6TH Sem Curriculum and Syllabus
6TH Sem Curriculum and Syllabus
SEMESTER: VI
COURSE MODULE
COURSE
Credit
Compo
Code Title s
nent
TCS-601 Compiler Design DC 3
TCS-611 Software Engineering DC 3
TCS-604 Computer Networks-I DC 3
Discipline Specific
DE/GE 3
Elective-III
SEMESTER: VI
COURSE MODULE
COURSE
Credit
Compo
Code Title s
nent
TCS-601 Compiler Design DC 3
TCS-611 Software Engineering DC 3
Advanced Machine
TCS-682 DC 3
Learning
Full Stack Web
TCS-693 DC 3
Development
Large Language
TCS-692 Models and DE/GE 3
Generative AI
Advanced Machine
PCS-682 DC 2
Learning Lab
PCS-601 Compiler Design Lab DC 2
Web Development
PCS-693 DC 2
Lab
XCS-601 Career Skills VA 1
PESE 600 Practical for SEC 1
Employability Skill
Enhancement
SCS-601 MOOCS Seminar VA 1
GP-601 General Proficiency SE 1
GRAPHIC ERA HILL UNIVERSITY
SEMESTER VI
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the various phases and fundamental
principles of compiler design like lexical, syntactical,
semantic analysis, code generation and optimization.
CO2 Compare and contrast various parsing techniques such
as SLR, CLR, and LALR etc.
CO3 Use annotated tree to design the semantic rules for
different aspects of programming language.
CO4 Implement lexical analyser and parser by using modern
tools like Flex and Bison.
CO5 Examine patterns, tokens & regular expressions for
solving a problem in the field of data mining.
CO6 Design a compiler for concise programming language.
Unit 3:
Syntax-Directed Translation: Syntax-Directed definitions;
Constructions of Syntax Trees; Bottom-up evaluation of S-
attributed definitions; L-attributed definitions; Top-down
3 translation. 9
Run-Time Environments: Source Language Issues; Storage
Organization; Storage-allocation strategies, Storage-allocation in
C; Parameter passing
Unit 4:
Intermediate Code Generation: Intermediate Languages;
Declarations; Assignment statements; Boolean Expressions;
Case statements; Back patching; Procedure calls.
4
Code Generation: Issues in the design of Code Generator; The 9
Target Machine; Run-time Storage Management; Basic blocks
and Flow graphs; Next-use information; A Simple Code
Generator; Register allocation and assignment; The dag
representation of basic blocks; Generating code from DAGs.
Unit 5:
Code Optimization, Compiler Development: Code
Optimization: Introduction; The principal sources of optimization;
Peephole optimization; Optimization of basic blocks; Loops in flow
5 graphs. 9
Compiler Development: Planning a compiler; Approaches to
compiler development; the compiler development environment;
Testing and maintenance.
Total 45
Text Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS101),
Object Oriented Programming with C++ (TCS307)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand Software Development Life Cycle and
importance of engineering the software.
CO2 Development of efficient software requirement
specification for desired product.
CO3 Compare various software development methodologies
ad conclude on their applicability in developing specific
type of product.
CO4 Construct an efficient design specification document for
attainment of user desired product.
CO5 Develop applications using the concepts of various
phases of software development life cycle.
CO6 Study various software testing techniques and identify
their relevance to developing a quality software.
Unit 2:
Requirements: Importance of Requirement Analysis, User
Needs, Software Features and Software Requirements,
Classes of User Requirements: Enduring and Volatile; Sub
phases of Requirement Analysis, Functional and Non-
2 functional requirements; Barriers to Eliciting User
Requirements, The software requirements document and SRS 9
standards, Requirements Engineering, Case Study of SRS for
a Real Time System
Unit 4:
Testing: Testing Objectives, Unit Testing, Integration Testing,
Acceptance Testing, Regression Testing, Testing for
Functionality and Testing for Performance, Top-Down and
Bottom-Up Testing Strategies: Test Drivers and Test Stubs,
4 Structural Testing (White Box Testing), Functional Testing 10
(Black Box Testing), Test Data Suit Preparation, Alpha and
Beta Testing of Products. Static Testing Strategies: Formal
Technical Reviews (Peer Reviews), Walk Through, Code
Inspection, Compliance with Design and Coding Standards,
Automated Testing
Unit 5:
Software Maintenance and Software Project Management:
Software as an Evolutionary Entity, Need for Maintenance,
Categories of Maintenance: Preventive, Corrective and
Perfective Maintenance, Cost of Maintenance, Software Re-
Engineering, Reverse Engineering. Software Configuration
5 Management Activities, Change Control Process, Software 8
Version Control, An Overview of CASE Tools. Estimation of
Various Parameters such as Cost, Efforts, Schedule/Duration,
Constructive Cost Models (COCOMO), Resource Allocation
Models, Software Risk Analysis and Management.
Software Quality Assurance: SQA Plans, ISO 9000 models,
SEI-CMM Model
Total 45
Textbooks:
Reference Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS 101),
Data Structures with C (TCS 302)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Apply and Characterize computer networks from the
viewpoint of components and from the viewpoint of services.
CO2 Display good understanding of the flow of a protocol in
general and a network protocol in particular
CO3 Evaluate and select the most suitable Application Layer
protocol (such as HTTP, FTP, SMTP, DNS, BitTorrent) as
per the requirements of the network application and work
with available tools to demonstrate the working of these
protocols.
CO4 Design a Reliable Data Transfer Protocol and incrementally
develop solutions for the requirements of Transport Layer
CO5 Describe the essential principles of Network Layers and use
IP addressing to create subnets for any specific
requirements
CO6 Evaluate and select the appropriate technology to meet
Data Link Layer requirements and design a framework to
implementing TCP/IP protocol suite.
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Programming in Java (TCS 408), Data Base Management Systems
(TCS 503)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Apply HTML and CSS effectively to create interactive
websites
CO2 Implement client-side scripting using JavaScript to
design dynamic websites.
CO3 Develop XML, AJAX and JQuery based web
applications.
CO4 Implement server-side scripting using PHP.
CO5 Design PHP application with Database connectivity.
CO6 Ability to design and deploy simple web applications
using MVC architecture.
Textbooks:
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Define and understand ideas of DevOps.
CO2 Describe and demonstrate how DevOps relate to working in
the cloud.
CO3 Describe and demonstrate how DevOps tools work together.
CO4 Use a public/private cloud environment as a framework to
examine the ideas of DevOps.
CO5 Examine some use cases, deployment, test automation,
continuous delivery, and the public/private cloud toolsets for
DevOps.
Unit 2: Version Control with Git, Install GIT and work with
remote repositories, GIT workflows, Branching and Merging
2 in Git. Understand the importance of Continuous Integration, 9
Introduction to Jenkins, Jenkins management. Build and
automation of Test using Jenkins and Maven.
Unit 3: Continuous Testing, learn and Install Selenium, create
3 test cases in Selenium, Integrate Selenium with Jenkins, 10
Continuous Deployment.
Text Books:
Kevin Behr, Gene The Visible 1st Edition IT Process Institute 2004
Kim and George Ops Handbook
Spafford
Reference Books:
1. Subject Code: TCS 619 Course Title: Network and System Security
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Computer system security (TCS 591)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the basics of computer security
CO2 Elaborate the cryptographic techniques.
CO3 Discuss the transport layer security
CO4 Find the pros and cons of various key distribution
methods
CO5 analyse the wireless Network security
CO6 Find the level of system security
Unit 2:
Cryptography
2 Symmetric Encryption and Message Confidentiality
Symmetric Encryption Principles, Symmetric Block 9
Encryption Algorithms, Random and Pseudorandom
Numbers, Stream Ciphers and RC4, Cipher Block Modes of
Operation.
Unit 3:
Network security Application - I
Key Distribution and User Authentication
Symmetric Key Distribution Using Symmetric Encryption,
Kerberos, Key Distribution Using Asymmetric Encryption,
3 X.509 Certificates, Public-Key Infrastructure, Federated 10
Identity Management
Transport-Level Security
Web Security Considerations, Secure Socket Layer and
Transport Layer Security, Transport Layer Security,
HTTPS, Secure Shell (SSH)
Unit 4:
Network security Application - II
Wireless Network Security
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i
Wireless LAN Security, Wireless Application Protocol
Overview, Wireless Transport Layer Security, WAP End-to-
4 End Security
8
Electronic Mail Security
Pretty Good Privacy, S/MIME, DomainKeys Identified Mail,
IP Security
IP Security Overview, IP Security Policy, Encapsulating
Security Payload, Combining Security Associations, Internet
Key Exchange, Cryptographic Suites
Unit 5:
System Security
Intruders
Intruders, Intrusion Detection, Password Management,
Malicious Software
Types of Malicious Software, Viruses, Virus
Countermeasures, Worms, Distributed Denial of Service
5 Attacks. 10
Firewalls
The Need for Firewalls, Firewall Characteristics, Types of
Firewalls, Firewall Basing, Firewall Location and
Configurations,
Legal and Ethical Aspects
Cybercrime and Computer Crime, Intellectual Property,
Privacy, Ethical Issues
Total 46
Text Books:
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Deep Learning
22
Time Module Topic Summary
1 Introduction and Overview
hour
1 Recurrent Neural
hour Language Models
1 Transformer-based Introduced in 2017 by Vaswani et al.,
hour Language Models Transformers have quickly become the
most popular architecture for neural
language modeling. They are the basis for
recent large language models, e.g., GPT-
3 and PaLM. This lecture gives the
definition of a Transformer and overviews
details, e.g., residual connections, layer
normalization, and position embeddings.
