Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

International Conference on Innovative

Computing and Communications


Proceedings of ICICC 2021 Volume 1
Advances in Intelligent Systems and
Computing 1387 Ashish Khanna
(Editor)
Visit to download the full and correct content document:
https://ebookmeta.com/product/international-conference-on-innovative-computing-and
-communications-proceedings-of-icicc-2021-volume-1-advances-in-intelligent-system
s-and-computing-1387-ashish-khanna-editor/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

International Conference on Innovative Computing and


Communications Proceedings of ICICC 2021 Volume 3 1st
Edition Ashish Khanna

https://ebookmeta.com/product/international-conference-on-
innovative-computing-and-communications-proceedings-of-
icicc-2021-volume-3-1st-edition-ashish-khanna/

Intelligent Computing: Proceedings of the 2021


Computing Conference, Volume 1 1st Edition Kohei Arai

https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-1-1st-edition-kohei-arai/

Intelligent Methods Systems and Applications in


Computing Communications and Control 9th International
Conference on Computers Communications and in
Intelligent Systems and Computing 1435 1st Edition
Simona Dzitac (Editor)
https://ebookmeta.com/product/intelligent-methods-systems-and-
applications-in-computing-communications-and-control-9th-
international-conference-on-computers-communications-and-in-
intelligent-systems-and-computing-1435-1st-edition/

Intelligent Computing Proceedings of the 2021 Computing


Conference Volume 2 Lecture Notes in Networks and
Systems 284 Kohei Arai (Editor)

https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-2-lecture-notes-in-
networks-and-systems-284-kohei-arai-editor/
Intelligent Computing Proceedings of the 2021 Computing
Conference Volume 3 Lecture Notes in Networks and
Systems 285 Kohei Arai (Editor)

https://ebookmeta.com/product/intelligent-computing-proceedings-
of-the-2021-computing-conference-volume-3-lecture-notes-in-
networks-and-systems-285-kohei-arai-editor/

Innovative Computing: Proceedings of the 4th


International Conference on Innovative Computing (IC
2021) (Lecture Notes in Electrical Engineering, 791)
Jason C. Hung (Editor)
https://ebookmeta.com/product/innovative-computing-proceedings-
of-the-4th-international-conference-on-innovative-computing-
ic-2021-lecture-notes-in-electrical-engineering-791-jason-c-hung-
editor/

Soft Computing for Problem Solving Proceedings of


SocProS 2020 Volume 1 Advances in Intelligent Systems
and Computing 1392 Aruna Tiwari (Editor)

https://ebookmeta.com/product/soft-computing-for-problem-solving-
proceedings-of-socpros-2020-volume-1-advances-in-intelligent-
systems-and-computing-1392-aruna-tiwari-editor/

Soft Computing for Security Applications Proceedings of


ICSCS 2021 Advances in Intelligent Systems and
Computing 1397 G. Ranganathan (Editor)

https://ebookmeta.com/product/soft-computing-for-security-
applications-proceedings-of-icscs-2021-advances-in-intelligent-
systems-and-computing-1397-g-ranganathan-editor/

Computational Vision and Bio Inspired Computing


Proceedings of ICCVBIC 2021 Advances in Intelligent
Systems and Computing 1420 S. Smys (Editor)

https://ebookmeta.com/product/computational-vision-and-bio-
inspired-computing-proceedings-of-iccvbic-2021-advances-in-
intelligent-systems-and-computing-1420-s-smys-editor/
Advances in Intelligent Systems and Computing 1387

Ashish Khanna · Deepak Gupta ·


Siddhartha Bhattacharyya ·
Aboul Ella Hassanien · Sameer Anand ·
Ajay Jaiswal Editors

International
Conference
on Innovative
Computing and
Communications
Proceedings of ICICC 2021, Volume 1
Advances in Intelligent Systems and Computing

Volume 1387

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Indexed by DBLP, INSPEC, WTI Frankfurt eG, zbMATH, Japanese Science and
Technology Agency (JST).
All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/11156


Ashish Khanna · Deepak Gupta ·
Siddhartha Bhattacharyya · Aboul Ella Hassanien ·
Sameer Anand · Ajay Jaiswal
Editors

International Conference
on Innovative Computing
and Communications
Proceedings of ICICC 2021, Volume 1
Editors
Ashish Khanna Deepak Gupta
Maharaja Agrasen Institute of Technology Department of Computer Science
Rohini, Delhi, India and Engineering
Maharaja Agrasen Institute of Technology
Siddhartha Bhattacharyya Rohini, Delhi, India
Department of Computer Science
and Engineering Aboul Ella Hassanien
CHRIST (Deemed to be University) Faculty of Computers and Information
Bangalore, Karnataka, India Cairo University
Giza, Egypt
Sameer Anand
Department of Computer Science Ajay Jaiswal
Shaheed Sukhdev College of Business Department of Computer Science
Studies Shaheed Sukhdev College of Business
Rohini, Delhi, India Studies
Rohini, Delhi, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-16-2593-0 ISBN 978-981-16-2594-7 (eBook)
https://doi.org/10.1007/978-981-16-2594-7

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Dr. Ashish Khanna would like to dedicate this
book to his mentors Dr. A. K. Singh and
Dr. Abhishek Swaroop for their constant
encouragement and guidance and his family
members including his mother, wife, and kids.
He would also like to dedicate this work to
his (Late) father Sh. R. C. Khanna with
folded hands for his constant blessings.
Dr. Deepak Gupta would like to dedicate this
book to his father Sh. R. K. Gupta, his mother
Smt. Geeta Gupta for their constant
encouragement, his family members
including his wife, brothers, sisters, kids, and
to my students close to my heart.
Prof. (Dr.) Siddhartha Bhattacharyya would
like to dedicate this book to Late Kalipada
Mukherjee and Late Kamol Prova Mukherjee.
Prof. (Dr.) Aboul Ella Hassanien would like
to dedicate this book to his wife Nazaha
Hassan.
Dr. Sameer Anand would like to dedicate this
book to his Dada Prof. D. C. Choudhary, his
beloved wife Shivanee, and his son Shashwat.
Dr. Ajay Jaiswal would like to dedicate this
book to his father Late Prof. U. C. Jaiswal,
his mother Brajesh Jaiswal, his beloved wife
Anjali, his daughter Prachii, and his
son Sakshaum.
ICICC-2021 Steering Committee Members

Patrons:

Dr. Poonam Verma, Principal, SSCBS, University of Delhi


Prof. Dr. Pradip Kumar Jain, Director, National Institute of Technology Patna, India

General Chairs:

Prof. Dr. Siddhartha Bhattacharyya, Christ University, Bangalore


Prof. Valentina Emilia Balas, Aurel Vlaicu University of Arad, Romania
Dr. Prabhat Kumar, National Institute of Technology Patna, India

Honorary Chairs:

Prof. Dr. Janusz Kacprzyk, FIEEE, Polish Academy of Sciences, Poland


Prof. Dr. Vaclav Snasel, Rector, VSB-Technical University of Ostrava, Czech
Republic

Conference Chairs:

Prof. Dr. Aboul Ella Hassanien, Cairo University, Egypt


Prof. Dr. Joel J. P. C. Rodrigues, National Institute of Telecommunications (Inatel),
Brazil
Prof. Dr. R. K. Agrawal, Jawaharlal Nehru University, Delhi

vii
viii ICICC-2021 Steering Committee Members

Technical Program Chairs:

Prof. Dr. Victor Hugo C. de Albuquerque, Universidade de Fortaleza, Brazil


Prof. Dr. A. K. Singh, National Institute of Technology, Kurukshetra
Prof. Dr. Anil K. Ahlawat, KIET Group of Institutes, Ghaziabad

Editorial Chairs:

Prof. Dr. Abhishek Swaroop, Bhagwan Parshuram Institute of Technology, Delhi


Dr. Arun Sharma, Indira Gandhi Delhi Technical University for Women, Delhi
Prerna Sharma, Maharaja Agrasen Institute of Technology (GGSIPU), New Delhi

Conveners:

Dr. Ajay Jaiswal, SSCBS, University of Delhi


Dr. Sameer Anand, SSCBS, University of Delhi
Dr. Ashish Khanna, Maharaja Agrasen Institute of Technology (GGSIPU), New
Delhi
Dr. Deepak Gupta, Maharaja Agrasen Institute of Technology (GGSIPU), New Delhi
Dr. Gulshan Shrivastava, National Institute of Technology Patna, India

Publication Chairs:

Prof. Dr. Neeraj Kumar, Thapar Institute of Engineering and Technology


Dr. Hari Mohan Pandey, Edge Hill University, UK
Dr. Sahil Garg, École de technologie supérieure, Université du Québec, Montreal,
Canada
Dr. Vicente García Díaz, University of Oviedo, Spain

Publicity Chairs:

Dr. M. Tanveer, Indian Institute of Technology, Indore, India


Dr. Jafar A. Alzubi, Al-Balqa Applied University, Salt—Jordan
Dr. Hamid Reza Boveiri, Sama College, IAU, Shoushtar Branch, Shoushtar, Iran
Prof. Med Salim Bouhlel, Sfax University, Tunisia
ICICC-2021 Steering Committee Members ix

Co-Convener:

Mr. Moolchand Sharma, Maharaja Agrasen Institute of Technology, India

Organizing Chairs:

Dr. Kumar Bijoy, SSCBS, University of Delhi


Dr. Rishi Ranjan Sahay, SSCBS, University of Delhi
Dr. Amrina Kausar, SSCBS, University of Delhi
Dr. Abhishek Tandon, SSCBS, University of Delhi

Organizing Team:

Dr. Gurjeet Kaur, SSCBS, University of Delhi


Dr. Aditya Khamparia, Lovely Professional University, Punjab, India
Dr. Abhimanyu Verma, SSCBS, University of Delhi
Dr. Onkar Singh, SSCBS, University of Delhi
Dr. Kalpna Sagar, KIET Group of Institutes, Ghaziabad
Dr. Purnima Lala Mehta, Assistant Professor, IILM
Dr. Suresh Chavhan, Vellore Institute of Technology, Vellore, India
Dr. Mona Verma, SSCBS, University of Delhi
Preface

We hereby are delighted to announce that Shaheed Sukhdev College of Business


Studies, New Delhi, in association with the National Institute of Technology Patna
and the University of Valladolid, Spain, has hosted the eagerly awaited and much-
coveted International Conference on Innovative Computing and Communication
(ICICC-2021) in Hybrid Mode. The fourth version of the conference was able to
attract a diverse range of engineering practitioners, academicians, scholars, and
industry delegates, with the reception of abstracts including more than 3,600 authors
from different parts of the world. The committee of professionals dedicated to the
conference is striving to achieve a high-quality technical program with tracks on Inno-
vative Computing, Innovative Communication Network and Security, and Internet of
Things. All the tracks chosen in the conference are interrelated and are very famous
among present-day research community. Therefore, a lot of research is happening in
the above-mentioned tracks and their related sub-areas. As the name of the conference
starts with the word “innovation,” it has targeted out of box ideas, methodologies,
applications, expositions, surveys, and presentations helping to upgrade the current
status of research. More than 900 full-length papers have been received, among which
the contributions are focused on theoretical, computer simulation-based research,
and laboratory-scale experiments. Among these manuscripts, 210 papers have been
included in the Springer proceedings after a thorough two-stage review and editing
process. All the manuscripts submitted to the ICICC-2021 were peer-reviewed by at
least two independent reviewers, who were provided with a detailed review proforma.
The comments from the reviewers were communicated to the authors, who incorpo-
rated the suggestions in their revised manuscripts. The recommendations from two
reviewers were taken into consideration while selecting a manuscript for inclusion in
the proceedings. The exhaustiveness of the review process is evident, given the large
number of articles received addressing a wide range of research areas. The stringent
review process ensured that each published manuscript met the rigorous academic and
scientific standards. It is an exalting experience to finally see these elite contributions
materialize into three book volumes as ICICC-2021 proceedings by Springer enti-
tled “International Conference on Innovative Computing and Communications.” The
articles are organized into three volumes in some broad categories covering subject
matters on machine learning, data mining, big data, networks, soft computing, and
xi
xii Preface

cloud computing, although given the diverse areas of research reported might not
have been always possible.
ICICC-2021 invited seven keynote speakers, who are eminent researchers in the
field of computer science and engineering, from different parts of the world. In addi-
tion to the plenary sessions on each day of the conference, ten concurrent technical
sessions are held every day to assure the oral presentation of around 210 accepted
papers. Keynote speakers and session chair(s) for each of the concurrent sessions
have been leading researchers from the thematic area of the session. A technical
exhibition is held during the 2 days of the conference, which has put on display the
latest technologies, expositions, ideas, and presentations. The research part of the
conference was organized in a total of 28 special sessions and 3 international work-
shops. These special sessions and international workshops provided the opportunity
for researchers conducting research in specific areas to present their results in a more
focused environment.
An international conference of such magnitude and release of the ICICC-2021
proceedings by Springer has been the remarkable outcome of the untiring efforts
of the entire organizing team. The success of an event undoubtedly involves the
painstaking efforts of several contributors at different stages, dictated by their devo-
tion and sincerity. Fortunately, since the beginning of its journey, ICICC-2021 has
received support and contributions from every corner. We thank them all who have
wished the best for ICICC-2021 and contributed by any means toward its success. The
edited proceedings volumes by Springer would not have been possible without the
perseverance of all the steering, advisory, and technical program committee members.
All the contributing authors owe thanks to the organizers of ICICC-2021 for their
interest and exceptional articles. We would also like to thank the authors of the papers
for adhering to the time schedule and for incorporating the review comments. We wish
to extend my heartfelt acknowledgment to the authors, peer-reviewers, committee
members, and production staff whose diligent work put shape to the ICICC-2021
proceedings. We especially want to thank our dedicated team of peer-reviewers who
volunteered for the arduous and tedious step of quality checking and critique on
the submitted manuscripts. We wish to thank my faculty colleagues Mr. Moolchand
Sharma and Ms. Prerna Sharma for extending their enormous assistance during the
conference. The time spent by them and the midnight oil burnt is greatly appreciated,
for which we will ever remain indebted. The management, faculties, administrative,
and support staff of the college have always been extending their services whenever
needed, for which we remain thankful to them.
Lastly, we would like to thank Springer for accepting our proposal for publishing
the ICICC-2021 conference proceedings. Help received from Mr. Aninda Bose, the
acquisition senior editor, in the process has been very useful.

Delhi, India Ashish Khanna


Rohini, India Deepak Gupta
Organizers, ICICC-2021
Contents

Building Virtual High-Performance Computing Clusters


with Docker: An Application Study at the University of Economics
Ho Chi Minh City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Quoc Hung Nguyen, Thanh Le, Ha Quang Dinh Vo, and Viet Phuong Truong
Implementing Multilevel Graphical Password Authentication
Scheme in Combination with One Time Password . . . . . . . . . . . . . . . . . . . . 11
T. Srinivasa Ravi Kiran, A. Srisaila, and A. Lakshmanarao
State of Geographic Information Science (GIS), Spatial Analysis
(SA) and Remote Sensing (RS) in India: A Machine Learning
Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Shruti Sachdeva and Bijendra Kumar
Application of Noise Reduction Techniques to Improve Speaker
Verification to Multi-Speaker Text-to-Speech Input . . . . . . . . . . . . . . . . . . . 43
Md. Masudur Rahman, Sk. Arifuzzaman Pranto,
Romana Rahman Ema, Farheen Anfal, and Tajul Islam
Utilization of Machine Learning Algorithms for Thyroid Disease
Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Md. Shahajalal, Md. Masudur Rahman, Sk. Arifuzzaman Pranto,
Romana Rahman Ema, Tajul Islam, and M. Raihan
Detection of Hepatitis C Virus Progressed Patient’s Liver
Condition Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Ferdib-Al-Islam and Laboni Akter
Energy Performance Prediction of Residential Buildings Using
Nonlinear Machine Learning Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
D. Senthil Kumar, D. George Washington, A. K. Reshmy,
and M. Noorunnisha
Cloud Image Prior: Single Image Cloud Removal . . . . . . . . . . . . . . . . . . . . 95
Anirudh Maiya and S. S. Shylaja

xiii
xiv Contents

Prioritizing Python Code Smells for Efficient Refactoring Using


Multi-criteria Decision-Making Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Aakanshi Gupta, Deepanshu Sharma, and Kritika Phulli
Forecasting Rate of Spread of Covid-19 Using Linear Regression
and LSTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Ashwin Goyal, Kartik Puri, Rachna Jain, and Preeti Nagrath
Employment of New Cryptography Algorithm by the Use of Spur
Gear Dimensional Formula and NATO Phonetic Alphabet . . . . . . . . . . . . 135
Sukhwant Kumar, Sudipa Bhowmik, Priyanka Malakar, and Pushpita Sen
Security Framework for Enhancing Security and Privacy
in Healthcare Data Using Blockchain Technology . . . . . . . . . . . . . . . . . . . . . 143
A. Sivasangari, V. J. K. Kishor Sonti, S. Poonguzhali, D. Deepa,
and T. Anandhi
American Sign Language Identification Using Hand Trackpoint
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Yugam Bajaj and Puru Malhotra
Brain Tumor Detection Using Deep Neural Network-Based
Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Ambeshwar Kumar and R. Manikandan
Detecting Diseases in Mango Leaves Using Convolutional Neural
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Rohan Sharma, Kartik Suvarna, Shreyas Sudarsan, and G. P. Revathi
Recommending the Title of a Research Paper Based on Its Abstract
Using Deep Learning-Based Text Summarization Approaches . . . . . . . . . 193
Sheetal Bhati, Shweta Taneja, and Pinaki Chakraborty
An Empirical Analysis of Survival Predictors for Cancer Using
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Ishleen Kaur, M. N. Doja, and Tanvir Ahmad
Epitope Prediction for Peptide Vaccine Against Chikungunya
and Dengue Virus, Using Immunoinformatics Tools . . . . . . . . . . . . . . . . . . . 213
Krishna S. Gayatri, Geethu Gopinath, Bhawana Rathi, and Anupama Avasthi
Airflow Control and Gas Leakage Detection System . . . . . . . . . . . . . . . . . . 239
J. S. Vimali, Bevish Jinila, S. Gowri, Sivasangari, Ajitha, and Jithina Jose
Impact of Lightweight Machine Learning Models for Speech
Emotion Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Swaraj Dhondge, Rashmi Shewale, Madhura Satao, and Jayashree Jagdale
Impact of COVID-19 Pandemic on Mental Health Using Machine
Learning and Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Rakshanda Naiem, Jasanpreet kaur, Shruti Mishra, and Ankur Saxena
Contents xv

Identification of Student Group Activities in Educational Institute


Using Cognitive Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Ganeshayya Shidaganti, Ikesh Yadav, Himanshu Dagdi, Jagdish, and Aman
A Machine Learning Model for Automated Classification of Sleep
Stages using Polysomnography Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Santosh Kumar Satapathy, D. Loganathan, S. Sharathkumar,
and Praveena Narayanan
An Efficient Approach for Brain Tumor Detection Using Deep
Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
R. V. Belfin, J. Anitha, Aishwarya Nainan, and Lycia Thomas
Real-Time Detection of Student Engagement: Deep
Learning-Based System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Zeyad A. T. Ahmed, Mukti E. Jadhav, Ali Mansour Al-madani,
Mohammed Tawfik, Saleh Nagi Alsubari, and Ahmed Abdullah A. Shareef
Bangla Handwritten Digit Recognition Based on Different Pixel
Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Forhad An Naim
Information Extraction and Sentiment Analysis to Gain Insight
into the COVID-19 Crisis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Sandhya Avasthi, Ritu Chauhan, and Debi Prasanna Acharjya
Gender Recognition Using Deep Leering Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Belal Alsellami and Prapti D. Deshmukh
Detection of COVID-19 Using EfficientNet-B3 CNN and Chest
Computed Tomography Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Sahar Alquzi, Haikel Alhichri, and Yakoub Bazi
Comparative Study on Identification and Classification of Plant
Diseases with the Support of Transfer Learning . . . . . . . . . . . . . . . . . . . . . . 375
Aditi Singh and Harjeet Kaur
Cross Channel Scripting Attacks (XCS) in Web Applications . . . . . . . . . . 387
R. Shashidhara, V. Kantharaj, K. R. Bhavya, and S. C. Lingareddy
Localization-Based Multi-Hop Routing in Wireless Body Area
Networks for Health Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Subba Reddy Chavva and Ravi Sankar Sangam
Analyzing Security Testing Tools for Web Applications . . . . . . . . . . . . . . . . 411
Amel F. Aljebry, Yasmine M. Alqahtani, and Norrozila Sulaiman
A Study on Password Security Awareness in Constructing Strong
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Norrozila Sulaiman
xvi Contents

Minimum Pearson Distance Detection for MIMO-OFDM Systems . . . . . 431


H. A. Anoop and Prerana G. Poddar
Study on Emerging Machine Learning Trends
on Nanoparticles—Nanoinformatics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
B. Lavanya and G. Sasipriya
A Review of the Oversampling Techniques in Class Imbalance
Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Shweta Sharma, Anjana Gosain, and Shreya Jain
Eye Blink-Based Liveness Detection Using Odd Kernel Matrix
in Convolutional Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
N. Nanthini, N. Puviarasan, and P. Aruna
Predicting Student Potential Using Machine Learning Techniques . . . . . 485
Shashi Sharma, Soma Kumawat, and Kumkum Garg
Routing Based on Spectrum Quality and Availability in Wireless
Cognitive Radio Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Veeranna Gatate and Jayashree Agarkhed
A Review on Scope of Distributed Cloud Environment
in Healthcare Automation Security and Its Feasibility . . . . . . . . . . . . . . . . . 509
Mirza Moiz Baig and Shrikant V. Sonekar
Smart Traffic Monitoring and Alert System Using VANET
and Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Manik Taneja and Neeraj Garg
Enhancement of Lifetime of Wireless Sensor Network Based
on Energy-Efficient Circular LEACH Algorithm . . . . . . . . . . . . . . . . . . . . . 537
Jainendra Singh and Zaheeruddin
Estimation and Correction of Multiple Skews Arabic Handwritten
Document Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
M. Ravikumar and Omar Ali Boraik
Heart Disease Prediction Using Hybrid Classification Methods . . . . . . . . 565
Aniket Bharadwaj, Divakar Yadav, and Arun Kumar Yadav
Job Recommendation System Using Content
and Collaborative-Based Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Rahul Pradhan, Jyoti Varshney, Kartik Goyal, and Latesh Kumari
Recommendation System for Business Process Modelling
in Educational Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Anu Saini, Astha Jain, and J. L. Shreya
Contents xvii

Using Bidirectional LSTMs with Attention for Categorization


of Toxic Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Zubin Tobias and Suneha Bose
Detection of Rheumatoid Arthritis Using a Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
A. S. Mahesh Kumar, M. S. Mallikarjunaswamy, and S. Chandrashekara
The Improved Method for Image Encryption Using Fresnel
Transform, Singular Value Decomposition and QR Code . . . . . . . . . . . . . . 619
Anshula and Hukum Singh
A Study on COVID-19 Impacts on Indian Students . . . . . . . . . . . . . . . . . . . 633
Arpita Telkar, Chahat Tandon, Pratiksha Bongale, R. R. Sanjana,
Hemant Palivela, and C. R. Nirmala
Improving Efficiency of Machine Learning Model for Bank
Customer Data Using Genetic Algorithm Approach . . . . . . . . . . . . . . . . . . . 649
B. Ajay Ram, D. J. santosh Kumar, and A. Lakshmanarao
Unsupervised Learning to Heterogeneous Cross Software Projects
Defect Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Rohit Vashisht and Syed Afzal Murtaza Rizvi
PDF Text Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
Rahul Pradhan, Kushagra Gangwar, and Ishika Dubey
Performance Analysis of Digital Modulation Schemes Over Fading
Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Kamakshi Rautela, Sandeep Kumar Sunori, Abhijit Singh Bhakuni,
Narendra Bisht, Sudhanshu Maurya, Pradeep Kumar Juneja, and Richa Alagh
Single Image Dehazing Using NN-Dehaze Filter . . . . . . . . . . . . . . . . . . . . . . 701
Ishank Agarwal
Comparative Analysis for Sentiment in Tweets Using LSTM
and RNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Rahul Pradhan, Gauri Agarwal, and Deepti Singh
Solving Connect 4 Using Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . 727
Mayank Dabas, Nishthavan Dahiya, and Pratish Pushparaj
A Pareto Dominance Approach to Multi-criteria Recommender
System Using PSO Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Saima Aysha and Shrimali Tarun
Twitter Sentiment Analysis Using K-means and Hierarchical
Clustering on COVID Pandemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Nainika Kaushik and Manjot Kaur Bhatia
xviii Contents

Improved ECC-Based Image Encryption with 3D Arnold Cat Map . . . . . 771


Priyansi Parida and Chittaranjan Pradhan
Virtual Migration in Cloud Computing: A Survey . . . . . . . . . . . . . . . . . . . . 785
Tajinder Kaur and Anil Kumar
Supervised Hybrid Particle Swarm Optimization with Entropy
(PSO-ER) for Feature Selection in Health Care Domain . . . . . . . . . . . . . . . 797
J. A. Esther Rani, E. Kirubakaran, Sujitha Juliet, and B. Smitha Evelin Zoraida
Contribution Title A Multimodal Biometrics Verification System
with Wavelet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Aderonke F. Thompson
IoT-Based Voice-Controlled Automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Anjali Singh, Shreya Srivastava, Kartik Kumar, Shahid Imran,
Mandeep Kaur, Nitin Rakesh, Parma Nand, and Neha Tyagi
Trusted Recommendation Model for Social Network of Things . . . . . . . . 839
Akash Sinha, Prabhat Kumar, and M. P. Singh
Efficient Classification Techniques in Sentiment Analysis Using
Transformers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Leeja Mathew and V. R. Bindu
Ultra-Wideband Scattered Microwave Signal for Classification
and Detection of Breast Tumor Using Neural Network
and Statistical Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Mazhar B. Tayel and Ahmed F. Kishk

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885


About the Editors

Dr. Ashish Khanna has 16 years of expertise in Teaching, Entrepreneurship, and


Research & Development He received his Ph.D. degree from National Institute of
Technology, Kurukshetra. He has completed his M. Tech. and B. Tech. GGSIPU,
Delhi. He has completed his postdoc from Internet of Things Lab at Inatel, Brazil
and University of Valladolid, Spain. He has published around 55 SCI indexed papers
in IEEE Transaction, Springer, Elsevier, Wiley and many more reputed Journals
with cumulative impact factor of above 100. He has around 120 research articles
in top SCI/ Scopus journals, conferences and book chapters. He is co-author of
around 30 edited and text books. His research interest includes Distributed Systems,
MANET, FANET, VANET, IoT, Machine learning and many more. He is originator
of Bhavya Publications and Universal Innovator Lab. Universal Innovator is actively
involved in research, innovation, conferences, startup funding events and workshops.
He has served the research field as a Keynote Speaker/ Faculty Resource Person/
Session Chair/ Reviewer/ TPC member/ post-doctorate supervision. He is convener
and Organizer of ICICC conference series. He is currently working at the Department
of Computer Science and Engineering, Maharaja Agrasen Institute of Technology,
under GGSIPU, Delhi, India. He is also serving as series editor in Elsevier and De
Gruyter publishing houses.

Dr. Deepak Gupta received a B.Tech. degree in 2006 from the Guru Gobind Singh
Indraprastha University, India. He received M.E. degree in 2010 from Delhi Tech-
nological University, India and Ph.D. degree in 2017 from Dr. APJ Abdul Kalam
Technical University, India. He has completed his Post-Doc from Inatel, Brazil.
With 13 years of rich expertise in teaching and two years in the industry; he focuses
on rational and practical learning. He has contributed massive literature in the fields
of Intelligent Data Analysis, BioMedical Engineering, Artificial Intelligence, and
Soft Computing. He has served as Editor-in-Chief, Guest Editor, Associate Editor
in SCI and various other reputed journals (IEEE, Elsevier, Springer, & Wiley). He
has actively been an organizing end of various reputed International conferences.
He has authored/edited 50 books with National/International level publishers (IEEE,

xix
xx About the Editors

Elsevier, Springer, Wiley, Katson). He has published 180 scientific research publi-
cations in reputed International Journals and Conferences including 94 SCI Indexed
Journals of IEEE, Elsevier, Springer, Wiley and many more.

Prof. Siddhartha Bhattacharyya, FRSA FIET (UK) is currently the Principal of


Rajnagar Mahavidyalaya, Birbhum, India. Prior to this, he was a Professor in Christ
University, Bangalore, India. He served as Senior Research Scientist at the Faculty
of Electrical Engineering and Computer Science of VSB Technical University of
Ostrava, Czech Republic, from October 2018 to April 2019. He also served as the
Principal of RCC Institute of Information Technology, Kolkata, India. He is a co-
author of 6 books and a co-editor of 75 books and has more than 300 research publica-
tions in international journals and conference proceedings to his credit. His research
interests include soft computing, pattern recognition, multimedia data processing,
hybrid intelligence and quantum computing.

Prof. Aboul Ella Hassanien is the Founder and Head of the Egyptian Scientific
Research Group (SRGE) and a Professor of Information Technology at the Faculty
of Computer and Artificial Intelligence, Cairo University. Professor Hassanien is an
ex-dean of the faculty of computers and information, Beni Suef University. Professor
Hassanien has more than 800 scientific research papers published in prestigious inter-
national journals and over 40 books covering such diverse topics as data mining,
medical images, intelligent systems, social networks, and smart environment. Prof.
Hassanien won several awards, including the Best Researcher of the Youth Award of
Astronomy and Geophysics of the National Research Institute, Academy of Scien-
tific Research (Egypt, 1990). He was also granted a scientific excellence award in
humanities from the University of Kuwait for the 2004 Award and received the scien-
tific - University Award (Cairo University, 2013). Also, He was honored in Egypt
as the best researcher at Cairo University in 2013. He was also received the Islamic
Educational, Scientific and Cultural Organization (ISESCO) prize on Technology
(2014) and received the State Award for excellence in engineering sciences 2015.
He was awarded the medal of Sciences and Arts of the first class by the President of
the Arab Republic of Egypt, 2017.

Dr. Sameer Anand is currently working as an Assistant professor in the Depart-


ment of Computer science at Shaheed Sukhdev College of Business Studies,
University of Delhi, Delhi. He has received his M.Sc., M.Phil, and Ph.D. (Software
Reliability) from Department of Operational Research, University of Delhi. He is a
recipient of ‘Best Teacher Award’ (2012) instituted by Directorate of Higher Educa-
tion, Govt. of NCT, Delhi. The research interest of Dr. Anand includes Operational
Research, Software Reliability and Machine Learning. He has completed an Inno-
vation project from the University of Delhi. He has worked in different capacities
in International Conferences. Dr. Anand has published several papers in the reputed
journals like IEEE Transactions on Reliability, International journal of production
research (Taylor & Francis), International Journal of Performability Engineering
About the Editors xxi

etc. He is a member of Society for Reliability Engineering, Quality and Operations


Management. Dr. Sameer Anand has more than 16 years of teaching experience.

Dr. Ajay Jaiswal is currently serving as an Assistant Professor in the Department


of Computer Science of Shaheed Sukhdev College of Business Studies, University
of Delhi, Delhi. He is co-editor of two books/Journals and co-author of dozens
of research publications in International Journals and conference proceedings.
His research interest includes pattern recognition, image processing, and machine
learning. He has completed an interdisciplinary project titled “Financial Inclusion-
Issues and Challenges: An Empirical Study” as Co-PI. This project was awarded by
the University of Delhi. He obtained his masters from the University of Roorkee (now
IIT Roorkee) and Ph.D. from Jawaharlal Nehru University, Delhi. He is a recipient
of the best teacher award from the Government of NCT of Delhi. He has more than
nineteen years of teaching experience.
Building Virtual High-Performance
Computing Clusters with Docker:
An Application Study at the University
of Economics Ho Chi Minh City

Quoc Hung Nguyen, Thanh Le, Ha Quang Dinh Vo, and Viet Phuong Truong

Abstract The need for high-performance computing in science and technology


is becoming a challenging issue in recent years. Building a high-performance
computing system by utilizing the existing hardware and software resources is a
low-cost solution. Virtualization technology is proposed to solve this problem. It
has brought convenience and efficiency as it can run on various operating systems.
It can be used for implementing many computational algorithms simultaneously
on the same hardware system including parallel processing and/or cluster processing
systems. It can be expanded for computation and storage if the resources are still avail-
able. Virtualization also can combine the existing hardware and software resources
to solve the problem of mobilizing multiple resources. Docker virtualization tech-
nology is considered a powerful virtualization technology, offering a new virtualiza-
tion solution, instead of creating independent virtual machines with different virtual
hardware and operating systems. Because this technology allows applications can
be repackaged into individual data units and run together on the operating system
kernel, sharing the resources of the mobilizing hardware platforms is the strength of
Docker. The paper will focus on analyzing the superiority of using hardware virtu-
alization technology, thereby proposing to build a high-performance virtualization
system by using Docker technology with utilizing the available hardware platform
at the University of Economics Ho Chi Minh City (UEH).

Keywords Virtual high-performance computing · Docker · Cluster computing

Q. H. Nguyen (B) · T. Le · H. Q. D. Vo · V. P. Truong


School of Business Information Technology, University of Economics Ho Chi Minh City, Ho Chi
Minh City 700000, Vietnam
e-mail: hungngq@ueh.edu.vn
T. Le
e-mail: thanhln@ueh.edu.vn
H. Q. D. Vo
e-mail: vhqdinh@ueh.edu.vn
V. P. Truong
e-mail: truong@ueh.edu.vn

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 1
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_1
2 Q. H. Nguyen et al.

1 Introduction

Today, the use of high-performance computers in the fields of sciences and


engineering has changed scientific research activities. Many scientific disciplines
need powerful computational abilities such as computational biology, computa-
tional chemistry, computational physics, computational materials, computational
mechanics, computational geophysics, computational statistics, and banking and
financial technology. A common feature is information processing and analysis,
and predicting results based on simulating and assessing mathematical models with
the help of a high-performance computing system. The system is considered to be
a critical solution to meet the increasing demand for computing. Not only scientific
research activities but also practical activities, such as socioeconomics, also requires
high computing performance. They have been developing on a large scale and require
more complex technology. Therefore, the implementation of the related models on
conventional computers is impossible due to the large computational volume and
time constraints.
High-Performance Computing (HPC) system was born to meet the above situa-
tion, and it allows the implementation of big data solutions based on a system inte-
grating with many page calculation nodes. Central Processing Units (CPU) will be
combined with a Graphical Processing Unit (GPU). On another aspect, maximizing
resource utilization on HPC systems remains problematic in recent years. Finding
the optimal solution to this problem to maximize the computing power of the HPC
system is attracting the attention of scientists from research institutes and univer-
sities. However, to equip an HPC system for a university or a public research unit
requires a large investment of money to purchase and maintain the system and human
resources. Technicians need to have operation and management qualifications when
put into use. On the other hand, on the system, there are still exist separate servers
with independent applications. Therefore, to build a high-performance computing
system with a virtualization technology based on the availability of distributed hard-
ware resources, which we call vHPC (virtual HPC), is the motivation of the study.
In this paper, we develop the above system based on Docker technology.
Our contributions in this paper focus on the following: (1) proposing an efficient
virtual HPC architecture to utilizing the existing hardware and software resource of
UEH; (2) combining the existing physical servers to build virtual servers that suit
the usage of Docker technology; (3) configuring the system to optimize resource
allocation and balancing the performance with other tasks that are working on the
existing physical servers.
The system uses many advanced virtualization technologies such as Hyper-V,
VMware ESX Server, and Docker Cluster to exploit available physical resources to
create and operate multiple machines [1]. Virtual machines share resources, or they
can allow to consolidate and run multiple workloads as virtual machines on a single
server. This technology allows a virtual machine can be considered to be a physical
computer and can run an operating system and applications fully. It enables the
virtualization of hardware from the server to servers, virtualization of storage on the
Building Virtual High-Performance Computing Clusters with Docker … 3

network (SAN—Storage Area Network) [2], or virtualization of shared applications


(Applications).

2 Literature Review

Some computing system virtualization technologies have been applied in many


fields of life. Gautam Bhanage [3] studied the experimental evaluation based
on OpenVZ virtualization technology (Open Virtuozzo) from the perspective of
receiving. Considering that OpenVZ [4] is a virtualization technology system based
on the Linux kernel. OpenVZ allows a single physical server to run multiple separate
operating system instances, known as containers, Virtual Private Servers (VPSS), or
Virtual Environments (VES). OpenVZ is not completely virtualization, it only shares
a modified Linux kernel and can, therefore, only run Linux operating systems. Thus,
all VPS virtual servers can only run Linux with the same technology and Kernel
version.
Microsoft Hyper-V virtualization technology [5] consists of three main compo-
nents: hypervisor, virtualization compartment, and new virtualization I/O (I/O)
model. The hypervisor is a very small layer of software presented on a processor
under Intel-V or AMD-V technology. It is responsible for creating the partitions, in
that the virtual entity will run. A partition is a logically isolated unit and can contain
an operating system on which it is intended. Always have at least 1 root partition
containing Windows Server 2008 and virtualization compartment, with direct access
to hardware devices. The next root partition can generate child partitions, usually
called virtual machines, to run the guest operating systems. A partition can also
generate its own child partitions. Virtual machines do not have access to the phys-
ical processor, but only “see” the processor provided by the hypervisor. The virtual
machine can only use the virtual device, all requests to the virtual device will be
passed through the VMBus to the device in the parent partition. Feedback is also
transmitted via VMBus. If the device on the parent partition is also the virtual device,
it is forwarded until it meets the real device on the root partition [6]. In the work
of Irfan Habib, the author presented an overview of virtualization technology KVM
(Kernel Virtualization Machine) [7] this is a new virtualization technology that allows
real virtualization on the hardware platform. That means the OS itself emulates the
hardware for other OSs to run on. It works similarly to a transcendental manager for
a fair share of resources such as disk, network IO, and CPU. The original server has
Linux installed, but KVM supports creating virtual servers that can run both Linux
and Windows. It also supports both × 86 and × 86–64 systems.
In the study of David Chisnall, the author presented a system with XEN virtual-
ization technology [8] that allows running multiple VPS virtual servers on a physical
server at the same time. XEN virtualization technology allows each virtual server to
run its own kernel, so VPS can install both Linux or Windows Operating systems.
Each VPS has its own File System and acts as an independent physical server.
4 Q. H. Nguyen et al.

Next is the optimized and most used virtualization technology in recent times,
VMWare virtualization technology [9] developed by the company VMWare, which
supports virtualization from the hardware level. User-friendly interface, simple to
install and use, many advanced features, support for multiple operating systems,
diverse versions. This technology is often applied to large units like banks and is
rarely used for commercial VPS sold in the market. Its structure is a virtualization
application program, running on Linux or Windows operating systems.
In the study of HE Yu et al. [10], the authors proposed a solution to automatically
build bridges connecting computing nodes into clusters for parallel processing (MPI–
–Message Passing Interface) using Docker Cluster [11]. This work has also been
carried out by De Bayser et al. [12] to integrate computation in parallel MPI with
HPC systems using Docker. It is important to evaluate efficiency when it comes
to virtualizing the computational system as a basis for building HPC. Muhammad
Abdullah et al. at Punjab University, Pakistan conducted a study [13] to evaluate the
effectiveness when using VMs (Virtual Machines) and Docker on the OpenNebula
cloud service platform. The results showed that when deploying virtualization with
Docker, the performance reached 70.23% compared to 46.48% of VMs, thereby
proving effective when virtualizing using Docker.
In Vietnam, several studies in the field of HPC have been carried out [14].
Researchers of Center for Computing Engineering, University of Technology—
Vietnam National University Ho Chi Minh City, aims at building solutions and
techniques used in the field of high performance and looking to build a tool that
can evaluate the performance of a powerful computer system, and achieved perfor-
mance in the range of 30–90%. The results were published in “500 of the world’s most
powerful computers” [15]. In project [16], Nguyen Thanh Thuy et al. at the High-
Performance Computing Center, Hanoi University of Technology, by the protocol of
scientific and technological cooperation with the Indian government in the period of
2004–2005, he has proposed to build an HPC system, namely BKluster. BKluster is
a system of parallel clustered computing based on Beowulf architecture and message
communication programming model together with the BKlusware software suite, a
set of software that supports up to many users at many different levels.

3 Virtual High-Performance Computing Based on Virtual


Clusters and Docker

In this paper, we develop a vHPC system by combining Cluster Computing using


available computing resources of the existing infrastructure at UEH (Table 1) with
Docker technology (Fig. 1).
In Fig. 1, the vHPC architecture included three processing layers:
• The Physical layers: They consist of 8 physical servers as shown in Table 1.
• The Virtualization layers: They refer to Taknet’s Analytical Evaluation Report
[17] on building an HPC system, the minimum configuration consists of 1 control
Building Virtual High-Performance Computing Clusters with Docker … 5

Table 1 List of the existing servers of UEH used for virtualization


No Example Font size and style
1 IBM X3560 M4, 12 Core 2.0 GHz, E5 2620, 24G Ram 270 GB/272 GB
2 HP Proliant DL380 Gen9, 32 Core 2.10 GHz, E5 2620, 64G Ram 600 GB/830 GB
3 HP Proliant DL380 Gen9, 24 Core 2.10 GHz, E5 2620, 128G Ram 100 GB/830 GB
4 IBM X3560 M3, 16 Core 2.4 GHz, E5620, 36G Ram 1.62 TB/1.62 TB
5 DELL PowerEdge R740, 24 Core 2.59 GHz, 64G Ram 1.30 TB/1.90 TB
6 DELL PowerEdge R720, 24 Core 2.10 GHz, 64G Ram 2 TB/3.26 TB
7 DELL PowerEdge R720, 24 Core 2.10 GHz, 64G Ram 1 TB/3.26 TB
8 SAN (Storage Area Network) 7 TB

Fig. 1 The proposed vHPC architecture with the Docker

computer (defined as Head Node) and at least 3 to 4 handling computers (defined


as Node). These nodes can be completely supplemented if necessary to improve
the overall computing performance of the HPC system. Therefore, we virtualize 5
virtual servers as in Fig. 1b, in which 1 machine plays the role of the manager (Head
Node) and the other 04 machines—the processing cluster computer (Node). All
computers are installed with the CenOS operating system version 7.8 as in Fig. 2.
For the hardware configuration of cluster computers, we set up 05 computers with
the same configuration as in Fig. 3.
• The vHPC layers: The system includes two components: (i) the CenOS oper-
ating system v7.8 runs in the background; (ii) A human-interactive interface with
Docker to compute resources (operation image and folder with data containers)
as in Fig. 4.
6 Q. H. Nguyen et al.

Fig. 2 Virtualized Servers with IP Addresses: 172.16.248.170, 172.16.248.171, 172.16.248.172,


172.16.248.173, 172.16.248.174

Fig. 3 The hardware configuration for the virtual server

For the vHPC performance calculation system [18], Docker images with Storage
Containers for each specific problem will be built, and the system provides informa-
tion about each Docker images. The part that interacted with the outside through the
IP address is authenticated through the HTTPS protocol if the system runs internally.
When doing the work outside, tasks will be connected to the system via VPN. All
the procedures are illustrated in Fig. 5.
Building Virtual High-Performance Computing Clusters with Docker … 7

Fig. 4 The hardware configuration for the virtual server

Fig. 5 Computational performance of the vHPC system

Providing accounts to members is performed by the administrator on the same


Docker mining interface that corresponds to the computing hardware requirement
defined by the authority in Docker images.
8 Q. H. Nguyen et al.

4 Conclusions

Virtualization technology has been developed a long time ago, achieved many
achievements, and commonly used for server systems. In addition to flexibility
in deployment, virtual machines are also known for the characteristics such as
ease of management, high security, and efficiency in isolation between the scope
of use and control. Currently, in the field of high-performance computing, virtual
machine deployment infrastructure plays an important role in services such as cloud
computing, and cloud storage. In this research, we have discussed and tested several
virtualization technologies for servers that are integrated with a large computational
memory such as CPU and GPU toward an HPC system with superior features, scala-
bility, and higher reliability. On the other hand, it helps researchers to have the tools
to implement algorithms to solve hard problems such as computer vision [19, 20],
machine learning [21], and big data processing [22] in all different environments to
meet technical factors such as high availability, superior fault tolerance feature, and
especially, utilizing the existing resources.

Acknowledgements This work was supported by the University of Economics Ho Chi Minh City
under project CS-2020-14.

References

1. Lee, H. (2014). Virtualization basics: Understanding techniques and fundamentals. In: School
of Informatics and Computing Indiana University 815 E 10th St. Bloomington IN 47408.
2. Khattar, R. K., Murphy, M. S., Tarella, G. J., & Nystrom, K. E. (1999). Introduction to Storage
Area Network. SAN: IBM Corporation, International Technical Support Organization.
3. Bhanage, G., Seskar, I., Zhang, Y., Raychaudhuri, D., & Jain, S. (2011). Experimental evalua-
tion of openvz from a testbed deployment perspective. Development of Networks and Commu-
nities. In volume 46 of Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering (pp. 103–112). Berlin: Springer.
4. Jin, Y., Wen, Y., Chen, Q. (2012). Energy efficiency and server virtualization in data centers:
An empirical investigation. In 2012 Proceedings IEEE INFOCOM Workshops (pp. 133–138).
5. Performance Report Hyper-V (2010). White Paper: https://sp.ts.fujitsu.com/.
6. Kusnetzky, D. (2011). Virtualization: A Manager’s Guide. O’Reilly Media, Inc.
7. I. Habib. (2008, February). Virtualization with KVM. Linux Journal, 2008(166), 8. Article
No.: 8.
8. Chisnall, D. (2013). The Definitive Guide to the Xen Hypervisor (1st ed.). USA: Prentice Hall
Press.
9. Technical Papers. VMware Infrastructure Architecture Overview. White Paper. https://www.
vmware.com/pdf/vi_architecture_wp.pdf.
10. Yu, H. E., & Huang, W. (2015). Building a virtual hpc cluster with auto scaling by the docker.
arXiv:1509.08231.
11. Rad, B. B., Bhatti, H. J., & Ahmadi, M. (2017). An introduction to docker and analysis of
its performance. International Journal of Computer Science and Network Security (IJCSNS),
17(3), 228.
Building Virtual High-Performance Computing Clusters with Docker … 9

12. de Bayser, M., & Cerqueira, R. (2017). Integrating MPI with docker for HPC. In 2017 IEEE
International Conference on Cloud Engineering (IC2E), Vancouver, BC, 2017 (pp. 259–265).
https://doi.org/10.1109/IC2E.2017.40.
13. Abdullah, M., Iqbal, W., & Bukhari, F. (2019). Containers vs virtual machines for auto-scaling
multi-tier applications under dynamically increasing workloads (pp. 153–167). https://doi.org/
10.1007/978-981-13-6052-7_14.
14. Hung, N. Q., Phung, T. K., Hien, P., & Thanh, D. N. H. (2021) AI and blockchain: Potential
and challenge for building a smart E-learning system in vietnam. In IOP Conference Series:
Materials Science and Engineering (In press).
15. Tran Thoai N., et al (2016). Research and design a 50–100 TFlops high performance computing
system / University of Technology - Viet Nam National University HCMC, Project in HCM
City.
16. Thuy, N. T., et al. (2006). Research high-performance computational systems and apply micro-
material simulation. Project in Ministry of Science and Technology (MOST), 2004–2005.
17. Tan, G., Yeo, G. K., Turner, S. J., & Teo, Y. M. (Eds.). (2013). AsiaSim 2013: 13th International
Conference on Systems Simulation, Singapore, November 6–8, 2013. Proceedings (Vol. 402).
18. Petitet, R. C. W. A., Dongarra, J., Cleary, A. HPL - A portable implementation of the high-
performance linpack benchmark for distributed-memory computers. http://www.netlib.org/ben
chmark/hpl
19. Thanh, D. N. H. & Dvoenko, S. D. (2019). A denoising of biomedical images. International
Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XL-5/W6,
73–78.
20. Kumar, V., Mishra, B. K., Mazzara, M., Thanh, D. N. H., & Verma, A. (2020). Prediction of
Malignant and benign breast cancer: A data mining approach in healthcare applications. In:
Borah, S., Emilia Balas, V., & Polkowski, Z. (Eds.), Advances in Data Science and Management.
Lecture Notes on Data Engineering and Communications Technologies (Vol. 37). Singapore:
Springer.
21. Erkan, U. (2020). A precise and stable machine learning algorithm: eigenvalue classifica-
tion (EigenClass). Neural Computing and Applications. https://doi.org/10.1007/s00521-020-
05343-2(Inpress)
22. Fowdur, T. P., Beeharry, Y., Hurbungs, V., Bassoo, V., & Ramnarain-Seetohul, V. (2018). Big
data analytics with machine learning tools. In: Dey, N., Hassanien, A., Bhatt, C., Ashour, A.,
& Satapathy, S. (Eds.), Internet of Things and Big Data Analytics Toward Next-Generation
Intelligence. Studies in Big Data (Vol. 30). Cham: Springer.
Implementing Multilevel Graphical
Password Authentication Scheme
in Combination with One Time Password

T. Srinivasa Ravi Kiran, A. Srisaila, and A. Lakshmanarao

Abstract At present, everyone makes instantaneous digital transaction by using


applications like PhonePe, Google pay etc. Password is necessary to prove the user
authentication. At the same time, user authentication is also verified by validating
one time password. A shoulder surfer may have the possibility to crack the password
during entry time. In this paper, we present a novel, clear, recall-based graphical
password scheme where the user is required to figure out the triangle for some exact
permutations of the password on the active display. The token holder is likely to pick
the correct password permutations in the expected order cyclically per every login
endeavor. For example, the user must select the first permutation of the password and
that permutation must form a triangle on the visual display. After the correct triangle
is identified in the visual display, a one time password is sent to the user. The user is
required to enter the one time password in the text box given in the visual display.
If the one time password is correct then the login attempt is successful; otherwise,
the login attempt is failed. Likewise, the user is instructed to identify triangles with
other permutations of the password for the remaining login attempts.

Keywords Password · Authentication · Security · Shoulder surfing · Visual


display · One time password · Triangle

T. Srinivasa Ravi Kiran (B)


Department of Computer Science, P.B.Siddhartha College of Arts & Science, 520010 Vijayawada,
Andhra Pradesh, India
e-mail: tsravikiran@pbsiddhartha.ac.in
A. Srisaila
Department of Information Technology, V.R Siddhartha Engineering College, 520007
Vijayawada, Andhra Pradesh, India
A. Lakshmanarao
Department of Information Technology, Aditya Engineering College, Surampalem, Kakinada,
Andhra Pradesh, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 11
A. Khanna et al. (eds.), International Conference on Innovative Computing
and Communications, Advances in Intelligent Systems and Computing 1387,
https://doi.org/10.1007/978-981-16-2594-7_2
12 T. Srinivasa Ravi Kiran et al.

1 Introduction

Even though the technique of using textual passwords is insecure, the majority of
the digital systems are still using textual passwords to implement their security. To
overcome the vulnerabilities of using textual-based passwords, graphical passwords
provide a promising solution to implement better security [1]. A graphical password
is an authentication method that facilitates the user to select from images or symbols
in a precise order on the existing graphical user interface (GUI). People are using
passwords commonly, many times to facilitate online banking transactions, for the
access of social networks and to verify their emails [2].
The most popular way of identifying user authenticity is the use of one time pass-
word [3]. One time passwords are intended to be a top-secret between two parties
and can be used once within the limited time lapse. This prevents someone from
looking over your shoulder and trying to use it later for network sniffing and from
spyware attacks [4]. The password strength of a graphical password scheme is more
than the text-based schemes, and as a result, it provides a superior level of secu-
rity. Owing to this benefit, there is an increasing interest in graphical password. In
graphical password schemes, images or symbols are used as an alternative to alphanu-
merical passwords [5]. The graphical password schemes that are offered protect the
user and/or application privileges from the attempts of hacking [6]. According to
Wiedenbeck et al. [7] unforgettable places depend on the type of image and the
defined sequence of click locations. Chopra et al. [8] present potential outcomes in
terms of security, ease of use and memorability.

2 Related Works

To authenticate the user credentials, reference [9] proposed a click-based graphical


password system. The user is instructed to click a well-ordered sequence of five pass
points on the images of the interface presented. The authentication of the user fails
if he could not be able to choose well-ordered sequence of pass points. As per the
instructions of Jermyn et al. [1], the client is required to “Draw A Secret” (DAS) on the
grid of the accessible interface. The password is the clear-cut pattern presented in a grid.
This scheme is keystroke-independent and allows the user to draw the pattern without
difficulty. Sobrado and Birget [10] talk about “Triangle Scheme” where a number of
pass-objects are displayed on the interface along with the “decoy” objects. The client
chooses the pass objects during the initial sign-up stage. At the authentication phase,
the client must find out the pass objects and it is mandatory to click inside the convex
hull framed by all the pass objects. Since the password space of the hull is vast, the
chance of compromising the password is very low.
The S3PAS scheme was proposed by Zhao et al. [5]. A 10 × 10 fixed grid
containing 94 printable characters consisting of alphabets, digits and special symbols
is shown to the user. The password length is a predetermined string of four charac-
ters such that any three-character combination can form a triangle on the accessible
Implementing Multilevel Graphical Password Authentication … 13

grid. For example, if the password selected is “6Tg:” then choose the combinations,
viz., “6Tg”, “Tg6”, “g:6” and “:6T”. The combinations chosen successfully form
a triangular pattern on the existing interface independently. The user is required to
identify the triangle with the chosen password combinations in the specified order
for authentication. In line with Kiran et al. [11] the users are instructed to recog-
nize quadruplets formed from the password blends on the existing interface from the
password chosen at the time of registration.
Kiran et al. [11] presented a graphical password authentication scheme resistant to
peeping attack which begins with recognizing quadruplets formed from the password
combination chosen from the client, starting with the first character and rotating one
character toward the right in a way that the last character in the password combination
comes into view as the first character of the password combination. For instance, if
the password chosen at the time of registration is “Sa3T:” then the quadruplets formed
are “Sa3TS”, “a3T:a”, “3T:S3”, “T:SaT” and “:Sa3:”. It is compulsory for the user
to select the arrangement of the password blends in the expected fashion rotated for
every login attempt. Ravi Kiran et al. [12] presented a new, interactive, recall-based
scheme where the user starts with identifying the required transformation applied
to every individual character of password amalgamation. Prasad et al. [3] illustrate
that an authentication schema resistant from peeping attack starts with identifying
triangle formed by clicking on the buttons of the interface have colors red, green,
blue and red of the grid, respectively.
Rao et al. [13] proposed the PPC schema. In this, the user is instructed to symbolize
a rectangle on the accessible interface. Any character existing on the edge of the
rectangle may be the pass character. Jusoh et al. [14] exemplify a relative study
of recognition-based authentication algorithms. The comparisons are based on very
important characteristics like usability, weaknesses and security attacks. For better
usability, Stobert et al. [15] suggest that many click-points could be used on smart-
phone displays since it is very difficult to display larger image sizes. Hemavathy
et al. [16] proposed an innovative graphical password authentication system to resist
shoulder surfing. As a part of authentication, the users are instructed to choose the
appropriate horizontal and vertical lines on the pass matrix to find out the pass objects.
Khadke et al. [17] conveyed that the security of the graphical password can be
imposed at multiple levels. Katsini et al. [18] discussed implications to improve
recognition-based graphical passwords by adopting personalization techniques
derived from individual cognitive characteristics.

3 Projected Scheme

In the existing interface, we make use of a 10 × 10 table formed with 94 printable


character set with spaces as shown in Fig. 1.
Password amalgamations are verified with mouse taps on individual cells of the
grid. The precise plan begins with identifying the triangle shape by tapping on the
cells on display. The recognition of the required triangle for that login attempt gener-
ates one time password to the hand-held device. If the user is able to verify the one
14 T. Srinivasa Ravi Kiran et al.

Fig. 1 Projected display

time password, then the login attempt is successful. Suppose a triangle does not form,
then that blend can be overlooked. In previous studies, verification is at a single level
only, that is, the user is expected to identify the required triangle with password
combinations. However, in the proposed work, novelty is achieved in a manner that
the user authentication is carried out at multiple levels in such a way that the user
is expected to validate one time password after the required triangle is identified for
better security.
Permutations of secrete phrase are input by four taps on the displayed screen.
For example, if the secret phrase selected at the sign-up time is “g5:G”, at that point
the plausible triangle shaped by tapping on the cells are “g5:g”, “5:G5”, “:Gg:” and
“Gg5G”, that is, pivoting unique secret key character blend one position from left
to right every time and the first character must be the same as the last character.
The users are instructed to enter the combination of password blend cyclically in the
expected order for every login stab.
Algorithm

1. Start.
2. Register a password of length four.
3. Select five distinct four-character amalgamations of registered passwords,
pivoting from left to right.
4. The user makes an entry attempt by selecting the password amalgamation in the
predicted way on the accessible display.
Implementing Multilevel Graphical Password Authentication … 15

5. If the client opts for correct password amalgamation in an expected manner and
it forms a triangle, then a one time password is sent to the hand-held device and
that one time password is verified on the interface.
6. If the one time password entered on the interface is correct, the login attempt
is successful; otherwise, the login attempt is failed, so evaluate the next
amalgamation.
7. In case if the client does not choose a secret token combination in the expected
style or does not form a triangle shape, the entry process is obstructed, so
disregard that amalgamation of secret tokens and opt next amalgamation of
secret tokens in such a way that all the amalgamations of secret word tokens
must form a triangle.
8. Stop.

Flowchart:

Star

Register a password.

Select four distinct password blends from


the password registered.

n:=1 No Yes
Is n>4

User makes nth login

n:=n+1

Is the nth
password blend No Login
forms triangle. attempt
failed.

Yes
Send one time password (OTP) for verification.

Is OTP is No
verified?

Yes
Login attempt is successful.

Stop
16 T. Srinivasa Ravi Kiran et al.

Fig. 2 First phase of login is


verified by clicking on the
cells “g5:g” and also by
verifying one time password
“0783”

Step 1: For the first instance, the login entry is valid for the amalgamation “g5:g”
and for one time password “0783” (Fig. 2).
Step 2: One time password is not generated and the entry is foiled for sequence
“g5:g” at second entry as the client chooses wrong attempt (Fig. 3).
Step 3: For the second instance, the login entry is valid for the password blend “5:G5”
and for one time password “1508” (Fig. 4).
Step 4: For the third instance, the login entry is valid for the password blend “:Gg:”
and for one time password “4545” (Fig. 5).
Step 5: For the fourth instance, the login entry is valid for the password blend “Gg5G”
and for one time password “9412” (Fig. 6).
Step 6: If the first character is different from the terminal character, in such a case
the specific password amalgamation can be ignored (Fig. 7).
For example, if the user clicks on the buttons containing the letters “g5:G”, respec-
tively, the initial token “g” is not the same as the terminal token “G” and the pattern
triangle cannot be formed. In such a case the amalgamation is disregarded. Select
correct amalgamation of password blend in such a way that the triangle is formed.
Implementing Multilevel Graphical Password Authentication … 17

Fig. 3 Login is denied since


the user selects the wrong
password blend for login
entry

Fig. 4 During the second


phase, the entry is verified by
clicking on the cells “5:G5”
and also by verifying one
time password “1508”
18 T. Srinivasa Ravi Kiran et al.

Fig. 5 At third login


instance, the login entry is
passed for password
combination “:Gg:” and for
one time password 4545

Fig. 6 At the fourth stage,


login is successful by
clicking on the cells “Gg5G”
and by verifying one time
Implementing Multilevel Graphical Password Authentication … 19

Fig. 7 Triangle not formed


by selecting buttons “g5:G”.
Amalgamation is ignored

4 Results and Usability Study

The results were confident and the client’s predictable triangles were formed by
clicking on the cells in an exact manner. It takes 37 ms to identify the required
triangle and to verify one time password as shown in the following four tables.
Peeping attacks were not possible with the proposed scheme since the client taps on
visible tokens are in random order (Tables 1, 2, 3, 4, 5, 6, 7 and 8).

Table 1 Login table for first pass


S. no. Password Pass 1 Time to verify One time Time to enter one Login time for
triangle for pass 1 password time password for pass 1 in
in milliseconds pass 1 in milliseconds
milliseconds
1 g5:G 5:G5 23 1508 11 34
2 3U75 U75U 26 1134 13 35
3 tg + 8 G+8g 24 6534 12 34
4 zQ2c Q2cQ 25 8620 12 37
5 8I_i I_iI 23 0634 14 38
Login time in milliseconds for first pass using i5 processor 36
20 T. Srinivasa Ravi Kiran et al.

Table 2 Login table for second pass


S. no. Password Pass 2 Time to verify One time Time to enter one Login time for
triangle for pass 2 password time password for pass 2 in
in milliseconds pass 2 in milliseconds
milliseconds
1 g5:G :Gg: 24 4545 12 36
2 3U75 7537 25 0536 12 37
3 tg + 8 +8t+ 25 9735 13 38
4 zQ2c 2cz2 26 9064 14 40
5 8I_i _i8_ 24 7896 13 37
Login time in milliseconds for second pass using i5 processor 38

Table 3 Login table for third pass


S. no. Password Pass 3 Time to verify One time Time to enter one Login time for
triangle for pass 3 password time password for pass 3 in
in milliseconds pass 3 in milliseconds
milliseconds
1 g5:G Gg5G 23 3456 11 34
2 3U75 53U5 25 1813 13 38
3 tg + 8 8tg8 25 2845 12 37
4 zQ2c czQc 24 1745 12 36
5 8I_i I8Ii 23 0073 12 35
Login time in milliseconds for third pass using i5 processor 36

Table 4 Login table for fourth pass


S. no. Password Pass 4 Time to verify One time Time to enter one Login time for
triangle for pass 4 password time password for pass 4 in
in milliseconds pass 4 in milliseconds
milliseconds
1 g5:G 5:G5 24 9412 12 36
2 3U75 53U5 23 1234 11 34
3 tg + 8 8tg8 23 9667 13 36
4 zQ2c cZQc 25 7845 12 37
5 8I_i I8Ii 24 0556 13 37
Login time in milliseconds for fourth pass using i5 processor 36

Table 5 Average login time for four passes


S. no. Pass Average login time for all four passes
1 Pass 1 36
2 Pass 2 36
3 Pass 3 38
4 Pass 4 36
Login time in milliseconds for all four passes using i5 37
processor
Table 6 A 12-point efficiency scale
S. no. Reorganization User Features
based schema Satisfaction
Mouse Meaningful Assignable Memorability Simple Nice Training Pleasant password Selecting Use of on Multilevel
usage image steps Interface Simply Picture permutations of e time security
triangle password
pattern
1 Blonder Y Y Y N Y Y Y Y N N N N
2 Jermyn Y N Y Y Y Y Y Y N N N N
3 Stallings Y Y Y Y Y Y Y Y N N N N
4 Ziran Zheng Y Y Y Y Y Y Y Y N N N N
5 S3PAS Y Y Y Y Y Y Y Y N Y N N
6 A Novel GP Y Y Y Y Y Y Y Y Y N N N
Implementing Multilevel Graphical Password Authentication …

Scheme
7 A Robust Y Y Y Y Y Y Y Y Y N N N
8 Multilevel Y Y Y Y Y Y Y Y Y Y Y Y
Y : Yes N : No
21
22 T. Srinivasa Ravi Kiran et al.

Table 7 A 12-point
S. no. Recognition schema Scale of efficiency
efficiency scale
1 Blonder 7
2 Jermyn 7
3 Stallings 8
4 Ziran Zheng 8
5 S3PAS 9
6 A Novel GP 9
7 A Robust 9
8 Multilevel 12

5 Comparative Analysis

The visual interface is a 10 × 10 grid where the user is educated to form a triangle with
password blends considered from the password chosen at the time of registration.
At the same time, the user is instructed to enter one time password on the interface
once the password blend is validated.
This type of multilevel evaluation is the first attempt in a password authentication
system. I have analyzed eight schemas of graphical password authentications. Among
all these schemas only four have a look at the approach of taking into consideration
the password blends from the original password. The schemas of the other authors
also did not tell the robustness of the original password and password blends.
In this proposed schema, the robustness of the password and password blends have
been correctly defined and fixed at 99.61% and 97.65%, respectively. The password
and password blends reduce the probability of cracking by the shoulder surfers since
he/she needs to validate every password blend with the onetime password (Figs. 8
and 9).

6 Conclusion

The existing scheme focused on the functioning of the user interface based on static
grids. It is possible to improve security by designing dynamic graphical grids. The
address space for passwords can be improved by increasing the grid size by rows as
well as columns.
Table 8 A comparative analysis of innovative graphical password schema
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
1 Blonder N N N N N Password Spyware Brute force NS NS NS
space is Dictionary Shoulder surfing
small
Password Description Guessing
strength is
not
specified
2 Jermyn N N 4 × 4 grid N N Password Dictionary Shoulder surfing NS NS NS
space is Description
small
Password Spyware Guessing
strength is Brute force
Implementing Multilevel Graphical Password Authentication …

not
specified
3 Stallings N N NS N N Password NS Dictionary NS NS NS
strength is Spyware
not
specified
4 Ziran N N 5 × 5 grid N N Password NS Brute force NS NS NS
zheng robustness Dictionary
is not
specified Guessing

(continued)
23
Table 8 (continued)
24

Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
Password
strength is
not
specified
5 S3-pass Y Y 10 × 10 grid Y N Password NS Shoulder-surfing NS NS NS
strength is
not
specified
Lengthier Hidden-camera
login Spyware
processes
Hidden-camera
Spyware
6 A novel Y Y 10 × 10 grid Y N NS NS Shoulder-surfing 38.46 99.96% 99.23%
graphical Hidden-camera
password
scheme Random click
attacks
7 A robust Y Y 14 × 14 grid N N NS NS Shoulder-surfing 44 99.96% 99.23%
Hidden camera
Spyware
(continued)
T. Srinivasa Ravi Kiran et al.
Table 8 (continued)
Row Proposed Is actual Is login phase Password Does the Does the Drawbacks Security Impervious to Average Robustness Robustness
schema password verified with space passwords password attacks security attacks login time in of the of each
protected? password permutations security pervious to milliseconds password password
permutations? forms is using i5 scheme permutation
triangle? verified processor
with one
time
password
8 Multilevel Y Y 10 × 10 grid Y Y NS NS Brute force 37 99.61% 97.65%
Shoulder surfing
Guessing
Dictionary
Hidden camera
Spyware
NOTE: Y-Yes, N-No, NS-Not Specified
Implementing Multilevel Graphical Password Authentication …
25
Another random document with
no related content on Scribd:
Industrie

L’industrie ukrainienne est à une époque de transition; jusqu’alors


peu développée, elle fera de l’Ukraine, dès que la vie normale y
reprendra son cours, un des pays européens les plus industriels.

La confection est en train de subir une grande transformation: à


Poltava, la couture et la mode occupent déjà plus de 10.000 familles.

La cordonnerie se pratique surtout dans les gouvernements de


Poltava, de Kiev et en Galicie.

La menuiserie a des ateliers aussi bien dans les villages que


dans les villes, parce qu’elle doit satisfaire les besoins des paysans
comme des citadins. Mais la menuiserie artistique dont les œuvres
sont parfois admirables se pratique surtout dans la contrée d’Hutzul.

La tonnellerie, de même que la construction des bateaux en bois,


est pratiquée dans les districts de Poltava où elle occupe 3.700
familles, de Kharkov, Polissya, Kiev, Tchernigov, Volhynie et dans la
contrée d’Hutzul.

La vannerie est surtout développée dans la contrée de Poltava


où elle nourrit plus de 1.000 familles, en Podolie, Kherson, et à Kiev.

La céramique grâce aux nombreux gisements de substances


minérales (kaolin) découverts récemment est en train de prendre un
sérieux développement dans les régions de Poltava, Tchernigov,
Kharkov et Kiev. La Galicie, le gouvernement de Poltava et la région
d’Hutzul sont renommés depuis longtemps déjà par leur poterie. Il y
a sur tout le territoire ukrainien 12 faïenceries, 30 verreries et 12
fabriques de ciment.
La cordonnerie occupe 9.000 familles dans le gouvernement de
Poltava; les deux villes d’Okhtirka et Kotelva dans celui de Kharkov;
12.000 cordonniers dans celui de Voronège; 8.000 dans la région
ukrainienne de Koursk.
Les fabriques et les usines sont fort peu nombreuses en Ukraine.
L’industrie du coton ne compte que quelques fabriques dans la
région du Don (Rostov, Nakhichevan) et celle d’Ekaterinoslav
(Pavlokichkas).

L’industrie du lin et du chanvre n’existe que dans le


gouvernement de Tchernigov.

La meunerie compte un grand nombre de petits moulins à eau ou


à vent, 50.000 environ, et 800 grands moulins. Il y a des minoteries
à vapeur à Kharkov, Kiev, Poltava, Krementchoug, Odessa,
Nikolaïev, Melitopol, Brody et Tarnopol.

L’industrie de l’alcool est assez développée. En 1912-1913, elle a


donné plus de 4.000.000 d’hectolitres d’alcool.

