IET DAVV 2014 Com
IET DAVV 2014 Com
Ql(a) What is production system? What are the various classes of production systems? Explain their 10
properties.
(b) What are the different types of problem characteristics. For each of the following types of 10
problems, mention the problem characteristics and describe a good heuristic function
(i) Blocks world (ii) Theorem proving
(c) Define AJ Technique. Formulate the production rule and draw the state space for water-jug 10
problem. Given two jugs of 4 litres and 3 litres. Both the jugs are not having any measuring
marks on them. A pump can be used to fill up the jugs. How can you get two litres of water
into 4 litres jug.
Q2(a) Explain the different approaches of the knowledge representation. Distinguish between 10
inheritable knowledge and inferential knowledge.
(b) What is clause? What is Horn clause? 10
Convert the following in predicate notation:-
(1) There is unique capital of a country.
(2) All all-rounders are good batsmen.
(c) Discuss hill climbing search method. Discuss local maxima, pfateau and ridge. Explain how 10
these can be overcome
Q3 (a) What are the steps for designing of a fuzzy control system? Suggest a design for a brake 10
system of a car on the inputs, outputs, fuzzy sets and rules.
(b) (1) Give the relative advantages and disadvantages of expert system based on decision tree 10
over an expert system based on production rule.
(2) Draw the block diagram of a fuzzy control system with each unit defined precisely.
(c) (1) Consider a statement "comfortable temperature." Assume the universe of discourse, in 10
degree Celsius, to be {-20,-iO, 0, 10, 20, 30, 40, 50}. Give the fuzzy set to describe the
statement
(i) From a polar bear's point of view
(ii) From a camel's point of view
(iii)From your point of view.
(2) Describe Modus ponens, chain and inference rules with suitable example.
4 (a) Express the following sentences as conceptual dependency structure. 10
(i) Bill is a programmer,
(ii) Sam gave Mary a box of candy,
(ii) John begged Mary for a pencil.
(b) Explain the alpha-beta pruning search procedure. In this procedure which nodes would not 10
need to be examined? Explain with example.
(c) Construct a script for going to a movie from the viewpoint of the movie goer. With four 10
scenes and sequences of events in the each scene.
)5(a) What are the problems in natural language understanding? Give all steps involved in the 10
natural language processing.
(b) (1) Explain the terms-heuristics, nonalgorithm, symbolic computation, static evaluation 10
function.
(2) What are the domains of Artificial intelligence? Explain.
(c) Write short note on neural network. Give a simple mathematical model for neuron. 10
1241
IV B.E. EXAMINATION, MAY 2014
COMPUTER ENGINEERING
4CO204
WIRELESS PROTOCOL & MOBILE COMPUTING
Q.1 (a) What are the pros and cons and limitations of wireless communication 10
mobile system as compared to wired communication system?
(b) What is Inter-symbol interference? Give a mechanism that is used for 10
overcoming problems arising due to inter-symbol interference.
(c) Why spread spectrum technology used in WLAN? Explain direct sequence 10
spread spectrum and Frequency hopping spread spectrum with a neat
block diagram.
Q.2 (a) If a signal to interference ratio of 15 db is required for satisfactory forward 10
channel performance of a cellular system. What is the frequency reuse
factor and cluster size that should be used for maximum capacity if the
path loss exponent is (a) n=4(b) n=3? Assume that there are six co-
channel cells in the first tier and all of them are at same distance from the
mobile. Use suitable Approximation,
(b) Explain by drawing a neat diagram of system architecture of the GSM 10
wireless system? Explain the function of each components
(c)i Explain the basic concept of multiple access schemes? Explain with brief 5
comparison FDMA, TDMA with suitable example?
ii What kind of multiple Access technology is suitable in a military adhoc 5
network environment? Explain.
Q.3 (a)i Explain the design goals of a MAC protocol for adNoc wireless network. 5
ii Why there is requirement of a back off timer in CSMA/CA mechanism? 5
Explain.
(b)i What are the three intervals defined in DCF mechanism in !EEE802,11? 5
Define DFWMAC-DCF MAC protocol.
ii What is the purpose of using RTS/CTS mechanism? Explain. 5
(c)i How does slotted Aloha improve throughput compared with pure Aloha? 5
Explain.
ii What is meant by the vulnerable period of a transmission? Explain. 5
Q.4 (a) What are the tasks performed by following components in mobile IP based 10
network:-
1 Foreign Agent
2 Care of Address
3 Home agent
4 Correspondent node
(b)i Explain J2ME architecture with suitable example in brief. 5
it Define following term 5
1 CLDC
2 CDC
3 Data broadcasting
(c) Briefly discuss the main goals of WAP? Explain the WAP model and the 10
WAP protocol stack? What is the functionality of the session layer in the
WAP stack? Explain.
Q.5 (a) Explain the Architecture of mobile database system. What is the main idea 10
behind deploying such system? Discuss its application with suitable
example in brief?
(b) Explain "ACID" properties in mobile transaction system? What are the 10
mobile transaction recovery protocols?
(c)i Explain one location dependent mobile transaction model. 5
ii How different types of queries are processed in mobile databases? 5
Explain.
***************************
Rol! No.
1242
I IV EXAMINATION APR-MAY, 2014
COMPUTER ENGINEERING
4C0205
MACHINE LEARNING
Duration: 3 hrs. Max Marks: 100
Min Pass Marks: 35
Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. All question carry equal marks.
UN1T-I
1 a. Define Machine Learning? What are the applications of machine Learning? 10
b(i). What is market basket analysis? 05
(ii). What is the Rote Learning? 05
c. Write down the Candidate elimination-learning algorithm. Consider the 10
following sequence of positive and negative training examples describing the
concept "Japanese Economy Car." Each training example describes an order of
car, with each car described by their Country of origin, Manufacturer (Honda
Toyota, Chrysler), Color (Blue, Green ,Red , White), Decade, and
Typc(Economy, Sports).
Q. 3 (a) Gap Analysis is an important step towards understanding the needs and usefulness of 10
ERP system. Why? Explain.
(b) '''Selection of an ERP system is a challenging task"- justify this statement in view of 10
project organization and, analyzing & documenting functional requirements.
(c) Who are the people involved in ERP implementation? Explain nature and composition of 10
ERP implementation team.
Q. 4 (a) What is Lot Size? What is the role of Lot Size in cost of production? Explain any three 10
Lot Size policies with suitable example.
(b) By explaining the steps of MRP also explain the inputs and outputs of MRP System. 10
(c) Local road construction company needs to develop engineering specifications prior to 10
doing any pre-surfacing preparation. The company has been awarded the bid on four
projects. They have one engineer. It takes 4 hours per km to develop the engineering
specifications. The first project is 30 km long and must be started by March 151'1 to
complete on schedule. The second project is 20 km long and must be started by April I*.
The third project is 5 km long and must be started bj;May 1st. The fourth project is 15
km long and must be started by May 23rd. It is now February 15'1', The engineer works a
40 hours week and is very experienced so he operates at 100% efficiency. Assume one
project can't be started until the previous project is completed. Does the engineer have
enough time to accomplish the specifications on time? Assume 80% utili/ation.
Also, explain importance of Capacity Requirement Planning in ERP.
Q-2 fa) Explain the process of encryption and decryption in Electronic Code Book
(HCB) mode in detail? 10
(b) Explain the working of man in the middle attack in Deffie-Hellman key.
exchange by using suitable example in detail? 10
(c) Explain the working of Data Encryption Standard (DES) in detail? 10
Q-3 (a) Explain the working of RSA algorithm in detail? Generate keys using p - 7, q
13 using RSA algorithm? 10
(b) Explain the working of Digital envelope in detail? Explain how all security
objectives are achieved by this scheme? 10
(c) Explain the difference between Secure socket layer and Secure Hyper Text
Transfer protocol (SHTTP) in detail? 10
*
Q-4 (a) Explain the working of Secure Socket Layer (SSL) in detail? 10
(b) Explain the working of Pretty Good Privacy (PGP) in detail? 10
(c) Explain the working of password based authentication system in detail? 10
Q2(a) What are entities? Explain their each classification with example? 10
(b) Develop an XML schema for the following requirement:- 10
There are exactly two person elements in the document.
The person name starts with an upper case alphabetic character and may
optionally be followed by no more than nine lower alphabetic characters.
The age attribute is restricted by range 16-30.
The id attribute has exactly five characters with first two as alphabets and
remaining three as numbers
The email of the person must contain @ and . characters.
(c) Create a DTD and an XML document for a simple music collection. 10
(i) Use the artist name, the name of the work, the genre of the work and
any other details
(ii) Define elements and attributes
(Ui)Create a inline DTD . »
(iv)Create the prologue for the document
(v) Create a well-formed XML document
Q.4(a) Explain the differences between Document object Model and Simple API 10
for XML?
(b) Consider the following XML file:- (Use DOM as the data retrieval 10
technique)
<Bookstore>
<Bookid="xm!OOOr>
<Title>ABC</Title> PTO
<Author>XYZ</Aulhor>
<Price>lOO</Price>
<Editioti>2006<Edition>
</Book>
<Book iiK'xml0002">
<Title>Learning XML</TitIe>
<Author>ABC</Author>
<Price>200</Price>
<Edition>2007</Edition>
</Book>
</Bookstore>
Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. AH question carry equal marks.
Make suitable assumptions wherever necessary.
UNIT-I
la(i). What are the Comparison between Databases and Information Retrieval? 05
(ii). What are the performance issues for Information retrieval? 05
b. Consider these documents: 10
Docl documents contain geospatial information
Doc2 extraction and use of geospatial information
Doc3 extraction geospatia] references from documents
(i)Draw the inverted index representation for this collection.
(ii)Term Document incidence matrix for this Collection,
c. Write the algorithm for the intersection of two postings lists . 10
UNIT-H
2a. What are the data structures that help the search for terms in the vocabulary in 10
an inverted index ?
b. What are the stop words? And what is the normalization? 10
c. Writedown the edit distance algorithm between two strings.And compute the 10
edit distance between intention and execution.
UNIT-I1I
3 a. What are the differences between Blocked sort based indexing and Single pass 10
in memory indexing?
b. What is index compression? And in which compression technique can we 10
achieved better compression ratio.
c. Bxplain dictionary compression in details. 10
UNIT-IV
4 a. Consider the table of term frequencies for 3 documents denoted Docl, Doc2, 10
Doc3 in table below. Compute the tf-idf weights for the terms car, auto,
insurance, best, for each document, using the idf values in the tabls below .
Viriualizaiion.
Q. 4 (a) What is V i r t u a l Machine theft? lixplain. Also, explain UyporjiK'kin^ and !)al;i I.eakaiie. id
(b) 1" A plain ihe measures possible ibr securii\f Ifypervtsor and V i n u a ! Muclrinc in Cluisd ;o
Computing. AKo, explain ihe concept of Demilitarized /.one.
(c) l-.xplain the compliance types and need in Clout! Computing. Also. c.\pi:iin :>ieps involved i u
in
Q. 5 (it) Jixplaiu (he icchniqucs to protect compute infraslructure, t\n pun kliim hii'h .ivaiiiihili!) o/ 10
V i r t u a l Machines and Iheirdala in Virtnalized Data (.'enirc.
(h) What is ilu- importance of Recovery Point Obje^iives ( K i ' O j und K a v \ o r \ i n i e it)
Objcclivt'S(UTO) in (Justness Continuity? K x p U u n .
(c) l::laborate approaches for backup in a Virtualized Data Centiv en\. i()
*» '7
I V B. K. Examination A|>ril-Miiy'20U
Computer Knginccring/ Information
4CO255AH 1455: Cloud C o m p u t i n g
Q. 3 (a) Compare life cycle of V i r U i a l M a c h i n e with thai of Real Machine. Wi;aL is ihe adtiilioivi! it)
siaie thai a Virtual Machine has and why?
([>) J low Block Level Storage VirtualUatton enables ahslraclion ;n Storatu* Area N e i w v i r k At
(SAN)? 1 xpkiin.
(e) What is Desktop Virtuali/auon? Also, explain the techniques dim enables Desktop 111
Virtuatization.
Q. 4 («) What is V i r t u a l Machine theft? Hxplain. Also, explain IJyperjiickiiig and !)aia Leakage. id
(b) Kxplain the measures possible for security of I lypcrvisor and V i r t u a l M n d r i n c in Cloisd 10
Compuiing. Als>\n the concept ofDemililiiri^ed /one.
(c) l - x p l a i n ihe compliance types and need in Cloud Computing. Also, e x p l a i n sieps involvuti 10
in Risk Assessment.
Q. 5 (a) Kxplain the techniques to protect compute infrastructure, tor pun idimj. isii-h u v a i i a h i l i i ; oi 10
V i r t u a l Machines and (heir data in Virluali/ed Data Centre.
(bj What is the importance of Recovery Point Objectives i K l ' U j iiin.1 K o . - . > \ c i \ i n i c i t )
Objectives (U'l'O) in Business Continuity 1 .' H x p k i i n .
(c) l. : laborale approaches for backup in a Virtuali^ed Data Centre em i r u n m c i H . iO
Roll No
1248
BE. IV EXAMINATION APRIL-MAY, 2014
COMPUTER ENGINEERING
CO4254
INTERNET COMPUTING
Duration: 3 Mrs. Max Marks: 100
Min Marks: 35
Note: Attempt any five Questions.Make suitable assumptions wherever necessary.