(Please

write your Exam

~oll

Nd.)

cD

IT fl

Exam

Roll

No

.

·END TERM EXAMINATION 2011 Paper Code: lfTCS302 Subject: Microprocessor Systems Time: 3 Hours Maximum Marks: Note: Attempt five questions' including Q.no.l which is compulsory. Select one •.. question from each unit. . SIXTH SEMESTER [B.TECH.j-

I

MAY

Q1

(a) (b) (c) (d)

Q2

(a) Describe the function of 8086 segment register. (b) Write a program to convert 8-bit BCD number number.

J 75

How doyou pass parameters to macro? (5x5=25) Draw the timing diagram of I/O write cycle of 8086. Discuss addressing modes of 8086 microprocessor. What is the difference between shift and rotate manipu lation P (e) Explain all assembler directives, pseudo-ops and operators of 8086. UNIT-I

Q3 \. \~

(6)

to its equivalent

binary (6)

(a) Write a program to move the contents of the memory location OSOOHto register BX and CX. Add immediate byte OSH to the data residing in memory location, whose address is computed using DS=2000H and offset=0600H. Store the result of the addition in 0700H. Assume that the data is located in the segment specified by the data segment register DS which contain 2000H. (6) (b) Explain architecture of 8086 microprocessor. (6)

i h l e

D w e N , e g e ll o C (a) What do you mean by macro? What are the differences between a macro Q4 g and a subroutine? in r e (b) What is nested macro? e of 8086 in details. n (c) Explain the stack structure (5) i g OR n E to find out whether a given byte is in the string or not. If (a) Write a program Q5 a i it is indthe string, fi~d out the relative address of the byte from the n location of the string. I starting n (b)r What is the difference between jump and loop statement? e , h t r o UNIT-II

(5) (3)

(7) (6)

,~--, \-. 1

I

N Q6 .~ / :

_.!- •..

UNIT-III

(a) Discuss the troubleshooting technique of 8086 based microcomputer. (b) Explain the interrupt response sequence of 8086.

(6) (6)

OR

Q7

(a) What is interrupt vector table of 8086? Explain its structure. (b) Differentiate between maskable interrupt and nonmaskable interrupt.

Q8

(a) Interface an 8255 with 8086 to work as an I/O port. Initialize port A as output port, port B as input port and port C as output port. Port A address should be 0740H. Write a program to sense switch positions SWO-SW7 connected at port B. The sensed pattern is to be displayed on port A, to which 8 LEDs are connected, while the port C lower displays number of on switches out of the total eight switches. (7) (b) Explain register organization of 80286. (6)

Q9'

(a) Explain internal block diagram of 80286 in details. (b) Discuss the need of 8259 and 8279.

(6) (6)

UNIT-IV

I

,I

--"'\

:

OR

************

(7) (6)

F ,

(Please write your Exam, Roll No.)

Exam. Roll No

.

END TERM ,EXAMINATION •. SIXTH SEMESTER [B.TECH.], MA Y - 2011

Paper Code: ETCS - 304

Subject

! Object

Oriented Software Engineering

Time I' 3 Hours

Maximum Marks: 75

Note: QJ is tfJmput~()I1' each unit.

Q. 1. (a)

Rest of the paper contains Four units, attempt One question from .~;-.-.~

.. ~,

... ,

Substantial testing of a system uncovers not a single error. (lOx2.5=25)

What conclusions do you draw? , (b)

I' I

...--..,j

Ii·

:it ;;i,'. I. 'I

:

.. ;

j

I

What

is the criteria

used to decide whether two objects are strongly

w e N ~/ , e (c) What are thetwo extreme types of structures for interaction g lle o diagrams? C g in (d) justify the statement that system rdevelopment is incremental. e nemean and how do they relate to one i --~!1at do the following g terms n E a another: di n I correctness, n working properly. r e rthWhat are the different activities that lead to requirement (f) o N specification?

.~

functionally related?

,

i_

./

i

lh e D

<,

(g)

Explain what is acceptance testing? Who does it?

(h)

Explain the. concept of extension In use Case model.

(i)

Define the term stakeholder of the system. List few stakeholders of the railway reservation system.

" '.

(j)

List atleast six deliverables in a software project.

1

P.TO-

~:·-

';';. '

r ~i.

,-. .J.'.:

UNIT-·- 1-' ' '.

k (/'

Q. 2. (a)

Il

r "Whatare ,.\ " '

(5)

What do you understand by requirement elicitation? List few

. ,,,s:hall,e ges

'(b

,/

~

'. ' : . '



';~:I'

faced during requirement elicitation.

Explain the Delphi technique for requirement elicitation.

(c)

(4)

the ideal characteristics of a requirement specification?

.;1i"

\

(3.5)

Q. 3. Compare and contrast the process models . . -

.:.

.

(a)

;'; .:"

Waterfall, spiral prototyping and incremental using the: following criteria:

N

i elh

D w e N , (ii) Capability to respond to charged requirements. e g e l (iii) Capability to meet user requirements. ol C g insoftware r (b) ; What do you understandeby sensability? Compare and e gin approches to software reusf· contrast the following n a Efilters . i (i) dUnix n I n r (ii) Object oriented classes. e h ort (i)

Capability to accommodate risk.

(7.5)

-,>

I

(5)

I

I

~

t

!, ri

UNIT - II

•I , .,I

Explain' the; difference between external design, architectural

Q. 4. (a) ;;

.design and detailed design. Also explain how the transitions are

I

I

i

. made from requirements analysi~ to external design, from external design to' architectural design and from architectural .

.

.

..

.

.

design to detailed' design.

" 2

(6.5)

! ~ !

,~

h - j' ,

,,1_

(by

What is Requirement Modal? What are the various components

(6)

of a.requirement model?

i h l e

g n i r e e n ngi

N

rn e h ort

D w e N , e g lle o C

E a i Ind

3

P.T.O.

If*,, ' [,..

I" L.,' ,~

/

UNIT - IV Q. 8. (a)

Differentiate between a package, component diagram and a

(6.5)

deployment diagram. (b)

Differentiate between a sequence diagrgm and a collaboration diagram with the help of

j

a

suitable example.

. ~ .

I-. q./9. Draw a class diagram and USecase diagram for a blood bank which

, I

receives

i

(6)

(12.5)

tests and stores blood donated by various people and also

i h l e

I

issues the, blood to individuals or hospitals. Take suitable attributes

D w e N , e g e ll Co

and services in each class and show association between these classes,

••• g n i r ee n i ng

N

n r e orth

E a i Ind

4

,,;J,\":. ,

,."

,~ I '

\Y ~,~

i

,«(Please write your Exam. Roll No.)

Exam. Roll No

.

'END'TERM EXAMINATION SIXTH SEMESTER [B.TECH.], MAY -2011 Paper Code:

___--:.... -- ...Subject:

ETCS3061ETIT306

Time: 3 Hours ,j

Maximum Marks: 75

.~

.

~OiJ):

Question No.1

!

is compulsory, Attempt One question from each unit.

'

, Q. 1. (a) )V,tl~.'~.' -.

~.(j-

i

What is: the 'difference between baseband and broadband?

(b)

Distinguish fifferent categories of UTP cables with their speeds.

(c)

Which fieldof the IP header change from router to router? 1

..-;-:

i

i

i

I

(2) (2.5)

i h l e

(2)

D w e N , (e) What is themajor factor that makes co-axial cable lessesusceptible (2) g e to noise tha~ ~wisted pair cable? . oll C gUDF as both are the (f) What is the difference between TCP iand n r e transport-layer protocols? ne '(2.5) i , ng2 (two) subnets in class B? (g) , Find the mask: that create (2) E a i ddata rate for traditional ethernet, fast ethernet and n (h) , Compare Ithe n r e gigabit-ethernet? (2) h t r N(i)o How many types of Transmission-technology are in computer -(d) 10 BASE2 uses __

" ' ' ,'1

Computer Networks

~_

10 BASE 5 uses

.

I

'

I

;

cable while

cable.

(2)

.

)

i

networks? Explain each.

(2)

How computer networks is useful in resource sharing and video (2)

conferences? (k)

Why OS1 model called " Open System Interconnection"?

.

(2)

(1) " Explain the characteristics by which the LANs are distinguished

from other kinds of networks.

(2)

P.T.O. ~'

,pt ..

'r",,,.

!

1-:; I

i

'F

,

' f.

q~. I

li+~ ,

'

UNIT·I·

How do the layers of TCPIIP protocol suite correlate to the layers of the OSlmodel?

Explain with the help of diagram.

(5)

What is the difference between a confirmed service and an

(b)

unconfirmed service?

(2)

!

I

What are the various types of transmission impairments? Despite

(c)

the comparably high cost factor, what makes fiber optics a desirable medium?

(3.5)

.. '

.'

Cd) Distinguish between:

.

lh(2)i e wD

(i)

Narrowband ISDN and Broadband ISDN.

(ii)

Boundary level masking and Non-boundary level masking.

e N , is related to subnetting? Explain with example. .e g e l ol C (b) Write short note on: g n i (i) ISDN r eein TCP n (ii) Three way handshake i ng E (c) Explain in iabrief, the . features of the following transmission d n . (i) I . Co-axial cable. n(ii) Fiber optic cable. r e orth

. Q. 3. (a)

What is the purpose of subnetting in IP addressing? How masking

(4)

.I

I

I

(2)

.1

media:

!

i

N

(4)

Cd) Justify why ISO-OSI model will have only 7(seven) layers? '

.

;!

{)

;

Ql;

UNIT· II Explain the different types of errors and any two schemes used

4. (a) ,

:

i

1

I

i,

!.



..

for ~

detection and correction?

"

Explain with an example each, character stuffing

(b)

"~;"

aoo!blf':·~".'..

I

"r:
i .

>'}.

i

~.

(c)

Diff~entiate

.

..

.

between stop-and-wait and sliding window protocols .

-. 2

,

If

j

(2.5)

: I·

,', ,~:

f \

i

'1



l\f;'" I

."

I",,~

r.

Q. 5. (aj'

What is the mechanism of:

(i)

Stop and wait and

(ii) 1 Continuous ARQ strategies De~ne and discuss the handling of J

.i .

.i

(a) . A damaged frame

1-,'

1.;"<;' •

(b) : A lost frame

I.'

(c) ; A lost acknowledgment; with respect to above

'I

(.J

I.-

, "

(b)

'i:~1 ~'~/!~i: I.

.1; .

~.r';."

i k':'~ t'"

\

.. ,,:.:.... r'.;.,

.-!'. .t-

'I

.

t;': -, "

.'

. 'strategies.

!.

.. ,J~.':" .

"

(6)

I

.~

In HDLC, what is bit stuffing and why is it needed? What is the . I 1 differenc~ between the information fields in HDLC-I frame and ./ I' . anHDLC~Uframe? ..

I

;,

I

I:

, I

! ;.

w e N Q. 6. (a) What is an. internetwork? State and compare interworking , devices e g used to connect different LAN segments. lle o Cachieves double . (b) Justify the statement" Slotted ALOHA g in r efficiency than Pure ALOHA". e e n i g (c) Give points of comparison between IEEE 802.3, IEEE 802.4 and n E a IEEE 802.5. i d In n r e What are the IEEE 802.3, 802.4 and 802.5 standards? Explain the h t r following aspects for an ethernet system. No , :

'

UNIT - III

i

lh e D

(6.5)

I

(i)

Access protocol.

(ii)

Topology and media.

(ii}

Response time.

(b)

What are bridges and gateways?

(c)

Differentiate between static and dynamic channel allocation. techniques. Give examples for each.

(3)

(3.5)

(6)

(5)

(2)

(5.5)

'I

3

P.T.O.

(

,.

UNIT - IV What is routing?

Mention different types of routing. In particular,

explain shortestpath Describe .

(b)

routing algorithm

the, reasons for congestion for congestion control. .1

methods

:

,

in detail.

(4)

in' network and describe

.

(4.5)

How is error control achieved in ATM? Explain how the cells are

(c)

(4)

routed in ATM. Q .. 9. (a)

Discuss"

Count to Infinity problem"

routing algorithm (b)

(c)

N ,

.

~

,

~

Discuss

in detail.

the following:

(i)

ATM cells

(ii)

ATM signalling

n r e orth

g n i r e e n ngi •••

E a i Ind ;.

I

1.

"

t

.;

Name

which does not suffer from this problem.

Explain Leaky bucket and Token bucket congestion algorithms

t .

in routing algorithm.

I~

!.

4

control

ew N , e g lle o C

(4.5)

i

lh e D (4)

(4)

"r



..•

.' \.

. ,:~:..

'.

,.

,

(Plea.se write-your Exam Roll No.]

Exam Roll No

.

END TERM EXAMINATION MAy

2011

Paper.code: ETIT30B Subject: Digital Signal Processing Time: 3 Hours Maximum Marks: Note: Attempt 'one question from each unit including Q.no.l which is compulsory.

Q1

75

I

(a) Let x(n) = 26(n + 2) - 6(n + 1) + 36(n) - 6(n -1) + 26(n - 2). Evaluate

=

(i) X(eJ"')w

0

(ii) [. X(eJ"')iw

(iii) X(eiaJ)w

= 2;rr without explicitly

finding X(eiaJ). (b) Find the state variable matrix A, B, C, D for the input relation given by the equationyen)

= 2y(n

-1) + 3y(n -

2) + x(n) + 2x(n -1) + 3x(n

(6)

output (5)

- 2) .

(c) Derive the relationship between DFT (i) Z transform (ii) Fourier transform of an aperiodic sequence. (4) (d) Discuss the design of digital resonator. (5) (e) Derive the input and output relation for a system function h(t) if the input signal x(n) is random. (5)

i

lh e D

Q2

ew N , e graphically g e l l + o-I) + 2). (6.5) C

UNIT-I (a) Perform the convolution of the following two sequence

= {(I12t

g n i r (b) Find the 'Z' transform the e fallowing sequence:e n (i) = gi (ii) n E .transforrn(a) Find theia inverse Q3 d 1 n I (i) X(Z)= 1+1I4Z-IZI>2 (ii) X(Z) = 1-1/4Z-1 n r (1-1I2Z- Y' 1+5/6Z+1/6Ze h t r o (b) Compute the DTFT of the following:hen)

x(n)

o

0 :S n s; 2 , x(n)

otherwise

n(l/2)"u(n-2)

= D(n)

D(n

46(n -

(6)

x(n)=lIn(-2r"u(-n-l)

(6)

'2.'

1

I

N '''

(i) x(n)

= u(n)

(ii) x(n) = Cos aun with

0)0

,

,IZI>1I2

2

(6.5)

= Zn 15.

(iii)yen) - 3I 4y(n -1) + II 8y(n - 2) = x(n)

..

u '\-

.

~,

~/

Q4

I"

, I

Q5

UNIT-II (a) Perform the circular convolution and linear convolution for the X2 (n) = {1,2,3,4}. Discuss the result. (6.5) input sequence XI (n) = {1,2,3,!,2} (b) Determine the DFT of the given data sequence x(n) = {-1,2,-3,4,9,-20,12,6}usingDIT algorithm. (6) (a) Prove the following properties of DFT when X(k) is the N point DFT- (6) (i) If x(n) is real and odd. (iil If x(n) is purely imaginary and odd. (b) Calculate the IDFT for the given coefficient - X(k) = {38, - 5.828+ j6.07, j6, - 0.172 + j8.07, -10, - 0.172 - j8.07, - )6, - 5.828 - j6.07} using DIF structure. (6.5)

1.1,t'

1.

P.T.O.

[-2-] ~. Q6 .\



1 \ ..

.~

UNIT-Ill

(a) 'Eor the following causal linear shift invariant system factorize H(Z) in form H(Z) = H min (Z)Hap (Z) ,

,

i /

(i) H(Z)

r-

= (1- 3Z-

2

1

1+ 0.5Z-

(6)

1- 0.75Z-1

the random process X(t) = ySinnot + ZCosnot where. no is Y and Z are uncorrelated random variables ie E[Y,z] = E[Y]E[Z] = 0, with zero mean and variance CJ2. (i) Find mean of X(t) (ii)Auto correlation of X(t). (6.5)

(b) Consider constant.

,,

.

Q7

(a) Explain the sampling theorem in the frequency domain. Discuss (8.5) the design of zero order hold ckt. (b) Consider a linear shift invariant system with system function Z-1 -a*

i

H(Z)

= l-az-I

lal < I.

I

1 ~;.:~

e N , Q8 (a] Give the system transfer function H(Z)'- e Z2 g (Z -lI2XZ -l13XZ -114) e ll form (iii)canonic form. (6) o realize H(Z) as (i)parallel form (ii)cascade C (b) Design the digital butterworth g filter satisfying the constraint given n ri below T=1 using bilinear transformation e e 1112 $IH(eJOJ)I$l for (6.5) gin O$OJ$;r12 n IH(eJtl)1 E $ 0.2 f?r /4$ OJ$ n: a i d n I Q9 (a) the properties of Chebyshev polynomial. (2;5) nDiscuss r e (b) Design a high pass filter where the desired frequency response is h t r given below with and S using a window with stop No .) {e- OJ·
,t;

", l f'; i ,I,

i;,', <



i

-I

37l'

t . , I

T

=3

(j)c

=

2rad I

JOJZ

.,

\ ',I

i

lh e wD

(i) Find a difference equation to implement this system. (ii) Show that this system is an all pass system.

(4)

J

'. .

************

0

otherwise

CD

,.

'.

(Please write your Exam. Roll No.)

Exam. Roll No

: :

.

END TERM EXAMINATION SIXTH SEMESTER

[B. TECH.], Subject:

Paper Code : ETCS - 310

"

MAY - 2011 Data Warehousing

Maximum Marks: 75

Time: 3 Hours . Note:

Q. 1 is compulsory. Attempt any Four questions from the rest.

~

"

"

& Data-Mining

Q. 1. Answer the following questions in brief: (a)

Differentiate systems?

between

the operational

(b)

What are junk dimensions?

(2.5 x 10=25) systems

and the informational

i h l e

Explain.

