Skip to content
No results
  • About Us
  • Blog
  • Contact
  • E Lectures AI – Digital Learning for the Future
  • My account
  • Privacy Policy for ElecturesAI
E Lectures AI
  • About Us
  • Programming Courses
    • C++ Zero to Hero
    • Python for Data Science
  • Blog
  • Latest AI
  • Core Courses of CS
    • Programming Fundamentals
    • Object Oriented Programming
    • Database Systems
    • DLD
    • Data Structures
    • Information Security
    • Artificial Intelligence
    • Computer Network
    • Computer Organization & Architecture
    • Operating Systems
    • Design and Analysis of Algorithms
    • Theory of Automata
    • Cloud Computing
    • Calculus and Analytical Geometry
    • Linear Algebra
  • Departments
    • COMPUTER SCIENCE
      • Web Design and Development Framework
      • Mobile Application Development
    • SOFTWARE ENGINEERING
      • Software CASE Tools and Applications
      • Intelligent Software Engineering
    • DATA SCIENCE
    • ARTIFICIAL INTELLIGENCE
    • INFORMATION TECHNOLOGY
      • Cyber Security
      • Discrete Structures
    • COMPUTER ENGINEERING
    • COMPUTER GAMES DEVELOPMENT
    • MULTIMEDIA AND ANIMATION
    • ROBOTICS
    • HUMAN COMPUTER INTERACTION
    • INTERNET OF THINGS (IoT)
    • NETWORK INFRASTRUCTURE AND CLOUD COMPUTING
    • QUANTUM COMPUTING
    • HEALTH INFORMATICS
  • ADP & BS
    • 1st Semester Courses
      • Applied Physics
      • Functional English
    • 2nd Semester Courses
      • Climate Change
      • Introduction to Language Studies
      • Environmental Biology
      • Plant Systematics, Anatomy & Development
      • Expository Writing
    • 3rd Semester Courses
    • 4th Semester Courses
      • Web System and Technologies
      • Computer Organization & Assembly Language
      • Machine Learning
    • 5th Semester Courses
      • Deep Learning
    • 6th Semester Courses
      • Natural Language Processing
    • 7th Semester Courses
      • Data Mining
    • 8th Semester Courses
  • Contact
  • Privacy Policy for ElecturesAI
E Lectures AI
  • Mobile Application Development

Lecture 2 – Android Studio Setup and Project Structure

Android Studio Setup and Project Structure

Android Studio Setup and Project Structure is the foundation of every Android developer’s journey. In this lecture, we will learn how to install Android Studio step by step, configure SDK tools, and explore how each component in the Android project…

  • E Lectures Ai
  • November 8, 2025
  • Computer Organization & Assembly Language

Lecture 3: Cache Memory Deep Dive Locality, Mapping, Write Policies, TLB & Prefetching

Set-associative cache: index, tag, ways, and line offset.

How CPU caches work: locality, set mapping, write policies, replacement, TLB, prefetching, and how to measure cache performance in practice. Locality & AMAT Cache Organization Replacement & Write Policies The TLB Connection Prefetching Measuring Cache Behavior (Lab) Quick Check (with…

  • E Lectures Ai
  • November 8, 2025
  • Computer Organization & Assembly Language

Lecture 2: Instruction Execution, Caches & Memory Hierarchy

Lecture 2: Instruction Execution, Caches & Memory Hierarchy

CPU fetch–decode execute cycle, caches and memory hierarchy, virtual memory, the OS’s role, and how systems communicate over networks. Instruction Execution: Fetch → Decode → Execute Modern CPUs overlap these stages with pipelining and may issue multiple instructions per cycle…

  • E Lectures Ai
  • November 8, 2025
  • Information Security

Lecture 3- Symmetric and Asymmetric Cryptography AES, RSA/ECC, and Hybrid Encryption

Symmetric and asymmetric cryptography with AES lock and public-private keys

Symmetric and asymmetric cryptography, AES-GCM, RSA/ECC, key exchange, and hybrid encryption with practical tips, pitfalls, and commands. Definitions Symmetric Cryptography Common Algorithms Modes of Operation (for AES) Nonces/IVs Performance Typical Uses Asymmetric Cryptography Core Families Capabilities Performance Typical Uses Symmetric…

  • E Lectures Ai
  • November 7, 2025
  • Information Security

Lecture 2 – Security Design Principles 15 Rules for Building Secure Systems

Security design principles illustrated with icons

. 15 core security design principles least privilege, defense in depth, fail-safe defaults, and more with practical checklists and real examples. Why Security Design Principles Matter Security failures rarely come from one bug they come from design shortcuts. Principles give…

  • E Lectures Ai
  • November 7, 2025
  • Computer Organization & Assembly Language

Lecture 1: Introduction to Computer Systems & Compilation System (Bits, Bytes, and Integers)

Lecture 1: Introduction to Computer Systems & Compilation System (Bits, Bytes, and Integers)

Compilation System: understand how source code becomes machine code via preprocessing, compiling, assembling, linking, and loading. What is a Computer System? A computer system combines hardware (CPU, main memory, storage, I/O devices, buses) and software (OS, compilers, libraries, applications). Mental…

  • E Lectures Ai
  • November 7, 2025
Prev
1 … 19 20 21 22 23 24 25 … 35
Next
  • Privacy Policy for ElecturesAI
  • About Us
  • Contact

© 2025 ElecturesAI. All Rights Reserved.