Home / 2023 / February

Monthly Archives: February 2023

Cluster Bombs and Cluster munitions Attacks cause civilian suffering, becoming accurate and more lethal

Cluster bombs (also known as Cluster munitions) are a type of weapons that open in mid-air and disperse smaller submunitions— anywhere from a few dozen to hundreds—into an area. It can be explosive, chemical or biological in nature. They can be delivered by aircraft or from ground systems such as artillery, …

Read More »

Terahertz Antennas

Terahertz (THz) represents the portion of the electromagnetic radiation between the microwave and the infrared region. It is within the frequency range of 0.1–10 THz, corresponding to wavelengths of radiation from 3000 to 30 µm. The advantages of the terahertz light are that they are non-invasive, intrinsically safe, and non-ionizing, …

Read More »

Thermobaric Munitions

A thermobaric weapon (also known as an aerosol bomb or Fuel Air Explosive) is a type of weapon the used the oxygen in the surrounding environment to generate a high-temperature explosion. While conventional explosive weapons are 25% fuel and 75% oxidizer, Thermobaric weapons consist of 100%fuel  and as a result, are …

Read More »

Wi-Fi technologies migrating from Wi-Fi 5 to Wi-Fi 6

Bluetooth, developed in the late 1990s, is a technology designed to enable short-range wireless communication between electronic devices, such as between a laptop and a smartphone or between a computer and a television. Bluetooth works by using radio frequencies, rather than the infrared spectrum used by traditional remote controls. As …

Read More »

Bluetooth technology powers everything from smartphones and wearables to smart home devices and headphones

Bluetooth, developed in the late 1990s, is a technology designed to enable short-range wireless communication between electronic devices, such as between a laptop and a smartphone or between a computer and a television. Bluetooth radio technology was developed by L. M. Ericsson in 1994. The standard is named after the …

Read More »

Reduction of Magnetic Field Signature of Military Vehicles and Ships

As a vessel travels under or on the surface of water, it causes a detectable local disturbance in Earth’s magnetic field. This disturbance, referred to as the magnetic signature, makes the vessel vulnerable to enemy defense systems. In submarine warfare, adversaries use increasingly sophisticated magnetic sensor and signal processing equipment to …

Read More »

Critical Minerals essential to U.S. National Security and the Economy, DARPA to employ AI/ML to accelerate critical mineral assessments

The United States depends on a variety of raw, non-fuel materials dubbed “critical minerals” to manufacture products considered essential to national security. These products can range from rare earth minerals in electric motors and generators, to the carbon fiber used for airplanes. Increasing demand, coupled with limited domestic supply and …

Read More »

Automotive Alternative Propulsion Market

Currently, most vehicles rely on internal combustion engines for locomotion; however, a significant shift toward partial and complete electrification is likely to emerge as an alternative propulsion system for vehicles. An internal combustion engine system is highly cost-effective and hence, its usage is higher than other propulsion systems. Being a …

Read More »

Photonics Masts are critical subsystems of Submarine imaging, navigation, electronic warfare and communications system

A submarine is a naval platform that can stay underwater for an extended period to carry out missions, both offensive and defensive. It is a complex platform that includes multiple components. As radio waves cannot propagate in water, communication with submarines is difficult. To overcome this issue, submarines are being …

Read More »

Facial recognition widely employed in commercial, Security and Military applications

Facial recognition is a way of using software to determine the similarity between two face images in order to evaluate a claim. The technology is used for a variety of purposes, from signing a user into their phone to searching for a particular person in a database of photos.   …

Read More »
error: Content is protected !!