Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Urmila Shrawankar.
international conference on emerging trends in engineering and technology | 2009
Rahila Patel; Urmila Shrawankar; Mukesh M. Raghuwanshi
This paper proposes a new niching technique for Distributed genetic Algorithm (DGA). In DGA quick evolution takes place because of independent evolution of subpopulation. To improve performance of DGA care need to be taken for distribution of population in to subpopulations. A proper distribution leads to efficient GA and good solutions. The new technique uses the traditional histogram construction technique for subpopulation formation. Experiments show that the proposed algorithm, GAHisto (Genetic Algorithm with Histogram technique) when tested with unimodal and multimodal test function has given good results.
international conference on emerging trends in engineering and technology | 2009
Smita Narendra Pathak; Urmila Shrawankar
Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment Nevertheless, Currently, Inter-Vehicle Communication systems (IVC) as well as vehicle to infrastructure communication is an emerging class of wireless communication, attracting considerable attention from the research community and the automotive industry also enabling mobile users in their vehicles to communicate to the road and with the roadside infrastructure. In this paper we are focusing on infrastructure to vehicle commutation. So in this paper we are focusing on real time experimental design of infrastructure to vehicle communication. We outline how VANET will be a better option than GPS technology. We also try to discuss IP address passing using DHCP in the network and the security issues.
international conference on data science and engineering | 2012
Rupa Patel; Urmila Shrawankar; Vilas M. Thakare
In most security domain transmission of secret and confidential voice data requires that the identity of the speaker should not get revealed but at the same time data contents in speech signal should be interpreted. Speech and speaker normalization techniques help to solve this issue. This paper proposes speaker normalization technique that attempts to alter the characteristics of speakers voice so that it would be difficult for an eavesdropper to identify the speaker. Intended listener can retrieve the particular information. Evaluations of subjective and objective tests confirm the effectiveness of the proposed method and because of this method security enhances.
international conference on computing communication and networking technologies | 2012
Rupa Patel; Urmila Shrawankar; Vilas M. Thakare
The recent advances in information technology have simplified voice data transmission but brings with it major security threats. Voice data transmission not only conveys confidential information but also convey information about the speaker. Most of the security domain complements secrecy about speaker identity. This paper presents a method that deals with the subject of hiding speaker identity. Alteration of acoustic features mainly pitch, and energy of speakers voice is necessary for making it difficult for adversary to infer about the speaker. Speaker normalization approach is used to accomplish this. An evaluation of subjective and objective tests confirms that the normalized signal allows speech waveform to sound intelligible without revealing information about the speaker. This technique can be used in medical, in military and in those domains in which maintaining secrecy about the speaker is a major security concern.
international conference on computing communication and networking technologies | 2012
Priti Saktel; Urmila Shrawankar
Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.
international conference on emerging trends in engineering and technology | 2013
Urmila Shrawankar; Ashwini Meshram; Reetu Gupta; Jashweeni Nandanwar
Achieving deadline in real time environment is a real practical difficulty. Real time scheduling algorithms consume more time in making scheduling decisions which leads to increase in deadline misses. The problem is further complicated in virtual environment. This motivates the idea for designing an efficient algorithm for future prediction of block access requests in virtual environment. Disk block access requests made by real time applications in virtualized environment are analyzed. Future disk access request are predicted by non-work conserving disk scheduling algorithm in offline mode. These pre-fetched disk blocks are moved to buffer cache. Pattern based detection technique is applied for predicting the future access of buffer cache blocks. Executing processes access large amount of data and require disk accesses. In real time virtualized environment the requesting processes are scheduled using an adaptive real time scheduling algorithm which reduces the deadline misses. Thus, due to non-work conserving algorithm seek time is reduced. Pattern based technique improves the hit ratio and reduces I/O time. An adaptive real time scheduling algorithm helps to schedule the processes for achieving their deadlines. Thus the performance of applications is enhanced in virtual environment and therefore non-work conserving pattern based adaptive real time scheduling algorithm is found very useful for hard real time applications.
international conference on emerging trends in engineering and technology | 2012
Rupa Patel; Urmila Shrawankar
This paper addresses two security challenges faced by many while transmitting confidential voice message. First, how to protect confidential message content against unauthorized access and second, how to protect information about the speakers personality. Presented work provides solution to these issues using hybrid approach. The former issue is handled by speech watermarking while speaker normalization deals with latter. The method initially normalizes speech signal containing secret information by modifying the speaker voice acoustic characteristics which is further processed to incorporate additional security measure and then it is embedded in high frequency components of the host signal using the human auditory system (HAS) properties and concept of blind, invisible watermarking approach. Reverse practice is followed to get the intended confidential message. This scheme has been evaluated and results of test shows that the approach does not degrade the quality of host signal and ensures reasonably excellent security. Technique can be used in any domain where secure transmission of the information is important.
ieee international conference on advances in engineering science and management | 2012
Priti Saktel; Urmila Shrawankar
Archive | 2012
Reetu Gupta; Urmila Shrawankar
arXiv: Networking and Internet Architecture | 2013
Sumedha R. Chokhandre; Urmila Shrawankar