The Image of a Wormhole
نویسنده
چکیده
A wormhole is a hypothetical tunnel through space. Such a concept has long been a favorite theme in Star Trek and in science fiction. An extensive list of popular science books[1] are devoted to topics related to wormholes. We might gauge the popularity of wormholes among students by the recurring references to them in The Simpsons : in one Halloween special[2], Homer was sucked into modern-day California while saying “there’s so much I don’t know about astrophysics, I wish I’d read that book by [Dr. Hawking].” The detailed calculations about a wormhole are complex and still under debate among physicists, but with the techniques taught in a standard calculus course[3], a student is capable of producing the images of wormholes based on sound physical principles. Because many issues concerning wormholes are not fully resolved yet, this paper is not meant to be rigorous. We merely attempt to motivate students to apply mathematical skills that they have learned in calculus, and to induce their interest in non-Euclidean geometry and general relativity through this fascinating subject.
منابع مشابه
الکترواستاتیک در فضازمانهای کرمچالهای
Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملپراکندگی امواج الکترومغناطیسی توسط یک کرمچاله گذرپذیر
Replacing the wormhole geometry with an equivalent medium using the perturbation theory of scattering and the Born approximation, we have calculated the differential scattering cross section of electromagnetic waves by a traversable wormhole. It is shown that scattering at long wavelenghts can essentially distinguish wormhole from ordinary scattering object. Some of the zeros of the scatterin...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملA Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005