Feeds

Chinese boffins crack invisible-shed window problem

Unscrewing the inscrutable

Build a business case: developing custom apps

Everyone, one hopes, is well aware by now of metamaterial - remarkable conceptual stuff which might be used in coming years to make invisibility cloaks; or more realistically, invisible sheds. Few, however, have spotted the critical flaw in a metamaterial cloak, shed or cladding - people so concealed would no more be able to see out than those outside could see in.

But that problem may have been dealt with in advance by a team of top Chinese invisibility boffins.

"Cloaking is an important problem since invisibility can help survival in a hostile environment," said Huanyang Chen of Shanghai Jiao Tong University in China.

According to Chen, the currently-envisaged metamaterials work by bending light around the enclosed area. Thus, light cannot penetrate a metamaterial, and so it cannot be seen through.

A harassed family man lurking in his invisible garden shed might not be troubled by an inability to see out, but troops in an invisibility-clad tank or boy wizards reconnoitring the girls' showers no doubt would. They could, of course, simply peer out through a small peephole; but Chen and his crew of Shanghai vanishment boffins - along with colleagues at the Hong Kong University of Science and Technology - have come up with a more elegant solution.

More switched-on readers will have guessed the answer. All you need, needless to say, is a piece of "anisotropic negative refractive index material that is impedance matched to the positive refractive index of the invisibility cloak". Pleasingly, Chen has chosen to dub this "the anti-cloak", rather than ANRIMIMPRIIC or similar.

The anti-cloak, if pressed against the inside of the invisible shed, would permit outside light (which would normally travel around to be emitted from the far wall) to penetrate to the inside, so letting a clandesto-shed denizen see out. If we've grasped the concept properly*, the anti-cloak window would be apparent from outside, but principally as a dark patch on the opposite wall of the shed.

The findings are published in a new paper: The Anti-Cloak, Huanyang Chen et al, Optics Express, Vol. 16, Issue 19, September 15, 2008, pp. 14577 – 14582. ®

*WARNING: Habitual use of our science coverage may harm your baby and others around you. Such use has been linked to incidence of the King's Evil and is thought to contribute to global warming, entropy, substance abuse, terrorism, hair loss, volcanoes, orbital decay, intellectual languor and decline of moral standards in team sport.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Asteroid's SHOCK DINO KILLING SPREE just bad luck - boffins
Sauricide WASN'T inevitable, reckon scientists
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Famous 'Dish' radio telescope to be emptied in budget crisis: CSIRO
Radio astronomy suffering to protect Square Kilometre Array
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.