
Pradip Jawandhiya- Doctor of Philosophy
- Professor at P R Pote Patil College of Engineering and Management
Pradip Jawandhiya
- Doctor of Philosophy
- Professor at P R Pote Patil College of Engineering and Management
About
75
Publications
101,900
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
958
Citations
Introduction
Currently working as Professor & Principal at Pankaj Laddhad Institute of Technology & Management Studies, Buldana, Maharashtra, India. Chairman, Computer Society of India, Amravati Chapter, Amravati.Member,Board of Studies Member,Computer Science & Engineering, Sant Gadgebaba Amravati University, Amravati. Member of Various Professional Socities like IEEE,IEI,IETE,CSI,IACSIT,IAENG.
Current institution
P R Pote Patil College of Engineering and Management
Current position
- Professor
Additional affiliations
June 2013 - present
Pankaj Laddhad Institute of Technology & Management Studies Yelgaon
Position
- Professor
Description
- Academician & Administrator
January 2008 - August 2011
December 2011 - June 2013
Jagadambha College of Engineering& Technology
Position
- Professor (Full)Head of Department
Publications
Publications (75)
There is a rapid adoption of mobile technology in teaching-learning process of education system. Now a day, the teaching-learning process benefits greatly from the mobile application which makes the learning easy. Students/ learners can go through the contents of the app at their own pace and actively engaged in joyous learning process. Keeping thi...
Nutrient deficiency detection is an important aspect when doing fertilization, and quality yield estimation models. To detect nutrient levels, a wide variety of methods including image processing with deep learning, multiple sensor interfaces, chemical processes, etc. are proposed by researchers. Each of these methods vary in terms of detection acc...
Plants require adequate nutrient content for a total as well as natural life cycle. Six macronutrients such as nitrogen, calcium, phosphorus, potassium, sulfur and magnesium are important for the natural and healthy rise of plants. Regular activities with a lack of nutrients in plants lead to transportation difficulties and ultimately affect crop....
In education sector, two main tasks are—Analysis of students’ data and predicting their performance as it may leads to their great future. Analyzing the data obtained from educational institute or Learning Management System (LMS) becomes challenging task among instructors to predict the performance of students correctly and accurately. This article...
Educational Data Mining (EDM) referes to the research designed to classify, analyze, and predict the students’ academic performance from the data collected from educational setting. Data collection and data processing are an important task in any research such as EDM. In this research article, data collection and data processing task are explained...
Educational Data Mining (EDM) is one of the trending areas in which various researchers are working for the betterment of the student’s performance. Predicting the students’ performance is considered as an important task in education sector and is of paramount importance as predicting the performance accurately may lead to great future of students...
Development in the agricultural process byadopting technology will be very useful in cultivation. Nowin the agricultural sector, without understanding ormonitoring the essential soil parameters, crop cultivation willbe challenging and so the farmers may undergo financiallosses. In agriculture, Expert systems are applied in a broadrange of operation...
There are no publication fees for chapter submitted to this book publication. Prospective authors are requested to submit their chapter proposals / full chapter as an email attachment in a word file to the email 5g6gtrends@gmail.com. All submitted chapters will be peer-reviewed.
Submitted chapters should not have been published previously, not un...
V Model Represents one-to-one relationship between the documents on the left hand side and the test activities on the right. This is not
always correct. System testing not only depends on Function requirements but also depends on technical design, architecture also. Couple of
testing activities is not explained in V model. This is a major exception...
In today's world the images in the medical areas are corrupted by different types of noise. The different noises from the medical images are very difficult task and problematic also to get noise free images which can be accurately observed for the correspondence for removing the noises from the medical images. In this paper some most well known noi...
The new smart era is based on science and technology that has changed the way of industrial operation. The traditional way of managing the heavy task and decision-making capabilities which mostly rely on the man-power system is now transforming with the advancement of computer and IoT technology in various domains. Day by day the new inventions are...
Development in the agricultural process by adopting technology will be very useful in cultivation. Now in the agricultural sector, without understanding or monitoring the essential soil parameters, crop cultivation will be challenging and so the farmers may undergo financial losses. In agriculture, Expert systems are applied in a broad range of ope...
Tourism is the world’s most ideal development segment. There has been profound development in the measure of the tourism insights on the Web. It is a disgraceful circumstance that paying little heed to the overburden of data, we for the most part neglect to find important data. This is because of nonattendance of semantics distinguishing proof of t...
Malicious threats are better known by their work of damages. This damages are not just limited to the system, but it might lead to significant information damage too. Along with this, threats are also responsible for financial loss. As technology increases, Types and attacks of threats also increases. Though the research community investigated a nu...
In this technical era, Laddha, Shilpa the Web has accelerated, Jawandhiya, Pradip M. the user satisfaction is still not up to the mark. However, retrieval of required data is yet a challenging job. Users still struggle to get the precise facts on the Internet. To fetch the most correct end result is a hard mission due to the giant unstructured repo...
