You are on page 1of 8
Indian Institute of Information Technology Allahabad and Video Processing (BTech IT 5” Semester) C3 Review Test Max. marks: 40 Duration: 2 hrs 30 min Q1. [5 Marks] Unit-1 {a) [1.5 Marks] For the matrix given below, consider the two highlighted pixels and find A. Buelidean distance B, City-block distance C. Chessboard distance (b) [1.5 Marks] Explain 4-adjacency, 8-adjacency and m-adjacency with examples. (c) (2 Marks] Explain Log, Gamma and Piecewise- Linear Transformations with examples. Q2. [5 Marks|Unit-1 Perform Histogram equalization on the given image of 9x9 dimension. The grey scale values lie from 0 to 7. - - + SHRP E6-TSEIL Ss 1 ats 7/27 1/0/3 1/3 }o}o0]o af | 6) 3 ]7];/4]}o];,r];a]}s]3 6 Q3. [5 Marks] Unit-2 449 [3 Marks} Explain Ideal, Butterworth and Gaussian low pass filter with diagram. (0) [2 Marks|Consider the following 5*5 input image in spatial domain. Compute the output values to the nearest integer by using the 3*3 averaging filter in spatial domain. You can leave the computation for border pixels. 1of3 4. (5 Marks] Unit-2 {) [1-5 Marks) Expl how median filter ca” bev! noise using example the following 5*5 im {by [8.5 Marks|Consider rarer o| fofojo}oi® To | o [|e] ool 11 e1e 9 | 10/40/10. ° of {2 {tet jo |e) + i 90/20/09 \° otoj1j;o]® te retele] Lebel ‘put Image Frequency Mask in Frequency Domain Domain yx {1.0 mark The given mask belongs © which filter among Ideal, putrerworth and Gaussian in frequency domain 1 tow pass fiter or high pass Hire icon the given input imaBe 1" it [1.0 Mark] The given mas! ¢ the resPo} yar observat (ia) [1.0 Mark] Comput snse of the give tion on the output? frequency domain, What is yo' 5. [5 Marks) Unit-3 ia) [2 Marks]Explain how Hough Transform can be used to refine the edge detection Pats for detecting line segments. {o) [1.5+1.5 Marks] Explain opening an diagrams 4 closing morphological operation with for boundary detection? Q6. [5 Marks] Unit-3 ding method w.r-t. n0 a) (1 Mark] How to use mor ) [141 Marks]Explain the robustness as and illumination. {c) [2 Marks] Explain watershed segmentation method with diagram phological operations pect of global threshol 2083 Q7. [8 Marks] Unit-4 or the following image with pixel values in the range (0-3) Conside 3] 2 ]|2 | 2 {a) [2 Marks] Compute the average’ code word length using Huffman coding scheme. {b) [2+1 Marks}Compute the average code word length by using Run length coding, assuming 2 bits to represent the pixel value and 2 bits fo represent the run length. What is compression ratio of this coding scheme w.r-t Huffman coding in (a)? QS. [5 Marks} {a) {1 Mark] Explain why discrete wavelet transform based coding leads to higher compression ratio as compared to discrete cosine transform based coding. (b) [2+2 Marks} Explain the steps of JPEG compression standard for (i) compressionand {ii) decompression. OR structuring element B, perform boundary ow the final result BIA) 15 Marks} You have given a binary image A, and a eatraction on the image using the structuring element. Sh You can perform the padding by 0. And with all intermediate solutions. ( ‘el as the center of the structure element), orange-colored/shaded pix 3 of 3 INDIAN INSTITUTE OF INFORMATION TECHNOLOGY, ALLAHABAD C3 Assessment, 20 November 2022 Graphics & Visual Computing IGVC-5211 B.TECH I: jemester Fult Marks - 10 Time - 1 hrs. should be brief and to the point. Excessive writing will Note: Calculators without intemet allowed. Answers ‘ettroct Negative marks. if any unfair means found during the test, copy 1. Given Bo[1.1}, 8:[2.3). B2{4.3] and 8513.1] the vertices of a Bezier polygon, compute a Bezier spline passing through these 4 vertices (Node). Use the previous vertex as the control vertex (Bs is the ‘control vertex of Bo, By is the control vertex of B,.....} Calculate the 17 mid-points (u = 0.5) on the spline between (Bo ~~ Bs). (Bs ~ Ba). it - B;) and (Bs - Bo). [3] ios will be taken back. 2. Ma = litt sa Mz is called the Menger Sponge: 2) What is the volume of M, b) What s the surtace area of My? <) Compute the fractal dimension of Moo [1414123] n, Ambient, Diffused reflection and Specular ics. The directions of the different sources of ition V. Please explain the 3.2) Explain and derive the different terms (Emissio refiection) in the illumination equation used in grap! light L;, the normal to the surface fi, and the viewer/camera Post equation in terms of these terms only. b) Make a schematic representation of the di the angle between L; and fi. 4) The illumination equation does not show the effect of shadow Kn tracing method explain with a pseudo code how one could determine i tbject is the shadow or not. What will you change in the Iumination equi tis in the shadow? me fret (14t) = 4] fferent terms of illumination and how it changes with ‘owing L; and using the ray- { the particular point on the lation if the particular Sorerse, Indian Institute of Information Technology Allahabad ‘An Institute of National Importance by Act of Parliament Deoghat Jhalwa, Allahabad-211015 (U.P) INDIA Department of Information Technology Network Security, C3 Review Test (23 - 11 -2022) B.Tech. IT (V semester) July - Dec 2022 Duration: 120 minuxes (3:00 PM — 5:00 PM) Maximum Marks: 40 1. Consider an automated telteeiichine (ATM) in which users provide a personal identification number (PIN) and a card for account aetess~Give.cxamples of security services associated with the system. In each case, indicated the degree of mapping with the mechanisms and attacks 3 Marks 2. Classify and Differentiate the following a. Sniffing Vs Spoofing attacks b. Zero-day Vs slowlorise 2 Marks 3. a) Which network security device is used to trick an attacker and explain its primary working? 'b) What are the evaluation techniques used in NIDS? _©) What are the differences between transparent, forward, and reverse proxy servers? Which one should we choose if we want to hide the IP address for browsing anonymously? 5 Marks 4. How to enhance security for the following network design a. Subnetting and Network Convergence 2 Marks >. NAT and NAC 3 Marks 5. a) State the three essential security properties of a cryptographic hash function. b) What is a trap-door function? Explain it with an example. 2 Marks 6. Explain the man-in-the-middle attack against the Diffie-Hellman protocol. 2 Marks 7. Data integrity protection is achieved with the help of a secure hash function. Explain, with block diagrams, how we achieve it in symmetric cryptography and how we achieve it in asymmetric cryptography. 3 Marks 8. Explain the elliptic-curve version of the El-Gammal encryption scheme. 3 Marks 9. Use Figure | to answer the questions: a) What kind of secure design is adopted in the topology and is there any scope to adopted / allernative design without any change in the topology? b) Why two http servers are placed in one location and what if we may have one http server instead of two? ©) How insider threat and authorized access docs is granted? 4) How does the “SQL Server” being restricted with only access to back-up scheduling? ©) How would the traces of the event being recorded and handled in the Ultra secure Network Topology” 10 Marks ee990ge — | Figure 1 10. You are a network administrator responsible for an HTTP server at 10.10.10.8, a DNS server at 10.10.10.16, and a SMB file server at 10.10.10.32 and you are tasked with designing an ACL for your organization's firewall for inbound Intemet traffic. Your ACL must enforce the following ‘criteria: Note: Use assumption to create table 2) The file server is used for storage of important documents and should not be accessible to external IP addresses. 'b) The web server hosts the organization website, which must be accessible to all IP addresses. ¢) The DNS server provides name resolution for the organization's domain, which must be available to all IP addresses. Assumptions Table (ACL Table) Acton DropForward) | Source iP | PrwcaxTcpuDPBoTH) | PoRT Destination 1P HTTP PORT - 80/443, DNS— 53, SMB-445 Note: The last rule must match all packets so that every packet is matched by at least one rule. Therefore drop/forward is the only thing you can choose. ‘Question : Make firewall ACL as per the format indicated in “assumption section” for point no. atoc. 'S Marks #88#*4 LL The BEST ***** sols Indian Institute of Information recnnorwyy Auarravay 2, ‘An Institute of National Importance by Act of Parliament te Deoghat Jha, Allahabad-211015 (U.P) INDIA Department of Information Technology Artificial Intelligence, C3 Review ‘Test - 21" November 2022 B.Tech. IT & IB (V semester) Maximum Marks: 40 Duration: 90 min, ted together. Notes All questions are compulsory. All the subparts of a question are to be attempt QI. How can an agent perceive from the environment? Write down the steps for the following scenario: an agent moves within a room of rectangular shape toward left, right, forward and backward directions. It can move only | step at a time and is capable of gientifying obstacles c. Draw the environment with the moffves cee” like walls stars, hindering objes [242+1=5] Q2. For the environment given below, where the agent is placed at x. Cgfinsidering y = 1, reward for ity as Ud(s) = 0, compute the being in any non-terminal state sis R(s) = -0.05, and the utility of the state x in two iterations using value iteration methgffd to solve a Markov Decision 7 Process. 0.8 o4 { | o1 Page 1 of 2 QS. Write simple hill climbing algorithm and suggest how the problem of local minima can be overcome (assume that the minimum value is sought). Mention at which step of the algorithm @ modification is to be done. [2tit1=4) Q4. Consider the multivariate normal density for a d dimensional sample x as p(x)~N(u, 2), where y= [y,uy th]! and = diagonal(o,0, 004) 1a) State the Mahalanobis distance from x to}. 2) 'b) Show that the evidence 1B) 7 \ p(x) = exp wn \ Te, QS. Letx have an exponential density p(0) = be if x20; O otherwise Suppose n samples x,\\.., x, are drawn independently according to p(@), then compute the ‘maximum likelihood estimate for 8. a} \ Q%. For the Blocks World, répreseat the following using appropriate predicates and create the planning graph for achieving the goal state: [24345] Initial state: block x and y arc placed on the table. Goal state: block x is placed over the block y. Q7. Consider the data shown in the table below. m 1) Find conditional probabilities of A, B, C for class + and class - b) Predict the class label for a test sample X= (A=0, B=1, C0) using the naive Bayes classification. Record] A | B | C Chass 1 0 0 o | + 20 0 1 : 3 0 1 1 4 mI 0 1 1 = 3] ono 1t+ 6 1 0 r|+ iam I) 0 1 [38 1 0 1 9 1 1h le io [1 0 ier Page 2 of 2

You might also like