Critical phenomena | Graph theory | Cellular automata

The Mathematics of Chip-Firing

The Mathematics of Chip-Firing is a textbook in mathematics on chip-firing games and abelian sandpile models. It was written by Caroline Klivans, and published in 2018 by the CRC Press. (Wikipedia).

The Mathematics of Chip-Firing
Video thumbnail

A06 The equations of motion

A mathematics bonus. In this lecture I remind you of a way to calculate the cross product of two vector using the determinant of a matrix along the first row of unit vectors.

From playlist Physics ONE

Video thumbnail

Electrical Engineering: Ch 19: Fourier Transform (2 of 45) What is a Fourier Transform? Math Def

Visit http://ilectureonline.com for more math and science lectures! In this video I will explain the mathematical definition and equation of a Fourier transform. Next video in this series can be seen at: https://youtu.be/yl6RtWp7y4k

From playlist ELECTRICAL ENGINEERING 18: THE FOURIER TRANSFORM

Video thumbnail

Numbers as bits (1 of 2)

How we represent numbers in computers. Part of a larger series teaching programming. Visit codeschool.org Twitter: @brianwill

From playlist Numbers as bits

Video thumbnail

Double Precision | Lecture 2 | Numerical Methods for Engineers

A description of the IEEE standard for a double precision number in MATLAB. Join me on Coursera: https://www.coursera.org/learn/numerical-methods-engineers Lecture notes at http://www.math.ust.hk/~machas/numerical-methods-for-engineers.pdf Subscribe to my channel: http://www.youtube.co

From playlist Numerical Methods for Engineers

Video thumbnail

Binary Numbers | Lecture 1 | Numerical Methods for Engineers

What are binary numbers? Why are some numbers inexact when represented on a computer? Join me on Coursera: https://www.coursera.org/learn/numerical-methods-engineers Lecture notes at http://www.math.ust.hk/~machas/numerical-methods-for-engineers.pdf Subscribe to my channel: http://www.y

From playlist Numerical Methods for Engineers

Video thumbnail

Math tutorial for solving logarithmic equation using inverse operations

👉 Learn how to solve logarithmic equations. Logarithmic equations are equations with logarithms in them. To solve a logarithmic equation, we first isolate the logarithm part of the equation. After we have isolated the logarithm part of the equation, we then get rid of the logarithm. This i

From playlist Solve Logarithmic Equations

Video thumbnail

The Rotor-Routing Sandpile Torsor: A Case Study into Research Mathematics

I wanted to share my area of research with a wide variety of math enthusiasts! Learn about chip-firing, sandpile groups, and the matrix-tree theorem in our quest to find a sandpile torsor! This is also my submission to the Summer of Math Exposition. Thanks Grant Sanderson for putting the e

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

Math tutorial for solving a multi step logarithmic equation

👉 Learn how to solve logarithmic equations. Logarithmic equations are equations with logarithms in them. To solve a logarithmic equation, we first isolate the logarithm part of the equation. After we have isolated the logarithm part of the equation, we then get rid of the logarithm. This i

From playlist Solve Logarithmic Equations

Video thumbnail

Clock Mind Reader

You will move around the clock face at random, and I will still be able to read your mind to tell you the number on which you have landed. It's simple to work out.

From playlist My Maths Videos

Video thumbnail

Halting problems for sandpiles and abelian networks - Lionel Levine

Computer Science/Discrete Mathematics Seminar II Topic: Halting problems for sandpiles and abelian networks Speaker: Lionel Levine Affiliation: Cornell University; von Neumann Fellow Date: March 12, 2019 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Abelian networks and sandpile models (Lecture 3) by Lionel Levine

PROGRAM :UNIVERSALITY IN RANDOM STRUCTURES: INTERFACES, MATRICES, SANDPILES ORGANIZERS :Arvind Ayyer, Riddhipratim Basu and Manjunath Krishnapur DATE & TIME :14 January 2019 to 08 February 2019 VENUE :Madhava Lecture Hall, ICTS, Bangalore The primary focus of this prog

From playlist Universality in random structures: Interfaces, Matrices, Sandpiles - 2019

Video thumbnail

IMS Public Lecture: Visual Mathematics

Yuval Peres, Microsoft Research, USA

From playlist Public Lectures

Video thumbnail

Artificial Intelligence, the History and Future - with Chris Bishop

Chris Bishop discusses the progress and opportunities of artificial intelligence research. Subscribe for weekly science videos: http://bit.ly/RiSubscRibe The last five years have witnessed a dramatic resurgence of excitement in the goal of creating intelligent machines. Technology compani

From playlist Ri Talks

Video thumbnail

Valérie Berthé: Dimension groups and recurrence for tree subshifts

Abstract: Dimension groups are invariants of orbital equivalence. We show in this lecture how to compute the dimension group of tree subshifts. Tree subshifts are defined in terms of extension graphs that describe the left and right extensions of factors of their languages: the extension g

From playlist Mathematical Aspects of Computer Science

Video thumbnail

Krishna Shenoy: How brain-computer connections could end paralysis

Read more: https://stanford.io/3wXEAau By listening into the chatter among a handful of brain cells, an expert in brain-computer interfaces says a future in which people with paralysis control computers with their thoughts is within reach. Whether by injury or disease, paralysis has affl

From playlist The Future of Everything

Video thumbnail

25c3: Analyzing RFID Security

Speakers: Henryk Plötz. Karsten Nohl Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID

From playlist 25C3: Nothing to hide

Video thumbnail

29C3: Milking the Digital Cash Cow (EN)

Speaker: Timo Kasper Extracting Secret Keys of Contactless Smartcards Contactless smartcards have become widespread for applications such as ticketing, access control, identification and payments. Side-channel analysis (SCA) is a powerful type of passive implementation attack that enable

From playlist 29C3: Not my department

Video thumbnail

DEFCON 16: Inducing Momentary Faults Within Secure Smartcards / Microcontrollers

Speaker: Christopher Tarnovsky, Flylogic Engineering, LLC This presentation is intended for individuals with an understanding of the Intel 8051 and Motorola 6805 processor families from an Assembly language perspective. This will be an interactive presentation with the audience. Log file

From playlist DEFCON 16

Video thumbnail

4 Motion part 2

In this second part on Motion, we take a look at calculating the velocity and position vectors when given the acceleration vector and initial values for velocity and position. It involves as you might imagine some integration. Just remember that when calculating the indefinite integral o

From playlist Life Science Math: Vectors

Related pages

Spanning tree | Chip-firing game | M-matrix | Identity element | Abstract simplicial complex | Commutative algebra | Laplacian matrix | Root system | Algebraic graph theory | Representation theory | Vertex (graph theory) | Algebraic geometry | Riemann–Roch theorem | Divisor (algebraic geometry) | Random graph | Abelian sandpile model | Cellular automaton | Algebraic combinatorics | Abelian group