SlideShare a Scribd company logo
Technical Seminar
Utkarsh Kulshrestha
11EBKEC207
Contents
Radar Stealth Technology
Working of Radars
Concept of RCS
Stealth Technology
Applications
Conclusion
Radar Stealth Technology
• RADAR means “Radio Detecting And Ranging” and
STEALTH means “Avoiding Detection”.
• Whereas ‘Radar Stealth Technology’is used to prevent the detection
of aircrafts or planes from radar systems.
Working Of Radars
 Calculation of location and shape
• The location and shape of the target is detected by using
DSP(Digital Signal Processing) methods.
Concept of RCS
• RCS means Radar Cross-section Area.
• Radar cross section is the measure of a target's ability to reflect radar
signals in the direction of the radar receiver.
• Target’s RCS(F) is visualized as the product of three factors:
F = Projected cross section x Reflectivity x Directivity.
Stealth Technology
• No aircraft is totally invisible to radar, stealth technology prevents
conventional radar from detecting or tracking the aircraft effectively.
• By employing a combination of features to interfere with radar as well as
reduce visibility in the infrared, visual and radio frequency (RF) spectrum
• Geometry:
• Avoiding orthogonal metal plates because this causes reflections.
Technical SeminarDate
For minimum RCS
Then we get the architecture like a bird
Absorption of electromagnetic waves:
• Internal construction that must be re-entrant triangles, so that radar waves
reflecting off the internal faces and losing energy.
• Incoherent scattering +destructive interference+10dB of attenuation + the
pyramid shapes + maximize number of bounces.
• Coatings are applied on the surface of stealth aircraft.
• Iron ball paint:-
It contains tiny spheres coated with carbonyl iron or ferrite.
Avoiding Infrared Detection:
• Heat is developed when the machines in aircraft are working and also due
to friction of air.
• Use compressed gas or liquid nitrogen to cool their internal parts.
Preventing noise detection:
• Aircrafts use slow-turning propellers to avoid being heard by enemy troops
below.
• High altitude.
• High speed.
Applications:-
• Military Operations-
Secret operations which is confidential.
Emergency protecting.
To become a powerful weapon nation.
(a strong nation can maintain peace in any situation )
Conclusion:
• In Modern days this Stealth Technology is playing a vital role in
Military operations. Every fighter plane designs is claiming to have
some sort of stealth technology to avoid detection there by reducing
the odds of a successful attack.
• This Radar Stealth technology is bringing a revolution in military
operations of the world.
• Having own technology can save money and nation.
THANK YOU
Queries

More Related Content

What's hot

Stealth Technology
Stealth TechnologyStealth Technology
Stealth Technology
Siddharth Bhatnagar
 
Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Naeem Rezghi
 
Aircraft stealth technology discussed
Aircraft stealth technology discussedAircraft stealth technology discussed
Aircraft stealth technology discussed
Ashish Joshi
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
wardady
 
Ankit ppt
Ankit pptAnkit ppt
Ankit ppt
ankit chhajed
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
Shubham Chauhan
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
Manish Rajpoot
 
stealth technology (paper presentation )
stealth technology (paper presentation )stealth technology (paper presentation )
stealth technology (paper presentation )
PANKAJ YADAV
 
Stealth tech
Stealth techStealth tech
Stealth tech
Nandini Nagaraj
 
Presentation FINAL
Presentation FINALPresentation FINAL
Presentation FINALAnu Gupta
 
Stealth technology(supreeth)
Stealth technology(supreeth)Stealth technology(supreeth)
Stealth technology(supreeth)supreethmysore
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
Rakesh Rao
 
Stealth technology rkm
Stealth technology rkmStealth technology rkm
Stealth technology rkm
No Idea
 
Stealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnishStealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnish
Rajnish Priyadarshi
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
Hanim MS
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technologyamtul muneeb
 
Stealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare PresentationStealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare Presentation
Siddharth Bhatnagar
 
Report on Stealth technology
Report on Stealth technology Report on Stealth technology
Report on Stealth technology
Rohan Bhavsar
 

What's hot (20)

Stealth Technology
Stealth TechnologyStealth Technology
Stealth Technology
 
Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]Stealth Technology [Naeem Rezghi]
Stealth Technology [Naeem Rezghi]
 
Aircraft stealth technology discussed
Aircraft stealth technology discussedAircraft stealth technology discussed
Aircraft stealth technology discussed
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Ankit ppt
Ankit pptAnkit ppt
Ankit ppt
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
stealth technology (paper presentation )
stealth technology (paper presentation )stealth technology (paper presentation )
stealth technology (paper presentation )
 
Stealth tech
Stealth techStealth tech
Stealth tech
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Presentation FINAL
Presentation FINALPresentation FINAL
Presentation FINAL
 
Stealth technology(supreeth)
Stealth technology(supreeth)Stealth technology(supreeth)
Stealth technology(supreeth)
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Stealth technology rkm
Stealth technology rkmStealth technology rkm
Stealth technology rkm
 
Stealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnishStealth fightr ppt 5th sem rajnish
Stealth fightr ppt 5th sem rajnish
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Stealth aircraft technology ppt
Stealth aircraft technology pptStealth aircraft technology ppt
Stealth aircraft technology ppt
 
Presentation on stealth technology
Presentation on stealth technologyPresentation on stealth technology
Presentation on stealth technology
 
Stealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare PresentationStealth Technology in Naval Warfare Presentation
Stealth Technology in Naval Warfare Presentation
 
Report on Stealth technology
Report on Stealth technology Report on Stealth technology
Report on Stealth technology
 

Similar to Stealth technology

STEALTH technology.pptx
STEALTH technology.pptxSTEALTH technology.pptx
STEALTH technology.pptx
KrishnaSKulkarni
 
Radar crossection area reduction techniques presentation
Radar crossection area reduction techniques presentationRadar crossection area reduction techniques presentation
Radar crossection area reduction techniques presentation
MUKULWADHOKAR
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
Ashish Singh Yadav
 
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFTTechnical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
Anjan Kumar
 
A Review of Stealth Technology
A Review of Stealth TechnologyA Review of Stealth Technology
A Review of Stealth Technology
ijtsrd
 
Stealth technology ppt
Stealth technology pptStealth technology ppt
Stealth technology ppt
bharatyadav83
 
Stealth Technology
Stealth Technology Stealth Technology
Stealth Technology
abdulsamad alhamawande
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
wardady
 
Radar Cross Section Reduction
Radar Cross Section ReductionRadar Cross Section Reduction
Radar Cross Section Reduction
yashwanth sankoju
 
Stealth Radar
Stealth RadarStealth Radar
Stealth Radar
Pramod Devireddy
 
Stealth technology
Stealth technology Stealth technology
Stealth technology
Rohan Bhavsar
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
IJRISE Journal
 
Indra Radar
Indra RadarIndra Radar
Indra Radar
drdo012345
 
Stealth Radar
Stealth RadarStealth Radar
Stealth Radar
Pramod Devireddy
 
D0312015019
D0312015019D0312015019
D0312015019
inventy
 
1567084176507_1567009886044_Radar signal processing.pdf
1567084176507_1567009886044_Radar signal processing.pdf1567084176507_1567009886044_Radar signal processing.pdf
1567084176507_1567009886044_Radar signal processing.pdf
Marthas14
 
stealthtechnologysupreeth.pptx
stealthtechnologysupreeth.pptxstealthtechnologysupreeth.pptx
stealthtechnologysupreeth.pptx
RohitRaj744272
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technologyPragati Garg
 

Similar to Stealth technology (20)

STEALTH technology.pptx
STEALTH technology.pptxSTEALTH technology.pptx
STEALTH technology.pptx
 
Radar crossection area reduction techniques presentation
Radar crossection area reduction techniques presentationRadar crossection area reduction techniques presentation
Radar crossection area reduction techniques presentation
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFTTechnical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
Technical seminar on STEALTH TECHNOLOGY IN AIRCRAFT
 