D w e N , .' (d) What is meant by slice and dice? Give-example . e g lle Ce) Whit are the characteristics of strategic information? o C not a product. Discuss. g Cf) A datawarehouse is an environment, r in '11/ r e I,: +.: . ,(g) Expalin the benefits -ofiOLAP e. n g I, . , (h) Adatawaiehouse nis different from datarnart. List out the diffrences E a tosilpport: ithe statement. d n I (i) . What n is the significance of metadata in a datawarehouse? r e rtU)h How ar~ the.; users of the datawarehouse classified? o N (c)

What are the various techniques conducting an interview?

which should be kept in mind while

'-,

,

..

~

I

I

-.

"

·'1

~

",'

.'

}

.

. Q. 2.' (a) ','

,•

.

:. !i . What are fhe various ways by which a corporate can provide strategic information for decision making? Explain each in detail. Which one is the best and why? i I

(b) .'

'

.

Explain.snapshot and transaction '" example. How are they related?

fact 'tables with the help 'of an .

.

','\.

Q. 3. (a) ':f~'. . "

.

(7.5)

Explain' F,ive characteristic

(b)Wootare

hypercubes?

features of a datawarehouse

How do they apply in OLAP?

in detail.

(7.5~ (5)

'I.···

P.T.O.

-::;.r:r-._. "

"

jll;

,,~ ,,"

c

, )

'

..

Q. 4. State all the guidelines of Dr. Codd's for " ',' 'description about each. Q. 5. (a)

What are the various models of OLAP? Explain each in detail,

(b) "What are the, various ways by which data is prepared for storage (~ thedatawarehouse?

'.;-

.~"

an OLAP system 'giving brief

Q. 6. (a)

."

"

List out the various reasons why the traditional method of analysis .provided in the datawarehouse are not sufficient?

, , (b) , What ~re the possible aggregates in wFlIChthe fact tables may be

(12,5)

(1.5) (5)

(5) (5)

formed? .

'j

:

What are the various types of metadata? Explain in detail.

D(7.5) w e N , ! ,,-, ' e dimensions, (5) (b) Suppose that a datawarehouse of sales consists e of g four ll measures: dollars namely, 'q~e, item, branch and location andotwo C sold and unit - sold. Draw a star schema g and snowflake schema for n .~:~~r-~: . i r '::~~:;' the given datawarehouse. e e i n i fft<::,·~_··~I. g Q . 8. Define the following : En (12.5) a i (a) OL1P n ,: d I ndown and Rollup , r (b) e Drill rthJoint AppiiJation Development (lAD) (c) o N (a)

'I

What are tpe. basic components of a datawarehouse? Explain with the help of a' diagram. ' '

!

I

:";'

,-

:

.

t,!;.

o

i h l e

(2.5)

1 1 "f

. t?!'),,'>,

'

!

j

,

(d)

Starjoin

a~d Starindex I

'f"

,:' ,

,!t

:~;r:;.-~.,:;~':: ' ,'#

\~!" !.: t 'I

-I,

\':;~:/

".

':,"

;.,' Iii:

.I

~.

;

. ..-. :~

•••

'.

~\ ' .,

i .1,-i

','

2

.

;

(Please write your Exam Roll No.)

Exam Roll No.....•..............•..

END TERM EXAMINATION SIXTH SEMESTER B. TEcH. - MAy 2011

Paper Code: ETIT312

Subject: Digital

Time: 3 Hours

Maximum Marks:

Note: Attempt five questions including

Q1

Q2

N

75

I

Q.no.l which is compulsory.

SECTION-A Attempt any ten questions of the following:(2.5xlO=25) (a) What is the code rate and constraint length for (3,1,3) convolutional code? (b) Why are trellis diagram preferred over state and tree diagrams for convolutional encoders design? (c) Define Free distance and correcting capability of a convolutional codes. (d) Name two algorithms used for decoding concolutional codes. (e) Given a=11001101 and b=11010010 are two codewords of length 8. What is the hamming distance between the two codes? (f) What is extended binary Golay code? (g) Suppose we have an unbalanced coin that is three times more likely to yield a head then a tail. What is the entropy of this lanuage? (h) What is meant by systematic and non-systematic code? (i) How syndrome is calculated in Hamming codes and cyclic codes? U) Define code efficiency. (k) What are the advantages of cyclic codes?

g n i r ee n i ng

ew N , e g lle o C

i

lh e D

SECTION-B UNIT-I (a) Define entropy and briefly state its properties. (4) (b) Show that if H(yIX)=O,then Y is a function of X, ie for all x with p(x»O, there is only one possible value of y with ptx.yp-O. (8.5) OR Define relative entropy and mutual information between two random variables. (4) The world series is a seven game series that terminate as soon as either team wins four games. Let X be the random variables that represents the outcome of a World Series between team P and Q; the possible values of X are PPPP, QPQPQPQ and QQQPPPP. Let y be the number of games played, which ranges from 4 to 7. Assuming that P and Q are equally matched and the games are independent, calculate H(X),H(Y),H(YiX) and H(XiY). (8.5)

n r e orth

Q3

Communications-II

E a i Ind

UNIT-II (a) Consider the code {O.Ol}. Is it instantaneous? Is it uniquely decodable? Is it singular? (3) (b) Find the binary and ternary Huffman codes for the random variable X with probabilities p Consider

a random

= (~

~

~

~

~

(9_5)

~).

21'21'21'21'21'21

variable

OR X which

takes

on 4 values

with

pro b a bili 1 rties p = (1 _ -1 _1 _1) . . 3'3'4'12

P.T.O.

e write your Exam Roll No.)

Exam Roll No

.

END T RM EXAMINATION SEMESTER B.TECH. MAY-2010

Subject: Microprocessor Systems Maximum Maries :75 from each unit including Q.1 which is compulsory.

Q1

(a) Convert (i) (1011011 )gray to binary code (b) (10010011)2 to gray ode. (c) Why are the port r es of programmable port devices automatically put in the input mo e when device is first powered up or reset? (d) An IRET instruction rather than a regular RET instruction is used at the end of each ISR. Why? (e) What frequency tra smit clock (TXC)is required by an 8251A in order for it to transmit dat at 4800Bd with. a baud rate factor of 16? (f) Explain term "virt al memory". How much virtual and physical memory can be sup orted by 80286? (g) How will you com te physical address of memory using effective address? Explain wi suitable example. (h) How does assem ly language statement differ from directive statement? (i) Explain 8086 flag re ister. (j) Which instruction s ould be used to determine if bit 3 of register AH is high without ch ging its contents? (2.5xlO=25)

i h l e

o C g

UNIT-I assembly language program is developed and em tools? Explain function of the following:- (6.5) NDS (iii)EVEN (iv)RECORD model for an 8086 microprocessor with proper ueue of 8086 updated? (6)

Q

(a) Describe how an debugged using sys (i) SEG (ii) (b) Draw programmers labels. When is the

Q

(a) Explain the demul ·plexing of ADo-AD15bus in 8086 with latch. Aid your answer with s itable diagram. (6.5) (b) Explain the followi g signals:(6) (i) TEST (ii) N/MX (iii)BHE (iv) RQ/GT

rn e h t r o

N

, e ll eg

D w e N

Q

Q

ia d In

n i r e e in g En

UNIT-II (a) Write a program to find out largest number from an unordered array of sixteen 8-bit embers stored sequentially in memory location starting at offset 0 OOHin the segment 2000H. (6.5) (b) Show the assemble directives and instructions to be used to initialize the interrupt poin er table location for a type 0 procedure, DIV-OERROR and type 2 procedure, POWER-FAIL.' (6)

(a) Write assembly Ian age program to fmd:(6) (i) Whether given tring is palindrome or not. (ii) Factorial of given number (b) Discuss the action performed by 8086 micro processor in case of (i) ROL and (ii)IDIV i structions. (6.5)

P.T.O.

~,

"

\

[-2-]

~-

..--~~

, ~(c) Write short notes on Fuzzy logic. :' (5) ~\' OR "," 'T,.i"YtlaVWha~ are impo t challenges~in Natural Languages Understandinf(:?(2) '" ~,~ '\'."~D)What'lare the vari us applications of NLP? ' (3) \ 'l"'(c)Explai~ the v rious activities which are performed duril1g '. 'Morphological A alysis and Syntactic processing with the help of ,1 ,; following sentenc : I want to see Raju's photo; (10) UNIT-IV , (a) Give short descri tion of process of learning using Back Propogation Neural Network. (10) (b) Give a flow graph for developing a genetic algorithm. (5) ,

OR (a) What, procedure i (b) What are. the vari (c) What is the role Give one example

followed for knowledge acquisition? (4) us steps for development of Expert Systems? (7) f expert system tools in developing expert system? of such tool and its usability. (4)

i h l e

************

, e lleg

o C g

·~ ~'i

rn e h t r o

ia d In

N

I

I

n i r e e in g En

D w e N

rite your Exam Roll No.)

Exam Roll No., ......•...............

EXAMINATION ode: ETCS304 Hours Note:

ttempt any five questions.

Ql

What do you mean by equirement Elicitation? What are the different components of Requirem nt Elicitation Activity? Discuss the role of usecase in requirements elic' ation. (15)

Q2

(a) Discuss in brief the s ength and weakness of the following life cycle models:(10) (il Evolution Model (ii)Iterative-incremen (iii)Code and fIx

i h l e

(iv)Waterfall (v) Spiral

D w Ne

(b) You are a software e gineering consultant and have been called in by the vice-president for finance of a corporation that manufactures and sells boots. She wan s your organization to build a product that will monitor the compa 's stock, starting with the purchasing of the leather and keeping track of the boots, as they are manufactured, distributed to indivi ual stores and sold to customers. What criteria would you use in sel cting a life-cycle model for the project? (5)

, e ll eg

o C g

Q3

n i r e e in g En

(a) Discuss the analysi analysis model?

model in OOSE. Why is it essential to develop

(b) Discuss model archi ecture in 0-0 methodology. Q4

N

Q5

Q

Why do you mean b maintenance of software? What is corrective, preventive and adaptiv maintenance? Approximately what percentage of is life does a software goes under maintenance? Does OOSE follow any special type of mainten nce? Discuss in detail. (15) (a) What is the import

ce of testing? Is testing an Umbrella Activity? (5)

(b) Compare white box esting with black box testing. (c) What do you mean Q

(7)

List and compare vari us steps for development of a software using procedural approval wi h the object-oriented software development. Why do you think that OOS methodology is better? Discuss in detail. (IS)

n r e

h t r o

ia d In

(8)

(5)

y Regression Testing? How is it accomplished? (5)

Draw a class Diagr , use case diagram, sequence diagram and collaboration diagram or Library Management System of an institute. (15)

************

\8

( tease write your Exam Roll No.)

END

EXilm Roll No

.

ERM EXAMINATION S

XTHSEMESTER

B.TECH.

MAY-2010

Su~eccCompu~rNe~oms

P per Code: ETCS306/ETlT306 'rne: 3 Hours

Maximum Mams :75 compulsory. Internal choice Is indicated.

".j

Choose the correct or best alternative i!l the following:(2.5xlO=25) (a) The routing of da grams _ (i) Must follow a fi ed path (ii) Occurs on a virtual Circuit (iii)Can occur over different paths (iv) Occurs exponentially (b) The RG number g' es us information about. _ (i) All o.fthe these (ii) Optical fiber (iii) Twisted pair (iv) Coaxial cable (c) The _'_'_l _" channe is used for application's requiring a transmission greater,than 64 k ps. (i) B (ii) D (iii) H (iv) All of these. . (d) The -rep 'sliding w ndow _ (i) Can be used to control the flow of information (ii) Always occurs hen the field value is O. (iii)Alw~ys occur hen field value is 1. (iv)Occurs honzo tally . , . (e) Which of the foIl wing is considered a broad band communication channel? (i) Coaxial cable ii) Fiber optics cable (iii) microwave circuits (iv) all of above. (f) Bit stuffing is use to _ (il Fad' insufficie information (ii) Distinguish be inning and ending flags from information. (iii)convert 8-bit ords into 16 bit words. (iv)Fill a data tur ey (g) In which topology data packet is removed by source destination? (i) Ring (ii) Bus (iii) Star (iv) None (h) UDP is used with Protocol. (i) Trivial File Tr sfer (ii) ICMP (iii) LDAP (iv) All of above (i) In which routing ethod, do all the routers have a common database? (i) link vector (ii) distance vector (iii) link state (iv) non of the above Ul Which of the follo 'ng is a four wire Gigabit Ethernet implementation? (i) 1000base-SX (ii) lOOOBase-LX (iii) lOOOBase-CX (iv) lOOOBase-T

---"1 I

i h l e

v

, e g e l l o

D w Ne

C g in

rn e h t r o

N

2

ia d In

r e e n i g n E

(a) What are som of the factors that determine whether a communication s stem is a LAN, MAN or WAN? (5) (b) Defme the term onnection-oriented as used in data communication and relate it to T P. (5) (c) What are the b nefits of using layered protocols? Discuss some of

them. ." I.

