TE SEM VI DEC 2023 KT - Compressed

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

4

9A

61
FB

98
79
Paper / Subject Code: 37412 / Cryptography and System Security

C1
46
85

E6
AC

9A

61
FB

98
79
AE

C1
46
85

E6
AC
FF

9A
FB

98
9
E

7
D7

46
A

E6
C

8
FF
Duration: 3 Hrs. Marks: 80

9A
6B

FB

9
E

57
D7
Note:

69

E6
AC

8
F

9A
6B
CE

B
1. Question 1 is compulsory.

79
F

CF
D7
69

FA

E6
2. Attempt any 3 questions out of the remaining questions.

61

8
A
B
CE

FB
C1

79
7F

E
9 6

FA

85
C
1
98

D
Q1. Attempt any Four.

E6
6

EA
B

FB
C1
46

7F
C
a. Explain the different modes of block ciphers. 05

96

A
9A

C
61
98

D
E6
b. List with examples the different mechanisms to achieve security. 05

EA
B

B
1
46

F
E6

6
C

CF
D7
c. Differentiate MD5 and SHA-1 algorithms. 05

69

A
9A

61
8
79

FF

EA
B
d. List and explain security requirements of database. 05

CE
1
46
85

E6

6
C

7
9

FA
9A
e. Explain phishing and list different types of phishing techniques. 05

61
FB

D
9

6
69
7

B
CE
C1
5

7F
E6
AC

96
A4
B8

61
98

D
79
Q2.

6
AE

9
F

6B
CE
C1
6
85

F
6
AC

a. User A and B want to use RSA to communicate securely. A chooses public key

4
E

D7
FF

9
9A

61
FB

98
9

6
E

as (7, 119) and B chooses public key as (13, 221). Calculate their private

6B
D7

CE
C1
46
A

85

E6
C
keys. A wishes to send message m = 10 to B. Produce the ciphertext.
FF

69
9A
6B

61
FB

98
9
E

57
Formulate the key using which A encrypt the message "m" if A need to
D7

CE
C1
46
69

FA

E6
C

B8
EA

authenticate itself to B. 10

9A
B
CE

61
98
79
F
6

CF
7

C1
46
9

b. Explain memory and address protection in detail. Write a note on file


FA

E6
61

BD
6

8
A

9A
CE

FB

98
C1

79
protection. 10
7F

E
6

46
9

FA

85

6
C
1
98

D
E6

9E
6

EA

9A
B

B
1
46

Q3.
C

6
C

57
CF
7
9

E6
9A

61
98

D
E6

B8
a. List the functions of the different protocols of SSL. Explain the
FF

EA
6B
C1

79
46
E6

CF
handshake protocol. 10
D7
69

FA

85
9A

1
8
79

6
9

EA
b. List different poly-alphabetic substitution ciphers. Encrypt "The key is
B
CE

FB
1
46
85

7F
E6

6
C

hidden under the door" using playfair cipher with keyword "domestic". 10
69

A
9A

AC
61
FB

D
9

69

F
7

B
CE
C1
5

F
E6
C

AE
96
4
8

D7
EA

9A

61
FB

Q4.
79

E6
69

FF
6B
1
FA

85

6
C

a. Define digital signature. Explain any digital signature algorithm in detail. 10


1C
C
4
E

D7
EA

9
9A
FB

98
9
7F

b. Give the format of X.509 digital certificate and explain the use of
6
7

6B
CE
1
46
FA

85

E6
C
BD

8C

a digital signature in it. 10


A

69
9A

61
FB

9
7F

69
6

57

CE
C1
69

FA

6
C
BD

A4
B8

E
EA

Q5.
61
8
79
F

69
96

9
CF
D7

a. Explain session hijacking and management. 10


C1
FA

A4
E6

E
A
6B

FB

98

b. What is need of Diffie-Hellman algorithm. User A and B decide


79
7F

E
1C

69

46
69

FA

85
C

to use Diffie-Hellman algorithm to share a key.


D

9E
16

9A
B
CE

FB
7F

They choose p = 23 and g = 5 as the public parameters.


E
6
8C

57
9

E6
C
61

Their secret keys are 6 and 15 respectively. Compute the secret key
6

B8
FF

EA
6B
E
C1

79
1C

that they share. 10


CF
D7
69

85
8

16
69

EA
B
CE

FB
7F
6
8C
A4

Q6. Attempt any Four.


