No. | Subject | Course | Topic | User Category | Telecast Date / Day | Telecast Time | Repeat Time |
---|---|---|---|---|---|---|---|
1 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/c/K queues | 08:00:00 - 08:32:30 || 07:43:19 - 08:00:00 (2025-05-08) || | ||||
2 | Computer and Network Performance Analysis using Queuing System | 08:32:30 - 09:00:35 || | |||||
3 | Python | analytics | 09:00:35 - 09:35:36 || | ||||
4 | Python | I | 09:35:36 - 10:02:23 || | ||||
5 | Machine IV | 10:02:23 - 10:32:46 || | |||||
6 | Machine V | 10:32:46 - 11:01:12 || | |||||
7 | Algorithms | Derandomization | 11:01:12 - 11:59:37 || | ||||
8 | Language Processing | 11:59:37 - 12:20:25 || | |||||
9 | Language Processing | Bayes Rule, Language Model | 12:20:25 - 12:33:03 || | ||||
10 | Language Processing | Alignment Variables | 12:33:03 - 13:02:36 || | ||||
11 | Distributed Systems | Virtualization | 13:02:36 - 13:59:06 || | ||||
12 | Part II | for Perfectly-Secure Byzantine Agreement: Part II | 13:59:06 - 14:31:27 || | ||||
13 | Part II | Perfectly-Secure Byzantine Agreement | 14:31:27 - 15:04:13 || | ||||
14 | Architecture Storage & Interconnects | Bufferless NoC Routers | 15:04:13 - 15:50:42 || | ||||
15 | Modern C++ | Recap of C/2 | 15:50:42 - 16:26:33 || | ||||
16 | Modern C++ | 16:26:33 - 16:59:56 || | |||||
17 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 1 | 16:59:56 - 17:56:21 || | ||||
18 | Networks | Classification - Part 1 | 17:56:21 - 18:26:04 || | ||||
19 | Networks | Classification - Part 2 | 18:26:04 - 18:51:40 || | ||||
20 | An Introduction | 18:51:40 - 19:40:24 || | |||||
21 | Systems | 19:40:24 - 20:47:35 || | |||||
22 | Security | Part 2 | 20:47:35 - 21:19:23 || | ||||
23 | Security | and Phishing Attacks - Part 1 | 21:19:23 - 21:53:39 || | ||||
24 | Bitonic-Sort-Merge Sort (BSMS) | 21:53:39 - 22:51:00 || | |||||
25 | Scheduling | 22:51:00 - 23:48:54 || | |||||
26 | Artificial Intelligence | Minimax Algorithm for two player games | 23:48:54 - 00:09:02 || | ||||
27 | Artificial Intelligence | An Example of Minimax Search | 00:09:02 - 00:26:33 (2025-05-08) || | ||||
28 | Artificial Intelligence | Alpha Beta Pruning | 00:26:33 - 00:43:38 (2025-05-08) || | ||||
29 | Theory | 00:43:38 - 01:10:04 (2025-05-08) || | |||||
30 | Theory | 01:10:04 - 01:38:12 (2025-05-08) || | |||||
31 | of Speech Processing | 01:38:12 - 02:39:11 (2025-05-08) || | |||||
32 | Machine Learning (Tamil) | Information Gain | 02:39:11 - 03:18:24 (2025-05-08) || | ||||
33 | Machine Learning (Tamil) | Discriminative models | 03:18:24 - 03:38:00 (2025-05-08) || | ||||
34 | Algorithms using Java | Binary Search Tree | 03:38:00 - 03:59:43 (2025-05-08) || | ||||
35 | Algorithms using Java | Binary Search Tree | 03:59:43 - 04:36:26 (2025-05-08) || | ||||
36 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 2 | 04:36:26 - 05:52:58 (2025-05-08) || | ||||
37 | Computing for HumanComputer Interaction | trends | 05:52:58 - 06:45:33 (2025-05-08) || | ||||
38 | Image Processing and Computer Vision | (Part-II) | 06:45:33 - 07:43:19 (2025-05-08) || | ||||
39 | Artificial Intelligence | Analysis of Alpha Beta Pruning | 08:00:00 - 08:20:29 || 07:40:10 - 08:00:00 (2025-05-09) || | ||||
40 | Artificial Intelligence | Analysis of Alpha Beta Pruning(Contd.) | 08:20:29 - 09:01:05 || | ||||
41 | Theory | 09:01:05 - 09:19:38 || | |||||
42 | Theory | 09:19:38 - 09:46:13 || | |||||
43 | of Speech Processing | 09:46:13 - 10:52:56 || | |||||
44 | Machine Learning (Tamil) | classifier | 10:52:56 - 11:16:21 || | ||||
45 | Machine Learning (Tamil) | Independence | 11:16:21 - 11:49:31 || | ||||
46 | Algorithms using Java | 11:49:31 - 12:19:04 || | |||||
47 | Algorithms using Java | Tree | 12:19:04 - 12:58:54 || | ||||
48 | SystemsDesign Verification and Test | Reprogrammable hardware | 12:58:54 - 13:59:48 || | ||||
49 | Computing for HumanComputer Interaction | and Software Engineering | 13:59:48 - 14:29:29 || | ||||
50 | Computing for HumanComputer Interaction | Contextual Inquiry | 14:29:29 - 14:52:01 || | ||||
51 | Image Processing and Computer Vision | (Part-III) | 14:52:01 - 15:51:16 || | ||||
52 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/c/K queues | 15:51:16 - 16:23:46 || | ||||
53 | Computer and Network Performance Analysis using Queuing System | 16:23:46 - 16:51:51 || | |||||
54 | Python | analytics | 16:51:51 - 17:26:52 || | ||||
55 | Python | I | 17:26:52 - 17:53:39 || | ||||
56 | Machine IV | 17:53:39 - 18:24:02 || | |||||
57 | Machine V | 18:24:02 - 18:52:28 || | |||||
58 | Algorithms | Derandomization | 18:52:28 - 19:50:53 || | ||||
59 | Language Processing | 19:50:53 - 20:11:41 || | |||||
60 | Language Processing | Bayes Rule, Language Model | 20:11:41 - 20:24:19 || | ||||
61 | Language Processing | Alignment Variables | 20:24:19 - 20:53:52 || | ||||
62 | Distributed Systems | Virtualization | 20:53:52 - 21:50:22 || | ||||
63 | Part II | for Perfectly-Secure Byzantine Agreement: Part II | 21:50:22 - 22:22:43 || | ||||
64 | Part II | Perfectly-Secure Byzantine Agreement | 22:22:43 - 22:55:29 || | ||||
65 | Architecture Storage & Interconnects | Bufferless NoC Routers | 22:55:29 - 23:41:58 || | ||||
66 | Modern C++ | Recap of C/2 | 23:41:58 - 00:17:49 || | ||||
67 | Modern C++ | 00:17:49 - 00:51:12 (2025-05-09) || | |||||
68 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 1 | 00:51:12 - 01:47:37 (2025-05-09) || | ||||
69 | Networks | Classification - Part 1 | 01:47:37 - 02:17:20 (2025-05-09) || | ||||
70 | Networks | Classification - Part 2 | 02:17:20 - 02:42:56 (2025-05-09) || | ||||
71 | An Introduction | 02:42:56 - 03:31:40 (2025-05-09) || | |||||
72 | Systems | 03:31:40 - 04:38:51 (2025-05-09) || | |||||
73 | Security | Part 2 | 04:38:51 - 05:10:39 (2025-05-09) || | ||||
74 | Security | and Phishing Attacks - Part 1 | 05:10:39 - 05:44:55 (2025-05-09) || | ||||
75 | Bitonic-Sort-Merge Sort (BSMS) | 05:44:55 - 06:42:16 (2025-05-09) || | |||||
76 | Scheduling | 06:42:16 - 07:40:10 (2025-05-09) || | |||||
77 | Modern C++ | 08:00:00 - 08:32:06 || 07:41:29 - 08:00:00 (2025-05-10) || | |||||
78 | Modern C++ | 08:32:06 - 09:01:28 || | |||||
79 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 2 | 09:01:28 - 09:25:49 || | ||||
80 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Business Models - Part 1 | 09:25:49 - 10:02:18 || | ||||
81 | Networks | Classification - Part 3 | 10:02:18 - 10:35:49 || | ||||
82 | Networks | Classification Implementation - Part 1 | 10:35:49 - 11:12:10 || | ||||
83 | An Introduction | 11:12:10 - 12:05:36 || | |||||
84 | Systems | 12:05:36 - 13:17:07 || | |||||
85 | Security | and Phishing Attacks - Part 2 | 13:17:07 - 13:43:14 || | ||||
86 | Security | Security - Part 1 | 13:43:14 - 14:16:24 || | ||||
87 | Colouring | 14:16:24 - 15:02:08 || | |||||
88 | MRLC and MLRC Scheduling | 15:02:08 - 15:59:31 || | |||||
89 | Artificial Intelligence | Analysis of Alpha Beta Pruning | 15:59:31 - 16:20:00 || | ||||
90 | Artificial Intelligence | Analysis of Alpha Beta Pruning(Contd.) | 16:20:00 - 17:00:36 || | ||||
91 | Theory | 17:00:36 - 17:19:09 || | |||||
92 | Theory | 17:19:09 - 17:45:44 || | |||||
93 | of Speech Processing | 17:45:44 - 18:52:27 || | |||||
94 | Machine Learning (Tamil) | classifier | 18:52:27 - 19:15:52 || | ||||
95 | Machine Learning (Tamil) | Independence | 19:15:52 - 19:49:02 || | ||||
96 | Algorithms using Java | 19:49:02 - 20:18:35 || | |||||
97 | Algorithms using Java | Tree | 20:18:35 - 20:58:25 || | ||||
98 | SystemsDesign Verification and Test | Reprogrammable hardware | 20:58:25 - 21:59:19 || | ||||
99 | Computing for HumanComputer Interaction | and Software Engineering | 21:59:19 - 22:29:00 || | ||||
100 | Computing for HumanComputer Interaction | Contextual Inquiry | 22:29:00 - 22:51:32 || | ||||
101 | Image Processing and Computer Vision | (Part-III) | 22:51:32 - 23:50:47 || | ||||
102 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/c/K queues | 23:50:47 - 00:23:17 || | ||||
103 | Computer and Network Performance Analysis using Queuing System | 00:23:17 - 00:51:22 (2025-05-10) || | |||||
104 | Python | analytics | 00:51:22 - 01:26:23 (2025-05-10) || | ||||
105 | Python | I | 01:26:23 - 01:53:10 (2025-05-10) || | ||||
106 | Machine IV | 01:53:10 - 02:23:33 (2025-05-10) || | |||||
107 | Machine V | 02:23:33 - 02:51:59 (2025-05-10) || | |||||
108 | Algorithms | Derandomization | 02:51:59 - 03:50:24 (2025-05-10) || | ||||
109 | Language Processing | 03:50:24 - 04:11:12 (2025-05-10) || | |||||
110 | Language Processing | Bayes Rule, Language Model | 04:11:12 - 04:23:50 (2025-05-10) || | ||||
111 | Language Processing | Alignment Variables | 04:23:50 - 04:53:23 (2025-05-10) || | ||||
112 | Distributed Systems | Virtualization | 04:53:23 - 05:49:53 (2025-05-10) || | ||||
113 | Part II | for Perfectly-Secure Byzantine Agreement: Part II | 05:49:53 - 06:22:14 (2025-05-10) || | ||||
114 | Part II | Perfectly-Secure Byzantine Agreement | 06:22:14 - 06:55:00 (2025-05-10) || | ||||
115 | Architecture Storage & Interconnects | Bufferless NoC Routers | 06:55:00 - 07:41:29 (2025-05-10) || | ||||
116 | Computer and Network Performance Analysis using Queuing System | examples and A Case Study of Open Load test on a Web server | 08:00:00 - 08:32:17 || 07:50:45 - 08:00:00 (2025-05-11) || | ||||
117 | Computer and Network Performance Analysis using Queuing System | M/G/1 queue and Memoryless Arrivals | 08:32:17 - 09:08:50 || | ||||
118 | Python | II | 09:08:50 - 10:00:56 || | ||||
119 | 10:00:56 - 10:30:03 || | ||||||
120 | Networks I | 10:30:03 - 10:57:24 || | |||||
121 | Algorithms | Travelling Salesman Problem | 10:57:24 - 11:29:45 || | ||||
122 | Algorithms | Factor Approximation Algorithm for Metric TSP | 11:29:45 - 11:58:37 || | ||||
123 | Language Processing | 11:58:37 - 12:13:47 || | |||||
124 | Language Processing | 12:13:47 - 12:41:34 || | |||||
125 | Distributed Systems | Network Application to Networking in the cloud | 12:41:34 - 13:47:35 || | ||||
126 | Part II | Reliable Broadcast | 13:47:35 - 14:25:00 || | ||||
127 | Part II | Reliable Broadcast Protocol: Analysis | 14:25:00 - 14:49:38 || | ||||
128 | Architecture Storage & Interconnects | Deflection Routers | 14:49:38 - 15:59:58 || | ||||
129 | Modern C++ | 15:59:58 - 16:32:04 || | |||||
130 | Modern C++ | 16:32:04 - 17:01:26 || | |||||
131 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 2 | 17:01:26 - 17:25:47 || | ||||
132 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Business Models - Part 1 | 17:25:47 - 18:02:16 || | ||||
133 | Networks | Classification - Part 3 | 18:02:16 - 18:35:47 || | ||||
134 | Networks | Classification Implementation - Part 1 | 18:35:47 - 19:12:08 || | ||||
135 | An Introduction | 19:12:08 - 20:05:34 || | |||||
136 | Systems | 20:05:34 - 21:17:05 || | |||||
137 | Security | and Phishing Attacks - Part 2 | 21:17:05 - 21:43:12 || | ||||
138 | Security | Security - Part 1 | 21:43:12 - 22:16:22 || | ||||
139 | Colouring | 22:16:22 - 23:02:06 || | |||||
140 | MRLC and MLRC Scheduling | 23:02:06 - 23:59:29 || | |||||
141 | Artificial Intelligence | Analysis of Alpha Beta Pruning | 23:59:29 - 00:19:58 || | ||||
142 | Artificial Intelligence | Analysis of Alpha Beta Pruning(Contd.) | 00:19:58 - 01:00:34 (2025-05-11) || | ||||
143 | Theory | 01:00:34 - 01:19:07 (2025-05-11) || | |||||
144 | Theory | 01:19:07 - 01:45:42 (2025-05-11) || | |||||
145 | of Speech Processing | 01:45:42 - 02:52:25 (2025-05-11) || | |||||
146 | Machine Learning (Tamil) | classifier | 02:52:25 - 03:15:50 (2025-05-11) || | ||||
147 | Machine Learning (Tamil) | Independence | 03:15:50 - 03:49:00 (2025-05-11) || | ||||
148 | Algorithms using Java | 03:49:00 - 04:18:33 (2025-05-11) || | |||||
149 | Algorithms using Java | Tree | 04:18:33 - 04:58:23 (2025-05-11) || | ||||
150 | SystemsDesign Verification and Test | Reprogrammable hardware | 04:58:23 - 05:59:17 (2025-05-11) || | ||||
151 | Computing for HumanComputer Interaction | and Software Engineering | 05:59:17 - 06:28:58 (2025-05-11) || | ||||
152 | Computing for HumanComputer Interaction | Contextual Inquiry | 06:28:58 - 06:51:30 (2025-05-11) || | ||||
153 | Image Processing and Computer Vision | (Part-III) | 06:51:30 - 07:50:45 (2025-05-11) || | ||||
154 | Artificial Intelligence | Horizon Effect, Game Databases & Other Ideas | 08:00:00 - 08:29:56 || 07:53:27 - 08:00:00 (2025-05-13) || | ||||
155 | Artificial Intelligence | Summary and Other Games | 08:29:56 - 09:00:29 || | ||||
156 | Theory | 09:00:29 - 09:26:53 || | |||||
157 | Theory | 09:26:53 - 09:50:04 || | |||||
158 | of Speech Processing | 09:50:04 - 10:59:15 || | |||||
159 | Machine Learning (Tamil) | models | 10:59:15 - 11:18:31 || | ||||
160 | Machine Learning (Tamil) | 11:18:31 - 11:59:32 || | |||||
161 | Algorithms using Java | 11:59:32 - 13:00:01 || | |||||
162 | SystemsDesign Verification and Test | between Hardware and Software | 13:00:01 - 14:03:28 || | ||||
163 | Computing for HumanComputer Interaction | Design Guidelines | 14:03:28 - 14:27:42 || | ||||
164 | Computing for HumanComputer Interaction | Prototyping | 14:27:42 - 14:55:44 || | ||||
165 | Image Processing and Computer Vision | Processing(Part-I) | 14:55:44 - 15:53:58 || | ||||
166 | Computer and Network Performance Analysis using Queuing System | examples and A Case Study of Open Load test on a Web server | 15:53:58 - 16:26:15 || | ||||
167 | Computer and Network Performance Analysis using Queuing System | M/G/1 queue and Memoryless Arrivals | 16:26:15 - 17:02:48 || | ||||
168 | Python | II | 17:02:48 - 17:54:54 || | ||||
169 | 17:54:54 - 18:24:01 || | ||||||
170 | Networks I | 18:24:01 - 18:51:22 || | |||||
171 | Algorithms | Travelling Salesman Problem | 18:51:22 - 19:23:43 || | ||||
172 | Algorithms | Factor Approximation Algorithm for Metric TSP | 19:23:43 - 19:52:35 || | ||||
173 | Language Processing | 19:52:35 - 20:07:45 || | |||||
174 | Language Processing | 20:07:45 - 20:35:32 || | |||||
175 | Distributed Systems | Network Application to Networking in the cloud | 20:35:32 - 21:41:33 || | ||||
176 | Part II | Reliable Broadcast | 21:41:33 - 22:18:58 || | ||||
177 | Part II | Reliable Broadcast Protocol: Analysis | 22:18:58 - 22:43:36 || | ||||
178 | Architecture Storage & Interconnects | Deflection Routers | 22:43:36 - 23:53:56 || | ||||
179 | Modern C++ | 23:53:56 - 00:26:02 || | |||||
180 | Modern C++ | 00:26:02 - 00:55:24 (2025-05-13) || | |||||
181 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 2 | 00:55:24 - 01:19:45 (2025-05-13) || | ||||
182 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Business Models - Part 1 | 01:19:45 - 01:56:14 (2025-05-13) || | ||||
183 | Networks | Classification - Part 3 | 01:56:14 - 02:29:45 (2025-05-13) || | ||||
184 | Networks | Classification Implementation - Part 1 | 02:29:45 - 03:06:06 (2025-05-13) || | ||||
185 | An Introduction | 03:06:06 - 03:59:32 (2025-05-13) || | |||||
186 | Systems | 03:59:32 - 05:11:03 (2025-05-13) || | |||||
187 | Security | and Phishing Attacks - Part 2 | 05:11:03 - 05:37:10 (2025-05-13) || | ||||
188 | Security | Security - Part 1 | 05:37:10 - 06:10:20 (2025-05-13) || | ||||
189 | Colouring | 06:10:20 - 06:56:04 (2025-05-13) || | |||||
190 | MRLC and MLRC Scheduling | 06:56:04 - 07:53:27 (2025-05-13) || | |||||
191 | Modern C++ | Searching | 08:00:00 - 08:31:13 || 07:54:29 - 08:00:00 (2025-05-14) || | ||||
192 | Modern C++ | Data Structures / Containers | 08:31:13 - 09:02:57 || | ||||
