M.Sc. - Comp. Sci
M.Sc. - Comp. Sci
M.Sc. - Comp. Sci
of Questions : 5 ]
P594
SEAT No. :
[Total No. of Pages : 3
[4339] - 102
M.Sc. (Semester - I)
Time :3 Hours]
COMPUTER SCIENCE
CS - 102 : Advanced Networking
(2011 Pattern)
2)
3)
[8 2 = 16]
a)
b)
List any two advantages & disadvantages of ECB & CBC mode.
c)
Why does RTP needs the service of another protocol, RTCP, but TCP
does not ?
d)
e)
f)
A routing table has 25 entries. It does not receive information about five
routers for 200 sec. How many timers are running at this time ?
g)
h)
[4 4 = 16]
b)
c)
In the fig. Show which router (s) sends out router link & network link
LSAs ?
d)
Apply play fair cipher on plain text University of Pune & use keyword
as "Systems".
e)
[4 4 = 16]
a)
b)
c)
Do you think H.323 is actually the same as SIP ? What are the differences?
Make a comparison between the two.
d)
e)
[4 4 = 16]
a)
b)
c)
d)
Given two prime numbers P=17 & Q= 29, find out N,E & D in an RSA
encryption process.
e)
Explain how distance vector routing algorithm is used for creating the
routing table for routers in AS.
[4339] - 102
[4 4 = 16]
a)
b)
c)
d)
e)
nnn
[4339] - 102
SEAT No. :
P595
[4339] - 103
M.Sc. COMPUTER SCIENCE
CS - 103: Distributed Database Concepts
(New 2011 Pattern) (Semester - I)
Time :3 Hours]
[8 2 = 16]
a)
b)
c)
d)
e)
f)
i)
ii)
An irreducible query
ii)
A monorelation query.
g)
State what do you mean by a join selectivty factor between two nelation
R&S?
h)
i)
P.T.O.
[8 2 = 16]
a)
We can set only one of the two time values with the utime function.
b)
c)
d)
e)
f)
It is very important that any signal handler has to be very careful about
the action it performs and the data it touches.
g)
h)
Create Thread notifies the windows subsystem about the new theread.
i)
j)
[16]
a)
b)
[4336]- 202
what happens to the three descriptor entries and the corresponding file table
entry with each call to dup2. Then assume that fd is 3 & draw the same
picture.
c)
d)
e)
[2 8 = 16]
a)
#include,fcntl.h>
main(argc,argv)
int argc;
char*argv[];
{
int fd, skval;
Char c;
if(argc!=2)
Exit( );
fd = open(argv[1],O_RDONLY);
if(fd= =-1)
exit( );
while(skval= read(fd,&c,1)
{
print("char%\n",c);
[4336]- 202
P.T.O.
skval=lseek(fd,1023l,1);
Printf("new seek val %d\n",skval);
}
}
b)
#include <unisted.h>
#include <stdio.h>
#include <sys/types.h>
#include <sys/wait.h>
d)
[4336]- 202
P.T.O.
char * cp1,*p2;
int fds[2];
cp1 = string;
cp2 = buf;
while(*cp1)
*cp2++ = *cp1++;
pipe(fds);
for(;;)
{
Write(fds[1[,buf,6);
read(fds[0],buf,6);
}
}
f)
#include<signal.h>
main( )
{
register int i;
setpgrp( );
for(1 =0;i<10;i++)
{
if(i&1)
setpgrp ( );
[4336]- 202
#include<signal.h>
main ( )
{
into i. *ip;
extern f( ), sigcatch( ) ;
ip = (int *)f;
for(i=0;i<20;i++)
signal(i,sigcatch);
*ip = 1;
printf("after assign to ip\n");
f( );
}
f( ) { }
sigcatch(n)
int n;
{
printf("causght sig % d\nnn, n);
exit(1);
}
[ 4 4 = 16]
b)
Write a C Program that creates two files, one with a umask of 0 and one
with umask that disables all the group and other permission bits.