69

AC
61

D
69

F
69

B
CE

a. Explain the different types of firewalls and mention the layer in


C1

AE
96
A4
9E

which they operate. 05


61
98

BD
E6

FF
69

1
46

b. List and explain vulnerabilities in windows operating system. 05


1C

96
C
E

D7
9A

98
79

c. List and explain characteristics needed in secure hash function. 05


6
6

6B
CE
1
46
85

E6

d. Explain Triple DES in short. 05


8C

69
9A

61
FB

79

69

e. Explain with examples, keyed and keyless transposition ciphers. 05


CE
1
85

E6
AC

8C
A4

61
FB

79

69
69

**********************
C1
85
AC

A4
E
FB

98
79

41717 Page 1 of 1
AE

69

46
5
AC

B8

9E
F

9A
7F

AE

57
CF

E6
BD

B8
F

EA

79
7F

CF
FA

85
D

EA
6B

696BD7FFAEACFB8579E69A4698C161CE
FB
7F
03

F3
B

F
E

D6
35
Paper / Subject Code: 37411 / Data Analytics and Visualization

17

63

83
B2
9D

E0

03

F3

D6
35
17

63

83
5D

B2
9D

E0

03

F3
B3

35
7

3
D
C3

38
5

B2
9D

0
B3

E
E8

0
35
7

63
5D
C3

1
46

B2
9D

0
B3

7E
FC

8
(3 Hours) (Total Marks: 80)

5
63
D
C3

3
1
6
D6

B2
9D

E0
4

B3
FC

E8
F3

17

3
N.B.: 1. Question No. 1 is compulsory.

5D
3

06
46
6
83

D
D

3
2. Answer any three out of the remaining questions.

E
C

D9
03

B
F3

17
F

3
6
D6
35
3. Assume suitable data if necessary.

5
C

D
4
38

B3
FC

E8
B2

D9
3

7
4. Figures to the right indicate full marks.

50

1
6
6
63

35
8C

9D
C4
3D
23

8
E0

03

3B
E
B

6F

5D
F

6
Q1. Attempt the following (any 4): (20)

5
17

8C
C4
3D
3
6

3
B2
9D

3B
6E
a. Why is data analytics lifecycle essential?

6F
E

3F
35
7

3
5D

8C
C4
3D
1

06

8
b. The regression lines of a sample are and .

B2
D

03

B
B3

E
6F
7E

3F
D9

Find (i) sample means ̅ and ̅.

C3
46
5
63
C3

3D
23
1

38
5

FC

E8
D

E0
B3

(ii) coefficient of correlation between and

B
E8

50

3F
9

46
D6
7

3
5D
C3

3
1

6
46

38
c. Differentiate between linear regression and logistic regression.

FC
2
9D

F3
3

3B
E
C

E8

50
B

d. What is Pandas? State and explain key features of Pandas.

D6
17
6F

3
5D
3

23
06
6

38
C

D
4
3D

F3
e. Explain term frequency (TF), document frequency (DF), and inverse document
3

3B
E
C

50
D9
B
6E

7
6F

83
F

C3

23
D1

06
frequency (IDF).
83

5
C4

03
3D

B3

3B
7E
8

D9
03

35
F
F

D1

06
6
6
35

83

35
C

B2
C4
D

Q2. Attempt the following:

7E
8
2

9
03

3B
F3

63
3B

6F

a. Explain the data analytics lifecycle. (10) D

D1
46
35

83

35
8C

E0
D
06

C
2

9
03

B
F3

b. Find two lines of regression from the following data: (10)


6E

17
3B

6F
7E

5D
C3
35

9D
C4
3D

Age of husband
1

06

38

B3
8
2
9D

25 22 28 26 35 20 22 40 20 18
E
3B

6F
7E

5D
0

C3

( )
6
5

3
5D

4
3D
3
1

06

38

B3
FC

E8
B2
9D

Age of wife ( 18 15 20 17 22 14 16 21 15 14
B3

7E

50

3F

C3
46
D6
3
5D
C3

3
1

06

Estimate (i) the age of husband when the age of wife is 19 and (ii) the age of wife when
8

FC

E8
B2
9D

F3
3

7E
E8

50
3B

the age of the husband is 30.


