Chapter 763: Zhenguo Artifact
When the summer vacation of 2021 arrived, the first unmanned attack aircraft technology developed by Chengfei and DSM finally made a breakthrough again, and Duke took action to reconstruct the attack intelligence computing architecture of the UAV, so that it has the characteristics of distributed computing, this new distributed intelligent computing architecture, so that the unmanned attack aircraft has the ability to use any connected computing equipment for intelligent distributed computing.
That is to say, as long as an unmanned attack aircraft is connected to a network, any computing device in the network can be used, and as long as the same attack intelligence analysis application is installed on this computing device, then a large number of computing tasks can be assigned to these computing devices to work together.
This is not a new idea, as early as a few decades ago, someone on the earth developed a calculation program to find extraterrestrial life, as long as any computer on the earth connected to the Internet can download a special application software, install and connect to it, it can share part of the huge data computing task of finding extraterrestrial life, using some electromagnetic signal information from the stars now obtained on the earth for simulation and derivation.
Although there has been no breakthrough in this work so far, the system has proved that most of the electromagnetic signals from the starry sky are emitted by the various movements of the stars themselves, and the real intelligent life has not been consciously transmitted by it, in fact, in the past few decades, it is not that there is no information transmitted by extraterrestrial intelligent life, but with the receiving devices and signal analysis methods currently used by earthlings, it is not possible to receive and analyze it at all.
Just as Billem was able to receive signals from his companions from a distant star field through a multidimensional space, although some of these signals were received by the organization on Earth that was searching for extraterrestrial life, but because they did not know how to combine and decode, this part of the information was quickly drowned in the massive natural electromagnetic waves of the unconscious starry sky.
But this is a bit far-fetched, looking back, when the DSM for the unmanned attack aircraft research intelligent system trouble, the first solution that comes to mind is also this distributed idea, in the UAV we can not install computer equipment with sufficient computing power, then we will distribute the computing task to the outside computing equipment through the wireless network.
Of course, there was no problem with this idea, and the prototype system was developed quickly, but soon everyone discovered a new problem, due to the high real-time requirements, compared with the time-free operation of the software application to find extraterrestrial life, this real-time requirement makes the distributed computing encounter extremely demanding network transmission requirements at the beginning, because the application distributed to other computing devices must maintain a real-time data exchange with the drone, in the case of S-WiNet, a new wireless broadband transmission technology, Although there has been a revolutionary progress compared with other wireless transmission technologies, it is quite difficult to maintain a transmission speed of 100M in the case of unmanned attack supersonic high maneuvering, not to mention the relay transmission node within a range of 200 kilometers in the transmission distance.
For the supersonic combat mode, this extremely harsh wireless transmission supporting environment, except for the establishment of dense S-WiNet base stations on the continent to support, there are almost no other new methods, which has a very big limitation on the use of UAVs, so that the use environment of unmanned attack aircraft must be based on land-based wireless transmission systems.
In fact, the environment in which unmanned attack aircraft are used is the most useful in the airspace over the overseas ocean or in unfamiliar areas, and in these operational environments where it is almost impossible to increase the number of fighters to make up for the intensity of the attack, the unmanned attack aircraft can maintain almost 24-hour uninterrupted sorties, so that the same number of unmanned attack aircraft, compared with manned attack aircraft, the number of sorties is several times more, which is equivalent to increasing the air strike force several times.
As far as aircraft carriers undertaking ocean operations are concerned, under the condition that the number of carrier-based aircraft is limited, the air attack force of an aircraft carrier group can be greatly enhanced by making carrier-based attack aircraft unmanned, which is equivalent to increasing the combat power by several times.
Therefore, although the work of the DSM research team has made a big breakthrough, it is still some distance from the requirements of the military, so when they have nothing to do, they elevate this thorny problem to Duke's hands.
This is the most important technical hurdle for unmanned attack aircraft at the moment, and after carefully analyzing the current system problem, Duke found that the key bottleneck was that the wireless network transmission speed could not keep up with the amount of data exchanged by existing applications, so Duke focused on minimizing the data exchange in between.
The need to maintain near-real-time feedback on the one hand, and to reduce the amount of intermediate data exchange on the other, is a contradiction in itself for this supercomputer-like distributed computing architecture, so DSM scientists racked their brains to achieve only partial improvements, but not fundamental changes. In this parallel distributed operation, each connected node must maintain a certain amount of data traffic in order to complete the entire computing task.
Therefore, Duke reconstructed this distributed computing architecture, transforming the parallel distributed operation into a hierarchical parallel distributed operation, that is, the unmanned attack machine maintains a network connection with a limited number of proxy distributed node machines, continuously distributes the computing tasks, and collects the computing results of the distributed nodes, and most of the computing tasks are redistributed by these proxy distributed nodes to more distributed computing nodes, forming a network relationship similar to that between the general agent and the subcontractor. As a result, the external communication bandwidth requirements of the unmanned attack aircraft are immediately reduced by N times, which is equivalent to the original parallel distribution operation to communicate with thousands of distributed nodes, but now it is only with a limited number of them.
