Stealth Technology

Total Page:16

File Type:pdf, Size:1020Kb

Stealth Technology Stealth Technology Stealth technology, also termed LO technology (low observable technology) is a sub-discipline of military tactics which allows an aircraft to be partially invisible to Radar or any other means of detection. Stealth technology doesn’t make an aircraft completely invisible to radar. All it can do is to reduce the detection range of an aircraft. It is similar to the camouflage tactics used by soldiers in jungle warfare. It was in the late 1930s, when the first radar tracking systems were employed. The earliest stealth aircraft seems to have been the Horten Ho 229 flying wing. It included carbon powder in the glue to absorb radio waves. The other techniques adopted during that time included the use of Yehudi light by the RAF; the U boats (submarines) featured rubber coatings one layer of which contained circular air pockets to defeat ASDIC sonar. Principle Stealth technology is not a single technology. It is a combination of technologies that attempt to greatly reduce the distances at which a person or vehicle can be detected; in particular radar cross section reductions, but also acoustic, thermal, and other aspects. While designing a stealth aircraft, the following points are to be considered: - Reducing the imprint on radar screens / stifling radio transmissions - Turning down the heat of its infrared picture - Improved aerodynamics - Making the plane less visible. - Muffling the noise Reducing the Radar cross-section (RCS) Radar cross section (RCS) is a measure of how detectable an object is with radar. A larger RCS indicates that an object can be more easily detected. This is usually accomplished by • Vehicle shape: The possibility of designing aircraft in such a manner as to reduce their radar cross-section was recognized in the late 1930s, and it has been known since at least the 1960s that aircraft shape makes a significant difference in detect ability. The Avro Vulcan, a British bomber of the 1960’s, had a remarkably small appearance on radar despite its large size, whereas the Tupolev 95 Russian long range bomber appeared especially well on radar Another important factor is internal construction, a skin that is radar transparent or absorbing, behind which are structures termed re- entrant triangles is usually used; Radar waves penetrating the skin get trapped in these structures, reflecting off the internal faces and losing energy. Another method used is coating the cockpit canopy with a thin film transparent conductor helps to reduce the aircraft's radar profile. In addition to all these, the design of the tail and the burying of the engine within the fuselage, or in some cases the instillation of baffles to hide the air intake turbines are also incorporated. A stealthy shape must be devoid of complex bumps or protrusions of any kind. • Radar-absorbing material Radar-absorbent materials (RAM), often as paints, are used especially on the edges of the metal surfaces. While the material and thickness of RAM coatings is classified, the material seeks to absorb radiated energy from a ground or air based radar station and converts it to heat rather than reflect it back. These typically consist of carbon, carbon fibre composites, or magnetic ferrite-based substance. Flight-control surface can be made from honeycombed materials which reflect incoming radar waves internally rather than back to the radar. Radar-absorbing coatings can be applied to the surface of the body which effectively drain the energy of the radar signal. • Acoustics Acoustic in stealth, plays a primary role in submarine stealth as well as for ground vehicles. Submarines use extensive rubber mountings to isolate and avoid mechanical noises that could reveal locations to underwater passive sonar arrays. Early stealth observation aircraft used slow-turning propellers to avoid being heard by enemy troops below. Stealth aircraft that stay subsonic can avoid being tracked by sonic boom. The presence of supersonic and jet-powered stealth aircraft such as the SR-71 Blackbird indicates that acoustic signature is not always a major driver in aircraft design, although the Blackbird relied more on its extremely high speed and altitude • Visibility The