Channel Avatar

Zafaryab Haider @UCqzGlCtvChzOI1O1nFaoIMw@youtube.com

874 subscribers - no pronouns :c

More from this channel (soon)


16:33
GPTv2: Language Models are Unsupervised Multitask Learners | Summary
22:14
Realtime Mobilenet-SSD detector's performance enhancement and analysis for mobile device inferencing
21:55
BEIT v2:Masked Image Modeling with Vector-Quantized Visual Tokenizers for Breast Cancer Images
14:30
STRUCT Basics P1 || C Programming
35:48
File Input/Output || C Programming
08:20
Creating and Using your own Headers Files || C Programming
01:11:40
Strategy to crack GATE & Other competitive Exams. | IIRU-ZHCET + MadeEasy
27:08
Loops and 1D array || C Programming
25:22
Nested Loops 2D-Arrays and Pattern || C Programming
11:17
Pointer Basic || C Programming
05:57
How to submit assignment in COA1910 Lab
01:30:59
Ethereum Bockchain Webinar
35:31
COC4010_4.02_Kerberos
10:20
COC4010_4.01_Symmetric Key Distribution Protocols_
10:46
COC4010_2.08_Key Management_Deffie Hellman Key Agreement
40:52
COC4010_2.07_Entity Authentication
45:32
COC4010_2.05_Message Authentication
25:24
COC4010_2.04_Digital signature
23:37
COC4010_2.03_RSA
26:15
COC4010_2.01_Crypto Maths Part4
14:54
COC4010_2.02_Public Key Cryptosystem
37:42
COC4010_1.20_Advanced Encryption Standard_AES
16:31
COC4010_1.18_Crypto Maths2 _Groups Rings and Fields
24:11
COC4010_1.19_Crypto Maths3 _Galois Fields_Modular Polynomial Arithmetic
28:59
COC4010_1.17_Crypto Maths Part1
24:28
COC4010_1.16_DES Part2
22:11
COC4010_1.15_DES Part1
49:48
COC4010_1.14_Modern Block Cipher_Fiestal Cipher
06:59
COC4010_1.13_Rotor Cipher _Steganography
15:01
COC4010_1.12_Transposition Cipher
05:05
COC4010_1.10.5_Inverse of Matrix
14:57
COC4010_1.10_Hill Cipher
05:20
COC4010_1.9_Playfair Cipher
02:45
COC4010_1.8.5_QnA_Substitution Cipher_Additive_Multiplicative_Playfair
27:19
COC4010_1.7_Asymmetric Key_Substitution_Multiplicative Cipher_QnA
18:03
COC4010_1.6_Cryptanalysis and brute force
07:53
COC4010_1.5_Symmetric Cipher Model
10:34
COC4010_1.4_Cryptographic System Categories
12:29
COC4010_1.3 Network Security Model
30:11
COC4010_1.2 OSI Security Architecture
25:14
COC4010_1.1 Intro to Information Security
43:46
COA3600_4.6_Graphs
28:59
COA3600_4.5_Binomial Heaps
22:58
COA3600_4.4_Binary Heap, HeapSort
25:08
COA3600_4.3_Trees_Binary Search Trees
30:11
COA3600_4.2_Trees_Binary Tree Traversal
31:00
COA3600_4.1_Trees, Binary Trees
31:09
COA3600_3.9_Queues part2
32:03
COA3600_3.8_Queues part1
37:19
COA3600_3.7_Stacks Application
25:41
COA3600_3.6_Stacks Intro, representation,
22:43
COA3600_3.1_Linked List Introduction
13:51
COA3600_3.3_Linked list Insertion and Deletion
12:54
COA3600_3.4_Circular Linked List
12:46
COA3600_3.5_Doubly Linked List
24:11
COA3600_3.2_Singly Linked List traversal count search