6th sem previous year paper

Upload: mandeep-singh

Post on 05-Apr-2018

231 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 6th Sem Previous Year Paper

    1/23

    Northe

    rnIndiaEng

    ineerin

    gColle

    ge,Ne

    wDelhi

    cDEND TERM EXAMINATION

    IT fl(Please write your Exam ~oll Nd.) Exam Roll No .

    SIXTH SEMESTER [B.TECH.j- MAY 2011I Paper Code: lfTCS302 Subject: Microprocessor Systems JTime: 3 Hours Maximum Marks: 75

    Note : Attempt five questions' includ ing Q.no.l which is compulsory . Se lect one.. question from each unit. .

    Q1 (a) How doyou pass parameters to macro? (5x5=25)(b) Draw the timing diagram of I/O write cycle of 8086.(c) Discuss addressing modes of 8086 microprocessor.(d) What is the difference between shift and rotate manipu lation P(e) Explain all assembler directives, pseudo-ops and operators of 8086.

    Q2 (a)(b)

    Q3 (a)\.\~

    Q4

    Q5(b),~--, Q6 (a)

    \-..~ (b): /_.!- ..

    1 Q7 (a)I (b)

    I --"'\,I :

    UNIT-IDescribe the function of 8086 segment register.Write a program to convert 8-bit BCD numbernumber.

    (6)to its equivalent binary

    (6)Write a program to move the contents of the memory location OSOOHtoregister BX and CX. Add immediate byte OSH to the data residing inmemory location, whose address is computed using DS=2000H andoffset=0600H. Store the result of the addition in 0700H. Assume that thedata is located in the segment specified by the data segment register DSwhich contain 2000H. (6)(b) Explain architecture of 8086 microprocessor. (6)

    UNIT-II(a) What do you mean by macro? What are the differences between a macro

    and a subroutine? (5)(b) What is nested macro? (3)(c) Explain the stack structure of 8086 in details. (5)

    OR(a) Write a program to find out whether a given byte is in the string or not. Ifit is in the string, fi~d out the relative address of the byte from the

    starting location of the string. (7)What is the difference between jump and loop statement? (6),UNIT-III

    Discuss the troubleshooting technique of 8086 based microcomputer. (6)Explain the interrupt response sequence of 8086. (6)

    ORWhat is interrupt vector table of 8086? Explain its structure. (6)Differentiate between maskable interrupt and nonmaskable interrupt. (6)

    Q8UNIT-IV

    (a) Interface an 8255 with 8086 to work as an I/O port. Initialize port A asoutput port, port B as input port and port C as output port. Port Aaddress should be 0740H. Write a program to sense switch positionsSWO-SW7 connected at port B. The sensed pattern is to be displayed onport A, to which 8 LEDs are connected, while the port C lower displaysnumber of on switches out of the total eight switches. (7)

    (b) Explain register organization of 80286. (6)OR

    (a) Explain internal block diagram of 80286 in details. (7)(b) Discuss the need of 8259 and 8279. (6)

    Q9'

    ************

  • 8/2/2019 6th Sem Previous Year Paper

    2/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    F(Please write your Exam, Roll No.) Exam. Roll No .END TERM ,EXAMINATION. SIXTH SEMESTER [B.TECH.], MA Y- 2011 ./Paper Code: ETCS - 304 Subject ! Object Oriented Software Engineering

    Time I' 3Hours Maximum Marks: 75

    .~;-.-.~ ..~, ... ,Note: QJ is tfJmput~()I1' Rest of the paper contains Four units, attempt One question from

    each unit.

    Q. 1. (a) Substantial testing of a system uncovers not a single error. (lOx2.5=25)What conclusions do you draw?,What is the criteria used to decide whether two objects are stronglyfunctionally related?What are thetwo extreme types of structures for interactiondiagrams?

    (d) justify the statement that system development is incremental.--~!1at do the following terms mean and how do they relate to one

    another:correctness, working properly.

    (f) What are the different activities that lead to requirementspecification?

  • 8/2/2019 6th Sem Previous Year Paper

    3/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    ~i.,-. .J.'.: UNIT-- 1-' ''. ~

    Q. 2. (a) What do you understand by requirement elicitation? List fewk (/' . ,,,s:hall,eIlges faced during requirement elicitation.'(b r "Whatare the ideal characteristics of a requirement specification?

    ,I.,IIi

    , . \ " ' '. ' : . ' ';~:I' \Explain the Delphi technique for requirement elicitation.c)

    Q. 3. Compare and contrast the process models .. - . .:. ;'; .:"(a) Waterfall, spiral prototyping and incremental using the: followingcriteria:(i) Capability to accommodate risk.(ii) Capability to respond to charged requirements.(iii) Capability to meet user requirements.

    (b) ;What do you understand by software sensability? Compare andcontrast the following approches to software reusf(i) Unix filters .(ii) Object oriented classes.

    UNIT - II

    Explain' the; difference between external design, architectural;; .design and detailed design. Also explain how the transitions are. made from requirements analysi~ to external design, fromexternal design to' architectural design and from architectural

    . . . . . . .design to detailed' design."

    Q. 4. (a)

    2

    (5)

    (4)(3.5)

    (7.5)-,>

    (5)

    (6.5)

    r~:';';. '

    ,/

    ".;1i

    II

    It!,riI!~!

  • 8/2/2019 6th Sem Previous Year Paper

    4/23

    Northe

    rnIndiaEngi

    neering

    Colleg

    e,New

    Delhi

    ,~, ,,1_ j'h -

    (by What is Requirement Modal? What are the various components (6)of a.requirement model?

    3 P.T.O.

  • 8/2/2019 6th Sem Previous Year Paper

    5/23

    Northe

    rnIndiaE

    nginee

    ringCo

    llege,N

    ewDelhi

    UNIT - IV

    If-*,, '[,..I"L.,',~

    /

    Q. 8. (a) Differentiate between a package, component diagram and a (6.5)deployment diagram.

    j . ~ .I-. q./9., I

    i

    (b) Differentiate between a sequence diagrgm and a collaborationdiagram with the help of a suitable example.

    Draw a class diagram and USecase diagram for a blood bank whichreceives tests and stores blood donated by various people and also

    Iissues the, blood to individuals or hospitals. Take suitable attributesand services in each class and show association between these classes,

    4

    (6)

    (12.5)

  • 8/2/2019 6th Sem Previous Year Paper

    6/23

    Northe

    rnIndiaE

    nginee

    ringCo

    llege,N

    ewDelhi

    ~~

    i \Y,(Please write your Exam. Roll No.)~

    ,,;J,\":., ,

    ,."

    , I '

    Exam. Roll No .

    'END'TERM EXAMINATIONSIXTH SEMESTER [B.TECH.], MAY-2011

    Paper Code: ETCS3061ETIT306 ___--:...- ...Subject: Computer Networks

    ,j .

    Time: 3 Hours Maximum Marks: 75.~~OiJ): Question No.1 is compulsory, Attempt One question from each unit.! ' i

    , Q. 1. (a) What is: the 'difference between baseband and broadband?

    )V,tl~. '~.' -.~.(j-

    " '''','1..-;-: iI

    ~' ,pt ..'r", , 1-:;. !

    I

    i

    'F

    (b) Distinguish fifferent categories of UTP cables with their speeds.(c) Which fieldof the IP header change from router to router?

    (2)(2.5)(2)(2)

    1 i-(d) 10 BASE2 uses __ ~_ cable whilei 10 BASE 5 uses cable.

    (e) What is themajor factor that makes co-axial cable less susceptible (2)to noise tha~ ~wisted pair cable? .

    I 'I ;(f) What is the difference between TCP and UDF as both are the

    transport-layer protocols? '(2.5). . ,

    (g) , Find the mask: that create 2 (two) subnets in class B? (2)) i(h) , Compare the data rate for traditional ethernet, fast ethernet andgigabit-ethernet? (2)

    (i) How many types of Transmission-technology are in computernetworks? Explain each.How computer networks is useful in resource sharing and videoconferences? (2)

    (2)

    (2)

    (k)(1) "

    Why OS1 model called " Open System Interconnection"?.Explain the characteristics by which the LANs are distinguishedfrom other kinds of networks. (2)

    P.T.O.

  • 8/2/2019 6th Sem Previous Year Paper

    7/23

    Northe

    rnIndiaE

    nginee

    ringCo

    llege,N

    ewDelhi

    .. '.'

    , ' UNITIHow do the layers of TCPIIP protocol suite correlate to the layersof the OSlmodel? Explain with the help of diagram. (5)

    (b) What is the difference between a confirmed service and an

    (c)unconfirmed service? (2)What are the various types of transmission impairments? Despitethe comparably high cost factor, what makes fiber optics a desirablemedium? (3.5)

    Cd) Distinguish between: .(i) Narrowband ISDN and Broadband ISDN.(ii) Boundary level masking and Non-boundary level masking. (2)

    .Q. 3. (a) What is the purpose of subnetting in IP addressing? How maskingis related to subnetting? Explain with example. .

    Ql 4. (a); ,i,! .

    (4)(b) Write short note on:

    (i) ISDN.I(ii) Three way handshake in TCP

    (c) Explain in brief, the ..features of the following transmission media:. (i) . Co-axial cable.

    i(ii) Fiber optic cable.i

    (2)

    (4)(2.5) {)Cd) Justify why ISO-OSI model will have only 7(seven) layers? '. ;! ;: I

    : i UNIT II1 I Explain the different types of errors and any two schemes used..for ~ detection and correction? " "~;" IExplain with an example each, character stuffing aoo!blf':~".'. "r:

    i .>'}. i (c) Diff~entiate between stop-and-wait and sliding window protocols ..~

    ,', If,~: ,

    .. .-.

    2

    f' q.. Ili+~

    !I

    II.1!

    \j

  • 8/2/2019 6th Sem Previous Year Paper

    8/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    '1

    ."r.

    l\f;'"I

    I",,~

    Q. 5. (aj' What is the mechanism of:

    . (b) Justify the statement" Slotted ALOHA achieves doubleefficiency than Pure ALOHA".

    (c) Give points of comparison between IEEE 802.3, IEEE 802.4 andIEEE 802.5.

    .i . .i1-,'1.;"

  • 8/2/2019 6th Sem Previous Year Paper

    9/23

    Northe

    rnIndiaEng

    ineerin

    gColle

    ge,Ne

    wDelhi

    (b)

    (c)

    ,.

    UNIT - IVWhat is routing? Mention different types of routing. In particular,explain shortestpath routing algorithm in detail.Describe the reasons for congestion in' network and describe. ,

    .1 : , .methods for congestion control.How is error control achieved in ATM? Explain how the cells arerouted in ATM.

    Q .. 9. (a) Discuss" Count to Infinity problem" in routing algorithm. Namerouting algorithm which does not suffer from this problem.

    (b) Explain Leaky bucket and Token bucket congestion controlalgorithms in detail.

    t .

    (c) Discuss the following:(i) ATM cells(ii) ATM signalling

    , . ~I,~

    "

    t .; I~!.

    ;.

    1.

    4

    (4.5)

    (4.5)

    (

    (4)

    (4)

    (4) "r

    (4)

  • 8/2/2019 6th Sem Previous Year Paper

    10/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    ''' ..u'\- .~ ,~/I",I

    1.1,t'1.

    \.'.

    . '.. ,:~...

    , ,.(Plea.se write-your Exam Roll No.] Exam Roll No .

    END TERM EXAMINATIONMAy 2011

    Paper.code: ETIT30B Subject: Digital Signal ProcessingTime: 3 Hours Maximum Marks: 75Note: Attempt 'one question from each unit including Q.no.l which is compulsory. I

    Q 1 (a) Let x(n) = 26(n + 2) - 6(n + 1)+ 36(n) - 6(n -1) + 26(n - 2). Evaluate(i) X(eJ"')w = 0 (ii) [. X(eJ"')iw (iii) X(eiaJ)w = 2;rr without explicitlyfinding X(eiaJ). (6)

    (b) Find the state variable matrix A, B, C, D for the input outputrelation given by the equation- (5)yen) = 2y(n -1) + 3y(n - 2) + x(n) + 2x(n -1) + 3x(n - 2) .

    (c) Derive the relationship between DFT (i) Z transform (ii) Fouriertransform of an aperiodic sequence. (4)(d) Discuss the design of digital resonator. (5)(e ) Derive the input and output relation for a system function h(t) ifthe input signal x(n) is random. (5)

    UNIT-IQ2 (a) Perform the convolution of the following two sequence graphically

    hen) = {(I12t 0 :S n s; 2 , x(n) = D(n) + D(n -I) + 46(n - 2). (6.5)o otherwise(b) Find the 'Z' transform the fallowing sequence:- (6)

    (i) x(n)= n(l/2)"u(n-2) (ii) x(n)=lIn(-2r"u(-n-l)Q3 (a) Find the inverse '2.' .transforrn- (6) ,

    (i) X(Z)= 1+1I4Z--1 IZI>2 (ii) X(Z) = 1-1/4Z-1 ,IZI>1I2(1-1I2Z-IY' 1+5/6Z-1 +1/6Z-2(b)Compute the DTFT of the following:- (6.5)

    (i) x(n) = u(n) (ii) x(n) = Cos aun with 0)0 = Zn 15.(iii)yen) - 3I 4y(n -1) + II 8y(n - 2) = x(n)

    Q4UNIT-II

    (a) Perform the circular convolution and linear convolution for theinput sequence XI (n) = {1,2,3,!,2}2 (n) = {1,2,3,4}. Discuss the result. (6.5)

    (b) Determine the DFT of the given data sequencex(n) = {-1,2,-3,4,9,-20,12,6}usingDIT algorithm. (6)

    Q5 (a) Prove the following properties of DFT when X(k) is the N point DFT- (6)(i) If x(n) is real and odd.(iil If x(n) is purely imaginary and odd.(b) Calculate the IDFT for the given coefficient

    - X(k) = {38, - 5.828+ j6.07, j6, - 0.172 + j8.07, -10, - 0.172 - j8.07, - )6, - 5.828 - j6.07}using DIF structure. (6.5)

    P.T.O.

  • 8/2/2019 6th Sem Previous Year Paper

    11/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    1

    ,, .

    i I

    1 ~;.:~

    ,t; ",l f';i ,I,i ;,',

    it ., I

    \ '.',I .

    .\ .~1 i /\ .. r-

    [-2-]

    Q6~. UNIT-Ill

    (a) 'Eor the following causal linear shift invariant system factorize H(Z)in form H(Z) = H min (Z)Hap (Z) ,(i) H(Z) = (1- 3Z-2 1+ 0.5Z-1

    1- 0.75Z-1(6)

    (b)Consider the random process X(t) = ySinnot + ZCosnot where. no isconstant. Y and Z are uncorrelated random variables ieE[Y,z] = E[Y]E[Z] = 0, with zero mean and variance CJ2. (i) Find meanof X(t) (ii)Auto correlation ofX(t). (6.5)

    Q7 (a) Explain the sampling theorem in the frequency domain. Discussthe design of zero order hold ckt. (8.5)(b) Consider a linear shift invariant system with system function

    Z-1 -a *H(Z) = l-az-I lal < I. (4)(i) Find a difference equation to implement this system.(ii) Show that this system is an all pass system.

    UNIT-IVQ8 (a] Give the system transfer function H(Z)'- Z2 -I- (Z -lI2XZ -l13XZ -114)

    realize H(Z)as (i)parallel form (ii)cascade form (iii)canonic form. (6)(b)Design the digital butterworth filter satisfying the constraint givenbelow T=1 using bilinear transformation1112 $IH(eJOJ)I$l for O$OJ$;r12 (6.5)

    IH(eJtl )1 $ 0.2 f?r 37l' /4$ OJ$ n:Q9 (a) Discuss the properties of Chebyshev polynomial. (2;5)(b) Design a high pass filter where the desired frequency response isgiven below with T =3 and (j)c = 2rad I S using a window with stop

    (.) {e-JOJZ OJ

  • 8/2/2019 6th Sem Previous Year Paper

    12/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    '.(Please write your Exam. Roll No.),. CD

    Exam. Roll No : : .

    END TERM EXAMINATION"SIXTH SEMESTER [B. TECH.], MAY - 2011Paper Code : ETCS - 310 Subject: Data Warehousing & Data-Mining

    Time: 3 Hours Maximum Marks: 75. Note: Q. 1 is compulsory. Attempt any Four questions from the rest.

    " " ~ Q. 1. Answer the following questions in brief: (2.5 x 10=25)(a) Differentiate between the operational systems and the informational

    systems?(b) What are junk dimensions? Explain.(c) What are the various techniques which should be kept in mind while

    conducting an interview?What is meant by slice and dice? Give-example .Whit are the characteristics of strategic information?, '-,

    .' (d)Ce)Cf) A datawarehouse is an environment, not a product. Discuss.

    Expalin the benefits -of OLAP ... rI,:

    I .I,

    ~'11 /+ . ,(g).: , (h) Adatawaiehouse is different from datarnart. List out the diffrencestosilpport: the statement.I ,(i) . What is the significance of metadata in a datawarehouse?

    U) How ar~ the users of the datawarehouse classified?} .;

    -. " '1

    ",'~' . : i. ! .. Q. 2.' (a) What are fhe various ways by which a corporate can providestrategic information for decision making? Explain each in detail.Which one is the best and why?i I . .(b) Explain.snapshot and transaction fact 'tables with the help 'of an .'"example. How are they related?

    (7.5)',' .

    .' '','\. .

    " 'I.

    Q. 3. (a) Explain' F,ive characteristic features of a datawarehouse in detail.(b)Wootare hypercubes? How do they apply in OLAP?

    (7.5~(5):f~'. .

    P.T.O.

    -::;.r:r-._." jll;,,~,,"

    "

    c

  • 8/2/2019 6th Sem Previous Year Paper

    13/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    ), '

    Q. 4. State all the guidelines of Dr. Codd's for an OLAP system 'giving brief (12,5).." ',' 'description about each.Q. 5. (a) What are the various models of OLAP? Explain each in detail,

    (b) "What are the, various ways by which data is prepared for storage (~thedatawarehouse?

    '.;-

    .~" .""

    Q. 6. (a)

    .~:~~ r-~:'::~~:;'";' ,- .t,!;.fft, ' Q 8. .

    'f" ,:' , ,!t:~;r:;.-~,:;~ ':: ', '# '.\~!"!.: ;.,'t 'I -I, ". Iii:

    \':;~:/ ':," .I; ~.

    , ,

    . ..-.~ ,\ ':~ ','

    i.1 ,-i

    , , (b)

    List out the various reasons why the traditional method of analysis.provided in the datawarehouse are not sufficient?, What ~re the possible aggregates in wFlIChthe fact tables may beformed?

    . 'j :What are the various types of metadata? Explain in detail.

    (a) What are tpe. basic components of a datawarehouse? Explain with'I the help of a' diagram. ' '

    ! ,,-, '(b) Suppose that a datawarehouse of sales consists of four dimensions,namely, 'q~e, item, branch and location and two measures: dollarssold and unit - sold. Draw a star schema and snowflake schema for

    I ! :the given datawarehouse.1 i1 "fDefine the following :! j(a) OL1P ,:

    (b) Drill down and Rollup(c) Joint AppiiJation Development (lAD)(d) Starjoin a~d Starindex

    I

    2

    (1.5)(5)

    (5) . ;

    (5)

    (2.5)(7.5)

    (5)

    (12.5)

  • 8/2/2019 6th Sem Previous Year Paper

    14/23

    Northe

    rnIndiaEn

    gineer

    ingCo

    llege,N

    ewDelhi

    (Please write your Exam Roll No.) Exam Rol l No.....................

    END TERM EXAMINATIONSIXTH SEMESTER B.TEcH. - MAy 2011

    Paper Code: ETIT312 Subject: D igital Communications-IITime: 3 Hours Maximum Marks: 75

    Note: A ttempt five questions including Q .no.l which is compulsory. ISECTION-AQ 1 Attempt any ten questions of the following:- (2.5xlO=25)

    (a) What is the code rate and constraint length for (3,1,3)convolutional code?(b)Why are trellis diagram preferred over state and tree diagrams forconvolutional encoders design?(c) Define Free distance and correcting capability of a convolutionalcodes.(d) Name two algorithms used for decoding concolutional codes.(e) Given a=11001101 and b=11010010 are two codewords of length8. What is the hamming distance between the two codes?

    (f) What is extended binary Golay code?(g) Suppose we have an unbalanced coin that is three times morelikely to yield a head then a tail. What is the entropy of thislanuage?(h)What is meant by systematic and non-systematic code?(i) How syndrome is calculated in Hamming codes and cyclic codes?U) Define code efficiency.(k)What are the advantages of cyclic codes?

    SECTION-BUNIT-I

    Q2 (a) Define entropy and briefly state its properties. (4)(b) Show that if H(yIX)=O,then Y is a function of X, ie for all x withp(xO, there is only one possible value of y with ptx.yp-O. (8.5)OR

    Define relative entropy and mutual information between two randomvariables. (4)The world series is a seven game series that terminate as soon aseither team wins four games. Let X be the random variables thatrepresents the outcome of a World Series between team P and Q; thepossible values of X are PPPP, QPQPQPQ and QQQPPPP. Let y be thenumber of games played, which ranges from 4 to 7. Assuming that Pand Q are equally matched and the games are independent, calculateH(X),H(Y),H(YiX) and H(XiY). (8.5)

    UNIT-IIQ3 (a) Consider the code {O.Ol}. Is it instantaneous? Is it uniquelydecodable? Is it singular? (3)(b) Find the binary and ternary Huffman codes for the random variableX with probabilities p = (~ ~ ~ ~ ~ ~). (9_5)21'21'21'21'21'21

    ORConsider a random variable X which takes on 4 values withb bili . (1 1 1 1)ro a 1 rties p = _ - _ _ .3'3'4'12

    P.T.O.

  • 8/2/2019 6th Sem Previous Year Paper

    15/23

    Exam Roll No .e write your Exam Roll No.)

    END T RM EXAMINATIONSEMESTER B.TECH. MAY-2010

    Subject: Microprocessor Systems

    Maximum Maries :75

    from each unit including Q.1 which is compulsory.

    Q1 (a) Convert (i)(1011011 )gray to binary code

    (b)(10010011)2 to gray ode.

    (c) Why are the port r es of programmable port devices automatically

    put in the input mo e when device is first powered up or reset?

    (d)An IRET instruction rather than a regular RET instruction is used at

    the end of each ISR. Why?

    (e)What frequency tra smit clock (TXC)is required by an 8251A in order

    for it to transmit dat at 4800Bd with. a baud rate factor of 16?

    (f) Explain term "virt al memory". How much virtual and physical

    memory can be sup orted by 80286?

    (g)How will you com te physical address of memory using effective

    address? Explain wi suitable example.

    (h)How does assem ly language statement differ from directivestatement?

    (i) Explain 8086 flag re ister.

    (j ) Which instruction s ould be used to determine if bit 3 of register AH

    is high without ch ging its contents? (2.5xlO=25)

    UNIT-I

    Q (a) Describe how an assembly language program is developed and

    debugged using sys em tools? Explain function of the following:- (6.5)

    (i)SEG (ii) NDS (iii)EVEN (iv)RECORD

    (b)Draw programmers model for an 8086 microprocessor with proper

    labels. When is the ueue of 8086 updated? (6)

    Q (a) Explain the demul plexing of ADo-AD15bus in 8086 with latch. Aid

    your answer with s itable diagram. (6.5)

    (b)Explain the followi g signals:- (6)

    (i) TEST (ii) N/MX (iii)BHE (iv)RQ/GT

    UNIT-II

    Q (a) Write a program to find out largest number from an unordered array

    of sixteen 8-bit embers stored sequentially in memory location

    starting at offset 0 OOHin the segment 2000H. (6.5)

    (b)Show the assemble directives and instructions to be used to initialize

    the interrupt poin er table location for a type 0procedure, DIV-O-ERRORand type 2 procedure, POWER-FAIL.' (6)

    Q (a) Write assembly Ian age program to fmd:- (6)

    (i) Whether given tring is palindrome or not. (ii) Factorial of given

    number

    (b)Discuss the action performed by 8086 micro processor in case of (i)

    ROLand (ii)IDIVi structions. (6.5)

    P . T . O .

    ~,

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDel

    hi

  • 8/2/2019 6th Sem Previous Year Paper

    16/23

    '-

    [-2-]

    UNIT-IV

    tion of process of learning using Back Propogation

    (10)

    (5)

    ,(a) Give short descri

    Neural Network.

    (b) Give a flow graph for developing a genetic algorithm.,OR

    (a) What, procedure i followed for knowledge acquisition? (4)

    (b) What are. the vari us steps for development of Expert Systems? (7)

    (c) What is the role f expert system tools in developing expert system?

    Give one example of such tool and its usability. (4)

    \" ~-

    . .--~~, ~(c) Write short notes on Fuzzy logic. :' (5) ~\'

    OR ","'T,.i"YtlaVWha~ are impo tchallenges~in Natural Languages Understandinf(:?(2) '" ~,~

    '\ '."~D)What'lare the vari us applications of NLP? ' (3) \

    'l"'(c)Explai~ the v rious activities which are performed duril1g

    . 'Morphological A alysis and Syntactic processing with the help of

    ,1,; following sentenc : I want to see Raju's photo; (10)

    ************

    ~~'i

    I I

    North

    ernIndia

    Engineeri

    ngCo

    llege,Ne

    wDelh

    i

  • 8/2/2019 6th Sem Previous Year Paper

    17/23

    rite your Exam Roll No.)

    ode: ETCS304

    Hours

    Exam Roll No., .............. .......

    EXAMINATION

    Note: ttempt any five questions.

    Ql What do you mean by equirement Elicitation? What are the different

    components of Requirem nt Elicitation Activity? Discuss the role of use-

    case in requirements elic' ation. (15)

    Q2 (a) Discuss in brief the s ength and weakness of the following life cycle

    models:- (10)

    (il Evolution Model

    (ii)Iterative-incremen

    (iii)Codeand fIx

    (iv)Waterfall

    (v)Spiral

    (b)You are a software e gineering consultant and have been called in by

    the vice-president for finance of a corporation that manufactures and

    sells boots. She wan s your organization to build a product that will

    monitor the compa 's stock, starting with the purchasing of the

    leather and keeping track of the boots, as they are manufactured,

    distributed to indivi ual stores and sold to customers. What criteria

    would you use in sel cting a life-cycle model for the project? (5)

    Q3 (a) Discuss the analysi model in OOSE. Why is it essential to develop

    analysis model? (8)

    (b) Discuss model archi ecture in 0-0 methodology. (7)

    Q4 List and compare vari us steps for development of a software using

    procedural approval wi h the object-oriented software development. Why

    do you think that OOS methodology is better? Discuss in detail. (IS)

    ce of testing? Is testing an Umbrella Activity? (5)

    esting with black box testing. (5)

    y Regression Testing? Howis it accomplished? (5)

    (a)What is the import

    (b)Compare white box

    (c) What do you mean

    Q

    Q5 Why do you mean b maintenance of software? What is corrective,

    preventive and adaptiv maintenance? Approximately what percentage of

    is life does a software goes under maintenance? Does OOSE follow any

    special type of mainten nce? Discuss in detail. (15)

    Q Draw a class Diagr , use case diagram, sequence diagram and

    collaboration diagram or Library Management System of an institute. (15)

    ************

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDe

    lhi

  • 8/2/2019 6th Sem Previous Year Paper

    18/23

    (2.5xlO=25)

    EXilm Roll No .\8

    ERM EXAMINATION

    compulsory. Internal choice Is indicated.

    S XTHSEMESTER B.TECH. MAY-2010

    Su~eccCompu~rNe~oms

    Maximum Mams :75

    END

    Choose the correct or best alternative i!l the following:-(a) The routing of da grams _

    (i) Must follow a fi ed path (ii) Occurs on a virtual Circuit

    (iii)Can occur over different paths (iv) Occurs exponentially

    (b) The RG number g' es us information about. _

    (i) All o.fthe these (ii) Optical fiber (iii) Twisted pair (iv) Coaxial cable

    (c) The _ ' _ ' _ l _ " channe is used for application's requiring a transmissiongreater,than 64 k ps. (i) B (ii) D (iii) H (iv) All of these.

    .(d) The -rep 'sliding w ndow _(i) Can be used to control the flow of information

    (ii)Always occurs hen the field value is O.

    (iii)Alw~ys occur hen field value is 1.

    (iv)Occurs honzo tally . , .

    (e) Which of the foIl wing is considered a broad band communication

    channel?

    (i) Coaxial cable ii) Fiber optics cable (iii) microwave circuits (iv)all of

    above.

    (f) Bit stuffing is use to _

    (il Fad' insufficie information(ii) Distinguish be inning and ending flags from information.

    (iii)convert 8-bit ords into 16 bit words.

    (iv)Fill a data tur ey

    (g) In which topology data packet is removed by source destination?

    (i) Ring (ii) Bus (iii)Star (iv) None

    (h) UDP is used with Protocol.

    (i) Trivial File Tr sfer (ii) ICMP (iii) LDAP (iv)All of above

    (i) In which routing ethod, do all the routers have a common database?

    (i) link vector (ii) distance vector (iii) link state (iv) non of the above

    U l Which of the follo 'ng is a four wire Gigabit Ethernet implementation?(i) 1000base-SX (ii) lOOOBase-LX (iii) lOOOBase-CX (iv) lOOOBase-T

    ( tease write your Exam Roll No.)

    P per Code: ETCS306/ETlT306

    'rne: 3 Hours

    ".j

    - - - " 1I

    v

    " ..I

    2

    Q2

    (a) What are som of the factors that determine whether a

    communication s stem is a LAN, MANor WAN? (5)

    (b) Defme the term onnection-oriented as used in data communication

    and relate it to T P. (5)(c) What are the b nefits of using layered protocols? Discuss some of

    them. (2.5)OR

    (a) What is a peer-t -peer process? What are heades and trailers and how

    do they get adde and removed? (5.5)

    (b) Discus the mod s for propagating light along optical channels with

    proper diagrams. (3)

    (c) What do you m an by network topology? Discuss the problems and

    benefits of any t ee topologies. (4)

    P.T.O.

    - - - " 1

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDel

    hi

  • 8/2/2019 6th Sem Previous Year Paper

    19/23

    Q

    [-2-]

    (a) What ate, the vario s data link layer design issues? Explain stop-and-

    wait ARQ protocol 'th suitable diagrams when (i) Frame is lost (ii)

    ~K~~~ m(b) Name different typ s of HDLC frames and give a brief description of

    each. (5.5)

    OR

    Q (a) Explain the encap ulation of PDUs in TCP/IP and addressing with

    suitable diagrams. (4.5)

    .(b) How is eRC superi r to the two-dimensional parity check? How does

    the checksum c ecker know that the received data unit is

    undamaged? (8)

    Q

    Q

    , - f ' ; QI

    5

    (a) What do, you me by multiple access communication? What is the

    role of MACprotoc Is? (5.5)

    (b) Explain Ethernet p otoco1with special reference to frame format. (7)

    OR

    (a) Discuss the follo . g with reference to LANs. (6.5)

    (i) Exponential ba offalgorithm (ii)CSMA/CD vs CSMA/CA

    (b)What is the maxim m number of subnets in each case? (6)(i) Class A; mask 255.255.192.0

    (ii)'Class B; mask 55.255.192.0

    (lii)C1assC; mask 55.255.255.192

    (iv)Class C; mask 55.255.255.240

    (a) Explain the Ie bucket algorithm and illustrate how traffic

    congestion can be educed. (7)

    (b)A routing algorith should have global knowledge about the state of

    the network to pe orm its task. Give various goals and objective to be

    considered in rou 'ng algorithms. (5.5)

    OR(a) Explain :the Le bucket algorithm to control congestion. Explain

    how the ,drawback of this are overcome in a token bucket algorithm?(6)

    (b)Are both UDP and IP unreliable to the same degree? Why or why not? (4)

    (c) Can the value of eader length in an IP packet be less than 5? When

    is it exactly 5? (2.5)

    * * * * * * * * * * * *

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDel

    hi

  • 8/2/2019 6th Sem Previous Year Paper

    20/23

    Exam Roll No .

    SIX H SEMESTER B.TECH. MAY-2010

    Pa er Code: ETIT/ETIC/ETEE30B Subject: Digital Signal Processing

    Ti e:3Hours Maximum Marks :75

    Note: Attempt one questio from each unit including Q.1 which is compulsory.

