#lec - Videos

Find videos related to your search query. Browse through our collection of videos matching "#lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "#lec"

50 results found

5:28

Possible types of Attacks in Cryptography | Lec-18 | #cryptography #typesofattacks #jntuh #cns

Concept Clear
1.3K views
58:30

Lec-24 Traveling Salesman Problem(TSP)

nptelhrd
508.7K views
19:31

Lec 59 Cyclic Groups and Discrete Logarithm

NPTEL - Indian Institute of Science, Bengaluru
509 views
53:27

Lec 9 | MIT 18.085 Computational Science and Engineering I, Fall 2008

MIT OpenCourseWare
27.9K views
48:04

Lec 6: Velocity, acceleration; Kepler's second law | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
252.5K views
56:49

Lec 2 | MIT 18.085 Computational Science and Engineering I

MIT OpenCourseWare
20.4K views
35:47

Cryptography & Network Security | Unit-2 | Lec-2 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions

Multi Atoms
10.3K views
51:37

Lec 3: Bias-Variance Tradeoff

NPTEL IIT Guwahati
16.3K views
17:48

Lec 17: Preemptive Priority Scheduling Algorithm in OS with example | Operating System

Jenny's Lectures CS IT
548.3K views
19:29

POBY DEBUT GAME in the LEC | FNC vs TH Voicecomms

FNATIC
80.5K views
9:55

Lec-18 - Network Security - (Hill Cipher - Encryption)

Dr. Mohammed Abdalla Youssif
13 views
50:10

Lec 12: Gradient; directional derivative; tangent plane | MIT 18.02 Multivariable Calculus, Fall 07

MIT OpenCourseWare
261.7K views
8:00

Lec 4 Turing Machine Example2

Shibaji Paul
25.1K views
52:18

Lec 10: Second derivative test; boundaries & infinity | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
228.4K views
51:09

FNATIC POBY DEBUT IN THE LEC VERSUS HERETICS - LEC SUMMER 2025

Caedrel
343.2K views
8:59

Lec-3: Types of Logic Gates | Symbols | Truth Tables

Gate Smashers
1.6M views
34:31

Lec 25: Sequential Decision Problems

NPTEL IIT Guwahati
11.0K views
4:07

Personal Computing system | OS | Lec-09 | Bhanu Priya

Education 4u
94.8K views
57:15

Lec 3 | MIT 18.085 Computational Science and Engineering I

MIT OpenCourseWare
15.1K views
50:50

Lec 5: Parametric equations for lines and curves | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
315.7K views
11:08

Lec-5: What is Grammar in TOC | Must Watch

Gate Smashers
1.3M views
12:42

Lec-29: Cyclic Redundancy Check(CRC) for Error Detection and Correction | Computer Networks

Gate Smashers
1.9M views
7:43

Convert Regular Expression to Finite Automata | Examples | TOC | Lec-43 | Bhanu Priya

Education 4u
202.2K views
12:20

Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points

Gate Smashers
1.1M views
4:03

Lec-46: CFL and CFG Introduction and Syllabus discussion

Gate Smashers
410.0K views
12:43

Lec-03:Asymmetric Key Or Public Key | CRYPTOGRAPHY AND NETWORK SECURITY

webSak
45 views
26:05

Lec 20 Perfectly-Secure Message Transmission

NPTEL - Indian Institute of Science, Bengaluru
528 views
50:09

Lec 11: Differentials; chain rule | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
226.4K views
13:20

Lec 14 | How to Convert NFA to DFA Part 2

Techeducation 4u
157 views
5:19

Theory of Automata | Regular Expression | TOC | Lec-40 | Bhanu Priya

Education 4u
217.0K views
52:51

Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
566.0K views
7:01

Algorithm Vs #Program & Algorithm Vs Pseudocode | Lec 6 | Design & Analysis of Algorithm

CSE Guru
2.9K views
10:33

Lec-15: Binary Search in Data Structure by #Naina Mam

Gate Smashers
435.1K views
32:35

Lec 50 Discrete Cosine Transform-4

NPTEL - Indian Institute of Science, Bengaluru
675 views
21:18

Lec 4 | Cryptography from 1800 to World War2 | Edgar Allan |Vernam | cipher machine | Modern Crypto

Qasim Ali
223 views
4:37

SJF preemptive scheduling algorithm | SRJF | Lec -5

Er Sahil ka Gyan
869 views
37:15

Lec 15 | Symmetric Algorithm | Stream & Block Cipher | Confusion | diffusion | Initialization Vector

Qasim Ali
287 views
11:53

Lec 5: How to write an Algorithm | DAA

Jenny's Lectures CS IT
1.1M views
48:53

Mod-10 Lec-02 PDA CFG

nptelhrd
1.2K views
6:40

Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!

Gate Smashers
64.5K views
39:17

29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi

Aalsi Hacker
53 views
5:18

Lec-86: What is Application(Proxy) Firewall in Hindi | Network Security Part-2

Gate Smashers
257.6K views
23:59

Lec-19_Examples-Tautology, Contradiction and Contingency | Discrete Mathematics | IT-ICT Engineering

Computer_IT_ICT Engineering Department : LJIET
123 views
8:30

TOC introduction | TOC | Lec-01 | Bhanu Priya

Education 4u
652.9K views
20:54

Lec-8: Protection & Security in Operating system | Full OS playlist

Gate Smashers
457.3K views
58:56

Current Affairs Lec 02 | Government Schemes | Lakshya IAS 2026 | Complete Prelims Prep for Free

StudyIQ IAS
11.9K views
35:19

Lec 35: Logistic regression

NPTEL IIT Guwahati
9.5K views
15:48

Lec-48: Convert Context free language to Context free grammar with examples | TOC

Gate Smashers
1.1M views
22:30

Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering

Computer_IT_ICT Engineering Department : LJIET
90 views
9:13

Lec-5: Depth First Search (DFS) with example | Uninformed Search | Artificial Intelligence

Gate Smashers
1.7M views