Home / Rajesh Uppal (page 262)

Rajesh Uppal

US Army working on Next generation swarms of hyper precision munitions that can penetrate A2/AD environment and hit a wide variety of dispersed targets

One of the most important developments in the history of twentieth century warfare has been the emergence of the precision weapon: the weapon which can be aimed and directed against a single target, relying on external guidance or its own guidance system. Launched from aircraft, ships, submarines, and land vehicles, …

Read More »

Military Wireless power transfer (WPT) technology to alleviate the battlefield battery burden for soldiers, manned and unmanned vehicles

Wireless power transfer (WPT) or wireless energy transmission is the transmission of electrical energy from a power source to a consuming device, without the use of discrete man-made conductors. WPT use wireless transmitter that uses any of time-varying electric, magnetic, or electromagnetic fields to convey energy to one or wore …

Read More »

More than Moore ( MtM) technologies required for Internet of Things and Next Generation Defense Systems

Moore’s Law which stated that the number of transistors on a chip will double approximately every two years has been the driver of semiconductor industry in boosting the complexity, computational performance and energy efficiency while reducing cost. It has led to substantial improvements in economic productivity and overall quality of …

Read More »

Tunable and multifunctional conformal antennas for stealth Aircrafts, Spacecrafts and other vehicular bodies

The protection of the environment and reduction of the environmental footprint of air transport is very demanding Among others, growing air traffic also significantly contributes to the emissions contributing to climate change and local air quality issues around airports. Very Ambitious goals of restricting CO2 emissions have been set which …

Read More »

DARPA’s AMEBA developing transmitters that could communicate through walls, undersea and underground environment

Modern day radio transmitters and receivers, the devices that uses electromagnetic wave signals to communicate through cellphones, radios and television, seem to be present everywhere.  The propagation of these electromagnetic waves has some limitation too,   Key among these is that radio frequency signals hit veritable and literal walls when they …

Read More »

Australia releases Defence Science and Technology plan for implementing its Air Force Strategy to transform to fifth-generation Air Force

Australian Airforce is making investments into range of state-of-the-art surveillance, command-and-control and combat platforms. This includes introduction of advanced capabilities such as the F-35A Lightning II, EA-18G Growler, P-8A Poseidon, the MQ-4C Triton, and space systems including a space situational radar and space telescope. Moreover, Navy and Army are currently …

Read More »

India develops Indigenous Light Combat Helicopter and buying Russian Kamov-226T that can operate at extremely high altitudes

During the 1999 Kargil War, operations of Indian Air Force to evict the intruding Pakistani soldiers from the Indian side of the border,  were hampered as the only combat helicopter, the Mi-35, couldn’t operate at extremely high altitudes. IAF had to tell the Army that it had no helicopters that …

Read More »

USAF developing Long range, Low-Cost Stealthy Drone to conduct ISR and strike missions in anti-access/area denial (A2/AD) environments

Air Force has released a rendering of what appears to be its vision for concept under the Low Cost Attritable Aicraft Technology (LCAAT) banner. The Low Cost Attritable Aircraft Technology (LCAAT) Initiative is aimed at developing a low cost attritable aircraft design and manufacturing concept costing less than $3M (without …

Read More »

Real-time behavioral analytics, new tool for detecting advanced external and internal Cyber threats and mental health, employed by Intelligence agencies to DOD

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially …

Read More »

New technologies being developed to detect and predict cognitive stress that can result in failure of military Missions

Soldiers often have to perform complex tasks in extreme conditions, sometimes approaching or exceeding the limits of their capabilities. Some of the missions the soldiers perform can take weeks, away from in difficult terrain like deserts and mountains which requires maintaining an incredibly high level of physical fitness. Around the …

Read More »
error: Content is protected !!