Pramila M. Chawan

Pramila M. Chawan
Veermata Jijabai Technological Institute | VJTI · Computer Engineering and Information Technology

M.E. COMPUTER ENGINEERING

About

171
Publications
308,245
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
554
Citations
Citations since 2016
72 Research Items
426 Citations
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
Introduction
Pramila M. Chawan currently works as an Associate Professor at the Department of Computer Engineering & I T , Veermata Jijabai Technological Institute, Mumbai. Her area of interest are Computer Organization & Architecture, Parallel Computer Architecture, Software Engineering, Software Project Management, Data Mining, Machine Learning, Networking, Network Security, Operating Systems.
Additional affiliations
June 1992 - present
Veermata Jijabai Technological Institute
Position
  • Professor
June 1992 - present
Veermata Jijabai Technological Institute
Position
  • Professor (Associate)

Publications

Publications (171)
Article
Full-text available
Image captioning is the fascinating task of generating concise and accurate descriptions of a given image. Common approaches to tackling this challenge contain various shortcomings, such as a lack of diversity in training data, lengthy training time, lack of fine-grained information, and internal covariate shifts. These are just some of the issues...
Article
Full-text available
Technology is growing exponentially in the recent years and most of the organizations store their data in digital format. With the rapid growth in technology, there is a need for maintaining security of data. It is extremely essential as data leak might have a huge effect on the organization. Preventing data leak has become one of the biggest chall...
Article
Full-text available
In simple terms, a vulnerability in cyber security refers to any fault or flaw, or weakness in an information system, internal controls, or system processes of an organization. It can also be defined as a flaw or a fault in the source code design which determines the application malfunctions. Therefore, a good Vulnerability Management plan should b...
Article
Full-text available
The goal of a recommendation system is to predict user interests and infer their mental processes. Based on the user's demands and while taking into account their interests, this system can give them the information they need. A more thorough analysis of the data is required to provide better recommendations. Numerous recommendation systems have be...
Article
Full-text available
Healthcare involves an vital portion in human lives. The healthcare industry contain huge sum of psychiatric data hence machine learning models were utilized to supply conclusion effectively within the heart illness forecast. The classification of healthy individual and non-healthy individual can be done dependably by using machine learning strateg...
Article
Full-text available
The work of recommendation system is to guess the thought process of user and to predict the interests of the users. This system can provide suitable information to the user based on the needs of the user while taking care of the interests of the user. For giving better recommendation the data need to be analyzed more effectively. There are various...
Article
Full-text available
Knowledge has become essential in the age of globalization. We created an e-learning platform to assist curious learners from various backgrounds. NotesPane is a community-driven web tool that was created to make learning easier for people all around the world. The goal behind this app is to have everything in one place, allowing authors to efficie...
Article
Full-text available
Lately, the world has witnessed a symbolic rise in the e-commerce market, particularly in people buying products online. There has been a copious amount of research being done on discovering the purchasing patterns of a user, and above all on the factors determining whether a product will be bought or not by the user. Here, we will be finding out w...
Article
Full-text available
In the era of globalization, knowledge becomes necessary. To help curious learners across different backgrounds we have come up with an e-learning platform. NotesPane is a community-based web application developed to ease learning all over the world. It's a platform where users can upload, download, view or edit notes. Notes are in the PDF, Videos,...
Article
Full-text available
Technology is growing exponentially in the recent years and most of the organizations store their data in digital format. With the rapid growth in technology, there is a need for maintaining security of data. It is extremely essential as data loss might have huge effect on the organization. Preventing data leak has become one of the biggest challen...
Article
Full-text available
In simple terms, a vulnerability in cyber security refers to any fault or flaw or weakness in an information system, or internal controls or system processes of an organization. It can also be defined as a flaw or a fault in the source code design which determines the application malfunctions. Therefore, a good Vulnerability Management plan should...
Article
Full-text available
In simple terms, Connectivity ecosystem in Remote Healthcare refers to How the embedded devices, patient EHR and Room care platform, etc. are connected while monitoring healthcare remotely. It aims to ease the treatment for patient. Therefore, there is a need of using an application for accessing and operating patient health remotely by a medical p...
