Saturday, February 11, 2012



Guidelines to prepare B.Tech project documentation


Font       :               1. Chapter Names            -              16  TNR (bold) all caps
                                2. Headings                        -              14 TNR (bold) all caps
                                3. Subheadings                 -              14 TNR (bold) Title case
                                4. Sub – sub headings    -              12 TNR (bold) Title case
                                5. Body of Project            -              12  TNR
                                6. Text in Diagrams         -              12 TNR (all lower case)
                                7. Diagrams / Table headings / Fig. Headings      -              12’ TNR Title case
                                8. If any   text                                12’ TNR (Title case)

Spacing                :1. 2 line spacing between heading and body text.
                                2. 1.5 line spacing in body text.
                                3. New paragraphs start with single tab.

Margins :             Left  1.5’                               Right    1.0’
                                Top 1.0’                                Bottom 1.0’

Page numbers:                 position          Bottom, Middle
                                1. Front Pages                   Small Roman Numbers
                                           (Excluding title page, Certificate page, Acknowledgement  page)
                                                2. Body pages                    1,2,3 ……….
                                                3. Annexure                       1,2,3………..
                                                  (Separate for each Annexure)

Pages    :               Size        :               A4 paper                                             Color:    White

Documentation :  Spiral Binding              


Front Pages        Page 1                   Title Page
                                Page 2                   Certificate
                                Page 3                   Company Certificate
                                Page 4                   Acknowledgement
                                Page 5                   Contents
                                Page 6                   Abstract
                                Page 7                   List of Figures/ tables/ screens
                                Page 8                   Symbols & Abbreviations

=========================================================================

CONTENTS
Abstract
List of Figures
List of Tables
List of Screens
Symbols & Abbreviations

1.       Introduction                                                                                     
1.1   Motivation
1.2   Problem definition
1.3   Objective of Project
1.4   Limitations of Project
1.5   Organization of Documentation

2.       LITERATURE SURVEY                                                                     
2.1   Introduction
2.2   Existing System   
2.3    Disadvantages of Existing system
2.4    Proposed System
2.5   Conclusion

3.       Analysis                                                                                           
3.1   Introduction
3.2   Software Requirement Specification
3.2.1          User requirement
3.2.2          Software requirement
3.2.3          Hardware requirement
3.3   Content diagram of Project
3.4   Algorithms ad Flowcharts
3.5   Conclusion

4.       DESIGN                                                                                                               
4.1   Introduction
4.2   DFD / ER / UML diagram (any other project diagrams)
4.3   Module design and organization
4.4   Conclusion

5.       IMPLEMENTATION & RESULTS                                                  
5.1   Introduction
5.2   Explanation of Key functions
5.3   Method of Implementation
5.2.1 Forms
5.2.2 Output Screens
5.2.3 Result Analysis
5.4   Conclusion

6.       TESTING & VALIDATION                                                              
6.1   Introduction
6.2   Design of test cases and scenarios
6.3   Validation
6.4   Conclusion

7.       CONCLUSION :  First Paragraph                                 -              Project Conclusion
Second Paragraph           -              Future enhancement

REFERENCES       :              
1.       Author Name, Title of Paper/ Book, Publisher’s Name, Year of publication
2.       Full URL Address

===========================================================================

                                                            A  Project report on
<<   Title of the project    >>
BACHELOR  OF TECHNOLOGY
IN
<< Computer Information Technology >>
Submitted By
<<  Name of the Student  >>
<<  Hall Ticket No  >>
Under the Guidance of
<<  Guide Name  >>
<<  Designation  >>   
<<  College Logo  >>
Department of  Information Technology,
<<  GURUNANAK INSTITUTE OF TECHNOLOGY  >>
(Affiliated to Jawaharlal Nehru Technological University)

2012


===========================================================



<<   GURUNANAK INSTITUTE OF TECHNOLOGY  >>
Department of Information Technology

<< college logo >> 

 

 

CERTIFICATE


This is to certify that the project report titled <<  Project Title  >> is being submitted by <<  Student Name  >>, bearing << H.T. No >>, in I B.Tech IV II semester Computer Science & Engineering is a record bonafide work carried out by them. The results embodied in this report have not been submitted to any other University for the award of any degree.



<<  Internal Guide  >>                                 <<  HOD  >>
<<  External  >>                                                                                                                         
                                                   
><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%">BACHELOR<span>  </span>OF TECHNOLOGY<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%">IN<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:115%"><<Computer Information Technology>><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:150%">Submitted By<b><o:p></o:p></b></span></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><< Name of the Student >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:150%"><< Hall Ticket No >></span></b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p></o:p></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size: 11.0pt;line-height:115%">Under the Guidance of<o:p></o:p></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%"><< Guide Name >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center"><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size: 11.0pt;line-height:115%"><< Designation >><b><span>    </span><o:p></o:p></b></span></p> <p class="MsoNormal" align="center" style="margin-bottom:0cm;margin-bottom:.0001pt; text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt;line-height:150%"><< College Logo >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">Department of <span> </span></span></b><b><span lang="EN-US" style="font-size:16.0pt; line-height:115%">Information Technology</span></b><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">,</span></b><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt;line-height:115%"><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;line-height:115%"><< GURUNANAK INSTITUTE OF TECHNOLOGY >><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%">(Affiliated to Jawaharlal Nehru Technological University)<o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;mso-bidi-font-size:11.0pt; line-height:115%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:20.0pt;mso-bidi-font-size:11.0pt; line-height:115%">2012<o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p><p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p><br></o:p></span></b></p><p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p>===========================================================</o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center;line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:16.0pt;line-height:115%"><<GURUNANAK INSTITUTE OF TECHNOLOGY>><o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:14.0pt;line-height:115%">D</span></b><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:115%">epartment of Information Technology<o:p></o:p></span></b></p> <h3 align="center" style="text-align:center;line-height:150%"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"/> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"/> <v:f eqn="sum @0 1 0"/> <v:f eqn="sum 0 0 @1"/> <v:f eqn="prod @2 1 2"/> <v:f eqn="prod @3 21600 pixelWidth"/> <v:f eqn="prod @3 21600 pixelHeight"/> <v:f eqn="sum @0 0 1"/> <v:f eqn="prod @6 1 2"/> <v:f eqn="prod @7 21600 pixelWidth"/> <v:f eqn="sum @8 21600 0"/> <v:f eqn="prod @7 21600 pixelHeight"/> <v:f eqn="sum @10 21600 0"/> </v:formulas> <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/> <o:lock v:ext="edit" aspectratio="t"/> </v:shapetype><v:shape id="Picture_x0020_6" o:spid="_x0000_s1026" type="#_x0000_t75" alt="gni" style='position:absolute;left:0;text-align:left;margin-left:194.55pt; margin-top:3.55pt;width:76.5pt;height:51pt;z-index:251657728;visibility:visible'> <v:imagedata src="file:///F:\Users\avinash\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg" o:title="gni"/> <w:wrap type="square"/> </v:shape><![endif]--><!--[if !vml]--><!--[endif]--><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p></o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p><<College logo>> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif""><o:p> </o:p></span></h3> <h3 align="center" style="text-align:center;line-height:150%"><span lang="EN-US" style="font-size:14.0pt;line-height:150%;font-family:"Times New Roman","serif"">CERTIFICATE<o:p></o:p></span></h3> <p class="MsoNormal" style="line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:150%"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="text-indent:36.0pt;line-height:150%"><span lang="EN-US">This is to certify that the project report titled << Project Title >><b><span>                </span></b></span><span lang="EN-US" style="font-size:16.0pt; line-height:150%"> </span><span lang="EN-US">is</span><span lang="EN-US" style="font-size:16.0pt;line-height:150%"> </span><span lang="EN-US">being submitted by << Student Name >>, bearing <<<b>H.T. No>>,</b> in I B.Tech IV II semester <i>Computer</i> <i>Science & Engineering</i> is a record bonafide work carried out by them. The results embodied in this report have not been submitted to any other University for the award of any degree.</span></p> <p class="MsoNormal" style="line-height:150%"><span lang="EN-US"><o:p> </o:p></span></p> <p class="MsoNormal" style="text-indent:36.0pt;line-height:150%"><b><span lang="EN-US"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="text-align:justify;text-indent:36.0pt;line-height: 150%"><b><span lang="EN-US"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="line-height:150%"><b><span lang="EN-US" style="font-size:14.0pt;mso-bidi-font-size:11.0pt; line-height:150%"><< Internal Guide >> <span>                                                                            </span><<HOD>><o:p></o:p></span></b></p> <p class="MsoNormal" style="line-height:150%;tab-stops:right 451.45pt"><b><span lang="EN-US" style="font-size:14.0pt; mso-bidi-font-size:11.0pt;line-height:150%"><< External >><span>                                                                                                                          </span><o:p></o:p></span></b></p> <p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p><p></p></DIV>

