6th Sem Syllabus (1)
6th Sem Syllabus (1)
SEMESTER
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the various phases and fundamental
principles of compiler design like lexical, syntactical,
semantic analysis, code generation and optimization.
CO2 Compare and contrast various parsing techniques such
as SLR, CLR, and LALR etc.
CO3 Use annotated tree to design the semantic rules for
different aspects of programming language.
CO4 Implement lexical analyser and parser by using modern
tools like Flex and Bison.
CO5 Examine patterns, tokens & regular expressions for
solving a problem in the field of data mining.
CO6 Design a compiler for concise programming language.
Unit 3:
Syntax-Directed Translation: Syntax-Directed definitions;
Constructions of Syntax Trees; Bottom-up evaluation of S-
attributed definitions; L-attributed definitions; Top-down
3 translation. 9
Run-Time Environments: Source Language Issues; Storage
Organization; Storage-allocation strategies, Storage-allocation in
C; Parameter passing
Unit 4:
Intermediate Code Generation: Intermediate Languages;
Declarations; Assignment statements; Boolean Expressions;
Case statements; Back patching; Procedure calls.
4
Code Generation: Issues in the design of Code Generator; The 9
Target Machine; Run-time Storage Management; Basic blocks
and Flow graphs; Next-use information; A Simple Code
Generator; Register allocation and assignment; The dag
representation of basic blocks; Generating code from DAGs.
Unit 5:
Code Optimization, Compiler Development: Code
Optimization: Introduction; The principal sources of optimization;
Peephole optimization; Optimization of basic blocks; Loops in
5 flow graphs. 9
Compiler Development: Planning a compiler; Approaches to
compiler development; the compiler development environment;
Testing and maintenance.
Total 45
Text Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS101),
Object Oriented Programming with C++ (TCS307)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand Software Development Life Cycle and
importance of engineering the software.
CO2 Development of efficient software requirement
specification for desired product.
CO3 Compare various software development methodologies
ad conclude on their applicability in developing specific
type of product.
CO4 Construct an efficient design specification document for
attainment of user desired product.
CO5 Develop applications using the concepts of various
phases of software development life cycle.
CO6 Study various software testing techniques and identify
their relevance to developing a quality software.
Unit 2:
Requirements: Importance of Requirement Analysis, User
Needs, Software Features and Software Requirements,
Classes of User Requirements: Enduring and Volatile; Sub
phases of Requirement Analysis, Functional and Non-
2 functional requirements; Barriers to Eliciting User
Requirements, The software requirements document and 9
SRS standards, Requirements Engineering, Case Study of
SRS for a Real Time System
Unit 4:
Testing: Testing Objectives, Unit Testing, Integration Testing,
Acceptance Testing, Regression Testing, Testing for
Functionality and Testing for Performance, Top-Down and
Bottom-Up Testing Strategies: Test Drivers and Test Stubs,
4 Structural Testing (White Box Testing), Functional Testing 10
(Black Box Testing), Test Data Suit Preparation, Alpha and
Beta Testing of Products. Static Testing Strategies: Formal
Technical Reviews (Peer Reviews), Walk Through, Code
Inspection, Compliance with Design and Coding Standards,
Automated Testing
Unit 5:
Software Maintenance and Software Project
Management: Software as an Evolutionary Entity, Need for
Maintenance, Categories of Maintenance: Preventive,
Corrective and Perfective Maintenance, Cost of Maintenance,
Software Re-Engineering, Reverse Engineering. Software
5 Configuration Management Activities, Change Control
Process, Software Version Control, An Overview of CASE 8
Tools. Estimation of Various Parameters such as Cost,
Efforts, Schedule/Duration, Constructive Cost Models
(COCOMO), Resource Allocation Models, Software Risk
Analysis and Management.
Software Quality Assurance: SQA Plans, ISO 9000 models,
SEI-CMM Model
Total 45
Textbooks:
Reference Books:
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamental of Computer & Introduction to Programming (TCS 101),
Data Structures with C (TCS 302)
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Programming in Java (TCS 408), Data Base Management Systems
(TCS 503)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Apply HTML and CSS effectively to create interactive
websites
CO2 Implement client-side scripting using JavaScript to
design dynamic websites.
CO3 Develop XML, AJAX and JQuery based web
applications.
