Posts

Showing posts from 2006

Types of Neu Industrial

Image
Gun-triggered Fission Bomb The simplest way to bring the subcritical masses together is to make a gun that fires one mass into the other. A sphere of U-235 is made around the neutron generator and a small bullet of U-235 is removed. The bullet is placed at the one end of a long tube with explosives behind it, while the sphere is placed at the other end. A barometric-pressure sensor determines the appropriate altitude for detonation and triggers the following sequence of events: 1. The explosives fire and propel the bullet down the barrel. 2. The bullet strikes the sphere and generator, initiating the fission reaction. 3. The fission reaction begins. 4. The bomb explodes. Little Boy was this type of bomb and had a 14.5-kiloton yield (equal to 14,500 tons of TNT) with an efficiency of about 1.5 percent. That is, 1.5 percent of the material was fissioned before the explosion carried the material away. Implosion-Triggered Fission Bomb Early in the Manhattan Project, the secret

Numbering for IT

Image
Next: DECnet Numbering Up: Network Numbering Previous: Introduction http://www.uwo.ca/its/doc/manuals/network-policy/node14.html#SECTION00520000000000000000 Hall lo all friend you can learn is hacking to follow as; www.iaea.org IP Numbering The Internet Network Information Centre at NIC.DDN.MIL has assigned the class B network [129.100.0.0] (known as UWO-NET) to the University of Western Ontario. The Department of Computing and Communications Services (CCS) manages the assignment of numbers from that network and coordinates the interconnection of local networks to one another and the world. The Internet NIC has delegated authority and responsibility for UWO-NET to the local NIC which is CCS. By a class C subnet we mean a physical network(s) with systems assigned numbers from an IP-net of the form [129.100.x.0] for some fixed value of x. For example, the campus backbone is the class C subnet [129.100.3.0] known as backbone.net.uwo.ca in the Domain Name System. By an autonomous subne

Nuclear Reaction

Image
Hello All of E-c students from myanmar. Learning is as follow; Chapter 7—Nuclear Reactions 7-3 At high enough excitation energies, a nucleus can undergo a series of normal modes of collective oscillations called giant resonances. The nucleus rings like a bell at distinct frequencies with all the nucleons participating and sharing the excitation energy. Fusion reactions are the combining of two nuclei to form a more massive nucleus. Many fusion reactions release large amounts of energy. An example is the combining of two isotopes of hydrogen (tritium and deuterium) to form helium and a neutron plus a large amount of kinetic energy in the reaction products: 3H + 2H Æ 4He + n + 17.6 MeV. This reaction as a potential electric power source is discussed in Chapter 14. Another example of fusion is the reaction set that powers the Sun and other low-mass stars: 1H + 1H Æ 2H + e+ + ne, 2H + 1H Æ 3He + g, 3He + 3He Æ 4He +1H + 1H. The net energy output from this chain is 26.7 MeV for each helium-

About ISA Server 2004

Image
ISA Server 2004 SP2 Features ISA Server 2004 SP2 provides BITS caching for Microsoft Update, HTTP compression with inspection, and packet prioritization using DiffServ. BITS Caching The Background Intelligent Transfer Service (BITS) helps you transfer large amounts of data without degrading network performance. It does this by transferring data in small chunks, utilizing unused bandwidth as it becomes available, and reassembling the data at the destination. ISA Server 2004 SP2 provides the caching mechanism for Microsoft Update data received through BITS. Notes · The use of BITS caching with servers other than Microsoft Update or Software Update Services servers is not supported. · The Microsoft Update cache rule calculates the size of an object based on its content length, and does not include the length of the headers. Microsoft Update Caching Updating the Microsoft Windows® operating system and other Microsoft products on corporate computers from Microsoft Update can use a large por

MSDN Webcast: The New C++: Introduction to the New C++ - Level 200

Webcast Series: The New C++ This six-part Webcast series covers the new Visual C++ 2005 language, and provides both knowledge and practical skills to create great software. Part 1: MSDN Webcast: The New C++: Introduction to the New C++ In part 1, we cover basic program organization and fundamental concepts for targeting the .NET Framework with C++. Also covered are basic elements of the new syntax that ECMA is standardizing under the C++/CLI working group. Part 2: The New C++: More Basics, Properties, Delegates, and Events In part 2, we cover the remaining fundamental concepts that were not covered in the introduction. Attention is then turned to properties, where both scalar and indexed properties are covered. Building on that knowledge, the session closes with understanding delegates and events. Part 3: The New C++: Deterministic Cleanup In part 3, attention is devoted to deterministic finalization. We review destructors in C++ and apply that knowledge to managed code. In particular,

Quantum Physics

Image
Quantum physics is about the characteristics of subatomic particles and it says that energie is not continuously, but in form of quanta (packages). Before I begin with quantum physics I advise the readers who does not know much about nuclear physics to read the homepage of nuclear physics , because otherwise quantum physics might be difficult to understand. But if you known the structure of an atom and particles then it is not nessecary to read the homepage of nuclear physics. Another thing is very important, during reading about quantum physics you must forget about all logical physical laws, because the laws in the subatomic world are inconceivably for us. After reading this website you might have different conception of the world. Chapter 1: The Particle wave duality In former times scientists thought that light consists of waves and that electrons, neutrons and protons are particles. But Scientists have discovered that sometimes light has got a wave character and sometimes li

A+ Certification Core Hardware Exam

A+ Certification Core Hardware Exam Domain 1: Installation, Configuration, and Upgrading 1.1 Identify the names, purpose, and characteristics, of system modules. Recognize these modules by sight or definition. 1.2 Identify basic procedures for adding and removing field-replaceable modules for desktop systems. Given a replacement scenario, choose the appropriate sequences. 1.3 Identify basic procedures for adding and removing field-replaceable modules for portable systems. Given a replacement scenario, choose the appropriate sequences. 1.4 Identify typical IRQs, DMAs, and I/O addresses, and procedures for altering these settings when installing and configuring devices. Choose the appropriate installation or configuration steps in a given scenario. 1.5 Identify the names, purposes, and performance characteristics, of standardized/common peripheral ports, associated cabling, and their connectors. Recognize ports, cabling, and connectors, by sight. 1.6 Identify proper procedures for instal