Available Technologies by Category
Disease Progression Modeling
  • Accurate - Provides continuous time modeling, which is more appropriate for medical data due to patients being monitored at irregular intervals
  • Multipurpose - Could be used for disease staging, characteristic progression pattern discovery, prediction of the future state of disease, fast local progression detection, and to enable understanding of disease progression
6466
PUPS: Pressure Ulcer Prevention System
  • Enhanced quality of care: Patients are less likely to develop a hospital-acquired infection
  • Lower cost: Minimizes costs from “never events” such as pressure ulcers
7541
Mixed-Signal Doherty Power Amplifier
  • Achieves high peak efficiency, back-off efficiency, and linearity
  • Supports complex modulations with large bandwidths (> GHz)
  • Compatible with many process technologies, including CMOS, SiGe, GaAs, and GaN
7496
Rapid Antibiotic Susceptibility Test
  • Relatable: Does not rely on genetic detection, making it more general and directly relatable to traditional ASTs used clinically
  • Faster: Can perform ASTs in 1/8th of the time of current ASTs
  • Improved accuracy: Decreases technician time and handling, improving accuracy and treatment
7492
Improved Privacy: A Data Security Solution
  • Easy-to-use – Overcomes usability problems and/or server modifications of existing privacy solutions
  • Standalone – Ability to be used as a standalone program that provides better isolation than other products
  • Secure – Allows the provider or online entity to enhance the user’s confidence that the personal data will be not be compromised
6426
Multi-Layer Inkjet-Printed Capacitors
  • Quick — Rapid fabrication of extremely high frequency (EHF) components in minutes
  • Low cost — Does not require a clean room and low chemical and material waste
  • Convenient — Equipment is small enough to allow on-the-spot printing and modifications in remote locations
6332
Apparatus and Method for Protecting Log Information
  • Hardware and software to prevent ‘log’ data tampering
  • System logs impenetrable and non-modifiable
  • Disables the ability to remove or tamper with trace data
6327
Sensing Methodology for Intelligent Traffic Sign Inventory
  • Ability to measure signs faster and safer
6321
Self-Steering Transceiver with Autonomous Beam-Forming
  • Simple operation – operates on phased-array and MIMO systems with zero power consumption
  • Autonomous operation – achieves autonomous beam-forming and beam-alignment towards desired signal
  • High sensitivity – performs automatic dynamic tracking and rejection of unknown interference signals
7360
FlashStream: A Multi-Tiered Storage Architecture Optimized for Video Streaming
  • Flashstream designed specifically for video streaming; whereas alternative storage systems are general purpose resulting in degraded  video
  • Prototype Flashstream, which optimizes caching, performed 2X better than its nearest competitor, Oracle Solaris ZFS.
  • Directly accesses the SSD and RAM to achieve Quality-of-Service (QoS)-sensitive caching to better prioritize changes in video workloads
6264
Configurable Hyper-Referenced Associative Object Schema (CHAOS)
  • Efficient application of tools and algorithms
  • Simplifies the extract, load, and transform phase of data processing
7316
Fuel-Optimal Flight in Uncertain Wind
  • Accurate: Process uncertainty model provides more accurate results than current models
  • Efficient: Optimization model provides fuel-optimal air speed over flight path
  • Novel: First method to leverage knowledge of wind forecast uncertainty in a random process framework
5878
Using Hardware "Fingerprints" to Enhance Network Security
  • Long-Term Solution: Because no software client is required, this technique can be used to identify both current and future unmanageable devices.
  • Failsafe: Because it relies on inherently unique signatures tied to hardware’s diverse compositions, component manufacturers, and physical differences, the system is difficult to defeat by unauthorized—or even authorized—users.
  • Reduced Vulnerability: As a network-based solution, this method eliminates the security vulnerabilities associated with software additions at each node.
5818
DejaVu: Automated Suggestions for Email Responses on Mobile Devices
  • Potential to decrease time spent replying to emails
  • Reply suggestions are relevant due to robust information curator and database in the system architecture
7245
Improved Adaptive Control System Using Selectable Parameters
  • Faster: Requires less complexity in the code, enabling faster control response times
  • Smoother: Improves control stabilization and tracking performance
  • Versatile: Augments existing nonadaptive control systems without modifying the gains employed in those systems
5619
Enhanced Information Security Monitoring Using Analog Signals
  • Accurately and precisely perform security monitoring of information and data being used by computer devices and systems
  • Eliminates the need for the security mechanism to be incorporated into the device/system being monitored
  • Capable of functioning without using resources of the device or system being monitored
7110, 6898
'Security Refresh': Protecting Phase-Change Memory
  • Longer memory lifespan — Lifetime is extended by creating even wear-out
  • Versatile — Not limited to PCM, can be applied to any future memory technology that suffers from limited write endurance
  • Secure — Protects against attacks by masking actual data location
5601
Stiffness Trimming of High Q MEMS Clocks and Oscillators
  • High resolution stiffness trimming of high-Q Lame mode silicon resonators
  • Stable frequency characteristics of Ge-coated Si resonators at high processing temperatures
  • Achieves trimming without introducing any damping throughout process
7184
Cross-Coupled VCO With Phase Noise Performance
  • Inherently separate device source nodes for the cross-coupled devices with no compromise on the VCO startup condition.
  • The new topology ensures both low phase noise and low DC power.
  • Superior close-in 1/f3 phase noise.
7176
Methods for Sensing Wearouts of Electronic Circuits
  • Circuit details are taken into account in estimating lifetime
  • Wearout methods can be used to determine “timing closure” at 10 years lifetime
  • Methods serve as foundation for a new electronic design automation tool for “timing closure”
7145