Chapter 508: Reliable weapons are most important

Style: Historical Author: Zhi Tian GeWords: 2067Update Time: 24/01/18 08:07:02
Bang bang bang... After a burst of warm applause, many guests on the podium could not contain their excitement and began to discuss one after another.

Prince Maiha turned to Wu Hao and asked with a smile: "Wu, can this drone be equipped to the security forces to deal with some special crisis situations?"

Wu Hao naturally knew what Prince Maiha meant by the special crisis situation, so he smiled and nodded: "This is a complete patrol security system. Users can change the related usage according to their own needs. Theory It can be used to deal with some special crisis situations, including chasing armed elements."

"The capture net alone is not enough. If the ground personnel do not arrive in time, the captured people are likely to escape from the net immediately and attack these drones or escape." Sitting on the other side of Wu Hao General Abu spoke at the right time.

Haha, Wu Hao smiled and replied: "This demonstration is a public demonstration. Limited by the venue and the audience, it is impossible for us to display all its functions, let alone equip it with weapons and equipment.

If that happens, I'm afraid that the next day the covers of major newspapers in the world will be full of criticism of us. "

After hearing his words, everyone present laughed. It’s true that some things don’t have to be said in public. This is just like those weapons and ammunition. The manufacturer will never publicly tell you how lethal this weapon is and how powerful its ammunition is.

Even if they did, they would only talk about how thick the armor can be destroyed by these weapons and equipment, and how large the explosion damage range is. They will not talk about how many living forces these weapons and equipment can kill, etc.

After laughing, Wu Hao continued: "The capture net launched by the drone in the demonstration just now is just a general capture net, and it mainly targets some ordinary targets that do not require the use of too much force.

If necessary, we can equip it with other stronger and more binding nets.

For example, there is a special kind of catching net that is so strong that ordinary knives can't cut it continuously, and there are many barbs on this net.

These barbs can not only hook these nets, making it impossible for the captured people to untie and escape. It will also hook the captured person's clothes and flesh, making them afraid to move because of pain.

In addition, a soft grid can also be used, which will shock the target after capturing it, causing its body to become paralyzed or even faint and lose its ability to resist.

Of course, this is just the most conventional disposal method. Users can install relevant weapons and equipment on the drone according to their own needs, such as tear gas, guns and even grenades. "

"How about the security? Can it identify the target and attack independently?" Mr. Suha, wearing glasses and a suit, couldn't help but ask. Compared with those military representatives, he was most concerned about safety issues. This kind of drone is very advanced, but if it is too advanced, it will be a disaster if it is out of human control.

As soon as they heard Mr. Suha's words, everyone calmed down and looked at Wu Hao, waiting for his answer. No matter what kind of weapon it is, the most important thing is that it is absolutely reliable and safe and cannot escape human control, otherwise it will not be a good weapon. Don't kill your own people first if you haven't killed the enemy yet.

Facing the gazes of everyone, Wu Hao nodded with a smile and said: "Don't worry, our system and drone are absolutely safe and reliable. The command to launch the attack just now was actually issued by our background controller, and the drone There is no automatic attack permission.

The highest authority of our intelligent unmanned patrol security system is human control, and the system cannot violate human control orders.

The drone will attack only after the controller in the rear command and control center issues relevant attack instructions. Moreover, during the attack process, the controller can also revoke the attack command at any time to prevent unexpected situations from happening. "

"So what if the command and control system is attacked by a network? Will hackers use these weapons to turn around and attack us?" Suha asked Wu Hao again. It can be seen that he has no idea about this set of intelligent unmanned aerial vehicles. Patrolling security systems and aerial patrol warning drones have caused great concern.

Regarding Su Ha's words, Wu Hao smiled slightly and asked: "Is it because we are afraid of being attacked by the Internet that we don't use computers?

Nowadays, the armies of various countries are equipped with a large number of drones. Could it be that because we are afraid of being invaded, these drones are not suitable for us?

I cannot guarantee that this set of intelligent unmanned patrol security systems and aerial patrol warning drones will not be attacked and invaded by enemy hackers during future use. I cannot predict the future.

However, we use a self-developed system kernel and related firewalls in this system. Basically, it is difficult for hackers to attack and intrude.

And as I just said, the highest authority in our system is manual control. If an intrusion is discovered during use in the future, the entire system can be shut down manually. Then perform a forced shutdown and restart so that it can return to normal. Of course, users can organize relevant computing personnel to upgrade their firewalls to plug loopholes, or they can ask us for help. We will provide customers with high-quality after-sales services. "

After hearing his words, everyone nodded. It is true that no matter what electronic product it is, there is a possibility of being hacked. Is it because we are afraid of being hacked and invaded, so we have to return to primitive society?

"What about anti-interference?" General Abu asked. As a soldier, he still looked at this issue from a military perspective. Compared with hacker attacks, he is more interested in whether the drone and system can have certain anti-interference performance, which is more important in actual deployment and use.

"The design is optimized specifically for this aspect and has strong anti-electromagnetic interference capabilities." Wu Hao replied with a smile.

"And in response to this situation, we have also set up a complete set of response mechanisms. For example, if a drone on patrol is strongly interfered and loses contact, the system will automatically send several nearby drones or supplementary support from the past few drones. A drone is conducting a blanket search for the area where the missing drone was last seen.

On the one hand, it is to prepare for possible targeted invasion and infiltration operations by the enemy. On the other hand, it is also to think about the missing drone and find related reasons.

Of course, the system will also promptly notify the personnel on duty at the rear command and control center. The personnel on duty can direct nearby patrol teams to go to the relevant accident site to find out the cause, etc. "

Shukeju reading website: