US Navy’s State-of-The-Art AI Drone

US Navy X-47B Unmanned Combat Air System makes an arrested carrier landing

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly, the head of the Navy Expeditionary Combat Command (NECC), Rear Adm. Brian Brakke, told defensenews.com recently.

“How can I use UAS to run the initial damage assessment across that airfield?” he asked, outlining his thinking.

“Is there artificial intelligence, deep machine learning, that can run across that field, scan it, tell me what munition I have left, what condition the airfield is in; then map out a plan that my teams can look at and say: ‘OK, this is how we’re going to attack this problem’?”

Experts say the technology for Brakke’s notional drone is partly available already, there are drones that can create this kind of maps of locations and send them back for analysis. But getting the drone to also come up with a plan of attack for repairing the damaged airfield is tricky.

“We’ve got commercial drones flying right now and taking volume measurements of stockpiles,” said Michael Blades, an analyst with consulting and research firm Frost & Sullivan, who studies unmanned systems.

“That kind of high-precision mapping and survey is going on right now. You can get a good three-dimensional map by flying over a few times.” The issue, Blades said, is the analysis piece, telling the difference between a rock and an unexploded ordnance is still very much reliant on expert human eyes. “To do that autonomously, that’s the leap,” he said.

Michael Horowitz, an unmanned systems expert at the University of Pennsylvania, agreed that what’s out there now isn’t exactly what Brakke is looking for.

“Current technologies could give you a high-fidelity map after an attack,” he said. “The ability to use that data to generate a blueprint to repair that runway would be a new step.”

Developing the AI to the level it can help operators plan airfield recoveries could range from relatively simple to enormously difficult, Horowitz said. An easier hurdle would be creating an algorithm that had four pre-programmed damage scenarios and recovery plans, and based on what the drone is seeing it could then recommend the best course of action.

Whatever technologies get delivered to NECC, Brakke said companies need to factor in maintenance and support needs. “If I don’t have the folks to work on it, to understand it, to maintain it, I’m not creating a more effective force, I’m creating something that’s going to sit on a shelf that we’re not going to use,” he said.

I-HLS

You Might Also Read:

British Royal Navy Drone Ships Will Replace Sailors:

The First Ghost Ship In The US Robotic Navy:

 

« A Revolution In Warfare Made Possible By AI
Is The US Constitutional Right To Free Speech Threatened Online? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

2-sec

2-sec

2-sec is a specialist provider of cyber security audit, penetration testing and advisory services.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Smart Payment Association (SPA)

Smart Payment Association (SPA)

Smart Payment Association (SPA) is the trade body of the smart payments industry.

Cydome Security

Cydome Security

Cydome offer solutions to protect your sensitive data even when it leaves the organization perimeter.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

ByteLife Solutions

ByteLife Solutions

ByteLife Solutions specialises in the provision of IT infrastructure services and solutions, including cybersecurity.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.