robotics cloud computing engineering database dbms computer matlab kinematics networking cloud iot intrusion detection system windows reinforcement learning system data structure programming manipulator artificial intelligence wireless sensor network ids wsn virtualization leetcode powershell powershell ise fundamental big data data mining science management data communication iit frame transformation ai inverse jacobian fault icmp attack internet network sensor fdp kiit pwc generative ai virtualization: a key to effic provisioning virtual machine automating the cloud: a deep d platform google cloud gcp task scheduling scheduling raid load balancing cluster computing deployment models itu-t trapping rain water ii sliding puzzle open the lock number of operations to make network connected binary tree level order traversal minesweeper jump game iii maximum level sum of a binary tree race car merge k sorted lists cheapest flights within k stops trie relational data model network data model hierarchical data model relational database sql relational oracle three-tier two-tier protocols query processing query cost smart parking smart transportation smart grid smart water problem statemnet smart cities notes pipeline cmdlet filtering displaying sorting objects 5g operating system project management introduction manual lab data warehousing linked data data analysis multidimensional data warehousing compiler macros linker loader components of a programming system: assembler application software introduction: system software data base bcnf 3nf 2nf 1nf normalization ieee wi-fi bluetooth ieee 802.11 and bluetooth gigabit ethernet. fast ethernet cdma). wired lans (ethernet): traditional ethernet tdma channelization (fdma token passing) réservation controlled access (polling csma/ca) csma/cd csma hdlc and point-to-point protocol multiple access: selective repeat arq stop-and-wait arq. go-back-n arq error correction mechanism: hamming encoding. data checksum) crc error detection mechanism (linear codes error detection and correction: types of errors hashing indexing object-oriented model er-model c++ c structure codes case study javascript html web device communication connectivity actuation sensing kgp nptel best practices practical deep learning simulation guide machine learning vectors invers path planning mapping matrix inverse kinematics denavit hartenberg algorithm space iskcon spiritual hitesh mohapatra dhruva bfs dfs state space search fault tolerance transmission loading lifetime battery energy working threshold crop monitoring scenario failure recovery tolerance icmp intrusion applications appids dids flooding traffic jamming spoofing sniffing dns attack udp attack arp attack ip attack network attack nids terminolgy haystack security attack detection vssut anomaly detection header protocol ip header tcp/ip tcp hitesh ip datagram internet protocol wireless leakybucketalgorithm software development
See more