Você está na página 1de 29

1 RESTD ARTIFICIAL INTELLIGENCE AND REVOLUTION IN MILITARY AFFAIRS

1.

Introduction. The world is presently resting on the cusp of technological

revolution. As with any promising new military technology, expectations often exceed the eventual reality of performance, once the complexities of the operating environment and enemy actions are brought to bear. Furthermore, the utility of any military technology is largely dependent on its effective integration into existing military organizations, is a way that combines it with other capabilities and harnesses it with military aims. Artificial Intelligence (AI) is the subject which deals with creating intelligent machines which can think and act like humans. These high end technologies are changing the facets of modern battlefield environments. 2. Artificial intelligence is finding new avenues in the military and numerous

applications are being developed. The induction of these technologies are facilitating military decisions, minimizing human causalities and enhancing the combat potential of forces. Artificial intelligence (AI) has become a field of intense interest and high expectations within the scientific and defense technology community. This focus of activity is well deserved as Artificial intelligence holds the promise of dramatically changing, if not revolutionizing, the design of military systems. This is especially true in war time environment when data availability is high, decision periods are short, and decision efficiency and effectiveness are an absolute necessity. Artificial intelligence in Revolution Military Affairs (RMA) are wide and varied encompassing numerous areas including smart weapon system,

RESTD

2 RESTD advanced communications, precision munitions, information processing and networks, strategic planning, tactical decision making, logistic and supply systems, battle space management, unmanned aerial platforms, training simulators and automated security system. 3. Aim. To study evolution of Artificial Intelligence in military applications, its

existing status, future potential and impact on future warfare with special relevance to revolution in military affairs. 4. Scope. The research will be covered in the following sequence:a. b. c. d. e. f. g. History/ Evolution of AI. Applications of AI. Military Use of AI. Concept of RMA and AI. RMA and Applications of AI. RMA, Artificial Intelligence and Pakistan Army Recommendations.

RESTD

3 RESTD PART I HISTORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE 5. History/ Evolution of Artificial Intelligence a. Origin of AI. The origins of Artificial Intelligence usually incorporate the theories proclaimed by several ancient Greek philosophers and scientists. Although, arguments can be made that the Egyptians1 originally garnered that stake with the advancements they made around 800 B.C. The 20th century produced the revolution of formal logic with Bertrand Russell and Alfred North Whiteheads Principia Mathematica2. The true driving factor of AI came in the 1940s with the creation of the electronic computer. Advancements in computer theory and computer science led to advancements in AI as well. b. Present Day Status. From 1993 until the turn of the century, AI has reached some incredible landmarks with the creation of intelligent agents. Intelligent agents basically use their surrounding environment to solve problems in the most efficient and effective manner. In 1997, the first computer (named Deep Blue) beat a world chess champion. In 1999, humanoid robots began to gain popularity as well as the ability to walk around freely. Since then, AI has been playing a big role in certain commercial markets and throughout the World Wide Web. The more advanced AI projects,
1

Buchanan, Bruce G. A (Very) Brief History of Artificial Intelligence. AI Magazine 26(4): Winter 2005, 5360. Gardner, Martin. Logic Machines & Diagrams. NY: McGraw-Hill, 1958.

RESTD

4 RESTD like fully adapting commonsense knowledge, have taken a backburner to more lucrative industries. 6. Applications of Artificial Intelligence. Artificial Intelligence paradigms

are used to mimic the behavior of humans in a limited way. These include tools such as symbolic logic, Artificial Neural Networks (ANNs)3, fuzzy systems, evolutionary computing, Intelligent Agents and probabilistic reasoning models. In conventional programming methodologies, explicit logic and numerical

calculations are provided to solve a problem. In contrast, an ANN mimics some biological systems by solving problems using training and learning to generalize for new problems. Artificial Intelligence paradigms have been used successfully to solve problems in many disciplines including business, management, engineering design, medical diagnosis, decision making and web-based systems. a. Autonomous Devices. Artificial Intelligence may only get

developed to a certain level due to the threat humans feel as computers get more and more intelligent. Robotics is one of the facets of autonomous devices, they can be termed as Mechanical AI. It is also a lot more complicated, since the data the robot is receiving is real-time, real-world data, a lot more complicated that more software-based AI programs have to deal with. b. Expert Systems. By the early 1980's an "expert systems" industry had emerged, and Japan and Europe dramatically increased their funding of AI research. The field did not grow as rapidly as
3

Gabriela, Prelipcean. New Ideas on the Artificial Intelligence Support in Military Applications

RESTD

5 RESTD investors had been led to expect, and this translated into some temporary disillusionment. Today developers can build systems that meet the advanced information processing needs of

government and industry by choosing from a broad palette of mature technologies. Sophisticated methods for reasoning about uncertainty and for coping with incomplete knowledge have led to more robust diagnostic and planning systems. (1) Intelligent Vacuum Cleaner. An artificial intelligent vacuum cleaner goes around the house, remembering the layout of the house after a few trial runs. It even memorizes the areas that tend to be dirtier. (2) Writing an Essay. As you write your essay, the program will automatically correct spelling according to the context of the sentence, just like a human corrector would do. It naturally analyzes your document for grammar errors, and alerts you of such errors. (3) Researching the Net. An AI-powered search engine finds web pages given your natural language search requirements (4) Security. The security system is linked up to a computer, running an image recognition package. When something crosses the field of view of the camera, the computer analyzes and compares its results to the pictures in the database. If it doesn't recognize the 'face' an alarm is

RESTD

6 RESTD sounded, and the police are alerted with a picture of the potential burglar. c. Artificial Neural Networks. Neural Networks4 philosophy is based on the concept of a neuron as a unit for information storage and mapping input to output. This building block of human awareness encompasses a few general capabilities. Basically, a biological neuron receives inputs from other sources, combines them in some way, performs a generally nonlinear operation on the result, and then outputs the final result. These networks need to be capable of an infinite number of responses. Applications of this type include the "intelligence" behind robotic movements. Few other applications are described in subsequent paras:(1) Face recognition. This includes the process in which an image is being given as an input to the system. The process first decides that if there is a face in the system. The neural network identifies the area of the image where there is a face so we go on to give that portion of the image to the data base with which we have to match the system. The desired profile may be given to the output. (2) Character Recognition. Character recognition is another area in which neural networks are providing solutions. Some of these solutions are beyond simply academic curiosities.

Jonansson, Stefan. Neural Network with Military Applications, 25 October 2005.

RESTD

7 RESTD HNC Inc., markets a neural network based product that can recognize hand printed characters through a scanner. (3) Image Compression. A number of studies have been done proving that neural networks can do real-time compression
5

and decompression of data. These networks can reduce

eight bits of data to three and then reverse that process upon restructuring to eight bits again. However, they are not lossless. Because of this losing of bits they do not favourably compete with more traditional methods. (4) Signal Processing. Neural networks' promise for signal processing has resulted in a number of experiments in various university labs. Neural networks have proven capable of filtering out noise. Widrow's MADALINE was the first network applied to a real-world problem. It eliminates noise from phone lines. (5) Financial Systems. Neural networks are making big inroads into the financial worlds. Banking, credit card companies, and lending institutions deal with decisions that are not clear cut. They involve learning and statistical trends. The data from these forms is now being used by neural networks which have been trained on the data from past decisions.

A. Khashman and K.M. Curtis, "A Novel Image Recognition Technique For 3-Dimensional Objects", IEEE Int. Conf. (DSP'97), Santorini, Greece, 1997.

RESTD

8 RESTD (6) Servo Control. Controlling complicated systems is one of the more promising areas of neural networks. Most conventional control systems model the operation of all the system's processes with one set of formulas. To customize a system for a specific process, those formulas must be manually tuned. It is an intensive process which involves the tweaking of parameters until a combination is found that produces the desired results. (7) Language Processing. Language processing encompasses a wide variety of applications. These applications include text-to-speech conversion, auditory input for machines, automatic language translation, secure voice keyed locks, automatic transcription, aids for the deaf, aids for the physically disabled which respond to voice commands, and natural language processing.

RESTD

9 RESTD PART - II 7. Artificial Intelligence in the Military. The military and the science of

computers has always been incredibly closely tied - in fact, the early development of computing was virtually exclusively limited to military purposes6. The very first operational use of a computer was the gun director used in the Second World War to aid ground gunners to predict the path of a plane given its radar data. AI in the military is defined as any system which uses the help of intelligent machines to complete tasks. Few application in the military are appended below:a. Robotics. There is currently a large amount of research work going in the vast fields of autonomous robotics7. These devices will be equipped with limited processing capabilities and will thus singularly not be able to successfully reach the end result. Thus having multiple devices, each performing a separate function, intermediate results can be integrated to achieve a final solution. According to a report the US military will have approximately 30% of the Army comprised of robotic forces by approximately 2020. b. Surveillance Systems. Recent operations in conflict areas around the world have made the need for accurate image processing and fast target detection for military systems more obvious. The computational cost is kept to a minimum through using a fast edge detection operator combined with the power of a successfully
McCorduck, Pamela. Machines Who Think. San Francisco: W.H. Freeman, 1979 Dwarkadas J. Sanghvi. Autonomous Robotics, College Of Engineering, Vile Parle, Mumbai. 17th August, 2006
7 6

RESTD

10 RESTD trained neural network that recognizes only one correct scale for the entire image, out of the many available scales possible in scale space. c. Weapon Platforms. The future war is based on information and knowledge resources as the main combat information warfare, information warfare against the characteristics, combined with hightech precision guided weapons8 in the application of analysis of precision-guided weapons in future wars in the direction of development. Precision-guided weapons in the direction system, network, intelligent, stealth technology, while also moving toward integration, multi-purpose direction, focusing on the improvement of cost-effective, future wars will gradually become the basic fire. d. Simulators. There are at least three major categories of simulation users in the militarythose that are training individual combatants or leaders and teams; those that are performing analyses of systems, doctrine, and tactics for purposes of acquisition and advanced development; and those that are addressing questions associated with improving command and control and the

interoperability of joint forces. (1) Live Simulations. Live simulations are least dependent on accurate models of human behavior because in these exercises, real humans operate real equipment.
8

The

Wang Wang Yu. Precision-guided weapons in the information warfare of the Development Trend Analysis.

RESTD

11 RESTD aspects that are simulated involve weapon firing and how hits of different types of ordnance are measured and recorded. (2) Virtual Simulations. characterized by real Virtual humans simulations operating are simulated

equipment in simulated environments. These simulations use a full range of multimedia technology and computer software to replicate weapon and system functions in real time with a suitable level of fidelity for interactive training with humans in the loop. (3) Constructive Simulations. It involves simulated people operating simulated equipment, usually not in real time. Real people provide inputs that set limiting values on parameters, but they are not involved in determining the outcomes. All human behavior in the event flow comes from models. e. Decision Making Systems. Military decision making demands an increasing ability to understand and structure the critical information on the battlefield. As the military evolves into a networked force, decision makers should select and filter information across the battlefield in a timely and efficient manner. Human capability in analyzing all the data is not sufficient because the modern battlefield is characterized by dramatic movements, unexpected

RESTD

12 RESTD evolutions, chaotic behavior and non-linear situations. The Artificial Intelligence (AI) ingredient permits to explore a greater range of options, enabling the staff to analyze more possible options in the same amount of time, together with a deeper analysis of these options. f. Information/ Intelligence Processing Systems. The concept

of information processing systems needs to exploit the advances in Information Technology for providing all weather surveillance, collation and instant dissemination of this information to facilitate increased battlefield transparency. Image interpretation for target identification and classification. Artificial Intelligence techniques could automate the extraction of low-level map features from imagery. The systems are basis of concept of fusion centres.

RESTD

13 RESTD PART - III CONCEPT OF RMA AND ARTIFICIAL INTELLIGENCE Revolution in Military Affairs (RMA) 8. RMA is defined as A major change in the nature of warfare, brought

about by innovative application of new technologies which, combined with changes in military doctrine and operational/organizational concepts,

fundamentally alters the character and conduct of military operations.9 The concept is defined in the USA Department of Defences Annual Report to Congress as A Revolution in Military Affairs (RMA) occurs when a nation's military seizes an opportunity to transform its strategy, military doctrine, training, education, organization, equipment, operations, and tactics to achieve decisive military results in fundamentally new ways.10 It is combination of military

thinking of officers, military technology, military equipment, strategic theories, force structure and the fast development of information technology11. RMA is the product of socio-economic and technological developments. It is organic and timely combination of advanced weapon systems, new military theoretical guide and suitable force structure12. The application of new technologies into significant number of military systems combines with innovative operational concepts and organizational adaptation in a way that fundamentally alters the character and

10

Lieutenant Colonel Muhammad Azeem Asif, RMA Shaping the Contours of Tomorrows Warfare, The Citadel, Vol. 3/2000, p 70-82. William S. Cohen, Secretary of Defense, Annual Report to the President and the Congress,1992. Zhang Hui The New Ideas in Study of RMA The Journal of PLA, NDU, 1998,p.67. Zhu Gaungya, ed, p.62.