46
D6
3

3
5D

3
1

06
46

38

FC
8C

2
9D

F3
B3

B
E
FC

50
6E

D6
7

83
5D
C3

23

Attempt the following:


D1

06
C4

03

F3
B3

B
7E
8

D9

a. Explain Box-Jenkins intervention analysis. (10)


6E

35
63
6F

83
C3

1
5

B2
D

0
C4

03

b. What is text mining? Enlist and explain the seven practice areas of text analytics. (10)
3D

7E
8

D9
3B
6E

35
3
F
3F

D1

06
D6

35
8C

B2
C4
38

7E
9

Q4. Attempt the following:


B
F3

6E

63
F

D
3

1
D6
83

5
8C

E0
C4

a. Explain different types of data visualizations in R programming language. (10)


B3

D9
03

F3

6E

17
6F

b. Fit a regression equation to estimate , , and to the following data of a transport


3
35

83

5
8C

9D
C4
3D

B3
B2

company on the weights of 6 shipments, the distances they were moved and the damage
03

E
6F

5D
F

C3
46
35
63

83

of the goods that was incurred. (10)


3D

B3
FC

8
B2
E0

03

E
F

Weight (1000 4.0 3.0 1.6 1.2 3.4 4.8


C3
46
D6
35
63

83

FC

E8
B2
0

kg)
03

F3
7E

46
D6
35
3

83

Distance (100 1.5 2.2 1.0 2.0 0.8 1.6


D1

06

FC
B2

03

F3
7E
D9

km)
D6
35
3

83
D1

06
35

B2

Damage (Rs.) 160 112 69 90 123 186


03

F3
7E
D9

35
3

83
D1

06
35

B2

03
7E
D9

Estimate the damage when a shipment of 3700 kg is moved to a distance of 260 km.
3B

35
3
D1

06
35
8C

B2

39481 Page 1 of 2
7E
D9
3B
6E

63
D1
35
8C

E0
C4

9
3B
6E

17
5D
8C

9D
C4

C46E8C3B35D9D17E063B2350383F3D6F
B3
C4 35 E0 38 FC
6E D9 63 3F 46
8C D1 B2 3D E8
3B 7E 35 6F C3
C4 35 0 03 C4 B3
6E D9 63 83 6E 5D
8C D1 B2 F3 9D
3B 35 D6 8C
35 7E 03 F 3B 1 7E
D9 06
3 83 C4
6E 35D 06
8C B2 F3 3B
3B D1 35 D6 8 9D 2
35 7E 03 F
C3
B3 1 7E 35

39481
06 83 C4 03
D9 3 F 6E 5D 06 83
D1 B2
35 3D 8 9D 3B
2 F3D
B3 7E 03 6F C3
B3 1 7E 35 6F
5D 06 83 C4 03 C
9 3 F 6E 5D 06 83 46
D1 B2
35 3D 8C 9D E8 3B
2 F 3D
7E 03 6F 3B 1 C3 35

regression.
SD
06 C4 3 7E 03 6F
83 3 5 4
B3
06 C
Mean
9D B2 F3 D9 3 6E 83 6 5D

c. Regression plot
17 35 8C B2 F3 E8
E0 03
D6
FC 3 B
D1
7 3 5 D 6 C3 9D
E 0 F 17

Coefficient
Correlation

a. Time series analysis


63 83 46 35 06 38 C4 B3 E0
E 3 3 5
Q5. Attempt the following:

B2 F3 D9 6E 63
35 D6 8C D B2 F3
D 8
D9
of
3 1 3 C D B2

b. Exploratory data analysis


03 FC B3 7E 50 6F 3 B 1 7 35
83 46 5 D 06 38 C4 3 E 0 03

Q6. Write short notes on (any 2):


F3 E 8 9 3B 3 F 6 E 5D 6 3 83
2 8 9 B
0.52
36.8

D6 C3 D1 3 3D D F3
508.4

FC C3 1 23

d. Generalized linear model (GLM)


B3 7E 50 6F B D6
46 5 0 63 3 8 C 46 3 7E
06
50
38 FC
E8 D9 B 3F E 5D 3 3 46
C3 D 1 23 3D 8 9D F3
C
Yield in Kg.

B2 E8
B3 7E 50 6F 3B3 17 3 5 D 6 C3
5D 06 38 C4 E0 03 FC
3 3 6E 5 63 8 3 4
B3
9D B2 F3 D9
D F 3 6E 5D

Page 2 of 2
8C B2 8

*******
17 35 D6
3B 17 35 D6 C3 9D
E0 03 FC E 0 F 17
63 83 4 6 35 06 3 8 C B3 E
B2 F3 E 8
D9 3 B 3 F 46
E8 5 D
35 D6 C3 D1 23 3D 9D
03 B 7 5 6 C3

C46E8C3B35D9D17E063B2350383F3D6F
FC E 17
4.6

83 35 03 FC B3
26.7

F3 46 D 06 8 4 6 5D E0
E8 9 3B
2
3F E 63
B
D6 C3 D1 3 3D 8 C 9D
FC B3 7E 50
38
6F 3 B3 1 7
46 06
when the rainfall is 29 cm and the rainfall when the yield is 600 kg.

5D C4 E0
E8 9 3B 3F 6 5 D 63
Rainfall in cm

C3 D1 23 3D E8 9D
7E 50 6F C 3 1
B2
B3 B 7 35
Paper / Subject Code: 37411 / Data Analytics and Visualization

5D 06 38 C4 3 E 0 03
3B 3F 6 5D 6
b. What is stepwise regression? State and explain different types of stepwise

9D 23 3D E 8C 9D 3 B2
17 50 6F 3 1 35
E0 38 C4 B3 7E 03
63 3 F3 6E 5 D9 0 63 83
a. From the following results, obtain two regression equations and estimate the yield

B2
35 D6 8C
3B D 17
B2
35
F3
03 FC
(10)

E0 03
(10)

(20)

83 46 35 83
F3 E D9 63
D6 8C
3B D 17
B2
35
F3
D6
FC E 0 F
46 3 5D 06 38
E8 9D 3 B2 3 F3
C3
B 1 7 3 5 D6
3

A
7

03
2A

2
31

94
Paper / Subject Code: 37417 / Image & Video Processing (DLOC - II)

B2
88
30
60

73

4A

03
2A
FB

2
31

B2
88
39
30
60
1A

4A
17

03
2A
FB
77

03

88
9
60

3
A
Duration: 3hrs Max Marks:80

6A

A
17
1

A
B

4
7
B7

3
2

39
F
7

0
60
1A
6A
N.B. : (1) Question No 1 is Compulsory.

A3
97

7
B

31

4
7
B7
22

39
(2) Attempt any three questions out of the remaining five.

AF
A7

0
60
3B

A3
97

17
1
(3) All questions carry equal marks.

B
7
B7
2
80

3
2
F
7
2

0
0
(4) Assume suitable data, if required and state it clearly.

1A
6A
3B
A8

3
97

B6

A
7
7
22
80
94

02
F
A7
B

A
3B
A8

7
73

B6
Q.1 Solve any Four out of Five 5 marks each

A
76
9

7
2
31

80
4

02
AF
7
7B
B2
9
Justify : Describe the image in terms of the number of grey levels. Greyscale numbers are

6A
A
30

A8
3

B6
71
29
7

3
2A

7
31

80
4

AF
7
7B
2
2, 8, 64, and 256 are given. How does a change in the number of grey levels affects

6A
3B
0

8
60

73

1
3

29

7
2A

B7
FB

31

80
4
storage?. Explain with an example.

7
B2
9

A
30

8
60

97
73
1A

1
A

76
03

77
A
B Justify : The best filter for removing salt and pepper noise from an image is median filter.
FB

2
31

4
7

7B
2
88
2

39
A7

6A
3B
0
0
A

4A
6

29
7
Justify with an example.
1

A
76

B7
FB

31

0
7

2
88
2

9
7
7B

3B
30
60

97
73
A
A

C Justify: Two fundamental characteristics of gray level values serve as the basis of

4A
1

A
76
29

22
31

80
7

39
F
A7
7B
B2

3B
30

A8
segmentation algorithms for gray scale images.
60
1A

17
A
6
29

FB
03

80
94
7
B7

03
02
D Justify: Although run length coding is lossless, it may not always result in data
7
B2
88

A8
73
1A
A

A3
97

B6
4A

76
03

94
7
2

compression.

03
02
AF
A7
7B
2
88
39

73
B

A3
B6
1
4A

76
29
17

03

31
E Explain any five video formats.
7

02
AF
A7
B
B2
03

88

30
39

97

6
1
A3

Q.2 10 Marks each


4A

2A
76
17

FB
3

77
22
80

7B
03
02

39

60
A
A
B
8

A What is DFT? Explain any four properties of DFT.


1
A3

76
B6

29
17

FB
03

7
4

7
7B
B2
03

88
02

9
AF

1A
6A

B What is meant by an image histogram. Perform Histogram Equalization on a given data.


73
A3

4A
B6

29
03
71

77
B7
31

B2
88

Draw histogram of original and equalized histogram.


02

39
AF
A7

6A
30

97
A
B6

03
71

2A
76

B7
22
31

Grey Level 0 1 2 3 4 5 6 7
88
9
AF
A7
7B

3B
30
60

97
3

4A
17
71

A
76
29

22
80

No. Of Pixels 790 1023 850 656 329 245 122 81


3
2

39
AF
A7
7B

3B
0

A8
60

A3

17

Q. 3 10 Marks each
71
76
29

80
4
3
02

39
AF
A7
7B
B2

30

A8

A Explain Log & Power law transformation with suitable diagrams.


