Category Critical & Emerging Technologies

Generative adversarial networks or dueling Neural Networks can bestow AI systems with “imagination” and also poison AI defences

advanced deep architectures d2l6 deep learning for speech and language upc 2017 46 638

Most AI advances and applications are based on a type of algorithm known as machine learning that finds and reapplies patterns in data. Deep learning, a powerful subset of machine learning, uses neural networks to find and amplify even the smallest…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Magneto resistive materials enable ultrasensitive magnetic field sensors, brain-like computing chips and 3D magnetic memory

magnetoresistance

Magneto resistor is a type of resistor whose resistance changes when an external magnetic field is applied. In other words, the flow of electric current through the magneto resistor changes when an external magnetic field is applied to it.  …...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising employment of millimetre or EHF based radars, communications and seekers by Military creating new electronic warfare challenges

Whyconsidermillimetrewaveradar

The advancement of Sensors, Communications and Radars have given rise to Electronic Warfare, which encompasses, in all battle phases, military actions involving the use of EM energy to determine, exploit, reduce or prevent hostile use of EM spectrum and the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Naval Combat and Combat Management Systems (NCMS) being upgraded to handle new maritime security threats

ElbiNCMS

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries developing Multidomain Command and Control (MDC2) technologies including interoperable wideband line-of-sight radio communications for land, sea and satellite links

airpower seapower cropped

The emerging battlefield is a multi-domain battlefield which shall include all the traditional domains of land, air and sea as well as Cyber, Space, Low Intensity conflicts, Information warfare including Psychological warfare and cognitive warfare shall be exploited by our…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Navy biologists creating GM bacteria capable of detecting enemy ships and submarines.

010318 MT bacteria feat

US Naval Research Laboratory (Naval Research Laboratory, NRL)  has  allocated $ 45 million for the implementation of a program to study the prospects for the use of genetic engineering for the navy. Part of the program was the development of genetically…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Researchers looking to fishes for designing biomimetic systems for flexible Armor, faster aircraft and camouflaging skin

fisharmor

It was in the oceans that life first evolved and where complex animals have thrived for over 600 million years. Marine animals survive in environments as diverse as tropical coral reefs, polar ice-capped oceans, and the lightless abyssal depths, says…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Video virtualization and AI for near real-time actionable intelligence needed to identify and mitigate defense and security threats

videovirtualization

Police agencies are  using facial and object recognition technology for counterterrorism operations. Video footage  played a key role in finding the culprits responsible for the November 2015 Paris attacks, with a CCTV video at Brussels airport used to pin down…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing Underwater LIDAR imaging systems for rapid wide-area anti-mine and anti-submarine operations

LMDS

Currently, the most widely used technology to detect underwater objects  is sound navigation and ranging (SONAR), because acoustic waves can  penetrate the water depths to the bottom of the sea. SONAR also suffers from unwanted multipass echoes that are due…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The emerging field of phonon management allow novel phononic materials and devices to control sound and heat.

phonon

The phonon is the physical particle representing mechanical vibration and is responsible for the transmission of everyday sound and heat. Understanding and controlling the phononic properties of materials provides opportunities to thermally insulate buildings, reduce environmental noise, transform waste heat…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here