Identifying Blackhole Regions
ثبت نشده
چکیده
1. Abstract Intelligence units realized that in operation areas targets avoid using their electronic devices in an area of interest. These targets increasingly employ their evasive techniques to mask their movements and locations. Detecting these regions where targets intentionally mask their movements can help find critical areas which can help the security forces to improve the success rate of their operation. In this work we use a novel approach to find the regions where GPS signal lost and distinguish these regions from the regions where all the population lose their GPS signal.
منابع مشابه
Quantum structure of spacetime and blackhole entropy
The gap between a microscopic theory for quantum spacetime and the semiclassical physics of blackholes is bridged by treating the blackhole spacetimes as highly excited states of a class of nonlocal field theories. All the blackhole thermodynamics is shown to arise from asymptotic form of the dispersion relation satisfied by the elementary excitations of these field theories. These models invol...
متن کاملEvidence of Blackhole Entropy
The natural outcome of the most striking similarity between the second laws of blackhole mechanics and thermodynamics is blackhole entropy. In this paper we discuss the evidence of blackhole entropy and the linearity relation between blackhole entropy to its horizon area. Finally, using thermodynamic relations we obtain Bekenstein-Hawking entropy, Hawking temperature and other intensive paramet...
متن کاملAnalyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and thus, attract traffic, which they subsequently capture and drop. However, the first part of the attack is often neglected in present literature, while the majority of attempts in detection focus only on the second part o...
متن کاملTrusted AODV Protocol against Blackhole Attack in Wireless Ad-hoc Network
In On-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Blackhole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, we have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware ...
متن کامل2. Ijpast-426-v13n1
In blackhole physics, the statistical dynamical description of the concept of blackhole entropy is still absence. In this paper, we discuss this problem and sets a number of questions about blackhole entropy whose complete answers are not available at present.
متن کامل