This document provides solutions to a theoretical question regarding heat conduction inside a solid sphere.
(a) Expressions are derived for the heat flow rate per unit area and total heat flow rate at the outer surface of the sphere.
(b) An expression is obtained for the amount of heat Q absorbed by the sphere, approximating the heated volume and average temperature change.
(c) Equating the rate of change of Q to the heat flow rate yields a differential equation relating temperature change to time, allowing the time to reach a given temperature change to be calculated.
Simplified Solutions of the CLP and CCP Limiting Cases of the Problem of Apo...James Smith
The new solutions presented herein for the CLP and CCP limiting cases of the Problem of Apollonius are much shorter and more easily understood than those provided by the same author in References [1] and [2]. These improvements result from (1) a better selection of angle relationships as a starting point for the solution process; and (2) better use of GA identities to avoid forming troublesome combinations of terms within the resulting equations.
Simplified Solutions of the CLP and CCP Limiting Cases of the Problem of Apo...James Smith
The new solutions presented herein for the CLP and CCP limiting cases of the Problem of Apollonius are much shorter and more easily understood than those provided by the same author in References [1] and [2]. These improvements result from (1) a better selection of angle relationships as a starting point for the solution process; and (2) better use of GA identities to avoid forming troublesome combinations of terms within the resulting equations.
Hyperon and charm baryons masses from twisted mass Lattice QCDChristos Kallidonis
Talk given at the University of Bonn, Germany. We present results on the masses of all forty light, strange and charm baryons from Lattice QCD simulations. We elaborate on the various methods and techniques followed and examine systematic uncertainties related to isospin breaking effects and finite lattice spacing.
Hyperon and charm baryons masses from twisted mass Lattice QCDChristos Kallidonis
Talk given at the University of Bonn, Germany. We present results on the masses of all forty light, strange and charm baryons from Lattice QCD simulations. We elaborate on the various methods and techniques followed and examine systematic uncertainties related to isospin breaking effects and finite lattice spacing.
Evolución del computador desde el ábaco hasta el móvilAngel Lopez
En la presentación se muestra el desarrollo evolutivo de cada una de las generaciones tanto de las computadoras como de la telefonía móvil a través del tiempo acomodados cronológicamente, respectivamente.
CAMBRIDGE GEOGRAPHY AS ULTRA REVISION TEST 2 ATMOSPHERE AND WEATHERGeorge Dumitrache
Cambridge Geography AS Ultra Revision Test 2, with questions and answers for chapter 2 Atmosphere and Weather. This is a test with 30 questions, 2 minutes each.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
1. Theoretical Question 4 / Solutions Page 1/6
Theoretical Question 4: Heat conduction inside a solid sphere
1. Answers
(a)
x
TT
RjRJ inout22
4||4
−
== σππ
(b)
2
)4( inout2 TT
CDRQ
−
= π
(c) 2(E)
4
D
C
t
σ
= = 3.0×10-3
s
(d) 2
cout
2(B)
)(24
D
TT
L
D
C
t
−
+=
ββ
β
σσ
= 7.8×10-2
s.
(e) c)( TrT = for b0 Rr <<
b
cbout
b
outcb )(1
)(
RR
TRRT
RR
TTRR
r
rT
−
−
+
−
−
= for RrR <<b
(f)
b
2
b
coutb
)(
RRR
R
L
TT
dt
dR
−
−
=
βσ
.
(g) 2
cout )(6
R
TT
L
−
=
βσ
τ = 2.5 s.
2. Theoretical Question 4 / Solutions Page 2/6
2. Solutions
(a) [0.5 points]
The heat flow rate per unit area at the outer surface of the particle is
x
TT
r
T
j inout −
−=
∆
∆
−= σσ . (a1)
Total heat flow rate J from the heat bath to the particle is
x
TT
RjRJ inout22
44
−
=−= σππ . (a2)
(b) [0.5 points]
Q =(heated volume)·C ·(average temperature change of the heated volume). To the
leading order of RD / ,
2
4 inout2 TT
DCRQ
−
= π . (b1)
(c) [1 point]
The change in Q is induced by J , that is
tJQ ∆=∆ , (c1)
or,
t
x
TT
Rx
TT
CR ∆
−
=∆
− inout2inout2
4
2
4 σππ . (c2)
Thus one obtains
x
C
dx
dt
σ2
= . (c3)
With the help of the integration formula, one obtains
2(E)
4
D
C
t
σ
= (c4)
The evaluation of this expression provides
E)(
t = 3.0×10-3
s (c5)
Alternative Solution:
Since Eq. (c3) is in the exactly same form as atdtdv =/ , where v corresponds to our
t , a corresponds to our σ2/C , and t corresponds to our x , students may use this
analogy to the accelerated motion to obtain (c4).
(*) Comment 1: Student may replace x in the result of (a2) by its average value 2/D
and divide Q by J to obtain Eq. (c4).
3. Theoretical Question 4 / Solutions Page 3/6
(*) Comment 2: Exact solution without the linear approximation indicates that the time
required to reach the slope DTT /)( inout − at Rr = is given by )/(2
πσCD ,
which is slightly larger than (E)
t since the linear approximation in (b) is bound to
underestimate Q .
(d) [2 points]
The outward heat flow per unit area at Rr = is
x
TT
j cout −
−= βσ (d1)
Total heat flow rate J from the heat bath to the particle is
x
TT
RjRJ cout22
44
−
=−= βσππ (d2)
as before. But the total amount of heat Q necessary to increase x from 0 to a finite
value D is changed to
LDR
TT
CDRQ )4(
2
)4( 2cout2
ππ β +
−
= (d3)
Here the second term arises due to the latent heat. In a similar way as in (c), one then
obtains
2
cout
2(B)
)(24
D
TT
L
D
C
t
−
+=
ββ
β
σσ
. (d4)
From the provided values of the relevant parameters, one obtains
(B)
t = 7.8×10-2
s. (d5)
(e) [2 points]
In the limit 0/ (B)(E)
→tt , the temperature profile within each phase is in its steady
state, that is,
)(4 2
rjrπ is independent of r within each phase (e1)
or
constant4 2
=
dr
dT
r σπ (e2)
By using the provided formula, one obtains
n
n
Y
r
X
T += . (e3)
4. Theoretical Question 4 / Solutions Page 4/6
The constants nX and nY should be chosen so that the expression gives the proper
value at each boundary, namely,
)0( =rT = finite, cb )( TRT = , and out)( TRT = . (e4)
This way, one obtains
c)( TrT = for bRr < (e5)
b
cbout
b
outcb )(1
)(
RR
TRRT
RR
TTRR
r
rT
−
−
+
−
−
= for RrR <<b (e6)
(f) [2 points]
According to the result in (e), jr2
4π is discontinuous at the phase boundary. Thus the
heat flux flowing into the phase boundary and the heat flux flowing out of the boundary
is not balanced, and this difference provides the necessary latent heat for the phase
transition. Therefore one obtains
( ) .4
)]0()0([4)4(
b
2
b
cout
2
b
bb
2
bb
2
b
t
RRR
R
TTR
tRrjRrjRLRR
∆
−
−=
∆−=−+==∆
βσπ
ππ
(f1)
Thus,
b
2
b
coutb
)(
RRR
R
L
TT
dt
dR
−
−
=
βσ
. (f2)
(g) [2 points]
With the help of the provided formula (i), Eq. (f2) can be inverted to the following form,
R
RRR
TT
L
dR
dt b
2
b
inoutb )(
−
−
=
βσ
, (g1)
which can be integrated by using the provided formula (ii) to produce
+−
−
= constant
2
1
3
11
)(
2
b
3
b
cout
RRR
RTT
L
t
βσ
. (g2)
The constant should be chosen so that 0=t for RR =b . Thus one finds
5. Theoretical Question 4 / Solutions Page 5/6
+−
−
= 32
b
3
b
cout 6
1
2
1
3
11
)(
RRRR
RTT
L
t
βσ
. (g3)
When bR is replaced by 0, Eq. (g3) results in
2
cout )(6
R
TT
L
−
=
βσ
τ . (g4)
Finally from the provided numerical values of relevant parameters, one obtains
τ = 2.5 s. (g5)
(*) Comment 1: If bR is replaced instead by DR − with RD << , Eq. (g3) results in
2
cout
(B)
)(2
D
TT
L
t
−
=
βσ
, which agrees with the result in Eq. (d4) except for the first
term, which is much smaller than the second term.
(*) Comment 2: The two expressions for τ and (B)
t are the same except for the factor,
1/6 vs. 1/2. This change of the numerical factor from 1/2 to 1/6 arises from the
reduction of the surface area of the phase boundary as bR approaches 0. While this
reduction is not important for RD << (and thus larger factor 1/2), it is not
negligible for D ~ R (and thus smaller factor 1/6).
6. Theoretical Question 4 / Solutions Page 6/6
3. Mark Distribution
No.
Total
Pt.
Partial
Pt.
Contents
0.2 −=J (surface area) j .
0.2 Correct j .
(a) 0.5
0.1 Correct expression for J .
0.2 CQ = (heated volume)∙(average temperature change).
0.2 Correct heated volume. Other answers, which differ in the second
leading order in RD/ , are also acceptable.
0.2 Correct average temperature change.
(b) 0.7
0.1 Correct expression for Q .
0.3 tJQ ∆=∆ .
0.3 )/(2/ Cxdtdx σ= .
0.5 Correct expression for E)(
t .
Integration may be replaced by analogy to accelerated motion.
(c) 1.4
0.3 Correct evaluation for E)(
t .
0.2 Correct expression for J .
0.6 Correct expression for Q .
0.4 Correct expression for B)(
t .
(d) 1.4
0.2 Correct evaluation for B)(
t .
1.0 jr2
4π is independent of r .
0.4 =T (const1)/ r +(const2).
0.5 Correct boundary conditions.
(e) 2.4
0.5 Correct expression for )(rT .
1.0 Latent heat is provided by the discontinuity in jr2
4π at the phase
boundary.
(f) 1.6
0.6 Correct expression for dtdR /b .
1.5 Correct expression for τ .(g) 2.0
0.5 Correct evaluation of τ .
Approximate result of (d) and
corresponding value: 1.0 pt
Total 10