http://iet.metastore.ingenta.com
1887

Exploitation of the Environment

Exploitation of the Environment

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Introduction to RF Stealth — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A significant part of stealth strategy is concerned with exploiting the environment in every way possible, consistent with the mission requirements. This consists of exploiting not only the natural environment (atmospheric attenuation, clutter, and so forth) but also the man-made environment [such things as the electronic order of battle (EOB) and electronic countermeasures (ECM)]. In the last part of this chapter, an example LPI-interceptor scenario analysis will be performed. This analysis shows the essential elements of most LPI mission assessments. In the third chapter, there was a survey of the performance and parameters of current intercept receivers. This chapter shows, among other things, that the environment limits passive and active detection of stealth platforms rather than raw sensitivity.

Chapter Contents:

  • 4.1 Atmospheric Attenuation
  • 4.2 Clutter
  • 4.3 Terrain Masking
  • 4.4 Electronic Order of Battle
  • 4.4.1 Radar and EW Intercept EOB
  • 4.4.2 Radar Emitter EOB
  • 4.4.3 Electronic Countermeasures EOB
  • 4.5 RF Spectrum Masking
  • 4.5.1 Example Ambient Spectra
  • 4.5.2 Estimating Ambient Spectra
  • 4.5.3 Estimating Ambient Pulse Density
  • 4.6 Example Scenario Analysis
  • 4.6.1 Classification Usable Sensitivity
  • 4.6.2 Monte Carlo Simulations
  • 4.7 Typical Deployed Emitters
  • 4.8 Exercises
  • 4.9 References

Inspec keywords: radar clutter; military radar; radar cross-sections

Other keywords: LPI mission assessments; EOB; clutter; electronic countermeasures; atmospheric attenuation; stealth platform active detection; electronic order-of-battle; environment exploitation; LPI-interceptor scenario analysis; stealth platform passive detection; intercept receivers; mission requirements; ECM; stealth strategy

Subjects: Radar equipment, systems and applications

Preview this chapter:
Zoom in
Zoomout

Exploitation of the Environment, Page 1 of 2

| /docserver/preview/fulltext/books/ra/sbra120e/SBRA120E_ch4-1.gif /docserver/preview/fulltext/books/ra/sbra120e/SBRA120E_ch4-2.gif

Related content

content/books/10.1049/sbra120e_ch4
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address