scispace - formally typeset
Search or ask a question
Author

S.A.V. Satya Murty

Bio: S.A.V. Satya Murty is an academic researcher from Indira Gandhi Centre for Atomic Research. The author has contributed to research in topics: Wireless sensor network & Prototype Fast Breeder Reactor. The author has an hindex of 9, co-authored 58 publications receiving 422 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a simple time series method for bearing fault feature extraction using singular spectrum analysis (SSA) of the vibration signal is proposed, which is easy to implement and fault feature is noise immune.

207 citations

Proceedings ArticleDOI
03 Jun 2011
TL;DR: The method of creating database by using Split Range Technique (SRT) to estimate the approximate distance between two nodes and the results of RSSI shows the approximate positioning of the sensor node with the error estimation of about 5–10%.
Abstract: In wireless sensor network (WSN), position awareness (localization) of the sensor nodes is necessary to exploit the communication and to provide the meaningful information about their surroundings. Here Received Signal Strength Indicator (RSSI) technique is used as it requires no extra hardware and can be used for both indoor and outdoor environment. RSSI is having limitations such as high randomness due to fading and shadowing. This makes difficulties in establishing exact relationship between RSSI value and distance. In this paper we propose the method of creating database by using Split Range Technique (SRT) to estimate the approximate distance between two nodes. Using this database, position estimation has been done. For this Adaptive n-Triangle algorithm is implemented. Present results of RSSI shows the approximate positioning of the sensor node with the error estimation of about 5–10%. The experiment can be extended to show the predicted path of a moving object which is being identified by sensors.

41 citations

01 Sep 2010
TL;DR: This paper attempts to fill the gap by developing a morphological framework of Knowledge Management Maturity Model through literature survey and analysis.
Abstract: A Knowledge Management Maturity Model is a structured approach for implementing Knowledge Management. Many practitioners and researchers have developed Knowledge Management Maturity Models, which have different forms, structure and characteristics. Despite the availability of many models, a comprehensive framework that can represent different perspectives and provide a holistic picture of Knowledge Management Maturity Model is not found in literature. This paper attempts to fill this gap by developing a morphological framework of Knowledge Management Maturity Model through literature survey and analysis.

22 citations

Proceedings ArticleDOI
31 Oct 2012
TL;DR: This paper presents a comprehensive survey of real-time routing protocols in WSN, by discussing each protocol with its key features, and concludes this paper with open research issues and challenges ofreal-time routed systems.
Abstract: Wireless sensor networks can be termed as a new generation of distributed embedded systems that has a capability of meeting broad range of real-time applications. Examples include radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few. Wireless sensor networks that are deployed in time/mission-critical applications with highly dynamic environments have to interact with the physical phenomenon under stringent timing constraints and severe resource limitations. For such real-time wireless sensor networks, designing and developing a real-time routing protocol that meets the required real-time guarantee of data packets communication is a stimulating field of study that raised many challenges and research issues. In this paper, we present a comprehensive survey of real-time routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.

18 citations

Proceedings ArticleDOI
03 Apr 2012
TL;DR: The experimental results show that delivery ratio reduces with increase in data rate due to collisions and help characterise the network capacity limits.
Abstract: This paper presents the throughput results obtained from a Wireless Sensor Network testbed, with single and multiple sources in different network deployments and routing architectures. The experimental testbed deployed at IIT Madras consisted of commercially available Crossbow TelosB and MicaZ nodes and a custom-built sensor node based on the DigiNet Xbee chip, with all nodes implementing the Zigbee standard. The networks were deployed in uniform grid topologies in three different deployments with up to 228 nodes. The main aim of the experiments is to analyze the throughput and packet delivery ratio observed with single and multiple sources. The experimental results show that delivery ratio reduces with increase in data rate due to collisions and help characterise the network capacity limits.

14 citations


Cited by
More filters
Journal ArticleDOI
Feng Jia1, Yaguo Lei1, Jing Lin1, Xin Zhou1, Na Lu1 
TL;DR: The diagnosis results show that the proposed method is able to not only adaptively mine available fault characteristics from the measured signals, but also obtain superior diagnosis accuracy compared with the existing methods.

1,289 citations

Journal ArticleDOI
TL;DR: A review and roadmap to systematically cover the development of IFD following the progress of machine learning theories and offer a future perspective is presented.

1,173 citations

Journal ArticleDOI
TL;DR: An end-to-end method that takes raw temporal signals as inputs and thus doesn’t need any time consuming denoising preprocessing and can achieve high accuracy when working load is changed is proposed.

805 citations

Journal ArticleDOI
TL;DR: In this article, a review of fault severity assessment of rolling bearing components is presented, focusing on data-driven approaches such as signal processing for extracting proper fault signatures associated with the damage degradation, and learning approaches that are used to identify degradation patterns with regards to health conditions.

453 citations

01 Jan 1999
TL;DR: Several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion are described and compared.
Abstract: Each copy of a text document can be made different in a nearly invisible way by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters. A unique copy can be registered with its recipient, so that subsequent unauthorized copies that are retrieved can be traced back to the original owner. In this paper we describe and compare several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion. The marks are intended to protect documents of limited value that are owned by individuals who would rather possess a legal than an illegal copy if they can be distinguished. We will describe attacks that remove the marks and countermeasures to those attacks. An architecture is described for distributing a large number of copies without burdening the publisher with creating and transmitting the unique documents. The architecture also allows the publisher to determine the identity of a recipient who has illegally redistributed the document, without compromising the privacy of individuals who are not operating illegally. Two experimental systems are described. One was used to distribute an issue of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, and the second was used to mark copies of company private memoranda.

329 citations