Home / Defense & Military (page 91)

Defense & Military

Countries led by Russia, US and China employing Supercavitation technologies to develop supersonic Submarines, Vessels, and Torpedoes

One of the biggest problems with trying to get torpedos to travel faster is the fact that water is a thousand more times dense than air, so in order to overcome that resistance researchers have had to try a variety of different techniques. One of the  phenomenon called supercavitation uses …

Read More »

Sense and Avoid (SAA) technologies for Safe integration of Unmanned Aircraft Systems (UAS) into Civil Airspace

Unmanned Aerial Vehicles (UAVs) are growing at frentic pace driven by civil, consumer and military requirements. In order for a UAS to safely navigate in the already crowded aerial environment of the modern world, the U.S. Federal Aviation Administration (FAA) and other international organizations have mandated that unmanned aircraft must …

Read More »

DARPA Launch Challenge to enable US DOD’s Operationally Responsive Space (ORS) strategy for Space warfare

Military today is more reliant on space than ever before including ISR, Electronic warefare, Communications, Command and control and ballistic Missile defence. The joint warfighter uses space to satisfy an ever expanding and diverse set of requirements such as  cutting the fog and friction of war or to enable net-centric …

Read More »

Military developing Free Space Optical(FSO) or Laser communications for ultrafast secure communications that are harder to detect and disrupt

Free Space Optical or Laser communications is creating a new communications revolution, that by using visible and infrared light instead of radio waves for data transmission  is providing  large bandwidth, high data rate, license free spectrum, easy and quick deployability,  low mass and  less power requirement. It also offers low …

Read More »

DARPA’s SHIELD developed technologies for secure reliable authentication for ICs subject to hardware Trojans, cloning, counterfeit or recycling in Military systems that pose critical National Security Risk

Outsourcing of integrated circuit (IC) and printed circuit board (PCB) design, fabrication, packaging, and testing have dramatically reduced the time and cost of product development. In doing so, this has enabled the widespread availability of microelectronics, which has indeed transformed modern life. However, unintended consequences include malicious design alteration (i.e., …

Read More »

New technologies enable Very Long Range Air-to-Air missiles to reach targets at longer ranges, with heavier payloads and with greater precision

The Air-to-Air Missile (AAM) is a potent guided missile that changed the shape of aerial combat forever. Capable of destroying fast and maneuverable jet fighters at ranges sometimes exceeding 100 kilometers, these high-tech weapons dominate the skies. The  probability of Aerial dogfights are becoming less in modern times, as US …

Read More »

US Army demonstrates Manned-Unmanned Teaming capability for gaining Air Superiority in A2/AD Environment

US military is facing increasingly Anti-access /Area denial environment, a set of overlapping military capabilities and operations designed to slow the deployment of U.S. forces to a region, reduce the tempo of those forces once there, and deny the freedom of action necessary to achieve military objectives . Unmanned Air …

Read More »

Raytheon’s Excalibur is all weather smart artillery that triples the range and can strike moving targets with high precision

The Excalibur smart artillery shell has a ruggedized Global Positioning System (GPS) satellite navigation receiver and uses satellite signals to help guide itself to its intended targets. It first was fielded in Iraq in 2007 for urban or complex-terrain engagements in which collateral damage must be kept to a minimum. …

Read More »

Rising threat of Social media as weapon to influence Politics, and sentiments and carry psychological warfare

The past several centuries have largely been defined by physical security threats, requiring a nation’s military to physically respond with whatever means they have available. But as explained by Isaiah Wilson III—president of Joint Special Operations University—today we face “compound security threats,” which include physical security threats as well as …

Read More »

Next Quantum Cryptology (QKD) revolution is Quantum Communications between Drone and ground and between drones

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if Eve attempts to intercept and measure Alice’s quantum transmissions, her …

Read More »
error: Content is protected !!