SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 10ǁ October 2013 ǁ PP.18-22

Promising Stealth Technology Protocols in Defence
Prasanna Puttaswamy1, Pramod Srivatsa Krishna Murthy2
1, 2

Prospective Research Scholars, Mysore, India.

ABSTRACT: In modern world, stealth technology has emerged with an utmost importance in the field of
defence. Stealth technology's prime factor is to reduce/avoid the aircraft detection in enemy radar system. A
normal combat aircraft can easily be detected on every radar system which poses an advantage to the enemies.
In order to gain combat advantage, now a day’s aircrafts are integrated with some of most
prominent/sophisticated stealth technology to reduce visibility of the aircraft on enemy radar. In recent years,
advancement in engineering and signal processing field made it possible for stealth technology realization in
aircraft to deceive the enemy radar system effectively. However we are able to reduce visibility to certain limit
due to some constraints either from environment or lack or even more sophisticated advanced radar system.
Some important researches were carried out and succeeded enough to name it as stealth technology; one such is
echo cancellation in aircraft. This paper presents and describes the stealth technologies, which are more
prominent. These protocols can be realised practically with extensive research in these fields. Some of the
technologies explained are so promising, it gives us almost zero visibility in other words it is almost impossible
to detect aircraft even by some advanced radar system.

KEYWORDS: Controlled Intrinsic Impedance, RADAR, Stealth Technology.
I.

INTRODUCTION

RADAR (RAdio Detection And Ranging) is a technology which finds most versatile usage in military
applications due to its ability in detection of objects using Electromagnetic waves that are invisible for the
human eyes. The principle behind its operation is quiet simple, an antenna (transmitter) capable of converting
electrical energy into radio waves is used to shoot the Electromagnetic waves in a particular direction, if, an
object is struck by this wave, certain amount of this wave is reflected back to the source point where another
antenna (receiver) is used to capture the echoed wave. Thus depending on the intensity of this echo the
approximate distance & height of the object is calculated. To be on a winning side in a war, the basic aspect is
being sneaky enough to enter an enemy ground without giving a clue to them. For a team, to do the said, they
should have a technology which could make them invisible to the eyes of the enemy RADAR. Stealth mode of
operation not only benefits towards gaining an upper hand in the war but also helps the ground troops to foresee
the challenges they may face once entered into the enemies’ territory. One of the main challenges to be
considered in adapting the stealth features to the vehicle is its performance, the implementing of defensive
stealth layers to the aircraft should be done with minimum or with no compromise on the aircraft’s performance
in the battlefield. This paper gives a detailed picture on the technologies that are available on the ‘Stealth mode
of operation’ for a vehicle especially briefing on different ways to make an aircraft invisible to the eyes of the
enemy RADAR system. There are several parametric techniques in which one has to gain knowledge to make
an aircraft stealthy enough to sneak without any trace. Some of widely recognised parameters one should get a
sight on include:







Shape of the aircraft
Stealth materials to be used
Radar cross section element
Infrared radiation reduction
Visual detection reduction
Active stealth monitoring

Although there is several stealth techniques based on different parameters, this paper gives a sight on stealth
technologies that are in contrast to the Radar technologies. ‘Radar Cross section technique’ is one of the
categories which are most widely debated & researched segment as it comes under target shaping, material
selection & coating, passive cancellation and active cancellation. A paper on Radar cross section reduction [1]
was referred in which the visibility of the aircraft was reduced to a margin of 20% compared with the aircraft
without this system. The system uses pre calculated approach with the values of Omni directional RCS, clutter
& noise databases were calculated in advance. This system utilised active cancellation technique where in a
cancellation signal is transmitted alongside the incoming signal in real time,

www.ijesi.org

18 | Page
Promising Stealth Technology...
which indeed provides the phase and amplitude required to cancel the coherent echo signal. System
showed an approach to generate an anti phased electromagnetic signal to a target’s scattered signal with the
required expressions to achieve the real time characteristics of electromagnetic waves. The surface of the
aircraft also plays a major role in its ability to being invisible, the use of materials which absorb the
electromagnetic waves rather than reflecting back should be considered for the body building of the aircraft.
Some of the most promising protocols those can be referred/termed as stealth technology are listed below,





Automatic Jammer’s: In this, signal generator are employed/incorporated in aircraft which generates and
transmits the exact replica of source wave.
Low Reflecting materials: The more commonly/widely used technology is, using low reflective materials to
manufacture aircraft.
Controlled Intrinsic Impedance: This technology will majorly involve controlling the surrounding
environment around aircraft, to achieve low reflection co-efficient.
Advanced Aircraft Design: In this protocol either surface or the design of an aircraft is changed to suits low
reflection of microwaves.
These protocols are explained in following section

II.

STEALTH PROTOCOLS

2.1 Automatic Jamming System:For clear understanding of the concept let us consider the object that has to be identified as an aircraft.
In order to deceive the radar we must reduce the radar cross section. There are several ways to minimize/reduce
the RCS, one such technique is an Active cancellation. This is nothing but Automatic Jamming System. An
Active cancellation technique works by transmitting coherent micro wave which is replica of an incident wave
at the exact time of incident wave at real time. To avoid detection in radar to greater extent System must
transmit the cancellation signal at the exact time of incidence with proper orientation, phase, and
amplitude/energy.
When a signal strikes an aircraft, the receiver employed in the aircraft receives the signal
then analyses the signal to obtain the orientation, frequency, phase and polarization to that source. Then the echo
signal is generated & transmitted into the free space, which is practically difficult to achieve in real-time. Hence,
we must employ database of noise signals in the system to avoid delay in the signal processing.
Considering the electric field component of an incident signal as 1E+
Some amount of signal is reflected back & some are transmitted,
i.e. 1E+ + 1E- = 2E+ --------------------------------------------------------(1)
+
Where
1E is incident signal
1E is reflected signal from aircraft
+
2E transmitted signal
Then the echo cancellation signal can be expressed as
S = 20log
----------------------------------------------------------------------------------- (2)
Where Ec is cancellation residual field and Es target scattering field [], the complete invisible is
achieved when S=0.
This protocol poses challenges especially in signal reconstructing and echo signal cancellation. However one
can find the solution for this by improvising the noise cancellation technique. Since echo cancellation signal will
always not the exact replica of the source wave.
2.2 Materials:
We all know that the radar works on the principle where micro waves are used to detect aircraft by
analysing the reflected signal from the aircraft. All metal or objects will have their own reflecting properties,
Hence sometimes the aircraft, particularly the stealth aircraft’s are designed with such low reflecting material or
coated with the material which will absorb the signal rather than reflecting the incident signal back to the source.
These kinds of aircrafts possess a very poor result in radar’s detecting performance.
2.3 Controlled Environment round an Object:
Another most promising stealth technology is by controlling the surrounding environment around any
airplane (object), achieves/avoids the detection in any Radar System. This technology is most promising,
because, once we achieve to control it then the implemented aircraft will be impossible to be detected by any
radar/antenna as to alter environment to their benefits. In other words the radar/antenna has no control over this
changed environment what’s so ever, this gives us enormous advantage. However this might be very difficult
for any to achieve.

www.ijesi.org

19 | Page
Promising Stealth Technology...
Radar locates any airplane (object) by reflected micro/radio waves from that airplane (object), even
micro/radio waves has certain limits while propagating in free space. Micro/radio/any waves propagates in
electro-magnetic form, both are vector quantities. Consider the Electric field of wave is E and Magnetic field as
H, All the waves propagating in free space is opposed which is termed as wave impedance or intrinsic
impedance theta
Intrinsic impedance is defined as ratio of the electric field to magnetic field of wave.
i.e.
--------------------------------------------------------------(3)
Now the Power of any sine wave in free space is given by, according to pointing theorem
P
w/m2 --------------------------------------------- (4)
However average power density is given by
Pavg
----------------------------------------------------------------------------------- (5)
Now let’s see the relationship between the reflected wave and incident wave when incident wave contact/hits
the airplane (object)
1E = 2E
+
+
1E +1E = 2E ---------------------------------------------------------------- (6)
+
Where 1E is an incident signal/wave, 1E- is reflected signal/wave from aircraft and 2E+ is transmitted
wave/signal
Similarly magnetic component will be
+
+
1H + 1H = 2H
The reflection co-efficient is given by
--------------------------------------------------------------------- (7)
Where
is intrinsic impedance of region 1 (free space) and
is intrinsic impedance of region 2 (controlled
region around airplane).
Now the average power density of reflected wave in terms of incident wave and reflection co-efficient can be
expressed
+
+
1P av =
1P av ---------------------------------------------------- (8)
From the above equation, reduce in reflection co-efficient results in reduced reflected power density. In order to
reduce the reflection co-efficient we must control either intrinsic impedance of region 1 or region 2 (object
region). This is what we must achieve.
Now consider ƞ1 = 10, ƞ2 = 20 and 1E+ = 100
Then
г=
Г= 0.33
Hence 1P-av = 33 w/m2
Let us change intrinsic impedance of region 2 (around airplane) ƞ2 = 10.2
Then
Г= 0.01 (approximately)
Hence 1P-av = 0.01 w/m2
By observing the above calculation one can say the controlled environment around airplane (object) /
intrinsic impedance around airplane results in low reflection co-efficient which in turn reduces the reflected
power as mentioned earlier, allows any airplane (object) to travel without any detection by any radar’s.
2.4 Multidisciplinary surface fabrication:
Incidence of microwave at aircraft body happens at a particular angle, finding this angle & considering
this as to be a constant parameter & if it happens to control the angle as to the echoed wave never reaches the
point of source can be achieved with an incredible knowledge on the incident wave. Thus, achieving this can
make the echoed wave to never reach the source or at least making it less intense so that it can never be traced at
the source. If the said is made possible then it makes this protocol a perfect stealth technology for an aircraft.
Now let’s practically see whether this proposal can be implemented in real time or not. We know that angle of
incidence is equal to the angle of reflection:
i=r
----------------------------------------------(8)
It is obvious that we may not able to change the angle of incidence but it is possible to change the angle of
reflection by changing the surface of the aircraft or at least changing the intensity of the reflected wave. This
would effectively reduce the chances of aircraft being detected by the enemy radar. Now let us consider the
incident wave to be at different time with different angle as shown in Fig 1. With different angle the reflected
wave would not be as same as required by the receiver to spot the aircraft due to less intense wave.

www.ijesi.org

20 | Page
Promising Stealth Technology...

Plane Surface

Incident Wave

Reflected Wave

fig 1: oblige incidence

III.

CONCLUSION:

Some of the most prominent & reliable protocols available are explained in this paper with the aid of
essential mathematical expression as a proof to support the protocols. it can be said that third & fourth protocols
explained in the paper are best till date due to their efficiency to make an aircraft almost fully invisible. Due to
our feasibility & resource exposure we are on a preparation to attempt the fourth protocol for its experimental
approach.

IV.

ACKNOWLEDGEMENT

We take this opportunity to express our profound gratitude and deep regards to Dr. Bindu Anil Thomas
HOD Electronic and Communication Department VVIET, Mysore for her exemplary guidance, monitoring and
constant encouragement throughout the course of this paper. The blessing, help and guidance given by her time
to time shall carry us a long way in the journey of life on which we are about to embark.
We also take this
opportunity to express a deep sense of gratitude to Mr Narayanaswamy, Associate Prof. E&C Dept. VVIET,
Mysore for his cordial support, valuable information and guidance. We are obliged to Mr Kiran Kumar S, Mr.
Mohan T N and Mr. Abhilash V Illur, Students of VII Semester E&C Dept. VVIET, Mysore. for the valuable
information provided by them in their respective fields. We are grateful for their cooperation and Assistance
during the period of our assignment.

REFERENCE
[1]
[2]
[3]
[4]
[5]

Anon, Radar Jamming and Deception. http://en.wikipedia.org/wiki/Radar_jamming_and_deception [Accessed on 20/07/2013]
Isam Abdelnabi Osman;Abd Alrasoul Jabar Alzebaidi, Active Cancellation System for Radar Cross Section Reduction,
int.j.educ.res. 2013, 1(7), http://www.ijern.com/journal/July-2013/12.pdf, [Accessed on 08/08/2013]
Anon, Radar Cross Section, http://en.wikipedia.org/wiki/Radar_cross-section [Accessed on 19/08/2013]
S K Chatterjee; Rajeswari Chatterjee. Some Recent Advances in Microwaves- A Review Def.Sci.J, 1990, 40(1), 25-38.
http://publications.drdo.gov.in/ojs/index.php/dsj/article/view/4448/2625 [Accessed on 25/08/2013]
Sandor Vass, Stealth Technology Deployed in battlefield, AARMS, 2003, 2(2), 257-269,
http://aarms.uninke.hu/docs/Volume2/Issue2/pdf/08vass.pdf [Accessed on 28/08/2013]

