0% found this document useful (0 votes)
240 views15 pages

IET DAVV 2014 Com

The document contains information about an examination for a computer engineering course on machine learning. It provides 5 questions, each with 3 parts (a), (b), and (c). Students must attempt any 2 parts from each question. The questions cover topics like machine learning applications, market basket analysis, rote learning, and the candidate elimination learning algorithm. An example is provided to trace the candidate elimination algorithm using examples of Japanese economy cars.

Uploaded by

jainam dude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
240 views15 pages

IET DAVV 2014 Com

The document contains information about an examination for a computer engineering course on machine learning. It provides 5 questions, each with 3 parts (a), (b), and (c). Students must attempt any 2 parts from each question. The questions cover topics like machine learning applications, market basket analysis, rote learning, and the candidate elimination learning algorithm. An example is provided to trace the candidate elimination algorithm using examples of Japanese economy cars.

Uploaded by

jainam dude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

1239

BE EXAMINATION April-May 2014


Computer Engineering/Information Technology
4CO202/4IT402
ARTIFICIAL INTELLIGENCE
Duration: 3hrs. MaxNfarks: 100
Min Pass Marks: 35
Note: All questions are compulsory. Each question has three parts (a), (b) and (c). Attempt any two parts from
each question. All parts of the questions must be solved in sequence. Make suitable assumption wherever
necessary.

Ql(a) What is production system? What are the various classes of production systems? Explain their 10
properties.
(b) What are the different types of problem characteristics. For each of the following types of 10
problems, mention the problem characteristics and describe a good heuristic function
(i) Blocks world (ii) Theorem proving
(c) Define AJ Technique. Formulate the production rule and draw the state space for water-jug 10
problem. Given two jugs of 4 litres and 3 litres. Both the jugs are not having any measuring
marks on them. A pump can be used to fill up the jugs. How can you get two litres of water
into 4 litres jug.

Q2(a) Explain the different approaches of the knowledge representation. Distinguish between 10
inheritable knowledge and inferential knowledge.
(b) What is clause? What is Horn clause? 10
Convert the following in predicate notation:-
(1) There is unique capital of a country.
(2) All all-rounders are good batsmen.
(c) Discuss hill climbing search method. Discuss local maxima, pfateau and ridge. Explain how 10
these can be overcome

Q3 (a) What are the steps for designing of a fuzzy control system? Suggest a design for a brake 10
system of a car on the inputs, outputs, fuzzy sets and rules.
(b) (1) Give the relative advantages and disadvantages of expert system based on decision tree 10
over an expert system based on production rule.
(2) Draw the block diagram of a fuzzy control system with each unit defined precisely.
(c) (1) Consider a statement "comfortable temperature." Assume the universe of discourse, in 10
degree Celsius, to be {-20,-iO, 0, 10, 20, 30, 40, 50}. Give the fuzzy set to describe the
statement
(i) From a polar bear's point of view
(ii) From a camel's point of view
(iii)From your point of view.
(2) Describe Modus ponens, chain and inference rules with suitable example.
4 (a) Express the following sentences as conceptual dependency structure. 10
(i) Bill is a programmer,
(ii) Sam gave Mary a box of candy,
(ii) John begged Mary for a pencil.
(b) Explain the alpha-beta pruning search procedure. In this procedure which nodes would not 10
need to be examined? Explain with example.
(c) Construct a script for going to a movie from the viewpoint of the movie goer. With four 10
scenes and sequences of events in the each scene.

)5(a) What are the problems in natural language understanding? Give all steps involved in the 10
natural language processing.

(b) (1) Explain the terms-heuristics, nonalgorithm, symbolic computation, static evaluation 10
function.
(2) What are the domains of Artificial intelligence? Explain.
(c) Write short note on neural network. Give a simple mathematical model for neuron. 10
1241
IV B.E. EXAMINATION, MAY 2014
COMPUTER ENGINEERING
4CO204
WIRELESS PROTOCOL & MOBILE COMPUTING

Duration: 3 Hours Maximum Marks: 100


Min pass Marks: 35
Note:
(i) There are FIVE questions. Each question carries three parts. Attempt
any TWO parts in each question. Assume suitable data wherever
required.
(ii) All parts of the question must be done at same place.
(iii) Answers are required to the point and must be brief.

Q.1 (a) What are the pros and cons and limitations of wireless communication 10
mobile system as compared to wired communication system?
(b) What is Inter-symbol interference? Give a mechanism that is used for 10
overcoming problems arising due to inter-symbol interference.
(c) Why spread spectrum technology used in WLAN? Explain direct sequence 10
spread spectrum and Frequency hopping spread spectrum with a neat
block diagram.
Q.2 (a) If a signal to interference ratio of 15 db is required for satisfactory forward 10
channel performance of a cellular system. What is the frequency reuse
factor and cluster size that should be used for maximum capacity if the
path loss exponent is (a) n=4(b) n=3? Assume that there are six co-
channel cells in the first tier and all of them are at same distance from the
mobile. Use suitable Approximation,
(b) Explain by drawing a neat diagram of system architecture of the GSM 10
wireless system? Explain the function of each components
(c)i Explain the basic concept of multiple access schemes? Explain with brief 5
comparison FDMA, TDMA with suitable example?
ii What kind of multiple Access technology is suitable in a military adhoc 5
network environment? Explain.
Q.3 (a)i Explain the design goals of a MAC protocol for adNoc wireless network. 5
ii Why there is requirement of a back off timer in CSMA/CA mechanism? 5
Explain.
(b)i What are the three intervals defined in DCF mechanism in !EEE802,11? 5
Define DFWMAC-DCF MAC protocol.
ii What is the purpose of using RTS/CTS mechanism? Explain. 5
(c)i How does slotted Aloha improve throughput compared with pure Aloha? 5
Explain.
ii What is meant by the vulnerable period of a transmission? Explain. 5
Q.4 (a) What are the tasks performed by following components in mobile IP based 10
network:-
1 Foreign Agent
2 Care of Address
3 Home agent
4 Correspondent node
(b)i Explain J2ME architecture with suitable example in brief. 5
it Define following term 5
1 CLDC
2 CDC
3 Data broadcasting
(c) Briefly discuss the main goals of WAP? Explain the WAP model and the 10
WAP protocol stack? What is the functionality of the session layer in the
WAP stack? Explain.
Q.5 (a) Explain the Architecture of mobile database system. What is the main idea 10
behind deploying such system? Discuss its application with suitable
example in brief?
(b) Explain "ACID" properties in mobile transaction system? What are the 10
mobile transaction recovery protocols?
(c)i Explain one location dependent mobile transaction model. 5
ii How different types of queries are processed in mobile databases? 5
Explain.
***************************
Rol! No.

1242
I IV EXAMINATION APR-MAY, 2014
COMPUTER ENGINEERING
4C0205
MACHINE LEARNING
Duration: 3 hrs. Max Marks: 100
Min Pass Marks: 35

Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. All question carry equal marks.

UN1T-I
1 a. Define Machine Learning? What are the applications of machine Learning? 10
b(i). What is market basket analysis? 05
(ii). What is the Rote Learning? 05
c. Write down the Candidate elimination-learning algorithm. Consider the 10
following sequence of positive and negative training examples describing the
concept "Japanese Economy Car." Each training example describes an order of
car, with each car described by their Country of origin, Manufacturer (Honda
Toyota, Chrysler), Color (Blue, Green ,Red , White), Decade, and
Typc(Economy, Sports).

Manufacturer IColor Decade(|Type [Example Type


Japan j Economy Positive
Japan Sports Negative
Japan ^Toyota Blue JI990 Economy Positive
USAJjChrysler Rfi£~Il980 IjEconomy'[Negative
Japan -Honda |Whitei!1980 'Economy Positive

Provide a hand trace of Candidate Elimination Algorithm learning from the


above training examples and hypothesis language. In particular, show the
specific and general boundaries of the version space after it has processed the
first training example, then the second training example, etc.
UNIT-II
What is concept Learning? 05
Why prefer short hypotheses? 05
Which attribute is the best Classifier in the decision tree? 05
(ii) How many steps involves in rule post -pruning. 05
c. Describe the ID3 algorithm with an example. 10
P.T.O.
UNIT-HI
3 a. What is the mistake bound for the Find-S Algorithm? 10
b(i). How can define the sample error and true error? 05
(ii) Explain the PAC Learning? 05
c. Define Vapnik -Chervonenkis Dimension, And Illustrate Example. 10
UNIT-IV
4 a. What is Word sense Disambiguation? Write down the application of WSD. 10
b(i). What is Hidden markov model? Write down the application of HMMs. 05
(ii) Write regular expression for the following language: The set of all Lowercase 05
alphabetic strings ending in a b.
c. What is the Support Vector Machine? And Also Explain maximum margin 10
classifier?
UMT-V
5 a. Explain the operators of Genetic Algorithm? i0
b. How many selection methods to select the best chromosomes? Explain two, 10
c. Define the following: 10
(i) Parameter of Genetic Algorithm
(ii) Permutation Encoding of Chromosome
1243
IV B. E. Examination April-May'2014
Computer Engineering
4CO252: Enterprise Resource Planning
Duration: 3 Hrs. Maximum Marks: 100
Minimum Pass Marks: 35
Note: Attempt any two parts of each question. Each question carries equal marks. Make suitable
assumptions if necessary.
Q.I (a) "ERP is not a technological project but a strategic use of Information Technology". 10
Write your views on this statement.
(b) Explain how Enterprise Application Integration is an important concept that leads to 10
ERP implementation in an organization.
(c) Draw and explain architecture of a generic ERP System. 10

Q. 2 (a) Differentiate between following with suitable examples - 10


• BPR and Process Simplification
• BPR and Continuous Improvement
(b) How Big Data and Cloud Computing based technologies can play an important role in 10
ERP use? Explain with example.
(c) What are the security threats can be possible in an ERP system? How these systems can 10
be made secure against these threats? Explain.

Q. 3 (a) Gap Analysis is an important step towards understanding the needs and usefulness of 10
ERP system. Why? Explain.
(b) '''Selection of an ERP system is a challenging task"- justify this statement in view of 10
project organization and, analyzing & documenting functional requirements.
(c) Who are the people involved in ERP implementation? Explain nature and composition of 10
ERP implementation team.

Q. 4 (a) What is Lot Size? What is the role of Lot Size in cost of production? Explain any three 10
Lot Size policies with suitable example.
(b) By explaining the steps of MRP also explain the inputs and outputs of MRP System. 10
(c) Local road construction company needs to develop engineering specifications prior to 10
doing any pre-surfacing preparation. The company has been awarded the bid on four
projects. They have one engineer. It takes 4 hours per km to develop the engineering
specifications. The first project is 30 km long and must be started by March 151'1 to
complete on schedule. The second project is 20 km long and must be started by April I*.
The third project is 5 km long and must be started bj;May 1st. The fourth project is 15
km long and must be started by May 23rd. It is now February 15'1', The engineer works a
40 hours week and is very experienced so he operates at 100% efficiency. Assume one
project can't be started until the previous project is completed. Does the engineer have
enough time to accomplish the specifications on time? Assume 80% utili/ation.
Also, explain importance of Capacity Requirement Planning in ERP.

