Feeds

German boffins produce sim of 'invisibility carpet' in action

Don't try sweeping anything important under this

Top 5 reasons to deploy VMware with Tegile

Remorseless German boffins have developed a simulator which can show how so-called "invisibility carpets" fashioned of metamaterials (in fact more likely to appear in the form of invisible sheds, according to top boffins) would actually appear to the human eye. According to the simulation, the invisible sheds would produce curious ripples and distortions, fairly easily spotted.

How an invisible bump in a floor might look. Credit: KIT

The attempt to sweep everything under the invisibility carpet wasn't terribly successful.

"It's important to visualize how an optical device works," explains Jad C Halimeh, who wrote the software as part of his Master of Science thesis at the Karlsruhe Institute of Technology. Details of the new KIT kit have been published in a scholarly paper, but the actual code hasn't been released yet.

Apparently the standard software that scientists and engineers use to simulate light in a room only allows for a few hundred "volume elements" interacting with the lighting. Halimeh says that to accurately work out the effects of visual-wavelength broadband metamaterials you need hundreds of thousands of elements, which his tech has got.

One should note that nobody has made a metamaterial able to affect visible-light wavelengths, far less a broadband one able to twist all the frequencies the human eye can see. Prof John Pendry, one of the top boffins in the field, has said that advances in nanotechnology might one day make such things possible - but that it won't be a "cloak" as such.

"Despite the hype around Harry Potter, this isn't anything that flaps around in the breeze," the prof has said. "It's more like a shed."

Meanwhile Halimeh and his KIT colleagues, wanting to demonstrate their program, rendered a virtual museum niche with three walls, a ceiling, and a floor. In the middle of the room, there's a bump in the floor - but it's covered in metamaterial invisible-shed cladding (the KIT people prefer to speak of invisibility "carpet") which in theory ought to make an observer see nothing but a flat reflecting floor. However, according to the simulation, this is actually far from the case.

It would seem that in addition to not really being possible, the invisibility cloak/shed/carpet is also fairly crap. The paper, Photorealistic images of carpet cloaks, can be read here (pdf). ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
NASA launches new climate model at SC14
75 days of supercomputing later ...
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
LIFE, JIM? Comet probot lander found 'ORGANICS' on far-off iceball
That's it for God, then – if Comet 67P has got complex molecules
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.