AUTHORS:
Mr. Prasanna Puttaswamy obtained his BE (Electricals & Electronics) from VTU in
2010 and M.Sc Honours (Embedded Microelectronics and Wireless System) from
Coventry University UK, in 2012. He presently involved in experiment on sound wave
and publication. His area of interest: Antenna, Embedded System, Radar and Microwave
Engineering. E-mail id: prasanna.p06@gmail.com

www.ijesi.org

21 | Page
Promising Stealth Technology...
Mr. Pramod Srivatsa Krishna Murthy, born in 1988, India, graduated with B.E
in Electricals & Electronics Engineering in 2010 & obtained MSc honours in
Embedded Microelectronics & Wireless Systems from Coventry University of UK
in 2012. Currently working in a local embedded firm with alongside involvement
in technical experiments & publications and ambitious to be a Research Scholar.
Areas of interest are: Embedded Systems, Microwave Engineering, Antennas &
Radar systems with few publications in the mentioned areas. E- mail id:
prmdsrivatsa@gmail.com

www.ijesi.org

22 | Page

More Related Content

What's hot

IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET Journal
 
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...Leonardo
 
IRJET- Mars Exploration Rover
IRJET- Mars Exploration RoverIRJET- Mars Exploration Rover
IRJET- Mars Exploration RoverIRJET Journal
 
2014_04_msw_a4_format (2)
2014_04_msw_a4_format (2)2014_04_msw_a4_format (2)
2014_04_msw_a4_format (2)saransh kumar
 
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI EngineersEXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI EngineersSPI Engineers
 
introduction to radar
 introduction to radar introduction to radar
introduction to radarabdulrehmanali
 
Wss Paper Integrated Underwater Surveillance System
Wss Paper Integrated Underwater Surveillance SystemWss Paper Integrated Underwater Surveillance System
Wss Paper Integrated Underwater Surveillance Systemgamlehaugen
 
OTDR OPERATION BASICS
OTDR OPERATION BASICSOTDR OPERATION BASICS
OTDR OPERATION BASICSimtfiber
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET Journal
 
Radar Cross Section Reduction
Radar Cross Section ReductionRadar Cross Section Reduction
Radar Cross Section Reductionyashwanth sankoju
 
RADAR AND STEALTH TECHNOLOGY
RADAR AND STEALTH TECHNOLOGYRADAR AND STEALTH TECHNOLOGY
RADAR AND STEALTH TECHNOLOGYPaul singh
 
Anti stealth technology
Anti stealth technologyAnti stealth technology
Anti stealth technologyHossam Zein
 
Testing and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesTesting and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesLiving Online
 

What's hot (20)

Secure modem design
Secure modem designSecure modem design
Secure modem design
 
B04420812
B04420812B04420812
B04420812
 
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...IRJET-  	  Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
IRJET- Autonomous Operation and Controlling of Unmanned Ariel Vehicle (UA...
 
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...
Selex Es at ITEC 2014: Radar Simulation, from aircrews training to equipment ...
 
IRJET- Mars Exploration Rover
IRJET- Mars Exploration RoverIRJET- Mars Exploration Rover
IRJET- Mars Exploration Rover
 
Stealth Radar
Stealth RadarStealth Radar
Stealth Radar
 
2014_04_msw_a4_format (2)
2014_04_msw_a4_format (2)2014_04_msw_a4_format (2)
2014_04_msw_a4_format (2)
 
Radar stealth technology
Radar  stealth  technologyRadar  stealth  technology
Radar stealth technology
 
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI EngineersEXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
 
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY PiULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
 
introduction to radar
 introduction to radar introduction to radar
introduction to radar
 
Wss Paper Integrated Underwater Surveillance System
Wss Paper Integrated Underwater Surveillance SystemWss Paper Integrated Underwater Surveillance System
Wss Paper Integrated Underwater Surveillance System
 
Airborne radar
Airborne  radarAirborne  radar
Airborne radar
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
OTDR OPERATION BASICS
OTDR OPERATION BASICSOTDR OPERATION BASICS
OTDR OPERATION BASICS
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using Audio
 
Radar Cross Section Reduction
Radar Cross Section ReductionRadar Cross Section Reduction
Radar Cross Section Reduction
 
RADAR AND STEALTH TECHNOLOGY
RADAR AND STEALTH TECHNOLOGYRADAR AND STEALTH TECHNOLOGY
RADAR AND STEALTH TECHNOLOGY
 
Anti stealth technology
Anti stealth technologyAnti stealth technology
Anti stealth technology
 
Testing and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesTesting and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic Cables
 

