![OnlineTeacher](/img/default-banner.jpg)
- Видео 618
- Просмотров 4 794 946
OnlineTeacher
Добавлен 10 янв 2014
Complement and inverse of a Relation| Discrete Mathematics
Complement and inverse of a Relation| Discrete Mathematics
Просмотров: 1 722
Видео
Representation of relations|Discrete Mathematics
Просмотров 1742 года назад
Representation of relations|Discrete Mathematics
Cartesian Product of Sets| Discrete Mathematics
Просмотров 5952 года назад
Cartesian Product Of Two Sets
Venn Diagram| Discrete Mathematics-7
Просмотров 5182 года назад
Venn Diagram| Discrete Mathematics-7 set theory
Partition of a set| Discrete Mathematics-5
Просмотров 32 тыс.2 года назад
Partition of a set| Discrete Mathematics-5
Operations on Sets|Discrete Mathematics-2
Просмотров 1532 года назад
Operations on Sets|Discrete Mathemaics-2
Proof of DeMorgan's laws , set theory| Discrete Mathematics-4
Просмотров 5 тыс.2 года назад
Proof of DeMorgan's laws , set theory| Discrete Mathematics-4
Set Theory :Introduction| Discrete Mathematics-1
Просмотров 3062 года назад
Set, subset, equal sets, equivalent sets
Difference in Call by Value and Call by Reference methods in C
Просмотров 3044 года назад
Difference in Call by Value and Call by Reference methods in C
Passing Pointers to a Function|Programming in C
Просмотров 3964 года назад
Passing Pointers to a Function|Programming in C
Relationship between Arrays and Pointers in C
Просмотров 7 тыс.4 года назад
Relationship between Arrays and Pointers in C
Network Security and Cryptography: RSA Digital Signature Scheme
Просмотров 2,2 тыс.4 года назад
Network Security and Cryptography: RSA Digital Signature Scheme
Network Security and Cryptography: Digital Signature
Просмотров 1384 года назад
Network Security and Cryptography: Digital Signature
Network Security and Cryptography: Merkle Damgard Scheme, iterated hash function
Просмотров 6 тыс.4 года назад
Network Security and Cryptography: Merkle Damgard Scheme, iterated hash function
Network Security and Cryptography:Hashed Message Authentication Code(HMAC)
Просмотров 1,9 тыс.4 года назад
Network Security and Cryptography:Hashed Message Authentication Code(HMAC)
Network Security and Cryptography: Message Authentication Code(MAC)
Просмотров 4574 года назад
Network Security and Cryptography: Message Authentication Code(MAC)
Network Security and Cryptography: Generally Accepted Requirements of a Cryptographic Hash Function
Просмотров 844 года назад
Network Security and Cryptography: Generally Accepted Requirements of a Cryptographic Hash Function
Network Security and Cryptography: Message Digest, Modification Detection Code, Message Integrity
Просмотров 7104 года назад
Network Security and Cryptography: Message Digest, Modification Detection Code, Message Integrity
Network Security and Cryptography: Elgamal Cryptographic System
Просмотров 4364 года назад
Network Security and Cryptography: Elgamal Cryptographic System
Network Security and Cryptography: Hill Cipher
Просмотров 2114 года назад
Network Security and Cryptography: Hill Cipher
Network security and Cryptography: Diffie Hellman Key exchange algorithm
Просмотров 1524 года назад
Network security and Cryptography: Diffie Hellman Key exchange algorithm
Network Security and Cryptography: Primitive Roots ,Order of an element in a group G
Просмотров 1,3 тыс.4 года назад
Network Security and Cryptography: Primitive Roots ,Order of an element in a group G
Network Security and Cryptography: Algebraic Structures Groups, Rings , Fields
Просмотров 30 тыс.4 года назад
Network Security and Cryptography: Algebraic Structures Groups, Rings , Fields
Network Security and Cryptography: Euler's Theorem, Euler's Totient function, Application of Euler's
Просмотров 6574 года назад
Network Security and Cryptography: Euler's Theorem, Euler's Totient function, Application of Euler's
👍🏻
*Insert the Overwatch Mercy meme of you saving my Algorithms&DataStructures exam!*
2024😂
Thank you so much
From UTE with love, thank you for the easy-to-understand explanation <3
best in youtube
nice explanation!! this video is 10yrs old..damn
thank you very much
nice video 👍
Thanks a lot sir.
Dude thanks so much...really appreciate this ...everyone on RUclips were too confusing to understand and put very big and complex diagrams with 22 , 18 , 15 , 12 minutes worth of videos. u were short , clear , precise ,...
Thank you
Robot
Who watching 2023 😂
Me bro😂
🙋
@@Telanganafoodie2513 ok kaisa gaya exam
@@lifeofbala2004 ok kaisa gaya exam
😂
Keep work hard🎉
Low quality but best content ❤❤
Suddenly I just fell sleep🤖
Great sir thanks a lot
this is one of the worst online explanation....
brilliant job👍
You are pointing one thing but another things are being come out....irritating in the day of semester exam...
Super bro
very helpful, saved me just before the exam
hindi me kya tha
Good
but how to does the machine get rid of the 0 ?
Thank you
similar crosschecking. similarity.
🔥🔥🔥
please check date before you take.
great video thanks for making it
Thank God I finally passed my NP test on my 3rd attempt with the help of Mr DAVID, I used his preparation tips. just 3 days of working with him and I passed. I was referred to him by a friend before my exams. friends I recommend you to mr DAVID. The man has the key to success
great explanation thank you kindly:)
best explanation on youtube for now :)
No explaination you just write and read
Thank You so much sir 🙏🏻
Can the same logic be applied for bi-directed graph?
Thanks.
Perform Transitive Closure with 2 lines of code. shortest code ever ⚡️🌏🛰💯 🔗 rb.gy/6l9vlq 🧐Quora discussion 🔗 rb.gy/kusyif 💎Floyd Warshal's Algorithm is an example of dynamic programming and was published in its currently recognized form by Robert Floyd in 1962. It comprises 3 nested for loops used to find all pair shortest path problems, used to construct transitive closures. 💎Amazingly, TML (Tau Meta Language) can also do the same with only 2 lines of code. tc(?x ?y):-e(?x ?y). tc(?x ?y):-tc(?x ?z), e(?z ?y). 🧀Test it. 🔗 tml.idni.org regression tests/intro/09_TRANSITIVE_CLOSURE.tml 😼Published codes 🔗 github.com/IDNI/TML 🌐Website of tml 🔗 tau.net/ 📄Abstract: Draft for Community Review 🔗lnkd.in/gWJZj9sN 👨🏫Tutorial Videos of TML 🔗rb.gy/9ahenx
Perform Transitive Closure with 2 lines of code. shortest code ever ⚡️🌏🛰💯 🔗 rb.gy/6l9vlq 🧐Quora discussion 🔗 rb.gy/kusyif 💎Floyd Warshal's Algorithm is an example of dynamic programming and was published in its currently recognized form by Robert Floyd in 1962. It comprises 3 nested for loops used to find all pair shortest path problems, used to construct transitive closures. 💎Amazingly, TML (Tau Meta Language) can also do the same with only 2 lines of code. tc(?x ?y):-e(?x ?y). tc(?x ?y):-tc(?x ?z), e(?z ?y). 🧀Test it. 🔗 tml.idni.org regression tests/intro/09_TRANSITIVE_CLOSURE.tml 😼Published codes 🔗 github.com/IDNI/TML 🌐Website of tml 🔗 tau.net/ 📄Abstract: Draft for Community Review 🔗lnkd.in/gWJZj9sN 👨🏫Tutorial Videos of TML 🔗rb.gy/9ahenx
nice explanation
Sorry but this is a horrible video, please delete it asap. Your explanation is so a mess!
worst video in youtube
check this out.. shortest code ever to perform Transitive Closure in 2 lines of codes ruclips.net/video/GfBQoAD2v3w/видео.html
To whomsoever coming here to understand this damn topic..., yes we all got professor from the same set.
Very easy Explanation 👍🏻
Tq so much sir🙏🙏
It is a bit similar to boyer moore
3:07 you state that this has degree k, but you don't explain what a degree is. I had to go elsewhere to look it up. Other than that, really easy explanation. Thx.
Thanks for this video! It helped a lot.