Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

About me

Posts

Error Exception

1 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

Input and Output

4 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

Modules

5 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

Data Structure

9 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

More Control Flow Tools

11 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

An Informal Introduction to Python

6 minute read

Published:

This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html

NumPy

less than 1 minute read

Published:

This lesson covers NumPy: the absolute basics for beginners, https://numpy.org/doc/stable/user/absolute_beginners.html

Jupyter

less than 1 minute read

Published:

This lesson covers an introduction to Jupyter Notebook/Lab.

L99 Agile Intro

8 minute read

Published:

permalink: /dt/agile-intro

L98 Agile

12 minute read

Published:

permalink: /dt/agile

Digital Transformation (ZZ-1103)

6 minute read

Published:

This post covers phases of the digital transformation (from Industrial Digital Transformation, by Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary, Nital Patel - Packt Publishing)

Digital Transformation (ZZ-1103)

11 minute read

Published:

This lesson covers Industrial revolution (from Industrial Digital Transformation, by Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary, Nital Patel - Packt Publishing) and Digital Transformation Handbook by John Palfreyman.

Digital Transformation (ZZ-1103)

35 minute read

Published:

This lesson is from Digital Transformation Handbook by John Palfreyman and Introduction to Digital Transformation by Thomas M. Siebel.

Image Classification

13 minute read

Published:

This post covers image classification, nearest neighbor classifier, k-nearest neighbor classifier and validation sets from cs231n.

PyTorch

6 minute read

Published:

This lesson covers CNN for CIFAR10

PyTorch

less than 1 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

4 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

4 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

6 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

1 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

2 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

6 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

less than 1 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

PyTorch

7 minute read

Published:

This lesson covers PyTorch Tutorial, https://pytorch.org/tutorials/beginner/basics/intro.html

DY

less than 1 minute read

Published:

This page covers the discovery year process and opportunities.

R Commands

1 minute read

Published:

This lesson is on basic commands of R

Visualization

1 minute read

Published:

This post covers Multivariate Visualization.

Visualization

3 minute read

Published:

This post covers Bivariate Visualization.

Data Gathering

1 minute read

Published:

This post covers Data Gathering.

Data Wrangling

1 minute read

Published:

This post covers Data Wrangling.

Python - Pandas

1 minute read

Published:

This post covers Introduction to Pandas.

t-Tests

12 minute read

Published:

This post covers t-Tests.

Outliers

1 minute read

Published:

This post covers detecting outliers.

Python - Introduction

4 minute read

Published:

This post covers Introduction to Python Programming.

Projects

less than 1 minute read

Published:

This page covers projects completed by Students.

Twitter

less than 1 minute read

Published:

Help Cmd

less than 1 minute read

Published:

This lesson is for help.

Range and Quartiles

2 minute read

Published:

This lesson covers Range and Quartiles.

Skewed Distribution

3 minute read

Published:

This lesson covers Introduction to Skewed Distribution.

Linear Regression

22 minute read

Published:

This lesson covers Linear Regression.

ANOVA

7 minute read

Published:

This post explains ANOVA.

t Table

less than 1 minute read

Published:

This post provides t Table.

Slides

less than 1 minute read

Published:

This post explains creating slides using Jupyter Notebook.

XML

8 minute read

Published:

This lesson covers XML

Normal Distribution

3 minute read

Published:

This post covers Normal Distribution from https://www.mathsisfun.com/data/standard-normal-distribution.html and https://www.mathsisfun.com/data/standard-deviation.html

Z Table

less than 1 minute read

Published:

This post provides Z Table.

Flask-Cookie-Session

1 minute read

Published:

This post covers Cookie and Session in Flask.

Flask-Cookie

less than 1 minute read

Published:

This post covers cookie in Flask!

Flask

1 minute read

Published:

This post covers forms in Flask using Calculator App!

Flask

less than 1 minute read

Published:

This post covers introduction to Flask!

Machine Learning

less than 1 minute read

Published:

This lesson is on Machine Learning notes.

Mean Median Mode

6 minute read

Published:

This post covers Introduction to descriptive statistics.

Descriptive Statistics

15 minute read

Published:

This lesson is from Introduction to Descriptive Statistics by Jackie Nicholas, Mathematics Learning Centre, University of Sydney

Python-Libraries

less than 1 minute read

Published:

This post covers Introduction to some other python libraries.

MNIST-NN

2 minute read

Published:

This post covers introduction to Neural Network using MNIST dataset.

