Rajesh Uppal

Rajesh Uppal

5G Mobile Networks deployments have many security and privacy threats, Require New policies and technologies including quantum cryptography

5g security

Countries are now racing to deploy 5G, short for 5th generation mobile networking or 5th generation wireless systems. The Fifth Generation (5G) mobile networks  promise fast Internet for everyone, smart cities, driverless cars, critical health care, “internet of things” revolution,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Sustainable Management of Construction and Demolition (C&D) Materials

C and D Waste

Construction and demolition (C&D) materials are generated when new building and civil-engineering structures are built and when existing buildings and civil-engineering structures are renovated or demolished (including deconstruction activities). Civil-engineering structures include public works projects, such as streets and highways,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA INCAS will exploit social media, messaging & blog data to track geopolitical influence campaigns

DARPAINCAS

With billions of people around the world accessing platforms such as Facebook, WhatsApp, Twitter, and Instagram, to name a few, social media has become a powerful force for political and cultural change, and a force that is more than capable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA ‘s PROTEUS urban combat software allows Marine commanders to explore and develop new multidomain fighting concepts

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  Urban warfare is fundamentally unchanged since World War I in many regards: battle is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA advances Microwave Photonics for RF signal processing and radars

The military/defense industry continues to encourage the advancement of multifunctional receivers. Yet the demands for higher-frequency operation, increased bandwidth, increased dynamic range, and enhanced sensitivity creates unique design challenges for present technology. Size, weight, power, and cost (SWAP-C) dynamics heavily…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Self-healing materials for military for armor system providing blast and ballistic protection

selfhealing

Generally, materials will degrade over time due to fatigue, environmental conditions, or damage incurred during operation. Repair of certain materials during their lifecycle (especially those with structural functions such as concrete) can be very expensive and labour intensive.  Therefore Scientists…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

India, Israel and the U.S. Trilateral collaboration can result in innovation superpower to counter China

The Organization for Economic Co-operation and Development (OECD) defines innovation as, ‘the implementation of a new or significantly improved product or process, a new marketing method, or a new organizational method in business practices, workplace organization or external relations. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing threat of Cryptocurrency in terrorism for terror financing

crypto terrorism 780x470 1

Modern terrorist attacks display increasingly sophisticated ICT skills in both conducting their attacks and communicating them globally through digital technologies, combined with, in some cases, an awareness of counter-intelligence measures, largely enabled by Web 2.0. The Paris attackers displayed the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Flash Lidars have applications from Situational awareness, collision avoidance to improved battlefield visualization, line-of-sight analysis and urban warfare planning.

LiDAR vs Flash LiDAR technologies Courtesy wwwfosternavnet

LIDARs are rapidly gaining maturity as very capable sensors for a number of applications such as imaging through clouds, vegetation and camouflage, 3D mapping and terrain visualization, meteorology, navigation, and obstacle avoidance for robotics as well as weapon guidance. LIDAR…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China emerging as new Quantum leader after series of breakthroughs driven by Industry

Chinaquantcomp

In 2016, President Xi Jinping established a national strategy for China to become technologically self-reliant. One of China’s main goals is to surpass the United States and to become the global high-tech leader.   China named quantum informatics a key…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here