Disturbing the Black Hole
نویسنده
چکیده
I describe some examples in support of the conjecture that the horizon area of a near equilibrium black hole is an adiabatic invariant. These include a Schwarzschild black hole perturbed by quasistatic scalar fields (which may be minimally or nonminimally coupled to curvature), a Kerr black under the influence of scalar radiation at the superradiance treshold, and a Reissner–Nordström black hole absorbing a charge marginally. These clarify somewhat the conditions under which the conjecture would be true. The desired “adiabatic theorem” provides an important motivation for a scheme for black hole quantization.
منابع مشابه
The phase transition of corrected black hole with f(R) gravity
In this letter, we consider static black hole in f(R) gravity.We take advantage from corrected entropy and temperature and investigate such black hole. Finally, we study the $ P - V $ critically and phase transition of corrected black hole with respect to entropy and temperature. Here also, we obtain the heat capacity for the static black hole in $ f(R) $ gravity. This calculation help us...
متن کاملOrganizational Black Hole Theory
There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...
متن کاملBHAPSC: A New Black Hole Attack Prevention System in Clustered MANET
Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect black hole attack is important. This paper proposes and evaluates strategies ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملTuning of fuzzy logic controller using an improved black hole algorithm for maximizing power capture of ocean wave energy converters
Seas and oceans are the most important sources of renewable energy in the world. The main purpose of this paper is to use an appropriate control strategy to improve the performance of point absorbers. In this scheme, considering the high uncertainty in the parameters of the power take-off system in different atmospheric conditions, a new improved black hole algorithm is introduced to tune fuzzy...
متن کامل