Rajesh Uppal

Rajesh Uppal

Internet of Nano Things (IoNT) shall impact from Telecom & IT to homeland security to military

The Internet of Nano Things 18

By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability.  These devices shall comprise of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Navy found Faulty Welding in Submarine Missile Tubes, developing non-destructive weld inspection methods

weldproblem

In 2000, a Russian cruise-missile submarine — Kursk — sank, killing all 118 sailors on board. The Russian government concluded the ship sunk due to a faulty weld which caused a gas leak and led to an explosion.   The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Navies exploring Biomimetics, Bio-inspired mechanisms to improve military underwater sensing, control and communications systems

sealwhiskers

“It was in the oceans that life first evolved and where complex animals have thrived for over 600 million years. Marine animals survive in environments as diverse as tropical coral reefs, polar ice-capped oceans, and the lightless abyssal depths,” says…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Technology breakthroughs in GaN enabling large growth in Semiconductor devices market in Defence and Aerospace

GaNA

GaN is a semiconductor material that can amplify high power radio frequency signals efficiently at microwave frequencies  to enhance  a system’s range. Therefore it has become the technology of choice for high-RF power applications that require the transmission of signals over long distances such as EW, radar, base stations and satellite communications. The advantages of GaN-based devices stems largely from…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Vulnerabilities in 3D printing could be exploited for Cyber-Physical attacks and Cyber Warfare

3D opportunity risk management table2

3D printing or additive manufacturing is ongoing revolution in manufacturing with its potential to fabricate any complex object and is being utilized from aerospace components to human organs, textiles, metals, buildings and even food. Additive manufacturing, is defined by ASTM…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s SMISC program to identify misinformation or deception campaigns on Social Media and conduct its own propaganda campaigns

smisc n

The conditions under which our Armed Forces conduct operations are rapidly changing with the spread of blogs, social networking sites, and media‐sharing technology (such as YouTube), and further accelerated by the proliferation of mobile technology. Changes to the nature of conflict…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Future Blended Physical-Cyber Attack shall use multiple attack vectors to cause the mayhem, report anticipates 2M Fatalities

cse 2016 future of cyber security by matthew rosenquist 3 638

Governments, military forces and critical national infrastructure organisations typically deal with some of the most sophisticated cyber threats in use today. These cyber threats continue to grow in sophistication and automation, with attackers ranging from highly skilled and motivated organisations,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technology to fight human and drug smuggling across maritime borders

drug 1

One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Red teaming or penetration testing uncovers the vulnerabilities of an organisation, NEC develops automated tool

penetration testing execution phases 4 638

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Researchers developing efficient Vision Aided Navigation for UAV in GPS-Denied environments like building, underground or under the forest canopy

Diagram of vision aided relative navigation system also denoted as INS vision navigation

UAV navigation can be seen as a process that robots make a plan on how to safely and quickly reach the target location, which mostly relies on current environment and location. In order to successfully complete the scheduled mission, a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here