-
About the Coursse 0
No items in this section -
Theoretical Computer Science 48
-
1. Introduction to Finite State Machine-002 22 minLecture2.1
-
2. Finite State Machine Problem No. 1-001 12 minLecture2.2
-
3. Finite State Machine Problem No. 2-003 12 minLecture2.3
-
4. Finite State Machine Problem No. 3-004 14 minLecture2.4
-
5. Introduction to Deterministic Finite Automata ( DFA ) 18 minLecture2.5
-
6. Deterministic Finite Automata ( DFA ) Problem No. 1 ( Updated ) 12 minLecture2.6
-
7. Deterministic Finite Automata ( DFA ) Problem No. 2 10 minLecture2.7
-
8. Deterministic Finite Automata ( DFA ) Problem No. 3 12 minLecture2.8
-
9. Deterministic Finite Automata ( DFA ) Problem No. 4 09 minLecture2.9
-
10. Regula Expression and Regular Language 03 minLecture2.10
-
11. Operations on Language 11 minLecture2.11
-
12. Regular Expression to Regular Language 06 minLecture2.12
-
13. Regular Language to Regular Expression 10 minLecture2.13
-
14. Understanding the flow 02 minLecture2.14
-
15. RE to NFA with Epselon Transition using Thompsons COnstruction Method 16 minLecture2.15
-
16. RE to NFA with Epselon transition using Thompson’s Construction Method ( Part 2 ) 10 minLecture2.16
-
17. RLRE to Minimised DFA ( Direct Method ) 27 minLecture2.17
-
18. RLRE to Minimised DFA ( Imp State Method ) 24 minLecture2.18
-
19. Convert NFA with E-Transition to NFA without E-Transition 16 minLecture2.19
-
20. NFA Without E-Transition to DFA 19 minLecture2.20
-
21. Moore & Mealy Machine 22 minLecture2.21
-
22. Moore & Mealy Machine ( Problem 1 ) 09 minLecture2.22
-
23. Introduction to Grammar 09 minLecture2.23
-
24. RE – RL to Context Free Grammar 07 minLecture2.24
-
25. How to Convert RE RL to Context Free Grammar 15 minLecture2.25
-
26. LMD RMD & Parse Tree 13 minLecture2.26
-
27. Check whether the given grammar is an ambiguous grammar or not 07 minLecture2.27
-
28. Elimination of useless variable 12 minLecture2.28
-
29. Elimination of Null Production 11 minLecture2.29
-
30. Elimination of unit Production 04 minLecture2.30
-
31. Simplification of CFG 09 minLecture2.31
-
32. Introduction to Chomsky Normal Form 09 minLecture2.32
-
33. CFG to CNF ( Problem No. 1 )-004 11 minLecture2.33
-
34. CFG to CNF ( Problem No. 2 ) 05 minLecture2.34
-
35. CFG to CNF ( Problem No. 3 )-002 12 minLecture2.35
-
36. Introduction to Greibach Normal Form ( GNF ) 13 minLecture2.36
-
37. Convert CFG to GNF ( Problem No. 1 ) 09 minLecture2.37
-
38. Convert CFG to GNF ( Problem No. 2 ) 07 minLecture2.38
-
39. Convert CFG to GNF ( Problem No. 3 ) 04 minLecture2.39
-
40. Convert the following into CNF & GNF 05 minLecture2.40
-
41. Introduction to Push Down Automata 08 minLecture2.41
-
42. How to write commands in Push Down Automata 08 minLecture2.42
-
43. Push Down Automata ( Problem No. 1 ) 14 minLecture2.43
-
44. Introduction to Turing Machine 15 minLecture2.44
-
Halting Problem 09 minLecture2.45
-
45. Convert FA ( DFA ) to PDA 11 minLecture2.46
-
46. Convert CFG to PDA 09 minLecture2.47
-
47. Post Currospondance Problem ( PCP ) 05 minLecture2.48
-
-
Theoretical Computer Science [Previously Asked Questions] 18
-
DFA #1 16 minLecture3.1
-
DFA #2 11 minLecture3.2
-
DFA #3 16 minLecture3.3
-
DFA #4 10 minLecture3.4
-
DFA #5 18 minLecture3.5
-
DFA #6 09 minLecture3.6
-
Moore Machine Numerical 10 minLecture3.7
-
