Category AI & IT

DARPA DRBE developing Super Computers for Live Virtual Constructive training to test AI enabled Radar and EW systems

LVC

According to a 23 January DARPA solicitation, the cost, complexity, and limited availability of military ranges mean that operational training and system test and evaluation will increasingly take place in completely virtual environments. Furthermore, the increasing adoption of artificial intelligence…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Next Robot revolution is achieving Human-Like dexterous manipulation for home, Industry and Security

desterousrobot

Robots have already become an indispensable part of our lives. However currently, most robots are relatively rigid machines which make unnatural movements. In contrast, humans seem to be able to manipulate objects with our fingers with incredible ease like sifting…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Generative adversarial networks or dueling Neural Networks can bestow AI systems with “imagination” and also poison AI defences

advanced deep architectures d2l6 deep learning for speech and language upc 2017 46 638

Most AI advances and applications are based on a type of algorithm known as machine learning that finds and reapplies patterns in data. Deep learning, a powerful subset of machine learning, uses neural networks to find and amplify even the smallest…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Naval Combat and Combat Management Systems (NCMS) being upgraded to handle new maritime security threats

ElbiNCMS

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Video virtualization and AI for near real-time actionable intelligence needed to identify and mitigate defense and security threats

videovirtualization

Police agencies are  using facial and object recognition technology for counterterrorism operations. Video footage  played a key role in finding the culprits responsible for the November 2015 Paris attacks, with a CCTV video at Brussels airport used to pin down…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF requires Seamless multi-domain communications “network of networks” fabric across C2ISR enterprise for implementing multi domain operations

C2ISRUSAF

Developing and delivering air superiority for the highly contested environment in 2030 requires a multi-domain focus on capabilities and capacity, according to the unclassified version of the Air Superiority 2030 Flight Plan.  “After 25 years of being the only great…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

Atak

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Current Trends and Challenges for Indian IT Industry and Government initiatives for the Future Growth

IT ITeS oct 2018

The information and communication technology (ICT) sector has played an important role in India’s economic growth and the emergence of an informed citizenry.   Indian IT industry s critical pillar in India’s economic growth contributing around 8% to India’s GDP.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA World Modelers to build Early Warning and Response System to rapidly build and analyze models of conflict and security

peace scaled

Early Warning and Response System (EWRS) systems aim to: Identify the causes of a conflict, anticipate their outbreak, and mitigate their impact. The EWRS are mechanisms for preventing and addressing conflicts that focus on the systematic collection, processing and analysis…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA RFMLS exploiting Machine Learning to RF domain for Spectrum sharing and Military IOT systems security

RFLMS

The field of AI has experienced a renaissance fueled by modern data-driven Machine Learning (ML) techniques. In contrast to the expert-engineered processing and decision making of the previous generation of AI, ML-based techniques are able to learn to perform a task…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here