From via

Image of another universe being observed through a wormhole throat
Authors: Alexander Shatskiy
(Submitted on 2 Sep 2008)

Abstract: We consider a technique of calculating deflection of the light passing through wormholes (from one universe to another). We find fundamental and characteristic features of electromagnetic radiation passing through the wormholes. Making use of this, we propose new methods of observing distinctive differences between wormholes and other objects as well as methods of determining characteristic parameters for different wormhole models.

Comments: 5 pages, 1 figure
Subjects: Astrophysics (astro-ph)
Cite as: arXiv:0809.0362v1 [astro-ph]

The Cepheid Galactic Internet
Authors: John G. Learned, R-P. Kudritzki, Sandip Pakvasa, A. Zee
(Submitted on 2 Sep 2008 (v1), last revised 2 Sep 2008 (this version, v2))

Abstract: We propose that a sufficiently advanced civilization may employ Cepheid variable stars as beacons to transmit all-call information throughout the galaxy and beyond. One can construct many scenarios wherein it would be desirable for such a civilization of star ticklers to transmit data to anyone else within viewing range. The beauty of employing Cepheids is that these stars can be seen from afar(we monitor them out through the Virgo cluster), and any developing technological society would seem to be likely to closely observe them as distance markers. Records exist of Cepheids for well over one hundred years. We propose that these (and other regularly variable types of stars) be searched for signs of phase modulation (in the regime of short pulse duration) and patterns, which could be indicative of intentional signaling.

Comments: 5 pages, 3 figures
Subjects: Astrophysics (astro-ph); High Energy Physics – Phenomenology (hep-ph); Popular Physics (physics.pop-ph)
Cite as: arXiv:0809.0339v2 [astro-ph]


2 Responses to “”

  1. phan mem Says:

    Swedish broadband is twice as fast and costs one-third the
    price of laptops using the earlier Core chips will not fall by much, and might even increase.
    When the victim opens a link or attachment, the hackers install malicious software — known as
    malware — onto their computer to steal documents, log keystrokes, or collect
    usernames and passwords.

  2. Says:

    When someone writes an article he/she maintains the idea of a user in his/her brain that how a user can know it.
    So that’s why this article is great. Thanks!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: