Ques
Ques
Dec22
Q2. a. What actions would you take to prove “Some who are intelligent can’t read” using
prepositional logic3 [10]
1. Whoever can read is literate.
2. Dolphins are not literate.
3. Some dolphins are intelligent.
b. Solve the Air cargo transport problem using Planning. It involves loading and
unloading cargo onto and off of planes and flying it from place. Initial State is
cargo 1 and plane 1 is at Mumbai airport, cargo 2 and plane 2 is at Delhi
airport. Goal State is cargo 2 should be at Mumbai airport and cargo 1 should
be at Delhi airport.3 [10]
b. Explain the Depth Limit search and Depth first iterative deepening search.2 [10]
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
Q4. a. Apply the alpha beta pruning on following example by considering the root node a max2.
[10]
b. Explain PEAS descriptors also state PEAS description for online English tutor.1
[10]
Q5. a. Explain Problem formulation also give the initial state, goal test, successor function, and
cost function for the following.2
Choose the formulation that is precise enough to be implemented.
Problem statement: A 3 foot tall monkey is in a room where some bananas are
suspended from the 8 foot tall ceiling. He would like to get bananas. The room
contains two stackable, movable, climbable 3 foot high crates. [10]
May23
B C
MI
D E F G H I
MA
6 4 5 8 2 4 7 8 4 2 3 1 7 8
J K L N O P Q S T U V W X Y Z
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
a) What do you understand by informed and uninformed search methods? Explain in detail
with example.2 [10]
Q3)
a) Consider the following statements: 3 [10]
a) All people who are earning are happy
b) All happy people smile
c) Someone is earning
Perform the following tasks:
i) Represent above statements in FOL
ii) Convert each to CNF
iii) Prove that someone is smiling using resolution technique. Draw the resolution tree
b) What do you understand by forward chaining and backward chaining. Explain in detail4
[10]
Q.4
a) For the given graph, the table below indicates the path costs and the heuristic values. S
is the start node and G1, G2 and G3 are the goal nodes. Perform A* search to find the
shortest distance path from S to any of the goal nodes. 3
[10]
D
A
E
B C
G1
G3
G2
22CD8DE2EA92ED2C2EE63485B4D991D3
Paper / Subject Code: 89284 / Artificial Intelligence
b) What is planning in AI? Discuss partial order planning and hierarchical planning in detail3 [10
Q 5)
a) Applications of AI1/6
b) Simulated annealing 3
22CD8DE2EA92ED2C2EE63485B4D991D3
Dec23
Q2)
a) What do you understand by Min Max Search and alpha beta search? Explain in detail with
example. 3 [10]
b) What do you understand by A* search? Is it informed or uninformed search Justify. 3
Q3) a) Explain steps involved in converting propositional logic statement into CNF with
suitable example4 [10]
b) What do you understand by forward chaining and backward chaining. Explain in
detail 4 [10]
Q5) a) What is planning in AI? Discuss partial order planning and hierarchical planning
in detail 5 [10]
b)What do you understand by Reinforcement learning. Explain in detail. 5
May24
(b) What is Game Playing Algorithm? Draw a game tree for Tic-Tac-Toe 10
problem. 3
(b) Explain Hill Climbing Algorithm and problems that occurs in hill climbing
algorithm? 3
3 (a) What do you mean by Resolution? Also discuss the steps in Resolution. 4 10
A79F679C53B79281A1E552B45071A2A6
(b) Consider problem of changing a flat tire. The goal is to have a good spare
tire properly mounted on to the car’s axle, where the initial state has a flat
tire on the axle and a good spare tire in the trunk. Give the ADL
description for the problem and also discuss the solution
(b) Define Belief Network. Describe the steps of constructing belief network
with an example. 4
Dec24
Q2.
a) All people who are graduating are happy. All happy people smile. Someone is graduating.
Convert to FOL and CNF. Also Prove that "Is someone smiling?" Solve using resolution. (10) 3
b) Design a planning problem using STRIP for Air cargo transport. It involves loading and
unloading cargo onto and off planes and flying it from place to place.
Initial State: At SFO airport, Cargo1, Plane1 and at JFK airport, Cargo2, Plane2 is present.
Goal State: At SFO airport Cargo2 and at JFK airport Cargo1 is present. (10) 5
Q3.
a) Apply greedy best-first search. At each iteration, each node is expanded using evaluation
function f(n) = h(n).
h(S) = 10, h(A) = 10, h(D) = 8, h(B) = 6, h(E) = 6.5, h(C) = 4, h(F) = 3, h(G) = 0.
S is start state and G is goal state. (10) 3
b) Explain the Depth Limit Search and Depth First Iterative Deepening Search. (10) 3
A79F679C53B79281A1E552B45071A2A6
Q4.
a) Formulate the problem, choose the formulation that is precise enough to be implemented. Also
identify the initial state, goal test, successor function, and cost function for the following.
Problem Statement: Autonomous Taxi driver (10) 2
b) Explain the concept of PAC learning. (10) 5
Q5.
a) Task of cleaning house has been assigned to a vacuum cleaner robot. Initial location of robot is
not known. Robot has to execute appropriate actions in order to clean house. Identify the
appropriate type of an agent and applicable task environment, also identify the PEAS parameters.
(10) 1
b) Apply alpha-beta pruning on the following graph. (10) 3
A79F679C53B79281A1E552B45071A2A6
Paper / Subject Code: 89282 / Cryptography & System Security
Dec22
[20]
1 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
attacks on it. Consider the example where A and B decide to use the Diffie
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
that they share.
b Explain AES algorithm. Highlight the difference between AES and DES. [10]
3 a Elaborate the sign and verification process of RSA as a digital signature scheme. [10]
b Write short notes on
[10]
1. Packet sniffing
2. SQL injection
4 a State the rules for finding Euler’s phi function. Calculate [10]
a. φ(10)
b. φ(49)
c. φ(343)
b Explain Kerberos as an authentication service. [10]
5 a Enlist the various functions of the different protocols of SSL. Explain the phases [10]
of handshake protocol.
b How does ESP header guarantee confidentiality and integrity of packet payload? [10]
What is an authentication header (AH)? How does it protect against replay
attack?
May23
1 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the public 3.
key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’. What is Ro
the cipher text for M=10 using the public key. l
e
b Discuss DES with reference to following points o
1. Block size and key size f
S
2. Need of expansion permutation
-
A79F679C53B79281A1E552B45071A2A6
box [10]
4. Weak keys and semi weak keys
5. Possible attacks on DES
[10]
2 a What goals are served using a message digest? Explain using MD5. [10] b
What is DDOS attack? Explain how is it launched. [10]
3 a Why are digital certificates and signatures required? What is the role of digital signature [10]
in digital certificates? Explain any one digital signature algorithm.
b How does PGP achieve confidentiality and authentication in emails? [10]
5 a Enlist the various functions of the different protocols of SSL. Explain the phases of
handshake protocol.
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of AH and
ESP.
Dec23
1 a What is need for message authentication? List various techniques used for [10]
message authentication. Explain any one.
b What characteristics are needed in secure hash function? Explain secure hash [10]
algorithm on 512 bit.
2 a Use Hill cipher to encrypt the text “short”. The key to be used is hill. [10]
b Explain man in middle attack on Diffie Hellman. Explain how to overcome the
[10]
same.
May24
A79F679C53B79281A1E552B45071A2A6
Statistical Learning for Data Science
Dec24
Q2
a) Apply Diffie Hellman key exchange algorithm, two users P & Q will agree on two numbers as
n=11 (common prime) & g=7 (generator). x=3, y=6 are private keys of P & Q respectively. What is
shared secret key?
b) Discuss DES with reference to the following points:
Q3
a) What characteristics are needed in secure hash function? Explain secure hash algorithm on 512
bits.
b) Use RSA algorithm, user A has public key (17,321), B has public key (5,321). Calculate private
keys of both the users. Encrypt m=7 by B’s public keys. How B can decrypt the same.
Q4
a) How does PGP achieve confidentiality and authentication in emails?
b) Use the Playfair cipher with the key "DOCUMENT" to encrypt the message "ALL THE BEST."
Q5
a) Why are digital certificates and signatures required? What is the role of digital signature in digital
certificates? Explain any one digital signature algorithm.
b) What are different types of firewalls? How is a firewall different from IDS?
Q6
a) Explain DES algorithm with flowcharts.
b) What is a DDOS attack and how is it launched?
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Mobile computing
Dec22
*********
May23
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
2.
a. Explain in short different algorithms used for authentication and privacy in GSM. [10 Marks]
b. What is the use of different interfaces used in the global system for mobile communication (GSM)
with a diagram? [10 Marks]
3.
a. Explain hidden station and exposed station problems with solutions in WLAN. [10 Marks]
b. How is packet delivery achieved to and from a mobile node? [10 Marks]
4.
a. Explain snooping TCP and mobile TCP with their merits and demerits. [10 Marks]
b. Explain the process of registration in Mobile IP. [10 Marks]
5.
a. Explain the protocol architecture of IEEE 802.11 with a diagram. [10 Marks]
b. How is IP mobility achieved in a wireless network? [10 Marks]
6.
a. Explain different components used in the LTE architecture with a diagram. [10 Marks]
b. Which components are new in GPRS as compared to GSM? What is their purpose? [10 Marks]
Dec23
Q1 a) What are various Mobile Communication and Application Environments for the
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Following: 10
i) Business
ii) Location Based Services.
iii) Banking Services
iv) Vehicles
b) Explain Various Types of antennas along with their Radiation Pattern. 10
Q2 a) What is Spread Spectrum? What are the various advantages for the same? 5
b) What are Various Advantages and Disadvantages of Small Cells in Cellular system
5
c) Explain DSSS and FHSS in detail. 10
Q3 a) What do you mean by hidden & Exposed station Problem? How they can be
avoided. 10
b) Explain GSM System Architecture in Detail 10
Q4 a) Why it is necessary to have Handover Mechanism in GSM? Explain possible
handover scenarios in short. 10
b) List various Security services offered by GSM. Explain A3 A5 and A8 Algorithm in
brief. 10
Q5 a) Explain Packet Delivery Mechanism “To and From Mobile Node” with the help of
Mobile IP Network Diagram. 10
b) Explain Tunnelling and Encapsulation in brief. What are the various types of
Encapsulation techniques. 10
Q6. Write a Short Note on the Following. (ANY FOUR). 20
a) Bluetooth
b) HIPERLAN
c) IPV6
d) CDMA
e) Snooping TCP
May24
Q2 a) What do you mean by Self Organizing Networks. Explain the architecture of SON. 10
Q2 b) What is a need of Micro Mobility? Explain Cellular IP in detail. 10
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q3 a) What are the different Handover mechanism in GSM? Explain each handover mechanism 10
in brief.
Q3 b) Explain the protocol architecture of IEEE 802.11 with diagram. 10
Q5 a) What is spread spectrum? Why is it used? Explain any one of the spread spectrum 10
techniques.
Q5 b) Explain Mobile Terminated Call and Mobile Originated Call. 10
Dec24
Q1.
a) Compare all Mobile Generations i.e., 1G, 2G, 3G, 4G and 5G. (10)
b) Explain GPRS Architecture in detail. (10)
Q2.
a) Compare Infrastructure Based Network with Ad-hoc Network. (05)
b) Explain GSM Authentication in brief. (05)
c) Explain in detail GSM System Architecture and Describe Function of Each Block. (10)
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q3.
a) How IP Packet Delivery Takes Place to and from Mobile Node? Explain in detail. (10)
b) Explain Signal Propagation in detail. What are various Signal Propagation Effects? (10)
Q4.
a) Explain Mobile Terminated and Mobile Originated Call in detail. (10)
b) Explain UMTS Architecture. (10)
Q5.
a) What is Snooping TCP? What are its advantages and disadvantages? (10)
b) Explain need of Mobile Communication in various areas. (10)
Q6.
a) Write a Short Note on the following:
Dec22
Q.1
A. Discuss in detail the working of each layer in IOTWF Standardized Architecture. [10 Marks]
B. Explain Arduino Uno board with its pins and parts in detail. [10 Marks]
Q.2
A. What are IoT software platforms? Explain any five with examples. [10 Marks]
B. State the factors which help to select the right protocol for a particular IoT application? Compare
between COAP and MQTT. [10 Marks]
Q.3
A. Give the classification of networks according to access technologies and distances considering
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
IoT-based applications. [10 Marks]
B. Describe Zigbee protocol stack using IEEE 802.15.4. [10 Marks]
Q.4
A. Explain Fog Computing and Edge Computing with their advantages and disadvantages. State the
difference between Fog Computing and Edge Computing. [10 Marks]
B. What are gateways and backhaul sub-layers? [10 Marks]
Q.5
A. Draw and explain the neat diagram of the Protocol Stack for Transporting Serial DNP3 SCADA
over IP. Give the meaning of master/slave relationships in DNP3. [10 Marks]
B. Write in detail about the working of Sensors and Actuators. Differentiate between sensors and
actuators with a neat diagram. Explain any six types of sensors and actuators with examples of
applications where they are used. [10 Marks]
Q.6
A. What is meant by a Smart Object? Explain the characteristics of Smart Objects. Give the
definition of smart objects. [10 Marks]
B. Write a short note on:
i. Health & Lifestyle domain-specific IoT [5 Marks]
ii. Data Analytics versus Business Benefits [5 Marks]
May23
567ED5B2149E1166C0258390CBB9A47D
Statistical Learning for Data Science
Q.5 a) Explain IOT Application layer with a neat diagram. (5 M)
b) Discuss the concept of Edge computing. (5 M)
c) Explain MQTT. Compare - COAP and MQTT. (10 M)
567ED5B2149E1166C0258390CBB9A47D
Dec23
Q.1 (a) Give the function of each layer of a seven-layer IoT architectural
reference model published by IoTWF architectural committee.
Q.4 (a) What is Fog Computing? Give advantages and disadvantages of Fog 05
computing.
(b) What is Edge Computing? Give advantages and disadvantages of Edge 05
computing.
(c) Explain the different types of sensors are used for measuring one of the 10
physical properties and give its representative examples.
Q.6 (a) Explain at least five use cases where IoT involvements will convert cities 10
into smart cities.
(b) Compare any Five IoT software platforms with suitable parameters. 10
2C4E54A85DC280446DC2BCFEDD431B03
May24
Q.1
(a) What is IoT? Compare with suitable criteria between Operational Technology (OT) and
Information Technology (IT). [10 Marks]
(b) With suitable examples, explain the types of sensors used in IoT systems. [10 Marks]
Q.2
(a) Explain the Smart Things: architectural classification considering Layer 1 Things-Sensors
and Actuators Layer. [10 Marks]
(b) Give the Categories of IoT application protocols and their transport methods. Describe the
factors that should be considered when selecting a transport layer for an IoT application layer
protocol. [10 Marks]
Q.3
(a) Discuss the application of IoT in Cities. [10 Marks]
(b) Compare with suitable factors Microsoft Azure IoT and Google Cloud IoT used as IoT
Software platforms. [10 Marks]
Q.4
(a) Give the function of each layer of a seven-layer IoT architectural reference model
published by IoTWF architectural committee. [10 Marks]
(b) Explain the Enabling IoT Technologies. [10 Marks]
Q.5
(a) Explain Gateways and Backhaul Sublayer considering Layer 2: Communications Network
Layer in IoT. [10 Marks]
(b) Give the key components of a SCADA system. Describe CoAP message fields. [10
Marks]
Q.6
(a) Describe the application of IoT in Environment. [10 Marks]
(b) Compare with suitable factors Particle Photon with ESP32 used for IoT application
development. [10 Marks]
2C4E54A85DC280446DC2BCFEDD431B03
Dec24
Q1
a) Discuss IOTWF Standardized Architecture.
b) What is IoT? How is IoT different from Digitization? List out the different IoT Challenges.
Q2
a) Give Classification of networks according to access technologies and distances.
b) Describe domain-specific IoT related to a smart city.
Q3
a) With an example, explain the types of Sensors and Actuators used in IoT applications.
b) Describe data vs network analytics for an IoT network.
Q4
a) Compare and contrast: Application Layer protocols.
b) What are IoT software platforms? Explain with examples.
Q5
a) Write short notes on Edge computing, Fog computing, and Cloud computing.
b) Briefly explain Adapting SCADA for IP.
Q6
a) Explain different IoT enabling technologies.
b) Discuss in brief:
2C4E54A85DC280446DC2BCFEDD431B03
spcc
dec22
==================================================================
2C4E54A85DC280446DC2BCFEDD431B03
May23
Q.1. A. Construct SLR parser for the following grammar and parse the input 10
“( )( )”: S → (S)S | .
