World Library  
Flag as Inappropriate
Email this Article

Stealth aircraft

Article Id: WHEBN0000403883
Reproduction Date:

Title: Stealth aircraft  
Author: World Heritage Encyclopedia
Language: English
Subject: Northrop Grumman B-2 Spirit, Chengdu J-20, Stealth aircraft, Lockheed Martin F-35 Lightning II, Air supremacy
Collection: Stealth Aircraft
Publisher: World Heritage Encyclopedia

Stealth aircraft

An F-117 Nighthawk stealth strike aircraft flying over Nevada in August 2002.

Stealth aircraft are designed to avoid detection using a variety of stealth technologies that reduce reflection/emission of radar, infrared,[1] visible light, radio-frequency (RF) spectrum, and audio, collectively known as stealth technology.[2] Development of stealth technology likely began in Germany during World War II, the prototyped Horten Ho 229 powered by twin BMW 003 jet engines being described as the first stealth aircraft.[3] Well-known modern examples of stealth of U.S. aircraft include the United States' F-117 Nighthawk (1981–2008), the B-2 Spirit, the F-22 Raptor,[4] and the F-35 Lightning II.[5]

While no aircraft is totally invisible to radar, stealth aircraft make it more difficult for conventional radar to detect or track the aircraft effectively, increasing the odds of an aircraft successfully avoiding detection by enemy radar and/or avoiding being successfully targeted by [7] This philosophy also takes into account the heat, sound, and other emissions of the aircraft as these can also be used to locate it.

Full-size stealth combat aircraft demonstrators have been flown by the United States (in 1977), Russia (in 2010) and China (in 2011).[8] The U.S. military has adopted three stealth designs, and is preparing to adopt the Lockheed Martin F-35 Lightning II.

Most recent fighter designs will claim to have some sort of stealth, low observable, reduced RCS or radar-jamming capability, but there has been no air-to-air combat experience against stealth aircraft.[9]


  • Background 1
    • World War I and World War II 1.1
    • Modern era 1.2
  • General design 2
  • Limitations 3
    • Instability of design 3.1
    • Aerodynamic limitations 3.2
    • Electromagnetic emissions 3.3
    • Vulnerable modes of flight 3.4
    • Reduced payload 3.5
    • Sensitive skin 3.6
    • Cost of operations 3.7
    • Reflected waves 3.8
    • Schlieren Signature 3.9
    • Infrared (heat) 3.10
    • Longer Wavelength Radar 3.11
    • OTH radar (over-the-horizon radar) 3.12
    • Advancements in computational power 3.13
  • Operational usage of stealth aircraft 4
  • Stealth aircraft lost 5
  • List of stealth aircraft 6
    • Manned 6.1
      • Dedicated reduced cross section designs 6.1.1
      • Accidental or secondary function reduced cross section designs 6.1.2
    • Unmanned reduced RCS designs 6.2
  • See also 7
  • References 8


World War I and World War II

During World War I, the Germans experimented with the use of Cellon (Cellulose acetate), a transparent covering material, in an attempt to reduce the visibility of military aircraft. Single examples of the Fokker E.III Eindecker fighter monoplane, the Albatros C.I two-seat observation biplane, and the Linke-Hofmann R.I prototype heavy bomber were covered with Cellon. In fact, sunlight glinting from the material made the aircraft even more visible. Celon was also found to be quickly degraded both by sunlight and in-flight temperature changes so the attempt to make transparent aircraft was not proceeded with.[10]

In 1916, the British modified a small SS class airship for the purpose of night-time aerial reconnaissance over German Empire lines on the Western Front. Fitted with a silenced engine and a black gas bag, the craft was both invisible and inaudible from the ground, but several night-time flights over German-held territory produced little useful intelligence, and the idea was dropped.[11]

Nearly three decades later, a more serious attempt at radar "invisibility" was tried with the Horten Ho 229 flying wing fighter-bomber, developed in Nazi Germany during the last years of World War II. In addition to the aircraft's shape, the majority of the Ho 229's wooden skin was bonded together using carbon-impregnated plywood resins designed with the purported intention of absorbing radar waves. Testing performed in early 2009 by the Northrop-Grumman Corporation established that this compound, along with the aircraft's shape, would have rendered the Ho 229 virtually invisible to the top-end HF-band, 20-30 MHz primary signals of Britain's Chain Home early warning radar, provided the aircraft was traveling at high speed (approximately 550 mph (890 km/h)) at extremely low altitude - 50–100 feet (15–30 m).[3]

