Search Results - cyber-physical+system

6 Results

Sort By:

  1. Background Touchless interaction systems have grown in prevalence in recent years, including gesture-based interaction systems. Gesture recognition forms an integral part of human-computer interaction (HCI) technologies that deal with recognizing various movements of the human body, and interpreting them as commands to interact with a machine. Hand...
    Published: 2/13/2025
  2. Nowadays, one practical limitation of deep neural networks (DNNs) is their high degree of specialization to a single task. This motivates researchers to develop algorithms that can adapt the DNN model to multiple tasks sequentially, while still performing well on past tasks. This process of gradually adapting the DNN model to learn from different...
    Published: 2/13/2025
    Inventor(s): Deliang Fan, Fan Zhang, Li Yang
  3. In the last decade, new solar photovoltaic (PV) cell technologies have emerged for grid-connected systems. However, automatic fault detection and accurate diagnostics for PV array systems are still challenging problems. Even with over-current protection devices (OCPD), ground fault detection interrupters (GFDI), and smart monitoring devices (SMDs) with...
    Published: 2/13/2025
  4. As technology scales, the number of cores in processors will rapidly increase in order to avoid the power wall. In processors that have hundreds and thousands of cores, traditional memory architectures – in which a coherent memory interface is provided to all the cores in hardware, will not be feasible. The memory management functionality is expected...
    Published: 2/23/2023
  5. Current neural interface and neuromodulation technologies lack the stability and specificity to target specific sensory or motor neurons within a nerve bundle. Emerging prosthetic devices for the central and peripheral nervous system require interfaces that can stimulate or sense targeted neurons with high discriminability to achieve very specific end-target...
    Published: 2/13/2025
  6. Current portable and wearable devices use fingerprint analysis for secure authentication. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
    Published: 2/13/2025

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.