Enhanced Cybersecurity for Networked Motion Control Systems with Somewhat Homomorphic EncryptionEncryption for motion control systems is very limited |
9012 |
Cost-Effective Hydra Method Monitors DRAM Memory in ComputersRow-Hammer Security Vulnerability Is a Fault in DRAM Modules in Computers |
8933 |
Reducing Traffic Congestion and Achieving Driver Anticipation in Autonomous VehiclesCurrent ACC systems struggle to achieve anticipative driving |
9033, 9039 |
Biologically Inspired Connected Advanced Driver Assistance System Connecting vehicle systems for collision |
8918 |
Predictive Maintenance System for Large-Scale Operations Offers Potential for Significant Cost SavingsCurrent Reactive Maintenance Systems Fall Short |
8793 |
Airborne Acoustic Sensing System for “Ear in the Sky” Capabilities on Unmanned Aerial Vehicles (UAVs)Enables remote in-flight detection for localizing and classifying live speech and other acoustic signals |
6985, 7223 |
Passive Learning via Wearable Haptic Stimuli System Fast, simple, and effective for learning chorded input with activities including typing and reading braille and playing piano |
6678 |
Marine Mammal Health Tracking & Informatics PlatformInteractive toy and dashboard enable faster identification of potential health issues in mammals at zoos and aquariums |
8957 |
Gaussian Switch Sampling (GauSS) for Training Deep Neural NetworksA dynamics-based active learning approach that matches or outperforms existing strategies |
8757 |
RobocallGuardPlusA smart virtual assistant for blocking robocalls – even those that spoof caller ID screeners |
8817 |
Generative Causal Explanations for Black-Box ClassifiersFor improved transparency and trust in machine learning systems and results |
8507 |
Real-Time Mobilization of Computer Software ApplicationsLeveraging view virtualization and transformation services for a seamless mobile user experience |
5798 |
AwareSite Proximity Safety Sensing System for Construction and Other Work SitesAn effective, economical, and practical proximity alert and tracking system for safer work zones |
7970, 7971 |
Rapid Mobilization of Essential Enterprise Applications A low-resource, cloud-based platform for easy mobile access to enterprise software programs |
5583 |
Using Smart Macros to Optimize User Actions on SmartphonesImproves user experience in remote versions of desktop applications |
5501 |
Virtual Sensing Integrated for Predictive Reliability (VIPR)A hot-fire test facility and new capabilities for performance prediction and maintenance of solid rocket motors and vehicles |
8555 |
ScheduleNet: Advancing Multi-Robot CoordinationHeterogeneous graph attention networks to aid scheduling policies |
8515, 8517 |
Privacy-Preserving Remote Biometric AuthenticationBalances deep learning and cryptographic methods |
7885 |
‘Intelligent’ Power Amplifier ArchitectureSelf-adaptive control algorithms enable 5G communications applications |
8377 |
Contextually Aware, Machine Learning–Based Smart Notification SystemSupports distributed cognition and smart notifications to increase user productivity and reduce stress |
8034 |
The Sliding-Window Queue-Proportional Sampling (SW-QPS) AlgorithmIterative switching for input-queued switches used in routers and data centers |
8540 |
Internet of Space ThingsSpace-based cyber-physical system integrates CubeSats with reconfigurable multiband transceiver and antenna |
7957, 7958 |
LogicFuzzer Cybersecurity FrameworkAccurate and reliable detection of process-destabilizing malware for PLC-based systems |
8372 |
High-Precision Cell Membrane Tracking for Automated ElectrophysiologyA novel deconvolution algorithm to process electrophysiological measurements in real time using differential interference contrast (DIC) microscopy |
7467 |
Shape MachineA software application that bridges the gap between data representation of geometry and the shape that user sees in CAD |
8054 |
Protecting Cache Memories from Eviction-Based AttacksAn algorithm to protect against eviction-based cache side channel attacks, while incurring negligible storage and performance loss, and without relying on any operating system support. |
7979 |
Zombie-Based Mitigation – Protecting Cache from Flush-Based Attack An algorithm that tolerates flush-based cache attacks without requiring rewrite of applications or profile information, and retaining page sharing. |
8008 |
A Technique for Integrating Photographs for Medical Imaging ExaminationsMethods for generating an integrated image series that includes a patient image and medical image to avoid medical errors for patients |
6402 |
Fluorescence Microscopy with an Ideal sCMOS CameraA software to correct sCMOS-related noise |
8098 |
Dual-Polarized Antenna for OFDM Dual-polarized antenna in an OFDM configuration. |
6492 |
OSSPoliceA tool for identifying open-source license violation and one-day security risks at large scale |
7791 |
Segmenting Stroke-Like Structures in Images<p>A method for segmenting tubular or stroke-like structures in images</p> |
4096 |
AR Display and IR Sensing System for Baked ProductsAn augmented reality vision-based system and method that monitors and controls baking, cooking, and routing processes |
4089 |
RFID SecurityA physical defense to limit hacker effectiveness on the security of RFID systems |
4028 |
Optimized Boolean FormA simple, linear cost algorithm for converting positive-form expressions to their Optimized Blist Form (OBF) |
4190 |
Indirect Programming of Floating-Gate TransistorsA floating-gate transistor array and method for programming the same |
3838 |
Environmental Context from Machine Readable Visual Markers A device that uses machine readable visual markets to provide input of environmental context into a device for assistive communication |
5429 |
Quad-Wing Flapping Micro Aerial Vehicle with Independent Wing ControlA micro aerial vehicle (MAV) with improved mobility and endurance |
5426 |
Belief Propagation for Reputation ManagementA computation of accurate online provider reputation scores and malicious consumer rater detection |
5328 |
Cause-Effect Analysis for Video ContentA data-driven analysis of causality in video, which enables effective video content processing in an unsupervised fashion, with emphasize on temporal interaction vs. user interactions |
5324 |