PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cargando...

Introduction to RF Stealth (Scitech Radar and Defense)

por David Lynch

MiembrosReseñasPopularidadValoración promediaConversaciones
9Ninguno2,003,830 (4.5)Ninguno
This is the only book focused on the complete aspects of RF Stealth design. It is the first book to present and explain first order methods for the design of active and passive stealth properties. Everything from Electronic Order of Battle to key component design is covered. The book is a 'How to' reference, allowing estimation of RCS, emitter interceptability, IR signature with speed, emitter footprints, terrain obscuration and target visibility, ambient spectra, ambient pulse density, detection performance, antenna, filter and pulse compression sidelobes, emitter location accuracy, stealthy pulse compression design, stealthy antenna design, signal processor performance, and more. Unique compilations of the leading parameters of many emitters and interceptors are included, as is analytical software for each chapter. Stealth was a major military breakthrough very much in today's news. Though the author has been pioneering modern stealth techniques since 1975, necessary requirements of security has kept this material from becoming widely known. The book's purpose is to provide a new generation of designers with a firm and proven basis for new developments and to allow buyers of stealth technology to separate the charlatans from serious engineers. Key features of this book include the fact that there is no competing title on the market; this will be the standard text for years to come. All analysis is presented on a first order basis: simplest approach, use of approximations, intuitive reasoning, many examples. The book's practical 'How to' approach incorporates recipes and examples for estimation of critical performance parameters. Includes 368 figures, 74 tables, 328 equations and 108 items of analytical software.… (más)
Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

Ninguna reseña
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Citas
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés

Ninguno

This is the only book focused on the complete aspects of RF Stealth design. It is the first book to present and explain first order methods for the design of active and passive stealth properties. Everything from Electronic Order of Battle to key component design is covered. The book is a 'How to' reference, allowing estimation of RCS, emitter interceptability, IR signature with speed, emitter footprints, terrain obscuration and target visibility, ambient spectra, ambient pulse density, detection performance, antenna, filter and pulse compression sidelobes, emitter location accuracy, stealthy pulse compression design, stealthy antenna design, signal processor performance, and more. Unique compilations of the leading parameters of many emitters and interceptors are included, as is analytical software for each chapter. Stealth was a major military breakthrough very much in today's news. Though the author has been pioneering modern stealth techniques since 1975, necessary requirements of security has kept this material from becoming widely known. The book's purpose is to provide a new generation of designers with a firm and proven basis for new developments and to allow buyers of stealth technology to separate the charlatans from serious engineers. Key features of this book include the fact that there is no competing title on the market; this will be the standard text for years to come. All analysis is presented on a first order basis: simplest approach, use of approximations, intuitive reasoning, many examples. The book's practical 'How to' approach incorporates recipes and examples for estimation of critical performance parameters. Includes 368 figures, 74 tables, 328 equations and 108 items of analytical software.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (4.5)
0.5
1
1.5
2
2.5
3
3.5
4
4.5 1
5

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 206,806,474 libros! | Barra superior: Siempre visible