Lec - Videos

Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "lec"

50 results found

5:46

DFA Example | Solution | Part - 2/3 | TOC | Lec-11 | Bhanu Priya

Education 4u
304.4K views
8:41

Lec-11: Regular Expressions in Automata (part 1), How to Make RE, Examples| Question Solved

YZ Tutorials
305 views
12:54

What is deadlock | Necessary Conditions | OS | Lec-63 | Bhanu Priya

Education 4u
616.1K views
7:48

Lec-54: Remove Null Production from CFG (Context Free Grammar) with example in Hindi

Gate Smashers
506.0K views
5:11

Lec 3 Turing Machine Example1

Shibaji Paul
17.8K views
9:28

Lec-127: Introduction to Hadoop🐘| What is Hadoop🐘| Hadoop Framework🖥

Gate Smashers
437.7K views
56:12

Lec 5 | MIT 18.085 Computational Science and Engineering I, Fall 2008

MIT OpenCourseWare
51.2K views
7:02

Convert Regular Expression to Finite Automata | TOC | Lec-42 | Bhanu Priya

Education 4u
422.5K views
16:51

LEC 16 ||Security Against Chosen Ciphertext Attacks

fahad osman
592 views
10:25

Symmetric Key And Asymmetric Key Cryptography With Diagram | Lec-16 | #symmetric #Asymmetric #cns

Concept Clear
227 views
29:04

Lec 3 | History Of Cryptography | Greeks | Romans | Polybius | Ceasar cipher | Hebrew | Al-Kindi

Qasim Ali
325 views
44:55

Lec 11| Encryption | cryptosystem & Services |algorithm | Key | Keyspace | Kirchoff's Principal |

Qasim Ali
343 views
36:59

Lec 36 Network Security, Caesar Cipher, Mono alphabetic Cipher

Chris P Bacon
4 views
10:13

Lec-100: Introduction to B-Tree and its Structure | Block Pointer, Record Pointer, Key

Gate Smashers
1.1M views
9:32

Lec-16 - Network Security - (Playfair Cipher)

Dr. Mohammed Abdalla Youssif
35 views
44:09

Lec 1 | MIT 6.042J Mathematics for Computer Science, Fall 2010

MIT OpenCourseWare
2.7M views
5:54:06

KC vs. FNC | 2025 LEC Summer Playoffs - Lower Round 2

LEC
427.6K views
8:46

Security Mechanisms | Computer Network Security | Information and Cyber Security |Full Course|Lec-04

Abhideep Online Education
11.7K views
47:14

Lec 26 | Link Encryption vs End-to-End Encryption | Email Standard | S/MIME | Privacy Enhanced Mail

Qasim Ali
287 views
12:05

Lec-13: Introduction to NFA (explained) in just 12 minutes! [Full Marks are guaranteed] | Part 1

YZ Tutorials
88 views
52:00

Mod-11 Lec-04 Multi Input

nptelhrd
519 views
22:26

Lec-27 GATE 2017 EE Question Solved

Gatematic by Sohail Sir
44.1K views
10:00

Pushdown Automata | PDA | Example | Part-1/2 | TOC | Lec-82 | Bhanu Priya

Education 4u
529.8K views
1:20:25

Lec 4 | MIT 6.042J Mathematics for Computer Science, Fall 2010

MIT OpenCourseWare
367.1K views
43:38

FNC v KC | 2025 LEC Summer Playoffs - Lower Round 2 | Fnatic vs. Karmine Corp Game 1

LEC
9.3K views
8:19

Lec 2: What is Algorithm and Need of Algorithm | Properties of Algorithm | Algorithm vs Program

Jenny's Lectures CS IT
830.5K views
38:41

Lec 1: Dot product | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
1.8M views
27:54

Lec 2 | History of Cryptography | Scenarios | In Detail with real-time examples

Qasim Ali
333 views
8:29

Lec-28: Regular Expressions for Finite Languages Example 1 | TOC

Gate Smashers
780.6K views
18:08

LEC 17 | Conversion of NFA to DFA | TOC | Automata | Engineering | nfa to dfa | easy explanation

Student Champion
29 views
10:01

Lec-5: Logistic Regression with Simplest & Easiest Example | Machine Learning

Gate Smashers
705.7K views
8:41

Non Deterministic Finite Automata (NFA) | TOC | Lec-13 | Bhanu Priya

Education 4u
359.7K views
29:38

lec 60 fast inverse discrete cosine transform

SUMIT VYAS
851 views
28:57

Lec 48: Discrete Cosine Transform-2

CH 19: IIT BOMBAY 03: Electrical Engineering
12 views
53:46

mod12lec36

NPTEL IIT Delhi
1.9K views
15:04

Lec-48: Understanding Single Layer Perceptron (SLP) with Example | Machine Learning

Gate Smashers
73.2K views
12:13

Lec-40: Network Layer | Responsibilities of Network Layer | OSI Model | Computer Networks

Gate Smashers
1.1M views
6:28

Lec-33: Reversal Operation in toc | How regular languages closured under reversal

Gate Smashers
285.7K views
8:23

Conversion of NFA to DFA examples | Part-1/2 | TOC | Lec-19 | Bhanu Priya

Education 4u
631.5K views
37:46

Lec 53 Lab: Discrete Cosine Transformation

NPTEL - Indian Institute of Science, Bengaluru
968 views
12:28

Lec-14: Linear Search in Data Structure by #Naina Mam | Time Complexity

Gate Smashers
379.9K views
11:43

FNC vs BDS ALL GAMES Highlights | LEC W2D2 Split 3 | Fnatic vs Team BDS

Kaza LoL Esports Highlights
30.8K views
6:59

Lec-13 - Network Security - (Caesar Cipher - Part 1)

Dr. Mohammed Abdalla Youssif
25 views
10:43

Lec-5: Topologies in Computer Networks | Part-1 | All imp points of Mesh, Star, Hub, Bus, Hybrid

Gate Smashers
1.2M views
31:25

Lec 5|| Perfect Secrecy Part II#fahadusman#cryptography

fahad osman
965 views
49:44

Lec 9: Max-min problems; least squares | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
273.0K views
5:50

Lec-35: INIT Operation in TOC

Gate Smashers
157.6K views
34:06

Lec: 02 - Cryptography & Network Security | 10 March

CSE 6th - BSMRSTU
64 views
39:33

Lec 47 Discrete Cosine Transform-1

NPTEL - Indian Institute of Science, Bengaluru
1.8K views
12:00

Lec-31: Pumping lemma for regular languages in TOC with examples

Gate Smashers
1.3M views