11 12

RESTD

14 RESTD conduct of a conflict13. 10. This is further substantiated by Doctor Burkhard Theile, he says, A Revolution in Military Affairs is triggered by two crucial factors: the technological aspect and doctrine. The process of technology doctrine operational concept organization is long and can be seen as an evolutionary process. The outcome may be revolutionary. Combined with a drastic change in military doctrine, operational concepts and organization, this alters the fundamental character of military operations. Forms of RMA 9. The current RMA could take one of the following forms14:a. Single System RMA. In this type, a single technology influences the RMA. An example is the nuclear revolution and gunpowder revolution. b. Combined System RMA. In this category, a collection of military systems is put together in new ways to achieve revolutionary effects. The inter-war innovations of armoured warfare by the German army, amphibious warfare by the US Marine Corps, carrier warfare by the US Navy, and strategic bombing by the US Army Air Forces have been characterized as "Combined System RMA." c. Integrated System RMA. The different systems, when joined with their accompanying operational and organizational concepts, will become integrated systems. Evidence suggests that the revolution unfolding today, that is to say current RMA, is neither a combined13 14

Andrew Krepinevich, Military Strategy Chapter 1 p.7. Jeffrey McKitrick and Dale Hill, The Revolution in Military Affairs Battlefield of the Future, [Online] Available http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.

RESTD

15 RESTD system nor a single-system RMA but an integrated-system RMA. The outlook is for the rapid evolution of new technologies eventually leading to the development of several advanced military systems. In contrast to developments during the interwar period, this system-of-systems approach will aim to take advantage of the cumulative effect of employing each of the new capabilities at the same time. Relation of Future RMA with AI 15 10. Precision Strike. Precision strike is the ability to locate high value, time

sensitive, fixed and mobile targets, to destroy them with a high degree of confidence, with minimized damage and no chance of enemy counter strikes. Effect of precision strike was demonstrated in Gulf, Kosovo and Afghan Wars. Dramatic increase in capabilities to strike, a strategic target demonstrates the importance of this concept. 11. Information Warfare. This is the category of warfare related to

information systems, their capabilities and their effects on military organizations and operations. It is the struggle between two or more opponents to control the information battle space. At national level, it is a new form of strategic warfare. At the military operational level, it may contribute to major changes in conduct of war. 12. Dominating Manoeuvre. Manoeuvre has always been an essential

element in warfare, but RMA potentially presents the ability to conduct

15

Jeffrey McKitrick and Dale Hill, The Revolution in Military Affairs Battlefield of the Future, [Online] Available http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.

RESTD

16 RESTD manoeuvre at global scale, on a much compressed time scale and with greatly reduced forces. It can be defined as positioning of forces integrated with precision strike, space warfare and information war operations, to attack decisive points, defeat the enemys centre of gravity and accomplish war objectives. 13. Space War. It is the exploitation of space environment to conduct full

spectrum, near real time, global military operations. It involves dominating the space, to deny its advantages to the adversary and to use it to implement ones own command, control, communications, reconnaissance, air defence and weather forecasting. 14. Full Dimensional Protection. This is necessary to retain freedom of

action in modern battlefields. It involves both active and passive protective measures against all threat forms to remain viable; to strike at will, at enemy sensitivities. Greater stealth and jamming technologies will contribute to this end. 15. Focussed Logistic. It means reducing the logistic load to only the

essential requirement in shortest possible time, at the fastest speed and in the correct quantity. The concept of "focused logistics" to meet the demands of operations will be responsive, flexible, and precise" through the fusion of information, logistics and transportation technologies. The goal is to be able to track and redirect assets even while enroute, and to provide support in hours or days rather than weeks. 16

16

Mr.Lothar Ibriigger (Germany), The Revolution in Military Affairs (online) Available http://www.naa.be/publications/comrep/1998/ar249stc-e.html.