Viewers also liked

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
CASE STUDY: HRS Heat Exchangers help Muntons close the loop
CASE STUDY: HRS Heat Exchangers help Muntons close the loopCASE STUDY: HRS Heat Exchangers help Muntons close the loop
CASE STUDY: HRS Heat Exchangers help Muntons close the loopMilling and Grain magazine
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Viewers also liked (7)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
CASE STUDY: HRS Heat Exchangers help Muntons close the loop
CASE STUDY: HRS Heat Exchangers help Muntons close the loopCASE STUDY: HRS Heat Exchangers help Muntons close the loop
CASE STUDY: HRS Heat Exchangers help Muntons close the loop
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Similar to International Journal of Engineering and Science Invention (IJESI)

C-UAS Technoligies.pptx
C-UAS Technoligies.pptxC-UAS Technoligies.pptx
C-UAS Technoligies.pptxNyeinchanSoe3
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFTIJRISE Journal
 
D0312015019
D0312015019D0312015019
D0312015019inventy
 
Stealth Technology
Stealth TechnologyStealth Technology
Stealth TechnologyROHITH
 
Application Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsApplication Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsRichard Hogue
 
A REVIEW ON SYNTHETIC APERTURE RADAR
A REVIEW ON SYNTHETIC APERTURE RADARA REVIEW ON SYNTHETIC APERTURE RADAR
A REVIEW ON SYNTHETIC APERTURE RADARAM Publications
 
Stealth technology
Stealth technologyStealth technology
Stealth technologywardady
 
Stealth technology
Stealth technologyStealth technology
Stealth technologywardady
 
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraft
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraftLidar obstacle-warning-and-avoidance-system-for-unmanned-aircraft
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraftBrett Johnson
 
IRJET- Radiosonde Payload for Weather Balloons
IRJET-  	  Radiosonde Payload for Weather BalloonsIRJET-  	  Radiosonde Payload for Weather Balloons
IRJET- Radiosonde Payload for Weather BalloonsIRJET Journal
 
IRJET- Inspection of Components with the Support of the Drones
IRJET- Inspection of Components with the Support of the DronesIRJET- Inspection of Components with the Support of the Drones
IRJET- Inspection of Components with the Support of the DronesIRJET Journal
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 

Similar to International Journal of Engineering and Science Invention (IJESI) (20)

C-UAS Technoligies.pptx
C-UAS Technoligies.pptxC-UAS Technoligies.pptx
C-UAS Technoligies.pptx
 
Caa khet
Caa khetCaa khet
Caa khet
 
Rangefinder pdf
Rangefinder pdfRangefinder pdf
Rangefinder pdf
 
STEALTH technology.pptx
STEALTH technology.pptxSTEALTH technology.pptx
STEALTH technology.pptx
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
 
D0312015019
D0312015019D0312015019
D0312015019
 
Stealth Technology
Stealth TechnologyStealth Technology
Stealth Technology
 
Application Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsApplication Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar Signals
 
A REVIEW ON SYNTHETIC APERTURE RADAR
A REVIEW ON SYNTHETIC APERTURE RADARA REVIEW ON SYNTHETIC APERTURE RADAR
A REVIEW ON SYNTHETIC APERTURE RADAR
 
myPresentation
myPresentationmyPresentation
myPresentation
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraft
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraftLidar obstacle-warning-and-avoidance-system-for-unmanned-aircraft
Lidar obstacle-warning-and-avoidance-system-for-unmanned-aircraft
 
IRJET- Radiosonde Payload for Weather Balloons
IRJET-  	  Radiosonde Payload for Weather BalloonsIRJET-  	  Radiosonde Payload for Weather Balloons
IRJET- Radiosonde Payload for Weather Balloons
 
Indra Radar
Indra RadarIndra Radar
Indra Radar
 
IRJET- Inspection of Components with the Support of the Drones
IRJET- Inspection of Components with the Support of the DronesIRJET- Inspection of Components with the Support of the Drones
IRJET- Inspection of Components with the Support of the Drones
 
R adar
R adarR adar
R adar
 
A0550110
A0550110A0550110
A0550110
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

International Journal of Engineering and Science Invention (IJESI)

