-
About the course 0
No items in this section -
Artificial Intelligence [Module 2]:- Intelligent Agent 3
-
Agent and Peas Description 08 minLecture2.1
-
Types of Agent 09 minLecture2.2
-
Learning Agent 09 minLecture2.3
-
-
Artificial Intelligence [Module 3]:- Problem solving 11
-
BFS Algorithm with solved Example 06 minLecture3.1
-
DFS ( Depth First Search ) Algorithm with solved Example 03 minLecture3.2
-
IDFS ( Iterative Depth First Search ) Algorithm with solved Example 03 minLecture3.3
-
GBFS Solved Example 08 minLecture3.4
-
A star Solved Example 14 minLecture3.5
-
Hill Climbing Part #1 04 minLecture3.6
-
Hill Climbing Part #2 06 minLecture3.7
-
Genetic Algorithm 06 minLecture3.8
-
Genetic Algorithm Max one Problem Solved Example 09 minLecture3.9
-
Min Max Solved Example 07 minLecture3.10
-
Alpha-Beta Pruning Solved Example 14 minLecture3.11
-
-
Artificial Intelligence [Module 4]:-Knowledge and Reasoning 7
-
Propositional Logic (PL) Introduction 08 minLecture4.1
-
PL to CNF Conversion With Solved Example 10 minLecture4.2
-
First-Order Logic (FOL) Solved Example 06 minLecture4.3
-
Resolution Tree Sum Part #1 09 minLecture4.4
-
Resolution Tree Sum Part #2 15 minLecture4.5
-
Bayesian Belief Network 16 minLecture4.6
-
Bayesian Network toothache and Cavity sum 12 minLecture4.7
-
-
Artificial Intelligence [Module 5]:- Planning and Learning 2
-
Partial Order Planning with Example 11 minLecture5.1
-
Supervised and Unsupervised Learning 07 minLecture5.2
-
-
Artificial Intelligence [Module 6]:- AI Applications 4
-
Introduction to Natural Language Processing 12 minLecture6.1
-
Parsing in NLP 06 minLecture6.2
-
Phases in NLP 08 minLecture6.3
-
Expert System 10 minLecture6.4
-
-
Artificial Intelligence [ Importance And Solutions ] 7
-
AI Importance Module Wise 2023Lecture7.1
-
AI IMP Module 1 SolutionLecture7.2
-
AI Imp Module 2 SolutionLecture7.3
-
AI IMP Module 3 SolutionLecture7.4
-
AI IMP Module 4 SolutionLecture7.5
-
AI IMP Module 5 SolutionLecture7.6
-
AI IMP Module 6 SolutionLecture7.7
-
-
Artificial Intelligence [Extra]:- 3
-
Heuristic function (block world and 8 Puzzle ) 13 minLecture8.1
-
Decision Tree Solved Example 24 minLecture8.2
-
Wumpus World 09 minLecture8.3
-
-
Mobile Computing [Module 1]:- Introduction to Mobile Computing 3
-
Introduction to Mobile Computing 06 minLecture9.1
-
Multiplexing 08 minLecture9.2
-
Frequency Reuse Concept 09 minLecture9.3
-
-
Mobile Computing [Module 2]:- GSM Mobile services 4
-
GSM architecture 20 minLecture10.1
-
Privacy and Authentication in GSM 08 minLecture10.2
-
GPRS Architecture 09 minLecture10.3
-
3G UMTS architecture 05 minLecture10.4
-
-
Mobile Computing [Module 3]:- Mobile Networking 5
-
Mobile IP and Packet through tunnel working 05 minLecture11.1
-
IP Address v/s MAC Address 09 minLecture11.2
-
IPv4 Header Format 13 minLecture11.3
-
IPv6 11 minLecture11.4
-
IPv4 vs IPv6 10 minLecture11.5
-
-
Mobile Computing [Module 4]:- Wireless Local Area Networks 6
-
IEEE 802.11 Architecture 09 minLecture12.1
-
IEEE 802.11 Protocol Architecture 11 minLecture12.2
-
Wifi Security – Wired Equivalent Privacy (WEP) 09 minLecture12.3
-
Wireless LAN Threats and Security 09 minLecture12.4
-
WiFi Protected Access 06 minLecture12.5
-
Bluetooth Architecture 06 minLecture12.6
-
-
Mobile Computing [Module 5]:- Mobility Management 4
-
Macro Mobility- MIPv6 and FMIPv6 08 minLecture13.1
-
Micro Mobility- HAWAII Architecture 07 minLecture13.2
-
Micro Mobility- HMIPv6 Hierarchical MIPv6 06 minLecture13.3
-
Cellular IP Standard 06 minLecture13.4
-
-
Mobile Computing [Module 6]:- Long-Term Evolution (LTE) of 3GPP 5
-
SAE/LTE Architecture Part #1 12 minLecture14.1
-
SAE/LTE Architecture Part #2 07 minLecture14.2
-
