All Question Paper
All Question Paper
92
4
B
A1
DE
CB
Paper / Subject Code: 89281 / System Programming & Compiler Construction
8B
10
4A
C4
12
0
92
BB
DE
CB
DA
AA
10
28
C4
12
0
77
B4
DE
09
DA
A
0A
21
A
C4
E0
77
4
DA
A1
B
DA
D
0A
0C
(3 Hours) Total Marks: 80
4A
B6
C4
77
DA
1
E
EF
CB
DA
AA
4D
0A
N.B: (1) Question No. 1 is compulsory.
B6
B7
E0
77
AC
B4
DA
(2) Attempt any three questions out of the remaining five questions.
EF
8B
D
0A
0C
D
(3) Make suitable assumptions wherever necessary.
B6
C4
B7
92
77
DA
DE
=====================================================================
EF
DA
8B
10
0A
B6
C4
B7
2
92
77
DA
A1
What is three-address code? Generate three-address code for –
E
Q.1. A. 5
EF
A
8B
10
4D
0A
7D
4A
B6
B7
2
92
AC
DA
A1
A7
CB
EF
8B
10
7D
4A
B6
A0
B7
2
0
92
A1
DE
A7
CB
EF
8B
6D
10
4A
C4
A0
B7
2
0
92
FB
A1
DE
7
CB
DA
8B
D
10
0A
7E
B. Compare between Compiler and Interpreter. 5
4A
B6
C4
2
0
92
7
DA
BB
A1
DE
A7
CB
EF
DA
10
4A
Discuss with example ‘forward reference’.
B6
C4
D.
A0
B7
2
0
92
7
A1
DE
A7
CB
EF
DA
6D
8B
10
Q.2. A. Construct SLR parser for the following grammar and parse the input 10
4A
C4
A0
B7
2
0
2
FB
“( )( )”: S → (S)S | .
A1
DE
09
A7
CB
DA
6D
8B
7E
21
4A
B. State and explain with examples, different types of statements used in 10
C4
A0
92
FB
7
BB
A1
DE
A7
CB
assemblers with respect to system programming.
DA
6D
10
7E
28
4A
C4
A0
12
0
FB
7
BB
DE
09
A. Explain the concept of basic blocks and flow graph with example the 10
A7
CB
DA
AA
6D
Q.3.
7E
21
28
three-address code. C4
A0
0
FB
77
B4
BB
1
DE
09
10
AA
6D
0A
7E
0C
21
28
processor. C4
FB
77
B4
DA
BB
1
DE
09
DA
AA
0A
7E
0C
21
Q.4. A. Explain the phases of a compiler. Discuss the action taken in various 10
28
B6
C4
77
B4
DA
BB
A1
DE
09
DA
0A
0C
21
4A
28
B6
C4
77
DA
1
DE
09
CB
EF
A
AA
0A
21
7D
B6
C4
B7
E0
DA
1
A7
EF
A
AA
8B
10
4D
C
7D
Q.5. A. What is code optimization? Explain with example, the following code 10
B6
A0
B7
12
E0
92
AC
B4
A7
optimization techniques:
EF
AA
8B
10
4D
C
7D
A0
92
AC
4
A7
CB
AA
6D
8B
12
E0
92
FB
4
A7
CB
AA
6D
10
D
E
7D
12
E0
B
4
A7
EF
CB
AA
6D
D
7D
C4
A0
7
E0
S1AB|
B
B4
BB
A7
EF
A
6D
A1AC|0C
C
7D
28
C4
A0
B7
E0
B
B0S
09
A7
EF
A
8B
6D
4D
21
7D
C1
A0
7
92
FB
AC
BB
A7
B. Draw and explain the flowchart of Pass-I of two pass assembler with 10
6D
10
7D
28
A0
B7
suitable example.
12
FB
09
A7
AA
8B
6D
____________________
E
21
A0
B7
92
FB
B4
A1
8B
6D
10
7E
0C
4A
12
92
B
BB
CB
EF
AA
10
28
B7
12
E0
B4
09
AA
8B
4D
0C
21
27651 Page 1 of 1
92
AC
B4
A1
DE
10
0C
7D
4A
C4
12
DE
CB
DA
AA
C4
E0
DA0A77DAC4DE0CB4AA1210928BB7EFB6
77
B4
D8
C
98
9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security
24
C3
87
C5
B8
D8
18
98
9F
D5
24
20
C3
87
C5
B8
D8
9E
18
98
D5
4
34
C3
7
2
2
88
B8
8
98
3D
Duration: 3hrs [Max Marks: 80]
01
79
AB
24
3 4
E2
C
88
D8
8
8
53
B
9
49
01
9
B
4
N.B. : (1) Question No 1 is Compulsory.
C3
87
9F
2
3
2
A
8
98
9E
18
C5
98
3
(2) Attempt any three questions out of the remaining five.
3D
5
87
9F
D5
(3) All questions carry equal marks.
83
2
A
C
E
8
5
8
53
B8
B9
49
01
C
9
(4) Assume suitable data, if required and state it clearly.
87
9F
5
83
2
24
A
D
18
5
3
B8
9
D8
9
C
9
5
AB
20
87
F
5
3
4
C3
9
D
1 Attempt any FOUR [20]
98
9E
2
18
C5
53
8
D8
98
AB
20
F
a Explain the relationship between Security Services and Mechanisms in detail.
3
24
3
87
59
D
9E
C
53
8
9
8
b Explain ECB and CBC modes of block cipher.
18
C
8
AB
3D
34
F
9
5
4
20
9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.
98
2
C
8
3
B8
8
9E
49
18
5
98
AB
3D
d Explain challenge response-based authentication tokens.
9F
5
83
4
34
87
8D
82
E2
C5
53
Explain buffer overflow attack.
