Feeds

Scientists explain Saturn's mysterious, moonless ring

Hidden matter in ring's bright arc

Top 5 reasons to deploy VMware with Tegile

Saturn's gauzy G-ring is being swept into its orbit, grain by grain, from a region of icy chunks on its inner edge. So say researchers working on data from NASA's Cassini spacecraft in the 2 August issue of the journal Science.

A single bright arc on the inside of Saturn's G-Ring. Credit: Ciclops

A single bright arc on the inside of Saturn's G-Ring. Credit: Ciclops

Most of Saturn's dusty rings are associated with a moon: for example, it is thought that the moon Enceladus' leaky bottom creates the E-ring; and the F-ring can trace its origins to the moons Prometheus and Pandora. But the G-ring doesn't have a moon, and its origin has been a mystery.

But now researchers say they have uncovered a mechanism that explains how it is formed.

In the ring's inner edge there is a region of relatively large particles that extends roughly one sixth of the way around the circumference of the ring. It is about 250 kilometres wide, much narrower than the full 6,000-kilometre width of the G-ring.

The large particles are broken up by constant impacts from micro-meteoroids, and as plasma in Saturn's magnetic field moves through the region, the finer, dust-sized particles are swept up to form the G-ring.

"Distant pictures from the cameras tell us where the arc is and how it moves, while plasma and dust measurements taken near the G-ring tell us how much material is there," said Matthew Hedman, a Cassini imaging team associate at Cornell University, and lead author on the Science paper.

The arc is thought to be a relatively long-lived feature, confined by the gravitational influence of the moon Mimas. Part of Hedman's research involved constructing a model that demonstrated the mechanics of this confinement.

Further, the research has revealed that there must be plenty of unseen material in the arc - chunks ranging from pea-sized to small boulders. In total, the arc's mass is equivalent to that of an ice-rich moon around 100 metres across.

The team plans to take a closer look for the missing material when Cassini passes through the region again in 18 months. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
NASA launches new climate model at SC14
75 days of supercomputing later ...
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
LIFE, JIM? Comet probot lander found 'ORGANICS' on far-off iceball
That's it for God, then – if Comet 67P has got complex molecules
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.