- 
	
    
About the Coursse 0
No items in this section - 
	
    
Theoretical Computer Science 48
- 
				
                1. Introduction to Finite State Machine-002 22 minLecture2.1
 - 
				
                2. Finite State Machine Problem No. 1-001 12 minLecture2.2
 - 
				
                3. Finite State Machine Problem No. 2-003 12 minLecture2.3
 - 
				
                4. Finite State Machine Problem No. 3-004 14 minLecture2.4
 - 
				
                5. Introduction to Deterministic Finite Automata ( DFA ) 18 minLecture2.5
 - 
				
                6. Deterministic Finite Automata ( DFA ) Problem No. 1 ( Updated ) 12 minLecture2.6
 - 
				
                7. Deterministic Finite Automata ( DFA ) Problem No. 2 10 minLecture2.7
 - 
				
                8. Deterministic Finite Automata ( DFA ) Problem No. 3 12 minLecture2.8
 - 
				
                9. Deterministic Finite Automata ( DFA ) Problem No. 4 09 minLecture2.9
 - 
				
                10. Regula Expression and Regular Language 03 minLecture2.10
 - 
				
                11. Operations on Language 11 minLecture2.11
 - 
				
                12. Regular Expression to Regular Language 06 minLecture2.12
 - 
				
                13. Regular Language to Regular Expression 10 minLecture2.13
 - 
				
                14. Understanding the flow 02 minLecture2.14
 - 
				
                15. RE to NFA with Epselon Transition using Thompsons COnstruction Method 16 minLecture2.15
 - 
				
                16. RE to NFA with Epselon transition using Thompson’s Construction Method ( Part 2 ) 10 minLecture2.16
 - 
				
                17. RLRE to Minimised DFA ( Direct Method ) 27 minLecture2.17
 - 
				
                18. RLRE to Minimised DFA ( Imp State Method ) 24 minLecture2.18
 - 
				
                19. Convert NFA with E-Transition to NFA without E-Transition 16 minLecture2.19
 - 
				
                20. NFA Without E-Transition to DFA 19 minLecture2.20
 - 
				
                21. Moore & Mealy Machine 22 minLecture2.21
 - 
				
                22. Moore & Mealy Machine ( Problem 1 ) 09 minLecture2.22
 - 
				
                23. Introduction to Grammar 09 minLecture2.23
 - 
				
                24. RE – RL to Context Free Grammar 07 minLecture2.24
 - 
				
                25. How to Convert RE  RL to Context Free Grammar 15 minLecture2.25
 - 
				
                26. LMD  RMD & Parse Tree 13 minLecture2.26
 - 
				
                27. Check whether the given grammar is an ambiguous grammar or not 07 minLecture2.27
 - 
				
                28. Elimination of useless variable 12 minLecture2.28
 - 
				
                29. Elimination of Null Production 11 minLecture2.29
 - 
				
                30. Elimination of unit Production 04 minLecture2.30
 - 
				
                31. Simplification of CFG 09 minLecture2.31
 - 
				
                32. Introduction to Chomsky Normal Form 09 minLecture2.32
 - 
				
                33. CFG to CNF ( Problem No. 1 )-004 11 minLecture2.33
 - 
				
                34. CFG to CNF ( Problem No. 2 ) 05 minLecture2.34
 - 
				
                35. CFG to CNF ( Problem No. 3 )-002 12 minLecture2.35
 - 
				
                36. Introduction to Greibach Normal Form ( GNF ) 13 minLecture2.36
 - 
				
                37. Convert CFG to GNF ( Problem No. 1 ) 09 minLecture2.37
 - 
				
                38. Convert CFG to GNF ( Problem No. 2 ) 07 minLecture2.38
 - 
				
                39. Convert CFG to GNF ( Problem No. 3 ) 04 minLecture2.39
 - 
				
                40. Convert the following into CNF & GNF 05 minLecture2.40
 - 
				
                41. Introduction to Push Down Automata 08 minLecture2.41
 - 
				
                42. How to write commands in Push Down Automata 08 minLecture2.42
 - 
				
                43. Push Down Automata ( Problem No. 1 ) 14 minLecture2.43
 - 
				
                44. Introduction to Turing Machine 15 minLecture2.44
 - 
				
                Halting Problem 09 minLecture2.45
 - 
				
                45. Convert FA ( DFA ) to PDA 11 minLecture2.46
 - 
				
                46. Convert CFG to PDA 09 minLecture2.47
 - 
				
                47. Post Currospondance Problem ( PCP ) 05 minLecture2.48
 
 - 
				
                
 - 
	
    
Theoretical Computer Science [Previously Asked Questions] 18
- 
				
                DFA #1 16 minLecture3.1
 - 
				
                DFA #2 11 minLecture3.2
 - 
				
                DFA #3 16 minLecture3.3
 - 
				
                DFA #4 10 minLecture3.4
 - 
				
                DFA #5 18 minLecture3.5
 - 
				
                DFA #6 09 minLecture3.6
 - 
				
                Moore Machine Numerical 10 minLecture3.7
 - 
				
                Mealy Machine Numerical 11 minLecture3.8
 - 
				
                Pumping Lemma #1 10 minLecture3.9
 - 
				
                Pumping Lemma #2 08 minLecture3.10
 - 
				
                LMD and RMD Numerical 08 minLecture3.11
 - 
				
                Parse Tree & Grammar Ambiguity 07 minLecture3.12
 - 
				
                CFG TO GNF 11 minLecture3.13
 - 
				
                CFG to CNF with simplification 13 minLecture3.14
 - 
				
                Pushdown Automata – #1 17 minLecture3.15
 - 
				
                Pushdown Automata – #2 17 minLecture3.16
 - 
				
                Turing Machine – #1 08 minLecture3.17
 - 
				
                Turing Machine – #2 11 minLecture3.18
 
 - 
				
                
 - 
	
    
Theoretical Computer Science [Notes]:- 6
- 
				
                BASIC CONCEPTS AND FINITE AUTOMATALecture4.1
 - 
				
                REGULAR EXPRESSIONS AND LANGUAGESLecture4.2
 - 
				
                GRAMMARSLecture4.3
 - 
				
                PUSHDOWN AUTOMATALecture4.4
 - 
				
                TURING MACHINELecture4.5
 - 
				
                UNDECIDABILITYLecture4.6
 
 - 
				
                
 - 
	
    
Software Engineering [Module 1]:- Introduction To Software Engineering and Process Models 10
- 
				
                Introduction to Software Engineering 10 minLecture5.1
 - 
				
                Process Framework Model 07 minLecture5.2
 - 
				
                Capability Maturity Model (CMM) 09 minLecture5.3
 - 
				
                Waterfall Model 07 minLecture5.4
 - 
				
                Iterative Model 06 minLecture5.5
 - 
				
                Agile Development Process 10 minLecture5.6
 - 
				
                Extreme Programming 13 minLecture5.7
 - 
				
                SCRUM 09 minLecture5.8
 - 
				
                Schedule Slippage and Cost Slippage 03 minLecture5.9
 - 
				
                Verification and Validation 03 minLecture5.10
 
 - 
				
                
 - 
	
    
Software Engineering [Module 2]:- Software Requirements Analysis and Modeling 4
- 
				
                Data Flow Diagram 29 minLecture6.1
 - 
				
                SRS 15 minLecture6.2
 - 
				
                SRS Example 18 minLecture6.3
 - 
				
                SRS Characteristics 07 minLecture6.4
 
 - 
				
                
 - 
	
    
Software Engineering [Module 3]:- Software Estimation Metrics 2
- 
				
                Cocomo Model (Constructive Cost Model Introduction) 07 minLecture7.1
 - 
				
                Software measurement and Function Point Analysis 06 minLecture7.2
 
 - 
				
                
 - 
	
    
Software Engineering [Module 4]:- Software Design 6
- 
				
                Cohesion and Coupling 09 minLecture8.1
 - 
				
                Use Case Diagram 14 minLecture8.2
 - 
				
                Class diagram 20 minLecture8.3
 - 
				
                Sequence diagram 17 minLecture8.4
 - 
				
                Component diagram 06 minLecture8.5
 - 
				
                Deployment diagram 09 minLecture8.6
 
 - 
				
                
 - 
	
    
Software Engineering [Module 5]:- Software Testing 6
- 
				
                Integration Testing 04 minLecture9.1
 - 
				
                Object-Oriented 05 minLecture9.2
 - 
				
                White Box Testing 16 minLecture9.3
 - 
				
                Black Box Testing 12 minLecture9.4
 - 
				
                Reverse Engineering 04 minLecture9.5
 - 
				
                Alpha and Beta testing 03 minLecture9.6
 
 - 
				
                
 - 
	
    
Software Engineering [Module 6]:- Software Configuration Management, Quality Assurance and Maintenance 8
- 
				
                Software Configuration Management 09 minLecture10.1
 - 
				
                Risk Identification 05 minLecture10.2
 - 
				
                RMMM ( Risk Mitigation Monitoring Management ) 03 minLecture10.3
 - 
				
                Version Control 03 minLecture10.4
 - 
				
                Change Control 04 minLecture10.5
 - 
				
                Formal Technical Review (FTR) 08 minLecture10.6
 - 
				
                Maintenance in Software Engineering 04 minLecture10.7
 - 
				
                Service-Oriented Architecture 06 minLecture10.8
 
 - 
				
                
 - 
	
    
Software Engineering [Notes]:- Software Engineering Full Notes 1
- 
				
                Software Engineering Full NotesLecture11.1
 
 - 
				
                
 - 
	
    
Software Engineering [ Importance ] :- 7
- 
				
                Introduction To SE and Process ModelsLecture12.1
 - 
				
                Software Req Analysis and ModelingLecture12.2
 - 
				
                Software Estimation MetricsLecture12.3
 - 
				
                Software DesignLecture12.4
 - 
				
                Software TestingLecture12.5
 - 
				
                SCM, QA and MaintenanceLecture12.6
 - 
				
                [Extra] Previously Asked Important QuestionsLecture12.7
 
 - 
				
                
 - 
	
    
Software Engineering [Viva Question]:- 6
- 
				
                Introduction to Software Engineering and Process ModelsLecture13.1
 - 
				
                Software Requirements Analysis and ModelingLecture13.2
 - 
				
                Software Estimation MetricsLecture13.3
 - 
				
                Software DesignLecture13.4
 - 
				
                Software TestingLecture13.5
 - 
				
                Software Configuration Management, Quality Assurance and MaintenanceLecture13.6
 
 - 
				
                
 - 
	
    
Computer Network [Module 1]:- Introduction to Computer Networks 9
- 
				
                Introduction to Computer Networks 12 minLecture14.1
 - 
				
                Network Topologies 12 minLecture14.2
 - 
				
                Network Connecting Devices 11 minLecture14.3
 - 
				
                Connection-Oriented vs Connection-Less Communication 09 minLecture14.4
 - 
				
                OSI Reference Model 07 minLecture14.5
 - 
				
                TCP-IP Reference Model 07 minLecture14.6
 - 
				
                OSI vs TCP-IP Model Comparision 08 minLecture14.7
 - 
				
                Network Classification LAN, MAN, WAN 08 minLecture14.8
 - 
				
                Virtual Lan’s 08 minLecture14.9
 
 - 
				
                
 - 
	
    
Computer Network [Module 2]:-Physical Layer 5
- 
				
                Transmission Media: Guided and Unguided [Difference] 09 minLecture15.1
 - 
				
                Twisted-Pair Cables 08 minLecture15.2
 - 
				
                CoAxial Cable 07 minLecture15.3
 - 
				
                Fiber Optics Part [01] 11 minLecture15.4
 - 
				
                Fiber Optics Part [02] 11 minLecture15.5
 
 - 
				
                
 - 
	
    
Computer Network [Module 3]:- Data Link layer 11
- 
				
                Framing and it’s Methods 08 minLecture16.1
 - 
				
                Error Detection and its Methods 08 minLecture16.2
 - 
				
                Hamming Code 10 minLecture16.3
 - 
				
                Cyclic Redundancy Check Part [01] 09 minLecture16.4
 - 
				
                Cyclic Redundancy Check Part [02] 05 minLecture16.5
 - 
				
                Parity Checking and Checksum Error Detection 09 minLecture16.6
 - 
				
                Flow Control: Stop and Wait and Sliding Window Protocol 08 minLecture16.7
 - 
				
                Go Back- N ARQ System 08 minLecture16.8
 - 
				
                SDLC protocol 05 minLecture16.9
 - 
				
                HDLC protocol 12 minLecture16.10
 - 
				
                Carrier Sense Multiple Access-Collision Detection Procedure (CSMA-CD) 07 minLecture16.11
 
 - 
				
                
 - 
	
    
Computer Network [Module 4]:- Network Layer 8
- 
				
                IP address vs MAC address 09 minLecture17.1
 - 
				
                IPv4 Header Format 13 minLecture17.2
 - 
				
                IPv4 vs IPv6 10 minLecture17.3
 - 
				
                Routing Algorithms Part 01 12 minLecture17.4
 - 
				
                Routing Algorithms Part 02 10 minLecture17.5
 - 
				
                ARP & RARP 07 minLecture17.6
 - 
				
                Leaky Bucket Algorithm 05 minLecture17.7
 - 
				
                Token Bucket Algorithm 06 minLecture17.8
 
 - 
				
                
 - 
	
    
Computer Network [Module 5]:- Transport Layer 2
- 
				
                Berkeley Sockets 07 minLecture18.1
 - 
				
                User Datagram Protocol 08 minLecture18.2
 
 - 
				
                
 - 
	
    
Computer Network [Module 6]:- Application Layer 4
- 
				
                Domain Name Server – DNS 06 minLecture19.1
 - 
				
                Simple Mail Transfer Protocol – SMTP 05 minLecture19.2
 - 
				
                Hypertext Transfer Protocol – HTTP 08 minLecture19.3
 - 
				
                File Transfer Protocol – FTP 05 minLecture19.4
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Data Warehousing Fundamentals 2
- 
				
                Introduction To NetworkingLecture20.1
 - 
				
                IPv4 & IPv6Lecture20.2
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Physical Layer 1
- 
				
                Physical LayerLecture21.1
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Data Link Layer 4
- 
				
                Medium Access Control SublayerLecture22.1
 - 
				
                Data Link LayerLecture22.2
 - 
				
                Error HammingLecture22.3
 - 
				
                Cyclic Redundancy SumsLecture22.4
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Network Layer 1
- 
				
                Network LayerLecture23.1
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Transport Layer 1
- 
				
                Transport LayerLecture24.1
 
 - 
				
                
 - 
	
    
Computer Network [Notes]:- Application Layer 1
- 
				
                Application LayerLecture25.1
 
 - 
				
                
 - 
	
    
Computer Network [ Importance ] :- 7
- 
				
                Introduction To NetworkingLecture26.1
 - 
				
                Physical LayerLecture26.2
 - 
				
                Data Link LayerLecture26.3
 - 
				
                Network LayerLecture26.4
 - 
				
                Transport LayerLecture26.5
 - 
				
                Application LayerLecture26.6
 - 
				
                [Extra] Previously Asked Important QuestionsLecture26.7
 
 - 
				
                
 - 
	
    
Computer Network [Viva Questions]:- 6
- 
				
                Physical LayerLecture27.1
 - 
				
                IntroductionLecture27.2
 - 
				
                Data Link LayerLecture27.3
 - 
				
                Network layerLecture27.4
 - 
				
                Transport LayerLecture27.5
 - 
				
                Application LayerLecture27.6
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 1]:- Data Warehousing Fundamentals 10
- 
				
                Introduction to Data Warehouse 11 minLecture28.1
 - 
				
                Meta Data 05 minLecture28.2
 - 
				
                Data Mart 06 minLecture28.3
 - 
				
                Data Warehouse Architecture 07 minLecture28.4
 - 
				
                How to Draw Star , Smowflake and Fack Constelation Basics 10 minLecture28.5
 - 
				
                Numericals on Star , Snowflake and Fact Constelation [ Part 1 ] 16 minLecture28.6
 - 
				
                Numericals on Star , Snowflake and Fact Constelation [ Part 2 ] 11 minLecture28.7
 - 
				
                What is Olap Operations 08 minLecture28.8
 - 
				
                OLAP VS OLTP 08 minLecture28.9
 - 
				
                Extract Transform and Load (ETL) 09 minLecture28.10
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 2]:- Introduction to Data Mining, Data Exploration 7
- 
				
                Introduction to Data Mining and Architecture 10 minLecture29.1
 - 
				
                KDD Process in Data Mining 09 minLecture29.2
 - 
				
                Types of Attribute 09 minLecture29.3
 - 
				
                Data Visualization Part #1 11 minLecture29.4
 - 
				
                Data Visualization Part #2 11 minLecture29.5
 - 
				
                Data Preprocessing Part #1 17 minLecture29.6
 - 
				
                Data Preprocessing Part #2 09 minLecture29.7
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 3]:- Classification 4
- 
				
                Naive Bayes Numerical Solved Example [ Nov 2022 ] [ 10 Marks ]– 12 minLecture30.1
 - 
				
                Naive Bayes Part #2 25 minLecture30.2
 - 
				
                Naive Bayes Part #1 18 minLecture30.3
 - 
				
                Decision Tree 24 minLecture30.4
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 4]:- Clustering 6
- 
				
                K Mean clustering with Example [ Type 1 ] 12 minLecture31.1
 - 
				
                K Mean clustering with Example [ Type 2 ] 23 minLecture31.2
 - 
				
                K Mean Numerical Solved Example [ May 2022 , May 2023 ] [ 10 Marks ] — 11 minLecture31.3
 - 
				
                K Medoid with Example 21 minLecture31.4
 - 
				
                Agglomerative Clustering Algorithm with Example 13 minLecture31.5
 - 
				
                Agglomerative Adjacency Matrix using Euclidean Distance with Solved Example 05 minLecture31.6
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 5]:-Mining frequent patterns and associations 2
- 
				
                Apiori Algoirthm with Solved Example 12 minLecture32.1
 - 
				
                FP Tree Algorithm with Solved Example 15 minLecture32.2
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Module 6]:- Web Mining 4
- 
				
                Web content mining 06 minLecture33.1
 - 
				
                Web Mining 07 minLecture33.2
 - 
				
                Page rank Algorithm 06 minLecture33.3
 - 
				
                HITTS Algorithm [ Hubs and Authority ] 12 minLecture33.4
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Notes]:- 2
- 
				
                Data Warehouse and Data Mining NOTESLecture34.1
 - 
				
                Data Warehouse and Data Mining ImportanceLecture34.2
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [Viva Question]:- 6
- 
				
                IntroductionLecture35.1
 - 
				
                Introduction to Data Mining,Data Exploration and Data Pre-processingLecture35.2
 - 
				
                ClusteringLecture35.3
 - 
				
                ClassificationLecture35.4
 - 
				
                Mining frequent patterns and associationsLecture35.5
 - 
				
                Web MiningLecture35.6
 
 - 
				
                
 - 
	
    
Data Warehouse and Data Mining [ Importance ] :- 6
- 
				
                Data Warehouse and Data Mining ImportanceLecture36.1
 - 
				
                Data Warehouse and Data Mining NOTESLecture36.2
 - 
				
                Data warehouse and Data Mining Importance 2024 [ Updated ]Lecture36.3
 - 
				
                K Mean Numerical Solved ExampleLecture36.4
 - 
				
                Naive Bayes Numerical Solved ExampleLecture36.5
 - 
				
                Star and Snowflake Schema NumericalsLecture36.6
 
 - 
				
                
 
    This content is protected, please login and enroll course to view this content!
            Prev
            
				Berkeley Sockets            
        
	
	        
	