A Review of Stealth Technology
A Review of Stealth TechnologyA Review of Stealth Technology
A Review of Stealth Technology
 
Stealth technology ppt
Stealth technology pptStealth technology ppt
Stealth technology ppt
 
Stealth Technology
Stealth Technology Stealth Technology
Stealth Technology
 
Stealth technology
Stealth technologyStealth technology
Stealth technology
 
Stealth
StealthStealth
Stealth
 
Radar Cross Section Reduction
Radar Cross Section ReductionRadar Cross Section Reduction
Radar Cross Section Reduction
 
Stealth Radar
Stealth RadarStealth Radar
Stealth Radar
 
Stealth technology
Stealth technology Stealth technology
Stealth technology
 
6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT6th GENERATION STEALTH AIRCRAFT
6th GENERATION STEALTH AIRCRAFT
 
Stealth tech
Stealth techStealth tech
Stealth tech
 
Indra Radar
Indra RadarIndra Radar
Indra Radar
 
Stealth Radar
Stealth RadarStealth Radar
Stealth Radar
 
D0312015019
D0312015019D0312015019
D0312015019
 
1567084176507_1567009886044_Radar signal processing.pdf
1567084176507_1567009886044_Radar signal processing.pdf1567084176507_1567009886044_Radar signal processing.pdf
1567084176507_1567009886044_Radar signal processing.pdf
 
stealthtechnologysupreeth.pptx
stealthtechnologysupreeth.pptxstealthtechnologysupreeth.pptx
stealthtechnologysupreeth.pptx
 
Report on RADAR stealth technology
Report on RADAR stealth technologyReport on RADAR stealth technology
Report on RADAR stealth technology
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Stealth technology

  • 2. Contents Radar Stealth Technology Working of Radars Concept of RCS Stealth Technology Applications Conclusion
  • 3. Radar Stealth Technology • RADAR means “Radio Detecting And Ranging” and STEALTH means “Avoiding Detection”. • Whereas ‘Radar Stealth Technology’is used to prevent the detection of aircrafts or planes from radar systems.
  • 4. Working Of Radars  Calculation of location and shape • The location and shape of the target is detected by using DSP(Digital Signal Processing) methods.
  • 5. Concept of RCS • RCS means Radar Cross-section Area. • Radar cross section is the measure of a target's ability to reflect radar signals in the direction of the radar receiver. • Target’s RCS(F) is visualized as the product of three factors: F = Projected cross section x Reflectivity x Directivity.
  • 6. Stealth Technology • No aircraft is totally invisible to radar, stealth technology prevents conventional radar from detecting or tracking the aircraft effectively. • By employing a combination of features to interfere with radar as well as reduce visibility in the infrared, visual and radio frequency (RF) spectrum • Geometry: • Avoiding orthogonal metal plates because this causes reflections.
  • 9. Then we get the architecture like a bird
  • 10. Absorption of electromagnetic waves: • Internal construction that must be re-entrant triangles, so that radar waves reflecting off the internal faces and losing energy. • Incoherent scattering +destructive interference+10dB of attenuation + the pyramid shapes + maximize number of bounces.
  • 11. • Coatings are applied on the surface of stealth aircraft. • Iron ball paint:- It contains tiny spheres coated with carbonyl iron or ferrite. Avoiding Infrared Detection: • Heat is developed when the machines in aircraft are working and also due to friction of air. • Use compressed gas or liquid nitrogen to cool their internal parts.
  • 12. Preventing noise detection: • Aircrafts use slow-turning propellers to avoid being heard by enemy troops below. • High altitude. • High speed. Applications:- • Military Operations- Secret operations which is confidential. Emergency protecting. To become a powerful weapon nation. (a strong nation can maintain peace in any situation )
  • 13. Conclusion: • In Modern days this Stealth Technology is playing a vital role in Military operations. Every fighter plane designs is claiming to have some sort of stealth technology to avoid detection there by reducing the odds of a successful attack. • This Radar Stealth technology is bringing a revolution in military operations of the world. • Having own technology can save money and nation.