SlideShare ist ein Scribd-Unternehmen logo
1 von 14
DAYANANDA SAGAR COLLEGE OF ENGINEERING
(An Autonomous Institute affiliated to VTU, Belagavi – 590018, Approved by AICTE & ISO 9001:2008 Certified)
Accredited by National Assessment & Accreditation Council (NAAC) with ‘A’ grade & NBA
E-Bombs: The Allure and Peril of High-Power Microwave Weapons
Submitted by
MURALIDHAR R - 1DS18EE036
Under the Guidance of
Mrs. SREEVIDYA T R
Assistant Professor
ELECTRICAL AND ELECTRONICS ENGINEERING
 DOES WAR MEANS ONLY KILLING PEOPLE
 6th AUGUST 1945-
90000-166000 died in hirosima by nuclear attack of America
9th august 1945-
60000-90000 died in Nagasaki for the 2nd attack
 In 1958 test over the Pacific Ocean by America ended up blowing out streetlights
hundred miles away in parts of Hawaii. The explosion even disrupted radio equipment
in Australia.
 The Compton effect was the reason behind this electrical disturbance
Compton claimed that photons of electromagnetic energy could
knock loose electrons from atoms with low atomic numbers.
 An E-BOMB is an electromagnetic bomb which is used for defense purposes.
 It produces a high beam of changing electromagnetic waves having high
frequency.
 It can produce 35 MW with a pulse length of 100 to 150 nanoseconds and
microwave beam of 2 to 6 GHz range.
 Due to the bombardment of e-bomb it can destroy the communication system ,
can cut down the electricity supply from a city and can stop the generator to
run.
 The explosion at pacific ocean forces the researchers to think about E-BOMB
which damage to electrical or electronics equipment's not to the human being.
Compton effect and Electromagnetism are the two basic principles.
 The Compton effect (Arthur Holly Compton,1923 ) is the result of a high-energy photon colliding with a
target, which releases loosely bound electrons from the outer shell of the atom or molecule
 Electromagnetism is the branch of physics that deals
with electricity and magnetism and the interaction
between them.
 The basic law of electromagnetism is known as
"Faraday's law of Induction.
 It is a process where a conductor placed in a changing
magnetic field causes the production of a voltage
across the conductor and vice versa also.
 Explosively Pumped Fluxed Compression Generators :
Metal cylinder (called the armature), surrounded by a coil of wire (the
stator winding). The armature cylinder is filled with high explosive.
 FLUX COMPRESSION GENERATOR(FCG) is the most important and
the fundamental method used for such arsenal.
• Capacitors connects to Stator  sets electrical current
through wires  Generates Intense Magnetic Field.
• Fuse mechanism ignites the explosive material  Explosion
travels as wave through the middle of the armature cylinder.
• Explosion passes through cylinder  Cylinder comes in
contact with stator winding  creates a short circuit  cuts
the stator off from its power supply. Moving short circuit
compresses Magnetic Field  generates Intense
Electromagnetic burst.
 Vehicle control systems
 Targeting systems, on the ground, on missile and bomb.
 Communication systems
 Navigation systems
 Long and short-range sensor systems
 Damage electronics equipment
 A weapon optimized to destroy solid state computers and
receivers may cause little or no damage to a thermionic
technology devices.
 Radiating targets such as radars or communications
equipments may continue to radiate after an attack even
though their receiver and data processing systems have been
damaged or destroyed.
 Means of delivery will limit the lethality of an e-bomb by
introducing limits to the weapons size and the accuracy of its
delivery.
 Patients who are on the ventilation in hospital may lose
there life because of no electric power.
 Convert computer rooms in to Faraday cages
 Use optical fibers for data
 Isolate power feeds with transient arrestors
 Use non-electrical power feed schemes
 Use electromagnetic “air lock”
 Shielding must be comprehensive
 E-bombs are weapons of electrical mass destruction
with applications across a broad spectrum of targets,
spanning both the strategic and tactical.
 E-bombs can paralyze electronic combat, offensive
counter air and strategic air attack.
 The non-lethal nature of electromagnetic weapons
makes their use far less politically damaging than that
of conventional munitions, and therefore broadens the
range of military options available.
 The danger for human life is very less compared to
normal weapons.
Electromagnetic Bombs(E-Bombs)

Weitere ähnliche Inhalte

Ähnlich wie Electromagnetic Bombs(E-Bombs)

Ähnlich wie Electromagnetic Bombs(E-Bombs) (20)

Electronics bomb
Electronics bombElectronics bomb
Electronics bomb
 
E-BOMB ppt
E-BOMB pptE-BOMB ppt
E-BOMB ppt
 
Deepak e bomb
Deepak e bombDeepak e bomb
Deepak e bomb
 
Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.Reshav vatsha e bomb ppt.
Reshav vatsha e bomb ppt.
 
ELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMBELECTROMAGNETIC BOMB
ELECTROMAGNETIC BOMB
 
Electronic bomb
Electronic bombElectronic bomb
Electronic bomb
 
Why studyemt
Why studyemtWhy studyemt
Why studyemt
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
Lecture no.1 emi new
Lecture no.1 emi newLecture no.1 emi new
Lecture no.1 emi new
 
E bomb seminar report
E bomb seminar reportE bomb seminar report
E bomb seminar report
 
E bomb
E bombE bomb
E bomb
 
Vicky
VickyVicky
Vicky
 
Eelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPONEelctro-Magnetic-Pulse USE AS A WEAPON
Eelctro-Magnetic-Pulse USE AS A WEAPON
 
E bomb
E bombE bomb
E bomb
 
Transmission Line
Transmission LineTransmission Line
Transmission Line
 
The E-Bomb
The E-BombThe E-Bomb
The E-Bomb
 
E bomb
E bomb E bomb
E bomb
 
Electromagnetic bomb
Electromagnetic bombElectromagnetic bomb
Electromagnetic bomb
 
US Grid Security - Climate Institute
US Grid Security - Climate InstituteUS Grid Security - Climate Institute
US Grid Security - Climate Institute
 
Analysis of electromagnetic pollution due to high voltage transmission lines
Analysis of electromagnetic pollution due to high voltage transmission linesAnalysis of electromagnetic pollution due to high voltage transmission lines
Analysis of electromagnetic pollution due to high voltage transmission lines
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Electromagnetic Bombs(E-Bombs)

  • 1. DAYANANDA SAGAR COLLEGE OF ENGINEERING (An Autonomous Institute affiliated to VTU, Belagavi – 590018, Approved by AICTE & ISO 9001:2008 Certified) Accredited by National Assessment & Accreditation Council (NAAC) with ‘A’ grade & NBA E-Bombs: The Allure and Peril of High-Power Microwave Weapons Submitted by MURALIDHAR R - 1DS18EE036 Under the Guidance of Mrs. SREEVIDYA T R Assistant Professor ELECTRICAL AND ELECTRONICS ENGINEERING
  • 2.
  • 3.  DOES WAR MEANS ONLY KILLING PEOPLE  6th AUGUST 1945- 90000-166000 died in hirosima by nuclear attack of America 9th august 1945- 60000-90000 died in Nagasaki for the 2nd attack  In 1958 test over the Pacific Ocean by America ended up blowing out streetlights hundred miles away in parts of Hawaii. The explosion even disrupted radio equipment in Australia.  The Compton effect was the reason behind this electrical disturbance Compton claimed that photons of electromagnetic energy could knock loose electrons from atoms with low atomic numbers.
  • 4.  An E-BOMB is an electromagnetic bomb which is used for defense purposes.  It produces a high beam of changing electromagnetic waves having high frequency.  It can produce 35 MW with a pulse length of 100 to 150 nanoseconds and microwave beam of 2 to 6 GHz range.  Due to the bombardment of e-bomb it can destroy the communication system , can cut down the electricity supply from a city and can stop the generator to run.  The explosion at pacific ocean forces the researchers to think about E-BOMB which damage to electrical or electronics equipment's not to the human being.
  • 5. Compton effect and Electromagnetism are the two basic principles.  The Compton effect (Arthur Holly Compton,1923 ) is the result of a high-energy photon colliding with a target, which releases loosely bound electrons from the outer shell of the atom or molecule  Electromagnetism is the branch of physics that deals with electricity and magnetism and the interaction between them.  The basic law of electromagnetism is known as "Faraday's law of Induction.  It is a process where a conductor placed in a changing magnetic field causes the production of a voltage across the conductor and vice versa also.
  • 6.  Explosively Pumped Fluxed Compression Generators : Metal cylinder (called the armature), surrounded by a coil of wire (the stator winding). The armature cylinder is filled with high explosive.  FLUX COMPRESSION GENERATOR(FCG) is the most important and the fundamental method used for such arsenal.
  • 7. • Capacitors connects to Stator  sets electrical current through wires  Generates Intense Magnetic Field. • Fuse mechanism ignites the explosive material  Explosion travels as wave through the middle of the armature cylinder. • Explosion passes through cylinder  Cylinder comes in contact with stator winding  creates a short circuit  cuts the stator off from its power supply. Moving short circuit compresses Magnetic Field  generates Intense Electromagnetic burst.
  • 8.
  • 9.  Vehicle control systems  Targeting systems, on the ground, on missile and bomb.  Communication systems  Navigation systems  Long and short-range sensor systems  Damage electronics equipment
  • 10.  A weapon optimized to destroy solid state computers and receivers may cause little or no damage to a thermionic technology devices.  Radiating targets such as radars or communications equipments may continue to radiate after an attack even though their receiver and data processing systems have been damaged or destroyed.  Means of delivery will limit the lethality of an e-bomb by introducing limits to the weapons size and the accuracy of its delivery.  Patients who are on the ventilation in hospital may lose there life because of no electric power.
  • 11.  Convert computer rooms in to Faraday cages  Use optical fibers for data  Isolate power feeds with transient arrestors  Use non-electrical power feed schemes  Use electromagnetic “air lock”  Shielding must be comprehensive
  • 12.
  • 13.  E-bombs are weapons of electrical mass destruction with applications across a broad spectrum of targets, spanning both the strategic and tactical.  E-bombs can paralyze electronic combat, offensive counter air and strategic air attack.  The non-lethal nature of electromagnetic weapons makes their use far less politically damaging than that of conventional munitions, and therefore broadens the range of military options available.  The danger for human life is very less compared to normal weapons.