Académique Documents
Professionnel Documents
Culture Documents
Program Outcomes
Program outcomes are narrower statements that describe what students are expected to know and be
able to do by the time of graduation. These relate to the skills, knowledge, and behaviors.
Engineering programs must demonstrate that their students attain the following outcomes:
a)
b)
c)
d)
e)
f)
g)
A graduate will
have an understanding of professional and ethical responsibility,
An ability to communicate effectively,
h)
i)
j)
k)
An ability to use the techniques, skills, and modern engineering tools necess
ary for engineering practice.
l)
P
O
a
P
O
b
P
O
c
P
O
d
P
P
P
O
O
Of
e
g
P
P
P P
P
O
O
%
Oi Oj
Ol
h
k
CUnderstandevaluationof
technologyandstandardization
Course
Outco
mes
CO1
PO
1
PO
2
CO2.
CO3
CO4
1
0
1
1
0
1
PO
3
0
0
0
PO
4
PO
5
PO
6
PO
7
PO
8
0
0
0
1
2
0
0
0
0
0
0
0
0
0
0
PO
9
PO1
0
PO1
1
2
0
0
0
0
0
0
PO1
2
1
0
1
1
1
1
1
4
4
4
CO5
C
1
1
0
1
1
0
0
0
1
1
0
0
Syllabus
0
0
0
0
0
0
0
0
0
1
1
0
4
4
Recommended Books:
Experiment List
LESSON PLAN
Module
1
Week
1
Date
Lecture
Topic covered
Course
Outcomes
CO1
L1
Need of data
compression,Lossy n
lossless compression
techs,measure of
performance,modeling &
coding , different types
of models, and coding
techniques
L2
CO1
L3
Extended Huffman
coding & adaptive
Huffman coding
CO1
L4
adaptive Huffman
coding & decoding
CO1
L5
CO1
L6
CO1
L7
Dictionary techniques
LZ77,LZ78 encoding n
decoding example
CO1
L8
LZW Encoding n
decoding,
CO1
L9
CO2
CO2
L10
L11
Temporal n frequency
masking ,critical bands
n graph in details
CO2
L12
CO2
L13
CO3
L14
CO3
L15
CO3
L16
JPEG
CO3
L17
JPEG 2000
CO3
L18
JPEG-LS
CO3
L19
Video compression
Concepts ,intra n infra
frame coding
CO3
L20
motion compensation n
motion estimation
CO2
L21
CO3
L22
CO3
L23
CO3
L24
CO3
L25
Introduction, Types of
attacks , Steganography
CO4
cryptography,
CO4
L26
L27
CO4
Integer arithmetic,
modular arithmetic
linear congruence
CO4
CO4
Substitution cipher,
transposition cipher
stream and block cipher
CO4
CO4
L32
arithmetic
modes for block ciphers
CO4
L33
Data encryption
standard n single round
CO4
CO4
CO4
CO4
CO5
CO5
L28
8
L29
L30
L31
L34
L35
10
L36
DES
AES, key distribution
center.
L37
Primes, factorization
L38
11
12
cryptographic attacks,
Security goals, services
and mechanics.
L39
CO5
L40
CO5
L41
CO5
L42
key management
CO5
L43
CO5
L44
L45
L46
L47
L48
Message integrity
message authentication
MAC, hash function
H MAC
digital signature
CO5
CO5
CO5
CO5
CO5
2
2
2
1
1
algorithm
13
L49
L50
L51
L52
Malware, Intruders,
Intrusion detection
system
firewall design,
antivirus techniques
CO6
CO6
CO6
CO6
2
2
CO4
CO5
CO6
10
5
10
5
10
5
CO4
CO5
CO6
10
10
10
biometric
authentication,
and ethical
hacking.
CO1
10
CO2
10
CO3
10
CO1
10
CO2
10
CO3
10