B6

17
71

A
76
29
03

94
03
2
AF
A7
7B
B2
88

73

B Write derivation for Sobel Edge detection operator. What is the advantage of Sobel
A3
B6
1
4A

76
29
03

31
7

02
F
7
7B
B2

operator?
88

30
A
6A

B6
1
4A

2A
29
03

7
B7

AF

Q.4 10 Marks each


7
B2
8
39

60
A
A8

97

A What is Image Transform? What are the significance of Image Transform? Write basis
71
76
17

FB
03

22
94

7
7B
03

1A
6A
3B
A8

images of Discrete Hadamard Transform.


73
A3

29

77
B7
31

80
94

B2

B Explain Vector Quantization (VQ) with example


6A
30

A8

97
73

03
2A

B7
2
31

94

2
88

3B
30
60

97
73

4A
2A
FB

22
31

80

Q.5 10 Marks each


39

3B
30

A8
60
1A

A Explain Composite and Component Video in detail


17
2A
FB

80
94
03

A8

B Explain Arithmetic Coding in detail


60

73
1A

A3
FB

31

94
77

02

30

73
1A
6A

B6

2A

31
77
B7

AF

41699 Page 1 of 2
30
60
6A
97

71

2A
FB
B7

A7

60
1A
97

97B76A771AFB602A30317394A8803B22
76

FB
77
97 1A A3 4A 29
B7 FB 03 88 7B
6A 60 17 03 76
77 2A 39 B2 A7
97 1A 30 4A 29 71
B7 FB 31 88 7B AF
6A 60 73 03 76 B6
77 2A 94 B2 A7 02
1A 30 A8 29 71 A3
76 FB 31 8 7B AF 03
A7 60 73 03 76 B6 17
B2

B
A7

A
71 2A 94 29 02 39
Q.6
71

41699
AF 30 A8 7B A3 4A
B6 31 8 03 76
AF 03 88
77 02 73 B2 A7 B6 17 03
1A A3 94 29 71 02 39 B2
4A

1
2
1
0
A8 7B A3 29
A=
FB 03 80 AF 03 88 7B
60 17
39 3B 76
A7 B 60 17 03 76

image R
2A 4A 22 2A 39 B2 A7
71 4A 7

2
3
2
1
30 88 97 AF 30 1A 29
FB 31 B7 88 7B
60 73 03 6A B 31 FB 03 76
2A 94 B2 7 7
60
2
73
9 B 2 A 7 60
29 1 A 4 A 2 7 2A

3
4
3
2
30 A8 7B 97 1
31 80 76
AF 30
31 8 80 B7 A FB 30
73
94
3B
2 A 7
B6
02 7 39 3 B2 6 60
31
73
2 7 A7

2
3
2
1

A8 97 1 A A3 4A 29 7 1 2A 94
80 B7 F 0 3 88 7B A FB 30 A8
3B 6A B6 17 03 76 31 80
22 7 0 2 3 9 B A 7 6 0 7 3 3B
A 4 2 9
10 Marks each (Short Note)

97 71 A 22 7 A 4 22
AF 30 97 1A 97
B7 3 88 B F 30 A8
6A B6
02
17
39
03
B2
76
A7 B 60
31
73
80
3B
B7
6A
77 2 9
Calculate DFT for following 4×4 image

1A A3 4A 29 7 A 4 22 77
FB 03 88 7B 1A
FB 3 0 A8 97 1A
60 17 03 76 31 80 B7 FB

Page 2 of 2
39 B2 A7 60 73 3B 6A
2A 4 29 7 1 2 A 9 4 22 7 7
60
30 A8 A 1 2A

***********
31 80 7B AF 30 8 97 A 3
76 31 80 B7 FB
73
94
3B
22 A 77
B6
02 7 39 3B2 6 A7 60

97B76A771AFB602A30317394A8803B22
A8 97 1 A 4 A 2 9 7 2A
80 B7 AF 30 8 7B 1A 30
3B 6A B6 31 80
3B 7 F B 31
22 7 02 73
9 2
6A 60 7
Compare Discrete Fourier Transform & Fast Fourier Transform.

