This power point slides presents how the electrons and protons were discovered together with the personalities involved with this scientific breakthrough.
This power point slides presents how the electrons and protons were discovered together with the personalities involved with this scientific breakthrough.
Radioactivity refers to the particles which are emitted from nuclei as a result of nuclear instability. Because the nucleus experiences the intense conflict between the two strongest forces in nature, it should not be surprising that there are many nuclear isotopes which are unstable and emit some kind of radiation.
AS Level Physics' Radioactivity PresentationAkmal Cikmat
AS Level Physics' Radioactivity group presentation in class.
covers up the question on:
-Why certain nucleus is radioactive
-Radioactive process
-Half-life
-exponential decay curve
with a very lil' detail explanation for each subtopic.
general introduction of radioactivity, it include discovery of radioactivity, types of radiation, isotopes and radioactive isotopes difference, half life, prevention and precaution from radiation. detecting devices used in laboreatory for radiation spillage and protection.
Balancing Humanity and Technology in Today's Startup Culture: A BlueprintPenina Rybak
Today's startup culture demands from entrepreneurs a level of knowledge and technology savvy that is ushering in a whole new era of innovation, multi-tasking, success, and even failure and burnout. Today's startup entrepreneur needs to better balance humanity and technology for greater impact and overall wellbeing. Penina's Pointers; a series of six seminars based on her book, The NICE Reboot, shows the HOW, not just the WHY. To learn more visit: www.niceinitiative.com.
Radioactivity refers to the particles which are emitted from nuclei as a result of nuclear instability. Because the nucleus experiences the intense conflict between the two strongest forces in nature, it should not be surprising that there are many nuclear isotopes which are unstable and emit some kind of radiation.
AS Level Physics' Radioactivity PresentationAkmal Cikmat
AS Level Physics' Radioactivity group presentation in class.
covers up the question on:
-Why certain nucleus is radioactive
-Radioactive process
-Half-life
-exponential decay curve
with a very lil' detail explanation for each subtopic.
general introduction of radioactivity, it include discovery of radioactivity, types of radiation, isotopes and radioactive isotopes difference, half life, prevention and precaution from radiation. detecting devices used in laboreatory for radiation spillage and protection.
Balancing Humanity and Technology in Today's Startup Culture: A BlueprintPenina Rybak
Today's startup culture demands from entrepreneurs a level of knowledge and technology savvy that is ushering in a whole new era of innovation, multi-tasking, success, and even failure and burnout. Today's startup entrepreneur needs to better balance humanity and technology for greater impact and overall wellbeing. Penina's Pointers; a series of six seminars based on her book, The NICE Reboot, shows the HOW, not just the WHY. To learn more visit: www.niceinitiative.com.
Nuclear physithese slides are related to the introduction of nuclear physics some contents is given which are related to the discovery of nucleus. The history of atoms etc
The Bohr model of the atom consists of a dense
positive nucleus surrounded by electrons in
shells. The nucleus contains nucleons which
are either protons or neutrons. The proton has
a positive charge and an atomic mass of 1 AMU.
The neutron has zero charge and an atomic
mass of 1 AMU. The atomic number (Z) is
equal to the number of protons in the nucleus.
The atomic mass (A) is equal to the sum of the
neutrons and protons in the nucleus. The electron has a negative charge and a mass of almost
zero. Electrons in an atom only move in specifi c orbits. Each orbit or shell has its own binding energy. The binding energy is the energy
required to remove an electron from its shell.
The shells closer to the nucleus have higher
binding energies. Ionization occurs when an
electron is removed from an atom. This results
in an ion pair made up of one positive and
one negative ion. Ionizing radiation consists
of electromagnetic and particulate radiations
with enough energy to ionize atoms. X-rays
and gamma rays are forms of electromagnetic
radiation. Alpha and beta radiations are forms of
particulate radiation.
There are two systems of radiation units, the
SI and the conventional. The units of exposure
are the roentgen (R) and the coulombs per
kilogram (C/kg). The units of dose are the gray
and the rad. The units of the effective dose are
the sievert and the rem.
