No. | Subject | Course | Topic | User Category | Telecast Date / Day | Telecast Time | Repeat Time |
---|---|---|---|---|---|---|---|
1 | Artificial Intelligence | Pattern Database Heuristics Part-7 | 08:00:00 - 08:20:24 || 07:54:39 - 08:00:00 (2025-04-25) || | ||||
2 | Artificial Intelligence | Satisfaction Vs Optimization Part-1 | 08:20:24 - 08:40:00 || | ||||
3 | Artificial Intelligence | Example of N-Queens Part-2 | 08:40:00 - 08:53:42 || | ||||
4 | Computing 1 | 08:53:42 - 10:00:23 || | |||||
5 | of Speech Processing | Estimation | 10:00:23 - 10:58:58 || | ||||
6 | Machine Learning (Tamil) | Descent and basis functions | 10:58:58 - 11:27:39 || | ||||
7 | Machine Learning (Tamil) | Techniques | 11:27:39 - 12:01:29 || | ||||
8 | Algorithms using Java | 12:01:29 - 13:00:14 || | |||||
9 | SystemsDesign Verification and Test | faults in Real time Embedded Systems | 13:00:14 - 13:55:58 || | ||||
10 | Competitive Programming | Covers | 13:55:58 - 14:33:26 || | ||||
11 | Competitive Programming | Programming with Frog 1_Part A | 14:33:26 - 15:05:49 || | ||||
12 | Image Processing and Computer Vision | Color Processing- I(Part-1) | 15:05:49 - 16:01:55 || | ||||
13 | Architecture Design & use cases | – Corda Part 2 | 16:01:55 - 16:29:49 || | ||||
14 | Architecture Design & use cases | course | 16:29:49 - 17:04:32 || | ||||
15 | Using Python R25 | 17:04:32 - 17:54:19 || | |||||
16 | 17:54:19 - 18:24:12 || | ||||||
17 | II | 18:24:12 - 18:49:10 || | |||||
18 | Algorithms | Completeness of Independent Set | 18:49:10 - 19:21:29 || | ||||
19 | Algorithms | Completeness of vertex cover and clique | 19:21:29 - 19:51:08 || | ||||
20 | Language Processing | complexity - sub-sampling, negative sampling | 19:51:08 - 20:03:53 || | ||||
21 | Language Processing | Hierarchical softmax | 20:03:53 - 20:23:42 || | ||||
22 | Language Processing | layer to Softmax | 20:23:42 - 21:02:19 || | ||||
23 | IoT Edge ML | 21:02:19 - 22:01:49 || | |||||
24 | Part II | and Byzantine Agreement | 22:01:49 - 22:54:18 || | ||||
25 | Architecture Storage & Interconnects | Mechanisms | 22:54:18 - 23:31:12 || | ||||
26 | Architecture Storage & Interconnects | 23:31:12 - 00:01:01 || | |||||
27 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 00:01:01 - 00:35:20 (2025-04-25) || | ||||
28 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 00:35:20 - 00:53:49 (2025-04-25) || | ||||
29 | Industry 4.0 and Industrial Internet of Things | Augmented Reality and Virtual Reality | 00:53:49 - 01:26:25 (2025-04-25) || | ||||
30 | Industry 4.0 and Industrial Internet of Things | Artificial Intelligence | 01:26:25 - 01:59:43 (2025-04-25) || | ||||
31 | Networks | Lookup - Part 1 | 01:59:43 - 02:36:20 (2025-04-25) || | ||||
32 | Networks | Lookup - Part 2 | 02:36:20 - 03:04:55 (2025-04-25) || | ||||
33 | An Introduction | Part-II | 03:04:55 - 03:53:36 (2025-04-25) || | ||||
34 | Systems | 03:53:36 - 04:58:55 (2025-04-25) || | |||||
35 | Theory and Mechanism Design | Myerson's Lemma | 04:58:55 - 05:23:43 (2025-04-25) || | ||||
36 | Theory and Mechanism Design | Design | 05:23:43 - 05:46:48 (2025-04-25) || | ||||
37 | Theory and Mechanism Design | Mechanism Design | 05:46:48 - 06:03:54 (2025-04-25) || | ||||
38 | 06:03:54 - 07:01:38 (2025-04-25) || | ||||||
39 | C-Based VLSI Design | 07:01:38 - 07:54:39 (2025-04-25) || | |||||
40 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:00:00 - 08:27:51 || | ||||
41 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:27:51 - 08:54:58 || | ||||
42 | Industry 4.0 and Industrial Internet of Things | Data and Advanced Analysis | 08:54:58 - 09:18:42 || | ||||
43 | Industry 4.0 and Industrial Internet of Things | Cybersecurity | 09:18:42 - 10:01:31 || | ||||
44 | Networks | Lookup: Trie Based Data Structures - Part 1 | 10:01:31 - 10:47:58 || | ||||
45 | An Introduction | Part-III | 10:47:58 - 11:46:11 || | ||||
46 | Systems | 11:46:11 - 12:53:01 || | |||||
47 | Theory and Mechanism Design | Optimal Mechanism Design | 12:53:01 - 13:04:35 || | ||||
48 | Theory and Mechanism Design | Mechanisms | 13:04:35 - 13:26:07 || | ||||
49 | Theory and Mechanism Design | 13:26:07 - 13:55:07 || | |||||
50 | 13:55:07 - 14:58:55 || | ||||||
51 | An Overview | 14:58:55 - 16:00:06 || | |||||
52 | Artificial Intelligence | Pattern Database Heuristics Part-7 | 16:00:06 - 16:20:30 || | ||||
53 | Artificial Intelligence | Satisfaction Vs Optimization Part-1 | 16:20:30 - 16:40:06 || | ||||
54 | Artificial Intelligence | Example of N-Queens Part-2 | 16:40:06 - 16:53:48 || | ||||
55 | Computing 1 | 16:53:48 - 18:00:29 || | |||||
56 | of Speech Processing | Estimation | 18:00:29 - 18:59:04 || | ||||
57 | Machine Learning (Tamil) | Descent and basis functions | 18:59:04 - 19:27:45 || | ||||
58 | Machine Learning (Tamil) | Techniques | 19:27:45 - 20:01:35 || | ||||
59 | Algorithms using Java | 20:01:35 - 21:00:20 || | |||||
60 | SystemsDesign Verification and Test | faults in Real time Embedded Systems | 21:00:20 - 21:56:04 || | ||||
61 | Competitive Programming | Covers | 21:56:04 - 22:33:32 || | ||||
62 | Competitive Programming | Programming with Frog 1_Part A | 22:33:32 - 23:05:55 || | ||||
63 | Image Processing and Computer Vision | Color Processing- I(Part-1) | 23:05:55 - 00:02:01 || | ||||
64 | Architecture Design & use cases | – Corda Part 2 | 00:02:01 - 00:29:55 (2025-04-26) || | ||||
65 | Architecture Design & use cases | course | 00:29:55 - 01:04:38 (2025-04-26) || | ||||
66 | Using Python R25 | 01:04:38 - 01:54:25 (2025-04-26) || | |||||
67 | 01:54:25 - 02:24:18 (2025-04-26) || | ||||||
68 | II | 02:24:18 - 02:49:16 (2025-04-26) || | |||||
69 | Algorithms | Completeness of Independent Set | 02:49:16 - 03:21:35 (2025-04-26) || | ||||
70 | Algorithms | Completeness of vertex cover and clique | 03:21:35 - 03:51:14 (2025-04-26) || | ||||
71 | Language Processing | complexity - sub-sampling, negative sampling | 03:51:14 - 04:03:59 (2025-04-26) || | ||||
72 | Language Processing | Hierarchical softmax | 04:03:59 - 04:23:48 (2025-04-26) || | ||||
73 | Language Processing | layer to Softmax | 04:23:48 - 05:02:25 (2025-04-26) || | ||||
74 | IoT Edge ML | 05:02:25 - 06:01:55 (2025-04-26) || | |||||
75 | Part II | and Byzantine Agreement | 06:01:55 - 06:54:24 (2025-04-26) || | ||||
76 | Architecture Storage & Interconnects | Mechanisms | 06:54:24 - 07:31:18 (2025-04-26) || | ||||
77 | Architecture Storage & Interconnects | 07:31:18 - 08:00:00 (2025-04-26) || | |||||
78 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 08:00:00 - 08:27:11 || 07:55:35 - 08:00:00 (2025-04-27) || | ||||
79 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 08:27:11 - 08:59:43 || | ||||
80 | Using Python R25 | Google Work | 08:59:43 - 09:56:19 || | ||||
81 | 09:56:19 - 10:26:23 || | ||||||
82 | 10:26:23 - 10:53:33 || | ||||||
83 | Algorithms | Completeness of 3 - coloring | 10:53:33 - 11:28:08 || | ||||
84 | Algorithms | Completeness of Subset sum and Knapsack | 11:28:08 - 12:05:24 || | ||||
85 | Language Processing | Introduction | 12:05:24 - 12:21:39 || | ||||
86 | Language Processing | limitations | 12:21:39 - 12:37:20 || | ||||
87 | Language Processing | and its applications | 12:37:20 - 13:02:28 || | ||||
88 | Distributed Systems | cloud Computing | 13:02:28 - 13:58:58 || | ||||
89 | Part II | Perfectly-Secure Byzantine Agreement | 13:58:58 - 15:02:16 || | ||||
90 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 15:02:16 - 15:53:34 || | ||||
91 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 15:53:34 - 16:21:25 || | ||||
92 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:21:25 - 16:48:32 || | ||||
93 | Industry 4.0 and Industrial Internet of Things | Data and Advanced Analysis | 16:48:32 - 17:12:16 || | ||||
94 | Industry 4.0 and Industrial Internet of Things | Cybersecurity | 17:12:16 - 17:55:05 || | ||||
95 | Networks | Lookup: Trie Based Data Structures - Part 1 | 17:55:05 - 18:41:32 || | ||||
96 | An Introduction | Part-III | 18:41:32 - 19:39:45 || | ||||
97 | Systems | 19:39:45 - 20:46:35 || | |||||
98 | Theory and Mechanism Design | Optimal Mechanism Design | 20:46:35 - 20:58:09 || | ||||
99 | Theory and Mechanism Design | Mechanisms | 20:58:09 - 21:19:41 || | ||||
100 | Theory and Mechanism Design | 21:19:41 - 21:48:41 || | |||||
101 | 21:48:41 - 22:52:29 || | ||||||
102 | An Overview | 22:52:29 - 23:53:40 || | |||||
103 | Artificial Intelligence | Pattern Database Heuristics Part-7 | 23:53:40 - 00:14:04 || | ||||
104 | Artificial Intelligence | Satisfaction Vs Optimization Part-1 | 00:14:04 - 00:33:40 (2025-04-27) || | ||||
105 | Artificial Intelligence | Example of N-Queens Part-2 | 00:33:40 - 00:47:22 (2025-04-27) || | ||||
106 | Computing 1 | 00:47:22 - 01:54:03 (2025-04-27) || | |||||
107 | of Speech Processing | Estimation | 01:54:03 - 02:52:38 (2025-04-27) || | ||||
108 | Machine Learning (Tamil) | Descent and basis functions | 02:52:38 - 03:21:19 (2025-04-27) || | ||||
109 | Machine Learning (Tamil) | Techniques | 03:21:19 - 03:55:09 (2025-04-27) || | ||||
110 | Algorithms using Java | 03:55:09 - 04:53:54 (2025-04-27) || | |||||
111 | SystemsDesign Verification and Test | faults in Real time Embedded Systems | 04:53:54 - 05:49:38 (2025-04-27) || | ||||
112 | Competitive Programming | Covers | 05:49:38 - 06:27:06 (2025-04-27) || | ||||
113 | Competitive Programming | Programming with Frog 1_Part A | 06:27:06 - 06:59:29 (2025-04-27) || | ||||
114 | Image Processing and Computer Vision | Color Processing- I(Part-1) | 06:59:29 - 07:55:35 (2025-04-27) || | ||||
115 | Artificial Intelligence | Climbing Part-3 | 08:00:00 - 08:18:34 || 07:50:33 - 08:00:00 (2025-04-29) || | ||||
116 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 08:18:34 - 08:38:16 || | ||||
117 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 08:38:16 - 08:58:40 || | ||||
118 | Computing 2 | 08:58:40 - 10:02:28 || | |||||
119 | of Speech Processing | Estimation | 10:02:28 - 11:01:05 || | ||||
120 | Machine Learning (Tamil) | Orthogonal Projection | 11:01:05 - 11:42:40 || | ||||
121 | Machine Learning (Tamil) | Classification | 11:42:40 - 12:10:14 || | ||||
122 | Algorithms using Java | Data Structures | 12:10:14 - 12:57:50 || | ||||
123 | SystemsDesign Verification and Test | Systems | 12:57:50 - 13:58:54 || | ||||
124 | Competitive Programming | Programming with Frog 1_Part B | 13:58:54 - 14:19:04 || | ||||
125 | Competitive Programming | Programming with Dice Combinations | 14:19:04 - 14:59:40 || | ||||
126 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 14:59:40 - 15:56:53 || | ||||
127 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 15:56:53 - 16:24:04 || | ||||
128 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 16:24:04 - 16:56:36 || | ||||
129 | Using Python R25 | Google Work | 16:56:36 - 17:53:12 || | ||||
130 | 17:53:12 - 18:23:16 || | ||||||
131 | 18:23:16 - 18:50:26 || | ||||||
132 | Algorithms | Completeness of 3 - coloring | 18:50:26 - 19:25:01 || | ||||
133 | Algorithms | Completeness of Subset sum and Knapsack | 19:25:01 - 20:02:17 || | ||||
134 | Language Processing | Introduction | 20:02:17 - 20:18:32 || | ||||
135 | Language Processing | limitations | 20:18:32 - 20:34:13 || | ||||
136 | Language Processing | and its applications | 20:34:13 - 20:59:21 || | ||||
137 | Distributed Systems | cloud Computing | 20:59:21 - 21:55:51 || | ||||
138 | Part II | Perfectly-Secure Byzantine Agreement | 21:55:51 - 22:59:09 || | ||||
139 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 22:59:09 - 23:50:27 || | ||||
140 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 23:50:27 - 00:18:18 || | ||||
141 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 00:18:18 - 00:45:25 (2025-04-29) || | ||||
142 | Industry 4.0 and Industrial Internet of Things | Data and Advanced Analysis | 00:45:25 - 01:09:09 (2025-04-29) || | ||||
143 | Industry 4.0 and Industrial Internet of Things | Cybersecurity | 01:09:09 - 01:51:58 (2025-04-29) || | ||||
144 | Networks | Lookup: Trie Based Data Structures - Part 1 | 01:51:58 - 02:38:25 (2025-04-29) || | ||||
145 | An Introduction | Part-III | 02:38:25 - 03:36:38 (2025-04-29) || | ||||
146 | Systems | 03:36:38 - 04:43:28 (2025-04-29) || | |||||
147 | Theory and Mechanism Design | Optimal Mechanism Design | 04:43:28 - 04:55:02 (2025-04-29) || | ||||
148 | Theory and Mechanism Design | Mechanisms | 04:55:02 - 05:16:34 (2025-04-29) || | ||||
149 | Theory and Mechanism Design | 05:16:34 - 05:45:34 (2025-04-29) || | |||||
150 | 05:45:34 - 06:49:22 (2025-04-29) || | ||||||
151 | An Overview | 06:49:22 - 07:50:33 (2025-04-29) || | |||||
152 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:00:00 - 08:22:16 || 07:48:11 - 08:00:00 (2025-04-30) || | ||||
153 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 08:22:16 - 09:09:14 || | ||||
154 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 09:09:14 - 09:52:58 || | ||||
155 | Networks | Computing - Part 1 | 09:52:58 - 10:30:32 || | ||||
156 | Networks | Lookup: Trie Based Data Structures - Part 2 | 10:30:32 - 10:55:29 || | ||||
157 | An Introduction | 10:55:29 - 11:50:39 || | |||||
158 | Systems | 11:50:39 - 13:05:11 || | |||||
159 | Security | Computer Security - Part 1 | 13:05:11 - 13:31:15 || | ||||
160 | Security | Computer Security - Part 2 | 13:31:15 - 14:02:26 || | ||||
161 | 14:02:26 - 14:56:10 || | ||||||
162 | Problem Formulation | 14:56:10 - 15:35:28 || | |||||
163 | Course Plan | 15:35:28 - 15:57:44 || | |||||
164 | Artificial Intelligence | Climbing Part-3 | 15:57:44 - 16:16:18 || | ||||
165 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 16:16:18 - 16:36:00 || | ||||
166 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 16:36:00 - 16:56:24 || | ||||
167 | Computing 2 | 16:56:24 - 18:00:12 || | |||||
168 | of Speech Processing | Estimation | 18:00:12 - 18:58:49 || | ||||
169 | Machine Learning (Tamil) | Orthogonal Projection | 18:58:49 - 19:40:24 || | ||||
170 | Machine Learning (Tamil) | Classification | 19:40:24 - 20:07:58 || | ||||
171 | Algorithms using Java | Data Structures | 20:07:58 - 20:55:34 || | ||||
172 | SystemsDesign Verification and Test | Systems | 20:55:34 - 21:56:38 || | ||||
173 | Competitive Programming | Programming with Frog 1_Part B | 21:56:38 - 22:16:48 || | ||||
174 | Competitive Programming | Programming with Dice Combinations | 22:16:48 - 22:57:24 || | ||||
175 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 22:57:24 - 23:54:37 || | ||||
176 | Computer and Network Performance Analysis using Queuing System | Introduction, why do delays happen, contention for resources | 23:54:37 - 00:21:48 || | ||||
177 | Computer and Network Performance Analysis using Queuing System | Performance metrics and parameters | 00:21:48 - 00:54:20 (2025-04-30) || | ||||
178 | Using Python R25 | Google Work | 00:54:20 - 01:50:56 (2025-04-30) || | ||||
179 | 01:50:56 - 02:21:00 (2025-04-30) || | ||||||
180 | 02:21:00 - 02:48:10 (2025-04-30) || | ||||||
181 | Algorithms | Completeness of 3 - coloring | 02:48:10 - 03:22:45 (2025-04-30) || | ||||
182 | Algorithms | Completeness of Subset sum and Knapsack | 03:22:45 - 04:00:01 (2025-04-30) || | ||||
183 | Language Processing | Introduction | 04:00:01 - 04:16:16 (2025-04-30) || | ||||
184 | Language Processing | limitations | 04:16:16 - 04:31:57 (2025-04-30) || | ||||
185 | Language Processing | and its applications | 04:31:57 - 04:57:05 (2025-04-30) || | ||||
186 | Distributed Systems | cloud Computing | 04:57:05 - 05:53:35 (2025-04-30) || | ||||
187 | Part II | Perfectly-Secure Byzantine Agreement | 05:53:35 - 06:56:53 (2025-04-30) || | ||||
188 | Architecture Storage & Interconnects | Tiled Chip Multicore Processors | 06:56:53 - 07:48:11 (2025-04-30) || | ||||
