0% found this document useful (0 votes)
16 views60 pages

70227148

The document provides information about various eBooks available for download, including proceedings from the International Conference on Innovative Computing and Communications (ICICC) for the years 2020 and 2021. It lists multiple volumes edited by notable scholars and covers a wide range of topics in intelligent systems and computing. Additionally, it includes details about the conference's organizing committee and editorial team, emphasizing the rapid dissemination of research results in the field.

Uploaded by

cecatiwiorek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views60 pages

70227148

The document provides information about various eBooks available for download, including proceedings from the International Conference on Innovative Computing and Communications (ICICC) for the years 2020 and 2021. It lists multiple volumes edited by notable scholars and covers a wide range of topics in intelligent systems and computing. Additionally, it includes details about the conference's organizing committee and editorial team, emphasizing the rapid dissemination of research results in the field.

Uploaded by

cecatiwiorek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Download the Full Ebook and Access More Features - ebooknice.

com

(Ebook) International Conference on Innovative


Computing and Communications: Proceedings of ICICC
2021, Volume 1 (Advances in Intelligent Systems
and Computing, 1387) by Ashish Khanna (editor),
Deepak Gupta (editor), Siddhartha Bhattacharyya
https://ebooknice.com/product/international-conference-on-
(editor), Aboul Ella Hassanien (editor), Sameer
innovative-computing-and-communications-proceedings-of-
Anand (editor), Ajay Jaiswal (editor) ISBN
icicc-2021-volume-1-advances-in-intelligent-systems-and-
9789811625930, 981162593X
computing-1387-35113574

OR CLICK HERE

DOWLOAD EBOOK

Download more ebook instantly today at https://ebooknice.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Start reading on any device today!

(Ebook) International Conference on Innovative Computing


and Communications: Proceedings of ICICC 2021, Volume 3 by
Ashish Khanna, Deepak Gupta, Siddhartha Bhattacharyya,
Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal ISBN
https://ebooknice.com/product/international-conference-on-innovative-
9789811630705, 9811630704
computing-and-communications-proceedings-of-
icicc-2021-volume-3-34408484
ebooknice.com

(Ebook) International Conference on Innovative Computing


and Communications: Proceedings of ICICC 2020, Volume 1 by
Deepak Gupta, Ashish Khanna, Siddhartha Bhattacharyya,
Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal ISBN
https://ebooknice.com/product/international-conference-on-innovative-
9789811551123, 9789811551130, 981155112X, 9811551138
computing-and-communications-proceedings-of-
icicc-2020-volume-1-22477902
ebooknice.com

(Ebook) International Conference on Innovative Computing


and Communications: Proceedings of ICICC 2020, Volume 2 by
Deepak Gupta, Ashish Khanna, Siddhartha Bhattacharyya,
Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal ISBN
https://ebooknice.com/product/international-conference-on-innovative-
9789811551475, 9789811551482, 9811551472, 9811551480
computing-and-communications-proceedings-of-
icicc-2020-volume-2-22476152
ebooknice.com

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason;


Viles, James ISBN 9781459699816, 9781743365571,
9781925268492, 1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

ebooknice.com
(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena
Alfredsson, Hans Heikne, Sanna Bodemyr ISBN 9789127456600,
9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312

ebooknice.com

(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT


II Success) by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018

ebooknice.com

(Ebook) Vagabond, Vol. 29 (29) by Inoue, Takehiko ISBN


9781421531489, 1421531488

https://ebooknice.com/product/vagabond-vol-29-29-37511002

ebooknice.com

(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master


the SAT Subject Test: Math Levels 1 & 2) by Arco ISBN
9780768923049, 0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-
arco-master-the-sat-subject-test-math-levels-1-2-2326094

ebooknice.com

(Ebook) Cambridge IGCSE and O Level History Workbook 2C -


Depth Study: the United States, 1919-41 2nd Edition by
Benjamin Harrison ISBN 9781398375147, 9781398375048,
1398375144, 1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044

ebooknice.com
Advances in Intelligent Systems and Computing 1387

Ashish Khanna · Deepak Gupta ·


Siddhartha Bhattacharyya ·
Aboul Ella Hassanien · Sameer Anand ·
Ajay Jaiswal Editors

International
Conference
on Innovative
Computing and
Communications
Proceedings of ICICC 2021, Volume 1
Advances in Intelligent Systems and Computing

Volume 1387

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by DBLP, INSPEC, WTI Frankfurt eG, zbMATH, Japanese Science and
Technology Agency (JST).
All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/11156


Ashish Khanna · Deepak Gupta ·
Siddhartha Bhattacharyya · Aboul Ella Hassanien ·
Sameer Anand · Ajay Jaiswal
Editors

International Conference
on Innovative Computing
and Communications
Proceedings of ICICC 2021, Volume 1
Editors
Ashish Khanna Deepak Gupta
Maharaja Agrasen Institute of Technology Department of Computer Science
Rohini, Delhi, India and Engineering
Maharaja Agrasen Institute of Technology
Siddhartha Bhattacharyya Rohini, Delhi, India
Department of Computer Science
and Engineering Aboul Ella Hassanien
CHRIST (Deemed to be University) Faculty of Computers and Information
Bangalore, Karnataka, India Cairo University
Giza, Egypt
Sameer Anand
Department of Computer Science Ajay Jaiswal
Shaheed Sukhdev College of Business Department of Computer Science
Studies Shaheed Sukhdev College of Business
Rohini, Delhi, India Studies
Rohini, Delhi, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-16-2593-0 ISBN 978-981-16-2594-7 (eBook)
https://doi.org/10.1007/978-981-16-2594-7

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Dr. Ashish Khanna would like to dedicate this
book to his mentors Dr. A. K. Singh and
Dr. Abhishek Swaroop for their constant
encouragement and guidance and his family
members including his mother, wife, and kids.
He would also like to dedicate this work to
his (Late) father Sh. R. C. Khanna with
folded hands for his constant blessings.
Dr. Deepak Gupta would like to dedicate this
book to his father Sh. R. K. Gupta, his mother
Smt. Geeta Gupta for their constant
encouragement, his family members
including his wife, brothers, sisters, kids, and
to my students close to my heart.
Prof. (Dr.) Siddhartha Bhattacharyya would
like to dedicate this book to Late Kalipada
Mukherjee and Late Kamol Prova Mukherjee.
Prof. (Dr.) Aboul Ella Hassanien would like
to dedicate this book to his wife Nazaha
Hassan.
Dr. Sameer Anand would like to dedicate this
book to his Dada Prof. D. C. Choudhary, his
beloved wife Shivanee, and his son Shashwat.
Dr. Ajay Jaiswal would like to dedicate this
book to his father Late Prof. U. C. Jaiswal,
his mother Brajesh Jaiswal, his beloved wife
Anjali, his daughter Prachii, and his
son Sakshaum.
ICICC-2021 Steering Committee Members

Patrons:

Dr. Poonam Verma, Principal, SSCBS, University of Delhi


Prof. Dr. Pradip Kumar Jain, Director, National Institute of Technology Patna, India

General Chairs:

Prof. Dr. Siddhartha Bhattacharyya, Christ University, Bangalore


Prof. Valentina Emilia Balas, Aurel Vlaicu University of Arad, Romania
Dr. Prabhat Kumar, National Institute of Technology Patna, India

Honorary Chairs:

Prof. Dr. Janusz Kacprzyk, FIEEE, Polish Academy of Sciences, Poland


Prof. Dr. Vaclav Snasel, Rector, VSB-Technical University of Ostrava, Czech
Republic

Conference Chairs:

Prof. Dr. Aboul Ella Hassanien, Cairo University, Egypt


Prof. Dr. Joel J. P. C. Rodrigues, National Institute of Telecommunications (Inatel),
Brazil
Prof. Dr. R. K. Agrawal, Jawaharlal Nehru University, Delhi

vii
viii ICICC-2021 Steering Committee Members

Technical Program Chairs:

Prof. Dr. Victor Hugo C. de Albuquerque, Universidade de Fortaleza, Brazil


Prof. Dr. A. K. Singh, National Institute of Technology, Kurukshetra
Prof. Dr. Anil K. Ahlawat, KIET Group of Institutes, Ghaziabad

Editorial Chairs:

Prof. Dr. Abhishek Swaroop, Bhagwan Parshuram Institute of Technology, Delhi


Dr. Arun Sharma, Indira Gandhi Delhi Technical University for Women, Delhi
Prerna Sharma, Maharaja Agrasen Institute of Technology (GGSIPU), New Delhi

Conveners:

