How can we reduce risks and bring life-saving heart and lung bypass technology to patients outside the ICU?
Our miniaturized microarray in conjunction with the downstream pipeline can identify a genetically engineered microbe within a sample containing thousands of natural organisms.
Biothreat and Pathogen Detection
Engineering portable technologies to detect dangerous pathogens within minutes.
Pediatric Heart Valve
Designed for infants, our bioprosthetic heart valve grows as fast as children do.
Our engineers deliver customized devices without compromised performance, creating technologies to improve disease treatment.
Autonomy in Complex Environments
How can autonomy enhance soldiers’ situational awareness while reducing cognitive burden?
How can autonomous vehicles navigate unknown environments without relying on GPS?
How do we cost-effectively provide solid-state, strategic-grade gyroscopic performance?
How did Draper use model-based engineering (MBE) to optimize the design of a new ballistic missile guidance system?
Inherently Secure Processor
How can you protect mission-critical systems from attack by combining the security advantages of hardware and software?
DMS – International Space Station
How does Draper’s device rapidly detect ultra-trace chemicals in remote locations?
Trident II MARK 6 MOD 1 Guidance System
How do we design a new missile guidance system that will work for decades to come in a deployed system already decades old?
How can Draper increase operational efficiency of networked key infrastructure while providing robust security assurance?
How can technologies developed for commercial products be adapted to perform reliably if exposed to high levels of radiation?
Enhanced Ground Testing
How do we test and validate missile guidance system designs without destroying expensive assets?
DMS - Breath Analyzer
How does Draper’s portable, highly sensitive chemical detection system identify disease in breath?
Secure Micro Digital Data Link (SmDDL)
How do we prevent enemies from intercepting and manipulating RF communications with unmanned military systems?
How can offensive security protect cyber-physical embedded systems from cyber attacks?