Friday, February 10, 2012

Biometrics Bit Questions




I Choose the correct alternative:
1. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
2. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
3. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
4. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
5. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
6. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
7. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
8. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
9. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
10. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper

11. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
12. Equal error rate also referred to as the________________.
13. Finger scan template can range in size from approx______________.
14. One of the major challenges of a Large –Scale biometric system is_____________.
15. Iris Scan Weakness pertains mainly to_____________ Issues.
16. ATV stands for ______________
17. _____________ analysis most widely utilized in facial recognition technology.
18. AFP stands for ______________
19. Primary visible Characteristics of iris is known as _____________.
20. The software component of Iris scan System are the image processing and _____________.


I Choose the correct alternative:
1. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
2. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
3. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
4. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
5. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
6. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
7. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
8. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
9. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
10. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code

II Fill in the blanks
11. One of the major challenges of a Large –Scale biometric system is_____________.
12. Iris Scan Weakness pertains mainly to_____________ Issues.
13. ATV stands for ______________
14. _____________ analysis most widely utilized in facial recognition technology.
15. AFP stands for ______________
16. Primary visible Characteristics of iris is known as _____________.
17. The software component of Iris scan System are the image processing and _____________.
18. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
19. Equal error rate also referred to as the________________.
20. Finger scan template can range in size from approx______________.

Objective Exam
Name: ______________________________ Hall Ticket No.
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
A
I Choose the correct alternative:
1. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
2. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen
3. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
4. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
5. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
6. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
7. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
8. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
9. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
10. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time

II Fill in the blanks
11. ATV stands for ______________
12. _____________ analysis most widely utilized in facial recognition technology.
13. AFP stands for ______________
14. Primary visible Characteristics of iris is known as _____________.
15. The software component of Iris scan System are the image processing and _____________.
16. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
17. Equal error rate also referred to as the________________.
18. Finger scan template can range in size from approx______________.
19. One of the major challenges of a Large –Scale biometric system is_____________.
20. Iris Scan Weakness pertains mainly to_____________ Issues.

I Choose the correct alternative:
1. The following allow the finger scan technology to be deployed in a range of logical and physical access environment [ ]
a) Enlarged Size and less power b) Reduced size and more power
c) Less power and reduced size d) Enlarged Size and more power
2. What is the weakness of Iris Scan? [ ]
a) It Maintains Stability of Characteristics over a lifetime.
b) It has a Profensity for false recognition.
c) It has the potential for exceptionally high levels of accuracy.
d) None
3. Why Biometric technology is So Popular
a) Since it is Automated. b) Since it is Manually Verified.
c) Since it is Costlier. d) Since it is cheaper
4. Irises have how many characteristics? [ ]
a) 80 b) 5 c) 266 d) 55
5. What is the name for the places where the ridges of a fingerprint meet or split? [ ]
a) Forks b) Minutiae c) Weaves. d) Fingers
6. Each Form of Biometrics churns out a code for a person after he/she enrolled .What is the name of the code used for Irises? [ ]
a) Iris Code b) Eigenfaces c) Template. d) Eris code
7. Why isn’t retina Scanning popular? [ ]
a) There’s no vendor. b) People find it somewhat intrusive.
c) Retina is not Unique. d) Retina is unique
8. What is the strength of finger scan [ ]
a) It can be deployed in a range of environment. b) Performance can deteriorate over time.
c) It is associated with forensic Application d) Performance can deteriorate less time
9. What is an algorithm? [ ]
a) A method of analyzing the structures of the eye.
b) A program that translates raw information into a code.
c) It’s similar to an ID Card.
d) A method of designing the eye
10. Dynamic Signature verification recognizes many Characteristics .What does is not recognize?
[ ]
a) The Shape of the Signature. b) The Pressure of the pen.
c) The Penmanship of the signature. d) The shape of the pen

II Fill in the blanks
11. AFP stands for ______________
12. Primary visible Characteristics of iris is known as _____________.
13. The software component of Iris scan System are the image processing and _____________.
14. Fingerprint ridges & valleys are characterized by discontinuities and irregularities Known as ___________
15. Equal error rate also referred to as the________________.
16. Finger scan template can range in size from approx______________.
17. One of the major challenges of a Large –Scale biometric system is_____________.
18. Iris Scan Weakness pertains mainly to_____________ Issues.
19. ATV stands for ______________
20. _____________ analysis most widely utilized in facial recognition technology




KEY
I Choose the correct alternative:
1. C
2. B
3. A
4. B
5. A
6. B
7. C
8. C
9. B
10. A
II Fill in the blanks
11. Minutiae
12. Crossover rate
13. 200 bytes to 1000 bytes
14. Initial enrollment
15. Operational issues
16. Ability to verify
17. Feature analysis
18. Automatic Face Processing
19. Trabecular mesh work
20. Matching engine


Thursday, February 9, 2012

Management Sciences Notes.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
..
..
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
















Monday, November 28, 2011

2nd mid exam imp questions......

Internal time table 

1/12 MC,ES 
2/12 MAD,HCI 
3/12 NP,SPM


HCI QUESTIONS:

Read all questions

1. List various kinds of keyboard layouts and explain them.
2. What are the typical problems associated with website navigation.
3. Give detailed note about the following.
Transition diagram
State diagram
4. What are the common message types and explain them.
5. What is function key? List various function keys
6. Write about different types of display devices.
7. What are the characteristics of an icon?
8. What are the possible problems with colors?
9. What are the characteristics of various screen based controls?






mad questions
Set-1
1.write short notes on media-on-demand(MOD)?
2.Explain TCP/IP protocols of multimedia networks?
3.Explain about
1.arithmetic coding encoder
2. Arithmetic coding decoder
4.What is idea behind embedded zerothree of wavelet coeffient?
5.Explain about what is the important properties of Human Coding?
6.Explain about Hybrid Excitation Vocoders?

Set-2
1.Explain about Broadcasting?
2.Compare dictionary based coding with lossless image compression?
3.Explain about Hybid Excitation Vencoder?
4.Explain broad cast schemes for vedio on demand in detail?
5.Explain the layers of OSI reference model?
6.Explain about MOD?







MC Imp questions:

U 5:
1.a Explain hoarding techniques
1.b What is data caching?
2. Explain in detail client/server computing with adaption

U 6:
1. Explain in detail
a. Push Based Mechanism
b. Pull Based Mechanism
2. Explain in detail about the selective tuning techniques

U 7:
1. What is MANET? Describe it's properties.
2. Explain with diagram dynamic source routing

U 8:
1. Briefly discuss about
a. WTP (Wireless Transaction Protocol)
b. WAE (Wireless Application Environment)
c. WAP (Wireless Application Protocol)
2. Describe blue tooth with user scenario







Es: mid questions
unit 5:1. a/d conversions, 2.serial data communication

u 6: 3.task and task states,4.semaphores,5.mesg queue,mailboxes,pipes,6.memorymanagement

u 7: 8.semaphore nd queues ,9.hard real tym scheduling considerations,10.linker/locators for embeded 11.debuggng techniques

u 8: 12.ARM, 13.I2c bus and CAN bus







 NP Questions:



1.Explain the role of resolver with neat diagram that depicts the typical arrangements of application resolvers and name servers?
2.Write the functions of echo lines(UDP) on datagram and datagram socket. Explain and discuss how UDP not having flow control?
3.With neat diagram, explain the RPC execution and describe numerous versions of discipline modules?
4.Explain the following:
(a)gethostbyname
(b)uname
(c)getseverbyname
5.What is semaphore? Explain how locking can be achieved with semaphores?











 SPM questions





1.WBS,PLANING GUIDELINES
2.EXPLAIN LINE OF BUSINESS ORGANISATION AND PROJECT ORGANIZATION
3.EXPLAIN 7 CORE METRICS
4.HOW CONTINUOUS INTEGRATION ,EARLY RISK RESOLUTION OF EVOLUTIONARY REQUIREMENTS ARE PERFORMED IN MODEL PEOJECTS
5.EXPLAIN CHECK POINTS OF PROCESS
6.EXPLAIN COST & SCHEDULE ESTIMATING PROCESS