Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

Recent Trends and Best Practices in

Industry 4.0 (River Publishers Series in


Mathematical, Statistical and
Computational Modelling for
Engineering) 1st Edition Abhinav
Sharma (Editor)
Visit to download the full and correct content document:
https://ebookmass.com/product/recent-trends-and-best-practices-in-industry-4-0-river-
publishers-series-in-mathematical-statistical-and-computational-modelling-for-enginee
ring-1st-edition-abhinav-sharma-editor/
Recent Trends and Best Practices in
Industry 4.0
RIVER PUBLISHERS SERIES IN MATHEMATICAL,
STATISTICAL AND COMPUTATIONAL MODELLING
FOR ENGINEERING

Series Editors:
MANGEY RAM
Lecturer (Asst. Prof.) in Automotive Engineering,

TADASHI DOHI
Hiroshima University, Japan

ALIAKBAR MONTAZER HAGHIGHI


Prairie View Texas A& M University, USA

Applied mathematical techniques along with statistical and computational data analysis has
become vital skills across the physical sciences. The purpose of this book series is to present
novel applications of numerical and computational modelling and data analysis across the
applied sciences. We encourage applied mathematicians, statisticians, data scientists and
computing engineers working in a comprehensive range of research fields to showcase dif-
ferent techniques and skills, such as differential equations, finite element method, algorithms,
discrete mathematics, numerical simulation, machine learning, probability and statistics, fuzzy
theory, etc.
Books published in the series include professional research monographs, edited vol-
umes, conference proceedings, handbooks and textbooks, which provide new insights for
researchers, specialists in industry, and graduate students. Topics included in this series are
as follows:-
• Discrete mathematics and computation
• Fault diagnosis and fault tolerance
• Finite element method (FEM) modeling/simulation
• Fuzzy and possibility theory
• Fuzzy logic and neuro-fuzzy systems for relevant engineering applications
• Game Theory
• Mathematical concepts and applications
• Modelling in engineering applications
• Numerical simulations
• Optimization and algorithms
• Queueing systems
• Resilience
• Stochastic modelling and statistical inference
• Stochastic Processes
• Structural Mechanics
• Theoretical and applied mechanics

For a list of other books in this series, visit www.riverpublishers.com


Recent Trends and Best Practices in
Industry 4.0

Editors

Abhinav Sharma
University of Petroleum and Energy Studies, India

Arpit Jain
QpiAI India Private Limited, India

Paawan Sharma
Pandit Deendayal Energy University, India

Mohendra Roy
Pandit Deendayal Energy University, India

River Publishers
Published 2023 by River Publishers
River Publishers
Alsbjergvej 10, 9260 Gistrup, Denmark
www.riverpublishers.com

Distributed exclusively by Routledge


605 Third Avenue, New York, NY 10017, USA
4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN

Recent Trends and Best Practices in Industry 4.0 / by Abhinav Sharma, Arpit
Jain, Paawan Sharma, Mohendra Roy.

© 2023 River Publishers. All rights reserved. No part of this publication may
be reproduced, stored in a retrieval systems, or transmitted in any form or by
any means, mechanical, photocopying, recording or otherwise, without prior
written permission of the publishers.

Routledge is an imprint of the Taylor & Francis Group, an informa


business

ISBN 978-87-7022-805-3 (print)


ISBN 978-87-7022-997-5 (paperback)
ISBN 978-10-0096-438-7 (online)
ISBN 978-10-0344-171-7 (master ebook)

While every effort is made to provide dependable information, the


publisher, authors, and editors cannot be held responsible for any errors
or omissions.
Contents

Preface xvii

Acknowledgement xxi

List of Figures xxiii

List of Tables xxvii

List of Contributors xxix

List of Abbreviations xxxiii

1 Artificial Intelligence in the Digital Chemical Industry, Its


Application and Sustainability 1
Praveen Kumar Ghodke, P. Swapna Reddy, Narendra Akiti,
and Hemalatha Kilari
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 AI in the Chemical Industry and Applications . . . . . . . . 3
1.2.1 AI in chemical science . . . . . . . . . . . . . . . . 5
1.2.2 AI in research and development . . . . . . . . . . . 6
1.2.3 AI in catalyst design spaces . . . . . . . . . . . . . 7
1.3 Sustainability of AI Applications . . . . . . . . . . . . . . . 9
1.3.1 Environmental aspect . . . . . . . . . . . . . . . . . 9
1.3.2 Energy aspect . . . . . . . . . . . . . . . . . . . . . 10
1.3.3 Economic aspect . . . . . . . . . . . . . . . . . . . 11
1.3.4 Time aspect . . . . . . . . . . . . . . . . . . . . . . 12
1.3.5 Safety and human factor aspect . . . . . . . . . . . 12
1.4 Digital Transformation of the Chemical Industry . . . . . . . 13
1.4.1 State of digital transformation . . . . . . . . . . . . 14
1.4.2 Key trends in digitalization . . . . . . . . . . . . . . 14
1.4.3 Optimizing production . . . . . . . . . . . . . . . . 14

v
vi Contents

1.4.4 Supporting remote operations . . . . . . . . . . . . 15


1.4.5 Reducing waste . . . . . . . . . . . . . . . . . . . . 15
1.4.6 Unlocking new growth opportunities . . . . . . . . . 16
1.4.7 Increasing supply chain visibility . . . . . . . . . . 16
1.4.8 Safety, compliance, and sustainability . . . . . . . . 16
1.5 Digital Chemical Industry 4.0 . . . . . . . . . . . . . . . . . 17
1.6 Challenges of AI in the Chemical Industry . . . . . . . . . . 19
1.7 Industry 4.0 Impact Technologies . . . . . . . . . . . . . . . 20
1.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2 Managing Transition Toward Industry 4.0: A Study on the


Implementation of Digital Manufacturing Processes 31
Vijay Anant Athavale, Ankit Bansal, Akhilesh Kumar Mishra, and
Anil Kumar Kapil
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2 Main Text . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.1 Problem formulation . . . . . . . . . . . . . . . . . 34
2.2.2 Purpose and question . . . . . . . . . . . . . . . . . 34
2.2.3 Related research . . . . . . . . . . . . . . . . . . . 34
2.2.4 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . 34
2.2.5 Strategic guidance for IIoT . . . . . . . . . . . . . . 36
2.2.6 Strategy . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2.7 Resources and competencies . . . . . . . . . . . . . 37
2.2.8 IT maturity . . . . . . . . . . . . . . . . . . . . . . 38
2.2.9 Smart manufacturing . . . . . . . . . . . . . . . . . 40
2.2.10 Method . . . . . . . . . . . . . . . . . . . . . . . . 41
2.2.11 Delimitation . . . . . . . . . . . . . . . . . . . . . 41
2.2.12 Method selection . . . . . . . . . . . . . . . . . . . 42
2.2.13 Data collection . . . . . . . . . . . . . . . . . . . . 43
2.2.14 Literature review . . . . . . . . . . . . . . . . . . . 43
2.2.15 Interview . . . . . . . . . . . . . . . . . . . . . . . 44
2.2.16 Selection and respondents . . . . . . . . . . . . . . 46
2.2.17 Ethics . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.2.18 Data analysis . . . . . . . . . . . . . . . . . . . . . 47
2.2.19 Transcription . . . . . . . . . . . . . . . . . . . . . 47
2.2.20 Coding . . . . . . . . . . . . . . . . . . . . . . . . 47
2.2.21 Method discussion . . . . . . . . . . . . . . . . . . 48
2.3 Outcomes of the Study . . . . . . . . . . . . . . . . . . . . 50
2.3.1 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . 50
Contents vii

2.3.2 Strategy . . . . . . . . . . . . . . . . . . . . . . . . 51
2.3.3 Resources and competencies . . . . . . . . . . . . . 53
2.3.4 IT maturity . . . . . . . . . . . . . . . . . . . . . . 54
2.3.5 Smart manufacturing . . . . . . . . . . . . . . . . . 55
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 55

3 Container as a Service in Cloud: An Approach to Secure


Hybrid Virtualization 59
Manoj Kumar Patra, Bibhudatta Sahoo, and Ashok Kumar Turuk
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.2 Virtualization in Cloud Computing . . . . . . . . . . . . . . 62
3.2.1 System level virtualization . . . . . . . . . . . . . . 63
3.2.2 OS level virtualization . . . . . . . . . . . . . . . . 64
3.2.3 Container vs. virtual machine . . . . . . . . . . . . 64
3.2.4 Architectural difference between VM and
container . . . . . . . . . . . . . . . . . . . . . . . 66
3.3 Container as a Service Model . . . . . . . . . . . . . . . . . 68
3.3.1 CaaS architecture . . . . . . . . . . . . . . . . . . . 68
3.4 Containerization Techniques . . . . . . . . . . . . . . . . . 69
3.4.1 Docker . . . . . . . . . . . . . . . . . . . . . . . . 70
3.4.2 Singularity . . . . . . . . . . . . . . . . . . . . . . 70
3.4.3 uDocker . . . . . . . . . . . . . . . . . . . . . . . . 70
3.5 Research Challenges . . . . . . . . . . . . . . . . . . . . . 71
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4 Automated Framework for Detecting Unknown Activity in a


Vehicular ad hoc Network 77
Atul B. Kathole, Dinesh N. Chaudhari, and Avinash P. Jadhav
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.1.1 VANET deployment challenges . . . . . . . . . . . 79
4.1.2 VANET applications . . . . . . . . . . . . . . . . . 81
4.1.3 Possible attacks on vehicular network . . . . . . . . 83
4.1.4 ML for vehicular networking . . . . . . . . . . . . . 85
4.1.5 Current challenges and opportunities . . . . . . . . . 85
4.1.5.1 Tests for vehicular networks . . . . . . . . 85
4.1.6 Research gap . . . . . . . . . . . . . . . . . . . . . 86
4.1.7 Problem statement . . . . . . . . . . . . . . . . . . 87
4.1.8 Motivation . . . . . . . . . . . . . . . . . . . . . . 88
4.2 Literature Work . . . . . . . . . . . . . . . . . . . . . . . . 88
viii Contents