RESTD

17 RESTD PART - IV 16. RMA and Applications of Artificial Intelligence a. Robotics. Robotics is in many respects is Mechanical AI. It is used in number of applications. The movies like Terminator, Robocop and I Robot are few examples. These robots at present performing duties in battle field in Iraq and Afghanistan and are likely to replace human soldiers. b. IED Detection, Jamming and Neutralizing. New systems are using IMT to elevate C-IED skills beyond basic detect-locatedestroy IED competencies and into the arena of decision-making and other more complex skills. Its more of the methodologies of what is the insurgents mindset for doing these types of things so it can predict that order of magnitude, or that level of prevention that is needed in order to detect or avoid those IEDs. c. Revolution in Military Logistics. The dynamic nature of battlefield requires logistics to acquire a number of capabilities that it currently does not have especially in LIC. Underlying a distribution based system, realtime situational understanding, anticipatory and precision logistics, seamless logistics system, and streamlined acquisition are a wide array of advanced technologies that must be researched, developed, applied, and acquired through AI and it must provide predictive capability to the logistician. This is the only

RESTD

18 RESTD way to relieve the reactive burden currently imposed upon the logistician. d. Airborne Warning and Control Systems (AWACS). The use of radar on an AI aircraft is also optimized. If they can, they will use Range While Scan and Track While Scan where the conditions require. If theyre launching a Semi-Active Radar Homing missile (SARH), which requires a constant radar lock from the launching aircraft to reach the target, the AI will wait until the last moment before switching to Single Target Track (STT), a radar mode sounds an alert in the targeted aircrafts cockpit, warning of impending attack. e. Command and Control Systems. In essence the Command and Control System is modeled in software so we need to understand what it is Command and Control is the exercise of authority and direction over available resources towards the accomplishment of some objective. It has a number of different aspects:(1) (2) (3) (4) Data collection and monitoring. Decision-making. Planning and scheduling. Team formation, coordination, control and communication, all taking place in real time in highly dynamic environment.

RESTD

19 RESTD (5) Command and Control systems provide an infrastructure for the management of information and resources in a complex dynamic environment. (6) Command and Control system provides the glue that binds everything together. f. RPVs/ UAVs. Unmanned aerial vehicles17 have been stars in

Operations Enduring Freedom and Iraqi Freedom. The employment of Predators in the war against global terrorism offered lot of different capabilities, the Predator has been used in joint-combined operations. The integration between conventionally piloted aircraft and UAVs "was outstanding" during the Iraq. Predator pilots would identify a target and would drop (ordnance) on the target. UAVs obviously have the endurance to stay in an area a lot longer than fighter aircrafts. g. Fusion Centers (Info Collection and Processing). The manual information processing system is not suitable for future conflicts for two main reasons. Firstly, the dynamics of battlefield will demand near real time combat intelligence which the system cannot provide even if it is fully streamlined and it works at its peak efficiency. Secondly, the proliferation of sensors and fluid battlefield situation will generate enormous volume of information which will be humanly impossible to process. It is therefore imperative to develop a fully automated system for data processing which can receive
17

http://usmilitary.about.com/cs/weapons/a/uav.htm?rd=1

RESTD

20 RESTD information from directly interfaced sensors, carry out target identification and situation assessment and present to commanders a cohesive picture of battlefield in near real time. Multi Sensor Data Fusion (MSDF) based on AI is very critical for analyzing the accuracy and the confirmation of the collected information. With the emergence of AI technologies and related software, the emphasis has gone on developing fully automated surveillance systems so that the response time is reduced and meaningful combat information is available in near real time. It will also facilitate the exchange/transfer of information and data within the various sub systems of the decision making system. Some of the automated process carried out at the surveillance centre are :(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Surveillance planning. Sensor management. Multi Sensor Data Fusion (MSDF). Target Identification. Situation Assessment. Artillery Target Intelligence. Counter Bombardment (CB) process. Enemy Artillery situation assessment. Direction of Own Arty Fire (DOOAF). Post Strike Damage Assessment (PSDA).

