Home
Search results “Information is processes and stored in computers as signals”
How Computers Work: Binary & Data
 
05:59
You'll hear that everything's "1s and 0s" in a computer, but what does that mean? Find out how computers represent numbers, words, images, and sound. Start learning at http://code.org/ Stay in touch with us! • on Twitter https://twitter.com/codeorg • on Facebook https://www.facebook.com/Code.org • on Instagram https://instagram.com/codeorg • on Tumblr https://blog.code.org • on LinkedIn https://www.linkedin.com/company/code-org • on Google+ https://google.com/+codeorg Help us caption & translate this video! https://amara.org/v/djLv/
Views: 215852 Code.org
How do computers store images?
 
08:31
Views: 204411 Udacity
How Computers Work: CPU, Memory, Input & Output
 
04:17
Dive a little deeper into the actual components that allow a computer to input, store, process, and output information. Start learning at http://code.org/ Stay in touch with us! • on Twitter https://twitter.com/codeorg • on Facebook https://www.facebook.com/Code.org • on Instagram https://instagram.com/codeorg • on Tumblr https://blog.code.org • on LinkedIn https://www.linkedin.com/company/code-org • on Google+ https://google.com/+codeorg Help us caption & translate this video! https://amara.org/v/djNb/ "Introducing Othermill Pro" by Othermill is licensed under CC BY NC 2.0 "Artists & Algorists" by Present Plus is licensed under CC BY NC 2.0 “Design Disruptors Trailer” by InVision is licensed under CC BY 2.0 "Samplr for iPad" by Samplr licensed under CC BY NC 2.0 "One Minute Wonder - Kiah Victoria" by Present Plus is licensed under CC BY NC 2.0 "Theoriz - Showreel" by Theoriz licensed under CC BY NC 2.0 "Brain Race" by Nerdworking licensed under CC BY NC 2.0 "A Taste of Zumtobel" by Ingo Enzi licensed under CC BY NC 2.0 "ABC van het Maken" by Waag Society licensed under CC BY NC 2.0 "Zero Day" by Beeple licensed under CC BY NC 2.0 "Cion" by AJA Video Systems licensed under CC BY NC 2.0 "Europe in 8 Bits" by Device licensed under CC BY NC 2.0 "Mixed Reality" by Theoriz licensed under CC BY NC 2.0
Views: 182209 Code.org
Registers and RAM: Crash Course Computer Science #6
 
12:17
Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we’re going to create memory! Using the basic logic gates we discussed in episode 3 we can build a circuit that stores a single bit of information, and then through some clever scaling (and of course many new levels of abstraction) we’ll show you how we can construct the modern random-access memory, or RAM, found in our computers today. RAM is the working memory of a computer. It holds the information that is being executed by the computer and as such is a crucial component for a computer to operate. Next week we’ll use this RAM, and the ALU we made last episode, to help us construct our CPU - the heart of a computer. *CORRECTION* In our 16x16 Latch Matrix graphic, we inadvertently left off the horizontal row access line above the top row of latches. As a result, the highlighted line for the row at address 12 should actually be one line higher. Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV We’ve got merch! https://store.dftba.com/collections/crashcourse Want to know more about Carrie Anne? https://about.me/carrieannephilbin Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashC... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashC... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 738633 CrashCourse
Why Do Computers Use 1s and 0s? Binary and Transistors Explained.
 
07:00
Want to support me? Patreon: https://www.patreon.com/H3Vtux A short explanation of binary. Upon reviewing the finished video I realized I made a mistake in some of my vocabulary. A byte can represent a number up to 255 but it can actually represent 256 different VALUES, as 0 is a value in and of itself. Rerecording and reanimating would be a painful process, so forgive me this mistake.
Views: 913052 H3Vtux
This Is How Your Brain Powers Your Thoughts
 
03:50
Scientists have figured out how our brains process thoughts and the explanation will blow your mind. Can Shocking Your Brain Make You Smarter? - https://youtu.be/LSwMwX9BbGc Sign Up For The Seeker Newsletter Here - http://bit.ly/1UO1PxI We got nominated for a People's Choice Webby! That means, you can help us win. Please, take a minute and vote for us here (thanks!): https://vote.webbyawards.com/PublicVoting#/2017/film-video/general-film/vr-cinematic-or-pre-rendered Read More: Does Thinking Really Hard Burn More Calories? https://www.scientificamerican.com/article/thinking-hard-calories/ "Unlike physical exercise, mental workouts probably do not demand significantly more energy than usual. Believing we have drained our brains, however, may be enough to induce weariness." Human Brain Loses Billions of Neurons in New Analysis http://www.livescience.com/18749-human-brain-cell-number.html "The whole human race just got a little dumber: A new analysis of the number of neurons, those brain cells that transmit thoughts, in the human brain has come back with a staggeringly lower number than thought -- 14 billion brain cells fewer, about the size of the baboon brain." Brain cells mobilize sugar in response to increased activity https://medicalxpress.com/news/2017-01-brain-cells-mobilize-sugar-response.html "New research is providing insights into why the brain is so reliant on sugar to function. In a study published Jan. 19 in Neuron, a research team led by Weill Cornell Medicine investigators discovered that brain cells recruit a specific sugar, glucose, to fuel the transmission of electrical signals that enable people to think, breathe and walk." ____________________ Seeker inspires us to see the world through the lens of science and evokes a sense of curiosity, optimism and adventure. Watch More Seeker on our website http://www.seeker.com/shows/ Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel Seeker on Twitter http://twitter.com/seeker Trace Dominguez on Twitter https://twitter.com/tracedominguez Seeker on Facebook https://www.facebook.com/SeekerMedia/ Seeker on Google+ https://plus.google.com/u/0/+dnews Seeker http://www.seeker.com/ Sign Up For The Seeker Newsletter Here: http://bit.ly/1UO1PxI Written by: Julian Huguet
Views: 302878 Seeker
How Computer Memory Works - Computerphile
 
14:16
How do logic gates store information? - We explore how computer memory works with Dr. Steve "Heartbleed" Bagley Domino Addition -- Numberphile: http://youtu.be/lNuPy-r1GuQ YouTube's Secret Algorithm: http://youtu.be/BsCeNCVb-d8 Opening up the 30yr old Mac: http://youtu.be/wFJrHuSXnZM http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 555594 Computerphile
How do hard drives work? - Kanawat Senanan
 
05:12
View full lesson: http://ed.ted.com/lessons/how-do-hard-drives-work-kanawat-senanan The modern hard drive is an object that can likely hold more information than your local library. But how does it store so much information in such a small space? Kanawat Senanan details the generations of engineers, material scientists, and quantum physicists who influenced the creation of this incredibly powerful and precise tool. Lesson by Kanawat Senanan, animation by TED-Ed.
Views: 1181745 TED-Ed
Computer Networks: Crash Course Computer Science #28
 
12:20
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks to eventually larger worldwide networks like the ARPANET and even the Internet we know today. We'll also discuss how many technologies like Ethernet, MAC addresses, IP Addresses, packet switching, network switches, and TCP/IP were implemented to new problems as our computers became ever-increasingly connected. Next week we’ll talk about the Internet, and the week after the World Wide Web! Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 368757 CrashCourse
Compression: Crash Course Computer Science #21
 
12:48
Get your first two months of CuriosityStream free by going to http://curiositystream.com/crashcourse and using the promo code “crashcourse”. So last episode we talked about some basic file formats, but what we didn’t talk about is compression. Often files are way too large to be easily stored on hard drives or transferred over the Internet - the solution, unsurprisingly, is to make them smaller. Today, we’re going to talk about lossless compression, which will give you the exact same thing when reassembled, as well as lossy compression, which uses the limitations of human perception to remove less important data. From listening to music and sharing photos, to talking on the phone and even streaming this video right now the ways we use the Internet and our computing devices just wouldn’t be possible without the help of compression. Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 196608 CrashCourse
The Central Processing Unit (CPU): Crash Course Computer Science #7
 
11:38
Take the 2017 PBS Digital Studios Survey: http://surveymonkey.com/r/pbsds2017. Today we’re going to build the ticking heart of every computer - the Central Processing Unit or CPU. The CPU’s job is to execute the programs we know and love - you know like GTA V, Slack... and Power Point. To make our CPU we’ll bring in our ALU and RAM we made in the previous two episodes and then with the help of Carrie Anne’s wonderful dictation (slowly) step through some clock cycles. WARNING: this is probably the most complicated episode in this series, we watched this a few times over ourselves, but don't worry at about .03Hz we think you can keep up. Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV We’ve got merch! https://store.dftba.com/collections/crashcourse Want to know more about Carrie Anne? https://about.me/carrieannephilbin Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashC... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashC... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 619244 CrashCourse
💻 - See How a CPU Works
 