In the closing weeks of World War II, the US military initiated "Operation Paperclip", an effort by the US Army to capture as much advanced German Wunderwaffe weapons research as possible, and also to deny that research to advancing Red Army. A Horten glider and the nearly complete Ho 229 V3 third prototype airframe were secured and sent to Northrop Corporation for evaluation in the United States,[3] who much later used a flying wing design for the B-2 stealth bomber. During World War II, Northrop had been commissioned to develop a large wing-only long-range bomber (Northrop YB-35) based on photographs of the Horten's record-setting glider from the 1930s, but their initial designs suffered controllability issues that were not resolved until after the war. Northrop's small one-man prototype (N9M-B) and a Horten wing-only glider are now preserved at the Chino Air Museum in Southern California.

Modern era

Modern stealth aircraft first became possible when Denys Overholser, a mathematician working for Lockheed Aircraft during the 1970s, adopted a mathematical model developed by Petr Ufimtsev, a Soviet scientist, to develop a computer program called Echo 1. Echo made it possible to predict the radar signature an aircraft made with flat panels, called facets. In 1975, engineers at Lockheed Skunk Works found that an aircraft made with faceted surfaces could have a very low radar signature because the surfaces would radiate almost all of the radar energy away from the receiver. Lockheed built a model called "the Hopeless Diamond", so-called because it resembled a squat diamond, and looked too hopeless to ever fly. Because advanced computers were available to control the flight of even a Hopeless Diamond, for the first time designers realized that it might be possible to make an aircraft that was virtually invisible to radar.[12][13]

Reduced radar cross section is only one of five factors the designers addressed to create a truly stealthy design such as the F-22. The F-22 has also been designed to disguise its infrared emissions to make it harder to detect by infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Designers also addressed making the aircraft less visible to the naked eye, controlling radio transmissions, and noise abatement.[4]

The first combat use of purpose-designed stealth aircraft was in December 1989 during [14]

General design

The general design of a stealth aircraft is always aimed at reducing radar and thermal detection. It is the designer's top priority to satisfy the following conditions; some of which are listed below, by using their skills, which ultimately decides the success of the aircraft:-

  • Reducing thermal emission from thrust
  • Reducing radar detection by altering some general configuration (like introducing the split rudder)
  • Reducing radar detection when the aircraft opens its weapons bay
  • Reducing infra-red and radar detection during adverse weather conditions


B-2 Spirit stealth bomber of the U.S Air Force

Instability of design

Early stealth aircraft were designed with a focus on minimal radar cross section (RCS) rather than aerodynamic performance. Highly-stealth aircraft like the F-117 Nighthawk are aerodynamically unstable in all three axes and require constant flight corrections from a fly-by-wire (FBW) flight system to maintain controlled flight.[15] As for the B-2 Spirit, which was based on the development of the flying wing aircraft[16] by Jack Northrop in 1940, this design allowed for a stable aircraft with sufficient yaw control, even without vertical surfaces such as rudders.

Aerodynamic limitations

Earlier stealth aircraft (such as the F-117 and B-2) lack [17]

Electromagnetic emissions

The high level of computerization and large amount of electronic equipment found inside stealth aircraft are often claimed to make them vulnerable to passive detection. This is highly unlikely and certainly systems such as Tamara and Kolchuga, which are often described as counter-stealth radars, are not designed to detect stray electromagnetic fields of this type. Such systems are designed to detect intentional, higher power emissions such as radar and communication signals. Stealth aircraft are deliberately operated to avoid or reduce such emissions.

Current Radar Warning Receivers look for the regular pings of energy from mechanically swept radars while fifth generation jet fighters use Low Probability of Intercept Radars with no regular repeat pattern.[18]

Vulnerable modes of flight

Stealth aircraft are still vulnerable to detection during, and immediately after using their weaponry. Since stealth payload (reduced RCS bombs and cruise missiles) are not yet generally available, and ordnance mount points create a significant radar return, stealth aircraft carry all armaments internally. As soon as weapons bay doors are opened, the plane's RCS will be multiplied and even older generation radar systems will be able to locate the stealth aircraft. While the aircraft will reacquire its stealth as soon as the bay doors are closed, a fast response defensive weapons system has a short opportunity to engage the aircraft.

