Feeds

Super-Earth orbiting red dwarf

No, not the TV series...

High performance access to file storage

Astronomers have discovered the most Earth-like exoplanet yet. The world, which orbits a red dwarf star, is about five times as massive as Earth, and thanks to its position, should be capable of holding liquid water.

The researchers made the discovery using the 3.6 metre telescope at the European Southern Observatory in Chile.

Artist's impression of the world discovered by the ESO team

The planet, the smallest yet discovered, orbits the red dwarf Gliese 581 at a distance one fourteenth of that from Earth to the sun; its year is just 13 days long. However, because the star is so much cooler and less luminous than our own sun, the so-called habitable zone, where planets can carry liquid water, is much nearer the star.

"We have estimated that the mean temperature of this super-Earth lies between 0 and 40 degrees Celsius, and water would thus be liquid," explains Stéphane Udry, from the Geneva Observatory and lead author of the paper, submitted as a letter to the editor of Astronomy and Astrophysics.

"Moreover...models predict that the planet should be either rocky - like our Earth - or fully covered with oceans."

The team has already identified a Neptune-sized planet in an even tighter orbit of Gliese 581, and with the data they have now, they think there is reason to assume that a there is a third world - probably eight times Earth's mass - in the extra-solar system. This circles the star much further out, but still close to the star by our standards, with a year of around 84 days.

The team making the discoveries used the HARPS (High Accuracy Radial Velocity for Planetary Searcher), perhaps the most precise spectrograph in the world. It can spot signals - variations in the velocity of a star - that fall far below the "noise" threshold of most spectrographs.

ESO says it holds several records for discoveries of extra solar planets, and is used mainly to hunt for the lower mass objects that would not be easily found otherwise.

You can read the paper, The HARPS search for southern extra-solar planets: XI. An habitable super-Earth (5 MEarth) in a 3-planet system, by S Udry et al, here (pdf). ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.