You are on page 1of 11

6B

98

4B
3D

C0
Paper / Subject Code: 37412 / Cryptography and System Security

87

8D
82
8C

B3
18

4B
3D
79

D6

C
20

82
8C
88

B3
B8
9E

3D
01

79

D6
4
34
Duration: 3hrs [Max Marks:80]

82
2

8C
8

8
98

B
3D
9

9
AB

4
4

7
N.B. : (1) Question No 1 is Compulsory.

2
3

E2

C
8

D8
8

18

8
53

9
(2) Attempt any three questions out of the remaining five.

79
AB

24
4

20

C3
C0

8
(3) All questions carry equal marks.

D8
98

98
3
B3

49

01
5

AB
(4) Assume suitable data, if required and state it clearly.

C3
7
C0
D6

88
8

98
53
3

9
B8

01
B

87
C0
6
1 Attempt any FOUR [20]

E2
3A
24

98

18
3
B8

9
D8

9
05
B

34

20
a Describe services and mechanisms.

87
6

3A
4

C
C3

9E
2

18
B3

B9
8
D8

05
b ECB and CBC block cipher. 98

20
6

83
3A
24

3C
3
87

9E
C

9
8
c Why digital signature and digital certificates are required?

05
18

B
8

AB
B

34
3D
9

6
4

3C
20

98
2
C

3
8
d What is keyed and keyless transposition ciphers?

B8
8
9E

05
8

B
98

AB

4
3D
1

83
4
34

3C
0

87

D
e Explain clickjacking and session hijacking.

82
E2

53

B9
B8
98

6B
8

3D
49

C0
01

79
AB

3A
4

D
2
83

8C
2 a Explain DES algorithm with reference to following points: 8 [10]

B3
8
D8
E

05
8
53

B
9

79
1. Block size and key size

D6
AB

4
4

3C
0

3
C0

82
3

C
88
2. Need of expansion permutation

B8
8

9E

6B
8
53
B3

D
9

01

9
AB

24
4

3. Role of S-box

C3
7
0

8D
D6

E2

88
3C

D8
8

4. Possible attacks on DES

98
3

4B
B9
B8

49

01
5
B

b Use the playfair cipher with the keyword “example” to encipher “The algorithm

C3
87
0

[10]
D6

82
3

E2
A
24

18

98
3

name is playfair cipher”


B3

3D
9
8

9
D8

B
B

20

87
C0
6

3
A

8C
24
3

9E

8
8C

53
3

9
8
D8

79
B

AB
B

20
0
9

3 a What are properties of hash function? Compare MD-5 and SHA hash algorithm. [10]
D6

83
24

88
C
3
87

9E
8C

3
B3

B9
B8
8

01
05
8

34
D
01

b Explain Diffie hellman key exchange algorithm. [10]


9

E2
3A
4

3C
3
87

98
2
E2

8C

49
8

05
8

B
B
3D
49

01

83
3A
4

C
87

8D
2
83

E2

8C

B9
8

4 a What do you understand by digital signatures and digital certificates? Explain digital [10]
5
8

B
4B
3D
B9

49

C0
1

D6

3A
20

signature scheme RSA.


87

82
83
3A

8C

B3
B8
9E

05
18

b Explain memory and address protection in detail. Write a note on file protection. [10]
D
9

79
05

D6
AB

4
4

3C
0

2
83

E2

8C
88

B8
D8

6B
53

79
AB

24
34

C3
C0

8D
E2

88

5 a Enlist various functions of protocols of SSL. Explain the phases of handshake [10]
8
8

98
53
B3

4B
3D
9

01

protocol.
AB

34

7
C0
D6

82
E2

C
88

b Briefly explain database security. What do you understand by multilevel database


98

[10]
98
53
B3

3D
B8

1
B

security.
87
C0
D6

2
3A

8C
8

18
B3

9
B8

49

79
5

20
C0
D6

83
3A
4

88

6 Write short notes on any four: [20]


9E
82

B9
B8

01
05
6B

34
3D

E2
3A
4

a Web browser attacks


8D

98
82
8C

49
05
B

B
4B
3D

b X.509
D6

83
A
3C
2
8C

53

B9
8
D8

B
4B

c Cross site request forgery


C0
79

D6

3A
C3

2
8

B3
8
D8

05
18

d DNS attack
98

4B

D6

3C
20

C3
87

82

e Email attacks.
B8
9E

18

6B
98

3D

24
20

87

8D

_____________________________
8C

8
9E

18

4B
3D
79
4

20

82
83

8C
8
9E

18

3D
B9

29724 Page 1 of 1
79
4

20
83
3A

8C
88
9E
9

01

79
AB

4
83

E2

88
53

53AB98349E20188798C3D824B8D6B3C0
B9

49

01
0

92
B4

B
1
DE

AA
Paper / Subject Code: 37411 / Data Analytics and Visualization

8B
10
0C
C4

12

92
B4
DE
DA

AA

B
10
0C

28
C4

12
77

B4
DE

09
A

A
0A

0C

21
D

A
C4
77

4
DA

1
E

B
DA

A
D
0A
Duration: 3 Hrs [Max Marks: 80]

0C

4A
9A

4
77

AC
DA

CB
45

AA
D
A
Notes: (1) Question No. 1 is Compulsory.

7D
A

C4
BA

A0

E0

B4
9

A7
(2) Attempt any THREE questions out of the remaining FIVE.

45

A
D

4D
8B

0C
7D
A
A

0
(3) All questions carry equal marks.

92

C
DA
59
B

DE
7

DA
B
10

A
(4) Assume suitable data, if required, and state it clearly.

A4

A
8

C4
0
12

92

7
DA
9
(5) Figures to the right indicate full marks.

BB

E
7
5

DA
AA

4D
0

A
A4
21

9A
28

A0

77

AC
B4

B
1

45
Q1 a) What is an analytic sandbox, and why is it important? 5

AD
A

B
10

A
0C

7D
A

A0
2

92

9
B4

B
1
b) Why use autocorrelation instead of autocovariance when examining stationary 5
DE

A7
5

AD
A

8B
0

A4
0C

21
4A
C4

A0
92
time series?

59
BB
A1
DE

7
B
DA

AD
10

0A
A4
0C

28
4

c) Difference between Pandas and NumPy. 5

12
7

AC

DA
59
B4

BB
E

09
A7

A
D

4
C

1
D

9A
4A

28

BA
4
A0

2
d) What is regression? What is simple linear regression?
0 5
7

A1
DE

09
A7

45
B
A
AD

8B
0C

21
7D

4A

BA
C4
A0

Q2 a) Explain in detail how dirty data can be detected in the data exploration phase 10

2
59

1
E

9
7

B
DA

AA
AD

8B
0
D
A
A4

0C

21
with visualizations.
4
0

92
7

AC

B4
DA
59
B

A1
DE
7

10
8B

b) List and explain methods that can be used for sentiment analysis.
A4

10

0C
7D

4A
9A

C4
A0

12
2

DE
09

A7

CB
5

AA
Q3 a) List and explain the main phases of the Data Analytics Lifecycle.
D

10
8B

A4

7D
1

9A

C4
A0

E0
12

B4
B
09

b) Describe how logistic regression can be used as a classifier. 10


5

A
AD
AA

4D
8B

A
A4

0C
7D
1

0
12

AC
DA
9
B4

Q4 a) Suppose everyone who visits a retail website gets one promotional offer or no 10
BB

DE
09

A7
5
AA

4
0C

7D
21

9A
8

C4
BA

A0

promotion at all. We want to see if making a promotional offer makes a


2
B4

A1
DE

A7
45

DA
AD
B
0
0C

21
4A

28

BA

difference. What statistical method would you recommend for this analysis?
C4

A0

77
9
A1
DE

09

5
CB
A

D
B

0A
A4

b) List and explain the steps in the Text Analysis. 10


21
7D

9A
4A

28
C4

E0

DA
BB
A1

09
A7

45
CB
DA

4D

Q5 a) How does the ARMA model differ from the ARIMA model? In what situation is 10
1

9A
4A

28

BA
A0

12
E0
77

AC

45
CB

the ARMA model appropriate?


AA

B
10
4D
0A

7D

28

BA
12
0
AC

B4
DA

DE

b) Explain with suitable example how the Term Frequency and Inverse Document
09

10
7

AA

8B
0A

0C

21
7D
A

C4

92

Frequency are used in information retrieval.


B4
A
59

A1
DE
7

DA
AD

10
0A
A4

0C

4A
4

Q6
12

Write short notes on:


77

AC
A
59

DE

CB

AA
AD

0A
A4

7D

C4

E0

a) Evaluating the Residuals in Linear regression. 5


B4
DA
59
BB

DA

4D
0A
A4

0C
A
28

AC
A
59
BB

DE

b) Box-Jenkins Methodology 5
09

A7
AD
A4

7D
21

28

C4
A0
59
BB
9

A7

c) Seaborn Library. 5
DA
AD
10

A4
28

A0
12

77
59
BB
09

AD
AA

d) Data import and Export in R 5


0A
A4
1

28
12

DA
59
B4

BB
9
AA

10

A4
0C

9A
28
12
B4

BB

**************************
9

45
AA

10
0C

28

BA
12
B4
DE

09
AA

8B
0C

1
C4

12

92

29185 Page 1 of 1
B4
DE
A

10
0C
7D

4A
C4

12
DE

CB
DA

A
4A
C4

DA0A77DAC4DE0CB4AA1210928BBA459A
E0
77
D

80
D4
E

0
D7

B2
DC
Paper / Subject Code: 48846 / Honours/Minor degree programs AR and Mix Reality

D6
4B

06
46
06

7D
CE

0
68
BD

B2
48

6D
6D

DD
D2

06
E4

D4
0

68
D7
B8

DC
48

DD
2

46
09

4
(3 Hours) [Total Marks: 80]

06
D

CE

BD
F0

7
8

D
B

24

6D

D
05

46
09

D
D

CE
NB: 1) Question 1 is compulsory.

B2

80

D
0

D7
B8
F

4B
24

D
2) Attempt any three questions from the remaining questions.

06

05

6
9

06
8D

4
00

E
8

B2
3) Assume suitable data wherever applicable.

BD
D6

DC
8
5F

9B

4
06

D2
D

E4
20

6
0
8
D7

80
F0
D6

B8

DC
6B

4B
4
6

2
D

09
80
D4

20

06
8D

CE
D7
1 (a) Explain the most common types of Mobile AR apps. 05

F0
D6

48
4B

9B

6D
06
6

05

2
D
D4
CE

8D
0
8
D7
Explain the coordinate systems used in Mixed Reality.

80
(b) 05

0
6

6B
4B
6D

F
D

24
6

05
D

09
80
D4
CE
80

8D
(c) Explain the issue of runtime reconfiguration and discuss how to resolve it, 05

0
0
6
D

48
4B
24

6D

F
DD

9B
6
6

05

D2
8D

80
D4
(d)
CE
Explain the usage of web technology in Mixed Reality 05
80

00
7

B2
D6

B8
6D
9B

4B
24

6D

F
6

5
7D

09
8D

0
4
00

CE

20
80

8
BD

F0
6
5F

D
Explain Multimodal Displays.

B
2 (a)
9B

24

6D

DD

06
46
E4

05
20

8D
00

10
80

8
D

D7

B2
C
6B

D6
5F

9B

4B
24

(b) Explain the elements of Authoring systems. D 10

06
46
80

20

06

7D
8D
00

CE

68
BD
D6

6B

8
5F

6D
9B

6D

DD
2
7D

E4
80

20

3 (a) Explain the general architecture of Mixed Reality system. 10

D4
00

0
D6

D7
8

DC
6D

6B

8
5F

9B

4B
24
7D

46
80
D4

(b) Explain software engineering requirements for AR applications 10


20

06
8D
00

CE

BD
D6
6D

6B

48
B

5F

9B

6D
E4

D2
7D

E4
80
D4

20

80
DC

0
D6

B8

DC
6D

6B

4 (a) Describe the common data structure used for representing and rendering graphical 10
4B

5F

24
06

7D

9
80
D4
CE

scenes.
20

06
8D
0
48

F0
D6
6D

6B

48
B
6D

9B
D2

E4

05

D2
7D

80
D4
80

(b) Explain the stationary tracking system. 10


00
B2
B8

DC

D6

B8
6D
B
24

5F
6
09

E4
06

7D

09
8D

0
D4

20
68
DC
48

F0
6D

6B
9B

4B

5 (a) Explain the application of AR in edutainment. 10


D
D2

05
06

7D

80
D4
00

CE

B2
B8

48

D6
5F

(b) What is POI in Mobile AR? How are they represented and delivered to the client 10
6D
4B
6D
D2

06
09
20

7D
D4
CE

application?
80

68
F0

B8
6B

D
4B
24

6D

DD
05

46
09

8D

CE
B2

80

D
F0

D7

Write short note on (Any two)


9B

6 20
4B
24

6D
06

05

46
8D
00

CE
68

B2

80

BD

(a) Input Modalities for AR systems.


5F
DD

9B

24

6D
06

E4
20

8D
00
68
D7

80

(b) Mobile AR toolkits and SDKs.


DC
6B

5F
DD

9B

24
80

20

06
8D
00

(c) ARToolkit
D7

D6

6B

48
5F

9B
46

D2
7D

80

20

00
BD

D6

B8
6D

6B

5F
E4

------------------------------------
7D

09
80
D4

20

F0
D6
6D

6B
4B

05
7D

80
D4
CE

B2
D6
6D
4B
6D

06
7D
D4
CE
80

68

31005
6D
4B
24

6D

DD
D4
CE
80

D7
4B
24

6D

9B8D24806DCE4BD46D7DD6806B205F00
46
4
CE

37
68
BD

7
Paper / Subject Code: 48845 / Honours/Minor degree programs Digital Forensic

6D

6B
6D

DD
E4

80
D4
80

D7

3
DC

D6

6B
4B
24

46
06

7D
8D

80
CE

D
8

6
D
9B

4B
24

6D

DD
46
D
21

E
0

D7
B8

DC
48
D1

B
(3 Hours) (Maximum Marks: 80)

D2

6
9

4
6

D
37

4
21

E
0

BD

7
8

DC
48
6B

6D
9B
7D

D2

E4
NB. 1. Question number One is compulsory

6
80

D4
1

80
3

12

B8

DC
D6

6B
2. Attempt any three out of remaining five questions

4B
4
D

2
9
7D

06
80

37
3. Assume suitable data

8D
21

CE
48
D6
6D

D1

B
4. Figures to the right indicate the maximum marks

4B
6D
06

2
9
D
D4

8D
21

CE
80
8
D7

B3
D6

D1
4B

24

D
6
46

19
7D
Q1 Attempt any FOUR: (20)

06
80
CE

8D
BD

48
6
6D

1
6D

9B
DD

7D
a) Define and classify Cybercrime

06
E4

D2
D4

21
80

68
D7

3
DC

B8

8
B

D1
4B
24

b) Comment on Windows OS Artifacts

24
D

06
46

19
06

7D
8D

37

8D
68
D
C

12
8

c) Explain Principles of Digital Forensic.

6B
9B

B
24

6D

9B
DD

7D
46
E4
D

0
21

21
80

d) Which are the Goals of Incident Response

8
BD

D7

B3
B8

D6
D1

D1
24

06
46
9

E4
06

D
37

8D

e) How to Acquire Image over a Network


21

37
8
BD

7
DC
48
6B

6
1

6D

6B
9B

DD
D

E4
06
80

37

80
D4
1
12

D7
B8

DC
8
D6

6B

D6
4B
24

Q2 a) Explain Digital Forensics and its lifecycle. (10)


D

46
19
7D

6
0

7D
37

CE
80
8

BD
12

8
6
6D

b) Explain in detail Incidence Response Methodology (10)

6D
9B

24
DD

6D
7D
06

E4
D4

8D

D4
21

80
68
D7

B3

DC
1
4B

9B

4B
24
DD

D
6
46

06
80
CE

37

8D
1

Q3 a) Describe Steps to prevent cybercrime and explain Hackers, Crackers and Phreakers (10)

CE
BD

12

48
6
6D

6B
6D

B
DD

6D
D
E4

D2
19

b) Explain Forensic Investigation Report Writing in terms of Standards, Content, Style, (10)
80
4

7
80

80
BD

D7

B3
DC

12

B8
D6
24

24
Formatting and Organization.
7D
06
46
E4

19
06

7D
8D

8D
8
BD

B3
DC

12
48

D6
6D
9B

9B
7D
D2

6
E4
06

7D

80
4

21
BD

3
B8

C
48

Q4 a) Describe Digital Investigation Staircase Model (10)


6
6D

6B

D1
D

DD
2
19

E4
06
8D

80
D4

37

b) How to Acquire an Image with dd Tools and with Forensic Formats (10)
12

D7
DC
48

D6

6B
9B

4B
7D

D2

46
6

7D

80
21

CE
80
B3

D
B8

D6
D1

6D
4B
24

Q5 a) Describe in details OS File Systems. (10)


19

7D
37

4
CE
80

BD
12

8
6B

6D
9B

24

b) Explain Network-Based Evidence acquisition and its analyzing. (10)


6D
7D

E4
80

8D

D4
21

80
B3

DC
D6

D1

4B
24
06

19
7D

06
37

8D

CE
68

Q6 a) Explain Need and types of Computer Forensic Tools in detail. (10)


12

48
6B

B
DD

6D
D

D2
19
80

37

b) In Mobile Forensics explain Challenges, Evidence Extraction Process, Types of (10)


80
D7

12

B8
D6

6B

24
7D
46

Investigation, and Procedure for Handling an Android Device.


19
7D

80

8D
BD

12
D6
6D

6B

9B

_______________________________________
7D
E4

7D

80
D4

21
3
6
6D

6B

D1
4B

DD

80
D4
CE

37
D7

D6

6B
4B
6D

30851 Page 1 of 1
46

7D

80
CE
80

BD

D6
6D
24

6D

E4

7D
D4
80

DC

9B8D24806DCE4BD46D7DD6806B37D121
6D
4B
24
1
7
BD

6B
6

53
6D

DD
Paper / Subject Code: 48848 / IoT System Design

23
80
E4

D4

D7

6B
D6
DC

5
4B

46

23
80
7D
06

CE

6B
D6
D
48

4B
D

46

80
D
D2

7
BD

D6
0

6D
48
B8

6D
Duration: 3 Hours [Max. Marks: 80]

D
4

D4
D2

E
19

D7
0

DC

DD
8

4B
B8
31

46
4
N. B : (1) Question No 1Q1 is compulsory

06
35

CE
19

D7
BD
8D

48
B2

1
(2) From Q2 to Q6 solve any three questions

6D

46
9B
3

4
D2
5
06

BD
(3) All questions carry equal marks

0
3

DC
8
2
68

8
31

4
B

9B

4
(4) Assume suitable data, if required, and state it clearly

2
DD

06
5
06

CE

D
D
3

11

8
B2
8

4B
8
D7

6D
4
6

9B
3

D2
D

5
6

CE
46

80
23
80

1
D

8
31
D7

6D
BD

4
B
6

9B
Q1 Attempt any four [20]

2
DD

35
6

8D
46

0
0

11
E4

48
2
68
7
BD

6B

B
53
DC

6D

2
D

9
A. What is IoT? List the challenges

8D
3
80

1
D
E4

D4

8
2
6

31
7

24
6B
6

9B
80

B. Explain IP Addressing in IoT in brief


DC

35
B

8D
46
4

11
7D
4
C. What is MQTT? Explain MQTT in brief
D2

2
68
06

CE

6B

9B
53
D

D
8

4B
B8

D. Explain in brief Serial Peripheral Interface (SPI)


D

6
4

3
80

11
D
D4
D2

B2
6

E
19

D7

6
80

E. What is designing for affordability? Explain in brief

53
DC

06
4B
B8
31

46
4

23
7D
F. Explain data logging and networking requirement for IoT application
2

68
6
35

E
19

D
D

6B
0

DC

6D

DD
8
2

B
8
31

4
6B

80
B

E4

D4
D2

6
35

D7

D6
0
80

C
8
2

4B
8
31

46
4
6B
D6

7D
Q2. a. Explain Websocket and REST APIs [20]
D2

06
35

CE
9

D
80

11
7D

6D
8
2

B
b. Explain IoT functional blocks with suitable examples
B8

6D
4
6B
D6

4
D

D4
D2
5

CE
19
46

0
3
80
7D

8
B2

4B
B8
31

D
BD

24
D6
D

06
5
6

CE
9

8D
46

23
80

1
7D
E4

Q3. a. Draw and explain OSI Model for the IoT/M2M [20]
48
31

6D
BD

B
D6

B
DC

2
35
6

19

b. What is MCU Control? Explain MCUs for Sensor Interface. List the techniques
8D
46

80
80
7D
E4

B2
6

31
BD

24
D6

B
80

DC

35
06

8D
46
24

11
7D
E4

B2
68
6

BD
8D

9B
80

53
DC

DD

Q4 a. Describe in detail CoAP protocol used in application Layer. [20]


46
24

3
80
9B

11
E4

2
06

7
BD
8D

B
D6

b. What are the challenges in M2M? Differentiate between IoT and M2M?
53
DC

D
48

06
46

23
9B

7D
E4
D2

68
6

BD

6B
80
11

DC

6D

DD
B8

24

80
53

E4

4
6
9

D7
D

Q5 a. Explain data exchange format: JOSN & XML in brief [20]


8D

D6
80
23

11

4B
D

46
24
6B

9B
53

7D

b. Explain any Case study on IoT


06

CE

BD
8D
23

6D
48
31

6D
6B

9B

E4

D4
D2
35

0
80

DC
8
B2

4B
B8
31

4
D6

Q6. a. What is RFID IoT System? Explain RFID IoT Network architecture [20]
D2

06
35
06

CE
9
11
D

b. Explain Security models and Protocols for IoT.in brief


8
B2
8

8
D7

6D
24
D6

9B
53
06

8D

80
23

1
7D

31

24
6B
D6

_____________________
9B
6D

35

8D
80

11
7D
D4

B2
D6

9B
3
6D

35
06
4B

11
7D
D4

2
8
CE

B
D6

53
6D

6
4B

23
80
7D
D4
E

6B
D6
DC

6D
4B

80
D
D4
06

CE

31330 Page 1 of 1
D7

D6
8

4B
6D

46
24

7D
E

BD
8D

DC

6D
48

E4

D4
D2

06

DC

9B8D24806DCE4BD46D7DD6806B235311
48

4B
B8
D

B
D6
6D

44
06
4B
Paper / Subject Code: 48847 / Honours/Minor degree programs Statistical Learning for Data Science

7D
D4

B3
68
CE

6D

DD

44
06
4B
6D

D4

B3
68
CE

D7
80

06
4B
D

6
24

D
D4

68
6

7
8D

80
Duration: 3hrs [Max Marks:80]

DD
B
6D

46
4
9B

4
2

CE

7
BD
8D

80
1A

6D

D
D
4
B

7D
N.B. : (1) Question No 1 is Compulsory.

4
4B

D4
D2

CE
9

0
1A

6D
(2) Attempt any three questions out of the remaining five.

34

48

4B
8

D
B
B
6B

D4
D2

06
(3) All questions carry equal marks.

E
A9
4

DC
34
80

48

4B
B8
1
(4) Assume suitable data, if required and state it clearly.

B
6B
D6

D2

E
9
44

80
A

DC
80
7D

B
8
B1
B3

24
B

E4
D6

06
9
6D

8D
44
1 Attempt any FOUR [20]

1A

DC
80

48
7D
D4

9B
B
B
6

D2

06
a Explain Categorical data and quantitative data.

6D

DD

4
06
4B

1A
4

48
B8
4

B3
8
CE

D7

B
b Find S.D of the average temperature recorded over a five-day period last winter D

D2
A9
D

44
06
4B
6D

46

8
D

8
B1
3
8

24
9B
18,22,19,25,12
E

7
D

6B
D6
80

6D

8D
44
B

1A
6D
24

80
7D
E4
c Define Binomial distribution and Poisson distribution.

D4

9B
4B
8D

6B
D6
80

6D
4B

1A
D
24

4
80
d Explain Type1 and Type 2 error in detail.
9B

7D
D4

B3
6

CE

4B
D

D6
0
1A

6D
48

06
4B
8

e Define the following key terms for simple linear regression.