4.2.1 An overview . . . . . . . . . . . . . . . . . . . . . 89
4.2.2 Mobility-based routing in VANET with security . . . 89
4.2.3 Encryption and authentication . . . . . . . . . . . . 91
4.3 Proposed Approach . . . . . . . . . . . . . . . . . . . . . . 92
4.3.1 Methodology . . . . . . . . . . . . . . . . . . . . . 94
4.3.2 Improve hybrid cooperative malicious node detection
approach (IHCMNDA) . . . . . . . . . . . . . . . . 95
4.4 Result and Discussion . . . . . . . . . . . . . . . . . . . . . 97
4.4.1 Simulation . . . . . . . . . . . . . . . . . . . . . . 97
4.4.2 Improved cooperative bait detection (ICBDS) . . . . 103
4.4.3 Improve hybrid cooperative malicious node detection
approach (IHCMNDA) . . . . . . . . . . . . . . . . 108
4.5 Conclusion and Future Work . . . . . . . . . . . . . . . . . 110

5 Control of Mobile Manipulator with Object Detection for EOD


Applications 117
Mukul Kumar Gupta, Vinay Chowdary, and C. S. Meera
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.1.1 Explosive ordnance disposal robots . . . . . . . . . 119
5.2 Object Detection . . . . . . . . . . . . . . . . . . . . . . . 121
5.2.1 Computer-aided design of the proposed design . . . 122
5.2.2 System architecture . . . . . . . . . . . . . . . . . . 122
5.3 Hardware Architecture . . . . . . . . . . . . . . . . . . . . 122
5.3.1 Robot-arm contol and actuation . . . . . . . . . . . 124
5.4 Object Detection . . . . . . . . . . . . . . . . . . . . . . . 124
5.4.1 TensorFlow . . . . . . . . . . . . . . . . . . . . . . 124
5.4.2 TensorFlow object detection API . . . . . . . . . . . 125
5.4.2.1 Object detection API using tensorFlow
2.0 . . . . . . . . . . . . . . . . . . . . . 125
5.5 Results and Discussion . . . . . . . . . . . . . . . . . . . . 127
5.5.1 Hardware implementation . . . . . . . . . . . . . . 127
5.5.2 Robotic arm simulation using MATLAB GUI . . . . 129
5.5.3 Simulation in gazebo using ROS . . . . . . . . . . . 129
5.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 131

6 Smart Agriculture: Emerging and Future Farming


Technologies 135
S. Sathiya, Cecil Antony, and Praveen Kumar Ghodke
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Contents ix

6.2 Role of Smart Agriculture in Yield Enhancement . . . . . . 139


6.2.1 Soil samples and its mapping . . . . . . . . . . . . . 140
6.2.2 Smart irrigation systems . . . . . . . . . . . . . . . 142
6.2.3 Smart fertilizer system . . . . . . . . . . . . . . . . 143
6.2.4 Smart disease control and pest management . . . . . 144
6.2.5 Smart monitoring of crop yields and climatic
conditions . . . . . . . . . . . . . . . . . . . . . . . 145
6.3 Technologies Involved in Precision Agriculture . . . . . . . 146
6.3.1 Wireless sensing technology in agriculture . . . . . 147
6.3.1.1 Soil monitoring sensors . . . . . . . . . . 149
6.3.1.2 Yield monitoring sensors . . . . . . . . . 149
6.3.1.3 Weeds, pest, and disease monitoring
sensors . . . . . . . . . . . . . . . . . . . 150
6.3.1.4 Field monitoring sensors . . . . . . . . . 151
6.3.2 Communication methods and latest technologies in
smart agriculture . . . . . . . . . . . . . . . . . . . 154
6.3.2.1 Mobile communication systems . . . . . . 154
6.3.2.2 ZigBee wireless technology . . . . . . . . 155
6.3.2.3 Bluetooth wireless technology . . . . . . 155
6.3.2.4 LoRa and sigFox technology . . . . . . . 155
6.3.2.5 Smartphones-based communication . . . . 156
6.3.2.6 Cloud computing . . . . . . . . . . . . . 156
6.3.2.7 Fog/edge computing . . . . . . . . . . . . 157
6.3.3 Latest technologies for large data processing . . . . 157
6.3.3.1 Big data . . . . . . . . . . . . . . . . . . 157
6.3.3.2 Artificial intelligence . . . . . . . . . . . 160
6.3.3.3 Deep learning . . . . . . . . . . . . . . . 160
6.4 Autonomous Vehicles in Smart Agriculture . . . . . . . . . 163
6.4.1 IoT-based tractors . . . . . . . . . . . . . . . . . . . 163
6.4.2 Harvesting robots . . . . . . . . . . . . . . . . . . . 164
6.4.3 UAVs in agriculture . . . . . . . . . . . . . . . . . . 165
6.5 Challenges in Smart Agriculture . . . . . . . . . . . . . . . 167
6.6 Conclusions and Future Directions . . . . . . . . . . . . . . 168

7 Plant Feature Extraction for Disease Classification 183


Amar Kumar Dey and Abhishek Sharma
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 184
7.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . 186
7.3 Features Representation and Characteristics . . . . . . . . . 187
x Contents

7.4 Texture Features . . . . . . . . . . . . . . . . . . . . . . . 187


7.4.1 Statistical methods for texture classification . . . . . 188
7.4.1.1 Advantages and limitations . . . . . . . . 189
7.4.2 Gray-level run-length matrix . . . . . . . . . . . . 189
7.4.3 Advantages and limitations . . . . . . . . . . . . . . 190
7.4.4 Histogram of gradient magnitudes . . . . . . . . . . 190
7.4.4.1 Advantages and limitations . . . . . . . . 190
7.5 Color Features Extraction . . . . . . . . . . . . . . . . . . . 191
7.5.1 Advantage and disadvantages . . . . . . . . . . . . 191
7.5.2 Color co-occurrence matrix (CCM) . . . . . . . . . 192
7.5.2.1 Advantage and disadvantages . . . . . . . 193
7.6 Shape-based Feature Extraction . . . . . . . . . . . . . . . 194
7.6.1 Advantage and disadvantages . . . . . . . . . . . . 196
7.7 Conclusion and Future Scope . . . . . . . . . . . . . . . . . 197

8 Development Methodologies for Internet of Things: For all


Commercial and Industrial Needs 203
Yazeed Alzahrani
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 204
8.2 Research Questions . . . . . . . . . . . . . . . . . . . . . . 204
8.3 Development Methodologies . . . . . . . . . . . . . . . . . 205
8.3.1 Development methodologies for IoT-based smart
cities . . . . . . . . . . . . . . . . . . . . . . . . . 205
8.3.1.1 Spatial (Geographical) IoT . . . . . . . . 206
8.3.1.2 Smart campus surveillance . . . . . . . . 207
8.3.2 Development methodologies for IoT-based automatic
driving . . . . . . . . . . . . . . . . . . . . . . . . 211
8.3.3 Development methodologies for IoT-based agricul-
ture field monitoring . . . . . . . . . . . . . . . . . 213
8.3.4 Development methodologies for IoT-based railway
monitoring . . . . . . . . . . . . . . . . . . . . . . 215
8.3.5 Development methodologies for IoT-based forest
monitoring . . . . . . . . . . . . . . . . . . . . . . 217
8.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Contents xi

9 Bio-inspired Multilevel ICHB-HEED Clustering Protocol for


Heterogeneous WSNs 225
Prateek Gupta, Amrita, Himansu Sekhar Pattanayak, Gunjan,
Lalit Kumar Awasthi, and Vachik S. Dave
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 226
9.2 Review of Literature . . . . . . . . . . . . . . . . . . . . . 227
9.3 Proposed Work . . . . . . . . . . . . . . . . . . . . . . . . 229
9.3.1 Network model for multilevel energy
heterogeneity . . . . . . . . . . . . . . . . . . . . . 229
9.3.2 MLICHBHEED protocol . . . . . . . . . . . . . . . 231
9.3.2.1 Clustering and CH election process . . . . 232
9.3.2.2 ICHB algorithm . . . . . . . . . . . . . . 232
9.3.2.3 Process of data transmission and
collection . . . . . . . . . . . . . . . . . 233
9.3.2.4 Energy depletion model for MLICHB-
HEED protocol . . . . . . . . . . . . . . 233
9.4 Results and Discussions . . . . . . . . . . . . . . . . . . . . 234
9.4.1 Network lifetime . . . . . . . . . . . . . . . . . . . 236
9.4.2 Total energy consumption . . . . . . . . . . . . . . 238
9.4.3 Number of packets sent to the base station . . . . . 242
9.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 242

10 IoT Enabled by Edge Computing for Telecomm and Industry 247


Manoj Kumar Sharma, Ruchika Mehta, and
Rajveer Singh Shekhawat
10.1 Introduction to IoT and Edge Computing . . . . . . . . . . . 248
10.1.1 IoT and edge-computing scenarios . . . . . . . . . . 250
10.1.2 IoT versus edge computing . . . . . . . . . . . . . 253
10.1.3 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . 254
10.1.4 Cloud computing and edge computing . . . . . . . 256
10.1.5 Cloud computing and edge computing: use cases . . 257
10.2 IoT and Edge Computing Framework . . . . . . . . . . . . 261
10.2.1 IoT and edge computing integrated framework . . . 263
10.2.2 Pros and cons . . . . . . . . . . . . . . . . . . . . . 264
10.2.3 Opportunities and challenges . . . . . . . . . . . . . 264
10.3 Edge Computing Devices . . . . . . . . . . . . . . . . . . 265
10.4 Telcos and Edge Computing . . . . . . . . . . . . . . . . . 266
10.4.1 Telco network modernizations challenges . . . . . . 268
10.4.2 Multi-access edge computing . . . . . . . . . . . . 268
xii Contents

