Category Critical & Emerging Technologies

New technologies enable Very Long Range Air-to-Air missiles to reach targets at longer ranges, with heavier payloads and with greater precision

Airtoairmissiles

The Air-to-Air Missile (AAM) is a potent guided missile that changed the shape of aerial combat forever. Capable of destroying fast and maneuverable jet fighters at ranges sometimes exceeding 100 kilometers, these high-tech weapons dominate the skies. The  probability of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Error-correction in Quantum Computers using Machine learning and Neural Networks proving successful strategy

quantummachinelearn

‘The development of a “quantum computer” is one of the outstanding technological challenges of the 21st century. A quantum computer is a machine that processes information according to the rules of quantum physics, which govern the behaviour of microscopic particles…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Niobium is one of the strategic minerals Deemed Critical to U.S. National Security and the Economy

niobium

The Department of the Interior published on May 18, 2018, a list of 35 mineral commodities considered critical to the economic and national security of the United States. These minerals have been designated as critical to the US’s national interest…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Beyond CMOS or More Moore technologies to power Next Generation Computers, communications, industrial and Defense Systems

beyondcmos

In 1965 R&D Director at Fairchild (and later Intel co-founder) Gordon Moore predicted continued systemic declines in cost and increase in performance of integrated circuits in his paper “Cramming more components onto integrated circuits.”Moore’s Law which stated that the number…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s PREEMPT to predict next pandemic due to Zoonotic Viruses like COVID-19 and plan proactive interventions

preparedness prediction and prevention of emerging zoonotic viruses with pandemic potential using multidisciplinary approaches sylvie van der werf 5 638

In recent weeks, concern over the emergence of a novel coronavirus in China has grown exponentially as media, experts and government officials around the world have openly worried that this new disease has the potential to develop into a global…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Next Quantum Cryptology (QKD) revolution is Quantum Communications between Drone and ground and between drones

QKDdrone

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Helicopter technology developments and trends driven by their rising employment in civil and military missions

helicopter

The helicopter is a type of aircraft which is lifted and propelled by one or more sets of horizontally revolving overhead rotors.  It has two rotors that spin several blades. A blade is a tilted airfoil, just like an airplane…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Modern Bigdata Battlefield requires rugged commercial-off-the-shelf (COTS) Computers and Servers

ruggedcomputers

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Modern ICT devices can provide  “information superiority” to military by providing information with  greater timeliness, relevance, accuracy, and comprehensiveness than…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New radar imaging chips enable Through the wall imaging or Wall-penetrating radar on Android smartphones

TWIR

Security forces require effective ground ISR technologies that can overcome these challenges and provide effective situational awareness. One of the technologies useful in such situations is through-wall imaging which apply radio frequency (RF) and other sensing modes to penetrate wall…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

LIDAR proving to be a valuable sensor for Smarter space management, Infrastructure monitoring, Security and Disaster Response

lidarappliactions

Lidars (Light Detection and Ranging) are similar to radars in that they operate by sending light pulses to the targets and calculate distances by measuring the received time.  The  key advantages of  LIDAR is  its superior accuracy and its ability…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here