Beu Computer Science Syllabus _removed
Beu Computer Science Syllabus _removed
for
[July 2019]
Contents
Sl. No. Chapter Title Page No.
Chapter 1
General Course structure,
Theme & Semester-wise credit distribution
A. Definition of Credit:
1 Hr. Lecture (L) per week 1 credit
1 Hr. Tutorial (T) per week 1 credit
1 Hr. Practical (P) per week 0.5 credit
2 Hours Practical(Lab)/week 1 credit
B. Range of credits-A range of credits from 170 to 180 for a student to be eligible to get Under Graduate
degree in Engineering.
Total Credits: 12
Total Credits: 24
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Note: Mandatory Courses have no credit but L-T-P is 3-0-0. Only internal evaluation will
be done for successful complication of Mandatory Courses.
Chapter 2
Semester wise structure of Curriculum
I. Induction Program
Induction program 3 weeks duration
(mandatory)
Page 12 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
SI. Type of course Code Course Title Hours per week Credits
No.
Lecture Tutorial Practical
1 Professional PEC Elective-III 3 0 0 3
Elective CS
Courses 7XX
2 Open Elective OEC- Open Elective-I 3 0 0 3
courses CS 7XX
3 Basic Science BSC 701 Biology for Engineers 2 1 0 3
Courses
4 Massive Open MOOC MOOCs / SWAYAM / 3 0 0 3
Online Courses CS 701 NPTEL etc. Courses -
2
5 Project and PNS-CS- Project-II 0 0 12 6
Seminar 701
6 Summer SI 701 Summer Industry - - - 8
Industry Internship - 3
Internship
7 Professional PEL Professional Elective 0 0 2 1
Elective CS Lab II
Laboratory 7XX
Total credits 27
Page 13 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Page 14 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Professional-Elective-Lab I Professional-Elective-Lab II
Note: Any new programming language/ Software package/ Technology can be incorporated as
Professional-Elective-Lab as per requirement or demand.
Page 15 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Chapter 3
Page 16 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
Detailed contents:
Page 24 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Suggested books:
1. Kenneth H. Rosen, Discrete Mathematics and its Applications, Tata McGraw –Hill
2. Susanna S. Epp, Discrete Mathematics with Applications, 4th edition, Wadsworth
Publishing Co.Inc.
3. C L Liu and D P Mohapatra, Elements of Discrete Mathematics A Computer Oriented
Approach, 3rd Edition by, Tata McGraw –Hill.
Course Outcomes
1. For a given logic sentence express it in terms of predicates, quantifiers, and logical
connectives.
2. For a given a problem, derive the solution using deductive logic and prove the
solution based on logical inference.
3. For a given a mathematical problem, classify its algebraic structure
4. Evaluate Boolean functions and simplify expressions using the properties of Boolean
algebra
5. Develop the given problem as graph networks and solve with techniques of graph
theory.
******************************************************************
Page 25 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed contents:
Data representation: signed number representation, fixed and floating point representations,
character representation. Computer arithmetic – integer addition and subtraction, ripple carry adder,
carry look-ahead adder, etc. multiplication – shift-and-add, Booth multiplier, carry save multiplier,
etc. Division restoring and non-restoring techniques, floating point arithmetic.
Suggested books:
1. “Computer Organization and Design: The Hardware/Software Interface”, 5th Edition by David
A. Patterson and John L. Hennessy, Elsevier.
2. “Computer Organization and Embedded Systems”, 6th Edition by Carl Hamacher, McGraw Hill
Higher Education.
Course outcomes:
1. Draw the functional block diagram of a single bus architecture of a computer and describe the
function of the instruction execution cycle, RTL interpretation of instructions, addressing modes,
instruction set.
2. Write assembly language program for specified microprocessor for computing 16 bit
multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
3. Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors
and describe the process.
4. Given a CPU organization and instruction, design a memory module and analyze its operation by
interfacing with the CPU.
5. Given a CPU organization, assess its performance, and apply design techniques to enhance
performance using pipelining, parallelism and RISC methodology.
******************************************************************
Detailed Contents
Suggested books:
1. Operating System Concepts Essentials, 9th Edition by Avi Silberschatz, Peter Galvin, Greg Gagne,
Wiley Asia Student Edition.
2. Operating Systems: Internals and Design Principles, 5th Edition, William Stallings, Prentice Hall of
India.
3. Operating Systems: Design and Implementation 3rd Edition, 3rd Edition, Andrew S. Tanenbaum
Course Outcomes
After the completion of course, students can able to able to:
1. Understand algorithms for process scheduling for a given specification of CPU utilization,
Throughput, Turnaround Time, Waiting Time, and Response Time.
2. Develop the techniques for optimally allocating memory to processes by increasing memory
utilization and for improving the access time.
3. Understand and implement file management system
4. Understand the I/O management functions in OS by performing operations for synchronization
between CPU and I/O controllers.
******************************************************************
Detailed contents:
Page 30 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Suggested books:
1. Introduction to Algorithms, 4th Edition, Thomas H Cormen, Charles E
Lieserson, Ronald L Rivest and Clifford Stein, MITPress/McGraw-Hill.
2. Horowitz & Sahani, "Fundamental of Computer Algorithm", Galgotia.
3. Basse, "Computer Algorithms: Introduction to Design & Analysis", Addision Wesley.
Course Outcomes
1. For a given algorithms analyze worst-case running times of algorithms based
on asymptotic analysis and justify the correctness of algorithms.
2. Describe the greedy paradigm and explain when an algorithmic design
situation calls for it. For a given problem develop the greedy algorithms.
3. Describe the divide-and-conquer paradigm and explain when an algorithmic
design situation calls for it. Synthesize divide-and-conquer algorithms. Derive
and solve recurrence relation.
4. Describe the dynamic-programming paradigm and explain when an
algorithmic design situation calls for it. For a given problems of dynamic-
programming and develop the dynamic programming algorithms, and analyze
it to determine its computational complexity.
5. For a given model engineering problem model it using graph and write the
corresponding algorithm to solve the problems.
6. Explain the ways to analyze randomized algorithms (expected running time,
probability of error).
7. Explain what an approximation algorithm is. Compute the approximation
factor of an approximation algorithm (PTAS and FPTAS).
******************************************************************
Page 31 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Course Outcomes:
At the end of this course, students will demonstrate the ability to:
1. Understand working of logic families and logic gates.
2. Design and implement Combinational and Sequential logic circuits.
3. Understand the process of Analog to Digital conversion and Digital to Analog conversion.
4. Be able to use Programmable logic devices to implement the given logical problem.
expanding memory size, classification and characteristics of memories, sequential memory, read only
memory (ROM), read and write memory(RAM), content addressable memory (CAM), charge de
coupled device memory (CCD), commonly used memory chips, ROM as a PLD, Programmable
logic array, Programmable array logic, complex Programmable logic devices (CPLDS), Field
Programmable Gate Array (FPGA).
Suggested books:
1. R. P. Jain, "Modern Digital Electronics", McGraw Hill Education, 2009.
2. M. M. Mano, "Digital logic and Computer design", Pearson Education India, 2016.
3. A. Kumar, "Fundamentals of Digital Circuits", Prentice Hall India, 2016.
******************************************************************
Suggested books:
1. Gary Dessler, “Human Resource Management” - (8th ed.,) Pearson Education, Delhi.
2. Robbins, S. P., Judge & T. A., “Organizational Behavior”, Pearson Education, 15th Edn.
******************************************************************
We as human being are not an entity separate from the environment around us rather we are
a constituent seamlessly integrated and co-exist with the environment around us. We are not an entity
so separate from the environment that we can think of mastering and controlling it rather we
must understand that each and every action of ours reflects on the environment and vice versa. Ancient
wisdom drawn from Vedas about environment and its sustenance reflects these ethos. There is a direct
application of this wisdom even in modern times. Idea of an activity based course on environment
protection is to sensitize the students
on the above issues through following two type of activities:
Page 34 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
Detailed contents
Module 1 Lecture 6 hrs.
Database system architecture: Data Abstraction, Data Independence, Data Definition Language
(DDL), Data Manipulation Language (DML).
Data models: Entity-relationship model, network model, relational and object oriented data models,
integrity constraints, data manipulation operations.
recovery.
Suggested books:
1. “Database System Concepts”, 6th Edition by Abraham Silberschatz, Henry F. Korth, S.
Sudarshan, McGraw-Hill
Course Outcomes
1. For a given query write relational algebra expressions for that query and optimize the developed
expressions
2. For a given specification of the requirement design the databases using E‐R method and
normalization.
3. For a given specification construct the SQL queries for Open source and Commercial DBMS -
MYSQL, ORACLE, and DB2.
4. For a given query optimize its execution using Query optimization algorithms
5. For a given transaction-processing system, determine the transaction atomicity, consistency,
isolation, and durability.
6. Implement the isolation property, including locking, time stamping based on concurrency control and
Serializability of scheduling.
******************************************************************
Page 36 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed contents
Suggested books
1. John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman, Introduction to Automata
Theory, Languages, and Computation, Pearson Education Asia.
Course Outcomes:
After the completion of course, students can able to able to:
1. Write a formal notation for strings, languages and machines.
2. Design finite automata to accept a set of strings of a language.
3. For a given language determine whether the given language is regular or not.
4. Design context free grammars to generate strings of context free language.
5. Determine equivalence of languages accepted by Push Down Automata and
languages generated by context free grammars
6. Write the hierarchy of formal languages, grammars and machines.
7. Distinguish between computability and non-computability and Decidability
And undecidability.
******************************************************************
Detailed contents
Generate and Test, Best First Search, Beam Search, Hill Climbing, A*, Problem reduction search –
AND/OR Graphs, AO*, Constraint satisfaction, Means-ends analysis, Stochastic search methods -
Simulated Annealing, Particle Swarm Optimization, Game Playing - Minimax algorithm, Alpha-
beta pruning
Text Books
1. S. Russell and P. Norvig, “Artificial Intelligence: A Modern Approach,” Prentice Hall
2. E. Rich, K. Knight and S. B. Nair, “Artificial Intelligence,” TMH
References
1. C. Bishop,“Pattern Recognition and Machine Learning," Springer
2. D. W. Patterson, “Introduction to artificial intelligence and expert systems,” Prentice Hall
3. A. C.Staugaard, Jr., “Robotics and AI: An Introduction to Applied Machine Intelligence,”
Prentice Hall
4. I. Bratko, “Prolog Programming for Artificial Intelligence,” Addison-Wesley
5. S. O. Haykin, “Neural Networks and Learning Machines,” Prentice Hall
6. D.Jurafsky and J. H. Martin,“Speech and Language Processing,” Prentice Hall
Course Outcomes:
******************************************************************
Introduction: What is Software Engineering and its history, software crisis, Evolution of a
Programming System Product, Characteristics of Software, Brooks’ No Silver Bullet, and Software
Myths, Software Development Life Cycles: Software Development Process, The Code-and-Fix
model, The Waterfall model, The Evolutionary Model, The Incremental Implementation,
Prototyping, The Spiral Model, Software Reuse, Critical Comparisons of SDLC models, An
Introduction to Non-Traditional Software Development Process: Rational Unified Process, Rapid
Application Development, Agile Development Process.
Page 40 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Book:
1. Software Engineering: A Practitioner's Approach, R. S. Pressman, McGraw Hill
2. Fundamental of Software Engg. By Rajib Mall 4th edition PHI
3. A Concise Introduction to Software Engineering By Pankaj Jalote
Reference Book:
1. Zero Defect Software, G. G. Schulmeyer, McGraw-Hill
2. Object Oriented Modeling and Design, J. Rumbaugh, Prentice Hall
3. Software Engineering, K.K. Aggarwal, Yogesh Singh, New Age International Publishers
******************************************************************
Detail contents
Page 41 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Course outcomes
1. Student can able to write their resume and can prepare for presentation,
group discussion and interview.
2. Student can develop interpersonal skills like negotiation and leadership skills.
3. Students can develop Employability and Corporate Skills with proper time
management and stress management.
4. Students learn to practice the professional ethics, project management and
Entrepreneurship.
******************************************************************
The Constitution of India is the supreme law of India. Parliament of India can not make
any law which violates the Fundamental Rights enumerated under the Part III of the
Constitution. The Parliament of India has been empowered to amend the Constitution under
Article 368, however, it cannot use this power to change the “basic structure” of the
constitution, which has been ruled and explained by the Supreme Court of India in
its historical judgments. The Constitution of India reflects the idea of “Constitutionalism” –
a modern and progressive concept historically developed by the thinkers of “liberalism” –
an ideology which has been recognized as one of the most popular political ideology and
result of historical struggles against arbitrary use of sovereign power by state. The historic
revolutions in France, England, America and particularly European Renaissance and
Reformation movement have resulted into progressive legal reforms in the form of
“constitutionalism” in many countries. The Constitution of India was made by borrowing
models and principles from many countries including United Kingdom and America.
The Constitution of India is not only a legal document but it also reflects social,
political and economic perspectives of the Indian Society. It reflects India’s legacy of
“diversity”. It has been said that Indian constitution reflects ideals of its freedom movement,
however, few critics have argued that it does not truly incorporate our own ancient
legal heritage and cultural values. No law can be “static” and therefore the Constitution of
India has also been amended more than one hundred times. These amendments reflect
political, social and economic developments since the year 1950. The Indian judiciary
Page 42 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
and particularly the Supreme Court of India has played an historic role as the guardian of
people. It has been protecting not only basic ideals of the Constitution but also strengthened
the same through progressive interpretations of the text of the Constitution. The judicial
activism of the Supreme Court of India and its historic contributions has been recognized
throughout the world and it gradually made it “as one of the strongest court in the world”.
Course content:
1. Meaning of the constitution law and constitutionalism
2. Historical perspective of the Constitution of India
3. Salient features and characteristics of the Constitution of India
4. Scheme of the fundamental rights
5. The scheme of the Fundamental Duties and its legal status
6. The Directive Principles of State Policy – Its importance and implementation
7. Federal structure and distribution of legislative and financial powers between the
Union and the States
8. Parliamentary Form of Government in India – The constitution powers and status of
the President of India
9. Amendment of the Constitutional Powers and Procedure
10. The historical perspectives of the constitutional amendments in India
11. Emergency Provisions: National Emergency, President Rule, Financial Emergency
12. Local Self Government – Constitutional Scheme in India
13. Scheme of the Fundamental Right to Equality
14. Scheme of the Fundamental Right to certain Freedom under Article 19
15. Scope of the Right to Life and Personal Liberty under Article 21.
******************************************************************
Detailed contents
Lexical Analysis (scanner): Regular languages, finite automata, regular expressions, from regular
expressions to finite automata, scanner generator (lex, flex).
Suggested Books:
1. Compilers Principles Techniques And Tools by Alfred V. Aho, Ravi Sethi, Jeffery D.
Ullman. Pearson Education.
Course Outcomes
After the completion of course, students can able to able to:
1. Develop the lexical analyser for a given grammar specification.
2. Design top-down and bottom-up parsers for a given parser specification
3. Develop syntax directed translation schemes
4. Develop algorithms to generate code for a target machine
******************************************************************
Detailed contents
Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File
Transfer Protocol (FTP), WWW, HTTP, SNMP, Bluetooth, Firewalls, Basic concepts
of Cryptography.
Suggested books
1. Data Communication and Networking, 4th Edition, Behrouz A. Forouzan,
McGraw- Hill.
2. Data and Computer Communication, 8th Edition, William Stallings, Pearson
Prentice Hall India.
Course Outcomes
After the completion of course, students can able to able to:
1. Explain the functions of the different layer of the OSI Protocol.
2. Draw the functional block diagram of wide-area networks (WANs), local
area networks (LANs) and Wireless LANs (WLANs) and can able to
describe the function of each block.
3. Program for a given problem related TCP/IP protocol.
4. Configure DNS DDNS, TELNET, EMAIL, File Transfer Protocol (FTP),
WWW, HTTP, SNMP, Bluetooth, Firewalls using open source available
software and tools.
******************************************************************
Page 46 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
• To learn the concept of how to learn patterns and concept from data.
• Design and analyze various machine learning algorithms and their applications in recent trends.
• Evaluate the various factors of machine learning to measure the performance.
• Understand basic of machine learning’s application in recent trend of technology.
Detailed contents
Suggested books:
1. Machine Learning. Tom Mitchell. First Edition, McGraw- Hill, 1997
2. Introduction to Machine Learning Edition 2, by Ethem Alpaydin
Page 47 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
to monitor enzyme catalysed reactions. How does an enzyme catalyse reactions? Enzyme
classification. Mechanism of enzyme action. Discuss at least two examples. Enzyme kinetics and
kinetic parameters. Why should we know these parameters to understand biology? RNA catalysis.
Course Outcomes
After studying the course, the student will be able to:
1. Describe how biological observations of 18th Century that lead to major discoveries.
Page 49 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
2. Convey that classification per seis not what biology is all about but highlight the underlying
criteria, such as morphological, biochemical and ecological
3. Highlight the concepts of recessiveness and dominance during the passage of genetic material
from parent to offspring
4. Convey that all forms of life have the same building blocks and yet the manifestations are as
diverse as one can imagine
5. Classify enzymes and distinguish between different mechanisms of enzyme action.
6. Identify DNA as a genetic material in the molecular basis of information transfer.
7. Analyse biological processes at the reductionistic level
8. Apply thermodynamic principles to biological systems.
9. Identify and classify microorganisms.
******************************************************************
Course Outcomes:
At the end of this course, students will demonstrate the ability to
1. Understand the concepts of continuous time and discrete time systems.
2. Analyse systems in complex frequency domain.
3. Understand sampling theorem and its implications.
Detailed contents
Module 1 Lecture: 3 hrs.
Introduction to Signals and Systems: Signals and systems as seen in everyday life, and in
various branches of engineering and science. Signal properties: periodicity, absolute integrability,
determinism and stochastic character. Some special signals of importance: the unit step, the unit
impulse, the sinusoid, the complex exponential, some special time-limited signals; continuous
and discrete time signals, continuous and discrete amplitude signals. System properties:
linearity, additivity and homogeneity, shift-invariance, causality, stability, realizability.
Examples.
response, Fourier domain duality. The Discrete-Time Fourier Transform (DTFT) and the Discrete
Fourier Transform (DFT). Parseval's Theorem. Review of the Laplace Transform for
continuous time signals and systems, system functions, poles and zeros of system functions
and signals, Laplace domain analysis, solution to differential equations and system behavior.
The z-Transform for discrete time signals and systems, system functions, poles and zeros of
systems and sequences, z-domain analysis.
Suggested books:
1. A. V. Oppenheim, A. S. Willsky and S. H. Nawab, “Signals and systems”, Prentice Hall
India,
1997.
2. J. G. Proakis and D. G. Manolakis, “Digital Signal Processing: Principles, Algorithms,
and Applications”, Pearson, 2006.
3. H. P. Hsu, “Signals and systems”, Schaum’s series, McGraw Hill Education, 2010.
4. S. Haykin and B. V. Veen, “Signals and Systems”, John Wiley andSons, 2007.
5. A. V. Oppenheim and R. W. Schafer, “Discrete-Time Signal Processing”, Prentice Hall,
2009.
6. M. J. Robert “Fundamentals of Signals and Systems”, McGraw HillEducation, 2007.
7. B. P. Lathi, “Linear Systems and Signals”, Oxford University Press, 2009.
******************************************************************
Detailed contents
Page 51 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Book:
1. Douglas B. West, “Introduction to Graph Theory”, Prentice Hall of India
2. Deo, N: Graph theory, PHI
Reference Books:
1. Bondy and Murthy: Graph theory and application. Addison Wesley.
2. R. Diestel, "Graph Theory", Springer-Verlag, 2nd edition, 2000.
3. John M. Aldous and Robin J. Wilson: Graphs and Applications-An Introductory Approach,
Springer
4. Robin J, Wilson: Introduction to Graph Theory, Addison Wesley.
5. Frank Harary, “Graph Theory”, Narosa.
6. R. Ahuja, T. Magnanti, and J. Orlin, “Network Flows: Theory, Algorithms, and Applications”,
Prentice-Hall
Course Outcomes
At the end of this course, students will demonstrate the ability to
Page 52 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
Detailed contents
Page 53 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books:
1. Donald Hearn and M Pauline Baker, “Computer Graphics C Version”, Pearson Education
2. Foley, Vandam, Feiner, Hughes – “Computer Graphics principle”, Pearson Education.
3. Rogers, “ Procedural Elements of Computer Graphics”, McGraw Hill
4. Donald Hearn and M Pauline Baker, “Computer Graphics with OpenGL”, Pearson education
******************************************************************
Detailed contents
Text Books:
1. Core Java by R Nageswara & Kogent Solution Inc, Dreamtech.
2. The Complete Reference Java Tata McGraw Hill.
3. Java 6 Programming Black Book, w/CD by Kogent Solutions Inc,, Dreamtech .
Reference Books:
1. Professional Java, JDK 6 Ed. by Richardson Avondolio Wrox.
2. Programming with Java by E Balagurusamy Tata McGraw Hill.
******************************************************************
Objective of the course: This course is intended to teach the basics involved in publishing content
on the World Wide Web. This includes the ‘language of the Web’ – HTML, the fundamentals of
graphic production with a specific stress on creating graphics for the Web, and a general grounding
introduction to more advanced topics such as programming and scripting. This will also expose
students to the basic tools and applications used in Web publishing.
Detailed contents
Page 55 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Variables, ASP Control Structure, ASP Objects’ Properties and Methods, ASP Components, ASP
Database Connection, ASP Scripting Components.
Text Book:
1. Jeffrey C. Jackson, “Web Technologies: A computer science perspective”, Pearson Education
2. Developing Web Applications, Ralph Moseley and M. T. Savaliya, Wiley-India
3. Web Technologies, Black Book, dreamtech Press
4. Web Design, Joel Sklar, Cengage Learning
5. Developing Web Applications in PHP and AJAX, Harwani, McGrawHill
Reference Books:
1. Eric T. Freeman, Elisabeth Robson, “Head First JavaScript Programming”, O’Reilly Media
2. L. Beighley, Michael Morrison, “Head First PHP & MySQL”, O-Reilly Media
3. B. Basham, Kathy Sierra, Bert Bates, “Head First Servlets and JSP”, O'Reilly publication.
4. R. M. Riordan, “Head First Ajax”, O’Reilly Media.
5. Web Design with HTML, CSS, JavaScript and Query Set by Jon Duckett
******************************************************************
Detailed contents
Function Technique, Random Functions Associated with Normal Distributions, The Central Limit
Theorem, Approximations for Discrete Distributions, Chebyshev’s Inequality and Convergence in
Probability, Limiting Moment-Generating Functions.
Text Book:
1. “Probability And Statistical Inference”, Robert V. Hogg, Elliot A. Tanis, Dale L. Zimmerman;
Pearson Education, Inc. Ninth Edition-2015.
Reference Books:
1. “Statistical Inference”, M. Rajagopalan, P. Dhanavanthan, PHI Learning – 2012
2. “Probability Distribution Theory and Statistical Inference”, Kartick Chandra Bhuyan, NCBA
Publication - 2010.
******************************************************************
Detailed contents
Page 58 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books:
1. Silberschatz A, KorthHF, Sudarshan S, Database System Concepts, McGrall Hill.
2. Ceri S, Pelagatti G, Distributed Databases – Principles and Systems, McGraw Hill.
******************************************************************
Detailed contents
Module 1 Lectures: 7 hrs.
Security Services, Mechanisms and Attacks, TheOSI Security Architecture, A Model for Network
Security. Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotol
Machines, Steganography.
Triple DES, Block cipher Modes of operation, Stream ciphers and RCG.
Text Book:
1. W.Stallings : Cryptography and Network Security : Principles and Practice, 4/e Pearson
Education, New Delhi, 2006.
Reference Books:
1. B.A. Forouzan – Cryptography and Network Security, TMH, New Delhi, 2007
2. B. Schneier – Applied Cryptography, John Wiley, Indian Edition, 2006.
******************************************************************
Detailed contents
Module 1 Lectures: 8 hrs.
Classes of computers, Trends in technology, power and costs, dependability, quantitative principles
of computer design, Introduction to computing models.
Page 60 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books:
1. Computer Architecture: A Quantitative Approach : Hennessy and Patterson : Morgan Kaufmann
2. Advanced Computer Architecture, Kai Hwang , McGraw Hill
3. Advanced Computer Architectures : A design space approach, Sima D, Fountain T. and Kacsuk
P, Pearson Education
******************************************************************
Detailed contents
Module 1: Introduction to Multimedia System Lectures: 6 hrs.
Architecture and components, Multimedia distributed processing model, Synchronization,
Orchestration and Quality of Service (QOS) architecture.
Page 61 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books
1. Handbook of Multimedia Computing, Borivoje Furht
2. Multimedia Systems, Standards, and Networks, A. Puri and T. Chen, Marcel Dekker
3. Multimedia : Computing Communications & Applications, Ralf Steinmetz, Klara
Nahrstedtm
Reference Books
******************************************************************
Detailed contents
Module 1 Lectures: 8 hrs.
Java Beans and Web Servers: Introduction to Java Beans, Advantage, Properties, BDK,
Introduction to EJB, Java Beans API Introduction to Servelets, Lifecycle, JSDK, Servlet API,
Servlet Packages: HTTP package, Working with Http request and response, Security Issues. Java
Script: Data types, variables, operators, conditional statements, array object, date object, string
object, Dynamic Positioning and front end validation, Event Handling
Page 62 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
1. Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers,
2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc.
3. Hortsmann& Cornell, “Core Java 2 Advanced Features, Vol II”, Pearson Education,
References:
1. Web reference: http://java.sun.com.
2. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-Hill.
******************************************************************
Detailed Contents
Page 63 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books:
1. Joel Grus, "Data Science from Scratch: First Principles with Python", O'Reilly Media
2. Aurélien Géron, "Hands-On Machine Learning with Scikit-Learn and Tensor Flow:
Concepts, Tools, and Techniques to Build Intelligent Systems", 1st Edition, O'Reilly Media
3. Jain V.K., “Data Sciences”, Khanna Publishing House, Delhi.
4. Jain V.K., “Big Data and Hadoop”, Khanna Publishing House, Delhi.
5. Jeeva Jose, “Machine Learning”, Khanna Publishing House, Delhi.
6. Chopra Rajiv, “Machine Learning”, Khanna Publishing House, Delhi.
7. Ian Goodfellow, Yoshua Bengio and Aaron Courville, "Deep Learning", MIT Press
http://www.deeplearningbook.org
8. Jiawei Han and Jian Pei, "Data Mining Concepts and Techniques", Third Edition, Morgan
Page 64 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Kaufmann Publishers
******************************************************************
Detailed Contents
Text Book
1. Jiawei Han, MichelineKamber and Jian Pei, “Data Mining Concepts and Techniques”, Third
Page 65 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining &OLAP”, Tata McGraw –
Hill Edition, Tenth Reprint 2007.
2. K.P. Soman, ShyamDiwakar and V. Ajay “Insight into Data mining Theory and Practice”, Easter
Economy Edition, Prentice Hall of India, 2006.
3. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice
Hall of India, 2006.
4. Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2007.
******************************************************************
Page 66 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Course outcomes
******************************************************************
Page 67 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
1. Alexis Leon, “ERP Demystified”, Tata McGraw Hill.
2. E-Commerce An Indian Perspective by P.T.Joseph, PHI
Reference Books
1. K.K. Bajaj, D. Nag “E-Commerce”, 2nd Edition, McGraw-Hill Education, New Delhi.
2. Bhaskar Bharat, “Electronic Commerce-Technology and Application”, McGraw-Hill
Education, New Delhi.
3. Mary Sumner, “Enterprise Resource Planning”, 2005, PHI Learning India Pvt. Ltd. /Pearson
Education, New Delhi.
4. Chan, “E-Commerce fundamentals and Applications”, Wiley India, New Delhi.
5. Vinod Kumar Garg and N.K .Venkata Krishnan, “Enterprise Resource Planning – concepts
and Planning”, Prentice Hall, 1998.
******************************************************************
Page 68 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed Contents
Text Books
1. Michael Kifer, Arthur Bernstein and Philip M. Lewis, “Database Systems: An Application-
Oriented Approach”, Addison Wesley, 2006
2. Philip A. Bernstein and Eric Newcomer, “Principles of Transaction Processing”, 2nd Edition,
Morgan Kaufmann Publishers, Elsevier, 2009
******************************************************************
Page 69 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
The objective of this course is to impart necessary and practical knowledge to identify and
solve problems in distributed, multiprocessor and database operating systems.
Detail contents
Page 70 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Suggested books:
1. Pradeep K. Sinha, “Distributed Operating Systems: Concepts and Design”,
Wiley.
2. Andrew S. Tanenbaum, “Distributed Operating Systems”, Pearson.
3. Mukesh Singhal & Niranjan Shivaratri, “Advanced Concepts in Operating
Systems”, McGraw Hill Education.
Course Outcomes
Students should be able to:
1. Identify and solve problems in distributed, multiprocessor and database operating systems.
2. Explain the architectural features and solutions for implementing various virtualization
features in operating systems.
3. Solve synchronization problems involving distributed and virtualized environments.
******************************************************************
Detail contents
Page 71 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Reference Books:
1. D.E. Goldberg -Genetic Algorithms in Search Optimization and Machine Learning, Pearson
Education, New Delhi, 2005.
2. M. D. Vose – The Simple Genetic Algorithm, PHI, New Delhi, 2004.
******************************************************************
Objective: To introduce geometric algorithms and to give an exposure to algorithms and data
structures for geometric problems.
Detail contents
Page 72 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Suggested Books:
1. M. de Berg, M van Kreveld, M. Overmars, O. Schwarzkopf, Computational Geometry:
Algorithms and Applications (2nd Edition), Springer - Verlag 2000
2. J. O’Rourke, Computational Geometry in C, 2nd ed., Cambridge Univ. Press, 1998.
3. B. Casselman, Mathematical Illustrations: A Manual of Geometry and PostScript, Springer-
Verlag,.
(http://www.math.ubc.ca/~cass/graphics/manual) 2005
4. K. Mulmuley, Computational Geometry: An Introduction Through Randomized Algorithms,
Prentice Hall. 1994
Course Outcome:
Upon successful completion of this course, students will be able to:
(i) Analyze randomized algorithms for small domain problems.
(ii) Use line-point duality to develop efficient algorithms.
(iii) Apply geometric techniques to real-world problems in graphics.
(iv) Solve linear programs geometrically.
******************************************************************
Page 73 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed contents
Reference Books:
1. Jurafsky, Dan and Martin, James, “Speech and Language Processing”, 2nd Edition,
Prentice Hall, 2008
2. Manning, Christopher and Heinrich, Schutze, “Foundations of Statistical Natural Language
Processing”, MIT Press, 1999
3. Allen James, “Natural Language Understanding”, 2nd edition, Benjamin Cumming, 1995
4. Charniack, Eugene, “Statistical Language Learning”, MIT Press, 1993
******************************************************************
Objective: This course will cover the study of various cloud services, deployment model, resource
Page 74 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
provisioning and scheduling algorithms involved in better implementing the cloud-based systems.
Detailed contents
Module 1 Lecture 4 hrs.
Introduction: Distributed Computing and Enabling Technologies, Cloud Fundamentals: Cloud
Definition, Evolution, Architecture, Applications, deployment models, and service models.
Suggested Books:
1. Cloud Computing Principles and Paradigms, Rajkumar Buyya, James Broberg, Andrzej
Goscinski, Wiley Publishers 2011
2. Cloud Computing Bible, Barrie Sosinsky, Wiley Publishers 2010
3. Mastering Cloud computing, Rajkumar Buyya, Christian Vacchiola, S Thamarai Selvi,
McGraw Hill 2013
4. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,
Subra Kumaraswamy, Shahed Latif, O’Reilly 2010
5. Cloud Computing by Shailendra Singh 2018
Course outcomes:
1. Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
and the possible applications for state-of-the-art cloud computing
2. Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS,
public cloud, private cloud, hybrid cloud, etc.
3. Identify problems, and explain, analyze, and evaluate various cloud computing solutions
4. Provide the appropriate cloud computing solutions and recommendations according to the
Page 75 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
applications used.
5. Attempt to generate new ideas and innovations in cloud computing
******************************************************************
Detailed contents
Suggested books:
1. Ian Goodfellow, Yoshua Bengio and Aaron Courville, “Deep Learning”, Book in
Page 76 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Learning Outcomes
Identify the deep learning algorithms which are more appropriate for various types of
learning tasks in various domains.
Implement deep learning algorithms and solve real-world problems.
******************************************************************
Detailed contents
Reference Book:
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder,
Bitcoin and Cryptocurrency Technologies, 2016.
