Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

DHARMSINH DESAIUNIVERSITY, NADIAD

FACULTY OF TECHNOLOGY
FIRST SESSIONAL
SUBJECT: Machine Learning (CE622)
Examination
Date : B.Tech Semester VI | Seat No.
Time :02/01/2023
:3:15 PM to 4:30 PM Day : Monday
Max. Marks :36

INSTRUCTIONS:
1
Figures to the right indicate
2
The symbols used carry theirmaximum marks for that question.
3 usual meanings.
Assume suitable data, if required
4
Draw neat sketches wherever & mention them clearly.
necessary.
Q.1 Do as directed.
CO1 A (a) [12}
1) An AImodel makes predictions based on labeled data.
1) State whether the statement is true or false and Identify the learning model. (21
CO2 Temperature, Salary, Price, etc is usually modeled as a justify your answer: *The problem of predicting
classification
CO3
R (b)
F (c) Describe the condition under which we willstop splitting anode in problem.".
What the
initial mean square error loss by running the Decision Tree learring? [2
linear regression mode! h(s) = , + 6,X on the [2
given training data. X is the input feature and Y is the
output. Initial value of 0, = 1 and 6, = 1.
Instance No. X
10 10
2 2020
3 30 10
CO1 U (d) Define "Playing Game of Chess" as a learning problem.
CO1 A (e) What is the number of parameters required to represent a Naive [2]
and 1 boolean class label? Bayes classifier with 4 boolean features [2]
CO1 C (£ Construct a Bayes Network for the following description. "The
the weather. The performance of batsmen depends performance of the bowlers depends on
on the Pitch. [2]
batsmen perform well." The Team wins if the bowlers and

Q.2 Attempt Any THOfrom the following questions.


CO3 (a) Explain the working of the Naive Bayes Classifier [12]
with the example of the data shown in the figure.
Calculate the conditional probability tables and calculate inferernce query [6]
P(Y=1/X1=0, X2=1)
.
1.

1 C

CO3 E (b) Calculate the output for the following inference query for the Bayesian Network shown in the
tigure
below, (i) P(E-1/C=1, D=1, B= 1) (iü) P(D=1/ A=1, C=1, E=1)

1
1o. 6
P(clA,B) PCole)
AB
o.3
o.G O.4

1o.alo.|
P(Ele, n)

0.2 o.8
O. 4 O.6
o.6o.4
1 1o.&o. 2

CO2 N (c) Consider the problem of recognizing face. Define it as a learning problem and identify T, P and E. Also,
[6
define a model to solve it using probabilistic learning methods. Identify major features and outline the
method to solve the problem.

Page 1 of2
|12]
Q.3 Attempt Any ONE from the following questions.
[6]
CO2 N (a) What is the overfitting problem in machine learning?
() Explain how Regularization can help overcome overfitting in Linear Regression. Linear Regression
(ii) If we have more features and we want perform feature selection for solving the
problem, which kind of regularization can we use? Write and explain with necessary equations.
of the distinct (°!
CO2 N (b
What are the problems associated with choosing a multiway split with ope branch for each
values of attribute in Decision Tree Learing. Explain the significance of choosing Gain Ratio as an
attribute selection method. Write and explain with necessary equations and examples.
OR
cO3 N (a) Consider the given dataset where the user is trying to determine whether aparticular food is appealing or lo]
not based on the food's temperature, taste and size.
Temperature Taste Size Appealing
Hot Salty Small No
Cold |Sweet Large No
|Cold Sweet Large No
Cold Sour Small Yes
Hot Sour Small Yes
Hot |Salty Large No
Hot Sour Large Yes
Cold Sweet Small Yes
Cold Sweet Small Yes
Hot Salty Large No

i) What is the initial entropy of appealing?


i) Assume that Taste is chosen for the root of the decision tree. What is the information gain associated
with this attribute? Show all steps and define necessary formulas used.
ii) Write the conditions under which overfitting can occur in Decision Tree Learning.
CO2 A (b A spam email classification system is given 100 data instances to predict whether an email is spam or [6]
not. Out of all, actually 91 samples are spam. The system predicts spam in 98 cases out of which only 90
predictions are correct. Consider spam as a positive class. Create a confusion matrix for the given
classifier.

i) Calculate Accuracy, Precision, Recall and FPR for the given system and discuss whether the
classification system is a good classifier or not. Justify your answers.
i) Why do we use Precision and Recall when we have Accuracy as aperformance measure?

Page 2 of 2
NADIAD
DHARMSINH DESAI UNIVERSITY,
FACULTY OF TECHNOLOGY
FIRST SESSIONAL
SUBJECT: COMPUTER NETWORKS
Seat No.
Examination : B.Tech Semester VI :Tuesday
Date :03/01/2023 Day :36
Max. Marks
Time :3:15 PM to 4:30 PM

INSTRUCTIONS:
1. Figures to the right indicate maximum marks for that question.
2. The symbols used carry their usual meanings.
3. Assume suitable data, if required & mention them clearly.
4 Draw neat sketches wherever necessary.
[12]
Q.1 Do as directed.
following new IP addresses: 212.56.132.0/24, [2J
CO2 E (a) A router has just received the 212.56.135.0/24. If all of them use the same
212.56.133.0/24, 212.56.134.0/24 and
not, why not?
outgoing line, can they be aggregated? If so, to what? If [2]
CO2 A (b) An [Pv4 packet has first few hexadecimal digits as shown below:
0X4800005CO00300005906....
1) What is the header length of this packet?
2) How many bytes of options are being carried by this packet? contains 1024 [2)
CO4 N (c) Which of the following can be the beginning address of a block that
o4 addresses? Show your calculation. 2
<I) 205.16.37.32 2)190.16.42.0, 3) 17.17.32.0
5 bits long in case of [2]
A (d) How many frames can be outstanding if sequence number is
CO1
selective repeat, go back
81
n, and stop and wait protocol?
N How many bit(s) error can be detected and corrected by the octets: OxE2, 0x37 and [2]
(e)
COI OxC8?
Does
E (0 The receiver receives code word 100000001. The generator polynomial is x* + x*+1. (2]
CO1 the received data have an error? (show the procedure)
Yes
Q.2 Attempt Any THWO from the following questions. [12]
CO3 U (a) Which addresses are used in computer networks? What is the size of each of them? [61
Also mention the places of them in TCP/AP protocol stack?
CO3 E (b) Why is framing required? Name the methods for framing. Following character [6]
stream is sent over the transmission link using character count.
43245 223762234 66312.37472439343 1 6
(i) How many frames are present in given stream? 4
(ii) Receiver receives 4" in place of "$", What will be impact of this error?
cO3 A (c) Source needs to send a message consisting of 10frames to destination using go back (6]
n(sender's window size-4). AIl frames are ready and immediately available for
transmission. No acknowledgement is ever lost. Which of the following scenario is
preferable? Why? (Show the entire procedure) 1 l l send frmes
() If every 3th frame that source transmits gets lost. 2, ttey fhemey
(ii) If every 4th frame that source transmits gets lost. oo

Q.3 Answer the following questions. [12]


CO4 C (a) Assume that amedical center has four departments. Each department necds to have a [6]
certain number of hosts. Their requirement is listed as follows:
Department Devices
Radiology 60
Oncology 45

Billing 28
Sales 17
Assume that the medical center has been assigned anetwork with the starting address
of 198.201.192.0/24. Please heip the medical center to come up with a subnetting
Page 1 of 2
plan for the four departments.
For each department, listed in the table, find the following
1) First and the last IP address of the allocated block.
2) Subnet mask
CO3 N (b) Compare and contrast OSI and TCP/IP reference models. 14]
C02 E (¢) Which of the following fields of an P header is/are modified by a typical IP router? (2]
Justify your answer.
A, Checksum B. Source address C. Time to Live D. Destination address

OR

0.3 Answer the following questions. [12]


CO4 C (a) Consider the following hypothetical section of the internet. As shown in the figure, (6]
router R1 has three interfaces (m0,ml and m2). Assign IP address to the each
interface ofR1. Also, write routing table for the router RI. Now, Rl receives a packet
with destination IP address: 170.16.7.35. On which interfaces will the router RI
forward this packet? Explain.
170.14.0.016 145.80.0.024
In2 l
RI

Rest of
the 111.0.5.5
mi 111.0.0.08
Internet R2
Default
souter
n! 1110.0.1
R3
no 192.16.7.2
192.16.7.0:26
CO3 N (b) Explain the following fiber optic networks:
1. Fiber optic ring (4)
2. Passive star
CO2 E (c) An organization is granted the block
130.34.12.64/26. The organization needs four [21
subnetworks, each with an equal number of hosts. Find the subnet mask. Also, find
the number of addresses in each subnet.

Page 2 of 2
Po 26 o32
DHARMSINH DESAI UNIVERSITY, NADIAD
FACULTY OF TECHNOLOGY
FIRST SESSIONAL
SUBJECT: (CE-618) NETWORK & INFORMATION SECURITY
Examination B.Tech Semester VI Seat No. :E73
Date :04-01-2023
Time
Day :Wednesday
:3:15 pm to 4:30 pm Max. Marks :36

INSTRUCTIONS:
1. Figures to the right indicate maximum marks for
2 The symbols used carry their usual meanings. that question.
Assume suitable data, if required & mention them clearly.
4. Draw neat sketches wherever necessary.

Q.1 Do as directed.
|12]
COI (a) necessary
Check if n=19 is prime or not by applying Fermat's Theorem using a-3. Show 2]
steps of computation.
CO2 U (b) Explain Square root test with example. [2]
CO1 A (c) Compute (343). What does the answer signify? (2]
CO1 R (d) Show that 10" mod x =(10 mod x)" mod x.
[2]
CO2 A (e) Apply Autokey cipher to encrypt the plain text attack" with key =12. [2]
CO1 () Compare active attacks and passive attacks. [2]
Q.2 Attempt Any TWO from the following questions. [12]
CO2 E (a) Evaluate using the Vigenere cipher with keyword PASCAL" to encrypt the (6]
message "sheislistening".
CO2 A (b) Do as directed for the following. Consider modulus 26. [6]
() Apply affine cipher with key pair (7,2) and decrypt cipher text "ZEBBW"
(i) Apply multiplicative cipher with key 7 to encrypt the plain text "hello".
CO2 A (c) Apply Playfair cipher using asecret key "ORANGE>to encrypt the following
[6]
plain text (i) sports (ii) apple.
Q.3 Attempt the following questions.
CO4 N (a) Explain in detail the Factorization and Chosen- [12]
Cipher Text Attacks
CO3 A (b) Consider the following Super-increasing tuple A'= (7 11 23 43 on RSA. [6]
87 173 357}. [6]
Assume Modulus M=1001 and random integer W=41. Encrypt letter
'a using
Knapsack cryptosystem. Decrypt cipher text and show that you are getting the
plain text letter 'a' back.
OR
Q.3 Attempt the following questions.
C04 R (a) What is cryptanalysis? Explain any three [12]
CO3 A (b) Alice and Bob want to
crypt-analytical attacks in detail. [6]
communicate using RSA algorithm. Alice has selected [61
two prime numbers p-29 and q-37. Alice has
valid or not according to RSA? Calculate pairselected e=25. Check whether e is
of keys (public and private) on
behalf of Bob. Alice sends a message M=28
key of Bob. Decrypt the answer of encryption after doing encryption using public
using private key of Bob.
Note: Necessary calculations must be shown in
detail. Direct answers are not
acceptable.

Page 1 of 1
kolco

DHARMSINH DESAI UNIVERSITY, NADIAD


FACULTY OF TECHNOLOGY
B.TECH - Semester- VI (Computer Engineering)
SUBJECT: (CE 614)THEORY OF AUTOMATA & FORMAL
LANGUAGE
Examination
Date
: 1* Sessional
Seat No.
Time :06/01/2023
: 1. Hr, 15 Min. Day
Max. Marks :36

INSTRUCTIONS:
Figures to the right indicate
2
The symbols used carry maxin1um marks for that question.
3
Assume suitable data. if their usual meanings.
4
Draw neat sketches required &mention them clearly.
wherever necessary.
Q.1 Do as Directed
CO1-A a. Let L= {a bm |12]
C02-U b. Let L be a n=2m, m>0}. Find the language L 2
regular language.
Prove: for any n>0, L" is also a 2
CO2-R C.
Define recursively 8* for regular language
CO1-N d. Let Deterministic
S=la.b}.Give recursive definition Finite Automata
for the language L,
a
CO1-R e. Prove by
containing exacty one
Q.2 Answer the Contradiction: Let be a positive integer. Ifn' is even, then n is even
n
3
CO1-N
Following (Any Two)
a. Give recursive (12)
detinition for Fully Parenthesized Algebraic
Prove using Strucuural Induction : Ifx is a string in AE, thenExpression (AE). 6
contains at least as many left parenthesis as right.
CO1-R b. Define Length
any prcfix of x
and Reverse functions
the Principle of recursively. Using your definition, using
CO1-U C. LetG(V, E)be Mathematical Induction
an undirected graph with n
prove that for any string x, xF x| 6

sum of the degrees of all vertices is vertices and m edges. Then, the 6
equal to twice the number of edges, i.e.
) degree(n) =2 m.
n¬V
Prove the statemcnt using the
Principle of Mathematical Induction.
0.3 Answer the Following
CO2-A a.
Find Regular Expression for the
following languages [12]
1)
Language of all strings that end with 00. oo) 6
1.anguage oi ali stI:ngs that contains substring 00 Co)(o )(1+0
Language of all strings that contains
CO2-C Language of all strings that contains exactlv wo 0's coo ?
atleast two 0's
Construct FA for the reguiar Expression (iotolCtte)*
:(1+10+110)*0 6
OR
Q.3 Answer the Following
CO2-N a.
LI=x belongs to {a.b}*
and x begins witlh aa) find andx ends with bb; and L2= (x belongs to fab}*
|12]
CO2-C LinL2
b. Find a string of minimum
to the given regular length in 0.1}* not in the language
1. 1*(0l| *}*0*
expression corresponding 4
3. 0*(10)*1*
2. 0*(0+01*0*
4. ((0+1y* (^t0+)

You might also like