Wormhole Engineering in Orion’s Arm: An Overview
نویسنده
چکیده
Wormhole travel through a Morris-Thorne-Kuhfittig metric is described. Kuhfittig’s description of a traversable wormhole is revisited, and the Morris-Thorne engineering requirements for traversable wormholes are discussed at length, giving useful parameters for physical size, mass, interior geometry, travel times, constraints upon velocity, tidal forces, and stability regimes. Wormhole construction, stabilization, and the consequences of destabilization are discussed, with their attendant effects upon wormhole placement. Wormhole networks and the issues of chronology protection are covered. Nontraversable wormholes, used in communication and computation are discussed. These will be seen to form a separate phylum of wormhole, and the methods for their construction and stabilization are examined. Finally, more exotic wormhole phyla are
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملالکترواستاتیک در فضازمانهای کرمچالهای
Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...
متن کاملAn Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach
The wireless sensor network is an emerging technology in the field of communication. This technology has many advantages but the security issues have been not given much consideration till now. Due to this neglecting, few loopholes in the security have started to occur such as wormhole attack, blackhole attack, etc. In this paper the various aspects have been covered regarding security provisio...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملAn Overview of Fabrication Methods and Applications of Carbon Nanotube Membrane in Environmental Engineering as Hydraulic Microstructures
The main purpose of this article is to study fabrication methods and applications of aligned carbon nanotube (CNT) membranes as a hydraulic microstructure in treatment processes. This paper emphasizes the use of CNTs as membrane in separation processes like water and wastewater treatment because of their exclusive advantages. Their most important characteristics are high mechanical strength aga...
متن کامل