simplest of the stealth techniques used is simply camouflage; the use of paint or other materials to colour and break up the lines of the vehicle or person. Most stealth aircraft use matte paint and dark colours, and operate only at night. Lately, interest in daylight Stealth (especially by the USAF) has emphasized the use of grey paint in disruptive schemes, and it is assumed that Yehudi lights could be used in the future to mask shadows in the airframe. • Infra-red Signature Infra-red signatures includes An exhaust plume contributes a significant infrared signature. One means to reduce IR signature is to have a non-circular tail pipe (a slit shape) to minimize the exhaust cross-sectional volume and maximize the mixing of hot exhaust with cool ambient air. The illustration shows the significant change in the infra-red signature of a plane when cool air is bypassed to the combustion chamber. Sometimes, the jet exhaust is vented above the wing surface to shield it from observers below, as in the B-2 Spirit. Reducing smoke in the exhaust is accomplished by improving the efficiency of the combustion chambers. Another way to reduce the exhaust temperature is to circulate coolant fluids such as fuel inside the exhaust pipe, where the fuel tanks serve as heat sinks cooled by the flow of air along the wings. • Radio Frequency (RF) emissions In addition to reducing infrared and acoustic emissions, a stealth vehicle must avoid radiating any other detectable energy, such as from onboard radars, communications systems, or RF leakage from electronics enclosures. • Low Level Flying Another technique used by aircraft to avoid radar is to fly at very low levels where there is a great deal of 'ground clutter', radar reflections given off by buildings and other objects. Low-level aircraft can go undetected by most radar systems. • Plasma Stealth In this the aircraft injects a stream of ionised gas which envelopes it and makes completely invisible. Drawbacks • Poor aerodynamic properties. • Requires high end electronic instruments and software's. • High maintenance cost. • Any stealthy vehicle becomes un-stealthy even when a door or hatch opens. Conclusion: Stealth Technology concludes its military applications in fighter Aircrafts, so that the aircrafts designed using this technology are almost invisible to Radar detection techniques and other sonar, Infrared detection methods. Stealth Technology is a step towards achieving invisibility. The first principle mainly concludes this by the reduction of RCS. .
Recommended publications
  • The Radar Game Understanding Stealth and Aircraft Survivability
    A MITCHELL INSTITUTE STUDY The Radar Game Understanding Stealth and Aircraft Survivability By Rebecca Grant September 2010 A mitchell inStitute Study 1 Brig. Gen. Billy Mitchell On September 12, 1918 at St. Mihiel in France, Col. Wil- liam Mitchell became the first person ever to command a major force of allied aircraft in a combined-arms opera- tion. This battle was the debut of the US Army fighting under a single American commander on European soil. Under Mitchell’s control, more than 1,100 allied aircraft worked in unison with ground forces in a broad offen- sive—one encompassing not only the advance of ground troops but also direct air attacks on enemy strategic tar- gets, aircraft, communications, logistics, and forces beyond the front lines. Mitchell was promoted to Brigadier General by order of Gen. John J. Pershing, commander of the American Expeditionary Force, in recognition of his com- mand accomplishments during the St. Mihiel offensive and the subsequent Meuse-Argonne offensive. After World War I, General Mitchell served in Washington and then became Commander, First Provisional Air Brigade, in 1921. That summer, he led joint Army and Navy demonstration attacks as bombs delivered from aircraft sank several captured German vessels, including the SS Ostfriesland. His determination to speak the truth about airpower and its importance to America led to a court-martial trial in 1925. Mitchell was convicted, and re- signed from the service in February 1926. Mitchell, through personal example and through his writing, inspired and en- couraged a cadre of younger airmen. These included future General of the Air Force Henry H.
    [Show full text]
  • Introduction to Camouflage and Deception
    INTRODUCTION TO CAMOUFLAGE AND DECEPTION JV Ramana Rao Director (Retd) Defence Laboratory Jodhpur DEFENCE RESEARCH & DEVELOPMENT ORGANISATION MINISTRY OF DEFENCE NEW DELHI - 110011 1999 DRDO Monographs/ Special Publications Series INTRODUCTION TO CAMOUFLAGE AND DECEPTION JV Ramana Rao Series Editors Editor-in -Chief Associate Editor-in-Chief Associate Editor SS Murthy M Singh Ashok Kumar Editor AsstEditor DS Bedi A Saravanan Production Printing Cover Design Marketing SB Gupta SK Saxena RK Dua SK Tyagi © 1999, Defence Scientific Information & Documentation Centre (DESIDOC), Defence R&D Organisation, Delhi-110 054. All rights reserved. Except as permitted under the Indian Copyright Act 1957, no part of this publication may be reproduced, distributed or transmitted, stored in a database or a retrieval system, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Publisher. The views expressed in the book are those of the author only. The Editors or Publisher do not assume responsibility for the statements/ opinions expressed by the author. ISBN: 81-86514-02-7 Printed and published by Director, DESIOOe, Metcalfe House, Delhi- IIO 054. CONTENTS Preface xvii Acknowledgements xix CHAPTER 1 INTRODUCTION 1 CHAPTER 2 MODERN MILITARY TECHNOLOGY AND ITS FUTURE 7 TRENDS 2.1 Introduction 7 2.2 Land Warfare 7 2.2.1 Main Battle Tank 8 2.2.2 The Infantry 9 2.2.3 The Artillery 9 2.2.4 Role of Air Defence 10 2.2.5 Nuclear, Biological and Chemical Warfare 10 2.2.6 Surveillance and Target Acquisition Systems 10 2.2.7 Command, Control and Communication (C3) 10 2.3 Air Warfare 11 2.3.
    [Show full text]
  • Radar Stealth Technology
    UCL Stealth Rader Cross Section Reductions on Aircrafts Name: GU JIATENG Tutor: Dr Dan Brown For PHAS 1901 Developing Effective Communication 1 1 / 6 1. Contents 1. Contents……………………………………………………………………………………….2 2. Intended Reader…………………………………………………………………………..2 3. Executive Summary……………………………………………………………………...2 4. Introduction………………………………………………………………………………….3 5. Radar Cross Section (RCS)…………………………………………………………….3 6. Ways to reduce RCS………………………………………………………………………3 6.1 Purpose Shaping……………………………………………………………………..3 6.2 Trap………………………………………………………………………………………..4 6.3 Radar Absorbing Materials……………………………………………………..4 6.4 Possible future development…………………………………………………..5 7. Limitations of RCS reductions on aircrafts…………………………………….5 8. Conclusions…………………………………………………………………………………..6 9. Sources…………………………………………………………………………………………6 2. Intended Readers This report is intended to be read by members of a research group who have an interest in physics and aeronautical engineering and wish to have a brief exploration of the development in RCS reduction technology 3. Executive Summary RCS reductions are the primary method to reduce radar observability. The main methods for RCS reductions are purpose shaping, absorption and trapping RCS reductions are accompanied by limitations such as high costs and poor aerodynamic performance 2 / 6 4. Introduction Since radar was first invented to watch the sky, it has been a long history for the opponents trying to penetrate the warning system to deliver airstrike. Early attempts by the German were to cover the surface of the aircrafts with wood and cloth to reduce RCS. (H-299 bomber was an accidental invention.) 5. Radar Cross Section (RCS) In the early 20th Century, Russian Mathematician Petr Yakovlevich Ufimtsev, first pointed out that RCS is also dependent on the physical geometry of the target, in his paper "Method of Edge Waves in the Physical Theory of Diffraction".
    [Show full text]
  • LESSON 2 the Signifi Cance of Stealth Aircraft
    LESSON 2 The Signifi cance of Stealth Aircraft OR MUCH OF THE FIRST HUNDRED YEARS of Quick Write aviation, the US military varied in its enthusiasm F for unmanned fl ight. During both world wars, the US sought ways to deliver bombs without putting American crews at risk. Experiments with unmanned If you had been an American aircraft went on. But after both wars, interest waned. military planner in 1982, what lessons do you think This pattern continued through the 20th century. would you have drawn from It held even after episodes like the shooting down the Israeli experience with drones in the Bekaa Valley? of Francis Gary Powers’s U-2 over the Soviet Union in 1962. This had made some military planners feel manned surveillance fl ights were too risky. But the United States continued largely to ignore the potential for unmanned fl ight. Learn About The turning point came in 1982, however. Israel • the development of launched a volley of unmanned decoy aircraft in stealth aircraft Lebanon’s Bekaa Valley. The valley was protected by • the development of precision weapons Syrian air defenses. The Syrians fell for the trick. They • the development of fi red their surface-to-air missiles back at the Israelis. unmanned aerial vehicles This let the Israelis know just where each launch site (UAVs) was. The Israelis then moved decisively to destroy the Syrian air defenses. It was a stunning victory. It got American attention. US defense offi cials suddenly saw the potential of unmanned aircraft. 410 CHAPTER 6 The Modern Air Force LESSON 2 The Signifi cance of Stealth Aircraft The Development of Stealth Aircraft Vocabulary As you read in Chapter 5, Lesson 4, stealth technology— • low-observable also called low-observable technology—goes back to the technology early 1970s.
    [Show full text]
  • Lockheed Martin's Skunk Works Division Has
    Lockheed Martin’s Skunk Works division has become a model for DOD acquisition. Secret Solutions From the Desert ockheed Martin’s supersecret Top Pentagon acquisition officials— acquisition reformers “have advocated “Skunk Works” advanced devel- Deputy Defense Secretary Robert O. a lean and less burdensome approach opment organization—producer Work and acquisition, technology, and to managing programs and to making of the U-2 and SR-71 spyplanes logistics chief Frank Kendall, to name major acquisition decisions. One ... is and the F-117 stealth jet aircraft, two—have made it a staple of recent the ‘Skunk Works’ approach, which dates Lamong a host of other highly classifi ed speeches that industry and government to the 1960s. This approach involves projects—is starting to break its traditional alike should emulate the Skunk Works small, highly competent government silence. This is driven in part by plaudits model. It’s unusual praise from officials from top Pentagon acquisition leaders and who ordinarily must be strictly agnos- Top: The most recent Skunk Works partly by a desire to be better understood tic in their comments about industry project to come out of the black was the RQ-170 Sentinel. Internet pho- by the public. vendors. tos have shown it in Afghanistan, on The special projects unit is at work Kendall started calling Skunk Works to Guam, and refueling from a tanker. on a fl urry of next generation concepts, the front of the class in his 2013 rollout Bottom: The Skunk Works facility in some of them discussed by leaders during of “Better Buying Power 2.0,” the second Palmdale, Calif.Two of its more famous a recent Air Force Magazine visit to the installment of his improved guidelines successes—the P-80 jet fi ghter and F-117 attack jet—sit on poles outside Skunk Works facility at Air Force Plant for Pentagon procurement managers.
    [Show full text]
  • Integrating Stealth
    Integrating Stealth Capt Todd Fisk, Capt Reiss Oltman, Capt Fleming Thompson, Capt Andrew Ward, Capt Carter Kunz, Capt Rebecca Scott, Capt Bret Laxton, and Capt Heinrich Bornhorst1 Throughout the history of air power, the technological advancements in the offensive weapon systems that are built and introduced onto the battlefield have consistently evolved at a significant pace. One may argue that when you compare these very advancements in offensive capabilities to the advancements in defensive capabilities there are actually no advancements at all, or is much less significant. Over the past two decades the United States has revolutionized the war fighting industry with advancements in Low Observable (LO) technology and precision strike capability. Advanced LO weapon systems such as the F-35, F-22 and the B-2 have been developed and portrayed as stealth aircraft. In fact, these weapon systems should be portrayed as having stealth technology; specifically in the physical sense referring to low observable. Because LO technology is in a physical form, methods can and have been developed to exploit the inherent weaknesses. Additionally, the technological advancements of social media in today's society impacts the ability to mask the footprint of mobilizing military forces; significantly reducing the element of surprise required to be effective against a near peer country. The Air Force as a whole needs to re-think our current strategy of air power. Current AF doctrine relies on LO technology to achieve a stealth advantage. This approach is inefficient and rapidly becoming less effective. In order to accomplish this shift in strategy, an entirely new platform of stealth needs to be written into our doctrine; ensuring the concept of stealth is embedded into our culture carrying on to the next generation of Airman.
    [Show full text]
  • Air Force Stealth Technology Review
    AIR FORCE STEALTH TECHNOLOGY REVIEW 10- 14 JUNE 1991 STEALTH WEEK BRIEF BOOK INDEX VALUE OF STEALTH BRIEFING TAB A F-117 STEALTH FIGHTER TAB 8 B-2 STEALTH BOMBER TAB C F-22 STEALTH FIGHTER TAB D ADVANCED CRUISE MISSILE TAB E ' . VALUE OF STEALTH BRIEFING VALUE OF STEALTH IMPACT OF TECHNOLOGY ON SURPRISE WWI WWII KOREA VIETNAM IRAQ ? ] AIRCRAFT, SUBMARINES ----------------~..... RADAR, SONAR-----------.... JET ENGINE, NUCLEAR PROPULSION ..., SMART BOMBS, SLCMs ...., LOW OBSERVABLE PLATFORMS/SUBQUIETING 1111- • INITIALLY, AIRCRAFT AND SUBMARINES ENJOYED THE BENEFIT OF SURPRISE • RADAR. SONAR, AND NEW PROPULSION TECHNIQUES CHANGED WARFARE • LOW OBSERVABLES RESTORED THE ELEMENT OF SURPRISE FOR AIRPLANES • SURPRISE IS PERISHABLE. OTHER COUNTRIES ARE WORKING HARD TO CATCH UP. THEREFORE, WE MUST CAPITALIZE ON OUR SIGNIFICANT INVESTMENT IN LOW OBSERVABILITY TO ENSURE A LASTING U.S. ADVANTAGE . .. PENETRATING BOMBER STEALTH EFFECTIVENESS CONVENTIONAL CRUISE MISSILE DETECTION CONVENTIONAL BOMBER DETECTION LO VEHICLE DETECTION WHEN COMPARED TO CONVENTIONAL TARGETS, STEALTH GREATLY DECREASES THE EFF ECTIVENESS OF OPERATIONAL RADAR SYSTEMS (e.g., SUAWACS. MIG-29) AIR-TO-AIR FIGHTER STEALTH EFFECTIVENESS FIRST-LOOK ------ FIRST-SHOT ----- ~- ... AMRAAM ·· .. f) FIRST-KILL STEALTH AND SURVIVABILITY • tOW OBSERVABLE PLATFORMS. NOW COMBAT PROVEN. HAVE DRAMATICALLY CHANGED THE BATTLEFIELD-THEY CRIPPlE THE ENEMY'S EFFORTS TO DETECT, IDEIITIFY, ENGAGE, AND DESTROY OUR FORCES -ENEMY'S RETURN ON INVESTMENT IN AIR DEFENSES IS DENIED • RESTORE THE ELEMENT OF
    [Show full text]
  • Stealth Aircraft Technology Sameer Suraj Salunkhe1, Mayur Shivaji Naikwade2 BE Student1, 2 Department of Mechanical Engineering MITAOE Pune, Maharashtra, India
    ISSN XXXX XXXX © 2018 IJESC Research Article Volume 8 Issue No.6 Stealth Aircraft Technology Sameer Suraj Salunkhe1, Mayur Shivaji Naikwade2 BE Student1, 2 Department of Mechanical Engineering MITAOE Pune, Maharashtra, India Abstract: Stealth Aircraft use Stealth Technology so as to avoid detection by using combination of features so that Aircraft can interfere with RADAR and also reduce the visibility in radio frequency (RF) spectrum, audio and infrared visual. During the last decades, stealth technology has proven to be one of the most effective approaches as far as the endeavour to hide from radar systems is concerned. Stealth means to avoid the detection or try to hide, For airplanes, hiding from radar meant stealth. The concept used in the stealth technology is not so difficult. It uses the principle to absorb and reflect the radar waves. Aircraft deflects the radar waves in various directions and minimizes the radar waves which return backs to radar. Another phenomenon which allows the aircraft to absorb the incoming radar waves totally and to divert the imbibed electromagnetic energy in different direction. The design and material used to build aircraft decide the level of stealth achieve by aircraft. The idea for the radar antenna to discharge radio energy, which is then send back by any object it happens to detect. The time taken for the reflection to come is measure by the radar antenna and it can tell how distant a object is I. INTRODUCTION reduce the detect ability by enemy radar.” The working was started at Lockheed in California. Team consists of highly 2.1] WHAT IS MEAN BY STEALTH? qualified and highly motivated engineers and pilot.
    [Show full text]
  • Decloaking Invisibility to Be Seen Or Not Be Seen, That Is the Question! by Guy Cramer, President/CEO of Hyperstealth Biotechnology Corp
    Decloaking Invisibility To be seen or not be seen, that is the question! By Guy Cramer, President/CEO of Hyperstealth Biotechnology Corp. January 11, 2019 “With great power comes great responsibility.” This popular quote which is often associated with Uncle Ben in Spider Man has actually been around for centuries. Ask yourself what would you do if you discovered the power of invisibility and that power could be made available to anyone? In 2010 I was conducting experiments and accidentally discovered a material that could render a six-inch object completely invisible. It didn’t take me long before I was able to scale up the experiment to determine that the material could hide a person, a vehicle or a large building. As a successful developer of camouflage patterns for structures and buildings on U.S. federal government land, the highly successful Optifade® hunting line and over 5,000,000 military issued uniforms since 2003, this was a breakthrough I had never anticipated. Camouflage is used to hide prey from predators’ vision and conversely to hide the predators from the prey. There are biological limitations of natural camouflage such as spots or stripes that can only be overcome by a few species such as the octopus or cuttlefish which belong in the same class known as cephalopods. These masters of camouflage can change their colors and patterns to some extent to match that of their background. This mechanism can also utilized attract attention to create a high contrast display to communicate aggression, draw in an unsuspecting prey or impress potential mates.
    [Show full text]
  • Stealth Technology: the Fight Against Radar
    International Journal of Advances in Electronics and Computer Science, ISSN: 2393-2835 Volume-1, Issue-2, Dec.-2014 STEALTH TECHNOLOGY: THE FIGHT AGAINST RADAR 1SHARAD KUMAR, 2SHASHANK MISHRA, 3SHASHANK GUPTA 1,2,3Electrical Engineering Department ABES Engineering College,Ghaziabad.U.P E-mail: [email protected], [email protected], [email protected] Abstract- During World war-II, radar and surface to air missiles posed an increasing threat to aircraft. It was at this time that stealth technology became an important topic of investigation. This paper will discuss the historical points that have lead to the rise of stealth technology. It will also discuss the different types of stealth technology and This paper will then conclude with the moral implications of using and designing stealth technology. Keywords- Stealth, Low Observable, Radar I. HISTORY a surface and then reflecting straight back at them. A mirror is an example of light waves being reflected In the late 1930’s and early 1940’s radar technology back at one’s self. Light from an external source hits was becoming increasingly used to detect aircraft. a body and bounces off in several directions. Some During WWII, Germany, France, Great Britain, and light waves propagate towards the mirror and then the United States all used this technology to navigate reflect off of the mirror back to that person’s eyes. ships and aircraft and to detect approaching enemy This same exact principle applies to radio waves. aircraft. Radar itself did not pose a direct threat to the Radio waves are simply non-visible forms of light.
