Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Urmila Shrawankar is active.

Publication


Featured researches published by Urmila Shrawankar.


international conference on emerging trends in engineering and technology | 2009

Genetic Algorithm with Histogram Construction Technique

Rahila Patel; Urmila Shrawankar; Mukesh M. Raghuwanshi

This paper proposes a new niching technique for Distributed genetic Algorithm (DGA). In DGA quick evolution takes place because of independent evolution of subpopulation. To improve performance of DGA care need to be taken for distribution of population in to subpopulations. A proper distribution leads to efficient GA and good solutions. The new technique uses the traditional histogram construction technique for subpopulation formation. Experiments show that the proposed algorithm, GAHisto (Genetic Algorithm with Histogram technique) when tested with unimodal and multimodal test function has given good results.


international conference on emerging trends in engineering and technology | 2009

Secured Communication in Real Time VANET

Smita Narendra Pathak; Urmila Shrawankar

Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment Nevertheless, Currently, Inter-Vehicle Communication systems (IVC) as well as vehicle to infrastructure communication is an emerging class of wireless communication, attracting considerable attention from the research community and the automotive industry also enabling mobile users in their vehicles to communicate to the road and with the roadside infrastructure. In this paper we are focusing on infrastructure to vehicle commutation. So in this paper we are focusing on real time experimental design of infrastructure to vehicle communication. We outline how VANET will be a better option than GPS technology. We also try to discuss IP address passing using DHCP in the network and the security issues.


international conference on data science and engineering | 2012

Normalization techniques for hiding speakers identity

Rupa Patel; Urmila Shrawankar; Vilas M. Thakare

In most security domain transmission of secret and confidential voice data requires that the identity of the speaker should not get revealed but at the same time data contents in speech signal should be interpreted. Speech and speaker normalization techniques help to solve this issue. This paper proposes speaker normalization technique that attempts to alter the characteristics of speakers voice so that it would be difficult for an eavesdropper to identify the speaker. Intended listener can retrieve the particular information. Evaluations of subjective and objective tests confirm the effectiveness of the proposed method and because of this method security enhances.


international conference on computing communication and networking technologies | 2012

Hiding speaker characteristics for security

Rupa Patel; Urmila Shrawankar; Vilas M. Thakare

The recent advances in information technology have simplified voice data transmission but brings with it major security threats. Voice data transmission not only conveys confidential information but also convey information about the speaker. Most of the security domain complements secrecy about speaker identity. This paper presents a method that deals with the subject of hiding speaker identity. Alteration of acoustic features mainly pitch, and energy of speakers voice is necessary for making it difficult for adversary to infer about the speaker. Speaker normalization approach is used to accomplish this. An evaluation of subjective and objective tests confirms that the normalized signal allows speech waveform to sound intelligible without revealing information about the speaker. This technique can be used in medical, in military and in those domains in which maintaining secrecy about the speaker is a major security concern.


international conference on computing communication and networking technologies | 2012

Context based domain identification for resolving ambiguity

Priti Saktel; Urmila Shrawankar

Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.


international conference on emerging trends in engineering and technology | 2013

Pattern Based Real Time Disk Scheduling Algorithm for Virtualized Environment

Urmila Shrawankar; Ashwini Meshram; Reetu Gupta; Jashweeni Nandanwar

Achieving deadline in real time environment is a real practical difficulty. Real time scheduling algorithms consume more time in making scheduling decisions which leads to increase in deadline misses. The problem is further complicated in virtual environment. This motivates the idea for designing an efficient algorithm for future prediction of block access requests in virtual environment. Disk block access requests made by real time applications in virtualized environment are analyzed. Future disk access request are predicted by non-work conserving disk scheduling algorithm in offline mode. These pre-fetched disk blocks are moved to buffer cache. Pattern based detection technique is applied for predicting the future access of buffer cache blocks. Executing processes access large amount of data and require disk accesses. In real time virtualized environment the requesting processes are scheduled using an adaptive real time scheduling algorithm which reduces the deadline misses. Thus, due to non-work conserving algorithm seek time is reduced. Pattern based technique improves the hit ratio and reduces I/O time. An adaptive real time scheduling algorithm helps to schedule the processes for achieving their deadlines. Thus the performance of applications is enhanced in virtual environment and therefore non-work conserving pattern based adaptive real time scheduling algorithm is found very useful for hard real time applications.


international conference on emerging trends in engineering and technology | 2012

Two Level Security Implementation for Voice Data Transmission

Rupa Patel; Urmila Shrawankar

This paper addresses two security challenges faced by many while transmitting confidential voice message. First, how to protect confidential message content against unauthorized access and second, how to protect information about the speakers personality. Presented work provides solution to these issues using hybrid approach. The former issue is handled by speech watermarking while speaker normalization deals with latter. The method initially normalizes speech signal containing secret information by modifying the speaker voice acoustic characteristics which is further processed to incorporate additional security measure and then it is embedded in high frequency components of the host signal using the human auditory system (HAS) properties and concept of blind, invisible watermarking approach. Reverse practice is followed to get the intended confidential message. This scheme has been evaluated and results of test shows that the approach does not degrade the quality of host signal and ensures reasonably excellent security. Technique can be used in any domain where secure transmission of the information is important.


ieee international conference on advances in engineering science and management | 2012

Context based Meaning Extraction for HCI using WSD algorithm: A review

Priti Saktel; Urmila Shrawankar


Archive | 2012

Managing Buffer Cache by Block Access Pattern

Reetu Gupta; Urmila Shrawankar


arXiv: Networking and Internet Architecture | 2013

An Algorithm to Improve Performance over Multihop Wireless Mesh Network

Sumedha R. Chokhandre; Urmila Shrawankar

Collaboration


Dive into the Urmila Shrawankar's collaboration.

Top Co-Authors

Avatar

Mukesh M. Raghuwanshi

Rajiv Gandhi College of Engineering

View shared research outputs
Top Co-Authors

Avatar

Vilas M. Thakare

Sant Gadge Baba Amravati University

View shared research outputs
Researchain Logo
Decentralizing Knowledge