L’industrie sucrière est une des plus importantes de l’Europe. En


1914, il y avait sur tout le territoire ukrainien 223 fabriques de sucre
qui se répartissaient ainsi: 75 dans le gouvernement de Kiev, 16 en
Volhynie, 52 en Podolie, 1 en Bessarabie, 2 dans celui de Kherson,
23 dans celui de Koursk, 13 dans celui de Poltava, 29 dans celui de
Kharkov, 12 dans celui de Tchernigov. La production sucrière de
l’Ukraine est annuellement d’environ 1.700.000 quintaux dont la
valeur approximative est, sans accise, de 700.000.000 de francs.
Kiev, la ville des raffineurs, est un des plus grands marchés de sucre
de l’Europe.
Cette industrie progresse si rapidement que, de 1905 à 1915, elle
s’est accrue de 100 0/0.
En 1911, l’Ukraine a produit 24.625.000 de quintaux de fer brut,
c’est-à-dire 67,4 0/0 de la production totale de la Russie; en 1912, le
pourcentage est monté jusqu’à 70 0/0.
Le fer forgé sort des usines de Krivrog et d’Ekaterinoslav.
Commerce extérieur

Le mouvement commercial de l’Ukraine est, comparativement à


celui des contrées de l’Europe occidentale, d’importance inférieure;
mais il est appelé, à bref délai, à un développement considérable.
Actuellement, la première place dans l’exportation ukrainienne
est occupée par les céréales et les autres produits de la terre.
L’exportation pour les 9 gouvernements de l’Ukraine se
décompose de la manière suivante: céréales, 1.000 millions de
francs (55 0/0 du total); bétail (élevage, volaille) 150 millions de
francs (9 0/0 du total); sucre, 425 millions de francs (22 0/0 du total);
fer brut et forgé 200 millions de francs (12 0/0 du total); minerai, 25
millions de francs (1 à 2 0/0 du total); autres produits 40 millions de
francs (2 à 3 0/0 du total).
Presque toute l’exportation des céréales de l’Ukraine se fait au
delà des frontières de l’ancienne Russie, en Europe occidentale,
ainsi que celles des produits de l’élevage: œufs, volailles, peaux,
etc... Il n’y a que le bétail destiné à la boucherie, et surtout les bêtes
à cornes, qui s’est dirigé jusqu’ici vers le Nord de la Russie et en
majeure partie vers la Pologne.
Quant à l’exportation des autres denrées, le sucre, par exemple,
c’est la Russie qui offre le marché le plus important. L’exportation
totale du sucre au delà des frontières de l’Ukraine atteint jusqu’à 9 à
10 millions de quintaux par année et seulement un cinquième de
cette exportation s’est dirigé au delà des frontières de l’ancienne
Russie, principalement sur les marchés très constants et très
avantageux de la Perse et de la Turquie. Néanmoins, quand la
campagne sucrière se montre très abondante, l’Ukraine exporte ses
sucres même en Europe occidentale, jusqu’en Angleterre, et à des
prix extrêmement avantageux pour l’acheteur. Le reste du sucre est
dirigé vers le Nord et vers l’Est de la Russie.
L’Ukraine exporte de grandes quantités de fer; la plupart du
temps c’est sous forme de fonte, de fer brut et de fer forgé. Presque
tout le fer exporté et presque toute la fonte sont vendus dans les
limites du territoire de l’ancienne Russie et en Pologne, car l’Ukraine
n’a eu jusqu’alors aucun accès sur les marchés de l’Europe
occidentale. Cependant, au cours des années qui ont précédé la
guerre, elle commençait à diriger son fer vers les Balkans, la
Turquie, l’Egypte, et même l’Italie.
L’importation de l’Ukraine consiste en objets manufacturés et
surtout en objets de l’industrie textile, lesquels forment, comme les
céréales pour l’exportation, plus de la moitié des produits importés.
L’importation des neuf gouvernements de l’Ukraine se
décompose ainsi: a) Tissus, étoffes, vêtements et autres produits de
l’industrie textile, 700 millions de francs; cuirs et objets en cuir, 60 à
70 millions de francs; b) coloniales (thé, café, épices), 60 millions de
francs; c) vins, 30 millions de francs; d) huiles, 30 millions de francs;
naphte et dérivés, 70 millions de francs; bois, 30 millions de francs;
machines et autres instruments en fer, 60 millions de francs; produits
divers, 100 millions de francs.
Les objets en cuir, les machines de toutes sortes, les produits
coloniaux, les vins, sont importés de l’Europe occidentale ou par son
intermédiaire. L’Ukraine n’importe de la Russie et de la Pologne que
les tissus, les étoffes et autres produits de l’industrie textile. Si
l’Ukraine ne parvient pas à créer sa propre industrie textile, elle
achètera désormais ces produits à l’Europe occidentale qui les lui
fournira à un prix inférieur et d’une qualité supérieure à ceux que la
Russie et la Pologne lui vendaient.
La balance du commerce extérieur de l’Ukraine a toujours été
très active et l’exportation s’est montrée jusqu’à maintenant plus
importante que l’importation: pour les années 1909-1913, elle s’est
chiffrée par 600 millions de francs. Mais elle peut facilement
atteindre jusqu’à 1 milliard à cause de l’exportation de blé et de
naphte qui ne manquera pas d’augmenter dans des proportions
assez considérables.
Littérature

Riche de tous les biens de la terre, l’Ukraine ne pouvait manquer


d’être, dès les premiers jours de son existence, en même temps
qu’un grand marché commercial, un grand centre intellectuel. Kiev,
avec son Académie fondée en 1632, devint un foyer de lumière non
seulement pour l’Ukraine, mais pour tous les pays slaves.
Malgré les nombreux obstacles qui lui ont été suscités au cours
de tous les siècles, la littérature ukrainienne se révèle aussi riche
que variée. Elle comprend tous les genres, aussi bien dans le
domaine de la poésie que dans celui de la prose.
Poésie épique

La poésie épique voit, du IXe au XIIIe siècle, toute une série de


chants héroïques qui, recueillis par les professeurs Dragomanov et
Antonovitch, font revivre le héros populaire Ivanko qui tantôt fait le
siège de Constantinople, tantôt livre un combat singulier au tsar turc.
Mais l’œuvre la plus célèbre dans ce genre, est «Le Chant des
troupes d’Igor» qui rappelle assez notre «Chanson de Roland».
L’auteur dont le nom n’est pas arrivé jusqu’à nous, raconte en une
langue forte et savoureuse, la campagne d’un prince Ruthène contre
les Polovtsy, tribu non-slave qui menaçait alors la frontière orientale
de l’Ukraine.
Du XIIIe au XVIIIe siècle, ces chants héroïques deviennent
historiques. Le peuple ukrainien s’en empare pour célébrer le héros
national, le cosaque Baïda supplicié par les Turcs à Constantinople
et qui, précipité d’une tour, s’accroche à un pieu en tombant, et tue à
coups de flèches le sultan venu assister à son exécution.
M. Rambaud a réuni tous ces chants en un superbe volume dont
la lecture est du plus haut intérêt.

A partir du XVIIIe siècle, la poésie épique semble disparaître pour


faire place à la poésie lyrique.
Poésie lyrique

La poésie lyrique, née à la fin du XVIIIe siècle, trouve son premier


véritable interprète dans Chachkevitch qui composa en 1834 son
premier almanach littéraire «L’Aurore» que la censure de Lemberg
interdit et en 1837 son second «Le Naïade du Dnièpre» qui ne put
paraître qu’en 1848.
Joseph Fedkovitch par ses chants où il glorifie la vie des
ancêtres, sut intéresser les cultivateurs, les pâtres et les villageois.
Mais tout le talent de Chachkevitch et de Fedkovitch disparaît
devant le génie de Taras Chevtchenko (1814-1861) qui est, à juste
titre, considéré comme le plus grand poète de toute la littérature
ukrainienne.
Né dans une chaumière de paysans à Morynsti, dans le
gouvernement de Kiev, il n’a connu que quelques années de liberté
et de bonheur. Serf jusqu’à 24 ans, prisonnier politique en Sibérie
pendant dix ans, surveillé par la police de Petrograd durant trois
années et demie, il mourut le 24 février 1861, à l’âge de 47 ans.
Mais enfant du peuple, il en a été le chef et il en reste l’idole. Ses
funérailles eurent lieu, à sa demande, sur les hauteurs qui regardent
le Dnièpre, au milieu de plus de 60.000 assistants appartenant à
toutes les classes de la société.
Son premier recueil de poésies lyriques «Kobsar» (le Barde)
parût en 1840 et fut suivi, un an après, par les «Haïdamaks» qui
faisaient revivre les paysans ukrainiens révoltés contre leurs tyrans.
L’impression fut extraordinaire et, du coup, Taras Chevtchenko
devient le poète national. Personne en Ukraine n’avait avant lui parlé
une langue plus pure, n’avait versé de larmes plus vraies sur le
malheur de sa patrie; aucun poète n’avait atteint les hauteurs de son
génie.
Ses plus belles poésies sont: «Le Songe», «Le Caucase», «A
Osnovianenko», «A l’Eternelle mémoire de Kotlarevsky», «Aux
Vivants, aux Morts et à ceux qui doivent naître».
Ses plus beaux poèmes sont: «Les Haïdamaks», «Maria»,
«Naismytchka» et «Kateryne» qui est l’histoire d’une fille du peuple
délaissée par un officier russe.
Pantélémon Koulich (1815-1897), s’inspirant de la littérature
européenne, traduisit d’abord les poèmes de Byron, puis se livrant à
l’inspiration poétique, écrivit des poésies imitées de V. Hugo qui
forment plusieurs recueils, dont «Les Aubes» qui se recommandent
par le plus pur lyrisme.
Michel Starytsky, écrit des poésies d’une valeur réelle pour
protester contre l’oppression nationale et sociale.
Larissa Kvitka, sous le pseudonyme de «Lesia Oukrainska»
exprime avec un charme tout féminin, une finesse et une sensibilité
exquises, les sentiments de son âme rêveuse et mélancolique. Ses
meilleures poésies sont: «Sainte Nuit», «Contra spem spero», «A
mes compagnons», «Le Poète».
Khrystia Altchevska, par la pureté de la forme et O. Oles, par la
puissance du verbe, mériteraient d’être connus en dehors des
frontières de l’Ukraine.

Parmi les poètes dont les œuvres peuvent entrer dans ce genre,
il faut citer: Kotlarevsky avec son Ode au Prince Kourakine;
Constantin Pouzyme (1790-1850) avec le Paysan petit russien;
Alexe Storojenko (1805-1874) avec son «Cygne» où il parle du
poète qui meurt fièrement sans attendre les applaudissements de la
foule; Samilenko, le traducteur de Molière; Hryntchenko, le
Déroulède ukrainien, etc.
Poésie satirique

La poésie satirique fut d’abord cultivée par quelques poètes


inconnus dans «Les Psaumes laïques», «La Victoire de
Beresteczko», «Lamentations de la Petite Russie sur les
Polonophiles», «Mazepa et Palie», «L’introduction du servage en
Ukraine», «La conversation de la Grande Russie avec la Petite».
Mais le premier vrai poète satirique de l’époque moderne est
Jean Kotlarevsky, appelé avec raison le Père de la littérature
moderne ukrainienne. Elève du séminaire de Poltava, militaire, puis
fonctionnaire civil, il entra dans la maçonnerie et, peu de temps
après, publia en langue ukrainienne son «Enéide travestie».
C’est une satire qui, dans une grande perfection de forme et une
langue vive et savoureuse, trace le tableau d’un Olympe mais d’un
Olympe aux pots de vin et aux intrigues bureaucratiques. Elle eut
trois éditions du vivant de son auteur et, aujourd’hui, elle en compte
plus de trente. Napoléon en quittant Moscou en mit, dit-on, un
volume dans sa cantine.
Fables

Le premier fabuliste ukrainien est Pierre Artemovsky Houlak


(1790-1866) qui s’est rendu célèbre par sa fable «Le Maître et le
Chien», protestation énergique contre le servage auquel était soumis
le peuple ukrainien. La littérature ukrainienne compte d’autres
fabulistes comme Leonid Glibov (1827-1893) par exemple, mais
aucun n’a laissé d’œuvres qui méritent de passer à la postérité.

Parmi les autres poètes ukrainiens, car il faut bien se borner, il


convient de citer Victor Zabillo, Ivan Franko, W. Stchourat, Bogdan
Lepky, qui ont laissé des poésies charmantes de grâce et de finesse.
Et actuellement, l’Ukraine voit naître de nombreux poètes comme
Tcherniavsky, Vorony et beaucoup d’autres dont les poésies sonnent
gaîment.
Théâtre

Le théâtre fait son apparition dans la littérature ukrainienne par


des Mystères, comme «La Descente de Jésus aux Enfers» et des
comédies satiriques contre les prêtres, telles que: «Le Pope
Negretzky». Dolhalewsky a laissé dans ce genre, des pièces assez
connues.
Mais, pour avoir des pièces de réelle valeur, il faut attendre
l’auteur de l’«Enéide travestie», Jean Kotlarevsky, qui écrivit deux
comédies charmantes: «Natalka Poltavka» et «Le Soldat sorcier».
La première a de réelles qualités scéniques qui lui permettent de
faire recette encore aujourd’hui. Toutes les deux charment par la
vérité des types, la vivacité du dialogue et, surtout, par leur langue
vigoureuse et imagée.
Basile Gogol (1825), père de Nicolas, a laissé une bonne
comédie «Le Rustre» et une de valeur moindre «Les Sortilèges»;
Jacques Kouharenko en a écrit également plusieurs.
Parmi les poètes tragiques qui sont fort nombreux, il faut citer
tout d’abord: Nicolas Kostomaroff (1817-1885) qui, par son œuvre
historique, appartient à la littérature russe, mais reste ukrainien par
ses poésies débordantes de patriotisme et ses deux tragédies:
«Sava Tchaly» et «La Nuit de Pereiaslav». Michel Starytsky (1840-
1904), qui fit du théâtre un puissant facteur de propagande
nationale; il a écrit un certain nombre de pièces qui frappent
l’imagination, enchantent et émeuvent. Marco Kropyvnitsky (1841-
1910), qui donne toute une série de types et de tableaux pris sur le
vif. J. Tobilevitch qui, plus connu sous son pseudonyme Karpenko-
Kary (1865-1907) est un écrivain de tout premier ordre, et a laissé,
avec un beau drame historique «Sava Tchaly», d’excellentes études
de mœurs populaires.
Le théâtre ukrainien a toujours joui sur tout le territoire de la
Russie d’une renommée justement célèbre, car ses acteurs sont
excellents. Mais, jusqu’à 1895, ces acteurs n’avaient pu jouer qu’en
dehors des frontières de l’Ukraine, à Petrograd, à Moscou et
jusqu’en Sibérie, et seulement depuis l’ordonnance 1876. En 1895,
le général-gouverneur Dragomirov, ukrainien russifié, mais
secrètement attaché à l’Ukraine, accorda aux acteurs ukrainiens le
droit de jouer des pièces en langue ukrainienne à Kiev, à
Ekaterinoslav, et, en général, dans toute l’Ukraine. Aussi, les années
qui ont précédé la guerre virent-elles éclore toute une floraison de
comédies, de drames et de tragédies dont plusieurs annoncent de
réels talents. Parmi ceux-ci se placent au tout premier rang les
drames de Vinnitchenko, plus connu comme romancier mais qui
possède les véritables qualités du dramaturge. Son dernier drame:
«Entre deux Forces», inspiré par les tragiques événements qui se
sont déroulés en Ukraine, pendant la première occupation des
Bolcheviks, est un véritable chef-d’œuvre. Interdit par le Hetman
Skoropadsky, il fut joué en janvier 1919, après la reprise de Kiev par
les troupes de la République ukrainienne, et déchaîna un
enthousiasme indescriptible.
Roman et Nouvelle

Le roman fait de très bonne heure son apparition dans la


littérature ukrainienne avec les traductions des romans grecs
«L’Alexandria» du pseudo Calysthène, la «Guerre de Troie» et le
«Royaume des Indes».
Mais ce n’est qu’à la fin du XVIIIe siècle que devait paraître le
père du roman ukrainien tel que nous le concevons aujourd’hui.
C’est Grégoire Kwitka qui, sous le pseudonyme d’Osnovianenko, a
précédé George Sand, Auerbach et Tourgueniev, en écrivant de
charmantes nouvelles tirées de la vie du peuple. Son principal
roman: «Maroussia» est une œuvre de sensibilité sincère et exquise.
«La Sorcière de Konotop», «Oxana malheureuse», «L’amour
sincère», dénotent une grande pureté de sentiment et un profond
amour du peuple, de son pays et de sa langue.
Ivan Levytsky, connu sous le pseudonyme de Netchouy, jouit
d’une grande vogue dans toute l’Ukraine. Parmi ses nombreux
romans, il faut citer: «Deux Moscovites», «La Nuit de Horeslav», «Le
Crampon», «Ténèbres», «La Remorqueuse», etc.
Panas Myrny eut de nombreux démêlés avec le Gouvernement
russe. Son principal roman «Les Bœufs ne mugissent pas quand ils
ont du foin dans le râtelier», où il dépeint la vie sociale, a été édité à
Genève par Dragomanov.
Marie Markovyck, sous le pseudonyme de Marko Wowtchok
(1834-1907), fut pour le roman ukrainien ce que Chevtchenko fut
pour la poésie. Elle dépeint les mœurs et la vie des serfs et les
anciennes coutumes de l’Ukraine. «Maroussia» est un véritable petit
chef-d’œuvre et ses Contes Populaires, parus en 1856, eurent un tel
succès qu’ils furent traduits en russe par Tourgueniev, en anglais et
en français. La traduction française de «Maroussia» due à l’habile
plume de M. Stahl, a eu un tel succès, qu’elle compte aujourd’hui
plus de 80 éditions.
Alexandra Koulich (1829-1911) a écrit sous le pseudonyme de
Hanna Barvinok un grand nombre de romans sur la vie du peuple,
où elle fait preuve d’un profond esprit d’observation.
Anatole Swidnytsky (1834-1872) a laissé des romans «Les
Luboradsky» (Chronique de famille), qui dépeignent la vie des
«Années soixante» dans les milieux bourgeois ukrainiens qui
commençaient à se dénationaliser.
Ivan Franko (1856-1916), tour à tour poète et romancier, dépeint
dans une série de nouvelles, l’exploitation du peuple dans les mines
pétrolifères de Borislav «Boa constrictor», «A la sueur de son front»,
«Pour le foyer», «La Croisée des chemins», «Au sein de la nature»,
etc. et la misère des paysans livrés à la merci des seigneurs.
Michel Kotsioubinsky (1864-1913) peut se comparer à Guy de
Maupassant par la profondeur de son analyse psychologique et à
Tourgueniev par ses tableaux de la nature. Dans son «Intermezzo»,
il dépeint l’immensité des champs de l’Ukraine et son ciel cristallin,
avec un lyrisme qui n’a d’égal que l’émotion provoquée par le récit
des malheureux paysans mis en scène. Les «Fata Morgana» sont
des scènes tragiques et angoissantes de la Révolution de 1905. Les
«Ombres d’ancêtres oubliés» dépeignent la vie des montagnards
vivant dans les Carpathes.
Maître d’une langue parfaite, profond psychologue, Kotsioubinsky
a donné des œuvres qui sont considérées comme les plus parfaites
de la littérature ukrainienne.
M. Vinnitchenko, dont l’analyse psychologique est également très
profonde, ne cherche pas à idéaliser ses héros ordinairement
communs et même vulgaires, mais néanmoins très vivants. Chacun
de ses romans est un chef-d’œuvre d’observation. Parmi les plus
connus, il faut citer «Holota» (Populace), tableau triste et puissant de
la vie du prolétariat agraire; «Je veux», peinture forte et énergique
de la vie des intellectuels ukrainiens, en même temps que puissante
analyse du sentiment national dans l’âme d’un intellectuel ukrainien
russifié, «Le Mensonge», «L’Ours Blanc et la Panthère Noire», etc.
Histoire

L’Histoire fait son apparition dans la littérature ukrainienne sous


la forme de Chroniques dont les principales sont celles de Nestor au
XIIe siècle et celles de Kiev et de Galicie-Volhynie qui les continuent
jusqu’en 1292.
Merveilleux assemblage de légendes et de faits historiques
racontés avec une naïveté, une vivacité charmantes et un grand soin
d’exactitude, elles expriment le caractère national ukrainien qui, dit
l’historien Soloviov «est d’une toute autre nature que le caractère
grand-russien».
La dynastie lithuanienne eut aussi des historiens pour raconter
l’époque de luttes et de mouvements populaires qu’eût à traverser
l’Ukraine, depuis l’invasion tartare jusqu’à la perte de ses droits
politiques, sous la domination russe. Les événements de cette
époque sont contenus dans les Chroniques de Lemberg, de Kiev, de
la Ruthène-Lithuanie, au XVe siècle; dans les Mémoires de Samuel
Zokie, secrétaire de Khmielnitski, de Jevlaszewsky, de Khanenko et
de Markovyck et dans les Chroniques cosaques dont la plus
intéressante et la plus littéraire est celle de Velytchko (1690 à 1728).

Mais c’est au XIXe siècle que la littérature ukrainienne devait


trouver ses véritables historiens dans Michel Dragomanov, V.
Antonovitch et surtout dans Michel Grouchevsky.
Michel Dragomanov (1841-1895), extrêmement cultivé, resta
profondément attaché à sa patrie bien qu’il ait surtout séjourné à
l’étranger, à Paris et à Sofia. Il a fait connaître l’Ukraine à la France
par des brochures riches de faits et de conclusions: «La Politique
orientale de l’Allemagne et la russification», «l’Ukraine et les
Empires centraux», «La Pologne historique et la démocratie grand-
russienne», «Pensées étranges sur la question nationale de
l’Ukraine», «Lettres à l’Ukraine du Dnièpre».
Dragomanov a puissamment contribué au maintien du sentiment
national dans l’âme du peuple ukrainien.
V. Antonovitch, profondément érudit, a écrit sur l’histoire de
l’Ukraine plusieurs ouvrages dont les principaux sont:
«Monographies historiques», «Dernières années de l’organisation
cosaque dans l’Ukraine occidentale». Il a travaillé sur la fin de sa vie
à un rapprochement ukraino-polonais, sans arriver à un résultat
sérieux.
Michel Grouchevsky est assurément le plus grand historien de
l’Ukraine. Son «Histoire de l’Ukraine» compte déjà sept volumes et
s’arrête à la révolte des Cosaques (1625), mais on peut déjà la
considérer comme un chef-d’œuvre par la grande quantité de
documents compulsés et sa force de dialectique.
Parmi les autres historiens ukrainiens contemporains, il faut citer
Oreste Levytsky, auteur de Monographies remarquables, le Père
Kripviakievitch et Bogdan Buchinsky, auteurs de travaux très
documentés sur l’Eglise en Ukraine, Lypinsky qui s’adonne
spécialement à l’histoire des relations polono-ruthènes et qui a déjà
fait paraître quelques volumes du plus grand intérêt et enfin, pour y
prendre une place particulière, M. Stephane Tomachevsky dont
l’Insurrection des Haïdamaks et les Etudes historiques sur les
Ukrainiens de Hongrie se recommandent par leur documentation et
leur impartialité.
Cet aperçu de la littérature ukrainienne est nécessairement très
court et laisse dans l’ombre un trop grand nombre d’écrivains qui
mériteraient chacun une mention spéciale, mais il est cependant
suffisant pour montrer que, malgré les obstacles suscités par ses
maîtres, malgré les décrets de proscription et de prohibition, le
peuple ukrainien a gardé le culte de sa langue et des belles-lettres et
qu’à l’avenir il saura user de la liberté qu’il a conquise pour se
développer intellectuellement et moralement.

You might also like