193 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Business Models - Part 2 | 09:02:57 - 09:30:54 || | ||||
194 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Reference Architecture - Part 1 | 09:30:54 - 09:51:03 || | ||||
195 | Industry 4.0 and Industrial Internet of Things | Reference Architecture for Iiot: Reference Architecture - Part 2 | 09:51:03 - 10:06:04 || | ||||
196 | Networks | Classification Implementation - Part 2 | 10:06:04 - 10:59:44 || | ||||
197 | An Introduction | 10:59:44 - 11:49:56 || | |||||
198 | Systems | 11:49:56 - 12:54:59 || | |||||
199 | Security | Security - Part 1 | 12:54:59 - 13:28:09 || | ||||
200 | Security | Security - Part 2 | 13:28:09 - 13:56:33 || | ||||
201 | 13:56:33 - 14:52:06 || | ||||||
202 | Scheduling | 14:52:06 - 15:22:55 || | |||||
203 | Multiprocessor Scheduling | 15:22:55 - 16:00:33 || | |||||
204 | Artificial Intelligence | Horizon Effect, Game Databases & Other Ideas | 16:00:33 - 16:30:29 || | ||||
205 | Artificial Intelligence | Summary and Other Games | 16:30:29 - 17:01:02 || | ||||
206 | Theory | 17:01:02 - 17:27:26 || | |||||
207 | Theory | 17:27:26 - 17:50:37 || | |||||
208 | of Speech Processing | 17:50:37 - 18:59:48 || | |||||
209 | Machine Learning (Tamil) | models | 18:59:48 - 19:19:04 || | ||||
210 | Machine Learning (Tamil) | 19:19:04 - 20:00:05 || | |||||
211 | Algorithms using Java | 20:00:05 - 21:00:34 || | |||||
212 | SystemsDesign Verification and Test | between Hardware and Software | 21:00:34 - 22:04:01 || | ||||
213 | Computing for HumanComputer Interaction | Design Guidelines | 22:04:01 - 22:28:15 || | ||||
214 | Computing for HumanComputer Interaction | Prototyping | 22:28:15 - 22:56:17 || | ||||
215 | Image Processing and Computer Vision | Processing(Part-I) | 22:56:17 - 23:54:31 || | ||||
216 | Computer and Network Performance Analysis using Queuing System | examples and A Case Study of Open Load test on a Web server | 23:54:31 - 00:26:48 || | ||||
217 | Computer and Network Performance Analysis using Queuing System | M/G/1 queue and Memoryless Arrivals | 00:26:48 - 01:03:21 (2025-05-14) || | ||||
218 | Python | II | 01:03:21 - 01:55:27 (2025-05-14) || | ||||
219 | 01:55:27 - 02:24:34 (2025-05-14) || | ||||||
220 | Networks I | 02:24:34 - 02:51:55 (2025-05-14) || | |||||
221 | Algorithms | Travelling Salesman Problem | 02:51:55 - 03:24:16 (2025-05-14) || | ||||
222 | Algorithms | Factor Approximation Algorithm for Metric TSP | 03:24:16 - 03:53:08 (2025-05-14) || | ||||
223 | Language Processing | 03:53:08 - 04:08:18 (2025-05-14) || | |||||
224 | Language Processing | 04:08:18 - 04:36:05 (2025-05-14) || | |||||
225 | Distributed Systems | Network Application to Networking in the cloud | 04:36:05 - 05:42:06 (2025-05-14) || | ||||
226 | Part II | Reliable Broadcast | 05:42:06 - 06:19:31 (2025-05-14) || | ||||
227 | Part II | Reliable Broadcast Protocol: Analysis | 06:19:31 - 06:44:09 (2025-05-14) || | ||||
228 | Architecture Storage & Interconnects | Deflection Routers | 06:44:09 - 07:54:29 (2025-05-14) || |
Swayam Prabha copyright © 2024 INFLIBNET Centre. All rights reserved.