Curriculum
- 4 Sections
- 169 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- MCC (Mobile Communication and Computing)37
- 2.1Introduction to Mobile Computing6 Minutes
- 2.2GPRS Architecture9 Minutes
- 2.3GSM architecture20 Minutes
- 2.4Multiplexing8 Minutes
- 2.5GEO MEO LEO Types of satellite Orbit3 Minutes
- 2.6Handover and Types of Handover6 Minutes
- 2.7Privacy and Authentication in GSM8 Minutes
- 2.8Types of Handoffs and Handover6 Minutes
- 2.9Mobile IP and Packet through tunnel working5 Minutes
- 2.103G UMTS architecture5 Minutes
- 2.11Wireless Local Loop6 Minutes
- 2.12PSTN Architecture5 Minutes
- 2.13Cellular IP Standard6 Minutes
- 2.14Bluetooth Architecture6 Minutes
- 2.15Android architecture16 Minutes
- 2.164G architecture18 Minutes
- 2.17Frequency reuse concept in cellular system9 Minutes
- 2.18Macro Mobility- MIPv6 and FMIPv68 Minutes
- 2.19Micro Mobility- HAWAII Architecture7 Minutes
- 2.20Micro Mobility- HMIPv6 Hierarchical MIPv68 Minutes
- 2.21IP Address v/s MAC Address9 Minutes
- 2.22IPv4 Header Format13 Minutes
- 2.23IPv611 Minutes
- 2.24IPv4 vs IPv610 Minutes
- 2.25SAE/LTE Architecture Part #112 Minutes
- 2.26SAE/LTE Architecture Part #27 Minutes
- 2.27VoLTE9 Minutes
- 2.28Self-Organizing Networks (SON) Framework8 Minutes
- 2.29IEEE 802.11 Architecture9 Minutes
- 2.30IEEE 802.11 Protocol Architecture11 Minutes
- 2.31Wifi Security – Wired Equivalent Privacy (WEP)9 Minutes
- 2.32Wireless LAN Threats and Security9 Minutes
- 2.33WiFi Protected Access6 Minutes
- 2.345G Introduction8 Minutes
- 2.35HiperLAN Type 18 Minutes
- 2.36MCC Importance13 Minutes
- 2.37Mobile Communication and Computing Notes ( Toppers Solution )
- Artificial Intelligence35
- 3.1Agent and Peas Description8 Minutes
- 3.2Types of Agent9 Minutes
- 3.3Learning Agent9 Minutes
- 3.4BFS Algorithm with solved Example6 Minutes
- 3.5DFS ( Depth First Search ) Algorithm with solved Example3 Minutes
- 3.6IDFS ( Iterative Depth First Search ) Algorithm with solved Example3 Minutes
- 3.7Hill Climbing4 Minutes
- 3.8Min Max Solved Example7 Minutes
- 3.9Alpha-Beta Pruning Solved Example14 Minutes
- 3.10A star Solved Example14 Minutes
- 3.11Genetic Algorithm6 Minutes
- 3.12Genetic Algorithm Max one Problem Solved Example9 Minutes
- 3.13Propositional Logic (PL) Introduction8 Minutes
- 3.14PL to CNF Conversion With Solved Example10 Minutes
- 3.15First-Order Logic (FOL) Solved Example6 Minutes
- 3.16Resolution Tree Sum Part #19 Minutes
- 3.17Resolution Tree Sum Part #215 Minutes
- 3.18Partial Order Planning with Example11 Minutes
- 3.19Expert System10 Minutes
- 3.20Wumpus World9 Minutes
- 3.21Natural Language Processing10 Minutes
- 3.22Decision Tree Solved Example24 Minutes
- 3.23Bayesian Network toothache and Cavity sum12 Minutes
- 3.24Supervised and Unsupervised Learning (AI and SC)7 Minutes
- 3.25Bayesian Belief Network16 Minutes
- 3.26Hill Climbing algorithm6 Minutes
- 3.27Importance + Strategy to Score Good marks in Artificial intelligence paper17 Minutes
- 3.28Heuristic function (block world and 8 Puzzle )13 Minutes
- 3.29GBFS Solved Example8 Minutes
- 3.30Notes: Module 1
- 3.31Notes: Module 2
- 3.32Notes: Module 3
- 3.33Notes: Module 4
- 3.34Notes: Module 5
- 3.35Notes: Module 6
- Cryptography and System Security49
- 4.1Module 1: Introduction to Cryptography and Security System9 Minutes
- 4.2Module 1: Security Goals and Mechanism10 Minutes
- 4.3Module 1: Symmetric Cipher2 Minutes
- 4.4Module 1: Mono Alphabetic Cipher8 Minutes
- 4.5Module 1: Poly Alphabetic Cipher7 Minutes
- 4.6Module 1: Substitution Cipher14 Minutes
- 4.7Module 1: Transposition Cipher7 Minutes
- 4.8Module 2: Stream and Block Cipher4 Minutes
- 4.9Module 2: DES Algorithm Full Working12 Minutes
- 4.10Module 2: DES key Generation Explain Step by Step11 Minutes
- 4.11Module 2: AES Algorithm Full working26 Minutes
- 4.12Module 2: Modes of Operation8 Minutes
- 4.13Module 2: Public Key cryptogrpahy3 Minutes
- 4.14Module 2: RSA Algorithm with Solved Example14 Minutes
- 4.15Module 2: Diffie Hellman7 Minutes
- 4.16Module 2: How to find modulus of Exponential Number (high power value )12 Minutes
- 4.17Module 3: MD5 (Message Digest Algorithm)24 Minutes
- 4.18Module 3: SHA-1 Algorithm Full Working23 Minutes
- 4.19Module 3: MAC7 Minutes
- 4.20Module 3: Digital Certificate and X.50910 Minutes
- 4.21Module 4: Kerberos8 Minutes
- 4.22Module 4: Digital Signature Full working Explained19 Minutes
- 4.23Module 5: DOS and DDOS Attack10 Minutes
- 4.24Module 5: SSL ( Secure Socket Layer protocol )18 Minutes
- 4.25Module 5: IPSEC introduction17 Minutes
- 4.26Module 5: IP SEC Security Protocols14 Minutes
- 4.27Module 5: IPSEC Modes of Operation10 Minutes
- 4.28Module 5: IDS and its Types12 Minutes
- 4.29Module 6: Buffer Overflow and Buffer Overflow attack9 Minutes
- 4.30Module 6: Malicious Software ( Virus and worms )10 Minutes
- 4.31Module 6: Virus and worms13 Minutes
- 4.32Module 6: SQL Injection7 Minutes
- 4.33Module 7: IDEA Algorithm Full Working14 Minutes
- 4.34Module 7: Blowfish Algorithm Full working13 Minutes
- 4.35Module 7: Confusion and Diffusion2 Minutes
- 4.36Module 7: Meet in the Middle3 Minutes
- 4.37Module 7: Phishing Attack11 Minutes
- 4.38Module 7: Session Hijacking and Spoofing Attack11 Minutes
- 4.39Module 7: OS Security Memory and Address Protection11 Minutes
- 4.40Module 7: E commerce Security and Payment gateway9 Minutes
- 4.41Notes: Index
- 4.42Notes: Module 1
- 4.43Notes: Module 2
- 4.44Notes: Module 3
- 4.45Notes: Module 4
- 4.46Notes: Module 5
- 4.47Notes: Module 6
- 4.48Notes: Module 7
- 4.49Notes: Module 8
- System Programming and Compiler Construction [SPCC ]48
- 5.1Module 1: System Programming and Compiler Design Introduction14 Minutes
- 5.2Module 2: What is Assembler and Assembly Language8 Minutes
- 5.3Module 2: Forward reference problem10 Minutes
- 5.4Module 2: Assembly language statement8 Minutes
- 5.5Module 2: Flow chart of two pass assembler15 Minutes
- 5.6Module 3: Macros and Macro-processors11 Minutes
- 5.7Module 3: Macro vs Subroutine9 Minutes
- 5.8Module 3: Macros pass 1 and pass 2 flowchart11 Minutes
- 5.9Module 4: Editor Basics with Architecture in System Programming11 Minutes
- 5.10Module 5: Phases of compiler9 Minutes
- 5.11Module 5: Eliminate left recursion and left factoring7 Minutes
- 5.12Module 5: How to Find First and Follow Basics (part 1)9 Minutes
- 5.13Module 5: First and Follow solved example (part 2)17 Minutes
- 5.14Module 5: First and Follow solved example (Part 3)5 Minutes
- 5.15Module 5: Predictive Parser (Part 1)16 Minutes
- 5.16Module 5: Predictive Parser (Part 2)11 Minutes
- 5.17Module 5: Recursive Descent parser with solved example7 Minutes
- 5.18Module 5: Operator Precedence Parser with Solved Example(part 1)21 Minutes
- 5.19Module 5: Operator Precedence Parser with Solved Example (part 2)12 Minutes
- 5.20Module 5: LR Parsing | LR (0) item | LR (0) Parsing table solved Example31 Minutes
- 5.21Module 5: SLR (1) parsing with solved example| SLR (1) parsing table |12 Minutes
- 5.22Module 5: Examples of LR(0) or SLR(1)16 Minutes
- 5.23Module 5: CLR1 and LALR1 with Solved Example28 Minutes
- 5.24Module 6: DAG(direct a cyclic graph)4 Minutes
- 5.25Module 6: Yacc (Yet another compiler compiler )5 Minutes
- 5.26Module 6: Activation Records in Compiler Design11 Minutes
- 5.27Module 6: Synthesized & Inherited Attributes7 Minutes
- 5.28Module 6: Peep Hole Optimization8 Minutes
- 5.29Index : Loaders7 Minutes
- 5.30Index : Linkers6 Minutes
- 5.31Index : Compile and go loader, General Loader and Absolute Loader6 Minutes
- 5.32Index : Subroutine Linkage, Relocating Loader and Direct Link Loader7 Minutes
- 5.33Index : Dynamic Loading Loader, Dynamic Linking Loader and Linkage Editor_16 Minutes
- 5.34Notes: SPCC important Question for Computer Branch Mumbai University18 Minutes
- 5.35Notes: Introduction to SPCC
- 5.36Notes: Assemblers
- 5.37Notes: Macro and Macroprocessor
- 5.38Notes: Editor
- 5.39Notes: Loaders and Linkers
- 5.40Notes: Compilers
- 5.41Notes: Syntax Analysis
- 5.42Notes: Syntax Directed Transaction
- 5.43Notes Lexical Analysis
- 5.44Notes: Intermediate Code Generation
- 5.45Notes: Code Generation
- 5.46Notes: Code Optimization
- 5.46Notes: Run Time Storage
- 5.47Notes: Compiler – Compilers
Module 2: What is Assembler and Assembly Language
The lesson content is empty.