
ECS235A, Lecture 10, October 12, 2022


Simultaneous Localization and Mapping (SLAM) is an algorithm that allows autonomous vehicles to sense and obtain realtime measurements of the surrounding area and analyze these measurements to…


The autonomous RC car presented within the video was collaboratively configured by Joel Montano, Ryan McKenna, and Joshua Nelson. The car was programmed to lane follow, utilizing blob detection on…


A summarization of the workings of our groups' autonomous lanefollowing robotic car, with the additional feature of being cross compatible between manual and selfdriving mode.


YiChun Ling Abstract: We demonstrate a 3D fanin/fanout device for multicore fiber (MCF) integration with a SMF28 fiber array by using ultrafast laser inscription (ULI). An automatic waveguide…


Lecture of 20220308. Example of graphs. Informal description of isomorphism. Formal definition of isomorphic graphs. Status of deciding GRAPH ISOMORPHISM and of proving that two graphs are…






Lecture 20220222. Three statements of the pigeonhole principle (PHP) and quite a few examples of its use. Reviewing some number theory. The Division Theorem. Euclid's algorithm. Finding…


Lecture 20220217. Using the Fundamental Theorem of Arithmetic to answer questions like how many divisors a number has. Karatsuba multiplication. Writing and solving recurrence relations. Binary…


Lecture 20220215. A proof by strong induction: the Fundamental Theorem of Arithmetic. Induction on a definition: boolean formulas have the same number of left and right parentheses. Recursion as a…




This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.


from Veritasiumhttps://www.youtube.com/watch?v=g_IaVepNDT4


Paper: Nyberg, Daniel. (2011). Analysis of Two Common Hidden Surface Removal Algorithms, Painter’s Algorithm & ZBuffering.Kandidatexjobb CSC ; K11061.


ECS 153 Spring 2021. Computer Security. This covers authentication with a brief overview of rainbow tables and begins access control mechanisms. The video begins at 5:13 from the beginning.
