SlideShare a Scribd company logo
1 of 20
IN HIROSHIMA    -    DIED BECAUSE OF
   THE ATOM BOMB ATTACK BY AMERICA
            9 th AUGUST
 IN NAGASAKI             DIED FOR THE 2 ND
                ATTACK
 DOES WAR MEANS ONLY
          KILLING PEOPLE…?
A Technical Paper Presentation

             On

         E-BOMBS

                            by
                            ABHILASH K
                           CH V NARAYANA
 An e-bomb is a weapon designed to take advantage of cutting of
  power in an area, destroying of machines that use electricity.
 Generators would be useless, cars wouldn’t run, and there would
  be no chance making a phone call.
 In a matter of seconds, a big enough e-bomb could thrust an
  entire city back 200 years or cripple a military unit.
 An e-bomb would destroy electronic equipments and also entire
  communication systems.
 Explosively Pumped Fluxed Compression
 Generators.
 Coupling Modes:
 Front door coupling occurs typically when power from an
  electromagnetic weapon is coupled into an antenna
  associated with radar or communications equipments.
 Back door coupling occurs when the electromagnetic field
  from a weapon produces large transient currents or
  electrical standing waves on fixed electrical wiring and
  cables interconnecting equipment, or providing
  connections to mains power or the telephone network.
 Buildings housing government offices and thus
 computer equipment, production facilities, military
 bases and known radar sites and communications
 nodes are all targets which can be readily identified
 through conventional photographic, satellite, imaging
 radar, electronic reconnaissance and humid
 operations.
 Electromagnetic warheads may be fitted to range of
 delivery vehicles.
 An e-bomb could effectively neutralize:
 Vehicle control systems
 Targeting systems, on the ground, on missiles and
 bombs
 Communication systems
 Navigation systems
 Long and short-range sensor systems
 A weapon optimized to destroy solid state computers and
  receivers may cause little or no damage to a thermionic
  technology devices.
 Radiating targets such as radars or communications
  equipments may continue to radiate after an attack even
  though their receiver and data processing systems have
  been damaged or destroyed.
 Means of delivery will limit the lethality of an e-bomb by
  introducing limits to the weapons size and the accuracy of
  its delivery.
 Patients who are on the ventilation in hospital may lose
  there life because of no electric power.
 E-bombs are weapons of electrical mass destruction
  with applications across a broad spectrum of
  targets, spanning both the strategic and tactical.
 E-bombs can paralyze electronic combat, offensive
  counter air and strategic air attack.
 The non-lethal nature of electromagnetic weapons
  makes their use far less politically damaging than that
  of conventional munitions, and therefore broadens the
  range of military options available.
 The danger for human life is very less compared to
  normal weapons.
 1.    AAP1000-RAAF, DI(AF)AAP1000, The Air Power Manuel, SECOND EDITION,
  RAAF     APSC, CANBERRA, 1994
 2.    CAIRD85-CAIRD R.S, TEST OF AN EXPLOSIVE DRIVEN COAXIAL
        GENERATOR
 3.    IEEE PULED POWER CONFERENCE, pp 483, IEEE ,NEW         YORK,1989
 4.    OWLER60-‘HE MARK 4 GENERATOR , DIGEST OF TECHNICAL
        PAPERS,7’th IEEE PULSED POWER CONFERENCE
 5.    HOEBERLING92-‘ADVANCES IN VIRTUAL CATHOD               MICROWAVE
  SOURCES, IEEE TRANSACTION ON ELECTROMAGNETIC COMBATIBILITY
 6.    IEEE SPECTRUM JULY 2002
 7.    IEEE SPECTRUM MARCH 2003
 8.    IEEE SPECTRUM NOVEMBER 2002
 9.    IEEE SPECTRUM APRIL 2003
 10.   IEEE SPECTRUM NOVEMBER 2001
 11. www.Entecollege.com
E bomb
E bomb

