41

 · styles and Architectural patterns. 4. (a) ... Suggest an Architecture with Implicit Invocation style for the following system:- 12 The KWIC (Key Word in Context)

  • Upload
    vanthuy

  • View
    218

  • Download
    5

Embed Size (px)

Citation preview

38: 2nd half 11-AM(e)

Con. 6457-11.

N.B.: (1) Question No.1 is compulsory.(2) Attempt any four questions out of remaining six.

1. (a) Define Automation. Differentiate between soft and hard automation.(b) list and define Kinematic parameters.(c) Explain in brief various types of work envelopes.(d) Explain fundamental rotation. Develope fundamental rotation matrices.

2. (a) Define Direct Kinematics. Develope arm equation for 5-axis RHINO XR3 robot 10with the help of D-H Algorithm.

(b) Explain PnP operation with sketches. 10

3. (a) Obtain Inverse Kinematic Solution for 4 axis SCARA robot. 10(b) Explain various template matching algorithms and compare them. 10

4. (a) Classify robot as per workspace and explain in brief. 10(b) Explain Bounded Deviation Algorithm (BDA) to obtain straight line motion. 10

5. (a) List various workspace fixtures and explain them in brief. 10(b) State the role of shrink and swell operators in robot vision. Differentiate between 10

these operators with suitable examples.

6. (a) List various specifications of robot and explain at least 6 significant specifications 10with sketches wherever required.

(b) Explain configuration space and also the role of G. V. D. in task planning. 10

7. Write short notes on the following :-(a) NC VS CNC machines

. (b) Interpolated motion(c) Perspective transformations(d) Tool Configuration Vector (TCV).

'2' (2-- l~ )) 6~ CfY)d' 1'3 m (~ \92: 2nd Half-Exam.-11 mina (c). ttu~ Corr{) 6'UM~ <jo)#~d1J'Y)

(REVISED COURSE) MP-5203

N. B.: (I) Question No.1 is compulsory.(2) Attempt any four questions out of remaining six questions.

1. (a) Explain the importance of good design. [5]

(b) What is direct and indirect manipulation? [5]

(c) How people can interact with computer? How people are gett.ng trouble with

computers? [5]

.cd) Explain inf'lJe!1ce~on leon u~aiJiiity. [5]

2. (a) Describe advantages and disadvantages of graphical system. [10]

(b) Explain user interface design process [10]

3. (a) What is the use of. interface building tools? Also explain features of these tools. [10],

(b) What are mental models and Why are they important in interface design? [10]

4. (a) Explain human consideration in screen design and also explain ordering of screen

data and content. [10]

(b) Explain proper device base controls. [10]

5. (a) Explain technological considerations in interface design. [10]

(b) . What is color? Explain various types of color. What are the possible usesof colors and

Problems associated with it? Give guidelines to choose proper color for web page. [10J

6. (a) What are pointing devices? Write tasks and explain about direct control pointing

(b) Expfain Keyboards with its layf)ub, keys <1fld flmction key!.

7. Write a short note Q.nany two of the following:

N.S.: (1) Question NO.1 is compulsory.(2) Attempt any four questions from the remaining six questions.(3) Figures to the right indicate full marks.

1. Answer the following :- 20(a) How is Software architectur~ different from Software design?(b) Explain how Middle ware and Component frame-work induces architectural

style.(c) What are the different types of connectors based on interactive services?(d) Explain in brief the guidlines of a good Software architecture for achieving

NFP (no-functional property) goals.

2. (a) Explain Prescriptive and Descriptive architecture with examples. 10(b) Compare the Model-based and Simulation-based analysis techniques used in 10

,-, Software architecture.

3. (a) Compare and contrast on the following :- 10(i) Event-based and Client-server based Data Distribution Connectors.

(ii) Static and dynamic aspects of Models in Software Architecture.(b) List various architectural styles. What are the differences between Architectural 10

styles and Architectural patterns.

4. (a) Explain the basic features of xADL used as a modeling language. 10(b) Explain MVC architectural pattern and give an example of an application where 10

it is used.

5. (a) Comment on the styles of architecture pattern for a Mobile Code and Implicit 10Invocation.

(b) Explain the Distributed Object Style in connection with CORBA middle ware. 10----

6. (a) Define and explain the following terms ;- 8(i) Architectural drift and Architectural errosion

(ii) Architectural model and Architectural recovery.(b) Suggest an Architecture with Implicit Invocation style for the following system :- 12

The KWIC (Key Word in Context) index system accepts an ordered set of lines.Each line is a ordered set of words and each word is a ordered set of characters.Any line may be 'circularly shifted' by repeatedly removing the first wQrd and·appending it at the end of the line. The KWIC index system outputs a listing ofcircular shifts of all lines in an alphabetical order.

1. Answer the following :- .:f 20(a) How is Software architectur~ different from Software design?(b) Explain how Middle ware and Component frame-work induces architectural

style.(c) What are the different types of connectors based on interactive services?(d) Explain in brief the guidlines of a good Software architecture for achieving

NFP (no-functional property) goals.

2. (a) Explain Prescriptive and Descriptive architecture with examples. 10(b) Compare the Model-based and Simulation-based analysis techniques used in 10

Software architecture.

3. (a) Compare and contrast on the following :- 10(i) Event-based and Client-server based Data Distribution Connectors.

(ii) Static and dynamic aspects of Models in Software Architecture.(b) List various architectural styles. What are the differences between Architectural 10

styles and Architectural patterns.

4. (a) Explain the basic features of xADL used as a modeling language. 10(b) Explain MVC architectural pattern and give an example of an application where 10

it is used.

(a) Comment on the styles of architecture pattern for a Mobile Code and Implicit 10Invocation.

(b) Explain the Distributed Object Style in connection with CORBA middle ware. 10

6. (a) Define and explain the following terms :- 8(i) Architectural drift and Architectural errosion

(ii) Architectural model and Architectural recovery.(b) Suggest an Architecture with Implicit Invocation style for the following system:- 12

The KWIC (Key Word in Context) index system accepts an ordered set of lines.Each line is a ordered set of words and each word is a ordered set of characters.Any line may be 'circularly shifted' by repeatedly removing the first wQrd and-appending it at the end of the line. The KWIC index system outputs a listing ofcircular shifts of all lines in an alphabetical order.

7. Write short notes on the following :- 20(a) Ambiguity, Accuracy and precision in the characterization of architectural

models.(b) Service-oriented Architecture and Web Services(c) Domain Specific Software Architectures (DSSAS)(d) Architecture Description Language (ADL).

8 2nd half11-AM(e)

Con. 6276-11.

N.S.: (1) Question No.1 is compulsory.(2) Attempt any four questions out of remaining six.(3) Assume suitable data wherever required.(4) Figures to the right indicate full marks.

1. (a) You are appointed as a consultant to setup a multimedia laboratory in an 10engineering institute. Give specifications of components, configuration, connectingsoftware etc. along with the assumptions.

(b) What are the components of Distributed Multimedia system. 102. (a) Explain MPEG 1 compression in detail. 10

(b) What is Authouring system? Explain different types of Authouring system. 103. (a) Explain RTP, RTCP, RSVP, RTSP and IP multicast. 10

(b) Explain Level 0 through level 5 of RAID functionality. 104. (a) What are different types of workflow ? Suggest application of mail enabled 10

workflow.(b) Explain virtual reality design considerations. 10

5. (a) Explain in detail MIDI communication protocol. 10(b) Explain the print out technology. Hence explain the wor~ing of a Laser Printer. 10

6. (a) Explain JPEG DIS file format for still and motion images. 10(b) List atleast two multimedia software tools for the following :- 10

Digital audio, graphic and image editing, video editing, animation, multimediaauthoring.

7. Write short notes on any two of the following :-(a) Hypermedia Application Design consideration(b) Video conferencing : Design issues(c) Scheduling and policy mechanism in multimedia networking.

N.S. : (1) Question NO.1 is compulsory.(2) Attempt any four questions out of remaining six questions.(3) Figures to the right indicate full marks.(4) All questions carry equal marks.

1. (a) What are the major issues in designing a distributed operating system? 5(b) What are the main similarities and differences between the RPC Model and 5

the ordinary procedure call model?(c) What are the statefull and stateless servers ? 5(d) Differentiate: Replication vs Caching? 5

--2. (a) Explain various forms of message-oriented communication with suitable 10

example.(b) Compare processes and threads. Explain user and kemal level threads 10

execution and also the need of light-weight threads.

3. (a) What are the different failure that can occur in RPC system? Discuss the 10solutions for these failures.

(b) Compare data-centric and user centric consistencies and explain one 10consistency model of each type.

4. (a) Explain desirable features of a good naming system. 10(b) What is CORBA ? Explain its Architecture and various services provided 10

by it.--

5. (a) Explain distributed algorithm for mutual exclusion. What are the advantages 10and disadvantages of it over centralized algorithms?

(b) Explain main issues in building a DSM system on a network of heterogeneous 10machines.

6. (a) Explain the process of synchronization W.r.t. physical and logical clocks. 10(b) Explain lightweight RPC. 10

7. Write short note on any two :- 20(a) Fault Tolerance(b) Attacks and Security in a Distributed System(c) Issues in Designing Load Sharing Algorithms.

-,,-0 ~~-

C l1 b ..0..'1) 'S~VY) ~=~E~ ~'C.v I fT ~ X I (om r f T T .

Con. 321C-.~::. f? Ob 0 t i ~ AN-3085I 4~ b - ~! ~ ( 3 Hours) [ Total Marks: 100

~~ B .'1 \ n . ~,,' Nt 1 .IS COJ""' pulsory.(. . . \ 'i ,",~,~.(: L.li ~ I. .. .

(2) Attempt an) four questions out of remaining six questions.r-' /l . bl d ~ h .

d',::;} f,53'.!,. . sur ~a e ala w erever requf;'{' .

1. (a) Explain the following terms related to robot :- 10 -DOF, Reach, stroke, tool orientation, precision, accuracy, repeatability, load

carrying c::pacity, speed, work envelope.(b) How are robots classified? f:(c) Differentiate between soft and hard automation. " 5

2. (a) Compute th~ joint variable vector q = [q1' q2' q3' q4]T for the following tool 10

cunfiguratiol1 vector of SCARA. W(q) = [203'4, 662,7, 557, 0, 0, - 1.649]T.I'"" (b) Explain the process of linear interpolation with parabolic blends. 10

2. (a) Using D-H Algorithm, perform direct kinematic analysis of 5 axis RHINO 10. XR3 robot.(b) E::plain the principle and applications of edge detection techniques using 10

gray scale image.

4. (a) Explain bounded deviation algorithm for achieving straight line motion. 10(b) Describe the solution of inverse kinematic problem of a 2-axis planar robot. 10

5. (a) Explain work space nalysis of S-axis RHINO-XP3 robot by finding the maximum 10and minimum bounds.

(b) O.:;rive the general link co-ordinate transformation matrix T~-1' 1~I"'"

,,~ 6. (a) Explain the PNP motion trajectory in details. 10r~f!!1~$ (b) Explain the effect of Moment of Inertia on the dynamic performance of a 10:.. robot.

7. Write short notes on :- 20(a) Screw Transformation(b) Robot Programming

" (c) Shrink and Swell Operators

(d) Gross Motion Planning.

*********

--~""- .. - r; E-- ( [~)t"'l~~~=( t) ~~ ~ ~ '0

\ ""-,,,Exam-March 1~~~ ~ ,.,

:'""'- C:'~~-\1~~_Y ~L,~~~ AN-3145

(3 Hours) [Total Marks: 100

N.B. : (1) Question No.1 is compulsory.

(2) Attempt any four questions out of remaining six questions.

(3) Figures to the right indicate full marks. ,.:

1 (4) Answers to the questions should be grouped and written together. ~~1~.., (5) Assume suitable data if necessary and clarify.

l g '"f ~~ ~-C2.)..)..!r\f\ ~, 1. (a) What is a product Cipher? , 5

(b) List at least three kind damage a company could suffer when the integrity of a 5program or company data is compromised.

"

~./ (c) What do you mean by operating system and application finger printing? 5

(d) Describe Memory and Address protection. 5

~ 2. (a) Using the RSA algorithm, encrypt the following :- 10~ (i) P = 3, q = 11, e = 7, P = 12

(ii) P = 7, q = 11, e = 17, P = 25

(iii) Find the corresponding ds for (i) and (ii) and decrypt the Ciphertexts.

(b) (i) Explain how the use of cookies thwarts a denial-of-service (DOS) attack in 5the Diffie-Hellman exchange.

(ii) Explain how anthentication thwarts the man-in-the-middle attack. 5

3. (a) What are t~e contents of a security plan? 6

! c , (b) Describe the steps of a Risk Analysis. 6-. '"'

~~ (c) What are the security requirements from the database system? 8

"---, 4. (a) When is IPSec appropriate? When is SSUTLS appropriate? 10

(b) What makes a network vulnerable? 10

/

5. (a) What do you m;ean by Stealth Mode IDS? Describe IDS strengths and limitations. 10

(b) Define the ter"1 Ethics. What is difference between Laws and Ethics? What IS IEEE 10code for Ethics?

6. (a) List and explain the various malicious codes and Non-malicious codes. 10

(b) Describe different types of firewalls with design, configuration and limitations. 10

7. Write a details note on (any two) :- \. 20

(a) DES(b) Security of HASH functions and MAGS

(c) Public-key Infrastructure (PKI).

"""~"- ""-;..c;i:lc/

~r -"'c ,. '-,

-~- (L-1b"lf-LJIY~) SQvY:> .- ~\ ~~v \c.~m 'P~ . Ii 41 (, J 2-tJ I ()

, ~-\.. ~ - P w k f)1,j Vl-r\pnl-IO-188 .~~

""=, Con. 3839-10. AN-3154,'"" -~;;~

:" ( 3 Hours) [Total Marks: 100

N.B. : (1) Question No.1 is compulsory.(2) Attempt any four questions out of remaining six questions.(3) Assume suitable data wherever nece~ary.\-. " r \~ 0... +e,. 't...\ 0.. ~ Y'\.~ ~ ~ ~ ,'V\-, VCS)

1. (a) Define Data Warehouse with features. Explain the architecture with suitable 10

block diagram.

(b) Consider the transaction database given below. Use Apriori Algorithm with 10min-sup = 60% and min-confi = 80%

Transaction-id Items

r-. T1 K, A, 0, 8. T2 0, A, C, E, 8

T3 C, A, 8, E11- T 4 8, A, D.

2. (a) What is dimensional modelling? What is slowly changing dimensions? 10How this problem is solved? Give example.

(b) Consider a data warehouse for a hospital, where there are three dimensions. 10Doctor, patient and time, and two measures count and charges, where chargeis the fee that doctor charges a patient for a visit.Using the above example describe the following CLAP operations :-

(i) Slicef\ (ii) Dice , .

t.! F ;. (iii) Rollup ;. ~;i1j

(iv) Drill down ':' -,

(v) Pivot.

3. (a) State key issues to be considered while planning for data warehouse. 10Explain any four of them.

(b) What is Web Mining? Explain Web Usage mining. 10

[TURNOVER

- . -"'"VT-,\pril-IO-189 ~~it~~ \~Con. 3839-AN-3154-10. 2 '

4. (a) Why Metadata is important? What is Business Metadata and Technical 10Metadata?

(b) Given the training data for height classification, classify the tuple 10t = < Ad am, M, 1.97 > using Bayesian classification.

Name Gender Hei ht Output , /" .

~

Kristina F 1.6 m Short ,; -t

Jim M 2 m Tall " :

Maggie F 1.9 m MediumMartha F 1.88 m Medium '.-

Stephanie F 1.7 m ShortBob M 1.85 m MediumKathy F 1.6 m ShortDave M 1.7 m ShortWarth M 2.2 m TallSteven M 2.1 m TallDeffie F 1.8 m MediumTodd M 1.95 m MediumKim F 1.9 m MediumAmy F 1.8 m MediumW nette F 1.75 m Medium

5. (a) Explain ETL of data warehousing in detail. 10

(b) What is clustering? Explain K means clustering algorithm. 10Suppose the data for clustering is {2, 4, 10, 12, 3, 20, 30, 11, 25} considerK = 2, cluster the given data using above algorithm.

6. (a) What is Web Structure mining? What are techniques used for it? What 10are authorative and hub pages?

