scispace - formally typeset
Search or ask a question
Author

Kumar Ravi

Bio: Kumar Ravi is an academic researcher from VIT University. The author has contributed to research in topics: Bat algorithm & Cuckoo search. The author has an hindex of 24, co-authored 64 publications receiving 1772 citations. Previous affiliations of Kumar Ravi include Bangalore Medical College and Research Institute & IBM.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a novel approach to determine the optimal location and sizing of Distribution Generation (DG) and Distribution STATic COMpensator (DSTATCOM) is analyzed, and the objective function is formulated for minimizing power loss, operational costs and voltage profile enhancement of the system subjected to equality and in equality constraints.

169 citations

Journal ArticleDOI
TL;DR: In this article, a new long term scheduling for optimal allocation of capacitor bank in radial distribution system with the objective of minimizing power loss of the system subjected to equality and in equality constraints is introduced.

148 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed a new method of scheduling for optimal placement and sizing of Distribution STATic COMpensator in the radial distribution networks to minimize the power loss, the proposed method Voltage Stability Index is used to search the optimal placement for installation of DSTATCOM.

134 citations

Journal ArticleDOI
TL;DR: A new approach to find the optimal location and sizing of Distribution STATic COMpensator (DSTATCOM) with an objective function of minimizing the total network power losses is investigated.

95 citations

Patent
Rabindranath Dutta1, Kumar Ravi1
09 Aug 2001
TL;DR: In this article, a system and a method for controlling access to patient medical information through a networked aggregate medical server are provided, where a portion of the medical information is sent to the requestor based on the patient access instructions if the access request and patient instructions correspond.
Abstract: A system and a method for controlling access to patient medical information through a networked aggregate medical server are provided. Patient medical information is received at the server. Patient access instructions are received at the server. An access request for medical information is received at the server from a requester. Correspondence with the access request and the patient access instructions is determined. A portion of the medical information is sent to the requestor based on the patient access instructions if the access request and the patient instructions correspond.

91 citations


Cited by
More filters
Patent
06 Mar 2006
TL;DR: In this article, an architecture for a line card in a network routing device is presented. But the line card architecture is not suitable for the use of multi-hop data transmission.
Abstract: An architecture for a line card in a network routing device is provided. The line card architecture provides a bi-directional interface between the routing device and a network, both receiving packets from the network and transmitting the packets to the network through one or more connecting ports. In both the receive and transmit path, packets processing and routing in a multi-stage, parallel pipeline that can operate on several packets at the same time to determine each packet's routing destination is provided. Once a routing destination determination is made, the line card architecture provides for each received packet to be modified to contain new routing information and additional header data to facilitate packet transmission through the switching fabric. The line card architecture further provides for the use of bandwidth management techniques in order to buffer and enqueue each packet for transmission through the switching fabric to a corresponding destination port. The transmit path of the line card architecture further incorporates additional features for treatment and replication of multicast packets.

582 citations

Patent
Daehwan Kim1, Yoonki Hong1
22 Apr 2013
TL;DR: In this paper, a mobile terminal and a control method thereof, which can obtain an image, are provided. But they do not specify how to obtain the image from the mobile terminal, nor how to extract the pictogram from the obtained image.
Abstract: A mobile terminal and a control method thereof, which can obtain an image, are provided. A mobile terminal (100) includes a camera unit (121), a pictogram extraction unit (182) and a controller (180). The camera unit (121) obtains image information corresponding to at least one of a still image and a moving image. The pictogram extraction unit (182) extracts at least one pictogram from the obtained image information. The controller (180) detects information related to the extracted pictogram, and displays the detected information to be overlapped with the obtained image information. In the mobile terminal, the controller (180) includes, as the detected information, at least one of previously recorded information and currently searched information related to the extracted pictogram.

482 citations

Patent
16 Jul 2002
TL;DR: In this article, an active filter installed in or cooperating with the user's e-mail system sends a challenge e mail back to the sender address, where the question is such that only humans can interpret and respond to it correctly.
Abstract: When a user receives potential junk e-mail from an unknown sender address, an active filter installed in or cooperating with the user's e-mail system sends a challenge e-mail back to the sender address. Unless the user receives a correct response e-mail from the sender address and/or a response that meets formal criteria, the active filter rejects the original e-mail and blocks future e-mail from that sender address. The challenge preferably includes a question that the sender must correctly answer in his response. The question is such that only humans can interpret and respond to it correctly. For example, the question may relate to and/or be incorporated in an image in the challenge. Lists of approved and blocked sender addresses are compiled. The user may directly enter addresses in the address lists. Addresses to which the user has sent e-mail may also be included directly in the approved list.

406 citations

Patent
09 Jul 2007
TL;DR: In this paper, a system and method for identifying inappropriate content in websites on a network is presented, where unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and are identified as possibly having malicious content.
Abstract: A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and are identified as possibly having malicious content. The URLs or web content may be preprocessed within a gateway server module or some other software module to collect additional information related to the URLs. The URLs may be scanned for known attack signatures, and if any are found, they may be tagged as candidate URLs in need of further analysis by a classification module.

362 citations

Patent
22 Mar 2004
TL;DR: In this article, a received query is processed so as to generate an initial group of ranked documents corresponding to the received query, and each document in all or a portion of the documents in the initial group is associated with a respective set of ranked candidate terms such that each candidate term in the respective set is embedded within the document, and a subset of the candidate terms in one or more of the respective sets of candidate terms is selected.
Abstract: A received query is processed so as to generate an initial group of ranked documents corresponding to the received query. Each document in all or a portion of the documents in the initial group of ranked documents is associated with a respective set of ranked candidate terms such that each candidate term in the respective set of ranked candidate terms is embedded within the document. Each respective set of ranked candidate terms is identified at a time prior to the processing of the received query. In accordance with a selection function, a subset of the candidate terms in one or more of the respective sets of candidate terms is selected. In response to the received query, the initial group of ranked documents and the subset of candidate terms are presented.

338 citations