IET DAVV 2014 Com2
IET DAVV 2014 Com2
Ql(a) (i)What are the four categories of definition AI? Give one definition of each category. 5-5
(ii)For each of the following agents, develop a PEAS description of the task environment
• Automatic Taxi Driver
• Vacuum Cleaner
• Robot Soccer player
• Internet book-shopping agent
(b) (i) Define agent. What are the functionalities of an agent function? 5f 5
(ii) What is a heuristic function? Explain the nature of heuristics with an example. What is the
effect of heuristic accuracy on performance?
(c) (i) Explain in detail, the structure of different intelligent agent. 5+5
(ii)What is Production? What are different elements of Production System? Solve following
string rewriting example. Clearly show working knowledge database, conflict set, and rule applier
for every iteration. Also draw its tree structure.
Initial State: bcabca
Goal State: cbbaac
Production Rule: ab->ba
bc^cb
ca->ac
Q2(a) (i)Convert following sentences into predicate logic: * 5+5
• No one talks.
• Anything anyone eats and isn't killed by is food.
• Anyone who loves everyone loves himself.
• Everyone who walks is calm.
• Mary loves everyone,
(ii)compare the following :
• Inheritable knowledge and inferential knowledge
• Forward and Backward reasoning
(b) (i) Explain seven problem characteristics with suitable examples. 5+5
(ii)Given the following Predicate
• Vx Pass(x, History) A Win(x, Lottery) ->Happy(x)
• Vx Vy Study(x) V Lucky(x) -» Pass(x, y)
• ~ Study G oriri ) A LuekyQohn)
• VxLucky(x) ->Win{x)
Use resolution to prove the query: Is John Happy? By constructing tree.
(c) (i) Consider the Cryptarithmetic problem shown below 5+5
NO
+ GUN
NO
HURT
Clearly define state space, initial state, goal state, operators for the given problem. Estate possible
solution using Constraint Satisfaction.
(ii)Discuss the performance of A* algorithm when the heuristic function either under-estimate or
overestimate.
Q3(a) Compare Nonmonotonic reasoning and Statistical reasoning. What are the different methods for 10
Nonmonotonic reasoning and Statistical reasoning? Explain with example
(b) (i) Define the following terms: 5+5
a-cut, strong a-cut, Concentration, Dilation, Point fuzzification.
(ii) Explain the need of fuzzv set and fuzzy logic with example.
(c) (i)What is Monotonic and NonMonotonic reasoning? How is the two different? State certain real 5+5
world problem.
(ii)Explain the concept of Bayesian network in representing knowledge in an uncertain domain.
Q4(a) (i)Give the conceptual dependency structure to the following sentence 5+5
• John ate apple.
• While going home, Ram saw a bird.
(ii)How can we represent the qualified expression in semantic nets? Represent the following
statement in semantic net:
• Every dog has bitten a postman.
• John gave the book to Mary.
(b) (i)Explain the alpha-beta pruning search procedure. In this procedure which nodes would not 5+5
need to be examined? Explain with example.
(ii)What is the advantage of using alpha beta cutoffs in in'mmax algorithm? Explain with the help
of an example
(c) (i)Develop a script with four scenes and three shots in each scene for "fast food restaurant". 6+4
(ii) Explain the rule based system architecture.
Q5(a) (i)Describe and compare the different types of problems solved by these expert system: 5+5
DENDRAL, MYCIN, PROSPECTOR and Rl.
(ii) Give an example of the use of metaknowledge in expert system inference.
(b) (i) Describe the different levels of knowledge that are necessary for natural language 5+5
processing.
(ii) Would it be reasonable to apply Samuel's rote learning procedure to Chess? Why (not)?
(c) How does an artificial neural network model the brain? Describe two major classes of learning 10
paradigms: supervised and unsupervised learning. What are the features that distinguish these
paradigms from each other?
191
Note: Attempt all the questions. Attempt any two parts of each question. All parts of
question must be solved at one place. Take the suitable assumption if necessary.
Ql (a) Explain in detail about Unified process in object oriented design? Explain the 10
phases with neat diagram.
(b) What are the benefits of iterative development? What are the various Problems 10
Addressed by Visual Modeling.
(c) How can you verify software quality? Explain the various dimensions of 10
software quality.
Q2 (a) The owner of the local video rental store wants a VRS website that allows the 10
customers to become members or search the video inventory (by video name,
actor name, director name, type of video (new release, western, mystery, drama,
comedy, children, etc.), or video rating). The VRS website also allows members
to log on as a member, search the video inventory (as before), select videos to
rent (videos must be located at the store location where the member wants to
pick up the videos), modify membership information, and check out the videos.
The member can also pay late fees online since videos cannot be rented by a
member with outstanding late fees. Rented videos can be returned to any of the
owner's video stores. Rented videos that are not picked up within 24 hours are
returned to the available inventory; however, the rental charged is not removed
from the member's credit card. On the day before a rented video is due to be
returned, the VRS will email members with due notices which reminds them that
the video is due. This due email will be sent to the member every 3 days after the
video's due date. After 60 days of being past its due date, a $30 charge for each
overdue video is processed on the member's credit card, and an email is sent to
the member to notify them of this charge. The length of rental is 5 days. Prepare
the Use Case Diagram with specification at least 2 use cases.
(b) Why the package hierarchy should be acyclic. Explain some characteristics of 10
analysis mechanism.
(c) Explain the following with notation and example 10
Interface, Component, Package, Subsystem.
Q3 (a) How layers are useful in addressing problems in design? How high cohesion and 10
separation of concerns helpful in layered architecture design?
(b) Draw the structural and behavioral diagram for achieving persistency mechanism 10
for member entity of Question number 2 (a).
(c) Consider stock management software that records all transactions that occur for 10
a portfolio. For example, stocks may be purchased and sold. Dividend payments
may be received. Complex situations can occur, such as stock splits. The current
contents of a portfolio can be determined by replaying the transaction log. The
portfolio has some initial contents, and all subsequent changes are captured via
the transaction log. The changes in the transaction log are then applied through
the target date to determine the current contents.
Construct a sequence diagram to show the calculation of the contents of a
portfolio as of some date.
Q4 (a) Draw the class diagram for the below mentioned problem 10
t) All Vehicles have some common attributes (speed and colour) and common
behaviour (turnLeft, turnRight)
ii) Bicycle and MotorVehicle are both kinds of Vehicle and are therefore shown
to inherit from Vehicle. To put this another way, Vehicle is the superclass of
both Bicycle and MotorVehicle
iii)In our model MotorVehicles have engines and license plates. Attributes have
been added accordingly, along with some behaviour that allows us to examine
those attributes
iv) Motor Vehicles is the base class of both MotorBike and Car, therefore these
classes not only inherit the speed and colour properties from Vehicle, but also
the additional attributes and behaviour from MotorVehicle
Both MotorBike and Car have additional attributes and behavior which are
specific to those kinds of object
(b) How many interaction diagrams should be produced during Subsystem Design? 10
Why should dependencies on a subsystem be on the subsystem interface?
(c) Explain the following with example 10
a) Class visibility b) Generalization c) Interface d) Subsystem
Q5 (a) In the Course Registration System, the concurrency requirements come from the 10
requirements and the architecture: Model the process view using suitable
diagrams
i) Multiple users must be able to perform their work concurrently
ii) If a course offering becomes full while a student is building a
schedule including that offering, the student must be notified
Risk-based prototypes have found that the legacy course catalog database cannot meet
our performance needs without some creative use of mid-tier processing power
(b) Produce the deployment diagram for problem mentioned in question number 5 10
(a).
(c) How do you model the process View? What modeling elements and diagrams 10
are used? Describe the two strategies for mapping classes and subsystems to
processes?
192
IV BE EXAMINATION NOV-DEC 2014
COMPUTER ENGINEERING
4CO204
WIRELESS PROTOCOL & MOBILE COMPUTING
Q.2 (a) A CDMA system in which user A and user B have the codes (7)
(0.0,0,1,1,1) and (1,1,0.1,0.1) respectively.
(i) Show the output at receiver, if A and B both transmit bit 0.
(ii) Show the output at the receiver if A transmits a data bit 0 and B
transmits 1.
(iii) Recover the transmitter and transmitted value if receiver receives
thecodeas(l,l,l,-K-l,-l)
(b) Consider a cellular system of 32 cells with a cell radius R= 2 km and (7)
total simplex channels arc 336. Assume reuse factor as N-4 and cell
area- 1.5R2\'3. Find
(i) What total area covered?
(ii) Number of channels per cell.
(ii) Total number of simultaneous calls in a cell?
(iii) Total number of users in cellular system
(e) - Draw the physical frame structure of GSM radio interface and (7)
describe any three control channels defined in it.
(d) Explain Security features of GSM architecture. (6)
(c) Describe (i) hidden and exposed (ii) Near and Far terminal problems. (6)
How MACA protocol overcomes these problems
Q.3 (a) Explain three inter frame spacing intervals and their purpose. How (7)
DFWMAC-DCF with CTS/RTS protocol reduces collision. Give
example.
(b) Explain 1HEE 802.11 MAC frame format. (7)
Contd.~2
If the frame control field values received by the receiver as
000010000111011:
(i) What is the type of frame
(ii) Whether ii is duplicate frame
(iif) Whether power management and security supported
(iv) Fragmentation is allowed
Justify your answer.
(c) Explain synchronization mechanism of 1EEE802.11 for infrastructure (7)
based WLAN
(d) Describe DSSS physical frame format in IEEE 802.11. (6)
(e) Describe the use of (i) Beacon Frame (ii) TSF and (iii) TIM in (6)
IHEH802.ll.
Q.4 (a) What are the problems of using fix IP protocol in mobile (7)
communication? What could be quick solutions and why don't they
work'?
(b) 1 low the current location of mobile node is updated in home agent? (7)
What ICMP extension makes it possible?
(c) What is the consequence of slow start feature of TCP in mobile (7)
network? What modifications suggested to improve TCP efficiency
under mobile environment?
(il) Compare merits and demerits of tunneling mechanisms of mobile IP. (6)
(c) Describe the process of mobile application development in J2ME or (6)
Android platform.
Note: Every UNIT has one question having Three parts (a), (b) and (c). Attempt any two
parts from every question. All question carry equal marks.
UNIT-I
a. Pick some machine Learning task. Describe it informally in a paragraph in
English. Now describe it by stating as precisely as possible the task,
performance measure, and training experience. Finally, propose a target function
to be learned and a target representation.
What is market basket analysis? How is it used? 05
How can say man is better than machine? 05
Write down the Candidate elimination-learning algorithm? 05
What is concept Learning? Also explain general to specific ordering of 05
Hypothesis?
UNIT-II
What are the problems for decision tree learning? Which attribute is the best 05
Classifier in the decision tree?
Why prefer short hypotheses in decision tree Learning? 05
What is the concept of over fitting in decision tree learning? 05
(ii). How many steps involves in rule post -pruning. 05
c. Use the table of examples below : 10
jExam|j^seCalculatorj|Duration(hrs) Lecturer Term Category
Yes 3 Jones In
Summer hasy
'I
2 lYes 3 Jones Spring ^Difficulty
1 No 3 Smith Spring [Difficulty
4 _J|No | Armstrong Summer Easy
5 Yes 2 Jones ||Summer Easy
(i). Calculate the entropy of the set of five examples with respect to the binary
categorisation into difficult and easy problems.
(ii). Suppose an agent using the ID3 algorithm has chosen to use the Lecturer
attribute of the Problem as the top node in the decision tree it is learning .In
English , why would the algorithm have chosen that attribute ? What would the
partially learned decision tree look like after that choice?
UNIT-II1
3 a. What is the mistake bound for the Find-S Algorithm? 10
b(i). How can define the sample error and true error? Explain. 05
00- What is the Probably Approximately Correct Learning model? P.T.O 05
c(i). Define Vapnik --Chervonenkis Dimension. And Illustrate Example? 05
(ii) Define the following terms:- Clustering , Reinforcement Learning? 05
UNIT-IV
4 a. What is Natural language processing (NLP)? Describe the different phases of 10
NLP?
b(i). What is Hidden markov model? Write down the application of HMMs. 05
(ii). What is Word sense Disambiguation? Write down the application of WSD. 05
c. What is the Support vector machine (SVM)? Explain the maximum margin 10
classifier in SVM?
UNIT-V
5a. Suppose a genetic algorithm uses chromosomes of the form x = abcdefgh 10
with a fixed length of eight genes. Each gene can be any digit between 0 and 9.
Let the fitness of individual x be calculated as:
f(x) - (a + b) - (c -r d) + (e + f) - (g + W ,
and let the initial population consist of four individuals with the following
chromosomes:
xl = 6 5 4 1 3 5 3 2
x2 = 8 7 1 2 6 6 0 1
x3 = 2 3 9 2 1 2 8 5
x4 = 4 1 8 5 2 0 9 4
1. Evaluate the fitness of each individual, showing all your workings, and
arrange them in order with the fittest first and the least fit last.
II. Perform the following crossover operation:
i. Cross the fittest two individuals using one-point crossover at the
middle point.
ii. Cross the second and third fittest individuals using a two-point
crossover
b(i). How many selection methods to select the best chromosomes? 05
(ii) How the genetic algorithm works? Write the parameters of GA 05
c. Define the following: 10
(i) Operators of Genetic Algorithm %
1 (ii) Permutation Encoding of Chromosome
194
IV B. £. Examination December'2014
Computer Engineering
4CO252: Enterprise Resource Planning
Note: Attempt all five questions. Answer any two parts of each question. Each question carries equal
marks. Make suitable assumptions if necessary.
Q. 1 (a) Explain Process View of business and relate this with concept of ERP with suitable 10
example.
(b) Who are the stakeholders of ERP system? Explain their role in detail. 10
(c) Define and compare MRP, MRP II, ERP and ERP II with suitable examples. 10
Q. 2 (a) Explain CRM and SCM? What is the importance of CRM and SCM in ERP? 10
(b) What are the factors that influence Business Intelligence to be useful for ERP system? 10
Explain with example.
(c) Differentiate between - 10
• BPR and Process Simplification
• BPR and Continuous Improvement
Q. 3 (a) Explain project organization phase of introduction and selection process of ERP system. 10
(b) Explain how Data preparation plays important role in ERP system implementation? 10
(c) Compare advantages and disadvantages of the following practices of ERP system 10
development:
i. Make ERP system with internal resources (Built - in)
ii. Tailor Made ERP solution
iii. Make ERP system with external resources
Q. 4 (a) What is the use and importance of Human Resource Module in standard ERP system? 10
Explain also various sub-modules of Human Resource Module.
(b) "Financial accounting module provides enterprise wide control on financial 10
information", justify this statement with suitable example.
(c) Explain functions carried out in standard Sales and Distribution Module of typical ERP 10
system.
*
Q. 5 (a) What is the future of and challenges to ERP market in India? Explain. 10
(b) Explain the features of SAP that helps organizations to achieve operational excellence. 10
(c) Explain the impact of technology and social system on the development process of ERP 10
system.
< 195
IV B.E. EXAMINATION, NOV-DEC 2014
COMPUTER ENGINEERING
4CO253/4IT453
NETWORK AND INFORMATION SECURITY
Q.1 (a)i Give a brief comparison between the different types of cipher 5
model.
ii Enlist the different types of modes in which cipher operate. 5
fb)i Differentiate between authentication and access control with one 5
example,
ii Explain various types of cryptanalytical attacks, based on amount of 5
information known to cryptanalyst.
(c)i What are the two types of security attacks possible? Classify those 5
two types of attacks.
ii Explain the cryptanalysis of mono-alphabetic cipher. 5
Q.2 (a)i Explain the different points about the strength of DES cipher. 5
ii What is the significance of Feistel cipher structure? Explain. 5
(b)i Why do some block cipher modes of operation only use encryption 5
while others use both encryption & decryption?
ii Explain the different evaluation criteria of AES. 5
(c)i Explain the process of AES Encryption and Decryption. 5
ii Explain the difference between confusion and diffusion in context of 5
symmetric block cipher.
Q.3 (a)i Explain the difference between link and End-to-end Encryption. 5
ii Explain the different possible approaches to attack the RSA 5
algorithm. '
(b)i Classify the approaches to distribute the public keys by explaining 5
them,
ii Compare the. mechanism of public key authority and certificate 5
authority for public key distribution.
(c)i Explain Man-in-the -middle attack on Diffie-Hellman key exchange 5
protocol,
ii What is meant by message authentication? Explain some common 5
cryptographic techniques for message authentication.
Q.4 (a)i What is meant by meet-in-the-middle attack? Which kind of attack 5
will form the meet-in-the-middle attack if it is applied on hash
function? Explain,
ii Explain a protocol that provide confidentiality & authentication 5
service for email & file storage application.
(b)iExplain the different means of authenticating user's identity. 5
ii How are replay attacks possible on authentication protocols? 5
Explain countermeasures for it.
(c)i Explain key generation process for DSA algorithm. 5
ii How is authentication being implemented in Unix based system? 5
Explain.
Q.5 (a)i Who are intruders? Explain the different classes of intruders. 5
ii Differentiate between the behavior of intruders and authorized 5
users with a diagram.
(b)i Enlist the different terminologies of malicious programs by 5
explaining at least one terminology.
ii How 3-way handshake mechanisms of TCP become a distributed 5
DOS attack? Explain.
(c)i Write short note on circuit level gateway with a neat diagram. 5
ii What is meant by access control? Explain the different 5
requirements of it.
***************************
197
BE. IV EXAMINATION NOV-DEC, 2014
COMPUTER ENGINNERING
4CO258
Information Retrieval & Extraction
Duration: 3 hrs. Max Marks: 100
MinPass Marks: 35
Note: Every UNIT has one question having three parts (a), (b) and (c).
Attempt any two parts from every question. All question carry equal marks.
Make suitable assumptions wherever necessary.
UN1T-I
la. What are the Comparison between Databases and Information Retrieval? 10
b. Consider these documents: 10
Docl documents contain geospatial information
Doc2 extraction and use of geospatial information
Doc3 extraction geospatial references from documents
Draw the inverted index representation for this collection.
c(i). What are the performance issues for Information retrieval? 05
(ii). Write the algorithm for the intersection of two postings lists . 05
UNIT-II
2a. What are the data structures that help the search for terms in the vocabulary in 10
an inverted index ?
b. What is the normalization? and explain the stop words? 10
c. Compute the edit distance between Pair and Alice. 10
UNIT-III
3 a. Compare the Blocked sort based indexing and Single pass in memory 10
indexing?
b. What is index compression? And in which compression technique can we 10
achieved better compression ratio.
c. Explain dictionary compression in details. 10
UNIT-IV
4 a. Define the following terms: Inverse Document frequency, Term frequency, 10
TREC, Relevance.
b. . An IR system returns 8 relevant documents, and 10 nonrelevant documents. 10
There are a total of 20 relevant documents in the collection. What is the
precision of the system on this search, and what is its recall?
c. Describe the weighted zone scoring with an example? 10
UNIT-V
5a. When does relevance feedback work? And Explain Pseudo relevance 10
feedback?
b. What are the Global methods for query reformulation? Explain each. 10
c. Write down the comparison between Text-centric and. data-centric XML 10
retrieval.