Link |
Natural Language Processing |
Lecture 1 - Introduction |
Link |
Natural Language Processing |
Lecture 2 - Stages of NLP |
Link |
Natural Language Processing |
Lecture 3 - Stages of NLP Continue... |
Link |
Natural Language Processing |
Lecture 4 - Two approaches to NLP |
Link |
Natural Language Processing |
Lecture 5 - Sequence Labelling and Noisy Channel |
Link |
Natural Language Processing |
Lecture 6 - Noisy Channel: Argmax Based Computation |
Link |
Natural Language Processing |
Lecture 7 - Argmax Based Computation |
Link |
Natural Language Processing |
Lecture 8 - Noisy Channel Application to NLP |
Link |
Natural Language Processing |
Lecture 9 - Brief on Probabilistic Parsing & Start of Part of Speech Tagging |
Link |
Natural Language Processing |
Lecture 10 - Part of Speech Tagging |
Link |
Natural Language Processing |
Lecture 11 - Part of Speech Tagging counted ... |
Link |
Natural Language Processing |
Lecture 12 - Part of Speech Tagging counted ... and Indian Language in Focus; Morphology Analysis |
Link |
Natural Language Processing |
Lecture 13 - PoS Tagging contd... , Indian Language Consideration; Accuracy Measure |
Link |
Natural Language Processing |
Lecture 14 - PoS Tagging; Fundamental Principle; Why Challenging; accuracy |
Link |
Natural Language Processing |
Lecture 15 - PoS Tagging; Accuracy Measurement; Word categories |
Link |
Natural Language Processing |
Lecture 16 - AI and Probability; HMM |
Link |
Natural Language Processing |
Lecture 17 - HMM |
Link |
Natural Language Processing |
Lecture 18 - HMM, Viterbi, Forward Backward Algorithm |
Link |
Natural Language Processing |
Lecture 19 - HMM, Viterbi, Forward Backward Algorithm (Continued...) |
Link |
Natural Language Processing |
Lecture 20 - HMM, Forward Backward Algorithms, Baum Welch Algorithm |
Link |
Natural Language Processing |
Lecture 21 - HMM, Forward Backward Algorithms, Baum Welch Algorithm (Continued...) |
Link |
Natural Language Processing |
Lecture 22 - Natural Language Processing and Informational Retrieval |
Link |
Natural Language Processing |
Lecture 23 - CLIA; IR Basics |
Link |
Natural Language Processing |
Lecture 24 - IR Models: Boolean Vector |
Link |
Natural Language Processing |
Lecture 25 - IR Models: NLP and IR Relationship |
Link |
Natural Language Processing |
Lecture 26 - NLP and IR: How NLP has used IR, Toward Latent Semantic |
Link |
Natural Language Processing |
Lecture 27 - Least Square Method; Recap of PCA; Towards Latent Semantic Indexing (LSI) |
Link |
Natural Language Processing |
Lecture 28 - PCA; SVD; Towards Latent Semantic Indexing (LSI) |
Link |
Natural Language Processing |
Lecture 29 - Wordnet and Word Sense Disambiguation |
Link |
Natural Language Processing |
Lecture 30 - Wordnet and Word Sense Disambiguation (Continued...) |
Link |
Natural Language Processing |
Lecture 31 - Wordnet; Metonymy and Word Sense Disambiguation |
Link |
Natural Language Processing |
Lecture 32 - Word Sense Disambiguation |
Link |
Natural Language Processing |
Lecture 33 - Word Sense Disambiguation; Overlap Based Method; Supervised Method |
Link |
Natural Language Processing |
Lecture 34 - Word Sense Disambiguation: Supervised and Unsupervised methods |
Link |
Natural Language Processing |
Lecture 35 - Word Sense Disambiguation: Semi - Supervised and Unsupervised method; resource - constrained WSD |
Link |
Natural Language Processing |
Lecture 36 - Resource Constrained WSD; Parsing |
Link |
Natural Language Processing |
Lecture 37 - Parsing |
Link |
Natural Language Processing |
Lecture 38 - Parsing Algorithm |
Link |
Natural Language Processing |
Lecture 39 - Parsing Ambiguous Sentences; Probabilistic Parsing |
Link |
Natural Language Processing |
Lecture 40 - Probabilistic Parsing Algorithms |
Link |
Design and Analysis of Algorithms |
Lecture 1 - Overview of the course |
Link |
Design and Analysis of Algorithms |
Lecture 2 - Framework for Algorithms Analysis |
Link |
Design and Analysis of Algorithms |
Lecture 3 - Algorithms Analysis Framework - II |
Link |
Design and Analysis of Algorithms |
Lecture 4 - Asymptotic Notations |
Link |
Design and Analysis of Algorithms |
Lecture 5 - Algorithm Design Techniques : Basics |
Link |
Design and Analysis of Algorithms |
Lecture 6 - Divide And Conquer - I |
Link |
Design and Analysis of Algorithms |
Lecture 7 - Divide And Conquer - II Median Finding |
Link |
Design and Analysis of Algorithms |
Lecture 8 - Divide And Conquer - III Surfing Lower Bounds |
Link |
Design and Analysis of Algorithms |
Lecture 9 - Divide And Conquer - IV Closest Pair |
Link |
Design and Analysis of Algorithms |
Lecture 10 - Greedy Algorithms - I |
Link |
Design and Analysis of Algorithms |
Lecture 11 - Greedy Algorithms - II |
Link |
Design and Analysis of Algorithms |
Lecture 12 - Greedy Algorithms - III |
Link |
Design and Analysis of Algorithms |
Lecture 13 - Greedy Algorithms - IV |
Link |
Design and Analysis of Algorithms |
Lecture 14 - Pattern Matching - I |
Link |
Design and Analysis of Algorithms |
Lecture 15 - Pattern Matching - II |
Link |
Design and Analysis of Algorithms |
Lecture 16 - Combinational Search and Optimization - I |
Link |
Design and Analysis of Algorithms |
Lecture 17 - Combinational Search and Optimization - II |
Link |
Design and Analysis of Algorithms |
Lecture 18 - Dynamic Programming |
Link |
Design and Analysis of Algorithms |
Lecture 19 - Longest Common Subsequences |
Link |
Design and Analysis of Algorithms |
Lecture 20 - Matrix Chain Multiplication |
Link |
Design and Analysis of Algorithms |
Lecture 21 - Scheduling with Startup and Holding Costs |
Link |
Design and Analysis of Algorithms |
Lecture 22 - Average case Analysis of Quicksort |
Link |
Design and Analysis of Algorithms |
Lecture 23 - Bipartite Maximum Matching |
Link |
Design and Analysis of Algorithms |
Lecture 24 - Lower Bounds for Sorting |
Link |
Design and Analysis of Algorithms |
Lecture 25 - Element Distinctness Lower Bounds |
Link |
Design and Analysis of Algorithms |
Lecture 26 - NP-Completeness - I - Motivation |
Link |
Design and Analysis of Algorithms |
Lecture 27 - NP-Completeness - II |
Link |
Design and Analysis of Algorithms |
Lecture 28 - NP-Completeness - III |
Link |
Design and Analysis of Algorithms |
Lecture 29 - NP-Completeness - IV |
Link |
Design and Analysis of Algorithms |
Lecture 30 - NP-Completeness - V |
Link |
Design and Analysis of Algorithms |
Lecture 31 - NP-Completeness - VI |
Link |
Design and Analysis of Algorithms |
Lecture 32 - Approximation Algorithms |
Link |
Design and Analysis of Algorithms |
Lecture 33 - Approximation Algorithms |
Link |
Design and Analysis of Algorithms |
Lecture 34 - Approximation Algorithms for NP |
Link |
Software Engineering |
Lecture 1 - Introduction to Software Engineering - Challenges |
Link |
Software Engineering |
Lecture 2 - Introduction to Software Engineering |
Link |
Software Engineering |
Lecture 3 - Overview of Phases |
Link |
Software Engineering |
Lecture 4 - Overview of Phases |
Link |
Software Engineering |
Lecture 5 - Requirements Engineering / Specification |
Link |
Software Engineering |
Lecture 6 - Formal Specification |
Link |
Software Engineering |
Lecture 7 - Algebraic Specification Methods |
Link |
Software Engineering |
Lecture 8 - Systems Modeling Overview |
Link |
Software Engineering |
Lecture 9 - Process Modeling - DFD , Function Decomp |
Link |
Software Engineering |
Lecture 10 - Process Modeling - DFD, Function Decomp |
Link |
Software Engineering |
Lecture 11 - Data Modeling - ER Diagrams, Mapping |
Link |
Software Engineering |
Lecture 12 - Data Modeling - ER Diagrams, Mapping |
Link |
Software Engineering |
Lecture 13 - Production Quality Software - Introduction |
Link |
Software Engineering |
Lecture 14 - Software Design - Primary Consideration |
Link |
Software Engineering |
Lecture 15 - Design Patterns |
Link |
Software Engineering |
Lecture 16 - Class and Component Level Design |
Link |
Software Engineering |
Lecture 17 - Architectural Design |
Link |
Software Engineering |
Lecture 18 - Software Testing - I |
Link |
Software Engineering |
Lecture 19 - Software Testing - II |
Link |
Software Engineering |
Lecture 20 - Structural Programming and Some implementation |
Link |
Software Engineering |
Lecture 21 - Software Metrics and Quality |
Link |
Software Engineering |
Lecture 22 - Verification and Validation |
Link |
Software Engineering |
Lecture 23 - Case Study |
Link |
Software Engineering |
Lecture 24 - Case Study |
Link |
Software Engineering |
Lecture 25 - Software Evolution |
Link |
Software Engineering |
Lecture 26 - Agile Development |
Link |
Software Engineering |
Lecture 27 - Software Reuse CBSE |
Link |
Software Engineering |
Lecture 28 - Reuse Continued |
Link |
Software Engineering |
Lecture 29 - Introduction to Project Management |
Link |
Software Engineering |
Lecture 30 - Project Scope Management |
Link |
Software Engineering |
Lecture 31 - Project Time Management |
Link |
Software Engineering |
Lecture 32 - Estimation - I |
Link |
Software Engineering |
Lecture 33 - Estimation - II |
Link |
Software Engineering |
Lecture 34 - Project Quality Management |
Link |
Software Engineering |
Lecture 35 - Quality Management Systems - I |
Link |
Software Engineering |
Lecture 36 - Quality Management Systems |
Link |
Software Engineering |
Lecture 37 - Project Configuration Management |
Link |
Software Engineering |
Lecture 38 - Project Risk Management |
Link |
Software Engineering |
Lecture 39 - Other PM Processes |
Link |
NOC:Software Testing (2017) |
Lecture 1 - Motivation |
Link |
NOC:Software Testing (2017) |
Lecture 2 - Terminologies |
Link |
NOC:Software Testing (2017) |
Lecture 3 - Testing based on Models and Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 4 - Automation - JUnit as an example |
Link |
NOC:Software Testing (2017) |
Lecture 5 - Basics of Graphs: As used in testing |
Link |
NOC:Software Testing (2017) |
Lecture 6 - Structural Graph Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 7 - Elementary Graph Algorithms - Part 1 |
Link |
NOC:Software Testing (2017) |
Lecture 8 - Elementary Graph Algorithms - Part 2 |
Link |
NOC:Software Testing (2017) |
Lecture 9 - Algorithms: Structural Graph Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 10 - Assignment 2: Structural Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 11 - Data Flow Graphs |
Link |
NOC:Software Testing (2017) |
Lecture 12 - Algorithms: Data Flow Graph Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 13 - Graph Coverage Criteria: Applied to Test Code |
Link |
NOC:Software Testing (2017) |
Lecture 14 - Testing Source Code: Classical Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 15 - Data Flow Graph Coverage Criteria : Applied to Test Code |
Link |
NOC:Software Testing (2017) |
Lecture 16 - Software Design and Integration Testing |
Link |
NOC:Software Testing (2017) |
Lecture 17 - Design Integration Testing and Graph Coverage |
Link |
NOC:Software Testing (2017) |
Lecture 18 - Specification Testing and Graph Coverage |
Link |
NOC:Software Testing (2017) |
Lecture 19 - Graph Coverage and Finite state Machines |
Link |
NOC:Software Testing (2017) |
Lecture 20 - Assignment 4: Graph Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 21 - Logic: Basics Needed for Software Testing |
Link |
NOC:Software Testing (2017) |
Lecture 22 - Logic: Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 23 - Coverage Criteria, (Continued...) |
Link |
NOC:Software Testing (2017) |
Lecture 24 - Logic Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 25 - Logic Coverage Criteria: Applied to Test Code_1 |
Link |
NOC:Software Testing (2017) |
Lecture 26 - Logic Coverage Criteria: Applied to Test Code_2 |
Link |
NOC:Software Testing (2017) |
Lecture 27 - Logic Coverage Criteria: Issues in Applying to Test Code |
Link |
NOC:Software Testing (2017) |
Lecture 28 - Logic Coverage Criteria: Applied to Test Specifications |
Link |
NOC:Software Testing (2017) |
Lecture 29 - Logic Coverage Criteria: Applied to Finite State Machines |
Link |
NOC:Software Testing (2017) |
Lecture 30 - Week 6 Assignment Solving |
Link |
NOC:Software Testing (2017) |
Lecture 31 - Functional Testing |
Link |
NOC:Software Testing (2017) |
Lecture 32 - Input Space Partitioning |
Link |
NOC:Software Testing (2017) |
Lecture 33 - Input Space Partitioning: Coverage Criteria |
Link |
NOC:Software Testing (2017) |
Lecture 34 - Input Space Partitioning Coverage Criteria: Example |
Link |
NOC:Software Testing (2017) |
Lecture 35 - Syntax-Based Testing |
Link |
NOC:Software Testing (2017) |
Lecture 36 - Mutatioon Testing |
Link |
NOC:Software Testing (2017) |
Lecture 37 - Mutation Testing for Programs |
Link |
NOC:Software Testing (2017) |
Lecture 38 - Mutation Testing: Mutation Operators for Source Code |
Link |
NOC:Software Testing (2017) |
Lecture 39 - Mutation Testing Vs. Graphs and Logic Based Testing |
Link |
NOC:Software Testing (2017) |
Lecture 40 - Assignment Solving for Week8 |
Link |
NOC:Software Testing (2017) |
Lecture 41 - Mutation testing |
Link |
NOC:Software Testing (2017) |
Lecture 42 - Mutation Testing : Mutation for integration |
Link |
NOC:Software Testing (2017) |
Lecture 43 - Mutation testing : Grammars and inputs |
Link |
NOC:Software Testing (2017) |
Lecture 44 - Software Testing Course: Summary after Week 9 |
Link |
NOC:Software Testing (2017) |
Lecture 45 - Testing of web Applications and Web Services |
Link |
NOC:Software Testing (2017) |
Lecture 46 - Testing of web Applications and Web Services |
Link |
NOC:Software Testing (2017) |
Lecture 47 - Testing of web Applications and Web Services |
Link |
NOC:Software Testing (2017) |
Lecture 48 - Testing of Object-Oriented Applications |
Link |
NOC:Software Testing (2017) |
Lecture 49 - Testing of Object-Oriented Applications |
Link |
NOC:Software Testing (2017) |
Lecture 50 - Symbolic Testing - 1 |
Link |
NOC:Software Testing (2017) |
Lecture 51 - Symbolic Testing - 2 |
Link |
NOC:Software Testing (2017) |
Lecture 52 - DART: Directed Automated Random Testing - 1 |
Link |
NOC:Software Testing (2017) |
Lecture 53 - DART: Directed Automated Random Testing - 2 |
Link |
NOC:Software Testing (2017) |
Lecture 54 - DART: Directed Automated Random Testing - 3 |
Link |
NOC:Software Testing (2017) |
Lecture 55 - Testing of Object-Oriented Applications |
Link |
NOC:Software Testing (2017) |
Lecture 56 - Testing of Mobile Applications |
Link |
NOC:Software Testing (2017) |
Lecture 57 - Non-Functional System Testing |
Link |
NOC:Software Testing (2017) |
Lecture 58 - Regression Testing |
Link |
NOC:Software Testing (2017) |
Lecture 59 - Assignment: Week 11 Solving |
Link |
NOC:Software Testing (2017) |
Lecture 60 - Software Testing: Summary at the End of the Course |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 1 - Course Overview |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 2 - Introduction and Survey.0: The standard approach to introductory programming |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 3 - Introduction and Survey.1: Experience with the standard approach |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 4 - Introduction and Survey.2: Alternative approaches, Summary, and Conclusion |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 5 - Basic Ideas in Our Approach.0: Introduction |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 6 - Basic Ideas in Our Approach.1: Examples of translating manual algorithms to computer programs |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 7 - Basic Ideas in Our Approach.2: More examples |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 8 - Basic Ideas in Our Approach.3: Should we teach students (manual) problem solving strategies? |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 9 - Basic Ideas in Our Approach.4: The design of the course |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 10 - Basic Ideas in Our Approach.5: Remarks on individual topics - 1 |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 11 - Basic Ideas in Our Approach.6: Remarks on individual topics - 2, Conclusion |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 12 - Pedagogy.0: Introduction and basic principles |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 13 - Pedagogy.1: Scaffolding, Lesson Plan |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 14 - Pedagogy.2: A quick tour of the course - 1 |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 15 - Pedagogy.3: Tour-2 |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 16 - Pedagogy.4: Tour-3, Conclusion |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 17 - Advanced Programming Topics.0: Introduction, Organization of medium sized programs |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 18 - Advanced Programming Topics.1: Advanced memory management, Standard Library |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 19 - Advanced Programming topics.2: Object Oriented Programming, Concluding remarks |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 20 - In class questions, Assignments, Examinations.0: In class questions and lab assignments |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 21 - In class questions, Assignments, Examinations.1: Examinations |
Link |
NOC:Design and Pedagogy of the Introductory Programming Course |
Lecture 22 - Summing up |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 1 - Introduction - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 2 - Introduction - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 3 - Introduction - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 4 - Introduction - Part 4 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 5 - Problem Solving using Computer - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 6 - Problem Solving using Computer - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 7 - Problem Solving using Computer - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 8 - Problem Solving using Computer - Part 4 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 9 - Problem Solving using Computer - Part 5 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 10 - Basic Elements of Program - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 11 - Basic Elements of Program - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 12 - Basic Elements of Program - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 13 - Basic Elements of Program - Part 4 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 14 - Program Design - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 15 - Program Design - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 16 - Program Design - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 17 - Simple cpp Graphics |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 18 - Conditional Execution - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 19 - Most general form of if - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 20 - More general form of conditions - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 21 - A somewhat large program example - Part 4 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 22 - Switch statement and logical data - Part 5 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 23 - Loops - Part 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 24 - Mark averaging - Part 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 25 - The break and continue statements - Part 3 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 26 - The for statement - Part 4 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 27 - Euclid's algorithm for GCD - Part 5 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 28 - Correctness proof for GCD - Part 6 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 29 - Computing Mathematical Functions - Part 1 : Taylor series |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 30 - Computing Mathematical Functions - Part 2 : Numerical integration |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 31 - Computing Mathematical Functions - Part 3 : Bisection Method |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 32 - Computing Mathematical Functions - Part 4 : Newton Raphson Method |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 33 - Loops in various applications - Part 1 : Loops in various applications brute force algorithms |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 34 - Loops in various applications - Part 2 : Finding Pythagorean Triples |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 35 - Loops in various applications - Part 3 : Modelling a system: bargaining |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 36 - Loops in various applications - Part 4 : Simulating a water tank |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 37 - Loops in various applications - Part 5 : Arithmetic on very large numbers |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 38 - Functions - Part 1 : Basics |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 39 - Functions - Part 2 : Examples |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 40 - Functions - Part 3 : Reference parameters |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 41 - Functions - Part 4 : Pointers |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 42 - Functions - Part 5 : Graphics Objects and Lecture conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 43 - Recursion - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 44 - Recursion - Part 2 : Recursive objects, Tree drawing |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 45 - Recursion - Part 3 : How to think about recursion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 46 - Virahanka Numbers - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 47 - Virahanka Numbers - Part 2 : Recursive Program |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 48 - Virahanka Numbers - Part 3 : Iterative Program and Conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 49 - Program Organization and Functions - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 50 - Program Organization and Functions - Part 2 : Splitting into files |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 51 - Program Organization and Functions - Part 3 : Namespaces |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 52 - Program Organization and Functions - Part 4 : How to use C++ without simplecpp |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 53 - Advanced Features of Functions - Part 1 : Introduction and passing one function to another |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 54 - Advanced Features of Functions - Part 2 : Lambda expressions |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 55 - Advanced Features of Functions - Part 3 : Default values to parameters |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 56 - Advanced Features of Functions - Part 4 : Function overloading and lecture conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 57 - Array Part-1 - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 58 - Array Part-1 - Part 2 : Marks averaging problem |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 59 - Array Part-1 - Part 3 : Histogram computation |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 60 - Array Part-1 - Part 4 : Marks display variation |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 61 - Array Part-1 - Part 5 : Polynomial multiplication |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 62 - Array Part-1 - Part 6 : Queues in dispatching taxis |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 63 - Array Part-1 - Part 7 : More efficient Queues in dispatching taxis |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 64 - Array Part-1 - Part 8 : Disk intersection |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 65 - Array Part-1 - Part 9 : Arrays of graphical objects and conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 66 - Array Part-2 - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 67 - Array Part-2 - Part 2 : Interpretation of aname[index] |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 68 - Array Part-2 - Part 3 : Arrays and function calls |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 69 - Array Part-2 - Part 4 : A function to sort an array |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 70 - More on Arrays - Part 1 : Textual data |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 71 - More on Arrays - Part 2 : Functions on character strings |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 72 - More on Arrays - Part 3 : Two dimensional arrays |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 73 - More on Arrays - Part 4 : Command Line Arguments |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 74 - Arrays and recursion - Part 1 : Binary Search Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 75 - Arrays and recursion - Part 2 : Binary search analysis |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 76 - Arrays and recursion - Part 3 : Mergesort overview |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 77 - Arrays and recursion - Part 4 : Merge function |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 78 - Arrays and recursion - Part 5 : Mergesort conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 79 - Structures - Part 1 : Definition and instantiation |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 80 - Structures - Part 2 : Operations on structures |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 81 - Structures - Part 3 : An example program |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 82 - Structures - Part 4 : Pointers and lecture conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 83 - Structures Part 2 - Part 1 : Introduction to Member functions |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 84 - Structures Part 2 - Part 2 : Vectors from Physics |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 85 - Structures Part 2 - Part 3 : Taxi dispatch |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 86 - Classes - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 87 - Classes - Part 2 : Constructors |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 88 - Classes - Part 3 : Operator overloading |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 89 - Classes - Part 4 : Access control |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 90 - Classes - Part 5 : Classes for graphics and input output |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 91 - Classes - Part 6 : General remarks |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 92 - Representing variable length entities - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 93 - Representing variable length entities - Part 2 : Heap memory basics |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 94 - Representing variable length entities - Part 3 : Pitfalls of using heap memory |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 95 - Representing variable length entities - Part 4 : Automating memory management |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 96 - Representing variable length entities - Part 5 : Implementing a class with automated memory management - 1 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 97 - Representing variable length entities - Part 6 : Implementing a class with automated memory management - 2 |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 98 - Representing variable length entities - Part 7 : Using the implemented class and conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 99 - The Standard Library - Part 1 : Class string |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 100 - The Standard Library - Part 2 : Class vector |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 101 - The Standard Library - Part 3 : Sorting vectors and arrays |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 102 - The Standard Library - Part 4 : Classes map and unordered_map |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 103 - The Standard Library - Part 5 : Iterators |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 104 - Data structure based programming - Part 1 : Introduction |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 105 - Data structure based programming - Part 2 : Set and pair classes |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 106 - Data structure based programming - Part 3 : Implementation of standard library data structures |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 107 - Data structure based programming - Part 4 : Composing data structures |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 108 - Data structure based programming - Part 5 : typedef and lecture conclusion |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 109 - Medium size programs - Part 1 : The new marks display program |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 110 - Medium size programs - Part 2 : Manual algorithm for new marks display |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 111 - Medium size programs - Part 3 : RSMTAB and rest of the program |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 112 - Medium size programs - Part 4 : Sophisticated solutions to marks display |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 113 - A graphical editor and solver for circuits - Part 1 : Outline |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 114 - A graphical editor and solver for circuits - Part 2 : Main program and organization |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 115 - A graphical editor and solver for circuits - Part 3 : Mathematical representation of the circuit |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 116 - A graphical editor and solver for circuits - Part 4 : Extensions and concluding remarks |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 117 - Cosmological simulation - Part 1 : Introduction and First order Euler method |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 118 - Cosmological simulation - Part 2 : Second order Euler method |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 119 - Cosmological simulation - Part 3 : The program |
Link |
NOC:An Introduction to Programming through C++ |
Lecture 120 - Cosmological simulation - Part 4 : Concluding remarks |
Link |
NOC:Demystifying Networking |
Lecture 1 - Introduction |
Link |
NOC:Demystifying Networking |
Lecture 2 - Analogy for CEO's Problem |
Link |
NOC:Demystifying Networking |
Lecture 3 - Discussing the CEO's Problem |
Link |
NOC:Demystifying Networking |
Lecture 4 - From the CEO's Company to Layers in a Network |
Link |
NOC:Demystifying Networking |
Lecture 5 - Layers in Detail |
Link |
NOC:Demystifying Networking |
Lecture 6 - Layered Nature of a Network |
Link |
NOC:Demystifying Networking |
Lecture 7 - Introduction to Internet Data Capturing using Wireshark |
Link |
NOC:Demystifying Networking |
Lecture 8 - Network data captured while requesting a website |
Link |
NOC:Demystifying Networking |
Lecture 9 - What is Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 10 - Modes of Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 11 - Getting Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 12 - Logical and Physical Typologies in Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 13 - Devices on Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 14 - Introduction to the Cisco Packet Tracer Activity for Week 1 |
Link |
NOC:Demystifying Networking |
Lecture 15 - Introduction to the campus network on Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 16 - Loading the page in Simulation Mode |
Link |
NOC:Demystifying Networking |
Lecture 17 - Inspecting the packets in Simulation Mode |
Link |
NOC:Demystifying Networking |
Lecture 18 - Editing the dummy website on Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 19 - Summary of the Cisco Packet Tracer Activity |
Link |
NOC:Demystifying Networking |
Lecture 20 - Introduction to Anupam's Adventure |
Link |
NOC:Demystifying Networking |
Lecture 21 - Anupam's adventure brings us to IP Addressing |
Link |
NOC:Demystifying Networking |
Lecture 22 - Addressing at various layers |
Link |
NOC:Demystifying Networking |
Lecture 23 - IP Addresses |
Link |
NOC:Demystifying Networking |
Lecture 24 - Address Translation |
Link |
NOC:Demystifying Networking |
Lecture 25 - Introduction to IP Addressing |
Link |
NOC:Demystifying Networking |
Lecture 26 - Creating a network with Sub-net mask |
Link |
NOC:Demystifying Networking |
Lecture 27 - Nomenclature of a sub-net mask |
Link |
NOC:Demystifying Networking |
Lecture 28 - Network addresses and Private networks |
Link |
NOC:Demystifying Networking |
Lecture 29 - Introduction to the Addressing Topology |
Link |
NOC:Demystifying Networking |
Lecture 30 - Addressing a local network and DHCP |
Link |
NOC:Demystifying Networking |
Lecture 31 - Addressing a local network manually |
Link |
NOC:Demystifying Networking |
Lecture 32 - Addressing in Pubilc and Private Networks |
Link |
NOC:Demystifying Networking |
Lecture 33 - Verifying Connectivity using Ping |
Link |
NOC:Demystifying Networking |
Lecture 34 - Using network address translation to communicate on internet |
Link |
NOC:Demystifying Networking |
Lecture 35 - Using Sub nets and Summary of addressing |
Link |
NOC:Demystifying Networking |
Lecture 36 - Summary of the week |
Link |
NOC:Demystifying Networking |
Lecture 37 - Analogy for the week 2 |
Link |
NOC:Demystifying Networking |
Lecture 38 - Discussion on dabbawala analogy |
Link |
NOC:Demystifying Networking |
Lecture 39 - From dabbawalas to routers and switches |
Link |
NOC:Demystifying Networking |
Lecture 40 - What is routing ? |
Link |
NOC:Demystifying Networking |
Lecture 41 - Static routing in a router in CPT |
Link |
NOC:Demystifying Networking |
Lecture 42 - How does a switch forwards packets CPT |
Link |
NOC:Demystifying Networking |
Lecture 43 - How to add static route in a router? (CPT) |
Link |
NOC:Demystifying Networking |
Lecture 44 - Traveler's dilemma |
Link |
NOC:Demystifying Networking |
Lecture 45 - Duscussing the Traveler's dilemma |
Link |
NOC:Demystifying Networking |
Lecture 46 - From Traveler's dilemma to Dynamic Routing |
Link |
NOC:Demystifying Networking |
Lecture 47 - Dynamic Routing with Distance Vector |
Link |
NOC:Demystifying Networking |
Lecture 48 - Distance Vector Routing in Detail |
Link |
NOC:Demystifying Networking |
Lecture 49 - Dynamic Routing with Link State |
Link |
NOC:Demystifying Networking |
Lecture 50 - Setting up dynamic routing in Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 51 - Summary of the week |
Link |
NOC:Demystifying Networking |
Lecture 52 - Introduction to analogy for week 3 |
Link |
NOC:Demystifying Networking |
Lecture 53 - Analogy for week 3 |
Link |
NOC:Demystifying Networking |
Lecture 54 - Questions on analogy for week 3 |
Link |
NOC:Demystifying Networking |
Lecture 55 - Understanding the new order requirements |
Link |
NOC:Demystifying Networking |
Lecture 56 - Introduction to Tranport Layer |
Link |
NOC:Demystifying Networking |
Lecture 57 - Introduction to TCP |
Link |
NOC:Demystifying Networking |
Lecture 58 - Introduction to UDP |
Link |
NOC:Demystifying Networking |
Lecture 59 - Exploring UDP on Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 60 - TCP Connection Establishment |
Link |
NOC:Demystifying Networking |
Lecture 61 - TCP Connection Closure |
Link |
NOC:Demystifying Networking |
Lecture 62 - Summay of TCP and UDP on Cisco Packet Tracer |
Link |
NOC:Demystifying Networking |
Lecture 63 - The story of the delivery fiasco |
Link |
NOC:Demystifying Networking |
Lecture 64 - From delivery fisaco to Port Numbers |
Link |
NOC:Demystifying Networking |
Lecture 65 - Application Layer in depth |
Link |
NOC:Demystifying Networking |
Lecture 66 - Port number in Wireshark |
Link |
NOC:Demystifying Networking |
Lecture 67 - Summary of port number and PAT |
Link |
NOC:Demystifying Networking |
Lecture 68 - Summary of the entire TCP IP stack |
Link |
NOC:Demystifying Networking |
Lecture 69 - Introducing the analogy for week 4 |
Link |
NOC:Demystifying Networking |
Lecture 70 - The secret box |
Link |
NOC:Demystifying Networking |
Lecture 71 - Questions on analogy for week 4 |
Link |
NOC:Demystifying Networking |
Lecture 72 - Secret of the secret box |
Link |
NOC:Demystifying Networking |
Lecture 73 - From secret box to encryption |
Link |
NOC:Demystifying Networking |
Lecture 74 - Introduction to security and CIA |
Link |
NOC:Demystifying Networking |
Lecture 75 - Information Security and Defence in Depth |
Link |
NOC:Demystifying Networking |
Lecture 76 - Information Classification and Access Control |
Link |
NOC:Demystifying Networking |
Lecture 77 - Process Management |
Link |
NOC:Demystifying Networking |
Lecture 78 - Introduction to Network Security |
Link |
NOC:Demystifying Networking |
Lecture 79 - Network Breach and Countermeasures |
Link |
NOC:Demystifying Networking |
Lecture 80 - Internet Security |
Link |
NOC:Demystifying Networking |
Lecture 81 - Securing the Internet Usage |
Link |
NOC:Demystifying Networking |
Lecture 82 - Internet Security Products |
Link |
NOC:Demystifying Networking |
Lecture 83 - Personal Computing Device Recommendations |
Link |
NOC:Demystifying Networking |
Lecture 84 - Responsible Behavior on the Internet |
Link |
NOC:Demystifying Networking |
Lecture 85 - Best practices for home Network and Media Devices |
Link |
NOC:Demystifying Networking |
Lecture 86 - Closing thoughts on security |
Link |
NOC:Demystifying Networking |
Lecture 87 - The story of a family trip |
Link |
NOC:Demystifying Networking |
Lecture 88 - The troubleshooting approach |
Link |
NOC:Demystifying Networking |
Lecture 89 - Troubleshooting Physical and Data Link Layers |
Link |
NOC:Demystifying Networking |
Lecture 90 - Troubleshooting Network Layer |
Link |
NOC:Demystifying Networking |
Lecture 91 - Troubleshooting Transport and Application Layers |
Link |
NOC:Demystifying Networking |
Lecture 92 - Troubleshooting Summary |
Link |
NOC:Demystifying Networking |
Lecture 93 - Troubleshooting Heuristics |
Link |
NOC:Demystifying Networking |
Lecture 94 - Troubleshooting Challenge - 1 |
Link |
NOC:Demystifying Networking |
Lecture 95 - Troubleshooting challenge - 2 |
Link |
NOC:Demystifying Networking |
Lecture 96 - Troubleshooting Challenge - 3 |
Link |
NOC:Demystifying Networking |
Lecture 97 - Thats How we Troubleshoot |
Link |
NOC:Demystifying Networking |
Lecture 98 - Week Summary |
Link |
NOC:Demystifying Networking |
Lecture 99 - Course Closure |
Link |
NOC:Demystifying Networking |
Lecture 100 - Course Credits |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 1 - Introduction to Computer Systems |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 2 - Principles of Computer Systems Design |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 3 - Overview of CPU hardware |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 4 - Overview of memory and I/O hardware |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 5 - Introduction to Operating Systems |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 6 - Week 1: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 7 - Week 1: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 8 - Processes |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 9 - Kernel mode execution |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 10 - Threads |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 11 - CPU scheduling policies |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 12 - Virtual machines and containers |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 13 - Week 2: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 14 - Week 2: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 15 - Week 2: Tutorial 3 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 16 - Memory management in OS |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 17 - Paging |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 18 - Demand paging |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 19 - File system and memory |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 20 - Optimizing memory access |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 21 - Week 3: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 22 - Week 3: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 23 - Week 3: Tutorial 3 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 24 - Filesystem Datastructures |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 25 - Filesystem Implementation |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 26 - Network I/O via Sockets |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 27 - Network I/O Implementation |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 28 - Memory and I/O virtualization |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 29 - Week 4: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 30 - Week 4: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 31 - Introduction to computer networking |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 32 - Internet Routing and Forwarding |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 33 - Transport protocols |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 34 - Application layer protocols |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 35 - Network Security |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 36 - Week 5: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 37 - Week 5: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 38 - Multithreaded application design |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 39 - Inter-process communication |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 40 - Multi-tier application design |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 41 - Examples of end-to-end systems design |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 42 - Deployment of computer systems |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 43 - Week 6: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 44 - Week 6: Tutorial 2 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 45 - Performance measurement |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 46 - Performance analysis |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 47 - Performance profiling and optimization |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 48 - Caching |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 49 - Performance scalability |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 50 - Week 7: Tutorial 1 |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 51 - Fault tolerance and reliability |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 52 - Replication and consistency |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 53 - Atomicity |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 54 - Distributed transactions |
Link |
NOC:Design and Engineering of Computer Systems |
Lecture 55 - Case studies of distributed systems design |
Link |
NOC:Software Conceptual Design |
Lecture 1 |
Link |
NOC:Software Conceptual Design |
Lecture 2 |
Link |
NOC:Software Conceptual Design |
Lecture 3 |
Link |
NOC:Software Conceptual Design |
Lecture 4 |
Link |
NOC:Software Conceptual Design |
Lecture 5 |
Link |
NOC:Software Conceptual Design |
Lecture 6 |
Link |
NOC:Software Conceptual Design |
Lecture 7 |
Link |
NOC:Software Conceptual Design |
Lecture 8 |
Link |
NOC:Software Conceptual Design |
Lecture 9 |
Link |
NOC:Software Conceptual Design |
Lecture 10 |
Link |
NOC:Software Conceptual Design |
Lecture 11 |
Link |
NOC:Software Conceptual Design |
Lecture 12 |
Link |
NOC:Software Conceptual Design |
Lecture 13 |
Link |
NOC:Software Conceptual Design |
Lecture 14 |
Link |
NOC:Software Conceptual Design |
Lecture 15 |
Link |
NOC:Software Conceptual Design |
Lecture 16 |
Link |
NOC:Software Conceptual Design |
Lecture 17 |
Link |
NOC:Software Conceptual Design |
Lecture 18 |
Link |
NOC:Software Conceptual Design |
Lecture 19 |
Link |
NOC:Software Conceptual Design |
Lecture 20 |
Link |
NOC:Software Conceptual Design |
Lecture 21 |
Link |
NOC:Software Conceptual Design |
Lecture 22 |
Link |
NOC:Software Conceptual Design |
Lecture 23 |
Link |
NOC:Software Conceptual Design |
Lecture 24 |
Link |
NOC:Software Conceptual Design |
Lecture 25 |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 1 - Introduction: Game Theory |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 2 - Introduction: Mechanism Design |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 3 - The game of chess |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 4 - Proof of the chess theorem |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 5 - Normal form games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 6 - Dominance |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 7 - Nash equilibrium |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 8 - Maxmin strategies |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 9 - Elimination of dominated strategies |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 10 - Preservation of PSNE |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 11 - Matrix games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 12 - Relation between Maxmin and PSNE in matrix |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 13 - Mixed strategies |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 14 - Mixed strategy Nash equilibrium (MSNE) |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 15 - Find MSNE |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 16 - MSNE characterization theorem proof |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 17 - Algorithm to find MSNE |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 18 - Correlated equilibrium (CE) |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 19 - Computing correlated equilibrium |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 20 - Extensive form games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 21 - Subgame perfection |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 22 - Limitations of SPNE |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 23 - Imperfect Information Extensive Form Games (IIEFG) |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 24 - Strategies in IIEFGs |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 25 - Equivalence of Strategies in IIEFGs |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 26 - Perfect Recall |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 27 - Equilibrium in IIEFG |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 28 - Game Theory in Practice: P2P file sharing |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 29 - Bayesian Games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 30 - Strategy, Utility in Bayesian Games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 31 - Equilibrium in Bayesian Games |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 32 - Examples of Bayesian Equilibrium |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 33 - Introduction to Mechanism Design |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 34 - Revelation Principle |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 35 - Introduction to Arrow's Impossibility Result |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 36 - Proof of Arrow's Result |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 37 - Introduction to the Social Choice Setup |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 38 - Introduction to Gibbard-Satterthwaite Theorem |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 39 - Proof of Gibbard-Satterthwaite Theorem |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 40 - Domain Restriction |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 41 - Median Voting Rule |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 42 - Median Voter Theorem - Part 1 |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 43 - Median Voter Theorem - Part 2 |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 44 - The Task Sharing Domain |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 45 - The Uniform Rule |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 46 - Mechanism Design with Transfers |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 47 - Examples of Quasi-linear Preferences |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 48 - Pareto Optimality and Groves Payments |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 49 - Introduction to VCG Mechanism |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 50 - VCG in Combinatorial Allocations |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 51 - Applications to Internet Advertising |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 52 - Slot Allocation and Payments in Position |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 53 - Pros and Cons of VCG Mechanism |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 54 - Affine Maximizers |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 55 - Single Object Allocation |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 56 - Myerson's Lemma |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 57 - Illustration of Myerson's Lemma |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 58 - Optimal Mechanism Design |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 59 - Single Agent Optimal Mechanism Design |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 60 - Multiple Agent Optimal Mechanism Design |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 61 - Examples of Optimal Mechanisms |
Link |
NOC:Introduction to Game Theory and Mechanism Design |
Lecture 62 - Endnotes and Summary |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 1 - Introduction, why do delays happen, contention for resources |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 2 - Performance metrics and parameters |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 3 - Introducing Queuing Systems |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 4 - Memoryless Distributions |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 5 - Operational Laws |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 6 - Asymptotic Analysis of G/G/1, G/G/1/K queues |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 7 - Asymptotic Analysis of G/G/c/K queues |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 8 - Little's Law |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 9 - Little’s Law examples and A Case Study of Open Load test on a Web server |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 10 - Some results for M/G/1 queue and Memoryless Arrivals |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 11 - Continuing the Case Study of Open Load test on a web server (Response Time) |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 12 - Open queuing networks - tandem queuing network |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 13 - Open queuing networks - general (Jackson) queuing networks |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 14 - Open queuing networks - examples |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 15 - Closed Queuing Systems |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 16 - Closed Queuing System (Continued...) |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 17 - Case study of Closed Load Test on a Web Server |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 18 - General formulation of Jacksonian Closed Queuing Networks |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 19 - Mean Value Analysis for Closed Queuing Networks |
Link |
NOC:Introduction to Computer and Network Performance Analysis using Queuing Systems |
Lecture 20 - Mean Value Analysis examples,Case Study of a Load test on a web server,Closing Remarks |
Link |
NOC:Games and Information |
Lecture 1 - Introduction, why do delays happen, contention for resources |
Link |
NOC:Games and Information |
Lecture 2 - Performance metrics and parameters |
Link |
NOC:Games and Information |
Lecture 3 - Introducing Queuing Systems |
Link |
NOC:Games and Information |
Lecture 4 - Memoryless Distributions |
Link |
NOC:Games and Information |
Lecture 5 - Operational Laws |
Link |
NOC:Games and Information |
Lecture 6 - Aumann model of incomplete information: Definition and Examples |
Link |
NOC:Games and Information |
Lecture 7 - Knowledge operator: Definition and Examples |
Link |
NOC:Games and Information |
Lecture 8 - Common knowledge: Definition and Examples |
Link |
NOC:Games and Information |
Lecture 9 - The structural theorem of common knowledge |
Link |
NOC:Games and Information |
Lecture 10 - Proof of the structural theorem (forward direction) |
Link |
NOC:Games and Information |
Lecture 11 - Proof of the structural theorem (backward direction) |
Link |
NOC:Games and Information |
Lecture 12 - Aumann model of incomplete information with belief: Definition and Examples |
Link |
NOC:Games and Information |
Lecture 13 - Aumann's agreement theorem |
Link |
NOC:Games and Information |
Lecture 14 - Zero-sum game definition and Security strategies |
Link |
NOC:Games and Information |
Lecture 15 - Saddle point strategies |
Link |
NOC:Games and Information |
Lecture 16 - Further properties of saddle point strategies |
Link |
NOC:Games and Information |
Lecture 17 - Mixed strategies |
Link |
NOC:Games and Information |
Lecture 18 - Weirstrass lemma and existence of a mixed saddle point strategy |
Link |
NOC:Games and Information |
Lecture 19 - Von Nuenmann minmax theorem |
Link |
NOC:Games and Information |
Lecture 20 - Computing mixed saddle point startegy: Holmes and Moriarty |
Link |
NOC:Games and Information |
Lecture 21 - Computing mixed strategy saddle point: 2X2 matrix game |
Link |
NOC:Games and Information |
Lecture 22 - Computing mixed strategy saddle point: 2X3 matrix game |
Link |
NOC:Games and Information |
Lecture 23 - Nash equilibrium of a non zero-sum game and its relation with Kakutani fixed |
Link |
NOC:Games and Information |
Lecture 24 - Proof: Existence of Nash equilibrium (Condition 1 of Kakutani fixed point) |
Link |
NOC:Games and Information |
Lecture 25 - Proof: Existence of Nash equilibrium (Condition 2 of Kakutani fixed point) |
Link |
NOC:Games and Information |
Lecture 26 - Existence of Nash equilibrium for infinite strategy space (Using Brower's) |
Link |
NOC:Games and Information |
Lecture 27 - Quantal Response: Motivation |
Link |
NOC:Games and Information |
Lecture 28 - Quantal Response: Formal model |
Link |
NOC:Games and Information |
Lecture 29 - Dynamic games definiton |
Link |
NOC:Games and Information |
Lecture 30 - Solution concept in dynamic games |
Link |
NOC:Games and Information |
Lecture 31 - Relation of the heuristic solution with the Nash equilibrium of the standard |
Link |
NOC:Games and Information |
Lecture 32 - Example of a Threat equilibrium |
Link |
NOC:Games and Information |
Lecture 33 - Interpreting the threat equilibrium in standard normal form of the dynamic game |
Link |
NOC:Games and Information |
Lecture 34 - Extensive form games - I |
Link |
NOC:Games and Information |
Lecture 35 - Extensive form games - II |
Link |
NOC:Games and Information |
Lecture 36 - Single Act Games |
Link |
NOC:Games and Information |
Lecture 37 - Informationally inferior games |
Link |
NOC:Games and Information |
Lecture 38 - Information Structure in Single Act Games |
Link |
NOC:Games and Information |
Lecture 39 - Nested and Ladder Nested Extensive form games |
Link |
NOC:Games and Information |
Lecture 40 - Equilibrium Algorithm |
Link |
NOC:Games and Information |
Lecture 41 - Stage-wise multi act games |
Link |
NOC:Games and Information |
Lecture 42 - Feedback equilibrium |
Link |
NOC:Games and Information |
Lecture 43 - Mixed and Behavioral Strategies |
Link |
NOC:Games and Information |
Lecture 44 - Conditions for equivalence for mixed and behavioral strategies |
Link |
NOC:Games and Information |
Lecture 45 - Kuhn's Theorem - I |
Link |
NOC:Games and Information |
Lecture 46 - Kuhn's Theorem - II |
Link |
NOC:Games and Information |
Lecture 47 - Kuhn's Theorem - III |
Link |
NOC:Games and Information |
Lecture 48 - Games of incomplete information |
Link |
NOC:Games and Information |
Lecture 49 - Bayesian Nash equilibrium - I |
Link |
NOC:Games and Information |
Lecture 50 - Bayesian Nash equilibrium - II |
Link |
NOC:Games and Information |
Lecture 51 - Self-enforcement of Nash equilibrium |
Link |
NOC:Games and Information |
Lecture 52 - Stackelberg game |
Link |
NOC:Games and Information |
Lecture 53 - Principal-Agent Models - I |
Link |
NOC:Games and Information |
Lecture 54 - Principal-Agent Models - II |
Link |
NOC:Games and Information |
Lecture 55 - Moral Hazard and Adverse selection |
Link |
NOC:Games and Information |
Lecture 56 - Games with contracts |
Link |
NOC:Games and Information |
Lecture 57 - Correlated Equilibrium - I |
Link |
NOC:Games and Information |
Lecture 58 - Correlated Equilibrium - II |
Link |
NOC:Games and Information |
Lecture 59 - Correlated Equilibrium - III |
Link |
NOC:Games and Information |
Lecture 60 - Bayesian Game with mediated communication |
Link |
NOC:Games and Information |
Lecture 61 - Revelation Principle |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 1 - Introduction to optimization |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 2 - Analyzing optimization algorithms in continuous time domain |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 3 - Course Outline |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 4 - Basics of optimization problems |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 5 - Convex sets and Convex functions |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 6 - Strictly and strongly convex functions |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 7 - Implications of strong convexity |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 8 - Primal and dual optimization problems |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 9 - Slaters condition |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 10 - Analysis of gradient descent algorithm |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 11 - KKT conditions |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 12 - Acceleration under strong convexity |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 13 - Accelerate the convergence even further |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 14 - Stability theory |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 15 - Connections to optimization problems |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 16 - Exponential stability |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 17 - Bregman Divergance |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 18 - Rescaled Gradient Flow |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 19 - Advanced Results on PL inequality - Part 1 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 20 - Advanced Results on PL inequality - Part 2 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 21 - Constrained Optimization Problem |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 22 - Augmented Lagrangian |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 23 - Method of Multipliers |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 24 - Dual Ascent and Dual Decomposition |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 25 - ADMM Algorithm |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 26 - Basics of Graph Theory - 1 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 27 - Basics of Graph Theory - 2 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 28 - Consensus and Average Consensus - 1 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 29 - Consensus and Average Consensus - 2 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 30 - Consensus Algorithms |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 31 - Consensus Algorithms - Fixed time |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 32 - Distributed Economic Dispatch Problem |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 33 - Algorithm for Uncapacitated EDP |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 34 - Capacitated EDP |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 35 - Algorithms for Distributed Optimization - 1 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 36 - Algorithms for Distributed Optimization - 2 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 37 - Continuous-time Distributed Optimization Algorithms |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 38 - Introduction to Neural Networks |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 39 - Large Scale Machine Learning |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 40 - Decentralized Stochastic Gradient Descent - 1 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 41 - Decentralized Stochastic Gradient Descent - 2 |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 42 - Introduction to Federated Learning |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 43 - FedAvg Algorithm |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 44 - Convergence Analysis of FL |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 45 - Sources of Computational Heterogenity in FL |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 46 - Objective Inconsistency Problem |
Link |
NOC:Distributed Optimization and Machine Learning |
Lecture 47 - General Update Rule |
Link |
Computational Geometry |
Lecture 1 - Introduction |
Link |
Computational Geometry |
Lecture 2 - Visibility Problems |
Link |
Computational Geometry |
Lecture 3 - 2D Maxima |
Link |
Computational Geometry |
Lecture 4 - Line Sweep Method |
Link |
Computational Geometry |
Lecture 5 - Segment Intersection Problem |
Link |
Computational Geometry |
Lecture 6 - Line Sweep: Rectangle Union |
Link |
Computational Geometry |
Lecture 7 - Convex Hull |
Link |
Computational Geometry |
Lecture 8 - Convex Hull Contd |
Link |
Computational Geometry |
Lecture 9 - Quick Hull |
Link |
Computational Geometry |
Lecture 10 - More Convex Hull Algorithms |
Link |
Computational Geometry |
Lecture 11 - Intersection of Half Planes and Duality |
Link |
Computational Geometry |
Lecture 12 - Intersection of Half Planes and Duality Contd |
Link |
Computational Geometry |
Lecture 13 - Lower Bounds |
Link |
Computational Geometry |
Lecture 14 - Planar Point Location |
Link |
Computational Geometry |
Lecture 15 - Point Location and Triangulation Contd... |
Link |
Computational Geometry |
Lecture 16 - Triangulation of Arbitrary Polygon |
Link |
Computational Geometry |
Lecture 17 - Voronoi Diagram : Properties |
Link |
Computational Geometry |
Lecture 18 - Voronoi Diagram Construction |
Link |
Computational Geometry |
Lecture 19 - Delaunay Triangulation |
Link |
Computational Geometry |
Lecture 20 - Quick sort and Backward Analysis |
Link |
Computational Geometry |
Lecture 21 - Generalized RIC |
Link |
Computational Geometry |
Lecture 22 - RIC Continued |
Link |
Computational Geometry |
Lecture 23 - Arrangements |
Link |
Computational Geometry |
Lecture 24 - Zone Theorem and Application |
Link |
Computational Geometry |
Lecture 25 - Levels |
Link |
Computational Geometry |
Lecture 26 - Range Searching : Introduction |
Link |
Computational Geometry |
Lecture 27 - Orthogonal Range searching |
Link |
Computational Geometry |
Lecture 28 - Priority Search Trees |
Link |
Computational Geometry |
Lecture 29 - Non - Orthogonal Range Searching |
Link |
Computational Geometry |
Lecture 30 - Half - Plane Range Query |
Link |
Computational Geometry |
Lecture 31 - Well Separated Partitioning |
Link |
Computational Geometry |
Lecture 32 - Quadtrees Epsilon -WSPD |
Link |
Computational Geometry |
Lecture 33 - Construction of Epsilon - WSPD |
Link |
Computational Geometry |
Lecture 34 - Epsilon - WSPD to Geometric Spanner |
Link |
Computational Geometry |
Lecture 35 - Epsilon-Nets & VC Dimension |
Link |
Computational Geometry |
Lecture 36 - Epsilon-Nets & VC Dimension contd |
Link |
Computational Geometry |
Lecture 37 - Geometric Set Cover |
Link |
Computational Geometry |
Lecture 38 - Geometric Set Cover (with Bounded VC Dimension) |
Link |
Computational Geometry |
Lecture 39 - Shape Representation |
Link |
Computational Geometry |
Lecture 40 - Shape Comparison |
Link |
Logic for CS |
Lecture 1 - Introduction |
Link |
Logic for CS |
Lecture 2 - Propositional Logic Syntax |
Link |
Logic for CS |
Lecture 3 - Semantics of Propositional Logic |
Link |
Logic for CS |
Lecture 4 - Logical and Algebraic Concepts |
Link |
Logic for CS |
Lecture 5 - Identities and Normal forms |
Link |
Logic for CS |
Lecture 6 - Tautology Checking |
Link |
Logic for CS |
Lecture 7 - Propositional Unsatisfiability |
Link |
Logic for CS |
Lecture 8 - Analytic Tableaux |
Link |
Logic for CS |
Lecture 9 - Consistency and Completeness |
Link |
Logic for CS |
Lecture 10 - The Completeness Theorem |
Link |
Logic for CS |
Lecture 11 - Maximally Consistent Sets |
Link |
Logic for CS |
Lecture 12 - Formal Theories |
Link |
Logic for CS |
Lecture 13 - Proof Theory : Hilbert-style |
Link |
Logic for CS |
Lecture 14 - Derived Rules |
Link |
Logic for CS |
Lecture 15 - The Hilbert System : Soundness |
Link |
Logic for CS |
Lecture 16 - The Hilbert System : Completeness |
Link |
Logic for CS |
Lecture 17 - Introduction to Predicate Logic |
Link |
Logic for CS |
Lecture 18 - The Semantic of Predicate Logic |
Link |
Logic for CS |
Lecture 19 - Subsitutions |
Link |
Logic for CS |
Lecture 20 - Models |
Link |
Logic for CS |
Lecture 21 - Structures and Substructures |
Link |
Logic for CS |
Lecture 22 - First-Order Theories |
Link |
Logic for CS |
Lecture 23 - Predicate Logic: Proof Theory (Continued...) |
Link |
Logic for CS |
Lecture 24 - Existential Quantification |
Link |
Logic for CS |
Lecture 25 - Normal Forms |
Link |
Logic for CS |
Lecture 26 - Skalemization |
Link |
Logic for CS |
Lecture 27 - Substitutions and Instantiations |
Link |
Logic for CS |
Lecture 28 - Unification |
Link |
Logic for CS |
Lecture 29 - Resolution in FOL |
Link |
Logic for CS |
Lecture 30 - More on Resolution in FOL |
Link |
Logic for CS |
Lecture 31 - Resolution : Soundness and Completeness |
Link |
Logic for CS |
Lecture 32 - Resolution and Tableaux |
Link |
Logic for CS |
Lecture 33 - Completeness of Tableaux Method |
Link |
Logic for CS |
Lecture 34 - Completeness of the Hilbert System |
Link |
Logic for CS |
Lecture 35 - First-Order Theories |
Link |
Logic for CS |
Lecture 36 - Towards Logic Programming |
Link |
Logic for CS |
Lecture 37 - Verification of Imperative Programs |
Link |
Logic for CS |
Lecture 38 - Verification of WHILE Programs |
Link |
Logic for CS |
Lecture 39 - References |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 1 - Introduction to Computer Architecture |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 2 - History of Computers |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 3 - Instruction Set Architecture - I |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 4 - Instruction Set Architecture - II |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 5 - Instruction Set Architecture - III |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 6 - Recursive Programs |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 7 - Architecture Space |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 8 - Architecture Examples |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 9 - Performance |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 10 - Performance |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 11 - Binary Arithmetic, ALU Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 12 - ALU Design, Overflow |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 13 - Multiplier Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 14 - Divider Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 15 - Fast Addition , Multiplication |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 16 - Floating Point Arithmetic |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 17 - Processor Design - Introduction |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 18 - Processor Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 19 - Processor Design - Simple Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 20 - Processor Design - Multi Cycle Approach |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 21 - Processor Design - Control for Multi Cycle |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 22 - Processor Design - Micro programmed Control |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 23 - Processor Design - Exception Handling |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 24 - Pipelined Processor Design Basic Idea |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 25 - Pipelined Processor Design: Data path |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 26 - Pipelined Processor Design: Handling Data |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 27 - Pipelined Processor Design |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 28 - Memory Hierarchy : Basic Idea |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 29 - Memory Hierarchy : Cache Organization |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 30 - Memory Hierarchy : Cache Organization |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 31 - Memory Hierarchy : Virtual Memory |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 32 - Memory Hierarchy : Virtual Memory |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 33 - Input / Output Subsystem: Introduction |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 34 - Input / Output Subsystem: Interfaces and buses |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 35 - Input / Output Subsystem: Interfaces and buses |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 36 - Input / Output Subsystem: I/O Operations |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 37 - Input / Output Subsystem: Designing I/O Systems |
Link |
Computer Architecture (Prof. Anshul Kumar) |
Lecture 38 - Concluding Remarks |
Link |
Data Structures And Algorithms |
Lecture 1 - Introduction to Data Structures and Algorithms |
Link |
Data Structures And Algorithms |
Lecture 2 - Stacks |
Link |
Data Structures And Algorithms |
Lecture 3 - Queues and Linked Lists |
Link |
Data Structures And Algorithms |
Lecture 4 - Dictionaries |
Link |
Data Structures And Algorithms |
Lecture 5 - Hashing |
Link |
Data Structures And Algorithms |
Lecture 6 - Trees |
Link |
Data Structures And Algorithms |
Lecture 7 - Tree Walks / Traversals |
Link |
Data Structures And Algorithms |
Lecture 8 - Ordered Dictionaries |
Link |
Data Structures And Algorithms |
Lecture 9 - Deletion |
Link |
Data Structures And Algorithms |
Lecture 10 - Quick Sort |
Link |
Data Structures And Algorithms |
Lecture 11 - AVL Trees |
Link |
Data Structures And Algorithms |
Lecture 12 - AVL Trees |
Link |
Data Structures And Algorithms |
Lecture 13 - Trees |
Link |
Data Structures And Algorithms |
Lecture 14 - Red Black Trees |
Link |
Data Structures And Algorithms |
Lecture 15 - Insertion in Red Black Trees |
Link |
Data Structures And Algorithms |
Lecture 16 - Disk Based Data Structures |
Link |
Data Structures And Algorithms |
Lecture 17 - Case Study: Searching for Patterns |
Link |
Data Structures And Algorithms |
Lecture 18 - Tries |
Link |
Data Structures And Algorithms |
Lecture 19 - Data Compression |
Link |
Data Structures And Algorithms |
Lecture 20 - Priority Queues |
Link |
Data Structures And Algorithms |
Lecture 21 - Binary Heaps |
Link |
Data Structures And Algorithms |
Lecture 22 - Why Sorting |
Link |
Data Structures And Algorithms |
Lecture 23 - More Sorting |
Link |
Data Structures And Algorithms |
Lecture 24 - Graphs |
Link |
Data Structures And Algorithms |
Lecture 25 - Data Structures for Graphs |
Link |
Data Structures And Algorithms |
Lecture 26 - Two Applications of Breadth First Search |
Link |
Data Structures And Algorithms |
Lecture 27 - Depth First Search |
Link |
Data Structures And Algorithms |
Lecture 28 - Applications of DFS |
Link |
Data Structures And Algorithms |
Lecture 29 - DFS in Directed Graphs |
Link |
Data Structures And Algorithms |
Lecture 30 - Applications of DFS in Directed Graphs |
Link |
Data Structures And Algorithms |
Lecture 31 - Minimum Spanning Trees |
Link |
Data Structures And Algorithms |
Lecture 32 - The Union |
Link |
Data Structures And Algorithms |
Lecture 33 - Prims Algorithm for Minimum Spanning Trees |
Link |
Data Structures And Algorithms |
Lecture 34 - Single Source Shortest Paths |
Link |
Data Structures And Algorithms |
Lecture 35 - Correctness of Dijkstras Algorithm |
Link |
Data Structures And Algorithms |
Lecture 36 - Single Source Shortest Paths |
Link |
Introduction to Computer Graphics |
Lecture 1 - Introduction |
Link |
Introduction to Computer Graphics |
Lecture 2 - Raster Graphics |
Link |
Introduction to Computer Graphics |
Lecture 3 - Raster Graphics (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 4 - Clipping |
Link |
Introduction to Computer Graphics |
Lecture 5 - Polygon Clipping and Polygon Scan Conversion |
Link |
Introduction to Computer Graphics |
Lecture 6 - Transformations |
Link |
Introduction to Computer Graphics |
Lecture 7 - Transformations (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 8 - 3D Viewing |
Link |
Introduction to Computer Graphics |
Lecture 9 - 3D Viewing (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 10 - Curves |
Link |
Introduction to Computer Graphics |
Lecture 11 - Assignment - I |
Link |
Introduction to Computer Graphics |
Lecture 12 - Curves (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 13 - Curves (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 14 - Curves (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 15 - Curves (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 16 - Surfaces |
Link |
Introduction to Computer Graphics |
Lecture 17 - Surfaces (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 18 - Surfaces (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 19 - Surfaces (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 20 - Hierarchical Models |
Link |
Introduction to Computer Graphics |
Lecture 21 - Rendering |
Link |
Introduction to Computer Graphics |
Lecture 22 - Rendering (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 23 - Rendering (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 24 - Ray Tracing |
Link |
Introduction to Computer Graphics |
Lecture 25 - Ray Tracing (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 26 - Ray Tracing (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 27 - Assignment: Ray Tracing |
Link |
Introduction to Computer Graphics |
Lecture 28 - Hidden Surface Elimination |
Link |
Introduction to Computer Graphics |
Lecture 29 - Hidden Surface Elimination (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 30 - Hidden Surface Elimination (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 31 - Fractals |
Link |
Introduction to Computer Graphics |
Lecture 32 - Fractals (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 33 - Computer Animation |
Link |
Introduction to Computer Graphics |
Lecture 34 - Animation (Continued...) |
Link |
Introduction to Computer Graphics |
Lecture 35 - Animation (Continued...) |
Link |
Principles of Programming Languages |
Lecture 1 - Introduction |
Link |
Principles of Programming Languages |
Lecture 2 - Syntax |
Link |
Principles of Programming Languages |
Lecture 3 - Grammars |
Link |
Principles of Programming Languages |
Lecture 4 - Ambiguity |
Link |
Principles of Programming Languages |
Lecture 5 - PLO:Syntax |
Link |
Principles of Programming Languages |
Lecture 6 - Semantics |
Link |
Principles of Programming Languages |
Lecture 7 - Syntactic Classes |
Link |
Principles of Programming Languages |
Lecture 8 - Transition Systems |
Link |
Principles of Programming Languages |
Lecture 9 - PL0 : Expressions |
Link |
Principles of Programming Languages |
Lecture 10 - Binding |
Link |
Principles of Programming Languages |
Lecture 11 - Environments |
Link |
Principles of Programming Languages |
Lecture 12 - Declarations |
Link |
Principles of Programming Languages |
Lecture 13 - Commands |
Link |
Principles of Programming Languages |
Lecture 14 - Stores |
Link |
Principles of Programming Languages |
Lecture 15 - Summary |
Link |
Principles of Programming Languages |
Lecture 16 - Declarations and Commands |
Link |
Principles of Programming Languages |
Lecture 17 - Blocks |
Link |
Principles of Programming Languages |
Lecture 18 - Qualification |
Link |
Principles of Programming Languages |
Lecture 19 - Pragmatics |
Link |
Principles of Programming Languages |
Lecture 20 - Data |
Link |
Principles of Programming Languages |
Lecture 21 - Structured Data |
Link |
Principles of Programming Languages |
Lecture 22 - Sequences |
Link |
Principles of Programming Languages |
Lecture 23 - Control |
Link |
Principles of Programming Languages |
Lecture 24 - Non-Determinacy |
Link |
Principles of Programming Languages |
Lecture 25 - Programming Languages |
Link |
Principles of Programming Languages |
Lecture 26 - Programming Languages |
Link |
Principles of Programming Languages |
Lecture 27 - Programming Languages |
Link |
Principles of Programming Languages |
Lecture 28 - Data as Functions |
Link |
Principles of Programming Languages |
Lecture 29 - Data and Fixpoints |
Link |
Principles of Programming Languages |
Lecture 30 - Normal Forms |
Link |
Principles of Programming Languages |
Lecture 31 - Programming Languages |
Link |
Principles of Programming Languages |
Lecture 32 - Monomorphism |
Link |
Principles of Programming Languages |
Lecture 33 - Polymorphism |
Link |
Principles of Programming Languages |
Lecture 34 - Type Checking |
Link |
Principles of Programming Languages |
Lecture 35 - Contexts |
Link |
Principles of Programming Languages |
Lecture 36 - Abstracts |
Link |
Principles of Programming Languages |
Lecture 37 - Procedures |
Link |
Principles of Programming Languages |
Lecture 38 - Meanings |
Link |
Principles of Programming Languages |
Lecture 39 - Parameters |
Link |
Principles of Programming Languages |
Lecture 40 - The Future |
Link |
Parallel Computing |
Lecture 1 - Introduction |
Link |
Parallel Computing |
Lecture 2 - Parallel Programming Paradigms |
Link |
Parallel Computing |
Lecture 3 - Parallel Architecture |
Link |
Parallel Computing |
Lecture 4 - Parallel Architecture (case studies) |
Link |
Parallel Computing |
Lecture 5 - Open MP |
Link |
Parallel Computing |
Lecture 6 - Open MP (Continued.) |
Link |
Parallel Computing |
Lecture 7 - Open MP (Continued..) |
Link |
Parallel Computing |
Lecture 8 - Open MP & PRAM Model of Computation |
Link |
Parallel Computing |
Lecture 9 - PRAM |
Link |
Parallel Computing |
Lecture 10 - Models of Parallel Computation, Complexity |
Link |
Parallel Computing |
Lecture 11 - Memory Consistency |
Link |
Parallel Computing |
Lecture 12 - Memory Consistency & Performance Issues |
Link |
Parallel Computing |
Lecture 13 - Parallel Program Design |
Link |
Parallel Computing |
Lecture 14 - Shared Memory & Message Passing |
Link |
Parallel Computing |
Lecture 15 - MPI |
Link |
Parallel Computing |
Lecture 16 - MPI (Continued.) |
Link |
Parallel Computing |
Lecture 17 - MPI (Continued..) |
Link |
Parallel Computing |
Lecture 18 - Algorithmic Techniques |
Link |
Parallel Computing |
Lecture 19 - Algorithmic Techniques (Continued.) |
Link |
Parallel Computing |
Lecture 20 - Algorithmic Techniques (Continued..) |
Link |
Parallel Computing |
Lecture 21 - CUDA |
Link |
Parallel Computing |
Lecture 22 - CUDA (Continued.) |
Link |
Parallel Computing |
Lecture 23 - CUDA (Continued..) |
Link |
Parallel Computing |
Lecture 24 - CUDA (Continued...) |
Link |
Parallel Computing |
Lecture 25 - CUDA (Continued....) |
Link |
Parallel Computing |
Lecture 26 - CUDA (Continued.....) |
Link |
Parallel Computing |
Lecture 27 - CUDA (Continued......) |
Link |
Parallel Computing |
Lecture 28 - Algorithms, Merging & Sorting |
Link |
Parallel Computing |
Lecture 29 - Algorithms, Merging & Sorting (Continued.) |
Link |
Parallel Computing |
Lecture 30 - Algorithms, Merging & Sorting (Continued..) |
Link |
Parallel Computing |
Lecture 31 - Algorithms, Merging & Sorting (Continued...) |
Link |
Parallel Computing |
Lecture 32 - Algorithms, Merging & Sorting (Continued....) |
Link |
Parallel Computing |
Lecture 33 - Lower Bounds Lock Free Synchronization, Load Stealing |
Link |
Parallel Computing |
Lecture 34 - Lock Free Synchronization, Graph Algorithms |
Link |
Operating Systems |
Lecture 1 - Introduction to UNIX System Calls - Part 1 |
Link |
Operating Systems |
Lecture 2 - Introduction to UNIX System Calls - Part 2 |
Link |
Operating Systems |
Lecture 3 - Threads, Address Spaces, Filesystem Devices |
Link |
Operating Systems |
Lecture 4 - PC Architecture |
Link |
Operating Systems |
Lecture 5 - x86 Instruction Set, GCC Calling Conventions |
Link |
Operating Systems |
Lecture 6 - Physical Memory Map, I/O, Segmentation |
Link |
Operating Systems |
Lecture 7 - Segmentation, Trap Handling |
Link |
Operating Systems |
Lecture 8 - Traps, Trap Handlers |
Link |
Operating Systems |
Lecture 9 - Kernel Data Structures, Memory Management |
Link |
Operating Systems |
Lecture 10 - Segmentation Review, Introduction to Paging |
Link |
Operating Systems |
Lecture 11 - Paging |
Link |
Operating Systems |
Lecture 12 - Process Address Spaces Using Paging |
Link |
Operating Systems |
Lecture 13 - Translation Lookaside Buffer, Large Pages, Boot Sector |
Link |
Operating Systems |
Lecture 14 - Loading the kernel, Initializing the Page table |
Link |
Operating Systems |
Lecture 15 - Setting up page tables for user processes |
Link |
Operating Systems |
Lecture 16 - Processes in action |
Link |
Operating Systems |
Lecture 17 - Process structure, Context Switching |
Link |
Operating Systems |
Lecture 18 - Process Kernel stack, Scheduler, Fork,Context-Switch, Process Control Block, Trap Entry and Return |
Link |
Operating Systems |
Lecture 19 - Creating the first process |
Link |
Operating Systems |
Lecture 20 - Handling User Pointers, Concurrency |
Link |
Operating Systems |
Lecture 21 - Locking |
Link |
Operating Systems |
Lecture 22 - Fine-grained Locking and its challenges |
Link |
Operating Systems |
Lecture 23 - Locking variations |
Link |
Operating Systems |
Lecture 24 - Condition variables |
Link |
Operating Systems |
Lecture 25 - Multiple producer, multiple consumer queue; semaphores; monitors |
Link |
Operating Systems |
Lecture 26 - Transcations and lock-free primitives read/write locks |
Link |
Operating Systems |
Lecture 27 - Synchronization in xv6: acquire/release, sleep/wakeup, exit/wait |
Link |
Operating Systems |
Lecture 28 - More synchronization in xv6: kill, IDE device driver; introducion to Demand Paging |
Link |
Operating Systems |
Lecture 29 - Demand Paging; Introduction to Page Replacement |
Link |
Operating Systems |
Lecture 30 - Page Replacement, Thrashing |
Link |
Operating Systems |
Lecture 31 - Storage Devices, Filesystem Intrerfaces |
Link |
Operating Systems |
Lecture 32 - File System Implementation |
Link |
Operating Systems |
Lecture 33 - File System Operation |
Link |
Operating Systems |
Lecture 34 - Cash Recovery and Logging |
Link |
Operating Systems |
Lecture 35 - Logging in Linux ext3 filesystem |
Link |
Operating Systems |
Lecture 36 - Protection and Security |
Link |
Operating Systems |
Lecture 37 - Scheduling Policies |
Link |
Operating Systems |
Lecture 38 - Lock-free multiprocessor coordination, Read-Copy-Update |
Link |
Operating Systems |
Lecture 39 - Microkernel, Exokernel, Multikernel |
Link |
Operating Systems |
Lecture 40 - Virtualization, Cloud Computing, Technology Trends |
Link |
NOC:Computer Architecture (2017) |
Lecture 1 - Introduction to Computer Architecture |
Link |
NOC:Computer Architecture (2017) |
Lecture 2 - The Language of Bits - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 3 - The Language of Bits - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 4 - The Language of Bits - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 5 - Assembly Language - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 6 - Assembly Language - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 7 - Assembly Language - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 8 - ARM Assembly Language - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 9 - ARM Assembly Language - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 10 - x86 Assembly Language - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 11 - x86 Assembly Language - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 12 - x86 Assembly Language - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 13 - x86 Assembly Language - Part-IV |
Link |
NOC:Computer Architecture (2017) |
Lecture 14 - A Primer on Digital Logic - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 15 - A Primer on Digital Logic - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 16 - A Primer on Digital Logic - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 17 - Computer Arithmetic - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 18 - Computer Arithmetic - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 19 - Computer Arithmetic - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 20 - Computer Arithmetic - Part-IV |
Link |
NOC:Computer Architecture (2017) |
Lecture 21 - Computer Arithmetic - Part-V |
Link |
NOC:Computer Architecture (2017) |
Lecture 22 - Computer Arithmetic - Part-VI |
Link |
NOC:Computer Architecture (2017) |
Lecture 23 - Processor Design - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 24 - Processor Design - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 25 - Processor Design - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 26 - Principles of Pipelining - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 27 - Principles of Pipelining - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 28 - Principles of Pipelining - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 29 - Principles of Pipelining - Part-IV |
Link |
NOC:Computer Architecture (2017) |
Lecture 30 - The Memory Systems - Part-I |
Link |
NOC:Computer Architecture (2017) |
Lecture 31 - The Memory Systems - Part-II |
Link |
NOC:Computer Architecture (2017) |
Lecture 32 - The Memory Systems - Part-III |
Link |
NOC:Computer Architecture (2017) |
Lecture 33 - The Memory Systems - Part-IV |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 1 - Introduction to Parallel Programming |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 2 - Parallel Architectures and Programming Models |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 3 - Pipelining |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 4 - Superpipelining and VLIW |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 5 - Memory Latency |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 6 - Cache and Temporal Locality |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 7 - Cache, Memory bandwidth and Spatial Locality |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 8 - Intuition for Shared and Distributed Memory architectures |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 9 - Shared and Distributed Memory architectures |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 10 - Interconnection networks in Distributed Memory architectures |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 11 - OpenMP: A parallel Hello World Program |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 12 - Program with Single thread |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 13 - Program Memory with Multiple threads and Multi-tasking |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 14 - Context Switching |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 15 - OpenMP: Basic thread functions |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 16 - OpenMP: About OpenMP |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 17 - Shared Memory Consistency Models and the Sequential Consistency Model |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 18 - Race Conditions |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 19 - OpenMP: Scoping variables and some race conditions |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 20 - OpenMP: thread private variables and more constructs |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 21 - Computing sum: first attempt at parallelization |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 22 - Manual distribution of work and critical sections |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 23 - Distributing for loops and reduction |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 24 - Vector-Vector operations (Dot product) |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 25 - Matrix-Vector operations (Matrix-Vector Multiply) |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 26 - Matrix-Matrix operations (Matrix-Matrix Multiply) |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 27 - Introduction to tasks |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 28 - Task queues and task execution |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 29 - Accessing variables in tasks |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 30 - Completion of tasks and scoping variables in tasks |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 31 - Recursive task spawning and pitfalls |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 32 - Understanding LU Factorization |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 33 - Parallel LU Factorization |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 34 - Locks |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 35 - Advanced Task handling |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 36 - Matrix Multiplication using tasks |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 37 - The OpenMP Shared Memory Consistency Model |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 38 - Applications finite element method |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 39 - Applications deep learning |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 40 - Introduction to MPI and basic calls |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 41 - MPI calls to send and receive data |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 42 - MPI calls for broadcasting data |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 43 - MPI non blocking calls |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 44 - Application distributed histogram updation |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 45 - MPI collectives and MPI broadcast |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 46 - MPI gathering and scattering collectives |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 47 - MPI reduction and alltoall collectives |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 48 - Discussion on MPI collectives design |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 49 - Characteriziation of interconnects |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 50 - Linear arrays 2D mesh and torus |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 51 - d dimensional torus |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 52 - Hypercube |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 53 - Trees and cliques |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 54 - Hockney model |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 55 - Broadcast and Reduce with recursive doubling |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 56 - Scatter and Gather with recursive doubling |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 57 - Reduce scatter and All gather with recursive doubling |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 58 - Discussion of message sizes in analysis |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 59 - Revisiting Reduce scatter on 2D mesh |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 60 - Reduce scatter and Allreduce on the Hypercube |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 61 - Alltoall on the Hypercube |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 62 - Lower bounds |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 63 - Pipeline based algorithm for Allreduce |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 64 - An improved algorithm for Alltoall on the Hypercube using E-cube routing |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 65 - Pipeline based algorithm for Broadcast |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 66 - Introduction to parallel graph algorithms |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 67 - Breadth First Search BFS using matrix algebra |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 68 - BFS Shared memory parallelization using OpenMP |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 69 - Distributed memory settings and data distribution |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 70 - Distributed BFS algorithm |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 71 - Performance considerations |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 72 - Prims Algorithm |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 73 - OpenMP based shared memory parallelization for MST |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 74 - MPI based distributed memory parallelization for MST |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 75 - Sequential Algorithm Adaptation from Prims |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 76 - Parallelization Strategy for Prims algorithm |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 77 - Dry run with the parallel strategy |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 78 - Johnsons algorithm with 1D data distribution |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 79 - Speedup analysis on a grid graph |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 80 - Floyds algorithm for all pair shortest paths |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 81 - Floyds algorithm with 2D data distribution |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 82 - Adaptation to transitive closures |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 83 - Parallelization strategy for connected components |
Link |
NOC:Introduction to Parallel Programming in OpenMP |
Lecture 84 - Analysis for parallel connected components |
Link |
NOC:Synthesis of Digital Systems |
Lecture 1 - Outline - What is Synthesis? |
Link |
NOC:Synthesis of Digital Systems |
Lecture 2 - Chip Design Flow and Hardware Modelling |
Link |
NOC:Synthesis of Digital Systems |
Lecture 3 - VHDL: Introduction to Hardware Description Languages and VHDL Basics |
Link |
NOC:Synthesis of Digital Systems |
Lecture 4 - VHDL: Modelling Timing - Events and Transactions |
Link |
NOC:Synthesis of Digital Systems |
Lecture 5 - VHDL: Specifying Hardware Behaviour with Processes |
Link |
NOC:Synthesis of Digital Systems |
Lecture 6 - VHDL: Specifying Structure, Test Benches, Parameterisation, and Libraries |
Link |
NOC:Synthesis of Digital Systems |
Lecture 7 - Introduction to High-level Synthesis |
Link |
NOC:Synthesis of Digital Systems |
Lecture 8 - Language front-end Design Representation |
Link |
NOC:Synthesis of Digital Systems |
Lecture 9 - Compiler Transformation in High Level Synthesis: Constant Folding, Dead Code Elimination, Constant Propagation, and Strength Reduction |
Link |
NOC:Synthesis of Digital Systems |
Lecture 10 - Memory Modelling and Compiler Transformation in High Level Synthesis: Common Sub-expression Elimination and Loop Invariant Code Motion |
Link |
NOC:Synthesis of Digital Systems |
Lecture 11 - Compiler Transformations in High Level Synthesis: Loop Unrolling and Function Inlining |
Link |
NOC:Synthesis of Digital Systems |
Lecture 12 - Hardware Transformations and ASAP / ALAP Scheduling |
Link |
NOC:Synthesis of Digital Systems |
Lecture 13 - Scheduling in High Level Synthesis: List Scheduling and Time-constrained Scheduling |
Link |
NOC:Synthesis of Digital Systems |
Lecture 14 - Force Directed Scheduling and Register Allocation |
Link |
NOC:Synthesis of Digital Systems |
Lecture 15 - High Level Synthesis and Timing Issues |
Link |
NOC:Synthesis of Digital Systems |
Lecture 16 - Finite State Machine Synthesis: Introduction to FSM Encoding |
Link |
NOC:Synthesis of Digital Systems |
Lecture 17 - Finite State Machine Synthesis: Identifying Common Cubes and Graph Embeding |
Link |
NOC:Synthesis of Digital Systems |
Lecture 18 - The Retiming Problem |
Link |
NOC:Synthesis of Digital Systems |
Lecture 19 - Efficient Solution to Retiming and Introduction to Logic Synthesis |
Link |
NOC:Synthesis of Digital Systems |
Lecture 20 - Binary Decision Diagrams |
Link |
NOC:Synthesis of Digital Systems |
Lecture 21 - Introduction to Logic Synthesis |
Link |
NOC:Synthesis of Digital Systems |
Lecture 22 - Two-level Logic Optimisation |
Link |
NOC:Synthesis of Digital Systems |
Lecture 23 - Multi-Level Logic Optimisation |
Link |
NOC:Synthesis of Digital Systems |
Lecture 24 - Multi-level Logic Synthesis: Technology Mapping |
Link |
NOC:Synthesis of Digital Systems |
Lecture 25 - Introduction to Timing Analysis |
Link |
NOC:Synthesis of Digital Systems |
Lecture 26 - Timing Analysis and Critical Paths |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 1 - Introduction: What to Expect from AI |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 2 - Introduction: History of AI from 40s - 90s |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 3 - Introduction: History of AI in the 90s |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 4 - Introduction: History of AI in NASA and DARPA (2000s) |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 5 - Introduction: The Present State of AI |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 6 - Introduction: Definition of AI Dictionary Meaning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 7 - Introduction: Definition of AI Thinking VS Acting and Humanly VS Rationally |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 8 - Introduction: Definition of AI Rational Agent View of AI |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 9 - Introduction: Examples Tasks, Phases of AI and Course Plan |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 10 - Uniform Search: Notion of a State |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 11 - Uniformed Search: Search Problem and Examples - Part 2 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 12 - Uniformed Search: Basic Search Strategies - Part 3 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 13 - Uniformed Search: Iterative Deepening DFS - Part 4 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 14 - Uniformed Search: Bidirectional Search - Part 5 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 15 - Informed Search: Best First Search - Part 1 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 16 - Informed Search: Greedy Best First Search and A* Search - Part 2 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 17 - Informed Search: Analysis of A* Algorithm - Part 3 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 18 - Informed Search Proof of optimality of A* - Part 4 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 19 - Informed Search: Iterative Deepening A* and Depth First Branch and Bound - Part 5 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 20 - Informed Search: Admissible Heuristics and Domain Relaxation - Part 6 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 21 - Informed Search: Pattern Database Heuristics - Part 7 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 22 - Local Search: Satisfaction Vs Optimization - Part 1 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 23 - Local Search: The Example of N-Queens - Part 2 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 24 - Local Search: Hill Climbing - Part 3 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 25 - Local Search: Drawbacks of Hill Climbing - Part 4 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 26 - Local Search: of Hill Climbing With random Walk and Random Restart - Part 5 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 27 - Local Search: Hill Climbing With Simulated Anealing - Part 6 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 28 - Local Search: Local Beam Search and Genetic Algorithms - Part 7 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 29 - Adversarial Search: Minimax Algorithm for two player games |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 30 - Adversarial Search: An Example of Minimax Search |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 31 - Adversarial Search: Alpha Beta Pruning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 32 - Adversarial Search: Analysis of Alpha Beta Pruning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 33 - Adversarial Search: Analysis of Alpha Beta Pruning (Continued...) |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 34 - Adversarial Search: Horizon Effect, Game Databases and Other Ideas |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 35 - Adversarial Search: Summary and Other Games |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 36 - Constraint Satisfaction Problems: Representation of the atomic state |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 37 - Constraint Satisfaction Problems: Map coloring and other examples of CSP |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 38 - Constraint Satisfaction Problems: Backtracking Search |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 39 - Constraint Satisfaction Problems: Variable and Value Ordering in Backtracking Search |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 40 - Constraint Satisfaction Problems: Inference for detecting failures early |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 41 - Constraint Satisfaction Problems: Exploiting problem structure |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 42 - Logic in AI : Different Knowledge Representation systems - Part 1 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 43 - Logic in AI : Syntax - Part 2 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 44 - Logic in AI : Semantics - Part 3 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 45 - Logic in AI : Forward Chaining - Part 4 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 46 - Logic in AI : Resolution - Part 5 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 47 - Logic in AI : Reduction to Satisfiability Problems - Part 6 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 48 - Logic in AI : SAT Solvers: DPLL Algorithm - Part 7 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 49 - Logic in AI : Sat Solvers: WalkSAT Algorithm - Part 8 |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 50 - Uncertainty in AI: Motivation |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 51 - Uncertainty in AI: Basics of Probability |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 52 - Uncertainty in AI: Conditional Independence and Bayes Rule |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 53 - Bayesian Networks: Syntax |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 54 - Bayesian Networks: Factoriziation |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 55 - Bayesian Networks: Conditional Independences and d-Separation |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 56 - Bayesian Networks: Inference using Variable Elimination |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 57 - Bayesian Networks: Reducing 3-SAT to Bayes Net |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 58 - Bayesian Networks: Rejection Sampling |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 59 - Bayesian Networks: Likelihood Weighting |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 60 - Bayesian Networks: MCMC with Gibbs Sampling |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 61 - Bayesian Networks: Maximum Likelihood Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 62 - Bayesian Networks: Maximum a-Posteriori Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 63 - Bayesian Networks: Bayesian Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 64 - Bayesian Networks: Structure Learning and Expectation Maximization |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 65 - Introduction, Part 10: Agents and Environments |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 66 - Decision Theory: Steps in Decision Theory |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 67 - Decision Theory: Non Deterministic Uncertainty |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 68 - Probabilistic Uncertainty and Value of perfect information |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 69 - Expected Utility vs Expected Value |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 70 - Markov Decision Processes: Definition |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 71 - Markov Decision Processes: An example of a Policy |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 72 - Markov Decision Processes: Policy Evaluation using system of linear equations |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 73 - Markov Decision Processes: Iterative Policy Evaluation |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 74 - Markov Decision Processes: Value Iteration |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 75 - Markov Decision Processes: Policy Iteration and Applications and Extensions of MDPs |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 76 - Reinforcement Learning: Background |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 77 - Reinforcement Learning: Model-based Learning for policy evaluation (Passive Learning) |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 78 - Reinforcement Learning: Model-free Learning for policy evaluation (Passive Learning) |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 79 - Reinforcement Learning: TD Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 80 - Reinforcement Learning: TD Learning and Computational Neuroscience |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 81 - Reinforcement Learning: Q Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 82 - Reinforcement Learning: Exploration vs Exploitation Tradeoff |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 83 - Reinforcement Learning: Generalization in RL |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 84 - Deep Learning: Perceptrons and Activation functions |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 85 - Deep Learning: Example of Handwritten digit recognition |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 86 - Deep Learning: Neural Layer as matrix operations |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 87 - Deep Learning: Differentiable loss function |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 88 - Deep Learning: Backpropagation through a computational graph |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 89 - Deep Learning: Thin Deep Vs Fat Shallow Networks |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 90 - Deep Learning: Convolutional Neural Networks |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 91 - Deep Learning: Deep Reinforcement Learning |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 92 - Ethics of AI: Humans vs Robots |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 93 - Ethics of AI: Robustness and Transparency of AI systems |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 94 - Ethics of AI: Data Bias and Fairness of AI systems |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 95 - Ethics of AI: Accountability, privacy and Human-AI interaction |
Link |
NOC:An Introduction to Artificial Intelligence |
Lecture 96 - Wrapup |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 1 - Introduction |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 2 - Out-of-Order Pipelines - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 3 - Out-of-Order Pipelines - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 4 - Out-of-Order Pipelines - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 5 - The Fetch and Decode Stages - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 6 - The Fetch and Decode Stages - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 7 - The Fetch and Decode Stages - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 8 - The Issue, Execute, and Commit Stages - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 9 - The Issue, Execute, and Commit Stages - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 10 - The Issue, Execute, and Commit Stages - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 11 - The Issue, Execute, and Commit Stages - Part IV |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 12 - Alternative Approaches to Issue and Commit - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 13 - Alternative Approaches to Issue and Commit - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 14 - Alternative Approaches to Issue and Commit - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 15 - Alternative Approaches to Issue and Commit - Part IV |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 16 - Graphics Processors - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 17 - Graphics Processors - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 18 - Graphics Processors - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 19 - Caches - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 20 - Caches - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 21 - Caches - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 22 - Caches - Part IV |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 23 - Caches - Part V |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 24 - Caches - Part VI |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 25 - Multicore Systems - Part I |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 26 - Multicore Systems - Part II |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 27 - Multicore Systems - Part III |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 28 - Multicore Systems - Part IV |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 29 - Multicore Systems - Part V |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 30 - Multicore Systems - Part VI |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 31 - Multicore Systems - Part VII |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 32 - Multicore Systems - Part VIII |
Link |
NOC:Advanced Computer Architecture (2021) |
Lecture 33 - Multicore Systems - Part IX |
Link |
NOC:Advanced Distributed systems |
Lecture 1 |
Link |
NOC:Advanced Distributed systems |
Lecture 2 |
Link |
NOC:Advanced Distributed systems |
Lecture 3 |
Link |
NOC:Advanced Distributed systems |
Lecture 4 |
Link |
NOC:Advanced Distributed systems |
Lecture 5 |
Link |
NOC:Advanced Distributed systems |
Lecture 6 |
Link |
NOC:Advanced Distributed systems |
Lecture 7 |
Link |
NOC:Advanced Distributed systems |
Lecture 8 |
Link |
NOC:Advanced Distributed systems |
Lecture 9 |
Link |
NOC:Advanced Distributed systems |
Lecture 10 |
Link |
NOC:Advanced Distributed systems |
Lecture 11 |
Link |
NOC:Advanced Distributed systems |
Lecture 12 |
Link |
NOC:Advanced Distributed systems |
Lecture 13 |
Link |
NOC:Advanced Distributed systems |
Lecture 14 |
Link |
NOC:Advanced Distributed systems |
Lecture 15 |
Link |
NOC:Advanced Distributed systems |
Lecture 16 |
Link |
NOC:Advanced Distributed systems |
Lecture 17 |
Link |
NOC:Advanced Distributed systems |
Lecture 18 |
Link |
NOC:Advanced Distributed systems |
Lecture 19 |
Link |
NOC:Advanced Distributed systems |
Lecture 20 |
Link |
NOC:Advanced Distributed systems |
Lecture 21 |
Link |
NOC:Advanced Distributed systems |
Lecture 22 |
Link |
NOC:Advanced Distributed systems |
Lecture 23 |
Link |
NOC:Advanced Distributed systems |
Lecture 24 |
Link |
NOC:Advanced Distributed systems |
Lecture 25 |
Link |
NOC:Advanced Distributed systems |
Lecture 26 |
Link |
NOC:Advanced Distributed systems |
Lecture 27 |
Link |
NOC:Advanced Distributed systems |
Lecture 28 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 1 - Introduction to Digital VLSI Design Flow |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 2 - High Level Design Representation |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 3 - Transformations for High Level Synthesis |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 4 - Introduction to HLS: Scheduling, Allocation and Binding Problem |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 5 - Scheduling Algorithms - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 6 - Scheduling Algorithms - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 7 - Binding and Allocation Algorithms |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 8 - Two level Boolean Logic Synthesis - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 9 - Two level Boolean Logic Synthesis - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 10 - Two level Boolean Logic Synthesis - 3 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 11 - Heuristic Minimization of Two-Level Circuits |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 12 - Finite State Machine Synthesis |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 13 - Multilevel Implementation |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 14 - Introduction to formal methods for design verification |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 15 - Temporal Logic: Introduction and Basic Operators |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 16 - Syntax and Semantics of CTL |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 17 - Syntax and Semantics of CTL – Continued |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 18 - Equivalence between CTL Formulas |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 19 - Introduction to Model Checking |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 20 - Model Checking Algorithms - I |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 21 - Model Checking Algorithms - II |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 22 - Model Checking with Fairness |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 23 - Binary Decision Diagram: Introduction and construction |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 24 - Ordered Binary Decision Diagram |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 25 - Operation on Ordered Binary Decision Diagram |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 26 - Ordered Binary Decision Diagram for State Transition Systems |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 27 - Symbolic Model Checking |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 28 - Introduction to Digital VLSI Testing |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 29 - Functional and Structural Testing |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 30 - Fault Equivalence |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 31 - Fault Simulation - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 32 - Fault Simulation - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 33 - Fault Simulation - 3 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 34 - Testability Measures (SCOAP) |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 35 - Introduction to Automatic Test Pattern Generation (ATPG) and ATPG Algebras |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 36 - D-Algorithm - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 37 - D-Algorithm - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 38 - ATPG for Synchronous Sequential Circuits |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 39 - Scan Chain based Sequential Circuit Testing - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 40 - Scan Chain based Sequential Circuit Testing - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 41 - Built in Self Test - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 42 - Built in Self Test - 2 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 43 - Memory Testing - 1 |
Link |
Design Verification and Test of Digital VLSI Circuits |
Lecture 44 - Memory Testing - 2 |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 1 - Model of Computer and Working Principle |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 2 - Digital Logic Building Blocks |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 3 - Information Representation and Number Systems |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 4 - Basic Elements of a Processor |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 5 - Storage and I/O Interface |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 6 - Execution of Program and Programming Languages |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 7 - Components of Central Processing Unit (CPU) and External Interface |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 8 - Main Memory |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 9 - Instruction Execution |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 10 - Instruction Format |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 11 - Instruction Set |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 12 - Addressing Modes |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 13 - Flags and Conditional Instructions |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 14 - Instruction: Procedure CALL/RETURN |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 15 - Instruction Cycle and Micro-operations |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 16 - Control Signals and Timing Sequence |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 17 - Control Signals for Complete Instruction Execution |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 18 - Handling Different Addressing Modes |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 19 - Handling Control Transfer Instructions |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 20 - Design of Hardwired controlled Control Unit |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 21 - Microinstructions and Microprograms |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 22 - Organization and Optimization of Microprogrammed controlled Control Unit |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 23 - Different Internal CPU Bus Organization |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 24 - Basics of Memory and Cache - Part 1 |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 25 - Basics of Memory and Cache - Part 2 |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 26 - Direct-mapped Caches: Misses, Writes and Performance |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 27 - Associative and Multi-level Caches |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 28 - Summary - Caches |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 29 - Basics of Virtual Memory and Address Translation |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 30 - Paging and Segmentation |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 31 - TLBs and Page Fault Handling |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 32 - Cache Indexing and Tagging Variations, Demand Paging |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 33 - Page Replacement Algorithms |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 34 - Page Frame Allocation and Thrashing |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 35 - Summary - Virtual Memory |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 36 - Input-Output Primitives |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 37 - Interrupt Driven I/O |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 38 - DMA Transfer |
Link |
NOC:Computer Organization and Architecture - A Pedagogical Aspect |
Lecture 39 - Storage Devices |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 1 - Introduction |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 2 - Modeling Techniques - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 3 - Modeling Techniques - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 4 - Hardware/Software Partitioning - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 5 - Hardware/Software Partitioning - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 6 - Introduction to Hardware Design |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 7 - Hardware Architectural Synthesis - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 8 - Hardware Architectural Synthesis - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 9 - Hardware Architectural Synthesis - 3 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 10 - Hardware Architectural Synthesis - 4 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 11 - Hardware Architectural Synthesis - 5 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 12 - Hardware Architectural Synthesis - 6 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 13 - Hardware Architectural Synthesis - 7 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 14 - System Level Analysis |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 15 - Uniprocessor Scheduling - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 16 - Uniprocessor Scheduling - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 17 - Multiprocessor Scheduling - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 18 - Multiprocessor Scheduling - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 19 - Introduction and Basic Operators of Temporal Logic |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 20 - Syntax and Semantics of CTL |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 21 - Equivalence between CTL formulas |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 22 - Model Checking Algorithm |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 23 - Binary Decision Diagram |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 24 - Use of OBDDs for State Transition System |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 25 - Symbolic Model Checking |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 26 - Introduction to Digital VLSI Testing |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 27 - Automatic Test Pattern Generation (ATPG) |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 28 - Scan Chain based Sequential Circuit Testing |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 29 - Software-Hardware Co-validation Fault Models and High Level Testing for Complex Embedded Systems |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 30 - Testing for embedded cores |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 31 - Bus and Memory Testing |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 32 - Testing for advanced faults in Real time Embedded Systems |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 33 - BIST for Embedded Systems |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 34 - Concurrent Testing for Fault tolerant Embedded Systems - 1 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 35 - Concurrent Testing for Fault tolerant Embedded Systems - 2 |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 36 - Testing for Re-programmable hardware |
Link |
NOC:Embedded Systems-Design Verification and Test |
Lecture 37 - Interaction Testing between Hardware and Software |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 1 - Introduction and Overview of the Course |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 2 - Instruction Execution Principles |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 3 - Introduction to Instruction Pipeline |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 4 - Introduction to Superscalar Pipelines |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 5 - Instruction Pipeline and Performance - I |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 6 - Instruction Pipeline and Performance - II |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 7 - Introduction to Cache Memory |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 8 - Block Replacement Techniques and Write Strategy |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 9 - gem5 Simulator - An Overview |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 10 - Cache Memory |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 11 - Basic Cache Optimization Techniques |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 12 - gem5 Simulator - Cache Optimisation |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 13 - Advanced Cache Optimization Techniques - I |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 14 - Advanced Cache Optimization Techniques - II |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 15 - Cache Memory Optimizations |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 16 - Introduction to DRAM System |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 17 - DRAM Controllers and Address Mapping |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 18 - Address Translation Mechanisms |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 19 - Main Memory Concepts |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 20 - Introduction to Tiled Chip Multicore Processors |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 21 - Routing Techniques in Network On Chip |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 22 - Network On Chip Router Micro-Architecture |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 23 - gem5 Simulator - NoC Optimisation |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 24 - Energy Efficient Bufferless NoC Routers |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 25 - Sidebuffered Deflection Routers |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 26 - Concepts in Network on Chip |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 27 - QoS of NoC and Caches in TCMP Systems |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 28 - Emerging Trends in Network On Chips |
Link |
NOC:Multi-Core Computer Architecture-Storage and Interconnects |
Lecture 29 - Concepts in TCMP Systems |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 1 - Review of Basic Computer Organization |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 2 - Instruction Set and Addressing Modes |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 3 - Instruction Encoding |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 4 - Performance Evaluation Methods |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 5 - Tutorial on Performance Evaluvation |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 6 - Introduction to RISC Instruction Pipeline |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 7 - Instruction Pipeline Hazards |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 8 - Tutorial on Instruction Pipeline and Hazards |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 9 - Control Hazards and Branch Prediction |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 10 - MIPS Pipeline for Multi-Cycle Operations |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 11 - Tutorial on Longer Pipeline and Branch Prediction |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 12 - Compiler Techniques to Explore ILP |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 13 - Dynamic Scheduling to Explore ILP |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 14 - Dynamic Scheduling with Tomasulo's Algorithm |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 15 - Dynamic Scheduling with Speculative Execution |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 16 - Tutorial on Static and Dynamic Scheduling |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 17 - Advanced Pipelining and Superscalar Processors |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 18 - Introduction to GPU architectures |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 19 - Case study on GPU architectures |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 20 - Tutorial on Superscalar processors and GPU |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 21 - Introduction to Cache Memory |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 22 - Block Replacement Techniques and Write Strategy |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 23 - Design Concepts in Cache Memory |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 24 - Optimization Techniques in Cache Memory |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 25 - Advanced Cache Optimization Techniques |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 26 - Tutorial on Advanced Concepts in Cache Memory - 1 |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 27 - Tutorial on Advanced Concepts in Cache Memory - 2 |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 28 - Cache coherence and memory consistency |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 29 - Design Space for snooping protocols |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 30 - Directory Based Cache coherehce |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 31 - Cache coherence in multiprocessor design [T] |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 32 - Introduction to DRAM System |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 33 - DRAM Controllers and Address Mapping |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 34 - Secondary Storage Systems |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 35 - Design Concepts in Storage Systems |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 36 - Introduction to Tiled Chip Multicore Processors |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 37 - Routing Techniques in Network On Chip |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 38 - Network On Chip Router Micro-Architecture |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 39 - Concepts in Network on Chip |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 40 - Energy Efficient Bufferless NoC Routers |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 41 - Sidebuffered Deflection Routers |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 42 - Concepts in Deflection Routers [T] |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 43 - QoS of NoC and Caches in TCMP Systems |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 44 - Emerging Trends in Network On Chips |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 45 - Domain Specific Accelarators |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 46 - Introduction to VEGA Microprocessors (Case Study) |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 47 - Concepts in TCMP Systems |
Link |
NOC:Multi-Core Computer Architecture |
Lecture 48 - How to Explore Computer Architecture? |
Link |
NOC:Randomized Algorithms |
Lecture 1 - Introduction to Randomized Algorithms |
Link |
NOC:Randomized Algorithms |
Lecture 2 - Randomized Mincut Algorithm |
Link |
NOC:Randomized Algorithms |
Lecture 3 - Randomized Find |
Link |
NOC:Randomized Algorithms |
Lecture 4 - Probability Review |
Link |
NOC:Randomized Algorithms |
Lecture 5 - Expectation of Random Variables |
Link |
NOC:Randomized Algorithms |
Lecture 6 - Conditional Probability and Conditional Expectation2 |
Link |
NOC:Randomized Algorithms |
Lecture 7 - Birthday Paradox |
Link |
NOC:Randomized Algorithms |
Lecture 8 - Markov and Chebychev's Inequalities |
Link |
NOC:Randomized Algorithms |
Lecture 9 - Median Algorithm |
Link |
NOC:Randomized Algorithms |
Lecture 10 - Chernoff Bound |
Link |
NOC:Randomized Algorithms |
Lecture 11 - Permutation Routing on a Hypercube |
Link |
NOC:Randomized Algorithms |
Lecture 12 - Permutation Routing on a Hypercube (Analysis) |
Link |
NOC:Randomized Algorithms |
Lecture 13 - Introduction to Probabilistic Method |
Link |
NOC:Randomized Algorithms |
Lecture 14 - More Examples on Probabilistic Method |
Link |
NOC:Randomized Algorithms |
Lecture 15 - Lovasz Local Lemma |
Link |
NOC:Randomized Algorithms |
Lecture 16 - Introduction to Markov Chains |
Link |
NOC:Randomized Algorithms |
Lecture 17 - 2-SAT and Markov Chains |
Link |
NOC:Randomized Algorithms |
Lecture 18 - 3-SAT and Markov Chains |
Link |
NOC:Randomized Algorithms |
Lecture 19 - Electrical Networks |
Link |
NOC:Randomized Algorithms |
Lecture 20 - Cover Time |
Link |
NOC:Randomized Algorithms |
Lecture 21 - Rapid Mixing |
Link |
NOC:Randomized Algorithms |
Lecture 22 - Introduction to Computational Complexity |
Link |
NOC:Randomized Algorithms |
Lecture 23 - Pratt's Certificate |
Link |
NOC:Randomized Algorithms |
Lecture 24 - Primality Testing |
Link |
NOC:Randomized Algorithms |
Lecture 25 - Miller Rabin Algorithm |
Link |
NOC:Randomized Algorithms |
Lecture 26 - All pair shortest path - I |
Link |
NOC:Randomized Algorithms |
Lecture 27 - All pair shortest path - II |
Link |
NOC:Randomized Algorithms |
Lecture 28 - Randomized MST |
Link |
NOC:Randomized Algorithms |
Lecture 29 - Introduction to approximate counting |
Link |
NOC:Randomized Algorithms |
Lecture 30 - DNF counting |
Link |
NOC:Randomized Algorithms |
Lecture 31 - Perfect Matching - I |
Link |
NOC:Randomized Algorithms |
Lecture 32 - Perfect Matching - II |
Link |
NOC:Randomized Algorithms |
Lecture 33 - Perfect Matching - III |
Link |
NOC:Randomized Algorithms |
Lecture 34 - Treaps |
Link |
NOC:Randomized Algorithms |
Lecture 35 - Hashing |
Link |
NOC:Randomized Algorithms |
Lecture 36 - Probabilistically checkable proofs - I |
Link |
NOC:Randomized Algorithms |
Lecture 37 - Probabilistically checkable proofs - II |
Link |
NOC:Randomized Algorithms |
Lecture 38 - Probabilistically checkable proofs - III |
Link |
NOC:Randomized Algorithms |
Lecture 39 - LFKN Protocol |
Link |
NOC:Randomized Algorithms |
Lecture 40 - summary |
Link |
NOC:Parallel Algorithms |
Lecture 1 - Shared Memory Models - 1 |
Link |
NOC:Parallel Algorithms |
Lecture 2 - Shared Memory Models - 2 |
Link |
NOC:Parallel Algorithms |
Lecture 3 - Interconnection Networks |
Link |
NOC:Parallel Algorithms |
Lecture 4 - Cost and Optimality |
Link |
NOC:Parallel Algorithms |
Lecture 5 - Basic Techniques - 1 |
Link |
NOC:Parallel Algorithms |
Lecture 6 - Basic Techniques - 2 |
Link |
NOC:Parallel Algorithms |
Lecture 7 - Basic Techniques - 3 |
Link |
NOC:Parallel Algorithms |
Lecture 8 - Basic Techniques - 4 |
Link |
NOC:Parallel Algorithms |
Lecture 9 - Basic Techniques - 5 |
Link |
NOC:Parallel Algorithms |
Lecture 10 - Odd Even Merge Sort (OEMS) |
Link |
NOC:Parallel Algorithms |
Lecture 11 - OEMS, Bitonic-Sort-Merge Sort (BSMS) |
Link |
NOC:Parallel Algorithms |
Lecture 12 - BSMS, Optimal List Colouring |
Link |
NOC:Parallel Algorithms |
Lecture 13 - Description |
Link |
NOC:Parallel Algorithms |
Lecture 14 - Analysis |
Link |
NOC:Parallel Algorithms |
Lecture 15 - Applications |
Link |
NOC:Parallel Algorithms |
Lecture 16 - Applications |
Link |
NOC:Parallel Algorithms |
Lecture 17 - Fast optimal merge algorithm |
Link |
NOC:Parallel Algorithms |
Lecture 18 - High level Description |
Link |
NOC:Parallel Algorithms |
Lecture 19 - Cole's Merge Sort: Details |
Link |
NOC:Parallel Algorithms |
Lecture 20 - Analysis of Cole's Merge Sort; Lower bound for sorting |
Link |
NOC:Parallel Algorithms |
Lecture 21 - Sorting Lower bound; Connected Components |
Link |
NOC:Parallel Algorithms |
Lecture 22 - Connected Components (CREW) |
Link |
NOC:Parallel Algorithms |
Lecture 23 - Connected Components, Vertex Colouring |
Link |
NOC:Parallel Algorithms |
Lecture 24 - Sorting on a 2D mesh |
Link |
NOC:Parallel Algorithms |
Lecture 25 - Sorting on a 2D mesh |
Link |
NOC:Parallel Algorithms |
Lecture 26 - Sorting, Offline routing on a 2D mesh |
Link |
NOC:Parallel Algorithms |
Lecture 27 - Sorting on a 3D mesh |
Link |
NOC:Parallel Algorithms |
Lecture 28 - Mesh of Trees, Hypercube |
Link |
NOC:Parallel Algorithms |
Lecture 29 - Hypercube (Continued...) |
Link |
NOC:Parallel Algorithms |
Lecture 30 - Hypercube (Continued...), butterfly network |
Link |
NOC:Parallel Algorithms |
Lecture 31 - Butterfly, CCC and Benes Networks |
Link |
NOC:Parallel Algorithms |
Lecture 32 - Butterfly, CCC and Benes Networks |
Link |
NOC:Parallel Algorithms |
Lecture 33 - Shuffle Exchange Graphs, de Bruijn Graphs |
Link |
NOC:Parallel Algorithms |
Lecture 34 - Shuffle Exchange Graphs, de Bruijn Graphs (Continued...) |
Link |
NOC:Parallel Algorithms |
Lecture 35 - Circuit Value Problem is P-complete for NC-reductions |
Link |
NOC:Parallel Algorithms |
Lecture 36 - Ordered DFS is P-complete for NC-reductions |
Link |
NOC:Parallel Algorithms |
Lecture 37 - Max Flow is P-complete for NC-reductions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 1 - Boolean Functions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 2 - Propositional Calculus: Introduction |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 3 - First Order Logic: Introduction |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 4 - First Order Logic: Introduction (Continued...) |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 5 - Proof System for Propcal |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 6 - First Order Logic: wffs, interpretations, models |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 7 - Soundness and Completeness of the First Order Proof System |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 8 - Sets, Relations, Functions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 9 - Functions, Embedding of the theories of naturals numbers and integers in Set Theory |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 10 - Embedding of the theories of integers and rational numbers in Set Theory; Countable Sets |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 11 - Introduction to graph theory |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 12 - Trees, Cycles, Graph coloring |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 13 - Bipartitie Graphs |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 14 - Bipartitie Graphs; Edge Coloring and Matching |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 15 - Planar Graphs |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 16 - Graph Searching; BFS and DFS |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 17 - Network Flows |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 18 - Counting Spanning Trees in Complete Graphs |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 19 - Embedding of the theory of ral numbers in Set Theory; Paradoxes |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 20 - ZF Axiomatization of Set Theory |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 21 - Partially ordering relations |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 22 - Natural numbers, divisors |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 23 - Lattices |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 24 - GCD, Euclid's Algorithm |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 25 - Prime Numbers |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 26 - Congruences |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 27 - Pigeon Hole Principle |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 28 - Stirling Numbers, Bell Numbers |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 29 - Generating Functions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 30 - Product of Generating Functions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 31 - Composition of Generating Function |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 32 - Principle of Inclusion Exclusion |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 33 - Rook placement problem |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 34 - Solution of Congruences |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 35 - Chinese Remainder Theorem |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 36 - Totient; Congruences; Floor and Ceiling Functions |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 37 - Introduction to Groups |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 38 - Modular Arithmetic and Groups |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 39 - Dihedral Groups, Isomorhphisms |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 40 - Cyclic groups, Direct Products, Subgroups |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 41 - Cosets, Lagrange's theorem |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 42 - Rings and Fields |
Link |
NOC:Discrete Mathematics (Prof. Sajith Gopalan) |
Lecture 43 - Construction of Finite Fields |
Link |
NOC:Advanced Computer Architecture |
Lecture 1 - Review of Basic Computer Organization |
Link |
NOC:Advanced Computer Architecture |
Lecture 2 - Perfomance Evaluation Methods |
Link |
NOC:Advanced Computer Architecture |
Lecture 3 - Introduction to RISC Instruction Pipeline |
Link |
NOC:Advanced Computer Architecture |
Lecture 4 - Instruction Pipeline and Performance |
Link |
NOC:Advanced Computer Architecture |
Lecture 5 - Pipeline Hazards |
Link |
NOC:Advanced Computer Architecture |
Lecture 6 - Control Hazards and Branch Prediction |
Link |
NOC:Advanced Computer Architecture |
Lecture 7 - MIPS Pipeline for Multi-Cycle Operations |
Link |
NOC:Advanced Computer Architecture |
Lecture 8 - Tutorial 2 : Pipeline Hazard Analysis |
Link |
NOC:Advanced Computer Architecture |
Lecture 9 - Compiler Techniques to Explore ILP |
Link |
NOC:Advanced Computer Architecture |
Lecture 10 - Dynamic Scheduling to Explore ILP |
Link |
NOC:Advanced Computer Architecture |
Lecture 11 - Dynamic Scheduling with Tomasulo’s Algorithm |
Link |
NOC:Advanced Computer Architecture |
Lecture 12 - Dynamic Scheduling with Speculative Execution |
Link |
NOC:Advanced Computer Architecture |
Lecture 13 - Tutorial 3 : Static and Dynamic Scheduling |
Link |
NOC:Advanced Computer Architecture |
Lecture 14 - Advanced Pipelining and Superscalar Processors |
Link |
NOC:Advanced Computer Architecture |
Lecture 15 - Exploiting DLP: Vector and GPU Architectures |
Link |
NOC:Advanced Computer Architecture |
Lecture 16 - Tutorial 4 : Architectural Simulation using gem5 |
Link |
NOC:Advanced Computer Architecture |
Lecture 17 - Tutorial 5 : Core Optimization in gem5 |
Link |
NOC:Advanced Computer Architecture |
Lecture 18 - Introduction to Cache Memory |
Link |
NOC:Advanced Computer Architecture |
Lecture 19 - Block Replacement Techniques and Write Strategy |
Link |
NOC:Advanced Computer Architecture |
Lecture 20 - Tutorial 6 : Design Concepts in Cache Memory |
Link |
NOC:Advanced Computer Architecture |
Lecture 21 - Optimization Techniques in Cache Memory |
Link |
NOC:Advanced Computer Architecture |
Lecture 22 - Advanced Cache Optimization Techniques |
Link |
NOC:Advanced Computer Architecture |
Lecture 23 - Tutorial 7 : Optimization Techniques in Cache Memory |
Link |
NOC:Advanced Computer Architecture |
Lecture 24 - Tutorial 8 : Cache Optimization in gem5 |
Link |
NOC:Advanced Computer Architecture |
Lecture 25 - Introduction to DRAM System |
Link |
NOC:Advanced Computer Architecture |
Lecture 26 - DRAM Controllers and Address Mapping |
Link |
NOC:Advanced Computer Architecture |
Lecture 27 - Secondary Storage Systems |
Link |
NOC:Advanced Computer Architecture |
Lecture 28 - Tutorial 9 : Design Concepts in DRAM and Harddisk |
Link |
NOC:Advanced Computer Architecture |
Lecture 29 - Tiled Chip Multicore Processors |
Link |
NOC:Advanced Computer Architecture |
Lecture 30 - Routing Techniques in Network on Chip |
Link |
NOC:Advanced Computer Architecture |
Lecture 31 - NoC Router Microarchitecture |
Link |
NOC:Advanced Computer Architecture |
Lecture 32 - How to Explore Computer Architecture? |
Link |
NOC:Advanced Computer Architecture |
Lecture 33 - Tutorial 10 : TCMP and NoC Design Principles |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 1 - Introduction to UCC and history |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 2 - Issues and challenges |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 3 - Latest research trends |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 4 - User-Centric Design and Software Engineering |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 5 - Components of SDLC - Contextual Inquiry |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 6 - Components of SDLC - Design Guidelines |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 7 - Components of SDLC - Prototyping |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 8 - Case study (web site design) |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 9 - Introduction to User-Centric Computing |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 10 - The UCC framework with illustrative case study |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 11 - User-centric models - introduction and descriptive models |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 12 - User-centric models - predictive models and taxonomy |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 13 - Introduction to GOMS family of models |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 14 - Keystroke-Level Model (KLM) |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 15 - (CMN)GOMS Model |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 16 - The Fitts' Law |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 17 - The Hick-Hyman Law |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 18 - 2D and 3D pointing models |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 19 - The Steering Law for constrained navigation |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 20 - Model for hierarchical menu selection |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 21 - Mobile typing models (single finger and two thumb typing) |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 22 - Model for touch performance (FFitts' law) |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 23 - Introduction to formal models in UCD |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 24 - Formal modeling of user-computer dialogue |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 25 - Case studies on the use of models |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 26 - Introduction and research question formulation |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 27 - Variables determination and experiment design |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 28 - Data analysis including model building |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 29 - Introduction to user-centric design evaluation and expert evaluation technique |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 30 - User evaluation, empirical and model-based evaluation |
Link |
NOC:User-centric Computing for Human-Computer Interaction |
Lecture 31 - Concluding remarks |
Link |
NOC:Computer Graphics |
Lecture 1 - Introduction to graphics |
Link |
NOC:Computer Graphics |
Lecture 2 - Historical evolution, issues and challenges |
Link |
NOC:Computer Graphics |
Lecture 3 - Basics of a graphics system |
Link |
NOC:Computer Graphics |
Lecture 4 - Introduction to 3D graphics pipeline |
Link |
NOC:Computer Graphics |
Lecture 5 - Introduction and overview on object representation techniques |
Link |
NOC:Computer Graphics |
Lecture 6 - Various Boundary Representation Techniques |
Link |
NOC:Computer Graphics |
Lecture 7 - Spline representation - I |
Link |
NOC:Computer Graphics |
Lecture 8 - Spline representation - II |
Link |
NOC:Computer Graphics |
Lecture 9 - Space representation methods |
Link |
NOC:Computer Graphics |
Lecture 10 - Introduction to modeling transformations |
Link |
NOC:Computer Graphics |
Lecture 11 - Matrix representation and composition of transformations |
Link |
NOC:Computer Graphics |
Lecture 12 - Transformations in 3D |
Link |
NOC:Computer Graphics |
Lecture 13 - Color computation - basic idea |
Link |
NOC:Computer Graphics |
Lecture 14 - Simple lighting model |
Link |
NOC:Computer Graphics |
Lecture 15 - Shading models |
Link |
NOC:Computer Graphics |
Lecture 16 - Intensity mapping |
Link |
NOC:Computer Graphics |
Lecture 17 - Color models and texture synthesis |
Link |
NOC:Computer Graphics |
Lecture 18 - View transformation |
Link |
NOC:Computer Graphics |
Lecture 19 - Projection transformation |
Link |
NOC:Computer Graphics |
Lecture 20 - Windows-to-viewport transformation |
Link |
NOC:Computer Graphics |
Lecture 21 - Clipping introduction and 2D point and line clipping |
Link |
NOC:Computer Graphics |
Lecture 22 - 2D fill-area clipping and 3D clipping |
Link |
NOC:Computer Graphics |
Lecture 23 - Hidden surface removal - I |
Link |
NOC:Computer Graphics |
Lecture 24 - Hidden surface removal - II |
Link |
NOC:Computer Graphics |
Lecture 25 - Scan conversion of basic shapes - I |
Link |
NOC:Computer Graphics |
Lecture 26 - Scan conversion of basic shapes - II |
Link |
NOC:Computer Graphics |
Lecture 27 - Fill area and character scan conversion |
Link |
NOC:Computer Graphics |
Lecture 28 - Anti-aliasing techniques |
Link |
NOC:Computer Graphics |
Lecture 29 - Graphics I/O Devices |
Link |
NOC:Computer Graphics |
Lecture 30 - Introduction to GPU and Shaders |
Link |
NOC:Computer Graphics |
Lecture 31 - Programming with OpenGL |
Link |
NOC:Computer Graphics |
Lecture 32 - Concluding remarks |
Link |
NOC:C-Based VLSI Design |
Lecture 1 - Introduction to C-Based VLSI Design |
Link |
NOC:C-Based VLSI Design |
Lecture 2 - C-based VLSI Design: An Overview |
Link |
NOC:C-Based VLSI Design |
Lecture 3 - C-based VLSI Design: Problem Formulation |
Link |
NOC:C-Based VLSI Design |
Lecture 4 - C-based VLSI Design: Course Plan |
Link |
NOC:C-Based VLSI Design |
Lecture 5 - Introduction to Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 6 - ILP formulation of Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 7 - ILP formulation of MRLC and MLRC Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 8 - Multiprocessor Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 9 - Hu’s algorithm for Multiprocessor Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 10 - List based Scheduling of MLRC |
Link |
NOC:C-Based VLSI Design |
Lecture 11 - List based Scheduling of MRLC |
Link |
NOC:C-Based VLSI Design |
Lecture 12 - Forced Directed Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 13 - Forced Directed MLRC and MRLC Scheduling Algorithm |
Link |
NOC:C-Based VLSI Design |
Lecture 14 - Path Based Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 15 - Path Based Scheduling |
Link |
NOC:C-Based VLSI Design |
Lecture 16 - Allocation and Binding Problem Formulation |
Link |
NOC:C-Based VLSI Design |
Lecture 17 - Left Edge Algorithm |
Link |
NOC:C-Based VLSI Design |
Lecture 18 - ILP Formulation of Allocation and Binding |
Link |
NOC:C-Based VLSI Design |
Lecture 19 - Allocation and Binding for Hierarchical Graph |
Link |
NOC:C-Based VLSI Design |
Lecture 20 - Register Allocation and Binding |
Link |
NOC:C-Based VLSI Design |
Lecture 21 - Multi-port Binding Problem |
Link |
NOC:C-Based VLSI Design |
Lecture 22 - Datapath and Controller Synthesis |
Link |
NOC:C-Based VLSI Design |
Lecture 23 - HLS for Arrays |
Link |
NOC:C-Based VLSI Design |
Lecture 24 - HLS for Loops |
Link |
NOC:C-Based VLSI Design |
Lecture 25 - HLS for Loop - pipeline |
Link |
NOC:C-Based VLSI Design |
Lecture 26 - Hardware Efficient C Coding - Part I |
Link |
NOC:C-Based VLSI Design |
Lecture 27 - Hardware Efficient C Coding - Part II |
Link |
NOC:C-Based VLSI Design |
Lecture 28 - Dataflow Optimization in HLS |
Link |
NOC:C-Based VLSI Design |
Lecture 29 - Frontend Optimizations in C |
Link |
NOC:C-Based VLSI Design |
Lecture 30 - HLS Optimizations: Case Study 1 |
Link |
NOC:C-Based VLSI Design |
Lecture 31 - HLS Optimizations: Case Study 1 |
Link |
NOC:C-Based VLSI Design |
Lecture 32 - Simulation based Verification |
Link |
NOC:C-Based VLSI Design |
Lecture 33 - RTL to C Reverse Engineering |
Link |
NOC:C-Based VLSI Design |
Lecture 34 - Phase-wise Verification of HLS |
Link |
NOC:C-Based VLSI Design |
Lecture 35 - Equivalence between C and RTL |
Link |
NOC:C-Based VLSI Design |
Lecture 36 - Introduction to Hardware Security |
Link |
NOC:C-Based VLSI Design |
Lecture 37 - HLS for Security |
Link |
NOC:C-Based VLSI Design |
Lecture 38 - Attacks on RTL Logic locking |
Link |
NOC:C-Based VLSI Design |
Lecture 39 - Introduction to Logic Synthesis |
Link |
NOC:C-Based VLSI Design |
Lecture 40 - FPGA Technology Mapping |
Link |
NOC:C-Based VLSI Design |
Lecture 41 - Introduction to Physical Synthesis |
Link |
NOC:C-Based VLSI Design |
Lecture 42 - Introduction to Circuit optimizations |
Link |
NOC:C-Based VLSI Design |
Lecture 43 - Recent Advances in C-Based VLSI Design |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 1 - Interactive Systems |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 2 - Introduction to Usability |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 3 - Engineering for Usability |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 4 - Interactive System Life Cycle |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 5 - Usability Requirements |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 6 - Contexual Inquiry |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 7 - Functional Requirements Specification |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 8 - Case Study on SRS |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 9 - Case Study (Usability Requirement Gathering) |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 10 - Case Study (Other Requirement Gathering) |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 11 - Case Study - Non-Functional Requirements to SRS |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 12 - Introduction to Interface Design |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 13 - Shneiderman's Golden Rules |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 14 - Norman's Principles |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 15 - Prototyping |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 16 - Prototype Evaluation - I |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 17 - Prototype Evaluation - II |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 18 - Case Study on Prototype Evaluation - I |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 19 - Case Study on Prototype Evaluation - II |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 20 - Basics of System Design |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 21 - Data Flow Diagram |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 22 - Entity Relationship Diagram |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 23 - Case Study on DFD and ER |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 24 - Introduction to Object Oriented Design |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 25 - UML |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 26 - UML Case Study |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 27 - Coding Basics |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 28 - Code Testing Basics |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 29 - Review-Based Code Testing |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 30 - Code Review Case Study |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 31 - Black-Box Testing - I |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 32 - Black-Box Testing - II |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 33 - Black-Box Testing Case Study |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 34 - White-Box Testing |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 35 - White-Box Testing Case Study |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 36 - System Integration and Testing |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 37 - Empirical Usability Evaluation - I |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 38 - Empirical Usability Evaluation - II |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 39 - Experiment Design - I |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 40 - Experiment Design - II |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 41 - Empirical Data Analysis |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 42 - Project Management |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 43 - Note on Agile Development |
Link |
NOC:Design and Implementation of Human-Computer Interfaces |
Lecture 44 - Concluding Remarks |
Link |
NOC:Digital Design with Verilog |
Lecture 1 - Introduction to Digital Design with Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 2 - Switching Algebra |
Link |
NOC:Digital Design with Verilog |
Lecture 3 - Canonical Forms of Switching Functions |
Link |
NOC:Digital Design with Verilog |
Lecture 4 - Number Systems |
Link |
NOC:Digital Design with Verilog |
Lecture 5 - Binary Arithmetic |
Link |
NOC:Digital Design with Verilog |
Lecture 6 - Binary Codes |
Link |
NOC:Digital Design with Verilog |
Lecture 7 - Error Detection and Corrections Codes |
Link |
NOC:Digital Design with Verilog |
Lecture 8 - Minimization of Switching functions-Karnaugh Map |
Link |
NOC:Digital Design with Verilog |
Lecture 9 - Karnaugh Map |
Link |
NOC:Digital Design with Verilog |
Lecture 10 - Minimization of Switching functions-Properties |
Link |
NOC:Digital Design with Verilog |
Lecture 11 - Quine-McCluskey Method |
Link |
NOC:Digital Design with Verilog |
Lecture 12 - Quine-McCluskey Method-Prime Implication Chart |
Link |
NOC:Digital Design with Verilog |
Lecture 13 - ESPRESSO-Heuristic Based Switching Function Minimization |
Link |
NOC:Digital Design with Verilog |
Lecture 14 - Multi-level Logic Minimization |
Link |
NOC:Digital Design with Verilog |
Lecture 15 - Multi-level Logic Minimization-Kernels Extraction |
Link |
NOC:Digital Design with Verilog |
Lecture 16 - Digital Circuits Modelling using Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 17 - Modelling Techniques in Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 18 - Behavioral Modelling in Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 19 - Digital System Design using Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 20 - Testbench in Verilog |
Link |
NOC:Digital Design with Verilog |
Lecture 21 - Code Conversion, Parity Bit Generator |
Link |
NOC:Digital Design with Verilog |
Lecture 22 - Comparator, Multiplexer |
Link |
NOC:Digital Design with Verilog |
Lecture 23 - Encoder, Decoder |
Link |
NOC:Digital Design with Verilog |
Lecture 24 - Ripple Carry Adder, Carry Look ahead Adder |
Link |
NOC:Digital Design with Verilog |
Lecture 25 - Adder/Subtractor |
Link |
NOC:Digital Design with Verilog |
Lecture 26 - BCD Adder, Multiplier |
Link |
NOC:Digital Design with Verilog |
Lecture 27 - Latch/Storage Design |
Link |
NOC:Digital Design with Verilog |
Lecture 28 - Flipflop Design, Characteristics of Flipflop |
Link |
NOC:Digital Design with Verilog |
Lecture 29 - Flipflop, Register and Memory |
Link |
NOC:Digital Design with Verilog |
Lecture 30 - Digital Counter |
Link |
NOC:Digital Design with Verilog |
Lecture 31 - Finite State Machine Design and Implementation with many Examples |
Link |
NOC:Digital Design with Verilog |
Lecture 32 - FSM Completeness and Correctness |
Link |
NOC:Digital Design with Verilog |
Lecture 33 - Sync Counter using FSM, Implementation using different FFs and Comparision of types of FSM |
Link |
NOC:Digital Design with Verilog |
Lecture 34 - FSM State Optimization using Row Matching and Partitioning Methods |
Link |
NOC:Digital Design with Verilog |
Lecture 35 - State Optimization using Implication chart and State Encoding |
Link |
NOC:Digital Design with Verilog |
Lecture 36 - RTL Design, Introduction to ASM (Algorithmic State Machine) |
Link |
NOC:Digital Design with Verilog |
Lecture 37 - RTL/ASM Design Examples and Implementation |
Link |
NOC:Digital Design with Verilog |
Lecture 38 - ASM Data Path Inference and Control Path Generation |
Link |
NOC:Digital Design with Verilog |
Lecture 39 - Sequential Multplier the Classic Example of RTL Design |
Link |
NOC:Digital Design with Verilog |
Lecture 40 - Introduction to FPGA and Design Flow |
Link |
NOC:Digital Design with Verilog |
Lecture 41 - Introduction to Electronic Design Automation |
Link |
NOC:Parallel Computer Architecture |
Lecture 1 - Why do we need parallel architecture ? |
Link |
NOC:Parallel Computer Architecture |
Lecture 2 - Multicore Revolution |
Link |
NOC:Parallel Computer Architecture |
Lecture 3 - What is Parallel Architecture? |
Link |
NOC:Parallel Computer Architecture |
Lecture 4 - Performance and Benchmarking |
Link |
NOC:Parallel Computer Architecture |
Lecture 5 - Reporting Results |
Link |
NOC:Parallel Computer Architecture |
Lecture 6 - Some Laws |
Link |
NOC:Parallel Computer Architecture |
Lecture 7 - A shift from sequential to parallel |
Link |
NOC:Parallel Computer Architecture |
Lecture 8 - Programming Models |
Link |
NOC:Parallel Computer Architecture |
Lecture 9 - Shared Memory Paradigm |
Link |
NOC:Parallel Computer Architecture |
Lecture 10 - Message Passing Paradigm |
Link |
NOC:Parallel Computer Architecture |
Lecture 11 - Examples |
Link |
NOC:Parallel Computer Architecture |
Lecture 12 - Cache Basics |
Link |
NOC:Parallel Computer Architecture |
Lecture 13 - Memory hierarchy questions - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 14 - Memory hierarchy questions - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 15 - Six basic cache optimisations - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 16 - Six basic cache optimisations - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 17 - Virtual Memory - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 18 - Virtual Memory - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 19 - Cache Coherence Problem |
Link |
NOC:Parallel Computer Architecture |
Lecture 20 - Concept of Serialisation |
Link |
NOC:Parallel Computer Architecture |
Lecture 21 - Coherence related Conditions |
Link |
NOC:Parallel Computer Architecture |
Lecture 22 - Types of Coherence Protocols - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 23 - Types of Coherence Protocols - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 24 - VI Protocol |
Link |
NOC:Parallel Computer Architecture |
Lecture 25 - 3 State: MSI Protocol |
Link |
NOC:Parallel Computer Architecture |
Lecture 26 - MESI Protocol |
Link |
NOC:Parallel Computer Architecture |
Lecture 27 - Dragon Protocol |
Link |
NOC:Parallel Computer Architecture |
Lecture 28 - Coherence misses |
Link |
NOC:Parallel Computer Architecture |
Lecture 29 - Coherence misses example |
Link |
NOC:Parallel Computer Architecture |
Lecture 30 - Correctness Requirements |
Link |
NOC:Parallel Computer Architecture |
Lecture 31 - Single-Level caches with an Atomic Bus - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 32 - Single-Level caches with an Atomic Bus - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 33 - Multi-Level caches with an Atomic Bus - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 34 - Multi-Level caches with an Atomic Bus - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 35 - Split transaction Bus |
Link |
NOC:Parallel Computer Architecture |
Lecture 36 - Phases in Split Transaction Bus |
Link |
NOC:Parallel Computer Architecture |
Lecture 37 - Request table and Organization |
Link |
NOC:Parallel Computer Architecture |
Lecture 38 - Path of a Cache Miss |
Link |
NOC:Parallel Computer Architecture |
Lecture 39 - Multi-Level cache + Split transaction Bus |
Link |
NOC:Parallel Computer Architecture |
Lecture 40 - Introduction to Directory Cache Coherence |
Link |
NOC:Parallel Computer Architecture |
Lecture 41 - Basic Operation of a Directory |
Link |
NOC:Parallel Computer Architecture |
Lecture 42 - Directory Organisations |
Link |
NOC:Parallel Computer Architecture |
Lecture 43 - Directory Overhead Optimisations |
Link |
NOC:Parallel Computer Architecture |
Lecture 44 - Directory Protocol optimisations |
Link |
NOC:Parallel Computer Architecture |
Lecture 45 - Proving Correctness - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 46 - Proving Correctness - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 47 - SGI Origin Architecture |
Link |
NOC:Parallel Computer Architecture |
Lecture 48 - Working of protocol |
Link |
NOC:Parallel Computer Architecture |
Lecture 49 - Correctness Issues |
Link |
NOC:Parallel Computer Architecture |
Lecture 50 - Sequent NUMA-Q Architecture |
Link |
NOC:Parallel Computer Architecture |
Lecture 51 - Working of protocol - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 52 - Working of protocol - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 53 - Correctness and Protocol Interaction |
Link |
NOC:Parallel Computer Architecture |
Lecture 54 - Sequential Consistency |
Link |
NOC:Parallel Computer Architecture |
Lecture 55 - Implications of Sequential Consistency |
Link |
NOC:Parallel Computer Architecture |
Lecture 56 - Relaxed Consistency Models - 1 |
Link |
NOC:Parallel Computer Architecture |
Lecture 57 - Relaxed Consistency Models - 2 |
Link |
NOC:Parallel Computer Architecture |
Lecture 58 - Relaxing all Orders |
Link |
NOC:Parallel Computer Architecture |
Lecture 59 - Uninterruptible Instructions |
Link |
NOC:Parallel Computer Architecture |
Lecture 60 - Implementation of atomic instructions |
Link |
NOC:Parallel Computer Architecture |
Lecture 61 - Other synchronisation options |
Link |
NOC:Parallel Computer Architecture |
Lecture 62 - Interconnect Overview |
Link |
NOC:Parallel Computer Architecture |
Lecture 63 - Topologies |
Link |
NOC:Parallel Computer Architecture |
Lecture 64 - Routing |
Link |
NOC:Parallel Computer Architecture |
Lecture 65 - Flow Control |
Link |
Computer Algorithms - 2 |
Lecture 1 - Graph_Basics |
Link |
Computer Algorithms - 2 |
Lecture 2 - Breadth_First_Search |
Link |
Computer Algorithms - 2 |
Lecture 3 - Dijkstra_Algo |
Link |
Computer Algorithms - 2 |
Lecture 4 - All Pair Shortest Path |
Link |
Computer Algorithms - 2 |
Lecture 5 - Matriods |
Link |
Computer Algorithms - 2 |
Lecture 6 - Minimum Spanning Tree |
Link |
Computer Algorithms - 2 |
Lecture 7 - Edmond's Matching Algo I |
Link |
Computer Algorithms - 2 |
Lecture 8 - Edmond's Matching Algo II |
Link |
Computer Algorithms - 2 |
Lecture 9 - Flow Networks |
Link |
Computer Algorithms - 2 |
Lecture 10 - Ford Fulkerson Method |
Link |
Computer Algorithms - 2 |
Lecture 11 - Edmond Karp Algo |
Link |
Computer Algorithms - 2 |
Lecture 12 - Matrix Inversion |
Link |
Computer Algorithms - 2 |
Lecture 13 - Matrix Decomposition |
Link |
Computer Algorithms - 2 |
Lecture 14 - Knuth Morris Pratt Algo |
Link |
Computer Algorithms - 2 |
Lecture 15 - Rabin Karp Algo |
Link |
Computer Algorithms - 2 |
Lecture 16 - NFA Simulation |
Link |
Computer Algorithms - 2 |
Lecture 17 - Integer-Polynomial Ops-I |
Link |
Computer Algorithms - 2 |
Lecture 18 - Integer-Polynomial Ops-II |
Link |
Computer Algorithms - 2 |
Lecture 19 - Integer-Polynomial Ops-III |
Link |
Computer Algorithms - 2 |
Lecture 20 - Chinese Remainder-I |
Link |
Computer Algorithms - 2 |
Lecture 21 - Chinese Remainder-II |
Link |
Computer Algorithms - 2 |
Lecture 22 - Chinese Remainder-III |
Link |
Computer Algorithms - 2 |
Lecture 23 - Discrete Fourier Transform-I |
Link |
Computer Algorithms - 2 |
Lecture 24 - Discrete Fourier Transform-II |
Link |
Computer Algorithms - 2 |
Lecture 25 - Discrete Fourier Transform-III |
Link |
Computer Algorithms - 2 |
Lecture 26 - Schonhage Strassen Algo |
Link |
Computer Algorithms - 2 |
Lecture 27 - Linear Programming-I |
Link |
Computer Algorithms - 2 |
Lecture 28 - Linear Programming-II |
Link |
Computer Algorithms - 2 |
Lecture 29 - Geometry-I |
Link |
Computer Algorithms - 2 |
Lecture 30 - Geometry-II |
Link |
Computer Algorithms - 2 |
Lecture 31 - Geometry-III |
Link |
Computer Algorithms - 2 |
Lecture 32 - Approximation Algo-I |
Link |
Computer Algorithms - 2 |
Lecture 33 - Approximation Algo-II |
Link |
Computer Algorithms - 2 |
Lecture 34 - Approximation Algo-III |
Link |
Computer Algorithms - 2 |
Lecture 35 - General: Dynamic Programming |
Link |
Theory of Computation |
Lecture 1 - What is theory of computation? Set membership problem, basic notions like alphabet, strings, formal languages |
Link |
Theory of Computation |
Lecture 2 - Introduction to finite automaton |
Link |
Theory of Computation |
Lecture 3 - Finite automata continued, deterministic finite automata(DFAs), language accepted by a DFA |
Link |
Theory of Computation |
Lecture 4 - Regular languages, their closure properties |
Link |
Theory of Computation |
Lecture 5 - DFAs solve set membership problems in linear time, pumping lemma |
Link |
Theory of Computation |
Lecture 6 - More examples of nonregular languages, proof of pumping lemma, pumping lemma as a game, converse of pumping lemma does not hold |
Link |
Theory of Computation |
Lecture 7 - A generalization of pumping lemma, nondeterministic finite automata (NFAs), computation trees for NFAs |
Link |
Theory of Computation |
Lecture 8 - Formal description of NFA, language accepted by NFA, such languages are also regular |
Link |
Theory of Computation |
Lecture 9 - 'Guess and verify' paradigm for nondeterminism |
Link |
Theory of Computation |
Lecture 10 - NFA's with epsilon transitions |
Link |
Theory of Computation |
Lecture 11 - Regular expressions, they denote regular languages |
Link |
Theory of Computation |
Lecture 12 - Construction of a regular expression for a language given a DFA accepting it. Algebraic closure properies of regular languages |
Link |
Theory of Computation |
Lecture 13 - Closure properties (Continued...) |
Link |
Theory of Computation |
Lecture 14 - Closure under reversal, use of closure properties |
Link |
Theory of Computation |
Lecture 15 - Decision problems for regular languages |
Link |
Theory of Computation |
Lecture 16 - About minimization of states of DFAs. Myhill-Nerode theorem |
Link |
Theory of Computation |
Lecture 17 - Continuation of proof of Myhill-Nerode theorem |
Link |
Theory of Computation |
Lecture 18 - Application of Myhill-Nerode theorem. DFA minimization |
Link |
Theory of Computation |
Lecture 19 - DFA minimization (Continued...) |
Link |
Theory of Computation |
Lecture 20 - Introduction to context free languages (cfls) and context free grammars (cfgs). Derivation of strings by cfgs |
Link |
Theory of Computation |
Lecture 21 - Languages generated by a cfg, leftmost derivation, more examples of cfgs and cfls |
Link |
Theory of Computation |
Lecture 22 - Parse trees, inductive proof that L is L(G). All regular languages are context free |
Link |
Theory of Computation |
Lecture 23 - Towards Chomsky normal forms: elimination of useless symbols, analysis of reachable symbols, generating nonterminals, order of substeps matter |
Link |
Theory of Computation |
Lecture 24 - Simplification of cfgs continued, Removal of epsilon productions: algorithm and its correctness |
Link |
Theory of Computation |
Lecture 25 - Elimination of unit productions. Converting a cfg into Chomsky normal form. Towards pumping lemma for cfls |
Link |
Theory of Computation |
Lecture 26 - Pumping lemma for cfls. Adversarial paradigm |
Link |
Theory of Computation |
Lecture 27 - Completion of pumping lemma proof. Examples of use of pumping lemma. Converse of lemma does not hold. Closure properties of cfls |
Link |
Theory of Computation |
Lecture 28 - Closure properties continued. cfls not closed under complementation |
Link |
Theory of Computation |
Lecture 29 - Another example of a cfl whose complement is not a cfl. Decision problems for cfls |
Link |
Theory of Computation |
Lecture 30 - More decision problems. CYK algorithm for membership decision |
Link |
Theory of Computation |
Lecture 31 - Introduction to pushdown automata (pda) |
Link |
Theory of Computation |
Lecture 32 - pda configurations, acceptance notions for pdas. Transition diagrams for pdas |
Link |
Theory of Computation |
Lecture 33 - Equivalence of acceptance by empty stack and acceptance by final state |
Link |
Theory of Computation |
Lecture 34 - Turing machines (TM): motivation, informal definition, example, transition diagram |
Link |
Theory of Computation |
Lecture 35 - Execution trace, another example (unary to binary conversion) |
Link |
Theory of Computation |
Lecture 36 - Example continued. Finiteness of TM description, TM configuration, language acceptance, definition of recursively enumerable (r.e.) languages |
Link |
Theory of Computation |
Lecture 37 - Notion of non-acceptance or rejection of a string by a TM. Multitrack TM, its equivalence to standard TM. Multitape TMs |
Link |
Theory of Computation |
Lecture 38 - Simulation of multitape TMs by basic model. Nondeterministic TM (NDTM). Equivalence of NDTMs with deterministic TMs |
Link |
Theory of Computation |
Lecture 39 - Counter machines and their equivalence to basic TM model |
Link |
Theory of Computation |
Lecture 40 - TMs can simulate computers, diagonalization proof |
Link |
Theory of Computation |
Lecture 41 - Existence of non-r.e. languages, recursive languages, notion of decidability |
Link |
Theory of Computation |
Lecture 42 - Separation of recursive and r.e. classes, halting problem and its undecidability |
Link |
Introduction to Problem Solving and Programming |
Lecture 1 |
Link |
Introduction to Problem Solving and Programming |
Lecture 2 |
Link |
Introduction to Problem Solving and Programming |
Lecture 3 |
Link |
Introduction to Problem Solving and Programming |
Lecture 4 |
Link |
Introduction to Problem Solving and Programming |
Lecture 5 |
Link |
Introduction to Problem Solving and Programming |
Lecture 6 |
Link |
Introduction to Problem Solving and Programming |
Lecture 7 |
Link |
Introduction to Problem Solving and Programming |
Lecture 8 |
Link |
Introduction to Problem Solving and Programming |
Lecture 9 |
Link |
Introduction to Problem Solving and Programming |
Lecture 10 |
Link |
Introduction to Problem Solving and Programming |
Lecture 11 |
Link |
Introduction to Problem Solving and Programming |
Lecture 12 |
Link |
Introduction to Problem Solving and Programming |
Lecture 13 |
Link |
Introduction to Problem Solving and Programming |
Lecture 14 |
Link |
Introduction to Problem Solving and Programming |
Lecture 15 |
Link |
Introduction to Problem Solving and Programming |
Lecture 16 |
Link |
Introduction to Problem Solving and Programming |
Lecture 17 |
Link |
Introduction to Problem Solving and Programming |
Lecture 18 |
Link |
Introduction to Problem Solving and Programming |
Lecture 19 |
Link |
Introduction to Problem Solving and Programming |
Lecture 20 |
Link |
Introduction to Problem Solving and Programming |
Lecture 21 |
Link |
Introduction to Problem Solving and Programming |
Lecture 22 |
Link |
Introduction to Problem Solving and Programming |
Lecture 23 |
Link |
Introduction to Problem Solving and Programming |
Lecture 24 |
Link |
Riemann Hypothesis and its Applications |
Lecture 1 |
Link |
Riemann Hypothesis and its Applications |
Lecture 2 |
Link |
Riemann Hypothesis and its Applications |
Lecture 3 |
Link |
Riemann Hypothesis and its Applications |
Lecture 4 |
Link |
Riemann Hypothesis and its Applications |
Lecture 5 |
Link |
Riemann Hypothesis and its Applications |
Lecture 6 |
Link |
Riemann Hypothesis and its Applications |
Lecture 7 |
Link |
Riemann Hypothesis and its Applications |
Lecture 8 |
Link |
Riemann Hypothesis and its Applications |
Lecture 9 |
Link |
Riemann Hypothesis and its Applications |
Lecture 10 |
Link |
Riemann Hypothesis and its Applications |
Lecture 11 |
Link |
Riemann Hypothesis and its Applications |
Lecture 12 |
Link |
Riemann Hypothesis and its Applications |
Lecture 13 |
Link |
Riemann Hypothesis and its Applications |
Lecture 14 |
Link |
Riemann Hypothesis and its Applications |
Lecture 15 |
Link |
Riemann Hypothesis and its Applications |
Lecture 16 |
Link |
Riemann Hypothesis and its Applications |
Lecture 17 |
Link |
Riemann Hypothesis and its Applications |
Lecture 18 |
Link |
Riemann Hypothesis and its Applications |
Lecture 19 |
Link |
Riemann Hypothesis and its Applications |
Lecture 20 |
Link |
Riemann Hypothesis and its Applications |
Lecture 21 |
Link |
Riemann Hypothesis and its Applications |
Lecture 22 |
Link |
Riemann Hypothesis and its Applications |
Lecture 23 |
Link |
Riemann Hypothesis and its Applications |
Lecture 24 |
Link |
Riemann Hypothesis and its Applications |
Lecture 25 |
Link |
Riemann Hypothesis and its Applications |
Lecture 26 |
Link |
Riemann Hypothesis and its Applications |
Lecture 27 |
Link |
Riemann Hypothesis and its Applications |
Lecture 28 |
Link |
Riemann Hypothesis and its Applications |
Lecture 29 |
Link |
Riemann Hypothesis and its Applications |
Lecture 30 |
Link |
Biometrics |
Lecture 1 - Biometrics |
Link |
Biometrics |
Lecture 2 - Biometrics |
Link |
Biometrics |
Lecture 3 - Biometrics |
Link |
Biometrics |
Lecture 4 - Biometrics |
Link |
Biometrics |
Lecture 5 - Biometrics |
Link |
Biometrics |
Lecture 6 - Biometrics |
Link |
Biometrics |
Lecture 7 - Biometrics |
Link |
Biometrics |
Lecture 8 - Biometrics |
Link |
Biometrics |
Lecture 9 - Biometrics |
Link |
Biometrics |
Lecture 10 - Biometrics |
Link |
Biometrics |
Lecture 11 - Biometrics |
Link |
Biometrics |
Lecture 12 - Biometrics |
Link |
Biometrics |
Lecture 13 - Biometrics |
Link |
Biometrics |
Lecture 14 - Biometrics |
Link |
Biometrics |
Lecture 15 - Biometrics |
Link |
Biometrics |
Lecture 16 - Biometrics |
Link |
Biometrics |
Lecture 17 - Biometrics |
Link |
Biometrics |
Lecture 18 - Biometrics |
Link |
Biometrics |
Lecture 19 - Biometrics |
Link |
Biometrics |
Lecture 20 - Biometrics |
Link |
Biometrics |
Lecture 21 - Biometrics |
Link |
Biometrics |
Lecture 22 - Biometrics |
Link |
Biometrics |
Lecture 23 - Biometrics |
Link |
Biometrics |
Lecture 24 - Biometrics |
Link |
Biometrics |
Lecture 25 - Biometrics |
Link |
Biometrics |
Lecture 26 - Biometrics |
Link |
Parallel Algorithm |
Lecture 1 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 2 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 3 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 4 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 5 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 6 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 7 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 8 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 9 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 10 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 11 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 12 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 13 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 14 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 15 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 16 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 17 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 18 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 19 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 20 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 21 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 22 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 23 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 24 - Parallel Algorithm |
Link |
Parallel Algorithm |
Lecture 25 - Parallel Algorithm |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 1 - Introduction, Amdahl's law, CPI equation |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 2 - CPI equation, research practices, instruction set architecture |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 3 - Instruction set architecture |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 4 - Instruction set architecture |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 5 - Instruction set architecture, case study with MIPS-I |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 6 - Case study with MIPS-I |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 7 - Case study with MIPS-I |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 8 - Binary instrumentation for architectural studies: PIN |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 9 - Binary instrumentation for architectural studies: PIN |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 10 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 11 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 12 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 13 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 14 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 15 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 16 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 17 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 18 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 19 - Basic pipelining, branch prediction |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 20 - Dynamic scheduling, speculative execution |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 21 - Dynamic scheduling, speculative execution |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 22 - Dynamic scheduling, speculative execution |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 23 - Dynamic scheduling, speculative execution |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 24 - Dynamic scheduling, speculative execution |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 25 - Virtual memory and caches |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 26 - Virtual memory and caches |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 27 - Virtual memory and caches |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 28 - Topics in memory system, DRAM and SRAM technology |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 29 - Topics in memory system, DRAM and SRAM technology |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 30 - Topics in memory system, DRAM and SRAM technology |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 31 - Case study: MIPS R10000 |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 32 - Case study: MIPS R10000 |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 33 - Case study: Alpha 21264 |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 34 - Case study: Intel Pentium 4 |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 35 - Input/Output |
Link |
Computer Architecture (Dr. Mainak Chaudhuri) |
Lecture 36 - Simultaneous multithreading, multi-cores |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 1 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 2 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 3 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 4 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 5 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 6 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 7 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 8 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 9 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 10 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 11 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 12 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 13 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 14 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 15 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 16 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 17 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 18 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 19 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 20 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 21 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 22 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 23 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 24 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 25 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 26 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 27 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 28 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 29 - Compiler Design |
Link |
Compiler Design (Prof. Sanjeev K Aggarwal) |
Lecture 30 - Compiler Design |
Link |
NOC : Introduction to programming in C |
Lecture 1 - Intro - Process of programming |
Link |
NOC : Introduction to programming in C |
Lecture 2 - Intro - GCD |
Link |
NOC : Introduction to programming in C |
Lecture 3 - Intro - Programming cycle |
Link |
NOC : Introduction to programming in C |
Lecture 4 - Intro - Tracing a simple program |
Link |
NOC : Introduction to programming in C |
Lecture 5 - Intro - Variables |
Link |
NOC : Introduction to programming in C |
Lecture 6 - Intro - Operators |
Link |
NOC : Introduction to programming in C |
Lecture 7 - Loops - While |
Link |
NOC : Introduction to programming in C |
Lecture 8 - Loops - While example |
Link |
NOC : Introduction to programming in C |
Lecture 9 - Loops - While GCD example |
Link |
NOC : Introduction to programming in C |
Lecture 10 - Loops - Longest 1 |
Link |
NOC : Introduction to programming in C |
Lecture 11 - Loops - Longest 2 |
Link |
NOC : Introduction to programming in C |
Lecture 12 - Loops - Longest 3 |
Link |
NOC : Introduction to programming in C |
Lecture 13 - Loops - Do-while |
Link |
NOC : Introduction to programming in C |
Lecture 14 - Loops - Matrix using nested loops |
Link |
NOC : Introduction to programming in C |
Lecture 15 - Loops - For |
Link |
NOC : Introduction to programming in C |
Lecture 16 - Loops - Matrix using nested for loops |
Link |
NOC : Introduction to programming in C |
Lecture 17 - Loops - Break statement |
Link |
NOC : Introduction to programming in C |
Lecture 18 - Loops - Continue statement |
Link |
NOC : Introduction to programming in C |
Lecture 19 - Loops - Continue statement example |
Link |
NOC : Introduction to programming in C |
Lecture 20 - Data types in C |
Link |
NOC : Introduction to programming in C |
Lecture 21 - ASCII code |
Link |
NOC : Introduction to programming in C |
Lecture 22 - Operators Expressions Associativity |
Link |
NOC : Introduction to programming in C |
Lecture 23 - Precedence of operators |
Link |
NOC : Introduction to programming in C |
Lecture 24 - Expression evaluation |
Link |
NOC : Introduction to programming in C |
Lecture 25 - Functions - Introduction |
Link |
NOC : Introduction to programming in C |
Lecture 26 - Functions - How functions are executed |
Link |
NOC : Introduction to programming in C |
Lecture 27 - Functions - Examples - 1 |
Link |
NOC : Introduction to programming in C |
Lecture 28 - Functions - Examples - 2 |
Link |
NOC : Introduction to programming in C |
Lecture 29 - Arrays in C |
Link |
NOC : Introduction to programming in C |
Lecture 30 - Initializing arrays |
Link |
NOC : Introduction to programming in C |
Lecture 31 - Initializing character arrays |
Link |
NOC : Introduction to programming in C |
Lecture 32 - Pointers in C |
Link |
NOC : Introduction to programming in C |
Lecture 33 - Pointer arithmetic |
Link |
NOC : Introduction to programming in C |
Lecture 34 - Function with pointer arguments |
Link |
NOC : Introduction to programming in C |
Lecture 35 - Example - copy a subarray |
Link |
NOC : Introduction to programming in C |
Lecture 36 - Programming using arrays and pointers |
Link |
NOC : Introduction to programming in C |
Lecture 37 - Sizeof operator |
Link |
NOC : Introduction to programming in C |
Lecture 38 - Returning pointers from functions |
Link |
NOC : Introduction to programming in C |
Lecture 39 - Example - return duplicate of a string |
Link |
NOC : Introduction to programming in C |
Lecture 40 - Recursion - Linear Recursion |
Link |
NOC : Introduction to programming in C |
Lecture 41 - Recursion - Linear Recursion - 2 |
Link |
NOC : Introduction to programming in C |
Lecture 42 - Recursion - Two-way Recursion |
Link |
NOC : Introduction to programming in C |
Lecture 43 - Multidimensional Arrays |
Link |
NOC : Introduction to programming in C |
Lecture 44 - Multidimensional Arrays and Pointers |
Link |
NOC : Introduction to programming in C |
Lecture 45 - Multidimensional Arrays and Pointers - continued (2) |
Link |
NOC : Introduction to programming in C |
Lecture 46 - Multidimensional Arrays and Pointers - continued (3) |
Link |
NOC : Introduction to programming in C |
Lecture 47 - File Handling |
Link |
NOC : Introduction to programming in C |
Lecture 48 - Some other file-handling functions |
Link |
NOC : Introduction to programming in C |
Lecture 49 - Structures in C - 1 |
Link |
NOC : Introduction to programming in C |
Lecture 50 - Structures in C - 2 |
Link |
NOC : Introduction to programming in C |
Lecture 51 - Singly Linked Lists |
Link |
NOC : Introduction to programming in C |
Lecture 52 - Doubly Linked Lists - introduction |
Link |
NOC : Introduction to programming in C |
Lecture 53 - Organizing code into multiple files - 1 |
Link |
NOC : Introduction to programming in C |
Lecture 54 - Organizing code into multiple files - 2 |
Link |
NOC : Introduction to programming in C |
Lecture 55 - Pre and post increment |
Link |
NOC : Introduction to programming in C |
Lecture 56 - Doubly Linked Lists - Introduction |
Link |
NOC : Introduction to programming in C |
Lecture 57 - Organizing code into multiple files - 1 |
Link |
NOC : Introduction to programming in C |
Lecture 58 - Organizing code into multiple files - 2 |
Link |
NOC : Introduction to programming in C |
Lecture 59 - Pre and post increment operators |
Link |
NOC:Fundamentals of Database Systems |
Lecture 1 - Introduction to Databases |
Link |
NOC:Fundamentals of Database Systems |
Lecture 2 - Relational Data Model |
Link |
NOC:Fundamentals of Database Systems |
Lecture 3 - Relational Algebra Basic Operators |
Link |
NOC:Fundamentals of Database Systems |
Lecture 4 - Relational Algebra Composition of Operators |
Link |
NOC:Fundamentals of Database Systems |
Lecture 5 - Relational Algebra Additional Operators |
Link |
NOC:Fundamentals of Database Systems |
Lecture 6 - Relational Algebra Extended Relational Algebra |
Link |
NOC:Fundamentals of Database Systems |
Lecture 7 - Relational Algebra: Database Modifications |
Link |
NOC:Fundamentals of Database Systems |
Lecture 8 - SQL: Introduction and Data Definition |
Link |
NOC:Fundamentals of Database Systems |
Lecture 9 - SQL: Basic Queries |
Link |
NOC:Fundamentals of Database Systems |
Lecture 10 - SQL: Advanced Queries |
Link |
NOC:Fundamentals of Database Systems |
Lecture 11 - SQL: Updates, Joins, Views and Triggers |
Link |
NOC:Fundamentals of Database Systems |
Lecture 12 - Normalization Theory: Motivation |
Link |
NOC:Fundamentals of Database Systems |
Lecture 13 - Normalization Theory: 1 NF and 2NF |
Link |
NOC:Fundamentals of Database Systems |
Lecture 14 - Normalization Theory: 3NF |
Link |
NOC:Fundamentals of Database Systems |
Lecture 15 - Normalization Theory: BCNF |
Link |
NOC:Fundamentals of Database Systems |
Lecture 16 - Normalization Theory: MVD |
Link |
NOC:Fundamentals of Database Systems |
Lecture 17 - Physical Design |
Link |
NOC:Fundamentals of Database Systems |
Lecture 18 - Database Indexing: Hashing |
Link |
NOC:Fundamentals of Database Systems |
Lecture 19 - Database Indexing: Tree-based Indexing |
Link |
NOC:Fundamentals of Database Systems |
Lecture 20 - Query Processing: Selection |
Link |
NOC:Fundamentals of Database Systems |
Lecture 21 - Query Processing: Sorting |
Link |
NOC:Fundamentals of Database Systems |
Lecture 22 - Query Processing: Nested-Loop joins and Merge join |
Link |
NOC:Fundamentals of Database Systems |
Lecture 23 - Query Processing: Hash join and other Operations |
Link |
NOC:Fundamentals of Database Systems |
Lecture 24 - Query Optimization: Equivalent Expressions and Simple Equivalance Rules |
Link |
NOC:Fundamentals of Database Systems |
Lecture 25 - Query Optimization: Complex Equivalence Rules |
Link |
NOC:Fundamentals of Database Systems |
Lecture 26 - Query Optimization: Join Order |
Link |
NOC:Fundamentals of Database Systems |
Lecture 27 - Query Optimization: Heuristics and Sizes |
Link |
NOC:Fundamentals of Database Systems |
Lecture 28 - Database Transactions: Properties and Failures |
Link |
NOC:Fundamentals of Database Systems |
Lecture 29 - Database Transactions: States and Systems |
Link |
NOC:Fundamentals of Database Systems |
Lecture 30 - Recovery Systems: Deferred Database Modification |
Link |
NOC:Fundamentals of Database Systems |
Lecture 31 - Recovery Systems: Immediate Database Modification. |
Link |
NOC:Fundamentals of Database Systems |
Lecture 32 - Recovery Systems: Checkpointing and Shadow Paging |
Link |
NOC:Fundamentals of Database Systems |
Lecture 33 - Schedules: Introduction |
Link |
NOC:Fundamentals of Database Systems |
Lecture 34 - Schedules: Conflict Serializability |
Link |
NOC:Fundamentals of Database Systems |
Lecture 35 - Schedules: View Serializability |
Link |
NOC:Fundamentals of Database Systems |
Lecture 36 - Schedules: Result Equivalence and Testing for Serializability |
Link |
NOC:Fundamentals of Database Systems |
Lecture 37 - Schedules: Recoverability |
Link |
NOC:Fundamentals of Database Systems |
Lecture 38 - Concurrency Control: Locks |
Link |
NOC:Fundamentals of Database Systems |
Lecture 39 - Concurrency Control: Two-phase Locking Protocol |
Link |
NOC:Fundamentals of Database Systems |
Lecture 40 - Concurrency Control: Timestamp Ordering Protocol |
Link |
NOC:Fundamentals of Database Systems |
Lecture 41 - Concurrency Control: Validation-based Protocol |
Link |
NOC:Fundamentals of Database Systems |
Lecture 42 - Concurrency Control: Multiple Granularity for Locks |
Link |
NOC:Fundamentals of Database Systems |
Lecture 43 - Concurrency Control: Deadlock Prevention and Deadlock Detection |
Link |
NOC:Fundamentals of Database Systems |
Lecture 44 - Concurrency Control: Deadlock Recovery and Update Operations |
Link |
NOC:Fundamentals of Database Systems |
Lecture 45 - NoSQL: Introduction and Properties |
Link |
NOC:Fundamentals of Database Systems |
Lecture 46 - NoSQL: Columnar Families |
Link |
NOC:Fundamentals of Database Systems |
Lecture 47 - NoSQL: Different NoSQL Systems |
Link |
NOC:Fundamentals of Database Systems |
Lecture 48 - Big Data |
Link |
NOC:Theory of Computation |
Lecture 1 - Introduction to Finite Automata |
Link |
NOC:Theory of Computation |
Lecture 2 - Basic Notation and Convention, DFA Edit Lesson |
Link |
NOC:Theory of Computation |
Lecture 3 - Example of DFAs |
Link |
NOC:Theory of Computation |
Lecture 4 - Computation by DFA and Regular operation |
Link |
NOC:Theory of Computation |
Lecture 5 - Introduction to Nondeterminism |
Link |
NOC:Theory of Computation |
Lecture 6 - NFA, definition and examples |
Link |
NOC:Theory of Computation |
Lecture 7 - Equivalence of NFA and DFA, Closure properties |
Link |
NOC:Theory of Computation |
Lecture 8 - Regular expressions |
Link |
NOC:Theory of Computation |
Lecture 9 - Algebraic properties, RE to NFA conversion |
Link |
NOC:Theory of Computation |
Lecture 10 - GNFA to RE conversion |
Link |
NOC:Theory of Computation |
Lecture 11 - More closure properties of regular languages |
Link |
NOC:Theory of Computation |
Lecture 12 - Non-regular languages and pumping lemma |
Link |
NOC:Theory of Computation |
Lecture 13 - Examples of non-regular languages |
Link |
NOC:Theory of Computation |
Lecture 14 - DFA minimization |
Link |
NOC:Theory of Computation |
Lecture 15 - Introduction to CFGs |
Link |
NOC:Theory of Computation |
Lecture 16 - Examples of CFGs, Reg subset of CFL |
Link |
NOC:Theory of Computation |
Lecture 17 - Parse tree, derivation, ambiguity |
Link |
NOC:Theory of Computation |
Lecture 18 - Normal forms, Chomsky normal form |
Link |
NOC:Theory of Computation |
Lecture 19 - Non-CFLs, pumping lemma |
Link |
NOC:Theory of Computation |
Lecture 20 - Examples of non- CFLs |
Link |
NOC:Theory of Computation |
Lecture 21 - Pushdown Automata |
Link |
NOC:Theory of Computation |
Lecture 22 - Pushdown Automata - Definition and Example |
Link |
NOC:Theory of Computation |
Lecture 23 - Pushdown Automata - Examples and Relation with CFGs |
Link |
NOC:Theory of Computation |
Lecture 24 - Closure Properties of CFLs |
Link |
NOC:Theory of Computation |
Lecture 25 - Deterministic Context Free Languages |
Link |
NOC:Theory of Computation |
Lecture 26 - Turing Machine |
Link |
NOC:Theory of Computation |
Lecture 27 - More on Turing Machine |
Link |
NOC:Theory of Computation |
Lecture 28 - Non deterministic Turing Machine Edit Lesson |
Link |
NOC:Theory of Computation |
Lecture 29 - Configuration Graphs |
Link |
NOC:Theory of Computation |
Lecture 30 - Closure Properties of Decidable and Turing recognizable languages |
Link |
NOC:Theory of Computation |
Lecture 31 - Decidability properties of Regular and Context Free Languages |
Link |
NOC:Theory of Computation |
Lecture 32 - Undecidability |
Link |
NOC:Theory of Computation |
Lecture 33 - More on Undecidability |
Link |
NOC:Theory of Computation |
Lecture 34 - Reduction |
Link |
NOC:Theory of Computation |
Lecture 35 - Applications of Reduction |
Link |
NOC:Theory of Computation |
Lecture 36 - Rice's theorem |
Link |
NOC:Theory of Computation |
Lecture 37 - Introduction to Computational Complexity Theory |
Link |
NOC:Theory of Computation |
Lecture 38 - More on the class NP |
Link |
NOC:Theory of Computation |
Lecture 39 - NP-Completeness |
Link |
NOC:Theory of Computation |
Lecture 40 - More on NP-Completeness |
Link |
NOC:Modern Algebra |
Lecture 1 - Groups : Introduction to abstraction |
Link |
NOC:Modern Algebra |
Lecture 2 - Groups : Subgroups and homomorphism |
Link |
NOC:Modern Algebra |
Lecture 3 - Groups : Isomorphism |
Link |
NOC:Modern Algebra |
Lecture 4 - Groups : Quotienting |
Link |
NOC:Modern Algebra |
Lecture 5 - Groups : Structure Theorem |
Link |
NOC:Modern Algebra |
Lecture 6 - Groups : Applications |
Link |
NOC:Modern Algebra |
Lecture 7 - Rings : Introduction |
Link |
NOC:Modern Algebra |
Lecture 8 - Rings : Failure of Unique Factorization |
Link |
NOC:Modern Algebra |
Lecture 9 - Rings : Birth of Ideals |
Link |
NOC:Modern Algebra |
Lecture 10 - Rings : Ideal Arithmetic |
Link |
NOC:Modern Algebra |
Lecture 11 - Rings : Special Ideals |
Link |
NOC:Modern Algebra |
Lecture 12 - Rings : Dedekind Domains |
Link |
NOC:Modern Algebra |
Lecture 13 - Rings : Quotient Rings |
Link |
NOC:Modern Algebra |
Lecture 14 - Fields |
Link |
NOC:Modern Algebra |
Lecture 15 - Cauchy sequences and real numbers |
Link |
NOC:Modern Algebra |
Lecture 16 - Properties of Fields |
Link |
NOC:Modern Algebra |
Lecture 17 - Finite Fields |
Link |
NOC:Modern Algebra |
Lecture 18 - Application of Fields |
Link |
NOC:Advanced Graph Theory |
Lecture 1 - Graph Theory: Introduction |
Link |
NOC:Advanced Graph Theory |
Lecture 2 - Paths, Cycles and Trails |
Link |
NOC:Advanced Graph Theory |
Lecture 3 - Eulerian Circuits, Vertex Degrees and Counting |
Link |
NOC:Advanced Graph Theory |
Lecture 4 - The Chinese Postman Problem and Graphic Sequences |
Link |
NOC:Advanced Graph Theory |
Lecture 5 - Trees and Distance |
Link |
NOC:Advanced Graph Theory |
Lecture 6 - Spanning Trees and Enumeration |
Link |
NOC:Advanced Graph Theory |
Lecture 7 - Matchings and Covers |
Link |
NOC:Advanced Graph Theory |
Lecture 8 - Independent Sets, Covers and Maximum Bipartite Matching |
Link |
NOC:Advanced Graph Theory |
Lecture 9 - Weighted Bipartite Matching |
Link |
NOC:Advanced Graph Theory |
Lecture 10 - Stable Matchings and Faster Bipartite Matching |
Link |
NOC:Advanced Graph Theory |
Lecture 11 - Factors and Perfect Matching in General Graphs |
Link |
NOC:Advanced Graph Theory |
Lecture 12 - Matching in General Graphs: Edmonds’ Blossom Algorithm |
Link |
NOC:Advanced Graph Theory |
Lecture 13 - Connectivity and Paths: Cuts and Connectivity |
Link |
NOC:Advanced Graph Theory |
Lecture 14 - k-Connected Graphs |
Link |
NOC:Advanced Graph Theory |
Lecture 15 - Network Flow Problems |
Link |
NOC:Advanced Graph Theory |
Lecture 16 - Vertex Coloring and Upper Bounds |
Link |
NOC:Advanced Graph Theory |
Lecture 17 - Brooks’ Theorem and Color-Critical Graphs |
Link |
NOC:Advanced Graph Theory |
Lecture 18 - Counting Proper Colorings |
Link |
NOC:Advanced Graph Theory |
Lecture 19 - Planar Graphs |
Link |
NOC:Advanced Graph Theory |
Lecture 20 - Characterization of Planar Graphs |
Link |
NOC:Advanced Graph Theory |
Lecture 21 - Line Graphs and Edge-coloring |
Link |
NOC:Advanced Graph Theory |
Lecture 22 - Hamiltonian Graph, Traveling Salesman Problem and NP-Completeness |
Link |
NOC:Advanced Graph Theory |
Lecture 23 - Connected Dominating Set and Distributed Algorithm |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 1 - Introduction to Cloud Computing |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 2 - Virtualization |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 3 - Hotspot Mitigation for Virtual Machine Migration |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 4 - Server Virtualization |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 5 - Software Defined Network |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 6 - Geo-distributed Cloud Data Centers |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 7 - Leader Election in Rings (Classical Distributed Algorithms) |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 8 - Leader Election (Ring LE and Bully LE Algorithm) |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 9 - Design of Zookeeper |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 10 - Time and Clock Synchronization in Cloud Data Centers |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 11 - Global State and Snapshot Recording Algorithms |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 12 - Distributed Mutual Exclusion |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 13 - Consensus in Cloud Computing and Paxos |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 14 - Byzantine Agreement |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 15 - Failures and Recovery Approaches in Distributed Systems |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 16 - Design of Key-Value Stores |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 17 - Design of HBase |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 18 - Peer to Peer Systems in Cloud Computing |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 19 - MapReduce |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 20 - Introduction to Spark |
Link |
NOC:Cloud Computing and Distributed Systems |
Lecture 21 - Introduction to Kafka |
Link |
NOC:Big Data Computing |
Lecture 1 - Introduction to Big Data |
Link |
NOC:Big Data Computing |
Lecture 2 - Big Data Enabling Technologies |
Link |
NOC:Big Data Computing |
Lecture 3 - Hadoop Stack for Big Data |
Link |
NOC:Big Data Computing |
Lecture 4 - Hadoop Distributed File System (HDFS) |
Link |
NOC:Big Data Computing |
Lecture 5 - Hadoop MapReduce 1.0 |
Link |
NOC:Big Data Computing |
Lecture 6 - Hadoop MapReduce 2.0 - Part I |
Link |
NOC:Big Data Computing |
Lecture 7 - Hadoop MapReduce 2.0 - Part II |
Link |
NOC:Big Data Computing |
Lecture 8 - MapReduce Examples |
Link |
NOC:Big Data Computing |
Lecture 9 - Parallel Programming with Spark |
Link |
NOC:Big Data Computing |
Lecture 10 - Introduction to Spark |
Link |
NOC:Big Data Computing |
Lecture 11 - Spark Built-in Libraries |
Link |
NOC:Big Data Computing |
Lecture 12 - Design of Key-Value Stores |
Link |
NOC:Big Data Computing |
Lecture 13 - Data Placement Strategies |
Link |
NOC:Big Data Computing |
Lecture 14 - CAP Theorem |
Link |
NOC:Big Data Computing |
Lecture 15 - Consistency Solutions |
Link |
NOC:Big Data Computing |
Lecture 16 - CQL (Cassandra Query Language) |
Link |
NOC:Big Data Computing |
Lecture 17 - Design of Zookeeper |
Link |
NOC:Big Data Computing |
Lecture 18 - Design of HBase |
Link |
NOC:Big Data Computing |
Lecture 19 - Spark Streaming and Sliding Window Analytics - Part I |
Link |
NOC:Big Data Computing |
Lecture 20 - Spark Streaming and Sliding Window Analytics - Part II |
Link |
NOC:Big Data Computing |
Lecture 21 - Sliding Window Analytics |
Link |
NOC:Big Data Computing |
Lecture 22 - Introduction to Kafka |
Link |
NOC:Big Data Computing |
Lecture 23 - Big Data Machine Learning - Part I |
Link |
NOC:Big Data Computing |
Lecture 24 - Big Data Machine Learning - Part II |
Link |
NOC:Big Data Computing |
Lecture 25 - Machine Learning Algorithm K-means using Map Reduce for Big Data Analytics |
Link |
NOC:Big Data Computing |
Lecture 26 - Parallel K-means using Map Reduce on Big Data Cluster Analysis |
Link |
NOC:Big Data Computing |
Lecture 27 - Decision Trees for Big Data Analytics |
Link |
NOC:Big Data Computing |
Lecture 28 - Big Data Predictive Analytics - Part I |
Link |
NOC:Big Data Computing |
Lecture 29 - Big Data Predictive Analytics - Part II |
Link |
NOC:Big Data Computing |
Lecture 30 - Parameter Servers |
Link |
NOC:Big Data Computing |
Lecture 31 - PageRank Algorithm in Big Data |
Link |
NOC:Big Data Computing |
Lecture 32 - Spark GraphX and Graph Analytics - Part I |
Link |
NOC:Big Data Computing |
Lecture 33 - Spark GraphX and Graph Analytics - Part II |
Link |
NOC:Big Data Computing |
Lecture 34 - Case Study: Flight Data Analysis using Spark GraphX |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 1 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 2 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 3 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 4 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 5 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 6 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 7 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 8 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 9 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 10 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 11 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 12 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 13 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 14 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 15 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 16 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 17 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 18 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 19 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 20 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 21 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 22 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 23 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 24 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 25 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 26 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 27 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 28 |
Link |
NOC:Introduction to Blockchain Technology and Applications |
Lecture 29 |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 1 - Turing Machines and Introduction to Arithmetic Circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 2 - Arithmetic complexity classes |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 3 - Determinant is in VP |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 4 - Determinant vs Arithmetic Branching Programs (ABP) |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 5 - Determinant as signed sum of clow sequence |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 6 - Determinant has small ABP and Strassen's homogenization |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 7 - Depth reduction for arithmetic formulas |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 8 - Depth reduction for arithmetic circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 9 - Depth 4 reduction |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 10 - Depth 3 reduction |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 11 - Equivalence of Formulas and Width 3 ABP |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 12 - Width-2 ABP Chasm |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 13 - Grigoriev-Karpinski Measure |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 14 - Lower Bound of Depth-3 circuit over finite fields |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 15 - Lower Bound for depth 3 Multilinear Circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 16 - Lower Bound for Constant depth Multilinear Circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 17 - Structural lemma for constant depth multilinear circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 18 - Extending the proof for multilinear formulas |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 19 - Shifted Partial Derivative Measure |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 20 - Exponential Lower Bound for General depth-4 CIrcuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 21 - Lower Bound on Homogeneous Depth-4 circuits |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 22 - Introduction to PIT |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 23 - Hitting Set and Hitting Set Generator |
Link |
NOC:Arithmetic Circuit Complexity |
Lecture 24 - PIT vs Lower Bounds |
Link |
NOC:Computational Complexity Theory |
Lecture 1 - Introduction |
Link |
NOC:Computational Complexity Theory |
Lecture 2 - NP Completeness |
Link |
NOC:Computational Complexity Theory |
Lecture 3 - SAT is NP-complete |
Link |
NOC:Computational Complexity Theory |
Lecture 4 - More on NP completeness |
Link |
NOC:Computational Complexity Theory |
Lecture 5 - Hierarchy Theorems |
Link |
NOC:Computational Complexity Theory |
Lecture 6 - Introduction to Space Complexity |
Link |
NOC:Computational Complexity Theory |
Lecture 7 - Savitch’s Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 8 - Immerman-Szelepscenyi Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 9 - Polynomial Hierarchy |
Link |
NOC:Computational Complexity Theory |
Lecture 10 - A PSPACE Complete Problem |
Link |
NOC:Computational Complexity Theory |
Lecture 11 - More on Polynomial Hierarchy |
Link |
NOC:Computational Complexity Theory |
Lecture 12 - Alternating Turing Machines |
Link |
NOC:Computational Complexity Theory |
Lecture 13 - Equivalence of Quantifier and Oracle Based Definitions of Polynomial Hierarchy |
Link |
NOC:Computational Complexity Theory |
Lecture 14 - Boolean Circuits |
Link |
NOC:Computational Complexity Theory |
Lecture 15 - Shannon’s Theorem and Karp-Lipton-Sipser Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 16 - Bounded Depth Circuit Classes |
Link |
NOC:Computational Complexity Theory |
Lecture 17 - Kannan’s Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 18 - Probabilistic Complexity |
Link |
NOC:Computational Complexity Theory |
Lecture 19 - StrongBPP and WeakBPP |
Link |
NOC:Computational Complexity Theory |
Lecture 20 - One-sided and Zero-sided Error Probabilistic Complexity Classes |
Link |
NOC:Computational Complexity Theory |
Lecture 21 - Error Reduction for BPP |
Link |
NOC:Computational Complexity Theory |
Lecture 22 - BPP in PH and Logspace Randomized Classes |
Link |
NOC:Computational Complexity Theory |
Lecture 23 - Valiant-Vazirani Theorem - I |
Link |
NOC:Computational Complexity Theory |
Lecture 24 - Valiant-Vazirani Theorem - II |
Link |
NOC:Computational Complexity Theory |
Lecture 25 - Amplified version of Valiant-Vazirani Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 26 - Toda’s Theorem - I |
Link |
NOC:Computational Complexity Theory |
Lecture 27 - Toda’s Theorem - II |
Link |
NOC:Computational Complexity Theory |
Lecture 28 - Permanent and Determinant Functions |
Link |
NOC:Computational Complexity Theory |
Lecture 29 - Permanent is hard for #P |
Link |
NOC:Computational Complexity Theory |
Lecture 30 - Interactive Proofs |
Link |
NOC:Computational Complexity Theory |
Lecture 31 - Graph Non-Isomorphism is in IP[2] |
Link |
NOC:Computational Complexity Theory |
Lecture 32 - Set Lower Bound Protocol |
Link |
NOC:Computational Complexity Theory |
Lecture 33 - MA is in AM |
Link |
NOC:Computational Complexity Theory |
Lecture 34 - Sumcheck Protocol - I |
Link |
NOC:Computational Complexity Theory |
Lecture 35 - Sumcheck Protocol - II |
Link |
NOC:Computational Complexity Theory |
Lecture 36 - Parity not in AC0 - I |
Link |
NOC:Computational Complexity Theory |
Lecture 37 - Parity not in AC0 - II |
Link |
NOC:Computational Complexity Theory |
Lecture 38 - Circuits with Counters |
Link |
NOC:Computational Complexity Theory |
Lecture 39 - Communication Complexity - I |
Link |
NOC:Computational Complexity Theory |
Lecture 40 - PCP Theorem |
Link |
NOC:Computational Complexity Theory |
Lecture 41 - Communication Complexity - II |
Link |
NOC:Randomized Methods in Complexity |
Lecture 1 - Course Outline |
Link |
NOC:Randomized Methods in Complexity |
Lecture 2 - Circuits and Polynomial Identity Testing |
Link |
NOC:Randomized Methods in Complexity |
Lecture 3 - Derandomization and Lower Bounds |
Link |
NOC:Randomized Methods in Complexity |
Lecture 4 - IP=PSPACE |
Link |
NOC:Randomized Methods in Complexity |
Lecture 5 - ACC0 Lower Bounds |
Link |
NOC:Randomized Methods in Complexity |
Lecture 6 - ACC0 Lower Bounds (Continued...) |
Link |
NOC:Randomized Methods in Complexity |
Lecture 7 - Monotone Circuits |
Link |
NOC:Randomized Methods in Complexity |
Lecture 8 - Monotone Circuit Lower Bound and Sunflower Lemma |
Link |
NOC:Randomized Methods in Complexity |
Lecture 9 - Undirected Graph Connectivity in randomized logspace |
Link |
NOC:Randomized Methods in Complexity |
Lecture 10 - Graph Expansion Properties |
Link |
NOC:Randomized Methods in Complexity |
Lecture 11 - Expanders |
Link |
NOC:Randomized Methods in Complexity |
Lecture 12 - Error Reduction using Expanders |
Link |
NOC:Randomized Methods in Complexity |
Lecture 13 - Ajtai-Komlos-Szemeredi Theorem |
Link |
NOC:Randomized Methods in Complexity |
Lecture 14 - Explicit construction of expanders and Zig-Zag product |
Link |
NOC:Randomized Methods in Complexity |
Lecture 15 - Spectral analysis of Zig-Zag product |
Link |
NOC:Randomized Methods in Complexity |
Lecture 16 - Undirected Path in logspace |
Link |
NOC:Randomized Methods in Complexity |
Lecture 17 - Explicit Prg to derandomizing classes |
Link |
NOC:Randomized Methods in Complexity |
Lecture 18 - Hardness vs Randomness |
Link |
NOC:Randomized Methods in Complexity |
Lecture 19 - Hardness to NW-Generator to PRG |
Link |
NOC:Randomized Methods in Complexity |
Lecture 20 - Partial derandomization from worst-case hardness of permanent |
Link |
NOC:Randomized Methods in Complexity |
Lecture 21 - Error-correcting codes |
Link |
NOC:Randomized Methods in Complexity |
Lecture 22 - Introduction to various linear explicit codes |
Link |
NOC:Randomized Methods in Complexity |
Lecture 23 - Introduction of efficient decoding |
Link |
NOC:Randomized Methods in Complexity |
Lecture 24 - Local decoding of WH, Reed-Muller and Concatenated codes |
Link |
NOC:Randomized Methods in Complexity |
Lecture 25 - Introduction to List Decoding |
Link |
NOC:Randomized Methods in Complexity |
Lecture 26 - Local List decoding of WH, RM |
Link |
NOC:Probability for Computer Science |
Lecture 1 - Introductory examples |
Link |
NOC:Probability for Computer Science |
Lecture 2 - Examples and Course outline |
Link |
NOC:Probability for Computer Science |
Lecture 3 - Probability over discrete space |
Link |
NOC:Probability for Computer Science |
Lecture 4 - Inclusion-Exclusion principle |
Link |
NOC:Probability for Computer Science |
Lecture 5 - Probability over infinite space |
Link |
NOC:Probability for Computer Science |
Lecture 6 - Conditional probability, Partition formula |
Link |
NOC:Probability for Computer Science |
Lecture 7 - Independent events, Bayes theorem |
Link |
NOC:Probability for Computer Science |
Lecture 8 - Fallacies, Random variables |
Link |
NOC:Probability for Computer Science |
Lecture 9 - Expection |
Link |
NOC:Probability for Computer Science |
Lecture 10 - Conditional Expectation |
Link |
NOC:Probability for Computer Science |
Lecture 11 - Important Random Variables |
Link |
NOC:Probability for Computer Science |
Lecture 12 - Continuous Random Variables |
Link |
NOC:Probability for Computer Science |
Lecture 13 - Equality Checking, Poisson Distribution |
Link |
NOC:Probability for Computer Science |
Lecture 14 - Concentration Inequivalities, Variance |
Link |
NOC:Probability for Computer Science |
Lecture 15 - Weak Linearity of Variance, Law of Large Numbers |
Link |
NOC:Probability for Computer Science |
Lecture 16 - Chernoff's Bound. K-wise Independence |
Link |
NOC:Probability for Computer Science |
Lecture 17 - Union and Factorial Estimates |
Link |
NOC:Probability for Computer Science |
Lecture 18 - Stochastic Process: Markov Chains |
Link |
NOC:Probability for Computer Science |
Lecture 19 - Drunkard's walk, Evolution of Markov Chains |
Link |
NOC:Probability for Computer Science |
Lecture 20 - Stationary Distribution |
Link |
NOC:Probability for Computer Science |
Lecture 21 - Perron-Frobenius Theorem, Page Rank Algorithm |
Link |
NOC:Probability for Computer Science |
Lecture 22 - Page Rank Algorithm: Ergodicity |
Link |
NOC:Probability for Computer Science |
Lecture 23 - Cell Genetics |
Link |
NOC:Probability for Computer Science |
Lecture 24 - Random Sampling |
Link |
NOC:Probability for Computer Science |
Lecture 25 - Biased Coin Tosses, Hashing |
Link |
NOC:Probability for Computer Science |
Lecture 26 - Hashing, Introduction to Probabilistic Methods |
Link |
NOC:Probability for Computer Science |
Lecture 27 - Ramsey Numbers, Large Cuts in Graphcs |
Link |
NOC:Probability for Computer Science |
Lecture 28 - Sum Free Subsets, Discrepancy |
Link |
NOC:Probability for Computer Science |
Lecture 29 - Extremal Set Families |
Link |
NOC:Probability for Computer Science |
Lecture 30 - Super Concentrators |
Link |
NOC:Probability for Computer Science |
Lecture 31 - Streaming Algorithms - I |
Link |
NOC:Probability for Computer Science |
Lecture 32 - Streaming Algorithms - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 1 - Introduction |
Link |
NOC:Circuit Complexity Theory |
Lecture 2 - Standard Bounds |
Link |
NOC:Circuit Complexity Theory |
Lecture 3 - Shannon's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 4 - Riordon-Shannon Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 5 - Khrapchenko's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 6 - Proof of Khrapchenko's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 7 - Application of Khrapchenko's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 8 - Nechiporuk's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 9 - Application of Nechiporuk's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 10 - Subbotovskaya's Theorem - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 11 - Subbotovskaya's Theorem - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 12 - Applications of Subbotovskaya's Theorem |
Link |
NOC:Circuit Complexity Theory |
Lecture 13 - Upper and Lower Bounds on the Andreev Function |
Link |
NOC:Circuit Complexity Theory |
Lecture 14 - Upper and Lower Bounds on the Andreev Function |
Link |
NOC:Circuit Complexity Theory |
Lecture 15 - Polynomial Size Monotone Formula for MAJORITY (Valiant's Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 16 - Circuits for Addition - Ripple Adder and Carry Lookahead Adder |
Link |
NOC:Circuit Complexity Theory |
Lecture 17 - Circuits for Addition - Parallel Prefix Sum Method |
Link |
NOC:Circuit Complexity Theory |
Lecture 18 - Circuits for Iterated Addition and Multiplication |
Link |
NOC:Circuit Complexity Theory |
Lecture 19 - Bounded Depth Circuit Classes |
Link |
NOC:Circuit Complexity Theory |
Lecture 20 - Basic Circuit for Division using Newton-Raphson Method |
Link |
NOC:Circuit Complexity Theory |
Lecture 21 - Division in NC1 (Beame, Cook, Hoover Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 22 - Division in NC1 (Beame, Cook, Hoover Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 23 - Division in NC1 (Beame, Cook, Hoover Theorem) - III |
Link |
NOC:Circuit Complexity Theory |
Lecture 24 - Division in NC1 (Beame, Cook, Hoover Theorem) - IV |
Link |
NOC:Circuit Complexity Theory |
Lecture 25 - Division in NC1 (Beame, Cook, Hoover Theorem) - V |
Link |
NOC:Circuit Complexity Theory |
Lecture 26 - Division in NC1 (Beame, Cook, Hoover Theorem) - VI |
Link |
NOC:Circuit Complexity Theory |
Lecture 27 - Relation between Bounded Depth Circuit Classes and Uniform Complexity Classes - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 28 - Relation between Bounded Depth Circuit Classes and Uniform Complexity Classes - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 29 - Reducing Circuit Depth |
Link |
NOC:Circuit Complexity Theory |
Lecture 30 - P is in P/poly |
Link |
NOC:Circuit Complexity Theory |
Lecture 31 - Discussion on Lower Circuit Bounds for Bounded Depth Circuit Classes |
Link |
NOC:Circuit Complexity Theory |
Lecture 32 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 33 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 34 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - III |
Link |
NOC:Circuit Complexity Theory |
Lecture 35 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - IV |
Link |
NOC:Circuit Complexity Theory |
Lecture 36 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - V |
Link |
NOC:Circuit Complexity Theory |
Lecture 37 - Monotone Circuit Lower Bound for Clique (Razborov's Theorem) - VI |
Link |
NOC:Circuit Complexity Theory |
Lecture 38 - Circuit Lower Bound for Parity by Approximating Circuits using Polynomials (Razborov-Smolensky Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 39 - Circuit Lower Bound for Parity by Approximating Circuits using Polynomials (Razborov-Smolensky Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 40 - Circuit Lower Bound for Parity by Approximating Circuits using Polynomials (Razborov-Smolensky Theorem) - III |
Link |
NOC:Circuit Complexity Theory |
Lecture 41 - Circuit Lower Bound for Parity using Switching Lemma (Hastad's Theorem) |
Link |
NOC:Circuit Complexity Theory |
Lecture 42 - Circuit Lower Bound for Parity using Switching Lemma (Hastad's Theorem) |
Link |
NOC:Circuit Complexity Theory |
Lecture 43 - Circuit Lower Bound for Parity using Switching Lemma (Hastad's Theorem) |
Link |
NOC:Circuit Complexity Theory |
Lecture 44 - Proof of Hastad's Switching Lemma - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 45 - Proof of Hastad's Switching Lemma - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 46 - Communication Complexity of a Function |
Link |
NOC:Circuit Complexity Theory |
Lecture 47 - Relation Between Communication Complexity and Circuit Depth (Karchmer-Wigderson Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 48 - Relation Between Communication Complexity and Circuit Depth (Karchmer-Wigderson Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 49 - Bounded Width Branching Programs = NC1 (Barrington's Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 50 - Bounded Width Branching Programs = NC1 (Barrington's Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 51 - Width 3 Branching Programs = MOD3 o MOD2 Circuits (Barrington's Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 52 - Width 3 Branching Programs = MOD3 o MOD2 Circuits (Barrington's Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 53 - Uniform AC0 can be simulated by depth 3 Threshold circuits of quasipolynomial size (Allender-Hertramph Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 54 - Uniform AC0 can be simulated by depth 3 Threshold circuits of quasipolynomial size (Allender-Hertramph Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 55 - Valient-Vazirani Theorem - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 56 - Valient-Vazirani Theorem - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 57 - Natural Proof Barrier (Razborov-Rudich Theorem) - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 58 - Natural Proof Barrier (Razborov-Rudich Theorem) - II |
Link |
NOC:Circuit Complexity Theory |
Lecture 59 - Pseudorandom Function Generator by Goldreich, Goldwasser and Micali - I |
Link |
NOC:Circuit Complexity Theory |
Lecture 60 - Pseudorandom Function Generator by Goldreich, Goldwasser and Micali - II |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 1 - Introduction to Edge Computing |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 2 - Introduction to Cloud |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 3 - Introduction to IoT Platform |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 4 - Time and Clock Synchronization in IoT |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 5 - Enabling Intelligence at Edge Layer for IoT |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 6 - ML-based Image Classifier at IoT-Edge |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 7 - Introduction to Docker Containers and Kubernetes |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 8 - ML based Predictive Maintenance at IoT Edge |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 9 - Deep Reinforcement Learning for Cloud Edge |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 10 - Deep Reinforcement Learning for Cloud Edge Example |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 11 - Public Cloud Services Case Study of AWS Services |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 12 - Mathematical formulations for task offloading in Edge Cloud |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 13 - Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 14 - Vertical and Horizontal Offloading for Cloud Edge |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 15 - Global State and Snapshot Recording Algorithms |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 16 - Hot Data Analytics for Real Time Streaming in IoT Platform |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 17 - Introduction to MQTT and Kafka in IoT Platform |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 18 - Introduction to Edge Data Center for IoT Platform |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 19 - Design of Key Value Stores for IoT Edge Storage |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 20 - Introduction to Edge ML with AWS IoT platform |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 21 - Introduction to Federated Learning at IoT Edge |
Link |
NOC:Foundation of Cloud IoT Edge ML |
Lecture 22 - ML for Autonomous Driving Car |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 1 - Linear Programming, an Example |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 2 - Introduction to Linear Programming |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 3 - Gaussian Elimination with Examples |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 4 - Summary of Gaussian Elimination |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 5 - Vector Space over real numbers |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 6 - Linear Operators |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 7 - Solutions of Linear Equations |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 8 - Resource Allocation as LP |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 9 - Approximate Degree as LP |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 10 - Equivalent LP's |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 11 - Introduction to Convexity |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 12 - Different Kind of Convex Sets |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 13 - Feasible Region of LP |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 14 - Proof of Weyl's Theorem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 15 - Definition of Convex Functions |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 16 - Properties of Convex Functions and Examples |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 17 - Basic Feasible Solution |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 18 - BFS and Vertices |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 19 - Simplex Algorithm |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 20 - Details of Simplex Algorithm |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 21 - Starting BFS |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 22 - Degeneracy |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 23 - Introduction to Duality |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 24 - Hyperplane Separation Theorems |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 25 - Farkas Lemma |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 26 - How to take dual |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 27 - Examples of taking dual |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 28 - Strong Duality |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 29 - Proof of Strong Duality |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 30 - Complementary Slackness |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 31 - Introduction to Algorithmic Game Theory |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 32 - Nash Equilibrium |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 33 - Minimax and Nash Equilibrium |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 34 - Deterministic Communication Complexity |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 35 - Randomized Communication Complexity |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 36 - Yao's Minimax Theorem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 37 - Lower bounds using Yao's Minimax |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 38 - Set Disjointness Problem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 39 - LP for mass flow problem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 40 - LP for min cut problem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 41 - Max flow = Min cut |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 42 - Primal dual approach |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 43 - Primal dual for max flow |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 44 - Set cover problem |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 45 - Rounding for set cover |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 46 - Analysis of Rounding |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 47 - Algorithm for Set Cover |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 48 - Linear Regression through LP |
Link |
NOC:Linear Programming and its Applications to Computer Science |
Lecture 49 - Linear Classifiers through LP |
Link |
NOC:Basics of Computational Complexity |
Lecture 1 - Introduction |
Link |
NOC:Basics of Computational Complexity |
Lecture 2 - Outline |
Link |
NOC:Basics of Computational Complexity |
Lecture 3 - Formalize Problems and Machines |
Link |
NOC:Basics of Computational Complexity |
Lecture 4 - Turing Machine |
Link |
NOC:Basics of Computational Complexity |
Lecture 5 - Asymptotics, Church-Turing Thesis and UTM |
Link |
NOC:Basics of Computational Complexity |
Lecture 6 - Halting Problem and Diagonalization |
Link |
NOC:Basics of Computational Complexity |
Lecture 7 - Classes P, NP, EXP |
Link |
NOC:Basics of Computational Complexity |
Lecture 8 - Comparison of Classes and Non-determination |
Link |
NOC:Basics of Computational Complexity |
Lecture 9 - NP Vs Ntime |
Link |
NOC:Basics of Computational Complexity |
Lecture 10 - SAT is NP-hard |
Link |
NOC:Basics of Computational Complexity |
Lecture 11 - Cook-Levin Theorem |
Link |
NOC:Basics of Computational Complexity |
Lecture 12 - NP-Hardness and Co-Classes |
Link |
NOC:Basics of Computational Complexity |
Lecture 13 - NEXP and Godel's Computation Question |
Link |
NOC:Basics of Computational Complexity |
Lecture 14 - Time, Space Hierarchy |
Link |
NOC:Basics of Computational Complexity |
Lecture 15 - NDTM Hierarchy |
Link |
NOC:Basics of Computational Complexity |
Lecture 16 - Ladner's Theorem and Introduction to Oracles |
Link |
NOC:Basics of Computational Complexity |
Lecture 17 - Oracle and Relativizing Proofs |
Link |
NOC:Basics of Computational Complexity |
Lecture 18 - Non Relativizing P=NP and Introduction to Space Complexity |
Link |
NOC:Basics of Computational Complexity |
Lecture 19 - PSpace Completeness |
Link |
NOC:Basics of Computational Complexity |
Lecture 20 - QBF Game and NSpace |
Link |
NOC:Basics of Computational Complexity |
Lecture 21 - NL Complete |
Link |
NOC:Basics of Computational Complexity |
Lecture 22 - NL = coNL |
Link |
NOC:Basics of Computational Complexity |
Lecture 23 - Polynomial Hierarchy |
Link |
NOC:Basics of Computational Complexity |
Lecture 24 - Polynomial Hierarchy |
Link |
NOC:Basics of Computational Complexity |
Lecture 25 - PH Complete and Oracle TM |
Link |
NOC:Basics of Computational Complexity |
Lecture 26 - NP^NP and #SAT |
Link |
NOC:Basics of Computational Complexity |
Lecture 27 - Counting Classes #P and PP |
Link |
NOC:Basics of Computational Complexity |
Lecture 28 - Permanent and its Cycle cover of a Graph |
Link |
NOC:Basics of Computational Complexity |
Lecture 29 - #P-Complete: Graph Gadgets |
Link |
NOC:Basics of Computational Complexity |
Lecture 30 - #P-Hard: Analyse XOR |
Link |
NOC:Basics of Computational Complexity |
Lecture 31 - Valient-Vazirani Lemma and Hashing |
Link |
NOC:Basics of Computational Complexity |
Lecture 32 - SAT to Parity-SAT |
Link |
NOC:Basics of Computational Complexity |
Lecture 33 - Parity Quantification |
Link |
NOC:Basics of Computational Complexity |
Lecture 34 - Randomized Reduction of PH to Parity-P |
Link |
NOC:Basics of Computational Complexity |
Lecture 35 - PH to #P |
Link |
NOC:Basics of Computational Complexity |
Lecture 36 - Probabilistic TM |
Link |
NOC:Basics of Computational Complexity |
Lecture 37 - Example of PTM and Introduction to RP and ZPP |
Link |
NOC:Basics of Computational Complexity |
Lecture 38 - ZPP = RP and coRP |
Link |
NOC:Basics of Computational Complexity |
Lecture 39 - Probability Amplification |
Link |
NOC:Basics of Computational Complexity |
Lecture 40 - BPP in PH |
Link |
NOC:Basics of Computational Complexity |
Lecture 41 - GNI is in BP.NP |
Link |
NOC:Basics of Computational Complexity |
Lecture 42 - GI is NP-hard |
Link |
NOC:Basics of Computational Complexity |
Lecture 43 - GI is NP-hard (Continued...) Going Beyond TMs |
Link |
NOC:Basics of Computational Complexity |
Lecture 44 - Circuit Complexity |
Link |
NOC:Basics of Computational Complexity |
Lecture 45 - TM with Advice - P/poly |
Link |
NOC:Basics of Computational Complexity |
Lecture 46 - Circuits for NP and EXP |
Link |
NOC:Basics of Computational Complexity |
Lecture 47 - Parallel Computation |
Link |
NOC:Basics of Computational Complexity |
Lecture 48 - P-completeness and NEXP-completeness |
Link |
NOC:Edge Computing |
Lecture 1 - Overview of Cloud Computing |
Link |
NOC:Edge Computing |
Lecture 2 - Cloud Computing and its Limitation to Support Low Latency and RTT |
Link |
NOC:Edge Computing |
Lecture 3 - Introduction to Edge Computing |
Link |
NOC:Edge Computing |
Lecture 4 - Edge Computing Paradigms - 004 |
Link |
NOC:Edge Computing |
Lecture 5 - Overview of Virtualization |
Link |
NOC:Edge Computing |
Lecture 6 - Docker Containers |
Link |
NOC:Edge Computing |
Lecture 7 - Kubernetes |
Link |
NOC:Edge Computing |
Lecture 8 - NoSQL Databases and Key Value Stores |
Link |
NOC:Edge Computing |
Lecture 9 - Edge AI Intelligence at the Edge |
Link |
NOC:Edge Computing |
Lecture 10 - Edge AI Intelligence at the Edge |
Link |
NOC:Edge Computing |
Lecture 11 - Mobile Edge Computing |
Link |
NOC:Edge Computing |
Lecture 12 - Geo-distributed Data Centers |
Link |
NOC:Edge Computing |
Lecture 13 - Time and Clock Synchronization |
Link |
NOC:Edge Computing |
Lecture 14 - Edge Computing Security and Privacy |
Link |
NOC:Edge Computing |
Lecture 15 - Network Virtualization |
Link |
NOC:Edge Computing |
Lecture 16 - Resource Allocation in Private and Public Edge-Cloud Systems |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 1 - Introduction to the Course - Practical Cyber Security for Cyber Practitioners |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 2 - Introduction to Cyber Kill Chains - Lockheed Martin Kill Chain |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 3 - Understanding Cyber Kill Chain - Delivery, Exploitation, and Installation |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 4 - Mastering the Cyber Kill Chain: Command and Control and Actions on Objectives |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 5 - Introduction to MITRE ATT&CK framework |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 6 - Understanding MITRE ATT&CK: A Guide to Cyber Threat Intelligence |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 7 - Mapping to ATT&CK from Finished Cyber Incident |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 8 - Introduction to Mapping to ATT&CK from Raw Data |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 9 - Mapping to ATT&CK from RAW Data |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 10 - Storing and Analyzing ATT&CK-Mapped Data |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 11 - Making Defensive Recommendations from ATT&CK-Mapped Data |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 12 - TTP Mapping and Introduction to Unified Kill Chain |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 13 - Deep Dive into Unified Kill Chain - Part 1 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 14 - Deep Dive into Unified Kill Chain - Part 2 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 15 - Introduction to MITRE DEF3ND Framework |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 16 - Deep dive into MITRE DEF3ND framework - I |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 17 - Deep dive into MITRE DEF3ND framework - II |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 18 - MITRE DEF3ND Framework Conclusion and Introduction to Risk Identification and Assessment |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 19 - Deep dive into Risk Assessment - I |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 20 - Deep dive into Risk Assessment - II |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 21 - Introduction to Cyber Crisis Management |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 22 - Cyber Crisis Conclusion and Introduction to Cyber Resilience |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 23 - Deep dive into Cyber Resilience - I |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 24 - Deep dive into Cyber Resilience - II |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 25 - Cyber Resilience Review (Self-Assessment) |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 26 - Cyber Threat Intelligence Sharing - STIX Tutorial - Part 1 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 27 - Cyber Threat Intelligence Sharing - STIX Tutorial - Part 2 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 28 - Introduction to SCAP, CVE and CCE |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 29 - Deep Dive into CVE, CCE, CPE, CVSS Scoring, XCCDF, OVAL Languages - Part 1 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 30 |
Link |
NOC:Practical Cyber Security for Cyber Security Practitioners |
Lecture 31 |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 1 - Course outline and Fundamentals |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 2 - Ideals and Varieties |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 3 - Dimension of Varieties |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 4 - Projective varieties |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 5 - Morphisms and rational functions |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 6 - Local rings |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 7 - Rational maps and Birationality |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 8 - Tangent space and Singularities |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 9 - Resolution of singularities |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 10 - Discrete valuation rings |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 11 - Existence of nonsingular model |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 12 - Nonsingular curves |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 13 - Divisor on Curves |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 14 - Riemann-Roch Spaces - I |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 15 - Riemann-Roch Spaces - II |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 16 - Divisor Class Group |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 17 - Genus of a curve |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 18 - Riemann-Roch and Adeles |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 19 - Differentials and Riemann-Roch |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 20 - Canonical divisor and proof of Riemann-Roch |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 21 - Jacobian of a curve |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 22 - Zeta function of curves |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 23 - Functional equation and point counting |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 24 - Riemann hypothesis for curves |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 25 - Proof of RH for curves: Galois covers |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 26 - Proof of RH for curves II: Multilinear algebra |
Link |
NOC:Computational Arithmetic - Geometry for Algebraic Curves |
Lecture 27 - Cohomological interpretation of zeta function |
Link |
Cryptography and Network Security |
Lecture 1 - Introduction |
Link |
Cryptography and Network Security |
Lecture 2 - Overview on Modern Cryptography |
Link |
Cryptography and Network Security |
Lecture 3 - Introduction to Number Theory |
Link |
Cryptography and Network Security |
Lecture 4 - Probability and Information Theory |
Link |
Cryptography and Network Security |
Lecture 5 - Classical Cryptosystems |
Link |
Cryptography and Network Security |
Lecture 6 - Cryptanalysis of Classical Ciphers |
Link |
Cryptography and Network Security |
Lecture 7 - Shannons Theory |
Link |
Cryptography and Network Security |
Lecture 8 - Shannons Theory (Continued...1) |
Link |
Cryptography and Network Security |
Lecture 9 - Shannons Theory (Continued...2) |
Link |
Cryptography and Network Security |
Lecture 10 - Symmetric Key Ciphers |
Link |
Cryptography and Network Security |
Lecture 11 - Block Cipher Standards (DES) |
Link |
Cryptography and Network Security |
Lecture 12 - Block Cipher Standards (AES) |
Link |
Cryptography and Network Security |
Lecture 13 - Block Cipher Standards (AES) (Continued...) |
Link |
Cryptography and Network Security |
Lecture 14 - Linear Cryptanalysis |
Link |
Cryptography and Network Security |
Lecture 15 - Differential Cryptanalysis |
Link |
Cryptography and Network Security |
Lecture 16 - Few other Cryptanalytic Techniques |
Link |
Cryptography and Network Security |
Lecture 17 - Overview on S-Box Design Principles |
Link |
Cryptography and Network Security |
Lecture 18 - Modes of Operation of Block Ciphers |
Link |
Cryptography and Network Security |
Lecture 19 - Stream Ciphers |
Link |
Cryptography and Network Security |
Lecture 20 - Stream Ciphers (Continued...1) |
Link |
Cryptography and Network Security |
Lecture 21 - Stream Ciphers (Continued...2) |
Link |
Cryptography and Network Security |
Lecture 22 - Pseudorandomness |
Link |
Cryptography and Network Security |
Lecture 23 - Cryptographic Hash Functions |
Link |
Cryptography and Network Security |
Lecture 24 - Cryptographic Hash Functions (Continued...1) |
Link |
Cryptography and Network Security |
Lecture 25 - Cryptographic Hash Functions (Continued...2) |
Link |
Cryptography and Network Security |
Lecture 26 - Message Authentication Codes |
Link |
Cryptography and Network Security |
Lecture 27 - More Number Theoretic Results |
Link |
Cryptography and Network Security |
Lecture 28 - The RSA Cryptosystem |
Link |
Cryptography and Network Security |
Lecture 29 - Primality Testing |
Link |
Cryptography and Network Security |
Lecture 30 - Factoring Algorithms |
Link |
Cryptography and Network Security |
Lecture 31 - Some Comments on the Security of RSA |
Link |
Cryptography and Network Security |
Lecture 32 - Discrete Logarithm Problem (DLP) |
Link |
Cryptography and Network Security |
Lecture 33 - The Diffie-Hellman Problem and Security of ElGamal Systems |
Link |
Cryptography and Network Security |
Lecture 34 - An Introduction to Elliptic Curve Cryptography |
Link |
Cryptography and Network Security |
Lecture 35 - Application of Elliptic Curves to Cryptography |
Link |
Cryptography and Network Security |
Lecture 36 - Implementation of Elliptic Curve Cryptography |
Link |
Cryptography and Network Security |
Lecture 37 - Secret Sharing Schemes |
Link |
Cryptography and Network Security |
Lecture 38 - A Tutorial on Network Protocols |
Link |
Cryptography and Network Security |
Lecture 39 - System Security |
Link |
Cryptography and Network Security |
Lecture 40 - Firewalls and Intrusion Detection Systems |
Link |
Cryptography and Network Security |
Lecture 41 - Side Channel Analysis of Cryptographic Implementations |
Link |
High Performance Computer Architecture |
Lecture 1 - Introduction & Course Outline |
Link |
High Performance Computer Architecture |
Lecture 2 - Performance |
Link |
High Performance Computer Architecture |
Lecture 3 - Instruction Set Architecture |
Link |
High Performance Computer Architecture |
Lecture 4 - MIPS ISA and Processor |
Link |
High Performance Computer Architecture |
Lecture 5 - MIPS ISA and Processor (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 6 - Pipelining - Introduction |
Link |
High Performance Computer Architecture |
Lecture 7 - Instruction Pipelining |
Link |
High Performance Computer Architecture |
Lecture 8 - Pipeline Hazards |
Link |
High Performance Computer Architecture |
Lecture 9 - Data Hazards |
Link |
High Performance Computer Architecture |
Lecture 10 - Software Pipelining |
Link |
High Performance Computer Architecture |
Lecture 11 - In Quest of Higher ILP |
Link |
High Performance Computer Architecture |
Lecture 12 - In Quest of Higher ILP (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 13 - Dynamic Instruction Scheduling |
Link |
High Performance Computer Architecture |
Lecture 14 - Dynamic Instruction Scheduling (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 15 - Control Hazards |
Link |
High Performance Computer Architecture |
Lecture 16 - Branch Prediction |
Link |
High Performance Computer Architecture |
Lecture 17 - Branch Prediction (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 18 - Dynamic Instruction Scheduling with Branch Prediction |
Link |
High Performance Computer Architecture |
Lecture 19 - Hardware-based Speculation |
Link |
High Performance Computer Architecture |
Lecture 20 - Tutorial - I |
Link |
High Performance Computer Architecture |
Lecture 21 - Hierarchical Memory Organization |
Link |
High Performance Computer Architecture |
Lecture 22 - Hierarchical Memory Organization (Continued...1) |
Link |
High Performance Computer Architecture |
Lecture 23 - Hierarchical Memory Organization (Continued...2) |
Link |
High Performance Computer Architecture |
Lecture 24 - Hierarchical Memory Organization (Continued...3) |
Link |
High Performance Computer Architecture |
Lecture 25 - Cache Optimization Techniques (Continued...1) |
Link |
High Performance Computer Architecture |
Lecture 26 - Cache Optimization Techniques (Continued...2) |
Link |
High Performance Computer Architecture |
Lecture 27 - Main Memory Organization |
Link |
High Performance Computer Architecture |
Lecture 28 - Main Memory Optimizations |
Link |
High Performance Computer Architecture |
Lecture 29 - Virtual Memory |
Link |
High Performance Computer Architecture |
Lecture 30 - Virtual Memory (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 31 - Virtual Machines |
Link |
High Performance Computer Architecture |
Lecture 32 - Storage Technology |
Link |
High Performance Computer Architecture |
Lecture 33 - Storage Technology (Continued...) |
Link |
High Performance Computer Architecture |
Lecture 34 - Case Studies |
Link |
High Performance Computer Architecture |
Lecture 35 - Case Studies (Continued...1) |
Link |
High Performance Computer Architecture |
Lecture 36 - Case Studies (Continued...2) |
Link |
High Performance Computer Architecture |
Lecture 37 - Multithreading & Multiprocessing |
Link |
High Performance Computer Architecture |
Lecture 38 - Simultaneous Multithreading |
Link |
High Performance Computer Architecture |
Lecture 39 - Symmetric Multiprocessors |
Link |
High Performance Computer Architecture |
Lecture 40 - Distributed Memory Multiprocessors |
Link |
High Performance Computer Architecture |
Lecture 41 - Cluster, Grid and Cloud Computing |
Link |
Low Power VLSI Circuits and Systems |
Lecture 1 - Introduction & Course Outline |
Link |
Low Power VLSI Circuits and Systems |
Lecture 2 - MOS Transistors - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 3 - MOS Transistors - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 4 - MOS Transistors - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 5 - MOS Transistors - IV |
Link |
Low Power VLSI Circuits and Systems |
Lecture 6 - MOS Inverters - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 7 - MOS Inverters - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 8 - MOS Inverters - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 9 - MOS Inverters - IV |
Link |
Low Power VLSI Circuits and Systems |
Lecture 10 - Static CMOS Circuits - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 11 - Static CMOS Circuits - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 12 - MOS Dynamic Circuits - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 13 - MOS Dynamic Circuits - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 14 - Pass Transistor Logic Circuits - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 15 - Pass Transistor Logic Circuits - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 16 - MOS Memories |
Link |
Low Power VLSI Circuits and Systems |
Lecture 17 - Finite State Machines |
Link |
Low Power VLSI Circuits and Systems |
Lecture 18 - Switching Power Dissipation |
Link |
Low Power VLSI Circuits and Systems |
Lecture 19 - Tutorial - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 20 - Dynamic Power Dissipation |
Link |
Low Power VLSI Circuits and Systems |
Lecture 21 - Leakage Power Dissipation |
Link |
Low Power VLSI Circuits and Systems |
Lecture 22 - Supply Voltage Scaling - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 23 - Supply Voltage Scaling - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 24 - Supply Voltage Scaling - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 25 - Supply Voltage Scaling - IV |
Link |
Low Power VLSI Circuits and Systems |
Lecture 26 - Tutorial - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 27 - Minimizing Switched Capacitance - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 28 - Minimizing Switched Capacitance - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 29 - Minimizing Switched Capacitance - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 30 - Minimizing Switched Capacitance - IV |
Link |
Low Power VLSI Circuits and Systems |
Lecture 31 - Minimizing Switched Capacitance - V |
Link |
Low Power VLSI Circuits and Systems |
Lecture 32 - Minimizing Leakage Power - I |
Link |
Low Power VLSI Circuits and Systems |
Lecture 33 - Minimizing Leakage Power - II |
Link |
Low Power VLSI Circuits and Systems |
Lecture 34 - Minimizing Leakage Power - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 35 - Variation Tolerant Design |
Link |
Low Power VLSI Circuits and Systems |
Lecture 36 - Adiabatic Logic Circuits |
Link |
Low Power VLSI Circuits and Systems |
Lecture 37 - Battery-Driven System Design |
Link |
Low Power VLSI Circuits and Systems |
Lecture 38 - CAD Tools for Low Power |
Link |
Low Power VLSI Circuits and Systems |
Lecture 39 - Tutorial - III |
Link |
Low Power VLSI Circuits and Systems |
Lecture 40 - Course Summary |
Link |
Real Time Systems |
Lecture 1 - Introduction |
Link |
Real Time Systems |
Lecture 2 - Real - Time System Characteristics |
Link |
Real Time Systems |
Lecture 3 - Few Basic Issues |
Link |
Real Time Systems |
Lecture 4 - Modelling Timing Constraints |
Link |
Real Time Systems |
Lecture 5 - Modelling Timing Constraints (Continued.) |
Link |
Real Time Systems |
Lecture 6 - Basics of Real - Time Task Scheduling |
Link |
Real Time Systems |
Lecture 7 - Cyclic Scheduler |
Link |
Real Time Systems |
Lecture 8 - Event - Driven Scheduling |
Link |
Real Time Systems |
Lecture 9 - Rate Monotonic Scheduler |
Link |
Real Time Systems |
Lecture 10 - RMA Scheduling : Further Issues |
Link |
Real Time Systems |
Lecture 11 - Deadline Monotonic Scheduling and Other Issues |
Link |
Real Time Systems |
Lecture 12 - Few Issues in Use of RMA |
Link |
Real Time Systems |
Lecture 13 - Resource Sharing Among Real-Time Tasks |
Link |
Real Time Systems |
Lecture 14 - Highest Locker and Priority Ceiling Protocols |
Link |
Real Time Systems |
Lecture 15 - An Analysis of Priority Ceiling Protocol |
Link |
Real Time Systems |
Lecture 16 - Handling Task Dependencies |
Link |
Real Time Systems |
Lecture 17 - Real-Time Task Scheduling on Multiprocessors and Distributed Systems |
Link |
Real Time Systems |
Lecture 18 - Real-Time Task Scheduling on Multiprocessors and Distributed Systems (Continued.) |
Link |
Real Time Systems |
Lecture 19 - Clock Synchronization in Distributed Real-Time Systems |
Link |
Real Time Systems |
Lecture 20 - Internal Clock Synchronization in Presence of Byzantine Clocks |
Link |
Real Time Systems |
Lecture 21 - A Few Basic Issues in Real-Time Operating Systems |
Link |
Real Time Systems |
Lecture 22 - Tutorial - I |
Link |
Real Time Systems |
Lecture 23 - A Few Basic Issues in Real-Time Operating Systems (Continued.) |
Link |
Real Time Systems |
Lecture 24 - Unix and Windows as RTOS |
Link |
Real Time Systems |
Lecture 25 - Real - Time POSIX |
Link |
Real Time Systems |
Lecture 26 - Real - Time POSIX (Continued.) |
Link |
Real Time Systems |
Lecture 27 - Open Source and Commercial RTOS |
Link |
Real Time Systems |
Lecture 28 - Open Source and Commercial RTOS (Continued.) |
Link |
Real Time Systems |
Lecture 29 - Benchmarking Real - Time Computer & Operating Systems |
Link |
Real Time Systems |
Lecture 30 - Benchmarking Real - Time Computer & Operating Systems (Continued.) |
Link |
Real Time Systems |
Lecture 31 - Real - Time Communications |
Link |
Real Time Systems |
Lecture 32 - Few Basic Issues in Real - Time Communications |
Link |
Real Time Systems |
Lecture 33 - Review of Computer Networking |
Link |
Real Time Systems |
Lecture 34 - Real - Time Communication in a LAN |
Link |
Real Time Systems |
Lecture 35 - Real - Time Communication in a LAN (Continued.) |
Link |
Real Time Systems |
Lecture 36 - Performance of Two Real -Time Communication Protocols |
Link |
Real Time Systems |
Lecture 37 - Real - Time Communication over Packet Switched Networks |
Link |
Real Time Systems |
Lecture 38 - Real - Time Communication over Packet Switched Networks (Continued.) |
Link |
Real Time Systems |
Lecture 39 - Real - Time Communication over Packet Switched Networks (Continued.) |
Link |
Real Time Systems |
Lecture 40 - Real - Time Databases |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 1 - Introduction to Artificial Intelligence |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 2 - Intelligent Agents |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 3 - State Space Search |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 4 - Uninformed Search |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 5 - Informed Search |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 6 - Informed Search - 2 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 7 - Two Players Games - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 8 - Two Players Games - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 9 - Constraint Satisfaction Problems - 1 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 10 - Constraint Satisfaction Problems - 2 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 11 - Knowledge Representation and Logic |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 12 - Interface in Propositional Logic |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 13 - First Order Logic |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 14 - Reasoning Using First Order Logic |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 15 - Resolution in FOPL |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 16 - Rule Based System |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 17 - Rule Based Systems II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 18 - Semantic Net |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 19 - Reasoning in Semantic Net |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 20 - Frames |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 21 - Planning - 1 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 22 - Planning - 2 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 23 - Planning - 3 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 24 - Planning - 4 |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 25 - Rule Based Expert System |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 26 - Reasoning with Uncertainty - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 27 - Reasoning with Uncertainty - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 28 - Reasoning with Uncertainty - III |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 29 - Reasoning with Uncertainty - IV |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 30 - Fuzzy Reasoning - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 31 - Fuzzy Reasoning - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 32 - Introduction to Learning - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 33 - Introduction to Learning - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 34 - Rule Induction and Decision Trees - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 35 - Rule Induction and Decision Trees - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 36 - Learning Using neural Networks - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 37 - Learning Using Neural Networks - II |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 38 - Probabilistic Learning |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 39 - Natural Language Processing - I |
Link |
Artificial Intelligence (Prof. Anupam Basu) |
Lecture 40 - Natural Language Processing - II |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 1 - Introduction to Artificial Intelligence |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 2 - Problem Solving by Search |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 3 - Searching with Costs |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 4 - Informed State Space Search |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 5 - Heuristic Search: A* and Beyond |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 6 - Problem Reduction Search: AND/OR Graphs |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 7 - Searching Game Trees |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 8 - Knowledge Based Systems: Logic and Deduction |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 9 - First Order Logic |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 10 - Inference in First Order Logic |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 11 - Resolution - Refutation Proofs |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 12 - Resolution Refutation Proofs |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 13 - Logic Programming : Prolog |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 14 - Prolog Programming |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 15 - Prolog: Exercising Control |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 16 - Additional Topics |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 17 - Introduction to Planning |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 18 - Partial Order Planning |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 19 - GraphPLAN and SATPlan |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 20 - SATPlan |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 21 - Reasoning under uncertainty |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 22 - Bayesian Networks |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 23 - Reasoning with Bayes Networks |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 24 - Reasoning with Bayes networks (Contd.) |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 25 - Reasoning under uncertainty: Issues |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 26 - Learning : Decision Trees |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 27 - Learning : Neural Networks |
Link |
Artificial Intelligence (Prof. P. Dasgupta) |
Lecture 28 - Back Propagation Learning |
Link |
Computer Networks |
Lecture 1 - Emergence of Networks & Reference Models |
Link |
Computer Networks |
Lecture 2 - Network Topology |
Link |
Computer Networks |
Lecture 3 - Physical Medium - I |
Link |
Computer Networks |
Lecture 4 - Physical Medium - II |
Link |
Computer Networks |
Lecture 5 - Multiplexing (Sharing a Medium) |
Link |
Computer Networks |
Lecture 6 - Telecom Networks |
Link |
Computer Networks |
Lecture 7 - Switches - I |
Link |
Computer Networks |
Lecture 8 - Pocket Switches |
Link |
Computer Networks |
Lecture 9 - SONET/SDH |
Link |
Computer Networks |
Lecture 10 - Fiber Optic Components |
Link |
Computer Networks |
Lecture 11 - Routing and Wavelength Assignment |
Link |
Computer Networks |
Lecture 12 - Protection and Restoration |
Link |
Computer Networks |
Lecture 13 - Multiple Access |
Link |
Computer Networks |
Lecture 14 - Token Based Mac |
Link |
Computer Networks |
Lecture 15 - Data Link Protocols |
Link |
Computer Networks |
Lecture 16 - Error Control |
Link |
Computer Networks |
Lecture 17 - Stop & Wait Protocol |
Link |
Computer Networks |
Lecture 18 - Satellite Communication |
Link |
Computer Networks |
Lecture 19 - Ethernet - CSMA/CD |
Link |
Computer Networks |
Lecture 20 - Modern Ethernet |
Link |
Computer Networks |
Lecture 21 - Local Internetworking |
Link |
Computer Networks |
Lecture 22 - Cellular Networks |
Link |
Computer Networks |
Lecture 23 - Wireless Network |
Link |
Computer Networks |
Lecture 24 - ATM : Asynchronous Transfer Mode |
Link |
Computer Networks |
Lecture 25 - ATM Signaling, Routing and LAN Emulation |
Link |
Computer Networks |
Lecture 26 - Introduction to Routing |
Link |
Computer Networks |
Lecture 27 - RIP - Distance Vector Routing |
Link |
Computer Networks |
Lecture 28 - IP version 4 |
Link |
Computer Networks |
Lecture 29 - IP Version 6 & Mobile IP |
Link |
Computer Networks |
Lecture 30 - UDP & Client Server |
Link |
Computer Networks |
Lecture 31 - TCP |
Link |
Computer Networks |
Lecture 32 - IP Multicasting |
Link |
Computer Networks |
Lecture 33 - DHCP and ICMP |
Link |
Computer Networks |
Lecture 34 - DNS & Directory |
Link |
Computer Networks |
Lecture 35 - Congestion Control |
Link |
Computer Networks |
Lecture 36 - QOS & Multimedia |
Link |
Computer Networks |
Lecture 37 - Network Management |
Link |
Computer Networks |
Lecture 38 - Security |
Link |
Computer Networks |
Lecture 39 - FTP - SMTP |
Link |
Computer Networks |
Lecture 40 - HTTP |
Link |
Data Communication |
Lecture 1 - Introduction and Course Outline - Data Communication |
Link |
Data Communication |
Lecture 2 - Layered Architecture |
Link |
Data Communication |
Lecture 3 - Data and Signal |
Link |
Data Communication |
Lecture 4 - Transmission Impairments and Channel Capacity |
Link |
Data Communication |
Lecture 5 - Guided Transmission Media |
Link |
Data Communication |
Lecture 6 - Unguided Media |
Link |
Data Communication |
Lecture 7 - Transmission of Digital Signal - I |
Link |
Data Communication |
Lecture 8 - Transmission of Digital Signal - II |
Link |
Data Communication |
Lecture 9 - Transmission of Analog Signal - I |
Link |
Data Communication |
Lecture 10 - Transmission of Analog Signal - II |
Link |
Data Communication |
Lecture 11 - Multiplexing |
Link |
Data Communication |
Lecture 12 - Multiplexing |
Link |
Data Communication |
Lecture 13 - Multiplexing Applications - I |
Link |
Data Communication |
Lecture 14 - Multiplexing Applications - II |
Link |
Data Communication |
Lecture 15 - Interfacing to the Media |
Link |
Data Communication |
Lecture 16 - Error Detection and Correction |
Link |
Data Communication |
Lecture 17 - Flow and Error Control |
Link |
Data Communication |
Lecture 18 - Data Link Control |
Link |
Data Communication |
Lecture 19 - Switching Techniques Circuit Switching |
Link |
Data Communication |
Lecture 20 - Switching Techniques Packet Switching |
Link |
Data Communication |
Lecture 21 - Routing - I |
Link |
Data Communication |
Lecture 22 - Routing - II |
Link |
Data Communication |
Lecture 23 - Congestion Control |
Link |
Data Communication |
Lecture 24 - X.25 and Frame Relay |
Link |
Data Communication |
Lecture 25 - ATM |
Link |
Data Communication |
Lecture 26 - Medium Access Control - I |
Link |
Data Communication |
Lecture 27 - Medium Access Control - II |
Link |
Data Communication |
Lecture 28 - Medium Access Control - III |
Link |
Data Communication |
Lecture 29 - IEEE 802 LANs |
Link |
Data Communication |
Lecture 30 - High Speed LANs |
Link |
Data Communication |
Lecture 31 - Wireless LANs |
Link |
Data Communication |
Lecture 32 - Cellular Telephone Systems |
Link |
Data Communication |
Lecture 33 - Satellite Communications |
Link |
Data Communication |
Lecture 34 - Internet and Internetworking |
Link |
Data Communication |
Lecture 35 - TCP/IP - I |
Link |
Data Communication |
Lecture 36 - TCP/IP - II |
Link |
Data Communication |
Lecture 37 - Multimedia Networks |
Link |
Data Communication |
Lecture 38 - Audio and Video Compression |
Link |
Data Communication |
Lecture 39 - Multimedia Services |
Link |
Data Communication |
Lecture 40 - Secured Communication - I |
Link |
Data Communication |
Lecture 41 - Secured Communication - II |
Link |
Electronic Design Automation |
Lecture 1 - Introduction |
Link |
Electronic Design Automation |
Lecture 2 - Verilog : Part - I |
Link |
Electronic Design Automation |
Lecture 3 - Verilog : Part - II |
Link |
Electronic Design Automation |
Lecture 4 - Verilog : Part - III |
Link |
Electronic Design Automation |
Lecture 5 - Verilog : Part - IV |
Link |
Electronic Design Automation |
Lecture 6 - Verilog : Part - V |
Link |
Electronic Design Automation |
Lecture 7 - Verilog : Part - VI |
Link |
Electronic Design Automation |
Lecture 8 - Synthesis : Part - I |
Link |
Electronic Design Automation |
Lecture 9 - Synthesis : Part - II |
Link |
Electronic Design Automation |
Lecture 10 - Synthesis : Part - III |
Link |
Electronic Design Automation |
Lecture 11 - Synthesis : Part - IV |
Link |
Electronic Design Automation |
Lecture 12 - Synthesis : Part - V |
Link |
Electronic Design Automation |
Lecture 13 - Synthesis : Part - VI |
Link |
Electronic Design Automation |
Lecture 14 - Synthesis : Part - VII |
Link |
Electronic Design Automation |
Lecture 15 - Backend Design : Part - I |
Link |
Electronic Design Automation |
Lecture 16 - Backend Design : Part - II |
Link |
Electronic Design Automation |
Lecture 17 - Backend Design : Part - III |
Link |
Electronic Design Automation |
Lecture 18 - Backend Design : Part - IV |
Link |
Electronic Design Automation |
Lecture 19 - Backend Design : Part - V |
Link |
Electronic Design Automation |
Lecture 20 - Backend Design : Part - VI |
Link |
Electronic Design Automation |
Lecture 21 - Backend Design : Part - VII |
Link |
Electronic Design Automation |
Lecture 22 - Backend Design : Part - VIII |
Link |
Electronic Design Automation |
Lecture 23 - Backend Design : Part - IX |
Link |
Electronic Design Automation |
Lecture 24 - Backend Design : Part - X |
Link |
Electronic Design Automation |
Lecture 25 - Backend Design : Part - XI |
Link |
Electronic Design Automation |
Lecture 26 - Backend Design : Part - XII |
Link |
Electronic Design Automation |
Lecture 27 - Backend Design : Part - XIII |
Link |
Electronic Design Automation |
Lecture 28 - Backend Design : Part - XIV |
Link |
Electronic Design Automation |
Lecture 29 - Backend Design : Part - XV |
Link |
Electronic Design Automation |
Lecture 30 - Testing Part - I |
Link |
Electronic Design Automation |
Lecture 31 - Testing Part - II |
Link |
Electronic Design Automation |
Lecture 32 - Testing Part - III |
Link |
Electronic Design Automation |
Lecture 33 - Testing Part - IV |
Link |
Electronic Design Automation |
Lecture 34 - Testing Part - V |
Link |
Electronic Design Automation |
Lecture 35 - Testing Part - VI |
Link |
Internet Technology |
Lecture 1 - Introduction To Internet |
Link |
Internet Technology |
Lecture 2 - Review Of Network Technologies |
Link |
Internet Technology |
Lecture 3 - TCP/IP - Part-I |
Link |
Internet Technology |
Lecture 4 - TCP/IP - Part-II |
Link |
Internet Technology |
Lecture 5 - TCP/IP - Part-III |
Link |
Internet Technology |
Lecture 6 - IP Subnetting and Addressing |
Link |
Internet Technology |
Lecture 7 - Internet Routing Protocol - Part-I |
Link |
Internet Technology |
Lecture 8 - Internet Routing Protocol - Part-II |
Link |
Internet Technology |
Lecture 9 - Client Server Concepts DNS, Telnet, FTP |
Link |
Internet Technology |
Lecture 10 - Electronic Mail |
Link |
Internet Technology |
Lecture 11 - World Wide Web - Part-I |
Link |
Internet Technology |
Lecture 12 - World Wide Web - Part-II |
Link |
Internet Technology |
Lecture 13 - HTML : Part-I |
Link |
Internet Technology |
Lecture 14 - HTML : Part-II |
Link |
Internet Technology |
Lecture 15 - HTML : Part-III |
Link |
Internet Technology |
Lecture 16 - Extensible Markup Language (XML) |
Link |
Internet Technology |
Lecture 17 - HTML Forms |
Link |
Internet Technology |
Lecture 18 - Image Maps |
Link |
Internet Technology |
Lecture 19 - CGI Scripts |
Link |
Internet Technology |
Lecture 20 - Other Technologies |
Link |
Internet Technology |
Lecture 21 - PERL - Part-I |
Link |
Internet Technology |
Lecture 22 - PERL - Part II |
Link |
Internet Technology |
Lecture 23 - PERL - Part III |
Link |
Internet Technology |
Lecture 24 - PERL - Part IV |
Link |
Internet Technology |
Lecture 25 - Javascript : Part-I |
Link |
Internet Technology |
Lecture 26 - Javascript Examples (Continued) |
Link |
Internet Technology |
Lecture 27 - Using Cookies |
Link |
Internet Technology |
Lecture 28 - Java Applets : Part-I |
Link |
Internet Technology |
Lecture 29 - Java Applets : Part-II |
Link |
Internet Technology |
Lecture 30 - Client-Server Programming In Java |
Link |
Internet Technology |
Lecture 31 - Intranet, Extranet, Firewall |
Link |
Internet Technology |
Lecture 32 - Basic Cryptographic Concepts Part - I |
Link |
Internet Technology |
Lecture 33 - Basic Cryptographic Concepts Part - II |
Link |
Internet Technology |
Lecture 34 - Basic Cryptographic Concepts Part - III |
Link |
Internet Technology |
Lecture 35 - Electronic Commerce |
Link |
Internet Technology |
Lecture 36 - Streaming Multimedia Applications |
Link |
Internet Technology |
Lecture 37 - Internet Telephony |
Link |
Internet Technology |
Lecture 38 - Search Engine And Web Crawlers : Part-I |
Link |
Internet Technology |
Lecture 39 - Search Engine And Web Crawlers : Part-II |
Link |
Internet Technology |
Lecture 40 - Course Summary And Conclusion |
Link |
Programming and Data Structure |
Lecture 1 - Introduction |
Link |
Programming and Data Structure |
Lecture 2 - C Programming - I |
Link |
Programming and Data Structure |
Lecture 3 - C Programming - II |
Link |
Programming and Data Structure |
Lecture 4 - C Programming - III |
Link |
Programming and Data Structure |
Lecture 5 - Data Structuring : Case Study - I |
Link |
Programming and Data Structure |
Lecture 6 - Data Structuring : Case Study - II |
Link |
Programming and Data Structure |
Lecture 7 - Data Structuring : Case Study - III |
Link |
Programming and Data Structure |
Lecture 8 - Problem Decomposition By Recursion - I |
Link |
Programming and Data Structure |
Lecture 9 - Problem Decomposition By Recursion - II |
Link |
Programming and Data Structure |
Lecture 10 - Problem Decomposition By Recursion - III |
Link |
Programming and Data Structure |
Lecture 11 - Merge sort And Quick sort |
Link |
Programming and Data Structure |
Lecture 12 - Characters And Strings |
Link |
Programming and Data Structure |
Lecture 13 - Arrays: Addresses And Contents |
Link |
Programming and Data Structure |
Lecture 14 - Structures - I |
Link |
Programming and Data Structure |
Lecture 15 - Structures - II |
Link |
Programming and Data Structure |
Lecture 16 - Dynamic Allocation Part - I |
Link |
Programming and Data Structure |
Lecture 17 - Linked Lists - I |
Link |
Programming and Data Structure |
Lecture 18 - Complexity (Efficiency) of Algorithms |
Link |
Programming and Data Structure |
Lecture 19 - Asymptotic Growth Functions |
Link |
Programming and Data Structure |
Lecture 20 - Asymptotic Analysis of Algorithms |
Link |
Programming and Data Structure |
Lecture 21 - Data Structuring |
Link |
Programming and Data Structure |
Lecture 22 - Search Trees |
Link |
Programming and Data Structure |
Lecture 23 - Search Trees - II |
Link |
Programming and Data Structure |
Lecture 24 - Search Trees - III |
Link |
Programming and Data Structure |
Lecture 25 - 2-3 Trees |
Link |
Programming and Data Structure |
Lecture 26 - Algorithm Design - I |
Link |
Programming and Data Structure |
Lecture 27 - Algorithm Design - II |
Link |
Programming and Data Structure |
Lecture 28 - Algorithm Design - III |
Link |
Programming and Data Structure |
Lecture 29 - Graphs - I |
Link |
Programming and Data Structure |
Lecture 30 - Graphs - II |
Link |
Programming and Data Structure |
Lecture 31 - Graphs - III |
Link |
Programming and Data Structure |
Lecture 32 - Conclusions |
Link |
NOC:Software Testing |
Lecture 1 - Introduction |
Link |
NOC:Software Testing |
Lecture 2 - Levels of Testing |
Link |
NOC:Software Testing |
Lecture 3 - Basic Concepts in Testing |
Link |
NOC:Software Testing |
Lecture 4 - Basic Concepts in Testing (Continued...) |
Link |
NOC:Software Testing |
Lecture 5 - Unit Testing |
Link |
NOC:Software Testing |
Lecture 6 - Equivalence and BV Testing |
Link |
NOC:Software Testing |
Lecture 7 - Special Value Testing |
Link |
NOC:Software Testing |
Lecture 8 - Combinatorial Testing |
Link |
NOC:Software Testing |
Lecture 9 - Pairwise Testing |
Link |
NOC:Software Testing |
Lecture 10 - White Box Testing |
Link |
NOC:Software Testing |
Lecture 11 - MC/DC Testing |
Link |
NOC:Software Testing |
Lecture 12 - MC/DC Testing (Continued...) |
Link |
NOC:Software Testing |
Lecture 13 - Path Testing |
Link |
NOC:Software Testing |
Lecture 14 - Dataflow and Mutation Testing |
Link |
NOC:Software Testing |
Lecture 15 - Mutation Testing |
Link |
NOC:Software Testing |
Lecture 16 - Integration Testing |
Link |
NOC:Software Testing |
Lecture 17 - System Testing |
Link |
NOC:Software Testing |
Lecture 18 - Regression Testing |
Link |
NOC:Software Testing |
Lecture 19 - Testing Object-Oriented Program - Part 1 |
Link |
NOC:Software Testing |
Lecture 20 - Testing Object-Oriented Program - Part 2 |
Link |
NOC:Programming in C++ |
Lecture 1 - Module 1 : Recap of C |
Link |
NOC:Programming in C++ |
Lecture 2 - Module 1 : Recap of C |
Link |
NOC:Programming in C++ |
Lecture 3 - Module 1 : Recap of C |
Link |
NOC:Programming in C++ |
Lecture 4 - Module 2 : Programs with IO and Loop |
Link |
NOC:Programming in C++ |
Lecture 5 - Module 3 : Arrays and Strings |
Link |
NOC:Programming in C++ |
Lecture 6 - Module 4 : Sorting and Searching |
Link |
NOC:Programming in C++ |
Lecture 7 - Module 5 : Stack and its Applications |
Link |
NOC:Programming in C++ |
Lecture 8 - Module 6 : Constants and Inline Functions |
Link |
NOC:Programming in C++ |
Lecture 9 - Module 6 : Constants and Inline Functions (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 10 - Module 7 : Reference and Pointer |
Link |
NOC:Programming in C++ |
Lecture 11 - Module 7 : Reference and Pointer (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 12 - Module 8 : Default Parameters and Function Overloading |
Link |
NOC:Programming in C++ |
Lecture 13 - Module 8 : Default Parameters and Function Overloading (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 14 - Module 8 : Default Parameters and Function Overloading (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 15 - Module 9 : Operator Overloading |
Link |
NOC:Programming in C++ |
Lecture 16 - Module 9 : Operator Overloading (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 17 - Module 10 : Dynamic Memory Management |
Link |
NOC:Programming in C++ |
Lecture 18 - Module 10 : Dynamic Memory Management (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 19 - Module 11 : Classes and Objects |
Link |
NOC:Programming in C++ |
Lecture 20 - Module 11 : Classes and Objects (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 21 - Module 12 : Access Specifiers |
Link |
NOC:Programming in C++ |
Lecture 22 - Module 12 : Access Specifiers (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 23 - Module 13 : Constructors, Destructors and Object Lifetime |
Link |
NOC:Programming in C++ |
Lecture 24 - Module 13 : Constructors, Destructors and Object Lifetime (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 25 - Module 13 : Constructors, Destructors and Object Lifetime (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 26 - Module 14 : Copy Constructor and Copy Assignment Operator |
Link |
NOC:Programming in C++ |
Lecture 27 - Module 14 : Copy Constructor and Copy Assignment Operator (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 28 - Module 14 : Copy Constructor and Copy Assignment Operator (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 29 - Module 15 : Const-ness |
Link |
NOC:Programming in C++ |
Lecture 30 - Module 15 : Const-ness (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 31 - Module 16 : Static Members |
Link |
NOC:Programming in C++ |
Lecture 32 - Module 17 : friend Function and friend Class |
Link |
NOC:Programming in C++ |
Lecture 33 - Module 18 : Overloading Operator for User Defined Types - Part I |
Link |
NOC:Programming in C++ |
Lecture 34 - Module 19 : Overloading Operator for User Defined Types - Part II |
Link |
NOC:Programming in C++ |
Lecture 35 - Module 20 : Namespace |
Link |
NOC:Programming in C++ |
Lecture 36 - Module 21 : Inheirtnace - Part I |
Link |
NOC:Programming in C++ |
Lecture 37 - Module 22 : Inheritance - Part II |
Link |
NOC:Programming in C++ |
Lecture 38 - Module 23 : Inheritance - Part III |
Link |
NOC:Programming in C++ |
Lecture 39 - Module 24 : Inheritance - Part IV |
Link |
NOC:Programming in C++ |
Lecture 40 - Module 25 : Inheritance - Part V |
Link |
NOC:Programming in C++ |
Lecture 41 - Module 26 : Dynamic Binding - Part I |
Link |
NOC:Programming in C++ |
Lecture 42 - Module 27 : Dynamic Binding (Polymorphism) - Part II |
Link |
NOC:Programming in C++ |
Lecture 43 - Module 28 : Dynamic Binding (Polymorphism) - Part III |
Link |
NOC:Programming in C++ |
Lecture 44 - Module 29 : Dynamic Binding (Polymorphism) - Part IV |
Link |
NOC:Programming in C++ |
Lecture 45 - Module 30 : Dynamic Binding (Polymorphism) - Part V |
Link |
NOC:Programming in C++ |
Lecture 46 - Module 31 : Virtual Function Table |
Link |
NOC:Programming in C++ |
Lecture 47 - Module 32 : Type casting and cast operators - Part I |
Link |
NOC:Programming in C++ |
Lecture 48 - Module 33 : Type casting and cast operators - Part II |
Link |
NOC:Programming in C++ |
Lecture 49 - Module 34 : Type casting and cast operators - Part III |
Link |
NOC:Programming in C++ |
Lecture 50 - Module 35 : Multiple Inheritance |
Link |
NOC:Programming in C++ |
Lecture 51 - Module 35 : Multiple Inheritance (Continued...) |
Link |
NOC:Programming in C++ |
Lecture 52 - Module 36 : Exceptions (Error Handling in C) - Part I |
Link |
NOC:Programming in C++ |
Lecture 53 - Module 37 : Exceptions (Error Handling in C) - Part II |
Link |
NOC:Programming in C++ |
Lecture 54 - Module 38 : Template (Function Template) - Part I |
Link |
NOC:Programming in C++ |
Lecture 55 - Module 39 : Template (Function Template) - Part II |
Link |
NOC:Programming in C++ |
Lecture 56 - Module 40 : Closing Comments |
Link |
NOC:Introduction to Machine Learning |
Lecture 1 - Introduction |
Link |
NOC:Introduction to Machine Learning |
Lecture 2 - Different Types of Learning |
Link |
NOC:Introduction to Machine Learning |
Lecture 3 - Hypothesis Space and Inductive Bias |
Link |
NOC:Introduction to Machine Learning |
Lecture 4 - Evaluation and Cross-Validation |
Link |
NOC:Introduction to Machine Learning |
Lecture 5 - Tutorial - I |
Link |
NOC:Introduction to Machine Learning |
Lecture 6 - Linear Regression |
Link |
NOC:Introduction to Machine Learning |
Lecture 7 - Introduction to Decision Trees |
Link |
NOC:Introduction to Machine Learning |
Lecture 8 - Learning Decision Tree |
Link |
NOC:Introduction to Machine Learning |
Lecture 9 - Overfitting |
Link |
NOC:Introduction to Machine Learning |
Lecture 10 - Python Exercise on Decision Tree and Linear Regression |
Link |
NOC:Introduction to Machine Learning |
Lecture 11 - Tutorial - II |
Link |
NOC:Introduction to Machine Learning |
Lecture 12 - k-Nearest Neighbour |
Link |
NOC:Introduction to Machine Learning |
Lecture 13 - Feature Selection |
Link |
NOC:Introduction to Machine Learning |
Lecture 14 - Feature Extraction |
Link |
NOC:Introduction to Machine Learning |
Lecture 15 - Collaborative Filtering |
Link |
NOC:Introduction to Machine Learning |
Lecture 16 - Python Exercise on kNN and PCA |
Link |
NOC:Introduction to Machine Learning |
Lecture 17 - Tutorial - III |
Link |
NOC:Introduction to Machine Learning |
Lecture 18 - Bayesian Learning |
Link |
NOC:Introduction to Machine Learning |
Lecture 19 - Naive Bayes |
Link |
NOC:Introduction to Machine Learning |
Lecture 20 - Bayesian Network |
Link |
NOC:Introduction to Machine Learning |
Lecture 21 - Python Exercise on Naive Bayes |
Link |
NOC:Introduction to Machine Learning |
Lecture 22 - Tutorial - IV |
Link |
NOC:Introduction to Machine Learning |
Lecture 23 - Logistic Regression |
Link |
NOC:Introduction to Machine Learning |
Lecture 24 - Introduction Support Vector Machine |
Link |
NOC:Introduction to Machine Learning |
Lecture 25 - SVM : The Dual Formulation |
Link |
NOC:Introduction to Machine Learning |
Lecture 26 - SVM : Maximum Margin with Noise |
Link |
NOC:Introduction to Machine Learning |
Lecture 27 - Nonlinear SVM and Kennel Function |
Link |
NOC:Introduction to Machine Learning |
Lecture 28 - SVM : Solution to the Dual Problem |
Link |
NOC:Introduction to Machine Learning |
Lecture 29 - Python Exercise on SVM |
Link |
NOC:Introduction to Machine Learning |
Lecture 30 - Introduction |
Link |
NOC:Introduction to Machine Learning |
Lecture 31 - Multilayer Neural Network |
Link |
NOC:Introduction to Machine Learning |
Lecture 32 - Neural Network and Backpropagation Algorithm |
Link |
NOC:Introduction to Machine Learning |
Lecture 33 - Deep Neural Network |
Link |
NOC:Introduction to Machine Learning |
Lecture 34 - Python Exercise on Neural Network |
Link |
NOC:Introduction to Machine Learning |
Lecture 35 - Tutorial - VI |
Link |
NOC:Introduction to Machine Learning |
Lecture 36 - Introduction to Computational Learning Theory |
Link |
NOC:Introduction to Machine Learning |
Lecture 37 - Sample Complexity : Finite Hypothesis Space |
Link |
NOC:Introduction to Machine Learning |
Lecture 38 - VC Dimension |
Link |
NOC:Introduction to Machine Learning |
Lecture 39 - Introduction to Ensembles |
Link |
NOC:Introduction to Machine Learning |
Lecture 40 - Bagging and Boosting |
Link |
NOC:Introduction to Machine Learning |
Lecture 41 - Introduction to Clustering |
Link |
NOC:Introduction to Machine Learning |
Lecture 42 - Kmeans Clustering |
Link |
NOC:Introduction to Machine Learning |
Lecture 43 - Agglomerative Hierarchical Clustering |
Link |
NOC:Introduction to Machine Learning |
Lecture 44 - Python Exercise on kmeans clustering |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 1 - Challanges in Software Engineering |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 2 - Complexity of Software |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 3 - Complexity of Software (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 4 - Structure and Attributes of a Complex System |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 5 - Structure and Attributes of a Complex System (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 6 - Object-Oriented Analysis and Design |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 7 - Bringing Order to Chaos |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 8 - Bringing Order to Chaos (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 9 - Evolution of Object Models - Programming Languages and Paradigms |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 10 - Foundations of the Object Model - OOA, OOD and OOP |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 11 - Foundations of the Object Model - OOA, OOD and OOP (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 12 - Elements of Object Model (Major) : Abstraction and Encapsulation |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 13 - Elements of Object Model (Major) : Abstraction and Encapsulation (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 14 - Elements of the Object Model (Major) : Modularity and Hierarchy |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 15 - Elements of the Object Model (Major) : Modularity and Hierarchy (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 16 - Elements of the Object Model (Minor) : Typing, Concurrency and Persistence |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 17 - Elements of the Object Model (Minor) : Typing, Concurrency and Persistence (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 18 - Nature of an object : State, Behavior and Identity |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 19 - Nature of an object : State, Behavior and Identity (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 20 - Relationships among objects |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 21 - Relationships among objects (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 22 - Nature of a class : Interface and Implementation |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 23 - Nature of a class : Interface and Implementation (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 24 - Relationships among classes |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 25 - Relationships among classes (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 26 - How to Build Quality Classes and Objects |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 27 - Tutorial : LMS |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 28 - How to Identify Classes and Objects ? |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 29 - Identification of Classes, Objects and Relationship in LMS |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 30 - Identification of Classes, Objects and Relationship in LMS (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 31 - Identification of Classes, Objects and Relationship in LMS (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 32 - Identification of Classes, Objects and Relationship in LMS (Continued...) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 33 - Overview of UML |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 34 - SDLC Phases and UML Diagrams |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 35 - Use-Case Diagrams - Part I |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 36 - Use-Case Diagrams - Part II |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 37 - Use-Case Diagrams - Part III |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 38 - Class Diagrams - Part 1 (Class, Property and Operation) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 39 - Class Diagrams - Part 2 (Association, Weak and Strong Aggregation) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 40 - Class Diagrams - Part 3 (Generalization, Dependency and Constraints) |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 41 - Sequence Diagrams - Part 1 |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 42 - Sequence Diagrams - Part 2 |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 43 - Communication Diagram |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 44 - Activity Diagrams - Part II |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 45 - Activity Diagrams - Part II |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 46 - Activity Diagrams - Part III |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 47 - Interaction Overview Diagram |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 48 - State Machine Diagrams - Part I |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 49 - State Machine Diagrams - Part II |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 50 - State Machine Diagrams - Part III |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 51 - Various UML Diagrams |
Link |
NOC:Object-Oriented Analysis and Design |
Lecture 52 - Closing Comments |
Link |
NOC:Complex Network : Theory and Application |
Lecture 1 - Introduction |
Link |
NOC:Complex Network : Theory and Application |
Lecture 2 - Network Analysis - I |
Link |
NOC:Complex Network : Theory and Application |
Lecture 3 - Network Analysis - II |
Link |
NOC:Complex Network : Theory and Application |
Lecture 4 - Network Analysis - III |
Link |
NOC:Complex Network : Theory and Application |
Lecture 5 - Network Analysis - IV |
Link |
NOC:Complex Network : Theory and Application |
Lecture 6 - Network Analysis - V |
Link |
NOC:Complex Network : Theory and Application |
Lecture 7 - Network Analysis - VI |
Link |
NOC:Complex Network : Theory and Application |
Lecture 8 - Social Network Principles - I |
Link |
NOC:Complex Network : Theory and Application |
Lecture 9 - Social Network Principles - II |
Link |
NOC:Complex Network : Theory and Application |
Lecture 10 - Social Network Principles - III |
Link |
NOC:Complex Network : Theory and Application |
Lecture 11 - Social Network Principles - IV |
Link |
NOC:Complex Network : Theory and Application |
Lecture 12 - Community Analysis - I |
Link |
NOC:Complex Network : Theory and Application |
Lecture 13 - Community Analysis - II |
Link |
NOC:Complex Network : Theory and Application |
Lecture 14 - Community Analysis - III |
Link |
NOC:Complex Network : Theory and Application |
Lecture 15 - Community Analysis - IV |
Link |
NOC:Complex Network : Theory and Application |
Lecture 16 - Community Analysis - V |
Link |
NOC:Complex Network : Theory and Application |
Lecture 17 - Community Analysis - VI |
Link |
NOC:Complex Network : Theory and Application |
Lecture 18 - Citation Analysis - I |
Link |
NOC:Complex Network : Theory and Application |
Lecture 19 - Citation Analysis - II |
Link |
NOC:Complex Network : Theory and Application |
Lecture 20 - Citation Analysis - III |
Link |
NOC:Complex Network : Theory and Application |
Lecture 21 - Citation Analysis - IV |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 1 - Insertion Sort and Asymptotic Analysis |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 2 - Solving Recurrences |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 3 - Divide and Conquer Paradigm |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 4 - Quick Sort |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 5 - Heap Sort |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 6 - Decision Tree |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 7 - Linear Time Sorting |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 8 - Order Statistics |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 9 - Hashing |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 10 - Universal Hashing, BST Sort |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 11 - Red-Black Tree |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 12 - Augmenting Data Structure |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 13 - Computational Geometry |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 14 - Van Emde Boas Data Structure |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 15 - Dynamic Programming |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 16 - Graph Algorithm |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 17 - BFS and DFS |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 18 - Dijkstra |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 19 - Bellman Ford |
Link |
Fundamental Algorithms:Design and Analysis |
Lecture 20 - Floyd Marshall |
Link |
NOC:Natural Language Processing |
Lecture 1 - Introduction to the Course |
Link |
NOC:Natural Language Processing |
Lecture 2 - What Do We Do in NLP |
Link |
NOC:Natural Language Processing |
Lecture 3 - Why is NLP hard |
Link |
NOC:Natural Language Processing |
Lecture 4 - Empirical Laws |
Link |
NOC:Natural Language Processing |
Lecture 5 - Text Processing: Basics |
Link |
NOC:Natural Language Processing |
Lecture 6 - Spelling Correction: Edit Distance |
Link |
NOC:Natural Language Processing |
Lecture 7 - Weighted Edit Distance, Other Variations |
Link |
NOC:Natural Language Processing |
Lecture 8 - Noisy Channel Model for Spelling Correction |
Link |
NOC:Natural Language Processing |
Lecture 9 - N-Gram Language Models |
Link |
NOC:Natural Language Processing |
Lecture 10 - Evaluation of Language Models, Basic Smoothing |
Link |
NOC:Natural Language Processing |
Lecture 11 - Tutorial I |
Link |
NOC:Natural Language Processing |
Lecture 12 - Language Modeling: Advanced Smoothing Models |
Link |
NOC:Natural Language Processing |
Lecture 13 - Computational Morphology |
Link |
NOC:Natural Language Processing |
Lecture 14 - Finite - State Methods for Morphology |
Link |
NOC:Natural Language Processing |
Lecture 15 - Introduction to POS Tagging |
Link |
NOC:Natural Language Processing |
Lecture 16 - Hidden Markov Models for POS Tagging |
Link |
NOC:Natural Language Processing |
Lecture 17 - Viterbi Decoding for HMM, Parameter Learning |
Link |
NOC:Natural Language Processing |
Lecture 18 - Baum Welch Algorithm |
Link |
NOC:Natural Language Processing |
Lecture 19 - Maximum Entropy Models - I |
Link |
NOC:Natural Language Processing |
Lecture 20 - Maximum Entropy Models - II |
Link |
NOC:Natural Language Processing |
Lecture 21 - Conditional Random Fields |
Link |
NOC:Natural Language Processing |
Lecture 22 - Syntax - Introduction |
Link |
NOC:Natural Language Processing |
Lecture 23 - Syntax - Parsing I |
Link |
NOC:Natural Language Processing |
Lecture 24 - Syntax - CKY, PCFGs |
Link |
NOC:Natural Language Processing |
Lecture 25 - PCFGs - Inside-Outside Probabilities |
Link |
NOC:Natural Language Processing |
Lecture 26 - Inside-Outside Probabilities |
Link |
NOC:Natural Language Processing |
Lecture 27 - Dependency Grammars and Parsing - Introduction |
Link |
NOC:Natural Language Processing |
Lecture 28 - Transition Based Parsing : Formulation |
Link |
NOC:Natural Language Processing |
Lecture 29 - Transition Based Parsing : Learning |
Link |
NOC:Natural Language Processing |
Lecture 30 - MST-Based Dependency Parsing |
Link |
NOC:Natural Language Processing |
Lecture 31 - MST-Based Dependency Parsing : Learning |
Link |
NOC:Natural Language Processing |
Lecture 32 - Distributional Semantics - Introduction |
Link |
NOC:Natural Language Processing |
Lecture 33 - Distributional Models of Semantics |
Link |
NOC:Natural Language Processing |
Lecture 34 - Distributional Semantics : Applications, Structured Models |
Link |
NOC:Natural Language Processing |
Lecture 35 - Word Embeddings - Part I |
Link |
NOC:Natural Language Processing |
Lecture 36 - Word Embeddings - Part II |
Link |
NOC:Natural Language Processing |
Lecture 37 - Lexical Semantics |
Link |
NOC:Natural Language Processing |
Lecture 38 - Lexical Semantics - Wordnet |
Link |
NOC:Natural Language Processing |
Lecture 39 - Word Sense Disambiguation - I |
Link |
NOC:Natural Language Processing |
Lecture 40 - Word Sense Disambiguation - II |
Link |
NOC:Natural Language Processing |
Lecture 41 - Novel Word Sense detection |
Link |
NOC:Natural Language Processing |
Lecture 42 - Topic Models : Introduction |
Link |
NOC:Natural Language Processing |
Lecture 43 - Latent Dirichlet Allocation : Formulation |
Link |
NOC:Natural Language Processing |
Lecture 44 - Gibbs Sampling for LDA, Applications |
Link |
NOC:Natural Language Processing |
Lecture 45 - LDA Variants and Applications - I |
Link |
NOC:Natural Language Processing |
Lecture 46 - LDA Variants and Applications - II |
Link |
NOC:Natural Language Processing |
Lecture 47 - Entity Linking - I |
Link |
NOC:Natural Language Processing |
Lecture 48 - Entity Linking - II |
Link |
NOC:Natural Language Processing |
Lecture 49 - Information Extraction - Introduction |
Link |
NOC:Natural Language Processing |
Lecture 50 - Relation Extraction |
Link |
NOC:Natural Language Processing |
Lecture 51 - Distant Supervision |
Link |
NOC:Natural Language Processing |
Lecture 52 - Text Summarization - LEXRANK |
Link |
NOC:Natural Language Processing |
Lecture 53 - Optimization based Approaches for Summarization |
Link |
NOC:Natural Language Processing |
Lecture 54 - Summarization Evaluation |
Link |
NOC:Natural Language Processing |
Lecture 55 - Text Classification - I |
Link |
NOC:Natural Language Processing |
Lecture 56 - Text Classification - II |
Link |
NOC:Natural Language Processing |
Lecture 57 - Tutorial II |
Link |
NOC:Natural Language Processing |
Lecture 58 - Tutorial III |
Link |
NOC:Natural Language Processing |
Lecture 59 - Tutorial IV |
Link |
NOC:Natural Language Processing |
Lecture 60 - Tutorial V |
Link |
NOC:Natural Language Processing |
Lecture 61 - Sentiment Analysis - Introduction |
Link |
NOC:Natural Language Processing |
Lecture 62 - Sentiment Analysis - Affective Lexicons |
Link |
NOC:Natural Language Processing |
Lecture 63 - Learning Affective Lexicons |
Link |
NOC:Natural Language Processing |
Lecture 64 - Computing with Affective Lexicons |
Link |
NOC:Natural Language Processing |
Lecture 65 - Aspect - Based Sentiment Analysis |
Link |
NOC:Embedded Systems Design |
Lecture 1 - Introduction |
Link |
NOC:Embedded Systems Design |
Lecture 2 - Processors |
Link |
NOC:Embedded Systems Design |
Lecture 3 - General Purpose and ASIPs Processor |
Link |
NOC:Embedded Systems Design |
Lecture 4 - Designing a Single Purpose Processor |
Link |
NOC:Embedded Systems Design |
Lecture 5 - Optimization Issues |
Link |
NOC:Embedded Systems Design |
Lecture 6 - Introduction to FPFA |
Link |
NOC:Embedded Systems Design |
Lecture 7 - FPGA (Continued...) |
Link |
NOC:Embedded Systems Design |
Lecture 8 - Behaviour Synthesis on FPGA using VHDL |
Link |
NOC:Embedded Systems Design |
Lecture 9 - Tutorial - I |
Link |
NOC:Embedded Systems Design |
Lecture 10 - Tutorial - II |
Link |
NOC:Embedded Systems Design |
Lecture 11 - Tutorial - III |
Link |
NOC:Embedded Systems Design |
Lecture 12 - Tutorial - IV |
Link |
NOC:Embedded Systems Design |
Lecture 13 - Sensors and Signals |
Link |
NOC:Embedded Systems Design |
Lecture 14 - Discretization of Signals and A/D Converter |
Link |
NOC:Embedded Systems Design |
Lecture 15 - Quantization Noise, SNR and D/A Converter |
Link |
NOC:Embedded Systems Design |
Lecture 16 - Arduino Uno |
Link |
NOC:Embedded Systems Design |
Lecture 17 - Arduino Uno (Continued...), Serial Communication and Timer |
Link |
NOC:Embedded Systems Design |
Lecture 18 - Controller Design using Arduino |
Link |
NOC:Embedded Systems Design |
Lecture 19 - Tutorial - V |
Link |
NOC:Embedded Systems Design |
Lecture 20 - Power Aware Embedded System - I |
Link |
NOC:Embedded Systems Design |
Lecture 21 - Power Aware Embedded System - II |
Link |
NOC:Embedded Systems Design |
Lecture 22 - SD and DD Algorithm |
Link |
NOC:Embedded Systems Design |
Lecture 23 - Parallel Operations and VLIW |
Link |
NOC:Embedded Systems Design |
Lecture 24 - Code Efficiency |
Link |
NOC:Embedded Systems Design |
Lecture 25 - DSP Application and Address Generation Unit |
Link |
NOC:Embedded Systems Design |
Lecture 26 - Real Time O.S - I |
Link |
NOC:Embedded Systems Design |
Lecture 27 - Real Time O.S - II |
Link |
NOC:Embedded Systems Design |
Lecture 28 - RMS Algorithm |
Link |
NOC:Embedded Systems Design |
Lecture 29 - EDF Algorithm and Resource Constraint Issue |
Link |
NOC:Embedded Systems Design |
Lecture 30 - Priority Inversion and Priority Inheritance Protocol |
Link |
NOC:Embedded Systems Design |
Lecture 31 - Modeling and Specification - I |
Link |
NOC:Embedded Systems Design |
Lecture 32 - Modeling and Specification - II |
Link |
NOC:Embedded Systems Design |
Lecture 33 - FSM and Statechart |
Link |
NOC:Embedded Systems Design |
Lecture 34 - Statechart and Statemate Semantics |
Link |
NOC:Embedded Systems Design |
Lecture 35 - Statecharts (Continued...) |
Link |
NOC:Embedded Systems Design |
Lecture 36 - Program State Machines |
Link |
NOC:Embedded Systems Design |
Lecture 37 - SDL |
Link |
NOC:Embedded Systems Design |
Lecture 38 - Data Flow Model - I |
Link |
NOC:Embedded Systems Design |
Lecture 39 - Data Flow Model - II |
Link |
NOC:Embedded Systems Design |
Lecture 40 - Hardware Synthesis - I |
Link |
NOC:Embedded Systems Design |
Lecture 41 - Hardware Synthesis - II |
Link |
NOC:Embedded Systems Design |
Lecture 42 - Scheduling |
Link |
NOC:Embedded Systems Design |
Lecture 43 - Digital Camera Design |
Link |
NOC:Embedded Systems Design |
Lecture 44 - Digital Camera - Iterative Design |
Link |
NOC:Embedded Systems Design |
Lecture 45 - HW-SW Partitioning |
Link |
NOC:Embedded Systems Design |
Lecture 46 - Optimization - I |
Link |
NOC:Embedded Systems Design |
Lecture 47 - Optimization - II |
Link |
NOC:Embedded Systems Design |
Lecture 48 - Simulation |
Link |
NOC:Embedded Systems Design |
Lecture 49 - Formal Verification |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 1 - Introduction: Wireless Ad Hoc Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 2 - Introduction: Wireless Ad Hoc Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 3 - Self-organizing Behaviour of Wireless Ad Hoc Networks |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 4 - Cooperation in Mobile Ad Hoc Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 5 - Cooperation in Mobile Ad Hoc Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 6 - MAC Protocols in MANETs - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 7 - MAC Protocols in MANETs - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 8 - Routing in MANETs - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 9 - Routing in MANETs - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 10 - Routing in MANETs - Part-III |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 11 - Multicasting in MANETs |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 12 - Mobility Models for MANETs |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 13 - Transport Protocols for MANETs - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 14 - Transport Protocols for MANETs - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 15 - Opportunistic Mobile Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 16 - Opportunistic Mobile Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 17 - Opportunistic Mobile Networks - Part-III |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 18 - UAV Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 19 - UAV Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 20 - UAV Networks - Part-III |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 21 - Introduction: Wireless Sensor Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 22 - Introduction: Wireless Sensor Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 23 - WSN Coverage and Placement - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 24 - Topology Mangement in Wireless Sensor Network |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 25 - Mobile Wireless Sensor Networks |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 26 - Mobile Wireless Sensor Networks |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 27 - Medium Access Control in Wireless Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 28 - Medium Access Control in Wireless Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 29 - Routing in Wireless Sensor Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 30 - Routing in Wireless Sensor Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 31 - Congestion and Flow Control - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 32 - Congestion and Flow Control - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 33 - Underwater Sensor Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 34 - Underwater Sensor Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 35 - Underwater Sensor Networks - Part-III |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 36 - Underwater Sensor Networks - Part-IV |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 37 - Security of Wireless Sensor Networks - Part-I |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 38 - Security of Wireless Sensor Networks - Part-II |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 39 - Hardware Design of Sensor Node |
Link |
NOC:Wireless Ad Hoc and Sensor Networks |
Lecture 40 - Real Life Deployment of WSN |
Link |
NOC:VLSI Physical Design |
Lecture 1 - Introduction |
Link |
NOC:VLSI Physical Design |
Lecture 2 - Design Representation |
Link |
NOC:VLSI Physical Design |
Lecture 3 - VLSI Design Styles - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 4 - VLSI Design Styles - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 5 - VLSI Physical Design Automation - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 6 - VLSI Physical Design Automation - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 7 - Partitioning |
Link |
NOC:VLSI Physical Design |
Lecture 8 - Floor planning |
Link |
NOC:VLSI Physical Design |
Lecture 9 - Floor planning Algorithms |
Link |
NOC:VLSI Physical Design |
Lecture 10 - Pin Assignment |
Link |
NOC:VLSI Physical Design |
Lecture 11 - Placement - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 12 - Placement - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 13 - Placement - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 14 - Placement - Part 4 |
Link |
NOC:VLSI Physical Design |
Lecture 15 - Grid Routing - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 16 - Grid Routing - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 17 - Grid Routing - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 18 - Global Routing - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 19 - Global Routing - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 20 - Detailed Routing - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 21 - Detailed Routing - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 22 - Detailed Routing - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 23 - Detailed Routing - Part 4 |
Link |
NOC:VLSI Physical Design |
Lecture 24 - Clock Design - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 25 - Clock Design - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 26 - Clock Design - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 27 - Clock Network Synthesis - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 28 - Clock Network Synthesis - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 29 - Clock Network Synthesis - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 30 - Clock Network Synthesis - Part 4 |
Link |
NOC:VLSI Physical Design |
Lecture 31 - Power and Ground Routing |
Link |
NOC:VLSI Physical Design |
Lecture 32 - Time Closure - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 33 - Time Closure - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 34 - Time Closure - Part 3 |
Link |
NOC:VLSI Physical Design |
Lecture 35 - Time Closure - Part 4 |
Link |
NOC:VLSI Physical Design |
Lecture 36 - Time Closure - Part 5 |
Link |
NOC:VLSI Physical Design |
Lecture 37 - Timing Driven Placement |
Link |
NOC:VLSI Physical Design |
Lecture 38 - Timing Driven Routing |
Link |
NOC:VLSI Physical Design |
Lecture 39 - Physical Synthesis - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 40 - Physical Synthesis - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 41 - Performance-Driven Design Flow |
Link |
NOC:VLSI Physical Design |
Lecture 42 - Miscellaneous Approaches to Timing Optimization |
Link |
NOC:VLSI Physical Design |
Lecture 43 - Interconnect Modeling - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 44 - Interconnect Modeling - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 45 - Design Rule Check |
Link |
NOC:VLSI Physical Design |
Lecture 46 - Layout Compaction - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 47 - Layout Compaction - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 48 |
Link |
NOC:VLSI Physical Design |
Lecture 49 |
Link |
NOC:VLSI Physical Design |
Lecture 50 |
Link |
NOC:VLSI Physical Design |
Lecture 51 |
Link |
NOC:VLSI Physical Design |
Lecture 52 |
Link |
NOC:VLSI Physical Design |
Lecture 53 - Test Pattern Generation |
Link |
NOC:VLSI Physical Design |
Lecture 54 - Design for Testability |
Link |
NOC:VLSI Physical Design |
Lecture 55 - Boundary Scan Standard |
Link |
NOC:VLSI Physical Design |
Lecture 56 - Built-in Self-Test - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 57 - Built-in Self-Test - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 58 - Low Power VLSI Design |
Link |
NOC:VLSI Physical Design |
Lecture 59 - Techniques to Reduce Power |
Link |
NOC:VLSI Physical Design |
Lecture 60 - Gate Level Design for Low Power - Part 1 |
Link |
NOC:VLSI Physical Design |
Lecture 61 - Gate Level Design for Low Power - Part 2 |
Link |
NOC:VLSI Physical Design |
Lecture 62 - Other Low Power Design Techniques |
Link |
NOC:VLSI Physical Design |
Lecture 63 - Algorithmic Level Techniques for Low Power Design |
Link |
NOC:VLSI Physical Design |
Lecture 64 - Summarization of the Course |
Link |
NOC:Cryptography And Network Security |
Lecture 1 - Introduction to Cryptography |
Link |
NOC:Cryptography And Network Security |
Lecture 2 - Classical Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 3 - Cryptanalysis on Substitution Cipher (Frequency Analysis) |
Link |
NOC:Cryptography And Network Security |
Lecture 4 - Play Fair Cipher |
Link |
NOC:Cryptography And Network Security |
Lecture 5 - Block Cipher |
Link |
NOC:Cryptography And Network Security |
Lecture 6 - Data Encryption Standard (DES) |
Link |
NOC:Cryptography And Network Security |
Lecture 7 - DES (Continued...) |
Link |
NOC:Cryptography And Network Security |
Lecture 8 - Triple DES and Modes of Operation |
Link |
NOC:Cryptography And Network Security |
Lecture 9 - Stream Cipher |
Link |
NOC:Cryptography And Network Security |
Lecture 10 - Pseudorandom Sequence |
Link |
NOC:Cryptography And Network Security |
Lecture 11 - LFSR Based StreamCipher |
Link |
NOC:Cryptography And Network Security |
Lecture 12 - Mathematical Background |
Link |
NOC:Cryptography And Network Security |
Lecture 13 - Abstract Algebra (Continued...) |
Link |
NOC:Cryptography And Network Security |
Lecture 14 - Number Theory |
Link |
NOC:Cryptography And Network Security |
Lecture 15 - Number Theory (Continued...) |
Link |
NOC:Cryptography And Network Security |
Lecture 16 - Modular Inverse |
Link |
NOC:Cryptography And Network Security |
Lecture 17 - Extended Euclidean Algorithm |
Link |
NOC:Cryptography And Network Security |
Lecture 18 - Fermat's Little Theorem, Euler Phi-Function |
Link |
NOC:Cryptography And Network Security |
Lecture 19 - Euler's theorem, Quadratic Residue |
Link |
NOC:Cryptography And Network Security |
Lecture 20 - Polynomial Arithmetic |
Link |
NOC:Cryptography And Network Security |
Lecture 21 - Advanced Encryption Standard (AES) |
Link |
NOC:Cryptography And Network Security |
Lecture 22 - Advanced Encryption Standard (AES) (Continued...) |
Link |
NOC:Cryptography And Network Security |
Lecture 23 - Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange |
Link |
NOC:Cryptography And Network Security |
Lecture 24 - Knapsack Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 25 - RSA Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 26 - More on RSA |
Link |
NOC:Cryptography And Network Security |
Lecture 27 - Primarily Testing |
Link |
NOC:Cryptography And Network Security |
Lecture 28 - ElGamal Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 29 - Elliptic Curve over the Reals |
Link |
NOC:Cryptography And Network Security |
Lecture 30 - Elliptic curve Modulo a Prime |
Link |
NOC:Cryptography And Network Security |
Lecture 31 - Generalised ElGamal Public Key Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 32 - Chinese Remainder Theorem |
Link |
NOC:Cryptography And Network Security |
Lecture 33 - Rabin Cryptosystem |
Link |
NOC:Cryptography And Network Security |
Lecture 34 - Legendre and Jacobi Symbol |
Link |
NOC:Cryptography And Network Security |
Lecture 35 - Jacobi Symbol (Continued...) |
Link |
NOC:Cryptography And Network Security |
Lecture 36 - Message Authentication |
Link |
NOC:Cryptography And Network Security |
Lecture 37 - Digital Signature |
Link |
NOC:Cryptography And Network Security |
Lecture 38 - Key Management |
Link |
NOC:Cryptography And Network Security |
Lecture 39 - Key Exchange |
Link |
NOC:Cryptography And Network Security |
Lecture 40 - Hash Function |
Link |
NOC:Cryptography And Network Security |
Lecture 41 - Universal Hashing |
Link |
NOC:Cryptography And Network Security |
Lecture 42 - Cryptographic Hash Function |
Link |
NOC:Cryptography And Network Security |
Lecture 43 - Secure Hash Algorithm (SHA) |
Link |
NOC:Cryptography And Network Security |
Lecture 44 - Digital Signature Standard (DSS) |
Link |
NOC:Cryptography And Network Security |
Lecture 45 - More on Key Exchange Protocol |
Link |
NOC:Cryptography And Network Security |
Lecture 46 - Cryptoanalisis |
Link |
NOC:Cryptography And Network Security |
Lecture 47 - Memory Trade off Attack |
Link |
NOC:Cryptography And Network Security |
Lecture 48 - Differential Cryptoanalysis |
Link |
NOC:Cryptography And Network Security |
Lecture 49 - More on Differential Cryptoanalysis |
Link |
NOC:Cryptography And Network Security |
Lecture 50 - Linear Cryptoanalysis |
Link |
NOC:Cryptography And Network Security |
Lecture 51 - Cryptoanalysis and Stream Cipher |
Link |
NOC:Cryptography And Network Security |
Lecture 52 - Modern Stream Cipher |
Link |
NOC:Cryptography And Network Security |
Lecture 53 - Shamir Secret Sharing |
Link |
NOC:Cryptography And Network Security |
Lecture 54 - Identity Based Eneryption (IBE) |
Link |
NOC:Cryptography And Network Security |
Lecture 55 - Attribute Based Encryption |
Link |
NOC:Cryptography And Network Security |
Lecture 56 - Functional Encryption (Introduction) |
Link |
NOC:Cryptography And Network Security |
Lecture 57 - Discrete Logarithm Problem (DLP) |
Link |
NOC:Cryptography And Network Security |
Lecture 58 - Implementation Attacks |
Link |
NOC:Cryptography And Network Security |
Lecture 59 - The Secure Sockets layer (SSL) |
Link |
NOC:Cryptography And Network Security |
Lecture 60 - Pretty Good Privacy (PGP) |
Link |
NOC:Computer Architecture and Organization |
Lecture 1 - Evolution of Computer Systems |
Link |
NOC:Computer Architecture and Organization |
Lecture 2 - Basic Operation of a Computer |
Link |
NOC:Computer Architecture and Organization |
Lecture 3 - Memory Addressing and Languages |
Link |
NOC:Computer Architecture and Organization |
Lecture 4 - Software and Architecture Types |
Link |
NOC:Computer Architecture and Organization |
Lecture 5 - Instruction Set Architecture |
Link |
NOC:Computer Architecture and Organization |
Lecture 6 - Number Representation |
Link |
NOC:Computer Architecture and Organization |
Lecture 7 - Instruction Format and Addressing Modes |
Link |
NOC:Computer Architecture and Organization |
Lecture 8 - CISC and RISC Architecture |
Link |
NOC:Computer Architecture and Organization |
Lecture 9 - MIPS32 Instruction Set |
Link |
NOC:Computer Architecture and Organization |
Lecture 10 - MIPS Programming Examples |
Link |
NOC:Computer Architecture and Organization |
Lecture 11 - Spim – A Mips32 Simulator |
Link |
NOC:Computer Architecture and Organization |
Lecture 12 - Measuring Cpu Performance |
Link |
NOC:Computer Architecture and Organization |
Lecture 13 - Choice Of Benchmarks |
Link |
NOC:Computer Architecture and Organization |
Lecture 14 - Summarizing Performance Results |
Link |
NOC:Computer Architecture and Organization |
Lecture 15 - Amadahl’s Law - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 16 - Amadahl’s Law - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 17 - Design Of Control Unit - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 18 - Design Of Control Unit - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 19 - Design Of Control Unit - Part 3 |
Link |
NOC:Computer Architecture and Organization |
Lecture 20 - Design Of Control Unit - Part 4 |
Link |
NOC:Computer Architecture and Organization |
Lecture 21 - Mips Implementation - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 22 - Mips Implementation - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 23 - Processor Memory Interaction |
Link |
NOC:Computer Architecture and Organization |
Lecture 24 - Static And Dynamic Ram |
Link |
NOC:Computer Architecture and Organization |
Lecture 25 - Asynchronous Dram |
Link |
NOC:Computer Architecture and Organization |
Lecture 26 - Synchronous Dram |
Link |
NOC:Computer Architecture and Organization |
Lecture 27 - Memory Interfacing And Addressing |
Link |
NOC:Computer Architecture and Organization |
Lecture 28 - Memory Hierarchy Design - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 29 - Memory Hierarchy Design - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 30 - Cache Memory - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 31 - Cache Memory - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 32 - Improving Cache Performance |
Link |
NOC:Computer Architecture and Organization |
Lecture 33 - Design Of Adders - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 34 - Design Of Adders - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 35 - Design Of Multipliers - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 36 - Design Of Multipliers - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 37 - Design Of Dividers |
Link |
NOC:Computer Architecture and Organization |
Lecture 38 - Floating-Point Numbers |
Link |
NOC:Computer Architecture and Organization |
Lecture 39 - Floating-Point Arithmetic |
Link |
NOC:Computer Architecture and Organization |
Lecture 40 - Basic Pipelining Concepts |
Link |
NOC:Computer Architecture and Organization |
Lecture 41 - Pipeline Scheduling |
Link |
NOC:Computer Architecture and Organization |
Lecture 42 - Arithmetic Pipeline |
Link |
NOC:Computer Architecture and Organization |
Lecture 43 - Secondary Storage Devices |
Link |
NOC:Computer Architecture and Organization |
Lecture 44 - Input-Output Organization |
Link |
NOC:Computer Architecture and Organization |
Lecture 45 - Data Transfer Techniques |
Link |
NOC:Computer Architecture and Organization |
Lecture 46 - Interrupt Handling - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 47 - Interrupt Handling - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 48 - Direct Memory Access |
Link |
NOC:Computer Architecture and Organization |
Lecture 49 - Some Example Device Interfacing |
Link |
NOC:Computer Architecture and Organization |
Lecture 50 - Exercises On I/O Transfer |
Link |
NOC:Computer Architecture and Organization |
Lecture 51 - Bus Standards |
Link |
NOC:Computer Architecture and Organization |
Lecture 52 - Bus Standards |
Link |
NOC:Computer Architecture and Organization |
Lecture 53 - Pipelining The Mips32 Data Path |
Link |
NOC:Computer Architecture and Organization |
Lecture 54 - Mips Pipeline (Continued... |
Link |
NOC:Computer Architecture and Organization |
Lecture 55 - Pipeline Hazards - Part 1 |
Link |
NOC:Computer Architecture and Organization |
Lecture 56 - Pipeline Hazards - Part 2 |
Link |
NOC:Computer Architecture and Organization |
Lecture 57 - Pipeline Hazards - Part 3 |
Link |
NOC:Computer Architecture and Organization |
Lecture 58 - Pipeline Hazards - Part 4 |
Link |
NOC:Computer Architecture and Organization |
Lecture 59 - Multicycle Operations In Mips32 |
Link |
NOC:Computer Architecture and Organization |
Lecture 60 - Exploiting Instruction Level Parallelism |
Link |
NOC:Computer Architecture and Organization |
Lecture 61 - Vector Processors |
Link |
NOC:Computer Architecture and Organization |
Lecture 62 - Multi-Core Processors |
Link |
NOC:Computer Architecture and Organization |
Lecture 63 - Some Case Studies |
Link |
NOC:Computer Architecture and Organization |
Lecture 64 - Summarization Of The Course |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 1 - Insertion sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 2 - Analysis of Insertion Sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 3 - Asymptotic Analysis |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 4 - Recurrence of Merge Sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 5 - Substitution Method |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 6 - The Master Method |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 7 - Divide-and-Conquer |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 8 - Divide-and-Conquer (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 9 - Straseen's Algorithms |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 10 - QuickSort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 11 - Analysis of Quicksort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 12 - Randomized Quicksort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 13 - Heap |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 14 - Heap Sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 15 - Decision Tree |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 16 - Linear time Sorting |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 17 - Radix Sort and Bucket Sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 18 - Order Statistics |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 19 - Randomised Order Statistics |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 20 - Worst case linear time order statistics |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 21 - Hash Function |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 22 - Open Addressing |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 23 - Universal Hashing |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 24 - Perfect Hashing |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 25 - Binary Search Tree (BST) Sort |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 26 - Randomly build BST |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 27 - Red Black Tree |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 28 - Red Black Tree (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 29 - Augmentation of data structure |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 30 - Interval trees |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 31 - Fixed universe successor |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 32 - Van Emde Boas data structure |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 33 - Amortized analysis |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 34 - Computational Geometry |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 35 - Computational Geometry (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 36 - Dynamic Programming |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 37 - Longest common subsequence |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 38 - Graphs |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 39 - Prim's Algorithms |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 40 - Graph Search |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 41 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 42 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 43 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 44 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 45 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 46 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 47 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 48 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 49 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 50 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 51 |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 52 - Union-Find |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 53 - Augmented disjoint set data structure |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 54 - Network flow |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 55 - Network Flow (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 56 - Network Flow (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 57 - More on Dynamic Programming |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 58 - More on Dynamic Programming (Continued...) |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 59 - Computational Complexity |
Link |
NOC:Introduction to Algorithms and Analysis |
Lecture 60 - Computational Complexity (Continued...) |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 3 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 4 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 5 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 6 - Verilog Language Features - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 7 - Verilog Language Features - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 8 - Verilog Language Features - Part 3 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 9 - Verilog Operators |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 10 - Verilog Modeling Examples |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 11 - Verilog Modeling Examples (Continued...) |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 12 - Verilog Description Styles |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 13 - Procedural Assignment |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 14 - Procedural Assignment (Continued...) |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 15 - Procedural Assignment (Examples) |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 16 - Blocking / Non-Blocking Assignments - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 17 - Blocking / Non-Blocking Assignments - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 18 - Blocking / Non-Blocking Assignments - Part 3 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 19 - Blocking / Non-Blocking Assignments - Part 4 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 20 - User Defined Primitives |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 21 - Verilog Test Bench |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 22 - Writing Verilog Test Benches |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 23 - Modeling Finite State Machines |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 24 - Modeling Finite State Machines (Continued...) |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 25 - Datapath And Controller Design - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 26 - Datapath And Controller Design - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 27 - Datapath And Controller Design - Part 3 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 28 - Synthesizable Verilog |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 29 - Some Recommended Practices |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 30 - Modeling Memory |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 31 - Modeling Register Banks |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 32 - Basic Pipelining Concepts |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 33 - Pipeline Modeling - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 34 - Pipeline Modeling - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 35 - Switch Level Modeling - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 36 - Switch Level Modeling - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 37 - Pipeline Implementation Of A Processor - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 38 - Pipeline Implementation Of A Processor - Part 2 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 39 - Pipeline Implementation Of A Processor - Part 3 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 40 - Verilog Modeling Of The Processor - Part 1 |
Link |
NOC:Hardware Modeling using Verilog |
Lecture 41 - Verilog Modeling Of The Processor - Part 2 |
Link |
NOC:Introduction to Internet of Things |
Lecture 1 - Introduction to IoT- Part I |
Link |
NOC:Introduction to Internet of Things |
Lecture 2 - Introduction to IoT- Part II |
Link |
NOC:Introduction to Internet of Things |
Lecture 3 - Sensing |
Link |
NOC:Introduction to Internet of Things |
Lecture 4 - Actuation |
Link |
NOC:Introduction to Internet of Things |
Lecture 5 - Basics of IoT Networking - Part I |
Link |
NOC:Introduction to Internet of Things |
Lecture 6 - Basics of IoT Networking - Part II |
Link |
NOC:Introduction to Internet of Things |
Lecture 7 - Basics of IoT Networking - Part III |
Link |
NOC:Introduction to Internet of Things |
Lecture 8 - Basics of IoT Networking - Part IV |
Link |
NOC:Introduction to Internet of Things |
Lecture 9 - Connectivity Technologies - Part I |
Link |
NOC:Introduction to Internet of Things |
Lecture 10 - Connectivity Technologies - Part II |
Link |
NOC:Introduction to Internet of Things |
Lecture 11 - Connectivity Technologies - Part III |
Link |
NOC:Introduction to Internet of Things |
Lecture 12 - Connectivity Technologies - Part IV |
Link |
NOC:Introduction to Internet of Things |
Lecture 13 - Connectivity Technologies - Part V |
Link |
NOC:Introduction to Internet of Things |
Lecture 14 - Sensor Networks - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 15 - Sensor Networks - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 16 - Sensor Networks - III |
Link |
NOC:Introduction to Internet of Things |
Lecture 17 - Sensor Networks - IV |
Link |
NOC:Introduction to Internet of Things |
Lecture 18 - Sensor Networks - V |
Link |
NOC:Introduction to Internet of Things |
Lecture 19 - UAV Networks |
Link |
NOC:Introduction to Internet of Things |
Lecture 20 - Machine to Machine Communication |
Link |
NOC:Introduction to Internet of Things |
Lecture 21 - Interoperability in Internet of Things |
Link |
NOC:Introduction to Internet of Things |
Lecture 22 - Introduction to Arduino - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 23 - Introduction to Arduino - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 24 - Integration of Sensor and Actuators with Arduino - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 25 - Integration of Sensor and Actuators with Arduino - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 26 - Introduction to Python Programming - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 27 - Introduction to Python Programming - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 28 - Introduction to Raspberry Pi - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 29 - Introduction to Raspberry Pi - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 30 - Implementation of IoT with Raspberry Pi - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 31 - Implementation of IoT with Raspberry Pi - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 32 - Implementation of IoT with Raspberry Pi - III |
Link |
NOC:Introduction to Internet of Things |
Lecture 33 - Software Defined Networking - Part I |
Link |
NOC:Introduction to Internet of Things |
Lecture 34 - Software Defined Networking - Part II |
Link |
NOC:Introduction to Internet of Things |
Lecture 35 - Software Defined IoT Networking - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 36 - Software Defined IoT Networking - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 37 - Cloud Computing-Fundamental |
Link |
NOC:Introduction to Internet of Things |
Lecture 38 - Cloud Computing-Service Model |
Link |
NOC:Introduction to Internet of Things |
Lecture 39 - Cloud Computing-Service Management and Security |
Link |
NOC:Introduction to Internet of Things |
Lecture 40 - Cloud Computing - Case Studies |
Link |
NOC:Introduction to Internet of Things |
Lecture 41 - Cloud Computing - Practical |
Link |
NOC:Introduction to Internet of Things |
Lecture 42 - Sensor-Cloud - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 43 - Sensor-Cloud - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 44 - Fog Computing - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 45 - Fog Computing - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 46 - Smart Cities and Smart Homes - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 47 - Smart Cities and Smart Homes - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 48 - Smart Cities and Smart Homes - III |
Link |
NOC:Introduction to Internet of Things |
Lecture 49 - Connected Vehicles - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 50 - Connected Vehicles - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 51 - Smart Grid - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 52 - Smart Grid - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 53 - Industrial Internet of Things - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 54 - Industrial Internet of Things - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 55 - Data Handling and Analytics - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 56 - Data Handling and Analytics - II |
Link |
NOC:Introduction to Internet of Things |
Lecture 57 - Case Study: Agriculture |
Link |
NOC:Introduction to Internet of Things |
Lecture 58 - Case Study: Healthcare |
Link |
NOC:Introduction to Internet of Things |
Lecture 59 - Case Study: Activity Monitoring - I |
Link |
NOC:Introduction to Internet of Things |
Lecture 60 - Case Study: Activity Monitoring - II |
Link |
NOC:Cloud Computing |
Lecture 1 - Cloud Computing Overview |
Link |
NOC:Cloud Computing |
Lecture 2 - Cloud Computing Overview (Continued...) |
Link |
NOC:Cloud Computing |
Lecture 3 - Cloud Computing - Introduction |
Link |
NOC:Cloud Computing |
Lecture 4 - Cloud Computing Architecture |
Link |
NOC:Cloud Computing |
Lecture 5 - Cloud Computing Architecture (Continued...) |
Link |
NOC:Cloud Computing |
Lecture 6 - Cloud Computing Architecture - Deployment Models |
Link |
NOC:Cloud Computing |
Lecture 7 - Cloud Computing Virtualization |
Link |
NOC:Cloud Computing |
Lecture 8 - Cloud Computing XML Basics |
Link |
NOC:Cloud Computing |
Lecture 9 - Cloud Computing XML Basics - II |
Link |
NOC:Cloud Computing |
Lecture 10 - Cloud Computing Web Services, Service Oriented Architecture |
Link |
NOC:Cloud Computing |
Lecture 11 - Service Level Agreement |
Link |
NOC:Cloud Computing |
Lecture 12 - Cloud Economics |
Link |
NOC:Cloud Computing |
Lecture 13 - Managing Data |
Link |
NOC:Cloud Computing |
Lecture 14 - Introduction to MapReduce |
Link |
NOC:Cloud Computing |
Lecture 15 - Open Stack |
Link |
NOC:Cloud Computing |
Lecture 16 - Cloud Computing - Opensource Cloud - Openstack Demo |
Link |
NOC:Cloud Computing |
Lecture 17 - Cloud Computing Case Study with a commercial Cloud - Microsoft Azure |
Link |
NOC:Cloud Computing |
Lecture 18 - Cloud Computing Demo - Microsoft Azure |
Link |
NOC:Cloud Computing |
Lecture 19 - Cloud Computing Case Study - Google Cloud Platform (GCP) |
Link |
NOC:Cloud Computing |
Lecture 20 - Cloud Computing Demo - Google Cloud Platform (GCP) |
Link |
NOC:Cloud Computing |
Lecture 21 - SLA-Tutorial |
Link |
NOC:Cloud Computing |
Lecture 22 - Cloudonomics-Tutorial |
Link |
NOC:Cloud Computing |
Lecture 23 - MapReduce-Tutorial |
Link |
NOC:Cloud Computing |
Lecture 24 - Resource Management - I |
Link |
NOC:Cloud Computing |
Lecture 25 - Resource Management - II |
Link |
NOC:Cloud Computing |
Lecture 26 - Cloud Computing: Security - I |
Link |
NOC:Cloud Computing |
Lecture 27 - Cloud Computing: Security - II |
Link |
NOC:Cloud Computing |
Lecture 28 - Cloud Computing: Security - III |
Link |
NOC:Cloud Computing |
Lecture 29 - Cloud Computing: Security Issues in Collaborative SaaS Cloud |
Link |
NOC:Cloud Computing |
Lecture 30 - Cloud Computing: Broker for Cloud Marketplace |
Link |
NOC:Cloud Computing |
Lecture 31 - Mobile Cloud Computing - I |
Link |
NOC:Cloud Computing |
Lecture 32 - Mobile Cloud Computing - II |
Link |
NOC:Cloud Computing |
Lecture 33 - Fog Computing - I |
Link |
NOC:Cloud Computing |
Lecture 34 - Fog Computing - II |
Link |
NOC:Cloud Computing |
Lecture 35 - Use Case-Geo-spatial Cloud |
Link |
NOC:Cloud Computing |
Lecture 36 - Introduction to DOCKER Container |
Link |
NOC:Cloud Computing |
Lecture 37 - Green Cloud |
Link |
NOC:Cloud Computing |
Lecture 38 - Sensor Cloud Computing |
Link |
NOC:Cloud Computing |
Lecture 39 - IoT Cloud |
Link |
NOC:Cloud Computing |
Lecture 40 - Course Summary and Research Areas |
Link |
NOC:Cloud Computing |
Lecture 41 - Cloud-Fog Computing - Overview |
Link |
NOC:Cloud Computing |
Lecture 42 - Resource Management - I |
Link |
NOC:Cloud Computing |
Lecture 43 - Resource Management - II |
Link |
NOC:Cloud Computing |
Lecture 44 - Cloud Federation |
Link |
NOC:Cloud Computing |
Lecture 45 - VM Migration - Basics Migration strategies |
Link |
NOC:Cloud Computing |
Lecture 46 - VM Migration - Basics Migration strategies |
Link |
NOC:Cloud Computing |
Lecture 47 - Containers Container based Virtualization Kubernetes Docker Container |
Link |
NOC:Cloud Computing |
Lecture 48 - Docker Container - Overview Docker - Components Docker - Architecture |
Link |
NOC:Cloud Computing |
Lecture 49 - Docker Container - Demo |
Link |
NOC:Cloud Computing |
Lecture 50 - Docker Container - Demo |
Link |
NOC:Cloud Computing |
Lecture 51 - Dew Computing |
Link |
NOC:Cloud Computing |
Lecture 52 - Serverless Computing - I |
Link |
NOC:Cloud Computing |
Lecture 53 - Serverless Computing - II |
Link |
NOC:Cloud Computing |
Lecture 54 - Sustainable Cloud Computing - I |
Link |
NOC:Cloud Computing |
Lecture 55 - Sustainable Cloud Computing - II |
Link |
NOC:Cloud Computing |
Lecture 56 - Cloud Computing in 5G Era |
Link |
NOC:Cloud Computing |
Lecture 57 - CPS and Cloud Computing |
Link |
NOC:Cloud Computing |
Lecture 58 - Case Study I (Spatial Cloud Computing) |
Link |
NOC:Cloud Computing |
Lecture 59 - Case Study II (Internet of Health Things) - Part A |
Link |
NOC:Cloud Computing |
Lecture 60 - Case Study II (Internet of Health Things) - Part B |
Link |
NOC:Problem Solving through Programming in C |
Lecture 1 - Introduction |
Link |
NOC:Problem Solving through Programming in C |
Lecture 2 - Idea of Algorithms |
Link |
NOC:Problem Solving through Programming in C |
Lecture 3 - Flow Chart and Pseudocode |
Link |
NOC:Problem Solving through Programming in C |
Lecture 4 - Introduction to Programming Language Concepts |
Link |
NOC:Problem Solving through Programming in C |
Lecture 5 - Variables and Memory |
Link |
NOC:Problem Solving through Programming in C |
Lecture 6 - Types of Software and Compilers |
Link |
NOC:Problem Solving through Programming in C |
Lecture 7 - Introduction to C Programming Language |
Link |
NOC:Problem Solving through Programming in C |
Lecture 8 - Variables and Variable Types in C |
Link |
NOC:Problem Solving through Programming in C |
Lecture 9 - Introducing Functions |
Link |
NOC:Problem Solving through Programming in C |
Lecture 10 - Address and Content of Variables and Types |
Link |
NOC:Problem Solving through Programming in C |
Lecture 11 - Assignment Statement and Operators in C |
Link |
NOC:Problem Solving through Programming in C |
Lecture 12 - Arithmetic Expressions and Relational Expressions |
Link |
NOC:Problem Solving through Programming in C |
Lecture 13 - Logical Operators and Change in Control Flow |
Link |
NOC:Problem Solving through Programming in C |
Lecture 14 - Use of Logical Operaotrs in Branching |
Link |
NOC:Problem Solving through Programming in C |
Lecture 15 - Branching : IF-ELSE Statement |
Link |
NOC:Problem Solving through Programming in C |
Lecture 16 - IF-ELSE Statement (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 17 - Switch statement |
Link |
NOC:Problem Solving through Programming in C |
Lecture 18 - Switch Statement (Continued...) and Introduction to Loops |
Link |
NOC:Problem Solving through Programming in C |
Lecture 19 - Implementing Repetitions (Loops) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 20 - Implementation of Loops with for Statement (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 21 - For Statement (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 22 - Example of If-Else |
Link |
NOC:Problem Solving through Programming in C |
Lecture 23 - Example of Loops |
Link |
NOC:Problem Solving through Programming in C |
Lecture 24 - Example of Loops (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 25 - Example of Loops (Continued...), Use of FOR Loops |
Link |
NOC:Problem Solving through Programming in C |
Lecture 26 - Introduction to Arrays |
Link |
NOC:Problem Solving through Programming in C |
Lecture 27 - Arrays (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 28 - Arrays (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 29 - Program using Arrays |
Link |
NOC:Problem Solving through Programming in C |
Lecture 30 - Array Problem |
Link |
NOC:Problem Solving through Programming in C |
Lecture 31 - Linear Search |
Link |
NOC:Problem Solving through Programming in C |
Lecture 32 - Character Array and Strings |
Link |
NOC:Problem Solving through Programming in C |
Lecture 33 - String Operations |
Link |
NOC:Problem Solving through Programming in C |
Lecture 34 - 2-D Array Operation |
Link |
NOC:Problem Solving through Programming in C |
Lecture 35 - Introducing Functions |
Link |
NOC:Problem Solving through Programming in C |
Lecture 36 - More on Functions |
Link |
NOC:Problem Solving through Programming in C |
Lecture 37 - Function (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 38 - Scanf and Printf Functions; Function Prototype |
Link |
NOC:Problem Solving through Programming in C |
Lecture 39 - Parameter Passing in Function Revision |
Link |
NOC:Problem Solving through Programming in C |
Lecture 40 - Parameter Passing in Function Revision (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 41 - Substitution of # include and Macro |
Link |
NOC:Problem Solving through Programming in C |
Lecture 42 - search as a function |
Link |
NOC:Problem Solving through Programming in C |
Lecture 43 - Binary Search |
Link |
NOC:Problem Solving through Programming in C |
Lecture 44 - Binary Search (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 45 - Sorting Methods |
Link |
NOC:Problem Solving through Programming in C |
Lecture 46 - Bubble Sort (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 47 - Use of Pointer in Function : Context Bubble Sort |
Link |
NOC:Problem Solving through Programming in C |
Lecture 48 - Arrays at Strings |
Link |
NOC:Problem Solving through Programming in C |
Lecture 49 - Data Representation |
Link |
NOC:Problem Solving through Programming in C |
Lecture 50 - Bisection Method |
Link |
NOC:Problem Solving through Programming in C |
Lecture 51 - Interpolation |
Link |
NOC:Problem Solving through Programming in C |
Lecture 52 - Trapezoidal Rule and Runge-Kutta Method |
Link |
NOC:Problem Solving through Programming in C |
Lecture 53 - Recursion |
Link |
NOC:Problem Solving through Programming in C |
Lecture 54 - Recursion (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 55 - Structure |
Link |
NOC:Problem Solving through Programming in C |
Lecture 56 - Structure (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 57 - Structure with typedef |
Link |
NOC:Problem Solving through Programming in C |
Lecture 58 - Pointer |
Link |
NOC:Problem Solving through Programming in C |
Lecture 59 - Pointer (Continued...) |
Link |
NOC:Problem Solving through Programming in C |
Lecture 60 - Pointer in Structures |
Link |
NOC:Problem Solving through Programming in C |
Lecture 61 - Dynamic Allocation and File |
Link |
NOC:Real Time Operating System |
Lecture 1 - Introduction |
Link |
NOC:Real Time Operating System |
Lecture 2 - Basics of Tast scheduling |
Link |
NOC:Real Time Operating System |
Lecture 3 - Cyclic executives |
Link |
NOC:Real Time Operating System |
Lecture 4 - Cyclic Scheduler |
Link |
NOC:Real Time Operating System |
Lecture 5 - Cyclic Scheduler |
Link |
NOC:Real Time Operating System |
Lecture 6 - Exercises on Frame size Selectoin |
Link |
NOC:Real Time Operating System |
Lecture 7 - Event-driven schedulers |
Link |
NOC:Real Time Operating System |
Lecture 8 - Rate Monotonic Algorithm |
Link |
NOC:Real Time Operating System |
Lecture 9 - RMA Task Schedulability |
Link |
NOC:Real Time Operating System |
Lecture 10 - Rate Monotonic Analysis |
Link |
NOC:Real Time Operating System |
Lecture 11 - RMA Generalizations |
Link |
NOC:Real Time Operating System |
Lecture 12 - Further RMA Generalizations |
Link |
NOC:Real Time Operating System |
Lecture 13 - Resource Sharing among Real-Time Tasks |
Link |
NOC:Real Time Operating System |
Lecture 14 - Solution to Priority Inversion Problem |
Link |
NOC:Real Time Operating System |
Lecture 15 - Highest Locker Protocol |
Link |
NOC:Real Time Operating System |
Lecture 16 - Priority Ceiling Protocol |
Link |
NOC:Real Time Operating System |
Lecture 17 - PCP Priority Inversions |
Link |
NOC:Real Time Operating System |
Lecture 18 - Analysis of PCP priority inversions |
Link |
NOC:Real Time Operating System |
Lecture 19 - Some basic issues in Real-Time Operating Systems |
Link |
NOC:Real Time Operating System |
Lecture 20 - Unix as a Real-Time operating System |
Link |
NOC:Introduction to Soft Computing |
Lecture 1 - Introduction to soft computing |
Link |
NOC:Introduction to Soft Computing |
Lecture 2 - Introduction to Fuzzy Logic |
Link |
NOC:Introduction to Soft Computing |
Lecture 3 - Fuzzy membership functions (Continued...) and Defining Membership functions |
Link |
NOC:Introduction to Soft Computing |
Lecture 4 - Fuzzy operations |
Link |
NOC:Introduction to Soft Computing |
Lecture 5 - Fuzzy relations |
Link |
NOC:Introduction to Soft Computing |
Lecture 6 - Fuzzy Relations (Continued...) and Fuzzy propositions |
Link |
NOC:Introduction to Soft Computing |
Lecture 7 - Fuzzy implications |
Link |
NOC:Introduction to Soft Computing |
Lecture 8 - Fuzzy Inferences |
Link |
NOC:Introduction to Soft Computing |
Lecture 9 - Defuzzification techniques (Part-I) |
Link |
NOC:Introduction to Soft Computing |
Lecture 10 - Defuzzification Techniques (Part-I) (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 11 - Fuzzy logic controller |
Link |
NOC:Introduction to Soft Computing |
Lecture 12 - Fuzzy Logic Controller (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 13 - Fuzzy logic controller (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 14 - Concept of Genetic Algorithm |
Link |
NOC:Introduction to Soft Computing |
Lecture 15 - Concept of Genetic Algorithm (Continued...) and GA Strategies |
Link |
NOC:Introduction to Soft Computing |
Lecture 16 - GA Operator : Encoding schemes |
Link |
NOC:Introduction to Soft Computing |
Lecture 17 - GA operator : encoding scheme (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 18 - GA Operator : Selection |
Link |
NOC:Introduction to Soft Computing |
Lecture 19 - GA Operator : Selection (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 20 - GA Operator : Crossover techniques |
Link |
NOC:Introduction to Soft Computing |
Lecture 21 - GA Operator : Crossover (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 22 - GA Operator : Crossover (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 23 - GA Operator : Mutation and others |
Link |
NOC:Introduction to Soft Computing |
Lecture 24 - Multi-objective optimization problem solving |
Link |
NOC:Introduction to Soft Computing |
Lecture 25 - Multi-objective optimization problem solving (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 26 - Concept of domination |
Link |
NOC:Introduction to Soft Computing |
Lecture 27 - Non-Pareto based approaches to solve MOOPs |
Link |
NOC:Introduction to Soft Computing |
Lecture 28 - Non-Pareto based approaches to solve MOOPs (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 29 - Pareto-Based approaches to solve MOOPs |
Link |
NOC:Introduction to Soft Computing |
Lecture 30 - Pareto-based approaches to solve MOOPs (Continued....) |
Link |
NOC:Introduction to Soft Computing |
Lecture 31 - Pareto-based approach to solve MOOPs |
Link |
NOC:Introduction to Soft Computing |
Lecture 32 - Pareto-based approach to solve MOOPs (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 33 - Pareto-based approach to solve MOOPs (Continued...) |
Link |
NOC:Introduction to Soft Computing |
Lecture 34 - Introduction to Artificial Neural Network |
Link |
NOC:Introduction to Soft Computing |
Lecture 35 - ANN Architectures |
Link |
NOC:Introduction to Soft Computing |
Lecture 36 - Training ANNs |
Link |
NOC:Introduction to Soft Computing |
Lecture 37 - Training ANNs (Continued....) |
Link |
NOC:Introduction to Soft Computing |
Lecture 38 - Training ANNs (Continued....) |
Link |
NOC:Introduction to Soft Computing |
Lecture 39 - Training ANNs (Continued....) |
Link |
NOC:Introduction to Soft Computing |
Lecture 40 - Soft computing tools |
Link |
NOC:Data Mining |
Lecture 1 - Introduction, Knowledge Discovery Process |
Link |
NOC:Data Mining |
Lecture 2 - Data Preprocessing - I |
Link |
NOC:Data Mining |
Lecture 3 - Data Preprocessing - II |
Link |
NOC:Data Mining |
Lecture 4 - Association Rules |
Link |
NOC:Data Mining |
Lecture 5 - Apriori algorithm |
Link |
NOC:Data Mining |
Lecture 6 - Rule generation |
Link |
NOC:Data Mining |
Lecture 7 - Classification |
Link |
NOC:Data Mining |
Lecture 8 - Decision Tree - I |
Link |
NOC:Data Mining |
Lecture 9 - Decision Tree - II |
Link |
NOC:Data Mining |
Lecture 10 - Decision Tree - III |
Link |
NOC:Data Mining |
Lecture 11 - Decision Tree - IV |
Link |
NOC:Data Mining |
Lecture 12 - Bayes Classifier - I |
Link |
NOC:Data Mining |
Lecture 13 - Bayes Classifier - II |
Link |
NOC:Data Mining |
Lecture 14 - Bayes Classifier - III |
Link |
NOC:Data Mining |
Lecture 15 - Bayes Classifier - IV |
Link |
NOC:Data Mining |
Lecture 16 - Bayes Classifier - V |
Link |
NOC:Data Mining |
Lecture 17 - K Nearest Neighbor - I |
Link |
NOC:Data Mining |
Lecture 18 - K Nearest Neighbor - II |
Link |
NOC:Data Mining |
Lecture 19 |
Link |
NOC:Data Mining |
Lecture 20 |
Link |
NOC:Data Mining |
Lecture 21 |
Link |
NOC:Data Mining |
Lecture 22 - Support Vector Machine - I |
Link |
NOC:Data Mining |
Lecture 23 - Support Vector Machine - II |
Link |
NOC:Data Mining |
Lecture 24 - Support Vector Machine - III |
Link |
NOC:Data Mining |
Lecture 25 - Support Vector Machine - IV |
Link |
NOC:Data Mining |
Lecture 26 - Support Vector Machine - V |
Link |
NOC:Data Mining |
Lecture 27 - Kernel Machines |
Link |
NOC:Data Mining |
Lecture 28 - Artificial Neural Networks - I |
Link |
NOC:Data Mining |
Lecture 29 - Artificial Neural Networks - II |
Link |
NOC:Data Mining |
Lecture 30 - Artificial Neural Networks - III |
Link |
NOC:Data Mining |
Lecture 31 - Artificial Neural Networks - IV |
Link |
NOC:Data Mining |
Lecture 32 - Clustering - I |
Link |
NOC:Data Mining |
Lecture 33 - Clustering - II |
Link |
NOC:Data Mining |
Lecture 34 - Clustering - III |
Link |
NOC:Data Mining |
Lecture 35 - Clustering - IV |
Link |
NOC:Data Mining |
Lecture 36 - Clustering - V |
Link |
NOC:Data Mining |
Lecture 37 - Regression - I |
Link |
NOC:Data Mining |
Lecture 38 - Regression - II |
Link |
NOC:Data Mining |
Lecture 39 - Regression - III |
Link |
NOC:Data Mining |
Lecture 40 - Regression - IV |
Link |
NOC:Data Mining |
Lecture 41 - Dimensionality Reduction - I |
Link |
NOC:Data Mining |
Lecture 42 - Dimensionality Reduction - II |
Link |
NOC:Data Mining |
Lecture 43 - Tutorial |
Link |
NOC:Data Mining |
Lecture 44 - Live Session |
Link |
NOC:Data Base Management System |
Lecture 1 - Course Overview |
Link |
NOC:Data Base Management System |
Lecture 2 - Introduction to DBMS/1 |
Link |
NOC:Data Base Management System |
Lecture 3 - Introduction to DBMS/2 |
Link |
NOC:Data Base Management System |
Lecture 4 - Introduction to Relational Model/1 |
Link |
NOC:Data Base Management System |
Lecture 5 - Introduction to Relational Model/2 |
Link |
NOC:Data Base Management System |
Lecture 6 - Introduction to SQL/1 |
Link |
NOC:Data Base Management System |
Lecture 7 - Introduction to SQL/2 |
Link |
NOC:Data Base Management System |
Lecture 8 - Introduction to SQL/3 |
Link |
NOC:Data Base Management System |
Lecture 9 - Intermediate SQL/1 |
Link |
NOC:Data Base Management System |
Lecture 10 - Intermediate SQL/2 |
Link |
NOC:Data Base Management System |
Lecture 11 - Advanced SQL |
Link |
NOC:Data Base Management System |
Lecture 12 - Formal Relational Query Languages |
Link |
NOC:Data Base Management System |
Lecture 13 - Entity-Relationship Model/1 |
Link |
NOC:Data Base Management System |
Lecture 14 - Entity-Relationship Model/2 |
Link |
NOC:Data Base Management System |
Lecture 15 - Entity-Relationship Model/3 |
Link |
NOC:Data Base Management System |
Lecture 16 - Relational Database Design |
Link |
NOC:Data Base Management System |
Lecture 17 - Relational Database Design (Continued...) |
Link |
NOC:Data Base Management System |
Lecture 18 - Relational Database Design/3 |
Link |
NOC:Data Base Management System |
Lecture 19 - Relational Database Design (Continued...) |
Link |
NOC:Data Base Management System |
Lecture 20 - Relational Database Design/5 |
Link |
NOC:Data Base Management System |
Lecture 21 - Application Design and Development/1 |
Link |
NOC:Data Base Management System |
Lecture 22 - Application Design and Development/2 |
Link |
NOC:Data Base Management System |
Lecture 23 - Application Design and Development/3 |
Link |
NOC:Data Base Management System |
Lecture 24 - Storage and File Structure/1: Storage |
Link |
NOC:Data Base Management System |
Lecture 25 - Storage and File Structure/2: File Structure |
Link |
NOC:Data Base Management System |
Lecture 26 - Indexing and Hashing/1 : Indexing/1 |
Link |
NOC:Data Base Management System |
Lecture 27 - Indexing and Hashing/2 : Indexing/2 |
Link |
NOC:Data Base Management System |
Lecture 28 - Indexing and Hashing/3 : Indexing/3 |
Link |
NOC:Data Base Management System |
Lecture 29 - Indexing and Hashing/4 : Hashing |
Link |
NOC:Data Base Management System |
Lecture 30 - Indexing and Hashing/5 : Index Design |
Link |
NOC:Data Base Management System |
Lecture 31 - Transactions/1 |
Link |
NOC:Data Base Management System |
Lecture 32 - Transactions/2 : Serializability |
Link |
NOC:Data Base Management System |
Lecture 33 - Transactions/3 : Recoverability |
Link |
NOC:Data Base Management System |
Lecture 34 - Concurrency Control/1 |
Link |
NOC:Data Base Management System |
Lecture 35 - Concurrency Control/2 |
Link |
NOC:Data Base Management System |
Lecture 36 - Recovery/1 |
Link |
NOC:Data Base Management System |
Lecture 37 - Recovery/2 |
Link |
NOC:Data Base Management System |
Lecture 38 - Query Processing and Optimization/1 : Processing |
Link |
NOC:Data Base Management System |
Lecture 39 - Query Processing and Optimization/2 : Optimization |
Link |
NOC:Data Base Management System |
Lecture 40 - Course Summarization |
Link |
NOC:Data Base Management System |
Lecture 41 - Live Session |
Link |
NOC:Data Base Management System |
Lecture 42 - Live Session - 2 |
Link |
NOC:Software Engineering |
Lecture 1 - Introduction - I |
Link |
NOC:Software Engineering |
Lecture 2 - Introduction - II |
Link |
NOC:Software Engineering |
Lecture 3 - Introduction - III |
Link |
NOC:Software Engineering |
Lecture 4 - Introduction - IV |
Link |
NOC:Software Engineering |
Lecture 5 - Introduction - V |
Link |
NOC:Software Engineering |
Lecture 6 - Life Cycle Model |
Link |
NOC:Software Engineering |
Lecture 7 - Life Cycle Model |
Link |
NOC:Software Engineering |
Lecture 8 - Waterfall Model |
Link |
NOC:Software Engineering |
Lecture 9 - Waterfall Derivatives |
Link |
NOC:Software Engineering |
Lecture 10 - Incremental Model |
Link |
NOC:Software Engineering |
Lecture 11 - Evolutionary Model |
Link |
NOC:Software Engineering |
Lecture 12 - Agile Model |
Link |
NOC:Software Engineering |
Lecture 13 - Extreme Programming and Scrum |
Link |
NOC:Software Engineering |
Lecture 14 - Scrum |
Link |
NOC:Software Engineering |
Lecture 15 - Introduction to requirement specification |
Link |
NOC:Software Engineering |
Lecture 16 - Requirement gathering and analysis |
Link |
NOC:Software Engineering |
Lecture 17 - Functional requirements |
Link |
NOC:Software Engineering |
Lecture 18 - Representation of complex programming logic |
Link |
NOC:Software Engineering |
Lecture 19 - Design Fundamentals |
Link |
NOC:Software Engineering |
Lecture 20 - Modular Design |
Link |
NOC:Software Engineering |
Lecture 21 - Classification of Cohesion |
Link |
NOC:Software Engineering |
Lecture 22 - Classification of Coupling |
Link |
NOC:Software Engineering |
Lecture 23 - Introduction to structured analysis and structured design |
Link |
NOC:Software Engineering |
Lecture 24 - Basics of Data Flow Diagrams (DFD) |
Link |
NOC:Software Engineering |
Lecture 25 - Developing DFD Model |
Link |
NOC:Software Engineering |
Lecture 26 - Examples of DFD Model development |
Link |
NOC:Software Engineering |
Lecture 27 - DFD Model - More Examples |
Link |
NOC:Software Engineering |
Lecture 28 - Essentials of Structure Chart |
Link |
NOC:Software Engineering |
Lecture 29 - Transform Analysis, Transaction Analysis |
Link |
NOC:Software Engineering |
Lecture 30 - Structured Design Examples |
Link |
NOC:Software Engineering |
Lecture 31 - Use Case Modelling |
Link |
NOC:Software Engineering |
Lecture 32 - Factoring Use Cases |
Link |
NOC:Software Engineering |
Lecture 33 - Overview of Class diagram |
Link |
NOC:Software Engineering |
Lecture 34 - Inheritance relationship |
Link |
NOC:Software Engineering |
Lecture 35 - Association relationship |
Link |
NOC:Software Engineering |
Lecture 36 - Aggregation/ Composition and dependency relations |
Link |
NOC:Software Engineering |
Lecture 37 - Interation Modelling |
Link |
NOC:Software Engineering |
Lecture 38 - Development of Sequence diagrams |
Link |
NOC:Software Engineering |
Lecture 39 - State-Machine diagram |
Link |
NOC:Software Engineering |
Lecture 40 - An Object-Oriented design process |
Link |
NOC:Software Engineering |
Lecture 41 - Domain Analysis |
Link |
NOC:Software Engineering |
Lecture 42 - Examples of object-oriented design |
Link |
NOC:Software Engineering |
Lecture 43 - Basic concepts in Testing - I |
Link |
NOC:Software Engineering |
Lecture 44 - Basic concepts in Testing - II |
Link |
NOC:Software Engineering |
Lecture 45 - Basic concepts in Testing - III |
Link |
NOC:Software Engineering |
Lecture 46 - Unit testing strategies - I |
Link |
NOC:Software Engineering |
Lecture 47 - Unit testing strategies - II |
Link |
NOC:Software Engineering |
Lecture 48 - Equivalance Class Testing - I |
Link |
NOC:Software Engineering |
Lecture 49 - Equivalance Class Testing - II |
Link |
NOC:Software Engineering |
Lecture 50 - Special Value Testing |
Link |
NOC:Software Engineering |
Lecture 51 - Combinatorial Testing |
Link |
NOC:Software Engineering |
Lecture 52 - Decision Table Testing |
Link |
NOC:Software Engineering |
Lecture 53 - Cause effect graphing |
Link |
NOC:Software Engineering |
Lecture 54 - Pairwise Testing |
Link |
NOC:Software Engineering |
Lecture 55 - White box Testing |
Link |
NOC:Software Engineering |
Lecture 56 - Condition Testing |
Link |
NOC:Software Engineering |
Lecture 57 - MC/DC Coverage |
Link |
NOC:Software Engineering |
Lecture 58 - MC/DC Testing |
Link |
NOC:Software Engineering |
Lecture 59 - Path Testing |
Link |
NOC:Software Engineering |
Lecture 60 - Dataflow and Mutation Testing |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 1 - Introduction to Computer Networks - A brief history |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 2 - Data Networks - from Circuit Switching Network to Packet Switching Network |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 3 - Network Protocol Stack |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 4 - Services at the Different Layers of the Protocol Stack |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 5 - Application Layer I - Different Protocols at the Application Layer |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 6 - Application Layer II - Domain Name Systems |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 7 - Application Layer III - The Web |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 8 - Application Layer III - Hypertext Transfer Protocol |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 9 - Application Layer III - Internet Mail Transfer |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 10 - Application Layer IV - File Transfer (FTP) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 11 - Transport Layer I - Services |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 12 - Transport Layer II - Connection |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 13 - Transport Layer II - Connection (Continued...) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 14 - Transport Layer IV - Reliability |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 15 - Transport Layer V - Sliding Window Protocols |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 16 - Transport Layer Performance |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 17 - Buffer Management and Congestion Control |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 18 - Transport Layer Primitives |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 19 - Transmission Control Protocol I - Basics |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 20 - Transmission Control Protocol II - Connections |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 21 - Transmission Control Protocol III - Flow Control |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 22 - Transmission Control Protocol IV - Congestion Control |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 23 - User Datagram Protocol |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 24 - Socket Programming - I |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 25 - Socket Programming - II |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 26 - Network Layer I - Introduction |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 27 - IP Addressing (IPv4) I - Classful addressing |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 28 - IP Addressing (IPv4) II - CIDR |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 29 - IP Addressing (IPv4) III - Network Address Translation (NAT) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 30 - IPv6 Addressing |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 31 - Internet QoS - I (What is QoS) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 32 - Internet QoS - II (Basic QoS Architecture) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 33 - Internet QoS - III (Traffic Policing and Traffic Shaping) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 34 - Internet QoS - IV (Traffic Scheduling) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 35 - Internet QoS - V (Integrated and Differentiated Service Architecture) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 36 - IP Routing Table |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 37 - Routing in the Internet I - Intra-domain routing |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 38 - Routing in the Internet II - Routing protocols |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 39 - Routing in the Internet III - Inter-domain Routing |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 40 - Routing in the Internet IV - Border Gateway Protocol |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 41 - IP Routers |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 42 - IP Routers Demo |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 43 - Software Defined Networking - I (Basics) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 44 - Software Defined Networking - II (Open Flow) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 45 - Software Defined Networking - III (Demo) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 46 - Data Link Layer - Overview |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 47 - Data Link Layer - Basic Concepts |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 48 - Data Link Layer - Ethernet |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 49 - Data Link Layer - Ethernet (Continued...) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 50 - Data Link Layer - Flow and Error Control |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 51 - ARP-RAPP-BOOTP-DHCP |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 52 - ARP-RAPP-BOOTP-DHCP (Continued...) |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 53 |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 54 - Wireless LANs |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 55 - Layer 1: Physical Layer |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 56 - Layer 1: Physical Layer - II |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 57 - Layer 1: Physical Layer - III |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 58 - Network Security - Overview |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 59 - Network Security - II |
Link |
NOC:Computer Networks and Internet Protocol |
Lecture 60 - Network Security - III [TCP/IP Security] |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 1 - Introduction to Blockchain - I (Basics) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 2 - Introduction to Blockchain - II (History) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 3 - Introduction to Blockchain - III (Architecture) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 4 - Introduction to Blockchain - IV (Conceptualization) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 5 - Basic Crypto Primitives - I |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 6 - Basic Crypto Primitives - II |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 7 - Bitcoin Basics - I |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 8 - Bitcoin Basics - II |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 9 - Bitcoin Basics - III |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 10 - Distributed Consensus |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 11 - Consensus in Bitcoin - I (The Basics) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 12 - Consensus in Bitcoin - II (PoW and Beyond) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 13 - Consensus in Bitcoin - III (The Miners) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 14 - Permissioned Blockchain - I (Basics) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 15 - Permissioned Blockchain - II (Consensus) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 16 - Permissioned Blockchain - III (RAFT Consensus) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 17 - Permissioned Blockchain - IV (Byzantine General Problem) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 18 - Permissioned Blockchain - V (Practical Byzantine Fault Tolerance) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 19 - Blockchain for Enterprise - Overview |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 20 - Blockchain Components and Concepts |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 21 - Hyperledger Fabric - Transaction Flow |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 22 - Hyperledger Fabric Details |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 23 - Fabric - Membership and Identity Management |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 24 - Hyperledger Fabric Network Setup |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 25 - Fabric Demo on IBM Blockchain Cloud - I |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 26 - Fabric Demo on IBM Blockchain Cloud - II |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 27 - Fabric Demo, deploy from scratch - III |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 28 - Hyperledger Composer - Application Development |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 29 - Hyperledger Composer - Network Administration |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 30 - Blockchain Use Cases |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 31 - Blockchain in Financial Service - I (Payments and Secure Trading) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 32 - Blockchain in Financial Service - II (Compliance and Mortgage) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 33 - Blockchain in Financial Service - III (Financial Trade) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 34 - Revolutionizing Global Trade |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 35 - Blockchain in Supply Chain - I |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 36 - Blockchain in Supply Chain - II |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 37 - Blockchain in Other Industries |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 38 - Blockchain in Government - I (Advantages) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 39 - Blockchain in Government - II (Use Cases) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 40 - Blockchain in Government - III (Digital Identity) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 41 - Blockchain in Government - IV (Hyperledger Indy) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 42 - Blockchain in Government - V (Tax Payments and Land Registry Records) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 43 - Blockchain Security - I (Overview) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 44 - Blockchain Security - II (Membership and Access control in Fabric) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 45 - Blockchain Security - III (Privacy in Fabric) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 46 - Blockchain Security - III (Fabric SideDB) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 47 - Research Aspects - I (Consensus Scalability) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 48 - Research Aspects - II (Bitcoin-NG) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 49 - Research Aspects - III (Collective Signing) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 50 - Research Aspects - IV (Byzcoin) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 51 - Research Aspects - V (Algorand) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 52 - Research Aspects - VI (Cross Fault Tolerance) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 53 - Research Aspects - VII (Secured Multi-Party Computation) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 54 - Blockchain for Science - I (Blockchain for Big Data) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 55 - Blockchain for Science - II (Blockchain and AI) |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 56 - Comparing Ecosystems - Ethereum |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 57 - Comparing Ecosystems - Ethereum development tools and Quorum |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 58 - Comparing Ecosystems - Corda Part 1 |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 59 - Comparing Ecosystems - Corda Part 2 |
Link |
NOC:Blockchain Architecture Design and Use Cases |
Lecture 60 - Concluding the course |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 1 - Introduction |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 2 - Octal and Hexadecimal Number Systems |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 3 - Signed and Unsigned Binary Number Representation |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 4 - Binary Addition and Subtraction |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 5 - BCD and Gray Code Representations |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 6 - Error Detection and Correction |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 7 - Logic Gates |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 8 - Logic Families to Implement Gates |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 9 - Emerging Technologies - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 10 - Emerging Technologies - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 11 - Switching Algebra |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 12 - Algebraic Manipulation |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 13 - Properties of Switching Functions |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 14 - Obtaining Canonical Representations of Functions |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 15 - Functional Completeness |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 16 - Minimization Using Karnaugh Maps - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 17 - Minimization Using Karnaugh Maps - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 18 - Minimization Using Karnaugh Maps - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 19 - Minimization using Tabular Method - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 20 - Minimization using Tabular Method - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 21 - Design of Adders - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 22 - Design of Adders - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 23 - Design of Adders - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 24 - Logic Design - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 25 - Logic Design - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 26 - Logic Design - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 27 - Binary Decision Diagrams - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 28 - Binary Decision Diagrams - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 29 - Logic Design using AND-EXOR Network |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 30 - Threshold Logic and Threshold Gates |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 31 - Latches and Flip-Flops - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 32 - Latches and Flip-Flops - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 33 - Latches and Flip-Flops - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 34 - Clocking and Timing - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 35 - Clocking and Timing - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 36 - Synthesis of Synchronous Sequential Circuits - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 37 - Synthesis of Synchronous Sequential Circuits - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 38 - Synthesis of Synchronous Sequential Circuits - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 39 - Synthesis of Synchronous Sequential Circuits - Part IV |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 40 - Minimization of Finite State Machines - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 41 - Minimization of Finite State Machines - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 42 - Design of Registers - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 43 - Design of Registers - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 44 - Design of Registers - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 45 - Design of Counters - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 46 - Design of Counters - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 47 - Digital-to-Analog Converter - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 48 - Digital-to-Analog Converter - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 49 - Analog-to-Digital Converter - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 50 - Analog-to-Digital Converter - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 51 - Analog-to-Digital Converter - Part III |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 52 - Asynchronous Sequential Circuits - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 53 - Asynchronous Sequential Circuits - Part II |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 54 - Algorithmic State Machine (ASM Chart |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 55 - Testing of Digital Circuits |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 56 - Fault Modeling |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 57 - Test Pattern Generation |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 58 - Design for Testability |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 59 - Built-in Self-Test - Part I |
Link |
NOC:Switching Circuits and Logic Design |
Lecture 60 - Built-in Self-Test - Part II |
Link |
NOC:Scalable Data Science |
Lecture 1 - Background: Introduction |
Link |
NOC:Scalable Data Science |
Lecture 2 - Probability: Concentration inequalities |
Link |
NOC:Scalable Data Science |
Lecture 3 - Linear algebra: PCA, SVD |
Link |
NOC:Scalable Data Science |
Lecture 4 - Optimization: Basics, Convex, GD |
Link |
NOC:Scalable Data Science |
Lecture 5 - Machine Learning: Supervised, generalization, feature learning, clustering. |
Link |
NOC:Scalable Data Science |
Lecture 6 - Memory-efficient data structures: Hash functions, universal / perfect hash families |
Link |
NOC:Scalable Data Science |
Lecture 7 - Bloom filters |
Link |
NOC:Scalable Data Science |
Lecture 8 - Sketches for distinct count |
Link |
NOC:Scalable Data Science |
Lecture 9 - Sketches for distinct count (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 10 - Misra-Gries sketch |
Link |
NOC:Scalable Data Science |
Lecture 11 - Frequent Element: Space Saving and Count Min |
Link |
NOC:Scalable Data Science |
Lecture 12 - Frequent Element: Count Sketch |
Link |
NOC:Scalable Data Science |
Lecture 13 - Near Neighbors |
Link |
NOC:Scalable Data Science |
Lecture 14 - Locality Sensitive Hashing |
Link |
NOC:Scalable Data Science |
Lecture 15 - Building LSH Tables |
Link |
NOC:Scalable Data Science |
Lecture 16 - Approximate near neighbors search: Extensions e.g. multi-probe, b-bit hashing, Data dependent variants |
Link |
NOC:Scalable Data Science |
Lecture 17 - Approximate near neighbors search: Extensions e.g. multi-probe, b-bit hashing, Data dependent variants (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 18 - Approximate near neighbors search: Extensions e.g. multi-probe, b-bit hashing, Data dependent variants (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 19 - Randomized Numerical Linear Algebra: Random projection |
Link |
NOC:Scalable Data Science |
Lecture 20 - Randomized Numerical Linear Algebra: Random projection (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 21 - Randomized Numerical Linear Algebra: a) Matrix multiplication + QB decomposition |
Link |
NOC:Scalable Data Science |
Lecture 22 - Randomized Numerical Linear Algebra: b) CUR+CX |
Link |
NOC:Scalable Data Science |
Lecture 23 - Randomized Numerical Linear Algebra: a) L2 regression using RP |
Link |
NOC:Scalable Data Science |
Lecture 24 - Randomized Numerical Linear Algebra: b) Leverage scores |
Link |
NOC:Scalable Data Science |
Lecture 25 - Randomized Numerical Linear Algebra: c) Hash Kernels + Kitchen Sink |
Link |
NOC:Scalable Data Science |
Lecture 26 - Map-reduce and Hadoop |
Link |
NOC:Scalable Data Science |
Lecture 27 - Hadoop System |
Link |
NOC:Scalable Data Science |
Lecture 28 - Hadoop System (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 29 - Hadoop System (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 30 - Spark |
Link |
NOC:Scalable Data Science |
Lecture 31 - Spark (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 32 - Spark (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 33 - Distributed Machine Learning and Optimization: Introduction |
Link |
NOC:Scalable Data Science |
Lecture 34 - SGD+Proof |
Link |
NOC:Scalable Data Science |
Lecture 35 - SGD+Proof (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 36 - Distributed Machine Learning and Optimization:ADMM + applications |
Link |
NOC:Scalable Data Science |
Lecture 37 - Distributed Machine Learning and Optimization:ADMM + applications (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 38 - Clustering |
Link |
NOC:Scalable Data Science |
Lecture 39 - Clustering (Continued...) |
Link |
NOC:Scalable Data Science |
Lecture 40 - Conclusion |
Link |
NOC:Compiler Design |
Lecture 1 - Introduction |
Link |
NOC:Compiler Design |
Lecture 2 - Introduction (Continued...) |
Link |
NOC:Compiler Design |
Lecture 3 - Introduction (Continued...) |
Link |
NOC:Compiler Design |
Lecture 4 - Introduction (Continued...) |
Link |
NOC:Compiler Design |
Lecture 5 - Introduction (Continued...) |
Link |
NOC:Compiler Design |
Lecture 6 - Introduction (Continued...) |
Link |
NOC:Compiler Design |
Lecture 7 - Lexical Analysis |
Link |
NOC:Compiler Design |
Lecture 8 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 9 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 10 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 11 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 12 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 13 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 14 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 15 - Lexical Analysis (Continued...) |
Link |
NOC:Compiler Design |
Lecture 16 - Parser |
Link |
NOC:Compiler Design |
Lecture 17 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 18 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 19 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 20 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 21 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 22 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 23 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 24 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 25 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 26 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 27 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 28 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 29 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 30 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 31 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 32 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 33 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 34 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 35 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 36 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 37 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 38 - Parser (Continued...) |
Link |
NOC:Compiler Design |
Lecture 39 - Type Checking |
Link |
NOC:Compiler Design |
Lecture 40 - Type Checking (Continued...) |
Link |
NOC:Compiler Design |
Lecture 41 - Type Checking (Continued...) |
Link |
NOC:Compiler Design |
Lecture 42 - Type Checking (Continued...) |
Link |
NOC:Compiler Design |
Lecture 43 - Symbol Table |
Link |
NOC:Compiler Design |
Lecture 44 - Symbol Table (Continued...) |
Link |
NOC:Compiler Design |
Lecture 45 - Symbol Table (Continued...) |
Link |
NOC:Compiler Design |
Lecture 46 - Symbol Table (Continued...) and Runtime Environment |
Link |
NOC:Compiler Design |
Lecture 47 - Runtime Environment |
Link |
NOC:Compiler Design |
Lecture 48 - Runtime Environment (Continued...) |
Link |
NOC:Compiler Design |
Lecture 49 - Runtime Environment (Continued...) |
Link |
NOC:Compiler Design |
Lecture 50 - Intermediate Code Generation |
Link |
NOC:Compiler Design |
Lecture 51 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 52 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 53 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 54 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 55 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 56 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 57 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 58 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 59 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 60 - Intermediate Code Generation (Continued...) |
Link |
NOC:Compiler Design |
Lecture 61 - Intermediate Code Generation (Continued...) |
Link |
NOC:Programming in Java |
Lecture 1 - Introduction |
Link |
NOC:Programming in Java |
Lecture 2 - Java Programming Steps |
Link |
NOC:Programming in Java |
Lecture 3 - Java Tools and Resources |
Link |
NOC:Programming in Java |
Lecture 4 - Demonstration - I |
Link |
NOC:Programming in Java |
Lecture 5 - Java Applet Programming |
Link |
NOC:Programming in Java |
Lecture 6 - Demonstration - II |
Link |
NOC:Programming in Java |
Lecture 7 - Encapsulation |
Link |
NOC:Programming in Java |
Lecture 8 - Demonstration - III |
Link |
NOC:Programming in Java |
Lecture 9 - Java Programming Insights |
Link |
NOC:Programming in Java |
Lecture 10 - Demonstration - IV |
Link |
NOC:Programming in Java |
Lecture 11 - Java Static Scope Rule |
Link |
NOC:Programming in Java |
Lecture 12 - Demonstration - V |
Link |
NOC:Programming in Java |
Lecture 13 - Inheritance |
Link |
NOC:Programming in Java |
Lecture 14 - Demonstration - VI |
Link |
NOC:Programming in Java |
Lecture 15 - Information Hiding |
Link |
NOC:Programming in Java |
Lecture 16 - Demonstration - VII |
Link |
NOC:Programming in Java |
Lecture 17 - Packages - I |
Link |
NOC:Programming in Java |
Lecture 18 - Packages - II |
Link |
NOC:Programming in Java |
Lecture 19 - Demonstration - VIII |
Link |
NOC:Programming in Java |
Lecture 20 - Interface - I |
Link |
NOC:Programming in Java |
Lecture 21 - Interface - II |
Link |
NOC:Programming in Java |
Lecture 22 - Demonstration - IX |
Link |
NOC:Programming in Java |
Lecture 23 - Exception Handling - I |
Link |
NOC:Programming in Java |
Lecture 24 - Exception Handling - II |
Link |
NOC:Programming in Java |
Lecture 25 - Exception Handling - III |
Link |
NOC:Programming in Java |
Lecture 26 - Demonstration - X |
Link |
NOC:Programming in Java |
Lecture 27 - Multithreading - I |
Link |
NOC:Programming in Java |
Lecture 28 - Multithreading - II |
Link |
NOC:Programming in Java |
Lecture 29 - Demonstration - XI |
Link |
NOC:Programming in Java |
Lecture 30 - I-O Stream - I |
Link |
NOC:Programming in Java |
Lecture 31 - I-O Stream - II |
Link |
NOC:Programming in Java |
Lecture 32 - I-O Stream - III |
Link |
NOC:Programming in Java |
Lecture 33 - Demonstration - XII |
Link |
NOC:Programming in Java |
Lecture 34 - Applet Programming - I |
Link |
NOC:Programming in Java |
Lecture 35 - Applet Programming - II |
Link |
NOC:Programming in Java |
Lecture 36 - Applet Programming - III |
Link |
NOC:Programming in Java |
Lecture 37 - Demonstration - XIII |
Link |
NOC:Programming in Java |
Lecture 38 - Demonstration - XIV |
Link |
NOC:Programming in Java |
Lecture 39 - AWT Programming - I |
Link |
NOC:Programming in Java |
Lecture 40 - AWT Programming - II |
Link |
NOC:Programming in Java |
Lecture 41 - Demonstration - XV |
Link |
NOC:Programming in Java |
Lecture 42 - AWT Programming - III |
Link |
NOC:Programming in Java |
Lecture 43 - Swing - I |
Link |
NOC:Programming in Java |
Lecture 44 - Swing - II |
Link |
NOC:Programming in Java |
Lecture 45 - Demonstration - XVI |
Link |
NOC:Programming in Java |
Lecture 46 - Demonstration - XVII |
Link |
NOC:Programming in Java |
Lecture 47 - Demonstration - XVIII |
Link |
NOC:Programming in Java |
Lecture 48 - Networking with Java |
Link |
NOC:Programming in Java |
Lecture 49 - Demonstration - XIX |
Link |
NOC:Programming in Java |
Lecture 50 - JDBC - I |
Link |
NOC:Programming in Java |
Lecture 51 - JDBC - II |
Link |
NOC:Programming in Java |
Lecture 52 - JDBC - III |
Link |
NOC:Programming in Java |
Lecture 53 - Demonstration - XX |
Link |
NOC:Programming in Java |
Lecture 54 - Demonstration - XXI |
Link |
NOC:Programming in Java |
Lecture 55 - Demonstration - XXII |
Link |
NOC:Programming in Java |
Lecture 56 - Case Studies - I |
Link |
NOC:Programming in Java |
Lecture 57 - Case Studies - II |
Link |
NOC:Programming in Java |
Lecture 58 - Case Studies - III |
Link |
NOC:Programming in Java |
Lecture 59 - Case Studies - IV |
Link |
NOC:Programming in Java |
Lecture 60 - Case Studies - V |
Link |
NOC:Discrete Structures |
Lecture 1 - Introduction to Propositional Logic |
Link |
NOC:Discrete Structures |
Lecture 2 - Introduction to Propositional Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 3 - Introduction to Propositional Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 4 - Introduction to Propositional Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 5 - Introduction to Propositional Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 6 - Introduction to Propositional Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 7 - Predicate Logic |
Link |
NOC:Discrete Structures |
Lecture 8 - Predicate Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 9 - Predicate Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 10 - Predicate Logic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 11 - Proof Techniques |
Link |
NOC:Discrete Structures |
Lecture 12 - Proof Techniques (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 13 - Proof Techniques (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 14 - Proof Techniques (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 15 - Proof Techniques (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 16 - Sets and Functions |
Link |
NOC:Discrete Structures |
Lecture 17 - Sets and Functions (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 18 - Sets and Functions (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 19 - Sets and Functions (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 20 - Sets and Functions (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 21 - Relations and their Properties |
Link |
NOC:Discrete Structures |
Lecture 22 - Relations and their Properties (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 23 - Relations and their Properties (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 24 - Relations and their Properties (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 25 - Relations and their Properties (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 26 - Recursion |
Link |
NOC:Discrete Structures |
Lecture 27 - Recursion (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 28 - Recursion (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 29 - Recursion (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 30 - Recursion (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 31 - Recurrence relations |
Link |
NOC:Discrete Structures |
Lecture 32 - Recurrence relations (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 33 - Recurrence relations (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 34 - Recurrence relations (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 35 - Recurrence relations (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 36 - Counting Techniques and Pigeonhole Principle |
Link |
NOC:Discrete Structures |
Lecture 37 - Counting Techniques and Pigeonhole Principle (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 38 - Counting Techniques and Pigeonhole Principle (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 39 - Counting Techniques and Pigeonhole Principle (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 40 - Counting Techniques and Pigeonhole Principle (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 41 - Combinatorics |
Link |
NOC:Discrete Structures |
Lecture 42 - Combinatorics (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 43 - Combinatorics (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 44 - Combinatorics (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 45 - Combinatorics (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 46 - Algebraic Structures |
Link |
NOC:Discrete Structures |
Lecture 47 - Algebraic Structures (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 48 - Algebraic Structures (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 49 - Algebraic Structures (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 50 - Algebraic Structures (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 51 - Ring and Modular Arithmetic |
Link |
NOC:Discrete Structures |
Lecture 52 - Ring and Modular Arithmetic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 53 - Ring and Modular Arithmetic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 54 - Ring and Modular Arithmetic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 55 - Ring and Modular Arithmetic (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 56 - Finite Field and Applications |
Link |
NOC:Discrete Structures |
Lecture 57 - Finite Field and Applications (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 58 - Finite Field and Applications (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 59 - Finite Field and Applications (Continued...) |
Link |
NOC:Discrete Structures |
Lecture 60 - Finite Field and Applications (Continued...) |
Link |
NOC:Embedded System Design with ARM |
Lecture 1 - Introduction To Embedded Systems |
Link |
NOC:Embedded System Design with ARM |
Lecture 2 - Design Considerations of Embedded Systems |
Link |
NOC:Embedded System Design with ARM |
Lecture 3 - Microprocessors and Microcontrollers |
Link |
NOC:Embedded System Design with ARM |
Lecture 4 - Architecture of ARM Microcontroller - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 5 - Architecture of ARM Microcontroller - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 6 - Architecture of ARM Microcontroller - Part 3 |
Link |
NOC:Embedded System Design with ARM |
Lecture 7 - ARM Instruction Set - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 8 - ARM Instruction Set - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 9 - ARM Instruction Set - Part 3 |
Link |
NOC:Embedded System Design with ARM |
Lecture 10 - About the STM32F401 Nucleo Board |
Link |
NOC:Embedded System Design with ARM |
Lecture 11 - PWM and Interrupt on STM32F401 |
Link |
NOC:Embedded System Design with ARM |
Lecture 12 - Digital to Analog Conversion |
Link |
NOC:Embedded System Design with ARM |
Lecture 13 - Analog to Digital Conversion - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 14 - Analog to Digital Conversion - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 15 - Output Devices, Sensors and Actuators - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 16 - Output Devices, Sensors and Actuators - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 17 - Output Devices, Sensors and Actuators - Part 3 |
Link |
NOC:Embedded System Design with ARM |
Lecture 18 - Microcontroller Development Boards |
Link |
NOC:Embedded System Design with ARM |
Lecture 19 - Mbed C Programming Environment |
Link |
NOC:Embedded System Design with ARM |
Lecture 20 - Interfacing With STM32F401 Board |
Link |
NOC:Embedded System Design with ARM |
Lecture 21 - Interfacing With Arduino Uno |
Link |
NOC:Embedded System Design with ARM |
Lecture 22 - Interfacing 7-Segment Led And LCD Displays - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 23 - Interfacing 7-segment LED and LCD Displays - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 24 - Serial Port Terminal Application (Coolterm) |
Link |
NOC:Embedded System Design with ARM |
Lecture 25 - Experiment With Temperature Sensor |
Link |
NOC:Embedded System Design with ARM |
Lecture 26 - Experiment With Ldr Light Sensor - Part 1 |
Link |
NOC:Embedded System Design with ARM |
Lecture 27 - Experiment With Ldr Light Sensor - Part 2 |
Link |
NOC:Embedded System Design with ARM |
Lecture 28 - Experiment With Speaker |
Link |
NOC:Embedded System Design with ARM |
Lecture 29 - Experiment With Microphone |
Link |
NOC:Embedded System Design with ARM |
Lecture 30 - Design Of Control System |
Link |
NOC:Embedded System Design with ARM |
Lecture 31 - Experiments With Relay |
Link |
NOC:Embedded System Design with ARM |
Lecture 32 - Experiments On Speed Control Of Dc Motor |
Link |
NOC:Embedded System Design with ARM |
Lecture 33 - Experiment With Multiple Sensors And Relay |
Link |
NOC:Embedded System Design with ARM |
Lecture 34 - Introduction To Internet Of Things |
Link |
NOC:Embedded System Design with ARM |
Lecture 35 - Gsm And Bluetooth |
Link |
NOC:Embedded System Design with ARM |
Lecture 36 - Design Of A Home Automation System |
Link |
NOC:Embedded System Design with ARM |
Lecture 37 - Design Of A Simple Alarm System Using Touch Sensor |
Link |
NOC:Embedded System Design with ARM |
Lecture 38 - Accelerometer |
Link |
NOC:Embedded System Design with ARM |
Lecture 39 - Experiment Using Accelerometer |
Link |
NOC:Embedded System Design with ARM |
Lecture 40 - Experiment Using Bluetooth |
Link |
NOC:Embedded System Design with ARM |
Lecture 41 - Experiment With Gas Sensor |
Link |
NOC:Embedded System Design with ARM |
Lecture 42 - Summarization Of The Course |
Link |
NOC:Hardware Security |
Lecture 1 - Introduction to Hardware Security - Part 1 |
Link |
NOC:Hardware Security |
Lecture 2 - Introduction to Hardware Security - Part 2 |
Link |
NOC:Hardware Security |
Lecture 3 - Algorithm to Hardware |
Link |
NOC:Hardware Security |
Lecture 4 - Finite Field Architectures - 1 |
Link |
NOC:Hardware Security |
Lecture 5 - Finite Field Architectures - 1 (Continued...) |
Link |
NOC:Hardware Security |
Lecture 6 - Hardware Design for Finite Field Inverse |
Link |
NOC:Hardware Security |
Lecture 7 - Hardware Architecture for Finite Field Inverse |
Link |
NOC:Hardware Security |
Lecture 8 - Background on Cryptography, Cryptanalysis and Advanced Encryption Standard (AES) |
Link |
NOC:Hardware Security |
Lecture 9 - Advanced Encryption Standard (AES) andSide Channel Analysis |
Link |
NOC:Hardware Security |
Lecture 10 - Field Isomorphisms |
Link |
NOC:Hardware Security |
Lecture 11 - Field Isomorphisms (Continued...) |
Link |
NOC:Hardware Security |
Lecture 12 - Hardware Implementation of Advanced Encryption |
Link |
NOC:Hardware Security |
Lecture 13 - Hardware Implementation of Advanced Encryption |
Link |
NOC:Hardware Security |
Lecture 14 - Hardware Implementation of Advanced Encryption (Continued...) |
Link |
NOC:Hardware Security |
Lecture 15 - Compact AES-Box |
Link |
NOC:Hardware Security |
Lecture 16 - Compact AES S-Box - Part II |
Link |
NOC:Hardware Security |
Lecture 17 - Compact AES S-Box in Normal Basis - Part I |
Link |
NOC:Hardware Security |
Lecture 18 - Compact AES S-Box in Normal Basis - Part II |
Link |
NOC:Hardware Security |
Lecture 19 - Hardware for Elliptic Curve Cryptography - Part I |
Link |
NOC:Hardware Security |
Lecture 20 - Hardware for Elliptic Curve Cryptography - Part II |
Link |
NOC:Hardware Security |
Lecture 21 - Hardware for Elliptic Curve Cryptography - Part III |
Link |
NOC:Hardware Security |
Lecture 22 - Hardware for Elliptic Curve Cryptography - Part IV |
Link |
NOC:Hardware Security |
Lecture 23 - Hardware for Elliptic Curve Cryptography - Part V |
Link |
NOC:Hardware Security |
Lecture 24 - Introduction to Side Channel Analysis |
Link |
NOC:Hardware Security |
Lecture 25 - Power Analysis - Part I |
Link |
NOC:Hardware Security |
Lecture 26 - Power Analysis - Part II |
Link |
NOC:Hardware Security |
Lecture 27 - Power Analysis - Part III |
Link |
NOC:Hardware Security |
Lecture 28 - Power Analysis - Part IV |
Link |
NOC:Hardware Security |
Lecture 29 - Power Analysis - Part V |
Link |
NOC:Hardware Security |
Lecture 30 - Power Analysis - Part VI |
Link |
NOC:Hardware Security |
Lecture 31 - Power Analysis - Part VII |
Link |
NOC:Hardware Security |
Lecture 32 - Power Analysis - Part VIII |
Link |
NOC:Hardware Security |
Lecture 33 - Power Analysis - Part IX |
Link |
NOC:Hardware Security |
Lecture 34 - Power Analysis - Part X |
Link |
NOC:Hardware Security |
Lecture 35 - Power Analysis - Part XI |
Link |
NOC:Hardware Security |
Lecture 36 - Power Analysis - Part XII |
Link |
NOC:Hardware Security |
Lecture 37 - Power Analysis - Part XIII |
Link |
NOC:Hardware Security |
Lecture 38 - Power Analysis - Part XIV |
Link |
NOC:Hardware Security |
Lecture 39 - Power Analysis - Part XV |
Link |
NOC:Hardware Security |
Lecture 40 - Power Analysis - Part XVI |
Link |
NOC:Hardware Security |
Lecture 41 - Power Analysis - Part XVII |
Link |
NOC:Hardware Security |
Lecture 42 - Power Analysis - Part XVIII |
Link |
NOC:Hardware Security |
Lecture 43 - Power Analysis Countermeasures |
Link |
NOC:Hardware Security |
Lecture 44 - Power Analysis Countermeasures (Continued...) |
Link |
NOC:Hardware Security |
Lecture 45 - Power Analysis Countermeasures (Continued...) |
Link |
NOC:Hardware Security |
Lecture 46 - Fault Analysis of Cryptosystems |
Link |
NOC:Hardware Security |
Lecture 47 - Improved DFA of AES |
Link |
NOC:Hardware Security |
Lecture 48 - Multi-Byte and key Scheduling Based Fault Analysis of AES |
Link |
NOC:Hardware Security |
Lecture 49 - Multi-Byte and key Scheduling Based Fault Analysis of AES (Continued...) |
Link |
NOC:Hardware Security |
Lecture 50 - Redundaney Based Fault Intensity |
Link |
NOC:Hardware Security |
Lecture 51 - Reundancy Base Fault Countermeasures and Differential Faut Intensity Attacks (Continued...) |
Link |
NOC:Hardware Security |
Lecture 52 - Infective Countermeasures for DFA |
Link |
NOC:Hardware Security |
Lecture 53 - Infective Countermeasures for DFA (Continued...) |
Link |
NOC:Hardware Security |
Lecture 54 - Infective Countermeasures for DFA (Continued...) |
Link |
NOC:Hardware Security |
Lecture 55 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers |
Link |
NOC:Hardware Security |
Lecture 56 - Microarchitectural attacks: Part I cache Timing attacks on Block ciphers (Continued...) |
Link |
NOC:Hardware Security |
Lecture 57 - Microarchitectural attacks: Part II Branch Prediction Attacks |
Link |
NOC:Hardware Security |
Lecture 58 - Microarchitectural attacks: Part II Branch Prediction Attacks (Continued...) |
Link |
NOC:Hardware Security |
Lecture 59 - Microarchitectural attacks: Part III Row Hammer Attacks |
Link |
NOC:Hardware Security |
Lecture 60 - Microarchitectural attacks: Part III Row Hammer Attacks (Continued...) |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 1 - Introduction: Sensing and Actuation |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 2 - Introduction: IoT Connectivity - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 3 - Introduction: IoT Connectivity - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 4 - Introduction: IoT Networking - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 5 - Introduction: IoT Networking - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 6 - Industry 4.0: The Fourth Revolution |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 7 - Industry 4.0: Sustainability Assessment of Manufacturing Industry |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 8 - Industry 4.0: Lean Production System |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 9 - Industry 4.0: Smart and Connected Business Perspective |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 10 - Industry 4.0: Smart Factories |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 11 - Industry 4.0: Cyber-Physical Systems and Next-Generation Sensors |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 12 - Industry 4.0: Collaboration Platform and Product Lifecycle Management |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 13 - Industry 4.0: Augmented Reality and Virtual Reality |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 14 - Industry 4.0: Artificial Intelligence |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 15 - Industry 4.0: Big Data and Advanced Analysis |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 16 - Industry 4.0: Cybersecurity |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 17 - Basics of Industrial IoT: Introduction |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 18 - Basics of Industrial IoT: Industrial Internet Systems |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 19 - Basics of IIoT: Industrial Sensing and Actuation |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 20 - Basics of Industrial IoT: Industrial Processes - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 21 - Basics of Industrial IoT: Industrial Processes - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 22 - Business Models and Reference Architecture for IIoT: Business Models - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 23 - Business Models and Reference Architecture for IIoT: Business Models - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 24 - Business Models and Reference Architecture for IIoT: Reference Architecture - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 25 - Business Models and Reference Architecture for IIoT: Reference Architecture - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 26 - Key Enablers of Industrial IoT: Sensing - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 27 - Key Enablers of Industrial IoT: Sensing - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 28 - Key Enablers of Industrial IoT: Connectivity - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 29 - Key Enablers of Industrial IoT: Connectivity - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 30 - Key Enablers of Industrial IoT: Connectivity - Part 3 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 31 - Key Enablers of Industrial IoT: Connectivity - Part 4 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 32 - Key Enablers of Industrial IoT: Connectivity - Part 5 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 33 - Key Enablers of Industrial IoT: Processing - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 34 - Key Enablers of Industrial IoT: Processing - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 35 - Key Enablers of Industrial IoT: Process Control |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 36 - IIoT Analytics and Data Management: Introduction |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 37 - IIoT Analytics and Data Management: Machine Learning and Data Science - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 38 - IIoT Analytics and Data Management: Machine Learning and Data Science - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 39 - IIoT Analytics and Data Management: Cloud Computing in IIoT - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 40 - IIoT Analytics and Data Management: Cloud Computing in IIoT - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 41 - Analytics and Data Management: Fog Computing in IIoT |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 42 - IIoT Analytics and Data Management: Tutorial for R and Julia Programming |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 43 - IIoT Analytics and Data Management: Data Management with Hadoop |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 44 - IIoT Analytics and Data Management: Data Center Networks |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 45 - Advanced Technologies: Software-Defined Networking (SDN) in IIoT - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 46 - Advanced Technologies: Software-Defined Networking (SDN) in IIoT - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 47 - Advanced Technologies: Security in IIoT - Part 1 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 48 - Advanced Technologies: Security in IIoT - Part 2 |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 49 - IIoT Applications: Factories and Assembly Line |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 50 - IIoT Applications: Food Industry |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 51 - IIoT Applications: Healthcare |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 52 - IIoT Applications: Power Plants |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 53 - IIoT Applications: Inventory Management and Quality Control |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 54 - IIoT Applications: Plant Security and Safety |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 55 - IIoT Applications: Facility Management |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 56 - IIoT Applications: Oil, Chemical and Pharmaceutical Industry |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 57 - IIoT Applications: UAVs in Industries |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 58 - Case Studies for Industry 4.0 and IIoT |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 59 - Milk Processing and Packaging Industries |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 60 - Manufacturing Industries - Part I |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 61 - Manufacturing Industries - Part II |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 62 - Student Projects - Part I |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 63 - Student Projects - Part II |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 64 - Virtual Reality Lab |
Link |
NOC:Introduction to Industry 4.0 and Industrial Internet of Things |
Lecture 65 - Steel Technology Lab |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 1 - Deterministic Finite Automata (DFA) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 2 - Input alphabet |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 3 - Extended transition function |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 4 - Language of DFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 5 - Building DFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 6 - Building DFA (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 7 - NFA (Nondeterministic Finite Automata) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 8 - Language of a NFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 9 - Equivalence of DFAs and NFAs |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 10 - Subset Construction |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 11 - ϵ-NFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 12 - Extended transition function of NFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 13 - Language of NFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 14 - NFA to NFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 15 - NFA to DFA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 16 - Regular expression |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 17 - Regular expression (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 18 - More on regular expression |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 19 - Equivalence of NFA and regular expression |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 20 - Equivalence of NFA and regular expression (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 21 - DFA to Regular expression |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 22 - DFA to Regular expression (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 23 - Construction of regular expression from a DFA (example) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 24 - Closure properties of Regular Set |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 25 - Closure properties of Regular Set (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 26 - Substitution |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 27 - Pumping Lemma |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 28 - Application of the pumping lemma |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 29 - More on Pumping lemma |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 30 - Ardens Theorem |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 31 - Minimization of FA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 32 - Minimization of FA (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 33 - Two way FA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 34 - Finite automata with output |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 35 - Equivalence of Moore and Mealy machine |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 36 - Context free grammars (CFG) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 37 - Context free language (CFL) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 38 - More example on CFL |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 39 - More on CFG |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 40 - Derivation Tree/Parse Tree |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 41 - Leftmost and Rightmost derivations |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 42 - Ambiguity in CFG |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 43 - Simplification of CFG |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 44 - Algorithms to construct reduced grammar |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 45 - Elimination of Null and Unit productions |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 46 - Chomsky Normal Form (CNF) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 47 - Greibach Normal Form (GNF) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 48 - Pushdown Automata (PDA) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 49 - Language accepted by PDA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 50 - Example of a language accepted by PDA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 51 - Deterministic PDA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 52 - Equivalence of language accepted |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 53 - Equivalence PDA |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 54 - Equivalence PDA and CFL |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 55 - Equivalence PDA and CFL (Continued...) |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 56 - Relationship between regular language and CFL |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 57 - Pumping lemma for CFLs |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 58 - Closer properties of CFLs |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 59 - Turning Machine |
Link |
NOC:Introduction to Automata, Languages and Computation |
Lecture 60 - Language accepted by a Turning machine |
Link |
NOC:Operating System Fundamentals |
Lecture 1 - Introduction |
Link |
NOC:Operating System Fundamentals |
Lecture 2 - Introduction (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 3 - Introduction (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 4 - Introduction (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 5 - Introduction (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 6 - Introduction (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 7 - Operating System Structures |
Link |
NOC:Operating System Fundamentals |
Lecture 8 - Operating System Structures (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 9 - Operating System Structures (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 10 - Operating System Structures (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 11 - Operating System Structures (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 12 - Processes |
Link |
NOC:Operating System Fundamentals |
Lecture 13 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 14 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 15 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 16 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 17 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 18 - Processes (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 19 - Threads |
Link |
NOC:Operating System Fundamentals |
Lecture 20 - Threads (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 21 - Threads (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 22 - Threads (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 23 - Threads, Scheduling |
Link |
NOC:Operating System Fundamentals |
Lecture 24 - Scheduling |
Link |
NOC:Operating System Fundamentals |
Lecture 25 - Scheduling (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 26 - Scheduling (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 27 - Scheduling (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 28 - Scheduling (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 29 - Process Synchronization |
Link |
NOC:Operating System Fundamentals |
Lecture 30 - Process Synchronization (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 31 - Process Synchronization (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 32 - Process Synchronization (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 33 - Process Synchronization (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 34 - Process Synchronization (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 35 - Synchronization Examples |
Link |
NOC:Operating System Fundamentals |
Lecture 36 - Synchronization Examples, Deadlock |
Link |
NOC:Operating System Fundamentals |
Lecture 37 - Deadlock |
Link |
NOC:Operating System Fundamentals |
Lecture 38 - Deadlock (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 39 - Deadlock (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 40 - Deadlock (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 41 - Memory Management |
Link |
NOC:Operating System Fundamentals |
Lecture 42 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 43 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 44 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 45 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 46 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 47 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 48 - Memory Management (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 49 - Virtual Memory |
Link |
NOC:Operating System Fundamentals |
Lecture 50 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 51 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 52 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 53 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 54 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 55 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 56 - Virtual Memory (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 57 - File System and Secondary Storage |
Link |
NOC:Operating System Fundamentals |
Lecture 58 - File System and Secondary Storage (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 59 - File System and Secondary Storage (Continued...) |
Link |
NOC:Operating System Fundamentals |
Lecture 60 - File System and Secondary Storage (Continued...) |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 1 - Introduction |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 2 - Feature Descriptor - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 3 - Feature Descriptor - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 4 - Bayesian Learning - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 5 - Bayesian Learning - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 6 - Discriminant Function - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 7 - Discriminant Function - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 8 - Discriminant Function - III |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 9 - Linear Classifier - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 10 - Linear Classifier - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 11 - Support Vector Machine - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 12 - Support Vector Machine - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 13 - Linear Machine |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 14 - Multiclass Support Vector Machine - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 15 - Multiclass Support Vector Machine - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 16 - Optimization |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 17 - Optimization Techniques in Machine Learning |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 18 - Nonlinear Functions |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 19 - Introduction to Neural Network |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 20 - Neural Network - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 21 - Multilayer Perceptron - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 22 - Multilayer Perceptron - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 23 - Backpropagation Learning |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 24 - Loss Function |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 25 - Backpropagation Learning- Example - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 26 - Backpropagation Learning- Example - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 27 - Backpropagation Learning- Example - III |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 28 - Autoencoder |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 29 - Autoencoder Vs PCA - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 30 - Autoencoder Vs PCA - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 31 - Autoencoder Training |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 32 - Autoencoder Variants - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 33 - Autoencoder Variants - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 34 - Convolution |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 35 - Cross Correlation |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 36 - CNN Architecture |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 37 - MLP versus CNN, Popular CNN Architecture: LeNet |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 38 - Popular CNN Architecture: AlexNet |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 39 - Popular CNN Architecture: VGG16, Transfer Learning |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 40 - Vanishing and Exploding Gradient |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 41 - GoogleNet |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 42 - ResNet, Optimisers: Momentum Optimiser |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 43 - Optimisers: Momentum and Nesterov Accelerated Gradient (NAG) Optimiser |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 44 - Optimisers: Adagrad Optimiser |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 45 - Optimisers: RMSProp, AdaDelta and Adam Optimiser |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 46 - Normalization |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 47 - Batch Normalization - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 48 - Batch Normalization - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 49 - Layer, Instance, Group Normalization |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 50 - Training Trick, Regularization,Early Stopping |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 51 - Face Recognition |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 52 - Deconvolution Layer |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 53 - Semantic Segmentation - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 54 - Semantic Segmentation - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 55 - Semantic Segmentation - III |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 56 - Image Denoising |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 57 - Variational Autoencoder - I |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 58 - Variational Autoencoder - II |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 59 - Variational Autoencoder - III |
Link |
NOC:Deep Learning (Prof. P.K. Biswas) |
Lecture 60 - Generative Adversarial Network |
Link |
NOC:Computer Vision |
Lecture 1 - Fundamentals of Image Processing - Part I |
Link |
NOC:Computer Vision |
Lecture 2 - Fundamentals of Imagr Processing - Part II |
Link |
NOC:Computer Vision |
Lecture 3 - Image Transform - Part I |
Link |
NOC:Computer Vision |
Lecture 4 - Image Transform - Part II |
Link |
NOC:Computer Vision |
Lecture 5 - Projective Geometry - Part I |
Link |
NOC:Computer Vision |
Lecture 6 - Projective Geometry - Part II |
Link |
NOC:Computer Vision |
Lecture 7 - Projective Transformation |
Link |
NOC:Computer Vision |
Lecture 8 - Homography: Properties - Part I |
Link |
NOC:Computer Vision |
Lecture 9 - Homography: Properties - Part II |
Link |
NOC:Computer Vision |
Lecture 10 - Homography: Properties - Part III |
Link |
NOC:Computer Vision |
Lecture 11 - Camera Geometry - Part I |
Link |
NOC:Computer Vision |
Lecture 12 - Camera Geometry - Part II |
Link |
NOC:Computer Vision |
Lecture 13 - Camera Geometry - Part III |
Link |
NOC:Computer Vision |
Lecture 14 - Camera Geometry - Part IV |
Link |
NOC:Computer Vision |
Lecture 15 - Camera Geometry - Part V |
Link |
NOC:Computer Vision |
Lecture 16 - Stereo Geometry - Part I |
Link |
NOC:Computer Vision |
Lecture 17 - Stereo Geometry - Part II |
Link |
NOC:Computer Vision |
Lecture 18 - Stereo Geometry - Part III |
Link |
NOC:Computer Vision |
Lecture 19 - Stereo Geometry - Part IV |
Link |
NOC:Computer Vision |
Lecture 20 - Stereo Geometry - Part V |
Link |
NOC:Computer Vision |
Lecture 21 - Stereo Geometry - Part VI |
Link |
NOC:Computer Vision |
Lecture 22 - Stereo Geometry - Part VII |
Link |
NOC:Computer Vision |
Lecture 23 - Stereo Geometry - Part VIII |
Link |
NOC:Computer Vision |
Lecture 24 - Feature Detection And Description - Part I |
Link |
NOC:Computer Vision |
Lecture 25 - Feature Detection And Description - Part II |
Link |
NOC:Computer Vision |
Lecture 26 - Feature Detection And Description - Part III |
Link |
NOC:Computer Vision |
Lecture 27 - Feature Detection And Description - Part IV |
Link |
NOC:Computer Vision |
Lecture 28 - Feature Detection And Description - Part V |
Link |
NOC:Computer Vision |
Lecture 29 - Feature Matching And Model Fitting- Part I |
Link |
NOC:Computer Vision |
Lecture 30 - Feature Matching And Model Fitting- Part II |
Link |
NOC:Computer Vision |
Lecture 31 - Feature Matching And Model Fitting- Part III |
Link |
NOC:Computer Vision |
Lecture 32 - Feature Matching And Model Fitting- Part IV |
Link |
NOC:Computer Vision |
Lecture 33 - Feature Matching And Model Fitting- Part V |
Link |
NOC:Computer Vision |
Lecture 34 - Color Fundamentals And Processing-Part I |
Link |
NOC:Computer Vision |
Lecture 35 - Color Fundamentals And Processing-Part II |
Link |
NOC:Computer Vision |
Lecture 36 - Color Fundamentals And Processing-Part III |
Link |
NOC:Computer Vision |
Lecture 37 - Color Fundamentals And Processing-Part IV |
Link |
NOC:Computer Vision |
Lecture 38 - Color Fundamentals And Processing-Part V |
Link |
NOC:Computer Vision |
Lecture 39 - Color Fundamentals And Processing-Part VI |
Link |
NOC:Computer Vision |
Lecture 40 - Color Fundamentals And Processing-Part VII |
Link |
NOC:Computer Vision |
Lecture 41 - Range Image Processing - Part I |
Link |
NOC:Computer Vision |
Lecture 42 - Range Image Processing - Part II |
Link |
NOC:Computer Vision |
Lecture 43 - Range Image Processing - Part III |
Link |
NOC:Computer Vision |
Lecture 44 - Range Image Processing - Part IV |
Link |
NOC:Computer Vision |
Lecture 45 - Range Image Processing - Part V |
Link |
NOC:Computer Vision |
Lecture 46 - Clustering and Classification - Part I |
Link |
NOC:Computer Vision |
Lecture 47 - Clustering and Classification - Part II |
Link |
NOC:Computer Vision |
Lecture 48 - Clustering and Classification - Part III |
Link |
NOC:Computer Vision |
Lecture 49 - Clustering and Classification - Part IV |
Link |
NOC:Computer Vision |
Lecture 50 - Clustering and Classification - Part V |
Link |
NOC:Computer Vision |
Lecture 51 - Dimensional Reduction And Sparse Representation - Part I |
Link |
NOC:Computer Vision |
Lecture 52 - Dimensional Reduction And Sparse Representation - Part II |
Link |
NOC:Computer Vision |
Lecture 53 - Dimensional Reduction And Sparse Representation - Part III |
Link |
NOC:Computer Vision |
Lecture 54 - Dimensional Reduction And Sparse Representation - Part IV |
Link |
NOC:Computer Vision |
Lecture 55 - Deep Neural Architecture And Applications - Part I |
Link |
NOC:Computer Vision |
Lecture 56 - Deep Neural Architecture And Applications - Part II |
Link |
NOC:Computer Vision |
Lecture 57 - Deep Neural Architecture And Applications - Part III |
Link |
NOC:Computer Vision |
Lecture 58 - Deep Neural Architecture And Applications - Part IV |
Link |
NOC:Computer Vision |
Lecture 59 - Deep Neural Architecture And Applications - Part V |
Link |
NOC:Computer Vision |
Lecture 60 - Deep Neural Architecture And Applications - Part VI |
Link |
NOC:Ethical Hacking |
Lecture 1 - Introduction to Ethical Hacking |
Link |
NOC:Ethical Hacking |
Lecture 2 - Basic Concepts of Networking - Part I |
Link |
NOC:Ethical Hacking |
Lecture 3 - Basic Concepts of Networking - Part II |
Link |
NOC:Ethical Hacking |
Lecture 4 - TCP/IP Protocol Stack - Part I |
Link |
NOC:Ethical Hacking |
Lecture 5 - TCP/IP Protocol Stack - Part II |
Link |
NOC:Ethical Hacking |
Lecture 6 - IP addressing and routing - Part I |
Link |
NOC:Ethical Hacking |
Lecture 7 - IP addressing and routing - Part II |
Link |
NOC:Ethical Hacking |
Lecture 8 - TCP and UDP - Part I |
Link |
NOC:Ethical Hacking |
Lecture 9 - TCP and UDP - Part II |
Link |
NOC:Ethical Hacking |
Lecture 10 - IP subnetting |
Link |
NOC:Ethical Hacking |
Lecture 11 - Routing protocols - Part I |
Link |
NOC:Ethical Hacking |
Lecture 12 - Routing protocols - Part II |
Link |
NOC:Ethical Hacking |
Lecture 13 - Routing protocols - Part III |
Link |
NOC:Ethical Hacking |
Lecture 14 - IP version 6 |
Link |
NOC:Ethical Hacking |
Lecture 15 - Routing examples |
Link |
NOC:Ethical Hacking |
Lecture 16 - Demonstration - Part I |
Link |
NOC:Ethical Hacking |
Lecture 17 - Demonstration - Part II |
Link |
NOC:Ethical Hacking |
Lecture 18 - Demonstration - Part III |
Link |
NOC:Ethical Hacking |
Lecture 19 - Nessus Installation |
Link |
NOC:Ethical Hacking |
Lecture 20 - How to use nessus |
Link |
NOC:Ethical Hacking |
Lecture 21 - Metasploit Exploiting System Software - I |
Link |
NOC:Ethical Hacking |
Lecture 22 - Metasploit Exploiting System Software - II |
Link |
NOC:Ethical Hacking |
Lecture 23 - Metasploit Exploiting System Software and Privilege |
Link |
NOC:Ethical Hacking |
Lecture 24 - Metasploit Social Eng Attack |
Link |
NOC:Ethical Hacking |
Lecture 25 - MITM (Man in The middle) Attack |
Link |
NOC:Ethical Hacking |
Lecture 26 - Basic concepts of cryptography |
Link |
NOC:Ethical Hacking |
Lecture 27 - Private-key cryptography - Part I |
Link |
NOC:Ethical Hacking |
Lecture 28 - Private-key cryptography - Part II |
Link |
NOC:Ethical Hacking |
Lecture 29 - Public-key cryptography - Part I |
Link |
NOC:Ethical Hacking |
Lecture 30 - Public-key cryptography - Part II |
Link |
NOC:Ethical Hacking |
Lecture 31 - Cryptographic hash functions - Part I |
Link |
NOC:Ethical Hacking |
Lecture 32 - Cryptographic hash functions - Part II |
Link |
NOC:Ethical Hacking |
Lecture 33 - Digital signature and certificate |
Link |
NOC:Ethical Hacking |
Lecture 34 - Applications - Part I |
Link |
NOC:Ethical Hacking |
Lecture 35 - Applications - Part II |
Link |
NOC:Ethical Hacking |
Lecture 36 - Steganography |
Link |
NOC:Ethical Hacking |
Lecture 37 - Biometrics |
Link |
NOC:Ethical Hacking |
Lecture 38 - Network Based Attacks - Part I |
Link |
NOC:Ethical Hacking |
Lecture 39 - Network Based Attacks - Part II |
Link |
NOC:Ethical Hacking |
Lecture 40 - DNS and Email Security |
Link |
NOC:Ethical Hacking |
Lecture 41 - Password cracking |
Link |
NOC:Ethical Hacking |
Lecture 42 - Phishing attack |
Link |
NOC:Ethical Hacking |
Lecture 43 - Maloeware |
Link |
NOC:Ethical Hacking |
Lecture 44 - Wifi hacking |
Link |
NOC:Ethical Hacking |
Lecture 45 - Dos and DDos attack |
Link |
NOC:Ethical Hacking |
Lecture 46 - Elements of Hardware Security |
Link |
NOC:Ethical Hacking |
Lecture 47 - Side Channel Attacks - Part I |
Link |
NOC:Ethical Hacking |
Lecture 48 - Side Channel Attacks - Part II |
Link |
NOC:Ethical Hacking |
Lecture 49 - Physical Unclonable Function |
Link |
NOC:Ethical Hacking |
Lecture 50 - Hardware Trojan |
Link |
NOC:Ethical Hacking |
Lecture 51 - Web Application Vulnerability Scanning |
Link |
NOC:Ethical Hacking |
Lecture 52 - SQL Injection Authentication Bypass - Part 1 |
Link |
NOC:Ethical Hacking |
Lecture 53 - SQL Injection Error Based - Part 2 |
Link |
NOC:Ethical Hacking |
Lecture 54 - SQL Injection Error Based from Web Application - Part 3 |
Link |
NOC:Ethical Hacking |
Lecture 55 - SQLMAP |
Link |
NOC:Ethical Hacking |
Lecture 56 - Cross Site Scripting |
Link |
NOC:Ethical Hacking |
Lecture 57 - File Upload Vulnerability |
Link |
NOC:Ethical Hacking |
Lecture 58 - The NMAP Tool: A Relook - Part I |
Link |
NOC:Ethical Hacking |
Lecture 59 - The NMAP Tool: A Relook - Part II |
Link |
NOC:Ethical Hacking |
Lecture 60 - The NMAP Tool: A Relook - Part III |
Link |
NOC:Ethical Hacking |
Lecture 61 - Network Analysis using Wireshark |
Link |
NOC:Ethical Hacking |
Lecture 62 - Summarization of the Course |
Link |
NOC:Software Project Management |
Lecture 1 - Introduction - I |
Link |
NOC:Software Project Management |
Lecture 2 - Introduction - II |
Link |
NOC:Software Project Management |
Lecture 3 - Introduction - III |
Link |
NOC:Software Project Management |
Lecture 4 - Project Management Standards |
Link |
NOC:Software Project Management |
Lecture 5 - Life Cycle Models - I |
Link |
NOC:Software Project Management |
Lecture 6 - Life Cycle Models - II |
Link |
NOC:Software Project Management |
Lecture 7 - Life Cycle Models - III |
Link |
NOC:Software Project Management |
Lecture 8 - Life Cycle Models - IV |
Link |
NOC:Software Project Management |
Lecture 9 - Life Cycle Models - V |
Link |
NOC:Software Project Management |
Lecture 10 - Life Cycle Models - VI |
Link |
NOC:Software Project Management |
Lecture 11 - Project Evaluation and Programme Management |
Link |
NOC:Software Project Management |
Lecture 12 - Project Evaluation and Programme Management (Continued...) |
Link |
NOC:Software Project Management |
Lecture 13 - Project Evaluation and Programme Management (Continued...) |
Link |
NOC:Software Project Management |
Lecture 14 - Project Evaluation and Programme Management (Continued...) |
Link |
NOC:Software Project Management |
Lecture 15 - Project Evaluation and Programme Management (Continued...) |
Link |
NOC:Software Project Management |
Lecture 16 - Project Estimation Techniques |
Link |
NOC:Software Project Management |
Lecture 17 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 18 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 19 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 20 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 21 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 22 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 23 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 24 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 25 - Project Estimation Techniques (Continued...) |
Link |
NOC:Software Project Management |
Lecture 26 - Project Scheduling |
Link |
NOC:Software Project Management |
Lecture 27 - Project Scheduling Using PERT/CPM |
Link |
NOC:Software Project Management |
Lecture 28 - Project Scheduling Using PERT/CPM (Continued...) |
Link |
NOC:Software Project Management |
Lecture 29 - Computation of Project Characteristics Using PERT/CPM |
Link |
NOC:Software Project Management |
Lecture 30 - Computation of Project Characteristics Using PERT/CPM: Illustration |
Link |
NOC:Software Project Management |
Lecture 31 - PERT, Project Crashing |
Link |
NOC:Software Project Management |
Lecture 32 - Team Management |
Link |
NOC:Software Project Management |
Lecture 33 - Organization and Team Structure |
Link |
NOC:Software Project Management |
Lecture 34 - Team Structure (Continued...) and Risk Management |
Link |
NOC:Software Project Management |
Lecture 35 - Risk Management (Continued...) and Introduction to Software Quality |
Link |
NOC:Software Project Management |
Lecture 36 - Resource Allocation |
Link |
NOC:Software Project Management |
Lecture 37 - Resource Allocation (Continued...) |
Link |
NOC:Software Project Management |
Lecture 38 - Resource Allocation (Continued...) |
Link |
NOC:Software Project Management |
Lecture 39 - Project Monitoring and Control |
Link |
NOC:Software Project Management |
Lecture 40 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 41 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 42 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 43 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 44 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 45 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 46 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 47 - Project Monitoring and Control (Continued...) |
Link |
NOC:Software Project Management |
Lecture 48 - Contract Management |
Link |
NOC:Software Project Management |
Lecture 49 - Contract Management (Continued...) |
Link |
NOC:Software Project Management |
Lecture 50 - Project Close Out |
Link |
NOC:Software Project Management |
Lecture 51 - Software Quality Management |
Link |
NOC:Software Project Management |
Lecture 52 - ISO 9000 |
Link |
NOC:Software Project Management |
Lecture 53 - ISO 9001, SEI CMM |
Link |
NOC:Software Project Management |
Lecture 54 - SEI CMM (Continued...) |
Link |
NOC:Software Project Management |
Lecture 55 - SEI CMM (Continued...) |
Link |
NOC:Software Project Management |
Lecture 56 - Personal Software Process (PSP) |
Link |
NOC:Software Project Management |
Lecture 57 - Software Reliability - I |
Link |
NOC:Software Project Management |
Lecture 58 - Software Reliability - II |
Link |
NOC:Software Project Management |
Lecture 59 - Software Reliability - III |
Link |
NOC:Software Project Management |
Lecture 60 - Software Testing |
Link |
NOC:Spatial Informatics |
Lecture 1 - Introduction |
Link |
NOC:Spatial Informatics |
Lecture 2 - Spatial Data Models - 1 |
Link |
NOC:Spatial Informatics |
Lecture 3 - Spatial Data Models - 2 |
Link |
NOC:Spatial Informatics |
Lecture 4 - Spatial Data Models - 3 |
Link |
NOC:Spatial Informatics |
Lecture 5 - Spatial Data Models - 4 |
Link |
NOC:Spatial Informatics |
Lecture 6 - Spatial Web Services - 1 |
Link |
NOC:Spatial Informatics |
Lecture 7 - Spatial Web Services - 2 |
Link |
NOC:Spatial Informatics |
Lecture 8 - Spatial Web Services - 3 |
Link |
NOC:Spatial Informatics |
Lecture 9 - Spatial Web Services - 4 |
Link |
NOC:Spatial Informatics |
Lecture 10 - Spatial Web Services - Demo |
Link |
NOC:Spatial Informatics |
Lecture 11 - Spatial Database: An Overview |
Link |
NOC:Spatial Informatics |
Lecture 12 - Spatial Query Processing / SQL - 1 |
Link |
NOC:Spatial Informatics |
Lecture 13 - Spatial Query Processing / SQL - 2 |
Link |
NOC:Spatial Informatics |
Lecture 14 - Spatial Query Processing / SQL - 3 |
Link |
NOC:Spatial Informatics |
Lecture 15 - Spatial Query Processing / SQL - 4 |
Link |
NOC:Spatial Informatics |
Lecture 16 - Spatial Query Demo Tutorial |
Link |
NOC:Spatial Informatics |
Lecture 17 - Spatial Indexing - I |
Link |
NOC:Spatial Informatics |
Lecture 18 - Spatial Indexing - II |
Link |
NOC:Spatial Informatics |
Lecture 19 - Spatial Indexing - III |
Link |
NOC:Spatial Informatics |
Lecture 20 - Spatial Indexing - IV |
Link |
NOC:Spatial Informatics |
Lecture 21 - Spatial Networks - I |
Link |
NOC:Spatial Informatics |
Lecture 22 - Spatial Networks - II |
Link |
NOC:Spatial Informatics |
Lecture 23 - Spatial Networks - III |
Link |
NOC:Spatial Informatics |
Lecture 24 - Spatial Networks - IV |
Link |
NOC:Spatial Informatics |
Lecture 25 - Spatial Networks - V |
Link |
NOC:Spatial Informatics |
Lecture 26 - Spatial Analysis - I |
Link |
NOC:Spatial Informatics |
Lecture 27 - Spatial Analysis - II |
Link |
NOC:Spatial Informatics |
Lecture 28 - Spatial Analysis - III |
Link |
NOC:Spatial Informatics |
Lecture 29 - Spatial Analysis - IV |
Link |
NOC:Spatial Informatics |
Lecture 30 - Spatial Analysis - V |
Link |
NOC:Spatial Informatics |
Lecture 31 - Remote Sensing and GIS - I |
Link |
NOC:Spatial Informatics |
Lecture 32 - Remote Sensing and GIS - II |
Link |
NOC:Spatial Informatics |
Lecture 33 - Remote Sensing and GIS - III |
Link |
NOC:Spatial Informatics |
Lecture 34 - Remote Sensing and GIS - IV |
Link |
NOC:Spatial Informatics |
Lecture 35 - Remote Sensing and GIS - V |
Link |
NOC:Spatial Informatics |
Lecture 36 - SDS / Spatial Cloud / GeoViz - I |
Link |
NOC:Spatial Informatics |
Lecture 37 - SDS / Spatial Cloud / GeoViz - II |
Link |
NOC:Spatial Informatics |
Lecture 38 - SDS / Spatial Cloud / GeoViz - III |
Link |
NOC:Spatial Informatics |
Lecture 39 - SDS / Spatial Cloud / GeoViz - IV |
Link |
NOC:Spatial Informatics |
Lecture 40 - SDS / Spatial Cloud / GeoViz - V |
Link |
NOC:GPU Architectures and Programming |
Lecture 1 - Review of basic COA w.r.t. performance |
Link |
NOC:GPU Architectures and Programming |
Lecture 2 - Review of basic COA w.r.t. performance |
Link |
NOC:GPU Architectures and Programming |
Lecture 3 - Review of basic COA w.r.t. performance |
Link |
NOC:GPU Architectures and Programming |
Lecture 4 - Review of basic COA w.r.t. performance |
Link |
NOC:GPU Architectures and Programming |
Lecture 5 - Intro to GPU architectures |
Link |
NOC:GPU Architectures and Programming |
Lecture 6 - Intro to GPU architectures |
Link |
NOC:GPU Architectures and Programming |
Lecture 7 - Intro to GPU architectures |
Link |
NOC:GPU Architectures and Programming |
Lecture 8 - Intro to GPU architectures |
Link |
NOC:GPU Architectures and Programming |
Lecture 9 - Intro to CUDA programming |
Link |
NOC:GPU Architectures and Programming |
Lecture 10 - Intro to CUDA programming (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 11 - Intro to CUDA programming (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 12 - Intro to CUDA programming (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 13 - Multi-dimensional mapping of dataspace; Synchronization |
Link |
NOC:GPU Architectures and Programming |
Lecture 14 - Multi-dimensional mapping of dataspace; Synchronization (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 15 - Multi-dimensional mapping of dataspace; Synchronization (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 16 - Warp Scheduling and Divergence |
Link |
NOC:GPU Architectures and Programming |
Lecture 17 - Warp Scheduling and Divergence (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 18 - Warp Scheduling and Divergence (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 19 - Memory Access Coalescing |
Link |
NOC:GPU Architectures and Programming |
Lecture 20 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 21 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 22 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 23 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 24 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 25 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 26 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 27 - Memory Access Coalescing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 28 - Optimizing Reduction Kernels |
Link |
NOC:GPU Architectures and Programming |
Lecture 29 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 30 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 31 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 32 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 33 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 34 - Optimizing Reduction Kernels (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 35 - Kernel Fusion, Thread and Block Coarsening |
Link |
NOC:GPU Architectures and Programming |
Lecture 36 - Kernel Fusion, Thread and Block Coarsening (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 37 - Kernel Fusion, Thread and Block Coarsening (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 38 - Kernel Fusion, Thread and Block Coarsening (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 39 - Kernel Fusion, Thread and Block Coarsening (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 40 - Kernel Fusion, Thread and Block Coarsening (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 41 - OpenCL - Runtime System |
Link |
NOC:GPU Architectures and Programming |
Lecture 42 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 43 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 44 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 45 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 46 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 47 - OpenCL - Runtime System (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 48 - OpenCL - Heterogeneous Computing |
Link |
NOC:GPU Architectures and Programming |
Lecture 49 - OpenCL - Heterogeneous Computing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 50 - OpenCL - Heterogeneous Computing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 51 - OpenCL - Heterogeneous Computing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 52 - OpenCL - Heterogeneous Computing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 53 - OpenCL - Heterogeneous Computing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 54 - Efficient Neural Network Training/Inferencing |
Link |
NOC:GPU Architectures and Programming |
Lecture 55 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 56 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 57 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 58 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 59 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 60 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 61 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 62 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:GPU Architectures and Programming |
Lecture 63 - Efficient Neural Network Training/Inferencing (Continued...) |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 1 - Introduction to Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 2 - Cloud Computing |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 3 - Cloud vs Traditional Architecture |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 4 - Iaas, PaaS and SaaS |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 5 - Google Cloud Architecture |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 6 - Cloud Computing Recap Quiz |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 7 - Summary - Cloud Computing |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 8 - Introduction - Start with a Solid Platform |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 9 - The GCP Console |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 10 - Understanding Projects |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 11 - Billing in GCP |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 12 - Install and Configure Cloud SDK |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 13 - Use Cloud Shell |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 14 - GCP APIs |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 15 - Cloud Console Mobile App |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 16 - Recap Quiz - Start with a Solid Foundation |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 17 - Introduction |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 18 - Compute Options in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 19 - Exploring IaaS with Compute Engine |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 20 - Configuring Elastic Apps with Autoscaling |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 21 - Exploring PaaS with App Engine |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 22 - Event Driven Programs with Cloud Functions |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 23 - Containerizing and Orchestrating Apps with GKE |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 24 - Summary |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 25 - Introduction |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 26 - Storage Options in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 27 - Structured and Unstructured Storage in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 28 - Unstructured Storage using Cloud Storage |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 29 - SQL Managed Services |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 30 - Exploring Cloud SQL |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 31 - Cloud Spanner as a Managed Service |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 32 - NoSQL Managed Services Options |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 33 - Cloud Datastore a NoSQL Document Store |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 34 - Cloud Bigtable as a NoSQL Option |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 35 - Summary |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 36 - Introduction to API |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 37 - The Purpose of APIs |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 38 - Cloud Endpoints |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 39 - Using Apigee |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 40 - Managed Message Services |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 41 - Cloud Pub/Sub |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 42 - Recap Quiz - There's an API for that! |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 43 - Introduction - Cloud Security |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 44 - Introduction to security in the cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 45 - Understanding the shared security model |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 46 - Explore encryption options |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 47 - Understand authentication and authorization |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 48 - Identify best practices for authorization |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 49 - Recap Quiz - Security |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 50 - Summary - Security |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 51 - Introduction |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 52 - Intro to Networking in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 53 - Defining a Virtual Private Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 54 - Public and Private IP Address Basics |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 55 - Googles Network Architecture |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 56 - Routes and Firewall Rules in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 57 - Multiple VPC Networks |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 58 - Building Hybrid Clouds |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 59 - Different Options for Load Balancing |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 60 - Recap Quiz |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 61 - Summary |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 62 - Introduction - Let Google keep an eye on things |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 63 - Introduction to IaC |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 64 - Cloud Deployment Manager |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 65 - Monitoring and Managing Your Services, Apps, and Infra |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 66 - Stackdriver |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 67 - Recap Quiz - Let Google keep an eye on things |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 68 - Summary - Let Google keep an eye on things |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 69 - Introduction - You have the data, but what are you doing with it? |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 70 - Intro to Big Data Managed Services in the Cloud |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 71 - Leverage Big Data Operations with Cloud Dataproc |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 72 - Build ETL Pipelines using Cloud Dataflow |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 73 - BigQuery Googles Enterprise Data Warehouse |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 74 - Recap Quiz - You have the data, but what are you doing with it? |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 75 - Summary - You have the data, but what are you doing with it? |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 76 - Introduction |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 77 - Introduction to ML |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 78 - ML and GCP |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 79 - Building Bespoke ML models |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 80 - Cloud AutoML |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 81 - Googles Pre-trained ML APIs |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 82 - Recap Quiz |
Link |
NOC:Google Cloud Computing Foundation Course |
Lecture 83 - Summary |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 1 - Introduction |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 2 - Basic Concepts in UML |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 3 - Introduction to Use case Modelling |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 4 - Factoring Use Cases |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 5 - Use Case Examples |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 6 - Use Case Guidelines |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 7 - Class Diagram |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 8 - Class Relations |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 9 - Binary and Unary Associations |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 10 - Implementation of Association Relation in Java |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 11 - Implementation of Association in General Case |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 12 - Association Class and Ternary Association |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 13 - Qualified Association |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 14 - Aggregation and Composition |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 15 - Dependency Relation |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 16 - Class Diagram Exercises |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 17 - Interfaces, Packages and Abstract Classes |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 18 - Polymorphism |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 19 - State Machine Diagrams |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 20 - State Charts Overview |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 21 - Features of State Machine Model |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 22 - Example of State Machine Modelling |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 23 - Encoding a State Machine - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 24 - Encoding a State Machine - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 25 - Interaction Diagrams |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 26 - Sequence Diagram - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 27 - Sequence Diagram - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 28 - Activity Diagram |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 29 - Introduction to OOAD |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 30 - OOAD - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 31 - OOAD - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 32 - Example Application of OOAD |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 33 - CRD Cards |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 34 - Open/Closed Principle |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 35 - LSP, ISP Principles |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 36 - DIP Principle |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 37 - Introduction to Design Pattern |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 38 - GRASP Pattern: Introduction |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 39 - Expert and Creator Pattern |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 40 - Pure Fabrication, Law of Demeter |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 41 - Introduction to GOF Patterns |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 42 - Facade Pattern |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 43 - Observer Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 44 - Observer Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 45 - Singleton Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 46 - Singleton Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 47 - State Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 48 - State Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 49 - Composite Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 50 - Composite Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 51 - Adapter Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 52 - Adapter Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 53 - Bridge Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 54 - Bridge Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 55 - Proxy Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 56 - Proxy Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 57 - Decorator Pattern - I |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 58 - Decorator Pattern - II |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 59 - Decorator Pattern - III |
Link |
NOC:Object Oriented System Development using UML, Java and Patterns |
Lecture 60 - Iterator Pattern |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 1 - Introduction and Course Plan |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 2 - Generic Methods |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 3 - Basics of Generic Class |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 4 - Parameterized Generic Class |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 5 - Bounded Argument Generic Class |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 6 - Basics of the Framework |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 7 - Collection in JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 8 - Set of JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 9 - Map Framework |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 10 - Java Legacy Classes |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 11 - Array Data Structures |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 12 - Programming for Arrays |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 13 - Class ArrayList for Arrays |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 14 - Arrays for Arrays |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 15 - Vector Class for Arrays |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 16 - Linked List Data Structure - Part I |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 17 - Linked List Data Structure - Part II |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 18 - Programming for Linked Lists - Part I |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 19 - Programming for Linked Lists - Part II |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 20 - Linked Lists Using JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 21 - Stack Data Structures |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 22 - Programming for Stack |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 23 - Stack Using JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 24 - Queue Data Structure |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 25 - Programming for Queue |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 26 - Queue Using JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 27 - Understanding Tree Data Structures |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 28 - Operations on Binary Tree Data Structures |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 29 - Binary Search Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 30 - Programming for Binary Search Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 31 - Height Balanced Binary Search Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 32 - Heap Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 33 - Programming for Heap Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 34 - Huffman Tree |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 35 - Graph Structures |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 36 - Graph Algorithms |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 37 - Map Framework in Java |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 38 - Applications of Map - Part I |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 39 - Applications of Map - Part II |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 40 - Collection Set |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 41 - Operations on Set Collection |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 42 - Introduction to java.io |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 43 - IO with Byte Streams |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 44 - IO with Character Streams |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 45 - File Input-Output |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 46 - Random Access File |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 47 - Linear Searching Algorithms |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 48 - Non-linear Searching Algorithms |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 49 - Programs for Searching |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 50 - Sorting Algorithms - Part I |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 51 - Improved Sorting Algorithms |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 52 - Advanced Sorting Algorithms |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 53 - Programs for Sorting - Part I |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 54 - Programs for Sorting - Part II |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 55 - Sorting Using JCF |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 56 - String Class |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 57 - Applications of String |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 58 - StringBuffer Class |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 59 - Miscellaneous Utilities |
Link |
NOC:Data Structure and Algorithms using Java |
Lecture 60 - Java Cursors |
Link |
NOC:Real-Time Systems |
Lecture 1 - Introduction |
Link |
NOC:Real-Time Systems |
Lecture 2 - Introduction |
Link |
NOC:Real-Time Systems |
Lecture 3 - Characteristics of a real-time embedded system |
Link |
NOC:Real-Time Systems |
Lecture 4 - Characteristics of a real-time embedded system |
Link |
NOC:Real-Time Systems |
Lecture 5 - Types of real-time tasks |
Link |
NOC:Real-Time Systems |
Lecture 6 - Events in a Real-Time System |
Link |
NOC:Real-Time Systems |
Lecture 7 - Types of time constraints |
Link |
NOC:Real-Time Systems |
Lecture 8 - Basics of Real-Time Task scheduling |
Link |
NOC:Real-Time Systems |
Lecture 9 - Clock-driven schedulers |
Link |
NOC:Real-Time Systems |
Lecture 10 - Basics of Cyclic schedulers |
Link |
NOC:Real-Time Systems |
Lecture 11 - Cyclic Scheduler |
Link |
NOC:Real-Time Systems |
Lecture 12 - Frame size constraints |
Link |
NOC:Real-Time Systems |
Lecture 13 - Frame size selection: Examples |
Link |
NOC:Real-Time Systems |
Lecture 14 - Event-driven scheduling |
Link |
NOC:Real-Time Systems |
Lecture 15 - EDF scheduler |
Link |
NOC:Real-Time Systems |
Lecture 16 - Variants of EDF and Rate Monotonic Scheduling |
Link |
NOC:Real-Time Systems |
Lecture 17 - Rate Monotonic Schedulability Analysis |
Link |
NOC:Real-Time Systems |
Lecture 18 - Rate Monotonic Schedulability Analysis |
Link |
NOC:Real-Time Systems |
Lecture 19 - Rate Monotonic Scheduling: Miscellaneous issues |
Link |
NOC:Real-Time Systems |
Lecture 20 - RMS Generalizations |
Link |
NOC:Real-Time Systems |
Lecture 21 - RMS Generalizations |
Link |
NOC:Real-Time Systems |
Lecture 22 - Handling aperiodic and sporadic tasks in rate monotonic scheduling |
Link |
NOC:Real-Time Systems |
Lecture 23 - Handling aperiodic and sporadic tasks in rate monotonic scheduling |
Link |
NOC:Real-Time Systems |
Lecture 24 - Coping up with Insufficient number of priorities |
Link |
NOC:Real-Time Systems |
Lecture 25 - Handling task jitter and precedence ordering |
Link |
NOC:Real-Time Systems |
Lecture 26 - Resource Sharing Among Real-Time Tasks |
Link |
NOC:Real-Time Systems |
Lecture 27 - Basic priority inheritance protocol (PIP) |
Link |
NOC:Real-Time Systems |
Lecture 28 - Highest Locker Protocol (HLP) |
Link |
NOC:Real-Time Systems |
Lecture 29 - Priority Ceiling Protocol (PCP) |
Link |
NOC:Real-Time Systems |
Lecture 30 - Working of Priority Ceiling Protocol |
Link |
NOC:Real-Time Systems |
Lecture 31 - Analysis of Priority Ceiling Protocol |
Link |
NOC:Real-Time Systems |
Lecture 32 - Introduction to Multiprocessor and Distributed Systems |
Link |
NOC:Real-Time Systems |
Lecture 33 - Static Allocation of Tasks |
Link |
NOC:Real-Time Systems |
Lecture 34 - Dynamic Allocation of Tasks |
Link |
NOC:Real-Time Systems |
Lecture 35 - Centralized Clock Synchronization in Distributed RT Systems |
Link |
NOC:Real-Time Systems |
Lecture 36 - Distributed Clock Synchronization in R-T Systems |
Link |
NOC:Real-Time Systems |
Lecture 37 - A Few Basics in Real-Time Operating Systems |
Link |
NOC:Real-Time Systems |
Lecture 38 - Time Services |
Link |
NOC:Real-Time Systems |
Lecture 39 - Unix as a Real-Time Operating System |
Link |
NOC:Real-Time Systems |
Lecture 40 - Unix as a Real-Time Operating System (Continued...) |
Link |
NOC:Real-Time Systems |
Lecture 41 - Windows as RTOS |
Link |
NOC:Real-Time Systems |
Lecture 42 - POSIX |
Link |
NOC:Real-Time Systems |
Lecture 43 - Unix-Based Real-Time Operating Systems |
Link |
NOC:Real-Time Systems |
Lecture 44 - A survey of some contemporary Real-Time Operating Systems |
Link |
NOC:Real-Time Systems |
Lecture 45 - A survey of some contemporary Real-Time Operating Systems (Continued...) |
Link |
NOC:Real-Time Systems |
Lecture 46 - Benchmarking Real-Time Systems |
Link |
NOC:Real-Time Systems |
Lecture 47 - Introduction to Real-Time Communication |
Link |
NOC:Real-Time Systems |
Lecture 48 - Basics of Real-Time Communication |
Link |
NOC:Real-Time Systems |
Lecture 49 - Basics of Networking |
Link |
NOC:Real-Time Systems |
Lecture 50 - Basics of Internet |
Link |
NOC:Real-Time Systems |
Lecture 51 - Real-Time Communication in a LAN |
Link |
NOC:Real-Time Systems |
Lecture 52 - Bounded Access Protocols for LANs |
Link |
NOC:Real-Time Systems |
Lecture 53 - Performance Comparison and QoS Framework |
Link |
NOC:Real-Time Systems |
Lecture 54 - Routing and Resource Reservation |
Link |
NOC:Real-Time Systems |
Lecture 55 - Rate Control |
Link |
NOC:Real-Time Systems |
Lecture 56 - QoS Models and Soft Real-Time Communication in a LAN |
Link |
NOC:Real-Time Systems |
Lecture 57 - Review of Basic Database Concepts |
Link |
NOC:Real-Time Systems |
Lecture 58 - Applications and Issues of Real-Time Database |
Link |
NOC:Real-Time Systems |
Lecture 59 - Characteristics of Temporal Data |
Link |
NOC:Real-Time Systems |
Lecture 60 - Locking-Based Concurrency Control In Real-Time Databases |
Link |
NOC:Real-Time Systems |
Lecture 61 - Concurrency Control In Real-Time Databases and Commercial RT Databases |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 1 - Introduction on Proteins |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 2 - Introduction on Proteins (Continued...) and Sequence Database |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 3 - Protein Data Bank |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 4 - PDB Parsing |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 5 - Molecular Visualization Tools |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 6 - Representation and Data Structure |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 7 - Digitization of a Molecule |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 8 - Application to Protein Docking, FFT |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 9 - Implementation Details |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 10 - Hashing |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 11 - Geometric Hashing |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 12 - Geometric Hashing (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 13 - Geometric Hashing (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 14 - Molecular Surface |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 15 - Genetic Algorithm (GA) for Surface Comparison |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 16 - Monte Carlo (MC) Method |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 17 - Monte Carlo Method (Continued...) and Random Number |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 18 - Monte Carlo (MC) Method (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 19 - Protein Folding |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 20 - Protein Folding (Continued...) and Protein Design |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 21 - Protein Energy Landscape |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 22 - Protein Energy Landscape (Continued...), Limitation of MC |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 23 - Replica Exchange Monte Carlo (REMC) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 24 - Ab Initio Protein Folding |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 25 - Structure Alignment Measures |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 26 - Dynamic Programming |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 27 - Dynamic Programming (Continued...), Sequence Alignment |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 28 - Dynamic Programming (Continued...), Position Specific Scoring Matrix (PSSM) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 29 - Structure Alignment |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 30 - Structure Alignment (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 31 - Structural Classification of Proteins (SCOP) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 32 - SCOP (Continued...), Symmetry in Proteins |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 33 - Symmetry in Proteins |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 34 - Discriminating Biological Protein Interfaces from Crystal Artifacts |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 35 - Discriminating Biological Protein Interfaces from Crystal Artifacts (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 36 - Discriminating Biological Protein Interfaces from Crystal Artifacts (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 37 - Discriminating Biological Protein Interfaces from Crystal Artifacts (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 38 - Symmetry-Based Protein Complex Modeling |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 39 - Some Protein Docking Methods |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 40 - Some Protein Docking Methods (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 41 - Computational Protein Design (CPD) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 42 - Computational Protein Design (CPD) (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 43 - Protein Design Energy Function |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 44 - Protein Design Analysis |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 45 - Application of Protein Design on Drug Design |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 46 - RECM in Protein Design |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 47 - Application of Protein Design on Drug Design |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 48 - Application of Protein Design on Drug Design (Continued...), Protein Modification |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 49 - Protein Modification (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 50 - Protein Modification (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 51 - Assigning Secondary Structure to Protein Sequence |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 52 - Assigning Secondary Structure to Protein Sequence (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 53 - Machine Learning to Predict the Secondary Structure from Amino Acid Sequences |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 54 - Machine Learning to Predict the Secondary Structure from Amino Acid Sequences (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 55 - Post Translational Modification |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 56 - Predicting Protein Phosphorylation Sites |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 57 - Predicting Protein Phosphorylation Sites (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 58 - Summarizing Protein Folding and Protein Docking |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 59 - Summarizing Protein Folding and Protein Docking (Continued...) |
Link |
NOC:Algorithms for Protein Modelling and Engineering |
Lecture 60 - Summarizing Potein Engineering |
Link |
NOC:Programming in Modern C++ |
Lecture 1 - Course Outline |
Link |
NOC:Programming in Modern C++ |
Lecture 2 - Quick Recap 01: Recap of C/1 |
Link |
NOC:Programming in Modern C++ |
Lecture 3 - Quick Recap 02: Recap of C/2 |
Link |
NOC:Programming in Modern C++ |
Lecture 4 - Course Overview |
Link |
NOC:Programming in Modern C++ |
Lecture 5 - IO and Loop |
Link |
NOC:Programming in Modern C++ |
Lecture 6 - Arrays and Strings |
Link |
NOC:Programming in Modern C++ |
Lecture 7 - Sorting and Searching |
Link |
NOC:Programming in Modern C++ |
Lecture 8 - Stack and Common Data Structures/Containers |
Link |
NOC:Programming in Modern C++ |
Lecture 9 - Tutorial 1: How to build a C/C++ program?: Part 1: C Preprocessor (CPP) |
Link |
NOC:Programming in Modern C++ |
Lecture 10 - Constants and Inline Functions |
Link |
NOC:Programming in Modern C++ |
Lecture 11 - Reference and Pointer |
Link |
NOC:Programming in Modern C++ |
Lecture 12 - Default Parameters and Function Overloading |
Link |
NOC:Programming in Modern C++ |
Lecture 13 - Operator Overloading |
Link |
NOC:Programming in Modern C++ |
Lecture 14 - Dynamic Memory Management |
Link |
NOC:Programming in Modern C++ |
Lecture 15 - Tutorial 2: How to build a C/C++ program?: Part 2: Build Pipeline |
Link |
NOC:Programming in Modern C++ |
Lecture 16 - Static Members |
Link |
NOC:Programming in Modern C++ |
Lecture 17 - Classes and Objects |
Link |
NOC:Programming in Modern C++ |
Lecture 18 - Access Specifiers |
Link |
NOC:Programming in Modern C++ |
Lecture 19 - Constructors, Destructors and Object Lifetime |
Link |
NOC:Programming in Modern C++ |
Lecture 20 - Copy Constructor and Copy Assignment Operator |
Link |
NOC:Programming in Modern C++ |
Lecture 21 - Const-ness |
Link |
NOC:Programming in Modern C++ |
Lecture 22 - Tutorial 3: How to build a C/C++ program?: Part 3: make Utility |
Link |
NOC:Programming in Modern C++ |
Lecture 23 - Inheritance: Part 3 (Constructor and Destructor - Object Lifetime) |
Link |
NOC:Programming in Modern C++ |
Lecture 24 - Friend Function and Friend Class |
Link |
NOC:Programming in Modern C++ |
Lecture 25 - Overloading Operator for User-Defined Types: Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 26 - Overloading Operator for User-Defined Types: Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 27 - Namespace |
Link |
NOC:Programming in Modern C++ |
Lecture 28 - Tutorial 4: How to build a C/C++ program?: Part 4: Static and Dynamic Library |
Link |
NOC:Programming in Modern C++ |
Lecture 29 - Inheritance: Part 2 (Data Member and Member Function - Override and Overload) |
Link |
NOC:Programming in Modern C++ |
Lecture 30 - Inheritance: Part 3 (Constructor and Destructor - Object Lifetime) |
Link |
NOC:Programming in Modern C++ |
Lecture 31 - Inheritance: Part 4: Phone Hierarchy |
Link |
NOC:Programming in Modern C++ |
Lecture 32 - Inheritance: Part 5: private and protected Inheritance |
Link |
NOC:Programming in Modern C++ |
Lecture 33 - Tutorial 5: Mixing C and C++ Code: Part 1: Issues and Resolutions |
Link |
NOC:Programming in Modern C++ |
Lecture 34 - Polymorphism: Part 1: Type Casting |
Link |
NOC:Programming in Modern C++ |
Lecture 35 - Polymorphism: Part 2: Static and Dynamic Binding |
Link |
NOC:Programming in Modern C++ |
Lecture 36 - Polymorphism: Part 3: Abstract Base Class |
Link |
NOC:Programming in Modern C++ |
Lecture 37 - Polymorphism: Part 4: Staff Salary Processing using C |
Link |
NOC:Programming in Modern C++ |
Lecture 38 - Polymorphism: Part 5: Staff Salary Processing using C++ |
Link |
NOC:Programming in Modern C++ |
Lecture 39 - Tutorial 6: Mixing C and C++ Code: Part 2: Project Example |
Link |
NOC:Programming in Modern C++ |
Lecture 40 - Virtual Function Table |
Link |
NOC:Programming in Modern C++ |
Lecture 41 - Type Casting and Cast Operators: Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 42 - Type Casting and Cast Operators: Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 43 - Type Casting and Cast Operators: Part 3 |
Link |
NOC:Programming in Modern C++ |
Lecture 44 - Multiple Inheritance |
Link |
NOC:Programming in Modern C++ |
Lecture 45 - Tutorial 7: How to design a UDT like built-in types?: Part 1: Fraction UDT |
Link |
NOC:Programming in Modern C++ |
Lecture 46 - Exceptions (Error handling in C): Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 47 - Exceptions (Error handling in C++): Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 48 - Template (Function Template): Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 49 - Template (Class Template): Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 50 - Functors: Function Objects |
Link |
NOC:Programming in Modern C++ |
Lecture 51 - Tutorial 8: How to design a UDT like built-in types?: Part 2: Int and Poly UDT |
Link |
NOC:Programming in Modern C++ |
Lecture 52 - Input-Output: File Handling in C |
Link |
NOC:Programming in Modern C++ |
Lecture 53 - Input-Output: Streams in C++ |
Link |
NOC:Programming in Modern C++ |
Lecture 54 - C++ Standard Library: Part 1 (Generic Programming) |
Link |
NOC:Programming in Modern C++ |
Lecture 55 - C++ Standard Library: Part 2 (STL) |
Link |
NOC:Programming in Modern C++ |
Lecture 56 - C++ Standard Library: Part 3 (STL) |
Link |
NOC:Programming in Modern C++ |
Lecture 57 - Tutorial 9: How to design a UDT like built-in types?: Part 3: Updates and Mixes of UDTs |
Link |
NOC:Programming in Modern C++ |
Lecture 58 - C++11 and beyond: General Features: Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 59 - C++11 and beyond: General Features: Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 60 - C++11 and beyond: General Features: Part 3 |
Link |
NOC:Programming in Modern C++ |
Lecture 61 - C++11 and beyond: General Features: Part 4: Rvalue and Move/1 |
Link |
NOC:Programming in Modern C++ |
Lecture 62 - C++11 and beyond: General Features: Part 5: Rvalue and Move/2 |
Link |
NOC:Programming in Modern C++ |
Lecture 63 - Tutorial 10: How to optimize C++11 programs using Rvalue and Move Semantics? |
Link |
NOC:Programming in Modern C++ |
Lecture 64 - C++11 and beyond: General Features: Part 6: Rvalue and Perfect Forwarding |
Link |
NOC:Programming in Modern C++ |
Lecture 65 - C++11 and beyond: General Features: Part 7: Lambda in C++/1 |
Link |
NOC:Programming in Modern C++ |
Lecture 66 - C++11 and beyond: General Features: Part 8: Lambda in C++/2 |
Link |
NOC:Programming in Modern C++ |
Lecture 67 - C++11 and beyond: Class Features |
Link |
NOC:Programming in Modern C++ |
Lecture 68 - C++11 and beyond: Non-class Types and Template Features |
Link |
NOC:Programming in Modern C++ |
Lecture 69 - Tutorial 11: Compatibility of C and C++: Part 1: Significant Features |
Link |
NOC:Programming in Modern C++ |
Lecture 70 - C++11 and beyond: Resource Management by Smart Pointers: Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 71 - C++11 and beyond: Resource Management by Smart Pointers: Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 72 - C++11 and beyond: Concurrency: Part 1 |
Link |
NOC:Programming in Modern C++ |
Lecture 73 - C++11 and beyond: Concurrency: Part 2 |
Link |
NOC:Programming in Modern C++ |
Lecture 74 - Closing Comments |
Link |
NOC:Programming in Modern C++ |
Lecture 75 - Tutorial 12: Compatibility of C and C++: Part 2: Summary |
Link |
NOC:Blockchain and its Applications |
Lecture 1 - The Model of Decentralization |
Link |
NOC:Blockchain and its Applications |
Lecture 2 - What is Blockchain |
Link |
NOC:Blockchain and its Applications |
Lecture 3 - Basic Cryptographic Primitives - I |
Link |
NOC:Blockchain and its Applications |
Lecture 4 - Basic Cryptographic Primitives - II |
Link |
NOC:Blockchain and its Applications |
Lecture 5 - Basic Cryptographic Primitives - III |
Link |
NOC:Blockchain and its Applications |
Lecture 6 - Basic Cryptographic Primitives - IV |
Link |
NOC:Blockchain and its Applications |
Lecture 7 - Basic Cryptographic Primitives - V |
Link |
NOC:Blockchain and its Applications |
Lecture 8 - Distributed Systems for Decentralization - The Beginning |
Link |
NOC:Blockchain and its Applications |
Lecture 9 - The Evolution of Cryptocurrencies |
Link |
NOC:Blockchain and its Applications |
Lecture 10 - Open Consensus and Bitcoin |
Link |
NOC:Blockchain and its Applications |
Lecture 11 - Bitcoin Mining and Beyond |
Link |
NOC:Blockchain and its Applications |
Lecture 12 - Smart Contracts and the Permissioned Models of Blockchain |
Link |
NOC:Blockchain and its Applications |
Lecture 13 - Blockchain Elements - I |
Link |
NOC:Blockchain and its Applications |
Lecture 14 - Blockchain Elements - II |
Link |
NOC:Blockchain and its Applications |
Lecture 15 - Blockchain Elements - III |
Link |
NOC:Blockchain and its Applications |
Lecture 16 - Blockchain Elements - IV |
Link |
NOC:Blockchain and its Applications |
Lecture 17 - Blockchain Elements - V |
Link |
NOC:Blockchain and its Applications |
Lecture 18 - Permissionless Model and Open Consensus |
Link |
NOC:Blockchain and its Applications |
Lecture 19 - Nakamoto Consensus (Proof of Work) |
Link |
NOC:Blockchain and its Applications |
Lecture 20 - Limitations of PoW: Forking and Security |
Link |
NOC:Blockchain and its Applications |
Lecture 21 - Beyond PoW |
Link |
NOC:Blockchain and its Applications |
Lecture 22 - Ethereum 1 |
Link |
NOC:Blockchain and its Applications |
Lecture 23 - Ethereum 2 |
Link |
NOC:Blockchain and its Applications |
Lecture 24 - Ethereum 3 |
Link |
NOC:Blockchain and its Applications |
Lecture 25 - Ethereum 4 |
Link |
NOC:Blockchain and its Applications |
Lecture 26 - Consensus for Permissioned Models |
Link |
NOC:Blockchain and its Applications |
Lecture 27 - State Machine Replication as Distributed Consensus |
Link |
NOC:Blockchain and its Applications |
Lecture 28 - Paxos |
Link |
NOC:Blockchain and its Applications |
Lecture 29 - Paxos - Safety and Liveness |
Link |
NOC:Blockchain and its Applications |
Lecture 30 - Byzantine Faults |
Link |
NOC:Blockchain and its Applications |
Lecture 31 - Byzantine Agreement Protocols |
Link |
NOC:Blockchain and its Applications |
Lecture 32 - Safety and Liveness of PBFT |
Link |
NOC:Blockchain and its Applications |
Lecture 33 - Enterprise Blockchains |
Link |
NOC:Blockchain and its Applications |
Lecture 34 - Hyperledger Fabric 1 |
Link |
NOC:Blockchain and its Applications |
Lecture 35 - Hyperledger Fabric 2 |
Link |
NOC:Blockchain and its Applications |
Lecture 36 - Hyperledger Fabric 3 |
Link |
NOC:Blockchain and its Applications |
Lecture 37 - Hyperledger Fabric 4 |
Link |
NOC:Blockchain and its Applications |
Lecture 38 - Consensus Scalability |
Link |
NOC:Blockchain and its Applications |
Lecture 39 - Bitcoin-NG |
Link |
NOC:Blockchain and its Applications |
Lecture 40 - Collective Signing (CoSi) |
Link |
NOC:Blockchain and its Applications |
Lecture 41 - ByzCoin |
Link |
NOC:Blockchain and its Applications |
Lecture 42 - Algorand |
Link |
NOC:Blockchain and its Applications |
Lecture 43 - Identity Management - I |
Link |
NOC:Blockchain and its Applications |
Lecture 44 - Identity Management - II |
Link |
NOC:Blockchain and its Applications |
Lecture 45 - Identity Management - III |
Link |
NOC:Blockchain and its Applications |
Lecture 46 - Blockchain Interoperability - I |
Link |
NOC:Blockchain and its Applications |
Lecture 47 - Blockchain Interoperability - II |
Link |
NOC:Blockchain and its Applications |
Lecture 48 - Blockchain Interoperability - III |
Link |
NOC:Blockchain and its Applications |
Lecture 49 - Hyperledger Indy - I |
Link |
NOC:Blockchain and its Applications |
Lecture 50 - Hyperledger Indy - II |
Link |
NOC:Blockchain and its Applications |
Lecture 51 - Hyperledger Aries |
Link |
NOC:Blockchain and its Applications |
Lecture 52 - Blockchain Security - I |
Link |
NOC:Blockchain and its Applications |
Lecture 53 - Blockchain Security - II |
Link |
NOC:Blockchain and its Applications |
Lecture 54 - Blockchain Security - III |
Link |
NOC:Blockchain and its Applications |
Lecture 55 - Use Cases |
Link |
NOC:Blockchain and its Applications |
Lecture 56 - A Potential Use Case From a Critics Perspective |
Link |
NOC:Blockchain and its Applications |
Lecture 57 - Blockchain in Financial Services |
Link |
NOC:Blockchain and its Applications |
Lecture 58 - Public Sector Use Cases |
Link |
NOC:Blockchain and its Applications |
Lecture 59 - Blockchain for Decentralized Marketplace - Part 1 |
Link |
NOC:Blockchain and its Applications |
Lecture 60 - Blockchain for Decentralized Marketplace - Part 2 |
Link |
NOC:Algorithmic Game Theory |
Lecture 1 - Introduction |
Link |
NOC:Algorithmic Game Theory |
Lecture 2 - Assumptions of Game Theory |
Link |
NOC:Algorithmic Game Theory |
Lecture 3 - Examples of Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 4 - Equilibrium Concepts |
Link |
NOC:Algorithmic Game Theory |
Lecture 5 - Nash Equilibrium |
Link |
NOC:Algorithmic Game Theory |
Lecture 6 - Indifference Principle |
Link |
NOC:Algorithmic Game Theory |
Lecture 7 - Security of Players |
Link |
NOC:Algorithmic Game Theory |
Lecture 8 - Minmax Theorem |
Link |
NOC:Algorithmic Game Theory |
Lecture 9 - Implications of Minmax Theorem |
Link |
NOC:Algorithmic Game Theory |
Lecture 10 - MSNEs of Matrix Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 11 - Iterative Eliminations of Dominated Strategies |
Link |
NOC:Algorithmic Game Theory |
Lecture 12 - Iterative Eliminations of Dominated Strategies (Continued...) |
Link |
NOC:Algorithmic Game Theory |
Lecture 13 - Braess's paradox |
Link |
NOC:Algorithmic Game Theory |
Lecture 14 - Yao's Lemma and its applications |
Link |
NOC:Algorithmic Game Theory |
Lecture 15 - Support Enumeration Algorithm |
Link |
NOC:Algorithmic Game Theory |
Lecture 16 - Succinct game |
Link |
NOC:Algorithmic Game Theory |
Lecture 17 - Potential Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 18 - Best Response Dynamics |
Link |
NOC:Algorithmic Game Theory |
Lecture 19 - Fast Convergence of Best Response Dynamics |
Link |
NOC:Algorithmic Game Theory |
Lecture 20 - Computing ε-PSNE for Network Congestion Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 21 - PSNE for Congestion Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 22 - PSNE for Symmetric Congestion Games |
Link |
NOC:Algorithmic Game Theory |
Lecture 23 - Functional NP |
Link |
NOC:Algorithmic Game Theory |
Lecture 24 - PPAD Class |
Link |
NOC:Algorithmic Game Theory |
Lecture 25 - Sperner's Lemma |
Link |
NOC:Algorithmic Game Theory |
Lecture 26 - Approximate MSNE Computation |
Link |
NOC:Algorithmic Game Theory |
Lecture 27 - Correlated Equilibrium |
Link |
NOC:Algorithmic Game Theory |
Lecture 28 - Coarse Correlated Equilibrium |
Link |
NOC:Algorithmic Game Theory |
Lecture 29 - External Regret Framework |
Link |
NOC:Algorithmic Game Theory |
Lecture 30 - Multiplicative Weight Algorithm |
Link |
NOC:Algorithmic Game Theory |
Lecture 31 - Multiplicative Weight Algorithm (Continued....) |
Link |
NOC:Algorithmic Game Theory |
Lecture 32 - Swap Regret and Correlated Equilibrium |
Link |
NOC:Algorithmic Game Theory |
Lecture 33 - Swap Regret to External Regret Reduction |
Link |
NOC:Algorithmic Game Theory |
Lecture 34 - Braess's paradox and Pigou's Network |
Link |
NOC:Algorithmic Game Theory |
Lecture 35 - PoA of Selfish Routing Game |
Link |
NOC:Algorithmic Game Theory |
Lecture 36 - PoA of Selfish Load Balancing Game |
Link |
NOC:Algorithmic Game Theory |
Lecture 37 - Bayesian Game |
Link |
NOC:Algorithmic Game Theory |
Lecture 38 - BNE of First Price Auction |
Link |
NOC:Algorithmic Game Theory |
Lecture 39 - Extensive Form Game |
Link |
NOC:Algorithmic Game Theory |
Lecture 40 - Mechanism Design Introduction |
Link |
NOC:Algorithmic Game Theory |
Lecture 41 - Implementation of Social Choice Functions |
Link |
NOC:Algorithmic Game Theory |
Lecture 42 - Revelation Principle |
Link |
NOC:Algorithmic Game Theory |
Lecture 43 - Properties of Social Choice Function |
Link |
NOC:Algorithmic Game Theory |
Lecture 44 - Gibbard-Satterthwaite Theorem |
Link |
NOC:Algorithmic Game Theory |
Lecture 45 - Quasilinear Environment |
Link |
NOC:Algorithmic Game Theory |
Lecture 46 - Ex-Post Efficiency |
Link |
NOC:Algorithmic Game Theory |
Lecture 47 - VCG Mechanism |
Link |
NOC:Algorithmic Game Theory |
Lecture 48 - Example of VCG Mechanism |
Link |
NOC:Algorithmic Game Theory |
Lecture 49 - Weighted VCG |
Link |
NOC:Algorithmic Game Theory |
Lecture 50 - Affine Maximizer |
Link |
NOC:Algorithmic Game Theory |
Lecture 51 - Recap of Topics Discussed so Far |
Link |
NOC:Algorithmic Game Theory |
Lecture 52 - Single Parameter Domain |
Link |
NOC:Algorithmic Game Theory |
Lecture 53 - DSIC in Single Parameter Domain |
Link |
NOC:Algorithmic Game Theory |
Lecture 54 - Mayerson's Lemma |
Link |
NOC:Algorithmic Game Theory |
Lecture 55 - Sponsored Search Auction |
Link |
NOC:Algorithmic Game Theory |
Lecture 56 - Intermediate Domain |
Link |
NOC:Algorithmic Game Theory |
Lecture 57 - Algorithmic Mechanism Design |
Link |
NOC:Algorithmic Game Theory |
Lecture 58 - Stable Matching |
Link |
NOC:Algorithmic Game Theory |
Lecture 59 - Gale-Shapley Algorithm |
Link |
NOC:Algorithmic Game Theory |
Lecture 60 - Properties of Stable Matching |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 1 - Introduction |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 2 - Basics of Spatio-Temporal Modeling |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 3 - Geostatistical Equation for Spatio-Temporal Process |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 4 - Gaussian Process Regression and Inverse Problems |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 5 - Anomaly Event Detection |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 6 - Extreme Events |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 7 - Extreme Value Theory |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 8 - Causality |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 9 - Networks |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 10 - Data Assimilation |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 11 - Challenges and Opportunities for ML in ESS |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 12 - Types of Machine Learning Problems in ESS |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 13 - Convolutional Networks for Spatial Problems |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 14 - Sequential Models for Temporal Problems |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 15 - Probabilistic Models for Earth System Science |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 16 - Identification of Indian Monsoon Predictors |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 17 - Statistical Downscaling of Rainfall with Machine Learning |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 18 - Detection of Anomaly and Extreme Events |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 19 - Identifying Causal Relations from Time-Series - 1 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 20 - Identifying Causal Relations from Time-Series - 2 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 21 - Spatio-Temporal Modelling of Extremes |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 22 - Hierarchical Bayesian Models for Spatio-Temporal Processes |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 23 - Geostatistical modelling for mapping based on in-situ measurements |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 24 - Nowcasting of Extreme Weather Events |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 25 - Discovering Clustered Weather Patterns |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 26 - Interpretable Machine Learning for Earth System Science |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 27 - Object Detection in Satellite Imagery - 1 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 28 - Object Detection in Satellite Imagery - 2 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 29 - Image Fusion from Multiple Sources for Remote Sensing |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 30 - Image Segmentation for Remote Sensing |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 31 - Satellite Imagery as a Proxy for Geophysical Measurements |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 32 - Precipitation Nowcasting from Remote Sensing |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 33 - Deep Domain Adaptation for Remote Sensing |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 34 - Introduction to Earth System Modelling |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 35 - Stochastic Weather Generator |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 36 - Physics-Inspired Machine Learning for Process Models - 1 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 37 - Physics-Inspired Machine Learning for Process Models - 2 |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 38 - Parameterizations for Sub-Grid Processes Using ML |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 39 - Data Assimilation for Earth System Model Correction |
