Radiometric dating uses the natural radioactive decay of isotopes to determine the age of rocks and other materials. Only two measurements are needed: the ratio of parent and daughter isotopes, and the decay constant. Examples given include carbon-14 dating of organic materials and potassium-argon dating of igneous rocks. Difficulties can arise from open systems and metamorphism altering isotope ratios, so only fresh samples are suitable for dating. Radiometric dating has established that geological time spans billions of years.
Carbon 14 and archeological ages, Christian and Intelligent Design discussion of source, measurement, results, interpretation, and errors in Carbon-14 dating.
Carbon 14 and archeological ages, Christian and Intelligent Design discussion of source, measurement, results, interpretation, and errors in Carbon-14 dating.
Description of nuclear half-life and practice calculations. Adapted from http://www.teachnlearnchem.com/SPANISH/Equations%20PP/SpanNuclear%20Equations.ppt
This worksheet gives pupils practice with adding up relative atomic masses to obtain relative molecular mass. Pupils will need a data sheet or a list of relative atomic masses to be able to complete the questions.
I am attaching the list of departmental electives offered by the Department of Chemistry for The Autumn semester 2019 at IIT Kharagpur for two years MSc Students
Description of nuclear half-life and practice calculations. Adapted from http://www.teachnlearnchem.com/SPANISH/Equations%20PP/SpanNuclear%20Equations.ppt
This worksheet gives pupils practice with adding up relative atomic masses to obtain relative molecular mass. Pupils will need a data sheet or a list of relative atomic masses to be able to complete the questions.
I am attaching the list of departmental electives offered by the Department of Chemistry for The Autumn semester 2019 at IIT Kharagpur for two years MSc Students
5. Place the layers from Figure 3 (below) in order from the youngest .pdfambeartwoodenhandicr
5. Place the layers from Figure 3 (below) in order from the youngest to the oldest. Oldest
Rart 2. Absolete Dating Absolute, or radiometric, dating is the only method for putting an actual
numerical age ("absolute age") to rocks. Absolute dating uses radioactive isotopes that are
unstable and decay by emitting nuclear particles (either neutrons or protons). (Remember: The
term "isovopes" nefers to atoms that have the same namber of protons, ie, they are the same
chemical dement but diokerent number of neidrons. When protons are emitted during decay, the
atom is transfomed from one clement to another. The initial radioactive isotopes in a rock or
fossil are called parent isotopes. During the decay process, the parent isotopes are transformed
into new isotopes of different elements called daughter isotopes. The change does not always
occur at a linear rate. The rate of change in this radioactive decay occurs at an exponential rate.
Decay is expressed in terms of a length of time called a half-life. A half-life is amount of time
necessary for half of the original parent atoms to decay to daughter product/atoms. Elements
such as carbon, uranium, potassium, rubidium, and thorium each have their own radioactive
isotopes and can be used to determine the age of igneous rocks millions to billions of years old.
Carbon has a radioactive isotope that can be used to date organic matter (and some fossils) less
than 65,000 years old. For this reason, geologists usually study radioactive isotopes other than
carbon. 6. An unstable isotope Q has a half-life of 1,000 years and decays to a stable isotope Z.
A mineral forms from magma and becomes part of an igneous rock. Initially, it contains no Z
atoms. A geologist analyzes the mineral and finds a ratio of Q atoms to Z atoms of 1:3. a)
Assuming no leakage to the environment, how old is the mineral? b) If the ratio of Q to Z were
1:15, how old would the mineral be?.
Grade 8 Integrated Science Chapter 16 Lesson 3 on absolute age dating of fossils. This lesson follows the last lesson about relative age dating. This chapter describes radiometric age dating with explanations of radioactive decay and half-life. There is also a short explanation of igneous, metamorphic, and sedimentary age dating. The goal is that students understand radioactive decay, half-life, and how this can be used to determine the age of carbon fossils and different types of rocks.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Kuliah geokimia 6a
1. Isotop Geochemistry 2 (IG Application) Faculty of Agro Industry and Natural Resources
2. Radiometric Dating Actually a simple technique. Only two measurements are needed: The parent:daughter ratio measured with a mass spectrometer. The decay constant measured by a scintillometer
5. Basis of the Technique Radioactive elements “decay.” Decay occurs as an element changes to another element, e.g. uranium to lead. The parent element is radioactive, the daughter element is stable. The decay rate is constant.
