Gate Smashers
Videos from Gate Smashers
Page 6 of 7 • 154 total videos
12:24
Genetic Algorithm in Artificial Intelligence in Hindi | Simplest Explanation with real life examples
Gate Smashers
994.2K views
9:28
आर्टिफिशियल इंटेलिजेंस में सुपरवाइज्ड, अनसुपरवाइज्ड और रिइन्फोर्समेंट लर्निंग – आसान हिंदी में 📚
Gate Smashers
1.4M views
10:11
Understanding Cloud Computing Service Models: SaaS, PaaS, and IaaS Explained in Hindi ☁️
Gate Smashers
810.5K views
20:59
Mock Test 8: Discrete Maths & Optimization for NTA UGC NET/JRF CS | Must Watch 📚
Gate Smashers
49.0K views
5:18
Lec-86: Application (Proxy) Firewall Explained in Hindi | Network Security Part-2
Gate Smashers
257.6K views
13:45
Understanding Firewalls: How Packet Filtering Firewalls Work 🔥 | Hindi Explained Part 1
Gate Smashers
820.3K views
11:20
Introduction to Neural Networks with Example in Hindi | Artificial Intelligence
Gate Smashers
1.3M views
13:03
Fuzzy Logic in AI: Examples & Insights 🤖
Gate Smashers
1.0M views
11:28
RSA Algorithm in Network Security Explained with Examples (Hindi) 🔐
Gate Smashers
1.0M views
13:14
NTA UGC NET CS: Complete Solution for Assignment-8 in Theory of Computation 📚
Gate Smashers
7.1K views
9:13
Lec-5: Depth First Search (DFS) with Example | Uninformed Search in Artificial Intelligence
Gate Smashers
1.7M views
8:26
Network Security Important Questions | Symmetric Key Cryptography 🔐
Gate Smashers
153.9K views
8:29
User vs Kernel Level Threads in OS 🖥️
Gate Smashers
1.0M views
9:22
Understanding DNS in Computer Networks: A Complete Guide 🔍
Gate Smashers
1.3M views
6:46
L-1.10: User mode and Kernel mode in operating system in hindi
Gate Smashers
1.3M views
11:03
Fundamentals of Graph Theory: Essential Concepts for GATE and UGC NET
Gate Smashers
791.9K views
12:52
L-1.6: Time Complexities of Searching and Sorting Algorithms Explained
Gate Smashers
1.1M views
12:42
Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks
Gate Smashers
1.9M views
10:43
Understanding Network Topologies: Mesh, Star, Bus & More | Lec-5 Part-1 🔗
Gate Smashers
1.2M views
8:23
Asymmetric Key Cryptography Explained with Examples 🔐 | Network Security Basics
Gate Smashers
547.8K views
6:14
Understanding Symmetric Key Cryptography in Network Security 🔐
Gate Smashers
663.8K views
7:39
Cryptography in Computer Networks | Hindi Tutorial on Information Security 🔐
Gate Smashers
1.2M views
7:52
SJF Preemption Scheduling Question Explained 🕒
Gate Smashers
952.8K views
10:30
L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System
Gate Smashers
2.1M views