Search Results - intelligence+%26+security

91 Results

Sort By:

  1. Continuous-time reinforcement learning (CT-RL) algorithms hold great promise in real-world control applications. Adaptive dynamic programming (ADP)-based CT-RL algorithms, especially their theoretical developments, have achieved great successes. However, these methods have not been demonstrated for solving realistic or meaningful learning control problems....
    Published: 9/19/2025
    Inventor(s): Brent Wallace, Jennie Si
    Keywords(s):  
  2. Event-based cameras that asynchronously detect changes in pixel brightness with high temporal resolution, high dynamic range, and low-power, have been very successful for robotic vision and autonomous navigation. Depth estimation from monocular or stereo event cameras is an important task which helps improve downstream robotic localization and mapping...
    Published: 9/18/2025
    Keywords(s):  
  3. Wireless networks have seen exponential growth in popularity due to the inherent accessibility provided by the broadcast nature of the wireless medium. However, this ease of reception also introduces significant security vulnerabilities. Within the range of wireless transmissions between transmitters and legitimate receivers, passive eavesdroppers can...
    Published: 9/12/2025
    Keywords(s):  
  4. This algorithm is developed in the field of control systems for control of affine nonlinear continuous time (CT) systems, which include important application areas such as robotics and autonomous systems, aerospace, manufacturing, and process control. This invention falls under the class of continuous-time reinforcement learning (CT-RL) control algorithms....
    Published: 9/12/2025
    Inventor(s): Jennie Si, Brent Wallace
    Keywords(s):  
  5. Unknown-unknowns are operational scenarios in AI enabled autonomous systems, such as human-in-the-loop (HIL) human-in-the-plant (HIP) systems, which are not accounted for and may represent a major challenge in the design and validation phase. In these scenarios, the operational behavior of the systems is not guaranteed to meet requirements such as safety...
    Published: 8/27/2025
    Keywords(s):  
  6. Background In virtual reality, the utilization of technology that uses touch and vibrations to communicate with users, simulating tactile sensations like pressure, resistance, and texture (haptic feedback), is often quite unrealistic when users engage with virtual fluids. Vibrotactile actuators are small motors or vibrators that generate haptic feedback,...
    Published: 6/23/2025
    Keywords(s):  
  7. Background Private transportation is currently the most common form of transportation in the United States. Cars are an essential commodity, with each household in America typically having at least one car. However, finding an open parking space can be a daunting task, especially with the surge in the number of city vehicles. Navigating through a...
    Published: 5/21/2025
    Inventor(s): Junfeng Zhao
    Keywords(s):  
  8. Background A field-programmable gate array (FPGA) is a reprogrammable integrated circuit (IC) that can be configured for many different uses. FPGAs are essentially chips that can configured to perform specific tasks after they are manufactured. A multi-tenant FPGA is one that is designed to be shared by multiple, potentially independent, users or “tenants”....
    Published: 5/21/2025
    Keywords(s):  
  9. Air quality monitoring is critical for environmental health and public safety. Traditional monitoring methods rely on passive and active air sampling techniques, which, while effective, are cumbersome, expensive and limited with respect to real-time data and comprehensive analyses. In high-risk environments, such as hospital or care settings, and food...
    Published: 5/19/2025
    Inventor(s): Amir Elyaderani
  10. Background Artificial intelligence (AI) image generation has opened up endless possibilities for creativity, allowing architects, designers, and artists to produce visual models rapidly. However, this technology is responsible for creating deepfakes, which are highly realistic but fake images and videos. Deepfakes can be used to spread misinformation,...
    Published: 2/13/2025
    Keywords(s):  

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.