Article
Full-text available
Anticipating heart illness has continuously been a basic and challenging errand for healthcare specialists. Hospitals and other clinics offer expensive treatments and operations for heart disease. So, predicting heart disease in the early stages will be beneficial for people all over the world to take necessary actions before they become seriously...
Article
Full-text available
Diabetic Retinopathy (DR) is a common eye disease which is contracted by diabetic people which may cause problems to the retina of the eye resulting in total or partial blindness. Therefore it is vital to identify diabetic retinopathy in the early stages. This paper aims to detect the diabetic retinopathy using neural networks and to give a decisio...
Article
Full-text available
Accent classification forms an important part of many Automatic Speech Recognition (ASR) systems. Neural networks are being used increasingly in many ASR tasks including recognizing and classifying accents. This paper aims to classify different accents by extracting Mel Frequency Cepstral Coefficients from the audio of the speaker and predict the a...
Article
Full-text available
Parkinson’s disease is a movement disorder of the nervous system that worsens over time. As nerve cells (neurons) in parts of the brain weaken or are damaged or die, people may begin to notice problems with movement, tremor, stiffness in the limbs or the trunk of the body, or impaired balance. As these symptoms become more obvious, people may have...
Article
Full-text available
The proposed research paper aims to find the most secure means to maintain the integrity and ensure privacy and security in Healthcare Management System. Internal database constraints and restrictions ensures integrity of the data. Moreover, Cross Object Resource Sharing (CORS) filters the devices which can access the project. Data privacy will be...
Article
Full-text available
Facial Expressions are a key factor for businesses and organizations that consider it detection of emotions crucial for analysing customer satisfaction. Many researchers have tried to solve this issue with varying levels of accuracy for either 5,6 or 7 expressions and some also for specific expressions only. In this paper, we have implemented our o...
Article
Full-text available
Depression is a common but serious mental health disorder. Still, most people dealing with depression do not approach doctors for this problem. On the other hand, the use of Social Media Sites like Twitter is expanding extremely fast. Nowadays, people tend to rely on these social media platforms to share their emotions and feelings through their fe...
Article
Full-text available
The objective of this paper is to perform a survey of different literatures where a comprehensive study on Diabetic Retinopathy (DR) is done and different Machine learning techniques are used to detect DR. Diabetic Retinopathy (DR) is an eye disease in humans with diabetes which may harm the retina of the eye and may cause total visual impairment....
Article
Full-text available
For a long time, expressions have been something that human beings are proud of. That is an essential difference between us and machines. Facial Expressions can be classified using various technical factors and we've studied various such factors in our surveys as well. In this paper we have surveyed various machine learning techniques for facial ex...
Article
Full-text available
This article aims to discover the most secure ways to maintain the integrity and privacy in Healthcare Management System. To ensure integrity of the data we will be applying internal database constraints and restrictions. Moreover, Cross Object Resource Sharing (CORS) will be used to filter the devices which can access the project. Data privacy wil...
Article
Full-text available
Depression is a common but serious mental health disorder. Still, most people dealing with depression do not approach doctors for this problem. On the other hand, the use of Social Media Sites like Twitter is expanding extremely fast. Nowadays, people tend to rely on these social media applications to share their emotions and feelings. Thus, this r...
Article
Full-text available
Parkinson's disease is a movement disorder of the nervous system that worsens over time. As nerve cells (neurons) in parts of the brain weaken or are damaged or die, people may begin to notice problems with movement, tremor, stiffness in the limbs or the trunk of the body, or impaired balance. As these symptoms become more obvious, people may have...
Article
Full-text available
An Object Detection is related to Computer Vision. Object detection enables detecting instances of objects in images and videos. It identifies the feature of Images rather than traditional object detection methods and generates an intelligent understanding of images just like human vision works. In this paper, We revived begins the brief introducti...
Article
Full-text available
in this article aims to discover the color which has more impact in a painting via opencv library with python programming language. To be able to find dominant color I’ll use k means clustering as opposed to try and find histogram and other clustering methods in the data mining techniques for every pixel. I'll use numpy and sklearn libraries for cl...
Article
Full-text available
Sentiment analysis is about classifying and identifying attributes of expression. There are various platforms - twitter, facebook, Imdb where people express their opinion. On this platform it is important to recognise the opinion of people. Using machine learning techniques we can segregate people’s opinion as positive, negative, neutral. We can al...
Article
Full-text available
In recent years, many companies and institutions tend to keep most of their data in digital format. There is a large specter of information stored by such entities, like medical records, contracts, internal procedures, etc. that can be considered as being confidential, thus protecting them is a great concern. Since employees have access to such inf...
Article
Full-text available
Class-label classification is an important machine learning task where in one assigns a subset of candidate without label to an object. In this paper, we propose a new document classification method based on Machine Learning (ML) approach. Our proposed method has several attractive properties: it captures some metadata from each object and built th...
Article
Full-text available
This project aims to perform the task of Visual Question Answering using Keras deep learning frameworks that combine the image features and the question vector to produce answers for the questions posed by making use of a pre-processed image dataset along with spaCy word embeddings. In this article, we have explained how we can merge the CNN and RN...
Article
Full-text available
Breast Cancer is the most leading malignancy affecting 2.1 million women each year which leads to greatest number of deaths among women. Early treatment not only helps to cure cancer but also helps in prevention of its recurrence. And hence this system mainly focuses on prediction of breast cancer where it uses different machine learning algorithms...
Article
Full-text available
Object Detection is related to Computer Vision. Object detection enables detecting instances of objects in images and videos. It identifies the feature of Images rather than traditional object detection methods and generates an intelligent understanding of images just like human vision works. In this paper, We revived begins the brief introduction...
Article
Full-text available
Sentiment analysis is about classifying and identifying attributes of expression. There are various platforms-twitter, facebook ,Imdb where people express their opinion. On this platform it is important to recognise the opinion of people. Using machine learning techniques we can segregate people's opinion as positive, negative, neutral. We can also...
Article
Full-text available
In this article, we will study the concept of Visual Question Answering (VQA) using novel long short-term memory (LSTM) and convolutional neural network (CNN) attention models that combine the local image features and the question from corresponding specific parts or regions of an image to produce answers for the questions posed by making use of a...
Article
Full-text available
In this article aims to discover the color which has more impact in a painting via opencv library with python programming language. To be able to find dominant color I'll use k means clustering as opposed to try and find histogram and other clustering methods in the data mining techniques for every pixel. I'll use numpy and sklearn libraries for cl...
Article
Full-text available
Breast Cancer is the most leading malignancy affecting 2.1 million women each year which leads to greatest number of deaths among women. Early treatment not only helps to cure cancer but also helps in prevention of its recurrence. And hence this system mainly focuses on prediction of breast cancer where it uses different machine learning algorithms...
Article
Full-text available
in this article aims to discover the color which has more impact in a painting via opencv library with python programming language. To be able to find dominant color I'll use k means clustering as opposed to try and find histogram and other clustering methods in the data mining techniques for every pixel. I'll use numpy and sklearn libraries for cl...
Article
Full-text available
In recent years, many companies and institutions tend to keep most of their data in digital format. There is a large specter of information stored by such entities, like medical records, contracts, internal procedures, etc. that can be considered as being confidential, thus protecting them is a great concern. Since employees have access to such inf...
Article
Full-text available
Heart arrhythmia is a state of heart causing irregularity in heartbeats which can be too fast, too slow or unstable. Electrocardiography (ECG) is the fundamental tool use for the detection of Heart arrhythmia. Generally, electrodes are attached to the skin of a patient and the electrical activities of the heart of a patient are recorded for a perio...
Article
Full-text available
Every day consumers make decisions on whether or not to buy a product. In some cases the decision is based solely on price but in many instances the purchasing decision is more complex, and many more factors might be considered before the final commitment is made. In an effort to make purchasing more likely, in addition to considering the asking pr...
Article
Full-text available
A The rapid increase in mountains of unstructured textual data accompanied by the proliferation of tools to analyze them has opened up great opportunities and challenges for text research. The research area of sentiment analysis has gained popularity in the last years. Business developers not only want to know about there product marketing and prof...
Article
Full-text available
It is my attempt to make an online shopping portal for color blind persons to help them in discerning colors, and to provide assistance for an interactive shopping experience. The incentive behind this effort is to significantly reduce the difficulties faced by a color blind person while shopping online.To reduce said difficulties, we designed a co...
Article
Full-text available
In more recent years, human computer interaction is becoming an important part of most state-of-the-art emergent technologies. The traditional mode of interaction via keyboards, mouse and joystick cannot meet the demands of this fast growing technology, and hence, in this paper, hand gesture recognition is explained and implemented, to enable furth...
Article
Full-text available
Condition checking is a standout among the most imaginative ways that organizations and assembling organizations can set aside extra cash. It spins around the guideline of prescient upkeep, which is a proactive method for settling failing gear before they cause issues. It is very necessary that this conditioning monitoring software should work very...
Article
Full-text available
Multi-label classification is an important machine learning task wherein one assigns a subset of candidate labels to an object. In this paper, we propose a new multi-label classification method based on Conditional Bernoulli Mixtures. Our proposed method has several attractive properties: it captures label dependencies; it reduces the multi-label p...
Article
Full-text available
Brain Computer Interface system (BCI) recent researches shows that BCI is taking interest in Classification of acquired Electro-Encephalogram (EEG) signals. Literature review distinguished investigation of EEG patterns due to various activities such as, sleeping, reading, meditation, etc. EEG patterns for alcoholic and controlled states is being fo...
Article
Full-text available
Winning is the goal of any sport. Cricket is one the most watched sport now a days. Winning in Cricket depends on various factors like home crowd advantage, performances in the past, experience in the match, performance at the specific venue, performance against the specific team and the current form of the team and the player. During the past few...
Article
Full-text available
The regularity of student's attending is previous within the administration of all the tutorial establishments throughout the recent decades. Poor attending results in detention that affects the general educational performance of the scholars. Even during this sophisticated century, student's attendings are marked on attendance sheet delivered by t...
Article
Full-text available
Diabetes mellitus or simply diabetes is a disease caused due to the increase level of blood glucose. Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this will be doubled as 592 million...
Article
Full-text available
In the advent of a smartphone dependent world, applications have become an integral part of life. Existing apps are providing information which is missing a connection to get to the goal of having a good plan. Planning is one of the most time consuming activities and all existing applications focus on single services (be it a movie, or a dine-out e...
Article
Full-text available
In the advent of a smartphone dependent world, applications have become an integral part of life. Existing apps are providing information which is missing a connection to get to the goal of having a good plan. Planning is one of the most time consuming activities and all existing applications focus on single services (be it a movie, or a dine-out e...
Article
Full-text available
The number of road accidents due to distracted driving has been on a rise in the recent years. As per the Union Road Transport and Highways Ministry Report 2016, 17 people were killed each hour in India due to road accidents. This makes it imperative to take measures to curb the number of road fatalities. The major cause of these accidents is drive...
Article
Full-text available
The number of road accidents due to distracted driving has been on a rise in the recent years. As per the Union Road Transport and Highways Ministry Report 2016, 17 people were killed each hour in India due to road accidents. This makes it imperative to take measures to curb the number of road fatalities. The major cause of these accidents is drive...
Article
Full-text available
Electroencephalogram (EEG) signals reflect the gross electrical activity produced from synaptic current of individual neurons across large cortical area. EEG signals are used in study and analysis of neurons i.e. to study and analysis of the brain/mental State. Analysis and study of neurons show major evolution in research related to medical and bi...
Article
Full-text available
Winning is the aim of any game. Nowadays Cricket is one of the most watched game after Soccer. Winning of Cricket match depends on various factors like home advantage, past performances, experience in the match, performance at the specific venue, performance against the specific team and the current form of the team and the player. But in this pape...
Article
Full-text available
Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this will be doubled as 592 million. Diabetes mellitus or simply diabetes is a disease caused due to the increase level of blood glucose...
Article
Full-text available
Nowadays, security is one of the important issues in our day to day life. Everywhere such as banks, shops etc. we require security. Secret password is the main goal of the password. It can be used to access private information. Because of that data security is one of the most important fields which overcome the problem of data leakage and its misus...
Article
Full-text available
Nowadays streaming data is delivered by more and more applications, due to this crucial method for data and knowledge engineering is considered to be clustering data streams. It is a two step process. A normal approach is to summarize the data stream in real-time with an online process into so called micro-clusters. Local density estimates are repr...
Article
Full-text available
Nowadays streaming data is delivered by more and more applications, due to this crucial method for data and knowledge engineering is considered to be clustering data streams. It is a two step process. A normal approach is to summarize the data stream in real-time with an online process into so called micro-clusters. Local density estimates are repr...
Article
Full-text available
Currently, security has become one of the important factors in our day to day life. Like banks, shops and everywhere else we require security. An attacker can use the password to access the private information. To avoid this is one of the goals of the data security. As we know that we require security in our daily life then what about the security...
Article
Full-text available
Supply chain can be said as a set of distributed entities composed of distributors, retailer's manufacturers, suppliers, and costumers. Supply chain management (SCM) is the supervision of its three flows: the materials flow, the finances flow and the information flow. Indeed, this paper focuses on the information flow, more precisely on sharing inf...
Article
Full-text available
In utility mining, each item is associated with a utility that could be profit, quantity, cost or other user preferences. Objective of Utility Mining is to identify the item sets with highest utilities. Basically the utility of an item set represents its importance, which can be measured in terms of information depending on the user specification a...
Article
Full-text available
Security in today's scenario is very difficult task to achieve. Since, everyday a new threat comes to affect the information causing a huge loss of data, loss of time to get rid of that threat, in turn resulting in financial loss. There are tools which are widely used to defend against these malicious files, such as, antivirus software, intrusion d...
Article
Full-text available
Resource-oriented architecture is based on Resources, URI, representations and link between them. URI provided by REST are consumed by some applications, but it does not have pretty looks for end users to read directly. There is a way to access some URI and get the webpage directly as response without some presentation layer in between. This paper...
Article
Full-text available
Users may search for different things from anywhere and anytime. But Search results depend on user entered query which has to satisfy their searched predicates that is stored in the spatial database. Many applications are developed for finding closest objects to a specified location containing a set of keywords entered by users. For example, neares...
Article
Full-text available
In computer science, ontology is a formal naming and definition of the classes, subclasses, properties, and the relationships between the entities that are exist for a particular domain [1].Therefore it is a practical application of philosophical ontology, with taxonomy. In this paper we discuss a methodology to create domain ontology for C++.This...
Article
Full-text available
In this paper we dedicate to the topic of aspect ranking as it does automatic ranking of products. Every product has many and different kinds of aspects and all these aspects are used for ranking of products. Initially identification of product aspects are done and then it proceed towards aspects sentiment classification and finally the ranking of...
Article
Full-text available
Consumers used to review regarding many products which are available on-line. These reviews are valuable and important for both firms and users. But many times it seems that these reviews are often disorganized making it difficult to do information navigation and knowledge extraction. So here product aspect ranking framework is proposed so as to id...
Article
Full-text available
Users may search for different type of things from anywhere. But Search results depend on the user entered query which has to satisfy their searched properties that is stored in the spatial database. Due to rapid growth of users it become essential to optimize search results based on nearest neighbour property in spatial databases. Conventional spa...
Article
Full-text available
Keyword based Search engines are unable to give relevant search results as they do not know the exact meaning of the keywords used. This paper compares both keyword and semantic search engines. Semantic Web is advanced version of the current web. It represents information meaningfully for machines and humans. It is based on an Ontology, which is co...
Article
Full-text available
In data mining Feature selection is the area which is mostly used as input for high dimensional data for effective data mining. Feature selection is used to identify most relevant feature amongst all.This selection can be measured in terms of effectiveness and efficiency. While effectiveness concerns the quality of the subset of features and effici...