Sem – 6 Comps [ Mu ] [ Importance + Solution , Video Lectures , Viva Questions]
₹400,000,000.00
-
Artificial Intelligence [Module 2]:- Intelligent Agent
-
Artificial Intelligence [Module 3]:- Problem solving
- BFS Algorithm with solved Example
- DFS ( Depth First Search ) Algorithm with solved Example
- IDFS ( Iterative Depth First Search ) Algorithm with solved Example
- GBFS Solved Example
- A star Solved Example
- Hill Climbing Part #1
- Hill Climbing Part #2
- Genetic Algorithm
- Genetic Algorithm Max one Problem Solved Example
- Min Max Solved Example
- Alpha-Beta Pruning Solved Example
-
Artificial Intelligence [Module 4]:-Knowledge and Reasoning
-
Artificial Intelligence [Module 5]:- Planning and Learning
-
Artificial Intelligence [Module 6]:- AI Applications
-
Artificial Intelligence [ Importance And Solutions ]
-
Artificial Intelligence [Extra]:-
-
Mobile Computing [Module 1]:- Introduction to Mobile Computing
-
Mobile Computing [Module 2]:- GSM Mobile services
-
Mobile Computing [Module 3]:- Mobile Networking
-
Mobile Computing [Module 4]:- Wireless Local Area Networks
-
Mobile Computing [Module 5]:- Mobility Management
-
Mobile Computing [Module 6]:- Long-Term Evolution (LTE) of 3GPP
-
Mobile Computing [ Importance And Solutions ]
-
Cryptography & System Security [ Module 1]:- Introduction - Number Theory and Basic
-
Cryptography & System Security [ Module 2]:- Symmetric and Asymmetric key Cryptograp
-
Cryptography & System Security [ Module 3]:- Cryptographic Hash Functions
-
Cryptography & System Security [ Module 4]:- Authentication Protocols & Digital Sign
-
Cryptography & System Security [ Module 5]:- Network Security and Applications
-
Cryptography & System Security [ Module 6]:- System Security
-
Cryptography & System Security [ Importance And Solutions ]
-
Cryptography & System Security [ Notes ]
- Module 1 – Basics of Cryptography
- Module 1 – Monoalphabetic and polyalphabetic Cipher
- Module 2 – Block Cipher and Stream Cipher
- Module 2 – Modes of Operations
- Module 2 – DES Algorithm
- Module 2 – Public Key Cryptography , RSA and Deffie Helman
- Module 3 – Cryptographic Hash Function
- Module 5 – Network Security and Applications Part 1
- Module 5 – Network Security and Applications Part 2
-
System Programming and Compiler Construction [Module 1]:- Introduction to System Software
-
System Programming and Compiler Construction [Module 2]:- Assembler
-
System Programming and Compiler Construction [Module 3]:-Macros and Macro Processor
-
System Programming and Compiler Construction [Module 4]:- Loaders and Linkers
-
System Programming and Compiler Construction [Module 5]:- Compilers: Analysis Phase
- Phases of compiler
- Eliminate left recursion and left factoring
- How to Find First and Follow Basics (part 1)
- First and Follow solved example (part 2)
- First and Follow solved example (Part 3)
- Predictive Parser (Part 1)
- Predictive Parser (Part 2)
- Recursive Descent parser with solved example
- Operator Precedence Parser with Solved Example(part 1)
- Operator Precedence Parser with Solved Example (part 2)
- LR Parsing | LR (0) item | LR (0) Parsing table solved Example
- SLR (1) parsing with solved example| SLR (1) parsing table |
- Examples of LR(0) or SLR(1)
- CLR1 and LALR1 with Solved Example
-
System Programming and Compiler Construction [Module 6]:- Compilers: Synthesis phase
-
System Programming and Compiler Construction [ Notes ]
- Module 01 – System Software
- Module 02 – Assembler
- Module 03 – Macros and Macroprocessors
- Module 04 – Loaders and Linkers
- Module 5 – Part 1 – Compilers
- Module 5 – Part 2 – Lexical Analysis
- Module 5 – Part 3 – Syntax Analysis
- Module 6 – Part 1 – Intermediate Code Generation
- Module 6 – Part 2 – Code Generation
- Module 6 – Part 3 – Code Optimization
-
System Programming and Compiler Construction [ Importance And Solutions ]
Coming Soon
Course Features
- Lectures 171
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 4
- Certificate No
- Assessments Yes