scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the equation of motion of long periodic libration around the Lagrangian point in the restricted three-body problem is investigated and the range of validity of an approximate analytical solution in the tadpole region is determined by numerical integration.
Abstract: The equation of motion of long periodic libration around the Lagrangian point $$L_4$$ in the restricted three-body problem is investigated. The range of validity of an approximate analytical solution in the tadpole region is determined by numerical integration. The predictions of the model of libration are tested on the Trojan asteroids of Jupiter. The long time evolution of the orbital eccentricity and the longitude of the perihelion of the Trojan asteroids, under the effect of the four giant planets, is also investigated and a slight dynamical asymmetry is shown between the two groups of Trojans at $$L_4$$ and $$L_5$$ .

10 citations

Journal ArticleDOI
TL;DR: In this paper, the spectral slope and color distributions of Jupiter Trojans were analyzed using a sample of data from the Moving Object Catalogue of the Sloan Digital Sky Survey, together with spectra obtained from several surveys.
Abstract: We present a comparative analysis of the spectral slope and color distributions of Jupiter Trojans, with particular attention to asteroid families. We use a sample of data from the Moving Object Catalogue of the Sloan Digital Sky Survey, together with spectra obtained from several surveys. A first sample of 349 observations, corresponding to 250 Trojan asteroids, were extracted from the Sloan Digital Sky Survey, and we also extracted from the literature a second sample of 91 spectra, corresponding to 71 Trojans. The spectral slopes were computed by means of a least-squares fit to a straight line of the fluxes obtained from the Sloan observations in the first sample, and of the rebinned spectra in the second sample. In both cases the reflectance fluxes/spectra were renormalized to 1 at 6230 $\textrmA$. We found that the distribution of spectral slopes among Trojan asteroids shows a bimodality. About 2/3 of the objects have reddish slopes compatible with D-type asteroids, while the remaining bodies show less reddish colors compatible with the P-type and C-type classifications. The members of asteroid families also show a bimodal distribution with a very slight predominance of D-type asteroids, but the background is clearly dominated by the D-types. The L4 and L5 swarms show different distributions of spectral slopes, and bimodality is only observed in L4. These differences can be attributed to the asteroid families since the backgraound asteroids show the same slope distribtuions in both swarms. The analysis of individual families indicates that the families in L5 are taxonomically homogeneous, but in L4 they show a mixture of taxonomic types. We discuss a few scenarios that might help to interpret these results.

10 citations

Journal ArticleDOI
27 May 2020
TL;DR: In this article, the authors investigate the recent and future orbital evolution of the solar system small body 2019 LD2 (hereafter "LD2"), which was recently found to show cometary activity.
Abstract: We investigate the recent and future orbital evolution of the solar system small body 2019 LD2 (hereafter "LD2"), which was recently found to show cometary activity. While LD2's orbit initially looks similar to that of a Jupiter Trojan, numerical integrations show that it is only co-orbital with Jupiter for approximately a single orbit around the Sun. This would classify LD2 as an active Centaur, but we stress this object remains unique; within the next ~40–50 years LD2 is likely to become a Jupiter Family Comet, offering an opportunity to observe this critical transition.

10 citations

Proceedings ArticleDOI
20 Aug 2014
TL;DR: This paper proposes a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems.
Abstract: Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have been shown to serve for Trojan detection. In this paper, we propose a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems. We outline the fundamental basics of verification methods and go then into the details of each step in the process. We identify assets and attackers, and outline which methods are suited to defend against which type of attack.

10 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168