No. | Subject | Course | Topic | User Category | Telecast Date / Day | Telecast Time | Repeat Time |
---|---|---|---|---|---|---|---|
1 | Physical Systems | Lyapunov Stability, Barrier Functions | 08:00:00 - 08:37:30 || 07:45:59 - 08:00:00 (2025-03-22) || | ||||
2 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 08:37:30 - 09:00:44 || | ||||
3 | Modern C++ | Resource Management by Smart Pointers: Part 2 | 09:00:44 - 09:57:11 || | ||||
4 | Privacy Leaks, Profiling form PII - (Part I) | 09:57:11 - 11:00:46 || | |||||
5 | An Introduction | 11:00:46 - 11:59:35 || | |||||
6 | Systems | Hardware Behaviour with Processes | 11:59:35 - 13:03:23 || | ||||
7 | Theory and Mechanism Design | Arrow's Impossibility Result | 13:03:23 - 13:33:39 || | ||||
8 | Theory and Mechanism Design | Result | 13:33:39 - 14:05:51 || | ||||
9 | Algorithms | checkable proofs - II | 14:05:51 - 15:00:45 || | ||||
10 | Network Security | Hash Algorithm (SHA) | 15:00:45 - 15:33:03 || | ||||
11 | Network Security | Signature Standard (DSS) | 15:33:03 - 16:01:54 || | ||||
12 | Intelligence: Search methods for problem solving | 16:01:54 - 16:25:02 || | |||||
13 | Intelligence: Search methods for problem solving | 16:25:02 - 17:00:14 || | |||||
14 | 17:00:14 - 17:43:19 || | ||||||
15 | of Speech Processing | Analysis of Speech 3 | 17:43:19 - 18:37:52 || | ||||
16 | Machine Learning | Maximization | 18:37:52 - 19:10:33 || | ||||
17 | Machine Learning | Maximization Continued | 19:10:33 - 19:49:09 || | ||||
18 | Algorithms using Java | Arrays | 19:49:09 - 20:23:14 || | ||||
19 | Algorithms using Java | 20:23:14 - 20:55:11 || | |||||
20 | SystemsDesign Verification and Test | Algorithm | 20:55:11 - 22:10:26 || | ||||
21 | Competitive Programming | 22:10:26 - 22:40:47 || | |||||
22 | Competitive Programming | 22:40:47 - 23:13:39 || | |||||
23 | Complexity Theory | 23:13:39 - 23:55:49 || | |||||
24 | Architecture Design & use cases | Government – III (Digital Identity) | 23:55:49 - 00:25:02 || | ||||
25 | Architecture Design & use cases | Government – IV (Hyperledger Indy) | 00:25:02 - 00:59:19 (2025-03-22) || | ||||
26 | Using Python | 00:59:19 - 02:00:05 (2025-03-22) || | |||||
27 | Temporal Data | 02:00:05 - 02:39:20 (2025-03-22) || | |||||
28 | Algorithms | Blossom Algorithm | 02:39:20 - 03:12:07 (2025-03-22) || | ||||
29 | Algorithms | - Karp Algorithm (Contd.) | 03:12:07 - 03:44:22 (2025-03-22) || | ||||
30 | Language Processing | 03:44:22 - 04:09:04 (2025-03-22) || | |||||
31 | Language Processing | 04:09:04 - 04:25:28 (2025-03-22) || | |||||
32 | Language Processing | understanding of text | 04:25:28 - 04:38:59 (2025-03-22) || | ||||
33 | IoT Edge ML | 04:38:59 - 05:00:38 (2025-03-22) || | |||||
34 | IoT Edge ML | 05:00:38 - 05:53:26 (2025-03-22) || | |||||
35 | Part I | Assumption | 05:53:26 - 06:19:26 (2025-03-22) || | ||||
36 | Part I | for the GMW Protocol | 06:19:26 - 06:54:10 (2025-03-22) || | ||||
37 | Architecture Storage & Interconnects | & Performance - I | 06:54:10 - 07:45:59 (2025-03-22) || | ||||
38 | Architecture Design & use cases | Government – V (Tax Payments and Land Registry Records) | 08:00:00 - 08:35:43 || 07:50:19 - 08:00:00 (2025-03-23) || | ||||
39 | Architecture Design & use cases | – I (Overview) | 08:35:43 - 09:00:42 || | ||||
40 | Using Python | structure | 09:00:42 - 09:51:42 || | ||||
41 | Concurrency Control In Real-Time Databases | 09:51:42 - 10:24:29 || | |||||
42 | In Real-Time Databases and Commercial RT Databases | 10:24:29 - 10:58:41 || | |||||
43 | Algorithms | Introduction to Randomized Algorithm | 10:58:41 - 11:28:31 || | ||||
44 | Algorithms | Polynomial Identity Testing | 11:28:31 - 11:59:18 || | ||||
45 | Language Processing | matrix,n-grams | 11:59:18 - 12:13:38 || | ||||
46 | Language Processing | word vectors | 12:13:38 - 12:28:29 || | ||||
47 | Language Processing | reduction, Demo | 12:28:29 - 12:53:15 || | ||||
48 | IoT Edge ML | 12:53:15 - 14:01:23 || | |||||
49 | Part I | for the GMW Protocol: The n-Party Case | 14:01:23 - 14:36:06 || | ||||
50 | Part I | for the GMW Protocol Contd. | 14:36:06 - 15:03:47 || | ||||
51 | Architecture Storage & Interconnects | & Performance - II | 15:03:47 - 15:54:30 || | ||||
52 | Physical Systems | Lyapunov Stability, Barrier Functions | 15:54:30 - 16:32:00 || | ||||
53 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 16:32:00 - 16:55:14 || | ||||
54 | Modern C++ | Resource Management by Smart Pointers: Part 2 | 16:55:14 - 17:51:41 || | ||||
55 | Privacy Leaks, Profiling form PII - (Part I) | 17:51:41 - 18:55:16 || | |||||
56 | An Introduction | 18:55:16 - 19:54:05 || | |||||
57 | Systems | Hardware Behaviour with Processes | 19:54:05 - 20:57:53 || | ||||
58 | Theory and Mechanism Design | Arrow's Impossibility Result | 20:57:53 - 21:28:09 || | ||||
59 | Theory and Mechanism Design | Result | 21:28:09 - 22:00:21 || | ||||
60 | Algorithms | checkable proofs - II | 22:00:21 - 22:55:15 || | ||||
61 | Network Security | Hash Algorithm (SHA) | 22:55:15 - 23:27:33 || | ||||
62 | Network Security | Signature Standard (DSS) | 23:27:33 - 23:56:24 || | ||||
63 | Intelligence: Search methods for problem solving | 23:56:24 - 00:19:32 || | |||||
64 | Intelligence: Search methods for problem solving | 00:19:32 - 00:54:44 (2025-03-23) || | |||||
65 | 00:54:44 - 01:37:49 (2025-03-23) || | ||||||
66 | of Speech Processing | Analysis of Speech 3 | 01:37:49 - 02:32:22 (2025-03-23) || | ||||
67 | Machine Learning | Maximization | 02:32:22 - 03:05:03 (2025-03-23) || | ||||
68 | Machine Learning | Maximization Continued | 03:05:03 - 03:43:39 (2025-03-23) || | ||||
69 | Algorithms using Java | Arrays | 03:43:39 - 04:17:44 (2025-03-23) || | ||||
70 | Algorithms using Java | 04:17:44 - 04:49:41 (2025-03-23) || | |||||
71 | SystemsDesign Verification and Test | Algorithm | 04:49:41 - 06:04:56 (2025-03-23) || | ||||
72 | Competitive Programming | 06:04:56 - 06:35:17 (2025-03-23) || | |||||
