Lec - Videos
Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "lec"
50 results found
5:46
DFA Example | Solution | Part - 2/3 | TOC | Lec-11 | Bhanu Priya
Education 4u
304.4K views
8:41
Lec-11: Regular Expressions in Automata (part 1), How to Make RE, Examples| Question Solved
YZ Tutorials
305 views
12:54
What is deadlock | Necessary Conditions | OS | Lec-63 | Bhanu Priya
Education 4u
616.1K views
7:48
Lec-54: Remove Null Production from CFG (Context Free Grammar) with example in Hindi
Gate Smashers
506.0K views
5:11
Lec 3 Turing Machine Example1
Shibaji Paul
17.8K views
9:28
Lec-127: Introduction to Hadoop🐘| What is Hadoop🐘| Hadoop Framework🖥
Gate Smashers
437.7K views
56:12
Lec 5 | MIT 18.085 Computational Science and Engineering I, Fall 2008
MIT OpenCourseWare
51.2K views
7:02
Convert Regular Expression to Finite Automata | TOC | Lec-42 | Bhanu Priya
Education 4u
422.5K views
16:51
LEC 16 ||Security Against Chosen Ciphertext Attacks
fahad osman
592 views
10:25
Symmetric Key And Asymmetric Key Cryptography With Diagram | Lec-16 | #symmetric #Asymmetric #cns
Concept Clear
227 views
29:04
Lec 3 | History Of Cryptography | Greeks | Romans | Polybius | Ceasar cipher | Hebrew | Al-Kindi
Qasim Ali
325 views
44:55
Lec 11| Encryption | cryptosystem & Services |algorithm | Key | Keyspace | Kirchoff's Principal |
Qasim Ali
343 views
36:59
Lec 36 Network Security, Caesar Cipher, Mono alphabetic Cipher
Chris P Bacon
4 views
10:13
Lec-100: Introduction to B-Tree and its Structure | Block Pointer, Record Pointer, Key
Gate Smashers
1.1M views
9:32
Lec-16 - Network Security - (Playfair Cipher)
Dr. Mohammed Abdalla Youssif
35 views
44:09
Lec 1 | MIT 6.042J Mathematics for Computer Science, Fall 2010
MIT OpenCourseWare
2.7M views
5:54:06
KC vs. FNC | 2025 LEC Summer Playoffs - Lower Round 2
LEC
427.6K views
8:46
Security Mechanisms | Computer Network Security | Information and Cyber Security |Full Course|Lec-04
Abhideep Online Education
11.7K views
47:14
Lec 26 | Link Encryption vs End-to-End Encryption | Email Standard | S/MIME | Privacy Enhanced Mail
Qasim Ali
287 views
12:05
Lec-13: Introduction to NFA (explained) in just 12 minutes! [Full Marks are guaranteed] | Part 1
YZ Tutorials
88 views
52:00
Mod-11 Lec-04 Multi Input
nptelhrd
519 views
22:26
Lec-27 GATE 2017 EE Question Solved
Gatematic by Sohail Sir
44.1K views
10:00
Pushdown Automata | PDA | Example | Part-1/2 | TOC | Lec-82 | Bhanu Priya
Education 4u
529.8K views
1:20:25
Lec 4 | MIT 6.042J Mathematics for Computer Science, Fall 2010
MIT OpenCourseWare
367.1K views
43:38
FNC v KC | 2025 LEC Summer Playoffs - Lower Round 2 | Fnatic vs. Karmine Corp Game 1
LEC
9.3K views
8:19
Lec 2: What is Algorithm and Need of Algorithm | Properties of Algorithm | Algorithm vs Program
Jenny's Lectures CS IT
830.5K views
38:41
Lec 1: Dot product | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
1.8M views
27:54
Lec 2 | History of Cryptography | Scenarios | In Detail with real-time examples
Qasim Ali
333 views
8:29
Lec-28: Regular Expressions for Finite Languages Example 1 | TOC
Gate Smashers
780.6K views
18:08
LEC 17 | Conversion of NFA to DFA | TOC | Automata | Engineering | nfa to dfa | easy explanation
Student Champion
29 views
10:01
Lec-5: Logistic Regression with Simplest & Easiest Example | Machine Learning
Gate Smashers
705.7K views
8:41
Non Deterministic Finite Automata (NFA) | TOC | Lec-13 | Bhanu Priya
Education 4u
359.7K views
29:38
lec 60 fast inverse discrete cosine transform
SUMIT VYAS
851 views
28:57
Lec 48: Discrete Cosine Transform-2
CH 19: IIT BOMBAY 03: Electrical Engineering
12 views
53:46
mod12lec36
NPTEL IIT Delhi
1.9K views
15:04
Lec-48: Understanding Single Layer Perceptron (SLP) with Example | Machine Learning
Gate Smashers
73.2K views
12:13
Lec-40: Network Layer | Responsibilities of Network Layer | OSI Model | Computer Networks
Gate Smashers
1.1M views
6:28
Lec-33: Reversal Operation in toc | How regular languages closured under reversal
Gate Smashers
285.7K views
8:23
Conversion of NFA to DFA examples | Part-1/2 | TOC | Lec-19 | Bhanu Priya
Education 4u
631.5K views
37:46
Lec 53 Lab: Discrete Cosine Transformation
NPTEL - Indian Institute of Science, Bengaluru
968 views
12:28
Lec-14: Linear Search in Data Structure by #Naina Mam | Time Complexity
Gate Smashers
379.9K views
11:43
FNC vs BDS ALL GAMES Highlights | LEC W2D2 Split 3 | Fnatic vs Team BDS
Kaza LoL Esports Highlights
30.8K views
6:59
Lec-13 - Network Security - (Caesar Cipher - Part 1)
Dr. Mohammed Abdalla Youssif
25 views
10:43
Lec-5: Topologies in Computer Networks | Part-1 | All imp points of Mesh, Star, Hub, Bus, Hybrid
Gate Smashers
1.2M views
31:25
Lec 5|| Perfect Secrecy Part II#fahadusman#cryptography
fahad osman
965 views
49:44
Lec 9: Max-min problems; least squares | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
273.0K views
5:50
Lec-35: INIT Operation in TOC
Gate Smashers
157.6K views
34:06
Lec: 02 - Cryptography & Network Security | 10 March
CSE 6th - BSMRSTU
64 views
39:33
Lec 47 Discrete Cosine Transform-1
NPTEL - Indian Institute of Science, Bengaluru
1.8K views
12:00
Lec-31: Pumping lemma for regular languages in TOC with examples
Gate Smashers
1.3M views