Dynamical systems

Injection locking

Injection locking and injection pulling are the frequency effects that can occur when a harmonic oscillator is disturbed by a second oscillator operating at a nearby frequency. When the coupling is strong enough and the frequencies near enough, the second oscillator can capture the first oscillator, causing it to have essentially identical frequency as the second. This is injection locking. When the second oscillator merely disturbs the first but does not capture it, the effect is called injection pulling. Injection locking and pulling effects are observed in numerous types of physical systems, however the terms are most often associated with electronic oscillators or laser resonators. Injection locking has been used in beneficial and clever ways in the design of early television sets and oscilloscopes, allowing the equipment to be synchronized to external signals at a relatively low cost. Injection locking has also been used in high performance frequency doubling circuits. However, injection locking and pulling, when unintended, can degrade the performance of phase-locked loops and RF integrated circuits.(For other definitions of "entrainment," see Entrainment (disambiguation).) (Wikipedia).

Injection locking
Video thumbnail

Combination Locks - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Make A Combination Lock - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

How to Lock and Protect Individual Cells in Excel + Bonus Tips for Quick Setup

Sign up for our Excel webinar, times added weekly: https://www.excelcampus.com/blueprint-registration/ In this video I explain how to lock & protect individual cells or ranges for editing. This is useful when you only want users to be able to edit specific cells and protect other cells t

From playlist Excel Formulas

Video thumbnail

How plunger pump works (Must Watch). ✔

More details visit: http://www.techtrixinfo.com/ Working of a Plunger Pump, it is a type of Reciprocating pump. This is a reciprocating type of pump. Was used in automobiles as lubrication pumps in the earlier days, now it's obsolesce. Main components if a Plunger pump are: Plunger.

From playlist Hydraulics and related stuff.

Video thumbnail

Samsung Galaxy S5 customization - set up lock screen

In this video we teach you how to set up the Samsung Galaxy S5 lock screen to provide some security for your phone.

From playlist Technology

Video thumbnail

Integration 8 The Substitution Rule for Integration Part 1

An explanation of the reverse of the chain rule in integration.

From playlist Integration

Video thumbnail

How to change door locks

Demonstrated using the Yale Knob Lockset.

From playlist Everyday How-to

Video thumbnail

Cable drive 23

A liquid pumpjack. The 4-bar mechanism converts continuous rotation to reciprocating rotation that the cable drive converts to reciprocating translation of a pump piston. The ball valves open and close automatically due to fluid pressure alteration in the space under the piston. When the

From playlist Mechanisms

Video thumbnail

Geneva Wheel for Precise Indexing

A modified type of Geneva wheel that was developed to obtain precise intermittent indexing movements. This special mechanism was designed to eliminate any backlash or over-running action of the driven member at the end or beginning of each indexing movement. It uses a double locking, with

From playlist Geneva Mechanisms

Video thumbnail

Contain Yourself: Building Secure Containers for Mobile Devices - Ron Gutierrez

Contain Yourself: Building Secure Containers for Mobile Devices - Ron Gutierrez In today's world, everyone wants access to information from his or her personal mobile device. As a business, this includes your customers and/or employees. What if the information they want access to is hig

From playlist AppSecUSA 2013

Video thumbnail

DeepSec 2007: Browser Hijacking

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Daniel Fabian, SEC Consult Current XSS attacks make use of the document object model to steal session credentials from unsuspecting users, allowing the attacker to impers

From playlist DeepSec 2007

Video thumbnail

HAR 2009: The ZeuS evolution 3/6

Clip 3 Speaker: Clemens Kurtenbach A malware case study.. The talk is intended to give an insight view of todays malware - major players, behavior and institutions involved. The focus will be on one of the main malware family we face today: Zeus / Zbot / Wsnpoem. For more inform

From playlist Hacking at Random (HAR) 2009

Video thumbnail

25c3: Hacking the iPhone

Speakers: MuscleNerd, pytey, planetbeing Apple's iPhone has made a tremendous impact on the smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing

From playlist 25C3: Nothing to hide

Video thumbnail

Unpacking Princess Locker and Fixing Corrupted PE Header (OALabs x MalwareAnalysisForHedgehogs)

Open Analysis Live teams up with MalwareAnalysisForHedgehogs to unpack Princess Locker ransomware. We show how to use x64dbg and hooks on VirtualAlloc to dump the unpacked payload then fix the corrupted PE header... ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https:

From playlist Open Analysis Live!

Video thumbnail

25c3: Banking Malware 101

Speaker: Thorsten Holz Overview of Current Keylogger Threats In the recent years, we observed a growing sophistication how credentials are stolen from compromised machines: the attackers use sophisticated keyloggers to control the victim's machine and use different techniques to steal th

From playlist 25C3: Nothing to hide

Video thumbnail

GRCon20 - Security Analysis of Zigbee Networks with Zigator and GNU Radio

Presented by Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber and Patrick Tague at GNU Radio Conference 2020 https://gnuradio.org/grcon20 Zigbee is a wireless communication protocol that is based on the IEEE 802.15.4 standard and is commonly used in smart homes. Numer

From playlist GRCon 2020

Video thumbnail

Source Boston 2010: Managed Code Rootkits: Hooking into Runtime Environments 3/6

Clip 3/6 Speaker: Erez Metula This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic

From playlist SOURCE Boston 2010

Video thumbnail

Black Hat USA 2010: Hacking Oracle From Web Apps 3/5

Speaker: Sumit Siddharth This talk will focus on exploiting SQL injections in web applications with oracle back-end and will discuss all old/new techniques. The talk will target Oracle 9i,10g and 11g (R1 and R2) It is widely considered that the impact of SQL Injection in web apps with Ora

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Unpacking and Extracting TrickBot Malware Configuration With x64dbg and Python

Open Analysis Live! We unpack TrickBot and extract it's configuration file using x64dbg and a Python script from the KevinTheHermit project. Expand for more... ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs OALABS TIP JAR https://ko-fi.c

From playlist Open Analysis Live!

Video thumbnail

Hydraulic cylinder with fixed piston

Green cylinder with machine table reciprocates. Pressure fluid is conducted into cylinder via holes on fixed piston rod. The hoses can be stationary. In case using holes on the cylinder the hoses have to move with the cylinder. The arrows show flows of pressure fluid.

From playlist Mechanisms

Related pages

Synchronization of chaos | Negative feedback | Christiaan Huygens | Sympathetic resonance | Chaos theory | Resonance | Phase-locked loop range | Phase noise | LC circuit | Harmonic oscillator