73 | Competitive Programming | 06:35:17 - 07:08:09 (2025-03-23) || | |||||
74 | Complexity Theory | 07:08:09 - 07:50:19 (2025-03-23) || | |||||
75 | Intelligence: Search methods for problem solving | 08:00:00 - 08:49:05 || 07:57:12 - 08:00:00 (2025-03-25) || | |||||
76 | 08:49:05 - 09:26:53 || | ||||||
77 | 09:26:53 - 09:55:01 || | ||||||
78 | of Speech Processing | Analysis of Speech | 09:55:01 - 10:56:55 || | ||||
79 | Machine Learning | 10:56:55 - 12:01:44 || | |||||
80 | Algorithms using Java | Arrays | 12:01:44 - 12:48:46 || | ||||
81 | SystemsDesign Verification and Test | Diagram | 12:48:46 - 14:06:24 || | ||||
82 | Competitive Programming | the bipartiteness | 14:06:24 - 14:37:06 || | ||||
83 | Competitive Programming | 14:37:06 - 14:53:07 || | |||||
84 | Complexity Theory | 14:53:07 - 15:31:54 || | |||||
85 | Complexity Theory | 15:31:54 - 16:00:48 || | |||||
86 | Architecture Design & use cases | Government – V (Tax Payments and Land Registry Records) | 16:00:48 - 16:36:31 || | ||||
87 | Architecture Design & use cases | – I (Overview) | 16:36:31 - 17:01:30 || | ||||
88 | Using Python | structure | 17:01:30 - 17:52:30 || | ||||
89 | Concurrency Control In Real-Time Databases | 17:52:30 - 18:25:17 || | |||||
90 | In Real-Time Databases and Commercial RT Databases | 18:25:17 - 18:59:29 || | |||||
91 | Algorithms | Introduction to Randomized Algorithm | 18:59:29 - 19:29:19 || | ||||
92 | Algorithms | Polynomial Identity Testing | 19:29:19 - 20:00:06 || | ||||
93 | Language Processing | matrix,n-grams | 20:00:06 - 20:14:26 || | ||||
94 | Language Processing | word vectors | 20:14:26 - 20:29:17 || | ||||
95 | Language Processing | reduction, Demo | 20:29:17 - 20:54:03 || | ||||
96 | IoT Edge ML | 20:54:03 - 22:02:11 || | |||||
97 | Part I | for the GMW Protocol: The n-Party Case | 22:02:11 - 22:36:54 || | ||||
98 | Part I | for the GMW Protocol Contd. | 22:36:54 - 23:04:35 || | ||||
99 | Architecture Storage & Interconnects | & Performance - II | 23:04:35 - 23:55:18 || | ||||
100 | Physical Systems | Lyapunov Stability, Barrier Functions | 23:55:18 - 00:32:48 || | ||||
101 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 00:32:48 - 00:56:02 (2025-03-25) || | ||||
102 | Modern C++ | Resource Management by Smart Pointers: Part 2 | 00:56:02 - 01:52:29 (2025-03-25) || | ||||
103 | Privacy Leaks, Profiling form PII - (Part I) | 01:52:29 - 02:56:04 (2025-03-25) || | |||||
104 | An Introduction | 02:56:04 - 03:54:53 (2025-03-25) || | |||||
105 | Systems | Hardware Behaviour with Processes | 03:54:53 - 04:58:41 (2025-03-25) || | ||||
106 | Theory and Mechanism Design | Arrow's Impossibility Result | 04:58:41 - 05:28:57 (2025-03-25) || | ||||
107 | Theory and Mechanism Design | Result | 05:28:57 - 06:01:09 (2025-03-25) || | ||||
108 | Algorithms | checkable proofs - II | 06:01:09 - 06:56:03 (2025-03-25) || | ||||
109 | Network Security | Hash Algorithm (SHA) | 06:56:03 - 07:28:21 (2025-03-25) || | ||||
110 | Network Security | Signature Standard (DSS) | 07:28:21 - 07:57:12 (2025-03-25) || | ||||
111 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 08:00:00 - 08:28:03 || 07:56:00 - 08:00:00 (2025-03-26) || | ||||
112 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 08:28:03 - 08:51:25 || | ||||
113 | Modern C++ | Concurrency: Part 1 | 08:51:25 - 09:29:43 || | ||||
114 | Modern C++ | Concurrency: Part 2 | 09:29:43 - 10:01:35 || | ||||
115 | Privacy Leaks, Profiling form PII - (Part II) | 10:01:35 - 10:42:52 || | |||||
116 | An Introduction | Part 2 | 10:42:52 - 11:39:20 || | ||||
117 | Systems | Structure, Test Benches, Parameterisation, & Libraries | 11:39:20 - 12:48:29 || | ||||
118 | Theory and Mechanism Design | Social Choice Setup | 12:48:29 - 13:23:40 || | ||||
119 | Theory and Mechanism Design | Gibbard-Satterthwaite Theorem | 13:23:40 - 14:00:15 || | ||||
120 | Algorithms | checkable proofs - III | 14:00:15 - 15:01:07 || | ||||
121 | Network Security | Key Exchange Protocol | 15:01:07 - 15:31:48 || | ||||
122 | Network Security | Cryptoanalisis | 15:31:48 - 16:00:42 || | ||||
123 | Intelligence: Search methods for problem solving | 16:00:42 - 16:49:47 || | |||||
124 | 16:49:47 - 17:27:35 || | ||||||
125 | 17:27:35 - 17:55:43 || | ||||||
126 | of Speech Processing | Analysis of Speech | 17:55:43 - 18:57:37 || | ||||
127 | Machine Learning | 18:57:37 - 20:02:26 || | |||||
128 | Algorithms using Java | Arrays | 20:02:26 - 20:49:28 || | ||||
129 | SystemsDesign Verification and Test | Diagram | 20:49:28 - 22:07:06 || | ||||
130 | Competitive Programming | the bipartiteness | 22:07:06 - 22:37:48 || | ||||
131 | Competitive Programming | 22:37:48 - 22:53:49 || | |||||
132 | Complexity Theory | 22:53:49 - 23:32:36 || | |||||
133 | Complexity Theory | 23:32:36 - 00:01:30 || | |||||
134 | Architecture Design & use cases | Government – V (Tax Payments and Land Registry Records) | 00:01:30 - 00:37:13 (2025-03-26) || | ||||
135 | Architecture Design & use cases | – I (Overview) | 00:37:13 - 01:02:12 (2025-03-26) || | ||||
136 | Using Python | structure | 01:02:12 - 01:53:12 (2025-03-26) || | ||||
137 | Concurrency Control In Real-Time Databases | 01:53:12 - 02:25:59 (2025-03-26) || | |||||
138 | In Real-Time Databases and Commercial RT Databases | 02:25:59 - 03:00:11 (2025-03-26) || | |||||
139 | Algorithms | Introduction to Randomized Algorithm | 03:00:11 - 03:30:01 (2025-03-26) || | ||||
140 | Algorithms | Polynomial Identity Testing | 03:30:01 - 04:00:48 (2025-03-26) || | ||||
141 | Language Processing | matrix,n-grams | 04:00:48 - 04:15:08 (2025-03-26) || | ||||
142 | Language Processing | word vectors | 04:15:08 - 04:29:59 (2025-03-26) || | ||||
143 | Language Processing | reduction, Demo | 04:29:59 - 04:54:45 (2025-03-26) || | ||||
144 | IoT Edge ML | 04:54:45 - 06:02:53 (2025-03-26) || | |||||
145 | Part I | for the GMW Protocol: The n-Party Case | 06:02:53 - 06:37:36 (2025-03-26) || | ||||
146 | Part I | for the GMW Protocol Contd. | 06:37:36 - 07:05:17 (2025-03-26) || | ||||
