Terahertz (THz, 1012 Hz) technology is based on light sources with frequencies much lower than …
Read More »Masonry Layout
Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance
The rise of the digital era has brought with it many wondrous changes to our …
Read More »Optical processors for high performance and energy efficient computing for data centres and supercomputers
Moore’s Law which stated that the number of transistors on a chip will double approximately …
Read More »DARPA SAFE-SiM developing theater-wide, multi-domain, mission level modeling & simulation tools for mosaic warfare
The emerging battlefield is a multi-domain battlefield which shall include all the traditional domains of …
Read More »Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions
Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle …
Read More »Project Maven accelerated weaponizing Artificial Intelligence for the US military, was it used to kill Iran’s nuclear scientist
DoD collects loads of data from satellites, drones and Internet-of-things devices. But it needs help …
Read More »US Navy thrust on preventative maintenance & prognostics-based approach to increase operational availability or mission success of Naval fleet or battlegroup
One of the major objectives of the military is to achieve high reliability and operational …
Read More »Cellulose nanopaper promising for green electronics, green vehicles, energy harvesting and optical sensing
In recent years, nanomaterials have displayed potential in effective detection and removal of greenhouse gases, …
Read More »Graphene enables room temperature single photon emitter and detector for unhackable Quantum Key Cryptography (QKD)
Quantum Key Distribution, or QKD, enables two remote parties, “Alice” and “Bob”, who are connected …
Read More »US, Israel and India require new Tunnel Detection and neutralization technologies to stop drug and weapon smuggling, human trafficking, and cross border terrorism
Criminals, terrorists and military have been using tunnels since long time to evade detection as …
Read More »