Real Time Bus Monitoring and Students Information System
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.111-114, Apr-2017
Abstract
This paper proposes a real time college bus tracking and a student information system which runs on an android smart phone. The main purpose of this application is to provide exact location of a student’s respective bus in the Google maps. This application is very useful for parents. GPS tracking device receives signals from the GPS satellites. Depending on the time which the signal takes to reach the device from each satellite, the GPS receiver can calculate its exact location on the ground. The GPS tracking device can then route that information back to an online tracking system for mapping. We have also proposed a student information system for parents to view student’s details on android smart phone that keeps them updated about the latest events in the college or school. Parents can locate the bus in the route map. Using this application, parents can also get their ward’s mark details, attendance, performance rate, and can communicate with the teachers through chat.
Key-Words / Index Term
Global Positioning System(GPS), Google Map, Android Application
References
[1] DK. Kulkarni, RR. Patel, BS. Pal, LD. Panjwani, “Android Application for College Bus Tracking”, International Journal of Innovative and Emerging Research in Engineering, Vol. 3, Issue. 5, pp.78-82, 2016.
[2] G. Jemilda, RB. Krishnan, B. Johnson, G. Linga Sangeeth, “An Android Application for Tracking College Bus Using Google Map”, International Journal of Computer Science and Mobile Computing, Vol.4, Issue. 3, pp.500-507, 2015.
[3] S. Priya, B. Prabhavathi, P. Shanmuga Priya, B. Shanthini, “An Android Application for Tracking College us Using Google Map”, International Journal of Computer Science and Engineering Communications, Vol. 3, Issue. 3, pp.1057-1061, 2015.
[4] N. Salia, M. Raval, “MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue. 4, pp.141-144, 2016.
Citation
CS. Luke, R. Gopal, M. Babu, R. Varghese, D. Sambasivan, "Real Time Bus Monitoring and Students Information System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.111-114, 2017.
Cloud Security Threats and Issues-A Review
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.115-119, Apr-2017
Abstract
Cloud Computing is one of the best on-demand network access service available to a large shared pool of computing resources in today’s world. There are various economic benefits of cloud computing which are widely recognized. Cloud computing help users to avail benefits of having large storage (IAAS), variety of OS (PAAS) and other softwares (SAAS) at their premises without the need to have them at their own hardware level. Apart from these economic benefits, public clouds still haven’t seen widespread adoption, especially by enterprises. Most large organizations today run private clouds, in the sense of virtualized and geographically distributed data centers, but rarely rely primarily on externally managed resources. Major reason behind this is the security concerns involved in existing cloud infrastructures which includes hardware failures, software bugs, power outrages, server miniconfiguration, malware and inside threats. The aim of this paper is to throw light on various Cloud security threats and issues as well as security issues inherent within the context of cloud computing and cloud infrastructure.
Key-Words / Index Term
IAAS, PAAS, SAAS multi-tenancy, orchestratio
References
[1]. A.A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou, “Efficient Password based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications, Vol. 6, No. 2 , pp.143-148, 2012
[2]. S. Renu, OHH Parveen, “Biometric Based Approach for Data Sharing in Public Cloud”, International Journal of Advanced Research in Computer and Communication Engineering Vol.4, Issue.2 pp.1-9, 2015
[3]. Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.
[4]. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[5]. R. Buyyaa, C. S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, “Cloud Computing and Emerging IT platforms: Vision Hype and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, Vol.25, Issue.6, pp. 599-616, 2009.
[6]. W. Publishing, J. Wiley, B.Sosinsky, “Cloud Computing Bible” Published by Wiley Publishing, US, pp.1-480, 2010.
[7]. S. Shukla, D. kumar, “Clouds Software- Security as a Service(S-SaaS) via Biometrics”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.119-124, 2014.
[8]. N. Mead, et ai, “Security quality requirements engineering (SQUARE) methodolgy”, ACM SIGSOFT Software Engineering, Vol.30 Issue.4, pp.1-7, 2005
[9]. JW. Rittinghouse, JF. Ransome, “Cloud Computing”, Taylor and Francis Group, US, pp.1-284, 2010.
[10]. A. Bansal, A. Agrawal, “Providing Confidentiality, Integrity and Atomicity for data stored in the cloud storage”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.65-70, 2016.
[11]. Rakesh Prasad Sarang and Rajesh Kumar Bunkar, “Study of Services and Privacy Usage in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.
[12]. V.K. Saxena, S. Pushkar, “Privacy Preserving using Encryption Proxy in Data Security”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.
Citation
R. Sood, R. Sharma, "Cloud Security Threats and Issues-A Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.115-119, 2017.
Data Mining Techniques for Customer Relationship Management
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.120-126, Apr-2017
Abstract
Advancements in technology have made relationship marketing a reality in recent years. Technologies such as data warehousing, data mining, and campaign management software have made customer relationship management a new area where firms can gain a competitive advantage. Particularly through data mining—the extraction of hidden predictive information from large databases—organizations can identify valuable customers, predict future behaviors, and enable firms to make proactive, knowledge-driven decisions. The automated, future-oriented analyses made possible by data mining move beyond the analyses of past events typically provided by history-oriented tools such as decision support systems. Data mining tools answer business questions that in the past were too time-consuming to pursue. Yet, it is the answers to these questions make customer relationship management possible. Various techniques exit among data mining software, each with their own advantages and challenges for different types of applications. A particular dichotomy exists between neural networks and chi-square automated interaction detection (CHAID). While differing approaches abound in the realm of data mining, the use of some type of data mining is necessary to accomplish the goals of today’s customer relationship management philosophy.
Key-Words / Index Term
Customer relationship management (CRM),Relationship, CHAID, Decision support system and Datamining
References
[1] EK Clemons, WC. Row, “Information technology and industrial cooperation: the changing economics of coordination and ownership”, Journal of Management Information Systems, Vol.9, Issue.2, pp.9-28, 1992.
[2] GH. Nguyen, A. Bouzerdoum, S.L. Phung, “A supervised learning approach for imbalanced data sets”, 2008 19th International Conference on Pattern Recognition, Tampa, pp.1-4, 2008.
[3] H. R. Qodmanan, “Multi objective association rule mining with genetic algorithm without specifying minimum support and minimum confidence”, Expert Systems with Applications, vol. 38, Issue.1, pp. 288-298, 2011.
[4] Dun Bradstreet, “Data Intelligence Group Pilot Software. An overview of data mining”, DIG White Paper, USA, pp.1-13, 2011
[5] Gang Wang, Jian Ma, “A hybrid ensemble approach for enterprise credit risk assessment based on Support Vector Machine”, Expert System with Applications, Vol.39, Issue.5, pp.5325-5331, 2012.
[7] H. Jin, “Personality mining method in web based education system using data mining”, IEEE International Conference on Grey Systems and Intelligent Services, Chin, pp.155-158, 2007.
[8]H. R. Qodmanan, “Multi objective association rule mining with genetic algorithm without specifying minimum support and minimum confidence”, Expert Systems with Applications, vol. 38, Issue.1, pp. 288-298, 2011.
[9] J. Gao, B. Ding, F. Wei, H. Jiawei, PS. Yu, “Classifying data streams with skewed class distributions and concept drifts”, IEEE Internet Computer, vol. 12, no. 6, pp. 37-49, 2008.
[10]KS. Priya, AV. Senthil Kumar, “Improving the Students Performance Using Educational Data Mining”, Int. J. Advanced Networking and Applications, Vol.4 Issue.4, pp.1680-1685, 2013.
[11] Jayshree Jha, Leena Ragha , “Educational Data Mining using Improved Apriori Algorithm”, International Journal of Information and Computation Technology, Vol.3, Issue.5, pp.411-418, 2013.
[12] K Shymala. and S.P Rajgopalan., “Data Mining Model for a Better Higher Educational System”, Information Technology Journal, Vol.5, Issue.3, pp.560-564, 2006.
