1 t +u' 'i'rl {'l*tal il{arkt 7/sem 7 - cbgs... · 4 i s? fi {3qs*l...

8
*er*';i-X fonp) (tiql, E '1 t l.'tatr\i"r&ry\ra- l\ s 'i'rl it'l +u' / rt t' t' u U {} I:[uur*] L Oueslion Nc, t it c*rttPtl!s*rY 2. i.tt*n,p, an1' thrtt {3} *ut tsf rcm*inLl7*,tztv ^t-5'} :. aururri* a*k*b\* dxr,x tf w*q*vi*xry *xd iuxtify th* as*un:ptitt*s .1. Figxrrs ltt t\ar: t'ighl ilr,tlit:'*t* ir"rltr r:rrlrk* h:tt*1i7L3l *r \'t:ttr i11,"1 ltr""i | { . Q.11 C*cle :811602 {'l*tal il{arkt I fiil } ht I-} t t,p. ql IAI wha|;irc l:,nAS r1*xrript*rs? {3ivr?lihfi d*s*ipL<sts f*r ar*bt:t meant f,:r clcaning lh* h*uss' tfl W;;;;;;;1sliq {y11s\i,:n. Cive att cxt*rp1* h*vri*ti*x &:nr"'ti*n lbr fi' puzxlx pr*'*l*trt, ?ind tYrr* he.uristir* va)** t*t a p*r"ticul*r stiite r:f {re YSlts *k;:* W *rkl Pr* b k m. lfl C*mplr::* at'td t*rttr*gLyrrsblxm ri*lvit:t'g agettt and plannirrg *gent , WSWhrlt*r<*tll*,pr,*b1*rrl*lfiugtrati*r:elhat*a*.';rinlrilic.}imbing ya:hrt\q**'l'Tiius{r$te tvlthxn*x*zxytir: ' lEl Rrpre:rrllt tlrr: li:11'rrtinr rlett{l}cllt !rrrr' h'CIFL' {L} Y,v*ry tr** inv;hi*}: *ny aqttalic,bird *1x*1:s ixb*sld* r,onr* Inke. tiil Y**p\x ln" tc, ass;;s$\rt#,e rul*r*lhe3 er* nox l*yal t*' frsl [05I, [05] l05l lCI5] *2 lA] t*x*tdqr th*" giv*'rt: utr li fi{tj;-rlc.* t 2 .3 4 I s ? fi {3qs*l fitr'te l*ilial stat* il*mpar* arzd **ts{tttsr ttni*t*rr*e * s*'at*h *xr*l*g\xs *,*lv ing * -p *r.t\a pr *?fi *w, Q3 lAl i101, ivith r*specr te: lHi I 1"1 l.uj *r*"x *xd q\*'x,r\b*, Llt* xv*?si'r,:*tutr: tst g*alb*s** agwfi' t06] *ts,"tv*rtLh* t*11*ttingpru'y;*sit'trtri*l lagic *t*l*tr',*ttL int* Oh{F [04] (A ,* l3) ;)C .t\;t* lx,,-t b"*y, ty,$ jt is a ,;ritxx t*r an *.*T*ri*an ts sr:ll lvs'ffp$n$ to hcsti!* rrirti0r.s.'lhc cuuntry Ftrcno, litl cncrnl of America, h*5 SOme r:'tiss11*,*,nn'i a!! *t \ts t'*is*il** Ytewl s'sld'"t* itby Crlonei \Y*st, who is '*n lsrr*liran" {i) {{xp:r*se*t th\t xb*ve fiente.**l$ in first *r<trer predicat* [04] |':gie {T{-}YI-}' (lii t*nv*rt ti:ctr ir: *laus* fbnr:! t04:l i;i:jfrnu* lhat .aXrys*t is Crilminnl" tr$ing r*solution iO*i tcc ltr:iqtrt L*,3 trVlra{ ar* th* baslc b*ilding hl*cks *{ Leat'r,ixg tug**t) }.xpluin mc'k *t t0$l ilr*i:: r"-ilh s **'&Lb1**k litrgtam" ls. L 1 3 4 * 7 5 6 lruldN ovslll

Upload: leminh

Post on 11-Nov-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

*er*';i-X fonp) (tiql, E

'1 t l.'tatr\i"r&ry\ra-l\ s 'i'rl it'l +u' / rtt' t' uU {} I:[uur*]

L Oueslion Nc, t it c*rttPtl!s*rY2. i.tt*n,p, an1' thrtt {3} *ut tsf rcm*inLl7*,tztv

^t-5'}:. aururri* a*k*b\* dxr,x tf w*q*vi*xry *xd iuxtify th* as*un:ptitt*s

.1. Figxrrs ltt t\ar: t'ighl ilr,tlit:'*t* ir"rltr r:rrlrk*

h:tt*1i7L3l *r \'t:ttr i11,"1

ltr""i | { .

Q.11 C*cle :811602

{'l*tal il{arkt I fiil }

ht I-}t t,p.

qlIAI wha|;irc l:,nAS r1*xrript*rs? {3ivr?lihfi d*s*ipL<sts f*r ar*bt:t meant

f,:r clcaning lh* h*uss'

tfl W;;;;;;;1sliq {y11s\i,:n. Cive att cxt*rp1* h*vri*ti*x &:nr"'ti*n lbr fi'

puzxlx pr*'*l*trt, ?ind tYrr* he.uristir* va)** t*t a p*r"ticul*r stiite r:f {re

YSlts *k;:* W *rkl Pr* b k m.

lfl C*mplr::* at'td t*rttr*gLyrrsblxm ri*lvit:t'g agettt and plannirrg *gent ,

WSWhrlt*r<*tll*,pr,*b1*rrl*lfiugtrati*r:elhat*a*.';rinlrilic.}imbingya:hrt\q**'l'Tiius{r$te tvlthxn*x*zxytir:

'

lEl Rrpre:rrllt tlrr: li:11'rrtinr rlett{l}cllt !rrrr' h'CIFL'

{L} Y,v*ry tr** inv;hi*}: *ny aqttalic,bird *1x*1:s ixb*sld* r,onr* Inke.

tiil Y**p\x ln" tc, ass;;s$\rt#,e rul*r*lhe3 er* nox l*yal t*'

frsl

[05I,

[05]

l05l

lCI5]

*2 lA] t*x*tdqr th*" giv*'rt: utr lifi{tj;-rlc.*

t 2 .3

4 I s

? fi

{3qs*l fitr'te l*ilial stat*

il*mpar* arzd **ts{tttsr ttni*t*rr*e * s*'at*h *xr*l*g\xs

*,*lv ing * -p *r.t\a pr *?fi *w,

Q3 lAl

i101,

ivith r*specr te:

lHi

I 1"1l.uj

*r*"x *xd q\*'x,r\b*, Llt* xv*?si'r,:*tutr: tst g*alb*s** agwfi' t06]

*ts,"tv*rtLh* t*11*ttingpru'y;*sit'trtri*l lagic *t*l*tr',*ttL int* Oh{F [04]

(A ,* l3) ;)C

.t\;t* lx,,-t b"*y, ty,$ jt is a ,;ritxx t*r an *.*T*ri*an ts sr:ll lvs'ffp$n$ to

hcsti!* rrirti0r.s.'lhc cuuntry Ftrcno, litl cncrnl of America, h*5 SOme

r:'tiss11*,*,nn'i a!! *t \ts t'*is*il** Ytewl s'sld'"t* itby Crlonei \Y*st, who is

'*n lsrr*liran"

{i) {{xp:r*se*t th\t xb*ve fiente.**l$ in first *r<trer predicat* [04]|':gie {T{-}YI-}'

(lii t*nv*rt ti:ctr ir: *laus* fbnr:! t04:li;i:jfrnu* lhat .aXrys*t is Crilminnl" tr$ing r*solution

iO*itcc ltr:iqtrt

L*,3 trVlra{ ar* th* baslc b*ilding hl*cks *{ Leat'r,ixg tug**t) }.xpluin mc'k *t t0$l

ilr*i:: r"-ilh s **'&Lb1**k litrgtam"

ls.

L 1 3

4 *7 5 6

lruldN ovslll

Q. F- Crde ; 8116*2

2

*4 tAl hpp* alplll-**ta Vrutii11g an f*lltswingexac:ple e*nrideri*g frrst naiic as Il0]rrivtvlA_a

[Bl

Q5 iA"l

..

Ylr*tv g**eral nral:rileoturel *i:agr*rn od frxp*r't' system. Explak *very

component in "lctail of this blsck with an cxample.

cive the initial slatc. goal lcst, sil*cessor functiorr. and cost function for

tlt* tr'*v*llitzg sa!**p*rson prohi*nr {TSP]' Ttt+t* is a map invoiving N

citisis sonre ,:fl rvhich firc c()rln(cted b;' r*l'Js' The sinr is to find the

sh*rt**t tra'*r lltr;t *txrts tr*ffi x *iry, vislts Etl 11t* *ilie* *xe6tly ance nnd

c{rrne$ batk to rhc starting e ity.

'Yr*v* th* **rxis*ibility tt &*

Ilxptr,:in apartixl *rtler p1*nrt,,." t*th ott *tanlpie

Qd Lel utv*.n'*fuli4-gall*n j,rgandln *nrpry 3-g*ll njug,ttritig*ai istsftlltll*4----rl ,,:. ,*air:"l J,.)* vti'*t*xlt';tl"y 2- gxlt*rts *f wnt*r, *iv*:*t:*lr:vp'ece r*pr*5r,utati*lt,

IBI Tlt*, gnxgt. reacli;:g ;iI n nusicrr p*\rtr stalietn rirorvr high val*rs if ti:e. tr:fi1p*rr.Lurc rf the c+rc g$ss verlr hi6h. Thv ga$ge ak* sh*rvx ltigh

v*lsc if"l1a g;iugc is f'eult3'. A high rctriing in thc gaugc sets an alarm

*t{" Tk* alarm **n als:,s ,gq,rff if it i* taatly, Thr prcbability af f*ultyin*r{;rru<tnL* i: l<;u \n a ttttcl**r potv*r ytl*tlt,

{.i} {}rxw tir* Bayesiar: I}*lief H*t1v*rk fhr tb* a**v* situaticn(ii].,{sx*ciat* a ***ditietnal pr*hability- tahl* f*r earh nade

[r0]

[s*]

ffil

ICI

[*6]

[fi8]

fi{}l

{1*l

"'"'

he. sern-urr cBCt:S ND\/ D€C &-D1 b

Cornptl*er f Plsf tLttb

QP CODE, : 811902

(3 Hours) ITotal Marks : 80

N.B. {1)Question No. 1 is Compulsory.(2) Attempt any THREE questions out of rernaining questions'

(3) Assume any suitable data if required with iustification' a..-€I

Q. 1 a) Explain any five zero memory operations. 19^ *:i-'b) perform histogram equalization and draw new equalized histogram of the following

' ^-"'

image data. - '10

Gray level 0 I ? T

Number of pixels 1000 85il 158

- '"/',

!.)

..{':, -

.r'b) What is segmentation? Explain (i) Region Growing (ii) Reeidn Splitting (iii) Thresholding. 10

--1,

e .3 a) Explain with an example that the first difference of a ehiin code normalizes it to rotation. 10

b) Explain the following morphological operations:(i)Opening (ii) Closing 10

10Q. 2 a) Find the DFT of the given image:

e. 4 a) Classify lmage Compression methods in detail along with the different redundancies that

can be Present in digital images.

b) What are various file formats? Explain,each in brief.

10

10

Q. 5 a) Given 10

1C 44 )w10 14i1a811 x0. I 22

i)Find 3*bit IGS coded image and calculate compression factor and BPP.

ii) Find the decodeqirli-ige and calculate MSE and PSNR.

