Library

Video Player is loading.
 
Current Time 0:00
Duration 10:46
Loaded: 0.00%
 

x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:01

    {♫Intro♫}
    {♫Intro♫}

  • 00:10

    When you think about algorithms, you probably think of Google searches or YouTube recommendations,
    When you think about algorithms, you probably think of Google searches or YouTube recommendations,

  • 00:15

    or predictive text—situations where powerful computers are coming up with information you’re
    or predictive text—situations where powerful computers are coming up with information you’re

  • 00:20

    looking for.
    looking for.

  • 00:21

    An algorithm, though, is basically any recipe of calculations that a computer can follow
    An algorithm, though, is basically any recipe of calculations that a computer can follow

  • 00:26

    to produce a specific kind of information.
    to produce a specific kind of information.

  • 00:29

    And algorithms aren’t just for computers.
    And algorithms aren’t just for computers.

  • 00:32

    They show up all over nature, too, in places like your immune system and in schools of
    They show up all over nature, too, in places like your immune system and in schools of

  • 00:37

    fish.
    fish.

  • 00:38

    And just as engineers borrow ideas from nature’s physical designs, some computer scientists
    And just as engineers borrow ideas from nature’s physical designs, some computer scientists

  • 00:44

    look for inspiration in nature’s algorithms.
    look for inspiration in nature’s algorithms.

  • 00:47

    Here are four ways our technology has improved thanks to algorithms we swiped from nature.
    Here are four ways our technology has improved thanks to algorithms we swiped from nature.

  • 00:55

    Say you’re looking for the perfect fuzzy animal photo to send as a virtual hug to your
    Say you’re looking for the perfect fuzzy animal photo to send as a virtual hug to your

  • 00:57

    friend.
    friend.

  • 00:58

    An image search pulls up some cuddling kittens that are almost right, if only you could find
    An image search pulls up some cuddling kittens that are almost right, if only you could find

  • 01:03

    a slightly more zoomed-out version…
    a slightly more zoomed-out version…

  • 01:05

    What you want in this situation is something called nearest-neighbors search—an algorithm
    What you want in this situation is something called nearest-neighbors search—an algorithm

  • 01:10

    that can quickly search a big database to find the items most similar to one you specify.
    that can quickly search a big database to find the items most similar to one you specify.

  • 01:15

    That gets harder as the database gets bigger; and on the internet, there are way too many
    That gets harder as the database gets bigger; and on the internet, there are way too many

  • 01:20

    images for the search engine to compare your photo with every single one.
    images for the search engine to compare your photo with every single one.

  • 01:25

    So how do search engines pull off that feature that gives you “visually similar images”?
    So how do search engines pull off that feature that gives you “visually similar images”?

  • 01:29

    One technique is called locality-sensitive hashing.
    One technique is called locality-sensitive hashing.

  • 01:31

    This is a type of algorithm that digests each image into a short digital fingerprint called
    This is a type of algorithm that digests each image into a short digital fingerprint called

  • 01:38

    a hash, with similar hashes for similar inputs.
    a hash, with similar hashes for similar inputs.

  • 01:41

    For example, if your inputs were essays, a decent hash might be the first letters of
    For example, if your inputs were essays, a decent hash might be the first letters of

  • 01:46

    the first twenty sentences.
    the first twenty sentences.

  • 01:48

    So if one essay was copied from another, their hashes would likely be very close.
    So if one essay was copied from another, their hashes would likely be very close.

  • 01:52

    This method makes it easy to find similar inputs.
    This method makes it easy to find similar inputs.

  • 01:55

    Instead of comparing your kittens to every other image on the internet, Google can organize
    Instead of comparing your kittens to every other image on the internet, Google can organize

  • 01:59

    images by their hashes and just pull out the similar ones.
    images by their hashes and just pull out the similar ones.

  • 02:03

    The catch is that locality-sensitive hashing can still be kind of slow, and sometimes inaccurate.
    The catch is that locality-sensitive hashing can still be kind of slow, and sometimes inaccurate.

  • 02:08

    That is where fly brains come to the rescue.
    That is where fly brains come to the rescue.

  • 02:11

    See, a fly can smell, but it doesn’t differentiate every subtle variation of odor; it groups
    See, a fly can smell, but it doesn’t differentiate every subtle variation of odor; it groups

  • 02:17

    odors into categories so it can learn that, for instance, cheese smells often lead to
    odors into categories so it can learn that, for instance, cheese smells often lead to

  • 02:22

    fruit, but book smells don’t.
    fruit, but book smells don’t.

  • 02:24

    In 2017, a team of computer scientists and biologists realized that fly brains group
    In 2017, a team of computer scientists and biologists realized that fly brains group

  • 02:30

    odors using a form of locality-sensitive hashing.
    odors using a form of locality-sensitive hashing.

  • 02:33

    Except in the flies’ version, the brain boils a smell down to a few numbers by first
    Except in the flies’ version, the brain boils a smell down to a few numbers by first

  • 02:39

    expanding the smell data into a much larger collection of numbers.
    expanding the smell data into a much larger collection of numbers.

  • 02:43

    Only then does it select a few of those numbers as the hash.
    Only then does it select a few of those numbers as the hash.

  • 02:47

    It’s sort of like expanding an essay by replacing each character with a random 10-character
    It’s sort of like expanding an essay by replacing each character with a random 10-character

  • 02:52

    code, producing a string of gibberish ten times as long.
    code, producing a string of gibberish ten times as long.

  • 02:56

    Then you could find the hundred gibberish words that appear most frequently, take the
    Then you could find the hundred gibberish words that appear most frequently, take the

  • 03:00

    first letter, and use that as the essay’s hash.
    first letter, and use that as the essay’s hash.

  • 03:03

    As strange as that strategy sounds, it turns out to work really well.
    As strange as that strategy sounds, it turns out to work really well.

  • 03:08

    All the extra gobbledegook gives the algorithm more opportunities to find patterns that jump
    All the extra gobbledegook gives the algorithm more opportunities to find patterns that jump

  • 03:13

    out strongly for one cluster of inputs but are conspicuously absent for others.
    out strongly for one cluster of inputs but are conspicuously absent for others.

  • 03:18

    When the computer scientists built their own fly-based hashing algorithm, it was up to
    When the computer scientists built their own fly-based hashing algorithm, it was up to

  • 03:22

    twice as accurate as traditional methods—and also twenty times faster!
    twice as accurate as traditional methods—and also twenty times faster!

  • 03:29

    Computer vision is everywhere.
    Computer vision is everywhere.

  • 03:30

    Self-driving cars, MRI technology, facial recognition; they all use it.
    Self-driving cars, MRI technology, facial recognition; they all use it.

  • 03:34

    Most of these systems need to do some form of object recognition—meaning they need
    Most of these systems need to do some form of object recognition—meaning they need

  • 03:38

    to identify the contents of an image.
    to identify the contents of an image.

  • 03:41

    For decades, computer scientists used handcrafted algorithms to extract image features like
    For decades, computer scientists used handcrafted algorithms to extract image features like

  • 03:46

    edges and contiguous shapes.
    edges and contiguous shapes.

  • 03:48

    Then, they could then build other algorithms that used those features to guess what was
    Then, they could then build other algorithms that used those features to guess what was

  • 03:53

    in each part of an image.
    in each part of an image.

  • 03:54

    But all these hand-tuned algorithms tend to be fragile.
    But all these hand-tuned algorithms tend to be fragile.

  • 03:57

    It’s up to the cleverness of engineers to design the right kinds of analysis and tweak
    It’s up to the cleverness of engineers to design the right kinds of analysis and tweak

  • 04:02

    the parameters just so.
    the parameters just so.

  • 04:04

    Now, engineers are pretty clever, but there’s only so much subtlety and detail they can
    Now, engineers are pretty clever, but there’s only so much subtlety and detail they can

  • 04:08

    code up.
    code up.

  • 04:09

    In the background, though, a different approach was taking shape: convolutional neural networks,
    In the background, though, a different approach was taking shape: convolutional neural networks,

  • 04:14

    or CNNs.
    or CNNs.

  • 04:15

    In artificial intelligence, most kinds of neural networks are based on nature only in
    In artificial intelligence, most kinds of neural networks are based on nature only in

  • 04:20

    a crude way.
    a crude way.

  • 04:21

    Like, they’re called neural networks because they kind of work like neurons.
    Like, they’re called neural networks because they kind of work like neurons.

  • 04:24

    But convolutional neural networks are based on Nobel Prize-winning research on cat brains.
    But convolutional neural networks are based on Nobel Prize-winning research on cat brains.

  • 04:30

    Back in the 1950s, a pair of neuroscientists discovered that some neurons in a cat’s
    Back in the 1950s, a pair of neuroscientists discovered that some neurons in a cat’s

  • 04:34

    visual cortex, called simple cells, would respond only to simple visual elements—like
    visual cortex, called simple cells, would respond only to simple visual elements—like

  • 04:40

    a line in a specific place at a specific orientation.
    a line in a specific place at a specific orientation.

  • 04:43

    Those simple cells pass information to so-called complex cells, which aggregate the information
    Those simple cells pass information to so-called complex cells, which aggregate the information

  • 04:49

    across a wider area.
    across a wider area.

  • 04:51

    In other words, these researchers discovered a hierarchy in the brain’s visual processing:
    In other words, these researchers discovered a hierarchy in the brain’s visual processing:

  • 04:56

    Earlier layers detect basic features at different locations, then later layers add all that
    Earlier layers detect basic features at different locations, then later layers add all that

  • 05:01

    together to detect more complex patterns.
    together to detect more complex patterns.

  • 05:04

    That structure directly inspired the first convolutional neural networks.
    That structure directly inspired the first convolutional neural networks.

  • 05:08

    In the first layer of a CNN, each simulated neuron looks only at one small patch of the
    In the first layer of a CNN, each simulated neuron looks only at one small patch of the

  • 05:14

    image and checks how well that matches a simple template, like a spot of blue or an edge between
    image and checks how well that matches a simple template, like a spot of blue or an edge between

  • 05:19

    light and dark.
    light and dark.

  • 05:20

    The neuron gives the patch a score depending on how well that patch matches the neuron’s
    The neuron gives the patch a score depending on how well that patch matches the neuron’s

  • 05:25

    template.
    template.

  • 05:26

    Then, the next level looks at all the scores for edges and spots in a slightly bigger patch
    Then, the next level looks at all the scores for edges and spots in a slightly bigger patch

  • 05:31

    and matches them against a more complex template, and so on up the hierarchy until you’re
    and matches them against a more complex template, and so on up the hierarchy until you’re

  • 05:37

    looking for cat paws and bicycle wheels.
    looking for cat paws and bicycle wheels.

  • 05:39

    A CNN learns these templates automatically from data, saving engineers from manually
    A CNN learns these templates automatically from data, saving engineers from manually

  • 05:44

    specifying what to look for.
    specifying what to look for.

  • 05:46

    Today, CNNs totally dominate computer vision.
    Today, CNNs totally dominate computer vision.

  • 05:50

    And although they now have bells and whistles that have nothing to do with the brain, the
    And although they now have bells and whistles that have nothing to do with the brain, the

  • 05:54

    visual hierarchy is still baked in.
    visual hierarchy is still baked in.

  • 05:59

    Next, companies really hate getting hacked.
    Next, companies really hate getting hacked.

  • 06:00

    There are lawsuits and bad press, and it’s pretty inconvenient for them and the people
    There are lawsuits and bad press, and it’s pretty inconvenient for them and the people

  • 06:04

    who rely on them.
    who rely on them.

  • 06:05

    So if a company’s network starts getting hammered with unusual traffic, it might be
    So if a company’s network starts getting hammered with unusual traffic, it might be

  • 06:09

    a good idea to lock things down.
    a good idea to lock things down.

  • 06:11

    But detecting what counts as unusual traffic isn’t always easy.
    But detecting what counts as unusual traffic isn’t always easy.

  • 06:15

    It’s an example of what’s called anomaly detection, or scanning for atypical data,
    It’s an example of what’s called anomaly detection, or scanning for atypical data,

  • 06:20

    which can be tricky.
    which can be tricky.

  • 06:21

    See, you can’t just lay out rules for what normal traffic looks like.
    See, you can’t just lay out rules for what normal traffic looks like.

  • 06:24

    For one thing, what is normal is always changing.
    For one thing, what is normal is always changing.

  • 06:27

    And anyway, hard rules would be too rigid: You wouldn’t want a red alert before every
    And anyway, hard rules would be too rigid: You wouldn’t want a red alert before every

  • 06:31

    holiday just because a bunch of employees traveled early and logged in from home.
    holiday just because a bunch of employees traveled early and logged in from home.

  • 06:35

    It might be tempting to try supervised machine learning, where you show an algorithm lots
    It might be tempting to try supervised machine learning, where you show an algorithm lots

  • 06:40

    of good and bad examples, and it figures out how to tell them apart.
    of good and bad examples, and it figures out how to tell them apart.

  • 06:43

    But with anomaly detection, you often don’t have many examples of the bad stuff you’re
    But with anomaly detection, you often don’t have many examples of the bad stuff you’re

  • 06:48

    trying to catch!
    trying to catch!

  • 06:49

    Most of what a company has, of course, is logs of normal network traffic.
    Most of what a company has, of course, is logs of normal network traffic.

  • 06:53

    So how can it learn what abnormal traffic looks like?
    So how can it learn what abnormal traffic looks like?

  • 06:57

    One particularly cool solution is based on our bodies.
    One particularly cool solution is based on our bodies.

  • 07:00

    Because you know what’s really good at detecting a few bad guys in a sea of things that belong?
    Because you know what’s really good at detecting a few bad guys in a sea of things that belong?

  • 07:06

    Your immune system.
    Your immune system.

  • 07:07

    To recognize and kill off invaders, your immune system uses cells called lymphocytes, which
    To recognize and kill off invaders, your immune system uses cells called lymphocytes, which

  • 07:12

    have little receptors that detect foreign proteins.
    have little receptors that detect foreign proteins.

  • 07:15

    But your body actually produces a huge variety of lymphocytes, with receptors that detect
    But your body actually produces a huge variety of lymphocytes, with receptors that detect

  • 07:21

    pretty much any random protein snippet—including bits of proteins that are supposed to be around.
    pretty much any random protein snippet—including bits of proteins that are supposed to be around.

  • 07:26

    You don’t want to attack those, so before your body releases its lymphocytes, your thymus
    You don’t want to attack those, so before your body releases its lymphocytes, your thymus

  • 07:32

    gland selectively kills off the ones that would detect familiar proteins.
    gland selectively kills off the ones that would detect familiar proteins.

  • 07:36

    As a result, the only lymphocytes that survive are ones that detect foreign proteins.
    As a result, the only lymphocytes that survive are ones that detect foreign proteins.

  • 07:42

    This is called negative selection, and anomaly-detection algorithms can use a similar concept to spot
    This is called negative selection, and anomaly-detection algorithms can use a similar concept to spot

  • 07:48

    unusual traffic.
    unusual traffic.

  • 07:49

    They can generate detectors for random sequences of traffic data, then delete any detectors
    They can generate detectors for random sequences of traffic data, then delete any detectors

  • 07:55

    that go off on normal traffic logs.
    that go off on normal traffic logs.

  • 07:57

    The ones that remain, thus, respond only to abnormal patterns.
    The ones that remain, thus, respond only to abnormal patterns.

  • 08:03

    Finally, in lots of situations, having multiple computers coordinate to divide up a task is
    Finally, in lots of situations, having multiple computers coordinate to divide up a task is

  • 08:06

    crucial—for example, to carry out a robotic search-and-rescue mission, or to index the
    crucial—for example, to carry out a robotic search-and-rescue mission, or to index the

  • 08:11

    entire internet.
    entire internet.

  • 08:12

    When you have just a few computers in a network, it’s easy to have one central command computer
    When you have just a few computers in a network, it’s easy to have one central command computer

  • 08:17

    coordinate them all.
    coordinate them all.

  • 08:18

    But if you’re coordinating hundreds of thousands of machines, or the machines are cut off from
    But if you’re coordinating hundreds of thousands of machines, or the machines are cut off from

  • 08:22

    one another, controlling them with one central computer becomes impractical.
    one another, controlling them with one central computer becomes impractical.

  • 08:25

    So all those machines need a process that they all follow independently that somehow
    So all those machines need a process that they all follow independently that somehow

  • 08:30

    gets the job done efficiently and without horrible mistakes.
    gets the job done efficiently and without horrible mistakes.

  • 08:34

    Little machines… acting independently… getting big projects done… sounds… kind
    Little machines… acting independently… getting big projects done… sounds… kind

  • 08:40

    of like an insect colony!
    of like an insect colony!

  • 08:42

    As it happens, there’s a whole niche of what are called swarm intelligence algorithms
    As it happens, there’s a whole niche of what are called swarm intelligence algorithms

  • 08:48

    that tackle problems like this, and many are based on insect behavior.
    that tackle problems like this, and many are based on insect behavior.

  • 08:52

    For example, there are construction robots that collaborate by imitating termites.
    For example, there are construction robots that collaborate by imitating termites.

  • 08:56

    We still don’t know exactly how termites build their massive mounds.
    We still don’t know exactly how termites build their massive mounds.

  • 09:00

    But we do know that each worker can only see its local environment—what’s been built
    But we do know that each worker can only see its local environment—what’s been built

  • 09:05

    right there and where surrounding workers are.
    right there and where surrounding workers are.

  • 09:08

    That means the only way for the termites to coordinate is by leaving indirect signals
    That means the only way for the termites to coordinate is by leaving indirect signals

  • 09:12

    for each other in their shared environment.
    for each other in their shared environment.

  • 09:14

    Like, when one termite does a bit of construction work, it leaves the soil arranged as some
    Like, when one termite does a bit of construction work, it leaves the soil arranged as some

  • 09:19

    kind of cue to other termites about what needs to be done next.
    kind of cue to other termites about what needs to be done next.

  • 09:23

    This indirect coordination strategy is called stigmergy.
    This indirect coordination strategy is called stigmergy.

  • 09:27

    Inspired by termite stigmergy, a system of robots called TERMES allows a fleet of little
    Inspired by termite stigmergy, a system of robots called TERMES allows a fleet of little

  • 09:32

    robots to build arbitrary structures with no central coordination.
    robots to build arbitrary structures with no central coordination.

  • 09:37

    Just by sensing what’s been built and following some basic traffic rules, each robot figures
    Just by sensing what’s been built and following some basic traffic rules, each robot figures

  • 09:42

    out what to do next to get closer to the target structure.
    out what to do next to get closer to the target structure.

  • 09:46

    The hope is for similar robots to one day build complex structures even in hostile environments,
    The hope is for similar robots to one day build complex structures even in hostile environments,

  • 09:52

    like war zones or on Mars, without depending on a centralized controller.
    like war zones or on Mars, without depending on a centralized controller.

  • 09:56

    Now, nature-inspired algorithms can get a bit out of hand.
    Now, nature-inspired algorithms can get a bit out of hand.

  • 09:59

    People have designed algorithms based on wolf pack behavior, virus evolution, lightning
    People have designed algorithms based on wolf pack behavior, virus evolution, lightning

  • 10:04

    paths, and on and on.
    paths, and on and on.

  • 10:07

    Nature-inspired computing has been criticized for encouraging cute metaphors that don’t
    Nature-inspired computing has been criticized for encouraging cute metaphors that don’t

  • 10:11

    add insight or are unnecessarily complicated.
    add insight or are unnecessarily complicated.

  • 10:13

    But as you’ve seen, sometimes natural phenomena really can make for great inspiration.
    But as you’ve seen, sometimes natural phenomena really can make for great inspiration.

  • 10:19

    Nature can be quite the computer scientist, if you just know where to look!
    Nature can be quite the computer scientist, if you just know where to look!

  • 10:22

    Thanks for watching this episode of SciShow!
    Thanks for watching this episode of SciShow!

  • 10:23

    And if you want to learn more about the amazing ways that nature is inspiring modern technology,
    And if you want to learn more about the amazing ways that nature is inspiring modern technology,

  • 10:29

    you might like our episode on how animals are helping us build better drones.
    you might like our episode on how animals are helping us build better drones.

  • 10:32

    You can watch that right after this.
    You can watch that right after this.

  • 10:34

    {♫Outro♫}
    {♫Outro♫}

All noun
intro
/ˈintrō/

word

introduction

4 Algorithms We Borrowed from Nature

217,245 views

Intro:

{♫Intro♫}. When you think about algorithms, you probably think of Google searches or YouTube recommendations,
or predictive text—situations where powerful computers are coming up with information you’re
looking for.. An algorithm, though, is basically any recipe of calculations that a computer can follow
to produce a specific kind of information.. And algorithms aren’t just for computers.. They show up all over nature, too, in places like your immune system and in schools of
fish.. And just as engineers borrow ideas from nature’s physical designs, some computer scientists
look for inspiration in nature’s algorithms.. Here are four ways our technology has improved thanks to algorithms we swiped from nature.
Say you’re looking for the perfect fuzzy animal photo to send as a virtual hug to your
friend.. An image search pulls up some cuddling kittens that are almost right, if only you could find
a slightly more zoomed-out version…. What you want in this situation is something called nearest-neighbors search—an algorithm
that can quickly search a big database to find the items most similar to one you specify.
That gets harder as the database gets bigger; and on the internet, there are way too many
images for the search engine to compare your photo with every single one.

Video Vocabulary

/ˈsim(ə)lər/

adjective noun

Nearly the same; alike. person or thing similar to another.

/ˈfizik(ə)l/

adjective noun

Concerning things that can be seen or touched. Health check at the doctors' or hospital.

noun other verb

compilation or summary of information. A summary, as of the news. To convert food into energy in your stomach.

/kəmˈper/

verb

estimate similarity or dissimilarity between.

/ˌenjəˈnir/

noun other verb

designer or maker of machines. People whose job is to repair or maintain engines. design and build.

/ˈslītlē/

adverb

to small degree.

/ˌinspəˈrāSH(ə)n/

noun

Force making you feel you can do things, succeed.

/sko͞ol/

noun other verb

institution for educating children. Buildings where you learn in classes with a teacher. To teach or train someone to know or do something.

/ˈfiNGɡərˌprint/

noun verb

Generic term for any identifying characteristic. record fingerprints of.

/ˈpräbəblē/

adverb

That is likely to happen or be true.

/ˈenjən/

noun other

machine converting power into motion. Machines that changes energy into mechanical motion.

/ˈdadəˌbās/

noun

structured set of data held in computer.

/ˈpou(ə)rfəl/

adjective adverb

Having a lot of physical force, energy, strength. very.

adjective noun verb

So good it cannot be improved. perfect tense. make completely free from faults.

/ˈkədl/

verb

To hold in your arms to show love or care for.