Autonomous Technology To Prevent Collisions At Sea

The US Navy is considering installing autonomous technology currently used on crewless ships on warships driven by sailors as a way to improve safety on the high seas.  These are methods based on Artificial Intelligence, data-driven methods based on Machine Learning, and other Data Science approaches are investigated to provide a comprehensive overview of maritime collision avoidance techniques applicable to Maritime Autonomous Surface Ships. 

Right now, the US Navy is testing uncrewed, autonomous ships and submarines, which officials consider a necessary piece of the fleet for the future. 

While the Navy was unlikely to pursue a formal program for unmanned surface vessels in the next five years, preferring  instead to focus on the on the enabling technologies first. The idea of embracing autonomous vessels to create sustainable development and shape new opportunities for water transportations in the industry is getting feasible. As the technological barriers are resolved in numerous studies, autonomous vessels have been drawing significant attention recently. 

For autonomous vessels, the collision avoidance system (CAS) and the control system are two fundamental systems, which are closely related with vessel movements and safety performance. 

Installing autonomous and machine-learning technology on a crewed ship could be one way to prove the technology works and the Navy is consequently considering installing autonomous technology currently used on crewless ships on warships driven by sailors as a way to improve safety and avoid collisions on the high seas.

The Navy has asked shipbuilding companies for proposals on the ways these types of bridge decision aid technologies could support safe navigation in Navy ships and submarines. Installing this tech inside the bridge of crewed ships could build user trust in the decision-aid solutions has been said to work. 

The Engineer:    ResearchGate:   I-HLS:     DefenseOne:    Hindawi:  

You Might Also Read: 

Autonomous Ships And Cyber Security:

 

« Protecting Your Small Business From Cyber Attacks
A Quick Guide To Remote Code Execution (RCE) »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Smartbear

Smartbear

Smartbear offers powerful, affordable and easy to use code review, automated testing, performance testing and post deployment monitoring tools.

Forensic Control

Forensic Control

Forensic Control is an insider threat and risk management firm specialising in computer forensics and behavioural psychology.

Certes Networks

Certes Networks

Certes Networks offers an encryption management solution that can be seamlessly integrated and is interoperable with any network.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.