Home / 2022 (page 21)

Yearly Archives: 2022

Communications intelligence (COMINT) technology

Electronic Warfare EW, encompasses, in all battle phases, military actions involving the use of EM energy to determine, exploit, reduce or prevent hostile use of EM spectrum and the actions, which retain friendly use of the EM spectrum. EW consists of three related sectors, viz., Electronic Protection (EP), Electronic Attack …

Read More »

Neuroscience or Cognitive Biotechnology (CBT) increasingly being militarized and weaponized.

Neuroscience (or neurobiology) is the scientific study of the nervous system.  It is a multidisciplinary branch of biology that combines physiology, anatomy, molecular biology, developmental biology, cytology, mathematical modeling and psychology to understand the fundamental and emergent properties of neurons and neural circuits.   Neuroanatomists studied the brain’s shape, its …

Read More »

Swarm intelligence technology for collaboration of Military drones

A robot swarm typically consists of tiny, simple, indistinguishable robots that are each equipped with a sensor (and a camera, radar and/or sonar so they can gather information about their surrounding environment). When one robot collects and shares data with the others in the group, it allows the singular robots …

Read More »

Military Robots growth

A robot, is any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. A robot is a machine—especially one programmable by a computer—capable of carrying out a complex series of actions automatically. A robot can be …

Read More »

Growing security and military nexus between Pakistan, Turkey, Qatar and Malaysia may become threat to India in future

Pakistan has managed to avoid being placed on the Financial Action Task Force (FATF) blacklist for now following support from all-weather ally China, traditional ally Turkey and Malaysia. The FATF charter mandates support of at least three member states to avoid the blacklisting. The development has come as a relief …

Read More »

Wearable Photonic devices technology and Flexible stretchable Optical sensors

Currently, old-style personal Medicare techniques rely mostly on traditional methods, such as cumbersome tools and complicated processes, which can be time-consuming and inconvenient in some circumstances. Furthermore, such old methods need the use of heavy equipment, blood draws, and traditional bench-top testing procedures. Invasive ways of acquiring test samples can …

Read More »

Wearable Photonic devices making personalized medicine and health tracking a reality.

Currently, old-style personal Medicare techniques rely mostly on traditional methods, such as cumbersome tools and complicated processes, which can be time-consuming and inconvenient in some circumstances. Furthermore, such old methods need the use of heavy equipment, blood draws, and traditional bench-top testing procedures. Invasive ways of acquiring test samples can …

Read More »

Optical Networks Vulnerabilities and Security threats

Optical networks are vulnerable to several types of security breaches or attacks, typically aimed at disrupting the service or gaining unauthorized access to carried data, i.e., eavesdropping. Depending on the aim of the attack, security breaches can induce financial losses to the clients or cause network-wide service disruption, possibly leading to huge …

Read More »

Militaries thrust on Autonomous convoys or Vehicle swarm technology for building Autonomy-Enabled Future Force

Recent combat operations have continually demonstrated the vulnerability of convoys due to their fundamental requirement for delivering sustainment supplies over long distances of unsecured routes. This operational reality of convoy missions makes them particularly vulnerable to attack and ambush. According to US DOD  52 percent of all battlefield casualties are …

Read More »

Technical risk management

All organizations face uncertainty. The effect this uncertainty has on an organization’s objectives is referred to as “risk.” The challenge for management is to determine how much uncertainty or risk to accept and how to manage it to an acceptable level.   Risk management includes the strategies, processes, systems, and …

Read More »
error: Content is protected !!