-
Artificial Intelligence [Module 2]:- Intelligent Agent 3
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
-
Artificial Intelligence [Module 3]:- Problem solving 11
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
Lecture2.9
-
Lecture2.10
-
Lecture2.11
-
-
Artificial Intelligence [Module 4]:-Knowledge and Reasoning 7
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
-
Artificial Intelligence [Module 5]:- Planning and Learning 2
-
Lecture4.1
-
Lecture4.2
-
-
Artificial Intelligence [Module 6]:- AI Applications 4
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
-
Artificial Intelligence [ Importance And Solutions ] 7
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
-
Artificial Intelligence [Extra]:- 3
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
-
Mobile Computing [Module 1]:- Introduction to Mobile Computing 3
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
-
Mobile Computing [Module 2]:- GSM Mobile services 4
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
-
Mobile Computing [Module 3]:- Mobile Networking 5
-
Lecture10.1
-
Lecture10.2
-
Lecture10.3
-
Lecture10.4
-
Lecture10.5
-
-
Mobile Computing [Module 4]:- Wireless Local Area Networks 6
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
Lecture11.5
-
Lecture11.6
-
-
Mobile Computing [Module 5]:- Mobility Management 4
-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
-
Mobile Computing [Module 6]:- Long-Term Evolution (LTE) of 3GPP 5
-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
Lecture13.4
-
Lecture13.5
-
-
Mobile Computing [ Importance And Solutions ] 8
-
Lecture14.1
-
Lecture14.2
-
Lecture14.3
-
Lecture14.4
-
Lecture14.5
-
Lecture14.6
-
Lecture14.7
-
Lecture14.8
-
-
Cryptography & System Security [ Module 1]:- Introduction - Number Theory and Basic 7
-
Lecture15.1
-
Lecture15.2
-
Lecture15.3
-
Lecture15.4
-
Lecture15.5
-
Lecture15.6
-
Lecture15.7
-
-
Cryptography & System Security [ Module 2]:- Symmetric and Asymmetric key Cryptograp 9
-
Lecture16.1
-
Lecture16.2
-
Lecture16.3
-
Lecture16.4
-
Lecture16.5
-
Lecture16.6
-
Lecture16.7
-
Lecture16.8
-
Lecture16.9
-
-
Cryptography & System Security [ Module 3]:- Cryptographic Hash Functions 4
-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
Lecture17.4
-
-
Cryptography & System Security [ Module 4]:- Authentication Protocols & Digital Sign 2
-
Lecture18.1
-
Lecture18.2
-
-
Cryptography & System Security [ Module 5]:- Network Security and Applications 6
-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
Lecture19.5
-
Lecture19.6
-
-
Cryptography & System Security [ Module 6]:- System Security 4
-
Lecture20.1
-
Lecture20.2
-
Lecture20.3
-
Lecture20.4
-
-
Cryptography & System Security [ Importance And Solutions ] 9
-
Lecture21.1
-
Lecture21.2
-
Lecture21.3
-
Lecture21.4
-
Lecture21.5
-
Lecture21.6
-
Lecture21.7
-
Lecture21.8
-
Lecture21.9
-
-
Cryptography & System Security [ Notes ] 9
-
Lecture22.1
-
Lecture22.2
-
Lecture22.3
-
Lecture22.4
-
Lecture22.5
-
Lecture22.6
-
Lecture22.7
-
Lecture22.8
-
Lecture22.9
-
-
System Programming and Compiler Construction [Module 1]:- Introduction to System Software 1
-
Lecture23.1
-
-
System Programming and Compiler Construction [Module 2]:- Assembler 4
-
Lecture24.1
-
Lecture24.2
-
Lecture24.3
-
Lecture24.4
-
-
System Programming and Compiler Construction [Module 3]:-Macros and Macro Processor 3
-
Lecture25.1
-
Lecture25.2
-
Lecture25.3
-
-
System Programming and Compiler Construction [Module 4]:- Loaders and Linkers 5
-
Lecture26.1
-
Lecture26.2
-
Lecture26.3
-
Lecture26.4
-
Lecture26.5
-
-
System Programming and Compiler Construction [Module 5]:- Compilers: Analysis Phase 14
-
Lecture27.1
-
Lecture27.2
-
Lecture27.3
-
Lecture27.4
-
Lecture27.5
-
Lecture27.6
-
Lecture27.7
-
Lecture27.8
-
Lecture27.9
-
Lecture27.10
-
Lecture27.11
-
Lecture27.12
-
Lecture27.13
-
Lecture27.14
-
-
System Programming and Compiler Construction [Module 6]:- Compilers: Synthesis phase 5
-
Lecture28.1
-
Lecture28.2
-
Lecture28.3
-
Lecture28.4
-
Lecture28.5
-
-
System Programming and Compiler Construction [ Notes ] 10
-
Lecture29.1
-
Lecture29.2
-
Lecture29.3
-
Lecture29.4
-
Lecture29.5
-
Lecture29.6
-
Lecture29.7
-
Lecture29.8
-
Lecture29.9
-
Lecture29.10
-
-
System Programming and Compiler Construction [ Importance And Solutions ] 7
-
Lecture30.1
-
Lecture30.2
-
Lecture30.3
-
Lecture30.4
-
Lecture30.5
-
Lecture30.6
-
Lecture30.7
-
This content is protected, please login and enroll course to view this content!
Next
Diffie Hellman