Course Objectives
By the end of this course, participants will be able to:
Understand Mobile Platforms:
- Gain insight into the mobile ecosystem, including Android and iOS operating systems.
- Explore mobile application architectures (MVC, MVVM).
Development Tools and Environment:
- Set up Integrated Development Environments (IDEs) such as Android Studio and Xcode.
- Use mobile development frameworks and libraries.
User Interface (UI) Design:
- Learn the principles of designing user-friendly interfaces.
- Implement responsive designs that accommodate various screen sizes and orientations.
Programming Fundamentals:
- Develop applications using programming languages specific to mobile platforms (e.g., Java/Kotlin for Android, Swift for iOS).
- Handle data management and storage (local databases, APIs).
Application Functionality:
- Implement key features such as GPS, camera integration, and push notifications.
- Learn about application performance optimization.
Testing and Debugging:
- Understand the importance of app testing and debugging.
- Utilize testing frameworks to ensure application reliability and user experience.
Deployment and Maintenance:
- Learn how to publish apps on the Google Play Store and the Apple App Store.
- Understand post-launch maintenance and updates for mobile applications.
Course Structure
Introduction to Mobile Development:
- Overview of mobile platforms and trends.
Setting Up Development Environment:
- Installation and configuration of IDEs.
Programming Basics:
- Introduction to Kotlin/Java or Swift.
User Interface Development:
- Layouts, views, and UI components.
Data Management:
- Working with APIs and databases.
Functionality Implementation:
- GPS, Sensors, Notifications.
Testing and Deployment:
- Testing techniques and the app store submission process.
Final Project:
- Capstone project where participants develop and present a complete mobile application.
This module describes the skills, knowledge and attitude required to develop backend using java servlet or JSP. This module is intended for students pursuing TVET diploma in Information Technology.
At the end of this module, the students will be able to use different programming technologies like servlet, JSP, use different tools for developing a backend of a software using java like NetBeans, eclipse, Apache tomcat, sublime text, etc. and apply different acquired skills, knowledge, and attitudes to develop a backend of a system using Java.
K-means is one of the simplest unsupervised learning
algorithms that solve the well known clustering problem.
Algorithmic steps for k-means clustering
Let X = {x1,x2,x3,……..,xn} be the set of data points and V = {v1,v2,…….,vc} be the set of centers.
1) Randomly select ‘c’ cluster centers.
2) Calculate the distance between each data point and cluster centers.
3) Assign the data point to the cluster center whose distance from the cluster center is minimum of all the cluster centers.
4) Recalculate the new cluster center.
5) Recalculate the distance between each data
point and new obtained cluster centers.
6) If no data point was reassigned then stop,
otherwise repeat from step 3.
The course “Mobile Apps Development” makes it easy and efficient to learn application development for mobile devices. This course is designed to quickly get you up to speed how to make applications for mobile devices. This course will teach students the basis of platforms for mobile devices and their application lifecycle. The student would be able to develop simple GUI applications, use built-in widgets and components, work with the database to store data locally, and much more at the end of this course.
This course provides an in-depth look at the security risks and threats to an organization's
electronic assets and an overview of components used in an enterprise security infrastructure. The
course focuses on the topics of threat environment, security policy and planning, cryptography,
secure networks, access control, firewalls, application security, and data protection. Topics will
include theoretical background, as well as practical techniques to secure an enterprise network.
The course provides demonstrations and exercises on various offensive and defensive security
concepts.