Link |
NOC:Machine Learning for Earth System Sciences |
Lecture 40 - ML for Climate Change Projection and Course Conclusion |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 1 - Introduction to Reliability Engineering |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 2 - Introduction to Statistical Methods in Reliability |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 3 - Concept of Probability and Probability Theory |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 4 - Tutorial on Introduction to RE, SL and Probability Theory - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 5 - Conditional, Total and Reverse Probability |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 6 - Tutorial on Conditional Probability and Total Probability |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 7 - Introduction to Probability Distributions |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 8 - Introduction to Probability Distributions (Continued...) |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 9 - Discrete Probability Distribution - Part 1 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 10 - Discrete Probability Distribution - Part 2 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 11 - Tutorial on Discrete Probability Distributions |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 12 - Continuous Probability Distributions - Part 1 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 13 - Continuous Probability Distributions - Part 2 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 14 - Tutorial on Continuous Probability Distribution Functions - Part 1 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 15 - Tutorial on Continuous Probability Distribution Functions - Part 2 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 16 - Sampling Distributions - Part 1 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 17 - Sampling Distributions - Part 2 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 18 - Sampling Distributions - Part 3 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 19 - Sampling Distributions - Part 4 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 20 - Sampling Distributions - Part 5 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 21 - Tutorial on Sampling Distributions |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 22 - Statistical Inference - Part 1 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 23 - Statistical Inference - Part 2 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 24 - Statistical Inference - Part 3 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 25 - Tutorial on Statistical Inference |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 26 - Statistical Inference - Part 4 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 27 - Statistical Inference - Part 5 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 28 - Tutorial on Confidence Interval |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 29 - Statistical Inference - Part 6 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 30 - Statistical Inference - Part 7 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 31 - Statistical Inference - Part 8 |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 32 - ANOVA - I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 33 - ANOVA - II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 34 - ANOVA - III |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 35 - ANOVA - IV |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 36 - ANOVA - V |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 37 - ANOVA - VI |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 38 - Correlation Analysis - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 39 - Correlation Analysis - Part II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 40 - Regression Analysis - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 41 - Regression Analysis - Part II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 42 - Regression Analysis - Part III |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 43 - Tutorial on Relation Analysis |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 44 - Auto-Regression Analysis |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 45 - Logistic Regression - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 46 - Logistic Regression - Part II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 47 - Logistic Regression - Part III |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 48 - Tutorial on Logistic Regression |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 49 - Introduction |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 50 - Bayesian Classification - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 51 - Bayesian Classification - Part II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 52 - k-Nearest Neighbor Classification |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 53 - Tutorial on Classification Techniques |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 54 - Support Vector Machine - Part I |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 55 - Support Vector Machine - Part II |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 56 - Support Vector Machine - Part III |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 57 - Support Vector Machine - Part IV |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 58 - Support Vector Machine - Part V |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 59 - Support Vector Machine - Part VI |
Link |
NOC:Statistical Learning for Reliability Analysis |
Lecture 60 - Tutorial on SVM |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 1 - CPS: Motivational examples and compute platforms |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 2 - CPS: Motivational examples and compute platforms (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 3 - CPS: Motivational examples and compute platforms (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 4 - CPS: Motivational examples and compute platforms (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 5 - CPS: Motivational examples and compute platforms (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 6 - Real time sensing and communication for CPS |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 7 - Real time sensing and communication for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 8 - Real time sensing and communication for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 9 - Real time sensing and communication for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 10 - Real time task scheduling for CPS |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 11 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 12 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 13 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 14 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 15 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 16 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 17 - Real time task scheduling for CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 18 - Dynamical system modeling, stability, controller design |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 19 - Dynamical system modeling, stability, controller design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 20 - Dynamical system modeling, stability, controller design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 21 - Dynamical system modeling, stability, controller design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 22 - Dynamical system modeling, stability, controller design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 23 - Dynamical system modeling, stability, controller design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 24 - Delay-aware Design; Platform effect on Stability/Performance |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 25 - Delay-aware Design; Platform effect on Stability/Performance (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 26 - Delay-aware Design; Platform effect on Stability/Performance (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 27 - Delay-aware Design; Platform effect on Stability/Performance (Continued...) Corrigendum |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 28 - Hybrid Automata based modelling of CPS |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 29 - Hybrid Automata based modelling of CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 30 - Hybrid Automata based modelling of CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 31 - Hybrid Automata based modelling of CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 32 - Hybrid Automata based modelling of CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 33 - Reachability analysis |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 34 - Reachability analysis (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 35 - Reachability analysis (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 36 - Reachability analysis (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 37 - Lyapunov Stability, Barrier Functions |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 38 - Lyapunov Stability, Barrier Functions (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 39 - Lyapunov Stability, Barrier Functions (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 40 - Lyapunov Stability, Barrier Functions (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 41 - Lyapunov Stability, Barrier Functions (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 42 - Lyapunov Stability, Barrier Functions (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 43 - Quadratic Program based safe Controller Design |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 44 - Quadratic Program based safe Controller Design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 45 - Quadratic Program based safe Controller Design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 46 - Quadratic Program based safe Controller Design (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 47 - Neural Network (NN) Based controllers in CPS |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 48 - Neural Network (NN) Based controllers in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 49 - Neural Network (NN) Based controllers in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 50 - State Estimation using Kalman Filters (KF) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 51 - State Estimation using Kalman Filters (KF) (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 52 - Attack Detection and Mitigation in CPS |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 53 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 54 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 55 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 56 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 57 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 58 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Foundations of Cyber Physical Systems |
Lecture 59 - Attack Detection and Mitigation in CPS (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 1 - Introduction to Maximum Flow |
Link |
NOC:Selected Topics in Algorithms |
Lecture 2 - Ford - Fulkerson Method |
Link |
NOC:Selected Topics in Algorithms |
Lecture 3 - Edmond - Karp Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 4 - Edmond - Karp Algorithm (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 5 - Flow Decomposition |
Link |
NOC:Selected Topics in Algorithms |
Lecture 6 - Maximum Bipartite Matching, Fattest Augmenting Path |
Link |
NOC:Selected Topics in Algorithms |
Lecture 7 - Karger's Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 8 - Augmenting Path |
Link |
NOC:Selected Topics in Algorithms |
Lecture 9 - Edmonds Blossom Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 10 - Edmond - Karp Algorithm (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 11 - Introduction to Randomized Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 12 - Polynomial Identity Testing |
Link |
NOC:Selected Topics in Algorithms |
Lecture 13 - Perfect Bipartite Matching, Randomized Quicksort |
Link |
NOC:Selected Topics in Algorithms |
Lecture 14 - Concentration Inequalities: Markov, Chebyshev, Chernoff |
Link |
NOC:Selected Topics in Algorithms |
Lecture 15 - Proof of Chernoff Bound |
Link |
NOC:Selected Topics in Algorithms |
Lecture 16 - Coupon Collector Problem |
Link |
NOC:Selected Topics in Algorithms |
Lecture 17 - Balls and Bins |
Link |
NOC:Selected Topics in Algorithms |
Lecture 18 - Balls and Bins (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 19 - Two Point Sampling |
Link |
NOC:Selected Topics in Algorithms |
Lecture 20 - Randomized Algorithm for 2 SAT |
Link |
NOC:Selected Topics in Algorithms |
Lecture 21 - Markov Chain, Periodicity, Stationary Distribution |
Link |
NOC:Selected Topics in Algorithms |
Lecture 22 - Mixing Time, Reversible Markov Chain |
Link |
NOC:Selected Topics in Algorithms |
Lecture 23 - Metropolis Algorithm, Markov Chain on Independent Sets |
Link |
NOC:Selected Topics in Algorithms |
Lecture 24 - Random Walk on Cycles |
Link |
NOC:Selected Topics in Algorithms |
Lecture 25 - Shuffling Cards |
Link |
NOC:Selected Topics in Algorithms |
Lecture 26 - Monte Carlo Method, Hitting Time, Cover Time |
Link |
NOC:Selected Topics in Algorithms |
Lecture 27 - DNF Counting |
Link |
NOC:Selected Topics in Algorithms |
Lecture 28 - DNF Counting (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 29 - Counting Independent Sets of a Graph |
Link |
NOC:Selected Topics in Algorithms |
Lecture 30 - Counting Independent Sets of a Graph (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 31 - Introduction of NP, co-NP, and P |
Link |
NOC:Selected Topics in Algorithms |
Lecture 32 - Turing Reduction, Karp Reduction |
Link |
NOC:Selected Topics in Algorithms |
Lecture 33 - NP - Completeness of 3SAT |
Link |
NOC:Selected Topics in Algorithms |
Lecture 34 - NP - Completeness of Independent Set |
Link |
NOC:Selected Topics in Algorithms |
Lecture 35 - NP - Completeness of vertex cover and clique |
Link |
NOC:Selected Topics in Algorithms |
Lecture 36 - NP - Completeness of 3-coloring |
Link |
NOC:Selected Topics in Algorithms |
Lecture 37 - NP - Completeness of Subset sum and Knapsack |
Link |
NOC:Selected Topics in Algorithms |
Lecture 38 - NP - Completeness of set cover, Weak and Strong NP - completeness |
Link |
NOC:Selected Topics in Algorithms |
Lecture 39 - Self Reduction |
Link |
NOC:Selected Topics in Algorithms |
Lecture 40 - Randomized Approximation Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 41 - Derandomization |
Link |
NOC:Selected Topics in Algorithms |
Lecture 42 - Travelling Salesman Problem |
Link |
NOC:Selected Topics in Algorithms |
Lecture 43 - 2-Factor Approximation Algorithm for Metric TSP |
Link |
NOC:Selected Topics in Algorithms |
Lecture 44 - 1.5-Factor Approximation Algorithm for Metric TSP |
Link |
NOC:Selected Topics in Algorithms |
Lecture 45 - Approximation Algorithm for Set Cover |
Link |
NOC:Selected Topics in Algorithms |
Lecture 46 - FPTAS for Knapsack |
Link |
NOC:Selected Topics in Algorithms |
Lecture 47 - Introduction to Linear Program |
Link |
NOC:Selected Topics in Algorithms |
Lecture 48 - Introduction to Linear Program (Continued...,) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 49 - Dual Fitting |
Link |
NOC:Selected Topics in Algorithms |
Lecture 50 - Dual Fitting (Continued...) |
Link |
NOC:Selected Topics in Algorithms |
Lecture 51 - Dual Fitting |
Link |
NOC:Selected Topics in Algorithms |
Lecture 52 - Set Cover using LP rounding |
Link |
NOC:Selected Topics in Algorithms |
Lecture 53 - Vertex Cover using reduction to set cover |
Link |
NOC:Selected Topics in Algorithms |
Lecture 54 - Vertex Cover LP |
Link |
NOC:Selected Topics in Algorithms |
Lecture 55 - Randomized Rounding |
Link |
NOC:Selected Topics in Algorithms |
Lecture 56 - Primal Dual Scheme |
Link |
NOC:Selected Topics in Algorithms |
Lecture 57 - Introduction to Parameterized Algorithm |
Link |
NOC:Selected Topics in Algorithms |
Lecture 58 - Faster FPT Algorithm for Vertex Cover |
Link |
NOC:Selected Topics in Algorithms |
Lecture 59 - Introduction to Kernelization |
Link |
NOC:Selected Topics in Algorithms |
Lecture 60 - Linear Programming Based Kernels |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 1 - AI/ML চারপাশের নানা উদাহরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 2 - AI/ML এর উপকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 3 - Supervised and Unsupervised Learning (তত্ত্বাবধানে ও তত্ত্বাবধানহীন শিক্ষা) |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 4 - ML Model ও Algorithm/লেকচার 04 : এমএল মডেল ও অ্যালগরিদম |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 5 - AI/ML problem -এর গঠন /এআই/এমএল সমস্যা - এর গঠন |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 6 - K-nearest-neighbor classification/regression/K-নিকটবর্তী-প্রতিবেশী শ্রেণীবিভাগ/রিগ্রেশন |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 7 - নৈপুণ্যের পরিমাপ : Accuracy, Precision, Recall, Confusion |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 8 - Discriminative Feature Selection |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 9 - Decision Tree Algorithm/সিদ্ধান্তলতিকা |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 10 - Classifier -এর সমষ্টি ও Random Forests |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 11 - Probability Theory িফের έদখ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 12 - Bayesian এবং Naïve Bayes Classifier |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 13 - Linear Algebra িফের έদখা |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 14 - Linear Classifiers এবং Perceptron Algorithm |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 15 - Multi-class Linear Classifier এবং Logistic Regression |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 16 - Optimization িফের έদখা |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 17 - Linear (সরল) ও Regularized (পিরেশািধত) Regression |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 18 - Max-margin Linear Classification/সেবাЗκ বҝবধােনর έϜণীিবভাজন |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 19 - কৃΝϏম ѹায়ুতϴ/Basic Neural Networks |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 20 - Neural Network গঠন ও Backpropagation |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 21 - Overfitting and Underfitting |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 22 - Boosting-এর মাধҝেম সমΜѭবд অনুমান |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 23 - Data র মাϏা (dimensionality) িনয়ϴণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 24 - লেকচার ২৪ঃ শ্রেণী ও বৈশিষ্টের মানের অসাম্য |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 25 - Supervised Learning অিভযান |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 26 - Hierarchical Clustering/স্তরভিত্তিক গোষ্ঠীকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 27 - K-means Clustering/ K-গড় গোষ্ঠীকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 28 - Evaluation of Clustering/গোষ্ঠীকরণের মূল্যায়ন |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 29 - Mean-shift এবং DB-Scan গোষ্ঠীকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 30 - Graph-based Clustering/গোষ্ঠীকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 31 - Time-series/সময়ক্রমের বিশ্লেষণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 32 - ব্যতিক্রমী উদাহরণ চিহ্নিতকরণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 33 - Image/চিত্র বিশ্লেষণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 34 - Neural Features for Images |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 35 - লিখিত Data ও ভাষা বিশ্লেষণ |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 36 - Sequential Neural Models and Natural Language Processing |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 37 - সৃষ্টিমূলক/Generative Models, Reinforcement Learning |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 38 - Transfer Learning and Domain Adaptation |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 39 - নীতি, নিরপেক্ষতা ও বোধগম্যতা |
Link |
NOC:Foundations and Applications of Machine Learning (Bengali) |
Lecture 40 - Machine Learning for Climate Sciences |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 1 - Network Data - Some Stories !! |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 2 - The Stable Matching Algorithm |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 3 - Uncertainty in Financial Markets : Idea of Hedging |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 4 - Uncertainty in Financial Markets : Idea of Hedging (Continued...) |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 5 - Uncertainty in Financial Markets : Idea of Hedging (Continued...) |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 6 - Unconstrained Optimization |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 7 - Constrained Optimization |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 8 - Heuristic Search Techniques |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 9 - Multi-objective Heuristic Search and Game Trees |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 10 - Clustering and Segmentation |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 11 - Decision Tree and Random Forest |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 12 - Linear Regression and Classifiers |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 13 - Uncertainty Modeling |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 14 - Neural Networks |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 15 - Deep Learning for Time Series Forecasting |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 16 - Causality in Time-Series |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 17 - Interventional Causality and Attribution |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 18 - Game Theory |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 19 - Game Theory (Continued...) |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 20 - Game Theory (Continued...) Games with Incomplete Information |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 21 - Game Theory (Continued...) Games with Incomplete Information (Continued...) |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 22 - Game Theory - Sequential Games |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 23 - Game Theory - Rubenstein Bargaining |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 24 - Network Economics |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 25 - Network Economics (Continued...) |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 26 - Introduction to Auction Theory |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 27 - Second Price Auction |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 28 - First Price Auction |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 29 - Overview of Mechanism Design |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 30 - Groves Mechanism |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 31 - VCG Mechanism |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 32 - Single Parameter Domain and Myerson Lemma |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 33 - Sponsored Search Auction |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 34 - Single Peaked Domain and Median Voting |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 35 - Dimensionality Reduction (Principal Component Analysis) – The Math Prerequisites |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 36 - Dimensionality Reduction (Principal Component Analysis) – The Technique |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 37 - Agent-based Modeling for Economics |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 38 - Computer Vision for Economics |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 39 - Text Mining and NLP for Economics |
Link |
NOC:Artificial Intelligence for Economics |
Lecture 40 - Bias, Fairness, Ethics and Interpretability in AI |
Link |
NOC:Approximation Algorithm |
Lecture 1 - Overview of NP-completeness and How to Tackle It |
Link |
NOC:Approximation Algorithm |
Lecture 2 - Deterministic Rounding of Linear Program: An Approximation Algorithm for Weighted |
Link |
NOC:Approximation Algorithm |
Lecture 3 - Overview of LP Duality and Complementary Slackness |
Link |
NOC:Approximation Algorithm |
Lecture 4 - Dual Rounding: An Approximation Algorithm for Weighted Set Cover |
Link |
NOC:Approximation Algorithm |
Lecture 5 - Primal dual method for Weighted Set Cover |
Link |
NOC:Approximation Algorithm |
Lecture 6 - Greedy algorithm for Weighted Set Cover |
Link |
NOC:Approximation Algorithm |
Lecture 7 - Dual Fitting Analysis of Greedy Set Cover |
Link |
NOC:Approximation Algorithm |
Lecture 8 - Randomized Rounding Algorithm for Weighted Set Cover |
Link |
NOC:Approximation Algorithm |
Lecture 9 - Scheduling Jobs with Deadlines and Release Dates on a Single Machine |
Link |
NOC:Approximation Algorithm |
Lecture 10 - The k-Center Problem |
Link |
NOC:Approximation Algorithm |
Lecture 11 - Local Search Algorithm for Scheduling Jobs on Multiple Identical Machines |
Link |
NOC:Approximation Algorithm |
Lecture 12 - Greedy Algorithm for Scheduling Jobs on Multiple Identical Machines |
Link |
NOC:Approximation Algorithm |
Lecture 13 - Inapproximability of the Traveling Salesman problem |
Link |
NOC:Approximation Algorithm |
Lecture 14 - 2-Approximation Algorithm for Metric TSP |
Link |
NOC:Approximation Algorithm |
Lecture 15 - 1.5-Approximation Algorithm for Metric TSP |
Link |
NOC:Approximation Algorithm |
Lecture 16 - Edge Coloring |
Link |
NOC:Approximation Algorithm |
Lecture 17 - Pseudo Polynomial Time Algorithm for Knapsack |
Link |
NOC:Approximation Algorithm |
Lecture 18 - FPTAS for Knapsack |
Link |
NOC:Approximation Algorithm |
Lecture 19 - PTAS for Minimizing Makespan for Scheduling Jobs on Constant Number of Machines |
Link |
NOC:Approximation Algorithm |
Lecture 20 - PTAS for Minimizing Makespan for Scheduling Jobs on Parallel Identical Machines |
Link |
NOC:Approximation Algorithm |
Lecture 21 - PTAS for Minimizing Makespan for Scheduling Jobs on Parallel Identical Machines (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 22 - An APTAS for Bin Packing |
Link |
NOC:Approximation Algorithm |
Lecture 23 - An APTAS for Bin Packing (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 24 - 2 Factor Approximation Algorithm for Scheduling Unweighted Jobs on a Single Machine |
Link |
NOC:Approximation Algorithm |
Lecture 25 - 3 Factor Approximation Algorithm for Scheduling Weighted Jobs on a Single Machine |
Link |
NOC:Approximation Algorithm |
Lecture 26 - A Polynomial Time Separation Oracle for Scheduling Weighted Jobs on a Single Machine |
Link |
NOC:Approximation Algorithm |
Lecture 27 - 3 Factor Approximation Algorithm for Prize Collecting Steiner Tree |
Link |
NOC:Approximation Algorithm |
Lecture 28 - 3 Factor Approximation Algorithm for Prize Collecting Steiner Tree (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 29 - A 4 Factor Approximation Algorithm for Uncapacitated Facility Location Problem |
Link |
NOC:Approximation Algorithm |
Lecture 30 - A 4 Factor Approximation Algorithm for Uncapacitated Facility Location Problem (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 31 - A 4 Factor Approximation Algorithm for Uncapacitated Facility Location Problem (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 32 - Randomized 1/2 Factor Approximation Algorithm for MAX-SAT and MAX-CUT |
Link |
NOC:Approximation Algorithm |
Lecture 33 - Derandomization using Method of Conditional Expectation |
Link |
NOC:Approximation Algorithm |
Lecture 34 - Flipping Biased Coin for Better Than .5 Approximation Algorithm for Max-SAT |
Link |
NOC:Approximation Algorithm |
Lecture 35 - Randomized Rounding Based (1-1/e) Factor Approximation Algorithm for Max-SAT |
Link |
NOC:Approximation Algorithm |
Lecture 36 - Best of Two Solutions for Max-SAT |
Link |
NOC:Approximation Algorithm |
Lecture 37 - Nonlinear Rounding for Max-SAT |
Link |
NOC:Approximation Algorithm |
Lecture 38 - Randomized Rounding for Prize Collecting Steiner Tree |
Link |
NOC:Approximation Algorithm |
Lecture 39 - Randomized Rounding for Prize Collecting Steiner Tree (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 40 - Randomized Rounding for Uncapacitated Facility Location |
Link |
NOC:Approximation Algorithm |
Lecture 41 - Chernoff Bound |
Link |
NOC:Approximation Algorithm |
Lecture 42 - Chernoff Bound (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 43 - Integer Multicommodity Flow |
Link |
NOC:Approximation Algorithm |
Lecture 44 - Primal-dual Algorithm for Minimum Weighted Feedback Vertex Set |
Link |
NOC:Approximation Algorithm |
Lecture 45 - Primal-dual Algorithm for Minimum Weighted Feedback Vertex Set (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 46 - Primal-dual Algorithm for Minimum Weighted Feedback Vertex Set (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 47 - Primal-dual Algorithm for Steiner Forest |
Link |
NOC:Approximation Algorithm |
Lecture 48 - Primal-dual Algorithm for Steiner Forest (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 49 - Primal-dual Algorithm for Steiner Forest (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 50 - 2-Approximation Algorithm for Multiway Cut |
Link |
NOC:Approximation Algorithm |
Lecture 51 - 3/2-Approximation Algorithm for Multiway Cut |
Link |
NOC:Approximation Algorithm |
Lecture 52 - 3/2-Approximation Algorithm for Multiway Cut (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 53 - Approximation Algorithm for Multicut |
Link |
NOC:Approximation Algorithm |
Lecture 54 - Approximation Algorithm for Multicut (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 55 - Approximation Algorithm for Multicut (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 56 - Introduction to Semidefinite Program |
Link |
NOC:Approximation Algorithm |
Lecture 57 - SDP Based Approximation Algorithm for Max Cut |
Link |
NOC:Approximation Algorithm |
Lecture 58 - SDP Based Approximation Algorithm for Max Cut (Continued...) |
Link |
NOC:Approximation Algorithm |
Lecture 59 - Inapproximability of Scheduling Jobs on Multiple Non-identical Machines |
Link |
NOC:Approximation Algorithm |
Lecture 60 - Inapproximability of Edge Disjoint Path |
Link |
Pattern Recognition |
Lecture 1 - Principles of Pattern Recognition I (Introduction and Uses) |
Link |
Pattern Recognition |
Lecture 2 - Principles of Pattern Recognition II (Mathematics) |
Link |
Pattern Recognition |
Lecture 3 - Principles of Pattern Recognition III (Classification and Bayes Decision Rule) |
Link |
Pattern Recognition |
Lecture 4 - Clustering vs. Classification |
Link |
Pattern Recognition |
Lecture 5 - Relevant Basics of Linear Algebra, Vector Spaces |
Link |
Pattern Recognition |
Lecture 6 - Eigen Value and Eigen Vectors |
Link |
Pattern Recognition |
Lecture 7 - Vector Spaces |
Link |
Pattern Recognition |
Lecture 8 - Rank of Matrix and SVD |
Link |
Pattern Recognition |
Lecture 9 - Types of Errors |
Link |
Pattern Recognition |
Lecture 10 - Examples of Bayes Decision Rule |
Link |
Pattern Recognition |
Lecture 11 - Normal Distribution and Parameter Estimation |
Link |
Pattern Recognition |
Lecture 12 - Training Set, Test Set |
Link |
Pattern Recognition |
Lecture 13 - Standardization, Normalization, Clustering and Metric Space |
Link |
Pattern Recognition |
Lecture 14 - Normal Distribution and Decision Boundaries I |
Link |
Pattern Recognition |
Lecture 15 - Normal Distribution and Decision Boundaries II |
Link |
Pattern Recognition |
Lecture 16 - Bayes Theorem |
Link |
Pattern Recognition |
Lecture 17 - Linear Discriminant Function and Perceptron |
Link |
Pattern Recognition |
Lecture 18 - Perceptron Learning and Decision Boundaries |
Link |
Pattern Recognition |
Lecture 19 - Linear and Non-Linear Decision Boundaries |
Link |
Pattern Recognition |
Lecture 20 - K-NN Classifier |
Link |
Pattern Recognition |
Lecture 21 - Principal Component Analysis (PCA) |
Link |
Pattern Recognition |
Lecture 22 - Fisher’s LDA |
Link |
Pattern Recognition |
Lecture 23 - Gaussian Mixture Model (GMM) |
Link |
Pattern Recognition |
Lecture 24 - Assignments |
Link |
Pattern Recognition |
Lecture 25 - Basics of Clustering, Similarity/Dissimilarity Measures, Clustering Criteria. |
Link |
Pattern Recognition |
Lecture 26 - K-Means Algorithm and Hierarchical Clustering |
Link |
Pattern Recognition |
Lecture 27 - K-Medoids and DBSCAN |
Link |
Pattern Recognition |
Lecture 28 - Feature Selection : Problem statement and Uses |
Link |
Pattern Recognition |
Lecture 29 - Feature Selection : Branch and Bound Algorithm |
Link |
Pattern Recognition |
Lecture 30 - Feature Selection : Sequential Forward and Backward Selection |
Link |
Pattern Recognition |
Lecture 31 - Cauchy Schwartz Inequality |
Link |
Pattern Recognition |
Lecture 32 - Feature Selection Criteria Function: Probabilistic Separability Based |
Link |
Pattern Recognition |
Lecture 33 - Feature Selection Criteria Function: Interclass Distance Based |
Link |
Pattern Recognition |
Lecture 34 - Principal Components |
Link |
Pattern Recognition |
Lecture 35 - Comparison Between Performance of Classifiers |
Link |
Pattern Recognition |
Lecture 36 - Basics of Statistics, Covariance, and their Properties |
Link |
Pattern Recognition |
Lecture 37 - Data Condensation, Feature Clustering, Data Visualization |
Link |
Pattern Recognition |
Lecture 38 - Probability Density Estimation |
Link |
Pattern Recognition |
Lecture 39 - Visualization and Aggregation |
Link |
Pattern Recognition |
Lecture 40 - Support Vector Machine (SVM) |
Link |
Pattern Recognition |
Lecture 41 - FCM and Soft-Computing Techniques |
Link |
Pattern Recognition |
Lecture 42 - Examples of Uses or Application of Pattern Recognition; And When to do clustering |
Link |
Pattern Recognition |
Lecture 43 - Examples of Real-Life Dataset |
Link |
Performance Evaluation of Computer Systems |
Lecture 1 - Introduction to performance evaluation of computer systems |
Link |
Performance Evaluation of Computer Systems |
Lecture 2 - How to avoid common mistakes |
Link |
Performance Evaluation of Computer Systems |
Lecture 3 - Selection of techniques and metrics |
Link |
Performance Evaluation of Computer Systems |
Lecture 4 - Case study: Selection of techniques and metrics |
Link |
Performance Evaluation of Computer Systems |
Lecture 5 - Random Variables and probability distributions |
Link |
Performance Evaluation of Computer Systems |
Lecture 6 - Probability distributions - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 7 - Probability distributions - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 8 - Probability distributions - III |
Link |
Performance Evaluation of Computer Systems |
Lecture 9 - Stochastic process |
Link |
Performance Evaluation of Computer Systems |
Lecture 10 - Markov Chain |
Link |
Performance Evaluation of Computer Systems |
Lecture 11 - Slotted Aloha protocol model and discrete-time birth death process |
Link |
Performance Evaluation of Computer Systems |
Lecture 12 - Continuous time Markov chain and queuing theory - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 13 - Queuing theory - I (Continued) |
Link |
Performance Evaluation of Computer Systems |
Lecture 14 - Queuing theory - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 15 - Queuing theory - III |
Link |
Performance Evaluation of Computer Systems |
Lecture 16 - Queuing theory - IV |
Link |
Performance Evaluation of Computer Systems |
Lecture 17 - Queuing theory - V |
Link |
Performance Evaluation of Computer Systems |
Lecture 18 - Queuing theory - VI |
Link |
Performance Evaluation of Computer Systems |
Lecture 19 - Queuing networks - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 20 - Queuing networks - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 21 - Slotted Aloha Markov model |
Link |
Performance Evaluation of Computer Systems |
Lecture 22 - Simulations - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 23 - Simulations - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 24 - Simulations - III |
Link |
Performance Evaluation of Computer Systems |
Lecture 25 - Operational laws - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 26 - Operational laws - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 27 - Open and closed queuing networks |
Link |
Performance Evaluation of Computer Systems |
Lecture 28 - Approximate MVA |
Link |
Performance Evaluation of Computer Systems |
Lecture 29 - Convolution algorithm - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 30 - Convolution algorithm - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 31 - Load-dependent service centers |
Link |
Performance Evaluation of Computer Systems |
Lecture 32 - Hierarchical decomposition |
Link |
Performance Evaluation of Computer Systems |
Lecture 33 - Balanced Job Bounds |
Link |
Performance Evaluation of Computer Systems |
Lecture 34 - Confidence interval for propotions and introduction to experimental design |
Link |
Performance Evaluation of Computer Systems |
Lecture 35 - 2k factorial design |
Link |
Performance Evaluation of Computer Systems |
Lecture 36 - 2k r factorial design and 2k-p fractional factorial design |
Link |
Performance Evaluation of Computer Systems |
Lecture 37 - Programming aspects of discrete-event simulations - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 38 - Programming aspects of discrete-event simulations - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 39 - Discrete-event simulations - III |
Link |
Performance Evaluation of Computer Systems |
Lecture 40 - PetriNets - I |
Link |
Performance Evaluation of Computer Systems |
Lecture 41 - PetriNets - II |
Link |
Performance Evaluation of Computer Systems |
Lecture 42 - PetriNets - III |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 1 - Grammars and Natural Language Processing |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 2 - Grammars and Languages Generated |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 3 - Grammars and Languages Generated (Continued.) |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 4 - Ambiguity in CFG |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 5 - Simplication of CFG |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 6 - Removal of Unit Productions, Chomsky Normal Form for CFG |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 7 - Greibach Normal Form for CFG |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 8 - Final State Automata |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 9 - Non Deterministic FSA |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 10 - Non Deterministic FSA (Continued.) |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 11 - Non Deterministic FSA with E(Epsilon)- Moves |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 12 - Equivalence Between FSA and Type 3 Grammars |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 13 - Regular Expressions, Regular Expressions to NFSA |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 14 - DFSA to Regular Expressions |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 15 - Problems and Solutions - I |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 16 - Pumping Lemmas for Regular Sets and CFL |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 17 - MYHILL - Nerode Theorem |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 18 - Minimization of DFSA |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 19 - FSA with output Moore and Mealy Machines |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 20 - Pushdown Automata |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 21 - Pushdown Automata, Equivalence Between Acceptance by Empty Store and Acceptance by Final State |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 22 - Pushdown Automata CFG to PDA |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 23 - Pushdown Automata PDA to CFG |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 24 - Problems and Solutions - II |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 25 - Problems and Solutions - III |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 26 - Turing Machines |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 27 - Turing Machines (Continued.) |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 28 - Turing Machine as Acceptor, Techniques for TM Construction |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 29 - Generalized Versions of Turing Machines |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 30 - Turing Machine as a Generating Device |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 31 - Recursive Sets, Recursively Innumerable Sets, Encoding of TM, Halting Problem |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 32 - Problems and Instances, Universal TM, Decidability |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 33 - RICE'S Theorem, Linear Bounded Automata, Properties of TM |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 34 - POST'S Correspondence Problems |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 35 - POST'S Correspondence Problems (Continued.), Time and Tape Complexity of TM |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 36 - NP - Complete Problems, Cook's Theorem |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 37 - NP - Complete Problems (Continued.) |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 38 - Regulated Rewriting |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 39 - L-Systems |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 40 - Grammar Systems |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 41 - DNA Computing |
Link |
Theory of Automata, Formal Languages and Computation |
Lecture 42 - Membrane Computing |
Link |
Computer Graphics |
Lecture 1 - Introduction |
Link |
Computer Graphics |
Lecture 2 - CRT Display Devices |
Link |
Computer Graphics |
Lecture 3 - CRT Display Devices (Continued...) |
Link |
Computer Graphics |
Lecture 4 - CRT Display Devices (Continued...) |
Link |
Computer Graphics |
Lecture 5 - CRT Display Devices (Continued...) |
Link |
Computer Graphics |
Lecture 6 - Transformations in 2D |
Link |
Computer Graphics |
Lecture 7 - Transformations in 2D (Continued...) |
Link |
Computer Graphics |
Lecture 8 - Three Dimensional Graphics |
Link |
Computer Graphics |
Lecture 9 - Three Dimensional Graphics (Continued...) |
Link |
Computer Graphics |
Lecture 10 - Three Dimensional Graphics (Continued...) |
Link |
Computer Graphics |
Lecture 11 - Projection Transformations And Viewing Pipeline |
Link |
Computer Graphics |
Lecture 12 - 3D Viewing - Projection Transformations And Viewing Pipeline |
Link |
Computer Graphics |
Lecture 13 - Scan Converting Lines, Circles And Ellipses |
Link |
Computer Graphics |
Lecture 14 - Scan Converting Lines, Circles And Ellipses (Continued...) |
Link |
Computer Graphics |
Lecture 15 - Scan Converting Lines, Circles And Ellipses (Continued...) |
Link |
Computer Graphics |
Lecture 16 - Scan Converting Lines, Circles And Ellipses (Continued...) |
Link |
Computer Graphics |
Lecture 17 - Scan Converting Lines, Circles And Ellipses (Continued...) |
Link |
Computer Graphics |
Lecture 18 - Polyfill- Scan Conversion Of A Polygon |
Link |
Computer Graphics |
Lecture 19 - Scan Conversion Of A Polygon (Continued...) |
Link |
Computer Graphics |
Lecture 20 - Clipping - Lines And Polygons |
Link |
Computer Graphics |
Lecture 21 - Clipping Lines And Polygons |
Link |
Computer Graphics |
Lecture 22 - Clipping Lines |
Link |
Computer Graphics |
Lecture 23 - Solid Modelling |
Link |
Computer Graphics |
Lecture 24 - Solid Modelling |
Link |
Computer Graphics |
Lecture 25 - Solid Modelling (Continued...) |
Link |
Computer Graphics |
Lecture 26 - Visible Surface Detection |
Link |
Computer Graphics |
Lecture 27 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 28 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 29 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 30 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 31 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 32 - Visible Surface Detection (Continued...) |
Link |
Computer Graphics |
Lecture 33 - Illumination And Shading |
Link |
Computer Graphics |
Lecture 34 - Illumination And Shading (Continued...) |
Link |
Computer Graphics |
Lecture 35 - Illumination And Shading (Continued...) |
Link |
Computer Graphics |
Lecture 36 - Curve Representation |
Link |
Computer Graphics |
Lecture 37 - Curve Representation (Continued...) |
Link |
Computer Graphics |
Lecture 38 - Curves And Surface Representation |
Link |
Computer Graphics |
Lecture 39 - Graphics Programming Using Open GL |
Link |
Computer Graphics |
Lecture 40 - Graphics Programming Using Open GL (Continued...) |
Link |
Computer Graphics |
Lecture 41 - Advanced Topics: Anti Aliasing,Color,Soft Objects,Animation,Visual Effects,System Architectures |
Link |
Computer Graphics |
Lecture 42 - Digital Image Processing Image Compression-Jpeg-Enhancements |
Link |
Computer Graphics |
Lecture 43 - Digital Image Processing (Continued...) |
Link |
Computer Organization |
Lecture 1 - Introduction To Computing |
Link |
Computer Organization |
Lecture 2 - Introduction To System : Software |
Link |
Computer Organization |
Lecture 3 - Introduction To System : Hardware |
Link |
Computer Organization |
Lecture 4 - Processor Activities |
Link |
Computer Organization |
Lecture 5 - Processor As a State Machine |
Link |
Computer Organization |
Lecture 6 - Data Path Architecture |
Link |
Computer Organization |
Lecture 7 - Data Path Controller : Micro Programmed |
Link |
Computer Organization |
Lecture 8 - State Machine Design |
Link |
Computer Organization |
Lecture 9 - Controller Design: Microprogrammed and Hardwired |
Link |
Computer Organization |
Lecture 10 - Controller Design (Contd) |
Link |
Computer Organization |
Lecture 11 - Typical Micro Instructions |
Link |
Computer Organization |
Lecture 12 - Addressing Modes |
Link |
Computer Organization |
Lecture 13 - Problem Exercise |
Link |
Computer Organization |
Lecture 14 - Problem Exercise |
Link |
Computer Organization |
Lecture 15 - Introduction to memory system |
Link |
Computer Organization |
Lecture 16 - CPU - Memory Interaction |
Link |
Computer Organization |
Lecture 17 - Cache Organization |
Link |
Computer Organization |
Lecture 18 - Cache Organization |
Link |
Computer Organization |
Lecture 19 - Virtual Memory |
Link |
Computer Organization |
Lecture 20 - Virtual Memory |
Link |
Computer Organization |
Lecture 21 - Performance Calculation |
Link |
Computer Organization |
Lecture 22 - Segmentation |
Link |
Computer Organization |
Lecture 23 - Address Translation and Protection |
Link |
Computer Organization |
Lecture 24 - Programmed I/O |
Link |
Computer Organization |
Lecture 25 - Interrupt Driven I/O |
Link |
Computer Organization |
Lecture 26 - DMA : Direct Memory Access |
Link |
Computer Organization |
Lecture 27 - Device Service Routines |
Link |
Computer Organization |
Lecture 28 - Evolution Of I/O |
Link |
Computer Organization |
Lecture 29 - I/O Devices |
Link |
Computer Organization |
Lecture 30 - I/O Devices - Contd |
Link |
Computer Organization |
Lecture 31 - Buses |
Link |
Computer Organization |
Lecture 32 - Buses Contd |
Link |
Computer Organization |
Lecture 33 - Conclusion |
Link |
Database Design |
Lecture 1 - Introduction to Database Management System |
Link |
Database Design |
Lecture 2 - Conceptual Designs |
Link |
Database Design |
Lecture 3 - Conceptual Designs |
Link |
Database Design |
Lecture 4 - Relational Model |
Link |
Database Design |
Lecture 5 - Relational Model |
Link |
Database Design |
Lecture 6 - Structured Query Language - I |
Link |
Database Design |
Lecture 7 - Structured Query Language - II |
Link |
Database Design |
Lecture 8 - ER Model to Relational Mapping |
Link |
Database Design |
Lecture 9 - Functional Dependencies and Normal Form |
Link |
Database Design |
Lecture 10 - ER Model to Relational Model Mapping |
Link |
Database Design |
Lecture 11 - Storage Structures |
Link |
Database Design |
Lecture 12 - Indexing Techniques Single Level |
Link |
Database Design |
Lecture 13 - Indexing Techniques Multi Level |
Link |
Database Design |
Lecture 14 - Constraints and Triggers |
Link |
Database Design |
Lecture 15 - Query Processing and Optimization |
Link |
Database Design |
Lecture 16 - Query Processing and Optimization - II |
Link |
Database Design |
Lecture 17 - Query Processing and Optimization - III |
Link |
Database Design |
Lecture 18 - Transaction Processing Concepts |
Link |
Database Design |
Lecture 19 - Transaction Processing and Database Manager |
Link |
Database Design |
Lecture 20 - Foundation for Concurrency Control |
Link |
Database Design |
Lecture 21 - Concurrency Control Part - 1 |
Link |
Database Design |
Lecture 22 - Concurrency Control Part - 2 |
Link |
Database Design |
Lecture 23 - Concurrency Control Part - 3 |
Link |
Database Design |
Lecture 24 - Concurrency Control Part - 4 |
Link |
Database Design |
Lecture 25 - Distributed Transaction Models |
Link |
Database Design |
Lecture 26 - Basic 2-Phase and 3-phase commit protocol |
Link |
Database Design |
Lecture 27 - Concurrency Control for Distributed Transaction |
Link |
Database Design |
Lecture 28 - Introduction to Transaction Recovery |
Link |
Database Design |
Lecture 29 - Recovery Mechanisms - II |
Link |
Database Design |
Lecture 30 - Recovery Mechanisms - III |
Link |
Database Design |
Lecture 31 - Introduction to Data Warehousing and OLAP |
Link |
Database Design |
Lecture 32 - Introduction to Data Warehousing and OLAP |
Link |
Database Design |
Lecture 33 - Case Study : MySQL |
Link |
Database Design |
Lecture 34 - Case Study ORACLE and Microsoft Access |
Link |
Database Design |
Lecture 35 - Data Mining and Knowledge Discovery |
Link |
Database Design |
Lecture 36 - Data Mining and Knowledge Discovery Part - II |
Link |
Database Design |
Lecture 37 - Object Oriented Databases |
Link |
Database Design |
Lecture 38 - Object Oriented Databases - II |
Link |
Database Design |
Lecture 39 - XML - Introductory Concepts |
Link |
Database Design |
Lecture 40 - XML - Advanced Concepts |
Link |
Database Design |
Lecture 41 - XML - Databases |
Link |
Database Design |
Lecture 42 - Case Study - Part One - Database Design |
Link |
Database Design |
Lecture 43 - Case Study - Part Two - Database Design |
Link |
Discrete Mathematical Structures |
Lecture 1 - Propositional Logic |
Link |
Discrete Mathematical Structures |
Lecture 2 - Propositional Logic (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 3 - Predicates & Quantifiers |
Link |
Discrete Mathematical Structures |
Lecture 4 - Predicates & Quantifiers (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 5 - Logical Inference |
Link |
Discrete Mathematical Structures |
Lecture 6 - Resolution Principles & Application to PROLOG |
Link |
Discrete Mathematical Structures |
Lecture 7 - Methods of Proof |
Link |
Discrete Mathematical Structures |
Lecture 8 - Normal Forms |
Link |
Discrete Mathematical Structures |
Lecture 9 - Proving Programs Correct (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 10 - Sets |
Link |
Discrete Mathematical Structures |
Lecture 11 - Induction |
Link |
Discrete Mathematical Structures |
Lecture 12 - Set Operations On Strings |
Link |
Discrete Mathematical Structures |
Lecture 13 - Relations |
Link |
Discrete Mathematical Structures |
Lecture 14 - Graphs |
Link |
Discrete Mathematical Structures |
Lecture 15 - Graphs (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 16 - Trees |
Link |
Discrete Mathematical Structures |
Lecture 17 - Trees And Graphs |
Link |
Discrete Mathematical Structures |
Lecture 18 - Special Properties Of Relations |
Link |
Discrete Mathematical Structures |
Lecture 19 - Closure Of Relations |
Link |
Discrete Mathematical Structures |
Lecture 20 - Closure Properties Of Relations |
Link |
Discrete Mathematical Structures |
Lecture 21 - Order Relations |
Link |
Discrete Mathematical Structures |
Lecture 22 - Order Relations And Equivalence Relations |
Link |
Discrete Mathematical Structures |
Lecture 23 - Equivalence Relations And Partitions |
Link |
Discrete Mathematical Structures |
Lecture 24 - Functions |
Link |
Discrete Mathematical Structures |
Lecture 25 - Functions (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 26 - Functions (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 27 - Pigeonhole Principle |
Link |
Discrete Mathematical Structures |
Lecture 28 - Permutations And Combinations |
Link |
Discrete Mathematical Structures |
Lecture 29 - Permutations And Combinations (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 30 - Generating Functions |
Link |
Discrete Mathematical Structures |
Lecture 31 - Generating Functions (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 32 - Recurrence Relations |
Link |
Discrete Mathematical Structures |
Lecture 33 - Recurrence Relations (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 34 - Recurrence Relations (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 35 - Algebras |
Link |
Discrete Mathematical Structures |
Lecture 36 - Algebras (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 37 - Algebras (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 38 - Finite State Automaton |
Link |
Discrete Mathematical Structures |
Lecture 39 - Finite State Automaton (Continued) |
Link |
Discrete Mathematical Structures |
Lecture 40 - Lattices |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 1 - Artificial Intelligence: Introduction |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 2 - Introduction to AI |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 3 - AI Introduction: Philosophy |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 4 - AI Introduction |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 5 - Introduction: Philosophy |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 6 - State Space Search - Introduction |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 7 - Search - DFS and BFS |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 8 - Search DFID |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 9 - Heuristic Search |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 10 - Hill Climbing |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 11 - Solution Space Search, Beam Search |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 12 - TSP Greedy Methods |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 13 - Tabu Search |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 14 - Optimization - I (Simulated Annealing) |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 15 - Optimization - II (Genetic Algorithms) |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 16 - Population based methods for Optimization |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 17 - Population Based Methods II |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 18 - Branch and Bound, Dijkstra's Algorithm |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 19 - A* Algorithm |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 20 - Admissibility of A* |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 21 - A* Monotone Property, Iterative Deeping A* |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 22 - Recursive Best First Search, Sequence Allignment |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 23 - Pruning the Open and Closed lists |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 24 - Problem Decomposition with Goal Trees |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 25 - AO* Algorithm |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 26 - Game Playing |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 27 - Game Playing - Minimax Search |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 28 - Game Playing - AlphaBeta |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 29 - Game Playing - SSS * |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 30 - Rule Based Systems |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 31 - Inference Engines |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 32 - Rete Algorithm |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 33 - Planning |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 34 - Planning FSSP, BSSP |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 35 - Goal Stack Planning. Sussman's Anomaly |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 36 - Non-linear planning |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 37 - Plan Space Planning |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 38 - GraphPlan |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 39 - Constraint Satisfaction Problems |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 40 - CSP continued |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 41 - Knowledge-based systems |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 42 - Knowledge-based Systems, PL |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 43 - Propositional Logic |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 44 - Resolution Refutation for PL |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 45 - First-order Logic (FOL) |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 46 - Reasoning in FOL |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 47 - Backward chaining |
Link |
Artificial Intelligence (Prof. Deepak Khemani) |
Lecture 48 - Resolution for FOL |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 1 - Introduction to Computers and Programming |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 2 - Writing your first program |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 3 - Variables, Operators and Expressions |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 4 - Variable declarations, more operators and precedence |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 5 - Input and Output Statements |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 6 - Conditionals |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 7 - Loops |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 8 - Video Solution to Digital Root Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 9 - Introduction to arrays |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 10 - Working with 1D arrays |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 11 - Find prime numbers |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 12 - Debugging demo |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 13 - Multi-dimensional arrays |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 14 - Pointers |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 15 - More on pointers |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 16 - Arrays and pointer arithmetic |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 17 - Introduction to Strings |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 18 - More on Strings |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 19 - Video Solution to Print Elements of a Matrix in Spiral Order Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 20 - Introduction to functions |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 21 - More details on functions |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 22 - Arguments, variables and parameters |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 23 - Pass parameters by reference |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 24 - Recursive functions |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 25 - Running time of a program |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 26 - Computing time complexity |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 27 - Video Solution to Palindrome Checker Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 28 - Algorithms and Powering |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 29 - Polynomial evaluation and multiplication |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 30 - Linear and Binary Search Analysis |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 31 - Analysis of minimum and maximum in an array |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 32 - Sorting I: Insertion, Merge |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 33 - Sorting II: Counting, Radix |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 34 - Finding i-th smallest number |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 35 - Video Solution to Sorting words Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 36 - Structures |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 37 - More on structures |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 38 - Using structures and pointers to structures |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 39 - Dynamic memory allocation |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 40 - Linked Lists |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 41 - Brief introduction to C++: Classes and objects |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 42 - Data Structures: Abstract Data Type |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 43 - Lists |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 44 - Supplementary Lesson |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 45 - Video Solution to Implementing a Hash Table ADT Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 46 - Stacks: Last In First Out |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 47 - Queues: First In First Out |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 48 - Trees |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 49 - Tree traversal |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 50 - Binary Search Trees |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 51 - Heaps |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 52 - Graphs and Representation |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 53 - Supplementary Lesson |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 54 - Video Solution to the Queue in a Hospital Programming Assignment |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 55 - Greedy Algorithms |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 56 - Dynamic Programming |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 57 - Matrix Chain Multiplication |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 58 - Dijkstra's Algorithm |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 59 - Boyer-Moore String Matching Algorithm |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 60 - File I/O |
Link |
NOC:Programming, Data Structures and Algorithms |
Lecture 61 - Modular Programming |
Link |
NOC:Introduction to Information Security I |
Lecture 1 - Module 1 - Part 0 - Introduction to the Course |
Link |
NOC:Introduction to Information Security I |
Lecture 2 - Module 1 - Part 1 - Definition of Information Security |
Link |
NOC:Introduction to Information Security I |
Lecture 3 - Module 1 - Part 2 - Information Security Terminologies |
Link |
NOC:Introduction to Information Security I |
Lecture 4 - Module 1 - Part 3 - Goals of Information Security |
Link |
NOC:Introduction to Information Security I |
Lecture 5 - Module 1 - Part 4 - Implementation Issues of the Goals of Information Security - I |
Link |
NOC:Introduction to Information Security I |
Lecture 6 - Module 1 - Part 5 - Implementation Issues of the Goals of Information Security - II |
Link |
NOC:Introduction to Information Security I |
Lecture 7 - Module 1 - Part 6 - Control Mechanisms for Information Security - I |
Link |
NOC:Introduction to Information Security I |
Lecture 8 - Module 1 - Part 7 - Access Control - Administrative and Technical |
Link |
NOC:Introduction to Information Security I |
Lecture 9 - Module 1 - Part 8 - Passwords - Are they secure? - I |
Link |
NOC:Introduction to Information Security I |
Lecture 10 - Module 1 - Part 9 - Access Control - Administrative and Technical |
Link |
NOC:Introduction to Information Security I |
Lecture 11 - Module 1 - Part 10 - Passwords - Are they secure? - III |
Link |
NOC:Introduction to Information Security I |
Lecture 12 - Module 1 - Part 11 - Multifactor Authentication - Challenges |
Link |
NOC:Introduction to Information Security I |
Lecture 13 - Module 1 - Part 12 - Application Level Control and Information Security Planning |
Link |
NOC:Introduction to Information Security I |
Lecture 14 - Module 1 - Part 13 - Information Security - Policy, Standard and Practice |
Link |
NOC:Introduction to Information Security I |
Lecture 15 - Module 1 - Part 14 - Policies governing Issues, Roles and Responsibilities |
Link |
NOC:Introduction to Information Security I |
Lecture 16 - Module 1 - Part 15 - Managing changes in Information Security Policies |
Link |
NOC:Introduction to Information Security I |
Lecture 17 - Module 1 - Part 16 - Spheres of Information Security |
Link |
NOC:Introduction to Information Security I |
Lecture 18 - Module 2 - Part 1 - Protecting your Personal Computer - I |
Link |
NOC:Introduction to Information Security I |
Lecture 19 - Module 2 - part 2 - Protecting your Personal Computer - II |
Link |
NOC:Introduction to Information Security I |
Lecture 20 - Module 2 - Part 3 - Protecting your Personal Computer - III |
Link |
NOC:Introduction to Information Security I |
Lecture 21 - Module 2 - Part 4 - Cloud Computing (Basic Definitions) - I |
Link |
NOC:Introduction to Information Security I |
Lecture 22 - Module 2 - Part 5 - Cloud Computing (Deployment) - II |
Link |
NOC:Introduction to Information Security I |
Lecture 23 - Module 2 - Part 6 - Cloud Computing (Security Issues) - III |
Link |
NOC:Introduction to Information Security I |
Lecture 24 - Module 2 - Part 7 - Cloud Computing (Trust and Risk) - IV |
Link |
NOC:Introduction to Information Security I |
Lecture 25 - Module 2 - Part 8 - Cloud Computing (Security and Privacy Issues) - V |
Link |
NOC:Introduction to Information Security I |
Lecture 26 - Module 2 - Part 9 - Cloud Computing (Security and Privacy Issues) - VI |
Link |
NOC:Introduction to Information Security I |
Lecture 27 - Module 2 - Part 10 - Cloud Computing (Application and Data level security) - VII |
Link |
NOC:Introduction to Information Security I |
Lecture 28 - Module 2 - Part 11 - Cloud Computing (Summary) - VIII |
Link |
NOC:Introduction to Information Security I |
Lecture 29 - Module 2 - Part 12 - Standard I |
Link |
NOC:Introduction to Information Security I |
Lecture 30 - Module 2 - Part 13 - Standard II |
Link |
NOC:Introduction to Information Security I |
Lecture 31 - Module 2 - Part 14 - Standard III |
Link |
NOC:Introduction to Information Security I |
Lecture 32 - Module 3 - Part 1 |
Link |
NOC:Introduction to Information Security I |
Lecture 33 - Module 3 - Part 2 |
Link |
NOC:Introduction to Information Security I |
Lecture 34 - Module 3 - Part 3 |
Link |
NOC:Introduction to Information Security I |
Lecture 35 - Module 3 - Part 4 |
Link |
NOC:Introduction to Information Security I |
Lecture 36 - Module 3 - Part 5 |
Link |
NOC:Introduction to Information Security I |
Lecture 37 - Module 3 - Part 6 |
Link |
NOC:Introduction to Information Security I |
Lecture 38 - Module 3 - Part 7 |
Link |
NOC:Introduction to Information Security I |
Lecture 39 - Module 3 - Part 8 |
Link |
NOC:Introduction to Information Security I |
Lecture 40 - Module 3 - Part 9 |
Link |
NOC:Introduction to Information Security I |
Lecture 41 - Module 4 - Part 1 |
Link |
NOC:Introduction to Information Security I |
Lecture 42 - module 4 - Part 2 |
Link |
NOC:Introduction to Information Security I |
Lecture 43 - Module 4 - Part 3 |
Link |
NOC:Introduction to Information Security I |
Lecture 44 - Module 4 - Part 4 |
Link |
NOC:Introduction to Information Security I |
Lecture 45 - Module 4 - Part 5 |
Link |
NOC:Introduction to Information Security I |
Lecture 46 - Module 4 - Part 6 |
Link |
NOC:Introduction to Information Security I |
Lecture 47 - Module 4 - Part 7 |
Link |
NOC:Introduction to Information Security I |
Lecture 48 - Module 4 - Part 8 |
Link |
NOC:Introduction to Information Security I |
Lecture 49 - Module 4 - Part 9 |
Link |
NOC:Introduction to Information Security I |
Lecture 50 - Module 4 - Part 10 |
Link |
NOC:Introduction to Information Security I |
Lecture 51 - Module 5 - Part 1 |
Link |
NOC:Introduction to Information Security I |
Lecture 52 - Module 5 - Part 2 |
Link |
NOC:Introduction to Information Security I |
Lecture 53 - Module 5 - Part 3 |
Link |
NOC:Introduction to Information Security I |
Lecture 54 - Module 5 - Part 4 |
Link |
NOC:Introduction to Information Security I |
Lecture 55 - Module 5 - Part 5 |
Link |
NOC:Introduction to Information Security I |
Lecture 56 - Module 5 - Part 6 |
Link |
NOC:Introduction to Information Security I |
Lecture 57 - Module 5 - Part 7 |
Link |
NOC:Introduction to Information Security I |
Lecture 58 - Module 6 - Part 1 |
Link |
NOC:Introduction to Information Security I |
Lecture 59 - Module 6 - Part 2 |
Link |
NOC:Introduction to Information Security I |
Lecture 60 - Module 6 - Part 3 |
Link |
NOC:Introduction to Information Security I |
Lecture 61 - Module 6 - Part 4 |
Link |
NOC:Introduction to Information Security I |
Lecture 62 - Module 6 - Part 5 |
Link |
NOC:Introduction to Information Security I |
Lecture 63 - Module 6 - Part 6 |
Link |
NOC:Introduction to Information Security I |
Lecture 64 - Module 6 - Part 7 |
Link |
NOC:Introduction to Information Security I |
Lecture 65 - Module 6 - Part 8 |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 1 - A Simple C Program for Sorting |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 2 - Review of Structures, Pointers and Functions |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 3 - Recursion |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 4 - Abstract Data Types-Data + Methods |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 5 - List Data Type |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 6 - Access and update methods |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 7 - Doubly Linked List Data Type |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 8 - Doubly Linked Lists and Arrays |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 9 - ADT Stacks |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 10 - Checking of Balanced Parenthesis |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 11 - Infix and Postfix expressions and Expression evaluation |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 12 - Queue ADT Definition and Implementation |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 13 - Merging using Queue ADT and Queue types |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 14 - Tree ADT and Traversals |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 15 - Binary Tree ADT and traversals |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 16 - Tree Applications |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 17 - Binary Search Trees |
Link |
NOC:Programming and Data structures (PDS) |
Lecture 18 - Heaps |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 1 - Course Outline |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 2 - Example: Air Travel |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 3 - Example: Xerox shop |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 4 - Example: Document similarity |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 5 - Introduction and motivation |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 6 - Input size, worst case, average case |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 7 - Quantifying efficiency: O( ), Omega( ), Theta( ) |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 8 - Examples: Analysis of iterative and recursive algorithms |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 9 - Arrays and lists |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 10 - Searching in an array |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 11 - Selection Sort |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 12 - Insertion sort |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 13 - Merge sort |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 14 - Merge sort - analysis |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 15 - Quicksort |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 16 - Quicksort - analysis |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 17 - Sorting - Concluding remarks |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 18 - Introduction to graphs |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 19 - Representing graphs |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 20 - Breadth first search (BFS) |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 21 - Depth first search (DFS) |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 22 - Applications of BFS and DFS |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 23 - Directed acylic graphs: topological sort |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 24 - Directed acylic graphs: longest paths |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 25 - Single source shortest paths: Dijkstras algorithm |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 26 - Dijkstras algorithm: analysis |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 27 - Negative edge weights: Bellman-Ford algorithm |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 28 - All pairs shortest paths |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 29 - Minimum Cost Spanning Trees |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 30 - Prims Algorithm |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 31 - Kruskals algorithm |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 32 - Union-Find using arrays |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 33 - Union-Find using pointers |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 34 - Priority queues |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 35 - Heaps |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 36 - Heaps: Updating values, sorting |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 37 - Counting inversions |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 38 - Closest pair of points |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 39 - Binary Search Trees |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 40 - Balanced search trees |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 41 - Interval scheduling |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 42 - Scheduling with deadlines: minimizing lateness |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 43 - Huffman codes |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 44 - Introduction to dynamic programming |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 45 - Memoization |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 46 - Grid Paths |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 47 - Common subwords and subsequences |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 48 - Edit distance |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 49 - Matrix multiplication |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 50 - Linear Programming |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 51 - LP modelling: Production Planning |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 52 - LP modelling: Bandwidth allocation |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 53 - Network Flows |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 54 - Reductions |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 55 - Checking Algorithms |
Link |
NOC:Design and Analysis of Algorithms |
Lecture 56 - P and NP |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 1 - Introduction to Computers and Programming |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 2 - Writing your first program |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 3 - Variables, Operators and Expressions |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 4 - Variable declarations, more operators and precedence |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 5 - Input and Output Statements |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 6 - Conditionals |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 7 - Loops |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 8 - Introduction to arrays |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 9 - Working with 1D arrays |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 10 - Find prime numbers |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 11 - Debugging demo |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 12 - Multi-dimensional arrays |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 13 - Pointers |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 14 - More on pointers |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 15 - Arrays and pointer arithmetic |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 16 - Introduction to Strings |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 17 - More on Strings |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 18 - Introduction to functions |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 19 - More details on functions |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 20 - Arguments, variables and parameters |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 21 - Pass parameters by reference |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 22 - Recursive Functions |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 23 - C control structures, functional specification of programs |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 24 - Complexity Analysis using Sum and Product Rule |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 25 - Complexity Analysis of Recursive Functions |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 26 - Algorithms and Powering |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 27 - Polynomial evaluation and multiplication |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 28 - Linear and Binary Search Analysis |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 29 - Analysis of minimum and maximum in an array |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 30 - Sorting I: Insertion, Merge |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 31 - Sorting II: Counting, Radix |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 32 - Finding i-th smallest number |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 33 - Structures |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 34 - More on Structures |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 35 - Using structures and pointers to structures |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 36 - Dynamic memory allocation |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 37 - Linked List |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 38 - Brief introduction to C++: Classes and objects |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 39 - Abstract Data Types |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 40 - More on ADT |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 41 - Stacks: Last In First Out |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 42 - Queues: First In First |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 43 - Trees |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 44 - Tree Traversal |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 45 - Binary Search |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 46 - Heaps |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 47 - Graphs and Representations |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 48 - Greedy Algorithms |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 49 - Dynamic Programming |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 50 - Matrix Chain Multiplication |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 51 - Hash Tables |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 52 - Graph Algorithms: Dijkstras Algorithm and Prims Algorithm |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 53 - Graph Traversals: BFS,DFS and Articulation Points |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 54 - File I/O |
Link |
NOC:Programming, Data Structures and Algorithms (Aricent) |
Lecture 55 - Modular Programming |
Link |
NOC:Computer Architecture |
Lecture 1 - Introduction to Computer Architecture |
Link |
NOC:Computer Architecture |
Lecture 2 - Quantitative Principles of Computer Design |
Link |
NOC:Computer Architecture |
Lecture 3 - Instruction Set Principles-Part 1 |
Link |
NOC:Computer Architecture |
Lecture 4 - Instruction Set Principles-Part 2 |
Link |
NOC:Computer Architecture |
Lecture 5 - Instruction Set Principles-Part 3 |
Link |
NOC:Computer Architecture |
Lecture 6 - Cache Memory Hierarchy - Part 1 |
Link |
NOC:Computer Architecture |
Lecture 7 - Cache Memory Hierarchy - Part 2 |
Link |
NOC:Computer Architecture |
Lecture 8 - Cache Memory Hierarchy - Part 3 |
Link |
NOC:Computer Architecture |
Lecture 9 - Cache Memory Hierarchy - Part 4 |
Link |
NOC:Computer Architecture |
Lecture 10 - Main Memory Design - Part 1 |
Link |
NOC:Computer Architecture |
Lecture 11 - Main Memory Design - Part 2 |
Link |
NOC:Computer Architecture |
Lecture 12 - Main Memory Design - Part 3 |
Link |
NOC:Computer Architecture |
Lecture 13 - Fundamentals of Pipelining - Part 1 |
Link |
NOC:Computer Architecture |
Lecture 14 - Fundamentals of Pipelining - Part 2 |
Link |
NOC:Computer Architecture |
Lecture 15 - Fundamentals of Pipelining - Part 3 |
Link |
NOC:Computer Architecture |
Lecture 16 - Fundamentals of Pipelining - Part 4 |
Link |
NOC:Computer Architecture |
Lecture 17 - Fundamentals of Pipelining - Part 5 |
Link |
NOC:Computer Architecture |
Lecture 18 - Scalar to Superscalar pipeline |
Link |
NOC:Computer Architecture |
Lecture 19 - Instruction Dependencies |
Link |
NOC:Computer Architecture |
Lecture 20 - Compiler optimizations for Exposing ILP |
Link |
NOC:Computer Architecture |
Lecture 21 - Advanced Branch Prediction Techniques - Part 1 |
Link |
NOC:Computer Architecture |
Lecture 22 - Advanced Branch Prediction Techniques - Part 2 |
Link |
NOC:Computer Architecture |
Lecture 23 - Superscalar Organization |
Link |
NOC:Computer Architecture |
Lecture 24 - Register Renaming |
Link |
NOC:Computer Architecture |
Lecture 25 - Tomasulo Algorithm |
Link |
NOC:Computer Architecture |
Lecture 26 - Dynamic Execution Core |
Link |
NOC:Computer Architecture |
Lecture 27 - Multi threading |
Link |
NOC:Computer Architecture |
Lecture 28 - Multicore Processor Architecture |
Link |
NOC:Computer Architecture |
Lecture 29 - Cache Coherence |
Link |
NOC:Computer Architecture |
Lecture 30 - Cache Coherence Protocol Design |
Link |
NOC:Computer Architecture |
Lecture 31 - Synchronization |
Link |
NOC:Computer Architecture |
Lecture 32 - Memory Consistency - Part 1 |
Link |
NOC:Computer Architecture |
Lecture 33 - Memory Consistency - Part 2 |
Link |
NOC:Model Checking |
Lecture 1 - Course Overview |
Link |
NOC:Model Checking |
Lecture 2 - Module 1 - Modeling code behaviour |
Link |
NOC:Model Checking |
Lecture 3 - Module 2 - Modeling hardware circuits |
Link |
NOC:Model Checking |
Lecture 4 - Module 3 - Modeling data-dependent programs |
Link |
NOC:Model Checking |
Lecture 5 - Module 4 - Modeling concurrent systems |
Link |
NOC:Model Checking |
Lecture 6 - Summary |
Link |
NOC:Model Checking |
Lecture 7 - Module 1 - Model checking tools |
Link |
NOC:Model Checking |
Lecture 8 - Module 2 - Simple models in NuSMV |
Link |
NOC:Model Checking |
Lecture 9 - Module 3 - Hardware verification using NuSMV |
Link |
NOC:Model Checking |
Lecture 10 - Module 4 - Modeling concurrent systems in NuSMV |
Link |
NOC:Model Checking |
Lecture 11 - Summary. |
Link |
NOC:Model Checking |
Lecture 12 - Module 1 - A problem in concurrency |
Link |
NOC:Model Checking |
Lecture 13 - Module 2 - What is a property? |
Link |
NOC:Model Checking |
Lecture 14 - Module 3 - Invariants |
Link |
NOC:Model Checking |
Lecture 15 - Module 4 - Safety properties |
Link |
NOC:Model Checking |
Lecture 16 - Module 5 - Liveness properties |
Link |
NOC:Model Checking |
Lecture 17 - Summary.. |
Link |
NOC:Model Checking |
Lecture 18 - Module 1 - Road map |
Link |
NOC:Model Checking |
Lecture 19 - Module 2 - A gentle introduction to automata |
Link |
NOC:Model Checking |
Lecture 20 - Module 3 - Simple properties of finite automata |
Link |
NOC:Model Checking |
Lecture 21 - Module 4 - Safety properties described by automata |
Link |
NOC:Model Checking |
Lecture 22 - Summary... |
Link |
NOC:Model Checking |
Lecture 23 - Module 1 - Specifying properties |
Link |
NOC:Model Checking |
Lecture 24 - Module 2 - Omega-regular expressions |
Link |
NOC:Model Checking |
Lecture 25 - Module 3 - Bchi automata |
Link |
NOC:Model Checking |
Lecture 26 - Module 4 - Simple properties of Bchi automata |
Link |
NOC:Model Checking |
Lecture 27 - Summary.... |
Link |
NOC:Model Checking |
Lecture 28 - Module 1 - Overview |
Link |
NOC:Model Checking |
Lecture 29 - Module 2 - Omega-regular expressions to NBA |
Link |
NOC:Model Checking |
Lecture 30 - Module 3 - Checking emptiness of NBA |
Link |
NOC:Model Checking |
Lecture 31 - Module 4 - Generalized NBA |
Link |
NOC:Model Checking |
Lecture 32 - Summary..... |
Link |
NOC:Model Checking |
Lecture 33 - Module 1 - Introduction to LTL |
Link |
NOC:Model Checking |
Lecture 34 - Module 2 - Semantics of LTL |
Link |
NOC:Model Checking |
Lecture 35 - Module 3 - A puzzle |
Link |
NOC:Model Checking |
Lecture 36 - Summary. |
Link |
NOC:Model Checking |
Lecture 37 - Module 1 - Automata based LTL model-checking |
Link |
NOC:Model Checking |
Lecture 38 - Module 2 - LTL to NBA |
Link |
NOC:Model Checking |
Lecture 39 - Module 3 - Automaton construction |
Link |
NOC:Model Checking |
Lecture 40 - Summary.. |
Link |
NOC:Model Checking |
Lecture 41 - Module 1 - Tree view of a transition system |
Link |
NOC:Model Checking |
Lecture 42 - Module 2 - CTL* |
Link |
NOC:Model Checking |
Lecture 43 - Module 3 - CTL |
Link |
NOC:Model Checking |
Lecture 44 - summary... |
Link |
NOC:Model Checking |
Lecture 45 - Module 1 - Adequate CTL formulae |
Link |
NOC:Model Checking |
Lecture 46 - Module 2 - EX, EU, EG |
Link |
NOC:Model Checking |
Lecture 47 - Module 3 - Final algorithm |
Link |
NOC:Model Checking |
Lecture 48 - Module 4 - State-space explosion |
Link |
NOC:Model Checking |
Lecture 49 - Summary.... |
Link |
NOC:Model Checking |
Lecture 50 - Module 1 - Introduction to BDDs |
Link |
NOC:Model Checking |
Lecture 51 - Module 2 - Ordered BDDs |
Link |
NOC:Model Checking |
Lecture 52 - Module 3 - Representing transition systems as OBDDs |
Link |
NOC:Model Checking |
Lecture 53 - Summary..... |
Link |
NOC:Model Checking |
Lecture 54 - Timed transition systems |
Link |
NOC:Model Checking |
Lecture 55 - Concluding remarks |
Link |
NOC:Functional Programming in Haskell |
Lecture 1 - Functions |
Link |
NOC:Functional Programming in Haskell |
Lecture 2 - Types |
Link |
NOC:Functional Programming in Haskell |
Lecture 3 - Haskell |
Link |
NOC:Functional Programming in Haskell |
Lecture 4 - Running Haskell programs |
Link |
NOC:Functional Programming in Haskell |
Lecture 5 - Currying |
Link |
NOC:Functional Programming in Haskell |
Lecture 6 - Examples |
Link |
NOC:Functional Programming in Haskell |
Lecture 7 - Lists |
Link |
NOC:Functional Programming in Haskell |
Lecture 8 - Functions on lists |
Link |
NOC:Functional Programming in Haskell |
Lecture 9 - Characters and strings |
Link |
NOC:Functional Programming in Haskell |
Lecture 10 - Tuples |
Link |
NOC:Functional Programming in Haskell |
Lecture 11 - Computation as rewriting |
Link |
NOC:Functional Programming in Haskell |
Lecture 12 - Polymorphism and higher-order functions |
Link |
NOC:Functional Programming in Haskell |
Lecture 13 - Map and filter |
Link |
NOC:Functional Programming in Haskell |
Lecture 14 - List comprehension |
Link |
NOC:Functional Programming in Haskell |
Lecture 15 - Folding through a list |
Link |
NOC:Functional Programming in Haskell |
Lecture 16 - Measuring efficiency |
Link |
NOC:Functional Programming in Haskell |
Lecture 17 - Sorting |
Link |
NOC:Functional Programming in Haskell |
Lecture 18 - Using infinite lists |
Link |
NOC:Functional Programming in Haskell |
Lecture 19 - Conditional polymorphism |
Link |
NOC:Functional Programming in Haskell |
Lecture 20 - Defining functions in ghci |
Link |
NOC:Functional Programming in Haskell |
Lecture 21 - User-defined datatypes |
Link |
NOC:Functional Programming in Haskell |
Lecture 22 - Abstract datatypes |
Link |
NOC:Functional Programming in Haskell |
Lecture 23 - Modules |
Link |
NOC:Functional Programming in Haskell |
Lecture 24 - Recursive data types |
Link |
NOC:Functional Programming in Haskell |
Lecture 25 - Binary search trees |
Link |
NOC:Functional Programming in Haskell |
Lecture 26 - Balanced search trees |
Link |
NOC:Functional Programming in Haskell |
Lecture 27 - Arrays |
Link |
NOC:Functional Programming in Haskell |
Lecture 28 - Input/Output |
Link |
Virtual Reality |
Lecture 1 - Course mechanics |
Link |
Virtual Reality |
Lecture 2 - Goals and VR definitions |
Link |
Virtual Reality |
Lecture 3 - Historical perspective |
Link |
Virtual Reality |
Lecture 4 - Birds-eye view (general) |
Link |
Virtual Reality |
Lecture 5 - Birds-eye view (general) (Continued...) |
Link |
Virtual Reality |
Lecture 6 - Birds-eye view (hardware) |
Link |
Virtual Reality |
Lecture 7 - Birds-eye view (software) |
Link |
Virtual Reality |
Lecture 8 - Birds-eye view (sensation and perception) |
Link |
Virtual Reality |
Lecture 9 - Geometric modeling |
Link |
Virtual Reality |
Lecture 10 - Transforming models |
Link |
Virtual Reality |
Lecture 11 - Matrix algebra and 2D rotations |
Link |
Virtual Reality |
Lecture 12 - 3D rotations and yaw, pitch, and roll |
Link |
Virtual Reality |
Lecture 13 - 3D rotations and yaw, pitch, and roll (Continued...) |
Link |
Virtual Reality |
Lecture 14 - Axis-angle representations |
Link |
Virtual Reality |
Lecture 15 - Quaternions |
Link |
Virtual Reality |
Lecture 16 - Converting and multiplying rotations |
Link |
Virtual Reality |
Lecture 17 - Converting and multiplying rotations (Continued...) |
Link |
Virtual Reality |
Lecture 18 - Homogeneous transforms |
Link |
Virtual Reality |
Lecture 19 - The chain of viewing transforms |
Link |
Virtual Reality |
Lecture 20 - Eye transforms |
Link |
Virtual Reality |
Lecture 21 - Eye transforms (Continued...) |
Link |
Virtual Reality |
Lecture 22 - Canonical view transform |
Link |
Virtual Reality |
Lecture 23 - Viewport transform |
Link |
Virtual Reality |
Lecture 24 - Viewport transform (Continued...) |
Link |
Virtual Reality |
Lecture 25 - Three interpretations of light |
Link |
Virtual Reality |
Lecture 26 - Refraction |
Link |
Virtual Reality |
Lecture 27 - Simple lenses |
Link |
Virtual Reality |
Lecture 28 - Diopters |
Link |
Virtual Reality |
Lecture 29 - Imaging properties of lenses |
Link |
Virtual Reality |
Lecture 30 - Lens aberrations |
Link |
Virtual Reality |
Lecture 31 - Optical system of eyes |
Link |
Virtual Reality |
Lecture 32 - Photoreceptors |
Link |
Virtual Reality |
Lecture 33 - Sufficient resolution for VR |
Link |
Virtual Reality |
Lecture 34 - Light intensity |
Link |
Virtual Reality |
Lecture 35 - Eye movements |
Link |
Virtual Reality |
Lecture 36 - Eye movements (Continued...) |
Link |
Virtual Reality |
Lecture 37 - Eye movement issues for VR |
Link |
Virtual Reality |
Lecture 38 - Neuroscience of vision |
Link |
Virtual Reality |
Lecture 39 - Depth perception |
Link |
Virtual Reality |
Lecture 40 - Depth perception (Continued...) |
Link |
Virtual Reality |
Lecture 41 - Motion perception |
Link |
Virtual Reality |
Lecture 42 - Frame rates and displays |
Link |
Virtual Reality |
Lecture 43 - Frame rates and displays (Continued...) |
Link |
Virtual Reality |
Lecture 44 - Overview |
Link |
Virtual Reality |
Lecture 45 - Orientation tracking |
Link |
Virtual Reality |
Lecture 46 - Tilt drift correction |
Link |
Virtual Reality |
Lecture 47 - Yaw drift correction |
Link |
Virtual Reality |
Lecture 48 - Tracking with a camera |
Link |
Virtual Reality |
Lecture 49 - Perspective n-point problem |
Link |
Virtual Reality |
Lecture 50 - Filtering |
Link |
Virtual Reality |
Lecture 51 - Lighthouse approach |
Link |
Virtual Reality |
Lecture 52 - Visual Rendering-Overview |
Link |
Virtual Reality |
Lecture 53 - Visual Rendering-overview (Continued...) |
Link |
Virtual Reality |
Lecture 54 - Shading models |
Link |
Virtual Reality |
Lecture 55 - Rasterization |
Link |
Virtual Reality |
Lecture 56 - Pixel shading |
Link |
Virtual Reality |
Lecture 57 - VR-specific problems |
Link |
Virtual Reality |
Lecture 58 - Distortion shading |
Link |
Virtual Reality |
Lecture 59 - Post-rendering image warp |
Link |
Virtual Reality |
Lecture 60 - Physics and physiology |
Link |
Virtual Reality |
Lecture 61 - Auditory perception |
Link |
Virtual Reality |
Lecture 62 - Auditory localization |
Link |
Virtual Reality |
Lecture 63 - Rendering |
Link |
Virtual Reality |
Lecture 64 - Spatialization and display |
Link |
Virtual Reality |
Lecture 65 - Combining other senses |
Link |
Virtual Reality |
Lecture 66 - Interfaces -overview |
Link |
Virtual Reality |
Lecture 67 - Locomotion |
Link |
Virtual Reality |
Lecture 68 - Manipulation |
Link |
Virtual Reality |
Lecture 69 - System control |
Link |
Virtual Reality |
Lecture 70 - Social interaction |
Link |
Virtual Reality |
Lecture 71 - Evaluation of VR Systems |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 1 - A brief introduction to machine learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 2 - Supervised Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 3 - Unsupervised Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 4 - Reinforcement Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 5 - Probability Basics - 1 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 6 - Probability Basics - 2 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 7 - Linear Algebra - 1 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 8 - Linear Algebra - 2 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 9 - Statistical Decision Theory - Regression |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 10 - Statistical Decision Theory - Classification |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 11 - Bias-Variance |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 12 - Linear Regression |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 13 - Multivariate Regression |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 14 - Subset Selection 1 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 15 - Subset Selection 2 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 16 - Shrinkage Methods |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 17 - Principal Components Regression |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 18 - Partial Least Squares |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 19 - Linear Classification |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 20 - Logistic Regression |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 21 - Linear Discriminant Analysis 1 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 22 - Linear Discriminant Analysis 2 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 23 - Linear Discriminant Analysis 3 |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 24 - Optimization |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 25 - Perceptron Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 26 - SVM - Formulation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 27 - SVM - Interpretation & Analysis |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 28 - SVMs for Linearly Non Separable Data |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 29 - SVM Kernels |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 30 - SVM - Hinge Loss Formulation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 31 - Weka Tutorial |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 32 - Early Models |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 33 - Backpropogation - I |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 34 - Backpropogation - II |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 35 - Initialization, Training and Validation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 36 - Maximum Likelihood Estimate |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 37 - Priors and MAP Estimate |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 38 - Bayesian Parameter Estimation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 39 - Introduction |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 40 - Regression Trees |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 41 - Stopping Criteria and Pruning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 42 - Loss Functions for Classification |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 43 - Categorical Attributes |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 44 - Multiway Splits |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 45 - Missing Values, Imputation and Surrogate Splits |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 46 - Instability, Smoothness and Repeated Subtrees |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 47 - Tutorial |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 48 - Evaluation Measures I |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 49 - Bootstrapping and Cross Validation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 50 - 2 Class Evaluation Measures |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 51 - The ROC Curve |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 52 - Minimum Description Length and Exploratory Analysis |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 53 - Introduction to Hypothesis Testing |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 54 - Basic Concepts |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 55 - Sampling Distributions and the Z Test |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 56 - Student's t-test |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 57 - The Two Sample and Paired Sample t-tests |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 58 - Confidence Intervals |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 59 - Bagging, Committee Machines and Stacking |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 60 - Boosting |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 61 - Gradient Boosting |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 62 - Random Forest |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 63 - Naive Bayes |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 64 - Bayesian Networks |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 65 - Undirected Graphical Models - Introduction |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 66 - Undirected Graphical Models - Potential Functions |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 67 - Hidden Markov Models |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 68 - Variable Elimination |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 69 - Belief Propagation |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 70 - Partitional Clustering |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 71 - Hierarchical Clustering |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 72 - Threshold Graphs |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 73 - The BIRCH Algorithm |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 74 - The CURE Algorithm |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 75 - Density Based Clustering |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 76 - Gaussian Mixture Models |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 77 - Expectation Maximization |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 78 - Expectation Maximization (Continued...) |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 79 - Spectral Clustering |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 80 - Learning Theory |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 81 - Frequent Itemset Mining |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 82 - The Apriori Property |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 83 - Introduction to Reinforcement Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 84 - RL Framework and TD Learning |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 85 - Solution Methods and Applications |
Link |
NOC:Introduction to Machine Learning (Sponsored by Arihant) |
Lecture 86 - Multi-class Classification |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 1 - Introduction |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 2 - Abductive Inferences and Expectations |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 3 - On Machine Learning |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 4 - A New Test of Intelligence? |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 5 - The World According to Us |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 6 - From Particles to Concepts |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 7 - The Domains for Reasoning |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 8 - Hierarchies in Representation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 9 - Logic and Representation: A Quick Tour |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 10 - Symbols and Thought |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 11 - From Gears to Symbols |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 12 - Truth, Logic, and Provability |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 13 - A Syntactic Machine |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 14 - Entailment and Proof |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 15 - The Languages of Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 16 - Patterns in Arguments |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 17 - Rules of Inference |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 18 - Propositional Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 19 - Propositional Logic: Syntax |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 20 - Propositional Logic: Semantics |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 21 - Proofs: Natural Deduction |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 22 - The Deduction Theorem |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 23 - Models |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 24 - The Tableau Method |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 25 - First Order Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 26 - First Order Logic: Syntax |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 27 - FOL: Universal Instantiation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 28 - First Order Logic: Semantics |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 29 - FOL: Truth Assignments |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 30 - Modified Modus Ponens |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 31 - The Unification Algorithm |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 32 - Skolemization |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 33 - Expert Systems |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 34 - Backward Chaining Systems |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 35 - Deductive Retrieval |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 36 - The Resolution Refutation Method |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 37 - Clause Form in FOL |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 38 - Resolution Refutation in FOL |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 39 - First Order Logic with Equality |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 40 - Who was the surgeon? |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 41 - Consistency vs. Completeness |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 42 - Logic Programming |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 43 - Arithmetic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 44 - Horn Clauses and Prolog |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 45 - SLD Derivation = Backward Chaining |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 46 - Programming in Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 47 - Prolog: Programming in Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 48 - Prolog: Procedural Interpretation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 49 - Prolog: Query Evaluation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 50 - Prolog: Unifying Terms |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 51 - Prolog: Goal Order |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 52 - Prolog: Tabling |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 53 - Prolog: Negation by Failure |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 54 - Prolog: The Cut Operator |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 55 - Rule Based Expert Systems |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 56 - The OPS5 Language |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 57 - Match, Resolve, Execute |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 58 - Conflict Resolution Strategies |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 59 - The Rete Algorithm |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 60 - The Rete Net |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 61 - The Rete Net : Examples |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 62 - Knowledge Representation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 63 - Synonyms, Antonyms, Hyponyms, Meronyms |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 64 - Binary Relations |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 65 - Describing Family Relations |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 66 - Recursive Descriptions |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 67 - Abstract Entities |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 68 - Reification: Units of Measurement |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 69 - Semantic Nets and Knowledge Graphs |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 70 - DL: Description Logics |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 71 - Defining New Concepts and Roles |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 72 - The Sentences in DL |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 73 - A Family of Logics |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 74 - DL: Some Examples |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 75 - ALC Tableau |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 76 - Model Checking in ALC |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 77 - ALC Tableau: Examples |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 78 - Language Independent Represntation |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 79 - Conceptual Dependency Theory |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 80 - CD States |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 81 - Inferences in MARGIE |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 82 - CD: Actions |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 83 - English to CD |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 84 - Representing Complex Verbs |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 85 - Semantic Parsing of Language |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 86 - Knowledge Structures |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 87 - Scripts |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 88 - SAM: Script Apploer Mechanism |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 89 - A VIP Visit |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 90 - Invoking Scripts |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 91 - Goals, Plans, and Actions |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 92 - Goal Interactions |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 93 - Explanation Driven Understanding |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 94 - Tussle Over a Bicycle |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 95 - Plan Applier Mechanism (PAM) |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 96 - Requests and Rule Instances |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 97 - Managing Rule Instances |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 98 - Knowledge Structures: Frames |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 99 - Inheritance |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 100 - A Frame System for Travel Planning |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 101 - Inheritance in Taxonomies |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 102 - Default Reasoning |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 103 - Closed World Assumption |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 104 - Circumscription |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 105 - Default Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 106 - Autoepistemic Reasoning |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 107 - The Event Calculus |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 108 - The Effects of Events |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 109 - Epistemic Logic |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 110 - Kripke Structures: Possible Worlds Semantics |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 111 - The Muddy Children Puzzle |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 112 - The Effects of Epistemic Actions |
Link |
NOC:Artificial Intelligence: Knowledge Representation and Reasoning |
Lecture 113 - Reasoning with Beliefs |
Link |
NOC:Information Security - II |
Lecture 1 - Experimental Setup: Video Tutorial |
Link |
NOC:Information Security - II |
Lecture 2 - Need for Secure Systems |
Link |
NOC:Information Security - II |
Lecture 3 - Ignorance of A is Sin of B |
Link |
NOC:Information Security - II |
Lecture 4 - Function calls and Stacks |
Link |
NOC:Information Security - II |
Lecture 5 - Stack Smashing |
Link |
NOC:Information Security - II |
Lecture 6 - Virtual Machine Based Rootkits |
Link |
NOC:Information Security - II |
Lecture 7 - Security and Architecture: Introduction |
Link |
NOC:Information Security - II |
Lecture 8 - Structured Computer Organization Completed |
Link |
NOC:Information Security - II |
Lecture 9 - X86 ISA - Part1 |
Link |
NOC:Information Security - II |
Lecture 10 - X86 ISA - Part 2 |
Link |
NOC:Information Security - II |
Lecture 11 - X86 Protected Mode |
Link |
NOC:Information Security - II |
Lecture 12 - X86 Memory Segmentation |
Link |
NOC:Information Security - II |
Lecture 13 - Process Isolation using Segmentation |
Link |
NOC:Information Security - II |
Lecture 14 - Paging and Virtual Memory |
Link |
NOC:Information Security - II |
Lecture 15 - Task Switching and Interrupt Service |
Link |
NOC:Information Security - II |
Lecture 16 - Memory Segmentation Deep dive - Part 1 |
Link |
NOC:Information Security - II |
Lecture 17 - Memory Segmentation Deep dive - Part 2 |
Link |
NOC:Information Security - II |
Lecture 18 - Memory Segmentation Deep dive - Part 3 |
Link |
NOC:Information Security - II |
Lecture 19 - Memory Segmentation Deep dive - Part 4 |
Link |
NOC:Information Security - II |
Lecture 20 - Segmentation Recap |
Link |
NOC:Information Security - II |
Lecture 21 - Lab 1 - Part 1 |
Link |
NOC:Information Security - II |
Lecture 22 - Lab 1 - Part 2 |
Link |
NOC:Information Security - II |
Lecture 23 - Lab 1 - Part 3 |
Link |
NOC:Information Security - II |
Lecture 24 - ISR Recap |
Link |
NOC:Information Security - II |
Lecture 25 - Lab 2 - Part 1 |
Link |
NOC:Information Security - II |
Lecture 26 - Lab 2 - Part 2 |
Link |
NOC:Information Security - II |
Lecture 27 - Memory Management Recap |
Link |
NOC:Information Security - II |
Lecture 28 - Lab 3 - Part 1 |
Link |
NOC:Information Security - II |
Lecture 29 - Lab 3 - Part 2 |
Link |
NOC:Information Security - II |
Lecture 30 - Task Switch recap |
Link |
NOC:Information Security - II |
Lecture 31 - Lab 4 - Part 1 |
Link |
NOC:Information Security - II |
Lecture 32 - Lab 4 - Part 2 |
Link |
NOC:Information Security - II |
Lecture 33 - Lab 4 - Part 3 |
Link |
NOC:Information Security - II |
Lecture 34 - Lab 4 - Part 4 |
Link |
NOC:Information Security - II |
Lecture 35 - Introduction to Basic Cryptography |
Link |
NOC:Information Security - II |
Lecture 36 - Public Key Cryptography |
Link |
NOC:Information Security - II |
Lecture 37 - Freescale ARM iMX6 Processor |
Link |
NOC:Information Security - II |
Lecture 38 - High Assurance Boot in iMX6 |
Link |
NOC:Information Security - II |
Lecture 39 - Case Study |
Link |
NOC:Information Security - II |
Lecture 40 - Basics of Networking |
Link |
NOC:Information Security - II |
Lecture 41 - Network Processor Vs General Purpose Processor |
Link |
NOC:Information Security - II |
Lecture 42 - Network Processor Architecture |
Link |
NOC:Algorithms for Big Data |
Lecture 1 - Basic definitions |
Link |
NOC:Algorithms for Big Data |
Lecture 2 - Conditional probability |
Link |
NOC:Algorithms for Big Data |
Lecture 3 - Example problems |
Link |
NOC:Algorithms for Big Data |
Lecture 4 - Karger's mincut algorithm |
Link |
NOC:Algorithms for Big Data |
Lecture 5 - Analysis of Karger's mincut algorithm |
Link |
NOC:Algorithms for Big Data |
Lecture 6 - Random variables |
Link |
NOC:Algorithms for Big Data |
Lecture 7 - Randomized quicksort |
Link |
NOC:Algorithms for Big Data |
Lecture 8 - Problem solving video - The rich get richer |
Link |
NOC:Algorithms for Big Data |
Lecture 9 - Problem solving video - Monty Hall problem |
Link |
NOC:Algorithms for Big Data |
Lecture 10 - Bernoulli, Binomial and Geometric distributions |
Link |
NOC:Algorithms for Big Data |
Lecture 11 - Tail Bounds |
Link |
NOC:Algorithms for Big Data |
Lecture 12 - Application of Chernoff bound |
Link |
NOC:Algorithms for Big Data |
Lecture 13 - Application of Chebyshev's inequality |
Link |
NOC:Algorithms for Big Data |
Lecture 14 - Intro to Big Data Algorithms |
Link |
NOC:Algorithms for Big Data |
Lecture 15 - SAT Problem |
Link |
NOC:Algorithms for Big Data |
Lecture 16 - Classification of States |
Link |
NOC:Algorithms for Big Data |
Lecture 17 - Stationary Distribution of a Markov Chain |
Link |
NOC:Algorithms for Big Data |
Lecture 18 - Celebrities Case Study |
Link |
NOC:Algorithms for Big Data |
Lecture 19 - Random Walks on Undirected Graphs |
Link |
NOC:Algorithms for Big Data |
Lecture 20 - Intro to Streaming, Morris Algorithm |
Link |
NOC:Algorithms for Big Data |
Lecture 21 - Reservoir Sampling |
Link |
NOC:Algorithms for Big Data |
Lecture 22 - Approximate Median |
Link |
NOC:Algorithms for Big Data |
Lecture 23 - Overview |
Link |
NOC:Algorithms for Big Data |
Lecture 24 - Balls, bins, hashing |
Link |
NOC:Algorithms for Big Data |
Lecture 25 - Chain hashing, SUHA, Power of Two choices |
Link |
NOC:Algorithms for Big Data |
Lecture 26 - Bloom filter |
Link |
NOC:Algorithms for Big Data |
Lecture 27 - Pairwise independence |
Link |
NOC:Algorithms for Big Data |
Lecture 28 - Estimating expectation of continuous function |
Link |
NOC:Algorithms for Big Data |
Lecture 29 - Universal hash functions |
Link |
NOC:Algorithms for Big Data |
Lecture 30 - Perfect hashing |
Link |
NOC:Algorithms for Big Data |
Lecture 31 - Count-min filter for heavy hitters in data streams |
Link |
NOC:Algorithms for Big Data |
Lecture 32 - Problem solving video - Doubly Stochastic Transition Matrix |
Link |
NOC:Algorithms for Big Data |
Lecture 33 - Problem solving video - Random Walks on Linear Structures |
Link |
NOC:Algorithms for Big Data |
Lecture 34 - Problem solving video - Lollipop Graph |
Link |
NOC:Algorithms for Big Data |
Lecture 35 - Problem solving video - Cat And Mouse |
Link |
NOC:Algorithms for Big Data |
Lecture 36 - Estimating frequency moments |
Link |
NOC:Algorithms for Big Data |
Lecture 37 - Property testing framework |
Link |
NOC:Algorithms for Big Data |
Lecture 38 - Testing Connectivity |
Link |
NOC:Algorithms for Big Data |
Lecture 39 - Enforce and Test Introduction |
Link |
NOC:Algorithms for Big Data |
Lecture 40 - Testing if a graph is a biclique |
Link |
NOC:Algorithms for Big Data |
Lecture 41 - Testing bipartiteness |
Link |
NOC:Algorithms for Big Data |
Lecture 42 - Property testing and random walk algorithms |
Link |
NOC:Algorithms for Big Data |
Lecture 43 - Testing if a graph is bipartite (using random walks) |
Link |
NOC:Algorithms for Big Data |
Lecture 44 - Graph streaming algorithms: Introduction |
Link |
NOC:Algorithms for Big Data |
Lecture 45 - Graph streaming algorithms: Matching |
Link |
NOC:Algorithms for Big Data |
Lecture 46 - Graph streaming algorithms: Graph sparsification |
Link |
NOC:Algorithms for Big Data |
Lecture 47 - MapReduce |
Link |
NOC:Algorithms for Big Data |
Lecture 48 - K-Machine Model (aka Pregel Model) |
Link |
NOC:Reinforcement Learning |
Lecture 1 - Tutorial 1 - Probability Basics 1 |
Link |
NOC:Reinforcement Learning |
Lecture 2 - Tutorial 1 - Probability Basics 2 |
Link |
NOC:Reinforcement Learning |
Lecture 3 - Tutorial 2 - Linear algebra - 1 |
Link |
NOC:Reinforcement Learning |
Lecture 4 - Tutorial 2 - Linear algebra - 2 |
Link |
NOC:Reinforcement Learning |
Lecture 5 - Introduction to RL |
Link |
NOC:Reinforcement Learning |
Lecture 6 - RL Framework and applications |
Link |
NOC:Reinforcement Learning |
Lecture 7 - Introduction to Immediate RL |
Link |
NOC:Reinforcement Learning |
Lecture 8 - Bandit Optimalities |
Link |
NOC:Reinforcement Learning |
Lecture 9 - Value function based methods |
Link |
NOC:Reinforcement Learning |
Lecture 10 - UCB 1 |
Link |
NOC:Reinforcement Learning |
Lecture 11 - Concentration Bounds |
Link |
NOC:Reinforcement Learning |
Lecture 12 - UCB 1 Theorem |
Link |
NOC:Reinforcement Learning |
Lecture 13 - PAC Bounds |
Link |
NOC:Reinforcement Learning |
Lecture 14 - Median Elimination |
Link |
NOC:Reinforcement Learning |
Lecture 15 - Thompson Sampling |
Link |
NOC:Reinforcement Learning |
Lecture 16 - Policy Search |
Link |
NOC:Reinforcement Learning |
Lecture 17 - REINFORCE |
Link |
NOC:Reinforcement Learning |
Lecture 18 - Contextual Bandits |
Link |
NOC:Reinforcement Learning |
Lecture 19 - Full RL Introduction |
Link |
NOC:Reinforcement Learning |
Lecture 20 - Returns, Value Functions and MDPs |
Link |
NOC:Reinforcement Learning |
Lecture 21 - MDP Modelling |
Link |
NOC:Reinforcement Learning |
Lecture 22 - Bellman Equation |
Link |
NOC:Reinforcement Learning |
Lecture 23 - Bellman Optimality Equation |
Link |
NOC:Reinforcement Learning |
Lecture 24 - Cauchy Sequence and Green's Equation |
Link |
NOC:Reinforcement Learning |
Lecture 25 - Banach Fixed Point Theorem |
Link |
NOC:Reinforcement Learning |
Lecture 26 - Convergence Proof |
Link |
NOC:Reinforcement Learning |
Lecture 27 - Lpi Convergence |
Link |
NOC:Reinforcement Learning |
Lecture 28 - Value Iteration |
Link |
NOC:Reinforcement Learning |
Lecture 29 - Policy Iteration |
Link |
NOC:Reinforcement Learning |
Lecture 30 - Dynamic Programming |
Link |
NOC:Reinforcement Learning |
Lecture 31 - Monte Carlo |
Link |
NOC:Reinforcement Learning |
Lecture 32 - Control in Monte Carlo |
Link |
NOC:Reinforcement Learning |
Lecture 33 - Off Policy MC |
Link |
NOC:Reinforcement Learning |
Lecture 34 - UCT |
Link |
NOC:Reinforcement Learning |
Lecture 35 - TD(0) |
Link |
NOC:Reinforcement Learning |
Lecture 36 - TD(0) Control |
Link |
NOC:Reinforcement Learning |
Lecture 37 - Q-Learning |
Link |
NOC:Reinforcement Learning |
Lecture 38 - Afterstate |
Link |
NOC:Reinforcement Learning |
Lecture 39 - Eligibility Traces |
Link |
NOC:Reinforcement Learning |
Lecture 40 - Backward View of Eligibility Traces |
Link |
NOC:Reinforcement Learning |
Lecture 41 - Eligibility Trace Control |
Link |
NOC:Reinforcement Learning |
Lecture 42 - Thompson Sampling Recap |
Link |
NOC:Reinforcement Learning |
Lecture 43 - Function Approximation |
Link |
NOC:Reinforcement Learning |
Lecture 44 - Linear Parameterization |
Link |
NOC:Reinforcement Learning |
Lecture 45 - State Aggregation Methods |
Link |
NOC:Reinforcement Learning |
Lecture 46 - Function Approximation and Eligibility Traces |
Link |
NOC:Reinforcement Learning |
Lecture 47 - LSTD and LSTDQ |
Link |
NOC:Reinforcement Learning |
Lecture 48 - LSPI and Fitted Q |
Link |
NOC:Reinforcement Learning |
Lecture 49 - DQN and Fitted Q-Iteration |
Link |
NOC:Reinforcement Learning |
Lecture 50 - Policy Gradient Approach |
Link |
NOC:Reinforcement Learning |
Lecture 51 - Actor Critic and REINFORCE |
Link |
NOC:Reinforcement Learning |
Lecture 52 - REINFORCE (cont'd) |
Link |
NOC:Reinforcement Learning |
Lecture 53 - Policy Gradient with Function Approximation |
Link |
NOC:Reinforcement Learning |
Lecture 54 - Hierarchical Reinforcement Learning |
Link |
NOC:Reinforcement Learning |
Lecture 55 - Types of Optimality |
Link |
NOC:Reinforcement Learning |
Lecture 56 - Semi Markov Decision Processes |
Link |
NOC:Reinforcement Learning |
Lecture 57 - Options |
Link |
NOC:Reinforcement Learning |
Lecture 58 - Learning with Options |
Link |
NOC:Reinforcement Learning |
Lecture 59 - Hierarchical Abstract Machines |
Link |
NOC:Reinforcement Learning |
Lecture 60 - MAXQ |
Link |
NOC:Reinforcement Learning |
Lecture 61 - MAXQ Value Function Decomposition |
Link |
NOC:Reinforcement Learning |
Lecture 62 - Option Discovery |
Link |
NOC:Reinforcement Learning |
Lecture 63 - POMDP Introduction |
Link |
NOC:Reinforcement Learning |
Lecture 64 - Solving POMDP |
Link |
NOC:Introduction to Operating Systems |
Lecture 1 - Intro to the Course |
Link |
NOC:Introduction to Operating Systems |
Lecture 2 - Introduction to OS |
Link |
NOC:Introduction to Operating Systems |
Lecture 3 - PC Hardware |
Link |
NOC:Introduction to Operating Systems |
Lecture 4 - From Programs to Processes |
Link |
NOC:Introduction to Operating Systems |
Lecture 5 - Sharing the CPU |
Link |
NOC:Introduction to Operating Systems |
Lecture 6 - Introduction |
Link |
NOC:Introduction to Operating Systems |
Lecture 7 - Virtual Memory |
Link |
NOC:Introduction to Operating Systems |
Lecture 8 - MMU Mapping |
Link |
NOC:Introduction to Operating Systems |
Lecture 9 - Segmentation |
Link |
NOC:Introduction to Operating Systems |
Lecture 10 - Memory Management in xv6 |
Link |
NOC:Introduction to Operating Systems |
Lecture 11 - PC Booting |
Link |
NOC:Introduction to Operating Systems |
Lecture 12 - Week 3 Introduction |
Link |
NOC:Introduction to Operating Systems |
Lecture 13 - Create Execute and Exit from Processes |
Link |
NOC:Introduction to Operating Systems |
Lecture 14 - System Calls for Process Management |
Link |
NOC:Introduction to Operating Systems |
Lecture 15 - Interrupts |
Link |
NOC:Introduction to Operating Systems |
Lecture 16 - Interrupt Handling |
Link |
NOC:Introduction to Operating Systems |
Lecture 17 - Software Interrupts and System calls |
Link |
NOC:Introduction to Operating Systems |
Lecture 18 - CPU Context switching |
Link |
NOC:Introduction to Operating Systems |
Lecture 19 - CPU Scheduling |
Link |
NOC:Introduction to Operating Systems |
Lecture 20 - Priority Based Scheduling Algorithms |
Link |
NOC:Introduction to Operating Systems |
Lecture 21 - Multi-Processor Scheduling |
Link |
NOC:Introduction to Operating Systems |
Lecture 22 - Scheduling in Linux |
Link |
NOC:Introduction to Operating Systems |
Lecture 23 - Completely Fair Scheduling |
Link |
NOC:Introduction to Operating Systems |
Lecture 24 - Inter Process Communication |
Link |
NOC:Introduction to Operating Systems |
Lecture 25 - Synchronization |
Link |
NOC:Introduction to Operating Systems |
Lecture 26 - Software solutions for critical sections |
Link |
NOC:Introduction to Operating Systems |
Lecture 27 - Bakery Algorithm |
Link |
NOC:Introduction to Operating Systems |
Lecture 28 - Hardware Locks |
Link |
NOC:Introduction to Operating Systems |
Lecture 29 - Mutexes |
Link |
NOC:Introduction to Operating Systems |
Lecture 30 - Semaphores |
Link |
NOC:Introduction to Operating Systems |
Lecture 31 - Dining Philosophers Problem |
Link |
NOC:Introduction to Operating Systems |
Lecture 32 - Deadlocks |
Link |
NOC:Introduction to Operating Systems |
Lecture 33 - Dealing with Deadlocks |
Link |
NOC:Introduction to Operating Systems |
Lecture 34 - Threads - Part 1 |
Link |
NOC:Introduction to Operating Systems |
Lecture 35 - Threads - Part 2 |
Link |
NOC:Introduction to Operating Systems |
Lecture 36 - Operating system security |
Link |
NOC:Introduction to Operating Systems |
Lecture 37 - Information Flow policies |
Link |
NOC:Introduction to Operating Systems |
Lecture 38 - Buffer Overflows |
Link |
NOC:Introduction to Operating Systems |
Lecture 39 - Preventing Buffer Overflow Attacks |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 1 - Lecture 1 - Algorithms and programming: simple gcd |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 2 - Lecture 2 - Improving naive gcd |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 3 - Lecture 3 - Euclid's algorithm for gcd |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 4 - Lecture 4 - Downloading and installing Python |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 5 - Lecture 1 - Assignment statement, basic types - int, float, bool |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 6 - Lecture 2 - Strings |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 7 - Lecture 3 - Lists |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 8 - Lecture 4 - Control Flow |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 9 - Lecture 5 - Functions |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 10 - Lecture 6 - Examples |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 11 - Lecture 1 - More about range() |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 12 - Lecture 2 - Manipulating lists |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 13 - Lecture 3 - Breaking out of a loop |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 14 - Lecture 4 - Arrays vs lists, binary search |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 15 - Lecture 5 - Efficiency |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 16 - Lecture 6 - Selection Sort |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 17 - Lecture 7 - Insertion Sort |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 18 - Lecture 8 - Recursion |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 19 - Lecture 1 - Mergesort |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 20 - Lecture 2 - Mergesort, analysis |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 21 - Lecture 3 - Quicksort |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 22 - Lecture 4 - Quicksort analysis |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 23 - Lecture 5 - Tuples and dictionaries |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 24 - Lecture 6 - Function definitions |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 25 - Lecture 7 - List Comprehension |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 26 - Lecture 1 - Exception Handling |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 27 - Lecture 2 - Standard input and output |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 28 - Lecture 3 - Handling files |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 29 - Lecture 4 - String functions |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 30 - Lecture 5 - Formatting printed output |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 31 - Lecture 6 - pass, del() and None |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 32 - Lecture 1 - Backtracking, N queens |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 33 - Lecture 2 - Global scope, nested functions |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 34 - Lecture 3 - Generating permutations |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 35 - Lecture 4 - Sets, stacks, queues |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 36 - Lecture 5 - Priority queues and heaps |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 37 - Lecture 1 - Abstract datatypes, classes and objects |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 38 - Lecture 2 - Classes and objects in Python |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 39 - Lecture 3 - User defined lists |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 40 - Lecture 4 - Search trees |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 41 - Lecture 1 - Memoization and dynamic programming |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 42 - Lecture 2 - Grid paths |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 43 - Lecture 3 - Longest common subsequence |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 44 - Lecture 4 - Matrix multiplication |
Link |
NOC:Programming, Data Structures and Algorithms in Python |
Lecture 45 - Lecture 5 - Wrap-up, Python vs other languages |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 1 - Intro to Course |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 2 - Intro to Course |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 3 - Incidents |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 4 - Tutorial 1 - Part 1 Ubuntu |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 5 - Tutorial 1 - Part 2 Python |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 6 - OSM APIs and tools for data collection |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 7 - Tutorial 2 - Part 1 Facebook API |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 8 - Tutorial 2 - Part 2 Facebook API |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 9 - Trust and Credibility on OSM |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 10 - Misinformation on Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 11 - Privacy and Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 12 - Tutorial 3 - Part 1 Twitter API |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 13 - Tutorial 3 - Part 2 MySQL |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 14 - Tutorial 3 - Part 3 MongoDB |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 15 - Privacy and Pictures on Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 16 - Policing and Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 17 - Policing and Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 18 - Policing and Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 19 - eCrime on Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 20 - eCrime on Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 21 - Tutorial 4 - Social Network Analysis |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 22 - Link Farming in Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 23 - Nudges |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 24 - Semantic attacks: Spear phishing |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 25 - Tutorial 5 - Analyzing text using Python NLTK |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 26 - Profile Linking on Online Social Media |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 27 - Anonymous Networks |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 28 - Tutorial 6 - Gephi Network Visualization |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 29 - Privacy in Location Based Social Networks - Part 1 |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 30 - Privacy in Location Based Social Networks - Part 2 |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 31 - Tutorial 7 - Visualization - Highcharts |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 32 - Beware of What You Share Inferring Home Location in Social Networks |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 33 - On the dynamics of username change behavior on Twitter |
Link |
NOC:Privacy and Security in Online Social Networks |
Lecture 34 - Boston Marathon Analyzing Fake Content on Twitter |
Link |
NOC:Mobile Computing |
Lecture 1 - Java Basics |
Link |
NOC:Mobile Computing |
Lecture 2 - Java : Primitive Data Types, Strings, Loops, Conditional Statements |
Link |
NOC:Mobile Computing |
Lecture 3 - Java : Strings, OOP principles |
Link |
NOC:Mobile Computing |
Lecture 4 - Java : Interfaces |
Link |
NOC:Mobile Computing |
Lecture 5 - Java : Classes, Exceptions, Threads |
Link |
NOC:Mobile Computing |
Lecture 6 - Introduction to Android Studio |
Link |
NOC:Mobile Computing |
Lecture 7 - Your First App |
Link |
NOC:Mobile Computing |
Lecture 8 - Deploying your App to a Phone |
Link |
NOC:Mobile Computing |
Lecture 9 - Extending app - Buttons, Toast |
Link |
NOC:Mobile Computing |
Lecture 10 - Android Development Environment |
Link |
NOC:Mobile Computing |
Lecture 11 - User Interface |
Link |
NOC:Mobile Computing |
Lecture 12 - Application Fundamentals |
Link |
NOC:Mobile Computing |
Lecture 13 - Extending the application |
Link |
NOC:Mobile Computing |
Lecture 14 - Activity Lifecycle - I |
Link |
NOC:Mobile Computing |
Lecture 15 - Activity Lifecycle - II |
Link |
NOC:Mobile Computing |
Lecture 16 - Activity LifeCycle - III |
Link |
NOC:Mobile Computing |
Lecture 17 - Adding Icon, Layouts, Handling Rotation - I |
Link |
NOC:Mobile Computing |
Lecture 18 - Adding Icon, Layouts, Handling Rotation - II |
Link |
NOC:Mobile Computing |
Lecture 19 - Debugging |
Link |
NOC:Mobile Computing |
Lecture 20 - Intents - I |
Link |
NOC:Mobile Computing |
Lecture 21 - Intents - II |
Link |
NOC:Mobile Computing |
Lecture 22 - Observer Pattern |
Link |
NOC:Mobile Computing |
Lecture 23 - Fragments - I |
Link |
NOC:Mobile Computing |
Lecture 24 - Fragments - II |
Link |
NOC:Mobile Computing |
Lecture 25 - Fragment Basic Programming Example |
Link |
NOC:Mobile Computing |
Lecture 26 - Fragments - Advanced Example |
Link |
NOC:Mobile Computing |
Lecture 27 - Implicit Intents |
Link |
NOC:Mobile Computing |
Lecture 28 - Saving Data - I |
Link |
NOC:Mobile Computing |
Lecture 29 - Saving Data - II |
Link |
NOC:Mobile Computing |
Lecture 30 - Security and System Permissions |
Link |
NOC:Mobile Computing |
Lecture 31 - Services |
Link |
NOC:Mobile Computing |
Lecture 32 - Processes and threads |
Link |
NOC:Mobile Computing |
Lecture 33 - Working with Fragments - I |
Link |
NOC:Mobile Computing |
Lecture 34 - Working with Fragments - II |
Link |
NOC:Mobile Computing |
Lecture 35 - Working with Fragments - III |
Link |
NOC:Mobile Computing |
Lecture 36 - RecyclerView, Adapter |
Link |
NOC:Mobile Computing |
Lecture 37 - RecyclerView, Adapter, ViewHolder |
Link |
NOC:Mobile Computing |
Lecture 38 - ViewPager |
Link |
NOC:Mobile Computing |
Lecture 39 - Dialogues |
Link |
NOC:Introduction to Modern Application Development |
Lecture 1 - Introduction to the course |
Link |
NOC:Introduction to Modern Application Development |
Lecture 2 - Introduction to a web-app |
Link |
NOC:Introduction to Modern Application Development |
Lecture 3 - Building a web-app |
Link |
NOC:Introduction to Modern Application Development |
Lecture 4 - Networks |
Link |
NOC:Introduction to Modern Application Development |
Lecture 5 - Practical - Running your own web-server |
Link |
NOC:Introduction to Modern Application Development |
Lecture 6 - Protocols |
Link |
NOC:Introduction to Modern Application Development |
Lecture 7 - Practical - SSH + Network experiments |
Link |
NOC:Introduction to Modern Application Development |
Lecture 8 - Practical - Building a webapp with nodejs and using git. Introduction to reverse proxies. |
Link |
NOC:Introduction to Modern Application Development |
Lecture 9 - Practical - Introduciton to server-side javascript and HTML/CSS |
Link |
NOC:Introduction to Modern Application Development |
Lecture 10 - Introduction to client-side Javascript |
Link |
NOC:Introduction to Modern Application Development |
Lecture 11 - Practical - APIs and mobile apps use web-servers |
Link |
NOC:Introduction to Modern Application Development |
Lecture 12 - Introduction to databases |
Link |
NOC:Introduction to Modern Application Development |
Lecture 13 - Data modelling and constraints |
Link |
NOC:Introduction to Modern Application Development |
Lecture 14 - Interacting with a DBMS |
Link |
NOC:Introduction to Modern Application Development |
Lecture 15 - Practical - Deeper exploration of a DBMS (column types and more) |
Link |
NOC:Introduction to Modern Application Development |
Lecture 16 - Introduction to SQL |
Link |
NOC:Introduction to Modern Application Development |
Lecture 17 - Understanding database performance |
Link |
NOC:Introduction to Modern Application Development |
Lecture 18 - Transactions and ACID properties |
Link |
NOC:Introduction to Modern Application Development |
Lecture 19 - Database security, backup and recovery |
Link |
NOC:Introduction to Modern Application Development |
Lecture 20 - Analytics and Views |
Link |
NOC:Introduction to Modern Application Development |
Lecture 21 - Scaling a database |
Link |
NOC:Introduction to Modern Application Development |
Lecture 22 - Connecting your webapp to your database and SQL Injection |
Link |
NOC:Introduction to Modern Application Development |
Lecture 23 - SQL and NoSQL systems |
Link |
NOC:Introduction to Modern Application Development |
Lecture 24 - Authentication with HTTP |
Link |
NOC:Introduction to Modern Application Development |
Lecture 25 - Understanding security, and some best practices for webapps |
Link |
NOC:Introduction to Modern Application Development |
Lecture 26 - Introduction to authentication, hashing, curl and sessions |
Link |
NOC:Introduction to Modern Application Development |
Lecture 27 - Introduction to mobile apps |
Link |
NOC:Introduction to Modern Application Development |
Lecture 28 - Introduction to Mobile Application Development Part 2 |
Link |
NOC:Introduction to Modern Application Development |
Lecture 29 - Introduction to Android |
Link |
NOC:Introduction to Modern Application Development |
Lecture 30 - Getting started with Android Application Development |
Link |
NOC:Introduction to Modern Application Development |
Lecture 31 - Building Custom UI using XML and Logs |
Link |
NOC:Introduction to Modern Application Development |
Lecture 32 - Building a Blog App |
Link |
NOC:Introduction to Modern Application Development |
Lecture 33 - Deploying an app to the Google Play Store |
Link |
NOC:Introduction to Modern Application Development |
Lecture 34 - Introduction to iOS |
Link |
NOC:Introduction to Modern Application Development |
Lecture 35 - The API Economy |
Link |
NOC:Introduction to Modern Application Development |
Lecture 36 - Version Control using Git |
Link |
NOC:Introduction to Modern Application Development |
Lecture 37 - Backend Architectures |
Link |
NOC:Information Security-3 |
Lecture 1 - Operating System Introduction |
Link |
NOC:Information Security-3 |
Lecture 2 - Storage Hierarchy, Exceptions, Interrupts and traps |
Link |
NOC:Information Security-3 |
Lecture 3 - OS Management Services |
Link |
NOC:Information Security-3 |
Lecture 4 - OS Security Issues |
Link |
NOC:Information Security-3 |
Lecture 5 - Process and Threads |
Link |
NOC:Information Security-3 |
Lecture 6 - Process Scheduling |
Link |
NOC:Information Security-3 |
Lecture 7 - Scheduling Algorithm |
Link |
NOC:Information Security-3 |
Lecture 8 - Process Synchronization |
Link |
NOC:Information Security-3 |
Lecture 9 - Memory Management - 1 |
Link |
NOC:Information Security-3 |
Lecture 10 - Memory Management - 2 |
Link |
NOC:Information Security-3 |
Lecture 11 - File Systems - 1 |
Link |
NOC:Information Security-3 |
Lecture 12 - File Systems - 2 |
Link |
NOC:Information Security-3 |
Lecture 13 - Unix Filesystem |
Link |
NOC:Information Security-3 |
Lecture 14 - Unix Filesystem (Continued...) |
Link |
NOC:Information Security-3 |
Lecture 15 - Linux: Basic Commands |
Link |
NOC:Information Security-3 |
Lecture 16 - Linux: Basic Commands (Continued...) |
Link |
NOC:Information Security-3 |
Lecture 17 - Linux: Users and Permissions |
Link |
NOC:Information Security-3 |
Lecture 18 - Linux: I/O Redirection and Pipes |
Link |
NOC:Information Security-3 |
Lecture 19 - Linux: Task Control |
Link |
NOC:Information Security-3 |
Lecture 20 - Linux: Shell Environment |
Link |
NOC:Information Security-3 |
Lecture 21 - Linux: Text Editors |
Link |
NOC:Information Security-3 |
Lecture 22 - Linux: Compression / Archiving |
Link |
NOC:Information Security-3 |
Lecture 23 - Linux: Print and Sync Commands |
Link |
NOC:Information Security-3 |
Lecture 24 - Linux: File Comparison |
Link |
NOC:Information Security-3 |
Lecture 25 - Basic Networking Administration |
Link |
NOC:Information Security-3 |
Lecture 26 - Filesystems and Devices |
Link |
NOC:Information Security-3 |
Lecture 27 - Shell Introduction |
Link |
NOC:Information Security-3 |
Lecture 28 - Shell Comments and Variables |
Link |
NOC:Information Security-3 |
Lecture 29 - Shell Variables |
Link |
NOC:Information Security-3 |
Lecture 30 - Shell Arrays and Arithmetic |
Link |
NOC:Information Security-3 |
Lecture 31 - Shell Condition and Relation |
Link |
NOC:Information Security-3 |
Lecture 32 - Shell Examples |
Link |
NOC:Information Security-3 |
Lecture 33 - Shell Functions |
Link |
NOC:Information Security-3 |
Lecture 34 - Shell File Test |
Link |
NOC:Information Security-3 |
Lecture 35 - Shell Loop Control |
Link |
NOC:Information Security-3 |
Lecture 36 - Shell Script Variations |
Link |
NOC:Information Security-3 |
Lecture 37 - Shell Pattern Matching |
Link |
NOC:Information Security-3 |
Lecture 38 - Shell Case Statements |
Link |
NOC:Information Security-3 |
Lecture 39 - Shell Co-routines |
Link |
NOC:Information Security-3 |
Lecture 40 - Shell Signals and Traps |
Link |
NOC:Information Security-3 |
Lecture 41 - Shell Subshell |
Link |
NOC:Information Security-3 |
Lecture 42 - Shell Declarations |
Link |
NOC:Information Security-3 |
Lecture 43 - Shell Examples 2 |
Link |
NOC:Information Security-3 |
Lecture 44 - Shell Review |
Link |
NOC:Information Security-3 |
Lecture 45 - An Introduction |
Link |
NOC:Information Security-3 |
Lecture 46 - Structure of a Network |
Link |
NOC:Information Security-3 |
Lecture 47 - Network Core - Definition |
Link |
NOC:Information Security-3 |
Lecture 48 - Network Access and Physical Media |
Link |
NOC:Information Security-3 |
Lecture 49 - Structure of ISP and Packet Delays |
Link |
NOC:Information Security-3 |
Lecture 50 - Network Protocol Layers |
Link |
NOC:Information Security-3 |
Lecture 51 - Network Devices |
Link |
NOC:Information Security-3 |
Lecture 52 - Network Security - An Introduction |
Link |
NOC:Information Security-3 |
Lecture 53 - Public Key Cryptography |
Link |
NOC:Information Security-3 |
Lecture 54 - Digital Signatures |
Link |
NOC:Information Security-3 |
Lecture 55 - Security in Practise |
Link |
NOC:Information Security-3 |
Lecture 56 - Security in Practise (Continued...) |
Link |
NOC:Information Security-3 |
Lecture 57 - Wireshark |
Link |
NOC:Information Security-3 |
Lecture 58 - Snort |
Link |
NOC:Information Security-3 |
Lecture 59 - Review I |
Link |
NOC:Information Security-3 |
Lecture 60 - Review II |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 1 - Constraint Satisfaction Problems |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 2 - CSP Examples: Map colouring, N-Queens, Classroom scheduling |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 3 - CSP Examples: Huffman-Clowes Labelling, Waltz Algorithm, Crosswords |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 4 - Model Based Diagnosis - An application of CSP |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 5 - Constraint Networks - An Introduction |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 6 - Binary Constraint Networks (BCN), Equivalent Networks |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 7 - Projection Networks |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 8 - Constraint Propagation |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 9 - Algorithms AC1 and AC3 |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 10 - Can we do better than AC3? |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 11 - Algorithm AC4 |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 12 - Generalized AC, Path-Consistency |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 13 - i-Consistency, Algorithm PC1 |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 14 - Algorithm PC2, Strong i-Consistency |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 15 - Directional Consistency and Graph Ordering |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 16 - Min-Width and Min-Induced-Width Ordering |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 17 - Directional Arc-Consistency and Tree CSPs |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 18 - Directional Path-Consistency and Directional i-Consistency |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 19 - Backtrack-Free search and Adaptive Consistency |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 20 - Adaptive Consistency: Bucket Elimination |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 21 - Search Methods for Solving CSPs |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 22 - Algorithm Backtracking |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 23 - Look-Ahead Methods in Search |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 24 - Look-Ahead Search: Examples |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 25 - Combining Search with Reasoning: Algorithm DPLL |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 26 - Algorithm Backmarking |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 27 - Dynamic Value Ordering, Dynamic Variable Ordering |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 28 - Look-Back Methods - Definitions |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 29 - Gaschnigs Backjumping: The Culprit Variable |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 30 - Gaschnigs Backjumping, Graph-Based Backjumping |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 31 - Graph-Based Backjumping: Internal and Relevant Dead-Ends |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 32 - Conflict-Directed Backjumping: Definitions |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 33 - Algorithm Conflict-Directed Backjumping |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 34 - Combining Look-Ahead and Look-Back: FC-CBJ |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 35 - Learning During Search |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 36 - Model Based Systems |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 37 - Model Based Diagnosis |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 38 - Truth Maintenance Systems |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 39 - Planning as Constraint Satisfaction |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 40 - Planning as Constraint Satisfaction (Continued...) |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 41 - Planning as Satisfiability |
Link |
NOC:AI:Constraint Satisfaction |
Lecture 42 - Wrapping Up and Further Study |
Link |
NOC:Computer Organization |
Lecture 1 - Introduction High Speed Circuit - Design Recursive Doubling |
Link |
NOC:Computer Organization |
Lecture 2 - High Speed Circuit Design - Fast Adder Circuits |
Link |
NOC:Computer Organization |
Lecture 3 - Lab 1 : Introduction |
Link |
NOC:Computer Organization |
Lecture 4 - Fast Adder Circuits (Continued...) |
Link |
NOC:Computer Organization |
Lecture 5 - Fast Multiplier Circuit |
Link |
NOC:Computer Organization |
Lecture 6 - Fast Multiplier Circuit (Continued...) |
Link |
NOC:Computer Organization |
Lecture 7 - Programming using X86 ISA - Addressing Modes |
Link |
NOC:Computer Organization |
Lecture 8 - Programming using X86 ISA - Addressing Modes |
Link |
NOC:Computer Organization |
Lecture 9 - Floating point - Precision and Accuracy |
Link |
NOC:Computer Organization |
Lecture 10 - Floating Point - Addition, Subtraction and Multiplication |
Link |
NOC:Computer Organization |
Lecture 11 - Instruction Set Architecture |
Link |
NOC:Computer Organization |
Lecture 12 - Instruction Set Architecture (Continued...) |
Link |
NOC:Computer Organization |
Lecture 13 - Lab 2 : Segmentation - Part I |
Link |
NOC:Computer Organization |
Lecture 14 - Lab 2 : Segmentation - Part II |
Link |
NOC:Computer Organization |
Lecture 15 - Lab 2 : Segmentation - Part III |
Link |
NOC:Computer Organization |
Lecture 16 - Orthogonal ISA, C Constructs Mapping, Addressing Modes |
Link |
NOC:Computer Organization |
Lecture 17 - Atomic and Predicated Instructions |
Link |
NOC:Computer Organization |
Lecture 18 - Atomic and Predicated Instructions (Continued...) |
Link |
NOC:Computer Organization |
Lecture 19 - General Purpose Registers |
Link |
NOC:Computer Organization |
Lecture 20 - Expanding opcodes |
Link |
NOC:Computer Organization |
Lecture 21 - Introduction to Pipelining |
Link |
NOC:Computer Organization |
Lecture 22 - Pipelining |
Link |
NOC:Computer Organization |
Lecture 23 - Data Hazards |
Link |
NOC:Computer Organization |
Lecture 24 - Lab 2 : Instruction Scheduling - Static and Dynamic |
Link |
NOC:Computer Organization |
Lecture 25 - Dynamic Instruction Scheduling |
Link |
NOC:Computer Organization |
Lecture 26 - Dynamic Instruction Scheduling (Continued...) |
Link |
NOC:Computer Organization |
Lecture 27 - Control Hazard, Branch Prediction |
Link |
NOC:Computer Organization |
Lecture 28 - Process Management |
Link |
NOC:Computer Organization |
Lecture 29 - Branch prediction |
Link |
NOC:Computer Organization |
Lecture 30 - Global Branch Prediction |
Link |
NOC:Computer Organization |
Lecture 31 - Structural Hazard, Architectural Enhancements |
Link |
NOC:Computer Organization |
Lecture 32 - Lab 3 : Virtual Memory |
Link |
NOC:Computer Organization |
Lecture 33 - Locality of Reference, Demand paging |
Link |
NOC:Computer Organization |
Lecture 34 - Page Replacement Algorithm |
Link |
NOC:Computer Organization |
Lecture 35 - Multilevel Paging, Translational Lookaside Buffer |
Link |
NOC:Computer Organization |
Lecture 36 - Multilevel Paging |
Link |
NOC:Computer Organization |
Lecture 37 - Multilevel Paging - Part 1 |
Link |
NOC:Computer Organization |
Lecture 38 - Page Frame Allocation, Beledy's Anomaly |
Link |
NOC:Computer Organization |
Lecture 39 - Paging, Cache |
Link |
NOC:Computer Organization |
Lecture 40 - Cache |
Link |
NOC:Computer Organization |
Lecture 41 - Cache Organisation |
Link |
NOC:Computer Organization |
Lecture 42 - Cache - Cache Coherency, Dual Ported Cache |
Link |
NOC:Computer Organization |
Lecture 43 - Multilevel Caching, Multitasking |
Link |
NOC:Computer Organization |
Lecture 44 - Cache, Degree of Multiprogramming |
Link |
NOC:Computer Organization |
Lecture 45 - Shared Memory Architecture |
Link |
NOC:Computer Organization |
Lecture 46 - Shared Memory Architecture - Part I |
Link |
NOC:Computer Organization |
Lecture 47 - Virtually Indexed - Virtually Tagged and Physically Tagged Caches |
Link |
NOC:Computer Organization |
Lecture 48 - Lab 4 : Task Switching (Continued...) |
Link |
NOC:Computer Organization |
Lecture 49 - Shared Memory Architecture, Cache Coherence |
Link |
NOC:Computer Organization |
Lecture 50 - Concurrent Programming in Hardware - Part I |
Link |
NOC:Computer Organization |
Lecture 51 - Concurrent Programming in Hardware - Part II |
Link |
NOC:Computer Organization |
Lecture 52 - Conclusion : Recent Trends in Computer Organization and Architecture |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 1 - Overview of Cellular Systems - Part 1 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 2 - Overview of Cellular Systems - Part 2 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 3 - Overview of Cellular Systems - Part 3 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 4 - 5G and other Wireless Technologies |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 5 - Basic Cellular Terminology |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 6 - Introduction to Antennas and Propagation Models |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 7 - Link budget, Fading margin, Outage |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 8 - Cellular Concept |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 9 - Cellular system design and analysis |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 10 - Cellular Geometry and System Design |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 11 - Cellular System Capacity, Trunking |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 12 - Handoff and Mobility |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 13 - Handoff Part 2, Classification of Signal Variation |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 14 - Shadowing, Outage, Multipath |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 15 - Rayleigh Fading and Statistical Characterization |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 16 - Properties of Rayleigh Distribution |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 17 - BER in Fading, Narrowband vs Wideband Channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 18 - Characterization of Multipath Fading Channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 19 - Choice of Modulation |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 20 - Coherent versus Differential Detection |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 21 - Review of Lecture 1-19 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 22 - Coherent vs Differential Detection - Part II and BER in Fading |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 23 - BER in Fading - Part II, Ricean Fading |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 24 - Ricean and Nakagami Fading, Moment Generating Function (MGF) |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 25 - MGF Part II, WSSUS Model |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 26 - WSSUS Part II, Coherence Time, Doppler Spectrum |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 27 - Doppler, Temporal Characteristics of Fading Channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 28 - WSSUS-Characterization of Time Dispersive Fading Channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 29 - WSSUS-Classification of Fading Channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 30 - Practical Channel Models (ITU, COST), Computer generation of Rayleigh fading |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 31 - Rayleigh Fading simulation - Clark and Gans Method, Jakes’ Method |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 32 - Jakes’ Method properties |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 33 - Introduction to Diversity, Antenna selection diversity |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 34 - Statistical Characterization of Antenna Diversity, Optimal Diversity Combining |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 35 - BER in fading, Equal Gain Combining |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 36 - Array Gain, Diversity Gain, Alamouti Scheme |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 37 - Alamouti Scheme - Part II, Channel Capacity |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 38 - Capacity of fading Channels, Capacity with Outage |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 39 - Channel State Information, Optimum Power Allocation |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 40 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 41 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 42 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 43 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 44 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 45 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 46 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 47 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 48 - Rake Receiver for multipath channels |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 49 - Multiuser environment |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 50 - CDMA system Capacity |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 51 - CDMA Multiuser Detectors - Part 1 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 52 - CDMA Multiuser Detectors - Part 2 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 53 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 54 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 55 |
Link |
NOC:Introduction to Wireless and Cellular Communications |
Lecture 56 |
Link |
NOC:Distributed Systems |
Lecture 1 - Introduction to Distributed Systems |
Link |
NOC:Distributed Systems |
Lecture 2 - Basic Algorithms in Message Passing System |
Link |
NOC:Distributed Systems |
Lecture 3 - Leader Election in Rings |
Link |
NOC:Distributed Systems |
Lecture 4 - Distributed Models of Computation, Causality and Logical Time |
Link |
NOC:Distributed Systems |
Lecture 5 - Size of Vector Clock, Matrix Clocks, Virtual Time and Physical Clock Synchronization |
Link |
NOC:Distributed Systems |
Lecture 6 - Global State and Snapshot Recording Algorithms |
Link |
NOC:Distributed Systems |
Lecture 7 - Distributed Mutual Exclusion and Non-Token based Approaches |
Link |
NOC:Distributed Systems |
Lecture 8 - Quorum Based Distributed Mutual Exclusion Approaches |
Link |
NOC:Distributed Systems |
Lecture 9 - Token Based Distributed Mutual Exclusion Approaches |
Link |
NOC:Distributed Systems |
Lecture 10 - Consensus and Agreement Algorithms |
Link |
NOC:Distributed Systems |
Lecture 11 - Checkpointing and Rollback Recovery |
Link |
NOC:Distributed Systems |
Lecture 12 - Deadlock Detection in Distributed Systems |
Link |
NOC:Distributed Systems |
Lecture 13 - Distributed Shared Memory |
Link |
NOC:Distributed Systems |
Lecture 14 - Distributed Minimum Spanning Tree |
Link |
NOC:Distributed Systems |
Lecture 15 - Termination Detection in Distributed System |
Link |
NOC:Distributed Systems |
Lecture 16 - Message Ordering and Group Communication |
Link |
NOC:Distributed Systems |
Lecture 17 - Self-Stabilization |
Link |
NOC:Distributed Systems |
Lecture 18 - Case Study 1 - Distributed Randomized Algorithms |
Link |
NOC:Distributed Systems |
Lecture 19 - Case Study 2 - Peer-to-Peer Computing and Structured Overlay Network |
Link |
NOC:Distributed Systems |
Lecture 20 - Case Study 3 - The Google File System (GFS) |
Link |
NOC:Distributed Systems |
Lecture 21 - Case Study 4 - MapReduce |
Link |
NOC:Distributed Systems |
Lecture 22 - Case Study 5 - HDFS |
Link |
NOC:Distributed Systems |
Lecture 23 - Case Study 6 - Spark |
Link |
NOC:Distributed Systems |
Lecture 24 - Case Study 7 - Distributed Algorithms for Sensor Networks |
Link |
NOC:Distributed Systems |
Lecture 25 - Case Study 8 - Authentication in Distributed Systems |
Link |
NOC:Distributed Systems |
Lecture 26 - Case Study 9 - Bitcoin: A Peer-to-Peer Electronic Cash System |
Link |
NOC:Distributed Systems |
Lecture 27 - Case Study 10 - BlockChain Technology |
Link |
NOC:Social Networks |
Lecture 1 - Introduction |
Link |
NOC:Social Networks |
Lecture 2 - Answer to the puzzle |
Link |
NOC:Social Networks |
Lecture 3 - Introduction to Python - 1 |
Link |
NOC:Social Networks |
Lecture 4 - Introduction to Python - 2 |
Link |
NOC:Social Networks |
Lecture 5 - Introduction to Networkx - 1 |
Link |
NOC:Social Networks |
Lecture 6 - Introduction to Networkx - 2 |
Link |
NOC:Social Networks |
Lecture 7 - Social Networks: The Challenge |
Link |
NOC:Social Networks |
Lecture 8 - Google Page Rank |
Link |
NOC:Social Networks |
Lecture 9 - Searching in a Network |
Link |
NOC:Social Networks |
Lecture 10 - Link Prediction |
Link |
NOC:Social Networks |
Lecture 11 - The Contagions |
Link |
NOC:Social Networks |
Lecture 12 - Importance of Acquaintances |
Link |
NOC:Social Networks |
Lecture 13 - Marketing on Social Networks |
Link |
NOC:Social Networks |
Lecture 14 - Introduction to Datasets |
Link |
NOC:Social Networks |
Lecture 15 - Ingredients Network |
Link |
NOC:Social Networks |
Lecture 16 - Synonymy Network |
Link |
NOC:Social Networks |
Lecture 17 - Web Graph |
Link |
NOC:Social Networks |
Lecture 18 - Social Network Datasets |
Link |
NOC:Social Networks |
Lecture 19 - Datasets : Different Formats |
Link |
NOC:Social Networks |
Lecture 20 - Datasets : How to Download? |
Link |
NOC:Social Networks |
Lecture 21 - Datasets : Analysing Using Networkx |
Link |
NOC:Social Networks |
Lecture 22 - Datasets : Analysing Using Gephi |
Link |
NOC:Social Networks |
Lecture 23 - Introduction : Emergence of Connectedness |
Link |
NOC:Social Networks |
Lecture 24 - Advanced Material : Emergence of Connectedness |
Link |
NOC:Social Networks |
Lecture 25 - Programming Illustration : Emergence of Connectedness |
Link |
NOC:Social Networks |
Lecture 26 - Summary to Datasets |
Link |
NOC:Social Networks |
Lecture 27 - Introduction |
Link |
NOC:Social Networks |
Lecture 28 - Granovetter's Strength of weak ties |
Link |
NOC:Social Networks |
Lecture 29 - Triads, clustering coefficient and neighborhood overlap |
Link |
NOC:Social Networks |
Lecture 30 - Structure of weak ties, bridges, and local bridges |
Link |
NOC:Social Networks |
Lecture 31 - Validation of Granovetter's experiment using cell phone data |
Link |
NOC:Social Networks |
Lecture 32 - Embededness |
Link |
NOC:Social Networks |
Lecture 33 - Structural Holes |
Link |
NOC:Social Networks |
Lecture 34 - Social Capital |
Link |
NOC:Social Networks |
Lecture 35 - Finding Communities in a graph (Brute Force Method) |
Link |
NOC:Social Networks |
Lecture 36 - Community Detection Using Girvan Newman Algorithm |
Link |
NOC:Social Networks |
Lecture 37 - Visualising Communities using Gephi |
Link |
NOC:Social Networks |
Lecture 38 - Tie Strength, Social Media and Passive Engagement |
Link |
NOC:Social Networks |
Lecture 39 - Betweenness Measures and Graph Partitioning |
Link |
NOC:Social Networks |
Lecture 40 - Strong and Weak Relationship - Summary |
Link |
NOC:Social Networks |
Lecture 41 - Introduction to Homophily - Should you watch your company ? |
Link |
NOC:Social Networks |
Lecture 42 - Selection and Social Influence |
Link |
NOC:Social Networks |
Lecture 43 - Interplay between Selection and Social Influence |
Link |
NOC:Social Networks |
Lecture 44 - Homophily - Definition and measurement |
Link |
NOC:Social Networks |
Lecture 45 - Foci Closure and Membership Closure |
Link |
NOC:Social Networks |
Lecture 46 - Introduction to Fatman Evolutionary model |
Link |
NOC:Social Networks |
Lecture 47 - Fatman Evolutionary Model - The Base Code (Adding people) |
Link |
NOC:Social Networks |
Lecture 48 - Fatman Evolutionary Model - The Base Code (Adding Social Foci) |
Link |
NOC:Social Networks |
Lecture 49 - Fatman Evolutionary Model - Implementing Homophily |
Link |
NOC:Social Networks |
Lecture 50 - Quantifying the Effect of Triadic Closure |
Link |
NOC:Social Networks |
Lecture 51 - Fatman Evolutionary Model - Implementing Closures |
Link |
NOC:Social Networks |
Lecture 52 - Fatman Evolutionary Model - Implementing Social Influence |
Link |
NOC:Social Networks |
Lecture 53 - Fatman Evolutionary Model - Storing and analyzing longitudnal data |
Link |
NOC:Social Networks |
Lecture 54 - Spatial Segregation : An Introduction |
Link |
NOC:Social Networks |
Lecture 55 - Spatial Segregation : Simulation of the Schelling Model |
Link |
NOC:Social Networks |
Lecture 56 - Spatial Segregation : Conclusion |
Link |
NOC:Social Networks |
Lecture 57 - Schelling Model Implementation - 1 (Introduction) |
Link |
NOC:Social Networks |
Lecture 58 - Schelling Model Implementation - 2 (Base Code) |
Link |
NOC:Social Networks |
Lecture 59 - Schelling Model Implementation - 3 (Visualization and Getting a list of boundary and internal nodes) |
Link |
NOC:Social Networks |
Lecture 60 - Schelling Model Implementation - 4 (Getting a list of unsatisfied nodes) |
Link |
NOC:Social Networks |
Lecture 61 - Schelling Model Implementation - 5 (Shifting the unsatisfied nodes and visualizing the final graph) |
Link |
NOC:Social Networks |
Lecture 62 - Chapter - 5 Positive and Negative Relationships (Introduction) |
Link |
NOC:Social Networks |
Lecture 63 - Structural Balance |
Link |
NOC:Social Networks |
Lecture 64 - Enemy'S Enemy is a Friend |
Link |
NOC:Social Networks |
Lecture 65 - Characterizing the Structure of Balanced Networks |
Link |
NOC:Social Networks |
Lecture 66 - Balance Theorem |
Link |
NOC:Social Networks |
Lecture 67 - Proof of Balance Theorem |
Link |
NOC:Social Networks |
Lecture 68 - Introduction to positive and negative edges |
Link |
NOC:Social Networks |
Lecture 69 - Outline of implemantation |
Link |
NOC:Social Networks |
Lecture 70 - Creating graph, displaying it and counting unstable triangles |
Link |
NOC:Social Networks |
Lecture 71 - Moving a network from an unstable to stable state |
Link |
NOC:Social Networks |
Lecture 72 - Forming two coalitions |
Link |
NOC:Social Networks |
Lecture 73 - Forming two coalitions (Continued...) |
Link |
NOC:Social Networks |
Lecture 74 - Visualizing coalitions and the evolution |
Link |
NOC:Social Networks |
Lecture 75 - The Web Graph |
Link |
NOC:Social Networks |
Lecture 76 - Collecting the Web Graph |
Link |
NOC:Social Networks |
Lecture 77 - Equal Coin Distribution |
Link |
NOC:Social Networks |
Lecture 78 - Random Coin Dropping |
Link |
NOC:Social Networks |
Lecture 79 - Google Page Ranking Using Web Graph |
Link |
NOC:Social Networks |
Lecture 80 - Implementing PageRank Using Points Distribution Method - 1 |
Link |
NOC:Social Networks |
Lecture 81 - Implementing PageRank Using Points Distribution Method - 2 |
Link |
NOC:Social Networks |
Lecture 82 - Implementing PageRank Using Points Distribution Method - 3 |
Link |
NOC:Social Networks |
Lecture 83 - Implementing PageRank Using Points Distribution Method - 4 |
Link |
NOC:Social Networks |
Lecture 84 - Implementing PageRank Using Random Walk Method - 1 |
Link |
NOC:Social Networks |
Lecture 85 - Implementing PageRank Using Random Walk Method - 2 |
Link |
NOC:Social Networks |
Lecture 86 - DegreeRank versus PageRank |
Link |
NOC:Social Networks |
Lecture 87 - We Follow |
Link |
NOC:Social Networks |
Lecture 88 - Why do we Follow? |
Link |
NOC:Social Networks |
Lecture 89 - Diffusion in Networks |
Link |
NOC:Social Networks |
Lecture 90 - Modeling Diffusion |
Link |
NOC:Social Networks |
Lecture 91 - Modeling Diffusion (Continued...) |
Link |
NOC:Social Networks |
Lecture 92 - Impact of Commmunities on Diffusion |
Link |
NOC:Social Networks |
Lecture 93 - Cascade and Clusters |
Link |
NOC:Social Networks |
Lecture 94 - Knowledge, Thresholds and the Collective Action |
Link |
NOC:Social Networks |
Lecture 95 - An Introduction to the Programming Screencast (Coding 4 major ideas) |
Link |
NOC:Social Networks |
Lecture 96 - The Base Code |
Link |
NOC:Social Networks |
Lecture 97 - Coding the First Big Idea - Increasing the Payoff |
Link |
NOC:Social Networks |
Lecture 98 - Coding the Second Big Idea - Key People |
Link |
NOC:Social Networks |
Lecture 99 - Coding the Third Big Idea - Impact of Communities on Cascades |
Link |
NOC:Social Networks |
Lecture 100 - Coding the Fourth Big Idea - Cascades and Clusters |
Link |
NOC:Social Networks |
Lecture 101 - Introduction to Hubs and Authorities (A Story) |
Link |
NOC:Social Networks |
Lecture 102 - Principle of Repeated Improvement (A story) |
Link |
NOC:Social Networks |
Lecture 103 - Principle of Repeated Improvement (An example) |
Link |
NOC:Social Networks |
Lecture 104 - Hubs and Authorities |
Link |
NOC:Social Networks |
Lecture 105 - PageRank Revisited - An example |
Link |
NOC:Social Networks |
Lecture 106 - PageRank Revisited - Convergence in the Example |
Link |
NOC:Social Networks |
Lecture 107 - PageRank Revisited - Conservation and Convergence |
Link |
NOC:Social Networks |
Lecture 108 - PageRank, conservation and convergence - Another example |
Link |
NOC:Social Networks |
Lecture 109 - Matrix Multiplication (Pre-requisite 1) |
Link |
NOC:Social Networks |
Lecture 110 - Convergence in Repeated Matrix Multiplication (Pre-requisite 1) |
Link |
NOC:Social Networks |
Lecture 111 - Addition of Two Vectors (Pre-requisite 2) |
Link |
NOC:Social Networks |
Lecture 112 - Convergence in Repeated Matrix Multiplication- The Details |
Link |
NOC:Social Networks |
Lecture 113 - PageRank as a Matrix Operation |
Link |
NOC:Social Networks |
Lecture 114 - PageRank Explained |
Link |
NOC:Social Networks |
Lecture 115 - Introduction to Powerlaw |
Link |
NOC:Social Networks |
Lecture 116 - Why do Normal Distributions Appear? |
Link |
NOC:Social Networks |
Lecture 117 - Power Law emerges in WWW graphs |
Link |
NOC:Social Networks |
Lecture 118 - Detecting the Presence of Powerlaw |
Link |
NOC:Social Networks |
Lecture 119 - Rich Get Richer Phenomenon |
Link |
NOC:Social Networks |
Lecture 120 - Summary So Far |
Link |
NOC:Social Networks |
Lecture 121 - Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model) - 1 |
Link |
NOC:Social Networks |
Lecture 122 - Implementing Rich-getting-richer Phenomenon (Barabasi-Albert Model) - 2 |
Link |
NOC:Social Networks |
Lecture 123 - Implementing a Random Graph (Erdos-Renyi Model) - 1 |
Link |
NOC:Social Networks |
Lecture 124 - Implementing a Random Graph (Erdos-Renyi Model) - 2 |
Link |
NOC:Social Networks |
Lecture 125 - Forced Versus Random Removal of Nodes (Attack Survivability) |
Link |
NOC:Social Networks |
Lecture 126 - Rich Get Richer - A Possible Reason |
Link |
NOC:Social Networks |
Lecture 127 - Rich Get Richer - The Long Tail |
Link |
NOC:Social Networks |
Lecture 128 - Epidemics- An Introduction |
Link |
NOC:Social Networks |
Lecture 129 - Introduction to epidemics (Continued...) |
Link |
NOC:Social Networks |
Lecture 130 - Simple Branching Process for Modeling Epidemics |
Link |
NOC:Social Networks |
Lecture 131 - Simple Branching Process for Modeling Epidemics (Continued...) |
Link |
NOC:Social Networks |
Lecture 132 - Basic Reproductive Number |
Link |
NOC:Social Networks |
Lecture 133 - Modeling epidemics on complex networks |
Link |
NOC:Social Networks |
Lecture 134 - SIR and SIS spreading models |
Link |
NOC:Social Networks |
Lecture 135 - Comparison between SIR and SIS spreading models |
Link |
NOC:Social Networks |
Lecture 136 - Basic Reproductive Number Revisited for Complex Networks |
Link |
NOC:Social Networks |
Lecture 137 - Percolation model |
Link |
NOC:Social Networks |
Lecture 138 - Analysis of basic reproductive number in branching model (The problem statement) |
Link |
NOC:Social Networks |
Lecture 139 - Analyzing basic reproductive number - 2 |
Link |
NOC:Social Networks |
Lecture 140 - Analyzing basic reproductive number - 3 |
Link |
NOC:Social Networks |
Lecture 141 - Analyzing basic reproductive number - 4 |
Link |
NOC:Social Networks |
Lecture 142 - Analyzing basic reproductive number - 5 |
Link |
NOC:Social Networks |
Lecture 143 - Small World Effect - An Introduction |
Link |
NOC:Social Networks |
Lecture 144 - Milgram's Experiment |
Link |
NOC:Social Networks |
Lecture 145 - The Reason |
Link |
NOC:Social Networks |
Lecture 146 - The Generative Model |
Link |
NOC:Social Networks |
Lecture 147 - Decentralized Search - I |
Link |
NOC:Social Networks |
Lecture 148 - Decentralized Search - II |
Link |
NOC:Social Networks |
Lecture 149 - Decentralized Search - III |
Link |
NOC:Social Networks |
Lecture 150 - Programming illustration- Small world networks : Introduction |
Link |
NOC:Social Networks |
Lecture 151 - Base code |
Link |
NOC:Social Networks |
Lecture 152 - Making homophily based edges |
Link |
NOC:Social Networks |
Lecture 153 - Adding weak ties |
Link |
NOC:Social Networks |
Lecture 154 - Plotting change in diameter |
Link |
NOC:Social Networks |
Lecture 155 - Programming illustration- Myopic Search : Introduction> |
Link |
NOC:Social Networks |
Lecture 156 - Myopic Search |
Link |
NOC:Social Networks |
Lecture 157 - Myopic Search comparision to optimal search |
Link |
NOC:Social Networks |
Lecture 158 - Time Taken by Myopic Search |
Link |
NOC:Social Networks |
Lecture 159 - PseudoCores : Introduction |
Link |
NOC:Social Networks |
Lecture 160 - How to be Viral |
Link |
NOC:Social Networks |
Lecture 161 - Who are the right key nodes? |
Link |
NOC:Social Networks |
Lecture 162 - finding the right key nodes (the core) |
Link |
NOC:Social Networks |
Lecture 163 - Coding K-Shell Decomposition |
Link |
NOC:Social Networks |
Lecture 164 - Coding cascading Model |
Link |
NOC:Social Networks |
Lecture 165 - Coding the importance of core nodes in cascading |
Link |
NOC:Social Networks |
Lecture 166 - Pseudo core |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 1 - Introduction to Probability - A box of chocolates |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 2 - Introduction to Probability - Axiomatic Approach to Probability Theory |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 3 - Introduction to Probability - Verifying Matrix Multipilication (Statement,Algorithm and Independence) |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 4 - Introduction to Probability - Verifying Matrix Multipilication (Correctness and Law of Total Probability) |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 5 - Introduction to Probability - How Strong is your Network? |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 6 - Introduction to Probability - How to Understand the World? Play with it! |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 7 - Tutorial 1 |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 8 - Tutorial 2 |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 9 - Discrete Random Variables - Basic Definitions |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 10 - Discrete Random Variables - Linearity of Expectation and Jensens Inequality |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 11 - Discrete Random Variables - Conditional Expectation I |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 12 - Discrete Random Variables - Conditional Expectation II |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 13 - Discrete Random Variables - Geometric Random Variables and Collecting Coupons |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 14 - Discrete Random Variables - Randomized Selection |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 15 - Tail Bounds I - Markov's Inequality |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 16 - Tail Bounds I - The Second Moment,Variance and Chebyshev's Inequality |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 17 - Tail Bounds I - Median via Sampling |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 18 - Tail Bounds I - Median via Sampling - Analysis |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 19 - Tail Bounds I - Moment Generating Functions and Chernoff Bounds |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 20 - Tail Bounds I - Parameter Estimation |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 21 - Tail Bounds I - Control Group Selection |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 22 - Applications of Tail Bounds - Routing in Sparse Networks |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 23 - Applications of Tail Bounds - Analysis of Valiant's Rounting |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 24 - Applications of Tail Bounds - Random Graphs |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 25 - Live Session 2 |
Link |
NOC:An Introduction to Probability in Computing |
Lecture 26 - Live Session |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 1 - Introduction to Human Computer Interaction |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 2 - What is HCI? Commonalities and Differences in Interfaces |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 3 - Door handle, Elevators, Contextual Inquiry, Affinity Diagrams |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 4 - Lab Session Contextual Inquiry |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 5 - Lab Session Affinity Diagram |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 6 - Tutorial on Photoshop |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 7 - Tutorial on UI Designing using Photoshop |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 8 - Institutional Review Board, Ethics committee, IRB documents / application, consent form |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 9 - Tutorial on Proto.io |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 10 - Tutorial on Lookback |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 11 - How to understand user needs? Surveys, Questionnaire |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 12 - How to understand user needs? Surveys, Questionnaire - Continues |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 13 - Prototyping: Low fidelity and High fidelity |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 14 - User-Centered Design |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 15 - Lab Session: Task Analysis |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 16 - Design Patterns |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 17 - Lab Session: Material Design |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 18 - Usable security |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 19 - Lab Session: Task Analysis - 2 |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 20 - Continuity of Usable Security |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 21 - Visual Design |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 22 - Visual Design - 2 |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 23 - Crypto price Tracker App |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 24 - Interacto |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 25 - Tech Hinder |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 26 - busKARO |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 27 - MayMayMe |
Link |
NOC:Introduction to Human Computer Interaction |
Lecture 28 - noWhinge |
Link |
NOC:Information Security-IV |
Lecture 1 - WISE Gen and The IT Revolution - 1 |
Link |
NOC:Information Security-IV |
Lecture 2 - WISE Gen and The IT Revolution - 1 (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 3 - WISE GEN - Next Step |
Link |
NOC:Information Security-IV |
Lecture 4 - Network Security : A Re-cap |
Link |
NOC:Information Security-IV |
Lecture 5 - Symmetric Key Cryptography and Digital Signatures |
Link |
NOC:Information Security-IV |
Lecture 6 - Basic Network Security Components |
Link |
NOC:Information Security-IV |
Lecture 7 - Internet Security Threats |
Link |
NOC:Information Security-IV |
Lecture 8 - History of Kali Linux |
Link |
NOC:Information Security-IV |
Lecture 9 - Penetration Testing with Kali Linux |
Link |
NOC:Information Security-IV |
Lecture 10 - Network Security and Forensics Introduction - I |
Link |
NOC:Information Security-IV |
Lecture 11 - Network Security and Forensics Introduction - II |
Link |
NOC:Information Security-IV |
Lecture 12 - Penetration Testing: An Introduction |
Link |
NOC:Information Security-IV |
Lecture 13 - Penetration testing steps in Kali Linux |
Link |
NOC:Information Security-IV |
Lecture 14 - Kali Linux Installation |
Link |
NOC:Information Security-IV |
Lecture 15 - Reconnaissance - Part I |
Link |
NOC:Information Security-IV |
Lecture 16 - Reconnaissance - Part II |
Link |
NOC:Information Security-IV |
Lecture 17 - Serverside Attacks: Tools in Kali Linux |
Link |
NOC:Information Security-IV |
Lecture 18 - Serverside Attacks: Tools in Kali Linux (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 19 - Serverside Attacks: Tools in Kali Linux (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 20 - Serverside Attacks: Tools in Kali Linux (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 21 - Serverside Attacks: Tools in Kali Linux (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 22 - Serverside Attacks: Tools in Kali Linux (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 23 - Client Side Attacks - Tools in Kali Linux - 1 |
Link |
NOC:Information Security-IV |
Lecture 24 - Client Side Attacks - Tools in Kali Linux - 2 |
Link |
NOC:Information Security-IV |
Lecture 25 - Client Side Attacks - Tools in Kali Linux - 3 |
Link |
NOC:Information Security-IV |
Lecture 26 - Client Side Attacks - Tools in Kali Linux - 4 |
Link |
NOC:Information Security-IV |
Lecture 27 - Authentication Based Attacks - Tools in Kali Linux - 1 |
Link |
NOC:Information Security-IV |
Lecture 28 - Authentication Based Attacks - Tools in Kali Linux - 2 |
Link |
NOC:Information Security-IV |
Lecture 29 - Authentication Based Attacks - Tools in Kali Linux - 3 |
Link |
NOC:Information Security-IV |
Lecture 30 - Authentication Based Attacks - Tools in Kali Linux - 4 |
Link |
NOC:Information Security-IV |
Lecture 31 - Authentication Based Attacks - Tools in Kali Linux - 5 |
Link |
NOC:Information Security-IV |
Lecture 32 - Web Attacks - Tools in Kali Linux - 1 |
Link |
NOC:Information Security-IV |
Lecture 33 - Web Attacks - Tools in Kali Linux - 2 |
Link |
NOC:Information Security-IV |
Lecture 34 - Penetration Testing Attacks - Defensive Countermeasures |
Link |
NOC:Information Security-IV |
Lecture 35 - Technical Fundamentals for Evidence Acquisition - 1 |
Link |
NOC:Information Security-IV |
Lecture 36 - Technical Fundamentals for Evidence Acquisition - 2 |
Link |
NOC:Information Security-IV |
Lecture 37 - Packet Capture Tools and Methods |
Link |
NOC:Information Security-IV |
Lecture 38 - Wireshark Introduction |
Link |
NOC:Information Security-IV |
Lecture 39 - Packet Analysis |
Link |
NOC:Information Security-IV |
Lecture 40 - Flow Analysis |
Link |
NOC:Information Security-IV |
Lecture 41 - Case study 1 |
Link |
NOC:Information Security-IV |
Lecture 42 - Case study 1 (Continued...) |
Link |
NOC:Information Security-IV |
Lecture 43 - Wireless Forensics - Technology |
Link |
NOC:Information Security-IV |
Lecture 44 - Wireless Network Security Framework |
Link |
NOC:Information Security-IV |
Lecture 45 - Wireless Access Points - Security issues |
Link |
NOC:Information Security-IV |
Lecture 46 - Case Study 2 - Use of tools |
Link |
NOC:Information Security-IV |
Lecture 47 - Network Security Devices - IDS |
Link |
NOC:Information Security-IV |
Lecture 48 - IDS Evidence Acquistion and SNORT |
Link |
NOC:Information Security-IV |
Lecture 49 - SNORT Rules |
Link |
NOC:Information Security-IV |
Lecture 50 - SNORT Installation |
Link |
NOC:Information Security-IV |
Lecture 51 - SNORT Configuration and Demonstration |
Link |
NOC:Information Security-IV |
Lecture 52 - Evidence collection in Switches and Routers |
Link |
NOC:Information Security-IV |
Lecture 53 - Evidence collection in Routers and Firewalls |
Link |
NOC:Information Security-IV |
Lecture 54 - IPTables rules and tool usage |
Link |
NOC:Information Security-IV |
Lecture 55 - Logs, Rules and Automated Tools |
Link |
NOC:Information Security-IV |
Lecture 56 - Re-cap of All Topics |
Link |
NOC:Information Security-IV |
Lecture 57 - Introduction to Meltdown Attack |
Link |
NOC:Information Security-IV |
Lecture 58 - Introduction to Meltdown - Address Space Basics |
Link |
NOC:Information Security-IV |
Lecture 59 - Meltdown Attack - Out of Order Execution |
Link |
NOC:Information Security-IV |
Lecture 60 - Meltdown Attack - Recovering from Exception |
Link |
NOC:Data Science for Engineers |
Lecture 1 - Data science for engineers Course philosophy and expectation |
Link |
NOC:Data Science for Engineers |
Lecture 2 - Introduction to R |
Link |
NOC:Data Science for Engineers |
Lecture 3 - Introduction to R (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 4 - Variables and datatypes in R |
Link |
NOC:Data Science for Engineers |
Lecture 5 - Data frames |
Link |
NOC:Data Science for Engineers |
Lecture 6 - Recasting and joining of dataframes |
Link |
NOC:Data Science for Engineers |
Lecture 7 - Arithmetic,Logical and Matrix operations in R |
Link |
NOC:Data Science for Engineers |
Lecture 8 - Advanced programming in R : Functions |
Link |
NOC:Data Science for Engineers |
Lecture 9 - Advanced Programming in R : Functions (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 10 - Control structures |
Link |
NOC:Data Science for Engineers |
Lecture 11 - Data visualization in R Basic graphics |
Link |
NOC:Data Science for Engineers |
Lecture 12 - Linear Algebra for Data science |
Link |
NOC:Data Science for Engineers |
Lecture 13 - Solving Linear Equations |
Link |
NOC:Data Science for Engineers |
Lecture 14 - Solving Linear Equations (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 15 - Linear Algebra - Distance,Hyperplanes and Halfspaces,Eigenvalues,Eigenvectors |
Link |
NOC:Data Science for Engineers |
Lecture 16 - Linear Algebra - Distance,Hyperplanes and Halfspaces,Eigenvalues,Eigenvectors (Continued... 1) |
Link |
NOC:Data Science for Engineers |
Lecture 17 - Linear Algebra - Distance,Hyperplanes and Halfspaces,Eigenvalues,Eigenvectors (Continued... 2) |
Link |
NOC:Data Science for Engineers |
Lecture 18 - Linear Algebra - Distance,Hyperplanes and Halfspaces,Eigenvalues,Eigenvectors (Continued... 3) |
Link |
NOC:Data Science for Engineers |
Lecture 19 - Statistical Modelling |
Link |
NOC:Data Science for Engineers |
Lecture 20 - Random Variables and Probability Mass/Density Functions |
Link |
NOC:Data Science for Engineers |
Lecture 21 - Sample Statistics |
Link |
NOC:Data Science for Engineers |
Lecture 22 - Hypotheses Testing |
Link |
NOC:Data Science for Engineers |
Lecture 23 - Optimization for Data Science |
Link |
NOC:Data Science for Engineers |
Lecture 24 - Unconstrained Multivariate Optimization |
Link |
NOC:Data Science for Engineers |
Lecture 25 - Unconstrained Multivariate Optimization (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 26 - Gradient (Steepest) Descent (OR) Learning Rule |
Link |
NOC:Data Science for Engineers |
Lecture 27 - Multivariate Optimization With Equality Constraints |
Link |
NOC:Data Science for Engineers |
Lecture 28 - Multivariate Optimization With Inequality Constraints |
Link |
NOC:Data Science for Engineers |
Lecture 29 - Introduction to Data Science |
Link |
NOC:Data Science for Engineers |
Lecture 30 - Solving Data Analysis Problems - A Guided Thought Process |
Link |
NOC:Data Science for Engineers |
Lecture 31 - Module : Predictive Modelling |
Link |
NOC:Data Science for Engineers |
Lecture 32 - Linear Regression |
Link |
NOC:Data Science for Engineers |
Lecture 33 - Model Assessment |
Link |
NOC:Data Science for Engineers |
Lecture 34 - Diagnostics to Improve Linear Model Fit |
Link |
NOC:Data Science for Engineers |
Lecture 35 - Simple Linear Regression Model Building |
Link |
NOC:Data Science for Engineers |
Lecture 36 - Simple Linear Regression Model Assessment |
Link |
NOC:Data Science for Engineers |
Lecture 37 - Simple Linear Regression Model Assessment (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 38 - Muliple Linear Regression |
Link |
NOC:Data Science for Engineers |
Lecture 39 - Cross Validation |
Link |
NOC:Data Science for Engineers |
Lecture 40 - Multiple Linear Regression Modelling Building and Selection |
Link |
NOC:Data Science for Engineers |
Lecture 41 - Classification |
Link |
NOC:Data Science for Engineers |
Lecture 42 - Logisitic Regression |
Link |
NOC:Data Science for Engineers |
Lecture 43 - Logisitic Regression (Continued...) |
Link |
NOC:Data Science for Engineers |
Lecture 44 - Performance Measures |
Link |
NOC:Data Science for Engineers |
Lecture 45 - Logisitic Regression Implementation in R |
Link |
NOC:Data Science for Engineers |
Lecture 46 - K-Nearest Neighbors (kNN) |
Link |
NOC:Data Science for Engineers |
Lecture 47 - K-Nearest Neighbors implementation in R |
Link |
NOC:Data Science for Engineers |
Lecture 48 - K-means Clustering |
Link |
NOC:Data Science for Engineers |
Lecture 49 - K-means implementation in R |
Link |
NOC:Data Science for Engineers |
Lecture 50 - Data Science for engineers - Summary |
Link |
NOC:The Joy of Computing using Python |
Lecture 1 - Introduction to Programming |
Link |
NOC:The Joy of Computing using Python |
Lecture 2 - Why Programming ? |
Link |
NOC:The Joy of Computing using Python |
Lecture 3 - Programming for Everybody |
Link |
NOC:The Joy of Computing using Python |
Lecture 4 - Any Prerequisites ? |
Link |
NOC:The Joy of Computing using Python |
Lecture 5 - Where to start? |
Link |
NOC:The Joy of Computing using Python |
Lecture 6 - Why do we have so many languages? |
Link |
NOC:The Joy of Computing using Python |
Lecture 7 - How to go about programming? |
Link |
NOC:The Joy of Computing using Python |
Lecture 8 - Why to learn programming? |
Link |
NOC:The Joy of Computing using Python |
Lecture 9 - What is programming? |
Link |
NOC:The Joy of Computing using Python |
Lecture 10 - How to give instructions ? |
Link |
NOC:The Joy of Computing using Python |
Lecture 11 - Introduction To Scratch |
Link |
NOC:The Joy of Computing using Python |
Lecture 12 - Introduction To Loops |
Link |
NOC:The Joy of Computing using Python |
Lecture 13 - More About Loops |
Link |
NOC:The Joy of Computing using Python |
Lecture 14 - Solution To Looping Problem |
Link |
NOC:The Joy of Computing using Python |
Lecture 15 - Scratch : Animation 1 |
Link |
NOC:The Joy of Computing using Python |
Lecture 16 - Scratch : Animation 2 |
Link |
NOC:The Joy of Computing using Python |
Lecture 17 - Scratch : Animation 3 |
Link |
NOC:The Joy of Computing using Python |
Lecture 18 - More On Scratch |
Link |
NOC:The Joy of Computing using Python |
Lecture 19 - Introduction to Anaconda |
Link |
NOC:The Joy of Computing using Python |
Lecture 20 - Installation of Anaconda |
Link |
NOC:The Joy of Computing using Python |
Lecture 21 - Introduction to Spyder IDE |
Link |
NOC:The Joy of Computing using Python |
Lecture 22 - Printing statements in Python |
Link |
NOC:The Joy of Computing using Python |
Lecture 23 - Understanding Variables in Python |
Link |
NOC:The Joy of Computing using Python |
Lecture 24 - Executing a sequence of instructions in the Console |
Link |
NOC:The Joy of Computing using Python |
Lecture 25 - Writing your First Program |
Link |
NOC:The Joy of Computing using Python |
Lecture 26 - Taking inputs from the user |
Link |
NOC:The Joy of Computing using Python |
Lecture 27 - Discount Calculation |
Link |
NOC:The Joy of Computing using Python |
Lecture 28 - Motivation to if condition |
Link |
NOC:The Joy of Computing using Python |
Lecture 29 - A reminder on how to deal with numbers |
Link |
NOC:The Joy of Computing using Python |
Lecture 30 - Understanding if condition's working |
Link |
NOC:The Joy of Computing using Python |
Lecture 31 - Realizing the importance of syntax and indentation |
Link |
NOC:The Joy of Computing using Python |
Lecture 32 - Introductions to loops |
Link |
NOC:The Joy of Computing using Python |
Lecture 33 - Loops: Sum of numbers |
Link |
NOC:The Joy of Computing using Python |
Lecture 34 - Loops: Sum of numbers (Continued...) |
Link |
NOC:The Joy of Computing using Python |
Lecture 35 - Loops: Multiplication Tables |
Link |
NOC:The Joy of Computing using Python |
Lecture 36 - Introducction to While Loop |
Link |
NOC:The Joy of Computing using Python |
Lecture 37 - Lists Part 1 : Introduction |
Link |
NOC:The Joy of Computing using Python |
Lecture 38 - Lists Part 2 : Manipulation |
Link |
NOC:The Joy of Computing using Python |
Lecture 39 - Lists Part 3 : Operations |
Link |
NOC:The Joy of Computing using Python |
Lecture 40 - Lists Part 4 : Slicing |
Link |
NOC:The Joy of Computing using Python |
Lecture 41 - Loops and Conditionals : Fizzbuzz 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 42 - Loops and Conditionals : Fizzbuzz 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 43 - Crowd Computing - Just estimate 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 44 - Crowd Computing - Just estimate 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 45 - Crowd Computing - Just estimate 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 46 - Crowd Computing - Just estimate 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 47 - Crowd Computing - Just estimate 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 48 - Crowd Computing - Just estimate 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 49 - Permutations - Jumbled Words 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 50 - Permutations - Jumbled Words 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 51 - Permutations - Jumbled Words 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 52 - Theory of Evolution 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 53 - Theory of Evolution 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 54 - Theory of Evolution 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 55 - Theory of Evolution 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 56 - Practice is the key |
Link |
NOC:The Joy of Computing using Python |
Lecture 57 - Magic Square Hit and Trial 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 58 - Magic Square Hit and Trial 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 59 - Magic Square Hit and Trial 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 60 - Magic Square Hit and Trial 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 61 - Magic Square Hit and Trial 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 62 - Let's program and play |
Link |
NOC:The Joy of Computing using Python |
Lecture 63 - Dobble Game - Spot the similarity 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 64 - Dobble Game - Spot the similarity 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 65 - Dobble Game - Spot the similarity 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 66 - Dobble Game - Spot the similarity 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 67 - What is your date of birth? |
Link |
NOC:The Joy of Computing using Python |
Lecture 68 - Birthday Paradox - Find your twin 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 69 - Birthday Paradox - Find your twin 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 70 - Birthday Paradox - Find your twin 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 71 - Birthday Paradox - Find your twin 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 72 - Birthday Paradox - Find your twin 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 73 - What's your favourite movie? |
Link |
NOC:The Joy of Computing using Python |
Lecture 74 - Guess the Movie Name 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 75 - Guess the Movie Name 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 76 - Guess the Movie Name 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 77 - Guess the Movie Name 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 78 - Guess the Movie Name 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 79 - Guess the Movie Name 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 80 - Dictionaries |
Link |
NOC:The Joy of Computing using Python |
Lecture 81 - Speech to Text : No need to write 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 82 - Speech to Text : No need to write 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 83 - Speech to Text : No need to write 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 84 - Monte Hall : 3 doors and a twist 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 85 - Monte Hall : 3 doors and a twist 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 86 - Rock, Paper and Scissor : Cheating not allowed !! 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 87 - Rock, Paper and Scissor : Cheating not allowed !! 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 88 - Rock, Paper and Scissor : Cheating not allowed !! 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 89 - Rock, Paper and Scissor : Cheating not allowed !! 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 90 - Sorting and Searching : 20 questions game 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 91 - Sorting and Searching : 20 questions game 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 92 - Sorting and Searching : 20 questions game 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 93 - Sorting and Searching : 20 questions game 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 94 - Sorting and Searching : 20 questions game 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 95 - Sorting and Searching : 20 questions game 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 96 - Sorting and Searching : 20 questions game 07 |
Link |
NOC:The Joy of Computing using Python |
Lecture 97 - Sorting and Searching : 20 questions game 08 |
Link |
NOC:The Joy of Computing using Python |
Lecture 98 - Substitution Cipher -The science of secrecy |
Link |
NOC:The Joy of Computing using Python |
Lecture 99 - Substitution Cipher -The science of secrecy 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 100 - Substitution Cipher -The science of secrecy 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 101 - Substitution Cipher -The science of secrecy 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 102 - Tic Tac Toe - Down the memory Lane |
Link |
NOC:The Joy of Computing using Python |
Lecture 103 - Tic Tac Toe - Down the memory Lane 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 104 - Tic Tac Toe - Down the memory Lane 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 105 - Tic Tac Toe - Down the memory Lane 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 106 - Tic Tac Toe - Down the memory Lane 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 107 - Tic Tac Toe - Down the memory Lane 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 108 - Recursion |
Link |
NOC:The Joy of Computing using Python |
Lecture 109 - Recursion 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 110 - Recursion 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 111 - Recursion 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 112 - Recursion 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 113 - Recursion 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 114 - Recursion 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 115 - Snakes and Ladders - Not on the Board |
Link |
NOC:The Joy of Computing using Python |
Lecture 116 - Snakes and Ladders - Not on the Board - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 117 - Snakes and Ladders - Not on the Board - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 118 - Snakes and Ladders - Not on the Board - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 119 - Snakes and Ladders - Not on the Board - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 120 - Snakes and Ladders - Not on the Board - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 121 - Snakes and Ladders - Not on the Board - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 122 - Spiral Traversing - Let's Animate |
Link |
NOC:The Joy of Computing using Python |
Lecture 123 - Spiral Traversing - Let's Animate - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 124 - Spiral Traversing - Let's Animate - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 125 - Spiral Traversing - Let's Animate - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 126 - Spiral Traversing - Let's Animate - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 127 - Spiral Traversing - Let's Animate - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 128 - Spiral Traversing - Let's Animate - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 129 - Spiral Traversing - Let's Animate - Part 07 |
Link |
NOC:The Joy of Computing using Python |
Lecture 130 - GPS - Track the route |
Link |
NOC:The Joy of Computing using Python |
Lecture 131 - GPS - Track the route - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 132 - GPS - Track the route - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 133 - GPS - Track the route - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 134 - GPS - Track the route - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 135 - Tuples- Python Data Structure |
Link |
NOC:The Joy of Computing using Python |
Lecture 136 - Lottery Simulation - Profit or Loss |
Link |
NOC:The Joy of Computing using Python |
Lecture 137 - Lottery Simulation - Profit or Loss - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 138 - Lottery Simulation - Profit or Loss - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 139 - Lottery Simulation - Profit or Loss - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 140 - Lottery Simulation - Profit or Loss - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 141 - Lottery Simulation - Profit or Loss - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 142 - Lottery Simulation - Profit or Loss - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 143 - Image Processing - Enhance your images |
Link |
NOC:The Joy of Computing using Python |
Lecture 144 - Image Processing - Enhance your images - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 145 - Image Processing - Enhance your images - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 146 - Image Processing - Enhance your images - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 147 - Anagrams |
Link |
NOC:The Joy of Computing using Python |
Lecture 148 - Anagrams - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 149 - Anagrams - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 150 - Anagrams - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 151 - Anagrams - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 152 - Facebook Sentiment Analysis |
Link |
NOC:The Joy of Computing using Python |
Lecture 153 - Facebook Sentiment Analysis - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 154 - Facebook Sentiment Analysis - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 155 - Facebook Sentiment Analysis - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 156 - Facebook Sentiment Analysis - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 157 - Natural Language Processing - Author Stylometry |
Link |
NOC:The Joy of Computing using Python |
Lecture 158 - Natural Language Processing - Author Stylometry - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 159 - Natural Language Processing - Author Stylometry - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 160 - Natural Language Processing - Author Stylometry - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 161 - Natural Language Processing - Author Stylometry - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 162 - Natural Language Processing - Author Stylometry - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 163 - Natural Language Processing - Author Stylometry - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 164 - Natural Language Processing - Author Stylometry - Part 07 |
Link |
NOC:The Joy of Computing using Python |
Lecture 165 - Natural Language Processing - Author Stylometry - Part 08 |
Link |
NOC:The Joy of Computing using Python |
Lecture 166 - Natural Language Processing - Author Stylometry - Part 09 |
Link |
NOC:The Joy of Computing using Python |
Lecture 167 - Natural Language Processing - Author Stylometry - Part 10 |
Link |
NOC:The Joy of Computing using Python |
Lecture 168 - Introduction to Networkx - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 169 - Introduction to Networkx - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 170 - Six Degrees of Separation : Meet your favourites |
Link |
NOC:The Joy of Computing using Python |
Lecture 171 - Six Degrees of Separation : Meet your favourites - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 172 - Six Degrees of Separation : Meet your favourites - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 173 - Six Degrees of Separation : Meet your favourites - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 174 - Area Calculation - Don't Measure |
Link |
NOC:The Joy of Computing using Python |
Lecture 175 - Area Calculation - Don't Measure - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 176 - Area Calculation - Don't Measure - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 177 - Area Calculation - Don't Measure - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 178 - Area Calculation - Don't Measure - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 179 - Area Calculation - Don't Measure - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 180 - Area Calculation - Don't Measure - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 181 - FLAMES - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 182 - FLAMES - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 183 - FLAMES - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 184 - FLAMES - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 185 - FLAMES - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 186 - FLAMES - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 187 - Data Compression - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 188 - Data Compression - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 189 - Data Compression - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 190 - Data Compression - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 191 - Data Compression - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 192 - Browser Automation Watsapp using Python - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 193 - Browser Automation Watsapp using Python - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 194 - Browser Automation Watsapp using Python - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 195 - Browser Automation Watsapp using Python - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 196 - Fun with Calendar - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 197 - Fun with Calendar - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 198 - Fun with Calendar - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 199 - Fun with Calendar - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 200 - Fun with Calendar - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 201 - Fun with Calendar - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 202 - Fun with Calendar - Part 07 |
Link |
NOC:The Joy of Computing using Python |
Lecture 203 - Fun with Calendar - Part 08 |
Link |
NOC:The Joy of Computing using Python |
Lecture 204 - Fun with Calendar - Part 09 |
Link |
NOC:The Joy of Computing using Python |
Lecture 205 - Fun with Calendar - Part 10 |
Link |
NOC:The Joy of Computing using Python |
Lecture 206 - Fun with Calendar - Part 11 |
Link |
NOC:The Joy of Computing using Python |
Lecture 207 - Fun with Calendar - Part 12 |
Link |
NOC:The Joy of Computing using Python |
Lecture 208 - Page Rank - How does Google Work ? - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 209 - Page Rank - How does Google Work ? - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 210 - Page Rank - How does Google Work ? - Part 03 |
Link |
NOC:The Joy of Computing using Python |
Lecture 211 - Page Rank - How does Google Work ? - Part 04 |
Link |
NOC:The Joy of Computing using Python |
Lecture 212 - Page Rank - How does Google Work ? - Part 05 |
Link |
NOC:The Joy of Computing using Python |
Lecture 213 - Page Rank - How does Google Work ? - Part 06 |
Link |
NOC:The Joy of Computing using Python |
Lecture 214 - Page Rank - How does Google Work ? - Part 07 |
Link |
NOC:The Joy of Computing using Python |
Lecture 215 - Page Rank - How does Google Work ? - Part 08 |
Link |
NOC:The Joy of Computing using Python |
Lecture 216 - Page Rank - How does Google Work ? - Part 09 |
Link |
NOC:The Joy of Computing using Python |
Lecture 217 - Page Rank - How does Google Work ? - Part 10 |
Link |
NOC:The Joy of Computing using Python |
Lecture 218 - Page Rank - How does Google Work ? - Part 11 |
Link |
NOC:The Joy of Computing using Python |
Lecture 219 - Page Rank - How does Google Work ? - Part 12 |
Link |
NOC:The Joy of Computing using Python |
Lecture 220 - Page Rank - How does Google Work ? - Part 13 |
Link |
NOC:The Joy of Computing using Python |
Lecture 221 - Page Rank - How does Google Work ? - Part 14 |
Link |
NOC:The Joy of Computing using Python |
Lecture 222 - Page Rank - How does Google Work ? - Part 15 |
Link |
NOC:The Joy of Computing using Python |
Lecture 223 - Page Rank - How does Google Work ? - Part 16 |
Link |
NOC:The Joy of Computing using Python |
Lecture 224 - Collatz Conjecture - Part 01 |
Link |
NOC:The Joy of Computing using Python |
Lecture 225 - Collatz Conjecture - Part 02 |
Link |
NOC:The Joy of Computing using Python |
Lecture 226 - JOC Conclusion |
Link |
NOC:Discrete Mathematics |
Lecture 1 - Motivation for Counting |
Link |
NOC:Discrete Mathematics |
Lecture 2 - Paper Folding Example |
Link |
NOC:Discrete Mathematics |
Lecture 3 - Rubik's Cube Example |
Link |
NOC:Discrete Mathematics |
Lecture 4 - Factorial Example |
Link |
NOC:Discrete Mathematics |
Lecture 5 - Counting in Computer Science |
Link |
NOC:Discrete Mathematics |
Lecture 6 - Motivation for Catalan numbers |
Link |
NOC:Discrete Mathematics |
Lecture 7 - Rule of Sum and Rule of Product |
Link |
NOC:Discrete Mathematics |
Lecture 8 - Problems on Rule of Sum and Rule of Product |
Link |
NOC:Discrete Mathematics |
Lecture 9 - Factorial Explained |
Link |
NOC:Discrete Mathematics |
Lecture 10 - Proof of n! - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 11 - Proof of n! - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 12 - Astronomical Numbers |
Link |
NOC:Discrete Mathematics |
Lecture 13 - Permutations - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 14 - Permutations - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 15 - Permutations - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 16 - Permutations - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 17 - Problems on Permutations |
Link |
NOC:Discrete Mathematics |
Lecture 18 - Combinations - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 19 - Combinations - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 20 - Combinations - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 21 - Combinations - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 22 - Problems on Combinations |
Link |
NOC:Discrete Mathematics |
Lecture 23 - Difference between Permuations and Combinations |
Link |
NOC:Discrete Mathematics |
Lecture 24 - Combination with Repetition - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 25 - Combination with Repetition - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 26 - Combination with Repetition - Problems |
Link |
NOC:Discrete Mathematics |
Lecture 27 - Binomial theorem |
Link |
NOC:Discrete Mathematics |
Lecture 28 - Applications of Binomial theorem |
Link |
NOC:Discrete Mathematics |
Lecture 29 - Properties of Binomial theorem |
Link |
NOC:Discrete Mathematics |
Lecture 30 - Multinomial theorem |
Link |
NOC:Discrete Mathematics |
Lecture 31 - Problems on Binomial theorem |
Link |
NOC:Discrete Mathematics |
Lecture 32 - Pascal's Triangle |
Link |
NOC:Discrete Mathematics |
Lecture 33 - Fun facts on Pascal's Triangle |
Link |
NOC:Discrete Mathematics |
Lecture 34 - Catalan Numbers - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 35 - Catalan Numbers - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 36 - Catalan Numbers - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 37 - Catalan Numbers - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 38 - Examples of Catalan numbers |
Link |
NOC:Discrete Mathematics |
Lecture 39 - Chapter Summary |
Link |
NOC:Discrete Mathematics |
Lecture 40 - Introduction to Set Theory |
Link |
NOC:Discrete Mathematics |
Lecture 41 - Example, definiton and notation |
Link |
NOC:Discrete Mathematics |
Lecture 42 - Sets - Problems Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 43 - Subsets - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 44 - Subsets - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 45 - Subsets - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 46 - Union and intersections of sets |
Link |
NOC:Discrete Mathematics |
Lecture 47 - Union and intersections of sets - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 48 - Union and intersections of sets - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 49 - Union and intersections of sets - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 50 - Cardinality of Union of two sets - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 51 - Cardinality of Union of two sets - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 52 - Cardinality of Union of three sets |
Link |
NOC:Discrete Mathematics |
Lecture 53 - Power Set - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 54 - Power set - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 55 - Power set - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 56 - Connection betwenn Binomial Theorem and Power Sets |
Link |
NOC:Discrete Mathematics |
Lecture 57 - Power set - Problems |
Link |
NOC:Discrete Mathematics |
Lecture 58 - Complement of a set |
Link |
NOC:Discrete Mathematics |
Lecture 59 - De Morgan's Laws - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 60 - De Morgan's Laws - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 61 - A proof technique |
Link |
NOC:Discrete Mathematics |
Lecture 62 - De Morgan's Laws - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 63 - De Morgan's Laws - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 64 - Set difference - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 65 - Set difference - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 66 - Symmetric difference |
Link |
NOC:Discrete Mathematics |
Lecture 67 - History |
Link |
NOC:Discrete Mathematics |
Lecture 68 - Summary |
Link |
NOC:Discrete Mathematics |
Lecture 69 - Motivational example |
Link |
NOC:Discrete Mathematics |
Lecture 70 - Introduction to Statements |
Link |
NOC:Discrete Mathematics |
Lecture 71 - Examples and Non-examples of Statements |
Link |
NOC:Discrete Mathematics |
Lecture 72 - Introduction to Negation |
Link |
NOC:Discrete Mathematics |
Lecture 73 - Negation - Explanation |
Link |
NOC:Discrete Mathematics |
Lecture 74 - Negation - Truthtable |
Link |
NOC:Discrete Mathematics |
Lecture 75 - Examples for Negation |
Link |
NOC:Discrete Mathematics |
Lecture 76 - Motivation for OR operator |
Link |
NOC:Discrete Mathematics |
Lecture 77 - Introduction to OR operator |
Link |
NOC:Discrete Mathematics |
Lecture 78 - Truthtable for OR operator |
Link |
NOC:Discrete Mathematics |
Lecture 79 - OR operator for 3 Variables |
Link |
NOC:Discrete Mathematics |
Lecture 80 - Truthtable for AND operator |
Link |
NOC:Discrete Mathematics |
Lecture 81 - AND operator for 3 Variables |
Link |
NOC:Discrete Mathematics |
Lecture 82 - Primitive and Compound statements - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 83 - Primitive and Compound statements - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 84 - Problems involoving NOT, OR and AND operators |
Link |
NOC:Discrete Mathematics |
Lecture 85 - Introduction to implication |
Link |
NOC:Discrete Mathematics |
Lecture 86 - Examples and Non-examples of Implication - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 87 - Examples and Non-examples of Implication - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 88 - Explanation of Implication |
Link |
NOC:Discrete Mathematics |
Lecture 89 - Introduction to Double Implication |
Link |
NOC:Discrete Mathematics |
Lecture 90 - Explanation of Double Implication |
Link |
NOC:Discrete Mathematics |
Lecture 91 - Converse, Inverse and Contrapositive |
Link |
NOC:Discrete Mathematics |
Lecture 92 - XOR operator - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 93 - XOR operator - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 94 - XOR operator - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 95 - Problems |
Link |
NOC:Discrete Mathematics |
Lecture 96 - Tautology, Contradiction - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 97 - Tautology, Contradiction - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 98 - Tautology, Contradiction - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 99 - SAT Problem - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 100 - SAT Problem - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 101 - Logical Equivalence - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 102 - Logical Equivalence - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 103 - Logical Equivalence - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 104 - Logical Equivalence - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 105 - Motivation for laws of logic |
Link |
NOC:Discrete Mathematics |
Lecture 106 - Double negation - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 107 - Double negation - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 108 - Laws of Logic |
Link |
NOC:Discrete Mathematics |
Lecture 109 - De Morgan's Law - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 110 - De Morgan's Law - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 111 - Rules of Inferences - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 112 - Rules of Inferences - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 113 - Rules of Inferences - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 114 - Rules of Inferences - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 115 - Rules of Inferences - Part 5 |
Link |
NOC:Discrete Mathematics |
Lecture 116 - Rules of Inferences - Part 6 |
Link |
NOC:Discrete Mathematics |
Lecture 117 - Rules of Inferences - Part 7 |
Link |
NOC:Discrete Mathematics |
Lecture 118 - Conclusion |
Link |
NOC:Discrete Mathematics |
Lecture 119 - Introduction to Relation |
Link |
NOC:Discrete Mathematics |
Lecture 120 - Graphical Representation of a Relation |
Link |
NOC:Discrete Mathematics |
Lecture 121 - Various sets |
Link |
NOC:Discrete Mathematics |
Lecture 122 - Matrix Representation of a Relation |
Link |
NOC:Discrete Mathematics |
Lecture 123 - Relation - An Example |
Link |
NOC:Discrete Mathematics |
Lecture 124 - Cartesian Product |
Link |
NOC:Discrete Mathematics |
Lecture 125 - Set Representation of a Relation |
Link |
NOC:Discrete Mathematics |
Lecture 126 - Revisiting Representations of a Relation |
Link |
NOC:Discrete Mathematics |
Lecture 127 - Examples of Relations |
Link |
NOC:Discrete Mathematics |
Lecture 128 - Number of relations - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 129 - Number of relations - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 130 - Reflexive relation - Introduction |
Link |
NOC:Discrete Mathematics |
Lecture 131 - Example of a Reflexive relation |
Link |
NOC:Discrete Mathematics |
Lecture 132 - Reflexive relation - Matrix representation |
Link |
NOC:Discrete Mathematics |
Lecture 133 - Number of Reflexive relations |
Link |
NOC:Discrete Mathematics |
Lecture 134 - Symmetric Relation - Introduction |
Link |
NOC:Discrete Mathematics |
Lecture 135 - Symmetric Relation - Matrix representation |
Link |
NOC:Discrete Mathematics |
Lecture 136 - Symmetric Relation - Examples and non examples |
Link |
NOC:Discrete Mathematics |
Lecture 137 - Parallel lines revisited |
Link |
NOC:Discrete Mathematics |
Lecture 138 - Number of symmetric relations - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 139 - Number of symmetric relations - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 140 - Examples of Reflexive and Symmetric Relations |
Link |
NOC:Discrete Mathematics |
Lecture 141 - Pattern |
Link |
NOC:Discrete Mathematics |
Lecture 142 - Transitive relation - Examples and non examples |
Link |
NOC:Discrete Mathematics |
Lecture 143 - Antisymmetric relation |
Link |
NOC:Discrete Mathematics |
Lecture 144 - Examples of Transitive and Antisymmetric Relation |
Link |
NOC:Discrete Mathematics |
Lecture 145 - Antisymmetric - Graphical representation |
Link |
NOC:Discrete Mathematics |
Lecture 146 - Antisymmetric - Matrix representation |
Link |
NOC:Discrete Mathematics |
Lecture 147 - Number of Antisymmetric relations |
Link |
NOC:Discrete Mathematics |
Lecture 148 - Condition for relation to be reflexive |
Link |
NOC:Discrete Mathematics |
Lecture 149 - Few notations |
Link |
NOC:Discrete Mathematics |
Lecture 150 - Condition for relation to be reflexive |
Link |
NOC:Discrete Mathematics |
Lecture 151 - Condition for relation to be reflexive |
Link |
NOC:Discrete Mathematics |
Lecture 152 - Condition for relation to be symmetric |
Link |
NOC:Discrete Mathematics |
Lecture 153 - Condition for relation to be symmetric |
Link |
NOC:Discrete Mathematics |
Lecture 154 - Condition for relation to be antisymmetric |
Link |
NOC:Discrete Mathematics |
Lecture 155 - Equivalence relation |
Link |
NOC:Discrete Mathematics |
Lecture 156 - Equivalence relation - Example 4 |
Link |
NOC:Discrete Mathematics |
Lecture 157 - Partition - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 158 - Partition - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 159 - Partition - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 160 - Partition - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 161 - Partition - Part 5 |
Link |
NOC:Discrete Mathematics |
Lecture 162 - Partition - Part 6 |
Link |
NOC:Discrete Mathematics |
Lecture 163 - Motivational Example - 1 |
Link |
NOC:Discrete Mathematics |
Lecture 164 - Motivational Example - 2 |
Link |
NOC:Discrete Mathematics |
Lecture 165 - Commonality in examples |
Link |
NOC:Discrete Mathematics |
Lecture 166 - Motivational Example - 3 |
Link |
NOC:Discrete Mathematics |
Lecture 167 - Example - 4 Explanation |
Link |
NOC:Discrete Mathematics |
Lecture 168 - Introduction to functions |
Link |
NOC:Discrete Mathematics |
Lecture 169 - Defintion of a function - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 170 - Defintion of a function - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 171 - Defintion of a function - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 172 - Relations vs Functions - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 173 - Relations vs Functions - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 174 - Introduction to One-One Function |
Link |
NOC:Discrete Mathematics |
Lecture 175 - One-One Function - Example 1 |
Link |
NOC:Discrete Mathematics |
Lecture 176 - One-One Function - Example 2 |
Link |
NOC:Discrete Mathematics |
Lecture 177 - One-One Function - Example 3 |
Link |
NOC:Discrete Mathematics |
Lecture 178 - Proving a Function is One-One |
Link |
NOC:Discrete Mathematics |
Lecture 179 - Examples and Non- examples of One-One function |
Link |
NOC:Discrete Mathematics |
Lecture 180 - Cardinality condition in One-One function - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 181 - Cardinality condition in One-One function - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 182 - Introduction to Onto Function - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 183 - Introduction to Onto Function - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 184 - Definition of Onto Function |
Link |
NOC:Discrete Mathematics |
Lecture 185 - Examples of Onto Function |
Link |
NOC:Discrete Mathematics |
Lecture 186 - Cardinality condition in Onto function - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 187 - Cardinality condition in Onto function - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 188 - Introduction to Bijection |
Link |
NOC:Discrete Mathematics |
Lecture 189 - Examples of Bijection |
Link |
NOC:Discrete Mathematics |
Lecture 190 - Cardinality condition in Bijection - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 191 - Cardinality condition in Bijection - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 192 - Counting number of functions |
Link |
NOC:Discrete Mathematics |
Lecture 193 - Number of functions |
Link |
NOC:Discrete Mathematics |
Lecture 194 - Number of One-One functions - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 195 - Number of One-One functions - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 196 - Number of One-One functions - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 197 - Number of Onto functions |
Link |
NOC:Discrete Mathematics |
Lecture 198 - Number of Bijections |
Link |
NOC:Discrete Mathematics |
Lecture 199 - Counting number of functions. |
Link |
NOC:Discrete Mathematics |
Lecture 200 - Motivation for Composition of functions - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 201 - Motivation for Composition of functions - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 202 - Definition of Composition of functions |
Link |
NOC:Discrete Mathematics |
Lecture 203 - Why study Composition of functions |
Link |
NOC:Discrete Mathematics |
Lecture 204 - Example of Composition of functions - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 205 - Example of Composition of functions - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 206 - Motivation for Inverse functions |
Link |
NOC:Discrete Mathematics |
Lecture 207 - Inverse functions |
Link |
NOC:Discrete Mathematics |
Lecture 208 - Examples of Inverse functions |
Link |
NOC:Discrete Mathematics |
Lecture 209 - Application of inverse functions - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 210 - Three stories |
Link |
NOC:Discrete Mathematics |
Lecture 211 - Three stories - Connecting the dots |
Link |
NOC:Discrete Mathematics |
Lecture 212 - Mathematical induction - An illustration |
Link |
NOC:Discrete Mathematics |
Lecture 213 - Mathematical Induction - Its essence |
Link |
NOC:Discrete Mathematics |
Lecture 214 - Mathematical Induction - The formal way |
Link |
NOC:Discrete Mathematics |
Lecture 215 - MI - Sum of odd numbers |
Link |
NOC:Discrete Mathematics |
Lecture 216 - MI - Sum of powers of 2 |
Link |
NOC:Discrete Mathematics |
Lecture 217 - MI - Inequality 1 |
Link |
NOC:Discrete Mathematics |
Lecture 218 - MI - Inequality 1 (solution) |
Link |
NOC:Discrete Mathematics |
Lecture 219 - MI - To prove divisibility |
Link |
NOC:Discrete Mathematics |
Lecture 220 - MI - To prove divisibility (solution) |
Link |
NOC:Discrete Mathematics |
Lecture 221 - MI - Problem on satisfying inequalities |
Link |
NOC:Discrete Mathematics |
Lecture 222 - MI - Problem on satisfying inequalities (solutions) |
Link |
NOC:Discrete Mathematics |
Lecture 223 - MI - Inequality 2 |
Link |
NOC:Discrete Mathematics |
Lecture 224 - MI - Inequality 2 solution |
Link |
NOC:Discrete Mathematics |
Lecture 225 - Mathematical Induction - Example 9 |
Link |
NOC:Discrete Mathematics |
Lecture 226 - Mathematical Induction - Example 10 solution |
Link |
NOC:Discrete Mathematics |
Lecture 227 - Binomial Coeffecients - Proof by induction |
Link |
NOC:Discrete Mathematics |
Lecture 228 - Checker board and Triomioes - A puzzle |
Link |
NOC:Discrete Mathematics |
Lecture 229 - Checker board and triominoes - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 230 - Mathematical induction - An important note |
Link |
NOC:Discrete Mathematics |
Lecture 231 - Mathematical Induction - A false proof |
Link |
NOC:Discrete Mathematics |
Lecture 232 - A false proof - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 233 - Motivation for Pegionhole Principle |
Link |
NOC:Discrete Mathematics |
Lecture 234 - Group of n people |
Link |
NOC:Discrete Mathematics |
Lecture 235 - Set of n integgers |
Link |
NOC:Discrete Mathematics |
Lecture 236 - 10 points on an equilateral triangle |
Link |
NOC:Discrete Mathematics |
Lecture 237 - Pegionhole Principle - A result |
Link |
NOC:Discrete Mathematics |
Lecture 238 - Consecutive integers |
Link |
NOC:Discrete Mathematics |
Lecture 239 - Consecutive integers solution |
Link |
NOC:Discrete Mathematics |
Lecture 240 - Matching initials |
Link |
NOC:Discrete Mathematics |
Lecture 241 - Matching initials - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 242 - Numbers adding to 9 |
Link |
NOC:Discrete Mathematics |
Lecture 243 - Numbers adding to 9 - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 244 - Deck of cards |
Link |
NOC:Discrete Mathematics |
Lecture 245 - Deck of cards - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 246 - Number of errors |
Link |
NOC:Discrete Mathematics |
Lecture 247 - Number of errors - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 248 - Puzzle - Challenge for you |
Link |
NOC:Discrete Mathematics |
Lecture 249 - Friendship - an interesting property |
Link |
NOC:Discrete Mathematics |
Lecture 250 - Connectedness through Connecting people |
Link |
NOC:Discrete Mathematics |
Lecture 251 - Traversing the bridges |
Link |
NOC:Discrete Mathematics |
Lecture 252 - Three utilities problem |
Link |
NOC:Discrete Mathematics |
Lecture 253 - Coloring the India map |
Link |
NOC:Discrete Mathematics |
Lecture 254 - Defintion of a Graph |
Link |
NOC:Discrete Mathematics |
Lecture 255 - Degree and degree sequence |
Link |
NOC:Discrete Mathematics |
Lecture 256 - Relation between number of edges and degrees |
Link |
NOC:Discrete Mathematics |
Lecture 257 - Relation between number of edges and degrees - Proof |
Link |
NOC:Discrete Mathematics |
Lecture 258 - Hand shaking lemma - Corollary |
Link |
NOC:Discrete Mathematics |
Lecture 259 - Problems based on Hand shaking lemma |
Link |
NOC:Discrete Mathematics |
Lecture 260 - Havel Hakimi theorem - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 261 - Havel Hakimi theorem - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 262 - Havel Hakimi theorem - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 263 - Havel Hakimi theorem - Part 4 |
Link |
NOC:Discrete Mathematics |
Lecture 264 - Havel Hakimi theorem - Part 5 |
Link |
NOC:Discrete Mathematics |
Lecture 265 - Regular graph and irregular graph |
Link |
NOC:Discrete Mathematics |
Lecture 266 - Walk |
Link |
NOC:Discrete Mathematics |
Lecture 267 - Trail |
Link |
NOC:Discrete Mathematics |
Lecture 268 - Path and closed path |
Link |
NOC:Discrete Mathematics |
Lecture 269 - Definitions revisited |
Link |
NOC:Discrete Mathematics |
Lecture 270 - Examples of walk, trail and path |
Link |
NOC:Discrete Mathematics |
Lecture 271 - Cycle and circuit |
Link |
NOC:Discrete Mathematics |
Lecture 272 - Example of cycle and circuit |
Link |
NOC:Discrete Mathematics |
Lecture 273 - Relation between walk and path |
Link |
NOC:Discrete Mathematics |
Lecture 274 - Relation between walk and path - An induction proof |
Link |
NOC:Discrete Mathematics |
Lecture 275 - Subgraph |
Link |
NOC:Discrete Mathematics |
Lecture 276 - Spanning and induced subgraph |
Link |
NOC:Discrete Mathematics |
Lecture 277 - Spanning and induced subgraph - A result |
Link |
NOC:Discrete Mathematics |
Lecture 278 - Introduction to Tree |
Link |
NOC:Discrete Mathematics |
Lecture 279 - Connected and Disconnected graphs |
Link |
NOC:Discrete Mathematics |
Lecture 280 - Property of a cycle |
Link |
NOC:Discrete Mathematics |
Lecture 281 - Edge condition for connectivity |
Link |
NOC:Discrete Mathematics |
Lecture 282 - Connecting connectedness and path |
Link |
NOC:Discrete Mathematics |
Lecture 283 - Connecting connectedness and path - An illustration |
Link |
NOC:Discrete Mathematics |
Lecture 284 - Cut vertex |
Link |
NOC:Discrete Mathematics |
Lecture 285 - Cut edge |
Link |
NOC:Discrete Mathematics |
Lecture 286 - Illustration of cut vertices and cut edges |
Link |
NOC:Discrete Mathematics |
Lecture 287 - NetworkX - Need of the hour |
Link |
NOC:Discrete Mathematics |
Lecture 288 - Introduction to Python - Installation |
Link |
NOC:Discrete Mathematics |
Lecture 289 - Introduction to Python - Basics |
Link |
NOC:Discrete Mathematics |
Lecture 290 - Introduction to NetworkX |
Link |
NOC:Discrete Mathematics |
Lecture 291 - Story so far - Using NetworkX |
Link |
NOC:Discrete Mathematics |
Lecture 292 - Directed, weighted and multi graphs |
Link |
NOC:Discrete Mathematics |
Lecture 293 - Illustration of Directed, weighted and multi graphs |
Link |
NOC:Discrete Mathematics |
Lecture 294 - Graph representations - Introduction |
Link |
NOC:Discrete Mathematics |
Lecture 295 - Adjacency matrix representation |
Link |
NOC:Discrete Mathematics |
Lecture 296 - Incidence matrix representation |
Link |
NOC:Discrete Mathematics |
Lecture 297 - Isomorphism - Introduction |
Link |
NOC:Discrete Mathematics |
Lecture 298 - Isomorphic graphs - An illustration |
Link |
NOC:Discrete Mathematics |
Lecture 299 - Isomorphic graphs - A challenge |
Link |
NOC:Discrete Mathematics |
Lecture 300 - Non-isomorphic graphs |
Link |
NOC:Discrete Mathematics |
Lecture 301 - Isomorphism - A question |
Link |
NOC:Discrete Mathematics |
Lecture 302 - Complement of a Graph - Introduction |
Link |
NOC:Discrete Mathematics |
Lecture 303 - Complement of a Graph - Illiustration |
Link |
NOC:Discrete Mathematics |
Lecture 304 - Self complement |
Link |
NOC:Discrete Mathematics |
Lecture 305 - Complement of a disconnected graph is connected |
Link |
NOC:Discrete Mathematics |
Lecture 306 - Complement of a disconnected graph is connected - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 307 - Which is more? Connected graphs or disconnected graphs? |
Link |
NOC:Discrete Mathematics |
Lecture 308 - Bipartite graphs. |
Link |
NOC:Discrete Mathematics |
Lecture 309 - Bipartite graphs - A puzzle |
Link |
NOC:Discrete Mathematics |
Lecture 310 - Bipartite graphs - Converse part of the puzzle |
Link |
NOC:Discrete Mathematics |
Lecture 311 - Definition of Eulerian Graph |
Link |
NOC:Discrete Mathematics |
Lecture 312 - Illustration of eulerian graph |
Link |
NOC:Discrete Mathematics |
Lecture 313 - Non- example of Eulerian graph |
Link |
NOC:Discrete Mathematics |
Lecture 314 - Litmus test for an Eulerian graph |
Link |
NOC:Discrete Mathematics |
Lecture 315 - Why even degree? |
Link |
NOC:Discrete Mathematics |
Lecture 316 - Proof for even degree implies graph is eulerian |
Link |
NOC:Discrete Mathematics |
Lecture 317 - A condition for Eulerian trail |
Link |
NOC:Discrete Mathematics |
Lecture 318 - Why the name Eulerian |
Link |
NOC:Discrete Mathematics |
Lecture 319 - Can you traverse all location? |
Link |
NOC:Discrete Mathematics |
Lecture 320 - Defintion of Hamiltonian graphs |
Link |
NOC:Discrete Mathematics |
Lecture 321 - Examples of Hamiltonian graphs |
Link |
NOC:Discrete Mathematics |
Lecture 322 - Hamiltonian graph - A result |
Link |
NOC:Discrete Mathematics |
Lecture 323 - A result on connectedness |
Link |
NOC:Discrete Mathematics |
Lecture 324 - A result on Path |
Link |
NOC:Discrete Mathematics |
Lecture 325 - Dirac's Theorem |
Link |
NOC:Discrete Mathematics |
Lecture 326 - Dirac's theorem - A note |
Link |
NOC:Discrete Mathematics |
Lecture 327 - Ore's Theorem |
Link |
NOC:Discrete Mathematics |
Lecture 328 - Dirac's Theorem v/s Ore's Theorem |
Link |
NOC:Discrete Mathematics |
Lecture 329 - Eulerian and Hamiltonian Are they related |
Link |
NOC:Discrete Mathematics |
Lecture 330 - Importance of Hamiltonian graphs in Computer science |
Link |
NOC:Discrete Mathematics |
Lecture 331 - Constructing non intersecting roads |
Link |
NOC:Discrete Mathematics |
Lecture 332 - Definition of a Planar graph |
Link |
NOC:Discrete Mathematics |
Lecture 333 - Examples of Planar graphs |
Link |
NOC:Discrete Mathematics |
Lecture 334 - V - E + R = 2 |
Link |
NOC:Discrete Mathematics |
Lecture 335 - Illustration of V - E + R =2 |
Link |
NOC:Discrete Mathematics |
Lecture 336 - V - E + R = 2; Use induction |
Link |
NOC:Discrete Mathematics |
Lecture 337 - Proof of V - E + R = 2 |
Link |
NOC:Discrete Mathematics |
Lecture 338 - Famous non-planar graphs |
Link |
NOC:Discrete Mathematics |
Lecture 339 - Litmus test for planarity |
Link |
NOC:Discrete Mathematics |
Lecture 340 - Planar graphs - Inequality 1 |
Link |
NOC:Discrete Mathematics |
Lecture 341 - 3 Utilities problem - Revisited |
Link |
NOC:Discrete Mathematics |
Lecture 342 - Complete graph on 5 vertices is non-planar - Proof |
Link |
NOC:Discrete Mathematics |
Lecture 343 - Prisoners and cells |
Link |
NOC:Discrete Mathematics |
Lecture 344 - Prisoners example and Proper coloring |
Link |
NOC:Discrete Mathematics |
Lecture 345 - Chromatic number of a graph |
Link |
NOC:Discrete Mathematics |
Lecture 346 - Examples on Proper coloring |
Link |
NOC:Discrete Mathematics |
Lecture 347 - Recalling the India map problem |
Link |
NOC:Discrete Mathematics |
Lecture 348 - Recalling the India map problem - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 349 - NetworkX - Digraphs |
Link |
NOC:Discrete Mathematics |
Lecture 350 - NetworkX - Adjacency matrix |
Link |
NOC:Discrete Mathematics |
Lecture 351 - NetworkX - Random graphs |
Link |
NOC:Discrete Mathematics |
Lecture 352 - NetworkX - Subgarph |
Link |
NOC:Discrete Mathematics |
Lecture 353 - NetworkX - Isomorphic graphs Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 354 - NetworkX - Isomorphic graphs Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 355 - NetworkX - Isomorphic graphs: A game to play |
Link |
NOC:Discrete Mathematics |
Lecture 356 - NetworkX - Graph complement |
Link |
NOC:Discrete Mathematics |
Lecture 357 - NetworkX - Eulerian graphs |
Link |
NOC:Discrete Mathematics |
Lecture 358 - NetworkX - Bipaprtite graphs |
Link |
NOC:Discrete Mathematics |
Lecture 359 - NetworkX - Coloring |
Link |
NOC:Discrete Mathematics |
Lecture 360 - Counting in a creative way |
Link |
NOC:Discrete Mathematics |
Lecture 361 - Example 1 - Fun with words |
Link |
NOC:Discrete Mathematics |
Lecture 362 - Words and the polynomial |
Link |
NOC:Discrete Mathematics |
Lecture 363 - Words and the polynomial - Explained |
Link |
NOC:Discrete Mathematics |
Lecture 364 - Example 2 - Picking five balls |
Link |
NOC:Discrete Mathematics |
Lecture 365 - Picking five balls - Solution |
Link |
NOC:Discrete Mathematics |
Lecture 366 - Picking five balls - Another version |
Link |
NOC:Discrete Mathematics |
Lecture 367 - Defintion of Generating function |
Link |
NOC:Discrete Mathematics |
Lecture 368 - Generating function examples - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 369 - Generating function examples - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 370 - Generating function examples - Part 3 |
Link |
NOC:Discrete Mathematics |
Lecture 371 - Binomial expansion - A generating function |
Link |
NOC:Discrete Mathematics |
Lecture 372 - Binomial expansion - Explained |
Link |
NOC:Discrete Mathematics |
Lecture 373 - Picking 7 balls - The naive way |
Link |
NOC:Discrete Mathematics |
Lecture 374 - Picking 7 balls - The creative way |
Link |
NOC:Discrete Mathematics |
Lecture 375 - Generating functions - Problem 1 |
Link |
NOC:Discrete Mathematics |
Lecture 376 - Generating functions - Problem 2 |
Link |
NOC:Discrete Mathematics |
Lecture 377 - Generating functions - Problem 3 |
Link |
NOC:Discrete Mathematics |
Lecture 378 - Why Generating function? |
Link |
NOC:Discrete Mathematics |
Lecture 379 - Introduction to Advanced Counting |
Link |
NOC:Discrete Mathematics |
Lecture 380 - Example 1 : Dogs and Cats |
Link |
NOC:Discrete Mathematics |
Lecture 381 - Inclusion-Exclusion Formula |
Link |
NOC:Discrete Mathematics |
Lecture 382 - Proof of Inclusion - Exlusion formula |
Link |
NOC:Discrete Mathematics |
Lecture 383 - Example 2 : Integer solutions of an equation |
Link |
NOC:Discrete Mathematics |
Lecture 384 - Example 3 : Words not containing some strings |
Link |
NOC:Discrete Mathematics |
Lecture 385 - Example 4 : Arranging 3 x's, 3 y's and 3 z's |
Link |
NOC:Discrete Mathematics |
Lecture 386 - Example 5 : Non-multiples of 2 or 3 |
Link |
NOC:Discrete Mathematics |
Lecture 387 - Example 6 : Integers not divisible by 5, 7 or 11 |
Link |
NOC:Discrete Mathematics |
Lecture 388 - A tip in solving problems |
Link |
NOC:Discrete Mathematics |
Lecture 389 - Example 7 : A dog nor a cat |
Link |
NOC:Discrete Mathematics |
Lecture 390 - Example 8 : Brownies, Muffins and Cookies |
Link |
NOC:Discrete Mathematics |
Lecture 391 - Example 10 : Integer solutions of an equation |
Link |
NOC:Discrete Mathematics |
Lecture 392 - Example 11 : Seating Arrangement - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 393 - Example 11 : Seating Arrangement - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 394 - Example 12 : Integer solutions of an equation |
Link |
NOC:Discrete Mathematics |
Lecture 395 - Number of Onto Functions. |
Link |
NOC:Discrete Mathematics |
Lecture 396 - Formula for Number of Onto Functions |
Link |
NOC:Discrete Mathematics |
Lecture 397 - Example 13 : Onto Functions |
Link |
NOC:Discrete Mathematics |
Lecture 398 - Example 14 : No one in their own house |
Link |
NOC:Discrete Mathematics |
Lecture 399 - Derangements |
Link |
NOC:Discrete Mathematics |
Lecture 400 - Derangements of 4 numbers |
Link |
NOC:Discrete Mathematics |
Lecture 401 - Example 15 : Bottles and caps |
Link |
NOC:Discrete Mathematics |
Lecture 402 - Example 16 : Self grading |
Link |
NOC:Discrete Mathematics |
Lecture 403 - Example 17 : Even integers and their places |
Link |
NOC:Discrete Mathematics |
Lecture 404 - Example 18 : Finding total number of items |
Link |
NOC:Discrete Mathematics |
Lecture 405 - Example 19 : Devising a secret code |
Link |
NOC:Discrete Mathematics |
Lecture 406 - Placing rooks on the chessboard |
Link |
NOC:Discrete Mathematics |
Lecture 407 - Rook Polynomial |
Link |
NOC:Discrete Mathematics |
Lecture 408 - Rook Polynomial |
Link |
NOC:Discrete Mathematics |
Lecture 409 - Motivation for recurrence relation |
Link |
NOC:Discrete Mathematics |
Lecture 410 - Getting started with recurrence relations |
Link |
NOC:Discrete Mathematics |
Lecture 411 - What is a recurrence relation? |
Link |
NOC:Discrete Mathematics |
Lecture 412 - Compound Interest as a recurrence relation |
Link |
NOC:Discrete Mathematics |
Lecture 413 - Examples of recurrence relations |
Link |
NOC:Discrete Mathematics |
Lecture 414 - Example - Number of ways of climbing steps |
Link |
NOC:Discrete Mathematics |
Lecture 415 - Number of ways of climbing steps: Recurrence relation |
Link |
NOC:Discrete Mathematics |
Lecture 416 - Example - Rabbits on an island |
Link |
NOC:Discrete Mathematics |
Lecture 417 - Example - n-bit string |
Link |
NOC:Discrete Mathematics |
Lecture 418 - Example - n-bit string without consecutive zero |
Link |
NOC:Discrete Mathematics |
Lecture 419 - Solving Linear Recurrence Relations - A theorem |
Link |
NOC:Discrete Mathematics |
Lecture 420 - A note on the proof |
Link |
NOC:Discrete Mathematics |
Lecture 421 - Soving recurrence relation - Example 1 |
Link |
NOC:Discrete Mathematics |
Lecture 422 - Soving recurrence relation - Example 2 |
Link |
NOC:Discrete Mathematics |
Lecture 423 - Fibonacci Sequence |
Link |
NOC:Discrete Mathematics |
Lecture 424 - Introduction to Fibonacci sequence |
Link |
NOC:Discrete Mathematics |
Lecture 425 - Solution of Fibbonacci sequence |
Link |
NOC:Discrete Mathematics |
Lecture 426 - A basic introduction to 'complexity' |
Link |
NOC:Discrete Mathematics |
Lecture 427 - Intuition for 'complexity' |
Link |
NOC:Discrete Mathematics |
Lecture 428 - Visualizing complexity order as a graph |
Link |
NOC:Discrete Mathematics |
Lecture 429 - Tower of Hanoi |
Link |
NOC:Discrete Mathematics |
Lecture 430 - Reccurence relation of Tower of Hanoi |
Link |
NOC:Discrete Mathematics |
Lecture 431 - Solution for the recurrence relation of Tower of Hanoi |
Link |
NOC:Discrete Mathematics |
Lecture 432 - A searching technique |
Link |
NOC:Discrete Mathematics |
Lecture 433 - Recurrence relation for Binary search |
Link |
NOC:Discrete Mathematics |
Lecture 434 - Solution for the recurrence relation of Binary search |
Link |
NOC:Discrete Mathematics |
Lecture 435 - Example: Door knocks example |
Link |
NOC:Discrete Mathematics |
Lecture 436 - Example: Door knocks example solution |
Link |
NOC:Discrete Mathematics |
Lecture 437 - Door knock example and Merge sort |
Link |
NOC:Discrete Mathematics |
Lecture 438 - Introduction to Merge sort - 1 |
Link |
NOC:Discrete Mathematics |
Lecture 439 - Introduction to Merge sort - 2 |
Link |
NOC:Discrete Mathematics |
Lecture 440 - Intoduction to advanced topics |
Link |
NOC:Discrete Mathematics |
Lecture 441 - Introduction to Chromatic polynomial |
Link |
NOC:Discrete Mathematics |
Lecture 442 - Chromatic polynomial of complete graphs |
Link |
NOC:Discrete Mathematics |
Lecture 443 - Chromatic polynomial of cycle on 4 vertices - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 444 - Chromatic polynomial of cycle on 4 vertices - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 445 - Correspondence between partition and generating functions |
Link |
NOC:Discrete Mathematics |
Lecture 446 - Correspondence between partition and generating functions: In general |
Link |
NOC:Discrete Mathematics |
Lecture 447 - Distinct partitions and odd partitions |
Link |
NOC:Discrete Mathematics |
Lecture 448 - Distinct partitions and generating functions |
Link |
NOC:Discrete Mathematics |
Lecture 449 - Odd partitions and generating functions |
Link |
NOC:Discrete Mathematics |
Lecture 450 - Distinct partitions equals odd partitions: Observation |
Link |
NOC:Discrete Mathematics |
Lecture 451 - Distinct partitions equals odd partitions: Proof |
Link |
NOC:Discrete Mathematics |
Lecture 452 - Why 'partitions' to 'polynomial'? |
Link |
NOC:Discrete Mathematics |
Lecture 453 - Example: Picking 4 letters from the word 'INDIAN' |
Link |
NOC:Discrete Mathematics |
Lecture 454 - Motivation for exponential generating function |
Link |
NOC:Discrete Mathematics |
Lecture 455 - Recurrrence relation: The theorem and its proof |
Link |
NOC:Discrete Mathematics |
Lecture 456 - Introduction to Group Theory |
Link |
NOC:Discrete Mathematics |
Lecture 457 - Uniqueness of the identity element |
Link |
NOC:Discrete Mathematics |
Lecture 458 - Formal definition of a Group |
Link |
NOC:Discrete Mathematics |
Lecture 459 - Groups: Examples and non-examples |
Link |
NOC:Discrete Mathematics |
Lecture 460 - Groups: Special Examples - Part 1 |
Link |
NOC:Discrete Mathematics |
Lecture 461 - Groups: Special Examples - Part 2 |
Link |
NOC:Discrete Mathematics |
Lecture 462 - Subgroup: Defintion and examples |
Link |
NOC:Discrete Mathematics |
Lecture 463 - Lagrange's theorem |
Link |
NOC:Discrete Mathematics |
Lecture 464 - Summary |
Link |
NOC:Discrete Mathematics |
Lecture 465 - Conclusion |
Link |
NOC:Deep Learning |
Lecture 1 - Biological Neuron |
Link |
NOC:Deep Learning |
Lecture 2 - From Spring to Winter of AI |
Link |
NOC:Deep Learning |
Lecture 3 - The Deep Revival |
Link |
NOC:Deep Learning |
Lecture 4 - From Cats to Convolutional Neural Networks |
Link |
NOC:Deep Learning |
Lecture 5 - Faster, higher, stronger |
Link |
NOC:Deep Learning |
Lecture 6 - The Curious Case of Sequences |
Link |
NOC:Deep Learning |
Lecture 7 - Beating humans at their own games (literally) |
Link |
NOC:Deep Learning |
Lecture 8 - The Madness (2013) |
Link |
NOC:Deep Learning |
Lecture 9 - (Need for) Sanity |
Link |
NOC:Deep Learning |
Lecture 10 - Motivation from Biological Neurons |
Link |
NOC:Deep Learning |
Lecture 11 - McCulloch Pitts Neuron, Thresholding Logic |
Link |
NOC:Deep Learning |
Lecture 12 - Perceptrons |
Link |
NOC:Deep Learning |
Lecture 13 - Error and Error Surfaces |
Link |
NOC:Deep Learning |
Lecture 14 - Perceptron Learning Algorithm |
Link |
NOC:Deep Learning |
Lecture 15 - Proof of Convergence of Perceptron Learning Algorithm |
Link |
NOC:Deep Learning |
Lecture 16 - Deep Learning (CS7015): Linearly Separable Boolean Functions |
Link |
NOC:Deep Learning |
Lecture 17 - Deep Learning (CS7015): Representation Power of a Network of Perceptrons |
Link |
NOC:Deep Learning |
Lecture 18 - Deep Learning (CS7015): Sigmoid Neuron |
Link |
NOC:Deep Learning |
Lecture 19 - Deep Learning (CS7015): A typical Supervised Machine Learning Setup |
Link |
NOC:Deep Learning |
Lecture 20 - Deep Learning (CS7015): Learning Parameters: (Infeasible) guess work |
Link |
NOC:Deep Learning |
Lecture 21 - Deep Learning (CS7015): Learning Parameters: Gradient Descent |
Link |
NOC:Deep Learning |
Lecture 22 - Deep Learning (CS7015): Representation Power of Multilayer Network of Sigmoid Neurons |
Link |
NOC:Deep Learning |
Lecture 23 - Feedforward Neural Networks (a.k.a multilayered network of neurons) |
Link |
NOC:Deep Learning |
Lecture 24 - Learning Paramters of Feedforward Neural Networks (Intuition) |
Link |
NOC:Deep Learning |
Lecture 25 - Output functions and Loss functions |
Link |
NOC:Deep Learning |
Lecture 26 - Backpropagation (Intuition) |
Link |
NOC:Deep Learning |
Lecture 27 - Backpropagation: Computing Gradients w.r.t. the Output Units |
Link |
NOC:Deep Learning |
Lecture 28 - Backpropagation: Computing Gradients w.r.t. Hidden Units |
Link |
NOC:Deep Learning |
Lecture 29 - Backpropagation: Computing Gradients w.r.t. Parameters |
Link |
NOC:Deep Learning |
Lecture 30 - Backpropagation: Pseudo code |
Link |
NOC:Deep Learning |
Lecture 31 - Derivative of the activation function |
Link |
NOC:Deep Learning |
Lecture 32 - Information content, Entropy and cross entropy |
Link |
NOC:Deep Learning |
Lecture 33 - Recap: Learning Parameters: Guess Work, Gradient Descent |
Link |
NOC:Deep Learning |
Lecture 34 - Contours Maps |
Link |
NOC:Deep Learning |
Lecture 35 - Momentum based Gradient Descent |
Link |
NOC:Deep Learning |
Lecture 36 - Nesterov Accelerated Gradient Descent |
Link |
NOC:Deep Learning |
Lecture 37 - Stochastic And Mini-Batch Gradient Descent |
Link |
NOC:Deep Learning |
Lecture 38 - Tips for Adjusting Learning Rate and Momentum |
Link |
NOC:Deep Learning |
Lecture 39 - Line Search |
Link |
NOC:Deep Learning |
Lecture 40 - Gradient Descent with Adaptive Learning Rate |
Link |
NOC:Deep Learning |
Lecture 41 - Bias Correction in Adam |
Link |
NOC:Deep Learning |
Lecture 42 - Eigenvalues and Eigenvectors |
Link |
NOC:Deep Learning |
Lecture 43 - Linear Algebra : Basic Definitions |
Link |
NOC:Deep Learning |
Lecture 44 - Eigenvalue Decompositon |
Link |
NOC:Deep Learning |
Lecture 45 - Principal Component Analysis and its Interpretations |
Link |
NOC:Deep Learning |
Lecture 46 - PCA: Interpretation 2 |
Link |
NOC:Deep Learning |
Lecture 47 - PCA: Interpretation 3 |
Link |
NOC:Deep Learning |
Lecture 48 - PCA: Interpretation 3 (Continued...) |
Link |
NOC:Deep Learning |
Lecture 49 - PCA: Practical Example |
Link |
NOC:Deep Learning |
Lecture 50 - Singular Value Decomposition |
Link |
NOC:Deep Learning |
Lecture 51 - Introduction to Autoncoders |
Link |
NOC:Deep Learning |
Lecture 52 - Link between PCA and Autoencoders |
Link |
NOC:Deep Learning |
Lecture 53 - Regularization in autoencoders (Motivation) |
Link |
NOC:Deep Learning |
Lecture 54 - Denoising Autoencoders |
Link |
NOC:Deep Learning |
Lecture 55 - Sparse Autoencoders |
Link |
NOC:Deep Learning |
Lecture 56 - Contractive Autoencoders |
Link |
NOC:Deep Learning |
Lecture 57 - Bias and Variance |
Link |
NOC:Deep Learning |
Lecture 58 - Train error vs Test error |
Link |
NOC:Deep Learning |
Lecture 59 - Train error vs Test error (Recap) |
Link |
NOC:Deep Learning |
Lecture 60 - True error and Model complexity |
Link |
NOC:Deep Learning |
Lecture 61 - L2 regularization |
Link |
NOC:Deep Learning |
Lecture 62 - Dataset augmentation |
Link |
NOC:Deep Learning |
Lecture 63 - Parameter sharing and tying |
Link |
NOC:Deep Learning |
Lecture 64 - Adding Noise to the inputs |
Link |
NOC:Deep Learning |
Lecture 65 - Adding Noise to the outputs |
Link |
NOC:Deep Learning |
Lecture 66 - Early stopping |
Link |
NOC:Deep Learning |
Lecture 67 - Ensemble Methods |
Link |
NOC:Deep Learning |
Lecture 68 - Dropout |
Link |
NOC:Deep Learning |
Lecture 69 - A quick recap of training deep neural networks |
Link |
NOC:Deep Learning |
Lecture 70 - Unsupervised pre-training |
Link |
NOC:Deep Learning |
Lecture 71 - Better activation functions |
Link |
NOC:Deep Learning |
Lecture 72 - Better initialization strategies |
Link |
NOC:Deep Learning |
Lecture 73 - Batch Normalization |
Link |
NOC:Deep Learning |
Lecture 74 - One-hot representations of words |
Link |
NOC:Deep Learning |
Lecture 75 - Distributed Representations of words |
Link |
NOC:Deep Learning |
Lecture 76 - SVD for learning word representations |
Link |
NOC:Deep Learning |
Lecture 77 - SVD for learning word representations (Continued...) |
Link |
NOC:Deep Learning |
Lecture 78 - Continuous bag of words model |
Link |
NOC:Deep Learning |
Lecture 79 - Skip-gram model |
Link |
NOC:Deep Learning |
Lecture 80 - Skip-gram model (Continued...) |
Link |
NOC:Deep Learning |
Lecture 81 - Contrastive estimation |
Link |
NOC:Deep Learning |
Lecture 82 - Hierarchical softmax |
Link |
NOC:Deep Learning |
Lecture 83 - GloVe representations |
Link |
NOC:Deep Learning |
Lecture 84 - Evaluating word representations |
Link |
NOC:Deep Learning |
Lecture 85 - Relation between SVD and Word2Vec |
Link |
NOC:Deep Learning |
Lecture 86 - The convolution operation |
Link |
NOC:Deep Learning |
Lecture 87 - Relation between input size, output size and filter size |
Link |
NOC:Deep Learning |
Lecture 88 - Convolutional Neural Networks |
Link |
NOC:Deep Learning |
Lecture 89 - Convolutional Neural Networks (Continued...) |
Link |
NOC:Deep Learning |
Lecture 90 - CNNs (success stories on ImageNet) |
Link |
NOC:Deep Learning |
Lecture 91 - CNNs (success stories on ImageNet) (Continued...) |
Link |
NOC:Deep Learning |
Lecture 92 - Image Classification continued (GoogLeNet and ResNet) |
Link |
NOC:Deep Learning |
Lecture 93 - Visualizing patches which maximally activate a neuron |
Link |
NOC:Deep Learning |
Lecture 94 - Visualizing filters of a CNN |
Link |
NOC:Deep Learning |
Lecture 95 - Occlusion experiments |
Link |
NOC:Deep Learning |
Lecture 96 - Finding influence of input pixels using backpropagation |
Link |
NOC:Deep Learning |
Lecture 97 - Guided Backpropagation |
Link |
NOC:Deep Learning |
Lecture 98 - Optimization over images |
Link |
NOC:Deep Learning |
Lecture 99 - Create images from embeddings |
Link |
NOC:Deep Learning |
Lecture 100 - Deep Dream |
Link |
NOC:Deep Learning |
Lecture 101 - Deep Art |
Link |
NOC:Deep Learning |
Lecture 102 - Fooling Deep Convolutional Neural Networks |
Link |
NOC:Deep Learning |
Lecture 103 - Sequence Learning Problems |
Link |
NOC:Deep Learning |
Lecture 104 - Recurrent Neural Networks |
Link |
NOC:Deep Learning |
Lecture 105 - Backpropagation through time |
Link |
NOC:Deep Learning |
Lecture 106 - The problem of Exploding and Vanishing Gradients |
Link |
NOC:Deep Learning |
Lecture 107 - Some Gory Details |
Link |
NOC:Deep Learning |
Lecture 108 - Selective Read, Selective Write, Selective Forget - The Whiteboard Analogy |
Link |
NOC:Deep Learning |
Lecture 109 - Long Short Term Memory (LSTM) and Gated Recurrent Units (GRUs) |
Link |
NOC:Deep Learning |
Lecture 110 - How LSTMs avoid the problem of vanishing gradients |
Link |
NOC:Deep Learning |
Lecture 111 - How LSTMs avoid the problem of vanishing gradients (Continued...) |
Link |
NOC:Deep Learning |
Lecture 112 - Introduction to Encoder Decoder Models |
Link |
NOC:Deep Learning |
Lecture 113 - Applications of Encoder Decoder models |
Link |
NOC:Deep Learning |
Lecture 114 - Attention Mechanism |
Link |
NOC:Deep Learning |
Lecture 115 - Attention Mechanism (Continued...) |
Link |
NOC:Deep Learning |
Lecture 116 - Attention over images |
Link |
NOC:Deep Learning |
Lecture 117 - Hierarchical Attention |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 1 - Introduction to the Course |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 2 - CMOS Transistors and Gates |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 3 - Basic Gates |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 4 - Building Gates Using Simulator |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 5 - Hierarchical Design and Verification |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 6 - Building Blocks of a Digital Computer |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 7 - Binary Number Systems |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 8 - Signed Number Systems |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 9 - Twos Complement Number System |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 10 - Binary Adder Circuits |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 11 - Building the ALU of HACK |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 12 - HACK ALU Functionality |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 13 - Tips for Project P1 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 14 - Sequential Logic Design |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 15 - Latches and Flipflops |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 16 - The Memory Hierarchy |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 17 - Design of Program Counter |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 18 - Introduction to Computer Organization: The HACK Instruction Set Architecture (ISA) |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 19 - Memory Mapped I/O |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 20 - Tips for Projects P2 and P3 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 21 - Tips for Project 4 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 22 - Tips for Project 4 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 23 - Introduction to Computer Architecture |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 24 - The HACK Microarchitecture |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 25 - The HACK CPU - A Deep Dive - Part 1 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 26 - The HACK CPU - A Deep Dive - Part 2 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 27 - The Data Memory |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 28 - The HACK Computer |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 29 - The Assembler Construction |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 30 - Understanding the Working of Assembler |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 31 - Assembler : Symbol Table Construction |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 32 - Assembler : Pass 1 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 33 - Assembler : Pass 2 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 34 - Project 6 : Demonstration |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 35 - Virtual Machines - What and Why? |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 36 - The VM Instruction Set Architecture |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 37 - The execution of a VM Program |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 38 - How powerful is the VM? |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 39 - Project 7 : VM ISA to HACK Mnemonic Translation |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 40 - Project 7 : Demo |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 41 - Deep Understanding of VM ISA using VM Emulator |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 42 - Virtual Machine II - Program flow commands and Introduction to Function Calls |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 43 - Implementation of Function Call |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 44 - Working of the Virtual Machine |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 45 - Project 8 : Translation of Program Flow and Function Call to HACK Mnemonic |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 46 - Handling Static Variables |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 47 - Project 8 : Implementation tips in a Nut Shell |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 48 - Introduction to The JACK Programming Language |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 49 - Project 9 : Basic Steps |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 50 - Understanding Syntax of JACK using Examples |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 51 - Project 9 : More Examples |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 52 - The JACK Syntax - Language Specification |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 53 - Application Development using JACK |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 54 - JACK Compiler: Lexical Analysis - Tokenization |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 55 - Project 10 : Compiler for JACK - Part-1 Demo |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 56 - The JACK Grammar |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 57 - Compiler for JACK: Parsing the JACK Program |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 58 - The Token Analyzer |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 59 - Testing the Correctness |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 60 - The Jack Compiler - Back-end Introduction |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 61 - The Jack Compiler - Handling Variables |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 62 - The Jack Compiler - Handling Expressions |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 63 - The Jack Compiler - Handling Flow of Control |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 64 - The Jack Compiler - Handling Objects |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 65 - The Jack Compiler - Handling Arrays |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 66 - The Jack Compiler Backend: An XML guided approach |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 67 - The Jack Compiler Backend: Populating the Class and Subroutine Symbol tables. |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 68 - The Jack Compiler Backend: Code Generation - 1 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 69 - The Jack Compiler Backend: Code Generation - 2 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 70 - The Jack Compiler Backend: Code Generation - 3 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 71 - The Jack Compiler Backend: Code Generation - 4 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 72 - Jack Compiler: Code Generation - 5 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 73 - Jack Compiler: Code Generation - 6 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 74 - Jack Compiler: Code Generation - 7 |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 75 - Understand the Operating System - Compiler Interactions |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 76 - Project 12 - One sample journey from Jack to Hack |
Link |
NOC:Foundations to Computer Systems Design |
Lecture 77 - Concluding Remarks |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 1 - Introduction to the Course History of Artificial Intelligence |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 2 - Overview of Machine Learning |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 3 - Why Linear Algebra ? Scalars, Vectors, Tensors |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 4 - Basic Operations |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 5 - Norms |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 6 - Linear Combinations Span Linear Independence |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 7 - Matrix Operations Special Matrices Matrix Decompositions |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 8 - Introduction to Probability Theory Discrete and Continuous Random Variables |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 9 - Conditional, Joint, Marginal Probabilities Sum Rule and Product Rule Bayes' Theorem |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 10 - Bayes' Theorem - Simple Examples |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 11 - Independence Conditional Independence Chain Rule Of Probability |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 12 - Expectation |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 13 - Variance Covariance |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 14 - Some Relations for Expectation and Covariance (Slightly Advanced) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 15 - Machine Representation of Numbers, Overflow, Underflow, Condition Number |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 16 - Derivatives,Gradient,Hessian,Jacobian,Taylor Series |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 17 - Matrix Calculus (Slightly Advanced) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 18 - Optimization 1 Unconstrained Optimization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 19 - Introduction to Constrained Optimization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 20 - Introduction to Numerical Optimization Gradient Descent - 1 |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 21 - Gradient Descent 2 Proof of Steepest Descent Numerical Gradient Calculation Stopping Criteria |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 22 - Introduction to Packages |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 23 - The Learning Paradigm |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 24 - A Linear Regression Example |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 25 - Linear Regression Least Squares Gradient Descent |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 26 - Coding Linear Regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 27 - Generalized Function for Linear Regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 28 - Goodness of Fit |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 29 - Bias-Variance Trade Off |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 30 - Gradient Descent Algorithms |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 31 - Introduction to Week 5 (Deep Learning) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 32 - Logistic Regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 33 - Binary Entropy cost function |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 34 - OR Gate Via Classification |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 35 - NOR, AND, NAND Gates |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 36 - XOR Gate |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 37 - Differentiating the sigmoid |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 38 - Gradient of logistic regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 39 - Code for Logistic Regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 40 - Multinomial Classification - Introduction |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 41 - Multinomial Classification - One Hot Vector |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 42 - Multinomial Classification - Softmax |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 43 - Schematic of multinomial logistic regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 44 - Biological neuron |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 45 - Structure of an Artificial Neuron |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 46 - Feedforward Neural Network |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 47 - Introduction to back prop |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 48 - Summary of Week 05 |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 49 - Introduction to Convolution Neural Networks (CNN) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 50 - Types of convolution |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 51 - CNN Architecture Part 1 (LeNet and Alex Net) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 52 - CNN Architecture Part 2 (VGG Net) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 53 - CNN Architecture Part 3 (GoogleNet) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 54 - CNN Architecture Part 4 (ResNet) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 55 - CNN Architecture Part 5 (DenseNet) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 56 - Train Network for Image Classification |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 57 - Semantic Segmentation |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 58 - Hyperparameter optimization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 59 - Transfer Learning |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 60 - Segmentation of Brain Tumors from MRI using Deep Learning |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 61 - Activation Functions |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 62 - Learning Rate decay, Weight initialization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 63 - Data Normalization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 64 - Batch Norm |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 65 - Introduction to RNNs |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 66 - Example - Sequence Classification |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 67 - Training RNNs - Loss and BPTT |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 68 - Vanishing Gradients and TBPTT |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 69 - RNN Architectures |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 70 - LSTM |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 71 - Why LSTM Works |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 72 - Deep RNNs and Bi- RNNs |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 73 - Summary of RNNs |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 74 - Introduction. |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 75 - Knn |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 76 - Binary decision trees |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 77 - Binary regression trees |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 78 - Bagging |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 79 - Random Forest |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 80 - Boosting |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 81 - Gradient boosting |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 82 - Unsupervised learning and Kmeans |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 83 - Agglomerative clustering |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 84 - Probability Distributions- Gaussian, Bernoulli |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 85 - Covariance Matrix of Gaussian Distribution |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 86 - Central Limit Theorem |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 87 - Naïve Bayes |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 88 - MLE Intro |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 89 - PCA - Part 1 |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 90 - PCA - Part 2 |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 91 - Support Vector Machines |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 92 - MLE, MAP and Bayesian Regression |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 93 - Introduction to Generative model |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 94 - Generative Adversarial Networks (GAN) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 95 - Variational Auto-encoders (VAE) |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 96 - Applications: Cardiac MRI - Segmentation and Diagnosis |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 97 - Applications: Cardiac MRI Analysis - Tensorflow code walkthrough |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 98 - Introduction to Week 12 |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 99 - Application 1 description - Fin Heat Transfer |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 100 - Application 1 solution |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 101 - Application 2 description - Computational Fluid Dynamics |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 102 - Application 2 solution |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 103 - Application 3 description - Topology Optimization |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 104 - Application 3 solution |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 105 - Application 4 Solution of PDE/ODE using Neural Networks |
Link |
NOC:Machine Learning for Engineering and Science Applications |
Lecture 106 - Summary and road ahead |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 1 - Introduction |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 2 - Program Binaries |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 3 - Buffer Overflows in the Stack |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 4 - Buffer Overflows |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 5 - Gdb - Demo |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 6 - Skip instruction - Demo |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 7 - Buffer Overflow - Demo |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 8 - Buffer Overflow (create a shell) - Demo |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 9 - Preventing buffer overflows with canaries and W^X |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 10 - Return-to-libc attack |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 11 - ROP Attacks |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 12 - Demonstration of Canaries, W^X, and ASLR to prevent Buffer Overflow Attacks |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 13 - Demonstration of a Return-to-Libc Attack |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 14 - Demonstration of a Return Oriented Programming (ROP) Attack |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 15 - ASLR - Part 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 16 - ASLR - Part 2 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 17 - Buffer overreads |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 18 - Demonstration of Load Time Relocation |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 19 - Demonstration of Position Independent Code |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 20 - PLT Demonstration |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 21 - Format string vulnerabilities |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 22 - Integer Vulnerabilities |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 23 - Heap |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 24 - Heap exploits |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 25 - Demo of Integer Vulnerabilites - I |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 26 - Demo of Integer Vulnerabilites - II |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 27 - Demo of Format String Vulnerabilities |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 28 - Access Control |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 29 - Access control in linux |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 30 - Mandatory access Control |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 31 - Confinement in Applications |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 32 - Software fault isolation |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 33 - Trusted Execution Environments |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 34 - ARM Trustzone |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 35 - SGX - Part 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 36 - SGX - Part 2 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 37 - PUF - Part 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 38 - PUF - Part 2 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 39 - PUF - Part 3 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 40 - Covert Channels |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 41 - Flush+Reload Attacks |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 42 - Prime+Probe |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 43 - Meltdown |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 44 - Spectre Variant - 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 45 - Spectre variant - 2 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 46 - rowhammer |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 47 - Heap demo - 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 48 - Heap demo - 2 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 49 - Heap demo - 3 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 50 - PowerAnalysisAttacks |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 51 - Hardware Trojans |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 52 - FANCI : Identification of Stealthy Malicious Logic |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 53 - Detecting Hardware Trojans in ICs |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 54 - Protecting against Hardware Trojans |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 55 - Side Channel Analysis |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 56 - Fault Attacks on AES |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 57 - Demo: Cache timing attack on T-table implementation of AES |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 58 - Demo: Cache-timing based Covert Channel - Part 1 |
Link |
NOC:Information Security 5 - Secure Systems Engineering |
Lecture 59 - Demo: Cache-timing based Covert Channel - Part 2 |
Link |
NOC:Multimodal Interaction |
Lecture 1 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 2 - Medium vs. Modality |
Link |
NOC:Multimodal Interaction |
Lecture 3 - Multimedia and Multimodality |
Link |
NOC:Multimodal Interaction |
Lecture 4 - Modality Relations |
Link |
NOC:Multimodal Interaction |
Lecture 5 - Characteristics of Multimodal Systems |
Link |
NOC:Multimodal Interaction |
Lecture 6 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 7 - Speech Production |
Link |
NOC:Multimodal Interaction |
Lecture 8 - Hearing - Ear |
Link |
NOC:Multimodal Interaction |
Lecture 9 - Hearing - Perception |
Link |
NOC:Multimodal Interaction |
Lecture 10 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 11 - The Human Eye |
Link |
NOC:Multimodal Interaction |
Lecture 12 - Gestlat Perception |
Link |
NOC:Multimodal Interaction |
Lecture 13 - Resolution and Sensitivity |
Link |
NOC:Multimodal Interaction |
Lecture 14 - Depth Perception |
Link |
NOC:Multimodal Interaction |
Lecture 15 - Reading |
Link |
NOC:Multimodal Interaction |
Lecture 16 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 17 - Haptics |
Link |
NOC:Multimodal Interaction |
Lecture 18 - Smell |
Link |
NOC:Multimodal Interaction |
Lecture 19 - Taste |
Link |
NOC:Multimodal Interaction |
Lecture 20 - Memory |
Link |
NOC:Multimodal Interaction |
Lecture 21 - Motorsystem |
Link |
NOC:Multimodal Interaction |
Lecture 22 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 23 - Processing Multiple Signals |
Link |
NOC:Multimodal Interaction |
Lecture 24 - Multimodal Dual-Tasks |
Link |
NOC:Multimodal Interaction |
Lecture 25 - Effects of Discongurent Signals |
Link |
NOC:Multimodal Interaction |
Lecture 26 - Relevance |
Link |
NOC:Multimodal Interaction |
Lecture 27 - Introduction 1 |
Link |
NOC:Multimodal Interaction |
Lecture 28 - Introduction 2 |
Link |
NOC:Multimodal Interaction |
Lecture 29 - Gesture to Space |
Link |
NOC:Multimodal Interaction |
Lecture 30 - Turn Taking |
Link |
NOC:Multimodal Interaction |
Lecture 31 - Conclusion |
Link |
NOC:Multimodal Interaction |
Lecture 32 - Introduction |
Link |
NOC:Multimodal Interaction |
Lecture 33 - Overview |
Link |
NOC:Multimodal Interaction |
Lecture 34 - Automatic Speech Recognition |
Link |
NOC:Multimodal Interaction |
Lecture 35 - Emotion Recognition |
Link |
NOC:Multimodal Interaction |
Lecture 36 - Text Recognition |
Link |
NOC:Multimodal Interaction |
Lecture 37 - Introduction1 |
Link |
NOC:Multimodal Interaction |
Lecture 38 - Icons |
Link |
NOC:Multimodal Interaction |
Lecture 39 - Text Generation |
Link |
NOC:Multimodal Interaction |
Lecture 40 - Text to Speech |
Link |
NOC:Multimodal Interaction |
Lecture 41 - Speech Generation |
Link |
NOC:Multimodal Interaction |
Lecture 42 - Introduction . |
Link |
NOC:Multimodal Interaction |
Lecture 43 - Multimodal Interactive Systems Development |
Link |
NOC:Multimodal Interaction |
Lecture 44 - Introduction . . |
Link |
NOC:Multimodal Interaction |
Lecture 45 - Virtual Reality |
Link |
NOC:Multimodal Interaction |
Lecture 46 - Introduction to Audio for Virtual Reality |
Link |
NOC:Multimodal Interaction |
Lecture 47 - Spatial Hearing |
Link |
NOC:Multimodal Interaction |
Lecture 48 - Dummy Heads |
Link |
NOC:Multimodal Interaction |
Lecture 49 - Individuality of HRTFs |
Link |
NOC:Multimodal Interaction |
Lecture 50 - Sterophony |
Link |
NOC:Multimodal Interaction |
Lecture 51 - Crosstalk Cancelation |
Link |
NOC:Multimodal Interaction |
Lecture 52 - Ambisonics |
Link |
NOC:Multimodal Interaction |
Lecture 53 - Sound Field Synthesis |
Link |
NOC:Multimodal Interaction |
Lecture 54 - Challenges with Projection-based Systems |
Link |
NOC:Multimodal Interaction |
Lecture 55 - Capturing of Sound Scenes |
Link |
NOC:Multimodal Interaction |
Lecture 56 - Closing Remarks |
Link |
NOC:Deep Learning - Part 2 |
Lecture 1 - Recap of Probability Theory |
Link |
NOC:Deep Learning - Part 2 |
Lecture 2 - Why are we interested in Joint Distributions |
Link |
NOC:Deep Learning - Part 2 |
Lecture 3 - How do we represent a joint distribution |
Link |
NOC:Deep Learning - Part 2 |
Lecture 4 - Can we represent the joint distribution more compactly |
Link |
NOC:Deep Learning - Part 2 |
Lecture 5 - Can we use a graph to represent a joint distribution |
Link |
NOC:Deep Learning - Part 2 |
Lecture 6 - Different types of reasoning encoded in a Bayesian Network |
Link |
NOC:Deep Learning - Part 2 |
Lecture 7 - Independencies encoded by a Bayesian Network (Case 1: Node and it's parents) |
Link |
NOC:Deep Learning - Part 2 |
Lecture 8 - Independencies encoded by a Bayesian Network (Case 2: Node and it's non-parents) |
Link |
NOC:Deep Learning - Part 2 |
Lecture 9 - Independencies encoded by a Bayesian Network (Case 3: Node and it's descendants) |
Link |
NOC:Deep Learning - Part 2 |
Lecture 10 - Bayesian Networks : Formal Semantics |
Link |
NOC:Deep Learning - Part 2 |
Lecture 11 - I-Maps |
Link |
NOC:Deep Learning - Part 2 |
Lecture 12 - Markov Networks: Motivation |
Link |
NOC:Deep Learning - Part 2 |
Lecture 13 - Factors in Markov Network |
Link |
NOC:Deep Learning - Part 2 |
Lecture 14 - Local Independencies in a Markov Network |
Link |
NOC:Deep Learning - Part 2 |
Lecture 15 - Joint Distributions |
Link |
NOC:Deep Learning - Part 2 |
Lecture 16 - The concept of a latent variable |
Link |
NOC:Deep Learning - Part 2 |
Lecture 17 - Restricted Boltzmann Machines |
Link |
NOC:Deep Learning - Part 2 |
Lecture 18 - RBMs as Stochastic Neural Networks |
Link |
NOC:Deep Learning - Part 2 |
Lecture 19 - Unsupervised Learning with RBMs |
Link |
NOC:Deep Learning - Part 2 |
Lecture 20 - Computing the gradient of the log likelihood |
Link |
NOC:Deep Learning - Part 2 |
Lecture 21 - Motivation for Sampling |
Link |
NOC:Deep Learning - Part 2 |
Lecture 22 - Motivation for Sampling - Part 2 |
Link |
NOC:Deep Learning - Part 2 |
Lecture 23 - Markov Chains |
Link |
NOC:Deep Learning - Part 2 |
Lecture 24 - Why de we care about Markov Chains ? |
Link |
NOC:Deep Learning - Part 2 |
Lecture 25 - Setting up a Markov Chain for RBMs |
Link |
NOC:Deep Learning - Part 2 |
Lecture 26 - Training RBMs Using Gibbs Sampling |
Link |
NOC:Deep Learning - Part 2 |
Lecture 27 - Training RBMS Using Contrastive Divergence |
Link |
NOC:Deep Learning - Part 2 |
Lecture 28 - Revisiting Autoencoders |
Link |
NOC:Deep Learning - Part 2 |
Lecture 29 - Variational Autoencoders: The Neural Network Perspective |
Link |
NOC:Deep Learning - Part 2 |
Lecture 30 - Variational Autoencoders: The Graphical model perspective |
Link |
NOC:Deep Learning - Part 2 |
Lecture 31 - Neural Autoregressive Density Estimator |
Link |
NOC:Deep Learning - Part 2 |
Lecture 32 - Masked Autoencoder Density Estimator (MADE) |
Link |
NOC:Deep Learning - Part 2 |
Lecture 33 - Generative Adversarial Networks - The Intuition |
Link |
NOC:Deep Learning - Part 2 |
Lecture 34 - Generative Adversarial Networks - Architecture |
Link |
NOC:Deep Learning - Part 2 |
Lecture 35 - Generative Adversarial Networks - The Math Behind it |
Link |
NOC:Deep Learning - Part 2 |
Lecture 36 - Generative Adversarial Networks - Some Cool Stuff and Applications |
Link |
NOC:Deep Learning - Part 2 |
Lecture 37 - Bringing it all together (the deep generative summary) |
Link |
NOC:Machine Learning |
Lecture 1 - Introduction to the Machine Learning Course |
Link |
NOC:Machine Learning |
Lecture 2 - Foundation of Artificial Intelligence and Machine Learning |
Link |
NOC:Machine Learning |
Lecture 3 - Intelligent Autonomous Systems and Artificial Intelligence |
Link |
NOC:Machine Learning |
Lecture 4 - Applications of Machine Learning |
Link |
NOC:Machine Learning |
Lecture 5 - Tutorial for week 1 |
Link |
NOC:Machine Learning |
Lecture 6 - Characterization of Learning Problems |
Link |
NOC:Machine Learning |
Lecture 7 - Objects, Categories and Features |
Link |
NOC:Machine Learning |
Lecture 8 - Feature related issues |
Link |
NOC:Machine Learning |
Lecture 9 - Scenarios for Concept Learning |
Link |
NOC:Machine Learning |
Lecture 10 - Tutorial for week 2 |
Link |
NOC:Machine Learning |
Lecture 11 - Forms of Representation |
Link |
NOC:Machine Learning |
Lecture 12 - Decision Trees |
Link |
NOC:Machine Learning |
Lecture 13 - Bayes (ian) Belief Networks |
Link |
NOC:Machine Learning |
Lecture 14 - Artificial Neural Networks |
Link |
NOC:Machine Learning |
Lecture 15 - Genetic algorithm |
Link |
NOC:Machine Learning |
Lecture 16 - Logic Programming |
Link |
NOC:Machine Learning |
Lecture 17 - Tutorial for week 3 |
Link |
NOC:Machine Learning |
Lecture 18 - Inductive Learning based on Symbolic Representations and Weak Theories |
Link |
NOC:Machine Learning |
Lecture 19 - Generalization as Search - Part 1 |
Link |
NOC:Machine Learning |
Lecture 20 - Generalization as Search - Part 2 |
Link |
NOC:Machine Learning |
Lecture 21 - Decision Tree Learning Algorithms - Part 1 |
Link |
NOC:Machine Learning |
Lecture 22 - Decision Tree Learning Algorithms - Part 2 |
Link |
NOC:Machine Learning |
Lecture 23 - Instance Based Learning - Part 1 |
Link |
NOC:Machine Learning |
Lecture 24 - Instance Based Learning - Part 2 |
Link |
NOC:Machine Learning |
Lecture 25 - Cluster Analysis |
Link |
NOC:Machine Learning |
Lecture 26 - Tutorial for week 4 |
Link |
NOC:Machine Learning |
Lecture 27 - Machine Learning enabled by Prior Theories |
Link |
NOC:Machine Learning |
Lecture 28 - Explanation Based Learning |
Link |
NOC:Machine Learning |
Lecture 29 - Inductive Logic Programming |
Link |
NOC:Machine Learning |
Lecture 30 - Reinforcement Learning - Part 1 Introduction |
Link |
NOC:Machine Learning |
Lecture 31 - Reinforcement Learning - Part 2 Learning Algorithms |
Link |
NOC:Machine Learning |
Lecture 32 - Reinforcement Learning - Part 3 Q-Learning |
Link |
NOC:Machine Learning |
Lecture 33 - Case - Based Reasoning |
Link |
NOC:Machine Learning |
Lecture 34 - Tutorial for week 5 |
Link |
NOC:Machine Learning |
Lecture 35 - Fundamentals of Artificial Neural Networks - Part 1 |
Link |
NOC:Machine Learning |
Lecture 36 - Fundamentals of Artificial Neural Networks - Part 2 |
Link |
NOC:Machine Learning |
Lecture 37 - Perceptrons |
Link |
NOC:Machine Learning |
Lecture 38 - Model of Neuron in an ANN |
Link |
NOC:Machine Learning |
Lecture 39 - Learning in a Feed Forward Multiple Layer ANN - Backpropagation |
Link |
NOC:Machine Learning |
Lecture 40 - Recurrent Neural Networks |
Link |
NOC:Machine Learning |
Lecture 41 - Hebbian Learning and Associative Memory |
Link |
NOC:Machine Learning |
Lecture 42 - Hopfield Networks and Boltzman Machines - Part 1 |
Link |
NOC:Machine Learning |
Lecture 43 - Hopfield Networks and Boltzman Machines - Part 2 |
Link |
NOC:Machine Learning |
Lecture 44 - Convolutional Neural Networks - Part 1 |
Link |
NOC:Machine Learning |
Lecture 45 - Convolutional Neural Networks - Part 2 |
Link |
NOC:Machine Learning |
Lecture 46 - DeepLearning |
Link |
NOC:Machine Learning |
Lecture 47 - Tutorial for week 6 |
Link |
NOC:Machine Learning |
Lecture 48 - Tools and Resources |
Link |
NOC:Machine Learning |
Lecture 49 - Interdisciplinary Inspiration |
Link |
NOC:Machine Learning |
Lecture 50 - Preparation for Exam and Example of Applications |
Link |
NOC:C Programming and Assembly Language |
Lecture 1 |
Link |
NOC:C Programming and Assembly Language |
Lecture 2 |
Link |
NOC:C Programming and Assembly Language |
Lecture 3 |
Link |
NOC:C Programming and Assembly Language |
Lecture 4 |
Link |
NOC:C Programming and Assembly Language |
Lecture 5 |
Link |
NOC:C Programming and Assembly Language |
Lecture 6 |
Link |
NOC:C Programming and Assembly Language |
Lecture 7 |
Link |
NOC:C Programming and Assembly Language |
Lecture 8 |
Link |
NOC:C Programming and Assembly Language |
Lecture 9 |
Link |
NOC:C Programming and Assembly Language |
Lecture 10 |
Link |
NOC:C Programming and Assembly Language |
Lecture 11 |
Link |
NOC:C Programming and Assembly Language |
Lecture 12 |
Link |
NOC:C Programming and Assembly Language |
Lecture 13 |
Link |
NOC:C Programming and Assembly Language |
Lecture 14 |
Link |
NOC:C Programming and Assembly Language |
Lecture 15 |
Link |
NOC:C Programming and Assembly Language |
Lecture 16 |
Link |
NOC:C Programming and Assembly Language |
Lecture 17 |
Link |
NOC:C Programming and Assembly Language |
Lecture 18 |
Link |
NOC:C Programming and Assembly Language |
Lecture 19 |
Link |
NOC:C Programming and Assembly Language |
Lecture 20 |
Link |
NOC:C Programming and Assembly Language |
Lecture 21 |
Link |
NOC:C Programming and Assembly Language |
Lecture 22 |
Link |
NOC:Applied Natural Language Processing |
Lecture 1 - Introduction |
Link |
NOC:Applied Natural Language Processing |
Lecture 2 - Operations on a Corpus |
Link |
NOC:Applied Natural Language Processing |
Lecture 3 - Probability and NLP |
Link |
NOC:Applied Natural Language Processing |
Lecture 4 - Vector Space models |
Link |
NOC:Applied Natural Language Processing |
Lecture 5 - Sequence Learning |
Link |
NOC:Applied Natural Language Processing |
Lecture 6 - Machine Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 7 - Preprocessing |
Link |
NOC:Applied Natural Language Processing |
Lecture 8 - Statistical Properties of Words - Part 1 |
Link |
NOC:Applied Natural Language Processing |
Lecture 9 - Statistical Properties of Words - Part 2 |
Link |
NOC:Applied Natural Language Processing |
Lecture 10 - Statistical Properties of Words - Part 3 |
Link |
NOC:Applied Natural Language Processing |
Lecture 11 - Vector Space Models for NLP |
Link |
NOC:Applied Natural Language Processing |
Lecture 12 - Document Similarity - Demo, Inverted index, Exercise |
Link |
NOC:Applied Natural Language Processing |
Lecture 13 - Vector Representation of words |
Link |
NOC:Applied Natural Language Processing |
Lecture 14 - Contextual understanding of text |
Link |
NOC:Applied Natural Language Processing |
Lecture 15 - Co-occurence matrix, n-grams |
Link |
NOC:Applied Natural Language Processing |
Lecture 16 - Collocations, Dense word Vectors |
Link |
NOC:Applied Natural Language Processing |
Lecture 17 - SVD, Dimensionality reduction, Demo |
Link |
NOC:Applied Natural Language Processing |
Lecture 18 - Query Processing |
Link |
NOC:Applied Natural Language Processing |
Lecture 19 - Topic Modeling |
Link |
NOC:Applied Natural Language Processing |
Lecture 20 - Examples for word prediction |
Link |
NOC:Applied Natural Language Processing |
Lecture 21 - Introduction to Probability in the context of NLP |
Link |
NOC:Applied Natural Language Processing |
Lecture 22 - Joint and conditional probabilities, independence with examples |
Link |
NOC:Applied Natural Language Processing |
Lecture 23 - The definition of probabilistic language model |
Link |
NOC:Applied Natural Language Processing |
Lecture 24 - Chain rule and Markov assumption |
Link |
NOC:Applied Natural Language Processing |
Lecture 25 - Generative Models |
Link |
NOC:Applied Natural Language Processing |
Lecture 26 - Bigram and Trigram Language models - peeking indide the model building |
Link |
NOC:Applied Natural Language Processing |
Lecture 27 - Out of vocabulary words and curse of dimensionality |
Link |
NOC:Applied Natural Language Processing |
Lecture 28 - Exercise |
Link |
NOC:Applied Natural Language Processing |
Lecture 29 - Naive-Bayes, classification |
Link |
NOC:Applied Natural Language Processing |
Lecture 30 - Machine learning, perceptron, linearly separable |
Link |
NOC:Applied Natural Language Processing |
Lecture 31 - Linear Models for Claassification |
Link |
NOC:Applied Natural Language Processing |
Lecture 32 - Biological Neural Network |
Link |
NOC:Applied Natural Language Processing |
Lecture 33 - Perceptron |
Link |
NOC:Applied Natural Language Processing |
Lecture 34 - Perceptron Learning |
Link |
NOC:Applied Natural Language Processing |
Lecture 35 - Logical XOR |
Link |
NOC:Applied Natural Language Processing |
Lecture 36 - Activation Functions |
Link |
NOC:Applied Natural Language Processing |
Lecture 37 - Gradient Descent |
Link |
NOC:Applied Natural Language Processing |
Lecture 38 - Feedforward and Backpropagation Neural Network |
Link |
NOC:Applied Natural Language Processing |
Lecture 39 - Why Word2Vec? |
Link |
NOC:Applied Natural Language Processing |
Lecture 40 - What are CBOW and Skip-Gram Models? |
Link |
NOC:Applied Natural Language Processing |
Lecture 41 - One word learning architecture |
Link |
NOC:Applied Natural Language Processing |
Lecture 42 - Forward pass for Word2Vec |
Link |
NOC:Applied Natural Language Processing |
Lecture 43 - Matrix Operations Explained |
Link |
NOC:Applied Natural Language Processing |
Lecture 44 - CBOW and Skip Gram Models |
Link |
NOC:Applied Natural Language Processing |
Lecture 45 - Building Skip-gram model using Python |
Link |
NOC:Applied Natural Language Processing |
Lecture 46 - Reduction of complexity - sub-sampling, negative sampling |
Link |
NOC:Applied Natural Language Processing |
Lecture 47 - Binay tree, Hierarchical softmax |
Link |
NOC:Applied Natural Language Processing |
Lecture 48 - Mapping the output layer to Softmax |
Link |
NOC:Applied Natural Language Processing |
Lecture 49 - Updating the weights using hierarchical softmax |
Link |
NOC:Applied Natural Language Processing |
Lecture 50 - Discussion on the results obtained from word2vec |
Link |
NOC:Applied Natural Language Processing |
Lecture 51 - Recap and Introduction |
Link |
NOC:Applied Natural Language Processing |
Lecture 52 - ANN as a LM and its limitations |
Link |
NOC:Applied Natural Language Processing |
Lecture 53 - Sequence Learning and its applications |
Link |
NOC:Applied Natural Language Processing |
Lecture 54 - Introuduction to Recurrent Neural Network |
Link |
NOC:Applied Natural Language Processing |
Lecture 55 - Unrolled RNN |
Link |
NOC:Applied Natural Language Processing |
Lecture 56 - RNN - Based Language Model |
Link |
NOC:Applied Natural Language Processing |
Lecture 57 - BPTT - Forward Pass |
Link |
NOC:Applied Natural Language Processing |
Lecture 58 - BPTT - Derivatives for W,V and U |
Link |
NOC:Applied Natural Language Processing |
Lecture 59 - BPTT - Exploding and vanishing gradient |
Link |
NOC:Applied Natural Language Processing |
Lecture 60 - LSTM |
Link |
NOC:Applied Natural Language Processing |
Lecture 61 - Truncated BPTT |
Link |
NOC:Applied Natural Language Processing |
Lecture 62 - GRU |
Link |
NOC:Applied Natural Language Processing |
Lecture 63 - Introduction and Historical Approaches to Machine Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 64 - What is SMT? |
Link |
NOC:Applied Natural Language Processing |
Lecture 65 - Noisy Channel Model, Bayes Rule, Language Model |
Link |
NOC:Applied Natural Language Processing |
Lecture 66 - Translation Model, Alignment Variables |
Link |
NOC:Applied Natural Language Processing |
Lecture 67 - Alignments again! |
Link |
NOC:Applied Natural Language Processing |
Lecture 68 - IBM Model 1 |
Link |
NOC:Applied Natural Language Processing |
Lecture 69 - IBM Model 2 |
Link |
NOC:Applied Natural Language Processing |
Lecture 70 - Introduction to Phrase-based translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 71 - Symmetrization of alignments |
Link |
NOC:Applied Natural Language Processing |
Lecture 72 - Extraction of Phrases |
Link |
NOC:Applied Natural Language Processing |
Lecture 73 - Learning/estimating the phrase probabilities using another Symmetrization example |
Link |
NOC:Applied Natural Language Processing |
Lecture 74 - Introduction to evaluation of Machine Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 75 - BLEU - A short Discussion of the seminal paper |
Link |
NOC:Applied Natural Language Processing |
Lecture 76 - BLEU Demo using NLTK and other Metrics |
Link |
NOC:Applied Natural Language Processing |
Lecture 77 - Encoder-Decoder model for Neural Machine Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 78 - RNN Based Machine Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 79 - Recap and Connecting Bloom Taxonomy with Machine Learning |
Link |
NOC:Applied Natural Language Processing |
Lecture 80 - Introduction to Attention based Translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 81 - Research Paper discussion on Neural machine translation by jointly learning to align and translate |
Link |
NOC:Applied Natural Language Processing |
Lecture 82 - Typical NMT architecture architecture and models for multi-language translation |
Link |
NOC:Applied Natural Language Processing |
Lecture 83 - Beam Search, Stochatic Gradient Descend, Mini Batch, Batch |
Link |
NOC:Applied Natural Language Processing |
Lecture 84 - Beam Search, Stochatic Gradient Descend, Mini Batch, Batch |
Link |
NOC:Applied Natural Language Processing |
Lecture 85 - Introduction to Conversation Modeling |
Link |
NOC:Applied Natural Language Processing |
Lecture 86 - A few examples in Conversation Modeling |
Link |
NOC:Applied Natural Language Processing |
Lecture 87 - Some ideas to Implement IR-based Conversation Modeling |
Link |
NOC:Applied Natural Language Processing |
Lecture 88 - Discussion of some ideas in Question Answering |
Link |
NOC:Applied Natural Language Processing |
Lecture 89 - Hyperspace Analogue to Language - HAL |
Link |
NOC:Applied Natural Language Processing |
Lecture 90 - Correlated Occurence Analogue to Lexical Semantic - COALS |
Link |
NOC:Applied Natural Language Processing |
Lecture 91 - Global Vectors - Glove |
Link |
NOC:Applied Natural Language Processing |
Lecture 92 - Evaluation of Word vectors |
Link |
NOC:Python for Data Science |
Lecture 1 - Introduction to Python for Data Science |
Link |
NOC:Python for Data Science |
Lecture 2 - Introduction to Python |
Link |
NOC:Python for Data Science |
Lecture 3 - Introduction to Spyder - Part 1 |
Link |
NOC:Python for Data Science |
Lecture 4 - Introduction to Spyder - Part 2 |
Link |
NOC:Python for Data Science |
Lecture 5 - Variables and Datatypes |
Link |
NOC:Python for Data Science |
Lecture 6 - Operators |
Link |
NOC:Python for Data Science |
Lecture 7 - Jupyter setup |
Link |
NOC:Python for Data Science |
Lecture 8 - Sequence data - Part 1 |
Link |
NOC:Python for Data Science |
Lecture 9 - Sequence data - Part 2 |
Link |
NOC:Python for Data Science |
Lecture 10 - Sequence data - Part 3 |
Link |
NOC:Python for Data Science |
Lecture 11 - Sequence data - Part 4 |
Link |
NOC:Python for Data Science |
Lecture 12 - Numpy |
Link |
NOC:Python for Data Science |
Lecture 13 - Reading data |
Link |
NOC:Python for Data Science |
Lecture 14 - Pandas Dataframes - I |
Link |
NOC:Python for Data Science |
Lecture 15 - Pandas Dataframes - II |
Link |
NOC:Python for Data Science |
Lecture 16 - Pandas Dataframes - III |
Link |
NOC:Python for Data Science |
Lecture 17 - Control structures and Functions |
Link |
NOC:Python for Data Science |
Lecture 18 - Exploratory data analysis |
Link |
NOC:Python for Data Science |
Lecture 19 - Data Visualization - Part I |
Link |
NOC:Python for Data Science |
Lecture 20 - Data Visualization - Part II |
Link |
NOC:Python for Data Science |
Lecture 21 - Dealing with missing data |
Link |
NOC:Python for Data Science |
Lecture 22 - Introduction to Classification Case Study |
Link |
NOC:Python for Data Science |
Lecture 23 - Case Study on Classification - Part I |
Link |
NOC:Python for Data Science |
Lecture 24 - Case Study on Classification - Part II |
Link |
NOC:Python for Data Science |
Lecture 25 - Introduction to Regression Case Study |
Link |
NOC:Python for Data Science |
Lecture 26 - Case Study on Regression - Part I |
Link |
NOC:Python for Data Science |
Lecture 27 - Case Study on Regression - Part II |
Link |
NOC:Python for Data Science |
Lecture 28 - Case Study on Regression - Part III |
Link |
NOC:Python for Data Science |
Lecture 29 - Module : Predictive Modelling |
Link |
NOC:Python for Data Science |
Lecture 30 - Linear Regression |
Link |
NOC:Python for Data Science |
Lecture 31 - Model Assessment |
Link |
NOC:Python for Data Science |
Lecture 32 - Diagnostics to Improve Linear Model Fit |
Link |
NOC:Python for Data Science |
Lecture 33 - Cross Validation |
Link |
NOC:Python for Data Science |
Lecture 34 - Classification |
Link |
NOC:Python for Data Science |
Lecture 35 - Logistic Regression |
Link |
NOC:Python for Data Science |
Lecture 36 - K-Nearest Neighbors (kNN) |
Link |
NOC:Python for Data Science |
Lecture 37 - K-means Clustering |
Link |
NOC:Python for Data Science |
Lecture 38 - Logistic Regression (Continued...) |
Link |
NOC:Python for Data Science |
Lecture 39 - Decision Trees |
Link |
NOC:Python for Data Science |
Lecture 40 - Multiple Linear Regression |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 1 - Overview of Tensorflow |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 2 - Machine Learning Refresher |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 3 - Steps in Machine Learning Process |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 4 - Loss Functions in Machine Learning |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 5 - Gradient Descent |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 6 - Gradient Descent Variations |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 7 - Model Selection and Evaluation |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 8 - Machine Learning Visualization |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 9 - Deep Learning Refresher |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 10 - Introduction to Tensors |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 11 - Mathematical Foundations of Deep Learning (Continued...) |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 12 - Building Data Pipelines for Tensorflow - Part 1 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 13 - Building Data Pipelines for Tensorflow - Part 2 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 14 - Building Data Pipelines for Tensorflow - Part 3 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 15 - Text Processing with Tensorflow |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 16 - Classify Images |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 17 - Regression |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 18 - Classify Structured Data |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 19 - Text Classification |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 20 - Underfitting and Overfitting |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 21 - Save and Restore Models |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 22 - CNNs - Part 1 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 23 - CNNs - Part 2 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 24 - Transfer learning with pretrained CNNs |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 25 - Transfer learning with TF hub |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 26 - Image classification and visualization |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 27 - Estimator API |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 28 - Logistic Regression |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 29 - Boosted Trees |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 30 - Introduction to word embeddings |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 31 - Recurrent Neural Networks - Part 1 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 32 - Recurrent Neural Networks - Part 2 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 33 - Time Series Forecasting with RNNs |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 34 - Text Generation with RNNs |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 35 - TensorFlow Customization |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 36 - Customizing tf.keras - Part 1 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 37 - Customizing tf.keras - Part 2 |
Link |
NOC:Practical Machine Learning with Tensorflow |
Lecture 38 - TensorFlow Distributed Training |
Link |
NOC:Introduction to Database Systems |
Lecture 1 - Introduction |
Link |
NOC:Introduction to Database Systems |
Lecture 2 - Database Architecture |
Link |
NOC:Introduction to Database Systems |
Lecture 3 - RDBMS Architecture |
Link |
NOC:Introduction to Database Systems |
Lecture 4 - Introduction to ER Model |
Link |
NOC:Introduction to Database Systems |
Lecture 5 - Entities and Relationships |
Link |
NOC:Introduction to Database Systems |
Lecture 6 - Modelling Weak Entities and Design Choices |
Link |
NOC:Introduction to Database Systems |
Lecture 7 - Relational Data Model and Notion of Keys |
Link |
NOC:Introduction to Database Systems |
Lecture 8 - Introduction to Relational Algebra |
Link |
NOC:Introduction to Database Systems |
Lecture 9 - Operators in Relational Model |
Link |
NOC:Introduction to Database Systems |
Lecture 10 - Uses of Renaming, Join and Division in Relation Algebra |
Link |
NOC:Introduction to Database Systems |
Lecture 11 - Example Queries in Relation Model and Outer Join Operation |
Link |
NOC:Introduction to Database Systems |
Lecture 12 - Convert ER-Model to a Relational Model |
Link |
NOC:Introduction to Database Systems |
Lecture 13 - Introduction to tuple relational calculus |
Link |
NOC:Introduction to Database Systems |
Lecture 14 - Example TRC queries |
Link |
NOC:Introduction to Database Systems |
Lecture 15 - Data definition using SQL |
Link |
NOC:Introduction to Database Systems |
Lecture 16 - Basic SQL query block and subqueries |
Link |
NOC:Introduction to Database Systems |
Lecture 17 - Correlated subqueries |
Link |
NOC:Introduction to Database Systems |
Lecture 18 - Aggregate functions |
Link |
NOC:Introduction to Database Systems |
Lecture 19 - Views |
Link |
NOC:Introduction to Database Systems |
Lecture 20 - Programmatic access of SQL |
Link |
NOC:Introduction to Database Systems |
Lecture 21 - Normal forms - Introduction |
Link |
NOC:Introduction to Database Systems |
Lecture 22 - Deriving new functional dependencies |
Link |
NOC:Introduction to Database Systems |
Lecture 23 - Proving soundness and completeness of Armstrong's Axioms |
Link |
NOC:Introduction to Database Systems |
Lecture 24 - Normal forms - 2 NF, 3NF, BCNF |
Link |
NOC:Introduction to Database Systems |
Lecture 25 - Properties of decompositions |
Link |
NOC:Introduction to Database Systems |
Lecture 26 - Normal forms - 4NF, 5NF |
Link |
NOC:Introduction to Database Systems |
Lecture 27 - Introduction to file orgranization |
Link |
NOC:Introduction to Database Systems |
Lecture 28 - File orgranization methods |
Link |
NOC:Introduction to Database Systems |
Lecture 29 - Dynamic File orgranization using Hashing |
Link |
NOC:Introduction to Database Systems |
Lecture 30 - Index structures |
Link |
NOC:Introduction to Database Systems |
Lecture 31 - B+ trees on Disks |
Link |
NOC:Introduction to Database Systems |
Lecture 32 - Performance and Reliability of Multiple Disks |
Link |
NOC:Introduction to Database Systems |
Lecture 33 - Relational Query Evaluation |
Link |
NOC:Introduction to Database Systems |
Lecture 34 - Join operator processing algorithms |
Link |
NOC:Introduction to Database Systems |
Lecture 35 - Query optimization |
Link |
NOC:Introduction to Database Systems |
Lecture 36 - ACID properties and operations in transactions |
Link |
NOC:Introduction to Database Systems |
Lecture 37 - Schdeules |
Link |
NOC:Introduction to Database Systems |
Lecture 38 - Concurrency control using Locks |
Link |
NOC:Introduction to Database Systems |
Lecture 39 - Recovery using undo logging method |
Link |
NOC:Introduction to Database Systems |
Lecture 40 - Recovery using Redo and Undo-Redo logging methods |
Link |
NOC:Introduction to Database Systems |
Lecture 41 - Recoverable schdeules and transaction isolation levels |
Link |
NOC:Foundations of Cryptography |
Lecture 1 - Introduction |
Link |
NOC:Foundations of Cryptography |
Lecture 2 - Symmetric-key Encryption |
Link |
NOC:Foundations of Cryptography |
Lecture 3 - Historical Ciphers and their Cryptanalysis |
Link |
NOC:Foundations of Cryptography |
Lecture 4 - Perfect Security |
Link |
NOC:Foundations of Cryptography |
Lecture 5 - Limitations of Perfect Security |
Link |
NOC:Foundations of Cryptography |
Lecture 6 - Introduction to Computational Security |
Link |
NOC:Foundations of Cryptography |
Lecture 7 - Semantic Security |
Link |
NOC:Foundations of Cryptography |
Lecture 8 - Pseudo-random Generators (PRGs) |
Link |
NOC:Foundations of Cryptography |
Lecture 9 - Operations on Pseudorandom Generators |
Link |
NOC:Foundations of Cryptography |
Lecture 10 - Stream Ciphers |
Link |
NOC:Foundations of Cryptography |
Lecture 11 - Provably-secure Instantiation of PRG |
Link |
NOC:Foundations of Cryptography |
Lecture 12 - Practical Instantiations of PRG |
Link |
NOC:Foundations of Cryptography |
Lecture 13 - CPA-security |
Link |
NOC:Foundations of Cryptography |
Lecture 14 - Pseudo-random Functions (PRFs) |
Link |
NOC:Foundations of Cryptography |
Lecture 15 - CPA-secure Encryption from PRF |
Link |
NOC:Foundations of Cryptography |
Lecture 16 - Modes of Operations of Block Ciphers - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 17 - Modes of Operations of Block Ciphers - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 18 - Theoretical Constructions of Block Ciphers |
Link |
NOC:Foundations of Cryptography |
Lecture 19 - Practical Constructions of Block Ciphers - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 20 - Practical Constructions of Block Ciphers - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 21 - From Passive to Active Adversary |
Link |
NOC:Foundations of Cryptography |
Lecture 22 - Message Integrity and Authentication |
Link |
NOC:Foundations of Cryptography |
Lecture 23 - Message Authentication for Long Messages - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 24 - Message Authentication for Long Messages - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 25 - Information-theoretic MACs - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 26 - Information-theoretic MACs - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 27 - Cryptographic Hash Functions - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 28 - Cryptographic Hash Functions - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 29 - Message Authentication Using Hash Functions |
Link |
NOC:Foundations of Cryptography |
Lecture 30 - Generic Attacks on Hash Functions and Additional Applications of Hash Functions |
Link |
NOC:Foundations of Cryptography |
Lecture 31 - Random Oracle Model - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 32 - Random Oracle Model - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 33 - Authenticated Encryption |
Link |
NOC:Foundations of Cryptography |
Lecture 34 - Composing CPA-secure Cipher with a Secure MAC - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 35 - Composing CPA-secure Cipher with a Secure MAC - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 36 - Key-Exchange Protocols - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 37 - Key-Exchange Protocols - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 38 - Cyclic groups |
Link |
NOC:Foundations of Cryptography |
Lecture 39 - Cryptographic Hardness Assumptions in the Cyclic Groups |
Link |
NOC:Foundations of Cryptography |
Lecture 40 - Candidate Cyclic Groups for Cryptographic Purposes - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 41 - Candidate Cyclic Groups for Cryptographic Purposes - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 42 - Cryptographic Applications of the Discrete Log Assumption |
Link |
NOC:Foundations of Cryptography |
Lecture 43 - Public-key Encryption |
Link |
NOC:Foundations of Cryptography |
Lecture 44 - El Gamal Public-key Encryption Scheme |
Link |
NOC:Foundations of Cryptography |
Lecture 45 - RSA Assumption |
Link |
NOC:Foundations of Cryptography |
Lecture 46 - RSA Public-key Cryptosystem |
Link |
NOC:Foundations of Cryptography |
Lecture 47 - Hybrid Public-key Cryptosystem |
Link |
NOC:Foundations of Cryptography |
Lecture 48 - CCA-Secure Public-key Ciphers |
Link |
NOC:Foundations of Cryptography |
Lecture 49 - CCA-Secure Public-key Ciphers Based on Diffie-Hellman Problems |
Link |
NOC:Foundations of Cryptography |
Lecture 50 - CCA-Secure Public-key Ciphers Based on RSA Assumption |
Link |
NOC:Foundations of Cryptography |
Lecture 51 - Digital Signatures |
Link |
NOC:Foundations of Cryptography |
Lecture 52 - RSA Signatures |
Link |
NOC:Foundations of Cryptography |
Lecture 53 - Identification Schemes |
Link |
NOC:Foundations of Cryptography |
Lecture 54 - Schnorr Signature Scheme and TLS/SSL |
Link |
NOC:Foundations of Cryptography |
Lecture 55 - Number Theory |
Link |
NOC:Foundations of Cryptography |
Lecture 56 - Secret Sharing |
Link |
NOC:Foundations of Cryptography |
Lecture 57 - Zero-Knowledge Protocols - Part I |
Link |
NOC:Foundations of Cryptography |
Lecture 58 - Zero-Knowledge Protocols - Part II |
Link |
NOC:Foundations of Cryptography |
Lecture 59 - Good Bye for Now |
Link |
NOC:Modern Application Development |
Lecture 1 - Introduction to Modern Application Development - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 2 - Introduction to Modern Application Development - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 3 - Introduction to Modern Application Development - Part 3 |
Link |
NOC:Modern Application Development |
Lecture 4 - Introduction to Modern Application Development - Part 4 |
Link |
NOC:Modern Application Development |
Lecture 5 - Introduction to Modern Application Development - Part 5 |
Link |
NOC:Modern Application Development |
Lecture 6 - Command Line - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 7 - Command Line - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 8 - Command Line - Practice Questions - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 9 - Command Line - Practice Questions - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 10 - Comparing CLI, GUI, and Web Interfaces |
Link |
NOC:Modern Application Development |
Lecture 11 - Producing HTML+CSS output - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 12 - Producing HTML+CSS output - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 13 - Introduction to Input in HTML |
Link |
NOC:Modern Application Development |
Lecture 14 - Session 2 - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 15 - Session 2 - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 16 - Session 2 - Part 3 |
Link |
NOC:Modern Application Development |
Lecture 17 - Session 1 - Part 1 - Introduction to HTML and CSS |
Link |
NOC:Modern Application Development |
Lecture 18 - Session 1 - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 19 - Week6 - Session 1 |
Link |
NOC:Modern Application Development |
Lecture 20 - Week6 - Session 2 |
Link |
NOC:Modern Application Development |
Lecture 21 - Introduction to JDBC |
Link |
NOC:Modern Application Development |
Lecture 22 - Week 7 Session 1 - Part 1 |
Link |
NOC:Modern Application Development |
Lecture 23 - Week 7 Session 1 - Part 2 |
Link |
NOC:Modern Application Development |
Lecture 24 - Week 8 Session 1 |
Link |
NOC:Modern Application Development |
Lecture 25 - Week 8 Session 2 |
Link |
NOC:Modern Application Development |
Lecture 26 - Week 8 Session 3 |
Link |
NOC:Modern Application Development |
Lecture 27 - Week 9 Session 1 |
Link |
NOC:Modern Application Development |
Lecture 28 - Week 9 Session 3 |
Link |
NOC:Modern Application Development |
Lecture 29 - Week 10 Part 1 |
Link |
NOC:Modern Application Development |
Lecture 30 - Week 10 Part 2 |
Link |
NOC:Modern Application Development |
Lecture 31 - Week 10 Part 3 |
Link |
NOC:Modern Application Development |
Lecture 32 - Week 11 Part 1 |
Link |
NOC:Modern Application Development |
Lecture 33 - Week 11 Part 2 |
Link |
NOC:Modern Application Development |
Lecture 34 - Week 12 Part 1 |
Link |
NOC:Modern Application Development |
Lecture 35 - Week 12 Part 2 |
Link |
NOC:Modern Application Development |
Lecture 36 - Week 12 Part 3 |
Link |
NOC:Modern Application Development |
Lecture 37 - Week 12 Part 4 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 1 - Course Introduction |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 2 - History |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 3 - Image Formation |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 4 - Image Representation |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 5 - Linear Filtering |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 6 - Image in Frequency Domain |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 7 - Image Sampling |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 8 - Edge Detection |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 9 - From Edges to Blobs and Corners |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 10 - Scale Space, Image Pyramids and Filter Banks |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 11 - Feature Detectors: SIFT and Variants |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 12 - Image Segmentation |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 13 - Other Feature Spaces |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 14 - Human Visual System |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 15 - Feature Matching |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 16 - Hough Transform |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 17 - From Points to Images: Bag-of-Words and VLAD Representations |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 18 - Image Descriptor Matching |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 19 - Pyramid Matching |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 20 - From Traditional Vision to Deep Learning |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 21 - Neural Networks: A Review - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 22 - Neural Networks: A Review - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 23 - Feedforward Neural Networks and Backpropagation - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 24 - Feedforward Neural Networks and Backpropagation - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 25 - Gradient Descent and Variants - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 26 - Gradient Descent and Variants - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 27 - Regularization in Neural Networks - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 28 - Regularization in Neural Networks - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 29 - Improving Training of Neural Networks - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 30 - Improving Training of Neural Networks - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 31 - Convolutional Neural Networks: An Introduction - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 32 - Convolutional Neural Networks: An Introduction - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 33 - Backpropagation in CNNs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 34 - Evolution of CNN Architectures for Image Classification - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 35 - Evolution of CNN Architectures for Image Classification - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 36 - Recent CNN Architectures |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 37 - Finetuning in CNNs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 38 - Explaining CNNs: Visualization Methods |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 39 - Explaining CNNs: Early Methods |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 40 - Explaining CNNs: Class Attribution Map Methods |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 41 - Explaining CNNs: Recent Methods - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 42 - Explaining CNNs: Recent Methods - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 43 - Going Beyond Explaining CNNs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 44 - CNNs for Object Detection-I - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 45 - CNNs for Object Detection-I - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 46 - CNNs for Object Detection-II |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 47 - CNNs for Segmentation |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 48 - CNNs for Human Understanding: Faces - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 49 - CNNs for Human Understanding: Faces - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 50 - CNNs for Human Understanding: Human Pose and Crowd |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 51 - CNNs for Other Image Tasks |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 52 - Recurrent Neural Networks: Introduction |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 53 - Backpropagation in RNNs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 54 - LSTMs and GRUs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 55 - Video Understanding using CNNs and RNNs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 56 - Attention in Vision Models: An Introduction |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 57 - Vision and Language: Image Captioning |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 58 - Beyond Captioning: Visual QA, Visual Dialog |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 59 - Other Attention Models |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 60 - Self-Attention and Transformers |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 61 - Deep Generative Models: An Introduction |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 62 - Generative Adversarial Networks - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 63 - Generative Adversarial Networks - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 64 - Variational Autoencoders |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 65 - Combining VAEs and GANs |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 66 - Beyond VAEs and GANs: Other Deep Generative Models - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 67 - Beyond VAEs and GANs: Other Deep Generative Models - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 68 - GAN Improvements |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 69 - Deep Generative Models across Multiple Domains |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 70 - VAEs and DIsentanglement |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 71 - Deep Generative Models: Image Applications |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 72 - Deep Generative Models: Video Applications |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 73 - Few-shot and Zero-shot Learning - Part 1 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 74 - Few-shot and Zero-shot Learning - Part 2 |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 75 - Self-Supervised Learning |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 76 - Adversarial Robustness |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 77 - Pruning and Model Compression |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 78 - Neural Architecture Search |
Link |
NOC:Deep Learning for Computer Vision |
Lecture 79 - Course Conclusion |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 1 - Prologue |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 2 - The Winograd Schema Challenge |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 3 - Introduction (2013 version) |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 4 - Can Machines Think? |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 5 - The Turing Test |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 6 - Language and Thought |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 7 - The Willing Suspension of Disbelief |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 8 - Machines with Wheels and Gears |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 9 - The Notion of Mind in Philosophy |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 10 - Reasoning = Computation |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 11 - Concepts and Categories |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 12 - How did AI get its name? |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 13 - The Chess Saga |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 14 - A Brief History of AI |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 15 - The Worlds in our Minds |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 16 - Epiphemona in Computers |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 17 - State Space Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 18 - Domain Independent Algorithms |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 19 - Deterministic Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 20 - DFS and BFS |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 21 - Comparing DFS and BFS |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 22 - Depth First Iterative Deepening |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 23 - Heuristic Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 24 - Heuristic Functions and the Search Landscape |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 25 - Solution Space Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 26 - The Traveling Salesman Problem |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 27 - Escaping Local Optima |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 28 - Stochastic Local Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 29 - Genetic Algorithms: Survival of the Fittest |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 30 - Genetic Algorithms and SAT |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 31 - Genetic Algorithms for the TSP |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 32 - Emergent Systems |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 33 - Ant Colony Optimization |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 34 - Finding Optimal Paths |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 35 - Branch and Bound |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 36 - Algorithm A* |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 37 - A*: An illustrated example |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 38 - Is A* Admissible? |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 39 - Admissibility of A* |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 40 - Higher, Faster ... |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 41 - B&B - A* - wA* - Best First |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 42 - A*: Leaner Admissible Variations |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 43 - The Monotone Condition |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 44 - DNA Sequence Alignment |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 45 - Divide and Conquer Frontier Search. |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 46 - Smart Memory Graph Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 47 - Variations on A*: The story so far |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 48 - Breadth First Heuristic Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 49 - Beam Stack Search |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 50 - Game Theory |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 51 - Popular Recreational Games |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 52 - Board Games and Game Trees |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 53 - The Evaluation Function in Board Games |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 54 - Algorithm Minimax and Alpha-Beta Pruning |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 55 - A Cluster of Strategies |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 56 - SSS*: A Best First Algorithm |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 57 - SSS*: A Detailed Example |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 58 - Automated Domain Independent Planning |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 59 - The Blocks World Domain |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 60 - State Space Planning: Forward and Backward |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 61 - Goal Stack Planning (GSP) |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 62 - GSP: A Detailed Example |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 63 - Plan Space Planning (PSP) |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 64 - PSP: A Tiny Example |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 65 - Multi-Armed Robots |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 66 - Means-Ends Analysis |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 67 - The Planning Graph |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 68 - Algorithm Graphplan |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 69 - Problem Decomposition. |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 70 - Algorithm AO* |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 71 - AO*: An Illustration |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 72 - Rule Based Expert Systems |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 73 - The Inference Engine |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 74 - The OPS5 Language |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 75 - Conflict Resolution |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 76 - Business Rule Management Systems |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 77 - The Rete Net |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 78 - Rete Algorithm: Optimizing the Match |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 79 - Rete Algorithm: Conflict Resolution |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 80 - Reasoning in Logic |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 81 - Rules of Inference |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 82 - Forward Reasoning |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 83 - First Order Logic |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 84 - Implicit Quantifier Notation |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 85 - Backward Reasoning |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 86 - Depth First Search on Goal Trees |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 87 - Incompleteness... |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 88 - Constraint Satisfaction Problems |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 89 - Binary Constraint Networks |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 90 - Interpreting Line Drawings |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 91 - Model Based Diagnosis |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 92 - Solving CSPs |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 93 - Arc Consistency |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 94 - Propagation = Reasoning |
Link |
NOC:Artificial Intelligence Search Methods For Problem Solving |
Lecture 95 - Lookahead Search |
Link |
NOC:Computational Complexity |
Lecture 1 - Introduction to Computational Complexity |
Link |
NOC:Computational Complexity |
Lecture 2 - The Class P |
Link |
NOC:Computational Complexity |
Lecture 3 - The Class NP |
Link |
NOC:Computational Complexity |
Lecture 4 - The Class NP - Alternate Definition |
Link |
NOC:Computational Complexity |
Lecture 5 - Polynomial Time Reductions |
Link |
NOC:Computational Complexity |
Lecture 6 - NP - Completeness |
Link |
NOC:Computational Complexity |
Lecture 7 - Cook Levin Theorem - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 8 - Cook Levin Theorem - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 9 - More NP Complete Problems |
Link |
NOC:Computational Complexity |
Lecture 10 - Polynomial Hierarchy - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 11 - Polynomial Hierarchy - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 12 - Polynomial Hierarchy - Part 3 |
Link |
NOC:Computational Complexity |
Lecture 13 - Time Hierarchy Theorem |
Link |
NOC:Computational Complexity |
Lecture 14 - Introduction to Space Complexity |
Link |
NOC:Computational Complexity |
Lecture 15 - NL-Completeness |
Link |
NOC:Computational Complexity |
Lecture 16 - Savitch's Theorem |
Link |
NOC:Computational Complexity |
Lecture 17 - NL = co-NL - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 18 - NL = co-NL - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 19 - PSPACE Completeness |
Link |
NOC:Computational Complexity |
Lecture 20 - Games and PSPACE Completeness |
Link |
NOC:Computational Complexity |
Lecture 21 - Space Hierarchy Theorem |
Link |
NOC:Computational Complexity |
Lecture 22 - Ladner's Theorem |
Link |
NOC:Computational Complexity |
Lecture 23 - Oracle Turing Machines |
Link |
NOC:Computational Complexity |
Lecture 24 - Polynomial Hierarchy Using Oracles |
Link |
NOC:Computational Complexity |
Lecture 25 - Baker-Gill-Solovay Theorem - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 26 - Baker-Gill-Solovay Theorem - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 27 - Randomized Complexity Classes - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 28 - Randomized Complexity Classes - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 29 - Randomized Complexity Classes - Part 3 |
Link |
NOC:Computational Complexity |
Lecture 30 - Randomized Complexity Classes - Part 4 |
Link |
NOC:Computational Complexity |
Lecture 31 - Comparison Between Randomized Complexity Classes |
Link |
NOC:Computational Complexity |
Lecture 32 - BPP is in Polynomial Hierarchy |
Link |
NOC:Computational Complexity |
Lecture 33 - Circuit Complexity - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 34 - Circuit Complexity - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 35 - Formal Definition of Circuits |
Link |
NOC:Computational Complexity |
Lecture 36 - Hierarchy Theorem for Circuit Size |
Link |
NOC:Computational Complexity |
Lecture 37 - Complexity Class : P/Poly |
Link |
NOC:Computational Complexity |
Lecture 38 - Karp-Lipton Theorem |
Link |
NOC:Computational Complexity |
Lecture 39 - Turing Machines That Take Advice |
Link |
NOC:Computational Complexity |
Lecture 40 - Classes NC and AC |
Link |
NOC:Computational Complexity |
Lecture 41 - Parity Not in AC0 - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 42 - Parity Not in AC0 - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 43 - Adleman's Theorem |
Link |
NOC:Computational Complexity |
Lecture 44 - Polynomial Identity Testing and Bipartite Perfect Matching in RNC |
Link |
NOC:Computational Complexity |
Lecture 45 - Search Bipartite Perfect Matching is in RNC - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 46 - Search Bipartite Perfect Matching is in RNC - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 47 - Promise Problems and Valiant-Vazirani Theorem |
Link |
NOC:Computational Complexity |
Lecture 48 - Valiant Vazirani Theorem Continued |
Link |
NOC:Computational Complexity |
Lecture 49 - #P and the Complexity of Counting |
Link |
NOC:Computational Complexity |
Lecture 50 - Permanent is #P-Complete - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 51 - Permanent is #P-Complete - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 52 - Toda's Theorem - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 53 - Toda's Theorem - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 54 - Introduction to Communication Complexity - Part 1 |
Link |
NOC:Computational Complexity |
Lecture 55 - Introduction to Communication Complexity - Part 2 |
Link |
NOC:Computational Complexity |
Lecture 56 - Lower Bound Techniques |
Link |
NOC:Computational Complexity |
Lecture 57 - Communication Complexity of Relations |
Link |
NOC:Computational Complexity |
Lecture 58 - Monotone Depth Lower Bound for Matching |
Link |
NOC:Computational Complexity |
Lecture 59 - Interactive Proofs |
Link |
NOC:Computational Complexity |
Lecture 60 - #3SAT is in IP |
Link |
NOC:Computational Complexity |
Lecture 61 - Public Coin Interactive Proofs and AM/MA |
Link |
NOC:Computational Complexity |
Lecture 62 - Simulating Private Coins using Public Coins |
Link |
NOC:Computational Complexity |
Lecture 63 - Summary and Concluding Remarks |
Link |
NOC:Parameterized Algorithms |
Lecture 1 - Invitation to FPT |
Link |
NOC:Parameterized Algorithms |
Lecture 2 - Formalizing FPT |
Link |
NOC:Parameterized Algorithms |
Lecture 3 - Kernelization: High Degree Rule |
Link |
NOC:Parameterized Algorithms |
Lecture 4 - Kernelization: d-Hitting Set |
Link |
NOC:Parameterized Algorithms |
Lecture 5 - Kernelization: Crown Reduciton |
Link |
NOC:Parameterized Algorithms |
Lecture 6 - Kernelization: Nemhauser-Trotter and Expansion Lemma |
Link |
NOC:Parameterized Algorithms |
Lecture 7 - Introduction to Branching |
Link |
NOC:Parameterized Algorithms |
Lecture 8 - Analyzing Recurrences |
Link |
NOC:Parameterized Algorithms |
Lecture 9 - High-Degree Branching for FVS |
Link |
NOC:Parameterized Algorithms |
Lecture 10 - Vertex Cover above LP |
Link |
NOC:Parameterized Algorithms |
Lecture 11 - Applications of Vertex Cover above Matching |
Link |
NOC:Parameterized Algorithms |
Lecture 12 - Iterative Compression I: Setting Up the Method |
Link |
NOC:Parameterized Algorithms |
Lecture 13 - Iterative Compression II: Vertex Cover and Tournament Feedback Vertex Set |
Link |
NOC:Parameterized Algorithms |
Lecture 14 - Iterative Compression III: Feedback Vertex Set and 3-Hitting Set |
Link |
NOC:Parameterized Algorithms |
Lecture 15 - Iterative Compression IV: Odd Cycle Transversal |
Link |
NOC:Parameterized Algorithms |
Lecture 16 - Introduction to Randomized Algorithms via a Simple Randomized FPT Algorithm for FVS |
Link |
NOC:Parameterized Algorithms |
Lecture 17 - Color Coding for Longest Path |
Link |
NOC:Parameterized Algorithms |
Lecture 18 - Chromatic Coding for Feedback Arc Set on Tournaments |
Link |
NOC:Parameterized Algorithms |
Lecture 19 - Random Separation and Subgraph Isomorphism |
Link |
NOC:Parameterized Algorithms |
Lecture 20 - Derandomization |
Link |
NOC:Parameterized Algorithms |
Lecture 21 - Divide and Conquer and Separator |
Link |
NOC:Parameterized Algorithms |
Lecture 22 - Towards Defining Treewidth |
Link |
NOC:Parameterized Algorithms |
Lecture 23 - Treewidth and Constructing Treedecomposition of Few Graph Classes |
Link |
NOC:Parameterized Algorithms |
Lecture 24 - Structural Properties of Treedecomposition and Win-Win |
Link |
NOC:Parameterized Algorithms |
Lecture 25 - Nice Tree Decomposition and Algorithm for Max Weight Independent Set |
Link |
NOC:Parameterized Algorithms |
Lecture 26 - Dynamic Programming Algorithm over graphs of Bounded Treewidth |
Link |
NOC:Parameterized Algorithms |
Lecture 27 - FPT Appproximation Algorithm for Computing Tree Decomposition - Part 1 |
Link |
NOC:Parameterized Algorithms |
Lecture 28 - FPT Appproximation Algorithm for Computing Tree Decomposition - Part 2 |
Link |
NOC:Parameterized Algorithms |
Lecture 29 - FPT Appproximation Algorithm for Computing Tree Decomposition and Applications - Part 1 |
Link |
NOC:Parameterized Algorithms |
Lecture 30 - FPT Appproximation Algorithm for Computing Tree Decomposition and Applications - Part 2 |
Link |
NOC:Parameterized Algorithms |
Lecture 31 - Dynamic Programming Over Subsets for Set Cover |
Link |
NOC:Parameterized Algorithms |
Lecture 32 - Dynamic Programming Over Subsets for Steiner Tree |
Link |
NOC:Parameterized Algorithms |
Lecture 33 - ILP for Envy-Free Allocations and Lobbying |
Link |
NOC:Parameterized Algorithms |
Lecture 34 - ILP for Imbalance Parameterized by Vertex Cover |
Link |
NOC:Parameterized Algorithms |
Lecture 35 - Important Cuts: Basic |
Link |
NOC:Parameterized Algorithms |
Lecture 36 - Important Cuts: Enumeration and Bounds |
Link |
NOC:Parameterized Algorithms |
Lecture 37 - FPT Algorithm for Multiway Cut |
Link |
NOC:Parameterized Algorithms |
Lecture 38 - FPT Algorithm for Directed Feedback Edge Set |
Link |
NOC:Parameterized Algorithms |
Lecture 39 - Algebraic Techniques: Inclusion Exclusion (Coloring) |
Link |
NOC:Parameterized Algorithms |
Lecture 40 - Algebraic Techniques: Inclusion Exclusion (Hamiltonian Path) |
Link |
NOC:Parameterized Algorithms |
Lecture 41 - Algebraic Techniques: Matrix Multiplication |
Link |
NOC:Parameterized Algorithms |
Lecture 42 - Algebraic Techniques: Polynomial Method |
Link |
NOC:Parameterized Algorithms |
Lecture 43 - Matroids: Representative Sets |
Link |
NOC:Parameterized Algorithms |
Lecture 44 - Matroids: Representative Sets - Computation and Combinatorics |
Link |
NOC:Parameterized Algorithms |
Lecture 45 - Matroids: Representative Sets - Applications (Paths and Kernels) |
Link |
NOC:Parameterized Algorithms |
Lecture 46 - Matroids: Representative Sets - Applications (Directed Long Cycle) |
Link |
NOC:Parameterized Algorithms |
Lecture 47 - Reductions - An Introduction |
Link |
NOC:Parameterized Algorithms |
Lecture 48 - Reductions - Problems as Hard as Clique I (Clique on Regular Graphs) |
Link |
NOC:Parameterized Algorithms |
Lecture 49 - Reductions - Problems as Hard as Clique (PVC, MCC, MIS) |
Link |
NOC:Parameterized Algorithms |
Lecture 50 - Reductions - Problems as Hard as Clique (Dominating Set, Set Cover) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 0 - Welcome and Initial Setup |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 1 - Reversort |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 2 - Engineering Reversort |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 3 - Number Game |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 4 - Will It Stop? |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 5 - Trouble Sort |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 6 - The Meeting Place Cannot Be Changed |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 7 - Magic Ship |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 8 - Simple Skewness |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 9 - Pancake Flipping |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 10 - Islands War |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 11 - Stable Marriage - I |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 12 - Stable Marriage - II |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 13 - When Greedy Does Not Work - Coin Change |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 14 - When Greedy Does Not Work - Guarding a Museum |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 15 - When Greedy Does Not Work - Traveling Salesman |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 16 - DSU - Definition and Motivation |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 17 - DSU via Union by Rank and Path Compression |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 18 - DSU - Implementation |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 19 - Destroying Array - I (Problem Statement and Solution) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 20 - Destroying Array - II (Implementation) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 21 - War-I (Problem Statement) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 22 - War-II (Solution) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 23 - War-III (Implementation) |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 24 - Graph Foundations |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 25 - BFS and DFS |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 26 - Mahmoud and Ehab and the bipartiteness |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 27 - Cover It! |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 28 - Diamond Inheritance |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 29 - SSSP - Overview BFS Revisited |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 30 - SSSP and Dijkstra's Algorithm |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 31 - Sending Email |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 32 - SSSP and Modified Dijkstra |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 33 - SSSP with Negative Cycles - Bellman-Ford |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 34 - Wormholes |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 35 - APSP and Floyd-Warshall |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 36 - Page Hopping |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 37 - Introduction to MSTs |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 38 - Prim's Algorithm |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 39 - Kruskal's Algorithm |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 40 - Cherries Mesh |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 41 - Heirarchy |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 42 - Island Hopping |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 43 - Introduction to MaxFlow |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 44 - Ford-Fulkerson for MaxFlow |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 45 - Implementing Edmonds-Karp |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 46 - Maximum Matching via MaxFlow |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 47 - Sport Elimination via MaxFlow |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 48 - Maxflow-Mincut Duality |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 49 - Police Chase |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 50 - Sam I AM and Vertex Covers |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 51 - Top-Down Dynamic Programming with Frog 1 - Part A |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 52 - Top-Down Dynamic Programming with Frog 1 - Part B |
Link |
NOC:Getting Started with Competitive Programming |
Lecture 53 - Bottom-Up Dynamic Programming with Dice Combinations |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 1 - Quantum Computing Roadmap |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 2 - Quantum Mission in India |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 3 - A Brief Introduction to Applications of Quantum |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 4 - Quantum Computing Basics |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 5 - Postulates of Quantum Mechanics - Part 1 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 6 - Postulates of Quantum Mechanics - Part 2 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 7 - Quantum Measurements |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 8 - Quantum Gates and Circuits - Part 1 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 9 - Quantum Gates and Circuits - Part 2 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 10 - Programming using IBM Quantum Experience and Circuit Composer |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 11 - Quantum Computing Concepts: Entanglement and Interference - Part 1 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 12 - Quantum Computing Concepts: Entanglement and Interference - Part 2 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 13 - Programming using Qiskit - Part 1 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 14 - Programming using Qiskit - Part 2 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 15 - Quantum Algorithms: Deutsch Jozsa Algorithm |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 16 - Quantum Algorithms: Bernstein Vazirani Algorithm |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 17 - Quantum Algorithms: Grover's Search |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 18 - Grover's algorithm Programming |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 19 - NISQ-era quantum algorithms |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 20 - Variational Quantum Algorithms |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 21 - Variational Quantum Eigensolver |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 22 - Quantum Generative Adversarial Networks (QGANs) |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 23 - Fixing quantum errors with quantum tricks: A brief introduction to QEC - Part 1 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 24 - Fixing quantum errors with quantum tricks: A brief introduction to QEC - Part 2 |
Link |
NOC:Introduction to Quantum Computing: Quantum Algorithms and Qiskit |
Lecture 25 - Fixing quantum errors with quantum tricks: A brief introduction to QEC - Part 3 |
Link |
NOC:Systems and Usable Security |
Lecture 1 - Introduction to Computer Security - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 2 - Introduction to Computer Security - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 3 - Malcious Software - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 4 - Malcious Software - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 5 - Social Engineering and Phishing Attacks - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 6 - Social Engineering and Phishing Attacks - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 7 - Operating System Security - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 8 - Operating System Security - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 9 - Operating System Security - Part 3 |
Link |
NOC:Systems and Usable Security |
Lecture 10 - Operating System Security - Part 4 |
Link |
NOC:Systems and Usable Security |
Lecture 11 - Email Security - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 12 - Email Security - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 13 - Transport Layer Security - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 14 - Transport Layer Security - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 15 - IP Security - Part 1 |
Link |
NOC:Systems and Usable Security |
Lecture 16 - IP Security - Part 2 |
Link |
NOC:Systems and Usable Security |
Lecture 17 - Security and Usability Overview |
Link |
NOC:Systems and Usable Security |
Lecture 18 - User Privacy and Usability |
Link |
NOC:Online Privacy |
Lecture 1 - Online Privacy |
Link |
NOC:Online Privacy |
Lecture 2 - Privacy concepts and studies |
Link |
NOC:Online Privacy |
Lecture 3 - Fair Information Practices |
Link |
NOC:Online Privacy |
Lecture 4 - Right to Privacy Contextual Integrity |
Link |
NOC:Online Privacy |
Lecture 5 - Privacy Policy - Part I |
Link |
NOC:Online Privacy |
Lecture 6 - Privacy Policy - Part II |
Link |
NOC:Online Privacy |
Lecture 7 - Privacy-based technologies and decision making |
Link |
NOC:Online Privacy |
Lecture 8 - Social Media Privacy |
Link |
NOC:Online Privacy |
Lecture 9 - Identity resolution |
Link |
NOC:Online Privacy |
Lecture 10 - Privacy Nudges |
Link |
NOC:Online Privacy |
Lecture 11 - Cookies |
Link |
NOC:Online Privacy |
Lecture 12 - Ethics about studying Online Privacy |
Link |
NOC:Online Privacy |
Lecture 13 - Anonymization techniques and Differential Privacy |
Link |
NOC:Online Privacy |
Lecture 14 - Conducting (user, lab, online) studies |
Link |
NOC:Online Privacy |
Lecture 15 - Research paper reading |
Link |
NOC:Online Privacy |
Lecture 16 - Voter and Browser Privacy Leaks, Profiling form PII - Part I |
Link |
NOC:Online Privacy |
Lecture 17 - Voter and Browser Privacy Leaks, Profiling form PII - Part II |
Link |
NOC:Online Privacy |
Lecture 18 - Online Privacy Tools (Hands-on) - Part I |
Link |
NOC:Online Privacy |
Lecture 19 - Online Privacy Tools (Hands-on) - Part II |
Link |
NOC:Online Privacy |
Lecture 20 - Mobile numbers, home location, Location-based social networks |
Link |
NOC:Online Privacy |
Lecture 21 - Location-based social networks |
Link |
NOC:Online Privacy |
Lecture 22 - Privacy laws and regulations - Part I |
Link |
NOC:Online Privacy |
Lecture 23 - Privacy laws and regulations - Part II |
Link |
NOC:Online Privacy |
Lecture 24 - Privacy standards |
Link |
NOC:Online Privacy |
Lecture 25 - Look back |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 1 - Paradigms of Machine Learning |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 2 - Few more examples |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 3 - Types of Learning |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 4 - Types of supervised learning |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 5 - Mathematical tools |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 6 - Three Fundamental spaces |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 7 - Conditional Probability |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 8 - Bayes Theorem |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 9 - Continuous Probability |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 10 - Introduction to vectors |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 11 - Span of vectors |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 12 - Linear Independence |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 13 - Basis of vector space |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 14 - Orthogonality and Projection |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 15 - Introduction to Regression |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 16 - Linear regression |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 17 - Geometrical Interpretation |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 18 - Visual Guide to Orthogonal Projection |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 19 - Iterative solution: Gradient descent |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 20 - Gradient Descent |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 21 - Choosing Step size |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 22 - Taylor Series |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 23 - Stochastic Gradient Descent and basis functions |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 24 - Regularization Techniques |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 25 - Binary Classification |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 26 - K-Nearest Neighbour Classification |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 27 - Distance metric and Cross-Validation |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 28 - Computational efficiency of KNN |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 29 - Introduction to Decision Trees |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 30 - Level splitting |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 31 - Measure of Impurity |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 32 - Entropy and Information Gain |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 33 - Generative vs Discriminative models |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 34 - Naive Bayes classifier |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 35 - Conditional Independence |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 36 - Classifying the test point and summary |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 37 - Discriminative models |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 38 - Logistic Regression |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 39 - Summary and big picture |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 40 - Maximum likelihood estimation |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 41 - Linear separability |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 42 - Perceptron and its learning algorithm |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 43 - Perceptron : A thing of past |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 44 - Support Vector Machine |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 45 - Optimizing weights |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 46 - Handling Outliers |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 47 - Dual Formulation |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 48 - Kernel formulation |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 49 - Introduction to Ensemble methods |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 50 - Bagging |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 51 - Bootstrapping |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 52 - Limitations of bagging |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 53 - Introduction to boosting |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 54 - Ada boost |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 55 - Unsupervised learning |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 56 - K-means Clustering |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 57 - LLyod's Algorithms |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 58 - Convergence and Initialization |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 59 - Representation Learning |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 60 - Orthogonal Projection |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 61 - Covariance Matrix and Eigen direction |
Link |
NOC:Introduction to Machine Learning (Tamil) |
Lecture 62 - PCA and mean centering |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 1 - Introduction - Part 1, Programming languages and compilers |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 2 - Introduction - Part 2, Language translators |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 3 - Introduction - Part 3, Phases of a compiler |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 4 - Introduction - Part 4, Static vs Dynamic contexts,Parameter passing |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 5 - Lexing - Part 1, Terminology, Regex, flex tool- Part 1 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 6 - Lexing - Part 2, Lexical errors, Input buffering |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 7 - flex tool- Part 2 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 8 - Lexing - Part 3, Lookahead, KMP string matching |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 9 - Lexing - Part 4, Regex to DFA conversion - Part 1 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 10 - Lexing - Part 5, Regex to DFA conversion - Part 2, Prasing - Part 1 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 11 - Parsing - Part 2, CFG, Parse tree, Precedence, Ambiguity |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 12 - flex tool - Part 3 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 13 - Parsing - Part 3, Sentinel forms, Error recovery, if-else ambiguity |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 14 - Parsing - Part 4, Left recursion, Recursive descent parsing |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 15 - Parsing - Part 5, First and Follow, Predicitive parsing table |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 16 - Parsing - Part 6, Predictive parsing table, LL(1) grammars |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 17 - Discussions and doubts clarification - Part 1 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 18 - Parsing - Part 6, Bottom-up, Shift-reduce parsing, SLR parsing |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 19 - Parsing - Part 6, LR(0) automaton, SLR parsing using automaton |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 20 - Parsing - Part 7, SLR(1) parsing table, SLR(1) parsing algorithm |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 21 - Parsing - Part 8, Viable prefixes, LR(1) parsing, LR(1) automaton |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 22 - Parsing - Part 9, LALR parsing, SDT- Part 1, attributes |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 23 - Syntax Directed Translation - Part 2, S- and L-attributed SDD |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 24 - Syntax Directed Translation - Part 3, L-attributed SDD, Applications |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 25 - Syntax Directed Translation - Part 4, Actions within productions |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 26 - Discussions and doubts clarification - Part 2 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 27 - Quiz-1 discussion, SDT - Part 5, Code generation for while loop |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 28 - Intermdiate Code Generation - Part 1, Syntax trees and DAGs |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 29 - Intermdiate Code Generation - Part 2, Three-address code |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 30 - Discussions and doubts clarification Part 3 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 31 - Intermdiate Code Generation - Part 3, Static single assignment |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 32 - Intermdiate Code Generation - Part 4, IR for type expressions |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 33 - Intermdiate Code Generation - Part 4, IR for array expressions |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 34 - Intermdiate Code Generation - Part 4, IR for boolean expressions |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 35 - Intermdiate Code Generation - Part 4, IR for break, continue, switch |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 36 - Code Generator - Part 1, Introduction, IR and target code |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 37 - Code Generator - Part 2, Instruction selection, ordering |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 38 - Code Generator - Part 2, Basic blocks and CFG |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 39 - x86 assembly code |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 40 - Code optimizer - Part 1, Local optimizations within a basic block |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 41 - Code optimizer - Part 2, Array references, Peephole optimization |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 42 - Discussions and doubts clarification - Part 4 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 43 - Code optimizer - Part 3, Register allocation, Liveness |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 44 - Code optimizer - Part 4, Register allocation as graph coloring |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 45 - Discussions and doubts clarification - Part 5 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 46 - Code optimizer - Part 5, Data flow analysis, Reaching definitions |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 47 - Discussions and doubts clarification - Part 6 |
Link |
Compiler Design (Prof. Rupesh Nasre) |
Lecture 48 - Code optimizer - Part 6, DFA for reaching definitions,Live variables |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 1 - Introduction to AI Systems Hardware - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 2 - Introduction to AI Systems Hardware - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 3 - Introduction to AI Accelerators, GPUs |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 4 - Introduction to Operating Systems, Virtualization, Cloud - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 5 - Introduction to Operating Systems, Virtualization, Cloud - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 6 - Introduction to Containers and IDE Dockers - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 7 - Introduction to Containers and IDE Dockers - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 8 - Scheduling and Resource Management - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 9 - Scheduling and Resource Management - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 10 - DeepOps: Deep Dive into Kubernetes with deployment of various AI based Services - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 11 - DeepOps: Deep Dive into Kubernetes with deployment of various AI based Services - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 12 - DeepOps: Deep Dive into Kubernetes with deployment of various AI based Services Session II - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 13 - DeepOps: Deep Dive into Kubernetes with deployment of various AI based Services Session II - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 14 - Design principles for Building High Performance Clusters - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 15 - Design principles for Building High Performance Clusters - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 16 - Design principles for Building High Performance Clusters - Part 3 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 17 - Design principles for Building High Performance Clusters - Part 4 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 18 - Introduction to Pytorch - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 19 - Introduction to Pytorch - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 20 - Introduction to Pytorch - Part 3 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 21 - Introduction to Pytorch - Part 4 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 22 - Profiling with DLProf Pytorch Catalyst - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 23 - Profiling with DLProf Pytorch Catalyst - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 24 - Introduction to TensorFlow - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 25 - Introduction to TensorFlow - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 26 - Accelerated TensorFlow - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 27 - Accelerated TensorFlow - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 28 - Accelerated TensorFlow - XLA Approach - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 29 - Accelerated TensorFlow - XLA Approach - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 30 - Optimizing Deep learning Training: Automatic Mixed Precision - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 31 - Optimizing Deep learning Training: Automatic Mixed Precision - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 32 - Optimizing Deep learning Training: Transfer Learning - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 33 - Optimizing Deep learning Training: Transfer Learning - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 34 - Fundamentals of Distributed AI Computing Session 1 - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 35 - Fundamentals of Distributed AI Computing Session 1 - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 36 - Fundamentals of Distributed AI Computing Session 2 - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 37 - Fundamentals of Distributed AI Computing Session 2 - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 38 - Distributed Deep Learning using Tensorflow and Horovod |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 39 - Challenges with Distributed Deep Learning Training Convergence |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 40 - Fundamentals of Accelerating Deployment - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 41 - Fundamentals of Accelerating Deployment - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 42 - Accelerating neural network inference in PyTorch and TensorFlow - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 43 - Accelerating neural network inference in PyTorch and TensorFlow - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 44 - Accelerated Data Analytics - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 45 - Accelerated Data Analytics - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 46 - Accelerated Data Analytics - Part 3 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 47 - Accelerated Data Analytics - Part 4 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 48 - Accelerated Machine Learning |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 49 - Scale Out with DASK |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 50 - Web visualizations to GPU accelerated crossfiltering - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 51 - Web visualizations to GPU accelerated crossfiltering - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 52 - Accelerated ETL Pipeline with SPARK - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 53 - Accelerated ETL Pipeline with SPARK - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 54 - Applied AI: Smart City (Intelligent Video Analytics) Session 1 - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 55 - Applied AI: Smart City (Intelligent Video Analytics) Session 1 - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 56 - Applied AI: Smart City (Intelligent Video Analytics) Session 2 Deepstream - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 57 - Applied AI: Smart City (Intelligent Video Analytics) Session 2 Deepstream - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 58 - Applied AI: Health care Session I - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 59 - Applied AI: Health care Session I - Part 2 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 60 - Applied AI: Health care Session II - Part 1 |
Link |
NOC:Applied Accelerated Artificial Intelligence |
Lecture 61 - Applied AI: Health care Session II - Part 2 |
Link |
NOC:Social Network Analysis |
Lecture 1 - Chapter 1 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 2 - Chapter 1 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 3 - Chapter 1 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 4 - Tutorial 1: Introduction to Python/Colab |
Link |
NOC:Social Network Analysis |
Lecture 5 - Tutorial 2: Introduction to NetworkX - Part I |
Link |
NOC:Social Network Analysis |
Lecture 6 - Chapter 2 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 7 - Chapter 2 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 8 - Chapter 2 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 9 - Chapter 2 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 10 - Chapter 2 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 11 - Chapter 2 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 12 - Tutorial 3: Introduction to NetworkX - Part II |
Link |
NOC:Social Network Analysis |
Lecture 13 - Chapter 3 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 14 - Chapter 3 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 15 - Chapter 3 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 16 - Chapter 3 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 17 - Chapter 3 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 18 - Chapter 3 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 19 - Chapter 3 Lecture 7 |
Link |
NOC:Social Network Analysis |
Lecture 20 - Chapter 4 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 21 - Chapter 4 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 22 - Chapter 4 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 23 - Chapter 4 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 24 - Chapter 4 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 25 - Chapter 4 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 26 - Tutorial 4 |
Link |
NOC:Social Network Analysis |
Lecture 27 - Chapter 5 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 28 - Chapter 5 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 29 - Chapter 5 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 30 - Chapter 5 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 31 - Chapter 5 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 32 - Chapter 5 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 33 - Chapter 5 Lecture 7 |
Link |
NOC:Social Network Analysis |
Lecture 34 - Chapter 5 Lecture 8 |
Link |
NOC:Social Network Analysis |
Lecture 35 - Chapter 5 Lecture 9 |
Link |
NOC:Social Network Analysis |
Lecture 36 - Chapter 5 Lecture 10 |
Link |
NOC:Social Network Analysis |
Lecture 37 - Chapter 6 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 38 - Chapter 6 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 39 - Chapter 6 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 40 - Chapter 6 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 41 - Chapter 6 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 42 - Chapter 7 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 43 - Chapter 7 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 44 - Chapter 7 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 45 - Chapter 7 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 46 - Chapter 7 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 47 - Chapter 7 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 48 - Chapter 7 Lecture 7 |
Link |
NOC:Social Network Analysis |
Lecture 49 - Chapter 7 Lecture 8 |
Link |
NOC:Social Network Analysis |
Lecture 50 - chapter 8 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 51 - chapter 8 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 52 - Chapter 8 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 53 - Chapter 8 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 54 - Chapter 8 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 55 - Chapter 8 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 56 - Chapter 9 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 57 - Chapter 9 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 58 - Chapter 9 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 59 - Chapter 9 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 60 - Chapter 9 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 61 - Chapter 9 Lecture 6 |
Link |
NOC:Social Network Analysis |
Lecture 62 - Chapter 9 Lecture 7 |
Link |
NOC:Social Network Analysis |
Lecture 63 - Chapter 9 Lecture 8 |
Link |
NOC:Social Network Analysis |
Lecture 64 - Chapter 9 Lecture 9 |
Link |
NOC:Social Network Analysis |
Lecture 65 - Chapter 9 Lecture 10 |
Link |
NOC:Social Network Analysis |
Lecture 66 - Chapter 9 Lecture 11 |
Link |
NOC:Social Network Analysis |
Lecture 67 - Tutorial 5 |
Link |
NOC:Social Network Analysis |
Lecture 68 - Chapter 10 Lecture 1 |
Link |
NOC:Social Network Analysis |
Lecture 69 - Chapter 10 Lecture 2 |
Link |
NOC:Social Network Analysis |
Lecture 70 - Chapter 10 Lecture 3 |
Link |
NOC:Social Network Analysis |
Lecture 71 - Chapter 10 Lecture 4 |
Link |
NOC:Social Network Analysis |
Lecture 72 - Chapter 10 Lecture 5 |
Link |
NOC:Social Network Analysis |
Lecture 73 - Conclusion - Panel discussion |
Link |
NOC:Social Network Analysis |
Lecture 74 - Conclusion |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 1 - Quantum Algorithms and Cryptography |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 2 - Basics of Quantum Information - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 3 - Basics of Quantum Information - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 4 - Computation and No-Cloning - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 5 - Computation and No-Cloning - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 6 - Computation and No-Cloning - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 7 - Going beyond classical - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 8 - Going beyond classical - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 9 - Going beyond classical - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 10 - Going beyond classical- Deutsch and Deutsch-Jozsa - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 11 - Going beyond classical- Deutsch and Deutsch-Jozsa - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 12 - Simon's and Bernstein's Vazirani Algorithm - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 13 - Simon's and Bernstein's Vazirani Algorithm - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 14 - Introduction to Cryptography - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 15 - Introduction to Cryptography - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 16 - Introduction to Cryptography - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 17 - Building Cryptography - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 18 - Building Cryptography - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 19 - Building Cryptography - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 20 - Building Cryptography - Part 4 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 21 - Building Cryptography - Part 5 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 22 - Building Public Key Encryption - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 23 - Building Public Key Encryption - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 24 - RSA Encryption - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 25 - RSA Encryption - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 26 - Finishing RSA, Fourier Transform - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 27 - Finishing RSA, Fourier Transform - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 28 - Finishing RSA, Fourier Transform - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 29 - Grover's Algorithm - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 30 - Grover's Algorithm - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 31 - Grover's Algorithm - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 32 - Simon's Algorithm over Z_n - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 33 - Simon's Algorithm over Z_n - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 34 - Simon's Algorithm over Z_n - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 35 - Simon's Algorithm over Z_n - Part 4 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 36 - Simon's Algorithm over Z_n - Part 5 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 37 - Simon's Algorithm over Z_n - Part 6 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 38 - Shor's Algorithm - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 39 - Shor's Algorithm - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 40 - Hidden Subgroup Problem - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 41 - Hidden Subgroup Problem - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 42 - Introduction to Lattices - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 43 - Introduction to Lattices - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 44 - Public Key Encryption from LWE - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 45 - Public Key Encryption from LWE - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 46 - Public Key Encryption from LWE - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 47 - Fully Homomorphic Encryption - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 48 - Fully Homomorphic Encryption - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 49 - Fully Homomorphic Encryption - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 50 - Quantum Cryptography - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 51 - Quantum Cryptography - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 52 - Quantum Cryptography - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 53 - Quantum Cryptography - Part 4 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 54 - Quantum Cryptography - Part 5 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 55 - Quantum PKE and FHE - Part 1 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 56 - Quantum PKE and FHE - Part 2 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 57 - Quantum PKE and FHE - Part 3 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 58 - Quantum PKE and FHE - Part 4 |
Link |
NOC:Quantum Algorithms and Cryptography |
Lecture 59 - Quantum PKE and FHE - Part 5 |
Link |
NOC:Theory of Computation (2023) |
Lecture 1 - An Introduction to The Theory of Computation |
Link |
NOC:Theory of Computation (2023) |
Lecture 2 - Notations and Terminology in Theory of Computation |
Link |
NOC:Theory of Computation (2023) |
Lecture 3 - An Introduction to Finite Automata and Regular Languages - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 4 - An Introduction to Finite Automata and Regular Languages - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 5 - Significance of Regular Languages and Regular Operations |
Link |
NOC:Theory of Computation (2023) |
Lecture 6 - Closure Properties of Regular Languages Under Union, Concatenation and Kleene Star Operation - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 7 - Closure Properties of Regular Languages Under Union, Concatenation and Kleene Star Operation - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 8 - An Introduction to Non-Deterministic Finite Automata (NFA) |
Link |
NOC:Theory of Computation (2023) |
Lecture 9 - Formal Definitions and Examples of Non-Deterministic Finite Automata (NFA) |
Link |
NOC:Theory of Computation (2023) |
Lecture 10 - Equivalence of NFA and DFA |
Link |
NOC:Theory of Computation (2023) |
Lecture 11 - Closure of Regular Languages Under Regular Operations (Using NFA) |
Link |
NOC:Theory of Computation (2023) |
Lecture 12 - Regular Expressions - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 13 - Regular Expressions - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 14 - Proving Equivalence of Regular Expression and DFA Through a GNFA |
Link |
NOC:Theory of Computation (2023) |
Lecture 15 - Pumping Lemma for Regular Languages - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 16 - Pumping Lemma for Regular Languages - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 17 - Distinguishability of Strings and Myhill-Nerode Theorem |
Link |
NOC:Theory of Computation (2023) |
Lecture 18 - Proving the Myhill-Nerode Theorem |
Link |
NOC:Theory of Computation (2023) |
Lecture 19 - An Introduction to Context-Free Languages - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 20 - An Introduction to Context-Free Languages - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 21 - Chomsky Normal Form |
Link |
NOC:Theory of Computation (2023) |
Lecture 22 - CYK Algorithm - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 23 - CYK Algorithm - Part 2 (Example) |
Link |
NOC:Theory of Computation (2023) |
Lecture 24 - Closure Properties of Context Free Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 25 - An Introduction to Push Down Automata |
Link |
NOC:Theory of Computation (2023) |
Lecture 26 - Normalizations in PDA and Intersection of Regular Language and CFL |
Link |
NOC:Theory of Computation (2023) |
Lecture 27 - Equivalence of Context Free Grammars and Push Down Automata - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 28 - Equivalence of Context Free Grammars and Push Down Automata - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 29 - Equivalence of Context Free Grammars and Push Down Automata - Part 3 |
Link |
NOC:Theory of Computation (2023) |
Lecture 30 - Pumping Lemma for Context Free Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 31 - Examples of Pumping Lemma Usage for Context Free Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 32 - Formal Definition of a Turing Machine |
Link |
NOC:Theory of Computation (2023) |
Lecture 33 - Turing Recognizable and Decidable Languages and TM Examples |
Link |
NOC:Theory of Computation (2023) |
Lecture 34 - Multitape Turing Machine |
Link |
NOC:Theory of Computation (2023) |
Lecture 35 - Non-Deterministic Turing Machines |
Link |
NOC:Theory of Computation (2023) |
Lecture 36 - Equivalence of Deterministic and Nondeterministic TM |
Link |
NOC:Theory of Computation (2023) |
Lecture 37 - Church-Turing Thesis |
Link |
NOC:Theory of Computation (2023) |
Lecture 38 - Decidable Problems Concerning Regular Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 39 - Decidable Problems Concerning Context Free Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 40 - Countability of Sets |
Link |
NOC:Theory of Computation (2023) |
Lecture 41 - Proof of Existence of Undecidable Languages |
Link |
NOC:Theory of Computation (2023) |
Lecture 42 - Halting Problem |
Link |
NOC:Theory of Computation (2023) |
Lecture 43 - Co-Turing Recognizability |
Link |
NOC:Theory of Computation (2023) |
Lecture 44 - An Introduction to Mapping Reducibility |
Link |
NOC:Theory of Computation (2023) |
Lecture 45 - Examples of Proving Undecidability Using Reductions |
Link |
NOC:Theory of Computation (2023) |
Lecture 46 - Rice Theorem |
Link |
NOC:Theory of Computation (2023) |
Lecture 47 - Computation Histories |
Link |
NOC:Theory of Computation (2023) |
Lecture 48 - The Post Correspondence Problem |
Link |
NOC:Theory of Computation (2023) |
Lecture 49 - Checking Ambiguity in CFG is Undecidable |
Link |
NOC:Theory of Computation (2023) |
Lecture 50 - Time Complexity - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 51 - Time Complexity - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 52 - Non-Deterministic Polynomial Time - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 53 - Non-Deterministic Polynomial Time - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 54 - Verifiability and NP |
Link |
NOC:Theory of Computation (2023) |
Lecture 55 - Polynomial Time Reductions - Part 1 |
Link |
NOC:Theory of Computation (2023) |
Lecture 56 - Polynomial Time Reductions - Part 2 |
Link |
NOC:Theory of Computation (2023) |
Lecture 57 - NP-Completeness |
Link |
NOC:Theory of Computation (2023) |
Lecture 58 - Cook-Levin Theorem |
Link |
NOC:Theory of Computation (2023) |
Lecture 59 - Cook-Levin Theorem - Proof and Implications |
Link |
NOC:Theory of Computation (2023) |
Lecture 60 - CLIQUE and VERTEX-COVER is NP-Complete |
Link |
NOC:Theory of Computation (2023) |
Lecture 61 - HAM-PATH is NP-Complete |
Link |
NOC:Theory of Computation (2023) |
Lecture 62 - SUBSET-SUM is NP-Complete |
Link |
NOC:Theory of Computation (2023) |
Lecture 63 - Knapsack Problem |
Link |
NOC:Theory of Computation (2023) |
Lecture 64 - Integer Linear Program is NP-Complete |
Link |
NOC:Theory of Computation (2023) |
Lecture 65 - Space Complexity and its Complexity Classes |
Link |
NOC:Theory of Computation (2023) |
Lecture 66 - Logspace Reductions and NL-Completeness |
Link |
NOC:Theory of Computation (2023) |
Lecture 67 - Savitch's theorem |
Link |
NOC:Theory of Computation (2023) |
Lecture 68 - Results in Space Complexity |
Link |
NOC:Theory of Computation (2023) |
Lecture 69 - Summary and Concluding Remarks |
Link |
NOC:Advanced Computer Networks |
Lecture 1 - An Introduction to High Performance Switching and Routing - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 2 - An Introduction to High Performance Switching and Routing - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 3 - IP Table Lookup - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 4 - IP Table Lookup - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 5 - IP Table Lookup: Trie Based Data Structures - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 6 - IP Table Lookup: Trie Based Data Structures - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 7 - IP Table Lookup: Optimized Trie based Data Structures - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 8 - IP Table Lookup: Optimized Trie based Data Structures - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 9 - Packet Classification - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 10 - Packet Classification - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 11 - Packet Classification - Part 3 |
Link |
NOC:Advanced Computer Networks |
Lecture 12 - Packet Classification Implementation - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 13 - Packet Classification Implementation - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 14 - Traffic Management - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 15 - Traffic Management - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 16 - Traffic Management - Part 3 |
Link |
NOC:Advanced Computer Networks |
Lecture 17 - Traffic Management - Part 4 |
Link |
NOC:Advanced Computer Networks |
Lecture 18 - Traffic Management - Part 5 |
Link |
NOC:Advanced Computer Networks |
Lecture 19 - Traffic Management - Part 6 |
Link |
NOC:Advanced Computer Networks |
Lecture 20 - Traffic Management - Part 7 |
Link |
NOC:Advanced Computer Networks |
Lecture 21 - Packet Switching Fabric Design - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 22 - Packet Switching Fabric Design - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 23 - Introduction to Network Softwarization |
Link |
NOC:Advanced Computer Networks |
Lecture 24 - Internet Impasse and Nework Ossification |
Link |
NOC:Advanced Computer Networks |
Lecture 25 - Network Ossification |
Link |
NOC:Advanced Computer Networks |
Lecture 26 - Network Virtualization - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 27 - Network Virtualization - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 28 - Road to SDN |
Link |
NOC:Advanced Computer Networks |
Lecture 29 - Active Networks |
Link |
NOC:Advanced Computer Networks |
Lecture 30 - Data and Control Plane Separation |
Link |
NOC:Advanced Computer Networks |
Lecture 31 - Control Plane Abstractions |
Link |
NOC:Advanced Computer Networks |
Lecture 32 - Software Defined Networking - I |
Link |
NOC:Advanced Computer Networks |
Lecture 33 - Software Defined Networking - II |
Link |
NOC:Advanced Computer Networks |
Lecture 34 - Software Defined Networking - III |
Link |
NOC:Advanced Computer Networks |
Lecture 35 - OpenFlow |
Link |
NOC:Advanced Computer Networks |
Lecture 36 - SND Prospects and Challenges |
Link |
NOC:Advanced Computer Networks |
Lecture 37 - Introduction to Network Function Virtualization - I |
Link |
NOC:Advanced Computer Networks |
Lecture 38 - Introduction to Network Function Virtualization - II |
Link |
NOC:Advanced Computer Networks |
Lecture 39 - Network Function Virtualization - Concepts, Framework and Architecture - I |
Link |
NOC:Advanced Computer Networks |
Lecture 40 - Network Function Virtualization - Concepts, Framework and Architecture - II |
Link |
NOC:Advanced Computer Networks |
Lecture 41 - Network Function Virtualization - Road ahead and Key challenges |
Link |
NOC:Advanced Computer Networks |
Lecture 42 - High Performance Network Packet Processing |
Link |
NOC:Advanced Computer Networks |
Lecture 43 - Summary and Comparision of NFV and SDN |
Link |
NOC:Advanced Computer Networks |
Lecture 44 - Programmable Networks - Data Plane Programmability - Overview I |
Link |
NOC:Advanced Computer Networks |
Lecture 45 - Programmable Networks - Data Plane Programmability - Overview II |
Link |
NOC:Advanced Computer Networks |
Lecture 46 - Reconfigurable Match Action Tables |
Link |
NOC:Advanced Computer Networks |
Lecture 47 - P4 Programming |
Link |
NOC:Advanced Computer Networks |
Lecture 48 - Data Center Networking - Introduction - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 49 - Data Center Networking - Introduction - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 50 - Data Center Networking - Characteristics and Challenges |
Link |
NOC:Advanced Computer Networks |
Lecture 51 - Data Center Networking - Topologies and Architecture - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 52 - Data Center Networking - Topologies and Architecture - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 53 - Data Center Networking - Protocol Innovations - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 54 - Data Center Networking - Protocol Innovations - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 55 - Network Telemetry |
Link |
NOC:Advanced Computer Networks |
Lecture 56 - Serverless Computing - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 57 - Serverless Computing - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 58 - SmartNICs and In-band Network Telemetry, Future of Network Softwarization, SDN 3.0 |
Link |
NOC:Advanced Computer Networks |
Lecture 59 - QUIC |
Link |
NOC:Advanced Computer Networks |
Lecture 60 - Green and Sustainable Data Centers |
Link |
NOC:Advanced Computer Networks |
Lecture 61 - Content Distribution in IP Networks - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 62 - Content Distribution in IP Networks - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 63 - Information Centric Networking - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 64 - Information Centric Networking - Part 2 |
Link |
NOC:Advanced Computer Networks |
Lecture 65 - Information Centric Networking - Part 3 |
Link |
NOC:Advanced Computer Networks |
Lecture 66 - Named Data Networking - Part 1 |
Link |
NOC:Advanced Computer Networks |
Lecture 67 - Named Data Networking - Part 2 |
Link |
NOC:Affective Computing |
Lecture 1 - Fundamentals of Affective computing |
Link |
NOC:Affective Computing |
Lecture 2 - Fundamentals of Affective computing Applications |
Link |
NOC:Affective Computing |
Lecture 3 - Emotion Psychology |
Link |
NOC:Affective Computing |
Lecture 4 - Emotion Theory |
Link |
NOC:Affective Computing |
Lecture 5 - Brain and Asymmetry |
Link |
NOC:Affective Computing |
Lecture 6 - Emotional Design |
Link |
NOC:Affective Computing |
Lecture 7 - Affect Elicitation |
Link |
NOC:Affective Computing |
Lecture 8 - Experimental Methodology |
Link |
NOC:Affective Computing |
Lecture 9 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 10 - Introduction to Facial Expression Recognition |
Link |
NOC:Affective Computing |
Lecture 11 - Facial Feature Extraction |
Link |
NOC:Affective Computing |
Lecture 12 - Group Level Emotion |
Link |
NOC:Affective Computing |
Lecture 13 - Applications of Facial Expression Recognition |
Link |
NOC:Affective Computing |
Lecture 14 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 15 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 16 |
Link |
NOC:Affective Computing |
Lecture 17 |
Link |
NOC:Affective Computing |
Lecture 18 |
Link |
NOC:Affective Computing |
Lecture 19 |
Link |
NOC:Affective Computing |
Lecture 20 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 21 - Emotions in Physiological Signals |
Link |
NOC:Affective Computing |
Lecture 22 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 23 - Emotions via Skin Conductance |
Link |
NOC:Affective Computing |
Lecture 24 - Emotions Via EEG |
Link |
NOC:Affective Computing |
Lecture 25 - Multimodal Affect Recognition |
Link |
NOC:Affective Computing |
Lecture 26 - Multimodal Analysis |
Link |
NOC:Affective Computing |
Lecture 27 - MM Tutorial |
Link |
NOC:Affective Computing |
Lecture 28 - Tutorial |
Link |
NOC:Affective Computing |
Lecture 29 |
Link |
NOC:Affective Computing |
Lecture 30 |
Link |
NOC:Affective Computing |
Lecture 31 |
Link |
NOC:Affective Computing |
Lecture 32 - Emotionally Intelligent Machines - Part 1 |
Link |
NOC:Affective Computing |
Lecture 33 - Emotionally Intelligent Machines - Part 2 |
Link |
NOC:Affective Computing |
Lecture 34 - Case Study |
Link |
NOC:Affective Computing |
Lecture 35 |
Link |
NOC:Affective Computing |
Lecture 36 |
Link |
NOC:Affective Computing |
Lecture 37 - Ethics in Affective Computing - 1 |
Link |
NOC:Affective Computing |
Lecture 38 - Ethics in Affective Computing - 2 |
Link |
NOC:Affective Computing |
Lecture 39 - Course Finale |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 1 - Basics of Linear Algebra: Linear Independence |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 2 - Linear Algebra: Rank of a matrix |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 3 - Linear Algebra - Subspaces of a matrix - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 4 - Linear Algebra - Subspaces of a matrix - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 5 - Linear Algebra - Null space |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 6 - Linear Algebra - Eigen Vectors/Values of a matrix - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 7 - Linear Algebra - Eigen Vectors/Values of a matrix - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 8 - Programming Eigen Decomposition using Python |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 9 - Singular Value Decomposition - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 10 - Singular Value Decomposition - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 11 - Principal Component Analysis - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 12 - Principal Component Analysis - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 13 - Principal Component Analysis - 3 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 14 - Principal Component Analysis - Coding |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 15 - Machine Learning - Overview |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 16 - Optimisation Problems |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 17 - Gradient of a Vector Valued Function - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 18 - Gradient of a Vector Valued Function - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 19 - Neural Netowrks - Overview |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 20 - Neural Netowrks - Backpropagation |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 21 - Optimisation - Introduction to optimisation problems |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 22 - Optimisation - Relaxation and approximate convergence |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 23 - Optimisation - First Order Optimality Condition |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 24 - Optimisation - Second Order Optimality Condition |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 25 - Proof of Second Order Optimality Condition, Gradient Methods |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 26 - Gradient Descent - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 27 - Variants of Gradient Descent - 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 28 - Variants of Gradient Descent - 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 29 - Variants of Gradient Descent - 3 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 30 - Convex Sets |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 31 - Convex Functions |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 32 - Duality and Lagrangian - Part 1 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 33 - Duality and Lagrangian - Part 2 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 34 - Duality and Lagrangian - Part 3 |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 35 - Coding: Introduction to Pytorch |
Link |
NOC:Optimisation for Machine Learning: Theory and Implementation (Hindi) |
Lecture 36 - Guest Lecture: Support Vector Machine |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 1 - Introduction to AI/ML/DS |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 2 - Introduction to Probability; Introduction to machine learning - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 3 - Introduction to Probability; Introduction to machine learning - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 4 - Introduction to Probability; Introduction to machine learning - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 5 - Introduction to Probability; Introduction to machine learning - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 6 - Python for AI/ML/DS - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 7 - Python for AI/ML/DS - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 8 - Descriptive statistics and Inferential statistics - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 9 - Descriptive statistics and Inferential statistics - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 10 - Descriptive statistics and Inferential statistics - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 11 - Descriptive statistics and Inferential statistics - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 12 - Descriptive statistics and Inferential statistics - Part 5 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 13 - Distribution, Data visualization, Plotting libraries - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 14 - Distribution, Data visualization, Plotting libraries - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 15 - Distribution, Data visualization, Plotting libraries - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 16 - Linear Algebra for Data science |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 17 - Identification of linear relationship among attributes |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 18 - Solving Linear Equations - 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 19 - Solving Linear Equations - 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 20 - Linear Algebra - Distance, Hyperplanes and Halfspaces, Eigenvalues, Eigenvectors - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 21 - Linear Algebra - Distance, Hyperplanes and Halfspaces, Eigenvalues, Eigenvectors - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 22 - Linear Algebra - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 23 - Linear Algebra - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 24 - Linear Algebra - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 25 - Regression Models, Models Selection and Evaluation - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 26 - Regression Models, Models Selection and Evaluation - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 27 - Regression Models, Models Selection and Evaluation - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 28 - Regression Models, Models Selection and Evaluation - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 29 - Regression - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 30 - Regression - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 31 - Regression - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 32 - Classification Naive Bayes, Logistic Regression, K-NN - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 33 - Classification Naive Bayes, Logistic Regression, K-NN - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 34 - Classification Naive Bayes, Logistic Regression, K-NN - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 35 - Classification Naive Bayes, Logistic Regression, K-NN - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 36 - Classification - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 37 - Classification - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 38 - Classification - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 39 - Linear Models for Classification - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 40 - Linear Models for Classification - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 41 - Kernel Machines |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 42 - Solving Langrange Dual in SVM |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 43 - Classification and SVM - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 44 - Classification and SVM - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 45 - Tree - Based methods, Boosting bagging - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 46 - Tree - Based methods, Boosting bagging - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 47 - Tree - Based methods, Boosting bagging - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 48 - Tree - Based methods, Boosting bagging - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 49 - Tree-based approaches for regression and classification - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 50 - Tree-based approaches for regression and classification - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 51 - Supervised Learning Using K Nearest Neighbors - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 52 - Supervised Learning Using K Nearest Neighbors - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 53 - Supervised Learning Using K Nearest Neighbors - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 54 - Supervised Learning Using K Nearest Neighbors - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 55 - Clustering methods - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 56 - Clustering methods - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 57 - Induction to Neural Networks, Perceptrons, Multilayer Perceptrons, Feedforward Neural Networks - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 58 - Induction to Neural Networks, Perceptrons, Multilayer Perceptrons, Feedforward Neural Networks - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 59 - Induction to Neural Networks, Perceptrons, Multilayer Perceptrons, Feedforward Neural Networks - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 60 - Induction to Neural Networks, Perceptrons, Multilayer Perceptrons, Feedforward Neural Networks - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 61 - Neural Networks and Feedforward NN - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 62 - Neural Networks and Feedforward NN - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 63 - Neural Networks and Feedforward NN - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 64 - Backpropagation (Intuition) |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 65 - Backpropagation: Computing Cradients w.r.t the Output Units |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 66 - Learning Parameters: Gradient Descent |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 67 - Contours |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 68 - Nesterov Accelerated Gradient Descent |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 69 - Stochastic and Mini-Batch Gradient Descent |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 70 - Tips for Adjusting learning Rate and Momentum |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 71 - Line Search |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 72 - The convolution operation |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 73 - Convolutional Neural Networks |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 74 - CNN and DL models - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 75 - CNN and DL models - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 76 - CNN and DL models - Part 3 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 77 - CNN and DL models - Part 4 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 78 - AI/ML/DS Industry Use Cases - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 79 - AI/ML/DS Industry Use Cases - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 80 - AI/ML - Case Studies in Industry - Part 1 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 81 - AI/ML - Case Studies in Industry - Part 2 |
Link |
ACM India - RBCDSAI Summer School on DS-AI-ML |
Lecture 82 - Q and A on career in research a woman faculty representative from PSGTech and RBCDSAI |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 1 - Introduction to Machine Learning |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 2 - Linear Algebra: Review (Vector Spaces) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 3 - Linear Algebra: Review (Matrices) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 4 - Probability Theory: Review (Basics of Probability) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 5 - Probability Theory: Review (Random Variables) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 6 - Linear Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 7 - Linear Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 8 - Tutorial: Linear Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 9 - Linear Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 10 - Linear Kernel Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 11 - k-Nearest Neighbour (k-NN) Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 12 - Tutorial: k-NN Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 13 - Tutorial: Kernel Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 14 - Logistic Regression: Classification Evaluation Metrics |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 15 - Logistic Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 16 - Logistic Regression: Examples |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 17 - Tutorial: Logistic Regression |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 18 - Neural Networks |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 19 - Neural Networks |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 20 - Neural Networks: Examples |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 21 - Tutorial: Neural Networks |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 22 - Practical Machine Learning - Part 1 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 23 - Practical Machine Learning - Part 2 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 24 - Practical Machine Learning - Part 3 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 25 - Practical Machine Learning - Part 4 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 26 - Support Vector Machines (SVM) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 27 - Tutorial: Support Vector Machines (SVM) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 28 - Kernel Support Vector Machines (k-SVM) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 29 - Naïve Bayes Classification |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 30 - Decision Trees - Part 1 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 31 - Decision Trees - Part 2 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 32 - Tutorial: Naive Bayes Classification |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 33 - Tutorial: Decision Trees |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 34 - k-NN Classifier |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 35 - Ensemble Learning |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 36 - Random Forests |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 37 - Bagging (Bootstrap AGGregatING) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 38 - Tutorial: Random Forests |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 39 - Tutorial: k-NN Classifier and Bootstrap AGGregatING (Bagging) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 40 - Boosting |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 41 - Clustering |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 42 - k-means Clustering |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 43 - Tutorial: Boosting |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 44 - Spectral Clustering |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 45 - Mixture of Models (Gaussian Mixture Models-GMM) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 46 - Dimensionality Reduction: Principal Component Analysis (PCA) and kernel PCA |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 47 - Tutorial: k-means and Spectral Clustering |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 48 - Tutorial: Principal Component Analysis (PCA) and Gaussian Mixture Models (GMM) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 49 - Introduction to Deep Learning (DL) |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 50 - Convolutional Neural Networks (CNN) - Part A |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 51 - Convolutional Neural Networks (CNN) - Part B |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 52 - Autoencoders |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 53 - Applications of ML in Healthcare Problems - Part 1 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 54 - Applications of ML in Healthcare Problems - Part 2 |
Link |
NOC:Machine Learning (ML) in Hindi |
Lecture 55 - Tutorial: CNN and Autoencoder |
Link |
NOC:Cyber Security and Privacy |
Lecture 1 - Introduction - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 2 - Introduction - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 3 - Introduction - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 4 - Foundations - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 5 - Foundations - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 6 - Foundations - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 7 - Security management, GRC - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 8 - Security management, GRC - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 9 - Security management, GRC - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 10 - Contingency planning - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 11 - Contingency Planning - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 12 - Contingency Planning - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 13 - Cybersecurity policy - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 14 - Cybersecurity policy - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 15 - Cybersecurity policy - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 16 - Risk Management - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 17 - Risk Management - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 18 - Risk Management - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 19 - Cybersecurity: Industry perspective - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 20 - Cybersecurity: Industry perspective - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 21 - Cybersecurity: Industry perspective - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 22 - Cyber security technologies - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 23 - Cyber security technologies - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 24 - Cyber security technologies - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 25 - Foundations of privacy - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 26 - Foundations of privacy - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 27 - Foundations of privacy - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 28 - Privacy regulation - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 29 - Privacy regulation - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 30 - Privacy regulation - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 31 - Privacy regulation in Europe - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 32 - Privacy regulation in Europe - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 33 - Privacy regulation in Europe - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 34 - Privacy: The Indian Way - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 35 - Privacy: The Indian Way - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 36 - Privacy: The Indian Way - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 37 - Information privacy: Economics and strategy - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 38 - Information privacy: Economics and strategy - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 39 - Information privacy: Economics and strategy - Part 3 |
Link |
NOC:Cyber Security and Privacy |
Lecture 40 - Privacy: Strategy and safety - Part 1 |
Link |
NOC:Cyber Security and Privacy |
Lecture 41 - Privacy: Strategy and safety - Part 2 |
Link |
NOC:Cyber Security and Privacy |
Lecture 42 - Privacy: Strategy and safety - Part 3 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 1 - Introduction to Business Intelligence and Analytics |
Link |
NOC:Business Intelligence and Analytics |
Lecture 2 - Patterns in Data |
Link |
NOC:Business Intelligence and Analytics |
Lecture 3 - Vocabulary of Business Analytics |
Link |
NOC:Business Intelligence and Analytics |
Lecture 4 - Course Overview |
Link |
NOC:Business Intelligence and Analytics |
Lecture 5 - Case: Bizocity Scoring at AT&T |
Link |
NOC:Business Intelligence and Analytics |
Lecture 6 - Business Intelligence Architecture |
Link |
NOC:Business Intelligence and Analytics |
Lecture 7 - Data Management |
Link |
NOC:Business Intelligence and Analytics |
Lecture 8 - Online Transaction Processing |
Link |
NOC:Business Intelligence and Analytics |
Lecture 9 - Introduction To SQL |
Link |
NOC:Business Intelligence and Analytics |
Lecture 10 - Normalisation |
Link |
NOC:Business Intelligence and Analytics |
Lecture 11 - Shopsense Case in MySQL Workbench |
Link |
NOC:Business Intelligence and Analytics |
Lecture 12 - Online Analytical Processing |
Link |
NOC:Business Intelligence and Analytics |
Lecture 13 - Descriptive Data Analytics |
Link |
NOC:Business Intelligence and Analytics |
Lecture 14 - Churn Analysis |
Link |
NOC:Business Intelligence and Analytics |
Lecture 15 - Customer Lifetime Value |
Link |
NOC:Business Intelligence and Analytics |
Lecture 16 - NPV-CLV Spreadsheet Analysis |
Link |
NOC:Business Intelligence and Analytics |
Lecture 17 - Analytics Process |
Link |
NOC:Business Intelligence and Analytics |
Lecture 18 - Introduction to Statistical Learning and Data Pre-Processing |
Link |
NOC:Business Intelligence and Analytics |
Lecture 19 - Data Mining Process |
Link |
NOC:Business Intelligence and Analytics |
Lecture 20 - Overview of Data Mining Techniques |
Link |
NOC:Business Intelligence and Analytics |
Lecture 21 - Analytics Process Case |
Link |
NOC:Business Intelligence and Analytics |
Lecture 22 - Introduction to Classification |
Link |
NOC:Business Intelligence and Analytics |
Lecture 23 - Scoring Models |
Link |
NOC:Business Intelligence and Analytics |
Lecture 24 - Classifier Performance |
Link |
NOC:Business Intelligence and Analytics |
Lecture 25 - Decision Trees |
Link |
NOC:Business Intelligence and Analytics |
Lecture 26 - Attribute Selection |
Link |
NOC:Business Intelligence and Analytics |
Lecture 27 - Growing a Decision Tree |
Link |
NOC:Business Intelligence and Analytics |
Lecture 28 - Decision Tree Application - Part 1 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 29 - Decision Tree Application - Part 2 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 30 - Classification Demo - 1 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 31 - Classification Demo - 2 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 32 - Cluster Analysis |
Link |
NOC:Business Intelligence and Analytics |
Lecture 33 - Clustering Techniques - Part 1 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 34 - Clustering Techniques - Part 2 |
Link |
NOC:Business Intelligence and Analytics |
Lecture 35 - K-Means Clustering |
Link |
NOC:Business Intelligence and Analytics |
Lecture 36 - Implementation in Python: Clustering for segmentation and profiling |
Link |
NOC:Business Intelligence and Analytics |
Lecture 37 - RFM Analysis |
Link |
NOC:Business Intelligence and Analytics |
Lecture 38 - Trendhub Case on RFM |
Link |
NOC:Business Intelligence and Analytics |
Lecture 39 - RFM and Clustering |
Link |
NOC:Business Intelligence and Analytics |
Lecture 40 - Artificial Neural Network |
Link |
NOC:Business Intelligence and Analytics |
Lecture 41 - ANN Training |
Link |
NOC:Business Intelligence and Analytics |
Lecture 42 - ANN for Financial Time Series Modelling |
Link |
NOC:Business Intelligence and Analytics |
Lecture 43 - Implementation in Python: ANN |
Link |
NOC:Business Intelligence and Analytics |
Lecture 44 - Introduction Text Mining |
Link |
NOC:Business Intelligence and Analytics |
Lecture 45 - Text Mining Process |
Link |
NOC:Business Intelligence and Analytics |
Lecture 46 - Text mining Using R - The Case of a Movie Discussion Forum |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 1 - Introduction |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 2 - AI Capabilities - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 3 - AI Capabilities - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 4 - AI Risk - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 5 - AI Risk - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 6 - AI Risk - Part 3 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 7 - AI Risk Part 4"Risks associated with AI, getting harmful outputs from AI, biases |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 8 - Robustness - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 9 - Robustness - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 10 - Robustness Hands-On |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 11 - RLHF |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 12 - AI Alignment |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 13 - Transformers - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 14 - Transformers - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 15 - Hugging face |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 16 - Unlearning |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 17 - Approximate unlearning |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 18 - Evaluation of Unlearning and Graph Unlearning - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 19 - Evaluation of Unlearning and Graph Unlearning - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 20 - Representation Engineering - Hands on |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 21 - Introduction to ML - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 22 - Introduction to ML - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 23 - Basics of Neural Networks and PyTorch - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 24 - Basics of Neural Networks and PyTorch - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 25 - PyTorch - Basic Workflow |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 26 - PyTorch - Classification |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 27 - Bias - I |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 28 - Bias - II |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 29 - Source of Bias |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 30 - Bias - Handson |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 31 - Bias - III |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 32 - Bias - IV |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 33 - Bias in VLM's |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 34 - Bias Handson - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 35 - Bias Handson - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 36 - Data Privacy |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 37 - Differential Privacy |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 38 - Approximate Differential Privacy |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 39 - Exponential Mechanism |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 40 - Fairness in Machine Learning |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 41 - Interpretability - I |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 42 - Interpretability - II |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 43 - Interpretability Hands-on - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 44 - Interpretability Hands-on - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 45 - AI Policies, Regulations, AGI - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 46 - AI Policies, Regulations, AGI - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 47 - AI Policies, Regulations, AGI - Part 3 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 48 - AI Policies, AGI with Prof. David Krueger - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 49 - AI Policies, AGI with Prof. David Krueger - Part 2 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 50 - Finetuning and Jailbreaking: Hands-on |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 51 - AI Governance |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 52 - Research Overview: SaGE- Quantifying moral consistency in LLMs |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 53 - Research Overview: Higher Order Structures for Graph Explanations |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 54 - Research Overview: Representation Surgery |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 55 - Summary - Part 1 |
Link |
NOC:Responsible and Safe AI Systems |
Lecture 56 - Summary - Part 2 |
Link |
NOC:Introduction to Cryptology |
Lecture 1 - Introduction Caeser cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 2 - Modular arithmetic, shift cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 3 - Affine Cipher, Vigenere Cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 4 - Prefect secrecy, Application of Shift Cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 5 - Problem Discussion on Affine cipher and Perfect Secrecy |
Link |
NOC:Introduction to Cryptology |
Lecture 6 - Product Cipher, Block Cipher, Modes of Operation for Block Cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 7 - Substitution Permutation network, Fiestel Cipher |
Link |
NOC:Introduction to Cryptology |
Lecture 8 - S-Box Theory |
Link |
NOC:Introduction to Cryptology |
Lecture 9 - Cryptanalysis and its Variants, Linear Attack |
Link |
NOC:Introduction to Cryptology |
Lecture 10 - Problem Discussion |
Link |
NOC:Introduction to Cryptology |
Lecture 11 - Public Key Cryptology Introduction RSA Cryptosystem |
Link |
NOC:Introduction to Cryptology |
Lecture 12 - Complexity analysis of Euclidian Algorithm and RSA Cryptosystem square and multiply algorithm |
Link |
NOC:Introduction to Cryptology |
Lecture 13 - Primality testing: Miler-Rabin Algorithm, Legendre Symbol and Jacobi Symbol |
Link |
NOC:Introduction to Cryptology |
Lecture 14 - Efficien Computation of Jacobi Symbol Primality Testing:Solovay-Stassen Algorithm |
Link |
NOC:Introduction to Cryptology |
Lecture 15 - Problem Discussion on Jacobi Symbol Calculation and RSA Cryptosystem |
Link |
NOC:Introduction to Cryptology |
Lecture 16 - Cryptographic hash function: Introduction |
Link |
NOC:Introduction to Cryptology |
Lecture 17 - Random Oracle model, Security of hash functions |
Link |
NOC:Introduction to Cryptology |
Lecture 18 - Randomized Algorithm and its application on Preimage resistance and collision resistance |
Link |
NOC:Introduction to Cryptology |
Lecture 19 - Iterated Hash Functions |
Link |
NOC:Introduction to Cryptology |
Lecture 20 - Problem Discussionn |
Link |
NOC:Data Analytics with Python |
Lecture 1 - Introduction to data analytics |
Link |
NOC:Data Analytics with Python |
Lecture 2 - Python Fundamentals - I |
Link |
NOC:Data Analytics with Python |
Lecture 3 - Python Fundamentals - II |
Link |
NOC:Data Analytics with Python |
Lecture 4 - Central Tendency and Dispersion - I |
Link |
NOC:Data Analytics with Python |
Lecture 5 - Central Tendency and Dispersion - II |
Link |
NOC:Data Analytics with Python |
Lecture 6 - Introduction to Probability - I |
Link |
NOC:Data Analytics with Python |
Lecture 7 - Introduction to Probability - II |
Link |
NOC:Data Analytics with Python |
Lecture 8 - Probability Distributions - I |
Link |
NOC:Data Analytics with Python |
Lecture 9 - Probability Distributions - II |
Link |
NOC:Data Analytics with Python |
Lecture 10 - Probability Distributions - III |
Link |
NOC:Data Analytics with Python |
Lecture 11 - Python Demo for Distributions |
Link |
NOC:Data Analytics with Python |
Lecture 12 - Sampling and Sampling Distribution |
Link |
NOC:Data Analytics with Python |
Lecture 13 - Distribution of Sample Means, population, and variance |
Link |
NOC:Data Analytics with Python |
Lecture 14 - Confidence interval estimation: Single population - I |
Link |
NOC:Data Analytics with Python |
Lecture 15 - Confidence interval estimation: Single population - II |
Link |
NOC:Data Analytics with Python |
Lecture 16 - Hypothesis Testing - I |
Link |
NOC:Data Analytics with Python |
Lecture 17 - Hypothesis Testing - II |
Link |
NOC:Data Analytics with Python |
Lecture 18 - Hypothesis Testing - III |
Link |
NOC:Data Analytics with Python |
Lecture 19 - Errors in Hypothesis Testing |
Link |
NOC:Data Analytics with Python |
Lecture 20 - Hypothesis Testing: Two sample test - I |
Link |
NOC:Data Analytics with Python |
Lecture 21 - Hypothesis Testing: Two sample test - II |
Link |
NOC:Data Analytics with Python |
Lecture 22 - Hypothesis Testing: Two sample test - III |
Link |
NOC:Data Analytics with Python |
Lecture 23 - ANOVA - I |
Link |
NOC:Data Analytics with Python |
Lecture 24 - ANOVA - II |
Link |
NOC:Data Analytics with Python |
Lecture 25 - Post Hoc Analysis (Tukey’s test) |
Link |
NOC:Data Analytics with Python |
Lecture 26 - Randomize block design (RBD) |
Link |
NOC:Data Analytics with Python |
Lecture 27 - Two Way ANOVA |
Link |
NOC:Data Analytics with Python |
Lecture 28 - Linear Regression - I |
Link |
NOC:Data Analytics with Python |
Lecture 29 - Linear Regression - II |
Link |
NOC:Data Analytics with Python |
Lecture 30 - Linear Regression - III |
Link |
NOC:Data Analytics with Python |
Lecture 31 - Estimation, Prediction of Regression Model Residual Analysis - I |
Link |
NOC:Data Analytics with Python |
Lecture 32 - Estimation, Prediction of Regression Model Residual Analysis - II |
Link |
NOC:Data Analytics with Python |
Lecture 33 - Multiple Regression Model - I |
Link |
NOC:Data Analytics with Python |
Lecture 34 - Multiple Regression Model - II |
Link |
NOC:Data Analytics with Python |
Lecture 35 - Categorical variable regression |
Link |
NOC:Data Analytics with Python |
Lecture 36 - Maximum Likelihood Estimation - I |
Link |
NOC:Data Analytics with Python |
Lecture 37 - Maximum Likelihood Estimation - II |
Link |
NOC:Data Analytics with Python |
Lecture 38 - Logistic Regression - I |
Link |
NOC:Data Analytics with Python |
Lecture 39 - Logistic Regression - II |
Link |
NOC:Data Analytics with Python |
Lecture 40 - Linear Regression Model Vs Logistic Regression Model |
Link |
NOC:Data Analytics with Python |
Lecture 41 - Confusion matrix and ROC - I |
Link |
NOC:Data Analytics with Python |
Lecture 42 - Confusion Matrix and ROC - II |
Link |
NOC:Data Analytics with Python |
Lecture 43 - Performance of Logistic Model - III |
Link |
NOC:Data Analytics with Python |
Lecture 44 - Regression Analysis Model Building - I |
Link |
NOC:Data Analytics with Python |
Lecture 45 - Regression Analysis Model Building (Interaction) - II |
Link |
NOC:Data Analytics with Python |
Lecture 46 - Chi - Square Test of Independence - I |
Link |
NOC:Data Analytics with Python |
Lecture 47 - Chi-Square Test of Independence - II |
Link |
NOC:Data Analytics with Python |
Lecture 48 - Chi-Square Goodness of Fit Test |
Link |
NOC:Data Analytics with Python |
Lecture 49 - Cluster analysis: Introduction - Part I |
Link |
NOC:Data Analytics with Python |
Lecture 50 - Clustering analysis - Part II |
Link |
NOC:Data Analytics with Python |
Lecture 51 - Clustering analysis - Part III |
Link |
NOC:Data Analytics with Python |
Lecture 52 - Cluster analysis - Part IV |
Link |
NOC:Data Analytics with Python |
Lecture 53 - Cluster analysis - Part V |
Link |
NOC:Data Analytics with Python |
Lecture 54 - K- Means Clustering |
Link |
NOC:Data Analytics with Python |
Lecture 55 - Hierarchical method of clustering - I |
Link |
NOC:Data Analytics with Python |
Lecture 56 - Hierarchical method of clustering - II |
Link |
NOC:Data Analytics with Python |
Lecture 57 - Classification and Regression Trees (CART) - I |
Link |
NOC:Data Analytics with Python |
Lecture 58 - Measures of attribute selection |
Link |
NOC:Data Analytics with Python |
Lecture 59 - Attribute selection Measures in (CART) - II |
Link |
NOC:Data Analytics with Python |
Lecture 60 - Classification and Regression Trees (CART) - III |
Link |
Combinatorics |
Lecture 1 - Pigeon hole principle - (Part 1) |
Link |
Combinatorics |
Lecture 2 - Pigeon hole principle - (Part 2) |
Link |
Combinatorics |
Lecture 3 - Pigeon hole principle - (Part 3) |
Link |
Combinatorics |
Lecture 4 - Pigeon hole principle - (Part 4) |
Link |
Combinatorics |
Lecture 5 - Elementary concepts and basic counting principles |
Link |
Combinatorics |
Lecture 6 - Elementary concepts; Binomial theorem; Bijective proofs - Part (1) |
Link |
Combinatorics |
Lecture 7 - Bijective proofs – Part (2) |
Link |
Combinatorics |
Lecture 8 - Bijective proofs - Part (3); Properties of binomial coefficients; Combinatorial identities - Part (1) |
Link |
Combinatorics |
Lecture 9 - Combinatorial identities - Part (2); Permutations of multisets – Part (1) |
Link |
Combinatorics |
Lecture 10 - Permutations of multisets – Part (2) |
Link |
Combinatorics |
Lecture 11 - Multinomial Theorem, Combinations of Multisets – Part (1) |
Link |
Combinatorics |
Lecture 12 - Combinations of Multisets - Part (2) |
Link |
Combinatorics |
Lecture 13 - Combinations of Multisets – Part (3), Bounds for binomial coefficients |
Link |
Combinatorics |
Lecture 14 - Sterling’s Formula, Generalization of Binomial coefficients - Part (1) |
Link |
Combinatorics |
Lecture 15 - Generalization of Binomial coefficients - Part (2) |
Link |
Combinatorics |
Lecture 16 - Generalization of Binomial coefficients - Part (3); Double counting - Part (1) |
Link |
Combinatorics |
Lecture 17 - Double counting - Part (2) |
Link |
Combinatorics |
Lecture 18 - Hall’s Theorem for regular bipartite graphs; Inclusion exclusion principle - Part (1) |
Link |
Combinatorics |
Lecture 19 - Inclusion exclusion principle - Part (2) |
Link |
Combinatorics |
Lecture 20 - Inclusion exclusion principle - Part (3) |
Link |
Combinatorics |
Lecture 21 - Inclusion exclusion principle - Part (4) |
Link |
Combinatorics |
Lecture 22 - Inclusion exclusion principle - Part (5) |
Link |
Combinatorics |
Lecture 23 - Recurrence Relations - Part (1) |
Link |
Combinatorics |
Lecture 24 - Recurrence Relations - Part (2) |
Link |
Combinatorics |
Lecture 25 - Recurrence Relations - Part (3) |
Link |
Combinatorics |
Lecture 26 - Recurrence Relations - Part (4) |
Link |
Combinatorics |
Lecture 27 - Recurrence Relations - Part (5) |
Link |
Combinatorics |
Lecture 28 - Generating functions - Part (1) |
Link |
Combinatorics |
Lecture 29 - Generating functions - Part (2) |
Link |
Combinatorics |
Lecture 30 - Solving recurrence relations using generating functions - Part (1) |
Link |
Combinatorics |
Lecture 31 - Solving recurrence relations using generating functions - Part (2) |
Link |
Combinatorics |
Lecture 32 - Exponential generating functions - Part (1) |
Link |
Combinatorics |
Lecture 33 - Exponential generating functions - Part (2), Partition Number - Part (1) |
Link |
Combinatorics |
Lecture 34 - Partition Number - Part (2) |
Link |
Combinatorics |
Lecture 35 - Partition Number - Part (3) |
Link |
Combinatorics |
Lecture 36 - Partition Number - Part (4); Catalan Numbers - Part (1) |
Link |
Combinatorics |
Lecture 37 - Catalans Numbers - Part (2) |
Link |
Combinatorics |
Lecture 38 - Catalan Numbers - Part (3), Sterling numbers of the 2nd kind |
Link |
Combinatorics |
Lecture 39 - Difference Sequences |
Link |
Combinatorics |
Lecture 40 - Sterling Numbers |
Link |
Combinatorics |
Lecture 41 - Summary |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 1 - An Overview of a Compiler - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 2 - An Overview of a Compiler - Part 2 and Run-Time Environments - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 3 - An Overview of a Compiler - Part 2 and Run-Time Environments - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 4 - Run-Time Environments - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 5 - Run-Time Environments - Part 3 and Local Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 6 - Run-Time Environments - Part 3 and Local Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 7 - Local Optimizations - Part 2 and Code Generation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 8 - Local Optimizations - Part 2 and Code Generation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 9 - Code Generation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 10 - Code Generation - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 11 - Code Generation - Part 3 and Global Register Allocation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 12 - Code Generation - Part 3 and Global Register Allocation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 13 - Global Register Allocation - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 14 - Global Register Allocation - Part 3 and Implementing Object-Oriented Languages - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 15 - Global Register Allocation - Part 3 and Implementing Object-Oriented Languages - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 16 - Implementing Object-Oriented Languages - Part 2 and Introduction to Machine-Independent Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 17 - Implementing Object-Oriented Languages - Part 2 and Introduction to Machine-Independent Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 18 - Introduction to Machine-Independent Optimizations - Part 2 and Data-Flow Analysis - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 19 - Introduction to Machine-Independent Optimizations - Part 2 and Data-Flow Analysis - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 20 - Data-Flow Analysis - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 21 - Data-Flow Analysis - Part 3 and Control-Flow Analysis - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 22 - Data-Flow Analysis - Part 3 and Control-Flow Analysis - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 23 - Control-Flow Analysis - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 24 - Machine-Independent Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 25 - Machine-Independent Optimizations - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 26 - Machine-Independent Optimizations - Part 3 and Data-Flow Analysis: Theoretical Foundation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 27 - Machine-Independent Optimizations - Part 3 and Data-Flow Analysis: Theoretical Foundation - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 28 - Data-Flow Analysis: Theoretical Foundation - Part 2 and Partial Redundancy Elimination - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 29 - Data-Flow Analysis: Theoretical Foundation - Part 2 and Partial Redundancy Elimination - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 30 - Partial Redundancy Elimination - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 31 - The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 32 - The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 33 - The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 3 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 34 - Automatic Parallelization - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 35 - Automatic Parallelization - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 36 - Automatic Parallelization - Part 3 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 37 - Automatic Parallelization - Part 4 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 38 - Instruction Scheduling - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 39 - Instruction Scheduling - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 40 - Instruction Scheduling - Part 3 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 41 - Software Pipelining |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 42 - Energy-Aware Software Systems - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 43 - Energy-Aware Software Systems - Part 2 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 44 - Energy-Aware Software Systems - Part 3 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 45 - Energy-Aware Software Systems - Part 4 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 46 - Just-In-Time Compilation and Optimizations for .NET CLR |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 47 - Garbage Collection |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 48 - Interprocedural Data-Flow Analysis |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 49 - Worst Case Execution Time - Part 1 |
Link |
Compiler Design (Prof. Y.N. Srikanth) |
Lecture 50 - Worst Case Execution Time - Part 2 |
Link |
Graph Theory |
Lecture 1 - Introduction: Vertex cover and independent set |
Link |
Graph Theory |
Lecture 2 - Matchings: Konig’s theorem and Hall’s theorem |
Link |
Graph Theory |
Lecture 3 - More on Hall’s theorem and some applications |
Link |
Graph Theory |
Lecture 4 - Tutte’s theorem on existence of a perfect matching |
Link |
Graph Theory |
Lecture 5 - More on Tutte’s theorem |
Link |
Graph Theory |
Lecture 6 - More on Matchings |
Link |
Graph Theory |
Lecture 7 - Dominating set, path cover |
Link |
Graph Theory |
Lecture 8 - Gallai – Millgram theorem, Dilworth’s theorem |
Link |
Graph Theory |
Lecture 9 - Connectivity: 2-connected and 3-connected graphs |
Link |
Graph Theory |
Lecture 10 - Menger’s theorem |
Link |
Graph Theory |
Lecture 11 - More on connectivity: k- linkedness |
Link |
Graph Theory |
Lecture 12 - Minors, topological minors and more on k- linkedness |
Link |
Graph Theory |
Lecture 13 - Vertex coloring: Brooks theorem |
Link |
Graph Theory |
Lecture 14 - More on vertex coloring |
Link |
Graph Theory |
Lecture 15 - Edge coloring: Vizing’s theorem |
Link |
Graph Theory |
Lecture 16 - Proof of Vizing’s theorem, Introduction to planarity |
Link |
Graph Theory |
Lecture 17 - 5- coloring planar graphs, Kuratowsky’s theorem |
Link |
Graph Theory |
Lecture 18 - Proof of Kuratowsky’s theorem, List coloring |
Link |
Graph Theory |
Lecture 19 - List chromatic index |
Link |
Graph Theory |
Lecture 20 - Adjacency polynomial of a graph and combinatorial Nullstellensatz |
Link |
Graph Theory |
Lecture 21 - Chromatic polynomial, k - critical graphs |
Link |
Graph Theory |
Lecture 22 - Gallai-Roy theorem, Acyclic coloring, Hadwiger’s conjecture |
Link |
Graph Theory |
Lecture 23 - Perfect graphs: Examples |
Link |
Graph Theory |
Lecture 24 - Interval graphs, chordal graphs |
Link |
Graph Theory |
Lecture 25 - Proof of weak perfect graph theorem (WPGT) |
Link |
Graph Theory |
Lecture 26 - Second proof of WPGT, Some non-perfect graph classes |
Link |
Graph Theory |
Lecture 27 - More special classes of graphs |
Link |
Graph Theory |
Lecture 28 - Boxicity,Sphericity, Hamiltonian circuits |
Link |
Graph Theory |
Lecture 29 - More on Hamiltonicity: Chvatal’s theorem |
Link |
Graph Theory |
Lecture 30 - Chvatal’s theorem, toughness, Hamiltonicity and 4-color conjecture |
Link |
Graph Theory |
Lecture 31 - Network flows: Max flow mincut theorem |
Link |
Graph Theory |
Lecture 32 - More on network flows: Circulations |
Link |
Graph Theory |
Lecture 33 - Circulations and tensions |
Link |
Graph Theory |
Lecture 34 - More on circulations and tensions, flow number and Tutte’s flow conjectures |
Link |
Graph Theory |
Lecture 35 - Random graphs and probabilistic method: Preliminaries |
Link |
Graph Theory |
Lecture 36 - Probabilistic method: Markov’s inequality, Ramsey number |
Link |
Graph Theory |
Lecture 37 - Probabilistic method: Graphs of high girth and high chromatic number |
Link |
Graph Theory |
Lecture 38 - Probabilistic method: Second moment method, Lovasz local lemma |
Link |
Graph Theory |
Lecture 39 - Graph minors and Hadwiger’s conjecture |
Link |
Graph Theory |
Lecture 40 - More on graph minors, tree decompositions |
Link |
High Performance Computing |
Lecture 1 - Programs and Data |
Link |
High Performance Computing |
Lecture 2 - Data Representation |
Link |
High Performance Computing |
Lecture 3 - Registers and Memory |
Link |
High Performance Computing |
Lecture 4 - Instructions, Addressing Modes |
Link |
High Performance Computing |
Lecture 5 - A RISC Instruction Set |
Link |
High Performance Computing |
Lecture 6 - A RISC Instruction Set (Continued...) |
Link |
High Performance Computing |
Lecture 7 - Function Call and Return |
Link |
High Performance Computing |
Lecture 8 - Function Call and Return (Continued...) |
Link |
High Performance Computing |
Lecture 9 - Instruction Execution |
Link |
High Performance Computing |
Lecture 10 - Instruction Execution (Continued...) |
Link |
High Performance Computing |
Lecture 11 - Software organization |
Link |
High Performance Computing |
Lecture 12 - System Calls |
Link |
High Performance Computing |
Lecture 13 - Virtual memory |
Link |
High Performance Computing |
Lecture 14 - Virtual memory (Continued...) |
Link |
High Performance Computing |
Lecture 15 - Virtual Memory (Continued...) |
Link |
High Performance Computing |
Lecture 16 - Process |
Link |
High Performance Computing |
Lecture 17 - Process scheduling |
Link |
High Performance Computing |
Lecture 18 - Process lifetime |
Link |
High Performance Computing |
Lecture 19 - Interprocess communication |
Link |
High Performance Computing |
Lecture 20 - Concurrent programming |
Link |
High Performance Computing |
Lecture 21 - Pipelining |
Link |
High Performance Computing |
Lecture 22 - Pipeline hazards |
Link |
High Performance Computing |
Lecture 23 - Pipeline hazards (Continued...) |
Link |
High Performance Computing |
Lecture 24 - Pipeline hazards (Continued...) |
Link |
High Performance Computing |
Lecture 25 - Cache memory |
Link |
High Performance Computing |
Lecture 26 - Memory hierarchy |
Link |
High Performance Computing |
Lecture 27 - Cache operation |
Link |
High Performance Computing |
Lecture 28 - Cache operation (Continued) |
Link |
High Performance Computing |
Lecture 29 - Cache aware programming |
Link |
High Performance Computing |
Lecture 30 - Cache aware programming (Continued...) |
Link |
High Performance Computing |
Lecture 31 - More on cache |
Link |
High Performance Computing |
Lecture 32 - Measuring time |
Link |
High Performance Computing |
Lecture 33 - Program Profiling |
Link |
High Performance Computing |
Lecture 34 - Secondary storage |
Link |
High Performance Computing |
Lecture 35 - Files and disks |
Link |
High Performance Computing |
Lecture 36 - Directories |
Link |
High Performance Computing |
Lecture 37 - Protection and Performance |
Link |
High Performance Computing |
Lecture 38 - Parallel architecture |
Link |
High Performance Computing |
Lecture 39 - Cache coherence |
Link |
High Performance Computing |
Lecture 40 - MPI programming |
Link |
High Performance Computing |
Lecture 41 - MPI programming (Continued...) |
Link |
Numerical Optimization |
Lecture 1 - Introduction |
Link |
Numerical Optimization |
Lecture 2 - Mathematical Background |
Link |
Numerical Optimization |
Lecture 3 - Mathematical Background (Continued...) |
Link |
Numerical Optimization |
Lecture 4 - One Dimensional Optimization - Optimality Conditions |
Link |
Numerical Optimization |
Lecture 5 - One Dimensional Optimization (Continued...) |
Link |
Numerical Optimization |
Lecture 6 - Convex Sets |
Link |
Numerical Optimization |
Lecture 7 - Convex Sets (Continued...) |
Link |
Numerical Optimization |
Lecture 8 - Convex Functions |
Link |
Numerical Optimization |
Lecture 9 - Convex Functions (Continued...) |
Link |
Numerical Optimization |
Lecture 10 - Multi Dimensional Optimization - Optimality Conditions, Conceptual Algorithm |
Link |
Numerical Optimization |
Lecture 11 - Line Search Techniques |
Link |
Numerical Optimization |
Lecture 12 - Global Convergence Theorem |
Link |
Numerical Optimization |
Lecture 13 - Steepest Descent Method |
Link |
Numerical Optimization |
Lecture 14 - Classical Newton Method |
Link |
Numerical Optimization |
Lecture 15 - Trust Region and Quasi-Newton Methods |
Link |
Numerical Optimization |
Lecture 16 - Quasi-Newton Methods - Rank One Correction, DFP Method |
Link |
Numerical Optimization |
Lecture 17 - i) Quasi-Newton Methods - Broyden Family ii) Coordinate Descent Method |
Link |
Numerical Optimization |
Lecture 18 - Conjugate Directions |
Link |
Numerical Optimization |
Lecture 19 - Conjugate Gradient Method |
Link |
Numerical Optimization |
Lecture 20 - Constrained Optimization - Local and Global Solutions, Conceptual Algorithm |
Link |
Numerical Optimization |
Lecture 21 - Feasible and Descent Directions |
Link |
Numerical Optimization |
Lecture 22 - First Order KKT Conditions |
Link |
Numerical Optimization |
Lecture 23 - Constraint Qualifications |
Link |
Numerical Optimization |
Lecture 24 - Convex Programming Problem |
Link |
Numerical Optimization |
Lecture 25 - Second Order KKT Conditions |
Link |
Numerical Optimization |
Lecture 26 - Second Order KKT Conditions (Continued...) |
Link |
Numerical Optimization |
Lecture 27 - Weak and Strong Duality |
Link |
Numerical Optimization |
Lecture 28 - Geometric Interpretation |
Link |
Numerical Optimization |
Lecture 29 - Lagrangian Saddle Point and Wolfe Dual |
Link |
Numerical Optimization |
Lecture 30 - Linear Programming Problem |
Link |
Numerical Optimization |
Lecture 31 - Geometric Solution |
Link |
Numerical Optimization |
Lecture 32 - Basic Feasible Solution |
Link |
Numerical Optimization |
Lecture 33 - Optimality Conditions and Simplex Tableau |
Link |
Numerical Optimization |
Lecture 34 - Simplex Algorithm and Two-Phase Method |
Link |
Numerical Optimization |
Lecture 35 - Duality in Linear Programming |
Link |
Numerical Optimization |
Lecture 36 - Interior Point Methods - Affine Scaling Method |
Link |
Numerical Optimization |
Lecture 37 - Karmarkar's Method |
Link |
Numerical Optimization |
Lecture 38 - Lagrange Methods, Active Set Method |
Link |
Numerical Optimization |
Lecture 39 - Active Set Method (Continued...) |
Link |
Numerical Optimization |
Lecture 40 - Barrier and Penalty Methods, Augmented Lagrangian Method and Cutting Plane Method |
Link |
Numerical Optimization |
Lecture 41 - Summary |
Link |
Storage Systems |
Lecture 1 - Overview |
Link |
Storage Systems |
Lecture 2 - Storage, Processing, Networking |
Link |
Storage Systems |
Lecture 3 - Naming and Storing |
Link |
Storage Systems |
Lecture 4 - Storage Filesystems |
Link |
Storage Systems |
Lecture 5 - Access Architecture, Hard Disks |
Link |
Storage Systems |
Lecture 6 - SCSI |
Link |
Storage Systems |
Lecture 7 - Fibre Channel Protocol (FCP) |
Link |
Storage Systems |
Lecture 8 - FCP, 10Gb Ethernet, iSCSI, TCP |
Link |
Storage Systems |
Lecture 9 - NFS, NFSv2 |
Link |
Storage Systems |
Lecture 10 - NFSv2, NFSv3, NFSv4, CIFS |
Link |
Storage Systems |
Lecture 11 - USB Storage |
Link |
Storage Systems |
Lecture 12 - Tiering |
Link |
Storage Systems |
Lecture 13 - Mobile/Personal/Organizational - type Storage |
Link |
Storage Systems |
Lecture 14 - Parallel/Cloud/Web-scale Storage |
Link |
Storage Systems |
Lecture 15 - Long-term Storage |
Link |
Storage Systems |
Lecture 16 - Storage interfaces |
Link |
Storage Systems |
Lecture 17 - User-Memory-CPU interactions |
Link |
Storage Systems |
Lecture 18 - Spinlock, Concurrency |
Link |
Storage Systems |
Lecture 19 - Block Layer design |
Link |
Storage Systems |
Lecture 20 - FAT, TFAT, F2FS, LFS, FTL |
Link |
Storage Systems |
Lecture 21 - Data Structures |
Link |
Storage Systems |
Lecture 22 - Abstractions |
Link |
Storage Systems |
Lecture 23 - Link & Write Operations |
Link |
Storage Systems |
Lecture 24 - ZFS |
Link |
Storage Systems |
Lecture 25 - RAID in Filesystems |
Link |
Storage Systems |
Lecture 26 - RAID-Z, NetApp RAID4, Flash Filesystems |
Link |
Storage Systems |
Lecture 27 - Reliability |
Link |
Storage Systems |
Lecture 28 - Performance |
Link |
Storage Systems |
Lecture 29 - Security |
Link |
Storage Systems |
Lecture 30 - CAP Theorem |
Link |
Storage Systems |
Lecture 31 - POSIX/NFS/S3/Zookeeper, ACID Vs. BASE |
Link |
Storage Systems |
Lecture 32 - Consistency & Commit problems |
Link |
Storage Systems |
Lecture 33 - Paxos |
Link |
Storage Systems |
Lecture 34 - Group Communication problem |
Link |
Storage Systems |
Lecture 35 - Message Ordering |
Link |
Storage Systems |
Lecture 36 - Ordering Models |
Link |
Storage Systems |
Lecture 37 - Orderings in Filesystems |
Link |
Storage Systems |
Lecture 38 - Semantics of highly scalable filesystems |
Link |
Storage Systems |
Lecture 39 - GFS |
Link |
Storage Systems |
Lecture 40 - GFS Model |
Link |
Storage Systems |
Lecture 41 - GFS functions and operations |
Link |
Storage Systems |
Lecture 42 - GFS problems, BigTable |
Link |
Storage Systems |
Lecture 43 - Lessons to learn |
Link |
System Analysis and Design |
Lecture 1 |
Link |
System Analysis and Design |
Lecture 2 |
Link |
System Analysis and Design |
Lecture 3 |
Link |
System Analysis and Design |
Lecture 4 |
Link |
System Analysis and Design |
Lecture 5 |
Link |
System Analysis and Design |
Lecture 6 |
Link |
System Analysis and Design |
Lecture 7 |
Link |
System Analysis and Design |
Lecture 8 |
Link |
System Analysis and Design |
Lecture 9 |
Link |
System Analysis and Design |
Lecture 10 |
Link |
System Analysis and Design |
Lecture 11 |
Link |
System Analysis and Design |
Lecture 12 |
Link |
System Analysis and Design |
Lecture 13 |
Link |
System Analysis and Design |
Lecture 14 |
Link |
System Analysis and Design |
Lecture 15 |
Link |
System Analysis and Design |
Lecture 16 |
Link |
System Analysis and Design |
Lecture 17 |
Link |
System Analysis and Design |
Lecture 18 |
Link |
System Analysis and Design |
Lecture 19 |
Link |
System Analysis and Design |
Lecture 20 |
Link |
System Analysis and Design |
Lecture 21 |
Link |
System Analysis and Design |
Lecture 22 |
Link |
System Analysis and Design |
Lecture 23 |
Link |
System Analysis and Design |
Lecture 24 |
Link |
System Analysis and Design |
Lecture 25 |
Link |
System Analysis and Design |
Lecture 26 |
Link |
System Analysis and Design |
Lecture 27 |
Link |
System Analysis and Design |
Lecture 28 |
Link |
System Analysis and Design |
Lecture 29 |
Link |
System Analysis and Design |
Lecture 30 |
Link |
System Analysis and Design |
Lecture 31 |
Link |
System Analysis and Design |
Lecture 32 |
Link |
System Analysis and Design |
Lecture 33 |
Link |
System Analysis and Design |
Lecture 34 |
Link |
System Analysis and Design |
Lecture 35 |
Link |
System Analysis and Design |
Lecture 36 |
Link |
System Analysis and Design |
Lecture 37 |
Link |
System Analysis and Design |
Lecture 38 |
Link |
System Analysis and Design |
Lecture 39 |
Link |
System Analysis and Design |
Lecture 40 |
Link |
Principles of Compiler Design |
Lecture 1 - An Overview of a Compiler |
Link |
Principles of Compiler Design |
Lecture 2 - Lexical Analysis - Part 1 |
Link |
Principles of Compiler Design |
Lecture 3 - Lexical Analysis - Part 2 |
Link |
Principles of Compiler Design |
Lecture 4 - Lexical Analysis - Part 3 |
Link |
Principles of Compiler Design |
Lecture 5 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 1 |
Link |
Principles of Compiler Design |
Lecture 6 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 2 |
Link |
Principles of Compiler Design |
Lecture 7 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 3 |
Link |
Principles of Compiler Design |
Lecture 8 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 4 |
Link |
Principles of Compiler Design |
Lecture 9 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 5 |
Link |
Principles of Compiler Design |
Lecture 10 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 6 |
Link |
Principles of Compiler Design |
Lecture 11 - Syntax Analysis: Context-free Grammars, Pushdown Automata and Parsing Part - 7 |
Link |
Principles of Compiler Design |
Lecture 12 - Semantic Analysis with Attribute Grammars Part - 1 |
Link |
Principles of Compiler Design |
Lecture 13 - Semantic Analysis with Attribute Grammars Part - 2 |
Link |
Principles of Compiler Design |
Lecture 14 - Semantic Analysis with Attribute Grammars Part - 3 |
Link |
Principles of Compiler Design |
Lecture 15 - Semantic Analysis with Attribute Grammars Part - 4 |
Link |
Principles of Compiler Design |
Lecture 16 - Semantic Analysis with Attribute Grammars Part - 5 |
Link |
Principles of Compiler Design |
Lecture 17 - Intermediate code generation Part - 1 |
Link |
Principles of Compiler Design |
Lecture 18 - Intermediate code generation Part - 2 |
Link |
Principles of Compiler Design |
Lecture 19 - Intermediate code generation Part - 3 |
Link |
Principles of Compiler Design |
Lecture 20 - Intermediate code generation Part - 4 (first half of lecture) |
Link |
Principles of Compiler Design |
Lecture 21 - Run-time environments - 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 22 - Run-time environments - 2 |
Link |
Principles of Compiler Design |
Lecture 23 - Run-time environments - 3 |
Link |
Principles of Compiler Design |
Lecture 24 - Run-time environments - 4 (first half of lecture) |
Link |
Principles of Compiler Design |
Lecture 25 - Control-Flow Graph and Local Optimizations - Part 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 26 - Control-Flow Graph and Local Optimizations - Part 2 (first half of lecture) |
Link |
Principles of Compiler Design |
Lecture 27 - Machine code generation - 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 28 - Machine code generation - 2 |
Link |
Principles of Compiler Design |
Lecture 29 - Machine code generation - 3 |
Link |
Principles of Compiler Design |
Lecture 30 - Machine code generation - 4 (first half of lecture), Implementing object-oriented languages 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 31 - Implementing object-oriented languages 2 (first half of lecture) |
Link |
Principles of Compiler Design |
Lecture 32 - Global register allocation - 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 33 - Global register allocation - 2 |
Link |
Principles of Compiler Design |
Lecture 34 - Global register allocation - 3 |
Link |
Principles of Compiler Design |
Lecture 35 - Introduction to Machine-Independent Optimizations - 1 |
Link |
Principles of Compiler Design |
Lecture 36 - Introduction to Machine-Independent Optimizations - 2 |
Link |
Principles of Compiler Design |
Lecture 37 - Introduction to Machine-Independent Optimizations - 3 |
Link |
Principles of Compiler Design |
Lecture 38 - Introduction to Machine-Independent Optimizations - 4 |
Link |
Principles of Compiler Design |
Lecture 39 - Introduction to Machine-Independent Optimizations - 5 |
Link |
Principles of Compiler Design |
Lecture 40 - Introduction to Machine-Independent Optimizations - 6 |
Link |
Principles of Compiler Design |
Lecture 41 - Introduction to Machine-Independent Optimizations - 7 (first half of lecture) |
Link |
Principles of Compiler Design |
Lecture 42 - Instruction Scheduling and Software Pipelining - 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 43 - Instruction Scheduling and Software Pipelining - 2 |
Link |
Principles of Compiler Design |
Lecture 44 - Instruction Scheduling and Software Pipelining - 3 (first part of lecture) |
Link |
Principles of Compiler Design |
Lecture 45 - Automatic parallelization - 1 (second half of lecture) |
Link |
Principles of Compiler Design |
Lecture 46 - Automatic parallelization - 2 |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 1 - Introduction to Mathematical Logic |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 2 - Logical Equivalence |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 3 - SAT Problem |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 4 - Rules of Inference |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 5 - Resolution |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 6 - Tutorial 1 - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 7 - Tutorial 1 - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 8 - Predicate Logic |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 9 - Rules of Inferences in Predicate Logic |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 10 - Proof Strategies - I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 11 - Proof Strategies - II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 12 - Induction |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 13 - Tutorial 2 - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 14 - Tutorial 2 - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 15 - Sets |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 16 - Relations |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 17 - Operations on Relations |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 18 - Transitive Closure of Relations |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 19 - Warshall’s Algorithm for Computing Transitive Closure |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 20 - Tutorial - 3 |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 21 - Equivalence Relation |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 22 - Equivalence Relations and Partitions |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 23 - Partial Ordering |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 24 - Functions |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 25 - Tutorial 4 - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 26 - Tutorial 4 - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 27 - Countable and Uncountable Sets |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 28 - Examples of Countably Infinite Sets |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 29 - Cantor’s Diagonalization Argument |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 30 - Uncomputable Functions |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 31 - Tutorial - 5 |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 32 - Basic Rules of Counting |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 33 - Permutation and Combination |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 34 - Counting Using Recurrence Equations |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 35 - Solving Linear Homogeneous Recurrence Equations - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 36 - Solving Linear Homogeneous Recurrence Equations - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 37 - Tutorial 6 - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 38 - Tutorial 6 - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 39 - Solving Linear Non-Homogeneous Recurrence Equations |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 40 - Catalan Numbers |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 41 - Catalan Numbers - Derivation of Closed Form Formula |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 42 - Counting Using Principle of Inclusion-Exclusion |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 43 - Tutorial - 7 |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 44 - Graph Theory Basics |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 45 - Matching |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 46 - Proof of Hall’s Marriage Theorem |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 47 - Various Operations on Graphs |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 48 - Vertex and Edge Connectivity |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 49 - Tutorial - 8 |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 50 - Euler Path and Euler Circuit |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 51 - Hamiltonian Circuit |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 52 - Vertex and Edge Coloring |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 53 - Tutorial 9 - Part I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 54 - Tutorial 9 - Part II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 55 - Modular Arithmetic |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 56 - Prime Numbers and GCD |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 57 - Properties of GCD and Bézout’s Theorem |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 58 - Linear Congruence Equations and Chinese Remainder Theorem |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 59 - Uniqueness Proof of the CRT |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 60 - Fermat’s Little Theorem, Primality Testing and Carmichael Numbers |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 61 - Group Theory |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 62 - Cyclic Groups |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 63 - Subgroups |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 64 - Discrete Logarithm and Cryptographic Applications |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 65 - More Applications of Groups |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 66 - Rings, Fields and Polynomials |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 67 - Polynomials Over Fields and Properties |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 68 - Finite Fields and Properties - I |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 69 - Finite Fields and Properties - II |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 70 - Primitive Element of a Finite Field |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 71 - Applications of Finite Fields |
Link |
NOC:Discrete Mathematics (IIITB) |
Lecture 72 - Goodbye and Farewell |
Link |
NOC:Secure Computation: Part I |
Lecture 1 - What is Secure MPC |
Link |
NOC:Secure Computation: Part I |
Lecture 2 - Real-World Examples of Secure MPC |
Link |
NOC:Secure Computation: Part I |
Lecture 3 - Various Dimensions to Study Secure MPC |
Link |
NOC:Secure Computation: Part I |
Lecture 4 - Recap of Basic Concepts from Abstract Algebra |
Link |
NOC:Secure Computation: Part I |
Lecture 5 - Recap of Basic Concepts from Abstract Algebra (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 6 - Recap of Basic Concepts from Cryptography |
Link |
NOC:Secure Computation: Part I |
Lecture 7 - Secret sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 8 - Additive Secret Sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 9 - Inefficient Threshold Secret Sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 10 - Polynomials Over Fields |
Link |
NOC:Secure Computation: Part I |
Lecture 11 - Shamir Secret-Sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 12 - Linear secret-sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 13 - Linear Secret Sharing (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 14 - General Secret Sharing |
Link |
NOC:Secure Computation: Part I |
Lecture 15 - Perfectly-Secure Message Transmission |
Link |
NOC:Secure Computation: Part I |
Lecture 16 - A Toy MPC Protocol |
Link |
NOC:Secure Computation: Part I |
Lecture 17 - A Toy MPC Protocol (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 18 - A Toy MPC Protocol (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 19 - The BGW MPC Protocol |
Link |
NOC:Secure Computation: Part I |
Lecture 20 - The BGW MPC Protocol for Linear Functions |
Link |
NOC:Secure Computation: Part I |
Lecture 21 - The BGW MPC Protocol for Linear Functions: Security Analysis |
Link |
NOC:Secure Computation: Part I |
Lecture 22 - The BGW MPC Protocol: The Case of Non-Linear Gates |
Link |
NOC:Secure Computation: Part I |
Lecture 23 - The Degree-Reduction Problem |
Link |
NOC:Secure Computation: Part I |
Lecture 24 - The Gennaro-Rabin-Rabin (GRR) Degree-Reduction Method |
Link |
NOC:Secure Computation: Part I |
Lecture 25 - Analysis of the GRR, Degree-Reduction Method |
Link |
NOC:Secure Computation: Part I |
Lecture 26 - Shared Circuit-Evaluation via GRR Degree-Reduction Method |
Link |
NOC:Secure Computation: Part I |
Lecture 27 - Shared Circuit-Evaluation in the Pre-processing Model |
Link |
NOC:Secure Computation: Part I |
Lecture 28 - Optimality of Corruption Bound for Perfectly-Secure MPC |
Link |
NOC:Secure Computation: Part I |
Lecture 29 - Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries |
Link |
NOC:Secure Computation: Part I |
Lecture 30 - Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) Condition |
Link |
NOC:Secure Computation: Part I |
Lecture 31 - Perfectly-Secure MPC for Small Number of Parties |
Link |
NOC:Secure Computation: Part I |
Lecture 32 - Perfectly-Secure 3PC (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 33 - More Efficient Perfectly-Secure 3PC |
Link |
NOC:Secure Computation: Part I |
Lecture 34 - More Efficient Perfectly-Secure 3PC (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 35 - Towards Cryptographically-Secure MPC |
Link |
NOC:Secure Computation: Part I |
Lecture 36 - GMW MPC protocol |
Link |
NOC:Secure Computation: Part I |
Lecture 37 - Oblivious Transfer (OT) |
Link |
NOC:Secure Computation: Part I |
Lecture 38 - RSA Assumption and RSA Hard-Core Predicate |
Link |
NOC:Secure Computation: Part I |
Lecture 39 - Bit OT Based on RSA Assumption and Hard-Core Predicate |
Link |
NOC:Secure Computation: Part I |
Lecture 40 - Discrete Logarithm and DDH Assumption |
Link |
NOC:Secure Computation: Part I |
Lecture 41 - OT Based on the DDH Assumption |
Link |
NOC:Secure Computation: Part I |
Lecture 42 - Pre-Processing Phase for the GMW Protocol |
Link |
NOC:Secure Computation: Part I |
Lecture 43 - Pre-Processing Phase for the GMW Protocol: The n-Party Case |
Link |
NOC:Secure Computation: Part I |
Lecture 44 - Pre-Processing Phase for the GMW Protocol (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 45 - Pre-Processing of OT |
Link |
NOC:Secure Computation: Part I |
Lecture 46 - OT Extension |
Link |
NOC:Secure Computation: Part I |
Lecture 47 - Analysis of IKNP OT Extension |
Link |
NOC:Secure Computation: Part I |
Lecture 48 - Yao’s Protocol for Secure 2PC |
Link |
NOC:Secure Computation: Part I |
Lecture 49 - Yao’s Garbling Scheme |
Link |
NOC:Secure Computation: Part I |
Lecture 50 - Yao’s Protocol for Secure 2PC |
Link |
NOC:Secure Computation: Part I |
Lecture 51 - Optimizations for Yao’s Garbling |
Link |
NOC:Secure Computation: Part I |
Lecture 52 - Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based Protocol |
Link |
NOC:Secure Computation: Part I |
Lecture 53 - Mixed Protocols for Secure 2PC |
Link |
NOC:Secure Computation: Part I |
Lecture 54 - The Arithmetic, Boolean and Yao Sharing for Secure 2PC |
Link |
NOC:Secure Computation: Part I |
Lecture 55 - The ABY Conversions |
Link |
NOC:Secure Computation: Part I |
Lecture 56 - The ABY Conversions (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 57 - The ABY Conversions (Continued...) |
Link |
NOC:Secure Computation: Part I |
Lecture 58 - ABY Computations : Example |
Link |
NOC:Secure Computation: Part I |
Lecture 59 - Goodbye and Farewell |
Link |
NOC:Secure Computation - Part II |
Lecture 1 - What is Secure Multi-Party Computation (MPC)? |
Link |
NOC:Secure Computation - Part II |
Lecture 2 - Reliable Broadcast and Byzantine Agreement |
Link |
NOC:Secure Computation - Part II |
Lecture 3 - EIG Protocol for Perfectly-Secure Byzantine Agreement |
Link |
NOC:Secure Computation - Part II |
Lecture 4 - EIG Protocol for Perfectly-Secure Byzantine Agreement: Illustration |
Link |
NOC:Secure Computation - Part II |
Lecture 5 - EIG Protocol for Perfectly-Secure Byzantine Agreement: Analysis - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 6 - EIG Protocol for Perfectly-Secure Byzantine Agreement: Analysis - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 7 - Efficient Protocols for Perfectly-Secure Byzantine Agreement - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 8 - Efficient Protocols for Perfectly-Secure Byzantine Agreement - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 9 - Domain Extension for Perfectly-Secure Byzantine Agreement |
Link |
NOC:Secure Computation - Part II |
Lecture 10 - Cryptographically/Statistically-Secure Reliable Broadcast |
Link |
NOC:Secure Computation - Part II |
Lecture 11 - Dolev-Strong Reliable Broadcast Protocol: Analysis |
Link |
NOC:Secure Computation - Part II |
Lecture 12 - Randomized Protocol for Byzantine Agreement - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 13 - Randomized Protocol for Byzantine Agreement - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 14 - Randomized Protocol for Byzantine Agreement - Part III |
Link |
NOC:Secure Computation - Part II |
Lecture 15 - Lower Bound for Number of Parties for Byzantine Agreement - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 16 - Lower Bound for Number of Parties for Byzantine Agreement - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 17 - Lower Bound for Number of Parties for Byzantine Agreement - Part III |
Link |
NOC:Secure Computation - Part II |
Lecture 18 - Recap of Basic Concepts from Abstract Algebra |
Link |
NOC:Secure Computation - Part II |
Lecture 19 - Reed-Solomon Error-Correcting Codes |
Link |
NOC:Secure Computation - Part II |
Lecture 20 - Perfectly-Secure Message Transmission |
Link |
NOC:Secure Computation - Part II |
Lecture 21 - Properties of Polynomials Over a Field - I |
Link |
NOC:Secure Computation - Part II |
Lecture 22 - Properties of Polynomials Over a Field - II |
Link |
NOC:Secure Computation - Part II |
Lecture 23 - One Round PSMT Protocol |
Link |
NOC:Secure Computation - Part II |
Lecture 24 - Multi-Round PSMT Protocol - I |
Link |
NOC:Secure Computation - Part II |
Lecture 25 - Multi-Round PSMT Protocol - II |
Link |
NOC:Secure Computation - Part II |
Lecture 26 - Domain Extension for Perfectly-Secure Broadcast Based on RS Error-Correcting Codes - I |
Link |
NOC:Secure Computation - Part II |
Lecture 27 - Domain Extension for Perfectly-Secure Broadcast Based on RS Error-Correcting Codes - II |
Link |
NOC:Secure Computation - Part II |
Lecture 28 - Domain Extension for Perfectly-Secure Broadcast Based on RS Error-Correcting Codes - III |
Link |
NOC:Secure Computation - Part II |
Lecture 29 - (n,t) - Star Structure |
Link |
NOC:Secure Computation - Part II |
Lecture 30 - Domain Extension for Perfectly-Secure Broadcast Based on RS Error-Correcting Codes - IV |
Link |
NOC:Secure Computation - Part II |
Lecture 31 - The BGW MPC Protocol for Passive Corruptions: Recap |
Link |
NOC:Secure Computation - Part II |
Lecture 32 - The BGW MPC Protocol for Byzantine Corruptions: Challenges |
Link |
NOC:Secure Computation - Part II |
Lecture 33 - Perfectly-Secure VSS: Necessary Condition |
Link |
NOC:Secure Computation - Part II |
Lecture 34 - Bivariate Polynomials Over Finite Fields - I |
Link |
NOC:Secure Computation - Part II |
Lecture 35 - Bivariate Polynomials Over Finite Fields - II |
Link |
NOC:Secure Computation - Part II |
Lecture 36 - Bivariate Polynomials Over Finite Fields - III |
Link |
NOC:Secure Computation - Part II |
Lecture 37 - Bivariate Polynomials Over Finite Fields - IV |
Link |
NOC:Secure Computation - Part II |
Lecture 38 - Perfectly-Secure VSS with n greater than 3t - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 39 - Perfectly-Secure VSS with n greater than 3t - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 40 - Perfectly-Secure VSS with n greater than 3t - Part III |
Link |
NOC:Secure Computation - Part II |
Lecture 41 - Perfectly-Secure VSS with n greater than 3t - A Round-Reducing Technique |
Link |
NOC:Secure Computation - Part II |
Lecture 42 - Perfectly-Secure VSS with n greater than 4t - Part I |
Link |
NOC:Secure Computation - Part II |
Lecture 43 - Perfectly-Secure VSS with n greater than 4t - Part II |
Link |
NOC:Secure Computation - Part II |
Lecture 44 - The BGW MPC Protocol for Linear Functions |
Link |
NOC:Secure Computation - Part II |
Lecture 45 - The BGW MPC Protocol for Linear Functions: Security Analysis |
Link |
NOC:Secure Computation - Part II |
Lecture 46 - The BGW MPC Protocol: The Case of Non-Linear Gates |
Link |
NOC:Secure Computation - Part II |
Lecture 47 - The Degree-Reduction Problem |
Link |
NOC:Secure Computation - Part II |
Lecture 48 - Generating Random Multiplication-Triples - I |
Link |
NOC:Secure Computation - Part II |
Lecture 49 - Generating Random Multiplication-Triples - II |
Link |
NOC:Secure Computation - Part II |
Lecture 50 - Generating Random Multiplication-Triples - III |
Link |
NOC:Secure Computation - Part II |
Lecture 51 - Perfectly-Secure Protocol for Verifying Multiplicative Relationship |
Link |
NOC:Secure Computation - Part II |
Lecture 52 - Perfectly-Secure Verifiable Triple-Sharing Protocol |
Link |
NOC:Secure Computation - Part II |
Lecture 53 - Perfectly-Secure Triple-Extraction Protocol |
Link |
NOC:Secure Computation - Part II |
Lecture 54 - Towards Secure MPC with an Honest Majority |
Link |
NOC:Secure Computation - Part II |
Lecture 55 - ICP from Information-Theoretic MAC - I |
Link |
NOC:Secure Computation - Part II |
Lecture 56 - ICP from Information-Theoretic MAC - II |
Link |
NOC:Secure Computation - Part II |
Lecture 57 - Ingredients for Statistically-Secure MPC |
Link |
NOC:Secure Computation - Part II |
Lecture 58 - Statistically-Secure VSS |
Link |
NOC:Secure Computation - Part II |
Lecture 59 - Cyclic Groups and Discrete Logarithm |
Link |
NOC:Secure Computation - Part II |
Lecture 60 - Pedersen Commitment Scheme |
Link |
NOC:Secure Computation - Part II |
Lecture 61 - Cryptographically-secure VSS and MPC |
Link |
NOC:Secure Computation - Part II |
Lecture 62 - Goodbye and Farewell |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 1 - Introduction and Principles of Algorithms - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 2 - Principles of Algorithms - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 3 - Shortest Path Algorithms |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 4 - Undirected Graph |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 5 - Algorithms for finding Shortest Path - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 6 - Algorithms for finding Shortest Path - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 7 - Single source shortest path problem |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 8 - Properties of shortest path distances - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 9 - Properties of shortest path distances - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 10 - Belman Equation - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 11 - Belman Equation - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 12 - Belman Equation - Part 3 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 13 - Belman Equation - Part 4 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 14 - Bellman Ford - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 15 - Bellman Ford - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 16 - Dijkstra Algorithm - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 17 - Dijkstra Algorithm - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 18 - Dijkstra Algorithm - Part 3 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 19 - All Pair Shortest - Path 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 20 - All Pair Shortest - Path 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 21 - All Pair Shortest - Path 3 and 4 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 22 - All Pair Shortest - Path 5 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 23 - Prims Algorithm - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 24 - Prims Algorithm - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 25 - Kruskal's Algorithm - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 26 - Kruskal's Algorithm - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 27 - Kruskal's Algorithm - Part 3 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 28 - DFS |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 29 - DFS |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 30 - Algorithm for Cut Vertex |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 31 - Iterative DFS |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 32 - DFS in Directed Graph |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 33 - Strong Connected Components - Part 1 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 34 - Strong Connected Components - Part 2 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 35 - Strong Connected Components - Part 3 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 36 - Strong Connected Components - Part 4 |
Link |
NOC:Introduction to Graph Algorithms |
Lecture 37 - BFS |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 1 - Introduction to Linear Algebra and Matrices |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 2 - Geometry of System of linear equations - Straight lines andplanes, Matrix Definitions |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 3 - Some Interpretations to solutions of system of linear equations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 4 - Matrix Operations, Homogeneous system of equations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 5 - Matrix Operations, Homogeneous system of equations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 6 - Elementary Row Operations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 7 - Elementary Row operations - How do they work? |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 8 - Determinant and Inverse of a matrix |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 9 - Interpreting the inverse of a matrix |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 10 - Cramer's rule |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 11 - Points and Vectors in 2D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 12 - Vector Length and properties |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 13 - Combining Vectors |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 14 - Linearly Independent and Dependent vectors, Dot Product of vectors |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 15 - Angle between two vectors, Orthogonal projections |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 16 - Lines and Parametric Equations of lines, Linear Maps |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 17 - Rotation, Shear and Projection transformations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 18 - Determinant of 2x2 matrix as Area of Parallelogram,Determinant of linear transformations |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 19 - System of 2 linear equations in 2 unknowns from vector perspective |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 20 - Eigenvalues and eigenvectors |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 21 - Vectors in 3D, Linear combination of vectors in 3D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 22 - Projectionvector on another vector, line passing through origin, plane passing through origin |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 23 - Area of a parallelogram in 3D, Cross product |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 24 - Interpreting the cross-product, Properties of cross-product |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 25 - Volume of a parallelepiped, Lines in 3D, Intersection of line and plane |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 26 - Linear Maps in 3D - Scaling and Reflection |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 27 - Linear Maps in 3D - Reflection about a plane, Shear |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 28 - Rotation in 3D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 29 - Determinant and its properties |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 30 - eigenvalues and eigenvectors in 3D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 31 - Linear systems in 3D and geometric perspective |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 32 - Homogeneous system in 3D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 33 - LU Decomposition |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 34 - Least Squares Solution, Gram-Schmidt Orthogonalization, QRDecomposition |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 35 - Orthogonal Matrix, Linear Independence, eigenvalues and eigenvectors in 3D |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 36 - Vector Space and Properties |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 37 - Examples of vector spaces - Polynomial space, planes and lines through origin |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 38 - Vector Subspaces and their geometry |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 39 - Combining vectors in a vector space, Linear Independence |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 40 - Span, Basis, Dimension of a vector space, Fourier Expansion |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 41 - Homogeneous system of linear equations and null space of a matrix |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 42 - Column Space of A |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 43 - Subspaces associated matrix A transpose, Nullity, Rank |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 44 - Orthogonal Complement of a subspace |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 45 - Orientation of the four fundamental subspaces of a matrix A |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 46 - System of linear equations with no solution - Inconsistent systems |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 47 - Least squares solution, Pseudoinverse of A |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 48 - Projection and Projection Matrices |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 49 - Pseudoinverse of special matrices |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 50 - Eigendecomposition |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 51 - Eigensubspace and dimension |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 52 - Real Symmetric matrix and properties |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 53 - Eigenvalues and eigenvectors of real symmetric matrices |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 54 - Effect of a real symmetric matrix - Geometric Interpretation |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 55 - Spectral Theorem, Quadratic Forms |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 56 - Singular Value Decomposition |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 57 - Relationship between SVD and Eigen Decomposition |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 58 - An Interpretation of SVD |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 59 - Fourier Series and Transform through Linear Algebra |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 60 - Practical Applications of Linear Algebra - 1 |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 61 - Practical Applications of Linear Algebra - 2 |
Link |
NOC:Linear Algebra Through Geometry |
Lecture 62 - Summary and Credits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 1 - Introduction to Online Learning - I |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 2 - Introduction to Online Learning - II |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 3 - Basics of Statistical Learning |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 4 - Empirical risk minimization |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 5 - Consistency Halving algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 6 - Online Learnability |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 7 - Standard Optimal Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 8 - Classification in unrealizability case |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 9 - Covers Impossibility Result |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 10 - Weighted Majority |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 11 - Proof Weighted Majority |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 12 - Full Information vs Bandit Setting |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 13 - Adversarial Bandit Setting |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 14 - Exponential Weights for Exploration and Exploitation Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 15 - Regret Bound of Exp3 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 16 - Regret Bound of Exp3 (Continued...) |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 17 - Exp3.P and Exp3.IX |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 18 - Online Convex Optimisation |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 19 - Follow the Leader (FTL) Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 20 - Follow the Regularized Leader |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 21 - Online Gradient Descent |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 22 - Strongly Convex Function |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 23 - FoReL with Strongly Convex Regulariser |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 24 - FoReL with Strongly Convex Regulariser (Continued...) |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 25 - Euclidean and Entropy Regularizer |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 26 - Introduction to Stochastic Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 27 - Concentration Inequalities |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 28 - Subgaussian Random Variable |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 29 - Regret Definition and Regret Decomposition |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 30 - Explore and Commit (ETC) Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 31 - Regret Analysis and ETC |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 32 - Optimism in the Face of Uncertainty |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 33 - Upper Confidence Bound Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 34 - Regret Analysis of UCB |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 35 - Problem Dependent and Independent Bounds of UCB |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 36 - KL-UCB Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 37 - Thompson Sampling - Brief Discussion |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 38 - Proof Idea of Lower Bounds - 1 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 39 - Proof Idea of Lower Bounds - 2 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 40 - Proof of Lower Bound - 1 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 41 - Proof of Lower Bound - 2 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 42 - Stochastic Contextual Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 43 - Introduction to Stochastic Linear Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 44 - Stochastic Linear Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 45 - Regret Analysis of SLB - I |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 46 - Regret Analysis of SLB - II |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 47 - Regret Analysis of SLB - III |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 48 - Construction of Confidence Ellipsoids - I |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 49 - Construction of Confidence Ellipsoids - II |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 50 - Adversarial Contextual Bandits - I |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 51 - Adversarial Contextual Bandits - II |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 52 - Exp4 Algorithm |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 53 - Regret of Exp4 |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 54 - Adversarial Linear Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 55 - Exp3 for Adversarial Linear Bandits |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 56 - Introduction to Pure Exploration and its lower bounds |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 57 - Uniform Exploration |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 58 - KL-LUCB |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 59 - Lil’ UCB |
Link |
NOC:Bandit Algorithm (Online Machine Learning) |
Lecture 60 - Lower Bound for Pure Exploration Problem |