20:01
Uncover the inner workings of the CPU. Author's Website: http://www.buthowdoitknow.com/ See the Book: http://amzn.to/1mOYJvA See the 6502 CPU Simulation: http://visual6502.org/JSSim/index.html For anyone annoyed by the breaths between speaking, try this unlisted version with edited audio: https://www.youtube.com/watch?v=IkdBs21HwF4 Download the PowerPoint file used to make the video: https://docs.google.com/file/d/0BzwHNpicSnW0cGVmX0c3SVZzMFk The CPU design used in the video is copyrighted by John Scott, author of the book But How Do It Know?. There are a few small differences between the CPU in the video and the one used in the book. Those differences are listed below but they should not detract from your understanding of either. CONTROL UNIT - This component is called the Control Section in the book. It is called Control Unit here simply because that is a more common name for it that you might see used elsewhere. LOAD INSTRUCTION - In this video, what's called a LOAD instruction is actually called a DATA instruction in the book. The Scott CPU uses two different instructions to move data from RAM into the CPU. One loads the very next piece of data (called a DATA instruction in the book) and the other uses another register to tell it which address to pull that data from (called a LOAD instruction in the book). The instruction was renamed in the video for two reasons: 1) It might be confusing to hear that the first type of data we encounter in RAM is itself also called DATA. 2) Since the LOAD instruction from the book is a more complex concept, it was easier to use the DATA instruction in the video to introduce the concept of moving data from RAM to the CPU . IN and OUT INSTRUCTIONS - In the Scott CPU, there is more involved in moving data between the CPU and external devices than just an IN or an OUT instruction. That process was simplified in the video to make the introduction of the concept easier. ACCUMULATOR - The register that holds the output of the ALU is called the Accumulator in the book. That is the name typically used for this register, although it was simply called a register in the video. MEMORY ADDRESS REGISTER - The Memory Address Register is a part of RAM in the book, but it is a part of the CPU in the video. It was placed in the CPU in the video as this is generally where this register resides in real CPUs. JUMP INSTRUCTIONS - In the book there are two types of unconditional JUMP instructions. One jumps to the address stored at the next address in RAM (this is the one used in the video) and the other jumps to an address that has already been stored in a register. These are called JMP and JMPR instructions in the book respectively. MISSING COMPONENT - There is an additional component missing from the CPU in the video that is used to add 1 to the number stored in a register. This component is called "bus 1" in the book and it simply overrides the temporary register and sends the number 1 to the ALU as input B instead. REVERSED COMPONENTS - The Instruction Register and the Instruction Address Register are in opposite positions in the diagrams used in the book. They are reversed in the video because the internal wiring of the control unit will be introduced in a subsequent video and keeping these registers in their original positions made that design process more difficult. OP CODE WIRING - The wires used by the control unit to tell the ALU what type of operation to perform appear near the bottom of the ALU in the video, but near the top of the ALU in the book. They were reversed for a similar reason as the one listed above. The wiring of the ALU will be introduced in a subsequent video and keeping these wires at the top of the ALU made the design process more difficult.
Views: 4629106 In One Lesson
What is RFID?  How RFID works?  RFID Explained in Detail
 
10:10
In this video, RFID (Radio Frequency Identification) Technolgy has been explained. So, in this video, what is RFID, what is inside this RFID system, how RFID works, and application of RFID have been explained. What is RFID? RFID is technology which works on radio frequency and it is used for the auto-identification for the different object. The RFID system mainly consists of two parts. 1) RFID Reader or Interrogator 2) RFID Tags In this RFID system, this RFID reader continuously sends radio waves of a particular frequency. If the object, on which this RFID tag is attached is within the range of this radio waves then it sends the feedback back to this RFID reader. And based on this feedback, RFID reader identifies the object. RFID tags: Now, three different kinds of RFID tags are commercially available. 1) Passive tags 2) Active tags 3) Semi-passive tags These passive tags do not have any power supply. They used to get their power from the incoming radio waves from the Readers. While active tags have a power source for their internal circuitries. And for sending the response to the reader also, it uses its own power supply. In the case of semi-passive tags, they have a power supply for internal circuitries, but for sending the response it relies on the radio waves received from the Reader. Operating Frequency: This RFID system is mainly operated in three frequency bands. 1) LF: Low-Frequency band 2) HF: High-Frequency band 3) UHF: Ultra High-Frequency band The exact frequency of operation varies from country to country. Operating Principles: Most of the RFID systems operate on any of this two principles. 1) Load Modulation 2) Backscattered Modulations Applications of RFID: 1. Institutions: Library, Hospitals, Schools, and Colleges 2. Transportation and Logistics 3. Access Control 4. Sports 5. Animal Tracking Timestamps for the different topics in the video is given below: 0:40 What is RFID? 1:56 What is inside this RFID chip? 4:42 Operating Frequencies for the RFID Systems 5:27 Working Principle of RFID Systems This video will be helpful to everyone in understanding the concept of RFID Technology. Follow me on YouTube: https://www.youtube.com/allaboutelectronics Follow me on Facebook: https://www.facebook.com/ALLABOUTELECRONICS/ Follow me on Instagram: https://www.instagram.com/all_about.electronics/ Follow me on Twitter: @rushalmshah Music Credit: http://www.bensound.com/
Views: 595586 ALL ABOUT ELECTRONICS
Could We Upload Our Consciousness To A Computer?
 
04:26
Would it ever be possible to one day upload our consciousness to a computer? How would we go about this? Read More: The Brain vs. The Computer https://faculty.washington.edu/chudler/bvc.html “Throughout history, people have compared the brain to different inventions.” Scientists Are Convinced Mind Transfer Is the Key to Immortality http://motherboard.vice.com/blog/scientists-are-convinced-mind-transfer-is-the-key-to-immortality “Call it mind transfer, uploading, brain backup, whatever—the idea of copying the human brain to a computer so it can live on without the body has a strong hold on futurists, neuroscientists, and folks that just want to live forever.” Mind-reading Technology Speeds Ahead http://www.scientificamerican.com/article/mind-reading-technology-speeds-ahead/ “Jack Gallant perches on the edge of a swivel chair in his lab at the University of California, Berkeley, fixated on the screen of a computer that is trying to decode someone's thoughts.” Engineering a memory with LTD and LTP http://www.nature.com/nature/journal/v511/n7509/full/nature13294.html “It has been proposed that memories are encoded by modification of synaptic strengths through cellular mechanisms such as long-term potentiation (LTP) and long-term depression (LTD).” MIT scientists implant a false memory into a mouse’s brain http://www.washingtonpost.com/national/health-science/inception-mit-scientists-implant-a-false-memory-into-a-mouses-brain/2013/07/25/47bdee7a-f49a-11e2-a2f1-a7acf9bd5d3a_story.html “Sometime soon, a lab mouse could wake up thinking he had snuggled up to a girl mouse the night before. But he hadn’t. The memory would be fake.” If your brain were a computer, how much storage space would it have? http://io9.com/if-your-brain-were-a-computer-how-much-storage-space-w-509687776 “The comparison between the human brain and a computer is not a perfect one, but it does lend itself to some interesting lines of inquiry. For instance: what is the storage capacity of your brain?” ____________________ DNews is dedicated to satisfying your curiosity and to bringing you mind-bending stories & perspectives you won't find anywhere else! New videos twice daily. Watch More DNews on TestTube http://testtube.com/dnews Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel DNews on Twitter http://twitter.com/dnews Trace Dominguez on Twitter https://twitter.com/tracedominguez Julia Wilde on Twitter https://twitter.com/julia_sci DNews on Facebook https://facebook.com/DiscoveryNews DNews on Google+ http://gplus.to/dnews Discovery News http://discoverynews.com Download the TestTube App: http://testu.be/1ndmmMq
Views: 295596 Seeker
What is DCS? (Distributed Control System)
 
08:29
▶ C'mon over to https://realpars.com where you can learn PLC programming faster and easier than you ever thought possible! ============================= ▶ Check out the full blog post over at https://realpars.com/dcs ============================= Over the years, the term DCS has evolved from the original description for the acronym as a Distributed Control System to the use of the term Decentralized Control System and they seem to be somewhat interchangeable nowadays. Briefly, as a point of the historical review, when PLC’s were invented, they were really good at handling single processes and were primarily used for repetitive, discrete control. The advent of the DCS was for controlling many autonomous controllers that handled many continuous operations, mainly using analog control. PLCs, traditionally, were used for single batch or high-speed control, have a relatively simple, low-cost design, and are the core of the system. Processing time for tasks are typically very fast, operators usually interact and control the system using some sort of graphical display such as SCADA. A DCS is used for continuous, complex controls, have an integrated control center much like a SCADA, which is the core of the system versus the processors in a PLC system. The DCS has a number of predefined functions. Processing times are somewhat slower. Operators interact with the control system via an integrated graphical display. DCS’s also have a claim that when safety is a top priority, the DCS is the most reliable system. Redundancy may be deployed in either the PLC or DCS applications. You could employ redundant components to negate the possibility of process shutdowns. Now that we’ve touched on some of the differences in the systems, let’s focus on the DCS and some of its components. A typical plant starts with a centralized operator control center typically called Operator Stations. This is where the operator can observe the operations of the plant, view process warnings and alarms, monitor production, and more. The next level of components may contain servers, archiving computers, and engineering stations. Communications with the Operator Station level is typically Industrial Ethernet. Servers are used for the collection of data at the processor level. Archiving computers are used for storing historical data that may be used for trends or compliance. Engineering stations are used for creating the projects on which the processes run. At the next level, you have the master controllers that supervise the individual processors as well as I/O modules. The next level is the field device level. Communications between this level and the processor level can be nearly any type that may be compatible with the components. Components at this level would be devices such as transmitters, switches, valves, motors, remote or distributed I/O, etc. In short, both PLCs and a DCS have their place in the market today. PLCs would work best in a small production environment where component failure if no redundant system is deployed, is a small risk for the application, the budget is restricted, or the tasks and I/O count are minimal. A DCS would be better used in an environment where there are large I/O counts with many continuous processes, a processor failure in one section of the plant is not a problem for production, or risk assessment has determined that an integrated package would be the best option. ============================= Missed our most recent videos? Watch them here: https://realpars.com/soft-starter https://realpars.com/s7-300-versus-s7-1500/ https://realpars.com/pressure-sensor/ ============================= To stay up to date with our last videos and more lessons, make sure to subscribe to this YouTube channel: http://goo.gl/Y6DRiN ============================= TWEET THIS VIDEO https://ctt.ac/Bs40f ============================= Like us on Facebook: https://www.facebook.com/therealpars/ Follow us on Twitter: https://twitter.com/realpars Follow us on LinkedIn https://www.linkedin.com/company/realpars #RealPars #DCS #DistributedControlSystem
Views: 17349 RealPars
How Quantum Computers Break Encryption | Shor's Algorithm Explained
 
17:31
Go to http://www.dashlane.com/minutephysics to download Dashlane for free, and use offer code minutephysics for 10% off Dashlane Premium! Support MinutePhysics on Patreon! http://www.patreon.com/minutephysics This video explains Shor’s Algorithm, a way to efficiently factor large pseudoprime integers into their prime factors using a quantum computer. The quantum computation relies on the number-theoretic analysis of the factoring problem via modular arithmetic mod N (where N is the number to be factored), and finding the order or period of a random coprime number mod N. The exponential speedup comes in part from the use of the quantum fast fourier transform which achieves interference among frequencies that are not related to the period (period-finding is the goal of the QFT FFT). REFERENCES RSA Numbers (sample large numbers to try factoring) https://en.wikipedia.org/wiki/RSA_numbers IBM on RSA https://www.ibm.com/support/knowledgecenter/en/SSB23S1.1.0.13/gtps7/s7pkey.html Modulo Multiplication Group Tables http://mathworld.wolfram.com/ModuloMultiplicationGroup.html Difference of squares factorization https://en.wikipedia.org/wiki/Difference_of_two_squares Euclid’s Algorithm https://en.wikipedia.org/wiki/Euclideanalgorithm Rational sieve for factoring https://en.wikipedia.org/wiki/Rational_sieve General Number field Sieve https://en.wikipedia.org/wiki/Generalnumberfieldsieve Scott Aaronson blog post about Shor’s Algorithm https://www.scottaaronson.com/blog/?p=208 Experimental implementation of Shor’s Algorithm (factoring 15, 21, and 35) https://arxiv.org/pdf/1903.00768.pdf Adiabatic Quantum Computation factoring the number 291311 https://arxiv.org/pdf/1706.08061.pdf Scott Aaronson course notes https://www.scottaaronson.com/qclec/ https://www.scottaaronson.com/qclec/combined.pdf Shor’s Algorithm on Quantiki https://www.quantiki.org/wiki/shors-factoring-algorithm TLS And SSL use RSA encryption https://en.wikipedia.org/wiki/TransportLayerSecurity Dashlane security whitepaper https://www.dashlane.com/download/DashlaneSecurityWhitePaperOctober2018.pdf Link to Patreon Supporters: http://www.minutephysics.com/supporters/ MinutePhysics is on twitter - @minutephysics And facebook - http://facebook.com/minutephysics Minute Physics provides an energetic and entertaining view of old and new problems in physics -- all in a minute! Created by Henry Reich
Views: 1036268 minutephysics
RAM Explained - Random Access Memory
 
15:42
Here is the RAM that I use in my PC: https://amzn.to/2KqHGwQ (affiliate) This is an animated video RAM tutorial. Topics include how RAM works, RAM speed, DRAM, SDRAM, Rambus RDRAM, DDR, DDR2, DDR3, DDR4, and ECC. #RAM My YouTube Setup https://www.amazon.com/gp/registry/wishlist/I0ZAXJ8GKJX4/ref=cm_wl_list_o_1?&_encoding=UTF8&tag=powe0ae-20&linkCode=ur2&linkId=51a27c5d268f8344fec155f7c6d29e52&camp=1789&creative=9325
How Audio Is Digitized?
 
00:45
Guidelines for the creation of digital collections consortium. The signal might have a little wiggle that happens so fast, the 44000 samples second are not fast enough to 21 apr 2004 first, digitized audio is easier handle, manipulate, and deliver before discussing process of converting analog digital, it in sound recording reproduction systems, digital refers representation waveform for processing, storage or transmission bit by our goes from natural source an electronic conversion. Digitizing an audio signal youtube. From msp the documentation cycling '74 and ircam, december 1997the sounds learn about analog digital recording. Digital audio wikipedia digital wikipedia en. Audio and video digitization uses one of many analog to digital conversion processes what is audio? How does it work? audio different from audio? Christopher dobrian. The medium in question may be air, solid, liquid, gas or a this document sets forth guidelines for digitizing audio materials carli digitalthe issues described concern sample rates, bit depths, file. How analog and digital recording works audio explained youtube. The issues, including what is digitization the process of converting information into a digital format. In this paper, i will introduce digitizing sound files. Digital audio theory made easy blaze. Digital audio is a technology that can be used to record, store, generate, manipulate, and reproduce sound using signals have been encoded in digital form 23 aug 2016 unlike analog storage media such as magnetic tape or vinyl records, computers store information digitally series of zeroes ones. This process is typically known as digitizing or sampling the audio, but it sometimes called analog to digital conversion for a more complete explanation of how audio works, we recommend computer music tutorial by curtis roads, published in 1996 mit press get video into computer, have digitize (convert stream numbers) need convert specialised hardware sound an important part creating file. See more audio tech pictures. At a purely physical level, sound is simply mechanical disturbance of medium. Digital audio wikipediadigitizing adobe support. Digital audio uci music department. Audacity is a software application for editing, mixing, one of the central issues in digitized audio conversion between analog and digital tal delay system [1] 1971 has profession been cd digitization very good, but not perfect. Digitization of audio electrical and computer engineeringaudio workflow uw madison libraries university wisconsin what is digital audio? Webopedia definitionchapter a csound floss manuals. What is digitization? Definition from whatis. Wikipedia wiki digital_audio url? Q webcache. Let's tour the digital audio sampling path from mic to memory and back out through. Digital audio fundamentals audacity development manual. Msp how digital audio worksdigitizing sound files. Googleusercontent search. When cds were first introduced in the early 1980s, their single purpose life was to ''17 oct 2011digital audio brings analog sounds into a form where they can be stored and manipulated on computer.
Storing & Retrieving (7 Information Processes) - staticProductions
 
08:17
Hello & Thanks for checking out our video podcast on Storing & Retrieving, Background Information: This is our first upload is Storing & Retrieving since the others haven't been edited to perfection yet (note: this is about 80% perfect to me since there are slight technical areas). This was edited by Ezra and pre-sliced & ordered together by Nathan. Editing time took about 20 minutes, The time it took for Nathan to render, edit and send - over 10 hours. With school the very next day, we only got 2 hours of sleep, but it was well worth it. Production Credits: staticProductions - Filming, Editing, Writing Sound Credits: Chris Brown - Matrix Taio Cruz - Higher AmalLadMusic - Forever (Cover Version) www.myspace.com/amalmusic - Stay tuned for more!
Views: 388 staticProdFTW
Endianness Explained With an Egg - Computerphile
 
10:46
Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after something from an 18th century novel.... The copy of Gulliver's Travels used in the graphics was found at archive.org and can be viewed here: http://bit.ly/C_Gulliver The animations of the hex to binary have a classic 'out by one' error - it occurred between keyboard and chair during the graphics creation process.... Sean https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 61549 Computerphile
How ATM Works
 
04:44
An automated teller machine (ATM) is an electronic telecommunications device that enables the clients of a financial institution to perform financial transactions without the need for a cashier, human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN). Using an ATM, customers can access their bank accounts in order to make cash withdrawals, debit card cash advances, and check their account balances as well as purchase pre-paid mobile phone credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated in (e.g.: Withdrawing Japanese Yen from a bank account containing US Dollars), the money will be converted at an official wholesale exchange rate. Thus, ATMs often provide one of the best possible official exchange rates for foreign travelers, and are also widely used for this purpose. http://engineers-channel.blogspot.com/p/atm.html
Views: 5896959 Largest Dams
Mi Home Security Camera 360 1080p unboxing, review, now in India, cheapest security camera Rs. 2699
 
06:36
Here is Mi Home Security Camera 360 1080p unboxing, this video also covers the features, specifications and sample videos shot in light and in dark conditions. Mi Home Security Camera 360 1080p price in India is Rs. 2,699 This Xiaomi mijia Smart WiFi IP camera can Pan-tilt, you can sleep soundly! The built-in IR-cut LEDs and the pretty quite motor enable this surveillance camera capture clear night vision images up to 9 meters distance silently. Besides, the rotatable design of the IP camera makes it capable of monitoring wider range in the horizontal and vertical direction via the APP control. There is concealed TF card slot provides not only a beautiful and integrated appearance but also a convenient storage method for you! Pan / Tilt control with dual motors, 360 degree panorama viewing angle Night vision function Two-way audio, with internal microphone and speaker "Mi Home" APP, download from Google Play or Apple Store -~-~~-~~~-~~-~- Follow me on https://www.instagram.com/gogirana/ https://twitter.com/gogiinc https://www.facebook.com/gogi.in.tech (c) 2019, Gogi Tech, rights reserved. -~-~~-~~~-~~-~-
Views: 1280124 Gogi Tech
World's First Light-based Memory Chip to store data permanently
 
