SlideShare a Scribd company logo
TECHNOLOGY FOR
NATIONAL SECURITY
By,
P.Nithish balaji
II-year
mechanical
Reg.no : 1610079
Introduction
• Technology can be used for the protection of
national integrity and from enemies
• Now a days technology is used for National
Security in the following ways
 For defence purpose
 To secure confidential or secret Electronic
Data's
 For communication purpose
 For spying
 For tackling Natural Disasters
Technology in Defense Sector
• The defense sector use all kinds
of latest technology for its day
to day working.
• It ranges from Computer
Servers to Heat Seeking Missiles.
• Army use night vision device for patrolling
around the border.
• They also use helicopters and Unmanned Arial
Vehicles (UAV) for surveillance
• The Air Force use Bombers like B2 , F16 ,Sukhoi
etc
Fleet Carrier
Sonars in submarine
Stealth Aircraft
• Stealth aircraft are aircraft that use stealth
technology to avoid detection by employing a
combination of features to interfere with radar
as well as reduce visibility in the infrared,
visual, audio, and radio frequency (RF)
spectrum.
• Development of stealth technology likely began
in Germany during World War II. Well-known
modern examples of stealth aircraft include the
United States' F-117 Nighthawk (1981–2008),
the B-2 Spirit, the F-22 Raptor and the F-35
Lightning II
Missiles
• A Missile is a self-propelled guided weapon
system. Missiles have four system components:
targeting and/or guidance, flight system,
engine, and warhead.
Biometric Authentication .
Defense Communication System
For spying
for tackling natural disasters
Technology for national security.ppt

More Related Content

What's hot

Stealth technology
Stealth technologyStealth technology
Stealth technology
Rakesh Rao
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013Tom "Blad" Lindblad
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
DroneSec
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
D.A. Mohan
 
Firefighting Drones: Drones in the Field
Firefighting Drones: Drones in the FieldFirefighting Drones: Drones in the Field
Firefighting Drones: Drones in the Field
Dronefly
 
Ops Terms And Graphics
Ops Terms And GraphicsOps Terms And Graphics
Ops Terms And Graphics
Robertmoe
 
Drone and its application
Drone and its applicationDrone and its application
Drone and its application
14209276
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
Pranto26
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
Hardeep Bhurji
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
Resilient Systems
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Shreedeep Rayamajhi
 

What's hot (20)

Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013JIEDDO Counter-IED Strategic Plan May 2013
JIEDDO Counter-IED Strategic Plan May 2013
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Firefighting Drones: Drones in the Field
Firefighting Drones: Drones in the FieldFirefighting Drones: Drones in the Field
Firefighting Drones: Drones in the Field
 
Ops Terms And Graphics
Ops Terms And GraphicsOps Terms And Graphics
Ops Terms And Graphics
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Drone and its application
Drone and its applicationDrone and its application
Drone and its application
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
 
Network security
Network security Network security
Network security
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 

Similar to Technology for national security.ppt

Stealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnishStealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnish
Rajnish Priyadarshi
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Vikas Mehta
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
Aniket Bhor
 
_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf
Eyasin Ansari
 
Drones! what else
Drones! what elseDrones! what else
Drones! what else
Muhammad Zeeshan Muzaffar
 
Khyber Technologies Update
Khyber Technologies UpdateKhyber Technologies Update
Khyber Technologies Update
Matt Orley
 
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for LogisticsUnmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
inventionjournals
 
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyyStealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
AdityaAgadi2
 
Drone Applications in Defense and its implementation in India
Drone Applications in Defense and its implementation in IndiaDrone Applications in Defense and its implementation in India
Drone Applications in Defense and its implementation in India
turbomachinesproject
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone Technology
NovoQuad
 
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptxSTEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
abhishek846076
 
Paper id 312201505
Paper id 312201505Paper id 312201505
Paper id 312201505
IJRAT
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE
 
Drone
DroneDrone
Catalog kim thu sét Stormaster
Catalog kim thu sét Stormaster Catalog kim thu sét Stormaster
Catalog kim thu sét Stormaster
HUY HOANG TECHNOLOGY JOINT STOCK COMPANY
 