MNIST-CNN

5 minute read

Published:

This post covers introduction to Convolution Neural Network using MNIST dataset.

HTML Forms

1 minute read

Published:

This post covers introduction to HTML Forms.

Datasets

less than 1 minute read

Published:

This lesson covers possible datasets to be used for projects.

Missing data

less than 1 minute read

Published:

https://app.datacamp.com/learn/courses/dealing-with-missing-data-in-r

Geospatial

1 minute read

Published:

This lesson is from datacamp Visualizing Geospatial data in R and https://eriqande.github.io/rep-res-eeb-2017/map-making-in-R.html

Shiny

5 minute read

Published:

This lesson is from datacamp Introduction to Shiny

Plotly

8 minute read

Published:

This lesson is from datacamp Introduction to Plotly

dplyr

6 minute read

Published:

This lesson is from datacamp Introduction to Tidyverse

HTML Fundamentals

5 minute read

Published:

This lesson covers HTML Fundamentals.

CSS Fundamentals

6 minute read

Published:

This lesson covers CSS Fundamentals

Maths and Statistics

3 minute read

Published:

This post covers certain formulas useful for Deep Learning.

patents

Anti-fraud computer implemented method for financial card transaction

U.S. Patent Publication, 2015

The patent describes a safe card that that by default is in a blocked state so that no transcation can be made. The safe card can be activated for a limited time by an authorized user for the transaction.

Recommended citation: Aneja, N., and Aneja, S. "Anti-fraud computer implemented method for financial card transaction." U.S. Patent Publication 2015/0339,657, filed May 23, 2014, published Nov 26, 2015. https://patentimages.storage.googleapis.com/06/22/8e/674c30a57d0fe8/US20150339657A1.pdf

Method and System for Ad-hoc Social Networking and Profile Matching

U.S. Issued Patent, 2019

The patent describes a method to create a social network based on dynamic interests of users and using ad-hoc networking. A user of mobile device can identify another user who is close by and has similar interests. Dynamic interests of the users can be extracted or identified based on mobile usage, browsing history, places traveled, and other user actions. Users are notified if another user who is similar more than a threshold is present nearby. The system also facilitates communication between users by way of chatting, file sharing, image sharing etc.

Recommended citation: Aneja, N., and Gambhir, S. "Method and system for Ad-hoc Social Networking and Profile Matching." U.S. Patent 10,264,609, filed Dec 28, 2015, issued April 16, 2019. https://patentimages.storage.googleapis.com/0f/63/b5/a0d9ef4311bf34/US10264609B2.pdf

Instant messaging for mobile device with offline and online mode

U.S. Issued Patent, 2020

The discloosure presents unified instant messaging application/service that enables to concurrently send messages via online mode using internet and Offline or Airplane mode

Recommended citation: Aneja, S., Aneja. N., and Petra, I. "Instant messaging for mobile device with offline and online mode." U.S. Patent 10,834,035, filed Dec 28, 2015, issued Nov 10, 2020. https://patentimages.storage.googleapis.com/58/d4/f7/58ebe5626a9362/US10834035.pdf

portfolio

Behavior-Cloning

Published:

Implementation of convolutional neural network to clone driving behavior using Keras. The model outputs a steering angle to an autonomous vehicle.

NL-Augmenter

Published:

NL-Augmenter 🦎 → 🐍 A Framework for Task-Sensitive Natural Language Augmentation

publications

Reliable ad-hoc on-demand distance vector routing protocol

Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), 2006

Access paper here

Recommended citation: Sandhya Khurana, Neelima Gupta, Nagender Aneja "Reliable ad-hoc on-demand distance vector routing protocol." International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), 2006. pp. 98--98 doi: 10.1109/ICNICONSMCL.2006.183 https://ieeexplore.ieee.org/document/1628344

Reliable Ad-hoc On-demand Distance Vector Routing Protocol

Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), 2006

The paper presents a co-operative security scheme called Reliable Ad hoc On-demand Distance Vector (RAODV) routing protocol based on local monitoring has been proposed to solve the problem of attack by malicious node as well as selfish behavior

Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol," International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), Morne, Mauritius, 2006, pp. 98-98, doi: 10.1109/ICNICONSMCL.2006.183. https://ieeexplore.ieee.org/document/1628344

Verification of Forecasts from High Resolution Numerical Weather Prediction Model

Published in Research Journal of Applied Sciences, Engineering and Technology, 2014

Access paper here

Recommended citation: Nagender Aneja, Thomas George "Verification of Forecasts from High Resolution Numerical Weather Prediction Model." Research Journal of Applied Sciences, Engineering and Technology, 2014. vol. 8 pp. 1255--1258 doi: 10.19026/rjaset.8.1092 https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.8.1092

Geo-social semantic profile matching algorithm for dynamic interests in ad-hoc social network

Published in 2015 IEEE International Conference on Computational Intelligence & Communication Technology, 2015

Access paper here

Recommended citation: Nagender Aneja, Sapna Gambhir "Geo-social semantic profile matching algorithm for dynamic interests in ad-hoc social network." 2015 IEEE International Conference on Computational Intelligence & Communication Technology, 2015. pp. 354--358 doi: 10.1109/CICT.2015.50 https://ieeexplore.ieee.org/document/7078725

Need of ad-hoc social network based on users' dynamic interests

Published in 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), 2015

Access paper here

Recommended citation: Sapna Gambhir, Nagender Aneja, Samridhi Mangla "Need of ad-hoc social network based on users' dynamic interests." 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), 2015. pp. 52--56 doi: 10.1109/ICSCTI.2015.7489562 https://ieeexplore.ieee.org/document/7489562

Software Design for social profile matching algorithm to create ad-hoc social network on top of android

Published in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

Access paper here

Recommended citation: Sapna Gambhir, Samridhi Mangla, Nagender Aneja "Software Design for social profile matching algorithm to create ad-hoc social network on top of android." 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016. pp. 3450--3454 https://ieeexplore.ieee.org/document/7724906

Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores

Published in NoSQL: Database for Storage and Retrieval of Data in Cloud, 2017

Access paper here

Recommended citation: Sandhya Aneja, Nagender Aneja "Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores." NoSQL: Database for Storage and Retrieval of Data in Cloud, 2017. pp. 237--250 doi: 10.1201/9781315155579-13 https://www.taylorfrancis.com/chapters/edit/10.1201/9781315155579-13/security-privacy-challenges-defending-solutions-nosql-data-stores-sandhya-aneja-nagender-aneja

Protecting Internet Traffic: Security Challenges and Solutions

Published in IEEE Internet Technology Policy Community White Paper, 2017

Use Google Scholar for full citation

Recommended citation: Mohammed Aledhari, Sukanya Mandal, Nagender Aneja, Mikael Dautrey, Rajesh Nighot, Prasad Mantri, Jared Bielby "Protecting Internet Traffic: Security Challenges and Solutions." IEEE Internet Technology Policy Community White Paper, 2017.

Protecting Internet Traffic: Security Challenges and Solutions

Published in IEEE Internet Technology Policy Community White Paper, 2017

Access paper here

Recommended citation: Mohammed Aledhari, Sukanya Mandal, Nagender Aneja, Mikael Dautrey, Rajesh Nighot, Prasad Mantri, Jared Bielby "Protecting Internet Traffic: Security Challenges and Solutions." IEEE Internet Technology Policy Community White Paper, 2017. https://standards.ieee.org/wp-content/uploads/import/documents/other/whitepaper-protecting-internet-traffic-dh-v1.pdf

Options and Challenges in Providing Universal Access

Published in IEEE Internet Technology Policy Community White Paper, 2018

Access paper here

Recommended citation: Prasad Mantri, Mohammed Aledhari, Helen Hicks, Rajesh Nighot, Nagender Aneja, Sukanya Mandal, Ali Bashir, Jay Wack, Jared Bielby "Options and Challenges in Providing Universal Access." IEEE Internet Technology Policy Community White Paper, 2018. https://internetinitiative.ieee.org/images/files/resources/white_papers/OPTIONS-AND-CHALLENGES-IN-PROVIDING-UNIVERSAL-ACCESS-v180418.pdf

Transfer learning using CNN for handwritten devanagari character recognition

Published in 2019 1st International Conference on Advances in Information Technology (ICAIT), 2019

Access paper here

Recommended citation: Nagender Aneja, Sandhya Aneja "Transfer learning using CNN for handwritten devanagari character recognition." 2019 1st International Conference on Advances in Information Technology (ICAIT), 2019. pp. 293--296 doi: 10.1109/ICAIT47043.2019.8987286 https://ieeexplore.ieee.org/abstract/document/8987286

Network traffic analysis based iot device identification

Published in Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things, 2020

Access paper here

Recommended citation: Rajarshi Chowdhury, Sandhya Aneja, Nagender Aneja, Emeroylariffion Abas "Network traffic analysis based iot device identification." Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things, 2020. pp. 79--89 doi: 10.1145/3421537.3421545 https://dl.acm.org/doi/10.1145/3421537.3421545

Systematic Patent Review of Nanoparticles in Drug Delivery and Cancer Therapy in the Last Decade

Published in Recent Advances in Drug Delivery and Formulation, 2021

Access paper here

Recommended citation: Nur Hazis, Nagender Aneja, Rajan Rajabalaya, Sheba David "Systematic Patent Review of Nanoparticles in Drug Delivery and Cancer Therapy in the Last Decade." Recent Advances in Drug Delivery and Formulation, 2021. vol. 15 pp. 59 doi: 10.2174/1872211314666210521105534 https://www.eurekaselect.com/article/115699

Nl-augmenter: A framework for task-sensitive natural language augmentation

Published in arXiv preprint arXiv:2112.02721, 2021

Access paper here

Recommended citation: Kaustubh Dhole, Varun Gangal, Sebastian Gehrmann, Aadesh Gupta, Zhenhao Li, Saad Mahamood, Abinaya Mahendiran, Simon Mille, Ashish Srivastava, Samson Tan, Tongshuang Wu, Jascha Sohl-Dickstein, Jinho Choi, Eduard Hovy, Ondrej Dusek, Sebastian Ruder, Sajant Anand, Nagender Aneja, Rabin Banjade, Lisa Barthe, Hanna Behnke, Ian Berlot-Attwell, Connor Boyle, Caroline Brun, Marco Cabezudo, Samuel Cahyawijaya, Emile Chapuis, Wanxiang Che, Mukund Choudhary, Christian Clauss, Pierre Colombo, Filip Cornell, Gautier Dagan, Mayukh Das, Tanay Dixit, Thomas Dopierre, Paul-Alexis Dray, Suchitra Dubey, Tatiana Ekeinhor, Marco Giovanni, Rishabh Gupta, Rishabh Gupta, Louanes Hamla, Sang Han, Fabrice Harel-Canada, Antoine Honore, Ishan Jindal, Przemyslaw Joniak, Denis Kleyko, Venelin Kovatchev, Kalpesh Krishna, Ashutosh Kumar, Stefan Langer, Seungjae Ryan, Corey James, Hualou Liang, Kaizhao Liang, Zhexiong Liu, Andrey Lukyanenko, Vukosi Marivate, Gerard Melo, Simon Meoni, Maxime Meyer, Afnan Mir, Nafise Moosavi, Niklas Muennighoff, Timothy Mun, Kenton Murray, Marcin Namysl, Maria Obedkova, Priti Oli, Nivranshu Pasricha, Jan Pfister, Richard Plant, Vinay Prabhu, Vasile Pais, Libo Qin, Shahab Raji, Pawan Rajpoot, Vikas Raunak, Roy Rinberg, Nicolas Roberts, Juan Rodriguez, Claude Roux, Vasconcellos P., Ananya B., Robin M., Thomas Scialom, Tshephisho Sefara, Saqib N., Xudong Shen, Haoyue Shi, Yiwen Shi, Anna Shvets, Nick Siegel, Damien Sileo, Jamie Simon, Chandan Singh, Roman Sitelew, Priyank Soni, Taylor Sorensen, William Soto, Aman Srivastava, KV Srivatsa, Tony Sun, Mukund Varma, A Tabassum, Fiona Tan, Ryan Teehan, Mo Tiwari, Marie Tolkiehn, Athena Wang, Zijian Wang, Gloria Wang, Zijie Wang, Fuxuan Wei, Bryan Wilie, Genta Winata, Xinyi Wu, Witold Wydmański, Tianbao Xie, Usama Yaseen, M. Yee, Jing Zhang, Yue Zhang "Nl-augmenter: A framework for task-sensitive natural language augmentation." arXiv preprint arXiv:2112.02721, 2021. https://arxiv.org/pdf/2112.02721.pdf

Collaborative adversary nodes learning on the logs of IoT devices in an IoT network

Published in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022

Access paper here

Recommended citation: Sandhya Aneja, Melanie En, Nagender Aneja "Collaborative adversary nodes learning on the logs of IoT devices in an IoT network." 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022. pp. 231--235 doi: 10.1109/COMSNETS53615.2022.9668602 https://ieeexplore.ieee.org/document/9668602

