US Navy’s State-of-The-Art AI Drone

US Navy X-47B Unmanned Combat Air System makes an arrested carrier landing

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly, the head of the Navy Expeditionary Combat Command (NECC), Rear Adm. Brian Brakke, told defensenews.com recently.

“How can I use UAS to run the initial damage assessment across that airfield?” he asked, outlining his thinking.

“Is there artificial intelligence, deep machine learning, that can run across that field, scan it, tell me what munition I have left, what condition the airfield is in; then map out a plan that my teams can look at and say: ‘OK, this is how we’re going to attack this problem’?”

Experts say the technology for Brakke’s notional drone is partly available already, there are drones that can create this kind of maps of locations and send them back for analysis. But getting the drone to also come up with a plan of attack for repairing the damaged airfield is tricky.

“We’ve got commercial drones flying right now and taking volume measurements of stockpiles,” said Michael Blades, an analyst with consulting and research firm Frost & Sullivan, who studies unmanned systems.

“That kind of high-precision mapping and survey is going on right now. You can get a good three-dimensional map by flying over a few times.” The issue, Blades said, is the analysis piece, telling the difference between a rock and an unexploded ordnance is still very much reliant on expert human eyes. “To do that autonomously, that’s the leap,” he said.

Michael Horowitz, an unmanned systems expert at the University of Pennsylvania, agreed that what’s out there now isn’t exactly what Brakke is looking for.

“Current technologies could give you a high-fidelity map after an attack,” he said. “The ability to use that data to generate a blueprint to repair that runway would be a new step.”

Developing the AI to the level it can help operators plan airfield recoveries could range from relatively simple to enormously difficult, Horowitz said. An easier hurdle would be creating an algorithm that had four pre-programmed damage scenarios and recovery plans, and based on what the drone is seeing it could then recommend the best course of action.

Whatever technologies get delivered to NECC, Brakke said companies need to factor in maintenance and support needs. “If I don’t have the folks to work on it, to understand it, to maintain it, I’m not creating a more effective force, I’m creating something that’s going to sit on a shelf that we’re not going to use,” he said.

I-HLS

You Might Also Read:

British Royal Navy Drone Ships Will Replace Sailors:

The First Ghost Ship In The US Robotic Navy:

 

« A Revolution In Warfare Made Possible By AI
Is The US Constitutional Right To Free Speech Threatened Online? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.