Feeds

Boffins simulate plasma-eating dusty 'life-forms'

Dust to dust, etc

High performance access to file storage

Physicists have discovered that charged particles of dust can form themselves into life-like structures that appear to be capable of reproducing and passing information along, behaviour reminiscent of life on Earth.

The researchers, (led by V N Tsytovich of the General Physics Institute, Russian Academy of Science, in Moscow, along with boffins from the Max-Planck Institute for Extraterrestrial Physics in Germany, and the University of Sydney) have developed a computer model to help them understand "the behaviour of complex mixtures of inorganic materials in a plasma".

Although convention dictates that there would be very little organisation in a system of such particles, the researchers demonstrated that under the right conditions, order could emerge.

As the plasma becomes polarised, the model shows microscopic strands of particles twisting into helical, or corkscrew structures.

The simulation suggests that the dusty corkscrews have two stable configurations - a large spiral and a small spiral. Each helix could contain various sequences of these two states, the researchers say, which raises the possibility that they could store information.

The team reports that the structures can divide, form copies (transmit their stored information information), interact with neighbouring spirals, and even induce changes in other spirals. More speculatively, they suggest these changes could evolve as less stable structures break down.

So, are there corkscrew-shaped dust-aliens floating about in interstellar space?

Gregor Morfill of the Max Planck Institute for Extraterrestrial Physics in Germany is not prepared to go quite that far. He told New Scientist: "It has a lot of the hallmarks for how we define life at present, but we have not simulated life. To us, they're just a special form of plasma crystal."

However, Tsytovich is prepared to be a bit more flexible on his definition of what might constitute life, saying that the spirals "exhibit all the necessary properties to qualify them as candidates for inorganic living matter. They are autonomous, they reproduce, and they evolve".

The next step is to go hunting for a real environment where such structures could have emerged. Morfill suggests that planetary rings would be the best place to start the search.

The research is reported in the 14 August edition of the New Journal of Physics, and New Scientist has a more extensive write up here. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.