Dec 2022
Dec 2022
Dec22
(dec24 baki)
Q2. a. What actions would you take to prove “Some who are intelligent can’t read” using
prepositional logic [10]
1. Whoever can read is literate.
2. Dolphins are not literate.
3. Some dolphins are intelligent.
b. Solve the Air cargo transport problem using Planning. It involves loading and
unloading cargo onto and off of planes and flying it from place. Initial State is
cargo 1 and plane 1 is at Mumbai airport, cargo 2 and plane 2 is at Delhi
airport. Goal State is cargo 2 should be at Mumbai airport and cargo 1 should
be at Delhi airport. [10]
b. Explain the Depth Limit search and Depth first iterative deepening search. [10]
12281 Page 1 of 2
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
Q4. a. Apply the alpha beta pruning on following example by considering the root node a max.
[10]
b. Explain PEAS descriptors also state PEAS description for online English tutor.
[10]
Q5. a. Explain Problem formulation also give the initial state, goal test, successor function, and
cost function for the following.
Choose the formulation that is precise enough to be implemented.
Problem statement: A 3 foot tall monkey is in a room where some bananas are
suspended from the 8 foot tall ceiling. He would like to get bananas. The room
contains two stackable, movable, climbable 3 foot high crates. [10]
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
May23
Q1) Solve any four of the following:
a) Describe different categories of AI [5]
b) Describe the characteristics of a medical diagnosis system using the PEAS properties [5]
c) Explain Goal based Agent with a block diagram [5]
d) Compare and contrast propositional logic and first order logic [5]
e) What do you mean by hill climbing. Explain. [5]
Q2)
a) Perform α - β pruning on the following graph, clearly indicating the
α and β cuts and the final value of root node. [10]
A
MAx
B C
MIN
D F G H I
E
MAX
6 4 8 3 2 4 7 9 8 4 2 3 4 1 7 9 8
5
J K L M N O P Q R S T U V W X Y Z a
b) What do you understand by informed and uninformed search methods? Explain in detail
with example. [10]
Q3)
a) Consider the following statements: [10]
a) All people who are earning are happy
b) All happy people smile
c) Someone is earning
Perform the following tasks:
i) Represent above statements in FOL
ii) Convert each to CNF
iii) Prove that someone is smiling using resolution technique. Draw the resolution tree
b) What do you understand by forward chaining and backward chaining. Explain in detail
[10]
26341 Page 1 of 3
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
Q.4
a) For the given graph, the table below indicates the path costs and the heuristic values. S is the
start node and G1, G2 and G3 are the goal nodes. Perform A* search to find the shortest distance
path from S to any of the goal nodes. [10]
D
A
E
B C
G1
G3
G2
b) What is planning in AI? Discuss partial order planning and hierarchical planning in detail [10]
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
Q 5)
a) Applications of AI
b) Simulated annealing
Dec23
Q2)
a) What do you understand by Min Max Search and alpha beta search? Explain in
detail with example. [10]
b) What do you understand by A* search? Is it informed or uninformed search
Justify.
Q5) a) What is planning in AI? Discuss partial order planning and hierarchical planning
in detail [10]
b)What do you understand by Reinforcement learning. Explain in detail.
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
May24
(c) Give PEAS and state space description for “Automobile Driver Agent” 5
(b) What is Game Playing Algorithm? Draw a game tree for Tic-Tac-Toe 10
problem.
(b) Explain Hill Climbing Algorithm and problems that occurs in hill climbing
algorithm?
4 (a) What do you mean by Resolution? Also discuss the steps in Resolution. 10
(b) Consider problem of changing a flat tire. The goal is to have a good spare
tire properly mounted on to the car’s axle, where the initial state
has a flat tire on the axle and a good spare tire in the trunk. Give
the ADL description for the problem and also discuss the solution
(b) Define Belief Network. Describe the steps of constructing belief network
with an example.
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89282 / Cryptography & System Security
(dec24 baki)
Dec22
2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
attacks on it. Consider the example where A and B decide to use the Diffie
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
that they share.
b Explain AES algorithm. Highlight the difference between AES and DES. [10]
4 a Elaborate the sign and verification process of RSA as a digital signature scheme. [10]
b Write short notes on
[10]
1. Packet sniffing
2. SQL injection
5 a State the rules for finding Euler’s phi function. Calculate [10]
a. φ(10)
b. φ(49)
c. φ(343)
b Explain Kerberos as an authentication service. [10]
6 a Enlist the various functions of the different protocols of SSL. Explain the phases [10]
of handshake protocol.
b How does ESP header guarantee confidentiality and integrity of packet payload? [10]
What is an authentication header (AH)? How does it protect against replay
attack?
A79F679C53B79281A1E552B45071A2A6
May23
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the public [10]
key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’. What is
the cipher text for M=10 using the public key.
3 a What goals are served using a message digest? Explain using MD5. [10] b
What is DDOS attack? Explain how is it launched. [10]
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
in digital certificates? Explain any one digital signature algorithm.
b How does PGP achieve confidentiality and authentication in emails? [10]
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of
handshake protocol.
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of AH and
ESP.
Dec23
A79F679C53B79281A1E552B45071A2A6
a Give examples of replay attacks. List three general approaches for dealing with
replay attack.
b Explain key rings in PGP.
c What are the different protocols in SSL? How do client and server establish SSL
connection?
d Explain TCP/IP vulnerabilities layer wise.
e What is the purpose of S-boxes in DES? Explain the avalanche effect.
2 a What is need for message authentication? List various techniques used for [10]
message authentication. Explain any one.
b What characteristics are needed in secure hash function? Explain secure hash [10]
algorithm on 512 bit.
3 a Use Hill cipher to encrypt the text “short”. The key to be used is hill. [10]
b Explain man in middle attack on Diffie Hellman. Explain how to overcome the
[10]
same.
May24
A79F679C53B79281A1E552B45071A2A6
Statistical Learning for Data Science
Mobile computing
(may23 , dec24 baki)
Dec22
*********
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Dec23
Q1 a) What are various Mobile Communication and Application Environments for the
Following: 10
i) Business
ii) Location Based Services.
iii) Banking Services
iv) Vehicles
b) Explain Various Types of antennas along with their Radiation Pattern. 10
Q2 a) What is Spread Spectrum? What are the various advantages for the same? 5
b) What are Various Advantages and Disadvantages of Small Cells in Cellular system
5
c) Explain DSSS and FHSS in detail. 10
Q3 a) What do you mean by hidden & Exposed station Problem? How they can be
avoided. 10
b) Explain GSM System Architecture in Detail 10
Q4 a) Why it is necessary to have Handover Mechanism in GSM? Explain possible
handover scenarios in short. 10
b) List various Security services offered by GSM. Explain A3 A5 and A8 Algorithm in
brief. 10
Q5 a) Explain Packet Delivery Mechanism “To and From Mobile Node” with the help of
Mobile IP Network Diagram. 10
b) Explain Tunnelling and Encapsulation in brief. What are the various types of
Encapsulation techniques. 10
Q6. Write a Short Note on the Following. (ANY FOUR). 20
a) Bluetooth
b) HIPERLAN
c) IPV6
d) CDMA
e) Snooping TCP
May24
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q1. Attempt any FOUR Questions 20
a) Explain the concept of frequency reuse with clustering.
b) Compare LTE and LTE advanced.
c) What is Hidden and Exposed station problem?
d) What are the roles of EIR and HLR entities in a GSM network?
e) Discuss about the mobile services and data services in GSM.
Q2 a) What do you mean by Self Organizing Networks. Explain the architecture of SON. 10
Q2 b) What is a need of Micro Mobility? Explain Cellular IP in detail. 10
Q3 a) What are the different Handover mechanism in GSM? Explain each handover mechanism 10
in brief.
Q3 b) Explain the protocol architecture of IEEE 802.11 with diagram. 10
Q5 a) What is spread spectrum? Why is it used? Explain any one of the spread spectrum 10
techniques.
Q5 b) Explain Mobile Terminated Call and Mobile Originated Call. 10
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q.2 a) What are gateways and backhaul sub layers? (5 M)
b) Briefly explain Adapting SCADA for IP. (5 M)
c) What do you mean by SoC? Also explain its applications. (10 M)
567ED5B2149E1166C0258390CBB9A47D
Dec23
Q.1 (a) Give the function of each layer of a seven-layer IoT architectural
10
reference model published by IoTWF architectural committee.
(b) What is meaning of Smart object? Give the Security and privacy concerns 05
of Smart objects in Internet of things.
(c) Explain the characteristics of Smart object. Give the trends in smart 05
objects.
Q.4 (a) What is Fog Computing? Give advantages and disadvantages of Fog 05
computing.
(b) What is Edge Computing? Give advantages and disadvantages of Edge 05
computing.
(c) Explain the different types of sensors are used for measuring one of the 10
physical properties and give its representative examples.
Q.6 (a) Explain at least five use cases where IoT involvements will convert cities 10
into smart cities.
(b) Compare any Five IoT software platforms with suitable parameters. 10
2C4E54A85DC280446DC2BCFEDD431B03
spcc
dec22
(dec24 baki)
==================================================================
2C4E54A85DC280446DC2BCFEDD431B03
May23
2C4E54A85DC280446DC2BCFEDD431B03
Dec23
Q.1.
a) Define “System Programming”. Differentiate between system software & application
software. [05]
b) Explain in brief “forward reference problem”. Explain how TII handles forward reference
problem in single pass assembler. [05]
c) Explain conditional macro with suitable example. [05]
d) Compute FIRST and FOLLOW for the following grammar: [05]
S → Aα
A → BD
B → b|ε
D → d|ε
Q.2.
a) Draw the flowchart of pass1 of assembler and explain its working with the databases. [10]
What are the different ways of Intermediate code representation? Explain with example. [10]
Q.3.
a) Construct the necessary data structures after compiling the following code by Pass1 of two-
pass macro processor: [10]
markdown
CopyEdit
1. MACRO
2. COMPUTE &x, &a, &p
3. MOVER &a, &x
4. MULT &a, ='4'
5. MOVEM &a, &p
6. MEND
7. MACRO &g, &k, &r
8. MOVER &r, &k
9. SUB &r, ='4'
10. MEND
b) Construct LR(0) parsing table for the following grammar and analyze the contents of stack
and input buffer and action taken after each step while parsing the input string "abbcde": [10]
S → αCDe
C → Cbc
C→b
D→d
Q.4.
a) State and explain the types of assembly language statements with examples. [10]
b) Discuss the databases used in direct linking loader. [10]
2C4E54A85DC280446DC2BCFEDD431B03
Q.5.
a) Generate 3-address code for the following C program and construct flow graph with the help
of basic blocks: [10]
cpp
CopyEdit
i=1; j=1; x=5;
while(i<3) {
switch(i) {
case 1: a[i++][j]=i+x;
break;
case 2: a[i++][j]=i-x;
break;
}
i++;
}
b) What are the phases of compiler? Give working of each phase for the following statement:
P = Q + R - S * 3 [10]
Q.6.
a) Explain Dynamic Linking Loader in Detail. [10]
b) Explain different Code Optimization Techniques in detail. [10]
2C4E54A85DC280446DC2BCFEDD431B03
May24
𝑆𝑆𝑆 + |𝑆𝑆 * |𝑎
recursive, and take necessary action if it exists:
Q.2. a) Explain any five code optimization in compiler designing with [10]
suitable example.
b) Explain with the help of flow chart the working of two pass [10]
assembler along with databases used.
𝑆 𝑎𝐵𝐷ℎ
b) Construct LL(1) parsing table for the following grammar: [10]
𝐵 𝑐𝐶
𝐶 𝑏𝐶 |
𝐷 𝐸𝐹
𝐸 𝑔 |
𝐹 𝑓 |
Q.4. a) Generate 3-address code for the following C program and construct [10]
flow graph with the help of basic blocks : (assume 4 memory locations
for integer ):
2C4E54A85DC280446DC2BCFEDD431B03
Q.5. a) Explain design issues in code generation in detail. [10]
𝑎 = 𝑎 * 𝑏- 5 * 3/𝑐
b) Explain Phases of compiler with following example [10]
2C4E54A85DC280446DC2BCFEDD431B03
Paper / Subject Code: 89281 / System Programming & Compiler Construction
81A25C470EC1D85158D58F2940E4782C
Paper / Subject Code: 89281 / System Programming & Compiler Construction
81A25C470EC1D85158D58F2940E4782C