6th Sem Syllabus
6th Sem Syllabus
SEMESTER
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the various phases and fundamental
principles of compiler design like lexical, syntactical,
semantic analysis, code generation and optimization.
CO2 Compare and contrast various parsing techniques such
as SLR, CLR, and LALR etc.
CO3 Use annotated tree to design the semantic rules for
different aspects of programming language.
CO4 Implement lexical analyser and parser by using modern
tools like Flex and Bison.
CO5 Examine patterns, tokens & regular expressions for
solving a problem in the field of data mining.
CO6 Design a compiler for concise programming language.
Unit 3:
Syntax-Directed Translation: Syntax-Directed definitions;
Constructions of Syntax Trees; Bottom-up evaluation of S-
attributed definitions; L-attributed definitions; Top-down
3 translation. 9
Run-Time Environments: Source Language Issues; Storage
Organization; Storage-allocation strategies, Storage-allocation in
C; Parameter passing
Unit 4:
Intermediate Code Generation: Intermediate Languages;
Declarations; Assignment statements; Boolean Expressions;
Case statements; Back patching; Procedure calls.
4
Code Generation: Issues in the design of Code Generator; The 9
Target Machine; Run-time Storage Management; Basic blocks
and Flow graphs; Next-use information; A Simple Code
Generator; Register allocation and assignment; The dag
representation of basic blocks; Generating code from DAGs.
Unit 5:
Code Optimization, Compiler Development: Code
Optimization: Introduction; The principal sources of optimization;
Peephole optimization; Optimization of basic blocks; Loops in flow
5 graphs. 9
Compiler Development: Planning a compiler; Approaches to
compiler development; the compiler development environment;
Testing and maintenance.
Total 45
Text Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS101),
Object Oriented Programming with C++ (TCS307)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand Software Development Life Cycle and
importance of engineering the software.
CO2 Development of efficient software requirement
specification for desired product.
CO3 Compare various software development methodologies
ad conclude on their applicability in developing specific
type of product.
CO4 Construct an efficient design specification document for
attainment of user desired product.
CO5 Develop applications using the concepts of various
phases of software development life cycle.
CO6 Study various software testing techniques and identify
their relevance to developing a quality software.
Unit 2:
Requirements: Importance of Requirement Analysis, User
Needs, Software Features and Software Requirements,
Classes of User Requirements: Enduring and Volatile; Sub
phases of Requirement Analysis, Functional and Non-
2 functional requirements; Barriers to Eliciting User
Requirements, The software requirements document and SRS 9
standards, Requirements Engineering, Case Study of SRS for
a Real Time System
Unit 4:
Testing: Testing Objectives, Unit Testing, Integration Testing,
Acceptance Testing, Regression Testing, Testing for
Functionality and Testing for Performance, Top-Down and
Bottom-Up Testing Strategies: Test Drivers and Test Stubs,
4 Structural Testing (White Box Testing), Functional Testing 10
(Black Box Testing), Test Data Suit Preparation, Alpha and
Beta Testing of Products. Static Testing Strategies: Formal
Technical Reviews (Peer Reviews), Walk Through, Code
Inspection, Compliance with Design and Coding Standards,
Automated Testing
Unit 5:
Software Maintenance and Software Project Management:
Software as an Evolutionary Entity, Need for Maintenance,
Categories of Maintenance: Preventive, Corrective and
Perfective Maintenance, Cost of Maintenance, Software Re-
Engineering, Reverse Engineering. Software Configuration
5 Management Activities, Change Control Process, Software 8
Version Control, An Overview of CASE Tools. Estimation of
Various Parameters such as Cost, Efforts, Schedule/Duration,
Constructive Cost Models (COCOMO), Resource Allocation
Models, Software Risk Analysis and Management.
Software Quality Assurance: SQA Plans, ISO 9000 models,
SEI-CMM Model
Total 45
Textbooks:
Reference Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS 101),
Data Structures with C (TCS 302)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Apply and Characterize computer networks from the
viewpoint of components and from the viewpoint of services.
CO2 Display good understanding of the flow of a protocol in
general and a network protocol in particular
CO3 Evaluate and select the most suitable Application Layer
protocol (such as HTTP, FTP, SMTP, DNS, BitTorrent) as
per the requirements of the network application and work
with available tools to demonstrate the working of these
protocols.
CO4 Design a Reliable Data Transfer Protocol and incrementally
develop solutions for the requirements of Transport Layer
CO5 Describe the essential principles of Network Layers and use
IP addressing to create subnets for any specific
requirements
CO6 Evaluate and select the appropriate technology to meet
Data Link Layer requirements and design a framework to
implementing TCP/IP protocol suite.
