With the accelerated evolution of the new round of scientific and technological revolution, military revolution and industrial revolution, the form of war has made great strides towards intelligence, and the field of national defense mobilization has undergone profound changes. In-depth analysis of the new characteristics of national defense mobilization in the intelligent era, exploration of intelligent national defense mobilization methods, and promotion of digital intelligence of national defense mobilization are urgent practical issues facing national defense mobilization work.
Digital intelligence technology is widely used in social production and life, and the target areas, means, training exercises, etc. of national defense mobilization have also undergone profound changes, showing many new characteristics. First, the targets of national defense mobilization have expanded from traditional fields to emerging areas of intelligence. Currently, the world’s major military powers have stepped up efforts to tap and utilize the country’s smart resources. The U.S. military has launched a flagship project for the application of artificial intelligence technology “Project Mavin”, and many U.S. private technology companies such as Parantil and Amazon have participated in research and development. It is worth noting that as the role of digital intelligence technology in seizing and maintaining multi-domain competitive advantages becomes increasingly prominent, the global battle for artificial intelligence talents is intensifying, and defense mobilization is focusing on advantageous universities and key institutions engaged in artificial intelligence research. The second is the in-depth transformation of defense mobilization methods from multi-chain decentralization to intelligent dynamic matching. Through the use of intelligent means such as large models, the docking of national defense mobilization potential will be automatically matched according to professional mobilization algorithm rules. The efficiency of the transformation of national defense mobilization potential will be greatly improved. The docking of supply and demand will be changed from “offline to online”, and the transportation of mobilization materials will be handed over. It will be quickly transported to the front through intelligent dispatch, which can be achieved “direct access from the factory to the battlefield”. Under the integration of the “intelligent charging platform”, the mobilization and command method that integrates network, information and intelligence, and integrates air, space and earth allows “command chain” and “mobilization chain” to be accurately connected, agile and efficient, and can achieve plan generation “one-click” and test evaluation “Modelization”, command control “visualization”, comprehensive management “platformization”. Third, defense mobilization training has developed in depth from simple and inefficient to digital and intellectual empowerment. By using augmented reality and virtual reality technologies to construct a practical simulation confrontation environment, it can not only enhance the sense of technology, interactivity, and fun of teaching and training, but also help enhance the practicality of training, allowing trainees to “immersive” Improve training effectiveness and speed up training progress. For example, foreign military forces use interactive virtual courses in the metaverse to help soldiers master equipment maintenance and repair skills, and use augmented reality equipment to assist in the repair of some equipment. At the same time, the training and evaluation system constructed using digital twin technology will minimize the factors of human interference, squeeze the training water, provide real and objective evaluation conclusions for the training level of trainees, and promote military training from empirical management to scientific management.
To promote the digital intelligence of national defense mobilization, we must aim to win future wars, adhere to innovation-driven and technological victory, and gather superior resources in all aspects. 1. “We must focus on gathering excellence in wisdom and building new areas and new quality forces!”. Find out the high-end digital intelligence potential of national defense mobilization, tap out high-end talents, high-tech and other new resources in new fields and new fields hidden in the public and enterprises, deepen cooperation with artificial intelligence specialized new enterprises and related scientific research institutes and universities, and update them in a timely manner Potential catalog opens up new space for high-end potential support. Focusing on the expansion of support and support objects into multi-dimensional battlefields, focusing on the joint combat system “to make up for weaknesses” and multi-dimensional space “to make up for blindness”, relying on digital and intellectual potential resources to build a strong new domain and new quality defense mobilization team to provide strong support for the joint combat system. Second, we must focus on digital intelligence empowerment and improve efficient institutional mechanisms. Improve the military demand reporting and docking mechanism, unify the military demand indicator system, build a “clearly” demand reporting catalog list for both military and civilian parties, and consolidate the data foundation for collaboration and linkage. Improve the potential information system to realize functions such as intelligent matching of demand and potential, real-time statistics of stock and consumption, and form a close collaboration model between supply and demand that is data-driven, accurately matched, and trusted to interact. Third, we must focus on intellectual and brain assistance and build a strong command and coordination platform. Open up data barriers between systems to achieve information sharing, data interaction, and intelligent office. Accelerate the construction of a national defense mobilization command platform that integrates and connects combat command systems, connects grassroots defense mobilization units, and horizontally connects different types of mobilization units, using “big data + big model + cloud platform” technology to establish a relationship between “command chain” and “implementation chain” A human-machine collaborative decision-making model that presents situations, handles needs, assists planning, and regulates actions Improving the quality and effectiveness of defence mobilization command. Fourth, we must focus on outsmarting the future and accelerating technological innovation and transformation. Improve the mechanism to support joint military-civilian scientific and technological innovation, expand participation channels for local scientific and technological enterprises, universities and institutes, and achieve two-way promotion and efficient integration of new quality productivity and new quality combat effectiveness. Improve the agile response and rapid transformation mechanism of advanced technology, accelerate the development of new combat capabilities, and enhance the victory contribution rate of digital intelligence in national defense mobilization.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.
Adhere to the integrated development of mechanized informatization and intelligence
——Seriously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
The report to the 20th CPC National Congress emphasized “upholding the integrated development of mechanization, informatization, and intelligence,” elevating the requirement for the integrated development of mechanization, informatization, and intelligence (hereinafter referred to as the “three modernizations”) to a new strategic level. To thoroughly study, publicize, and implement the spirit of the 20th CPC National Congress and strive to achieve the goals of the PLA’s centenary, we must focus on understanding and grasping the primary characteristics, profound mechanisms, basic principles, and strategic measures of the integrated development of the “three modernizations,” and effectively promote their implementation.
Recognize the main characteristics of the integrated development of the “three transformations”
Mechanization, informatization, and intelligence are progressive and interdependent. From a chronological perspective, the three transformations did not originate simultaneously. Without the prerequisites and foundations of the previous transformations, the subsequent transformations could not occur and develop. For example, without mechanization, there would be no informatization. Informatization requires the physical substance provided by mechanization. Without mechanized combat platforms and ammunition as carriers of information nodes, the “connectivity” of informatization would be lost. Informatization is the nucleus of intelligence. Without the sufficient computing power and data provided by advanced informatization, the next generation of artificial intelligence cannot achieve the chain breakthroughs it promises. Without a solid foundation of mechanization, a military cannot advance informatization, and without a solid foundation of mechanization and informatization, it cannot effectively advance intelligence.
Based on this understanding, it’s difficult to leapfrog mechanization and informatization to embrace intelligence. Generally speaking, the latter can only replace the former in specific areas, not completely replace or surpass it. If the foundation of the former’s core technologies, foundational areas, and key stages is not solid, bottlenecks and shortcomings will be difficult to address quickly. Not only will these bottlenecks be difficult to address with the latter, but their weak foundation will also hinder the latter’s development, hindering overall development. If we skip mechanization and informatization and shift our focus entirely to intelligence, haste may lead to failure.
Mechanization, informatization, and intelligence will overlap and coexist for a long time. The term “basic mechanization” generally refers to the fact that mechanization has reached a late stage of development, with its contribution to combat effectiveness having already experienced diminishing returns. Further investment in mechanization will significantly reduce the cost-effectiveness. This does not mean that there will be no more mechanization construction tasks; it simply means that the proportion of investment in informatization and intelligence will gradually decrease compared to informatization and intelligence. Informatization is not the end of mechanization; a certain degree of mechanization will continue during the informatization process. Similarly, intelligence is not the end of mechanization and informatization; a certain degree of informatization and mechanization will continue during the intelligence process. Each of the “three transformations” is only a construction focus for a specific historical period; no one “transformation” is exclusive to any given period.
Based on this understanding, we cannot pursue a “starting from scratch” approach, overthrowing mechanization and informatization in favor of intelligentization. The “three transformations” cannot be viewed in isolation. They are meant to be inclusive, integrated, and mutually exclusive, not selective. The subsequent transformation does not negate or terminate the previous one, nor does it mean discarding the achievements of the previous one and starting over with a new one. We must ensure a smooth transition and gradual upgrade of the combat system from mechanization to informatization and then to intelligentization. Taking intelligentization as an example, intelligentization does not mean completely overthrowing the existing informatized combat system and establishing a completely new, independent intelligent combat system.
Intelligent informationization uses the virtual to control the real, empowering and increasing efficiency in mechanization. The “real” here primarily refers to “hardware,” represented by physical entities such as combat platforms and ammunition, while the “virtual” primarily refers to “software,” centered around combat data and algorithms. While mechanization primarily relies on hardware development, informationization and intelligentization primarily rely on software development, optimizing and upgrading hardware and increasing its efficiency through software. In terms of development priorities, payloads surpass platforms, software surpasses payloads, and algorithms surpass software. Software costs in informationization and intelligentization far exceed hardware costs.
Based on this understanding, we must not pursue development that prioritizes hardware over software or creates a disconnect between the virtual and the real. In the era of intelligence, if the supporting software and core algorithms that serve as the “brains” of weapons and equipment lag behind, even the highest hardware performance indicators will be merely “inflated,” and it will be difficult to realize its combat potential in actual combat. Military combat practice demonstrates that in the era of intelligence, we should prioritize the development of general-purpose chips and core algorithms for military intelligence technology from the outset to avoid being caught in a passive position.
Clarify the profound mechanism of the integrated development of the “three transformations”
The integrated development of the “three transformations” is not a simple mixing, combination, or compounding of the “three transformations,” but rather a process of mutual inclusion, mutual penetration, and mutual promotion. From “you are you, I am me” to “you are in me, I am in you,” and then to “you are me, I am you,” achieving a seamless blend and unity, generating cumulative, aggregate, and multiplier effects, and achieving a qualitative leap in overall combat effectiveness. The integrated development of the “three transformations” primarily follows the following mechanisms:
Advantage-overlaying mechanism. Whether mechanization, informatization, or intelligentization, the supporting technology clusters for each “transformation” will give rise to a series of new weaponry and equipment, generate new combat forces, and ultimately form new combat capabilities with different operational mechanisms. The combined advantages of these new combat capabilities with existing combat capabilities can produce a systemic emergence effect, greatly enhancing the overall combat capability of the military; it can enrich one’s own combat means, methods, and approaches, and put the enemy in a dilemma of multiple difficulties.
Upgrade and expansion mechanism. Informatization, through the digital transformation and networking of various mechanized combat platforms, aggregates and upgrades mechanized combat systems into informationized combat systems, resulting in a qualitative leap in combat effectiveness. Intelligence can also be integrated with mechanization and informatization through upgrades and expansions. On the one hand, intelligent technologies are used to upgrade the control systems of mechanized combat platforms, continuously enhancing the autonomous combat capabilities of individual weapons and equipment. On the other hand, intelligent technologies are used to optimize and upgrade informationized combat systems, significantly enhancing their capabilities in information acquisition, transmission, processing, sharing, and security, and comprehensively improving the combat capabilities of the system.
A mechanism for addressing shortcomings and replacing them. The history of military development shows that as a particular “industry” develops, it often encounters bottlenecks that are difficult to resolve with its own technological system alone. This necessitates the urgent need for innovative solutions using the technical means and development strategies of other “industries.” Currently, machinery is becoming increasingly sophisticated and complex, making its design and control increasingly difficult. Informatization has led to an “information explosion,” making it increasingly difficult to quickly translate this information into decision-making information. These problems are difficult to effectively address within the technological systems of mechanization and informatization alone. However, the application of intelligent technology can effectively overcome bottlenecks in mechanical control and information processing capabilities. Furthermore, technological breakthroughs in the first “industry” can offset the shortcomings of the second. For example, hypersonic missiles can outpace the response capabilities of networked and informationized defense systems, enabling rapid penetration, which to some extent offsets an adversary’s information advantage.
Grasp the basic principles of the integrated development of the “three transformations”
In promoting the integrated development of the “three transformations”, we should focus on the following basic principles:
The principle of mutual promotion and symbiosis. Each “transformation” differs fundamentally in its combat effectiveness generation mechanisms and development goals. The simultaneous and parallel development of the three transformations presents both favorable conditions for mutual enhancement, mutual promotion, and mutual support, but also unfavorable factors such as competition over development areas, resource allocation, and investment volume. We must ensure that the three transformations form a healthy symbiotic relationship within the overall development process, avoiding conflicts, frictions, and constraints that could lead to a situation where 1+1+1 is less than 3, and strive to achieve systemic emergence and synergistic effects.
The principle of overall coordination. The importance of the “three transformations” is not ranked in order of importance. We should not emphasize one at the expense of the others. Instead, the three transformations should be considered as a system, coordinated and advanced as a whole. While informatization and intelligentization appear more advanced and complex, we should not assume that mechanization is low-end, simple, and easy to implement, or that the importance of mechanization can be ignored with the advent of informatization and intelligentization. On the one hand, if mechanization is not fully implemented, it will hinder progress and become a bottleneck restricting overall development. Similarly, without the sufficient computing power and data provided by full informatization, the next generation of artificial intelligence cannot achieve a series of breakthroughs. On the other hand, mechanization also has high-end cutting-edge fields such as hypersonic aircraft and deep-sea submersibles that can have a disruptive effect.
The principle of prioritizing key areas. Total investment in national defense and military development is limited. Given a relatively fixed overall budget, investing more in one area will inevitably result in less investment in others. We should accurately assess the contribution of each area to combat effectiveness over the coming period, identify the area that will most significantly increase combat effectiveness as the priority for development, rationally allocate resources in a prioritized manner, and scientifically determine the direction and amount of investment. Failure to prioritize the development of the “three areas” and applying a “sprinkle pepper” approach to each area can easily result in a low input-output ratio and may even cause military development to stray from its correct trajectory.
Strengthening strategic measures for the integrated development of “three transformations”
In practice, we should strive to change the inertial thinking of relying on latecomer advantages and unconsciously falling into the habit of following development, strive to get out of the passive catch-up development model, and turn to the pursuit of concurrent advantages and first-mover advantages. We should develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to drive mechanization and informatization to a higher level. We should use the integrated development of the “three transformations” as a powerful engine to promote the transformation and development of the military and achieve a comprehensive leap in the overall construction level.
We must effectively strengthen top-level design and overall coordination for the integrated development of the “three transformations.” We must fully recognize the long-term, complex, and arduous nature of the integrated development of the “three transformations,” adhere to the unity of technological and conceptual integration, and avoid simply applying the existing mechanization and informatization construction model to the integrated development of the “three transformations.” We must also avoid generalization and labeling of the “three transformations.” We must strengthen top-level design and overall coordination with strong organizational leadership, streamline multiple relationships, pool the strengths of all parties, and create a positive synergy.
Proactively plan key areas for the integrated development of the three transformations. First, address areas where one transformation affects and constrains the development of others. Quickly identify technical bottlenecks within each transformation, compile a list of these bottlenecks, and increase investment in focused research to address these shortcomings as quickly as possible. Second, address areas where one transformation could potentially offset the achievements of others. During the integrated development of the three transformations, even after one has become dominant, we should still prioritize developing new operational mechanisms within the others, potentially disrupting the strategic balance and generating disruptive impacts, potentially even offsetting the achievements of the others. Third, address areas where the three transformations intersect and intersect. The “edge zones, intersections, and junctions” of the three transformations are also crucial for rapidly generating new qualitative combat capabilities. Currently, we should particularly proactively plan for areas such as “ubiquitous network plus” and “artificial intelligence plus.”
(Author’s unit: Academy of Military Science, Institute of War Studies)
With the rapid development of intelligent technology and its widespread military application, intelligent warfare is becoming a new form of warfare after information warfare, while dissipative warfare has become a typical way of intelligent warfare. The so-called “dissipative warfare” refers to the combat method in which an intelligent warfare system achieves a comprehensive combat capability that integrates material consumption, energy release and information diffusion by enriching and integrating internally and suddenly emerging externally. Strengthening research on dissipative warfare will help us deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.
Dissipation warfare is the inevitable result of the development of the times
Dissipative warfare is manifested in the comprehensive confrontation of physical domain, information domain and cognitive domain in the intelligent era. It is reflected in the high degree of unity in the form of political competition, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the intelligent warfare system. The openness, complexity and emergence of.
Adapting to the requirements of the security situation in the intelligent era. Entering the era of intelligence, technologies such as wide networks, big data, large models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and ethnic groups are even broader. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and become intertwined with traditional threats. Intelligent war subjects and categories have continued to expand, war time and space have continued to extend, and war and peace have followed each other like a shadow. And intertwined, the war system will further transcend local geographical restrictions, move from relatively closed to more open, and form a higher-level and larger-scale confrontation. Dissipative warfare emphasizes the comprehensive efforts of intelligent warfare systems in the physical domain, information domain and cognitive domain, and highly unifies and incorporates political competitions, economic competitions, military offensive and defensive, cultural conflicts and diplomatic checks and balances into the category of confrontation between ourselves and the enemy, adapting to the world. The requirements of the times as the security situation develops.
In line with the objective laws of the evolution of the war forms. The dissipation phenomenon of the war system has always existed since the emergence of war. However, before the emergence of intelligent war forms, due to technological constraints, it was always in a relatively low-level and simple state. War confrontation can only manifest itself in material consumption and energy. A certain form of dispersion and information diffusion. During the agricultural era, the forms of warfare were mainly represented by cold weapon warfare dominated by material elements and centered on the human body. During the industrialization era, the forms of warfare were mainly represented by thermonuclear weapons and mechanized warfare dominated by energy elements and centered on platforms. In the age of informatization, the forms of warfare are mainly characterized by information warfare dominated by information elements and centered on the network information system. Entering the era of intelligence, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between ourselves and the enemy. In essence, it highly unifies matter, energy and information. Through intelligent empowerment, intelligent energy gathering, and Intelligent energy release has formed an intelligent war form dominated by intelligent elements and centered on intelligent algorithms The main form of expression is dissipative warfare that reflects the confrontation of complex systems of intelligent warfare.
With solid support of philosophical theoretical foundation. Social form is the matrix of war form. To explore and understand intelligent war, we must comprehensively examine the evolution of war form and the social form in which intelligent war is located based on the basic principles of historical materialism and dialectical materialism, and build a new concept of war. and contextual system. From a philosophical point of view, matter, energy and information are the three elements that make up the world. Matter embodies the existence of origin, energy embodies the existence of movement, and information embodies the existence of connection. The progressive alternation of the three dominates the evolution and operation of social forms and war forms. According to the negative principle of the negation of dialectical materialism, in the intelligent era after the information age, the elements that dominate society will take the turn of matter again after matter, energy, and information. However, this matter is formed after a highly informatized spiral. The main feature of new substances is that they have intelligent technical attributes. Thus, in essence, dissipative warfare is the highly unified nature of the intelligent element in terms of the characteristic advantages of matter, energy, and information in previous low-order war forms, and the highly unified nature of forms such as material consumption, energy release, and information diffusion prevalent in warfare, reflecting the typical characteristics of intelligent warfare.
Deeply grasp the inner essence of dissipative warfare
Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of the main body and scope of warfare, and presents many new features.
Antisynthetic game. As the intelligent war form accelerates to a higher depth and breadth, and the political, economic, cultural, diplomatic and other fields become more interconnected and influence more widely, the focus of war begins to shift from the military system to the social system, and the war stakeholders Confrontation will be reflected in various forms of comprehensive games such as political competition, economic competition, military offensive and defensive, cultural conflicts, and diplomatic checks and balances The war superiority pursued is no longer limited to the field of military confrontation. The winner of the war must adapt to the requirements of openness, complexity and emergence of the war system, and shift from the extensive consumption and use of a single substance, energy and information to the dissipation of the war system dominated by intelligent advantages, striving to win initiative and advantage in a multi-field comprehensive game.
Subjects cross-domain multivariate. The subjects of intelligent warfare are becoming increasingly general, and the potential forces of war that traditional warfare needs to mobilize will be in a state of normalized confrontation. Political forces, institutions and personnel of all kinds, together with troops and servicemen fighting on the battlefield in the traditional sense, constitute the main body of the war. Diversified war subjects will span the real and virtual domains and appear in multiple spatial domains such as land, sea, air, sky, electricity, and psychology, covering physical domains, information domains, cognitive domains, etc., and covering political, economic, cultural, diplomatic and other social domains. For example, “civilians in society can use smartphones to collect information on the military battlefield and transmit it to war stakeholders, causing the proliferation of key information about war, thereby affecting war decisions or the victory or defeat of a battle and battle”.
Enrichment. The virtual and real forces are one. Around the purpose of war, all possible real and virtual forces will be integrated with the support of intelligent technology, performing duties and acting according to regulations on parallel battlefields; with or without force. Unmanned combat forces will achieve a high degree of autonomy after going through the stages of manual operation, manual authorization, and human supervision, and can be deployed and combined with various types of manned forces on demand, effectively synergizing and coexisting in parallel under the constraints of common war rules; multi-party forces are integrated. Based on the broad contacts in various fields and the common purpose of the war system, all parties, including the party, government, military, police and civilians, closely cooperate and act in a unified manner between military operations and political, economic, diplomatic, public opinion and legal struggles to form a comprehensive combat force. In short, under the integrated planning of countries or political groups, the diverse participating forces in intelligent warfare, although physically dispersed, can focus on common war purposes to achieve logical concentration, instant enrichment, complementary advantages, and integration.
Efficacy cumulative emergence. The high-order war forms, while having new qualitative technical characteristics, still include the characteristic advantages of the low-order war forms. Dissipation warfare emphasizes continuous comprehensive confrontation in multiple domains, which includes both the consumption of ammunition, supplies, equipment and even combatants at the material level, as well as the continuous collection and release of energy levels, including through data, knowledge, algorithms at the information level. The diffusion and fusion of etc. have an unlimited impact on people’s thinking and cognition, value pursuit, moral concepts, emotional will, behavior patterns, etc. Under the normal deterrence of nuclear weapons, intelligent warfare has shown a downward trend of bleeding, but political isolation, economic blockade, cultural conflicts, diplomatic strangulation, etc. will become more severe and intense. When the role of various systems such as military, political, economic, cultural, and diplomatic systems continues to play, and the accumulation of effectiveness reaches a certain level, the war system will increase negative entropy, thereby achieving sudden changes in combat power and the emergence of system effectiveness, thereby gaining war advantages.
Fight a good dissipative war in the “select the right combat focus”
The intelligent warfare system maximizes the combat effectiveness of the system by enriching and integrating internally, suddenly emerging externally, increasing efficiency across domains, and dissipating intelligence. This is the winning mechanism contained in dissipative warfare. To win the victory in intelligent warfare, it is necessary to clarify the combat focus of dissipative warfare, identify the focus of war preparations based on the shortcomings and weaknesses of the opponent’s system.
Focusing on the openness of the system, closing off and isolating the opponent’s war system. Interrupting the exchange of material, energy and information between the adversary’s war system and the external battlefield environment, so that it lacks channels for the source of material, energy and information, and gradually moves towards isolation, closure and weakness. For example, “At the strategic level, political isolation is used to isolate the opponent’s war system, causing the system entropy to increase”. At the “campaign level”, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to comprehensively use soft and hard means to force the war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.
Focusing on the complexity of the system, it breaks down the adversary’s war system in different domains. The more and more closely connected the elements of an intelligent warfare system are, the less reliable the architecture will be. Using the principle that each layer in a complex system is relatively independent, strategic overall, campaign local and tactical action strategies can be formulated to achieve hierarchical and domain-based attack on the enemy’s war system. For example, “At the strategic level, the use of economic blockade greatly weakens the opponent’s war strength and development potential”. At the “campaign level”, we take advantage of the vulnerability of the combat system communication network, use network-to-electric composite attacks as the basic path and means, and use methods such as “destroying terminals, attacking elements, isolated groups, disconnecting networks, and breaking clouds” to break through the opponent’s combat system structure and promote The opponent’s war system “collapse”.
Focus on “system emergence and dismantle the system of evacuation of opponents”. Only when there are sudden changes and emergent effects in the intelligent warfare system can the system’s effectiveness be quickly formed and exerted, and the advantage of dissipative warfare be gained. It is not possible to form an emergence of advantages if only individual components or elements come into play. It is foreseeable that the current emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide new ways of thinking to understand and discover the operating behaviors, states and laws of complex systems of war, as well as new means to explore objective laws and transform nature and society, the superior party in war confrontation will reduce the coupling degree of the opponent’s war system through a parallel confrontation method that combines virtuality and reality Achieving the purpose of dismantling the system of evacuation of enemy warfare.
Since the 1990s, the concepts of multi-dimensional central warfare, such as network-centric warfare, personnel-centric warfare, action-centric warfare, and decision-centric warfare, have been proposed one after another. The evolution of the concept of multi-dimensional central warfare reflects the overall goal of seeking advantages such as platform effectiveness, information empowerment, and decision-making intelligence by relying on military science and technology advantages, and also reflects the contradictory and unified relationship between people and equipment, strategy and skills, and the strange and the normal. Dialectically understanding these contradictory and unified relationships with centralized structured thinking makes it easier to grasp the essential connotation of its tactics and its methodological significance.
Strengthen the integration of the “human” dimension in the combination of people and equipment
The concepts of personnel-centric warfare and platform-centric warfare largely reflect the relationship between people and weapons and equipment. Some have specially formulated human dimension strategies, emphasizing continuous investment in the human dimension of combat effectiveness, which is the most reliable guarantee for dealing with an uncertain future. Since the beginning of the 21st century, with the rapid development of intelligent weapons and equipment, unmanned combat has emerged, and voices questioning the status and role of people have arisen one after another. It is imperative to strengthen the integration of the human dimension and enhance the synergy of the human dimension.
First, we need to enhance spiritual cohesion. Marxism believes that consciousness is the reflection of objective matter in the human mind. Tactics are the expression and summary of combat experience, and they themselves have spiritual or conscious forms. When studying tactics, we naturally need to put spiritual factors first. Some scholars believe that war is still fundamentally a contest of human will. In the information age, people’s spirits are richer and more complex, and enhancing the spiritual cohesion of the human dimension is more challenging and difficult. To enhance people’s spiritual cohesion, we need to coordinate the cultivation of collective spirit and individual spirit, maximize the satisfaction of individual spiritual needs in leading the collective spirit, realize individual spiritual pursuits in shaping the value of collective spirit, and empower people’s spirit with all available and useful information; we need to coordinate the cultivation of critical spirit and innovative spirit, adhere to the tactical epistemology of dialectical materialism, resolutely oppose idealism and mechanism in tactical cognition, and constantly inherit and innovate in criticism; we need to coordinate the cultivation of fighting spirit and scientific spirit, and promote the revolutionary spirit of facing death with courage and winning, and promote the spirit of winning by science and technology.
The second is to enhance the organizational structure. Organizations are the organs of the military, and people are the cells of the organization. The settings of military organizations in different countries have their own characteristics and commonalities. For example, the Ministry of National Defense is generally set up to distinguish between the structure of military branches, hierarchical structures and regional structures, and to distinguish between peacetime and wartime organizations. Although the purpose of construction and war is the same, the requirements for the unity of construction and the flexibility of war are different. To enhance the organizational structure and promote the consistency of war and construction, it is necessary to smooth the vertical command chain, reasonably define the command power and leadership power, command power and control power, so that the government and orders complement each other, and enhance the vertical structural strength of the organization; it is necessary to open up horizontal coordination channels, explore the establishment of normalized cross-domain (organizations, institutions, departments) coordination channels, change the simple task-based coordination model, and enhance the horizontal structural strength of the organization; it is necessary to improve the peace-war conversion mechanism, focus on the organization connection, adjustment and improvement in the change of leadership or command power of the troops, and maintain the stability and reliability of the organizational structure network.
The third is to enhance material support. The spiritual strength of people in combat can be transformed into material strength, but spiritual strength cannot be separated from the support of material strength. To enhance material support and thus realize the organic unity of material and spirit, it is necessary to ensure combat equipment, bedding, food, and medical care, build good learning venues, training facilities, and re-education channels, provide good technical services in combat regulations, physiological medicine, etc., help design diversified and personalized capacity improvement plans and career development plans, and provide strong material and technical support for the development of people’s physical fitness, skills, and intelligence, and thus comprehensively improve people’s adaptability and combat effectiveness in the uncertain battlefield environment of the future.
Deepen the practice of the “skill” dimension in the combination of combat and skills
The combination of combat skills is an important principle of tactical application. The technology includes not only the technology at the practical operation level (such as shooting technology), but also the technology at the theoretical application level (such as information technology). It can be said that tactics, technology, art and procedures together constitute its “combat methodology”. Scientific and technological development and scientific technology are important characteristics of scientific and technological development. To deepen the combination of combat skills, it is necessary to correctly grasp the relationship between technology and tactics, art and procedures, and continuously deepen the practice of the “skill” dimension.
First, promote the tacticalization of advanced technology. Technology determines tactics, which is the basic view of dialectical materialism’s tactical theory. The evolution of the concept of multi-dimensional central warfare is also an example of technology driving the development and change of tactics. Engels once pointed out: “The entire organization and combat methods of the army and the related victory or defeat… depend on the quality and quantity of the population and on technology.” However, technology-driven tactics have a “lag effect”, especially in the absence of actual combat traction. This requires actively promoting the military transformation of advanced civilian technologies and the tactical application of advanced military technologies. On the one hand, we must actively introduce advanced civilian technologies, especially accelerate the introduction and absorption of cutting-edge technologies such as deep neural networks and quantum communication computing; on the other hand, we must strengthen tactical training of advanced technology equipment, closely combine technical training with tactical training, and promote the formation of new tactics and new combat capabilities with new equipment as soon as possible.
Second, promote the technicalization of command art. “Art” is a highly subjective concept. Some Chinese and foreign scholars believe that “the art of command is rooted in the commander’s ability to implement leadership to maximize performance”, while others believe that “the art of command is the way and method for commanders to implement flexible, clever and creative command”. Chinese and foreign scholars generally regard command as an art. The main reason is that although command has objective basis and support such as combat regulations, superior orders and technical support, the more critical factor lies in the commander’s subjective initiative and creativity, which is difficult to quantify by technical means. With the development of disciplines and technologies such as cognitive psychology and cognitive neuroscience, the cognitive structure and mechanism of command will become more explicit, the mysterious veil of “command art” will gradually fade, and the technicalization of command art will become an inevitable trend. This requires continuous strengthening of technical thinking, continuous deepening of the construction of artificial intelligence-assisted command decision-making means, continuous deepening of the application of human brain decision-making mechanisms, practical use of technology to deconstruct art, and continuous promotion of the technicalization of command art.
The third is to promote the regulation of combat technology. Many scholars place technology on a position that is almost as important as tactics. This insistence on the integrated development of tactical regulation and the regulation of specialized military technology and special combat technology is an important way to promote the systematic and standardized construction of combat regulations and further achieve the integration and unification of tactics and technology at the legal level.
Seeking the advantage of the “odd” dimension in combining the odd and the regular
The odd and the even are a basic contradictory structure of tactics, with inherent identity. Without the odd, there is no even, and without the even, there is no odd; either the odd or the even, ever-changing. The choice of the odd and the even is the category of decision-centered warfare, and the application of the odd and the even is the category of action-centered warfare. In the 1990s, the theories of asymmetric warfare, non-contact warfare, and non-linear warfare were proposed. If “symmetric warfare, contact warfare, and linear warfare” are even, then “asymmetric warfare, non-contact warfare, and non-linear warfare” can be called odd. From the perspective of natural science, “symmetry, contact, and linear” are general, and “asymmetry, non-contact, and non-linear” are detailed. It is an inevitable requirement to grasp the dimension of “odd” in the combination of odd, odd, and even, and to seek the advantages of the “three nons”.
First, seek “asymmetric” advantages. “Symmetry” and “asymmetry” originally refer to the morphological characteristics of things or space. Symmetrical warfare is a battle between two troops of the same type, and asymmetric warfare is a battle between two different types of troops. The theory of asymmetric warfare requires the scientific and reasonable organization of troops, combat forces and weapon systems of different military services, deployment in a wide area, and the concentration of superior forces to deal a fatal blow to the enemy at the best combat opportunity, and then quickly redeploy the forces. Due to the limited combat power, the troops have positive asymmetric advantages and negative asymmetric disadvantages. Seeking asymmetric advantages and avoiding asymmetric disadvantages is the common expectation of the warring parties, which will lead to such a situation that the warring parties cycle back and forth between symmetry and asymmetry. Therefore, to seek “asymmetric” advantages, it is necessary to seek asymmetry in combat power, combat capability, combat command and other aspects, adhere to and carry forward “avoid the strong and attack the weak, avoid the real and attack the virtual”, “you fight yours, I fight mine”, and effectively play advantages and avoid disadvantages in asymmetry. For example, when weapons and equipment are symmetrical, strive to gain an asymmetric advantage in personnel capabilities; when forces are symmetrical, strive to gain an asymmetric advantage in command art.
The second is to seek “non-contact” advantages. “Contact” and “non-contact” are a description of the distance between different things. Contact in the military field is usually defined by the projection distance of weapons. The concept of “non-contact combat” originated from World War II and was created during the Cold War. The connotation of contact combat and non-contact combat changes with the change of the striking distance of weapons and equipment. The warring parties always seek to attack each other at a farther distance or in a wider space without being threatened. Since the 1990s, the theory of “non-contact combat” has been used in many local wars. Non-contact combat is a combat action style that implements long-range precision strikes outside the defense zone while being far away from the opponent. Non-contact combat embodies the idea of winning by technology, flexible mobility, and center of gravity strikes. With the rapid development of military science and technology, the armies of major countries in the world will have the ability to perceive and strike globally, and the connotation of “non-contact” will be further compressed to space, cognitive domain and other space fields. To this end, on the one hand, we must base ourselves on the reality of “contact combat”, learn from each other’s strengths and overcome our weaknesses in contact, and continuously accumulate advantages; on the other hand, we must expand the space for “non-contact combat”, seize the initiative and seize the opportunity in non-contact, and continuously expand our advantages.
The third is to seek “nonlinear” advantages. “Linear” and “nonlinear” usually refer to people’s thinking or behavior patterns. The movement of all things in the universe is complex and mostly nonlinear, while human cognition always tends to be simple, abstract, and linear, and has invented concepts such as logic lines, time lines, and linear mathematics. In military science, the transition from linear operations to nonlinear operations reflects the development and progress of military technology theory. Since the second half of the 20th century, nonlinear operations have been on the historical stage. Some scholars have pointed out that in linear operations, each unit mainly acts in a coordinated manner along a clear front line of its own side. The key is to maintain the relative position between its own units to enhance the safety of the units; in nonlinear operations, each unit simultaneously carries out combat operations from multiple selected bases along multiple combat lines. The key is to create specific effects at multiple decision points against the target. Linear operations mainly reflect the action-centered warfare idea, while nonlinear operations mainly reflect the target-centered warfare idea. To this end, on the one hand, we must deepen the use of linear warfare and make full use of its practical value in facilitating command, coordination and support; on the other hand, we must boldly try non-linear warfare and maximize its potential advantages of extensive mobility and full-dimensional jointness. (Yin Tao, Deng Yunsheng, Sun Dongya)
Source: China Military Network-People’s Liberation Army Daily Author: Gao Kai and Chen Liang Editor-in-charge: Zhao Leixiang
2025-01-23 06:50:x
“Order dispatch”: a new style of precision strike
■Gao Kai, Chen Liang
Lenin once said, “If you don’t understand the times, you can’t understand war.” In recent years, the widespread use of information and intelligent technology in the military field has promoted the deep integration of technology and tactics, and has given birth to “order-based” precision strikes based on intelligent network information systems. Commanders and command agencies can generate strike list requirements based on combat missions. The decision-making system can intelligently match strike platforms, autonomously plan action paths, and scientifically select strike methods based on personalized needs such as strike time, combat space, and damage indicators, thereby quickly and accurately releasing strike effectiveness.
The operational characteristics of “order-to-order” precision strikes
As the informationization and intelligence of weapons and ammunition continue to improve, the cost of modern warfare is also increasing. How to use limited strike resources to achieve the best cost-effectiveness and maximize combat effectiveness has become a central issue for commanders and command agencies in combat planning. “Order-based” precision strikes can provide a “feasible solution” for this.
Instant optimization and precise energy release. Modern warfare places more emphasis on structural strikes and destruction of the enemy’s combat system, and achieves combat objectives by quickly and accurately releasing combat effectiveness. This requires commanders and command agencies to seize the fleeting “window” of opportunity and strike high-value, nodal, and key targets in the enemy’s combat system before the enemy responds. The traditional “discovery-guidance-strike-assessment” combat loop is time-consuming and has poor combat effectiveness. Therefore, “order-dispatching” precision strikes need to rely on advanced intelligent network information systems, do not pre-determine the strike platform, and publish a list of strike targets in real time. The auxiliary decision-making system quickly evaluates the strike performance of various weapon platforms and the expected damage to the target, autonomously assigns strike platform tasks, quickly links and regulates multi-domain firepower strike forces, and autonomously closes the kill chain to quickly strike key targets.
Multi-domain energy gathering and coordinated strike. The advantage of modern combat precision strikes over previous firepower strikes lies in the information-based and intelligent combat system, which does not require human intervention and relies on a closed strike chain to autonomously complete tasks such as “detection, control, attack, and evaluation”. It can not only save the cost of strikes and reduce resource waste, but also achieve adaptive coordination based on unified combat standards. Therefore, the “order-to-order” precision strike requires the firepower strike forces distributed in various combat fields to establish a unified standard grid. As long as a demand is issued at one point, multiple points can respond and the overall linkage can be achieved. Forces and firepower can be flexibly concentrated, and multiple means and rapid multi-domain energy gathering can be used to determine the strike direction, strike order, and strike method of each strike platform on the move. Through system integration, time can be effectively saved, and multi-domain precision strikes can be carried out on key node targets and key parts of core targets of the enemy, giving full play to the overall power of the superposition and integration of the combat effectiveness of each combat unit.
The attack must break the enemy’s system and be quick and decisive. Modern warfare is a “hybrid war” implemented simultaneously in multiple fields. The interweaving influence and confrontation of new domains and new qualities such as information, aerospace, and intelligence are more obvious. This requires both sides of the war to be able to discover and act one step faster than the enemy, destroy and paralyze the enemy’s combat system, and reduce the efficiency of the enemy’s system. On the one hand, it is necessary to accurately identify the nodes of the enemy system and instantly optimize and accurately strike; on the other hand, it is necessary to conceal one’s own intentions and strike forces, and strike quickly when the enemy is unprepared. “Order dispatch” type precision strikes can well meet these two requirements. With the support of network information systems, intelligent integration of firepower strike forces in various fields can be achieved, and multi-source information perception, data cross-linking, and multi-domain coordinated strikes can be achieved. The seamless and high-speed operation of “target perception-decision-making command-firepower strike-damage assessment” is realized, and information and firepower are highly integrated to quickly achieve combat objectives.
The system composition of “order dispatch” type precision strike
The “order-based dispatch” precision strike builds an efficient closed strike chain, compresses action time, improves strike effectiveness, enables various firepower strike platforms to better integrate into the joint firepower strike system, and provides fast and accurate battlefield firepower support. The key lies in the “network” and the focus is on the “four” systems.
Multi-domain platform access network. With the support of information and intelligent technology, an integrated information network system with satellite communication as the backbone will be established, and the firepower strike platforms distributed in the multi-dimensional battlefield will be integrated into the combat network to establish a battlefield “cloud”. Different combat modules will be distinguished, and “subnet clouds” such as “detection, control, attack, and evaluation” will be established. Relying on the integrated communication network chain, the “subnet cloud” will be linked to the “cloud”, which can enhance the firepower strike platform’s full-domain, full-time, on-the-go access, autonomous networking, and spectrum planning capabilities, and realize the network interconnection of firepower platforms, domain-based combat systems, and joint combat systems, as well as the interconnection of internal strike forces.
Joint reconnaissance and perception system. Relying on various reconnaissance and surveillance forces within the joint combat system, conduct all-weather, multi-directional, and high-precision battlefield perception of the combat area. This requires the construction of a full-dimensional reconnaissance and perception force system that exists in physical and logical spaces, tangible and intangible spaces, and the deployment of intelligent perception equipment over a wide area to form an intelligence data “cloud”. Through the intelligence data “cloud”, the enemy situation is analyzed, the key points of the enemy combat system and time-sensitive targets are found, and the reconnaissance information is updated in real time to show the dynamics of the target.
Intelligent command and decision-making system. Relying on a new command and control system with certain intelligent control capabilities, various planning and analysis models are constructed to expand functions such as intelligent intelligence processing, intelligent task planning, automatic command generation, and precise action control. Databases such as the target feature library, decision-making knowledge base, and action plan library are expanded and improved to strengthen the system support capabilities for task planning, action decision-making, and control in the process of combat organization and implementation, improve planning and decision-making and combat action control capabilities, clarify “how to fight, where to fight, and who will fight”, and achieve accurate “order dispatching”.
Distributed firepower strike system. Relying on the intelligent network information system, on the one hand, it integrates land, sea, air, space and other multi-dimensional firepower strike platforms, strengthens the functions of intelligent target identification and remote control strike, and realizes various combat methods such as remote control combat of combat units, manned and unmanned coordinated combat, and flexible and mobile combat; on the other hand, it can build a low-cost firepower strike platform mainly composed of low-altitude and ultra-low-altitude unmanned strike platforms such as crossing aircraft and cruise missiles. By adding different functional combat payloads, it can work closely with high-end firepower strike platforms to implement battlefield guidance, precision strikes, firepower assessment and other tasks, and efficiently complete the “order”.
Autonomous damage assessment system. Relying on the reconnaissance and surveillance forces within the joint combat system to build a damage assessment system, after the firepower platform completes the strike, it will autonomously conduct strike effect verification on the target. It mainly conducts real-time, dynamic, objective, and systematic analysis and evaluation of the target’s appearance, degree of functional loss, etc., and promptly transmits relevant information to decision-making and command centers at all levels through video images. The evaluation center will judge “how well the strike was” and whether it meets the expected damage requirements. If it does not meet the requirements, the combat operations can be adjusted in a timely manner and supplementary strikes can be carried out to provide strong support for maximizing combat effectiveness.
Planning and implementation of “order-based” precision strikes
The “order dispatch” type of precision strike is just like the way online ride-hailing services operate. Through a series of processes such as formatted “order” generation, intelligent object matching, and autonomous path planning, it independently completes the “OODA” combat cycle. Its actions are more efficient, the strikes are more precise, and the coordination is closer.
Firepower requirements are reported in real time, and combat units “submit orders” on demand. Reconnaissance elements distributed in different combat areas and multi-dimensional battlefield spaces use radar, optical, infrared and technical reconnaissance methods to form battlefield target intelligence information through wide-area multi-source detection. This information is connected to the battlefield information network through intelligence links and is transmitted to combat units anytime and anywhere. The combat units will perform correlation processing, multi-party comparison and verification, and comprehensively compile battlefield target information to generate accurate task “orders”. The combat unit analyzes the target value and connects to the decision-making platform on demand, builds an “order”-style closed strike chain, and submits task “orders” in real time to achieve in-motion optimization and precise adaptation.
Differentiate fire strike tasks, and the decision center intelligently “dispatches orders”. Through the battlefield information network and relying on the intelligent task planning system, the decision center can automatically parse the task “order” information data submitted by the combat unit, and automatically generate the task requirements such as the type and quantity of ammunition, strike method and damage index required for the fire strike action according to the nature, coordinate position, movement status, threat level, etc. of the battlefield target, and form a fire support task “order”. Through intelligent matching of the best firepower platform, link nodes are connected as needed, and intelligent command-based “dispatching” is carried out, which is immediately delivered to the firepower platform waiting for combat.
The firepower platform can “accept orders” immediately by matching the best targets at all times. The firepower platforms distributed at multiple points in the battlefield area can respond to “accept orders” immediately through the battlefield information network. The firepower platform and the combat unit can establish a chain autonomously, and directly establish a guided strike chain after mutual “identity” verification, coordinate and cooperate with the firepower strike operation, and adjust the strike method and shooting parameters in time according to the damage to the target after the strike and the dynamics of the battlefield target, and then carry out firepower strikes again until the “dispatching” task is completed. The firepower platform always follows the principle of “strike-transfer-strike-transfer”, completes the strike task, quickly moves the position, stays in a combat state at all times, and receives “orders” online in real time. After the task is completed, the guided strike chain between the firepower platform and the combat unit will be automatically cancelled.
Acquire damage information from multiple sources, and the assessment center will “evaluate” in real time. Comprehensively use long-distance information-based intelligent reconnaissance methods such as satellite reconnaissance, radar reconnaissance, and drone reconnaissance to implement multi-domain three-dimensional reconnaissance, obtain the target’s fire damage information in real time, and provide accurate assessments for precision fire strikes. Comprehensively determine the damage effect, conduct quantitative and qualitative evaluations of the strike effect, distinguish the three damage states of the target’s physical, functional, and system, and provide timely feedback to the decision-making center. According to the damage assessment results of the strike target, timely put forward control suggestions, adjust the fire strike plan, optimize combat operations, and achieve precise control of fire strikes, so that commanders can accurately control the combat process and achieve efficient command and control of the effectiveness of fire strikes.
Intelligent warfare is an advanced stage in the development of human warfare. The increasing maturity of artificial intelligence technology is driving human society from an information society to an intelligent society, and intelligent warfare has emerged. In comparison, mechanized warfare enhances the functions of “hands and feet” based on mass-energy exchange, information warfare enhances the functions of “ears and eyes” based on electromagnetic induction, and intelligent warfare extends and develops the functions of “brain” based on brain-computer interaction, which will also be presented to the world in a brand new style.
Intelligent warfare involves both military affairs and mixed games in the fields of economy, diplomacy, public opinion, culture, etc. In the military field, intelligent warfare has gradually subverted the traditional form, presenting the characteristics of algorithmic combat command, unmanned combat forces, and diversified combat styles with the core of seizing “intelligence control”. However, at the war level, the scope of intelligent warfare has been further expanded, and the violence of war has been greatly reduced. The war process is the process of using intelligent algorithms to gradually replace the competitive games in various fields of human beings and gain advantages. On the one hand, the competitive games in various fields of national security gradually realize the auxiliary decision-making of artificial intelligence. Intelligent political warfare, diplomatic warfare, legal warfare, public opinion warfare, psychological warfare, financial warfare, and even more resource warfare, energy warfare, ecological warfare, etc. with intelligent characteristics will gradually step onto the stage of human warfare. For example, once artificial intelligence technology is applied to the financial field, the subsequent intelligent financial game will appear on the list of intelligent warfare. On the other hand, the advanced stage of information warfare has already presented the form of hybrid warfare. The military boundaries of war have been broken, and the hybrid nature will become increasingly prominent, becoming a kind of all-domain linkage confrontation involving national security. With the assistance of intelligent systems, one of the two hostile parties can easily create and use “accidental” events in the opponent’s society, triggering the “butterfly effect” in various fields such as ideology, diplomacy, economy, culture and technology, and then use intelligent military means when necessary to accelerate the process of destroying the enemy country. The high complexity of the future hybrid warfare environment, the strong confrontation of the game, the incompleteness of information and the uncertainty of boundaries provide a broader space for the application of artificial intelligence technology.
Virtual space has become an important battlefield in intelligent warfare, and the proportion of violent confrontation in physical space has declined. Intelligent warfare is carried out in the entire domain around the competition for intelligence advantage. Intelligence, as an abstract concept, mainly exists in the cognitive space of the human brain and computer chips. Whoever can win the intelligence advantage in virtual space can win the intelligent warfare. This advantage can surpass and subvert the information and energy advantages in traditional information and mechanized warfare. Some people even compare it to “in the face of intelligent warfare, information warfare is like a group of clumsy earthworms facing intelligent humans, and they will definitely lose.” This is just like what Comrade Mao Zedong once said about turning enemy commanders into “blind, deaf, and crazy people.” To win the intelligent war, we must turn our opponents into “fools.” It is not difficult to predict that with the trend of the increasing prosperity of human virtual space in the future, the intelligent confrontation in virtual space will determine the outcome of intelligent warfare to a certain extent. For example, the virtual war with intelligent characteristics between the enemy and us in the metaverse can even partially replace the violent and bloody war in the physical space, and the results of virtual combat can also be used as the basis for judging victory or defeat. The intelligent warfare system can “learn without a teacher”, “play against itself” and “learn by itself” in the metaverse, becoming a “strategist” and “good general” for people to conquer the virtual cognitive space.
The victory or defeat of intelligent warfare depends on the active shaping and full control of potential fighters, and the collapse of the combat process can even be ignored. Intelligent warfare is an opportunistic game between the intelligent systems of both sides in the process of dynamic evolution. Both sides are constantly analyzing and looking for each other’s weak links. Once a fighter appears, they will not give the opponent any chance to turn the tables. Controlling the fighter means winning, and the moment the fighter appears is the decisive moment for both sides. This is just like the battle between martial arts masters. The victory or defeat is often only a moment. The local defeat caused by the instantaneous confrontation may be seized by the opponent to drive the overall situation into a passive state, which will lead to a complete loss. Therefore, both sides of the intelligent war are doing two things around the fighter: one is to actively evolve a more complete war system to avoid omissions and mistakes, especially in order to prevent the opponent from discovering potential fighters, and even not to take the initiative to reveal flaws and use static braking. For example, artificial intelligence reinforcement learning can be used to repeatedly conduct virtual confrontations based on basic combat game rules, automatically generate war experience and lessons, self-innovate and optimize and upgrade its own security defense system; second, do everything possible to recognize and identify the weaknesses of the opponent’s system, find the immediate advantage window of war, so as to expand local advantages and create opportunities. In particular, in order to tap into potential opportunities, it will even actively shape the situation and induce the opponent to enter an unfavorable situation or process. For example, with the help of intelligent war games “fighting left and right, confrontation evolution”, “future fighters” can be discovered in virtual wars, so as to simultaneously guide the current physical space combat preparations. Therefore, the process of intelligent warfare is shorter. If the informationized war is planned before action, then the process of intelligent warfare is planned before victory. The hostile parties have long-term games in the high-dimensional strategic cognitive domain around the appearance of fighters. After the fighters appear and the victory is deduced, they immediately enter the low-dimensional tangible space physical domain to implement joint operations. The time process of the war shows the characteristics of long preparation time and short combat time.
Scientific military theory is combat effectiveness. With the rapid development of artificial intelligence technology, the application of military intelligence in various countries around the world is accelerating, which is triggering a chain of breakthroughs in the military field and promoting the accelerated evolution of human warfare towards intelligent forms. To keep up with the development of intelligent warfare, we need to adapt to changes in technology, warfare, and opponents, grasp the evolution trend of intelligent warfare, master the winning mechanism of intelligent warfare, dispel the “fog” of intelligent warfare, and efficiently and innovatively develop intelligent warfare combat theories.
Sharply grasp the innovation trend of combat theory of “winning by intelligence”
Fully recognizing the development trend of intelligent warfare in the future is the premise for innovating the theory of intelligent warfare. First, the innovation mode of intelligent warfare theory has evolved from “innovation due to war” to “innovation before war”. Information power and intelligence power are the key factors for winning intelligent warfare. Weapons and equipment are being updated at an accelerated pace due to the support of intelligent technology. Intelligent means can visualize wars that have not yet begun. The development and evolution of intelligent warfare has continuously compressed the space and time for traditional weapons and tactics to play a role. The “innovation due to war” operational theory innovation mode based on experience summary of wars that have occurred or are occurring has been difficult to keep up with the evolution of intelligent warfare forms. The “innovation before war” operational theory innovation based on reasonable speculation and scientific deduction will become possible. Second, the content of intelligent warfare operational theory innovation has evolved from “keeping pace with the times” to “pre-time advancement”. The innovation of traditional operational theory is based on “what kind of weapons to fight what kind of war”, and studies “using current tactics to fight future wars”. Tactical innovation and weapon equipment updates are almost synchronized or slightly behind in time, which is a synchronous correlation of “keeping pace with the times”. The battlefield of intelligent warfare is constantly expanding from traditional space and time to new space-time fields. The battle outcome has shifted from being dominated by the battlefield space to being dominated by the preparation space. Tactical innovation and weapon equipment updates are forward-looking designs that focus on the future in terms of time. They are “fighting future wars with future tactics” and will present a “forward-looking and forward-looking” relationship. Third, the winning mechanism of intelligent warfare has evolved from “winning by tactics” to “winning by algorithms”. In intelligent warfare, a large number of unmanned intelligent weapons will go to the battlefield and dominate the direction of the war. The key to intelligence is algorithms, and the traditional winning mechanism of “winning by tactics” will be replaced by “winning by algorithms”. The key to algorithms is “computing power”, and “computing power” determines “combat power”. The development of intelligent weapons has prompted tactical innovation to move forward to the “algorithm field”, turning tactics into algorithms and solidifying tactics into technology, which may be the logical starting point for the innovation of future intelligent warfare combat theories. Fourth, the dominant factors of intelligent warfare have evolved from people’s “magic calculations” to machines’ “intelligent calculations”. In intelligent warfare, a large number of new weapons and equipment are “on stage”. Commanders have limited time to deploy troops on the battlefield, and the “window” for relying on tactics to make up for technical disadvantages is reduced. Tactical design will be more integrated into systematic weapons and equipment and iterative training through algorithm design before the war. Traditional combat rules are subverted, bottlenecks that restrict combat are broken, and combat effects are controlled. The way to win the war will subvert existing cognition. Intelligent weapons and equipment rely on powerful computing power to become a key link in the combat system, and their “intelligent calculation” ability will surpass the “magic calculation” ability of humans.
Constructing a combat theory innovation system that adheres to the principle of “innovation before war”
The innovation of intelligent warfare theory should play the leading role of combat concepts, establish a dynamically updated innovation system, and study “fighting future wars with future tactics”. First, build a “new before war” innovation paradigm. Use intelligent means to visualize and construct future war scenarios, and then drive combat theory innovation, open up a closed loop of combat concept proposal, demonstration, and dynamic update of application, and organically integrate with weapons and equipment research and development, prepare new, advanced, and proven combat theories and weapons and equipment before the war starts, and build a “new before war” intelligent warfare theory innovation paradigm. Second, reconstruct the “unmanned intelligent” combat theory system architecture. Focusing on the changes in future combat forms, update traditional thinking patterns, study the winning mechanism of intelligent warfare, design and innovate the use of intelligent weapons and tactics, boldly conceive new models of intelligent warfare, and innovate unmanned combat and intelligent combat theory systems. Third, strengthen the overall management of “specializing in the main business”. Improve and perfect the relevant work systems and mechanisms for supervising and promoting the innovation of intelligent warfare theory, so that combat theory innovation can be transformed from special tasks to normal tasks, and ensure that there is a basis for construction and measures for implementation. Fourth, create an academic ecology of “open innovation”. We should fully develop academic democracy, open the door to innovation in operational theory, adhere to the principle of seeking truth from facts, adhere to quality standards, mobilize personnel to participate extensively in the development of operational concepts, pool wisdom, innovate, and make breakthroughs, so as to promote the iterative updating of operational concepts.
Build a combat theory innovation platform to support “anticipating the times”
The development of war games, virtual simulation and other technologies has made it possible to conduct “preliminary” research on tactics, and combat laboratories have become the main battlefield for the innovation of future combat theories. First, we should increase the construction of combat laboratories. Combat theory innovation is a pre-practical study of war. In the past, it was difficult to conduct scientific deductions of combat due to the limitations of means. With the iterative development and improvement of war game deduction systems and simulation systems, virtual simulation technology is used to realistically set up future battlefield scenarios and allow the warring parties to highly simulate confrontation. By building combat laboratories and creating a pre-practice platform for combat innovation, we can not only conduct in-depth simulation demonstration and scientific evaluation for innovative tactics, test the feasibility of combat theories and put forward improvement suggestions, but also use the deep learning function of intelligent deduction systems to simulate possible situations of future warring parties, innovate tactics in confrontation deductions, put forward new combat concepts, and promote in-depth innovation of combat theories. Second, we should establish a mechanism for the synchronous integration of theory and technology. Combat theory innovation and weapons and equipment research and development should be integrated simultaneously, and tactics should be “stereotyped” and “materialized” into the combat and technical performance of weapons and equipment, so as to blur and narrow the difference between pre-practice and practice of war as much as possible. We should open up all the links that transform advanced combat concepts into actual combat effectiveness of the troops, and form a new quality combat effectiveness generation mechanism from proposing concepts to establishing experimental troops, evaluation and demonstration, exercise inspection, forming real cases, and special training. We should keep a close eye on the development of advanced technologies from the combination of technology and tactics, and actively integrate the most advanced technology and ideas of mankind into the development of weapons and equipment and the innovation of combat theory. The third is to establish a research and training integrated research and development mechanism. The research and development of weapons and equipment should start from the demonstration link in accordance with the latest developed combat concepts. Professional combat personnel should propose the research and development needs of weapons and equipment and participate in the demonstration and consultation throughout the process; technical R&D personnel should also participate in the training and exercise practice of weapons and equipment of the troops, master the actual use of equipment, promote the improvement and upgrading of equipment, and form a highly integrated combat and technical R&D mechanism in which technical personnel follow training and exercises, and tactical personnel participate in research and discussion.
Effectively strengthen the innovative application of combat theory of “integration of science and technology”
The tactical innovation in the “algorithm field” of intelligent warfare and the “new before war” combat theory innovation model require “advance in advance” to develop intelligent weapons and equipment in advance, and integrate new combat theories into the research and development of weapons and equipment. First, advance tactical innovation. Intelligent combat theory innovation drives the innovation of intelligent weapons and equipment. On the basis of following the winning mechanism, advanced technology is materialized into intelligent weapons and equipment according to tactical requirements, and the tactical effects to be achieved are achieved through the performance update of weapons and equipment, so as to occupy the combat advantage over the enemy in advance. Tactical innovation moves from the battlefield to demonstration meetings, laboratories, and exercise fields, and moves to the key program algorithms for controlling intelligent weapons and equipment. The battlefield becomes a stage for displaying the results of technological and tactical innovation. Second, the performance of pre-equipment. Develop unmanned intelligent weapons and equipment that can adapt to various space environments, can maneuver quickly, can carry out precise strikes and resist complex electromagnetic interference, so that they have the ability of autonomous learning, autonomous adaptation, and autonomous response, and iterative update with technical support. Third, pre-algorithm program. The winner of intelligent warfare must be the one with the ability of “algorithm winning”, and better tactics must be achieved by better algorithms. Advanced algorithms will greatly enhance the “thinking ability” of intelligent weapons and equipment, thereby improving the combat effectiveness of equipment. On future battlefields, a large number of weapons and equipment will quickly calculate and adjust actions according to programs. For example, if there is no strong algorithm support, it will be difficult to achieve autonomous cluster combat, autonomous route planning, autonomous target identification, autonomous mission acceptance, autonomous attack, and autonomous dynamic adaptation for drone “swarm” tactics.
Gather together to build a “highly intelligent and versatile” combat theory innovation team
Intelligent warfare is still a war conducted under the leadership of humans and using intelligent science and technology and weapons and equipment. In essence, it is still a violent conflict in human society. To accelerate the innovation of combat theory, we must maximize the concentration of wisdom. In other words, only by building a group of combat theory talents can we study, understand and win the war. The first is commanders with rich practice. Combat theory innovation is the commander’s specialty and an inherent requirement for victory. Commanders are the brains of the army and determine the development direction and combat concepts of the army. Senior commanders should especially strengthen knowledge and concept updates, keep up with the development trend of intelligent warfare, master the latest developments in intelligent technology, understand the latest developments in intelligent weapons and equipment, innovate strategies and tactics to win intelligent warfare, and keep up with the pace of intelligent warfare development. The second is the commanders and fighters on the front line against the enemy. Grassroots officers and soldiers are closest to the battlefield and have the most vitality for innovation. To maximize the service of combat theory innovation in preparing for war, we must pay attention to stimulating and mobilizing the enthusiasm of grassroots officers and soldiers at the forefront of real military struggles and the front line of training, and vigorously improve the level of combat personnel in the use of intelligent weapons and equipment. Intelligent weapons and equipment are different from traditional weapons and equipment. They require more professional operators and more precise application methods to achieve the best combat effectiveness. They must integrate the functions of combat commanders, equipment R&D designers, and combatants to achieve the reshaping and seamless control of future operations. The third is professional and sophisticated researchers. High-quality professional researchers are the commanding heights of theoretical innovation. To win the pearls of military theory, it is necessary to build a phalanx of theoretical research experts. By building a “small core, large extension” combat theory innovation team, accurately matching needs, tactics and technologies, and quickly transforming intelligent science and technology into intelligent weapons and equipment, intelligent combat capabilities, the “time difference” of technology transformation into weapons can be eliminated, and a benign interaction between research, use and training can be achieved.
The winning mechanism of war refers to the main factors for winning a war, the way they play a role, and the internal mechanisms, laws and principles of their mutual connection and interaction. With the advent of the intelligent era, the increasingly widespread application of artificial intelligence in the military field has promoted the transformation of the war form to intelligent warfare, and the winning mechanism of war has also changed accordingly.
Having data advantage is the basis for success
In the era of intelligence, the core foundation of many “disruptive technologies” is data, and war will also be “no data, no war”. In intelligent warfare, both sides will fight a “data war” around understanding data, relying on data, competing for data, and using data. Whoever owns the “data right” will have the initiative in the war. Fighting for data, mastering data, analyzing data, and applying data in war are the keys to winning intelligent warfare.
Data resources are combat effectiveness. In intelligent warfare, data comes first before troops move. Whoever controls the data controls the resources to win the war, and controls the initiative and the chips for victory. The ability to understand and use data is an important indicator for measuring combat capability and directly affects the outcome of the war. Obtaining data, analyzing data, and using data are not only the yardsticks for measuring the combat capability of troops, but also the new engine for improving the combat effectiveness of troops. Data is the most direct record of the objective world. It appears in the form of numbers and is raw data, such as the performance parameters of weapons and equipment, the size of troops, the number of guarantees, target parameters, etc. These data can be processed to become the information and intelligence needed for combat. In the information age led by data, data has become the blood of intelligent warfare.
Big data has given rise to a data-based battlefield. To some extent, whoever controls the data resources controls the “winning space” of the war. Data has changed the logical cognition of war. In the past, people inferred the whole from the individual and inferred the inevitability from the small probability events, but now they deduce individual characteristics from the high probability and find the internal laws of specific things from the correlation. Only by understanding the relevant data can we grasp the overall situation, only by gathering similar data can we grasp the trend, and only by integrating all-source data can we understand the connection. All of this is attributed to the control of the data-based battlefield.
Big data changes the way of fighting. As the most important strategic resource, how to distinguish the authenticity and quality of data, how to fight and counter-fight, deceive and counter-deceive, attack and counter-attack around massive data, has become a key issue in winning intelligent wars. When data becomes the focus of war, it will inevitably lead to competition and gaming around data, thereby promoting changes in the style of fighting. At present, the competition for data collection is intensifying, and major countries have launched research on national defense big data projects to provide more intelligence with practical value for military decision-making. The “asymmetry” of data forms the “asymmetry” of algorithms, and then achieves the “asymmetry” of tactics.
Data has given rise to intelligent equipment systems. Data technology has upgraded combat platforms to highly intelligent and autonomous systems. Data has enabled command and control systems, air combat platforms, precision-guided munitions, etc. to complete the transition from informatization to intelligence. For example, modern “swarm technology” is the application of artificial intelligence supported by big data. Data has become a “telescope”, “microscope” and “perspective lens” for analyzing wars. To win intelligent wars, one must have a data mind, data awareness and data thinking.
Mastering algorithm advantages is the key to success
One of the characteristics of intelligent warfare is that all battle plans, campaign plans and war plans need to be generated by computers, and its essence is algorithm-generated tactics. Having an algorithm advantage means having an intelligent advantage, which can achieve a high degree of unity of information advantage, cognitive advantage, decision-making advantage and action advantage.
Algorithm advantage dominates information advantage. Algorithm is a systematic method to describe the strategic mechanism for solving problems, and is the key and prerequisite for improving intelligence advantage. Algorithm technology mainly includes deep learning, supercomputing, brain-like intelligence and other technologies. The use of intelligent sensing and networking technology can widely and quickly deploy various types of intelligent perception nodes, and can implement active collaborative detection for tasks, thereby building a transparent and visible digital combat environment. Judging from the current development trend, the advantage of war algorithms dominates information advantage, which contains great potential to rewrite the rules of the modern war game. This pair of “invisible hands” will shape the new landscape of future intelligent warfare.
Algorithmic advantage dominates cognitive advantage. In intelligent warfare, big data can quickly convert massive amounts of data into useful intelligence after being processed by high-performance and efficient algorithms, thereby gaining cognitive advantage. Algorithms, as the “brain” of artificial intelligence, have become the key to intelligently sensing the battlefield and using it for decision-making, command, and coordination. The party with algorithmic advantage can dispel the “battlefield fog” and “information fog” caused by the failure to process data in a timely manner, making cognition more profound and thus seizing the initiative in the war. In the future, whoever has algorithmic advantage will have stronger cognitive ability, faster learning speed, and better quality results.
Algorithm advantage dominates decision-making advantage. With its high-speed and precise calculation, the algorithm can replace people’s hard thinking and repeated exploration, thereby accelerating knowledge iteration. With the support of massive data and supercomputing capabilities, the judgment and prediction results of artificial intelligence will be more accurate. By constructing combat model rules through algorithms, commanders can be assisted in making rapid decisions in multi-level planning and ad hoc handling of strategies, campaigns, tactics, etc. through actuarial, detailed, deep and expert reasoning. With the development of disruptive technologies such as big data, cloud computing, and quantum computing and their application in the military field, the future combat decision-making cycle will become near real-time. In intelligent warfare, the party that masters super algorithms can quickly propose flexible and diverse combat plans and countermeasures in response to changes in combat opponents, constantly disrupting the opponent’s established intentions and deployments, and thus seize the dominance of the war.
Algorithmic advantage leads to operational advantage. In the era of intelligent warfare, algorithms determine tactics, and algorithmic advantage leads to war advantage. Supported by superior algorithms, the reaction speed of artificial intelligence is thousands of times that of humans. “Algorithmic warfare” foreshadows the transformation of future wars. Whoever can seize the commanding heights of intelligent algorithms can seize the initiative and win before the battle. On the intelligent battlefield, algorithms are far more important than artillery shells. War algorithms have become the key factor in winning intelligent warfare and are the strategic commanding heights that future intelligent armies must seize. Intelligent warfare calculations are ubiquitous. The party that has the algorithmic advantage can quickly and accurately predict the battlefield situation, innovate combat methods, and achieve the advantage of “winning before the battle.”
Multi-domain integration is the key to success
Multi-domain integration is based on the cloud-based combat system. With the support of the cloud-based battlefield situation, various combat personnel, equipment, facilities, and environmental elements have expanded the battlefield space from the traditional three-dimensional space to the polar regions, deep sea, space, and cyberspace, and even to multi-dimensional domains such as cognitive domain and information domain. Multi-domain integration has formed a giant, complex, and adaptive confrontation system. The integration of “cloud gathering” and “network gathering” has become a new mechanism for intelligent combat.
Cross-domain integration and integrated energy release. Under the conditions of intelligent warfare, the emergence of a large number of new long-range combat platforms and intelligent new concept weapons has made the future combat landscape present the characteristics of air-ground-sea-sky integration, global instant strikes, and cross-domain strategic deterrence and control. Supported by the cross-domain, distributed, and networked “cloud killing” collaborative combat system, through the cross-domain aggregation of multiple combat capabilities, cross-domain interoperability of combat command, cross-domain sharing of combat information, cross-domain movement of combat weapons, cross-domain response of combat actions, and cross-domain complementarity of combat functions are achieved. Cross-domain integration is the close coordination of main domain control and cross-domain support to implement cross-domain collaborative support. Integrated energy release is the transition of joint operations from integrated joint operations to cross-domain joint operations, realizing the cross-domain aggregation and overall energy release of multiple combat capabilities.
Human-machine integration, using speed to defeat slowness. If weapons are an extension of the human body, intelligence is an extension of the human brain. In the era of intelligent warfare, there will be a mode of giving human intelligence to machines to implement combat. People will further withdraw from the front-line confrontation and combat, and the combination of people and weapons will appear in a new form. Unmanned combat weapons and human intelligence are deeply integrated into an organic symbiosis, perfectly combining human creativity, thinking and the precision and speed of machines. Therefore, in future intelligent warfare, the mode of engagement will gradually change from the mutual killing of “human-machine integration” to the unmanned system cluster confrontation of “human-machine integration”. Relying on the intelligent combat system, commanders adaptively adjust and select the mode of action according to changes in the battlefield environment. Unmanned combat develops from single-platform remote control combat to multi-platform cluster autonomy, forming a simple command chain of “commander-combat cluster”, highlighting the rapid, flexible and autonomous characteristics of human-machine collaboration.
Brain-intelligence fusion and efficient control. The combat system of intelligent warfare will be characterized by a highly intelligent “human + network + machine”. The intelligent command and control system will operate in a collaborative manner of “human brain + intelligent system”. The intelligent system will assist or even partially replace the role of humans in command and control. The intelligent command and control system will have relatively strong autonomous command and control capabilities, and can relatively independently obtain information, judge situations, make decisions, and deal with situations. Relying on the battlefield situation awareness system, with the help of big data, cloud computing, artificial intelligence, and modeling and simulation technology, it is possible to accurately analyze and judge massive battlefield information, realize the transformation of combat command from “human experience-centered” to “data and model-centered” intelligent decision-making methods, and make combat planning more scientific and efficient. In the future, the super self-evolution and strategic decision-making capabilities of deep neural networks will realize the combat cycle of “human out of the loop”.
Integration of intelligence and mind, attacking the mind and winning the will. With the development of artificial intelligence technology, the boundaries between the biologicalization and humanization of intelligent weapons will be blurred in the future, and the control of people themselves will become the focus. “Attacking the mind and winning the will” is still the highest combat purpose of intelligent warfare. “Cognitive control warfare” based on the control of human brain and consciousness cognition may evolve into an important combat style. With human cognitive thinking as the target, various means are used to stimulate, influence and control the cognitive system to achieve the effect of disrupting the enemy’s command and decision-making system, inducing the enemy’s combat power, and disintegrating the enemy’s morale. For example, based on brain reading and brain control technology, using mental guidance and control means, the strategic intentions, combat intentions, and combat methods of the enemy commander can be grasped in real time, and even directly act on the brain of the enemy personnel, or the consciousness of the party can be “injected” in the form of EEG coding to interfere with or control their consciousness, thinking and psychology, and finally seize the “right to control intelligence” and achieve deep control over combat personnel. With the large-scale application of intelligent combat platforms on the battlefield, information systems assisting humans will gradually transform into intelligent systems partially replacing humans. The focus of the power struggle will shift from “information rights” to “intelligence rights”, and using elite troops to gain control of key domains will become the dominant approach.
With the accelerated application of cutting-edge technology in the military field, intelligent unmanned systems have become an important part of modern warfare. The world’s major military powers attach great importance to the application of intelligent unmanned system technology in the military field. In the future, intelligent unmanned systems will have a profound impact on combat methods and subvert the rules of war. As a culmination of cutting-edge science and technology (such as artificial intelligence, intelligent robots, intelligent perception, intelligent computing, etc.), intelligent unmanned systems represent the highest level of development of a country’s scientific and technological strength. Therefore, research in the field of intelligent unmanned systems can greatly promote the development of existing military and livelihood fields. At present, unmanned system equipment has emerged in military conflicts. For example, in the conflict between Turkey and Syria, Turkey used the Anka-S long-flight drone and the Barakta TB-2 reconnaissance and strike drone equipped by the Air Force to attack the Syrian government forces; the Russian Ministry of Defense also announced that militants in Syria used drones carrying explosives to launch a cluster attack on its military bases; in 2020, the United States used an MQ-9 “Reaper” drone to attack a senior Iranian military commander and killed him on the spot. Unmanned combat is coming, and intelligent unmanned systems, as a key weapon on the future battlefield, will determine the victory of the entire war.
Image from the Internet
The development of intelligent unmanned systems will not only promote the upgrading and progress of existing military technology, but also drive the intelligent development of civilian technology, including intelligent transportation systems, smart home systems, intelligent manufacturing systems and intelligent medical systems. In order to develop intelligent unmanned systems more scientifically and rapidly, major scientific and technological powers have introduced a series of plans and routes for the development of intelligent unmanned systems, striving to seize the initiative and commanding heights in the development of intelligent unmanned systems. Related ones include the United States’ integrated roadmap for autonomous unmanned systems, Russia’s national weapons and equipment plan, the United Kingdom’s defense innovation technology framework, China’s new generation of artificial intelligence development plan, and Japan’s medium- and long-term technology plan. In recent years, from air to space, from land to sea, various types of intelligent unmanned systems have emerged in large numbers. The world’s major powers have gradually deployed intelligent unmanned systems into the military, and in some regional conflicts and anti-terrorism battlefields, the key role of intelligent unmanned systems is increasing. Therefore, this article will focus on the military needs of the future battlefield, based on the challenges of the actual complex environment faced by the future battlefield, analyze the key technologies required for the development and application of intelligent unmanned systems, and analyze the key technologies of individual enhancement and cluster enhancement from a military perspective, and explain the development trend of intelligent unmanned systems.
Current research status at home and abroad
The concept of intelligent unmanned system has only been proposed recently. At present, its research is still in its early stages, and there is no unified definition in the world. It is temporarily defined as: an organic whole composed of an unmanned platform and several auxiliary parts, with the ability to perceive, interact and learn, and capable of autonomous reasoning and decision-making based on knowledge to achieve the goal. Intelligent unmanned systems can be divided into three major parts: land unmanned systems, air unmanned systems and marine unmanned systems according to the spatial scope of their functions. Among them, land unmanned systems mainly include reconnaissance unmanned vehicles, transport unmanned vehicles, combat unmanned vehicles, obstacle removal unmanned vehicles, bomb disposal unmanned vehicles, unmanned vehicle formations and command systems, etc.; air unmanned systems mainly include reconnaissance drones, combat drones, logistics transport drones and drone formations, etc.; marine unmanned systems mainly include reconnaissance unmanned boats, combat unmanned boats, logistics transport unmanned boats, patrol search and rescue unmanned boats, reconnaissance unmanned submarines, combat unmanned submarines and shore-based support systems, etc. This section will explain the current research status of intelligent unmanned systems at home and abroad from the above three parts. ⒈ Current status of foreign intelligent unmanned system research ⑴ Land unmanned system Land unmanned systems are mainly used in intelligence collection, reconnaissance and patrol, mine clearance and obstacle removal, firepower strike, battlefield rescue, logistics transportation, communication relay and electronic interference. As the advantages of land unmanned systems in combat become more and more prominent, research on them has attracted more and more attention from various countries. The United States launched the “Joint Tactical Unmanned Vehicle” project in November 1993, which is the predecessor of the “Gladiator” unmanned combat platform project. In 2006, the United States completed the design of the entire system of the “Gladiator” unmanned combat platform and officially equipped the Marine Corps in 2007. The “Gladiator” tactical unmanned combat platform is the world’s first multi-purpose combat unmanned platform. It is equipped with sensor systems such as day/night cameras, GPS positioning systems, and acoustic and laser search systems. It is also equipped with machine guns, submachine guns, tear gas, sniper systems, biological and chemical weapons detection systems, etc. It can perform reconnaissance, nuclear and biological weapons detection, obstacle breakthrough, anti-sniper, firepower strike and direct shooting in different weather and terrain. The Gladiator unmanned combat platform is equipped with a highly mobile and survivable chassis. For this platform, a portable handheld control system has also been developed, and a series of development work has been completed around the technical issues of the control system’s anti-interference, network interoperability, miniaturization and ease of operation. However, due to the weak armor protection capability of the Gladiator unmanned combat platform and the poor concealment of its mission, its long-range reconnaissance and control system faces more interference. In addition, the US Army has also put some other land unmanned systems into service, such as the Scorpion robot and the Claw robot. In 2017, the US Army formulated the Robotics and Autonomous Systems (RAS) Strategy, which provides a top-level plan for the construction of unmanned combat capabilities. Figure 1 shows the US land unmanned system.
Figure 1 US land unmanned system Israel, Russia, the United Kingdom and Germany have also successively carried out the development of land unmanned systems and developed a series of advanced products. The product list is shown in Table 1. For example, the “Guardian” series of autonomous unmanned vehicles developed by Israel can combine the sensors and fusion algorithms on board to autonomously detect and identify dangerous obstacles, and perform patrol, surveillance and small-scale fire strike tasks; the MARSA-800 unmanned vehicle developed by Russia can perform tasks such as transportation and logistics support, tracking and surveillance, and can realize autonomous path planning and avoid obstacles during the execution of tasks. The unmanned vehicle has been deployed on the Syrian battlefield. The United Kingdom and Germany also started research on land unmanned systems earlier. The United Kingdom launched a trolley bomb disposal robot in the 1960s, and later launched the Harris T7 tactile feedback robot for performing dangerous tasks such as bomb disposal and bomb disposal; the “Mission Master” ground armed reconnaissance unmanned vehicle developed by Germany’s Rheinmetall is mainly used to perform tactical surveillance, dangerous object detection, medical evacuation, communication relay and fire support tasks.
Table 1 Land unmanned systems of various countries
⑵ Aerial unmanned systems Aerial unmanned systems are mainly based on single drone platforms and drone clusters. Due to their advantages such as wide field of view, freedom of flight, and good equipment carrying capacity, drones are widely used in the military field and have played a great role in military conflicts in recent years. The main functions of aerial unmanned systems include: intelligence gathering, reconnaissance and surveillance, decoy target aircraft, target tracking, tactical strikes and air rescue. In 2000, the U.S. Air Force Research Laboratory proposed the concept of autonomous combat for unmanned aerial vehicles, quantified the degree of autonomy of unmanned aerial vehicles, and formulated a development plan. The quantitative content and development stage of the degree of autonomy of unmanned aerial vehicles are shown in Figure 2.
Figure 2 Autonomous control level and the trend of autonomous
unmanned aerial vehicles In 2003, the United States merged the unmanned combat aircraft system projects of the Air Force and the Navy, launched the “Joint Unmanned Combat System” (J-UCAS) project, and began research on the unmanned combat aircraft X-47B. In 2006, the U.S. Navy proposed the “Navy Unmanned Combat Air System” (N-UCAS) project, which aims to introduce unmanned combat aircraft to the aircraft carrier-based aircraft wing and continue to conduct research on the X-47B. Between 2012 and 2014, the aircraft carrier catapult, landing, touch-and-go and other tests were completed many times, and the autonomous aerial refueling test was completed in 2015. The X-47B attack drone is an autonomously maneuverable, stealthy, and land-based and ship-based unmanned combat aircraft. It has the characteristics of high range and high flight time, and is equipped with advanced sensors such as illumination radar, optoelectronic guidance system, and aperture radar. Its main functions include intelligence reconnaissance, target tracking, electronic warfare interference, and firepower strikes. Other unmanned aerial systems developed by the United States, such as the Global Hawk, Predator, Hunter, and Raven, have also been in service in the military, as shown in Figure 3. The “Harpy” drone developed by Israel is equipped with anti-radar sensors, optoelectronic guidance systems and missiles, and can autonomously attack enemy radar systems, as shown in Figure 3.
Figure 3 Aerial Unmanned Systems of Various Countries
A single aerial unmanned system is easily interfered with and attacked when performing a mission, resulting in mission failure, while an aerial unmanned system cluster can make up for this defect and give full play to the advantages of aerial unmanned systems. The Defense Advanced Research Projects Agency (DARPA) of the United States has successively launched the “Gremlins” low-cost drone project, the low-cost drone cluster project, the “Perdix” micro-drone airborne high-speed launch demonstration project, and the offensive swarm enabling tactics (OFFSET) project for aerial unmanned system clusters. By developing and testing the architecture, communication system and distributed control algorithm for unmanned system clusters, an autonomous control system for drone clusters has been developed, and cutting-edge scientific and technological technologies such as artificial intelligence, situational awareness, virtual reality and augmented reality have been used to enhance the comprehensive combat capability of aerial unmanned system clusters on the battlefield.
⑶ Marine unmanned systems Marine unmanned systems include two types: surface unmanned systems and underwater unmanned systems. Among them, surface unmanned systems mainly refer to surface unmanned boats (hereinafter referred to as “unmanned boats”), which are mainly used to perform tasks such as maritime search and rescue, reconnaissance and surveillance, firepower strikes, patrol security, electronic interference, logistics support and decoy target ships; underwater unmanned systems mainly refer to unmanned submersibles. Compared with manned submarines, they have the advantages of no casualties, high concealment and high autonomy, and are mainly used to perform intelligence collection, target monitoring, combat deterrence and firepower strikes. In 2018, the US Navy released the “Navy Department Unmanned System Strategic Roadmap”, and in 2019, it released the “Navy Artificial Intelligence Framework”, which provides route planning and guidance for the development of naval operations and marine unmanned systems. In terms of surface unmanned systems, the United States proposed the “American Advanced Concept Technology Demonstration Project” (ACTD), one of whose important tasks is to carry out research on the “Spartan Scout” unmanned boat. The project was completed in 2007 and tested in the Iraqi theater. The “Spartan Scout” unmanned boat is equipped with an unmanned driving system and a line-of-sight/beyond-line-of-sight communication system, as well as advanced sensors such as electro-optical/infrared search turrets, high-definition cameras, navigation radars, surface search radars, and global positioning system receivers, as well as weapons such as naval guns, anti-ship missiles, and anti-submarine sensors. It is mainly used to perform intelligence collection, target monitoring, information reconnaissance, anti-mine and maritime security tasks, and has a certain degree of autonomy. The “Sea Hunter” unmanned boat developed by the United States is equipped with sonar and optoelectronic sensors, as well as short-range and long-range radar detection systems and expandable modular sonar systems. It is mainly used to perform tasks such as identifying and monitoring suspicious targets and guiding fire strikes. The US marine unmanned system is shown in Figure 4. The “Protector” unmanned boat developed by Israel is mainly used to perform intelligence reconnaissance, suspicious target identification, tactical interception, electronic interference and precision strikes (Figure 4). The unmanned surface reconnaissance boat developed by Russia can perform rapid patrol tasks under the command of the mother ship and inspect and monitor designated areas to search for intelligence.
Figure 4 Marine unmanned systems of various countries
In terms of underwater unmanned systems, the nuclear-powered unmanned submarine “Poseidon” developed by Russia can carry conventional and nuclear warheads to perform reconnaissance and strategic nuclear strike missions, as shown in Figure 4. The “Knifefish” unmanned submarine developed by the United States can scan suspicious objects and search for intelligence by emitting low-frequency electromagnetic waves; the “Tuna”-9 unmanned submarine developed by the United States can carry a variety of standard payloads and can be used to perform offshore exploration, anti-mine, surveillance and reconnaissance (ISR) and other tasks.
⒉ Current status of domestic intelligent unmanned system research In recent years, China’s military intelligent unmanned systems have developed rapidly. This article will explain the three aspects of land unmanned systems, air unmanned systems and marine unmanned systems. In terms of land unmanned systems, the National University of Defense Technology and Sany Heavy Industry Co., Ltd. jointly developed the “Desert Wolf” land unmanned light platform, which is powered by tracks and equipped with weapon systems such as grenade launchers and machine guns. It can be used to perform logistics transportation, wounded transportation, reconnaissance monitoring, firepower strikes and other tasks. The “Longma” series of unmanned vehicles developed by Sunward Intelligent Group have strong transportation and obstacle crossing capabilities. The “Shenxing-III” military ground intelligent robot system developed by Nanjing University of Science and Technology has strong autonomous navigation and intelligence reconnaissance capabilities. The unmanned nuclear reconnaissance vehicle jointly developed by the National University of Defense Technology and Harbin Institute of Technology has high mobility and armor protection capabilities. The weapon system it carries can perform fire strikes and has certain autonomous capabilities. In terms of aerial unmanned systems, the “Wing Loong” series of unmanned aerial vehicles developed by Chengdu Aircraft Industry Group has fully autonomous horizontal take-off and landing capabilities, cruise flight capabilities, air-to-ground coordination capabilities, and ground relay control capabilities. It is equipped with multiple types of optoelectronic/electronic reconnaissance equipment and small air-to-ground precision strike weapons, and can perform intelligence reconnaissance, target tracking, fire strikes and other tasks. The “Rainbow” series of unmanned aerial vehicles developed by China have medium-altitude and long-range navigation capabilities, can carry electronic jamming systems and a variety of weapon systems, and can perform fire strikes, intelligence reconnaissance, communication jamming, radio wave jamming and other tasks; the attack 11 type unmanned aerial vehicle developed has extremely strong stealth capabilities and can carry precision-guided missiles for ground attack missions. China’s aerial unmanned systems are shown in Figure 5.
Figure 5 China’s aerial unmanned systems
In terms of surface unmanned systems of marine unmanned systems, the “Tianxing No. 1” unmanned boat, developed by Harbin Engineering University, uses oil-electric hybrid power, with a maximum speed of more than 92.6km/h and a maximum range of 1,000km. It is currently the fastest unmanned boat in the world. The boat integrates technologies such as autonomous perception, intelligent control, and autonomous decision-making, and can achieve rapid situation information recognition and danger avoidance of the surrounding complex environment. It can be used to perform tasks such as meteorological information monitoring, landform mapping, alert patrol, intelligence reconnaissance, and firepower attack. The “Jinghai” series of unmanned boats developed by Shanghai University have semi-autonomous and fully autonomous operation capabilities, and can perform tasks such as target reconnaissance, ocean mapping, and water quality testing. The “Haiteng 01” intelligent high-speed unmanned boat developed by Shanghai Maritime University is equipped with sensors such as millimeter-wave radar, laser radar, and forward-looking sonar. It can perform suspicious target monitoring, underwater measurement, maritime search and rescue, and other tasks, and has fully autonomous and semi-autonomous navigation capabilities. The JARI intelligent unmanned combat boat developed by Jiangsu Automation Research Institute is equipped with detection equipment such as photoelectric detectors and four-sided phased arrays. At the same time, it is also equipped with weapon systems such as missiles and torpedoes, which can perform tasks such as intelligence collection, enemy reconnaissance, and precision firepower strikes. The “Lookout II” unmanned missile boat jointly developed by Zhuhai Yunzhou Intelligent Technology Co., Ltd. and other units is equipped with a fully autonomous unmanned driving system and missiles and other weapons, which can perform tasks such as enemy reconnaissance, intelligence collection, and precision firepower strikes. China’s marine unmanned system is shown in Figure 6.
