Sie sind auf Seite 1von 30

1 RESTD ARTIFICIAL INTELLIGENCE AND REVOLUTION IN MILITARY AFFAIRS

1.

Introduction. The world is presently resting on the cusp of technological

revolution. As with any promising new military technology, expectations often


exceed the eventual reality of performance, once the complexities of the operating
environment and enemy actions are brought to bear. Furthermore, the utility of any
military technology is largely dependent on its effective integration into existing
military organizations, is a way that combines it with other capabilities and
harnesses it with military aims. Artificial Intelligence (AI) is the subject which
deals with creating intelligent machines which can think and act like humans. These
high end technologies are changing the facets of modern battlefield environments.
2. Artificial intelligence is finding new avenues in the military and numerous

applications are being developed. The induction of these technologies are


facilitating military decisions, minimizing human causalities and enhancing the
combat potential of forces. Artificial intelligence (AI) has become a field of
intense interest and high expectations within the scientific and defense technology
community. This focus of activity is well deserved as Artificial intelligence holds
the promise of dramatically changing, if not revolutionizing, the design of
military systems. This is especially true in war time environment when data
availability is high, decision periods are short, and decision efficiency and
effectiveness are an absolute necessity. Artificial intelligence in Revolution
Military Affairs (RMA) are wide and varied encompassing numerous areas including
smart weapon system,

RESTD
2 RESTD advanced communications, precision munitions, information processing and
networks, strategic planning, tactical decision making, logistic and supply
systems, battle space management, unmanned aerial platforms, training simulators
and automated security system. 3. Aim. To study evolution of Artificial
Intelligence in military applications, its

existing status, future potential and impact on future warfare with special
relevance to revolution in military affairs. 4. Scope. The research will be covered
in the following sequence:a. b. c. d. e. f. g. History/ Evolution of AI.
Applications of AI. Military Use of AI. Concept of RMA and AI. RMA and Applications
of AI. RMA, Artificial Intelligence and Pakistan Army Recommendations.

RESTD
3 RESTD PART – I HISTORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE 5. History/
Evolution of Artificial Intelligence a. Origin of AI. The origins of Artificial
Intelligence usually incorporate the theories proclaimed by several ancient Greek
philosophers and scientists. Although, arguments can be made that the Egyptians1
originally garnered that stake with the advancements they made around 800 B.C. The
20th century produced the revolution of formal logic with Bertrand Russell and
Alfred North Whitehead’s Principia Mathematica2. The true driving factor of AI came
in the 1940’s with the creation of the electronic computer. Advancements in
computer theory and computer science led to advancements in AI as well. b. Present
Day Status. From 1993 until the turn of the century, AI has reached some incredible
landmarks with the creation of intelligent agents. Intelligent agents basically use
their surrounding environment to solve problems in the most efficient and effective
manner. In 1997, the first computer (named Deep Blue) beat a world chess champion.
In 1999, humanoid robots began to gain popularity as well as the ability to walk
around freely. Since then, AI has been playing a big role in certain commercial
markets and throughout the World Wide Web. The more advanced AI projects,
1

Buchanan, Bruce G. A (Very) Brief History of Artificial Intelligence. AI Magazine


26(4): Winter 2005, 53–60. Gardner, Martin. Logic Machines & Diagrams. NY: McGraw-
Hill, 1958.

RESTD
4 RESTD like fully adapting commonsense knowledge, have taken a backburner to more
lucrative industries. 6. Applications of Artificial Intelligence. Artificial
Intelligence paradigms

are used to mimic the behavior of humans in a limited way. These include tools such
as symbolic logic, Artificial Neural Networks (ANNs)3, fuzzy systems, evolutionary
computing, Intelligent Agents and probabilistic reasoning models. In conventional
programming methodologies, explicit logic and numerical

calculations are provided to solve a problem. In contrast, an ANN mimics some


biological systems by solving problems using training and learning to generalize
for new problems. Artificial Intelligence paradigms have been used successfully to
solve problems in many disciplines including business, management, engineering
design, medical diagnosis, decision making and web-based systems. a. Autonomous
Devices. Artificial Intelligence may only get

developed to a certain level due to the threat humans feel as computers get more
and more intelligent. Robotics is one of the facets of autonomous devices, they can
be termed as Mechanical AI. It is also a lot more complicated, since the data the
robot is receiving is real-time, real-world data, a lot more complicated that more
software-based AI programs have to deal with. b. Expert Systems. By the early
1980's an "expert systems" industry had emerged, and Japan and Europe dramatically
increased their funding of AI research. The field did not grow as rapidly as
3

Gabriela, Prelipcean. New Ideas on the Artificial Intelligence Support in Military


Applications

RESTD
5 RESTD investors had been led to expect, and this translated into some temporary
disillusionment. Today developers can build systems that meet the advanced
information processing needs of

government and industry by choosing from a broad palette of mature technologies.


Sophisticated methods for reasoning about uncertainty and for coping with
incomplete knowledge have led to more robust diagnostic and planning systems. (1)
Intelligent Vacuum Cleaner. An artificial intelligent vacuum cleaner goes around
the house, remembering the layout of the house after a few trial runs. It even
memorizes the areas that tend to be dirtier. (2) Writing an Essay. As you write
your essay, the program will automatically correct spelling according to the
context of the sentence, just like a human corrector would do. It naturally
analyzes your document for grammar errors, and alerts you of such errors. (3)
Researching the Net. An AI-powered search engine finds web pages given your natural
language search requirements (4) Security. The security system is linked up to a
computer, running an image recognition package. When something crosses the field of
view of the camera, the computer analyzes and compares its results to the pictures
in the database. If it doesn't recognize the 'face' an alarm is

RESTD
6 RESTD sounded, and the police are alerted with a picture of the potential
burglar. c. Artificial Neural Networks. Neural Networks4 philosophy is based on the
concept of a neuron as a unit for information storage and mapping input to output.
This building block of human awareness encompasses a few general capabilities.
Basically, a biological neuron receives inputs from other sources, combines them in
some way, performs a generally nonlinear operation on the result, and then outputs
the final result. These networks need to be capable of an infinite number of
responses. Applications of this type include the "intelligence" behind robotic
movements. Few other applications are described in subsequent paras:(1) Face
recognition. This includes the process in which an image is being given as an input
to the system. The process first decides that if there is a face in the system. The
neural network identifies the area of the image where there is a face so we go on
to give that portion of the image to the data base with which we have to match the
system. The desired profile may be given to the output. (2) Character Recognition.
Character recognition is another area in which neural networks are providing
solutions. Some of these solutions are beyond simply academic curiosities.

Jonansson, Stefan. Neural Network with Military Applications, 25 October 2005.

RESTD
7 RESTD HNC Inc., markets a neural network based product that can recognize hand
printed characters through a scanner. (3) Image Compression. A number of studies
have been done proving that neural networks can do real-time compression
5

and decompression of data. These networks can reduce

eight bits of data to three and then reverse that process upon restructuring to
eight bits again. However, they are not lossless. Because of this losing of bits
they do not favourably compete with more traditional methods. (4) Signal
Processing. Neural networks' promise for signal processing has resulted in a number
of experiments in various university labs. Neural networks have proven capable of
filtering out noise. Widrow's MADALINE was the first network applied to a real-
world problem. It eliminates noise from phone lines. (5) Financial Systems. Neural
networks are making big inroads into the financial worlds. Banking, credit card
companies, and lending institutions deal with decisions that are not clear cut.
They involve learning and statistical trends. The data from these forms is now
being used by neural networks which have been trained on the data from past
decisions.

A. Khashman and K.M. Curtis, "A Novel Image Recognition Technique For 3-Dimensional
Objects", IEEE Int. Conf. (DSP'97), Santorini, Greece, 1997.

RESTD
8 RESTD (6) Servo Control. Controlling complicated systems is one of the more
promising areas of neural networks. Most conventional control systems model the
operation of all the system's processes with one set of formulas. To customize a
system for a specific process, those formulas must be manually tuned. It is an
intensive process which involves the tweaking of parameters until a combination is
found that produces the desired results. (7) Language Processing. Language
processing encompasses a wide variety of applications. These applications include
text-to-speech conversion, auditory input for machines, automatic language
translation, secure voice keyed locks, automatic transcription, aids for the deaf,
aids for the physically disabled which respond to voice commands, and natural
language processing.

RESTD
9 RESTD PART - II 7. Artificial Intelligence in the Military. The military and the
science of

computers has always been incredibly closely tied - in fact, the early development
of computing was virtually exclusively limited to military purposes6. The very
first operational use of a computer was the gun director used in the Second World
War to aid ground gunners to predict the path of a plane given its radar data. AI
in the military is defined as any system which uses the help of “intelligent”
machines to complete tasks. Few application in the military are appended below:a.
Robotics. There is currently a large amount of research work going in the vast
fields of autonomous robotics7. These devices will be equipped with limited
processing capabilities and will thus singularly not be able to successfully reach
the end result. Thus having multiple devices, each performing a separate function,
intermediate results can be integrated to achieve a final solution. According to a
report the US military will have approximately 30% of the Army comprised of robotic
forces by approximately 2020. b. Surveillance Systems. Recent operations in
conflict areas around the world have made the need for accurate image processing
and fast target detection for military systems more obvious. The computational cost
is kept to a minimum through using a fast edge detection operator combined with the
power of a successfully
McCorduck, Pamela. Machines Who Think. San Francisco: W.H. Freeman, 1979 Dwarkadas
J. Sanghvi. Autonomous Robotics, College Of Engineering, Vile Parle, Mumbai. 17th
August, 2006
7 6

RESTD
10 RESTD trained neural network that recognizes only one correct scale for the
entire image, out of the many available scales possible in scale space. c. Weapon
Platforms. The future war is based on information and knowledge resources as the
main combat information warfare, information warfare against the characteristics,
combined with hightech precision guided weapons8 in the application of analysis of
precision-guided weapons in future wars in the direction of development. Precision-
guided weapons in the direction system, network, intelligent, stealth technology,
while also moving toward integration, multi-purpose direction, focusing on the
improvement of cost-effective, future wars will gradually become the basic fire. d.
Simulators. There are at least three major categories of simulation users in the
military—those that are training individual combatants or leaders and teams; those
that are performing analyses of systems, doctrine, and tactics for purposes of
acquisition and advanced development; and those that are addressing questions
associated with improving command and control and the

interoperability of joint forces. (1) Live Simulations. Live simulations are least
dependent on accurate models of human behavior because in these exercises, real
humans operate real equipment.
8

The

Wang Wang Yu. Precision-guided weapons in the information warfare of the


Development Trend Analysis.

RESTD
11 RESTD aspects that are simulated involve weapon firing and how hits of different
types of ordnance are measured and recorded. (2) Virtual Simulations. characterized
by real Virtual humans simulations operating are simulated

equipment in simulated environments. These simulations use a full range of


multimedia technology and computer software to replicate weapon and system
functions in real time with a suitable level of fidelity for interactive training
with humans in the loop. (3) Constructive Simulations. It involves simulated people
operating simulated equipment, usually not in real time. Real people provide inputs
that set limiting values on parameters, but they are not involved in determining
the outcomes. All human behavior in the event flow comes from models. e. Decision
Making Systems. Military decision making demands an increasing ability to
understand and structure the critical information on the battlefield. As the
military evolves into a networked force, decision makers should select and filter
information across the battlefield in a timely and efficient manner. Human
capability in analyzing all the data is not sufficient because the modern
battlefield is characterized by dramatic movements, unexpected