03:15
The world’s first entirely light-based memory chip to store data permanently has been developed by material scientists at Oxford University. The device makes use of materials used in CDs and DVDs, and it could help dramatically improve the speed of modern computing. Today’s computers are held back by the relatively slow transmission of electronic data between the processor and the memory. There’s no point using faster processors if the limiting factor is the shuttling of information to-and-from the memory. The researchers think using light can significantly speed this up. Simply bridging the processor-memory gap with photons isn’t efficient, though, because of the need to convert them back into electronic signals at each end. Instead, memory and processing capabilities would need be light-based too. Researchers have tried to create this kind of photonic memory before, but the results have always been volatile, requiring power in order to store data. For many applications — such as computer disk drives — it’s essential to be able to store data indefinitely, with or without power. Now, an international team of researchers including researchers from Oxford University has produced the world’s first all-photonic nonvolatile memory chip. The new device uses the phase-change material Ge2Sb2Te5 (GST) — the same as that used in rewritable CDs and DVDs — to store data. This material can be made to assume an amorphous state, like glass, or a crystalline state, like a metal, by using either electrical or optical pulses. The team has shown that intense pulses of light sent through the waveguide can carefully change the state of the GST. An intense pulse causes it to momentarily melt and quickly cool, causing it to assume an amorphous structure; a slightly less-intense pulse can put it into an crystalline state. Later, when light with much lower intensity is sent through the waveguide, the difference in the state of the GST affects how much light is transmitted. The team can measure that difference to identify its state — and in turn read off the presence of information in the device as a 1 or 0 By sending different wavelengths of light through the waveguide at the same time — a technique referred to as wavelength multiplexing — the team also showed that they could use a single pulse to write and read to the memory at the same time. Now, the team is working on a number of projects that aim to make use of the new technology. They're particularly interested in developing a new kind of electro-optical interconnect, which will allow the memory chips to directly interface with other components using light, rather than electrical signals. Source: http://www.ox.ac.uk/news/2015-09-22-light-based-memory-chip-first-ever-store-data-permanently
Temporary Data Storage -- Random Access Memory
 
03:26
Temporary Data Storage -- Random Access MemoryRAM chips find their main application as temporary storages for digital information, various code arrays, data tables, and individual digits. RAM stores information and ensures rapid access to such information for further processing, writing into non-volatile memory (ROM, magnetic tapes) or for any other application. If information was written into RAM but it was not further read out, such information makes no sense as it will disappear when power is off.RAM chips differ by the data read/write procedure. They fall under two types:- RAM or random access memory (this is the most flexible scheme);- Serial access memory (more specific type).Parallel or random access memory is the simplest design; generally, it requires no additional components as memory chips are designed exactly for this mode. This mode allows writing information to any RAM address and reading information from any RAM address on a random basis.However, parallel access requires rather complex sequences of all input memory signals. That is, in order to write information, RAM has first to generate the address code for a cell to be written and then send required data along with CS and WR control signals. Similarly, in order to read out written information, it has to send the full address code for a cell to be read out.Serial access memory provides for simpler memory processes. In order to write information, the memory chip has to send the code of data to be written along with the writing strobe. In order to read out information, it sends the reading strobe and access the data.Such an approach has an obvious shortcoming. You can not write or read out cells with random addresses on a random basis.Series access memories come in three main types. They include:- First in- first out memory (FIFO);- Last in - first out (LIFO) pushdown stack memory;- Data array memoryThe first 2 memory types provide for the alternate memory reading/writing procedures. FIFO memory delivers data in the same order as they were written while LIFO memory does the same in the reverse order. Data arrays are stored in memory in bulk. That is, first a large data array is written to memory in whole; then this array is read out in whole. Such a memory may also support either FIFO or LIFO principle.
Views: 1047 ChipDipvideo
Cross Functional Vertical diagram in Edraw Max
 
07:00
#flowchart #edrawmax #uml Side bar is a term for information placed adjacent to an article in a printed or web publication. Separator is text or character to display between each tag link. Process a series of actions or steps taken in order to achieve a particular end. Data is the quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media. Stored data can be simple data files or more general objects, including stored electronic mail. Paper tape is a narrow strip of paper in which holes are punched in designated patterns to represent characters: formerly in common use as an input/output medium. Terminator is a device attached to the end-points of a bus network or daisy-chain. On-page reference indicates that the next or previous step is somewhere else on the flowchart. It is particularly useful for large flowcharts. Off-page reference uses a set of hyperlinks between two pages of a flowchart or between a sub-process shape and a separate flowchart page that shows the steps in that sub-process.
Views: 497 Pratik Matkar
Ignition Key Transponders
 
03:19
Ignition Key Transponders Describes the workings and applications of modern automotive key transponders. These tiny chips transmit a digital signal that's then processed by the Anti-Theft (antitheft) module. An OK signal or command is then given to the ECM and related computers to allow injection and starter activation. Learn how they work with this clear and concise video. Future videos will detail what to do to reprogram ignition keys. Each manufacturer is different and so is each procedure. ************************************************************************************ Amazon Printed-Books & Kindle: http://www.amazon.com/s/ref=nb_sb_noss_1?url=search-alias%3Dstripbooks&field-keywords=mandy+concepcion Google Play Android APPs: https://play.google.com/store/search?q=mandy+concepcion&c=apps Amazon Video DVDs: http://www.amazon.com/s/ref=nb_sb_noss_1?url=search-alias%3Dmovies-tv&field-keywords=mandy+concepcion Barnes & Noble Nook: http://www.barnesandnoble.com/s/mandy-concepcion?keyword=mandy+concepcion&store=allproducts Apple iTunes iPad: http://itunes.apple.com/us/artist/mandy-concepcion/id449573393?mt=11
Views: 986060 ADPTraining
Keyboards & Command Line Interfaces: Crash Course Computer Science #22
 
11:24
Today, we are going to start our discussion on user experience. We've talked a lot in this series about how computers move data around within the computer, but not so much about our role in the process. So today, we're going to look at our earliest form of interaction through keyboards. We'll talk about how the keyboard got its qwerty layout, and then we'll track its evolution in electronic typewriters, and eventually terminals with screens. We are going to focus specifically on text interaction through command line interfaces, and next week we'll take a look at graphics. Check out Eons! https://www.youtube.com/watch?v=vtpi7yUHNyg Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 174567 CrashCourse
How Computers Work: Information (Part I)
 
12:35
Part 1 of a 3-part video mini-series on How Computers Work for people with no computer or electronics engineering background. Content is presented with minimal terminology and with colourful animations to aid understanding. The part describes how information is represented using electricity in a computer. For more information visit the website: http://joshuahawcroft.com/curiosity/2012/06/how-computers-work/
Views: 573750 Joshua Hawcroft
YouTube Couldn't Exist Without Communications and Signal Processing: Crash Course Engineering #42
 
09:30
Engineering helped make this video possible. This week we’ll look at how it’s possible for you to watch this video with the fundamentals of signal processing. We’ll explore things from Morse Code, to problems like bandwidth capacity and noise, to how we arrived at the digital age. Crash Course Engineering is produced in association with PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Check out It’s Okay To Be Smart: https://www.youtube.com/channel/UCH4BNI0-FOK2dMXoFtViWHw *** RESOURCES: Sources: http://www.ee.iitm.ac.in/~giri/pdfs/EE4140/textbook.pdf http://edison.rutgers.edu/transmit.htm https://www.history.com/topics/inventions/telegraph https://www.gaussianwaves.com/2008/04/channel-capacity/ http://www.cs.man.ac.uk/~barry/mydocs/CS3282/Notes/DC06_7.pdf http://www.madehow.com/Volume-5/Telephone.html *** Crash Course is on Patreon! You can support us directly by signing up at http://www.patreon.com/crashcourse Thanks to the following patrons for their generous monthly contributions that help keep Crash Course free for everyone forever: Eric Prestemon, Sam Buck, Mark Brouwer, Laura Busby, Zach Van Stanley, Bob Doye, Jennifer Killen, Naman Goel, Nathan Catchings, Brandon Westmoreland, dorsey, Indika Siriwardena, Kenneth F Penttinen, Trevin Beattie, Erika & Alexa Saur, Glenn Elliott, Justin Zingsheim, Jessica Wode, Tom Trval, Jason Saslow, Nathan Taylor, Brian Thomas Gossett, Khaled El Shalakany, SR Foxley, Yasenia Cruz, Eric Koslow, Caleb Weeks, Tim Curwick, D.A. Noe, Shawn Arnold, Malcolm Callis, William McGraw, Andrei Krishkevich, Rachel Bright, Jirat, Ian Dundore -- Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashCourse Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 40327 CrashCourse
All about Computer with Shortcut Keys
 
04:36
All about Computer with Shortcut Keys. Transistors - The computer contains millions of transistors, which are used to create machine language using logic gates that turn on and off the circuits. Machine language - All computers and electronic devices communicate in binary, which is a series of 0's and 1's or Off and On electrical signals. All software written on your computer is created in a high-level programming language that humans can understand. When complete, the program is compiled into a low-level machine language that computers understand. ASCII codes - Each binary 0 or 1 is considered a bit and each number, letter, or other character is made up of eight bits (one byte). A common method for storing and editing text is done with ASCII codes, which is one byte of binary. For example, the lowercase letter "a" has an ASCII code decimal value of 97, which is 01100001 in binary. Motherboard - The Motherboard is the largest circuit board in the computer that holds and connects everything together. Without the motherboard, components like your processor and memory could not communicate with each other. Computer memory - Not to be confused with disk storage, the computer memory (RAM) is volatile memory and is used to store currently running applications. When the computer is turned off, all data in the memory is lost. Computer disk storage - A non-volatile type of memory, disk storage like a hard drive is what stores your information even when the computer is turned off. All of your personal files, documents, songs, photos, etc. are stored in a storage device. ROM - Another type of memory, read-only memory (ROM) is a memory chip that has data which can only be read. Most computers today have a programmable read-only memory (PROM), which is still read-only, but can be re-programmed if needed through a firmware update. Memory capacity - All memory and storage has a total capacity that is written using abbreviations such as KB, MB, GB, and TB. See the full overview of all computer capacities for a complete understanding of all values. Processor - The Central Processing Unit (CPU) is the component responsible for processing all instructions from software and hardware. Software and Hardware - Software is instructions and code installed into the computer, like the Internet browser you're using to view this page. Hardware is a physical device you can touch, like the monitor you're using to display this page. See the differences between computer hardware and software for more information. Input/Output - A computer works with a human by inputting data using an input device such as a keyboard, having the processor process that data, and then displaying the output on an output device such as a monitor. The printer is also another output device and is what allows you to get a hard copy of documents and pictures stored on the computer. Expansion cards - An expansion card is a card that can be added to the computer to give it additional capabilities. A video card, modem, network card, and sound card are all examples of expansion cards. However, many computers may also have on-board devices, such as a sound card and network card that are built onto the motherboard. For a laptop computer, additional cards are added into the PC Card slot. Programming - All software running on the computer has been created using a programming language by a computer programmer. Operating system - Every computer must have an operating system for software to communicate with the hardware. For example, most IBM compatible computers run the Microsoft Windows operating system and have the option to run alternative operating systems, such as a Linux variant. Apple computers only run macOS. Network - Computers communicate with other computers over a network using a network interface card (NIC) or Wi-Fi that connects to a router. There are two primary types of networks: a local area network (LAN) and a wide area network (WAN). The Internet is also considered a network, which uses the TCP/IP protocol. -~-~~-~~~-~~-~- Please watch: "How to buy a domain name from GoDaddy 2019" https://www.youtube.com/watch?v=ULV2vE1Ptio How to make a calling app in android https://www.youtube.com/watch?v=8VHRLWDmaHo How to create drawing android app in mit app inventor 2 https://www.youtube.com/watch?v=FimKlZH6Lkg How to make android calculator app using mit app https://www.youtube.com/watch?v=W39tJVxbvSM How to upload android app in google play store https://www.youtube.com/watch?v=KIPf9pBi89k how to create camera app in mit app inventor 2 https://www.youtube.com/watch?v=o-bYys8v9g4 How to create first android app in mit app inventor https://www.youtube.com/watch?v=pZWdFEzCZP0 -~-~~-~~~-~~-~-
Views: 96 The Coding Bus
Advanced CPU Designs: Crash Course Computer Science #9
 
12:23
So now that we’ve built and programmed our very own CPU, we’re going to take a step back and look at how CPU speeds have rapidly increased from just a few cycles per second to gigahertz! Some of that improvement, of course, has come from faster and more efficient transistors, but a number hardware designs have been implemented to boost performance. And you’ve probably heard or read about a lot of these - they’re the buzz words attached to just about every new CPU release - terms like instruction pipelining, cache, FLOPS, superscalar, branch prediction, multi-core processors, and even super computers! These designs are pretty complicated, but the fundamental concepts behind them are not. So bear with us as we introduce a lot of new terminology including what might just be the best computer science term of all time: the dirty bit. Let us explain. Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV We’ve got merch! https://store.dftba.com/collections/crashcourse Want to know more about Carrie Anne? https://about.me/carrieannephilbin Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashC... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse
Views: 370699 CrashCourse
Learning from Bacteria about Social Networks
 
01:04:56
Google Tech Talk (more info below) September 30, 2011 Presented by Eshel Ben-Jacob. ABSTRACT Scientific American placed Professor Eshel Ben-Jacob and Dr. Itay Baruchi's creation of a type of organic memory chip on its list of the year's 50 most significant scientific discoveries in 2007. For the last decade, he has pioneered the field of Systems Neuroscience, focusing first on investigations of living neural networks outside the brain. http://en.wikipedia.org/wiki/Eshel_Ben-Jacob Learning from Bacteria about Information Processing Bacteria, the first and most fundamental of all organisms, lead rich social life in complex hierarchical communities. Collectively, they gather information from the environment, learn from past experience, and make decisions. Bacteria do not store genetically all the information required to respond efficiently to all possible environmental conditions. Instead, to solve new encountered problems (challenges) posed by the environment, they first assess the problem via collective sensing, then recall stored information of past experience and finally execute distributed information processing of the 109-12 bacteria in the colony, thus turning the colony into super-brain. Super-brain, because the billions of bacteria in the colony use sophisticated communication strategies to link the intracellular computation networks of each bacterium (including signaling path ways of billions of molecules) into a network of networks. I will show illuminating movies of swarming intelligence of live bacteria in which they solve optimization problems for collective decision making that are beyond what we, human beings, can solve with our most powerful computers. I will discuss the special nature of bacteria computational principles in comparison to our Turing Algorithm computational principles, showing that we can learn from the bacteria about our brain, in particular about the crucial role of the neglected other side of the brain, distributed information processing of the astrocytes. Eshel Ben-Jacob is Professor of Physics of Complex Systems and holds the Maguy-Glass Chair in Physics at Tel Aviv University. He was an early leader in the study of bacterial colonies as the key to understanding larger biological systems. He maintains that the essence of cognition is rooted in the ability of bacteria to gather, measure, and process information, and to adapt in response. For the last decade, he has pioneered the field of Systems Neuroscience, focusing first on investigations of living neural networks outside the brain and later on analysis of actual brain activity. In 2007, Scientific American selected Ben-Jacob's invention, the first hybrid NeuroMemory Chip, as one of the 50 most important achievements in all fields of science and technology for that year. The NeuroMemory Chip entails imprinting multiple memories, based upon development of a novel, system-level analysis of neural network activity (inspired by concepts from statistical physics and quantum mechanics), ideas about distributed information processing (inspired by his research on collective behaviors of bacteria) and new experimental methods based on nanotechnology (carbon nanotubes). Prof. Ben-Jacob received his PhD in physics (1982) at Tel Aviv University, Israel. He served as Vice President of the Israel Physical Society (1999-2002), then as President of the Israel Physical Society (2002-2005), initiating the online magazine PhysicaPlus, the only Hebrew-English bilingual science magazine. The general principles he has uncovered have been examined in a wide range of disciplines, including their application to amoeboid navigation, bacterial colony competition, cell motility, epilepsy, gene networks, genome sequence of pattern-forming bacteria, network theory analysis of the immune system, neural networks, search, and stock market volatility and collapse. He has examined implications of bacterial collective intelligence for neurocomputing. His scientific findings have prompted studies of their implications for computing: using chemical "tweets" to communicate, millions of bacteria self-organize to form colonies that collaborate to feed and defend themselves, as in a sophisticated social network. This talk was hosted by Boris Debic, and arranged by Zann Gill and the Microbes Mind Forum.
Views: 28146 GoogleTechTalks
Could You Transfer Your Consciousness To Another Body?
 
03:10
Check out the movie Self/Less starring Ryan Reynolds and Sir Ben Kingsley in theatres July 10th: http://outlive.life SUBSCRIBE (it's free!): http://bit.ly/asapsci GET THE BOOK: http://asapscience.com/book/ Written by Mitchell Moffit and Greg Brown Instagram and Twitter: @whalewatchmeplz and @mitchellmoffit Clickable: http://bit.ly/16F1jeC and http://bit.ly/15J7ube AsapINSTAGRAM: https://instagram.com/asapscience/ Facebook: http://facebook.com/AsapSCIENCE Twitter: http://twitter.com/AsapSCIENCE Tumblr: http://asapscience.tumblr.com Vine: Search "AsapSCIENCE" on vine! SNAPCHAT 'whalewatchmeplz' and 'pixelmitch' Created by Mitchell Moffit (twitter @mitchellmoffit) and Gregory Brown (twitter @whalewatchmeplz). Send us stuff! ASAPSCIENCE INC. P.O. Box 93, Toronto P Toronto, ON, M5S2S6 Further Reading-- General information about the brain and neurons: http://www.theguardian.com/science/blog/2012/feb/28/how-many-neurons-human-brain http://ngm.nationalgeographic.com/2014/02/brain/zimmer-text http://www.madsci.org/posts/archives/2003-03/1046827391.Ns.r.html Brain downloads: http://www.scientificamerican.com/article/e-zimmer-can-you-live-forever/ http://io9.com/you-ll-probably-never-upload-your-mind-into-a-computer-474941498 Memory implantation in mice: http://www.smithsonianmag.com/innovation/meet-two-scientists-who-implanted-false-memory-mouse-180953045/?no-ist http://www.sciencemag.org/content/341/6144/387 http://www.nature.com/nature/journal/v484/n7394/full/nature11028.html http://thepsychreport.com/research-application/featured-research/manipulating-memory-through-optogenetics-qa-with-neuroscientists-xu-liu-and-steve-ramirez/ Optogenetics: http://www.scientificamerican.com/article/optogenetics-controlling/ http://www.newyorker.com/science/maria-konnikova/can-memories-implanted-removed
Views: 1571367 AsapSCIENCE
How old school cassette tape drives worked
 
