Deepak e bomb
-
Upload
deepak-mittal -
Category
Engineering
-
view
707 -
download
16
description
Transcript of Deepak e bomb
SUBMITTED BY:DEEPAK MITTALB.E. FINAL YEAR
COLLEGE OF TECHNOLOGY &ENGINEERING,UDAIPUR
INTRODUCTION
Future warfare compaigns will require more suitable to achieve shock effect over large target sets with small Attacking force
Electromagnetic bombs (E-Bomb) can preform such a role
Developed by Dr. Carlo Kopp, Associate Fellow AIAA And Freelence Defense Analyst
It can destroy Power Grids,Electronics And Communication System along an entire cost but spare human and other Living species
It is weapon of Electrical Mass Disruption
It is based on Electromagne- tic Pulse Theory
This weapon change magnetic field which couple with electric circuitry to produce damage currents surges
AN ELECTROMAGNETIC PULSE WEAPON EMP IS DESIGNED TO OVERWHELM THE ELECTRIC CIRCUITRY WITH AN INTENSE ELECTRO MAGNETIC FIELD
ELECTRIC CURRENT GENERATES MAGNETIC FIELD AND CHANGING MAGNETIC FIELD IN TURN GENERATES A CURRENT
AN INTENSE FLUCTUATING MAGNETIC FIELD CAN PRODUCE A LARGE AMOUNT OF CURRENT WHICH CAN BURN LOW POWER SEMI CONDUCTOR DEVICES
BASIC IDEA
DESIGNING A E-BOMB
BASICALLY THERE ARE TWO METHODS FOR DESIGNING A E-BOMB
1.FLUX COMPRESSION GENERATOR (FCG) METHOD
2. VIRTUAL CATHODE OSCILLATOR (VIRCATOR)
FCG IS A DEVICE WHICH CAN PRODUCE PEAK OF ELECTRICAL ENERGIES OF MEGA JOULS IN TENS TO HUNDREDS OF MICRO SECONDS OF TIME.
IT CONSISTS OF :-
1) Power Supply
2) Explosive Pumped Copper Cylinder Surmounted by Helical Colis
3) A Micro Wave Source
FCG METHOD
Events series when the bomb goes off:
Capacitors connects to Stator sets electrical current through wires Generates Intense Magnetic Field.
Fuze mechanism ignites the explosive material Explosion travels as wave through the middle of the armature cylinder
OPERATION OF E-BOMB
Continued…
Explosion passes through cylinder Cylinder comes in contact with stator winding creates a short circuit cuts the stator off from its power supply.
Moving short circuit compresses Magnetic Field generates Intense Electromagnetic burst.
The principle of VIRACTOR is that of acceleraing a high current electron beam against a mesh(or foil) anode
Many electron will pass through the anode forming a bubble of space charge behind the anode
This space charge region will oscillate at microwave frequencies. If the space charge region is placed into resonant cavity which is appropriately tuned,very high peak powers may be achived.
The operating principle of VIRACTOR is more complex than that of FCG METHOD
VIRACTOR METHOD
Armature - copper tube / fast explosive Stator - helical heavy wire coil Initiator - plane wave explosive lense Jacket - prevents disintegration due magnetic forces
BOMB CAN BE DELIVERED THROUGH :-
1.CRUISE MISSILE
2.CONVENTIONAL AIRCRAFT
3. AIR TO AIR MISSILE
Delivery of E-bombs
TARGETING E-BOMB
fixed installations (buildings, radar and comms sites ) - conventional methods
radiating mobile / hidden targets (ships, mobile SAMs) - use ESM or ELS
non radiating mobile / hidden targets - use Unintentional Emissions (UE)
IT WOULD TEMPORARILY JAM ELECTRONICS SYSTEMS ,MORE INTENSE PULSES WOULD CORRUPT IMPORTANT COMPUTER DATA AND VERY POWERFUL BURSTS WOULD COMPLETE FRY ELECTRICAL AND ELECTRONIC EQUIPMENTS.
AN E-BOMB COULD EFFECTIVELY NEUTRALIZE:-
• Vehicle control systems• Targeting systems, on the ground and on missiles and bombs Communications systems
•Navigation systems Long and short-range sensor systems
DEFENCE AGAINST BOMB
convert computer rooms in to Faraday cages
use optical fibers for data
isolate power feeds with transient arrestors
use electromagnetic “air lock”
shielding must be comprehensive
Means of implementing E-Bombs are difficult.
Means of delivery constrain the accuracy of weapon.
Atmospheric propagation of waves.
Difficult kill assessment
LIMITATATION
Offers a very high payoff in attacking the fundamental information processing and communication facilities
E-bombs can cause hard electrical kills over larger areas than conventional explosives
Measures should be taken to safeguard against future attacks