Gate Smashers

Videos from Gate Smashers

Page 6 of 7 • 154 total videos

12:24

Genetic Algorithm in Artificial Intelligence in Hindi | Simplest Explanation with real life examples

Gate Smashers
994.2K views
9:28

आर्टिफिशियल इंटेलिजेंस में सुपरवाइज्ड, अनसुपरवाइज्ड और रिइन्फोर्समेंट लर्निंग – आसान हिंदी में 📚

Gate Smashers
1.4M views
10:11

Understanding Cloud Computing Service Models: SaaS, PaaS, and IaaS Explained in Hindi ☁️

Gate Smashers
810.5K views
20:59

Mock Test 8: Discrete Maths & Optimization for NTA UGC NET/JRF CS | Must Watch 📚

Gate Smashers
49.0K views
5:18

Lec-86: Application (Proxy) Firewall Explained in Hindi | Network Security Part-2

Gate Smashers
257.6K views
13:45

Understanding Firewalls: How Packet Filtering Firewalls Work 🔥 | Hindi Explained Part 1

Gate Smashers
820.3K views
11:20

Introduction to Neural Networks with Example in Hindi | Artificial Intelligence

Gate Smashers
1.3M views
13:03

Fuzzy Logic in AI: Examples & Insights 🤖

Gate Smashers
1.0M views
11:28

RSA Algorithm in Network Security Explained with Examples (Hindi) 🔐

Gate Smashers
1.0M views
13:14

NTA UGC NET CS: Complete Solution for Assignment-8 in Theory of Computation 📚

Gate Smashers
7.1K views
9:13

Lec-5: Depth First Search (DFS) with Example | Uninformed Search in Artificial Intelligence

Gate Smashers
1.7M views
8:26

Network Security Important Questions | Symmetric Key Cryptography 🔐

Gate Smashers
153.9K views
8:29

User vs Kernel Level Threads in OS 🖥️

Gate Smashers
1.0M views
9:22

Understanding DNS in Computer Networks: A Complete Guide 🔍

Gate Smashers
1.3M views
6:46

L-1.10: User mode and Kernel mode in operating system in hindi

Gate Smashers
1.3M views
11:03

Fundamentals of Graph Theory: Essential Concepts for GATE and UGC NET

Gate Smashers
791.9K views
12:52

L-1.6: Time Complexities of Searching and Sorting Algorithms Explained

Gate Smashers
1.1M views
12:42

Lec-29: Cyclic Redundancy Check (CRC) for Error Detection and Correction | Computer Networks

Gate Smashers
1.9M views
10:43

Understanding Network Topologies: Mesh, Star, Bus & More | Lec-5 Part-1 🔗

Gate Smashers
1.2M views
8:23

Asymmetric Key Cryptography Explained with Examples 🔐 | Network Security Basics

Gate Smashers
547.8K views
6:14

Understanding Symmetric Key Cryptography in Network Security 🔐

Gate Smashers
663.8K views
7:39

Cryptography in Computer Networks | Hindi Tutorial on Information Security 🔐

Gate Smashers
1.2M views
7:52

SJF Preemption Scheduling Question Explained 🕒

Gate Smashers
952.8K views
10:30

L-2.8: Pre-emptive Priority Scheduling Algorithm with Example | Operating System

Gate Smashers
2.1M views