Channel Avatar

Computer Science @UCSX3MR0gnKDxyXAyljWzm0Q@youtube.com

215K subscribers - no pronouns :c

Are you an undergraduate at university studying for a BSc. (


08:15
String Matching 6. KMP Search Implementation
21:30
String Matching 5. KMP Pattern Preprocessing Implementation
10:23
String Matching 4. KMP Pattern Preprocessing
12:22
String Matching 3. The KMP Algorithm
11:05
String Matching 2. Naive Implementation
06:44
String Matching 1. The Naive Algorithm
19:46
Wireless Communication – Nine: OFDM
07:05
Wireless Communication – Eight: Quadrature Amplitude Modulation
17:23
Wireless Communication – Seven: QPSK
10:28
Wireless Communication – Six: Pulse Shaping
08:13
Wireless Communication – Five: Shift Keying
13:56
Wireless Communication – Four: Modulation
10:33
Wireless Communication - Three: Radio Frequencies
09:41
C# Programming: Lesson 11. More about Arrays
06:25
C# Programming: Lesson 10. Debugging
11:19
C# Programming: Lesson 9. Array Variables
06:27
Wireless Communication - Two: Electromagnetic Wave Properties
12:46
Wireless Communication - One: Electromagnetic Wave Fundamentals
08:27
C# Programming: Lesson 8. For Loops
16:20
C# Programming: Lesson 7. While Loops
10:24
C# Programming: Lesson 6. Errors and Testing
17:13
C# Programming: Lesson 5. Validation
15:18
C# Programming: Lesson 4. if Statement (part 1)
16:05
C# Programming: Lesson 3. Arithmetic Operations
21:10
C# Programming: Lesson 2. Input, Variables and Data Types
14:55
C# Programming: Lesson 1. Simple Output
24:04
Advanced VB.NET Programming – Threads, Events and Delegates (Part 2)
16:06
Advanced VB.NET Programming – Threads, Events and Delegates (Part 1)
18:59
Advanced VB.NET Programming – Delegates
07:37
Falstad Circuit Simulator
13:49
Latches and Flip-Flops 6 - The JK Flip Flop
34:41
The Data Protection Act and the General Data Protection Regulation (GDPR)
06:37
ChatGPT Killer GPTZero
09:09
ChatGPT AI
07:15
Python Programming 20. Write To a Text File
11:15
Python Programming 19. Read From a Text File
05:28
Python Programming 18. Functions
15:55
Regulation of Investigatory Powers
14:13
Computer Misuse Act
18:05
Cryptocurrency. Part Five: Transaction Validation
11:33
Cryptocurrency. Part Four: Transactions and UTXOs
14:30
Intermediate VB.NET Programming Lesson 9. Exception Handling
07:33
Python Programming 17. Procedure Parameters
11:14
Python Programming 16. Sub Procedures
12:38
Cryptocurrency. Part Three: The Blockchain
06:07
Cryptocurrency. Part Two: Bitcoin Objectives
11:57
Cryptocurrency. Part One: Money
18:34
Python Programming 15. Dictionaries
08:37
Python Programming 14. Linear Search
05:58
Python Programming 13. Sorting a List
03:54
Python Programming 12. Lists and Loops
10:23
Python Programming 11. Introduction to Lists
13:16
Byte Order (Endianness)
05:18
Harvard Architecture versus Von Neumann Architecture
12:36
Digital Audio Explained
22:45
Little Man Computer: 3. Loops
20:09
Little Man Computer: 1. Introduction
17:30
Little Man Computer: 2. Branching Code
12:40
RISC versus CISC
09:47
Intermediate VB.NET Programming Lesson 8. Infinity