mgu.ac.in M.Tech Computer Science and Engineering Question Paper Model : Mahatma Gandhi University
Name of the University : Mahatma Gandhi University
Degree : M.Tech
Name Of The Subject : Computational Intelligence
Document type : Model Question Paper
Website : mgu.ac.in
Download Computational Intelligence Question Paper : https://www.pdfquestion.in/uploads/7529-BioComputing%20.docx
Download Bio Computing Question Paper : https://www.pdfquestion.in/uploads/7529-ComputationalIntelligence%20.docx
Computational Intelligence Model Paper :
Answer the following Questions.
1.a) Discuss in brief the logical frameworks for handling problems posed by uncertainty.
b) Explain defuzzification methods
c) Write notes on fuzzy decision making applications
Related / Similar Question Paper :
MGU B.Sc Chemistry Question Paper
or
2 a) Write notes on fuzzy arithmetic operations.
b) Explain linguistic descriptions of fuzzy systems
c) Carry out fuzzy arithmetic operations for the linguistically defined terms
x = very close to 3
y = more or less equal to7 using both the alpha-cut and the extension principle.
3 a) Explain ANN and Artificial neuron
b) What is feed forward neural network
c) Differentiate supervised learning and unsupervised learning
or
4 a) Explain back propagation neural network and calculation of weights of hidden-layer Neurons.
b) Derive the back propagation learning algorithm for a network with quasi polynomial synapses and product contacts.
5. a) Explain procedures of genetic algorithms.
b) What are different genetic representations?
c) Explain different genetic crossovers
or
6. a) Explain about support vector machine learning
b) What are classifiers for support vector ?
c) Write notes on support vector regression.
7. a) What is self organization in social insects? Explain with examples
b) What are different modes of communication in ants?
c) What are different of pheromone trail updating?
8. a) What is an expert system shell?
b) Explain probability based expert system
c) Write notes on expert system tools
Bio Computing :
Answer the following Questions.
1.a) Explain the different Molecular Biology Tools
b) Discuss the Gene Structure
c) What is Base Pairing
or
2.a) Which are the major Databases in Bioinformatics
b) Discuss the different Data Retrieval Tools
c) How Data Mining can be done in Biological Databases
3.a) Explain the different methods of Sequence Alignments
b) What is Phylogenetic Analysis?
c)How is Scoring Matrices used to compare two sequences
or
4.a) Explain the FASTA Algorithm
b)Explain the BLAST Algorithm
c) Compare the FASTA and BLAST Algorithms
5.a) Explain the Hidden Markov Models
b) What are DNA Microarrays
or
6.a)Explain the different Gene prediction methods
b) Discuss the different clustering techniques used to identify the pattern in gene-expression
7.a) How is Protein Structure Visualized?
b) How Protein is classified based on Structures?
c) Discuss the different Protein Classification Approaches
or
8.a) Discuss the various tools used for protein identification and characterization
b) Explain Sequence based Protein Prediction
c) Discuss the AB initio Approach for Protein Prediction
MCSCS 103 Web Security :
Regular – 2013 Admission onwards
Time: 3hrs
Maximum: 100 marks
Answer the following Questions :
1. a) Different approaches are used for handling user input in web applications. Explain (13)
b) Explain the user directed spidering technique. What are its benefits? (12)
Or
2. a) How can you relate authentication functionality with application design? (13)
b) Discuss some of the common vulnerabilities with respect to access control. (12)
3. a) What is SQL Injection? How it is done? (10)
b) Explain the common techniques for SQL Injection (7)
c) You are trying to exploit a SQL injection flaw by performing a UNION attack to retrieve data. How is it useful for you?(8)
Or
4. a) Write a note on Insecure Database Configuration (8)
b) Discuss the types of Internet firewall? (8)
c) Explain some mechanisms for securing the database against the web attacks.. (9)
5. a) What is HTTP finger printing? How can we use ModSecurity to defeat HTTP finger printing (11)
b) Explain the following attacks:
– Shell command Execution (7)
– Null Byte (7)
Or
6. a) A news headline reads “The website of a company X is hacked and their homepage was replaced with an obscene message”. What really happened and how can it be avoided? (12)
b) Blog Spam and Directory indexing can cause problems on the web. Explain (13)
7. a) Discuss the methodologies used for web application hacking? (10)
b) Explain canonicalization attacks (8)
c) What is Denial of Service (7)
Or
8. a) Explain database hacking? (8)
b) Explain database discovery? (9)
c) Give a description on Web crawling. (8)