Q2

(2.5)

OR (a) What is a peer-t -peer process? What are heades and trailers and do they get adde and removed? (b) Discus the mod s for propagating light along optical channels proper diagrams. (c) What do you m an by network topology? Discuss the problems benefits of any t ee topologies.

how (5.5) with (3)

and (4)

P.T.O.

---"1

[-2-]

Q

(a) What ate, the vario s data link layer design issues? Explain stop-andwait ARQ protocol 'th suitable diagrams when (i) Frame is lost (ii)

m

~K~~~

(b) Name different typ s of HDLC frames and give a brief description of each. (5.5) OR (a) Explain the encap ulation of PDUs in TCP/IP and addressing with suitable diagrams. (4.5) .(b) How is eRC superi r to the two-dimensional parity check? How does the checksum c ecker know that the received data unit is undamaged? (8)

Q

(a) What do, you me by multiple access communication? What is the role of MAC protoc Is? (5.5) (b) Explain Ethernet p otoco1with special reference to frame format. (7)

Q

OR

, e g e l l o

,- f'; Q

D w Ne

C g in

(a) Explain the Ie bucket algorithm and illustrate how traffic congestion can be educed. (7) (b) A routing algorith should have global knowledge about the state of the network to pe orm its task. Give various goals and objective to be considered in rou 'ng algorithms. (5.5)

I

5

r e e n i g n E

OR

(a) Explain :the Le bucket algorithm to control congestion. Explain how the ,drawback of this are overcome in a token bucket algorithm?(6) (b) Are both UDP and IP unreliable to the same degree? Why or why not? (4) (c) Can the value of eader length in an IP packet be less than 5? When is it exactly 5? (2.5)

rn e h t r o

N

i h l e

(a) Discuss the follo . g with reference to LANs. (6.5) (i) Exponential ba off algorithm (ii) CSMA/CD vs CSMA/CA (b) What is the maxim m number of subnets in each case? (6) (i) Class A; mask 255.255.192.0 (ii)'Class B; mask 55.255.192.0 (lii)C1ass C; mask 55.255.255.192 (iv)Class C; mask 55.255.255.240

Q

ia d In

************

Exam Roll No

.

SIX H SEMESTER B.TECH. MAY-2010

Pa er Code: ETIT/ETIC/ETEE30B Ti e: 3 Hours Note: Attempt one questio

Subject: Digital Signal Processing Maximum Marks :75 from each unit including Q.1 which is compulsory.

(a) Define DFT of a pe Derive the expressio (b) Give the sequences w(n), commonly use (c) Define the Chebysh to build up higher 0 (d) Obtain DTFT for x(n (e) An FIR digital filter it impulse respons odd integer.

iodic sequence x(n) with length N of its period. to obtain the sequence x(n) from its DFT X(k).(4) defining at least five different window functions in FIR filter designer. (4) v polynomial CN(X).Obtain the recursive relation der Chebyshev polynomials. (4) ==u(n). (4) atisfies the condition h(n)==h(N-I-n), where h(n) is and N is its length. Determine H(eJw) if N is an (4)

Ql

(1) H(z)

=

D(z)

are real constants, answer by proof.

(a) Find

Q

the

(i) x(n)

z

= sin nwo .j.i(n)

yen)

(ii) x(n)

o C g

= -anu(

-n -1) .

ia Ilx(nt d In 00

Q

(a) Show that

ern

h t r o

N

Q

n=-oo

(b) If x(n) is real and even.

ROC

D w Ne

in

each

(3+3)

(3)

of the system characterized

by

~ )y(n - 2) + x(n) .

-

1

2Jr

1t

JIX(ejW)1

case

Izi < !. 2

= log(1- 2z),

n i r e e in g En -1) -

e, g lle

UNIT-I ansforms, glYlllg

the fre uency response

= (5/ 6)y(n

aO, aI, a2

hat will be the expression for D(z)? Justify your (5)

(b) Find inverse z-tran form given X(z) (c) Determine

i h l e

+a]z-I +a2z-2and

N(z) Is an all pass filter. If N(z)=ao

(3.5)

2

(4)

dw.

-1t

ven show that its DTFT, X(eJW)

is also real and (4)

00

(c) Find the DTFT of t e periodic sequence given by

Io(n - kN).

(4.5)

k=-oo

UNIT-II (a) Define circular con olution of two periodic sequences x] (n) and X2 (n) . Show that x](n) N x2(n)givesDFTas X (k).X2(k). (3) (b) If x(n)DFT X(k), fin the DFT of X(n). (3) (c) Why FFT is so imp rtant? What are its advantages? Develop the DITFFT algorithm. D aw the complete flow diagram taking sequence length N=8. (6.5) j

Q

(a) Given the system function: variable; 4I.B~;Cla

~~~--

H(z)

=

2

Z-l(l + 3z-] + 4z- )

find the state

1+7z-1 +6z-2 +5z-3

(4) P.T~O.

D.

~\

/ ~2~

I

(b) Give L!!~

the

state

[_°2: _13]..11 ~

variable

f: ~[- 2 -11·

~].

D ~ [IJ.

matrices Find

the

as

corresponding

systerh function H(z). (2) (c) Explaini briefly th sampling techniques; the impulse sampling, the natural! top sam ling and the flat top sampling. Give circuits how these are realized. Also, explain the merits and demerits of each of these ~~fhniques. (6.5)

6

UNIT-III (a) Design a linear p ase FIR filter, given the desired frequency response j4w /6 :$ w :$ 7r /6 . Hd(ej(~):= Use Hann WIndow. Determine the

. , {e-

o

otherwise

response h(n) for e causal design. (b) Realize! the syst m function as structu:t:"es, given

7

(a) Derive the relatio and the z-domai domain. (b) By using Impuls b Ho(s)

=(

)2

b2

(z)

=

(c) Defme

+

minimu

parallel

z -I

(1 -(jz1 -1)(1 -31z -1)( 1-21z -I)

and

canonic

i h l e

.

(4)

D w e N

for bilinear transformation connecting s-domain Show. the mapping of points In s-domain to zInvariant

Response,

to H(z).

phase

, e lleg transform

o C g

n i r e (1-lz-I)6 e n i~Z') g (I-~Z-} n E ia d In s+a

(8.5)

cascade,

and

maximum -phase

(6.5)

the analog filter

(3) filters

current

5z-l)

into

the

form

H(z)=Hmin(Z).Hall(Z). Where

H(z)~

Hmin(Z)is a minim m phase and H~lI(z)is an all pass filter.

ern

h t r Nj oi>

8

!

UNIT-IV (a) Design a digital B tte"rworth filter, meeting the specifications:Password stop band

0.8 :$IH e'W)I:$1 jw

IH(e :$

0.21

0.77rlwl:$ 7r 0 :$Iwl:$ 0.2;r

':

',-~,

'.',

use

bilinear

transformation

and take T=1. (8) (b) Give the frequenc transformation to transform a lowpass filter: with pass bahd 0 to B p to a high pass filter, with pass band wp to J(. Derive , the vaftie of a in erms of Bp and

9'

(3)

Wp.

b

(4.5)

(a) For a lite leng Register with b+1 bits and the rounding off as the quanclz!tion me od, fmd the .. (4) (i) meH me of th quantization error e(n), (ii)Vanance (1'.2 of the quantization error e(n). ; t, . (b) Ifthe'~Bdveerr6f·signalis·pa.ssed through a digital system hen). What wouldlbb,the me andvariance of the output sequence? (4) (c) For a ta!ndom se ence·x(n); how do we compute its Power Spectruni Density 1 (PSD)? ' ssume" the random process as stationary and is ergodic in the firs and second moments. (4.5) ************

( tease write your Exam Roll No.)

Exam Roll No

END _

.

ERM EXAMINATION Sl THSEMESTERIB.TECH.) MAY-2010

....

=oJ

I!' per Code: ETCS31()_________ Time: 3 Hour!>.____

'-___Note:

Subject; Dati;Warehousing & Data Mining Maximum Marks :75 Att...empt~~y ve questicmsincluding Q.1 wt.!_i.ch is compulsory. _]

[5 x 5 = 25]

1. Short answer type:

a) Explain the materialized view of data warehouses. b) Differentiate between 0 AP and OLTP. c) What do you mean by s bject oriented, integrated, time variant and non volatile collection of data in dat warehousing? d) Differentiate between cl sification and clustering. e) What are the advantages of star schema? Explain.

i h l e

2. a) What are the differen data extraction and data cleaning techniques? Explain. [5] b) Discuss the data wareho e architecture with all its components. [7.5]

D w Ne

3. a) What is metadata? E lain. [2.5) b) What are data marts? H w they are different from traditional data ware houses?[2.5) c) What is multidimension I data model? Explain. [7.5]

e, g e 4. a) What are the features of snowflake schema? What is fact constellation? (7.5] l l o b) What are the necessary teps to cluster large databases? Explain. [5] C g 5. a) Explain the followin [7.5] n i i) MOLAP ii) OLAPer iii) HOLAP ebe represented in a relational databases? Explain.[5] b) How multidimensional n odel i ngb knowledge discovery process? 6. a) What do youE mean [5) b) Write down the differe t steps for design and implementationofOLAP models.(7.5] ia d n is a decision tr e? Where they can be used? I 7. a) What [5] n erb) How OLAP is implem ted in query languages? Explain with example. [7.5] •••

N

h t r o

8. a) Explain various data mining techniques. b) Explain the following t nns: i) drill down ii) 011 up iii) slice and dice

************

[5J [7.5J

Exam Roll No ........•..............

Please write your Exam Roll No.)

ERM EXAMINATION

END

MAY-20lO Subject: Digital Communication-II aper Code: ETlT312 Maximum Marks :75 ime: 3 Hours Note: Attempt one que lion from each unit including Q.1 which is compulsory. (a) (b) (c) (d) (e)

State and explain the Why information is a Explain the limitatio Explain the characte Describe the relation (f) Describe in brief abo (g) State and explain 'Sh (h) Differentiate between

2

3

(4) (3) (3)

properties of Mutual Information. measure of logarithmic function? s of Huffman Coding. 'sties of Markov Source. etween Hamming weight and Hamming distance. t Golay codes. non's Information Capacity Theorem. block codes and convolutional codes.

(3) (3) (3) (3) (3)

UNIT-I (a) What is the signific nce of Information Theory? How it helps in making the communication syste more efficient? (4) (b) An event has 6 po sible outcomes with probabilities PI=I/2, P2=1/4, P3=1/8, P4=1/16, Ps=I/32, P =1/32. Find. the maximum entropy and the entropy of the system. (8.5)

H(X)c

--

f I, (x) logz .fx(x)dx

, e g e l l o

rn e h t r o

(8.5)

C g in

UNIT-II (a) State and explain sou ce coding theorem. (b) Determine the mpel Ziv Code 01001111100101000 01010101100110000. encoded stream.

ia d In

(4)

that is

b / sample. Find the probability density function fx(x)

for which H(X)is max' mum.

r e e n i g n E

(a) Explain in brief Shan (b) Consider a DMS with (i) Determine the Huf (ii) Determine the ave (iii)What is the efficie

i h l e

D w Ne

(a) Prove the given relati n from first principles H(X,Y) == H(X) + H(Y / X). (b) With the differential ntropy of a random variable X defined by equation, C/j

