33 resultados para Low-mass star


Relevância:

30.00% 30.00%

Publicador:

Resumo:

NASA's Dynamics Explorer (DE) mission was designed to study the coupling between the Earth's magnetosphere, ionosphere and neutral thermosphere1. One area of major interest is the outflow of ionospheric plasma into the magnetosphere, the scale and significance of which is only now becoming apparent with the advent of mass-resolving, low-energy ion detectors. Here we compare observations of ion flows in the polar magnetosphere, made by the retarding ion mass spectrometer (RIMS)2 on DE1, with those made simultaneously in the topside ionosphere by the ion drift meter (IDM)3 on the lower-altitude DE2 spacecraft. The results show the dayside auroral ionosphere to be a significant and highly persistent source of plasma for the magnetosphere. The upwelling ionospheric ions are spatially dispersed, according to both their energy and mass, by the combined actions of the geomagnetic field and the dawn-to-dusk convection electric field, in an effect analogous to the operation of an ion mass spectrometer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A simple polynya flux model driven by standard atmospheric forcing is used to investigate the ice formation that took place during an exceptionally strong and consistent western New Siberian (WNS) polynya event in 2004 in the Laptev Sea. Whether formation rates are high enough to erode the stratification of the water column beneath is examined by adding the brine released during the 2004 polynya event to the average winter density stratification of the water body, preconditioned by summers with a cyclonic atmospheric forcing (comparatively weakly stratified water column). Beforehand, the model performance is tested through a simulation of a well‐documented event in April 2008. Neglecting the replenishment of water masses by advection into the polynya area, we find the probability for the occurrence of density‐driven convection down to the bottom to be low. Our findings can be explained by the distinct vertical density gradient that characterizes the area of the WNS polynya and the apparent lack of extreme events in the eastern Laptev Sea. The simple approach is expected to be sufficiently rigorous, since the simulated event is exceptionally strong and consistent, the ice production and salt rejection rates are likely to be overestimated, and the amount of salt rejected is distrusted over a comparatively weakly stratified water column. We conclude that the observed erosion of the halocline and formation of vertically mixed water layers during a WNS polynya event is therefore predominantly related to wind‐ and tidally driven turbulent mixing processes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.