0% found this document useful (0 votes)
21 views12 pages

Sem 5 External

Uploaded by

badlyautotuned
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views12 pages

Sem 5 External

Uploaded by

badlyautotuned
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

<br>

So 7
Seat No. 312
TTM (SLS) BARoDA UNVERSITY, VADODARA - Winter , 2023
SOCSET- B. Tech - Examination
Course Code :C2520C1 -Semester (Regular) V

Date: 30.11.2023
Course Name : Machine Day : Thursday
Learning
Time :10:00 am –01:00pm Total Marks 100
:

Instructions:
1
All questions are mandatory. There are no external options.
2. Make suitable assumptions, wherever necessary, and state
them cleay
3. Use of Non-Programmable Calculator is allowed/Not allowed.
4. Figures to the right indicate maximum
marks.

Q:1 Answer the Following Questions: (20)


1. Data used to build the data mining model
() Validation data (iii) training data Test data (iv) hidden data
2.
Which of the following is not true for regression?
() It relates inputs to outputs (iii) It is used for prediction
(ii) It may be used for interpretation (iv) It discovers causal relationships
3. Which of the following is not a supervised leaning
() PCA (iii) Linear Regression
(ii) Naïve regression (iv) Decision Tree
4. Choose the most widely used metrics and tools to assess the classification models
() The area under the ROC curve (iii) Cost-sens itive accuracy
(ii) Confusion matrix (iv) All of the above
a
5. In SVM, these functions take a lower dimensional input space and transform it to higher
dimensional space.
() Kernels (iii) Support Vector
(ii) Vector (iv) Hyperplane
6. Which among the following prevents overfitting when we perform bagging?
i) The use of sampling with replacement as the sampling technique
ii) The use of weak classifiers
iiil) The use of classification algorithms which are not prone to overfitting
on every classifier trained
iv) The practice of validation performed
7
Renuka has two children, one of them is a girl. What is the likelihood that the second kid
is likewise a girl? You can suppose that the globe has
an equal number of males and
females.
(i) 0.5 (iii) 0.333
(ii) 0.25 (iv) 0.75
8 Which of the following is not machine learning?
Artificial Intelligence (iii) both A andB
()
(ii) Rule based inference (iv) None of the above
9 Temperature is a
(i) Interval Data (ii) Discrete data
Ratio Data (iv) None of the data
(ii) two variables, can be used.
10. For understanding relationship between
Box plot (ii) Histogram
()
(ii) Scatter plot (iv) None of the above
updates itself through reward/punishment in case of
11. The model learns and
(i) Supervised learning algorithm (ii) Unsupervised learning algorithm
Semi supervised learning algorithm (iv) Reinforcement learning algorithm
(ii) as:
The distance between hyperplane and data points called
is
12.
(i) Hyper plane (ii) Error
(ii) Margins (iv) Support Vectors

Page 1 of 4
<br>

Wnich of the followingevaluation metrics can not be applicd in case of logistic regression
output to compare with target?
(i) Accuracy (i)) Auc-roc (iii) Logloss (iv) Mean-squared error
14. Four marbles are contained in a jar. 3 red and 1 white. After each draw, two marbles are
pulled, with one being replaced. What is the probability of drawing the same color marble
twice?
(i) 1/2 (ii) 5/8 (iii) 1/3 (iv) 1/8
15. What is Decision Tree?
i) Structure in which internal node represents test on an attribute, each branch represents
outcome of test and each leaf node represents class label
i) Flow-Chart & Structure in which internal node represents test on an attribute, each
branch represents outcome of test and each leaf node represents class label
iii)) Flow-Chart
iv) None of the mentioned
16. Which of the following is an example of feature extraction?
() applying pca to project high dimensional data
(i)construction bag of words from an email
(iii)removing stop words
(iv)forward selection
17. For feature selection, both PCA and Lasso can be utilized. Which of the following
assertions is NOT correct?
() Lasso selects a subset (not necessarily a strict subset) of the original features
(ii) PCA and Lasso both allow you to specify how many features are chosen
(iii) PCA produces features that are linear combinations of the original features
(iv) PCA and Lasso are the same if you use the kernel trick
18. Real-Time decisions, Game Al, Learning Tasks, Skill Aquisition, and Robot Navigation
are applications of which of the folowing
i)Supervised Learning: Classification i)Reinforcement Learning
i)Unsupervised Learning: Clustering iv)Unsupervised Learning: Regression
19. The line described by the linear regression equation (OLS) attempts to
(i) Pass through as many points as possible
(ii) Pass through as few points as possible
(iii) Minimize the number of points it touches
(iv) Minimize the squared distance from the points
20. Assume you're working on a classification issue with a severely unbalanced class. In the
training data, the majority class is observed 99 percent of the tíme. After making
predictions using test data, your model has 99 percent accuracy. In this situation, which
of the following is true? (1). For unbalanced class issues, the accuracy metric is not a
good concept. (2). For unbalanced class issues, an accuracy metric is a good idea. (3).
Precision and recall metrics are useful for situations with unbalanced classes. (4).
Precision and recall metrics are ineffective for situations with an unbalanced class.
(i)
1
and 3 (iii) 2 and 3
(i) l and 4 (iv) 2 and 4

Q:2 Answer any Four out of Six (20)


1. Define Machine Learning? List out its applications and possible ethical issues of
machine learning applications?
2. What can be done if the dataset contains some missing data and some outliers?
3. What is the purpose of feature selection? What are the different techniques for feature
selection? Explain any one in brief
4 What is model selection and generalisation? Explain with suitable examples.
5. Differentiate between supervised learning and unsupervised learning? Give two real time
applications of each.
6. What is curse of dimensionality? How is it countered? Explain.

Q:3 Answer any Four out of Six (20)


1. What are the various distance based similarity measures? Give example of cach.
Explain Bayes Theorem in detail.
2.
Page 2 of 4
<br>

3 Define the following terms: (i) Variance (ii) Co Variance (iii) Joint Probability
(iv) Conditional Probability (v) likelihood probability
4
Explain the concept of clustering with a neat diagram
5 Compare and Contrast DBScan method andK Means Clustering.
6 Under matrix factorization method, explain SVD in brief.

Q:4 Answer any Four out of Six) (20)


1. List the methods for model evaluation. How can we improve the performance of a model.
2 Explain the concept of cross validation while training a model.
3. Write a brief note on ensemble methods.
4. While predicting malignancy of tumor of a set of patients using a classification model,
following are the data recorded: (a) Correct predictions – 15 malignant, 75 benign (b)
Incorrect predictions - 3 malignant, 7 benign Calculate the model accuracy, sensitivity,
precision, and Fmeasure of the model.
5. Explain how nalve bayes classifier is used for spam filtering.
6. Using k-Means clustering algorithm cluster the below data into 3 clusters.
Ht 185 170 168 179 182 188 180 180 183 180 180 177
Wt 72 67 76
56 60 68 72 77 71 70 84 88

Q:5 Answer any Four out of Six (20)


1. Consider the following five training examples:

X
2 9.8978
3 12.7586
4 16.3192
5 19.3129
6 21.1351

We want to learn a function f(x) of the form f(x)=ax + b, which is parametrized by (a,b).
Using squared error as the loss function, which of the following parameters
(4,3), (1,4), (4,1) or (3,4) would you use to model this function to get a solution with
minimum loss.

2. The sales of a company (in million dollars) for each year are shown in the table
below.
x (year) 2005 2006 2007 2008 2009
y (sales) 12 19 29 37 45
Note: For the matter of ease, you can map 2005 as 1, 2006 as 2 etc.
a) Find the least square regression line y =ax + b.
b) Use the least squares regression line as a model to estimate the sales
company in 2012. of the
3 Consider the following set of training examples:
Instance Classification A1 A2
1

2
3

4 F
5
6 T

(a) What is the entropy of this collection training


of examples with respect to the
targetfunction classification?
Page 3 of 4
<br>

(b) What is the information gain of a2 relative to these training examples?


4. Item A B D TE
A 0
8 0
2 6
D 5 4 8 0
E 10 1
7 0

1.Perform single link, Agglomerative clustering on the given distance matrix


2. Represent the clustering using a Dendrogram.
S. Item Age Income Student Credit Buys-Computer
No Rating
1
Youth High No Fair No
2 Youth Middle No Excellent No
3 Middle High No Fair Yes
4 Senior Medium No
Fair Yes
Senior Low Yes Fair Yes
6 Middle Low Yes Excellent No
7 Senior Low Yes Excellent Yes
Youth Medium No Fair No
Youth Low Yes Fair Yes
10 Senior Medium Yes Fair Yes
11 Youth Medium Yes Excellent Yes
12 Middle Medium No
Excellent Yes
13 Middle High Yes Fair Yes
14 Senior Medium No Excellent No

Given the training data in above table, predict the class of the following new example
= , credit-rating-fair. For
using KNN for k=5, age<=30, income medium student-yes, ,
similarity measure use a simple match of attribute values Similarity (A,B)=
are either age,
4
(wW, * O(a; * b;)/4 is ifai equals bi and 0 otherwise. Ai and bi
1

are all 1 except for income its 2.


income, student or credit rating. Weights 8).
6. Consider the two dimensional patterns (2, 1), (3, 5), (4,3), (5, 6), (6, 7), (7,
and Eigen values.
Solve the above data points to get the Covariance matrix.

---END OF PAPER ---


<br>

Seat No.
3125072
ITM (SLS) BARODA UNIVERSITY, VADODARA
SOCSET- B. Tech - Semester - V (Regular) Examination – Winter, 2023
Course Code :C25 0C2 1
Date : 23.11.2023
Course Name :Theory of Computation Day : Thursday
- Total Marks : 100
Time :10:00 am 01:00pm
Instructions:
1. Allquestions are mandatory. There are no external options.
2. Make suitable assumptions, wherever necessary, and state them clearly.
3. Use of Non-Programmable Calculator is allowed/Not allowed.
4. Figures to the right indicate maximum marks.

(20)
Q:1 Answer the following questions.
1
Define Moore Machine
2.
Define Ambiguous Grammar
3 Define relation and list its properties.
4 Define Pumping Lemma for Regular Language.
5 How many strings are there in 3?
6. What is the difference between an empty string and an empty language?
7 Define language accepted by DFA.
8 Write Pigeon hole principles.
9 Explain the terminal and non-terminal symbols of a grammar.
sequence of 0's and 1's.
10. Write regular expression for the language having alternate
11. Give the formal definition of PDA
12. Regular languages are closed under
a) Union b)Concatenation c) Complement d) All of the above
13. Regular expression a/b denotes which of the following set?
a) {a} b) {€,a,b} c) {a,b} d) {ab}
14. What is the relation between NFA-accepted languages and DFA accepted
languages?
d)
a) > b) < c)=
15. Finite state machine is not able to recognize Palindromes because:
a) Finite aptomata cannot deterministically find the midpoint
b) Finite automata cannot remember arbitrarily large
amount of data
second half
c) Even if the mid-point is known, it cannot find whether the
matches the first
d) All of the mentioned
16. The language {a"b'cim|m,n>=1} is
a) Regular
c) Context free but not regular
b) Context sensitive but not context free d) Type-0 but
not context sensitive
an NFA from a regular expression?
17. Which of the following do we use to form
a) Subset Construction Method b) Power Set Construction Method
Method d) Scott Construction Method
c) Thompson Construction
18. What is wrong in the given definition?
Def: ({q0, q1, q2), {0,1}, 8, q3, {q3})
a) The definition does not satisfy 5 Tuple definition of NFA
b) There are no transition definition
c) Initial and Final states do not belong to the Graph
samne
d) Initial and final states can't be
19 Which of ihe following statement is false?
a
a) Evcry regular language is also context free language
Page 1
of 3
<br>

b) Every subset of recursively enumerable set is recursive


c) Every non-deterministic Turing machine can be converted to an equivalent
deterministic Turing machine
d) Every NFA can be converted into equivalent DFA
grammar S > aSa bSb a bover the alphabet
|

20 The language which is generated by the


{a, b} is the set of
a) Strings that begin and end with the same symbol
b) Allodd and even length palindromes
c) All odd length palindromes
d) Alleven length palindromes

Q:2 Answer any Four (out of Six) (20)


1 Explain Chomsky hierarchy of grammar and give the production rules in each category.
2 Using the principle of mathematical induction, for all n > 0, prove that, 1 x2+3 x4+5 x6
+.....+ (2n-1) x2n= n (n+1) (4n-1)3
3. Construct a Moore machine that prints 'a' whenever the sequence 01'is encountered in
any input binary string and then convert it to its equivalent mealy machine.
4 Define onto function. In each case, a relation on the set {1, 2, 3} is given. Of the three
properties, reflexivity, symmetry, and transitivity, determine which ones the relation
has. Give reasons.
a. R={(1, 3), (3, 1), (2, 2)} 1), (2, 2), (3, 3), (1, 2)}
c. R=
b. R={(1,
5. Obtain the left and right derivation for a string w-001122 for the production rules
S->AB, A->01|0A1,
B->2BE.
6. Construct DFA for a regular expression (atb)*ab

Q:3 Answer any Four (out of Six) (20)


1. Differentiate between the transition function in DFA, NFA and e-NFA.
2 What is NFA? Convert the following NFA into DFA by subset construction:

3 Minimize the given DFA using table filling algorithm


q3

q0

4 Construct a NFA to accept strings of a's and b's having substring aba.
5 Prove that the language 1"0" is not regular where n>0.
6 Build a DFA for the following language
Page 2 of 3
<br>

L{w|w is a binary siring that has even number of Is and odd number of Os}

Q:4 Answer any Four (out of Six) a


(20)
Define a deterministic PDA. How a DPDAdiffers from non-deterministic
PDA?
of CFL.
2 Explain two closure properties
3 Obtain a
CFG for the following language L-{ a'b'c" |n1,m1}
4. Rewrite the following grammar after climinating the useless symbols
S->AB|DS A->a B->c
C->D D->Dd|E E->a
*}.
Design a PDA to accept the language LF{www is {0,1}
in
5 ww w is in {0,1 }
*} is
6 State the pumping lemma for CFG. Prove that the language L={
not a CFL.
(20)
Q:5 Answer any Four (out of Six) example.
1. Describe the working of Lincar Bound Automata with the help of
2. Desing Turing machine for the language,
L= fa"b'cn; n>=1}
3. Define and explain the Halting problem of Turing machine.
Convert the following grammar into Chomsky normal
form
4.
S-> ASBE,
A >
aAS a,
B-> SbS| A bb
Design a TM to compute the 2's complement of a binary string. examples.
5. Enumerable languages with
6. Explain Enumerable and Recursively
END OF PAPER

Page 3 of 3
<br>

Seat No.312502
ITM (SLS) BARODA- UNIVERSITY, VADODARA
SOCSET- B. Tech - Semester V (Regular) Examination
,
Winter 2023
1 0C3 Date: 28.1 1.2023
Course Code :25 Day
:
Tuesday
Course Name
:
Mobile Application Development :

: pm Total Marks 100


Time 10:00-01:00

Instructions: are no external options.


Allquestions are mandatory. There
necessary, and state them clearly.
2. Make suitable assumptions, wherever
3. Use of Non-Programmable Calculator is allowed/Not allowed.
4. Figures to the right indicate maxinum marks.

(20)
Q:1 Answer the Following Questions
1. Which permission is used to send SMS?
a. android.permission.SEND SMS b. android.permission. SENDSMS
c. android.permission.SMS d. android. permission.SMSSEND
can test their apps on...
2.
While developing Android applications, developers b. Physical Android phone
a. Emulator included in Android SDK
c. Third-party Emulators d. All three options will work
program that converts Java byte code into Dalvik byte code?
3. What is the name of the b. Dalvik Converter
a. Android Interpretive Compiler d. Mobile Interpretive Compiler
c. Dex compiler
is contained within the Layout xml file.
4. display looks like
a.Orientations and layouts that specify what thec. The strings used in the app
b. The permissions required by the
app
d. The code which is compiled to
run the app
5. Android shipped with SQLite database.
a. True b. False
6 Which one is not a nickname of a version of Android?
a. cupcake b.chocolate c. Honeycomb d.
Gingerbread
The XML file that contains all the
text that your application uses.
7. c. strings.xml d. string.java.
a. stack.Xml b. text.xml
-
8 Android is
b. a web browser
a. an operating system
d. None of the above
C. web server
In Android, mini activities
are also known as
9. c. d.
None of these
a. Fragments b. Adapter Activity
10. ADB stands for
a. Android debug bridge b. Android delete bridge
the above
c. Android destroy bridge d. None of
Android mainly developed?
is
11. For which of the following c. Laptops d. Mobile devices
b. Desktops systemn during
a. Servers
following is the first callback method that is invoked by the
12. Which of the
an activity life-cycle?
b. onCreate() method
a. onClick() method
d. onRestart() method
b. onStart() method
13. SDK Stands for c. System Development Kit
Software Development Kit d. Service Development Kit
b. System Design Kit is not used to set alarm?
14. Which of the following methods C. setExact) d. set)
b. setWindow)
a setAlarm)
15. Can we edit R.java?
b. True
False

Page 1
of 2
<br>

16 Which of the following virtual machine is used by the Android operating system?
a. JVM C. Dalvik virtual machine
b. Simple virtual machine d. None of the above
17. How can we stop the services in android?
By using the stop Self) and stop Service) method
b. By using the finish) method
C. By using system. Exit) method
d. None of the above
18 How can we kill an activity in android?
a Using finish) method c. Using finishActivity(int requestCode)
b. Both (a) and (b) d. Neither (a) nor (b)
19 Does android support other languages than java?
a, Yes b. No c. May be d. Can't say
20. NDK stands for -
a Native Developmnent Kit c. New Development kit
b. Native Design Kit d. None of the above

Q:2 Answer any Four (out of Six) (20)


1. What is the use of Android Manifest file?
2. Explain Android architecture with proper diagram.
3. What is an Intent? Explain types of Intent in Android with example.
4. Write a note on Android Run-time.
5. Briefly explain Android External Storage.
6. Explain the two general types of Alarms.
Q:3 Answer any Four (out of Six) (20)
1. Explain basic building blocks/components of Android Application
2 What is Activity? Draw and explain Activity lifecycle in detail
3 Explain the use of Broadcast Receiver in Android.
4. Write a note on SQLite Transactions.
5 Explain the service life cycle. Discuss various methods.
6 Write the significance of on Create () and on Upgrade () methods of sQLiteOpenHealper
class.

Q:4 Answer any Four (out of Six) (20)


1
What is AVD? Explain the process of creating AVD in Android application development.
2 List out various layouts available in Android. Explain any one in detail.
3 Write difference between linear and constraint layout.
4 Briefly explain the use of Resource folder in Android Project
5 Differentiate View and View Group.
6. Explain how to store data in shared preferences.

Q:5 Answer any Four (out of Six) (20)


Write code to display Toast Message on click of Button whatever is entered in Edit Text
2 Write code to inflate context menu for Edit Text.
3. Write xml entry to define menu and submenu.
4 Write a code to create a spinner with strings taken from the resource folder and on
changing the spinner value, change background color of screen or layout.
5. Write a code to insert student Details (sID, SName, sEnrollmnentNo) in SQLite database
using Android App.
6. Write a code to send notification in Android App.
END OF PAPER ---

Page 2 of 2
<br>

Seat No.
ITM (SLS) -BARODA UNIVERSITY, VADODARA
– ,
sOCSET- B. Tech Semester- V (Regular) Examination Winter 2023
Course Code
:
C2510D1 Date: 25. 1 1.2023
Day : Saturday
Course Name
:
Principles of Artificial Intelligence
10:00 am pm Total Marks: 100
Time
:

-01:00
Instructions:
1. All questions are mandatory. There are no external options.
2. Make suitable assumptions, wherever necessary, and state them clearly.
3. Use of Non-Programmable Calculator is allowed.
4. Figures to the right indicate maximum marks.

(20)
Q:1 Answer the following Questions: among a large set of
1
Which Al problem involves finding the best possible solution
possible solutions?
A) Natural Language Understanding B) Planning and Decision Making
D) Inference and Reasoning
) Pattern Recognition a computer system to understand and 1

2 Which AI problem is concerned with teaching


generate human language?
A) Machine Learning B) Computer Vision
-C) Natural Language Processing (NLP) D)Robotics
3 What underlying assumption in AI suggests that complex tasks can be broken down into
simpler tasks?
B)The Learning Assumption
A) The Symbolic Assumption
C) The Rational Agent Assumption D) The Decomposition Assumption
4. What is a key criterion for success in AI systems when it comes to decision-making?
.A) Minimal computational resources B) Ability to adapt to new environments
C) Perfect accuracy in all situations D) Speed of execution
5. In AI modeling, which level represents the highest level of abstraction, focusing on high
level concepts?
A) Low-Level Model B) Mid-Level Model
D) Super-Level Model
C) High-Level Model
6. What does "state-space" refer to in the context of AI problem solving?
A) The set of possible states an agent can be in during a problem-solving task
B) The physical space where Al agents operate
C) The space of all possible AI algorithms
D) The space of all possible problem domains considering additional 1

7 Which type of search algorithm makes decisions without


information about the problem domain?
A) State-space search B) Blind search
C) Heuristic search D) Stochastic search
uses randomness or probability to explore the search 1

8. Which type of search algorithm


space?
A) Constraint propagation B) Stochastic search
C) State-space search D) Blind search
type search strategy does not use any additional information about the problem 1
9. Which of
domain other than the state-space?
B) Depth-first search
A) Breadth-first search
C) Informed search D) Uninformed search
Which informed search algorithm aims to minimize the estimated total solution cost
10.
while considering a heuristic function?
B) Breadth-first search
-A) Greedy best-first search
C)Constraint satisfaction D) Stochastic search

Page 1
of 3
<br>

A*
11. What is the primary role of a heuristic function in informed search algorithms like
A) To generate random states
B) To estimate the cost to reach the goal from a given state
C) To propagate constraints
D) To perform blind search
12. Bayes' Rule is used primarily for:
and new evidence
-A) Calculating the probability of events given prior knowledge
B) Constructing formal logic statements in First-Order Logic
C) Conducting forward chaining inference
D) Performing resolution in First-Order Logic
13. What is the primary goal of knowledge representation in artificial intelligence?
A) To store as much information as possible
B) To provide a formalism for expressing and reasoning about knowledge
C) To perform calculations quickly
D) To optimize computer memory usage
14. Which knowledge representation formalism is often used to model events and actions in 1

