Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
157 views
92 pages
Dec 13 Cse It All Paper PDF
Uploaded by
Aashutosh Tiwari
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save dec 13 cse it all paper.pdf For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
157 views
92 pages
Dec 13 Cse It All Paper PDF
Uploaded by
Aashutosh Tiwari
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save dec 13 cse it all paper.pdf For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 92
Search
Fullscreen
B.E, Examination 8YSI: Advance Operating System “Time: 3 hs. Mex, Marks: 100 Min, Pass marks: 35 ‘Note: Total no of question: 08, Attempt any five question All question cary equal marks Q.1 (@) In what respect distributed computing system is better than parallel processing system? Discuss some of the guiding principles for achieving transparency in any distributed operating system. (b) What is the main problem in making a system highly scalable? Why reliability is an important feature in the design ofa distributed system? Q.2(@) How marshaling arguments and results involve in implementation of RPC. Explain the implementation of RPC mechanism, () Define the RPC model withthe help of suitable example, How are stubs generated? Q3(@) Why do some di an easier programming paradigm and are typically more efficient than stateless server? ibuted application use stateless server in spite of the fact that stateful servers provide (b) what is role of Blocking VS Non blocking primitive primitives in distributed system communication? Give a mechanism to implement consistent order massage delivery in group communication. Q4 (@ Why is the deadlock avoidance strategy never used in distributed system for handling deadlocks? what are the problems has collective request deadlock prevention method? () what are the main advantages of this algorithm over the WFG-based distributed algorittum? What might be the reason for phantom deadlock ina distributed system? (Q5(@) why are election algorithm is needed in distributed system? Write ring based algorithm for conducting eleetion (©) Discuss various approaches for distributed clock synchronization algorithm. How can implement logical clocks by using counter? Q6(a) (b) Differentiate between handoff scheduling & affinity scheduling of threads and also explain models for organizing threads of process. (b) What is atomic broadcast? Explain synchronised atomic broadcast algorithm. Discuss the various commonly used models for configuring distributed computing system. Q.7(@) What is distributed file system? How to achieve location transparency in distributed file system, (&) How delayed write policy improve performance in file caching scheme? Define client server model & addressing with the help of suitable example Q8 Write short Notes on the following (any three), 1, Real Time Operating System 2.Network Operating System 3.RMI 4.Amoebafreer r S WOU OCLC CEOS OAR : we a VV VGO9GIBOS9S3999| Total Questions:8. B.E. Examination, OCT /NOV 2013 Data Warehousing and Data Mining CS/IT-BY52 Time: Three hours Note: Attempt any Five Questions. All questions carry equal marks. 1(a) Briefly explain data mining and define it. Discuss some of the reasons for growth in enterprise data. (b) What are the different operations which are generally performed on a data warehouse? Explain with the help of suitable examples. 2 (@) Describe different tasks and techniques of data mining. (b) What do you understand by discretization ? What is the importance of discretization in data mining ? 3(@) List the steps of a data mining process. How is it different than the waterfall software engineering process?, (b) Give the architecture of a data mining system. What are the essential ‘components of a data mining system? Desoribe the purpose of each of these components. 4(a) what is the aim of association rule mining ? when can this technique be useful ? Discuss with the help of suitable example (b) Describe any one algorithm for mining association rules. A database has four transactions. Let Minimum Support = 35% and Minimum Confidence =85% TD item-bought 700 A.B,D,K 200 ABCDE 300 CE 400 ABD (i) Find all frequent itemsets (ii) List all of the strong association rules along with their confidence PTO5(a) What do you understand by Post-mining? Why is it useful? List and explain some post mining operations. (b) Prove that if the support of a frequent itemset is greater than or equal to the minimum confidence required for the rule, then all association rules generated by such itemset or from its subset will have confidence at least equal to the minimum required confidence, 6 (a) Take any commercial data mining system and outline the major features of such a system. (b) What is supervised classification ? In what situations can this technique be useful ?, 7(a) What is clustering? Suggest any one application of data mining where clustering can be used for mining the hidden knowledge. (b) Write an essay on latest trends in data mining 8. Write the short notes on the following (any three): () Benefits of Pre- mining (i) Applications of data mining (il) Classification of Data Mining System (iv) Web content mining ~ SIAN SAMA © € € THM HR ReAe Maximum Marks: 106 B.E. Examination, Dee 2013 Neural Networks and Fuzzy systems (NGS/Old) 8553 sme: Three Hours Minimum pass Marks: 35, Note: Attempt any five questions. All questions carry equal marks. Missing data (if'any), may be suitably assumed, Qt Q2 Q3 Qa Qs 26 a) b) a) b) b) a) ») a) b) a) b) State the characteristics of artificial neural networks in detail, Explain the Hebb net model of neural network. Realize the logical AND operation with binary inputs and targets using this model. Explain the linear separability problem. Justify XOR fuunction is non linearly separable by a single decision boundary line . Mention different types of activation functions, along with their significance in different models. Derive the generalized delta learning rule, What are the factors that improve the convergence of learning in BPN networks? Explain the training algorithm of radial basis function network. Explain the architecture of @ counter propagation neural network? Name the different layers present in it. How the weights between layers are updated? Using the delta rule, find the weights required to perform the following classifications. Vectors (1 I =I -1), (-1 =I -1 -1), (I-11 1) are members of class (target vector 1); vectors (1 1 1 1) and (-1 «IT -1) are not members of class (target vector -1). Use learning rate of 0.5 and random starting weights. Using each training vector as inputs, test the response of the net. Describe 2 Hopfield neural network, Why are symmetrical weights and weights with no self conneetion important in discrete Hoptield network? Sketch the architecture of ART | network and discuss its training algorithm. What is membership function? Explain the features and inference method for assigning membership functions. What are the similarities and differences between fuzzy and neural systems? Explain,Q7 Qs a) Illustrate fixzzy subset hood theorem. What is the significance of this theorem? b) What is fuzzy associative memory? Explain, Write short notes on (any two) (Boltzmann and Cauchy Machine Gi) Crisp set and fuzzy set i) Self orgenizing map (iv) Fuzzy image transform coding °B.E. Examination- November / December 2013 S8Y71: Cellular & Mobile Communication (NGS/Old) ‘Time: Three Hours Max Marks: 100 Min, Pass Marks: 35, ” Note: Total Numbers of Questions are: 08. Atfempt any five questions. All questions carry equal marks. Qt (a) Write the limitations of a conventional mobile telephone system. Explain about a basic cellular system. (b) Explain the Architecture of GSM. Briefly describe the services offered by GSM system. Q.2(@ What do you mean by CDMA System? Demonstrate the working of CDMA. systems with the help of suitable example. (6) Explain about third generation wireless communication networks. Q3 (a) What do you mean by Adjacent channel interference? Derive the expression for Co-channel interference reduction factor. (b) What is Cell Splitting? What are the types of cell splitting techniques? Q.4(@) What do you mean by GPRS and higher data rates? Explain the Architecture of GPRS in brief. {b) Explain the protocol stack of IEEE 802.11 (WLAN). Which WLAN standard first adopted the 5 GHz band operation? Q.5 (2) What is Handoff? Explain the strategies of Handoff; Compare soft and hard Handoff. (©) What do you meen by Mobile IP? Demonstrate the working of Mobile IP with the help of example network. Q.6 (@) Write a comparison between TDMA, FDMA and CDMA. Also specify the shortcomings and advantages of each of the multiple division techniques. (b) Differentiate between Fixed Channel Assignment (FCA) and Dynamic ‘Channel Assignment (DCA) schemes.QT ‘Write short notes on any four of the following: (@) IEEE 802.11 a,b (b) Sensor Networks (c) Wireless application protocol (@) Mobile TCP (@) Frequency Reuse Concept Q8(@) Define and explain cellular digital packet data (CDPD). (b) What is the usefulness of Bluetooth technology? Discuss the Architecture of Bluetooth. Aone errenr etree Seana anasaar 9 SAR AR AAA arm maa eooon ooo€ é c B.E. Examination, Dec 2013 Artificial Intelligence & Expert Systems (GS/NGS/Old) € c TYS1 Time: Three Hours & Maximum Marks: 100/70 Minimum pass Marks: 35/22 e Note: Attempt any five questions. All questions carry equal marks. Missing data (if € any), may be suitably assumed, t Qa) Explain different characteristics of Production systems. e b) Explain AO* Algorithm with the help of example, c Q2 a) Explain the concept of symbolic representation of logic, c b) Explain algorithm for steepest hill climbing, PR Q3 2) What are the drawbacks of predicate logic used in representation of facts? Give three examples where itis difficult to use predicate logie for representation. : ©) Explain the process of reasoning with proper example. Why such reasoning c techniques are required in developing Al Systems. c Q4 a) What is knowledge representation? Explain knowledge representation using 7 proposition and predicate logie with an example. 7 5) Consider the following sentences and translate the sentences into formulas in 7 predicate logic and clause form. Prove * John likes peanuts” using resolution John like all kind of food. Apples are food, : Chicken is food, Anything anyone eats and is not killed by is food. ze Bill eats peanut and is stil alive. Sue eats anything Bill cats. : Q5 2) State and prove Bayes Theorem. b) Explain forward and backward reasoning with an example , Q6 a) How the knowledge representation is done through semantic networks? Explain with suitable example,Q7 Qs b) a) by What do you understand by Monotonic and non- monotonic reasoning? Explain with suitable example, What is Game Playing. How would the minmax procedure have to be modified to be used by a program playing @ three or four person game rather than @ two person game? Describe Alpha-Beta Pruning and give the other modifications to the minmax procedure to improve its performance. Write Short notes on (any two): a) Expert Systems 6) Block world problem in Robotics ©) Natural language processing 292A AaAn a 3 OAAanan @oo00 on COG AABROMD ©0B.E, Examination- November/ December 2013 C 7YS2: Compiler Design & Translator (GS/NGS/Old) . Time: Three Hours Max Marks: 100 Min, Pass Marks: 35 c Note: Total Number of Questions are : 08. Attempt any five questions. Q.1(@) Define Compiler? Explain important phases of compilation, process with the help t of suitable example? f (b) Describe the role of a lexical analyzer and also explain the concept of Input Buffering. . Q.2 (a) _List various lexical errors and actions to be taken to recover from lexical errors? \ (2) Write short notes on the following: (i) Recursive Predictive Parser Gi) Non Predictive Parser Q.3.(a) Discuss three pre-requisites of Predictive Parsing with the help of suitable examples. (b) Define First function and Follow Function, Calculate First and Follow funetion for the following grammar, B-TE’ BP ++TE’/e - ToFT 4 Porrr/e Fo (E)/id Q.4(@) What is handle and handle pruning? Give the reduction steps of the expression id + id * id for the following grammar. - E-E+E EEtE E~@) Eid (©) Prove that the following grammar is not a SLR grammar S—Aa S—bAc ‘ Sr de : S— dda AvdQ5 (a) Construct Non Recursive Predictive Parsing table for the following grammer E>TE’ BP o+TE’/e ToFT’ PortRr/e F>(@)/id ‘Also demonstrate parsing steps/ procedure with table for the following string id+id* id $ the help of constructed parsing () Find LEADING and TRAILING for the following grammar $— aAB/bA/e A—eAb/e Bo bB/C Q.6 (a) Write short note on Storage allocation strategies? (©) Discuss various issues in the design of a code generator? Q.7 Compute the canonical collection of sets of LR (0) items for the following grammar EOE+T ET ToT*F TOF Fo ® Fo id Construct DFA after calculating canonical collections Q.8 (@) Constmnet the collection of LR (0) item sets and draw the go to graph for the following grammar $ — SS/a/e. Indicate the conflicts (if any) in the various states of the SLR parser. (b) Write short notes on any fwwo of the following: (® Peephole optimization Gi) Semantic Anelysis ii) YACC samennenennas am LASR eon a4 € © € © © € c € € — © € © © © © € € € c € ©BE (Seventh Semester ) EXAMINATION NOV/DEC 2013 COMPUTER SCIENCE & ENGINEERING 7Y53 : Parallel Processing Time: Throe hour Note: Attempt any Five questions, All questions carry equal marks. \. (c}_ What do you undersland by the term Parallel Processing? Discuss some applications of parallel processing. (0) Write down the various parallel processing mechanisms and expiain any two of them. istinguish among computer terminologies in each of the following groups : + {)_Uni-processor systems Versus multiprocessor systems {i) Parallelism versus pipelining {il). Serial processing versus parallel processing {b) Describe at least four choractetistics of MIMD multiorocessors that Gistinguish them from multiple computer systems or computer networks. 3. {a)_ Explain the following terms {with reference to pipelining) : {) Reservation toble {i) Clock period fii) Latency (iv) Throughput {vy}. Speedup (0) Prove that a kstage linear pipeline can be af most k times faster than that of a non-pipelined serial processor. 4, (a) Discuss different approaches for branch Handling in pipeline system. {b) What do you understand by Pipeline chaining and vector loops? Discuss. 5. {a} Explain the following terminologies associated with SIMD computers: o (i) Barrel Shifting functions (i) — Mesh connected iliac network.(0) {a} (o) (} Discuss the architecture of CYBER. What do you understand by systolic array? Discuss its characteristics. How is the interprocessor communication handled in parallel computers? Discuss. What do you understand by the deadlock? List four necessary conditions for deadlock. State and explain the architectural configuration of multiprocessors. Explain loosely coupled and tightly coupled multiprocessors. Write the short notes on the following { Any four): (i) Choracteristics of vector processing (i) Parallel algorithm for array processor (ii) Semaphores (iv) Delta network () Handlers Clossification. OOMMOADBROAD DARAAARANRANRAA ray OAae @ aearnne© B.E Examination Nov-2013 7Y71: Networking with TCP/IP Time: Three Hours Max Marks: 100 Min. Pass Marks: 35 Note: Total number of questions are: 08.Attempt any five questions. All questions carry equal marks. Missing data if any assume suitably. Qnol a) Explain the architecture and interface of ISDN. Differentiate between N-ISDN and B- ISDN. b) Differentiate between virtual circuits and circuit switching? Quo? a) Explain ATM switching networks with block diagrams? How do the connections of virtual paths can be made? b) What is the difference between the access technique of IEEE802.3 and IEEE 802.117 Qno3 a) Discuss various ICMP message types? How can we determine if an IP packet is carrying an ICMP packet? b) One of the addresses in a block is 167.199.1 70.82/27. Find the number of addresses in the network, the first address, and the last address. Quod a) Explain with an example how distance vector routing is used to route the packet and why count-to-infinity problem arises and how does to get solved. b) When RARP is required. Explain how it works. What is the limitation of RARP? How BOOTP provides solution for it? QuoS a) Explain how the phenomenon called the silly window syndrome can arise and the steps that are taken at the client and server sides to avoid this happening. Explain how the Clark extension ‘orevents this from occurring. ~p) Explain the UDP Encapsulation and protocol layering. ‘Qno6 a) Explain the use of the following in TCP segment: (i) source and destination port number , (ii) sequence and acknowledgment numbers, Gii) code bits, (iv) _ window size, (v) urgent pointer, (vi) Options and the header length. b) Explain about the structure of UDP header.Quo? a) What is public key cryptography? What are the necessary conditions for public key cryptography? b) Explain how IP can be used over ATM? Qno8 a) Write short technical notes on any THREE: a) FIP b) Security principles ©) Virtual LANs 4d) HTTP e) SMTP. ,AMAMMAAR ADD CAMO ADAB.E. Examination, ‘7Y72: Internet Technology & Web Design (Non-Grading System) ‘Time: 3 brs. ‘Max. Marks: 100 Min. Pass marks: 35 Note: Total no of question: 08.Aitempt any five question. All question carry equal marks QI (@) Discuss the motives for internetworking. What is difference between bridge and router switching, devices? (b) Define the architecture in brief along with its main components. Explain the significance of a DNS Server. Q.2 (a) Discuss various type of web documents withthe help of suitable example. What fs purpose of HTTP? {(b) Define the architecture of web browser. Hlow does Web Server work? Q3 (@) Describe How can create byperlink and embed image in a web document? (b) How can use scripting language along with HTML documents? Define CSS (Cascade style sheet) swith the help of suitable example (Q4 (@) Discuss the role of Java Script in form processing, Write a javascript to multiply two integers. (b) How can perform email validation using Java Script and HTML? Q5 (@) Define different available objects in ASP. How can run ASP Prograras? (©) Discuss in detail how database processing happens in ASP. Q6 (a) How can achieve multiple inheritance in java? Why Jaya is Multithreaded and portable programming language? (b) Describe the concept of garbage collector in Java and define the life cycle of applet. Q.N(a) Deseribe various methods for managing fault and configuration in any web application, (© Explain various available ways for web based enterprise management. Q.8 Write short Notes on the following (any three) 1 Search Engine 2.URL 3.Session Cookies awwwce eee ee eo Oe eee eeeaA B.E, Examination ~ October/November 2013 6442/6¥42: Digital Signal Processing (GS) Time : Three Hour ‘Max Marks : 70 ‘Min Marks : 22 Total Number of Questions are 08. Attempt any five questions. 1 questions carry equal marks. Note: 2 Q.1 (a) Determine linear convolution of the sequences s(n) = 2"u(—n) and h(n) = u(n) (b) Determine the impulse response and the unit step response of the system described the difference equation : ; y(n) = 0.6 y(n-1) ~ 0.08 y(n-2) + x(n) Q.2 (a) Determine if the systems described by the following input output equations are linear or nonlinear : : (a) y(n) = ns(n) + (b)y(n) =a s(n)*B_ where a and B are constants (b) Sketch the direct form —I and direct form ~II network structures of the system, With transfer funetion H(z) +27 10.527 +0.062 Q.3 (a) Determine the inverse Z transform by partial fraction method SQ = ay @=Gaed (b) Determine the Z transform of given discrete time signal s(n) = A"u(n) é Q.4 (a) Compute the circular convolution of the two discrete time sequences y(n) = {1,2,1,2} and s2(n) = {3,2,1,4} (b) Determine the eight - point DFT of the signal X(a) = (1,1,1,1,1,1,0,0} and sketch its magnitude and phase. Q:5 (a) Write down properties of discrete fourier transform, (b) Give flow graph of complete decimation in frequency FFT algorithm (N=8), Q.6 (a) Discuss the properties of the Z transform, (b) Define window function. Discuss various types of window functions used in the design of FIR digital filter. Q.7 Describe the design of linear phase FIR filter using window and frequency sampling method. : Q.8 Write short notes on any two: (D Tellangen’s theorem i) BR filter design by bilinear transformationVEE EEE ECHOES OFOB OE SCOS SUSE EEBG9BB9an € B.E Examination Noy-2013 c 6771: Information Theory and Coding : “time: Three Hours Max Marks: 100 Min. Pass Marks: 35 Cote: Total number of questions are: 08.Attempt any five questions. All questions carry equal marks. CTissing data if any assume suitably. ‘QNol. a) Draw and Explain the block diagram of a typical message information communication system. £ b) Explain about entropy of a source .Briefly discuss about channel capacity of a discrete memoryless channel. . a) Explain Huffman encoding algorithm. b) A discrete memoryless source has an alphabet of five symbols whose probabilities of occurrence are as described here re Symbols: so Si S3 S4 S85 “Probabilities: 04 02 02 O1 O1 Compute the Huffman code for this source entropy and the average code word length of the £ source encoder. ‘QNo3. a) A code has the parity check matrix : 110100 tad 01101 (| Assuming that a vector (111011) is received. Determine whether the 101001 received vector is a valid code. b) Explain syndrome decoding in linear block code with example. ‘oNet a) Explain between block cipher and stream cipher. ) What are convolution codes? Explain encoding and decoding for convolution codes. . a) Describe briefly compression system? Why we need the compression system? z b) Explain JPEG encoding process in detail. ‘QNo6. a) Explain MPEG audio layers. b) Explain linear predictive coding. 2QNo7. a) Explain the Diffie-Hellman key exchange algorithm with suitable example. b) What do you mean by symmetric key and asymmetric key cryptography? What is Man in the Middle attack”? QNo8. Write Short Note on any four of the following: a) RSA algorithm b) Hamming coding ©) Shannon fanon algorithm d) Trellis Code ©) prefix codewe ee OoCeGoeacoe OSCSCSOFTSFGOAVSSSVOABSZIGBIS 9 w wAAANAA” c - B.E Examination Nov-2013 6Y53: Data Communication Time: Three Hours Max Marks: 100 Min. Pass Marks: 35 Note: Total number of questions are: 08.Attempt any five questions. All questions carry equal marks. Missing data if any assume suitably. QNol. a) What is the purpose of the physical layer? Discuss various physical media for data transmission? b) Discuss ATM layer. Why does ATM use small, fixed lengths cells? QNo2. 2) Discuss the various kinds of supervisory frames in HDLC? Explain the need of bit stuffing. b) Which switching method allows real-time data transfer? Mention the advantages of packet switching? QNo3. a) A channel has a bit rate of 4 kbps and a propagation delay of 20 msec, For what range of frame sizes does stop-and-wait give an efficiency of at least $0 percent? b) Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010 and, because of channel noise, the receiver gets the byte 10011010. Will the receiver detect the error? Why or why not? QNo4. a) Give an argument why the leaky bucket algorithm should allow just one packet per tick, independent of how large the packet is, b) If network topology never changes, which of the routing protocols, shortest path routing & Distance vector routing is preferred and why. QNoS. a) Explain the difference between symmetric encryption and public-key encryption. -b) List and briefly define the key elements of SNMP. QNo6. a) What is UDP? In situation where reliability is not of primary importance, UDP would make a good transport protocol. Give examples of specific situations. b) Explain how the TCP connection can be establish and reledse? QNo7. a) Explain about the principle of HTTP operation. b) What are the various type attacks on RSA? QNo8. Write Short Note on any four of the following: a) BSC b) Modem ©) Token Bus @) ATM Traffic Management e) TSAP wewee ew OCG YE GEOVEG he COCSCSCSCSCOSOGDSSSFEB9OBBFBZ990 wB.E. Examination, November 2013 Software Engineering 6Y54 (GS/NGS/OLD) Max marks-70 min pass marks-22 Time- 3 hours Note- attempt any five questions. All question carry equal marks. Que 1. (a) Define the term “Software Engineering”? Explain the major difference between software engineering and other traditional engineering disciplines, (b)What strategies of design should follow by a sofiware developer? Explain each type. Que 2. (2) Explain the layered architecture of software engineering? What are charters tics and components require for software engineering? (b) What is design? Discuss the objectives of software design. What makes software
