Military Technology

Vol 2 Chapter 508: Reliable weapons are the most important

Papapap ... After a warm applause, many guests on the podium could not bear the excitement in their hearts and began to discuss one after another.

Prince Mahaima turned to Wu Hao with a smile and asked, "Wu, can this drone be equipped to security forces to handle some special crisis situations."

Wu Hao naturally understood what the special crisis situation said in Prince Maha's words, and nodded with a smile: "This is a set of patrol security systems, and users can change the relevant uses according to their needs. Theory It can be used to deal with some special crisis situations, including the pursuit of armed elements. "

"It is not okay to have a capture net. If the ground personnel do not arrive in time, the captured person will likely escape from the net immediately, attack these drones or escape." Sitting on the other side of Wu Hao General Abu said at the right time.

Hehe, Wu Hao smiled back and said, "This demonstration is a public demonstration session. Due to the venue and the audience, we cannot show all its functions, and it is impossible to equip it with weapons and equipment.

If that's the case, I'm afraid the covers of the major newspapers in the world will criticize us the next day. "

Hearing him, everyone present laughed. Indeed, there are some things that do not have to be spoken in public. This is like those weapons and ammunitions. The manufacturer will never tell you publicly how destructive and ammunition power of this weapon is.

Even if he said it, he would only say how thick these weapons and equipment can destroy, how wide the explosion kills, and how much power these weapons and equipment can kill.

After laughing, Wu Hao continued: "The capture net launched by the drone in the demonstration just now is just a general capture net, and it is mainly aimed at some ordinary targets that do not require much force.

If necessary, we can equip it with other stronger and more binding capture nets.

For example, there is a special capture net, which is very sturdy. General knives are constantly cut, and there are many barbs on this net.

These barbs can not only catch these nets, but also make it impossible for the captured person to escape. He will also catch the clothes and flesh of the captured person, making him afraid to move because of the pain.

In addition, you can use a soft power grid. After capturing the target, you can shock the target, causing them to paralyze or even faint.

Of course, this is just the most common method of disposal. Users can install related weapons and equipment on the drone according to their needs, such as tear gas, guns and even grenades. "

"How is it safe? Does it identify the target to attack on its own?" Mr. Suha, wearing glasses and a suit, couldn't help asking. Compared to those military representatives, his main concern is security. This kind of drone is very advanced, but I am afraid that it is too advanced. It will be a disaster if it is out of human control.

As soon as he heard what Mr. Su Ha said, everyone also calmed down and looked at Wu Hao, waiting for his answer. No matter what weapon it is, the most important thing is that it is absolutely reliable and safe and cannot be separated from human control, otherwise it is not a good weapon. Don't kill your enemies before you kill them.

Facing the eyes of these people, Wu Hao nodded with a smile and said, "Everyone can rest assured that our system and drone are absolutely safe and reliable. The command to launch the attack just now was actually issued by our background control personnel. There is no permission for automatic attacks.

最高 The highest authority of our intelligent unmanned inspection security system is still human control, and the system cannot violate the manual operation command.

The drone will only attack when the control personnel in the rear command and control center issue related attack instructions. And in the process of the attack, the controller can also revoke the attack order at any time to prevent accidents. "

"So in case the command and control system is under network attack, will the hacker manipulate these weapons and turn their heads to attack us." This Suha asked Wu Hao again, and he could see that he had no one for this intelligent set. There was great concern about patrolling security systems and aerial patrol security drones.

Wu Hao asked with a smile at this Su Ha's words: "Do n’t we need a computer because we are afraid of being attacked by the Internet?

A lot of drones are now equipped in the military of various countries. Do we not apply these drones in order to be afraid of being invaded?

I cannot guarantee that this set of intelligent unmanned patrol security system and aerial patrol alert drone will not be invaded by enemy hackers during future use, and I cannot predict the future.

However, in this system, we used a self-developed system kernel and related firewalls. Basically, it is difficult for hackers to attack the intrusion.

And I just said ~ www.novelmtl.com ~ The highest authority of our system is manual control. If an intrusion is found during use in the future, you can manually shut down the entire system. Then perform a forced shutdown and restart, so that you can return to normal. Of course, users can organize related computing staff to upgrade their firewalls to plug loopholes, or they can ask us for help, and we will provide customers with high-quality after-sales service. "

Hearing his words, everyone nodded. This is indeed the case, no matter what electronic products there is the possibility of being invaded. Is it because of the fear of being hacked?

"What about anti-jamming?" General Abu asked, as a soldier, he still looked at the problem from a military perspective. Compared to any hacking attack, he is more interested in whether this drone and system can have a certain anti-interference performance, which is more important in actual deployment and use.

"Specially optimized for this area, it has a strong ability to resist electromagnetic interference." Wu Hao smiled back.

"And in response to this situation, we have also set up a very complete set of response mechanisms. For example, if the drone being patrolled is strongly disturbed and loses contact, the system will automatically let several drones nearby or supplement the past A drone performs a carpet-like search of the last area where the missing drone appeared.

On the one hand, it is to prevent possible targeted invasion by the enemy, and on the other hand, it is to think about the unconnected drone and find the relevant cause.

Of course, the system will also report to the officers on duty at the command and control center in the rear. The officers on duty can direct nearby patrol teams to the relevant accident site to find out the reasons and so on. "

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like