Dr. Ajay Jaiswal, SSCBS, University of Delhi


Dr. Sameer Anand, SSCBS, University of Delhi
Dr. Ashish Khanna, Maharaja Agrasen Institute of Technology (GGSIPU), New
Delhi
Dr. Deepak Gupta, Maharaja Agrasen Institute of Technology (GGSIPU), New Delhi
Dr. Gulshan Shrivastava, National Institute of Technology Patna, India

Publication Chairs:

Prof. Dr. Neeraj Kumar, Thapar Institute of Engineering and Technology


Dr. Hari Mohan Pandey, Edge Hill University, UK
Dr. Sahil Garg, École de technologie supérieure, Université du Québec, Montreal,
Canada
Dr. Vicente García Díaz, University of Oviedo, Spain

Publicity Chairs:

Dr. M. Tanveer, Indian Institute of Technology, Indore, India


Dr. Jafar A. Alzubi, Al-Balqa Applied University, Salt—Jordan
Dr. Hamid Reza Boveiri, Sama College, IAU, Shoushtar Branch, Shoushtar, Iran
Prof. Med Salim Bouhlel, Sfax University, Tunisia
ICICC-2021 Steering Committee Members ix

Co-Convener:

Mr. Moolchand Sharma, Maharaja Agrasen Institute of Technology, India

Organizing Chairs:

Dr. Kumar Bijoy, SSCBS, University of Delhi


Dr. Rishi Ranjan Sahay, SSCBS, University of Delhi
Dr. Amrina Kausar, SSCBS, University of Delhi
Dr. Abhishek Tandon, SSCBS, University of Delhi

Organizing Team:

Dr. Gurjeet Kaur, SSCBS, University of Delhi


Dr. Aditya Khamparia, Lovely Professional University, Punjab, India
Dr. Abhimanyu Verma, SSCBS, University of Delhi
Dr. Onkar Singh, SSCBS, University of Delhi
Dr. Kalpna Sagar, KIET Group of Institutes, Ghaziabad
Dr. Purnima Lala Mehta, Assistant Professor, IILM
Dr. Suresh Chavhan, Vellore Institute of Technology, Vellore, India
Dr. Mona Verma, SSCBS, University of Delhi
Preface

We hereby are delighted to announce that Shaheed Sukhdev College of Business


Studies, New Delhi, in association with the National Institute of Technology Patna
and the University of Valladolid, Spain, has hosted the eagerly awaited and much-
coveted International Conference on Innovative Computing and Communication
(ICICC-2021) in Hybrid Mode. The fourth version of the conference was able to
attract a diverse range of engineering practitioners, academicians, scholars, and
industry delegates, with the reception of abstracts including more than 3,600 authors
from different parts of the world. The committee of professionals dedicated to the
conference is striving to achieve a high-quality technical program with tracks on Inno-
vative Computing, Innovative Communication Network and Security, and Internet of
Things. All the tracks chosen in the conference are interrelated and are very famous
among present-day research community. Therefore, a lot of research is happening in
the above-mentioned tracks and their related sub-areas. As the name of the conference
starts with the word “innovation,” it has targeted out of box ideas, methodologies,
applications, expositions, surveys, and presentations helping to upgrade the current
status of research. More than 900 full-length papers have been received, among which
the contributions are focused on theoretical, computer simulation-based research,
and laboratory-scale experiments. Among these manuscripts, 210 papers have been
included in the Springer proceedings after a thorough two-stage review and editing
process. All the manuscripts submitted to the ICICC-2021 were peer-reviewed by at
least two independent reviewers, who were provided with a detailed review proforma.
The comments from the reviewers were communicated to the authors, who incorpo-
rated the suggestions in their revised manuscripts. The recommendations from two
reviewers were taken into consideration while selecting a manuscript for inclusion in
the proceedings. The exhaustiveness of the review process is evident, given the large
number of articles received addressing a wide range of research areas. The stringent
review process ensured that each published manuscript met the rigorous academic and
scientific standards. It is an exalting experience to finally see these elite contributions
materialize into three book volumes as ICICC-2021 proceedings by Springer enti-
tled “International Conference on Innovative Computing and Communications.” The
articles are organized into three volumes in some broad categories covering subject
matters on machine learning, data mining, big data, networks, soft computing, and
xi
xii Preface

cloud computing, although given the diverse areas of research reported might not
have been always possible.
ICICC-2021 invited seven keynote speakers, who are eminent researchers in the
field of computer science and engineering, from different parts of the world. In addi-
tion to the plenary sessions on each day of the conference, ten concurrent technical
sessions are held every day to assure the oral presentation of around 210 accepted
papers. Keynote speakers and session chair(s) for each of the concurrent sessions
have been leading researchers from the thematic area of the session. A technical
exhibition is held during the 2 days of the conference, which has put on display the
latest technologies, expositions, ideas, and presentations. The research part of the
conference was organized in a total of 28 special sessions and 3 international work-
shops. These special sessions and international workshops provided the opportunity
for researchers conducting research in specific areas to present their results in a more
focused environment.
An international conference of such magnitude and release of the ICICC-2021
proceedings by Springer has been the remarkable outcome of the untiring efforts
of the entire organizing team. The success of an event undoubtedly involves the
painstaking efforts of several contributors at different stages, dictated by their devo-
tion and sincerity. Fortunately, since the beginning of its journey, ICICC-2021 has
received support and contributions from every corner. We thank them all who have
wished the best for ICICC-2021 and contributed by any means toward its success. The
edited proceedings volumes by Springer would not have been possible without the
perseverance of all the steering, advisory, and technical program committee members.
All the contributing authors owe thanks to the organizers of ICICC-2021 for their
interest and exceptional articles. We would also like to thank the authors of the papers
for adhering to the time schedule and for incorporating the review comments. We wish
to extend my heartfelt acknowledgment to the authors, peer-reviewers, committee
members, and production staff whose diligent work put shape to the ICICC-2021
proceedings. We especially want to thank our dedicated team of peer-reviewers who
volunteered for the arduous and tedious step of quality checking and critique on
the submitted manuscripts. We wish to thank my faculty colleagues Mr. Moolchand
Sharma and Ms. Prerna Sharma for extending their enormous assistance during the
conference. The time spent by them and the midnight oil burnt is greatly appreciated,
for which we will ever remain indebted. The management, faculties, administrative,
and support staff of the college have always been extending their services whenever
needed, for which we remain thankful to them.
Lastly, we would like to thank Springer for accepting our proposal for publishing
the ICICC-2021 conference proceedings. Help received from Mr. Aninda Bose, the
acquisition senior editor, in the process has been very useful.

Delhi, India Ashish Khanna


Rohini, India Deepak Gupta
Organizers, ICICC-2021
Contents

Building Virtual High-Performance Computing Clusters


with Docker: An Application Study at the University of Economics
Ho Chi Minh City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Quoc Hung Nguyen, Thanh Le, Ha Quang Dinh Vo, and Viet Phuong Truong
Implementing Multilevel Graphical Password Authentication
Scheme in Combination with One Time Password . . . . . . . . . . . . . . . . . . . . 11
T. Srinivasa Ravi Kiran, A. Srisaila, and A. Lakshmanarao
State of Geographic Information Science (GIS), Spatial Analysis
(SA) and Remote Sensing (RS) in India: A Machine Learning
Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Shruti Sachdeva and Bijendra Kumar
Application of Noise Reduction Techniques to Improve Speaker
Verification to Multi-Speaker Text-to-Speech Input . . . . . . . . . . . . . . . . . . . 43
Md. Masudur Rahman, Sk. Arifuzzaman Pranto,
Romana Rahman Ema, Farheen Anfal, and Tajul Islam
Utilization of Machine Learning Algorithms for Thyroid Disease
Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Md. Shahajalal, Md. Masudur Rahman, Sk. Arifuzzaman Pranto,
Romana Rahman Ema, Tajul Islam, and M. Raihan
Detection of Hepatitis C Virus Progressed Patient’s Liver
Condition Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Ferdib-Al-Islam and Laboni Akter
Energy Performance Prediction of Residential Buildings Using
Nonlinear Machine Learning Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
D. Senthil Kumar, D. George Washington, A. K. Reshmy,
and M. Noorunnisha
Cloud Image Prior: Single Image Cloud Removal . . . . . . . . . . . . . . . . . . . . 95
Anirudh Maiya and S. S. Shylaja

xiii
xiv Contents

Prioritizing Python Code Smells for Efficient Refactoring Using


Multi-criteria Decision-Making Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Aakanshi Gupta, Deepanshu Sharma, and Kritika Phulli
Forecasting Rate of Spread of Covid-19 Using Linear Regression
and LSTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Ashwin Goyal, Kartik Puri, Rachna Jain, and Preeti Nagrath
Employment of New Cryptography Algorithm by the Use of Spur
Gear Dimensional Formula and NATO Phonetic Alphabet . . . . . . . . . . . . 135
Sukhwant Kumar, Sudipa Bhowmik, Priyanka Malakar, and Pushpita Sen
Security Framework for Enhancing Security and Privacy
in Healthcare Data Using Blockchain Technology . . . . . . . . . . . . . . . . . . . . . 143
A. Sivasangari, V. J. K. Kishor Sonti, S. Poonguzhali, D. Deepa,
and T. Anandhi
American Sign Language Identification Using Hand Trackpoint
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Yugam Bajaj and Puru Malhotra
Brain Tumor Detection Using Deep Neural Network-Based
Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Ambeshwar Kumar and R. Manikandan
Detecting Diseases in Mango Leaves Using Convolutional Neural
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Rohan Sharma, Kartik Suvarna, Shreyas Sudarsan, and G. P. Revathi
Recommending the Title of a Research Paper Based on Its Abstract
Using Deep Learning-Based Text Summarization Approaches . . . . . . . . . 193
Sheetal Bhati, Shweta Taneja, and Pinaki Chakraborty
An Empirical Analysis of Survival Predictors for Cancer Using
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Ishleen Kaur, M. N. Doja, and Tanvir Ahmad
Epitope Prediction for Peptide Vaccine Against Chikungunya
and Dengue Virus, Using Immunoinformatics Tools . . . . . . . . . . . . . . . . . . . 213
Krishna S. Gayatri, Geethu Gopinath, Bhawana Rathi, and Anupama Avasthi
Airflow Control and Gas Leakage Detection System . . . . . . . . . . . . . . . . . . 239
J. S. Vimali, Bevish Jinila, S. Gowri, Sivasangari, Ajitha, and Jithina Jose
Impact of Lightweight Machine Learning Models for Speech
Emotion Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Swaraj Dhondge, Rashmi Shewale, Madhura Satao, and Jayashree Jagdale
Impact of COVID-19 Pandemic on Mental Health Using Machine
Learning and Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Rakshanda Naiem, Jasanpreet kaur, Shruti Mishra, and Ankur Saxena
Contents xv

Identification of Student Group Activities in Educational Institute


Using Cognitive Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Ganeshayya Shidaganti, Ikesh Yadav, Himanshu Dagdi, Jagdish, and Aman
A Machine Learning Model for Automated Classification of Sleep
Stages using Polysomnography Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Santosh Kumar Satapathy, D. Loganathan, S. Sharathkumar,
and Praveena Narayanan
An Efficient Approach for Brain Tumor Detection Using Deep
Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
R. V. Belfin, J. Anitha, Aishwarya Nainan, and Lycia Thomas
Real-Time Detection of Student Engagement: Deep
Learning-Based System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Zeyad A. T. Ahmed, Mukti E. Jadhav, Ali Mansour Al-madani,
Mohammed Tawfik, Saleh Nagi Alsubari, and Ahmed Abdullah A. Shareef
Bangla Handwritten Digit Recognition Based on Different Pixel
Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Forhad An Naim
Information Extraction and Sentiment Analysis to Gain Insight
into the COVID-19 Crisis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Sandhya Avasthi, Ritu Chauhan, and Debi Prasanna Acharjya
Gender Recognition Using Deep Leering Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Belal Alsellami and Prapti D. Deshmukh
Detection of COVID-19 Using EfficientNet-B3 CNN and Chest
Computed Tomography Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Sahar Alquzi, Haikel Alhichri, and Yakoub Bazi
Comparative Study on Identification and Classification of Plant
Diseases with the Support of Transfer Learning . . . . . . . . . . . . . . . . . . . . . . 375
Aditi Singh and Harjeet Kaur
Cross Channel Scripting Attacks (XCS) in Web Applications . . . . . . . . . . 387
R. Shashidhara, V. Kantharaj, K. R. Bhavya, and S. C. Lingareddy
Localization-Based Multi-Hop Routing in Wireless Body Area
Networks for Health Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Subba Reddy Chavva and Ravi Sankar Sangam
Analyzing Security Testing Tools for Web Applications . . . . . . . . . . . . . . . . 411
Amel F. Aljebry, Yasmine M. Alqahtani, and Norrozila Sulaiman
A Study on Password Security Awareness in Constructing Strong
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Norrozila Sulaiman
xvi Contents

Minimum Pearson Distance Detection for MIMO-OFDM Systems . . . . . 431


H. A. Anoop and Prerana G. Poddar
Study on Emerging Machine Learning Trends
on Nanoparticles—Nanoinformatics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
B. Lavanya and G. Sasipriya
A Review of the Oversampling Techniques in Class Imbalance
Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Shweta Sharma, Anjana Gosain, and Shreya Jain
Eye Blink-Based Liveness Detection Using Odd Kernel Matrix
in Convolutional Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
N. Nanthini, N. Puviarasan, and P. Aruna
Predicting Student Potential Using Machine Learning Techniques . . . . . 485
Shashi Sharma, Soma Kumawat, and Kumkum Garg
Routing Based on Spectrum Quality and Availability in Wireless
Cognitive Radio Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Veeranna Gatate and Jayashree Agarkhed
A Review on Scope of Distributed Cloud Environment
in Healthcare Automation Security and Its Feasibility . . . . . . . . . . . . . . . . . 509
Mirza Moiz Baig and Shrikant V. Sonekar
Smart Traffic Monitoring and Alert System Using VANET
and Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Manik Taneja and Neeraj Garg
Enhancement of Lifetime of Wireless Sensor Network Based
on Energy-Efficient Circular LEACH Algorithm . . . . . . . . . . . . . . . . . . . . . 537
Jainendra Singh and Zaheeruddin
Estimation and Correction of Multiple Skews Arabic Handwritten
Document Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
M. Ravikumar and Omar Ali Boraik
Heart Disease Prediction Using Hybrid Classification Methods . . . . . . . . 565
Aniket Bharadwaj, Divakar Yadav, and Arun Kumar Yadav
Job Recommendation System Using Content
and Collaborative-Based Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Rahul Pradhan, Jyoti Varshney, Kartik Goyal, and Latesh Kumari
Recommendation System for Business Process Modelling
in Educational Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Anu Saini, Astha Jain, and J. L. Shreya
Contents xvii

Using Bidirectional LSTMs with Attention for Categorization


of Toxic Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Zubin Tobias and Suneha Bose
Detection of Rheumatoid Arthritis Using a Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
A. S. Mahesh Kumar, M. S. Mallikarjunaswamy, and S. Chandrashekara
The Improved Method for Image Encryption Using Fresnel
Transform, Singular Value Decomposition and QR Code . . . . . . . . . . . . . . 619
Anshula and Hukum Singh
A Study on COVID-19 Impacts on Indian Students . . . . . . . . . . . . . . . . . . . 633
Arpita Telkar, Chahat Tandon, Pratiksha Bongale, R. R. Sanjana,
Hemant Palivela, and C. R. Nirmala
Improving Efficiency of Machine Learning Model for Bank
Customer Data Using Genetic Algorithm Approach . . . . . . . . . . . . . . . . . . . 649
B. Ajay Ram, D. J. santosh Kumar, and A. Lakshmanarao
Unsupervised Learning to Heterogeneous Cross Software Projects
Defect Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Rohit Vashisht and Syed Afzal Murtaza Rizvi
PDF Text Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Rahul Pradhan, Kushagra Gangwar, and Ishika Dubey
Performance Analysis of Digital Modulation Schemes Over Fading
Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Kamakshi Rautela, Sandeep Kumar Sunori, Abhijit Singh Bhakuni,
Narendra Bisht, Sudhanshu Maurya, Pradeep Kumar Juneja, and Richa Alagh
Single Image Dehazing Using NN-Dehaze Filter . . . . . . . . . . . . . . . . . . . . . . 701
Ishank Agarwal
Comparative Analysis for Sentiment in Tweets Using LSTM
and RNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Rahul Pradhan, Gauri Agarwal, and Deepti Singh
Solving Connect 4 Using Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . 727
Mayank Dabas, Nishthavan Dahiya, and Pratish Pushparaj
A Pareto Dominance Approach to Multi-criteria Recommender
System Using PSO Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Saima Aysha and Shrimali Tarun
Twitter Sentiment Analysis Using K-means and Hierarchical
Clustering on COVID Pandemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Nainika Kaushik and Manjot Kaur Bhatia
xviii Contents

Improved ECC-Based Image Encryption with 3D Arnold Cat Map . . . . . 771


Priyansi Parida and Chittaranjan Pradhan
Virtual Migration in Cloud Computing: A Survey . . . . . . . . . . . . . . . . . . . . 785
Tajinder Kaur and Anil Kumar
Supervised Hybrid Particle Swarm Optimization with Entropy
(PSO-ER) for Feature Selection in Health Care Domain . . . . . . . . . . . . . . . 797
J. A. Esther Rani, E. Kirubakaran, Sujitha Juliet, and B. Smitha Evelin Zoraida
Contribution Title A Multimodal Biometrics Verification System
with Wavelet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Aderonke F. Thompson
IoT-Based Voice-Controlled Automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Anjali Singh, Shreya Srivastava, Kartik Kumar, Shahid Imran,
Mandeep Kaur, Nitin Rakesh, Parma Nand, and Neha Tyagi
Trusted Recommendation Model for Social Network of Things . . . . . . . . 839
Akash Sinha, Prabhat Kumar, and M. P. Singh
Efficient Classification Techniques in Sentiment Analysis Using
Transformers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Leeja Mathew and V. R. Bindu
Ultra-Wideband Scattered Microwave Signal for Classification
and Detection of Breast Tumor Using Neural Network
and Statistical Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Mazhar B. Tayel and Ahmed F. Kishk

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885


About the Editors

Dr. Ashish Khanna has 16 years of expertise in Teaching, Entrepreneurship, and


Research & Development He received his Ph.D. degree from National Institute of
Technology, Kurukshetra. He has completed his M. Tech. and B. Tech. GGSIPU,
Delhi. He has completed his postdoc from Internet of Things Lab at Inatel, Brazil
and University of Valladolid, Spain. He has published around 55 SCI indexed papers
in IEEE Transaction, Springer, Elsevier, Wiley and many more reputed Journals
with cumulative impact factor of above 100. He has around 120 research articles
in top SCI/ Scopus journals, conferences and book chapters. He is co-author of
around 30 edited and text books. His research interest includes Distributed Systems,
MANET, FANET, VANET, IoT, Machine learning and many more. He is originator
of Bhavya Publications and Universal Innovator Lab. Universal Innovator is actively
involved in research, innovation, conferences, startup funding events and workshops.
He has served the research field as a Keynote Speaker/ Faculty Resource Person/
Session Chair/ Reviewer/ TPC member/ post-doctorate supervision. He is convener
and Organizer of ICICC conference series. He is currently working at the Department
of Computer Science and Engineering, Maharaja Agrasen Institute of Technology,
under GGSIPU, Delhi, India. He is also serving as series editor in Elsevier and De
Gruyter publishing houses.

Dr. Deepak Gupta received a B.Tech. degree in 2006 from the Guru Gobind Singh
Indraprastha University, India. He received M.E. degree in 2010 from Delhi Tech-
nological University, India and Ph.D. degree in 2017 from Dr. APJ Abdul Kalam
Technical University, India. He has completed his Post-Doc from Inatel, Brazil.
With 13 years of rich expertise in teaching and two years in the industry; he focuses
on rational and practical learning. He has contributed massive literature in the fields
of Intelligent Data Analysis, BioMedical Engineering, Artificial Intelligence, and
Soft Computing. He has served as Editor-in-Chief, Guest Editor, Associate Editor
in SCI and various other reputed journals (IEEE, Elsevier, Springer, & Wiley). He
has actively been an organizing end of various reputed International conferences.
He has authored/edited 50 books with National/International level publishers (IEEE,

xix
xx About the Editors

Elsevier, Springer, Wiley, Katson). He has published 180 scientific research publi-
cations in reputed International Journals and Conferences including 94 SCI Indexed
Journals of IEEE, Elsevier, Springer, Wiley and many more.

Prof. Siddhartha Bhattacharyya, FRSA FIET (UK) is currently the Principal of


Rajnagar Mahavidyalaya, Birbhum, India. Prior to this, he was a Professor in Christ
University, Bangalore, India. He served as Senior Research Scientist at the Faculty
of Electrical Engineering and Computer Science of VSB Technical University of
Ostrava, Czech Republic, from October 2018 to April 2019. He also served as the
Principal of RCC Institute of Information Technology, Kolkata, India. He is a co-
author of 6 books and a co-editor of 75 books and has more than 300 research publica-
tions in international journals and conference proceedings to his credit. His research
interests include soft computing, pattern recognition, multimedia data processing,
hybrid intelligence and quantum computing.

Prof. Aboul Ella Hassanien is the Founder and Head of the Egyptian Scientific
Research Group (SRGE) and a Professor of Information Technology at the Faculty
of Computer and Artificial Intelligence, Cairo University. Professor Hassanien is an
ex-dean of the faculty of computers and information, Beni Suef University. Professor
Hassanien has more than 800 scientific research papers published in prestigious inter-
national journals and over 40 books covering such diverse topics as data mining,
medical images, intelligent systems, social networks, and smart environment. Prof.
Hassanien won several awards, including the Best Researcher of the Youth Award of
Astronomy and Geophysics of the National Research Institute, Academy of Scien-
tific Research (Egypt, 1990). He was also granted a scientific excellence award in
humanities from the University of Kuwait for the 2004 Award and received the scien-
tific - University Award (Cairo University, 2013). Also, He was honored in Egypt
as the best researcher at Cairo University in 2013. He was also received the Islamic
Educational, Scientific and Cultural Organization (ISESCO) prize on Technology
(2014) and received the State Award for excellence in engineering sciences 2015.
He was awarded the medal of Sciences and Arts of the first class by the President of
the Arab Republic of Egypt, 2017.

Dr. Sameer Anand is currently working as an Assistant professor in the Depart-


ment of Computer science at Shaheed Sukhdev College of Business Studies,
University of Delhi, Delhi. He has received his M.Sc., M.Phil, and Ph.D. (Software
Reliability) from Department of Operational Research, University of Delhi. He is a
recipient of ‘Best Teacher Award’ (2012) instituted by Directorate of Higher Educa-
tion, Govt. of NCT, Delhi. The research interest of Dr. Anand includes Operational
Research, Software Reliability and Machine Learning. He has completed an Inno-
vation project from the University of Delhi. He has worked in different capacities
in International Conferences. Dr. Anand has published several papers in the reputed
journals like IEEE Transactions on Reliability, International journal of production
research (Taylor & Francis), International Journal of Performability Engineering
About the Editors xxi

etc. He is a member of Society for Reliability Engineering, Quality and Operations


Management. Dr. Sameer Anand has more than 16 years of teaching experience.

Dr. Ajay Jaiswal is currently serving as an Assistant Professor in the Department


of Computer Science of Shaheed Sukhdev College of Business Studies, University
of Delhi, Delhi. He is co-editor of two books/Journals and co-author of dozens
of research publications in International Journals and conference proceedings.
His research interest includes pattern recognition, image processing, and machine
learning. He has completed an interdisciplinary project titled “Financial Inclusion-
Issues and Challenges: An Empirical Study” as Co-PI. This project was awarded by
the University of Delhi. He obtained his masters from the University of Roorkee (now
IIT Roorkee) and Ph.D. from Jawaharlal Nehru University, Delhi. He is a recipient
of the best teacher award from the Government of NCT of Delhi. He has more than
nineteen years of teaching experience.
Building Virtual High-Performance
Computing Clusters with Docker:
An Application Study at the University
of Economics Ho Chi Minh City

Quoc Hung Nguyen, Thanh Le, Ha Quang Dinh Vo, and Viet Phuong Truong

Abstract The need for high-performance computing in science and technology


is becoming a challenging issue in recent years. Building a high-performance
computing system by utilizing the existing hardware and software resources is a
low-cost solution. Virtualization technology is proposed to solve this problem. It
has brought convenience and efficiency as it can run on various operating systems.
It can be used for implementing many computational algorithms simultaneously
on the same hardware system including parallel processing and/or cluster processing
systems. It can be expanded for computation and storage if the resources are still avail-
able. Virtualization also can combine the existing hardware and software resources
to solve the problem of mobilizing multiple resources. Docker virtualization tech-
nology is considered a powerful virtualization technology, offering a new virtualiza-
tion solution, instead of creating independent virtual machines with different virtual
hardware and operating systems. Because this technology allows applications can
be repackaged into individual data units and run together on the operating system
kernel, sharing the resources of the mobilizing hardware platforms is the strength of
Docker. The paper will focus on analyzing the superiority of using hardware virtu-
alization technology, thereby proposing to build a high-performance virtualization
system by using Docker technology with utilizing the available hardware platform
at the University of Economics Ho Chi Minh City (UEH).

Keywords Virtual high-performance computing · Docker · Cluster computing

Q. H. Nguyen (B) · T. Le · H. Q. D. Vo · V. P. Truong


School of Business Information Technology, University of Economics Ho Chi Minh City, Ho Chi
Minh City 700000, Vietnam
e-mail: [email protected]
T. Le
e-mail: [email protected]
H. Q. D. Vo
e-mail: [email protected]
V. P. Truong
e-mail: [email protected]

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 1
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_1
2 Q. H. Nguyen et al.

1 Introduction

Today, the use of high-performance computers in the fields of sciences and


engineering has changed scientific research activities. Many scientific disciplines
need powerful computational abilities such as computational biology, computa-
tional chemistry, computational physics, computational materials, computational
mechanics, computational geophysics, computational statistics, and banking and
financial technology. A common feature is information processing and analysis,
and predicting results based on simulating and assessing mathematical models with
the help of a high-performance computing system. The system is considered to be
a critical solution to meet the increasing demand for computing. Not only scientific
research activities but also practical activities, such as socioeconomics, also requires
high computing performance. They have been developing on a large scale and require
more complex technology. Therefore, the implementation of the related models on
conventional computers is impossible due to the large computational volume and
time constraints.
High-Performance Computing (HPC) system was born to meet the above situa-
tion, and it allows the implementation of big data solutions based on a system inte-
grating with many page calculation nodes. Central Processing Units (CPU) will be
combined with a Graphical Processing Unit (GPU). On another aspect, maximizing
resource utilization on HPC systems remains problematic in recent years. Finding
the optimal solution to this problem to maximize the computing power of the HPC
system is attracting the attention of scientists from research institutes and univer-
sities. However, to equip an HPC system for a university or a public research unit
requires a large investment of money to purchase and maintain the system and human
resources. Technicians need to have operation and management qualifications when
put into use. On the other hand, on the system, there are still exist separate servers
with independent applications. Therefore, to build a high-performance computing
system with a virtualization technology based on the availability of distributed hard-
ware resources, which we call vHPC (virtual HPC), is the motivation of the study.
In this paper, we develop the above system based on Docker technology.
Our contributions in this paper focus on the following: (1) proposing an efficient
virtual HPC architecture to utilizing the existing hardware and software resource of
UEH; (2) combining the existing physical servers to build virtual servers that suit
the usage of Docker technology; (3) configuring the system to optimize resource
allocation and balancing the performance with other tasks that are working on the
existing physical servers.
The system uses many advanced virtualization technologies such as Hyper-V,
VMware ESX Server, and Docker Cluster to exploit available physical resources to
create and operate multiple machines [1]. Virtual machines share resources, or they
can allow to consolidate and run multiple workloads as virtual machines on a single
server. This technology allows a virtual machine can be considered to be a physical
computer and can run an operating system and applications fully. It enables the
virtualization of hardware from the server to servers, virtualization of storage on the
Building Virtual High-Performance Computing Clusters with Docker … 3

network (SAN—Storage Area Network) [2], or virtualization of shared applications


(Applications).

2 Literature Review

Some computing system virtualization technologies have been applied in many


fields of life. Gautam Bhanage [3] studied the experimental evaluation based
on OpenVZ virtualization technology (Open Virtuozzo) from the perspective of
receiving. Considering that OpenVZ [4] is a virtualization technology system based
on the Linux kernel. OpenVZ allows a single physical server to run multiple separate
operating system instances, known as containers, Virtual Private Servers (VPSS), or
Virtual Environments (VES). OpenVZ is not completely virtualization, it only shares
a modified Linux kernel and can, therefore, only run Linux operating systems. Thus,
all VPS virtual servers can only run Linux with the same technology and Kernel
version.
Microsoft Hyper-V virtualization technology [5] consists of three main compo-
nents: hypervisor, virtualization compartment, and new virtualization I/O (I/O)
model. The hypervisor is a very small layer of software presented on a processor
under Intel-V or AMD-V technology. It is responsible for creating the partitions, in
that the virtual entity will run. A partition is a logically isolated unit and can contain
an operating system on which it is intended. Always have at least 1 root partition
containing Windows Server 2008 and virtualization compartment, with direct access
to hardware devices. The next root partition can generate child partitions, usually
called virtual machines, to run the guest operating systems. A partition can also
generate its own child partitions. Virtual machines do not have access to the phys-
ical processor, but only “see” the processor provided by the hypervisor. The virtual
machine can only use the virtual device, all requests to the virtual device will be
passed through the VMBus to the device in the parent partition. Feedback is also
transmitted via VMBus. If the device on the parent partition is also the virtual device,
it is forwarded until it meets the real device on the root partition [6]. In the work
of Irfan Habib, the author presented an overview of virtualization technology KVM
(Kernel Virtualization Machine) [7] this is a new virtualization technology that allows
real virtualization on the hardware platform. That means the OS itself emulates the
hardware for other OSs to run on. It works similarly to a transcendental manager for
a fair share of resources such as disk, network IO, and CPU. The original server has
Linux installed, but KVM supports creating virtual servers that can run both Linux
and Windows. It also supports both × 86 and × 86–64 systems.
In the study of David Chisnall, the author presented a system with XEN virtual-
ization technology [8] that allows running multiple VPS virtual servers on a physical
server at the same time. XEN virtualization technology allows each virtual server to
run its own kernel, so VPS can install both Linux or Windows Operating systems.
Each VPS has its own File System and acts as an independent physical server.
4 Q. H. Nguyen et al.

Next is the optimized and most used virtualization technology in recent times,
VMWare virtualization technology [9] developed by the company VMWare, which
supports virtualization from the hardware level. User-friendly interface, simple to
install and use, many advanced features, support for multiple operating systems,
diverse versions. This technology is often applied to large units like banks and is
rarely used for commercial VPS sold in the market. Its structure is a virtualization
application program, running on Linux or Windows operating systems.
In the study of HE Yu et al. [10], the authors proposed a solution to automatically
build bridges connecting computing nodes into clusters for parallel processing (MPI–
–Message Passing Interface) using Docker Cluster [11]. This work has also been
carried out by De Bayser et al. [12] to integrate computation in parallel MPI with
HPC systems using Docker. It is important to evaluate efficiency when it comes
to virtualizing the computational system as a basis for building HPC. Muhammad
Abdullah et al. at Punjab University, Pakistan conducted a study [13] to evaluate the
effectiveness when using VMs (Virtual Machines) and Docker on the OpenNebula
cloud service platform. The results showed that when deploying virtualization with
Docker, the performance reached 70.23% compared to 46.48% of VMs, thereby
proving effective when virtualizing using Docker.
In Vietnam, several studies in the field of HPC have been carried out [14].
Researchers of Center for Computing Engineering, University of Technology—
Vietnam National University Ho Chi Minh City, aims at building solutions and
techniques used in the field of high performance and looking to build a tool that
can evaluate the performance of a powerful computer system, and achieved perfor-
mance in the range of 30–90%. The results were published in “500 of the world’s most
powerful computers” [15]. In project [16], Nguyen Thanh Thuy et al. at the High-
Performance Computing Center, Hanoi University of Technology, by the protocol of
scientific and technological cooperation with the Indian government in the period of
2004–2005, he has proposed to build an HPC system, namely BKluster. BKluster is
a system of parallel clustered computing based on Beowulf architecture and message
communication programming model together with the BKlusware software suite, a
set of software that supports up to many users at many different levels.

3 Virtual High-Performance Computing Based on Virtual


Clusters and Docker

In this paper, we develop a vHPC system by combining Cluster Computing using


available computing resources of the existing infrastructure at UEH (Table 1) with
Docker technology (Fig. 1).
In Fig. 1, the vHPC architecture included three processing layers:
• The Physical layers: They consist of 8 physical servers as shown in Table 1.
• The Virtualization layers: They refer to Taknet’s Analytical Evaluation Report
[17] on building an HPC system, the minimum configuration consists of 1 control
Building Virtual High-Performance Computing Clusters with Docker … 5

Table 1 List of the existing servers of UEH used for virtualization


No Example Font size and style
1 IBM X3560 M4, 12 Core 2.0 GHz, E5 2620, 24G Ram 270 GB/272 GB
2 HP Proliant DL380 Gen9, 32 Core 2.10 GHz, E5 2620, 64G Ram 600 GB/830 GB
3 HP Proliant DL380 Gen9, 24 Core 2.10 GHz, E5 2620, 128G Ram 100 GB/830 GB
4 IBM X3560 M3, 16 Core 2.4 GHz, E5620, 36G Ram 1.62 TB/1.62 TB
5 DELL PowerEdge R740, 24 Core 2.59 GHz, 64G Ram 1.30 TB/1.90 TB
6 DELL PowerEdge R720, 24 Core 2.10 GHz, 64G Ram 2 TB/3.26 TB
7 DELL PowerEdge R720, 24 Core 2.10 GHz, 64G Ram 1 TB/3.26 TB
8 SAN (Storage Area Network) 7 TB

Fig. 1 The proposed vHPC architecture with the Docker

computer (defined as Head Node) and at least 3 to 4 handling computers (defined


as Node). These nodes can be completely supplemented if necessary to improve
the overall computing performance of the HPC system. Therefore, we virtualize 5
virtual servers as in Fig. 1b, in which 1 machine plays the role of the manager (Head
Node) and the other 04 machines—the processing cluster computer (Node). All
computers are installed with the CenOS operating system version 7.8 as in Fig. 2.
For the hardware configuration of cluster computers, we set up 05 computers with
the same configuration as in Fig. 3.
• The vHPC layers: The system includes two components: (i) the CenOS oper-
ating system v7.8 runs in the background; (ii) A human-interactive interface with
Docker to compute resources (operation image and folder with data containers)
as in Fig. 4.
6 Q. H. Nguyen et al.

Fig. 2 Virtualized Servers with IP Addresses: 172.16.248.170, 172.16.248.171, 172.16.248.172,


172.16.248.173, 172.16.248.174

Fig. 3 The hardware configuration for the virtual server

For the vHPC performance calculation system [18], Docker images with Storage
Containers for each specific problem will be built, and the system provides informa-
tion about each Docker images. The part that interacted with the outside through the
IP address is authenticated through the HTTPS protocol if the system runs internally.
When doing the work outside, tasks will be connected to the system via VPN. All
the procedures are illustrated in Fig. 5.
Building Virtual High-Performance Computing Clusters with Docker … 7

Fig. 4 The hardware configuration for the virtual server

Fig. 5 Computational performance of the vHPC system

Providing accounts to members is performed by the administrator on the same


Docker mining interface that corresponds to the computing hardware requirement
defined by the authority in Docker images.
8 Q. H. Nguyen et al.

4 Conclusions

Virtualization technology has been developed a long time ago, achieved many
achievements, and commonly used for server systems. In addition to flexibility
in deployment, virtual machines are also known for the characteristics such as
ease of management, high security, and efficiency in isolation between the scope
of use and control. Currently, in the field of high-performance computing, virtual
machine deployment infrastructure plays an important role in services such as cloud
computing, and cloud storage. In this research, we have discussed and tested several
virtualization technologies for servers that are integrated with a large computational
memory such as CPU and GPU toward an HPC system with superior features, scala-
bility, and higher reliability. On the other hand, it helps researchers to have the tools
to implement algorithms to solve hard problems such as computer vision [19, 20],
machine learning [21], and big data processing [22] in all different environments to
meet technical factors such as high availability, superior fault tolerance feature, and
especially, utilizing the existing resources.

Acknowledgements This work was supported by the University of Economics Ho Chi Minh City
under project CS-2020-14.

References

1. Lee, H. (2014). Virtualization basics: Understanding techniques and fundamentals. In: School
of Informatics and Computing Indiana University 815 E 10th St. Bloomington IN 47408.
2. Khattar, R. K., Murphy, M. S., Tarella, G. J., & Nystrom, K. E. (1999). Introduction to Storage
Area Network. SAN: IBM Corporation, International Technical Support Organization.
3. Bhanage, G., Seskar, I., Zhang, Y., Raychaudhuri, D., & Jain, S. (2011). Experimental evalua-
tion of openvz from a testbed deployment perspective. Development of Networks and Commu-
nities. In volume 46 of Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering (pp. 103–112). Berlin: Springer.
4. Jin, Y., Wen, Y., Chen, Q. (2012). Energy efficiency and server virtualization in data centers:
An empirical investigation. In 2012 Proceedings IEEE INFOCOM Workshops (pp. 133–138).
5. Performance Report Hyper-V (2010). White Paper: https://sp.ts.fujitsu.com/.
6. Kusnetzky, D. (2011). Virtualization: A Manager’s Guide. O’Reilly Media, Inc.
7. I. Habib. (2008, February). Virtualization with KVM. Linux Journal, 2008(166), 8. Article
No.: 8.
8. Chisnall, D. (2013). The Definitive Guide to the Xen Hypervisor (1st ed.). USA: Prentice Hall
Press.
9. Technical Papers. VMware Infrastructure Architecture Overview. White Paper. https://www.
vmware.com/pdf/vi_architecture_wp.pdf.
10. Yu, H. E., & Huang, W. (2015). Building a virtual hpc cluster with auto scaling by the docker.
arXiv:1509.08231.
11. Rad, B. B., Bhatti, H. J., & Ahmadi, M. (2017). An introduction to docker and analysis of
its performance. International Journal of Computer Science and Network Security (IJCSNS),
17(3), 228.
Building Virtual High-Performance Computing Clusters with Docker … 9

12. de Bayser, M., & Cerqueira, R. (2017). Integrating MPI with docker for HPC. In 2017 IEEE
International Conference on Cloud Engineering (IC2E), Vancouver, BC, 2017 (pp. 259–265).
https://doi.org/10.1109/IC2E.2017.40.
13. Abdullah, M., Iqbal, W., & Bukhari, F. (2019). Containers vs virtual machines for auto-scaling
multi-tier applications under dynamically increasing workloads (pp. 153–167). https://doi.org/
10.1007/978-981-13-6052-7_14.
14. Hung, N. Q., Phung, T. K., Hien, P., & Thanh, D. N. H. (2021) AI and blockchain: Potential
and challenge for building a smart E-learning system in vietnam. In IOP Conference Series:
Materials Science and Engineering (In press).
15. Tran Thoai N., et al (2016). Research and design a 50–100 TFlops high performance computing
system / University of Technology - Viet Nam National University HCMC, Project in HCM
City.
16. Thuy, N. T., et al. (2006). Research high-performance computational systems and apply micro-
material simulation. Project in Ministry of Science and Technology (MOST), 2004–2005.
17. Tan, G., Yeo, G. K., Turner, S. J., & Teo, Y. M. (Eds.). (2013). AsiaSim 2013: 13th International
Conference on Systems Simulation, Singapore, November 6–8, 2013. Proceedings (Vol. 402).
18. Petitet, R. C. W. A., Dongarra, J., Cleary, A. HPL - A portable implementation of the high-
performance linpack benchmark for distributed-memory computers. http://www.netlib.org/ben
chmark/hpl
19. Thanh, D. N. H. & Dvoenko, S. D. (2019). A denoising of biomedical images. International
Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XL-5/W6,
73–78.
20. Kumar, V., Mishra, B. K., Mazzara, M., Thanh, D. N. H., & Verma, A. (2020). Prediction of
Malignant and benign breast cancer: A data mining approach in healthcare applications. In:
Borah, S., Emilia Balas, V., & Polkowski, Z. (Eds.), Advances in Data Science and Management.
Lecture Notes on Data Engineering and Communications Technologies (Vol. 37). Singapore:
Springer.
21. Erkan, U. (2020). A precise and stable machine learning algorithm: eigenvalue classifica-
tion (EigenClass). Neural Computing and Applications. https://doi.org/10.1007/s00521-020-
05343-2(Inpress)
22. Fowdur, T. P., Beeharry, Y., Hurbungs, V., Bassoo, V., & Ramnarain-Seetohul, V. (2018). Big
data analytics with machine learning tools. In: Dey, N., Hassanien, A., Bhatt, C., Ashour, A.,
& Satapathy, S. (Eds.), Internet of Things and Big Data Analytics Toward Next-Generation
Intelligence. Studies in Big Data (Vol. 30). Cham: Springer.
Implementing Multilevel Graphical
Password Authentication Scheme
in Combination with One Time Password

T. Srinivasa Ravi Kiran, A. Srisaila, and A. Lakshmanarao

Abstract At present, everyone makes instantaneous digital transaction by using


applications like PhonePe, Google pay etc. Password is necessary to prove the user
authentication. At the same time, user authentication is also verified by validating
one time password. A shoulder surfer may have the possibility to crack the password
during entry time. In this paper, we present a novel, clear, recall-based graphical
password scheme where the user is required to figure out the triangle for some exact
permutations of the password on the active display. The token holder is likely to pick
the correct password permutations in the expected order cyclically per every login
endeavor. For example, the user must select the first permutation of the password and
that permutation must form a triangle on the visual display. After the correct triangle
is identified in the visual display, a one time password is sent to the user. The user is
required to enter the one time password in the text box given in the visual display.
If the one time password is correct then the login attempt is successful; otherwise,
the login attempt is failed. Likewise, the user is instructed to identify triangles with
other permutations of the password for the remaining login attempts.

Keywords Password · Authentication · Security · Shoulder surfing · Visual


display · One time password · Triangle

T. Srinivasa Ravi Kiran (B)


Department of Computer Science, P.B.Siddhartha College of Arts & Science, 520010 Vijayawada,
Andhra Pradesh, India
e-mail: [email protected]
A. Srisaila
Department of Information Technology, V.R Siddhartha Engineering College, 520007
Vijayawada, Andhra Pradesh, India
A. Lakshmanarao
Department of Information Technology, Aditya Engineering College, Surampalem, Kakinada,
Andhra Pradesh, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 11
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_2
12 T. Srinivasa Ravi Kiran et al.

1 Introduction

Even though the technique of using textual passwords is insecure, the majority of
the digital systems are still using textual passwords to implement their security. To
overcome the vulnerabilities of using textual-based passwords, graphical passwords
provide a promising solution to implement better security [1]. A graphical password
is an authentication method that facilitates the user to select from images or symbols
in a precise order on the existing graphical user interface (GUI). People are using
passwords commonly, many times to facilitate online banking transactions, for the
access of social networks and to verify their emails [2].
The most popular way of identifying user authenticity is the use of one time pass-
word [3]. One time passwords are intended to be a top-secret between two parties
and can be used once within the limited time lapse. This prevents someone from
looking over your shoulder and trying to use it later for network sniffing and from
spyware attacks [4]. The password strength of a graphical password scheme is more
than the text-based schemes, and as a result, it provides a superior level of secu-
rity. Owing to this benefit, there is an increasing interest in graphical password. In
graphical password schemes, images or symbols are used as an alternative to alphanu-
merical passwords [5]. The graphical password schemes that are offered protect the
user and/or application privileges from the attempts of hacking [6]. According to
Wiedenbeck et al. [7] unforgettable places depend on the type of image and the
defined sequence of click locations. Chopra et al. [8] present potential outcomes in
terms of security, ease of use and memorability.

2 Related Works

To authenticate the user credentials, reference [9] proposed a click-based graphical


password system. The user is instructed to click a well-ordered sequence of five pass
points on the images of the interface presented. The authentication of the user fails
if he could not be able to choose well-ordered sequence of pass points. As per the
instructions of Jermyn et al. [1], the client is required to “Draw A Secret” (DAS) on the
grid of the accessible interface. The password is the clear-cut pattern presented in a grid.
This scheme is keystroke-independent and allows the user to draw the pattern without
difficulty. Sobrado and Birget [10] talk about “Triangle Scheme” where a number of
pass-objects are displayed on the interface along with the “decoy” objects. The client
chooses the pass objects during the initial sign-up stage. At the authentication phase,
the client must find out the pass objects and it is mandatory to click inside the convex
hull framed by all the pass objects. Since the password space of the hull is vast, the
chance of compromising the password is very low.
The S3PAS scheme was proposed by Zhao et al. [5]. A 10 × 10 fixed grid
containing 94 printable characters consisting of alphabets, digits and special symbols
is shown to the user. The password length is a predetermined string of four charac-
ters such that any three-character combination can form a triangle on the accessible
Implementing Multilevel Graphical Password Authentication … 13

grid. For example, if the password selected is “6Tg:” then choose the combinations,
viz., “6Tg”, “Tg6”, “g:6” and “:6T”. The combinations chosen successfully form
a triangular pattern on the existing interface independently. The user is required to
identify the triangle with the chosen password combinations in the specified order
for authentication. In line with Kiran et al. [11] the users are instructed to recog-
nize quadruplets formed from the password blends on the existing interface from the
password chosen at the time of registration.
Kiran et al. [11] presented a graphical password authentication scheme resistant to
peeping attack which begins with recognizing quadruplets formed from the password
combination chosen from the client, starting with the first character and rotating one
character toward the right in a way that the last character in the password combination
comes into view as the first character of the password combination. For instance, if
the password chosen at the time of registration is “Sa3T:” then the quadruplets formed
are “Sa3TS”, “a3T:a”, “3T:S3”, “T:SaT” and “:Sa3:”. It is compulsory for the user
to select the arrangement of the password blends in the expected fashion rotated for
every login attempt. Ravi Kiran et al. [12] presented a new, interactive, recall-based
scheme where the user starts with identifying the required transformation applied
to every individual character of password amalgamation. Prasad et al. [3] illustrate
that an authentication schema resistant from peeping attack starts with identifying
triangle formed by clicking on the buttons of the interface have colors red, green,
blue and red of the grid, respectively.
Rao et al. [13] proposed the PPC schema. In this, the user is instructed to symbolize
a rectangle on the accessible interface. Any character existing on the edge of the
rectangle may be the pass character. Jusoh et al. [14] exemplify a relative study
of recognition-based authentication algorithms. The comparisons are based on very
important characteristics like usability, weaknesses and security attacks. For better
usability, Stobert et al. [15] suggest that many click-points could be used on smart-
phone displays since it is very difficult to display larger image sizes. Hemavathy
et al. [16] proposed an innovative graphical password authentication system to resist
shoulder surfing. As a part of authentication, the users are instructed to choose the
appropriate horizontal and vertical lines on the pass matrix to find out the pass objects.
Khadke et al. [17] conveyed that the security of the graphical password can be
imposed at multiple levels. Katsini et al. [18] discussed implications to improve
recognition-based graphical passwords by adopting personalization techniques
derived from individual cognitive characteristics.

3 Projected Scheme

In the existing interface, we make use of a 10 × 10 table formed with 94 printable


character set with spaces as shown in Fig. 1.
Password amalgamations are verified with mouse taps on individual cells of the
grid. The precise plan begins with identifying the triangle shape by tapping on the
cells on display. The recognition of the required triangle for that login attempt gener-
ates one time password to the hand-held device. If the user is able to verify the one
14 T. Srinivasa Ravi Kiran et al.

Fig. 1 Projected display

time password, then the login attempt is successful. Suppose a triangle does not form,
then that blend can be overlooked. In previous studies, verification is at a single level
only, that is, the user is expected to identify the required triangle with password
combinations. However, in the proposed work, novelty is achieved in a manner that
the user authentication is carried out at multiple levels in such a way that the user
is expected to validate one time password after the required triangle is identified for
better security.
Permutations of secrete phrase are input by four taps on the displayed screen.
For example, if the secret phrase selected at the sign-up time is “g5:G”, at that point
the plausible triangle shaped by tapping on the cells are “g5:g”, “5:G5”, “:Gg:” and
“Gg5G”, that is, pivoting unique secret key character blend one position from left
to right every time and the first character must be the same as the last character.
The users are instructed to enter the combination of password blend cyclically in the
expected order for every login stab.
Algorithm

1. Start.
2. Register a password of length four.
3. Select five distinct four-character amalgamations of registered passwords,
pivoting from left to right.
4. The user makes an entry attempt by selecting the password amalgamation in the
predicted way on the accessible display.
Implementing Multilevel Graphical Password Authentication … 15

5. If the client opts for correct password amalgamation in an expected manner and
it forms a triangle, then a one time password is sent to the hand-held device and
that one time password is verified on the interface.
6. If the one time password entered on the interface is correct, the login attempt
is successful; otherwise, the login attempt is failed, so evaluate the next
amalgamation.
7. In case if the client does not choose a secret token combination in the expected
style or does not form a triangle shape, the entry process is obstructed, so
disregard that amalgamation of secret tokens and opt next amalgamation of
secret tokens in such a way that all the amalgamations of secret word tokens
must form a triangle.
8. Stop.

Flowchart:

Star

Register a password.

Select four distinct password blends from


the password registered.

n:=1 No Yes
Is n>4

User makes nth login

n:=n+1

Is the nth
password blend No Login
forms triangle. attempt
failed.

Yes
Send one time password (OTP) for verification.

Is OTP is No
verified?

Yes
Login attempt is successful.

Stop
16 T. Srinivasa Ravi Kiran et al.

Fig. 2 First phase of login is


verified by clicking on the
cells “g5:g” and also by
verifying one time password
“0783”

Step 1: For the first instance, the login entry is valid for the amalgamation “g5:g”
and for one time password “0783” (Fig. 2).
Step 2: One time password is not generated and the entry is foiled for sequence
“g5:g” at second entry as the client chooses wrong attempt (Fig. 3).
Step 3: For the second instance, the login entry is valid for the password blend “5:G5”
and for one time password “1508” (Fig. 4).
Step 4: For the third instance, the login entry is valid for the password blend “:Gg:”
and for one time password “4545” (Fig. 5).
Step 5: For the fourth instance, the login entry is valid for the password blend “Gg5G”
and for one time password “9412” (Fig. 6).
Step 6: If the first character is different from the terminal character, in such a case
the specific password amalgamation can be ignored (Fig. 7).
For example, if the user clicks on the buttons containing the letters “g5:G”, respec-
tively, the initial token “g” is not the same as the terminal token “G” and the pattern
triangle cannot be formed. In such a case the amalgamation is disregarded. Select
correct amalgamation of password blend in such a way that the triangle is formed.
Implementing Multilevel Graphical Password Authentication … 17

Fig. 3 Login is denied since


the user selects the wrong
password blend for login
entry

Fig. 4 During the second


phase, the entry is verified by
clicking on the cells “5:G5”
and also by verifying one
time password “1508”
18 T. Srinivasa Ravi Kiran et al.

Fig. 5 At third login


instance, the login entry is
passed for password
combination “:Gg:” and for
one time password 4545

Fig. 6 At the fourth stage,


login is successful by
clicking on the cells “Gg5G”
and by verifying one time
Implementing Multilevel Graphical Password Authentication … 19

Fig. 7 Triangle not formed


by selecting buttons “g5:G”.
Amalgamation is ignored

4 Results and Usability Study

The results were confident and the client’s predictable triangles were formed by
clicking on the cells in an exact manner. It takes 37 ms to identify the required
triangle and to verify one time password as shown in the following four tables.
Peeping attacks were not possible with the proposed scheme since the client taps on
visible tokens are in random order (Tables 1, 2, 3, 4, 5, 6, 7 and 8).

Table 1 Login table for first pass


S. no. Password Pass 1 Time to verify One time Time to enter one Login time for
triangle for pass 1 password time password for pass 1 in
in milliseconds pass 1 in milliseconds
milliseconds
1 g5:G 5:G5 23 1508 11 34
2 3U75 U75U 26 1134 13 35
3 tg + 8 G+8g 24 6534 12 34
4 zQ2c Q2cQ 25 8620 12 37
5 8I_i I_iI 23 0634 14 38
Login time in milliseconds for first pass using i5 processor 36
20 T. Srinivasa Ravi Kiran et al.

Table 2 Login table for second pass


S. no. Password Pass 2 Time to verify One time Time to enter one Login time for
triangle for pass 2 password time password for pass 2 in
in milliseconds pass 2 in milliseconds
milliseconds
1 g5:G :Gg: 24 4545 12 36
2 3U75 7537 25 0536 12 37
3 tg + 8 +8t+ 25 9735 13 38
4 zQ2c 2cz2 26 9064 14 40
5 8I_i _i8_ 24 7896 13 37
Login time in milliseconds for second pass using i5 processor 38

Table 3 Login table for third pass


S. no. Password Pass 3 Time to verify One time Time to enter one Login time for
triangle for pass 3 password time password for pass 3 in
in milliseconds pass 3 in milliseconds
milliseconds
1 g5:G Gg5G 23 3456 11 34
2 3U75 53U5 25 1813 13 38
3 tg + 8 8tg8 25 2845 12 37
4 zQ2c czQc 24 1745 12 36
5 8I_i I8Ii 23 0073 12 35
Login time in milliseconds for third pass using i5 processor 36

Table 4 Login table for fourth pass


S. no. Password Pass 4 Time to verify One time Time to enter one Login time for
triangle for pass 4 password time password for pass 4 in
in milliseconds pass 4 in milliseconds
milliseconds
1 g5:G 5:G5 24 9412 12 36
2 3U75 53U5 23 1234 11 34
3 tg + 8 8tg8 23 9667 13 36
4 zQ2c cZQc 25 7845 12 37
5 8I_i I8Ii 24 0556 13 37
Login time in milliseconds for fourth pass using i5 processor 36

Table 5 Average login time for four passes


S. no. Pass Average login time for all four passes
1 Pass 1 36
2 Pass 2 36
3 Pass 3 38
4 Pass 4 36
Login time in milliseconds for all four passes using i5 37
processor
Table 6 A 12-point efficiency scale
S. no. Reorganization User Features
based schema Satisfaction
Mouse Meaningful Assignable Memorability Simple Nice Training Pleasant password Selecting Use of on Multilevel
usage image steps Interface Simply Picture permutations of e time security
triangle password
pattern
1 Blonder Y Y Y N Y Y Y Y N N N N
2 Jermyn Y N Y Y Y Y Y Y N N N N
3 Stallings Y Y Y Y Y Y Y Y N N N N
4 Ziran Zheng Y Y Y Y Y Y Y Y N N N N
5 S3PAS Y Y Y Y Y Y Y Y N Y N N
6 A Novel GP Y Y Y Y Y Y Y Y Y N N N
Implementing Multilevel Graphical Password Authentication …

Scheme
7 A Robust Y Y Y Y Y Y Y Y Y N N N
8 Multilevel Y Y Y Y Y Y Y Y Y Y Y Y
Y : Yes N : No
21
22 T. Srinivasa Ravi Kiran et al.

Table 7 A 12-point
S. no. Recognition schema Scale of efficiency
efficiency scale
1 Blonder 7
2 Jermyn 7
3 Stallings 8
4 Ziran Zheng 8
5 S3PAS 9
6 A Novel GP 9
7 A Robust 9
8 Multilevel 12

5 Comparative Analysis

The visual interface is a 10 × 10 grid where the user is educated to form a triangle with
password blends considered from the password chosen at the time of registration.
At the same time, the user is instructed to enter one time password on the interface
once the password blend is validated.
This type of multilevel evaluation is the first attempt in a password authentication
system. I have analyzed eight schemas of graphical password authentications. Among
all these schemas only four have a look at the approach of taking into consideration
the password blends from the original password. The schemas of the other authors
also did not tell the robustness of the original password and password blends.
In this proposed schema, the robustness of the password and password blends have
been correctly defined and fixed at 99.61% and 97.65%, respectively. The password
and password blends reduce the probability of cracking by the shoulder surfers since
he/she needs to validate every password blend with the onetime password (Figs. 8
and 9).

6 Conclusion

The existing scheme focused on the functioning of the user interface based on static
grids. It is possible to improve security by designing dynamic graphical grids. The
address space for passwords can be improved by increasing the grid size by rows as
well as columns.
Table 8 A comparative analysis of innovative graphical password schema
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
1 Blonder N N N N N Password Spyware Brute force NS NS NS
space is Dictionary Shoulder surfing
small
Password Description Guessing
strength is
not
specified
2 Jermyn N N 4 × 4 grid N N Password Dictionary Shoulder surfing NS NS NS
space is Description
small
Password Spyware Guessing
strength is Brute force
Implementing Multilevel Graphical Password Authentication …

not
specified
3 Stallings N N NS N N Password NS Dictionary NS NS NS
strength is Spyware
not
specified
4 Ziran N N 5 × 5 grid N N Password NS Brute force NS NS NS
zheng robustness Dictionary
is not
specified Guessing

(continued)
23
Table 8 (continued)
24

Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
Password
strength is
not
specified
5 S3-pass Y Y 10 × 10 grid Y N Password NS Shoulder-surfing NS NS NS
strength is
not
specified
Lengthier Hidden-camera
login Spyware
processes
Hidden-camera
Spyware
6 A novel Y Y 10 × 10 grid Y N NS NS Shoulder-surfing 38.46 99.96% 99.23%
graphical Hidden-camera
password
scheme Random click
attacks
7 A robust Y Y 14 × 14 grid N N NS NS Shoulder-surfing 44 99.96% 99.23%
Hidden camera
Spyware
(continued)
T. Srinivasa Ravi Kiran et al.
Table 8 (continued)
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
8 Multilevel Y Y 10 × 10 grid Y Y NS NS Brute force 37 99.61% 97.65%
Shoulder surfing
Guessing
Dictionary
Hidden camera
Spyware
NOTE: Y-Yes, N-No, NS-Not Specified
Implementing Multilevel Graphical Password Authentication …
25
Discovering Diverse Content Through
Random Scribd Documents
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like