# of Displayed Technologies: 7 / 7

Applied Category Filter (Click To Remove): Artificial Intelligence & Machine Learning


Categories

Optimal and Pure Leaf Classification Trees for Machine Learning (ML) Decision-Making
TS-067550 — A method to improve the performance and accuracy of ML-based decision trees.
Decision trees are popular machine learning (ML) methods used in classification and regression problems, and they have numerous applications in the real world. Various industries use decision trees to help decide strategies, investments, and operations. In addition, they are used in healthcare to he…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Arrey, Evelyn; Booth, Matthew; Liu, Enhao; Mashayekhi, Medhi
  • Licensing Officer: Zinn, Ryan

A Cybersecurity Vulnerability Prioritization System Including Identifying "Super-Critical" Vulnerabilities, predicting "Dark Host" Vulnerabilities, and Addressing Economic Costs
TS-066063 — Our cybersecurity vulnerability maintenance system stands as a pillar of modern security strategy, transforming reactive security measures into a preemptive defense mechanism. This integration of technology and economics ensures that your most critical assets are protected efficiently and effectively, making it an invaluable tool for any organization serious about security.
In today’s hyper-connected world, the escalation in cyber threats poses significant risks to organizational data and systems. Vulnerabilities within network infrastructures can lead to massive security breaches, as demonstrated by incidents like the 2017 Equifax hack. Effective vulnerability…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Liu, Enhao
  • Licensing Officer: Zinn, Ryan

SimulationAI -- AI-Enabled Software Solution for Physics-Based Simulations
TS-066058 — By adopting our AI-driven solution, engineering teams can achieve more in less time, push the boundaries of innovation, and significantly cut down costs, all while maintaining or increasing the reliability and accuracy of their structural and material analysis. This is not just an evolution in FEM technology—it's a revolution.
In an era where precision and efficiency drive the success of engineering projects, the finite element method (FEM) remains indispensable but is burdened by high operational and computational costs. These costs often lead to overlooked uncertainty factors, suboptimal designs, and significant finan…
  • College: College of Engineering (COE)
  • Inventors: Soghrati, Soheil; vemparala, Balavignesh; Yang, Ming
  • Licensing Officer: Zinn, Ryan

Emergency Response Tool for Industrial Facilities
TS-041844 — Artificial intelligence software for making risk-informed decisions to prevent and mitigate emergencies.
No solutions exist for predicting the likelihood of future undesirable consequences across various industrial settings. The lack of these solutions subjects personnel, the public, and the environment to potentially catastrophic consequences. Essential services such as power plants, pump stations,…
  • College: College of Engineering (COE)
  • Inventors: Yilmaz, Alper; Ajam Gard, Nima; Aldemir, Tunc; Denning, Richard; Lee, Ji Hyun
  • Licensing Officer: Zinn, Ryan

Learning Optimal Empirical Reward iNtelligence (LOERN) with Cyber Maintenance Applications
TS-040341 — A software solution designed to optimize cyber security decision making and reduce maintenance costs.
As the world becomes more and more connected, our systems become more and more vulnerable. If cyber security can become more automated, risk-based decisions can be made more quickly and rationally. Organizations can then leverage this decision-making to improve their security without increasing co…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Hou, Chengjun
  • Licensing Officer: Zinn, Ryan

DIAMOND
TS-037930 — Data-Driven Inspection, Alerts, Maintenance, Observable Network Decision Control System with Cyber Action Taker to Address Less Inspected Hosts Including Cell Phones
Cyber security is an important facet of many major corporations and government entities. The implementation of effective cyber security protocols is an arduous process because the most targeted individuals, C-suite and boardroom level personnel, understand the protocols the least. A lack of adhere…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; RoyChowdhury, Sayak
  • Licensing Officer: Zinn, Ryan

Subject Matter Expert Refined Topic Models
TS-015175 — Human-Assisted Modeling (HAM), Subject Matter Expert Refined Models (SMERM), and Subject Matter Expert Refined Topic (SMERT) Models.
Currently, unstructured data represents up to 80% of the data within an organization. This means the traditional data, such as sales figures or other statistics, are separated into different documents without a meaningful and effective way to aggregate the data. Due to this there is now an opportu…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Xiong, Hui
  • Licensing Officer: Zinn, Ryan

Loading icon