- Видео 74
- Просмотров 227 086
ByteQuest
Индия
Добавлен 1 июл 2023
Here you will see animated videos about computer science topics like Algorithms, Security, Data structures and others.
Sometimes also about Maths and Puzzles.
Sometimes also about Maths and Puzzles.
Data Structures And Algorithms Visually Explained | Full Course In 4 Hours
This video offers a comprehensive collection of animated lessons on Data Structures and Algorithms, presented in a unique and intuitive way that makes the concepts easier to grasp compared to traditional blackboard-style teaching. Most of the data structures in the video are implemented in Python, and the animations are also created using Python.
The video on arrays features my own human voice, while the rest of the videos use TTS (Text-to-Speech) models for better clarity.
GitHub link for both:- github.com/ByteQuest0
Do connect on GitHub.
All the individual vidoes is in this playlist:-ruclips.net/p/PLVHz9YUo4rRdHQuCINOa1NXRfRduBzSNF
Tools used to make this video:- Adobe Premier Pro for video...
The video on arrays features my own human voice, while the rest of the videos use TTS (Text-to-Speech) models for better clarity.
GitHub link for both:- github.com/ByteQuest0
Do connect on GitHub.
All the individual vidoes is in this playlist:-ruclips.net/p/PLVHz9YUo4rRdHQuCINOa1NXRfRduBzSNF
Tools used to make this video:- Adobe Premier Pro for video...
Просмотров: 2 560
Видео
Hash Tables Visually Explained
Просмотров 27012 часов назад
In this video the hash table data structure has been explained visually using animation. first the basic idea of hash table is explaned, and then how insertion works? what is a collion? followed by how collisions are handelled. first method of collision handeling shown is called chaining, in which the insertion and deletion has been explained. Then in the other techniques such as Double hashing...
Kruskal's Algorithm | Disjoint Sets | Union By Rank | Path Compression
Просмотров 225День назад
In this video, I have explain How Kruskal's Algorithm Of Finding The minimum spanning tree of a graph works, i have explained how the algorithm works, then I've explained how Cycle detection works using Disjoint sets, where i have discuss the Union By rank method along with path compression, then the time and space complexitites of it followed by the python implementation. GitHub link for the c...
Prim's Algorithm Visually Explained | Minimum Spanning Tree
Просмотров 16214 дней назад
This video contains a visual demonstration of Prim's algorithm and the code. this algorithm is used to find the minimum spanning tree of a graph. tools used:- Manim for animations, premier pro for video editing and chatGPT TTS.
Floyd-Warshall Algorithm Explained
Просмотров 71621 день назад
in this video, the Floyd-Warshall Algorithm for finding the shortest path between any pair of nodes in a graph has been explained visually. Here we use the adjacency matrix of the graph and update it iteratively by checking a shorter path via Each node and if a shorter path is found we update the matrices. We repeat this for all the nodes. Bellman-Ford Algorithm:- ruclips.net/video/B5PmlJACZ9Y/...
Bellman Ford Shortest Path Algorithm
Просмотров 1,5 тыс.Месяц назад
In this video, Bellman-Ford Algorithm Algorithm for finding the shortest path from one one node to all the other nodes has been explain. first, it creates a table where all the nodes are stored as well as the cost of the shortest path to reach that node as well as their previous element in the order. The Algorithm starts by initializing the distances to all nodes as infinity, except for the sta...
25 CyberSecurity Terms You Should Know
Просмотров 720Месяц назад
This video uses animations and graphics to provide quick and brief descriptions of 25 cybersecurity terms that everyone should know without much technical detail. tools used to make this video: Manim animation library (by 3B1B), Adobe Premier Pro, and AI-generated images. keyframes:- 0:00 - 0:34 End-to-End Encryption 0:35 - 1:03 Symmetric Encryption 1:04 - 1:49 Asymmetric Encryption 1:50 - 2:40...
Dijkstra's Shortest Path Algorithm
Просмотров 342Месяц назад
In this video, Dijkstra's Algorithm for finding the shortest path from one one node to all the other nodes has been explain. first, it creates a table where all the nodes are stored as well as the cost of the shortest path to reach that node as well as their previous element in the order. it then starts from the starting node and iteratively starts going to each node based on the ordering of th...
Heaps Explained (Priority Queues)
Просмотров 4632 месяца назад
in this video, I have explained how the Heap Data structure works using a visual representation of Max Heap. I have included the insertion, deletion, and building heap from array operation along with their Python implementation code. also at the last, I've explained How this is used to build priority queues. The Voice in the video is not mine, it is generated using an online TTS tool so sometim...
BFS Visually Explained (Graphs)
Просмотров 2402 месяца назад
this video contains a visual animated explanation of the BFS or Breadth-First-Search Algorithm in Graphs. the video also contains the implementation in Python. GitHub Link:- github.com/ByteQuest0/Implemention_codes/blob/main/Graph/bfs.py This channel also has similar animated algorithms and data structure videos that you might find useful:- Knuth-Morris-Pratt Algorithm:- ruclips.net/video/q4_90...
DFS Visually Explained (Graphs)
Просмотров 3512 месяца назад
This video contains the DFS Algorithm Visual Explanation using Animation. both recursive and iterative versions of the Algorithm have been explained along with the Python code. 0:00 - 3:40 Recursive Approach 3:41 - 7:40 Iterative Approach GitHub Code Link:-github.com/ByteQuest0/Implemention_codes/blob/main/Graph/dfs.py Tools Used: Manim Python Library. Music Used:- Sovereign by Kevin MacLeod | ...
Introduction To Graphs
Просмотров 2032 месяца назад
0:00 - 4:10 Intro 4:11- 8:12 Adjacency Matrix 8:12- 12:00 Adjacency Lists Tools Used:- Manim (open-source animation Library), Python, Premier Pro. Music used:- Sovereign by Kevin MacLeod | incompetech.com/ Music promoted by www.chosic.com/free-music/all/ Creative Commons CC BY 3.0 creativecommons.org/licenses/by/3.0/
Knuth-Morris-Pratt Algorithm
Просмотров 2,1 тыс.2 месяца назад
Knuth Morris Pratt Algorithm Visually Explained This video contains a visual explanation of the KMP pattern-matching algorithm. GitHub link for the Python code for this:- github.com/ByteQuest0/Implemention_codes/blob/main/String Matching/KMP.py Related Videos:- Red Black Tree Visually Explained:-ruclips.net/video/TlfQOdeFy0Y/видео.html Sorting Algorithms:- ruclips.net/video/5d1pyghLs3M/видео.ht...
Red-Black Trees Visually Explained
Просмотров 8392 месяца назад
This video contains a visual animated explanation of Red-Black Trees, created using Manim, along with the Python code implementation to give you a comprehensive understanding. First, we'll start by walking through the basic structure and properties of a Red-Black Tree, illustrating how the tree maintains balance through the unique color rules and rotations. After that, we'll dive into the speci...
5 Sorting Algorithms Every Programmer Should Know
Просмотров 4403 месяца назад
5 Sorting Algorithms Every Programmer Should Know
Binary Search Tree Visually Explained
Просмотров 2054 месяца назад
Binary Search Tree Visually Explained
Complexity Analysis and The Big O Notation
Просмотров 1276 месяцев назад
Complexity Analysis and The Big O Notation
Knuth-Morris-Pratt Algorithm Visually Explained
Просмотров 12 тыс.11 месяцев назад
Knuth-Morris-Pratt Algorithm Visually Explained
Rabin-Karp Algorithm Visually Explained
Просмотров 1,2 тыс.11 месяцев назад
Rabin-Karp Algorithm Visually Explained
Thanks a lort bro it more helpfull
Great content! Great animations!
Can you please explain how you came to the bruteforce time complexity of O((n - m + 1) * m / 2) specifically the m / 2 part. I understand the n - m + 1 part since we are not looping the full string. I am not able to understand the m / 2 part. Unless we are doing some optimisation to reduce the pattern searching by half which is not possible/ we are not doing in bruteforce. You have mentioned: On average, it compares m / 2 characters which I don't think is the case or even if it is the case, we don't give time complexity considering average cases or best cases. We give it according to worst cases. So at the end, the time complexity would come to O((n - m + 1) * m) which we can say as O(n * m).
The pattern will go over the text n - m + 1 times, In each iteration, while matching the corresponding letters, if any letter didn't match we break the inner loop without checking further letters.... So sometimes the matching runs nearly as long as the pattern length and sometimes it breaks earlier... So we conclude that half the letters are matching on an average.
Bro u should have so much more Subs. Keep on buddy!!!!!!!!
The individual videos are also available on the channel, you can checkout. This video is just an ordered merged video.
DSA playlist should have all these subsections as individual videos in the right order. Just a suggestion.
It is already there, i just merged all this in one video for Algorithm to catch.
Okay yes. The Videos seem to be in reverse order, may be my youtube settings are wrong.
They're little outta order.
okay np.
This is god-sent. Thank you very much for your hard work.
Thanks for such kind words. Stay connected, more high quality contents are under production.
Great video great work brother🫡🫡🔥🔥🔥 subbed 🙌
underrated
Thank you sooooooo much!!! Self explanatory now😊
Happy to help!
useful content thanks btw brother!
Glad to help out!
GREAT
thank you
Sweet, can you make an intro to python series ?
This is a good idea, maybe a 30 minute video covering the following:- Starting from data types, variables, etc... Basic arithmetic, conditions, Loops... Error Handling.... Functions.... Recursion... OOP and others....... Will work on it next....thanks..
@ yesssss!!! Exactly!!!
Thanks 👍🏼
Underrated channel. High quality video. Starting was a little abrupt but the explanation in the video is so detailed. Absolutely love it.
Thanks for the feedback!
Nice video 👍
thanks
You're welcome!
AWESOME!!
Awesome!!
what is the shortest path from A to D ?
A -> F -> B -> E -> C -> G -> D
I have a doubt. For example, A is the sender, B is the receiver, and C is a hacker. A encrypts the text (e.g., "I am Ashwin") using B's public key. Is there a chance that C (the hacker) could modify the text (e.g., to "I am Vinoth") using the same public key of B? If so, when B decrypts the message using B's private key, they would get the text "I am Vinoth" instead of "I am Ashwin." In this case, C (the hacker) cannot see the original message sent by A but has modified the message that was sent by A.
C can intercept and replace the original message by encrypting a new message (e.g., "I am Vinoth") using B's public key. However, C cannot read the original message sent by A or impersonate A authentically without A's private key. To prevent such attacks, A can use a digital signature to sign the message before encrypting it. This ensures that B can verify the message's authenticity and detect any tampering. Secure protocols like TLS/SSL can also protect the communication from interception. C cannot directly modify the message that has been encrypted by A. It would lead to dara corruption.
very good video, just a slight mistake that I wanna point, there is no need for the final incrementing of i , you already increment i and j if s[i] == p[j], but you increment i again in the else branch at the end, but great work this was very beneficial
You're right, the final increment is redundant. Thanks for catching that!
Where's the register?
Registers lie close to ALU, this isn't a detailed video so didn't include.
wellexplained
Nicely explained 👏🏼👏🏼, Can you provide the manim code for same?
github.com/ByteQuest0/Animation_codes/blob/main/manimGl%2FPrim.py It's manimgl code, so you might need to configure certain things in your environment.
Just found you videos while studiying CS Networks course and they're being very useful! Thank you for putting out this content in such a well explained way!!
Great to hear!
Great work ..Kudo to the efforts it would be more helpful if the video was short ,,,,Keep conitnuing the work and keep helping the community
Difficult to cover in short videos
Best explanation 😊
Nice explanation
Nice video.. Easy to understand the concept.
Great explanation. Easily understandable.
ok now how tf do i make one...
Read books, learn OS, networking, security, and code it....
Thank you, finally understood it.
underrated
This is the clearest explanation of KMP! I finally understood it!
That's why they say that C.P.U is the brain of the computer, yeeaahhh!!!
Great demonstration, you need a lot of subscribers! Wish you the best!
Greate efforts man 🔥
Very good excellent explanation
Bogo sort deserves respect for who he is.
Great job! No music, no disturbance, just professional explanation!
You can Try this new updated video with better visuals:- ruclips.net/video/q4_90fOoS-s/видео.html
Great work...need more from you on 'Cybersecurity '
Noted
Man9
Lifesaver ❤
thanks