B. State and explain with examples, different types of statements used in 10
assemblers with respect to system programming.
Q.2. Explain the concept of basic blocks and flow graph with example the 10
A. three-address code.
B. Explain with help of a flowchart, the first pass of two-pass macro 10
processor.
Q.3. A. Explain the phases of a compiler. Discuss the action taken in various 10
phases to compile the statement:
a=b*c+10, where, a, b, c are of type real.
B. Write short note on: 10
(i) Syntax-directed Translation, (ii) Macro facilities
Q.4. A. What is code optimization? Explain with example, the following code 10
optimization techniques:
(i) Common sub-expression elimination (ii) Code motion
(iii) Dead code elimination (iv)Constant propagation
B. Explain Direct Linking Loader in suitable example. 10
Q.5. A. Test whether following grammar is LL(1) or not. If it is LL(1), construct 10
parsing table for the
same: S1AB|
A1AC|0C
B0S
C1
B. Draw and explain the flowchart of Pass-I of two pass assembler with 10
suitable example
2C4E54A85DC280446DC2BCFEDD431B03
Dec23
Q.2.
a) Draw the flowchart of pass1 of assembler and explain its working with the databases. [10]
What are the different ways of Intermediate code representation? Explain with example. [10]
Q.3.
a) Construct the necessary data structures after compiling the following code by Pass1 of
two-pass macro processor: [10]
markdown
CopyEdit
1. MACRO
2. COMPUTE &x, &a, &p
3. MOVER &a, &x
4. MULT &a, ='4'
5. MOVEM &a, &p
6. MEND
7. MACRO &g, &k, &r
8. MOVER &r, &k
9. SUB &r, ='4'
10. MEND
b) Construct LR(0) parsing table for the following grammar and analyze the contents of stack
and input buffer and action taken after each step while parsing the input string "abbcde":
[10]
S → αCDe
C → Cbc
C→b
D→d
Q.4.
a) State and explain the types of assembly language statements with examples. [10]
b) Discuss the databases used in direct linking loader. [10]
Q.5.
a) Generate 3-address code for the following C program and construct flow graph with the
help of basic blocks: [10]
cpp
CopyEdit
i=1; j=1; x=5;
while(i<3) {
switch(i) {
case 1: a[i++][j]=i+x;
break;
2C4E54A85DC280446DC2BCFEDD431B03
case 2: a[i++][j]=i-x;
break;
}
i++;
}
b) What are the phases of compiler? Give working of each phase for the following statement:
P = Q + R - S * 3 [10]
Q.6.
a) Explain Dynamic Linking Loader in Detail. [10]
b) Explain different Code Optimization Techniques in detail. [10]
May24
Q.1. a) Explain any five code optimization in compiler designing with [10]
suitable example.
b) Explain with the help of flow chart the working of two pass [10]
assembler along with databases used.
𝑆 𝑎𝐵𝐷ℎ
b) Construct LL(1) parsing table for the following grammar: [10]
𝐵 𝑐𝐶
𝐶 𝑏𝐶 |
𝐷 𝐸𝐹
𝐸 𝑔 |
𝐹 𝑓 |
Q.3. a) Generate 3-address code for the following C program and construct [10]
flow graph with the help of basic blocks : (assume 4 memory
locations for integer ):
𝑎 = 𝑎 * 𝑏- 5 * 3/𝑐
b) Explain Phases of compiler with following example [10]
2C4E54A85DC280446DC2BCFEDD431B03
Paper / Subject Code: 89281 / System Programming & Compiler Construction
Dec24
Q2
A. Explain with flowchart design of two pass assembler.
B. Construct Three address code for the following program:
i = 1;
x = 0;
while (i <= n) {
x = x + i;
i = i + 1;
}
Q3
A. Explain Direct Linking Loader in Detail.
B. Design LL(1) parsing table for the given grammar
S → iCtSE | a
E → eS | e
C → b
Q4
A. Explain the working of a Single-pass macro processor with neat flowchart.
B. Explain with suitable example code optimization techniques.
Q5
A. Explain different issues in code generation phase of compiler.
B. Explain DAG with suitable example.
Q6
A. Explain the different phases of a compiler with suitable example.
B. Explain advanced macro facilities with suitable examples.
81A25C470EC1D85158D58F2940E4782C