Feeds

Bringing Iron Man to life: Exoskeletons, armour and jet packs

Power without the muscle of Banner and Captain America

Top three mobile application threats

Arc reactor or hydrogen peroxide?

Kakalios estimates that Stark himself tips the scales at around 13 stone (81kg), which means that "his boot-thrusters would need to supply a constant downward force of over 330lb (equal to a mass of 150kg)" just for a fully suited-up Iron Man to do that enchanting wobbly hover thing he does. Duelling with supersonic fighter planes would require rather more than that.

“The only reason I didn’t give this movie a superhero physics A-grade was that... the amount of energy you would have to supply to continuously provide a downward thrust in order to maintain an upward force to counterbalance gravity is enormous,” Kakalios says.

So what about engines and power? In the film, Stark’s Arc Reactor is the engine's - and the weapons' - power source. Other engine options exist, but are limited. We have jet packs that work today but you don’t get to travel very far. One of today’s jet pack makers is Jet Pack International, which builds a hydrogen-peroxide-fuelled device capable of speeds of up to 80mph (128kmph). Problem is, it has a flight time of just 20 to 30 seconds and you'll only cover about a quarter of a mile (402m).

Next, there’s the control system. In the film, if Stark wants to fire his repulsor rays or transfer more power to the boot-jet thrusters, you never see him press a button or even give a voice commands. In the comics it’s explained away by saying that he has a cybernetic helmet that picks up his brainwaves and sends the signals to the suit – amazingly enough, this part is something that can be replicated in reality.

A number of scientists are working on cybernetic helmets.

One is Bin He of the Department of Biomedical Engineering at the University of Minnesota. He has built a helmet that, like Iron Man’s, enables the wearer to control a computer just by thinking. It works on the principle that the electrical currents generated the brain create electric and magnetic fields, which can be detected by external devices.

“It’s a device that detects the very minute electromagnetic waves that are generated when you think. It amplifies them, interprets them, and can send signals to a computer so that you could move a mouse cursor on a computer screen by just thinking,” says Kakalios.

The basic idea of electroencephalogram (EEG) has been around since 1924, but recent developments in signal processing and analysis have enabled scientists to extract much more detailed information about the personal computer we’re all carrying in our heads.

“The first goal of this research is to treat paralysis or to develop improved next-generation prosthetic devices, but if you asked me as a kid in the '60s which aspect of Iron Man would be the closest to reality in the 21th century I would have said the jet boots, or maybe the repulsor rays. I don’t think I would have said a mind-reading helmet,” Kakalios says.

The device requires a good deal of "training", in the same way that we have to teach voice recognition software how to handle our distinctive intonation. Nevertheless it points the way to a hands-free alternative to the mouse and keyboard. Perhaps one day we’ll all be thinking emails directly to one another - hopefully with hilarious results.

Time for the X1?

NASA, the Florida Institute for Human and Machine Cognition (IHMC) and engineers from Oceaneering Space Systems in Houston are collaborating on a robotic exoskeleton called X1.

The 57lb (26kg) device is wearable robot that can either aid or inhibit movement in leg joints. In the inhibit mode, the robotic device would be used as an in-space exercise machine to supply resistance against leg movement. The same technology could be used in reverse on the ground, potentially putting victims of paralysis back on their feet.

There is a huge overlap between the science community and the science fiction, not just because fans of one work in the other. Robert H Goddard, the man who built the first liquid-fuelled rocket, began his love affair with space travel after reading H G Wells’ War of the Worlds.

And while they may not be able to turn us green, it’ll be interesting to see how much further the world’s scientists can go in replicating super-hero fiction using scienctific fact. ®

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.