VoLTE 09 minLecture14.3
-
Self-Organizing Networks (SON) Framework 08 minLecture14.4
-
5G Introduction 08 minLecture14.5
-
-
Mobile Computing [ Importance And Solutions ] 8
-
MC Importance Module WiseLecture15.1
-
Importance Solution – Module 01Lecture15.2
-
Importance Solution – Module 02Lecture15.3
-
Importance Solution – Module 03Lecture15.4
-
Importance Solution – Module 04Lecture15.5
-
Importance Solution – Module 05Lecture15.6
-
Importance Solution – Module 06Lecture15.7
-
Top 10 Important Questions – Mobile ComputingLecture15.8
-
-
Cryptography & System Security [ Module 1]:- Introduction - Number Theory and Basic 11
-
Introduction to Cryptography and Security System 09 minLecture16.1
-
Security Goals and Mechanism 10 minLecture16.2
-
Symmetric Cipher 02 minLecture16.3
-
Mono Alphabetic Cipher 08 minLecture16.4
-
Poly Alphabetic Cipher 07 minLecture16.5
-
Substitution Cipher 14 minLecture16.6
-
Transposition Cipher 07 minLecture16.7
-
Euler’s Phi Function (Coming Soon)Lecture16.8
-
Playfair-Cipher- numerical PYQ 24 minLecture16.9
-
HILL-CIPHER PYQ 18 minLecture16.10
-
Steganography 11 minLecture16.11
-
-
Cryptography & System Security [ Module 2]:- Symmetric and Asymmetric key Cryptograp 11
-
Block Cipher and Modes of Block Cipher Part 1 20 minLecture17.1
-
Block Cipher and Modes of Block Cipher Part 2 18 minLecture17.2
-
Stream and Block Cipher 04 minLecture17.3
-
DES Algorithm Full Working 12 minLecture17.4
-
DES key Generation Explain Step by Step 11 minLecture17.5
-
AES Algorithm Full working 26 minLecture17.6
-
Modes of Operation 08 minLecture17.7
-
Public Key cryptogrpahy 03 minLecture17.8
-
RSA Algorithm with Solved Example 14 minLecture17.9
-
Diffie Hellman 07 minLecture17.10
-
How to find modulus of Exponential Number (high power value ) 12 minLecture17.11
-
-
Cryptography & System Security [ Module 3]:- Cryptographic Hash Functions 5
-
Hash-Function & its Properties 13 minLecture18.1
-
SHA-1 Algorithm Full Working 23 minLecture18.2
-
MD5 (Message Digest Algorithm) 24 minLecture18.3
-
MAC 07 minLecture18.4
-
Digital Certificate and X.509 10 minLecture18.5
-
-
Cryptography & System Security [ Module 4]:- Authentication Protocols & Digital Sign 3
-
Authentication-Protocol 13 minLecture19.1
-
Kerberos 08 minLecture19.2
-
Digital Signature Full working Explained 19 minLecture19.3
-
-
Cryptography & System Security [ Module 5]:- Network Security and Applications 6
-
DOS and DDOS Attack 10 minLecture20.1
-
SSL ( Secure Socket Layer protocol ) 18 minLecture20.2
-
IPSEC introduction 17 minLecture20.3
-
IP SEC Security Protocols 14 minLecture20.4
-
IPSEC Modes of Operation 10 minLecture20.5
-
IDS and its Types 12 minLecture20.6
-
-
Cryptography & System Security [ Module 6]:- System Security 6
-
Buffer Overflow and Buffer Overflow attack 10 minLecture21.1
-
Malicious Software ( Virus and worms ) 13 minLecture21.2
-
Virus and worms 13 minLecture21.3
-
SQL Injection 07 minLecture21.4
-
Web-Security 14 minLecture21.5
-
Web-Browser Attack 16 minLecture21.6
-
-
Cryptography & System Security [ Importance And Solutions ] 9
-
10 Most Important Question of CSSLecture22.1
-
CSS Importance Module WiseLecture22.2
-
CSS IMP Module 1 SolutionLecture22.3
-
CSS IMP Module 2 SolutionLecture22.4
-
CSS IMP Module 3 SolutionLecture22.5
-
CSS IMP Module 4 SolutionLecture22.6
-
CSS IMP Module 5 SolutionLecture22.7
-
CSS IMP Module 6 SolutionLecture22.8
-
CSS IMP Complete Solution 2024Lecture22.9
-
-
Cryptography & System Security [ Notes ] 9
-
Module 1 – Basics of CryptographyLecture23.1
-
Module 1 – Monoalphabetic and polyalphabetic CipherLecture23.2
-
Module 2 – Block Cipher and Stream CipherLecture23.3
-
Module 2 – Modes of OperationsLecture23.4
