home
Physics

Trojan horse attacks threaten the security of practical quantum cryptography

Trojan horse attacks threaten the security of practical quantum cryptography - YouTube...

Watch
Chemistry

University of Calgary Three Minute Thesis (3MT®) 2014 - Diana Powers

University of Calgary Three Minute Thesis (3MT®) 2014 - Diana Powers - YouTube...

Watch
Geology

YouTube Science Video

A paleo-seismological study of the Dauki fault at Jaflong, Sylhet, Bangladesh: historical seismic events and an attempted rupture segmentation model....

Watch
Communications

Kate Final

Kate Final - YouTube...

Watch
Medicine

Reliability and validity of the Maltese version of the PACT-Q2 - Video abstract [ID 207498]

Video abstract of an original research "Reliability and validity of the Maltese version of the Perception of Anticoagulant Treatment Questionnaire (PACT-Q)" published in the open access jour...

Watch
Education

Multitasking.wmv

Have Technology and Multitasking Rewired how Students Learn? Video summary. Full article: http://www.aft.org/sites/default/files/periodicals/Willingham_0.pdf...

Watch
Medicine

Video Abstract: Gender Differences in Coronary Calcification on CTA

Video Abstract: Gender Differences in Coronary Calcification on CTA - YouTube...

Watch
Mathematics

A one-parameter family of Dirichlet series whose coefficients are Sturmian words

A one-parameter family of Dirichlet series whose coefficients are Sturmian words - Kwon, DoYong* Department of Mathematics, Chonnam National University,...

Watch
Sociology

Recollections of working with Howard S. Becker: Clinton Sanders interviewed by Thomas DeGloma

Recollections of working with Howard S. Becker; Clinton Sanders interviewed by Thomas DeGloma...

Watch
Biology

Microbial Invasions / Trends in Microbiology November 2015 (Vol. 23 Issue 11)

Microbial Invasions / Trends in Microbiology November 2015 (Vol. 23 Issue 11) - Cyrus Mallon and Joana Salles discuss how microbial invasions follow a universal process of introduction, establishment,...

Watch

Science Video

1...

Watch
Computer Science

This Technique Impersonates People | Two Minute Papers #254

(1) Impersonate Anyone With This Technique | Two Minute Papers #254 ...

Watch
Computer Science

DeepMind's New AI Diagnoses Eye Conditions

DeepMind's New AI Diagnoses Eye Conditions ...

Watch
Engineering

Three Minute Thesis 2013 - Lokendra Ramotar

Three-Minute Thesis presentation on Full Hybrid and Electric Vehicle Simulations with Battery Thermal Management System Optimization by Lokendra Ramotar, UOIT Graduate Student, Mechanical Engineering....

Watch
Communications

SuzieSheehy

SuzieSheehy - YouTube...

Watch
Physics

Entanglement decoherence in a gravitational well according to the event formalism

Video abstract for the article ‘Entanglement decoherence in a gravitational well according to the event formalism‘ by T C Ralph and J Pienaar (T C Ralph and ......

Watch
Medicine

Lupeol suppresses CRCvia Wnt–β-catenin pathway - Video Abstract ID 183925

Video abstract of original research “Lupeol inhibits growth and migration in two human colorectal cancer cell lines by suppression of Wnt–β-catenin pathway” published in the open access journal OncoTa...

Watch
Medicine

Lenstar LS900 biometer and Barrett toric calculator: clinical results – Video abstract 120414

Video abstract of original research paper “Clinical outcomes with toric intraocular lenses planned using an optical low coherence reflectometry ocular biometer with a new toric calculator” published i...

Watch
Biology

PLANTS Molecular principles of membrane microdomain targeting in plants

PLANTS Molecular principles of membrane microdomain targeting in plants - YouTube...

Watch
Biology

Figure360: Immunity, Lu et al., Figure 1

Figure360: Immunity, Lu et al., Figure 1 ...

Watch


Created and maintained by Ryan Watkins (2013-present)