6D

34
B

D
4B

4
D2

68
E
9

D7
BD

6B
80
A

DC
34

DD
i)Response ii) Record iii) Independent variable iv) Regression co-efficient v)
B8
1

46
24

80
4
4B
6B

E
9

D7
BD
D

D6
0
A

Residuals
DC
4
80

8
8
1
3

46
24
B

7D
E4
4B
6B
D6

6
9

BD
2 a The runs scored in a cricket match by 11 players are as [10]
8D

0
1A

DC

6D
34
0

48
7D

68

4
B
B

D4
D2

06

follows:7,16,121,51,101,81,1,16,9,11,16.
CE
A9
D

4
6
46

4
0

48
7D

4B
B8
1

6D
B3
8

Find mean, mode, median for the given data.


4B
D

D6

CE
A9
D

D
06
4B

0
46

34

48
D

B8
B1

6D
68

b An agent sells life insurance policies to five equally aged healthy people. [10]
CE

D7
D

D2
9
DD

44
6
4B

80
1A
D

80

According to recent data, the probability of a person living in these conditions


4

B3

24
06

B
CE

4B
D

D6

9
D

8D
48

06
B

1A
D

34

for 30 years or more is 2/3.Caluclate the probability that after 30 years if


7D
4

4
D2

68
06

9B
CE

4B
BD

6B
6D

DD
48
B8

i) All five people are still living.


1A
D

34
80
4

D4
D2

06

CE

D7

4B
B
D6

ii) At least three people are still living.


48

06
B
B8

46

34
7D
4
D2

68
06

CE
A9

BD

6B

iii) Exactly two people are still living (Hint: Binomial Distribution)
6D

DD
8
8
B1

D
24

80
9B

E4

D4
6

X is a normally distributed variable with mean µ=30 S. D σ=4.Find i) P(X<40)


D7

3 a [10]
8D
44

D6
80
1A

4B
6D
B3

46
24
B

7D
4B

ii)P(X>21) iii) P(30<X<35)


CE
A9

BD
8D

80

6D
34

B1

6D
24
9B

E4

b Brief the steps in multinomial distribution goodness of fit. Elaborate the steps [10]
6B

D4
D
44

0
1A

DC
80

48

4B
8
B3

with an example.
B
4B
D6

D2

06

CE
A9
06

34

48
7D

4 a Brief the steps in test of independence. Elaborate the steps with an example [10]
B1

6D
8

B
6B
D6

D2
A9
44

80

b Find the simple linear regression that fits the given data and co efficient of [10]
80
D

8
B1
3

24
9B
D7

6B
D6

8D
44

determination.
1A
46

0
7D

3
8

9B
4B
BD

B
D6
6D

Bill 34 108 64 88 99 54
06

1A
4
7D
E4

D4

B3
68

4B

Tip 5 17 11 8 14 5
6D

06
4B

34
D
D4

8
CE

D7

6B
D6
4B
6D

80
7D
D4
E

31244 Page 1 of 2
D6
0

DC

6D
48

4B

7D
D4
D2

06

CE

6D
48

4B
6D

D4
D2

9B8D24806DCE4BD46D7DD6806B344B1A
CE
80
D2 E4 7D B3 B8
48 BD 44
0 6D 46
D6
80 B1 D2
48
CE D7 6B A9 06
D2
48 4B D 34 B8 D CE
06 D6 4B D2
D4 8 1A 48 4B
DC 6D 06 9B 06 D
E 4B 7D B3
44 8 D CE
46
D
80 D4 D6 B1 D2
4B 7D
6D 80 48

6 a
5 a
6D 6B A9 06 D D6
CE B 80 D 46

31244
4B 7D 34 8D 6B D
D6 4B CE

y
4 7D 24 34
D4
6 0 1A 8 8 B D

5.7
2.5
3.5
D 4B

-3.7

11.5
CE D7 6B 9B 06 4 68
D 3 D 6 0 1A

Week
Value
4B D 44 8D CE D7 6B 9B
4 D 3

2
6
5
4
3
D4 68 B1 24 4 8D
x1
BD
collinearity.

6D 06 A9 80 D6 4B
B B 6 D 4 6 80 1 A
24

1
7D 3 8 D 6 9 80

18
44 D CE 7 B B 6D

1
3
7
5
8
D6
D4 8 B1 24 4 34 8
x2

6D 06 A9 80 B DD
4B D CE

2
B 6D D4 68 1 24 4B
B3 A

13
7D 8 6D 06 80
4 C
b Predict equation for y.

9 D4

i) Mean absolute error.


D6 4B D2 E4 7D B3 B8 6D 6D
80 1A 48 BD 4 4 C E
6B 0 D6 B D2 7D

3
9B 6D 46 80 1A 48 4B

16
34 8 D7 6 B 9 06 D 4
D6
4B D2 CE
34 B 8 D 6D 80
1A 48 4B DD
4B D C E4 7D 6B
9B 06 D4 68 1 24 B 34
D

4
8D DC 6D 06 A9 80 D6 4B Explain TIME SERIES PATTERNS

11
24 E4 7D B3
44 B 8D
6D 46 80
6B
1A

b Consider the following time series data.


80 BD D6 CE D7 9B
6D B1 24 4B DD 34 8D
80 8 4

5
46
0 6 B

17
A9
CE D7 6B B8 6 D4 80 1A 24
80
4B DD 34
4B D2
DC
E
6D
7 6B3 9 B 6D
D

Page 2 of 2
6
D4 68 4B D 8D

14
48 44
iv)Trend and Seasonal Pattern v)Cyclical Pattern

1A B
CE
6D 06
B 9 06 D4 6 8 1 2 4

*******************
7D 4B
B8 06 80 D

ii) Mean squared error.


34 DC 6D A9
D6 4B D 2 E B 3 B 6D

compute the following measures of forecast accuracy.


