Urmila Shrawankar

Urmila Shrawankar
Rashtrasant Tukadoji Maharaj Nagpur University

PhD (Computer Science & Engineering)

About

209
Publications
66,662
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
561
Citations
Additional affiliations
September 2006 - present
Raisoni Group of Institutions
Position
  • Professor (Associate)
Education
July 2008 - February 2014
Sant Gadge Baba Amravati University
Field of study
  • Computer Science & Engineering
July 2004 - August 2006
Rashtrasant Tukadoji Maharaj Nagpur University
Field of study
  • Computer Science & Engineering

Publications

Publications (209)
Preprint
Full-text available
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
Preprint
Full-text available
SMS Lingo is a shortened language used for typing text messages in mobile phones. It is also known as Textese. SMS language is a parlance of English that sabotages letters and numbers to produce extreme brief words. Making the SMS files concise; helps in better utilization of storage space in mobile phones. In this paper, idea for optimized utiliza...
Preprint
Full-text available
During the few years, various algorithms have been developed to extract features from high-resolution satellite imagery. For the classification of these extracted features, several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. Various satellite s...
Article
Information charts are an indispensable component of documents. All charts aim to represent and visualize data, depicting a meaning about data or subject matter. However, charts are not accompanied by any contextual message type and are mostly not addressed in the textual description. Mostly, people with visual impairment rely on screen readers to...
Preprint
Full-text available
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
Preprint
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. These parameters of parallelism and the problems of parallelization of mathematical computations on parallel sys...
Preprint
Full-text available
Due to some unfavourable atmosphere in the underground coalmines, it is necessary to prohibit the entry of the workers in to the coalmines. The real-time monitoring system is useful for the primary safety measures. The recent advancements in wireless sensor network leads to advancements in wireless communications. The various sensors at the locatio...
Preprint
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
Preprint
Full-text available
Traditionally, adaptive filters have been deployed to achieve AEC by estimating the acoustic echo response using algorithms such as the Normalized Least-Mean-Square (NLMS) algorithm. Several approaches have been proposed over recent years to improve the performance of the standard NLMS algorithm in various ways for AEC. These include algorithms bas...
Preprint
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Preprint
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
Article
Real‐time systems are nowadays extensively used in most time‐critical embedded applications. The existing multiprocessor real‐time scheduling algorithms are based on partitioned and global scheduling approaches. The partitioned‐based algorithms suffer poor utilization bound, load balancing, not compatible for an open system environment, and the glo...
Article
Full-text available
Every child is unique and has some different qualities. Special children have their own strengths and weaknesses which defines their interests. Their development progresses are quite slow as compared to normal children. However, the parents should carefully observe if the children have difficulties in one or more developmental areas, notice their p...
Chapter
World today is facing the substantial public health risk in the form of COVID-19. The epidemic has spread in over 185 countries resulting in closure of above 90% of all educational institutions, which resulted in immediate updating to teaching–learning system and the whole world turn up to use online learning methods. Looking toward the health haza...
Chapter
Recent research in networking attacks shows that the distributed denial-of-service (DDoS) attack is increase by 19% in last year. The DDoS attack is performed by flooding packets from various distributed bots nodes to victim server from attacker. Detection of distributed denial-of-service attack is challenging tasks due to availability of high-comp...
Chapter
There has been increasing number of attacks in computer communication networks including IoT and cloud infrastructure in recent years. Finding out malicious attacks from unknown sources is biggest challenge in network intrusion detection system. Identifying normal network traffic from malicious traffic is also a complex task in IDS. Good IDS requir...
Chapter
Virtualization offers several benefits including reduction in hardware expenses, accessories, power consumption, security and resistance on the failure. Additionally, it improves the availability and simplicity in system management. It abstracts hardware and software resources and generates a virtual copy of the same. This paper presents the perfor...
Article
Real time tasks scheduling on a distributed system is a complex problem. The existing real time tasks scheduling techniques are primarily based on partitioned and global scheduling. In partitioned based scheduling the tasks are assigned on a dedicated processor. The advantages of partitioned based approach is existing uni-processor scheduling techn...
Article
Full-text available
Smart City plays a vital role in social development. Real time scheduling of different tangible and intangible resource in distributed environment in smart is challenging problem. The different disaster management tasks smart city applications such as floods, earthquake, pandemic, fire, disaster relief, and control of hazardous area, major accident...
Article
Full-text available
Production management is a complex problem. The problem becomes more complex in open, uncertain, dynamic environments and distributed productions. The existing static scheduling methods are not efficient to deal with this problem efficiently. This paper proposed multi-agent approach for real time scheduling in production management to efficiently m...
Article
Full-text available
Live migration helps to achieve resource consolidation and fault tolerance. It transfers VM storage together with VM memory and CPU status. During migration, a dirty page rate also delays the period of live migration, and it affects the performance of migration by increasing migration time, network bandwidth consumption, CPU processing overheads an...
Article
Full-text available
In recent years, with the mushrooming of internet-enabled mobile devices, there has been a corresponding increase in information and data being transmitted and received. This development has raised concerns about security and one of the crucial components associated with it: authentication. With a wide variety of services and communication being ex...
Article
Full-text available
The behavioral pattern of children with special needs depends on their emotional and developmental disability. Any abnormal and incorrect pattern of behavior which is below the level of development as the expected norm can be considered as “the challenging behavior.” For supporting children with behavioral problems, many interventions and strategie...
Article
Full-text available
This article focuses on the hazardous conditions prevailing in underground coal mines and the decision to prohibit entry, when conditions are adverse. Thus, the ongoing observation framework is helpful for ascertaining the conditions for working in underground coal mines and for essential safety and well-being measures. The advancements in WSN lead...
Article
Full-text available
Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Ene...
Article
Full-text available
Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-r...
Article
Full-text available
In this paper, hybrid BCI that merges Event Related Potentials (P300) and Steady State visual Evoked Potentials (SSVEP) simultaneously is proposed to enhance the performance of Four-choice command system. Here we integrate human facial structure in external visual stimulus to evoke stronger cortical responses in hybrid SSVEP+P300 BCI & compare it w...
Article
Full-text available
Non-stationarity of electroencephalogram (EEG) signals greatly affect classifier performance in brain-computer interface (BCI). To overcome this problem we propose an adaptive classifier model known as extended multi-class pooled mean linear discriminant analysis (EMPMLDA). Here, we update the average class pair co-variance matrix along with pooled...
Article
Full-text available
Everyone has different handwriting, and this is a difficulty since not everyone can discern the handwriting of different people. The described technique converts unstructured handwriting into a structured type. To resolve the problem, the authors want to separate every letter of the words so as to converting the alphabet into a commonplace type. Th...
Article
Full-text available
Working stress is becoming very common. Handling working stress at the workplace is really going to be challenging. As a result, most of the time most of the time people start behaving in sarcastic ways through verbal communication, through different gestures, using emoticons, or writing reviews or comments that leads to increasing their anxiety so...
Research
Full-text available
Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for delay tolerant networks,it is necess...
Chapter
Full-text available
Wireless Sensor Network (WSN) is an extremely important tool for closely monitoring, understanding and controlling application processes to the end users. The main purpose behind installing the wireless sensor network is to make real-time decisions based on data received from the sensor nodes. This data transmission from sensor nodes to the base st...
Book
Full-text available
Link : https://www.morebooks.de/store/gb/book/cloud-computing-policies,-outsourcing-and-computing-keys/isbn/978-613-9-89903-6
Article
Full-text available
Website plays an important role in digital marketing these days. It can also help you to increase your business's success. For making money from the website you should learn about the website visitors. The larger the number of visitors to the website is better for your business. So it is really important to learn about the visitors to analyze your...
Book
Full-text available
This book demonstrates the practical implementation of distributed systems by using the recent open source compilers and environments. Distributed systems are workstations that can communicate with each other and data processors, as well as different hierarchical architectural configurations of data processors that have differing data storage capab...
Article
Full-text available
The article elaborates difficulties faced during text identification from an image. The authors evaluated various algorithms in order to find the solutions. The aim of the research is to increase robustness with respect to different challenges. The system solves the problem of reading multiple texts embedded in an image as well as provides a meanin...
Article
Full-text available
Finger spelling in air helps user to operate a computer in order to make human interaction easier and faster than keyboard and touch screen. This article presents a real-time video based system which recognizes the English alphabets and words written in air using finger movements only. Optical Character Recognition (OCR) is used for recognition whi...
Article
Full-text available
With the coup era of assistive technology in computers has benefitted mankind in a favourable way by enabling automatic speech-conciliated communication. Although various assistive technology tools are available, still visually impaired are not independent to access computer systems completely as compared to sighted user using the traditional input...
Article
Full-text available
In the revolutionary era of advanced technologies, computers have benefited humankind in a favourable way by enabling automatic speech-conciliated communication. Even though various assistive tools are available, still visually impaired people are dependent for accessing computer using the traditional input devices, compared to sighted people. To t...
Article
Full-text available
The huge computations performed sequentially requires a lot of time for execution as on contrary to the concurrent implementation. Many problems are involved in the dense linear algebra operations the main focus for this work is for solving linear equations. The problem of solving linear equations when approached using parallel implementation will...
Article
Full-text available
Huge energy requirement of cloud data centers is prime concern. Dynamic Virtual Machine (VM) consolidation based on VM live migration to switched-off or put some of the under-loaded host Physical Machines (PMs) into a low power consumption mode can significantly save energy in data centers and achieve green cloud computing. Performance overheads im...
Article
Full-text available
Sign language is a way of communication for deaf & dumb. Different sign recognition techniques are there which are giving output in the form of word for recognized sign. The proposed method is focusing on interpretation of sign language in proper English sentence. Different NLP techniques are used in addition to sign recognition. Input is given as...
Article
Full-text available
A considerable amount of time is required to interpret whole news article to get the gist of it. Therefore, in order to reduce the reading and interpretation time, headlines are necessary. The available techniques for news headline construction mainly includes extractive and abstractive headline generation techniques. In this paper, context based n...
Article
Full-text available
Natural language is the way of communication for normal human beings which includes spoken language, written and body gestures i.e. head gesture, hand gestures, facial expressions and lip motion etc. On the other hand, speech and hearing-impaired people uses sign language for communication which is not understandable for normal people thus they fac...
Conference Paper
Full-text available
SMS means conversing with others in minimal words which lead to a new SMS lingo. This reduces efforts for typing complete message. Today's devices lack the regional language keypad. If they exist people are uncomfortable with the keypads. Thus regional language messages are written using English alphabets which causes chaos when SMS lingo is used....
Article
Full-text available
As the demand of real time computing increases day by day, there is a major paradigm shift in processing platform of real time system from single core to multi-core platform which provides advantages like higher throughput, linear power consumption, efficient utilization of processor cores and high performance per unit cost over the many single cor...
Conference Paper
Full-text available
Normal person cannot understand the conversation of deaf or dumb people. Deaf/dumb people defect in sentence formation and grammatical correction. Previously the sign language is converted to the text, but only in word format using image processing methods. Natural Language Processing (NLP) is a powerful tool for translation in the human language....
Conference Paper
Full-text available
Question is a basic and important construct of natural language. Standard question plays vital role in generation of exact desired output in many natural language applications. This work is implemented to construct standard question from unstructured user question. Unstructuredness refers to an incorrect sequence of words of query string. Question...
Conference Paper
Full-text available
News headline provides the gist of news article which helps reader to understand whole idea of news without reading it. In this paper, news headline is formed by using key terms and candidate phrases which are retrieved from input news article along with Natural Language Processing (NLP) techniques. Candidate phrases are extracted from input news a...
Conference Paper
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible High Performance Computing parallelization. These parameters if not managed to the root level, later surface as overheads during...
Conference Paper
Full-text available
During the few years, various algorithms have been developed to extract features from the high resolution satellite imagery. For classification of these extracted features several complex algorithms have been developed. But these algorithms do not possess critical refining stages of processing the data at the preliminary phase. There are various sa...
Conference Paper
Full-text available
Ad-hoc Networks uses multicast routing protocols which generally depend on creation of multicast tree for the transmission of packet from source to destination. It leads to maintain states of the neighboring node, makes it ineffective and incurs more cost. Maintaining the states of nodes also increases communication and processing overhead as well...
Conference Paper
Full-text available
The development of technology continues in producing both hardware and software, that are inexpensive and within reach, creating a space for the emergence of new applications. Swift growths in computer video and image processing applications have been marked in recent years. Here computerized identification of human objects in synchronized or recor...
Conference Paper
Full-text available
Parallel computing is considered as one of the most appealing approach to speed up computation. Numerous problems involving complex computation can be fragmented into smaller problems which when executed in parallel saves overall processing time required. However writing code in parallel fashion adds additional burden on the developer side. In this...
Conference Paper
Full-text available
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine and its foremost elements. It portrays a number of special kinds of contemporary game engines by way of their as...
Conference Paper
Full-text available
In multi-core systems, various factors like inter-process communication, dependency, resource sharing and scheduling, level of parallelism, synchronization, number of available cores etc. influence the extent of possible parallelization. This paper emphasizes on these parameters of parallelism and the problems of parallelization of mathematical com...
Conference Paper
Full-text available
Human being interaction is normally done with the help of natural language i.e. words, sentences etc or with the help of sign language. Tactile Sign language bridges the gap even for the person who are hearing impaired and the person who can hear. Using a combination of symbols and hand movements, sign language is an effective method of communicati...
Conference Paper
Full-text available
Question is a crucial construct of natural language. Systematic, error free question is a basic need of different applications of natural language. Many research works have been focused on 'statement' formation but the issue of 'systematic question' formation is less focused. This research work resolves above issue through systematization process u...
Conference Paper
Full-text available
Usually long news article contains large amount of information. Many a times due to lack of time people are unable to read whole news article. Therefore, headline is required in order to get complete idea of news without reading whole news article. The extractive and abstractive approaches are conventionally used for news headline generation. In th...
Conference Paper
Full-text available
Solving Linear equations with large number of variable contains many computations to be performed either iteratively or recursively. Thus it consumes more time when implemented in a sequential manner. There are many ways to solve the linear equations such as Gaussian elimination, Cholesky factorization, LU factorization, QR factorization. But even...
Article
Full-text available
Nowadays game engines are imperative for building 3D applications and games. This is for the reason that the engines appreciably reduce resources for employing obligatory but intricate utilities. This paper elucidates about a game engine, popular games developed by these engines and its foremost elements. It portrays a number of special kinds of co...