Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Innovations in Cyber Physical Systems

Select Proceedings of ICICPS 2020 1st


Edition Jawar Singh
Visit to download the full and correct content document:
https://ebookmeta.com/product/innovations-in-cyber-physical-systems-select-proceed
ings-of-icicps-2020-1st-edition-jawar-singh/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advances in Civil Engineering: Select Proceedings of


ICACE 2020 1st Edition Scott Arthur

https://ebookmeta.com/product/advances-in-civil-engineering-
select-proceedings-of-icace-2020-1st-edition-scott-arthur/

Recent Advances in Artificial Intelligence and Data


Engineering: Select Proceedings of AIDE 2020 (Advances
in Intelligent Systems and Computing, 1386)

https://ebookmeta.com/product/recent-advances-in-artificial-
intelligence-and-data-engineering-select-proceedings-of-
aide-2020-advances-in-intelligent-systems-and-computing-1386/

Advances in Energy Technology Select Proceedings of


EMSME 2020 1st Edition Ramesh C. Bansal

https://ebookmeta.com/product/advances-in-energy-technology-
select-proceedings-of-emsme-2020-1st-edition-ramesh-c-bansal/

Recent Advances in Industrial Production Select


Proceedings of ICEM 2020 Rajeev Agrawal (Editor)

https://ebookmeta.com/product/recent-advances-in-industrial-
production-select-proceedings-of-icem-2020-rajeev-agrawal-editor/
Advances in Thermofluids and Renewable Energy Select
Proceedings of TFRE 2020 1st Edition Pinakeswar Mahanta

https://ebookmeta.com/product/advances-in-thermofluids-and-
renewable-energy-select-proceedings-of-tfre-2020-1st-edition-
pinakeswar-mahanta/

Security and Resilience of Cyber Physical Systems 1st


Edition Krishan Kumar

https://ebookmeta.com/product/security-and-resilience-of-cyber-
physical-systems-1st-edition-krishan-kumar/

Processing and Characterization of Materials Select


Proceedings of CPCM 2020 1st Edition Snehanshu Pal

https://ebookmeta.com/product/processing-and-characterization-of-
materials-select-proceedings-of-cpcm-2020-1st-edition-snehanshu-
pal/

Proceedings of International Conference on Innovations


in Information and Communication Technologies ICI2CT
2020 Lalit Garg Hemant Sharma S B Goyal Amarpreet Singh
Editors
https://ebookmeta.com/product/proceedings-of-international-
conference-on-innovations-in-information-and-communication-
technologies-ici2ct-2020-lalit-garg-hemant-sharma-s-b-goyal-
amarpreet-singh-editors/

Theoretical Computational and Experimental Solutions to


Thermo Fluid Systems Select Proceedings of ICITFES 2020
Lecture Notes in Mechanical Engineering Muthukumar
Palanisamy (Editor)
https://ebookmeta.com/product/theoretical-computational-and-
experimental-solutions-to-thermo-fluid-systems-select-
proceedings-of-icitfes-2020-lecture-notes-in-mechanical-
Lecture Notes in Electrical Engineering 788

Jawar Singh
Sudhir Kumar
Umakanta Choudhury Editors

Innovations
in Cyber
Physical
Systems
Select Proceedings of ICICPS 2020
Lecture Notes in Electrical Engineering

Volume 788

Series Editors

Leopoldo Angrisani, Department of Electrical and Information Technologies Engineering, University of Napoli
Federico II, Naples, Italy
Marco Arteaga, Departament de Control y Robótica, Universidad Nacional Autónoma de México, Coyoacán,
Mexico
Bijaya Ketan Panigrahi, Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, Delhi, India
Samarjit Chakraborty, Fakultät für Elektrotechnik und Informationstechnik, TU München, Munich, Germany
Jiming Chen, Zhejiang University, Hangzhou, Zhejiang, China
Shanben Chen, Materials Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
Tan Kay Chen, Department of Electrical and Computer Engineering, National University of Singapore,
Singapore, Singapore
Rüdiger Dillmann, Humanoids and Intelligent Systems Laboratory, Karlsruhe Institute for Technology,
Karlsruhe, Germany
Haibin Duan, Beijing University of Aeronautics and Astronautics, Beijing, China
Gianluigi Ferrari, Università di Parma, Parma, Italy
Manuel Ferre, Centre for Automation and Robotics CAR (UPM-CSIC), Universidad Politécnica de Madrid,
Madrid, Spain
Sandra Hirche, Department of Electrical Engineering and Information Science, Technische Universität
München, Munich, Germany
Faryar Jabbari, Department of Mechanical and Aerospace Engineering, University of California, Irvine, CA,
USA
Limin Jia, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland
Alaa Khamis, German University in Egypt El Tagamoa El Khames, New Cairo City, Egypt
Torsten Kroeger, Stanford University, Stanford, CA, USA
Yong Li, Hunan University, Changsha, Hunan, China
Qilian Liang, Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX, USA
Ferran Martín, Departament d’Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra,
Barcelona, Spain
Tan Cher Ming, College of Engineering, Nanyang Technological University, Singapore, Singapore
Wolfgang Minker, Institute of Information Technology, University of Ulm, Ulm, Germany
Pradeep Misra, Department of Electrical Engineering, Wright State University, Dayton, OH, USA
Sebastian Möller, Quality and Usability Laboratory, TU Berlin, Berlin, Germany
Subhas Mukhopadhyay, School of Engineering & Advanced Technology, Massey University, Palmerston
North, Manawatu-Wanganui, New Zealand
Cun-Zheng Ning, Electrical Engineering, Arizona State University, Tempe, AZ, USA
Toyoaki Nishida, Graduate School of Informatics, Kyoto University, Kyoto, Japan
Federica Pascucci, Dipartimento di Ingegneria, Università degli Studi “Roma Tre”, Rome, Italy
Yong Qin, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
Gan Woon Seng, School of Electrical & Electronic Engineering, Nanyang Technological University,
Singapore, Singapore
Joachim Speidel, Institute of Telecommunications, Universität Stuttgart, Stuttgart, Germany
Germano Veiga, Campus da FEUP, INESC Porto, Porto, Portugal
Haitao Wu, Academy of Opto-electronics, Chinese Academy of Sciences, Beijing, China
Walter Zamboni, DIEM - Università degli studi di Salerno, Fisciano, Salerno, Italy
Junjie James Zhang, Charlotte, NC, USA
The book series Lecture Notes in Electrical Engineering (LNEE) publishes the
latest developments in Electrical Engineering - quickly, informally and in high
quality. While original research reported in proceedings and monographs has
traditionally formed the core of LNEE, we also encourage authors to submit books
devoted to supporting student education and professional training in the various
fields and applications areas of electrical engineering. The series cover classical and
emerging topics concerning:
• Communication Engineering, Information Theory and Networks
• Electronics Engineering and Microelectronics
• Signal, Image and Speech Processing
• Wireless and Mobile Communication
• Circuits and Systems
• Energy Systems, Power Electronics and Electrical Machines
• Electro-optical Engineering
• Instrumentation Engineering
• Avionics Engineering
• Control Systems
• Internet-of-Things and Cybersecurity
• Biomedical Devices, MEMS and NEMS

For general information about this book series, comments or suggestions, please
contact leontina.dicecco@springer.com.
To submit a proposal or request further information, please contact the
Publishing Editor in your country:
China
Jasmine Dou, Editor (jasmine.dou@springer.com)
India, Japan, Rest of Asia
Swati Meherishi, Editorial Director (Swati.Meherishi@springer.com)
Southeast Asia, Australia, New Zealand
Ramesh Nath Premnath, Editor (ramesh.premnath@springernature.com)
USA, Canada:
Michael Luby, Senior Editor (michael.luby@springer.com)
All other Countries:
Leontina Di Cecco, Senior Editor (leontina.dicecco@springer.com)
** This series is indexed by EI Compendex and Scopus databases. **

More information about this series at http://www.springer.com/series/7818


Jawar Singh · Sudhir Kumar ·
Umakanta Choudhury
Editors

Innovations in Cyber
Physical Systems
Select Proceedings of ICICPS 2020
Editors
Jawar Singh Sudhir Kumar
Department of Electrical Engineering Department of Electrical Engineering
Indian Institute of Technology Patna Indian Institute of Technology Patna
Patna, India Patna, Bihar, India

Umakanta Choudhury
Department of Electrical and Electronics
Rajkumar Goel Institute of Technology
Ghaziabad, India

ISSN 1876-1100 ISSN 1876-1119 (electronic)


Lecture Notes in Electrical Engineering
ISBN 978-981-16-4148-0 ISBN 978-981-16-4149-7 (eBook)
https://doi.org/10.1007/978-981-16-4149-7

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

This book is a compilation of the accepted papers of International Conference on


Innovations in Cyber Physical Systems (ICICPS 2020), held at HMR Institute of
Technology and Management, New Delhi, India, during October 22–23, 2020.
The growing integration of cyber (computing and communication) and physical
(sensing and actuation) components has paved the way for the creation of sophisti-
cated designed systems. These technologies (also known as Cyber Physical Systems
or CPS) have enabled a wide range of applications such as smart power grids, self-
driving cars, telehealth and smart cities. Advances in CPS will offer new capabilities,
as well as greater adaptability, scalability and usability, considerably exceeding what
is currently available in embedded systems. The major goal of the book is to provide
latest research findings on fundamental tools, applications, systems, test-beds and
field deployments of Cyber Physical Systems.
Industry 4.0 will continue to be an intrinsic element of many technolog-
ical, managerial and business practices. ICICPS 2020 was organized to stimulate
researchers, academicians and students towards it. The papers were selected after
careful examination by the Technical Programme Committee after obtaining the
views of the reviewers. The technical programme committee, reviewers, general
chair, programme chair, data presenter, proof readers and designers, all of them
contributed significantly in publishing the research findings in a single document for
ICICPS 2020 post proceeding book.
The editors would like to offer their heartful gratitude to all members of the ICICPS
2020 committee for their tremendous effort. Finally, the editors would really like to
thank all of the authors for his or her contribution to this book.

Patna, India Prof. Jawar Singh


Patna, India Prof. Sudhir Kumar
Ghaziabad, India Prof. Umakanta Choudhury

v
Acknowledgements

This book is the result of papers presented at the International Conference on Inno-
vations in Cyber Physical Systems (ICICPS 2020), which took place during October
22–23, 2020, at HMR Institute of Technology and Management, New Delhi, India.
On behalf of the editors of this Conference, we desire to thank the keynote speakers
and the reviewers for their time, hard work and dedication to this Conference. Without
their services, the editors could not maintain the standards in the field of cyber
physical systems.
Our sincere thanks to Publication partner—Springer Nature, Collaborators—
International Association of Professional & Fellow Engineering, Delaware, USA,
and Indo-UK Confederation of Science, Technology & Research Ltd., London, for
acknowledging the significance of this conference to explore the possible areas of
interdisciplinary research in the field of Cyber Physical Systems.
We express our sincere gratitude to General Chair Prof. B. K. Panigrahi, IIT Delhi,
and Programme Chair Prof. M. P. S. Bhatia, NSUT, Delhi, for their motivation and
support in hosting ICICPS 2020. We express our sincere gratitude to the management
of HMR Institute of Technology and Management, New Delhi, India, for their kind
support and motivation.
We would like to thank Mr. Md. Ehsan Asgar for assisting to give shape to the
presented papers in the form of a book. Last but not the least, we are thankful to the
authors for their timely submission of the manuscripts.
Corresponding Editor
Dr. Umakanta Choudhury
RKGIT, Ghaziabad, India

vii
Contents

Cyber Physical System of Smart Three-Phase Induction Motor


and Its Security Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Kundankumar Rameshwar Saraf and P. Malathi
Conventional and Fuzzy Proportional Integral (PI) Speed
Controller of Induction Motor Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
S. Madunisha, P. R. Dharshani, M. J. Archana, R. Saranraj,
and P. Parthasarathy
Privacy Protection of Biometric Templates Using Deep Learning . . . . . . . 19
Shefali Arora, M. P. S. Bhatia, Harshita Kukreja, and Soumya Jain
A Comparative Analysis of Clustering and Biclustering Algorithms
in Gene Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Diksha Mehta, Shriya Sehgal, Tanupriya Choudhury, and Tanmay Sarkar
Fuzzy Logic Method Based MPPT Controller for Solar Energy
Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Sunny Deol, Shrawan Ram Patel, and Tanupriya Choudhury
A Proposed Approach to DDoS Attacks Detection on SDN Using
Machine Learning Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Saumitra Chattopadhyay and Ashok Kumar Sahoo
Model Analysis of Collaborative-Based Recommender System . . . . . . . . . 69
Tanuj Pawar, Vaishali Sharma, Parul Kalra, and Deepti Mehrotra
Low-Cost Obstacle Detection and Avoidance Robots with Swarm
Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Abhijit Das, Divesh Pandey, Aman Sharma, Nitish Jha,
Anurag Pandey, and Uma Gautam
Quality Evaluation of Fitness Centres Using Gap Analysis . . . . . . . . . . . . . 95
Pushpendra Neniwal and Vikas Kapoor

ix
x Contents

Load Balancing Issues in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 105


Priyanka Agrawal, Subhash Chand Gupta, and Tanupriya Choudhury
Design of Smart Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
A. Hameedhul Arshadh, I. Dinesh, S. Ganesan, and J. Friska
Smart Villages: Application of Internet-of-Things
in the Development of Rural India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Bushra Sabir, Arsalan Hameed, Mohd Faizan, Vibhav Kumar Rawat,
and Mohd Tariq
Online Resale Bike Price Prediction in Indian Market . . . . . . . . . . . . . . . . 157
Bhagirath, Neetu Mittal, and Sushil Kumar
COVID-Based Edge-Drone Application Approach . . . . . . . . . . . . . . . . . . . . 169
Ramneek Kalra and Vanshdeep Sahni
Challenges and Future Directions for Privacy Dashboard Design
of Electronic Health Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Param Batavia, Purnima Ahirao, and Deepti Patole
A Novel Approach for Morphological Analysis and Inflections
Based on POS Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Kanu Goel
Forecasting Cryptocurrency Time Series Using Adaboost-Based
Ensemble Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Haritima Manchanda and Swati Aggarwal
A Fingerprint Recognition System Using Raspberry Pi . . . . . . . . . . . . . . . . 221
Brajesh Singh, Urvashi Dhand, Paras Bhardwaj, Supriya Mishra,
and Gaurav Arora
Impact of Underlap/Overlap of Germanium Source Dopingless
Tunnel Field Effect Transistor (Ge-S-DLTFET) . . . . . . . . . . . . . . . . . . . . . . 231
Kumari Nibha Priyadarshani and Sangeeta Singh
Meddoc Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Akshay Kumar Goel, Jayesh Gaur, Ajay Rose, and Deepika Rawat
Weather Monitoring System Using IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Tanya Singh and Mohammed Asim
Optimal Bayesian Estimation Framework for Reduction of Speckle
Noise from Breast Ultrasound Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Pradeep Kumar, Subodh Srivastava, Y. Padma Sai, and Santosh Choudhary
Morphological Transformation in Color Space-Based Edge
Detection of Skin Lesion Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Sudhriti Sengupta, Neetu Mittal, and Megha Modi
Contents xi

A Review on 6th Generation Wireless Communication Networks


Based on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Zerksis Mistry, Alok Kumar Yadav, and Mayank Kothari
Background Object Removal and Image Inpainting to Fill
Irregular Holes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Ayan J. Malhotra, Ashish Chopra, Rajan Dahiya, Pratik Yadav,
and Aryan Singhal
Exploration of Crime Detection Using Deep Learning . . . . . . . . . . . . . . . . . 297
Shruti Bhalla and Rajesh Kumar Singh
Smart Web Investigation Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Gundavarapu Mallikarjuna Rao, B. Ramakrishna Reddy, and Peesapati Vishnu
Detection of Driver Distraction Using Convolutional Neural
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
R. Sumalatha, Ch. Sravani, and M. Supriya
NDN Content Poisoning Attack Mitigation Using Fuzzy-Reputation
Based Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Vishwa Pratap Singh and R. L. Ujjwal
PID Controller Design for Continuous Stirred Tank Reactor
(CSTR) Temperature Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Bhumica Dutta and Vijay Kumar Tayal
SPSS Analysis and Performance Evaluation of Health Clubs . . . . . . . . . . 349
Pushpendra Neniwal and Vikas Kapoor
A Comprehensive Effectual Load-Balancing Method in Cloud
Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Sandeep Srivastava, Vivek Kumar Sharma, Rajeev Sharma,
Bhupesh Kumar Singh, Jitendra Nath Singh, and Tanupriya Choudhury
Code Smell Refactoring for Energy Optimization of Android Apps . . . . . 371
Reeshti, Rajni Sehgal, Deepti Mehrotra, Renuka Nagpal,
and Tanupriya Choudhury
Human Detecting Sensors and End-To-End Security Model
for Design and Manufacturing of IoT-Based Disinfectant Sanitizer
Tunnel: An Innovation Against Covid-19 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Ramesh Chandra Panda, Rajdeep Chakraborty, Tanupriya Choudhury,
K. E. Mathivanan, and Sudeshna Chakraborty
Four-Factor Authentication with Emerging Cybersecurity
for Mobile Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Sanyam Jain, Raju Gautam, Shivani Sharma, Ravi Tomar,
and Tanupriya Choudhury
xii Contents

FPGA Implementation of Image Processing Filters using IoT . . . . . . . . . . 401


Ajay Rupani, Sayamuddin Ahmed Jilani, F. H. A. Shibly,
and Tanupriya Choudhury
An Overview on State-of-Art in Mid-Air Writing and Recognition
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Aradhana Kumari Singh, Lalit Kane, Abhirup Khanna,
and Tanupriya Choudhury
Global Skew Detection and Correction of Document Image Based
on Least Square Method and Extensive Connected Component
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Faisal Imran, Md. Ali Hossain, Md. Al Mamun,
Bhupesh Kumar Singh, and Tanupriya Choudhury
Improved Pattern of Adaptive Rood-Pattern Search Algorithm
for Motion Estimation in Video Compression . . . . . . . . . . . . . . . . . . . . . . . . 441
Rahul Reddy Nadikattu, Rahul Bhandari, and Pawan Whig
Modelling and Simulation of Distance Relays with Auto-Recloser
Function Using PSCAD: An Active Learning Tool . . . . . . . . . . . . . . . . . . . . 449
Anupama Prakash, Pallavi Choudekar, and Nasir ul Islam Wani
Resume Data Extraction Using NLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Umang Goyal, Anirudh Negi, Aman Adhikari, Subhash Chand Gupta,
and Tanupriya Choudhury
A Comprehensive Study on Transparent Antennas for Wireless
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Ajay Kumar Gangwar
IoT-Based Framework for Real-Time Heart Disease Prediction
Using Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Siddhant Salvi, Ritwik Dhar, and Sunil Karamchandani
Efficiency Enhancement in a Piezoelectric Energy Harvester
for a Low-Frequency System Using Synchronous Charge Inversion . . . . 497
Parul Chaudhary and Puneet Azad
Identifying Indicators of Sustainable Smart Agriculture Driven
by Big Data Using Modified Total Interpretive Structural Modeling
(mTISM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Nikhil Dogra and Mohd. Adil
Comparative Investigation of Machine Learning Algorithms
for Wind Power Forecasting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Ayush Kumar, Neeraj Kumar, Bharat Singh, Aditya Chaudhary,
Karan Dikshit, and Akash Sharma
Contents xiii

Voltage Conditioning and Harmonic Mitigation Using UPQC:


A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Manish Kumar Singh and Vivek Saxena
Multi Linear Regression Model to Detect Distributed Denial
of Service Attacks in Cloud Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Swathi Sambangi and Lakshmeeswari Gondi
Credit Card Fraud Detection Using Machine Learning Algorithms . . . . . 547
Mudita Sharma, Harshita Sharma, Pawan Bhutani, and Ira Sharma
Identification of Parameters for Noise Pollution Based Electrical
Energy Converter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
Arunesh Kumar Singh, Shahida Khatoon, and Kriti
Reconfiguration of Micro-grid for Future Forecasting to Maintain
High Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Shivani Mishra and R. K. Viral
Wireless Sensor Network in Agriculture: Needs, Challenges
and Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Neha Gupta, Preeti Singh, and Pardeep Kaur
Spin Device-Based Self-Calibrated Comparator . . . . . . . . . . . . . . . . . . . . . . 595
Yogendra Kumar Upadhyaya and Ajay Kumar Kushwaha
Performance Analysis of Graphene-Based Field-Effect Transistors
in Ternary Logic: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Badugu Divya Madhuri and S. Sunithamani
Automated Optimization Strategy and Usage of RoBERTa
for Humor Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
P. Hemant, Pramod Kumar, and C. R. Nirmala
Chaos-Based Image Encipherment Techniques: Analysis
and Comparative Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Ashish Kumar and N. S. Raghava
Review of Recent Trends in Additive Manufacturing . . . . . . . . . . . . . . . . . . 641
Meena Pant, Leeladhar Nagdeve, V. C. Pandey, and Harish Kumar
Performance Analysis of Time Equivalent Space Vector Pulse
Width Modulation Scheme for Three-Phase VSI at Inductive Load . . . . . 651
Shailesh Kumar Gupta, Mohd. Arif Khan, and D. K. Chauhan
A Comprehensive Review on Active and Reactive Power Control
of Grid Connected Converters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Arunesh Kumar Singh, Abhinav Saxena, Imran Ahmad,
and Umakanta Choudhury
xiv Contents

An Energy Management System for Microgrid Resilience


Improvement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Raj Kumar Yadav and Dipti Saxena
A General Review of the Recently Proposed Asymmetrical
Multilevel Inverter Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Bilal Alam, Maaz Nusrat, Zeeshan Sarwer, Mohammad Zaid, and Adil Sarwar
Health Monitoring System Using IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Prateek Sharma, Prajjwal Soam, and Neeraj Joshi
A Compact Dual Rectangular Slot Monopole Antenna
for WLAN/WiMAX Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Chandan, R. K. Ratnesh, and Amit Kumar
A Low-Profile Three-Stub Multiband Antenna for 5.2/6/8.2 GHz
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Sparsh Singhal, Pranjal Sharma, and Chandan
A Review on Renewable Energy System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Shraddha Sharma
Low-Profile H Slot Multiband Antenna for WLAN/Wi-MAX
Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Siddharth Vashisth, Sparsh Singhal, and Chandan
Dual Circular-Inverted L Planar Patch Antenna for Different
Wireless Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Shivam Choudhary, Yash Sharma, Shubham Kumar, Shivam, and Chandan
Effective Application and Sustainability of Lean Six Sigma
to Improve Process Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Md. Ehsan Asgar, Rajeev Ranjan, Shrey Atre, Rahul Bhandari, and Saba Zaidi
Determination of Apple, Lemon, and Banana Ripening Stages
Using Electronic Nose and Image Processing . . . . . . . . . . . . . . . . . . . . . . . . . 755
S. Suthagar, K. S. Tamilselvan, M. Priyadharshini, and B. Nihila
Material Selection and Analysis of Bicycle Frame . . . . . . . . . . . . . . . . . . . . . 771
Sourav, Ankit Sharma, and Mrinal Pandey
Wheel Robot Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Vibha Burman and Ravinder Kumar
Aperture-Coupled Rectangular Dielectric Resonator Antenna
for Multiband Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Sachin Kumar Yadav, Amanpreet Kaur, and Rajesh Khanna
Design and Fabrication of Electric Unicycle . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Mohan Kumar, Yogesh Kumar, Thiruveedi Rahul, Ramit Dhingra,
and Parul Sharma
About the Editors

Jawar Singh is currently an Associate Professor in the Department of Electrical


Engineering, Indian Institute of Technology, Patna, Bihar, India. He received his
PhD degree from the Department of Computer Science and Engineering, Univer-
sity of Bristol, UK. He obtained his MTech degree from the Department of Elec-
trical Engineering, IIT Roorkee, India. His research interests include low-power
integrated circuits, embedded systems and RF energy harvesting. Dr. Singh holds
two US patents related to computer memories and is the recipient of the presti-
gious Indo-US fellowship BHAVAN 2016. Dr. Singh has 35 international journal
publications, 40 conference publications, two book chapters and one full book from
Springer. He was the visiting researcher at the Pennsylvania State University, USA,
2009, and the University of North Texas, USA, 2016, each for 6 months. Dr Singh
is a Senior Member IEEE, Associate Editor of IET Electronics Letters, Associate
Editor of IETE Technical Review, and IEEE VLSI Circuits and Systems Letters. Dr.
Singh has supervised 4 PhDs and 21 MTech dissertations, and 7 PhDs are ongoing.

Sudhir Kumar received his PhD degree from the Department of Electrical Engi-
neering, Indian Institute of Technology Kanpur, India, in 2015. He is currently an
Assistant Professor with the Department of Electrical Engineering, Indian Institute of
Technology, Patna, India. He has worked as a Scientist with TCS Research, Kolkata,
India, and is an Erasmus Mundus Fellow with the Department of Computer Science,
University of Oxford, U.K. He published more than 45 research articles in pres-
tigious journals and conference proceedings. His broad research interests include
wireless sensor networks and Internet of Things. Dr. Kumar is a recipient of several
awards and fellowships. He has guided several BTech. and MTech. projects which
won national awards as well.

Umakanta Choudhury has been working as Professor and Head of the Depart-
ment Electrical & Electronics Engineering (EEE) at Rajkumar Goel Institute of
Technology. Before this, Dr. Choudhury worked as a Professor and Head of EEE
Department at HMR Institute of Technology, Delhi, India. He is an educationalist
as well as an administrator with 22 years of teaching along with industrial expe-
rience. He worked at various level in reputed Institutes like Galgotias College of
xv
xvi About the Editors

Engineering, Ansal University, Pusa Institute (Under Govt. of Delhi), etc. He had
worked as Director of Delhi Technical Campus, affiliated to GGSIP University,
Delhi. He graduated in Electrical Engineering from University College of Engi-
neering (presently (VSSUT), Odisha), and post-graduated from Delhi College of
Engineering, Delhi, and got his PhD from Jamia Millia Islamia (Central Univer-
sity), Delhi. He published several papers in national and international journals. His
research interest areas are application of artificial intelligence techniques to power
systems, power system stability and active filters. He has guided many undergraduate
projects and is currently guiding PhD scholars also.
Cyber Physical System of Smart
Three-Phase Induction Motor and Its
Security Measures

Kundankumar Rameshwar Saraf and P. Malathi

Abstract Three-phase induction motor is widely used in industry due to its rugged-
ness, reliability, efficiency, and less cost and small maintenance feature. This motor
can be affected by various electrical, mechanical, and environmental faults. This fault
causes performance degradation, unexpected heating, direction reversal, heavy shock
problem in the motor. This research presents the Cyber Physical System of smart
three-phase induction motor to detect certain faults and operate the safe switching
of motor on occurrence of fault. This system automatically detects the temperature,
vibration, humidity, and imaginary input voltage. Various sensors are connected in
the vicinity of motor to detect these parameter changes. This system can be controlled
by SMS and by accessing the webpage over a remote location through the Iinternet. If
any of these parameter goes beyond the predefined limits, it will immediately switch
OFF the three-phase induction motor. This system will then send the reason of turn
OFF to the user by SMS. When the disturbed parameter achieves its specified accept-
able range the three-phase induction motor will be restarted immediately. User can
also perform the switching operation of three-phase induction motor using internet
over a remote location. This research also discovers the possible security threats on
each layer of this system. The security measures to overcome all these threats are
presented in detail.

Keywords Application control layer · Aware execution layer · Data transport


layer · SMS · Wi-Fi

K. R. Saraf (B)
Ph.D. Research Scholar, Department of Electronics and Telecommunication Engineering, D.Y.
Patil College of Engineering, AkurdiPune, Maharashtra 411 018, India
P. Malathi
Head of Electronics and Telecommunication Engineering Department, D.Y. Patil College of
Engineering, AkurdiPune, Maharashtra 411 018, India
e-mail: viceprincipal@dypcoeakurdi.ac.in

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 1
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_1
2 K. R. Saraf and P. Malathi

1 Introduction

Cyber Physical Systems (CPS) monitors the behavior of physical processes and
generates the required actuating actions in order to execute the application correctly.
CPS consists of physical components such as sensors, actuators, RFID Tags, etc.
Aware execution layer contains all these components [1]. These components can
communicate with each other through the Internet. Data transport layer allows
the communication between these components. To control the behavior of these
components, application control layer generates the commands.

