To stay healthy, we need to pay not only close attention to what is in the food we eat and the water we drink but also the quality of the air we breathe. The air we breathe both indoors and out can directly impact our health, quality of life, and …
Read More »Growing collision risk to commercial shipping and unmanned surface vehicle (USV) , call for new technologies to improve Safe Navigation
The seas are becoming increasingly congested, with the IFT Transport Outlook 2019 predicting that demand for maritime trade could triple within the next 30 years. A large number of ships raises the chances of the collision. Although the number of serious collisions has fallen within the past decade with 132 …
Read More »Ground-penetrating radar for Autonomous driving, to detection of Tunnel, landmine and buried IEDs
Radar is an electromagnetic sensor used for detecting, locating, tracking, and recognizing objects of various kinds at considerable distances. It operates by transmitting electromagnetic energy toward objects, commonly referred to as targets, and observing the echoes returned from them. Energy is emitted in various frequencies and wavelengths from large wavelength radio …
Read More »Cyber threats to critical Infrastructure (CII) require Effective Cyber Incident Response plan at National level
Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted cyber activities. Cyber-attacks are continuously growing in size and …
Read More »Homeland security threats and Counter Terror & Public Safety Technology Market
Today’s terrorist landscape is more fluid and complex than ever influenced by economic and social conditions that breed extremism and the threat landscape is less predictable. The Countries face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and tactics across physical and cyber …
Read More »Non-Line-of-Sight Imaging can be transformative in medicine, robotics, manufacturing, and security
We see things because our eyes are sophisticated light detectors: they constantly capture the light rays bouncing off nearby objects so our brain can construct an ever-changing impression of the world around us. Similarly in a camera, All the light traveling from the object enters a single lens before it …
Read More »Health impacts of Radionuclides in Drinking Water and technology solutions to remove them
Radionuclides are types of atoms that are radioactive. The most common radionuclides in drinking water are radium, radon and uranium. Radionuclides occur naturally as trace elements in rocks and soils as a consequence of the “radioactive decay” of uranium-238 (U-238) and thorium-232 (Th-232). As these rocks weather, the resulting clays …
Read More »New Physical and behavioral Biometrics technologies with increased accuracy and security being developed
Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from consumers in 2021, a nearly 27% increase over the 2.2 …
Read More »New Airport Security technology breakthroughs combatting increasingly complex threat environment
Commercial aviation plays a central role in our daily lives and is an essential part of the national economy. More than 100,000 flights take off and land every day across the world. More than billion passengers go by air every year as do over 20 million tonnes of freight. It …
Read More »DOD looks to secure Content delivery Network (CDN) services to stream its mission-critical and sensitive information
A Content Delivery Network (CDN) is a globally distributed network of web servers or Points of Presence (PoP) whose purpose is to provide faster content delivery. The content is replicated and stored throughout the CDN so the user can access the data that is stored at a location that is …
Read More »