scholarly journals Trends and prospects for the development and implementation of artificial intelligence in the military sphere in South Africa

Author(s):  
Ksenia Michailovna Belikova

The subject of this research is the trends and prospects for the development and implementation of artificial intelligence in the military sphere of one of the BRICS member-states – South Africa in the context of national acts (for example, the Law of 2008 “On the Right of Intellectual Property for State-Funded Research and Development”), the potential and needs of this country, as well as achievements in design and manufacturing of unmanned aerial vehicles by the competitor companies (Seeker 400, MA 380, etc.). The relevance of this topic is substantiated by timely consideration of the legal perspective of the approaches of South Africa towards the implementation of artificial intelligence. The scientific novelty of this article is defined by the focus of research and the acquired results. It is determined that South Africa takes the path of institutional, legal and practical consolidation of the development of artificial intelligence in form of creation of designated infrastructure (on the premises of the universities, for example, Intelligent Systems Group at the University of Pretoria), as startups, scientific network structures (Center for Artificial Intelligence Research), etc. It is demonstrated that South Africa is the manufacturer and seller of the line of unmanned aerial vehicles that are controlled by the artificial intelligence and capable of performing various civil or military tasks –  from moving cargo (including laser-guided bombs) to monitoring the territory (search and rescue or reconnaissance operations, damage assessment from natural disasters or combat operations, control conduct of fire at enemy positions, etc.).

2021 ◽  
Vol 30 (1) ◽  
pp. 728-738
Author(s):  
Dmitry Gura ◽  
Victor Rukhlinskiy ◽  
Valeriy Sharov ◽  
Anatoliy Bogoyavlenskiy

Abstract Over the past decade, unmanned aerial vehicles (UAVs) have received increasing attention and are being used in the areas of harvesting, videotaping, and the military industry. In this article, the consideration is focused on areas where video recording is required for ground inspections. This paper describes modern communication technologies and systems that enable interaction and data exchange between UAVs and a ground control station (GCS). This article focuses on different architectures of communication systems, establishing the characteristics of each to identify the preferred architecture that does not require a significant consumption of resources and whose data transmission is reliable. A coherent architecture that includes multiple UAVs, wireless sensor networks, cellular networks, GCSs, and satellite network to duplicate communications for enhanced system security has been offered. Some reliability problems have been discussed, the solution of which was suggested to be a backup connection via satellite, i.e., a second connection. This study focused not only on the communication channels but also on the data exchanged between system components, indicating the purpose of their application. Some of the communication problems and shortcomings of various systems, as well as further focus areas and improvement recommendations were discussed.


2015 ◽  
Vol 21 (2) ◽  
pp. 424-429 ◽  
Author(s):  
Florin Fainisi ◽  
Victor Al. Fainisi

Abstract The technology of unmanned aerial vehicles (UAV) has constantly developed in the last decade, becoming a key feature of the military programs and operations in Europe and the US, and the industry market has considerably grown. The vast majority of this growth is at the US level, whose military budget is bigger than of any other state in the world. On the other hand, with respect to the civil market, the sale of these kinds of aircrafts is in its initial stages, even though there are lots of fields in which it can be applied. In general, the states have begun to take legislative measures so that the unmanned flight of such an aircraft in areas open to civil aircrafts is controlled, so that any danger to the civil aircrafts should be avoided. The countries of the European Union that have not legislated this field are subject to Regulation 216/2008/EC regarding common norms in the civil aviation field and the Chicago Convention. Furthermore, all EU states are NATO members and thus apply in principle the norms established by the North-Atlantic Organization.


2017 ◽  
Vol 26 (3) ◽  
pp. 433-437
Author(s):  
Mark Dougherty

AbstractForgetting is an oft-forgotten art. Many artificial intelligence (AI) systems deliver good performance when first implemented; however, as the contextual environment changes, they become out of date and their performance degrades. Learning new knowledge is part of the solution, but forgetting outdated facts and information is a vital part of the process of renewal. However, forgetting proves to be a surprisingly difficult concept to either understand or implement. Much of AI is based on analogies with natural systems, and although all of us have plenty of experiences with having forgotten something, as yet we have only an incomplete picture of how this process occurs in the brain. A recent judgment by the European Court concerns the “right to be forgotten” by web index services such as Google. This has made debate and research into the concept of forgetting very urgent. Given the rapid growth in requests for pages to be forgotten, it is clear that the process will have to be automated and that intelligent systems of forgetting are required in order to meet this challenge.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Jia Fan ◽  
Lanfei Qiao ◽  
Yunfei Cao ◽  
Shanglin Liu ◽  
Wenke Zhang ◽  
...  

Password-based authenticated key exchange is a popular method for secure authentication and key exchange. With the wide application of unmanned aerial vehicles, position information has also become an important factor in authentication. In this paper, we present a new key exchange protocol, which firstly realizes dual authentication for both password and position, and we propose two applicable scenarios for the PPAKE mechanism: one is unmanned aerial vehicle authentication, and the other one is authentication in the military base. By adding position authentication, the reliability of authentication has improved, and the difficulty of adversarial attacks also increases. Any arbitrary adversary who can listen, tamper, and send messages can only perform an online attack for password guessing at a specified position. Finally, we provide security proofs under the defined model.


10.37105/sd.5 ◽  
2018 ◽  
Vol 4 ◽  
pp. 22-26
Author(s):  
Michalska Anna ◽  
Karpińska Katarzyna

The main focus of this paper is the capabilities of Unmanned Aerial Vehicles as a military logistic support in conflicts areas. The conducted research addresses the problems of traditional military delivery methods. Next, the problem of using UAVs only for civilian purposes is considered. The paper begins with short elucidation of logistic support and further provides the classification of logistic materials and discusses five categories of military equipment from the logistics point of view. Next, the paper discusses the characteristics of the parameters and properties of the chosen existing UAVs that are used for the delivery of materials. Consequently, a comparison of the UAVs is carried out, and new technologies for logistic transport are presented. This paper is concluded with the claim that it is necessary to modernize the process of logistic support in the military.


Author(s):  
Tom Holert

Contemporary warfare has been significantly transformed by the promotion and implementation of unmanned aerial vehicles (or drones) into global military operations. Networked remote sensory vision and the drones’ capability to carry deadly missiles entail and facilitate increasingly individualised, racialised, and necropolitical military practices conceptualised as ‘surgical strikes’ or ‘targeted killings’, all in the name of ‘counterinsurgency’. In the absence of publicly accessible documentations of ‘drone vision’, images of drones themselves constitute what is arguably one of the most contested iconographies of the present. The ethical and legal problems engendered by the virtualisation of violence and the panoptical fantasies of persistent vision and continuous threat interfere with the commercial interests and the publicised ideas of ‘clean’ warfare of the military-industrial-media complex. Drones have become a fetishised icon of warfare running out of human measure and control and are henceforth challenged by activist strategies highlighting the blind spots and victims of their deployment.


1996 ◽  
Vol 52 (2/3) ◽  
Author(s):  
P. Smit

The university - an institution of hope. The university is a institution of hope where the foundations are laid for a better future.  This derives from the search for solutions in every sphere of scientific study. Sometimes students and young researchers are concerned that the most interesting scientific questions have already been answered.  But clearly even a fraction of the unanswered questions in science pose incredible challenges to researchers and students in every field of scientific endeavour. Apart from the global challenges presented by science, South Africa must be one of the most interesting laboratories on earth. The critical ability to put the right questions to science through dedication and hard work is indeed the key to all research and education.


Sign in / Sign up

Export Citation Format

Share Document