Elements with similar electron shell structures have similar chemical properties. Isotopes
are elements with the same atomic number but
different atomic masses. Isotopes have the same
chemical properties. The atomic weight of an
element is the average of the atomic masses of
naturally occurring isotopes. When elements
are arranged in order of increasing atomic number, they form the periodic table of elements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
3. • French physicist, Antoine Henri Becquerel discovered that
uranium compounds gave off invisible rays.
• He told Marie Curie, he asked her to isolate , or separate the
new element.
• Currie and her husband Pierre, began experiments in their
home laboratory. After a few months, the isolated an element
they called polonium. Several months later they isolated
radium.
• They discovered that these two elements give off invisible
particles, or rays – a quality they named radioactivity.
• Later, Ernest Rutherford studied radium, and found that the
radiation, or energy released from radioactive substances
exists in three forms: alpha particles, beta particles, and
gamma rays.
4. • Alpha particles are charged atomic particles.
• Each particle is made up of two protons and two neutrons from the
nucleus.
• Relatively large, so it does not penetrate materials very far.
• It can be stopped by a sheet of paper or aluminum foil or 5cm of
air.
• When an alpha particle leaves an atom, the atom changes into
another type of atom.
5. • Beta particles are negatively charged particles from the
atom.
• They are smaller than alpha particles and have only one negative
charge.
• Beta particles have 100 times more penetrating ability than alpha
particles.
• Require 2 in of aluminum foil to stop them
• The loss of beta particles also changes the first atom into another
type of atom
6. • Gamma rays are not charged particles.
• They are just very high-energy X-rays.
• Gamma rays have more penetrating ability than alpha or beta
particles.
• The can pass through a foot of concrete or through the human
body.
• Over exposure to gamma rays is harmful to living things because
the rays can hit cells inside the body of an organism and destroy
them.
8. • The nucleus of each radioactive element gives off a
random number of particles, or rays, in a fixed amount of
time.
• This process is called radioactive decay.
• This time it takes for half the atoms of a sample to break
down or decay is called half-life.
• EXAMPLE:
• It takes 20 minutes for half the atoms of Carbon 11 to break down.
• Carbon 11 has a half-life of 20 minutes. There are only 4 grams of
Carbon 11 left. It has changed into another type or atom (boron II)
• This change has occurred because the atoms have lost alpha and
beta particles.
• Different radioisotopes have different half-lives.
9. • Law of Conservation of Mass-Energy
• States that matter can change into energy, and energy can change
into matter.
• During these changes any amount of matter lost it changed into
energy, and any energy lost is changed into matter
• First proposed by Albert Einstein, E=mc²
10. • In 1939 scientists discovered that the nuclei of uranium atoms
could be split into smaller nuclei in a process called fission
• Fission is accomplished by hitting the nuclei with slow-moving
neutrons.
• There is no change in the total number of protons and
neutrons, there is a change in the total mass
• The small nuclear mass that is missing changes into
energy, called nuclear energy.
• A chain reaction is a continuous series of nuclear fissions
• Controlled chain reactions in power plants allow us to capture
the energy given off during nuclear reactions without an
explosion
11. • Fusion puts atoms together, or fusing them.
• A small loss of mass, which comes out of the reaction as
a large amount of energy.
• Very high temperatures of about 10 million degree
Celsius are necessary for fusion to take place.
12. • Objectives:
• Identify the dangers associated with nuclear energy
• Identify the benefits of nuclear energy
13. • Nuclear Reactors – produce large amounts of energy
using small amounts of fuel.
• Businesses use nuclear energy to check structures and
manufactured goods for flaws or weak points.
• Scientific researchers in the fields of biology and
paleontology use nuclear energy to learn more about
what they study.
• Medicine uses nuclear energy to diagnose and treat a
wide variety of problems and illnesses.
A proton accelerator uses nuclear particles to
bombard cancerous tissue and destroy it.