Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the equation of motion of long periodic libration around the Lagrangian point in the restricted three-body problem is investigated and the range of validity of an approximate analytical solution in the tadpole region is determined by numerical integration.
Abstract: The equation of motion of long periodic libration around the Lagrangian point $$L_4$$
in the restricted three-body problem is investigated. The range of validity of an approximate analytical solution in the tadpole region is determined by numerical integration. The predictions of the model of libration are tested on the Trojan asteroids of Jupiter. The long time evolution of the orbital eccentricity and the longitude of the perihelion of the Trojan asteroids, under the effect of the four giant planets, is also investigated and a slight dynamical asymmetry is shown between the two groups of Trojans at $$L_4$$
and $$L_5$$
.
10 citations
••
TL;DR: In this paper, the spectral slope and color distributions of Jupiter Trojans were analyzed using a sample of data from the Moving Object Catalogue of the Sloan Digital Sky Survey, together with spectra obtained from several surveys.
Abstract: We present a comparative analysis of the spectral slope and color distributions of Jupiter Trojans, with particular attention to asteroid families. We use a sample of data from the Moving Object Catalogue of the Sloan Digital Sky Survey, together with spectra obtained from several surveys. A first sample of 349 observations, corresponding to 250 Trojan asteroids, were extracted from the Sloan Digital Sky Survey, and we also extracted from the literature a second sample of 91 spectra, corresponding to 71 Trojans. The spectral slopes were computed by means of a least-squares fit to a straight line of the fluxes obtained from the Sloan observations in the first sample, and of the rebinned spectra in the second sample. In both cases the reflectance fluxes/spectra were renormalized to 1 at 6230 $\textrmA$. We found that the distribution of spectral slopes among Trojan asteroids shows a bimodality. About 2/3 of the objects have reddish slopes compatible with D-type asteroids, while the remaining bodies show less reddish colors compatible with the P-type and C-type classifications. The members of asteroid families also show a bimodal distribution with a very slight predominance of D-type asteroids, but the background is clearly dominated by the D-types. The L4 and L5 swarms show different distributions of spectral slopes, and bimodality is only observed in L4. These differences can be attributed to the asteroid families since the backgraound asteroids show the same slope distribtuions in both swarms. The analysis of individual families indicates that the families in L5 are taxonomically homogeneous, but in L4 they show a mixture of taxonomic types. We discuss a few scenarios that might help to interpret these results.
10 citations
••
27 May 2020
TL;DR: In this article, the authors investigate the recent and future orbital evolution of the solar system small body 2019 LD2 (hereafter "LD2"), which was recently found to show cometary activity.
Abstract: We investigate the recent and future orbital evolution of the solar system small body 2019 LD2 (hereafter "LD2"), which was recently found to show cometary activity. While LD2's orbit initially looks similar to that of a Jupiter Trojan, numerical integrations show that it is only co-orbital with Jupiter for approximately a single orbit around the Sun. This would classify LD2 as an active Centaur, but we stress this object remains unique; within the next ~40–50 years LD2 is likely to become a Jupiter Family Comet, offering an opportunity to observe this critical transition.
10 citations
••
10 citations
••
20 Aug 2014TL;DR: This paper proposes a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems.
Abstract: Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have been shown to serve for Trojan detection. In this paper, we propose a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems. We outline the fundamental basics of verification methods and go then into the details of each step in the process. We identify assets and attackers, and outline which methods are suited to defend against which type of attack.
10 citations