- 274
- 586 912
Renisha's CS Eduworld
India
เข้าร่วมเมื่อ 17 พ.ค. 2020
วีดีโอ
Equivalence of Regular Expression and Finite Automata
มุมมอง 3502 ปีที่แล้ว
Equivalence of Regular Expression and Finite Automata
NFA(Non-deterministic Finite Automata)
มุมมอง 3062 ปีที่แล้ว
NFA definition example difference between nfa and dfa
Machine Independent Assembler Features/System Software
มุมมอง 1.6K2 ปีที่แล้ว
Machine Independent Assembler Features
DATA ENCRYPTION STANDARD /CS 409 Cryptography and Network Security - Part 12
มุมมอง 2893 ปีที่แล้ว
DATA ENCRYPTION STANDARD (DES)
Feistel Cipher Structure / CS 409Cryptography and Network Security - Part 11
มุมมอง 7503 ปีที่แล้ว
Feistel Cipher Structure
Difference between Confusion and Diffusion /CS 409 Cryptography and Network Security - Part 9
มุมมอง 8473 ปีที่แล้ว
Difference between Confusion and Diffusion
Difference between Block cipher and Stream cipher /CS 409 Cryptography and Network Security -Part 8
มุมมอง 1K3 ปีที่แล้ว
Difference between Block cipher and Stream cipher /CS 409 Cryptography and Network Security -Part 8
Steganography /CS 409 Cryptography and Network Security - Part 7
มุมมอง 6273 ปีที่แล้ว
Steganography /CS 409 Cryptography and Network Security - Part 7
Rotor Machine /CS 409 Cryptography and Network Security - Part 6
มุมมอง 5K3 ปีที่แล้ว
Rotor Machine /CS 409 Cryptography and Network Security - Part 6
Transposition Techniques /CS 409 Cryptography and Network Security - Part 5
มุมมอง 2183 ปีที่แล้ว
Transposition Techniques /CS 409 Cryptography and Network Security - Part 5
CLASSICAL ENCRYPTION TECHNIQUES -CS 409 Cryptography and Network Security - Part 4
มุมมอง 4373 ปีที่แล้ว
CLASSICAL ENCRYPTION TECHNIQUES -CS 409 Cryptography and Network Security - Part 4
Symmetric Encryption / CS 409 Cryptography and Network Security - Part 3
มุมมอง 2463 ปีที่แล้ว
Symmetric Encryption / CS 409 Cryptography and Network Security - Part 3
Security Services, Security Mechanisms and Security Attacks /CS 409 CNS- Part 2
มุมมอง 4233 ปีที่แล้ว
Security Services, Security Mechanisms and Security Attacks /CS 409 CNS- Part 2
Introduction to Cryptography /CS 409 Cryptography & Network Security -Part 1
มุมมอง 1.5K3 ปีที่แล้ว
Introduction to Cryptography /CS 409 Cryptography & Network Security -Part 1
Structures in C / EST 102 Programming in C - Part 78
มุมมอง 2313 ปีที่แล้ว
Structures in C / EST 102 Programming in C - Part 78
C Program to find nCr using function /EST 102 Programming in C - Part 77
มุมมอง 1K3 ปีที่แล้ว
C Program to find nCr using function /EST 102 Programming in C - Part 77
Fibonacci Number using Recursion/EST 102 Programming in C- Part 76
มุมมอง 1793 ปีที่แล้ว
Fibonacci Number using Recursion/EST 102 Programming in C- Part 76
Factorial using recursion /EST 102 Programming in C - Part 75
มุมมอง 1983 ปีที่แล้ว
Factorial using recursion /EST 102 Programming in C - Part 75
Recursion in C/EST 102 Programming in C - Part 74
มุมมอง 1723 ปีที่แล้ว
Recursion in C/EST 102 Programming in C - Part 74
C program to compute basic arithmetic operations using functions / EST 102 Programming in C -Part 73
มุมมอง 1643 ปีที่แล้ว
C program to compute basic arithmetic operations using functions / EST 102 Programming in C -Part 73
Type of functions in C / EST 102 Programming in C - Part 72
มุมมอง 1673 ปีที่แล้ว
Type of functions in C / EST 102 Programming in C - Part 72
Functions in C /EST 102 Programming in C - Part 71
มุมมอง 2493 ปีที่แล้ว
Functions in C /EST 102 Programming in C - Part 71
same arh thanne ezhuthiyal mathtiyo miss
@@accountlap mathi
@@renishascseduworld4920 ok thankyou teacher
🤝
❤😊
❤
Best class in yt in malayalam
Ee algorithm il , L il ninn new arrayil add chythathin shesham, Lil increment cheyyynath parayunillaaalooo
Nale alle exam 😂 enikkum und
Misse ds elam cover cythitundo 67 vedioyil
Program length evidenna kittiye
Type of device driver syllabusil illallo
Ma'am aa HALFSZ enganeya 800 kittiye? 1000/2=500 alle vende?
(1000) is a hexadecimal number, of base 16
@renishascseduworld4920 haa base 16 number aan but still halfsz enganeya 800 kittiyath
@hassanps212 (1000) base 16=4096 base 10 4096/2=2048 2048 convert to hexadecimal= 800 base 16
@@renishascseduworld4920 thank you❤
Can u share ppt
Great class ❤
Mam output numbers fixed ah
Simple simpler simplest❤
Ith aano algorithm misse
Yes
God bless you mam ❤
2019 scheme data structure lab , algorithm video cheyoo
Good class. Do more videos 2019 scheme
Nice dreSS
miss, start pointer alle? ath declare cheyande
Miss very nice class❤.
❤❤❤.miss nice class. Double ended queue indo miss???
Channelil upload chethitila
Thankyou ma'am ❤❤❤
Thank u❤
Thank you mam❤
❤
Sir printf il fib3 alle varuka?
Alla fib1
Plzz replay
Hi
Mam digital signature ith cyber security algorithm anno atho cryptography algorithm anno?
@@Mimmuuu6230 A digital signature is a cryptographic output used to verify the authenticity of data
Thanks Ma’am 🙌🏻
@@MoeUvaiz 🙂
Alhamdulilaah last kitti
4:22 bfs inte example ayii eth mathram ezhuthiya mathiyoo misse... Ee example explain cheyandallo.... Bfs athyam explain cheyanam.. Pinne oru example ezhuthanam.. Pinne algorithm kudii ezhuthiya mathiyallo misse
Misse explain bfs algorithm with example enn choichal enthokke ezhuthanam
Refer this www.google.com/amp/s/www.geeksforgeeks.org/breadth-first-search-or-bfs-for-a-graph/amp/
Misse BFS and DFS inte note ondoo
Refer this www.google.com/amp/s/www.geeksforgeeks.org/breadth-first-search-or-bfs-for-a-graph/amp/
Misse explain tree vs graph with application enn question choichal enthokke ah ezhuthendath
1It is a non-linear data structure.It is also a non-linear data structure.2A graph is a set of vertices/nodes and edges.A tree is a set of nodes and edges.3In the graph, there is no unique node which is known as root.In a tree, there is a unique node which is known as root.4Each node can have several edges.Usually, a tree can have several child nodes, and in the case of binary trees, each node consists of two child nodes.5Graphs can form cycles.Trees cannot form a cycle.
@@renishascseduworld4920 thank u miss
How graphs can be represented in computer enn choichal miss board ill ezhuthiya notes ezhuthiya pore
Using adjacency marix and list
@@renishascseduworld4920 miss inte board ille notes ezhuthiya pore
@@grutegaming3703 mathi
Misse BFS inte example engana ahh ezhuthendath
Already ithil figure use cheythu explain cheythitindu
@@renishascseduworld4920 v1 v2 v8 v3 v4 v5 v6 v7 alle misse example ayii ezhuthendath.... Ethil queue kudii apply cheyth ezhuthanno
@@grutegaming3703 queue apply cheythu ezhuthanam
Miss inte board ill ezhuthiya notes padichal mark kitto
Mathi
@@renishascseduworld4920 ok miss
Misse non recursive inte algorithm choichal enthanu ezhuthendath…post order inte anno inorder inte anno Atho preorder inte anno ezhuthendath
Ethano chothikunne athu mathram ezhuthiyal mathi
Ok miss.....
Thank you mam
Ithinte group undoo .. ?
Which group?
Variable 4 aakumbo enganeyaan if kodukkendath Please reply...?
I don't understand the question. 4 number undenkil largest engane kandu pidikum ennano. Four numbers te largest kandupidikan array use cheyanam.
@@renishascseduworld4920 okey thanks ❤️
Good presentation❤
thank you miss🥰🥰
🙂
Very useful maam
🙂
Mam oru algorithm question chodicha mam ezithiyathu pole ezuthiya mark kitto?
Ee algorithm full mark kittoo
Kittum
Miss,algorithm ith pole sentence ayitt eztiyaal full mark tharuvo
Tharum
Miss nthina reverse cheyyunne
Prefix conversation rule aannu
@@renishascseduworld4920 miss infux to postfix aakumbool cheyyandalloo
Nice class mam... You are taking a great effort❤
Thank you❤