Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 763: The Suppressing Artifact

When the summer vacation of 2021 came, the first drone attack aircraft technology developed by Cheng Fei and DSM finally made a breakthrough again. Duke took action to reconstruct the drone's attack intelligent computing architecture, giving it the characteristics of distributed computing. This new distributed intelligent computing architecture allows the drone to have the ability to use any connected computing device to perform intelligent distributed computing.

That is to say, now, as long as the drone is connected to a network, any computing device in the network can be used. As long as the same attack intelligent analysis application is installed on the computing device, a large number of computing tasks can be assigned to these computing devices to operate in concert.

This is not a new idea. As early as decades ago, someone on Earth developed a computing program to find alien life. As long as any computer connected to the Internet on Earth can download a special application software and connect it after installation, it can share part of the huge data computing task of finding alien life, and use some electromagnetic signal information from the starry sky that has been obtained on Earth for simulation and derivation.

Although there has been no breakthrough in this work so far, the system proves that most of the electromagnetic signals from the starry sky are sent out by various movements of the star body itself. Those who truly have intelligent life are transmitted consciously have not been found. In fact, in the past few decades, it is not that there is no information transmitted by alien intelligent life, but that it is impossible to receive and analyze it with the receiving devices and signal analysis methods used by the people on earth.

Just like Bileme was able to receive signals transmitted by his companions from a distant star domain through a multidimensional space. Although some of this signal was received by the organization on Earth looking for alien life, since he did not know how to combine and decode, this part of the information was quickly submerged in a massive amount of natural electromagnetic waves in the unconscious starry sky.

However, this is a bit too far-reaching. Looking back, when DSM encounters trouble in researching intelligent systems for UAVs, the first solution that comes to mind is also this distributed idea. It is impossible for us to install computer equipment with sufficient computing power on UAVs, so we will distribute computing tasks to external computing devices through wireless networks.

Of course, there is no problem with this idea. The prototype system was developed very quickly, but everyone soon discovered new problems. Due to the high real-time requirements, compared with the computing without time requirements for alien life software applications, this real-time requirement makes distributed computing encounter extremely demanding network transmission requirements from the beginning, because applications distributed to other computing devices must maintain a real-time data exchange with drones. With S-WiNet's new wireless broadband transmission technology, although it has made revolutionary progress compared to other wireless transmission technologies, it is quite difficult to maintain a transmission speed of 100M when unmanned attack supersonic high maneuvering, not to mention that there is also a requirement for relay transmission nodes to cooperate within a range of 200 kilometers in transmission distance.

For supersonic combat mode, this extremely demanding wireless transmission supporting environment has almost no new method except for setting up dense S-WiNet base stations on the mainland for support. This has a very large limitation on the use of drones, which makes the use environment of drones based on land-based wireless transmission systems.

In fact, the most useful environment for the use of drone attack aircraft is over overseas oceans or unfamiliar areas. In these combat environments where the number of fighters is almost impossible to increase to make up for the attack intensity, uninterrupted attack aircraft are maintained through drone attack aircraft for almost 24 hours, making the same number of drone attack aircraft several times more attacks than manned attack aircraft, which is equivalent to enhancing the air strike force several times.

For aircraft carriers responsible for maritime operations, when the number of carrier-based aircraft is limited, by unmanned carrier-based attack aircraft, the air attack power of an aircraft carrier formation can be greatly enhanced, which is equivalent to adding several times of combat power.

Therefore, although the DSM research team made great breakthroughs in its work, it was still a bit far from the military's requirements, so when they had no choice, they raised this difficult problem to Duke.

This is the most important technical obstacle for a UAV. After carefully analyzing the current system problems, Duke found that the key bottleneck problem is that the wireless network transmission speed cannot keep up with the existing application data exchange, so Duke focuses on minimizing the intermediate data exchange.

On the one hand, we must maintain the requirement of almost real-time feedback, and on the other hand, we must reduce the amount of intermediate data exchange. For this application similar to the distributed computing architecture of supercomputer, this is a contradiction in itself, so DSM scientists rack their brains to achieve local improvements and cannot make fundamental changes. In this parallel distributed computing, each access node must maintain a certain amount of data communication to cooperate with the entire computing task.

Therefore, Duke reconstructed this distributed computing architecture and transformed parallel distributed computing into a hierarchical parallel distributed computing. That is to say, the drone maintains a network connection with a limited number of proxy distributed node machines, continuously allocates the computing tasks, and collects the calculation results of distributed nodes. Most of the computing tasks are redistributed by these proxy distributed nodes to more distributed computing nodes, forming a network relationship similar to the general agent and subcontractor, which reduces the external communication bandwidth requirements of the drone by N times, which means that the original parallel distributed computing needs to communicate with thousands of distributed nodes, and now it is only possible to have the same limited number.

This new architecture is undoubtedly a revolutionary breakthrough. DSM scientists did not think of this method at the beginning, but they could not summarize the computing tasks of the drone through Kerry's massive simulation operations into several limited types of computing tasks like Duke, and then greatly improve the prediction time accuracy of each decomposition operation task on different computing devices, so that the computing tasks decomposed into this distributed network can effectively return the results according to the prediction allocation time.

This ensures that the entire computing task has the possibility of the fastest completion.

Although there is nothing difficult to understand in theory, this method requires the computing capabilities of the entire combat network computing equipment in advance, and then fully consider this when dividing drone tasks, so that the allocation of tasks has an extremely high degree of matching with distributed nodes. This algorithm is by no means possible for ordinary people.

Fortunately, Kerry has natural advantages in this calculation method, allowing Duke to rely on Kerry to complete this extremely intelligent unique distribution algorithm.

After this problem, Duke knew that with the existing computer theoretical research foundation on earth and the computing power of onboard computer systems, the U.S. military's unmanned attack aircraft should not be smarter than the system developed by itself. Therefore, in terms of intelligent combat, the system developed by itself will definitely be better than the one developed by the U.S. military.

In this way, the US military's unmanned attack aircraft have insufficient innate intelligence and have obvious flaws compared with manned fighters. Therefore, in terms of its use, the US military should focus on performing ground-to-sea attacks rather than using them to fight in air. In other words, the US military's F/U-47 "Demon" unmanned fighter is unlikely to replace the US military's manned fighter.

Duke told Qin Tairan this speculation conclusion. After Qin Tairan reported Duke's speculation result to the General Staff Intelligence Department, after intelligence excavation by the General Staff Intelligence Bureau and the secret agencies of the National Security Bureau, the US military's F/U-47 "Demon" unmanned fighter deployment plan was basically verified, mainly on the aircraft carrier-based aircraft wing. According to the top-secret plan within the US military, each aircraft carrier-based aircraft wing will be equipped with a squadron of F/U-47 "Demon" unmanned fighter.

This intelligence indirectly provided strong evidence for Duke's speculation, which made the military committee's bigwigs feel a little relieved, because in the face of this new fighter jet from the US military, it is difficult to judge the intelligence obtained by the General Staff Intelligence Agency. After all, this new fighter jet has never appeared on the battlefield, but has frequently appeared in test flights in the past ten years.

However, given that the main fighter jets launched by the US military over the past few decades have strong combat power, from the F-15/F-16/F-22/F-35 land-based fighter jets to the F-18/F-35B series carrier-based aircraft, their combat power is significantly better than the fighter jets of other countries in the world developed in the same era, allowing military personnel to outperform the combat power of this new F/U-47 fighter jet of the US military.

However, since we have basically judged that this is a sea-to-ground attack aircraft, everyone's psychological pressure is much lower. After all, no pilot is willing to fight to the death with a cold machine, just as no pilot is willing to fight head-on with the other party's missiles.

However, the new intelligent attack system transformed by Duke is completely different. Using air early warning aircraft, Winglong drone and aircraft carrier formation form a combat airspace with a radius of thousands of kilometers. Using aircraft carriers and formation large destroyers and frigates, the super small aircraft clusters on the frigate can completely make the X-1 unmanned attack aircraft developed by Chengfei Contract DSM have the ability to compete for air excellence, making the X-1 unmanned attack aircraft more comprehensive.

In other words, on the fifth-generation unmanned attack aircraft, the X-1 unmanned fighter will surpass the US military's F/U-47 and become the world's leader.

When the X-1 unmanned fighter installed a new super intelligent distributed attack system, after actual verification, it was confirmed that Duke's improved new system can indeed increase the level of intelligent combat by an order of magnitude with the cooperation of the super small aircraft cluster on the ground. Although the tactical creativity of air combat is now weaker than that of manned pilots, the X-1 has clearly gained the upper hand in the confrontation with the J-20.

When the secret base deep in the Gobi Desert completed this experimental confrontation, Vice Chairman Liu, who heard the news, wrote the four big words "The Magic Artifact of the Country" for this new model. Indeed, although the proud Shuanglong J-10D/J-11D is basically the pinnacle of the third and a half generations of models, and even surpasses the Silent Eagle level of the latest model of the US F-15, it is already a model that the US military has stopped developing after decades of development, and it is nothing at all.

But the X-1 unmanned fighter is different. The F/U-47, the same type of US military, has just been finalized and has not yet been put into service. Now our prototype has surpassed them, which means that on the fifth-generation fighter, we have proudly reached the peak of the world. This is the real historic breakthrough.

Although the use of X-1 unmanned fighter has strong limitations and requires sufficient computing power and network support in combat airspace, and it is not possible to launch and fight at any time and anywhere, these are not big problems. For the originally weak PLA aircraft carrier formation, the X-1 unmanned fighter is almost a perfect fighter, because the aircraft carrier formation itself has extremely powerful computing power. The huge hull and nuclear-powered aircraft carriers and large destroyers can be equipped with super small aircraft clusters with strong computing power to support the combat needs of X-1 unmanned fighter.
Chapter completed!
Prev Index    Favorite Next