Feeds

Chinese unleash Caspian Sea Monster

'Wing In Ground' aircraft is go

Secure remote control for conventional and virtual desktops

China today confirmed it has developed a "Wing In Ground" (WIG) sea-skimming aircraft, state media reports.

According to Reuters, the Chinese version of the Caspian Sea Monster is capable of flying at 300km/h (180mph) at a mere half metre above the surface while carrying four tonnes of cargo. It relys on the WIG effect effect whereby, put simply, a wing travelling close to the ground is provided with extra lift by the "cushion" of air compressed under it - thus enabling a combination of greater aircraft weight for less power and/or enhanced fuel economy.

Professor Xu Zhengyu, vice-president of the research team at Tongji University in Shanghai, confirmed: "It's as safe as ships, although five or six times faster. And it can carry much more weight than ordinary planes while costing half as much and using half as much fuel."

Technical details of the first WIG vehicle are not noted, but Tongji University now plans to develop a 50-seat WIG by 2013, with" 200 prototypes capable of carrying 200 to 400 tonnes scheduled for 2016 or 2017". The WIG aircraft is "one of three types of aircraft given the green light in the general aviation field by the State Commission of Science Technology and Industry for National Defense", although Xinhua notes "the Civil Aviation Administration of China has yet to confirm aviation regulations at such low altitudes, which may become a problem".

That China has developed a WIG aircraft will come as no surprise to regular Reg readers. Last September, we spotted this strange beast at Qingdao naval base while investigating Russian ekranoplan projects:

The Chinese Sea Monster at Qingdao

Whether China can succeed where Russia failed remains to be seen. As we noted last year, the latter's WIG ambitions were ultimately thwarted because the "technical difficulties of developing a successful example often in the past outweighed the potential benefits of the technology". ®

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.