This vulnerability is addressed by operating in a manner that reduces the risk and consequences of temporary acquisition. The B-2's operational altitude imposes a flight time for defensive weapons that makes it virtually impossible to engage the aircraft during its weapons deployment. New stealth aircraft designs such as the F-22 and F-35 can open their bays, release munitions and return to stealthy flight in less than a second.

Some weapons require that the weapon's guidance system acquire the target while the weapon is still attached to the aircraft. This forces relatively extended operations with the bay doors open.

Also, such aircraft as the F-22 Raptor and F-35 Lightning II Joint Strike Fighter can also carry additional weapons and fuel on hardpoints below their wings. When operating in this mode the planes will not be nearly as stealthy, as the hardpoints and the weapons mounted on those hardpoints will show up on radar systems. This option therefore represents a trade off between stealth or range and payload. External stores allow those aircraft to attack more targets further away, but will not allow for stealth during that mission as compared to a shorter range mission flying on just internal fuel and using only the more limited space of the internal weapon bays for armaments.

Reduced payload

In a 1994 live fire exercise near Point Mugu, California, a B-2 Spirit dropped forty-seven 500 lb (230 kg) class Mark 82 bombs, which represents about half of a B-2's total ordnance payload in Block 30 configuration

Fully stealth aircraft carry all fuel and armament internally, which limits the payload. By way of comparison, the F-117 carries only two laser or GPS guided bombs, while a non-stealth attack aircraft can carry several times more. This requires the deployment of additional aircraft to engage targets that would normally require a single non-stealth attack aircraft. This apparent disadvantage however is offset by the reduction in fewer supporting aircraft that are required to provide air cover, air-defense suppression and electronic counter measures, making stealth aircraft "force multipliers".

Sensitive skin

Stealth aircraft often have skins made with Radar-absorbent materials or RAMs. Some of these contain Carbon black particles, some contain tiny iron spheres. There are many materials used in RAMs, and some are classified, particularly the materials that specific aircraft use.[19]

Cost of operations

Stealth aircraft are typically more expensive to develop and manufacture. An example is the B-2 Spirit that is many times more expensive to manufacture and support than conventional bomber aircraft. The B-2 program cost the U.S. Air Force almost $45 billion.[20]

Reflected waves

Passive (multistatic) radar, bistatic radar[21] and especially multistatic radar systems detect some stealth aircraft better than conventional monostatic radars, since first-generation stealth technology (such as the F117) reflects energy away from the transmitter's line of sight, effectively increasing the radar cross section (RCS) in other directions, which the passive radars monitor. Such a system typically uses either low frequency broadcast TV and FM radio signals (at which frequencies controlling the aircraft's signature is more difficult). Later stealth approaches do not rely on controlling the specular reflections of radar energy and so the geometrical benefits are unlikely to be significant.

Researchers at the University of Illinois at Urbana-Champaign with support of DARPA, have shown that it is possible to build a synthetic aperture radar image of an aircraft target using passive multistatic radar, possibly detailed enough to enable automatic target recognition (ATR).

In December 2007, SAAB researchers revealed details for a system called Associative Aperture Synthesis Radar (AASR) that would employ a large array of inexpensive and redundant transmitters and a few intelligent receivers to exploit forward scatter to detect low observable targets.[22] The system was originally designed to detect stealthy cruise missiles and should be just as effective against aircraft. The large array of inexpensive transmitters provides a degree of protection against anti-radar (or anti-radiation) missiles or attacks.

Schlieren Signature

Schlieren photograph of T-38 shock waves
Schlieren-Soldering-Iron-Heat. Note that the soldering iron tip itself is not glowing because it is not Infrared photography. Had the photograph been a composite of Schlieren and infrared, the soldering iron tip would show as a source of illumination and the atmospheric disturbance caused by the heating would show as well. The infrared point of origin or target would be unambiguous.
Photography of bow shock waves around a brass bullet, 1888

Schlieren is the German plural of schliere, which is German for the English word streak. Schlieren are visible streaks produced in a transparent medium as a result of variations in the medium's density leading to variations in refractive index.[23] Anything that disturbs the atmosphere may be detected (Schlieren Photography) because of the Schlieren effect caused by that atmospheric disturbance. This type of Measurement and signature intelligence (MASINT) detection falls under the category of Electro-optical MASINT. A telephoto or telescopic picture of a jet passing between the photographer and a full moon will sometimes show the outline of the aircraft as well as the atmospheric distortions of the exhaust plumes. This passive principle can be used at all wavelengths of the electromagnetic spectrum. Passive signature intelligence has captured stealth aircraft in flight by accident, when such aircraft fly between Earth imaging satellites and ground (can be seen in products like Google Earth). Once a stealth signature has been captured, it may be loaded into a database library for an active and live satellite search at any point in the future. Ground at past versus ground at present differential comparisons can be made to determine flight paths and altitudes of stealth aircraft. This disturbance and disturbing influence method has been used for finding ships at sea through wake generation tracking and even in Wilson cloud chambers for particle discovery and tracking. The key principle is that the disturbance is much more visible in area and volume than the disturbing point source and converges attention to the much smaller disturbing source.

Infrared (heat)

Some analysts claim Infra-red search and track systems (IRSTs) can be deployed against stealth aircraft, because any aircraft surface heats up due to air friction and with a two channel IRST is a CO2 (4.3 µm absorption maxima) detection possible, through difference comparing between the low and high channel.[24][25] These analysts point to the resurgence in such systems in Russian designs in the 1980s, such as those fitted to the MiG-29 and Su-27. The latest version of the MiG-29, the MiG-35, is equipped with a new Optical Locator System that includes more advanced IRST capabilities. The French Rafale and Swedish Gripen also make extensive use of IRST.

In air combat, the optronic suite allows:

  • Detection of non-afterburning targets at 45-kilometre (28 mi) range and more;
  • Identification of those targets at 8-to-10-kilometre (5.0 to 6.2 mi) range; and
  • Estimates of aerial target range at up to 15 kilometres (9.3 mi).

For ground targets, the suite allows:

  • A tank-effective detection range up to 15 kilometres (9.3 mi), and aircraft carrier detection at 60 to 80 kilometres (37 to 50 mi);
  • Identification of the tank type on the 8-to-10-kilometre (5.0 to 6.2 mi) range, and of an aircraft carrier at 40 to 60 kilometres (25 to 37 mi); and
  • Estimates of ground target range of up to 20 kilometres (12 mi).

Longer Wavelength Radar

VHF radar systems have wavelengths comparable to aircraft feature sizes and should exhibit scattering in the resonance region rather than the optical region, allowing most stealth aircraft to be detected. This has prompted Nizhny Novgorod Research Institute of Radio Engineering (NNIIRT) to develop VHF AESAs such as the NEBO SVU, which is capable of performing target acquisition for Surface-to-air missile batteries. Despite the advantages offered by VHF radar, their longer wavelengths result in poor resolution compared to comparably sized X band radar array. As a result, these systems must be very large before they can have the resolution for an engagement radar.

The Dutch company Thales Nederland, formerly known as Holland Signaal, developed a naval phased-array radar called SMART-L, which is operated at L Band and has counter-stealth. All ships of the Royal Dutch Navy's De Zeven Provinciën class carry, amongst others, the SMART-L radar.

OTH radar (over-the-horizon radar)

Over-the-horizon radar is a concept increasing radar's effective range over conventional radar. The Australian JORN Jindalee Operational Radar Network can overcome certain stealth characteristics.[26] It is claimed that the HF frequency used and the method of bouncing radar from ionosphere overcomes the stealth characteristics of the F-117A. In other words, stealth aircraft are optimized for defeating much higher-frequency radar from front-on rather than low-frequency radars from above.

