
Urmila Shrawankar- PhD (Computer Science & Engineering)
- Professor at Shri Ramdeobaba college of engineering and management
Urmila Shrawankar
- PhD (Computer Science & Engineering)
- Professor at Shri Ramdeobaba college of engineering and management
About
228
Publications
86,987
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
958
Citations
Introduction
Current institution
Shri Ramdeobaba college of engineering and management
Current position
- Professor
Additional affiliations
September 2006 - August 2023
G H Raisoni college of engineering (GHRCE)
Position
- Professor
Education
July 2008 - February 2014
July 2004 - August 2006
Publications
Publications (228)
Achieving and maintaining the performance of ubiquitous (Automatic Speech Recognition) ASR system is a real challenge. The main objective of this work is to develop a method that will improve and show the consistency in performance of ubiquitous ASR system for real world noisy environment. An adaptive methodology has been developed to achieve an ob...
Artificial intelligence (AI) has become a disruptive force that is changing conventional wisdom in a wide range of sectors. This thorough analysis threads through the complex web of AI applications, providing a nuanced examination of its effects in several industries while narrowing down on its revolutionary impact on education. Education stands as...
Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud computing plays an essential role by connecting people, devices, work processes, and buildings to deliver cloud services in industries. But cloud computing fac...
The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate intelligent services to users as a result. If there is any faulty data while the server analyzes the collected data, distorted results will be created. The data...
Whenever any health related physical/psychological problems or accidents happen in life, well equipped hospitals, physicians or surgeons, para medical staff, nurses, technicians, and other health care workers are available to help a person. After discharged from the hospital when person comes to home real challenges start to get back to the origina...
In recent years we face many types of natural and man-created disasters such as tsunamis, earthquakes, hurricanes, Covid-19 pandemic, terrorist attacks, floods, etc. which cause diverse and worse effects on our daily lives and economy. In order to mitigate the impact of such disasters and reduce the causality, economic loss during disaster response...
Language is a method of communication. There are different types of spoken language which are having standard rules and grammar and are easy to understand and learn. But, if we talk about understanding, interpretation and learning of sign language, then it is difficult because it is not a regular language and is not taught to everyone as it is used...
Rapidly developing cloud technology with enormous number of clients creates need of reducing power consumption of data centers. VM live migration is the most promising tool to achieve resource consolidation but it creates overheads in terms of additional CPU, disk I/O and network bandwidth utilization. This paper proposes a power-aware VM live migr...
In this modern world technologies have become one of the integral parts of the businesses as this has allowed the companies to stay in the running in the competitive business world. Machine to machine communication technology helps the business to boost their productivity and efficiency of the entire business operation. Apart from that with the ass...
This study is based on the “resource management techniques” in cloud computing and this study has been filled with valid and authentic insights which have been collected to evaluate the subject matter. At the beginning of this study, the concept of cloud counting has been clarified and then its importance has been shown within a proper manner. By s...
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
SMS Lingo is a shortened language used for typing text messages in mobile phones. It is also known as Textese. SMS language is a parlance of English that sabotages letters and numbers to produce extreme brief words. Making the SMS files concise; helps in better utilization of storage space in mobile phones.
In this paper, idea for optimized utiliza...
During the few years, various algorithms have been developed to extract features from high-resolution satellite imagery. For the classification of these extracted features, several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. Various satellite s...
Information charts are an indispensable component of documents. All charts aim to represent and visualize data, depicting a meaning about data or subject matter. However, charts are not accompanied by any contextual message type and are mostly not addressed in the textual description. Mostly, people with visual impairment rely on screen readers to...
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. These parameters of parallelism and the problems of parallelization of mathematical computations on parallel sys...
Due to some unfavourable atmosphere in the underground coalmines, it is necessary to prohibit the entry of the workers in to the coalmines. The real-time monitoring system is useful for the primary safety measures. The recent advancements in wireless sensor network leads to advancements in wireless communications. The various sensors at the locatio...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
Traditionally, adaptive filters have been deployed to achieve AEC by estimating the acoustic echo response using algorithms such as the Normalized Least-Mean-Square (NLMS) algorithm. Several approaches have been proposed over recent years to improve the performance of the standard NLMS algorithm in various ways for AEC. These include algorithms bas...
The Cyber Physical System (CPS) is used to integrate physical processes with computation and communication. Recent advances in internet of things; cloud computing and machine learning is making cyber physical system an emerging technology in healthcare system. This paper present real time cyber physical system framework for healthcare monitoring sy...
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
Real‐time systems are nowadays extensively used in most time‐critical embedded applications. The existing multiprocessor real‐time scheduling algorithms are based on partitioned and global scheduling approaches. The partitioned‐based algorithms suffer poor utilization bound, load balancing, not compatible for an open system environment, and the glo...
Every child is unique and has some different qualities. Special children have their own strengths and weaknesses which defines their interests. Their development progresses are quite slow as compared to normal children. However, the parents should carefully observe if the children have difficulties in one or more developmental areas, notice their p...
World today is facing the substantial public health risk in the form of COVID-19. The epidemic has spread in over 185 countries resulting in closure of above 90% of all educational institutions, which resulted in immediate updating to teaching–learning system and the whole world turn up to use online learning methods. Looking toward the health haza...
Recent research in networking attacks shows that the distributed denial-of-service (DDoS) attack is increase by 19% in last year. The DDoS attack is performed by flooding packets from various distributed bots nodes to victim server from attacker. Detection of distributed denial-of-service attack is challenging tasks due to availability of high-comp...
There has been increasing number of attacks in computer communication networks including IoT and cloud infrastructure in recent years. Finding out malicious attacks from unknown sources is biggest challenge in network intrusion detection system. Identifying normal network traffic from malicious traffic is also a complex task in IDS. Good IDS requir...
Virtualization offers several benefits including reduction in hardware expenses, accessories, power consumption, security and resistance on the failure. Additionally, it improves the availability and simplicity in system management. It abstracts hardware and software resources and generates a virtual copy of the same. This paper presents the perfor...
Real time tasks scheduling on a distributed system is a complex problem. The existing real time tasks scheduling techniques are primarily based on partitioned and global scheduling. In partitioned based scheduling the tasks are assigned on a dedicated processor. The advantages of partitioned based approach is existing uni-processor scheduling techn...
Smart City plays a vital role in social development. Real time scheduling of different tangible and intangible resource in distributed environment in smart is challenging problem. The different disaster management tasks smart city applications such as floods, earthquake, pandemic, fire, disaster relief, and control of hazardous area, major accident...
Production management is a complex problem. The problem becomes more complex in open, uncertain, dynamic environments and distributed productions. The existing static scheduling methods are not efficient to deal with this problem efficiently. This paper proposed multi-agent approach for real time scheduling in production management to efficiently m...
Live migration helps to achieve resource consolidation and fault tolerance. It transfers VM storage together with VM memory and CPU status. During migration, a dirty page rate also delays the period of live migration, and it affects the performance of migration by increasing migration time, network bandwidth consumption, CPU processing overheads an...
In recent years, with the mushrooming of internet-enabled mobile devices, there has been a corresponding increase in information and data being transmitted and received. This development has raised concerns about security and one of the crucial components associated with it: authentication. With a wide variety of services and communication being ex...
The behavioral pattern of children with special needs depends on their emotional and developmental disability. Any abnormal and incorrect pattern of behavior which is below the level of development as the expected norm can be considered as “the challenging behavior.” For supporting children with behavioral problems, many interventions and strategie...
This article focuses on the hazardous conditions prevailing in underground coal mines and the decision to prohibit entry, when conditions are adverse. Thus, the ongoing observation framework is helpful for ascertaining the conditions for working in underground coal mines and for essential safety and well-being measures. The advancements in WSN lead...
Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Ene...
Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection.
This article takes an extensive and wide-r...
In this paper, hybrid BCI that merges Event Related Potentials (P300) and Steady State visual Evoked Potentials (SSVEP) simultaneously is proposed to enhance the performance of Four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses in hybrid SSVEP+P300 BCI & compare it w...
Non-stationarity of electroencephalogram (EEG) signals greatly affect classifier performance in brain-computer interface (BCI). To overcome this problem we propose an adaptive classifier model known as extended multi-class pooled mean linear discriminant analysis (EMPMLDA). Here, we update the average class pair co-variance matrix along with pooled...
Everyone has different handwriting, and this is a difficulty since not everyone can discern the handwriting of different people. The described technique converts unstructured handwriting into a structured type. To resolve the problem, the authors want to separate every letter of the words so as to converting the alphabet into a commonplace type. Th...
Working stress is becoming very common. Handling working stress at the workplace is really going to be challenging. As a result, most of the time most of the time people start behaving in sarcastic ways through verbal communication, through different gestures, using emoticons, or writing reviews or comments that leads to increasing their anxiety so...
Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for delay tolerant networks,it is necess...
Background:
In this paper, hybrid brain-computer interface (BCI) that merges event related potentials (P300) and steady state visual evoked potentials (SSVEP) simultaneously is proposed to enhance the performance of four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses...
Wireless Sensor Network (WSN) is an extremely important tool for closely monitoring, understanding and controlling application processes to the end users. The main purpose behind installing the wireless sensor network is to make real-time decisions based on data received from the sensor nodes. This data transmission from sensor nodes to the base st...
Link : https://www.morebooks.de/store/gb/book/cloud-computing-policies,-outsourcing-and-computing-keys/isbn/978-613-9-89903-6
Website plays an important role in digital marketing these days. It can also help you to increase your business's success. For making money from the website you should learn about the website visitors. The larger the number of visitors to the website is better for your business. So it is really important to learn about the visitors to analyze your...
This book demonstrates the practical implementation of distributed systems by using the recent open source compilers and environments. Distributed systems are workstations that can communicate with each other and data processors, as well as different hierarchical architectural configurations of data processors that have differing data storage capab...
The article elaborates difficulties faced during text identification from an image. The authors evaluated various algorithms in order to find the solutions. The aim of the research is to increase robustness with respect to different challenges. The system solves the problem of reading multiple texts embedded in an image as well as provides a meanin...
Finger spelling in air helps user to operate a computer in order to make human interaction easier and faster than keyboard and touch screen. This article presents a real-time video based system which recognizes the English alphabets and words written in air using finger movements only. Optical Character Recognition (OCR) is used for recognition whi...
With the coup era of assistive technology in computers has benefitted mankind in a favourable way by enabling automatic speech-conciliated communication. Although various assistive technology tools are available, still visually impaired are not independent to access computer systems completely as compared to sighted user using the traditional input...
In the revolutionary era of advanced technologies, computers have benefited humankind in a favourable way by enabling automatic speech-conciliated communication. Even though various assistive tools are available, still visually impaired people are dependent for accessing computer using the traditional input devices, compared to sighted people. To t...
The huge computations performed sequentially requires a lot of time for execution as on contrary to the concurrent implementation. Many problems are involved in the dense linear algebra operations the main focus for this work is for solving linear equations. The problem of solving linear equations when approached using parallel implementation will...
Huge energy requirement of cloud data centers is prime concern. Dynamic Virtual Machine (VM) consolidation based on VM live migration to switched-off or put some of the under-loaded host Physical Machines (PMs) into a low power consumption mode can significantly save energy in data centers and achieve green cloud computing. Performance overheads im...
Sign language is a way of communication for deaf & dumb. Different sign recognition techniques are there which are giving output in the form of word for recognized sign. The proposed method is focusing on interpretation of sign language in proper English sentence. Different NLP techniques are used in addition to sign recognition. Input is given as...
A considerable amount of time is required to interpret whole news article to get the gist of it. Therefore, in order to reduce the reading and interpretation time, headlines are necessary. The available techniques for news headline construction mainly includes extractive and abstractive headline generation techniques. In this paper, context based n...
Natural language is the way of communication for normal human beings which includes spoken language, written and body gestures i.e. head gesture, hand gestures, facial expressions and lip motion etc. On the other hand, speech and hearing-impaired people uses sign language for communication which is not understandable for normal people thus they fac...
SMS means conversing with others in minimal words which lead to a new SMS lingo. This reduces efforts for typing complete message. Today's devices lack the regional language keypad. If they exist people are uncomfortable with the keypads. Thus regional language messages are written using English alphabets which causes chaos when SMS lingo is used....
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Normal person cannot understand the conversation of deaf or dumb people. Deaf/dumb people defect in sentence formation and grammatical correction. Previously the sign language is converted to the text, but only in word format using image processing methods. Natural Language Processing (NLP) is a powerful tool for translation in the human language....
Question is a basic and important construct of natural language. Standard question plays vital role in generation of exact desired output in many natural language applications. This work is implemented to construct standard question from unstructured user question. Unstructuredness refers to an incorrect sequence of words of query string. Question...