RESTD
12 RESTD evolutions, chaotic behavior and non-linear situations. The Artificial
Intelligence (AI) ingredient permits to explore a greater range of options,
enabling the staff to analyze more possible options in the same amount of time,
together with a deeper analysis of these options. f. Information/ Intelligence
Processing Systems. The concept

of information processing systems needs to exploit the advances in Information


Technology for providing all weather surveillance, collation and instant
dissemination of this information to facilitate increased battlefield transparency.
Image interpretation for target identification and classification. Artificial
Intelligence techniques could automate the extraction of low-level map features
from imagery. The systems are basis of concept of fusion centres.

RESTD
13 RESTD PART - III CONCEPT OF RMA AND ARTIFICIAL INTELLIGENCE Revolution in
Military Affairs (RMA) 8. RMA is defined as “A major change in the nature of
warfare, brought

about by innovative application of new technologies which, combined with changes in


military doctrine and operational/organizational concepts,

fundamentally alters the character and conduct of military operations.”9 The


concept is defined in the USA Department of Defence’s Annual Report to Congress as
“A Revolution in Military Affairs (RMA) occurs when a nation's military seizes an
opportunity to transform its strategy, military doctrine, training, education,
organization, equipment, operations, and tactics to achieve decisive military
results in fundamentally new ways.”10 It is combination of military

thinking of officers, military technology, military equipment, strategic theories,


force structure and the fast development of information technology11. RMA is the
product of socio-economic and technological developments. It is organic and timely
combination of advanced weapon systems, new military theoretical guide and suitable
force structure12. The application of new technologies into significant number of
military systems combines with innovative operational concepts and organizational
adaptation in a way that fundamentally alters the character and

10

Lieutenant Colonel Muhammad Azeem Asif, “RMA – Shaping the Contours of Tomorrow’s
Warfare”, The Citadel, Vol. 3/2000, p 70-82. William S. Cohen, Secretary of
Defense, Annual Report to the President and the Congress,1992. Zhang Hui “The New
Ideas in Study of RMA” The Journal of PLA, NDU, 1998,p.67. Zhu Gaungya, ed, p.62.

11 12

RESTD
14 RESTD conduct of a conflict13. 10. This is further substantiated by Doctor
Burkhard Theile, he says, “A Revolution in Military Affairs is triggered by two
crucial factors: the technological aspect and doctrine. The process of technology –
doctrine – operational concept – organization is long and can be seen as an
evolutionary process. The outcome may be revolutionary. Combined with a drastic
change in military doctrine, operational concepts and organization, this alters the
fundamental character of military operations.” Forms of RMA 9. The current RMA
could take one of the following forms14:a. Single System RMA. In this type, a
single technology influences the RMA. An example is the nuclear revolution and
gunpowder revolution. b. Combined System RMA. In this category, a collection of
military systems is put together in new ways to achieve revolutionary effects. The
inter-war innovations of armoured warfare by the German army, amphibious warfare by
the US Marine Corps, carrier warfare by the US Navy, and strategic bombing by the
US Army Air Forces have been characterized as "Combined System RMA." c. Integrated
System RMA. The different systems, when joined with their accompanying operational
and organizational concepts, will become integrated systems. Evidence suggests that
the revolution unfolding today, that is to say current RMA, is neither a combined13
14

Andrew Krepinevich, “Military Strategy” Chapter 1 p.7. Jeffrey McKitrick and Dale
Hill, “The Revolution in Military Affairs – Battlefield of the Future”, [Online]
Available http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.

