Professional Documents
Culture Documents
TE-VI AIDS R-19 ALL Compressed
TE-VI AIDS R-19 ALL Compressed
98
4B
3D
C0
Paper / Subject Code: 37412 / Cryptography and System Security
87
8D
82
8C
B3
18
4B
3D
79
D6
C
20
82
8C
88
B3
B8
9E
3D
01
79
D6
4
34
Duration: 3hrs [Max Marks:80]
82
2
8C
8
8
98
B
3D
9
9
AB
4
4
7
N.B. : (1) Question No 1 is Compulsory.
2
3
E2
C
8
D8
8
18
8
53
9
(2) Attempt any three questions out of the remaining five.
79
AB
24
4
20
C3
C0
8
(3) All questions carry equal marks.
D8
98
98
3
B3
49
01
5
AB
(4) Assume suitable data, if required and state it clearly.
C3
7
C0
D6
88
8
98
53
3
9
B8
01
B
87
C0
6
1 Attempt any FOUR [20]
E2
3A
24
98
18
3
B8
9
D8
9
05
B
34
20
a Describe services and mechanisms.
87
6
3A
4
C
C3
9E
2
18
B3
B9
8
D8
05
b ECB and CBC block cipher. 98
20
6
83
3A
24
3C
3
87
9E
C
9
8
c Why digital signature and digital certificates are required?
05
18
B
8
AB
B
34
3D
9
6
4
3C
20
98
2
C
3
8
d What is keyed and keyless transposition ciphers?
B8
8
9E
05
8
B
98
AB
4
3D
1
83
4
34
3C
0
87
D
e Explain clickjacking and session hijacking.
82
E2
53
B9
B8
98
6B
8
3D
49
C0
01
79
AB
3A
4
D
2
83
8C
2 a Explain DES algorithm with reference to following points: 8 [10]
B3
8
D8
E
05
8
53
B
9
79
1. Block size and key size
D6
AB
4
4
3C
0
3
C0
82
3
C
88
2. Need of expansion permutation
B8
8
9E
6B
8
53
B3
D
9
01
9
AB
24
4
3. Role of S-box
C3
7
0
8D
D6
E2
88
3C
D8
8
98
3
4B
B9
B8
49
01
5
B
b Use the playfair cipher with the keyword “example” to encipher “The algorithm
C3
87
0
[10]
D6
82
3
E2
A
24
18
98
3
3D
9
8
9
D8
B
B
20
87
C0
6
3
A
8C
24
3
9E
8
8C
53
3
9
8
D8
79
B
AB
B
20
0
9
3 a What are properties of hash function? Compare MD-5 and SHA hash algorithm. [10]
D6
83
24
88
C
3
87
9E
8C
3
B3
B9
B8
8
01
05
8
34
D
01
E2
3A
4
3C
3
87
98
2
E2
8C
49
8
05
8
B
B
3D
49
01
83
3A
4
C
87
8D
2
83
E2
8C
B9
8
4 a What do you understand by digital signatures and digital certificates? Explain digital [10]
5
8
B
4B
3D
B9
49
C0
1
D6
3A
20
82
83
3A
8C
B3
B8
9E
05
18
b Explain memory and address protection in detail. Write a note on file protection. [10]
D
9
79
05
D6
AB
4
4
3C
0
2
83
E2
8C
88
B8
D8
6B
53
79
AB
24
34
C3
C0
8D
E2
88
5 a Enlist various functions of protocols of SSL. Explain the phases of handshake [10]
8
8
98
53
B3
4B
3D
9
01
protocol.
AB
34
7
C0
D6
82
E2
C
88
[10]
98
53
B3
3D
B8
1
B
security.
87
C0
D6
2
3A
8C
8
18
B3
9
B8
49
79
5
20
C0
D6
83
3A
4
88
B9
B8
01
05
6B
34
3D
E2
3A
4
98
82
8C
49
05
B
B
4B
3D
b X.509
D6
83
A
3C
2
8C
53
B9
8
D8
B
4B
D6
3A
C3
2
8
B3
8
D8
05
18
d DNS attack
98
4B
D6
3C
20
C3
87
82
e Email attacks.
B8
9E
18
6B
98
3D
24
20
87
8D
_____________________________
8C
8
9E
18
4B
3D
79
4
20
82
83
8C
8
9E
18
3D
B9
29724 Page 1 of 1
79
4
20
83
3A
8C
88
9E
9
01
79
AB
4
83
E2
88
53
53AB98349E20188798C3D824B8D6B3C0
B9
49
01
0
92
B4
B
1
DE
AA
Paper / Subject Code: 37411 / Data Analytics and Visualization
8B
10
0C
C4
12
92
B4
DE
DA
AA
B
10
0C
28
C4
12
77
B4
DE
09
A
A
0A
0C
21
D
A
C4
77
4
DA
1
E
B
DA
A
D
0A
Duration: 3 Hrs [Max Marks: 80]
0C
4A
9A
4
77
AC
DA
CB
45
AA
D
A
Notes: (1) Question No. 1 is Compulsory.
7D
A
C4
BA
A0
E0
B4
9
A7
(2) Attempt any THREE questions out of the remaining FIVE.
45
A
D
4D
8B
0C
7D
A
A
0
(3) All questions carry equal marks.
92
C
DA
59
B
DE
7
DA
B
10
A
(4) Assume suitable data, if required, and state it clearly.
A4
A
8
C4
0
12
92
7
DA
9
(5) Figures to the right indicate full marks.
BB
E
7
5
DA
AA
4D
0
A
A4
21
9A
28
A0
77
AC
B4
B
1
45
Q1 a) What is an analytic sandbox, and why is it important? 5
AD
A
B
10
A
0C
7D
A
A0
2
92
9
B4
B
1
b) Why use autocorrelation instead of autocovariance when examining stationary 5
DE
A7
5
AD
A
8B
0
A4
0C
21
4A
C4
A0
92
time series?
59
BB
A1
DE
7
B
DA
AD
10
0A
A4
0C
28
4
12
7
AC
DA
59
B4
BB
E
09
A7
A
D
4
C
1
D
9A
4A
28
BA
4
A0
2
d) What is regression? What is simple linear regression?
0 5
7
A1
DE
09
A7
45
B
A
AD
8B
0C
21
7D
4A
BA
C4
A0
Q2 a) Explain in detail how dirty data can be detected in the data exploration phase 10
2
59
1
E
9
7
B
DA
AA
AD
8B
0
D
A
A4
0C
21
with visualizations.
4
0
92
7
AC
B4
DA
59
B
A1
DE
7
10
8B
b) List and explain methods that can be used for sentiment analysis.
A4
10
0C
7D
4A
9A
C4
A0
12
2
DE
09
A7
CB
5
AA
Q3 a) List and explain the main phases of the Data Analytics Lifecycle.
D
10
8B
A4
7D
1
9A
C4
A0
E0
12
B4
B
09
A
AD
AA
4D
8B
A
A4
0C
7D
1
0
12
AC
DA
9
B4
Q4 a) Suppose everyone who visits a retail website gets one promotional offer or no 10
BB
DE
09
A7
5
AA
4
0C
7D
21
9A
8
C4
BA
A0
A1
DE
A7
45
DA
AD
B
0
0C
21
4A
28
BA
difference. What statistical method would you recommend for this analysis?
C4
A0
77
9
A1
DE
09
5
CB
A
D
B
0A
A4
9A
4A
28
C4
E0
DA
BB
A1
09
A7
45
CB
DA
4D
Q5 a) How does the ARMA model differ from the ARIMA model? In what situation is 10
1
9A
4A
28
BA
A0
12
E0
77
AC
45
CB
B
10
4D
0A
7D
28
BA
12
0
AC
B4
DA
DE
b) Explain with suitable example how the Term Frequency and Inverse Document
09
10
7
AA
8B
0A
0C
21
7D
A
C4
92
A1
DE
7
DA
AD
10
0A
A4
0C
4A
4
Q6
12
AC
A
59
DE
CB
AA
AD
0A
A4
7D
C4
E0
DA
4D
0A
A4
0C
A
28
AC
A
59
BB
DE
b) Box-Jenkins Methodology 5
09
A7
AD
A4
7D
21
28
C4
A0
59
BB
9
A7
c) Seaborn Library. 5
DA
AD
10
A4
28
A0
12
77
59
BB
09
AD
AA
28
12
DA
59
B4
BB
9
AA
10
A4
0C
9A
28
12
B4
BB
**************************
9
45
AA
10
0C
28
BA
12
B4
DE
09
AA
8B
0C
1
C4
12
92
29185 Page 1 of 1
B4
DE
A
10
0C
7D
4A
C4
12
DE
CB
DA
A
4A
C4
DA0A77DAC4DE0CB4AA1210928BBA459A
E0
77
D
80
D4
E
0
D7
B2
DC
Paper / Subject Code: 48846 / Honours/Minor degree programs AR and Mix Reality
D6
4B
06
46
06
7D
CE
0
68
BD
B2
48
6D
6D
DD
D2
06
E4
D4
0
68
D7
B8
DC
48
DD
2
46
09
4
(3 Hours) [Total Marks: 80]
06
D
CE
BD
F0
7
8
D
B
24
6D
D
05
46
09
D
D
CE
NB: 1) Question 1 is compulsory.
B2
80
D
0
D7
B8
F
4B
24
D
2) Attempt any three questions from the remaining questions.
06
05
6
9
06
8D
4
00
E
8
B2
3) Assume suitable data wherever applicable.
BD
D6
DC
8
5F
9B
4
06
D2
D
E4
20
6
0
8
D7
80
F0
D6
B8
DC
6B
4B
4
6
2
D
09
80
D4
20
06
8D
CE
D7
1 (a) Explain the most common types of Mobile AR apps. 05
F0
D6
48
4B
9B
6D
06
6
05
2
D
D4
CE
8D
0
8
D7
Explain the coordinate systems used in Mixed Reality.
80
(b) 05
0
6
6B
4B
6D
F
D
24
6
05
D
09
80
D4
CE
80
8D
(c) Explain the issue of runtime reconfiguration and discuss how to resolve it, 05
0
0
6
D
48
4B
24
6D
F
DD
9B
6
6
05
D2
8D
80
D4
(d)
CE
Explain the usage of web technology in Mixed Reality 05
80
00
7
B2
D6
B8
6D
9B
4B
24
6D
F
6
5
7D
09
8D
0
4
00
CE
20
80
8
BD
F0
6
5F
D
Explain Multimodal Displays.
B
2 (a)
9B
24
6D
DD
06
46
E4
05
20
8D
00
10
80
8
D
D7
B2
C
6B
D6
5F
9B
4B
24
06
46
80
20
06
7D
8D
00
CE
68
BD
D6
6B
8
5F
6D
9B
6D
DD
2
7D
E4
80
20
D4
00
0
D6
D7
8
DC
6D
6B
8
5F
9B
4B
24
7D
46
80
D4
06
8D
00
CE
BD
D6
6D
6B
48
B
5F
9B
6D
E4
D2
7D
E4
80
D4
20
80
DC
0
D6
B8
DC
6D
6B
4 (a) Describe the common data structure used for representing and rendering graphical 10
4B
5F
24
06
7D
9
80
D4
CE
scenes.
20
06
8D
0
48
F0
D6
6D
6B
48
B
6D
9B
D2
E4
05
D2
7D
80
D4
80
DC
D6
B8
6D
B
24
5F
6
09
E4
06
7D
09
8D
0
D4
20
68
DC
48
F0
6D
6B
9B
4B
05
06
7D
80
D4
00
CE
B2
B8
48
D6
5F
(b) What is POI in Mobile AR? How are they represented and delivered to the client 10
6D
4B
6D
D2
06
09
20
7D
D4
CE
application?
80
68
F0
B8
6B
D
4B
24
6D
DD
05
46
09
8D
CE
B2
80
D
F0
D7
6 20
4B
24
6D
06
05
46
8D
00
CE
68
B2
80
BD
9B
24
6D
06
E4
20
8D
00
68
D7
80
5F
DD
9B
24
80
20
06
8D
00
(c) ARToolkit
D7
D6
6B
48
5F
9B
46
D2
7D
80
20
00
BD
D6
B8
6D
6B
5F
E4
------------------------------------
7D
09
80
D4
20
F0
D6
6D
6B
4B
05
7D
80
D4
CE
B2
D6
6D
4B
6D
06
7D
D4
CE
80
68
31005
6D
4B
24
6D
DD
D4
CE
80
D7
4B
24
6D
9B8D24806DCE4BD46D7DD6806B205F00
46
4
CE
37
68
BD
7
Paper / Subject Code: 48845 / Honours/Minor degree programs Digital Forensic
6D
6B
6D
DD
E4
80
D4
80
D7
3
DC
D6
6B
4B
24
46
06
7D
8D
80
CE
D
8
6
D
9B
4B
24
6D
DD
46
D
21
E
0
D7
B8
DC
48
D1
B
(3 Hours) (Maximum Marks: 80)
D2
6
9
4
6
D
37
4
21
E
0
BD
7
8
DC
48
6B
6D
9B
7D
D2
E4
NB. 1. Question number One is compulsory
6
80
D4
1
80
3
12
B8
DC
D6
6B
2. Attempt any three out of remaining five questions
4B
4
D
2
9
7D
06
80
37
3. Assume suitable data
8D
21
CE
48
D6
6D
D1
B
4. Figures to the right indicate the maximum marks
4B
6D
06
2
9
D
D4
8D
21
CE
80
8
D7
B3
D6
D1
4B
24
D
6
46
19
7D
Q1 Attempt any FOUR: (20)
06
80
CE
8D
BD
48
6
6D
1
6D
9B
DD
7D
a) Define and classify Cybercrime
06
E4
D2
D4
21
80
68
D7
3
DC
B8
8
B
D1
4B
24
24
D
06
46
19
06
7D
8D
37
8D
68
D
C
12
8
6B
9B
B
24
6D
9B
DD
7D
46
E4
D
0
21
21
80
8
BD
D7
B3
B8
D6
D1
D1
24
06
46
9
E4
06
D
37
8D
37
8
BD
7
DC
48
6B
6
1
6D
6B
9B
DD
D
E4
06
80
37
80
D4
1
12
D7
B8
DC
8
D6
6B
D6
4B
24
46
19
7D
6
0
7D
37
CE
80
8
BD
12
8
6
6D
6D
9B
24
DD
6D
7D
06
E4
D4
8D
D4
21
80
68
D7
B3
DC
1
4B
9B
4B
24
DD
D
6
46
06
80
CE
37
8D
1
Q3 a) Describe Steps to prevent cybercrime and explain Hackers, Crackers and Phreakers (10)
CE
BD
12
48
6
6D
6B
6D
B
DD
6D
D
E4
D2
19
b) Explain Forensic Investigation Report Writing in terms of Standards, Content, Style, (10)
80
4
7
80
80
BD
D7
B3
DC
12
B8
D6
24
24
Formatting and Organization.
7D
06
46
E4
19
06
7D
8D
8D
8
BD
B3
DC
12
48
D6
6D
9B
9B
7D
D2
6
E4
06
7D
80
4
21
BD
3
B8
C
48
6B
D1
D
DD
2
19
E4
06
8D
80
D4
37
b) How to Acquire an Image with dd Tools and with Forensic Formats (10)
12
D7
DC
48
D6
6B
9B
4B
7D
D2
46
6
7D
80
21
CE
80
B3
D
B8
D6
D1
6D
4B
24
7D
37
4
CE
80
BD
12
8
6B
6D
9B
24
E4
80
8D
D4
21
80
B3
DC
D6
D1
4B
24
06
19
7D
06
37
8D
CE
68
48
6B
B
DD
6D
D
D2
19
80
37
12
B8
D6
6B
24
7D
46
80
8D
BD
12
D6
6D
6B
9B
_______________________________________
7D
E4
7D
80
D4
21
3
6
6D
6B
D1
4B
DD
80
D4
CE
37
D7
D6
6B
4B
6D
30851 Page 1 of 1
46
7D
80
CE
80
BD
D6
6D
24
6D
E4
7D
D4
80
DC
9B8D24806DCE4BD46D7DD6806B37D121
6D
4B
24
1
7
BD
6B
6
53
6D
DD
Paper / Subject Code: 48848 / IoT System Design
23
80
E4
D4
D7
6B
D6
DC
5
4B
46
23
80
7D
06
CE
6B
D6
D
48
4B
D
46
80
D
D2
7
BD
D6
0
6D
48
B8
6D
Duration: 3 Hours [Max. Marks: 80]
D
4
D4
D2
E
19
D7
0
DC
DD
8
4B
B8
31
46
4
N. B : (1) Question No 1Q1 is compulsory
06
35
CE
19
D7
BD
8D
48
B2
1
(2) From Q2 to Q6 solve any three questions
6D
46
9B
3
4
D2
5
06
BD
(3) All questions carry equal marks
0
3
DC
8
2
68
8
31
4
B
9B
4
(4) Assume suitable data, if required, and state it clearly
2
DD
06
5
06
CE
D
D
3
11
8
B2
8
4B
8
D7
6D
4
6
9B
3
D2
D
5
6
CE
46
80
23
80
1
D
8
31
D7
6D
BD
4
B
6
9B
Q1 Attempt any four [20]
2
DD
35
6
8D
46
0
0
11
E4
48
2
68
7
BD
6B
B
53
DC
6D
2
D
9
A. What is IoT? List the challenges
8D
3
80
1
D
E4
D4
8
2
6
31
7
24
6B
6
9B
80
35
B
8D
46
4
11
7D
4
C. What is MQTT? Explain MQTT in brief
D2
2
68
06
CE
6B
9B
53
D
D
8
4B
B8
6
4
3
80
11
D
D4
D2
B2
6
E
19
D7
6
80
53
DC
06
4B
B8
31
46
4
23
7D
F. Explain data logging and networking requirement for IoT application
2
68
6
35
E
19
D
D
6B
0
DC
6D
DD
8
2
B
8
31
4
6B
80
B
E4
D4
D2
6
35
D7
D6
0
80
C
8
2
4B
8
31
46
4
6B
D6
7D
Q2. a. Explain Websocket and REST APIs [20]
D2
06
35
CE
9
D
80
11
7D
6D
8
2
B
b. Explain IoT functional blocks with suitable examples
B8
6D
4
6B
D6
4
D
D4
D2
5
CE
19
46
0
3
80
7D
8
B2
4B
B8
31
D
BD
24
D6
D
06
5
6
CE
9
8D
46
23
80
1
7D
E4
Q3. a. Draw and explain OSI Model for the IoT/M2M [20]
48
31
6D
BD
B
D6
B
DC
2
35
6
19
b. What is MCU Control? Explain MCUs for Sensor Interface. List the techniques
8D
46
80
80
7D
E4
B2
6
31
BD
24
D6
B
80
DC
35
06
8D
46
24
11
7D
E4
B2
68
6
BD
8D
9B
80
53
DC
DD
3
80
9B
11
E4
2
06
7
BD
8D
B
D6
b. What are the challenges in M2M? Differentiate between IoT and M2M?
53
DC
D
48
06
46
23
9B
7D
E4
D2
68
6
BD
6B
80
11
DC
6D
DD
B8
24
80
53
E4
4
6
9
D7
D
D6
80
23
11
4B
D
46
24
6B
9B
53
7D
CE
BD
8D
23
6D
48
31
6D
6B
9B
E4
D4
D2
35
0
80
DC
8
B2
4B
B8
31
4
D6
Q6. a. What is RFID IoT System? Explain RFID IoT Network architecture [20]
D2
06
35
06
CE
9
11
D
8
D7
6D
24
D6
9B
53
06
8D
80
23
1
7D
31
24
6B
D6
_____________________
9B
6D
35
8D
80
11
7D
D4
B2
D6
9B
3
6D
35
06
4B
11
7D
D4
2
8
CE
B
D6
53
6D
6
4B
23
80
7D
D4
E
6B
D6
DC
6D
4B
80
D
D4
06
CE
31330 Page 1 of 1
D7
D6
8
4B
6D
46
24
7D
E
BD
8D
DC
6D
48
E4
D4
D2
06
DC
9B8D24806DCE4BD46D7DD6806B235311
48
4B
B8
D
B
D6
6D
44
06
4B
Paper / Subject Code: 48847 / Honours/Minor degree programs Statistical Learning for Data Science
7D
D4
B3
68
CE
6D
DD
44
06
4B
6D
D4
B3
68
CE
D7
80
06
4B
D
6
24
D
D4
68
6
7
8D
80
Duration: 3hrs [Max Marks:80]
DD
B
6D
46
4
9B
4
2
CE
7
BD
8D
80
1A
6D
D
D
4
B
7D
N.B. : (1) Question No 1 is Compulsory.
4
4B
D4
D2
CE
9
0
1A
6D
(2) Attempt any three questions out of the remaining five.
34
48
4B
8
D
B
B
6B
D4
D2
06
(3) All questions carry equal marks.
E
A9
4
DC
34
80
48
4B
B8
1
(4) Assume suitable data, if required and state it clearly.
B
6B
D6
D2
E
9
44
80
A
DC
80
7D
B
8
B1
B3
24
B
E4
D6
06
9
6D
8D
44
1 Attempt any FOUR [20]
1A
DC
80
48
7D
D4
9B
B
B
6
D2
06
a Explain Categorical data and quantitative data.
6D
DD
4
06
4B
1A
4
48
B8
4
B3
8
CE
D7
B
b Find S.D of the average temperature recorded over a five-day period last winter D
D2
A9
D
44
06
4B
6D
46
8
D
8
B1
3
8
24
9B
18,22,19,25,12
E
7
D
6B
D6
80
6D
8D
44
B
1A
6D
24
80
7D
E4
c Define Binomial distribution and Poisson distribution.
D4
9B
4B
8D
6B
D6
80
6D
4B
1A
D
24
4
80
d Explain Type1 and Type 2 error in detail.
9B
7D
D4
B3
6
CE
4B
D
D6
0
1A
6D
48
06
4B
8
34
B
D
4B
4
D2
68
E
9
D7
BD
6B
80
A
DC
34
DD
i)Response ii) Record iii) Independent variable iv) Regression co-efficient v)
B8
1
46
24
80
4
4B
6B
E
9
D7
BD
D
D6
0
A
Residuals
DC
4
80
8
8
1
3
46
24
B
7D
E4
4B
6B
D6
6
9
BD
2 a The runs scored in a cricket match by 11 players are as [10]
8D
0
1A
DC
6D
34
0
48
7D
68
4
B
B
D4
D2
06
follows:7,16,121,51,101,81,1,16,9,11,16.
CE
A9
D
4
6
46
4
0
48
7D
4B
B8
1
6D
B3
8
D6
CE
A9
D
D
06
4B
0
46
34
48
D
B8
B1
6D
68
b An agent sells life insurance policies to five equally aged healthy people. [10]
CE
D7
D
D2
9
DD
44
6
4B
80
1A
D
80
B3
24
06
B
CE
4B
D
D6
9
D
8D
48
06
B
1A
D
34
4
D2
68
06
9B
CE
4B
BD
6B
6D
DD
48
B8
34
80
4
D4
D2
06
CE
D7
4B
B
D6
06
B
B8
46
34
7D
4
D2
68
06
CE
A9
BD
6B
iii) Exactly two people are still living (Hint: Binomial Distribution)
6D
DD
8
8
B1
D
24
80
9B
E4
D4
6
3 a [10]
8D
44
D6
80
1A
4B
6D
B3
46
24
B
7D
4B
BD
8D
80
6D
34
B1
6D
24
9B
E4
b Brief the steps in multinomial distribution goodness of fit. Elaborate the steps [10]
6B
D4
D
44
0
1A
DC
80
48
4B
8
B3
with an example.
B
4B
D6
D2
06
CE
A9
06
34
48
7D
4 a Brief the steps in test of independence. Elaborate the steps with an example [10]
B1
6D
8
B
6B
D6
D2
A9
44
80
b Find the simple linear regression that fits the given data and co efficient of [10]
80
D
8
B1
3
24
9B
D7
6B
D6
8D
44
determination.
1A
46
0
7D
3
8
9B
4B
BD
B
D6
6D
Bill 34 108 64 88 99 54
06
1A
4
7D
E4
D4
B3
68
4B
Tip 5 17 11 8 14 5
6D
06
4B
34
D
D4
8
CE
D7
6B
D6
4B
6D
80
7D
D4
E
31244 Page 1 of 2
D6
0
DC
6D
48
4B
7D
D4
D2
06
CE
6D
48
4B
6D
D4
D2
9B8D24806DCE4BD46D7DD6806B344B1A
CE
80
D2 E4 7D B3 B8
48 BD 44
0 6D 46
D6
80 B1 D2
48
CE D7 6B A9 06
D2
48 4B D 34 B8 D CE
06 D6 4B D2
D4 8 1A 48 4B
DC 6D 06 9B 06 D
E 4B 7D B3
44 8 D CE
46
D
80 D4 D6 B1 D2
4B 7D
6D 80 48
6 a
5 a
6D 6B A9 06 D D6
CE B 80 D 46
31244
4B 7D 34 8D 6B D
D6 4B CE
y
4 7D 24 34
D4
6 0 1A 8 8 B D
5.7
2.5
3.5
D 4B
-3.7
11.5
CE D7 6B 9B 06 4 68
D 3 D 6 0 1A
Week
Value
4B D 44 8D CE D7 6B 9B
4 D 3
2
6
5
4
3
D4 68 B1 24 4 8D
x1
BD
collinearity.
6D 06 A9 80 D6 4B
B B 6 D 4 6 80 1 A
24
1
7D 3 8 D 6 9 80
18
44 D CE 7 B B 6D
1
3
7
5
8
D6
D4 8 B1 24 4 34 8
x2
6D 06 A9 80 B DD
4B D CE
2
B 6D D4 68 1 24 4B
B3 A
13
7D 8 6D 06 80
4 C
b Predict equation for y.
9 D4
3
9B 6D 46 80 1A 48 4B
16
34 8 D7 6 B 9 06 D 4
D6
4B D2 CE
34 B 8 D 6D 80
1A 48 4B DD
4B D C E4 7D 6B
9B 06 D4 68 1 24 B 34
D
4
8D DC 6D 06 A9 80 D6 4B Explain TIME SERIES PATTERNS
11
24 E4 7D B3
44 B 8D
6D 46 80
6B
1A
5
46
0 6 B
17
A9
CE D7 6B B8 6 D4 80 1A 24
80
4B DD 34
4B D2
DC
E
6D
7 6B3 9 B 6D
D
Page 2 of 2
6
D4 68 4B D 8D
14
48 44
iv)Trend and Seasonal Pattern v)Cyclical Pattern
1A B
CE
6D 06
B 9 06 D4 6 8 1 2 4
*******************
7D 4B
B8 06 80 D
BD D6 D2
6B 9 06 4 8 B1 4 4B
9B8D24806DCE4BD46D7DD6806B344B1A
34 B 8 DC 6D 06 A 80
4B D2 E4 7D B3 9 B8 6D D4
6D
1A 48 BD 4 4 C E
9B 0 6D 46
D6
80 B 1A
D2
48 4B
8D CE D7 6B 9 B 0 6 D4
24 4 D 3 44 8 D CE 6D
80 BD D6 B D2 7D
6D 46 80 1A 48 4 B D6
CE D7 6B 9B 06 D4
D
iii) Mean absolute percentage error. iv) Determine the forecast for week 7?
3 6
Using the naive method (most recent value) as the forecast for the next week,
4B DD 44 8D CE D7
D4
6D
68
06
B1 24
80 4 BD DD
A9
7D B3 B8 6 46 68
06
D6 4 4B D2
DC
E D7 B
48 4B D D
[10]
[10]
[10]
In the context of multiple linear regression. Explain what is over fitting and multi [10]
80 1A
6B 9B 06 D4 68
34 8 DC 6D
7
06
E
Paper / Subject Code: 48847 / Honours/Minor degree programs Statistical Learning for Data Science
4B D2
4B DD B3
1A 48 44
9B 06 D4 68
8D DC 6D 06
24 E4 7D B3
8 B D 44
9
E5
9E
54
C4
9
Paper / Subject Code: 37417 / Image & Video Processing (DLOC - II)
B7
A7
11
3
F8
F7
9
E5
0D
9E
54
C4
9
B7
A7
6A
11
3
F8
F7
9
E5
0D
39
54
C4
79
A7
07
6A
11
9B
F8
38
Duration: 3hrs Max Marks: 80
E5
0D
39
54
C4
E1
A7
07
6A
11
9B
F8
39
38
N.B.: (1) Question No 1 is Compulsory.
E5
0D
39
54
C4
F7
E1
A7
07
6A
11
(2) Attempt any three questions out of the remaining five.
F8
9
39
38
B7
E5
0D
39
54
(3) All questions carry equal marks.
F7
E1
49
A7
07
6A
11
9
(4) Assume suitable data, if required and state it clearly.
39
8C
38
B7
E5
0D
39
F7
E1
4F
49
A7
07
6A
11
1 Attempt any FOUR [20]
9
15
39
8C
38
B7
E5
0D
39
51
F7
E1
4F
a Compare Lossless Compression Techniques & Lossy Compression Techniques [5]
49
A7
07
6A
E
9
15
39
8C
38
B7
A7
0D
39
b State and Explain properties of FFT. [5]
51
F7
E1
4F
49
D
07
6A
E
9
A0
15
39
8C
38
B7
A7
0D
c Explain zero memory enhancement techniques 1) Contrast Stretching 2) Thresholding [5]
39
51
F7
96
E1
4F
49
D
07
6A
E
9
73
A0
15
39
8C
38
B7
A7
39
80
51
F7
96
E1
4F
49
D
07
3
9
73
A0
15
E1
39
8C
38
B7
A7
80
51
F7
39
96
E1
4F
2 a Explain split and merge segmentation Technique. [10]
49
D
13
9
F7
73
A0
15
39
8C
B7
A7
9E
80
79
b What do you mean by redundancy in digital image? Explain image compression model. [10]
51
F7
96
4F
49
D
73
13
9B
9
73
A0
15
8C
B7
A7
9F
80
51
96
4F
B7
49
D
73
13
F8
E
73
A0
15
0 1 2 1
8C
49
A7
9F
9E
54
80
51
96
8C
4F
B7
D
11
73
13
1 2 3 2
E
73
A0
15
4F
49
E5
A7
9F
9E
80
51
15
96
8C
B7
A7
3 3 4 3
D
73
13
E
51
73
A0
4F
49
A7
9F
0D
9E
7E
80
1 2 3 2
15
96
8C
B7
D
6A
73
13
DA
51
73
A0
4F
49
9F
39
9E
80
A0
15
96
8C
B7
07
73
13
DA
51
73
96
4F
38
Grey level 0 1 2 3 4 5 6 7
49
9F
9E
7E
80
73
A0
15
E1
8C
B7
3
DA
80
51
96
E1
4F
49
9F
Pixels
13
7E
73
A0
15
39
8C
B7
9E
DA
80
51
7
96
[10]
49
9F
73
13
7E
73
A0
15
8C
B7
9F
9E
DA
51
96
4F
B7
49
73
13
7E
73
A0
15
8C
9F
DA
80
51
96
4F
B7
73
13
7E
73
A0
9F
9E
DA
80
51
96
8C
B7
73
7E
73
A0
4F
49
9F
9E
DA
80
15
96
8C
73
13
73
A0
4F
49
9E
80
15
96
8C
B7
73
13
51
73
4F
49
9F
80
15
8C
B7
73
13
DA
51
4F
49
9F
9E
7E
15
8C
B7
73
DA
51
4F
49
9F
7E
A0
15
8C
B7
DA
51
96
4F
49
7E
73
A0
15
8C
30648
DA
80
51
96
4F
7E
73
A0
15
3807396A0DA7E51154F8C49B79F739E1
DA
80
51
96
8E ED C1 6E 75
3C 02 5C 61 D8
F7 52 1F AD E3
D8 7E F6 D6 E7 C F7
E3 D0 C1 E6 5 D8 7E
CF 25 5C 1A E3 D0
77 2F 1F DE C 25
ED 6C D6 75 F7 2F
02 15 E6 D8 7E 6C
3C C1 1A D0 15
Q.2
F7 52 E3
7E F6 FD DE C 25 C1
C1 6 75 F7
7
2F FD
30473
D0 5C E6 D8 ED 6C 6E
25 1F 1A E3 15 61
2F DE C 02 C1
7E 6C D6 75 F7 52 FD AD
E6 7 F6 E7
Time: 3 Hours
D0 15 1A D8 ED C1 6E
5D
networks.
25
equals 10.
C1 E3 02 5C 61
2F FD 8E DE C
application?
F 52 AD
E 75 2F D DE 3C 25
15 6 1 D8 7E 6C 6 7 F 7 2F
C1 A E D0 1 5 E6 5D 7 E 6C
4
3
2
1
0
FD DE 3C
F7 2 5 C1 1A 8E D 02 15
6E 75 2F FD DE 3C 5
7 6 C1
6
4
5
3
2
6
X Y
61 D8 ED C E 75 F7 2F FD
AD E3 0 15 6 1 D8 7E 6C
2. Attempt any 3 from remaining
CF 25 C1 D0 15 6E
E7 2 F AD E3 61
D E 2 5 C
3. Assume suitable data if necessary
5D 77 F6 CF 2 1 AD
8E ED C1 6E 75 7 7 F6C
FD E7
61 D8
Page 1 of 2
2F FD DE 3C 2 5C A E D0
6C 6 F7 52 1F 3C
E6
75 7 F D DE
7 F 25
2
15 E 6C 6
E. Explain the overfitting and underfitting with example
1 A
D8
E 1 E 5 D 77
C1
FD DE 3C
D0
25 5 C1 6 1A 8E E D0
F D 3
75D8E3CF77ED0252F6C15C1FD6E61ADE
6E 75 F7 2F C 25
7E 6C D6 E7
B. Differentiate between supervised and unsupervised learning.
61 D8 E 5 F7 2F
AD E3 D 0 15 6 7E 6C
E7 CF 25 C1 1 A
D8
E D0 1
2
Paper / Subject Code: 37414 / Machine Learning
5D 77 2F FD DE 3C 5
ED 6C 6E 75 F7 2F
8E
0 1 5 6 D 7 E 6C
3C
F7 2 5 C1 1A 8E D 02 15
2F FD DE 3C 5 C1
7E 6C 6 75 F7 2F
D0 15 E 61 D8 7E 6C
25 C1 A E D0 15
2F FD DE 3C 25
A. What is Machine Learning? What are the steps in developing a machine learning
C1
6C 6 7 F 7 2F
Find the least square regression line Y=aX+b. Estimate the Y when the value of X
15 E6 5D 7E FD
B. The values of independent variable X and the dependent variable Y are given below
6C
Max. Marks: 80
6E
C. Draw and explain biological neural networks and compare them with artificial neural
C1 1A 8E
3
D0 15
FD DE CF 25 C1
6E 75 7 2F FD
A. Draw a block diagram of the Error Back Propagation Algorithm and explain with the flow
61 D8 7E 6C 6E
AD E3 D0 15 61
[10]
[10]
[05]
[05]
[05]
[05]
[05]
E7 CF 25
2F
C1
FD A
5D 77 6C
8E ED 15 6E
3C 02 C 61
5 A
1
2
6E
C1
6C
A
25
Paper / Subject Code: 37414 / Machine Learning
FD
61
D0
15
2F
6E
C1
6C
A
25
7E
FD
61
D0
15
2F
F7
6E
C1
6C
5
E
3C
FD
7
D0
5
2F
7
8E
1
Q.3
C1
6C
5
7E
3C
5D
02
15
F
F7
E
A. Diagonalize the matrix A [05]
D
E7
2
8
6C
5
E
C
5D
C
2
AD
7
3
D0
15
2F
F7
8E
E7
2 2
61
6C
25
7E
3C
D
AD
6E
D0
5
2F
F7
E
7
D8
FD
61
DE
25
7E
3C
1 3
6E
D0
5
C1
7
A
8E
E7
F
FD
5
7E
15
3C
D
6
02
D
E
75
1
6C
7
1A
E
6
ED
C
CF
D8
D
DE
15
2F
6
B. List out and explain the applications of SVD [05]
1F
77
3
E
75
6C
A
25
8E
6
5C
CF
D
DE
C. Write short note on maximum expectation algorithm [05]
D0
2F
5D
6
1F
1
E3
E
6C
1A
5
7E
D6
7
5C
02
D. What are Activation functions? Explain the Binary, Bipolar, Continuous, and Ramp
D8
DE
3C
F
F7
6
F
D
1
2
6E
75
C1
C
A
5
8E
E
3C
FD
7
61
DE
D0
5
F
5D
7
8E
1
52
F
E
C1
6C
1A
7E
3C
E7
5D
02
FD
15
F
F7
E6
8E
AD
ED
E7
52
4.
C1
6C
3C
6
5D
2
AD
FD
7
61
D0
5
2F
7
8E
E7
1
A. Write a short note on (a) Multivariate Regression and (b) Regularized Regression. [10]
CF
6E
61
C1
6C
25
7E
5D
AD
FD
E3
6E
D0
15
2F
F7
D8
FD
61
C1
DE
6C
25
E
C
7
3
6E
0
75
15
2F
C1
F7
1A
D
D8
FD
DE
6C
5
7E
15
3C
6
2
E
0
75
2F
C1
6C
F7
1A
8E
D6
ED
E
25
15
3C
2F
Q. 5
D
E6
AD
1F
77
D0
5
6C
25
E
6
E7
5C
CF
D8
D
A. Design a Hebb net to implement OR function (consider bipolar inputs and targets) [10]
7E
D0
2F
D
F
C1
E3
E
75
1
F7
A
25
7E
6
5C
B. Draw Delta Learning Rule (LMS-Widrow Hoff) model and explain it with a training
F6
D8
FD
61
DE
D0
3C
F7
1
52
6E
75
C1
C
1A
8E
7E
C
DE
E3
5
F
5D
F7
6
F
ED
1
52
E
D8
C1
6C
A
C
D6
E7
02
7
1
E3
75
15
2F
F7
AD
1F
ED
C
25
C
6
5C
6
FD
7
61
E3
D0
5
2F
F7
C1
6E
D8
C1
5
7E
C
2
AD
F6
FD
E3
D0
75
15
2
F
D8
61
C1
DE
6C
25
7E
C
E3
0
75
15
2F
7
1A
ED
F
D8
DE
6C
5
3C
E6
2F
F7
1A
8E
D6
ED
DE
25
3C
77
D0
75
1A
E
D6
5C
CF
D8
DE
7E
E6
1F
C1
E3
75
F7
1A
6
5C
**************
D8
FD
DE
3C
E6
C1
75
C1
1A
8E
D6
F6
DE
15
5D
E6
1F
52
6C
A
6
E7
5C
02
FD
1
2F
AD
ED
C1
E
C1
25
6
F6
FD
61
D0
15
52
6E
C1
6C
7E
02
FD
15
2F
F7
ED
C1
6C
25
3C
30473 Page 2 of 2
77
D0
15
2F
8E
CF
6C
25
7E
E3
D0
2F
F7
D8
75D8E3CF77ED0252F6C15C1FD6E61ADE
25
7E
3C
6
D
47
A6
6A
4D
9F
Paper / Subject Code: 37413 / Software Engineering and Project Management
5D
6A
DB
7F
C4
6A
4D
D4
AA
9F
4A
DB
7F
C4
A5
B2
D6
D4
9F
A
B6
2A
4
4
7F
C4
A5
B2
D
6D
(3 Hours) Max. Marks: 80
4
F
4A
6
A
5D
9
17
B
C4
2
FD
6D
6A
A4
AB
4
Note: 1. Q.1 Compulsory
5D
9
7
DB
64
C4
D2
2. Solve Any 3 question form remaining questions
6A
A4
AA
AB
9F
A
76
DB
4
24
C4
D2
D6
41
6
AA
F
A
4A
76
F4
49
4
D2
6
Q1. a) Define software engineering and explain umbrella activities 5
41
47
A6
AC
D
AB
F
A
5D
76
F4
49
64
24
b) Difference between white box and black box testing 5
D2
6
1
7
6A
AC
D
A4
4
AA
AB
5D
6
F4
DB
c) Explain functional and non-functional requirements 5
17
4
24
D2
D6
7
6
6A
A4
D4
AA
B
F
76
4
d) Explain the golden rules for interface design 5
49
2A
B
64
A5
D6
D
41
7
AC
6D
D4
AA
AB
F
B6
4A
4
49
24
17
7F
5
D2
6
FD
A6
AC
A
AB
4D
A4
Q2 a) Elaborate COCOMO model for Cost estimation
D4
B6
76
49
6A
24
64
2
5
D
41
7
AC
6D
6A
b) Illustrate the SCM process
AB
4D
D4
AA
F
4A
9
7
B
24
7F
C4
2
A5
41
D6
D
A6
6D
AB
D4
9F
4A
4A
F4
6A
7
DB
4
Q3. a) Describe the waterfall model and evolutionary process model 10
2
A5
41
A6
47
C
6D
4D
9F
4A
4A
B6
2A
6A
5D
7
7F
4
41
A6
D
AC
6D
D
6A
AB
D4
9F
4A
F4
6A
DB
4
C4
D2
A5
41
47
A6
2
D
AB
9F
4A
A
Q4.A) What are the different phases in project life cycle with suitable example 10
5D
6
F4
B6
6A
17
24
C4
2
47
A6
6A
FD
D
D
AB
4A
5D
76
F4
6A
DB
49
64
2
1
47
2
6A
AC
6D
D
4
A
AB
9F
4A
5D
F4
A
DB
17
C4
24
D2
D6
47
A4
AA
AB
9F
4A
5D
6
F4
DB
7
4
C4
D2
D6
41
47
6
6A
AA
9F
4A
4A
A
5D
76
4
DB
7F
C4
D2
B2
D6
41
A6
6A
D4
9F
4A
4A
A
F4
A5
B2
47
A6
4D
9F
4A
76
B6
5D
6A
F
C4
D2
41
B2
47
6A
4D
9F
4A
4A
76
5D
DB
7F
C4
D2
1
A6
B2
6A
A4
______________________
D4
9F
4A
76
DB
64
C4
D2
A5
41
B2
A
F
4A
4A
76
B6
A
6A
49
D2
41
6
B2
FD
AC
4D
AA
4A
76
49
F
24
D2
D6
1
47
AC
A4
AA
AB
76
4
7F
64
24
D2
D6
41
D4
AB
4A
76
4
6A
7F
A5
D2
1
6
4D
A4
D4
AA
B6
76
F
64
A5
D6
FD
41
47
A
B6
4A
D
6A
7F
A5
D
A6
4D
D4
9F
B6
6A
F
C4
A5
FD
47
4D
4A
B6
29690 Page 1 of 1
D
49
F
A5
B2
47
AC
9F
D
DB
24
C4
A5
AB
76D2AB24AC49FDB6A5D47F4D6AA64A41
9F
4A
B6