US Navy’s State-of-The-Art AI Drone

US Navy X-47B Unmanned Combat Air System makes an arrested carrier landing

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly, the head of the Navy Expeditionary Combat Command (NECC), Rear Adm. Brian Brakke, told defensenews.com recently.

“How can I use UAS to run the initial damage assessment across that airfield?” he asked, outlining his thinking.

“Is there artificial intelligence, deep machine learning, that can run across that field, scan it, tell me what munition I have left, what condition the airfield is in; then map out a plan that my teams can look at and say: ‘OK, this is how we’re going to attack this problem’?”

Experts say the technology for Brakke’s notional drone is partly available already, there are drones that can create this kind of maps of locations and send them back for analysis. But getting the drone to also come up with a plan of attack for repairing the damaged airfield is tricky.

“We’ve got commercial drones flying right now and taking volume measurements of stockpiles,” said Michael Blades, an analyst with consulting and research firm Frost & Sullivan, who studies unmanned systems.

“That kind of high-precision mapping and survey is going on right now. You can get a good three-dimensional map by flying over a few times.” The issue, Blades said, is the analysis piece, telling the difference between a rock and an unexploded ordnance is still very much reliant on expert human eyes. “To do that autonomously, that’s the leap,” he said.

Michael Horowitz, an unmanned systems expert at the University of Pennsylvania, agreed that what’s out there now isn’t exactly what Brakke is looking for.

“Current technologies could give you a high-fidelity map after an attack,” he said. “The ability to use that data to generate a blueprint to repair that runway would be a new step.”

Developing the AI to the level it can help operators plan airfield recoveries could range from relatively simple to enormously difficult, Horowitz said. An easier hurdle would be creating an algorithm that had four pre-programmed damage scenarios and recovery plans, and based on what the drone is seeing it could then recommend the best course of action.

Whatever technologies get delivered to NECC, Brakke said companies need to factor in maintenance and support needs. “If I don’t have the folks to work on it, to understand it, to maintain it, I’m not creating a more effective force, I’m creating something that’s going to sit on a shelf that we’re not going to use,” he said.

I-HLS

You Might Also Read:

British Royal Navy Drone Ships Will Replace Sailors:

The First Ghost Ship In The US Robotic Navy:

 

« A Revolution In Warfare Made Possible By AI
Is The US Constitutional Right To Free Speech Threatened Online? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

Liverton Security

Liverton Security

Liverton Security is a New Zealand-owned cyber security provider offering consultancy and security-related products to government and commercial customers throughout New Zealand.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.