{"id":4310,"date":"2019-08-20T09:10:12","date_gmt":"2019-08-20T12:10:12","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4310"},"modified":"2019-08-20T09:10:12","modified_gmt":"2019-08-20T12:10:12","slug":"inteligencia-artificial-aplicada-a-sistemas-de-guerra-electronica","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4310","title":{"rendered":"Inteligencia Artificial aplicada a Sistemas de Guerra Electr\u00f3nica"},"content":{"rendered":"<p class=\"m_-411322148063761076gmail-m-9080342726648328018gmail-western\"><b><i><\/i><\/b>Los entornos electromagn\u00e9ticos hostiles requieren sistemas de Guerra Electr\u00f3nica (EW) que pueden detectar datos desconocidos, diferentes se\u00f1ales y adaptarse r\u00e1pidamente a las\u00a0nuevas\u00a0amenazas emergentes.<!--more--><\/p>\n<p class=\"m_-411322148063761076gmail-m-9080342726648328018gmail-western\">La Inteligencia Artificial emplea algoritmos \u201cdeep learning\u201d (DL) que pueden ser entrenados para reconocer nuevas se\u00f1ales en poco tiempo. Actualmente la radio definida por software (SDR) es la arquitectura \u00f3ptima para desarrollar\u00a0sistemas embebidos\u00a0de inteligencia de se\u00f1ales (SIGINT) basados en Inteligencia Artificial.<\/p>\n<p class=\"m_-411322148063761076gmail-m-9080342726648328018gmail-western\" style=\"text-align: right;\"><strong><a href=\"https:\/\/www.embedded-computing.com\/military-white-papers\/artificial-intelligence-in-software-defined-sigint-systems\" target=\"_blank\" rel=\"noopener noreferrer\">Leer m\u00e1s &gt;&gt;<\/a><\/strong><\/p>\n<p class=\"m_-411322148063761076gmail-m-9080342726648328018gmail-western\"><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.embedded-computing.com\/military-white-papers\/artificial-intelligence-in-software-defined-sigint-systems\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.embedded-computing.com<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los entornos electromagn\u00e9ticos hostiles requieren sistemas de Guerra Electr\u00f3nica (EW) que pueden detectar datos desconocidos, diferentes se\u00f1ales y adaptarse r\u00e1pidamente a las\u00a0nuevas\u00a0amenazas emergentes.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4310"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4310"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4310\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}