10.4.2.1 Advantages of MEC . . . . . . . . . . . . 270


10.5 Task Scheduling in Edge Computing . . . . . . . . . . . . . 271
10.5.1 Scheduler-based edge computing . . . . . . . . . . 271
10.5.2 Computing task analysis . . . . . . . . . . . . . . . 272
10.5.2.1 Local execution . . . . . . . . . . . . . . 272
10.5.2.2 Full offloading . . . . . . . . . . . . . . . 273
10.5.2.3 Partial offloading . . . . . . . . . . . . . 273
10.5.3 Computing task scheduling scheme . . . . . . . . . 273
10.5.3.1 Task scheduling algorithm . . . . . . . . . 274
10.5.3.2 Bidding-model optimization and adaptive
algorithm . . . . . . . . . . . . . . . . . . 275
10.6 Security and Privacy Issues of Edge Computing . . . . . . . 276
10.6.1 Attacks classification . . . . . . . . . . . . . . . . 277
10.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 279

11 Low-energy Network Protocols 283


Hiren Kathiriya, Arjav Bavarva, and Vishal Sorathiya
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 284
11.2 IIoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
11.2.1 Network architecture . . . . . . . . . . . . . . . . . 286
11.2.2 Protocols . . . . . . . . . . . . . . . . . . . . . . . 287
11.2.3 Testbed . . . . . . . . . . . . . . . . . . . . . . . . 288
11.2.4 Criteria for implementation . . . . . . . . . . . . . . 289
11.3 Low-energy Technologies . . . . . . . . . . . . . . . . . . 290
11.4 Self-powered Network . . . . . . . . . . . . . . . . . . . . 292
11.4.1 Comparison between energy harvesting WSNs and
battery-operated WSNs . . . . . . . . . . . . . . . 292
11.4.2 Energy-harvesting sources for sensors . . . . . . . . 293
11.4.3 Energy stored by a supercapacitor . . . . . . . . . . 294
11.4.4 Proposed circuit . . . . . . . . . . . . . . . . . . . 295
11.4.5 BLE–RSL10 from ON Semiconductor . . . . . . . . 295
11.4.6 Key features of BLE-RSL10 . . . . . . . . . . . . . 295
11.4.7 Lifetime improvement of WSN . . . . . . . . . . . 298
11.4.8 Energy model for WSN . . . . . . . . . . . . . . . 299
11.4.9 Lifetime optimization in a mobile WSN with solar
energy harvesting . . . . . . . . . . . . . . . . . . . 300
11.4.10 Time-slotted approach . . . . . . . . . . . . . . . . 300
11.4.11 Optimization algorithm . . . . . . . . . . . . . . . . 300
11.5 Simulation of WSN Network and Results . . . . . . . . . . 301
Contents xiii

11.5.1 Simulation parameters . . . . . . . . . . . . . . . . 301


11.5.2 Simulation results . . . . . . . . . . . . . . . . . . 302
11.6 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . 305
11.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 305

12 Consensus Algorithms in Blockchain for Efficient and Secure


Network 309
Medini Gupta, Sarvesh Tanwar, Niranjan Lal, and Ritvik Pawar
12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 310
12.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . 311
12.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . 311
12.3 Emergence of Cryptocurrencies . . . . . . . . . . . . . . . 315
12.4 Role of Consensus Algorithms . . . . . . . . . . . . . . . . 317
12.4.1 Proof of work . . . . . . . . . . . . . . . . . . . . . 318
12.4.2 Proof of stake . . . . . . . . . . . . . . . . . . . . . 320
12.4.3 Delegated proof of stake (DPoS) . . . . . . . . . . 322
12.4.4 Byzantine fault tolerance (BFT) . . . . . . . . . . . 322
12.4.5 Proof of burn (PoB) . . . . . . . . . . . . . . . . . 322
12.4.6 Proof of capacity (PoC) . . . . . . . . . . . . . . . 323
12.4.7 Proof of elapsed time (PoET) . . . . . . . . . . . . 323
12.5 Limitation of Consensus Algorithms . . . . . . . . . . . . . 324
12.5.1 Failure of consensus . . . . . . . . . . . . . . . . . 324
12.5.2 Ledger forks . . . . . . . . . . . . . . . . . . . . . 324
12.5.3 Substandard performance . . . . . . . . . . . . . . . 324
12.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 325

13 Blockchain Protocols and Algorithms 329


H. Echchaoui, A. Miloud-Aouidate, and R. Boudour
13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 330
13.2 Blockchain Technology and Industry 4.0 . . . . . . . . . . . 331
13.2.1 Basic concepts . . . . . . . . . . . . . . . . . . . . 331
13.2.2 Related works . . . . . . . . . . . . . . . . . . . . . 333
13.2.3 Algorithm or protocol? . . . . . . . . . . . . . . . . 334
13.3 Known Blockchain Consensus Algorithms . . . . . . . . . 335
13.3.1 Popular algorithms . . . . . . . . . . . . . . . . . . 336
13.3.1.1 Proof of work (PoW) . . . . . . . . . . . 336
13.3.1.2 Proof of stake . . . . . . . . . . . . . . . 337
13.3.1.3 Federated byzantine agreement
(FBA) . . . . . . . . . . . . . . . . . . . 338
xiv Contents

13.3.2 Derivative algorithms . . . . . . . . . . . . . . . . . 338


13.3.2.1 Algorithms based on pow . . . . . . . . . 339
13.3.2.2 Algorithms based on Pos . . . . . . . . . 340
13.3.2.3 Algorithms based on FBA . . . . . . . . . 343
13.4 Less-known Blockchain Consensus Algorithms . . . . . . . 345
13.4.1 Algorithms based on PoW . . . . . . . . . . . . . . 345
13.4.2 Algorithms based on PoS . . . . . . . . . . . . . . . 347
13.4.3 Algorithms based on FBA . . . . . . . . . . . . . . 349
13.4.4 Hybrid algorithms . . . . . . . . . . . . . . . . . . 352
13.4.5 PoX algorithms . . . . . . . . . . . . . . . . . . . . 353
13.5 Blockchain Protocols . . . . . . . . . . . . . . . . . . . . . 355
13.5.1 Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . 355
13.5.2 Ethereum . . . . . . . . . . . . . . . . . . . . . . . 356
13.5.3 Corda . . . . . . . . . . . . . . . . . . . . . . . . . 357
13.5.4 Quorum . . . . . . . . . . . . . . . . . . . . . . . 357
13.5.5 Hyperledger . . . . . . . . . . . . . . . . . . . . . . 358
13.5.6 EOSIO . . . . . . . . . . . . . . . . . . . . . . . . 358
13.5.7 NEM (New Economy Movement) . . . . . . . . . . 359
13.5.8 Multichain . . . . . . . . . . . . . . . . . . . . . . 359
13.5.9 Consensus algorithms and protocols
classification . . . . . . . . . . . . . . . . . . . . . 359
13.6 Blockchain Applications . . . . . . . . . . . . . . . . . . . 359
13.6.1 How to develop a blockchain application? . . . . . 359
13.6.2 Example of blockchain application in industry
4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 363
13.6.3 How to choose a blockchain consensus algorithm
and protocol? . . . . . . . . . . . . . . . . . . . . . 364
13.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 365

14 Cybersecurity in Autonomous Driving Vehicles 373


Manoj Kumar Sharma, Ruchika Mehta, and Rajveer Singh
Shekhawat
14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 374
14.1.1 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . 375
14.1.2 Autonomous vehicles and industry 4.0 . . . . . . . 376
14.1.3 Criteria to use autonomous vehicles in industrial
operation . . . . . . . . . . . . . . . . . . . . . . . 378
14.2 IoT and Cybersecurity . . . . . . . . . . . . . . . . . . . . 378
14.2.1 Cybersecurity—risk assessment . . . . . . . . . . . 379
Contents xv

14.3 Autonomous Driving Applications . . . . . . . . . . . . . . 381


14.3.1 Autonomous vehicle road behavior . . . . . . . . . 382
14.4 Autonomous Driving Vehicle: Enabling Technologies . . . 383
14.4.1 Functional framework of autonomous vehicle . . . . 384
14.4.1.1 Position, mapping and localization . . . . 384
14.4.1.2 Deep learning algorithms, sensor fusion,
guidance and control . . . . . . . . . . . . 385
14.4.1.3 Communications . . . . . . . . . . . . . . 386
14.4.1.4 Sensing and perception . . . . . . . . . . 386
14.4.1.5 Data ownership and privacy . . . . . . . . 387
14.4.1.6 Embedded systems . . . . . . . . . . . . 388
14.4.1.7 Variable data acquisition (VDA) . . . . . 389
14.5 Autonomous Vehicle Security . . . . . . . . . . . . . . . . 389
14.5.1 Protection methods . . . . . . . . . . . . . . . . . . 390
14.5.2 Potential security risks of AV crowdsourcing . . . . 390
14.5.2.1 Attacks on automotive control
systems . . . . . . . . . . . . . . . . . . 391
14.5.2.2 Electronic control unit attack . . . . . . . 391
14.5.2.2.1 In-vehicle network attack . . . . 391
14.5.2.2.2 Automotive key attack . . . . . 392
14.5.2.2.3 Attacks on autonomous driving
system components . . . . . . . 392
14.5.3 Attacks on V2X communications technologies . . . 392
14.5.3.1 VANET attack . . . . . . . . . . . . . . . 393
14.5.3.2 Bluetooth attack . . . . . . . . . . . . . . 393
14.5.4 Autonomous vehicle defense . . . . . . . . . . . . 393
14.5.4.1 Security architectures for autonomous
defense . . . . . . . . . . . . . . . . . . 393
14.5.4.1.1 Control area network and elec-
tronic control unit
security . . . . . . . . . . . . . 393
14.5.4.1.2 Vehicular ad hoc networks secu-
rity (VANET) . . . . . . . . . . 395
14.5.4.1.3 Security design and process . . 395
14.5.5 Security by design . . . . . . . . . . . . . . . . . . 395
14.5.5.1 Adversarial model . . . . . . . . . . . . . 396
14.5.5.2 Trust model and security . . . . . . . . . 397
14.5.5.3 Security mechanisms . . . . . . . . . . . 397
xvi Contents

