Premium Essay

Electronic Bomb Research Paper

Submitted By
Words 1344
Pages 6
ELCT 361
Extra Credit Project
Xuetan Liu
April 15, 2016

Electricity is really important in our life. After a couple hours of losing electricity, you feel so stressful without lights, electric heat or TV (Tom Harris, 2003). An electromagnetic bomb, or e-bomb is a weapon that can destroy most machines that use electricity. That means, “generators would be useless, cars wouldn’t run and there would be no chance of making a phone call” (Tom Harris, 2003).
An electromagnetic bomb uses an intense electromagnetic field to create a brief pulse of energy. In the United States, most e-bomb research has been carried out at the Air Force Research Laboratory at Kirtland Air Force Base in New Mexico. Researchers have been exploring the use of high power …show more content…
The design of this kind of e-bomb is really simple and inexpensive which makes the high power microwaves technology accessible to military forces. This bomb consists of an armature which is surrounded by the stator winding. As we can see from the figure above, the stator winding and the armature cylinder are separated by empty space. According to the article, “the bomb also has a power source (several capacitors) which can be connected to the stator” (Tom Harris, 2003). http://www.ausairpower.net/XIMG/coaxfcg.gif
Explosively Pumped Coaxial Flux Compression Generator

When the bomb goes off, the capacitors will be connected to the stator. This will send an electrical current to generate an intense magnetic field. The explosion waves travel through armature cylinder. During this time period, there is a short circuit between cylinder and stator winding which will cut the stator off from its power supply. The moving short circuit compresses the magnetic field and generates an intense electromagnetic burst (Tom Harris, 2003). This type of e-bomb is kind of basic EMP weapon because it can only do some serious damage in a small

Similar Documents

Free Essay

Ied Information Paper

...INFORMATION PAPER Staff Group Alpha 11 Feb 13 SUBJECT: Improvised Explosive Devices (IEDs) and Mines 1. Purpose: To provide information on Improvised Explosive Devices (IED’s) and Antipersonnel Mines; as well as impacts and preventive actions for Ground Troops in Combat. 2. Improvised Explosive Devices (IED) and Antipersonnel Mine Facts. a. IED’s are “homemade” bombs and/or destructive devices used to destroy, incapacitate, harass, or distract. An antipersonnel IED that is victim-activated—one that explodes on contact by a person—is considered an antipersonnel mine. b. IEDs come in many shapes and forms and can consist of almost any material, including agricultural and medical equipment. IEDs consist of a variety of components that include an initiator, switch, main charge, power source, and a container. IEDs may be surrounded by or packed with additional materials or “enhancements” such as nails, glass, or metal frag¬ments designed to increase the amount of shrapnel propelled by the explosion. Enhancements may also include other elements such as hazardous materials. An IED can be initiated by a variety of methods depending on the intended target.i c. IEDs can be carried or delivered in a vehicle; car¬ried, placed, or thrown by a person; delivered in a package; or concealed on the roadside.i There are three main types of IED’s/Mines.iii These include: 1. Package Improvised Explosive Device: Typically IEDs consisting...

Words: 876 - Pages: 4

Free Essay

Vannevar Bush

...Vannevar Bush (/væˈniːvɑr/ van-NEE-var; March 11, 1890 – June 28, 1974) was an American engineer, inventor and science administrator, who during World War II headed the U.S. Office of Scientific Research and Development (OSRD), through which almost all wartime military R&D was carried out, including initiation and early administration of the Manhattan Project. He is also known in engineering for his work on analog computers, for founding Raytheon, and for the memex, a hypothetical adjustable microfilm viewer with a structure analogous to that of hypertext. In 1945, Bush published As We May Think in which he predicted that "wholly new forms of encyclopedias will appear, ready made with a mesh of associative trails running through them, ready to be dropped into the memex and there amplified".[1] The memex influenced generations of computer scientists, who drew inspiration from its vision of the future. For his master's thesis, Bush invented and patented a "profile tracer", a mapping device for assisting surveyors. It was the first of a string of inventions. He joined the Department of Electrical Engineering at Massachusetts Institute of Technology (MIT) in 1919, and founded the company now known as Raytheon in 1922. Starting in 1927, Bush constructed a differential analyzer, an analog computer with some digital components that could solve differential equations with as many as 18 independent variables. An offshoot of the work at MIT by Bush and others was the beginning of digital...

Words: 7234 - Pages: 29

Free Essay

Edward Snowden

...11 Position Papers I f you like to argue, you will enjoy writing position papers and argument essays. The purpose of a position paper or argument essay is to explain both sides of a controversy and then argue for one side over the other. This two-sided approach is what makes position papers and argument essays different from commentaries (Chapter 10). A commentary usually only expresses the author’s personal opinion about a current issue or event. A position paper or argument essay explains both sides and discusses why one is stronger or better than the other. Your goal is to fairly explain your side and your opponents’ side of the issue, while highlighting the differences between these opposing views. You need to use solid reasoning and factual evidence to persuade your readers that your view is more valid or advantageous than your opponents’ view. In college, your professors will ask you to write position papers and argument essays to show that you understand both sides of an issue and can support one side or the other. In the workplace, corporate position papers are used to argue for or against business strategies or alternatives. The ability to argue effectively is a useful skill that will help you throughout your life. 221 CHAPTER AT–A–GLANCE Position Papers This diagram shows two basic organizations for a position paper, but other arrangements of these sections will work too. In the pattern on the left, the opponents’ position is described up front with its...

Words: 11159 - Pages: 45

Free Essay

Artificial Intellegence

...intelligence is the part of the complex computer sciences, and the technology created by humans. The aim of the science is to create answers and solutions as well on the basis of calculations and artificially made intelligent machines. Artificial intelligence is aimed to make the human life easier and do all the difficult tasks and provide people with acceptable solutions to any problems.  The main problems with Artificial Intelligence include such traits as reasoning, knowledge, planning, learning, communication, perception, and the ability to move and manipulate objects and getting it precise, Some believe that the robots in future, will take on common work found in our day to day lives. We have already seen the challenge of bomb deactivating done by robots in the military and if tasks successfully done by robots can...

Words: 936 - Pages: 4

Free Essay

Jon Von Nomann

...John von Neumann From Wikipedia, the free encyclopedia "Von Neumann" redirects here. For other uses, see Von Neumann (disambiguation). The native form of this personal name is Neumann János Lajos. This article uses the Western name order. John von Neumann | Von Neumann in the 1940s | Born | Neumann János Lajos December 28, 1903 Budapest, Austria-Hungary | Died | February 8, 1957 (aged 53) Walter Reed General Hospital Washington, D.C. | Residence | United States | Nationality | Hungarian and American | Fields | Mathematics, physics, statistics, economics | Institutions | University of Berlin Princeton University Institute for Advanced Study Site Y, Los Alamos | Alma mater | University of Pázmány Péter ETH Zürich | Doctoral advisor | Lipót Fejér | Other academic advisors | László Rátz | Doctoral students | Donald B. Gillies Israel Halperin | Other notable students | Paul Halmos Clifford Hugh Dowker Benoit Mandelbrot[1] | Known for |  [show] | Notable awards | Bôcher Memorial Prize (1938) Enrico Fermi Award (1956) | Signature | John von Neumann (/vɒn ˈnɔɪmən/; December 28, 1903 – February 8, 1957) was a Hungarian and American pure and applied mathematician, physicist, inventor and polymath. He made major contributions to a number of fields,[2] including mathematics (foundations of mathematics, functional analysis, ergodic theory, geometry, topology, and numerical analysis), physics (quantum mechanics, hydrodynamics, and fluid dynamics)...

Words: 9454 - Pages: 38

Premium Essay

Computer Science

...Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists of "truly" random numbers was extremely slow, von Neumann developed a form of making pseudorandom numbers, using the middle-square method. Though this method has been criticized as crude, von Neumann was aware of this: he justified it as being faster than any other method at his disposal, and also noted that when it went awry it did so obviously, unlike methods which could be subtly incorrect. While consulting for the Moore School of Electrical Engineering at the University of Pennsylvania on the EDVAC project, von Neumann wrote an incomplete First Draft of a Report on the EDVAC. The paper, whose public distribution nullified the patent claims of EDVAC designers J. Presper Eckert and John William Mauchly, described a computer architecture in which the data and the program are both stored in the computer's memory in the same address space.[50] John von Neumann also consulted for the ENIAC project, when ENIAC was being modified to contain a stored program. Since the modified ENIAC was...

