Похожие видео
array(10) {
[0]=>
object(stdClass)#5459 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Jo_ifPc1TnY"
["related_video_title"]=>
string(51) "Substitution Cipher in Python - Simple Cryptography"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(10) "NeuralNine"
}
[1]=>
object(stdClass)#5432 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-mS7K2K1IWk"
["related_video_title"]=>
string(49) "Unpacking Operators in Python: What are * and **?"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(10) "NeuralNine"
}
[2]=>
object(stdClass)#5457 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "JgxCY-tbWHA"
["related_video_title"]=>
string(36) "PLEASE Use These 5 Python Decorators"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(13) "Tech With Tim"
}
[3]=>
object(stdClass)#5464 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CRtZ-APJEKI"
["related_video_title"]=>
string(57) "Genetic Algorithms in Python - Evolution For Optimization"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(10) "NeuralNine"
}
[4]=>
object(stdClass)#5443 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NuyzuNBFWxQ"
["related_video_title"]=>
string(51) "7 Cryptography Concepts EVERY Developer Should Know"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(8) "Fireship"
}
[5]=>
object(stdClass)#5461 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "sgVosaLhPV0"
["related_video_title"]=>
string(35) "Computers Are Just Rocks Doing Math"
["posted_time"]=>
string(21) "5 дней назад"
["channelName"]=>
string(18) "The Science Asylum"
}
[6]=>
object(stdClass)#5456 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "OI7_e41eOy0"
["related_video_title"]=>
string(166) "✓ Веревку вокруг Земли удлинили на 1 см. Пройдёт ли человек? | Ботай со мной #092 | Борис Трушин"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(23) "Борис Трушин"
}
[7]=>
object(stdClass)#5466 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "R80cV8pryOM"
["related_video_title"]=>
string(46) "Парадокс изогнутой трубы"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(70) "GetAClass - Физика в опытах и экспериментах"
}
[8]=>
object(stdClass)#5442 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "C4ATDMIz5wc"
["related_video_title"]=>
string(36) "AES: How to Design Secure Encryption"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(13) "Spanning Tree"
}
[9]=>
object(stdClass)#5460 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "O4xNJsjtN6E"
["related_video_title"]=>
string(60) "AES Explained (Advanced Encryption Standard) - Computerphile"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(13) "Computerphile"
}
}
Substitution Cipher in Python - Simple Cryptography
Unpacking Operators in Python: What are * and **?
PLEASE Use These 5 Python Decorators
Genetic Algorithms in Python - Evolution For Optimization
7 Cryptography Concepts EVERY Developer Should Know
Computers Are Just Rocks Doing Math
✓ Веревку вокруг Земли удлинили на 1 см. Пройдёт ли человек? | Ботай со мной #092 | Борис Трушин
Парадокс изогнутой трубы
AES: How to Design Secure Encryption
AES Explained (Advanced Encryption Standard) - Computerphile