RESTD

21 RESTD h. Simulators. Simulation advances will transform military planning and training. Today, virtual reality simulations can enable soldiers to train in high fidelity mock-ups, at substantial reduction in risk and spending. There is a need to exploit a range of tools and products that will enhance the Armys capabilities in the domains of training, development, acquisition and decision support. i. Tactical Sensor. Possible applications of these tactical sensors

are unobtrusive micro audio bugs and video recording devices with high capacity data storage to plant at likely meeting places of terrorists, over ground agents and sympathizers, unattended micro ground or air sensors which can be placed in advance and remotely activated on required basis and micro sized energy devices which can power unattended sensors / audio / video devices and a host of other applications in remote areas or places which require extremely light weight power sources like light weight man portable radars, missiles, UAVs and other systems.

RESTD

22 RESTD PART - IV 17. RMA, Artificial Intelligence and Pakistan Army. The apparent success

of high tech systems in the ongoing wars in Iraq and Afghanistan, are indicative that the war is undergoing a profound transformation. Technology is fundamentally changing the face and nature of warfare. The opportunities offered by these new emerging technologies are boundless. There is a need to concentrate on those technologies that are important to Pakistan Army for its modernization requirements. a. Target Evaluation and Weapon Assignment System (TEWA). It is a new system developed by the collaboration of Air Defense and CARE institute. A network of radars and associated guns on a shared network locates a hostile aerial target and automatically a gun is assigned to neutralize the target. Moreover this is entirely done automatically and the commanders are also given the update on Laptops. b. Intelligence, Surveillance and Reconnaissance. Pakistan Army is in the process of establishing ISR capability. Induction/ indigenous production of UAV/RPV platforms in one step in this direction. These are being used very effectively in war against terrorism. These systems are being used for acquisition of information/ intelligence about militant and their hideouts for effective engagement.

RESTD

23 RESTD c. Network Centric Warfare. Office Automation System being

implemented by Pakistan Army is indicative of her resolve to become a network centric army in near future. The system is being integrated with sensor grid and response grid, which are two important components of the system. Recent war games and war on western front has also witnessed integration of all available means for battle field transparency and effective response. d. Fusion Centers. For successful operations Fusion Centers have

been established for integration of data, thus facilitating decision makers for timely decisions, weapon platforms for selection of engagement means and post operation analysis. These Fusion Centers have been established in Military Operations Directorate and at Corps Headquarters. e. Simulators. Simulators are being used for training of soldiers and crew for optimum utilization of different platforms. This helps in conservation of effort, resources and infrastructure. These are still in embryonic stage and can be used in Pre Induction Training. f. Anti IED Doctrine. Pakistan Army has constituted a forum to develop a strategy to counter IED. This will not only help in neutralizing IED in the target area but will also help in safeguarding assets in cantonments. Artificial Intelligence can be effectively used for comprehensive response.

RESTD

24 RESTD PART- VI 18. Recommendations a. War Gaming AI Based Systems. To improve decision making skills, speed and accuracy of response of commander, war gaming software and simulators must be procured or developed. EME and MCS can be assigned the responsibility to carry out feasibility of these projects. As an interim measure off the shelf system for induction in National Defense University, Command and Staff College and other Schools of Instructions can be considered. b. Joint Collaboration. Field of Artificial Intelligence is new and

most of the research is done in the developed countries therefore, it would be beneficial to jointly undertake projects. Pakistan has high end human resource and thus can contribute significantly. c. AI Awareness in the Army. As a first step there is a dire need

to promote understanding about massive scope of AI in real battle field situations. Most people confuse AI with war gaming softwares and tactical simulators in which real-time data and situation is not considered. Officers should be introduced with this new dimension of planning in a comprehensive manner through study periods and demos. d. National Artificial Intelligence Complex. To congregate

effort there is a need to establish a National Complex for development of projects. This will help to promote understanding of

RESTD

25 RESTD simulators, quantifying requirements of hardware, software and technical expertise for integration of AI in present C4I System and organize Indigenous development of AI software and simulators. The body will coordinate with various arms and services and private companies for indigenous development of AI applications for battlefield planning besides conducting test/trials of domestic and foreign AI systems and making recommendations for procurement of AI systems. e. Evaluation/ Test and Trials. A joint venture of Air-Defense

and CARE institute developed an Intelligent Autonomous System for Engagement of Aerial Targets by AD guns called TEWA Target Evaluation and Weapon Assignment. It is recommended the same system be employed and further improved upon for other fighting arms as well. Similarly DMOS as US origin system used for evaluation of operational plans in the Pakistan Army 2009 war games should also be extended and used for real time situations for Command and Staff College and National Defense University. f. Design and Implementation. As a proof of concept the system

can be initially implemented for a tank squadron or for an infantry company. A completely autonomous system should be developed for a small unit based on the same concept of US BCTs (Brigade Combat Teams) which are self sufficient infantry units that have met great success in Iraq and Afghanistan Operations.

