AV-610 Linear Systems Theory
The course covers the following topics. Linear spaces and linear operators. Bases, subspaces, eigenvalues and eigenvectors, canonical forms. Linear differential and difference equations. Mathematical representations: state equations, transfer functions, impulse response, matrix fraction and polynomial descriptions. System-theoretic concepts: causality, controllability, observability, realizations, canonical decomposition, stability, introduction to optimal control and the Kalman filter.
AV-611 Linear Multivariable Feedback Control Systems
Control design concepts for linear multivariable systems, System Modeling, Design of feedback controllers, Full Order Observer design, Internal Stability, Transfer functions and closed-loop stability, Closed Loop Design Specifications, Sensitivity to Plant Model Uncertainty, The Bode Loop Shaping, Multivariable (MIMO) Closed Loop system representations, Observer-Based Compensator, Multivariable Integral Control, Feasibility for MIMO systems, Bias Estimation & Integral Control, LQR Controller, Kalman filter as an optimal estimator, Time Domain Design Limitations, Frequency Domain Design Specifications, Robust Stability, MIMO Generalization of the Stability Robustness, Singular Values and Feedback Control, Classical properties of LQ regulators, The MIMO Root Locus.
AV-620 Random Processes
Topics include probability axioms, sigma algebras, random vectors, expectation, probability distributions and densities, Poisson and Wiener processes, stationary processes, autocorrelation, spectral density, and effects of filtering, linear least-squares estimation, and convergence of random sequences.
AV-621 Digital Signal Processing
Introduction to digital signal processing of continuous and discrete signals. The family of Fourier Transforms, including the Discrete Fourier Transform (DFT). Development of the Fast Fourier Transform (FFT). Signal sampling and reconstruction. Design and analysis of digital filters. Correlation and spectral estimation. Estimators of second-order properties of random processes: nonparametric and model-based techniques of spectral estimation.
AV-626 Digital Communications
This course covers Sampling, Pulse Code Modulation, Pulse Amplitude Modulation, Pulse Position Modulation, Time Division Multiplexing, Digital Passband Modulation: Gram Schmidt Orthogonalization Procedure, Geometric representation of signals, Noise: Additive Gaussian white and colored noise, multiplicative noise, Receivers: Optimal Receiver in AWGN (ML Receiver), sub-optimal Receivers, Matched Filter Receiver, Receiver Performance, Performance comparison of modulation schemes, Probability of Error, Coherent modulation schemes: BFSK, BPSK, Binary Amplitude shift keying: BASK, M-ary modulation schemes, Performance comparison of modulation schemes in AWGN, Non-Coherent Digital Modulation Schemes, Non-Coherent ML Receiver, Non-Coherent BPSK, Non-Coherent BFSK, Non-Coherent BASK, Synchronization and Symbol Timing Recovery, Digital Communication through band-limited channels: ISI, Optimum receiver with ISI, Equalization.
AV-630 Wireless Communications I
This course covers the overview of wireless communication, Cellular concepts & cellular standards, Channel Modeling - Path loss & Large-scale propagation, Channel Modeling – Small Scale Fading, Modulation techniques, Error Correction Coding, Multiple Access (MA) Techniques, Spread spectrum (SS), Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Code Division Multiple Access (DS-CDMA).
AV-632 Software Engineering
The goal of software engineering is to control the quality of software by following engineering principles during development. In the practical aspect of this course, the use of object-oriented programming, design patterns, refactoring and extreme programming will be discussed. As a graduate-level course, the other aspect of this course focuses on automatic techniques that analyze software artefacts and thus facilitate the engineering process. Through course projects, students will acquire hands-on experience in analyzing software.
AV-635 Satellite Communications
Introduction to the theory and applications of modern satellite communications, Satellite channel characterization, Channel impairments and transmission degradation, Link calculations, Modulation, coding, Multiple access, Broadcasting, Random access schemes, Demand assignment, Synchronization, Satellite switching and onboard processing, Integrated service digital satellite networks, a Satellite transponder, ground stations, packet switching, Optical satellite communications.
AV-640 Electromagnetic Field Theory
The course covers the following topics. Vectors, Coulomb’s Law, Electric Field, Gauss’s Law, Scalar Potential, Conductors in Electrostatic Fields, Electrostatic Energy, Electric Multipoles, Boundary Conditions at Surface Discontinuity, Electrostatics in the presence of Matter, Special Methods in Electrostatics, Electric Currents, Ampere’s Law, Magnetic Induction, Integral form of ampere’s law, Vector Potential, faraday’s Law of Induction, Magnetic Energy, Magnetic Multipoles, magnetism in the presence of matter, Maxwell’s Equations, and Scalar and Vector Potentials.
AV-641 Transmission Lines and Waveguides
The course covers the following topics. Plane waves, Polarization, Laws of Reflection and Refraction, Energy Relations, Waveguides (Fields in Bounded Regions), Circuits and Transmission Lines.
AV-671 Intermediate Optics
Geometrical optics, aberration theory, evaluation of optical systems, ray-tracing using commercial software, methods of optical design Radiometry: Optical transmission, irradiance, radiance, intensity, Optical sources: Common source types, systems design with sources, source specifications, source selection and system trades, Detectors and FPAs and Opto-mechanical design.
AV-672 Optical Waveguides and Cavities
Review of Maxwell’s equations and solutions. Electromagnetic waves in lossy, and anisotropic media. Waves at plane boundaries. Guided waves. Duality, uniqueness, image theory, equivalence principle, and reciprocity. Introduction to radiation and scattering. Problem formulation using Green’s function and integral equations.
AV-673 Optical Communication
Dielectric slab waveguides. Classification of mode types. Parabolic two-dimensional media. Circular waveguides. Step-index and graded-index optical fibers. Effect of loss. Dispersion effects. Fabrication methods in integrated optics and optical fibers. Light sources. Couplers. Opto-electronic devices. Applications in communication systems, Free-space optical communication.
AV-712 Optimal Control
The course covers the following topics. Euler-Lagrange formulation; Hamilton-Jacobi approach; Pontryagin's minimum principle; Systems with quadratic performance index; Second variation and neighbouring extremals; Singular solutions; numerical solution techniques.
AV-713 Non-Linear Systems
The course covers the following topics. Introduction to the analysis and design of nonlinear systems and nonlinear control systems. Stability analysis using Lyapunov, input-output and asymptotic methods. Design of stabilizing controllers using a variety of methods: linearization, absolute stability theory, vibrational control, sliding modes and feedback linearization.
AV-714 Flight Dynamics & Control
This course covers Vector Kinematics, Quaternion and Matrix Analysis of Kinematics, Geodesy & Rigid Body Dynamics, Review of Aerodynamics, Static Stability Analysis, Review of Classical and Modern Control Theory, Nonlinear Aircraft Model, Linear Models and Stability Derivatives, Simulation of Aircraft Dynamics, Trim point, Calculations & Numerical Linearization, Aircraft Rigid Body Modes, Handling Qualities, Stability Augmentation, Control Augmentation, Autopilots.
AV-715 Robust Control
Introduction to Lebesgue and Hardy functional spaces, linear operators and norms; time and frequency domain representations of linear systems, internal stability, performance measures and their limitations; the model reduction and approximation by balanced realization; classical method of robustness in the frequency domain, Bode's gain and phase relations, sensitivity functions; different explicit models of system uncertainty, unstructured uncertainty and small-gain theorem, robust stability and robust performance; structured uncertainty and mu-synthesis; H-2 and H-infinity optimal control; H-infinity loop shaping; Gap metrics, nu-gap metrics and extended loop-shaping design.
AV-716 Adaptive Control
Dynamic System Models, Signal Measures, lyapunov Stability, I/O stability, Adaptive parameter Estimation, Adaptive state feedback control, Continuous-time MRAC, discrete-time MRAC, Indirect Adaptive Control, Multivariable Adaptive Control.
AV-717 Soft Computing Systems
Fuzzy Sets, Fuzzy rules and reasoning, Fuzzy inference systems, least-squares methods for system ID, derivative-based optimization, derivative-free optimization, Adaptive Networks, Supervised learning NN's, Learning from reinforcement, unsupervised learning, Neuro-fuzzy interfaces, data clustering algorithms, neuro-fuzzy control.
AV-718 System Identification
Introduction to System ID, Models, Review of linear systems, Review of probability, random variables, Stochastic processes, Response of linear systems to random inputs, Propagation of statistics, Introduction to Kalman Filtering, Least Sq Estimation method, Time-domain methods, Freq. domain methods, Introduction to PEM, Regression analysis, Application of PEM to aircraft system ID, Experiment design, Maximum Likelihood Estimation methods, Maximum Likelihood Estimation methods, Subspace methods.
AV-719 Neural Networks
This course will be an introduction to basic neural network architectures and learning rules. Emphasis will be placed on the mathematical analysis of networks and learning rules, and on the application of neural networks to certain engineering problems in pattern recognition, signal processing and control systems. The course will incorporate necessary background material (such as linear algebra, optimization and stability), while including extensive coverage of performance learning, like the Widrow-Hoff rule and backpropagation. Several enhancements of backpropagation, such as the conjugate gradient and Levenberg-Marquardt variations, will be discussed. Simple building blocks will be used to explain associative and competitive networks, including feature maps, learning vector quantization, and adaptive resonance theory. Recurrent associative memory networks, such as the Hopfield network, will also be presented.
AV-722 Stochastic Systems
Review of Random Processes & Linear Systems, Modeling of physical systems by stochastic differential & difference equations, Analysis of systems whose inputs are stochastic processes, Spectral factorization, parametric optimization, Minimum variance control, State estimation of continuous-time and discrete-time systems, Linear stochastic control theory.
AV-723 Detection & Estimation
Brief Review Of Probability& Statistics, Detection Theory: Hypothesis Testing, Decision Criteria, Basic Concept Of Estimation: Maximum Likelihood, Maximum A Posteriori Estimator, Linear Estimation In Static Systems, Method Of Least Squares, Recursive Least Squares, Linear Dynamic System With Random Inputs, State Estimation In Discrete-Time Linear Dynamic Systems, Estimation For Kinematic Model, Kalman Filter Applications, Extended Kalman Filter And Applications, Adaptive Estimation And Maneuvering Target Tracking, Input Estimation And Maneuver Detection, Variable State Dimension Approach, Multiple Model Algorithms, Interacting Multiple Model Algorithms For Maneuvering Targets, Multiple Sensor Data Fusion.
AV-724 Embedded System Design
Embedded system design fundamentals, as well as reconfigurable logic design and implementation using a hardware description language, are covered in this course. Experiencing various micro-controllers and microprocessors, participants discover hardware, software and firmware design trade-offs, toolchains, and best practices in current embedded systems development. Real-time operating system topics will be considered to further emphasize embedded hardware-software impacts. Numerous hands-on laboratory projects are provided to reinforce lecture concepts. A final project will integrate course topics into an embedded system design based on an intellectual property (IP) core implemented in a reconfigurable logic package and driven by application code loaded from either the development platform or onboard firmware.
AV-725 Communication Networks
This course covers physical layer communications, Link layer protocols, Introduction to queuing theory, higher layer protocols: TCP, IP and ATM, Routing algorithms, Flow control, Local Area Networks and multiple access, High-performance switches and routers, Wireless Networks, Optical Networks and WDM
AV-727 Radar Signal Processing
This course will be an introduction to radar signal processing covering the full range of basic signal processing techniques on which all radar systems rely, including topics such as target interference models, matched filtering, waveform design, Doppler processing, threshold detection, CFAR and target tracking. In addition, introductions are provided to the advanced topics of synthetic aperture imaging and space-time adaptive array processing.
AV-729 Array Signal Processing
Array signal processing belongs to the general domain of space-time processing as it uses multiple sensors, arranged in a specific geometric arrangement, to acquire multiple versions of a signal. These multiple versions of the signal are processed jointly to estimate the location of the signal source. For multiple signal sources, we can determine and track the locations of these sources. This course covers Basics of Array Signal Processing: Wave fields in Open Space, Spatial Signal Processing, Transmit Beamforming Arrays, Receiver Antenna Arrays, Uniform Linear Arrays: Theory of Array Signal Processing, Source Localization using Frequency Wave-number Spectrum, Narrowband and Wideband, Subspace Methods, Mutual Coupling and Correlation, Beam-forming and Main Beam Steering, Null Placement; Implementation of Array Signal Processing Systems: Signal Processing Errors, Array Element Failure, Ill-conditioned Matrices; Applications of Array Signal Processing, Arrays for RADAR Applications, Arrays for SONAR Applications, Arrays for Biomedical Applications, Arrays for Wireless Communications
AV-731 Wireless Communications II
CThe capacity of fading channels, Wireless Channel Modeling, Performance of Communication systems in Fading Channels, Diversity (both receive and transmit), Multiple Antennas and Space-Time Coding, MIMO, Adaptive modulation and Coding, Adaptive modulation and Coding, Multicarrier modulation, Capacity regions for different Multiple Access Systems (TDMA, FDMA, SSMA), Multiuser Diversity, Ad hoc and mesh networks: physical layer view and capacity.
AV-734 Real-Time Computing
The primary purpose of this course is to present an overview of real-time computing. Basic concepts, terminology, and problems of real-time computing are introduced. The constraints of real-time computing are used to contrast real-time applications from applications that are not real-time. The course focuses on software solutions to real-time problems. Issues that are addressed include scheduling, specification of system requirements and design, real-time software architectures, languages and operating systems for real-time computing, real-time problems in a distributed processing system, and hardware-software interfaces.
AV-736 Optimization
An introduction to various methods of obtaining the extremum (minimum or maximum) of a non-dynamical system and the use of these methods in real-life applications. Computational methods for nonlinear optimization; unconstrained optimization. Constrained optimization; linear programming; simplex method for solving linear programs; Lagrange's conditions, the Karush-Kuhn-Tucker (KKT) conditions, Least squares, Penalty methods, and Practical aspects of optimization.
AV-737 Image Processing
The course is presented in three units. Foundations: the review of continuous-time and discrete-time signals, and spectral analysis; design of finite impulse response and infinite impulse response digital filters; the processing of random signals. Speech processing: vocal tract models and characteristics of the speech waveform; short-time spectral analysis and synthesis; linear predictive coding. Image processing: two-dimensional signals, systems, and spectral analysis; image enhancement; image coding; image reconstruction. The laboratory experiments are closely coordinated with each unit. Throughout the course, the integration of digital signal processing concepts in a design environment is emphasized.
AV-738 Adaptive Filter Theory
Theory and applications of adaptive filtering in systems and signal processing. Iterative methods of optimization and their convergence properties: transversal filters; LMS (gradient) algorithms. Adaptive Kalman filtering and least-squares algorithms. Specialized structures for implementation: e.g., least-squares lattice filters, systolic arrays. Detection applications, noise cancelling, speech processing, and beamforming.
AV-742 RF and Microwave Circuit Design
Topics include resonators, filters, detectors, mixers, amplifiers, and microwave systems. There are student design projects for a microstrip resonator, microstrip low pass filter, and a high dielectric constant coaxial resonator bandpass filter based upon the Microwave Office software package and the use of Mathcad at the student’s option.
AV-743 Microwave Engineering
Properties of waveguides, strip lines, and micro-strips. Scattering parameters. Butterworth and Chebyshev impedance transformers. Microwave couplers, cavities, and Fabry-Perot resonators. Periodic structures. Microwave filter design. Faraday rotation and non-reciprocal devices.
AV-744 Microwave Electronic Devices
The course covers following topics. Theory and design of passive and active microwave components and monolithic integrated circuits including: micro strip, lumped inductors and capacitors, GaAs FETs, varactor and mixer diodes, monolithic phase shifters, attenuators, amplifiers and oscillators. Experimental characterization of the above components using network analyzer, spectrum analyzer, power and noise meter
AV-745 Analog IC Design (Bipolar)
This course is devoted to the study of analog circuits realized in bipolar technology, with a focus on applications such as trans impedance amplifiers, and broadband amplifiers for networking and communications. The course begins with a consideration of device operation and the modeling needed to support both the hand analysis and computer simulation needed for design. Basic circuit building blocks and cascaded multistage amplifiers will be analyzed. The analysis and design of feedback circuits is a key component of the course.
AV-747 Semiconductor Device Technology
The principle of operation, device physics, and analytical numerical, and circuit device models for semiconductor devices, such as bipolar junction transistors, metal-semiconductor junctions and transistors, hetero structure junctions and transistors. Selected advanced semiconductor devices, such as novel microwave devices, are also introduced. Prerequisite: SDM-I or equivalent.
AV-748 Chaos Theory
This is a course on bifurcations, chaos, fractals and their applications in diverse fields such as price fluctuations in the stock market, flow of data traffic on the Internet, biological rhythms, and superconducting circuits with particular emphasis on applications in automatic control and telecommunications. The theory is developed systematically, starting with first-order differential equations and their bifurcations, followed by phase plane analysis, limit cycles and their bifurcations, and culminating with the Lorenz equations, chaos, iterated maps, period doubling, renormalization, fractals, and strange attractors.
AV-749 Analog IC Design (MOS)
Analysis, design and applications of modern analog circuits using integrated bipolar and field-effect transistor technologies. Provides the student with a working knowledge of the basic circuits used in modern analog integrated circuits and techniques for analysis and design.
AV-750 Intelligent Control
Intelligent control strategies: Expert systems, Fuzzy logic control, neural networks Optimization control techniques: genetic algorithms, simulated annealing, Tabu search Hybrid systems, Applications.
AV-751 Multimedia Signal Processing
Characteristics of speech and image signals; important analysis and synthesis tools for multimedia signal processing including subspace methods, Bayesian networks, hidden Markov models, and factor graphs; applications to biometrics (personal identification), human-computer interaction (face and gesture recognition and synthesis), and audio-visual databases (indexing and retrieval). Emphasis on a set of MATLAB machine problems providing hands-on experience.
AV-760 Power Electronics
Introduction to the fundamental operating principles of power conditioning circuits that are currently being used to effect power flow from ac to dc and vice versa. Emphasis is on the relationship between form and function of these circuits. Circuits discussed will include ac/dc line-commutated converters, dc/dc converters, dc/variable frequency converters, resonant converters, and ac/ac converters. Computer simulations will be used as a part of the course work.
AV-763 Avionics Systems Integration
This course covers Microprocessors (DSP/controllers), Real-time operating systems Vx-works, Android and RT-Linux), Multi-thread programming, Scheduling schemes, Programming Communication buses (MLT-ST-1553, ARINC 429, CAN and MODBUS), general design considerations /techniques and simulation of test systems via Hardware-In-The-Loop methodology, Embedded systems / Avionics system Components Communication Buses / Direct link, Real-time operating systems User requirement generation. Design and development considerations.
AV-765 Design and Analysis of Algorithms
The course covers the following topics. Computational models and techniques for analyzing the time and space complexity of algorithms. The design and analysis of recursive and non-recursive algorithms for searching, sorting, set operations, graph algorithms, matrix multiplication, etc. NP-Complete problems.
AV-766 Digital Video Processing
This course introduces fundamental theory and techniques for the efficient representation and processing of video signals. Topics to be covered include an introduction to video systems, Fourier analysis of video signals, properties of the human visual system, motion estimation, basic video compression techniques, video communication standards, and stereo video processing. A term project is required in the second half of the semester.
AV-780 Photonics & Lasers
Radiative and non-radiative transitions; line broadening; optical waveguides and resonators; resonator modes; oscillation and amplification; gain coefficient; rate equation analysis; semi-classical laser theory; density matrix formalism; lasing without population inversion; Q-switching, mode-locking and pulse compression; spectral narrowing.
AV-781 Integrated Photonics
Electromagnetic waves, silicon photonics, optical waveguides, waveguide couplers, waveguide filters, photonic electro-optical devices, silicon photonic modulators, silicon-germanium photodetectors, optical communications, Computational methods for integrated photonics Symmetric, dielectric waveguides. Fabrication of silicon waveguide, coupling to the waveguide, Coupled mode theory, Germanium photodetectors Electro-optical effects Photonic modulators: State of the silicon photonics industry.
AV-782 Photonic Devices
Optical properties of semiconductor materials, Diode lasers: steady-state characteristics, dynamics, and noise, Photonic crystals, Optical modulators, Optoelectronic integration, Introduction to active and passive photonic devices and applications; optical processes in the semiconductor and dielectric materials including electrical junctions, light emission and absorption, and waveguide confinement; photonic components such as light-emitting diodes, lasers, photodetectors, solar cells, liquid crystals, and optical fiber; optical information distribution networks and display application and Blackbody radiation and thermal sources.
AV-774 Micro and Nano Fabrication
Semiconductor fabrication techniques, Pattern definition techniques; photolithography, electron beam writing, Nano-imprint and laser beam writing, Pattern transfer technologies; including wet chemical etching, plasma induced etching, focused ion beam and chemical assisted ion beam etching, thin Film deposition techniques; optical coatings, etching masks, isolation, Metal-semiconductor interfaces; aspects of Schottky and Ohmic contacts, Elements of mask design, silicon oxidation; chemical mechanical polishing, silicon epitaxy and metallization; diffusion and ion implantation; large scale production techniques; measurement of device parameters; mask design; dry etching; simulation of integrated processes; use of design of experimental methodology.
AV-775 Quantum Mechanics for Engineers
Brief review of quantum mechanics including operators, linear vector spaces and Dirac notation; General theory of angular momentum and rotation group, addition of angular momentum, Clebsh-Gordan technique, scattering of spin ½ particles with spin-less particles, tensor operators; a brief review of time dependent perturbation theory, interaction of radiation with matter, absorption of light, induced and spontaneous emission, electric and magnetic dipole transitions, selections rules and scattering of light.
AV-776 Plasmonics
Fields of plasmonic and plasmonic metamaterials, elementary descriptions of these two revolutionary concepts of Nano photonics, Nano photonic waveguides and cavities, surface-enhanced sensing devices, phenomena such as extraordinary transmission and super lensing, as well as first examples of active devices, the transformative force of plasmonics for a variety of disciplines ranging from materials research to biological sensing and imaging.
AV-761 Instrumentation & Measurement for Aerospace Applications
Principles and Elements of Instrumentation and Measurement Systems, Review of Random Processes, Inertial Force Sensors, Inertial Rotation Sensors, Applications of rate gyros, Coriolis Angular rate sensors, Fiber optics gyros, Ring Laser Gyros, Filtering Estimation and Aiding.
AV-752 Navigation Systems
Introduction to navigation science, coordinate frames and transformations, review of relevant concepts from systems theory and random processes, discrete linear and nonlinear Kalman filtering techniques, the global positioning system, inertial navigation, navigation examples and case studies.
AV-753 Missile Guidance
Tactical Missile Guidance: Proportional navigation; Important closed-form solutions and their utility; Method of Adjoints: Analysis of missile guidance systems using adjoints; Noise Analysis: Simulating noise, stochastic adjoints; Monte Carlo results; Proportional Navigation and Miss Distance: Useful design relationships for rapid guidance system sizing; Digital Noise Filters: Digital noise filter properties and system performance; Advanced Guidance Laws: Deriving optimal guidance laws without optimal control theory; Kalman Filters and the Homing Loop: Combining Kalman filtering and optimal guidance and optimal guidance techniques; Endoatmospheric Ballistic Targets: Speed, Re-entry angle, Ballistic coefficient; Extended Kalman Filtering: Performance comparison of linear, linearized, and extended Kalman filters; Other Forms of Tactical Guidance and Tactical Zones: Beam rider, command to line-of-sight guidance plus drag and acceleration factors; Strategic Considerations: Gravitation and it’s impact on performance; Boosters: Using the rocket equation and an introduction to gravity turn steering; Lambert Guidance; Miscellaneous Topics and T4 Guidance: Gravity compensation, pulsed and burnout guidance; predictor-corrector method; Radome Slope Estimation: Dither signals and bandpass filtering.
AV-733 Information Theory
The course covers, Entropy rates of stochastic processes. Maximum entropy and Burg's Theorem. Kolmogorov complexity. Information theory and statistics. Stein's Lemma. AEP. Network information theory. Slepian-Wolf Theorem. Broadcast channel. Multiple access channel capacity. Optimal investment and information theory. Universal portfolios and universal data compression.
AV-755 Computer Vision
The course will explore current techniques for the analysis of visual data (primarily color images). In the first part of the course, we will examine the physics and geometry of image formation, including the design of cameras and the study of color sensing in the human eye. In each case, we will look at the underlying mathematical models for these phenomena. In the second part of the course, we will focus on algorithms to extract useful information from images. This includes detection of reliable interest points for applications such as image alignment, stereo and instance recognition; robust representations of images for recognition; and principles for grouping and segmentation. Time permitting we will look at some additional topics at the end of the course.
AV-762 Model based Software Testing
The course covers the following topics. Fundamentals of software testing; Test generation using finite-state models, Statecharts, Timed automata, Constraint Logic, Petri nets, Z, Combinatorial design, and others; Test adequacy assessment using black box and white box criteria; Industrial applications of model-based testing. Students will be required to form small teams of two or three, preferably interdisciplinary, and make in-class presentations based on a selected topic in model-based testing. The work of each team will be reviewed by the instructor and other teams.
AV-887 Advanced Mobile Communication
Overview of mobile communications Characterization and modeling of wireless fading dispersive channels Optimum receiver structure, Transmission performance in fading channels, Diversity and performance improvement, Co-channel interference, Spread spectrum and multiple access, Capacity analysis in cellular environments.
AV-767 Artificial Intelligence
This course introduces students to the basic knowledge representation, problem-solving, and learning methods of artificial intelligence. Students will be able to understand the role of knowledge representation, problem-solving, and learning in intelligent-system engineering; and appreciate the role of problem-solving, vision, and language in understanding human intelligence from a computational perspective.
AV-768 Machine Learning
This course covers a broad range of topics in machine learning. Topics include supervised learning (generative/discriminative learning, ensemble methods, neural networks, and support vector machines); unsupervised learning (clustering, dimensionality reduction,); learning theory (bias/variance tradeoffs, practical advice); Reinforcement learning (Q learning).
AV-769 Deep Learning
This course provides foundational knowledge of Deep learning models (multi-layer perceptron, convolutional neural networks, recurrent neural networks, long short-term memory networks, memory networks), learning algorithms (backpropagation, stochastic sub-gradient descent, dropout), connections to structured predictions (Boltzmann machine), and applications various problems (image classification, detection, and segmentation; image captioning; visual question answering; automatic game playing).
AV-846 Advanced Antenna Engineering
Antenna concepts, linear wire antennas, linear arrays, aperture and horn antennas, printed-circuit radiators, frequency-independent antennas, and measurement techniques.
AV-770 Microwave Design
This course presents advanced techniques applicable to the design of RF amplifiers and oscillators and emphasizes advanced theory and design techniques. Considerable emphasis is placed on microstrip implementation of UHF and microwave circuits. In the latter part of the course, commercially available computer-aided design and analysis software packages are introduced and used to complete the second design problem.
AV-777 Bio-Photonics
Bio-photonics aspects: light - biological matter interactions, optical spectroscopies and their applications, lasers in biology and medicine, photobiology, optical imagery, optical biosensors, light as a therapeutic tool, micro-array technology, laser tweezers and emerging bio-photonic technologies, Overview of the field of biophotonics, in three segments: (1) fundamental principles of light, optics, lasers, biology, and medicine; (2) diagnostic bio-photonics including imaging, spectroscopy, and optical biosensors; (3) therapeutic applications of bio-photonics including laser ablation and photodynamic therapies.
AV-778 Metamaterials and Nano Photonics
Introduction to the course, Metamaterials: theory and design, Negative refraction and perfect lens, Engineering giant optical activity, Theory of planar metamaterials, Chiral effects in planar metamaterials, Dispersion engineering and slow light, Collective effects in metamaterials, Cloaking and transformation optics (part 1), Cloaking and transformation optics (part 2), Metamaterial fabrication technologies, Optics of metals, Plasmons and their excitations, Plasmonic nanoparticle, Hybridizing plasmonic resonances (part 1), Hybridizing plasmonic resonances (part 2), Plasmonic waveguides, Challenges in plasmonics, Optical antennas, Extraordinary transmission, Purcell effect, Low-dimensional forms of carbon (part 1), Low-dimensional forms of carbon (part 2) and Photonics of nanoscale phase transitions.
AV-779 Nonlinear Optics
Nonlinear optical susceptibility; wave equation description of nonlinear optical interactions; quantum mechanical description; harmonic generation; intensity-dependent refractive index; optical Bloch equations; nonlinear wave mixing; optical phase conjugation, self-focusing, optical bistability; pulse propagation and optical solutions; acoustic-optic and electro-optic effects; simulated scattering processes; photorefractive effect.
AV-798 Research Methodology
The course introduces the language of research, ethical principles and challenges, and the elements of the research process within quantitative, qualitative, and mixed methods approach.
AV-799 MS Thesis
Thesis research work for MS Avionics Engineering.
AV-884 Advanced Topics in Control Engineering
Current topics of interest in control systems.
AV-885 Advanced Topics in Communications
Current topics of interest in communications.
AV-886 Advanced Topics in Microwave Engineering
Current topics of interest in microwave engineering.
AV-883 Advanced Topics in Photonics
Current topics of interest in Photonics.
AV-899 PhD Thesis
Thesis research work for PhD Avionics Engineering.
