18 juin 2019 | International, Aérospatial

Israel’s Rafael integrates artificial intelligence into Spice bombs

By: and

Rafael Advanced Defense System's Spice bombs now have a new technological breakthrough as the Israeli company enables its Spice 250 with artificial intelligence alongside automatic target recognition to be used with scene-matching technology.

The Spice 250, which can be deployed on quad racks under the wings of warplanes like the F-16, has a 75-kilogram warhead and a maximum range of 100 kilometers with its deployable wings.

Its electro-optic scene-matching technology — which involves uploading terrain data onto the bomb and combining it with real-time electro-optic imagery — allows the weapon to work in GPS-denied environments. And the bomb can use this autonomous capability to navigate and correct its location, according to Gideon Weiss, Rafael's deputy general manager of marketing and business development at the company's air and C4I division.

With its AI and “deep learning” technologies, the weapon has the ability to identity moving ground targets and distinguish them from other objects and terrain. This is based on 3D models uploaded to the bomb as well as algorithms. As the weapon identifies and homes in on its target, such as a convoy of vehicles, it separates the convoy of interest from other vehicles it has “learned” to ignore.

“The deep-learning algorithm is indifferent to the actual data fed to it for modeling targets of interest and embedding their pertaining characteristics into the system," Weiss said. "However, the more the data used for modeling is representative of the target of interest, the more robust the recognition probability will be in real life.”

Rafael has completed the development and testing phase of the Spice 250, including flight tests, which have “proven the robustness of the ATA and ATR, so it is mature for delivery,” Weiss said, using acronyms for automatic target acquisition and recognition.

Asked if the ATR algorithm will select a secondary target if the computer cannot find the initial human-selected target, Weiss said: “This goes into the area of user-defined policies and rules of engagement, and it is up to the users to decide on how to apply the weapon, when and where to use it, and how to define target recognition probabilities and its eventuality.”

Automatically selecting a secondary target may eventually become part of the upgrade profile for the munition, if customers express significant interest in the feature.

With a two-way data link and a video-streaming capability, the bomb can be aborted or told to re-target up until a “few second before the weapon hits its target,” Weiss explained. That two-way data-link, enabled by the weapon's mounting on a Smart Quad Rack, or SQR, will enable future deep learning to be based on data extracted from earlier launches. Data recorded will include either live-streaming video or a burst of still images of the entire homing phase up until impact.

“These are automatically and simultaneously recorded on the SQR — enabling two functions: (a) real-time and post-mission BDI (Bomb Damage Indication); (b) post-mission target data extraction for intel updates, etc.," Weiss said. "The ATR capability, including its deep learning updates, must be more agile than the enemy's ability to conceal and/or change its battlefield footprint, tactics, appearance or anything else which might impede the ATR from accurately recognizing and destroying targets.”

The Spice family of weapons is operational with the Israeli Air Force and international customers.

https://www.defensenews.com/artificial-intelligence/2019/06/17/israels-rafael-integrates-artificial-intelligence-into-spice-bombs/