189 | Computer and Network Performance Analysis using Queuing System | Introducing Queuing Systems | 08:00:00 - 08:35:22 || 07:54:55 - 08:00:00 (2025-05-01) || | ||||
190 | Computer and Network Performance Analysis using Queuing System | Memoryless Distributions | 08:35:22 - 08:52:47 || | ||||
191 | Using Python | Google Work ? | 08:52:47 - 10:03:03 || | ||||
192 | 10:03:03 - 10:27:44 || | ||||||
193 | Machine I | 10:27:44 - 10:52:34 || | |||||
194 | Algorithms | Completeness of set cover, Weak and Strong NP - completeness | 10:52:34 - 11:29:05 || | ||||
195 | Algorithms | Reduction | 11:29:05 - 11:58:07 || | ||||
196 | Language Processing | 11:58:07 - 12:22:17 || | |||||
197 | Language Processing | for W,V and U | 12:22:17 - 12:34:07 || | ||||
198 | Language Processing | vanishing gradient | 12:34:07 - 12:49:39 || | ||||
199 | Distributed Systems | 12:49:39 - 13:50:33 || | |||||
200 | Part II | Perfectly-Secure Byzantine Agreement: Illustration | 13:50:33 - 14:25:50 || | ||||
201 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part I | 14:25:50 - 15:00:29 || | ||||
202 | Architecture Storage & Interconnects | in Network On Chip | 15:00:29 - 16:00:18 || | ||||
203 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:00:18 - 16:22:34 || | ||||
204 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:22:34 - 17:09:32 || | ||||
205 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 17:09:32 - 17:53:16 || | ||||
206 | Networks | Computing - Part 1 | 17:53:16 - 18:30:50 || | ||||
207 | Networks | Lookup: Trie Based Data Structures - Part 2 | 18:30:50 - 18:55:47 || | ||||
208 | An Introduction | 18:55:47 - 19:50:57 || | |||||
209 | Systems | 19:50:57 - 21:05:29 || | |||||
210 | Security | Computer Security - Part 1 | 21:05:29 - 21:31:33 || | ||||
211 | Security | Computer Security - Part 2 | 21:31:33 - 22:02:44 || | ||||
212 | 22:02:44 - 22:56:28 || | ||||||
213 | Problem Formulation | 22:56:28 - 23:35:46 || | |||||
214 | Course Plan | 23:35:46 - 23:58:02 || | |||||
215 | Artificial Intelligence | Climbing Part-3 | 23:58:02 - 00:16:36 || | ||||
216 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 00:16:36 - 00:36:18 (2025-05-01) || | ||||
217 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 00:36:18 - 00:56:42 (2025-05-01) || | ||||
218 | Computing 2 | 00:56:42 - 02:00:30 (2025-05-01) || | |||||
219 | of Speech Processing | Estimation | 02:00:30 - 02:59:07 (2025-05-01) || | ||||
220 | Machine Learning (Tamil) | Orthogonal Projection | 02:59:07 - 03:40:42 (2025-05-01) || | ||||
221 | Machine Learning (Tamil) | Classification | 03:40:42 - 04:08:16 (2025-05-01) || | ||||
222 | Algorithms using Java | Data Structures | 04:08:16 - 04:55:52 (2025-05-01) || | ||||
223 | SystemsDesign Verification and Test | Systems | 04:55:52 - 05:56:56 (2025-05-01) || | ||||
224 | Competitive Programming | Programming with Frog 1_Part B | 05:56:56 - 06:17:06 (2025-05-01) || | ||||
225 | Competitive Programming | Programming with Dice Combinations | 06:17:06 - 06:57:42 (2025-05-01) || | ||||
226 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 06:57:42 - 07:54:55 (2025-05-01) || |
Swayam Prabha copyright © 2024 INFLIBNET Centre. All rights reserved.