******************************************************************
Page 77 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed contents
Text Books
1. Pattern recognition, Sergios Theodoridis
2. Pattern classification, second edition, duda, hart and stork ,wiley
3. Pattern recognition, Sergios Theodoridis Konstanti Nos Koutrou M Bas
Reference Books
Page 78 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
Detailed contents:
Text Book:
1. Soft Skills, 2015, Career Development Centre, Green Pearl Publications.
Reference
1. Covey Sean, Seven Habits of Highly Effective Teens, New York, Fireside Publishers, 1998.
2. Carnegie Dale, How to win Friends and Influence People, New York: Simon & Schuster, 1998.
Page 79 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
******************************************************************
Detailed contents
******************************************************************
Detailed contents
Page 81 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books
1. Dhingra, Ishwar C. [2006],’Indian Economy,’ Sultan Chand and Sons, New Delhi.
2. Datt, Ruddar and Sundaram, K.P.M. [Latest edition] ,’Indian Economy,’ S. Chand and Co, New
Delhi.
Reference Books
1. Brahmananda, P.R. and V.A. Panchmukhi. [2001], Ed. ‘Development Experience in Indian
Economy, Inter-state Perspective,’ Bookwell, New Delhi.
2. Gupta,S.P. [1989],’Planning and Development in India: A Critique,’ Allied Publishers Private
Limited, New Delhi.
3. Bhagwati, Jagdish. [2004],’In Defense of Globalization,’ Oxford University Press, U.K.
******************************************************************
Detail contents
Module 1 Lecture 8 hrs.
Introduction: Computers and its Impact in Society, Overview of Computer and Web
Technology, the Internet and online resources, Security of information, Introduction to ethical
theory and its application to the Internet, Definition of Cyber Security. Search Engines, E –
mails and WWW, E – commerce & M – commerce System Security, Government Regulation
of the Internet.
Cyber Crimes & Legal Framework: Distinction between Cyber Crime and Conventional
Crime, Cyber Criminals and their Objectives, Kinds of Cyber Crime: Hacking, Digital Forgery,
Cyber Stalking/Harassment, Identity Theft & Fraud, Cyber terrorism, Cyber Defamation,
Computer Vandalism etc. Cyber Crimes against Individuals, Institution and State, Issues in Data
and Software Privacy, Cyber Forensics.
Introduction to Indian Cyber Law: Overview of General Laws and Procedures in India,
Different offences under IT Act, Overview of Information Technology Act, 2000 and
Information Technology (Amendment) Act, 2008. National Cyber Security Policy 2013,
Page 82 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Offences in Cyber Space under the Indian Penal Code, 1860, Intellectual Property Issues in Cyber
Space, Interface with Copyright Law, Interface with Patent Law, Trademarks & Domain Names
Related issues.
Course outcomes
After the completion of course, students can able to able to demonstrate a
critical understanding of the Cyber law and Cyber-crime with respect to IT Act.
******************************************************************
Detailed contents
Page 83 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Book:
1. Wayner Wolf., “Computers as components – Principle of Embedded Computing System Design”,
Morgan Kaufmann/ Hercourt India Pvt. Ltd.
Reference Books:
1. Raj Kamal - Embedded Systems, TMH, New Delhi 2004.
2. F. Vahid& T. givargis- Embedded system Design, John wiley, India Edition, 2005.
******************************************************************
Detailed contents
Module 1 Lecture 8 hrs.
Introduction: Characterization and classification of signals, typical signal processing operations,
Review of discrete-time signal and system analysis; Advantages and typical applications of DSP.
Page 84 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
Reference Books:
1. Digital Signal Processing: Principles, Algorithm and Applications, Proakis, J.G. and
Manolakis, D.G
2. Multirate Systems and Filter Banks ,Vaidyanathan, P.P
******************************************************************
Detailed contents
Module 1 Lecture 10 hrs.
Introduction: Hard vs. Soft real time systems, A reference model of real time system. Real-time
scheduling: Clock driven approach, Weighted Round-robin approach, Priority driven approach,
Dynamic vs. static system, Effective Release Times and Deadlines, EDF and LST algorithm,
Optimality and Non-Optimality of the EDF and LST algorithms, Off line vs. online Scheduling.
Page 85 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Suggested Books:
1. Real-Time system by Jane W. S. Liu, Pearson Education
2. Real-Time Systems by C. M. Krishna and K. G. Shin, McGraw Hill
Course Outcome:
After learning this subject, students will learn various types of Real Time Systems, Periodic
and Aperiodic tasks, different types of scheduling algorithms in RTS( Clock Driven, Priority
Driven), Priority Driven Scheduling Of Periodic Tasks, Priority Driven Scheduling of Aperiodic
and Sporadic Jobs, Different protocols for resource access controls, Scheduling approach in
multiprocessor Real Time Systems etc.
******************************************************************
Detailed contents
Module 1 Lecture 8 hrs.
Introduction: Background, Digital Image Representation, Fundamental Steps in Image Processing,
Elements of a Digital Image Processing System.
Digital Image Fundamentals: Elements of Visual Perception, a Simple Image Model, Sampling
and Quantization, Some Basic Relationships between Pixels, Imagining Geometry.
Text Book:
1. Rafael. C. Gonzalez & Richard E.Woods.- Digital Image Processing, 2/e Pearson Education,
New Delhi - 2006
Reference Books:
1. W.K.Pratt.-Digital Image Processing, 3/e Edn., John Wiley & sons, Inc. 2006
2. M. Sonka et.al Image Processing, Analysis and Machine Vision, 2/e, Thomson, Learning, India
Edition, 2007
******************************************************************
Detailed contents
Module 1 Lecture 8 hrs.
