US Air Force refuels with robo-pilots

 

The Defense Advanced Research Projects Agency has built a software program which it claims can fly a plane during an inflight refuelling as well as a human pilot.

Autonomous Airborne Refueling software uses inertial, GPS and video data to manoeuvre the plane's refuelling pipes into a 32-in basket.

The software was 100 per cent successful, even in conditions which a human pilot would have found almost impossible. A human pilot was on board just in case.

Nasa test pilot Dick Ewers characterised some of the less mature versions of the AAR software as "flying like a second lieutenant". But he said that the final configuration demonstrated this year is "better than a skilled pilot".

"Skilled pilots can handle some tricky, last second movement the basket has a habit of making, but in so doing they set themselves up for a basket strike, ripping off the basket from the hose, or sometimes breaking the probe or parts of the airplane," he said.

The tests revealed some interesting results in the difference between computer and robot systems. When lining up with a refuelling pipe human pilots are instructed not to try and predict the pipe's movements.

But with the computational power of the plane's computers the software was taught to do just the opposite, and managed to hook up at over 250mph at 18,000 feet.

Copyright ©v3.co.uk


US Air Force refuels with robo-pilots
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 702

Vote