[13] B. Bakariya, G.S. Thakur, “Effectuation of Web Log Preprocessing and Page Access Frequency using Web Usage Mining”, International Journal of Computer Sciences and Engineering, Vol.1, Issue.1, pp.1-5, 2013.
[14] C. Rygielski, JC. Wang, DC. Yen, “Data mining techniques for customer relationship management. Technology in society”, Vol.24, Issue.4, pp.483-502, 2002.
[15] L. I. Kuncheva, “Classifier ensembles for detecting concept change in streaming data: Overview and perspectives”, in Proc. Eur. Conf. Artificial Intelligence, USA, pp.5-10, 2008.
[16] Nidhi Sethi and Pradeep Sharma, “Mining Frequent Pattern from Large Dynamic Database Using Compacting Data Sets”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.31-34, 2013.
[17] S.Praveen Kumar and R.V.Krishnaiah, “Efficient Computation of Range Aggregates Against Uncertain Location Based Queries using Filtering-and-Verification Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.56-61, 2013.
[18]A. M. Rajee and F. Sagayaraj Francis, “A Probabilistic Estimation of Cluster Region Prone to Inter Cluster Data Movement”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.138-141, 2014.
Citation
AR. PonPeriasamy, G. Vijayasree, "Data Mining Techniques for Customer Relationship Management," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.120-126, 2017.
Parking Control System using IR Sensor
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.127-128, Apr-2017
Abstract
This paper deals with sensing the vehicle in no parking area. It uses IR active sensor to sense the vehicle that stands in front of the sensor for a period of time. It immediately sends an alert message to the driver of the vehicle by means of glowing LED light. If the vehicle is not taken then the alert message is send to the traffic cop and action will be taken on that driver. The advantage of this device is to reduced the traffic in the peak areas, and to create awareness among the people to follow the rules.
Key-Words / Index Term
IOT, PCS, LED, USIM
References
[1] P. Kujur, L. Gautam, "Smart Interaction of Object on Internet of Things", International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.15-19, 2015.
[2] L. Atzori, A. Iera, G. Morabito, “The internet of things: A survey”, Computer networks, Vol.54, Issue.15, pp.2787-805, 2010.
[3] PR. Shetgaonkar, “A Survey on Applications of Smart Sensor Networks in Building a Futuristic Smarter World”, IIJRD, Vol.5 Issue.2, 29-34, 2016
[4] M. Kang, “RFID based parking control on Smartphone”, Journal of Security Engineering, Vol. 9, Issue.3, pp.24-26, 2012.
[5] A. Gupta., S. Roy, “Design and Implementation of Visualizers for TinyOS”, Procedia Technology, Vol.10, No.1, pp.409-416, 2013.
[6] Y. Jo, J. Choi, I. Jung, “Traffic Information Acquisition System with Ultrasonic Sensors in Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, vol.10, Issue.5, pp.12-23, 2014.
[7] Y. Jo, I. Jung, “Analysis of Vehicle Detection with WSN Based Ultrasonic Sensors”. Sensors, vol.14, no.8, pp.14050-14069, 2014.
[8] T. Matsuo, Y. Kaneko, M. Matano, “Introduction of intelligent vehicle detection sensors”, Proceedings 199 IEEE/IEEJ/JSAI International Conference on Intelligent Transportation Systems, Tokyo, pp.709-713, 1999.
[9] C. Park, Y. Jo, I. Jung, “Cooperative Processing Model for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, vol.2013, Issue.2, pp.1-17, 2013.
[10] C. Lee, Y. Han,” Smart Parking System for Internet of Things”, IEEE Consumer Electronics, USA, pp.263-264, 2016.
Citation
R. Sudh, "Parking Control System using IR Sensor," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.127-128, 2017.
Addressing the Confidentiality and Security of Internet of Things
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.129-133, Apr-2017
Abstract
The IoT is a collection of technologies that work together to create a more connected environment. Both companies and end consumers will gain from this. However, in order for the IoT to be completely realized, a slew of security and privacy issues must be solved. We identify and explore the features that define the IoT`s uniqueness in terms of impending security and privacy issues in this article. We also create criteria that are triggered by the aforementioned attributes. We examine the security and privacy components of the four most popular IoT designs in light of the criteria. According to our findings, security and privacy needs are only sporadically addressed.
Key-Words / Index Term
Security, Privacy, IoT Network, IoT Systems
References
[1]. Andrea Zanella at. al., “Internet of things for smart cities”, IEEE Internet of Things Journal, Vol. 1, No. 1, pp. 22-32, Feb. 2014.
[2]. Rafiullah Khan at. al., “Future internet: The internet of things architecture, possible applications and key challenges,” In 10th International Conference on Frontiers of Information Technology, FIT, pages 257–260. IEEE, 2012.
[3]. Ahmad W Atamli and Andrew Martin., “Threat-Based Security Analysis for the Internet of Things,” In Secure Internet of Things (SIoT), pp. 35–43. IEEE, 2014.
[4]. Sachin Babar at. al., “ Proposed security model and threat taxonomy for the Internet of Things (IoT), “In International Conference on Network Security & Applications (CNSA), pp. 420–429. Springer Berlin Heidelberg, 2010.
[5]. S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401 (Proposed Standard), November 1998. Obsoleted by RFC 4301.
[6]. Vangelis Gazis at. al., “Security Perspectives for Collaborative Data Acquisition in the Internet of Things,” In International Conference on Safety and Security in Internet of Things. Springer, 2014.
[7]. Jayavardhana Gubbi at. al., “Internet of Things (IoT, A vision, architectural elements, and future directions,” Future Generation Computer Systems, Vol.29, Issue.7, pp.1645–1660, Sept.2013.
[8]. Anthea Mayzaud at. al., “Monitoring ´ and Security for the Internet of Things”, In International Conference on Autonomous Infrastructure, Management, and Security, pp.37–40. Springer, 2013.
[9]. Daniele Miorandi at. al., “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, Vol.10, No.7, pp.1497–1516, Sept. 2012.
[10]. Huansheng Ning, Hong Liu, and Laurence T Yang, “Cyberentity Security in the Internet of Things,’ Computer, 46, Issue.4, 46–53, 2013.
[11]. R Roman, P Najera, and J Lopez, “Securing the internet of things,” Computer, Vol.44, Issue.9, 51–58, 2011.
[12]. Rolf H. Weber. Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26, Issue.1, 23–30, January 2010.
[13]. Rodrigo Roman, Jianying Zhou, and Javier Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, Vol.57, Issue.10, 2266–2279, July 2013.
[14]. Sadeghi at. al., “Security and privacy challenges in industrial internet of things,” In Annual Design Automation Conference, pp.54. ACM, 2015.
[15]. Sabrina Sicari at. al., “Security, privacy and trust in internet of things: The road ahead,” Computer Networks, 76, pp.146–164, 2015.
[16]. Zhi-kai Zhang, Michael Cheng, Yi Cho, and Shiuhpyng Shieh, “Emerging Security Threats and Countermeasures in IoT,” In ACM Symposium on Information, Computer and Communications Security, pp.1–6. ACM, 2015.
[17]. Simone Cirani at. al., “Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview,” Algorithms, Vol.6, Issue.2, 197–226, 2013.
[18]. Gunter at. al., “Security in fixed and wireless networks - an introduction to securing data communications,” Wiley, 2003.
[19]. Carlo Maria Medaglia and Alexandru Serbanati. An overview of privacy and security issues in the internet of things. In The Internet of Things, pages 389–395. Springer, 2010.
[20]. Hui Suo, Jiafu Wan, Caifeng Zou, and Jianqi Liu, “Security in the internet of things: a review,” In Computer Science and Electronics Engineering (ICCSEE), 2012.
[21]. Joerg Daubert at. al., “A view on privacy & trust in iot,” In IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015
[22]. Alexander Iliev and Sean W. Smith., “Protecting client privacy with trusted computing at the server,” IEEE Security & Privacy, 3, Issue.2, 20–28, 2005.
[23]. Audun Jøsang atl. Al., “A survey of trust and reputation systems for online service provision,” Decision Support Systems, 43, Issue.2, pp.618–644, 2007.
[24]. Oleg Logvinov at. al., “Standard for an Architectural Framework for the Internet of Things ( IoT ),” IEEE P2413 Webinar Panelists, pp.1–12, 2014.
[25]. BETaaS Consortium. Building the environment for the things as a service. http://www.betaas.eu/
[26]. IoT-A Consortium. IoT-A – Internet of Things Architecture. http: //www.iot-a.eu/
[27]. Martin Bauer and Sebastian Lange, “Enabling Things to Talk,” Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
[28]. IoT-A Consortium. Iot-a unified requirements. http://www.iot-a.eu/ public/requirements/. [31 Jan. 2014].
[29]. BETaaS Consortium. D1.4.2 – TaaS Reference Model. http://www.betaas.eu/docs/
[30]. OpenIoT Consortium. OPENIoT D2.3 Detailed Architecture and Proofof-Concept Specifications. http://openiot.eu/?q=node/49, 2013.
[31]. OpenIoT Consortium. OPENIoT project description. http://www.openiot.eu/
[32]. Robert Gwadera. D5.2.1 Privacy and Security Framework. 2013.
[33]. IoT@Work Consortium. D1.2 – Final framework architecture specification. https://www.iot-at-work.eu/
[34]. P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC 3580 (Informational), September 2003. Updated by RFC 7268.
Citation
Shivlal Mewada , "Addressing the Confidentiality and Security of Internet of Things," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.129-133, 2017.
A Survey on Smart Ambulance Traffic Control System -A Support for Implantable Medical Devices
Survey Paper | Journal Paper
Vol.5 , Issue.4 , pp.134-138, Apr-2017
Abstract
The growth of industrialization and urbanization has lead to an immense increase in the population invariably leading to rise in the number of vehicles on road. The resulting traffic congestion and traffic jams are the major hurdles for emergency vehicles such as ambulance carrying critical patients as these emergency vehicles are not able to reach their destination in time, resulting into a loss of human life. To solve this problem to some extent we have apparently come up with Intelligent Traffic Control System(TCS) for ambulance”. The proposed system clears the traffic congestion by turning all the red lights to green on the path of the ambulance, hence helping in clearing the traffic and providing way towards its destination. The system consists of an android application which registers the ambulance on its network. In case of emergency situation, if the ambulance halts on its way, the application sends an emergency command to the traffic signal server and also the direction where it wants to travel along with this the current position with the help of Global Positioning System (GPS). The nearest signal is identified based upon the current position of the ambulance. And that particular signal is made green till the ambulance passes by and later it regains its original flow of control. In this way it acts like a lifesaver project as it saves time during emergency by controlling the traffic lights.
Key-Words / Index Term
Server, Mobile app, Arduino, LCD Display, GPS Tracking System
References
[1] Intelligent Ambulance with Traffic Control (GargiBeri, PankajGanjare, Amruta Gate, AshwinChannawar, Vijay Gaikwad)
[2] An Intelligent Ambulance with some Advance features of Telecommunication (Pratyush Parida, Sudeep Kumar Dhurua, P. Santhi Priya)
[3] Automated Emergency System in Ambulance to Control Traffic Signals using IoT (Dr. A. Balamurugan, G. Navin Siva Kumar, S. Raj Thilak, P. Selvakumar):
[4] Smart Traffic Control System Using Image Processing (Prashant Jadhav, Pratiksha Kelkar, Kunal Patil, Snehal Thorat):
[5] Ambulance Controlled Traffic System Using RFID Technology with LabVIEW Simulation (S. Chandrakanth Sagar, Dr. M. Narayana)
[6] Intelligent Ambulance Rescue System (Nangare Yogini K. and Prof. Hate S.G)
[7] Mr.S.Iyyappan 1, Mr.V.Nandagopal “Automatic Accident Detection And Ambulance Rescue with Intelligent Traffic Light System”
[8] MrsManasiPatil, AanchalRawat, Prateek Singh, Srishtie dixit” Accident Detection and Ambulance Control using Intelligent Traffic Control System”
[9] Prof.Mrs.Bhagya Lakshmi V, Prof.SavithaHiremath, Prof.SanjeevMhamane “ FPGA Based Vehicle Tracking and Accident Warning using GPS”
[10] NiketaChellani, ChiragTahilyani Student, Electronics and Telecommunication Dept., TSEC, Mumbai University “ Traffic Congestion Detection and Control using RFID Technology “.
Citation
Anu Philip, Siml P Thomas, Neethan Elizabeth Abraham, Reshma Chandran, "A Survey on Smart Ambulance Traffic Control System -A Support for Implantable Medical Devices," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.134-138, 2017.
Wireless Sensor Networks through Clustering in Cross Layer Network
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.139-143, Apr-2017
Abstract
One of the significant justification for execution corruption in Wireless sensor network is the upward because of control bundle and parcel conveyance debasement. Clustering in cross layer network operation is an effective way oversee control parcel upward and which at last work on the lifetime of the network. All these overheads are essential in an adaptable networks. The clustering generally experience cluster head failure which need to be solved effectively in a large network. As the center is to work on the normal lifetime of sensor network the cluster head is chosen in view of the battery duration of nodes. The cross-layer activity model optimize the overheads in numerous layer and at last the utilization of bunching will decrease the significant overheads recognized and their by the energy utilization and throughput of remote sensor network is gotten to the next level. The proposed model works on two layers of organization ie., Network Layer and Transport Layer and Clustering is applied in the network layer.
Key-Words / Index Term
Cross layer design, wireless sensor networks, clustering
References
[1] B. Meenakshi, P. Anandhakumar, “Lifetime extension of wireless sensor network by selecting two cluster heads and hierarchical routing”, IEEE International Conference on Advances in Computing, Communications and Informatics, pp.1254-1262 ,2012.
[2] H.-W. Tseng, S.-C. Yang, P.-C. Yeh, and A.-C. Pang, “A cross-layer scheme for solving hidden device problem in IEEE 802.15.4 wireless sensor networks,” IEEE Sensors J.,Vol. 11, Issue. 2, pp. 493– 504, 2011.
[3] Mao YE, Cengafa LI, Guihai Chen, Jie WU, “Energy Efficient Clustering Scheme in Wireless Sensor Networks”, IEEE International Conference onPerformance, Computing and Communications, 2005.
[4] S. He, J. Chen, D. K. Y. Yau, and Y. Sun, “Cross- layer optimization of correlated data gathering in wireless sensor networks,” in Proc. 7th Annu. IEEE Commun. Soc.Conf. Sensor Mesh Ad Hoc Commun. Network( SECON), pp. 1–9,2010
[5] J. Ben-Othman and B. Yahya, “Energy efficient and QoS based routing protocol for wireless sensor networks” J.Parallel Distrib. Computer.Vol.70, Issue. 8, pp. 849–857, 2010
[6] Seema Bandyopadhyay, Edward J. Coyle, “An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks”, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 2003.
[7] Gaurav Gupta, Mohamed Younis, “Performance Evaluation of Load- Balanced Clustering of Wireless Sensor Networks”, IEEE International Conference on Telecommunications, 2003.
[8] J. Ben-Othman and B. Yahya, “Energy efficient and QoS based routing protocol for wireless sensor networks,” J. Parallel Distrib. Comput. Vol. 70, Issue. 8, pp. 849–857, 2010.
Citation
Neethu Maria John, Simy Mary Kurian, Vinodh P Vijayan, Neema George, "Wireless Sensor Networks through Clustering in Cross Layer Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.139-143, 2017.
Improved system for Butterfly Valve
Survey Paper | Journal Paper
Vol.5 , Issue.4 , pp.144-148, Apr-2017
Abstract
A cost-effective procedure to surface alloy WCB steel butterfly valve sand castings using mold coatings incorporating metal and ferroalloy powders has been described.The tooling, mold design, and casting conditions similar top lain WCB castings were successfully used to produce sound surface alloyed butterfly castings under industrialconditions. The dynamic behaviour control of a butterfly valve is important because , when one of the valve disc natural frequency is close to the frequency of vortex shedding, which appears when the valve is fully open or partially closed, resonance may appear and vibration with significant amplitudes is generated.The surface alloying was achieved by addingpowders of Ni, Cr, Fe–Si, Fe–Mn, and Mo to the slurrycontaining a binder coated on the mold surface. The sur-face alloyed coatings on the surface of WCB steel butterfly valve castings were enriched in Ni, Cr, Mo, and Mn up to 6.4, 23.2, 3.3, and 1.1%, respectively. The depths of coatings were as high as 420 lm. After normalizing and tempering heat treatment, the surface alloyed layer exhibitedan increase in corrosion resistance as compared to base metal WCB steel.
Key-Words / Index Term
surface alloying, corrosion, austenite phase, heat treatment, butterfly valve, nickel, chromium, manganese, silicon, molybdenum
References
[1]. H.C.Fals, A.S.Roca, J.B.Fogagnolo, L.Fanton, M.J.X.Bele´m, C.R.C.Lima, Erosion–corrosionresistance of laser surface alloying of NbC thermal spray coatings on AISI304L steel.J. Therm. SprayTech. 29(1), 319–329(Jan.2020). https://doi.org/10.1007/s11666-019-00973-y
[2]. N.Jeyaprakash, C.-H.Yang, S. Sivasankaran, Laser cladding process of cobalt and nickel based hard micron-layerson 316L- stainless-steel-substrate. Mater. Manuf. Process.35(2),142–151(Jan.2020).
[3]. M.Krishnakumar, R.Saravanan, Surface alloying on austenitic stainless steel with titanium and tungsten using gas tungsten arc. Eng. Res. Express1 (2), 025005 (Oct.2019). https://doi.org/10.1088/26318695/ab47b5
[4]. S.C.deRezende, I.Dainezi, R.C.Apolinario, L.L.deSousa, and N.A.Mariano, ‘‘Influence of Molybdenum on microstructure and pitting corrosion behavior of solution treated duplex stainless steel in a lithium chloride solution. Mater. Res. 22, 2019.
[5]. L.Jinlong, L.Tongxiang, W.Chen, Surface enriched molybdenum enhancing the corrosionresistance of 316L stainless steel. Mater. Lett.171,3 8–41(2016)
[6]. B.N.Mordyuk, G.I.Prokopenko, PYu.Volosevich, L.E.Matokhnyuk, A.V.Byalonovich, T.V. Popova, Improved fatigue behavior of low-carbon steel 20GL by applying ultrasonic impact treatment combined witht heel ectric discharge surface alloying. Mater. Sci. Eng. A659, 119–129 (Apr.2016). https://doi.org/10.1016/j.msea.2016. 02.036
[7]. L.Song, G.Zeng, H.Xiao, X.Xiao, S.Li, Repair of 304 stainless steel by laser cladding with 316L stainless steel powders followed by laser surface alloying with WC powders. J.Manuf. Process.24, 116124 (Oct.2016). https://doi.org/10.1016/j.jmapro.2016.08.004
[8]. H.T.Cao, X.P.Dong, Z.Pan, X.W.Wu, Q.W.Huang, Y.T.Pei, Surface alloying of high-vanadium high speed steel on ductileiron using plasma transferred arc technique: Microstructure and wear properties.Mater.Des.100,223234(Jun.2016).https://doi.org/10.1016/j.matdes.2016.03.114
[9]. M.Hasegawa, Ellingham diagram in Treat is on Process Metallurgy (Elsevier,London,2014).pp.507–516.
[10]. S.Anandan, S.Pityana, and J.DuttaMajumdar, Structure–property-correlation inlaser surface alloyed AISI304 stainles ssteel with WC, Ni, NiCr. Mater. Sci. Eng. A, 536,159169. Doi:https://doi.org/10.1016/j.msea.2011.12.095.
[11]. A.Wiengmoon, J.T.H. Pearce, T.Chairuangsri, Relationship between microstructure, hardness and corrosion resistancein 20wt.Cr, 27wt.Cr and 36wt. Cr highchromium castirons. Mater. Chem. Phys. 125(3), 739–748(Feb.2011). https://doi.org/10.1016/j.matchemphys.2010.09.064
[12]. M.Dutta, A.K. Halder, S.B. Singh, Morphology and properties of hot dip Zn–Mg and Zn–Mg–Al alloy coatings on steel sheet. Surf. Coat. Technol. 205(7), 2578–2584 (Dec.2010). https://doi.org/10.1016/j.surfcoat.2010.10.006
[13]. A.Amirsadeghi, M.H.Sohi, Comparison of the influence of molybdenum and chromium TIG surface alloying on the microstructure, hardness and wear resistance of ADI. J.Mater. Process. Technol. 201(1–3), 673–677(2008)
[14]. R. W. Revie, Corrosion and corrosion control: an introduction to corrosion science and engineering.(JohnWiley&Sons,London,2008).
[15]. C.X.Shan, X.Hou, K.-L.Choy, Corrosion resistance of TiO2 films grown on stainless steel by atomic layer deposition. Surf. Coat. Technol. 202(11),23992402(Feb.2008). https://doi.org/10.1016/j. surfcoat. 2007. 08. 066
[16]. N.C.Hosking, M.A.Stro¨m, P.H.Shipway, C.D.Rudd, Corrosion resistance of zinc–magnesium coated steel.Corros. Sci. 49(9), 3669–3695 (Sep. 2007). https://doi.org/10.1016/j.corsci.2007.03.032
[17]. X.Jiang,A.Jiahe,X.Xie,Z.Xu,Multi-element Ni-Cr–Mo–Cu surface alloyed layer on steel using a double glow plasma process. Surf. Coat. Technol. 168(2), 142147 (May2003). https://doi.org/10.1016/S0257-8972(03)00008-2
[18]. J. R.Davis, Alloying Understanding the Basics.(ASM International, Geauga County, 2001).
[19]. T.Ohmi, Y.Nakagawa, M.Nakamura, A.Ohki, T.Koyama, Formation of chromium oxideon 316 Laustenitic stainless steel. J. Vac. Sci. Technol. A14(4), 2505–2510 (Jul.1996). https://doi.org/10.1116/1.580010
[20]. P.Jayaweera, D.M.Lowe, A.Sanjurjo, K.H.Lau, L.Jiang, Corrosion-resistant metallic coatings on low carbon steel. Surf. Coat. Technol. 86–87, 522–525 (Dec.1996). https://doi.org/10.1016/S0257-8972(96)03087-3
[21]. N.Ohkubo, K.Miyakusu, Y.Uematsu, H.Kimura, Effect of alloying elements on the mechanical properties of the stable austenitic stainless steel. ISIJ Int. 34(9), 764–772(1994)
[22]. F.D. Richardson, J.H.E.Jeffes, Free energies of formation of metal oxides as a function of temperature. J. ron Steel Inst. 160, 261–273(1948)
[23]. H.J.T.Ellingham, Reducibility of oxides and sulphides in metallurgical processes. J. Soc. Chem.Ind. 63(5), 125–133(1944).
[24]. D.F.Macdonald, Process of coating metal castings US3450189A. Jun17, 1969.
[25]. S. K. Behera, A. Kumar P, N. Dogra, M. Nosonovsky, and P.Rohatgi, Effect of Microstructure on Contact.
Citation
Harikrishnan A.R., Jishnu, Leneesh N. Gopal, Arun Jose, "Improved system for Butterfly Valve," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.144-148, 2017.