Home / Rajesh Uppal (page 212)

Rajesh Uppal

Militaries employ machine learning and DNNs for day and night Facial recognition to ship recognition

AI is a field of computer science dedicated to the theory and development of computer systems that are able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, translation between languages, decision-making, and problem-solving. The commonly used AI techniques are Machine Learning (ML), including Artificial Neural Network(ANN) …

Read More »

AI/ML industry starting with Google’s TensorFlow has introduced numerous open source libraries and frameworks

In mathematics, a tensor is an algebraic object that describes a linear mapping from one set of algebraic objects to another. According to Ars Technica, “Basically, a tensor is a matrix of equations, instead of a matrix of pure numbers. Tensor mathematics is the manipulation of these equation matrices as …

Read More »

Growing Threat of Biohacking or DNA Malware with development of DNA based Biocomputers and memories

Recently biocomputers are  becoming feasible due to advancements in nanobiotechnology and Synthetic Biology. Biocomputers use systems of biologically derived molecules—such as DNA and proteins—to perform computational calculations. It is expected that the most significant advantage of the DNA chip will be parallel processing.   Scientists are also using  DNA for …

Read More »

Tensors are becoming important tool in Warfare from modeling combat to detect military targets using Google’s TensorFlow

In mathematics, a tensor is an algebraic object that describes a linear mapping from one set of algebraic objects to another. According to Ars Technica, “Basically, a tensor is a matrix of equations, instead of a matrix of pure numbers. Tensor mathematics is the manipulation of these equation matrices as …

Read More »

Nanogenerators or Nanotechnology enabled Energy harvesting technologies could soon power Smartphones, IoT sensors, biomedical implants and reduce the soldier’s load

Energy harvesting is the process of collecting low-level ambient energy and converting it into electrical energy to be used as a power source for miniaturized autonomous devices. Examples of this can be seen in structural health monitoring, smart packaging solutions, communication systems, transportation, air and aerospace vehicles, structural biology, robotics, …

Read More »

Soldiers employing human Energy harvesting technologies including Backpack, knee kinetic and Heel-strike to power devices on the battlefield

The vision for the future soldier is to be combat effective and also highly mobile, adaptive, networked, sustainable with total battle space situation awareness and information assurance. Therefore, he is equipped with night- vision goggles, radios, smartphones, GPS, infrared sights, a laptop as well as batteries to power them. Some …

Read More »

Molecular spintronics for could help make quantum computing a reality

Spintronics is an emerging field of nanoscale electronics  whose central theme is the active manipulation of spin degrees of freedom of charge carriers in solid-state systems, in addition to their electronic charge used in traditional semiconductor electronics. Spintronics or spin electronics in contrast to conventional electronics uses the spin of electrons …

Read More »

US Navy employs Airborne Laser Mine Detection System ( ALMDS) , and the Airborne Mine Neutralization System (AMNS) to search and destroy enemy’s mines

More than thirty countries produce mines, and twenty countries export them. Iran has reportedly laid several thousand naval mines, North Korea’s 50,000, China 100,000 or so, and Russia estimated quarter-million. Since World War II, sea mines have damaged or sunk four times more U.S. Navy ships than all other means …

Read More »

Departments of Defense developed Cloud-based biosurveillance ecosystem to warn of coming pandemics

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in short time. The release of Chemical, Biological, Radiological and Nuclear …

Read More »

Intelligence agencies prepare for post quantum world when current public key cryptology will be easily broken by quantum Computers

Modern cryptography being used extensively for securing our internet payments, banking transactions, emails and even phone conversations use cryptographic algorithms based on public-key encryption, which is considered to be secure against attacks from modern computers.   The development of quantum computers once seen as a remote theoretical possibility is now …

Read More »
error: Content is protected !!