: The paper will be presented by Mert Gencturk (SRDC).

Figure 45 – eChalleges - paper

Page 86: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 86/104

2.13.2.4 SRDC-3 - I-ESA 2016, 8th International Conference on Interoperability for Enterprise Systems and Applications

Goal: I-ESA brings together the world's leading researchers and practitioners in the area of enterprise interoperability: it is a unique forum for the exchange of visions, ideas, research results and industrial experiences, dealing with a wealth of interoperability research subjects for business, enterprise applications and software Website: All the information about this conference can be found on the official web site:

http://i-esa.org/

Figure 46 – I-ESA – web site

Title of the paper: Automating the Development and Implementation of Interoperability Profiles

Figure 47 – I-ESA – paper

Authors: Mert Gencturk (SRDC), Matteo Redaelli (LUTECH), Yildiray Kabak (SRDC), Gokce Banu Laleci Erturkmen (SRDC), Raul Arisi (LUTECH), Lorenzo Toscano (LUTECH)

Page 87: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 87/104

Note: The authors submitted an abstract to I-ESA 2016 conference about profile definition and specialization tool and profile execution engine developed in C2-SENSE project, which has been accepted for presentation. Abstract: In order to solve the interoperability problem among disparate systems and address the drawbacks and challenges in existing profiling approach, in this paper, an automated way to develop and implement interoperability profiles is introduced. We introduce a collaborative environment where profiles can easily be defined by following some step-by-step guidelines through an online tool and customized to specific organizations and incidences quickly through automatically generated business processes and templates. We also introduce a semantic metadata registry (MDR) concept to amend the content standards, invent a profile definition language (PDL) to represent the profiles digitally, and use Business Process Modeling Notation (BPMN) to define business processes to be executed. Presentation: The paper will be presented by SRDC, even if the Partner and the related speaker have not been finally chosen.

Page 88: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 88/104

2.13.3 Events - Workshops (Achieved)

In this period we prepared both national and international open workshops as the showcase of the project research results. Organizing such open workshops, with a call for papers open to all researchers in the world attracted to the fields covered by C2-SENSE project, we improve project visibility. The goal of this workshop is to inform other parties and wider community about the project’s results and to obtain feedback from these researchers not involved in the project.

Workshop name Date & venue Short Aims and Scope

PIAP meeting with Warsaw University of Life Sciences representatives

August, 30, 2015

C2-SENSE presentation, knowledge acquisition for physical layer architecture and available technologies as well as methodologies in pluvio and river water level measurements domain

Page 89: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 89/104

2.13.3.1 PIAP-1 - Meeting with Warsaw University of Life Sciences representatives.

Date: August, 30, 2015

Goal: Meeting with civil protection experts and potential stakeholders to the C2-SENSE. The meeting was focused on knowledge and experiences presentations of specific experts such as civil engineers who understand issues related to the provision, operation and maintenance of the physical protection systems and critical infrastructure. The main goal of the workshop was C2-SENSE presentation and collection and brainstorm on information provided by the Experts for physical layer architecture and available technologies as well as methodologies in pluvio and river water level measurements domain Three basic types of experts were identified.

- Firstly there are utility specific experts such as civil engineers who understand issues related to the provision, operation and maintenance of the physical underground and critical infrastructure, particularly water.

- Secondly, there are experts regarding information and ICT system matters for the management of public data. This group could include GIS specialists, data base designers and managers, systems

analysts and/or web experts and it’s mandatory that they have a very specific relation with the following sectoral areas: city and underground mapping, design and maintenance of public platforms

containing data/metadata in the field of urban planning, previous activities within public-private utility service.

Thirdly, there are experts in security and disaster response matters. This category may include anti-terrorist specialists, police, risk analysts

Audience: presenting to an audience of several entities/communities: The experts would be drawn from all 27 EU countries and from the following main stakeholder groups:

• National, Regional and/or Local authority engineering personnel responsible for the management and service of underground utilities

• Public or private utility companies, with specific attention to water utilities • Disaster response personnel from various levels of government • Engineering associations/institutes • Representatives of the body responsible for implementation of the INSPIRE Directive • Security establishment personnel • Private companies which supply technologies or services able to locate underground utilities (GIS,

Georadar, etc.) • National mapping and cadastral agencies (public and private).

