Disturbing the Black Hole

نویسنده

  • JACOB D. BEKENSTEIN
چکیده

I describe some examples in support of the conjecture that the horizon area of a near equilibrium black hole is an adiabatic invariant. These include a Schwarzschild black hole perturbed by quasistatic scalar fields (which may be minimally or nonminimally coupled to curvature), a Kerr black under the influence of scalar radiation at the superradiance treshold, and a Reissner–Nordström black hole absorbing a charge marginally. These clarify somewhat the conditions under which the conjecture would be true. The desired “adiabatic theorem” provides an important motivation for a scheme for black hole quantization.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The phase transition of corrected black hole with f(R) gravity

In this letter, we consider static black hole in f(R) gravity.We take advantage from corrected entropy and temperature and investigate such black hole. Finally, we study the $ P - V $ critically and phase transition of corrected black hole with respect to entropy and temperature. Here also, we obtain the heat capacity for the static black hole in $ f(R) $ gravity. This calculation help us...

متن کامل

Organizational Black Hole Theory

There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...

متن کامل

BHAPSC: A New Black Hole Attack Prevention System in Clustered MANET

Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect black hole attack is important. This paper proposes and evaluates strategies ...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Tuning of fuzzy logic controller using an improved black hole algorithm for maximizing power capture of ocean wave energy converters

Seas and oceans are the most important sources of renewable energy in the world. The main purpose of this paper is to use an appropriate control strategy to improve the performance of point absorbers. In this scheme, considering the high uncertainty in the parameters of the power take-off system in different atmospheric conditions, a new improved black hole algorithm is introduced to tune fuzzy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1972