Professional Documents
Culture Documents
Faculty Guide: Dr Malay Ranjan Tripathy Student Name: Ananya, Mayank, Ajit & Vividha
Designation: Project Guide
Enroll. No.: A177158821008, A177158821011,
A177158821025 & A177158821060
Faculty Guide: Dr. Manish Chauhan
Programme: M.Tech. Defence Technology
Designation: Project Co-Guide
1
Amity Institute of Defence Technology
Index
Followings will be covered:
Introduction
Literature Review
Objectives
Methodology
Results and Discussion
Conclusion
References
2
Amity Institute of Defence Technology
Introduction
3
Amity Institute of Defence Technology
Literature review
• Looking out for various articles ,research papers and looking on internet .
• Studying the implementation method of various Stealth technologies used to hide .
• Reading more about the V/UHF radars have good chances of detecting stealth aircraft. Since
their wavelength (1-2 m) is of around the same magnitude as the prominent features on many
stealth jets, their signal is echoed by a resonant effect that is unaffected by stealth shaping or
RAM coatings .
. Analysing the possible threats scenarios where the current system can be compromised.
• Rechecking and improvising our proposed mechanism, using an iterative approach based on
objectives achieved and problems faced.
• Analysing the optimizations achievable.
4
Amity Institute of Defence Technology
Literature review
CHINESE YLC-8B RADAR ON DISPLAY
5
Amity Institute of Defence Technology
Objectives
6
Amity Institute of Defence Technology
Methodology
Following things to be carried out:
7
Amity Institute of Defence Technology
8
Amity Institute of Defence Technology
9
Amity Institute of Defence Technology
10
Amity Institute of Defence Technology
11
Amity Institute of Defence Technology
12
Amity Institute of Defence Technology
14
Amity Institute of Defence Technology
References
• F. J. Lopez-Martinez, G. Gomez; and J. María Garrido Balsells, “Physical-Layer
Security in Free-Space Optical Communications”, IEEE Photonics Journal, vol. 7,
no. 2, pp. 1-14, 2015.
• R. Ildarabadi, and Z. Keramat, “Laser based security fence to protect military and
administrative organs”, in 12th International Conference on Technical
and Physical Problems of Electrical Engineering, 2016, p.p. 1-6.
• T. Heil et al., "ON/OFF phase shift keying for chaos-encrypted communication
using external-cavity semiconductor lasers," in IEEE Journal of Quantum
Electronics, vol. 38, no. 9, pp. 1162-1170, Sept. 2002, doi:
10.1109/JQE.2002.801950.
• Anjesh Kumar, et. al. International Journal of Engineering Research and
Applications ISSN: 2248-9622, Vol. 10, Issue 6, (Series-VIII) June 2020, pp. 56-
60 15
Amity Institute of Defence Technology
Other References
• Chunjuan Wei, Junjie Yang, Wu Zhu, Jian Lv, “A Design of Alarm System
for Substation Perimeter Based on Laser Fence and Wireless Communication”,
2010 International Conference on Computer Application
and System Modeling (ICCASM 2010)
• M. A. Khalighi and M. Uysal, "Survey on Free Space Optical Communication: A
Communication Theory Perspective," in IEEE Communications Surveys &
Tutorials, vol. 16, no. 4, pp. 2231-2258, Fourthquarter 2014, doi:
10.1109/COMST.2014.2329501.
• H. A. Aljenabi, H. J. Kbashi, Y. I. Alshomary, “Free space digital
laser communication system based on microcontroller,” Atti Della Fondazione
Giorgio Ronchi Anno LXIII, no. 4, pp. 543–548, 2008.
16