IET DAVV 2012 May

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

12B249

BE EXAMINATION April-May 2012


Computer Engineering/Information Technology
4CO202/4IT402
ARTIFICIAL INTELLIGENCE
Duration: 3hrs. Max Marks: 100
Min Pass Marks: 35
Note: All questions are compulsory. Each question has three parts (a), (b) and (c). Attempt any two parts from
each question. All parts of the questions must be solved in sequence. Make suitable assumption wherever
necessary.

Ql(a) What is production system? What are the various classes of production systems? Explain their 10
properties.
(b) For each of the following types of problems, mention the problem characteristics and describe 10
a good heuristic function
(i) Blocks world (ii) Theorem proving

:
(iii) Missionaries and cannibals (iv) Monkey and bananas.
(c) Define AI Technique. Formulate the production rule and draw the state space for water-jug 10
problem. Given two jugs of 4 litres and 3 litres. Both the jugs are not having any measuring
marks on them. A pump can be used to fill up the jugs. How can you get two litres of water
into 4 litres jug.

Q2(a) Explain the different approaches of the knowledge representation. Distinguish between 10
inheritable knowledge and inferential knowledge.
(b) What is clause? What is Horn clause? 10
Convert the following in predicate notation:-
(1) There is unique capital of a country.
(2) All all-rounders are good batsmen.
(c) Explain with example Branch and bound technique to find the shortest path between source 10
and destination. Mention each step clearly.

Q3 (a) What are the steps for designing of a fuzzy control system? Suggest a design for a brake 10
system of a car on the inputs, outputs, fuzzy sets and rules.
(b) (1) Give the relative advantages and disadvantages of expert system based on decision tree 10
over an expert system based on production rule.
(2) Draw the block diagram of a fuzzy control system with each unit defined precisely.
i
(c) (1) Consider a statement "comfortable temperature." Assume the universe of discourse, in 10
degree Celsius, to be {-20,-10, 0, 10, 20, 30, 40, 50}. Give the fuzzy set to describe the
statement
(i) From a polar bear's point of view
(ii) From a camel's point of view
(iii)From your point of view.
(2) Describe Modus ponens, chain and inference rules with suitable example.
Q4 (a) Express the following sentences as conceptual dependency structure,
(i) Bill is a programmer,
(ii) Sam gave Mary a box of candy,
(ii) John begged Mary for a pencil.
(b) Explain the alpha-beta pruning search procedure. In this procedure which nodes would not 10
need to be examined? Explain with example.
(c) Construct a script for going to a movie from the viewpoint of the movie goer. With four 10
scenes and sequences of events in the each scene.

Q5(a) What are the problems in natural language understanding? Give all steps involved in the 10
natural language processing.

(b) (1) Explain the terms-heuristics, nonalgorithm, symbolic computation, static evaluation 10
function.
(2) What are the domains of Artificial intelligence? Explain.
(c) Write short note on neural network. Give a simple mathematical model for neuron. 10
12B249
IV B. E. Examination April - May' 2012
Computer Engineering
4CO203 Object Oriented Design
Duration: 3 Hrs. Maximum Marks : 100
Minimum Pass Marks: 35
\: Every question has three parts (a),(b),(c). Attempt any two from the three parts for each

question. All questions carry equal marks.

Q. 1 (a) What are the phases and disciplines of the Unified Process? Draw and 10
explain with help of a diagram.
(b) Define workflow, milestones, work products, artifacts and roles 10
(c) Define inheritance, abstraction. How is inheritance a type of abstraction? 10

Q. 2 (a) What is analysis? What are the different methods for performing object 10
oriented analysis?
(b) Differentiate between analysis and design? 10
(c) What are the shortcomings of use case diagram? 10

Q. 3 (a) What are the advantages and disadvantages of a data centric approach? 10
(b) How does candidate architecture help in planning and working of a software 10
team?
(c) What is meant by analysis mechanism for architecture? List different types 10
of analysis mechanisms?

Q. 4 (a) What is an association relationship? Explain why is it the simplest kind of 10


relationship? Give an example?
(b) What are the notations for entity class, boundary class and control class? 10
What is the purpose of each class?
(c) What is meant by flow of control? How can it be implemented in the design? 10

Q. 5 (a) List the different kinds of relationship present in a use case diagram? 10
(b) Write a scenario for taking admission in a course. Draw the notations for a 10
class diagram, object diagram, mention multiplicities and links among the
objects?
(c) Define concurrency? Write an example to explain the concept? 10
*•>*»
12B251
BE IV EXAMINATION APRIL 2012
COMPUTER ENGINEERING
4CO204
WIRELESS PROTOCOL & MOBILE COMPUTING

Duration: 3hrs. Max. Marks:100


Min. Marks:35
Note: Attempt all questions. Write answer of any four parts from each question.

Q.I (a) Compare the characteristics of wireless and fixed networks on: (10)
(a) Bandwidth availability (b) Security (c) Noise immunity and (d)
Delay
(b) What is spread spectrum? Draw FHSS signal for the frequency usage (10)
pattern in various time slots given as
(fl,i2,O,f4,tM6rf7,f8) -* (3,6,4,5,7,2,1,8)
(c) Describe MACA protocol with the help of finite automata and show (10)
how it eliminates hidden and exposed terminal problem?
Q2 (a) Define hidden and exposed terminal problem. How MACA protocol (10)
overcomes the problem of hidden and exposed terminal ?
(b) Describe the GSM system architecture and its TDMA and FDMA (10)
frame structure.
(c) What security issues addressed in GSM? Explain. (10)

Q.3 (a) What three inter frame spacing intervals defmed?Defme DFWMAC- (10)
DCF protocol with CTS/RTS extension .
(b) Explain the DSSS frame structure of IEEE 802.11 and provision for (10)
different data transfer speeds.
(c) Show the IEEE 802.11 MAC frame format explaining the provision of (10)
interpretation of MAC addresses, power management, security and
fragmentation.

Q.4 (a) Explain the mobile IP architecture and one encapsulation technique to (10)
support mobility in IP protocol?
(b) Compare the merits and demerits of I- TCP and snooping TCP (10)
mechanisms.
(c) Describe the following (10)
(i) M1DP
(ii) CLDC
(iii) CDC
(iv) Manifest file

Q.5 (a) How is location management done using HLR,VER and EIR? (10)

(b) How are mobile databases used in message flow of mobile originated (10)
call establishment process?
(c) How are different types of queries processed in mobile databases. (10)
12-B-252
BE. IV EXAMINATION APR-MAY, 2012
COMPUTER ENGINNERING
4CO205
MACHINE LEARNING
\: 3 hrs. \x Marks: 100
Min Pass Marks: 35

Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. AH question carry equal marks.

UNIT-I
1 a. Define Machine Learning? What are the applications of machine 10
Learning?
b(i). What is market basket analysis? How is it used? 05
(ii). How can say man is better than machine? 05
(c). Write down the Candidate elimination-learning algorithm. Consider the 10
following sequence of positive and negative training examples
describing the concept "Japanese Economy Car." Each training example
describes an order of car, with each car described by their Country of
origin, Manufacturer (Honda Toyota, Chrysler), Color (Blue, Green ,Red
, White), Decade, and Type(Economy, Sports).

Origin Manufacturer Color Decade Type T

•Jap'an .Honda Blue 1980 Economy Positive


Japan Toyota Green 1970 Sports Negative
Japan Toyota Blue 1990 Economy Positive
USA Chrysler Red 1980 Ecoribmy Negative
Japan Honda White 1980 Economy Positive
Provide a hand trace of Candidate Elimination Algorithm learning from
the above training examples and hypothesis language. In particular,
show the specific and general boundaries of the version space after it has
processed the first training example, then the second training example,
etc.
UNIT-II
2a(i). What are advantages of decision tree learning? I 05
(ii) What is the concept of over fitting in decision tree learning? ' 05
b(i). Which attribute is the best Classifier in the decision tree? Explain? 05
(ii) Why prefer short hypotheses in decision tree Learning? 05
c. Use the table of examples below: PTO 10
Independent Attributes / Condition Dependent Attributes /
Attributes Decision Attributes
Name Hair Height Weight Lotion Result
Sarah blonde average light no sunburned (positive)
Dana blonde tall average yes none (negative)
Alex brown short average yes none
Annie blonde short average no sunburned
Emily red average heavy no sunburned
Pete brown tall heavy no none
John brown average heavy no none
Katie blonde short light yes none
Perform average entropy calculations on the complete data set for each
of the four attributes.
UNIT-III
3a(i). How can define the sample error and true error? 05
(ii) Explain the PAC Learning? 05
b. What is the mistake bound for the Find-S Algorithm? 10
c. Define Vapnik -Chervonenkis Dimension. What are uses of VC 10
dimension?
UNIT-IV
t 4 a. What are the difficulties in WSD? Write down the application of WSD? 10
-. b(i). Write down the application of HMMs? 05
(ii) Write regular expression for the following language: The set of all 05
Lowercase alphabetic strings ending in a b.
c . What is the Support Vector Machine? And Also Explain maximum 10
margin classifier?
UNIT-V
5 a. What is Genetic Algorithm? Write the operators of Genetic Algorithm? 10
b. How many selection methods to select the best chromosomes? Explain 10
two?
c. Define the following:( Any two) 10
(i) Parameter of Genetic Algorithm
(ii) Permutation Encoding of Chromosome
(iii) Michigan Approach I
12B258
BE IV EXAMINATION APRIL-MAY, 2012
INFORMATION TECHNOLOGY
4IT404 VERY LAGRE DATABASE SYSTEM

Duration: 3 Mrs Max Marks: 100


Min Pass Marks: 35

Note: Attempt all the questions. Attempt any two parts of each question. AH parts of
question must be solved at one place. Assume suitable data if necessary.

Ql (a) Explain the architecture of Data Warehouse with the help of diagram. 10
(b) Differentiate the following with an example. 10
( i } Snowllake schema, fact constellation, starnet query model.
(ii) OLTP & OLAP
(c) Differentiate the following with an. example. 10
(i) Supervised learning and unsupervised learning.
(ii) Classification and Clustering.
Q2 (a) Define the following: 10
i) Data Mart ii) Data cleaning techniques,
(h) Wha?: is the concept hierarchy? Explain the architecture of Data mining with 10
the hdp of diagram,
(c) Explain the various types of Data Mining Primitive? Write the syntax for 10
Task-Relevant Data Mining primitive.
Q3 (a) A database has four transactions. 10
T1D item brought
T100 K, A, D, B
T200 D, A, C, E, B
T300 C, A, B, E
T400 B, A, D
i ) Find all frequent item sets using FP-growth
ii) List ail the strong rule for minimum support and confidence is 20% and
70%.
(b) What is clustering? What are the different types of cluster? Give example. 10
(c) Explain Different type of association rule mining techniques. Explain any one 10
with example.
Q4 (a) Justiiy "Classification is a supervised way of learning". What are the popular 10
c 1 a ssi ficat i on techni que s?
(b) Explain rule based classification with example. 10
(c) What are the advantages and disadvantages of Naive Bayes Algorithm as 10
compared to the C4.5 algorithm'.' Explain classification by backpropogation.
Q5 (a) What is Web mining? Explain the various categories of web mining. 10
(b) Explain the Process of Knowledge Discovery in Database. 10
(c) Explain.in brief (Any Two) 10
i) Spatial mining
i i) S upport vector machine
iii) Support & Confidence
12B263
B.E. IV EXAMINATION April - May 2012
Computer Engineering
CO4202 SOFTWARE ENGINEERING
Duration: 3Hrs Max Marks: 100
\n Pass Marks: 35
;: Attempt any five questions. \I (a) What is a software process? List the sta

(b) Why is the software process called as software development life cycle? 5
(c) List the different domains of the software? How are requirements affected by 5
domains?
(d) What are the responsibilities of a software engineer? 5

Q. 2 (a) What are the qualities of the good software requirements? Explain two such 5
qualities?
(b) What are the metrics for software performance? Explain two such software 5
metrics?
(c) What are the sub-characteristics for dependability? Explain each in brief? 5
(d) What is a critical system? What are the properties that make up the critical 5
system?

Q. 3 (a) What is maintainability and why should a software design be maintainable? 5


(b) What are the main activities that make up the software design process? 5
(c) Define cohesion and coupling. Also explain two types of cohesion and two 5
types of coupling?
(d) What are the different types of architectural styles? 5

Q. 4 (a) State the difference between verification and validation? 5


(b) Explain why testing is an important part of the software development life 5
cycle?
(c) What is stress testing and when it is applied? 5
(d) Define errors, faults and failures. 5

Q. 5 (a) What are the short-comings of the waterfall model approach? 5


(b) What are the advantages and disadvantages of the prototyping approach of 5
software development?
(c) What kind of costs are important for software projects and why? 5
(d) Explain one type of risk and how can it be mitigated? 5

0-6 (a) What are the advantages of the object oriented approach for software design? 5
(b) Define and give example for each classes, objects, relationships 5
(c) Explain abstraction and polymorphism 5
(d) Define methods, attributes and access specifiers. 5
I I
Q7. (a) Define fat client and fat servers, give example of each. '5
(b) How does abstraction play a role in designing layers for the layered model 5
approach?
(c) Give an example of re-engineering and explain when it is important. 5
(d) What are the reasons for posting certain applications on the client and certain 5
applications on the server? Give an example for each.
12-B-265
IV B. E. Examination April-May'2012
Computer Engineering
4CO252: Enterprise Resource Planning
Duration: 3 Hrs. Maximum Marks: 100
Minimum Pass Marks: 35
Note: Every question is having three parts (a), (b) and (c). Attempt any two parts from every
question. All questions carry equal marks. Any assumptions made answering the
questions should be stated.
Q. 1 (a) Define ERP (Enterprise Resource Planning) in your own words. Also, explain 10
role of stakeholders of ERP system.
(b) Explain following in short in view of Material Requirement Planning: 10
Economic Order Quantity, Period Order Quantity & Part Order Quantity
(c) Draw and explain architecture of generic ERP System. 10

Q. 2 (a) What are the limitations of ERP systems? How latest technologies facilitate in 10
overcoming these limitations?
(b) Only list various phases of BPR (Business Process Reengineering). Also, 10
explain, how an organization can put efforts to get maximum benefit of BPR?
(c) How security is critical in an ERP system? Explain importance of data security 10
in context of ERP System.

Q. 3 (ft) What is Gap Analysis? Explain its usefulness in ERP implementation. 10


(b) Why pre-implementation tasks are important for the success of ERP 10
implementation? Explain.
(c) Who are the people involved in ERP implementation? Explain nature and 10
composition of ERP implementation team.

Q. 4 (a) "Financial accounting module provides enterprise wide control on financial 10


information", justify this statement with suitable example.
(b) How pre-purchasing activities are carried out in a standard Material 10
Management module? How ERP system facilitates this?
(c) Explain sub systems and functionality achieved by Human Resource Module 10
of an ERP System,

Q. 5 (a) Explain the special features of SAP that helps organizations to achieve 10
operational excellence and give competitive advantage.
(b) Why ERP system by ORACLE, considered as most comprehensive ERP 10
solution? Explain.
(c) Explain the impact of technology and social system on the development 10
process of ERP system.
12B266
BE IV Year Examination April-May 2012
Computer Engineering
4CO253: Network & Information Security
.
Duration: 3 Mrs. Max. Marks: 100
Min. Pass Marks: 35
Note:
(i) There are total FIVE questions. Each question carries three parts.
Attempt any TWO parts in each question,
(ii) All parts of the question must be done at same place.

Q.1 (a)i Differentiate between the terms by giving an example :- 5


Cryptology, Cryptography, Cryptanalysis
ii What is meant by security mechanism? Briefly define 5
categories of it.
(b)i Explain playfair cipher by taking a suitable example. 5
ii How is cryptography possible with rotor machine? Explain. 5
(c)i What are the two types of security attacks possible? 5
Classify those two types of attacks.
ii Explain the cryptanalysis of Polyalphabetic Cipher. 5
Q.2 (a)i Explain the principle reason behind origin of AES. 5
ii Show that the DES decryption is same as inverse of DES 5
encryption.
(b)i Explain the cryptanalysis of Playfair cipher,
ii Explain the different evaluation criteria of AES. 5
(c) Differentiate between following:- 10
i Block cipher and Stream cipher
ii Diffusion and Confusion
ill Differential and linear cryptanalysis
iv SubBytes and SubWord
v Rijndael and AES
Q.3 (a)i Differentiate between the ciphers Double DES, Triple DES 5
with two keys and Triple DES with three keys,
ii Enlist the ways in which secret keys can be distributed to 5
two communication entities.
(b)i Explain Man-in-the -middle attack on Diffie-Hellman key 5
exchange protocol,
ii How to achieve authentication and secrecy simultaneously 5
using public key cryptosytem.
(c)i What is meant by hash function? Explain basic uses of it.
ii What is meant by message authentication code? Explain 5
MAC code based on DES cipher.
Q.4 (a)i What is meant by digital signature? Differentiate between 5
DSA and RSA approach for digital signature,
ii In case of PGP as a security scheme for Email, there is a 5
requirement to convert textual data into binary format and
vice versa. Why is it so? Explain in brief.
(b)i Why is there a requirement of SSL handshake protocol? 5
Explain,
ii Explain the steps of payment gateway authorization in 5
secure electronic transaction.
(c)i Explain a protocol that provide confidentiality & 5
authentication service for email & file storage application,
ii How replay attack is possible in case of valid signed 5
message? How to overcome it? Explain.
Q.5 (a)i Explain a fundamental tool for intrusion detection in brief. 5
ii What is meant by password management? Explain UNIX 5
password scheme.
(b)i There is decoy system to lure attackers. What is the name 5
given to such decoy system? Explain in brief,
ii Explain some malicious software which runs independently 5
on a node.
(c)i Explain digital immune system as an advanced anti-virus 5
technique.
ii Explain the different configurations of firewall system. 5
*********************************

'
/•*- 6
B.E. IV EXAMINATION MAY, 2012 —
INFORMATION TECHNOLOGY
4C0254
INTERNET COMPUTING

Duration: 3 Mrs Max. Marks: 100


Min. Marks: 35
Note: 1. Every unit has one question with three parts (a), (b) and (c). Attempt any two parts from every
question.
2. All questions carry equal marks.
3. Any assumptions made answering should be stated.

Ql. a) Explain the structure of an XML document. Explain the different development goals of XML
document.
b) Differentiate between validating and non-validating parser.
c) Why is an XML declaration needed? Is the use of binary data permitted in a CDATA section?
'
Q2. a) What is DTD? Why do we use it? Explain the different components of DTD. How many
elements should you have in a DTD?
b) Draw XML tree for "Big Bazar" and also convert the tree to its corresponding code.
c) Explain the need/use ofentities in XML document. Describe all three types ofentities with the
help of an example. How can you put unparsed (non-XML) text in an external entity?

Q3. a) The XML input file


<book>
<title>The Dilbert Principle</title>
<author>Scott Adams</author>
</book>
Write XSLT file that transform the above xml file to the following display of HTML
<hl>The DHbert Principle</hl>
<h2>Scott Adcitiis</h2>
b) Name two XPath axes that, respectively, can be used to select element nodes and attribute
nodes. If the context node is an element node, give the XPath location path, which selects the
number attribute node of that element node. Show the answer in both abbreviated and
unabbreviated syntax
c) <?xm! version="1.0" encoding="utf-8"?>
<Catalog>
<Album artist="The Last Shadow Puppets" title="The Age Of The Understatement"^
<Track rating="4" length="P3M7S">The Age Of The Understatement</Track>
<Track rating="3" length="P2Ml8S">Standing Next To Me</Track>
<Track rating="5" length="P2M26S">Caim Like You</Track>
<Track rating="3" length="P3M38S">Separate and Ever Dead!y</Track>
<Track rating="2" length-"P2M37S">The Chamber</Track>
<Track rating="3" length="P2M44S">Only The Truth</Track>
</Album>
< Album artist="Kings Of Leon" title-"Because Of The Times">
<Track rating="4" length="P7M10S">Knocked Up</Track>
<Track rating="2" iength-"P2M57S">Charmer</Track>
<Track rating="3" length="P3M21S">On CalK/Track>
<Track rating="4" length="P3M09S">McFearless</Track>
<Track rating="l" length="P3M59S">Black ThumbnaiK/Track>
</Album>
</Catalog>
Write XPath Expresssions for the following
1. select all the albums
2. select the artist attribute for all albums
3. select all the tracks in all albums
4. select all albums by the Kings Of Leon
5. select all tracks in all albums by the Kings Of Leon.

Q4. a) <?xml version-" 1.0" encoding="utf-8"?>


<company name="... Applied Physics Laboratory"
shortName="JHU/APL"
mission="Enhancing national security ...">
<head name-"Richard Roca" phone="410-778-1234"/>
<department name-"Air and Missile Defense"
mission="Enhance the operational ...">
<group name="AIE" numStaff="20"/>
<group name="AlF" numStaff="15"/>
<group name="A1G" numStaff="25"/>
</departrnent>
<department name="Research and Technology..."
mission:=nAssure that ...">
<group name= r f RSI" numStaff="15"/>
<group name=!lRSS" numStaff="10"/>
</department>
</company>
Write Java code using DOM API to'generate output as given below :
Company
Name : The John Hopkins University Applied Physics Laboratory
Short name : JHU/APL
Mission : Enhancing national security through science and Technology
b) <?xmI version = "!.()"?>
<Employee-Detail>
<Employee>
<Emp_ld> E-001 </Emp_Id>
<Emp_Name> Vinod </Emp_Name>
<Emp_E-mail> Vinodl@yahoo.com </Emp_E-mail>
</Employee>

P.T.O.
<Employee>
<Emp ld> E-002 </Emp_ld>
<Emp_Name> Amit </Emp_Name>
<Emp_E-mail> Amit2@yahoo.com </Emp_E-matl>
</Employee>
</Employee-Detail>
Write a program using SAX to extract employee details from the above .xml file.
c) Compare DOM and SAX parsers for XML. Give respective advantages and disadvantages.

05. a) What is an RPC? Explain RFC protocols.


b) Explain Web Services Stack briefly.
c) Write the Java program for create, send and receive a point-to-point SOAP?
12B269
B.E.IV EXAMINATION APRIL-2012
COMPUTER ENGINEERING
4EI251 CONTROL SYSTEM THEORY
Duration: 3 Hrs. Max Marks: 100
Mm Pass Marks: 35
NOTE: 1. Attempt any Two parts out of Three in each question.
2. Take suitable assumption where needed.

Q.I A) Determine the overall transfer function using block diagram reduction method whose block 10
diagram is given below:

r^SHHK] C

Hi

B) Calculate the transfer function of electrical network shown below and compare the close loop 10
control system with open loop syslem.

1 IXC

C)
"I i
Draw signal How graph for a given system and explain various terminology of signal flow graph 10
and then find out the overall transfer function using Mason's gain formula.

Q.2 A) The open loop transfer function of a unity feedback control syslem is Ljiven by 10

Calculate various transient time response specification peak time, rise time, m a x i m u m peak
overshoot, settling time and damped frequency.

Determine the stability of the system using Routh Hurwitz criterion whose overall transfer 10
function is given below:
C(s) 2s + 5
R(s) (s - l)(s + 2)(s + I) 2

Also calculate how many poles lies in right hand side of the s-plane.
TO
C) For a given unity feedback system determine the type of system , all error coefficients and steady
state error for ramp input with magnitude 5.
r( ^ 2Q(5 + 2)
^~~ s + 5)
Q.3 A) Draw the bode plot for a unity feedback control system 10

G(s) = - 10)
Find the gain margin, phase margin, gain crossover frequency and phase crossover frequency

B) Using Nyquist criterion investigate the closed loop stability of the system whose open loop transfer
function is
50

C) Construct the polar plot for given open loop transfer function: 10
14
s(s + l)(s + 2)
Q.4 A) The open loop-transfer ftmetio-n ef eontrafsyslem is afven by - ••
K
+ 4 . 9 + 13)

Sketch the root locus and determine break away points, angle of departure from complex poles and
the stability condition.

B) Explain lead compensator in following term: 10


a) Circuit diagram b) Transfer function c) Pole zero plot & polar plot
d) Bode plot e) Effects of lead compensator f) Limitations of lead compens

C) Find the value of K using magnitude condition If S-- -0.85 lies on the root locus of a system 10

Q.5 A) Find out the state space representation for given electrical network 10
-\M/WV—[—onnnn-
L

B) Find the controllability and observabality of state space representation of a system is represented 10
by
-2 l u
o -3

C) A linear time invariant system is characterized by the homogenous state equation 10

'[el*
the initial state is

LO
find the resolvent matrix, state transition matrix and the solution of the given equation.
12-B-277
B.E. IV EXAMATION APRIL-MAY, 2012
INFORMATION TECHNOLOGY
4IT451 -MULTIMEDIA COMPtJTING
i-hiraiion: .'•> hrs Max Marks: 100
Min I J ass.Marks: 35

Note: Aik-mpt any two parts of each question. Alt subparts of a question must be answered at
one place in continuation. Make and state suitable assumption wherever required.

O.! {;;) Explain the term multimedia. What are the different components of multimedia? 10
(':>) \Vhai are the basic tools required in creation of multimedia presentation? Explain 10
any one hi detail.
{*.:) E x p l a i n w i t h example bow Shannon-Fano algorithm is applied to text compression? 10
vvh<it is the compression ratio?
(.>.?.(a) What are (he various types of Hie format in multimedia? Explain any two types file 10
format in multimedia.
(hi What is image compression? Draw a block diagram for JPEG encoder and explain 10
its working.
(c) Li si; and explain different color models used in images and videos. H)
O Wa) What, is MIDS eomx'pi? Explain various MIDI messages in detail. 10
(h) Draw neat schematic diagram for predictive encoder and decoder and explain its 10
working in detail.
(LJ What is compression? What are the different video compression techniques? 10
Explain any one in detail.
Q.4(ai What aric die most salient differences between ordinary TV and EIDTV? What vvus 10
(he main impetus for development of HDTV?
(iij Draw neat schematic diagram for encoder and decoder for H.261 and explain its 10
working in detail.
(c) What are the advantages of Adaptive Huffman coding compared to the original 10
11liftman coding algorithm?
O.5(a) Whai is RTF packet header? Explain each field of RTF packet header. 10
(bj What is ATM Cell Structure? Explain each field ATM Cells format and services. 10
(c) What is Meclia-on-Demand? Describe the general architecture of STB. 10

.
12-B-278

B.E. IV EXAMINATION APRL-MAY, 2012


IN FORMATION TEC HNO LOG Y
4ST452: OBJECT ORIENTED DESIGN

; 3 firs. Max Marks: 100


Minimum Marks: 35

Note; Altempi; ail the questions. Attempt' any two parts of each question. AS! parts of
question must be soivecl at one place. Take the suitable assumption if necessary.

Ql (a) What is the importance of Modelling? Explain the basic principles of 10


Modelling. Also explain the building blocks of U ML.
(b) What are the symptoms and root causes of software development 10
problems'.' Explain the Software Best Practices.
(c) You are interacting with an online travel agent and encounter the 10
following use cases, Prepare a Use Case Diagram, using the
generalization and include relationships.
a) Purchase a flight: Reserve a flight and provide payment and
address information.
b) Provide payment information: Provide a credit card to pay for the
incurred charges.
c) Provide address: Provide mailing and residence address.
cl) Purchase car rental: Reserve a rental car and provide payment and
acid ress information.
e) Purchase a hotel stay: Reserve a hotel room and provide payment
arc! address information.
f) Make a purchase: Make i\l purchase and provide payment
arc! address information.

O2 (a) What is the purpose of requirement? What are the main artifacts of 10
Requirements? What is a supplementary specification and what does it
include?
(b) What are analysis classes? Explain control class, boundary class and .10
entity class with appropriate notations & example.
(c) What is Rational Unified Process? What arc the four basic principles of 10
object orientation?

Q3 (a) What is the purpose of Architectural Design?? Explain it with "'4+1 10


View'" model. Also explain various architectural patterns with example.
(b) What are design and implementation mechanism? Explain the mapping 10
'iorn analysis to design to implementation mechanism for Q. 1 . (c)
(c) Prepare a class diagram for a graphical document editor that supports 10
grouping. Assume that a document consists of several sheets. Each sheet
contains drawing objects, including text, geometrical objects and groups.
A group is simply a set of drawing objects., possibly including other
groups. A group roust contain at least two drawing objects. A drawing

- o.
object can be a direct member of at most one group. Geometrical objects
include circles, ellipses, rectangles, lines and squares.

•;a)A company is manufacturing a new product and must coordinate several 10


departments. The Product starts out as a raw marketing idea that goes to
engineering. Engineering simulates the function of the product and
prepares a design. Manufacturing reviews the design and adjusts it to
conform to existing machinery. Engineering approves the revisions and
customer service then looks at the design - a good design must enable
ready repair. Engineering approves the customer service proposals and
ensures that (he resulting design still meets the target functionality.
Construct an activity diagram for this process. Use swim lanes to show
the various interactions. Show the changes in the state of the design as the
activity diagram proceeds.
(b) What is the purpose of Use-Case Design? What are the input artifacts and 10
resulting artifacts of Use-Case Design? What is meant by encapsulating
subsystem interactions? Why is it a good thing to do?
(c) What is purpose of Class Design? Explain the steps of Class Design. 10

(a) What is the purpose of Subsystem Design? flow many interaction 10


diagrams should be produced during Subsystem Design'?
( b ) Consider stock management software that records all transactions that 10
occur tor a portfolio. For example, stocks may be purchased and sold.
Dividend payments may be received. Complex situations can occur, such
as stock splits.
The current contents of a portfolio can be determined by replaying the
transaction log. The portfolio has some initial contents, and all subsequent
changes are captured via the transaction log. The changes in the
transaction log arc then applied through the target date to determine the
current contents
Construct a procedural sequence diagram to show the calculation of the
content?, of a portfolio as of some dale. Limit the detail in your diagram lo
four message flows.
(c) Differentiate between (Any Two) 10
a; Package & subsystem
b) Activity diagram & State diagram
c) Sequence Diagram & Collaboration Diagram
B.E. EXAMINATION APRIL-MAY, 2012
INFORMATION TECHNOLOGY
4IT453 NETWORK & INFORMATION SECURITY

Duration: 3 Hrs Max. Marks: 100


Min. Marks: 35
Note: All question carry equal marks. Attempt any two parts from every question.

Q-l (a) What are the key principles of security? Explain each one in detail? 10
(b) Explain Play fair cipher in detail? Encrypt the sentence "Gold is hiding in tree
stump" using play fair cipher. Key is "Example". 10
(c) What is Mono alphabetic cipher? How it is different from Caesar cipher? How it
Can be cracked? Explain. 10

Q-2 (a) Explain the process of encryption and decryption in Cipher Block Chaining
(CBC) mode in detail? 10
(b) Explain the working of Deffie-Hellman key exchange in detail? 10
(c) Explain the process of Expansion permutation and S-Box Substitution in Data
Encryption Standard (DBS) in detail? 10

Q-3 (a) Explain the working of RSA algorithm in detail? Generate keys using p = 7, q =
11 using RSA algorithm? 10
(b) Explain the working of Digital envelope in detail? Explain the best of both
worlds achieved by this scheme? 10
(c) Explain Digital Certificate Creation steps in detail? 10
-..

Q-4 (a) Explain the working of Secure Socket Layer (SSL) in detail? 10
(b) Explain the working of Pretty Enhanced Mail (PEM) in detail? Also explain the
concept of Base-64 encoding? 10
(c) Explain the working of Kerberos in detail? 10

Q-5 (a) Explain the working of IP Security (IPSec) in detail? 10


(b) Explain IP Spoofing attack and DNS Spoofing attack in detail? 10
(c) Explain the concept and working of smart card in detail? 10
12-B-280
IV
1
BE EXAMINATION April-May 2012
INFORMATION TECHNOLOGY
4IT454
WIRELESS PROTOCOL & MOBILE COMPUTING

Duration: 3hrs. Max, Marks: 100


Min. Marks:35
Note: Attempt ail questions. All questions have internal choice
Q.I (a) Compare wireless networks with wired networks on the following (6)
Interference , Bandwidth , Delay, Security and Noise immunity
OR
Define the applications of following
(i) Push and Pull service
(ii) Follow on and location aware services
(b) Explain slow and fast frequency hopping spread spectrum, Consider an MFSK (7)
scheme with fc~ 250 Khz and ^=25 Khz and M~8, make a frequency
assignment for each of the eight possible 3-bit data combinations.
OR
Assume an initial state of 10000 in the following Linear Feedback Shift
Register (LFSR) circuit, show the generation of m-sequence

§71 4 Sol—i>0(7fplH"
* r—j—- • —j

(c) Consider a CDMA system in which users A and B have the codes (-1 1 -1 (7)
1 - 1 1 - 1 1) and (-1 - 1 1 1 - 1 - 1 1 1) respectively
(i) Show the output at the receiver if A transmits a data bit 1 and B transmits
data bit 0. Assume that the received power from both A and B are same,
(ii) Show the output at the receiver if A transmits a data bit 1 and B also
transmits bit 1, Assume the received power from B is twice the received
power from A.
OR
How does spread spectrum technique work? Draw FHSS signal for frequency
usage pattern in various time slots given as:
(fl, £2, fl, f4, f5, f6, f7, f8) -* (3,6,7,8,2,1,4,5)

Q2 (a) A cellular system uses FDMA with a spectral allocation of 10.5 Mhz in (6)
uplink and 12.5 Mhz in down link directions, a guard band at the edge of
allocated spectrum of 10 Khz and a channel bandwidth of 30Khz. Find the
number of available uplink and down link channels in the system .
OR
A cellular system of total bandwidth of 33 MHz and uses rwo 25KHz simplex
channels to provide full duplex voice and control channels. What is the
number of channels available per cell for a frequency reuse factor of (i) 4
cells and (ii) 12 cells.
(b) Describe the GSM system architecture and its TDMA and FDMA frame (7)
structure. Also find TDMA frame time interval.

Coiitd.
OR
Describe various control channels and security mechanisms adopted in GSM.

(C) Model MACA protocol as state machine. How can MACA still fail in case of (7)
hidden/exposed terminals?
OR
Describe exchange of messages and conditions of intra MSC handover
process of GSM.

Q.3 (a) What is the use of following in IEEE 802.11 protocol? (6)
(i) D1FS,SIFS and PIFS (ii) NAV (iii) RTC/CTS
OR
What are the steps involved in discovering that a mobile node has moved into
another network and its registration process into new network.?

(b) Answer the following questions for a receiver, which receives MAC frame (7)
with frame control field value as 20FD (Hex). (Also justify your answer)
i) For how much time medium is requested by sender?
ii) What source and destination addresses are valid?
iii) Whether frames to be processed strictly in the order?
iv) Whether data encryption is required?
v) Whether received frame is the last frame?
vi) Is fragmentation supported?
vii) Is power control supported?
OR
Explain the power control mechanism of IEEE 802.11 protocol and role of
TIM DTTM frames in it.

(c) Why traditional IP protocol is not suitable for mobile networks?. Explain (7)
three methods of mobility support in IP.
OR
What is triangular routing problem of mobile IP? What additional messages
are required to optimize mobile IP?

Q.4 Attempt any two parts


(a) (i) Explain slow start behavior of TCP protocol. Explain its effect on (10)
mobility support in TCP .
(ii) Indirect TCP does not support for end-to-end semantics? Why.
(b) (i) Explain WAP architecture describing functions of each layer. (10)
(ii) Describe terms used in J2ME : MIDP,CLDC, CDC, Manifest file
and Midlet
(c) Describe CODA file system for mobile operations and explain how it (10)
maintains consistency?

Q.5 Attempt any two parts


(a) What are the steps involved and messages generated in call establishment (10)
process using mobile terminated call (MTC) approach in a mobile
telecommunication system?
(b) Discuss design issues in transaction processing of mobile databases. Explain (10)
any one mobile transaction model.
(c) How different types of queries classified in mobile databases? Give examples, (10)
12B286
B.E. Examination APRIL-MAY 2012
CO4204 Computer Engineering
ARTIFICIAL INTELLIGENCE
\: 3Hrs.

Min Marks: 35
Note: Attempt any 5 questions. All parts of a question must be solved in sequence. Make suitable
assumption wherever necessary.
Ql (a) What are the domains of Artificial intelligence? Explain. 10
(b) What are the important AI techniques? 1Q
What is production system? What are the different characteristics of a production system?

Q2(a) What is clause? What is Horn clause? 10


Convert the following in predicate notation:-
(1 )There is unique capital of a country.
(2)A11 all-rounders are good batsmen,
(b) Consider the following sentences: 10
• John likes all kinds of food.
• Apples are food.
• Chicken is food. ^
• Anything anyone eats and isn't killed by is food.
• Bill eats peanuts and is still alive.
• Sue eats everything Bill eats.
(l)Translate these sentences into formulas in predicate logic.
(2)Convert the formulas of part (1) into clause form.
(3)Prove that John likes peanuts using resolution.

Q3(a) What is dynamic programming principle? How is it involved in tree search as an ijtifclligent technique? 10
(b) Discuss min-max algorithm with example. 10
Differentiate between static valuation function and heuristic function.

Q4(a) Discuss between rule based and model based Expert system. 10
(b) What are the different stages of NLP? 10

Q5 (a) Define rules in PROLOG. Explain conjunction and disjunction rules with examples. 10
(b ) What is list unification? Perform following operation on list 10
(l)Reverse a list.
(2)Find an element in a list.

Q6(a) Explain the different approaches of the knowledge representation. Distinguish between inheritable knowledge 10
and inferential knowledge.
(b) What is fuzzy set and fuzzy logic? Explain how fuzzy theory can be used to develop a fuzzy control system? ]0
Draw the block diagram of fuzzy controller.
i
Q7 Write short notes on (any four) 20
(A) Problem characteristics.
(B) Matching
(C) Strong methods
(D) Resolution in predicate logic and prepositional logic
(E) Problem Reduction method for search
«»-'*•
B.E IV EXAMINATION APRIL-MAY' 2012 12-B-287
COMPUTER ENGINEERING
CO4254
INTERNET COMPUTING
Duration: 3 hrs. Max Marks: 100
Min Pass Marks:35
Note: - Attempt any five questions. \l questions carry equal marks.

Make suitable assumptions wherever necessary.

Q. 1 (a) What are advantages of representing data in XML format? 10


(b) "A XML document must be well formed and valid both". Explain? 10

Q.2(a) Explain the differences between XML Schema and DTD? 10


(b) What do you mean by Element wildcards in Xml Schema? Describe the several values of 10
namespace attribute?

Q.3(a) Develop an XML schema for the following requirement:- 10


There are exactly two person elements in the document.
The person name starts with an upper case alphabetic character and may optionally be followed by
no more than nine lower alphabetic characters.
The age attribute is restricted by range 16-30.
The id attribute has exactly five characters with first two as alphabets and remaining three as
numbers.
The email of the person must contain @ and . characters.
(b) Use XSLT to display the following output:- 10
Student Detail:
RollNO:abc0004
Name: ABC
Department: CS
Year: IV

Q.4(a) Write the differences between Document object Model and Simple API for XML?
(b) Consider the XML file below:-
<?xml version="1.0" ?>
<train>
<car type="Engine">
<color>Black</color> <weight>512 tons</weightxlength>60 feet</length>
<occupants>3</occupants>
</car>
<car type="Baggage">
<color>Green</colorxweight>80 tons</weightxlength>40 feet</length>
<occupants>0</octupants>
</car> '
:</train>
Write a program using SAX to print the following:-
Running train reader
Start of the train
The color of the Engine car is Black
The color of the Baggage car is Green
End of the train.
PTO
Q.5(a) Explain the following-sibling axis with example? 10
(b) Why SOAP is important for application development? Write the syntax rule for SOA? 10
Q6 (a) What are entities? What are there primary types? Give an example of each primary type? 10
(b) Explain the concept of ID and IDREF with an example? 10

Q7 (a) Write short notes on the following:- 20


(a) JAVA RMI *
(b) WSI^L
(c)XPATH
(d)Element declaration and Attribute declaration

You might also like