Military Technology
Chapter 2302 Achieve one-way transparency of battlefield information
Looking at everyone's interested expressions, Wu Hao smiled and continued to introduce: "These platforms include the drones and unmanned vehicles that are shown to you now, as well as fixed monitoring stations, water monitoring stations and other comprehensive monitoring equipment. This Not only does it have a graphical monitoring system, it can also collect sound, temperature, air, weather changes, humidity changes, and other data information in the area where these platform devices are located.
In addition, we have also set up underwater monitoring stations. Using sonar systems, we can detect underwater dynamic information in the area covered by this comprehensive battlefield information intelligent monitoring system, including some submarines, frogmen, etc. Tracks can be detected through underwater monitoring stations.
In addition, we also have some that go deep into the soil to detect the moisture in the soil and other data information, etc.
At present, we only have UAV platforms and ground mobile platforms on display. Some other platforms and detection equipment are not displayed due to space and time reasons. If you are interested, you can go back to make a special introduction or provide relevant introduction materials. "
After speaking, Wu Hao looked at everyone and said: "I don't need to introduce the functions of this comprehensive battlefield information intelligent monitoring system. I believe everyone can understand its function. Its advantage is not only that it can cover the entire battlefield, but also that it can cover the entire battlefield. The key is that it can connect various devices on the battlefield to form a comprehensive intelligent battlefield information monitoring system.
For example, the data information terminals of armored vehicles, tanks, aircraft, helicopters and other weapons and equipment of various troops on the battlefield, as well as the data information terminals of our individual soldiers, and even the data information of our radar and other early warning troops, meteorological support troops, and reconnaissance troops. All can be brought together and then displayed comprehensively and dynamically.
In this way, whether it is our rear command center, forward command post, or troop command post, they will be able to understand the rich data information on the battlefield based on their different permissions. With this trustworthy battlefield data information, we can know ourselves and the enemy and win every battle.
Similarly, these grassroots units, even every armored vehicle, tank, vehicle, aircraft, and even soldiers equipped with personal terminal systems for battlefield data information can access these related data information according to their respective permissions, so as to respond to battles more calmly. Know yourself and the enemy, and be victorious in every battle. "
Speaking of this, Wu Hao paused for a moment, and then continued to the crowd: "Through this comprehensive battlefield information intelligent monitoring system covering the entire war zone, we can achieve precise monitoring of the entire huge war zone. Every plant and tree inside, every move of the enemy will be exposed to our field of vision, achieving one-way transparency of information on the battlefield.
In this way, we can keep track of all the enemy's activities and deploy and respond in a targeted manner. For example, a series of small-scale special operations strategies and tactics that were mythical in movies and TV series in the past, such as infiltration operations behind enemy lines, and decapitation operations, will have nowhere to hide under this comprehensive battlefield information intelligent monitoring system, and will have no use at all. .
No matter what method the enemy uses, whether it is airdropping, parachuting, landing, or other methods, as long as they enter our monitoring range, we will be able to understand their movements and eliminate them in time. "
After hearing Wu Hao's introduction, the leaders present all nodded and couldn't help but admire this comprehensive battlefield information intelligent monitoring system. But at this time, a system scientific research unit leader said: "This comprehensive battlefield information intelligent monitoring system is very powerful, but it is not safe. According to you, these devices scattered all over the battlefield are are interconnected. So if the enemy finds a monitoring device or something, wouldn't it be possible to crack your entire system and gain reverse control of all information on our military activities within the coverage of this system? Isn't this for Can anyone help?"
After hearing the words of the leader of the scientific research unit, everyone present nodded in agreement. Yes, this is a double-edged sword. What if the enemy seizes the equipment and compromises the entire network.
Although these questions were within Wu Hao's expectation, he was really unhappy when the leader pointed them out. Of course, the dissatisfaction is dissatisfied, but Wu Hao deserves praise for his keenness and professionalism in discovering problems, and to a certain extent, this can be regarded as helping them promote the product and continue to increase the leaders’ interest and enthusiasm for this product. The impressions of weapons and equipment answered their doubts.
So thinking of this, Wu Hao couldn't help but glance at the leader. Wu Hao also knew him. He was a leader of a scientific research institute in the military industry system and the person in charge of several projects. He was from a scientific research background, so he was also an expert with rich qualifications. This man's name is Ma Hongsheng. He is over fifty this year and is considered to be in the prime of life.
Facing the inquiring looks of everyone present, Wu Hao smiled and nodded: "The issues you mentioned are indeed concerns of many people. But please rest assured, we are developing this comprehensive intelligent battlefield information monitoring system. From the beginning of the system, these problems have been thought of and solved in a targeted manner.
First of all, I want to tell you that the system used in this comprehensive battlefield information intelligent monitoring system is a new generation closed system developed by us. This system is very safe and difficult to be broken. Even with supercomputing, it is difficult to make progress in a short period of time.
Its predecessor products have also been used in some of our equipment. They have been put into service and have performed well during daily patrols and some exercises. There have been no problems with safety, so its safety has been fully verified. You don’t have to worry at all.
Secondly, there is the single transmission system we specially opened. These fixed monitoring platforms can only transmit relevant specific data information, and cannot transmit other information other than these specific data information, nor can they receive relevant information.
Therefore, it is basically impossible for the enemy to invade through these fixed monitoring stations. The second is the mobile monitoring platform. Although they provide two-way communication, they can only transmit specific content, and other content cannot be transmitted.
And these devices and platforms all have a feature, that is, all the hardware is encrypted. As long as one is moved, the entire system will automatically lock up. Unless it is professionally repaired, it will be a brick and of no use.
Finally, there is the security monitoring and filtering of all data information by the intelligent system. The system will monitor all data information in the entire comprehensive battlefield information intelligent monitoring system and filter out suspicious and dangerous data information in real time.
These suspicious and dangerous data information will be verified and confirmed by specialized security systems and personnel before restrictions can be lifted. Otherwise, they will be filtered and isolated to prevent them from intruding into some key equipment systems. "
You'll Also Like
-
Elf: My Healing Farm
Chapter 135 10 hours ago -
Zongman: Start with Sakurasou and pick up a female high school student
Chapter 352 10 hours ago -
Yue Buqun: I'm already cultivating immortality, why do I still want to be the leader?
Chapter 517 10 hours ago -
Football: Xiao Junguang template, Real Madrid begs me to let him go
Chapter 154 10 hours ago -
Collapse of iron: simulation of being watched, starting from supporting jadeite
Chapter 167 10 hours ago -
Daqin: Upgrade the entry and intercept Yan Lingji
Chapter 176 10 hours ago -
Collapse of Iron: Shen Ce Tian Ji comparison, Jing Yuan Chu breaks the defense
Chapter 312 10 hours ago -
Bengtie: Add points to become stronger, I collect all the fate
Chapter 284 10 hours ago -
Bengtie: Interview with Huanyu, Aha's sharp comments on the stars
Chapter 274 10 hours ago -
Comparison of the two versions of Honkai Impact 3: Otto, the false god at the beginning
Chapter 172 10 hours ago