14.5.5.4 Autonomous vehicle operational model


and security objectives . . . . . . . . . . . 398
14.5.5.5 Safety standards for autonomous
vehicle . . . . . . . . . . . . . . . . . . . 399
14.5.5.6 Security perimeter . . . . . . . . . . . . . 400
14.5.6 Autonomous vehicle security management . . . . . 400
14.6 Cyberattacks on Autonomous Vehicle . . . . . . . . . . . . 400
14.6.1 Security and privacy threats: case of autonomous
automated vehicles . . . . . . . . . . . . . . . . . . 401
14.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 402

Index 407

About the Editors 409


Preface

In the 21st century, world experienced rapid change of technology across


the industries which leads to the evolution of Fourth Industrial Revolution
interchangeably used with Industry 4.0. It revolutionized the way industries
design, manufacture, and optimize their products and represents a new stage
in the organization and control of the industrial value chain.
Industrialists are integrating digital technologies such as internet of things
(IoT), artificial intelligence (AI) and machine learning, blockchain tech-
nology in the production and throughout their operations. These modern
technologies lead to improvement and automation of the industry. Since
Industry 4.0 is multidisciplinary in nature, this book combines multitude of
technologies from different domains. Keeping this in mind the book has been
organized into four sections.
CPS: Advancements in Connected Industrial Systems and Robotics
CPS are not limited to industrial floors anymore. They now comprise of com-
plex systems such as state-of-the-art robotics systems, drones, self-driving
cars, and many more. The applications of these systems are changing how
the industry functions. Chapter 1 provides application of AI techniques in
digitizing modern chemical industries and how it aids in sustainability goals.
In the chemicals field, digital transformation success necessitates a complete,
holistic approach that considers the entire asset lifespan, from design to oper-
ations and maintenance. The chapter not only discusses the applications but
also the practical challenge that arise during digital transformation. Chapter
2 provides data collected from semi-structured interviews with employees
of an industrial manufacturing enterprise who are involved toward migrating
old-generation industrial systems to a more modern platform. The chapter
lays down a systematic plan as adopted/suggested by industry practitioners.
Chapter 3 provides a guide of how to deploy container as a service (CaaS)
in cloud environments. Authors provide the architecture and implementation
of CaaS, along with the advantage and disadvantages of the technology.
Chapter 4 provides an automated framework for detecting unknown activity
in vehicular ad hoc networks. This improves traffic security and efficiency

xvii
xviii Preface

by providing low-latency traffic security applications. The authors suggest


an improved hybrid cooperative malicious node detection approach com-
bined with automated predication offer security against external attackers
in vehicular ad hoc network (VANETs). Chapter 5 presents the control of
mobile manipulator with object detection for explosive ordnance disposal
(EOD) application for a remotely operated mobile manipulator. The robot
prototype is an unmanned ground vehicle (UGV) with multi-terrain tracked
wheel chassis and a 6-degree of freedom (DOF) robotic arm mounted on the
top along with FPV camera for visual feedback.
AI: Machine Learning, Deep Learning Algorithms, and Applications
Smart agriculture and precision farming techniques are some of the key
applications of current industrial revolution directly effecting sustainable
development goals (SDG). Smart agriculture is a perfect example of interplay
of IoT/sensor networks, AI, cyberphysical systems (CPS), and blockchain for
various stages of farming due to the highly complex nature of the subject.
Chapter 6 reviews the existing and emerging sensors along with wireless
network and other communication technologies, IoT and AI focused on agri-
cultural industry. It also addresses the challenges of the latest technologies
and extends toward the discussion on future direction of smart agriculture.
Chapter 7 discusses the application of machine vision in the field of plant dis-
ease identification. The study focuses on a thorough examination of machine
learning-based extraction methods, as well as their benefits and drawbacks.
It covers a wide range of features, based on shape, texture, and color for
different diseases in diverse cultivations.
IoT and WSN bringing Enhanced Connectivity to Edge Devices
IoT brought a disruption in industrial communication. The edge devices
suddenly saw a huge multi-fold rise in resourceful and the industry had tons
of datapoints based on which the various operations can be optimized and
synchronized to a higher degree of accuracy. Chapter 8 provides a guide
to system development for scientists/engineers working in the field of IoT.
The chapter provides detailed insights from the secure-software develop-
ment methodology for different IoT applications. Various methodologies
are analyzed for two different parameters, that is, physical infrastructure,
emerging technologies. The chapter explores the various aspects such as
lifecycle, technologies, architecture, and frameworks. Chapter 9 proposes a
novel multi-level intelligent cluster head selection based on bacterial foraging
optimization (ICHB-HEED) (MLICHBHEED) protocol consisting of vary-
ing energy levels in heterogeneous model based on ICHB-HEED protocol.
Preface xix

The hybrid energy-efficient distributed (HEED) protocol is a clustering tech-


nology that is frequently used in WSNs. ICHB-HEED is a smart cluster head
election protocol using BFOA (bacterial foraging optimization algorithm).
The authors report an improvement in energy efficiency while delivering
improved network performance. Chapter 10 presents a comprehensive liter-
ature review of IoT applications with edge computing and their respective
architectures. Chapter 11 summarizes recent developments in low-energy
network protocols. The chapter also proposes a novel self-powered network
based on varying node energy levels. Hardware design and simulation results
have been provided to verify the optimized performance of the proposed
network.
Cybersecurity: Blockchain Technology and Applications
With more complexity of communication systems in Industry 4.0 and depen-
dency on internet and cloud technology security was never more critical
than in current generation of industrial systems. Blockchain is state–of-the-
art cybersecurity technique that not only disrupted the financial markets but
is significantly altering the supply chain, logistics, energy management, and
various other facets of today’s connected industries. Chapter 12 is focused on
detailed application analysis of consensus algorithm in blockchain to provide
an efficient and secure network by using emergence of cryptocurrencies as
an example. Chapter 13 provides a systematic study of various blockchain
protocols and algorithms. Here, the authors investigate a wide range of
blockchain algorithms and protocols’ applications in literature to summarize
their properties in a comprehensive classification under different criteria in
the form of a tree structure which acts as a quick guide to diverse set of
researchers looking to employ these. Chapter 14 provides various security
threats to self-driving cars discussing via case studies and possible techniques
for security management and prevention of the attacks/threats.
Editors:
Abhinav Sharma
University of Petroleum and Energy Studies, India
Arpit Jain
QpiAI India Private Limited, India
Paawan Sharma
Pandit Deendayal Energy University, India
Mohendra Roy
Pandit Deendayal Energy University, India
Acknowledgement

The Editor acknowledges River Publishers for this opportunity and profes-
sional support. My special thanks to Mr. Rajeev Prasad, River Publishers for
the excellent support, he provided us to complete this book. Thanks to the
chapter authors and reviewers for their availability for this work.

xxi
List of Figures

Figure 1.1 AI application in chemical industries. . . . . . . . 4


Figure 1.2 Catalyst identification process using ML-based
technique. . . . . . . . . . . . . . . . . . . . . . . 8
Figure 1.3 Pathway to finding new drugs using
AI-techniques. . . . . . . . . . . . . . . . . . . . . 9
Figure 3.1 Conventional cloud service model. . . . . . . . . . 62
Figure 3.2 Types of virtualization. . . . . . . . . . . . . . . . 63
Figure 3.3 Architecture of VM. . . . . . . . . . . . . . . . . . 67
Figure 3.4 Architecture of container. . . . . . . . . . . . . . . 67
Figure 3.5 Container as a service (CaaS) model. . . . . . . . . 69
Figure 4.1 VANET architecture using intermediator. . . . . . . 81
Figure 4.2 Flow of improved cooperative bait detection
scheme. . . . . . . . . . . . . . . . . . . . . . . . 95
Figure 4.3 Steps in simulation result of DSR. . . . . . . . . . 98
Figure 5.1 Explosive ordnance disposal robots. . . . . . . . . 121
Figure 5.2 Block diagram of control system. . . . . . . . . . . 123
Figure 5.3 Hardware architecture of the proposed model. . . . 123
Figure 5.4 Annotating image. . . . . . . . . . . . . . . . . . . 126
Figure 5.5 (a) Robot prototype in indoor environment, (b)
Robot prototype in outdoor environment. . . . . . . 127
Figure 5.6 Object detection results in a laboratory environment. 128
Figure 5.7 Robotic arm simulation using MATLAB GUI. . . 129
Figure 5.8 (a) Mobile robot simulation in gazebo, (b) Robot
perspective. . . . . . . . . . . . . . . . . . . . . . 130
Figure 5.9 Three-link manipulator MATLAB GUI simulation. 130
Figure 6.1 Evolution of agricultural technology. . . . . . . . . 137
Figure 6.2 Key factors of smart agriculture implementation. . 138
Figure 6.3 IoT-based agricultural monitoring. . . . . . . . . . 140
Figure 6.4 Smart agriculture based on wireless technology. . . 148
Figure 6.5 Sensor systems in smart agriculture. . . . . . . . . 148