[4336]- 202
7
c) Write a C Program to demonstarte Race condition in catching Signals.
d)
P596
SEAT No. :
[Total No. of Pages : 4
[4339] - 104
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 104 : Design and Analysis of Algorithms
(2011 Pattern)
Time :3 Hours]
2)
3)
4)
5)
[ 8 2 = 16]
a)
b)
What operations does heap data structure support and what is the growth
rate of these operations ?
c)
d)
e)
f)
g)
h)
i)
j)
[4 4 = 16]
b)
c)
d)
e)
Show that Breadth First Traversal ( BFT) can be used to obtain the reflexive
transitive closure matrix of an undirected graph.
[4339] - 104
b)
[4 4 = 16]
Find out all possible solutions for the following graph coloring problem
with m=3. Also show that only 12 solutions exist with exactly 3 colors.
1
Draw the portion of state space tree generated by Least Cost Branch Bound
( LCBB) method for the following 0/1 knapsack problem instance
where
w = ( 2, 4, 6, 9)
p = ( 10, 10, 12, 18)
m = 15
c)
d)
e)
b)
Write control abstraction for divide and conquer strategy. Let x,y be two
n-bit numbers. The straight way of multiplying x and y takes O(n2) bit
operations. Show that multiplying x and y n- bit numbers required O( n log3 )
bit operations using divide and conquer method.
[4339] - 104
c)
Discuss the features of dynamic programming. Find all pair shortest path
for the following graph using dynamic programming.
[2 8 = 16]
a)
b)
Why Least Cost Branch Bound (LCBB) is preferred over FIFO & LIFO
branch and bound methods. Consider the following travelling salesman
problem instance defined by cost matrix.
f 7 3 12 8
3 f 6 14 9
5 8 f 6 18
9 3 5 f 11
18 14 9 8 f
Obtain the reduced cost matrix. Which node will be selected next in LCBB
formulation of problem.
c)
nnn
[4339] - 104
P585
SEAT No. :
[Total No. of Pages : 3
[4339] - 13
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 103 : Distributed Database Concepts
(2008 Pattern)
Time :3 Hours]
2)
3)
4)
b)
c)
Define DDBMS.
d)
e)
f)
g)
h)
[8 2 = 16]
[4 5 = 20]
a)
b)
c)
Write short Note on semi - join strategy for query processing in DDBMS.
P.T.O.
d)
e)
[4 6 = 24]
Let Size (emp) = 100 , Size (ASG) = 200 , Size (Proj) = 300 Size
( emp
ASG) = 300 , Size (ASG PROJ) = 200.
Assume that query needs to access all relation write all possible ways
in which query can be executed along with minimum data transfer.
b)
c)
d)
Apply the algorithm INGRES to the following query and illustrate the
detachments and substitutions by monorelation.
Select ename , pname
from emp , asg , Proj
Where dur > 12
and emp. eno = asg. eno
e)
A1 A 2 A 3
S1
q1 1 1 0
q 2 1 0 1
q 3 1 0 0
S2
q1 2 30
q 2 28 0
q 3 33 35
[4 5 = 20]
a)
b)
c)
d)
e)
nnn
[4339] - 13
SEAT No. :
P598
[4339] - 202
M.Sc. (Semester - II)
COMPUTER SCIENCE
4)
[8 2 = 16]
a)
b)
c)
d)
e)
Why are the logout records written by the init process? Is this handled in
the same way as network login?
f)
g)
What happens if a blocked signal is generated more than once before the
process unblocks the signal?
h)
[8 2 = 16]
a)
We can set only one of the two time values with the utime function.
b)
c)
d)
e)
f)
It is very important that any signal handler has to be very careful about
the actions it performs and the data it touches.
g)
h)
Create Thread notifies the Windows subsystem about the new thread.
