Rajesh Uppal

Rajesh Uppal

Optical Networks Vulnerabilities and Security threats

Optical Networks Vulnerabilities

Optical networks are vulnerable to several types of security breaches or attacks, typically aimed at disrupting the service or gaining unauthorized access to carried data, i.e., eavesdropping. Depending on the aim of the attack, security breaches can induce financial losses to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries thrust on Autonomous convoys or Vehicle swarm technology for building Autonomy-Enabled Future Force

convoy

Recent combat operations have continually demonstrated the vulnerability of convoys due to their fundamental requirement for delivering sustainment supplies over long distances of unsecured routes. This operational reality of convoy missions makes them particularly vulnerable to attack and ambush. According…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Technical risk management

Technical risk management

All organizations face uncertainty. The effect this uncertainty has on an organization’s objectives is referred to as “risk.” The challenge for management is to determine how much uncertainty or risk to accept and how to manage it to an acceptable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Mine Countermeasures (MCM) capability on AUV and Unmanned Surface Vehicles (USV) for Anti-Submarine Warfare (ASW) , Surface Warfare (SUW) , and counter terrorism missions

USVInherentCharacteristics

Sea mines are one of the cheapest and most dangerous threats for naval forces; a reality experienced in both World Wars and the Korean War. In order to mitigate the impacts and risks of sea mines on naval operations, advanced…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA Cornucopia to produce palatable food from microorganisms for soldiers

DARPA Cornucopia

With nutritional status being central to success in battle, food technology has long been considered an enabler for military operations. Food technology has been instrumental in ensuring that troops remain “fit to fight”. Early military leaders realised that how well…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Distributed quantum sensor networks

The overarching goal of quantum information science and its enabled emerging quantum technologies is to demonstrate capabilities beyond what is allowed by their classical counterparts. Sensing is an arena that quantum technologies can achieve advantages over classical sensing technologies for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military applications of Ultravoilet spectrum becoming feasible with Technology breakthroughs

ultraviolet principals and applications 3 638

The electromagnetic spectrum is a series of frequencies ranging from radio waves to microwaves, visible light, X-rays, and gamma rays. As the wavelength of the electromagnetic radiation shortens, the waves have a higher frequency—how quickly electromagnetic waves follow each other—and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum Imaging technique can have military applications, US and China racing to deploy quantum ghost imaging in satellites for stealth plane tracking

a9ccd7cd1c4267a50c67ac0bd7180172

Today, we are witnessing the second quantum revolution, where quantum states, which can exhibit superposition and entanglement, are harnessed for quantum technological applications. Quantum Sensing exploits the high sensitivity of quantum systems to external disturbances to develop highly sensitive sensors.  …...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nanosatellite and Microsatellite Market growth and trends

nasa small sats 624x351 1

Nanosatellite and microsatellite refer to miniaturized satellites in terms of size and weight, in the range of 1-10 Kg and 10-100 kg, respectively. ‘CubeSat’ is one of the most popular types of miniaturized satellites. These are the fastest growing segments…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here