Global Sources
EE Times-India
Stay in touch with EE Times India
 
 
Editor's Choice
 
eeUniversity Displaying1 - 4 of 174

Lecture 24
Networked Embedded System (Part 1)

Lecture 25
Networked Embedded System (Part 2)

Lecture 26
Networked Embedded System (Part 3)

Lecture 27
Networked Embedded System (Part 4)

Lecture 37
The Fieldbus Network (Part 1)

Lecture 38
The Fieldbus Network (Part 2)

Lecture 1
Introduction to Intelligent Systems and Control

Module 1 - Lecture 1
Linear Neural Networks

Module 1 - Lecture 2
Multi-layered Neural Networks

Module 1 - Lecture 9
Recurrent Networks Back Propagation Through Time

Module 1 - Lecture 11
Self-Organizing Map - Multidimensional Networks

Module 2 - Lecture 1
Fuzzy sets - A Primer

Module 2 - Lecture 2
Fuzzy Relations

Module 2 - Lecture 3
Fuzzy Rule-base and Approximate Reasoning

Module 3 - Lecture 1
Neural Control: A Review

Module 3 - Lecture 2
Network Inversion and Control

Module 3 - Lecture 3
Neural Model of a Robot Manipulator

Lecture 1
Introduction and Course Outline

Lecture 2
Layered Architecture

Lecture 3
Data and Signal

Lecture 4
Transmission Impairments and Channel Capacity

Lecture 5
Guided Transmission Media

Lecture 6
Unguided Media

Lecture 12
Multiplexing Applications (Part 1)

Lecture 13
Multiplexing Applications (Part 2)

Lecture 14
Interfacing to the Media

Lecture 15
Error Detection and Correction

Lecture 19
Switching Techniques Packet Switching

Lecture 20
Routing (Part 1)

Lecture 21
Routing (Part 2)

Lecture 22
Congestion Control

Lecture 23
X.25 and Frame Relay

Lecture 24
ATM

Lecture 25
Medium Access Control (Part 1)

Lecture 26
Medium Access Control (Part 2)

Lecture 27
Medium Access Control (Part 3)

Lecture 28
IEEE 802 LANs

Lecture 29
High Speed LANs

Lecture 30
Wireless LANs

Lecture 31
Cellular Telephone Systems

Lecture 32
Satellite Communications

Lecture 33
Internet and Internetworking

Lecture 34
TCP/IP (Part 1)

Lecture 35
TCP/IP (Part 2)

Lecture 36
Multimedia Networks

Lecture 37
Audio and Video Compression

Lecture 38
Multimedia Services

Lecture 39
Secured Communication (Part 1)

Lecture 40
Secured Communication (Part 2)

Lecture 1
Introduction to Internet

Lecture 2
Review Of Network Technologies

Lecture 3
TCP/IP (Part 1)

Lecture 4
TCP/IP (Part 2)

Lecture 5
TCP/IP (Part 3)

Lecture 6
IP Subnetting and Addressing

Lecture 7
Internet Routing Protocol (Part 1)

Lecture 8
Internet Routing Protocol (Part 2)

Lecture 9
Client Server Concepts DNS, Telnet, FTP

Lecture 10
Electronic Mail

Lecture 11
World Wide Web (Part 1)

Lecture 12
World Wide Web (Part 2)

Lecture 13
HTML (Part 1)

Lecture 14
HTML (Part 2)

Lecture 15
HTML (Part 3)

Lecture 16
Extensible Markup Language (XML)

Lecture 17
HTML Forms

Lecture 18
Image Maps

Lecture 19
CGI Scripts

Lecture 20
Other Technologies

Lecture 21
PERL (Part 1)

Lecture 22
PERL (Part 2)

Lecture 23
PERL (Part 3)

Lecture 24
PERL (Part 4)

Lecture 25
Javascript (Part 1)

Lecture 26
Javascript (Part 2)

Lecture 27
Using Cookies

Lecture 28
Java Applets (Part 1)

Lecture 29
Java Applets (Part 2)

Lecture 30
Client-Server Programming in Java

Lecture 31
Intranet, Extranet, Firewall

Lecture 32
Basic Cryptographic Concepts (Part 1)

Lecture 33
Basic Cryptographic Concepts (Part 2)

Lecture 34
Basic Cryptographic Concepts (Part 3)

Lecture 35
Electronic Commerce

Lecture 36
Streaming Multimedia Applications

Lecture 37
Internet Telephony

Lecture 38
Search Engine and Web Crawlers (Part 1)

Lecture 39
Search Engine and Web Crawlers (Part 2)

Lecture 40
Course Summary and Conclusion

Lecture 1
Introduction

Lecture 2
Overview on Modern Cryptography

Lecture 3
Introduction to Number Theory

Lecture 4
Probability and Information Theory

Lecture 5
Classical Cryptosystems

Lecture 6
Cryptanalysis of Classical Ciphers

Lecture 7
Shannons Theory (Part 1)

Lecture 8
Shannons Theory (Part 2)

