{"id":4385,"date":"2019-09-02T13:21:54","date_gmt":"2019-09-02T16:21:54","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4385"},"modified":"2019-09-02T13:21:54","modified_gmt":"2019-09-02T16:21:54","slug":"inteligencia-artificial-aplicada-a-sistemas-de-guerra-electronica-2","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4385","title":{"rendered":"Inteligencia Artificial aplicada a Sistemas de Guerra Electr\u00f3nica"},"content":{"rendered":"<p class=\"m_4005969670781649249gmail-m-9080342726648328018gmail-western\"><b><i><\/i><\/b><span style=\"font-family: tahoma, sans-serif;\">Los entornos electromagn\u00e9ticos hostiles requieren sistemas de Guerra Electr\u00f3nica (EW) que pueden detectar datos desconocidos, diferentes se\u00f1ales y adaptarse r\u00e1pidamente a las\u00a0nuevas\u00a0amenazas emergentes. La Inteligencia Artificial emplea algoritmos \u201cdeep learning\u201d (DL) que pueden ser entrenados para reconocer nuevas se\u00f1ales en poco tiempo.\u00a0<\/span><!--more--><\/p>\n<p class=\"m_4005969670781649249gmail-m-9080342726648328018gmail-western\">Actualmente la radio definida por software (SDR) es la arquitectura \u00f3ptima para desarrollar\u00a0sistemas embebidos\u00a0de inteligencia de se\u00f1ales (SIGINT) basados en Inteligencia Artificial.<\/p>\n<p class=\"m_4005969670781649249gmail-m-9080342726648328018gmail-western\" style=\"text-align: right;\"><strong><a href=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/pdf\/artificial-intelligence-in-software-defined.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Leer m\u00e1s &gt;&gt;<\/a><\/strong><\/p>\n<p class=\"m_4005969670781649249gmail-m-9080342726648328018gmail-western\">Fuente: <em><a href=\"https:\/\/www.embedded-computing.com\/military-white-papers\/artificial-intelligence-in-software-defined-sigint-systems\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.embedded-computing.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los entornos electromagn\u00e9ticos hostiles requieren sistemas de Guerra Electr\u00f3nica (EW) que pueden detectar datos desconocidos, diferentes se\u00f1ales y adaptarse r\u00e1pidamente a las\u00a0nuevas\u00a0amenazas emergentes. La Inteligencia&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4385"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4385"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4385\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}