Course image BACKEND USING JAVA
Information Technology

This module describes the skills, knowledge and attitude required to develop backend using java servlet or JSP. This module is intended for students pursuing TVET diploma in Information Technology.

At the end of this module, the students will be able to use different programming technologies like servlet, JSP, use different tools for developing a backend of a software using java like NetBeans, eclipse, Apache tomcat, sublime text, etc. and apply different acquired skills, knowledge, and attitudes to develop a backend of a system using Java.


Course image Artificial Intelligence
Information Technology

K-means is one of the simplest unsupervised learning algorithms that solve the well known clustering problem. 


Algorithmic steps for k-means clustering

Let X = {x1,x2,x3,……..,xn} be the set of data points and V = {v1,v2,…….,vc} be the set of centers.

1) Randomly select ‘c’ cluster centers.

2) Calculate the distance between each data point and cluster centers.

3) Assign the data point to the cluster center whose distance from the cluster center is minimum of all the cluster centers.

4) Recalculate the new cluster center. 

5) Recalculate the distance between each data point and new obtained cluster centers. 

6) If no data point was reassigned then stop, otherwise repeat from step 3.


Course image MOBILE APPLICATION DEVELOPMENT
Information Technology

The course “Mobile Apps Development” makes it easy and efficient to learn application development for mobile devices. This course is designed to quickly get you up to speed how to make applications for mobile devices. This course will teach students the basis of platforms for mobile devices and their application lifecycle. The student would be able to develop simple GUI applications, use built-in widgets and components, work with the database to store data locally, and much more at the end of this course.

Course image Network Security
Information Technology

This course provides an in-depth look at the security risks and threats to an organization's
electronic assets and an overview of components used in an enterprise security infrastructure. The
course focuses on the topics of threat environment, security policy and planning, cryptography,
secure networks, access control, firewalls, application security, and data protection. Topics will
include theoretical background, as well as practical techniques to secure an enterprise network.
The course provides demonstrations and exercises on various offensive and defensive security
concepts.