Identifying Blackhole Regions

ثبت نشده
چکیده

1. Abstract Intelligence units realized that in operation areas targets avoid using their electronic devices in an area of interest. These targets increasingly employ their evasive techniques to mask their movements and locations. Detecting these regions where targets intentionally mask their movements can help find critical areas which can help the security forces to improve the success rate of their operation. In this work we use a novel approach to find the regions where GPS signal lost and distinguish these regions from the regions where all the population lose their GPS signal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum structure of spacetime and blackhole entropy

The gap between a microscopic theory for quantum spacetime and the semiclassical physics of blackholes is bridged by treating the blackhole spacetimes as highly excited states of a class of nonlocal field theories. All the blackhole thermodynamics is shown to arise from asymptotic form of the dispersion relation satisfied by the elementary excitations of these field theories. These models invol...

متن کامل

Evidence of Blackhole Entropy

The natural outcome of the most striking similarity between the second laws of blackhole mechanics and thermodynamics is blackhole entropy. In this paper we discuss the evidence of blackhole entropy and the linearity relation between blackhole entropy to its horizon area. Finally, using thermodynamic relations we obtain Bekenstein-Hawking entropy, Hawking temperature and other intensive paramet...

متن کامل

Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks

The blackhole attack is one of the simplest yet effective attacks that target the AODV protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and thus, attract traffic, which they subsequently capture and drop. However, the first part of the attack is often neglected in present literature, while the majority of attempts in detection focus only on the second part o...

متن کامل

Trusted AODV Protocol against Blackhole Attack in Wireless Ad-hoc Network

In On-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Blackhole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, we have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware ...

متن کامل

2. Ijpast-426-v13n1

In blackhole physics, the statistical dynamical description of the concept of blackhole entropy is still absence. In this paper, we discuss this problem and sets a number of questions about blackhole entropy whose complete answers are not available at present.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013