6. What is Radioactivity? Radioactivity occurs when certain elements literally fall apart. Usually protons and neutrons are emitted by the nucleus. Sometimes an electron is emitted by the nucleus, which changes a neutron to a proton. Sometimes an electron is captured by a neutron replacing a proton.
7.
8.
9. A Familiar Example: Carbon-14 Carbon-12 (with 6 protons and 6 neutrons) is the most common isotope of carbon. Carbon-14 is an rarer isotope of carbon that is produced by the bombardment of nitrogen-14 (with 7 protons and 7 neutrons) by rogue neutrons Nitrogen-14 gains 1 neutron but loses 1 proton, changing it to carbon-14 (atomic mass stays the same, but atomic number changes)
10.
11. Carbon-14 becomes incorporated into carbon dioxide, along with the more common carbon-12, which circulates in the atmosphere and is absorbed by living things (all organisms, including us, contain a small amount of carbon-14) As long as the organism is alive, the proportions of carbon-12 and carbon-14 remain constant due to constant replacement of any carbon-14 that has decayed
12. When the organism dies, the amount of carbon-14 gradually decreases as it decays to nitrogen-14 by the loss of an electron (so one neutron is changed to a proton) By comparing the proportions of carbon-14 and carbon-12 in a sample of organic matter, and knowing the rate of conversion, a radiocarbon date can be determined Number of protons: 6 Number of neutrons: 8 Number of protons: 7 Number of neutrons: 7
13. Rate of radioactive decay Rates of decay are commonly expressed in terms of half-life Half life is the time required for half of the atoms in a sample to decay to daughter atoms Half-life of carbon-14 is 5,730 years
14. This means: If parent:daughter ratio is 1:1 (1/2 original amount of parent remaining),one half-life has passed If parent:daughter ratio is 1:3 (1/4 original amount of parent remaining), two half-lives have passed If parent:daughter ratio is 1:7 (1/8 original amount of parent remaining), three half-lives have passed If parent:daughter ratio is 1:15 (1/16 original amount of parent remaining),four half-lives have transpired In other words, each half-life represents the “halving” of the preceding amount of parent isotope
15. So: If the half-life of carbon-14 is 5730 years If 1/16 of the original amount of parent remains… Then we can deduce that… 4 half lives have passed The age of the sample is 4 X 5730 years = 22, 920 years !
16.
17. Other useful radioisotopes In addition to Carbon-14, other radioisotopes can be used for dating (very old samples must rely on radioisotopes with longer half lives). All of the above radioisotopes occur in minerals found in rocks (generally igneous rocks).
18. Example: Potassium-Argon 89% of potassium-40 decays to calcium-40 (by electron loss) 11% of potassium-40 decays to argon-40 (by electron gain) Calcium-40 is not useful in dating (can’t be distinguished from other isotopes of calcium that may have been present when the rock formed) But …………. Argon-40 is a gas that doesn’t combine with other elements and becomes trapped in crystals (so amount produced by decay can be measured)
19. Datable minerals preserved in: Potassium-argon clock starts when potassium-bearing minerals (e.g. some feldspars) crystallize from a magma The minerals that have crystallized from magma formed will contain potassium-40 but not argon-40 Potassium-40 decays, producing argon-40 within the crystal lattice All daughter atoms of argon-40 come from the decay of potassium-40 Ash deposits Lava flows Igneous intrusions (dykes, sills, plutons) Argon-40, produced by decay of potassium-40 accumulates in mineral crystals
20. Igneous rocks, both intrusive and extrusive, come from magma- potassium minerals can be dated To determine age, the potassium-40/argon-40 ratio is measured and the half life of K-40 is applied So now, we have a means of bracketing periods of time in rock sequences, and can apply absolute dates to important events in earth history
21. Difficulties in dating the geologic time scale Not all rocks can be dated by radiometric methods Grains comprising clastic sedimentary rocks are not the same age as the rock in which they formed (have been derived from pre-existing rocks) The age of a particular mineral may not necessarily represent the time when the rock formed if daughter products are lost (e.g. during metamorphic heating) To avoid potential problems, only fresh, unweathered rock samples should be used
22. Importance of radiometric dating: Rocks from several localities have been dated at more than 3 billion years Confirms the idea that geologic time is immense
23.
24. Dating sedimentary strata using radiometric dating Dating of minerals in ash bed and dyke indicates that the sedimentary layers of the Dakota Sandstone through to the Mesaverde Formation are between 160 and 60 million years old