Beruflich Dokumente
Kultur Dokumente
References:
1. Bernard Kolman & David R. Hill, “Introductory Linear Algebra – An Applied First
Course, 8th Edition”, Pearson Prentice Hall, 2005.
2. Otto Bretscher, “Linear Algebra with Applications”, 3rd Edition, Pearson Prentice
Hall, 2005.
3. Howard Anton, “Elementary Linear Algebra”, 9 th Edition, John Wiley & Sons, Inc.
2005.
4. Sheldon Ross, “A First Course in Probability”, 7th Edition, Pearson Prentice Hall,
2006.
5. Kishor S. Trivedi, “Probability and Statistics with Reliability, Queueing and
Computer Science Applications”, 2nd edition, John Wiley & Sons, Inc., 2002.
6. S. Karlin & H. M. Taylor, “A First Course in Stochastic Processes”, 2 nd Edition,
Academic Press, Inc., 1975.
7. Papoulis A. & S. U. Pillai, “Probability, Random Variables and Stochastic
Processes”, 4th Edition, McGraw Hill, 2002.
L T P C
MAE 102 ANALOG INTEGRATED CIRCUIT DESIGN
4 0 0 4
References:
1. David A. Johns & Ken Martin, “Analog Integrated Circuit Design”, Wiley India Pvt.
Ltd., 2008.
2. Behzad Razavi, “Design of Analog CMOS Integrated Circuits”, Tata McGraw Hill,
2008.
3. Philip Allen & Douglas Holberg, “CMOS Analog Circuit Design”, Oxford University
Press, 2009.
4. R. Gregorian, G. C. Temes, “Analog MOS ICs for Signal Processing”, John Wiley &
Sons Inc., 2004.
L T P C
MAE 103 ADVANCED DIGITAL COMMUNICATION
4 0 0 4
Optimum waveform receiver in additive white Gaussian noise (AWGN) channels - Cross
correlation receiver, Matched filter receiver and error probabilities.
Optimum Receiver for Signals with random phase in AWGN Channels- Optimum
receiver for Binary Signals- Optimum receiver for M-ary Orthogonal signals- Probability
of error for envelope detection of M-ary Orthogonal signals.
Optimum waveform receiver for coloured Gaussian noise channels- Karhunen Loeve
expansion approach, whitening.
References:
Module 1:
a. RF Issues
Importance of RF design, Electromagnetic Spectrum, RF behaviour of passive
components, Chip components and Circuit Board considerations, Scattering Parameters,
Smith Chart and applications.
b. RF Filter Design
Overview, Basic resonator and filter configuration, Special filter realizations, Filter
implementations, Coupled filter.
References:
1. Reinhold Ludwig & Powel Bretchko, “RF Circuit Design – Theory and
Applications”, 1st Edition, Pearson Education Ltd., 2004.
2. Joseph J. Carr, “Secrets of RF Circuit Design”, 3rd Edition, Tata McGraw Hill, 2004.
3. Mathew M. Radmanesh, “Radio Frequency & Microwave Electronics”, 2nd Edition
Pearson Education Asia, 2006.
4. Ulrich L. Rohde & David P. NewKirk, “RF / Microwave Circuit Design”, John Wiley
& Sons, 2000.
5. Roland E. Best, “Phase - Locked Loops: Design, simulation and applications”, 5 th
Edition, McGraw Hill, 2003.
L T P C
MAE 105 - 3 COMMUNICATION NETWORKS
3 0 0 3
Module 2:
a. TCP / IP Network
a. ATM Network
ATM network, features, addressing, signalling, routing, ATM adaptation layer (AAL),
management and control, BISDN, internetworking with ATM. Optical networks, WDM
systems, cross connects, optical LANs and Networks.
Module 4: Switching
Switching, performance measures, time and space division switching, modular switch
designs, packet switching, distributed buffer, shared buffer, output buffer and input buffer
switches, attributes of a global multimedia network, challenges in its realization.
References:
3. Sumit Kasera & Pankaj Sethi, “ATM Networks”, Tata McGraw Hill, 2005.
5. Larry L. Peterson & Bruce S Davie, “Computer Networks”, 4 th Edition, Elsevier India
Pvt. Ltd., 2007.
L T P C
MAE 106 - 4 SECURE COMMUNICATION
3 0 0 3
Module 1: Introduction
Rings and fields - Homomorphism- Euclidean domains - Principal Ideal Domains -
Unique Factorization Domains -- Field extensions- Splitting fields - Divisibility- Euler
theorem - Chinese Remainder Theorem - Primality
Module 3: Cryptography
Private key and Public key cryptosystems - One way functions - Discrete log problem –
Factorization problem - RSA encryption - Diffie Hellmann key exchange - Message
authentication and hash functions -Digital signatures - Secret sharing - features of visual
cryptography - other applications of cryptography
References: