Urmila Shrawankar

Urmila Shrawankar
  • PhD (Computer Science & Engineering)
  • Professor at Shri Ramdeobaba college of engineering and management

About

228
Publications
86,987
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
958
Citations
Current institution
Shri Ramdeobaba college of engineering and management
Current position
  • Professor
Additional affiliations
Rashtrasant Tukadoji Maharaj Nagpur University
Position
  • Professor (Full)
September 2006 - August 2023
G H Raisoni college of engineering (GHRCE)
Position
  • Professor
Education
July 2008 - February 2014
Sant Gadge Baba Amravati University
Field of study
  • Computer Science & Engineering
July 2004 - August 2006
Rashtrasant Tukadoji Maharaj Nagpur University
Field of study
  • Computer Science & Engineering

Publications

Publications (228)
Article
Full-text available
Achieving and maintaining the performance of ubiquitous (Automatic Speech Recognition) ASR system is a real challenge. The main objective of this work is to develop a method that will improve and show the consistency in performance of ubiquitous ASR system for real world noisy environment. An adaptive methodology has been developed to achieve an ob...
Chapter
Artificial intelligence (AI) has become a disruptive force that is changing conventional wisdom in a wide range of sectors. This thorough analysis threads through the complex web of AI applications, providing a nuanced examination of its effects in several industries while narrowing down on its revolutionary impact on education. Education stands as...
Article
Full-text available
Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud computing plays an essential role by connecting people, devices, work processes, and buildings to deliver cloud services in industries. But cloud computing fac...
Article
Full-text available
The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate intelligent services to users as a result. If there is any faulty data while the server analyzes the collected data, distorted results will be created. The data...
Chapter
Whenever any health related physical/psychological problems or accidents happen in life, well equipped hospitals, physicians or surgeons, para medical staff, nurses, technicians, and other health care workers are available to help a person. After discharged from the hospital when person comes to home real challenges start to get back to the origina...
Chapter
In recent years we face many types of natural and man-created disasters such as tsunamis, earthquakes, hurricanes, Covid-19 pandemic, terrorist attacks, floods, etc. which cause diverse and worse effects on our daily lives and economy. In order to mitigate the impact of such disasters and reduce the causality, economic loss during disaster response...
Chapter
Language is a method of communication. There are different types of spoken language which are having standard rules and grammar and are easy to understand and learn. But, if we talk about understanding, interpretation and learning of sign language, then it is difficult because it is not a regular language and is not taught to everyone as it is used...
Article
Full-text available
Rapidly developing cloud technology with enormous number of clients creates need of reducing power consumption of data centers. VM live migration is the most promising tool to achieve resource consolidation but it creates overheads in terms of additional CPU, disk I/O and network bandwidth utilization. This paper proposes a power-aware VM live migr...
Article
In this modern world technologies have become one of the integral parts of the businesses as this has allowed the companies to stay in the running in the competitive business world. Machine to machine communication technology helps the business to boost their productivity and efficiency of the entire business operation. Apart from that with the ass...
Article
This study is based on the “resource management techniques” in cloud computing and this study has been filled with valid and authentic insights which have been collected to evaluate the subject matter. At the beginning of this study, the concept of cloud counting has been clarified and then its importance has been shown within a proper manner. By s...
Preprint
Full-text available
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
Preprint
Full-text available
SMS Lingo is a shortened language used for typing text messages in mobile phones. It is also known as Textese. SMS language is a parlance of English that sabotages letters and numbers to produce extreme brief words. Making the SMS files concise; helps in better utilization of storage space in mobile phones. In this paper, idea for optimized utiliza...
Preprint
Full-text available
During the few years, various algorithms have been developed to extract features from high-resolution satellite imagery. For the classification of these extracted features, several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. Various satellite s...
Article
Information charts are an indispensable component of documents. All charts aim to represent and visualize data, depicting a meaning about data or subject matter. However, charts are not accompanied by any contextual message type and are mostly not addressed in the textual description. Mostly, people with visual impairment rely on screen readers to...
Preprint
Full-text available
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
Preprint
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. These parameters of parallelism and the problems of parallelization of mathematical computations on parallel sys...
Preprint
Full-text available
Due to some unfavourable atmosphere in the underground coalmines, it is necessary to prohibit the entry of the workers in to the coalmines. The real-time monitoring system is useful for the primary safety measures. The recent advancements in wireless sensor network leads to advancements in wireless communications. The various sensors at the locatio...
Preprint
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
Preprint
Full-text available
Traditionally, adaptive filters have been deployed to achieve AEC by estimating the acoustic echo response using algorithms such as the Normalized Least-Mean-Square (NLMS) algorithm. Several approaches have been proposed over recent years to improve the performance of the standard NLMS algorithm in various ways for AEC. These include algorithms bas...
Article
Full-text available
