-
MCC (Mobile Communication and Computing) 37
-
Introduction to Mobile Computing 06 minLecture1.1
-
GPRS Architecture 09 minLecture1.2
-
GSM architecture 20 minLecture1.3
-
Multiplexing 08 minLecture1.4
-
GEO MEO LEO Types of satellite Orbit 03 minLecture1.5
-
Handover and Types of Handover 06 minLecture1.6
-
Privacy and Authentication in GSM 08 minLecture1.7
-
Types of Handoffs and Handover 06 minLecture1.8
-
Mobile IP and Packet through tunnel working 05 minLecture1.9
-
3G UMTS architecture 05 minLecture1.10
-
Wireless Local Loop 06 minLecture1.11
-
PSTN Architecture 05 minLecture1.12
-
Cellular IP Standard 06 minLecture1.13
-
Bluetooth Architecture 06 minLecture1.14
-
Android architecture 16 minLecture1.15
-
4G architecture 18 minLecture1.16
-
Frequency reuse concept in cellular system 09 minLecture1.17
-
Macro Mobility- MIPv6 and FMIPv6 08 minLecture1.18
-
Micro Mobility- HAWAII Architecture 07 minLecture1.19
-
Micro Mobility- HMIPv6 Hierarchical MIPv6 08 minLecture1.20
-
IP Address v/s MAC Address 09 minLecture1.21
-
IPv4 Header Format 13 minLecture1.22
-
IPv6 11 minLecture1.23
-
IPv4 vs IPv6 10 minLecture1.24
-
SAE/LTE Architecture Part #1 12 minLecture1.25
-
SAE/LTE Architecture Part #2 07 minLecture1.26
-
VoLTE 09 minLecture1.27
-
Self-Organizing Networks (SON) Framework 08 minLecture1.28
-
IEEE 802.11 Architecture 09 minLecture1.29
-
IEEE 802.11 Protocol Architecture 11 minLecture1.30
-
Wifi Security – Wired Equivalent Privacy (WEP) 09 minLecture1.31
-
Wireless LAN Threats and Security 09 minLecture1.32
-
WiFi Protected Access 06 minLecture1.33
-
5G Introduction 08 minLecture1.34
-
HiperLAN Type 1 08 minLecture1.35
-
MCC Importance 13 minLecture1.36
-
Mobile Communication and Computing Notes ( Toppers Solution )Lecture1.37
-
-
Artificial Intelligence 35
-
Agent and Peas Description 08 minLecture2.1
-
Types of Agent 09 minLecture2.2
-
Learning Agent 09 minLecture2.3
-
BFS Algorithm with solved Example 06 minLecture2.4
-
DFS ( Depth First Search ) Algorithm with solved Example 03 minLecture2.5
-
IDFS ( Iterative Depth First Search ) Algorithm with solved Example 03 minLecture2.6
-
Hill Climbing 04 minLecture2.7
-
Min Max Solved Example 07 minLecture2.8
-
Alpha-Beta Pruning Solved Example 14 minLecture2.9
-
A star Solved Example 14 minLecture2.10
-
Genetic Algorithm 06 minLecture2.11
-
Genetic Algorithm Max one Problem Solved Example 09 minLecture2.12
-
Propositional Logic (PL) Introduction 08 minLecture2.13
-
PL to CNF Conversion With Solved Example 10 minLecture2.14
-
First-Order Logic (FOL) Solved Example 06 minLecture2.15
-
Resolution Tree Sum Part #1 09 minLecture2.16
-
Resolution Tree Sum Part #2 15 minLecture2.17
-
Partial Order Planning with Example 11 minLecture2.18
-
Expert System 10 minLecture2.19
-
Wumpus World 09 minLecture2.20
-
Natural Language Processing 10 minLecture2.21
-
Decision Tree Solved Example 24 minLecture2.22
-
Bayesian Network toothache and Cavity sum 12 minLecture2.23
-
Supervised and Unsupervised Learning (AI and SC) 07 minLecture2.24
