Microrobot Can Navigate Using Electric Fields

Engineers from Drexel University have devised a bacteria-powered microrobot that can be steered through fluids with applied electric fields. Imagine a tiny, tiny robotic system covered over by even tinier biomolecular arms (flagella) working cooperatively as a "bacterial surface" to move the biobot from place to place, and then, just as importantly, imagine an algorithm that can steer the thing. The group's work is described in the current IEEE Transactions on Robotics.

The bacteria-powered microrobot (BPM) idea is in itself not new. Researchers are chasing after the technology from many different angles, while biomedical engineers from the same Drexel lab had demonstrated an earlier version of this same concept in 2014, albeit in a much simpler environment.

The idea behind the bot is intuitive enough, at least in theory. Take an inorganic substrate—in this case an epoxy known as SU-8 that's useful for building tiny machine components—and blot it with bacteria swarming on an agar plate. The bacteria adhere naturally the SU-8 and that's basically it.

The motion comes from the twisting swimming motions of the bacteria's wispy appendages, or, in the paper's words: "The hydrodynamic force is generated by the helical motion created by the bundling of many rotating flagella." This is how bacteria get around generally, via a collection of tiny biological propellers. It's pretty neat.

To harness this bacterial carpet of propellers, the researchers take advantage of the innate negative charge of gram-negative bacteria. In electrically neutral surroundings, the bacteria-bot just kind of swims around in whatever direction it starts in, but apply some charge and it becomes possible to (very carefully) steer it.

Here's a much earlier version of the idea, from the same lab:

This steering is the tricky thing, and this is where the current paper makes its advance: a control algorithm. In particular, the Drexel researchers present an algorithm that can optimally avoid obstacles. The challenge is that there are several factors trying to get the bot to go this or that direction in addition to electric charge. For one thing, the assembled bacteria give the bot a natural or preferred direction. Drop a motorboat into some water and it's going to move in whatever direction it's pointed, which will be some function of its hull shape, propeller orientation, and also the current of the water (analogous to the applied charge). The boat's gonna be fairly predictable, but a slime of bacteria on a micro scale robot, a bit less so. What's more, the fluid mechanics of the BPM are such that it can change direction almost instantaneously.

"The problem is ultimately an optimization problem to find the velocity that allows the maximum amount of control using electric charge given all of these factors," the authors write. "Through several experiments, our proposed method succeeded in translating the BPM to its goal position while avoiding static obstacles. In terms of the control input, our algorithm steadily maintained the maximum magnitude of input, which was 20 V in our system. This enables the BPM to steer with high velocity due to a strong power voltage."

Motherboard: http://bit.ly/1QP5aZt

« NSA Is Merging Hacker And Anti-Hacker Teams
The Blockchain Will Change The Property Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.