THE CLEANTECH INVESTOR FORUM 2011 Infrared Applications Inc. Session 1 The Four Seasons Hotel Palo Alto, California March 7 & 8, 2011.

Slides:



Advertisements
Similar presentations
2009 Transition Dynamics Enterprises, Inc. Used with permission. What You Need to Know about the Green Economy Add your name here.
Advertisements

Negotiating the Internet: Equipment and Beyond David Bankowski IT Manager, Electronic Communications 25 July 2008 Insert graphic.
World Class Standards Smart Grids ETSI Strategic Topic Philippe Lucas © ETSI All rights reserved ETSI Smart Grid workshop, June 14th 2010.
1 Copyright 2011 Hero Security & Surveillance, Inc. Mesquite Solar Energy Plant Security & Surveillance Plan By Brian Levy.
1 Energy Efficiency and Iowa Utilities Presentation to the Energy Policy Advisory Forum, convened by Governor-Elect Chet Culver January 4, 2007 Presented.
Market Analysis Learning Unit 3.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
1 Effective, secure and reliable hosted security and continuity solution.
Strategic Business Solutions : Solutions, Strategies, Success The SalesStrat Solution.
M A K E Y O U R N E T W O R K S M A R T E R Video growth despite negative currency effects Year-end summary 2003 Ray Mauritsson, CEO.
Halil SATIK Industrial Engineering Department, Dokuz Eylul University, Turkey.
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
XProtect ® Professional Efficient solutions for mid-sized installations.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Tom Johanson – DNV KEMA Senior Engineer Building Automation Systems.
HSM Security is... “HSM is an nationally recognized integrated security provider, committed to perform excellent service, national.
StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
VSE Corporation Proprietary Information
Your Customer Deserves the Best Copy Number ______.
ISec Next Generation Physical Security System. Physical Security Systems Achilles Heel: False Alarms – Disruptions & incurred costs are prohibitive Present.
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
A Proven Partnership When you look at business partners, you want someone who understands your unique challenges. Mostly, you want someone who can address.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Business plan overview (1)
Chapter 4 Marketing.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
NextEnd. Preparation of Business Plan for Setting up Enterprise Business Plan.. The business plan is a written document prepared by the entrepreneur that.
Working With Databases. Questions to Answer about a Database System What functions the marketing database is expected to perform? What is the initial.
Smart Guard of Your Data Storage EXAGATE monitors, manages and warns for you.
Next Generation Physical Security System Infrared Applications Inc. USA Subsidiary HarmAlarm Trading Co. Ltd. Hong Kong Private Co.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Problem Identification – Part 1 Lecture 3 2 Recall… Recognition of Need Becoming Informed Problem Definition Concept Generation Concept Selection Embodiment.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Chart Your Course to Business Success On Target Business Intensive: Session 4 April 17, 2012 Advisors On Target 1.
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
Smart Buildings Srirangarajan Kadaba National Manager – Energy Edge Buildings Business Schneider Electric 21June 2010.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
THE CLEANTECH INVESTOR FORUM 2011 Infrared Applications Inc. Session 1 The Four Seasons Hotel Palo Alto, California March 7 & 8, 2011.
Update: 3rd Quarter, 2002 November 5, Forward Looking Statement Disclaimer Some of the statements made by RCN in these slides are forward-looking.
Business and Financial Planning. Strategic Project Plan Business Description – the purpose of the business, the product or service provided, an industry.
1 Security Integration and Esgraf sales presentation 01/2015.
Venture Plan HarmAlarm Gary E. Ball. 21 Century: The Security Age Personnel (Automatic) Physical (Manual) Cyberspace (Automatic)
Phoenix Convention Center Phoenix, Arizona Overview of the ESTCP Energy & Water Program Technology Track Overview of Federal Technology Demonstration Programs.
8 Identifying Market Segments and Targets
Event Management & ITIL V3
I A I Infrared Security System and Method US Patent 7,738,008 June How Does It Work? June 2010 I A I = Infrared Applications Inc.
Building Intelligence Tour Jan. 25, 2006 Chicago, IL.
Reseller Live “ Selling IP Applications Alone Will Not Guarantee Success ” C. Don Gant VP Channel Marketing/Business Development.
Acquisition of NetBenefit (UK) Limited Analyst Conference Call June 6, 2012.
Investor Presentation November Forward Looking Statements This presentation may contain forward-looking statements which are subject to a number.
TELUS forward looking statements This session and answers to questions contains forward-looking statements that require assumptions about expected future.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Web - Mail – Night Vision Camera Market Forecast ( )
March, 2004 Into the LAN: An Integrated LAN/WAN End User Study © 2004 Frost & Sullivan. All rights reserved. This document contains highly confidential.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
Essential Standard 4.00 Understanding the role of finance in business. 1.
Sustainability Internal Drivers and Self-Assessment Dennis J. Stamm
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Presentation of equipment.
Intelligent Video Surveillance – The End of CCTV
BANKING INFORMATION SYSTEMS
Across the entire value chain
Sustainability Internal Drivers and Self-Assessment Dennis J. Stamm
Mapping your way to Profitability
WHY VIDEO SURVELLIANCE
Maintaining order and safety in a city is no small task
WHY VIDEO SURVELLIANCE
2018 THIRd Quarter Results NASDAQ: fult
Presentation transcript:

THE CLEANTECH INVESTOR FORUM 2011 Infrared Applications Inc. Session 1 The Four Seasons Hotel Palo Alto, California March 7 & 8, 2011

Infrared Applications Inc. “Turn off the Lights, Turn on the Security” Gary L. Bane & Gary E. Ball March 7, 2011 Presentation On line:

Agenda Physical Security Market The need The next Generation in Physical Security Surveillance Systems: HarmAlarm –Evolutionary (existing visual systems) –Revolutionary (advanced technology growth) –Green Value (energy conservation) –The Future: 21 st Century – The Security Age Enterprise Value –Increase Revenues –Lower Operating costs –Increase functionality –New Applications (new markets) Summary

Defining Issue State of Security Status Control rooms are costly, energy consuming, and understaffed for video volume Most security systems operate in a record only mode. Technology until now has failed to find the solutions desired. Industry Security Requirements 1.Detect security threat 2.Verify 3.Provide actionable intelligence 4.Operational communication 5.Update the event 6.Document the incident 7.No false alarms 8.Affordability

HarmAlarm: Next Generation Defined by the concept & claims of US Patent 7,738,008, June 2010 A surveillance field is formed by the common fields-of-view of two independent imaging sources. Objects common to the surveillance field are detected: –They are computed as physical objects in linear dimensions (SqFt) –They are located at precise coordinates (x,y,z) –And they are continuously tracked over time. When objects are tracked, real time data is available: –This data supports higher order threat detection criteria (behavioral). –Also, the simultaneous detection, independent validation, & tracking eliminates false alarms The elimination of false alarms: –Makes HarmAlarm the first truly automatic physical security system in the Security industry. –Detection  Response/Alarm, the benefit is: Improve the effectiveness of control rooms and provide record-only Security systems a real time capability

HarmAlarm Architecture US Patent No. 7,738,008, June 2010 Key elements Two imaging sensors form a Secured area, defined by overlapping fields-of-views 3 D real time scientific equations for target detection & classification Connectivity: –Optimized for each application Host computers: –Remote: mainframe, –Site: desk top or Cloud based IP Protocol –End-user set up –Menu driven Threat Criteria: –Menu specific, End-user defined Remote threat notification –Response team –Safety alert –Embedded Applications

Immediate Markets

Retrofit Plan Add a second camera, (if needed), and install HarmAlarm 3 D processing Manned security Control rooms: Benefits –Improve the control rooms effectiveness Directs the detected threat to the operator Increases the number of Cameras to Operator ratio while improving coverage –Layer Security for critical applications (redundancy) –Downsize or eliminate Control Rooms TV monitors & recorders Air conditioning Electrical power consumption Record-only systems: Benefit: –A real time threat detection capability Alerts workers, safety Provides the End-user an option to add a response capability Direct response becomes affordable, when false alarms are contained/eliminated. Build relationships for the future –1,000 plus existing physical security integrators and service providers –Most will need technical assistance to implement HarmAlarm –Integrators become our “feet on the ground” for HarmAlarm growth

Revolutionary HarmAlarm’s preferred embodiment is: –Infrared Imagers with wireless connectivity. Why? –Infrared imaging provides stable target signatures. –Infrared enhances target tracking Especially in multi-target environments Precise target signature and uniqueness Maintains all objects in the track file –The track file: Needed for advanced behavioral threat recognition Infrared technology ensures the lowest false alarms rate.

