Autonomous Technology To Prevent Collisions At Sea

The US Navy is considering installing autonomous technology currently used on crewless ships on warships driven by sailors as a way to improve safety on the high seas.  These are methods based on Artificial Intelligence, data-driven methods based on Machine Learning, and other Data Science approaches are investigated to provide a comprehensive overview of maritime collision avoidance techniques applicable to Maritime Autonomous Surface Ships. 

Right now, the US Navy is testing uncrewed, autonomous ships and submarines, which officials consider a necessary piece of the fleet for the future. 

While the Navy was unlikely to pursue a formal program for unmanned surface vessels in the next five years, preferring  instead to focus on the on the enabling technologies first. The idea of embracing autonomous vessels to create sustainable development and shape new opportunities for water transportations in the industry is getting feasible. As the technological barriers are resolved in numerous studies, autonomous vessels have been drawing significant attention recently. 

For autonomous vessels, the collision avoidance system (CAS) and the control system are two fundamental systems, which are closely related with vessel movements and safety performance. 

Installing autonomous and machine-learning technology on a crewed ship could be one way to prove the technology works and the Navy is consequently considering installing autonomous technology currently used on crewless ships on warships driven by sailors as a way to improve safety and avoid collisions on the high seas.

The Navy has asked shipbuilding companies for proposals on the ways these types of bridge decision aid technologies could support safe navigation in Navy ships and submarines. Installing this tech inside the bridge of crewed ships could build user trust in the decision-aid solutions has been said to work. 

The Engineer:    ResearchGate:   I-HLS:     DefenseOne:    Hindawi:  

You Might Also Read: 

Autonomous Ships And Cyber Security:

 

« Protecting Your Small Business From Cyber Attacks
A Quick Guide To Remote Code Execution (RCE) »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.