Sur le même sujet

  • DARPA Seeks to Make Scalable On-Chip Security Pervasive

    29 mars 2019 | International, C4ISR, Sécurité, Autre défense

    DARPA Seeks to Make Scalable On-Chip Security Pervasive

    For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. With this rapid growth comes increased opportunity for economic and nation-state adversaries alike to shift their attention to chips that enable complex capabilities across commercial and defense applications. The consequences of a hardware cyberattack are significant as a compromise could potentially impact not millions, but billions of devices. Despite growing recognition of the issue, there are no common tools, methods, or solutions for chip-level security currently in wide use. This is largely driven by the economic hurdles and technical trade-offs often associated with secure chip design. Incorporating security into chips is a manual, expensive, and cumbersome task that requires significant time and a level of expertise that is not readily available in most chip and system companies. The inclusion of security also often requires certain trade-offs with the typical design objectives, such as size, performance, and power dissipation. Further, modern chip design methods are unforgiving – once a chip is designed, adding security after the fact or making changes to address newly discovered threats is nearly impossible. “Today, it can take six to nine months to design a modern chip, and twice as long if you want to make that same design secure,” said Serge Leef, a program manager in DARPA's Microsystems Technology Office (MTO). “While large merchant semiconductor companies are investing in in-house personnel to manually incorporate security into their high-volume silicon, mid-size chip companies, system houses, and start-ups with small design teams who create lower volume chips lack the resources and economic drivers to support the necessary investment in scalable security mechanisms, leaving a majority of today's chips largely unprotected.” To ease the burden of developing secure chips, DARPA developed the Automatic Implementation of Secure Silicon (AISS) program. AISS aims to automate the process of incorporating scalable defense mechanisms into chip designs, while allowing designers to explore economics versus security trade-offs and maximize design productivity. The objective of the program is to develop a design tool and IP ecosystem – which includes tool vendors, chip developers, IP licensers, and the open source community – that will allow security to be inexpensively incorporated into chip designs with minimal effort and expertise, ultimately making scalable on-chip security pervasive. Leef continued, “The security, design, and economic objectives of a chip can vary based on its intended application. As an example, a chip design with extreme security requirements may have to accept certain tradeoffs. Achieving the required security level may cause the chip to become larger, consume more power, or deliver slower performance. Depending on the application, some or all of these tradeoffs may be acceptable, but with today's manual processes it's hard to determine where tradeoffs can be made.” AISS seeks to create a novel, automated chip design flow that will allow the security mechanisms to scale consistently with the goals of the design. The design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security tradeoff. The target AISS system – or system on chip (SoC) – will be automatically generated, integrated, and optimized to meet the objectives of the application and security intent. These systems will consist of two partitions – an application specific processor partition and a security partition implementing the on-chip security features. This approach is novel in that most systems today do not include a security partition due to its design complexity and cost of integration. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased. While the threat landscape is ever evolving and expansive, AISS seeks to address four specific attack surfaces that are most relevant to digital ASICs and SoCs. These include side channel attacks, reverse engineering attacks, supply chain attacks, and malicious hardware attacks. “Strategies for resisting threats vary widely in cost, complexity, and invasiveness. As such, AISS will help designers assess which defense mechanisms are most appropriate based on the potential attack surface and the likelihood of a compromise,” said Leef. In addition to incorporating scalable defense mechanisms, AISS seeks to ensure that the IP blocks that make up the chip remain secure throughout the design process and are not compromised as they move through the ecosystem. As such, the program will also aim to move forward provenance and integrity validation techniques for preexisting design components by advancing current methods or inventing novel technical approaches. These techniques may include IP watermarking and threat detection to help validate the chip's integrity and IP provenance throughout its lifetime. AISS is part of the second phase of DARPA's Electronics Resurgence Initiative (ERI) – a five-year, upwards of $1.5 billion investment in the future of domestic, U.S. government, and defense electronics systems. Under ERI Phase II, DARPA is exploring the development of trusted electronics components, including the advancement of electronics that can enforce security and privacy protections. AISS will help address this mission through its efforts to enable scalable on-chip security. DARPA will hold a Proposers Day on April 10, 2019 at the DARPA Conference Center, located at 675 North Randolph Street, Arlington, Virginia 22203, to provide more information about AISS and answer questions from potential proposers. For details about the event, including registration requirements, please visit: https://www.fbo.gov/index?s=opportunity&mode=form&id=6770487d820ee13f33af67b0980a7d73&tab=core&_cview=0 Additional information will be available in the forthcoming Broad Agency Announcement, which will be posted to www.fbo.gov. https://www.darpa.mil/news-events/2019-03-25

  • Singapore air show kicks off with orders for China's COMAC, Boeing

    20 février 2024 | International, Aérospatial

    Singapore air show kicks off with orders for China's COMAC, Boeing

  • Lockheed to provide Hellfire II missiles for the Netherlands, Japan

    3 octobre 2018 | International, Aérospatial

    Lockheed to provide Hellfire II missiles for the Netherlands, Japan

    By Stephen Carlson Oct. 2 (UPI) -- Lockheed Martin has received a $631.8 million foreign military sales contract to sell the Netherlands and Japan Hellfire II missiles. Work on the contract, announced Monday by the Department of Defense, will be performed in Orlando, Fla., with an estimated completion date of September 2021. Army fiscal 2017 and 2018 foreign military sales and other procurement funds in the combined amount of $631.8 million were obligated at the time of award. The Hellfire II is the primary air-to-ground short-range precision guided missile for U.S. helicopters and unmanned aerial vehicles and is in service with many other nations. It has been produced in ground- and ship-launched models as well. The Hellfire uses a laser-guidance system that can either be directed by a laser targeting pod on the launching aircraft or a separate laser designator used by ground forces or other aircraft. A variant used by the AH-64 Apache Longbow uses a radar and inertial guidance system that utilizes a fire-and-forget capability which does not require continuous lock from the launching helicopter like the laser version does. The Hellfire was designed primarily as an air-launched anti-tank weapon and has been in service since 1984. It has seen widespread use in Iraq, Afghanistan and other theaters as a general precision strike weapon. It has also been the main weapon used by unmanned aerial vehicles in the Department of Defense and Central Intelligence Agency's targeted dronestrike program. Over 15,000 have been used in conventional and targeted attacks since 2001. https://www.upi.com/Defense-News/2018/10/02/Lockheed-to-provide-Hellfire-II-missiles-for-the-Netherlands-Japan/2961538484205/

Toutes les nouvelles