Dimensionless numbers

Zeldovich number

The Zel'dovich number is a dimensionless number which provides a quantitative measure for the activation energy of a chemical reaction which appears in the Arrhenius exponent, named after the Russian scientist Yakov Borisovich Zel'dovich, who along with David A. Frank-Kamenetskii, first introduced in their paper in 1938. In 1983 ICDERS meeting at Poitiers, it was decided to name after Zel'dovich. It is defined as where * is the activation energy of the reaction * is the universal gas constant * is the burnt gas temperature * is the unburnt mixture temperature. In terms of heat release parameter , it is given by For typical combustion phenomena, the value for Zel'dovich number lies in the range . Activation energy asymptotics uses this number as the large parameter of expansion. (Wikipedia).

Video thumbnail

MegaFavNumbers: RSA-2048

My own choice for a number over 1,000,000 is this 617 digit boy: 251959084756578934940271832400483985714292821262040320277771378360436620207075955562640185258807844069182906412495150821892985591491761845028084891200728449926873928072877767359714183472702618963750149718246911650776133798590

From playlist MegaFavNumbers

Video thumbnail

#MegaFavNumbers: 10,904,493,600 & Fibonacci Numbers

This is my #MegaFavNumber. Link to all the #MegaFavNumbers Videos: https://www.youtube.com/watch?v=R2eQVqdUQLI&list=PLar4u0v66vIodqt3KSZPsYyuULD5meoAo Channel Links: Website: https://sites.google.com/view/pentamath Channel: https://www.youtube.com/channel/UCervsuIC9pv4eQq98hAgOZA Subscri

From playlist MegaFavNumbers

Video thumbnail

Konstantin Mischaikow interviewed by Tomas Gedeon (October 26, 2022)

Konstantin Mischaikow interviewed by Tomas Gedeon (October 26, 2022) For more on the interview series, along with the advertisement posters, please see https://www.aatrn.net/interviews

From playlist AATRN Interviews

Video thumbnail

YouTubersLoveExcel#15: Mixed Number formulas and Format

Download Excel Files: Start and Finished File: http://excelisfun.net/files/YouTubersLoveExcel13-16.xls Full Page With All File Links: http://excelisfun.net/ See how to use Fraction Number Format to make your numbers look just how you want them. See the Custom number format for Fraction. S

From playlist Excel Series: YouTubers Love Excel!

Video thumbnail

MegaFavNumbers - Unique-digited-prime-number

I made this video as a part of the MegaFavNumbers project. In this project, YouTubers make videos about their favorite number above 1 million. The number I chose is 1,023,467. It is the smallest 7 -digit prime number with distinct digits. This is my first YouTube video. I feel that if I

From playlist MegaFavNumbers

Video thumbnail

Perturbative Interaction Approach to Large-Scale Structure Formation - Yacine Ali Haimoud

Yacine Ali Haimoud - September 25, 2015 http://sns.ias.edu/~baldauf/Bias/program.html The interpretation of low-redshift galaxy surveys is more complicated than the interpretation of CMB temperature anisotropies. First, the matter distribution evolves nonlinearly at low redshift, limitin

From playlist Unbiased Cosmology from Biased Tracers

Video thumbnail

Why Does The Universe Look Like This?

Thank you to Wondrium for sponsoring today's video! Signup for your FREE trial to Wondrium here: http://ow.ly/3bA050L1hTL -------------------------------------------- Researched and Written by Jon Farrow Narrated and Edited by David Kelly Animations by Jero Squartini https://www.fiverr.com

From playlist The Entire History of the Universe

Video thumbnail

Hitler gets a Haircut.

1efMxkzVHzyLaTFcvXZ9GKLKrB7MBmbKT

From playlist Interviews and Shows

Video thumbnail

13. Network Protocols

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses the Kerberos authentication service. License: Creative Commons BY-NC-SA More information at http://ocw.mit.ed

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

4. Privilege Separation

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security. License: Creative Commons BY-NC-SA Mo

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

20. Mobile Phone Security

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses the Android platform and its security design. License: Creative Commons BY-NC-SA More information at http://o

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

6. Capabilities

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich continues the topic of privilege separation, discussing the usage of capabilities with regards to privilege. License: C

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

16. Side-Channel Attacks

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses side-channel attacks, specifically timing attacks. License: Creative Commons BY-NC-SA More information at htt

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

12. Network Security

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved. License: Creative Commons BY-NC-SA More information at http://o

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

1. Introduction, Threat Models

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models. License: Creative

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

7. Sandboxing Native Code

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich introduces the Native Client system, and its approach to software fault isolation. License: Creative Commons BY-NC-SA M

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Related pages

Heat release parameter | Activation energy asymptotics