Semester 7 AI-DS question Papers May 2024 kT

1. AI & ML In Healthcare

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No. 1 is compulsory.
  2. Answer any three out of remaining questions.
  3. Assume suitable data if necessary.
  4. Figures to the right indicate full marks.

Q1. (20 marks)

Attempt all parts:

a) List down the applications of NLP in Healthcare. (5 marks)

b) Illustrate Knowledge Discovery Process in healthcare with a neat diagram. (5 marks)

c) Explain why AI is called a multifaceted discipline. (5 marks)

d) Explain Robot assisted surgery. (5 marks)

Q2. (20 marks)

a) Explain Multi classifier Decision Fusion. (10 marks)

b) Differentiate Model parameters from Hyperparameters. Demonstrate Grid search & Random search hyperparameter tuning algorithms with example. (10 marks)

Q3. (20 marks)

a) Explain low level NLP components with suitable example. (10 marks)

b) Outline the structure of Explainable AI (XAI) and explain its advantage over traditional AI models. (10 marks)

Q4. (20 marks)

a) Explain the Use Case “Evidence based Medicine” and “Personalized Medicine”. (10 marks)

b) How does blockchain technology contribute to the healthcare sector? Explain with suitable examples. (10 marks)

Q5. (20 marks)

a) Cancer is a leading cause of death globally. It can be cured if detected early. For this, an AI model has been created to predict whether or not there is a chance of disease. The confusion matrix for the model is given below in Table 1. (10 marks)

Based on this confusion matrix, calculate the following:

  • Accuracy
  • Precision
  • Recall (Sensitivity)
  • F1-score

Define the terms: Accuracy, Precision, Recall and f1-score.

b) Define Intelligent Personal Health Record (iPHR). List and explain in brief the functions provided by iPHR for users in managing their health information effectively? (10 marks)

Q6. (20 marks)

Explain any Two: a) Deep Learning b) Evolutionary Algorithm c) Ensemble Learning


2. Blockchain Technologies (DLOC – IV)

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No. 1 is compulsory.
  2. Answer any three out of the remaining questions.
  3. Assume suitable data if necessary.
  4. Figures to the right indicate full marks.

Q1. (20 marks)

Attempt any 4:

a) Define blockchain. Compare different types of blockchain.

b) State and explain various mining pool methods.

c) What is a Bitcoin script? Explain pay-to-public-key-hash (P2PKH) scripts with a suitable example.

d) How is swarm different from whisper?

e) Write a program in solidity to check whether an entered number is a palindrome.

Q2. (20 marks)

a) With a suitable diagram, explain the structure of a block header with a list of transactions. (10 marks)

b) Compare Bitcoin and Ethereum. How to calculate mining difficulty in Bitcoin? (10 marks)

Q3. (20 marks)

a) Describe the architecture of Ethereum. (10 marks)

b) Explain fixed and dynamic arrays in solidity with suitable examples. (10 marks)

Q4. (20 marks)

a) Elaborate on RAFT consensus mechanism. (10 marks)

b) Write and elaborate a code in solidity to explain visibility and activity qualifiers. (10 marks)

Q5. (20 marks)

a) Distinguish between altcoins, utility tokens and security tokens. (10 marks)

b) Describe Byzantine fault tolerant (BFT) algorithm. (10 marks)

Q6. (20 marks)

Write short notes on (any 2): a) ERC20 and ERC721 b) UTXO model of Bitcoin c) Corda d) Blockchain in supply chain management


3. Big Data Analytics

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question 1 is compulsory
  2. Answer any three out of the remaining five questions.
  3. Assume any suitable data wherever required and justify the same.

Q1. Write short notes on: (20 marks)

a) Big Data and its characteristics b) Distance measures for Big Data c) The Map and Reduce Tasks d) Bloom filter for stream data mining

Q2. (20 marks)

a) Explain HDFS architecture. (10 marks)

b) Explain Column family store and Graph Store NoSQL architectural pattern with example. (10 marks)

Q3. (20 marks)

a) Write a Map reduce pseudo code to multiply two matrices. Illustrate with an example showing all the steps. (10 marks)

b) Explain Issues in Data stream query processing (10 marks)

Q4. (20 marks)

a) List the main components of Map reduce execution pipeline. (10 marks)

b) Explain DGIM algorithm. (10 marks)

Q5. (20 marks)

a) Explain Collaborative filtering system. How is it different from content based system. (10 marks)

b) What is clique percolation method Write an algorithm on (CPM). Also show how the CPM finds clique for the following graph. Explain with steps. (10 marks)

Q6. (20 marks)

a) Explain PageRank algorithm. (10 marks)

b) Explain CURE algorithm. (10 marks)


4. Deep Learning

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No 1 is Compulsory.
  2. Attempt any three questions out of the remaining five.
  3. All questions carry equal marks.
  4. Assume suitable data, if required and state it clearly.