Words: 625 - Pages: 3

Premium Essay

Inventions

...advances. The ideas and inventions which came about during these years were some of the most influential and life changing happenings in American history. Morale was high, and people were given opportunity to work on these new ideas rather than worry about invasions and the possibility of a life built around fear and war. In 1946 a man by the name of John Biggins introduced the first credit card to America. With this new idea, a person would present the card (then only a piece of paper) to a merchant, and the bill for the purchase would be sent along to Biggins’ bank. The bank would then pay the bill, and the account holder would be responsible for reimbursing the bank at the end of the month. This was huge to the American people. As the years progressed consumers were able to purchase more items, and in the 1950’s the credit card was widely responsible for the boom in purchasing consumer goods. Charles Ginsburg invented the first video tape recorder in 1951. Ginsburg led a research team at a company called apex, and was primarily responsible for the bulk of the ideas and production of the device. With this new invention, video cameras images could be captured and stored magnetically on rolls of magnetic “tape”. The invention is one of the most prolific happening in human history, as it allowed moments to be saved and replayed by everyday people. The year 1952 brought with it the invention of the bar code. Joseph Woodland, and Bernard Silver, working for IBM at...

Words: 617 - Pages: 3

Premium Essay

The History of Computers

...The first computers were people! That is, electronic computers (and the earlier mechanical computers) were given this name because they performed the work that had previously been assigned to people. "Computer" was originally a job title: it was used to describe those human beings (predominantly women) whose job it was to perform the repetitive calculations required to compute such things as navigational tables, tide charts, and planetary positions for astronomical almanacs. Imagine you had a job where hour after hour, day after day, you were to do nothing but compute multiplications. Boredom would quickly set in, leading to carelessness, leading to mistakes. And even on your best days you wouldn't be producing answers very fast. Therefore, inventors have been searching for hundreds of years for a way to mechanize (that is, find a mechanism that can perform) this task. This picture shows what were known as "counting tables" [photo courtesy IBM] A typical computer operation back when computers were people. The abacus was an early aid for mathematical computations. Its only value is that it aids the memory of the human performing the calculation. A skilled abacus operator can work on addition and subtraction problems at the speed of a person equipped with a hand calculator (multiplication and division are slower). The abacus is often wrongly attributed to China. In fact, the oldest surviving abacus was used in 300 B.C. by the Babylonians. The abacus is still in use today...

Words: 4881 - Pages: 20

Free Essay

Rashdrive Prevention

...Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 ISSN 2250-3153 1 Designing & Implementation of Mobile Operated Toy Car by DTMF Sabuj Das Gupta1, Arman Riaz Ochi2, Mohammad Sakib Hossain3, Nahid Alam Siddique4 1 Department of ECE, University of Victoria, Canada Lecturer, Department of EEE, American International University-Bangladesh (AIUB) 3,4 Student, Department of EEE, Chittagong University of Engineering & Technology (CUET) 2 Abstract- This paper advocates the operation of a toy car that is controlled by a mobile phone that makes a call to the mobile phone attached to the car. In the course of a call, if any button is pressed, a tone corresponding to the button pressed is heard at the other end of the call. This tone is called DTMF (dual-tonemultiple- frequency).The car perceives this DTMF tone with the help of the phone stacked in the car. The received tone is processed by the (ATmega16) microcontroller with the help of DTMF decoder MT887o. The decoder decodes the DTMF tone into its equivalent binary digit and this binary number is sent to the microcontroller. The microcontroller is programmed to take a decision for any given input and outputs its decision to motor drivers in order to drive the motors in forward direction or backward direction or left and right direction. The mobile phone that makes a call to mobile phone stacked in the car act as a remote. For that reason this paper does not require the construction...

Words: 4126 - Pages: 17

Premium Essay

Cdc and Information Systems

...Method vs. Prototype 14-15 The Phases of the Waterfall Method 15-16 Section 5: Information Systems and Society 17 History of Hacking 17 Techniques and Approaches Hackers Use 17-19 Preventive Measures for Minimizing Hacker Disruption 19-20 References 21-24 Section 1: Information Systems Overview The CDC Organizations use information systems for a multitude of reasons. Some of these reasons can be to increase the quality of healthcare and improve the overall health care industry, such as does the Centers for Disease Control and Prevention. CDC is well known for collecting data on a vast spectrum of information in order to improve the quality and the way health care is delivered. By conducting research and investigations, CDC continues to increase the security of health of our nation. Since opening its doors in 1946, CDC has been in the business of prevention and control of diseases, injury, and disability for more than 60 years (Centers for Disease Control and Prevention, 2013). In...

