Lec - Videos
Find videos related to your search query. Browse through our collection of videos matching "lec". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "lec"
50 results found
5:28
Possible types of Attacks in Cryptography | Lec-18 | #cryptography #typesofattacks #jntuh #cns
Concept Clear
1.3K views
58:30
Lec-24 Traveling Salesman Problem(TSP)
nptelhrd
508.7K views
19:31
Lec 59 Cyclic Groups and Discrete Logarithm
NPTEL - Indian Institute of Science, Bengaluru
509 views
53:27
Lec 9 | MIT 18.085 Computational Science and Engineering I, Fall 2008
MIT OpenCourseWare
27.9K views
48:04
Lec 6: Velocity, acceleration; Kepler's second law | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
252.5K views
56:49
Lec 2 | MIT 18.085 Computational Science and Engineering I
MIT OpenCourseWare
20.4K views
35:47
Cryptography & Network Security | Unit-2 | Lec-2 | One Shot | KCS-074 | Aktu Exams| PYQ Solutions
Multi Atoms
10.3K views
51:37
Lec 3: Bias-Variance Tradeoff
NPTEL IIT Guwahati
16.3K views
17:48
Lec 17: Preemptive Priority Scheduling Algorithm in OS with example | Operating System
Jenny's Lectures CS IT
548.3K views
19:29
POBY DEBUT GAME in the LEC | FNC vs TH Voicecomms
FNATIC
80.5K views
9:55
Lec-18 - Network Security - (Hill Cipher - Encryption)
Dr. Mohammed Abdalla Youssif
13 views
50:10
Lec 12: Gradient; directional derivative; tangent plane | MIT 18.02 Multivariable Calculus, Fall 07
MIT OpenCourseWare
261.7K views
8:00
Lec 4 Turing Machine Example2
Shibaji Paul
25.1K views
52:18
Lec 10: Second derivative test; boundaries & infinity | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
228.4K views
51:09
FNATIC POBY DEBUT IN THE LEC VERSUS HERETICS - LEC SUMMER 2025
Caedrel
343.2K views
8:59
Lec-3: Types of Logic Gates | Symbols | Truth Tables
Gate Smashers
1.6M views
34:31
Lec 25: Sequential Decision Problems
NPTEL IIT Guwahati
11.0K views
4:07
Personal Computing system | OS | Lec-09 | Bhanu Priya
Education 4u
94.8K views
57:15
Lec 3 | MIT 18.085 Computational Science and Engineering I
MIT OpenCourseWare
15.1K views
50:50
Lec 5: Parametric equations for lines and curves | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
315.7K views
11:08
Lec-5: What is Grammar in TOC | Must Watch
Gate Smashers
1.3M views
12:42
Lec-29: Cyclic Redundancy Check(CRC) for Error Detection and Correction | Computer Networks
Gate Smashers
1.9M views
7:43
Convert Regular Expression to Finite Automata | Examples | TOC | Lec-43 | Bhanu Priya
Education 4u
202.2K views
12:20
Lec-21: Propositional Logic in Artificial Intelligence | Knowledge Representation | All Imp Points
Gate Smashers
1.1M views
4:03
Lec-46: CFL and CFG Introduction and Syllabus discussion
Gate Smashers
410.0K views
12:43
Lec-03:Asymmetric Key Or Public Key | CRYPTOGRAPHY AND NETWORK SECURITY
webSak
45 views
26:05
Lec 20 Perfectly-Secure Message Transmission
NPTEL - Indian Institute of Science, Bengaluru
528 views
50:09
Lec 11: Differentials; chain rule | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
226.4K views
13:20
Lec 14 | How to Convert NFA to DFA Part 2
Techeducation 4u
157 views
5:19
Theory of Automata | Regular Expression | TOC | Lec-40 | Bhanu Priya
Education 4u
217.0K views
52:51
Lec 2: Determinants; cross product | MIT 18.02 Multivariable Calculus, Fall 2007
MIT OpenCourseWare
566.0K views
7:01
Algorithm Vs #Program & Algorithm Vs Pseudocode | Lec 6 | Design & Analysis of Algorithm
CSE Guru
2.9K views
10:33
Lec-15: Binary Search in Data Structure by #Naina Mam
Gate Smashers
435.1K views
32:35
Lec 50 Discrete Cosine Transform-4
NPTEL - Indian Institute of Science, Bengaluru
675 views
21:18
Lec 4 | Cryptography from 1800 to World War2 | Edgar Allan |Vernam | cipher machine | Modern Crypto
Qasim Ali
223 views
4:37
SJF preemptive scheduling algorithm | SRJF | Lec -5
Er Sahil ka Gyan
869 views
37:15
Lec 15 | Symmetric Algorithm | Stream & Block Cipher | Confusion | diffusion | Initialization Vector
Qasim Ali
287 views
11:53
Lec 5: How to write an Algorithm | DAA
Jenny's Lectures CS IT
1.1M views
48:53
Mod-10 Lec-02 PDA CFG
nptelhrd
1.2K views
6:40
Lec - 22: Clustering in Data Mining Explained | Top Clustering Methods You MUST Know!
Gate Smashers
64.5K views
39:17
29. | Lec-10 Cryptocurrency | Module-3 Cryptography | Cyber Security | In Hindi
Aalsi Hacker
53 views
5:18
Lec-86: What is Application(Proxy) Firewall in Hindi | Network Security Part-2
Gate Smashers
257.6K views
23:59
Lec-19_Examples-Tautology, Contradiction and Contingency | Discrete Mathematics | IT-ICT Engineering
Computer_IT_ICT Engineering Department : LJIET
123 views
8:30
TOC introduction | TOC | Lec-01 | Bhanu Priya
Education 4u
652.9K views
20:54
Lec-8: Protection & Security in Operating system | Full OS playlist
Gate Smashers
457.3K views
58:56
Current Affairs Lec 02 | Government Schemes | Lakshya IAS 2026 | Complete Prelims Prep for Free
StudyIQ IAS
11.9K views
35:19
Lec 35: Logistic regression
NPTEL IIT Guwahati
9.5K views
15:48
Lec-48: Convert Context free language to Context free grammar with examples | TOC
Gate Smashers
1.1M views
22:30
Lec-08_Asymmetric Encryption| System and Network Security |ICT Engineering
Computer_IT_ICT Engineering Department : LJIET
90 views
9:13
Lec-5: Depth First Search (DFS) with example | Uninformed Search | Artificial Intelligence
Gate Smashers
1.7M views