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 10ǁ October 2013 ǁ PP.18-22 Promising Stealth Technology Protocols in Defence Prasanna Puttaswamy1, Pramod Srivatsa Krishna Murthy2 1, 2 Prospective Research Scholars, Mysore, India. ABSTRACT: In modern world, stealth technology has emerged with an utmost importance in the field of defence. Stealth technology's prime factor is to reduce/avoid the aircraft detection in enemy radar system. A normal combat aircraft can easily be detected on every radar system which poses an advantage to the enemies. In order to gain combat advantage, now a day’s aircrafts are integrated with some of most prominent/sophisticated stealth technology to reduce visibility of the aircraft on enemy radar. In recent years, advancement in engineering and signal processing field made it possible for stealth technology realization in aircraft to deceive the enemy radar system effectively. However we are able to reduce visibility to certain limit due to some constraints either from environment or lack or even more sophisticated advanced radar system. Some important researches were carried out and succeeded enough to name it as stealth technology; one such is echo cancellation in aircraft. This paper presents and describes the stealth technologies, which are more prominent. These protocols can be realised practically with extensive research in these fields. Some of the technologies explained are so promising, it gives us almost zero visibility in other words it is almost impossible to detect aircraft even by some advanced radar system. KEYWORDS: Controlled Intrinsic Impedance, RADAR, Stealth Technology. I. INTRODUCTION RADAR (RAdio Detection And Ranging) is a technology which finds most versatile usage in military applications due to its ability in detection of objects using Electromagnetic waves that are invisible for the human eyes. The principle behind its operation is quiet simple, an antenna (transmitter) capable of converting electrical energy into radio waves is used to shoot the Electromagnetic waves in a particular direction, if, an object is struck by this wave, certain amount of this wave is reflected back to the source point where another antenna (receiver) is used to capture the echoed wave. Thus depending on the intensity of this echo the approximate distance & height of the object is calculated. To be on a winning side in a war, the basic aspect is being sneaky enough to enter an enemy ground without giving a clue to them. For a team, to do the said, they should have a technology which could make them invisible to the eyes of the enemy RADAR. Stealth mode of operation not only benefits towards gaining an upper hand in the war but also helps the ground troops to foresee the challenges they may face once entered into the enemies’ territory. One of the main challenges to be considered in adapting the stealth features to the vehicle is its performance, the implementing of defensive stealth layers to the aircraft should be done with minimum or with no compromise on the aircraft’s performance in the battlefield. This paper gives a detailed picture on the technologies that are available on the ‘Stealth mode of operation’ for a vehicle especially briefing on different ways to make an aircraft invisible to the eyes of the enemy RADAR system. There are several parametric techniques in which one has to gain knowledge to make an aircraft stealthy enough to sneak without any trace. Some of widely recognised parameters one should get a sight on include:       Shape of the aircraft Stealth materials to be used Radar cross section element Infrared radiation reduction Visual detection reduction Active stealth monitoring Although there is several stealth techniques based on different parameters, this paper gives a sight on stealth technologies that are in contrast to the Radar technologies. ‘Radar Cross section technique’ is one of the categories which are most widely debated & researched segment as it comes under target shaping, material selection & coating, passive cancellation and active cancellation. A paper on Radar cross section reduction [1] was referred in which the visibility of the aircraft was reduced to a margin of 20% compared with the aircraft without this system. The system uses pre calculated approach with the values of Omni directional RCS, clutter & noise databases were calculated in advance. This system utilised active cancellation technique where in a cancellation signal is transmitted alongside the incoming signal in real time, www.ijesi.org 18 | Page
  • 2. Promising Stealth Technology... which indeed provides the phase and amplitude required to cancel the coherent echo signal. System showed an approach to generate an anti phased electromagnetic signal to a target’s scattered signal with the required expressions to achieve the real time characteristics of electromagnetic waves. The surface of the aircraft also plays a major role in its ability to being invisible, the use of materials which absorb the electromagnetic waves rather than reflecting back should be considered for the body building of the aircraft. Some of the most promising protocols those can be referred/termed as stealth technology are listed below,     Automatic Jammer’s: In this, signal generator are employed/incorporated in aircraft which generates and transmits the exact replica of source wave. Low Reflecting materials: The