B9
e
8
B
D
B9
49
01
9F
79
5
24
3A
3
D
3
2
3A
8C
88
C5
B8
D8
8
F5
B9
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9
[10]
01
79
F5
D5
24
4
59
3
public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A
C
88
59
8
8
8
9E
5C
8
B
3D
9
01
5C
9
F5
AB
What is the cipher text for M=10 using the public key.
4
4
8D
82
3
E2
8C
88
59
8D
8
3
4B
3D
9
49
1
5C
9
5
AB
87
F
82
3
E2
8C
9
8D
8
82
18
5
3D
B9
9
5C
79
5
4B
3D
20
F
8C
88
9
8D
9E
82
8C
C5
53
[Link] of S-box
9
01
79
4B
AB
3D
34
F
79
D5
88
9
98
82
8C
88
C5
3
B8
01
F5
34
01
79
D5
E2
24
3A
59
8
2
8C
88
B9
8
9E
49
5C
F5
B
3D
01
79
3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4
3A
59
8D
2
83
8C
88
B9
8
9E
[10]
5
B
3D
B9
01
F
79
D5
4
4
3A
59
2
83
2
3A
C
88
B8
8
9E
F5
8
3D
9
9
F5
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB
24
4
20
87
59
83
8C
B8
18
5C
53
3D
9
9
AB
24
4
20
8D
83
8C
88
59
8
9E
53
4B
3D
9
1
5C
79
AB
20
F
82
83
5 a [10]
9E
53
B8
3D
9
01
5C
79
φ(11)
AB
34
a.
F
E2
8C
88
59
D
8
53
φ(49)
B8
01
5C
b.
79
AB
4
F
E2
4
88
59
D
φ(240)
8
82
53
c.
B8
B9
01
5C
D
4
F
83
E2
4
A
C3
3
B8
B9
49
5C
5
98
83
4
3A
C3
9
D
82
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8
B9
C
5
8
F
79
D5
4
handshake protocol.
3A
C3
59
82
8
8
18
5C
F5
8
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20
C3
59
D
2
AH and ESP.
8
8
D8
9E
18
5C
8
4B
79
____________________________
20
8D
2
8C
8
D8
E
18
4B
49
9
20
3
87
82
3
8C
98
18
3D
49
9
AB
28998 Page 1 of 1
20
87
3
8C
98
18
53
49
79
AB
20
83
88
E
53
B9
53AB98349E20188798C3D824B8D5C59F
49
01
7
FF
X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security
47
FF
X2
B4
37
7Y
B4
47
FF
X
X2
23
47
FF
7Y
B4
FF
FX
7Y
B4
3
47
X2
B4
23
47
7Y
4
47
X
B
7Y
F
23
47
FF
Duration: 3Hours [Max Marks : 80]
7Y
23
X
B
B4
23
47
FF
FX
7
Y
23
47
37
FX
B4
4F
X
7
7Y
X2
N.B : (1) Question No 1 is Compulsory.
4F
23
47
FF
7B
3
FF
(2) Attempt any three questions out of the remaining five.
FX
7B
2
4
Y4
X
7B
7
B4
Y4
(3) All questions carry equal marks.
4F
FF
37
2
Y4
47
X
7B
37
(4) Assume suitable data, if required and state it clearly.
X2
4
FF
B
7
7Y
4
X2
47
FF
7B
Y
X2
4
23
FF
B
37
7Y
B4
Y4
47
FF
FX
1 Attempt any FOUR [20]
X2
B4
23
47
37
7Y
B4
4F
47
FF
FX
X2
a Explain Euclidean Algorithm.
23
47
7B
37
7Y
B4
4F
FF
X
Y4
23
FF
FX
B
37
2
B4
7
FX
37
FX
7Y
2
4
Y4
47
FX
7B
X2
B4
4F
4F
37
7Y
2
Y4
47
FF
7B
FX
7B
X2
4
23
7B
37
7Y
B4
Y4
Y4
FF
FX
X2
B4
23
47
37
37
B4
4F
7
X
37
7Y
X2
X2
Y4
2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47
7B
X2
B4
4F
FF
FF
7Y
attacks on it. Consider the example where A and B decide to use the Diffie
X2
Y4
3
FF
7B
B4
X2
B4
Y4
23
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
FF
37
B4
Y4
47
47
FF
FX
7
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
X2
B4
3
47
37
7Y
7Y
X2
4
4F
FF
B
X2
23
23
47
7B
7
FF
FX
7
FX
7Y
Y4
23
47
FX
B
B4
3 a Explain cryptographic hash functions with properties of secure hash function. [10]
4F
4F
23
47
FX
37
7Y
F
47
7B
X
7B
X2
4
4F
23
FF
7B
37
7Y
Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4
FF
FX
7B
2
B4
Y4
23
37
X
B4
Y4
4F
FF
FX
7
X2
23
47
7B
37
Y
4F
b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF
[10]
X
7B
37
7Y
X2
Y4
FF
7B
Y4
23
FF
37
X
B4
Y4
47
5 a What are the different components of IDS? List and explain different approaches
FF
FX
[10]
37
X2
B4
47
37
7Y
X2
of IDS.
4F
47
FF
7Y
X2
23
FF
[10]
7Y
B4
23
FF
FX
B4
Y4
23
47
FX
4F
47
FX
37
7Y
4F
1. Packet Sniffing.
47
7B
Y
X2
4F
23
7B
37
7Y
2. ARP spoofing.
Y4
FF
FX
7B
Y4
[10]
37
B4
Y4
4F
FX
37
X2
47
B
37
2
4F
47
FF
FX
7Y
X2
7B
7Y
B4
_____________
4F
23
FF
Y4
23
47
FX
7B
B4
FX
37
7Y
4F
47
X2
4F
23
7B
7Y
FF
FX
7B
Y4
3
X2
B4
Y4
4F
37
55415 Page 1 of 1
47
FF
7B
37
2
FX
7Y
X2
B4
Y4
23
47
FF
37
FX
7Y
X2
B4
X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF
6
FD
47
A3
6A
4D
Paper / Subject Code: 89283 / Mobile Computing
5D
49
6A
DB
7F
AC
6A
4D
D4
A
9F
6A
DB
24
7F
C4
A5
AB
4D
D4
9F
A
B6
4
7F
C4
D2
A5
2
D
AB
4
F
4A
76
B6
Duration: 3hrs [Max Marks:80]
5D
9
C4
2
4A
B2
FD
D
6A
4
4A
76
9F
2A
D
9
DB
C4
5
4A
2
A3
6D
6A
AB
N.B. : (1) Question No 1 is Compulsory.
