Feeds

The plane story of galactic clusters

Dark matter ‘filaments’ mapped

High performance access to file storage

Why are galaxies where they are? Astronomers have turned up a hint at the way dark matter affects the large-scale structure of the universe, with observations discovering that the Milky Way and nearby galactic clusters are arranged along a plane.

The researchers, from the Australian National University, believe the arrangement of galaxies and globular clusters hints at large-scale structures based on vast filaments of dark matter.

According to lead researcher Stefan Keller of the ANU, the structures are revealed by the spatial distribution of the Milky Way’s satellite galaxies, such as the Magellanic Clouds.

Galaxies like beads on a string, say ANU astronomers.

Image: Michael Boylan-Kolchin, University of California Irvine

Rather than being randomly distributed, the paper that Keller has co-authored with Dougal Mackay and Gary Da Costa has found a planar distribution that suggests the galaxies are connected by something with sufficient gravity to maintain that structure.

Hence the suggestion that the large-scale structure is evidence of dark matter.

Keller likens the galactic structures as “beads on a string”, telling The Register that the existence of dark matter filaments would help explain why the Magellanic Clouds are located perpendicular to the plane of the Milky Way’s disk, and are feeding matter into our galaxy.

“The Magellanic Clouds, which are satellites of the Milky Way, are the source of gas that is raining down on the Milky Way and is added, slowly, to the Milky Way’s disk,” he explained.

If you model our galaxy without taking into account the possible existence of dark matter filaments, he said, the models predict a fatter disk than actually exists.

“Matter, both dark and ordinary, is drawn along these filaments to the largest local mass distribution,” he said – and in the case of his observations, that is the Milky Way, which is steadily cannibalizing the Magellanic Clouds.

Of course, the problem remains of identifying exactly what those dark matter filaments are. “We suspect that it is a weakly interacting massive particle,” he said, but noted that early results from the Large Hadron Collider “don’t look good” for these “WIMPs”. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.