. ):i

b) Write 8 x 8 ffiAplARD transform matrix and its signal flow graph. Using Butterfly diagram,

compute HA.#fUnnD transform for x(n) = 1L,2,7,2,3-,2,3,4\ 10

Q.6 Write shbrt notes on 20

a) Dls5ete Cosine Transform, (b) Hough transform.

c) lS{ color moCel. (d) 4, 8 and m-connectivity

f=

1 3 1

3 1 2 1

2 4 7

2 7

he gera m eBqrs

Cnrrtpuff<rt - SA

MOU DEL a-lDtb

lslQ.P. Code :

gzl tb8120fi2

(3 Hours ) lTotal Marks : 80

N.B. : (1) Question number 1 is compulsory'

(2)Attemptanythreequestionsoutofthercmainingfivequestions'(3) Assume suitable data. ,.'

+v=\$

Explain different types of inconsistencies in models' -^'"'Definethe followingr) Architectural stYle

ii) ArchitecturalPatternsiii) AccuracY

iv) Precision

^\\ .--i\

^(-'(1

1. a)

b)

5

10(.;

\"il ,.'J

\.t--l

e),\

c)

2. a)

v) Views -.;'What are different fypes of connector based on i$biacti'ie services? 5

What types of applications are applicable fo{ehe following styles and give l0

is different from descriptive architecture' l0I

examples of each

i) Event based

ti) Pipe and filterlii) La1'ered

ir') Blackboardr') \lobile code

b) Horv persPective architeeltreExplain rvith examPle' ;.-

3. a) Discuss sen,ice orieirted architecture (SOA) and web services'

bi Explain variou*&atures of xADLs used as modeling language.

-,'rt'4. a) Define eag.hiticture analysis? Discuss various analysis goals with an example' 10

bi Explaqr.yarious design issues for the following nonfunctional properties 10

i. ^Efhciencl'' and CamPlexiry

ii. -.- Scalabili4' and Heterogeneity-* rl

'\_

5. 1)-.:Erpiain $'tth an example software systern mobility and Architecture' 10

-.;b) Explain $irh the help of suitable diagram architectual trade off analysis 10

S7 method (ATA\{).

10

10

i.r^. Y

i\-)t'

l ruRN OVERI

Q.P. Code : 812002

?(}6. Write a short note on anY two :

a) DecentalizedArchitecture

b) Domain and stYle SPecific ADLs

c) C2-ArchitecturalstYle.

d) System Stakeholders

^{li. :./

\\,A

(\.i. tl

. Yj-

^\./

r-I t

\ -.-\

t-

<,/ :*.a",l

,-Vt-?

""'

bE C*"il ln*,Sul"',

\m- / Cbas / N0ov - De-o z>t 6

cgg

(

Q.P. Code: 811502

(3 Hours) [Total Marks : 80

1. Questioo No I is ompulsory. s ;;2. Afteapt my three out of the rEorsiriry fiv* questiors

qw

Ql. (a) Wbat are block ciphem? Exptain with or*ruple the CBC and ECB modes of *.ap^,Zlblock ciphrs.

O) Encr:pt &e sring'This is an easy task'using a playfair cipher with key

^SA!'

ft)Tffi**-cation aad non-repudiarion and show with examples how Sh' 05

on€ caabe achierned. S,(d) Describe Eipte DES with two DE$ keys. Is man ia ttre middle afiac.k popp$le 05

on triple DfS? ' --4 \

:..*'e2. (a) A and B Secide to use Diffie Holknan algorithm to strare a key..Qhly_choose 10

prl.,-23 and g;=5 as the public paramet€rs. Ikeir se&T€t kevs are 6g}d 15

respectiveiy. Compute the secret key that they share. ' s

{b} Cornfare trES and IDEA. Bxplain the round key g€neret'(S scheme in both 10

thescalgorithms. .,f "

Q3. (a) What are the different ttrrpes ofviruse and worm4 frw do they propogate? 10

ql. Oi Whatae the vuious wriys fmmemory and add$s'protec-tion in Operating I0systems? How is autheatication achievd in O.jf

,aY)

a4. (e) Explain briefly wi& examples, how *re$I$wing attacks occrrr: i}Salami t0atact ii) Dsdal of Seruice arack iii)r$)sion hijacking attack iv) Cross-cite

scriptingattflgk .$'Q4. (b) How is seqnity a&ieved A Ae5&bort aod tunnel modes of IPSec? Describ€ 10

thc mle of AH and ESP. "X

Q5. (a)How is confidentislity rse in errails using +ither S/ldlME or PGP? 05

Q5. {b} A and B wish to use \$)o connntmicate seorely. A choose public key {e,n) 10

x (7,247\ and B chootses public key (en) as (5,22I). Caledate their private

keys. What wilpFthe ciphcr text sent by A to B if A wishe to send message

m=J sscru€U$o'B?oi."