More Related Content

What's hot

Electromagnetic wave and weapons
Electromagnetic wave and weaponsElectromagnetic wave and weapons
Electromagnetic wave and weaponsutkarsh srivastav
 
Electromagnetic pulse weapons
Electromagnetic pulse weapons  Electromagnetic pulse weapons
Electromagnetic pulse weapons asalmoezi
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORTAnkit Vij
 
Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Hossam Zein
 
Seminar report on nuclear micro battery
Seminar report on nuclear micro batterySeminar report on nuclear micro battery
Seminar report on nuclear micro batteryVishnu M T
 
Directed Energy Weapons
Directed Energy WeaponsDirected Energy Weapons
Directed Energy Weaponspriya jain
 
Seminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesSeminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesPratik Patil
 
Seminar report on directed energy weapons
Seminar report on directed energy weaponsSeminar report on directed energy weapons
Seminar report on directed energy weaponsVishal Bait
 
Electromagnetic pulse generator(emp bomb)
Electromagnetic pulse generator(emp bomb)   Electromagnetic pulse generator(emp bomb)
Electromagnetic pulse generator(emp bomb) raja sukumar
 
Nuclear micro battery
Nuclear micro batteryNuclear micro battery
Nuclear micro batteryVishnu M T
 
Seminar report on nuclear batteries
Seminar report on nuclear batteriesSeminar report on nuclear batteries
Seminar report on nuclear batteriesSaurabh Nandy
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERYPREMKUMAR
 

What's hot (20)

Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
ELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMBELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMB
 
E bomb
E bombE bomb
E bomb
 
Emp Bomb
Emp BombEmp Bomb
Emp Bomb
 
Electromagnetic wave and weapons
Electromagnetic wave and weaponsElectromagnetic wave and weapons
Electromagnetic wave and weapons
 
The E-Bomb
The E-BombThe E-Bomb
The E-Bomb
 
Electromagnetic pulse weapons
Electromagnetic pulse weapons  Electromagnetic pulse weapons
Electromagnetic pulse weapons
 
E-BOMB REPORT
E-BOMB REPORTE-BOMB REPORT
E-BOMB REPORT
 
Directed Energy Weapons 2/2
Directed Energy Weapons 2/2Directed Energy Weapons 2/2
Directed Energy Weapons 2/2
 
Seminar report on nuclear micro battery
Seminar report on nuclear micro batterySeminar report on nuclear micro battery
Seminar report on nuclear micro battery
 
Directed Energy Weapons
Directed Energy WeaponsDirected Energy Weapons
Directed Energy Weapons
 
Seminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesSeminar presentation on nuclear batteries
Seminar presentation on nuclear batteries
 
Seminar report on directed energy weapons
Seminar report on directed energy weaponsSeminar report on directed energy weapons
Seminar report on directed energy weapons
 
Electromagnetic pulse generator(emp bomb)
Electromagnetic pulse generator(emp bomb)   Electromagnetic pulse generator(emp bomb)
Electromagnetic pulse generator(emp bomb)
 
Fuses
FusesFuses
Fuses
 
Paper Battery
Paper BatteryPaper Battery
Paper Battery
 
Nuclear micro battery
Nuclear micro batteryNuclear micro battery
Nuclear micro battery
 
Seminar report on nuclear batteries
Seminar report on nuclear batteriesSeminar report on nuclear batteries
Seminar report on nuclear batteries
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERY
 
Solar mobile charger
Solar mobile chargerSolar mobile charger
Solar mobile charger
 

Viewers also liked

Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bombpratikprusty
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemAarush Jewaria
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology pptEkta Singh
 
Traffic light controller
Traffic light controllerTraffic light controller
Traffic light controllerRkrishna Mishra
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 
ppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGYppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGYtanshu singh
 
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...Frank Yan (Property of CM)
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03David Palella
 