14:58
Support this channel on Patreon: https://www.patreon.com/8BitGuy1 Thanks go out to my guest stars: Lazy Game Reviews https://www.youtube.com/user/phreakindee Modern Vintage Gamer https://www.youtube.com/user/jimako123 Classic Gaming Quarterly https://www.youtube.com/user/CGQuarterly The Obsolete Geek https://www.youtube.com/user/robivy64 In this episode we take an in depth look at what life was like using cassette drives for storage on computers during the 1970's and 1980's.
Views: 1033618 The 8-Bit Guy
Music Player v2 (ComputerCraft)
 
02:39
I want to give a thanks to Mariusmivw for helping me out with this project. The reason I made this in 1.2.5 is primarily because I looked briefly at how to send signals in the newer versions of CC to note blocks, and it seemed that I'd need to place a computer next to every note block. If there are any other ways to do this in the newer versions of CC, I'd gladly hear them. If you're interested in making this yourself, you can find the code for the Master computer here: https://pastebin.com/A5ju2jgD You'll also need the code for the Slave computers: https://pastebin.com/x8hxUnqT The code for every Slave computers is pretty much identical, you only need to change the string in the first line to the instrument you want it to play. The choices are: 'bass1', 'bass2', 'snare1', 'snare2'. 'hat1', 'hat2', 'bassdrum1', 'bassdrum2', 'harp1' and 'harp2'. Detailed explanation: The subtitles say that the pitch is sent to the Slave computer, which converts it to the correct colored cable color, but it's a simplified and wrong way of explaining a more complex process. The pitch in the song data array is not the actual pitch of the note block, but the amount of times you need to right click a note block. This makes it easier to program the songs, since most note block tutorials on YouTube tell you the amount of times you need to right-click, and not the pitch. A note block that's placed down starts with a pitch of 1, so if the 'right-click' value in the song data array is 14, the actual pitch of the note block will be 15. This 'right-click' value is taken, and is checked for it's value. If it's higher than 15 (so a pitch of 16), the instrument that goes with it will get a '2' after it's name and the 'right-click' value will get 16 subtracted by it and 1 added to it to compensate for the earlier offset of 1. If it's equal to 15 or lower than it will get a '1' after it's name and the 'right-click' value will get 1 added to it to compensate for the earlier offset of 1. The 'right-click' value now corresponds to the pitch, and a colored cable color will be requested based on this pitch. The reason we subtracted the 'right-click' value by 16 if it was greater than 15 is to make sure the final 'right-click' value would always range between 1-16, as there are only so many colors. All the colored cable colors of one instrument type for one message to send are then all combined into a number and stored as the color cable color. This step is necessary to make sure a computer is able to output more than 1 signal at once. The instrument now has a number at the end of it's name and will be sent, and the Slave computer that has it's instrument type equal to the sent instrument will receive the colored cable color value. This value is then divided back into the correct colors by ComputerCraft automatically. Finally, the Slave computer will send (a) redstone signal(s) to the wanted colored cable color(s), which stays on for 0.1 seconds. This is needed to make sure the signal always has the time to reach the note block and power it, at a delay of 0.05 seconds it often doesn't work. Afterwards, it turns off it's redstone signal.
Views: 105 Sander Bos
Computer Engineering and the End of Moore's Law: Crash Course Engineering #35
 
11:35
This week we’re exploring a field of engineering that is essential to how you’re watching this video: computers and computer engineering. We’ll explain differences between hardware and software, how engineers are working on making computers smaller and more energy efficient, and how computer aided processes such as CAD and CAM make it easier for engineers to design and manufacture parts needed in machines and products. Crash Course Engineering is produced in association with PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV *** RESOURCES: http://www.bbc.co.uk/schools/gcsebitesize/design/systemscontrol/ictinindustryrev2.shtml https://www.autodesk.co.uk/solutions/cad-cam *** Crash Course is on Patreon! You can support us directly by signing up at http://www.patreon.com/crashcourse Thanks to the following Patrons for their generous monthly contributions that help keep Crash Course free for everyone forever: Eric Prestemon, Sam Buck, Mark Brouwer, Bob Doye, Jennifer Killen, Naman Goel, Patrick Wiener II, Nathan Catchings, Efrain R. Pedroza, Brandon Westmoreland, dorsey, Indika Siriwardena, James Hughes, Kenneth F Penttinen, Trevin Beattie, Satya Ridhima Parvathaneni, Erika & Alexa Saur, Glenn Elliott, Justin Zingsheim, Jessica Wode, Kathrin Benoit, Tom Trval, Jason Saslow, Nathan Taylor, Brian Thomas Gossett, Khaled El Shalakany, SR Foxley, Sam Ferguson, Yasenia Cruz, Eric Koslow, Caleb Weeks, Tim Curwick, D.A. Noe, Shawn Arnold, Malcolm Callis, Advait Shinde, William McGraw, Andrei Krishkevich, Rachel Bright, Jirat, Ian Dundore -- Want to find Crash Course elsewhere on the internet? Facebook - http://www.facebook.com/YouTubeCrashCourse Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 65226 CrashCourse
This is what a "DEAD" hard drive sounds like!
 
01:49
How to fix a broken Hard disk to recover stored data: https://www.youtube.com/watch?v=Zcr0ah8hjAk If your hard drive sounds like this one, then it is most likely means the drive is dead :( If you are lucky enough and still can access your files on it, then hurry up and back all your data before it is too late. WARNING: Never attempt to open your new and expensive hard drives like this one.. Opening it like this will cause a major damage. The hard drive is like a CD discs which are encapsulated in a case free of dust .So be careful!!
Views: 488847 Engineer Knows Best!
Biliary tree | Gastrointestinal system physiology | NCLEX-RN | Khan Academy
 
06:00
Created by Raja Narayan. Watch the next lesson: https://www.khanacademy.org/test-prep/nclex-rn/rn-gastrointestinal-system/rn-the-gastrointestinal-system/v/exocrine-pancreas?utm_source=YT&utm_medium=Desc&utm_campaign=Nclex-rn Missed the previous lesson? https://www.khanacademy.org/test-prep/nclex-rn/rn-gastrointestinal-system/rn-the-gastrointestinal-system/v/hepatic-lobule?utm_source=YT&utm_medium=Desc&utm_campaign=Nclex-rn NCLEX-RN on Khan Academy: A collection of questions from content covered on the NCLEX-RN. These questions are available under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States License (available at http://creativecommons.org/licenses/by-nc-sa/3.0/us/). About Khan Academy: Khan Academy offers practice exercises, instructional videos, and a personalized learning dashboard that empower learners to study at their own pace in and outside of the classroom. We tackle math, science, computer programming, history, art history, economics, and more. Our math missions guide learners from kindergarten to calculus using state-of-the-art, adaptive technology that identifies strengths and learning gaps. We've also partnered with institutions like NASA, The Museum of Modern Art, The California Academy of Sciences, and MIT to offer specialized content. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s NCLEX-RN channel: https://www.youtube.com/channel/UCDx5cTeADCvKWgF9x_Qjz3g?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 278156 khanacademymedicine
Bytecoin (BCN) intro
 
00:40
FOR FREE TRADING SIGNALS JOIN US ON TELEGRAM http://t.me/cryptopointsignals What is Bytecoin? Bytecoin is a private, decentralized cryptocurrency with open source code that allows everyone to take part in the Bytecoin network development. Privacy and security come naturally from using Bytecoin. The best solution for those who want to keep their financial privacy. Instant private transactions are provided all around the world by the Bytecoin Network, they are totally untraceable, and they don’t require any additional fees. Fiat currencies are assigned to specific territories while Bytecoin is bound to the Internet and therefore is international by default. Bytecoin Specifics Your can participate in the operation of the network by allocating the computing power of your computer. Due to this mechanism, transaction processing is decentralized, which allows a person to be not only a user, but also a participant. The decision entirely your choice, you are able to choose to take part in network maintenance and get a reward for it, or buy BCN directly on exchanges. Bytecoin Transactions Unlike fiat money transactions, where your money is processed through an intermediary, bank, or financial institution, transactions between Bytecoin users are carried out over the Internet which makes the transactions much more reliable. Transaction privacy is protected by secure cryptographic algorithms whereby no one can identify who sent the money, who the receiver was, and what amount of money was transferred. Safety and Reliability The reliability of Bytecoin is defined by the total computational power of all the computers that take part in the processing of transactions. The greater the processing power, the more reliable the network. In so doing all of the money stored in your wallet is already protected during the transaction process and its safety doesn’t depend on the network’s reliability. Your money is always safe. Deflation Bytecoins are gradually getting more expensive over time, since the emission is limited to 184.47 billion BCN. The number of Bytecoin emitted each 120 seconds is slightly decreasing. As a result BCN gains value and the exchange rate increases. While currencies with sharp decreases of reward per block are exposed to intense declines in network power, Bytecoin emissions are decreasing slowly, which protects the currency from economic shocks. Emission The emission of fiat currencies is a closed process where an issuer is engaging in its own capabilities. One can’t take part in the emission process. Bytecoin emission is an open process which employs the computing powers of all network members. Any user can join the Bytecoin network and take part in the emission process (thus, becoming a miner). Mining in the network results in the creation of new money, which serves as a reward for users who employ their computing power in order to process transactions. All transactions are carried out every 120 seconds. The Miners ensure that the transactions are processed correctly and provide cryptographic protection of transactions and personal data. However, miners cannot access users' financial data since Bytecoin protects the identity of the sender and the receiver, and conceals the sum transferred.
Views: 138 CRYPTO POINT
Binary Trade Signal Introduction
 
