Results 41 to 50 of about 4,734 (200)

A New Padé Approach to Modeling Wormholes in Dekel‐Zhao Dark Matter Halos

open access: yesAnnalen der Physik, Volume 538, Issue 3, March 2026.
A matter‐first Padé strategy is introduced to build traversable wormholes from prescribed dark‐matter halos. Rational Padé fits approximately the Dekel–Zhao density and are analytically integrated to obtain a shape function that exactly reproduces the intended matter content, avoiding spurious poles of geometry‐first schemes.
Jonathan Alves Rebouças   +4 more
wiley   +1 more source

On the Ground State of Quantum Gravity

open access: yes, 1998
In order to gain insight into the possible Ground State of Quantized Einstein's Gravity, we have devised a variational calculation of the energy of the quantum gravitational field in an open space, as measured by an asymptotic observer living in an ...
Arnowitt   +11 more
core   +1 more source

Effects of Wormhole Attack on Routing Topology

open access: yesProblemi telekomunìkacìj, 2021
The article is devoted to investigating the effects of wormhole attack on routing topology in Wireless Sensor Networks (WSNs). Currently, WSNs are increasingly vulnerable to numerous security attacks. One of the major attacks affecting WSNs involves a wormhole attack where attackers receive packets at a single end in the network and tunnel the packets ...
openaire   +1 more source

Effects of Dissolution Regimes on Flow Channelization and Solute Transport in 3D Fracture Networks: Insights From Graph‐Based Reactive Transport Modeling

open access: yesJournal of Geophysical Research: Solid Earth, Volume 131, Issue 3, March 2026.
Abstract We investigate how mineral dissolution reshapes flow pathways and solute transport in three‐dimensional discrete fracture networks using a computationally efficient graph‐based reactive transport model. The DFNs are inspired by field‐site observations of fractured carbonate and represent realistic connectivity and structural heterogeneity ...
Jeffrey D. Hyman   +3 more
wiley   +1 more source

Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

open access: yesSensors, 2013
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types.
Jonny Karlsson   +2 more
doaj   +1 more source

Dissolution and Flow Channeling in Hydrate‐Bearing Sediments: Implications for Permeability

open access: yesJournal of Geophysical Research: Solid Earth, Volume 131, Issue 2, February 2026.
Abstract Estimates of in situ effective permeability of hydrate reservoirs are tens to hundreds of times less than most laboratory measurements on natural hydrate‐bearing sediments. The measured permeabilities are high because methane‐free water creates and expands flow channels in the sample during pressure core storage and laboratory testing.
Alejandro Cardona   +3 more
wiley   +1 more source

The quantum inequalities do not forbid spacetime shortcuts

open access: yes, 2002
A class of spacetimes (comprising the Alcubierre bubble, Krasnikov tube, and a certain type of wormholes) is considered that admits `superluminal travel' in a strictly defined sense.
A. E. Everett   +18 more
core   +1 more source

A Machine Learning Framework for Detecting and Preventing Cyber‐Attacks in Industrial Cyber‐Physical Systems

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha   +14 more
wiley   +1 more source

Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN

open access: yesITM Web of Conferences, 2016
The secure location of node is significant in the WSN (Wireless Sensor Networks) of the troop frontier defence system. The wormhole attack is a big threat in the secure location.
Wang Xue-Wen   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy