Nāgpur, India
Nāgpur, India
Time filter
Source Type

Gupta N.,CSIR - Central Electrochemical Research Institute | Gedam V.V.,PIET | Moghe C.,CSIR - Central Electrochemical Research Institute | Labhasetwar P.,CSIR - Central Electrochemical Research Institute
Environmental Technology and Innovation | Year: 2017

The leaching potential of heavy metals from Coal Fly Ash (CFA), Coal Fly Ash Bricks (CFAB) and Clay Brick (CB) were assessed through four laboratory batch leaching procedures. The concentration of 12 heavy metals were analyzed to study heavy metal leaching from CFA, CFAB and CB in surrounding environment. The heavy metal concentrations of CFA, CFAB and CB through various leaching studies conducted were compared with those estimated through acid extraction/digestion including physico-chemical, mineralogical and morphological characterization. The comparative assessment between CFAB and CB were also undertaken to study the leaching of heavy metals vis-a-via laboratory batch leaching procedures. The major compounds present in collected samples were SiO2, Al2O3 and Fe2O3 while minor compounds include such as K2O, TiO2, CaO, MgO, P2O5 and SO3. The most abundant heavy metals leached out during laboratory batch leaching studies were Al>Fe>Mn>Zn followed by other heavy metals. The study also emphasized the use of CFAB compared to CB in and around thermal power stations due to environmental suitability in the terms of leaching behavior. © 2017 Elsevier B.V.

Makasarwala H.A.,PIET | Hazari P.,PIET
Proceedings of the 8th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2016 | Year: 2016

Cloud Computing is set of resources available on pay per use model. The User requests on cloud for the services which is increasing day by day and for the better performance it should be balanced such that all the requests should be answered in minimum time. Therefore, Load Balancing is required and it is one of the major Issues in Cloud Computing. Moreover, it is termed as Load Balancing is NP-Complete Problem because as the number of request increases, balancing the load becomes tougher. This paper gives a genetic algorithm (GA) based approach for load balancing in cloud. For population initialization, priority of request is considered based on their time. The idea behind the considering the priority is to get real world visualization. In Real World Scenario requests have some priorities which we can used for our Algorithm. Simulation of the proposed method is done using Cloud Analyst. Simulation Results shows that proposed method performs well then existing once with some real world picture. © 2016 IEEE.

Choudhari E.,DYPCOE | Bodhe K.D.,PIET | Mundada S.M.,DYPCOE
IEEE International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2017 - Proceedings | Year: 2017

In WSN Aggregation is considered as the most susceptible to node compromising attacks, as wireless sensor networks are not more secured so they are more vulnerable to this type of attacks. For WSN it is essential to check the trustworthiness of the data & reputation of sensor nodes. To handle this issue Iterative Filtering acts as a best option. In Iterative filtering algorithm (IF) the data is aggregated concurrently from multiple sources & IF also render trust assessment of these sources. The trust assessment is in the form of similar weight factors assigned to data supplied by each source. Considering the security as major issue in WSN, In this paper we proposed an advancement for IF method by providing approximation which will make them collusion robust and is converging fast. Advancement in the Iterative Filtering algorithm will enhance the performance of the system with good potential for implementation in WSN, IF algorithm is stretched with novel method for collusion detection & revocation based on an initial approximation of the aggregate values as well as distribution of differences of each sensor readings. The proposed system performance is checked through extensive simulation in C#. The simulation demonstrates the improved results. The RMS value in the graphs for series 2(0.1, 0.18, 0.22, 0.22, 0.22, 0.3, 0.36, 0.38) with standard deviation ranging from 0.5 to 4 shows that the proposed system performance is better as compare to existing system. © 2017 IEEE.

Malhotra S.,P.I.E.T | Bali V.,P.I.E.T | Paliwal K.K.,P.I.E.T
Proceedings of the 7th International Conference Confluence 2017 on Cloud Computing, Data Science and Engineering | Year: 2017

Incomputer networks, Intrusion Detection has become a major concern. In network security, various traditional techniques like intrusion prevention, cryptography and user authentication are unable to detect establishment of novel attacks. An intrusion detection systemis helpful in detecting an unusual intruder which cracks into the system or genuine user mistreating the system. Intrusion Detection System continually runs in the background and when any suspicious or obtrusive event occurs then it warns the user. To implement these systems various researchers introduced numerous machine learning techniques like Decision Trees, Support Vector Machines, Artificial Neural Networks, Linear Genetic Programming, Genetic Algorithms, Fuzzy Inference Systems, Rule Based Approach and their ensemble approaches with the intent to predict the data either normal or abnormal. In this paper genetic programming with K-Nearest Neighbor classifier is proposed so as to build an efficient Intrusion Detection Model. Optimal feature selection task is performed by genetic programming whereas the data mining classifier which performs the classification process is K-Nearest Neighbour. The main aim of genetic programming ist o aid Κ-Nearest Neighbour. The experimental result shows that the validation accuracy for detecting attacks is 99.6%. © 2017 IEEE.

Bhadoria S.,MAE | Dethe C.G.,P.I.E.T
DSDE 2010 - International Conference on Data Storage and Data Engineering | Year: 2010

Among the applications of computer science in the field of medicine, the processing of medical image data is playing an increasingly important role. With medical imaging techniques such as X-Ray, computer tomography, magnetic resonance imaging, and ultrasound, the amount of digital images that are produced in hospitals is increasing incredibly. Thus the need for systems that can provide efficient retrieval of images of particular interest is becoming very high. Unfortunately, only very few medical image retrieval systems are currently used in clinical routine. This paper presents a highlight on the role of image retrieval in medical domain. Also it reviews the techniques used in medical image. Paper has also briefed about retrieval trends, key issues and limitations. It also point out scope and challenges in designing image retrieval systems. © 2010 IEEE.

Mishra P.C.,PIET | Islam M.,PIET | Patel R.K.,Purushottam Institute of Engineering and Technology
Separation Science and Technology (Philadelphia) | Year: 2013

A waste from the seafood industry, prawn shells, has been used as a water purifier for removing metal ions from water. Chitosan in the presence of natural organic matter obtained from prawn shells waste was used to remove lead from water. The metal uptake by chitosan was successful and rapid and the effect of pH was not prominent. The sorption occurred primarily within 10 minutes. The chitosan surface is not homogeneous, and the adsorption process should be complicated. The sorption of lead by chitosan in prawn shell waste is accomplished by ion exchange and chelating mechanisms. Both the Langmuir and Freundlich isotherms can adequately describe the sorption mechanism. Various anions like chloride, bromide, fluoride, acetate, sulfate, nitrate, and phosphate were found to have a very small effect on the capacity of the chitosan for uptake of lead. Its very high sorption capacity and relatively low production cost and high biocompatibility make chitosan an attractive sorbent for the removal of lead from waste streams. © 2013 Copyright Taylor and Francis Group, LLC.

Mishra B.,PIET | Singh Y.,Jaypee University of Information Technology
Proceedings of 2015 3rd International Conference on Image Information Processing, ICIIP 2015 | Year: 2015

In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some efficient protocol like LSM and RED under the category of witness based node clone detection. We have analyzed the detection level, memory, and energy overhead of LSM, RED and proposed protocol. We have presented an approach for the optimization of witness based distributed node clone detection. For the validation of proposed protocol performance, we have provided mathematical as well as simulation results for the various parameters of the WSN. © 2015 IEEE.

Kailuke A.C.,P.I.E.T. | Agrawal P.,E.M.A.R.C. | Kshirsagar R.V.,P.C.E.
Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies, ICESC 2014 | Year: 2014

A simple new phase frequency detector and integrated Dickson Charge pump design with charge transfer switches (CTS's) are presented in this paper. The proposed Phase-Frequency Detector (PFD) and Charge-Pump are useful for low voltage, high frequency Phase-Looked-loops (PLL). This brief analyzes the blind zone in latch-based PFDs and proposes a technique that removes the blind zone caused by the precharge time of the internal nodes. With the proposed technique, the PFD achieves a small dead zone. The experimental results shows that the proposed PFD has minimal dead zone compared with the conventional PFD and CTS based Dickson charge pump is the best structure for integration. The PFD and Charge Pump are designed and simulated on Tanner 13.0V tool and has been simulated in a 0.18μm CMOS technology. © 2014 IEEE.

News Article | February 24, 2017
Site: www.prlog.org

PANIPAT INSTITUTE OF ENGINEERING AND TECHNOLOGY (PIET), the Best Engineering College of 2017 is located at 70 mile stone on Delhi-Panipat highway. It is approved by AICTE, Govt. of India and affiliated to Kurukshetra University, Kurukshetra.

News Article | November 30, 2016
Site: www.prlog.org

In view of the changing scenario at national level owing to the situation arising out of demonetization step by the Prime Minister of India, a seminar cum views sharing session was held at Panipat Institute of Engineering and Technology (PIET), an AICTE..

Loading PIET collaborators
Loading PIET collaborators