Lec - Videos

Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "lec"

50 results found

5:28

Possible types of Attacks in Cryptography | Lec-18 | #cryptography #typesofattacks #jntuh #cns

Concept Clear
1.3K views
58:30

Lec-24 Traveling Salesman Problem(TSP)

nptelhrd
508.7K views
19:31

Lec 59 Cyclic Groups and Discrete Logarithm

NPTEL - Indian Institute of Science, Bengaluru
509 views
53:27

Lec 9 | MIT 18.085 Computational Science and Engineering I, Fall 2008

MIT OpenCourseWare
27.9K views
48:04

Lec 6: Velocity, acceleration; Kepler's second law | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
252.5K views
56:49

Lec 2 | MIT 18.085 Computational Science and Engineering I

MIT OpenCourseWare
20.4K views
35:47

Cryptography & Network Security | Unit-2 | Lec-2 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions

Multi Atoms
10.3K views
51:37

Lec 3: Bias-Variance Tradeoff

NPTEL IIT Guwahati
16.3K views
17:48

Lec 17: Preemptive Priority Scheduling Algorithm in OS with example | Operating System

Jenny's Lectures CS IT
548.3K views
19:29

POBY DEBUT GAME in the LEC | FNC vs TH Voicecomms

FNATIC
80.5K views
9:55

Lec-18 - Network Security - (Hill Cipher - Encryption)

Dr. Mohammed Abdalla Youssif
13 views
50:10

Lec 12: Gradient; directional derivative; tangent plane | MIT 18.02 Multivariable Calculus, Fall 07

MIT OpenCourseWare
261.7K views
8:00

Lec 4 Turing Machine Example2

Shibaji Paul
25.1K views
52:18

Lec 10: Second derivative test; boundaries & infinity | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
228.4K views
51:09

FNATIC POBY DEBUT IN THE LEC VERSUS HERETICS - LEC SUMMER 2025

Caedrel
343.2K views
8:59

Lec-3: Types of Logic Gates | Symbols | Truth Tables

Gate Smashers
1.6M views
34:31

Lec 25: Sequential Decision Problems

NPTEL IIT Guwahati
11.0K views
4:07

Personal Computing system | OS | Lec-09 | Bhanu Priya

Education 4u
94.8K views
57:15

Lec 3 | MIT 18.085 Computational Science and Engineering I

MIT OpenCourseWare
15.1K views
50:50

Lec 5: Parametric equations for lines and curves | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
315.7K views
11:08

Lec-5: What is Grammar in TOC | Must Watch

Gate Smashers
1.3M views
12:42

Lec-29: Cyclic Redundancy Check(CRC) for Error Detection and Correction | Computer Networks

Gate Smashers
1.9M views
7:43

Convert Regular Expression to Finite Automata | Examples | TOC | Lec-43 | Bhanu Priya

Education 4u
202.2K views
12:20

Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points

Gate Smashers
1.1M views
4:03

Lec-46: CFL and CFG Introduction and Syllabus discussion

Gate Smashers
410.0K views
12:43

Lec-03:Asymmetric Key Or Public Key | CRYPTOGRAPHY AND NETWORK SECURITY

webSak
45 views
26:05

Lec 20 Perfectly-Secure Message Transmission

NPTEL - Indian Institute of Science, Bengaluru
528 views
50:09

Lec 11: Differentials; chain rule | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
226.4K views
13:20

Lec 14 | How to Convert NFA to DFA Part 2

Techeducation 4u
157 views
5:19

Theory of Automata | Regular Expression | TOC | Lec-40 | Bhanu Priya

Education 4u
217.0K views
52:51

Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007

MIT OpenCourseWare
566.0K views
7:01

Algorithm Vs #Program & Algorithm Vs Pseudocode | Lec 6 | Design & Analysis of Algorithm

CSE Guru
2.9K views
10:33

Lec-15: Binary Search in Data Structure by #Naina Mam

Gate Smashers
435.1K views
32:35

Lec 50 Discrete Cosine Transform-4

NPTEL - Indian Institute of Science, Bengaluru
675 views
21:18

Lec 4 | Cryptography from 1800 to World War2 | Edgar Allan |Vernam | cipher machine | Modern Crypto

Qasim Ali
223 views
4:37

SJF preemptive scheduling algorithm | SRJF | Lec -5

Er Sahil ka Gyan
869 views
37:15

Lec 15 | Symmetric Algorithm | Stream & Block Cipher | Confusion | diffusion | Initialization Vector

Qasim Ali
287 views
11:53

Lec 5: How to write an Algorithm | DAA

Jenny's Lectures CS IT
1.1M views
48:53

Mod-10 Lec-02 PDA CFG

nptelhrd
1.2K views
6:40

Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!

Gate Smashers
64.5K views
39:17

29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi

Aalsi Hacker
53 views
5:18

Lec-86: What is Application(Proxy) Firewall in Hindi | Network Security Part-2

Gate Smashers
257.6K views
23:59

Lec-19_Examples-Tautology, Contradiction and Contingency | Discrete Mathematics | IT-ICT Engineering

Computer_IT_ICT Engineering Department : LJIET
123 views
8:30

TOC introduction | TOC | Lec-01 | Bhanu Priya

Education 4u
652.9K views
20:54

Lec-8: Protection & Security in Operating system | Full OS playlist

Gate Smashers
457.3K views
58:56

Current Affairs Lec 02 | Government Schemes | Lakshya IAS 2026 | Complete Prelims Prep for Free

StudyIQ IAS
11.9K views
35:19

Lec 35: Logistic regression

NPTEL IIT Guwahati
9.5K views
15:48

Lec-48: Convert Context free language to Context free grammar with examples | TOC

Gate Smashers
1.1M views
22:30

Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering

Computer_IT_ICT Engineering Department : LJIET
90 views
9:13

Lec-5: Depth First Search (DFS) with example | Uninformed Search | Artificial Intelligence

Gate Smashers
1.7M views