scispace - formally typeset
Search or ask a question
Author

Satish Jain

Bio: Satish Jain is an academic researcher. The author has contributed to research in topics: Active networking & Computer-mediated communication. The author has an hindex of 1, co-authored 1 publications receiving 85 citations.

Papers
More filters
Book
11 Aug 2003

85 citations


Cited by
More filters
Book
09 Apr 2012
TL;DR: In this article, the authors present a comprehensive overview of Smart Grid technology and applications with extensive illustrations and practical examples, and describe the spectrum of key enabling technologies required for the realisation of the Smart Grid with worked examples to illustrate the applications.
Abstract: Electric power systems worldwide face radical transformation with the need to decarbonise electricity supply, replace ageing assets and harness new information and communication technologies (ICT). The Smart Grid uses advanced ICT to control next generation power systems reliably and efficiently. This authoritative guide demonstrates the importance of the Smart Grid and shows how ICT will extend beyond transmission voltages to distribution networks and customer-level operation through Smart Meters and Smart Homes. Smart Grid Technology and Applications: * Clearly unravels the evolving Smart Grid concept with extensive illustrations and practical examples. * Describes the spectrum of key enabling technologies required for the realisation of the Smart Grid with worked examples to illustrate the applications. * Enables readers to engage with the immediate development of the power system and take part in the debate over the future Smart Grid. * Introduces the constituent topics from first principles, assuming only a basic knowledge of mathematics, circuits and power systems. * Brings together the expertise of a highly experienced and international author team from the UK, Sri Lanka, China and Japan. Electrical, electronics and computer engineering researchers, practitioners and consultants working in inter-disciplinary Smart Grid RD&D will significantly enhance their knowledge through this reference. The tutorial style will greatly benefit final year undergraduate and master's students as the curriculum increasing focuses on the breadth of technologies that contribute to Smart Grid realisation.

198 citations

Journal ArticleDOI
TL;DR: The author has created a number of comparison tables throughout the review, which include comparison of wired data transmission technology, comparison of common ROV communication protocols and comparisons of various inertial navigation systems.
Abstract: This paper presents a review of inspection-class Remotely Operated Vehicles (ROVs). The review divides the classification of inspection-class ROVs; categorising the vehicles in order of size and capability. A state of the art technology review is undertaken, discussing various common subsystems of the ROV. Standard and novel ROV shapes and designs are reviewed, with emphasis on buoyancy, frame materials and hydrodynamics. Several power considerations and designs are discussed, accounting for battery fed and mains fed systems. ROV telemetry is split into a discussion on the various transmission hardware systems and the communication protocols that are most widely used in industry and research today. A range of thruster technologies is then introduced with consideration taken of the various thruster architectures available. Finally, the navigation and positioning sensors employed for ROV navigation and control are reviewed. The author has also created a number of comparison tables throughout the review; tables include comparison of wired data transmission technology, comparison of common ROV communication protocols and comparisons of various inertial navigation systems. By the end of the review the reader will have clearer understanding on the fundamentals of inspection-class ROV technologies and can use this as an introduction to further paper investigation.

130 citations

Journal ArticleDOI
TL;DR: A new intelligent MVSS using the concepts of Bayesian coalition game and learning automata (LA) is presented, found to be better in comparison to the other state-of-the-art schemes, with respect to various performance evaluation metrics.
Abstract: In a mobile video surveillance system (MVSS), an efficient approach is required, so that captured video can be transmitted to its final destination under tight constraints of delay and accuracy. This paper presents a new intelligent MVSS using the concepts of Bayesian coalition game and learning automata (LA). These LA are assumed to be the players in a game and are deployed on vehicles. Coalition among players is formed using the Bayesian Coalition Game Theory. To decrease the delay that occurred during transmission of captured video to the nearest access points, the best path is chosen based on a new metric called Path Score, which is computed by each player in the game. For each action performed by the automata, their actions may be rewarded or penalized by a value, which is defined as a sequence, with respect to the inputs provided from the stochastic environment. According to the reward or penalty received from the environment, the automata update their action probability vector. After 15 iterations, a Nash equilibrium is achieved in the game by defining a twice-differentiable function in Banach spaces, and convergence of sequence is proved using the Cauchy convergence theorem. The performance of the proposed scheme is found to be better in comparison to the other state-of-the-art schemes, with respect to various performance evaluation metrics.

103 citations

Journal ArticleDOI
06 Aug 2015-Sensors
TL;DR: Simulation results show that the proposed scheme not only reduces the total energy consumption but also distributes the energy consumption more uniformly over the network, thereby increasing the lifetime of the network.
Abstract: In this paper, we propose a distributed data-gathering scheme using an autonomous underwater vehicle (AUV) working as a mobile sink to gather data from a randomly distributed underwater sensor network where sensor nodes are clustered around several cluster headers. Unlike conventional data-gathering schemes where the AUV visits either every node or every cluster header, the proposed scheme allows the AUV to visit some selected nodes named path-nodes in a way that reduces the overall transmission power of the sensor nodes. Monte Carlo simulations are performed to investigate the performance of the proposed scheme compared with several preexisting techniques employing the AUV in terms of total amount of energy consumption, standard deviation of each node's energy consumption, latency to gather data at a sink, and controlling overhead. Simulation results show that the proposed scheme not only reduces the total energy consumption but also distributes the energy consumption more uniformly over the network, thereby increasing the lifetime of the network.

90 citations

Journal Article
TL;DR: This paper describes an new symmetric key algorithm which uses basic additive cipher and some new component to encrypt the information and provides both algorithms for encryptions and decryption.
Abstract: Any general communication which is carried out between humans for exchanging thoughts and knowledge can be understood by anyone who knows that language. It is called plain text, so we bother to make such a scheme which converts this general message into a coded message which can be understudied by only authorized people. So we need to hide the information which is written into general message, from those who are not intended, even they can see the coded data . Cryptography can be stated as the art and science of transforming the message into coded form to make them secure and immune to attacks which reveals its secrecy. Cryptography is basically affiliated with the information security, Computer system security and engineering, cryptography is used in all kind of advance application technology like ATM, online banking, online trading. Cryptography has its two basic forms i.e. one is symmetric key cryptography and other is asymmetric key cryptography. An Asymmetric key algorithm uses two keys, one is public and other is private key both are used for encryption and decryption, and symmetric key cryptography algorithms are quick and most commonly used, In symmetric key algorithms single key is used for both encryption and decryption, this is also called secret key which is shared between both sender and receiver. Some common symmetric key algorithms are DES, RC2.RC4, and IDEA etc. This paper describes an new symmetric key algorithm which uses basic additive cipher and some new component to encrypt the information. We provide both algorithms for encryptions and decryption. The advantage of this algorithm over others is also explained. Categories & subject descriptors [Cryptography & Steganography]: A New Algorithm. General Terms Algorithms, Design, Security.

61 citations