Feeds

Important breakthrough in mole-cruiser technology

Thick metal tentacle-craft clad in latex sock

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Good news for mole-cruiser fanciers today, as boffins reveal important new developments in the technology of burrowing subterranean machines.

Poster art for the 70s film of At the Earth's Core by Edgar Rice Burroughs

Traditional mole cruiser in action.

The new underground locomotion tech comes from Professor Daniel Goldman of Georgia Tech and his colleagues, funded in their mechanical mole research by the US Army and National Science Foundation. The prof and his team were inspired by the sandfish lizard of the Sahara desert, which "swims" through the sand seas there.

"We were intrigued by the sandfish lizard’s wedge-shaped head that forms an angle of 140 degrees with the horizontal plane," explains Goldman. "We thought its head might be responsible for or be contributing to the animal’s ability to maneuver in complex environments."

The boffins fashioned a small unmanned demonstrator mole-craft featuring seven articulated segments powered by servo motors. These were apparently "packed in a latex sock and wrapped in a spandex swimsuit". The necessary wedgey "tapered snout" was furnished by attaching a suitable block of wood.

In trials during which it was submerged in a chamber filled with tiny plastic balls, the mole machine's ability to direct its course by changing the angle of its doorstop proboscis was explored.

"The ability to control the vertical position of the robot by modulating its head inclination opens up avenues for further research into developing robots more capable of maneuvering in complex environments, like debris-filled areas produced by an earthquake or landslide," says Goldman.

There are other applications, perhaps more interesting to the prof's military sponsors. We have reported previously on Pentagon plans for the so-called Robotic Underground Munition (RUM), a burrowing mole-missile able to attack such targets as the deeply buried uranium centrifuge bunkers at Natanz in Iran.

It would also, of course, be possible to substitute a crew compartment for the RUM's warhead and add controls for a pilot. Then the long-awaited mole cruiser, navigating beneath the surface of the Earth by means of lightning-plotter 'sferic' beacons, would have become reality at last.

This is important to allow for the real world appearance of such so-far-fictional figures as the Underminer, an excellent supervillain who appears briefly at the end of The Incredibles. Almost his only line is:

"I am beneath you – but NOTHING is beneath me!"

There's more from Georgia Tech here. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.