iSmile Academy
Welcome to our educational YouTube channel, where we delve into a wide range of topics related to Artificial Intelligence, Microprocessor 8085, Computer Networks, Electronics, Wireless Sensor Networks, Security in Computing, Modern Networking, and Physics.
Our channel offers a mix of theoretical and practical videos, as well as animated videos, to help make complex concepts easier to understand.
Whether you're a student, a professional, or just someone with a passion for technology and science, you'll find something of interest on our channel.
So subscribe now and join us to discover the many ways technology is shaping our world.
Алгоритм обратного распространения ошибки с анимацией и кодом на Python | Демонстрация обучения н...
Правило Хебба
Multiplexer using SimulIDE
K-map from scrach
Secure the Management Plane | SSH, ACL & Hardening
Configure and Verify Path Control Using PBR | GNS3 Lab Demo
Mastering BGP: Configuring IBGP, EBGP, Local Preference, and MED in GNS3
Module 2 Practical 1 - 3 | 8085 Microprocessor: Square of Numbers & Byte Search in Memory
Module 2 Practical 1 Part 2: 8085 Microprocessor – Sum of Even & Odd Numbers
Module 2 Practical 1 Part 1: 8085 Microprocessor – Sorting 10 Numbers in Ascending Order
Module 1 Practical 5 Part 3: 8085 Micropro – Count Negative Numbers & Find Largest Number in a Block
Module 1 Practical 5 Part 2: 8085 Microprocessor – 16-bit Division by 8-bit Number
Module 1 Practical 5 Part 1: 8085 MP– Sum of Series & Multiplication Using Repetitive Addition
Module 1 Practical 4: 8085 – Shift Operations, Flag Manipulation & Bit Counting | Simulation
Module 1 Practical 3: 8085 Microprocessor – BCD Packing & Unpacking Operation | Real Time Simulation
Module 1 Practical 2 (Part 2): 8085 – 16-bit Subtraction, 1’s & 2’s Complement Operations
Module 1 Practical 2 (Part 1): 8085 – Subtraction & Addition Operations Using Memory & Registers
Module 1 Practical 1: 8085 Microprocessor – Store & Exchange Data in Memory
SQL Injection Attack Demonstration Using PCAP File | MySQL Database Exploit & Password Cracking
Investigating an Attack on a Windows Host with Wireshark
Splunk Installation & Data Analysis Made Easy | Step-by-Step Guide on Kali Linux VM
Investigating a Malware Exploit: A Complete Analysis Using Kali Linux
Telnet vs SSH: Vulnerabilities Unveiled with Wireshark | Kali Linux Demo
Understanding Buoyancy: Fun Physics Animation + PhET Simulations
Assign Static IPs to VMs in Kali Linux | Fix Allocation Issues
Kali Linux Syslog Tutorial: Server and Client Configuration Explained
Step-by-Step Guide: Setting Up Ubuntu on VirtualBox!
How to Create Your Own Syslog Server Using Kali Linux | Step-by-Step Tutorial
How an AC Generator Works: Key Factors Behind AC Generation Explained!
Electro Magnet in AC Voltage | PhET Simulation Tutorial