Documente Academic
Documente Profesional
Documente Cultură
12- 011-J
COMPILER CONSTRUCTION
(2006 Scheme) Maximum Marks : 100 PAR.T A
(Answer
Time : 3 Hours
2!!f questions)
(8 x 5
:40)
I.
Define tokens, patterns and lexemes and give exarnples, What is the role of finite automata in compiler design? Distinguish between top down and bottom up parsing. Mention the names onetop down and boftom up pnsser. What is an operator grammar? Give example. Distinguish between synthesized and inherited attributes with examples. What is an activation record? Explain its role. Define basic block. Give an example. Explain any two code optimization techniques with example.
of
PART B
(4 x 15
:60)
(ts)
(10)
II.
phase.
phases of a
ru.
ry.
OR
(a)
(b)
(s)
Compute the FIRST and FOLLOW of the grammar and construct the predictive parsing table. E -+TE' T
(l 5)
-+(E)tid
OR
V.
(a) (b)
(a)
Define closure and goto operation ofLR parser. Explain LR parsing algorithm.
What are the diffqrent parameter parsing techniques? What are the data structures used for the implementation of a symbol table?
VI.
(b)
Explain
OR
vII. vm.
(a)
1s)
(8) (7)
x.
OR
What are the issues in the design of a code generator? Explain.
(l s)
BTS
Time : 3
Hours (Answerltr+questions)
PART A
(8x5=
4o)
I.
r[r]
it
is
of T = 0'003 seconds'
if it is digitized by an,ADC
Transform of the following signal Derermine the with Period T - 0.03 seconds
*-
x(t)=Yn
cos(zsr)z(r)
i(r)
as
*(f),
of i'(z)?
x[n]=[t,&2,6f
compuGthe
FFTX(K)
usingRadix-2 and
-4
group Show ttrat an FIR filter with antisymmefic impulse response has conshnt phase delay' delay, but not constant rmplement y(n)=x(n)+2x(n-l\$x{n-2\in Direct Form and transposed
Direct Forrn.
if"* it"itfr
variance of the qoanti*tion noise is 52/12, where s is tlre quantization steP size. Witf, a neat tabular colum& oompare the features of fixed point and floating point
DSP Processors.
PART B
(4x15=60)
il.
(a)
linear
(5)
(,)
y(,)=f!,t,-,)
f'fu- *)+c, c
| +{r(r
+g
a constant
(ii) y(z)=f
(b)
by
(10)
(n)
a, 1n-
Find
(i) (ii)
a ternporal variable? Is it
(S)
m.
(a)
* equation,
y(r)
+[r(r
+1)
(P.r.o)
O)
x(*)=fu
l-el>r
#-
transform
of
(7)
ifthe Ro'c
are
(i)
(ii)
IV.
(a) (b)
Using DFT, compute the 4 point circular convolution sequences 4(n) =lt l,z1r , a (r) = [3, 4,s,6,1r .
of the of the
(10) (5)
(i)
complex multiplications
(iii) real
(ii) complex additions multiplications (rv) real additions, required to compute the DFT
OR
(15)
V.
Given an 8 point FFT processor, which can be used only once, compute
DFTs of the sequence.
,
\rI. (a)
zeros,
(7\
nt*'=S'5'*11 ei'*q=fu*Jt
Ctreck whether this filter has got linear phase. State your leasons for the conclusion.
O)
n (*)
+!*i*-'
(8)
.
Implement the filter with minimurn number of multipliers. Will the filter have linear phase characteristics?
VIL
(a)
A system is given by
(10)
H(*)=t'-tt -
'
(t-*-')' It
t'
(r-|*")(r-|*")
vltr.
Implementthe system in Direct Form*II Transposed direct form =Il Cascade forrn, with subsections canonio Parallel form, with subseotions canonic What is the disadvantage of using Rectangular windowing for FIR filter
design?
(5)
(8)
y(n-t)+x(r)
Caloulate the quantization noise power at the output ofthe filter if the signal is quantizedto (i) 8 bits (ii) l6bits, bothcases includingthe sign bit. Explain limit cycle
oscillations.
(7\
(8) (7)
DL
(a) O)
OR
DSP
system.
BTS (C)
- Vr -04.12
013
Time:
3 Hours
Ma"rimum Marks: 1@
(8x5=40)
Define operating system. List out any five services provided by operating systm. Differentiate between preemptive and non preernpive scheduling.
Describe the memory management rrith buddy systems.
Define TLB. Explain the basic operations in TLB. De{ine file attribute. List any five file attributes.
Describe disk cache with a figure.
PART B
(4 x 15 =60)
r.
u.
(a)
(b)
Describe semaphore and its usage. Define a process. Describe process state diagram and PCB.
(s)
(10)
three
OR
List the five criteria for process scheduling and illustrate any
scheduling algorithm with an example.
process
(15)
ry.
V.
(a)
Differentiate between paging and segmentation. Define RAID. List and describe the RAID Levels.
