AI is a field of computer science dedicated to the theory and development of computer systems that are able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, translation between languages, decision-making, and problem-solving. The commonly used AI techniques are Machine Learning (ML), including Artificial Neural Network(ANN) …
Read More »TimeLine Layout
June, 2020
-
20 June
AI/ML industry starting with Google’s TensorFlow has introduced numerous open source libraries and frameworks
In mathematics, a tensor is an algebraic object that describes a linear mapping from one set of algebraic objects to another. According to Ars Technica, “Basically, a tensor is a matrix of equations, instead of a matrix of pure numbers. Tensor mathematics is the manipulation of these equation matrices as …
Read More » -
20 June
Growing Threat of Biohacking or DNA Malware with development of DNA based Biocomputers and memories
Recently biocomputers are becoming feasible due to advancements in nanobiotechnology and Synthetic Biology. Biocomputers use systems of biologically derived molecules—such as DNA and proteins—to perform computational calculations. It is expected that the most significant advantage of the DNA chip will be parallel processing. Scientists are also using DNA for …
Read More » -
19 June
Tensors are becoming important tool in Warfare from modeling combat to detect military targets using Google’s TensorFlow
In mathematics, a tensor is an algebraic object that describes a linear mapping from one set of algebraic objects to another. According to Ars Technica, “Basically, a tensor is a matrix of equations, instead of a matrix of pure numbers. Tensor mathematics is the manipulation of these equation matrices as …
Read More » -
18 June
Nanogenerators or Nanotechnology enabled Energy harvesting technologies could soon power Smartphones, IoT sensors, biomedical implants and reduce the soldier’s load
Energy harvesting is the process of collecting low-level ambient energy and converting it into electrical energy to be used as a power source for miniaturized autonomous devices. Examples of this can be seen in structural health monitoring, smart packaging solutions, communication systems, transportation, air and aerospace vehicles, structural biology, robotics, …
Read More » -
17 June
Soldiers employing human Energy harvesting technologies including Backpack, knee kinetic and Heel-strike to power devices on the battlefield
The vision for the future soldier is to be combat effective and also highly mobile, adaptive, networked, sustainable with total battle space situation awareness and information assurance. Therefore, he is equipped with night- vision goggles, radios, smartphones, GPS, infrared sights, a laptop as well as batteries to power them. Some …
Read More » -
12 June
Molecular spintronics for could help make quantum computing a reality
Spintronics is an emerging field of nanoscale electronics whose central theme is the active manipulation of spin degrees of freedom of charge carriers in solid-state systems, in addition to their electronic charge used in traditional semiconductor electronics. Spintronics or spin electronics in contrast to conventional electronics uses the spin of electrons …
Read More » -
9 June
US Navy employs Airborne Laser Mine Detection System ( ALMDS) , and the Airborne Mine Neutralization System (AMNS) to search and destroy enemy’s mines
More than thirty countries produce mines, and twenty countries export them. Iran has reportedly laid several thousand naval mines, North Korea’s 50,000, China 100,000 or so, and Russia estimated quarter-million. Since World War II, sea mines have damaged or sunk four times more U.S. Navy ships than all other means …
Read More » -
8 June
Departments of Defense developed Cloud-based biosurveillance ecosystem to warn of coming pandemics
The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in short time. The release of Chemical, Biological, Radiological and Nuclear …
Read More » -
7 June
Intelligence agencies prepare for post quantum world when current public key cryptology will be easily broken by quantum Computers
Modern cryptography being used extensively for securing our internet payments, banking transactions, emails and even phone conversations use cryptographic algorithms based on public-key encryption, which is considered to be secure against attacks from modern computers. The development of quantum computers once seen as a remote theoretical possibility is now …
Read More »