Figure 6 China’s marine unmanned system
In terms of underwater unmanned systems of marine unmanned systems, the “Devil Fish” unmanned submersible developed by Northwestern Polytechnical University is a bionic manta ray unmanned submersible that has completed a deep-sea test of 1025m. The “Wukong” full-sea depth unmanned submersible developed by Harbin Engineering University has successfully completed a deep dive and autonomous operation test of 10,896m. Deep-sea submersibles such as “Qianlong No. 1” and “Seahorse” developed by China have successfully completed deep-sea exploration missions.
⒊ Summary of the current state of technology At present, intelligent unmanned systems have been gradually applied to various fields of military applications, and with the development of cutting-edge science and technology, the application of intelligent unmanned systems in the military field will increase day by day. However, in the use of intelligent unmanned systems, autonomy and intelligence have not yet been fully realized. At present, the application status of intelligent unmanned system technology in the military field can be mainly divided into the following three parts:
① From the perspective of combat missions: combat missions have developed from simple reconnaissance and surveillance to mainstream confrontation operations; battlefield confrontation has changed from human confrontation to human-machine confrontation, and then to machine-machine confrontation; the application environment has changed from structured environment and laboratory environment to real battlefield environment, and will gradually develop into an augmented reality environment combining real environment and virtual reality in the future. ② From the perspective of command and control: the control method has developed from simple remote control and program control of a single machine to intelligent fusion and interactive control of human-machine, but autonomous control has not yet been fully realized; the system architecture has developed from specialization and singularity to generalization, standardization, and interoperability. ③ From the perspective of perception and decision-making: the decision-making method has changed from relying solely on people to relying mainly on people and supplemented by human-machine intelligent interactive decision-making; the perception method has changed from relying solely on sensors to obtain feature information and people to judge target attributes to target recognition and feature information acquisition based on artificial intelligence.
Key technologies of intelligent unmanned systems
As a culmination of multidisciplinary fields, intelligent unmanned systems involve many technologies, perform diverse tasks, and have complex and changeable application scenarios. For example, the air environment is rainy and foggy, with low visibility, strong winds, and light interference; the land environment has complex terrain, obstacles, interference, and dangerous pollution areas; the sea environment has wind and wave interference, ship swaying, inconspicuous targets, and irregular coastlines. Different environments and uses pose huge challenges to the research and performance of intelligent unmanned system technology. In order to adapt to the restricted and changing environment, the key technologies of intelligent unmanned systems can be summarized as autonomous perception and understanding technology in complex environments, multi-scenario autonomous skill learning and intelligent control technology, multi-task cluster collaboration technology, human-computer interaction and human-computer fusion technology, decision-making planning technology and navigation and positioning technology. This section will mainly use marine unmanned systems as examples to elaborate on the key technologies of intelligent unmanned systems.
⒈ Autonomous perception and understanding technology in complex environments Autonomous perception and scene understanding of the environment in complex environments is a prerequisite for intelligent unmanned systems to operate autonomously and form combat capabilities, which will directly affect whether the mission can be successfully completed. In view of the complexity and variability of the actual environment, especially the difficulties of wind and wave interference and ship shaking in the sea environment, intelligent unmanned systems need to complete the goals of autonomous target selection perception, obtain multimodal information, and abstract and complete understanding of information. Therefore, the autonomous perception and understanding technology of the environment of intelligent unmanned systems in complex environments needs to break through the autonomous perception technology of multimodal sensor fusion, as well as the complex scene target recognition and understanding technology.
⑴ Multimodal sensor fusion autonomous perception technology At present, the information acquisition sensors carried by intelligent unmanned systems mainly include navigation radar, millimeter wave radar, laser radar, optoelectronic payload, etc. A single sensor cannot directly obtain high-precision, dense three-dimensional scene information. It is necessary to study the autonomous environmental perception technology of multi-sensor fusion to provide support for scene understanding. Multi-sensor fusion is to carry out multi-level and multi-space information complementation and optimization combination processing of various sensors, and finally produce a consistent interpretation of the observed environment. In this process, it is necessary to make full use of multi-source data for reasonable control and use, and the ultimate goal of information fusion is to derive more useful information based on the separated observation information obtained by each sensor through multi-level and multi-faceted combination of information. By taking advantage of the mutual cooperation of multiple sensors, the data of all information sources are comprehensively processed to improve the intelligence of the entire sensor system. The natural environment of the ocean is more complex than that of land and air. Faced with special challenges such as violent swaying of ships, wind and wave interference, uneven lighting, and inconspicuous targets, the marine intelligent unmanned system needs to perform multi-sensor information fusion processing on the designated target based on the unique attributes of each sensor, and then combine the electronic chart information of the internal navigation unit of the unmanned system and the shore-based support system to build a multi-dimensional three-dimensional situation map of the sea surface environment, perform tracking, detection, identification and cognition tasks for the designated target, and finally realize the autonomous perception and complete understanding of the sea surface environment by the marine intelligent unmanned system.
⑵ Complex scene target recognition and understanding technology The key to the operation autonomy of intelligent unmanned systems lies in the ability to effectively understand the scene and target information, and accurate understanding of scene information mainly includes the construction of target semantic information and the description of scene text information. Compared with land and air environments, the natural marine environment faces unique difficulties such as wind and wave interference and violent swaying of the hull, which brings challenges to the intelligent unmanned system to fully understand the environmental information and accurately identify the designated target. Using sensors such as laser radar and high-definition cameras carried by intelligent unmanned systems, the original point cloud information and image feature information of the marine environment scene can be obtained. Using three-dimensional target detection methods based on point clouds, point clouds and image fusion, and three-dimensional scene semantic segmentation methods, etc., the intelligent unmanned system can fully recognize the scene information and accurately identify the designated target. There are mainly two types of point cloud-based methods: grid-based or voxel-based methods, and point-based methods. The grid-based or voxel-based method uses voxels or bird’s-eye views to convert the irregular point cloud of the acquired sea surface into a regular representation method, and then extracts the point cloud features. The point-based method directly extracts target features from the acquired original point cloud of the sea surface. The three-dimensional target detection method based on point cloud and image fusion combines the precise coordinates of the target in the sea scene obtained by the laser radar with the environmental texture and color information provided by the sea surface image, which is more conducive to the intelligent unmanned system to accurately identify and accurately and completely understand the target of the ocean scene.
⒉ Behavior decision-making and trajectory planning technology In actual and complex war scenes, for the complex mission environment and multiple tasks faced by intelligent unmanned systems, it is necessary to break through the behavior decision-making technology in multi-source heterogeneous environments, trajectory planning technology in dynamic/static environments, and trajectory tracking technology in complex scenes.
⑴ Behavior decision-making technology in multi-source heterogeneous environments Behavior decision-making is the key to the realization of autonomous control of intelligent unmanned systems. In the complex environment of different speeds, different relative distances, and different data types of unmanned boats, it is necessary to accurately extract effective information to make safe and reliable control instructions for the next decision of the unmanned boat. First, extract representative environmental feature information and establish a sufficient number of accurately calibrated learning data sets; then, construct a decision maker based on a deep neural network and use the established database for learning; finally, use machine learning algorithms to optimize the constructed decision maker to further improve the decision accuracy. ⑵Trajectory planning technology in dynamic/static environment Trajectory change is the most basic behavior of unmanned boats and unmanned submarines. In a complex battlefield environment, planning a feasible and reliable trajectory according to different environmental conditions is the key to the intelligent driving of unmanned boats and unmanned submarines. This technology mainly includes trajectory planning technology based on polynomials, trajectory planning technology based on multi-objective constraints, and trajectory planning technology based on positive and negative trapezoidal lateral acceleration.
⑶Trajectory tracking technology in complex scenes Tracking the planned ideal trajectory is an important task for unmanned boats and unmanned submarines. The key lies in solving the problem of high-precision and high-stability control when unmanned boats or unmanned submarines track target trajectories. The main solution is: according to the kinematic and dynamic models of unmanned boats and unmanned submarines, the corresponding actuator control quantity is output to achieve real-time and accurate tracking of the specified target, and under the premise of ensuring tracking accuracy, the autonomous intelligent steering of unmanned boats and unmanned submarines and the coordinated control of multiple actuators of each drive module are realized.
⒊Autonomous navigation and positioning technology The navigation and positioning system is a key component of the intelligent unmanned system, which can provide accurate and reliable information about the speed and position of unmanned boats or unmanned submarines. The navigation system is generally composed of gyroscopes, accelerometers, satellite receivers, etc., some of which are supplemented by visual modules, or are equipped with prior spatial position maps and physical information sensors based on actual complex environmental conditions. In order to achieve accurate execution of tasks, intelligent unmanned systems must break through navigation and positioning technology based on inertial/satellite deep information fusion, navigation and positioning technology based on inertial/astronomical information fusion, navigation technology based on visual tracking, and geophysical assisted navigation technology.
⑴ Navigation and positioning technology based on inertial/satellite deep information fusion This technology introduces the inertial information of the unmanned boat into the satellite carrier/code loop, and then uses fully autonomous, short-term, and high-precision inertial information to assist the update of satellite receiver signals, thereby realizing the complementary advantages and optimal fusion of the inertial navigation and satellite navigation of the unmanned boat.
⑵ Navigation and positioning technology based on inertial/astronomical information fusion The astronomical-based navigation system has the advantages of high autonomy and low susceptibility to interference. By using the information output by astronomical navigation and the information provided by the initial position, the position of the unmanned boat can be calculated. The fusion of inertial navigation information and astronomical navigation information can improve the robustness of astronomical navigation positioning. Inertial/astronomical combined positioning technology based on astronomical navigation assistance has become a key part of the field of autonomous navigation of unmanned systems.
⑶ Navigation technology based on visual tracking Due to the complexity of the actual battlefield environment, unmanned boats will be in a complex working environment and are easily interfered by the outside world, resulting in GPS denial, which makes the navigation system unable to be in a combined state. A single inertial navigation system has low accuracy and is prone to accumulating errors. Long-term pure inertial navigation will make the unmanned boat lose the ability to perform tasks. However, the vision-based method does not have time error accumulation. It only needs to extract the key features of the image obtained by the high-definition camera to obtain the position information of the unmanned boat and the unmanned submersible through visual algorithms and prior knowledge. The vision-based navigation algorithm is not easily interfered with, has strong robustness, and can make up for the error accumulation caused by pure inertial navigation in a GPS denial environment, and is widely used.
⑷ Geophysical assisted navigation technology Due to the unique environment of the ocean, unmanned submersibles need to sail underwater for a long time, resulting in the inability to obtain real-time and accurate satellite signals and astronomical information. In addition, due to problems such as weak underwater light, vision-based navigation methods are also limited. Therefore, by obtaining a priori spatial position map inside the ocean and using the field scene information obtained by the physical sensors carried by the unmanned submersible and matching them, high-precision autonomous navigation of the unmanned submersible can be achieved. The temporal and spatial distribution characteristics of the inherent geophysical properties of the surveyed ocean can be used to produce a geophysical navigation spatial position map. By matching the physical feature information obtained by the physical property sensor carried by the unmanned submersible with the pre-carried spatial position map, the high-precision positioning of the unmanned submersible can be obtained, and the high-precision autonomous navigation of the unmanned submersible can be realized.
⒋ Multi-scenario autonomous skill learning and intelligent control technology Multi-scenario intelligent control technology is a key technology for intelligent unmanned systems to solve complex, changeable and unstable control objects. It is an effective tool for intelligent unmanned systems to adapt to complex task requirements. In a complex marine environment, if intelligent unmanned systems want to complete real-time and accurate regional monitoring, target tracking, information acquisition and precision strikes, they must break through the autonomous skill learning technology of tasks, autonomous operation interactive control technology, and unmanned system motion control technology of human-like intelligent control.
⑴ Autonomous skill learning technology of tasks Autonomous skill learning refers to the process of learning based on prior knowledge or rules to complete tasks in the process of interaction between unmanned systems and the outside world. The autonomous learning of unmanned system operation skills is essentially a partial process of simulating human learning cognition. Intelligent unmanned systems use deep reinforcement learning-based technology to combine the perception ability of deep learning with the decision-making ability of reinforcement learning, and can achieve direct control from high-latitude raw data information input to decision output in complex sea environments. The autonomous skill learning of intelligent unmanned systems mainly includes three aspects: first, describing the complex environment of the ocean surface and the interior of the ocean, and obtaining the initial state data information of the surrounding environment; second, based on the description of the intelligent unmanned system and the complex environment of the ocean surface and the interior, mathematical modeling of deep reinforcement learning is carried out to obtain key information such as the state value function and control strategy function of the autonomous skill learning process; third, using the data information obtained by the interaction between the intelligent unmanned system and the complex environment of the ocean surface and the interior, the state value function and the control strategy function are updated to enable the marine intelligent unmanned system to learn a better control strategy.
⑵ Autonomous operation interactive control technology In the process of autonomous learning and control of tasks, the intelligent unmanned system needs to contact with the ocean surface and the complex internal environment to form a good coupling system to ensure the real-time and accurate acquisition of information on the ocean surface and the complex internal environment, and correctly and quickly carry out navigation planning, autonomous navigation control and autonomous collision avoidance of unmanned boats and unmanned submersibles. The tasks of the interactive control technology of autonomous operation of intelligent unmanned systems mainly include: the design of interactive rules and control strategies of intelligent unmanned systems; modeling methods of complex environments on the surface and inside of the ocean; online modeling and correction of the dynamics of unmanned boats, unmanned submarines and operating objects; dynamic generation and shared control methods of virtual force constraints in complex environments on the surface and inside of the ocean.
⑶ Motion control technology of unmanned systems with humanoid intelligent control The motion control technology of unmanned systems with humanoid intelligent control combines artificial intelligence with traditional control methods to solve the problem of stable and precise control of unmanned boats and unmanned submarines in actual complex marine battlefield environments. It mainly includes two aspects: the design of intelligent control algorithms for unmanned systems and the design of intelligent control strategies for unmanned systems. The design of intelligent control algorithms for unmanned systems mainly includes: hierarchical information processing and decision-making mechanisms; online feature identification and feature memory; open/closed-loop control, positive/negative feedback control, and multi-modal control combining qualitative decision-making with quantitative control; the application of heuristic intuitive reasoning logic. The design of intelligent control strategies for unmanned systems is to design reasonable solutions for unmanned boats or unmanned submarines to meet actual mission requirements.
⒌ Unmanned cluster collaborative control technology In actual combat scenarios, due to the complexity of the battlefield environment and the diversity of tasks, a single unmanned boat or unmanned submarine usually cannot meet the needs of actual tasks. The number of equipment carried by a single unmanned boat or unmanned submarine is limited, and the perception perspective and regional range are not comprehensive enough, resulting in insufficient precision and thoroughness in performing complete intelligence detection, target tracking, battlefield environment perception and comprehensive firepower strike tasks. Therefore, it has become an inevitable trend for a cluster of intelligent unmanned systems composed of multiple unmanned boats and unmanned submarines to collaboratively perform tasks. To complete the control of the intelligent unmanned system cluster, it is necessary to break through the local rule control technology of the intelligent unmanned system cluster, the soft control technology of the intelligent unmanned system cluster, the pilot control technology of the intelligent unmanned system cluster, and the artificial potential field control technology of the intelligent unmanned system.
