-
MCC (Mobile Communication and Computing) 37
-
Introduction to Mobile Computing 06 minLecture1.1
-
GPRS Architecture 09 minLecture1.2
-
GSM architecture 20 minLecture1.3
-
Multiplexing 08 minLecture1.4
-
GEO MEO LEO Types of satellite Orbit 03 minLecture1.5
-
Handover and Types of Handover 06 minLecture1.6
-
Privacy and Authentication in GSM 08 minLecture1.7
-
Types of Handoffs and Handover 06 minLecture1.8
-
Mobile IP and Packet through tunnel working 05 minLecture1.9
-
3G UMTS architecture 05 minLecture1.10
-
Wireless Local Loop 06 minLecture1.11
-
PSTN Architecture 05 minLecture1.12
-
Cellular IP Standard 06 minLecture1.13
-
Bluetooth Architecture 06 minLecture1.14
-
Android architecture 16 minLecture1.15
-
4G architecture 18 minLecture1.16
-
Frequency reuse concept in cellular system 09 minLecture1.17
-
Macro Mobility- MIPv6 and FMIPv6 08 minLecture1.18
-
Micro Mobility- HAWAII Architecture 07 minLecture1.19
-
Micro Mobility- HMIPv6 Hierarchical MIPv6 08 minLecture1.20
-
IP Address v/s MAC Address 09 minLecture1.21
-
IPv4 Header Format 13 minLecture1.22
-
IPv6 11 minLecture1.23
-
IPv4 vs IPv6 10 minLecture1.24
-
SAE/LTE Architecture Part #1 12 minLecture1.25
-
SAE/LTE Architecture Part #2 07 minLecture1.26
-
VoLTE 09 minLecture1.27
-
Self-Organizing Networks (SON) Framework 08 minLecture1.28
-
IEEE 802.11 Architecture 09 minLecture1.29
-
IEEE 802.11 Protocol Architecture 11 minLecture1.30
-
Wifi Security – Wired Equivalent Privacy (WEP) 09 minLecture1.31
-
Wireless LAN Threats and Security 09 minLecture1.32
-
WiFi Protected Access 06 minLecture1.33
-
5G Introduction 08 minLecture1.34
-
HiperLAN Type 1 08 minLecture1.35
-
MCC Importance 13 minLecture1.36
-
Mobile Communication and Computing Notes ( Toppers Solution )Lecture1.37
-
-
Artificial Intelligence 35
-
Agent and Peas Description 08 minLecture2.1
-
Types of Agent 09 minLecture2.2
-
Learning Agent 09 minLecture2.3
-
BFS Algorithm with solved Example 06 minLecture2.4
-
DFS ( Depth First Search ) Algorithm with solved Example 03 minLecture2.5
-
IDFS ( Iterative Depth First Search ) Algorithm with solved Example 03 minLecture2.6
-
Hill Climbing 04 minLecture2.7
-
Min Max Solved Example 07 minLecture2.8
-
Alpha-Beta Pruning Solved Example 14 minLecture2.9
-
A star Solved Example 14 minLecture2.10
-
Genetic Algorithm 06 minLecture2.11
-
Genetic Algorithm Max one Problem Solved Example 09 minLecture2.12
-
Propositional Logic (PL) Introduction 08 minLecture2.13
-
PL to CNF Conversion With Solved Example 10 minLecture2.14
-
First-Order Logic (FOL) Solved Example 06 minLecture2.15
-
Resolution Tree Sum Part #1 09 minLecture2.16
-
Resolution Tree Sum Part #2 15 minLecture2.17
-
Partial Order Planning with Example 11 minLecture2.18
-
Expert System 10 minLecture2.19
-
Wumpus World 09 minLecture2.20
-
Natural Language Processing 10 minLecture2.21
-
Decision Tree Solved Example 24 minLecture2.22
-
Bayesian Network toothache and Cavity sum 12 minLecture2.23
-
Supervised and Unsupervised Learning (AI and SC) 07 minLecture2.24
-
Bayesian Belief Network 16 minLecture2.25
-
Hill Climbing algorithm 06 minLecture2.26
-
Importance + Strategy to Score Good marks in Artificial intelligence paper 17 minLecture2.27
-
Heuristic function (block world and 8 Puzzle ) 13 minLecture2.28
-
GBFS Solved Example 08 minLecture2.29
-
Notes: Module 1Lecture2.30
-
Notes: Module 2Lecture2.31
-
Notes: Module 3Lecture2.32
-
Notes: Module 4Lecture2.33
-
Notes: Module 5Lecture2.34
-
Notes: Module 6Lecture2.35
-
-
Cryptography and System Security 49
-
Module 1: Introduction to Cryptography and Security System 09 minLecture3.1
-
Module 1: Security Goals and Mechanism 10 minLecture3.2
-
Module 1: Symmetric Cipher 02 minLecture3.3
-
Module 1: Mono Alphabetic Cipher 08 minLecture3.4
-
Module 1: Poly Alphabetic Cipher 07 minLecture3.5
-
Module 1: Substitution Cipher 14 minLecture3.6
-
Module 1: Transposition Cipher 07 minLecture3.7
-
Module 2: Stream and Block Cipher 04 minLecture3.8
-
Module 2: DES Algorithm Full Working 12 minLecture3.9
-
Module 2: DES key Generation Explain Step by Step 11 minLecture3.10
-
Module 2: AES Algorithm Full working 26 minLecture3.11
-
Module 2: Modes of Operation 08 minLecture3.12
-
Module 2: Public Key cryptogrpahy 03 minLecture3.13
-
Module 2: RSA Algorithm with Solved Example 14 minLecture3.14
-
Module 2: Diffie Hellman 07 minLecture3.15
-
Module 2: How to find modulus of Exponential Number (high power value ) 12 minLecture3.16
-
Module 3: MD5 (Message Digest Algorithm) 24 minLecture3.17
-
Module 3: SHA-1 Algorithm Full Working 23 minLecture3.18
-
Module 3: MAC 07 minLecture3.19
-
Module 3: Digital Certificate and X.509 10 minLecture3.20
-
Module 4: Kerberos 08 minLecture3.21
-
Module 4: Digital Signature Full working Explained 19 minLecture3.22
-
Module 5: DOS and DDOS Attack 10 minLecture3.23
-
Module 5: SSL ( Secure Socket Layer protocol ) 18 minLecture3.24
-
Module 5: IPSEC introduction 17 minLecture3.25
-
Module 5: IP SEC Security Protocols 14 minLecture3.26
-
Module 5: IPSEC Modes of Operation 10 minLecture3.27
-
Module 5: IDS and its Types 12 minLecture3.28
-
Module 6: Buffer Overflow and Buffer Overflow attack 09 minLecture3.29
-
Module 6: Malicious Software ( Virus and worms ) 10 minLecture3.30
-
Module 6: Virus and worms 13 minLecture3.31
-
Module 6: SQL Injection 07 minLecture3.32
-
Module 7: IDEA Algorithm Full Working 14 minLecture3.33
-
Module 7: Blowfish Algorithm Full working 13 minLecture3.34
-
Module 7: Confusion and Diffusion 02 minLecture3.35
-
Module 7: Meet in the Middle 03 minLecture3.36
-
Module 7: Phishing Attack 11 minLecture3.37
-
Module 7: Session Hijacking and Spoofing Attack 11 minLecture3.38
-
Module 7: OS Security Memory and Address Protection 11 minLecture3.39
-
Module 7: E commerce Security and Payment gateway 09 minLecture3.40
-
Notes: IndexLecture3.41
-
Notes: Module 1Lecture3.42
-
Notes: Module 2Lecture3.43
-
Notes: Module 3Lecture3.44
-
Notes: Module 4Lecture3.45
-
Notes: Module 5Lecture3.46
-
Notes: Module 6Lecture3.47
-
Notes: Module 7Lecture3.48
-
Notes: Module 8Lecture3.49
-
-
System Programming and Compiler Construction [SPCC ] 48
-
Module 1: System Programming and Compiler Design Introduction 14 minLecture4.1
-
Module 2: What is Assembler and Assembly Language 08 minLecture4.2
-
Module 2: Forward reference problem 10 minLecture4.3
-
Module 2: Assembly language statement 08 minLecture4.4
-
Module 2: Flow chart of two pass assembler 15 minLecture4.5
-
Module 3: Macros and Macro-processors 11 minLecture4.6
-
Module 3: Macro vs Subroutine 09 minLecture4.7
-
Module 3: Macros pass 1 and pass 2 flowchart 11 minLecture4.8
-
Module 4: Editor Basics with Architecture in System Programming 11 minLecture4.9
-
Module 5: Phases of compiler 09 minLecture4.10
-
Module 5: Eliminate left recursion and left factoring 07 minLecture4.11
-
Module 5: How to Find First and Follow Basics (part 1) 09 minLecture4.12
-
Module 5: First and Follow solved example (part 2) 17 minLecture4.13
-
Module 5: First and Follow solved example (Part 3) 05 minLecture4.14
-
Module 5: Predictive Parser (Part 1) 16 minLecture4.15
-
Module 5: Predictive Parser (Part 2) 11 minLecture4.16
-
Module 5: Recursive Descent parser with solved example 07 minLecture4.17
-
Module 5: Operator Precedence Parser with Solved Example(part 1) 21 minLecture4.18
-
Module 5: Operator Precedence Parser with Solved Example (part 2) 12 minLecture4.19
-
Module 5: LR Parsing | LR (0) item | LR (0) Parsing table solved Example 31 minLecture4.20
-
Module 5: SLR (1) parsing with solved example| SLR (1) parsing table | 12 minLecture4.21
-
Module 5: Examples of LR(0) or SLR(1) 16 minLecture4.22
-
Module 5: CLR1 and LALR1 with Solved Example 28 minLecture4.23
-
Module 6: DAG(direct a cyclic graph) 04 minLecture4.24
-
Module 6: Yacc (Yet another compiler compiler ) 05 minLecture4.25
-
Module 6: Activation Records in Compiler Design 11 minLecture4.26
-
Module 6: Synthesized & Inherited Attributes 07 minLecture4.27
-
Module 6: Peep Hole Optimization 08 minLecture4.28
-
Index : Loaders 07 minLecture4.29
-
Index : Linkers 06 minLecture4.30
-
Index : Compile and go loader, General Loader and Absolute Loader 06 minLecture4.31
-
Index : Subroutine Linkage, Relocating Loader and Direct Link Loader 07 minLecture4.32
-
Index : Dynamic Loading Loader, Dynamic Linking Loader and Linkage Editor_1 06 minLecture4.33
-
Notes: SPCC important Question for Computer Branch Mumbai University 18 minLecture4.34
-
Notes: Introduction to SPCCLecture4.35
-
Notes: AssemblersLecture4.36
-
Notes: Macro and MacroprocessorLecture4.37
-
Notes: EditorLecture4.38
-
Notes: Loaders and LinkersLecture4.39
-
Notes: CompilersLecture4.40
-
Notes: Syntax AnalysisLecture4.41
-
Notes: Syntax Directed TransactionLecture4.42
-
Notes Lexical AnalysisLecture4.43
-
Notes: Intermediate Code GenerationLecture4.44
-
Notes: Code GenerationLecture4.45
-
Notes: Code OptimizationLecture4.46
-
Notes: Run Time StorageLecture4.47
-
Notes: Compiler – CompilersLecture4.48
-
GPRS Architecture
GPRS Architecture
GPRS stands for General Packet Radio Service. It is the modified version of the GSM architecture service. In GSM architecture we can only transport the voice signal. For that there are two more software components are used, SGSN (Serving GPRS supporting Node) and GGSN (Gateway GPRS supporting Node).
Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/
![]()
/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q
Follow For Latest Updates, Study Tips & More Content!