RESTD

26 RESTD g. Use of Simulators for Pre Induction Training. To minimize

the human causalities and better train soldiers and crew, simulators can be used at training centers. Virtual reality environment helps in training in near real time situation thus helping troops in quick reflexes. h. Research and Development. The engineering universities can

be assigned projects in the realm of artificial intelligence. This will help in indigenous production of these systems. This will help in self reliance and cost effective systems. i. Pilot System. With higher echelons the complexity of design

increases. It is therefore recommended that a bottom up approach be used to design an indigenous system at Company or Platoon level (Squadron level in case of Armor) as a proof of concept. j. Promoting Indigenous Development. Nowadays powerful

computer hardware is available to everyone in almost every part of the world at affordable prices thus facilitating indigenous dev of hardware and software applications for military purposes. It is therefore recommended that indigenous development of simulators and applications for military training must be promoted through integral military resources and private companies. k. Human Resource Training. Technical expertise in AI field is

seriously lacking and only a handful of AI specialists are currently serving in Army. It is therefore recommended that measures be

RESTD

27 RESTD taken to promote the field and to educate more officers in masters and PhD both in the field of AI, otherwise we will always be lagging and be dependent on foreign elements for requisite development and subsequent maintenance of the system.

RESTD

28 RESTD Conclusion. 19. It is to be understood that in the present and future warfare, AI led

technology will play a decisive role on the battlefield. There are major in the integration of acquired AI based technology and its development. These challenges range from general understanding and technical expertise to financial cost and compatibility. There are a number of different projects being worked on right now around the world, by some of the worlds finest scientist and computer experts striving for technological advancements in Artificial Intelligence, development will progress with new barriers being broken between human and machine in near future. The suitability and applicability of the said field in various domains including military has provided enough impetus for the research in the field of Artificial Intelligence to thrive at magnificent rate. Being a competitive world army, we also need to evaluate and adopt to the changing scenario of Future Battle field and that is possible only if we venture hard and deep into the AI domain vis--vis practically implementing the behavioural models for technological advancement.

RESTD

29 RESTD BIBLIOGRAPHY 1. Clark, R. (2004) Design Document For A Guided Experiential Learning

Course. Final report on contract DAAD. 2. Rhea, John. The Next 'New Frontier' of Artificial Intelligence, Military &

Aerospace Electronics November, 2000. 3. D. Gibson, Finite State Machines - Making simple work of complex

functions, SPLat Control Pty. Ltd, 1999. 4. A. E. Collins, Evaluating the performance of AI techniques on the domain

of computer games, [www.dcs.shef.ac.uk/~u8aec/com301], 2001 5. B. Bruegge & a. H. Dutoit, Object-Oriented Software Engineering -

Conquering Complex and Changing Systems, Prentice Hall, 2000 6. A.Dix, J. Finlay, G. Abowd, R. Beale, Human-Computer Interaction 2nd

Edition, Prentice Hall, 1998 7. 8. P.K. Winston, Artificial Intelligence, Addison-Wesley, 1993 Handbook of Virtual Environments for Training and Education, Vol. 3.

Westport, CT: Praeger Security International. 9. Johnson, W. L. International Conference on Artificial in Intelligence. IOS

Press, Amsterdam, 2007. 10. Kilcullen, D. (2006) Twenty-Eight Articles: Fundamentals of Company-

level Counterinsurgency,Military Review, May-June 2006, 103-108. 11. J. Kim, R.W. Hill, P. Durlach, H.C. Lane, E. Forbell, M. Core, S. Marsella,

D. Pynadeth, & J. Hart, BiLAT: A game-based environment for practicing negotiation in a cultural context. International Journal of Artificial Intelligence in Education (in-press). 12. Wong, L. (2004) Developing Adaptive Leaders: The Crucible Experience

of Operation Iraqi Freedom.

RESTD

Você também pode gostar