i)
j)
[4 4 = 16]
a)
b)
c)
d)
e)
[4339]- 202
[4339]- 202
[4 4 = 16]
b)
#include <unistd.h>
#include <stdio.h>
#include <sys/types.h>
#include <sys/wait.h>
int main (void)
{
int status;
pid_t pid;
if (!fork( ))
return 1;
pid = wait (&status);
if (pid = = -1)
perror (''wait'');
printf ("pid=%d\n",pid);
if (WIFEXITED(status))
printf ("Normal termination with exit status=%d\n", WEXITSTATUS(status));
if (WIFSIGNALED (status))
printf ("Killed by signal = %d%s \ n",WTERMSIG(status),
WCOREDUMP (status) ?" (dumped core)" : );
if (WIFSTOPPED (status))
printf("Stopped by signal=%d\n",WSTOPSIG (status));
if (WIFCONTINUED (status))
printf ("Continued\n");
return 0;
}
[4339]- 202
c)
d)
[4339]- 202
pipe(fds);
for(;;)
{
write(fds[1],buf,6);
read(fds[0],buf,6);
}
}
f)
#include<signal.h>
main()
{
register int i;
setpgrp();
for(i =0;i<10;i++)
{
if (fork ( ) = = 0)
{
if(i&1)
setpgrp ();
printf("pid=%d pgrp = %d\n"), getpid(),
getpgrp ());
pause();
}
}
kill(0,SIGINT);
}
[4339]- 202
e)
#include<signal.h>
main ()
{
int l,*ip;
extern f(), sigcatch() ;
ip = (int *)f;
for(i=0;i<20;i++)
signal(l,sigcatch);
*ip = 1;
printf("after assign to ip\n");
f();
}
f() { }
sigcatch(n)
int n;
{
printf("caught sig % d\n ,n);
exit(1);
}
[ 4 4 = 16]
a)
b)
Write a C Program that creates two files, one with a umask of 0 and one
with umask that disables all the group and other permission bits.
c)
d)
e)
Write a C Program for a signal function that tries to prevent any interrupted
system calls from being restarted.
f)
Write a C Program to illustrate use of pipe, dup & fork system call.
[4339]- 202
+++++++
7
P599
SEAT No. :
[Total No. of Pages : 3
[4339] - 203
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 203 : Data Mining and Data Warehousing
(2011 Pattern)
Time :3 Hours]
b)
c)
d)
e)
f)
What is clustering ?
g)
h)
i)
j)
b)
c)
d)
e)
[ 8 2 = 16]
[ 4 4 = 16]
P.T.O.
[ 2 8 = 16]
b)
The following table consists of training tuples from the all electronics
customer database . The data have been generalized and in given below:
RID
age
income
Student
Credit
Class:
rating
buysComputer
youth
high
no
fair
no
"
"
"
excellent
"
middle-age
"
"
fair
yes
senior
medium
"
"
"
"
low
yes
"
"
"
"
"
excellent
no
middle -aged
"
"
"
yes
youth
medium
no
fair
no
"
low
yes
fair
yes
10
senior
medium
"
fair
"
11
youth
"
"
excellent
"
12
middle-eaged "
no
"
"
13
"
high
yes
fair
"
14
senior
medium
no
excellent
no
i)
[4339] - 203
ii)
Compute information gain of the attribute age, to find the splitting criterion
for the tuples. (The class label attribute buys. Computer has two distinct
values. Let class C1 corresponds to no. of yes and C2 corresponds to no.
of no).
c)
[ 4 4 =16]
a)
b)
c)
d)
How is a data warehouse different from a database ? How are they similar?
e)
b)
c)
d)
Bootstrap
ii)
F - measure
[ 4 4 = 16]
iii) Precision
iv) Cross- validation
e)
nnn
[4339] - 203
SEAT No. :
P588
[4339] - 22
M.Sc. (Semester - II)
COMPUTER SCIENCE
CS - 202 : Unix Internals
(2008 Pattern)
Time :3 Hours]
3)
4)
5)
[8 2 = 16]
a)
b)
When the kernel releases an inode, what happens if reference count drops
to zero?
c)
Give the syntax of mount system call. When does unmount call fail?
d)
e)
f)
g)
h)
P.T.O.