1 Neural Network Efficient Attention There is an ever-growing bag of tricks that
hour Modeling speed up the computation of the attention
mechanism in Transformer-based
language models. This lecture overview
those tricks and various generalizations of
the transformer, which are becoming
increasingly necessary to scale up
Transformer LMs on academic hardware.
We will also discuss multi-headed
attention, sparse attention, and
Transformer variants tailored for long
documents. Where possible, we prove
guarantees for the methods.
1 Transfer Learning
hour Training, Fine
Tuning and
1 Inference Parameter efficient
hour finetuning
1 Quantization of LLM
hour
1 Instruction Tuning
hour
Reinforcement Learning
from Human Feedback
(RLHF)
1 In-context learning
hour
1 Prompting and zero-shot
hour inference
2 Retrieval Augmented
hour Generation(RAG)
1 Induction-Augmented
hour Generation Framework for
23
Answering
Reasoning Questions
1 Chain-of-Thought
hour Prompting Elicits
Reasoning in Large
Language Models
1 A Systematic Evaluation
hour Code LMs of Large Language
Models of Code
2 Security and Misuse Machine learning models are remarkably
hours Harms, Ethical Concerns brittle, and prone to all kinds of exploits.
and Halliunination Language models are no different: we will
see how tampering with model inputs or
training data can lead to arbitrarily bad
outcomes. We will also discuss how
Security and
Misuse language models could be exploited for
nefarious purposes such as large-scale
spam campaigns. On the other hand,
language models could also prove useful
as a defensive tool, e.g., for automated
online content moderation or for dispelling
misinformation.
1 Bias and Toxicity in Large
hour Language Models
1 Noisy Channel Language
Calibration of
hour prompting LLMs Model Prompting for Few-
Shot Text Classification
1 Prompt Engineering
hour
2 The Generative AI Life- So far, most of the course has been about
hours cycle models. But what would these models be
without the right data? We will discuss the
lifecycle of modern training sets for
language models, to understand how
Life Cycle design choices in the data collection and
maintenance process influence the
model’s “world view”. We will review
emerging guidelines and best practices
for managing and documenting machine
learning datasets across their lifetime.
24
GRAPHIC ERA HILL UNIVERSITY
SEMESTER VI
2. Contact Hours: L: 3 T: 1 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: NIL
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Demonstrate an understanding of techniques, processes,
technologies and equipment used in virtual reality
CO2 Identify appropriate design methodologies for immersive
technology development, especially from a physiological
perspective
CO3 Exploit the characteristics of human visual perception in
Virtual Reality techniques
CO4 Create effective VR techniques for the Web
CO5 Effectively categorize the benefits/shortcomings of available
VR technology platforms.
CO6 Use human factors to design and evaluate a VR application
25
S.NO Contact
Contents
. Hours
Unit 1:
Introduction: Goals, VR definitions, Birds-eye view (general,
hardware, software, sensation and perception), Defining
1 Elements of Virtual Reality, Applications of VR, Technical 9
framework, Mixed and Augmented Reality
Unit 3:
Bring Virtual Reality to the web: Introduction to Aframe,
3 Transformations and Textures using Afrane, Afrane animations, 9
Illumination, Inteaction with objects, Building a complete scene
using Aframe
Unit 4:
Navigation in Virtual Reality: Position, Orientation,
Maneuvering, Exploration, Travel characteristics, Wayfinding in
VR
4 Menus and Text in VR: 2D menus, 3D menus, Tool Belt Menu, 9
CUbic Menu, Tangible Interfaces, Gestural Commands, Voice
Commands, Text Input
Haptics: Human Haptics, Kinesthetic system, Motor system,
Haptic Devices and Interfaces
Unit 5:
VR Design Principles: Feedback and Constraints, Temporal
Compliance and its solutions, Spatial compiance, Nuling
5 compliance, Sensory dimensions, Constraints: Artificial and 9
Physically realistic constraints
Human Factors for Developing VR Applications, Evaluation and
Testing of VR systems
Total 45
Text Books:
26
Reference Books:
1. Subject Code: TCS 671 Course Title: Big data Storage and Processing
2. Contact Hours: L: 3 T: 1 P: 0
6. Semester: VI
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the concepts and significance of big data,
including its capture, management, organization, and
analysis
CO2 Utilize the HDFS command line interface to interact with the
file system, manage data nodes, and work with the data flow.
27
CO3 Describe the concept of MapReduce, its features, types, and
formats, and comprehend the workflow of a MapReduce job.
CO4 Set up a Hadoop cluster, considering system requirements,
and understand the different installation mode
CO5 Analyse and manage big data using Hadoop ecosystem
tools and techniques, such as HDFS, MapReduce, and
NoSQL databases.
CO6 Apply critical thinking and problem-solving skills to address
technological challenges associated with big data and
propose appropriate solutions.
Text Books:
28
Authors Name Title Edition Publisher, Country Year
Reference Books:
Fei Hu Big Data: Storage, 1st Edition CRC Press, Taylor, 2016
Sharing and and Francis.
Security,
29