- Видео 57
- Просмотров 136 948
Zafaryab Haider
Индия
Добавлен 7 апр 2020
GPTv2: Language Models are Unsupervised Multitask Learners | Summary
GPTv2: Language Models are Unsupervised Multitask Learners | Summary
Просмотров: 72
Видео
Realtime Mobilenet-SSD detector's performance enhancement and analysis for mobile device inferencing
Просмотров 48Год назад
Presentation by Shihab for ECE5911
BEIT v2:Masked Image Modeling with Vector-Quantized Visual Tokenizers for Breast Cancer Images
Просмотров 846Год назад
BEIT v2:Masked Image Modeling with Vector-Quantized Visual Tokenizers for Breast Cancer Images
File Input/Output || C Programming
Просмотров 5892 года назад
In this lecture, you will learn about 0:00 Introduction to various file functions 3:20 FILE structure type 4:07 fopen() and Modes 7:52 EOF 8:29 fgetc() with Example1 10:02 fclose() 10:31 Back to Example1 11:25 fscanf() with Example2 13:03 feof() 13:24 Back to Example 2 15:30 fgets() with Example3 18:10 fgetc() with Example4 19:45 fscanf() to read int data (Example5) 23:23 fprintf() for Writing ...
Creating and Using your own Headers Files || C Programming
Просмотров 1302 года назад
Creating and Using your own Headers Files || C Programming
Strategy to crack GATE & Other competitive Exams. | IIRU-ZHCET + MadeEasy
Просмотров 962 года назад
Speaker: Mr Pulkit Singh, CSE 2020 AIR: 26 ESE 2015 AIR: 55 00:00 Introduction 01:46 Speaker Presentation Starts 33:57 QnA Round 01:09:07 End Remarks of Speaker 01:10:39 Vote of Thanks
Loops and 1D array || C Programming
Просмотров 3623 года назад
In case of doubts, post it on the Classroom app. 0:00 Introduction to Loops 1:15 Why Loops? 2:06 For Loop Example 5:55 for vs while vs do-while 9:47 SoD example 14:22 Infinite Loops 15:42 Multiple Condition Loops 16:27 Arrays 22:40 break Keyword 24:34 continue Keyword
Nested Loops 2D-Arrays and Pattern || C Programming
Просмотров 8003 года назад
Nested Loops 2D-Arrays and Pattern || C Programming
Pointer Basic || C Programming
Просмотров 1603 года назад
Pointer Concept in C Programming Language Intro: 0:00 Representation in Memory: 0:23 Importance on "*" and "&": 2:13 Printing via pointers: 3:45 Double Pointer: 5:18 Working Example: 6:28 Ending Statement: 11:10
How to submit assignment in COA1910 Lab
Просмотров 6043 года назад
How to submit assignment in COA1910 Lab
Ethereum Bockchain Webinar
Просмотров 953 года назад
Topics to be covered: Blockchain Ethereum Smart-Contract Decentralized Applications Crypto-Currencies Matic Job Opportunities in Blockchain Industry Speaker: Hamza Khan Growth Manager, Matic Network. Organised by: IIRU-ZHCET
COC4010_4.02_Kerberos
Просмотров 4774 года назад
LockDown Lectures To know about Timeline: In case of doubts/corrections/clarifications please raise the query in the classroom app. References: 1. William Stalling, "Cryptography and network security", 4th edition 2. B.A. Forouzan, "Cryptography and Network security"
COC4010_4.01_Symmetric Key Distribution Protocols_
Просмотров 4534 года назад
LockDown Lectures To know about Timeline: In case of doubts/corrections/clarifications please raise the query in the classroom app. References: 1. William Stalling, "Cryptography and network security", 4th edition 2. B.A. Forouzan, "Cryptography and Network security"
COC4010_2.08_Key Management_Deffie Hellman Key Agreement
Просмотров 4544 года назад
COC4010_2.08_Key Management_Deffie Hellman Key Agreement
COC4010_1.20_Advanced Encryption Standard_AES
Просмотров 4,6 тыс.4 года назад
COC4010_1.20_Advanced Encryption Standard_AES
COC4010_1.18_Crypto Maths2 _Groups Rings and Fields
Просмотров 6 тыс.4 года назад
COC4010_1.18_Crypto Maths2 _Groups Rings and Fields
COC4010_1.19_Crypto Maths3 _Galois Fields_Modular Polynomial Arithmetic
Просмотров 75 тыс.4 года назад
COC4010_1.19_Crypto Maths3 _Galois Fields_Modular Polynomial Arithmetic
COC4010_1.14_Modern Block Cipher_Fiestal Cipher
Просмотров 1,2 тыс.4 года назад
COC4010_1.14_Modern Block Cipher_Fiestal Cipher
COC4010_1.13_Rotor Cipher _Steganography
Просмотров 16 тыс.4 года назад
COC4010_1.13_Rotor Cipher _Steganography
so perfect
Fantastic explanation
Very nice explanation but your 1 and 2 looks similar
Yes, you are right. Sorry for that.
But how to get m(x) irreducible polynomial?
How to calculate the 7x7 so the result is 3 in multiplication table of GF(2^3)
7 = x^2+x+1 7x7 = (x^2+x+1)^2 =x^4+x^3+x^2+x^3+x^2+x+x^2+x+1 =(x^4+x^2+1) mod (x^3+x+1) =x+1 x+1 in binary 5 bit is 00011 which is equal to 3 of decimal.
How is the prime number set as 2, 4 & 6?
Sorry, didn't get the question. Please elaborate and mention the time of the video as well.
Great work!
Thank you! Cheers!
Who's the handsome guy giving the lecture
guess
sir how to generate polynomial arithmetic polynomial
all others are fake
best video for galois fields on whole youtube others dont really know what a galois field is
Thank you very much
You are welcome
Your explanation is awesome! Didn't understand EE algo until now
I am glad it helped
Diagrams make all the difference when trying to understand these topics! Great and fast!
I agree
Why are some videos in English but others in Hindi?
I didn't anticipate a big audience and tailored it for a limited group. In the future, when creating any content, I'll ensure it's in English to cater to a broader audience.
Excellent sir..
Thanks
Mashallah well done sir keep it...continue ❤❤❤❤
Thank you, I will
AoA sir, Does binary and polynnomial methods for addition and multiplication in GF 2^3 different answers??
GF arithmetic is polynomial method. At the end everything is represented as binary and it has basic binary operations too. I hope this helps. I didn't get the question.
Awesome video! So clearly explained with detailed examples. But please change your laser color from yellow to something else.
Thanks for the tip!
Excellent Concept Explanation 🔥🔥 Thank You!!
Glad you liked it!
tq sir . u are best
So nice of you. All the best
Beautiful and Interesting and Glod bless you.
Thank you! You too!
thank you sir for the lectures
Most welcome
dude keep it in English!!!!
Sure dude. 👍
Thanks! You saved me right before my Cryptography quiz, I could not for the life of me find good videos explaining this.
Glad I could help!
Superb explanation and example sir❤🙏
Thanks a ton
Superb❤❤❤👍👍
Thank you! Cheers!
Excuse me sir! Can you explain this answer explain security measures are adopted in the layer of OSI model?
Every layer has some mechanism to achieve enhanced security. Explanation would get too long. You may refer "OSI Defense in Depth to Increase Application Security" that available on giac.org
How did u get that irreducible polynomial
Please watch James Hamblin's video titled Irreduceable Polynomials.
ᴘʀᴏᴍᴏsᴍ ❤️
Best explanation
Glad you think so!
Thank you for the video
Very simple explanation 👍.useful for a beginner
Glad you liked it
Exceedingly good video!
Thank you very much!
please upload more videos of these kind. Very amazing
nice
رحم الله والديك ربي يوفقك very good 👍
Thanks. أمين
Thanks for the video sir 💯
Good