-
Module 2 – DES AlgorithmLecture23.5
-
Module 2 – Public Key Cryptography , RSA and Deffie HelmanLecture23.6
-
Module 3 – Cryptographic Hash FunctionLecture23.7
-
Module 5 – Network Security and Applications Part 1Lecture23.8
-
Module 5 – Network Security and Applications Part 2Lecture23.9
-
-
System Programming and Compiler Construction [Module 1]:- Introduction to System Software 1
-
System Programming and Compiler Design Introduction 14 minLecture24.1
-
-
System Programming and Compiler Construction [Module 2]:- Assembler 4
-
What is Assembler and Assembly Language 08 minLecture25.1
-
Forward reference problem 10 minLecture25.2
-
Assembly language statement 08 minLecture25.3
-
Flow chart of two pass assembler 15 minLecture25.4
-
-
System Programming and Compiler Construction [Module 3]:-Macros and Macro Processor 3
-
Macros and Macro-processors 11 minLecture26.1
-
Macro vs Subroutine 09 minLecture26.2
-
Macros pass 1 and pass 2 flowchart 11 minLecture26.3
-
-
System Programming and Compiler Construction [Module 4]:- Loaders and Linkers 5
-
Loaders 07 minLecture27.1
-
Linkers 06 minLecture27.2
-
Compile and go loader, General Loader and Absolute Loader 06 minLecture27.3
-
Subroutine Linkage, Relocating Loader and Direct Link Loader 07 minLecture27.4
-
Dynamic Loading Loader, Dynamic Linking Loader and Linkage Editor_1 06 minLecture27.5
-
-
System Programming and Compiler Construction [Module 5]:- Compilers: Analysis Phase 14
-
Phases of compiler 09 minLecture28.1
-
Eliminate left recursion and left factoring 07 minLecture28.2
-
How to Find First and Follow Basics (part 1) 09 minLecture28.3
-
First and Follow solved example (part 2) 17 minLecture28.4
-
First and Follow solved example (Part 3) 05 minLecture28.5
-
Predictive Parser (Part 1) 16 minLecture28.6
-
Predictive Parser (Part 2) 11 minLecture28.7
-
Recursive Descent parser with solved example 07 minLecture28.8
-
Operator Precedence Parser with Solved Example(part 1) 21 minLecture28.9
-
Operator Precedence Parser with Solved Example (part 2) 12 minLecture28.10
-
LR Parsing | LR (0) item | LR (0) Parsing table solved Example 31 minLecture28.11
-
SLR (1) parsing with solved example| SLR (1) parsing table | 12 minLecture28.12
-
Examples of LR(0) or SLR(1) 16 minLecture28.13
-
CLR1 and LALR1 with Solved Example 28 minLecture28.14
-
-
System Programming and Compiler Construction [Module 6]:- Compilers: Synthesis phase 5
-
DAG(direct a cyclic graph) 04 minLecture29.1
-
Yacc (Yet another compiler compiler ) 05 minLecture29.2
-
Activation Records in Compiler Design 11 minLecture29.3
-
Synthesized & Inherited Attributes 07 minLecture29.4
-
Peep Hole Optimization 08 minLecture29.5
-
-
System Programming and Compiler Construction [ Notes ] 10
-
Module 01 – System SoftwareLecture30.1
-
Module 02 – AssemblerLecture30.2
-
Module 03 – Macros and MacroprocessorsLecture30.3
-
Module 04 – Loaders and LinkersLecture30.4
-
Module 5 – Part 1 – CompilersLecture30.5
-
Module 5 – Part 2 – Lexical AnalysisLecture30.6
-
Module 5 – Part 3 – Syntax AnalysisLecture30.7
-
Module 6 – Part 1 – Intermediate Code GenerationLecture30.8
-
Module 6 – Part 2 – Code GenerationLecture30.9
-
Module 6 – Part 3 – Code OptimizationLecture30.10
-
-
System Programming and Compiler Construction [ Importance And Solutions ] 7
-
SPCC IMP QuestionsLecture31.1
-
SPCC IMP Solution Module 1Lecture31.2
-
SPCC IMP Solution Module 2Lecture31.3
-
SPCC IMP Solution Module 3Lecture31.4
-
SPCC IMP Solution Module 4Lecture31.5
-
SPCC IMP Solution Module 5Lecture31.6
-
SPCC IMP Solution Module 6Lecture31.7
-
This content is protected, please login and enroll course to view this content!
Prev
IPv4 Header Format
Next
IPv4 vs IPv6

