SlideShare a Scribd company logo
An Infantry Combat Helmet - preliminary inquiry of the need for a
wireless intercom, and soldier location identification system, in a
Squad/Platoon level or inside troop carriers or tanks.
During my consulting assignment at Tadiran Telecom during the years 1981 to 1985 I
proposed a similar system based on very low frequency band that rides on the perimeter of
the battle field penetrates tranches and buildings. There were many technological obstacles
to overcome to gain full control of the inter-Squad or Platoon soldier communications which
I will not elaborate at this time. This one page proposal is indicative without many details.
Due to new advances in technology and exchange of e-mails with a high ranking military
official I re-evaluated the possibilities of such a system with technologies available today with
the use of digitation and photonic/infrared communication of quantum-correlated photon
pairs with digitized voice carriers. The technology was demonstrated in commercial CMOS
microelectronics and is presently an intensely researched subject since around 2003/5.
Quantum key distribution (QKD) is a secure communication method which implements a
cryptographic protocol involving components of quantum mechanics. It enables two parties
to produce a shared random secret key known only to them, which can then be used to
encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the
best-known. Example of a quantum cryptographic task is the DARPA Quantum network a 10-
node quantum key distribution network that has been running since 2004 in Massachusetts,
USA, and has been expanded to include a wireless link that uses quantum communications
codes. The wireless connection was installed by UK defense research company QinetiQ.
The proposed system, based on infantry guidelines of fighting war procedures within
trenches or urban areas or buildings will save lives, mostly from friendly fire or inaccurate
request of artillery support. There is a possibility that such systems already exist or where
already developed, for the military at the Squad/Platoon level and if not they should.
The proposed system will be based on 3 main principles which are (i) Squad or Platoon
soldier identification and his location on the battle field by special transponders visible to the
Company commander and above on their battle field computer screens, (ii) ability to have all
Squad or Platoon soldiers connected wirelessly to the Platoon Commander tactical radio
conversation on a listening choice (iii) ability to signal the technical failure of both systems
and possible the wounding of a Squad or Platoon soldier via the transponder which could
digitally deliver more information than the actual soldier location.
In summary the question raised are if such systems already exists, or are in development and
if the combat units are in need of such a system.
Attached are two original proposals and inquiries from my previous initiative during the 1981
to 1984 work at Tadiran Telecom of a wireless intercom within the Squad or Platoon future
combat helmet.
Sincerely yours January 20, 2017
Haim R. Branisteanu O3-523-2744

More Related Content

What's hot

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ijiert bestjournal
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
sangitaholkar
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksCPqD
 
Scientific publications 5G
Scientific publications 5G Scientific publications 5G
Scientific publications 5G
A F
 
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz SpectrumMillimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Farooq Khan
 
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into FriendsIoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
AMIHO Technology
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
IJERA Editor
 
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Center for Transportation Research - UT Austin
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
Sangita Das
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
Sridhar Raghavan
 
Seminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularSeminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellular
raghubraghu
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
ijwmn
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
xG Technology, Inc.
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Alberto Los Santos Aransay
 
Femtocell Technology
Femtocell TechnologyFemtocell Technology
Femtocell Technology
ijiert bestjournal
 
Millimeter wave technology for future wireless communication systems
Millimeter  wave  technology  for future wireless communication systemsMillimeter  wave  technology  for future wireless communication systems
Millimeter wave technology for future wireless communication systems
Apurv Modi
 

What's hot (20)

ΑΜ_14212
ΑΜ_14212ΑΜ_14212
ΑΜ_14212
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
A Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G NetworksA Survey on Key Technology Trends for 5G Networks
A Survey on Key Technology Trends for 5G Networks
 
Scientific publications 5G
Scientific publications 5G Scientific publications 5G
Scientific publications 5G
 
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz SpectrumMillimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
Millimeter Wave Mobile Broadband: Unleashing 3-300 GHz Spectrum
 
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into FriendsIoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
IoT Needs Good Neighbours - Cognitive Radio Turns Enemies into Friends
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Seminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularSeminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellular
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
 
Femtocell Technology
Femtocell TechnologyFemtocell Technology
Femtocell Technology
 
Millimeter wave technology for future wireless communication systems
Millimeter  wave  technology  for future wireless communication systemsMillimeter  wave  technology  for future wireless communication systems
Millimeter wave technology for future wireless communication systems
 
Ivwc
IvwcIvwc
Ivwc
 

Similar to A preliminary inquiry

4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentationguestac67362
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
IJERA Editor
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...
Yaroslav Domaratsky
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
YAAKOVSOLOMON1
 
07 paper journal wsn edit sat
07 paper journal wsn edit sat07 paper journal wsn edit sat
07 paper journal wsn edit sat
IAESIJEECS
 
Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Bryan Russell
 
Applications of communication system
Applications of communication systemApplications of communication system
Applications of communication system
Ami Goswami
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
IJSRED
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
MeshDynamics
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
Seshagiri Rao Kornepati
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
MNIT Jaipur
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communicationsIT2Alcorn
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
ST Engineering iDirect
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
IRJET Journal
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
ssuserc77a341
 

Similar to A preliminary inquiry (20)

4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 
White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...White paper: Enhance mobility and driver experience with multihop data exchan...
White paper: Enhance mobility and driver experience with multihop data exchan...
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
 
07 paper journal wsn edit sat
07 paper journal wsn edit sat07 paper journal wsn edit sat
07 paper journal wsn edit sat
 
Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016Jon Russell's Employment Resume 2016
Jon Russell's Employment Resume 2016
 
Applications of communication system
Applications of communication systemApplications of communication system
Applications of communication system
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
Ziyuan Cai Research Statement
Ziyuan Cai Research StatementZiyuan Cai Research Statement
Ziyuan Cai Research Statement
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
 
Eidws 109 communications
Eidws 109 communicationsEidws 109 communications
Eidws 109 communications
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
 

More from Haim R. Branisteanu

Description of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdfDescription of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdf
Haim R. Branisteanu
 
Cultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdfCultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdf
Haim R. Branisteanu
 
IAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdfIAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdf
Haim R. Branisteanu
 
Travel meeting US Army.pdf
Travel meeting US Army.pdfTravel meeting US Army.pdf
Travel meeting US Army.pdf
Haim R. Branisteanu
 
Recommendation NYC Prof.pdf
Recommendation NYC Prof.pdfRecommendation NYC Prof.pdf
Recommendation NYC Prof.pdf
Haim R. Branisteanu
 
Return to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdfReturn to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdf
Haim R. Branisteanu
 
Anatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdfAnatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdf
Haim R. Branisteanu
 
Donetsk Energy Commision.pdf
Donetsk Energy Commision.pdfDonetsk Energy Commision.pdf
Donetsk Energy Commision.pdf
Haim R. Branisteanu
 
Donetsk Rada.pdf
Donetsk Rada.pdfDonetsk Rada.pdf
Donetsk Rada.pdf
Haim R. Branisteanu
 
Providing water to Jordan
Providing water to Jordan Providing water to Jordan
Providing water to Jordan
Haim R. Branisteanu
 
To ilim ceo ksenia sosnina
To ilim ceo ksenia sosninaTo ilim ceo ksenia sosnina
To ilim ceo ksenia sosnina
Haim R. Branisteanu
 
Subjects of proposed discussion with michael oren
Subjects of proposed discussion with michael orenSubjects of proposed discussion with michael oren
Subjects of proposed discussion with michael oren
Haim R. Branisteanu
 
Mrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyenMrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyen
Haim R. Branisteanu
 
The committee for shabbat electricity
The committee for shabbat electricityThe committee for shabbat electricity
The committee for shabbat electricity
Haim R. Branisteanu
 
Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable
Haim R. Branisteanu
 
List of outstanding designs
List of outstanding designsList of outstanding designs
List of outstanding designs
Haim R. Branisteanu
 
The subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy fieldThe subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy field
Haim R. Branisteanu
 
The energy fuels
The energy fuelsThe energy fuels
The energy fuels
Haim R. Branisteanu
 
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney GeneralResponse Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Haim R. Branisteanu
 
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and  Oppenheimer & Co LBO proposalLithium Batteries of Tadiran and  Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
Haim R. Branisteanu
 

More from Haim R. Branisteanu (20)

Description of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdfDescription of cultivating Duckweed Syllabus.pdf
Description of cultivating Duckweed Syllabus.pdf
 
Cultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdfCultivating various strains of Duckweed Syllabus.pdf
Cultivating various strains of Duckweed Syllabus.pdf
 
IAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdfIAF Appreciation Certificate June 23.pdf
IAF Appreciation Certificate June 23.pdf
 
Travel meeting US Army.pdf
Travel meeting US Army.pdfTravel meeting US Army.pdf
Travel meeting US Army.pdf
 
