SlideShare a Scribd company logo
1 of 20
SUBMITTED BY:
DEEPAK MITTAL
B.E. FINAL YEAR
COLLEGE OF TECHNOLOGY &
ENGINEERING,UDAIPUR
INTRODUCTION
 Future warfare compaigns will require more suitable
to achieve shock effect over large target sets with small
Attacking force
 Electromagnetic bombs (E-Bomb) can preform such a
role
 Developed by Dr. Carlo Kopp, Associate Fellow AIAA
And Freelence Defense Analyst
 It can destroy Power Grids,Electronics And Communication
System along an entire cost but spare human and other
Living species
 It is weapon of Electrical Mass
Disruption
 It is based on Electromagne-
tic Pulse Theory
 This weapon change magnetic
field which couple with electric
circuitry to produce damage
currents surges
AN ELECTROMAGNETIC PULSE WEAPON EMP IS
DESIGNED TO OVERWHELM THE ELECTRIC
CIRCUITRY WITH AN INTENSE ELECTRO
MAGNETIC FIELD
ELECTRIC CURRENT GENERATES MAGNETIC
FIELD AND CHANGING MAGNETIC FIELD IN TURN
GENERATES A CURRENT
AN INTENSE FLUCTUATING MAGNETIC FIELD CAN
PRODUCE A LARGE AMOUNT OF CURRENT WHICH
CAN BURN LOW POWER SEMI CONDUCTOR
DEVICES
BASIC IDEA
DESIGNING A E-BOMB
BASICALLY THERE ARE TWO METHODS
FOR DESIGNING A E-BOMB
1.FLUX COMPRESSION GENERATOR (FCG)
METHOD
2. VIRTUAL CATHODE OSCILLATOR (VIRCATOR)
 FCG IS A DEVICE WHICH CAN PRODUCE PEAK
OF ELECTRICAL ENERGIES OF MEGA JOULS IN
TENS TO HUNDREDS OF MICRO SECONDS OF
TIME.
IT CONSISTS OF :-
1) Power Supply
2) Explosive Pumped Copper Cylinder Surmounted by
Helical Colis
3) A Micro Wave Source
FCG METHOD
Events series when the bomb goes off:
 Capacitors connects to Stator  sets electrical current
through wires  Generates Intense Magnetic Field.
 Fuze mechanism ignites the explosive material  Explosion
travels as wave through the middle of the armature cylinder
OPERATION OF E-BOMB
Continued…
 Explosion passes through cylinder  Cylinder comes in
contact with stator winding  creates a short circuit 
cuts the stator off from its power supply.
 Moving short circuit compresses Magnetic Field 
generates Intense Electromagnetic burst.
 The principle of VIRACTOR is that of acceleraing a high
current electron beam against a mesh(or foil) anode
 Many electron will pass through the anode forming a bubble
of space charge behind the anode
 This space charge region will oscillate at microwave
frequencies. If the space charge region is placed into resonant
cavity which is appropriately tuned,very high peak powers may
be achived.
 The operating principle of VIRACTOR is more complex
than that of FCG METHOD
VIRACTOR METHOD
 Armature - copper tube / fast explosive
 Stator - helical heavy wire coil
 Initiator - plane wave explosive lense
 Jacket - prevents disintegration due magnetic forces
BOMB CAN BE DELIVERED THROUGH :-
1.CRUISE MISSILE
2.CONVENTIONAL AIRCRAFT
3. AIR TO AIR MISSILE
Delivery of E-bombs
TARGETING E-BOMB
 fixed installations
(buildings, radar and
comms sites ) -
conventional methods
 radiating mobile /
hidden targets (ships,
mobile SAMs) - use
ESM or ELS
 non radiating mobile /
hidden targets - use
Unintentional Emissions
(UE)
IT WOULD TEMPORARILY JAM ELECTRONICS SYSTEMS ,MORE
INTENSE PULSES WOULD CORRUPT IMPORTANT COMPUTER
DATA AND VERY POWERFUL BURSTS WOULD COMPLETE FRY
ELECTRICAL AND ELECTRONIC EQUIPMENTS.
AN E-BOMB COULD EFFECTIVELY NEUTRALIZE:-
• Vehicle control systems
• Targeting systems, on the ground and on missiles and
bombs
 Communications systems
•Navigation systems
 Long and short-range sensor systems
DEFENCE AGAINST BOMB
 convert computer
rooms in to Faraday
cages
 use optical fibers for
data
 isolate power feeds
with transient arrestors
 use electromagnetic
“air lock”
 shielding must be
comprehensive
 Means of implementing E-Bombs are difficult.
 Means of delivery constrain the accuracy of weapon.
 Atmospheric propagation of waves.
 Difficult kill assessment
LIMITATATION
 Offers a very high payoff in attacking the fundamental
information processing and communication facilities
 E-bombs can cause hard electrical kills over larger
areas than conventional explosives
 Measures should be taken to safeguard against
future attacks
Deepak e bomb
Deepak e bomb

More Related Content

What's hot

Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bombrj246
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORTAnkit Vij
 
Directed Energy Weapons
Directed Energy WeaponsDirected Energy Weapons
Directed Energy Weaponspriya jain
 
Electromagnetic pulse weapons
Electromagnetic pulse weapons  Electromagnetic pulse weapons
Electromagnetic pulse weapons asalmoezi
 
Seminar report on directed energy weapons
Seminar report on directed energy weaponsSeminar report on directed energy weapons
Seminar report on directed energy weaponsVishal Bait
 
Nuclear micro battery
Nuclear micro batteryNuclear micro battery
Nuclear micro batteryVishnu M T
 
MICROWAVE POWER TRANSMISSIONS
MICROWAVE POWER TRANSMISSIONSMICROWAVE POWER TRANSMISSIONS
MICROWAVE POWER TRANSMISSIONSSubhankar Ghosh
 
Wireless power-transmission-using-microwave
Wireless power-transmission-using-microwaveWireless power-transmission-using-microwave
Wireless power-transmission-using-microwaveJawad Usman
 
A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesCongressional Budget Office
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmissionUday Wankar
 
Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Hossam Zein
 
Wireless power transmission1
Wireless power transmission1Wireless power transmission1
Wireless power transmission1Shubham Jain
 
Wireless power transfer seminar ppt
Wireless power transfer seminar ppt  Wireless power transfer seminar ppt
Wireless power transfer seminar ppt Niharikamysoreramaku
 

What's hot (20)

Emp Bomb
Emp BombEmp Bomb
Emp Bomb
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
E bomb
E bombE bomb
E bomb
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
The E-Bomb
The E-BombThe E-Bomb
The E-Bomb
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORT
 
Directed Energy Weapons
Directed Energy WeaponsDirected Energy Weapons
Directed Energy Weapons
 
Electromagnetic pulse weapons
Electromagnetic pulse weapons  Electromagnetic pulse weapons
Electromagnetic pulse weapons
 
Seminar report on directed energy weapons
Seminar report on directed energy weaponsSeminar report on directed energy weapons
Seminar report on directed energy weapons
 
Nuclear micro battery
Nuclear micro batteryNuclear micro battery
Nuclear micro battery
 
MICROWAVE POWER TRANSMISSIONS
MICROWAVE POWER TRANSMISSIONSMICROWAVE POWER TRANSMISSIONS
MICROWAVE POWER TRANSMISSIONS
 
WIRELESS POWER TRANSMISSION USING MICROWAVE
WIRELESS POWER TRANSMISSION USING MICROWAVEWIRELESS POWER TRANSMISSION USING MICROWAVE
WIRELESS POWER TRANSMISSION USING MICROWAVE
 
Wireless power-transmission-using-microwave
Wireless power-transmission-using-microwaveWireless power-transmission-using-microwave
Wireless power-transmission-using-microwave
 
A Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and AlternativesA Presentation About U.S. Hypersonic Weapons and Alternatives
A Presentation About U.S. Hypersonic Weapons and Alternatives
 
Military missiles
Military missilesMilitary missiles
Military missiles
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmission
 
Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Directed Energy Weapons 2/2
Directed Energy Weapons 2/2
 
Wireless power transmission1
Wireless power transmission1Wireless power transmission1
Wireless power transmission1
 
Wireless power transfer seminar ppt
Wireless power transfer seminar ppt  Wireless power transfer seminar ppt
Wireless power transfer seminar ppt
 
Chapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering IntroductionChapter 01- High Voltage Engineering Introduction
Chapter 01- High Voltage Engineering Introduction
 

Viewers also liked

Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applicationsGowtham MG
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Flywheel Energy Storage System
Flywheel Energy Storage SystemFlywheel Energy Storage System
Flywheel Energy Storage SystemHarshal Bhatt
 
Flywheel Energy Storage Systeems
Flywheel Energy Storage SysteemsFlywheel Energy Storage Systeems
Flywheel Energy Storage SysteemsAvinash Sengar
 
Energy harvesting using nano leaves
Energy harvesting using nano leavesEnergy harvesting using nano leaves
Energy harvesting using nano leavesMNNIT ALLAHABAD
 
Flywheel Energy Storage System
Flywheel Energy Storage SystemFlywheel Energy Storage System
Flywheel Energy Storage SystemSeminar Links
 
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...Frank Yan (Property of CM)
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03David Palella
 
Synopsis of 6 months industrial
Synopsis of 6 months industrialSynopsis of 6 months industrial
Synopsis of 6 months industrialLahsan Haque
 

Viewers also liked (16)

E bomb
E bombE bomb
E bomb
 
Nanoleaves
NanoleavesNanoleaves
Nanoleaves
 
Electrical bomb
Electrical bombElectrical bomb
Electrical bomb
 
Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applications
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Flywheel Energy Storage System
Flywheel Energy Storage SystemFlywheel Energy Storage System
Flywheel Energy Storage System
 
Flywheel Energy Storage Systeems
Flywheel Energy Storage SysteemsFlywheel Energy Storage Systeems
Flywheel Energy Storage Systeems
 
Energy harvesting using nano leaves
Energy harvesting using nano leavesEnergy harvesting using nano leaves
Energy harvesting using nano leaves
 
Flywheel Energy Storage System
Flywheel Energy Storage SystemFlywheel Energy Storage System
Flywheel Energy Storage System
 
Nano leaves(1)
Nano leaves(1)Nano leaves(1)
Nano leaves(1)
 
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03
 
Synopsis of 6 months industrial
Synopsis of 6 months industrialSynopsis of 6 months industrial
Synopsis of 6 months industrial
 
Electronic bomb
Electronic bombElectronic bomb
Electronic bomb
 
Alumina nanotubes
Alumina nanotubesAlumina nanotubes
Alumina nanotubes
 
Solar tracking system - front page
Solar tracking system - front pageSolar tracking system - front page
Solar tracking system - front page
 

Similar to Deepak e bomb

e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfSrinidhirkGowda
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)MURALIDHAR R
 
Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.reshav kumar
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar reportDeepak Mittal
 
Eelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONEelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONAshutosh Uke
 
thee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxthee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxkarunyamittapally
 
WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...
 WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai... WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...
WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...SAMIULLAH SHAIKH
 
wireless electricity
wireless electricitywireless electricity
wireless electricitydinadhana
 
Wireless power transmission via solar power satellite(sps)
Wireless power transmission via solar power satellite(sps)Wireless power transmission via solar power satellite(sps)
Wireless power transmission via solar power satellite(sps)ShahinshaM
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionsachin karkera
 

Similar to Deepak e bomb (20)

e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
 
Electronics bomb
Electronics bombElectronics bomb
Electronics bomb
 
e bomb. ppt
e bomb. ppte bomb. ppt
e bomb. ppt
 
E bomb
E bombE bomb
E bomb
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
 
E Bomb
E BombE Bomb
E Bomb
 
Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Eelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONEelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPON
 
thee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxthee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptx
 
Presentation final
Presentation finalPresentation final
Presentation final
 
Lecture no.1 emi new
Lecture no.1 emi newLecture no.1 emi new
Lecture no.1 emi new
 
Why studyemt
Why studyemtWhy studyemt
Why studyemt
 
WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...
 WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai... WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...
WIRELESS TRANSMISSION METHODS DEVLOPEMENT AND POSSIBILITYIESSamiullah m shai...
 
wireless electricity
wireless electricitywireless electricity
wireless electricity
 
Ijecet 06 10_001
Ijecet 06 10_001Ijecet 06 10_001
Ijecet 06 10_001
 
Wireless power transmission via solar power satellite(sps)
Wireless power transmission via solar power satellite(sps)Wireless power transmission via solar power satellite(sps)
Wireless power transmission via solar power satellite(sps)
 
Presentation on WITRICITY
Presentation on WITRICITYPresentation on WITRICITY
Presentation on WITRICITY
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

