Results 21 to 30 of about 238,447 (346)

On the black hole from merging binary neutron stars: how fast can it spin? [PDF]

open access: yes, 2013
The merger of two neutron stars will in general lead to the formation of a torus surrounding a black hole whose rotational energy can be tapped to potentially power a short gamma-ray burst.
Alic, Daniela   +4 more
core   +3 more sources

Tensor network models of unitary black hole evaporation

open access: yesJournal of High Energy Physics, 2017
22 pages, 4 ...
Leutheusser, Samuel, Raamsdonk, Mark
openaire   +4 more sources

Probabilistic Routing Protocol for Intermittently Connected Networks [PDF]

open access: yes, 2012
This document is a product of the Delay Tolerant Networking Research Group and has been reviewed by that group. No objections to its publication as an RFC were raised.
Davies, Elwyn   +3 more
core   +2 more sources

Astrophysical implications of GW190412 as a remnant of a previous black-hole merger [PDF]

open access: yes, 2020
Two of the dominant channels to produce merging stellar-mass black-hole binaries are believed to be the isolated evolution of binary stars in the field and dynamical formation in star clusters.
Berti, Emanuele   +2 more
core   +2 more sources

Black-hole evaporation from the perspective of neural networks [PDF]

open access: yesEPL (Europhysics Letters), 2018
We study the black-hole evaporation from the perspective of neural networks. We then analyze the evolution of the Hamiltonian, finding in this way the conditions under which the synapse connecting the neurons changes from gravitatory to inhibitory during the evaporation process.
openaire   +2 more sources

On detecting stellar binary black holes via the LISA-Taiji network [PDF]

open access: yesResearch in Astronomy and Astrophysics, 2021
Abstract The detection of gravitational waves (GWs) by ground-based laser interferometer GW observatories (LIGO/Virgo) reveals a population of stellar binary black holes (sBBHs) with (total) masses up to ∼ 150M ⊙, which are potential sources for space-based GW detectors, such as LISA and Taiji.
Chen, Ju   +4 more
openaire   +2 more sources

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

T-AODV: A trust-based routing against black-hole attacks in VANETs

open access: yesPeer-to-Peer Networking and Applications
Vehicular Ad Hoc Network (VANET) is a key component in the Intelligent Transportation System (ITS) with a number of applications for safety, traffic management, emergency services, entertainment, and so on.
Farnam Honarmand   +1 more
semanticscholar   +1 more source

Detection of Black Hole in AD- HOC Networks

open access: yesInternational Journal of Computer Applications Technology and Research, 2014
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR protocol is threaded by a particular type of attack called Black Hole attack. Black hole in Adhoc networks is a major problem.
Sona Malhotra, Sandeep Kumar
openaire   +1 more source

A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks

open access: diamond, 2013
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain.
Shree Om, Francis Joseph Ogwu
openalex   +3 more sources

Home - About - Disclaimer - Privacy