Professional Documents
Culture Documents
Innovations in Cyber Physical Systems Select Proceedings of Icicps 2020 1St Edition Jawar Singh Online Ebook Texxtbook Full Chapter PDF
Innovations in Cyber Physical Systems Select Proceedings of Icicps 2020 1St Edition Jawar Singh Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/advances-in-civil-engineering-
select-proceedings-of-icace-2020-1st-edition-scott-arthur/
https://ebookmeta.com/product/recent-advances-in-artificial-
intelligence-and-data-engineering-select-proceedings-of-
aide-2020-advances-in-intelligent-systems-and-computing-1386/
https://ebookmeta.com/product/advances-in-energy-technology-
select-proceedings-of-emsme-2020-1st-edition-ramesh-c-bansal/
https://ebookmeta.com/product/recent-advances-in-industrial-
production-select-proceedings-of-icem-2020-rajeev-agrawal-editor/
Advances in Thermofluids and Renewable Energy Select
Proceedings of TFRE 2020 1st Edition Pinakeswar Mahanta
https://ebookmeta.com/product/advances-in-thermofluids-and-
renewable-energy-select-proceedings-of-tfre-2020-1st-edition-
pinakeswar-mahanta/
https://ebookmeta.com/product/security-and-resilience-of-cyber-
physical-systems-1st-edition-krishan-kumar/
https://ebookmeta.com/product/processing-and-characterization-of-
materials-select-proceedings-of-cpcm-2020-1st-edition-snehanshu-
pal/
Jawar Singh
Sudhir Kumar
Umakanta Choudhury Editors
Innovations
in Cyber
Physical
Systems
Select Proceedings of ICICPS 2020
Lecture Notes in Electrical Engineering
Volume 788
Series Editors
Leopoldo Angrisani, Department of Electrical and Information Technologies Engineering, University of Napoli
Federico II, Naples, Italy
Marco Arteaga, Departament de Control y Robótica, Universidad Nacional Autónoma de México, Coyoacán,
Mexico
Bijaya Ketan Panigrahi, Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, Delhi, India
Samarjit Chakraborty, Fakultät für Elektrotechnik und Informationstechnik, TU München, Munich, Germany
Jiming Chen, Zhejiang University, Hangzhou, Zhejiang, China
Shanben Chen, Materials Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
Tan Kay Chen, Department of Electrical and Computer Engineering, National University of Singapore,
Singapore, Singapore
Rüdiger Dillmann, Humanoids and Intelligent Systems Laboratory, Karlsruhe Institute for Technology,
Karlsruhe, Germany
Haibin Duan, Beijing University of Aeronautics and Astronautics, Beijing, China
Gianluigi Ferrari, Università di Parma, Parma, Italy
Manuel Ferre, Centre for Automation and Robotics CAR (UPM-CSIC), Universidad Politécnica de Madrid,
Madrid, Spain
Sandra Hirche, Department of Electrical Engineering and Information Science, Technische Universität
München, Munich, Germany
Faryar Jabbari, Department of Mechanical and Aerospace Engineering, University of California, Irvine, CA,
USA
Limin Jia, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland
Alaa Khamis, German University in Egypt El Tagamoa El Khames, New Cairo City, Egypt
Torsten Kroeger, Stanford University, Stanford, CA, USA
Yong Li, Hunan University, Changsha, Hunan, China
Qilian Liang, Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX, USA
Ferran Martín, Departament d’Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra,
Barcelona, Spain
Tan Cher Ming, College of Engineering, Nanyang Technological University, Singapore, Singapore
Wolfgang Minker, Institute of Information Technology, University of Ulm, Ulm, Germany
Pradeep Misra, Department of Electrical Engineering, Wright State University, Dayton, OH, USA
Sebastian Möller, Quality and Usability Laboratory, TU Berlin, Berlin, Germany
Subhas Mukhopadhyay, School of Engineering & Advanced Technology, Massey University, Palmerston
North, Manawatu-Wanganui, New Zealand
Cun-Zheng Ning, Electrical Engineering, Arizona State University, Tempe, AZ, USA
Toyoaki Nishida, Graduate School of Informatics, Kyoto University, Kyoto, Japan
Federica Pascucci, Dipartimento di Ingegneria, Università degli Studi “Roma Tre”, Rome, Italy
Yong Qin, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
Gan Woon Seng, School of Electrical & Electronic Engineering, Nanyang Technological University,
Singapore, Singapore
Joachim Speidel, Institute of Telecommunications, Universität Stuttgart, Stuttgart, Germany
Germano Veiga, Campus da FEUP, INESC Porto, Porto, Portugal
Haitao Wu, Academy of Opto-electronics, Chinese Academy of Sciences, Beijing, China
Walter Zamboni, DIEM - Università degli studi di Salerno, Fisciano, Salerno, Italy
Junjie James Zhang, Charlotte, NC, USA
The book series Lecture Notes in Electrical Engineering (LNEE) publishes the
latest developments in Electrical Engineering - quickly, informally and in high
quality. While original research reported in proceedings and monographs has
traditionally formed the core of LNEE, we also encourage authors to submit books
devoted to supporting student education and professional training in the various
fields and applications areas of electrical engineering. The series cover classical and
emerging topics concerning:
• Communication Engineering, Information Theory and Networks
• Electronics Engineering and Microelectronics
• Signal, Image and Speech Processing
• Wireless and Mobile Communication
• Circuits and Systems
• Energy Systems, Power Electronics and Electrical Machines
• Electro-optical Engineering
• Instrumentation Engineering
• Avionics Engineering
• Control Systems
• Internet-of-Things and Cybersecurity
• Biomedical Devices, MEMS and NEMS
For general information about this book series, comments or suggestions, please
contact leontina.dicecco@springer.com.
To submit a proposal or request further information, please contact the
Publishing Editor in your country:
China
Jasmine Dou, Editor (jasmine.dou@springer.com)
India, Japan, Rest of Asia
Swati Meherishi, Editorial Director (Swati.Meherishi@springer.com)
Southeast Asia, Australia, New Zealand
Ramesh Nath Premnath, Editor (ramesh.premnath@springernature.com)
USA, Canada:
Michael Luby, Senior Editor (michael.luby@springer.com)
All other Countries:
Leontina Di Cecco, Senior Editor (leontina.dicecco@springer.com)
** This series is indexed by EI Compendex and Scopus databases. **
Innovations in Cyber
Physical Systems
Select Proceedings of ICICPS 2020
Editors
Jawar Singh Sudhir Kumar
Department of Electrical Engineering Department of Electrical Engineering
Indian Institute of Technology Patna Indian Institute of Technology Patna
Patna, India Patna, Bihar, India
Umakanta Choudhury
Department of Electrical and Electronics
Rajkumar Goel Institute of Technology
Ghaziabad, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
v
Acknowledgements
This book is the result of papers presented at the International Conference on Inno-
vations in Cyber Physical Systems (ICICPS 2020), which took place during October
22–23, 2020, at HMR Institute of Technology and Management, New Delhi, India.
On behalf of the editors of this Conference, we desire to thank the keynote speakers
and the reviewers for their time, hard work and dedication to this Conference. Without
their services, the editors could not maintain the standards in the field of cyber
physical systems.
Our sincere thanks to Publication partner—Springer Nature, Collaborators—
International Association of Professional & Fellow Engineering, Delaware, USA,
and Indo-UK Confederation of Science, Technology & Research Ltd., London, for
acknowledging the significance of this conference to explore the possible areas of
interdisciplinary research in the field of Cyber Physical Systems.
We express our sincere gratitude to General Chair Prof. B. K. Panigrahi, IIT Delhi,
and Programme Chair Prof. M. P. S. Bhatia, NSUT, Delhi, for their motivation and
support in hosting ICICPS 2020. We express our sincere gratitude to the management
of HMR Institute of Technology and Management, New Delhi, India, for their kind
support and motivation.
We would like to thank Mr. Md. Ehsan Asgar for assisting to give shape to the
presented papers in the form of a book. Last but not the least, we are thankful to the
authors for their timely submission of the manuscripts.
Corresponding Editor
Dr. Umakanta Choudhury
RKGIT, Ghaziabad, India
vii
Contents
ix
x Contents
Sudhir Kumar received his PhD degree from the Department of Electrical Engi-
neering, Indian Institute of Technology Kanpur, India, in 2015. He is currently an
Assistant Professor with the Department of Electrical Engineering, Indian Institute of
Technology, Patna, India. He has worked as a Scientist with TCS Research, Kolkata,
India, and is an Erasmus Mundus Fellow with the Department of Computer Science,
University of Oxford, U.K. He published more than 45 research articles in pres-
tigious journals and conference proceedings. His broad research interests include
wireless sensor networks and Internet of Things. Dr. Kumar is a recipient of several
awards and fellowships. He has guided several BTech. and MTech. projects which
won national awards as well.
Umakanta Choudhury has been working as Professor and Head of the Depart-
ment Electrical & Electronics Engineering (EEE) at Rajkumar Goel Institute of
Technology. Before this, Dr. Choudhury worked as a Professor and Head of EEE
Department at HMR Institute of Technology, Delhi, India. He is an educationalist
as well as an administrator with 22 years of teaching along with industrial expe-
rience. He worked at various level in reputed Institutes like Galgotias College of
xv
xvi About the Editors
Engineering, Ansal University, Pusa Institute (Under Govt. of Delhi), etc. He had
worked as Director of Delhi Technical Campus, affiliated to GGSIP University,
Delhi. He graduated in Electrical Engineering from University College of Engi-
neering (presently (VSSUT), Odisha), and post-graduated from Delhi College of
Engineering, Delhi, and got his PhD from Jamia Millia Islamia (Central Univer-
sity), Delhi. He published several papers in national and international journals. His
research interest areas are application of artificial intelligence techniques to power
systems, power system stability and active filters. He has guided many undergraduate
projects and is currently guiding PhD scholars also.
Cyber Physical System of Smart
Three-Phase Induction Motor and Its
Security Measures
Abstract Three-phase induction motor is widely used in industry due to its rugged-
ness, reliability, efficiency, and less cost and small maintenance feature. This motor
can be affected by various electrical, mechanical, and environmental faults. This fault
causes performance degradation, unexpected heating, direction reversal, heavy shock
problem in the motor. This research presents the Cyber Physical System of smart
three-phase induction motor to detect certain faults and operate the safe switching
of motor on occurrence of fault. This system automatically detects the temperature,
vibration, humidity, and imaginary input voltage. Various sensors are connected in
the vicinity of motor to detect these parameter changes. This system can be controlled
by SMS and by accessing the webpage over a remote location through the Iinternet. If
any of these parameter goes beyond the predefined limits, it will immediately switch
OFF the three-phase induction motor. This system will then send the reason of turn
OFF to the user by SMS. When the disturbed parameter achieves its specified accept-
able range the three-phase induction motor will be restarted immediately. User can
also perform the switching operation of three-phase induction motor using internet
over a remote location. This research also discovers the possible security threats on
each layer of this system. The security measures to overcome all these threats are
presented in detail.
K. R. Saraf (B)
Ph.D. Research Scholar, Department of Electronics and Telecommunication Engineering, D.Y.
Patil College of Engineering, AkurdiPune, Maharashtra 411 018, India
P. Malathi
Head of Electronics and Telecommunication Engineering Department, D.Y. Patil College of
Engineering, AkurdiPune, Maharashtra 411 018, India
e-mail: viceprincipal@dypcoeakurdi.ac.in
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 1
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_1
2 K. R. Saraf and P. Malathi
1 Introduction
Cyber Physical Systems (CPS) monitors the behavior of physical processes and
generates the required actuating actions in order to execute the application correctly.
CPS consists of physical components such as sensors, actuators, RFID Tags, etc.
Aware execution layer contains all these components [1]. These components can
communicate with each other through the Internet. Data transport layer allows
the communication between these components. To control the behavior of these
components, application control layer generates the commands.
Three-phase induction motor has high ruggedness, reliability, efficiency, and less
cost and maintenance. Due to these features, this motor widely used in industry [2].
During the operation of this motor, various faults can be encountered. It may include
electrical faults such as over and under voltage, over loading, single phasing, phase
reversing, etc. This motor can be susceptible to mechanical faults such as rotor or
stator winding failure; bearing fault, etc. The external fault can occur in motor such
as over vibration, external moisture, over or under temperature, drastic humidity
change. All these faults may affect the performance of three-phase induction motor
[3]. It may cause a fire in the motor. It may also cause the temporary or permanent
failure of operation. Hence, to overcome these faults, it is better to design a smart
three-phase induction motor that has various sensors to detect these parameters and
switch OFF the induction motor on the occurrence of a fault.
This paper presents the Cyber Physical System of the Smart Three Phase Induction
motor. This system is controlled by PIC 18 F452 microcontroller. This system can
detect multiple faults in the motor.
ESP8266
Wi-Fi
Tempt. Micro
Sensor controller
Fig. 1 Block diagram of cyber physical system of smart three-phase induction motor
humidity sensor SY HS 230. ESP 8266 Wi-Fi controller is connected with a PIC
microcontroller to control the motor operation through the Internet.
This system can be operated in two ways: either by SMS or by the Internet. This
system has a toggle switch by which it is operated in two modes of operation. Initially,
user can select the mode GSM module. To turn OFF the motor user can send SMS
2# to the GSM module. After safe starting of motor, user can change the position
of the toggle switch to move into mode 2. In this mode, motor can be started and
stopped through the Internet over a remote location as shown in Fig. 2. In this
mode, all microcontroller detects physical fitness of motor. For measuring this fitness,
temperature sensor LM35 detects the temperature near the motor. Vibration sensor
ADXL335 detects the vibrations of the motor. Humidity sensor SY HS 230 detects
the humidity near the motor. Rheostat is connected to a PIC microcontroller to change
the imaginary voltage of motor. In actual environment, motor voltage can only be
changed by changing the voltage of each phase of three-phase supply. This will
increase the cost and size of this system. Hence in this system, only virtual voltage
change is considered to show over voltage and under voltage fault in the motor.
The top view of the proposed Cyber Physical System is shown in Fig. 3. This
figure shows the fault-free condition of this Cyber Physical System. In this condition
the temperature, humidity, and imaginary voltage are measured by sensors and shown
on LCD display, webpage www.threephaseinductionmotorcps.in.
4 K. R. Saraf and P. Malathi
The 3 induction motor will automatically turn OFF when temperature, vibra-
tion, humidity, and imaginary voltage go beyond the predefined limit. GSM modem
SIM800 sends SMS to the user in following cases,
(1) If the temperature goes below 5 °C and above 55 °C the temperature sensor
LM35 will detect the under temperature and over-temperature condition and it
will send the response to the PIC microcontroller. Figure 4 shows the condition
of over temperature.
The SMS received by user in this condition is shown in Fig. 5.
(2) In case of over vibration of motor vibration, sensor ADXL 335 will detect it
and send the response to the PIC microcontroller. Figure 6, shows the condition
Cyber Physical System of Smart Three-Phase Induction Motor … 5
of over vibration.
The SMS received by the user in over vibration fault is shown in Fig. 7.
(3) In a similar manner the condition of under temperature, under humidity,
over humidity, under voltage, and over voltage occurs, if the value of these
parameters near the motor goes beyond the acceptable limits.
The user-defined acceptable ranges of input voltage, vibration, temperature,
and humidity are shown in Table 1. In each case, motor will send the SMS of
turn OFF condition to the user. When the parameter arrives, its optimum value
motor will automatically turn ON and send SMS of motor ON condition to the
user. The range of various parameters in this system are given in Table 1.
6 K. R. Saraf and P. Malathi
Cyber Physical System has three tiers of architecture which includes the following
layers [4]. Figure 8 shows three-tier architecture of CPS.
Aware execution layer: This layer contains all types of physical equipment
including RFID tags and readers, actuators, and sensors. This layer is responsible
for access perception to the physical data environment. It also implements control
commands of the system. In this system, aware execution layer will contain three
sensors such as temperature sensor LM35, vibration sensor ADXL 335, humidity
sensor SY HS 230, and one rheostat.
Data transport layer: This layer performs information exchange and real-time
communication through the Internet. It uses the Internet of private network, local
area network, or communication network. It can also use other data transmission and
interaction networks for communication. It has massive information processing and
management ability. In this system, instead of the Internet wired connection of sensors
with PIC controller is used to transmit the sensing signal to PIC microcontroller.
Application control layer: This layer receives information from the data transport
layer. It generates control commands based on preset rules and judgment of control
semantics. This layer also provides feedbacks in the form of control commands to the
physical unit through the data transport layer. This layer combines the Cyber Physical
System with industrial applications. It is used to generate intelligent solutions such as
smart transport, smart grid smart agriculture, etc. In this system, control commands
to switch the motor ON and OFF are provided by the PIC microcontroller through
three-phase relays connected with three-phase induction motor.
The details of all the attacks mentioned in Fig. 8 are given below,
Physical attacks: In this attack, the attacker causes any physical damage to CPS.
For example, if in proposed physical damage to any sensor will stop the sensing of
the corresponding physical parameter.
Equipment failure: It results in abnormal behavior of equipment due to external
unaware force or unexpected environmental conditions or aging effect. It also
partially or fully reduces the performance of equipment.
Line fault: It occurs due to the short circuit connection of conductors.
Electromagnetic Leakage: It creates electromagnetic signal radiation through
physical equipment, ground, signal lines, or power lines.
Electromagnetic interference: This attack causes disturbance in communication
due to electromagnetic signals.
Denial of service attacks: By this attack network bandwidth is highly consumed
by an attacker. Target system flooded by fake requests and it declines to provide its
services.
Routing attacks: In this attack, attacker sends fake routing information to forging
the routing process. This attack produces wrong routing interference.
Aggregation node attacks: Attack on this core node of data transmission can
create a threat to the confidentiality of data.
Direction misleading attacks: Packet received by malicious node changes source
and destination address of the packet. Due to these packets delivers to the wrong path
which results in network routing confusion.
Blackhole attack: In this attack, the attacker creates a fake channel to receive the
routed packet.
Trap doors: In any network, trap door is a secrete way of gaining access by
exploiting its vulnerabilities or any loopholes in a network. Attackers can perform
the attack using such trap doors.
Sybil attack: In this attack malicious node appears as a multiple node. This will
damage the system network.
Wormhole attack: In this attack, multiple malicious nodes are used for data
tapping. Data transmission can also be blocked by this attack. Leakage of user
privacy: The privacy collector in this layer collects various private data of the
user to provide optimum performance. This data leakage will lead to attack on
confidentiality.
Unauthorized access: In this attack, attacker gains unauthorized access to the
network which leads to private data loss.
Malicious code: Unnecessary code in the system which creates a reverse
connection to the malicious server causes loss of user’s private data.
Flood attacks or Distributed Denial of Service: In this attack, multiple compro-
mised systems are used to attack the target by flooding it with false requests.
Cyber Physical System of Smart Three-Phase Induction Motor … 9
These will create a denial of service for genuine requests. It blocks normal network
communication.
The control command forged attack: Attacker generates the false control
command in the application control layer. This command will provide complete
system access to the attacker and performs the breaching of data.
3 Conclusion
This research creates a CPS of smart three-phase induction motor. This system
detects various physical faults and performs the switching of the motor accordingly.
This system also protects the CPS against various possible threats. This system is
surrounded by various sensors such as temperature sensor to measure the temperature
of three-phase induction motor, humidity sensor to measure the humidity near the
motor, vibration sensor to detect the over vibration of the motor. Imaginary voltage
switch (rheostat) is placed in this system. The maximum and minimum acceptable
limits of all the parameters are predefined for this system. This motor can be operated
using the Internet or through SMS. Once the limit of any parameter crosses above or
below the acceptable value, this system will automatically turn OFF and the corre-
sponding SMS is sent to its user. This SMS will explain the reason of turn OFF the
system. Once the disturbed parameter reaches its acceptable limit, the system will
automatically turn ON. This motor will automatically perform the switching based
on varying environment and physical conditions. Also, this system sends the corre-
sponding SMS to the user using a GSM modem. Users can also control this system
through the Internet over a remote location. In the later part of the paper three-tier
architecture of Cyber Physical System along with all possible threats to each layer
are described. This paper also describes security measures to prevent or overcome
all these threats.
4 Future Scope
This research considers only environmental faults and vibration faults in three-phase
induction motor. The improved system can be designed to detect and overcome the
other electrical and mechanical faults in this motor. It will improve the performance
of the motor and reduces the heating and direction reversal problems.
10 K. R. Saraf and P. Malathi
References
1 Introduction
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 11
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_2
12 S. Madunisha et al.
2 Soft Startıng
Delicate starters permit motor to begin, speed can be change and stop with least
weights on the hardware, which should be possible by proper modification of the
supply voltage. A few strategies for the shut circle control method to accomplish
this have been created and introduced in [9]. Right now, a sensor is required to
procure the sign criticism. A few specialists have proposed and built up a technique
for ideal delicate beginning without sensing the speed for detecting of thyristors
voltages is particularly required [10, 11]. Drives with solid-state starter incorporates
the advantages of longer engine life, improved control torque; therefore, its area
of developments regions are expanding quickly Arduino is an open-supply device
with programming layout, client arranges the plans and makes microcontrollers and
microcontroller packs for building propelled contraptions. Arduino board plans use
a selection of microchips and controllers.
14 S. Madunisha et al.
3 Control Principle
The squirrel-cage induction motor has a few focal points like ease, nearly support
free, and solid activity; however, for high powerful execution mechanical application,
their control is as yet not all that simple due to their non-direct trademark furthermore,
the assortment of rotor resistance with working condition. Vector control prompts
autonomous control of torque and transition, however, with significant detriment that
is touchy to parameter varieties, thus the exhibition of customary controllers like
PID or PI falls apart. In this way, these days a definitive objective is to expand the
strength of the control framework, with the goal that it will turn out to be progressively
resistant to vulnerability. In spite of the fact that customary controls have entrenched
hypothetical foundations on solidness and permit diverse structure goals, for example,
consistent state and transient qualities of shut circle framework, however, for that
privilege numerical model of the system should be known. On the other hand, while
using counterfeit control instruments it isn’t essential to know the logical model of
the system and besides the helplessness or cloud assortments in plant parameters
and structure can be dealt with even more suitably. A couple of works added to the
arrangement of crossbreed control plans [12].
Scaling factor in an intelligent controller is significant. Determination of appro-
priate qualities for scaling factors is dependent on the information about the cycle
to be controlled and now and then through experimentation to accomplish the most
ideal control execution. This is so on the grounds that not at all like regular non-fluffy
regulators to date rationale regulator on the grounds that changing the scaling factors
changes the standardized universe of talk, the areas, and the participation elements
of info/yield factors of fluffy rationale regulator., there is no very much characterized
technique for the good setting of scaling factors for fluffy rationale regulators. Yet,
the scaling factors are the principle boundaries utilized for tuning the fluffy.
Right now, control techniques (traditional and fake insightful) are acquainted and
applied with a backhanded field-arranged acceptance engine. In the first kind of
approach, an ordinary PI controller is acquainted all together with accomplished
speed control and beginning circumstance is watched. The structure of the PI
controller utilized is shown in Fig. 3 which is a normal equal PI controller.
This control methodology with better outcome in light of the fact that fuzzy
logic defeats the numerical challenges of demonstrating profoundly non-straight
frameworks. It reacts in a progressively steady manner to lose input parameters, its
change is exceptionally simple and entirely adaptable.
4 Simulation Results
Right now, contextual analyses have been performed. In both Simulink and Powersim
tool compartments of MATLAB programming are utilized. In the main contextual
investigation, a 38 KW motor is used.
Conventional and Fuzzy Proportional Integral (PI) Speed Controller … 15
5 Conclusion
An enlistment motor devours more vitality than it quite to play out its work not
exactly at full burden situation, that overabundance vitality transmitted in this type of
warmth. Presenting the man-made reasoning in framework can control plentifulness
of beginning current, spare the vitality and new savvy control structure is harsh
toward aggravation created outside or inside the framework. Furthermore, fuzzy
controller based control methodology shows better outcomes in light of the fact that
fluffy rationale beats the scientific challenges of displaying exceptionally non-straight
frameworks, the expense and multifaceted nature of the controller is diminished
and it reacts in an increasingly steady manner to uncertain readings from input
parameters. In the future some improvement methods can be used to streamline the
quantity of rule-based fuzzy logic controller, as time devoured in fuzzification and
defuzzification are especially relies upon the quantity of rules which thusly impact
the reaction of the controller.
References
1. Bose B (2006) Power electronics and motor drives advances and trends, 1st edn. Elsevier,
Academic Press
2. Say M (1984) Alternating current machines, 2nd edn. Pitman, England
3. Badr MA, Abdel Halim MA, Alolah AI (1996) A nonconventional method for fast starting of
three phase wound-rotor induction motors. IEEE Trans Energy Convers 11:701–707
4. Abdel Halim MA, Badr MA, Alolah AI (1997) Smooth starting of slip ring induction motors.
IEEE Trans Energy Convers 12:317–322
18 S. Madunisha et al.
5. Hamouda RM, Alolah AI, Badr MA, Abdel Halim MA (1999) A comparative study on the
starting methodes of three phase wound-rotor induction
6. Motors part I. IEEE Trans. On Energy Conversion Vol. 14, pp. 918–922.
7. Zenginobuz G, Cadirci I, Ermis M, Barlak C (2001) Soft starting of large induction motors
at constant current with minimized starting torque pulsations. IEEE Trans Ind Appl 37:1334–
13479
8. Rashad EM, Radwan TS, Rahman MA (2004) Starting and vector control of series-connected
wound- rotor induction motor in super synchronous mode. In: 39th IAS annual meeting
conference on industry applications, vol 1, pp 32–39
9. Li WX, Lu JG, Liu MS, Zhao J (2004) Design of intelligent soft-start controller for induction
motor. In: Proceedings of 3rd international conference on machine learning and cybernetics,
vol 2, pp 908–912
10. Denai MA, Attia SA (2002) Fuzzy and neural control of an induction motor. Int J Appl Math
Comput Sci 12
11. Cleland JG, Tumer MW, Fuzzy logic control of electric motors and motors drives feasibility
study. In: United States air and energy engineering environmental protection research laboratory
agency research triangle park
12. Shen JX, Zhu ZQ, Howe D, Buckley JM (2002) Adaptive fuzzy logic speed control of PM
brushless AC drives. In: International conference on power electronics machines and drives,
pp 68–73
13. Dannenberg A (2005) Fuzzy Logic Motor Control with MSP430x14x. Texas Instruments,
Application Report, SLAA235
14. Dhayalini K (2016) Optimization of wind-thermal coordination dispatch using flower pollina-
tion algorithm. Int J Adv Chem 12(16):4963–4970
15. Manivasagam R, Saranraj R (2020) Wind turbine manufacturing supply chain. Int J Sci Technol
Res 9
16. Manivasagam R, Dharmalingam V (2014) Power quality problem mitigation by unified power
quality conditioner: an adaptive hysteresis control technique. Int J Power Electron 6:403–425
17. Manivasagam R, Parthasarathy P, Anbumozhi R (2019) Robust analysis of T-S fuzzy controller
for non linear system using H-infinity. Adv Intell Syst Comput 949:643–651
18. Miloud Y, Draou A (2005) Performance analysis of a fuzzy logic based rotor resistance
estimator of an indirect vector controlled induction motor drive. Turk J Elce Engine 13
Privacy Protection of Biometric
Templates Using Deep Learning
1 Introduction
Biometric recognition involves the use of human traits that are unique to an individual.
These traits can be the face, fingerprint, iris, voice, gait, and signature among others.
Out of these, the face is the one being used in a large number of applications for recog-
nition. Face recognition can take into account several features like facial measures,
facial feature shapes, eye color, etc., to provide better performance. It also provides
an advantage to those users who have lost fingerprints or have wrinkled ones. With
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 19
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_3
20 S. Arora et al.
2 Related Work
3 Methodology Used
Convolutional Neural Networks (CNN) are one of the most suitable neural networks
for images. Our CNN model employs several components like Kernel, activation
function, Pool, Fully connected layers, and softmax function.
A kernel is a filter that is passed over the image to transform it. Subsequent feature
map values are calculated consistent with the subsequent formula. Given input image
f and kernel h, convolution can be represented as follows(m and n denote the indexes
of matrices).
G[m, n] = ( f ∗h)[m, n] h[ j, k] f [m − j, n − k] (1)
j k
ReLu (The rectified linear unit) has been used as an activation function. It will
return 0 in case of any negative input, and will return the positive value back.
Pooling layers are used for downsampling feature maps by summarizing the pres-
ence of features in patches of that feature map. Two types of pooling layers are max-
pooling and average pooling. Maximum pooling calculates the maximum values in
each patch of each feature map.
FC Layer is a final connected layer that takes inputs from previous layers to
calculate a final probability. The goal of convolution and pooling layers is to extract
features from the images and the final layer(s) are used to classify those features. It
has a typical equation:
f WT · X + b , where f is an activation function. (3)
ez j
σ z j = K (4)
k=1 ezk
22 S. Arora et al.
Here z is the input vector, and σ(z) is the output class probability. It is particularly
useful in multiclass classification when the input has to be one, and only one class.
The methodology of privacy preservation of templates, followed by biometric
authentication is depicted in Fig. 1.
At the time of user enrollment, unique codes are generated for each user by binarizing
the image pixels. These binary codes are not exposed to the user and are further hashed
using the SHA-256 algorithm. The use of hashing would ensure the security of the
templates, thus preserving the privacy of enrolled users. The main steps involved in
the SHA-256 algorithm are:
1. Given a message M to be hashed, the first step is to form a padded message M’.
This consists of the message along with padding. The length is a multiple of
512.
2. The padded message M’ is parsed into N blocks of size 512 bits. Each block is
an input block of 32 bits, and there are 16 blocks in number.
3. Finally, a hash of length 256 bits is initialized (there are 8 blocks in number,
each of size 32 bits). The initial hash value is set by taking the first 32 bits of
the fractional parts of the square roots of the first eight prime numbers.
Data augmentation is useful in the case of biometric data because of the limited
number of training samples and these would be fed to deep architectures to get a
good performance. As one-shot enrolment is done, one binary code is assigned for
each user. This is followed by data augmentation to increase the number of training
Privacy Protection of Biometric Templates Using Deep Learning 23
samples. Data augmentation is done for each face image using various operations
like flipping, re-scaling, shearing, etc. These would be fed to the deep Convolutional
Neural Network for extraction of features.
The different layers of the CNN architecture are depicted in Table 1. Figure 2
visualizes the architecture.
The model is trained and tested using the validation set approach. We reserve 60%
of the dataset for training and the remaining 40% for validation. We also repeat the
experiments on other splits (80–20 and 20–80, however, results obtained using 60–40
split are the best).
To evaluate the performance of the system, the trained model is tested on input
images and the results obtained in this paper are evaluated in terms of False
Acceptance Rate (FAR) and Genuine Acceptance Rate (GAR).
24 S. Arora et al.
4 Results
The following datasets have been used to evaluate the performance of the privacy-
preserving framework:
(1) Labeled Faces in The Wild: The database contains around 13,000 images of
faces collected from the web. The faces have been given labels i.e. the names
of those persons. 1680 of the people pictured have two or more distinct photos
in the data set.
(2) CASIA Web face dataset: It is annotated with 10,575 unique people with
494,414 images in total. This is the second largest public dataset available
for face verification and recognition problems.
The experimental results are shown in Tables 2 and 3. The Genuine Acceptance Rate
of the proposed method with one-shot enrolment is evaluated in Figs. 3 and 4. These
graphs help to visualize the values achieved using different optimization algorithms
like Adam and Stochastic Gradient Descent.
The results achieved can be compared in terms of the performance metric used,
with frameworks proposed in the existing studies. Table 4 shows this comparison.
References
11. Jindal A, Chalamala S, Jami S (2018) Face template protection using deep convolutional neural
network. In: 2018 IEEE/CVF conference on computer vision and pattern recognition workshops
(CVPRW). https://doi.org/10.1109/cvprw.2018.00087
12. Talreja V, Valenti M, Nasrabadi N (2017) Multibiometric secure system based on deep learning.
In: 2017 IEEE global conference on signal and information processing (Globalsip). https://doi.
org/10.1109/globalsip.2017.8308652
13. Sadhya D, Singh S (2017) Design of a cancelable biometric template protection scheme
for fingerprints based on cryptographic hash functions. Multimed Tools Appl 77(12):15113–
15137. https://doi.org/10.1007/s11042-017-5095-x
14. Jain A, Nandakumar A, Nagar A (2008) Biometric template security. EURASIP J Adv Signal
Process 1(579416). https://doi.org/10.1117/2.1200911.001590
A Comparative Analysis of Clustering
and Biclustering Algorithms in Gene
Analysis
Abstract While dealing with high-dimensional biological data, subsets of genes that
have similar behaviour under some conditions but behave independently under others,
are frequently found. Discovering such co-expressions can aid in uncovering genomic
knowledge such as gene networks or gene interactions. A great deal of research is
being carried out on the algorithms of these approaches for decades, especially for
array mining in gene expression analysis in the field of computational biomedical. In
this paper, we compare the results of K-means, traditional clustering algorithm and
OPSM (Order-preserving submatrix problem), a biclustering algorithm on a gene
expression dataset on the basis of different parameters and examine the benefits of
co-clustering over traditional clustering methods in different applications.
1 Introduction
In today’s era, associated with increased computational power and the abundance
of readily available data, data analysis and its interpretation is a major challenge
faced. Data mining is an effective tool to gather relevant insights from raw data. It
means finding unknown relationships, like similarities and anomalies, and getting
patterns from the humongous batches of data to glean meaningful knowledge. This
extracted information can further be utilized in getting a wholesome meaning from
large databases particular to an area, where it can guide in decision making.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 29
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_4
30 D. Mehta et al.
There have been numerous data mining techniques developed and being
researched for years now. Of these techniques, Clustering, Biclustering and Triclus-
tering are some of the most prominent ones. The advent of these tools and
their comprehensive utilization in a variety of applications like the stock market,
medicines, computational biology, image processing, food process technology and
many more fields has led to their massive popularity. In this article, we compare
the performance of a clustering algorithm, K-means [2] with that of a biclustering
algorithm OPSM (Order-preserving submatrix problem) [6], by identifying poten-
tially meaningful relationships among genes and/or experiments in the genome DNA
microarray dataset [10].
Section 2 gives a brief theoretical background on the fundamental concept of both
the data mining techniques. A detailed description of both the algorithm of interest
and the dataset used can be found in Sect. 3. Whereas Sect. 4 expresses the results
examined on gene expression datasets for all the aforesaid algorithms, the conclusion
of our analysis is hence presented in Sect. 5.
2 Background
2.1 Clustering
Clustering is a method of grouping the data points based on similarity into functional
and relevant subclasses called clusters [1]. Objects in one cluster have more anal-
ogous characteristics with each other than with those in the other clusters. It is an
unsupervised learning technique with no predefined classes and training examples.
The quality of the cluster is determined by the selection of the clustering algorithm.
Figure 1 summarizes the classification of clustering algorithms.
2.2 Biclustering
3 Methodology
c
ci
J(Y) = xi − y 2 (1)
j
i=1 j=1
II
Having won with Hamilton, the Federalist leaders now turned to another
part of their programme—the rigid exclusion of Jeffersonians from
commissions in the army. This was to be a Federalist war, nothing less. Even
Washington, who had, by this time, become a partisan Federalist, was in
sympathy with the view that the friends of Jefferson, Madison, Hancock, and
Sam Adams should be proscribed. This appears in his consultations with
John Marshall as to the personnel of the army,[1602] and in a letter to
McHenry referring to the ‘erroneous political opinions’ of an applicant.[1603]
This enlistment of Washington in the proscriptive policies of the Federalists
is directly traceable to the Iagos who were writing him all the while.
Hamilton was solemnly assuring him that the Democrats were ‘determined
to go every length with France’ and to ‘form with her a perpetual offensive
and defensive alliance and to give her a monopoly of our trade.’[1604]
Thus one day Adams sat in conference with Washington on the
organization of the army. Knowing Aaron Burr as a brave and able officer
anxious to fight, he wished to recognize the Democrats by giving him a
commission. Washington, much under the influence of Hamilton, conceded
Burr’s capacity, but opposed his appointment because he was a master of
intrigue. Through the mind of Adams, hampered in his plans at every turn,
flashed the vivid memory of how his predecessor had forced him to
humiliate his own friends in the appointment of Hamilton—‘the most
restless, impatient, artful, indefatigable, and unprincipled intriguer in the
United States.’ But—as he afterward wrote—he was ‘not permitted to
nominate Burr.’[1605] Here again the traitors in the Cabinet had played their
part.[1606]
But the war was not to be national, but Federalist. ‘Every one of them
[Democrats] ought to be rejected, and only men of fair property employed in
the higher and more confidential grades,’ wrote a Federalist Representative
to Wolcott.[1607] When Adams’s son-in-law applied for a commission his
application was held until he sent a certificate that he had not interfered in a
gubernatorial election in New York.[1608] So zealously did the minor
politicians enter into this policy of proscription that some of the wiser
leaders began to take alarm. Even a friend of McHenry at Baltimore was
moved to protest. ‘They seemed to imagine that nothing was left to be done
but to exterminate every one who had been on the Democratic side’ he
complained.[1609] Even Hamilton finally thought fit to call for a moderation
of the programme. ‘It does not seem advisable,’ he wrote McHenry, ‘to
exclude all hope and to give to appointments too absolute a party
feature.’[1610] But there was no relenting in party circles, and no one had
done more to arouse this fanatical spirit than Hamilton himself.
The climax of stupidity was reached in the case of Frederick A.
Muhlenberg, former Speaker of the House, a leader and oracle among the
Germans of Pennsylvania, but no blind follower of Federalism. In a spirit of
pure patriotism he had personally offered the service of his sword to Adams,
whose wish to accept it was again thwarted by Washington, acting under the
inspiration of the Federalist leaders. Whereupon Muhlenberg marched with
the Germans as a body into the Jeffersonian camp and enlisted for another
war.[1611]
Under this proscriptive program the Jeffersonians remained mute but for
a few sarcastic comments in their press. ‘General Washington must have
some very keen reflection,’ said the ‘Independent Chronicle,’ ‘in taking
command of the army of the present day, in seeing so many new friends who
were his old enemies during the Revolution.’[1612] When it was reported that
Robert Goodhue Harper had been made Commissioner-General, it chortled,
‘What lawyer would not plead for such a fee?’[1613] And it had reflected on
Adams’s ‘pretence’ for piety in connection with his appointment of
Hamilton, ‘who published a book to prove that he was an adulterer.’[1614]
Bitter as were the reflections of Adams on reading such observations, it
could have mattered little to Hamilton. Everything he had started out to get
he got. He wanted a war with France—and got it. He wanted the command
directly under Washington as he had wanted nothing else in his life—and got
it, by striding to his sword over the humiliated pride of the President. He
wanted an army of fifty thousand men, and, if he fell short in this, he
nevertheless had an army. He was on the crest of the wave, the most
powerful man in America, and he was happy.
