Wormhole and C-field

نویسنده

  • P. Ghosh
چکیده

It is well known that a C-field, generated by a certain source equation leads to interesting changes in the cosmological solutions of Einstein's equations. In this article we present and analyze a simple Lorentzian vacuum wormhole in the presence of C-field. The wormhole is very interesting subject in modern cosmology since Morris and Throne have verified the realistic possibilities of constructing a traversable wormhole space-time and traveling through it in the theoretical context of the general relativity [1]. Among the reasons that support this, one of them is the possibility of constructing time machines and another is related on the requirement of matter violating the weak energy condition [2]. Wormholes may defined as handles or bridges linking different universes or widely separated regions of our universe. Topologically, wormhole space-times are the same as that of blackholes, but a minimal surface called throat of wormhole is maintained in time evolution and then a traveler can pass through it in both directions. To hold such a wormhole open, the stress energy tensor of matter violets the null energy conditions. As a result, the energy density of matter may be seen as negative by some observer. There are different ways of evading these violations. Most of these attempts focus on alternative gravity theories or existing of exotic matter [3]. We consider the wormhole in presence of C-field. Existence of Big-bang singularity is one of the basic failures of general theory of relativity. So alternative theories are being proposed time to time. One of the important alternative theory is C-field theory introduced by Hoyle and Narlikar (HN)[4]. HN adopted a field theoretic approach introducing a mass-less and charge-less scalar field C in the Einstein-Hilbert action to account for the matter creation. A C-field generated by a certain source equation, leads to interesting

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

99 v 1 2 5 N ov 1 99 9 Backreaction to wormhole by classical scalar field : Will classical scalar field destroy wormhole ?

There are two effects of extra matter fields on the Lorentzian traversable wormhole. The “primary effect” says that the extra matter can afford to be a part of source or whole source of the wormhole when the wormhole is being formed. Thus the matter does not affect the stability of wormhole and the wormhole is still safe. If the extra matter is extotic, it can be the whole part of the source of...

متن کامل

الکترواستاتیک در فضازمانهای کرمچاله‌ای

  Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...

متن کامل

Complementarity in Wormhole Chromodynamics ⋆

The electric charge of a wormhole mouth and the magnetic flux “linked” by the wormhole are non-commuting observables, and so cannot be simultaneously diagonalized. We use this observation to resolve some puzzles in wormhole electrodynamics and chromodynamics. Specifically, we analyze the color electric field that results when a colored object traverses a wormhole, and we discuss the measurement...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005