**Commenced**in January 2007

**Frequency:**Monthly

**Edition:**International

**Paper Count:**11

# Search results for: black hole

##### 11 Gravitational Frequency Shifts for Photons and Particles

**Authors:**
Jing-Gang Xie

**Abstract:**

The research, in this case, considers the integration of the Quantum Field Theory and the General Relativity Theory. As two successful models in explaining behaviors of particles, they are incompatible since they work at different masses and scales of energy, with the evidence that regards the description of black holes and universe formation. It is so considering previous efforts in merging the two theories, including the likes of the String Theory, Quantum Gravity models, and others. In a bid to prove an actionable experiment, the paper’s approach starts with the derivations of the existing theories at present. It goes on to test the derivations by applying the same initial assumptions, coupled with several deviations. The resulting equations get similar results to those of classical Newton model, quantum mechanics, and general relativity as long as conditions are normal. However, outcomes are different when conditions are extreme, specifically with no breakdowns even for less than Schwarzschild radius, or at Planck length cases. Even so, it proves the possibilities of integrating the two theories.

**Keywords:**
General relativity theory,
particles,
photons,
quantum gravity model,
gravitational frequency shift.

##### 10 Non-Singular Gravitational Collapse of a Homogeneous Scalar Field in Deformed Phase Space

**Authors:**
Amir Hadi Ziaie

**Abstract:**

**Keywords:**
Gravitational collapse,
non-commutative geometry,
spacetime singularity,
black hole physics.

##### 9 Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic

**Authors:**
Y. Harold Robinson,
M. Rajaram,
E. Golden Julie,
S. Balaji

**Abstract:**

Mobile ad hoc network (MANET) is a self-configuring network of mobile node connected without wires. A Fuzzy Logic Based Collaborative watchdog approach is used to reduce the detection time of misbehaved nodes and increase the overall truthfulness. This methodology will increase the secure efficient routing by detecting the Black Holes attacks. The simulation results proved that this method improved the energy, reduced the delay and also improved the overall performance of the detecting black hole attacks in MANET.

**Keywords:**
MANET,
collaborative watchdog,
fuzzy logic,
AODV.

##### 8 Exploring Solutions in Extended Horava-Lifshitz Gravity

**Authors:**
Aziza Altaibayeva,
Ertan Gudekli,
Ratbay Myrzakulov

**Abstract:**

In this letter, we explore exact solutions for the Horava-Lifshitz gravity. We use of an extension of this theory with first order dynamical lapse function. The equations of motion have been derived in a fully consistent scenario. We assume that there are some spherically symmetric families of exact solutions of this extended theory of gravity. We obtain exact solutions and investigate the singularity structures of these solutions. Specially, an exact solution with the regular horizon is found.

**Keywords:**
Quantum gravity,
Horava-Lifshitz gravity,
black hole,
spherically symmetric space times.

##### 7 Central Finite Volume Methods Applied in Relativistic Magnetohydrodynamics: Applications in Disks and Jets

**Authors:**
Raphael de Oliveira Garcia,
Samuel Rocha de Oliveira

**Abstract:**

We have developed a new computer program in Fortran 90, in order to obtain numerical solutions of a system of Relativistic Magnetohydrodynamics partial differential equations with predetermined gravitation (GRMHD), capable of simulating the formation of relativistic jets from the accretion disk of matter up to his ejection. Initially we carried out a study on numerical methods of unidimensional Finite Volume, namely Lax-Friedrichs, Lax-Wendroff, Nessyahu-Tadmor method and Godunov methods dependent on Riemann problems, applied to equations Euler in order to verify their main features and make comparisons among those methods. It was then implemented the method of Finite Volume Centered of Nessyahu-Tadmor, a numerical schemes that has a formulation free and without dimensional separation of Riemann problem solvers, even in two or more spatial dimensions, at this point, already applied in equations GRMHD. Finally, the Nessyahu-Tadmor method was possible to obtain stable numerical solutions - without spurious oscillations or excessive dissipation - from the magnetized accretion disk process in rotation with respect to a central black hole (BH) Schwarzschild and immersed in a magnetosphere, for the ejection of matter in the form of jet over a distance of fourteen times the radius of the BH, a record in terms of astrophysical simulation of this kind. Also in our simulations, we managed to get substructures jets. A great advantage obtained was that, with the our code, we got simulate GRMHD equations in a simple personal computer.

