
Urmila ShrawankarRashtrasant Tukadoji Maharaj Nagpur University
Urmila Shrawankar
PhD (Computer Science & Engineering)
About
209
Publications
66,662
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
561
Citations
Introduction
Additional affiliations
September 2006 - present
Education
July 2008 - February 2014
July 2004 - August 2006
Publications
Publications (209)
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
SMS Lingo is a shortened language used for typing text messages in mobile phones. It is also known as Textese. SMS language is a parlance of English that sabotages letters and numbers to produce extreme brief words. Making the SMS files concise; helps in better utilization of storage space in mobile phones. In this paper, idea for optimized utiliza...
During the few years, various algorithms have been developed to extract features from high-resolution satellite imagery. For the classification of these extracted features, several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. Various satellite s...
Information charts are an indispensable component of documents. All charts aim to represent and visualize data, depicting a meaning about data or subject matter. However, charts are not accompanied by any contextual message type and are mostly not addressed in the textual description. Mostly, people with visual impairment rely on screen readers to...
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. These parameters of parallelism and the problems of parallelization of mathematical computations on parallel sys...
Due to some unfavourable atmosphere in the underground coalmines, it is necessary to prohibit the entry of the workers in to the coalmines. The real-time monitoring system is useful for the primary safety measures. The recent advancements in wireless sensor network leads to advancements in wireless communications. The various sensors at the locatio...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
Traditionally, adaptive filters have been deployed to achieve AEC by estimating the acoustic echo response using algorithms such as the Normalized Least-Mean-Square (NLMS) algorithm. Several approaches have been proposed over recent years to improve the performance of the standard NLMS algorithm in various ways for AEC. These include algorithms bas...
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
Real‐time systems are nowadays extensively used in most time‐critical embedded applications. The existing multiprocessor real‐time scheduling algorithms are based on partitioned and global scheduling approaches. The partitioned‐based algorithms suffer poor utilization bound, load balancing, not compatible for an open system environment, and the glo...
Every child is unique and has some different qualities. Special children have their own strengths and weaknesses which defines their interests. Their development progresses are quite slow as compared to normal children. However, the parents should carefully observe if the children have difficulties in one or more developmental areas, notice their p...
World today is facing the substantial public health risk in the form of COVID-19. The epidemic has spread in over 185 countries resulting in closure of above 90% of all educational institutions, which resulted in immediate updating to teaching–learning system and the whole world turn up to use online learning methods. Looking toward the health haza...
Recent research in networking attacks shows that the distributed denial-of-service (DDoS) attack is increase by 19% in last year. The DDoS attack is performed by flooding packets from various distributed bots nodes to victim server from attacker. Detection of distributed denial-of-service attack is challenging tasks due to availability of high-comp...
There has been increasing number of attacks in computer communication networks including IoT and cloud infrastructure in recent years. Finding out malicious attacks from unknown sources is biggest challenge in network intrusion detection system. Identifying normal network traffic from malicious traffic is also a complex task in IDS. Good IDS requir...
Virtualization offers several benefits including reduction in hardware expenses, accessories, power consumption, security and resistance on the failure. Additionally, it improves the availability and simplicity in system management. It abstracts hardware and software resources and generates a virtual copy of the same. This paper presents the perfor...
Real time tasks scheduling on a distributed system is a complex problem. The existing real time tasks scheduling techniques are primarily based on partitioned and global scheduling. In partitioned based scheduling the tasks are assigned on a dedicated processor. The advantages of partitioned based approach is existing uni-processor scheduling techn...
Smart City plays a vital role in social development. Real time scheduling of different tangible and intangible resource in distributed environment in smart is challenging problem. The different disaster management tasks smart city applications such as floods, earthquake, pandemic, fire, disaster relief, and control of hazardous area, major accident...
Production management is a complex problem. The problem becomes more complex in open, uncertain, dynamic environments and distributed productions. The existing static scheduling methods are not efficient to deal with this problem efficiently. This paper proposed multi-agent approach for real time scheduling in production management to efficiently m...
Live migration helps to achieve resource consolidation and fault tolerance. It transfers VM storage together with VM memory and CPU status. During migration, a dirty page rate also delays the period of live migration, and it affects the performance of migration by increasing migration time, network bandwidth consumption, CPU processing overheads an...
In recent years, with the mushrooming of internet-enabled mobile devices, there has been a corresponding increase in information and data being transmitted and received. This development has raised concerns about security and one of the crucial components associated with it: authentication. With a wide variety of services and communication being ex...
The behavioral pattern of children with special needs depends on their emotional and developmental disability. Any abnormal and incorrect pattern of behavior which is below the level of development as the expected norm can be considered as “the challenging behavior.” For supporting children with behavioral problems, many interventions and strategie...
This article focuses on the hazardous conditions prevailing in underground coal mines and the decision to prohibit entry, when conditions are adverse. Thus, the ongoing observation framework is helpful for ascertaining the conditions for working in underground coal mines and for essential safety and well-being measures. The advancements in WSN lead...
Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Ene...
Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection.
This article takes an extensive and wide-r...
In this paper, hybrid BCI that merges Event Related Potentials (P300) and Steady State visual Evoked Potentials (SSVEP) simultaneously is proposed to enhance the performance of Four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses in hybrid SSVEP+P300 BCI & compare it w...
Non-stationarity of electroencephalogram (EEG) signals greatly affect classifier performance in brain-computer interface (BCI). To overcome this problem we propose an adaptive classifier model known as extended multi-class pooled mean linear discriminant analysis (EMPMLDA). Here, we update the average class pair co-variance matrix along with pooled...
Everyone has different handwriting, and this is a difficulty since not everyone can discern the handwriting of different people. The described technique converts unstructured handwriting into a structured type. To resolve the problem, the authors want to separate every letter of the words so as to converting the alphabet into a commonplace type. Th...
Working stress is becoming very common. Handling working stress at the workplace is really going to be challenging. As a result, most of the time most of the time people start behaving in sarcastic ways through verbal communication, through different gestures, using emoticons, or writing reviews or comments that leads to increasing their anxiety so...
Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for delay tolerant networks,it is necess...
Wireless Sensor Network (WSN) is an extremely important tool for closely monitoring, understanding and controlling application processes to the end users. The main purpose behind installing the wireless sensor network is to make real-time decisions based on data received from the sensor nodes. This data transmission from sensor nodes to the base st...
Link : https://www.morebooks.de/store/gb/book/cloud-computing-policies,-outsourcing-and-computing-keys/isbn/978-613-9-89903-6
Website plays an important role in digital marketing these days. It can also help you to increase your business's success. For making money from the website you should learn about the website visitors. The larger the number of visitors to the website is better for your business. So it is really important to learn about the visitors to analyze your...
This book demonstrates the practical implementation of distributed systems by using the recent open source compilers and environments. Distributed systems are workstations that can communicate with each other and data processors, as well as different hierarchical architectural configurations of data processors that have differing data storage capab...
The article elaborates difficulties faced during text identification from an image. The authors evaluated various algorithms in order to find the solutions. The aim of the research is to increase robustness with respect to different challenges. The system solves the problem of reading multiple texts embedded in an image as well as provides a meanin...
Finger spelling in air helps user to operate a computer in order to make human interaction easier and faster than keyboard and touch screen. This article presents a real-time video based system which recognizes the English alphabets and words written in air using finger movements only. Optical Character Recognition (OCR) is used for recognition whi...
With the coup era of assistive technology in computers has benefitted mankind in a favourable way by enabling automatic speech-conciliated communication. Although various assistive technology tools are available, still visually impaired are not independent to access computer systems completely as compared to sighted user using the traditional input...
In the revolutionary era of advanced technologies, computers have benefited humankind in a favourable way by enabling automatic speech-conciliated communication. Even though various assistive tools are available, still visually impaired people are dependent for accessing computer using the traditional input devices, compared to sighted people. To t...
The huge computations performed sequentially requires a lot of time for execution as on contrary to the concurrent implementation. Many problems are involved in the dense linear algebra operations the main focus for this work is for solving linear equations. The problem of solving linear equations when approached using parallel implementation will...
Huge energy requirement of cloud data centers is prime concern. Dynamic Virtual Machine (VM) consolidation based on VM live migration to switched-off or put some of the under-loaded host Physical Machines (PMs) into a low power consumption mode can significantly save energy in data centers and achieve green cloud computing. Performance overheads im...
Sign language is a way of communication for deaf & dumb. Different sign recognition techniques are there which are giving output in the form of word for recognized sign. The proposed method is focusing on interpretation of sign language in proper English sentence. Different NLP techniques are used in addition to sign recognition. Input is given as...
A considerable amount of time is required to interpret whole news article to get the gist of it. Therefore, in order to reduce the reading and interpretation time, headlines are necessary. The available techniques for news headline construction mainly includes extractive and abstractive headline generation techniques. In this paper, context based n...
Natural language is the way of communication for normal human beings which includes spoken language, written and body gestures i.e. head gesture, hand gestures, facial expressions and lip motion etc. On the other hand, speech and hearing-impaired people uses sign language for communication which is not understandable for normal people thus they fac...
SMS means conversing with others in minimal words which lead to a new SMS lingo. This reduces efforts for typing complete message. Today's devices lack the regional language keypad. If they exist people are uncomfortable with the keypads. Thus regional language messages are written using English alphabets which causes chaos when SMS lingo is used....
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Normal person cannot understand the conversation of deaf or dumb people. Deaf/dumb people defect in sentence formation and grammatical correction. Previously the sign language is converted to the text, but only in word format using image processing methods. Natural Language Processing (NLP) is a powerful tool for translation in the human language....
Question is a basic and important construct of natural language. Standard question plays vital role in generation of exact desired output in many natural language applications. This work is implemented to construct standard question from unstructured user question. Unstructuredness refers to an incorrect sequence of words of query string. Question...
News headline provides the gist of news article which helps reader to understand whole idea of news without reading it. In this paper, news headline is formed by using key terms and candidate phrases which are retrieved from input news article along with Natural Language Processing (NLP) techniques. Candidate phrases are extracted from input news a...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
During the few years, various algorithms have been developed to extract features from the high resolution satellite imagery. For classification of these extracted features several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. There are various sa...
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
The development of technology continues in producing both hardware and software, that are inexpensive and within reach, creating a space for the emergence of new applications. Swift growths in computer video and image processing applications have been marked in recent years. Here computerized identification of human objects in synchronized or recor...
Parallel computing is considered as one of the most appealing approach to speed up computation. Numerous problems involving complex computation can be fragmented into smaller problems which when executed in parallel saves overall processing time required. However writing code in parallel fashion adds additional burden on the developer side. In this...
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. This paper emphasizes on these parameters of parallelism and the problems of parallelization of mathematical com...
Human being interaction is normally done with the help of natural language i.e. words, sentences etc or with the help of sign language. Tactile Sign language bridges the gap even for the person who are hearing impaired and the person who can hear. Using a combination of symbols and hand movements, sign language is an effective method of communicati...
Question is a crucial construct of natural language. Systematic, error free question is a basic need of different applications of natural language. Many research works have been focused on 'statement' formation but the issue of 'systematic question' formation is less focused. This research work resolves above issue through systematization process u...
Usually long news article contains large amount of information. Many a times due to lack of time people are unable to read whole news article. Therefore, headline is required in order to get complete idea of news without reading whole news article. The extractive and abstractive approaches are conventionally used for news headline generation. In th...
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine, popular games developed by these engines and its foremost elements. It portrays a number of special kinds of co...