Hướng dẫn lắp đặt kim thu sét Stormaster ESE
Hướng dẫn lắp đặt kim thu sét Stormaster ESEHướng dẫn lắp đặt kim thu sét Stormaster ESE
Hướng dẫn lắp đặt kim thu sét Stormaster ESE
HUY HOANG TECHNOLOGY JOINT STOCK COMPANY
 
Final Asarc Brochure
Final Asarc BrochureFinal Asarc Brochure
Final Asarc Brochure
phelimrowe
 
A drone that cover’s a large area in a short amount of time – Garud by Pisarv
A drone that cover’s a large area in a short amount of time – Garud by PisarvA drone that cover’s a large area in a short amount of time – Garud by Pisarv
A drone that cover’s a large area in a short amount of time – Garud by Pisarv
SEOPisarv
 
Fm24 18
Fm24 18Fm24 18

Similar to Technology for national security.ppt (20)

Stealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnishStealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnish
 
Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02Cellphoneoperatedrobot 090508035359-phpapp02
Cellphoneoperatedrobot 090508035359-phpapp02
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
 
_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf_What is Drone Technology, How works and It’s Future.pdf
_What is Drone Technology, How works and It’s Future.pdf
 
Drones! what else
Drones! what elseDrones! what else
Drones! what else
 
IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]
 
Khyber Technologies Update
Khyber Technologies UpdateKhyber Technologies Update
Khyber Technologies Update
 
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for LogisticsUnmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
Unmanned Aerial Vehicles (UAVs): An Emerging Technology for Logistics
 
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyyStealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
Stealth-Technolog6yyyyyyyyyyyyyyyyyyyyyyyy
 
Drone Applications in Defense and its implementation in India
Drone Applications in Defense and its implementation in IndiaDrone Applications in Defense and its implementation in India
Drone Applications in Defense and its implementation in India
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone Technology
 
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptxSTEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
STEALTH TECHNOLOGY- LT ABHISHEK MISHRA 6MI.pptx
 
Paper id 312201505
Paper id 312201505Paper id 312201505
Paper id 312201505
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
 
Drone
DroneDrone
Drone
 
Catalog kim thu sét Stormaster
Catalog kim thu sét Stormaster Catalog kim thu sét Stormaster
Catalog kim thu sét Stormaster
 
Hướng dẫn lắp đặt kim thu sét Stormaster ESE
Hướng dẫn lắp đặt kim thu sét Stormaster ESEHướng dẫn lắp đặt kim thu sét Stormaster ESE
Hướng dẫn lắp đặt kim thu sét Stormaster ESE
 
Final Asarc Brochure
Final Asarc BrochureFinal Asarc Brochure
Final Asarc Brochure
 
A drone that cover’s a large area in a short amount of time – Garud by Pisarv
A drone that cover’s a large area in a short amount of time – Garud by PisarvA drone that cover’s a large area in a short amount of time – Garud by Pisarv
A drone that cover’s a large area in a short amount of time – Garud by Pisarv
 
Fm24 18
Fm24 18Fm24 18
Fm24 18
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Technology for national security.ppt

  • 1. TECHNOLOGY FOR NATIONAL SECURITY By, P.Nithish balaji II-year mechanical Reg.no : 1610079
  • 2. Introduction • Technology can be used for the protection of national integrity and from enemies • Now a days technology is used for National Security in the following ways  For defence purpose  To secure confidential or secret Electronic Data's  For communication purpose  For spying  For tackling Natural Disasters
  • 3. Technology in Defense Sector • The defense sector use all kinds of latest technology for its day to day working. • It ranges from Computer Servers to Heat Seeking Missiles.
  • 4. • Army use night vision device for patrolling around the border. • They also use helicopters and Unmanned Arial Vehicles (UAV) for surveillance • The Air Force use Bombers like B2 , F16 ,Sukhoi etc
  • 7. Stealth Aircraft • Stealth aircraft are aircraft that use stealth technology to avoid detection by employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual, audio, and radio frequency (RF) spectrum.
  • 8. • Development of stealth technology likely began in Germany during World War II. Well-known modern examples of stealth aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor and the F-35 Lightning II
  • 9. Missiles • A Missile is a self-propelled guided weapon system. Missiles have four system components: targeting and/or guidance, flight system, engine, and warhead.
  • 10.
  • 11.
  • 14.
  • 16. for tackling natural disasters