Dibyendu.chakraborty
Dibyendu.chakrabortyDibyendu.chakraborty
Dibyendu.chakrabortyPMI2011
 
face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet AnalysisAbhilash Kotawar
 
Beat the Forgetting Curve
Beat the Forgetting CurveBeat the Forgetting Curve
Beat the Forgetting Curveanglukalbos
 
Plc Paper Presentation By Durreshahwar
Plc Paper Presentation By DurreshahwarPlc Paper Presentation By Durreshahwar
Plc Paper Presentation By DurreshahwarIEEEP Karachi
 
Keeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of TechnologyKeeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of Technologycoffeyac
 

Viewers also liked (20)

E bomb
E bombE bomb
E bomb
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Tidal energy
Tidal energyTidal energy
Tidal energy
 
Night vision technology ppt
Night vision technology pptNight vision technology ppt
Night vision technology ppt
 
Li-Fi
Li-FiLi-Fi
Li-Fi
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Traffic light controller
Traffic light controllerTraffic light controller
Traffic light controller
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Gi fi technology finl ppt
Gi fi technology finl pptGi fi technology finl ppt
Gi fi technology finl ppt
 
ppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGYppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGY
 
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
OFFICIAL Frank Yan Sacramento – How to Prepare for an EMP Attack (Property of...
 
Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03Emp Defense Council.2011.01.03
Emp Defense Council.2011.01.03
 
Dibyendu.chakraborty
Dibyendu.chakrabortyDibyendu.chakraborty
Dibyendu.chakraborty
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet Analysis
 
Beat the Forgetting Curve
Beat the Forgetting CurveBeat the Forgetting Curve
Beat the Forgetting Curve
 
Plc Paper Presentation By Durreshahwar
Plc Paper Presentation By DurreshahwarPlc Paper Presentation By Durreshahwar
Plc Paper Presentation By Durreshahwar
 
Lecture no.1 emi new
Lecture no.1 emi newLecture no.1 emi new
Lecture no.1 emi new
 
Keeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of TechnologyKeeping Your Finger on the Pulse...of Technology
Keeping Your Finger on the Pulse...of Technology
 

Similar to E bomb (20)

E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)Electromagnetic Bombs(E-Bombs)
Electromagnetic Bombs(E-Bombs)
 
E bomb
E bombE bomb
E bomb
 
Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.
 
Emb
EmbEmb
Emb
 
Vicky
VickyVicky
Vicky
 
E Bomb
E BombE Bomb
E Bomb
 
Electronic bomb
Electronic bombElectronic bomb
Electronic bomb
 
Electronics bomb
Electronics bombElectronics bomb
Electronics bomb
 
Eelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONEelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPON
 
thee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptxthee-bombmeghapradhan-121126042903-phpapp02.pptx
thee-bombmeghapradhan-121126042903-phpapp02.pptx
 
Eelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONEelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPON
 
Electrical bomb
Electrical bombElectrical bomb
Electrical bomb
 
e-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdfe-bombppt-141013084946-conversion-gate02.pdf
e-bombppt-141013084946-conversion-gate02.pdf
 
Why studyemt
Why studyemtWhy studyemt
Why studyemt
 
report
reportreport
report
 
Emi unit iv ppt
Emi unit iv pptEmi unit iv ppt
Emi unit iv ppt
 
HERFBUS1
HERFBUS1HERFBUS1
HERFBUS1
 
e bomb. ppt
e bomb. ppte bomb. ppt
e bomb. ppt
 
WIRELESS ELECTRICITY,ELECTRICITY WITHOUT WIRE,NEW TECHNOLOGY IN ELECTRICITY
WIRELESS ELECTRICITY,ELECTRICITY WITHOUT WIRE,NEW TECHNOLOGY IN ELECTRICITYWIRELESS ELECTRICITY,ELECTRICITY WITHOUT WIRE,NEW TECHNOLOGY IN ELECTRICITY
WIRELESS ELECTRICITY,ELECTRICITY WITHOUT WIRE,NEW TECHNOLOGY IN ELECTRICITY
 

Recently uploaded

Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

E bomb

  • 1.
  • 2. IN HIROSHIMA - DIED BECAUSE OF THE ATOM BOMB ATTACK BY AMERICA 9 th AUGUST IN NAGASAKI DIED FOR THE 2 ND ATTACK
  • 3.  DOES WAR MEANS ONLY KILLING PEOPLE…?
  • 4. A Technical Paper Presentation On E-BOMBS by ABHILASH K CH V NARAYANA
  • 5.  An e-bomb is a weapon designed to take advantage of cutting of power in an area, destroying of machines that use electricity.  Generators would be useless, cars wouldn’t run, and there would be no chance making a phone call.  In a matter of seconds, a big enough e-bomb could thrust an entire city back 200 years or cripple a military unit.  An e-bomb would destroy electronic equipments and also entire communication systems.
  • 6.
  • 7.  Explosively Pumped Fluxed Compression Generators.
  • 8.
  • 9.  Coupling Modes:  Front door coupling occurs typically when power from an electromagnetic weapon is coupled into an antenna associated with radar or communications equipments.  Back door coupling occurs when the electromagnetic field from a weapon produces large transient currents or electrical standing waves on fixed electrical wiring and cables interconnecting equipment, or providing connections to mains power or the telephone network.
  • 10.
  • 11.  Buildings housing government offices and thus computer equipment, production facilities, military bases and known radar sites and communications nodes are all targets which can be readily identified through conventional photographic, satellite, imaging radar, electronic reconnaissance and humid operations.
  • 12.  Electromagnetic warheads may be fitted to range of delivery vehicles.
  • 13.
  • 14.
  • 15.  An e-bomb could effectively neutralize:  Vehicle control systems  Targeting systems, on the ground, on missiles and bombs  Communication systems  Navigation systems  Long and short-range sensor systems
  • 16.  A weapon optimized to destroy solid state computers and receivers may cause little or no damage to a thermionic technology devices.  Radiating targets such as radars or communications equipments may continue to radiate after an attack even though their receiver and data processing systems have been damaged or destroyed.  Means of delivery will limit the lethality of an e-bomb by introducing limits to the weapons size and the accuracy of its delivery.  Patients who are on the ventilation in hospital may lose there life because of no electric power.
  • 17.  E-bombs are weapons of electrical mass destruction with applications across a broad spectrum of targets, spanning both the strategic and tactical.  E-bombs can paralyze electronic combat, offensive counter air and strategic air attack.  The non-lethal nature of electromagnetic weapons makes their use far less politically damaging than that of conventional munitions, and therefore broadens the range of military options available.  The danger for human life is very less compared to normal weapons.
  • 18.  1. AAP1000-RAAF, DI(AF)AAP1000, The Air Power Manuel, SECOND EDITION, RAAF APSC, CANBERRA, 1994  2. CAIRD85-CAIRD R.S, TEST OF AN EXPLOSIVE DRIVEN COAXIAL GENERATOR  3. IEEE PULED POWER CONFERENCE, pp 483, IEEE ,NEW YORK,1989  4. OWLER60-‘HE MARK 4 GENERATOR , DIGEST OF TECHNICAL PAPERS,7’th IEEE PULSED POWER CONFERENCE  5. HOEBERLING92-‘ADVANCES IN VIRTUAL CATHOD MICROWAVE SOURCES, IEEE TRANSACTION ON ELECTROMAGNETIC COMBATIBILITY  6. IEEE SPECTRUM JULY 2002  7. IEEE SPECTRUM MARCH 2003  8. IEEE SPECTRUM NOVEMBER 2002  9. IEEE SPECTRUM APRIL 2003  10. IEEE SPECTRUM NOVEMBER 2001  11. www.Entecollege.com