Surveillance plays a major role in many fields be it at home, hospitals, schools, public places, farmlands etc. It helps us to monitor a certain area and prevent theft and also provides proof of evidence. In the case of farmlands or agricultural lands surveillance is very important to prevent unauthorized people from gaining access to the area as w...
Semantic Search is an area of research which focuses on meaning of terms used in user query. Ontology plays significant role to define the concept and the relationship of terms in domain. Since the understanding of concepts is domain specific, Ontology creation is also domain specific. According to this argument, query interpreted in Tourism domain...
This paper is the extension of the work that explores the overall working of the proposed Smart Semantic information retrieval (IR) system. The aim of the proposed design is to improve the performance of the popular keyword based retrieval system using semantic approach. It seek the novel concept of Query prototype and Query similarity which is a p...
This paper is the extension of the work that explores the overall working of the proposed Smart Semantic information retrieval (IR) system. The aim of the proposed design is to improve the performance of the popular keyword based retrieval system using semantic approach. It seek the novel concept of Query prototype and Query similarity which is a p...
This paper is the extension of the work which explores the overall working of the proposed semantic information retrieval (IR) system and the query prototype technique used for matching the user-entered query with the prototypes defined in the system. The objective of the proposed design is to improve the performance of the results provided by keyw...
This paper is the extension of the work which explores the overall working of the proposed semantic information retrieval (IR) system and the query prototype technique used for matching the user-entered query with the prototypes defined in the system. The objective of the proposed design is to improve the performance of the results provided by keyw...
The research reported in this paper explores theproposed semantic information retrieval (IR) system to overcomethe problem of current IR systems by providing direct, relevantand accurate results to the end user in less time. The proposedsystem will drastically improve the performance over the currentIR systems in terms of recall and precision.
Traditional keyword-based search engines retrieve web pages by matching the exact tokens or words in the user query with the tokens or words in the web documents. This approach has many drawbacks. Synonyms or terms similar to tokens or words in the user query are not taken into consideration to search web pages. The keyword based search engine give...
Security is an essential requirement in mobile ad hoc network (MANETs).In this paper, we proposed the survey of countermeasures of all security attacks of network layer in MANETs. To the best of our knowledge, this is the first paper that explaining all the existing countermeasures of network layer attacks in MANETs. The countermeasures are feature...
Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications. It technologically matures enough to be integrated into civil society. The importance of UAS in scientific applications has been...
In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a specific network algorithm that needed a larg...
Mobile ad hoc networks (MANET) play an important role in connecting devices in pervasive environments. Each node in MANET can act as source and router. In this paper, we propose a On Demand Route Routing Protocol (ODRRP) with Broadcast Reply which combines the merits of both proactive and reactive approach. Like proactive approach, it maintains rou...
Ad-hoc networks, due to their improvised nature, are frequently established insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. On Demand...
An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt ad hoc networking for commercial user; however, their main applications lie in military, tactical, and other security-sensitive operations...
This paper presents a framework for a mature security engineering process and organization that can lead to better, cheaper, and faster development of secure systems and products. A Security Engineering Capability Maturity Model (SE CMM) is being developed to guide process improvement in the practice of security engineering. The model consists of a...
Security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the netw...
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority, easy eavesdropping, dynamic network topology, and limited resources. This paper introduces a...
Routing in mobile ad hoc network is an important research topicwhere various mechanisms have been already proposedconcerning this issue. In this paper, we focus on one critical issuethat is multicast routing.We propose in this paper implementationof an optimized, polymorphic, hybrid multicast routing protocolfor MANET. This new polymorphic protocol...
Mobile Ad Hoc Networks are vulnerable to various types of Denial of Service (DoS) attacks for the absence of fixed network infrastructure. The Gray Hole attack is a type of DoS attacks. In this attack, an adversary silently drops some or all of the data packets sent to it for further forwarding even when no congestion occurs. Our proposed scheme co...
With the rapid development of computer, multimedia and network technologies, a large amount of image and video data are created and broadly distributed over the Internet or via CD-ROM. However, without effective image retrieval it is impossible to make use of the huge image databases. There are basically three ways of retrieving previously stored m...
Mobile ad hoc networks (MANET) play an important role in connecting devices in pervasive environments. Each node in MANET can act as source and router. In this paper, we propose a hybrid routing protocol with Broadcast Reply (HRP-BR) which combines the merits of both proactive and reactive approach. Like proactive approach, it maintains routing tab...
Abstract- This paper presents the design, implementation, and performance of a reliable multicast transport protocol (RMTP). RMTP is based on a hierarchical structure in which receivers are grouped into local regions or domains and in each domain there is a special receiver called a designated receiver (DR) which is responsible for sending acknowle...