False Alarm Improvement Camera A false alarm1/100 Camera B false alarm1/100 Occurring in common area 1/100 Independent Size matching1/100 3 D “single look” combined probability 1 in 10 7 Tracked over time 1/10 False Alarm probability 1 in 100 Million If Camera A was a single camera security system the false alarm rate would be 1 in 100 HarmAlarm versus single camera 1,000,000:1

Advanced Threat Detection Lying-in-wait (home, parking lots, etc.) Stalking (a two object relationship over time) Loitering (peeping tom) Man-down (many causes) Crowd recognition (gathering targets) Profiling for signs of anxiety (retail theft, airports, etc.) Child-at-risk (child unattended) Animal threat (situation unique) Perimeter enhancement (home evasion) Agriculture (threat: human & natural) Natural events (fire, wind, water, slides, etc.) Threats defined at site (End-user specific)

Example

Camera A Camera B

Geometric Relationships Location Camera A Location Camera B Target Location Distance Between Cameras R2 R1 Known Set-up value Cameras Position & target Location Range computations, R1 & R2

HarmAlarm Slant Range Calculations, for R1 & R2 R1 & R2 calculations require information from both cameras Both cameras, the 3 D solution is patent protected HarmAlarm is not a flat earth extrapolation (competitors) HarmAlarm equations are closed form scientific updated at video frame rates. Powerful “best estimating” algorithms based upon target signature properties. Equations shown have been simplified from their spherical trigonometry form. R1 = (Distance Between Cameras) x Sin (camera B angle o )/ (Sin (180 o – {camera B angle o } – {camera A angle o }) R2 = (Distance Between Cameras) x Sin (camera A angle o )/ (Sin (180 o – {camera B angle o } – {camera A angle o }) Color coding is matched to HarmAlarm Geometry relationships

Camera A Camera B

Camera A Camera B Partially obscured

The Future

21 Century: The Security Age Personnel Physical Cyber-space Common Data Base

Shared Data Base Synergism: Where the sum exceeds the parts Shared communications Common Data Base –Identification, from all sources –Verification, by all sources –Correlation, linking of events 1.Multi-discipline Threat Detection, Tracking actions over time Recognized by combined systems 2.Threat Alert notification Multi-discipline alert 3.Responder Information Situation awareness Identify threat elements Updated in real time simultaneous broadcast Consolidation of Enterprise Security Vendor support: Currently overlapping, redundant, holes, and confusing Simplify: Authority and responsibility with a single authority

Green Benefits

Green Applications History “Turn off the light” application, specific Make control rooms more efficient, general

The Past Old practices, formed when energy was cheap and abundant. Wasting energy is an economic and environmental problem. A major use of electrical energy is for lighting. One of the common uses of night time illumination is for security. Security experts define “light to be the enemy of darkness and the ally of safety”. Our Expert: –Bad things happen when there is no light. –Evil exists under the cloak of darkness. –If you want safety, you must have light. But, How true are his statements?

Military Legacy In the 1970’s US military recognized an army with “night vision” had a significant advantage on the battlefield. Gerard Erasmus: –"In the valley of the blind, the one-eyed man is King." Our version is, –“In field of Security, the night vision system is King”. In the early 90’s Infrared Technology was designated by the US Government as a “dual use” technology This opened the door for commercial applications. The US Government still controls the technology but commercial applications have been sanctioned and approved. –Aviation –Medicine –And now, Security

Commercial Car Lot Application 70,000+ cars lots in the USA. They operate and deploy strong illumination. It is estimated they consume greater 500 KMWHs per day. ~40% of the power is consumed after the close of business. Millions of dollars per day with a large carbon footprint. Car theft rings are sophisticated. –They targeted certain car models –To be dissembled, crated, and shipped to foreign markets within hours of the theft. –The car thief is not just stealing, they are filling an order. When a car lot is lighted, the total time from entering, locating the car, and departing is less than 5 minutes for a professional thief. We would like to increase the response window to > 10 minutes

Darkness: The new Ally of Security HarmAlarm places the scene in total darkness. –Darkness slows down the actions and movements of the thief. –The search takes longer. The thief is identified when he enters the surveillance field. –Early detection –Actions are slowed down –The time window is lengthen –The opportunity for apprehension is increased. Infrared technical performance is superior to visual cameras, stable signature. The stable IR signature makes a positive unambiguous identification possible, Inherent Thermal Contrast (ITC). Better performance, lower cost of ownership, and Green Benefits

Enterprise Value

Reduces Operating costs –Lowering operating costs will increase market size Increase Revenues from: –Retrofits to existing security systems –Expansion of existing market or market share –New Applications, leading to new markets Revenue Sources –Sale or Lease of HarmAlarm components –Wireless service monthly fees –Response provider services (potential) Five year forecast

Five Year Cash Flow (Based upon 7.6 million units) Cash Flow (Millions of Dollars) Total Production Development OEM Income Product (Sell or Lease) Wireless fees Cash Flow ,050 Accumulative ,050 Profit Margins: Hardware 15% & Wireless 70%

Summary

Point of Convergence The Market factors have changed since Security and safety requirements want a real time capability, –End-users desire for a threat response and threat negation –Safety, minimize collateral damage, instructions and real time guidance –A growing realization real time is more cost effective than post mortem Infrared technology has matured since 2004 performance and cost, –Costs have decreased by a factor of 7, –Another factor of 3-4 is predicted by 2013 (US government initiative) Wireless capability has grown and matured, –Video applications are here (3G, 4G, and androids) & –Cloud computing potential? Internet IP Protocol, has become standard practice Growth in handsets, custom applications –Embedded response action plan in the handsets, real time updated The HarmAlarm provides the architecture, road map and direction.

Summary Protected by US Patent 7,738,008, issued June 15, HarmAlarm –The next generation in Physical Security Systems. –Based upon closed form 3-dimensional processing –Detects, verifies, and sounds a threat alert all in real time. –Eliminates false alarms HarmAlarm, the world’s first automatic physical security system The Long Term Future direction: –Integrate HarmAlarm with Personnel and Cyber-space security to create a Total Security solution. –Who?, what?, when?, where?, and by whose authorization? Are all questions to be answered by Total Security.

Our Strategy Formation of the right Team (relationships) –Understanding of the Physical Security Market –Knowledgeable of key technologies Visual/Infrared imaging advances, Wireless: cloud computing, video bandwidth 3G – 4G & Chipset volume production, handsets, cameras, wireless Custom handset production, embedded applications. –A long term relationship Segregate HarmAlarm into stand-alone business units Profit Centers: –Green Applications (conservation) –Upgrade visual wavelength systems (existing Physical Security systems) –Home Security (extension of threat warning) –Military (mobile threat perimeter security system) –OEM Volume Production Base (HarmAlarm components) –Others?

Disclaimer The Infrared Applications Inc. (IAI) Business Plan contains forward-looking information that is subject to certain risks and uncertainties that could cause actual results to differ materially from those projected. Statements that are not historical facts, including statements about strategies, plans and expectations about new and existing products, services, technologies, opportunities, industry growth, demand for and acceptance of new and existing products, and returns on investments in products and markets, are forward- looking statements that involve risks and uncertainties that could significantly impact the company. These risks include, but are not limited to, the projected market for IAI products and potential returns. Factors which could cause actual expectations to differ materially from these projections include the actual market acceptance of the product, the cost of the product, unforeseen difficulties in the construction of the product, and the competitive environment within the industry. When Infrared Applications Inc. uses words such as “believe,” “expect,” “anticipate” or similar words, it is making forward-looking statements. Certain articles, studies and reports that management relied on in preparing the projections also make forward-looking statements. These articles, studies and reports base their forward-looking statements on a number of different factors and assumptions, all of which are beyond management’s control. All of these assumptions are subject to a high degree of uncertainty. One or more of these assumptions may turn out to be incorrect. Accordingly, actual developments may differ materially from the projections contained in these articles, studies and reports. The management of Infrared Applications Inc. makes no assertion over the correctness of the material contained in the Business Plan, and interested parties must rely on their own independent research and due diligence to reach their independent conclusions.