Introduction to Wireless Networks: Applications, History, Simplified Reference Model, Wireless
transmission, Frequencies, Signals, Antennas, Signal propagation, Multiplexing, Modulation,
Spread spectrum, Cellular Systems.
Page 87 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Book:
1. Jochen Schiller, “Mobile Communications”, Pearson Education, Asia Publications, 2000.
Reference Books:
1. William Stallings, “Wireless Communication and Networks”, PHI/Pearson Education, 2002.
2. KavehPahlavan, PrasanthKrishnamoorthy, “Principles of Wireless Networks”, PHI/Pearson
Education, 2003.
3. HazysztofWesolowshi, “Mobile Communication Systems”, John Wiley and Sons Ltd, 2002.
******************************************************************
Detailed contents
Module 1 Lecture 8 hrs.
Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM logical
Connection, ATM Cell – ATM Service Categories – AAL, High Speed LANs: Fast Ethernet,
Gigabit Ethernet, Fiber Channel – Wireless LANs: applications, requirements – Architecture of
802.11.
Page 88 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
1. William Stallings, “High Speed Networks and Internet”, Pearson Education, 2 nd Edition, 2002
2. Warland, Pravin Varaiya, “High performance communication networks”, 2 nd Edition, Jean
Harcourt Asia Pvt. Ltd., 2001
Reference Books:
1. IrvanPepelnjk, Jim Guichard, Jeff Apcar, “MPLS and VPN architecture”, CiscoPress, Volume 1
and 2, 2003
2. Abhijit S. Pandya and Ercan Sea, “ATM Technology for Broad Band Telecommunication
Networks”, CRC Press, New York, 2004
******************************************************************
Objectives:
Understand the design issues in Ad Hoc and Sensor Networks.
Learn the different types of MAC protocols.
Be familiar with different types of Ad-hoc routing protocols.
Be expose to the TCP issues in Ad-hoc networks.
Learn the architecture and protocols of wireless sensor networks.
Detailed contents
Module 1: Introduction Lectures 8 hrs.
Fundamentals of wireless communication technology – the electromagnetic spectrum – radio
propagation mechanisms – characteristics of the wireless channel – Mobile Ad-hoc Networks
(MANETS) and Wireless Sensor Networks (WSNs): concepts and architectures. Applications of
Ad-hoc and sensor networks. Design challenges in Ad-hoc and sensor networks.
Page 89 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Lectures 8 hrs.
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing,
reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over
Ad hoc wireless Networks.
Module 4: Wireless Sensor Networks (WSNs) And MAC Protocols Lectures 8 hrs.
Single node architecture: hardware and software components of a sensor node - WSN Network
architecture: typical network architectures-data relaying and aggregation strategies -MAC layer
protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4
Text Book:
1. C. Siva Ram Murthy and B.S.Manoj, ―Ad Hoc Wireless Networks – Architectures and
Protocols, Pearson Education, 2006.
2. Holger Karl and Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”,
Wiley, 2005
References Book:
1. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks: Theory and
Applications”, World Scientific Publishing Company, 2006.
2. Feng Zhao and Leonides Guibas, "Wireless Sensor Networks", Elsevier Publication - 2002.
Course Outcomes:
Upon completion of the course, the student should be able to:
1. Identify different issues in wireless ad hoc and sensor networks.
2. Analyze protocols developed for ad hoc and sensor networks.
3. Identify and understand security issues in ad hoc and sensor networks.
******************************************************************
Detailed contents
Module 1 Lectures 6 hrs.
Introduction to VLSI design: Moore’s Law; Scale of Integration; Types of VLSI Chips; Design
Page 90 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
principles (Digital VLSI); Design Domains(Y-Chart), Challenges of VLSI design- power, timing
area, noise, testability reliability, and yield; CAD tools for VLSI design
Text Books:
1. Neil H. E. Weste and Kamran Eshraghian, “Principles of CMOS VLSI Design”, 2nd edition,
Pearson Education Asia, 2000.
2. John P. Uyemura, “Introduction to VLSI Circuits and Systems”, John Wiley and Sons, Inc., 2002.
3. Samir Palnitkar, “Verilog HDL”, 2nd Edition, Pearson Education, 2004.
Reference Books:
1. Eugene D. Fabricius, “Introduction to VLSI Design”, TMH International Editions, 1990.
2. Bhasker J., “A Verilog HDL Primer”, 2nd Edition, B. S. Publications, 2001.
3. Pucknell, “Basic VLSI Design”, Prentice Hall of India Publication, 1995.
4. Wayne Wolf, “Modern VLSI Design System on chip”, Pearson Education, 2002.
******************************************************************
Page 91 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Detailed contents
Page 92 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
1. Digital Communications, Simon Haykin John Wiley & Sons, Indian edition
2. Modern Digital and Analog Communication Systems, fourth edition by B.P. Lathi and Zhi Ding,
Oxford University Press
3. Introduction to data communications and networking, Behrouz Forouzan
Reference Books:
1. Fundamentals of Communication Systems by J Proakis and M Salehi
2. Signals and Systems, second edition, by A. Oppenheim and A. Willsky
******************************************************************
Detailed contents
Page 93 of 94
AKU Curriculum for Undergraduate Degree in Computer Science and Engineering
Text Books:
1. Theory of modeling and simulation, Zeigler B. P. Praehofer. H. and Kim I.G.
2. System Simulation: the Art and Science, Shannon, R. E.
Reference Books:
1. Modern control Engineering, Ogata K
2. Neuro-Fuzzy and soft Computing ", Jang J.S.R. sun C.T and Mizutani E
******************************************************************
Page 94 of 94