(s)
(r0)
(s)
(10)
OR
Describe the three methods for contiguous memory allocation.
Explain the need of page replacement algorithms and describe any threc page
replacement algorithm.
VI,
(a)
(b)
Describe the need ofdevice controllers. Describe the operation of DMA with a diagram.
(s)
(10) (5) (10)
OR VII.
(a) (b) Explain any three directory structures schemes. Describe the file access and control mechanisms.
vm.
IX.
(a) (b)
(5) (10)
OR
Illustrate Banker's algorithm for several instance of resource type with an example.
(l s)
BTS (C)
- Vr -
04.12
014
-L
m3#r*
oF
AlcoRrrrrlr{s
Maximum lMarks : 100
(8x5:40)
I.
(a)
"Q'
of
(b)
(c) (d)
(e)
algorithms. How do we analyse algorithms based on (i) amount of space used and
(ii)
optimalit5i?
Black Tree.
(0
G)
(h)
Explain the dpamic programming technique used in algorithm desigr. Differentiate between NP complete and NP hard problems.
PART B
(4xls=60)
tr.
What do we understand by complexity of an algorithm? E:rplain worst complexity and average case complexity with a suitable example.
case
(15)
OR
Itr.
equation
(15)
r(n)=rcr(/u)+n
ry.
Write an algorithm for insertion sorting method. Atnlyze its
complexity. shatery
(15) (15)
OR
v.
Explain binary search algorithm as an example ofdivide and conquer and find its average case complority.
VI.
(ts)
(15)
OR
vIL
vm.
DL
(a)
binary relation.
What do you know by optimization problem? Give an example. Explain the first fit deoeasing sfrate5/ for bin packing pmblem
(s)
(10) (5) (10)
OR
E4plain the soquantial coloring algorithm for graph coloring problem. Discuss various straGgies applied for TSP problem.
BTS (C)
-Vr
-04.12
01s
Time:3 Hours
PART A
(Answer,{.ZZ questions)
(8x5=
(a) Find the inverse Laplace tansform Obtain the force current analory. Derive expression for the impulse response of a 2"d order system.
40)
of F(s) =
52
+2s+3
53 +6s2
+l2s+8
o)
(c)
(d)
(e)
(0
(e) (h)
Explain the properties of root loci. Draw the circuit diagram of a phass -lag network and derive the transfer function.
PART B
(4 x
15:60)
(15)
II.
Define transfer function. Find the kansfer function of the electrical shown in figure.
network
&r
.,,
R{
f,
u.
ry.
State and explain Mason's gain formula. Find the tansfer function of the signal flow graph shown in figure, using Masonls gain formula.
Derive.expression for the rise time, peak time and manimum peak of a2"" order system subjected to unit step input.
overshoot
(15)
OR
(P.r.o)
V. ,
(a)
The sverall
feedback system
is given
by
(9)
oryression
rryu
(b) VI.
Using Routh-Hurwitz criterion, find the range of 'K' to keep &e systenn be stable. The characteristic equation is sa + 25s3 + 15s2 + 20s + K = 0 . Draw the bode plot of the rmity feedback system whose open loop fimction is given Uy
"
(r) = L+ t + t2 .
to
(6)
fiansfer
mrgia
(15)
C(s)= ,-.1!.
s(t+o.ss)(t+o.oss)
VII.
fte sbrlity ofthesystemOR The open loop transfer fimction of a rmity feedbaok system is given
phase margin and check
by
(15)
OG)=;F,
gain
VItr.
Sketch the root locus for a unity feedback system with open toop
transfer
(15)
functionasgrvenby
G(' .")
=r
l.
OR
D(
(15)
r(s)=;1;}1.
that the static velocity e,rror constant Kv--20, the phase and the gain margin is atleast l2dB.
BTS(C)
- Vr-
04.12
016 - B
Time : 3 Hours
PART A
(Answer,{,trL questions)
I.
(8x5=40)
What is the significance of 'layered concept'
in
Computer Networks?
PART B
(4x15=60)
II. m. ry. V.
VI.
Briefly explain how HTTP communication takes place between two nodes,
special emphasis on persistant and non persistant connections.
with
(15)
OR
architectural diagram, explain the TCP/IP reference model. the functions of each layer in the model.
a neat
With
Explain
(15)
Draw the struoture of a TCP segment. Give the significance of the fields in the TCP segment:
following
(15)
(ii)
Receive
window (iii)
OR
Briefly describe the differences between the virtual circuit and datagram
networks. What are the characteristics of link state routing? With the indicated link costs given in the following diagram compute the shortest path from 'w' to all other nodes using Dijkstra's algorithm:
(1
s)
VII.
OR
(a)
Explain how CSMA/CD protocol handles collision that may oocur in Ethernet
networks.
(7) (8)
(b)
vm.
IX.
What are the specifications of Ethernet standard? Explain the frame structure of Ethemet.
(l s)
OR
Discuss the various data encoding schemes used in Compute.r Networks. (1s)