97 7 1 A3 4A 29 7 7 2A
B7 A FB 03 88 7B 1AF 30
6A 6 02
17
39
03
B2
76
A7 B 60
31
73
77 2
1A A3 4A 29 7 A 94
A
FB 03 88 7B 1A
F 3
1 0 7 B 03
Paper / Subject Code: 37417 / Image & Video Processing (DLOC - II)

60 73 3B 6A 60 17
2A 94 2 2 7 7 2 39
30 A8 97 1 A A3 4A
31 80 B7 F 0 3 88
the contrast stretching transformation function on the input image F and obtain output

73 3B 6A B6 17 03
94 2 7 0 2 39
Derive the equation of contrast stretching transformation function as given below. Apply

A8 29 71 A3 4A
80 7B AF 0 88
3B 76 31 03
22 A 7
B6
02 7 39 B2
97 71 A 4 A 2
AF 30 88
B7
6A B6 3 17 03
77 02 39 B2
1 A 4 2
CE

2
FA

03
C2

9F
Paper / Subject Code: 37414 / Machine Learning

72

0E
B9

E1
49

FA

03
C2
F2

9F
EC
72
B9
7F

E1
49

30
FA
C2
FD

F2

EC
20
9
F

49

7
FA

30
B
7

FA
C2
FD

20
F1

FF

B9
Time: 3 Hours Max. Marks: 80

7
A
50

24

FA
F

C2
D

0
F2

F1

F
F

72
B9
F

9
A
19

0
Instructions:

D7

FA
25

1F

C2
F2
CE
 Figures to the right indicate max marks.

AF
9F

B9
F

49
0
0E

7
1

F
 Draw appropriate diagram whenever applicable.

C2
D

F2
E

F1
03

F
F
C

49
FA
 Assume suitable data wherever applicable. State your assumptions clearly.

0
72

7
1

C2
FD

F2
0

CE

1
FA

03
 Question number 1 is compulsory.

0F

49
A
9
72

0E

D7
B9

E1

25

1F

F2
 Attempt any Three questions from remaining questions

FA

AF
C2

F
EC

7F
0

0
2
B9

1
49

1F
7

D
0

CE

2
FA

AF
C2
F2

F
Q.1 Solve any Four

19

50
2

0E
9
7F

1F
A7

D
B

E
24

A. Explain SVD and its applications? [05]

F2
03

AF
2
FD

EC

0F
F
C
F

9
2
B9
B. Differentiate between supervised and unsupervised learning. [05]
F

E1
49

25

1F
A7
FA

30
7

C2
FD

F2

F
EC

0F
C. Explain Hebbian Learning rule [05]

20
9F
F1

9
7F

E1
49

25
7
FA

30
2B
50

D. Explain Perceptron model with Bias. [05]

FA
D

F2

9F
EC
0
F2

F1

C
F

72
E. Differentiate between Ridge and Lasso Regression [05]

9
F

E1
9
FA

30
2B
19

50

24

FA
D

EC
0
CE

F2

F1

9C
F
AF

2
B9
7F

A7

30
19

50

Q.2 Solve the following


0E

24
1F

C2
D

20
E

F
2

FF
03

AF

A. Draw a block diagram of the Error Back Propagation Algorithm and explain with the flow
F
EC

B9
0F

A7
19
72

24
5

1F

C2
FD

chart the Error Back Propagation Concept. [10]


