-
Constraints on the structure and seasonal variations of Triton's atmosphere from the 5 October 2017 stellar occultation and previous observations
Authors:
J. Marques Oliveira,
B. Sicardy,
A. R. Gomes-Júnior,
J. L. Ortiz,
D. F. Strobel,
T. Bertrand,
F. Forget,
E. Lellouch,
J. Desmars,
D. Bérard,
A. Doressoundiram,
J. Lecacheux,
R. Leiva,
E. Meza,
F. Roques,
D. Souami,
T. Widemann,
P. Santos-Sanz,
N. Morales,
R. Duffard,
E. Fernández-Valenzuela,
A. J. Castro-Tirado,
F. Braga-Ribas,
B. E. Morgado,
M. Assafin
, et al. (212 additional authors not shown)
Abstract:
A stellar occultation by Neptune's main satellite, Triton, was observed on 5 October 2017 from Europe, North Africa, and the USA. We derived 90 light curves from this event, 42 of which yielded a central flash detection.
We aimed at constraining Triton's atmospheric structure and the seasonal variations of its atmospheric pressure since the Voyager 2 epoch (1989). We also derived the shape of th…
▽ More
A stellar occultation by Neptune's main satellite, Triton, was observed on 5 October 2017 from Europe, North Africa, and the USA. We derived 90 light curves from this event, 42 of which yielded a central flash detection.
We aimed at constraining Triton's atmospheric structure and the seasonal variations of its atmospheric pressure since the Voyager 2 epoch (1989). We also derived the shape of the lower atmosphere from central flash analysis. We used Abel inversions and direct ray-tracing code to provide the density, pressure, and temperature profiles in the altitude range $\sim$8 km to $\sim$190 km, corresponding to pressure levels from 9 μbar down to a few nanobars.
Results. (i) A pressure of 1.18$\pm$0.03 μbar is found at a reference radius of 1400 km (47 km altitude). (ii) A new analysis of the Voyager 2 radio science occultation shows that this is consistent with an extrapolation of pressure down to the surface pressure obtained in 1989. (iii) A survey of occultations obtained between 1989 and 2017 suggests that an enhancement in surface pressure as reported during the 1990s might be real, but debatable, due to very few high S/N light curves and data accessible for reanalysis. The volatile transport model analysed supports a moderate increase in surface pressure, with a maximum value around 2005-2015 no higher than 23 μbar. The pressures observed in 1995-1997 and 2017 appear mutually inconsistent with the volatile transport model presented here. (iv) The central flash structure does not show evidence of an atmospheric distortion. We find an upper limit of 0.0011 for the apparent oblateness of the atmosphere near the 8 km altitude.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
A Global Fireball Observatory
Authors:
H. A. R. Devillepoix,
M. Cupák,
P. A. Bland,
E. K. Sansom,
M. C. Towner,
R. M. Howie,
B. A. D. Hartig,
T. Jansen-Sturgeon,
P. M. Shober,
S. L. Anderson,
G. K. Benedix,
D. Busan,
R. Sayers,
P. Jenniskens,
J. Albers,
C. D. K. Herd,
P. J. A. Hill,
P. G. Brown,
Z. Krzeminski,
G. R. Osinski,
H. Chennaoui Aoudjehane,
Z. Benkhaldoun,
A. Jabiri,
M. Guennoun,
A. Barka
, et al. (24 additional authors not shown)
Abstract:
The world's meteorite collections contain a very rich picture of what the early Solar System would have been made of, however the lack of spatial context with respect to their parent population for these samples is an issue. The asteroid population is equally as rich in surface mineralogies, and map** these two populations (meteorites and asteroids) together is a major challenge for planetary sc…
▽ More
The world's meteorite collections contain a very rich picture of what the early Solar System would have been made of, however the lack of spatial context with respect to their parent population for these samples is an issue. The asteroid population is equally as rich in surface mineralogies, and map** these two populations (meteorites and asteroids) together is a major challenge for planetary science. Directly probing asteroids achieves this at a high cost. Observing meteorite falls and calculating their pre-atmospheric orbit on the other hand, is a cheaper way to approach the problem. The Global Fireball Observatory (GFO) collaboration was established in 2017 and brings together multiple institutions (from Australia, USA, Canada, Morocco, Saudi Arabia, the UK, and Argentina) to maximise the area for fireball observation time and therefore meteorite recoveries. The members have a choice to operate independently, but they can also choose to work in a fully collaborative manner with other GFO partners. This efficient approach leverages the experience gained from the Desert Fireball Network (DFN) pathfinder project in Australia. The state-of-the art technology (DFN camera systems and data reduction) and experience of the support teams is shared between all partners, freeing up time for science investigations and meteorite searching. With all networks combined together, the GFO collaboration already covers 0.6% of the Earth's surface for meteorite recovery as of mid-2019, and aims to reach 2% in the early 2020s. We estimate that after 5 years of operation, the GFO will have observed a fireball from virtually every meteorite type. This combined effort will bring new, fresh, extra-terrestrial material to the labs, yielding new insights about the formation of the Solar System.
△ Less
Submitted 12 June, 2020; v1 submitted 2 April, 2020;
originally announced April 2020.
-
A Secure Database System using Homomorphic Encryption Schemes
Authors:
Youssef Gahi,
Mouhcine Guennoun,
Khalil El-Khatib
Abstract:
Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject since…
▽ More
Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject since the publication of the RSA encryption scheme in 1978. In this paper we present a relational database system based on homomorphic encryption schemes to preserve the integrity and confidentiality of the data. Our system executes SQL queries over encrypted data. We tested our system with a recently developed homomorphic scheme that enables the execution of arithmetic operations on ciphertexts. We show that the proposed system performs accurate SQL operations, yet its performance discourages a practical implementation of this system.
△ Less
Submitted 10 December, 2015;
originally announced December 2015.
-
An Encrypted Trust-Based Routing Protocol
Authors:
Youssef Gahi,
Mouhcine Guennoun,
Zouhair Guennoun,
Khalil El-Khatib
Abstract:
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme.…
▽ More
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. The new protocol allows nodes, which collaborate in a dynamic environment, to evaluate their knowledge on the trustworthiness of specific routes and securely share this knowledge.
△ Less
Submitted 10 December, 2015;
originally announced December 2015.
-
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols
Authors:
Youssef Gahi,
Mouhcine Guennoun,
Zouhair Guennoun,
Khalil El-khatib
Abstract:
The trend towards delegating data processing to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, requir…
▽ More
The trend towards delegating data processing to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, require the involvement of a third party, and this by itself can be viewed as another security concern. These security breaches can be avoided by following a new approach that depends on data sorted, managed, and stored in encrypted form at the remote servers. To realize such an approach, the encryption cryptosystem must support algebraic operations over encrypted data. This cryptosystem can be effective in protecting data and supporting the construction of programs that can process encrypted input and produce encrypted output. In fact, the latter programs do not decrypt the input, and therefore, they can be run by an un-trusted party without revealing their data and internal states. Furthermore, such programs prove to be practical in situations where we need to outsource private computations, especially in the context of cloud computing. Homomorphic cryptosystems are perfectly aligned with these objectives as they are a strong foundation for schemes that allow a blind processing of encrypted data without the need to decrypt them. In this dissertation we rely on homomorphic encryption schemes to secure cloud computing, services and routing protocols. We design several circuits that allow for the blind processing and management of data such that malicious parties are denied access to sensitive information. We select five areas to apply our models to. These models are easily customized for many other areas. We also provide prototypes that we use to study the performance and robustness of our models.
△ Less
Submitted 21 August, 2015;
originally announced August 2015.
-
Infrastructure Logicielle d un Environnement Hospitalier Intelligent
Authors:
Youssef Gahi,
Meryem Lamrani,
Mouhcine Guennoun,
Khalil El-Khatib
Abstract:
The impact of new technologies in the field of healthcare has been proven to be satisfactory in improving the quality of care and services for patients. The hospital environment is undoubtedly one of the environments where human or hardware errors can cause harmful damage. It is therefore very useful for the sector to be at the forefront of technology and use the strongest and most efficient means…
▽ More
The impact of new technologies in the field of healthcare has been proven to be satisfactory in improving the quality of care and services for patients. The hospital environment is undoubtedly one of the environments where human or hardware errors can cause harmful damage. It is therefore very useful for the sector to be at the forefront of technology and use the strongest and most efficient means since it is supposed to be an environment of reliability, trust and is legally responsible for ensuring the confidentiality of all patient information. In this project we have proposed and developed a smart hospital enviornement that allows both, detecting patien fall and send alerts to the suitable parties, and securing patien stored data through RFID technology.
△ Less
Submitted 12 November, 2013;
originally announced November 2013.