4 7D 8
80 1A 48 44 CE
i)Horizontal Pattern ii) Trend Pattern iii)Seasonal Pattern

BD D6 D2
6B 9 06 4 8 B1 4 4B

9B8D24806DCE4BD46D7DD6806B344B1A
34 B 8 DC 6D 06 A 80
4B D2 E4 7D B3 9 B8 6D D4
6D
1A 48 BD 4 4 C E
9B 0 6D 46
D6
80 B 1A
D2
48 4B
8D CE D7 6B 9 B 0 6 D4
24 4 D 3 44 8 D CE 6D
80 BD D6 B D2 7D
6D 46 80 1A 48 4 B D6
CE D7 6B 9B 06 D4
D
iii) Mean absolute percentage error. iv) Determine the forecast for week 7?
3 6
Using the naive method (most recent value) as the forecast for the next week,

4B DD 44 8D CE D7
D4
6D
68
06
B1 24
80 4 BD DD
A9
7D B3 B8 6 46 68
06
D6 4 4B D2
DC
E D7 B
48 4B D D
[10]
[10]
[10]
In the context of multiple linear regression. Explain what is over fitting and multi [10]

80 1A
6B 9B 06 D4 68
34 8 DC 6D
7
06
E
Paper / Subject Code: 48847 / Honours/Minor degree programs Statistical Learning for Data Science

4B D2
4B DD B3
1A 48 44
9B 06 D4 68
8D DC 6D 06
24 E4 7D B3
8 B D 44
9
E5

9E
54

C4

9
Paper / Subject Code: 37417 / Image & Video Processing (DLOC - II)

B7
A7

11

3
F8

F7
9
E5
0D

9E
54

C4

9
B7
A7
6A

11

3
F8

F7
9
E5
0D
39

54

C4

79
A7
07

6A

11

9B
F8
38
Duration: 3hrs Max Marks: 80

E5
0D
39

54

C4
E1

A7
07

6A

11

9B
F8
39

38
N.B.: (1) Question No 1 is Compulsory.

E5
0D
39

54

C4
F7

E1

A7
07

6A

11
(2) Attempt any three questions out of the remaining five.

F8
9

39

38
B7

E5
0D
39

54
(3) All questions carry equal marks.

F7

E1
49

A7
07

6A

11
9
(4) Assume suitable data, if required and state it clearly.

39
8C

38
B7

E5
0D
39
F7

E1
4F

49

A7
07

6A

11
1 Attempt any FOUR [20]

9
15

39
8C

38
B7

E5
0D
39
51

F7

E1
4F
a Compare Lossless Compression Techniques & Lossy Compression Techniques [5]

49

A7
07

6A
E

9
15

39
8C

38
B7
A7

0D
39
b State and Explain properties of FFT. [5]

51

F7

E1
4F

49
D

07

6A
E

9
A0

15

39
8C

38
B7
A7

0D
c Explain zero memory enhancement techniques 1) Contrast Stretching 2) Thresholding [5]

39
51

F7
96

E1
4F

49
D

07

6A
E

9
73

A0

d Find the DCT of the given sequence. f(x)= {1,2,4.7} [5]

15

39
8C

38
B7
A7

39
80

51

F7
96

E1
4F

49
D

07
3

e Explain sampling and Quantization. [5]

9
73

A0

15
E1

39
8C

38
B7
A7
80

51

F7
39

96

E1
4F
2 a Explain split and merge segmentation Technique. [10]

49
D
13

9
F7

73

A0

15

39
8C

B7
A7
9E

80
79

b What do you mean by redundancy in digital image? Explain image compression model. [10]

51

F7
96

4F

49
D
73

13
9B

9
73

A0

15

8C

B7
A7
9F

3 a Find DFT of the given image using DIT-FFT. [10]


9E
C4

80

51
96

4F
B7

49
D
73

13
F8

E
73

A0

15
0 1 2 1

8C
49

A7
9F

9E
54

80

51
96
8C

4F
B7

D
11

73

13

1 2 3 2

E
73

A0

15
4F

49
E5

A7
9F

9E

80

51
15

96
8C

B7
A7

3 3 4 3
D
73

13

E
51

73

A0
4F

49

A7
9F
0D

9E
7E

80

1 2 3 2
15

96
8C

B7

D
6A

73

13
DA

51

73

A0
4F

49

9F
39

9E

b Equalize the given histogram [10]


7E

80
A0

15

96
8C

B7
07

73

13
DA

51

73
96

4F
38

Grey level 0 1 2 3 4 5 6 7
49

9F

9E
7E

80
73

A0

15
E1

8C

B7

Number of 790 1023 850 656 329 245 122 81


73

3
DA
80

51
96

E1
4F

49

9F

Pixels
13

7E
73

A0

15

39
8C

B7
9E

DA
80

51

7
96

4 a Write short note on Fast Hadamard Transform.


4F

[10]
49

9F
73

13

7E
73

A0

15

8C

B7
9F

9E

DA

b Explain in detail low pass (smoothing) filters. [10]


80

51
96

4F
B7

49
73

13

7E
73

A0

15

8C
9F

5 a Explain edge detection in detail. [10]


9E

DA
80

51
96

4F
B7

73

13

7E
73

A0

b Explain Huffman Coding with example. [10]


15
49

9F

9E

DA
80

51
96
8C

B7

73

6 a Explain Digital video format and estimation in detail. [10]


13

7E
73

A0
4F

49

9F

9E

DA
80
15

96
8C

b Write short note on [10]


B7

73

13

73

A0
4F

49

1) Composite and Component Video


9F

9E

80
15

96
8C

B7

73

13
51

73
4F

49

9F

2) BMP Image File Format


9E
7E

80
15

8C

B7

73

13
DA

51

4F

49

9F

9E
7E

15

8C

B7

73
DA

51

4F

49

9F
7E
A0

15

8C

B7
DA

51
96

4F

49
7E
73

A0

15

8C

30648
DA
80

51
96

4F
7E
73

A0

15

3807396A0DA7E51154F8C49B79F739E1
DA
80

51
96
8E ED C1 6E 75
3C 02 5C 61 D8
F7 52 1F AD E3
D8 7E F6 D6 E7 C F7
E3 D0 C1 E6 5 D8 7E
CF 25 5C 1A E3 D0
77 2F 1F DE C 25
ED 6C D6 75 F7 2F
02 15 E6 D8 7E 6C
3C C1 1A D0 15

Q.2
F7 52 E3
7E F6 FD DE C 25 C1
C1 6 75 F7
7
2F FD

30473
D0 5C E6 D8 ED 6C 6E
25 1F 1A E3 15 61
2F DE C 02 C1
7E 6C D6 75 F7 52 FD AD
E6 7 F6 E7
Time: 3 Hours

D0 15 1A D8 ED C1 6E
5D

networks.
25

equals 10.
C1 E3 02 5C 61
2F FD 8E DE C

application?
F 52 AD

Q.1 Solve any Four


6C 7 6 F 1F 3C 75
15 E6 D 7E 6 C D6 E7 F7
25 C1 1A 8E D0 1 5C E 6 5D 7E
2F FD DE 3C 25 1A 8E
6C 6 F 7 1 F
D0
Note: 1. Q.1 is Compulsory.

E 75 2F D DE 3C 25
15 6 1 D8 7E 6C 6 7 F 7 2F
C1 A E D0 1 5 E6 5D 7 E 6C

4
3
2
1
0
FD DE 3C
F7 2 5 C1 1A 8E D 02 15
6E 75 2F FD DE 3C 5
7 6 C1

6
4
5
3
2
6

X Y
61 D8 ED C E 75 F7 2F FD
AD E3 0 15 6 1 D8 7E 6C
2. Attempt any 3 from remaining

CF 25 C1 D0 15 6E
E7 2 F AD E3 61
D E 2 5 C
3. Assume suitable data if necessary

5D 77 F6 CF 2 1 AD
8E ED C1 6E 75 7 7 F6C
FD E7
61 D8

D. Explain in detail the MP neuron model.


3C 02 5C A
ED 1 6E
F7 5 1F D E3 02 5C 61 5D
2F C 8E

chart the Error Back Propagation Concept.


7E 6C D6 E7 F7 52 1F AD 3C
E 6 5 D 7E F 6 D E7
D0
25
15 1A 8E C 1 6 E 5D F7
C1 D0 61 8
7E

Page 1 of 2
2F FD DE 3C 2 5C A E D0
6C 6 F7 52 1F 3C
E6
75 7 F D DE
7 F 25
2
15 E 6C 6
E. Explain the overfitting and underfitting with example
1 A
D8
E 1 E 5 D 77
C1
FD DE 3C
D0
25 5 C1 6 1A 8E E D0
F D 3

75D8E3CF77ED0252F6C15C1FD6E61ADE
6E 75 F7 2F C 25
7E 6C D6 E7
B. Differentiate between supervised and unsupervised learning.

61 D8 E 5 F7 2F
AD E3 D 0 15 6 7E 6C
E7 CF 25 C1 1 A
D8
E D0 1
2
Paper / Subject Code: 37414 / Machine Learning

5D 77 2F FD DE 3C 5
ED 6C 6E 75 F7 2F
8E
0 1 5 6 D 7 E 6C
3C
F7 2 5 C1 1A 8E D 02 15
2F FD DE 3C 5 C1
7E 6C 6 75 F7 2F
D0 15 E 61 D8 7E 6C
25 C1 A E D0 15
2F FD DE 3C 25
A. What is Machine Learning? What are the steps in developing a machine learning

C1
6C 6 7 F 7 2F

Find the least square regression line Y=aX+b. Estimate the Y when the value of X
15 E6 5D 7E FD
B. The values of independent variable X and the dependent variable Y are given below

6C
Max. Marks: 80

6E
C. Draw and explain biological neural networks and compare them with artificial neural

C1 1A 8E
3
D0 15
FD DE CF 25 C1
6E 75 7 2F FD
A. Draw a block diagram of the Error Back Propagation Algorithm and explain with the flow

61 D8 7E 6C 6E
AD E3 D0 15 61

[10]
[10]
[05]
[05]
[05]
[05]
[05]

E7 CF 25
2F
C1
FD A
5D 77 6C
8E ED 15 6E
3C 02 C 61
5 A
1
2

6E
C1
6C

A
25
Paper / Subject Code: 37414 / Machine Learning

FD

61
D0

15
2F

6E
C1
6C

A
25
7E

FD

61
D0

15
2F
F7

6E
C1
6C
5
E
3C

FD
7

D0

5
2F
7
8E

1
Q.3

C1
6C
5
7E
3C
5D

02

15
F
F7
E
A. Diagonalize the matrix A [05]

D
E7

2
8

6C
5
E
C
5D

C
2
AD

7
3

D0

15
2F
F7
8E
E7
2 2

61

6C
25
7E
3C
D
AD
6E

D0
5

2F
F7
E
7

D8
FD

61

DE

25
7E
3C
1 3

6E

D0
5
C1

7
A

8E
E7

F
FD

5
7E
15

3C
D
6

02
D
E

75
1
6C

7
1A

E
6

ED
C

CF
D8
D

DE
15
2F

6
B. List out and explain the applications of SVD [05]

1F

77
3
E

75
6C

A
25

8E
6
5C

CF
D

DE
C. Write short note on maximum expectation algorithm [05]
D0

2F

5D
6
1F
1

E3
E
6C

1A
5
7E

D6

7
5C
02
D. What are Activation functions? Explain the Binary, Bipolar, Continuous, and Ramp

D8
DE

3C
F
F7

6
F
D

1
2

6E

75
C1
C

A
5

8E
E
3C

activation functions. 2 [05]

FD
7

61

DE
D0

5
F

5D
7
8E

1
52
F

E
C1
6C

1A
7E
3C

E7
5D

02

FD
15
F
F7

E6
8E

AD
ED
E7

52
4.

C1
6C
3C

6
5D

2
AD

FD
7

61
D0

5
2F
7
8E
E7

1
A. Write a short note on (a) Multivariate Regression and (b) Regularized Regression. [10]
CF

6E
61

C1
6C
25
7E
5D
AD

FD
E3
6E

D0

15
2F
F7

B. What is the curse of Dimensionality? Explain the PCA dimensionality reduction


7

D8
FD

61

C1
DE

6C
25
E
C

7
3
6E

technique in detail [10]

0
75

15
2F
C1

F7
1A

D
D8
FD

DE

6C
5
7E
15

3C
6

2
E

0
75

2F
C1
6C

F7
1A

8E
D6

ED
E

25
15

3C
2F

Q. 5
D
E6

AD
1F

77

D0
5
6C
25

E
6

E7
5C

CF
D8
D

A. Design a Hebb net to implement OR function (consider bipolar inputs and targets) [10]
7E
D0

2F

D
F
C1

E3
E

75
1

F7
A
25
7E

6
5C

B. Draw Delta Learning Rule (LMS-Widrow Hoff) model and explain it with a training
F6

D8
FD

61

DE
D0

3C
F7

1
52

6E

75
C1
C

1A

8E
7E
C

process flowchart. [10]


