Full Length Lecture Videos
Ultimate Information Security Course
44 Videos
Lecture 37 | Problems on PDA Part 3 | Odd Palindrome | Push Down Automata | PDA | TCS | Sridhar Iyer
Lecture 41| Problems on Turing Machines Part 1 | How to design a Turing Machine | TCS | Sridhar Iyer
Lecture 42 | Problems on Turing Machines Part 2 | How to design a Turing Machine |TCS | Sridhar Iyer
Lecture 43 |Part 3| Problems on Turing Machines | How to design a Turing Machine |TCS | Sridhar Iyer
Lecture 44 |Part 4| Problems on Turing Machines | How to design a Turing Machine |TCS | Sridhar Iyer
Short Explainer Videos
Ultimate Information Security Course
14 Videos
Topic Wise Notes
- Lecture 1 Intro
- Lecture 2 Basics of FSM
- Lecture 3 Basic Problems on FSM
- Lecture 4 Basics Problems on FSM
- Lecture 5 Regular languages and expressions
- Lecture 6 Regular languages and expressions
- Lecture 7 Arden’s Theorem (FA to RE)
- Lecture 8 DFA Minimization
- Lecture 9 DFA Minimization and NFA to DFA
- Lecture 10 NFA to DFA and Myhill Nerode
- Lecture 11 Moore and Mealy Machines
- Lecture 12 Moore Machines and Conversions
- Lecture 13 Moore Machines and Conversions and Pumping Lemma
- Lecture 14 Module 3 Regular Grammars
- Lecture 14 Pumping Lemma
- Lecture 15 Module 3 Regular Grammars
- Lecture 16 Module 3 Regular Grammars
- Lecture 17 Module 3 Simplification of Grammars
- Lecture 18 Module 3 Normal Forms
- Lecture 19 Module 4 Push Down Automata
- Lecture 20 Module 4 Push Down Automata
- Lecture 21-23 Module 4 CFG to PDA
- Lecture 24 Module 5 Turing Machines
- Lecture 25 Module 4 CFG to PDA
- Lecture 26 – 30 Module 5 Turing Machines