ASSIGNMENT - 1, MAY 2013. Paper I ARTIFICIAL INTELLIGENCE (DMCA 301) 1. (a) Explain about the reasons to study AI. (b) Describe the water jug problem. 2. Differentiate between A* and AO* algorithms. Explain AO*algorithm. 3. Explain about different issues to be considered in Knowledge representation. 4. Discuss in detail about forward versus backward reasoning. 5. What is an expert system? Discuss about the expert system shells.
ASSIGNMENT - 2, MAY 2013. Paper I ARTIFICIAL INTELLIGENCE (DMCA 301) 1. Write a program to play Tic-Tac-Toe. 2. Write an algorithm for simulated annealing. 3. Describe the means-ends analysis method. 4. Explain the resolution procedure for prepositional logic. 5. Write the unification algorithm. 6. Explain the control knowledge search. 7. Discuss about the Dempster-Shafer theory. 8. Write a brief note on commonsense ontologies. 9. What is a production system? 10. What is AI Technique? 11. What is hill climbing? 12. What is natural language processing? 13. What is backward-chaining rule?
ASSIGNMENT - 1, MAY 2013. Paper II CRYPTOGRAPHY AND NETWORKS SECURITY (DMCA 302) 1. Explain the following substitution techniques : (a) (b) Caesar Cipher Hill Cipher. 2. Explain in detail the AES key expansion algorithm. 3. Discuss about double DES and triple DES. 4. Explain about the principles of public-key cryptosysetms. 5. What is DSS approach? Explain the digital signature algorithm.
ASSIGNMENT - 2, MAY 2013. Paper II CRYPTOGRAPHY AND NETWORKS SECURITY (DMCA 302) 1. Explain the difference between differential and linear cryptanalysis. 2. Write the Euclidean algorithm for polynomials and use it to find ( a ( x), b( x) ) 6 5 4 3 2 4 2 a ( x) = x + x + x + x + x + x + 1, b ( x) = x + x + x + 1. 3. Briefly describe the key expansion algorithm. 4. Explain the difference between a session key and a master key. 5. Explain the factoring problem. 6. What is the difference between direct and arbitrated digital signature? 7. Briefly write about password management. 8. What are the design goals for a firewall? 9. What is one-time pad? 10. What is a meet-in-the-middle attack? 11. What is Euler s totient function. 12. What is a honeyport? gcd where 13. What is a circuit-level gateway?
ASSIGNMENT - 1, MAY 2013. Paper III EMBEDDED SYSTEMS (DMCA 303) 1. Explain about various cache mapping Technologies. 2. Explain about various embedded processor Technologies. 3. Explain Data flow models. 4. Explain control process models. 5. Explain single purpose processors.
ASSIGNMENT - 2, MAY 2013. Paper III EMBEDDED SYSTEMS (DMCA 303) 1. Explain about priority arbiter. 2. Explain stepper motor controllers. 3. Discuss how to select a micro processor for an embedded system design. 4. Explain the architecture of a general purpose processor. 5. Explain elevator controller using PSM. 6. Explain about Interrupt. 7. Explain about Memory. 8. Explain the terms (a) (b) Software and Hardware 9. Define port. 10. Define Cross complier. 11. What is meant by Real time systems? 12. What is CMOS? 13. What is FPGA?
ASSIGNMENT - 1, MAY 2013. Paper IV DATA MINING TECHNIQUES (DMCA 304) 1. Define a random variable and discuss its relationships between multiple random variables. 2. What is dimensional modeling? Discuss in the detail various schemes for modeling multidimensional data for data warehouse development. 3. Explain about various partitional algorithms used for data clustering. 4. Discuss various optimization methods for continuous parameter spaces. 5. What is SQL? Discuss different ways of evaluating a query with examples.
ASSIGNMENT - 2, MAY 2013. Paper IV DATA MINING TECHNIQUES (DMCA 304) 1. Contrast the differences between data mining versus knowledge discovery in databases. 2. Describe the significance of neural networks. Also explain their advantages. 3. What are the predictive models for classification? 4. What is association rule learning? Explain. 5. What is uncertanity? Explain how fuzzy theory can quantify uncertanity. 6. Discuss about models and patterns. 7. Discuss about search and optimization methods. 8. Describe predictive modeling for regression. 9. What is score function? 10. What is descriptive modeling? 11. What is OLAP? 12. What is Data organization? 13. What is multidimensional scaling?
ASSIGNMENT - 1, MAY 2013. Paper V SYSTEMS AUDITING (DMCA 305) 1. Explain programming Management Controls. 2. Differentiate between Application Controls and Management Control of Information systems. 3. Explain effectiveness of system evaluation process. 4. Explain Concurrent Audit Techniques. 5. Explain Quality Assurance Management Control.
ASSIGNMENT - 2, MAY 2013. Paper V SYSTEMS AUDITING (DMCA 305) 1. Explain Database Controls. 2. Discuss Expert system. 3. Explain about output controls. 4. What is distributed database environment? 5. Explain Public key Cryptography. 6. Explain test Data and code comparision. 7. How does the real memory errors are detected? 8. Explain Evaluation system Efficiency. 9. Define Auditing. 10. What is sandwitch testing? 11. What is meant by crypto system? 12. Define Data Integrity. 13. Why Information controls are used?