Gate Smashers

Videos from Gate Smashers

Page 5 of 6 • 128 total videos

Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points
12:20

Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points

Gate Smashers
1.1M views
What is Constraint Satisfaction | Constraint Satisfaction Problem (CSP) in AI with Example
8:11

What is Constraint Satisfaction | Constraint Satisfaction Problem (CSP) in AI with Example

Gate Smashers
803.7K views
Lec-2: What is State Space Search | Introduction to Problem Solving in Artificial Intelligence
10:47

Lec-2: What is State Space Search | Introduction to Problem Solving in Artificial Intelligence

Gate Smashers
1.3M views
Question on Mathematical Logic | Discrete Maths | UGC NTA NET May/June 2021
5:12

Question on Mathematical Logic | Discrete Maths | UGC NTA NET May/June 2021

Gate Smashers
43.6K views
L-1.2: Von Neumann's Architecture | Stored Memory Concept in Computer Architecture
9:40

L-1.2: Von Neumann's Architecture | Stored Memory Concept in Computer Architecture

Gate Smashers
1.7M views
Supervised, Unsupervised and Reinforcement Learning in Artificial Intelligence in Hindi
9:28

Supervised, Unsupervised and Reinforcement Learning in Artificial Intelligence in Hindi

Gate Smashers
1.4M views
Lec-8:Cloud Computing Services Models - Saas, Paas and Iaas explained in Hindi
10:11

Lec-8:Cloud Computing Services Models - Saas, Paas and Iaas explained in Hindi

Gate Smashers
810.5K views
Mock Test-8: Discrete Maths and Optimization | NTA UGC NET/JRF Computer Science May2021 | Must Watch
20:59

Mock Test-8: Discrete Maths and Optimization | NTA UGC NET/JRF Computer Science May2021 | Must Watch

Gate Smashers
49.0K views
Lec-86: Application (Proxy) Firewall Explained in Hindi | Network Security Part-2
5:18

Lec-86: Application (Proxy) Firewall Explained in Hindi | Network Security Part-2

Gate Smashers
257.6K views
Lec-85: What is Firewalls and How it Works | Packet Filtering firewall explained in Hindi Part-1
13:45

Lec-85: What is Firewalls and How it Works | Packet Filtering firewall explained in Hindi Part-1

Gate Smashers
820.3K views
Introduction to Neural Networks with Example in Hindi | Artificial Intelligence
11:20

Introduction to Neural Networks with Example in Hindi | Artificial Intelligence

Gate Smashers
1.3M views
Lec-84: RSA Algorithm in Network Security with examples in Hindi rsa algorithm example in hindi
11:28

Lec-84: RSA Algorithm in Network Security with examples in Hindi rsa algorithm example in hindi

Gate Smashers
1.0M views
Solution of Assignment-8 of Theory of Computation for NTA UGC NET Computer Science
13:14

Solution of Assignment-8 of Theory of Computation for NTA UGC NET Computer Science

Gate Smashers
7.1K views
Lec-5: Depth First Search (DFS) with Example | Uninformed Search in Artificial Intelligence
9:13

Lec-5: Depth First Search (DFS) with Example | Uninformed Search in Artificial Intelligence

Gate Smashers
1.7M views
Lec-82: Imp Question on Network Security | Symmetric Key Cryptography
8:26

Lec-82: Imp Question on Network Security | Symmetric Key Cryptography

Gate Smashers
153.9K views
Lec-76: Domain Name System (DNS) in computer Networks
9:22

Lec-76: Domain Name System (DNS) in computer Networks

Gate Smashers
1.3M views
Fundamentals of Graph Theory: Essential Concepts for GATE and UGC NET
11:03

Fundamentals of Graph Theory: Essential Concepts for GATE and UGC NET

Gate Smashers
791.9K views
L-1.6: Time Complexities of Searching and Sorting Algorithms Explained
12:52

L-1.6: Time Complexities of Searching and Sorting Algorithms Explained

Gate Smashers
1.1M views
Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks
12:42

Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks

Gate Smashers
1.9M views
Lec-5: Topologies in Computer Networks | Part-1 | All imp points of Mesh, Star, Hub, Bus, Hybrid
10:43

Lec-5: Topologies in Computer Networks | Part-1 | All imp points of Mesh, Star, Hub, Bus, Hybrid

Gate Smashers
1.2M views
Lec-83: Asymmetric key Cryptography with example | Network Security
8:23

Lec-83: Asymmetric key Cryptography with example | Network Security

Gate Smashers
547.8K views
Lec-81: Symmetric Key Cryptography in Network Security with examples
6:14

Lec-81: Symmetric Key Cryptography in Network Security with examples

Gate Smashers
663.8K views
Lec-80: Cryptography in computer network in Hindi | Cryptography in Information Security
7:39

Lec-80: Cryptography in computer network in Hindi | Cryptography in Information Security

Gate Smashers
1.2M views
L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System
10:30

L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System

Gate Smashers
2.1M views