30

CE

9F
2
FA

F
F

0F

F
20

49
FA

2B
19

B. Find a linear regression equation for the following two sets of data: [10]
0E

7
B9

25
A7

FD

F2
E

9C
03
C2

9F
EC

0F

7F
9F

FA

X Y
72

24
E1
49

D
0
2B

F1
FA

FF
3

AF
F2

F
EC
0
9C

50

3 12
72

D7
B9
7F

E1

1F
30
24

F2
FA

AF
C2
FD

F
0
FF

19

50
72

E
B9

5 18
49

1F
FA

E
D7

2
A

3
C2
F2

9F
EC

0F
20
9F
F1

AF

E1
49

25

7 24
7

30
2B
50

D7

FA
F

F2

9F
EC
20
F1

C
AF

B9
F

E1
49

30

9 30
50

D7

FA
1F

2
F2

EC
0
F2

9C
AF

72
B9
0F

30
19

D7

24

FA
5

1F

C2

20
CE

F2

Q.3 Solve the following


FF
AF

B9
0F

49

A7
9
0E

A. Diagonalize the matrix A [05]


E1

1F

C2
D

F2

9F
F2

AF
EC

0F

7F

49

2B
9

1 5
E1

1F

FD

F2
30

F2

9C
EC

0F

7F
20

FA
9

24
E1

5
7

D
30

F2

F1
FA

FF

4 2
AF
EC
20

50

D7
B9

E1

1F
7

30

F2
FA

AF
EC

0F
20

9
B9

E1

1F
7

30

F2
FA

B. Write short note on overfitting and underfitting of model [05]


C2

EC

0F
20

9
B9

E1
49

25
7

30

C. What are activation functions? Explain Binary, Bipolar, Continuous, and Ramp activation
FA
C2
F2

9F
EC
20
B9
7F

E1
49

functions. [10]
7

30
FA
C2
2

EC
20
FF

B9
49

30
D7

FA
C2
2

20
FF
AF

B9
49

A7

38169 Page 1 of 2
7
1F

C2
FD

9F
FF
0F

49
FA

2B
7
FD

F2
F1

9C
7F

50F1FAFD7FF249C2B9FA72030ECE19F2
FA
50

24
0F 7F B9 0E 50
1F F2 FA CE F1
AF 49
C2 7 20 19 FA
50 D7 B9 30 F2 FD
F1 FF EC 50 7F
FA 2 FA F1 F2
FD 49
C2 7 20
E1
9 F AF 49
7 30 F2 C2
FF B9 EC 5 0F D7 B9
FA 2 FA FF
49 7 E1
9
1F 24 FA

Q. 6.
FD C2 20 F2 AF 9C 72
7 FF B9 30 5 D7 2B 03
EC 0F F

38169
2 FA F2 9F 0E
49
C2 7 20
E1
9
1F
AF 49 A7 CE
F2 20 19

detail.
7F B9 30 5 D7 C2
30 F2
F2 FA EC 0F F F2
B9 EC 50
49
C2 7 20
E1
9
1F
AF 49
FA
72 E F1
FA
30 F2 C2 19
B9 5 D7 03 F2 FD
4. Solve the following

24 FA EC 0F F F2
B9 0E
7F 50

Q. 5 Solve the following


9C 7 20
E1
9
1F
AF 49
FA
72
CE F2 F1
FA
2B 30 F2 D C 0 F 49 19
9F EC 50 7 2B 3 0 2 C2 FD
A7 F1 FF 9F EC 50 7 F B9
20
E1
9 FA 24
9C A 72 E F1
FA F 24 FA
F2 FD 0 19 9
30 5 2 30 F 2 F D C2 72
EC
E1
0F
1F
7F
F2
B9
FA EC 5 0F 7F B9 03
0E
9F AF 49 7 E1 1F F2 FA CE
25 D C2 20 9F AF 49 72
0F 7F B9 3 0 25 D C 2 03 19
1F F2 FA EC 0F 7 F B 9 0E
F2
50
C
B. Explain the Perceptron Neural Network

49 7 E1 1F F2 FA F1
AF
9 E

B. Write a short note on LMS-Widrow Hoff


C2 20 F AF 49 7 2 1 FA
D7
FF B9 30 2 5 D C2 0 3 9F
25 FD
FA EC 0F 7F B9 0E
24
9C 72 E 1 FA F 24 F CE 0F1 7F
0 19 9 A7
1 F F2
2 A

Page 2 of 2
2B 30 F2 FD C 0 9 F 49
50 7 2B 3 C. Explain the Maximization algorithm for clustering.
2 FD

*************
9F 0 5 C2
A. Explain Least-Squares Regression for classification.

EC
A7 E1 F1 FF
24
9F EC 0 F 7 F
20 9F FA A7 E1 1F F2
30 2 FD 9C 2 9 F A F 49

50F1FAFD7FF249C2B9FA72030ECE19F2
50 7 2B 03 2 D C2
EC
E1 F 1F F F 9 FA
0E 5 0 7 B9
24 CE F1 FF
9F AF 9 7 20 19 F 249
FA
25 D C2 F AF
Paper / Subject Code: 37414 / Machine Learning

0F 7F B9 30 25 D7 C2
1F F2
49
FA EC
E
0F
1 F F
B9
FA
AF 72 19 FA 24
D7 C2 0 F 2 F 9 72
D
A. How to calculate Performance Measures by Measuring Quality of model.