02

DE
E3

5
F

5D
F7

6
F
ED

1
52

E
D8

C1
6C

A
C

D6

E7
02
7

1
E3
75

15
2F
F7

AD
1F
ED

Q. 6. Write short note on any FOUR


D8

C
25
C

6
5C
6

FD
7

61
E3

D0
5

2F
F7

A. Least Square Regression for classification [05]


E7

C1

6E
D8

C1
5
7E
C

2
AD

F6

FD
E3

D0
75

15

B. Differentiate between Ridge and Lasso Regression [05]


7

2
F
D8
61

C1
DE

6C
25
7E
C
E3

C. Artificial Neural Network [05]


6E

0
75

15
2F
7
1A

ED
F
D8
DE

6C
5
3C
E6

D. Feature selection methods for dimensionality reduction [05]


02
7
75

2F
F7
1A

8E
D6

ED
DE

25
3C

E. Perceptron Neural Network [05]


D
E6
1F

77

D0
75
1A

E
D6
5C

CF
D8
DE

7E
E6
1F
C1

E3
75

F7
1A
6
5C

**************
D8
FD

DE

3C
E6
C1

75
C1

1A

8E
D6
F6

DE
15

5D
E6
1F
52

6C

A
6

E7
5C
02

FD

1
2F

AD
ED

C1

E
C1
25

6
F6

FD

61
D0

15
52

6E
C1
6C
7E

02

FD
15
2F
F7

ED

C1
6C
25
3C

30473 Page 2 of 2
77

D0

15
2F
8E

CF

6C
25
7E
E3

D0

2F
F7
D8

75D8E3CF77ED0252F6C15C1FD6E61ADE
25
7E
3C
6
D

47

A6
6A

4D
9F
Paper / Subject Code: 37413 / Software Engineering and Project Management

5D

6A
DB

7F
C4

6A

4D
D4

AA
9F
4A

DB

7F
C4

A5
B2

D6
D4
9F
A

B6
2A

4
4

7F
C4

A5
B2

D
6D
(3 Hours) Max. Marks: 80

4
F
4A

6
A

5D
9
17

B
C4
2

FD
6D

6A
A4

AB

4
Note: 1. Q.1 Compulsory

5D
9
7

DB
64

C4
D2
2. Solve Any 3 question form remaining questions

6A
A4
AA

AB

9F
A
76

DB
4

24

C4
D2
D6

41
6
AA

F
A

4A
76
F4

49
4

D2
6
Q1. a) Define software engineering and explain umbrella activities 5

41
47

A6

AC
D

AB

F
A
5D

76
F4

49
64

24
b) Difference between white box and black box testing 5

D2
6

1
7
6A

AC
D

A4
4

AA

AB
5D

6
F4
DB
c) Explain functional and non-functional requirements 5

17
4

24
D2
D6
7

6
6A

A4
D4

AA

B
F

76
4
d) Explain the golden rules for interface design 5
49

2A
B

64
A5

D6
D

41
7
AC

6D
D4

AA

AB
F

B6

4A
4
49
24

17
7F
5

D2
6
FD

A6
AC

A
AB

4D

A4
Q2 a) Elaborate COCOMO model for Cost estimation

D4
B6

76
49

6A
24

64
2

5
D

41
7
AC
6D

6A
b) Illustrate the SCM process
AB

4D
D4

AA
F

4A
9
7

B
24

7F
C4
2

A5
41

D6
D

A6
6D

AB

D4
9F
4A

4A

F4

6A
7

DB
4
Q3. a) Describe the waterfall model and evolutionary process model 10
2

A5
41
A6

47
C
6D

4D
9F
4A

4A

B6
2A
6A

5D
7

b) What is Risk management? Discuss Common sources of risk in IT projects? 10

7F
4
41
A6

D
AC
6D
D

6A
AB

D4
9F
4A
F4

6A

DB
4

C4
D2

A5
41
47

A6

2
D

AB

9F
4A

A
Q4.A) What are the different phases in project life cycle with suitable example 10
5D

6
F4

B6
6A

17

24

C4
2
47

A6
6A

FD
D
D

AB

b) What are the Agile Methodologies? Explain any of them 10


A

4A
5D

76
F4

6A
DB

49
64

2
1
47

2
6A

AC
6D
D

4
A

AB
9F

4A
5D

F4

A
DB

17
C4

24
D2
D6
47

Q5. a) Develop the SRS of University Management system 10


6A

A4
AA

AB
9F
4A

5D

6
F4
DB

7
4
C4

b) Describe the details of FTR and Walkthrough 10


B2

D2
D6

41
47

6
6A

AA
9F
4A

4A
A

5D

76
4
DB

7F
C4
D2

B2

D6

41
A6
6A

D4
9F
4A

4A
A

F4

Q6. a) Explain project scheduling and describe CPM and PERT 10


6A
DB
C4
D2

A5
B2

47

A6
4D
9F
4A
76

B6

b) Explain software reverse engineering in details 10


A

5D

6A
F
C4
D2
41

B2

47
6A

4D
9F
4A

4A
76

5D
DB

7F
C4
D2
1
A6

B2

6A
A4

______________________
D4
9F
4A
76

DB
64

C4
D2

A5
41

B2
A

F
4A

4A
76

B6
A
6A

49
D2
41
6

B2

FD
AC
4D

AA

4A

76

49
F

24
D2
D6

1
47

AC
A4
AA

AB
76
4
7F

64

24
D2
D6

41
D4

AB
4A

76
4

6A
7F
A5

D2
1
6
4D

A4
D4

AA
B6

76
F

64
A5

D6
FD

41
47

A
B6

4A
D

6A
7F
A5
D

A6
4D
D4
9F

B6

6A
F
C4

A5
FD

47

4D
4A

B6

29690 Page 1 of 1
D
49

F
A5
B2

47
AC

9F

D
DB
24

C4

A5
AB

76D2AB24AC49FDB6A5D47F4D6AA64A41
9F
4A

B6

You might also like