Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Explain Bluetooth architecture and protocol. As well describe its limitations.
Describe in brief the functions of Host Controller Interface (HCI) and Service Discovery Protocol (SDP).
Illustrate how the ‘hit or miss transformation’ operation is taken out by taking an illustration. Illustrate the use of this morphological operation?
Calculate the gray level co-occurrence matrix for this image, by selecting the position operator P as ‘one pixel to the right and one pixel below'.
Illustrate an ideal smoothing frequency domain filter H(u,v). If F(u,v) is the Fourier transform of an image which is subjected to the smoothing filter, work out the Fourier transform of the smoothe
Name four statistical properties which are used on the gray level co-occurrence matrices to quantify texture of the image segment.
Describe minimax algorithm with alpha-beta pruning. Illustrate the alpha-beta pruning on the given minimax graph.
Assume that a knowledge base KB which comprises the given propositional logic sentences:
What do you mean by constraint satisfaction problems (or CSPs)? State the N-queen problem as CSP.
Illustrate the working of timers and counters in detail. Illustrate out the serial communication using I2C, CAN, USB in detail.
Illustrate the synchronous and asynchronous communications from serial devices. Illustrate out the various bus structures which are employed in embedded systems.
How do you construct your AJAX functionality? Describe.
Write down the four (4) types of data transfer employed in USB. What do you understand by the tem high speed device interfaces?
What do you mean by EJB? How many various types of EJB components are accessible?
Illustrate the merits of using Entity bean for database operations over directly by using JDBC API to do the database operations? When one must be used over the other?
Describe any six benefits of Software as Service in Cloud computing?
Illustrate the meaning of Firewall? Describe various types of firewalls in short.
Write down the steps to model the executable release. Demonstrate with a UML diagram.
Describe how optimization in achieved in mobile IP. Describe tunnelling and encapsulation in mobile IP.
What do you mean by binding time in compilation? Describe the significance of binding time.
Distinguish two-pass and single pass translation scheme in an assembler.
What are the four types of handover available in GSM? What do you understand by TETRA? Explain in detail.
Describe in brief the broadly used language processor development tool-the lexical analyzer generator LEX.
Explain any four characteristics of the top down approaches to algorithmic design.
Design parallel priority interrupt hardware for a system through eight interrupt sources.