Curriculum
- 31 Sections
- 172 Lessons
- 24 Weeks
Expand all sectionsCollapse all sections
- About the course/*! CSS Used from: Embedded */ *, ::after, ::before { box-sizing: border-box; border-width: 0; border-style: solid; border-color: #e5e7eb; } ::after, ::before { --tw-content: ''; } h2 { font-size: inherit; font-weight: inherit; } a { color: inherit; text-decoration: inherit; } h2, p { margin: 0; } :disabled { cursor: default; } *, ::before, ::after { --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 / 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; } .mx-auto { margin-left: auto; margin-right: auto; } .mb-2 { margin-bottom: 0.5rem; } .mb-4 { margin-bottom: 1rem; } .mb-6 { margin-bottom: 1.5rem; } .mr-2 { margin-right: 0.5rem; } .max-w-screen-sm { max-width: 640px; } .max-w-screen-xl { max-width: 1280px; } .rounded-lg { border-radius: 0.5rem; } .bg-primary-700 { --tw-bg-opacity: 1; background-color: rgb(29 78 216 / var(--tw-bg-opacity)); } .bg-white { --tw-bg-opacity: 1; background-color: rgb(255 255 255 / var(--tw-bg-opacity)); } .px-4 { padding-left: 1rem; padding-right: 1rem; } .px-5 { padding-left: 1.25rem; padding-right: 1.25rem; } .py-2.5 { padding-top: 0.625rem; padding-bottom: 0.625rem; } .py-8 { padding-top: 2rem; padding-bottom: 2rem; } .text-center { text-align: center; } .text-4xl { font-size: 3rem; line-height: 2.5rem; } .text-sm { font-size: 0.875rem; line-height: 1.25rem; } .font-extrabold { font-weight: 800; } .font-light { font-weight: 300; } .font-medium { font-weight: 500; } .leading-tight { line-height: 1.25; } .tracking-tight { letter-spacing: -0.025em; } .text-gray-500 { --tw-text-opacity: 1; color: rgb(107 114 128 / var(--tw-text-opacity)); } .text-gray-900 { --tw-text-opacity: 1; color: rgb(17 24 39 / var(--tw-text-opacity)); } .text-white { --tw-text-opacity: 1; color: rgb(255 255 255 / var(--tw-text-opacity)); } .hover:bg-primary-800:hover { --tw-bg-opacity: 1; background-color: rgb(30 64 175 / var(--tw-bg-opacity)); } .focus:outline-none:focus { outline: 2px solid transparent; outline-offset: 2px; } .focus:ring-4:focus { --tw-ring-offset-shadow: var(--tw-ring-inset) 0 0 0 var(--tw-ring-offset-width) var(--tw-ring-offset-color); --tw-ring-shadow: var(--tw-ring-inset) 0 0 0 calc(4px + var(--tw-ring-offset-width)) var(--tw-ring-color); box-shadow: var(--tw-ring-offset-shadow), var(--tw-ring-shadow), var(--tw-shadow, 0 0 #0000); } .focus:ring-primary-300:focus { --tw-ring-opacity: 1; --tw-ring-color: rgb(147 197 253 / var(--tw-ring-opacity)); } @media (min-width: 640px) { .sm:py-16 { padding-top: 4rem; padding-bottom: 4rem; } } @media (min-width: 768px) { .md:text-lg { font-size: 1.5rem; line-height: 1.75rem; } } @media (min-width: 1024px) { .lg:px-6 { padding-left: 1.5rem; padding-right: 1.5rem; } } .imgdata { width: 35% } @media (max-width: 767px) { .imgdata { width: 40% } } .course-payment { display: none !important; } .thim-course-landing-button { display: none !important; }0
- Artificial Intelligence [Module 2]:- Intelligent Agent3
- Artificial Intelligence [Module 3]:- Problem solving11
- 3.1BFS Algorithm with solved Example6 Minutes
- 3.2DFS ( Depth First Search ) Algorithm with solved Example3 Minutes
- 3.3IDFS ( Iterative Depth First Search ) Algorithm with solved Example3 Minutes
- 3.4GBFS Solved Example8 Minutes
- 3.5A star Solved Example14 Minutes
- 3.6Hill Climbing Part #14 Minutes
- 3.7Hill Climbing Part #26 Minutes
- 3.8Genetic Algorithm6 Minutes
- 3.9Genetic Algorithm Max one Problem Solved Example9 Minutes
- 3.10Min Max Solved Example7 Minutes
- 3.11Alpha-Beta Pruning Solved Example14 Minutes
- Artificial Intelligence [Module 4]:-Knowledge and Reasoning7
- 4.1Propositional Logic (PL) Introduction8 Minutes
- 4.2PL to CNF Conversion With Solved Example10 Minutes
- 4.3First-Order Logic (FOL) Solved Example6 Minutes
- 4.4Resolution Tree Sum Part #19 Minutes
- 4.5Resolution Tree Sum Part #215 Minutes
- 4.6Bayesian Belief Network16 Minutes
- 4.7Bayesian Network toothache and Cavity sum12 Minutes
- Artificial Intelligence [Module 5]:- Planning and Learning2
- Artificial Intelligence [Module 6]:- AI Applications4
- Artificial Intelligence [ Importance And Solutions ]7
- Artificial Intelligence [Extra]:-3
- Mobile Computing [Module 1]:- Introduction to Mobile Computing3
- Mobile Computing [Module 2]:- GSM Mobile services4
- Mobile Computing [Module 3]:- Mobile Networking5
- Mobile Computing [Module 4]:- Wireless Local Area Networks6
- Mobile Computing [Module 5]:- Mobility Management4
- Mobile Computing [Module 6]:- Long-Term Evolution (LTE) of 3GPP5
- Mobile Computing [ Importance And Solutions ]8
- Cryptography & System Security [ Module 1]:- Introduction - Number Theory and Basic7
- Cryptography & System Security [ Module 2]:- Symmetric and Asymmetric key Cryptograp10
- 17.1Block Cipher and Modes of Block Cipher Part 120 Minutes
- 17.2Stream and Block Cipher4 Minutes
- 17.3DES Algorithm Full Working12 Minutes
- 17.4DES key Generation Explain Step by Step11 Minutes
- 17.5AES Algorithm Full working26 Minutes
- 17.6Modes of Operation8 Minutes
- 17.7Public Key cryptogrpahy3 Minutes
- 17.8RSA Algorithm with Solved Example14 Minutes
- 17.9Diffie Hellman7 Minutes
- 17.10How to find modulus of Exponential Number (high power value )12 Minutes
- Cryptography & System Security [ Module 3]:- Cryptographic Hash Functions4
- Cryptography & System Security [ Module 4]:- Authentication Protocols & Digital Sign2
- Cryptography & System Security [ Module 5]:- Network Security and Applications6
- Cryptography & System Security [ Module 6]:- System Security4
- Cryptography & System Security [ Importance And Solutions ]9
- Cryptography & System Security [ Notes ]9
- 23.1Module 1 – Basics of Cryptography
- 23.2Module 1 – Monoalphabetic and polyalphabetic Cipher
- 23.3Module 2 – Block Cipher and Stream Cipher
- 23.4Module 2 – Modes of Operations
- 23.5Module 2 – DES Algorithm
- 23.6Module 2 – Public Key Cryptography , RSA and Deffie Helman
- 23.7Module 3 – Cryptographic Hash Function
- 23.8Module 5 – Network Security and Applications Part 1
- 23.9Module 5 – Network Security and Applications Part 2
- System Programming and Compiler Construction [Module 1]:- Introduction to System Software1
- System Programming and Compiler Construction [Module 2]:- Assembler4
- System Programming and Compiler Construction [Module 3]:-Macros and Macro Processor3
- System Programming and Compiler Construction [Module 4]:- Loaders and Linkers5
- System Programming and Compiler Construction [Module 5]:- Compilers: Analysis Phase14
- 28.1Phases of compiler9 Minutes
- 28.2Eliminate left recursion and left factoring7 Minutes
- 28.3How to Find First and Follow Basics (part 1)9 Minutes
- 28.4First and Follow solved example (part 2)17 Minutes
- 28.5First and Follow solved example (Part 3)5 Minutes
- 28.6Predictive Parser (Part 1)16 Minutes
- 28.7Predictive Parser (Part 2)11 Minutes
- 28.8Recursive Descent parser with solved example7 Minutes
- 28.9Operator Precedence Parser with Solved Example(part 1)21 Minutes
- 28.10Operator Precedence Parser with Solved Example (part 2)12 Minutes
- 28.11LR Parsing | LR (0) item | LR (0) Parsing table solved Example31 Minutes
- 28.12SLR (1) parsing with solved example| SLR (1) parsing table |12 Minutes
- 28.13Examples of LR(0) or SLR(1)16 Minutes
- 28.14CLR1 and LALR1 with Solved Example28 Minutes
- System Programming and Compiler Construction [Module 6]:- Compilers: Synthesis phase5
- System Programming and Compiler Construction [ Notes ]10
- 30.1Module 01 – System Software
- 30.2Module 02 – Assembler
- 30.3Module 03 – Macros and Macroprocessors
- 30.4Module 04 – Loaders and Linkers
- 30.5Module 5 – Part 1 – Compilers
- 30.6Module 5 – Part 2 – Lexical Analysis
- 30.7Module 5 – Part 3 – Syntax Analysis
- 30.8Module 6 – Part 1 – Intermediate Code Generation
- 30.9Module 6 – Part 2 – Code Generation
- 30.10Module 6 – Part 3 – Code Optimization
- System Programming and Compiler Construction [ Importance And Solutions ]7
SPCC IMP Solution Module 5
Prev