**Keywords:**
Finite Volume Methods,
Central Schemes,
Fortran
90,
Relativistic Astrophysics,
Jet.

##### 6 Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks

**Authors:**
Nidhi Gupta,
Sanjoy Das,
Khushal Singh

**Abstract:**

**Keywords:**
Ad hoc,
AODV,
Back Bone,
routing,
Security.

##### 5 A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network

**Authors:**
Nidhi Gupta,
Sanjoy Das,
Khushal Singh

**Abstract:**

A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.

**Keywords:**
Black Hole,
MANET,
Performance Parameters,
Routing Protocol.

##### 4 Spin One Hawking Radiation from Dirty Black Holes

**Authors:**
Petarpa Boonserm,
Tritos Ngampitipan,
Matt Visser

**Abstract:**

A “clean” black hole is a black hole in vacuum such as the Schwarzschild black hole. However in real physical systems, there are matter fields around a black hole. Such a black hole is called a “dirty black hole”. In this paper, the effect of matter fields on the black hole and the greybody factor is investigated. The results show that matter fields make a black hole smaller. They can increase the potential energy to a black hole to obstruct Hawking radiation to propagate. This causes the greybody factor of a dirty black hole to be less than that of a clean black hole.

**Keywords:**
A dirty black hole,
Greybody factor,
Hawking radiation,
Matter fields.

##### 3 Negative Temperature Dependence of a Gravity - A Reality

**Authors:**
Alexander L. Dmitriev,
Sophia A. Bulgakova

**Abstract:**

Temperature dependence of force of gravitation is one of the fundamental problems of physics. This problem has got special value in connection with that the general theory of relativity, supposing the weakest positive influence of a body temperature on its weight, actually rejects an opportunity of measurement of negative influence of temperature on gravity in laboratory conditions. Really, the recognition of negative temperature dependence of gravitation, for example, means basic impossibility of achievement of a singularity («a black hole») at a gravitational collapse. Laboratory experiments with exact weighing the heated up metal samples, indicating negative influence temperatures of bodies on their physical weight are described. Influence of mistakes of measurements is analyzed. Calculations of distribution of temperature in volume of the bar, agreed with experimental data of time dependence of weight of samples are executed. The physical substantiation of negative temperature dependence of weight of the bodies, based on correlation of acceleration at thermal movement of micro-particles of a body and its absolute temperature, are given.

**Keywords:**
Gravitation,
temperature,
weight.

##### 2 Challenges for Security in Wireless Sensor Networks (WSNs)

**Authors:**
Muazzam A. Khan,
Ghalib A. Shah,
Muhammad Sher

**Abstract:**

Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.

**Keywords:**
Wireless senor networks (WSNs),
security,
denial of service,
black hole,
cryptography,
stenography.

##### 1 Method of Moments Applied to a Cuboidal Cavity Resonator: Effect of Gravitational Field Produced by a Black Hole

**Authors:**
Arti Vaish,
Harish Parthasarathy

**Abstract:**

This paper deals with the formulation of Maxwell-s equations in a cavity resonator in the presence of the gravitational field produced by a blackhole. The metric of space-time due to the blackhole is the Schwarzchild metric. Conventionally, this is expressed in spherical polar coordinates. In order to adapt this metric to our problem, we have considered this metric in a small region close to the blackhole and expressed this metric in a cartesian system locally.

**Keywords:**
Method of moments,
General theory of relativity,
Electromagnetism,
Metric tensor,
schwarzchild metric,
Wave Equation.