Home / Rajesh Uppal (page 241)

Rajesh Uppal

DARPA RFMLS exploiting Machine Learning to RF domain for Spectrum sharing and Military IOT systems security

The field of AI has experienced a renaissance fueled by modern data-driven Machine Learning (ML) techniques. In contrast to the expert-engineered processing and decision making of the previous generation of AI, ML-based techniques are able to learn to perform a task from raw sensory input.  ML techniques have advanced the fields …

Read More »

Internet of Living Things (IoLT), or “Internet of Bodies,” shall save lives and improve health while create new cybersecurity, and privacy concerns

The Internet-of-Things is an emerging revolution in the ICT sector under which there is shift from an “Internet used for interconnecting end-user devices” to an “Internet used for interconnecting physical objects that communicate with each other and/or with humans in order to offer a given service”. This includes everything from …

Read More »

MIlitaries demand 3D-Printing of Nano-structures and Nano-materials or combat 3-D printers that can manufacture sensors to obstacles, and fortifications on Battlefield

Nanomaterials are chemical substances or materials that are manufactured and used at a very small scale. Nanomaterial  is defined as a, ‘material with any external dimension in the nanoscale (size range from approximately 1 – 100 nm) or having internal structure or surface structure in the nanoscale’.  Nanomaterials are developed …

Read More »

Nanotechnology enhancing compactness, efficiency, and performance, of Terahertz devices

In the past, the frequency spectrum ranging from 0.3 to 3THz (or 300 to 3000GHz) was spoken as infamous “Terahertz Gap” as it lies between traditional microwave and infrared domains but remained “untouchable” via either electronic or photonic means. The conventional “transit-time-limited” electronic devices can hardly operate even at its …

Read More »

IARPA using Big Data Analytics to automatically discover Signals from Web Sources to Predict Cyber Attacks

Cyber crimes and attacks continue to expand exponentially and involving more and more advanced and sophisticated techniques to infiltrate corporate networks and enterprise systems. Types of attacks include advanced malware, zero day attacks and advanced persistent threats. Flawed software, the root of most program errors and security vulnerabilities, is a critical …

Read More »

DARPA’s PLINY & MUSE use Big Data on open-source software to remove software vulnerabilities and enhance reliability

During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct, especially at scale. Unfortunately, in spite of developers’ best efforts, …

Read More »

DARPA SeeMe to provide US warfighters on-demand access to timely imagery of their specific overseas location directly from a small satellite

Today, the lowest echelon members of the U.S. military deployed in remote overseas locations are unable to obtain on-demand satellite imagery in a timely and persistent manner for pre-mission planning. This is due to lack of satellite overflight opportunities, inability to receive direct satellite downlinks at the tactical level and …

Read More »

DARPA CODE developing swarming UAVs to defeat A2/AD environments

US military is facing increasingly Anti-access /Area denial environment,  a set of overlapping military capabilities and operations designed to slow the deployment of U.S. forces to a region, reduce the tempo of those forces once there, and deny the freedom of action necessary to achieve military objectives . “A2/AD capabilities …

Read More »

USAF’s BLU-129/Bs or VLCDW is a Carbon Fiber Bomb with very low collateral damage but also extraordinarily expensive

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels. Urban warfare is the only way the Islamic State of Iraq and Greater Syria will be defeated. Urban environments negate many traditional U.S. military …

Read More »

DARPA enhancing Military COTS system security by automatically deploying secure configurations of Components

The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch large distributed denial of service (DDoS) attacks on internet infrastructure, …

Read More »
error: Content is protected !!