Category AI & IT

US Navy thrust on preventative maintenance & prognostics-based approach to increase operational availability or mission success of Naval fleet or battlegroup

progmainten scaled

One of the major objectives of the military is to achieve high reliability and operational availability of their assets. Significant operational benefits are to be gained by employing highly reliable military assets. The major reasons why achieving high reliability is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA A-Teams, CAML & ADAPT programs developing efficient Agile Human-Machine Teams to execute battlefield, cyber and electronic warfare missions

DAEPACAML

The prime aim of US third offset strategy, announced in November 2014,  was to develop effective strateges against multiple potential competitors, from small regional states like North Korea and Iran, to large advanced states like Russia and China, to non-state…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CHARIOT developing Quantum proof cryptography for Military Mobile and IoT security

darpachariot

The exponential price/performance improvements in semiconductor technology stemming from Moore’s Law are enabling even the smallest and most application-specific devices, such as sensors and actuators, to include networking capabilities. The overwhelming majority of such devices will be cheap and power-constrained.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HACCS employing AI for cybersecurity by developing autonomous software agents, that will infiltrate adversary’s networks, detect botnets and neutralize them

Defense research unit neutralize botnets

As the complexity of software is growing software vulnerabilites are also increasing. According to two US based organizations that track vulnerability disclosure, the number of software vulnerabilities has gradually grown year-over-year achieving its highest peak in 2017. Computers are not…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA V-SPELLS to develop automated tools for understanding, Re-engineering and Assurance of legacy software of Defense and Aerospace systems

DARPAV SPELLS

The complexity of  aerospace and defense software has grown manyfold. For example, the U.S. Air Force F-22 Raptor jet fighter, consists of about 1.7 million lines of software code, while the F-35 joint strike fighter has about 5.7 million lines…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army’s JUDI is employing Conversational AI to imrpove soldier-robot interaction for Manned-unmanned teaming (MUM-T)

Army JUDI

Since fully autonomous UAS are still far off, the  US Army has developed concept of Manned-unmanned teaming (MUM-T)  for operation in A2/AD environments. Through MUM-T operations they expect to combine the strengths of manned and unmanned  platform to increase situational…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army developing Manned-Unmanned Teaming ( MUM-T ) technologies in multiple domains for operation in A2/AD environments

mannedunmannedteam scaled

US military is facing increasingly Anti-access /Area denial environment, a set of overlapping military capabilities and operations designed to slow the deployment of U.S. forces to a region, reduce the tempo of those forces once there, and deny the freedom…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DOD Digital Engineering Strategy based on Model-Based Systems Engineering (MBSE) for Military System of Systems (SOS)

MBSE

A system is defined by NASA as  a construct or collection of different elements that together produce results not obtainable by the elements alone. Systems Engineering (SE) is defined as: The process by which a customer’s needs are satisfied through the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s ARC and BLADE developed Cognitive and Adaptive Electronic warfare Systems to Counter dynamic wireless communication and radar threats

radar electronic warfare in the raf 42 638

Electronic warfare provide  means to counter adversary’s radar and communication systems  while protecting one’s own systems through  Electronic Attack (EA), Electronic Protection (EP) and Electronic Support (ES). Jamming systems still rely on classified databases of known emitter signals. As radars emit…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cognitive and Adaptive Radar technologies can counter advanced electronic threats

adaptiveradar

RADAR offers special advantages with respect to other types of sensors including all-day, all-weather operations, long detection distance and, depending on the frequency used, penetration. Moreover, radar can often be carried by a number of platforms, spanning from classic naval…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here