    [Show full text]
  • Lockheed F 117 Nighthawk Stealth Fighter
    LOCKHEED F117 NIGHTHAWK STEALTH FIGHTER PAUL F. CRICKMORE © Osprey Publishing • www.ospreypublishing.com AIR VANGUARD 16 LOCKHEED F117 NIGHTHAWK STEALTH FIGHTER PAUL F. CRICKMORE © Osprey Publishing • www.ospreypublishing.com CONTENTS INTRODUCTION 4 DESIGN AND DEVELOPMENT 5 Ƨ Have Blue Ƨ Senior Trend Ƨ Flight-testing TECHNICAL SPECIFICATIONS 27 Ƨ Stealth features Ƨ Other considerations Ƨ Operational analysis Ƨ Powerplant Ƨ Fuel and oil system Ƨ Ignition system Ƨ Hydraulics Ƨ Electrical system Ƨ Flight control system Ƨ Autopilot Ƨ Flight instruments Ƨ Displays Ƨ Avionics integration Ƨ Antenna systems Ƨ Environmental control system Ƨ Oxygen system Ƨ Ejection seat Ƨ Updates Ƨ Weapons systems OPERATIONAL HISTORY 45 Ƨ The Tonopah years Ƨ First losses Ƨ Operation Just Cause Ƨ Operation Desert Storm Ƨ The move to Holloman Ƨ The Balkans Ƨ Operations Iraqi Freedom and Enduring Freedom THE PROGRAM SHUTDOWN 61 Ƨ Conclusion BIBLIOGRAPHY 63 INDEX 64 © Osprey Publishing • www.ospreypublishing.com LOCKHEED F117 NIGHTHAWK STEALTH FIGHTER INTRODUCTION Although universally known as “the Stealth Fighter,” Lockheed’s F-117 was an attack aircraft. Designed within the legendary Skunk Works primarily by electronic engineers, radically new solutions had to be developed to enable the aircraft to evade radar detection and interception. The enormity of the challenge is neatly conceptualized by the radar equation, which basically states that “radar detection range is proportional to the fourth root of the targets’ radar cross section (RCS).” In other words, to reduce the detection range of an aircraft by a factor of ten, it is necessary to reduce its RCS by a factor of 10,000 or 40 dBs.
    [Show full text]
  • Optical Camouflage
    OPTICAL CAMOUFLAGE A SEMINAR REPORT Submitted by SUDEESH S in partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE &TECHNOLOGY, KOCHI-682022 AUGUST 2008 DIVISION OF COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE & TECHNOLOGY, COCHIN-682022 Bonafide Certificate Certified that this is a bonafide record of the Seminar Entitled “Optical Camouflage ” Done by SUDEESH S Of VIIth semester, Computer Science and Engineering in the year 2008 in partial fulfillment of the requirements to the award of Degree Of Bachelor Of Technology in Computer Science and Engineering of Cochin University of Science and Technology. Ms. Sheena S . Dr. David Peter Seminar Guide Head of Department Date: ACKNOWLEDGEMENT At the outset, I thank the Lord Almighty for the grace, strength and hope to make my endeavor a success. I also express my gratitude to Dr. David Peter, Head of the Department and my Seminar Guide for providing me with adequate facilities, ways and means by which I was able to complete this seminar. I express my sincere gratitude to him for his constant support and valuable suggestions without which the successful completion of this seminar would not have been possible. I thank Ms.Sheena S, my seminar guide for her boundless cooperation and helps extended for this seminar. I express my immense pleasure and thankfulness to all the teachers and staff of the Department of Computer Science and Engineering, CUSAT for their cooperation and support. Last but not the least, I thank all others, and especially my classmates and my family members who in one way or another helped me in the successful completion of this work.
    [Show full text]