9F
A
F
6A
DB
24
9
C4
(2) Attempt any three questions out of the remaining five.
D2
A
A3
4D
B
F4
F
4A
6
(3) All questions carry equal marks.
A
6A
49
7
F
D2
4A
B2
47
AC
(4) Assume suitable data, if required and state it clearly.
4D
AA
9F
76
5D
A
F
24
9
4
D2
D6
A
47
A3
6A
AC
AB
F4
6
5D
F4
6A
DB
1 Attempt any FOUR [20]
A7
24
9
D2
47
A3
6A
4D
B
F4
9F
76
D
a Explain concept of frequency reuse with clustering. 5
2A
A
DB
39
C4
D6
4A
7
6A
6D
AB
D4
AA
9F
4A
9F
DB
A7
F
C4
A5
D2
2
6
47
A3
AB
4D
c What is spread spectrum? 5
F4
9F
4A
B6
76
D
6A
F
39
C4
D2
5
2
4A
FD
47
6A
d Describe use of Cellular IP. 5
AB
4D
AA
4A
6
9F
9
A7
7F
4
D2
A5
2
D6
D
e Explain in short voice over LTE. 5
A3
AC
AB
F4
D4
9F
6
F4
6A
A7
B
4
39
C4
D2
A5
2
FD
47
AB
AA
4D
F4
4A
6
B6
5D
9
A7
2 a Explain in short different algorithm used for authentication and privacy in GSM. [10]
39
7F
4
D2
D6
B2
FD
C
6A
AA
F4
D4
4A
6
F4
b What is the use of different interfaces used in global system for mobile [10]
9
A7
DB
39
C4
2
A5
D6
2
47
AB
AA
F4
9F
A
communication (GSM) with diagram?
76
5D
B6
F4
4
39
C4
D2
D6
B2
47
FD
6A
AA
4A
6
5D
F4
9F
A
DB
49
7
2
D6
B2
47
A3
6A
AC
D
3 a Explain hidden station and exposed station problem with solution in WLAN. [10]
F4
9F
76
D
F4
A
6A
DB
24
39
C4
A5
D2
A
47
AB
AA
4
9F
4A
B6
6
5D
9F
A7
7F
C4
D2
2
6
FD
A3
6A
AB
D
D4
F4
4A
76
4
49
A
DB
4 a Explain snooping TCP and mobile TCP with their merits and demerits. [10]
F
39
D2
5
B2
4A
47
C
6A
4D
AA
F
4A
2A
9F
49
7F
A5
B2
A3
C
6D
D
D4
F
4A
B6
2A
F4
49
6A
A7
A5
B2
47
C
6D
4D
4
9F
B6
9F
2A
5D
A7
7F
4
B2
A3
D
AC
6D
6A
D4
9F
2A
A7
B
24
39
A5
D
AC
6D
AB
AA
F4
9F
B6
A7
24
39
C4
D2
6
AB
AA
F4
4A
76
49
F
39
b Which components are new in GPRS as compared to GSM? What is there [10]
D2
6
4A
B2
47
AC
4D
AA
76
F
2A
purpose?
7F
24
39
6
4A
6D
4D
AB
D4
AA
A7
7F
39
A5
D2
D6
D4
AA
F4
B6
____________________________________
76
4
7F
39
A5
D6
4A
FD
D4
AA
B6
F
7F
39
5
6
D
6A
4D
D4
AA
9F
DB
7F
4
D6
AC
6A
D4
F
28390 Page 1 of 1
4
49
DB
4
7F
A5
B2
AC
D4
F
B6
49
24
5
D
AC
6A
AB
76D2AB24AC49FDB6A5D47F4D6AA39F4A
9F
3
23
8
48
Y5
X2
F4
Paper / Subject Code: 89283 / Mobile Computing
BX
EF
37
8B
5E
48
Y5
X2
2
F4
7Y
BX
EF
37
8B
5E
23
48
Y5
X2
F4
Y
BX
EF
7
7
B
E
3
3
48
8
5
5
Duration: 3hrs [Max Marks: 80]
X2
F4
7Y
Y
BX
EF
37
B
E
3
8
Y5
8
5
2
X2
4
F4
Y
Y
BX
N.B.: (1) Question No 1 is Compulsory.
EF
37
37
37
8B
5E
48
(2) Attempt any three questions out of the remaining five.
5
X2
X2
X2
Y
F4
7Y
EF
(3) All questions carry equal marks.
37
8B
8B
5E
23
8
5
X2
F4
4
Y
4
7Y
BX
EF
F
37
8B
5E
5E
3
Q1. Attempt any FOUR Questions 20
8
5
2
X2
F4
7Y
4
Y
4
Y
X
F
7
7
8B
B
5E
5E
5E
23
Explain the concept of frequency reuse with clustering.
23
3
a)
X2
4
Y
F4
7Y
BX
Y
X
b) Compare LTE and LTE advanced.
F
7
37
B
8B
5E
5E
3
3
What is Hidden and Exposed station problem?
48
c)
8
2
X2
4
Y
F4
7Y
BX
BX
What are the roles of EIR and HLR entities in a GSM network?
EF
EF
d)
7
8B
5E
3
3
Discuss about the mobile services and data services in GSM.
8
Y5
8
Y5
e)
X2
2
4
4
7Y
X
X
EF
EF
37
37
B
8B
8B
E
3
48
Y5
Y5
X2
Y5
X2
X2
4
F4
F
EF
37
37
8B
Q2 a) What do you mean by Self Organizing Networks. Explain the architecture of SON. 10
37
8B
B
E
5E
5
8
5
X2
X2
F4
F4
Y
4
Y
7Y
BX
Q2 b) What is a need of Micro Mobility? Explain Cellular IP in detail. 10
EF
37
37
B
5E
8B
5E
23
8
5
2
2
F4
7Y
4
7Y
F4
Y
BX
BX
F
7
B
5E
5E
5E
23
23
Q3 a) What are the different Handover mechanism in GSM? Explain each handover mechanism 10
23
8
48
48
4
Y
Y
BX
7Y
X
BX
F
EF
7
7
B
in brief.
5E
E
3
23
48
48
8
5
2
Y5
X2
7Y
4
Y
X
BX
EF
EF
EF
37
B
3
48
Y5
8
5
48
Y5
X2
X2
X2
F4
Y
EF
EF
37
37
7
B
8B
8B
E
3
48
Y5
Y5
X2
Y5
X2
X2
F4
F
7
7
8B
37
8B
B
E
5E
5E
3
3
Y5
48
X2
Q4 b) Explain snooping TCP and mobile TCP with their merits and demerits. 10
2
2
4
F4
7Y
7Y
BX
BX
EF
EF
7
B
E
3
23
8
8
5
8
Y5
2
X2
4
4
7Y
F4
BX
BX
EF
37
B
5E
Q5 a) What is spread spectrum? Why is it used? Explain any one of the spread spectrum 10
E
23
8
Y5
48
48
Y5
X2
F4
Y
BX
EF
EF
37
techniques.
7
7
8B
5E
23
23
48
5
X2
Y5
7Y
F4
Y
BX
BX
37
8B
37
E
5E
3
8
5
48
X2
X2
F4
Y
7Y
X
EF
37
8B
8B
8B
5E
23
Y5
X2
F4
Y
F4
BX
7
37
B
E
5E
5E
3
8
48
X2
X2
F4
7Y
7Y
EF
37
8B
E
23
8
5
Y5
X2
4
Y
F4
BX
EF
37
37
B
5E
48
5
48
X2
X2
7Y
7Y
EF
*********
EF
8B
8B
23
23
Y5
Y5
F4
F4
BX
BX
7
37
5E
5E
3
8
48
X2
X2
F4
7Y
EF
8B
8B
E
3
Y5
Y5
X2
F4
55392
F4
37
37
8B
5E
5E
X2
X2
F4
7Y
7Y
8B
8B
5E
23
23
F4
7Y
BX
BX
5E
23
X237Y5EF48BX237Y5EF48BX237Y5EF48BX237Y5EF48B
48
48
Te- if-lz=bL2-
Tt - C^"YY lre M-fr lg-l 3 f svl-zu
?t
Paper / Subject Code: 89284 I
Time: (3
NOTE: - Ql is compulsory
Solve any three from
L
Q2.a. prove who
read
not
3.
b. the
onto off and it IS
cargo plane I 2 and 2is
cargo be and I
a. A,T on the
15, 0, , h(F) = i0,
0. t10l
is the the
':*l!
:.r.
4
Page 1 of 2
:
:
i
22CD 8DE2E A9 2ED2C2EE63 48 58 4DD 1 40 6 i
i!
i
I
L
i
Paper / Subject Code: 89284 /
.*;.
a\".1
'=\
..:i":;
also tutor.
a. also
cost for
that is be
5 a
8 foot get The
J
[10]
[20]
a.
b.
L228L Page 2 of 2
AA
1
2
6F
C1
6C
25
Paper / Subject Code: 89284 / Artificial Intelligence
FD
31
D0
15
2F
6F
C1
6C
25
A
7E
FD
31
D0
15
2F
F7
6F
C1
C
5
7E
3C
02
F6
FD
15
F7
8E
Time: 3 Hours Marks: 80
1
6C
5
E
C
5D
C
2
7
3
1) Q.1 is compulsory
D0
15
2F
7
E
47
F
8
C1
6C
25
7E
C
D
AA
2) Attempt any three from remaining five questions
E3
D0
5
5
2F
F7
C1
47
31
25
7E
3C
D
A
F6
F
D0
5
A
7
D6
E
47
52
Q1) Solve any four of the following:
F
1
7E
3C
3
5D
F
02
6F
C1
7
8E
a) Describe different categories of AI [5]
ED
47
CF
D
1
15
25
3
D
F
A
b) Describe the characteristics of a medical diagnosis system using the PEAS properties [5]
77
F
E3
C1
6C
D0
75
1A
D6
CF
c) Explain Goal based Agent with a block diagram [5]
8
A4
15
2F
7E
3
5D
F
E3
d) Compare and contrast propositional logic and first order logic [5]
1
6C
25
F7
D6
C
7
1
D8
e) What do you mean by hill climbing. Explain. [5]
A4
D0
5
2F
3C
3
F
1
F
1
6C
75
25
1A
7E
D6
8E
5C
4
D0
C
F7
5D
F
AA
1
52
6F
E3
C1
C
7E
3C
Q2)
47
2
F6
D8
D0
15
a) Perform α - β pruning on the following graph, clearly indicating the
F7
F3
8E
1F
AA
2
75
5
7E
6
5D
[10]
5C
2
F6
FD
31
A4
0
F7
8E
ED
1
47
52
6F
C1
C
1A
3C
5D
AA
02
FD
7
15
F
F7
F3
8E
MAx
D
47
2
31
C1
6C
25
E
3C
D6
5D
AA
77
6F
D0
15
F
8E
1F
47
52
F
FD
31
6C
7E
C
C
5D