Lecture 9
Symmetric Key Ciphers

Lecture 10
Block Cipher Standards (DES)

Lecture 11
Block Cipher Standards (AES) (Part 1)

Lecture 12
Block Cipher Standards (AES) (Part 2)

Lecture 13
Linear Cryptanalysis

Lecture 14
Differential Cryptanalysis

Lecture 15
Few other Cryptanalytic Techniques

Lecture 16
Overview on S-Box Design Principles

Lecture 17
Modes of Operation of Block Ciphers

Lecture 18
Stream Ciphers (Part 1)

Lecture 19
Stream Ciphers (Part 2)

Lecture 20
Stream Ciphers (Part 3)

Lecture 21
Pseudorandomness

Lecture 22
Cryptographic Hash Functions (Part 1)

Lecture 23
Cryptographic Hash Functions (Part 2)

Lecture 24
Cryptographic Hash Functions (Part 3)

Lecture 25
Message Authentication Codes

Lecture 26
More Number Theoretic Results

Lecture 27
The RSA Cryptosystem

Lecture 28
Primality Testing

Lecture 29
Factoring Algorithms

Lecture 30
Some Comments on the Security of RSA

Lecture 31
Discrete Logarithm Problem (DLP)

Lecture 32
The Diffie-Hellman Problem and Security of ElGamal Systems

Lecture 33
An Introduction to Elliptic Curve

Lecture 34
Application of Elliptic Curves to Cryptography

Lecture 35
Implementation of Elliptic Curve Cryptography

Lecture 36
Secret Sharing Schemes

Lecture 37
A Tutorial on Network Protocols

Lecture 38
System Security

Lecture 39
Firewalls and Intrusion Detection Systems

Lecture 40
Side Channel Analysis of Cryptographic Implementations

Lecture 1
Motivation and Introduction

Lecture 2
Types of Wireless Communication

Lecture 3
The Modern Wireless Communication Systems

Lecture 4
The Cellular Concept - System Design issues

Lecture 5
Cell Capacity and Reuse

Lecture 6
Interference and System Capacity

Lecture 7
Improving Coverage and System Capacity

Lecture 8
Mobile Radio Propagation (Part 1)

Lecture 9
Mobile Radio Propagation (Part 2)

Lecture 10
Mobile Radio Propagation (Part 3)

Lecture 11
Mobile Radio Propagation (Part 4)

Lecture 12
Mobile Radio Propagation (Part 5)

Lecture 13
Mobile Radio Propagation (Part 6)

Lecture 14
Mobile Radio Propagation (Part 7)

Lecture 15
Mobile Radio Propagation (Part 8)

Lecture 16
Mobile Radio Propagation (Part 9)

Lecture 17
Mobile Radio Propagation (Part 10)

Lecture 18
Mobile Radio Propagation (Part 11)

Lecture 19
Mobile Radio Propagation (Part 12)

Lecture 20
Mobile Radio Propagation (Part 13)

Lecture 21
Modulation Techniques for Mobile Communication (Part 1)

Lecture 23
Modulation Techniques for Mobile Communication (Part 3)

Lecture 24
Modulation Techniques for Mobile Communication (Part 4)

Lecture 25
Modulation Techniques for Mobile Communication (Part 5)

Lecture 26
Modulation Techniques for Mobile Communication (Part 6)

Lecture 27
Modulation Techniques for Mobile Communication (Part 7)

Lecture 28
Modulation Techniques (Part 8)

Lecture 29
Equalisation and Diversity Techniques (Part 1)

Lecture 30
Equalisation and Diversity Techniques (Part 2)

Lecture 31
Equalisation and Diversity Techniques (Part 3)

Lecture 32
Equalisation and Diversity Techniques (Part 4)

Lecture 34
Coding Techniques for Mobile Communications (Part 2)

Lecture 35
Coding Techniques for Mobile Communications (Part 3)

Lecture 36
Coding Techniques for Mobile Communications (Part 4)

Lecture 37
Wireless Networks

Lecture 38
GSM and CDMA (Part 1)

Lecture 39
GSM and CDMA (Part 2)

Lecture 29
Radial Basis Function Networks; Gaussian RBF Networks

Lecture 30
Learning Weights in RBF networks; K-means Clustering Algorithm

Lecture 36
Performance of Two Real -Time Communication Protocols

Lecture 37
Real - Time Communication over Packet Switched Networks (Part 1)

Lecture 38
Real - Time Communication over Packet Switched Networks (Part 2)

Lecture 39
Real - Time Communication over Packet Switched Networks (Part 3)

Lecture 40
Real - Time Databases

Lecture 2
Storage, Processing, Networking
View all videos


Tear Down

Tear Down

Sneak a peek inside popular products!

iPhone 4 design exhibits high reuseiPhone 4 design exhibits high reuse

The new Apple iPhone 4 could very well be called an iPad since it uses at least seven chips from the popular Apple tablet, according to analysts from UBM TechInsights.

 

Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

 
Back to Top