147 | Architecture Storage & Interconnects | & Performance - II | 07:05:17 - 07:56:00 (2025-03-26) || | ||||
148 | Architecture Design & use cases | – II (Membership and Access control in Fabric) | 08:00:00 - 08:21:07 || 07:53:24 - 08:00:00 (2025-03-27) || | ||||
149 | Architecture Design & use cases | – III (Privacy in Fabric) | 08:21:07 - 09:01:26 || | ||||
150 | Using Python | Enhance your Images | 09:01:26 - 09:58:28 || | ||||
151 | Knowledge Discovery Process | 09:58:28 - 10:21:54 || | |||||
152 | I | 10:21:54 - 10:58:21 || | |||||
153 | Algorithms | Bipartite Matching, Randomized Quicksort | 10:58:21 - 11:29:02 || | ||||
154 | Algorithms | Concentration Inequalities: Markov, Chebyshev, Chernoff | 11:29:02 - 11:58:12 || | ||||
155 | Language Processing | 11:58:12 - 12:17:52 || | |||||
156 | Language Processing | 12:17:52 - 12:35:16 || | |||||
157 | Language Processing | prediction | 12:35:16 - 12:49:16 || | ||||
158 | IoT Edge ML | 12:49:16 - 14:00:44 || | |||||
159 | Part I | 14:00:44 - 15:00:55 || | |||||
160 | Architecture Storage & Interconnects | Cache Memory | 15:00:55 - 15:51:54 || | ||||
161 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 15:51:54 - 16:19:57 || | ||||
162 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 16:19:57 - 16:43:19 || | ||||
163 | Modern C++ | Concurrency: Part 1 | 16:43:19 - 17:21:37 || | ||||
164 | Modern C++ | Concurrency: Part 2 | 17:21:37 - 17:53:29 || | ||||
165 | Privacy Leaks, Profiling form PII - (Part II) | 17:53:29 - 18:34:46 || | |||||
166 | An Introduction | Part 2 | 18:34:46 - 19:31:14 || | ||||
167 | Systems | Structure, Test Benches, Parameterisation, & Libraries | 19:31:14 - 20:40:23 || | ||||
168 | Theory and Mechanism Design | Social Choice Setup | 20:40:23 - 21:15:34 || | ||||
169 | Theory and Mechanism Design | Gibbard-Satterthwaite Theorem | 21:15:34 - 21:52:09 || | ||||
170 | Algorithms | checkable proofs - III | 21:52:09 - 22:53:01 || | ||||
171 | Network Security | Key Exchange Protocol | 22:53:01 - 23:23:42 || | ||||
172 | Network Security | Cryptoanalisis | 23:23:42 - 23:52:36 || | ||||
173 | Intelligence: Search methods for problem solving | 23:52:36 - 00:41:41 || | |||||
174 | 00:41:41 - 01:19:29 (2025-03-27) || | ||||||
175 | 01:19:29 - 01:47:37 (2025-03-27) || | ||||||
176 | of Speech Processing | Analysis of Speech | 01:47:37 - 02:49:31 (2025-03-27) || | ||||
177 | Machine Learning | 02:49:31 - 03:54:20 (2025-03-27) || | |||||
178 | Algorithms using Java | Arrays | 03:54:20 - 04:41:22 (2025-03-27) || | ||||
179 | SystemsDesign Verification and Test | Diagram | 04:41:22 - 05:59:00 (2025-03-27) || | ||||
180 | Competitive Programming | the bipartiteness | 05:59:00 - 06:29:42 (2025-03-27) || | ||||
181 | Competitive Programming | 06:29:42 - 06:45:43 (2025-03-27) || | |||||
182 | Complexity Theory | 06:45:43 - 07:24:30 (2025-03-27) || | |||||
183 | Complexity Theory | 07:24:30 - 07:53:24 (2025-03-27) || | |||||
184 | Artificial Intelligence | to Expect from AI | 08:00:00 - 08:14:20 || 07:51:19 - 08:00:00 (2025-03-28) || | ||||
185 | Artificial Intelligence | History of AI from 40s - 90s | 08:14:20 - 08:43:00 || | ||||
186 | 08:43:00 - 09:20:46 || | ||||||
187 | 09:20:46 - 09:57:08 || | ||||||
188 | of Speech Processing | Analysis of Speech (Hands-On) | 09:57:08 - 10:58:07 || | ||||
189 | Machine Learning | 10:58:07 - 12:21:13 || | |||||
190 | Algorithms using Java | Structure (Part-I) | 12:21:13 - 12:57:50 || | ||||
191 | SystemsDesign Verification and Test | State Transition System | 12:57:50 - 13:49:13 || | ||||
192 | Competitive Programming | 13:49:13 - 14:17:33 || | |||||
193 | Competitive Programming | Revisited | 14:17:33 - 14:59:26 || | ||||
194 | Complexity Theory | 14:59:26 - 15:58:43 || | |||||
195 | Architecture Design & use cases | – II (Membership and Access control in Fabric) | 15:58:43 - 16:19:50 || | ||||
196 | Architecture Design & use cases | – III (Privacy in Fabric) | 16:19:50 - 17:00:09 || | ||||
197 | Using Python | Enhance your Images | 17:00:09 - 17:57:11 || | ||||
198 | Knowledge Discovery Process | 17:57:11 - 18:20:37 || | |||||
199 | I | 18:20:37 - 18:57:04 || | |||||
200 | Algorithms | Bipartite Matching, Randomized Quicksort | 18:57:04 - 19:27:45 || | ||||
201 | Algorithms | Concentration Inequalities: Markov, Chebyshev, Chernoff | 19:27:45 - 19:56:55 || | ||||
202 | Language Processing | 19:56:55 - 20:16:35 || | |||||
203 | Language Processing | 20:16:35 - 20:33:59 || | |||||
204 | Language Processing | prediction | 20:33:59 - 20:47:59 || | ||||
205 | IoT Edge ML | 20:47:59 - 21:59:27 || | |||||
206 | Part I | 21:59:27 - 22:59:38 || | |||||
207 | Architecture Storage & Interconnects | Cache Memory | 22:59:38 - 23:50:37 || | ||||
208 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 23:50:37 - 00:18:40 || | ||||
209 | Physical Systems | Lyapunov Stability, Barrier Functions (Contd.) | 00:18:40 - 00:42:02 (2025-03-28) || | ||||
210 | Modern C++ | Concurrency: Part 1 | 00:42:02 - 01:20:20 (2025-03-28) || | ||||
211 | Modern C++ | Concurrency: Part 2 | 01:20:20 - 01:52:12 (2025-03-28) || | ||||
212 | Privacy Leaks, Profiling form PII - (Part II) | 01:52:12 - 02:33:29 (2025-03-28) || | |||||
213 | An Introduction | Part 2 | 02:33:29 - 03:29:57 (2025-03-28) || | ||||
214 | Systems | Structure, Test Benches, Parameterisation, & Libraries | 03:29:57 - 04:39:06 (2025-03-28) || | ||||
215 | Theory and Mechanism Design | Social Choice Setup | 04:39:06 - 05:14:17 (2025-03-28) || | ||||
216 | Theory and Mechanism Design | Gibbard-Satterthwaite Theorem | 05:14:17 - 05:50:52 (2025-03-28) || | ||||
217 | Algorithms | checkable proofs - III | 05:50:52 - 06:51:44 (2025-03-28) || | ||||
218 | Network Security | Key Exchange Protocol | 06:51:44 - 07:22:25 (2025-03-28) || | ||||
219 | Network Security | Cryptoanalisis | 07:22:25 - 07:51:19 (2025-03-28) || |
Swayam Prabha copyright © 2024 INFLIBNET Centre. All rights reserved.