Channel Avatar

NPTEL-NOC IITM @UCYa1WtI-vb_bx-anHdmpNfA@youtube.com

482K subscribers - no pronouns :c

More from this channel (soon)


15:09
Microbiota accessible carbohydrates
25:34
Visualizing CNNs
16:54
Finetuning CNNs
50:18
Newer and Recent CNN Architectures
26:57
Evolution of CNN Architectures: InceptionNet, ResNet
01:08:07
Electromagnetic Interference (EMI - Part 02)
32:31
Electromagnetic Interference (EMI - Part 03)
36:37
Types of supply contracts-2
26:29
Negotiation strategy-continued
30:09
Supply contracts
33:09
Types of supply contracts-1
24:32
Supplier selection and evaluation 1
25:39
Supplier selection and evaluation 2
31:04
risk management framework
25:13
Supplier evaluation and selection 3
31:08
Supply risk management
24:02
Outsourcing decisions-2
27:16
Interpretive structural model 2
22:05
Interpretive structural model 1
27:26
TOPSIS
26:15
Outsourcing decisions-1
15:53
Supply risk examples
31:51
Goal Programming
37:33
Assessment of risk
17:35
Negotiation strategy
30:26
Strategic cost management-2
15:44
Science Based Targets
26:08
Negotiation supply management
36:56
Sustainability in Supply management-1
35:30
Sustainability in Supply management-2
19:33
Strategic cost management- Cost analysis
29:21
Strategic cost management-1
31:57
Success stories about technologies in Sourcing
29:29
Reverse Auctions
21:32
Planning for negotiation
23:48
Technology in Sourcing
07:12
Quantum Algorithms and Cryptography - Introduction
23:06
Computation and No-Cloning Part 1
26:35
Computation and No-Cloning Part 3
22:40
Going beyond classical Part 3
25:06
Going beyond classical Part 1
22:40
Basics of Quantum Information - Part 2
31:02
Going beyond classical- Deutsch and Deutsch-Jozsa Part 1
14:29
Computation and No-Cloning Part 2
28:13
Basics of Quantum Information - Part 1
17:02
Going beyond classical Part 2
25:19
Introduction to Cryptography - Part 3
22:48
Simon's and Bernstein's Vazirani Algorithm Part 1
22:15
Introduction to Cryptography - Part 2
25:39
Building Cryptography Part 1
31:56
Building Cryptography Part 2
21:51
Building Cryptography Part 4
18:51
Simon's and Bernstein's Vazirani Algorithm part 2
32:09
Going beyond classical- Deutsch and Deutsch-Jozsa Part 2
23:50
Introduction to Cryptography - Part 1
26:26
Building Cryptography Part 3
25:19
RSA Encryption Part 1
30:30
RSA Encryption Part 2
23:26
Grover's Algorithm - Part 1
27:07
Finishing RSA, Fourier Transform Part 1