Feeds

Cloaking device makes invisible progress

Light-emitting objects problem whacked

Beginner's guide to SSL certificates

Mathematicians have proposed improvements to cloaking technology to hide objects which emit their own electromagnetic radiation.

In October, a transatlantic team of scientists demonstrated the world's first working invisibility cloak, which uses metamaterials to bend electromagnetism around an object as if it weren't there.

However, the sums say the effect would be ruined by electromagnetic radiation from inside the cloak - so an object like a mobile phone, computer or aircraft could not be hidden. Analysis also showed that with current technology, to a person inside the cloak its inner surface would appear mirrored and they would not be able to see out.

A group led by Professor Allan Greenleaf at the University of Rochester, New York, said on Tuesday they had solved these problems with the invisibility cloak by revisiting the 19th century work of James Clerk Maxwell. Maxwell's four equations describe how electromagnetism interacts with matter.

The team propose two possible solutions to the twin issues; to line the inner surface with conductive materials tuned to the geometry of the cloak, or to "match" the outer metamaterial surface with an inner one. They say Maxwell's equations back up the fix.

With current metamaterials, devices are only able to provide a cloaking effect for a very limited wavelength range, as Greenleaf points out. He said: "For example, an object could be rendered invisible at just a specific wavelength of red; it would be visible in nearly every other color."

The new findings do seem to bring a functioning invisibility cloak nearer however. David R. Smith, a physicist at Duke University, part of the team which built the first cloak, said: "Allan has been looking at the problem much more generally, and deriving the conditions for when true invisibility is or is not possible. We are very interested in what he and his colleagues come up with!"

We're sure the news will also be read with great interest in the corridors of the DARPA, which funds Smith's work. ®

Beginner's guide to SSL certificates

More from The Register

next story
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.