Q. 5 (a) Compare ERP system of Microsoft and ORACLE on following: 10


Evolution, Business Benefits, Capabilities, Integration with external applications and
Cloud Based Services
(b) Explain the special features of SAP ERP Solutions that helps organizations to achieve 10
operational excellence with competitive advantage.
(c) How technological and social parameters affects development of ERP system? Explain. 10
Also explain, impact of these factors on ERP systems being developed for Small and
Medium Enterprises in Indian scenario?
B.E. EXAMINATION APRIL, 2014 1244
COMPUTER ENGINEERING
NETWORK & INFORMATION SECURITY
Duration; 3 Hrs Max. Marks: 100
Min. Marks: 35
Note: All question carry equal marks. Attempt any two parts from every question.
Q-l (a) What are the key principles of security? Explain each one in detail? 10
(b) Explain Play Fair cipher in detail? 10
(c) Explain various substitution techniques used in detail? Also explain various
problem with these techniques in detail? 10

Q-2 fa) Explain the process of encryption and decryption in Electronic Code Book
(HCB) mode in detail? 10
(b) Explain the working of man in the middle attack in Deffie-Hellman key.
exchange by using suitable example in detail? 10
(c) Explain the working of Data Encryption Standard (DES) in detail? 10

Q-3 (a) Explain the working of RSA algorithm in detail? Generate keys using p - 7, q
13 using RSA algorithm? 10
(b) Explain the working of Digital envelope in detail? Explain how all security
objectives are achieved by this scheme? 10
(c) Explain the difference between Secure socket layer and Secure Hyper Text
Transfer protocol (SHTTP) in detail? 10
*

Q-4 (a) Explain the working of Secure Socket Layer (SSL) in detail? 10
(b) Explain the working of Pretty Good Privacy (PGP) in detail? 10
(c) Explain the working of password based authentication system in detail? 10

Q-5 (a) Explain the working of packet filter firewalls in detail? 10


(b) Explain Denial of service (DOS) attack in detail? 10
(c) Explain the concept and working of digital Signature in detail? 10
Roll No 1245

B.E IV EXAMINATION APRIL-MAY'2014


COMPUTER ENGINEERING
4CO254
INTERNET COMPUTING

Duration: 3 lirs. Max Mark.s:100


Min Pass Marks:35
Note:- Attempt all five questions.
Attempt any two parts from each question.
Make suitable assumptions wherever necessary.
Q1 (a) What are advantages of representing data in XML format? 10
(b) Explain the concept of a namespace. For what purpose do we use 10
namespace?
(c) "A XML document must be well formed and valid both'1. Explain 10

Q2(a) What are entities? Explain their each classification with example? 10
(b) Develop an XML schema for the following requirement:- 10
There are exactly two person elements in the document.
The person name starts with an upper case alphabetic character and may
optionally be followed by no more than nine lower alphabetic characters.
The age attribute is restricted by range 16-30.
The id attribute has exactly five characters with first two as alphabets and
remaining three as numbers
The email of the person must contain @ and . characters.
(c) Create a DTD and an XML document for a simple music collection. 10
(i) Use the artist name, the name of the work, the genre of the work and
any other details
(ii) Define elements and attributes
(Ui)Create a inline DTD . »
(iv)Create the prologue for the document
(v) Create a well-formed XML document

Q.3(a) Write an example giving demonstration of XML to HTML


transformation using XSLT programming? 10
(b) What is XPath? Explain Why XSLT has no side effects? 10
(c) Explain the following-sibling axis with example? 10

Q.4(a) Explain the differences between Document object Model and Simple API 10
for XML?
(b) Consider the following XML file:- (Use DOM as the data retrieval 10
technique)
<Bookstore>
<Bookid="xm!OOOr>
<Title>ABC</Title> PTO
<Author>XYZ</Aulhor>
<Price>lOO</Price>
<Editioti>2006<Edition>
</Book>
<Book iiK'xml0002">
<Title>Learning XML</TitIe>
<Author>ABC</Author>
<Price>200</Price>
<Edition>2007</Edition>
</Book>
</Bookstore>

(i)Retrieve all the <Title> and <Author> tag text content.


(ii)RepIace the value of id attribute of the first <Book> tag to "xml0004".
(c) Write down the error handler Interface in Simple API. 10

Q.5(a) Explain Simple Object Access Protocol (SOAP) ? 10


(b) "Differentiate between the following:- 10
(i) DCOM and COM
(ii) XML Schema and DTD
(c) Write short notes on the following:-
(a)UDDI (b) WSDL 5+5
Roll No,
1246
BE. IV EXAMINATION APRIL-MAY, 2014
COMPUTER ENGINNERING/IT
4CO258/4IT458
Information Retrieval & Extraction
Duration: 3 hrs. Max Marks: 100
Min Pass. Marks: 35

Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. AH question carry equal marks.
Make suitable assumptions wherever necessary.
UNIT-I
la(i). What are the Comparison between Databases and Information Retrieval? 05
(ii). What are the performance issues for Information retrieval? 05
b. Consider these documents: 10
Docl documents contain geospatial information
Doc2 extraction and use of geospatial information
Doc3 extraction geospatia] references from documents
(i)Draw the inverted index representation for this collection.
(ii)Term Document incidence matrix for this Collection,
c. Write the algorithm for the intersection of two postings lists . 10
UNIT-H
2a. What are the data structures that help the search for terms in the vocabulary in 10
an inverted index ?
b. What are the stop words? And what is the normalization? 10
c. Writedown the edit distance algorithm between two strings.And compute the 10
edit distance between intention and execution.
UNIT-I1I
3 a. What are the differences between Blocked sort based indexing and Single pass 10
in memory indexing?
b. What is index compression? And in which compression technique can we 10
achieved better compression ratio.
c. Bxplain dictionary compression in details. 10
UNIT-IV
4 a. Consider the table of term frequencies for 3 documents denoted Docl, Doc2, 10
Doc3 in table below. Compute the tf-idf weights for the terms car, auto,
insurance, best, for each document, using the idf values in the tabls below .

idf Term frequency values(tf)


Docl Doc2 Doc3
Car 1.65 27 4 24
Auto 2.08 3 33 0
Insurance 1.62 0 33 29
best 1.5 14 0 17
b. An iR system returns 8 relevant documents, and 10 nonrelevant documents. 10
There are a total of 20 relevant documents in the collection. What is the
precision of the system on this search, and what is its recall? P.T.O
c. Define following terms: Relevance, Precision-Recall curve, Parametric index. 10
UNIT-V
5a(i). Wht-n docs relevance feedback work? 05
(ii). Whiit are the web characteristics? 05
b. What are the applications of clustering in information retrieval? 10
c. Describes the difference between Retrospective and Prospective searches 10
with example?
.' i ..
(C) What is '.'' ,'Y/.Si>. tin. t-/;.-j/..'<.-s / JC.-.-.A

Viriualizaiion.

Q. 4 (a) What is V i r t u a l Machine theft? lixplain. Also, explain UyporjiK'kin^ and !)al;i I.eakaiie. id
(b) 1" A plain ihe measures possible ibr securii\f Ifypervtsor and V i n u a ! Muclrinc in Cluisd ;o
Computing. AKo, explain ihe concept of Demilitarized /.one.
(c) l-.xplain the compliance types and need in Clout! Computing. Also. c.\pi:iin :>ieps involved i u
in

Q. 5 (it) Jixplaiu (he icchniqucs to protect compute infraslructure, t\n pun kliim hii'h .ivaiiiihili!) o/ 10
V i r t u a l Machines and Iheirdala in Virtnalized Data (.'enirc.
(h) What is ilu- importance of Recovery Point Obje^iives ( K i ' O j und K a v \ o r \ i n i e it)
Objcclivt'S(UTO) in (Justness Continuity? K x p U u n .
(c) l::laborate approaches for backup in a Virtualized Data Centiv en\. i()
*» '7

I V B. K. Examination A|>ril-Miiy'20U
Computer Knginccring/ Information
4CO255AH 1455: Cloud C o m p u t i n g

Duration: 3 Bra. Maximum Marks :1


Miliiltlliiii l':iss Murks:
Noie: Attempt all five questions. Answer any two pails of each question. !-;ich q u e s t i o n curries equal
marks. Make suitable assumptions i f necvs.sary. W r i t e ;ws \\er(vi in i h ^ ordv-i ui\ii:c ,! i*.n:, ;i.-,kc-,!

Q. ! (a) Kxplain technological foundations which has made Cloud C o n i p m i r m M h i q h H o n s ;0


(b) L x p l u i n with examples various fundamental features u i ' l h e c c o i u n n i c .UK! business niodei At
heliiiid Cloud Computing.
(c) Cloud Computing now offers Everything a\ Service (XaaS)" l : x p k i i n XaaS. !n

Q. 2 (:\) What is Cloud Computing Architecture? Lxplain eoni|Hineur. o: ( . ' l o u . l ( \ n n p u t i i i L 1 If


Architecture.
(b) V'.xpkiin Cioud Computing Deployment Models and also compare ihesi. 1 nu^icis ^n Lhc ;i(
basis of management, ownership and deployment location.
U') I ' x p l a i n f o l l o w i n g in shori; :if
* I lost I^us Adapter
* NeUvork Attached Storage
* 1 1\r
* RAID

Q. 3 (a) Compare life cycle of V i r U i a l M a c h i n e with thai of Real Machine. Wi;aL is ihe adtiilioivi! it)
siaie thai a Virtual Machine has and why?
([>) J low Block Level Storage VirtualUatton enables ahslraclion ;n Storatu* Area N e i w v i r k At
(SAN)? 1 xpkiin.
(e) What is Desktop Virtuali/auon? Also, explain the techniques dim enables Desktop 111
Virtuatization.

Q. 4 («) What is V i r t u a l Machine theft? Hxplain. Also, explain IJyperjiickiiig and !)aia Leakage. id
(b) Kxplain the measures possible for security of I lypcrvisor and V i r t u a l M n d r i n c in Cloisd 10
Compuiing. Als>\n the concept ofDemililiiri^ed /one.
(c) l - x p l a i n ihe compliance types and need in Cloud Computing. Also, e x p l a i n sieps involvuti 10
in Risk Assessment.

Q. 5 (a) Kxplain the techniques to protect compute infrastructure, tor pun idimj. isii-h u v a i i a h i l i i ; oi 10
V i r t u a l Machines and (heir data in Virluali/ed Data Centre.
(bj What is the importance of Recovery Point Objectives i K l ' U j iiin.1 K o . - . > \ c i \ i n i c i t )
Objectives (U'l'O) in Business Continuity 1 .' H x p k i i n .
(c) l. : laborale approaches for backup in a Virtuali^ed Data Centre em i r u n m c i H . iO
Roll No
1248
BE. IV EXAMINATION APRIL-MAY, 2014
COMPUTER ENGINEERING
CO4254
INTERNET COMPUTING
Duration: 3 Mrs. Max Marks: 100
Min Marks: 35
Note: Attempt any five Questions.Make suitable assumptions wherever necessary.

1 a. What is the difference between HTML and XML? 10


b. How can you say that XML document is valid or well formed? 10
2 a. Create a DTD and an XML document for a simple music collection. 10
(i) Use the artist name, the name of the work, the genre of the work and any
other details
(ii) Define elements and attributes
(iii)Create a inline DTD .
(iv)Create the prologue for the document
(v) Create a well-formed XML document
b. What are entities? How do you classify them? Explain each classification 10
with example?
3 a. Use XSLT to display the following output 10
Person Detail:
abc0004
Name: ABC
Department: XYZ
Salary: 10000
Age:28
b. What are data restrictions? And write the restrictions on series of values and 10
restrictions on whitespace characters.
4(a). Explain the <xsl:copy> and <xsl:copy-of> Element. 10
(b). List name of axis that exist in XPath. Explain any Five. 10
5 a. What are drawbacks of Simple API for XML? 10
b. What do you mean by Element wildcards in Xml Schema? Describe the 10
several values of namespace attribute.
6 a. Differentiate between the following:- 10
(i) DCOM and COM
(ii) XML Schema and DTD
b. Explain Simple Object Access Protocol (SOAP)? 10
7. Write short notes on following : (Any Four) 20
(a) WSDL
(b) JAVA RM1
(c) Element declaration and Attribute declaration .
(d) UDDI

You might also like