Page 112 - handbook 20152016
P. 112
Faculty of Science Handbook, Session 2015/2016
& M.R. Cullen, Differential Equations with Boundary- SIN3003 COMPUTATIONAL FLUID DYNAMICS
Value Problems, 7th Edition, Brooks/Cole, 2005
Derivation of conservation equations for mass, momentum
and energy. Scaling and simplification of Navier-Stokes
SIN3001 INTRODUCTION TO QUANTUM equation to Bernoulli’s equation, Stokes’ equation and
MECHANICS WITH COMPUTERS boundary layer equation. Initial- and boundary-conditions.
Simple analytical solutions and approximate solutions.
Introduction to Quantum mechanics. The wave-function Numerical solutions: finite-element, finite-difference and
and its interpretation. One-dimensional time-independent finite-volume methods.
Schrodinger equation. Solution for the case of the infinite-
and finite-square well, harmonic oscillator potential and Assessment
free-particle case. Formalism of quantum mechanics. Two- Continuous Assessment: 40%
and three-dimensional systems. The hydrogen atom. The Final Examination: 60%
concept of spin.
Medium of Instruction:
Assessment Bahasa Malaysia/English
Continuous Assessment: 50%
Final Examination: 50% Humanity Skill:
CS4, CT5, TS2, LL3
Medium of Instruction:
English References
1. Fluid Mechanics, Yunus A. Chengel & John Cimbala,
Humanity Skill: McGraw- Hill 2014
CS3, CT3, LL2 2. Fluid Mechanics, oleh S.M. Richardson, Hemisphere
Pub. Corp. 1989.
References 3. A First Course in Fluid Dynamics, A.R. Peterson, CUP
1. David J. Griffiths, Introduction to Quantum Mechanics 1987
(2nd Edition), Prentice-Hall, 2004 4. An Introduction to Fluid Dynamics, G.K. Batchelor,
2. David K. Ferry, Quantum Mechanics: An Introduction CUP 1967
for device physicists and electrical engineers, 2nd ed., 5. Computational Fluid Dynamics, J.D. Anderson,
Institute of Physics Publ., 2011. McGraw- Hill1995
3. A Survey of Computational Physics: Introductory 6. Computational Methods for Fluid Dynamics, Joel H.
Computational Science. Rubin H. Landau, M. J. Paez Ferziger & Milovan Peric, Springer 2011
and C. C Bordeianu(Princeton Press ) 2008
4. Numerical Recipes 3rd Edition W. H. Press, S. A.
Teukolsky, W. T. Vetterling and B. P. Flannery SIN3004 ANALYSIS OF MATHEMATICAL MODELS
(Cambridge University Press) 2007
5. N. Zettili, Quantum Mechanics Concepts & Building of Mathematical Models: identifying variables,
Applications, Wiley-Interscience (Wiley) 2009. obtain relationship between variables – ordinary differential
6. Alejandro Garcia, Numerical Methods for Physics, 2nd equations and systems of ode. Analysis of models
Edition, Prentice-Hall, 2000. analytically and qualitatively. Bifurcations. Phase plane
analysis, stability.
SIN3002 CRYPTOGRAPHY Assessment
Continuous Assessment: 50%
Basic concept of cryptography, data security, complexity Final Examination: 50%
theory and number theory. Encryption algorithms: Secret
key cryptography, public key cryptography, hash functions. Medium of Instruction:
Quantum cryptography. Applications of cryptographic Bahasa Malaysia/English
algorithms.
Humanity Skill:
Assessment CS4, CT5, TS2, LL3
Continuous Assessment: 40%
Final Examination: 60% References
1. R.K. Nagle, E.B. Saff and A.D.Snoder, Fundamentals
Medium of Instruction: of Differential Equations and Boundary Value
th
Bahasa Malaysia/English Problems with IDE CD, 5 Edition, Pearson Higher
Education, 2011.
Humanity Skill: 2. R.I. Borelli & C.S. Coleman, Differential Equations: A
CS3, CT3, LL2 Modeling Perspective, 2nd Edition, John Wiley 2004.
References
1. Trappe, W., and Washington, L.C., Introduction to SIN3005 NUMERICAL METHODS AND ANALYSIS
nd
Cryptography with Coding Theory, 2 . Edition,
Pearson Prentice Hall, 2006. Approximation methods: Discrete least square
2. Stallings, W., Cryptography and Network Security: approximation, orthogonal polynomials, Chebyshev
Principles And Practice. 4 edition, Englewood Cliffs polynomials.
(NJ): Prentice Hall 2006.
nd
3. Schneider, B., Applied Cryptography, 2 . Edition New Eigenvalue problem: Power method, Householder’s
York: John Wiley and Sons, 1996. methods. The QR algorithm.
4. Martin, M.K, Everyday Cryptography, Oxford
University Press, 2012 Initial value problem of Ordinary Differential Equations:
5. Stinson, D.R., Cryptography: Theory and Practice, Euler’s method, higher order Taylor method, Runge-Kutta
CRC Press, 1995. methods. Multistep methods. Multistep methods.
Convergence and stability analysis, error control.
105