Results 11 to 20 of about 633,009 (149)

Uncertainty Quantification of the Virial Black Hole Mass with Conformal Prediction [PDF]

open access: yes, 2023
Precise measurements of the black hole mass are essential to gain insight on the black hole and host galaxy co-evolution. A direct measure of the black hole mass is often restricted to nearest galaxies and instead, an indirect method using the single-epoch virial black hole mass estimation is used for objects at high redshifts.
arxiv   +1 more source

Black-hole production from ultrarelativistic collisions [PDF]

open access: yes, 2012
Determining the conditions under which a black hole can be produced is a long-standing and fundamental problem in general relativity. We use numerical simulations of colliding selfgravitating fluid objects to study the conditions of black-hole formation ...
Rezzolla, Luciano, Takami, Kentaro
core   +1 more source

Tensor Network Models of Unitary Black Hole Evaporation [PDF]

open access: yes, 2016
We introduce a general class of toy models to study the quantum information-theoretic properties of black hole radiation. The models are governed by a set of isometries that specify how microstates of the black hole at a given energy evolve to entangled states of a tensor product black-hole/radiation Hilbert space.
arxiv   +1 more source

How Frustrated Strings Would Pull the Black Holes from the Centers of Galaxies [PDF]

open access: yesPhys.Rev. D63 (2001) 045008, 2000
Recently Pen and Spergel (1997) have shown that a universe whose energy density is dominated by a frustrated network of non-Abelian TeV-scale cosmic strings could account for a broad class of cosmological observations. In this paper we consider the effects of such a string network on the massive black holes widely believed to inhabit the centers of ...
arxiv   +1 more source

Applied constant gain amplification in circulating loop experiments [PDF]

open access: yes, 2009
The reconfiguration of channel or wavelength routes in optically transparent mesh networks can lead to deviations in channel power that may impact transmission performance.
Barry, Liam P.   +3 more
core   +1 more source

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

Comparative Analysis of Secure Routing Protocol with Malicious Node Attack in VANET Using CBR/UDP Traffic: A Review [PDF]

open access: yes, 2019
One of biggest challenges to implement adhoc network is its dynamic topology and security issue. There are possibilities of active and passive attack in network to alter the authentic data or to steal the data.
Himanshi, Kirti Dahiya
core   +1 more source

Predicting the properties of black holes merger remnants with Deep Neural Networks [PDF]

open access: yesClass.Quant.Grav. 37 (2020) 13, 135005, 2019
We present the first estimation of the mass and spin magnitude of Kerr black holes resulting from the coalescence of binary black holes using a deep neural network. The network is trained on a dataset containing 80\% of the full publicly available catalog of numerical simulations of gravitational waves emission by binary black hole systems, including ...
arxiv   +1 more source

Deep learning the holographic black hole with charge [PDF]

open access: yes, 2019
We use the deep learning algorithm to learn the Reissner-Nordstr\"om(RN) black hole metric by building a deep neural network. Plenty of data is made in boundary of AdS and we propagate it to the black hole horizon through AdS metric and equation of motion(e.o.m).
arxiv   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy