Instant Download Advanced Computing and Systems for Security Volume 14 Lecture Notes in Networks and Systems 242 1st Edition Rituparna Chaki (Editor) PDF All Chapters
Instant Download Advanced Computing and Systems for Security Volume 14 Lecture Notes in Networks and Systems 242 1st Edition Rituparna Chaki (Editor) PDF All Chapters
com
https://ebookmeta.com/product/advanced-computing-and-
systems-for-security-volume-14-lecture-notes-in-networks-
and-systems-242-1st-edition-rituparna-chaki-editor/
OR CLICK BUTTON
DOWNLOAD NOW
https://ebookmeta.com/product/advanced-computing-and-systems-for-
security-volume-13-1st-edition-rituparna-chaki/
ebookmeta.com
https://ebookmeta.com/product/assessment-of-advanced-solid-state-
lighting-1st-edition-national-research-council/
ebookmeta.com
Economics, 14th Global Edition Michael Parkin
https://ebookmeta.com/product/economics-14th-global-edition-michael-
parkin/
ebookmeta.com
https://ebookmeta.com/product/ise-introduction-to-managerial-
accounting-9e-9th-edition-eric-w-noreen/
ebookmeta.com
https://ebookmeta.com/product/fixer-upper-heart-of-a-wounded-hero-1st-
edition-cassie-mint-2/
ebookmeta.com
https://ebookmeta.com/product/97-things-every-ux-practitioner-should-
know-collective-wisdom-from-the-experts-1st-edition-daniel-berlin/
ebookmeta.com
https://ebookmeta.com/product/empowerment-series-becoming-an-
effective-policy-advocate-8th-edition-bruce-s-jansson/
ebookmeta.com
African Special Economic Zones: Lessons and Investments
from China 1st Edition Bryan Robinson
https://ebookmeta.com/product/african-special-economic-zones-lessons-
and-investments-from-china-1st-edition-bryan-robinson/
ebookmeta.com
Lecture Notes in Networks and Systems 242
Rituparna Chaki
Nabendu Chaki
Agostino Cortesi
Khalid Saeed Editors
Advanced
Computing
and Systems
for Security:
Volume 14
Lecture Notes in Networks and Systems
Volume 242
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering, University of
Alberta, Alberta, Canada; Systems Research Institute, Polish Academy of
Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
Advanced Computing
and Systems for Security:
Volume 14
Editors
Rituparna Chaki Nabendu Chaki
University of Calcutta Department of Computer Science
Kolkata, India and Engineering
University of Calcutta
Agostino Cortesi Kolkata, West Bengal, India
Ca Foscari University
Venice, Italy Khalid Saeed
Bialystok University of Technology
Bialystok, Poland
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
This book collects the deeply revised version of papers accepted for oral presentation
at the Eighth International Doctoral Symposium on Applied Computation and Secu-
rity Systems (ACSS 2021). ACSS 2021 took place in Kolkata, India, on April 9–
10, 2021. The Doctoral Symposium was organized by the University of Calcutta in
collaboration with Ca Foscari University of Venice, Italy, and Bialystok University
of Technology, Poland.
This unique symposium is aimed specially to facilitate budding researchers in
pursuing their doctoral degree. Each contributed paper was required to have at least
one enrolled Ph.D. student as one of the authors. This has given an opportunity
to each Ph.D. student to express their innovative ideas and to discuss them with a
qualified scientific community of peers.
Over the years, the overall quality of the papers submitted to ACSS has been
improving dramatically, and their subjects reflect and somehow anticipate the
emerging research trends in the area of applied computation and security. In the
call for papers, the following topics of interest related to Applied Computation have
been listed: Security Systems, Software Engineering, Internet of Things, Artificial
Intelligence, Data Science, Computer Vision, and Algorithms.
The editors are greatly indebted to the members of the international program
committee for sharing their expertise and completing their careful review of the
papers in due time. Their reviews have allowed the authors not only to improve their
articles but also to get new hints toward the completion of their Ph.D. thesis.
The dissemination initiatives from Springer have drawn a large number of high-
quality submissions from scholars primarily but not exclusively from India. ACSS
used a double-blind review process and each paper received at least three reviews
either from the PC members or by external reviewers. The reviewers mainly consid-
ered the technical quality and the originality of each paper. As ACSS is a doctoral
symposium, special emphasis was given to assess the clarity of presentation. The
entire process of paper submission, review, and acceptance process was done online.
After carefully considering the reviews, the Program Committee selected only 27
papers for publication out of 45 submissions.
v
vi Preface
Security
Parallel Simulation of Cyber-Physical-Systems . . . . . . . . . . . . . . . . . . . . . . . 3
Kamal Das, Amit Gurung, and Rajarshi Ray
Attack Detection Scheme Using Deep Learning Approach for IoT . . . . . . 17
Vikash Kumar, Sidra Kalam, Ayan Kumar Das, and Ditipriya Sinha
An Efficient Authentication Scheme for Mobile Online Social
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Munmun Bhattacharya, Sandip Roy, and Samiran Chattopadhyay
GAN-Based Data Generation Approach for IDS: Evaluation
on Decision Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Sudhir Kumar Pandey, Vikash Kumar, Ditipriya Sinha, and Ayan Kumar Das
Software Engineering
Conceptualizing Re-configurable Business Process:
A Context-Driven Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Priyanka Chakraborty and Anirban Sarkar
Dcube N N : Tool for Dynamic Design Discovery from Multi-threaded
Applications Using Neural Sequence Models . . . . . . . . . . . . . . . . . . . . . . . . . 75
Srijoni Majumdar, Nachiketa Chatterjee, Partha Pratim Das,
and Amlan Chakrabarti
Construction of Materialized Views in Non-Binary Data Space . . . . . . . . 93
Santanu Roy, Bibekananda Shit, Soumya Sen, and Agostino Cortesi
Dynamic Prioritization of Software Requirements for Incremental
Software Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki,
and Nabendu Chaki
vii
viii Contents
Systems Biology
A Framework for Translation and Validation of Digital
Microfluidic Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Pushpita Roy, Ansuman Banerjee, and Bhargab B. Bhattacharya
Disease-Relevant Gene Selection Using Mean Shift Clustering . . . . . . . . . 151
Srirupa Dasgupta, Sharmistha Bhattacharya, Abhinandan Khan,
Anindya Halder, Goutam Saha, and Rajat Kumar Pal
Multiple Fault Identification and Diagnosis in Cross-Referencing
Digital Microfluidic Biochips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Sagarika Chowdhury, Kazi Amrin Kabir, Debasis Dhal,
Rajat Kumar Pal, and Goutam Saha
Brain Tumor Detection: A Comparative Study Among Fast Object
Detection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Sunita Roy, Sanchari Sen, Ranjan Mehera, Rajat Kumar Pal,
and Samir Kumar Bandyopadhyay
MicroRNA-Based Cancer Classification Using Feature Selection
Wrapper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Shib Sankar Bhowmick and Debotosh Bhattacharjee
Editors and Contributors
ix
x Editors and Contributors
Contributors
Rajat Kumar Pal University of Calcutta, Acharya Prafulla Chandra Roy Shiksha
Prangan, Saltlake, Kolkata, India
Srijoni Majumdar Indian Institute of Technology, Kharagpur, West Bengal, India
Ranjan Mehera Business & Solution Consulting, Subex, Inc., Broomfield, CO,
USA
Rajat Kumar Pal Department of Computer Science and Engineering, University
of Calcutta, Kolkata, West Bengal, India
Sudhir Kumar Pandey Lok Nayak Jai Prakash Institute of Technology, Chapra,
Saran, Bihar, India
Partha Pratim Das Indian Institute of Technology, Kharagpur, West Bengal, India
Rajarshi Ray Indian Association for the Cultivation of Science, Kolkata, West
Bengal, India
Mandira Roy University of Calcutta, Kolkata, India
Pushpita Roy Indian Statistical Institute, Kolkata, India;
Calcutta University, Kolkata, India
Sandip Roy Department of Computer Science and Engineering, Asansol Engi-
neering College, Asansol, WB, India
Santanu Roy Future Institute of Engineering and Management, Kolkata, India
Sunita Roy Department of Computer Science and Engineering, University of
Calcutta, Kolkata, West Bengal, India
Goutam Saha Department of Information Technology, North-Eastern Hill Univer-
sity, Umshing Mawkynroh, Shillong, Meghalaya, India
Anirban Sarkar Department of Computer Science and Engineering, National
Institute of Technology, Durgapur, West Bengal, India
Sanchari Sen Department of Computer Science and Engineering, University of
Calcutta, Kolkata, West Bengal, India
Soumya Sen University of Calcutta, Kolkata, India
Bibekananda Shit Future Institute of Engineering and Management, Kolkata, India
Ditipriya Sinha National Institute of Technology Patna, Patna, Bihar, India
Security
Parallel Simulation of
Cyber-Physical-Systems
K. Das (B)
National Institute of Technology Meghalaya, Shillong, Meghalaya, India
e-mail: [email protected]
A. Gurung
Martin Luther Christian University, Shillong, Meghalaya, India
R. Ray
Indian Association for the Cultivation of Science, Kolkata, West Bengal, India
e-mail: [email protected]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 3
R. Chaki et al. (eds.), Advanced Computing and Systems for Security: Volume 14,
Lecture Notes in Networks and Systems 242,
https://doi.org/10.1007/978-981-16-4294-4_1
Other documents randomly have
different content
più che si poteva, a distruggere forse, l’efficacia di quella stessa
scuola, di cui i docenti erano i ministri e i sacerdoti.
Ma se a questo si fosse limitato, il loro metodo avrebbe potuto
costituire un male rispetto alle finalità della scuola, in cui
insegnavano, ma in fondo, entro modestissimi confini, esso avrebbe
pure potuto dar vita ad altre forme d’insegnamento e di educazione
spirituale. Ma tutto ciò non facevano, nè potevano fare, che i migliori;
i più dovevano vuotare la scuola classica di tutto il suo spirito, senza
nulla collocare al suo posto; dovevano farla degenerare, come più
tardi degenerò, in un esercizio, in una meccanicità, non si sa bene,
se più risibile, o più colpevole. Sarà questo infatti il carattere
generale dell’insegnamento classico in tutte le scuole cristiane,
specie in quelle rette da religiosi; di qui avrà origine l’idea delle
edizioni espurgate degli autori antichi [614], e Giuliano era
perfettamente nel vero, quando voleva fin da principio impedire il
consolidarsi di una tale deformità didattica.
L’insegnamento, dunque, che egli condannava, subiva la sorte
meritata, non in quanto era impartito da una certa categoria di
persone, più che da una altra; non in quanto contraddiceva alle
idealità della società pagana, ma in quanto esso contraddiceva agli
elementi oggettivi fornitigli dalla scuola, in cui s’impartiva, in quanto
repugnava agli istrumenti, di cui si serviva, in quanto — peggio
ancora — si tramutava nella negazione di se stesso. E la condanna
di Giuliano, quali che ne fossero stati i primi eccitamenti personali,
conteneva in sè un alto valore didattico ed educativo, come la
tendenza, a cui le volute riforme rispondevano, era la sola capace di
restituire alla scuola la virtù del docente, la sua efficacia, quale
plasmatore di anime e di intelligenze, tutto ciò, infine, per cui la
parola e il concetto di scuola han valore. Richiamando e grammatici
e retori alla coerenza con se stessi, Giuliano restaurava l’uomo nel
docente, e in quel suo richiamo era tanto di verità quanto
difficilmente si sarebbe potuto trovare in una concezione opposta,
magari liberata dagli errori, di cui l’imperatore avea potuto macolare
la propria.
Non basta! Quest’idea centrale, profondamente sana,
dell’illustrazione, che Giuliano premette al dispositivo del suo editto,
non induce Giuliano, come si è pensato, al divieto assoluto
dell’insegnamento ai Cristiani; lo fa invece concludere con la
imposizione che esso sia da loro tentato con mezzi e con ispirito
proprio. «Se [i maestri] pensano che furono sapienti gli autori,
ch’essi ora illustrano, e di cui quasi seggono interpreti, li imitino anzi
tutto nella pietà verso gli Dei. Ma, se invece pensano che quelli
abbiano errato circa le Divinità, che dovrebbero essere più sacre,
vadano nelle chiese dei Galilei e interpretino Matteo e Luca, i quali
impongono, e Voi, maestri cristiani, ne ripetete il precetto, che si
debba astenersi dalle cerimonie pagane.» E quanto ai giovani
scolari, essi sono, nell’editto, dichiarati esplicitamente liberi di
frequentare le scuole dei Cristiani o pure quelle dei grammatici e dei
sofisti pagani, «chè non è ragionevole — continua l’editto —
chiudere la via migliore a fanciulli, ancora ignari dell’indirizzo da
scegliere, o condurli per timore nolenti alle patrie consuetudini»;
«occorre, infatti, istruire, non punire, coloro che riteniamo in errore».
Dell’esigenza di una conformità tra le opinioni dei maestri e lo spirito
pubblico non v’è dunque alcuna traccia; e così l’accusa, rivolta a
Giuliano, di avere, con la sua legge e col suo editto, offeso la libertà
dell’insegnamento, e di avere formulato l’una e l’altro solo allo scopo
di apparecchiare la cieca e partigiana esclusione dei Cristiani dalle
scuole, può dirsi tranquillamente, e in modo assoluto, infondata e
suggerita o da partigianeria, o da esagerato ossequio alla tradizione,
o da incompiuto esame dei fatti. [615]
Ma, se la libertà d’insegnamento non riceve nessuna violenza, è
forse l’editto ispirato a una determinata teorica, concernente il diritto
dello Stato d’imporre le proprie dottrine morali, e di escludere le
altre, come taluno dei migliori fra i critici moderni ha pensato? [616]
Neanche questo. Giuliano non faceva una questione di privilegio per
le dottrine dello Stato, ma una questione sostanzialmente
pedagogica, quali che ne fossero state le ispirazioni politiche e
morali, che ve lo avevano determinato, quali le ripercussioni, sociali
e politiche, che potevano attendersene. O, se esercizio di
prerogative dello Stato è nel suo editto a riconoscere, si tratta di ben
altra cosa, non sufficientemente constatata; si tratta di una più intima
ingerenza del potere centrale nelle faccende relative all’istruzione
pubblica. Ma, per questo rispetto, l’imperatore nulla innovava;
continuava bensì la politica, ormai da circa un secolo e mezzo
inaugurata dai predecessori, politica che, incensurati o lodati, i suoi
successori cristiani spingeranno a più estreme conseguenze [617], e
che, in ogni modo, a torto o a ragione, è, dal progresso della civiltà,
riconosciuta ovunque legittima.
Tutto questo non intesero gli scettici del tempo, anche se pagani;
questo non volle intendere, o non intese, la maggior parte dei
Cristiani, vuoi perchè le leggi emanate dai principi, debbono sempre,
a ragione od a torto, combattersi dai loro avversarii, vuoi perchè la
società cristiana si trovava allora già avviata in una pericolosa china
di adattamento con la massa, o pagana o incredula, dei
contemporanei, adattamento, da cui non ebbe mai più la possibilità
di ritrarsi. Questo invece — l’abbiamo visto — intesero i pochi
Cristiani intransigenti superstiti [618]. Nella loro ignoranza, essi forse
non ricordavano che il problema dell’educazione, anzi il problema
della incompatibilità dell’insegnamento pagano con la fede cristiana,
era stato già dibattuto fin dalle origini del Cristianesimo, e che allora
appunto i Cristiani l’avevano risolto come ora lo risolveva Giuliano.
Ma la fede viva e pura fece loro intravedere ugualmente la
occasione propizia di una rottura completa con le vecchie ideologie,
e la continuazione, nella scuola, di una propaganda spirituale, che
avrebbe ricollocato il mondo su nuove basi morali. Ed essi soltanto
resero giustizia all’Apostata. [619]
Ma i critici antichi e recenti di Giuliano sono in certo modo
giustificabili pel fatto che neanche l’imperatore intese tutta la portata
del principio, da cui moveva, o, se la intese, non l’applicò in tutta la
sua pienezza e in tutte le sue conseguenze.
Nell’editto, invero, il consenso intimo, che si richiede tra docenti e
insegnamento, si limita solo alla fede dei primi e alle opinioni
teologiche degli autori, strumenti del loro ministero. E mentre la
scuola deve, non già infondere delle nozioni teologiche, ma
determinare, in chi apprende, uno stato morale nei rispetti della vita,
che ogni giorno si vive; mentre il difetto, constatato dall’imperatore
— l’assenza dell’uomo nel maestro — inquinava la educazione del
tempo, che s’era andata vuotando di qualsiasi contenuto spirituale e
— peggio ancora — sterilmente meccanizzando, le perturbatrici
prevenzioni religiose arrestarono e limitarono i provvedimenti di
Giuliano a qualcosa, che parve, e in minima parte potè essere,
rappresaglia religiosa e politica. Ciò che l’avrebbe —
irrimediabilmente — perduto nel giudizio dei futuri.
VI.
I.
II.
III.