Professional Documents
Culture Documents
2. (a) Compute th~ joint variable vector q =[q1' q2' q3' q4]T for the following tool 10
cunfiguratiol1 vector of SCARA. W(q) = [203'4, 662,7, 557, 0, 0, - 1.649]T.
I'"" (b) Explain the process of linear interpolationwith parabolic blends. 10
. 2. (a) Using D-H Algorithm, perform direct kinematic analysis of 5 axis RHINO 10
XR3 robot.
(b) E::plain the principle and applications of edge detection techniques using 10
gray scale image.
4. (a) Explain bounded deviation algorithm for achieving straight line motion. 10
(b) Describe the solution of inverse kinematic problem of a 2-axis planar robot. 10
(b) List at least three kind damage a company could suffer when the integrity of a 5
"
program or company data is compromised.
~./ (c) What do you mean by operating system and application finger printing? 5
(d) Describe Memory and Address protection. 5
5. (a) What do you m;eanby Stealth Mode IDS? Describe IDS strengths and limitations. 10
(b) Define the ter"1 Ethics. What is difference between Laws and Ethics? What ISIEEE 10
code for Ethics?
6. (a) List and explain the various malicious codes and Non-malicious codes. 10
(b) Describe different types of firewalls with design, configuration and limitations. 10
"""~"- ""-;..c;i:lc/
~r -"'c ,. '-,
, ~- P w k f)1,
.
\.. ~ -
j Vl-r\pnl-IO-188
~~
,'"" -
""=, Con. 3839-10. AN-3154
~;;~
:" ( 3 Hours) [Total Marks: 100
Transaction-id Items
r-. T1 K, A, 0, 8
. T2 0, A, C, E, 8
T3 C, A, 8, E
11- T4 8, A, D.
(v) Pivot.
3. (a) State key issues to be considered while planning for data warehouse. 10
Explain any four of them.
(b) What is Web Mining? Explain Web Usage mining. 10
[TURNOVER
- . -"'"
VT-,\pril-IO-189 ~~it~~ \~
Con. 3839-AN-3154-10. 2 '
6. (a) What is Web Structure mining? What are techniques used for it? What 10
are authorative and hub pages?
(b) What is KDD? Explain KDD process with neat diagram. 10
j *********
i
;
'"
cc- -- c'
- P
~--~-"-~-:-C:C--""'-'
/ I Ce
-~
..-~'~.
~
$eVV\~-vf\\ Dt."
f- YV1 . '1-~ -""l.DfO
l~,-c
~
~£
10-p3-upq-ConNo FIle
-.
-s-e!fY') "~\~JtJ r . } R~vI Co rn fiT
IV. t-J . ~ f'.5.
T. ~ ~ , ~'-b
"numbersclose to 5". 05
(c) Define with examplesthe terms Projectionand Cylindrical Extensionin a
fuzzy relation. 05
(d) Differentiate betweenthe membershipfunctionsT function and Zadeh'sS
function. 05
Q.6 (a) Explain RBF network and give the comparisonbetweenRBF and MLP. 10