5C
AA
2
B
6F
3
C1
D0
2F
7
E
C1
47
MIN
F
FD
31
D8
15
25
7E
3C
AA
F6
6F
C1
6C
D0
5
7
8E
47
52
CF
FD
31
15
2F
7E
5D
AA
02
6F
D G I
C1
6C
25
F
F7
H
8E
ED
7
FD
31
4
0
15
2F
3C
MAX
5D
A
ED
77
6F
C1
6C
25
8E
47
CF
FD
77
31
0
15
2F
D
A
ED
CF
E3
C1
6C
8
5
9
25
8 3 9
A
6 4 2 4 7 4 2 4 1 7
D6
5 8 3
7
77
31
E3
D8
A4
D0
15
2F
1F
CF
6F
D8
6C
75
J
25
K
1A
7E
L M N O P Q R S T U V W X Y Z a
5C
D
E3
A4
D0
75
2F
7
F3
F
1
CF
D8
1
6C
25
1A
7E
6
5C
D
E3
D0
75
2F
7
F3
b) What do you understand by informed and uninformed search methods? Explain in detail
1F
1
CF
D8
6C
4
25
7E
D6
5C
AA
E3
D0
75
2F
1F
C1
CF
31
D8
4
25
7E
5C
AA
F6
6F
E3
D0
75
C1
2
CF
31
D8
4
25
7E
AA
F6
Q3)
F
E3
D0
75
7
D6
52
CF
D8
4
7E
F
AA
02
F
75
7
D6
ED
CF
31
AA
77
F
E3
c) Someone is earning
C1
6C
75
D6
CF
31
D8
AA
C1
E3
C1
31
D8
4
AA
C1
F
C1
iii) Prove that someone is smiling using resolution technique. Draw the resolution tree
75
5
D6
02
31
4
5
2F
AA
ED
C1
F
C1
25
b) What do you understand by forward chaining and backward chaining. Explain in detail
D6
6
31
D0
5
2F
F
C1
[10]
C1
25
7E
D6
6
D0
5
2F
7
F
C1
CF
C1
25
7E
26341 Page 1 of 3
6
E3
D0
5
2F
7
C1
CF
D8
25
7E
6
E3
D0
2F
F7
8
5
7E
3C
75D8E3CF77ED0252F6C15C1FD6F31AA4
5D
02
D8 ED 6C 6F 75
E3 02 15 31 D8
CF 5 C1
F
AA E3
5D 7 7E
2F
6 D6 4 75
CF
8 C1 F 77
E3 D0
25 5 31 D8 ED
CF
7 2F
C1
F
AA E3 0 25
7E 6 D6 4 75
CF 2F
D0 C1
5 F 31 D8 77
ED 6C
3C 25 15 Q.4
F7
C1
F
AA E3 0
G1
C
2F
B
A
4 25 C1
SB
SA
SD
CF
AB
6
AG1
7E D6 7 2F
Edge
75
26341
Node
C1 F 7E FD
D0 5 31 D8 6C 6F
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA
7E 6 D6
A
C1 F 75 7 7E
2F FD 47
4
3
7
5
9
3
6
9
5
D0 5 31 D8 6C 6F 5D
Cost
25 C1 AA E3 D0 15 31
2F F 25 8E
Heuristic
6 D6 4 75
CF
7 2F
C1
FD
AA 3C
02
C1
5 F 31 D8 7E 6C 6F 47
5D F7
5 C1 AA E3 D0 15 31 7E
F 8E
F
E
2F
D
4 25 C1 D0
CF
CS
BC
BA
6 CF AA
CG2
D6 7 3C
Edge
75 2F 25
Node
FD
B
C1
5 F 31 D8 7E 6C 6F 47
5D F7 S
2F
C1 AA E3 D0 15 31 7E 6C
F D6 4 CF 25 C1 AA 8E
3C
D0 15
F 75 7 7E
2F FD 47 25 C1
F
6
5
6
7
5
6
1
2
31 D8 6C 6F 5D F7 2F
path from S to any of the goal nodes.
Cost
E3 D0 31 7E 6C D6
AA 25 5C 8E F
Heuristic
4 CF 31 AA D0 15
75 7 2F AA 1F
47
3C 2 52 C1
F
G2
5 F 7E 6C D6 F7
D8
E3 F 31 D8 7 ED 6CD0 D 6F 1 47
25 5C A E 1 3 5D
1 3 0 5
FD
DS
DE
G3
G2
G1
1
DC
CF 2 A
F 2 C
FG3
EG3
C A 8E
Edge
5
Node
77
ED
F6 D 6F 4 7 F 77 2 1 F A 3C
5D F6
C
C1 47
02 5C 31 8E ED C 1
D6
F 5 D
F7
A 3 7E
Page 2 of 3
52 1F A 3C 02 5C 1A 8E D0
F6 D 6 47 F 52 1 F A 3 C
0
0
0
8
2
7
2
2
1
C1 5D 7 F6 47 25
2
Cost
F3 7E C D6
5 F7
D
5C 1A 8E F 3 D 7E
Heuristic
1F 3
D0 15 1A 8
A4 CF 25 C1 E3 D0
7 2 F A C
75D8E3CF77ED0252F6C15C1FD6F31AA4
D6 7
F3 5 D 7E F 6 D6 47 F 25
1A 8E C 1 F 5D 7 7
2F F
D0
2 5C 3 1 8 E D
6C
1
A4 3C
F7 52 1F A E 3C 02
75 F D A4 5
Paper / Subject Code: 89284 / Artificial Intelligence
D8 7E 6C 6F 75 F7 2F
E3 D0 15 3 1A D 8E
7E 6C
CF 25 C1 D0 15
77 2F FD A4 3C
F 2 5 C1
ED 6C 6 75D 7 2 F6 F
G3
F3 7E
E
02 15
C1 1AA 8E3 D0 C 15
52 25
F6 FD
6F 4 75
CF
7 2F
C1
FD
C1 D8 7E 6C
5C 31 D0 15 6F
AA E3
b) What is planning in AI? Discuss partial order planning and hierarchical planning in detail [10]
[10]
a) For the given graph, the table below indicates the path costs and the heuristic values. S is the
start node and G1, G2 and G3 are the goal nodes. Perform A* search to find the shortest distance
1F CF 25 C1
D6 47 77 2F FD
F3 5D ED 6C 6F
1A 8E 15 31
A4 3C 02
52 C 1 AA
75 F7 F6 FD
D8 7E C1 6F
E3
C
D0
25 5 C1 31
A
D8 ED 6C 6F 75
E3 02 15 31 D8
CF 5 C1
F
AA E3
5D 7 7E
2F
6 D6 4 75
CF
8 C1 F 77
E3 D0
25 5 31 D8 ED
CF
7 2F
C1
F
AA E3 0 25
7E 6 D6 4 75
CF 2F
D0 C1
5 F 31 D8 77
ED 6C
3C 25 15
F7 2F
C1
F
AA E3 0 25
Q 5)
7E 6 D6 4 75
CF
7 2F
C1
26341
C1 F 7E FD
D0 5 31 D8 6C 6F
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA
7E 6 D6 75 7 2F FD
D0 C1
5 F 31 D8 7E 6C 6F 47
5D
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA 8E
6 D6 75 7 2F FD 3C
02
C1
5 F 31 D8 7E 6C 6F 47
5D F7
a) Applications of AI
5 C1 AA E3 D0 15 31 7E
F 8E
b) Simulated annealing
2F 4 CF 25 C1 AA D0
6 D6 75 7 2F FD 3C 25 Q.6 Write short notes on :
C1
5 F 31 D8 7E 6C 6F 47
5D F7 2F
C1 AA E3 D0 15 31 7E 6C
F D6 4 CF 25 C1 AA 8E
3C
D0 15
F 75
D8 7 7E
2F
6C
FD 47 F7 25
2F
C1
F
31 D0 1 6F 5D 7E 6C D6
AA E3 5C 31 8E F
4 CF 25 AA D031 15
75 7 2F 1F
47
3C 2 AA
52 C1
D8 7E 6C
F
D6
5 7 F F7 D F
E3 D0 5C 1 31 D8 ED 6C 6F 47
5D
A E 1 3
a) Explain the concept of genetic programming
CF 25 1 3 0 5 1
77 2 F D A 4 C 2 5 C 1 A 8E
ED
F6
C1 6F 7 5D F 77 2 F6 F A 47
3C
02 5C 31 8E ED C 1
D6
F 5 D
F7
A 3 7E
Page 3 of 3
**************
52 1F A 3C 02 5C 1A 8E D0
F6 D 6 47 F 7
52 1 F A 3 C 25
C1 F3 5D 7E F6 D6 47 F7 2
5C 1A 8E C F 5 D
1F A4 3
D0
25
15
C1 3 1A 8
7E
D0
CF 2 A E3
7 F C
75D8E3CF77ED0252F6C15C1FD6F31AA4
D6 7
F3 5 D 7E F 6 D6 47 F 25
1A 8E C 1 F 5D 7 7
2F
D0
2 5C 3 1 8 E D
6C
1
A4 3C A E
components: initial state, actions, successor function, goal test, path cost.
F7 52 1F 3C 02
75 F D A4 5
Paper / Subject Code: 89284 / Artificial Intelligence
D8 7E 6C 6F 75 F7 2F
E3 D0 15 3 1A D 8E
7E 6C
CF 25 C1 D0 15
77 2F FD A4 3C
F 2 5 C1
ED 6C 6 F3 75D 7 2 F6 F
15 7E C
02
52 C1 1AA 8E3 D0 15
F6 FD 4 CF 25 C1
C1 6F 75
D8 7 7E
2F
6C
FD
5C 31 D0 15 6F
AA E3
[20]
[10]
[10]
b) What is formulation of a problem. Formulate the Wumpus world problem in terms of following
1F CF 25 C1
D6 47 77 2F FD
F3 5D ED 6C 6F
1A 8E 15 31
A4 3C 02
52 C 1 AA
75 F7 F6 FD
D8 7E C1 6F
E3
C
D0
25 5 C1 31
A
4
23
23
3D
3D
Y6
Paper / Subject Code: 89284 / Artificial Intelligence
FX
FX
4F
4F
37
3D
3D
Y6
Y6
X2
2
FX
4F
4F
37
37
DF
3D
Y6
Y6
X2
X2
3
4F
4F
7
7
DF
DF
(3 Hours) [Total Marks: 80]
3
Y6
6
X2
X2
F3
F3
7Y
7
DF
DF
64
Note: i) Question no. 1 is compulsory
4
3
3
6
X2
X2
7Y
F3
7Y
3
ii) Attempt any three from remaining
Y
4F
7
DF
DF
4
23
iii) Assume necessary data
23
23
6
6
Y
F3
7Y
FX
F3
FX
FX
37
64
64
23
3D
D
2
7Y
1 (a) Explain the Learning Agent with suitable block diagram.
F3
5
7Y
FX
F3
FX
4F
64
64
23
3
D
D
Y6
X2
3
7Y
(b) Give difference between Informed Search and Uninformed search
3
5
Y
FX
3
F
F
37
F
7
DF
4
64
64
3
3
Algorithms.
D
Y6
X2
X2
X2
3
F3
Y
4F
7
37
DF
37
DF
DF
(c) Give PEAS and state space description for “Automobile Driver Agent”
64
3
5
6
X2
X2
X2
F3
F3
7Y
F3
37
DF
DF
DF
64
64
64
3
(d) Explain different quantifiers with example. 5
X2
2
7Y
F3
7Y
F3
3
X
X
4F
37
F
DF
4
64
23
3
D
3D
Y6
Y6
2
X2
3
7Y
FX
FX
F3
F
4F
7
37
DF
4
3
64
3
3D
3D
(b) What is Game Playing Algorithm? Draw a game tree for Tic-Tac-Toe 10
6
6
2
X2
X2
7Y
7Y
FX
7Y
4F
problem.