Advancements in computational power

The stealth platforms may have slower advances in materials technology and physical limits so that further advances in stealth become either impossible or unaffordable. This may force future stealth platforms to stand off from their targets and use active countermeasures and long range weaponry to strike targets.[27]

However if the stealth aircraft are constantly upgraded they can hope to jam or evade emerging threats better than similarly equipped non-stealthy platforms could.[28][29]

Operational usage of stealth aircraft

The F-117 Nighthawk stealth attack aircraft.
The B-2 Spirit strategic stealth bomber
The F-22 Raptor fifth generation stealth air superiority fighter
Naval variant of the F-35 Lightning II fifth-generation stealth multi-role fighter
A Sukhoi PAK FA fifth-generation stealth multirole fighter
A Chengdu J-20 fifth-generation stealth long-range combat aircraft
A Shenyang J-31 fifth-generation stealth multirole fighter

The U.S. is the only country to have used stealth aircraft in combat. These deployments include the United States invasion of Panama, the first Gulf War, the Kosovo Conflict, the War in Afghanistan the War in Iraq and the 2011 military intervention in Libya. The first use of stealth aircraft was in the U.S. invasion of Panama, where F-117 Nighthawk stealth attack aircraft were used to drop bombs on enemy airfields and positions while evading enemy radar.[30]

In 1990 the F-117 Nighthawk was used in the First Gulf War, where F-117s flew 1,300 sorties and scored direct hits on 1,600 high-value targets in Iraq[31] while accumulating 6,905 flight hours.[32] Only 2.5% of the American aircraft in Iraq were F-117s, yet they struck 40% of the strategic targets, dropping 2,000 tons of precision-guided munitions and striking their targets with an 80% success rate.[32][33]

In the 1999 NATO bombing of Yugoslavia two stealth aircraft were used by the United States, the veteran F-117 Nighthawk, and the newly introduced B-2 Spirit strategic stealth bomber. The F-117 performed its usual role of striking precision high-value targets and performed well, although one F-117 was shot down by a Serbian Isayev S-125 'Neva-M' missile commanded by Colonel Zoltán Dani. The, then new, B-2 Spirit was highly successful, destroying 33% of selected Serbian bombing targets in the first eight weeks of U.S. involvement in the War. During this war, B-2s flew non-stop to Kosovo from their home base in Missouri and back.[34]

In the 2003 invasion of Iraq, F-117 Nighthawks and B-2 Spirits were used, and this was the last time the F-117 would see combat. F-117s dropped satellite-guided strike munitions on selected targets, with high success. B-2 Spirits conducted 49 sorties in the invasion, releasing 1.5 million pounds of munitions.[34]

During the May 2011 operation to kill Osama bin Laden, one of the helicopters used to clandestinely insert US troops into Pakistan crashed in the bin Laden compound. From the wreckage it was revealed this helicopter had stealth characteristics, making this the first publicly known operational use of a stealth helicopter.

Stealth aircraft were used in the 2011 military intervention in Libya, whe B-2 Spirits dropped 40 bombs on a Libyan airfield with concentrated air defenses in support of the UN no-fly zone.[35]

Stealth aircraft will continue to play a valuable role in air combat with the United States using the F-22 Raptor, B-2 Spirit, and the F-35 Lightning II to perform a variety of operations.

The Russian Sukhoi PAK FA stealth multi-role fighter is scheduled to be introduced from 2015, to perform various missions.

The Sukhoi/HAL FGFA, the Indian version of the PAK FA is scheduled to be introduced from 2017 in higher numbers, also to perform various missions.

The People's Republic of China plans to introduce the Chengdu J-20 stealth multirole fighter around 2018. A prototype was flown in early 2011. Another fifth-generation stealth multirole fighter Shenyang J-31 is also under flight testing.

Stealth aircraft lost

The first time that a stealth aircraft was shot down was on 27 March 1999, during Operation Allied Force when an American F-117 Nighthawk was brought down by an Isayev S-125 'Neva-M' missile launched by a Serbian Air Defense crew who were operating their radars on unusually long wavelengths.[36][37] The pilot ejected and was rescued and the aircraft remained relatively intact due to slowly striking the ground, inverted.[36]

In December 2011, Iranian sources showed videos of a captured US RQ-170 stealth drone in a good shape with intact central controlling unit.[38] The information was later confirmed by US sources. The analysts say that the drone might have been captured by electronic cyber attack or jamming.[39] There are reports that China and Russia asked Iran to inspect the drone less than a week after the Iranian video was released.[40]

