Introduction to RF Stealth
Author: D. Lynch
Product Code: PBRA0130
Pagination: 570pp. plus CDROM
Stock Status: In stock
£84.50 Member price
£130.00 Full price
Scope: This is the only book focused on the complete aspects of RF Stealth design. It is the first book to present and explain first order methods for the design of active and passive stealth properties. Everything from Electronic Order of Battle to key component design is covered.
The book is a "How to" reference, allowing estimation of RCS, emitter interceptability, IR signature with speed, emitter footprints, terrain obscuration and target visibility, ambient spectra, ambient pulse density, detection performance, antenna, filter and pulse compression sidelobes, emitter location accuracy, stealthy pulse compression design, stealthy antenna design, signal processor performance, and more. Unique compilations of the leading parameters of many emitters and interceptors are included, as is analytical software for each chapter.
Stealth was a major military breakthrough very much in today’s news. Though the author has been pioneering modern stealth techniques since 1975, necessary requirements of security has kept this material from becoming widely known. The book’s purpose is to provide a new generation of designers with a firm and proven basis for new developments and to allow buyers of stealth technology to separate the charlatans from serious engineers.
Key features of this book include the fact that there is no competing title on the market; this will be the standard text for years to come. All analysis is presented on a first order basis: simplest approach, use of approximations, intuitive reasoning, many examples. The book’s practical "How to" approach incorporates recipes and examples for estimation of critical performance parameters. Includes 368 figures, 74 tables, 328 equations and 108 items of analytical software.
It is available from the UK sales department only.
About the Author
David L. Lynch, Jr. was involved in almost every stealth programme as technical contributor, programme manager and business unit leader including LPIR, Have Blue, F-117, Tacit Blue, Sea Shadow, Advanced Cruise Missile, B-2 and many others. Mr. Lynch was a technical contributor to dozens of radar, EW and communications systems.
He has been elected a Pioneer of Stealth, a Senior Member of American Institute of Aeronautics and Astronautics, and a Fellow of the Institute of Electrical and Electronic Engineers. The author was an inventor, leader or contributor to many world firsts, including manned space flight, telecommunications, digital signal processing, synthetic aperture radar, and stealth. Mr. Lynch was a company officer of General Motors Hughes Electronics. He is currently president of DL Sciences, Inc.
"The subject of stealth is now part of our everyday vocabulary. Even schoolchildren are familiar with the bizarre shapes of the F-117A and B-2 aircraft, and know that they are supposed to be 'invisible to radar'. The details of stealth technology have inevitably been shrouded in secrecy, although all of the concepts are based on sound physical principles, and more recently some of the material has been declassified.
A book that explains the nature of stealth technology and its advantages and its limitations, is bound to be of great interest, and the author, who has spent a career spanning over four decades working in this domain, is well qualified to write it.
A key first point of the book is that stealth is not just a matter of low platform radar cross section. It depends on the passive signature of the system (including its sensors) at all frequencies (RF, IR and optical) and it depends on detectability of all of the signals radiated by the system and its sensors and communications (again, at all frequencies, and including acoustic emissions).
There is no point in minimising one part of the system's signature if another part causes it to stick out like the proverbial sore thumb! Thus the book treats the whole subject of stealth (and counterstealth), from a variety of perspectives.
The book is organized in seven chapters. The first sets out the principles of stealth, including a brief historical perspective. The second and third chapters quantify the performance of a variety of signal interception systems against different signals, emphasizing the importance of low antenna sidelobes. Chapter 4 describes the ways in which the environment may be exploited by a stealth target, by terrain masking, clutter and spectrum masking.
The fifth chapter provides a detailed discussion of coding techniques for high time-bandwidth product waveforms, to provide low probability of intercept (LPI). This is followed by a treatment of the subject of antenna radar cross section, including the design of radomes and frequency selective surfaces (FSSs). This is an important subject, and the coverage is detailed and comprehensive. Finally, the seventh chapter discusses signal-processing techniques used in modern radar and electronic warfare systems.
The style of the book is clear, logical and accessible. Diagrams and graphs are used to good effect, and where possible, numerically worked examples are given. Each chapter concludes with a set of problems, and another valuable feature is that a CD is provided with a set of MathCAD spreadsheet programs to calculate various aspects of stealth system performance.
All of this adds up to an impressive and rather unique publication. This book will be invaluable to practicing engineers in the radar and electronic warfare domains. Whilst it is eminently suitable for self-study, it will no doubt also form the basis of short courses for industry and the military, as well as graduate-level courses at universities." Professor H.D. Griffiths University College London
An essential reference for analysts, designers, acquirers and managers of stealth platforms and stealth electronics, as well as counter-stealth workers worldwide. Radar, communications, and EW engineers, as well as surface and airborne platform architects, will find this book a valuable reference.85
1: Introduction To Stealth Systems. 2: Interceptability Parameters And Analysis. 3: Intercept Receivers. 4: Exploitation Of The Environment. 5: Stealth Waveforms. 6: Stealth Antennas And Radomes. 7: Signal Processing