RESTD
15 RESTD system nor a single-system RMA but an integrated-system RMA. The outlook
is for the rapid evolution of new technologies eventually leading to the
development of several advanced military systems. In contrast to developments
during the interwar period, this system-of-systems approach will aim to take
advantage of the cumulative effect of employing each of the new capabilities at the
same time. Relation of Future RMA with AI 15 10. Precision Strike. Precision strike
is the ability to locate high value, time

sensitive, fixed and mobile targets, to destroy them with a high degree of
confidence, with minimized damage and no chance of enemy counter strikes. Effect of
precision strike was demonstrated in Gulf, Kosovo and Afghan Wars. Dramatic
increase in capabilities to strike, a strategic target demonstrates the importance
of this concept. 11. Information Warfare. This is the category of warfare related
to

information systems, their capabilities and their effects on military organizations


and operations. It is the struggle between two or more opponents to control the
information battle space. At national level, it is a new form of strategic warfare.
At the military operational level, it may contribute to major changes in conduct of
war. 12. Dominating Manoeuvre. Manoeuvre has always been an essential

element in warfare, but RMA potentially presents the ability to conduct

15

Jeffrey McKitrick and Dale Hill, “The Revolution in Military Affairs – Battlefield
of the Future”, [Online] Available
http://www.airpower.maxwell.af.mil/airchronicles/battle/chp3.html.

RESTD
16 RESTD manoeuvre at global scale, on a much compressed time scale and with
greatly reduced forces. It can be defined as positioning of forces – integrated
with precision strike, space warfare and information war operations, to attack
decisive points, defeat the enemy’s centre of gravity and accomplish war
objectives. 13. Space War. It is the exploitation of space environment to conduct
full

spectrum, near real time, global military operations. It involves dominating the
space, to deny its advantages to the adversary and to use it to implement one’s own
command, control, communications, reconnaissance, air defence and weather
forecasting. 14. Full Dimensional Protection. This is necessary to retain freedom
of

action in modern battlefields. It involves both active and passive protective


measures against all threat forms to remain viable; to strike at will, at enemy
sensitivities. Greater stealth and jamming technologies will contribute to this
end. 15. Focussed Logistic. It means reducing the logistic load to only the

essential requirement in shortest possible time, at the fastest speed and in the
correct quantity. The concept of "focused logistics" to meet the demands of
operations will be responsive, flexible, and precise" through the fusion of
information, logistics and transportation technologies. The goal is to be able to
track and redirect assets even while enroute, and to provide support in hours or
days rather than weeks. 16

16

Mr.Lothar Ibriigger (Germany), “The Revolution in Military Affairs” (online)


Available http://www.naa.be/publications/comrep/1998/ar249stc-e.html.

RESTD
17 RESTD PART - IV 16. RMA and Applications of Artificial Intelligence a. Robotics.
Robotics is in many respects is Mechanical AI. It is used in number of
applications. The movies like Terminator, Robocop and I Robot are few examples.
These robots at present performing duties in battle field in Iraq and Afghanistan
and are likely to replace human soldiers. b. IED Detection, Jamming and
Neutralizing. New systems are using IMT to elevate C-IED skills beyond basic
detect-locatedestroy IED competencies and into the arena of decision-making and
other more complex skills. It’s more of the methodologies of what is the
insurgent’s mindset for doing these types of things so it can predict that order of
magnitude, or that level of prevention that is needed in order to detect or avoid
those IEDs. c. Revolution in Military Logistics. The dynamic nature of battlefield
requires logistics to acquire a number of capabilities that it currently does not
have especially in LIC. Underlying a distribution based system, real–time
situational understanding, anticipatory and precision logistics, seamless logistics
system, and streamlined acquisition are a wide array of advanced technologies that
must be researched, developed, applied, and acquired through AI and it must provide
predictive capability to the logistician. This is the only

RESTD
18 RESTD way to relieve the reactive burden currently imposed upon the logistician.
d. Airborne Warning and Control Systems (AWACS). The use of radar on an AI aircraft
is also optimized. If they can, they will use Range While Scan and Track While Scan
where the conditions require. If they’re launching a Semi-Active Radar Homing
missile (SARH), which requires a constant radar lock from the launching aircraft to
reach the target, the AI will wait until the last moment before switching to Single
Target Track (STT), a radar mode sounds an alert in the targeted aircraft’s
cockpit, warning of impending attack. e. Command and Control Systems. In essence
the Command and Control System is modeled in software so we need to understand what
it is Command and Control is the exercise of authority and direction over available
resources towards the accomplishment of some objective. It has a number of
different aspects:(1) (2) (3) (4) Data collection and monitoring. Decision-making.
Planning and scheduling. Team formation, coordination, control and communication,
all taking place in real time in highly dynamic environment.

