11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

military applications <strong>of</strong> computers 311TrainingThe use <strong>of</strong> automated systems to provide training goes backat least as far as the World War II era Link trainer, whichused automatic controls <strong>and</strong> hydraulics to place traineepilots inside a moveable cockpit that could respond to theircontrol inputs. Today computer simulations with sophisticatedgraphics <strong>and</strong> control systems can provide highly realisticdepictions <strong>of</strong> flying a helicopter or jet fighter or drivinga battle tank. The military has even adapted commercialflight simulators for training purposes. Simulations canalso cover Special Forces operations <strong>and</strong> tactical decisionmaking. Indeed, many real-time simulations (RTS) sold aspopular commercial games <strong>and</strong> avidly played by young peoplealready contain enough realistic detail to be adoptedby the military as is. For example, the game Rainbow Six,based on operations in Tom Clancy novels, simulates tacticalcounterterrorism operations. In turn, the U.S. Army hasused a simulation game called Full Spectrum Warrior togive young gamers a taste <strong>of</strong> the military life.OperationsAircraft, ships, <strong>and</strong> l<strong>and</strong> vehicles used by the military havebeen fitted with a variety <strong>of</strong> computerized systems. The“glass cockpit” in aircraft is replacing the increasinglyunmanageable maze <strong>of</strong> dials <strong>and</strong> switches with informationdisplays that can keep the pilot focused on the most crucialinformation while making other information readily available.Traditional keyboards <strong>and</strong> joystick-type controllerscan be replaced by touch screens <strong>and</strong> even by systems thatcan underst<strong>and</strong> a variety <strong>of</strong> voice comm<strong>and</strong>s (see speechrecognition <strong>and</strong> synthesis). Similar control interfacescan be used in tanks or ships.Robotics <strong>of</strong>fers a variety <strong>of</strong> intriguing possibilities forextending the reach <strong>of</strong> military forces while minimizingcasualties. Remote-control robots can be used to clearminefields, disarm roadside bombs, or perform reconnaissance.(The Predator armed reconnaissance drone was firstused successfully in anti-terrorist operations in Afghanistanin 2002.) Armed robots could assault enemy strong pointswithout risking soldiers. The development <strong>of</strong> autonomousrobots that can plan their own missions, select targets, <strong>and</strong>make other decisions is a longer-term prospect that dependson the application <strong>of</strong> artificial intelligence in the extremelychallenging <strong>and</strong> chaotic battlefield environment.Battle ManagementBattle management is the ability to gather, synthesize, <strong>and</strong>present crucial information about the environment aroundthe military unit <strong>and</strong> enable military personnel to makerapid, accurate decisions about threats <strong>and</strong> the best way toneutralize them.The earliest example, the SAGE (Strategic Air GroundEnvironment) computer system, resulted from a massivedevelopment effort in the 1950s that strained the capacity<strong>of</strong> early vacuum tube-based computers to its limit. Thepurpose <strong>of</strong> SAGE was to provide an integrated tracking <strong>and</strong>display system that could give the Strategic Air Comm<strong>and</strong>(SAC) complete real-time information about any Sovietnuclear bomber strikes in progress against the continentalUnited States Descendents <strong>of</strong> this system were able to trackballistic missiles.The Aegis system first deployed aboard selected navyships in the 1970s is a good example <strong>of</strong> a tactical battlemanagement system on a somewhat smaller scale. Aegis isa computerized system that can integrate information fromsophisticated shipboard radar <strong>and</strong> sonar arrays as well asreceiving <strong>and</strong> merging data from other ships <strong>and</strong> reconnaissanceassets (such as helicopters). The captain <strong>of</strong> anAegis cruiser or destroyer therefore has a real-time pictureshowing the locations, headings, <strong>and</strong> speeds <strong>of</strong> friendly <strong>and</strong>enemy ships, aircraft, <strong>and</strong> missiles. The system can alsoautomatically distribute the available munitions to mosteffectively engage the most threatening targets.Ultimately, the military hopes to give each unit in thefield <strong>and</strong> even individual soldiers a battle management displaythat would pinpoint enemy vehicles <strong>and</strong> other activity.Unpiloted drone aircraft such as the Predator can loiter overthe battlefield <strong>and</strong> feed video <strong>and</strong> other data into the battlemanagement system.While the ability to transmit <strong>and</strong> process large amounts<strong>of</strong> information can lead to strategic or tactical advantage, italso dem<strong>and</strong>s increased attention to security. If an enemycan jam the information processing system, its advantagescould be lost at a crucial moment. Worse, if an enemy can“spo<strong>of</strong>” the system or introduce deceptive data, the military’sinformation system could become a weapon in theenemy’s h<strong>and</strong>s (see computer crime, encryption, informationwarfare <strong>and</strong> security).Beyond the BattlefieldToday’s military faces the challenge <strong>of</strong> diverse types <strong>of</strong> conflict(including counterinsurgency <strong>and</strong> peacekeeping), theneed to interact with cultures that may be unfamiliar tomost soldiers, <strong>and</strong> the need to deal with the psychologicalas well as physical casualties <strong>of</strong> war. A number <strong>of</strong> innovativeapplications <strong>of</strong> simulation <strong>and</strong> information technologyare being developed.In 2006 the U.S. military began to use a game called“Tactical Iraqi” in which soldiers must learn not only conversationalphrases, but the difference between appropriate<strong>and</strong> culturally insensitive gestures <strong>and</strong> actions.Another simulation, created at the University <strong>of</strong> SouthernCalifornia, uses VR technology (see virtual reality)to place soldiers suffering from posttraumatic stress disorder(PTSD) back into the combat environment under controlledconditions. The goal is to gradually desensitize theperson to the traumatic sights, sounds, <strong>and</strong> events.On the information <strong>and</strong> intelligence front, the need totranslate <strong>and</strong> interpret massive amounts <strong>of</strong> material in manylanguages in near real time has led the Defense AdvancedResearch Projects Agency (DARPA) to begin to develop asystem that would use separate “engines” for translation,interpretation, <strong>and</strong> summarization.Further ReadingEvans, Nicholas D. Military Gadgets: How Advanced <strong>Technology</strong>Is Transforming Today’s Battlefield. Upper Saddle River, N.J.:Prentice Hall, 2004.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!