Download - Alagappa University

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
ws 2
DE-2009
11
DISTANCE EDUCATION
M.Phil. (Computer Science) (NS) DEGREE EXAMINATION,
MAY 2011.
RESEARCH METHODOLOGY
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1.
Write in detail the general format in thesis writing method.
2.
Write short notes on :
3.
(a)
Actual investigation.
(b)
Literature survey.
Solve the following LP problem :
Maximize Z  3 x1  5 x2  2x3
subject to x1  2x2  2x3  14
2x1  4 x2  3 x3  23
0  x1  4
2  x2  5
0  x 3  3.
4.
Solve using revised simplex method for the problem :
Max Z  x1  2x2  3x3  x4
subject to the constraints x1  2x2  3 x3  15
2x1  x2  5 x3  20
x1  2x2  x3  x4  10 and
x1 , x2 , x3 , x4  0.
1
DE–9024
ws 2
5.
Explain in detail about window management and its architecture.
6.
Discuss on the concepts of Data management and the system overview of
multitasking.
7.
(a)
Explain terminal emulator.
(b)
Elucidate the elements of system software tool.
8.
Write short notes on :
(a)
Asynchronous communication
(b)
Keyboard management.
———————
DE–2010
12 A
DISTANCE EDUCATION
M.Phil. (Computer Science) (N.S.) DEGREE EXAMINATION, MAY 2011.
IMAGE PROCESSING AND PATTERN RECOGNITION
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. Discuss the features of any four image sensing and acquisition devices.
2.
Write a note on :
(a) Raster screen
(b) Grey level transformation
(c) Spatially dependent transformation
(d) Multi image operation.
(5)
(5)
(5)
(5)
3.
What are the basic morphological operations and their uses? Explain how
these operations are used to construct the complex operations.
4.
What is meant by compression? Explain any two compression techniques used
for lossy compression.
5.
Discuss the following decision functions in detail :
(a)
Linear decision function
(10)
2
DE–9024
ws 2
(b)
6.
Implementation of decision functions.
(10)
Explain the following pattern recognition algorithms :
(a)
Cluster seeking algorithm
(10)
(b)
ISO data algorithm.
(10)
7.
Discuss the features, designing concept, advantages and applications of
pattern recognition system.
8.
Discuss the following in detail :
(a)
Concept of formal languages theory of syntactic pattern recognition
(10)
(b)
Recognition grammar and statistical considerations.
(10)
————————
DE–2011
12 B
DISTANCE EDUCATION
M.Phil. (Computer Science) DEGREE EXAMINATION,
MAY 2011.
Non-Semester
DISTRIBUTED COMPUTING SYSTEMS
(2002 Onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
(5  20 = 100)
All questions carry equal marks.
1. (a)
Discuss the relative advantages and disadvantages of the various
commonly used models for configuring distributed computing systems. Which model
do you think is going to become the most popular model in future? Give reasons for
your answer.
2.
(b)
Discuss the various communication protocols for RPCs.
(a)
How computer clocks are implemented in clock synchronization? How do
clock synchronization issues differ in centralised and distributed
computing systems? Explain.
3
DE–9024
ws 2
3.
4.
(b)
Explain the basic approaches
implementing mutual exclusion.
(a)
Explain any two election Algorithms.
(b)
Explain threads, its usage and implementation.
(a)
Comment on practical ability of the Load-Balancing approach as a
scheduling scheme for the following types of distributed systems
(i)
A LAN-Based
(ii)
A WAN-Based
used
by
different
algorithm
(iii) Processor-Pool model.
5.
6.
7.
8.
(b)
Explain the desirable features of a good process migration mechanism.
(a)
Explain about distributed databases.
(b)
Discuss the various issues in designing a Thread Package.
(a)
Explain the various file-sharing semantics.
(b)
Discuss the desirable features of a good distributed file system.
(a)
Explain bus based multiprocessor in detail.
(b)
Describe the client-server communications in distributed system.
(a)
Describe in detail distributed file system.
(b)
Explain any one network operating system.
————————
DE–2012
12C
DISTANCE EDUCATION
M.Phil. (Computer Science) DEGREE EXAMINATION,
MAY 2011.
Non-Semester
NATURAL LANGUAGE PROCESSING
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
4
DE–9024
for
ws 2
All questions carry equal marks.
(5 × 20 = 100)
1. (a)
(b)
2.
Describe the different levels of language analysis in detail.
Explain in brief about the representation of natural language processing.
Discuss the following :
(a)
Top down parser.
(10)
(b)
Finite state models.
(10)
3.
Explain various Grammars and logic programming in natural language
processing.
(20)
4.
Explain a simple grammar and lexicon with semantic interpretation.
(20)
5.
Explain about
6.
(a)
Semantic networks.
(10)
(b)
Discourse structure and references.
(10)
Give a plausible logic form for each sentence.
We returned the ring to the store.
We returned to the party.
The owner received a ticket.
(20)
7.
Discuss about the semantic and pragmatic roles of noun phrases.
(20)
8.
Write short notes on the following :
(a)
KING
(b)
GUS
(c)
POET
(d)
Current trends in NLP.
(20)
———————
DE–2013
12 (D)
DISTANCE EDUCATION
5
DE–9024
ws 2
M.Phil. (Computer Science) DEGREE EXAMINATION,
MAY 2011.
Non–Semester
NEURAL NETWORKS AND FUZZY LOGIC
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. (a)
Enumerate the principles and promises of neural networks.
(10)
(b)
Explain the applications of back propagation training algorithm.
(10)
2.
Describe in detail about the counter propagation networks.
(20)
3.
Write a detailed note on Boltzmann’s training and Cauchy training Hop fields
nets.
4.
(a)
Explain in detail about Bi-directional associative memories.
(b)
Explain the classification and implementation of Adaptive Resonance
theory (ART).
(a)
Describe the features of holographic correlators.
(b)
Describe the structure of cognition and neocognition.
(a)
Distinguish between fuzzy sets and CRIPS sets.
(b)
Enumerate fuzzy arithmetic and fuzzy relations.
(a)
Summarize the operations of fuzzy sets.
(b)
Describe about pattern recognition of fuzzy systems.
5.
6.
7.
8.
Describe about fuzzy databases and information retrieval systems.
——————
DE–2014
21 A
DISTANCE EDUCATION
6
DE–9024
ws 2
M.Phil. (CS) (Non-Semester) DEGREE EXAMINATION,
MAY 2011.
COMPILER DESIGN
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. (a)
Explain the phase of Compiler.
(b)
Write short notes on Local optimization.
2.
(a)
(b)
What is the role of Lexical Analyzer? Explain.
3.
(a)
(b)
How to handle Shift-Reduce Errors?
4.
(a)
(b)
Explain Top-down Parsing.
5.
(a)
(b)
Write a top-down translation scheme to produce quadruples for Boolean
expressions.
6.
(a)
(b)
What is Hash table? Explain it with necessary diagrams.
7.
(a)
(b)
Construct the DAG for the following basic block :
Explain the ways of implementing a transition diagram.
Write note on constructing Parse Tree.
How to construct a Canonical LR Parsing Tables?
How to represent triple in three-address statements?
What are the contents are available in Symbol-table?
Explain Semantic Errors.
D : B  C
E : A  B
B : B  C
A : E  D
8.
(a)
What are the sources of optimization?
(b)
Discuss Flow Graph with a suitable example.
———————
7
DE–9024
ws 2
DE–2015
21 B
DISTANCE EDUCATION
M.Phil (CS) (NS) DEGREE EXAMINATION, MAY 2011.
SECURITY IN COMPUTING
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. (a)
(10)
2.
3.
Describe threats, counter measures and security functions.
(b)
Explain passive and active attack in detail.
(10)
(a)
Explain the security functions of operating system.
(10)
(b)
Explain the strengths of conventional encryption algorithm with
example. (10)
(a)
Explain data encryption and issues in network security.
(10)
(b)
What are the features and advantages in Data Encryption Standard
(DES)?
(10)
4.
Explain the public key cryptography and necessary algorithms with examples.
(20)
5.
(a)
What are the different types of firewall? Explain in detail.
(10)
(b)
Write a short note on security safeguards.
(10)
(a)
Explain courtney risk analysis function.
(10)
(b)
Explain the following :
6.
7.
(i)
Risk identification
(5)
(ii)
Risk management.
(5)
(a)
Write a short note on contingency planning.
(10)
(b)
Explain the copyright law.
(10)
8
DE–9024
ws 2
8.
(a)
Explain the RSA algorithms.
(10)
(b)
Compare the transposition ciphers and substitution ciphers.
(10)
————————
DE–2016
21 C
DISTANCE EDUCATION
M.Phil (Computer Science (Non- Semester))
DEGREE EXAMINATION, MAY 2011.
DATA WAREHOUSING AND MINING
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. (a)
2.
3.
4.
5.
Explain the role of data mining in marketing.
(10)
(b)
What is data warehouse? Why do we need it? Explain.
(10)
(a)
Explain in detail about OLAP tools.
(b)
Explain about genetic algorithms with its merits and demerits.
(10)
(a)
Explain the process of designing the star flake schema.
(10)
(b)
When a data mart is appropriate? Explain.
(a)
Write in detail about day-to-day operations of data warehouse.
(10)
(b)
Explain the impact of security on performance and design.
(10)
(10)
Explain the process of testing the datawarehouse.
9
(10)
(20)
DE–9024
ws 2
6.
7.
8.
(a)
What is parallel query? How does it work?
(b)
Explain the following :
(10)
(i)
User requirements.
(5)
(ii)
System requirements.
(5)
(a)
What is Metadata and explain its uses.
(b)
Explain the following :
(10)
(i)
Horizontal partitioning.
(5)
(ii)
Vertical partitioning.
(5)
Explain the various stages in knowledge in discovery process.
(20)
————————
DE–2017
21(D)
DISTANCE EDUCATION
M.Phil. (Computer Science) (Non-Semester) DEGREE EXAMINATION, MAY 2011.
PARALLEL ALGORITHMS
(2002 onwards)
Time : Three hours
Maximum : 100 marks
Answer any FIVE questions.
All questions carry equal marks.
(5  20 = 100)
1. (a)
2.
3.
4.
Discuss about MIMD class computers.
(10)
(b)
Explain in detail about CREW searching.
(10)
(a)
Explain in detail about searching on mesh connected computers.
(10)
(b)
Discuss about broadcast and all sum algorithms on SIMD model.
(10)
(a)
Describe the sorting on a linear array in detail. (10)
(b)
Explain in detail about sorting by selection approach in sorting EREW
model.
(10)
(a)
Explain the Shuffle transpose with suitable example in detail.
(10)
10
DE–9024
ws 2
5.
(b)
Write the procedure for Mesh multiplication and explain with an
example. (10)
(a)
Write the MIMD algorithm for solving partial differential equations.
(10)
(b)
Explain the finding roots of non-linear equation using MIMD algorithm
in detail. (10)
6.
Explain in detail about computing Eigen values with examples.
(20)
7.
(a)
Explain in detail about computing the connectivity matrix with procedure
for cube connectivity. (10)
(b)
Explain sequential tree traversal with example. (10)
(a)
Write short notes on parallel cutoffs.
(10)
(b)
Explain MIMD ALPHA BETA algorithm.
(10)
8.
————————
11
DE–9024
Related documents