Discover how hamming & LDPC codes allow 5G communication networks to recover from errors and lost data using randomly-assigned parity check sets - see how messages can magically fix themselves.
🕒 Topics Covered:
[00:00] The Problem: Data Corruption & Errors
[01:15] Repetition Codes: The Simple Solution
[02:45] Single Parity Check: A Smarter Approach
[04:10] Hamming's Breakthrough: Overlapping Sets
[06:30] The Challenge with Long Messages
[08:15] Gallagher's LDPC Innovation
[10:45] How Modern LDPC Codes Work
[12:30] From Theory to Practice: Why Timing Matters
Perfect for students, engineers, or anyone curious about how their messages get through reliably despite noise and interference in the communication channel. Learn why these brilliant solutions weren't practical until decades after their invention, and how they enable the lightning-fast communications we rely on today.
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(10) {
[0]=>
object(stdClass)#5496 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "RV5aUr8sZD0"
["related_video_title"]=>
string(32) "Lossless Compression: Lempel-Ziv"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(18) "Art of the Problem"
}
[1]=>
object(stdClass)#5469 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "X8jsijhllIA"
["related_video_title"]=>
string(58) "But what are Hamming codes? The origin of error correction"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[2]=>
object(stdClass)#5494 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "W8FE8ugGyqQ"
["related_video_title"]=>
string(97) "From machine-learned wavefunctions to interatomic potentials - Part 4/6 - Geneviève Dusson"
["posted_time"]=>
string(24) "35 минут назад"
["channelName"]=>
string(9) "GDR NBODY"
}
[3]=>
object(stdClass)#5501 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "cbD4NsZQKYw"
["related_video_title"]=>
string(32) "How Wireless Communication Works"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(18) "Art of the Problem"
}
[4]=>
object(stdClass)#5480 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "r1U6fenGTrU"
["related_video_title"]=>
string(36) "How Neural Networks Learn (Backprop)"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(18) "Art of the Problem"
}
[5]=>
object(stdClass)#5498 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "bAZnP4kdb44"
["related_video_title"]=>
string(98) "Low Density Parity Check Codes: definition, properties and introduction to protograph construction"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(14) "NPTEL-NOC IITM"
}
[6]=>
object(stdClass)#5493 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "TQuxVz52w2w"
["related_video_title"]=>
string(28) "The Stock Market Always Wins"
["posted_time"]=>
string(24) "18 часов назад"
["channelName"]=>
string(18) "Art of the Problem"
}
[7]=>
object(stdClass)#5503 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CcZf_7Fb4Us"
["related_video_title"]=>
string(37) "Error Correcting Curves - Numberphile"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "Numberphile"
}
[8]=>
object(stdClass)#5479 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NQ4gLJYspdA"
["related_video_title"]=>
string(40) "Hamming Codes - How Data Corrects Itself"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(13) "Spanning Tree"
}
[9]=>
object(stdClass)#5497 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "iFY5SyY3IMQ"
["related_video_title"]=>
string(33) "Secret Sharing Explained Visually"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(18) "Art of the Problem"
}
}