average? (h) Delete all accounts at every branch located in Perryridge? (4) Q5 (a) Define normalization. Why is normalization needed? Discuss the various normal forms in normalization with suitable examples.{7] (b) Explain the concepts of Multivalued and Join dependencies with suitable example.[7] Q6(a) What is two-phase locking. Explain with suitable example. How does it guarantee serializability?.(7] (b) Discuss the concurrency control mechanism in detail using suitable example.[7] Q7 (a) What is a deadlock? How can a deadiock occur in DBMS? Explain. (5] (b) How Share and Exclusive locks differ? Explain.{4] (©) Discuss the functionality of a log based recovery with a neat diagram.(5] Q8 (a). Compute the closure of the following set of functional dependencies for the Relational Schema R=(A,B, C, D, B) ABC, CDE, B>D, E>A. List the candidate key for R. [7] (®) Show the decomposition of R(A,B,C,D) with FD’s F={ A~»B,C—»D} into R1(A,B,C) and R2(A,B,D) is lossless or lossy.[7] SOSH MHA MAHON MAHANRAR AR ANRARANARANRARAMNAANRANaa B.E. Examination Gy52: Operating System Time: 3 hrs, Max. Marks: 100° Min, Pass marks: 35 Note: All question carry equal marks. Attempt any five questions. QI (@) Describe the essential properties of following type of operating system 1. Real Time Operating System 2. Distributed Operating System 3. Time sharing Operating System (b) What is Process Control Block? Define various state of Process. Q2 (a) Define various type of CPU scheduling algorithm with the help of suitable example. (b)What is critical section problem? What is role of semaphore for acl synchronization? Q3 (a) Define the various scheme for Deadlock prevention and avoidance. (b) Write about deadlock condit tion and banker’s algorithm in detail. Q44 (a) Differentiate contiguous and non-contiguous memory allocation schemes using suitable example. (b) What is internal and external fragmentation? Describe a mechanism by which one segment could belong to the address space of two different process. Q5 (a) Consider a logical address space of eight pages of 1024, words, each mapped onto a physical memory of 32 frames then (i) How many bits are in the logical address? (ii) How many bits are in the Physical address? (b) How protection is ensured in paging scheme? Describes paging combined with segmentation, 6 (a) Explain LRU page replacement algorithm with the help of suitable example. (b} Describe Demand paging with its advantages and disadvantages. Q7 (a) Discuss Elevator algorithm for disk scheduling with example. (0) Why rotational latency is usually not considered in disk scheduling? How SSTF, SCAN and C- SCAN are modified using latency optimization? Q. 8 Write short Notes on the following (any three) CPU Scheduling criteria File access Methods Virtual Memory 1 2, 4. VirusTec allin ete nicest ilmenite tele mimic Seliy eae ese ele Sel eens¢ B.E Examination Nov-2013 SYS3: Theory of Computation Time: Three Hours Max Marks: 100 Min. Pass Marks: 35 Note: Total number of questions are: 08.Attempt any five questions. All questions carry equal marks. Missing data if any assume suitably. QNol. a) Convert the following Mealy machine to an equivalent Moore machine by the tabular format. Present State b) Define Finite automata. Can an FA have multiple initial and final states? Can an FA have no final state? Give reason in support of your answer. QNo2. a) Convert the Regular Expression (a+ b)*abb directly into a DFA. b) Construct a regular grammar for the following Regular Expressions: i) at(a + bybt ii) ab(a + b)* iii) 10+ @ + 11)041 QNo3. a) Show that L={e"ba" , where n21} is not regular. b) Design a DPA to accept the language L= {w | w has both an even number 0’s and an even number of 1’s}. QNod4. a) Construct the production rules for defining a language i) L= {ab} pq and p>1,q>1}. ii) L= {a°b"" where n21}. b) Explain Chomsky hierarchy of grammar with suitable example. QNoS. a) Construct PDA for the language L= {a"b""c™, where n20, m20}. 'b) Construct a two-stack PDA for the language L= {a"b"c", n=0} QNO6. a) Design a TM to perform 2’s complement operation on binary string. Show the IDs for the string 010 and 101, b) Design a multi head Turing machine for checking whether a binary string is a palindrome or not.QNo7. Convert the following grammar into CNF. S> aA/aBB AP aad/e B> bB/bbC CoB ) Construct minimum state DFA for the following given automata. QNo8. Write Short Note on any three: a) Petrinet model b) Arden’s theorem ©) N-P complete problem 4) Non-deterministic PDA ARAB AARAXRAA BAA CAO AH ANH a NOonneonesB.E. Second Year Examination, Nov/Dec 2013 i Data Structure and Algorithm - (4Y51) Time:Three hours > Max. Marks :100 Note: Attempt any five questions. All questions earry equal marks 1 (@). What do you understand by the tem Data Structures? Why are they used? List the various operations which are generally performed on them and discuss any one operation in detail. ¢ (b) Write an algorithm for matric multiplication, What is the complexity of this algorithm? . 2 (a) Give detailed implementation of Stack essentially giving the following: (b) What is Queue? Discuss different applications of a Queue. 3(a) What do you understand by Binary search tree (BST) 2 Discuss with suitable example, (6) Discuss different traversing methods for binary tree. For each case give the suitable example, 4(a) A binary tree T has 9 nodes. The inorder and preorder traversals of T yield the following sequences of nodes : Tnorder =: ~EACKFHDBG Preorder: FAEKCDHGB Draw the tree T. pre(b) Write the Selection sort algorithm and apply this algorithm to sort the following data (show all the intermediate steps ). 10, 30, 15, 40, 80, 70, 90, 50 5(a) Discuss the open addressing methods of handling the collision in context of hashing. (&) Write an algorithm to generate fully parenthesized infix expressions from their postfix form. What is the complexity of your algorithm? 6(a) What ave the different operations which are performed on a Graplt? Explain with the help of examples. (b) Discuss different approaches for storing Binary tree in the memory. 7(a) What do you understand by the minimum spanning tree? Discuss any one method for obtaining minimum spanning tree from a given Graph. (b) Write the algorithm for Binary Search and give its complexity By using the algorithm sort the following data in descending order: 56, 34, 11, 89, 90, 45, 66, 45 8 Write short notes on the following (any three): (i) Applications of Stacks (ii) Complexity of an algorithm (ii) Doubly Linked List (iv) Postfix notations Peeetreeend an aa DAOONMHOAMAARAAHAHRAAAAYA é enaoe e eOonnnenez BLE, Examination 4y52: Operating System ime: 3 hrs. (GS) Max. Marks:70 r (NGS) Max. Marks:100 ‘Note: All question carry equal marks. Attempt any five questions, Q.1 (@) Describe various functions of operating system. What is the use of spooling in batch operating system? (©) What are cooperating processes? Differentiate user level and kemel level threads. Q2 Consider the following set of processes, with the estimated CPU burst given in milliseconds, and lower priority numbers corresponding to higher CPU priority (1 is the highest): The processes are assumed, to - have arrived in the order P1, P2, P3, P4, PS, all at time 0. Process Burst Time Priority . PI 10 3 P2 7 T PS 2 3 Pa 7 4 PSs 3 2 (@ Draw four Gantt charts that illustrate the execution of these processes using the following scheduling algorithms: non-preemptive SIF, non- preemptive priority (a smaller priority number implies a higher (©) Calculate the tumaround time of each process for each of the scheduling algorithms in part (a). (©) Calculate waiting time of each process for each of these scheduling algorithms in part (a). 3 (@ what is dispatcher? What factors can lead to the degradation of performance of Round and Round scheduling? (©) What are monitors? How do condition variable differ from semaphores? How can busy waiting can be avoided by semaphore? Qe4 (@) What are the necessary conditions for the occurrence of deadlock? How can starvation of a particular process be detected by a system? (®) Consider five processes PO through P4; and three types of resources A (10 instances), B (5 instances), and C (7 instances). Consider the following snapshot ofa system: a Allocation Need Available 7 ABC ABC ABC PO O10 743 230 Pi 302 020 P2 302 600 ; PB 2il O11 : Pa v2 437 Use the safety algorithm to check if this system is ina safe state and specify the safe execution sequenceQ5 (@) what is role of TLB (Translation look aside buffer) used in paging scheme? Differentiate internal and ‘external fragmentation (©) What are the problems associated with paging scheme? Compare fixed partition allocation strategy with variable partition scheme for contiguous memory allocation. (26 (a) what is Belady's anomaly? Does LRU algorithm for page replacement, suffer from this anomaly? Justify your answer with the help of example (©) what is virtual memory? How can implement virtual memory using demand segmentation? Q27 (@) List the major device management functions that must be performed by operating system. Explain shortest seek time first disk scheduling. (©) Define linked and indexed disk space allocation method. How operating systems manage free memory space? Q. 8 Write short Notes on the following (any three) Malti Tasking and Multi Programming Operating System Distributed Operating System Time Sharing Operating System Process Control Block ~ yy ~ ZA AAVAARASA € € € € € £e@ CHOHAAARoll No. ... B.E. (IV Semester) Examination, Oct.-Nov. 2013 COMPUTER SCIENCE AND ENGINEERING & INFORMATION TECHNOLOGY Computer System Organization & Microprocessor Preliminaries (4Y52) Time: Three hours Note: Total no. of question is eight. Attempt any five questions. All questions carry equal marks. Missing data, if any, may be assumed suitably. 4 (a) Discuss in details the Architecture of Intel 8085 microprocessor & write down its advantages & disadvantages over earlier chips (b) What are the various addressing modes which are applicable on 8085 microprocessors. 