Device fingerprinting using deep convolutional neural networks

Published in International Journal of Communication Networks and Distributed Systems, 2022

Access paper here

Recommended citation: Sandhya Aneja, Nagender Aneja, Bharat Bhargava, Rajarshi Chowdhury "Device fingerprinting using deep convolutional neural networks." International Journal of Communication Networks and Distributed Systems, 2022. vol. 28 pp. 171--198 doi: 10.1504/IJCNDS.2022.121197 https://www.inderscienceonline.com/doi/10.1504/IJCNDS.2022.121197

An Inspection of MANET'S Scenario using AODV, DSDV and DSR Routing Protocols

Published in 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022

Access paper here

Recommended citation: Sandeep Singh, Shalini Bajaj, Khushboo Tripathi, Nagender Aneja "An Inspection of MANET'S Scenario using AODV, DSDV and DSR Routing Protocols." 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022. vol. 2 pp. 707--712 doi: 10.1109/ICIPTM54933.2022.9753951 https://ieeexplore.ieee.org/document/9753951

A Comparative Performance Model of Machine Learning Classifiers on Time Series Prediction for Weather Forecasting

Published in Advances in Information Communication Technology and Computing, 2022

Access paper here

Recommended citation: Sudhir Sharma, Kaushal Bhatt, Rimmy Chabra, Nagender Aneja "A Comparative Performance Model of Machine Learning Classifiers on Time Series Prediction for Weather Forecasting." Advances in Information Communication Technology and Computing, 2022. pp. 577--587 doi: 10.1007/978-981-19-0619-0_50 https://link.springer.com/chapter/10.1007/978-981-19-0619-0_50

Proposed methodology for Early Detection of Lung Cancer with low-dose CT Scan using Machine Learning

Published in 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022

Access paper here

Recommended citation: Gagan Thakral, Sapna Gambhir, Nagender Aneja "Proposed methodology for Early Detection of Lung Cancer with low-dose CT Scan using Machine Learning." 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022. vol. 1 pp. 662--666 doi: 10.1109/COM-IT-CON54601.2022.9850607 https://ieeexplore.ieee.org/document/9850607

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

Published in IAES International Journal of Artificial Intelligence (IJ-AI), 2022

Access paper here

Recommended citation: Sandhya Aneja, Nagender Aneja, Pg Abas, Abdul Naim "Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising." IAES International Journal of Artificial Intelligence (IJ-AI), 2022. vol. 11( 3) doi: 10.11591/ijai.v11.i3.pp961-968 https://ijai.iaescore.com/index.php/IJAI/article/view/21503

research

Deep Learning Papers

Published:

This is a collection of some deep learning projects/papers.

Deep Learning

Published:

This is the collection of posts on Machine Learning, Deep Learning, and Python Programming.

CS Journals

Published:

This is a list of Scopus indexed Journals of Computer Science.

Available Projects

Published:

This post covers projects available for FYP/Research students. Students may also contact with their project proposals.

talks

Introduction to Deep Learning

Published:

Keynote Speech at International Conference (Virtual) Recent Trends in Computing (ICRTC-2021), Compucom Institute of Information Technology & Management, Jaipur, India

teaching

Internet Programming and Development (SS-2201)

Bachelor of Science (Computer Science), Universiti Brunei Darussalam, Digital Science, 2021

Students will learn the latest technologies including Python in the field of Internet Programming.

Workshop on Patents

Bachelor/Master's Degree, Universiti Brunei Darussalam, 2021

Students will learn the Introduction to Patents and Patents Search.

Introduction to Data Analytics (ZD-1201)

Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2022

Students will learn the latest technologies including Tableau and Python in the field of data analytics.

Digital Transformation (Summer)

Short Term Course for visiting students of Singapore Management University, School of Digital Science, Universiti Brunei Darussalam, 2022

Students will learn to use digital technologies to create new or modify existing businesses in this short-term course.

Deep Learning (ZA-4302)

Bachelor of Digital Science, School of Digital Science, Universiti Brunei Darussalam, 2022

Students will learn to apply deep learning techniques for projects from different industries.

Digital Transformation (ZZ-1103)

Bachelor of Digital Science, School of Digital Science, Universiti Brunei Darussalam, 2022

Students will learn to use digital technologies to create new or modify existing businesses.