Category Critical & Emerging Technologies

Next generation Military Communications technologies enabling high-throughput mobile, secure, survivable, seamless, in congested and contested environments

Military Communications Market 1

Communications is vital for War fighters to exchange voice and data, command and control and situational awareness data and video. The vision of Communications area is to provide reliable communication from anywhere to everywhere from war fighters to supreme commander…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Extremely Low Frequency and Very Low Frequency (ELF/VLF ) Communications for Underground, Underwater, and Hypersonic Flight

VLFatPalmer

Radio frequency (RF) technologies have limitations that cannot fulfill specific requirements. For instance, underground and underwater are challenging environments due to the absorption of high frequency electromagnetic (EM) waves in dense media. For hypersonic communications, Very Low Frequencies (VLF) band…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Future Digital soldiers capabilities: Invisibility, Mind controlled Exoskeletons, Targeting lasers, Smart glasses, Wearable Biosensors, UAV equipped

future soldier1

In an era where technology is the key driver enhancing capabilities across the military, the soldier remains as crucial as ever for achieving mission success. Some of the missions the soldiers perform can take weeks, away from in difficult terrain…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing autonomous, Networked Swarms of Munitions or collaborative weapons

munitionswarm

Current weapons generally fly a pre-designated mission. If the enemy does something unexpected, preprogrammed weapons are ineffective, and additional weapons may be required to complete the mission. Autonomous, Networked, and  collaborative weapons are advantageous since they observe and react to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s DyNAMO and C2E demonstrated Secure, Jam Resistant and Adaptable Airborne Networks for Collaborative team of Manned & Unmanned Platforms

f75f45065e491a3adc61e72a384867bb

Chinese military has been engaged in comprehensive modernization of  its air, naval, and ground forces, while incorporating a variety of anti-access/area denial (A2/AD) systems and capabilities.  “To operate against adversaries with “anti-access / area denial” capabilities the U.S. needs to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising CBRN threats require Decontamination solutions and Technologies for soldiers, military equipment and vehicles

CBRNdecontamination scaled

According to the University of Maryland’s Global Terrorism Database, there were a total of 143 attacks – 35 biological, 95 chemical, and 13 radiological – using CBRN weapons across the world from 1970 to 2014. The relative ease with which…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Ultra secure, Quantum Communications using Quantum Key Cryptography (QKD) for Underwater Vehicles and Submarines critical to maintain nuclear deterrence capability

daf30d03da42a5291604b3fcca07f0d0

Underwater communication is vital for undersea exploitation and modern communication. Conventional ways which employ acoustical technique for underwater communication have their drawbacks  including high path loss, narrow bandwidth, high bit error rate, among which unconditional security is more demanding due to commercial and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Machine learning enable designing new Metamaterials with desired property in days

deepmetamaterial

Metamaterials are artificially structured materials designed to control and manipulate physical phenomena such as light and other electromagnetic waves, sound waves and seismic waves in unconventional ways, resulting in exotic behavior that’s not found in nature. They are predicted to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Nuclear Waste require new storage, reprocessing and mitigation technologies

nuclearwaste

Nuclear power—with its high energy density and low carbon footprint—is a source with which the international community has decades of experience. However, the challenges that come along with the technology have kept it from becoming a more dominant factor in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects

photoacoustics

Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here