Floating point

Hidden bit

No description. (Wikipedia).

Video thumbnail

Picking E And D Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Secret Sharing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

From secret to WIF private key and address

In this video we discuss how to get from the secret private key number (a.k.a. exponent) to the WIF and how to get from the public key to address formats. He's the code: https://gist.github.com/Nikolaj-K/d548a12a45599070ea89ff376803758b

From playlist Programming

Video thumbnail

Hidden Identities: Numbers you didn't know were there!

There are numbers hiding in your math problems! An alternative way to look at negative numbers, fractions, exponents, and algebra, using the ideas of identities and inverses. Credit to 3Blue1Brown for inspiring my explanation of numbers as actions with his video on Euler's formula and g

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Vigenere Cipher - Decryption (Known Key)

This video shows how to decrypt the ciphertext when the key is known. Decryption (unknown key): http://youtu.be/LaWp_Kq0cKs Encryption: http://youtu.be/izFivfLjD5E

From playlist Cryptography and Coding Theory

Video thumbnail

25c3: OnionCat -- A Tor-based Anonymous VPN

Speakers: Daniel Haslinger, Bernhard Fischer Building an anonymous Internet within the Internet OnionCat manages to build a complete IP transparent VPN based on Tor's hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which

From playlist 25C3: Nothing to hide

Video thumbnail

A bio-inspired bistable recurrent cell allows for long-lasting memory (Paper Explained)

Even though LSTMs and GRUs solve the vanishing and exploding gradient problems, they have trouble learning to remember things over very long time spans. Inspired from bistability, a property of biological neurons, this paper constructs a recurrent cell with an inherent memory property, wit

From playlist Papers Explained

Video thumbnail

Lecture 7/16 : Recurrent neural networks

Neural Networks for Machine Learning by Geoffrey Hinton [Coursera 2013] 7A Modeling sequences: A brief overview 7B Training RNNs with backpropagation 7C A toy example of training an RNN 7D Why it is difficult to train an RNN 7E Long term short term memory

From playlist Neural Networks for Machine Learning by Professor Geoffrey Hinton [Complete]

Video thumbnail

Conditional Random Fields : Data Science Concepts

My Patreon : https://www.patreon.com/user?u=49277905 Hidden Markov Model : https://www.youtube.com/watch?v=fX5bYmnHqqE Part of Speech Tagging : https://www.youtube.com/watch?v=fv6Z3ZrAWuU Viterbi Algorithm : https://www.youtube.com/watch?v=IqXdjdOgXPM 0:00 Recap HMM 4:07 Limitations of

From playlist Data Science Concepts

Video thumbnail

Johannes Schmidt-Hieber: Statistical theory for deep neural networks - lecture 2

Recorded during the meeting "Data Assimilation and Model Reduction in High Dimensional Problems" the July 23, 2021 by the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Luca Récanzone A kinetic description of a plasma in external and self-consistent fiel

From playlist Virtual Conference

Video thumbnail

Kaggle Reading Group: Neural Networks and Neural Language Models | Kaggle

Join Kaggle Data Scientist Rachael as she reads through an NLP paper! Today's paper is the chapter "Neural Networks and Neural Language Models" from "Speech and Language Processing" by Daniel Jurafsky & James H. Martin. This chapter is new to the currently-in-progress edition of the book,

From playlist Kaggle Reading Group | Kaggle

Video thumbnail

Restricted Boltzmann Machines: Stastical Physics and applications... by Simona Cocco

DISCUSSION MEETING : STATISTICAL PHYSICS OF MACHINE LEARNING ORGANIZERS : Chandan Dasgupta, Abhishek Dhar and Satya Majumdar DATE : 06 January 2020 to 10 January 2020 VENUE : Madhava Lecture Hall, ICTS Bangalore Machine learning techniques, especially “deep learning” using multilayer n

From playlist Statistical Physics of Machine Learning 2020

Video thumbnail

Lecture 15/16 : Modeling hierarchical structure with neural nets

Neural Networks for Machine Learning by Geoffrey Hinton [Coursera 2013] 15A From Principal Components Analysis to Autoencoders 15B Deep Autoencoders 15C Deep autoencoders for document retrieval and visualization 15D Semantic hashing 15E Learning binary codes for image retrieval 15F Shallo

From playlist Neural Networks for Machine Learning by Professor Geoffrey Hinton [Complete]

Video thumbnail

Lecture 7.1 — Modeling sequences: a brief overview [Neural Networks for Machine Learning]

For cool updates on AI research, follow me at https://twitter.com/iamvriad. Lecture from the course Neural Networks for Machine Learning, as taught by Geoffrey Hinton (University of Toronto) on Coursera in 2012. Link to the course (login required): https://class.coursera.org/neuralnets-

From playlist [Coursera] Neural Networks for Machine Learning — Geoffrey Hinton

Video thumbnail

The True Story of the Windows _NSAKEY

Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is the _NSAKEY a real backdoor in Microsoft Windows? A British researcher discovered that Microsoft was

From playlist Decrypted Lies

Video thumbnail

Lecture 7A : Modeling sequences: A brief overview

Neural Networks for Machine Learning by Geoffrey Hinton [Coursera 2013] Lecture 7A : Modeling sequences: A brief overview

From playlist Neural Networks for Machine Learning by Professor Geoffrey Hinton [Complete]

Related pages

Floating-point arithmetic