Feeds

Forget invisible kittens, now TANKS draped in INVISIBILITY CLOAK

Antennas bend space-time continuum e-mag waves around large objects

Security for virtualized datacentres

Boffins have come up with a way to throw up an invisibility cloak, using a bunch of small antennas to create a force field instead of using metamaterials* to build a Harry Potter-style garment.

A US Army M1A1 Abrams tank heads out on a mission from Forward Operating Base MacKenzie in Iraq on October 27, 2004

Tall order ... could you smuggle one of these out of the shop with an invisibility cloak?

Researchers from the University of Toronto’s department of electrical and computer engineering have demonstrated a cloak that is thin, scalable and adaptive to different sizes of objects – though, unfortunately, it only hides things from radar and not from the naked eye.

"We've taken an electrical engineering approach, but that's what we are excited about," said Professor George Eleftheriades. "It's very practical."

To hide the object from detection, the engineers surround it with small antennas that radiate an electromagnetic field. This field cancels out any waves scattering off the cloaked object, making it undetectable to radar.

"We've demonstrated a different way of doing it," said Eleftheriades. "It's very simple: instead of surrounding what you're trying to cloak with a thick metamaterial shell, we surround it with one layer of tiny antennas, and this layer radiates back a field that cancels the reflections from the object."

Their demonstration used one loop of antennas to cloak a smaller object, but the researchers reckon that the system could be scaled up using additional loops to cover much larger things – like military tanks for example. The system also has to be manually tuned to the electromagnetic frequency it needs to cancel out, but the antennas could work as sensors as well in the future, adjusting to different waves in real-time – much like noise-cancelling headphones.

Aside from hiding ships, aircraft and tanks, the system can also be used to bypass obstacles, like buildings that get in the way of mobile phone cell towers. The antennas can also make a cloaked object seem bigger or smaller than it is or make it appear in a different place.

The boffins also think that retuning the system to work with light waves, rendering the object truly invisible, should work on the same principles.

"There are more applications for radio than for light," admitted Eleftheriades. "[But] it's just a matter of technology—you can use the same principle for light, and the corresponding antenna technology is a very hot area of research."

The full study, “Experimental Demonstration of Active Electromagnetic Cloaking”, was published in Physical Review X. ®

Cloaknote

A metamaterial, according to MIT Technology Review, is "[a] composite made up of precisely arranged patterns of two or more distinct materials" that can "manipulate electro­magnetic radiation, including light, in ways not readily observed in nature." Further (quite readable) reading via the MIT Technology Review website.

Security for virtualized datacentres

More from The Register

next story
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
What's that STINK? Rosetta probe shoves nose under comet's tail
Rotten eggs, horse dung and almonds – yuck
Comet Siding Spring revealed as flying molehill
Hiding from this space pimple isn't going to do humanity's reputation any good
Kip Thorne explains how he created the black hole for Interstellar
Movie special effects project spawns academic papers on gravitational lensing
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
LONG ARM of the SAUR: Brachially gifted dino bone conundrum solved
Deinocheirus mirificus was a bit of a knuckle dragger
Moment of truth for LOHAN's servos: Our US allies are poised for final test flight
Will Vulture 2 freeze at altitude? Edge Research Lab to find out
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.