-
Bayesian Belief Network 16 minLecture2.25
-
Hill Climbing algorithm 06 minLecture2.26
-
Importance + Strategy to Score Good marks in Artificial intelligence paper 17 minLecture2.27
-
Heuristic function (block world and 8 Puzzle ) 13 minLecture2.28
-
GBFS Solved Example 08 minLecture2.29
-
Notes: Module 1Lecture2.30
-
Notes: Module 2Lecture2.31
-
Notes: Module 3Lecture2.32
-
Notes: Module 4Lecture2.33
-
Notes: Module 5Lecture2.34
-
Notes: Module 6Lecture2.35
-
-
Cryptography and System Security 49
-
Module 1: Introduction to Cryptography and Security System 09 minLecture3.1
-
Module 1: Security Goals and Mechanism 10 minLecture3.2
-
Module 1: Symmetric Cipher 02 minLecture3.3
-
Module 1: Mono Alphabetic Cipher 08 minLecture3.4
-
Module 1: Poly Alphabetic Cipher 07 minLecture3.5
-
Module 1: Substitution Cipher 14 minLecture3.6
-
Module 1: Transposition Cipher 07 minLecture3.7
-
Module 2: Stream and Block Cipher 04 minLecture3.8
-
Module 2: DES Algorithm Full Working 12 minLecture3.9
-
Module 2: DES key Generation Explain Step by Step 11 minLecture3.10
-
Module 2: AES Algorithm Full working 26 minLecture3.11
-
Module 2: Modes of Operation 08 minLecture3.12
-
Module 2: Public Key cryptogrpahy 03 minLecture3.13
-
Module 2: RSA Algorithm with Solved Example 14 minLecture3.14
-
Module 2: Diffie Hellman 07 minLecture3.15
-
Module 2: How to find modulus of Exponential Number (high power value ) 12 minLecture3.16
-
Module 3: MD5 (Message Digest Algorithm) 24 minLecture3.17
-
Module 3: SHA-1 Algorithm Full Working 23 minLecture3.18
-
Module 3: MAC 07 minLecture3.19
-
Module 3: Digital Certificate and X.509 10 minLecture3.20
-
Module 4: Kerberos 08 minLecture3.21
-
Module 4: Digital Signature Full working Explained 19 minLecture3.22
-
Module 5: DOS and DDOS Attack 10 minLecture3.23
-
Module 5: SSL ( Secure Socket Layer protocol ) 18 minLecture3.24
-
Module 5: IPSEC introduction 17 minLecture3.25
-
Module 5: IP SEC Security Protocols 14 minLecture3.26
-
Module 5: IPSEC Modes of Operation 10 minLecture3.27
-
Module 5: IDS and its Types 12 minLecture3.28
-
Module 6: Buffer Overflow and Buffer Overflow attack 09 minLecture3.29
-
Module 6: Malicious Software ( Virus and worms ) 10 minLecture3.30
-
Module 6: Virus and worms 13 minLecture3.31
-
Module 6: SQL Injection 07 minLecture3.32
-
Module 7: IDEA Algorithm Full Working 14 minLecture3.33
-
Module 7: Blowfish Algorithm Full working 13 minLecture3.34
-
Module 7: Confusion and Diffusion 02 minLecture3.35
-
Module 7: Meet in the Middle 03 minLecture3.36
-
Module 7: Phishing Attack 11 minLecture3.37
-
Module 7: Session Hijacking and Spoofing Attack 11 minLecture3.38
-
Module 7: OS Security Memory and Address Protection 11 minLecture3.39
-
Module 7: E commerce Security and Payment gateway 09 minLecture3.40
-
Notes: IndexLecture3.41
-
Notes: Module 1Lecture3.42
-
Notes: Module 2Lecture3.43
-
Notes: Module 3Lecture3.44
-
Notes: Module 4Lecture3.45
-
Notes: Module 5Lecture3.46
-
Notes: Module 6Lecture3.47
-
Notes: Module 7Lecture3.48
-
Notes: Module 8Lecture3.49
-
-
System Programming and Compiler Construction [SPCC ] 48
-
Module 1: System Programming and Compiler Design Introduction 14 minLecture4.1
-
Module 2: What is Assembler and Assembly Language 08 minLecture4.2
-
Module 2: Forward reference problem 10 minLecture4.3
-
Module 2: Assembly language statement 08 minLecture4.4
-
Module 2: Flow chart of two pass assembler 15 minLecture4.5
-
Module 3: Macros and Macro-processors 11 minLecture4.6
-
Module 3: Macro vs Subroutine 09 minLecture4.7
-
Module 3: Macros pass 1 and pass 2 flowchart 11 minLecture4.8
-
Module 4: Editor Basics with Architecture in System Programming 11 minLecture4.9
-
Module 5: Phases of compiler 09 minLecture4.10
-
Module 5: Eliminate left recursion and left factoring 07 minLecture4.11
-
Module 5: How to Find First and Follow Basics (part 1) 09 minLecture4.12
-
Module 5: First and Follow solved example (part 2) 17 minLecture4.13
-
Module 5: First and Follow solved example (Part 3) 05 minLecture4.14
-
Module 5: Predictive Parser (Part 1) 16 minLecture4.15
-
Module 5: Predictive Parser (Part 2) 11 minLecture4.16
-
Module 5: Recursive Descent parser with solved example 07 minLecture4.17
-
Module 5: Operator Precedence Parser with Solved Example(part 1) 21 minLecture4.18
-
Module 5: Operator Precedence Parser with Solved Example (part 2) 12 minLecture4.19
-
Module 5: LR Parsing | LR (0) item | LR (0) Parsing table solved Example 31 minLecture4.20
-
Module 5: SLR (1) parsing with solved example| SLR (1) parsing table | 12 minLecture4.21
-
Module 5: Examples of LR(0) or SLR(1) 16 minLecture4.22
-
Module 5: CLR1 and LALR1 with Solved Example 28 minLecture4.23
-
Module 6: DAG(direct a cyclic graph) 04 minLecture4.24
-
Module 6: Yacc (Yet another compiler compiler ) 05 minLecture4.25
-
Module 6: Activation Records in Compiler Design 11 minLecture4.26
-
Module 6: Synthesized & Inherited Attributes 07 minLecture4.27
-
Module 6: Peep Hole Optimization 08 minLecture4.28
-
Index : Loaders 07 minLecture4.29
-
Index : Linkers 06 minLecture4.30
-
Index : Compile and go loader, General Loader and Absolute Loader 06 minLecture4.31
-
Index : Subroutine Linkage, Relocating Loader and Direct Link Loader 07 minLecture4.32
-
Index : Dynamic Loading Loader, Dynamic Linking Loader and Linkage Editor_1 06 minLecture4.33
-
Notes: SPCC important Question for Computer Branch Mumbai University 18 minLecture4.34
-
Notes: Introduction to SPCCLecture4.35
-
Notes: AssemblersLecture4.36
-
Notes: Macro and MacroprocessorLecture4.37
-
Notes: EditorLecture4.38
-
Notes: Loaders and LinkersLecture4.39
-
Notes: CompilersLecture4.40
-
Notes: Syntax AnalysisLecture4.41
-
Notes: Syntax Directed TransactionLecture4.42
-
Notes Lexical AnalysisLecture4.43
-
Notes: Intermediate Code GenerationLecture4.44
-
Notes: Code GenerationLecture4.45
-
Notes: Code OptimizationLecture4.46
-
Notes: Run Time StorageLecture4.47
-
Notes: Compiler – CompilersLecture4.48
-
Module 3: Macros and Macro-processors
Lesson content is empty.