2(a) Explain the difference between a hardwired control and microprogrammed control. Is it possible to have a hardwired control associated with a control memory? (b) Explain the different types of instruction formats used in basic computer organization? S 3(a) Explain Direct Memory Access in details? How DMA controller works? Explain the suitable block diagram. (o) Why is priority handling desired in interrupt controllers? How do the different priority schemes works? ) Draw and explain direct mapped cache organization. 3) What do you mean by pipelining? What are instruction pipeline and arithmetic pipeline? 5 (a) Define the following () Micro-operation {ii) Microinstruction (ii) Microprogram (iv) microcode {b) A computer uses a memory unit with 256Kwords of 32 bit each. A binary instruction code is stored in one word of memory, The instruction has four parts: an indirect bit, an operation code, a register code part to specify one of 64 registers, and an address part. (i) How many bits are there in the operation code, the register code part, and the address part?(ii) Draw the instruction word format and indicate the number of bits in each part. (iii) How many bits are there in the data and address inputs of the memory? 6 (a) Write are the differences between RISC and CISC processors, What are multiprocessors? Give an example of RISC and CISC processors (b) What is the difference between isolated /O and Memory-mapped 1/0? What are the advantage and disadvantages of each? 7 (a) Explain the following (Any two) (i) Multiport memory (i) Crossbar switen (iii) Multistage switching network (b) A computer uses 128*8 chip (i) How many chips are needed to provide a memory capacity of 2048 bytes? 29°07 909709 (ji) How many lines of the address bus must be used to access 2048 bytes % - memory? How many of these lines will be common to all chips? (ii) How many lines must be decode for chip select? Specify the size of the decoders. 8 (a) Write short notes on any THREE of the following {a) Pipeline Processor (b) Associative memory (0) Input-Output communication (d) Opcode encoding (e) Firmware SPAAARARARA Ooon. ° eonoceorer 7 Roll No.. i B.E. EXAMINATION OCTOBER - NOVEMBER 2013 Fe 4942/4445 : DIGITAL CIRCUIT & SYSTEM : Time: 3 Hours oximum Marks: 70/100 Minimum Pass Marks : 22/35 Question Attempt any Five questions. All questions carry equal marks. ° tl What are full adder & half adder ckt? explain with their truth table. r 2 Simplify and minimize the following four variable switching functions using Quine Me- Clusky tabulation method. $(4,B,C,D) = Dorzss6 10,11) 3. (a) Draw the circuit of Schmitt trigger and explain how the hysteresis is developed in its output. r {b) Draw the logic diagram of full adder using AND, XOR and OR gates. ci 4. Explain the operation of Astable multi-viberator ckt with suitable wave forms. 5 Describe the working of parallel in and parallel out shift registers. Explain how number can be shifted in or out from such a resistor. 6. (a) _ Implement the following Boolean expression using an 8 : 1 multiplexer : F(A,B,C,D) = xn (1,3,5,10,11,13,14) + d (0,2) (b) Explain with truth table the working of RS-flip flop and what are its disadvantages. 7. (a) Minimize the following expression using k— map: y x m(0,1,5,9,13,14,15) + d G,4,7,10,11) {b) Add the following: . () ABC + CDE (ii) (77)8 + (107)8 8. Write short notes on (any Two) : (Digital to Analog converter i) Sample and hold circuit (iii) Encoder and decoder > (iv) PMOS, NMOS and CMOS (vy) Semi-conductor memories. eeSE SCOGCOSYYIGOSGGVOSVGSGB00 we VeeUGowOuoeoce-: Naot NefMADHAV INSTITUTE OF TECHNOLOGY AND SCIENCE BE. Examination, Noy 2013 Analog & Digital Communication 4YTI (CS & IT) ‘Time: Three Hours Maximum Marks: 70 Minimum pass Marks: 22 Note: Attempt any five questions, All questions carry equal marks, Missing data (if any), may be suitably assumed. Qi Q2 Q3 Q4 Qs Q6 a) ») b) a) >) a) o) b) a) b) Show that a normalized Gaussian pulse is its own Fourier Transform, Find the Fourier transform of a decaying RF(cosine) pulse and draw its spectrum ‘when the frequency is @. Explain Balanced Modulator technique using transistors for DSB-SC Generation? Explain Phase discrimination method for VSB-SC Generation? Briefly explain the function of each block in the AM radio Transmitter? Explain the advantages and disadvantages of Super heterodyne Receiver? Deseribe the generation of narrowband PM and FM signals, using balanced moduiatois? Explain FM ‘Transmitter using Direct Modulation with the help of block diagram? Explain Delta Modulation? List its limitations. Explain the ASK system and derive the relation for error probability of binary ASK? n for mutual information Explain Binary Erasure Channel, Derive the expre and channel capacity What do you mean by joint entropy and conditional entropy?Q7 Qs ®) Explain Huffman coding with the help of an example for M= 2? b) Detive the capacity of a Gaussian channel using Shannon Hartley theorem? Write short notes on (any two) (i) Besse! function (ii) Block Codes Gil) Ratio Detector (iv) Optimum Filter SORA Aaanann aoe anenaee eecooneoneaaonoar oo B.E. Examination October- November,2013 3Y51: Object Oriented Programming and Methodology ‘Note: 1, Total number of questions :8. Attempt any five questions. 2. All questions carry equal marks, Qt @) Explain the basic concepts of object oriented programming . (®) Compare procedural oriented programming and object oriented programming . Q2 (@) What isa friend function. What are the merits and demerits of using friend function. (>) Explain a inline function with a suitable example. Q3 (a) Describe the mechanism of accessing data members and member functions in the following cases: 1. Inside a member function of the same class. 2. Inside a member fimction of the another class. (b) What is operator overloading? Give the rules for overloading operators. Q4(a) What is a parameterized constructor. Explain it with a suitable example. (b) What is function overriding. How this can be removed. Q.5 (a) How is dynamic initialization of objects achieved. (b) What is a conversion function. How is it created. Explain its syntax. Q6 (@) Explain multilevel inheritance with example. (b) What is containership. How it is differ from inheritance. Q.7(a) What is file mode. Describe the various file mode options available. (b) Define virtual fumetion, Why do we need it and when do we make a virtual function ‘pure’. Q.8 Write a short note on: 1. Association and aggregation 2, Abstract base class 3. This pointer 4, Funetion overloadingVECCOCEEEGOSOESESOCEGEEGOOR2R00009000 wec B. E.Main Examination- Nov/Dec 2013 Computer System Organization 3Y52 5 Time ~ Three Hours Max. Marks- 70 Min, Marks- 22 Note- Attempt any five question only. Each one carries equal marks. ~ ‘4, @Explain Von Newman model of computer system. Also give the basics of computer architecture. (b) How many types of instruction format are implemented in different CPU organizations? And ‘how many types of addressing modes are parameterized for instruction 2. (a) Draw the block diagram for the following: 1) 4-Bits Adder/ Subtractor 2) 4x1 channel selector (Note: width of éach channel is 4) ‘What will be size of address bus and data bus in the following cases? 1) 4096%16 bits memory 2) 64x8 bits memory (©) A digital computer has a common bus system for 16 registers of 32 bits each. The bus is o~™ constructed with multiplexers. i. low many selection inputs are there in each multiplexer? What size of multiplexers is needed? ‘How many multiplexers are there in bus? 3,(@) What do you mean by memory organization? Also explain the concept of instruction cycle? (6) Write a program to evaluate the arithmetic statement: A-B+C*(D*E-F) ¢ ao Syke i.-Using a general register computer with three address instructions. “fi. Using a general register computer with two address instructions. iii. Using a general register computer with one address instructions. Or Draw. the block diagram of control unit of a basic digital computer and generate the microinstructions for the following instruction:4, (@) Explain the following € i, Memory Address Register ii, Memory Data Register iii, Instruction Register if iv. Accumulator : (0)Explain the architecture of 8085 microprocessor with different addressing sets. © 5. (@ Explain Direct Memory Access (DMA) controller with block diagram. How DMA © communicaté with other component in computer system, € (b) What disadvantages are with strobe control method in asynchronous data transformation? How — € it resolved by handshaking method? © 6. (@) Explain the concept of Associative Memory? : € (b)How many types of mapping are performed in cache memory? Explain each. © 7. (a) What is cache coherence problem in multiprocessors system? What is solution for it? C6 (b) Discuss the construction of bus and explain how data is transferred from one register to another. ‘ 8. Short notes on any three- € a) RISC and its characteristics € b) General register organization o ¢) Tree state bus buffers € d) Auxiliary memory € © wesene Z DOCK HKOOOR eooe¢ 1(@) (0). 2(@). (b).. 3(@). (b) 4@). (®) 5a) (b) 6(a). 0) 7(@) (). B.E. UI Semester Examination: Dec. 2013 (For CSE/IT/Electrical Engg, Students) 3Y42 Electronics Max. Marks: 70 Max. Time: Three Hours Note: Attempt any five questions. All the questions carry equal marks, All the parts of a question must be attempted in continuation, Answer must be to the point. Assume suitable data if any missing. . Calculate the maximutn efficiency of Class B amplifier. Explain the volt-ampere characteristics of a pn junction and show how the capacitance effect is generated in the pn diode. |. Describe the operation of class AB amplifier to avoid cross over distortion. List different method of biasing a transistor. Explain emitter feedback bias in detail. . Draw a tranistorised astable multivibrator circuit and explain its working with suitable waveforms. Draw a Darlington circuit. Explain why the input impedance of Darlington circuit is higher than that of single stage emitter follower. Explain V-I characteristics of silicon controlled rectifier. An AC voltage V = 240 sin 314t is applied to an SCR half wave rectifier. If the SCR has forward breakdown voltage of 180V, find the time during which SCR remain off. Draw the circuit diagram for a differential amplifier using BjTs. Describe common mode and differential modes of working. With neat circuit diagram, explain the working of a Schmitt trigger circuit. Draw the corresponding waveform, Discuss the effect of negative feedback on gain, bandwidth, distortion and noise. Draw the internal block diagram of 555 timer IC and explain how it can be used as monostable multivibrator, Explain in brief the construction and working of a junction field effect transistor. Draw the circuit diagram of a Wien Bridge oscillator and explain the principle of operation of the same. Write short notes on: (@) Power MOSFET (b) Instrumentation amplifier (©) Freewheel diode,EEE ESE ECCS ES EEE E EEE OUEVDOVEBSBVVYG te wwRoll No. i! B.E. EXAMINATION OCTOBER - NOVEMBER 2013 c 3¥44 : NETWORK ANALYSIS & SYNTHESIS c Time : Three Hours Max Marks : 100 Min Marks : 35 Note : 1.Total Number of Questions are 08, Attempt any five questions. 2. All questions carry equal marks. Q1 (a) In the given network the voltage drop across 20 resistor is 2-27. Then find the value of voltage source. c 40 a 2 Vg Leap CF : : 34 (b) Find the power dissipated in 5 resistor 34 5a 2n 2] Ay sooet ET 32 vat 2 (@) Find the power loss in 3 @ resistor by Thevenin theorem. 2a oy tov ©) 4 Bn (b) State and explain maximum power transfer theorem for D.C. network. Q33 (a) Find the current through j3 © inductive reactance using superposition theorem. 