Anti-cloaking: the Mathematics of Disguise

نویسندگان

  • THERESA C. ANDERSON
  • BROOKE E. PHILLIPS
  • Harry Potter
چکیده

Recent developments in cloaking, the ability to selectively bend electromagnetic waves so as to render an object invisible, have been abundant. Based on cloaking principles, we will describe several ways to mathematically disguise objects in the context of electrical impedance imaging. Through the use of a change-of-variables scheme we show how one can make an object appear enlarged, translated, or rotated by surrounding it with a suitable “metamaterial,” a man-made material that selectively redirects current. Analysis of eigenvectors and eigenvalues, which describe how current flows, follow. We prove that in order to disguise an object, a metamaterial must encompass both the subdomain and its disguised version, and discuss the consequences. Finally, we briefly explore how electricity is just a springboard to potential applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancement of Near Cloaking for the Full Maxwell Equations

In this paper, we consider near cloaking for the full Maxwell equations. We extend the method of [5, 6], where the quasi-static limit case and the Helmholtz equation are considered, to electromagnetic scattering problems. We construct very effective near cloaking structures for the electromagnetic scattering problem at a fixed frequency. These new structures are, before using the transformation...

متن کامل

N ov 2 00 6 Full - wave invisibility of active devices at all frequencies

There has recently been considerable interest in the possibility, both theoretical and practical, of invisibility (or “cloaking”) from observation by electromagnetic (EM) waves. Here, we prove invisibility, with respect to solutions of the Helmholtz and Maxwell’s equations, for several constructions of cloaking devices. Previous results have either been on the level of ray tracing [Le, PSS] or ...

متن کامل

Detecting Stealth Web Pages That Use Click-Through Cloaking

Search spam is an attack on search engines’ ranking algorithms to promote spam links into top search ranking that they do not deserve. Cloaking is a wellknown search spam technique in which spammers serve one page to search-engine crawlers to optimize ranking, but serve a different page to browser users to maximize potential profit. In this experience report, we investigate a different and rela...

متن کامل

Analysis of an approximate cloaking for acoustic scattering problems in R3

In this paper, we consider the acoustic cloaking based on singular transformations and its approximation in the context of scattering problems in R. The cloaking based on singular transformations can not avoid a singularity of the resulting Laplace–Beltrami operator because singular transformations blow up one point to a sphere. In order to treat the singularity properly, we use the variational...

متن کامل

Enhanced approximate cloaking by optimal change of variables

The aim of (passive) cloaking with respect to electromagnetic (or acoustic) sensing is to surround a region of space with a material layer – the cloak – that renders its contents and even the existence of the layer undetectable by such measurements. At least theoretically this can be achieved using the coordinate invariance of the underlying wave equation, through so-called cloaking by mapping....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009