MA-644 Advanced Engineering Mathematics
Theory of linear algebra, Eigenvalues, Eigenvectors, orthogonality. Vector calculus, Gauss’s divergence theorem, Stokes’s theorem, Cartesian tensors, Variational calculus, Linear programming, Constrained and unconstrained Optimization, Integral Transforms (Laplace, Fourier, Mellin, Hankel, Z-Transform), and Numerical Integration are introduced.
IS-650 Number Theory
This course covers basic notions and algorithms from public-key cryptography such as key exchange, digital signatures, zero-knowledge proofs, RSA, ElGamal, integer factorization, index calculus, and elliptic curve cryptography. The topics include Group theory, Galois theory, modular and finite field arithmetic, Chinese Remainder theorem, primality testing, polynomial and integer factorization algorithms, index calculus and discrete logarithm-based schemes, and basic notions from lattice-based cryptography. It also includes basic number-theoretic methods and algorithms for cryptanalysis of protocols and schemes based on PKC.
IS-651 Cryptography
This course covers block ciphers, stream ciphers, cipher modes of operation, and public-key cryptosystems. It includes a historical account of classical mono-alphabetic and poly-alphabetic ciphers like shift ciphers, substitution ciphers, Vigenere cipher, Playfair Cipher Hill Cipher and Machine Ciphers. This would be followed by modern cryptography including Stream Ciphers, Block Ciphers (including Fiestel structure and SPN based designs) and Public Key Cryptography (RSA, Diffie-Hellman, Digital Signatures, Digital Certificates and Elliptic Curve Cryptography). Additionally, Cryptographic Support Functions like Key Generation, Key Exchange, Message Authentication and Hash Functions would also be discussed.
IS-662 Information Privacy and Security
Access Control Matrix Model, Decidability of safety/security, Protection Models, Policy Formation, Bell-LaPadula model, Biba model, Information flow, Authentication and Identity, Application of cryptographic protocols in Identity and Authentication management systems, Secure design principles, System Design: TCB and security kernel construction, Least-privilege, Verification and validation. Risk Analysis, Certification issues, Network Security architectures, Security Evaluation, Role of audit and control, Audit Mechanisms, Malicious Code: Viruses, Worms, Misuse and intrusion detection, Vulnerability Analysis, Cyberlaw.
IS-663 Advanced Algorithms Analysis
Advanced algorithm analysis including the introduction of formal techniques and the underlying mathematical theory. NP-completeness; Search Techniques; Randomized Algorithms. Heuristic and Approximation Algorithms; Topics include asymptotic analysis of upper and average complexity bounds using big-O, little-o, and theta notation. Fundamental algorithmic strategies (brute-force, greedy, divide-and-conquer, backtracking, branch-and-bound, pattern matching, and numerical approximations) are covered. Also included are standard graph and tree algorithms. Additional topics include standard complexity classes, time and space tradeoffs in algorithms, using recurrence relations to analyze recursive algorithms, non-computable functions, the halting problem, and the implications of non-computability. Algorithmic animation is used to reinforce theoretical results.
IS-722 Analysis of Stochastic Systems
The Meaning of Probability, The Axioms of Probability, Set theory, Probability Measure, Probability Space, Conditional probabilities and Independent Events, The concept of a Random Variable, Probability distribution and density functions, Conditional probability distributions and densities, Bayes’ theorem, Functions of one Random Variable, Two or more Random Variables, Multivariate probability distribution and density functions, Expected value, Moments and Characteristic functions, Mean square estimation and the Orthogonality principle, Sequences of Random Variables, The Central-limit Theorem, Random Processes, Stationary processes, Stochastic continuity and differentiation, Stochastic differential equations, Correlation and Power spectrum of Random Processes, The response of Linear Systems to Wide Sense Stationary inputs.
IS-762 Information Security Management
Access Control, Managing Identity and Authentication and Controlling and Monitoring Access. Secure Network Architecture & Securing Network Components, Secure Communication and Network Attacks. Information Security Governance & Risk Management, Personnel Risk Management Concepts and Protecting Security of Assets. Software Development Security and Malicious Code & Application Attacks. Cryptography & Symmetric Key Algorithms and PKI and Cryptographic Application. Principles of Security Models, Design & Capabilities, Security Vulnerabilities, Threats & Countermeasures and Security Assessment & Testing. Managing Security Operations. Business Continuity & Disaster Recovery Planning, Preventing & Responding to Incidents and Disaster Recovery Planning. Legal, Regulations, Investigations and Compliance. Physical (Environment) Security. Standards. Common Criteria and ISO-27001.
IS-761 Network Security
Internet Architectural Principles, Layer 2 Interconnects and Switching. LAN security. Internet Addressing, ARP, DHCP and DNS and their security issues. Intra-domain Routing and security issues, Inter-domain Routing (BGP) and security issues. End-to-End Congestion Control (TCP) Router Mechanisms for Congestion Control. Quality of Service. Multicast. Security protocols (SSH, TLS, etc), Denial of Service and Distributed Denial of Service Attacks, Firewalls, Types of Firewalls, Firewall Configurations and Demilitarized Zone (DMZ), Distributed Firewalls, Enterprise Network Architecture, Intrusion Detection and Prevention System (IDPS), IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies, Stateful Protocol Analysis, Types of IDPS technologies, System and Server Security, Web Application Security, Open Web Application Security Project.
IS-764 Mobile Security
Introduction and history of mobile security, the mobile industry players and stakeholders, The mobile threat landscape, End-to-end mobile security, Wireless bearer security and how the mobile network interacts with the device, hardware security, applications, signing and App Store security. Secure software development on mobile, Native application and mobile web application security, mobile application development and developer ecosystems, authentication, encryption, hardware security and trust, Mobile Malware, Methods and techniques used by malware developers, static and dynamic analysis, best practices for countering malware throughout the mobile value chain, industry information sharing, Mobile Security Design and Management Considerations, Privacy, child protection and workplace policies, mobile handset forensics, incident handling, cyber security.
IS-782 Secure Coding
Saltzer and Schroeder security principles, Command injection, path traversal and shell command injection as simple examples, blacklisting versus whitelisting for sanitizing input SQL command injection and defences, second-order SQL injection; command injection and parse trees, Javascript eval; XML tag injection; XPATH injection; XML parsing and entities blowup DoS, Regular expressions matching DoS, Buffer overflow mitigations: canaries, execution prevention, address space layout randomization, Heap buffer overflow attacks; linked list corruption; format string attack, Race conditions, check-the-use problem; exception handling Code auditing for security, Static analysis for software security, Static analysis, undecidability, Rice's Theorem, Java security: byte code verification and runtime checks and stack inspection.
IS-783 Secure Software Development
Software security life cycle, Software quality attributes, Security requirement gathering principles and guidelines, Vulnerabilities during implementation, consequences, and prevention, consideration for legacy C applications and web applications, Buffer overflow, Format string bug SQL Injection, Cross-site Scripting Cross-site Request Forgery, Session management, Replication of vulnerabilities and exploitation, Secure programming for preventing BOF, FSB, SQLI, XSS, session, Mobile application security, Malware classification and analysis, Design and testing for security, best practices, Secure software design principles, Static analysis techniques, Security testing (black box and white box).
IS-741 Intrusion Detection System
IDS/IPS definition and classification, Basic elements of attacks and their detection, Misuse detection systems (search algorithms and applications in IDS) -Anomaly detection systems (machine learning basics: principles, measures, performance evaluation, method combinations, basics of artificial neural networks, clustering (hierarchical and partitional) and supervised learning in IDS) -Testing IDS and measuring their performances -Computational complexity-theoretic and information-theoretic IDS models and quality criteria -Intrusion detection in virtual networks.
IS-742 IT Security Evaluation & Auditing
IT environment and role of the IT auditor, Understanding business risk IT governance – the starting point Legal and regulatory mandates (SOX, Privacy, PCI, etc.) Audit standards and pronouncements, AICPA, GAAP, GAAS, IIA, ISACA Audit and other frameworks (tools of the trade), COSO, COBIT, FFIEC, ISO, ITIL, IT audit process: Part 1 – Developing the IT audit plan, IT audit process: Part 2 – Conducting the IT audit, Auditing systems development and maintenance, Risks defined, Software development life cycle process, Change and release management policy, Source code and production control, Auditing IT security, Auditing IT service delivery and support, Auditing business continuity and disaster recovery, Data analytics and fraud investigations, Managing third party risk.
IS-743 Cloud Computing Security
Introduction to Cloud Computing, Cloud Reference architecture, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Cloud Security, Virtualization, Trustworthy computing, Secure Computation, Cloud Management, Data Management, Data Security, Regulatory Compliance, Forensics and Malware.
IS-744 Computer Forensics
Introduction to Computer Forensics, Historical and current issues, Roles of Information Technology, Legal, and Law Enforcement professionals, Case examination and assessment, Evidence gathering, Systematic approaches to computer investigations, Conducting an investigation, Hardware and software requirements, Physical Layout of Lab, Review of file structures, boot processes, and data structures of popular operating systems, Preparing for an investigation, Processing the crime scene, Securing, cataloging and storing the evidence, Forensic cleansing, Identify methods, Utilization of various data acquisition tools, Hashing algorithms concepts, Utilization of various analysis tools, Recognizing, locating, recovering and analyzing images, Network Forensics, Email Investigations, Reporting guidelines, Witness Requirements. Smartphone Forensics, Physical and Logical Keyword Searching, Data Carving, Exporting and Bookmarking Data, Malware Scanning, Reporting, SIM Card Handling and Examination, SD Card Handling and Examination, Android and Malware Forensics.
IS-746 Digital Forensics and Incident Response
Incident response plan, Forensic Fundamentals, Network Evidence Collection, Host-Based Evidence, Understanding Forensic Imaging, Network Evidence Analysis, Analyzing System Memory, Analyzing System Storage, Forensic Reporting, Malware Analysis, Threat Intelligence, Timeline Analysis, Filesystem Timeline Creation and Analysis, Super Timeline Creation and Analysis, Anti-forensics and Steganographic Techniques, Introduction to steganographic techniques for images, video, textual data, and audio as well as steganalytical techniques for selected media types and approaches to traitor tracing, Anti-Forensics Detection, Deleted File, Deleted Registry Keys, File Wiping, Clearing Browsing History, Privacy Cleaner, Adjusting Timestamps.
IS-747 Vulnerability Exploitation and Defense
Virtual address space organization, Overview of the Extensible Linking Format (ELF), x86 instruction set, calling conventions, Dynamic linking/loading, Control-flow Hijacking & Code Injection, Control data corruption techniques, Shellcode Development, Assembling /disassembling, Alphanumeric shellcodes, Raw syscall invocation methods, Non-Executable Memory & return-to-libc, Executable space protection, Advanced ret2libc exploitation, Code Reuse, ret2libc chaining, %esp lifting, Address Space Randomization, Address Space Layout Randomization (ASLR), Return-Oriented Programming, Exploitation without code injection, Memory Disclosure & Just-In-Time Code Reuse, Format string vulnerabilities, Techniques for bypassing fine-grained ASLR, Toolchain-based Hardening.
IS-749 Reverse Engineering and Malware Analysis
Steps in software reverse engineering, Instruction set architectures, Common file formats and file-level reverse engineering tools, Fundamental principles and techniques to disassembly, Recognizing high-level constructs, Control flow and data flow analysis, Calling conventions, Function recognition, Decompilation challenges, Introduction to decompilation techniques, Common anti-disassembly techniques, Limitations of static analysis techniques, Basic dynamic analysis techniques, Dynamic instrumentation, Automatic malware classification based on dynamic analysis, Integrated static and dynamic analysis, Symbolic execution, Reverse engineering of network protocols, Anti-debugging techniques, Anti-virtual machine techniques, Malware detection techniques, Anti-signature techniques: Obfuscation and packing, Firmware analysis challenges, Firmware analysis techniques.