Page 90: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 90/104

Figure 48 – PIAP – workshop audience

Page 91: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 91/104

2.13.4 Events - Workshops (Proposed)

Workshop name Date & venue Short Aims and Scope

AIT Meeting/Workshop with Austrian Environmental Protections Agency

2016, Austria C2-SENSE in overview and Sensor Protocol Adapter and Sensor Management

AIT Meeting with Austrian Provinces (Environmental Protection Agencies)

2016, Austria C2-SENSE in overview and Sensor Protocol Adapter and Sensor Management

AIT Meeting/Workshop with Representatives of Ministry of Interior

2016, Austria

C2-SENSE facilitating collaboration related to the management and decision making process in crises situation by introducing the Emergency Maps Tool

AIT Meeting/Workshop with Civil Protection Agencies

2016, Austria

C2-SENSE facilitating collaboration related to the management and decision making process in crises situation by introducing the Emergency Maps Tool

AIT Meeting with Red Cross 2016, Austria To introduce to the Austrian Red Cross the Emergency Maps Tool for decision making in a collaborative environment.

AIT Meeting with Landeswarnzentralen (of Austrian Provinces or Cities).

2016, Austria To introduce to the Austrian Red Cross the Emergency Maps Tool for decision making in a collaborative environment.

Page 92: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 92/104

2.13.5 Events - Surveys (Achieved)

In the 1st period of the project work InnovaPuglia has released the questionnaires to gather information and requirements by Organizations involved into emergency management

Questionnaire’s Title Date Short Aims and Scope

Reference scenario and user requirements in territorial emergency management

September-December 2014

Questionnaire is targeted at all entities/organizations involved into emergency situation, to gather all information regarding procedures and requirements to manage emergency situations.

Technical features and user requirements in territorial emergency management

July 2015

Questionnaire is targeted at all local entities/organizations involved into defined pilot scenario, to gather all information about their legacy systems.

Page 93: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 93/104

2.13.5.1 Workshop for C2-SENSE presentation

This meeting take place in the headquarter of InnovaPuglia in Strada Provinciale per Casamassima Km.3, Valenzano (Italy)

Figure 49 – INNOVA – workshop audience

The starting document/study presented was titled C2-SENSE Workshop and Technical Meeting.

Figure 50 – INNOVA – workshop slide

Researcher speakers was Massimiliano Serafino (INNOVAPUGLIA):

Figure 51 – INNOVA – workshop speaker

Page 94: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 94/104

Four different local entities/communities took part the to the workshop Prefecture of Foggia with 2 representatives (available reference name and contacts) Prefecture of Bari with 1 representative (available reference name and contacts) Province of Foggia with 3 representatives (available reference name and contacts) Regional Fire Department with 1 representative (available reference name and contacts) All the C2-SENSE project partners were also rpesent: INNOVAPUGLIA (Marco Di Ciano, Agostino Palmitessa, Massimiliano Serafino) SRDC (Mert Gencturk, Yildiray Ykbak) AIT (Bozic Bojan, Gerald Schimak) Sagem (Jacques Yelloz, Caroline Senzier) REGOLA (Biagio Lanzani) Lutech (Samuele Tonon, Raul Arisi) PIAP (Jan Piwiński) Regione Puglia (Pierluigi Loiacono, Vitantonio Semeraro)

Page 95: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 95/104

2.13.5.2 Innova Puglia Meeting with local authorities and organizations

This meeting take place in the headquarter of Regional Civil Protection (Puglia Region) in Via delle Magnolie n.5, Bari (Italy)

Figure 52 – INNOVA – meeting location

The meeting, was devoted to inform local authorities and start together a working group for use case designing and pilot deployment

Core discussion document were “What’s C2-SENSE – How profiling approach can improve interoperability for emergency management”

Figure 53 – INNOVA – meeting slide

Meeting coordination was in charge of InnovaPuglia (Marco Di Ciano and Agostino Palmitessa)

Page 96: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 96/104

Figure 54 – INNOVA – meeting audience

Sseveral stakeholder were present

• Province of Foggia with 1 representatives (available reference name and contacts) • Civil protection Voluntary department of Foggia with 1 representatives (available reference name

and contacts) • Mayor of municipality Casalnuovo Monterotaro with 3 representatives (available reference name and

contacts) • Regional Fire Department with 3 representatives (available reference name and contacts) • Sanitary Operating Room 118 with 1 representatives (available reference name and contacts)

Figure 55 – INNOVA – meeting attendees

Page 97: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 97/104

2.13.5.3 Questionnaire for requirement gathering

InnovaPuglia prepared a questionnaire entitled “Reference scenario and user requirements in territorial emergency management”

Figure 56 – INNOVA – questionnaire

It covers questions relating to different areas and divided into the following chapters: General information Organizational details - Description of main problems - Issues in the management of emergency operations in the civil protection - Infrastructural technical data - Legislative reference Entities/Organizations who responded:

C.B. Club Mattei Onlus Fano (PU) Italy Associazione Radiantistica Cb Om Alessandria (AL) Italy Associazione volontari Ser Ostuni (BR) Italy Polizia Provinciale della Protezione Civile Bari (BA) Italy Provincia di Foggia Foggia (FG) Italy Prefettura di Foggia Foggia (FG) Italy ANPAS Sociale Grugliasco (To) Italy

PREFETTURA DI BARI Bari (BA) Italy DIREZIONE REGIONALE VIGILI DEL FUOCO PUGLIA

Bari (BA) Italy

CENTRO FUNZIONALE PROTEZIONE CIVILE Bari (BA) Italy SALA OPERATIVA INTEGRATA REGIONALE (SOIR)

Bari (BA) Italy

REPUBLIC OF TURKEY PRIME MINISTRY DISASTER & EMERGENCY MANAGEMENT PRESIDENCY

Ankara Turkey

AUSTRIAN RED CROSS Vienna Austria

Page 98: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 98/104

2.13.5.4 Technical questionnaire

Also a more technical questionnaire was prepared by InnovaPuglia and validated together with all the partners. This second questionnaire is entitled “Technical features and user requirements in territorial emergency management”

Figure 57 – INNOVA – questionnaire

It covers questions relating to technical areas regarding legacy systems of local entities/organizations and interfacing with them In particular entities involved are those interested to take part to Experimentation phase:

Provincia di Foggia Foggia (FG) Italy Regional Fire Department Bari (BA) Italy Regional Civil Protection Bari (BA) Italy Municipality of Torremaggiore Torremaggiore (FG) Italy Operating Center of 118 (Sanitary Emergency) Foggia (FG) Italy

Page 99: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 99/104

3 ANNEX I - EXPLOITATION SHEET

Please refer to the attached Annex I xls file.

Page 100: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 100/104

4 ANNEX II - DISSEMINATION SHEET

Please refer to the attached Annex II xls file.

Page 101: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 101/104

5 ANNEX III - C2-SENSE LOGO

The C2-SENSE logo is comprised of 3 parts:

- Project Icon: � it visually summarizes the concept underneath the entire C2-SENSE Project: the entire world

(the sphere) can be moothly interconnected (the arrows) by the C2-SENSE framework. So it can be easily remembered.

- Project Name: � it’s the name of the project and we’ve chosen the red color because usually it’s commonly

associated to emergency situations (Red Cross, Fire Brigades,…).

- Project Motto: � it’s a short sentence summarizing the essence of the C2-SENSE project.

Based on the above considerations, we have jointly decided as a Consortium to combine these elements and to create the following logo:

Figure 58 – C2-SENSE – LOGO

This logo has to be used in all the documents, presentations, flyers, papers,… related to the C2-SENSE Project.

Page 102: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 102/104

6 ANNEX IV - LUTECH FLYER

Figure 59 – LUTECH - flyer

Page 103: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 103/104

7 ANNEX V - AIT POSTER

Figure 60 – AIT - poster

Page 104: D8.1 – Exploitation and Dissemination Plan (a) · 2.03.2016  · D8.1 – Exploitation and Dissemination Plan (a) –V2. 0 - Page 2/104 Document History: Version Date Changes From

D8.1 – Exploitation and Dissemination Plan (a) –V2.0 - Page 104/104

8 ANNEX VI – PROJECT PRESENTATIONS

Figure 61 – C2-SENSE – ONESLIDE Project Presentation