3rd Sessional
3rd Sessional
D FACULITY OF TECHNOLOGY
THIRD SESSIONAL
SUBJECT: Machine Learning (CE622)
INSTRUCTIONS:
1. Figures to the right indicate maximum marks for that question.
2. The symbols used carry their usual meanings.
3. Assume suitable data, if required & mention them clearly.
4. Draw neat sketches wherever necessary.
Q.1 Do as directed.
|12}
CO1 N (a) Which Machine Learning Algorithm you would use to automatically identify the category of a 2)
product based on the description of the
CO2 R (b) Define expectation of a random variable.product?Justify your answer.
Give an example.
CO1 U(c) What is dimensionality reduction? Why is it required? (2)
CO3 U (d) What the influence of choosing very large and small values of hyperparameter 'c' in Linear 2]
SVM?
C02 U (e) What are the advantages of an SVM classifier over a Logistic Regression classifier? Explain in (2]
brief.
C04 E () Consider a single layer perceptron with sigmoid activation function. What is the output of the
(2J
perceptron if the Input is given as [x0, xl, x2]-[1, 0.7, 0.8], the weights are [w0, wl, w2]=[0.9,
0.2, 0.3] and bias-0. Show equations and steps clearly.
Q.2 Attempt Any TWO from the following questions.
CO3 N (a) i) For Hard Margin SVM, write the primal constrained optimization and dual [12]
optimization equations. Write and explain the constraints in both the cases
lagrangian [3]
CO2 ii) Compare Hard Margin SVM and Soft Margin SVM.
CO2 U (b) i))What is Kernel Trick in SVM? Explain its [3]
CO4 E ii) Consider the following data points : X1= importance with an example.
12 31. Yl= l and X2={4 5], Y2
[2]
given data points find the values of a's associated with each data point, weight =-1. Using the (4]
the decision boundary for Linear SVM. vector, bias and
CO4 C (c) Consider the following Multi Layer Perceptron Network.
Sigmoid Activation function is used in [6
both Hidden layer and output layer. Learning rate value =0.5.
X1=1
w1=0.1
w3=0.3 we=0
X2=4
w4=0.4
w9=0.9
t2=0
w5=0.5) H2
02
w10=0.1
X3=5
W6=0.6
i) For the given network perform
02.
forward pass and identify the output associated with Ol and
ii) Find the error associated with each
neuron of hidden layer and output layer.
ii) Find the updated weight value for w3.
Page 1 of 2
Q3 Answer the following questions. [12]
CO4 N (a) Explain the working of the principal comnonent analysis technique for the following data set. [6]
X1 3 11 13 15
5 7
X2 16 14 6 4 2
12 10
CO4 N (b) Describe the working of Expectation Maximization algoritbm to find out the missing data in the [6)
given data points. The jont distribution is defined as P(X1, X2, X3) =P(XI|X2)°P(X2]X3)*P(X3)
X1 1 ? 1
X2 ? 1 1 1 0
X3 1 ? 1
OR
Q.3 Answer the following questions. [12]
CO4 C (a) Perfom singular value decomposition and divide the following matrix Ainto three sub matrices.
A=[(2, 5), (3,6)]
[6]
CO2 N (b) Describe the Latent Dirichlet Allocation technique for topic modeling. List out two applications [6]
of it.
Page 2 of2
D
DHARMSINH DESAI UNIVERSITY, NADIAD
FACULTYOF TECHNOLOGY
THIRD SESSIONAL
SUBJECT: (CE-611) COMPUTER NETWORKS Kol3 ? 16
Examination :B.Tech Semester VI Seat No. : CEO23
Date :21/03/2023 Day :Tuesday
Time :2:30 PM-3:45 PM Max. Marks :36
INSTRUCTIONS:
1. Figures to the right indicate maximum marks for that question.
2.. The symbols used carry their usual meanings.
3. Assume suitable data, if required & mention them clearly.
4. Draw neat sketches wherever necessary.
Page 1 of 2
cO1 N(C) Consider the following wirelesscircles
topology, consisting of 6 nodes. Each node's (31
around it.
transmission range is indicated by
When node Atransmits to node B, list the potential hidden terminals from
A and exposed terminals.
2. When node Btransmits to node C, list the potential hidden terminals from
B and exposed terminals.
OR
Q.3 Answer the following questions.
