Available Technologies by Category
Enhanced Cybersecurity for Networked Motion Control Systems with Somewhat Homomorphic Encryption
  • Increase cybersecurity with expression rewrite rules for encrypted dynamic control schemes that reduce the multiplicative depth of somewhat homomorphic encryption and improve numerical stability. 
  • New approach generates motion commands to servo systems without creating a security hole.  
  • Information decryption and control signal calculation can be performed and executed inside the plant, while all sensitive system information outside of the plant is always encrypted. 
9012
Cost-Effective Hydra Method Monitors DRAM Memory in Computers
  • Hydra combines the best of SRAM-tracking (low performance overhead) and DRAM-tracking (low SRAM overhead and flexibility) to produce Row-Hammer (RH) mitigation that is effective at ultra-low thresholds.
  • Proven results in mitigating the increasing RH security vulnerability issue, Hydra offers a low-cost solution that is widely applicable to all computer systems that use DRAM—over one billion devices. 
  • Hydra is a hybrid tracker that successfully mitigates RH security issues and does not compromise the functionality of the computer system.
8933
Biologically Inspired Connected Advanced Driver Assistance System
  • Cost-effective: Leverages existing vehicle infrastructure (e.g., sensors, lights) along with an affordable software upgrade to provide enhanced collision avoidance capabilities, typically for less than $500
  • Safety-enhancing: Designed to help prevent up to 94% of automotive crashes by providing reduced lag time and enabling faster driver reaction rates 
  • Convenient: Aims to optimize vehicle travel speeds and reduce traffic congestion and travel times
8918
Airborne Acoustic Sensing System for “Ear in the Sky” Capabilities on Unmanned Aerial Vehicles (UAVs)
  • Optimizes speech clarity: Uses acquired empirical data and iteratively refines the processing capability until the optimal signal to noise ratio (SNR) is achieved
  • Improves covert detection: Enables acquisition of a live voice signal from a person of interest without detection by using UAS platforms to remotely acquire acoustic signals and using digital signal processing algorithms to filter, enhance, and localize the speech signal of interest
  • Enhances warfare tools: Provides increased situational awareness, enhanced ISR capabilities, and helps identify potential security threats to deployed assets
6985, 7223
Passive Learning via Wearable Haptic Stimuli System
  • Fast: This technology significantly reduces the time needed to learn Braille. In only four hours, eight test subjects were taught to type the entire Braille alphabet as well as read Braille (with >90% accuracy), while simultaneously focusing on another task.
  • Simplifies learning: A lack of certified Braille teachers, few learning centers, and a steep learning curve make teaching Braille difficult. This technology greatly simplifies the learning process.
  • Passive: Because it doesn’t require the user’s attention on the stimuli, this technology allows them to focus on other tasks while still learning.
6678
RobocallGuardPlus
  • Advanced: Uses a unique smart virtual assistant with a voice interaction model that generates natural conversation to filter out robocalls
  • Robust: Blocks robocalls that other methods may miss, such as those that evade call block lists through caller ID spoofing
  • Unique: Provides the first known system to block mass, evasive, and targeted robocalls using natural, interactive conversation methods rather than relying solely on caller ID and block lists
8817
Generative Causal Explanations for Black-Box Classifiers
  • Increased trust: Has the potential to improve the transparency and fairness of machine learning systems and increase the level of trust users place in their decisions
  • Flexible explanation vocabulary: Provides a rich and flexible vocabulary for explanation that is more expressive than feature selection or saliency map­–based methods
  • Deeper insights: Offers visualizations that can be much more descriptive than saliency maps, particularly in vision applications, leading to better user understanding
8507
Real-Time Mobilization of Computer Software Applications
  • Comprehensive: Overcomes speed, traffic, and interface limitations of basic remote computing
  • Resourceful: Allows for seamless function without a high data usage burden
  • Efficient: Applies unique transformation services to accelerate and enhance the user’s mobilized application experiences
5798
AwareSite Proximity Safety Sensing System for Construction and Other Work Sites
  • Improved work safety and efficiency: Not only are accidents prevented when workers and equipment operators are alerted that they are crossing set safety boundaries, their proximity and movement data are also stored in the cloud and can be used to analyze work patterns that could improve safety, work process efficiency, and more.
  • Low-cost and flexible hardware: The system uses inexpensive custom PPU devices but can also be paired with workers’ personal smartphones for connecting to the system.
  • User friendly and reliable: System setup and operation is simple. Beacons use Bluetooth® low-energy technology and can last more than one year without changing batteries.
7970, 7971
Rapid Mobilization of Essential Enterprise Applications
  • Rapid: Significantly reduces time needed to mobilize an enterprise application as compared to conventional mobilization solutions
  • Cost-efficient: Leverages a cloud-based, codeless platform that saves on both time and budget
  • Flexible: Demonstrates potential to efficiently provide mobile functionality for a wide variety of applications necessary for business operations
5583
Using Smart Macros to Optimize User Actions on Smartphones
  • Improves user experience: Provides near-desktop level experience for the mobile phone environment
  • Easy to use: Reduces user burden by presenting programmable macros in a simple and user-friendly manner
  • Causes minimum overhead: Does not contain any process that degrades the remote desktop performance because of high requirements for the central processing unit (CPU) or memory
5501
Virtual Sensing Integrated for Predictive Reliability (VIPR)
  • Advanced: Acquires system data via virtual sensing, without the need for physical sensors in all desired locations
  • Cost-reducing: Aims to reduce maintenance and planning costs for solid rocket motors and potentially other vehicle propulsion systems
  • Predictive: Provides useful, repeatable, extensive data sets to predict rocket performance and enable proactive plans for propulsion system maintenance, upgrades, and replacements, potentially reducing downtime and failures
8555
ScheduleNet: Advancing Multi-Robot Coordination
  • Superior performance: Outperforms approximate human-robot scheduling methods in both schedule optimization and total number of feasible schedules
  • Robust: Can autonomously learn scalable scheduling heuristics on multiple application domains and attains an order-of-magnitude improved computation speed compared with exact methods
  • Novel: Is the first method to leverage graph neural networks involving simple temporal network (STN)-based scheduling problems with spatial constraints
8515, 8517
Privacy-Preserving Remote Biometric Authentication
  • Protective: Designed to eliminate privacy concerns associated with databases of people’s faces
  • Flexible: Supports various biometrics, including face, voice, iris, fingerprint, and gait
  • Remote authentication: Eliminates the need to always possess the enrollment device
7885
‘Intelligent’ Power Amplifier Architecture
  • AI-assisted: Provides the PA self-reconfigurability and robust adaptive operation over environmental changes
  • High performance: Features low latency and fast response capabilities required for many fifth-generation (5G) applications
  • Improved learning efficiency: Incorporates into control algorithms multiple RL frameworks, including CAB, multi-armed bandit, contextual bandit, and actor-critic with experience replay
8377
Contextually Aware, Machine Learning–Based Smart Notification System
  • Increases user efficiency
  • Increases user productivity
  • Reduces user stress
8034
The Sliding-Window Queue-Proportional Sampling (SW-QPS) Algorithm
  • High performance: Offers a novel switching framework that eliminates batching delays without sacrificing throughput performance
  • Advanced: Computes matchings of much higher quality than state-of-the-art and widely used regular switching algorithms
  • Efficient: Achieves at least 88 percent throughput with a computational complexity of just O(1) per port
8540
Internet of Space Things
  • Comprehensive: Provides a fully integrated cyber-physical system that allows for active sensing, passive sensing, and data communications
  • Robust: Offers a dynamic and scalable network configuration with a centralized control that enables and simplifies data aggregation
  • Cost effective: Permits highly differentiated networking capabilities to be integrated and deployed over the same network infrastructure, using CubeSats to decrease costs
7957, 7958
LogicFuzzer Cybersecurity Framework
  • Accurate: Demonstrates high reliability in identifying the presence of malicious code and programs
  • Robust: Identifies malware even if the attacker hides the malicious behavior (e.g., by using a logic bomb), since it is agnostic to large timer or counter values set to hide malicious code segments
  • Easy to use: Eliminates the need for a training stage and requires only the binary program rather than source code
8372
High-Precision Cell Membrane Tracking for Automated Electrophysiology
  • Highly accurate: Overcomes the challenges of tissue interference and movement for precise membrane tracking that can be used for automation
  • Instantaneous: Surpasses earlier attempts at automating this process by effectively identifying and tracking cell boundaries in real time
  • High fidelity: Operates efficiently and precisely even in dynamic, high-interference environments
7467