Category AI & IT

Generative adversarial networks or dueling Neural Networks can bestow AI systems with “imagination” and also poison AI defences

advanced deep architectures d2l6 deep learning for speech and language upc 2017 46 638

Most AI advances and applications are based on a type of algorithm known as machine learning that finds and reapplies patterns in data. Deep learning, a powerful subset of machine learning, uses neural networks to find and amplify even the smallest…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Naval Combat and Combat Management Systems (NCMS) being upgraded to handle new maritime security threats

ElbiNCMS

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Video virtualization and AI for near real-time actionable intelligence needed to identify and mitigate defense and security threats

videovirtualization

Police agencies are  using facial and object recognition technology for counterterrorism operations. Video footage  played a key role in finding the culprits responsible for the November 2015 Paris attacks, with a CCTV video at Brussels airport used to pin down…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF requires Seamless multi-domain communications “network of networks” fabric across C2ISR enterprise for implementing multi domain operations

C2ISRUSAF

Developing and delivering air superiority for the highly contested environment in 2030 requires a multi-domain focus on capabilities and capacity, according to the unclassified version of the Air Superiority 2030 Flight Plan.  “After 25 years of being the only great…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

Atak

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Current Trends and Challenges for Indian IT Industry and Government initiatives for the Future Growth

IT ITeS oct 2018

The information and communication technology (ICT) sector has played an important role in India’s economic growth and the emergence of an informed citizenry.   Indian IT industry s critical pillar in India’s economic growth contributing around 8% to India’s GDP.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA World Modelers to build Early Warning and Response System to rapidly build and analyze models of conflict and security

peace scaled

Early Warning and Response System (EWRS) systems aim to: Identify the causes of a conflict, anticipate their outbreak, and mitigate their impact. The EWRS are mechanisms for preventing and addressing conflicts that focus on the systematic collection, processing and analysis…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA RFMLS exploiting Machine Learning to RF domain for Spectrum sharing and Military IOT systems security

RFLMS

The field of AI has experienced a renaissance fueled by modern data-driven Machine Learning (ML) techniques. In contrast to the expert-engineered processing and decision making of the previous generation of AI, ML-based techniques are able to learn to perform a task…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Internet of Living Things (IoLT), or “Internet of Bodies,” shall save lives and improve health while create new cybersecurity, and privacy concerns

IOBT

The Internet-of-Things is an emerging revolution in the ICT sector under which there is shift from an “Internet used for interconnecting end-user devices” to an “Internet used for interconnecting physical objects that communicate with each other and/or with humans in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s PLINY & MUSE use Big Data on open-source software to remove software vulnerabilities and enhance reliability

darapamusepliny

During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here