Feeds

Robots to engage in mid-air couplings

Bot probe sniffs out glowing ring

High performance access to file storage

Flying robots are now able to do many tasks which formerly required assistance from a human pilot. They can land, take off, copy aerobatic manoeuvres and dock a manned jet to another one for air-to-air refuelling - hands off.

Now there are plans to take the latter capability to the next level. Unlike previous pilotware refueling trials - which saw automatic hookup of two manned planes (though without significant input from the crews) - two uninhabited aircraft will now mate with one another in flight.

The upcoming aerial plugging-in news comes from Aerospace Daily and Defense Report, which says that aerotech group Cobham will carry out the test flight above Arizona's Yuma Proving Ground "within the next month".

The two six-foot airdroids concerned will apparently use the more common probe-and-drogue refueling system favoured by the US Navy and most NATO nations, rather than the boom method employed by the US Air Force. Under probe-and-drogue, the tanker flies steadily along, trailing a basket-like socket on the end of a fuel line. The aircraft wishing to take fuel then flies its probe into the basket.

This procedure is traditionally said by human pilots as being rather like "taking a running fuck at a rolling doughnut". Cobham subsidiary Sargent Fletcher says that its "powered weapon" retractable probe-o-bots are quite capable of this. They will steer themselves in on final approach by tracking a glowing infrared ring on the offered receptacle.

The ring-sniffing detector/autopilot systems to be employed on the powered-weapon probe droids are made by Texas-based StarVision Inc. The system has already been tested using a fixed ring and a probe mounted on a small powered-wheelchair-esque ground robot. A quietly splendid corporate vid showing the crawling, wobble-probed bot-molester in action is available here. There is also a concept vid of the airborne version in action here.

Successful testing will open up prospects for autonomous skydroids to carry out very long duration missions, sustained by similarly unmanned, unpiloted refuelling tankers. Endurance will be limited only by maintenance requirements - or by eventual mechanical failures if these were ignored due to operational imperatives. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.