Category AI & IT

Airforce develop Artificial Intelligence and Autonomous Systems to meet challenges of Cyber-Attacks, Anti-Access/Area-Denial (A2SD) actions and Space Threats

de2df791682f079f8397226a3ff38bc7

The current Armed drones like Predators and Reapers are essentially remote controlled that is they involve human operators remotely controlling the vehicle with the assistance of fairly low levels of automation for some functions (e.g., the operator specifies waypoints to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising Open Source Intelligence (OSINT) importance for Military

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA EC developing AI based military sensor fusion technologies to optimally combine information originating from multiple heterogeneous sensors and subsystems.

Current artificial intelligence (AI) systems only compute with what they have been programmed or trained for in advance; they have no ability to learn from data input during execution time, and cannot adapt on-line to changes they encounter in real…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Multi-Robot Collaborative Localization

Humanitarian Crisis scenarios occur frequently and they typically require immediate rescue intervention. In many cases, the scene conditions may be prohibitive for the human rescuers to provide instant aid, as they have to act within hazardous conditions, like collapsed buildings,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China controls internet to curb dissent , employs widespread surveillance for ‘anti-terror’ measures and for repression of people

terroristsChina

With President Xi Jinping at the helm, the Chinese government doubled down on repression inside and outside the country in 2021, says world report 2022 on human rights. Its “zero-tolerance” policy towards Covid-19 strengthened the authorities’ hand, as they imposed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Accurate modeling of metabolic processes for bioproduction, drug targeting, and bioremediation.

All living things require metabolism. Metabolism is the process by which the body changes food and drink into energy. During this process, calories in food and drinks mix with oxygen to make the energy the body needs. Even at rest,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Satellite Command and data handling (C&DH) & On-board computer (OBC) technologies

OBC schematic

Spacecraft are man-made machines that operate in space. An orbiting spacecraft is normally referred to as a satellite, although it is manmade as opposed to a natural satellite like our moon. A spacecraft is typically subdivided into two major parts,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA devloping tool to assess Risks of Crypto to National Security

Blockchain, bitcoin, crypto assets, and virtual currencies have become a whole new vocabulary describing innovative technology to swiftly transfer value around the world. Blockchain originated just over 10 years ago. Since then, virtual assets have become widely available and have…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here