III
Feeling that supreme fortune was within his grasp, Hamilton threw all his
enthusiasm and vitality into the task of perfecting the army and organizing
the Nation for war. ‘The law has abandoned him, or rather he has forsaken
it,’ wrote a friend to King.[1615] Preparing the plan for the fortification of
New York Harbor, he personally superintended its execution. He had worked
out to the minutest detail the organization of the army and all he lacked was
men and a declaration of war. But alas, he was confronted on every hand by
disheartening difficulties. The recruiting fell pathetically short of
anticipations, the War Department under the Secretary of his own choosing
was pitifully inefficient, and, while the army was woefully below the
provisions of Congress, even the fragment was not adequately clothed or
provisioned, and there was a deficiency of tents. In a rage, Hamilton wrote
angrily to McHenry: ‘Why, dear friend, why do you suffer the business of
providing to go on as it does? Every moment proves the insufficiency of the
existing plan and the necessity of auxiliaries. I have no doubt that at
Baltimore, New York, Providence, and Boston additional supplies of
clothing may promptly be procured and prepared by your agents, and it
ought to be done, though it may enhance the expense. ‘Tis terrible ... that
there should be wants everywhere. So of tents. Calls for them are repeated
from Massachusetts where better and cheaper than anywhere else they can
certainly be provided.’[1616]
The truth is that the hysteria for getting at the throat of the French
democracy was over almost as soon as it began, and the masses commenced
to reflect on the cost, as the war measures grew apace. Jefferson, noting the
increasing boldness of opposition in Pennsylvania, where petitions were
signed by four thousand people protesting against the Alien and Sedition
Laws, standing armies, and extraordinary war powers for the President, and
observing similar unrest in New Jersey and New York, and ‘even in New
Hampshire,’ was fearful of insurrection. ‘Nothing could be so fatal,’ he
wrote. ‘Anything like force would check the progress of public
opinion.’[1617]
When Wolcott tried to float a loan, he found the moneyed men cold to the
regular legal rate of interest, for their patriotic passion had suffered a chill
when it came to cash. After all, business was business, and why should the
Federalist men of money fail to get in on the profits? It was not hard to
persuade Wolcott, who had a sentimental weakness for the financiers, and he
could see nothing unreasonable in a demand for eight per cent. The rates for
stocks were good, commercial prospects were alluring, and after all, eight
per cent would be but ‘moderate terms.’ Adams, sore from the unmerciful
pummeling from his party, was outraged at such a rate,[1618] but Wolcott
persisted—it was the only way. War was war as business was business.
Finally, in sheer disgust, Adams capitulated to necessity with the
exclamation: ‘This damned army will be the ruin of this country; if it must
be so, it must; I cannot help it. Issue your proposals as you please.’[1619]
When Hamilton had urged that all the resources of revenue be seized upon,
Adams thought him mad, but it soon became evident that something of the
sort would be necessary.[1620]
Aha, said the ‘Independent Chronicle,’ ‘ “millions for defence but not one
cent for tribute.” This has been the language of those who are in favor of
war. The patriotism of such persons is every day becoming more and more
evident. A loan of five million has been attempted, but instead of the old
legal rate of six per cent these modern patriots have required the moderate
premium of Eight. At this rate we shall soon verify the first part of the
motto, viz., “millions for defence,” but whether the latter is not violated by
the extra interest is left to the decision of those who are to bear the
burdens.’[1621] And they who were to pay the piper gave an acquiescent nod.
The taxes which the war party had levied with such patriotic abandon
aroused bitter resentment. Among the Germans of Pennsylvania, the taxes on
houses, lands, and windows were considered the beginning of a system
which would extend to everything. The immediate outcome was an
insurrection led by John Fries, an ignorant son of a German farmer, and the
marching of the troops and the easy dissipation of the incipient rebellion
against the assessors.[1622]
About that time Hamilton arrived in Philadelphia. ‘For what purpose?’
inquired ‘The Aurora.’ ‘Can it be to foment another insurrection and thereby
to increase the energies of the Government? What distinguished citizen is
there in the counties of Northampton and Bucks that he wishes to glut his
vengeance upon? Does he wish that Easton may be burned to afford him a
pretext for military execution?’[1623] If there were no executions, the people
had a touch of military rule. A troop of horse from Lancaster committed
outrages on citizens at Reading, and Jacob Schneider, a local editor,
commented with severity upon their actions. On their return through
Reading these troops went to the editor’s office, tore his clothing from his
back, dragged him to the Market House, and were preparing to give him
twenty-five lashes when troops from Philadelphia interfered.[1624] The
brutality of the soldiers shocked the country. The prisoners taken on the
expedition were treated with the same unnecessary cruelty which marked the
treatment of the rebels in the Whiskey Insurrection. Ignorant or besotted
with partisan passion, under a lax discipline, and contemptuous of the civil
government, many soldiers strutting about in uniforms, insulting and
attacking citizens, convinced the majority of the people that the
Jeffersonians were right in their observations upon the evils of standing
armies.
No one had denounced these excesses with greater vehemence than
William Duane, editor of ‘The Aurora.’ One day some petty officers in
uniforms, swords and pistols on their persons, said by Duane to have
numbered thirty and by his enemies to have been fifteen, entered his office.
With drawn pistols the compositors and pressmen were driven into a corner
and kept at bay by a part of the assailants. Some grasped and held Duane’s
hands while others beat him over the head with the butt end of a pistol. Then
with ten gallant soldiers participating in the assault on the one man, he was
brutally dragged downstairs into Franklin Court, where the assault was
repeated. He was knocked down and kicked. The editor’s request to be
permitted to fight any one of them was ignored, and had not his sixteen-year-
old son thrown himself across his father’s body, and a number of Democrats
arrived to give battle, he would have been murdered in cold blood. That
night armed Democrats went to the ‘Aurora’ office prepared to give shot for
shot if an attempt should be made to destroy the plant.[1625] ‘Porcupine’
chortled, and young Fenno declared that ‘the punishment of this caitiff is of
no more consequence than that of any other vagabond.’ Besides, did not
every one know that ‘the infernal Aurora and the United Irishman who
conducts it’ were ‘expressly chargeable with the Northampton
Insurrection?’[1626]
With such encouragement from the organs of the Administration, these
outrages by soldiers soon became commonplace wherever they were
assembled, with uniformed ruffians swaggering down the streets pushing
civilians into the gutters, taking liberties with women, picking quarrels while
drunk, and slashing and lunging with dirk and sword.[1627] This bullying
spirit affected the petty officers and reached a climax when civil officials,
armed with a warrant for a thief who had escaped to the soldiers near
Philadelphia, were literally kicked out of the camp, their warrant cursed and
trampled.[1628] With the tide rising rapidly against both the war and the
army, the recruiting lagged. Adams in later years recalled that the army was
as unpopular ‘as if it had been a ferocious wild beast let loose upon the
nation to devour it.’[1629] With the recruiting officers putting forth their
utmost efforts, ‘with all the influence of Hamilton, reënforced by the
magical name of Washington,’ they were unable to ‘raise one half of their ...
