Channel Avatar

Learning Express @UCZOTGJtH6s3Prye36cDxefQ@youtube.com

3.2K subscribers - no pronouns :c

Welcome to my channel. In this channel you will be introduce


36:32
Lecture 48: MIMO System Model SVD Water-filling Algorithm
36:43
Lecture 47 MIMO System Model SVD Numerical
45:03
Lecture 46 MIMO System Model MMSE SVD
29:35
Lecture 45 : MIMO System Model Zero Forcing
41:43
Lecture 44 : Diversity Numerical
46:01
Lecture 43: Diversity in Wireless communication _Equal gain Combiner.
47:11
Lecture 42 Diversity techniques in Wireless communication using Maximal Ratio Combiner.
40:09
Lecture 41 BER calculation in Wired and Wireless Communication
29:31
Lecture 40Matlab based verification and implementation of Erlang B and Erlang C
37:15
Lecture 10 | Edge detection few important example
36:22
Lecture 35 #Networkthreats and Solutions
45:39
Lecture : 34 #digitalsignatures #kerberos
45:37
Lecture : 33 # Mutual Trust and Digital Signature. ElGamal Digital Signature Method
43:38
Lecture : 32 # Whirpool Cryptographic Hash Function
45:32
Lecture : 31 # SHA-512 cryptographic hash function
53:13
Lecture : 30 Application of Cryptographic Hash Function. Iterative Hash Function: MD4
44:36
Lecture : 29 #keyexchange Elliptic Curve Cryptography. Introduction to Cryptographic Hash Function
14:16
Lecture : 28 Elgamel Key exchange strategy.
46:39
Lecture : 27 - Diffie Hellman Key Exchange
39:24
Lecture : 26 #cryptography #RSA
44:37
Lecture #25 Mixing Sub transformation in AES. Introduction to Stream Cipher
49:15
Lecture 24: #AESalgorithm Transformation and key Expansion technique
41:26
Lecture 23: Advanced Encryption Standard (AES)
43:35
Lecture 22 #numericals on DES
29:00
Lecture 21 : #DESkeygeneration #ExpansionBox
47:00
Lect 20 #productcipher #Fiestalcipher #cryptography
46:32
Lect: 19 : Components of DES #Circularshift #Swapfunction
41:14
Lect18 - Modern block Ciphers. #P-Box # S-Box
34:30
Lecture: 17 #symetric Cipher
39:57
Lect16: #EllipticCurve Arithmetic
44:15
Lecture 15: #Discrete_Logarithm#cryptography
36:35
Lect 14: Chinese Remainder Theorem
45:02
Lecture : 13 #eulertheorem
46:45
Lecture : 7 #HillCipher
41:31
Lecture : 12: Mathematical Foundation for Cryptography #primenumber #Fermat's Theorem
51:18
Lecture 9: Mathematical Concepts related to Cryptography
43:26
Lect 11: Mathematical Foundation for Cryptography
36:01
Lecture 8 : Mathematical Foundations for Cryptography
36:06
Lecture 6
42:46
Lecture 5
36:33
Lecture 4
49:06
Lecture 3
47:32
Lecture 2: Cryptography_ Security Mechanism
44:41
Lect-1: Introduction to cryptography
01:30
EaseCART prototype
47:09
lecture 11: Basic Electronics: BJT Amplifier Design
35:02
Lecture 10: Basic Electronics : BJT 4
47:32
Lecture 9: Basic Electronics : BJT -3
31:36
Lecture 8: Basic Electronics : BJT 2
49:25
Lecture 6A : Basic Electronics: Diode 4 : Zener Diode and Voltage Regulator
47:16
Lecture 7-Basic Electronics - BJT - 1
46:31
Lecture 6 - Basic Electronics - Diodes 3
46:41
Lecture 5 ‐ Basic Electronics - Diode-2
47:14
Lecture 4: Basic Electronics :Junction Diode : Part 1
58:04
Lecture 3 : Basic Electronics Circuit Analysis
52:48
Lecture 2: Basic Electronics
59:40
Lecture 1: Basic Electronics
54:58
Lecture 3: Robotics and Automation # Degree of Freedom and Kutzback Criterion
44:50
Principles of Communication Engineering -20
48:18
Principles of Communication Engineering part - 22