CO4 Implement server-side scripting using PHP.
CO5 Design PHP application with Database connectivity.
CO6 Ability to design and deploy simple web applications
using MVC architecture.
Total 46
Textbooks:
Reference Books:
Robin Nixon Learning PHP, 1st Edition Shroff Publishers & 2015
MySQL & Distributers Private
JavaScript: Limited - Mumbai
With jQuery,
CSS & HTML5
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
Unit 2: Version Control with Git, Install GIT and work with
remote repositories, GIT workflows, Branching and Merging
2 in Git. Understand the importance of Continuous Integration, 9
Introduction to Jenkins, Jenkins management. Build and
automation of Test using Jenkins and Maven.
Unit 3: Continuous Testing, learn and Install Selenium,
3 create test cases in Selenium, Integrate Selenium with 10
Jenkins, Continuous Deployment.
Text Books:
Kevin Behr, Gene The Visible 1st Edition IT Process Institute 2004
Kim and George Ops Handbook
Spafford
Reference Books:
1. Subject Code: TCS 619 Course Title: Network and System Security
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Computer system security (TCS 591)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the basics of computer security
CO2 Elaborate the cryptographic techniques.
CO3 Discuss the transport layer security
CO4 Find the pros and cons of various key distribution
methods
CO5 analyse the wireless Network security
CO6 Find the level of system security
Unit 2: 9
2 Cryptography
Symmetric Encryption and Message Confidentiality
Symmetric Encryption Principles, Symmetric Block
Encryption Algorithms, Random and Pseudorandom
Numbers, Stream Ciphers and RC4, Cipher Block Modes
of Operation.
Unit 3:
Network security Application - I
Key Distribution and User Authentication
Symmetric Key Distribution Using Symmetric Encryption,
Kerberos, Key Distribution Using Asymmetric Encryption,
3 X.509 Certificates, Public-Key Infrastructure, Federated 10
Identity Management
Transport-Level Security
Web Security Considerations, Secure Socket Layer and
Transport Layer Security, Transport Layer Security,
HTTPS, Secure Shell (SSH)
Unit 4:
Network security Application - II
Wireless Network Security
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i
Wireless LAN Security, Wireless Application Protocol
Overview, Wireless Transport Layer Security, WAP End-to-
4 End Security
8
Electronic Mail Security
Pretty Good Privacy, S/MIME, DomainKeys Identified Mail,
IP Security
IP Security Overview, IP Security Policy, Encapsulating
Security Payload, Combining Security Associations,
Internet Key Exchange, Cryptographic Suites
Unit 5:
System Security
Intruders
Intruders, Intrusion Detection, Password Management,
Malicious Software
Types of Malicious Software, Viruses, Virus
Countermeasures, Worms, Distributed Denial of Service
5 Attacks. 10
Firewalls
The Need for Firewalls, Firewall Characteristics, Types of
Firewalls, Firewall Basing, Firewall Location and
Configurations,
Legal and Ethical Aspects
Cybercrime and Computer Crime, Intellectual Property,
Privacy, Ethical Issues
Total 46
Text Books:
Reference Books:
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: Deep Learning
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DSE
8. Pre-requisite: NIL
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Demonstrate an understanding of techniques, processes,
technologies and equipment used in virtual reality
CO2 Identify appropriate design methodologies for immersive
technology development, especially from a physiological
perspective
CO3 Exploit the characteristics of human visual perception in
Virtual Reality techniques
CO4 Create effective VR techniques for the Web
CO5 Effectively categorize the benefits/shortcomings of available
VR technology platforms.
CO6 Use human factors to design and evaluate a VR application
Unit 3:
Bring Virtual Reality to the web: Introduction to Aframe,
3 Transformations and Textures using Afrane, Afrane animations, 9
Illumination, Inteaction with objects, Building a complete scene
using Aframe
Unit 4:
Navigation in Virtual Reality: Position, Orientation,
Maneuvering, Exploration, Travel characteristics, Wayfinding in
VR
4 Menus and Text in VR: 2D menus, 3D menus, Tool Belt Menu, 9
CUbic Menu, Tangible Interfaces, Gestural Commands, Voice
Commands, Text Input
Haptics: Human Haptics, Kinesthetic system, Motor system,
Haptic Devices and Interfaces
Unit 5:
VR Design Principles: Feedback and Constraints, Temporal
Compliance and its solutions, Spatial compiance, Nuling
5 compliance, Sensory dimensions, Constraints: Artificial and 9
Physically realistic constraints
Human Factors for Developing VR Applications, Evaluation and
Testing of VR systems
Total 45
Text Books:
Reference Books:
Authors Title Edition Publisher, Country Year
Name
2. Contact Hours: L: 3 T: 0 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
4. Relative Weight: CIE 25 MSE 25 ESE 50
5. Credits: 3
6. Semester: VI
7. Category of Course: DSC
8. Pre-requisite: Fundamentals of Artificial Intelligence and Machine Learning
(TCS364), Deep Learning(TCS464), Reinforcement Learning (TCS545)
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Define fundamental concepts in generative modeling and
explain the core idea behind Generative Adversarial
Networks.
CO2: Describe the different components of a GAN architecture
and their functionalities.
CO3: Implement basic GAN architectures using popular deep
learning libraries relevant to engineering problems.
CO4: Compare and contrast the strengths and weaknesses of
different GAN variants for specific image generation tasks.
CO5: Discuss the potential regulatory and societal impacts of
GANs and related generative models.
CO6: Design and implement a basic GAN system for a simple
engineering-related problems.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
UNIT 1: Introduction to GANs, GAN Components
Overview of generative models, The concept and architecture of
Text Books:
Authors Name Title Edition Publisher, Year
Country
Jakub Langr, GANs in Action: Deep 1st Manning, USA 2019
Vladimir Bok learning with Edition
Generative Adversarial
Networks
Josh Kalin Generative Adversarial 1st Packt Publishing, 2018
Networks Cookbook Edition UK
David Foster Generative Deep 1st O'Reilly Media, 2019
Learning: Teaching Edition USA
Machines to Dream
Reference Books:
Authors Name Title Edition Publisher, Year
Country
Jasmijn Tran, Hands-On Generative 1st Packt Publishing 2019
Sergio Ortega, and Adversarial Networks Edition Ltd, UK
Antonio García with Keras
Yepes
John Hany Hands-On Generative 1st Packt Publishing, 2019
Adversarial Networks Edition India
with PyTorch 1.x
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Define the fundamental concepts of transformer models and
their key components like self-attention and multi-head
attention.
CO2: Describe the functionalities of positional encoding, layer
normalization, and feed-forward networks in transformers.
CO3: Implement basic transformer architectures using popular deep
learning libraries relevant to engineering problems.
CO4: Compare and contrast the strengths and weaknesses of various
transformer applications in NLP tasks like machine translation
and text summarization.
CO5: Evaluate the scalability challenges associated with large
transformer models and discuss approaches like model
distillation for efficiency.
CO6: Design and implement a simple transformer-based system for
an engineering-related problem like sentiment analysis or text
classification.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
UNIT 1: Introduction to Transformers, Building Blocks of
Transformers
Overview of transformer architecture, Self-attention mechanism:
1 10
concept and advantages, Positional encoding and layer normalization,
Detailed study of multi-head attention, The role of feed-forward
networks in transformers, Masking and its uses in model training
UNIT 2: Training Transformers
Optimization and regularization techniques, Handling large datasets
2 8
and batch processing, Strategies for effective training and
convergence
UNIT 3: Applications in NLP
3 Machine translation and text summarization, Text generation with GPT 10
models, BERT and its variants for various NLP tasks
UNIT 4: Beyond NLP
Vision Transformers (ViT) for image recognition, Transformer
4 10
applications in audio processing, Cross-modality transformers for joint
tasks
UNIT 5: Advanced Topics and Future Directions
Scalability of transformers and big model issues, Efficient transformers
5 8
and model distillation, Ethical considerations and biases in large
models
Total 46
Text Books:
Authors Name Title Edition Publisher, Country Year
Denis Rothman Transformers for Natural 1st MANNING 2021
Language Processing Edition Publications Co., USA
Lewis Tunstall, Natural Language Processing 1st O'Reilly Media, Inc., 2020
Leandro von with Transformers Edition USA
Werra, and
Thomas Wolf
Reference Books:
Authors Name Title Edition Publisher, Country Year
Aurélien Géron Hands-On Transformers with 1st Edition O'Reilly Media, Inc., 2021
Python USA