This new architecture is undoubtedly a revolutionary breakthrough, and DSM scientists have not thought of this way at the beginning, but they can't summarize the computing tasks of unmanned attack aircraft into a limited number of computing tasks after Kerry's massive simulation operations are classified and summarized like Duke, and then greatly improve the prediction time accuracy of each decomposition operation task on different computing devices, so that the computing tasks decomposed into this distributed network can effectively return the results accurately according to the prediction allocation time.
This ensures that the entire computing task has the fastest possible completion.
Although theoretically, there is nothing difficult to understand in this way, but this kind of need to evaluate the computing power of the entire combat network computing equipment in advance, and then fully consider this when dividing the UAV task, so that the assignment of tasks has an extremely high degree of matching with the distributed nodes, and this algorithm is by no means possible for ordinary people to complete.
Fortunately, Kerry has a natural advantage in this way of calculation, so that Duke can rely on Kerry to complete this extremely intelligent and unique allocation algorithm.
After tossing and turning this problem, Duke knew that with the existing computer theory research foundation on the earth and the computing power of the airborne computer system, the US military's unmanned attack aircraft should not be more intelligent than the system developed by itself, so in terms of intelligent warfare, the system developed by itself will definitely outperform the system developed by the US military.
From this point of view, the US military's unmanned attack aircraft lacks a congenital level of intelligence, and there are still obvious defects compared with manned fighters, so the US military should focus on carrying out ground-to-sea attacks rather than using them to conduct air combat to gain air superiority, that is to say, the US military's F/U-47 "Demon" unmanned fighter is unlikely to replace the US military's manned fighters.
Duke told Qin Tairan about this conjecture conclusion, and after Qin Tairan reported Duke's speculation to the intelligence department of the General Staff Headquarters, after intelligence excavation by the Intelligence Bureau of the General Staff and the National Security Secret Agency, he basically verified the deployment plan of the US military's F/U-47 "Demon" unmanned fighters, mainly on the aircraft carrier aircraft wing, and according to the top secret plan within the US military, each aircraft carrier's carrier-based aircraft wing will be equipped with a squadron of F/U-47 "Demon" unmanned fighters.
This information indirectly provided strong corroboration for Duke's speculation, which made the leaders of the Central Military Commission finally feel a little relieved, because in the face of this brand-new fighter of the US military, it is difficult for the intelligence bureau of the General Staff to judge what its combat effectiveness is, after all, this new fighter has never appeared on the battlefield, but has only frequently appeared on test flight occasions in the past ten years or so.
It is only in view of the fact that the main fighters launched by the US military in the past few decades have strong combat power, from the F-15/F-16/F-22/F-35 land-based fighters to the F-18/F-35B series of carrier-based aircraft, their combat power is obviously superior to the fighters of other countries in the world developed at the same time, so that the military personnel will regard the combat power of the new F/U-47 fighter of the US military as a step higher.
However, since it is basically judged that this is a sea-to-ground attack aircraft, the psychological pressure on everyone is much less, after all, no pilot is willing to fight hard with the same cold machine, just as no pilot is willing to go head-to-head with the opponent's missiles.
However, the new intelligent attack system that has been modified by Duke is completely different, using air early warning aircraft, wing dragon UAVs and aircraft carrier formations to form a combat airspace with a radius of thousands of kilometers, and using super small aircraft clusters on aircraft carriers and large destroyers and frigates in formations, it is completely possible to make the X-1 unmanned attack aircraft now developed by DSM have the ability to compete for air superiority, making the X-1 unmanned attack aircraft more comprehensive.
In other words, in the fifth generation of unmanned attack aircraft, the X-1 unmanned fighter will surpass the US military's F/U-47 and become the world leader.
When the X-1 unmanned fighter is installed with a new super-intelligent distributed attack system, after actual verification, it is confirmed that the new system improved by Duke can really improve the level of intelligent combat by an order of magnitude with the cooperation of the ground super small machine cluster, although the tactical creativity of air combat is weaker than manned, but with the help of super maneuverability far beyond the manned fighter, the X-1 has the upper hand in the confrontation with the J-20.
When the secret base in the depths of the Gobi completed this experimental confrontation, Vice Chairman Liu, who heard the news, personally wrote down the four big characters of "Zhenguo Artifact" for this new model. Indeed, although the J-10D/J-11D of Ssangyong is basically the pinnacle of three and a half generations of models, and even surpasses the level of the latest model of the US F-15, it is a model that the US military has stopped developing after decades of development, and it is nothing at all.
But the X-1 unmanned fighter is different, the US military's similar model F\ / U-47 has just been finalized and has not yet joined the active service, and now our prototype has surpassed them, indicating that in the fifth generation fighter, we have proudly climbed to the top of the world. This is the real historic breakthrough.
Although the use of X-1 unmanned fighters has strong limitations, it needs to have sufficient computing power in the combat airspace and network support, not can be lifted into the air anytime and anywhere, but these are not big problems, for the originally weak PLA aircraft carrier formation, X-1 unmanned fighter is almost a perfect fighter, because the aircraft carrier formation itself has extremely powerful computing power, huge hull and nuclear-powered aircraft carriers and large destroyers, It can be equipped with a super small machine cluster with strong computing power to support the combat needs of X-1 unmanned fighters.