As the focus of the US Army shifts from low intensity conflicts against guerrillas, non-state …
Read More »Masonry Layout
Biological Synthesis of Metallic Nanoparticles by Bacteria, Fungi and Plants can be utilized for electromagnetic pulse protection, according to US Army
Nanoparticles have unique thermal, optical, physical, chemical, magnetic and electrical properties compared to their bulk …
Read More »Skin patches to diagnose diseases, monitor soldiers’ health, and stress levels in combat
Biomedical sensors present an exciting opportunity to measure human physiologic parameters in a continuous, real-time, …
Read More »NATO planning advanced submarine sensing and hunting technologies for Russian ultra quiet submarines
Russia is seeking to further bolster its sub-surface capabilities, with new generations of conventional and …
Read More »DARPA launched submarine hunting platforms and technologies to track ultra-quiet as well as highly lethal submarines
Russia is seeking to further bolster its sub-surface capabilities, with new generations of conventional and …
Read More »Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia
United States opened a new line of combat against the Islamic State, directing the military’s …
Read More »In the era of Electronic, and Cyber Warfare, Pigeons still provide alternative mode to transfer massive amount of data securely
The homing pigeon is a variety of domestic pigeon (Columba livia domestica) derived from the …
Read More »Fake news is difficult to identify and fix, require new regulations and technologies for combating it.
Fake news or junk news or pseudo-news is a type of yellow journalism or propaganda …
Read More »Low‐Latency, Low‐Power technologies and communications devices are required for IoT Networks
The Internet-of-Things is an emerging revolution in the ICT sector under which interconnecting physical objects …
Read More »Cyber criminals favouring stealthier attacks like Cryptojacking to make free money
Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of …
Read More »