Feeds

Subterranean mole-bot under development

No plan to seek out underground civilisations, though

SANS - Survey on application security programs

British boffins are developing a mechanical, mole-like robotic system which could dig its way through debris or rubble. The technology could be used to build burrowing rescue machines able to retrieve people trapped by collapsing buildings or tunnels.

New Scientist reports that the men behind the new kit are Robin Scott and Robert Richardson of the Artificial Intelligence Group at Manchester's School of Computer Science. The engineering brainboxes were apparently inspired by the digging action of talpa europea - the common mole - rather than the fiction of Edgar Rice Burroughs et al.

The two boffins have been working on mole-machines for some time. In this paper dating from 2005 they point out that: "Digging involves subterranean tunnelling or burrowing activity... This area of [robotics] research has been extremely neglected."

We at the Reg - well, some of us anyway - strongly agree. We don't have our flying car, nor our robot/brainchipped-monkey butlers. On top of that, we've yet to hear of the long-promised underground mechanical mole cruiser, able to roam about beneath the Earth's surface without leaving a tunnel, spoil heap, and power connection behind it. Even a relatively unimpressive subterranean droid would be nice.

Well, actually we have seen that last one (pdf). But today's mole-derived kit seems more intuitively sympathetic than existing wormoid proposals.

Unfortunately, the Mancunian mole-machine isn't a complete system. So far, it's no more than a digging mechanism, and the university's test videos are rather lacking in wow factor.

We're particularly unimpressed with the clingfilm taped over the machinery for the digging-through-smaller-lumps bit. Still, it's a wriggle in the right direction. Make it a lot bigger, add some kind of miracle sensor/navigation gear and hugely puissant air-independent power source (nuclear? Steampunk HTP?) and we're on. Intercontinental subterranean mole dreadnoughts are us.

Sadly, solving those other problems of power and sensing will be hard to do. Merely copying animal locomotion techniques is a fairly trivial activity by comparison.

Still, Scott and Richardson recently told New Scientist that they're moving forward to proper mobile system tests, and that they might have a working rescue machine good to go in two years.

It's always possible that there's some real engineering going on here, not merely more robotics-faculty copying of ideas from biology textbooks. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Dragon capsule arrives at space station for Easter Sunday delivery
SpaceX reports Falcon booster made controlled touchdown in ocean
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.