RESTD
19 RESTD (5) Command and Control systems provide an infrastructure for the
management of information and resources in a complex dynamic environment. (6)
Command and Control system provides the ‘glue’ that binds everything together. f.
RPVs/ UAVs. Unmanned aerial vehicles17 have been stars in

Operations Enduring Freedom and Iraqi Freedom. The employment of Predators in the
war against global terrorism offered lot of different capabilities, the Predator
has been used in joint-combined operations. The integration between conventionally
piloted aircraft and UAVs "was outstanding" during the Iraq. Predator pilots would
identify a target and would drop (ordnance) on the target. UAVs obviously have the
endurance to stay in an area a lot longer than fighter aircrafts. g. Fusion Centers
(Info Collection and Processing). The manual information processing system is not
suitable for future conflicts for two main reasons. Firstly, the dynamics of
battlefield will demand near real time combat intelligence which the system cannot
provide even if it is fully streamlined and it works at its peak efficiency.
Secondly, the proliferation of sensors and fluid battlefield situation will
generate enormous volume of information which will be humanly impossible to
process. It is therefore imperative to develop a fully automated system for data
processing which can receive
17

http://usmilitary.about.com/cs/weapons/a/uav.htm?rd=1

RESTD
20 RESTD information from directly interfaced sensors, carry out target
identification and situation assessment and present to commanders a cohesive
picture of battlefield in near real time. Multi Sensor Data Fusion (MSDF) based on
AI is very critical for analyzing the accuracy and the confirmation of the
collected information. With the emergence of AI technologies and related software,
the emphasis has gone on developing fully automated surveillance systems so that
the response time is reduced and meaningful combat information is available in near
real time. It will also facilitate the exchange/transfer of information and data
within the various sub systems of the decision making system. Some of the automated
process carried out at the surveillance centre are :(1) (2) (3) (4) (5) (6) (7) (8)
(9) (10) Surveillance planning. Sensor management. Multi Sensor Data Fusion (MSDF).
Target Identification. Situation Assessment. Artillery Target Intelligence. Counter
Bombardment (CB) process. Enemy Artillery situation assessment. Direction of Own
Arty Fire (DOOAF). Post Strike Damage Assessment (PSDA).

RESTD
21 RESTD h. Simulators. Simulation advances will transform military planning and
training. Today, virtual reality simulations can enable soldiers to train in high
fidelity mock-ups, at substantial reduction in risk and spending. There is a need
to exploit a range of tools and products that will enhance the Army’s capabilities
in the domains of training, development, acquisition and decision support. i.
Tactical Sensor. Possible applications of these tactical sensors

are unobtrusive micro audio bugs and video recording devices with high capacity
data storage to plant at likely meeting places of terrorists, over ground agents
and sympathizers, unattended micro ground or air sensors which can be placed in
advance and remotely activated on required basis and micro sized energy devices
which can power unattended sensors / audio / video devices and a host of other
applications in remote areas or places which require extremely light weight power
sources like light weight man portable radars, missiles, UAVs and other systems.