xxiii
xxiv List of Figures

Figure 6.6 Architecture of convolutional neural network


(CNN)-based deep learning model. . . . . . . . . . 161
Figure 7.1 Basic blocks used for plant disease detection. . . . 185
Figure 7.2 Color features extraction of infected leaf sample:
(a) Original RGB image, (b) Red color channel, (c)
Green color channel, (d) Blue color channel. . . . . 192
Figure 7.3 A three-by-three mask is divided into four two-by-
two grids using CCM approach . . . . . . . . . . . 193
Figure 7.4 The possible scan pattern motifs. . . . . . . . . . . 193
Figure 7.5 Leaf image geometry. . . . . . . . . . . . . . . . . 194
Figure 8.1 Physical infrastructure of smart cities. . . . . . . . 208
Figure 8.2 Emerging technologies for smart cities. . . . . . . . 210
Figure 8.3 Emerging technologies for automatic driving. . . . 212
Figure 8.4 Emerging technologies for automatic driving. . . . 212
Figure 8.5 Physical infrastructure of agriculture field monitoring.214
Figure 8.6 Emerging technologies for agriculture field moni-
toring. . . . . . . . . . . . . . . . . . . . . . . . . 214
Figure 8.7 Physical infrastructure of railway monitoring. . . . 216
Figure 8.8 Emerging technologies for railway monitoring. . . 216
Figure 8.9 Physical infrastructure of forest monitoring. . . . . 217
Figure 8.10 Emerging technologies for forest monitoring. . . . 218
Figure 9.1 Network model showing different types of SNs in
the network for MLICHBHEED protocol at the 5-
level of heterogeneity. . . . . . . . . . . . . . . . . 235
Figure 9.2 Number of remaining alive SNs after each round for
MLICHBHEED protocols at varying heterogeneity
levels. . . . . . . . . . . . . . . . . . . . . . . . . 239
Figure 9.3 Residual energy of the network after each round for
MLICHBHEED protocols at varying heterogeneity
levels. . . . . . . . . . . . . . . . . . . . . . . . . 241
Figure 9.4 Number of packets sent to the BS by different
MLICHBHEED protocols in each round. . . . . . . 241
Figure 10.1 Edge computing issues. . . . . . . . . . . . . . . . 251
Figure 10.2 IoT Framework. . . . . . . . . . . . . . . . . . . . 251
Figure 10.3 Lifecycle of IoT devices. . . . . . . . . . . . . . . 253
Figure 10.4 Technologies Incorporated in Industry 4.0. . . . . . 255
Figure 10.5 Edge computing-based vehicle convoy. . . . . . . . 258
Figure 10.6 Cloud gaming using edge computing. . . . . . . . 259
Figure 10.7 Smart transport model using edge computing. . . . 260
List of Figures xxv

Figure 10.8 Typical edge computing architecture. . . . . . . . . 262


Figure 10.9 Edge computing architecture. . . . . . . . . . . . . 262
Figure 10.10 Edge computing network structure. . . . . . . . . . 263
Figure 10.11 Telco edge cloud platform. . . . . . . . . . . . . . 267
Figure 10.12 Multi-access edge omputing. . . . . . . . . . . . . 269
Figure 10.13 Simple MEC working. . . . . . . . . . . . . . . . 269
Figure 10.14 Scheduler-based edge computing. . . . . . . . . . 272
Figure 10.15 Task analysis. . . . . . . . . . . . . . . . . . . . . 274
Figure 10.16 Algorithm: Task scheduling algorithm. . . . . . . . 275
Figure 10.16 Bidding task scheduling. . . . . . . . . . . . . . . 276
Figure 11.1 Concept of IIoT network. . . . . . . . . . . . . . . 285
Figure 11.2 Industrial IoT architecture. . . . . . . . . . . . . . 289
Figure 11.3 (a) Coverage and data rate in IIOT technology, (b)
Terminal, connection cost and energy efficiency in
IIOT enabling technologies. . . . . . . . . . . . . . 291
Figure 11.4 Network architecture in low-powered WAN network. 291
Figure 11.5 Potential energy-harvesting sources for sensors. . . 294
Figure 11.6 Duty cycle power considerations for Bluetooth low-
energy technology. . . . . . . . . . . . . . . . . . 295
Figure 11.7 Solar-powered wireless sensor node using BLE. . . 296
Figure 11.8 Supercapacitor charging circuit. . . . . . . . . . . 296
Figure 11.9 Supercapacitor charger circuit using solar panel. . . 297
Figure 11.10 Supercapacitor charger circuit using solar panel. . . 297
Figure 11.11 BLE–RSL10 from ON Semiconductor. . . . . . . . 298
Figure 11.12 Model presentation for radio energy. . . . . . . . . 299
Figure 11.13 Improvement in the mobile sensor nodes activity
levels using a time slot technique. . . . . . . . . . 300
Figure 11.14 Average activity levels. . . . . . . . . . . . . . . . 302
Figure 11.15 Normalized residual energies. . . . . . . . . . . . . 303
Figure 11.16 Average activity over life span. . . . . . . . . . . . 304
Figure 11.17 Energy consumption. . . . . . . . . . . . . . . . . 304
Figure 12.1 Rise of top 5 cryptocurrencies in January 2022. . . 316
Figure 12.2 Working of PoW. . . . . . . . . . . . . . . . . . . 320
Figure 12.3 Working of PoS. . . . . . . . . . . . . . . . . . . . 321
Figure 13.1 Pillars of blockchain technology. . . . . . . . . . . 332
Figure 13.2 Blockchain technology characteristics. . . . . . . . 333
Figure 13.3 Taxonomy of alternative consensus protocols. . . . 334
Figure 13.4 Most known consensus algorithms . . . . . . . . . 336
Figure 13.5 Proof of work. . . . . . . . . . . . . . . . . . . . . 337
xxvi List of Figures

Figure 13.6 Proof of stake. . . . . . . . . . . . . . . . . . . . . 338


Figure 13.7 Popular algorithms based on PoW. . . . . . . . . . 340
Figure 13.8 Popular algorithms based on PoS. . . . . . . . . . 341
Figure 13.9 Proof of burn. . . . . . . . . . . . . . . . . . . . . 342
Figure 13.10 Popular algorithms based on FBA. . . . . . . . . . 343
Figure 13.11 Alternative algorithms based on PoW. . . . . . . . 345
Figure 13.12 Alternative algorithms based on PoS. . . . . . . . . 348
Figure 13.13 Alternative algorithms based on FBA. . . . . . . . 350
Figure 13.14 Hybrid algorithms. . . . . . . . . . . . . . . . . . 352
Figure 13.15 PoX algorithms . . . . . . . . . . . . . . . . . . . 354
Figure 13.16 Popular blockchain protocols. . . . . . . . . . . . . 356
Figure 13.17 Total number of transactions on the Bitcoin
blockchain. . . . . . . . . . . . . . . . . . . . . . 356
Figure 13.18 Quorum party. . . . . . . . . . . . . . . . . . . . . 358
Figure 13.19 Blockchain consensus algorithms and protocols. . . 361
Figure 13.20 Steps to develop a blockchain application. . . . . . 361
Figure 14.1 Industrial Revolution. . . . . . . . . . . . . . . . . 376
Figure 14.2 Manufacturing technology platform vision for 2030. 377
Figure 14.3 Cybersecurity risk assessment framework. . . . . . 380
Figure 14.4 Functional architecture of the EDI DbW car. . . . . 385
Figure 14.5 Intercommunication and software framework. . . . 387
Figure 14.6 Perception overview. . . . . . . . . . . . . . . . . 387
Figure 14.7 Safety controller’s software architecture. . . . . . . 388
Figure 14.8 Attacks on autonomous vehicle. . . . . . . . . . . 391
Figure 14.9 Autonomous vehicle defense. . . . . . . . . . . . . 394
Figure 14.10 Security management. . . . . . . . . . . . . . . . . 396
List of Tables

Table 2.1 Respondents from the industrial company . . . . . . 44


Table 2.2 Summary of categorization and coding. . . . . . . . . 49
Table 3.1 Difference between virtual machine and container . . 65
Table 4.1 Parameter used in ad hoc network for simulation . . . 99
Table 6.1 List of various sensors used in smart agriculture. . . . 152
Table 6.2 List of communication technologies used in smart
agriculture. . . . . . . . . . . . . . . . . . . . . . . 158
Table 6.3 List of research works carried out on plant disease
detection using deep learning methods. . . . . . . . . 162
Table 6.4 List of autonomous vehicles and its functions for
smart agriculture. . . . . . . . . . . . . . . . . . . . 169
Table 7.1 Significant five Haralick texture features . . . . . . . 188
Table 7.2 Description of different types of primitive along with
mathematical relations . . . . . . . . . . . . . . . . 190
Table 9.1 Parameters for simulation . . . . . . . . . . . . . . . 236
Table 9.2 Number of sensors in five-level heterogeneity for
MLHEED and MLICHBHEED protocols . . . . . . 237
Table 9.3 Categorization of energies in five-level heterogeneity
for MLHEED and MLICHBHEED protocols . . . . 238
Table 9.4 Round number when first and last nodes are dead . . 239
Table 9.5 Percentage increase in network energy and the corre-
sponding increase in network lifetime for MLICHB-
HEED protocol . . . . . . . . . . . . . . . . . . . . 240
Table 9.6 Number of packets sent to BS after each round . . . . 240
Table 11.1 Comparison between energy harvesting WSNs and
battery-powered WSNs . . . . . . . . . . . . . . . . 293
Table 12.1 Analysis of Ethereum in the years 2015–2022 . . . . 317
Table 12.2 Attributes of good consensus algorithm . . . . . . . . 318
Table 12.3 Comparative analysis of different consensus algorithm 319
Table 13.1 Chapter’s organizational structure . . . . . . . . . . . 331

xxvii
xxviii List of Tables

Table 13.2 The upsides and downsides of the most well-known


consensus algorithms . . . . . . . . . . . . . . . . . 339
Table 13.3 Most-known consensus algorithms . . . . . . . . . . 343
Table 13.4 Alternative algorithms based on PoW . . . . . . . . . 347
Table 13.5 Alternative algorithms based on PoS . . . . . . . . . 349
Table 13.6 Alternative algorithms based on FBA . . . . . . . . . 350
Table 13.7 Hybrid algorithms . . . . . . . . . . . . . . . . . . . 353
Table 13.8 PoX algorithms . . . . . . . . . . . . . . . . . . . . 355
Table 13.9 Hyperledger frameworks . . . . . . . . . . . . . . . 358
Table 13.10 Pros and cons of blockchain protocols . . . . . . . . 360
Table 13.11 The application’s technical choices . . . . . . . . . . 364
Another random document with
no related content on Scribd:
the tongues now devoted to slang and the misuse of words which
hang about the higher education; while the clamour of ill-advised
women without doors was unknown. The comments of a recent
French writer on the charm of life in those past days, are too
valuable to be laid aside unrecorded. “The keen intellects of the
time,” he writes, “caught a glimpse of everything, desired everything,
and grasped eagerly at every new idea. Only those,” he goes on to
say, quoting Talleyrand, “could realise the joy of being alive. The
childish present-day philosophy of optimism and effort fails to lend
life a charm it never knew before. The most insignificant gallant of
the Court of Louis experienced more varied sensations than any
rough-rider or industrial king has ever been able to procure for
himself.” Admittedly, the evils of the time cried aloud for redress of
wrongs which were all to be washed away later by the river of blood;
but these had been more ameliorated than aggravated by the
scholarship of thoughtful writers. Wit, and the sense of beauty and
delicacy of expression, carried, not unfrequently it is true, to
affectations and absurdity, was the order of the day, binding men and
women in links of an intellectual sympathy, whose pure gold was
unalloyed by baser metal. Those réunions in the salons of the great
ladies, must have been delightful, thronged as they were with
distinguished men, and with women, many of them beautiful,
spirituelle, or both. But for the sparkle of true wit, the music of sweet
voices, the ripple of verse and epigram, the popularity of those
gatherings would not have been so long maintained. The
atmosphere of them was sweet with the lighter learning of old Rome
and Greece, and the gaiety of graceful modern rhymes, or the
sentiment of the latest sonnet. The passing of centuries had now left
far behind the barbaric clash of warfare, and widened the old
limitations of mediævalism and Scholasticism. From the hour the
cruel knife of Ravaillac stilled the noble heart of the great Henri, the
times had ripened to the harvest of a literature resplendent with
promise of illustrious names.
Ever zealous for the glory of France, Richelieu founded the
Académie Française; and later the college of the Sorbonne, where
now he lies magnificently entombed, was rebuilt by him, and devoted
to its old purpose of a centre of learning; and as of old, and as ever,
men thronged from near and from afar to Paris for the study of art
and learning, and to pay such homage to the modern Muses and
enjoy their smiles, as good fortune might allow.
Amid such environment it was, that Ninon embarked upon the
stream of the life she had elected to follow, hoping to pass, as
indeed she did, through the years serenely and in fair content. If now
and again some minor questions of spirit troubled her—conscience it
could scarcely be called, since by the lights she had chosen to guide
her, conscience could hardly be reproachful—it was but passingly.
Yet the tale goes of the visits of a Man in Black, a most mysterious
personage, who at his first interview, when she was about eighteen
years old, brought her a phial containing a rose-coloured liquid, of
which a little, a mere drop, went a very long way. It was the recipe for
prolonged youthfulness, and certainly must have been very
efficacious. It was, he said, to be mixed with a great deal of pure
water, quite as much as a good-sized bath would contain—and a
bath of pure water is, of course, in itself a very healthful sort of thing.
Many a year went by before the Man in Black—or one so like him as
to be his very double—came again, and Ninon was prone to shrink
at the remembrance of him. When he did come, it was to inform her
that some years of this life still lay before her; and then for the third
time that Man in Black presented himself, and—But the cry is a far
one to seventy years hence, and during that time, as far as Ninon
was concerned, he remained in his own place, wherever that might
be; and if, after all, he had been but a dream, in any case the
shadow of his sable garb does not appear to have been very
constantly cast upon the mirror of her existence. That was bright with
love and friendship, the love and friendship of both sexes, and truly if
in love she was frankly fickle à merveille, in friendship she was
constant and unchanging. Ever following the dying parental counsel,
she was fastidious in the choice of the aspirants to her favours. In
her relations with women and men alike, honest and honourable and
full of a kindly charm which made her exceptionally bonne
camarade. It was small wonder that the salon of Mademoiselle Ninon
de L’Enclos was a centre of foregathering greatly sought after.
CHAPTER IV

A “Delicious Person”—Voiture’s Jealousy—A Tardy Recognition—Coward


Conscience—A Protestant Pope—The Hôtel de Rambouillet—St Evrémond—
The Duel—Nurse Madeleine—Cloistral Seclusion and Jacques Callot—“Merry
Companions Every One”—and One in Particular.

Six years had passed since as girl and boy Ninon and Marsillac had
parted at Loches. At sixteen years old he had entered the army, and
was now Monsieur le Capitaine de la Rochefoucauld, returned to
Paris invalided by a serious wound received in the Valtellina warfare.
Handsome, with somewhat pensive, intellectual features, chivalrous
and amiable, he was “a very parfite gentle knight,” devoted to the
service of the queen, which sorely interfered with his military
promotion: devotion to Anne of Austria was ever to meet the hatred
of the cardinal, and to live therefore in peril of life.
The daring young hoyden of Loches was now a graceful, greatly
admired woman of the world, welcomed and courted in the ranks of
the society to which her birth entitled her.
It was quite possible that the change in her appearance was
sufficiently great to warrant de la Rochefoucauld’s failure to
recognise her in the salon of Madame de Rambouillet when he
passed her, seated beside her chaperon, the Duchesse de la Ferté
—not, however, without marking her beauty; and he inquired of the
man with whom he was walking who the “delicious person” was. The
gentleman did not know. It was the first time, he believed, that the
lady had been seen in the brilliant company. The impressionable
young prince lost little time in securing himself an introduction,
further economising it by expressing his sentiments of admiration so
ardently, that they touched on a passionate and tender declaration.
Ninon accepted this with the equanimity distinguishing her; she was
already accustomed to a pronounced homage very thinly veiled. It
was to her as the sunshine is to the birds of the air, almost
indispensable; but she found the avowals of his sentiments slightly
disturbing in the reflection that Marsillac had altogether forgotten his
Ninon. That, in fact, he had done long since. The fidelity of de la
Rochefoucauld in those days, was scarcely to be reckoned on even
by hours. Already he was in the toils of Ninon’s beautiful rival, Marion
Delorme, a woman Ninon herself describes as “adorably lovely.”
Beauty apart, the very antithesis of Mademoiselle de L’Enclos,
weaker of will, more pliably moulded, warm-hearted, impulsive,
romantically natured, apt to be drawn into scrapes and mistakes
which Ninon was astute enough rarely to encounter. The two women
lived within a stone’s throw of each other, and it needed hardly the
gossip of the place for Ninon to observe that Marsillac was but one
more of the vast company of arch-deceivers. It was Voiture, the poet
and renowned reformer of the French tongue, who hinted the fact to
Ninon with, no doubt, all his wonted grace of expression, further
inspired by jealousy of the handsome young captain, that at the very
moment he was speaking, de la Rochefoucauld was spending the
afternoon in Marion’s company, en tête-à-tête.
Thereupon, linking her arm in Voiture’s, Ninon begged him to
conduct her to Number 6, rue des Tournelles. The poet, vastly
enjoying the excitement his words had evoked, readily complied, and
arrived at Marion’s apartments where the Capitaine de la
Rochefoucauld was duly discovered. Then broke the storm, ending
in Marsillac’s amazement when Ninon demanded how it was that he
had not discovered in her his old friend Ninon de L’Enclos. Then, in
the joy and delight of recognition, Marsillac, forgetting the very
presence of her rival, sprang to her side, and offering her his arm,
sallied forth back to Ninon’s abode, spending the rest of the day in
recalling old times at Loches, and in transports of happiness. Only
late into the night, long after Marsillac had left her presence and she
was lost in dreamful sleep, it brought the faces of her mother and of
St Vincent de Paul vividly before her, gazing with sad reproachful
eyes; and with her facile pen she recorded the memory of that day,
fraught with its conflict of spirit and desire.

“O sweet emotions of love! blessed fusion of souls! ineffable joys that


descend upon us from Heaven! Why is it that you are united to the
troubles of the senses, and that at the bottom of the cup of such delight
remorse is found?”

Whether through the silence of the small hours any echoes


touched her vivid imagination of the Man in Black’s mocking
laughter, no record tells; but in any case, with the fading of the
visions, the disturbing reflections were quickly lost in the joy of
Marsillac’s society, as also in that of St Evrémond—the very soul of
gaiety and wit and every delightful characteristic.
“How happy could I be with either,
Were t’other dear charmer away,”

says Captain MacHeath, and there were days together that Marsillac
did absent himself. The grand passion of his life was not with either
of the two women, or with any of the fair dames then immediately
around. They were merely the toys of his gallant and amiable nature,
and at that time he was deeply absorbed in the duties of his
profession, and his ardent devotion to the queen’s cause. It was,
indeed, one most difficult and dangerous, ever facing, as it did, the
opposition of Richelieu, who saw in every friend and partisan of
Anne of Austria Spanish aggression and a foe to France.
Some cause there surely was. Political and religious strife raged
fast and hotly. From the outset—that is, at least, as far back as the
time when the Calvinists banded together to resist the Catholics—it
was not a question alone of reform or of change in religious
conviction. It could not have remained at that: the whole framework
of government would have been shaken to its foundation had the
Reformed party ultimately triumphed; but the passing of a century
had wrought startling changes. There were many of the Catholic
nobility whose policy was as much to side with the Huguenot party,
as it had been the wisdom of the Protestant Henri IV. to adopt the
Catholic creed. Richelieu, in conquering Rochelle, showed the
vanquished Huguenots so much leniency, that public clamour
nicknamed him “the Cardinal of Rochelle,” and “the Protestant
Pope,” and he laughed, and said that there was more such scandal
ahead; since he intended to achieve a marriage between the king’s
sister, Henrietta Maria, and the non-Roman Catholic king, Charles I.
of England.
To hedge his country from the encroachment of Spain was the life-
long aim and endeavour of Richelieu, and he was ruthless in the
means. The eastern and northern frontiers of France were constantly
menaced and invaded by Austria and Spain and their allies, and to
and fro to Paris came the great captains and soldiers engaged in the
constant warfare against the enemy—men of long lineage, brave,
skilful in arms, dauntless in action, and certainly no laggards in love
when opportunity afforded; and they returned loaded with honour,
covered with glory, and often seriously wounded, to be welcomed
and made much of in the salons of noble and titled women, like the
Duchesse de Rambouillet, and other réunions scarcely less
celebrated and brilliant, where the fine art of wit, and the culte of
poetry and belles-lettres, mingled with a vast amount of love-making,
and at least as much exquisite imitation of it, were assiduously
conducted. It was the hall-mark of good society, a virtue
indispensable, and to be assumed if it did not really exist, and too
greatly valued for other virtues to be set great store by. So that the
line of demarcation between women of unimpeachable repute, and
those following a wider primrose path grew to be so very thinly
defined as sometimes to be invisible and disregarded. Notably in the
refined and elegant salon of Ninon de L’Enclos were to be counted
many ladies of distinction and modes of life untouched by the faintest
breath of scandal, who loved her and sought her friendship, as there
were men who were quite content to worship from afar, and to hold
themselves her friends pure and simple to life’s end.
Who of her admirers was the first winner of the smiles of a more
tender intimacy, is not more than surmise, remaining recorded only
in invisible ink in a lettre de cachet whose seal is intact. If the friend
of her early girlhood at Loches is indicated, it may be intentionally
misleading. Count Coligny was an acquaintance at whose coming
Ninon’s bright eyes acquired yet greater lustre, and de la
Rouchefoucauld’s reappearance had not yet taken place—“ce cher
Marsillac,” whose devotion, even while it lasted, was tinctured with
divided homage, and was to dissolve altogether, in the way of love
sentiments, in the sunshine of his deep undying attachment to
Madame de Longueville. There was, however, no rupture in this
connection; the burden of the old song was simply reversed, and if
first Marsillac came for love, it was in friendship that he and Ninon
parted, giving place to the adoration of St Evrémond—bonds which
were never broken, and whose warm sentiments the waters of the
English Channel, flowing between for forty years, could not efface.
The effect might have been even the contrary one, and absence
made the heart grow fonder, though the temperaments of Ninon and
of St Evrémond were undoubtedly generously free of any petty
malignance and small jealousies.
Monsieur de L’Enclos had survived his wife only by one year. He
died of a wound received in an encounter arising from a private
quarrel. Had he recovered, it would probably have been to lose his
head by the axe, paying the penalty of the law for some years past
rigorously enforced against duelling. The scene of such encounter
being most frequently the open space of the Place Royale, the
locality of the cardinal’s own house—as it was of Ninon and of
Marion Delorme—so that his stern eyes were constantly reminded of
the murderous conflicts. The law, having been enacted by Henri IV.,
had fallen into abeyance, until the specially sanguinary duel between
the Comte de Bussy and the Comte de Bouteville, in 1622, when de
Bouteville mortally wounded de Bussy, and Richelieu inflicted the
penalty of decapitation on de Bouteville and on Rosmadec his
second, as he did on others who disobeyed; so that the evil was
scotched almost to stamping out. It was in this fashion that Richelieu
made his power felt among the nobility and wealthier classes, and let
it be understood that the law was the law for all.
Almost immediately following on the death of Monsieur de
L’Enclos, came that of Ninon’s old nurse, Madeleine—whose kind
soul and devoted attachment were in no wise ill-affected by the small
nips of eau de vie she inclined to—and just about the same time died
Madame de Montaigu, her aunt at Loches; and thus within six
months she had lost the few of her nearest and dearest from
childhood, and she felt so saddened and desolate and heart-broken,
that she formed the resolution of giving up the world and being a nun
after all—yearning for the consolation which religion promises of
reunion, and a fulness of sympathy not to be found in ordinary and
everyday environments! Scarcely as yet with her foot on
womanhood’s bank of the river of life, the warm kindly nature of
Ninon was chilled and dulled by sorrow and regret; and one evening,
at the Hôtel de Rambouillet, in her ardent desire to find some peace
and rest of spirit, she entered into conversation with the Père
d’Orléans, a renowned Jesuit, on the subject of religious belief—but
his best eloquence failed in convincing her of its efficacy.
The right of private judgment, ever one of her strongest
characteristics, asserted itself, and she declared herself
unconvinced. “Then, mademoiselle,” said the ecclesiastic, “until you
find conviction, offer Heaven your incredulity.”
But while words failed, her heart still impelled her to the idea of the
cloistered life, and she went to seek it in Lorraine, at a convent of
Recollettes sisters near Nancy. There were many houses of this
Order in the duchy. The one sought entrance to by Ninon, was under
the patronage of St Francis, and she was received with effusion by
the Reverend Mother, a charming lady, herself still youthful. She had
not, however, been there many days, relegated to a small cell,
whose diminutive casement looked upon some immediately-facing
houses, before she became impressed with the idea that, great as
the desire might be to snatch in her a brand from the consuming of
the wicked world, it was greater still for the little fortune she was
known to possess; and with the passing of time, the gentle assuager
of more poignant grief, she was beginning to feel less attracted
towards the conventual mode of existence, and to wonder whether
she really had the vocation for it. Meantime, the old spirit of
adventure was strongly stirring her to defer the recital of a formidable
list of Aves and penitential psalms, in favour of watching a window
facing her loophole of a lattice, through which she could see a man
busily engaged with burin and etching implements. While this in itself
was not uninteresting, the interest was increased tenfold, when she
contrived to discover that he was the already famous Jacques Callot,
the engraver; and very little time was lost before the two had
established means of communication by the aid of a long pole, to
which they tied their manuscript interchange of messages and ideas
—which culminated in Ninon’s descent by a ladder of ropes from the
lattice, and flight from the convent.
More sober chronicles relate of Jacques Callot, that through all the
curious vicissitudes and adventures of his earlier life, he remained
blameless and of uncorrupted morality. It appears certain that his
real inclination was ever for such paths, and the romantic love-affair
which ended in his union with the woman he adored, was calculated
to keep him in them; in which case the attributed version of his
liaison with Ninon must be accepted with something over and above
its grain of salt, and allowed to lie by. That he was a fearless, high-
minded man, as well as a great artist, stands by his honoured name
in a golden record; for when the imbroglio occurred between Louis
XIII. and the Duke of Lorraine—in which, under the all-conquering
cardinal prime-minister, France was the victor—Callot was
commanded to commemorate the siege with his pencil—he refused.
Callot was a Lorrainer, and the duke was his patron and liege-lord,
and Callot refused to turn traitor, and prostitute his gift by recording
the defeat of the duke, preferring to run the very close chance of
death for high treason sooner than comply. If, as it is asserted, Ninon
obtained for him the pardon of Richelieu, by virtue of some former
favour or service she had done the cardinal, leaving him as yet in her
debt for it, all was well that so well ended; and it adds one more to
the list of Ninon’s generous acts, never neglected where she had the
power to perform them for those she loved.
Whether it is an undoubted fact that the fascination of Ninon—so
absolutely all-potent as she herself claims for it—did tempt Callot
temporarily even from his allegiance to the love of the woman he
won under such romantic circumstances, it is certain that she
mercifully decided to leave him in tranquillity with his wife in Lorraine,
returning to Paris in company with a little contingent of her old
friends and admirers who had been engaged in fighting for their king
along the north-eastern borderlands. Paris was so rich in convents,
that the question irresistibly suggests itself why she should have
travelled that hundred or so of miles to Nancy to take the veil.
Possibly, knowing that Coligny, Scarron, Gondi, de la
Rochefoucauld, St Evrémond, and other bons camarades were all in
that direction, she was prompted to go thither to take final farewells
of them before she stepped over the threshold masculine foot must
not desecrate; but in this instance it was the propositions of man that
triumphed in the face of every spiritual consideration, and all idea of
the contemplative life was flung to the four winds in the delight of the
old companionships and renewal of the joie de vivre. The reunion
was celebrated in an impromptu feast, of reason and recherché
dishes, and flow of sparkling wine, and unrestrained merriment and
sallies of wit; for where Scarron and St Evrémond and de la
Rochefoucauld were, wit could but abound. Next day they all started
for Paris, transported thither by matchlessly swift-footed post-horses,
Ninon choosing for her travelling companion en tête-à-tête, Coligny;
and when the two arrived at rue des Tournelles, they did not part
company; but arranged to retire to the rus in urbe of her Picpus
dwelling, away by Charenton, where they established ménage in the
small but beautiful old house, once the dwelling of Henri Quatre and
the fair Gabrielle, with one maid-servant, and one man servitor Ninon
called Perrote, who had been the faithful valet of Monsieur de
L’Enclos. Here the two passed an idyllic life, where more material
enjoyments were diversified by intellectual conversation, sometimes
profane, but more often taking a turn so far sacred, as to include the
points of doctrine upon which Catholic and Protestant differed.
Coligny, as a descendant of the great murdered Huguenot leader,
was a Protestant; and while Richelieu treated the Huguenots socially
with indulgence, he would not tolerate them as a political party, and
to be of the Reformed, was utterly to lose chance of advancement—
and Ninon was ambitious for her lover, and hence the religious
discussions and her endeavours to inoculate him with clear
conceptions of Catholic teaching. Coligny, however, was apt to show
signs of boredom on these occasions, and to yawn so portentously,
that she had to desist, leaving him heretical still, when one morning
the Picpus maisonette was invaded by messengers from Richelieu,
accompanied by halberdiers from the Bastille, who demanded the
delivering up of the young man’s sword, and bore him off a prisoner
to the horrible old prison, on the charge of neglect of military duty.
Once again Ninon’s intercessions with Richelieu procured release
and restoration; but Coligny was ungrateful and jealous of the red-
robed priest, and would-be galant homme, and passing away from
Ninon’s presence, he never entered it again, and in a very few
weeks was married to the sister of the Duc de Luxembourg, an
alliance possibly already entered upon at an earlier date, and the
real ground of his rupture with Ninon.
She soon found balm for the inflicted wounds of Coligny’s
ingratitude, in the ardent admiration of the son of the Marquise de
Rambouillet, seeing in him only the one absurd defect of desiring
unchanging constancy, and on this point he was so tiresome that she
was driven to promise fidelity for three months—“An eternity,” said
Ninon, ever mocking at love, which she ranked far below friendship.
FRANÇOIS VIDUC DE LA ROCHEFOUCAULD
Né en M·DC·XIII M en M·DC·LXXX
Peint en émail par
Gravé
Petitot
en 1770 par PP Choffard.
Desel Grav. de L. M. Imp. et du Roi d’Espagne.
To face page 48.

The greatest apologist of the society of the seventeenth century


could hardly describe it as strait-laced; except by comparison with
the first half of the one succeeding; and if some of the grandes
dames of the circle in which she moved held aloof and deprecated
the unconventionalities of Mademoiselle de L’Enclos, for the most
part they accepted them, more or less silently, and treated her with
cordiality, delighting in her friendship, and fascinated by the elegance
and dignity with which she conducted the hospitalities of her
crowded salons. The prevailing charm of one graced with the
refinement of no surface education, and accomplishments never
unduly self-asserted, shone through the gentle gaiety of her
demeanour. She was absolutely innocent of any shadow of self-
interest; taste alone guided her inclinations, her competence
protected her from greed, and natural generosity was ever prompting
her to kindly actions. Once, at a later day, when Anne of Austria was
beginning to settle into the calm austerities of maturer years, and
urged by some prudes about her, she sent orders for the temporary
retirement of Ninon into a convent, leaving her to select the one she
preferred—the tale goes that she expressed her gratitude to the
exempt of the guards who delivered the message, for the choice so
left her, and that she would choose the convent of the Grands
Cordeliers, an establishment about to be suppressed for the
scandals attaching to it; but it is far more probable that the jest
originated with some acquaintance; for to make light of orders from
the Court was in no wise according with Ninon’s code.
That command, however, again reached her at a yet later time,
and then was enforced. In Louis XIII.’s days, Ninon was often a
guest at the Louvre, and on the occasion of one of the State balls
given there, she was present with Rambouillet for her cavalier in
chief. As she was entering her carriage to return home, she felt a pull
at her mantle, and turning, she saw beside her “a little man, clad
entirely in black velvet, whose smile was mocking and full of
sarcasm, and his eyes shone like carbuncles. Rambouillet, seeing
my terror,” she wrote later, “demanded of the man what he wanted;
but the Man in Black silenced him with an imperious gesture, and
said to me, in a tone of profound melancholy—‘You are proud of your
beauty, mademoiselle, and you are right, for it is marvellous. But
alas! all these charms will one day fade. The rosy hues of your skin
will die out, age will come, and bring its wrinkles. Ah, believe me!
Beware! Endeavour to hinder this misfortune, for afterwards there
will be nothing left to you.’ So saying, he gravely saluted me, and
disappeared among the arches of the colonnade.”[1]
CHAPTER V

An Excursion to Gentilly—“Uraniæ Sacrum”—César and Ruggieri—The rue


d’Enfer and the Capucins—Perditor—The Love-philtre—Seeing the Devil
—“Now You are Mine!”

Ninon’s pledge of eternal fidelity to Rambouillet did not hinder other


friendships; and about this time she one day made an excursion to
Gentilly with the Comte de Lude, intent on visiting the great
magician, Perditor, who conducted there his famous incantations.
She chose de Lude for her companion on this occasion, because he
was an utter disbeliever. The adventure was prompted by the craze,
ever latent in society, and then recently kindled to fever-heat, for
magic and occultism. The theme, as old almost as the ages, is ever
new, and likely to remain so until the mysteries of life and death are
revealed. And some short time previously, the rumour had circulated
that a man named Febroni, intensely hated by Richelieu, was
endeavouring to compass the cardinal’s destruction, by causing a
wax image of him to be made and exposed to a slow fire, and as the
image melted, so the minister’s life would dwindle to the death. This
was, of course, no new device of witchcraft and diablerie; but it
served to arouse intense interest and curiosity, and the air was as
full of sorcery and demonology as when the first Ruggieri practised
his arts for Catherine de Médicis, and watched the stars from the old
tower-top of Blois, the observatory of the terrible queen, “Uraniæ
Sacrum.”
Some half-dozen years before Ninon was born, a man named
César and another Ruggieri, probably taking the old magician for
sponsor, had been notorious as potent masters of the “Black Art.”
That they were credited with possessing unlimited command over
the elements, and to produce thunder and lightning at will, was but a
small part of his power. He could manufacture love-potions to render
the indifferent one enamoured of the wooer, and insidious poisons to
destroy a hated human obstacle, and perform many services of the
like nature for a price, but the fees were startlingly high.
An indiscretion, only in a measure connected with his profession,
brought César inside the walls of the Bastille. He had, it appeared,
been accustomed to attend the Witches’ Sabbath, and meeting there
a great Court lady, he had, he said, induced her to listen too
graciously to his soft speeches. The boasts, after his release from
the old fortress, brought him condign punishment at the hands, it
was said, of his Satanic chief, furious with jealousy it might be. It was
on a wild March night that he came and went again with hideous din
and clatter, leaving César strangled in his bed; and then making his
way to the abode of Ruggieri, he despatched him in the same
manner. There were some ready to contend that less supernatural
agency might be answerable for these acts. On the other hand it was
well known that the devil was no stranger in Paris, having once
resided in a street on the left bank of the Seine, which was named
after him, the rue d’Enfer. From here he was at last ejected, thanks
to a happy thought on the part of the city authorities, who handed the
ground over to the Capucin brothers, and the foul fiend was heard of
no more in that quarter. César extenuated his offence of magic by
the assertion that he “was pestered to death by young courtiers and
other young Parisians to show him the devil,” and not seeing why he
should have the trouble of doing so for nothing, he set his price at
forty and fifty pistoles, leaving it a matter of choice whether they
would face the terrible ordeal to its ending, or take flight, leaving the
pistoles of course behind them. It was this latter course which had
been mostly adopted.
And now, at Gentilly, dwelt one magician named Perditor, whose
power was reported to be greater than that of any of his
predecessors; since he possessed the secret of concocting a philtre
capable of maintaining a woman’s beauty and freshness to extreme
age. It was the idea of obtaining this inestimable thing, which
determined Ninon to pay a visit to the mighty Perditor. The chronicles
of the time confirm the facts related by Ninon of her adventure, which
are best told in the fashion of her own experiences:
“On entering the village, we inquired for the dwelling of the
celebrated necromancer, and a guide presented himself to conduct
us thither. We soon arrived in front of a yawning cavern which was
surrounded by large deep ditches. Our guide made a signal, and
immediately a man dressed in red appeared on the opposite side of
the ditches, and asked us what we wanted.
“‘I wish for a philtre,’ I replied, ‘which will make my beauty last the
length of my life.’
“‘And I,’ said the count, ‘wish to see the devil.’
“‘You shall both be satisfied,’ replied the red man, as calmly as if
we had asked the most natural thing in the world. Then he lowered a
sort of drawbridge across the ditch, and, this crossed, he admitted us
into the cavern, where we soon found ourselves in complete
darkness. I felt not a little nervous.
“‘Do not be afraid,’ said the count to me; ‘I have my sword with me,
a dagger, and two pistols; with them I think I can defy all the
sorcerers in the world.’
“After proceeding for quite five minutes along underground
galleries and passages, we found ourselves in a sort of large circular
chamber hewn out of the solid rock. Some resin torches cast a fitful
and gloomy glare up into its vaulted roof. At one end of this hall,
upon a platform draped entirely in black, was seated a personage in
the garb of a magician, who appeared to be waiting for us.
“‘That is the Master!’ solemnly said the man in red to us.
“And he left us alone in the presence of the great sorcerer himself.
“‘Approach!’ cried Perditor, addressing us in a terrible voice. ‘What
do you wish?’
“‘I wish,’ murmured I, in a trembling voice, ‘a philtre to preserve to
me my youth and beauty all my life.’
“‘Forty crowns. Pay first.’
“Taking out my purse, I laid down five louis, appalled by the defiant
fierceness of his tones. The count did not wait for the questioning of
the man on the platform.
“‘For my part, Sir Necromancer,’ he said, ‘I feel greatly curious to
see the devil. How much do you want for showing him to me?’
“‘One hundred livres.’
“‘Peste! At that price what fine benefices you must be able to
bestow.’
“The lord of the cavern vouchsafed no reply. He took the money
from the count, which he put into a big purse hanging at his side,
along with my louis. That done, he laid his hand upon a huge bell,
which sounded as loud as the bourdon strokes of Notre-Dame tower-
bell. At this signal, which nearly deafened us, two nymph-like young
women, fairly pretty, dressed in white and crowned with flowers, rose
from the ground near. Perditor pointed me out to them, handed them
an empty crystal phial, and then again struck his fearful bell. The
nymphs disappeared. I gathered that they had gone to mix my
philtre.
“‘And now,’ continued the necromancer, turning to us, ‘you are
both decided that you will see the devil?’
“‘Very decided,’ said the count.
“‘Your name?’
“‘But is it necessary to give it to you, sir?’ stammered I.
“‘It is indispensable.’
“‘It is Anne de L’Enclos.’
“‘And I,’ hastened to add my companion, ‘I am called George de
Sandrelles, Comte de Lude.’
“‘You swear never to reveal that which is about to take place
before your eyes?’
“‘We swear it.’
“‘You promise not to be afraid, and not to invoke heaven or the
saints?’
“‘We promise.’
“The magician rose; he took a long wand of ebony, approached
us, and traced a large circle with it in the dust, inscribed with a
number of cabalistic figures. Then he said to us—
“‘You can still go away—are you afraid?’
“I wanted to answer in the affirmative, but the count cried in
resolute tones—
“‘Afraid of the devil? For shame! What do you take us for? Get on
with you.’
“And at the same instant we heard thunderous peals—the voice of
the magician sounding above the tumult. He gesticulated, shouted,
and broke, in some unknown tongue, into a torrent of diabolic
invocations. It made one’s hair stand on end. Terror seized me. I
clung convulsively to the count’s arm, and implored him to leave the
frightful place.
“‘The time is past for it,’ cried the sorcerer; ‘do not cross the circle,
or you are dead.’
“Suddenly, to the noise of the thunder, succeeded a sound like the
rattling of chains that were being dragged along the depths of the
cavern. Then we heard dismal howlings. The necromancer’s
contortions continued, and his cries redoubled. He uttered barbaric
words, and appeared to be in fits of frenzy. In the twinkling of an eye,
we were enveloped in flames.
“‘Look!’ cried Perditor.

You might also like