0% found this document useful (0 votes)
10 views16 pages

Mca Thirs Sem Iot 2023

Uploaded by

assessmenta049
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views16 pages

Mca Thirs Sem Iot 2023

Uploaded by

assessmenta049
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Uf

F
z)

*
MCA,III/I1.23.005 Reg.No.
A
MCA THIRD SEMESTER EXAMINATION NOVEMBER 2023
22.382.0332 INTERNET OF THINGS
(Regular& Supplementary)

Time:3 Hours Write any FIVE questions. Maximum Marks :50


Each question carries 10 Marks

No QUESTTONS MARKS eo BL PL
I a. Explain IoT and its characteristics. 5 co1 L2 1.6.1

b. Explain various link layer protocols of IoT. 5 col L2 1.6.1

OR

2 a. Explain MQTT Protocol in detail. 7 col L2 1.6.1

b. ,Differentiate between MQTT and HTTP. J col L2 1.6.1


tl. ,

3 a, Compare M2M & IOT. 5 co2 L2 1.6.1

b. With a neat diagram, explain layered architecture of


IoT.
5 co2 L2 r.6.t
OR

4 a. What is Zigbee? 4 co2 L2 1.6.1

b. Explain the role of Zigbee in IoT Communication. 6 coz L2 1.6.1

5 Identifr the use of the sensors given below: 10 co3 L3 1.6.1

(i) LM35
(ii) DHT22
(iii) LDR
(iv) MQ Series
(v) Gyroscope

OR
c03 w ,1,6.1
Design an Arduino based vehicle monitoring
and
,: 'J... j
.',

tracking system. The system should


collect
information such AS vehicle location, speed, fuel
level,
and
acceleration of the vehicle, engine temperature
send this information at regular intervals in
real time
to a cl0ud servef database. These vehicle statistics
by
stored in the cloud database should be accessible
authorized persons using any web enabled device

(1) Identify the sensors required and explain the

tasks that should be executed'

(2) Drawthe high level architecture showing

sensors and interface.

I trt Write the Pseudo code for implementing the

system.

6 co4 L2 1.6.1
7 L. Write aurdino Program for traffic control system using
three different LEDs.

Explain the components required to implement traffic 4 c04 L3 1.6.1


b.
control system.

6 co4 L3 2.5.2
8 a. Design an IoT application for estimating the moisture
1n the soil usmg Arduino board and sensor,
Draw the
circuit diagram and explain the working' Also write :.' a:.t ll

the pseudocode.

Compare Arduino and Rasberry Pi boards' 4 co3 L3 1.6.1


b

5 co5 L2 1.6.1
9 a. Explain the role of Big Data Ana lytics in loT.

b. Consider an IoT based forest fire detection system,


and explain the bigdata processing steps in this use 5 cos L2 1.6.1
case,

OR
co5 L2 2.5.2
Describe the comPonents and steps to create an IoT-
5
10 a.
based weather station using Arduino and sensors' ,

Explain how the IoT technology used in smart 5 cos L2 I


b.
lightening and intrusion detection systems'
M.Sc.(DS).I[/1 1.23.00 I I
Reg.No.
A
M.SC. COMPUTER SCIENCE WITII SPECIALIZATION IN DATA SCIENCE
THIRD SEMESTER EXAMINATION NOVEMBER 2023
.t , :r: .:. 'i tt,

22.359-0331 INTERNET OT' THINGS


(Regular)
Time: 3 Hours Maximum Marks: 50
Each question carries 10 Marks

No QUESTTONS MARKS CO BL PL
I a. Explain IoT and its characteristics. f, col L2 1.6.r

b. Explain various link layer protocols of IoT. 5 col L2 1.6.1

OR
2 t. Explain MQTT Protocol in detail. 7 col L2 1.6.1

b. State some differences between MQTT and HTTP 3 co1 L2 1.6.1

3 Describe how the environment can be more protected 10 co2 t3 1.6.1


with the help of IoT technology in the following
categories:

(i) Air pollution monitoring


(ii) Noise pollution monitoring
(iii) River flood detection
(iv) Structural health monitoring
(v) Emergency response

OR

4 With the help of neat diagrams, explain the M2M 10 c02 L2 1.6.1
system architecture.

3 Identiff the functions ofthe sensors mentioned below: 10" c03 L3 1.6.1

(i) LM3s
(ii) DHT22
(iii) LDR
(iv) MQ Series
(v) Gyroscope

OR
6 a Define Acfuators? Mention
the different types of
Actuation systems.
5 c03 L2 1.6.1

b Mention the sensors which are


applications.
used in industrial ) c03 L2 r.6.1

7 a. V/hat is the use of GPIO pins


in IoT device? 4 co4 L2 1.6.1
b. Illustrate how to interface a LED
to Arduino and write 6 c04
aprogftrm to blink. L3 1.6.1

OR

8 a, Design an Io T application for


estimating the moisture
m the soil using Arduino board 5 co4 2.5.2
and sensor, Draw the
circuit diagram and explain the
working. Also urite
the pseudocode.

b. How Aurdino helps to develop


IoT applications. 5 c04 1.6.1
with example. Compare io* ararino differs
I*plT
from Raspberry pi?

9. a. Explain the role of Big Data


Analytics in IoT. 5 cos L2 1.6.1
b. Consider an IoT based forest
fire detection system, and 5 cos
explain the bigdata processing L3 1.6.1
steps in this use case.

10 a. Describe the components and


steps to create an IoT-
based weather station using 5 co5 L3 2.5.2
Arduino and sensors.
b. Define how the IoT.technology
can be implemented in cos L2 1.6.1
smart lightening and intrusion
ietection-systems.

* **** *** t,t ** :t ***** :f :t* :t *,t


,vICA,IIU11.23.001 Reg.No.
? s-r
l\.r A
2023
A
MCA THIRD SEMESTER EXAMINA
G
22.352.0301 WEB TE CHNOLO GIES
tt
(Regular)

7
Write any FIVE questions. Maximum Marks :50
Time: 3 Hours
Each question carrics L0 Marks

MARKS CO BL PL
No QUESTIONS
Write an XHTML code to display the following outPut.
col 5.2.2

r llepartment of ShYeirs
i. Bsc. FhYsics
ii. M$c. PhYsics
r Nuclear PhYrics
' r SeoBhYsics
iii. Ph.D.
I DepartmmtufCh*mistrY
a, b{.Sc"
o Organic ChemirrrY
: " q AnalYtical(hextstry
b. 3$c" Chemistry
t. Ph'E.

Explain different methods for adding a CSS style into an col 5.2.2
XHTML web Page with examPles?

OR

2 Explain the purpose of the <th>, <tr> and <td> tags in an


co1 5.2.2
HTML table. What is the significance, of the colspan and
rowspan attributes in table cells? Write the HTML code
for the below table:
Itmc?&lt
Dny Coursa ssbirct Tiuc
9 - fl.30 am
,j.i,r::,j.rj.
Day I BSc. Malhs Calculus
.:i ,.:

BscCs" c+r 12 - :1..30 pm

BSU PhlBi(s QuMtu$ IuRhanis ? - 3.30 Pm

Dae 2 BSc" Matht Graph'theoq I - lt-30 m


BScC5. Operi*nf Slblern lI - L30 FBr

IlSc^.Phystff Thprnodyt.]mlr-r 3 - 3"*0 pm

Create an XHTML web page with CSS style' The


webpage should include the following elements: co1 5.2.2
i e heading with the text"Cochin University of
Science and Technologt" ina color of your
choice.
a A paragraph with the class name'demo'to have a
red text color, font size of I6 pixels,andabold
font weight.
o Ensure that all paragraphs have a lpx solid black
border.
:r.:.:. i : rri .:i:1.' .1
o Insert an image of the Cochin University of
Science and TechnologY.
o An unordered list of ts.
a. Create a simple HTML form with a text
a 3 c02
button. Implement an onClick event that triggers
an alert
with the rnput value when the button is clicked.

b. Wlte a JavaScript function that validates a user


regiskation form anf gives appropriate alert 5 co.2 L3 5.2.2
messages.
The form shoutd include fieldi iik ur"rrru-e, password,
and email, with specific validation requirements.
Demonstrate the usage of this function.

c. Explain the differences between Alert, prompt,


Confirm windows in JavaScrip. Includ" .*u*pt".
and 2 co2 L2 <) 7
fo.
each.
: i;',:.ii.l;. :i !: ti ;.r1_ r,
i'.ii.;:1,i. ", :.:.i:-.i.a:,rr:: :'f. }. :
r,r,., r,1
OR
:,.. r1 j,.- r.i. :i. j i:

4 a. Discuss the methods for element access


operations ,ln I2 <) 1
JavaS cript. Provide examples for accessmg
elements by
ID and manipulating their values using
getElementBy I d0, valUE, and InnerHTML.

b. Discuss.the usage of 'onmouseover. and .onmouseout.


events in JavaScript. provide a practi.ut co.2 L2
."u_pt. of s.2.2
implementing these events on a webpage.

c. JavaScript code that validates a user,s password


.Writ9 c02 L3
based on the following requirements: 5.2.2

At least 8 characters long


n ll ) Contains at least one uppercase letter
one Iowercase
.f;:.;:; : :i,rif : .i:i:r:',t:.i
letter and one

5 a. Explain the steps involved in connecting


a Jaya c03 L2 5.2.2
application with a MySQL database usmg
JDBC. Include
the sample code for the same Also, provide
a brief
overview of the class. fomame method.
b. Describe the lifecycle of a servlet. Explain
the role of the
'initO', 'service0', and'destroyQ' c03 L2 5.2.2
methods in the servlet
lifecycle.

c. Write a
Java Servlet that reads data from the
query
parameters of an HTTP GET request
and displays it in c03 L3 5.2.2
the response. Include the relevant
code snippets.

.:::'i: j:\r a,:;j: : iji:,.-. .::, 1.

6 t. a JaYa program that demonstrates !1..:i=.=:


the use of c03 L3 5.2.2
prepared statements in JDBC (containing
all the steps
involved in database connectivity). Include
examples of
executing select and update queries
using prepared
statements.

b.
Explain the difference between GET
and posr methods
in form submissions. provide an example of
when you
might prefer one over the other in a c03 L2 5.3.1
Java Servlet
application.
7 a. Why is JSP (JavaServer Pages) a preferred choice for co4
web development, and what are the key advantages it
offers over other technologies?

b. Dev-elop a jsp based gpplication to facilitate a MCe


co4
/ based quiz application with a web page named quiz.html
containing l0 questions with one correct answer. 4 marks
will be awarded if the answer is correct, 1 mark will be
deducted if answer is wrong.. Total marks have to be
displayed to the user.

OR
8 a. Design a java servlet program to get one string value and 7 L2 5.2.2
three integer values via textboxes from a webpage named
calculation.html. If the value of first text box is
'oddjrimeu, find odd prime numbers among those 3
values, if it is 'four digit', find the four digit numbers
among those.
b. What are JSP actions? Explain any two commonly used
3 L2
JSP actions and their purposes in JavaServer pages.

9 a. Define an XML and Document Type Definition for a 5 c05 L3 s.2.2


simple address book. The address book should capture
information about individuals, including their name,
phone number, and email address.

b.
What is XSLT? Explain how XSLT can be used to 5 co5 L2 5.2.2
transform XML data into a HTML format with example.
OR
10 il. Explain the basic components of XML. Write a well- c05
r:i.:;:' ::'r , .1
formed XI\4L document representing information about a
University. The document's root element should be
labeled'university', and include details such as the names
of courses, instructors, and the number of enrolled
students.

b. What is XML Schema, and how does it differ from


c05
Document Type Definition (DTD)? Create a simple
XML Schema for the University XML data.