4F
DF
DF
64
23
3
D
23
Y6
6
X2
3
Y
FX
F3
FX
F
4F
37
7
DF
64
64
3
23
3D
3D
6
X2
X2
example.
Y
F3
7Y
X
F
7
4F
37
DF
DF
4
64
3
23
D
6
X2
Y6
2
(b) Explain Hill Climbing Algorithm and problems that occurs in hill climbing 10
F3
F3
7Y
F3
X
FX
37
F
37
DF
64
64
64
23
D
algorithm? 3D
2
X2
7Y
F3
7Y
7Y
X
FX
F
4F
DF
DF
4
4
23
4 (a) What do you mean by Resolution? Also discuss the steps in Resolution. 10
3
3
3D
6
Y6
Y6
X2
X2
Y
3
FX
F3
F
4F
7
37
F
DF
64
3
64
3
3D
3D
Y6
2
X2
X2
Y
(b) Consider problem of changing a flat tire. The goal is to have a good spare 10
FX
F3
7Y
4F
4F
7
37
DF
DF
tire properly mounted on to the car’s axle, where the initial state has a flat
64
3
3D
23
Y6
2
X2
3
Y
FX
F3
FX
F
tire on the axle and a good spare tire in the trunk. Give the ADL
4F
37
37
F
64
64
3D
3D
Y6
X2
F3
7Y
X
4F
4F
37
DF
F
64
3
3
3D
6
X2
Y6
2
X2
F3
7Y
X
F
DF
37
F
DF
64
64
23
23
D
X2
(b) Define Belief Network. Describe the steps of constructing belief network 10
7Y
Y
X
3
FX
F
4F
7
DF
DF
with an example.
64
23
3
3D
Y6
X2
F3
Y
X
F3
F
7
37
F
DF
4
64
3
D
Y6
Y6
X2
X2
F3
F3
7Y
37
37
DF
DF
64
23
X2
7Y
F3
F3
FX
37
DF
4
3D
Y6
6
X2
X2
F3
7Y
4F
37
DF
10
3
3D
Y6
X2
X2
F3
7Y
37
DF
DF
64
64
3
____________________
X2
X2
F3
3
4F
37
DF
DF
4
Y6
Y6
X2
F3
F3
37
37
DF
64
64
X2
54516 Page 1 of 1
X2
7Y
F3
7Y
DF
DF
64
23
23
7Y
F3
FX
FX
64
23
X237Y64F3DFX237Y64F3DFX237Y64F3DFX237Y64F3DF
3D
3D
j3
TE (ro,'no I Sarn V t R. -t q
Srt
(3 80I
Instructions:
e C) I 23at
1) Attempt any Four question.
2) Ali question carries equal
3) Figures to the right indicate
4) Illustrate your answers
5) Assume suitable if it. .'i*.r
Q.l A) Discuss in
parts
Q.1 B) Explain
L
Q.2 A) IOT with (1
A)
in IoT
Marks)
Q.3
A)
(10 Marks)
Differentiate between
neat any of sensors and actuators with
of (10 Marks)
ii) Benefits
Page 1 of I
0
4
17
9
15
8C
Paper / Subject Code: 89285 / Internet of Things (DLOC)
B7
A7
EA
51
4F
49
0D
7E
7
79
15
8C
A1
6A
9B
DA
51
4F
E
39
C4
7E
79
0
15
07
B
8
A
51
6
Time: 3 hours Max. Marks: 80
F
38
9
0D
39
C4
7E
15
00
========================================================================
07
F8
A
51
17
96
Instructions:
9
D
54
3
C4
E
EA
A0
00
1) Solve any FOUR questions.
A7
7
11
8
80
17
79
96
4F
2) All question carries equal marks.
E5
D
03
A
9B
A0
15
3) Figures to the right indicate full marks.
7
7
E
70
DA
80
C4
51
9
6
4) Assume suitable additional data, if necessary and clearly state it.
1
7
39
3
E
EA
9B
F8
A0
0
7
7
1
70
54
A
80
4
51
9
96
C
0D
B7
11
03
E
EA
F8
73
Q. 1 a) Discuss IOTWF Standardized Architecture. (5 M)
7
49
6A
E5
70
54
DA
80
79
b) Explain Raspberry Pi with diagram. (5 M)
1
A7
39
11
03
EA
9B
8
0
F
07
c) Describe Zigbee protocol stack using IEEE 802.15.4. (10 M)
6A
E5
0D
70
4
9
15
38
8C
1
7
7
39
6A
EA
9B
DA
0
51
00
F
6A
39
54
80
4
7E
17
79
A0
8C
07
39
1
03
EA
b) Briefly explain Adapting SCADA for IP. (5 M)
9B
A
1
96
4F
38
07
E5
D
70
4
c) What do you mean by SoC? Also explain its applications. (10 M)
79
3
15
00
38
8C
A1
7
07
9B
DA
1
17
00
96
F
8
9E
E5
4
03
4
EA
17
3
A0
15
Q.3 a) Describe various health & lifestyle domain specific IOT. (5 M)
8C
B7
7
7
70
EA
DA
0
1
79
4F
8
49
E5
A1
39
03
9B
79
0
15
8C
A7
07
6A
70
9B
C4
51
4F
38
A1
0D
B7
C4
7E
F8
15
00
7
49
A
Q.4 a) Write short notes on BLE. (5 M)
F8
54
DA
80
51
17
9
96
8C
B7
11
54
03
7E
A
A0 (5 M)
4F
07
49
E
E5
11
0
DA
17
79
96
c) What is IoT? Explain IoT blocks in detail. List out the different IOT Challenges. (10 M)
15
8
8C
E5
A7
3
A
9B
73
A0
51
00
4F
A7
9E
0D
80
C4
7E
17
96
15
0D
B7
6A
3
EA
8
DA
73
51
00
F
49
54
80
7E
17
79
A0
8C
07
39
11
03
(10 M)
DA
96
4F
38
07
E
E5
70
4
9
73
A0
15
00
38
C
A1
B7
A7
F8
80
51
00
49
9E
D
54
03
17
73
A0
B7
A7
11
70
EA
80
96
4F
c) What are IOT software platform? Explain in short with an example. (10 M)
9
E5
A1
0D
03
C4
79
73
5
A7
9E
6A
11
70
9B
8
80
F
5
1
0D
B7
39
***********
54
03
C4
E
EA
A7
07
6A
11
70
F8
79
38
E5
A1
0D
9
54
9B
73
00
A7
9E
6A
11
80
C4
17
E5
0D
B7
39
03
EA
F8
A7
07
49
A
70
54
79
96
38
8C
A1
0D
9B
73
00
4F
9E
6A
80
C4
7
15
1
B7
39
03
EA
F8
51
07
49
70
54
7E
79
38
8C
A1
11
9B
DA
00
4F
9E
E5
C4
17
15
B7
A7
EA
F8
51
9
0D
54
C4
7E
79
6A
11
9B
F8
DA
E5
39
54
C4
27003
A0
A7
07
11
F8
96
E5
0D
54
73
A7
3807396A0DA7E51154F8C49B79EA1700
6A
11
80
Y
4X
7Y
4X
57
37
Paper / Subject Code: 89285 / Internet of Things (DLOC)
2F
23
Y3
2F
X2
57
7Y
4X
57
37
F4
Y3
23
Y3
2F
X2
72
37
4X
57
37
35
4
2F
X2
Y3
2F
X2
Y
7
7
F4
7
37
5
F4
3
5
Y3
2
72
Y3
X2
4X
2
57
37
35
57
37
F4
F
3
2
7Y
Y3
X2
7Y
4X
72
Time: 3 Hours Max. Marks: 80
5 7
23
37
35
F4
23
Y3
2F
4X
X2
7Y
4X
72
7
7
5
3
Instructions:
2F
35
F4
23
3
F
2
Y
4X
72
1) Attempt any Four question out of six questions.
57
7Y
4X
72
37
5
Y3
F
2) All question carries equal marks.
4
3
3
2F
2
2
Y3
2F
X2
Y
4X
7
37
3) Illustrate your answers with neat sketches wherever necessary.
57
7
35
57
37
4
23
2F
X2
Y3
2F
Y
Y3
X2
4X
7
7
F4
57
37
5
3
37
F4
Y3
2F
2
72
3
X2
6) All sub-questions of the same question should be grouped together.
4X
X2
Y
2
57
37
35
57
37
F4
F
F4
Y3
X2
7Y
3
3
2
2
7
X2
7Y
4X
72
7
37
5
Q.1 (a) What is IoT? Compare with suitable criterion between Operational
23
10
5
Y3
2F
35
F4
3
Y3
F
X2
4X
2
72
7
7
7Y
4X
72
37
5
F4
3
2F
(b) With suitable examples, explain the types of sensors used in IoT systems. 10
35
3
2
35
23
2F
2
Y
4X
72
57
7Y
X
37
7Y
4X
7
35
F4
Y3
Q.2 (a) Explain the Smart Things: architectural classification considering Layer 1
5
10
23
2
2
23
Y3
2F
7Y
4X
72
7
37
X
Things-Sensors and Actuators Layer.
35
4X
57
37
35
4
23
2F
X2
(b) Give the Categories of IoT application protocols and their transport 10
F
7Y
Y3
2F
X2
7Y
4X
72
7
F4
57
37
5
F4
23
Y3
2F
2
72
Y3
Y3
X2
X
2
57
7
35
57
7
4
23
F
37
F4
3
Y3
2F
7Y
Y3
X2
X
X2
72
57
37
5
4
23
7
F4
(b) Compare with suitable factors Microsoft Azure IoT and Google Cloud IoT 10
Y3
2F
35
F4
3
Y3
X2
4X
X2
2
7Y
72
57
37
5
F4
3
2F
F4
Y3
2
35
23
3
2
4X
72
57
Y
X
72
37
7Y
Q.4 (a) Give the function of each layer of a seven-layer IoT architectural reference 10
4X
7
35
F4
Y3
5
3
2
23
3
2F
2
Y
4X
72
7
7Y
4X
7
5
4X
5
23
F
7Y
72
2F
7Y
X
72
7Y
4X
5
4
23
57
23
Y3
2F
X2
4X
72
Y3
4X
7
7
35
4
23
2F
37
5
(b) Give the key components of a SCADA system. Describe CoAP message 10
3
2F
Y3
2F
X2
Y
X
X2
fields.
7
37
F4
57
37
5
F4
F4
Y3
X2
72
Y3
X2
2
72
57
F4
37
F4
3
Y3
35
3
X2
(b) Compare with suitable factors Particle Photon with ESP32 used for IoT 10
72
X2
7Y
72
37
7Y
35
application development.
F4
F4
3
X2
23
3
X2
Y
7Y
72
7
7
4X
35
F4
23
35
23
2F
7Y
4X
72
7Y
4X
57
5
23
F
23
3
2F
72
Y3
7Y
4X
4X
57
_________________________________
35
37
23
2F
2F
7Y
X2
7Y
4X
7
57
5
F4
23
Y3
2F
3
7Y
4X
72
55011
57
37
35
23
Y3
2F
2
4X
7Y
4X
57
37
2F
23
Y3
2F
X2
57
4X
57
37
F4
Y3
2F
X2
72
57
X237Y3572F4X237Y3572F4X237Y3572F4X237Y3572F4
37
35
F4