(b) What is KDD? Explain KDD process with neat diagram. 10

7. Write short notes on : (any two) - 20(a) Comparison between OLAP and OL TP ,. "~

(b) Spatial Mining j;nir,~ J9","\ ':; i;

(c) Snowflake Schema.

j *********i;

'"

cc- -- c'

- ~--~-"-~-:-C:C--""'-'..-~'~. $eVV\ -vf\\ / Dt." ICe YV1

P -~

~ ~ f- . '1-~ -""l.DfO

Con. 3232-10. AN-3148D. Co. .

" (3 Hours) , [Total Marks: 100

"Dt~lb44~~ Co~~~N.B. : (1) Question No.1 is compulsory. -1(2) Attempt any four questions out of remaining six questions. -

(3) Figures to the right indicate full marks. .-~ ~:_~:" ~~~.;:~~~~~~~~;.,:~;

1. (a) What is CORBA ? Explain its general architecture. ::. 10

(b) Explain RPC mechanism. Explain RPC semantics in case offailure 10

2. (a) What are the different goals of distributed system? Explain how are these 10

goals implemented in the distributed system

(b) Compare NOS and DOS with suitable diagram 10

3. (a) What is totally ordered multicasting ?How Lamport clock is implemented 10

(b) Explain the need for Co-ordinator in distributed system. Explain the election 10

algorithm.

4. (a) What are the various forms of message oriented communication? Give 10

example of each.

(b) Explain attacks and security t11feats in distributed system. 10

S. (a) Explain code migration and role of mobile agents. 10

(b) Explain the process of concurrency control using pessimistic and optimistic 10

time stamp ordering.

6. (a) What is name resolution? Explain various ways of name resolution. 10

(b) Explain distributed algorithm for mutual exclusion. What are the advantages 10

and the disadvantages of it over centralized algorithms.

7. Write notes on: ( any two ) 20

i) CODA file system.

ii) Fault tolerance.

iii) Parameter passing in RMI.

iv) NFS file system.

~ .

l~,-c -s-e!fY') "~\~JtJ r . } R~v I Co rn fiT T. ~'-b~ 10-p3-upq-Con No FIle ~ ~ ,~£ -. IV. t-J . ~ f'.5.i ~- Con. 3213-10. (REVISED COURSE) AN-3157II (3 Hours) [Total Marks: 100III

N.B.: (1) Question No.1 is compulsory.(2) Attempt any four questions out of remaining.

. Ne- L-i .y-rI.) Ne.t Wore ~ Y\d ~2-2-1 %~-tY~Q.I (a) A neuron with 4 inputs .has the weight vector w = [1,2,3,4]1. The

activation function is linear, that is, the activation function is given by f(net) =net. If the input vector is X = [5,6,7, 8JI , then find the output of the neuron.

05(b) Model the following as fuzzy set using suitable membership function ~

"numbers close to 5". 05(c) Define with examples the terms Projection and Cylindrical Extension in a

fuzzy relation. 05(d) Differentiate between the membership functions T function and Zadeh's S

function. 05

Q.2 Design a fuzzy controller to determine the wash time of a domesticwashing machine. Assume that the inputs are dirt and grease on clothes.

~~: Use three descriptors for each input variable and five descriptors for;, the output variable. Device a set of rules for control action and

defuzzification. The design should be supported by figures whereverpossible. Clearly indicate that if the clothes are soiled to a larger degreethe wash time required will be more. 20

Q.3 (a) What is learning in neural networks? Compare different learning rules. 10(b) Explain error back propagation training algorithm with the help of a

flowchart. 10

Q.4 Determine the weights after three iterations for hebbian learning of a singleneuron network starting with initial weights w = [1,-1 J, inputs asXl = [1,-2J, X2 = [2,3J, X3 = [1,-IJ and c = 1.Use (i) Bipolar binary activation function

~ (ii) Bipolar continuous activation function 20

~ Q.5 (~) Describe the basic Hopfield model and give the theory of energy 10~~{jc-';~~,~ minimization in auto~associative Hopfield network..,'.:",c""c'c (b) Explain the architecture of Bidirectional associative memory. How is 10

storage and retrieval performed in BAM?

Q.6 (a) Explain RBF network and give the comparison between RBF and MLP. 10

(b) Explain with suitable examples linearly and non-linearly separable 10pattern classification.

Q.7 Write notes on any two of the following 20(i) Fuzzy Knowledge based Controller

(ii) Defuzzification Methods(iii) Character recognition using neural networks(iv) Medical diagnosis using neural networks

-