⑴ Local rule control technology of intelligent unmanned system cluster The control technology based on local rules is the basic method for intelligent unmanned systems to control unmanned boats and unmanned submarines. It mainly lies in the designation of individual local control rules within the cluster of unmanned boats and unmanned submarines. Local rule control technology has achieved intelligent control of marine unmanned system clusters to a certain extent, but a large number of experiments are needed to obtain the parameters between the behavior of marine unmanned system clusters and the cluster model, and the values of the parameters are also very sensitive. Therefore, to achieve complete intelligent control of intelligent unmanned systems, other technologies are needed.
⑵ Soft control technology of intelligent unmanned system clusters The soft control technology of intelligent unmanned system clusters is mainly based on two requirements: First, in the intelligent unmanned system cluster, the control rules between individuals are very important. For example, the control and internal function of each unmanned boat and unmanned submarine are necessary conditions for the group behavior of the entire marine intelligent unmanned system cluster; second, the intelligent unmanned system cluster adopts a local communication strategy. With the increase of unmanned boats and unmanned submarines in the cluster system, it will not affect the state of the entire intelligent unmanned system cluster.
The soft control method is to add one or more new unmanned boats or unmanned submarines without destroying the individual rules of unmanned boats and unmanned submarines in the intelligent unmanned system cluster. These unmanned boats or unmanned submarines participate in the actions of the entire intelligent unmanned system cluster according to the same local rules, but they are controllable and can receive external instructions. After receiving the command, these unmanned boats or unmanned submarines will independently complete the corresponding tasks. The soft control method of the intelligent unmanned system cluster is to add a controllable unmanned boat and unmanned submarine on the basis of the local control rules of the unmanned system, so that it can affect the entire unmanned system cluster, and finally complete the control of the entire intelligent unmanned system group.
⑶ Intelligent unmanned system cluster navigation control technology The basic content of the intelligent unmanned system cluster navigation control technology is: under the premise that the individuals of the entire marine intelligent unmanned system cluster maintain local rules, a small number of unmanned boats and unmanned submarines in the cluster have more information and stronger information processing capabilities, and interact with other unmanned boats and unmanned submarines through local information to play a leading role, so as to achieve the purpose of controlling the entire intelligent unmanned system cluster.
⑷ Artificial potential field control technology of intelligent unmanned system In the control of intelligent unmanned system clusters, control technology based only on local rules is difficult to achieve accurate and real-time perception of the battlefield, as well as the collection and acquisition of intelligence information, tracking and identification of suspicious targets, and precise strikes on enemy areas. Artificial potential field control technology introduces the concept of potential field in physics into the control of intelligent unmanned system clusters, and uses potential functions to simulate the internal and external effects that affect a single unmanned boat or unmanned submarine. The single unmanned boat or unmanned submarine in the system cluster acts under the action of the potential function, and finally realizes the control of the entire intelligent unmanned system through the potential function.
⒍Natural human-computer interaction technology In the actual battlefield environment, intelligent unmanned systems face problems such as complex operation tasks, low level of operation intelligence, high training risks and costs, and low equipment use and maintenance efficiency. In this case, it is necessary to improve the controllability and intelligence of intelligent unmanned system equipment, and it is necessary to break through the human-computer interaction technology of intelligent unmanned systems, augmented reality and mixed reality technology of intelligent unmanned systems, and brain-computer interface technology of intelligent unmanned systems.
⑴Human-computer interaction technology of intelligent unmanned systems Human-computer interaction technology of intelligent unmanned systems refers to the command platform obtaining the image and voice information of officers and soldiers through image and voice sensors, and then using algorithms such as image segmentation, edge detection, and image recognition to extract key information such as gestures and eye gestures of officers and soldiers, and then using algorithms based on deep learning to obtain the voice information of officers and soldiers and pass it to the command platform, so as to issue the officers and soldiers’ instructions to lower-level combat units. The human-computer interaction technology of intelligent unmanned systems can improve the intelligence of task operations and the fault tolerance and robustness of the operation process, so that the officers and soldiers’ instructions can be issued to combat units more stably and effectively.
⑵Augmented reality and mixed reality technology of intelligent unmanned systems Augmented reality technology of intelligent unmanned systems is to superimpose computer-generated images on real complex combat environments, and mixed reality technology of intelligent unmanned systems is to present information of virtual scenes in actual combat scenes, and set up an interactive feedback information loop between the virtual world and officers and soldiers in a real combat environment, thereby increasing the officers and soldiers’ sense of reality in the combat environment experience. As an important development direction of immersive human-computer interaction technology, virtual reality and augmented reality for intelligent unmanned systems have a variety of different real combat application scenarios, which can effectively reduce the cost and risk of training and improve the use and maintenance efficiency of equipment during combat.
⑶ Brain-computer interface technology for intelligent unmanned systems The main function of the brain-computer interface is to capture a series of brain wave signals generated by the human brain when thinking. In actual combat environments, the brain-computer interface technology of intelligent unmanned systems extracts features and classifies the brain wave signals of commanders and fighters, thereby identifying the intentions of commanders and fighters and making corresponding decisions to cope with complex combat tasks and emergencies. The brain-computer interface technology of intelligent unmanned systems can enhance the cognitive and decision-making capabilities of commanders and fighters, greatly improve brain-computer interaction and brain control technology, and give commanders and fighters the ability to control multiple unmanned boats, unmanned submarines and other unmanned combat equipment while relying on thinking.
Future development trend of intelligent unmanned systems
Due to its advantages of unmanned, autonomous, and intelligent, intelligent unmanned systems will appear in every corner of the future battlefield. As they undertake more battlefield tasks, they will participate in different war scenarios, which will lead to a number of key problems for intelligent unmanned systems, restricting their development. The key problems faced by intelligent unmanned systems are mainly:
① Highly complex environment. The specific application environment of intelligent unmanned systems will face more and more factors. The numerous shelters in unstructured environments, the limited perception viewpoints and ranges, etc., put forward higher requirements on the environmental perception ability of intelligent unmanned systems. ② High game confrontation. The battlefield game of intelligent unmanned systems is an important means to gain battlefield advantages. The fierce mobile confrontation between the two sides of the war, as well as the many interferences caused by the enemy and the battlefield environment, have put forward new challenges to the mobile decision-making ability of intelligent unmanned systems. ③ High real-time response. In the future battlefield, the combat situation will change dramatically, the combat mode will be more flexible and changeable, and it is necessary to respond to battlefield emergencies in a timely manner, which puts forward new requirements for the real-time response ability of intelligent unmanned systems. ④ Incomplete information. In the future battlefield, due to the limitations of the battlefield environment and the existence of enemy interference, the information acquisition ability of the intelligent unmanned system will be restricted, resulting in incomplete situational awareness, loss and attenuation of battlefield situation information data, and the inability to fully obtain information on both sides of the enemy. ⑤ Uncertain boundaries. The unmanned combat mode of the intelligent unmanned system has subverted the traditional combat mode. The integration of land, sea, air and space in the future unmanned combat, as well as the social public opinion brought about by the high degree of integration with society, will have an impact on the unmanned combat of the intelligent unmanned system, thus causing uncertainty in the combat boundary.
Based on the various difficulties that will be faced above, the development of intelligent unmanned systems in the future will focus on two aspects: individual capability enhancement and cluster capability enhancement. Individual capability enhancement is mainly reflected in individual cognitive intelligence, individual autonomous operation and algorithm chipization; cluster capability enhancement is mainly reflected in improving interoperability through a universal architecture, as well as cross-domain collaborative operations, network security and human-machine hybrid intelligence.
⒈ Cognitive intelligence adapts to complex task environments In order to improve the adaptability of intelligent unmanned systems in highly complex environments, it is necessary to enhance the individual cognitive intelligence of intelligent unmanned systems. The enhancement of individual cognitive intelligence is mainly reflected in the transformation from individual perceptual intelligence to cognitive intelligence. The comprehensive acquisition of multi-source sensor information enables intelligent unmanned systems to have human semantic understanding, associative reasoning, judgment analysis, decision planning, emotional understanding and other capabilities. The development of individual cognitive intelligence of intelligent unmanned systems will be based on brain science and bionics, and will achieve intelligent understanding and accurate application of acquired information by combining knowledge graphs, artificial intelligence, knowledge reasoning, decision intelligence and other technologies, thereby improving the high real-time response capabilities of intelligent unmanned systems to emergencies.
⒉ Autonomous operation improves the task capability of single machines In order to solve the problem of highly complex tasks faced by intelligent unmanned systems in highly complex environments, it is necessary to improve the autonomous operation capabilities of single machines. This includes developing decision-making methods based on deep reinforcement learning, autonomous environmental perception and interaction methods based on multi-source information of vision and other sensors, autonomous motion planning methods for robots based on neurodynamics, and autonomous operation methods based on artificial intelligence, so as to improve the autonomous environmental modeling and positioning capabilities, autonomous decision-making capabilities, autonomous planning capabilities and autonomous control capabilities of individuals in intelligent unmanned systems, so that intelligent unmanned systems can adapt to complex environments and carry out autonomous operation tasks.
⒊ Algorithm chipization achieves high real-time response The complex environment faced by intelligent unmanned systems places high demands on algorithms and computing power. It is necessary to be able to accelerate computing in real time to achieve high real-time response to battlefield emergencies. To solve this problem, it is necessary to improve the chipization level of individual algorithms of intelligent unmanned systems, that is, to develop a new architecture of storage and computing integrated chips to improve the computing power of chips and the level of algorithm chipization. New chips based on artificial neural technology can be studied. By changing the binary computing method of digital chips and exchanging gradient signals or weight signals, the chips can work in a simulated neuron manner, simulating the parallel computing flow of the brain to effectively process large amounts of data, and obtaining the parallel computing capabilities of supercomputers, thereby greatly improving the computing power of chips and the level of algorithm chipization, and solving the problem of high real-time response of intelligent unmanned systems.
⒋ Universal architecture improves cluster interoperability In order to improve the adaptability of intelligent unmanned systems facing highly complex environments and the maintenance and support efficiency of intelligent unmanned systems, intelligent unmanned systems will continue to develop standardized command and control frameworks in the future, improve the intelligence of human-machine collaboration, and improve the modularity of the system. It is mainly reflected in:
① Developing a general artificial intelligence framework to support autonomous, precise, and real-time good coupling and collaboration between humans and machines; ② Improving the modularity and component interchangeability of intelligent unmanned systems to support rapid maintenance and configuration upgrades of intelligent unmanned systems and their members in future battlefields; ③ Improving the level of data transmission integration and the anti-interference capability of data transmission on future battlefields to reduce the rate of data interception.
⒌ Cross-domain collaboration breaks the boundaries of cluster applications
In order to improve the adaptability of intelligent unmanned systems in highly complex environments and solve the problem of uncertain boundaries during combat, it is necessary to improve the cross-domain collaborative combat capabilities of intelligent unmanned systems to make up for the lack of capabilities in a single combat domain. Through the cross-domain collaborative combat of intelligent unmanned systems, the advantages of various components can be complemented. That is, by utilizing the advantages of large search range and long communication distance of air unmanned systems, as well as long endurance and strong stability of land unmanned systems and marine unmanned systems, the advantages of different components are combined to increase the multi-dimensional spatial information perception capabilities of intelligent unmanned systems, and form a heterogeneous multi-autonomous collaborative system, thereby improving the ability of intelligent unmanned systems to complete complex tasks.
⒍ Secure network guarantees reliable application of clusters Intelligent unmanned systems face the problems of incomplete information and high game confrontation on future battlefields. Therefore, it is necessary to improve the network security protection capabilities of intelligent unmanned systems in high confrontation environments, improve flexibility in dealing with highly complex and highly variable tasks, and improve stability in the face of high-intensity network attacks. The improvement of network security protection capabilities in adversarial environments is mainly reflected in the following aspects:
① Plan reasonable data permissions to ensure data security and flexibility of task execution; ② Improve information protection capabilities, develop and upgrade information protection products for intelligent unmanned systems, and record response decisions for information explosion situations; ③ Increase the network’s deep defense capabilities, unify network security standards and levels, build network defense autonomy, and improve the network’s ability to resist attacks under network attacks.
⒎ Human-machine hybrid intelligence improves adversarial capabilities In order to solve the problem of high real-time response faced on future battlefields and improve the adaptability of intelligent unmanned systems in highly complex environments, it is necessary to combine the advantages of humans and machines to form a new hybrid intelligent mode of human-machine collaboration, that is, to develop human-machine hybrid intelligence for intelligent unmanned systems. Human-machine hybrid intelligence of intelligent unmanned systems is a new intelligent scientific system that combines physics and biology in which human, machine, and environmental systems interact. In response to the problems of high-complexity environments and high real-time responses faced by intelligent unmanned systems on future battlefields, the development of human-machine hybrid intelligence in the future is mainly reflected in the following aspects: ① Information intelligence input. At the input end of information acquisition, the information data objectively collected by the sensors of the unmanned system equipment is combined with the subjective perception information of the combat commanders to form a multi-dimensional information acquisition and information input method. ② Intelligent information fusion. After obtaining multi-dimensional data information, a new data understanding method is constructed by integrating the computer’s calculation data with the information cognition of the combat commanders. ③ Intelligent information output. After the data information is fused and processed, the computer’s calculation results are matched with the value decisions of the combat commanders to form an organically combined probabilistic and regularized optimization judgment.
IV. Conclusion Due to its autonomy, intelligence and unmanned characteristics, intelligent unmanned systems will play an increasingly important role in the future battlefield. The development of intelligent unmanned systems will also drive the development of intelligent computing, intelligent transportation, intelligent manufacturing, smart medical care, brain-like science and other disciplines. In the future, we should be guided by the mission requirements of actual complex battlefield environments, combine advanced technologies in cutting-edge disciplines such as artificial intelligence, and make overall top-level planning for intelligent unmanned systems; verify reliable airborne intelligent perception and intelligent computing equipment on different unmanned system combat platforms in land, air and marine unmanned systems, and develop reliable and stable key technologies such as unmanned system autonomous control, intelligent perception, intelligent decision-making and intelligent interaction, overcome the key difficulties of intelligent unmanned systems, and continuously improve the autonomous control, intelligent perception and intelligent decision-making capabilities of intelligent unmanned systems.