Q1. Attempt any four (20 marks)

a) What are Feed Forward Neural Network? b) Explain Gradient Descent in Deep Learning. c) Explain the dropout method and its advantages. d) What are Undercomplete Autoencoders? e) Explain Pooling operation in CNN.

Q2. (20 marks)

a) What are the Three Classes of Deep Learning, explain each? (10 marks)

b) Explain the architecture of CNN with the help of a diagram. (10 marks)

Q3. (20 marks)

a) What are the different types of Gradient Descent methods, explain any three of them. (10 marks)

b) Explain main components of an Autoencoder and its architecture. (10 marks)

Q4. (20 marks)

a) Explain LSTM model, how it overcomes the limitation of RNN. (10 marks)

b) What are the issues faced by Vanilla GAN models? (10 marks)

Q5. (20 marks)

a) What are L1 and L2 regularization methods? (10 marks)

b) Explain any three types of Autoencoders. (10 marks)

Q6. (20 marks)

a) What is the significance of Activation Functions in Neural Networks, explain different types Activation functions used in NN. (10 marks)

b) What are Generative Adversarial Networks, comment on its applications. (10 marks)


5. Game Theory for Data Science (DLOC – IV)

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No. 1 is compulsory.
  2. Attempt any three questions from remaining five questions.
  3. All questions carry equal marks.
  4. Assume suitable data, if required and state it clearly.

Q1. Attempt any four. (20 marks)

a) Explain the difference between strategies, preferences and payoffs in game theory. b) What is a Bayesian game? Illustrate with an example. c) Describe the differences between zero-sum and non-zero-sum games with suitable examples. d) Explain the concept of Pareto efficiency in game theory. e) How is the concept of utility used in game theory? Explain with an example. f) Describe how the discount factor (δ) affects the players’ preferences for current versus future payoffs in infinitely repeated games.

Q2. (20 marks)

a) Consider a game with the following payoff matrix for Player A and Player B: (10 marks)

B1B2A14,23,3A22,31,4

i. Identify the Nash Equilibrium, if any. ii. Discuss whether this game has a dominant strategy for any player.

b) Explain in detail the prisoner’s dilemma (PD) with payoff matrix and with suitable examples. (10 marks)

Q3. (20 marks)

a) Explain typical application areas for game theory with proper examples. (10 marks)

b) Explain the Vickrey-Clarke-Groves (VCG) mechanism with an example. (10 marks)

Q4. (20 marks)

a) Explain the concept of mixed strategy equilibrium. How does it differ from pure strategy equilibrium? Illustrate with an example. (10 marks)

b) What is a sequential game? How does it differ from a simultaneous game? (10 marks)

Q5. (20 marks)

a) What is Mechanism Design in game theory? Discuss its importance in economics, data science or any domain. (10 marks)

b) What do you mean by games with Perfect Information and games with imperfect information? Explain with examples. (10 marks)

Q6. Write short note on any two (20 marks)

a) Computing Solution Concepts of Normal – Form Games b) Bertrand and Cournot models of oligopoly. c) Repeated Games


6. Management Information Systems

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No 1 is Compulsory.
  2. Attempt any three questions out of the remaining five.
  3. All questions carry equal marks.
  4. Assume suitable data, if required and state it clearly.

Q1. Attempt any FOUR (20 marks)

a) List the various components of CBIS. (5 marks) b) What are the features of Executive Support System? (5 marks) c) Define Information security with an example. (5 marks) d) Are Blogs and Wikis different? Justify with application of each. (5 marks) e) How is E-commerce supported by MIS? Give one case to describe same. (5 marks)

Q2. (20 marks)

a) Highlight the Economic impacts of IS. Give example. (10 marks)

b) What do you mean by CAAS, SAAS, IASS? Give the application of each of these. (10 marks)

Q3. (20 marks)

a) Contrast to bring out the advantages and disadvantages of Competitive environment in an organization. (10 marks)

b) Discuss how privacy issue can impact transborder data flows? (10 marks)

Q4. (20 marks)

a) What are types IS? Explain with example. (10 marks)

b) Identify advantages and drawbacks of businesses implementation which uses an enterprise resource planning system. (10 marks)

Q5. (20 marks)

a) Briefly describe the risks of social computing to business giving suitable examples. (10 marks)

b) Is security an ethical responsibility? Justify with a case study. (10 marks)

Q6. (20 marks)

a) Analyze the key benefits of cloud computing (10 marks)

b) How the quality of data is ensured in an organization? (10 marks)


7. Natural Language Processing (DLOC – III)

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No. 1 is compulsory
  2. Attempt any three questions from remaining five questions
  3. Assume suitable data if necessary and justify the assumptions
  4. Figures to the right indicate full marks

Q1. Answer the Following. (20 marks)

A) Compare derivational and inflectional morphology with suitable example (5 marks)

B) Discuss various challenges in processing natural language. (5 marks)

C) Discuss Information Retrieval vs Information Extraction in detail (5 marks)

D) What do you mean by word sense disambiguation (WSD)? Explain machine learning based (Naive based) approach for WSD. (5 marks)

Q2. (20 marks)

A) Write a note on Syntactic and Semantic Constraints on Coreference. (10 marks)

B) Explain Porter’s Stemming algorithm with example. (10 marks)

Q3. (20 marks)

A) Explain with suitable example following relationships between word meanings: Homonymy, Polysemy, Synonymy, Antonymy, Hypernomy, Hyponomy, Meronomy. (10 marks)

B) What is Natural language processing (NLP)? Discuss various stages involved in NLP process with suitable example. (10 marks)

Q4. (20 marks)

A) Explain N-gram model with example. (10 marks)

B) Explain in detail Stochastic (HMM) tagging. (10 marks)

Q5. (20 marks)

A) Consider following Training data:

Copy<s> I am Sam </s>
<s> Sam I am </s>
<s> Sam I like </s>
<s> Sam I do like </s>
<s> do I like Sam </s>

Assume that we use a bigram language model based on the above training data. What is the most probable next word predicted by the model for the following word sequences?

  1. <s> Sam …
  2. <s> Sam I do …
  3. <s> Sam I am Sam …
  4. <s> do I like …

(10 marks)

B) What is parsing? Explain types of parsing in NLP. (10 marks)

Q6. Write Short Notes. (5 marks each, 20 marks total)

a) Named Entity Recognition b) Wordnet c) Reference Resolution problem d) Machine Translation


8. Security Information Management

Duration: 3 Hours
Total Marks: 80

Instructions:

  1. Question No.1 is Compulsory
  2. Attempt any three questions out of remaining five.
  3. All questions carry equal marks
  4. Assume suitable data, if required and state it clearly.

Q1. Attempt any FOUR (20 marks)

a) Explain basic principles of confidentiality & integrity. b) Illustrate password vulnerabilities. c) Describe End point protection in web application security. d) Compare the IDS and IPS with various parameters. e) Differentiate between a Hot Site, Warm Site, and Cold Site for facility recovery in disaster recovery.

Q2. (20 marks)

a) Describe various Access Control techniques. (10 marks)

b) What are the objectives of IT ACT? Explain in detail IT ACT 2000 and IT ACT 2008. (10 marks)

Q3. (20 marks)

a) Enlist OWASP top ten Vulnerabilities and explain any three in detail? (10 marks)

b) Describe cloud computing. Write the benefits and issues related to information security. (10 marks)

Q4. (20 marks)

a) Describe Risk assessment techniques outlined in ISO31010 framework (10 marks)

b) Summarize Various Audits in Windows Environment and explain it. (10 marks)

Q5. (20 marks)

a) Explain Availability, Mean Time Between Failure (MTBF), Mean Time to Repair (MTTR), and Calculate the Availability for a product has MTBF of 200hrs and MTTR of 10 hrs. (10 marks)

b) Explain in details Policies, Procedures and Guidelines of Information Security? (10 marks)

Q6. (20 marks)

a) Apply the concept of vulnerability to any real time application. Differentiate between threat, vulnerability & risk? (10 marks)

b) Define XSS attack and explain how it can be used to manipulate a web application with example? (10 marks)

Team
Team

This account on Doubtly.in is managed by the core team of Doubtly.

Articles: 480