Q5. (c) What isq[Ygital signature? Explain any digital signature algorithm. 05

\bQ6. (a) CoESae andcostrast (any aro):\ -- \-'

,b"= gro"k and strea; "iph*o lo

^:iii MD.5 versus SHA.' '-iii) KDC versrrs CA

q$t \f,,tat are fireiralls. Explain the different typm of fuewalls and mention the

a=- Ia-rer in *ticft thry operate 1$

\:-

gO Sam*ur CB &S - F\ov - 2a\ 6 co r"l P {L)\lrrll6

Sub:- DSP

(3 hours)

Q. P. Code t 622100

Total Marks: 80

i\I.B. tr " Question l\o, I is con:pulsory2. Attempt any three out o1'renraining3. Assur-ne suitable data if necessary and3ustrfy the assumptions4. Figr-rrr:s to the right rndicate full marks ..\

A Perfbrm convcrlutron operation between given function in time domarn if 05"€}tr

xr(n): (-3)' forn=A,1,2,3 -+0 otlierwise and +9

tAx:(n) : u(n) - u(n-4) -,.:,'

B Find whether the given signai is energy signai or not x(n) : u(n)-u(n-6gc)

C Steie the stability r-:ntcda of discrete time system and detennine the given IIR 05

v"vi

o.,,>.

Ql

system is stable or not y(n) : 5x(n) - 12.

D Find IDFTof X(k):{2, 1-j" 0, 1+j}.

A Consrder the follorving analog signai

x(t):2sin(100"JI*t)

v-F-

ur 05

10\-

,tsThe signal xitl is sampied with a samplrng rste Fs:50H2. Detennine the

:,.,ciiscrete timc signal. Plot the discrete timgtSignai..And also calculate total

number r:f sampies. \"B If xr(nJ : il, ,, -1. 6-} finci Xr(K) *d dj: if. o, :, 2) Find p(K) using Xr(K)

1sQ3 A Check u,hether foilowing systep$are .

i)Static or l)vnamrc *.*;;L,n.u, or Non-linear

iii)Shift inr,ariant o,,*.,uh? iv)Causal orNon-causal.l:

a) y(n) =. 2" u(n) ,-,1&) y(n):4x(n) *- x(n-2)

B For r(n): {S. if,}, 4,2,1}.piotthefollowingDrscrete'I.itnesignals: 10

,,+

10

10

l.) x{n;..CI) 2.) x(n)u(-n) 3.) x(n-1)u(-n-2)t ,"

4.Ix1.ri-1ru1,) -5.tr(lil-Il' ql"!.

A Srate,iih,v flve DFT properties.

B B,r.\w the radrr 2 DIT FFT and find the DFT of the sequence

,:r!'r(n) : 12,3,4. I. 0, 0, 0, {)} using FFT flow graph.

Q4 10

10

$

/1..1

.l,'- !:j

.\),,$

\']=s-

ITURN OVER]

Q. P. Code z 622700

2

Compute Linear Convolution of causal sequence x(n) : {5,6,2,4,l'4' 5'2'

and h(n):{ 2,1,3,1} using fast overlap add method'

For the FIR digital filter with impulse response given by

h(n): 6(n) + 2E(n-2) + 36(n-3) sketch the magnitude response of the filter'

Write a detailed note on TMS 320'

Write a detailed note on Carls' Correlation Coefficient Algorithm'

.>".s'l)

. (-l

\

v-

i03)

LLO

*-Qsa.

N-

B

Q6AB

l0\

\c

IP

,,-'10+

*'J'

a\

.s'

-c

A

;r,^t"

r\*\)

Y

.'\.'t

t"

s*\j\i-

'')a'

i1'l*

_\"

.5

."1 \