RMA Webinars

Held monthly, illustrating research at RMA

11 June 2024 14h00-14h30

Georgi Nikolov

With the rapid growth of the Internet, network infrastructures need to keep pace and develop their cyber security awareness through the use of different Intrusion Detection (IDS) and Prevention Systems (IPS). These systems often are dependent on signature-...

11 June 2024 13h30-14h00

Arnaud Stoz

When developing software, developers and companies usually rely on numerous external libraries. According to GitHub State of the Octoverse Report 2019, open-source projects have an average of 180 package dependencies. The same goes for commercial and closed-s...

14 May 2024 14h00-14h30

Dr. Andrew Rebera

A great deal of military technology aims at enhancing risk-asymmetry, i.e. at reducing risks faced by the militaries that deploy it and/or increasing the risks imposed upon their enemies. For example, unpiloted aerial vehicles (UAVs) and (semi-)autonom...

14 May 2024 13h30-14h00

Vita Glorieux, M.Sc., Salvatore Lo Bue, Lieutenant-Colonel, Ph.D & Dr. Martin Euwema

Military personnel undergo rigorous training to navigate the complexities of deployment cycles. While research and practice have given significant attention to interventions during initia...

9 April 2024 13h30-14h30

by Dr K. Crombé & A. Goriaev

The idea of nuclear fusion employment as an energy source attracts more and more attention, reflecting the current socioeconomic situation. It stimulates the further development of different classical experimental fusion devices and the fast...

12 March 2024 13h30-14h30

by Dr Ir Angel Miranda-Vicario

Body armour systems, like bullet-resistant vests or fragment-resistant helmets, are tested extensively according to different norms and standards before being introduced for service, in order to ensure these systems can provide the require...

13 February 2024 13h30-14h30

by Mr. Djamal Belmehdi

Dual-use substances or those used to synthesize known homemade explosives (HME) are strictly controlled. Nevertheless, tertiary explosives are generally not considered as explosives by international regulations. As they are exceptionally diffic...

05 December 2023 13h30-14h30

by Bart De Clerck (MWMW)

Open source intelligence (OSINT) is a valuable tool for military information gathering and decision-making. It can be used to uncover actionable insights, verify secret information, and provide near-real-time information. As seen in the recen...

07 November 2023 13h30-14h30

by Sara Van Hoeymissen, Nick Houttekier & Eleftheris Vigne (DEML)

In a world of rising geopolitical tensions, economic relations between states are becoming an arena of conflict. Recent crises, such as the COVID-19 pandemic and the Russian invasion of Ukraine, have d...

03 October 2023 13h15-14h15

by Prof Delphine Resteigne & Wendy Gomes (Chair of Sociology)

Having been considered as “uniformed” organizations for a long time, military organizations are increasingly focusing on the integration and inclusion of minority groups. They do this in order to attract an...

12 September 2023 13h30-14h30

by Maj. Nathalie MARCUS

La menace terroriste en Belgique et en Europe n’est pas un phénomène nouveau. Cependant, cette menace est devenue nettement plus palpable depuis les attentats de 2001 aux Etats-Unis suivis de plusieurs attentats sur le sol européen ces vingt...

06 June 2023 13h45-14h15

by Cdt Dr Ir Romuald VAN RIET

Ammunition ageing has always been an issue, especially when ammunition is stored in hot climates. Ammunition ageing can lead to deterioration of the weapon's ballistic properties, damage to weapon systems and, in extreme cases, spontaneous...

06 June 2023 13h15-13h45

by Cdt Dr Ir Romuald VAN RIET

Tertiary explosives are a serious and emerging threat in the context of homeland security, counterterrorism and counter-improvised explosive devices, and are therefore the subject of this research conducted in collaboration between the RMA'...

02 May 2023 13h00-14h00

by Dr. J. Van Cutsem & Prof. M. Van Puyvelde

“It is not the strongest, but the most adaptable that survive”, wrote Charles Darwin in 1859. A lot of our military operators need to function in what is called a vulnerable, volatile, uncertain, complex, and ambiguous (VUCA)...

04 April 2023 13h00-14h00

by B.G. Marinus & B. Janssens

Flows and the associated mass and energy transfer as well as forces have been studied from the dawn of engineering for their prevalence around us. The movement of gases and fluids govern an extremely wide set of applications ranging from l...

07 March 2023 13h00-14h00

by dr. Jef ONGENA & Lt. Kol. Maarten VERGOTE

The consequences of the massive expansion of solar and wind energy for electricity generation are illustrated based on results from the German Energiewende of the past 5 years. The large variability in production leads to pe...

07 February 2023 13h30-14h30

by dr. Cyril ROBBE

Through the years, Non-Lethal Weapons (NLW) are becoming more and more widespread. The concept is indeed appealing: neutralizing the threat with a reduced level of deployed force, mitigating unnecessary injuries or casualties and reducing the pote...

10 January 2023 13h30-14h00

by dr. Helena Bruyninckx

Due to the widespread availability of Information hiding techniques (steganography), potential perpetrators can quickly select, adapt and combine information hiding tools for their criminal activities.

Detecting this hidden information in...

10 January 2023 13h00-13h30

presented by the Members of ALICE, the Crypto group of the Mathematics department

In an increasingly digital world, cryptography is the only known solution to provide security in a cost-effective and scalable manner.

While mostly hidden to its users, cryptography p...

06 December 13h00-14h00

The past several years have presented numerous challenges for organizations of all types. The last year in particular emphasizes the importance of an organization’s capacity for change to drive performance and success in a volatile, uncertain, complex and ambiguous (VUCA)...

08 November 13h00-14h00

Le thème du webinar portera sur la recherche qui est actuellement menée sur les NEETs ( ‘not in employment, education or training’) par le Centre de recherche HIVA de la KU Leuven et la Chaire de Sociologie de l’ERM. Il s’agit donc des jeunes qui sont dans une situation fr...

04 October 13h00-14h00

Since the terrorist attacks in Zaventem and Maelbeek, TATP is probably the best known of all of the home-made explosives. It is no surprise that all aspects of this (and other) home-made explosives are investigated in the Laboratory for Energetic Materials and Blast Enginee...

06 September 13h00-14h00

Robotics has been changing our daily life since the 60s, starting with the development of industrial robots able to perform repetitive and painful tasks in a controlled environment. With the constant evolution of technology, such as the embedded computational power or the...

07 June 13h00-14h00

In view of the increase in illicit maritime activities like piracy, sea robbery, trafficking of narcotics, immigration and illegal fishing, an enhance of accuracy in surveillance is essential in order to ensure safer, cleaner and more secure maritime waterways. Recently, the f...

10 May 13h00-13h30

Na de capitulatie van Leopold III en zijn leger op 28 mei 1940, gebruikten de Franse, Britse en zelfs de Belgische regering deze daarna als zondebok. Dit besmeurde de reputatie van de hele Belgische krijgsmacht leidde tot de mythe dat het helemaal niet gevochten had, op enkele u...

20 Apr 13h00-14h00

Nuclear fusion on Earth would be the ideal solution for our future energy supply with almost unlimited ressources and excellent compatibility with the environment. The easiest fusion reaction on Earth is that between the hydrogen isotopes deuterium and tritium, and requires abou...

15 Mar 13h30-14h00

Cette seconde présentation portera sur l’interaction humain – systèmes autonomes, appliquée au domaine militaire. Les activités humaines sont aujourd’hui de plus en plus assistées par des systèmes dits (semi-)autonomes, et ce dans des domaines extrêmement variés (militaire, tran...

15 Mar 13h00-13h30

Ce séminaire visera dans un premier temps à fournir un aperçu des principales questions de recherche abordées en psychologie et en neurosciences appliquées au domaine militaire. Nous y aborderons notamment l’apport de la psychologie et des neurosciences cognitives dans l’optimi...

15 Feb 13h30-14h00

One of the most promising approaches to detect and classify UAVs is through sensing their RF communication with the ground control station. We will illustrate that, while the principle holds, the practical details can become extremely intricated owing to the complexity of the wa...

15 Feb 13h00-13h30

Counter-UAV technology, also known as counter-UAS, C-UAS, or counter-drone technology, refers to systems that are used to detect and/or neutralize unmanned aircraft. As concerns grow around the potential security threats, drones may create to both civilian and military interests...