Curriculum
- 4 Sections
- 169 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- MCC (Mobile Communication and Computing)37
- 2.1Introduction to Mobile Computing6 Minutes
- 2.2GPRS Architecture9 Minutes
- 2.3GSM architecture20 Minutes
- 2.4Multiplexing8 Minutes
- 2.5GEO MEO LEO Types of satellite Orbit3 Minutes
- 2.6Handover and Types of Handover6 Minutes
- 2.7Privacy and Authentication in GSM8 Minutes
- 2.8Types of Handoffs and Handover6 Minutes
- 2.9Mobile IP and Packet through tunnel working5 Minutes
- 2.103G UMTS architecture5 Minutes
- 2.11Wireless Local Loop6 Minutes
- 2.12PSTN Architecture5 Minutes
- 2.13Cellular IP Standard6 Minutes
- 2.14Bluetooth Architecture6 Minutes
- 2.15Android architecture16 Minutes
- 2.164G architecture18 Minutes
- 2.17Frequency reuse concept in cellular system9 Minutes
- 2.18Macro Mobility- MIPv6 and FMIPv68 Minutes
- 2.19Micro Mobility- HAWAII Architecture7 Minutes
- 2.20Micro Mobility- HMIPv6 Hierarchical MIPv68 Minutes
- 2.21IP Address v/s MAC Address9 Minutes
- 2.22IPv4 Header Format13 Minutes
- 2.23IPv611 Minutes
- 2.24IPv4 vs IPv610 Minutes
- 2.25SAE/LTE Architecture Part #112 Minutes
- 2.26SAE/LTE Architecture Part #27 Minutes
- 2.27VoLTE9 Minutes
- 2.28Self-Organizing Networks (SON) Framework8 Minutes
- 2.29IEEE 802.11 Architecture9 Minutes
- 2.30IEEE 802.11 Protocol Architecture11 Minutes
- 2.31Wifi Security – Wired Equivalent Privacy (WEP)9 Minutes
- 2.32Wireless LAN Threats and Security9 Minutes
- 2.33WiFi Protected Access6 Minutes
- 2.345G Introduction8 Minutes
- 2.35HiperLAN Type 18 Minutes
- 2.36MCC Importance13 Minutes
- 2.37Mobile Communication and Computing Notes ( Toppers Solution )
- Artificial Intelligence35
- 3.1Agent and Peas Description8 Minutes
- 3.2Types of Agent9 Minutes
- 3.3Learning Agent9 Minutes
- 3.4BFS Algorithm with solved Example6 Minutes
- 3.5DFS ( Depth First Search ) Algorithm with solved Example3 Minutes
- 3.6IDFS ( Iterative Depth First Search ) Algorithm with solved Example3 Minutes
- 3.7Hill Climbing4 Minutes
- 3.8Min Max Solved Example7 Minutes
- 3.9Alpha-Beta Pruning Solved Example14 Minutes
- 3.10A star Solved Example14 Minutes
- 3.11Genetic Algorithm6 Minutes
- 3.12Genetic Algorithm Max one Problem Solved Example9 Minutes
- 3.13Propositional Logic (PL) Introduction8 Minutes
- 3.14PL to CNF Conversion With Solved Example10 Minutes
- 3.15First-Order Logic (FOL) Solved Example6 Minutes
- 3.16Resolution Tree Sum Part #19 Minutes
- 3.17Resolution Tree Sum Part #215 Minutes
- 3.18Partial Order Planning with Example11 Minutes
- 3.19Expert System10 Minutes
- 3.20Wumpus World9 Minutes
- 3.21Natural Language Processing10 Minutes
- 3.22Decision Tree Solved Example24 Minutes
- 3.23Bayesian Network toothache and Cavity sum12 Minutes
- 3.24Supervised and Unsupervised Learning (AI and SC)7 Minutes
- 3.25Bayesian Belief Network16 Minutes
- 3.26Hill Climbing algorithm6 Minutes
- 3.27Importance + Strategy to Score Good marks in Artificial intelligence paper17 Minutes
- 3.28Heuristic function (block world and 8 Puzzle )13 Minutes
- 3.29GBFS Solved Example8 Minutes
- 3.30Notes: Module 1
- 3.31Notes: Module 2
- 3.32Notes: Module 3
- 3.33Notes: Module 4
- 3.34Notes: Module 5
- 3.35Notes: Module 6
- Cryptography and System Security49
- 4.1Module 1: Introduction to Cryptography and Security System9 Minutes
- 4.2Module 1: Security Goals and Mechanism10 Minutes
- 4.3Module 1: Symmetric Cipher2 Minutes
- 4.4Module 1: Mono Alphabetic Cipher8 Minutes
- 4.5Module 1: Poly Alphabetic Cipher7 Minutes
- 4.6Module 1: Substitution Cipher14 Minutes
- 4.7Module 1: Transposition Cipher7 Minutes
- 4.8Module 2: Stream and Block Cipher4 Minutes
- 4.9Module 2: DES Algorithm Full Working12 Minutes
- 4.10Module 2: DES key Generation Explain Step by Step11 Minutes
- 4.11Module 2: AES Algorithm Full working26 Minutes
- 4.12Module 2: Modes of Operation8 Minutes
- 4.13Module 2: Public Key cryptogrpahy3 Minutes
- 4.14Module 2: RSA Algorithm with Solved Example14 Minutes
- 4.15Module 2: Diffie Hellman7 Minutes
- 4.16Module 2: How to find modulus of Exponential Number (high power value )12 Minutes
- 4.17Module 3: MD5 (Message Digest Algorithm)24 Minutes
- 4.18Module 3: SHA-1 Algorithm Full Working23 Minutes
- 4.19Module 3: MAC7 Minutes
- 4.20Module 3: Digital Certificate and X.50910 Minutes
- 4.21Module 4: Kerberos8 Minutes
- 4.22Module 4: Digital Signature Full working Explained19 Minutes
- 4.23Module 5: DOS and DDOS Attack10 Minutes
- 4.24Module 5: SSL ( Secure Socket Layer protocol )18 Minutes
- 4.25Module 5: IPSEC introduction17 Minutes
- 4.26Module 5: IP SEC Security Protocols14 Minutes
- 4.27Module 5: IPSEC Modes of Operation10 Minutes
- 4.28Module 5: IDS and its Types12 Minutes
- 4.29Module 6: Buffer Overflow and Buffer Overflow attack9 Minutes
- 4.30Module 6: Malicious Software ( Virus and worms )10 Minutes
- 4.31Module 6: Virus and worms13 Minutes
- 4.32Module 6: SQL Injection7 Minutes
- 4.33Module 7: IDEA Algorithm Full Working14 Minutes
- 4.34Module 7: Blowfish Algorithm Full working13 Minutes
- 4.35Module 7: Confusion and Diffusion2 Minutes
- 4.36Module 7: Meet in the Middle3 Minutes
- 4.37Module 7: Phishing Attack11 Minutes
- 4.38Module 7: Session Hijacking and Spoofing Attack11 Minutes
- 4.39Module 7: OS Security Memory and Address Protection11 Minutes
- 4.40Module 7: E commerce Security and Payment gateway9 Minutes
- 4.41Notes: Index
- 4.42Notes: Module 1
- 4.43Notes: Module 2
- 4.44Notes: Module 3
- 4.45Notes: Module 4
- 4.46Notes: Module 5
- 4.47Notes: Module 6
- 4.48Notes: Module 7
- 4.49Notes: Module 8
- System Programming and Compiler Construction [SPCC ]48
- 5.1Module 1: System Programming and Compiler Design Introduction14 Minutes
- 5.2Module 2: What is Assembler and Assembly Language8 Minutes
- 5.3Module 2: Forward reference problem10 Minutes
- 5.4Module 2: Assembly language statement8 Minutes
- 5.5Module 2: Flow chart of two pass assembler15 Minutes
- 5.6Module 3: Macros and Macro-processors11 Minutes
- 5.7Module 3: Macro vs Subroutine9 Minutes
- 5.8Module 3: Macros pass 1 and pass 2 flowchart11 Minutes
- 5.9Module 4: Editor Basics with Architecture in System Programming11 Minutes
- 5.10Module 5: Phases of compiler9 Minutes
- 5.11Module 5: Eliminate left recursion and left factoring7 Minutes
- 5.12Module 5: How to Find First and Follow Basics (part 1)9 Minutes
- 5.13Module 5: First and Follow solved example (part 2)17 Minutes
- 5.14Module 5: First and Follow solved example (Part 3)5 Minutes
- 5.15Module 5: Predictive Parser (Part 1)16 Minutes
- 5.16Module 5: Predictive Parser (Part 2)11 Minutes
- 5.17Module 5: Recursive Descent parser with solved example7 Minutes
- 5.18Module 5: Operator Precedence Parser with Solved Example(part 1)21 Minutes
- 5.19Module 5: Operator Precedence Parser with Solved Example (part 2)12 Minutes
- 5.20Module 5: LR Parsing | LR (0) item | LR (0) Parsing table solved Example31 Minutes
- 5.21Module 5: SLR (1) parsing with solved example| SLR (1) parsing table |12 Minutes
- 5.22Module 5: Examples of LR(0) or SLR(1)16 Minutes
- 5.23Module 5: CLR1 and LALR1 with Solved Example28 Minutes
- 5.24Module 6: DAG(direct a cyclic graph)4 Minutes
- 5.25Module 6: Yacc (Yet another compiler compiler )5 Minutes
- 5.26Module 6: Activation Records in Compiler Design11 Minutes
- 5.27Module 6: Synthesized & Inherited Attributes7 Minutes
- 5.28Module 6: Peep Hole Optimization8 Minutes
- 5.29Index : Loaders7 Minutes
- 5.30Index : Linkers6 Minutes
- 5.31Index : Compile and go loader, General Loader and Absolute Loader6 Minutes
- 5.32Index : Subroutine Linkage, Relocating Loader and Direct Link Loader7 Minutes
- 5.33Index : Dynamic Loading Loader, Dynamic Linking Loader and Linkage Editor_16 Minutes
- 5.34Notes: SPCC important Question for Computer Branch Mumbai University18 Minutes
- 5.35Notes: Introduction to SPCC
- 5.36Notes: Assemblers
- 5.37Notes: Macro and Macroprocessor
- 5.38Notes: Editor
- 5.39Notes: Loaders and Linkers
- 5.40Notes: Compilers
- 5.41Notes: Syntax Analysis
- 5.42Notes: Syntax Directed Transaction
- 5.43Notes Lexical Analysis
- 5.44Notes: Intermediate Code Generation
- 5.45Notes: Code Generation
- 5.46Notes: Code Optimization
- 5.46Notes: Run Time Storage
- 5.47Notes: Compiler – Compilers
Introduction to Mobile Computing
Introduction to Mobile Computing
Mobile computing is human-computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware, and mobile software.
Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/
/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q
Follow For Latest Updates, Study Tips & More Content!
GPRS Architecture
Next