نتایج جستجو برای: improved black hole algorithm
تعداد نتایج: 1312745 فیلتر نتایج به سال:
wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...
This review attempts to describe developments in the fields of quasar and quasar host galaxies in the past five. In this time period, the Sloan and 2dF quasar surveys have added several tens of thousands of quasars, with Sloan quasars being found to z > 6. Obscured, or partially obscured quasars have begun to be found in significant numbers. Black hole mass estimates for quasars, and our confid...
When a black hole evaporates, there arises a net energy flow from the black hole into its outside environment due to the Hawking radiation and the energy accretion onto black hole. Exactly speaking, any thermal equilibrium state has no energy flow, and therefore the black hole evaporation is a nonequilibrium process. To study details of evaporation process, nonequilibrium effects of the net ene...
Transmission congestion is the major challenge in the operation of competitive power market. Sufficient transmission corridor is necessary for realization of power transaction. This paper proposes an efficient approach for transmission congestion management using the Black Hole Algorithm (BHA). Congestion is relieved by rescheduling of real power from the market clearing schedule. BHA is a rece...
A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. Several attacks are possible in the available routing protocols such as Wor...
We analyze the Second Law of black hole mechanics and the generalization of the holographic bound for general theories of gravity. We argue that both the possibility of defining a holographic bound and the existence of a Second Law seem to imply each other via the existence of a certain “c-function” (i.e. a never-decreasing function along outgoing null geodesic flow). We are able to define such...
A new (improved) model of inflation and primordial black hole (PBH) formation is proposed by combining the Starobinsky inflation, Appleby–Battye–Starobinsky (ABS) dark energy, a quantum correction in modified F(R) gravity. The energy scale parameter ABS taken to be close inflationary scale, order describe double instead energy. given term quartic spacetime scalar curvature R with negative coeff...
in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
We study the compact binary population in star clusters, focusing on binaries containing neutron stars and black holes, using a self-consistent Monte Carlo treatment of dynamics and full stellar evolution. We find that the black holes experience strong mass segregation and become centrally concentrated. In the core the black holes interact strongly with each other and black hole-black hole bina...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید