Maxwell's demon and information channel width of a black hole
نویسندگان
چکیده
Using a new generalized second law of thermodynamics, the information and entropy of a black hole and its accretion disk are analyzed respectively. We find the bound of the information channel width of a black hole, which is determined by the variation rate of the horizon temperature and the mass of the black hole’s shell (the accretion disk close to the horizon).
منابع مشابه
Computing Entropy: Understanding Maxwell's Demon
In 1871, James Clerk Maxwell proposed that a being, able to measure the microscopic parameters of a physical system and act accordingly, might be able to violate the Laws of Thermodynamics. The being became known as Maxwell's Demon. Investigations conducted over the course of a century have placed well-de ned thermodynamic bounds upon the action of Maxwell's demon. It is the purpose of this wor...
متن کاملOn-Chip Maxwell's Demon as an Information-Powered Refrigerator.
We present an experimental realization of an autonomous Maxwell's demon, which extracts microscopic information from a system and reduces its entropy by applying feedback. It is based on two capacitively coupled single-electron devices, both integrated on the same electronic circuit. This setup allows a detailed analysis of the thermodynamics of both the demon and the system as well as their mu...
متن کاملThermodynamics and efficiency of an autonomous on-chip Maxwell's demon.
In his famous letter in 1870, Maxwell describes how Joule's law can be violated "only by the intelligent action of a mere guiding agent", later coined as Maxwell's demon by Lord Kelvin. In this letter we study thermodynamics of information using an experimentally feasible Maxwell's demon setup based a single electron transistor capacitively coupled to a single electron box, where both the syste...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1603.00682 شماره
صفحات -
تاریخ انتشار 2016