Introduction to Stealth Systems

Introduction to Stealth Systems

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Introduction to RF Stealth — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Guessing and knowing are two completely different things. The objective of stealth is to keep the adversary guessing until it is too late. Over the past few years, stealth platforms, especially aircraft, have come into public consciousness. However, stealth research work was conducted in earnest beginning in the mid-1970s and was spearheaded by the Defense Advanced Research Projects Agency (DARPA) in both U.S. Air Force and Navy programs. Most of those programs are still shrouded in secrecy, but a few, especially the earliest, are now declassified, and the basic notions of Stealth technology can be described. For reasons of classification, nothing can be said about deployed aircraft such as the F-117A and the B-2, pictured in Figs. 1.1 and 1.2, respectively, but they grew out of those early programs. Several generations of technology have now passed, as embodied by such aircraft, but the basic stealth concepts remain the same.

Chapter Contents:

  • 1.1 Introduction
  • 1.1.1 The Stealth Challenge
  • 1.1.2 The Stealth Approach
  • 1.1.3 Balanced Design
  • 1.1.4 'Great Thoughts' of Stealth/LO Technology'
  • 1.1.5 RCS and Power Management Summary
  • 1.2 Introduction to Low-Probability-of-Intercept Systems
  • 1.2.1 Great Thoughts of LPI Systems Design
  • 1.2.2 Detection and Intercept Probability
  • 1.2.3 Reduced Detectability - Effective Radiated Peak Power
  • 1.2.4 Reduced Detectability - Maximum Signal Uncertainty
  • 1.2.5 LPI Performance Example
  • 1.3 A Little History of Stealth Systems
  • 1.3.1 LPIR Program Accomplishments
  • 1.3.2 LPI Modes Demonstrated through Test
  • 1.3.3 Summary of LPIR Program Results
  • 1.3.4 LPIS Typical Technology
  • 1.3.5 LPI Maximizes Uncertainty
  • 1.4 Basic LPI Equations
  • 1.4.1 Radar and Beacon Equations
  • 1.4.2 Intercept Power Relations and LPIS Figures of Merit
  • 1.4.3 Detection Range versus Intercept Range Equations
  • 1.5 Introduction to Radar Cross Section (RCS)
  • 1.5.1 Mathematical Basis
  • 1.5.2 RCS Phenomenology
  • 1.5.3 Estimating RCS
  • 1.6 Introduction to Signature Balance
  • 1.6.1 Radar Threat
  • 1.6.2 Infrared Threat
  • 1.6.3 Intercept Threat
  • 1.7 Exercises
  • 1.8 References

Inspec keywords: antenna radiation patterns; radar antennas; airborne radar; radar cross-sections; military radar; electronic countermeasures; military aircraft

Other keywords: Defense Advanced Research Projects Agency; stealth technology; DARPA; U.S. Air Force program; U.S. Navy programs; adversary guessing until; B-2; data link design; stealth research work; F-117A; stealth systems; stealth radar

Subjects: Radar equipment, systems and applications; Single antennas; Electronic warfare

Preview this chapter:
Zoom in

Introduction to Stealth Systems, Page 1 of 2

| /docserver/preview/fulltext/books/ra/sbra120e/SBRA120E_ch1-1.gif /docserver/preview/fulltext/books/ra/sbra120e/SBRA120E_ch1-2.gif

Related content

This is a required field
Please enter a valid email address