Home / 2021 / February (page 4)

Monthly Archives: February 2021

Rising importance of Non- Acoustic detection technologies of Stealthy submarines in Anti Submarine Warfare

Ship detection for offshore production operations, military activities, transportation and other marine applications is very important. Submarine is one of the most important weapon in modern wars. strategic submarines seem to be key to strategic stability, providing what is generally believed to be the most survivable nuclear second-strike force.   Anti-submarine …

Read More »

DARPA A-Teams, CAML & ADAPT programs developing efficient Agile Human-Machine Teams to execute battlefield, cyber and electronic warfare missions

The prime aim of US third offset strategy, announced in November 2014,  was to develop effective strateges against multiple potential competitors, from small regional states like North Korea and Iran, to large advanced states like Russia and China, to non-state adversaries and actors with advanced capabilities. In response to third …

Read More »

Indian Ocean maritime security threats and Indian Navy’s Maritime Domain Awareness (MDA) technology requirements and solutions

Indian Ocean has always been vulnerable to criminals and anti-national activities. The Indian Ocean is an area of conflict. According to a recent analysis of global conflicts by the Heidelberg Institute for International Conflict Research, altogether 42% of world conflicts can be associated with Indian Ocean countries. Numerous cases of the …

Read More »

Countries developing Asteroid mining technologies

Early evidence suggests that there are trillions of dollars’ worth of minerals and metals buried in asteroids that come close to the Earth. These include phosphorus, antimony, zinc, tin, lead, indium, silver, gold and copper. The mining of resources contained in asteroids, for use as propellant, building materials or in …

Read More »

DARPA CHARIOT developing Quantum proof cryptography for Military Mobile and IoT security

The exponential price/performance improvements in semiconductor technology stemming from Moore’s Law are enabling even the smallest and most application-specific devices, such as sensors and actuators, to include networking capabilities. The overwhelming majority of such devices will be cheap and power-constrained. Low device costs permit deployment in unprecedented numbers, with some …

Read More »

Solar fiber optic lighting for daylighting of high-rise intensive buildings and military shelters

Conventional daylighting scheme employing windows and skylights are no longer so useful especially for daylighting of high-rise and intensive buildings. Residential buildings with limited natural lighting are generally lit by fuel-based electricity which contributes to increase of CO2 concentration in the atmosphere. Alternatively, the concentrated solar energy can be transmitted …

Read More »

Miniaturized RF passive components like filters, inductors and capacitors required for future 5G and IoT requirements

The RF design consists of passive as well as active components. The inductors, capacitors, and resistors are one of the three passive elements that are the foundations of all electronics. The discrete and passive components are an integral part of the design; from front-end antenna matching to tight-tolerance mixers, oscillators, …

Read More »

Cyber Security Situational Awareness tools on Defense Platform Networks are critical for Cyber Warfare

Cyberspace is understood as the fifth domain of warfare equally critical to military operations as land, sea, air, and space. Success of military operations in the physical domains is increasingly dependent on the availability of, and access to, cyberspace. The armed forces are reliant on cyberspace both as a user …

Read More »

DARPA HACCS employing AI for cybersecurity by developing autonomous software agents, that will infiltrate adversary’s networks, detect botnets and neutralize them

As the complexity of software is growing software vulnerabilites are also increasing. According to two US based organizations that track vulnerability disclosure, the number of software vulnerabilities has gradually grown year-over-year achieving its highest peak in 2017. Computers are not patched reliably, configured properly, or used safely, allowing widespread exploitation. …

Read More »

DARPA DeMi developing technologies for space based telescope on it’s military CubeSat satellite for Space Surveillance Awareness

The volume of space between the Earth’s surface out to geosynchronous orbit is enormous—equivalent to 240,000 times all the Earth’s oceans. Yet the number of objects calling that volume home is growing all the time—not just with satellites but with debris of all kinds, natural and manmade. And keeping track …

Read More »
error: Content is protected !!