Trees (graph theory)

Pfafstetter Coding System

The Pfafstetter Coding System is a hierarchical method of hydrologically coding river basins. It was developed by the Brazilian engineer in 1989. It is designed such that topological information is embedded in the code, which makes it easy to determine whether an event in one river basin will affect another by direct examination of their codes. (Wikipedia).

Pfafstetter Coding System
Video thumbnail

107 Differential Equations

Setting up and solving ordinary differential equations with constant coefficients.

From playlist Introduction to Pyhton for mathematical programming

Video thumbnail

Some Prerequisit Analysis on the Pochhammer Symbol

Help me create more free content! =) https://www.patreon.com/mathable Merch :v - https://teespring.com/de/stores/papaflammy https://www.amazon.com/shop/flammablemaths https://shop.spreadshirt.de/papaflammy Main video: https://youtu.be/Z9FpJcHqURs Toda

From playlist Number Theory

Video thumbnail

108 Matrices

Various manipulations of matrices including teh caclulation of eigenvalues and eigenvectors.

From playlist Introduction to Pyhton for mathematical programming

Video thumbnail

102 Printing mathematical symbols in Sympy

How to output your mathematical code using an in built Sympy printer.

From playlist Introduction to Pyhton for mathematical programming

Video thumbnail

106 Solving for x

Using Sympy to solve algebraic expressions and equations.

From playlist Introduction to Pyhton for mathematical programming

Video thumbnail

Game Development in Python 3 With PyGame - 14 - Button Function

See http://pythonprogramming.net for sample code PyGame with Python 3 Playlist: http://www.youtube.com/playlist?list=PLQVvvaa0QuDdLkP8MrOXLe_rKuf6r80KO In this PyGame with Python 3 programming tutorial, we cover how we can turn the button creation in PyGame code into a function that we c

From playlist PyGame with Python 3 Game Development

Video thumbnail

Let’s Get To Know The Pythagorean Theorem….Step-by-Step….

TabletClass Math: https://tcmathacademy.com/ Math help with the Pythagorean Theorem. For more math help to include math lessons, practice problems and math tutorials check out my full math help program at https://tcmathacademy.com/ Math Notes: Pre-Algebra Notes: https://tabletclass

From playlist GED Prep Videos

Video thumbnail

Converse Pythagorean Theorem & Pythagorean Triples

I explain the Converse Pythagorean Theorem and what Pythagorean Triples are. Find free review test, useful notes and more at http://www.mathplane.com If you'd like to make a donation to support my efforts look for the "Tip the Teacher" button on my channel's homepage www.YouTube.com/Profro

From playlist Geometry

Video thumbnail

Using are pythagorean identites to simplify an expression

👉 Learn how to simplify identities by factoring. Just like in normal algebraic expressions, trigonometric identities can be simplified by factoring out the GCFs from the terms of the identities, then common trigonometric identities like the quotient, reciprocal, even, odd, co-function, and

From playlist Simplify Trigonometric Identities

Video thumbnail

27c3: I Control Your Code (en)

Speaker: Mathias Payer Attack Vectors Through the Eyes of Software-based Fault Isolation Unsafe languages and an arms race for new bugs calls for an additional line of defense in software systems. User-space virtualization uses dynamic instrumentation to detect different attack vectors a

From playlist 27C3: We come in peace

Video thumbnail

Building maintainable software for sustainable business growth: 8 best practices

Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on Twitter: http://twitter.com/oreilly Facebook: http://facebook.com/OReilly Google: http://plus.google.com/+oreillymedia

From playlist O'Reilly Webcasts 3

Video thumbnail

Firmware Security: Why It Matters and How You Can Have It

A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway

From playlist Security

Video thumbnail

DevOps Interview Questions | DevOps Interview Questions & Answers - 2023 | DevOps Tutorial | Edureka

🔥𝐄𝐝𝐮𝐫𝐞𝐤𝐚'𝐬 𝐃𝐞𝐯𝐎𝐩𝐬 𝐭𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 (Use code "𝐘𝐎𝐔𝐓𝐔𝐁𝐄𝟐𝟎"): https://www.edureka.co/devops-certification-training This Edureka DevOps Interview Questions and Answers video ( DevOps Interview Blog : https://www.edureka.co/blog/interview-questions/top-devops-interview-questions/ ) will help y

From playlist DevOps Training Videos

Video thumbnail

23C3: Inside VMware

Speaker: Michael Steil How VMware, VirtualPC and Parallels actually work Virtualization is rocket science. In cooperation with the host operating system, VMware takes over complete control of the machine hundreds of times a second, handles pagetables completely manually, and may chose t

From playlist 23C3: Who can you trust

Video thumbnail

CERIAS Security: An Alternate Memory Architecture for Code Injection Prevention 3/4

Clip 3/4 Speaker: Ryan Riley · Purdue University ode injection attacks, in their various forms, have been in existence and been an area of consistent research for a number of years. A code injection attack is a method whereby an attacker inserts malicious code into a running computing sy

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Pythagorean Theorem

This geometry video tutorial provides a basic introduction into the pythagorean theorem. It explains how to use it to find missing sides and solve for x. In addition, it provides examples of solving word problems using pythagorean theorem for shapes such as right triangles, squares, rhom

From playlist Geometry Video Playlist

Video thumbnail

DEFCON 15: Hacking the Extensible Firmware Interface

Speaker: John Heasman NGSSoftware "Macs use an ultra-modern industry standard technology called EFI to handle booting. Sadly, Windows XP, and even Vista, are stuck in the 1980s with old-fashioned BIOS. But with Boot Camp, the Mac can operate smoothly in both centuries." - Quote taken fro

From playlist DEFCON 15

Related pages

Strahler number