IS-745: Information Theory
The course includes an introduction to Information Theory, probability, discrete random variables, Entropy, Probabilities and Inference, random vectors, Markov chains, data compression, noisy channel coding, efficient encoding, hash codes, binary codes, very good linear codes, message passing, Neural networks, Sparse Graph codes and Cybernetics. Information theory research.
IS-750 Applied Cryptography
Key Management Protocols (like Needham-Schroeder Key Distribution Protocol and Kerberos), Random Number Generators (PRNGs and TRNGs), implementation of cryptographic algorithms for application in internet protocols and wireless networks (PGP, SSL/ TLS, IPSEC, Tor Protocol, 802.11i, WEP, WPA and WPA2), authentication techniques/ ID management and attacks (password storage, dictionary attacks and HashCat), security issues in peer-to-peer networks (Distributed Hash Tables and Consistent Hashing, BitTorrent Protocol, Kademlia Protocol, security aspects of structured DHT-Based P2P protocols, anonymity in structured P2P Overlay Networks), web security (PHP Exploits, SQL Injection attacks and Slowloris attack) and mobile communication security (ciphers in 2G, 3G, 4G networks).
IS-751 Cryptanalysis
Cryptanalysis employs mathematical and algorithmic tools to evaluate the security level of cryptographic systems and protocols. The course explains standard cryptanalysis techniques used for analyzing and attacking different types of cryptographic schemes, focusing on aspects of private and public-key cryptography. It includes an overview of the basics of cryptanalysis followed by an introduction to cryptanalysis techniques of classical ciphers (mono-alphabetic, poly-alphabetic, Frequency Analysis, Kaisiski and Friedman Tests). The focus is then shifted to cryptanalysis of modern ciphers including Block ciphers (Linear & Differential Cryptanalysis, Related Key attacks), Stream ciphers (Berlekamp Massey algo, Correlation & Fast Correlation attacks), Public Key based ciphers (Discrete Log & Integer Factorization) and Elliptic Curve based ciphers.
IS-752 Quantum Cryptography
Topics covered in this course include qubits, Quantum gates, Measuring qubits in a basis, Pure and mixed quantum states, Partial trace, Generalized measurements, Encrypting quantum bits with the quantum one-time pad, The power of entanglement, Sharing a classical secret using quantum states, Uncertainty principles as a guessing game, Privacy amplification, Universal hashing, Quantum key distribution protocols, Purifying protocols using entanglement, Quantum Cryptography using untrusted devices, Testing devices using a Bell experiment, Security of device-independent quantum key distribution against collective attacks, Quantum Cryptography beyond key-distribution, Bit commitment and oblivious transfer, Impossibility of bit commitment, Weak commitments and coin tossing, Perfect security from physical assumptions, Noisy storage model, Security from quantum uncertainty, Weak string erasure, Position verification from weak string erasure, Sharing a quantum secret and Secure computations on a remote quantum computer.
IS-767 Artificial Intelligence
This course introduces students to the basic knowledge representation, problem-solving, and learning methods of artificial intelligence. Students will be able to understand the role of knowledge representation, problem-solving, and learning in intelligent-system engineering; and appreciate the role of problem-solving, vision, and language in understanding human intelligence from a computational perspective.
IS-768 Machine Learning
This course covers a broad range of topics in machine learning. Topics include supervised learning (generative/discriminative learning, ensemble methods, neural networks, and support vector machines); unsupervised learning (clustering, dimensionality reduction,); learning theory (bias/variance tradeoffs, practical advice); Reinforcement learning (Q learning).
IS-769 Deep Learning
This course provides foundational knowledge of Deep learning models (multi-layer perceptron, convolutional neural networks, recurrent neural networks, long short-term memory networks, memory networks), learning algorithms (backpropagation, stochastic sub-gradient descent, dropout), connections to structured predictions (Boltzmann machine), and applications various problems (image classification, detection, and segmentation; image captioning; visual question answering; automatic game playing).
IS-753 Advanced Cryptography
The course intends to build on the contents covered in Cryptography and Applied Cryptography and introduce the latest research domains. While the earlier courses cover the basics of existing/ already proposed designs in literature, this course focuses on how to design own non-linear transformations, S-boxes and Light Weight Block Ciphers. It also covers more recent research/ open problem areas including Threshold Cryptography, Private Information Retrievals, Lattice-based Cryptography, Quantum-safe Cryptography and cascaded/ combined use of Cryptography and Steganography.
IS-754 Steganography
Topics covered in this course include covert communication, cryptography, cryptographic primitives, an overview of steganography, growth of Steganography, Steganography in use, flaws of Steganography, variations on stego, security and Steganography, principles of Steganography, types of Steganography, digital watermarking, the internet: a climate for deceit, corporate espionage, playing spy, network Steganography, multimedia data hiding, data hiding among android mobile devices, Apple iOS data hiding, operating system data hiding, virtual data hiding, forensics and anti-forensics, cracking Steganography and Cryptography, developing your secure communications strategy, Steganography as a countermeasure, the future of Steganography.
IS-755 Verification and Validation of Cryptography Algorithms
Topics covered in this course include validating cryptographic algorithm implementations, cryptographic modules, and Security Content Automation Protocol (SCAP)-compliant products; developing test suites and test methods; implementation guidance and technical support, Automated Cryptographic validation testing, FIPS 140-3 conformance, Crypto module validation, Deep learning neural networks for Crypto module validation, Entropy as a Service.
IS-769 Deep Learning
This course provides foundational knowledge of Deep learning models (multi-layer perceptron, convolutional neural networks, recurrent neural networks, long short-term memory networks, memory networks), learning algorithms (backpropagation, stochastic sub-gradient descent, dropout), connections to structured predictions (Boltzmann machine), and applications various problems (image classification, detection, and segmentation; image captioning; visual question answering; automatic game playing).
IS-798 Research Methodology
The course introduces the language of research, ethical principles and challenges, and the elements of the research process within quantitative, qualitative, and mixed methods approach.
IS-799 MS Thesis
Thesis research work for MS Information Security.
IS-899 PhD Thesis
Thesis research work for PhD Information Security.