Available Technologies by Category
Machine Learning–Based Transportation Asset Inventory
  • The invention performs more intelligent segmentation using advanced computation methods with Artificial Intelligence.
  • Makes use of cost-efficient 2-dimensional images of roadways, making it easier to implement on a larger scale.
  • Can detect transportation assets and inventory them simultaneously.
9109
Custom-Fit Reusable Respiratory Protective Device (RPD) with Continuous Fit Monitoring Improves Comfort and Protection
  • Vastly improves comfort and protection while bringing peace of mind to wearers through a custom fit and continuous monitoring
  • Reduces pressure injuries caused by extended RPD use through both a customized fit and alerts to the wearer when the RPD should be adjusted or removed
  • Minimizes exposures to workplace hazards by immediately detecting leakage during RPD use and alerting the wearer to adjust the device
8876, 9089, 9090, 9091
Deployable Critical Active Learning (DECAL) System Offers Better Characterization for Improved Diagnostics and Imaging
  • The deployable critical active learning (DECAL) system’s bi-modal interface enables better characterization with large training sets that generate more accurate output for higher precision.
  • The algorithm used during the initialization period creates a framework that can be expanded and generalized to any data method and application.
  •  The DECAL algorithm samples uniquely important, unlabeled data to aid existing active learning systems in generalizing more quickly, providing faster diagnosis statistics.
9099
High-Precision, Hands-Free Remote Control of Complex Robotic Systems Via Eye Movements
  • This two-camera eye-tracking system (TCES) integrates a commercial eye tracker with machine-learning technology for continuous real-time classification of gaze and eye directions for robotic arm control. 
  • The system provides highly accurate classification for four directions of eye movement and has achieved 99.99% accuracy in studies.
  • Using simple eye movement, the TCES offers low-cost, high-precision control of external devices/hardware for people with disabilities, surgery robots, warehouse systems, construction tools, and more. 
9184
Streamlined Combination Analysis by FORECAST Accurately Predicts and Identifies Pending Malware Attacks
  • Automating the combined techniques of memory forensics and symbolic analysis accelerates how fast an enterprise or government becomes aware of the true extent of malware’s capabilities.
  • When countering cyberattacks, FORECAST provides improved accuracy (94%, overall) with its automated analysis, which is crucial to helping cybersecurity efforts to efficiently focus on high-impact solutions.
  • FORECAST has the flexibility to be a valuable incidence response tool, even when malware is fileless since it uses the software’s memory image to accurately predict the program’s capabilities.
8581
Customizable Smart Charging Solution for Electric Vehicles in Residential Areas
  • This customizable smart charger uses algorithms and a hardware prototype to control electric vehicle charging and optimize benefits to consumers and power grid operators. 
  • Consumers can charge according to their preference (e.g., minimize cost, maximize carbon-free energy usage, minimize charging time, or minimize battery degradation).
  • The smart charger selects charging profiles that delay charging to avoid excessive loads on the power grid.
8980
Enhanced Cybersecurity for Networked Motion Control Systems with Somewhat Homomorphic Encryption
  • Increase cybersecurity with expression rewrite rules for encrypted dynamic control schemes that reduce the multiplicative depth of somewhat homomorphic encryption and improve numerical stability. 
  • New approach generates motion commands to servo systems without creating a security hole.  
  • Information decryption and control signal calculation can be performed and executed inside the plant, while all sensitive system information outside of the plant is always encrypted. 
9012
Cost-Effective Hydra Method Monitors DRAM Memory in Computers
  • Hydra combines the best of SRAM-tracking (low performance overhead) and DRAM-tracking (low SRAM overhead and flexibility) to produce Row-Hammer (RH) mitigation that is effective at ultra-low thresholds.
  • Proven results in mitigating the increasing RH security vulnerability issue, Hydra offers a low-cost solution that is widely applicable to all computer systems that use DRAM—over one billion devices. 
  • Hydra is a hybrid tracker that successfully mitigates RH security issues and does not compromise the functionality of the computer system.
8933
Biologically Inspired Connected Advanced Driver Assistance System
  • Cost-effective: Leverages existing vehicle infrastructure (e.g., sensors, lights) along with an affordable software upgrade to provide enhanced collision avoidance capabilities, typically for less than $500
  • Safety-enhancing: Designed to help prevent up to 94% of automotive crashes by providing reduced lag time and enabling faster driver reaction rates 
  • Convenient: Aims to optimize vehicle travel speeds and reduce traffic congestion and travel times
8918
Airborne Acoustic Sensing System for “Ear in the Sky” Capabilities on Unmanned Aerial Vehicles (UAVs)
  • Optimizes speech clarity: Uses acquired empirical data and iteratively refines the processing capability until the optimal signal to noise ratio (SNR) is achieved
  • Improves covert detection: Enables acquisition of a live voice signal from a person of interest without detection by using UAS platforms to remotely acquire acoustic signals and using digital signal processing algorithms to filter, enhance, and localize the speech signal of interest
  • Enhances warfare tools: Provides increased situational awareness, enhanced ISR capabilities, and helps identify potential security threats to deployed assets
6985, 7223
Raised Cosine (RC) Pulse Shaping for Next Generation Multi-Mode Fiber (MMF) Links
  • Small design: Uses direct modulation and detection with VCSEL-based MMF links for small form factor
  • High speeds with low cost and power: Achieves speeds of 100 Gbps and higher while maintaining low cost and low power consumption with VCSEL MMF-based links and other direct-modulated lasers
  • Low bandwidth requirements: Minimizes intersymbol interference and reduces the required electrical bandwidth to enable use with commercially packaged VCSELs that have bandwidth in the low 20 GHz range
7398
Passive Learning via Wearable Haptic Stimuli System
  • Fast: This technology significantly reduces the time needed to learn Braille. In only four hours, eight test subjects were taught to type the entire Braille alphabet as well as read Braille (with >90% accuracy), while simultaneously focusing on another task.
  • Simplifies learning: A lack of certified Braille teachers, few learning centers, and a steep learning curve make teaching Braille difficult. This technology greatly simplifies the learning process.
  • Passive: Because it doesn’t require the user’s attention on the stimuli, this technology allows them to focus on other tasks while still learning.
6678
A Mechanical Topological Insulator-Based Multiplexer/Demultiplexer
  • Novel: Offers the first known design of its kind, addressing the signal loss challenges of applying acoustic wave technologies to mechanical applications
  • Practical: Enables potential development of a single mechanical platform to accomplish both filtering and channeling using inexpensive components that avoid high battery usage
  • Signal-protecting: Guides waves from input(s) to output(s) with minimal signal loss and topological protection from backscattering
8802
RobocallGuardPlus
  • Advanced: Uses a unique smart virtual assistant with a voice interaction model that generates natural conversation to filter out robocalls
  • Robust: Blocks robocalls that other methods may miss, such as those that evade call block lists through caller ID spoofing
  • Unique: Provides the first known system to block mass, evasive, and targeted robocalls using natural, interactive conversation methods rather than relying solely on caller ID and block lists
8817
A Method for Creating a Protective Cap Layer for Semiconductor Wafers
  • Protective: Provides a thin protective layer or “cap” after the first layer is deposited, protecting the underlying structure from atmospheric contaminants
  • Robust: Enables realization of the advantages of hybrid growth processes by eliminating performance-degrading contaminants and resulting defects
  • Advanced: Offers superior protection against contamination compared with simple chemical cleaning methods utilized in other systems, especially against impurity species such as oxides
8435
A Biological Computing Framework for Living Systems
  • Innovative: Builds on probabilistic computing principles to construct analog biological bits, enabling an entirely new set of logic gates and algorithms and potentially allowing users to solve previously intractable problems
  • Robust: Can sense every extracellular protease encoded in the human genome, for which there is a known peptide substrate, enabling a simple plug-and-play framework for communicating with a variety of biological activities and offering performance competitive with DNA-based computers but with increased processing speed
  • Relevant: Provides a framework based on biological activity and constructed from biological materials, which enables a direct interface with and understanding of living materials and systems
8009
Generative Causal Explanations for Black-Box Classifiers
  • Increased trust: Has the potential to improve the transparency and fairness of machine learning systems and increase the level of trust users place in their decisions
  • Flexible explanation vocabulary: Provides a rich and flexible vocabulary for explanation that is more expressive than feature selection or saliency map­–based methods
  • Deeper insights: Offers visualizations that can be much more descriptive than saliency maps, particularly in vision applications, leading to better user understanding
8507
Real-Time Mobilization of Computer Software Applications
  • Comprehensive: Overcomes speed, traffic, and interface limitations of basic remote computing
  • Resourceful: Allows for seamless function without a high data usage burden
  • Efficient: Applies unique transformation services to accelerate and enhance the user’s mobilized application experiences
5798
AwareSite Proximity Safety Sensing System for Construction and Other Work Sites
  • Improved work safety and efficiency: Not only are accidents prevented when workers and equipment operators are alerted that they are crossing set safety boundaries, their proximity and movement data are also stored in the cloud and can be used to analyze work patterns that could improve safety, work process efficiency, and more.
  • Low-cost and flexible hardware: The system uses inexpensive custom PPU devices but can also be paired with workers’ personal smartphones for connecting to the system.
  • User friendly and reliable: System setup and operation is simple. Beacons use Bluetooth® low-energy technology and can last more than one year without changing batteries.
7970, 7971
Advance Warning System for Improved Safety in Roadway Work Zones
  • Enhanced safety: Rather than relying on impact-activated devices, the system issues real-time warnings as soon as the perimeter is breached, providing more time for workers to react and get to safety.
  • Portable and changeable: The system can be easily moved or adjusted to accommodate changes to the work zone during the day.
  • Smart analytics: Analysis of intrusion data helps pinpoint areas within the work zone that are more susceptible to breaches, enabling more effective and efficient security.
7397