No. | Subject | Course | Topic | User Category | Telecast Date / Day | Telecast Time | Repeat Time |
---|---|---|---|---|---|---|---|
1 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 08:00:00 - 08:27:11 || 07:55:35 - 08:00:00 (2025-04-27) || | ||||
2 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 08:27:11 - 08:59:43 || | ||||
3 | Using Python R25 | Google Work | 08:59:43 - 09:56:19 || | ||||
4 | 09:56:19 - 10:26:23 || | ||||||
5 | 10:26:23 - 10:53:33 || | ||||||
6 | Algorithms | Completeness of 3 - coloring | 10:53:33 - 11:28:08 || | ||||
7 | Algorithms | Completeness of Subset sum and Knapsack | 11:28:08 - 12:05:24 || | ||||
8 | Language Processing | Introduction | 12:05:24 - 12:21:39 || | ||||
9 | Language Processing | limitations | 12:21:39 - 12:37:20 || | ||||
10 | Language Processing | and its applications | 12:37:20 - 13:02:28 || | ||||
11 | Distributed Systems | cloud Computing | 13:02:28 - 13:58:58 || | ||||
12 | Part II | Perfectly-Secure Byzantine Agreement | 13:58:58 - 15:02:16 || | ||||
13 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 15:02:16 - 15:53:34 || | ||||
14 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 15:53:34 - 16:21:25 || | ||||
15 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:21:25 - 16:48:32 || | ||||
16 | Industry 4.0 and Industrial Internet of Things | Data and Advanced Analysis | 16:48:32 - 17:12:16 || | ||||
17 | Industry 4.0 and Industrial Internet of Things | Cybersecurity | 17:12:16 - 17:55:05 || | ||||
18 | Networks | Lookup: Trie Based Data Structures - Part 1 | 17:55:05 - 18:41:32 || | ||||
19 | An Introduction | Part-III | 18:41:32 - 19:39:45 || | ||||
20 | Systems | 19:39:45 - 20:46:35 || | |||||
21 | Theory and Mechanism Design | Optimal Mechanism Design | 20:46:35 - 20:58:09 || | ||||
22 | Theory and Mechanism Design | Mechanisms | 20:58:09 - 21:19:41 || | ||||
23 | Theory and Mechanism Design | 21:19:41 - 21:48:41 || | |||||
24 | 21:48:41 - 22:52:29 || | ||||||
25 | An Overview | 22:52:29 - 23:53:40 || | |||||
26 | Artificial Intelligence | Pattern Database Heuristics Part-7 | 23:53:40 - 00:14:04 || | ||||
27 | Artificial Intelligence | Satisfaction Vs Optimization Part-1 | 00:14:04 - 00:33:40 (2025-04-27) || | ||||
28 | Artificial Intelligence | Example of N-Queens Part-2 | 00:33:40 - 00:47:22 (2025-04-27) || | ||||
29 | Computing 1 | 00:47:22 - 01:54:03 (2025-04-27) || | |||||
30 | of Speech Processing | Estimation | 01:54:03 - 02:52:38 (2025-04-27) || | ||||
31 | Machine Learning (Tamil) | Descent and basis functions | 02:52:38 - 03:21:19 (2025-04-27) || | ||||
32 | Machine Learning (Tamil) | Techniques | 03:21:19 - 03:55:09 (2025-04-27) || | ||||
33 | Algorithms using Java | 03:55:09 - 04:53:54 (2025-04-27) || | |||||
34 | SystemsDesign Verification and Test | faults in Real time Embedded Systems | 04:53:54 - 05:49:38 (2025-04-27) || | ||||
35 | Competitive Programming | Covers | 05:49:38 - 06:27:06 (2025-04-27) || | ||||
36 | Competitive Programming | Programming with Frog 1_Part A | 06:27:06 - 06:59:29 (2025-04-27) || | ||||
37 | Image Processing and Computer Vision | Color Processing- I(Part-1) | 06:59:29 - 07:55:35 (2025-04-27) || | ||||
38 | Artificial Intelligence | Climbing Part-3 | 08:00:00 - 08:18:34 || 07:50:33 - 08:00:00 (2025-04-29) || | ||||
39 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 08:18:34 - 08:38:16 || | ||||
40 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 08:38:16 - 08:58:40 || | ||||
41 | Computing 2 | 08:58:40 - 10:02:28 || | |||||
42 | of Speech Processing | Estimation | 10:02:28 - 11:01:05 || | ||||
43 | Machine Learning (Tamil) | Orthogonal Projection | 11:01:05 - 11:42:40 || | ||||
44 | Machine Learning (Tamil) | Classification | 11:42:40 - 12:10:14 || | ||||
45 | Algorithms using Java | Data Structures | 12:10:14 - 12:57:50 || | ||||
46 | SystemsDesign Verification and Test | Systems | 12:57:50 - 13:58:54 || | ||||
47 | Competitive Programming | Programming with Frog 1_Part B | 13:58:54 - 14:19:04 || | ||||
48 | Competitive Programming | Programming with Dice Combinations | 14:19:04 - 14:59:40 || | ||||
49 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 14:59:40 - 15:56:53 || | ||||
50 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 15:56:53 - 16:24:04 || | ||||
51 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 16:24:04 - 16:56:36 || | ||||
52 | Using Python R25 | Google Work | 16:56:36 - 17:53:12 || | ||||
53 | 17:53:12 - 18:23:16 || | ||||||
54 | 18:23:16 - 18:50:26 || | ||||||
55 | Algorithms | Completeness of 3 - coloring | 18:50:26 - 19:25:01 || | ||||
56 | Algorithms | Completeness of Subset sum and Knapsack | 19:25:01 - 20:02:17 || | ||||
57 | Language Processing | Introduction | 20:02:17 - 20:18:32 || | ||||
58 | Language Processing | limitations | 20:18:32 - 20:34:13 || | ||||
59 | Language Processing | and its applications | 20:34:13 - 20:59:21 || | ||||
60 | Distributed Systems | cloud Computing | 20:59:21 - 21:55:51 || | ||||
61 | Part II | Perfectly-Secure Byzantine Agreement | 21:55:51 - 22:59:09 || | ||||
62 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 22:59:09 - 23:50:27 || | ||||
63 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 23:50:27 - 00:18:18 || | ||||
64 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 00:18:18 - 00:45:25 (2025-04-29) || | ||||
65 | Industry 4.0 and Industrial Internet of Things | Data and Advanced Analysis | 00:45:25 - 01:09:09 (2025-04-29) || | ||||
66 | Industry 4.0 and Industrial Internet of Things | Cybersecurity | 01:09:09 - 01:51:58 (2025-04-29) || | ||||
67 | Networks | Lookup: Trie Based Data Structures - Part 1 | 01:51:58 - 02:38:25 (2025-04-29) || | ||||
68 | An Introduction | Part-III | 02:38:25 - 03:36:38 (2025-04-29) || | ||||
69 | Systems | 03:36:38 - 04:43:28 (2025-04-29) || | |||||
70 | Theory and Mechanism Design | Optimal Mechanism Design | 04:43:28 - 04:55:02 (2025-04-29) || | ||||
71 | Theory and Mechanism Design | Mechanisms | 04:55:02 - 05:16:34 (2025-04-29) || | ||||
72 | Theory and Mechanism Design | 05:16:34 - 05:45:34 (2025-04-29) || | |||||
73 | 05:45:34 - 06:49:22 (2025-04-29) || | ||||||
74 | An Overview | 06:49:22 - 07:50:33 (2025-04-29) || | |||||
75 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:00:00 - 08:22:16 || 07:48:11 - 08:00:00 (2025-04-30) || | ||||
76 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:22:16 - 09:09:14 || | ||||
77 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 09:09:14 - 09:52:58 || | ||||
78 | Networks | Computing - Part 1 | 09:52:58 - 10:30:32 || | ||||
79 | Networks | Lookup: Trie Based Data Structures - Part 2 | 10:30:32 - 10:55:29 || | ||||
80 | An Introduction | 10:55:29 - 11:50:39 || | |||||
81 | Systems | 11:50:39 - 13:05:11 || | |||||
82 | Security | Computer Security - Part 1 | 13:05:11 - 13:31:15 || | ||||
83 | Security | Computer Security - Part 2 | 13:31:15 - 14:02:26 || | ||||
84 | 14:02:26 - 14:56:10 || | ||||||
85 | Problem Formulation | 14:56:10 - 15:35:28 || | |||||
86 | Course Plan | 15:35:28 - 15:57:44 || | |||||
87 | Artificial Intelligence | Climbing Part-3 | 15:57:44 - 16:16:18 || | ||||
88 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 16:16:18 - 16:36:00 || | ||||
89 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 16:36:00 - 16:56:24 || | ||||
90 | Computing 2 | 16:56:24 - 18:00:12 || | |||||
91 | of Speech Processing | Estimation | 18:00:12 - 18:58:49 || | ||||
92 | Machine Learning (Tamil) | Orthogonal Projection | 18:58:49 - 19:40:24 || | ||||
93 | Machine Learning (Tamil) | Classification | 19:40:24 - 20:07:58 || | ||||
94 | Algorithms using Java | Data Structures | 20:07:58 - 20:55:34 || | ||||
95 | SystemsDesign Verification and Test | Systems | 20:55:34 - 21:56:38 || | ||||
96 | Competitive Programming | Programming with Frog 1_Part B | 21:56:38 - 22:16:48 || | ||||
97 | Competitive Programming | Programming with Dice Combinations | 22:16:48 - 22:57:24 || | ||||
98 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 22:57:24 - 23:54:37 || | ||||
99 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 23:54:37 - 00:21:48 || | ||||
100 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 00:21:48 - 00:54:20 (2025-04-30) || | ||||
101 | Using Python R25 | Google Work | 00:54:20 - 01:50:56 (2025-04-30) || | ||||
102 | 01:50:56 - 02:21:00 (2025-04-30) || | ||||||
103 | 02:21:00 - 02:48:10 (2025-04-30) || | ||||||
104 | Algorithms | Completeness of 3 - coloring | 02:48:10 - 03:22:45 (2025-04-30) || | ||||
105 | Algorithms | Completeness of Subset sum and Knapsack | 03:22:45 - 04:00:01 (2025-04-30) || | ||||
106 | Language Processing | Introduction | 04:00:01 - 04:16:16 (2025-04-30) || | ||||
107 | Language Processing | limitations | 04:16:16 - 04:31:57 (2025-04-30) || | ||||
108 | Language Processing | and its applications | 04:31:57 - 04:57:05 (2025-04-30) || | ||||
109 | Distributed Systems | cloud Computing | 04:57:05 - 05:53:35 (2025-04-30) || | ||||
110 | Part II | Perfectly-Secure Byzantine Agreement | 05:53:35 - 06:56:53 (2025-04-30) || | ||||
111 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 06:56:53 - 07:48:11 (2025-04-30) || | ||||
112 | Computer and Network Performance Analysis using Queuing System | Introducing Queuing Systems | 08:00:00 - 08:35:22 || 07:54:55 - 08:00:00 (2025-05-01) || | ||||
113 | Computer and Network Performance Analysis using Queuing System | Memoryless Distributions | 08:35:22 - 08:52:47 || | ||||
114 | Using Python | Google Work ? | 08:52:47 - 10:03:03 || | ||||
115 | 10:03:03 - 10:27:44 || | ||||||
116 | Machine I | 10:27:44 - 10:52:34 || | |||||
117 | Algorithms | Completeness of set cover, Weak and Strong NP - completeness | 10:52:34 - 11:29:05 || | ||||
118 | Algorithms | Reduction | 11:29:05 - 11:58:07 || | ||||
119 | Language Processing | 11:58:07 - 12:22:17 || | |||||
120 | Language Processing | for W,V and U | 12:22:17 - 12:34:07 || | ||||
121 | Language Processing | vanishing gradient | 12:34:07 - 12:49:39 || | ||||
122 | Distributed Systems | 12:49:39 - 13:50:33 || | |||||
123 | Part II | Perfectly-Secure Byzantine Agreement: Illustration | 13:50:33 - 14:25:50 || | ||||
124 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part I | 14:25:50 - 15:00:29 || | ||||
125 | Architecture Storage & Interconnects | in Network On Chip | 15:00:29 - 16:00:18 || | ||||
126 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:00:18 - 16:22:34 || | ||||
127 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:22:34 - 17:09:32 || | ||||
128 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 17:09:32 - 17:53:16 || | ||||
129 | Networks | Computing - Part 1 | 17:53:16 - 18:30:50 || | ||||
130 | Networks | Lookup: Trie Based Data Structures - Part 2 | 18:30:50 - 18:55:47 || | ||||
131 | An Introduction | 18:55:47 - 19:50:57 || | |||||
132 | Systems | 19:50:57 - 21:05:29 || | |||||
133 | Security | Computer Security - Part 1 | 21:05:29 - 21:31:33 || | ||||
134 | Security | Computer Security - Part 2 | 21:31:33 - 22:02:44 || | ||||
135 | 22:02:44 - 22:56:28 || | ||||||
136 | Problem Formulation | 22:56:28 - 23:35:46 || | |||||
137 | Course Plan | 23:35:46 - 23:58:02 || | |||||
138 | Artificial Intelligence | Climbing Part-3 | 23:58:02 - 00:16:36 || | ||||
139 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 00:16:36 - 00:36:18 (2025-05-01) || | ||||
140 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 00:36:18 - 00:56:42 (2025-05-01) || | ||||
141 | Computing 2 | 00:56:42 - 02:00:30 (2025-05-01) || | |||||
142 | of Speech Processing | Estimation | 02:00:30 - 02:59:07 (2025-05-01) || | ||||
143 | Machine Learning (Tamil) | Orthogonal Projection | 02:59:07 - 03:40:42 (2025-05-01) || | ||||
144 | Machine Learning (Tamil) | Classification | 03:40:42 - 04:08:16 (2025-05-01) || | ||||
145 | Algorithms using Java | Data Structures | 04:08:16 - 04:55:52 (2025-05-01) || | ||||
146 | SystemsDesign Verification and Test | Systems | 04:55:52 - 05:56:56 (2025-05-01) || | ||||
147 | Competitive Programming | Programming with Frog 1_Part B | 05:56:56 - 06:17:06 (2025-05-01) || | ||||
148 | Competitive Programming | Programming with Dice Combinations | 06:17:06 - 06:57:42 (2025-05-01) || | ||||
149 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 06:57:42 - 07:54:55 (2025-05-01) || |
Swayam Prabha copyright © 2024 INFLIBNET Centre. All rights reserved.