more commonly/widely used technology is, using low reflective materials to manufacture aircraft. Controlled Intrinsic Impedance: This technology will majorly involve controlling the surrounding environment around aircraft, to achieve low reflection co-efficient. Advanced Aircraft Design: In this protocol either surface or the design of an aircraft is changed to suits low reflection of microwaves. These protocols are explained in following section II. STEALTH PROTOCOLS 2.1 Automatic Jamming System:For clear understanding of the concept let us consider the object that has to be identified as an aircraft. In order to deceive the radar we must reduce the radar cross section. There are several ways to minimize/reduce the RCS, one such technique is an Active cancellation. This is nothing but Automatic Jamming System. An Active cancellation technique works by transmitting coherent micro wave which is replica of an incident wave at the exact time of incident wave at real time. To avoid detection in radar to greater extent System must transmit the cancellation signal at the exact time of incidence with proper orientation, phase, and amplitude/energy. When a signal strikes an aircraft, the receiver employed in the aircraft receives the signal then analyses the signal to obtain the orientation, frequency, phase and polarization to that source. Then the echo signal is generated & transmitted into the free space, which is practically difficult to achieve in real-time. Hence, we must employ database of noise signals in the system to avoid delay in the signal processing. Considering the electric field component of an incident signal as 1E+ Some amount of signal is reflected back & some are transmitted, i.e. 1E+ + 1E- = 2E+ --------------------------------------------------------(1) + Where 1E is incident signal 1E is reflected signal from aircraft + 2E transmitted signal Then the echo cancellation signal can be expressed as S = 20log ----------------------------------------------------------------------------------- (2) Where Ec is cancellation residual field and Es target scattering field [], the complete invisible is achieved when S=0. This protocol poses challenges especially in signal reconstructing and echo signal cancellation. However one can find the solution for this by improvising the noise cancellation technique. Since echo cancellation signal will always not the exact replica of the source wave. 2.2 Materials: We all know that the radar works on the principle where micro waves are used to detect aircraft by analysing the reflected signal from the aircraft. All metal or objects will have their own reflecting properties, Hence sometimes the aircraft, particularly the stealth aircraft’s are designed with such low reflecting material or coated with the material which will absorb the signal rather than reflecting the incident signal back to the source. These kinds of aircrafts possess a very poor result in radar’s detecting performance. 2.3 Controlled Environment round an Object: Another most promising stealth technology is by controlling the surrounding environment around any airplane (object), achieves/avoids the detection in any Radar System. This technology is most promising, because, once we achieve to control it then the implemented aircraft will be impossible to be detected by any radar/antenna as to alter environment to their benefits. In other words the radar/antenna has no control over this changed environment what’s so ever, this gives us enormous advantage. However this might be very difficult for any to achieve. www.ijesi.org 19 | Page
  • 3. Promising Stealth Technology... Radar locates any airplane (object) by reflected micro/radio waves from that airplane (object), even micro/radio waves has certain limits while propagating in free space. Micro/radio/any waves propagates in electro-magnetic form, both are vector quantities. Consider the Electric field of wave is E and Magnetic field as H, All the waves propagating in free space is opposed which is termed as wave impedance or intrinsic impedance theta Intrinsic impedance is defined as ratio of the electric field to magnetic field of wave. i.e. --------------------------------------------------------------(3) Now the Power of any sine wave in free space is given by, according to pointing theorem P w/m2 --------------------------------------------- (4) However average power density is given by Pavg ----------------------------------------------------------------------------------- (5) Now let’s see the relationship between the reflected wave and incident wave when incident wave contact/hits the airplane (object) 1E = 2E + + 1E +1E = 2E ---------------------------------------------------------------- (6) + Where 1E is an incident signal/wave, 1E- is reflected signal/wave from aircraft and 2E+ is transmitted wave/signal Similarly magnetic component will be + + 1H + 1H = 2H The reflection co-efficient is given by --------------------------------------------------------------------- (7) Where is intrinsic impedance of region 1 (free space) and is intrinsic impedance of region 2 (controlled region around airplane). Now the average power density of reflected wave in terms of incident wave and reflection co-efficient can be expressed + + 1P av = 1P av ---------------------------------------------------- (8) From the above equation, reduce in reflection co-efficient results in reduced