(3) for the following bit stream Recover the original sequence from the (9.5)

on-Fano algorithm. ource probabilities {0.35, 0.15, 0.2, 0.05, 0.25}. man code. age length of codewords. cy of the code?

lJ~lt:1JI (a) Explain the salient fea ures of Reed-SolemHn codes. (b) Consider a single erro correcting code for 11(eleven) data bits(i) How many check b'ts are required? (ii) Find the parity che k matrix H for this code.

N

I

(4) (8.5)

(4) (8.5)

(a) Write a short note on CH codes. (4) (b) The parity check bits 0 a (8,4) block codes are given by(8.5) C1=ml+m2+m3 C2=m +m2+m3 C3=ml+m3+m4 C =m2+m3+m4 Where ml, m2, m3 and m4 are the message bits. Find he generator and parity check matrix for this code.

Q

Q

UNIT-IV (a) Give the block diagram of a constraint length 2/3 con olutional encoder and explain its operation. (6) (b) Draw the state diagra for convolutional encoder 'th one bit shift registers of constraints length 2 a out puts vI=I, v2=I+x. (6.5) (a) Explain Viterbi's algori hm in decoding convolutional codes. (b) What is cryptography? xplain various cryptographic techniques

************

\ (6) and their features.(6.5)

NIEC IT 6 Semester.pdf

Northern India Engineering College, New Delhi. cD ·END TERM EXAMINATION. IT fl. (Please write your Exam ~oll ... Q1 (a) How doyou pass parameters to macro? (5x5=25). (b) Draw the timing diagram of I/O write cycle of 8086. ... was a problem loading this page. Retrying... Main menu. Displaying NIEC IT 6 Semester.pdf.

2MB Sizes 0 Downloads 156 Views

Recommend Documents

NIEC Trends Report.pdf
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. NIEC Trends Report.pdf. NIEC Trends Repor

NIEC Trends Report.pdf
Regional Interpreter Education Center at Northeastern University. Western Region Interpreter Education Center at Western Oregon University and El Camino. Community College. The National Consortium centers are funded from 2010 – 2015 by the U.S. Dep

0Alf-, :it& __ i 6 4 Iv
Mar 15, 2016 - DIVISION MEMORANDUM. To: OIC, Assistant Schools Division Superintendent,. Chief, School Governance and Operations Division (SGOD),.

NIEC E & C Engineering 3 Semester.pdf
(a) Determine the frequency responses at 0=0 and O=n for the system. described by the difference equation yen)= ~y(n -1) -~y(n - 2) + x(n) .(8.5). ·66. (b) Find the Nyquist rate and the Nyquist interval for each of the following. met)-_[sin ~O 1ltJ

NIEC E & C Engineering 5 Semester.pdf
(1) A closed loop control system has characteristic equation as 2S3+3S2+S=O. State whether the system is stable or not. Justify your answer. (g) Explain why root locus always start from open loops poles and terminates at. open loop zeros or infinity?

NIEC E & C Engineering 8 Semester.pdf
(h) Ifl:he on chip oscillator frequency for 80C51 is 11.059MHz what would be setting of. TH1 to obtain a baud rate of 960bps with SMOD cleared to O? (i) Name any four bit manipulation instruction in 8051. Ul What is the difference between MOVXand MOV

NIEC E & C Engineering 7 Semester.pdf
NIEC E & C Engineering 7 Semester.pdf. NIEC E & C Engineering 7 Semester.pdf. Open. Extract. Open with. Sign In. Main menu.

NIEC E & C Engineering 8 Semester.pdf
Q1 (a) Why do you need a cross compiler? (2.5xlO=25). (b) What is the meaning of Task Service functions? (c) Explain Inter Task Communication. (d) What is an embedded system? (e) What is USART? (f) If 8051 operates from a 12MRz crystal what is the du

GNDEC B.Tech IT Sem 6 Dec 2009 Network Operating System.pdf ...
j) Write the important features of FDDI Technology. J-534 (8129) P.T.o. ... Q6) Discuss the different types of Licensing policies which can be used while ... Displaying GNDEC B.Tech IT Sem 6 Dec 2009 Network Operating System.pdf. Page 1 of ...

GNDEC B.Tech IT Sem 6 2009 Advanced Internet Technologies.pdf ...
Page 2 of 2. Q2). Q3). Q4). Q5). Q6). Sectio.n - B. (4 x 5 = 20). What is FTP? Explain in detail where it is used. What do you mean by Telnet? Discuss its ...

IT Technician Job Description 6-15.pdf
District – Information Technology Technician. Job Group: Data Processing. Classification: Classified. Terms of Employment: Pay Grade 11 on the Classified ...

IT Technician Job Description 6-15.pdf
Knowledge of Macintosh and Windows Operating Systems/hardware, TCP/IP protocols, Ticket/Work. Order System, and MS Office products. Licenses and ...

Module 6 Rejection hurts, but is it fatal? -
Do additional experiments or data analysis if needed. • Make appropriate revisions in manuscript. • Point-by-point response to comments by the editor and.

6
Oct 1, 2015 - SCHOOLS GOVERNANCE and OPERATIONS DIVISION ... Procedure: A Motivational Approach in Safeguarding School ... IF, fl 030, Q. 3 O. `-' ...

Wrox.Beginning.PHP.6.Apache.MySQL.6.Web.Development.pdf
Page 3 of 838. Wrox.Beginning.PHP.6.Apache.MySQL.6.Web.Development.pdf. Wrox.Beginning.PHP.6.Apache.MySQL.6.Web.Development.pdf. Open. Extract.

Grade 6 Overview - Tahanto 6
Email: [email protected]. Phone: 508-869-2333 ext 2201. Course Objectives. Reading. *Understand the power of words and images to transform lives and ...

Grade 6 Overview - Tahanto 6
Email: [email protected]. Phone: 508-869-2333 ext 2201. Course Objectives. Reading. *Understand the power of words and images to transform lives and ...

it
Sep 21, 2016 - Participation of both public and private schools shall be subject to the no- ... Please be guided with the attached guidelines and mechanics of the contest. For your ..... Trophies shall ase be given to alI the winning teams. • . 0.

It >
sage'through the vertical nip-of 'the reverse press, then 'travels around zthe plain :roll of this 'press onto the :upper horizontal :run of another felt it which conveys ...

CV (6-6-16).pdf
2011 M.A., Forensic Psychology, John Jay College of Criminal Justice. Thesis title: Forensic confirmation bias: A review and extension to handwriting evidence.