03:30
http://binarysignalspro.com/ How to trade binary options with Binary Trade Signal 60sec signal service. binarytradesignal.com Video Rating: / 5Structured Digital Comparison With Binary Compare Binary comparison can be called as the process by which the similarities of two different digital data are found out. It is the common method used to find out the similarities of two data by the way of comparing it bit by bit. Take for example that a person reads through two different word files and finds out that both of them are exactly identical by in the sentences and the words. The main thing to notice is that these files could be in different formats. Thus, through a binary comparison the two files are compared on the basis of their structure. Binary files are those files that mostly contain only digits and not text or images. Thus, these files are also called as data files. Comparison of data files is important when one has to tally things and match two different sorts of data. Binary comparison eases the job as even files in different formats can be compared to each other. It is increasingly becoming very difficult to compare the various files as it takes a lot of time. Thus, with the development of the computer technology, all this work has been set aside for the computer machines. There are a lot of softwares that have been developed for this purpose. The binary compare is a process consisting of file filtration which itself involves text and code lines to know the content of the files. This process can be only performed by specific software, and is not possible for a human being. This is the same process by which a person can differentiate a MP3 file from a video file. Some other features of these softwares are that they allow the verification of the various errors that could be there in the files. Error correction is an extremely important task in the sub-field of computer-technology and this is of utmost important when we talk about data. They even conduct the various important tasks required for the file transfer protocol. The binary comparison softwares provide the users with the ability of understanding the various algorithms and formulas, and itself allows the software to verify and detect the various lines and codes of the file stored in the computer. The analysis work is eased to a very great extent. Thus, after the accomplishment of this process the software known which file should be omitted and which one should be included and can handle any amount of files and detect similar duplicate or similar files with the use of binary technology. One of the most important features of these binary comparison softwares is that huge amount of work can be done in a single time. The concept of parallel processing is applicable here also. These software even provide brief detail of the files that have to be compared. There have been new softwares developed, in which the strength of the software can be increased for comparing larger files and complex data files. They can now even compare different types of files making the task very easy. If you are interested in binary compare , check this web-site to learn more about file comparison.
Views: 9 Evgeniy Shichko
ZSSC3026 Sensor Signal Conditioner IC for High-res Altimeter Modules
 
02:17
The ZSSC3026 is a sensor signal conditioner (SSC) integrated circuit for high-accuracy amplification and analog-to-digital conversion of a differential input signal. Designed for high-resolution altimeter module applications, the ZSSC3026 can perform offset, span, and 1st and 2nd order temperature compensation of the measured signal. Developed for correction of resistive bridge sensors, it can also provide a corrected temperature output measured with an internal sensor. The measured and corrected bridge values are provided at the digital output pins, which can be configured as I2C (≤ 3.4MHz) or SPI (≤ 20MHz). Digital compensation of signal offset, sensitivity, temperature, and non-linearity is accomplished via an 18-bit internal digital signal processor (DSP) running a correction algorithm. Calibration coefficients are stored on-chip in a highly reliable, non-volatile, multiple-time programmable (MTP) memory. Programming the ZSSC3026 is simple via the serial interface. The IC-internal charge pump provides the MTP programming voltage. The interface is used for the PC-controlled calibration procedure, which programs the set of calibration coefficients in memory. The digital mating is fast and precise, eliminating the overhead normally associated with trimming external components and multi-pass calibration routines. For more information about the ZSSC3026 visit www.IDT.com/ZSSC3026.
Mu-ming Poo (UC Berkeley, CAS Shanghai) Part 4: How Neural Circuits Learn Time Intervals
 
36:32
https://www.ibiology.org/neuroscience/learning-and-memory/#part-4 The potential function of STDP in storing time interval information in the sensory experience is further illustrated in Part 4. Poo describes experiments on a randomly connected network of cultured neurons and on intact optic tectum of zebrafish larvae that demonstrate how SDTP provides a potential cellular mechanism for neural networks to store the memory of the time interval.
Views: 4388 iBiology
Neuron-Spectrum.NET: Video EEG (LTM)
 
09:43
Neuron-Spectrum.NET — software for EEG recording and analysis video guide. Subscribe: http://bit.ly/addneurosoft The "Neuron-Spectrum" software provides the EEG recording on any digital EEG system of Neuron-Spectrum series by 8 -- 32 channels (up to 64 digital derivations). During the recording monopolar, bipolar or mixed montages in "10-20" and "10-10" schemes can be used. Any polygraphic channels (ECG, EMG, EOG, breath (airflow, chest and abdominal movements), breath noise (snoring), body position, limb movement, SpO2*, etc.) can be included in montage. The montage can be switched at any moment: before the recording, during the recording, in the process of EEG review and analysis after the recording. It is possible to set different parameters for the different channels. For example, if you can not delete the trend of EEG isoline in frontal derivations, you can specify the more high values of high pass filter only for these derivations. You can change the parameters of any channel in the process of the recording. In split-screen mode you can observe the process of the recording in one part of the screen and review the recorded EEG in the other one. The software allows performing the functional tests which are standard for EEG checkups (photic stimulation, auditory stimulation, hyperventilation, eyes opening). Besides, you can perform other functional tests of any duration and in any sequence. The flexible possibilities of stimulators programming are available. You can watch the process of EEG recording both from the computer connected to the digital EEG system or computer connected to the same local network. After EEG recording termination, EEG can be reviewed in the "as recorded" mode as if it emulates the paper record. EEG Storage The records are stored in the database which provides the advanced possibilities of structuring and search. The records archives can be stored on CD or DVD. If necessary to review the archive record, the software will inform the user of the required disk to be installed in the disk drive. Besides, the records can be stored not only on the computer connected to the digital EEG system but also on any remote computer (file server). The software operates with standard network database via GDT and HL7 interfaces. EEG Printing EEG with standard grid, derivations names, recording parameters can be printed on any computer printer. In the process of the recording you can mark EEG fragment which will be printed just after the recording termination. EEG Analysis The records can be analyzed with the use of the most modern techniques of mathematical analysis. Any fragment of the record or the whole record (with the division on epochs) can be processed. As far as the digital EEG systems of Neuron-Spectrum series allow EEG recording not only in 35 Hz standard range but also in the wider frequency range, then not only standard ranges (alpha, beta, delta and theta) but also any ranges specified by the user can be analyzed at spectral analysis. Brain Mapping. The software allows mapping of practically any parameter: EEG amplitude and spectrum power in the whole frequency range, EEG amplitude and spectrum power in the specified frequency ranges, rhythm index, etc. Search of spikes and sharp waves is done automatically. In the result of search the software provides the list of the detected phenomena and mapping of these phenomena distribution on scalp. The software provides the possibility of EEG coherent and cross-spectral analyses performing and coherence maps generating. After EEG mathematical analysis the software allows creating the automatically generated EEG description in checkup report. Besides, the doctor can edit the report at her/his discretion, add any pictures and graphs. At that you can use structured comprehensive glossary which can be enlarged. More about EEG systems: http://www.neurosoft.com/en/catalog/sectionview/id/1 Disclaimer. Not all functions of equipment shown on this video are available in all countries. For more information please write to [email protected]
Views: 764 Neurosoft Russia
What is a CPU...?? CPU
 
02:48
A central processing unit (CPU) is an important part of every computer. The CPU sends signals to control the other parts of the computer, almost like how a brain controls a body. The CPU is an electronic machine that works on a list of computer things to do, called instructions. CPU (pronounced as separate letters) is the abbreviation for central processing unit. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computer where most calculations take place CPU. Stands for "Central Processing Unit." The CPU is the primary component of a computer that processes instructions. ... The CPU contains at least one processor, which is the actual chip inside the CPU that performs calculations. Components of CPU and their functions: CPU or Central processing unit is the brain of the computer system. Functions of CPU varies from data processing to controlling input-output devices. ... It also controls the operations of all other parts of the computer system. The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions.
Views: 30 Technology House
iPhone Data Recovery from Dead Logic Board / Phone
 
20:28
Have you ever met the problem about losing your data on your phone suddenly? All the pictures, messages, contacts and files were gone. What a disaster! How to save your lost data? If your phone or motherboard is damaged, the situation would be worse. How to recover the data from a damaged phone? The data recovery approach demonstrated in the video is mainly for those phones which are seriously damaged, without iCloud backup, can not turn on, or even with deformed logic board/motherboard. Attention: 1. There is a possible risk for the motherboard data recovery process. 2. Skilled repair techs are required for the operation. If you have any demands and questions on data recovery, please feel free to contact us. Tools Used: Soldering Iron Station: https://goo.gl/laSjoe Hot Air Gun: https://goo.gl/W8Eooa PCB Holder: https://goo.gl/39OyhT Solder Wick: https://goo.gl/FsZSKc Soldering Paste: https://goo.gl/kM1Sll Insulation Mat for Maintenance Platform: https://goo.gl/nyilR3 LCD Opening Pliers: https://goo.gl/TetFD4 Screw Driver: https://goo.gl/piKgpm Tweezers: https://goo.gl/t4k5V3 Facebook: https://www.facebook.com/rewatechnology/
Views: 288748 REWA Technology
TCDS2016 - Lifelong Augmentation of Multi Modal Streaming Autobiographical Memories
 
02:46
Many robotics algorithms can benefit from storing and recalling large amounts of accumulated sensorimotor and interaction data. We provide a principled framework for the cumulative organisation of streaming autobiographical data so that data can be continuously processed and augmented as the processing and reasoning abilities of the agent develops and further interactions with humans take place. As an example, we show how a kinematic structure learning algorithm reasons a-posteriori about the skeleton of a human hand. A partner can be asked to provide feedback about the augmented memories, which can in turn be supplied to the reasoning processes in order to adapt their parameters. We employ active, multi- modal remembering, so the robot as well as humans can gain insights of both the original and augmented memories. Our framework is capable of storing discrete and continuous data in real-time, and thus creates a full memory. The data can cover multiple modalities and several layers of abstraction (e.g. from raw sound signals over sentences to extracted meanings). We show a typical interaction with a human partner using an iCub humanoid robot. The framework is implemented in a platform-independent manner. In particular, we validate multi platform capabilities using the iCub, Baxter and NAO robots. We also provide an interface to cloud based services, which allow automatic annotation of episodes. Our framework is geared towards the developmental robotics community, as it 1) provides a variety of interfaces for other modules, 2) unifies previous works on autobiographical memory, and 3) is licensed as open source software.
Views: 666 Tobias Fischer
CrazyEngineers : Voice Controlled Personal Assistant using Raspberry Pi
 
10:03
Made by: Akshay Nagpal (https://twitter.com/akshay2626) Link to my project entry: http://www.crazyengineers.com/threads/voice-controlled-personal-assistant-using-raspberry-pi.86494/ The objective of the project was to make a standalone personal assistant that can be interacted solely through the user’s voice. This project is a prototype for a variety of uses. It can help the user in doing simple tasks like checking mail inbox, time, weather conditions etc. as well as complex tasks like computing arithmetic problems, searching Wikipedia and face recognition for security at home. The user calls the system by speaking a keyword (“Cyrus”) through the microphone, following which the system signals the user (through a beep) to speak the task he wishes to accomplish. The user speaks the voice command and the system gives the output through the speakers attached to the system. The core concepts used in the project are speech-to-text conversion (for understanding user input) and text-to-speech conversion (for giving output to the user). The project has features pertaining to information, entertainment and security. The user can check his Gmail for unread messages, ask the current time and calculate basic arithmetic problems using just voice commands. In addition to this, the system can search Wikipedia for any term that the user asks, and gives the results through voice only. The user can also entertain himself by telling the system to play music from his playlist in both normal and shuffled manner. For security, the system can click a picture through the webcam, and detect the face in the image. It further processes the face and tells whether the person is a friend or stranger. It does so by matching the face to a set of faces, already stored and labelled as friends in the system. OpenCV and normalized cross-correlation has been used for face detection and matching. It can help the visually impaired to connect with the world by giving them access to Wikipedia, Calculator, Email and Music all through their voice. The voice controlled calculator can be used for visually impaired students in primary school. The prototype can also keep people secure as it can be used as a surveillance system which captures the face of the person standing at the door, and tells the owner whether the visitor is a known person or not. - The project was written in Python programming language as it is the official language used for programming the hardware that I used, which was Raspberry Pi.
Views: 106445 Akshay Nagpal
Image Compression . It Image Compression Technology
 
01:13
Image Compression Technology http://www.imagecompression.it/ An image is essentially a 2-D signal processed by the human visual system. The signals representing images are usually in analog form. However, for processing, storage and transmission by computer applications, they are converted from analog to digital form. A digital image is basically a 2- Dimensional array of pixels. Images form the significant part of data, particularly in remote sensing, biomedical and video conferencing applications. The use of and dependence on information and computers continue to grow, so too does our need for efficient ways of storing and transmitting large amounts of data. Image compression addresses the problem of reducing the amount of data required to represent a digital image. It is a process intended to yield a compact representation of an image, thereby reducing the image storage/transmission requirements. Compression is achieved by the removal of one or more of the three basic data redundancies: Coding Redundancy Interpixel Redundancy Psychovisual Redundancy Coding redundancy is present when less than optimal code words are used. Interpixel redundancy results from correlations between the pixels of an image. Psychovisual redundancy is due to data that is ignored by the human visual system (i.e. visually non essential information). Image compression techniques reduce the number of bits required to represent an image by taking advantage of these redundancies. An inverse process called decompression (decoding) is applied to the compressed data to get the reconstructed image. The objective of compression is to reduce the number of bits as much as possible, while keeping the resolution and the visual quality of the reconstructed image as close to the original image as possible. Index Terms: Image Compression, Image Processing, Image Reconstruction, Codebook, Quantization. Reference URL: http://www.imagecompression.it/
Views: 688 advancedsourcecode
Crusher plant control system reconstruction, PD RB „Kolubara" d.o.o., Lazarevac
 
02:50
MIKRO KONTROL d.o.o reference, „Tamnava - East Field", Kalenic - Crusher plant control system reconstruction, PD RB „Kolubara" d.o.o., Lazarevac Mikro Kontrol, Belgrade, has successfully completed reconstruction all lines in crusher plant. The entire work included the development of the main electrical design, detailed design and as built design, delivery and installation of equipment and commisioning. Process "Crusher plant" is supplied with coal from open pit mine "Tamnava-West Field". There, coal is ground and loaded into wagons for the power plant "Nikola Tesla" in Obrenovac. Transport of coal through "Crusher plant" is done through 24 belt conveyors. As part of the transport, there is the combined machine RS1 which is used for temporary storage of coal. Coal and coal dust is transferred by belt conveyor feeders in 8 bunkers which is used for temporary storage. Spilt coal near wagons is sent back to the bunkers by elevator. Four belt weighing scales measure transported coal. The choice of technology line, i.e. the redirection of coal transportation is carried out using five foundries and three mobile cars. Coal is grinded in the four crushers. As protection, in front of each crusher, the device for metal materials recognition is set. For the purposes of the consumer, through the cribble the raw coal screening (dedusting) is made. Sampling of coal for testing is performed using 4 units, sampler. Coal transporting from coal bunkers to the conveyor belt is carried out using five extraction units. Coal wagons are fed with coal using four feeders, and are transported by rail to the Termal power plant „Nikola Tesla". Control The entire process is done in three shifts, 24 hours, without interruption. It was necessary to install the control system that has a high level of reliability and security, that can process a large number of signals, that is connectable with other control systems in Crusher plant and can provide the availability for future expansion. For this reason, we chose the Simatic PCS7 (Process Control System), which is basically, a DCS a decentralized control system. The control system handles over 2000 signal. Signals from individual devices are collected in the distributed units in 12 locations. Signal processing and user program execution is performed in AS (Automation Station). Distributed units and AS are connected by optical cables, PROFIBUS DP protocol in a redundant ring. The monitoring system consists of two redundant OS (Operator Station), SCADA server (SCADA operator stations), an ES (Engineering Station), five OS clients and one archive server. As the process does not suffer delays in production, there is a level of redundancy derived in AS stations (PLC), also in PROFIBUS DP network processor and network, and in OS SCADA station. In case of failure of the main unit (AS, OP, or network), auxiliary (backup) device, automatically and without delay takes over the control. To meet the needs of the individual devices, locally, on each of the control cabinet in which peripheral units are placed, there is touch panel, where you can see all the data related to the work Crusher plant. The scope of work Crusher plant control system revitalization included the following phases: - Development of main electrical design. - Development of detailed electrical design.  -Installation, delivery, installation and connection of 14 electrical cabinets with control equipment, two rack cabinets with computer and networking equipment, LCD TV 70''.  -Development of user program and generation of reports (shift, daily, ...).  -Commissioning.  -Development of electrical as built design.  -Training. Improvements The new control system is built to increase the level of reliability of all parts in Crusher plant. It provides a safer and more accurate monitoring of Crusher plant, which quickly recognizes the warning and alarm state of all parts. In this way, the problem is quickly detected and can be solved very fast. The duration of the production delay is significantly shortened. The control system automatically generates necessary reports (daily, shift, month, ...). All necessary data during the process are stored in the archive station. Analysis of these reports helps to identify critical points in production, which allows the application of appropriate measures for their removal, as well as to improve and enhance the overall production.
Life Watch, a next generation device, by Business Process Technologies
 
03:26
Device the "Life Watch" (a smart watch) Extension of healthy life! Conveniently. Stylishly. Fashionable! Life Watch Minimum size-maximum functionality. The most advanced wearable technology in the world. Unlike today's smart watches and wristbands, Life Watch is not limited to tracking physical data. System via apps connected to the cloud Webwellness. Where information is stored about the state of your health, not only with the device Life of the Watch, but with the device Life Expert. On the warping of a large amount of data, with the appearance of minimal deviations from the norm, a normalization program is formed. which enters the application and is transmitted to Life Watch. The device can be worn 24 hours 7 days a week. 100% CONTROL Pulse rate Fatigue of the body Of oxygen in the blood Emotional state Quality of sleep The gained calories Number of steps Lability of heart rate Vital energy Thanks to the motion timer, will ask you to warm up if you sat at the computer. The " SOS " button will help your parents or child to dial you in case of emergency, as well as to transmit GPS coordinates. The device will help you not to forget the phone and will signal when you are far away from it, and will help to find it. You will Wake up sleepy, because Life Watch will track the phases of sleep and Wake you up when you exit the REM phase. Correction of tailor-made complex In real-time, the system tracks your vital signs and uses them as a basis for regulation programs, resulting in better health and physical condition. Сайт http://businessprorussia.ru/products/... Группа Webwellness Вконтакте https://vk.com/webwellnesss Заказать приборы Wellness можно по номеру 8-800-77-07-078 звонок по России бесплатный