Search Results for "lec"
Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "lec"
50 results found

52:51
Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
566.0K views

7:01
Algorithm Vs #Program & Algorithm Vs Pseudocode | Lec 6 | Design & Analysis of Algorithm
CSE Guru
2.9K views

49:27
Mod-01 Lec-03 GRAMMARS AND LANGUAGES GENERATED (Contd)
nptelhrd
61.6K views

51:52
Mod-01 Lec-01 What is theory of computation?
nptelhrd
297.5K views

5:18
Lec-3: What is Automata in TOC | Theory of Computation
Gate Smashers
1.3M views

0:53
Rekkles: I go to war with Oscarinin. I believe in him. #fnatic #leagueoflegends #rekkles #lec
FNATIC
677.0K views

23:41
TY BSc-IT - NS Unit 1 - Lec 4 - CRYPTOGRAPHY TECHNIQUES, Substitution, Transposition, Ceasar Cipher
Tirup Parmar
887 views

55:11
Mod-01 Lec-06 REMOVAL OF UNIT PRODUCTIONS , CHOMSKY NORMAL FORM FOR CFG
nptelhrd
48.7K views

58:25
Mod-04 Lec-23 PUSHDOWN AUTOMATA PDA TO CFG
nptelhrd
60.3K views

54:08
Mod-02 Lec-03 Regular Grammars
nptelhrd
3.6K views

1:10:33
Mod-01 Lec-34 Turing machines (TM): motivation, informal definition, example, transition diagram.
nptelhrd
39.2K views

4:37
Lec-6: Linear Regression Vs. Logistic Regression | Supervised Learning | Machine Learning
Gate Smashers
304.7K views

31:27
23. | Lec-4 Buldign Blocks | Module-3 Cryptography | Cyber Security | In Hindi
Aalsi Hacker
24 views

11:53
Lec 5: How to write an Algorithm | DAA
Jenny's Lectures CS IT
1.1M views

48:53
Mod-10 Lec-02 PDA CFG
nptelhrd
1.2K views

6:40
Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!
Gate Smashers
64.5K views

39:17
29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi
Aalsi Hacker
53 views

13:14
Lec-6: What is DFA in TOC with examples in hindi
Gate Smashers
2.0M views

13:30
Deep Learning(CS7015): Lec 2.8 Representation Power of a Network of Perceptrons
NPTEL-NOC IITM
92.5K views

4:44
DFA Example | Solution | Part-3/3 | TOC | Lec-12 | Bhanu Priya
Education 4u
559.1K views

52:03
Mod-04 Lec-01 Myhill-Nerode Theorem
nptelhrd
3.6K views

20:29
Lec-3:Cryptography Algorithm- DES, Triple-DES, AES, IDEA, RSA (Network Security)| #computeranudeshak
Sunil yadav sir Computech
8.3K views

8:30
TOC introduction | TOC | Lec-01 | Bhanu Priya
Education 4u
652.9K views

20:03
Intro to Cryptography: Symmetric & Asymmetric Encryption, Hashing, and Steganography | Lec 3
hackthecode
53 views

20:54
Lec-8: Protection & Security in Operating system | Full OS playlist
Gate Smashers
457.3K views

9:01
Lec-13: What is NFA in TOC in Hindi | Non Deterministic Finite Automata
Gate Smashers
1.3M views

7:26
Lec-12: DFA of all binary strings divisible by 3 | DFA Example 5
Gate Smashers
1.1M views

11:52
Lec-14: RE to NFA-Ɛ | Simplest steps to convert RE to NFA-epsilon | YZTutorials
YZ Tutorials
279 views

35:19
Lec 35: Logistic regression
NPTEL IIT Guwahati
9.5K views

22:30
Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering
Computer_IT_ICT Engineering Department : LJIET
90 views

26:37
ENGINEERING MATHS 1- PARTIAL DIFFERENTIATION LEC 1 | FIRST YEAR ENGINEERING SEM 1 | DINESH SIR
DINESH SIR Live Study
81.6K views

27:23
Cryptography & Network Security | Unit-2 | Lec-3 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions
Multi Atoms
9.4K views

19:01
Lec-11: Regular Expressions in Automata (part3), How to Make RE, Examples| Question Solved
YZ Tutorials
164 views

41:57
Cryptography & Network Security | Unit-2 | Lec-4 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions
Multi Atoms
9.8K views

55:30
Mod-01 Lec-15 Decision problems for regular languages.
nptelhrd
12.3K views

5:46
DFA Example | Solution | Part - 2/3 | TOC | Lec-11 | Bhanu Priya
Education 4u
304.4K views

13:13
Lec-51: Design PDA for 0^n1^2n CFL Language | Very Important| Must Watch
Gate Smashers
1.2M views

49:07
Mod-02 Lec-01 Grammars (CFG)
nptelhrd
3.0K views

7:31
Lec-23: Supervised vs Unsupervised learning with real life example
Gate Smashers
194.0K views

7:57
Lec-45: Decidability & Undecidability table in toc for all languages
Gate Smashers
266.7K views

5:35
NFA and DFA differences | TOC | Lec-18 | Bhanu Priya
Education 4u
118.2K views

2:43
HERE TO SAVE THE LEC | Poby joins FNATIC
FNATIC
52.7K views

52:17
Mod-12 Lec-01 Structured Grammars
nptelhrd
1.2K views

14:11
Complexity Classes (P, NP, NP-Hard, NP-Complete) | 11th Computer - Ch 3 - Lec 5
Academics with AB
10.2K views

10:46
Lec-68: Conversion from Epsilon ε-NFA to DFA with example | Eliminate Epsilon ε-moves
Gate Smashers
590.1K views

29:01
Cryptography & Network Security | Unit-3 | Lec-1 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions
Multi Atoms
12.1K views

9:57
Conversion of NFA to DFA example | Part-2/2 | TOC | Lec-20 | Bhanu Priya
Education 4u
268.8K views

7:02
Convert Regular Expression to Finite Automata | TOC | Lec-42 | Bhanu Priya
Education 4u
422.5K views

16:51
LEC 16 ||Security Against Chosen Ciphertext Attacks
fahad osman
592 views

6:28
NFA example | Part-2/3 | TOC | Lec-15 | Bhanu Priya
Education 4u
187.8K views