Search Results for "lec"

Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "lec"

50 results found

Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007
52:51

Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
566.0K views
Algorithm Vs #Program & Algorithm Vs Pseudocode  | Lec 6 | Design & Analysis of Algorithm
7:01

Algorithm Vs #Program & Algorithm Vs Pseudocode | Lec 6 | Design & Analysis of Algorithm

CSE Guru
2.9K views
Mod-01 Lec-03 GRAMMARS AND LANGUAGES GENERATED (Contd)
49:27

Mod-01 Lec-03 GRAMMARS AND LANGUAGES GENERATED (Contd)

nptelhrd
61.6K views
Mod-01 Lec-01 What is theory of computation?
51:52

Mod-01 Lec-01 What is theory of computation?

nptelhrd
297.5K views
Lec-3: What is Automata in TOC | Theory of Computation
5:18

Lec-3: What is Automata in TOC | Theory of Computation

Gate Smashers
1.3M views
Rekkles: I go to war with Oscarinin. I believe in him. #fnatic #leagueoflegends #rekkles #lec
0:53

Rekkles: I go to war with Oscarinin. I believe in him. #fnatic #leagueoflegends #rekkles #lec

FNATIC
677.0K views
TY BSc-IT - NS Unit 1 - Lec 4 - CRYPTOGRAPHY TECHNIQUES, Substitution, Transposition, Ceasar Cipher
23:41

TY BSc-IT - NS Unit 1 - Lec 4 - CRYPTOGRAPHY TECHNIQUES, Substitution, Transposition, Ceasar Cipher

Tirup Parmar
887 views
Mod-01 Lec-06 REMOVAL OF UNIT PRODUCTIONS , CHOMSKY NORMAL FORM FOR CFG
55:11

Mod-01 Lec-06 REMOVAL OF UNIT PRODUCTIONS , CHOMSKY NORMAL FORM FOR CFG

nptelhrd
48.7K views
Mod-04 Lec-23 PUSHDOWN AUTOMATA PDA TO CFG
58:25

Mod-04 Lec-23 PUSHDOWN AUTOMATA PDA TO CFG

nptelhrd
60.3K views
Mod-02 Lec-03 Regular Grammars
54:08

Mod-02 Lec-03 Regular Grammars

nptelhrd
3.6K views
Mod-01 Lec-34 Turing machines (TM): motivation, informal definition, example, transition diagram.
1:10:33

Mod-01 Lec-34 Turing machines (TM): motivation, informal definition, example, transition diagram.

nptelhrd
39.2K views
Lec-6: Linear Regression Vs. Logistic Regression | Supervised Learning | Machine Learning
4:37

Lec-6: Linear Regression Vs. Logistic Regression | Supervised Learning | Machine Learning

Gate Smashers
304.7K views
23. | Lec-4  Buldign Blocks | Module-3 Cryptography | Cyber Security | In Hindi
31:27

23. | Lec-4 Buldign Blocks | Module-3 Cryptography | Cyber Security | In Hindi

Aalsi Hacker
24 views
Lec 5: How to write an Algorithm | DAA
11:53

Lec 5: How to write an Algorithm | DAA

Jenny's Lectures CS IT
1.1M views
Mod-10 Lec-02 PDA  CFG
48:53

Mod-10 Lec-02 PDA CFG

nptelhrd
1.2K views
Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!
6:40

Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!

Gate Smashers
64.5K views
29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi
39:17

29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi

Aalsi Hacker
53 views
Lec-6: What is DFA in TOC with examples in hindi
13:14

Lec-6: What is DFA in TOC with examples in hindi

Gate Smashers
2.0M views
Deep Learning(CS7015): Lec 2.8 Representation Power of a Network of Perceptrons
13:30

Deep Learning(CS7015): Lec 2.8 Representation Power of a Network of Perceptrons

NPTEL-NOC IITM
92.5K views
DFA Example | Solution | Part-3/3 | TOC  | Lec-12 | Bhanu Priya
4:44

DFA Example | Solution | Part-3/3 | TOC | Lec-12 | Bhanu Priya

Education 4u
559.1K views
Mod-04 Lec-01 Myhill-Nerode Theorem
52:03

Mod-04 Lec-01 Myhill-Nerode Theorem

nptelhrd
3.6K views
Lec-3:Cryptography Algorithm- DES, Triple-DES, AES, IDEA, RSA (Network Security)| #computeranudeshak
20:29

Lec-3:Cryptography Algorithm- DES, Triple-DES, AES, IDEA, RSA (Network Security)| #computeranudeshak

Sunil yadav sir Computech
8.3K views
TOC introduction | TOC | Lec-01 | Bhanu Priya
8:30

TOC introduction | TOC | Lec-01 | Bhanu Priya

Education 4u
652.9K views
Intro to Cryptography: Symmetric & Asymmetric Encryption, Hashing, and Steganography | Lec 3
20:03

Intro to Cryptography: Symmetric & Asymmetric Encryption, Hashing, and Steganography | Lec 3

hackthecode
53 views
Lec-8: Protection & Security in Operating system | Full OS playlist
20:54

Lec-8: Protection & Security in Operating system | Full OS playlist

Gate Smashers
457.3K views
Lec-13: What is NFA in TOC in Hindi | Non Deterministic Finite Automata
9:01

Lec-13: What is NFA in TOC in Hindi | Non Deterministic Finite Automata

Gate Smashers
1.3M views
Lec-12: DFA of all binary strings divisible by 3 | DFA Example 5
7:26

Lec-12: DFA of all binary strings divisible by 3 | DFA Example 5

Gate Smashers
1.1M views
Lec-14: RE to NFA-Ɛ | Simplest steps to convert RE to NFA-epsilon | YZTutorials
11:52

Lec-14: RE to NFA-Ɛ | Simplest steps to convert RE to NFA-epsilon | YZTutorials

YZ Tutorials
279 views
Lec 35: Logistic regression
35:19

Lec 35: Logistic regression

NPTEL IIT Guwahati
9.5K views
Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering
22:30

Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering

Computer_IT_ICT Engineering Department : LJIET
90 views
ENGINEERING MATHS 1- PARTIAL DIFFERENTIATION LEC 1 | FIRST YEAR ENGINEERING SEM 1 | DINESH SIR
26:37

ENGINEERING MATHS 1- PARTIAL DIFFERENTIATION LEC 1 | FIRST YEAR ENGINEERING SEM 1 | DINESH SIR

DINESH SIR Live Study
81.6K views
Cryptography & Network Security | Unit-2 | Lec-3 | One Shot | KCS-074  | Aktu Exams| PYQ Solutions
27:23

Cryptography & Network Security | Unit-2 | Lec-3 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions

Multi Atoms
9.4K views
Lec-11: Regular Expressions in Automata (part3), How to Make RE, Examples| Question Solved
19:01

Lec-11: Regular Expressions in Automata (part3), How to Make RE, Examples| Question Solved

YZ Tutorials
164 views
Cryptography & Network Security | Unit-2 | Lec-4 | One Shot | KCS-074  | Aktu Exams| PYQ Solutions
41:57

Cryptography & Network Security | Unit-2 | Lec-4 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions

Multi Atoms
9.8K views
Mod-01 Lec-15 Decision problems for regular languages.
55:30

Mod-01 Lec-15 Decision problems for regular languages.

nptelhrd
12.3K views
DFA Example | Solution | Part - 2/3 | TOC  | Lec-11 | Bhanu Priya
5:46

DFA Example | Solution | Part - 2/3 | TOC | Lec-11 | Bhanu Priya

Education 4u
304.4K views
Lec-51: Design PDA for 0^n1^2n CFL Language | Very Important| Must Watch
13:13

Lec-51: Design PDA for 0^n1^2n CFL Language | Very Important| Must Watch

Gate Smashers
1.2M views
Mod-02 Lec-01 Grammars (CFG)
49:07

Mod-02 Lec-01 Grammars (CFG)

nptelhrd
3.0K views
Lec-23: Supervised vs Unsupervised learning with real life example
7:31

Lec-23: Supervised vs Unsupervised learning with real life example

Gate Smashers
194.0K views
Lec-45: Decidability & Undecidability table in toc for all languages
7:57

Lec-45: Decidability & Undecidability table in toc for all languages

Gate Smashers
266.7K views
NFA and DFA differences | TOC  | Lec-18 | Bhanu Priya
5:35

NFA and DFA differences | TOC | Lec-18 | Bhanu Priya

Education 4u
118.2K views
HERE TO SAVE THE LEC | Poby joins FNATIC
2:43

HERE TO SAVE THE LEC | Poby joins FNATIC

FNATIC
52.7K views
Mod-12 Lec-01 Structured Grammars
52:17

Mod-12 Lec-01 Structured Grammars

nptelhrd
1.2K views
Complexity Classes (P, NP, NP-Hard, NP-Complete) | 11th Computer - Ch 3 - Lec 5
14:11

Complexity Classes (P, NP, NP-Hard, NP-Complete) | 11th Computer - Ch 3 - Lec 5

Academics with AB
10.2K views
Lec-68: Conversion from Epsilon ε-NFA to DFA with example | Eliminate Epsilon ε-moves
10:46

Lec-68: Conversion from Epsilon ε-NFA to DFA with example | Eliminate Epsilon ε-moves

Gate Smashers
590.1K views
Cryptography & Network Security | Unit-3 | Lec-1 | One Shot | KCS-074  | Aktu Exams| PYQ Solutions
29:01

Cryptography & Network Security | Unit-3 | Lec-1 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions

Multi Atoms
12.1K views
Conversion of NFA to DFA example | Part-2/2 | TOC  | Lec-20 | Bhanu Priya
9:57

Conversion of NFA to DFA example | Part-2/2 | TOC | Lec-20 | Bhanu Priya

Education 4u
268.8K views
Convert Regular Expression to Finite Automata | TOC | Lec-42 | Bhanu Priya
7:02

Convert Regular Expression to Finite Automata | TOC | Lec-42 | Bhanu Priya

Education 4u
422.5K views
LEC 16 ||Security Against Chosen Ciphertext Attacks
16:51

LEC 16 ||Security Against Chosen Ciphertext Attacks

fahad osman
592 views
NFA example | Part-2/3 | TOC  | Lec-15 | Bhanu Priya
6:28

NFA example | Part-2/3 | TOC | Lec-15 | Bhanu Priya

Education 4u
187.8K views