Deepak e bomb

  • 1. SUBMITTED BY: DEEPAK MITTAL B.E. FINAL YEAR COLLEGE OF TECHNOLOGY & ENGINEERING,UDAIPUR
  • 2. INTRODUCTION  Future warfare compaigns will require more suitable to achieve shock effect over large target sets with small Attacking force  Electromagnetic bombs (E-Bomb) can preform such a role  Developed by Dr. Carlo Kopp, Associate Fellow AIAA And Freelence Defense Analyst  It can destroy Power Grids,Electronics And Communication System along an entire cost but spare human and other Living species
  • 3.  It is weapon of Electrical Mass Disruption  It is based on Electromagne- tic Pulse Theory  This weapon change magnetic field which couple with electric circuitry to produce damage currents surges
  • 4. AN ELECTROMAGNETIC PULSE WEAPON EMP IS DESIGNED TO OVERWHELM THE ELECTRIC CIRCUITRY WITH AN INTENSE ELECTRO MAGNETIC FIELD ELECTRIC CURRENT GENERATES MAGNETIC FIELD AND CHANGING MAGNETIC FIELD IN TURN GENERATES A CURRENT AN INTENSE FLUCTUATING MAGNETIC FIELD CAN PRODUCE A LARGE AMOUNT OF CURRENT WHICH CAN BURN LOW POWER SEMI CONDUCTOR DEVICES BASIC IDEA
  • 5. DESIGNING A E-BOMB BASICALLY THERE ARE TWO METHODS FOR DESIGNING A E-BOMB 1.FLUX COMPRESSION GENERATOR (FCG) METHOD 2. VIRTUAL CATHODE OSCILLATOR (VIRCATOR)
  • 6.  FCG IS A DEVICE WHICH CAN PRODUCE PEAK OF ELECTRICAL ENERGIES OF MEGA JOULS IN TENS TO HUNDREDS OF MICRO SECONDS OF TIME. IT CONSISTS OF :- 1) Power Supply 2) Explosive Pumped Copper Cylinder Surmounted by Helical Colis 3) A Micro Wave Source FCG METHOD
  • 7.
  • 8. Events series when the bomb goes off:  Capacitors connects to Stator  sets electrical current through wires  Generates Intense Magnetic Field.  Fuze mechanism ignites the explosive material  Explosion travels as wave through the middle of the armature cylinder OPERATION OF E-BOMB
  • 9. Continued…  Explosion passes through cylinder  Cylinder comes in contact with stator winding  creates a short circuit  cuts the stator off from its power supply.  Moving short circuit compresses Magnetic Field  generates Intense Electromagnetic burst.
  • 10.  The principle of VIRACTOR is that of acceleraing a high current electron beam against a mesh(or foil) anode  Many electron will pass through the anode forming a bubble of space charge behind the anode  This space charge region will oscillate at microwave frequencies. If the space charge region is placed into resonant cavity which is appropriately tuned,very high peak powers may be achived.  The operating principle of VIRACTOR is more complex than that of FCG METHOD VIRACTOR METHOD
  • 11.
  • 12.  Armature - copper tube / fast explosive  Stator - helical heavy wire coil  Initiator - plane wave explosive lense  Jacket - prevents disintegration due magnetic forces
  • 13. BOMB CAN BE DELIVERED THROUGH :- 1.CRUISE MISSILE 2.CONVENTIONAL AIRCRAFT 3. AIR TO AIR MISSILE Delivery of E-bombs
  • 14. TARGETING E-BOMB  fixed installations (buildings, radar and comms sites ) - conventional methods  radiating mobile / hidden targets (ships, mobile SAMs) - use ESM or ELS  non radiating mobile / hidden targets - use Unintentional Emissions (UE)
  • 15. IT WOULD TEMPORARILY JAM ELECTRONICS SYSTEMS ,MORE INTENSE PULSES WOULD CORRUPT IMPORTANT COMPUTER DATA AND VERY POWERFUL BURSTS WOULD COMPLETE FRY ELECTRICAL AND ELECTRONIC EQUIPMENTS. AN E-BOMB COULD EFFECTIVELY NEUTRALIZE:- • Vehicle control systems • Targeting systems, on the ground and on missiles and bombs  Communications systems •Navigation systems  Long and short-range sensor systems
  • 16. DEFENCE AGAINST BOMB  convert computer rooms in to Faraday cages  use optical fibers for data  isolate power feeds with transient arrestors  use electromagnetic “air lock”  shielding must be comprehensive
  • 17.  Means of implementing E-Bombs are difficult.  Means of delivery constrain the accuracy of weapon.  Atmospheric propagation of waves.  Difficult kill assessment LIMITATATION
  • 18.  Offers a very high payoff in attacking the fundamental information processing and communication facilities  E-bombs can cause hard electrical kills over larger areas than conventional explosives  Measures should be taken to safeguard against future attacks