***:f **:F************* **:f *

r:.!r:],:t:: r:::,,.ait.i- r r-i.-.,. :',. j .j:.j. t:. .,,


Ltiltillll!' .a:5 i
Reg.No.
B
MCA THIRD SEMESTER EXAMINATION NOYEMBER 2023
.
* 22.382-0302 CRYPTOGRAPHY AND NETWORK SECURITY
*
(Re gular& Supplementary)

Time:3 Hours Write any FIYE questions. Maximum Marks :50


Each question carries 10 Marks

Q.No Questions M CO BL PI
ar
ks
1 a. The following shows a plaintext along with its cipher text.
Reason out whether the cipher is monoalphabetic or not.

i) Plaintext: HELLO ,Cipher text: KHOOR 2 co1 L2 1 7 1

ii) Plaintext: HELLO ,Cipher text: ABNZF


b. 5 L3
Encrypt the plain text message using Playfair cipher.

c. "We are discovered save yourself'with the key monarchy a


J L3
Evaluate
i)-18(mod4)
ii)GCD(2740,1760)
iii)2^16(modl7)

OR
) a. Decrypt the plaintext "EWXJEWYTKZU with Hill cipher
algorithm and using the following 2x2key:
5 col L3 1.7.1

22 13

11 5
5
b. Find the multiplicative inverse of 49 modulo 970 if exists.

3 a) Compare Feistel and non feistel ciphers together with 2 co2 L2 2.6.2
examples.
b) Rijndael AES supports the use of 16X16 S-Boxes for byte
substitution operation. Consider the giv.en S-Box and state
table.
7 s, 3 ,t b I * s
'c5 i0 0l at 2b f,e TT rt
f0. ad, d{ L2 +L ,9f i{ 1?,.
ag aS ci fT ?l d8 31,
E -11-
0? 12 8Q r2 :s: E m
-!8" E2 3b dE, B lc :r
?r, a3 E
1t :6S" :- :!r
5b 6r {fi b6 39 aa
T6' Te' fE TC
r,.1 {s af 92 ft} f5 b6. b5 da, z1 t0 ff 'f3. d2
I tf 9? dil ,t? cl r? ?G
GI hB 1{ d*
0r a9 alc
ca t7 6d Ed dlt {. r, 6c 66 It aa ai
TT 6 k: 1fl', tl H d* ?t T 8F,
36
TE
b$
f8 TT' l!
66 {8
69
04,
d9
tb
8.
St
9{
Pg
6t 3! s,
9b 1r ?r
E c9
1d
18,
al il$ 0d 12 6S ,*L.. B9 td, 0f b0 x bb t5
'tg a0 9a e9

3d t4 cS f8

eB eP 8d 48

be 2b Ea 08

i. What is the value of the matrix after Substitute Byte 8 L3 2.5.3


operation?

ii. Write the output of shiftrow operation from the result of


(i).

, j.: ..
.:
iii. Write the output of matrix multiplication of column I ., . :.:: ,

from the result of (ii) using below matrix

I 0 1 1

0 I 1 2

1 0 1 0

I 0 I 2

OR
#
4. a) List and briefly explain cipher modes of operation. 5 co2 L2 2.5.3

b) Compare AES and DES in terms of block size, key size and
operations.
5

5 a) Euler's Totient Function is denoted as Phi(n). Solve 5 co3 L3 2.5.3


oPhi(60)

. Phi(777)
. Phis000)
o Pht(23491)
L3
b)
o Suppose that you are computing an RSA key pair.
5

What are p and q and rp(n) for an n:


187? Find an
RSA private key for e:7 . Uiing the d computed,
decrypt the ciphertext I l.
OR
6. a) Suppose the Diffre-Hellman public values p and a are 353 and 8 co3 L3 2.5.3
3, respectively. If one user's secret is 97 Find public key and a
session key? Also by selecting 233 as a valid secret for the
next user, prove that both session keys are the same.

