Gate Smashers
Videos from Gate Smashers
Page 5 of 6 • 128 total videos

12:20
Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points
Gate Smashers
1.1M views

8:11
What is Constraint Satisfaction | Constraint Satisfaction Problem (CSP) in AI with Example
Gate Smashers
803.7K views

10:47
Lec-2: What is State Space Search | Introduction to Problem Solving in Artificial Intelligence
Gate Smashers
1.3M views

5:12
Question on Mathematical Logic | Discrete Maths | UGC NTA NET May/June 2021
Gate Smashers
43.6K views

9:40
L-1.2: Von Neumann's Architecture | Stored Memory Concept in Computer Architecture
Gate Smashers
1.7M views

9:28
Supervised, Unsupervised and Reinforcement Learning in Artificial Intelligence in Hindi
Gate Smashers
1.4M views

10:11
Lec-8:Cloud Computing Services Models - Saas, Paas and Iaas explained in Hindi
Gate Smashers
810.5K views

20:59
Mock Test-8: Discrete Maths and Optimization | NTA UGC NET/JRF Computer Science May2021 | Must Watch
Gate Smashers
49.0K views

5:18
Lec-86: Application (Proxy) Firewall Explained in Hindi | Network Security Part-2
Gate Smashers
257.6K views

13:45
Lec-85: What is Firewalls and How it Works | Packet Filtering firewall explained in Hindi Part-1
Gate Smashers
820.3K views

11:20
Introduction to Neural Networks with Example in Hindi | Artificial Intelligence
Gate Smashers
1.3M views

11:28
Lec-84: RSA Algorithm in Network Security with examples in Hindi rsa algorithm example in hindi
Gate Smashers
1.0M views

13:14
Solution of Assignment-8 of Theory of Computation for NTA UGC NET Computer Science
Gate Smashers
7.1K views

9:13
Lec-5: Depth First Search (DFS) with Example | Uninformed Search in Artificial Intelligence
Gate Smashers
1.7M views

8:26
Lec-82: Imp Question on Network Security | Symmetric Key Cryptography
Gate Smashers
153.9K views

9:22
Lec-76: Domain Name System (DNS) in computer Networks
Gate Smashers
1.3M views

11:03
Fundamentals of Graph Theory: Essential Concepts for GATE and UGC NET
Gate Smashers
791.9K views

12:52
L-1.6: Time Complexities of Searching and Sorting Algorithms Explained
Gate Smashers
1.1M views

12:42
Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks
Gate Smashers
1.9M views

10:43
Lec-5: Topologies in Computer Networks | Part-1 | All imp points of Mesh, Star, Hub, Bus, Hybrid
Gate Smashers
1.2M views

8:23
Lec-83: Asymmetric key Cryptography with example | Network Security
Gate Smashers
547.8K views

6:14
Lec-81: Symmetric Key Cryptography in Network Security with examples
Gate Smashers
663.8K views

7:39
Lec-80: Cryptography in computer network in Hindi | Cryptography in Information Security
Gate Smashers
1.2M views

10:30
L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System
Gate Smashers
2.1M views