3s tt + _ + a 5230 L-Sae gis ® JoL.60°¥ jan : = (bo) Find the Norton's equivalent circuit for the network shown in fig. at the left of terminal 1-2. Assume I=540° A,Qe Obiain the pole zero diagram of the given function and obtain the time domain response. & Kye ——25___ (S467 +2544) Q.5 (a) Obtain the waveform equation of the square train wave shown in fig. What is its laplace transformation? Armpliuets! & Alte [to [Be : Ban Kp (b) Obtain the fundamental loop and fundamental cut- set matrix for the graph shown in fig. Q.6 A series R-L circuit has R=25Q and L=SH. A de voltage of 100V is applied at t=0. Find (a) the equation for charging current, voltage actoss R and I, (b) the current in the circuit 0.5 second later and (c) the time at which the drops across R and L are same. Q7 (a) Find the Z parameter for given T network. Za Ze + + . oF nF “ 2 Vo. A J 3 (b) Find ABCD parameters for the given cireuit. 5 Bye a Q8 Write short note on the following: (a) Initial and final value theorem (b) Controlled sources a IN AAaae —OMmAana SHOR eM! € € ae eneee OoAas ef ol Roll No. Il B.E. EXAMINATION OCTOBER - NOVEMBER 2013 3Y44 : NETWORK ANALYSIS & SYNTHESIS ‘Time : Three Hours ‘Max Marks : 100 ‘Min Marks : 35 Note: Total Number of Questions are 08. Attempt any five questions. 2. All questions carry equal marks. Q1 (a) In the given network the voltage drop across 20 resistor is 2-e%. ‘Then find the value of voltage source. 4 2h Ns LE (©) Find the power dissipated in 50 resistor, 24 50 Q.2 (a) Find the power loss in 3 Q resistor by Thevenin theorem. ea Meae ww © 4s Ba (b State and explain maximum power transfer theorem for D.C. network. Q3 (a) Find the current through j3 2 inductive reactance using superposition theorem, (b) Find the Norton's equivalent circuit for the network shown in fig. at the left of terminal 1-2. Assume I=S2.0° A,Q.4 Obtain the pole zero diagram of the given function and obtain the time domain response. 28. (S+1)S? +2544) Q5 (@) Obtain the waveform equation of the square train wave shown in fig. What is its laplace transformation? Ms) in fig. Q6 A series R-L circuit has R=25Q and L=SH. A de voltage of 100V is applied at =0. Find (a) the equation for charging current, voltage across R and L (b) the eurrent in the cirouit 0.5 second later and (c) the time at which the drops across R and L. are same, Q7 (@) Find the Z parameter for given T network, Za + Ze . oR Eee % Ze Va Se J (b) Find ABCD parameters for the given circuit. Choe 3 Be t ie Ny 2Q0. 4m Mo 4 ue Q8 Write short note on the following: (@) Initial and final value theorem (b) Controlted sources AMARXANMD + 2°90 SAMAARAAKR eoeoooe oleaeB. E. Main Examination- Nov/Dec 2013 Computer System Organization 3Y52 Time - Three Hours Max. Marks- 70 Note- Attempt any five question only. Each one carries equal marks, ‘Min, Marks- 22 the basics of computer 1. (@Explain Von Newman model of computer system. Also give architecture. (b) How many types of instruction format are implemented in different CPU organizations? And how many types of addressing modes are parameterized for instruction 2: (@ Draw the block diagram for the following: 1) 4- Bits Adder/ Subtractor 2) 4x1 channel selector (Note: width of éach channel is 4) “What will be size of address bus and data bus in the following cases? 1) 4096x16 bits memory 2) 64%8 bits memory (b) A digital computer has a comm constructed with multiplexers. How many selection inputs are there in each multiplexer? .on bus system for 16 registers of 32 bits each. The bus is ‘What size of multiplexers is needed? How many multiplexers are there in bus? 3. (@) What do you mean by memory organizatio! (b) Write a program to evaluate the arithmetic statement: A-B4+C2(D4E-FY GrHet ic Using a general register computer with three address instructions. “Gi. Using a general register computer with two address instructions. 12? Also explain the concept of instruction cycle? _ x= iif, Using a general register computer with one address instructions. ; Or Draw the block diagram of coftrol unit of a basic digital computer and generate the microinstructions for the following instruction:4, (a) Explain the following i, Memory Address Register fi, Memory Data Register iii, Instruction Register iv. Accumulator (b)Explain the architecture of 8085 microprocessor with different addressing sets. 5. (@ Explain Direct Memory Access (DMA) controller with block diagram. How DMA commanicaté with other component in computer system. (b) What disadvantages are with strobe control method in asynchronous data transformation? How it resolved by handshaking method? 6. (a) Explain the concept of Associative Memory? * (b)How many types of mapping are performed in cache memory? Explain each. 7 (@) What is cache coherence problem in multiprocessors system? What is solution for it? | (b) Discuss the construction of bus. and explain how data is transferred from one register to another. 8. Short notes on any three- a) RISC and its characteristics b) General register organization c) Tree state bus bufiiers @) Auxiliary memory AOAR9A4A9 aAnan a CARR AARAR eooeooo o ooo“” B.E. II] Semester Examination: Dec. 2013 (For CSE/IT/Electrical Engg. Students) 3Y42 Blectronics Max. Marks: 70 Max. Time: Three Hours: ay % Note: Attempt any five questions. All the questions carry equal marks. All the parts of a question must be attempted in continuation, Answer must be to the point, c Assume suitable data if any missing. 1a). Calculate the maximum efficiency of Class B amplifier: c (>). Explain the volt-ampere characteristics of a pn junction and show how the capacitance effect is generated in the pn diode. c 2(a). Describe the operation of class AB amplifier to avoid cross over distortion. (b). List different method of biasing a transistor. Explain emitter feedback bias in c detail. “< 3{a). Draw a tranistorised astable multivibrator circuit and explain its working with c suitable waveforms. {b) Draw a Darlington circuit. Explain why the input impedance of Darlington circuit is higher than that of single stage emitter follower. Ala). Explain V-I characteristics of silicon controlled rectifier, o (b). An AC voltage V = 240 sin 314t is applied to an SCR half wave rectifier. If the SCR has forward breakdown voltage of 180V, find the time during which SCR , remain off. 5(a) Draw the circuit diagram for a differential amplifier using BJTs. Describe common mode and differential modes of working. (b) With neat circuit diagram, explain the working of a Schmitt trigger circuit. Draw the corresponding waveform. a 6{a). Discuss the effect of negative feedback on gain, bandwidth, distortion and u noise. (b) Draw the internal block diagram of 555 timer JC and explain how it can be used as monostable multivibrator. a 7(a@] ‘Explain in brief the construction and working of a junction field effect transistor. (). Draw the circuit diagram of a Wien Bridge oscillator and explain the principle of operation of the same. 8. Write short notes on: (a) Power MOSFET (b) Instrumentation amplifier (c) Freewheel diode.eee OO VeGOSZSZ9290308of ‘M.Tech Examination- November / December 2013 MCSIL | MITL-915/MCSE/MIT-10S: Mobile Computing & M-Commerce ‘Time: Three Hours Max Marks: 70 Note: Total numbers of questions are: 08. Attempt any five questions. All questions carry equal marks. Qt. @) Discuss the Architecture of basic celular system with the help of diagram. Also “discuss the process of registering a mobile station in the network. (b) How is a wireless network different from a wired network? Explain at least five differences. ‘ 2. (@) What are VER and HER, where they are physically located and why we need them? (b) Differentiate between 2G and 3G systems. Also discuss about the relative coverage, mobility and data rates of second and third generations of systems. 3. (@) Write a comparison between TDMA, FDMA and CDMA. Also specify the shortcomings and advantages of each of the multiple division techniques. (b) Why GPRS is considered as an improvement over HSCSD? Specify the key features of both HSCSD and GPRS. Also perform a Comparison between GPRS and HSCSD. Q4. (@) Explain the Nine services provided by the system using 802-11 Standard. (b) What do you mean by Mobile IP? Demonstrate the working of Mobile IP with the help of example network. Q5. (@) Name six mobile data services, data rates supported by them, frequency of operation, channel eccess mechanism and associated modulation techniques. (&) Discuss the Architecture of GSM system. Also discuss about three types of services provided by GSM. . 6. (a) Explain the protocol stack of IBEB 802.11 (WLAN). Which WLAN standard first adopted the 5 GHz band operation?(©) Discuss the reference architecture of IEEE 802.11. Give the detailed explanation of FHSS and DSSS transmission techniques. Q7. (@ Whats 18-41? Why is it important in North American cellular systems? (b) Disouss the following: (i) M-Commerce Life Cycle and Emerging applications of M-Commerce )) Quality of services in 3G WAP (Wireless Application Protocol) (iv) Roles of 3GPP and 3GPP2 in 3G system development Q8. (a) Discuss the following (any four): @ Global 3G Standard Gi) TR-45/46 reference model Gi) Global Mobile Satellite Systems (iv). WCDMA and CDMA 2000 () Wi-Fi and Wi-Max (6) What do you mean by Bluetooth technology? Discuss the architecture and frame format of Bluetooth. OMROMAAAMRAMRAAAAAADYAA Aan neoenaeneenre neM-Tech. Examination MCSE302: Network Security ‘Time: 3 hrs. Max. Marks: 70. Min. Pass marks: 28 Note: Total no of question: 08.Attempt any five question. All question carry equal marks Q.I (@) Define various security services along with available security mechanisms. What is difference between ‘Threat and attack? (b) Explain Claude Shannon principal for product cipher. Describe rail fence cipher with the help of suitable example, Q2 (@ with the help of block diagram explain DES encryption algorithm, How can determine the strength of DES? (b) Explain Meet in the Middle attack using suitable example. Define ECB block cipher modes of operation, (3 (a) Using suitable example explains Euler totient function, What is need of Chinese remainder theorem? (b) Explain why the security of RSA depends on the difficulty of factoring large numbers. Give detail all possible approaches to attacking the RSA algorithm, Q4 (@) what requirements must a public key eryptosystem fulfil to be a secure algorithm? List four general categories of schemes for the distribution of public keys. (©) Assume prime number p=17, base g=13 and secret integers as x~3 and y~7, Use Diffie Hellman key exchange algorithm and find out the values of messages A, B and secret key (SI or $2). Q5 (@) what are the various requirements for a hash function to be used for massage authentication. What do you mean by birthday attack? (@) Explain in detail SHA-1 compression function. Write the working principal of Kerberos. 6 (@) How to perform SET (Secure Electronic Transaction) for online shopping? Explain it with the help of suitable example. (©) How can implement security services in wireless LAN? What is role of RADIUS server for achieving authentication services? Q.7 @) Define various type of firewall. Describe mechanism for designing trusted system, (&) Describe a security provision for achieving security in email. How to manage digital certificates using PKI (Public Key Infrastructure)? Q.8 Writes short Notes on the following (any thee). 1.SSL 2.1PSee 3.X.509,eG SCGCCECSCEEES ee Oe ee a) © e i)M.Tech, Examination 'MIT302: Information Security & Systems Time: 3 hrs. Max. Marks: 70 Min, Pass marks: 28 Note: Total no of question: O8. Attempt any five question, All question carry equal marks Ql (@) what is difference between an unconditionally secure cipher and computationally secure cipher? Briefly ofine the playfair cipher. (b) List and briefly define types of eryptanalytic attacks based on what is known to the attacker. What are two problems with the onetime pad? Q2 (@) write Chinese remainder theorem using suitable example. With the help of suitable example define discrete logarithms, (b) What is avalanche effect in DES? Define various mode of cipher using suitable block diagram. Q3 (@) Perform eneryption and decryption using the following parameters: p= Pll, e=7 and M=2? Briefly define BLGAMAL public key eneryption algorithm. (b) Explain various ways for the distribution of public keys. Describe key scheduling algorithm for RC4 cipher. Q.4 (2 Describe how can design block cipher using Whirlpool secure hash function. How KERBEROS version- 5 dialogue works? (Define digital signature and digital certificate standard using suitable block diagram. 5 () How can achieve security services using SNMPV3? Describe the Security functions, Memory Protection and Access Control perform by Operating System. (6) What is Trusted Operating System? What is requirement of trusted path and trusted computing base for implementing Trusted Operating System? 6 (@) Define various type of malicious software. Explain Worm propagation model with the help of suitable diagram, (b) Deseribe design principal, type and architecture of firewall, Q7 (a) How can achieve various security services in web? Describe the various techniques for intrusion detection. (b) Give detail about available security provision in JAVA. Describe the role of reference monitor for designing a trusted system, Q.8 Writes short Notes on the following (any three). 1. Elliptic curve cryptography 2. AES 3. Buler’s TheoremVee Sooeeeoeeosoes w SCOOCSCESCHSHBBZOBRBBGY odC ¢ ‘Maximum Marks: 70 Note: Attempt any five M. Tech. Examination, Dec 2013 Advanced Computer Networks MCSE/MIT 104 ‘Time: Three Hours Minimum pass Marks: 28 uestions. All questions carry equal marks. Missing data (ifany), may be suitably assumed. Qu. Q2. Q3. Q4. Qs. Q6. Qi. a) b) a) b a » » ) ») What do you mean by congestion in networks? Discuss congestion control in ‘TCP. One of the addresses in a block is 205.16.37.39/28. Find the number of addresses in network, the first address and last address? Why are routing protocols based on distance vector routing and link state routing algorithms not suitable for inter-domain routing on the internet? What are the problems associated with distance vector routing. Explain User Datagram Protocol (UDP) in detail. Why does UDP exist? Would it not have been enough to just let user processes send raw IP packets? Compare the individual fields of IPV4 header and IPV6 header? ‘An IPV4 packet has arrived with the first 8 bits as 01000010.The receiver discards the packet. Why? Explain in detail ATM switching networks. What is the relationship between TP, VP and VC in ATM technology? Explain B-ISDN Model architecture. Also explain the functions of different layers, Explain DSR protocol for Mobile ad-hoo networks. Explain in detail challenges faced in wireless ad-hoc networks as compared to other networks. Explain wireless sensor networks and their practical applications in detail, Explain the working principle of optical amplifier in optical networks. Describe different splicing and connectors used in optical networksQ8. Write short notes on any two: (Virtual private network Gi) Domain name system Giil) Differences between ARP and RARP. POAC OMDBFANBAOB9DAA 2 af eenroeronoaeons aon n0°8Roll No. |. Tech. Examination Oct-Nov 2013 MITL-913/MIT-103: Advance Computer Graphics ‘Time: 3 Hrs. Max marks: 70 Min Pass marks: 28 Note: Attempt any five questions, All questions carry equal marks. 1. (a) Compare and contrast the raster and random scan system, In a 24-bit plane color frame buffer with a 10 bit wide lookup tables for each of three colors, how many colors are possible at a given instant? How many total colors are possible? (b) Find the pixel location approximating the first octant of a circle having @ center (10,13) and a radius of 5 units using the Bresenhams circle algorithm. 2, {a) Why is the Liang-Barky algorithm more efficient than the Cohen-Sutherland algorithm. (b) Use the Cohen-Sutherland outcode algorithm to clip two lines Ps(40, 15) - P2(75, 45) and P:(70, 20) ~ Ps(100, 10) against a window A(S0, 10), B(80, 10), (80, 40) and D(50, 40). 3. (a) Give the sequence of transformations required to reflect the object about the line : y =2x-10. (b) Find a transformation Av which aligns a given vector V with the vector K along the positive z-axis. . 4, (a) Define orthographic and oblique projection. Drive mathematica) model and transformation matrix for parallel projection. (b) Drive the general perspective transformation onto a plane with reference point Ro(xo, ye, 28), normal vector N =n + nj + msic and using C (a, b, ¢) as the centre of projection.5. (a) Discuss various methods of area filling and state the relative merits and demerits of each, (b) Explain Gourand Shading method. Discuss its advantages and disadvantages over the phong technique. 6. (a) What are the properties associated with curve? Explain significance of each of them, ~ (b) Four control points Po(a, b), Ps(2, 5), Pe(4, 4) and P3(7, ¢) are available for drawing a uniform quadratic B-spline curve segment, Compute the values of a,b and c such that the curve starts from the point (1, 4) and terminates with slope -0.5. 7.(a) Explain briefly the various real- time animation techniques used in computer- assisted animation, What is the advantage of real- time animation over frame-by- frame animation? () Discuss the production rule of a grammar-based modeling procedure that influences the final shape of the model. 8. Write short notes on (any three)- (a) Point inclusion problem (b) Z-buffer algorithm (©) Interpolation - (@) Morphing (€) HSV and HLS color modals oy ry SOOBMANRA ~ 2ANnaa 99% aAnana oo00 OOenM.Tech Examination, November-2003 ‘Advanced Computer Architecture MCSL-913/ MCSE- 103 Time- Three hours Maximum Marks : 70 Minimum Marks : 28 Note- Attempt any five questions. All questions carry equal marks, Missing data (if any), may be suitably assumed. 1 (@) What are needs of Parallelism in computer architecture? What system attributes are necessary for increasing performance of a system? ~ (b) Explain shared- memory multiprocessor models for parallel computing, 2, (@)__ Explain the levels of parallelism in programs. Also discuss communication latency and scheduling issues with parallelism (b) Explain the characteristics parallel algorithms. And what challenges are with parallel processing? 3. (@__ Howmany types of scaled problems occur with parallel computer system? (b) Explain the concept of Pipelining in Superscalar Processors. Also explain architecture for RISC processor. 4, (@) What do you understand by sequential and week consistency models ? Discuss. b) Explain cache addressing models. And what issues with cache performance come ¢ in cache designing? 5. (a) Explain the bus system at board level with internal diagram. Also discuss bus architecture for designing a scalable multiprocessor. (b) Discuss crossbar networks with semantic design issues. What are its limitations ? 6. @_ Whats the message passing mechanism in multicomputer network? Explain with routing schemes. (©) Explain the pre-fetching and coherent cache approaches for latency hiding.@ © What is the basic principle and issues behind Multithreading? Discuss with architecture. Explain various models for parallel programming. Write short notes on (any three) : () Code optimization and scheduling (ii) Implicit Parallesim (iii) Array computers (iv) Shared memory organization YAMA ra OOHEAOAOMOBARARAADAAANRANRBHAARSA oeM.Tech. Examination MCSE/MIT 102: Distributed System brs. Max. Marks: 70 Min, Pass marks: 28 ‘Time: Note: Total no of question: 08.Attempt any five question. All question carry equal marks QI (@) Describe the Hardware and Software components of distributed system using suitable example. What is difference between parallel and distributed computing? (©) How to achieve group communication in distibuted system? Define various type of client server protocol in distributed system. Q.2 (a) In RPG, the called procedure may be on the same computer as the calling procedure or it may be on a different computer. Explain why the term remote procedure call is used even when the called procedure ‘on the same computer as the calling procedure. I clocks by (b) Define the various conditions for implementing logical clock & how can implement lo} using counter? tional. Can ring based election algorithm be made more efficient? Justify your Q3 @ Suppose the ring bi answer briefly. (&) Explain vatious mechanisms for synchronizing threads when they are trying to access same data simultaneously. (Qu4(a) what is atomic broadcast? Explain synchronised atomic broadcast algorithm. (b) Explain Group model and peer to peer communication model in distributed computing, (QS (@) Define general architecture of DSM System with the help of suitable block diagram, (b) How release consistency Model achieve better performance for maintaining degree of consistency in shared memory data? Q6 (a) How to define fault tolerant architecture in distributed system? Differentiate fault, error and failure using, suitable example, (b) Explain any one algorithm for implementing failure detection in distributed system. Q.7()Define the characteristics of distributed multimedia systera and Explain resource management and stream ‘adaptation techniques in distributed multimedia system. (b) How can achieve confidentiality, authentication and access control security services in distributed system? Q.8 Write short Notes on the following (any three). 1. Cache coherence in distributed fle system 2. FT consensus 3. CORBA 4, Space time and value redundancy in istributed systemBert ce ede ec cede ee dee eee eee wwMadhav Institute of Technology & Science M. Tech. Examination, De¢ 2013 MCSE/MIT-301 Image Processing and Retrieval Techniques (GS) ‘Time: Three Hours Maximum Marks: 70 Minimum pass Marks: 28 Note: Attempt any five questions. All questions carry equal marks. Missing data (if any), may be suitably assumed. Qi Q2 Q3 Q4 Qs Qe a ») a) ») a) b) 9 b) a) b) a) b) Explain about sampling and quantization process in a digital image. Explain basic relationships and distance measures between pixels in a digital image: Explain adaptive filter and also explain the two levels of adaptive median filtering algorithms. Discuss in detail the homomorphic and derivative filters. What is meani by image enhancement by point processing? Discuss any two spatial domain filter methods for image enhancement. Define histogram of a digital image, Explain how histogram is useful in image enhancement? What is meant by image subtraction? Discuss various areas of application of image subteaction. Explain in detail the FFT transform and how is it derived? What are the derivative operators useful in image segmentation? Explain their role in segmentation, Explain about basic adaptive thresholding process used in image segmentation. Explain the concept of region based segmentation? Explain the concept of Inverse Filtering? Explain the Wiener Filter construction. Explain.Q7 Q8 @) Define image compression. Explain about the redundancies in a digital image, b) Explain in detail SVD transform and write an algorithm for it. Write short notes on (any tivo) () Wavelet Transform (ii) Edge Detection Image Restoration (iv) Haar Transform OPROABAR9AA9AARAAG CAOnAnanans OOOCMeOM OO: oeRoll No. 1M. TECH. EXAMINATION OCTOBER - NOVEMBER 2013 MCSL-911/MCSE-101 : THEORETICAL FOUNDATION OF COMPUTER SCIENCE Time :3 Hours Moxirum Marks: 70, Minimum Pass Marks :28 Question Attempt any Five questions. All questions carry equal marks. No. 1. (a) Define the follo 1g the example : Kuratowiski graphs Colouring of graphs (ii) Chromatic polynomials (iv) Four colour problem. (b) For planer graph, prove that n—e+r=2 Where n= number of vertices e= number of edges F = regions of graph. 2. (a) Let G be a connected graph 8,q that every region of G has at least 5 edges on boundary then prove that 3e<5n-10, Where 2 = number of edges and = number of vertices ‘Also write a counter example. (b) (i) Prove that a graph at least one edges is 2 ~ chromatic if and only if has no circuit of odd length. (i) Explain incidence matrix of the directed graph with example. 3. (a) Define the following terms with example: ()— ce-cut and strong « cut. (ii) Extension principal and Fuzzy relation. (b) Define cardinality and fuzzy complement, show that every fuzzy complement has at most one equilibrium. 4. (a) Let A,B, Ce fix). Then for «, B, € [0, 1}. Prove that : AM%p and (aya) =%4U%y i) ane) Wi) bana = EO (i) A) = A 095 {b) A tightly stretched flexible string has its ends fixed at x = 0 and x =1. at time t= 0 the string Is given a shape defined by f{x) = x (Ix) and then released. Find the displacement u (x,t) of any point x of the string at any time t> 0. 5. (a) Find the cubic spline polynomial corresponding to the interval [1, 2] from the following, data: BeeiEeeH BeEtHEoa eee eae a 09 with boundary Mi = M4 = 0(o) (a) (b) (a) (b) fa) (b) Apply Hermite interpolating formula to find a polynomial from the following data : x 7 too 4 fo) a. 0 4 PO): o 0 0 Ina sample survey of public opinion, answer to the question : (i) Do you drink? (ii) Are you in favour of local opinion on sale of liquor? Are tabulated below : Question Yes No Total answer |¥S. 56 31 87 No 18, 6 24 Total 74 37. it Can you infer whether or not the local option on the sale of liquor is dependent on individual drink? (Gives that the value of Chi-square for DOF 2 at 5% level of significance is 3.843). Explain the following with example : i) Testing of Hypothesis (i) ANOVA for one way classification (ii) Degree of freedom. A random sample of size 16 has as mean is 53. The sum of the squares of the deviations taken from the mean is 150, Can this sample be regarded as taken from the population having 56 as mean? Obtain 95% confidence limits of the mean population (Give for DOF v= 15, toos= 2.134). Explain the foliowing terms with example : {) Markov process and Markov chain. (i) Transition matrix and regular transition matrix. Obtain the steady state solution of (M|M]|1) : («/FCFS) system and also find expected value of queue length n. Customers arrive at a one-man barbershop according to Poisson process with mean interval time of 12 min. Customers spend an average of 10 minutes. In the barber's, chain: ‘ (i) What is the expected number of customers in the barbershop and in the queue? (i) How much time cana customer expect to spend in the shop? (i) What is the average time customers spend in the queue? {iv} What is the probability that more than 3 customers are in the system? a ARAMAARANRAAAS an a € € € € € Cc Cee RMF OLE eRoll No... 7 1 M.TECH. EXAMINATION OCTOBER - NOVEMBER 2013 MITL-911/MIT-101 : MATHEMATICAL FOUNDATIONS OF INFORMATION TECHNOLOGY Time 3 Hors Maximum Marks :70 Minimum Poss Marks : 28 Question Attempt any Five questions. All questions carry equal marks. No. 1. (a) Define the following with exampl (i) Kurtowiski graphs ') Colouring of graph (iii) Chromatic polynomial (iv) Four colour problem, {b) Fora planar graph G, prove thatn—e+r=2. Where n= Number of vertices Jumber of edges Regions 2. (a) Let G be a connected graph such that every region of G hes at least 5 edges on its boundary then, prove that 3e s Sn~ 10, where e is number of edges and n is number of vertices. Also write a counter example. () (i) Prove that a graph at least one edge is 2-chromatic if and only if has no circuit of odd length. il) Explain incidence matrix of a di-graph with example. 3. (a) Define the following with example : (i) cc-cut and strong a-cut. i) Extension principle and fuzzy relation. {b} Define cardinality and fuzzy complement. Show that every fuzzy complement has at ‘most one equilibrium. 4, (a) Let A,B,C ¢ ffx), for all «, B € (0, 1). Prove that : (ana) = KNX and HK (qua) = XA U My (i) ana = ef U os (ii) x@m= A-“f {b) A tightly stretched flexible string has its ends fixed at x = O and x= |. At time t=0, the string is glven a shape defined by f(x) = x (I~ x), and then released. Find the displacement u (x, t) of any point x of the string at any time t> 0. 5. {a) _ Find the cubic spline polynomial for the interval (1, 2 from the following data : perce ete anata a fl) SEE See eater with boundary M, =Mq=0(b) fa) (b) (a) (b) Using Hermite polynomial formula, find a polynomial f(x), if % Chesser lx) 9, 1 Fox: oO, 1 In a sample survey of public opinion, answer to the question (i) Do you drink? (i) Are ‘you in favour of local opinion on sale of liquor? are tabulated below : Yes No Total Yes 56 31 87 No 18 6 24 Total 74 37 ait Can you infer whether or not the local option on the sale of liquor is dependent on individual drink? (Given that the value of Chi-square for DOF 1 at 5% level of significance is 3.841). Explain the following i) Testing of Hypothesis )) ANOVA for one way classification ) Degree of freedom A salesman is expected to effect an average sales of Rs. 3500. A sample test revealed that as particular salesman had made the following sales. Rs. 3700, 3400, 2500, 5200, 3000 and 2000. Conclude whether his work is below standard or not? Using 5% level of significance of t and 5 dof is 2.015. Explain the following : () Markov process and Markov chain, (ii) Transition probabilistic matrix and Regular transition matrix. Obtain steady state solution of (M|M|1) : (oc/FCFS) system. Also find expected value of queue length n. Customers arrive at a one-man barbershop according to Poisson process with a mean inter-arrive time of 12 minutes. Customers spend an average of 10 minutes. In the barber's chain () What is the expected number of customers in the barbershop and in the queue? (ii) How much time can a customer expect to spend in the shop? (ii) What is the average time customers spend in the queue? (iv) What is the probability that more than 3 customers are in the system? RRR REE 999999090 AAAs A AMOAAARAD SOEOHOM OCHO HENMAN:Total Questions: Roll Now M.Tech (GSE) Examination, Nov/Dec 2013 Advanced Topics in Data Mining & Warehousing MCSEI/MIT-204 Time: Three hours Note: Attempt arly Five Questions. All questions carry equal marks. 4(a) Briefly explain data mining and define it. Discuss some of the reasons for growth in enterprise data. (b) What are the different operations which are generally performed on a data warehouse? Explain with the help of suitable examples. 2 (a) Discuss different tasks and techniques of data mining in brief. (b) What do you understand by discretization ? What is the importance of discretization in data mining ? 3(a) Identify and describe the phases in the KDD process. How does KDD differ from data mining?. (b) Give the architecture of a data mining system. What are the essential components of a data mining system? Describe the purpose of each of these components. 4(a) What do you understand by association rule mining? Write and discuss: Apriori algorithm. What are the drawbacks of this algorithm? PTO(b) (6) Describe any one algorithm for mining association rules. A database has four transactions. Let Minimum Support = 35% and Minimum Confidence =85%. TID Item-bought = 100 A,B, D,K 200 AB,CD.E 300 CE 400 ABD () Find all frequent temsets (ii) List all of the strong association rules along with their confidence 5(a) Prove that if the support of a frequent itemset is greater than or equal to the minimum confidence required for the rule, then all association rules generated by such itemset or from its subset will have confidence at least equal to the minimum required confidence. (b) What do you understand by Post-mining? Why is it useful? List and explain some post mining operations. 6(a) Take any commercial data mining system and outline the major features of such a system. (b) What is supervised classification? In what situations can this technique be useful? 7{(a) Explain the aim of Cluster Analysis? Suggest any one application of data mining where clustering can be used for mining the hidden knowledge. (b) Write and discuss C4.5 Algorithm with the help of suitable example. 8. Write the short notes on the following (any three): Advantages of data Warehousing Benefits of Pre- mining Challenges in Data mining Web content mining Meta data Mining 27O9094 SAAAaanr € € € © € € € € € ao COOHMEHROCOESMadhav Institute of Technology & Science M. Tech. Examination, Dec 2013 c MCSE/MIT-202 Soft Computing (GS) Time: Three Hours : Maximum Marks: 70 Minimum pass Marks: 28 Note: Attempt any five questions. All questions carry equal marks. Missing data (if any), may be suitably assumed, o QI a) Explain the linear separability problem. Justify XOR function is non linearly separable by a single decision boundary line b) Mention different types of activation functions, along with their significance in different models. Q2 8) Derive the generalized delta learning rule. What are the factors that improve the convergence of learning in BPN networks? b) Explain the training algorithm of radial basis function network, Q3 a) Explain different ypes of membership functions used in fuzzification process b) Explain fuzzy rule based inference model with suitable example. : Q4 a) X= 12,3,4,5,6,7,8,9}.¥ =(1.2,3,4,5,6} Calculate the fuzzy relation for fuzzy mapping rule from X to Y. IF xis Medium, THEN y is small Where Medium and Small are fuzzy subsets of X and Y characterized by the following membership funetions, 0a 03,072,107 08 3 EB at 8 1 09 06 a 03 On 5 6 b) Explain Mamdani model in detail. Compare it with other models. 07 Medium 42 9 Q5 a) Explain binary planer partitioning with suitable example. b) What is markov chain. Explain its application for weather prediction. Q6 a) Sketch the low chart of steps of genetic algorithm, Compare genetic algorithm and simulated annealing method. plain different genetic algorithm operatorsQ7 Q8 2) Explain the architecture of Adaptive Neuro Fuzzy Inference Systems (ANFIS). Also explain functionalities associated with each layer. b) Explain cooperative neuro fuzzy systems in detail, ‘Write short notes on (any two) (i) Gradient free optimization (i) Hop field network (iii) Las Vegas and Monte-Carlo algorithm (iv) Fuzzy Reasoning AAARAARAAAAAA COHRARMBOA FA ER ARAAR ARAN e xX
You might also like
June12 All Cse It Paper PDF
PDF
No ratings yet
June12 All Cse It Paper PDF
68 pages
Dec 2018paper Cse It PDF
PDF
No ratings yet
Dec 2018paper Cse It PDF
88 pages
University of Technology Computer Science Department Date: 13/9/2011 Time: 3 Hours
PDF
No ratings yet
University of Technology Computer Science Department Date: 13/9/2011 Time: 3 Hours
12 pages
Sem5 Question Paper
PDF
No ratings yet
Sem5 Question Paper
11 pages
M. Tech. Semester - I: Advanced Computer Architecture (MCSCS102IBMCSCS 902)
PDF
No ratings yet
M. Tech. Semester - I: Advanced Computer Architecture (MCSCS102IBMCSCS 902)
12 pages
DocScanner 12 Jan 2024 12-36
PDF
No ratings yet
DocScanner 12 Jan 2024 12-36
43 pages
Sem3 Question
PDF
No ratings yet
Sem3 Question
8 pages
May 2024
PDF
No ratings yet
May 2024
7 pages
Sem3 QP
PDF
No ratings yet
Sem3 QP
10 pages
Be Computer Sem-Vii Dec 2019.