RESTD
22 RESTD PART - IV 17. RMA, Artificial Intelligence and Pakistan Army. The apparent
success

of high tech systems in the ongoing wars in Iraq and Afghanistan, are indicative
that the war is undergoing a profound transformation. Technology is fundamentally
changing the face and nature of warfare. The opportunities offered by these new
emerging technologies are boundless. There is a need to concentrate on those
technologies that are important to Pakistan Army for its modernization
requirements. a. Target Evaluation and Weapon Assignment System (TEWA). It is a new
system developed by the collaboration of Air Defense and CARE institute. A network
of radars and associated guns on a shared network locates a hostile aerial target
and automatically a gun is assigned to neutralize the target. Moreover this is
entirely done automatically and the commander’s are also given the update on
Laptops. b. Intelligence, Surveillance and Reconnaissance. Pakistan Army is in the
process of establishing ISR capability. Induction/ indigenous production of UAV/RPV
platforms in one step in this direction. These are being used very effectively in
war against terrorism. These systems are being used for acquisition of information/
intelligence about militant and their hideouts for effective engagement.

RESTD
23 RESTD c. Network Centric Warfare. Office Automation System being

implemented by Pakistan Army is indicative of her resolve to become a network


centric army in near future. The system is being integrated with sensor grid and
response grid, which are two important components of the system. Recent war games
and war on western front has also witnessed integration of all available means for
battle field transparency and effective response. d. Fusion Centers. For successful
operations Fusion Centers have

been established for integration of data, thus facilitating decision makers for
timely decisions, weapon platforms for selection of engagement means and post
operation analysis. These Fusion Centers have been established in Military
Operations Directorate and at Corps Headquarters. e. Simulators. Simulators are
being used for training of soldiers and crew for optimum utilization of different
platforms. This helps in conservation of effort, resources and infrastructure.
These are still in embryonic stage and can be used in Pre Induction Training. f.
Anti IED Doctrine. Pakistan Army has constituted a forum to develop a strategy to
counter IED. This will not only help in neutralizing IED in the target area but
will also help in safeguarding assets in cantonments. Artificial Intelligence can
be effectively used for comprehensive response.

RESTD
24 RESTD PART- VI 18. Recommendations a. War Gaming AI Based Systems. To improve
decision making skills, speed and accuracy of response of commander, war gaming
software and simulators must be procured or developed. EME and MCS can be assigned
the responsibility to carry out feasibility of these projects. As an interim
measure off the shelf system for induction in National Defense University, Command
and Staff College and other Schools of Instructions can be considered. b. Joint
Collaboration. Field of Artificial Intelligence is new and

most of the research is done in the developed countries therefore, it would be


beneficial to jointly undertake projects. Pakistan has high end human resource and
thus can contribute significantly. c. AI Awareness in the Army. As a first step
there is a dire need

to promote understanding about massive scope of AI in real battle field situations.


Most people confuse AI with war gaming software’s and tactical simulators in which
real-time data and situation is not considered. Officers should be introduced with
this new dimension of planning in a comprehensive manner through study periods and
demos. d. National Artificial Intelligence Complex. To congregate

effort there is a need to establish a National Complex for development of projects.


This will help to promote understanding of

RESTD
25 RESTD simulators, quantifying requirements of hardware, software and technical
expertise for integration of AI in present C4I System and organize Indigenous
development of AI software and simulators. The body will coordinate with various
arms and services and private companies for indigenous development of AI
applications for battlefield planning besides conducting test/trials of domestic
and foreign AI systems and making recommendations for procurement of AI systems. e.
Evaluation/ Test and Trials. A joint venture of Air-Defense

and ‘CARE institute’ developed an Intelligent Autonomous System for Engagement of


Aerial Targets by AD guns called ‘TEWA’ Target Evaluation and Weapon Assignment. It
is recommended the same system be employed and further improved upon for other
fighting arms as well. Similarly DMOS as US origin system used for evaluation of
operational plans in the Pakistan Army 2009 war games should also be extended and
used for real time situations for Command and Staff College and National Defense
University. f. Design and Implementation. As a proof of concept the system

can be initially implemented for a tank squadron or for an infantry company. A


completely autonomous system should be developed for a small unit based on the same
concept of US BCTs (Brigade Combat Teams) which are self sufficient infantry units
that have met great success in Iraq and Afghanistan Operations.

RESTD
26 RESTD g. Use of Simulators for Pre Induction Training. To minimize

the human causalities and better train soldiers and crew, simulators can be used at
training centers. Virtual reality environment helps in training in near real time
situation thus helping troops in quick reflexes. h. Research and Development. The
engineering universities can

be assigned projects in the realm of artificial intelligence. This will help in


indigenous production of these systems. This will help in self reliance and cost
effective systems. i. Pilot System. With higher echelons the complexity of design

increases. It is therefore recommended that a bottom up approach be used to design


an indigenous system at Company or Platoon level (Squadron level in case of Armor)
as a proof of concept. j. Promoting Indigenous Development. Nowadays powerful

computer hardware is available to everyone in almost every part of the world at


affordable prices thus facilitating indigenous dev of hardware and software
applications for military purposes. It is therefore recommended that indigenous
development of simulators and applications for military training must be promoted
through integral military resources and private companies. k. Human Resource
Training. Technical expertise in AI field is

seriously lacking and only a handful of AI specialists are currently serving in


Army. It is therefore recommended that measures be

RESTD
27 RESTD taken to promote the field and to educate more officers in masters and PhD
both in the field of AI, otherwise we will always be lagging and be dependent on
foreign elements for requisite development and subsequent maintenance of the
system.

RESTD
28 RESTD Conclusion. 19. It is to be understood that in the present and future
warfare, AI led

technology will play a decisive role on the battlefield. There are major in the
integration of acquired AI based technology and its development. These challenges
range from general understanding and technical expertise to financial cost and
compatibility. There are a number of different projects being worked on right now
around the world, by some of the world’s finest scientist and computer experts
striving for technological advancements in Artificial Intelligence, development
will progress with new barriers being broken between human and machine in near
future. The suitability and applicability of the said field in various domains
including military has provided enough impetus for the research in the field of
Artificial Intelligence to thrive at magnificent rate. Being a competitive world
army, we also need to evaluate and adopt to the changing scenario of Future Battle
field and that is possible only if we venture hard and deep into the AI domain vis-
à-vis practically implementing the behavioural models for technological
advancement.

RESTD
29 RESTD BIBLIOGRAPHY 1. Clark, R. (2004) Design Document For A Guided Experiential
Learning

Course. Final report on contract DAAD. 2. Rhea, John. The Next 'New Frontier' of
Artificial Intelligence, Military &

Aerospace Electronics November, 2000. 3. D. Gibson, Finite State Machines - Making


simple work of complex

functions, SPLat Control Pty. Ltd, 1999. 4. A. E. Collins, Evaluating the


performance of AI techniques on the domain

of computer games, [www.dcs.shef.ac.uk/~u8aec/com301], 2001 5. B. Bruegge & a. H.


Dutoit, Object-Oriented Software Engineering -

Conquering Complex and Changing Systems, Prentice Hall, 2000 6. A.Dix, J. Finlay,
G. Abowd, R. Beale, Human-Computer Interaction 2nd

Edition, Prentice Hall, 1998 7. 8. P.K. Winston, Artificial Intelligence, Addison-


Wesley, 1993 Handbook of Virtual Environments for Training and Education, Vol. 3.

Westport, CT: Praeger Security International. 9. Johnson, W. L. International


Conference on Artificial in Intelligence. IOS

Press, Amsterdam, 2007. 10. Kilcullen, D. (2006) Twenty-Eight Articles:


Fundamentals of Company-

level Counterinsurgency,Military Review, May-June 2006, 103-108. 11. J. Kim, R.W.


Hill, P. Durlach, H.C. Lane, E. Forbell, M. Core, S. Marsella,

D. Pynadeth, & J. Hart, BiLAT: A game-based environment for practicing negotiation


in a cultural context. International Journal of Artificial Intelligence in
Education (in-press). 12. Wong, L. (2004) Developing Adaptive Leaders: The Crucible
Experience

of Operation Iraqi Freedom.

RESTD

Das könnte Ihnen auch gefallen