The Cyber Physical System (CPS) is used to integrate physical processes with computation and communication. Recent advances in internet of things; cloud computing and machine learning is making cyber physical system an emerging technology in healthcare system. This paper present real time cyber physical system framework for healthcare monitoring sy...
Preprint
Full-text available
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Preprint
Full-text available
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
Article
Real‐time systems are nowadays extensively used in most time‐critical embedded applications. The existing multiprocessor real‐time scheduling algorithms are based on partitioned and global scheduling approaches. The partitioned‐based algorithms suffer poor utilization bound, load balancing, not compatible for an open system environment, and the glo...
Article
Full-text available
Every child is unique and has some different qualities. Special children have their own strengths and weaknesses which defines their interests. Their development progresses are quite slow as compared to normal children. However, the parents should carefully observe if the children have difficulties in one or more developmental areas, notice their p...
Chapter
World today is facing the substantial public health risk in the form of COVID-19. The epidemic has spread in over 185 countries resulting in closure of above 90% of all educational institutions, which resulted in immediate updating to teaching–learning system and the whole world turn up to use online learning methods. Looking toward the health haza...
Chapter
Recent research in networking attacks shows that the distributed denial-of-service (DDoS) attack is increase by 19% in last year. The DDoS attack is performed by flooding packets from various distributed bots nodes to victim server from attacker. Detection of distributed denial-of-service attack is challenging tasks due to availability of high-comp...
Chapter
There has been increasing number of attacks in computer communication networks including IoT and cloud infrastructure in recent years. Finding out malicious attacks from unknown sources is biggest challenge in network intrusion detection system. Identifying normal network traffic from malicious traffic is also a complex task in IDS. Good IDS requir...
Chapter
Virtualization offers several benefits including reduction in hardware expenses, accessories, power consumption, security and resistance on the failure. Additionally, it improves the availability and simplicity in system management. It abstracts hardware and software resources and generates a virtual copy of the same. This paper presents the perfor...
Article
Full-text available
Real time tasks scheduling on a distributed system is a complex problem. The existing real time tasks scheduling techniques are primarily based on partitioned and global scheduling. In partitioned based scheduling the tasks are assigned on a dedicated processor. The advantages of partitioned based approach is existing uni-processor scheduling techn...
Article
Full-text available
Smart City plays a vital role in social development. Real time scheduling of different tangible and intangible resource in distributed environment in smart is challenging problem. The different disaster management tasks smart city applications such as floods, earthquake, pandemic, fire, disaster relief, and control of hazardous area, major accident...
Article
Full-text available
Production management is a complex problem. The problem becomes more complex in open, uncertain, dynamic environments and distributed productions. The existing static scheduling methods are not efficient to deal with this problem efficiently. This paper proposed multi-agent approach for real time scheduling in production management to efficiently m...
Article
Full-text available
Live migration helps to achieve resource consolidation and fault tolerance. It transfers VM storage together with VM memory and CPU status. During migration, a dirty page rate also delays the period of live migration, and it affects the performance of migration by increasing migration time, network bandwidth consumption, CPU processing overheads an...
Article
In recent years, with the mushrooming of internet-enabled mobile devices, there has been a corresponding increase in information and data being transmitted and received. This development has raised concerns about security and one of the crucial components associated with it: authentication. With a wide variety of services and communication being ex...
Article
Full-text available
The behavioral pattern of children with special needs depends on their emotional and developmental disability. Any abnormal and incorrect pattern of behavior which is below the level of development as the expected norm can be considered as “the challenging behavior.” For supporting children with behavioral problems, many interventions and strategie...
Article
Full-text available
This article focuses on the hazardous conditions prevailing in underground coal mines and the decision to prohibit entry, when conditions are adverse. Thus, the ongoing observation framework is helpful for ascertaining the conditions for working in underground coal mines and for essential safety and well-being measures. The advancements in WSN lead...
Article
Full-text available
Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Ene...
Article
Full-text available
Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-r...
Article
Full-text available
In this paper, hybrid BCI that merges Event Related Potentials (P300) and Steady State visual Evoked Potentials (SSVEP) simultaneously is proposed to enhance the performance of Four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses in hybrid SSVEP+P300 BCI & compare it w...
Article
Full-text available
Non-stationarity of electroencephalogram (EEG) signals greatly affect classifier performance in brain-computer interface (BCI). To overcome this problem we propose an adaptive classifier model known as extended multi-class pooled mean linear discriminant analysis (EMPMLDA). Here, we update the average class pair co-variance matrix along with pooled...
Article
Full-text available
Everyone has different handwriting, and this is a difficulty since not everyone can discern the handwriting of different people. The described technique converts unstructured handwriting into a structured type. To resolve the problem, the authors want to separate every letter of the words so as to converting the alphabet into a commonplace type. Th...
Article
Full-text available
Working stress is becoming very common. Handling working stress at the workplace is really going to be challenging. As a result, most of the time most of the time people start behaving in sarcastic ways through verbal communication, through different gestures, using emoticons, or writing reviews or comments that leads to increasing their anxiety so...
Research
Full-text available
Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for delay tolerant networks,it is necess...
Article
Background: In this paper, hybrid brain-computer interface (BCI) that merges event related potentials (P300) and steady state visual evoked potentials (SSVEP) simultaneously is proposed to enhance the performance of four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses...
Chapter
Full-text available
Wireless Sensor Network (WSN) is an extremely important tool for closely monitoring, understanding and controlling application processes to the end users. The main purpose behind installing the wireless sensor network is to make real-time decisions based on data received from the sensor nodes. This data transmission from sensor nodes to the base st...
Book
Full-text available
Link : https://www.morebooks.de/store/gb/book/cloud-computing-policies,-outsourcing-and-computing-keys/isbn/978-613-9-89903-6
Article
Full-text available
Website plays an important role in digital marketing these days. It can also help you to increase your business's success. For making money from the website you should learn about the website visitors. The larger the number of visitors to the website is better for your business. So it is really important to learn about the visitors to analyze your...
Book
Full-text available
This book demonstrates the practical implementation of distributed systems by using the recent open source compilers and environments. Distributed systems are workstations that can communicate with each other and data processors, as well as different hierarchical architectural configurations of data processors that have differing data storage capab...
Article
Full-text available
The article elaborates difficulties faced during text identification from an image. The authors evaluated various algorithms in order to find the solutions. The aim of the research is to increase robustness with respect to different challenges. The system solves the problem of reading multiple texts embedded in an image as well as provides a meanin...
Article
Full-text available
Finger spelling in air helps user to operate a computer in order to make human interaction easier and faster than keyboard and touch screen. This article presents a real-time video based system which recognizes the English alphabets and words written in air using finger movements only. Optical Character Recognition (OCR) is used for recognition whi...
Article
Full-text available
With the coup era of assistive technology in computers has benefitted mankind in a favourable way by enabling automatic speech-conciliated communication. Although various assistive technology tools are available, still visually impaired are not independent to access computer systems completely as compared to sighted user using the traditional input...
Article
Full-text available
In the revolutionary era of advanced technologies, computers have benefited humankind in a favourable way by enabling automatic speech-conciliated communication. Even though various assistive tools are available, still visually impaired people are dependent for accessing computer using the traditional input devices, compared to sighted people. To t...
Article
Full-text available
The huge computations performed sequentially requires a lot of time for execution as on contrary to the concurrent implementation. Many problems are involved in the dense linear algebra operations the main focus for this work is for solving linear equations. The problem of solving linear equations when approached using parallel implementation will...
Article
Full-text available
Huge energy requirement of cloud data centers is prime concern. Dynamic Virtual Machine (VM) consolidation based on VM live migration to switched-off or put some of the under-loaded host Physical Machines (PMs) into a low power consumption mode can significantly save energy in data centers and achieve green cloud computing. Performance overheads im...
Article
Full-text available
Sign language is a way of communication for deaf & dumb. Different sign recognition techniques are there which are giving output in the form of word for recognized sign. The proposed method is focusing on interpretation of sign language in proper English sentence. Different NLP techniques are used in addition to sign recognition. Input is given as...
Article
Full-text available
A considerable amount of time is required to interpret whole news article to get the gist of it. Therefore, in order to reduce the reading and interpretation time, headlines are necessary. The available techniques for news headline construction mainly includes extractive and abstractive headline generation techniques. In this paper, context based n...
Article
Full-text available
Natural language is the way of communication for normal human beings which includes spoken language, written and body gestures i.e. head gesture, hand gestures, facial expressions and lip motion etc. On the other hand, speech and hearing-impaired people uses sign language for communication which is not understandable for normal people thus they fac...
Conference Paper
Full-text available
SMS means conversing with others in minimal words which lead to a new SMS lingo. This reduces efforts for typing complete message. Today's devices lack the regional language keypad. If they exist people are uncomfortable with the keypads. Thus regional language messages are written using English alphabets which causes chaos when SMS lingo is used....
Article
Full-text available
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Conference Paper
Full-text available
Normal person cannot understand the conversation of deaf or dumb people. Deaf/dumb people defect in sentence formation and grammatical correction. Previously the sign language is converted to the text, but only in word format using image processing methods. Natural Language Processing (NLP) is a powerful tool for translation in the human language....
Conference Paper
Full-text available
Question is a basic and important construct of natural language. Standard question plays vital role in generation of exact desired output in many natural language applications. This work is implemented to construct standard question from unstructured user question. Unstructuredness refers to an incorrect sequence of words of query string. Question...

Network

Cited By