recommended reading

Attention game developers: The Army wants your gesture-tracking technology

The Xbox Kinect tracks body moment.

The Xbox Kinect tracks body moment. // Casey Rodgers/AP

The Pentagon wants Kinect-type video game technology that tracks movements and gestures to be installed in helicopter cockpits, solicitation documents show. The service’s goal is to build low-cost intelligent systems where pilots could direct helicopters with head movements and crew members could track objects the pilot is looking at.

Deploying movement-sensing technology in military aircraft is not a particularly novel idea. For instance, defense contractor Boeing has made helmet-mounted trackers that allow pilots to cue onboard weapons by pointing their heads at enemy targets, according to company news release.

But the Pentagon wants to pull down the prices of the technology available. “New technology from the gaming world has the potential to substantially reduce the cost of adding head tracking to conventional helicopters, as well as the ability to do body tracking and gesture recognition to support future intelligent cockpits,” reads an army solicitation document. It highlights the potential of Microsoft’s Kinect for Xbox, a hugely-popular motion-sensing device among gamers.

The army is seeking partners to help “determine the feasibility of using gaming or other low cost technologies like the Kinect in a modern cockpit,” develop gesture recognition, and work with manufacturers to integrate the system into an army cockpit. The technology, if successful, also could detect if a pilot is getting tired. Additionally, it could be deployed in ground vehicles and any work station where an operator has to interact with controls and displays, the document notes.

The solicitation is currently in pre-release and will officially launch May 24. Proposals are due by 6 a.m. E.S.T. on June 27. This contract will be administered by the Army as part of the Small Business Innovation Research program, which is aimed at providing early-stage financing to companies with fewer than 500 employees.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.