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Programming in Java (TCS 408), Data Base Management Systems
(TCS 503)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Apply HTML and CSS effectively to create interactive
websites
CO2 Implement client-side scripting using JavaScript to
design dynamic websites.
CO3 Develop XML, AJAX and JQuery based web
applications.
CO4 Implement server-side scripting using PHP.
CO5 Design PHP application with Database connectivity.
CO6 Ability to design and deploy simple web applications
using MVC architecture.
Total 46
Textbooks:
Reference Books:
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Define and understand ideas of DevOps.
CO2 Describe and demonstrate how DevOps relate to working in
the cloud.
CO3 Describe and demonstrate how DevOps tools work together.
CO4 Use a public/private cloud environment as a framework to
examine the ideas of DevOps.
CO5 Examine some use cases, deployment, test automation,
continuous delivery, and the public/private cloud toolsets for
DevOps.
Unit 2: Version Control with Git, Install GIT and work with
remote repositories, GIT workflows, Branching and Merging
2 in Git. Understand the importance of Continuous Integration, 9
Introduction to Jenkins, Jenkins management. Build and
automation of Test using Jenkins and Maven.
Unit 3: Continuous Testing, learn and Install Selenium, create
3 test cases in Selenium, Integrate Selenium with Jenkins, 10
Continuous Deployment.
Text Books:
Kevin Behr, Gene The Visible 1st Edition IT Process Institute 2004
Kim and George Ops Handbook
Spafford
Reference Books:
1. Subject Code: TCS 619 Course Title: Network and System Security
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Computer system security (TCS 591)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the basics of computer security
CO2 Elaborate the cryptographic techniques.
CO3 Discuss the transport layer security
CO4 Find the pros and cons of various key distribution
methods
CO5 analyse the wireless Network security
CO6 Find the level of system security
Unit 2:
Cryptography
2 Symmetric Encryption and Message Confidentiality
Symmetric Encryption Principles, Symmetric Block 9
Encryption Algorithms, Random and Pseudorandom
Numbers, Stream Ciphers and RC4, Cipher Block Modes of
Operation.
Unit 3:
Network security Application - I
Key Distribution and User Authentication
Symmetric Key Distribution Using Symmetric Encryption,
Kerberos, Key Distribution Using Asymmetric Encryption,
3 X.509 Certificates, Public-Key Infrastructure, Federated 10
Identity Management
Transport-Level Security
Web Security Considerations, Secure Socket Layer and
Transport Layer Security, Transport Layer Security,
HTTPS, Secure Shell (SSH)
Unit 4:
Network security Application - II
Wireless Network Security
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i
Wireless LAN Security, Wireless Application Protocol
Overview, Wireless Transport Layer Security, WAP End-to-
4 End Security
8
Electronic Mail Security
Pretty Good Privacy, S/MIME, DomainKeys Identified Mail,
IP Security
IP Security Overview, IP Security Policy, Encapsulating
Security Payload, Combining Security Associations, Internet
Key Exchange, Cryptographic Suites
Unit 5:
System Security
Intruders
Intruders, Intrusion Detection, Password Management,
Malicious Software
Types of Malicious Software, Viruses, Virus
Countermeasures, Worms, Distributed Denial of Service
5 Attacks. 10
Firewalls
The Need for Firewalls, Firewall Characteristics, Types of
Firewalls, Firewall Basing, Firewall Location and
Configurations,
Legal and Ethical Aspects
Cybercrime and Computer Crime, Intellectual Property,
Privacy, Ethical Issues
Total 46
Text Books:
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Deep Learning
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: NIL
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Demonstrate an understanding of techniques, processes,
technologies and equipment used in virtual reality
CO2 Identify appropriate design methodologies for immersive
technology development, especially from a physiological
perspective
CO3 Exploit the characteristics of human visual perception in
Virtual Reality techniques
CO4 Create effective VR techniques for the Web
CO5 Effectively categorize the benefits/shortcomings of
available VR technology platforms.