CO2 A (a) Discuss the problem created by two parallel transparent [12]
bridges in the topology. Find [61
the spanning tree for the system shown in figure below. Choose Bl as
Root Bridge.
Show the method. Identify forwarding and blocking ports of the bridges.
LANI
B1)
2
LAN? LAN3
3
1
BS)
2
2
LAN4
CO3 N (b) Explain 1-persistent and
CO1 N (C) Suppose measurements madep-persistent CSMA.
on a slotted ALOHA channel for a very large (3]
of users shows that on average 20% of
the slots are idle. number [31
1. What is the channel load G?
2. What is the throughput of the channel?
3. Is this channel overloaded or under
loaded?
Page
DHARMSINH DESAIUNIVERSITY, NADIAD
FACULTY ÔF TECHNOLOGY
D
Examination :B.Tech Semester VI
THIRD SESSIONAL
SUBJECT: (CE-618) NETWORK & INFORMATION
Seat No. : CEoz3
: Thursday
SECURITY
INSTRUCTIONS:
1 Figures to the right indicate maximum marks for that question.
2 The symbols used carry their usual meanings.
3 Assume suitable data, if required & mention them clearly.
4 Draw neat sketches wherever necessary.
CO4 A
(b) Compute the value in hex of roundconstant RC, with respect to polynomial x°+ [2]
x+x +x+ 1.
CO3 N (c) Compare transport mode and tunnel mode in IP Sec protocol. [2)
(d) Modify basic digital signature scheme such that it can also achieve [2]
C02 C
confidentiality. Explain your answer.
CO1 U (e) In which cases certificate revocation is required in X.509? Explain any two in brief. (2]
CO4 E () Distinguish between MDC and MAC. [2]
Q.2 A Attempt
CO4
Any TWO from the following questions. [12]
(a) In AES round, in mix column step, calculate Sz(1,1) if we perform S3 =Cx S, [6)
Assume, first row of matrix C is [231 1] and first column of matrix S, is [63
F2 7D D4]. Multiply first row by the first column and obtain the result. Consider
polynomial x°+ x*+x+x+ 1for modulo operation.
CO4 E (b) Consider sub byte computation in AES. Assume that multiplicative inverse (6]
output S(r,c) found is( x° + x + x' +1). X is given below. Represent the
polynomial ( x° + x+x*+1) as binary, transform it as 8xl matrix (lsb to msb)
and evaluate X*S(r,c)".
10001 1 11
11000111
11100011
1111000 1
1111 1000
0111 1100
00111 110
|o0011 1 11
Give brief explanation of (6]
CO3 C (c) Construct a pseudo code for key expansion in AES-128.
operations.
Page I of2
Attempt the following questions. [12]
Q.3 neat and clean diagram. [6]
C02 R (a) Explain Needham-Schroeder key sharing protocol with detail and [6]
ExplainthatCertification
CO3 A (b) apply authority method of public key distribution in
to soive the following question: Show how userl, knowing only the
public key of the CA (the root), can obtain a verified copyof User8's public key?
Use the following figure to answer the question.
CA
CA2 CAS
OR
Q.3 Attempt the following questions.
CO2 R (a) Assume Alice (the client) wants to create a shared secret key [12]
with Bob (the server) 6
using AS and TGS. Explain all 6 steps in detail with
CO3 A (b) Initial values of
Buffers
example.
are as below.
A=0X7 B-0XA C=0XC D=0X4 E=0X9 F=0Xa G=0Xf [6]
H=0X6. If these initial
values are given to round 0 of SHA-512 then what will be the
DEFG H after round-02(WO=0X7 K0=0X9 value of buffer A BC
1bits. Use addition mod 2). Rotate(X)=circular rotation in left by
Page 2 of 2
DHARMSINH DESAI UNIVERSITY, NADIAD
D
FACULTY OF TECHNOLOGY
B.TECH - Semester - VI (Computer Engineering)LANGUAGES
SUBJECT: (CE 614)THEORY OF AUTOMATA & FORMAL
Seat No.
Examination
Date
: 3rd Sessional
25/03/2023 Day
Max. Marks
iSootudoy
:36
Time 1. Hr. 1S Min.
INSTRUCTIONS:
1. Figures to the right indicate maximum marks for that question.
The symbols used carry their usual meanings.
3 Assune suitable data, if required & mention them clearly.
4 Draw neat sketches wherever necessary.