Lecture5 Signal and Systems
Lecture4 Signal and Systems
Lecture2 Signal and Systems
Lecture3 Signal and Systems
Aligarh movement new
Cns 13f-lec03- Classical Encryption Techniques
Indus Water Treaty
Network Security 1st Lecture
Vulnerabilities in IP Protocols
Se 381 - lec 26 - 26 - 12 may30 - software design - detailed design - se deceision trees and tables
Se 381 - lec 25 - 32 - 12 may29 - program size and cost estimation models
Se 381 - lec 22 - 24 - 12 may15 - modularity - i - coupling
Se 381 - lec 21 - 23 - 12 may09 - df-ds and data dictionary
Se 381 - lec 28 -- 34 - 12 jun12 - testing 1 of 2
Se 381 - lec 27 - 12 jun05 - ooa and ood and class diagrams
Beit 381 se lec 19 - 18 - 12 apr24 - eraa and data modeling
Beit 381 se lec 15 - 16 - 12 mar27 - req engg 1 of 3
Beit 381 se lec 20 - 31 - 12 apr25 - case tools and ascent1-55
Observer & singleton pattern
05 histogram processing DIP