Quantcast
Channel: georgedvorsky
Viewing all 945 articles
Browse latest View live

ISS Crew Plans Emergency Spacewalk to Fix 'Very Serious' Ammonia Leak

$
0
0

On late Thursday, "a very steady stream of flakes" was spotted drifting away from the space station — an apparent ammonia leak. The crew isn't in any danger, but an emergency spacewalk is being planned to inspect and fix it.

Liquid ammonia is used as a coolant to extract the heat that accumulates in electronic systems, dumping that excess energy through a radiator array. Commander Chris Hadfield and crew spotted the leak near the station's port side, at the far end of the power truss, which is the structure that holds the station's solar arrays. NASA thinks the problem has something to do with the 2B power channel, one of eight fed by the lab's solar arrays.

"They were coming out cleanly and repeatedly enough that it looked like it was a point source they were coming from," Hadfield noted when speaking to mission controllers.

In order for the coolant system to operate normally, it needs as lead 40 pounds of ammonia. Based on the amount of leakage observed, coolant levels could drop below that level and shut down within 48 hours. If that were to happen, the lab's six-person crew would need to reconfigure the station's cooling systems. The ISS can operate without all the cooling channels, but the total loss of a coolant loop would require some serious hacks to prevent some electrical systems from overheating.

As of this morning, a spacewalk is being planned to address the situation. According to Hadfield, astronauts Chris Cassidy and Tom Marshburn are currently getting their suits and airlock ready for what appears to be a Saturday spacewalk.

Here are some highlights from Chris Hadfield's twitter stream:

You can watch the team's preparation for the space walk here:

Listen to how Hadfield explained the situation to the ground crew at NASA.

Other sources: BBC & CBS.

Image: NASA.


Short film Project Kronos explores the dawn of interstellar travel

$
0
0

Visual effects veteran Hasraf ‘HaZ’ Dulull has written and directed this riveting faux documentary chronicling humanity's first steps into deep space.

Set in the not-too-distant future, the story unfolds as project personnel talk about the mission and their various roles within it. But just as things start to get rolling, the team is confronted with something far more profound.

Dulull is a London-based visual effects veteran who started his career developing video game cinematics. He's done visual effects for such films as The Dark Knight, Prince Of Persia, and The Chronicles Of Narnia. He also directed Fubar a film about a battlefield in which the people are replaced by cats and dogs, and later released Fubar Redux thanks to a successful Kickstarter campaign.

Since the film was released last week, it has lead Dulull to getting signed for representation as a director in Hollywood and currently developing the feature film version.

18-Year-Old With Three Degrees Will Now Pursue Two Doctorates

$
0
0

Teen prodigy Raymond Walter will graduate tomorrow with bachelor of science degrees in mathematics, physics, and economics. Next up, doctorates in math and physics. Why the rush? The wheelchair-using teen has a severe form of muscular dystrophy and feels there isn't much time.

Raymond has Duchenne Muscular Dystrophy — a severe form of muscular dystrophy that worsens quickly. It's a genetic disorder that affects one in every 3,600 male births. Because it causes muscles to waste away, most patients have to start using a wheelchair by the time adolescence kicks in. Breathing difficulties and heart disease set in by the age of 20.

The average life expectancy for patients with DMD is around 25.

“I don’t anticipate living as long as usual,” Raymond told the University of Arkansas Newswire. “In some respects, there is a lot of pressure to get as much done as I can. I don’t waste time. I skipped three years of grade school and to some extent I’ve continued my acceleration since I reached the university level. I finished my undergraduate economics course work in my freshman year. So as a sophomore I began to take graduate courses.”

Raymond was just 14 when he graduated from high school.

His dad, Hal Water, says his son spends nearly every waking moment outside of class at his studies. Raymond goes to bed after midnight, every night. He doesn’t watch movies or play video games. And he sits at his computer with two desks worth of books which are typically open for 12 to 14 hours each day. “He works constantly.”

Along with his wife, Gail, the family lives on a 193-acre farm in Baxter County where they raise cattle, pigs, donkeys, and horses. Back during high school, Hal and Raymond commuted six hours round trip each weekend.

Raymond graduated from the University of Arkansas' J. William Fulbright College of Arts and Sciences and will now move to the Graduate School as a Distinguished Doctoral Fellow. The program provides a minimum of $30,000 annually for up to four years. Raymond also won a highly competitive $30,000 National Science Foundation Graduate Research Fellowship for the forthcoming academic year.

More at the U of A Newswire.

Images via U of A.

A similar thought occurred to me.

$
0
0

A similar thought occurred to me. Let's hope, like Hawking, he defies the odds.

Did government scientists really create a secret quantum internet?

$
0
0

No, not really. But for two years, researchers at Los Alamos National Labs have been working on something they call network-centric quantum communications — and this could usher in the next generation of hyper-secure, scalable, and affordable quantum cryptographic techniques. We spoke to the lead researcher to find out more.

Earlier this week, MIT’s Technology Review published an article claiming that a “government lab” has been secretly operating a “quantum internet” for over two years. Several other outlets ran with the story, including Popular Science and Wired.

But this idea, that a government-sponsored lab was secretly hacking away at the the Holy Grail of internet security, seemed too good to be true. So we contacted the lead researcher, Richard Hughes, to learn more about the project.

'Not a phrase we used’

“The MIT article doesn’t accurately characterize what we’ve been doing,” he told io9. “We are not part of the Internet, and that phrase — a quantum internet — is not something we used in our paper."

Rather, Hughes’s team created a network test bed for doing quantum cryptography over an optical fiber network. They’ve been running it to test their protocols and its performance, with the hope of using it to protect critical infrastructure, such as the electrical grid.

“Really, there’s nothing unusual about what’s been going on here for the past two-plus years,” says Hughes. “It’s just that we don’t tend to write papers until we have something interesting to report.”

As for the accusations of secrecy, the Los Alamos National Labs team was delayed in making their work public because they were filing for multiple patent applications on the technology — of which there were 27 U.S. and foreign patents to secure.

Quantum crypto

So, while it may not be a true quantum internet, it’s a system that comes pretty damned close.

And indeed, UC Berkeley security expert Galina A. Schwartz told me that, while it’s not a true quantum internet, it's a breakthrough that shows we’re well on our way to getting there. “It is exciting,” she told io9, “and it is coming in the future, but not exactly tomorrow.” These devices, she says, are still some way from commercial reality.

By strict definition, a true quantum internet would allow for perfectly secure communications from any point in the network to another. Quantum cryptography would, in theory, make the network secure from wiretaps, eavesdropping, hacking — anything. So long as the one-time pad is kept a secret — a randomly generated and lengthy key that can only be used once — point-to-point communication is impenetrable. Once refined, cryptography of this strength could be used to secure critical infrastructure and protect the electric grid from malicious attacks.

One-time-pads are generated by a process called quantum key distribution (QKD), and it relies on the spooky power of the Heisenberg Uncertainty Principle to produce shared keys that are only known to two parties, and which are subsequently used to securely exchange messages.

And indeed, it’s this point-to-point limitation that has led some skeptics to believe that a quantum internet is impossible. Others contend that the intense costs and logistical requirements of having to overhaul the world’s IT infrastructure make it a non-starter.

But this is where Hughes and his team got clever. Knowing that a peer-to-peer quantum internet is impossible (at least by today’s level of comprehension), the Los Alamos lab created a quantum hub-and-spoke digital communications network. What’s more, the architecture is potentially Internet compatible; it runs off standard fiber optic cables that connect to off-the-shelf PCs running the Windows operating system.

“We see this attribute as a major innovation over what’s been done before in quantum cryptography networks — and it’s designed from the ground up to be something that’s reasonably evolved over top of what’s already deployed out there,” says Hughes. “We are consistent with conventional optical fiber network architectures and conventional cryptographic trust architectures.”