A B-2 crashed on 23 February 2008 shortly after takeoff from Andersen Air Force Base in Guam.[41] The investigation stated the B-2 crashed after "heavy, lashing rains" caused water to enter skin-flush air-data sensors, which feed angle of attack and yaw data to the computerized flight-control system. The water distorted pre-flight readings in three of the plane's 24 sensors, causing the flight-control system to send an erroneous correction to the B-2 on takeoff. The B-2 quickly stalled, became unrecoverable, and crashed.[42][43][44] The sensors measure environmental factors including air pressure and density, for data to calculate airspeed, altitude and attitude. Because of the faulty readings, the flight computers determined inaccurate airspeed readings and incorrectly indicated a downward angle for the aircraft, which contributed to an early rotation and an un-commanded 30-degree pitch up and left yaw, resulting in the stall.[45]

List of stealth aircraft


Dedicated reduced cross section designs

In service
Under development

Technology demonstrators

Accidental or secondary function reduced cross section designs

Unmanned reduced RCS designs

See also


  1. ^ Mahulikar, S.P., Sonawane, H.R., & Rao, G.A.: (2007) "Infrared signature studies of aerospace vehicles", Progress in Aerospace Sciences, v. 43(7-8): 218-245.
  2. ^ Rao, G.A., & Mahulikar, S.P.: (2002) "Integrated review of stealth technology and its role in airpower", Aeronautical Journal, v. 106(1066): 629-641.
  3. ^ a b c
  4. ^ a b c
  5. ^ Global F-35.
  6. ^ Radar versus Stealth: Passive Radar and the Future of U.S. Military Power Archived 20 September 2009 at the Wayback Machine
  7. ^
  8. ^ Robinson, Tim. "Not so hidden dragon – China’s J-20 assessed." Aerospace Insight, 14 January 2011.
  9. ^ "Iran to equip fighter aircraft with new stealth systems."
  10. ^
  11. ^
  12. ^
  13. ^ See Rich and Janos, Skunk Works; Little Brown & Co., 1994 passim chapters 1 and 2.
  14. ^
  15. ^ Rich and Janos, Skunk Works, pgs 30-31, 46.
  16. ^ Jack Northrop: The Development of All-Wing Aircraft
  17. ^
  18. ^
  19. ^
  20. ^ United States General Accounting Office (GAO) B-2 Bomber: Cost and Operational Issues (Letter Report, 08/14/97, GAO/NSIAD-97-181).
  21. ^
  22. ^
  23. ^
  24. ^
  25. ^
  26. ^
  27. ^ Ewing, Philip. "Did CNO just take a big swipe at F-35?" DoD Buzz, 3 July 2012.
  28. ^ "Israel, U.S. Agree To $450 Million In F-35 EW Work." Aviation Week, 6 August 2012.
  29. ^ "Will Stealth Survive As Sensors Improve? F-35, Jammers At Stake."
  30. ^ Crocker 2006, p. 382.
  31. ^ Factsheets : Lockheed F-117A Nighthawk
  32. ^ a b Weapons - F-117a Stealth | The Gulf War | FRONTLINE | PBS
  33. ^
  34. ^ a b Factsheets : B-2 Spirit
  35. ^
  36. ^ a b Logan, Don. Lockheed F-117 Nighthawks: A Stealth Fighter Roll Call. Atglen, Pennsylvania: Schiffer Publishing, 2009. ISBN 978-0-7643-3242-5.
  37. ^ [1]
  38. ^
  39. ^
  40. ^
  41. ^ Lavitt, Michael O. "B-2 Crashes on Takeoff From Guam." Aviation Week, 23 February 2008.
  42. ^ "Air Force: Sensor moisture caused 1st B-2 crash", MSNBC, 5 June 2008'
  43. ^ "Moisture confused sensors in B-2 crash", AirForceTimes, 6 June 2008.
  44. ^
  45. ^ "Air Force World: B-2 Crash Cause Identified", AIR FORCE Magazine, July 2008, Vol. 91, No.7, pp. 16-17.
  46. ^
  47. ^
  48. ^ a b c d
  49. ^ a b
  50. ^
  51. ^ "Tu-160 Put On Hold."
  52. ^ Stüwe, Botho., p. 258 Das Ortungsignal der Me 163 B war relativ schwach ... difficult Radar target, absence of dihedral reflector (tailless). Peenemünde West (in German). Augsburg, Germany: Bechtermünz Verlag, 1999. ISBN 3-8289-0294-4.
  53. ^
  54. ^
  55. ^
  56. ^
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.