摘要:
The Electromagnetic Grenade is a destructive device used to disable Unmanned Ground Vehicles (UGV). The Electromagnetic Grenade is a purpose-built shell/round that utilizes an explosively pumped flux compression generator to create an electromagnetic pulse destructive enough to disable or destroy UGVs and similar military equipment which employ electricity as energy for onboard systems. The electromagnetic grenade includes a standard shell casing, a power source, capacitor bank, a solenoid, and a standard fuse. The casing and size of the shell can be changed to suit the weapon system that will employ the Electromagnetic Grenade. The design can be scaled to work with smaller and larger ordinance which will include small arms, artillery shells, bombs, missiles, rockets, sub-munitions, loitering munitions and similar.
摘要:
The Electromagnetic Grenade is a destructive device used to disable Unmanned Ground Vehicles (UGV). The Electromagnetic Grenade is a purpose-built shell/round that utilizes an explosively pumped flux compression generator to create an electromagnetic pulse destructive enough to disable or destroy UGVs and similar military equipment which employ electricity as energy for onboard systems. The electromagnetic grenade includes a standard shell casing, a power source, capacitor bank, a solenoid, and a standard fuse. The casing and size of the shell can be changed to suit the weapon system that will employ the Electromagnetic Grenade. The design can be scaled to work with smaller and larger ordinance which will include small arms, artillery shells, bombs, missiles, rockets, sub-munitions, loitering munitions and similar.
摘要:
An apparatus, system, and method for deployment of an electronic warfare (EW) asset are provided. The system includes a projectile launching device capable of launching a projectile round. An EW asset is detachably carried by the projectile round. A deployable parachute is attached to the EW asset, wherein the EW asset is configured to be suspended from the parachute when the EW asset is detached from the projectile round. The related method is used for suppression or obscuration of enemy counterfire radar (CFR) system by initiating an EW effect by the EW asset as the EW asset floats towards a ground surface.
摘要:
An antenna configuration for emitting high-energy microwave pulses has a first flat electrode and a second flat electrode, the first electrode and the second electrode being able to be connected to a generator for producing an excitation pulse. The antenna configuration further has a multiplicity of radiation elements which connect the first electrode and the second electrode to one another, and semiconductor diodes which are provided in the region of the radiation elements and turn on as of a particular breakdown voltage and thus make it possible for the antenna to emit a pulsed overall pulse.
摘要:
A method and a configuration are provided for generating high-energy microwave pulses, in particular based on HPEM technology. The objects include, on the one hand. increasing the energy density of pulses and, on the other hand, also making the relevant appliances more compact. For that purpose, a large-area configuration of a multiplicity of, preferably non-linear, semiconductor components is used in the area of the antenna, for pulse shaping.
摘要:
A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select content (SC) data stores and geographically distributed distal data stores, all with respective access controls. The data input or put through the computing system is processed to obtain the SC and other associated content. The process then extracts and stores such content in the proximal SC data stores and geographically distributed distal SC data stores. The system further processes data to geographically distribute the data with data processes including: copy, extract, archive, distribute, and a copy-extract-archive and distribute process with a sequential and supplemental data destruction process. In this manner, the data input is distributed or spread out over the geographically distributed distal SC data stores. The system and method permits reconstruction of the processed data only in the presence of a respective access control.
摘要:
An electrical power disruption device including a plurality of electrical conductive members received within a chamber in a stored mode and ejected outwardly from the chamber in a streaming mode.
摘要:
A microwave generator (10) having a hollow central electrode (12) with a front face including hollow emmission element (18), and having an outer electrode (14), which coaxially surrounds the central electrode (12) along an axially extending resonator section (16). The two electrodes (12, 14) define a spark gap (36) and are connected to a high-voltage source (38). An ultracompact microwave generator (10) is implemented by the high-voltage source (38) being arranged in the hollow central electrode (12) of the microwave generator (10) rather than on the outside thereof.
摘要:
A method of irradiating an electromagnetic pulse includes specifying a position of a target having electronic equipment; setting the light-condensing point based on the position of the target; and condensing the laser beam to generate plasma in the light-condensing point such that the electromagnetic pulse generated from the plasma is irradiated to the electronic equipment. In this way, a method and system for irradiating an electromagnetic pulse are realized which can irradiate the electromagnetic pulse of a large output while restraining diffusion of the electromagnetic pulse.
摘要:
An ElectroMagnetic Pulse (EMP) emitter can be positioned to introduce an EMP burst or series of EMP bursts into a passageway, such as a passageway providing access relative to a secure area. The EMP burst or series of EMP bursts can be introduced into the passageway at an intensity configured for rendering inoperable an electronic device, such as a device capable of data storage and transport through the passageway. Such an arrangement may be used for the prevention of theft, sabotage, or release of data maintained within the secure area.