Al systems?
A) Predicate logic B) Frames
C) Semantic nets D) Description logics
15. Which knowledge representation approach uses a network of interconnected nodes to
represent concepts and their relationships?
A) Predicate logic B)Semantic nets
C) Conceptual dependency D) Description logics
16. In First-Order Logic, what does the term "syntax" refer to?
A) Themeaning
of logical symbols and connectives
B) The rules for forming valid statements
C) The interpretation of first-order predicates
D) The use of probabilities in reasoning
17. What is the fundamental unit of information in probability theory?
A) Hypothesis B) Proposition
C) Probability distribution D) Probability event
18. In Bayesian networks, what does a node represent?
A) A random variable B) A deterministic fact
C) A logical operator D) A logical proposition
19. What is "exact inference'" in the context of Bayesian networks?
A) Making decisions without considering probabilities
B) Calculating probabilities exactly using the full joint distribution
C) Estimating probabilities using approximations
D) Ignoring uncertainty ina model
20. What is the Mini-Max algorithm used for in game playing?
A) Maximizing the minimum possible gain B) Minimizing the
C) Maximizing the maximum possible gain D) Minimizing maximum possible gain
the minimum possible gain
Q:2 Attempt any Four out of Six: (20)
1 Describe the key challenges or problems that AI aims to solve.
Provide specific examples 5
for each problem.
2 Describe the role of heuristics in problem-solving. How can
well-designed heuristics 5
improve search efficiency?
3. Describe the key components of an ontology and their roles in
representing knowledge. 5
4
Compare and contrast the representation and reasoning methods
for temporal knowledge 5
(time) and spatial knowledge (space) in Alsystems.
5 Illustrate the process of using First-Order Logic to represent
domain. Provide an example of how FOL can be knowledge in a specific
employed for knowledge engineering.
6
Discuss the challenges of representing knowledge in an uncertain
domain. How does the
choice of representation affect the efficiency and accuracy
of probabilistic reasoning?

Page 2 of3
<br>

Q:3 Attempt any Four out of Six:


1. Explain the underlying assumption in AI that complex nroblems can be broken down into
simpler subproblems. Provide examples to
illustrate this concept.
2. Compare and contrast stochastic search algorithms with deterministic search algorithms.
What are the advantages and disadvantages of each in various
problem domals
3. Describe the structure of a semantic net and explain howy it represents knowledge. rroviue
a real-world example where a semantic net is used for knowledge
representation.
•4. Create a semantic net to represent the knowledpe that "John is a student, he studies
computer science, and he lives in Apartment 3B."
5. Explain the concepts of unification and lifting in First-Order Logic. How do these
concepts assist in reasoning with complex statements?
6. Explain the role of game trees in game playing. How do they represent the possible
sequences of moves and outcomes in a game?
Q:4 Answer any Four (out of Six)
1. Discuss the significance of the "level of the mode]" in Al. How does it relate to problem
solving and decision-making in Al systems?
2. Compare the performance of informed search strategies like A* search with uninformed
search strategies in terms of efficiency and optimality.
3. Provide examples of Al applications where reasoning with defaults or reasoning about
knowledge plays a crucial role.
4. Given the following predicates:
P(x): "x is a cat."
Q(x): "x is black."
Express the statement "All black cats are friendly" using predicate logic and universal
quantification.
as spam or
5. Explain how Bayes' Rule is applied in spam email filtering to classify emails
not. Discuss the role of prior probabilities and likelihood in this application.
a weather forecasting
6 Consider a Bayesian network representing weather conditions and
weather
application. How is exact inference used to calculate the probability of specific
conditions given observed data?
Q:5 Attempt any Four out of Six: criteria for success. How
1 Explore the role of adaptability and learning in AI systems'
domains?
important is the ability to learn and adapt in various one tile is missing. The initial
tiles, where
2. Consider a puzzle with a 3x3 grid of numbered
state is:
123 456
78
And the goal state is:
123 456
moves to reach
78 a search (breadth-first or depth-first) to find the sequence of
Perform blind are expanded.
goal state. Show the order in which nodes systems to
the are used in the field of healthcare information
Describe how ontologies
3.
improve data interoperability and decision support. of drawing a red
game, you have a deck of 52 cards. Calculate the probability
4
a
In card
a face card (king, queen,
or
jack) in two consecutive draws
card (hearts or diamonds) and
without replacement. marginal probability
a Bayesian network with variables A, B, and C, calculate theare known.
Given probabilities
5.
A using variable elimination when the conditional are used in the development
of game playing algorithms, such as Mini-Max, AI?
6
Describe how
What are the key strategies employed in chess
of computer chess
engines.
---END OF PAPER
--

Page

You might also like