Recommendation NYC Prof.pdf
Recommendation NYC Prof.pdfRecommendation NYC Prof.pdf
Recommendation NYC Prof.pdf
 
Return to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdfReturn to the Middle Kingdom.pdf
Return to the Middle Kingdom.pdf
 
Anatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdfAnatoly Blyznyuk1.pdf
Anatoly Blyznyuk1.pdf
 
Donetsk Energy Commision.pdf
Donetsk Energy Commision.pdfDonetsk Energy Commision.pdf
Donetsk Energy Commision.pdf
 
Donetsk Rada.pdf
Donetsk Rada.pdfDonetsk Rada.pdf
Donetsk Rada.pdf
 
Providing water to Jordan
Providing water to Jordan Providing water to Jordan
Providing water to Jordan
 
To ilim ceo ksenia sosnina
To ilim ceo ksenia sosninaTo ilim ceo ksenia sosnina
To ilim ceo ksenia sosnina
 
Subjects of proposed discussion with michael oren
Subjects of proposed discussion with michael orenSubjects of proposed discussion with michael oren
Subjects of proposed discussion with michael oren
 
Mrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyenMrs. Ursula G. von der leyen
Mrs. Ursula G. von der leyen
 
The committee for shabbat electricity
The committee for shabbat electricityThe committee for shabbat electricity
The committee for shabbat electricity
 
Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable Improvement in electrical network stability meshed with renewable
Improvement in electrical network stability meshed with renewable
 
List of outstanding designs
List of outstanding designsList of outstanding designs
List of outstanding designs
 
The subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy fieldThe subjects of a presentation of new developments in the energy field
The subjects of a presentation of new developments in the energy field
 
The energy fuels
The energy fuelsThe energy fuels
The energy fuels
 
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney GeneralResponse Avi Licht 16 Dec 2015, the Office of Israel Attorney General
Response Avi Licht 16 Dec 2015, the Office of Israel Attorney General
 
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and  Oppenheimer & Co LBO proposalLithium Batteries of Tadiran and  Oppenheimer & Co LBO proposal
Lithium Batteries of Tadiran and Oppenheimer & Co LBO proposal
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

A preliminary inquiry

  • 1. An Infantry Combat Helmet - preliminary inquiry of the need for a wireless intercom, and soldier location identification system, in a Squad/Platoon level or inside troop carriers or tanks. During my consulting assignment at Tadiran Telecom during the years 1981 to 1985 I proposed a similar system based on very low frequency band that rides on the perimeter of the battle field penetrates tranches and buildings. There were many technological obstacles to overcome to gain full control of the inter-Squad or Platoon soldier communications which I will not elaborate at this time. This one page proposal is indicative without many details. Due to new advances in technology and exchange of e-mails with a high ranking military official I re-evaluated the possibilities of such a system with technologies available today with the use of digitation and photonic/infrared communication of quantum-correlated photon pairs with digitized voice carriers. The technology was demonstrated in commercial CMOS microelectronics and is presently an intensely researched subject since around 2003/5. Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the best-known. Example of a quantum cryptographic task is the DARPA Quantum network a 10- node quantum key distribution network that has been running since 2004 in Massachusetts, USA, and has been expanded to include a wireless link that uses quantum communications codes. The wireless connection was installed by UK defense research company QinetiQ. The proposed system, based on infantry guidelines of fighting war procedures within trenches or urban areas or buildings will save lives, mostly from friendly fire or inaccurate request of artillery support. There is a possibility that such systems already exist or where already developed, for the military at the Squad/Platoon level and if not they should. The proposed system will be based on 3 main principles which are (i) Squad or Platoon soldier identification and his location on the battle field by special transponders visible to the Company commander and above on their battle field computer screens, (ii) ability to have all Squad or Platoon soldiers connected wirelessly to the Platoon Commander tactical radio conversation on a listening choice (iii) ability to signal the technical failure of both systems and possible the wounding of a Squad or Platoon soldier via the transponder which could digitally deliver more information than the actual soldier location. In summary the question raised are if such systems already exists, or are in development and if the combat units are in need of such a system. Attached are two original proposals and inquiries from my previous initiative during the 1981 to 1984 work at Tadiran Telecom of a wireless intercom within the Squad or Platoon future combat helmet. Sincerely yours January 20, 2017 Haim R. Branisteanu O3-523-2744