Vol 2 Chapter 1336: On-site attack simulation
-
Military Technology
- Zhi Tiange
- 1227 characters
- 2021-04-11 04:14:32
You can search "Military Industry Science and Technology Book Haige Novel Network ( in Baidu to find the latest chapters!
【Unmodified version】
Wu Hao pretended to be embarrassed, thought for a while, and then said: "If it is a regiment's equipment, if the contract is signed now, I promise to deliver it to you in 20 months."
Seeing that General Abu wanted to speak, Wu Hao immediately interrupted him and said: "This is already our limit. Even if it is replaced by those arms giants, I am afraid it will not be better than this time period.
In addition, it is impossible for us to only produce your orders and also produce orders from other customers, so twenty months is really fast enough. "
Upon hearing Wu Hao's words, Prince Maiha on the other side showed a satisfied smile. Although General Abu was a little unhappy, he basically agreed.
Wu Hao took a look at the time, and then said to everyone: "Next, according to the requirements of some customers, we will temporarily add a demonstration subject on the scene, which is about our second-generation battlefield sweeper mini unmanned attack aircraft. Field demonstration.
However, due to the limited space, we are only demonstrating the smart grenade, a micro-attack drone this time, and only show some basic performance. "
While Wu Hao was speaking, the staff had already entered the venue and began to prepare.
I saw two testers wearing desert camouflage, one holding a grenade launcher, and the other carrying a suitcase and walking to the front of the podium.
Under Wu Hao's gesture, the two began to prepare.
One person opened the suitcase and began to take out the relevant remote control equipment, while the other person loaded a smart grenade into the grenade launcher and waited for orders.
Because it was a live demonstration, this tester chose to use a transparent tablet for remote control, which is more convenient for us to watch on site.
"Look, everyone, the screen picture of the transparent tablet has been connected to our big screen, so that everyone can watch the real-time remote control picture on the big screen.
We set up some simulated targets on the scene to see if this micro-attack drone can quickly find and identify them. "
The scene is ready to continue, ready to launch!
emission!
Yes! With a command, the tester holding the grenade launcher pulled the trigger, and the smart grenade was launched immediately.
Bang!
The sound is not loud, and it is dull, a bit like opening a champagne cork.
The smart grenade was launched and flew to a position about seven or eight meters away from the launcher. The warhead, which is the drone's wing and propeller, unfolded, then started and flew into the air.
Om...
At the same time, the first-view image data from the micro-attack drone also appeared on the remote control tablet screen on the big screen.
When this micro-attack drone is flying in the air, the camera is constantly scanning and observing the ground conditions.
Soon some information and data on the ground were scanned and identified, such as some armored vehicles parked on the side in the previous test, the crowds around, and some construction works in the site.
"Look, everyone. The drone has marked the ground targets. The red boxes in the video screen indicate threatening military targets, such as these armored vehicles. If there are these yellow targets, they are some ground fortifications. bunker.
There are also some green targets, indicating that they are targets that do not threaten safety, such as the people observed by drones, including us on the rostrum. "
"Wu, my friend, how does the drone judge that those military targets are threatening, and those are civilians who are not threatening?" Prince Maiha asked.
Wu Hao smiled and replied: "This relies on our image recognition technology. Through this technology, we can accurately identify all the objects in the lens and compare them with our database to confirm that those are threatening. Military targets, those are civilians who are not threatened.
For example, what is the difference between militants and civilians. First of all, the biggest difference is that one carries weapons and the other does not. Another may be wearing some camouflage uniforms, but civilians do not. An action behaves strangely, while a civilian does not have it.
After constant comparison, we can analyze that those are civilians and those are militants. Of course, the final decision to attack is still in the hands of the controller. "
Hearing Wu Hao's answer, everyone nodded their heads and expressed their approval. As long as the final control decision is in control, there is no problem.
It's not that they don't believe in this artificial intelligence system, but sometimes civilians and militants may be on the line, and there is no difference.
Many people were civilians at the first moment, and became militants the next moment. In this regard, the system will be difficult to screen, so you can only rely on the controller to make decisions on site.
Next, we chose to attack the dummy targets of the simulated militants in the field. For safety reasons, this micro-attack drone does not have ammunition, so it is just a simulated attack.
"Look, everyone, the manipulator has locked the target and clicked to confirm the attack."
At the same time Wu Hao introduced, the manipulator also began to control it. I saw him choose this simulated militant dummy target, then click to lock, and then confirm the attack.
Immediately, the drone hovering in the air began to attack the target. With a hum, the micro-attack drone began to accelerate and dive toward the target.
Because there are many obstacles in front of the target, I saw the drone evade these obstacles very flexibly, and then directly hit the dummy dummy. uukanshu.com then crashed.
Bang bang bang...
Warm applause broke out at the scene, and the simulation demonstration was very successful.
If it is replaced by a second-generation battlefield sweeper micro unmanned attack aircraft equipped with ammunition, and this simulated militant is a real person, then this person will not have any chance of surviving.
The ammunition carried by this micro-attack drone is also enough to kill the opponent. Even if he didn't kill by luck, it was definitely seriously injured and basically lost his combat effectiveness. Even if he was rescued in time, he could not return to the battlefield in a short time.
"In addition to this grenade launcher for launching, we can also choose twenty-four, thirty-six, or even more turkey launch nests for short-term intensive launching.
Then use the swarm array control technology to conduct aerial team formation and swarm attacks.
Our ground controller confirms the target, and the drone swarm launches an attack on the confirmed target. The entire process does not require human intervention, and the drone itself can complete the entire process of marshalling, cooperation, cover, and attack.
And the entire system will also evaluate the damage effect of the target after the attack, and advise the controller whether to launch a second attack. "
Address of the latest chapter of Military Science and Technology: https://
Military Science and Technology Full Text Reading Address: https://
Military Science and Technology txt download address: https://
Military Science and Technology Mobile Reading: https://
In order to facilitate the next reading, you can click "Favorites" below to record the reading record of this time (Chapter 1337 Field Attack Simulation), and you can see it next time you open the bookshelf!
If you like "Military Technology", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()