    Ql

    Q

    Q

    Q

    Q

    (a) Define DFT of a pe iodic sequence x(n) with length N of its period.

    Derive the expressio to obtain the sequence x(n) from its DFTX(k).(4)(b) Give the sequences defining at least five different window functions

    w(n), commonly use in FIR filter designer. (4)

    (c) Define the Chebysh v polynomial CN(X).Obtain the recursive relation

    to build up higher 0der Chebyshev polynomials. (4)

    (d) Obtain DTFTfor x(n ==u(n). (4)

    (e ) An FIR digital filter atisfies the condition h(n)==h(N-I-n),where h(n) is

    it impulse respons and N is its length. Determine H ( e Jw) if N is anodd integer. (4)

    (1) H(z) = N(z) Is an all pass filter. If N(z)=ao +a]z-I +a2z-2and aO, aI, a2

    D ( z )

    are real constants, hat will be the expression for D(z)? Justify your

    answer by proof. (5)

    UNIT-I

    (a) Find the z ansforms, glYlllg ROC in each case

    (i) x(n) = sin nwo.j.i(n) (ii) x(n) = -anu( -n -1) . (3+3)

    (b) Find inverse z-tran form given X(z) = log(1- 2z), I z i

    (c) Determine the fre uency response of the system characterized by

    yen) = (5/6)y(n -1) - ~)y(n - 2)+ x(n) . (3.5)

    200 1 1t

    (a) Show that Ilx(nt - J I X ( e j W ) 1 dw. (4)n=-oo 2Jr -1t

    (b) If x(n) is real and ven show that its DTFT, X(eJW) is also real and

    even. (4)00

    (c) Find the DTFTof t e periodic sequence given by Io (n - kN). (4.5)k=-oo

    UNIT-II

    (a) Define circular con olution of two periodic sequences x] (n) and X2 (n) .

    Show that x](n) N x2(n)givesDFTas X j(k).X2(k). (3)

    (b) If x(n)DFT X(k), fin the DFT of X(n). (3)

    (c) Why FFT is so imp rtant? What are its advantages? Develop the DIT-

    FFT algorithm. D aw the complete flow diagram taking sequence

    length N=8. (6.5)

    (a) Given the system function: H(z) = Z-l(l + 3z-] + 4z-2

    ) find the state1+7z-1 +6z-2 +5z-3

    variable; 4I.B~;Cla D.

    ~~~--

    ~\

    (4)

    P.T~O.

    North

    ernIndia

    Engineeri

    ngCo

    llege,Ne

    wDelhi

  • 8/2/2019 6th Sem Previous Year Paper

    21/23

    /

    I ~2~(b) Give the state variable matrices as

    L!!~ [ _ 2

    : _ 1 3] ..1 1 ~ ~ ]. f: ~[- 2 - 1 1 D ~ [ IJ . Find the corresponding

    systerh function H(z). (2)

    (c) Explaini briefly th sampling techniques; the impulse sampling, the

    natural! top sam ling and the flat top sampling. Give circuits how

    these are realized. Also, explain the merits and demerits of each of

    these ~~fhniques. (6.5)

    (3)

    (3)

    currentfiltersmaximum -phaseand

    into the form H(z)=Hmin(Z).Hall(Z).Where

    for bilinear transformation connecting s-domain

    Show. the mapping of points In s-domain to z-

    (6.5)

    Invariant Response, transform the analog filter

    Hmin(Z)is a minim

    (a) Derive the relatio

    and the z-domai

    domain.

    (b) By using Impuls

    bHo( s) = ( ) 2 b2 to H(z).

    s+a +

    (c) Defme minimu phase

    ( 1 - l z - I ) 6 5z-l)

    H(z)~ ( I - ~ Z - } ~ Z ' )m phase and H~lI(z)is an all pass filter.

    UNIT-III

    (a) Design a linear p ase FIR filter, given the desired frequency response. , { e - j4w - /6 :$ w :$ 7r /6 .

    Hd(ej(~):= Use Hann WIndow. Determine theo otherwise

    response h(n) for e causal design. (8.5)

    (b) Realize! the syst m function as cascade, parallel and canonic-I

    zstructu:t:"es, given (z) = . (4)

    ( 11 - 1 ) ( 1 1 - 1 ) ( 1 - I )

    -(jz -3z 1-

    2z

    7

    6

    j i >!

    ':',-~,

    '.',

    8

    9'

    UNIT-IV

    (a) Design a digital B tte"rworth filter, meeting the specifications:-

    Password 0.8 :$ IH e 'W ) I :$ 1 0.77rlwl:$ 7ruse bilinear transformation

    stop band IH(ejw:$ 0 .21 0 :$ Iw l:$ 0 .2 ;r

    and take T=1. (8)

    (b) Give the frequenc transformation to transform a lowpass filter: with

    pass bahd 0 to B to a high pass filter, with pass band wp to J(. Derive, p

    the vaftie ofa in erms of Bp and Wp. (4.5)

    (a) For a b lite leng Register with b+1 bits and the rounding off as thequanclz!tion me od, fmd the .. (4)

    (i) meH me of th quantization error e(n),

    (ii)Vanance (1'.2

    of the quantization error e(n).; t , .

    (b) Ifthe'~Bdveerr6fsignalispa.ssed through a digital system hen). What

    wouldlbb,the me andvariance of the output sequence? (4)

    (c)Forata!ndom se encex(n); how do we compute its Power SpectruniDensity 1 (PSD)? ' ssume" the random process as stationary and is

    ergodic in the firs and second moments. (4.5)************

    North

    ernIndia

    Engineeri

    ngCo

    llege,Ne

    wDelhi

  • 8/2/2019 6th Sem Previous Year Paper

    22/23

    ( tease write your Exam Roll No.)

    END

    Exam Roll No .

    ERM EXAMINATION_ .... Sl THSEMESTERIB.TECH.) MAY-2010

    I! ' per Code: ETCS31()_________ Subject; Dati;Warehousing & Data Mining= o JTime: 3 Hour!>.____ Maximum Marks :75

    '-___Note: Att...empt~~y ve questicmsincluding Q.1wt.!_i.chis compulsory. _]

    1. Short answer type: [5 x 5 = 25]a) Explain the materialized view of data warehouses.b) Differentiate between 0 AP and OLTP.c) What do you mean by s bject oriented, integrated, time variant and non volatile

    collection of data in dat warehousing?d) Differentiate between cl sification and clustering.e) What are the advantages of star schema? Explain.

    2. a) What are the differen data extraction and data cleaning techniques? Explain. [5]b) Discuss the data wareho e architecture with all its components. [7.5]

    3. a) What is metadata? E lain. [2.5)b) What are data marts? H w they are different from traditional data ware houses?[2.5)c) What is multidimension I data model? Explain. [7.5]

    4. a) What are the features of snowflake schema? What is fact constellation? (7.5]b) What are the necessary teps to cluster large databases? Explain. [5]

    5. a) Explain the followin [7.5]i) MOLAP ii) OLAP iii) HOLAPb) How multidimensional odel be represented in a relational databases? Explain.[5]

    6. a) What do you mean b knowledge discovery process? [5)b) Write down the differe t steps for design and implementationofOLAP models.(7.5]

    7. a) What is a decision tr e? Where they can be used? [5]b) How OLAP is implem ted in query languages? Explain with example. [7.5]

    8. a) Explain various data mining techniques. [5Jb) Explain the following t nns: [7.5Ji) drill down ii) 0 1 1 up iii) slice and dice

    ************

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDel

    hi

  • 8/2/2019 6th Sem Previous Year Paper

    23/23

    (a) State and explain the properties of Mutual Information.

    (b) Why information is a measure of logarithmic function?(c) Explain the limitatio s of Huffman Coding.

    (d) Explain the characte 'sties of Markov Source.

    (e) Describe the relation etween Hamming weight and Hamming distance.

    (f) Describe in brief abo t Golay codes.

    (g) State and explain 'Sh non's Information Capacity Theorem.

    (h) Differentiate between block codes and convolutional codes.

    Please write your Exam Roll No.)

    END

    aper Code: ETlT312

    ime: 3Hours

    Note: Attempt one que

    Exam Roll No ......................

    ERM EXAMINATIONMAY-20lO

    Subject: Digital Communication-II

    Maximum Marks :75

    lion from each unit including Q.1 which is compulsory. I

    (4)

    (3)(3)

    (3)

    (3)

    (3)

    (3)

    (3)

    UNIT-I

    2 (a) What is the signific nce of Information Theory? How it helps in making the

    communication syste more efficient? (4)

    (b) An event has 6 po sible outcomes with probabilities PI=I/2, P2=1/4, P3=1/8,

    P4=1/16, Ps=I/32, P =1/32. Find. the maximum entropy and the entropy of the

    system. (8.5)

    3 (a) Prove the given relati n from first principles H(X,Y) = = H(X) + H(Y / X). (4)

    (b) With the differential ntropy of a random variable X defined by equation, that isC/j

    H(X )c -- f I, (x) logz .fx(x)dx b / sample. Find the probability density function fx(x)

    for which H(X)is max' mum. ( 8 . 5 )

    (4)

    (8.5)

    (a) Explain in brief Shan on-Fano algorithm.

    (b) Consider a DMS with ource probabilities {0.35, 0.15, 0.2, 0.05, 0.25}.

    (i) Determine the Huf man code.

    (ii) Determine the ave age length of codewords.

    (iii)What is the efficie cy of the code?

    UNIT-II

    (a) State and explain sou ce coding theorem. (3)

    (b) Determine the mpel Ziv Code for the following bit stream

    01001111100101000 01010101100110000. Recover the original sequence from the

    encoded stream. (9.5)

    (4)

    (8.5)

    (4)( 8 . 5 )

    (a) Write a short note on CH codes.(b) The parity check bits 0 a (8,4) block codes are given by-

    C1=ml+m2+m3 C2=m +m2+m3 C3=ml+m3+m4 C =m2+m3+m4

    Where ml, m2, m3 and m4 are the message bits. Find he generator and parity check

    matrix for this code.

    lJ~lt:1JI

    (a) Explain the salient fea ures of Reed-SolemHn codes.

    (b) Consider a single erro correcting code for 11(eleven) data bits-

    (i) Howmany check b'ts are required?

    (ii) Find the parity che k matrix H for this code.

    QUNIT-IV

    (a) Give the block diagram of a constraint length 2/3 con

    its operation.

    (b) Draw the state diagra for convolutional encoder

    constraints length 2 a out puts vI=I, v2=I+x.

    olutional encoder and explain

    (6)

    'th one bit shift registers of

    ( 6. 5 )

    Q (a) Explain Viterbi's algori hm in decoding convolutional codes. \ (6)

    (b) What is cryptography? xplain various cryptographic techniques and their features.(6.5)

    * * * * * * * * * * * *

    North

    ernIndia

    Enginee

    ringC

    ollege

    ,NewDel

    hi