A. Discuss the various steps of developing a Machine Learning Application.

B9 30 5 C2 03
FF
24 F EC 0 F 7 F B 9
A7 E1 1F F2 FA
9C
2B 2 0 9 F2 A FD 4 9 72
30 C2 03
9F EC 50
F 7 F B9 0E
A7 E1 1F F2 FA CE
20 9 F AF 49 7
[05]
[05]
[10]
[10]
[10]
[10]

[10]

30 25 D7 C2 20
EC 0F F B9 30
EC
B. What is the curse of dimensionality? Explain PCA dimensionality reduction technique in

E1 1F F2 FA
9F AF 49 7 20
E1
25
0F D 7F
C2
B9 30 9F
2
1F F2 FA EC
AF 49 72 E1
D C2 0 9F
9
0

7
F7

EF
97

7
Paper / Subject Code: 37413 / Software Engineering and Project Management

9A
9

0
94

01
83

70
F7

EF
97
1F

7
9A
9

0
94

01
5

83

70
CF

F7

EF
97
1F

7
9A
9
6E

94

01
5

83
CF

F7

EF
75

97
1F
Time: 3 Hrs Marks: 80

9
EC

6E

94

01
5

83
CF

F7

EF
75

97
39

1F

9
EC

6E

94
00
Note: 1. Q.1 Compulsory

01
5

83
CF

F7
75
7

97
39
2. Solve any 3 question from remaining five questions

1F
A7

9
EC

6E

94
00

83
9

CF

F7
75
7
EF

39

1F
A7

9
EC

6E
00
01

83
9
Q1. Each sub-question carries 05 marks.

CF
75
7
EF

39
97

1F

F
A7

9
EC

6E
00
4

01

83
79

CF
a) Define software engineering and explain umbrella activities 5M

75
7
EF

39
97

1F
A7
F
b) Explain the 4’PS of project Management

EC

6E
39

00
4
5M

01

5
79

CF
8

75
7
EF

39
97
c) Explain functional and non-functional requirements 5M
1F

A7
F

EC

6E
39

00
4

01
d) Explain the Agile process model 5M
5

79

F9
CF

5
7

39
97

C
1F

C7
A7
F

6E
39
6E

00
4

01
5

E
79

F9
CF

5
7
75

39
97
1F

C7
A7
F

E
Q2 a) Elaborate COCOMO model for Cost estimation 10 M
39
EC

6E

00
4

01
5

E
79

F9
CF

b) Illustrate the SCM process of Software quality management. 8 10 M

7
75

39
97
9

1F

A7
F

E
03

39
EC

6E

00
4

01
5

79

F9
70

CF

7
75

97
Q3. a) Describe the waterfall model and incremental process model 10 M
9

1F

A7
F
7

E
03

39
EC

6E
9A

01
b) What is Risk management? Discuss RMMM plan for risk management 10 M
5

79

F9
70

CF

8
75

97
EF

1F

F
7

E
03

39
EC

6E
9A

01
01

79
Q4.a) What are the different phases in project life cycle explain with suitable example
70

CF

8
75

97
EF

9
7

1F

F
7

03
49

10M

39
EC

6E
9A

4
01

79
70
9

b) Explain the user interface design in details with example 10M


CF

8
75
F7

EF

9
7

1F

F
7

03
49

39
EC

6E
9A
9

01

5
83

70
9

CF

8
75
F7

Q5. a) Develop the SRS of Hospital Management system 10M


EF

9
7

1F
1F

03
49

EC

6E
9A
9

b) Describe the details of FTR and Walkthrough 10M


01

5
F5

83

70
9

CF
75
F7

EF

9
7
C

1F

03
49

EC

6E
9A
9
6E

01
F5

Q6. a) Explain project scheduling and describe CPM and PERT 10 M


83

70
9

75
F7

EF
75

9
7
C

1F

03

b) Differentiate between white box and black box testing 10 M


49

EC
9A
9
EC

6E

01
F5

83

70
79

EF
75

9
7
39

1F

A7
9F

03
49
EC

6E
00

01
F5

83

70
9

F9
F7
75

7
9

1F

A7
49

E
03

9
EC

6E

01
F5

83

79

F9
70

75

7
9

EC

1F

9F
A7

49

1E
03

EC

*******************
F5

83

79
56
70

70
F9

1F

9F
C7
A7

49
03
1E

6E

F5

83

9
70

9E
F9

F7
75

EC

1F
A7

3
E

9
EC
00
01

F5

83
56
F9

77

9
97

EC

1F
C7
03
E

9A
94

01

F5
56
70

9E
F7

EF
97

C
C7
A7

6E
39

00
94

01

9E
F9

75
77
F7

97

3
E

EC
9A
39

00
94

01
F8

77
F7

EF

9
97

03
9A
51

39

94

01

70
CF

F8

F7

EF
97

A7
51

39
6E

94

01

39291
F9
CF

F8

F7

97

E
51

39
6E

01
79
CF

F8
75

97
9F
51
EC

6E

4
83

79
CF
75
39

1F

9F
EC

6E

F5

83
75
39

EC

1F
EC

39EC756ECF51F839F7949701EF9A7700
F5
56

You might also like