reflected power density. In order to reduce the reflection co-efficient we must control either intrinsic impedance of region 1 or region 2 (object region). This is what we must achieve. Now consider ƞ1 = 10, ƞ2 = 20 and 1E+ = 100 Then г= Г= 0.33 Hence 1P-av = 33 w/m2 Let us change intrinsic impedance of region 2 (around airplane) ƞ2 = 10.2 Then Г= 0.01 (approximately) Hence 1P-av = 0.01 w/m2 By observing the above calculation one can say the controlled environment around airplane (object) / intrinsic impedance around airplane results in low reflection co-efficient which in turn reduces the reflected power as mentioned earlier, allows any airplane (object) to travel without any detection by any radar’s. 2.4 Multidisciplinary surface fabrication: Incidence of microwave at aircraft body happens at a particular angle, finding this angle & considering this as to be a constant parameter & if it happens to control the angle as to the echoed wave never reaches the point of source can be achieved with an incredible knowledge on the incident wave. Thus, achieving this can make the echoed wave to never reach the source or at least making it less intense so that it can never be traced at the source. If the said is made possible then it makes this protocol a perfect stealth technology for an aircraft. Now let’s practically see whether this proposal can be implemented in real time or not. We know that angle of incidence is equal to the angle of reflection: i=r ----------------------------------------------(8) It is obvious that we may not able to change the angle of incidence but it is possible to change the angle of reflection by changing the surface of the aircraft or at least changing the intensity of the reflected wave. This would effectively reduce the chances of aircraft being detected by the enemy radar. Now let us consider the incident wave to be at different time with different angle as shown in Fig 1. With different angle the reflected wave would not be as same as required by the receiver to spot the aircraft due to less intense wave. www.ijesi.org 20 | Page
  • 4. Promising Stealth Technology... Plane Surface Incident Wave Reflected Wave fig 1: oblige incidence III. CONCLUSION: Some of the most prominent & reliable protocols available are explained in this paper with the aid of essential mathematical expression as a proof to support the protocols. it can be said that third & fourth protocols explained in the paper are best till date due to their efficiency to make an aircraft almost fully invisible. Due to our feasibility & resource exposure we are on a preparation to attempt the fourth protocol for its experimental approach. IV. ACKNOWLEDGEMENT We take this opportunity to express our profound gratitude and deep regards to Dr. Bindu Anil Thomas HOD Electronic and Communication Department VVIET, Mysore for her exemplary guidance, monitoring and constant encouragement throughout the course of this paper. The blessing, help and guidance given by her time to time shall carry us a long way in the journey of life on which we are about to embark. We also take this opportunity to express a deep sense of gratitude to Mr Narayanaswamy, Associate Prof. E&C Dept. VVIET, Mysore for his cordial support, valuable information and guidance. We are obliged to Mr Kiran Kumar S, Mr. Mohan T N and Mr. Abhilash V Illur, Students of VII Semester E&C Dept. VVIET, Mysore. for the valuable information provided by them in their respective fields. We are grateful for their cooperation and Assistance during the period of our assignment. REFERENCE [1] [2] [3] [4] [5] Anon, Radar Jamming and Deception. http://en.wikipedia.org/wiki/Radar_jamming_and_deception [Accessed on 20/07/2013] Isam Abdelnabi Osman;Abd Alrasoul Jabar Alzebaidi, Active Cancellation System for Radar Cross Section Reduction, int.j.educ.res. 2013, 1(7), http://www.ijern.com/journal/July-2013/12.pdf, [Accessed on 08/08/2013] Anon, Radar Cross Section, http://en.wikipedia.org/wiki/Radar_cross-section [Accessed on 19/08/2013] S K Chatterjee; Rajeswari Chatterjee. Some Recent Advances in Microwaves- A Review Def.Sci.J, 1990, 40(1), 25-38. http://publications.drdo.gov.in/ojs/index.php/dsj/article/view/4448/2625 [Accessed on 25/08/2013] Sandor Vass, Stealth Technology Deployed in battlefield, AARMS, 2003, 2(2), 257-269, http://aarms.uninke.hu/docs/Volume2/Issue2/pdf/08vass.pdf [Accessed on 28/08/2013] AUTHORS: Mr. Prasanna Puttaswamy obtained his BE (Electricals & Electronics) from VTU in 2010 and M.Sc Honours (Embedded Microelectronics and Wireless System) from Coventry University UK, in 2012. He presently involved in experiment on sound wave and publication. His area of interest: Antenna, Embedded System, Radar and Microwave Engineering. E-mail id: prasanna.p06@gmail.com www.ijesi.org 21 | Page
  • 5. Promising Stealth Technology... Mr. Pramod Srivatsa Krishna Murthy, born in 1988, India, graduated with B.E in Electricals & Electronics Engineering in 2010 & obtained MSc honours in Embedded Microelectronics & Wireless Systems from Coventry University of UK in 2012. Currently working in a local embedded firm with alongside involvement in technical experiments & publications and ambitious to be a Research Scholar. Areas of interest are: Embedded Systems, Microwave Engineering, Antennas & Radar systems with few publications in the mentioned areas. E- mail id: prmdsrivatsa@gmail.com www.ijesi.org 22 | Page