CO6 Use human factors to design and evaluate a VR application
Unit 3:
Bring Virtual Reality to the web: Introduction to Aframe,
3 Transformations and Textures using Afrane, Afrane animations, 9
Illumination, Inteaction with objects, Building a complete scene
using Aframe
Unit 4:
Navigation in Virtual Reality: Position, Orientation,
Maneuvering, Exploration, Travel characteristics, Wayfinding in
VR
4 Menus and Text in VR: 2D menus, 3D menus, Tool Belt Menu, 9
CUbic Menu, Tangible Interfaces, Gestural Commands, Voice
Commands, Text Input
Haptics: Human Haptics, Kinesthetic system, Motor system,
Haptic Devices and Interfaces
Unit 5:
VR Design Principles: Feedback and Constraints, Temporal
Compliance and its solutions, Spatial compiance, Nuling
5 compliance, Sensory dimensions, Constraints: Artificial and 9
Physically realistic constraints
Human Factors for Developing VR Applications, Evaluation and
Testing of VR systems
Total 45
Text Books:
Reference Books:
2. Contact Hours: L: 3 T: 0 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
4. Relative Weight: CIE 25 MSE 25 ESE 50
5. Credits: 3
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamentals of Artificial Intelligence and Machine Learning (TCS364),
Deep Learning(TCS464), Reinforcement Learning (TCS545)
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Define fundamental concepts in generative modeling and
explain the core idea behind Generative Adversarial
Networks.
CO2: Describe the different components of a GAN architecture
and their functionalities.
CO3: Implement basic GAN architectures using popular deep
learning libraries relevant to engineering problems.
CO4: Compare and contrast the strengths and weaknesses of
different GAN variants for specific image generation
tasks.
CO5: Discuss the potential regulatory and societal impacts of
GANs and related generative models.
CO6: Design and implement a basic GAN system for a simple
engineering-related problems.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
UNIT 1: Introduction to GANs, GAN Components
Text Books:
Authors Name Title Edition Publisher, Year
Country
Jakub Langr, GANs in Action: Deep 1st Manning, USA 2019
Vladimir Bok learning with Edition
Generative
Adversarial Networks
Josh Kalin Generative 1st Packt Publishing, 2018
Adversarial Networks Edition UK
Cookbook
David Foster Generative Deep 1st O'Reilly Media, 2019
Learning: Teaching Edition USA
Machines to Dream
Reference Books:
Authors Name Title Edition Publisher, Year
Country
Jasmijn Tran, Hands-On 1st Packt Publishing 2019
Sergio Ortega, Generative Edition Ltd, UK
and Antonio Adversarial
García Yepes Networks with Keras
John Hany Hands-On Generative 1st Packt Publishing, 2019
Adversarial Networks Edition India
with PyTorch 1.x
GRAPHIC ERA HILL UNIVERSITY
SEMESTER VI
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Define the fundamental concepts of transformer models and
their key components like self-attention and multi-head
attention.
CO2: Describe the functionalities of positional encoding, layer
normalization, and feed-forward networks in transformers.
CO3: Implement basic transformer architectures using popular deep
learning libraries relevant to engineering problems.
CO4: Compare and contrast the strengths and weaknesses of
various transformer applications in NLP tasks like machine
translation and text summarization.
CO5: Evaluate the scalability challenges associated with large
transformer models and discuss approaches like model
distillation for efficiency.
CO6: Design and implement a simple transformer-based system for
an engineering-related problem like sentiment analysis or text
classification.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
UNIT 1: Introduction to Transformers, Building Blocks of
Transformers
Overview of transformer architecture, Self-attention mechanism:
1 concept and advantages, Positional encoding and layer 10
normalization, Detailed study of multi-head attention, The role of feed-
forward networks in transformers, Masking and its uses in model
training
UNIT 2: Training Transformers
Optimization and regularization techniques, Handling large datasets
2 8
and batch processing, Strategies for effective training and
convergence
UNIT 3: Applications in NLP
3 Machine translation and text summarization, Text generation with 10
GPT models, BERT and its variants for various NLP tasks
UNIT 4: Beyond NLP
Vision Transformers (ViT) for image recognition, Transformer
4 10
applications in audio processing, Cross-modality transformers for joint
tasks
UNIT 5: Advanced Topics and Future Directions
Scalability of transformers and big model issues, Efficient
5 8
transformers and model distillation, Ethical considerations and biases
in large models
Total 46
Text Books:
Authors Name Title Edition Publisher, Country Year
Denis Transformers for Natural 1st MANNING 2021
Rothman Language Processing Edition Publications Co.,
USA
Lewis Tunstall, Natural Language 1st O'Reilly Media, 2020
Leandro von Processing with Edition Inc., USA
Werra, and Transformers
Thomas Wolf
Reference Books:
Authors Name Title Edition Publisher, Country Year
Aurélien Géron Hands-On Transformers with 1st Edition O'Reilly Media, 2021
Python Inc., USA