little army.’[1630] Duane wrote that before the law creating the army passed
‘there were 15,000 applications for commissions—since the passing of the
law there have been only 3000 soldiers.’[1631] There is more than a touch of
irony in the fact that while the Administration papers were vilifying the
Irish, ‘three fifths of the men enlisted were Irish immigrants.’[1632]
But there was another reason for the failure in recruiting—the people
soon concluded that some one had cried ‘wolf’ when there was no wolf. No
one, including Hamilton, believed that France had the most remote notion of
warring on the United States. The impression grew that the army was
intended for purposes other than the protection of the country from a foreign
foe. Meanwhile, the taxes were bearing hard, the national debt was mounting
and the passion for peace returned. Right gallantly the war party sought to
reawaken the fine frenzy of the hysterical days of the X Y Z papers. The
preachers were as distressed over the possibility of peace as the politicians,
and a convention of ministers in Boston issued a war cry. ‘You will see by
these things that the clergy are not asleep this way,’ wrote a Massachusetts
man to Wolcott. ‘They ought everywhere to be awake.’[1633] From the New
York ‘Commercial Advertiser’ came a pathetic attempt to sweep back the
rising tide for peace: ‘The necessity in times like the present in cherishing
the war spirit ... is evident.’[1634] Apropos of the report that the French were
ready to make every concession to our interest and pride, the ‘Centinel’ in
Boston sent forth the warning, ‘The trying time is now approaching’;[1635]
but the rabble, as the masses were called, could see nothing distressing in
winning a war without the loss of a drop of blood. Fenno’s ‘Gazette,’
commenting on the business stagnation, promised that ‘a war with France
would within two months revivify every department of society, commerce
would be invigorated, the funds would rise, and every employment of life
would receive new vigor.’[1636] This sordid note he was soon to strike again.
[1637] But it was all unavailing. The enlistments dwindled to nothing,
common soldiers were actually cheering the Democratic Governor in the
streets of Philadelphia, no one feared an invasion, and, as Wolcott confided
to Fisher Ames, ‘no one has thought it prudent to say that the army is kept to
suppress or prevent rebellions.’[1638] To make matters all the worse,
desertions multiplied until the harassed McHenry was writing Hamilton
urging executions. The little rhymester was far beyond his depths, scolded
by Washington, kicked like a flunky by Hamilton in one or two letters a day.
But the idea of shooting a deserter was a bit too high-toned for Hamilton.
‘There must be some caution,’ he wrote, ‘not to render our military system
odious by giving it the appearance of being sanguinary.’[1639] Adams was
prepared for extreme measures, but it was decided to leave the decision with
Hamilton and McHenry—which meant with Hamilton. ‘If the virtuous
General Hamilton is determined upon shooting every soldier who deserts,’
said ‘The Aurora,’ ‘Billy Wilcox’s court martial will be kept at pretty
constant duty. In a Daily Advertiser of last week no less than ten of these
strayed gentlemen are advertised for apprehension at $10 a head.’[1640]
But Hamilton was too wise to shoot.
IV
The war cry was sinking to a hoarse whisper when Dr. James Logan, who
had entertained the Washingtons, and who was a follower of Jefferson,
quietly slipped out of Philadelphia one day and sailed for France—and the
war hawks were in a frenzy. When Logan, at his own expense and wholly on
his own volition, went to Paris, it was to determine the state of the public
mind there for himself. He was a leading citizen, his family familiar to
society, his home one of the most cultured in the community, and, aside from
being a friend of the French democracy, he was a Quaker and an enemy of
war. He felt that the country had been deceived by war propaganda, and he
determined to find out for himself.
The war wing of the Federalist Party knew that an investigation in Paris
was the one thing they could not afford. No one knew better that war was
unnecessary and that the French were ready if not eager to recede. Harrison
Gray Otis knew it best of all because his fellow Federalist of Boston and
classmate, Richard Codman, was writing him from Paris of the French
disposition for peace and conciliation. But this was being carefully
concealed from the American people. Thus, when Logan sailed it was
clearly the cue for the war party to hint darkly of weird conspiracies with the
French and a factional embassy from the Democrats. Soon Harper, who had
a supersensitive nose for conspiracies and treason, was hinting mysteriously
on the floor of the House of a traitorous correspondence between the French
Directory and the Jeffersonian Party. The truth is that, when Logan foolishly
made a mystery of his departure and almost surreptitiously stole out of
Philadelphia, he carried letters from Jefferson and Governor McKean. Four
or five days before his departure he had informed Jefferson of his purpose
and asked for letters of introduction and a certification of his citizenship. It
was not a secret that Jefferson was opposed to a preventable war, but no
instructions were given the Doctor, no communication was sent by Jefferson,
and there was no conspiracy at all.[1641] Thus, on his own volition Logan
went to Paris, talked with Otis’s Federalist friend Codman and other
Americans, conversed with leading Frenchmen, dined with Merlin, met
Talleyrand, and ascertained, as he had expected, that peace could be
preserved with honor. A simple, honest man, with none of the crooked
mental twists of the professional politician, he returned with the confident
expectation that the President and his advisers would be glad to get the
benefit of his observations. He reached Philadelphia to find himself the
object of immeasurable abuse.
Not doubting that Pickering would be glad to have his impressions,
Logan went first to him. This was, in truth, a ludicrous performance, and a
Federalist paper was moved to mirth because he had ‘actually unfolded his
budget to Pickering’ and ‘needless to say’ returned ‘with a bug in his
ear.’[1642] Going on to Trenton, the temporary seat of government, he saw
Washington, to be received with more than his customary coldness. He had a
message from Lafayette to Washington. ‘Aye,’ said the General. And one
from Kosciusko. ‘Aye,’ said Washington. Whereupon Logan courteously
proffered him the use of his home, which the Washingtons had often found
agreeable, while in Philadelphia, to have his offer curtly declined. Even
Pinckney haughtily refused the use of Logan’s carriage when the General
was seeking a conveyance to the capital. ‘This fellow Logan had the
unparalleled effrontery to offer the General a seat in his carriage,’ sneered a
war paper.[1643] Some historians insist that Adams treated him
contemptuously, and this seems probable in the light of the latter’s letter to
Pickering,[1644] albeit Gibbs records that Adams was much impressed with
Logan’s story and with his sincerity and candor.[1645] The letter was written
to Pickering, however, before the interview was granted.
When Congress met, Logan found himself the subject of a bitter debate
brought on by the introduction of the so-called ‘Logan Law’ prohibiting
unofficial meddling in international affairs. Harper had followed his cue and
found his conspiracy. Logan had actually presented a paper to the Directory
as from one having authority. The story was all too thin, the facts too badly
twisted, and the Jeffersonians under the leadership of Gallatin showed their
teeth. The climax came when Harper read the paper which Logan was
presumed to have presented. Then, through frank letters in ‘The Aurora,’
Logan brought out the truth to the discomfiture of the war hawks. In view of
the scurvy treatment he has received, his own statement is one of value. He
had been met at Hamburg by Lafayette, who had furnished him with the
means to proceed to Paris. There he found negotiations at an end. Knowing
no law, ‘moral or political,’ that prevented him from serving his country, he
had sought interviews with leading characters and found France anxious for
peace. Whereupon he had suggested the lifting of the embargo on American
shipping detained in French ports and the release of American sailors held
prisoners. He had not gone to Paris ‘at the direction or on the request or on
the advice of any person whatever.’ He went for his own pleasure, on his
own views, and at his own expense.[1646] Not only had the memorial Harper
had read to the house not been presented by him, it had not been written by
him, but by a good Federalist who was an intimate friend and correspondent
of Harrison Gray Otis, and he had refused the request to present it on the
ground of its ‘having too much the appearance of an official act.’[1647] The
absolute veracity of this story was known to Otis, who was intimate with
Harper, for he had a letter from Codman in verification, and to the effect that
Logan had told Talleyrand that in the event of war all parties in America
would rally around the Government ‘and oppose all its enemies.’[1648]
Thus there was a conspiracy, a peculiarly ugly conspiracy, of the war
hawks to ruin an honest, patriotic, if Quixotic man because of his
interference with their plans to manufacture a needless and therefore a
criminal war.
But there was a special reason for the war party’s rage over Logan. About
this time Elbridge Gerry, one of the three envoys, who had stayed over in
Paris on the invitation of Talleyrand, had returned with a similar story. The
Federalists had been outraged by his failure to leave with his colleagues, and
on his return to his home in Cambridge he found himself socially ostracized.
Adams, who was his friend, had severely condemned him for continuing his
conferences in Paris.[1649] So bitter was the feeling against him, that the war
party did not scruple to terrorize his family in his absence. His wife received
anonymous letters charging that a woman was responsible for his lingering
in Paris. With only women and children in his house, their nights were made
hideous with yells and bonfires under their windows; and one morning Mrs.
Gerry looked out of the window on a miniature guillotine smeared with
blood. On his return, Gerry had gone to Philadelphia and left his dispatches,
which Pickering had published with his intemperate comments. The
Federalists were well pleased with Pickering’s excoriation.
And Jefferson? So different was his conception of public opinion that he
was delighted. Seizing upon the Gerry correspondence as a complete answer
to the X Y Z papers, he wrote Edmund Pendleton that it was too voluminous
for the masses, and urging him to prepare ‘a capitulation ... stating
everything ... short, simple, and leveled to every capacity ... so concise, as,
omitting nothing material, may yet be printed in handbills, of which we
could print and disperse ten or twelve thousand copies under letter covers,
through all the United States by the members of Congress when they return
home.’[1650]
Meanwhile, Gerry had hastened to Quincy, and in the rambling frame
house of the President was going over the situation with him.
The restoration of peace with France would mean the end of the army
created with so much expense and trouble. So determined were the
Hamiltonians on war that they were ready to wreck the Federalist Party on
the issue. Many explanations have been offered. Wolcott had hinted in his
letter to Ames that an army was wanted for domestic use.[1651] That was the
common charge of the Democrats. That there was another and more
portentous reason we may be sure, albeit the public, and even John Adams,
was ignorant of it.
At that time a queer little Latin-American soldier of fortune, Francesco de
Miranda, was living in London, playing about Downing Street, and
conferring with Rufus King, the American Minister, who, next to Morris,
was the ablest of Hamilton’s lieutenants. There was a possibility that at any
time England might be forced to war on Spain should that country enter into
the struggle on the side of France. The United States was then engaged in a
quarrel with Spain. It was the idea of Miranda to enlist England and the
United States in a grand revolutionary scheme in South America. He had
discussed it with the British Ministers and with King, who was in
correspondence with Hamilton. It involved an alliance between the English-
speaking countries. This had been hinted at, as we have seen, long before, by
Hamilton in a letter to Pickering, who was in favor of entering into such an
alliance without delay. It was the plan of Miranda for England to furnish the
ships, not exceeding twenty, men and money; the United States to supply no
less than seven thousand soldiers, two thousand of these being cavalry. The
lure of Florida and Cuba was held out to the United States.[1652] Here was a
grand scheme of conquest that appealed irresistibly to Hamilton’s ambition
for military glory.[1653] Entirely unknown to Adams or Washington,
Hamilton had been in correspondence with the soldier of fortune, and in
communication with him through King who was managing the London end
of the affair. He made it plain to King that in the event of a successful issue
he would want the United States to be the principal agency. ‘The command
in this case would very naturally fall upon me, and I hope I should
disappoint no favorable anticipations,’ he wrote. He thought the country not
quite ripe for the enterprise, but ‘we ripen fast, and it may, I think, be rapidly
brought to maturity if an efficient negotiation for the purpose is at once set
on foot.’[1654] To Miranda he was writing that he would not embark in the
affair ‘unless patronized by the Government of this country.’ An army of
twelve thousand men was being raised. ‘General Washington has resumed
his station at the head of our armies, I am second in command.’[1655] In the
autumn of 1798, he was writing Senator Gunn on the importance of heavy
cannon for fortifications and mortars in the case of a siege. ‘If we engage in
war our game will be to attack where we can. France is not to be considered
as separated from her ally. Tempting objects will be within our grasp.’[1656]
In January, 1799, Hamilton was writing Otis in the same strain. ‘If universal
empire is still to be the pursuit of France, what can tend to defeat that
purpose better than to detach South America from Spain.... The Executive
ought to be put in a situation to embrace favorable conjunctures for effecting
that separation.’[1657] With all this Pickering was familiar and in sympathy,
but Adams was in total ignorance. In time the subject was cautiously
broached to him, to be rejected with the curt notation that we were not at war
with Spain. But the record is too clear to leave the South American project
out of consideration in seeking the reason for the intense desire for war—and
a large army. Through all this period, Hamilton had visions of himself on
horseback, at the head of troops in South America, with England as an ally.
[1658]
Never had Hamilton felt himself so near the top of the world. When
Congress met in the fall of 1798, he had a plan ready for a complete change
in the formation of the Nation. This provided for eighty United States
District Courts;[1659] the division of old States into new ones for any
territory having as many as 100,000 people on the request of any
considerable number—which would or could have made seven States out of
Virginia; and for the extension and more rigid enforcement of the Sedition
Law.
It was on this state of affairs that Adams, perplexed, harassed, worried by
the serious illness of Abigail, aching under the humiliations visited upon him
by the bosses of his party, meditated during the summer and early fall of
1798. And he thought seriously, too, on what Gerry had told him of the
temper of France.
VI
This had almost persuaded him that a new mission to France was feasible,
when a letter from Murray at The Hague, indicating uneasiness in Paris lest
the United States be forced into an alliance with England, convinced him.
Thus, about the middle of October, in a letter to Pickering, he submitted two
questions for the consideration of the Cabinet. ‘Should there be a declaration
of war?’ ‘Could proposals for further negotiations be made with safety, and
should a new envoy be named, prepared to sail on assurances that he would
be received?’
That letter fell like a bomb in the camp of the war conspirators. How
Pickering must have scowled, and McHenry grumbled, and Wolcott
shrugged his shoulders with a cynical grin when they sat down to meditate
on its meaning. That more important personages were informed we may be
sure. To that note, however, the Cabinet did not deign to reply. Had not
Adams declared that he would never send another envoy unless solemnly
assured that he would be received? No such assurance had come. Then why
discuss it—even on the request of the President? However, a Message would
have to be sent to Congress, and with Adams in a conciliatory frame of mind
it was imperative that something definite await him on his arrival. Thus the
conspirators sat down to the framing of a Message that would defeat the very
purpose the letter had indicated. Hamilton and Pinckney were summoned to
the conference. The result was a paragraph putting it squarely up to France
to take the initiative in the matter of a renewal of negotiations. Wolcott, who,
better than any of the others, could hide his treachery behind an ingratiating
urbanity, was put forward as the author. Reaching the capital, Adams
summoned his Cabinet to go over the Message. All went well until the
fateful paragraph was reached, and instantly the keen eye of the suspicious
old man caught its full significance. That, he would not accept, and an open
struggle began. With earnestness and even heat the obnoxious paragraph was
urged upon him, but Adams planted his feet and stood. He would rewrite
that paragraph to conform to his personal view of the proprieties.[1660]
The Cabinet conspirators retired with the realization that there were dark
days ahead. Adams in his substitute held forth the olive branch to the extent
of declaring that no new envoy would be sent unless assurances were
forthcoming that he would be properly received. Washington, Hamilton, and
Pinckney, in uniforms, sat in the chamber when the Message was read. Two
of these, at least, had grave forebodings. Then it was that the conspirators
determined to override Adams by meeting his plan for negotiations with an
immediate declaration of war. A caucus of the Federalists was called. The
most brilliant and fiery orators were primed for the occasion. The proposal
was made and supported with eloquence. The vote was taken, and by a small
majority Adams triumphed over his foes. This was the most significant
incident yet—it meant that Hamilton had lost control of the party councils.
[1661] With that knowledge, Pickering made no further attempt to conceal his
bitter hostility to his chief. Ordered to prepare a treaty that would be
acceptable, he ignored the request. Asked to moderate his report on the