The gravestone of Thomas Brierley (1785 – 1854 or -55) in Mellor, Greater Manchester, is one of the only ones in the United Kingdom known to incorporate masonic pigpen cypher in its inscription. Another is the gravestone of John Jennings within the St Peter and All Hallows Churchyard, West Huntspill. Still, another is the chest tomb of the Astles family, at St Laurence's Church, Frodsham, Cheshire. (See https://www.mysticmasque.com/history-mystery/masonic-cipher-grave-frodsham-church-cheshire). (Wikipedia).
C44 Example problem solving a Cauchy Euler equation
Getting more example problems done! Solving Cauchy-Euler equations is easy and fun.
From playlist Differential Equations
C43 Example problem solving a Cauchy Euler equation
Another Cauchy-Euler equation example problem solved.
From playlist Differential Equations
Primality (1 of 2: Fermat's Test)
From playlist Cryptography
This is one of my all-time favorite differential equation videos!!! :D Here I'm actually using the Wronskian to actually find a nontrivial solution to a second-order differential equation. This is amazing because it brings the concept of the Wronskian back to life! And as they say, you won
From playlist Differential equations
I continue the look at higher-order, linear, ordinary differential equations. This time, though, they have variable coefficients and of a very special kind.
From playlist Differential Equations
C47 Example problem solving a Cauchy Euler equation
The last problem solved in this section, before we move on to another technique for linear differential equations.
From playlist Differential Equations
OWASP AppSec EU 2013: Recipes for enabling HTTPS
For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Nelis Boucké | Thomas Herlea | Johan Peeters Securely enabling HTTPS turns out to be tricky and time consuming. There is the considerable acc
From playlist OWASP AppSec EU 2013
Strata 2012: Jonathan Gluck, "Winner of the Second Heritage Health Progress Prize"
Strata 2012: Jonathan Gluck, "Winner of the Second Heritage Health Progress Prize"
From playlist Strata SC 2012
C45 Example problem solving a Cauchy Euler equation
Solving problems is the ONLY way get to learn these techniques. Another Cauchy-Euler equation solved.
From playlist Differential Equations
Wales and Forgotten History: A History Guy Travelogue
The History Guy explores Wales in a special series originally created for The History Guy patrons on Patreon. If you would like exclusive content and interaction with The History Guy, consider becoming a patron at https://www.patreon.com/TheHistoryGuy This is original content based on res
From playlist Great Britain
25c3: Messing Around with Garage Doors
Speakers: Timo Kasper, Thomas Eisenbarth Breaking Remote Keyless Entry Systems with Power Analysis We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system. KeeLoq rem
From playlist 25C3: Nothing to hide
C37 Example problem solving a Cauchy Euler equation
Example problem solving a homogeneous Cauchy-Euler equation.
From playlist Differential Equations
Solving the Bernoulli Differential Equation x^2(dy/dx) + y^2 = xy
Please Subscribe here, thank you!!! https://goo.gl/JQ8Nys How to solve a Bernoulli Differential Equation
From playlist Differential Equations
DEFCON 20: Into the Droid: Gaining Access to Android User Data
Speaker: THOMAS CANNON DIRECTOR OF RESEARCH AND DEVELOPMENT, VIAFORENSICS This talk details a selection of techniques for getting the data out of an Android device in order to perform forensic analysis. It covers cracking lockscreen passwords, creating custom forensic ramdisks, bypassing
From playlist DEFCON 20
MATH3411 Information, Codes and Ciphers This easy problem encodes an 8-character message using the 9-character 8-bit even parity ASCII code. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Australia
From playlist MATH3411 Information, Codes and Ciphers
MATH3411 Information, Codes and Ciphers This problem decodes, corrects, and decodes using the binary (7,4) Hamming code. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Australia
From playlist MATH3411 Information, Codes and Ciphers
Francis Walsingham - Elizabethan Spymaster - Extra History
With pop culture staples like James Bond & Fletchly Park, there's a strong association of England and spies. But the tradition and association is older and deeper than we might expect. Enter Francis Walsingham, spy master for Queen Elizabeth I and he is determined to get rid of her enemy,
From playlist Extra History (ALL EPISODES)
MATH3411 Information, Codes and Ciphers This problem asks us to prove that the minimal weight w(C) and the minimal distance d(C) of a linear code are equal, and that they are also equal to the minimal size of a set of linearly dependent columns of any parity check matrix H for C. Present
From playlist MATH3411 Information, Codes and Ciphers
MATH3411 Information, Codes and Ciphers In this problem, we are asked to construct the Huffman codes for a Markov source and use them to encode a message. We see that this gives nice compression. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Au
From playlist MATH3411 Information, Codes and Ciphers
Moving on from Lagrange's equation, I show you how to derive Hamilton's equation.
From playlist Physics ONE