Q2) State whether the following statements are true or false. Justify your answer
(any four):
[4 4 = 16]
a)
The kernel can lock and unlock an allocated inode independent of the
value of the reference count.
b)
c)
The contents of inode will change only when file contents are modified.
d)
In the link system call, the kernel must release the source file's inode after
incrementing its link count.
e)
The kernel invokes growreg algorithm to increase the size of shared region
that is already attached to several processes.
[4 4 = 16]
a)
Why does kernel lock the file during the system call read? What would
happen if it does not lock it?
b)
c)
no zombie child
one zombie child
iii)
d)
In sleep algorithm, why does kernel raises processor execution level to block
all interrupts? How it handles cases of interruptible and not interruptible sleep?
e)
[4 4 = 16]
Write a program to accept a file name from user using command line argument
and create a file write the string UNIX at every 800th byte 10 times. Close the
file Reopen the file in readmode and print the string stored at every 800th
byte. Use lseek system call.
[4339]- 22
b)
Write and explain program in C, that checks the access time of a file every
minute and prints a message if the file had been accessed.
c)
d)
[4339]- 22
e)
[ 4 4 = 16]
a)
b)
c)
List the sequence of operations taken by kernel for handling the interrupt.
What do you mean by interrupt vector?
d)
e)
[4339]- 22
P602
SEAT No. :
[Total No. of Pages : 4
[4339] - 303
M.Sc. (Semester - III)
COMPUTER SCIENCE
CS - 303 : Soft Computing
(2011 Pattern)
Time :3 Hours]
2)
3)
4)
5)
[8 2 = 16]
a)
b)
1 2 3
4
0
A =
1
2
3
4
0
B =
c)
d)
State the equation for a piecewise linear threash old signal function.
e)
f)
g)
h)
[4 4 = 16]
a)
b)
c)
d)
e)
[4 4 = 16]
1 .75 .3 .15 0
D1 =
.6
.2
.1
0
1
D2 =
b)
Find i) D2 | D1
ii) D 1 D 2
For the following fuzzy relation R find the l - cut relation for l .7 and l .3.
x1 x2 x3 x4
x1 1 .8 .4 .2
x .8 1 .3 .1
R= 2
x3 .4 .3 1 .2
x4 .2 .1 .2 1
c)
Given the following fuzzy numbers I & J, using Zadeh's extension principle
calculate fuzzy number " Approximately 24''. Is the resulting set convex?
.6
3
1
4
.5
5
I = approximately 4
.2 .4 1 .6 .3
J = approximately 6
4
d)
Determine the preposition " IF K THEN V "for the fuzzy sets given below.
K
0 .2 1 1
q t r c
0 .3 .8 1
n s g e
[4339] - 303
e)
Bright = B
.5
.8
1 .85 .5
Dark = D
ii)
[2 8 = 16]
a)
b)
Define linear separability and show that the 2D boolean function XOR is
linearly non - separable.
c)
Let X = { x1 , x2, x3} Y = { y1 ,y2, y3} and Z = {z1, z2,z3} be the universe of
discourse on which the following fuzzy sets be defined respectively.
A
x
x
x3
1
2
0.4 1
0
y1 y2 y3
0.3 1.0 .2
z2 z3
z1
Find
i)
Au B R
ii)
S B uC
[4339] - 303
U R xS
[2 8 =16]
a)
b)
Let A
B
.3 1 .8 0
1 2 3 4
0 .5 1 .7
1 2 3 4
if x is in A then y is in B
ii)
if x is in A then y is in B
else y is in C
c)
nnn
[4339] - 303
P593
SEAT No. :
[Total No. of Pages : 3
[4339]-101
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 101 : Principles of Programming Languages
(2011 Pattern)
Time : 3 Hours]
Instructions to the candidates:
1) Neat diagrams must be drawn wherever necessary.
2) Figures to the right indicate full marks.
3) All questions carry equal marks.
4) Assume suitable data, if necessary.
5) All questions are compulsory.
[Max. Marks : 80
C
D
[4 4 = 16]
ii)
List employees earning salary more than 10,000. (Use cut and fail)
e) All cats like to eat all types of fish. All calico are cats. All tuna are fish.
Charlie is tuna. Herby is tuna puss is calico. Write a prolog program to
answer the question, what does puss like to eat? Show how it will be
answered by your program.
tttt
[4339]-101
P583
SEAT No. :
[Total No. of Pages : 3
[4339] - 11
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 101 : Principles of Programming Language
(2008 Pattern)
Time : 3 Hours]
[Max. Marks : 80
[8 2 = 16]
a)
b)
c)
d)
e)
f)
g)
[4 4 = 16]
P.T.O.
[4 4 = 16]
[4 4 = 16]
[4 4 = 16]
a) Define a LISP function to find the smallest element from the list.
b) Define a LISP function to find a power. Power (m, n) = m raised to the
power of n.
[4339]-11
xxxx
[4339]-11
P584
SEAT No. :
[Total No. of Pages : 2
[4339] - 12
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 102 : Object Oriented Software Engineering
(2008 Pattern)
Time : 3 Hours]
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
[4 8 = 32]
a) Draw a use case diagram and class diagram for an interactive diagram
editor. A sheet is a collection of links and boxes. A link is a sequence of
line segments that connects two boxes. Each line segment is specified
by two points. A point may be shared by a vertical and horizontal line
segment in the same link. A selection is a collection of links and boxes.
P.T.O.
b)
c)
d)
e)
A buffer is a collection of links and boxes that have been cut or copied
from the sheet.
Prepare an object diagram showing at least six relationships among the
following object classes. Include association, aggregation and
generalization. Show multiplicity and add atleast one attribute to each,
class, card, deck, hand, collection of cards, discard file, draw file.
Draw state diagram and sequence diagram for considering different
scenarios for ATM machines.
Draw activity diagram for considering different scenarios for icecream
preparation machine where you can get different flavours.
A system for distributing electronic mail over network is needed. Each
user of the system should be able to send mail from any computer. All
the received mails are stored at a central server. The user can receive
mail at any computer. One or two machines with larger data spaces also
allows saving messages in files. There should be provisions for forwarding
mails and sending mail to several users at once using address list. Draw
component and deployment diagram.
[4 4 = 16]
xxxx
[4339]-12
SEAT No. :
P586
[4339] - 14
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS 11 - 104 : Design And Analysis Of Algorithms
(2008 Pattern)
Time : 3 Hours]
[Max. Marks : 80
2)
3)
4)
[8 2 = 16]
a)
b)
Define NP-hard class & give an example of decision problem that is NPhard
c)
d)
e)
f)
g)
h)
P.T.O.
[4 5 = 20]
a)
Write insertion sort algorithm and derive its best case and worst case
running time.
b)
c)
d)
e)
Using Bellman ford algorithm find length of shortest path from source z
to all other vertices.
[4 5 = 20]
a)
b)
4 3
A=
5 6
c)
3 2
B=
4 2
What is best way to multiply a chain of matrices with dimensions that are
13 5 , 5 89, 89 3, 3 34. respectively.
[4339] - 14
d)
Find all possible solution when the following graph is coloured using
exactly 3 colours
e)
[4 6 = 24]
a)
Find out the maximum flow from the network where S is source and T is
sink.
b)
Give BFS and DFS for the following graph. Show all steps (Start at
vertex A)
c)
7 3 12 8
3 6 14 9
5 8 6 18
9 3 5 11
18 14 9 8
[4339] - 14
d)
e)
Give the recurrence relation for the value of the optimal solution when
longest common subsequence problem is to be solved using dynamic
programming method Give the matrix of the values computed while
determining LCS of the following string.
X=BDCABA
Y=AB C B DAB
f)
Define sum of subset problem? Let the weight given the w = (5, 7, 10,
12, 15, 17) and m = 22 Draw the state space tree for the above problem
to find all subsets that sum to 22.
zzz
[4339] - 14
P587
SEAT No. :
[Total No. of Pages : 2
[4339] - 21
Time : 3 Hours]
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
a) Create shortest path tree by using Dijkstra algorithm for Node C. Explain
the steps.
P.T.O.
b)
c)
d)
e)
[4 4 = 16]
a) List the different types of commands used in FTP. Explain any one in
detail.
b) Explain socket structure used in client server model.
c) What are the problems for full implementation of voice over IP? Do you
think we will stop using the telephone network very soon.
d) Releasing a connection without data loss in transport layer is not simple.
Comment.
e) Explain the functions of RTCP.
Q4) Attempt any four of the following :
a)
b)
c)
d)
e)
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-21
P589
SEAT No. :
[Total No. of Pages : 2
[4339] - 23
Time : 3 Hours]
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
[4 4 = 16]
b)
c)
d)
e)
other, but they behave as though they do. When the user changes the
information in the spreadsheet, the bar chart reflects the changes
immediately, and vice versa.
Select the most appropriate design pattern to address the above problem.
Give structure and participants to illustrate the use of design pattern.
With the help of example, illustrate indirection GRASP.
Explain Intent and applicability of Abstract Factory Design Pattern.
What are the participants of decorator design pattern?
Give structure and collaboration of strategy design pattern.
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-23
P590
SEAT No. :
[Total No. of Pages : 2
[4339] - 31
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
a)
b)
c)
d)
SV.
CPI.
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-31
[4 4 = 16]
P591
SEAT No. :
[Total No. of Pages : 2
[4339] - 32
Time : 3 Hours]
[Max. Marks : 80
[16]
[16]
a)
b)
c)
d)
e)
[16]
a) What is micro-mobility support? Why it is required in mobile IP? Which
are the schemes available for micro-mobility support?
b) Explain coda file system.
c) What is the purpose of following optimizations in TCP?
i)
Fast retransmission/Recovery.
ii) Timeout freezing.
iii) Transaction oriented TCP.
iv) Selective Retransmissions.
P.T.O.
[16]
xxxx
[4339]-32
[16]
P592
SEAT No. :
[Total No. of Pages : 2
[4339] - 33
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
a) Explain how 3-D secure protocol is used to provide security to the credit
card on the Internet?
b) Why internetwork security is called fascinating and complex?
c) Apply the vernam cipher algorithm to a plain text message Hello John
using a one time pad NCBTZQARX.
d) Discuss the advantages and disadvantages of ECB and OFB mode.
e) Given two prime numbers P = 7 and Q = 17. Find out N, E and D in an
RSA encryption process.
Q3) Attempt any four of the following :
[4 4 = 16]
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-33
SEAT No. :
P595
[4339] - 103
M.Sc. (Semester - I)
COMPUTER SCIENCE
CS - 103 : Distributed Database Concepts
(2011 Pattern)
Time : 3 Hours]
[Max. Marks : 80
Instructions to candidates :
1) All questions are compulsory.
2) All questions carry equal marks.
3) Figures to the right indicate full marks.
4) Neat diagrams must be drawn wherever necessary.
[8 2 = 16]
a)
b)
c)
ii)
d)
e)
f)
i)
ii)
An irreducible query.
ii)
A monorelation query.
P.T.O.
g)
State what do you mean by a join selectivity factor between two relations
R & S?
h)
i)
j)
Reliability of data.
ii)
Availability of data.
[4 4 = 16]
a)
b)
c)
d)
e)
Semijoins are beneficial with fast networks, if they have a good selectivity
and are implemented with bit arrays. Comment.
[4 4 = 16]
ii)
iii)
[4339] - 103
Derive the set of valid predicates, that are candidates for deriving a primary
horizontal fragmentation of the relation, dept, using COM-MIN algorithm.
b)
< p
2
proj
[4339] - 103
Site 1
Site 2
Site 3
game
1000
1000
1000
gp
2000
player
1000
Assume,
Size (game gp) = 2000
and Size (gp player) = 1000
Apply the algorithm of distributed Ingres in the following 2 cases
i)
ii)
broadcast n/w
e)
[4 4 = 16]
Consider the following view definition create view gameview (gno, gname,
pno, prole)
as select g.gno, g.gname, gp.pno,
gp.prole from game g,
gameplayer gp
where g.gno = gp.gno and g.no of players <10;
The above view is accessed by an application q1 located at sites 1 & 2
with frequencies 10 and 20 respectively. Let us further assume that another
query q2, defined as
select gno, prole
from gameplayer where
pno < 10;
runs at sites 2 & 3, with frequencies 20 & 10 respectively.
Based on the above information,
i)
ii)
[4339] - 103
Explain in brief, with the help of a neat diagram, the different layers of
query processing, in a DDBS.
c)
Size
Site
emp
pay
proj
Asg
10
Draw the join graph (query graph) for the above query.
ii)
[4339] - 103
d)
[4 4 = 16]
a)
b)
c)
d)
e)
zzz
[4339] - 103
SEAT No. :
P597
[4339] - 201
[Max. Marks : 80
Question 1 is compulsory.
Attempt any four from the remaining.
Draw neat diagrams wherever necessary.
Figures to the right indicate full marks.
6 6 6 6 6 5 4 3 2 1 1 1 1 1 1 6 6 6 6 6
Q3) a) State the equations for 2-D discrete Fourier transform and its inverse.
Describe any two properties of 2-D discrete Fourier transform.
[8]
b) Explain Image Subtraction and Image Averaging. Why is it used in Image
Enhancement?
[4]
c) List the types of Adaptive Filters and explain how they help in noise
reduction.
[4]
P.T.O.
Number of Pixels
790
1023
850
656
329
245
122
81
b) Draw the shapes for the orders n = 4, 6 and 8. Also give their Chain code
representations, first difference and shape number.
[4]
c) What is Gamma Correction? Explain.
[4]
Q7) a) Explain hit or miss transformation in Morphological Image Processing.[8]
b) Explain local processing for edge linking.
[4]
c) Write a short note on Ideal High Pass Filter.
[4]
Q8) a) Describe the role of illumination in thresholding, basic adaptive
thresholding and basic global thresholding.
[8]
b) Explain Zooming and Shrinking in digital images. How does it take place? [4]
c) Define mixed adjacency. Explain how it eliminates ambiguity that often
arises with 8-adjacency.
[4]
xxxx
[4339]-201
P600
SEAT No. :
[Total No. of Pages : 2
[4339] - 301
[Max. Marks : 80
[8 2 = 16]
i) Fault.
ii) Failure.
e) Define staff acquisition.
f) List the process of project procurement management.
g) Define :
i)
MTTF.
ii) MTBF.
h) What is the defination of quality according to JSO.
Q2) Attempt any four of the following :
a)
b)
c)
d)
e)
[4 4 = 16]
P.T.O.
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-301
[4 4 = 16]
P601
SEAT No. :
[Total No. of Pages : 2
[4339] - 302
[Max. Marks : 80
[8 2 = 16]
[4 4 = 16]
[4 4 = 16]
[4 4 = 16]
[4 4 = 16]
xxxx
[4339]-302