b) What is the trapdoor function behind Elgamal public key 2 L2


scheme? Explain the function in terms of Elgamal security.
L3 2.5.3
f:lred Zt. 6
+2X+2 over the Prime
the cun'e Y,=
a)
on the curve. If point p=(5,1) is a point on
Find all the points
1S 2P
the curve find what
number generator ' L3
OTP using RSA random 4
b) Generate an 8 bit
for *odutotn=35andb=7
7 where seed Xo is 5'
I
OR
ttt the 3 co4 L3
with 24A0 bi ts giveu AS lnput
Co nsidcr ths message be added to it
many bits need to
a)
how
SHA 1 60 algorithm,
excluding the length? MD5 hash H 1 L3
M of slze 1 28 bits, whose 2
b) If we have a message 60 8'
5 a723b,bd393
8 1 c73 79a604 1
1 28 bits 844 f8
1S exactlY ri'i 1

b;
of the hash for the message created
What will be the slze
of the same message
if the
th another copy
appending M WI
remalns the same?
hashing algorithm 5 L2
algorithm'
c) Wtite stePs in the MD5

co6 L2 2.5.3
4
functions.
the proPerties of Message authentication
9 a) List L2
J
4 uses of Hash function'
b) Write any
c) with a schematic diagram' J L2
Explain Digital Signature
OR
',,i

5 cos u2 t.2.2
by PGP based mailers.
1 0. a) List the security servlces L2
5
stePs involved in SET
b) Whatis SET?

2- Understanding'
3 - Applying' 4 - AnalYsing'
Levels (1- Remembering'
BL-Bloom 's Taxonomy
5-Evaluating,6- Creating) Indicator Code
Outcomes; PI Code -Performance
Course Outcomes ;PO -Program
C0 -
**rF***********
,q

.23.001
4
Reg.No

MCA THIRD SEMESTER EXAMINATION NOVEMBER 2023


A
+ 22.382-0301 WEB TECHNOLOGIES AND PROGRAMMING

t (Regular)
..,jali:::. I'rrl ..r.. : i],]:1 j
'

Time: 3 Hours Write any FIVE questions. Maximum Marks :50


Each question carries 10 &{arks

No QUESTTONS MARI(s CO BL PL
1 a. Write an XHTML code to display the following output. 5 col 5.2.2
r Ilqparturent of ?lry*icu
i. Bsc. *hy*ic*
ii, M$c" Fhysies
' I Nuclear physicu
r Srophysics
tii" Fh.D.
i Su$erfirent of eh*mistry
a M.$r.
s Oryanic Chemixrry
'i, rl Anxlytical'Cheillisuy,
b" BSc. fihemlsay
c. Ph.fr.

b Explain different methods for adding a CSS style into an


XHTML web page with examples? 5 col L2 5.2.2

OR
, a. Explain the purpose of the <th>, <tr> and <td> tags in an
HTML table. What is the significance of the colspan and 5 col L3 5.2.2
rowspan attributes in table cells? Write the HTML code
for the below table:
TimtTabla
D{y Courss Strbjet. Tiu€
l-
i
r.::: .i..,..: :. B6c. Matlu Crlculus I - 11.30 altr
B5(C5. Cr+ 12 - L^3O pm

E.$c, PhXslcs Quanum illechanis 2 - 3.30 pn:

Day 2 BSr- Malh$ Graph"ttmry I' 11.30 nln

BSeC5. OFsrldry Sys.reul l3 - 1.:0 p$r

BSe. Phlslcr 'Ihrrmrxlyllamks I * 3"30 pm

b. Create an XHTML web page with CSS style. The


webpage should include the following elements: col <)
5 L3 1
o A heading with the text,,Cochin [Jniversity of
Science and Technologl, ina color of your
choice.
a A paragraph with the class name'demo'to have a
red text color, font stze of l6 pixels, and, a bold
font weight.
O Ensure that all paragraphs have a Ipx solicl black
border.
o Insert an image of'the Cochin University of
Science and Technology.
a An unordered list of
-
3
I\
a. a
a text
!
a co/2
that triggers an alert
ls clicked.
b. Write a JavaScript. function
that validates a user
co.2
T},'f;*"l,m;l***ltl,fi,ls,r",,'il",,,,..
and email, with ;;;;;*"-l1}l,u.lt*u*e, password,
L3 5.2.2

o"-on,'tJi;""T1.-ln"Tif,l*11111T1*.q,i."..,,t,.
c. Explain the differences be

iiii+ii:,li:r,t:iir:i J::,.:.,
' 1. .i:1:
Confirm
each.
i.._ - .
*tnaow. i,,;r."J};,".'r,,t',ift
.l.;ff*, tl c02 L2 5.2.2

L2

r., .onmouseover. and


.HHr#;"lX1; Provide onmouseout.
rmplementing ttr"r.ll.^ a practical.. ;;;;;il:; co.2 L2
events on a webpage. 5.2.2

#::T jffi:il?:fiT,:lx1,Jfl:*::, a user,s password


c02 I3 5.2.2
i. ) At least 8 characters
Iong
d ll. ) Contains at
Ieast one uppercase
.iairirai.lri ji,4:r i :riri::i, letter and one letter, one lowercase
I

a.

c03 L2 s.2.2

b.

c03 L2 5.2.2

c. Write a
Java Servlet that
reads data
parameters or
an HrIp
the response. Include
cEi;;;;;L:"il.JH.r;? c03
tt r.t"uunil"l..rooor. L3 5.2.2
"
:i,, ! j,:,!ii,.,.. i:.-,;J, .

6 Write a J.ava progriun


that
prepared statements the use of
m JDB C (containing c03 5.2.2
involved in database all the steps
connectivity). Include
executing select examples of
and update q
statements. ueries usmg prepared

Explain the difference


between GET and
tn form su bmissions. POS T methods
Provide an example
might prefer one of when you
over the other c03
rn a Java Servlet U 5.3.1
7 a. Why is JSP (JavaServer Pages) a preferred choice for 3 co4 L2 5.2.1

web development, and what are the key advantages it


offers over other technologies?

b. Develop a jsp based application to facilitate a MCQ 7 ,co4, 12' 5.2.2


based quiz application with a web page ruImed quiz.html
containing l0 questions with one correct answer. 4 marks
will be awarded if the answer is correct, 1 mark will be
deducted if answer is wrong.. Total marks have to be
displayed to the user.

OR
8 Design a java servlet program to get one string value and 7 c04 L2 5.2.2
^.
three integer values via textboxes from a webpage named
calculation.html. If the value of first text box is
'oddjrime', find odd prime numbers among those 3
values, if it is 'four digit', find the four digit numbers
among those.
: ,. i:,..:r -'l J.ii"r:.i::

What are JSP actions? Explain any two commonly used


::

I co4
,: :;",i'::. . I ::

L2
-

3 5.2.2
JSP actions and their purposes in JavaServer Pages.
I'
9 L, Define an XML and Document Type Definition for a 5 co5 L3 5.2.2
simple address book. The address book should capture
information about individuals, including their name,
phone number, and email address.

b. 5 co5 L2 5.2.2
What is XSLT? Explain how XSLT can be used to
transform XML data into a HTML format with example.
OR
10 a. Explain the basic components of XML. Write a well- 5 cos L2 s.2.2

/,:'.'i! :::: l
formed XML document representing information about a ,']
University. The document's root element should be
labeled'university', and include details such as the names
of courses, instructors, and the number of enrolled
students"

5 cos L3 5.2.1
b. What is XML Schema, and how does it differ from
Document Type Definition (DTD)? Create a simple
XML Schema for the University XML data.

., .,, , :r,j.: , : :.., .... i t...:l : 1:i .il.l.l/':ili:iflii;:::


r..:. : ,i ;:;:- ,'1'. t' .
G i-
1,

* MCA,IIllll.23.003 Reg.No. rt
l't
\
C
MCA THIRD SEMESTER EXAMINATION NOVEMBER 2023
22.382.0323 DEEP LEARNING
(Regular& Supplem entary)

Time:3 Hours Write any FIVE questions. Maximum Marlis :50


Each question carries 10 Marks

Q.No Questions Marks CO BL PI


1 a. Consider a feedforward neural network with one hidden layer. col
6 L2 1.6.1
The input layer has 10 neurons, the hidden layer has 5
neurons, and the output layer has 3 neurons. The activation
,function used in the hidden layer is the Rectified Linear unit
(ReLU), and the output layer uses the softmax activation
function.
Define the architecture of the neural network, specifoing the
number of layers, neurons in each layer, and activation
functions.
b write the perceptron learning algorithm to classiff positive
inputs and negative inputs present in a dataset. 4 col L2 1.7.r

OR
2 You are given a real-time dataset containing information about t0 col L3 2.6.4
housing prices, including features such as square footage,
number of bedrooms, and distance to the city center. The goal
is to predict the price of a house based on these features.
Implement a simple linear regression model using a library
like scikit-learn. Train the model on a training subset of the
data and evaluate its performance on a separate testing subset.
Explain the metrics you would use to evaluate the model's
performance.

J Explain the architecture and key components of l0 co2 L2 1 .6. I


convolutional Neural Networks (cNNs) in detail. Discuss
how each component contributes to the network's ability to
effectively leam and recognize pafferns in images. provide
examples of applications where CNNs have demonstrated
significant success and outline any limitations or challenges
associated with their use. support your answer with relevant
concepts and real-world examples.
OR
4 Imagine you are a data scientist working in a healthcare
rqsearch institution. The institution has recently acquired a
large dataset of medical images, including X-rays and MRls,
with the goal of developing a deep learning model for
automated disease diagnosis. Your team is considering the use
ofAlexNet for this task.
a. Describe how you would prepare and preprocess the medical 4 coz L3 1.7.1
image dataset for training AlexNet. Consider aspects such as
normalization, and the organization of the dataset.
b. Explain the modifications or adaptations you might make to 6 co2 L3 1,7.1
,..: .:..:.

the original AlexNet architecture to better suit the


characteristics of medical images. Discuss any additional
layers or adjustments that could enhance the model's
performance.

5 a. Explain Generative Adversarial Networks (GAN), outlining 5 co3 L2 1.6.1


the roles of the generator and discriminator in the GAN
framework.
b. How do Deep Convolutional GANs (DCGANs) differ from 5 co3 L2 1.6.1
standard GANs, and what advantages do they offer in the
context of image synthesis?

OR
6. Discuss the implementation of how iutoencoders can be used l0 co3 L2 1

for generative modelling, such as generating realistic images


or data samples.

7 a. Define the concept of attention in the context of deep 6 co4 L2 1 6. 1


learning. Explain how attention mechanisms differ from
traditional models and how they contribute to improving
model performance.
b
Explain the difference between global attention and local
4 co4 L2 I .6. 1
attention mechanisms.

OR
8 a. Imagine you are working on a project to predict stock prices 6 co4 L3 2.6.4
using historical data. Design and implement an LSTM-based
model for this task.
b.
Briefly explain the concept of Long Short-Term Memory 4 co4 L3 2.6.4
(LSTM) networks and how they address the vanishing
gradient problem compared to traditional Recurrent Neural
Networks (RNNs).
j
,

a l,
9 Consider the following two-dimensional data: 10 co5 L3 2.6.4
*r 2.5 S,5 l,? 1,9 3.1 t.3 X I 1"5 1,1
y: L4 {.? Lg eI i.$ ,? 1.6 l,tr r.6 0,9

Find the principal compounds using PCA algorithm. '. ' .t :'i: I rr::. :;.rl

OR

10 a. Explain the basic concepts of reinforeement learning, 5 co5 L2 1.6.1


including agents, environments, states, actions, rewards, and
policies.

b. Describe the motivation behind integrating deep learning with


reinforcement learning. Exptain the advantages of using deep 5 co5 L2 1.6.1
neural networks in reinforcement learning compared to
traditional methods.

**************

.f

: :.. I r,:ir:.r triiiil::

. ": ; .". :I:r:i,irr..rr::r'1r:::rl

You might also like