Browse Definitions :
Definition

onboard intelligence

Contributor(s): Matthew Haughn

Onboard intelligence is the use of artificial intelligence (AI) that is housed locally in the device it operates.

The use of onboard intelligence helps accommodate AI uses where offloading resources externally is problematic. Such situations include remote environments and ones where connectivity or power delivery is an issue. While onboard intelligence is often web-accessible, it is often focused on autonomous operation capabilities.

Often AI implementations use both local and remote computing resources to enable greater processing power. This separation of resources can be to reduce local power draw. They may also be made separate for mobility or battery life considerations.

Mobility is a major concern in automotive applications of onboard intelligence. As vehicles can’t rely on the ability to connect adequately for the operation of remote compute power, autonomous driving cars operate with onboard intelligence. The localization of AI through onboard intelligence enables reliability in split second, life-or-death decisions that the upcoming technology has to make.

On the other hand, this divided approach limits where AI can be used. NASA, for example, has created an onboard intelligence solution for space called Frontier. Frontier is what is called an intelligent decision engine. While remaining simple enough to house locally onboard intelligence, Frontier can learn to make better decisions based on experience. This learning capability makes Frontier and other onboard intelligence more adaptable to uncertain environments such as space or other.

Commercially used drones may also benefit from onboard AI in order to enable autonomous operations. Even in crafts not operated autonomously, onboard intelligence can be a back up to help ensure the craft doesn’t fail its delivery or mission in the event of lost connectivity.

This was last updated in December 2017

Continue Reading About onboard intelligence

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close