Mealy Machine Numerical 11 minLecture3.8
-
Pumping Lemma #1 10 minLecture3.9
-
Pumping Lemma #2 08 minLecture3.10
-
LMD and RMD Numerical 08 minLecture3.11
-
Parse Tree & Grammar Ambiguity 07 minLecture3.12
-
CFG TO GNF 11 minLecture3.13
-
CFG to CNF with simplification 13 minLecture3.14
-
Pushdown Automata – #1 17 minLecture3.15
-
Pushdown Automata – #2 17 minLecture3.16
-
Turing Machine – #1 08 minLecture3.17
-
Turing Machine – #2 11 minLecture3.18
-
-
Theoretical Computer Science [Notes]:- 6
-
BASIC CONCEPTS AND FINITE AUTOMATALecture4.1
-
REGULAR EXPRESSIONS AND LANGUAGESLecture4.2
-
GRAMMARSLecture4.3
-
PUSHDOWN AUTOMATALecture4.4
-
TURING MACHINELecture4.5
-
UNDECIDABILITYLecture4.6
-
-
Software Engineering [Module 1]:- Introduction To Software Engineering and Process Models 10
-
Introduction to Software Engineering 10 minLecture5.1
-
Process Framework Model 07 minLecture5.2
-
Capability Maturity Model (CMM) 09 minLecture5.3
-
Waterfall Model 07 minLecture5.4
-
Iterative Model 06 minLecture5.5
-
Agile Development Process 10 minLecture5.6
-
Extreme Programming 13 minLecture5.7
-
SCRUM 09 minLecture5.8
-
Schedule Slippage and Cost Slippage 03 minLecture5.9
-
Verification and Validation 03 minLecture5.10
-
-
Software Engineering [Module 2]:- Software Requirements Analysis and Modeling 4
-
Data Flow Diagram 29 minLecture6.1
-
SRS 15 minLecture6.2
-
SRS Example 18 minLecture6.3
-
SRS Characteristics 07 minLecture6.4
-
-
Software Engineering [Module 3]:- Software Estimation Metrics 2
-
Cocomo Model (Constructive Cost Model Introduction) 07 minLecture7.1
-
Software measurement and Function Point Analysis 06 minLecture7.2
-
-
Software Engineering [Module 4]:- Software Design 6
-
Cohesion and Coupling 09 minLecture8.1
-
Use Case Diagram 14 minLecture8.2
-
Class diagram 20 minLecture8.3
-
Sequence diagram 17 minLecture8.4
-
Component diagram 06 minLecture8.5
-
Deployment diagram 09 minLecture8.6
-
-
Software Engineering [Module 5]:- Software Testing 6
-
Integration Testing 04 minLecture9.1
-
Object-Oriented 05 minLecture9.2
-
White Box Testing 16 minLecture9.3
-
Black Box Testing 12 minLecture9.4
-
Reverse Engineering 04 minLecture9.5
-
Alpha and Beta testing 03 minLecture9.6
-
-
Software Engineering [Module 6]:- Software Configuration Management, Quality Assurance and Maintenance 8
-
Software Configuration Management 09 minLecture10.1
-
Risk Identification 05 minLecture10.2
-
RMMM ( Risk Mitigation Monitoring Management ) 03 minLecture10.3
-
Version Control 03 minLecture10.4
-
Change Control 04 minLecture10.5
-
Formal Technical Review (FTR) 08 minLecture10.6
-
Maintenance in Software Engineering 04 minLecture10.7
-
Service-Oriented Architecture 06 minLecture10.8
-
-
Software Engineering [Notes]:- Software Engineering Full Notes 1
-
Software Engineering Full NotesLecture11.1
-
-
Software Engineering [ Importance ] :- 7
-
Introduction To SE and Process ModelsLecture12.1
-
Software Req Analysis and ModelingLecture12.2
-
Software Estimation MetricsLecture12.3
-
Software DesignLecture12.4
-
Software TestingLecture12.5
-
SCM, QA and MaintenanceLecture12.6
-
[Extra] Previously Asked Important QuestionsLecture12.7
-
-
Software Engineering [Viva Question]:- 6
-
Introduction to Software Engineering and Process ModelsLecture13.1
-
Software Requirements Analysis and ModelingLecture13.2
-
Software Estimation MetricsLecture13.3
-
Software DesignLecture13.4
-
Software TestingLecture13.5
-
Software Configuration Management, Quality Assurance and MaintenanceLecture13.6
-
-
Computer Network [Module 1]:- Introduction to Computer Networks 9
-
Introduction to Computer Networks 12 minLecture14.1
-
Network Topologies 12 minLecture14.2
-
Network Connecting Devices 11 minLecture14.3
-
Connection-Oriented vs Connection-Less Communication 09 minLecture14.4
-
OSI Reference Model 07 minLecture14.5
-
TCP-IP Reference Model 07 minLecture14.6
-
OSI vs TCP-IP Model Comparision 08 minLecture14.7
-
Network Classification LAN, MAN, WAN 08 minLecture14.8
-
Virtual Lan’s 08 minLecture14.9
-
-
Computer Network [Module 2]:-Physical Layer 5
-
Transmission Media: Guided and Unguided [Difference] 09 minLecture15.1
-
Twisted-Pair Cables 08 minLecture15.2
-
CoAxial Cable 07 minLecture15.3
-
Fiber Optics Part [01] 11 minLecture15.4
-
Fiber Optics Part [02] 11 minLecture15.5
-
-
Computer Network [Module 3]:- Data Link layer 11
-
Framing and it’s Methods 08 minLecture16.1
-
Error Detection and its Methods 08 minLecture16.2
-
Hamming Code 10 minLecture16.3
-
Cyclic Redundancy Check Part [01] 09 minLecture16.4
-
Cyclic Redundancy Check Part [02] 05 minLecture16.5
-
Parity Checking and Checksum Error Detection 09 minLecture16.6
-
Flow Control: Stop and Wait and Sliding Window Protocol 08 minLecture16.7
-
Go Back- N ARQ System 08 minLecture16.8
-
SDLC protocol 05 minLecture16.9
-
HDLC protocol 12 minLecture16.10
-
Carrier Sense Multiple Access-Collision Detection Procedure (CSMA-CD) 07 minLecture16.11
-
-
Computer Network [Module 4]:- Network Layer 8
-
IP address vs MAC address 09 minLecture17.1
-
IPv4 Header Format 13 minLecture17.2
-
IPv4 vs IPv6 10 minLecture17.3
-
Routing Algorithms Part 01 12 minLecture17.4
-
Routing Algorithms Part 02 10 minLecture17.5
-
ARP & RARP 07 minLecture17.6
-
Leaky Bucket Algorithm 05 minLecture17.7
-
Token Bucket Algorithm 06 minLecture17.8
-
-
Computer Network [Module 5]:- Transport Layer 2
-
Berkeley Sockets 07 minLecture18.1
-
User Datagram Protocol 08 minLecture18.2
-
-
Computer Network [Module 6]:- Application Layer 4
-
Domain Name Server – DNS 06 minLecture19.1
-
Simple Mail Transfer Protocol – SMTP 05 minLecture19.2
-
Hypertext Transfer Protocol – HTTP 08 minLecture19.3
-
File Transfer Protocol – FTP 05 minLecture19.4
-
-
Computer Network [Notes]:- Data Warehousing Fundamentals 2
-
Introduction To NetworkingLecture20.1
-
IPv4 & IPv6Lecture20.2
-
-
Computer Network [Notes]:- Physical Layer 1
-
Physical LayerLecture21.1
-
-
Computer Network [Notes]:- Data Link Layer 4
-
Medium Access Control SublayerLecture22.1
-
Data Link LayerLecture22.2
-
Error HammingLecture22.3
-
Cyclic Redundancy SumsLecture22.4
-
-
Computer Network [Notes]:- Network Layer 1
-
Network LayerLecture23.1
-
-
Computer Network [Notes]:- Transport Layer 1
-
Transport LayerLecture24.1
-
-
Computer Network [Notes]:- Application Layer 1
-
Application LayerLecture25.1
-
-
Computer Network [ Importance ] :- 7
-
Introduction To NetworkingLecture26.1
-
Physical LayerLecture26.2
-
Data Link LayerLecture26.3
-
Network LayerLecture26.4
-
Transport LayerLecture26.5
-
Application LayerLecture26.6
-
[Extra] Previously Asked Important QuestionsLecture26.7
-
-
Computer Network [Viva Questions]:- 6
-
Physical LayerLecture27.1
-
IntroductionLecture27.2
-
Data Link LayerLecture27.3
-
Network layerLecture27.4
-
Transport LayerLecture27.5
-
Application LayerLecture27.6
-
-
Data Warehouse and Data Mining [Module 1]:- Data Warehousing Fundamentals 10
-
Introduction to Data Warehouse 11 minLecture28.1
-
Meta Data 05 minLecture28.2
-
Data Mart 06 minLecture28.3
-
Data Warehouse Architecture 07 minLecture28.4
-
How to Draw Star , Smowflake and Fack Constelation Basics 10 minLecture28.5
-
Numericals on Star , Snowflake and Fact Constelation [ Part 1 ] 16 minLecture28.6
-
Numericals on Star , Snowflake and Fact Constelation [ Part 2 ] 11 minLecture28.7
-
What is Olap Operations 08 minLecture28.8
-
OLAP VS OLTP 08 minLecture28.9
-
Extract Transform and Load (ETL) 09 minLecture28.10
-
-
Data Warehouse and Data Mining [Module 2]:- Introduction to Data Mining, Data Exploration 7
-
Introduction to Data Mining and Architecture 10 minLecture29.1
-
KDD Process in Data Mining 09 minLecture29.2
-
Types of Attribute 09 minLecture29.3
-
Data Visualization Part #1 11 minLecture29.4
-
Data Visualization Part #2 11 minLecture29.5
-
Data Preprocessing Part #1 17 minLecture29.6
-
Data Preprocessing Part #2 09 minLecture29.7
-
-
Data Warehouse and Data Mining [Module 3]:- Classification 4
-
Naive Bayes Numerical Solved Example [ Nov 2022 ] [ 10 Marks ]– 12 minLecture30.1
-
Naive Bayes Part #2 25 minLecture30.2
-
Naive Bayes Part #1 18 minLecture30.3
-
Decision Tree 24 minLecture30.4
-
-
Data Warehouse and Data Mining [Module 4]:- Clustering 6
-
K Mean clustering with Example [ Type 1 ] 12 minLecture31.1
-
K Mean clustering with Example [ Type 2 ] 23 minLecture31.2
-
K Mean Numerical Solved Example [ May 2022 , May 2023 ] [ 10 Marks ] — 11 minLecture31.3
-
K Medoid with Example 21 minLecture31.4
-
Agglomerative Clustering Algorithm with Example 13 minLecture31.5
-
Agglomerative Adjacency Matrix using Euclidean Distance with Solved Example 05 minLecture31.6
-
-
Data Warehouse and Data Mining [Module 5]:-Mining frequent patterns and associations 2
-
Apiori Algoirthm with Solved Example 12 minLecture32.1
-
FP Tree Algorithm with Solved Example 15 minLecture32.2
-
-
Data Warehouse and Data Mining [Module 6]:- Web Mining 4
-
Web content mining 06 minLecture33.1
-
Web Mining 07 minLecture33.2
-
Page rank Algorithm 06 minLecture33.3
-
HITTS Algorithm [ Hubs and Authority ] 12 minLecture33.4
-
-
Data Warehouse and Data Mining [Notes]:- 2
-
Data Warehouse and Data Mining NOTESLecture34.1
-
Data Warehouse and Data Mining ImportanceLecture34.2
-
-
Data Warehouse and Data Mining [Viva Question]:- 6
-
IntroductionLecture35.1
-
Introduction to Data Mining,Data Exploration and Data Pre-processingLecture35.2
-
ClusteringLecture35.3
-
ClassificationLecture35.4
-
Mining frequent patterns and associationsLecture35.5
-
Web MiningLecture35.6
-
-
Data Warehouse and Data Mining [ Importance ] :- 6
-
Data Warehouse and Data Mining ImportanceLecture36.1
-
Data Warehouse and Data Mining NOTESLecture36.2
-
Data warehouse and Data Mining Importance 2024 [ Updated ]Lecture36.3
-
K Mean Numerical Solved ExampleLecture36.4
-
Naive Bayes Numerical Solved ExampleLecture36.5
-
Star and Snowflake Schema NumericalsLecture36.6
-
This content is protected, please login and enroll course to view this content!
Prev
Risk Identification
Next
Version Control