Words: 5907 - Pages: 24

Free Essay

Impact of Mobile Information and Communication Technology on Cybercrime

...International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security, Mobile I. INTRODUCTION Information and Communications Technology (ICT) is often used as an extended synonym for Information Technology (IT). ICT is a term that summarizes the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society. A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld...

Words: 6752 - Pages: 28

Premium Essay

Humanities

...Ancient China was a government ruled by dynasties and for many years China was eventually united under one of the regional kings; the first emperor was Qin Shi Huang, in 221 BC. China's long history has seen many extremely important ancient inventions and tremendous contributions to the world's economy and the culture of mankind. They were also important symbols of China's role as a great world civilization. Ancient China has many inventions and contributions, the 10 useful ones are identified as follows; Paper making is believed to be invented first in China. The proper paper making is one of the China's significant contributions to the development of human civilization. The paper was first made during the Western Han Dynasty (202 BC). Another invention was a movable typing printing. The world's first printings were invented in China in the Tang Dynasty (618-907 BC). Chinese began to print mainly with carved blocks. Gunpowder is a mixture of sulfur, charcoal and potassium nitrate. It was used in firearms and as a pyrotechnic in fireworks. It was a useful invention that contributed to the advancement of generating large amount of heat and gas. Chinese also invented the compass. A compass is a navigational instrument that shows directions in a frame of reference that is stationary relative to the surface of the earth. The first compasses were invented for harmonize environments and buildings in accordance with the geometric principles. The invention...

Words: 1386 - Pages: 6

Free Essay

Cyber Crime in Bangladesh

...given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement Child pornography, and child grooming. Cyber crime...

Words: 14728 - Pages: 59

Premium Essay

Things

...18 and the USSR's Soyuz 19 linked up in space to conduct joint experiments. Atari produced the first low-priced integrated circuit TV games, and the videocassette recorder (VCR) changed home entertainment forever.  Jumbo jets revolutionized commercial flight, doubling passenger capacity and increasing flight range to 6,000 miles.  The neutron bomb, which destroys living beings but leaves buildings intact, was developed. In medicine, Magnetic Resonance Imaging (MRI) technology was developed to help in diagnosis. The discovery of recombinant DNA technology in 1973 led to research in genetic engineering. This was soon halted pending development of safer techniques.  The first test tube baby, Louise Brown, was born, developed from an artificially inseminated egg implanted in the mother's womb.  Other noteworthy developments of the 1970s included these inventions or innovations: email (1971), first retail barcode scanned (1974), the laser printer (1971), and the first space lab (USA Skylab, 1973). Additionally, the electronic book was invented in 1971, eventually resulting in Project Gutenberg, the largest collection of online books. Electronics and communications The birth of modern computing was in the 1970s, which saw the development of: * the world's first general microprocessor * The C programming language * rudimentary personal computers with the launch of the Datapoint 2200 * pocket calculators * The Sony walkman was built in 1978 by audio-division engineer Nobutoshi...

Words: 992 - Pages: 4

Premium Essay

Fraternity

...RESEARCH A research problem is a statement about an area of concern, a condition to be improved, a difficulty to be eliminated, or a troubling question that exists in scholarly literature, in theory, or in practice that points to the need for meaningful understanding and deliberate investigation.  The characteristics of a good research problem. SMART S-Specific M-Measurable A-Attainable/Achievable R-Realistic T-Time Bomb/Time Conscious The characteristics of a good research problem. 1. The topic should be of good interest to you. 2. Useful for the concerned people in a particular field 3. Progress Novelty 4. Invites more complex designs / more variables 5. Time-bounded 6. Does not carry ethical or moral impediments Review Related Literature Literature means writings and a body of literature refers to all the published writings in a particular style on a particular subject.  In research, a body of literature is a collection of published information and data relevant to a research question.  The research question. Often referred to as the research problem, the research question provides the context for the research study and reveals what the researcher is trying to answer.  The paper must answer clearly, "What is the problem?" and "Why do I care?" At the same time, stating the problem precisely limits the scope of the research project by focusing on certain elements. It lets you show why those variables are important.  The statement of the...

Words: 1544 - Pages: 7