SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
An Infantry Combat Helmet - preliminary inquiry of the need for a
wireless intercom, and soldier location identification system, in a
Squad/Platoon level or inside troop carriers or tanks.
During my consulting assignment at Tadiran Telecom during the years 1981 to 1985 I
proposed a similar system based on very low frequency band that rides on the perimeter of
the battle field penetrates tranches and buildings. There were many technological obstacles
to overcome to gain full control of the inter-Squad or Platoon soldier communications which
I will not elaborate at this time. This one page proposal is indicative without many details.
Due to new advances in technology and exchange of e-mails with a high ranking military
official I re-evaluated the possibilities of such a system with technologies available today with
the use of digitation and photonic/infrared communication of quantum-correlated photon
pairs with digitized voice carriers. The technology was demonstrated in commercial CMOS
microelectronics and is presently an intensely researched subject since around 2003/5.
Quantum key distribution (QKD) is a secure communication method which implements a
cryptographic protocol involving components of quantum mechanics. It enables two parties
to produce a shared random secret key known only to them, which can then be used to
encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the
best-known. Example of a quantum cryptographic task is the DARPA Quantum network a 10-
node quantum key distribution network that has been running since 2004 in Massachusetts,
USA, and has been expanded to include a wireless link that uses quantum communications
codes. The wireless connection was installed by UK defense research company QinetiQ.
The proposed system, based on infantry guidelines of fighting war procedures within
trenches or urban areas or buildings will save lives, mostly from friendly fire or inaccurate
request of artillery support. There is a possibility that such systems already exist or where
already developed, for the military at the Squad/Platoon level and if not they should.
The proposed system will be based on 3 main principles which are (i) Squad or Platoon
soldier identification and his location on the battle field by special transponders visible to the
Company commander and above on their battle field computer screens, (ii) ability to have all
Squad or Platoon soldiers connected wirelessly to the Platoon Commander tactical radio
conversation on a listening choice (iii) ability to signal the technical failure of both systems
and possible the wounding of a Squad or Platoon soldier via the transponder which could
digitally deliver more information than the actual soldier location.
In summary the question raised are if such systems already exists, or are in development and
if the combat units are in need of such a system.
Attached are two original proposals and inquiries from my previous initiative during the 1981
to 1984 work at Tadiran Telecom of a wireless intercom within the Squad or Platoon future
combat helmet.
Sincerely yours January 20, 2017
Haim R. Branisteanu O3-523-2744

Más contenido relacionado

La actualidad más candente

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ijiert bestjournal
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networkssangitaholkar
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksCPqD
 
Scientific publications 5G
Scientific publications 5G Scientific publications 5G
Scientific publications 5G A F
 
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz SpectrumMillimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz SpectrumFarooq Khan
 
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into FriendsIoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into FriendsAMIHO Technology
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communicationSangita Das
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Seminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularSeminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularraghubraghu
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Alberto Los Santos Aransay
 
Millimeter wave technology for future wireless communication systems
Millimeter  wave  technology  for future wireless communication systemsMillimeter  wave  technology  for future wireless communication systems
Millimeter wave technology for future wireless communication systemsApurv Modi
 

La actualidad más candente (20)

ΑΜ_14212
ΑΜ_14212ΑΜ_14212
ΑΜ_14212
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G Networks
 
Scientific publications 5G
Scientific publications 5G Scientific publications 5G
Scientific publications 5G
 
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz SpectrumMillimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
 
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into FriendsIoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Seminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularSeminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellular
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
 
Femtocell Technology
Femtocell TechnologyFemtocell Technology
Femtocell Technology
 
Millimeter wave technology for future wireless communication systems
Millimeter  wave  technology  for future wireless communication systemsMillimeter  wave  technology  for future wireless communication systems
Millimeter wave technology for future wireless communication systems
 
Ivwc
IvwcIvwc
Ivwc
 

Similar a A preliminary inquiry

4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentationguestac67362
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...Yaroslav Domaratsky
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfYAAKOVSOLOMON1
 
07 paper journal wsn edit sat
07 paper journal wsn edit sat07 paper journal wsn edit sat
07 paper journal wsn edit satIAESIJEECS
 
Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Bryan Russell
 
Applications of communication system
Applications of communication systemApplications of communication system
Applications of communication systemAmi Goswami
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]MeshDynamics
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communicationsIT2Alcorn
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfssuserc77a341
 

Similar a A preliminary inquiry (20)

4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
 
07 paper journal wsn edit sat
07 paper journal wsn edit sat07 paper journal wsn edit sat
07 paper journal wsn edit sat
 
Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016
 
Applications of communication system
Applications of communication systemApplications of communication system
Applications of communication system
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research Statement
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communications
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
 

Más de Haim R. Branisteanu

Description of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdfDescription of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdfHaim R. Branisteanu
 
Cultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdfCultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdfHaim R. Branisteanu
 
IAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdfIAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdfHaim R. Branisteanu
 
Return to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdfReturn to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdfHaim R. Branisteanu
 
Subjects of proposed discussion with michael oren
Subjects of proposed discussion with michael orenSubjects of proposed discussion with michael oren
Subjects of proposed discussion with michael orenHaim R. Branisteanu
 
The committee for shabbat electricity
The committee for shabbat electricityThe committee for shabbat electricity
The committee for shabbat electricityHaim R. Branisteanu
 
Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable Haim R. Branisteanu
 
The subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy fieldThe subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy fieldHaim R. Branisteanu
 
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney GeneralResponse Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney GeneralHaim R. Branisteanu
 
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and  Oppenheimer & Co LBO proposalLithium Batteries of Tadiran and  Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposalHaim R. Branisteanu
 

Más de Haim R. Branisteanu (20)

Description of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdfDescription of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdf
 
Cultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdfCultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdf
 
IAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdfIAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdf
 
Travel meeting US Army.pdf
Travel meeting US Army.pdfTravel meeting US Army.pdf
Travel meeting US Army.pdf
 
Recommendation NYC Prof.pdf
Recommendation NYC Prof.pdfRecommendation NYC Prof.pdf
Recommendation NYC Prof.pdf
 
Return to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdfReturn to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdf
 
Anatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdfAnatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdf
 
Donetsk Energy Commision.pdf
Donetsk Energy Commision.pdfDonetsk Energy Commision.pdf
Donetsk Energy Commision.pdf
 
Donetsk Rada.pdf
Donetsk Rada.pdfDonetsk Rada.pdf
Donetsk Rada.pdf
 
Providing water to Jordan
Providing water to Jordan Providing water to Jordan
Providing water to Jordan
 
To ilim ceo ksenia sosnina
To ilim ceo ksenia sosninaTo ilim ceo ksenia sosnina
To ilim ceo ksenia sosnina
 
Subjects of proposed discussion with michael oren
Subjects of proposed discussion with michael orenSubjects of proposed discussion with michael oren
Subjects of proposed discussion with michael oren
 
Mrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyenMrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyen
 
The committee for shabbat electricity
The committee for shabbat electricityThe committee for shabbat electricity
The committee for shabbat electricity
 
Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable
 
List of outstanding designs
List of outstanding designsList of outstanding designs
List of outstanding designs
 
The subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy fieldThe subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy field
 
The energy fuels
The energy fuelsThe energy fuels
The energy fuels
 
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney GeneralResponse Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
 
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and  Oppenheimer & Co LBO proposalLithium Batteries of Tadiran and  Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

A preliminary inquiry

  • 1. An Infantry Combat Helmet - preliminary inquiry of the need for a wireless intercom, and soldier location identification system, in a Squad/Platoon level or inside troop carriers or tanks. During my consulting assignment at Tadiran Telecom during the years 1981 to 1985 I proposed a similar system based on very low frequency band that rides on the perimeter of the battle field penetrates tranches and buildings. There were many technological obstacles to overcome to gain full control of the inter-Squad or Platoon soldier communications which I will not elaborate at this time. This one page proposal is indicative without many details. Due to new advances in technology and exchange of e-mails with a high ranking military official I re-evaluated the possibilities of such a system with technologies available today with the use of digitation and photonic/infrared communication of quantum-correlated photon pairs with digitized voice carriers. The technology was demonstrated in commercial CMOS microelectronics and is presently an intensely researched subject since around 2003/5. Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the best-known. Example of a quantum cryptographic task is the DARPA Quantum network a 10- node quantum key distribution network that has been running since 2004 in Massachusetts, USA, and has been expanded to include a wireless link that uses quantum communications codes. The wireless connection was installed by UK defense research company QinetiQ. The proposed system, based on infantry guidelines of fighting war procedures within trenches or urban areas or buildings will save lives, mostly from friendly fire or inaccurate request of artillery support. There is a possibility that such systems already exist or where already developed, for the military at the Squad/Platoon level and if not they should. The proposed system will be based on 3 main principles which are (i) Squad or Platoon soldier identification and his location on the battle field by special transponders visible to the Company commander and above on their battle field computer screens, (ii) ability to have all Squad or Platoon soldiers connected wirelessly to the Platoon Commander tactical radio conversation on a listening choice (iii) ability to signal the technical failure of both systems and possible the wounding of a Squad or Platoon soldier via the transponder which could digitally deliver more information than the actual soldier location. In summary the question raised are if such systems already exists, or are in development and if the combat units are in need of such a system. Attached are two original proposals and inquiries from my previous initiative during the 1981 to 1984 work at Tadiran Telecom of a wireless intercom within the Squad or Platoon future combat helmet. Sincerely yours January 20, 2017 Haim R. Branisteanu O3-523-2744