PDF
No ratings yet
Be Computer Sem-Vii Dec 2019.
11 pages
May 24
PDF
No ratings yet
May 24
8 pages
Aids Pyqs and Dsa For Engineers 2nd Year
PDF
No ratings yet
Aids Pyqs and Dsa For Engineers 2nd Year
50 pages
Computer M.E. Sem I Cbcgs May 2024
PDF
No ratings yet
Computer M.E. Sem I Cbcgs May 2024
4 pages
3rd Sem - End Term
PDF
No ratings yet
3rd Sem - End Term
8 pages
Dec 2023
PDF
No ratings yet
Dec 2023
8 pages
Calicut University BTech Solved Question Papers Fifth Semester Btech
PDF
No ratings yet
Calicut University BTech Solved Question Papers Fifth Semester Btech
21 pages
Computer Science Paper Ii 2023 Wb-Set (Ifas Solved Paper)
PDF
No ratings yet
Computer Science Paper Ii 2023 Wb-Set (Ifas Solved Paper)
17 pages
Hawassa University
PDF
No ratings yet
Hawassa University
30 pages
اسئلة الامتحان التنافسي للدبلوم 2
PDF
No ratings yet
اسئلة الامتحان التنافسي للدبلوم 2
9 pages
2024 End-Sem
PDF
No ratings yet
2024 End-Sem
7 pages
COMPUTER SC. SL PAPER ONE in ENGLISH
PDF
No ratings yet
COMPUTER SC. SL PAPER ONE in ENGLISH
5 pages
Taleem City Institute: Ameenpur, Faisalabad 03126987979
PDF
No ratings yet
Taleem City Institute: Ameenpur, Faisalabad 03126987979
20 pages
Iii Cs-It 20251
PDF
No ratings yet
Iii Cs-It 20251
23 pages
May 2023
PDF
No ratings yet
May 2023
12 pages
HSST Cs
PDF
No ratings yet
HSST Cs
12 pages
PMSCS
PDF
50% (4)
PMSCS
2 pages
Papers - Final
PDF
No ratings yet
Papers - Final
5 pages
Dec 22
PDF
No ratings yet
Dec 22
7 pages
M. Tech. Semester - I: Distributed Computing (MCSCS 101/1MCS1)
PDF
No ratings yet
M. Tech. Semester - I: Distributed Computing (MCSCS 101/1MCS1)
20 pages
06CS6013-H Combine
PDF
No ratings yet
06CS6013-H Combine
73 pages
2019 Question Papers 5th Sem CSD
PDF
No ratings yet
2019 Question Papers 5th Sem CSD
8 pages
Compre QA1 PDF
PDF
No ratings yet
Compre QA1 PDF
3 pages
IET DAVV 2014 Com
PDF
No ratings yet
IET DAVV 2014 Com
15 pages
Certificate in Computing (Cic) : Tbrm-End Examination Clune, 2008
PDF
No ratings yet
Certificate in Computing (Cic) : Tbrm-End Examination Clune, 2008
20 pages
Previous Year Paper - Sem 7
PDF
No ratings yet
Previous Year Paper - Sem 7
12 pages
All Sub Merged
PDF
No ratings yet
All Sub Merged
6 pages
Course Code: IT352 Course Name: Comprehensive Exam: Part A-Common Courses
PDF
No ratings yet
Course Code: IT352 Course Name: Comprehensive Exam: Part A-Common Courses
5 pages
Mid Term Question Paper Semester 5
PDF
No ratings yet
Mid Term Question Paper Semester 5
8 pages
Model With Answer
PDF
No ratings yet
Model With Answer
72 pages
Mca Nov-2023 (2020 Pattern)
PDF
No ratings yet
Mca Nov-2023 (2020 Pattern)
11 pages
Qpapers 1
PDF
No ratings yet
Qpapers 1
18 pages
HSST Computer Science 2013 (SC - ST) PDF
PDF
100% (3)
HSST Computer Science 2013 (SC - ST) PDF
7 pages
(F3, Il#Flt - To ,,nication: Time) Examination, 2K6 701
PDF
No ratings yet
(F3, Il#Flt - To ,,nication: Time) Examination, 2K6 701
14 pages
D15be7 Com Cbgs
PDF
No ratings yet
D15be7 Com Cbgs
8 pages
IIOT USAR Sem 5 Mid Sem PYQs
PDF
No ratings yet
IIOT USAR Sem 5 Mid Sem PYQs
8 pages
اسئلة تنافسي 2019-2020
PDF
No ratings yet
اسئلة تنافسي 2019-2020
5 pages
AI FinalExam
PDF
No ratings yet
AI FinalExam
5 pages
2012 June UGC NET Paper II
PDF
No ratings yet
2012 June UGC NET Paper II
9 pages
1st Midterm
PDF
No ratings yet
1st Midterm
13 pages
7.1 Computing MS Semester 1 24-25
PDF
No ratings yet
7.1 Computing MS Semester 1 24-25
9 pages
2023 PYqs 5th Sem
PDF
No ratings yet
2023 PYqs 5th Sem
11 pages
Model Papers
PDF
No ratings yet
Model Papers
29 pages
Software Engineering - Mock Exit Exam 2023l24
PDF
No ratings yet
Software Engineering - Mock Exit Exam 2023l24
28 pages
300L Computer Science & IT Pass Q
PDF
No ratings yet
300L Computer Science & IT Pass Q
10 pages
Calicut University BTech Solved Question Papers Fourth It Dec 2004
PDF
No ratings yet
Calicut University BTech Solved Question Papers Fourth It Dec 2004
4 pages
Guide To Happy Confinement
PDF
No ratings yet
Guide To Happy Confinement
14 pages
Q.1 Design A Program For Creating A Machine That Accept Three Consecutive Ones. Program
PDF
50% (2)
Q.1 Design A Program For Creating A Machine That Accept Three Consecutive Ones. Program
44 pages
Chapter 10
PDF
No ratings yet
Chapter 10
9 pages
IIIrd Year All Branch Paper June 2019
PDF
No ratings yet
IIIrd Year All Branch Paper June 2019
208 pages
Bootstrapping in Compiler Design
PDF
No ratings yet
Bootstrapping in Compiler Design
2 pages
Dec 17 All Papers PDF
PDF
No ratings yet
Dec 17 All Papers PDF
646 pages
Design Issues: 1. Input To The Code Generator
PDF
100% (1)
Design Issues: 1. Input To The Code Generator
3 pages
All B e June 2014
PDF
No ratings yet
All B e June 2014
208 pages
Minor Project (2019-2020)
PDF
No ratings yet
Minor Project (2019-2020)
14 pages
Data Bus Devices and Baud Rate
PDF
No ratings yet
Data Bus Devices and Baud Rate
1 page
GEOTHERMAL POWER (Aashutosh Tiwari)
PDF
No ratings yet
GEOTHERMAL POWER (Aashutosh Tiwari)
17 pages
Portability
PDF
No ratings yet
Portability
1 page
Assi Conge
PDF
No ratings yet
Assi Conge
2 pages
Q.9 Design A Program To Convert NFA To DFA. Program
PDF
No ratings yet
Q.9 Design A Program To Convert NFA To DFA. Program
12 pages
Raspberry Pi Python Gpio
PDF
No ratings yet
Raspberry Pi Python Gpio
9 pages
Madhav Institute of Technology & SCIENCE GWALIOR, M.P. - 474005
PDF
No ratings yet
Madhav Institute of Technology & SCIENCE GWALIOR, M.P. - 474005
5 pages
Schools of Management Thoughts
PDF
No ratings yet
Schools of Management Thoughts
5 pages
Protocol: RS-232 Mechanical Specification
PDF
No ratings yet
Protocol: RS-232 Mechanical Specification
4 pages
TOC File
PDF
No ratings yet
TOC File
24 pages
TOC Practical Front Page and Index
PDF
No ratings yet
TOC Practical Front Page and Index
5 pages
Software Process Software Process: Week 2
PDF
No ratings yet
Software Process Software Process: Week 2
26 pages
What Is Software Testing Life Cycle
PDF
No ratings yet
What Is Software Testing Life Cycle
5 pages