Network-centric quantum communications

The system is a bit clunky, and not peer-to-peer, but it exhibits some fascinating characteristics.

To make it work, the network has a core server computer at the center of it. Then, like the spokes jutting out from the center of a wheel, optical fibers are connected to node computers. These nodes are not connected to each other — but all they share the same hub at the center.

For communication to happen, each client node is equipped with a quantum smart card, or QKarD, that’s the size of a door key. The central hub has optical fiber connected into it, along with a small solid-state single photon detector that needs to be cooled below room temperature.

The QKarD allow the nodes to write quantum bits, but they can only read conventional bits. Only the hub is able to both read and write quantum bits. Data travels from each node to the hub along a secure one-time pad enabled connection. So, if node A wants to communicate with node B, node A sends a message to the central hub, which in turn routes the data to node B using secure classical connection enabled by a different one-time pad.

And yes, you guessed correctly: If the security of the hub is compromised, the entire thing falls apart.

“The way the testbed works today is that we have three client devices talking over optical fiber to a server node,” says Hughes.

By concentrating the more expensive and more technologically demanding components in the central server, the team was able to amortize that cost and complexity over all the nodes in the network. Other approaches, on the other hand, require detectors at every node, which is expensive and hard to deploy.

“This is something that’s far beyond what’s been done in the past with quantum cryptography,” Hughes told us. “But what we have is an experimental testbed — one that isn’t in any sense operational.” Last December, the team also demonstrated technology that can secure the control data and commands of the electrical grid against a potential attacker — but again, not in an operational environment.

’Quantum cryptography is bunk’

But not everyone is convinced that quantum cryptography represents the future of internet security — at least not immediately.

“Cyber-physical systems operating large scale critical infrastructures such as the electric grid are comprised of products from dozens — even hundreds — of manufacturers,” Schwartz told us. “Will they suddenly switch from non-quantum crypto-solutions to employing quantum cryptography in their products — especially given that malicious intruders focus on attacking the ‘weakest links’ of CPSs?”

In fact, existing security solutions based on conventional cryptography are not at all the ‘weakest link’ of CPS security.

“Manufacturers would rather invest in improving security of the weakest links of their products,” she says. “Many products are known to be notoriously insecure, but still remain in use: proprietary protocols still prevail in electric grid, despite the fact that they are more prone to design failures than public protocols.”

And as Schwartz reminded us, no system with human participants is ‘truly’ secure: “Social engineering will exist 'till humans are extinct.”

We also reached out to Ross Anderson, a professor at the University of Cambridge's Computer Laboratory, and author of the paper, “Why quantum computing is hard — and quantum cryptography is not provably secure.”

After we brought Hughes’s paper to his attention, he responded in an email:

The problem with protecting critical infrastructure isn't that crypto is hard. Crypto is easy; we have protocols like TLS, IPSEC, SSH and Kerberos that are available on pretty well all modern machines. The problem is that a typical power network has a huge diversity of equipment, much of it dating back decades, and it's prohibitively expensive to replace it all with new stuff. As a result, the only feasible way to protect the typical utility is reparameterization; ensuring that the control networks are separated from the Internet using robust firewalls. Cryptography is not the appropriate technology in most cases and even where it is we have cheap simple stuff that works. The authors' hope to sell expensive, flaky quantum crypto into critical infrastructure markets is bizarre. The words "snowflake" and "hell" spring to mind.

In a follow-up email, Anderson put it more succinctly: “No such thing. Quantum crypto is bunk.”

I let Hughes read Anderson’s email, and we talked about it.

“Yeah, I don’t agree with that — and I guess our Department of Energy sponsors don’t agree with that, either, seeing as they’re funding us to do this stuff,” he quipped. “Look, it’s certainly true that there’s a huge installed base of devices out there controlling the grid. And often these things are installed and expected to operate for 20 to 30 years. But they’ve been installed without security on them, so you have an issue of wanting to put in a retrofit to secure it.”

But it’s not true, argues Hughes, that the current state of cryptography can potentially meet the given requirements, many of which have been analyzed by multiple research groups from around the world.

“You just cannot meet the demands for the low latency that’s necessary to control theses things,” he says, “This is why the DOE is interested in funding us, because we can both meet the security and the latency requirements.”

Furthermore, he says, quantum cryptography has an attribute known as forward security — where, if a design weakness is found in the future, and in contrast to present day cryptography, it prevents anything previously done with the hardware from being retroactively vulnerable.

“And that’s absolutely not true with current day public key cryptography,” Hughes told us.

And as for the notion that this is always going to be expensive, and that these initiatives will require a revolution in the existing communications structure, Hughes says that’s just not correct.

“By harnessing these manufacturing techniques that are now being used in integrated photonics, we can get the cost of these transmitter devices down to the couple-of-hundred-dollar range by producing them in large quantities, thus making it reasonable in terms of affordability and deployability. And we can be applied as a retrofit on top of the existing fiber infrastructure — we can deploy on what’s already out there.”

In regards to the claim that everything can be done with pre-existing firewalls, Hughes admits that multiple approaches are warranted, but there are still problems. “There is an active research direction there, but it’s not clear if this is the absolute panacea that Anderson suggested.”

The future

Looking ahead, Hughes hopes to see his technology used in the critical infrastructure sector and for securing the electric grid. The potential for hackers to attack the grid, he says, is very real — one that could cripple the economy.

Hughes also sees the potential for securing commands and data, which have tight requirements for latency, often within a few milliseconds to prevent physical damage. It could also work in the financial sector and the burgeoning practice of high speed trading. And indeed, the amount of time it takes to apply cryptography is becoming a significant factor in how fast trades can be executed.

His team is also working on a next generation quantum transmitter QKarD, one that’s much smaller than what they’re currently using. Once miniaturized, these cards could fit inside a mobile phone or tablet device. He envisions a docking station for a handheld device that, in addition to charging the battery, would feed the device’s memory with cryptographic key material that can be shared with a central server in the enterprise. So, when a user undocks the device and carries it around, those secure keys could be used to communicate with friends or colleagues, or other parts of the same network. And it would have all the advantages of quantum security, though without an optical fiber cable.

Wireless quantum-level security in handheld devices? Yes, please.

Top image: Anteromite/Shutterstock; Los Alamos National Labs.

You can now watch Luke Randall's award-winning short film, Reach

$
0
0

Okay, it's time for you to take a quick four-minute break. This little animated gem was put together by student filmmaker Luke Randall back in 2009 — and it quickly won him over 20 different awards.

For such a tiny and simple film, it packs a lot. The little robot can be seen as a modern version of Icarus, a character driven to the edge by its own hubris. Or, the tiny robot's plight can be seen as a representation of the human condition, one filled with constant yearning — and frustrating constraints. The short also speaks to the limitations of technology.

Or I could simply shut up, and just let you watch it for yourself.

Fantastic high speed shots of liquids swirling through the air

$
0
0

Belgian photographer Manon Wethly likes to throw stuff around, particularly cups and glasses filled with various liquids and powders. Thankfully, she also likes to snap glorious high speed photos of these objects as they go airborne.

All images Manon Wethly via her Instagram. Check out more at her blog.

Wethly experiments with any number of liquids, including milk, wine, coffee, and juice. The various shapes she's able to capture are mesmerizing and they look great when set against those gorgeous blue-sky backdrops.

Speaking to Junk Culture she says:

It is absolutely fascinating to see what kind of shape an object or liquid gets when it is 'flying'. Clicking at exact the right second most often brings the most spectacular and surprising results. Most of them are shot with iPhone but I started to practise with bigger guns too.

H/t Peta Pixel via Junk Culture.

Freak Ice Tsunami Crunches Homes In Canada

$
0
0

The whole thing only took 15 minutes, but by the time it stopped over two-dozen homes and cottages were either seriously damaged or completely destroyed. An arctic wind blowing across Duphin Lake near Winnipeg, Manitoba, created this bizarre phenomenon in which rapidly forming ice moved inland along Ochre Beach.

According to Manitoba's Emergency Measures Organization, 12 permanent homes were completely crushed and destroyed by the ice floes. The walls of ice were pushed inward by winds gusting up to 37 mph (60 kph).

Images: Winnipeg Free Press/CKDM.

The Winnipeg Free Press reports:

Doug Davis had just taken a shower and was about to sit on his couch and relax at his home along Ochre Beach on Friday night.

Then he heard the ice coming.

"All of a sudden," said Davis's wife, Elaine, "that was it."

Within the next five minutes, a wall of ice rose from the lake, so powerful that it plowed though the Davis's two-storey home, pushing furniture from one bedroom into another. It pushed the bathroom tub and vanity into the hallway.

The Davis family weren't the only ones who had damage. In all, 27 homes and cottages were damaged or destroyed — but no injuries were reported.

A local state of emergency was declared in the municipality and residents along the beach were evacuated Friday night.

Residents could see and hear it coming, but could do nothing as the ice pierced through windows and doors.

Locas haven't had a lot of luck lately; many residents are still recovering from floods that struck the region in 2011.

A similar thing also happened in Minnesota this past weekend, though the damage was much lighter. Check out the video:

Images CTV.


This physics simulation is one of the most accurate you'll ever see

$
0
0

Physicists from Berkeley say they've figured out the insanely complex math behind the way bubbles pop when they're in a foam — and they've got an extraordinarily accurate video to prove it.

The math behind a single bubble popping is relatively straightforward. Scale that up to a cluster of foamy soap bubbles, on the other hand, and you've suddenly got something that's considerably more complicated.

Unlike a single bubble that pops in isolation, clustered bubbles work off each other to produce a complex set of physical events that span both space and time. When one bubble pops, the other bubbles quickly rearrange themselves to balance out the cluster. This sets off a cascade of forces that influence the overall configuration of the cluster and the timing of subsequent pops.

Given all this complexity, physicists have struggled to accurately describe the behavior of foams with equations.

So, to capture all these layers of effects, researchers Robert Saye and James Sethian divided a foam’s lifecycle into three independent phases that could be mathematically modeled: rearrangement (how bubbles reorient themselves after a pop), drainage (accounting for the effect of gravity on a bubble’s ultra-thin membrane), and rupture (calculating the moment when the bubble pops).

In the video above, the scientists explain:

Liquid drains from the bubbles' thin walls until they rupture, after which the remaining bubbles rearrange, often destabilizing other bubbles, which subsequently pop. Note the sunset reflections. The research could help in modeling industrial processes in which liquids mix or in the formation of solid foams such as those used to cushion bicycle helmets.

They call it a scale-separated approach, one which allowed them to identify the important physics taking place in each of the distinct scales. The researchers were then able to take these equations for expression within a computer simulation. And for added realism, they also developed equations that described the way a sunset would look when reflected in bubbles.

Interestingly, it took five days for supercomputers at the Department of Energy's National Energy Research Scientific Computing Center to churn through each layer of equations to produce the simulation.

Read the entire study at Science: “Multiscale Modeling of Membrane Rearrangement, Drainage, and Rupture in Evolving Foams.”

Image: Saye & Sethian, UC Berkeley/LBNL.

Your Dreams Might Be Ruining Your Love Life

$
0
0

We know our dreams aren’t real — and we certainly know that the actions of the people in our dreams can’t be held against them in real life. But a new study suggests we may be doing exactly that, albeit at an unconscious level.

Psychologist Dylan Selterman and colleagues have discovered that the contents of our dreams can influence the way we treat our significant other the next day.

The new research, which was just published in Social Psychological and Personality Science, suggests that if we have certain dreams about our partner — about them cheating on us, or causing negative emotions like jealousy — we may unknowingly carry the resulting emotional baggage into the relationship itself. As a result, dreams of our significant others can influence and even predict our behavior in the relationship.

To reach this conclusion, Selterman’s team studied 61 participants between the age of 17 and 42 who were in committed relationships for at least the past half-year. Over the course of two weeks, each participant had to complete a twice-daily writing assignment in which they recorded their dreams and interactions with their partners.

Looking at the reports, the researchers discovered that certain types dreams could be linked to behaviors and feelings the next day. Specifically, dreams of jealousy were linked to reports of increased conflict, while dreams of infidelity resulted in feelings of decreased intimacy and love.

Selterman says that these behaviors arose independent of attachment styles, overall relationship health, and anything that might have happened between the couple the day before.

Interestingly, dreams of sex created an instant intimacy boost — but only for couples who said they were in a highly committed relationship. What’s more, couples in healthy relationships tended to report fewer negative effects following dreams of jealousy.

The theory behind why this happens is hardly rocket science. It’s just classic priming — a psychological effect where exposure to a certain stimulus influences our responses to a later stimulus. But what makes this form of priming particularly unique is that the associations are instigated during the dream state from stimulus that's not real! And the priming itself operates on a largely unconscious level.

The study also shows show that dreams may be an under-appreciated aspect of our social lives. They may be doing more to influence our behaviors — and the quality of our relationships — than we realize.

Check out the entire study: “Dreaming of You: Behavior and Emotion in Dreams of Significant Others Predict Subsequent Relational Behavior.”

As the storm breaks, the Moon and Venus converge

$
0
0

Everything came together for Spanish photographer Isaac Gutiérrez Pascual when he snapped this glorious photo. With the Moon in its crescent phase, and Venus in perfect alignment to the right, a flock of birds took flight just as a storm began to break up.

Credit: Isaac Gutiérrez Pascual; published with permission.

Via APOD, which adds: "Bright Venus again becomes visible just after sunset this 2013 May and will appear near Jupiter toward the end of the month."

Physics Technician Busted For Preparing Cocaine In University Lab

$
0
0

Hmm, this plot sounds somewhat familiar: A physics technician from the University of Bristol has been sentenced to 18 months in jail after using equipment in the university's lab to prepare more than $15,000 worth of cocaine for sale on the city's streets.

As the Bristol Post is reporting, Timothy Newbury, along with former solider Nicholas Avery, sought out the lab's hydraulic press. Newbury was a lab technician at the university's physics department, giving him easy access to the equipment.

Normally, these presses are used to straighten, stamp, and bend metal for general shop work. But in a physics lab it can produce all kinds of flat and compressed objects — which is exactly what the team used it for; after cutting the cocaine with other substances, the dynamic duo then employed the press to convert the drug into a highly compressed block for distribution.

They basically turned the university lab into their own pressing workshop. During the trial, closed-caption TV showed Newbury and Avery going to the lab.

But unfortunately for them, they were later stopped by police and found to be in possession of the cocaine. After searching Avery's residence, officers discovered almost 750g of high-purity cocaine worth about $306,000.

Avery pleaded guilty at Bristol Crown Court to two counts of possessing cocaine with intent to supply and was jailed for five years. Newbury only received an 18 month sentence after successfully arguing that he had no other involvement in the operation.

Image: This Bristol.

Mathematician Makes Astounding Prime Numbers Breakthrough

$
0
0

A partial solution to a centuries-old problem known as the twin prime conjecture now affirms the idea that an infinite number of prime numbers have companions — and that a maximum distance between these pairs does in fact exist.

Prime numbers are those non-composite numbers that can only be divided by one or itself. On average, the gap that separates these numbers gets larger as their values increase. But a neat quirk about primes is that every once in awhile they also come in pairs, so-called twin primes. These numbers differ from another prime by two. Examples include 3 and 5, 17 and 19, 41 and 43, and even 2,003,663,613 × 2195,000 − 1 and 2,003,663,613 × 2195,000 +1.

Ever since the time of Euclid, however, mathematicians have wondered if these twin primes keep on appearing for infinity. They have no doubt that primes themselves appear for infinity, but because mathematicians lack a useful formula to predict their occurrence, they have struggled to prove the twin prime conjecture — the idea that there are infinitely many primes p such that p+2 is also prime (i.e. the two number gap).

But now, as the Mathematician Zhang Yitang from University of New Hampshire in Durham has shown, there is a kind of weak version of the twin prime conjecture. He didn’t prove that a distance of 2 exists for an infinite number of primes, but he did prove that there are infinitely many prime gaps shorter than 70 million.

A gap of two is obviously far removed from a gap of 70 million. But considering that the previous estimate was infinity, Zhang’s assertion is incredible. As Maggie McKee noted in Nature News, “Although 70 million seems like a very large number, the existence of any finite bound, no matter how large, means that that the gaps between consecutive numbers don’t keep growing forever.”

Zhang presented his research yesterday (May 13) to an audience at Harvard University, so his work will still have to withstand the scrutiny of peer review. But according to McKee, a referee with the Annals of Mathematics is recommending that his paper be accepted for consideration.

Image: Rasmus Holmboe Dahl/Shutterstock.

Yes, I shouldn't have used that term.

$
0
0

Yes, I shouldn't have used that term. I've fixed for clarity.

Fixed!


Talk about a daunting problem.

Yup, now fixed.

Oh come now, it's not *that* complicated.

$
0
0

Oh come now, it's not *that* complicated. Hell, even I understood it.

We just used the theory of relativity to discover a new planet

$
0
0

In a manner of speaking, Albert Einstein just helped an international team of astronomers find a hot Jupiter that’s 2,000 light-years away. It’s the first time in history that the theory of relativity was used to locate another planet.

Normally, astronomers use the transit method to detect exoplanets, a technique that tells astronomers a planet has passed in front of its parent star. There’s also the wobble method, where astronomers can measure the periodic back-and-forth between gravitationally bound objects.

But the new technique, which the scientists are conveniently calling BEER (relativistic BEaming, Ellipsoidal, and Reflection/emission modulations), works by exploiting an effect predicted by Einstein’s Special Theory of Relativity.

The effect is known as beaming (sometimes called Doppler boosting), and it happens when a star’s brightness is increased as it moves towards the Earth, and dims as it moves away. It moves toward us because a planet is there to pull it (hence evidence of its presence). The brightening is caused by light particles, called photons, that are piling up in energy.

What’s more, the gravitational tides from the orbiting planet cause the star to stretch into an elliptical shape (the top image shows an exaggerated depiction of this), which causes it to appear brighter — and also expose more surface area — when its wider side faces Earth. And lastly, the planet reflects a small amount of detectable starlight.

It's these three components that make up BEER, a technique that, moving forward, will help astronomers find similar celestial bodies. And indeed, it'll be particularly useful for finding objects that don't require a precise alignment of planet and star as seen from Earth. Regrettably, it can't be used to find small, Earth-sized worlds (at least not with today's technology).

The astronomers, a team at Tel Aviv University and the Harvard-Smithsonian Center for Astrophysics (CfA), used the BEER formula to find the so-called Einstein planet, which is more formally known as Kepler-76b. It’s about 25% larger than Jupiter and weighs about twice as much, thus qualifying as a hot Jupiter.

The Astrophysical Journal has accepted the paper for publication, but you can read it here.

Images: David A. Aguilar (CfA).

Well, I'm sure that when his paper comes out it won't be exactly 70 million — but he is presenting a

$
0
0

Well, I'm sure that when his paper comes out it won't be exactly 70 million — but he is presenting a kind of upper bound. I'll be interested to see if he actually does come up with a hard number.

Viewing all 945 articles
Browse latest View live