Chapter 24: Saturation attack


Without giving everyone much time to think, Wu Hao continued to introduce: "In fact, our technology can also be used in more fields, and in theory all cluster equipment can use our technology.
For example, after the large-scale farming equipment is equipped with our technology, whether it is sowing or spraying pesticides, irrigation, fertilization, harvesting, and transportation, the entire farm can be independently managed and operated.
For example, driverless technology, if all the driverless car information interconnection, data sharing, what kind of scene will it be?
In fact, in the civilian field, such technology is also used in many scenarios, I will not list them here. "
After saying this, Wu Hao gave everyone below a little time to think and discuss. He himself also sorted out his thoughts and then continued.
"Next, I want to talk about the development prospects of this technology and another important application area."
I saw two words on the big screen behind Wu Hao—military.
大家 "Everyone knows that drone cluster technology has always been a key area of ​​research in various countries."
"According to the public information we know, China has successfully conducted a cluster flight test of 112 UAVs. The current world record is a cluster flight test of 169 aircraft conducted by the Air Force of the United States.
所以 The reason why countries and science and technology companies invest heavily in research is that they see great prospects for their development.
Aside from that, the military application of this technology will also bring about a technological and tactical revolution in military equipment and even in current operations.
When I mention this, we have to say a very hot term in the military field. Saturated rescue, no, it should be a saturated attack. "
Wu Hao played a trick and continued to preach.
"The so-called saturation attack actually refers to the use of a high-density, continuous attack penetration method, and at the same time, to output the same target with more firepower than its anti-strike ability. Unable to cope with saturation, in order to increase the penetration probability and destroy the goal.
In fact, the power of saturated attack is not new, it was brought up during the Cold War. It's just that there has been too much criticism of the saturated attack method and it has not been taken seriously.
Usually, the military forces of some developed countries or large countries believe that the saturated attack is actually a backward attack method that small countries or small armed forces must use when dealing with the enemy ’s super intercepting force.
To put it bluntly, it actually compensates for quality with quantity and accuracy with large probability. Combat defense and interception capabilities on a scale.
Although more practical, it is inefficient and time-consuming. Unless absolutely necessary, this way will not be used to attack.
For example, at the beginning of this century, China responded to the provocative actions of a country's powerful naval force and its approaching the coast. A large number of shore-based mobile missile launchers are equipped and deployed along the coast, as well as a guided missile boat featuring high-speed stealth penetration.
In order to combat and destroy the enemy's provocative force, this method is adopted in the conflict, using "wolf pack tactics" and "saturated attack" on the enemy's advanced ships.
As our military strength, especially the navy, has grown stronger, this method of combat has gradually been abandoned. The original high-speed missile boats gradually retired or switched functions, becoming offshore patrol boats.
However, the concept of saturated attack, or combat thinking, has been retained. Not only has it been used as a magic weapon to defeat advanced military forces by the weak military forces of some countries, it has also been re-researched by many advanced countries.
On the one hand, how to cope with and counteract this type of saturated attack, and on the other hand, how to carry out new technological innovations under the theory of saturated attack to make it happen again.
Therefore, a kind of bee colony attack based on the saturated attack theory and bee colony tactics have become a hot research topic in various countries.
The so-called bee colony attack can actually be regarded as an evolution or a version of the saturated attack, but compared to the simple saturated attack, the bee colony attack is more complicated and more flexible.
In short, the bee colony attack and the derived bee colony tactics are more flexible and intelligent. It is not a simple set of numbers, but a set of optimized strike systems based on a large number of attack units.
Under the command of this system, many attack units can flexibly change the formation, combine at will, update the battle plan in time, change the target, and so on.
However, UAV technology, especially UAV cluster array technology, is regarded as the closest practical technology to this set of bee colony attacks.
After all, in some areas, missiles and drones have many similarities. Even now there are missiles based on the development of drones, UU reading book www.uukanshu.com or even more brutal technology for installing missiles on drones.
Even in the hot war zone where the war is raging, militants will use simple drones to conduct reconnaissance attacks. "
Speaking of this, Wu Hao glanced at the interested people in the audience, and then eased his tone.
当然 "Of course, there is still a big difference between the drone technology or the technology currently used for the UAV cluster array light and shadow performance, and the military drone cluster flight control technology, that is, the swarm attack technology.
The current machine cluster array technology for unmanned light and shadow performances is only used to change, combine, fly, and control in a fixed three-dimensional space.
The drone cluster flight control technology that the military sees is real-time three-dimensional space, that is, the combination of drone or missile formation changes and flight control in different times, different terrains, and different environments. .
The two are merely changes in time and space, but the technical difficulties are quite different. So far, it is still being researched and experimented by various countries, and has not been invested in equipment and applications.
Even the seemingly simple machine-cluster array technology of unmanned light and shadow performance, the development is still at the basic stage.
A large number of UAV array light and shadow performance programs are just some simple image combinations and light and shadow flashes. They cannot perform flexible combination changes and flight control. There is still a long way to go before the real drone array and cluster flight control technology. "
Speaking of this, Wu Hao paused, and then looked at the crowd: "What I want to say is that our system will change all this."
"Ok?"
The crowd on the stage suddenly became a sensation, and even the old white-haired man who had been listening to his presentation, stood up immediately after hearing Wu Hao's words.

Latest chapter of Ebook Military Technology Click here