1.1 Smart Three-Phase Induction Motor

Three-phase induction motor has high ruggedness, reliability, efficiency, and less
cost and maintenance. Due to these features, this motor widely used in industry [2].
During the operation of this motor, various faults can be encountered. It may include
electrical faults such as over and under voltage, over loading, single phasing, phase
reversing, etc. This motor can be susceptible to mechanical faults such as rotor or
stator winding failure; bearing fault, etc. The external fault can occur in motor such
as over vibration, external moisture, over or under temperature, drastic humidity
change. All these faults may affect the performance of three-phase induction motor
[3]. It may cause a fire in the motor. It may also cause the temporary or permanent
failure of operation. Hence, to overcome these faults, it is better to design a smart
three-phase induction motor that has various sensors to detect these parameters and
switch OFF the induction motor on the occurrence of a fault.
This paper presents the Cyber Physical System of the Smart Three Phase Induction
motor. This system is controlled by PIC 18 F452 microcontroller. This system can
detect multiple faults in the motor.

1.2 Block Diagram of Smart Three Phase Induction Motor

As shown in Fig. 1, the three-phase induction motor is connected with three-phase


relays. These three-phase relays are controlled by a PIC microcontroller. This system
has two supplies in which a single-phase supply controls the operation PIC micro-
controller, GSM modem, and sensors. Three-phase supply is connected to three-
phase induction motor. The 5 V constant D.C. power supply is provided to the PIC
microcontroller and ESP 8266 Wi-Fi controller. This can be implemented using a
single-phase A.C. supply, step down transformer, bridge rectifier, filter capacitor, and
LM7805 regulator. Microcontroller is further interfaced with 16 * 2 LCD display,
GSM modem SIM 800, temperature sensor LM 35, vibration sensor ADXL 335,
Cyber Physical System of Smart Three-Phase Induction Motor … 3

12 V Step Down Bridge 100 μF LM7805 Voltage


1Φ AC Transformer Rectifier Filter Regulator
Supply Capacitor

ESP8266
Wi-Fi
Tempt. Micro
Sensor controller

PIC 18 F452 16*2 LCD


Three 3Φ Micro
Display
Vibration
Phase Induction Sensor controller
Relays
Motor
GSM
modem
SIM 800
3Φ Humidity
supply Sensor
Rheostat

Fig. 1 Block diagram of cyber physical system of smart three-phase induction motor

humidity sensor SY HS 230. ESP 8266 Wi-Fi controller is connected with a PIC
microcontroller to control the motor operation through the Internet.

1.3 Operation of System

This system can be operated in two ways: either by SMS or by the Internet. This
system has a toggle switch by which it is operated in two modes of operation. Initially,
user can select the mode GSM module. To turn OFF the motor user can send SMS
2# to the GSM module. After safe starting of motor, user can change the position
of the toggle switch to move into mode 2. In this mode, motor can be started and
stopped through the Internet over a remote location as shown in Fig. 2. In this
mode, all microcontroller detects physical fitness of motor. For measuring this fitness,
temperature sensor LM35 detects the temperature near the motor. Vibration sensor
ADXL335 detects the vibrations of the motor. Humidity sensor SY HS 230 detects
the humidity near the motor. Rheostat is connected to a PIC microcontroller to change
the imaginary voltage of motor. In actual environment, motor voltage can only be
changed by changing the voltage of each phase of three-phase supply. This will
increase the cost and size of this system. Hence in this system, only virtual voltage
change is considered to show over voltage and under voltage fault in the motor.
The top view of the proposed Cyber Physical System is shown in Fig. 3. This
figure shows the fault-free condition of this Cyber Physical System. In this condition
the temperature, humidity, and imaginary voltage are measured by sensors and shown
on LCD display, webpage www.threephaseinductionmotorcps.in.
4 K. R. Saraf and P. Malathi

Fig. 2 CPS control through internet

Fig. 3 Normal condition of the system in the second mode

The 3 induction motor will automatically turn OFF when temperature, vibra-
tion, humidity, and imaginary voltage go beyond the predefined limit. GSM modem
SIM800 sends SMS to the user in following cases,
(1) If the temperature goes below 5 °C and above 55 °C the temperature sensor
LM35 will detect the under temperature and over-temperature condition and it
will send the response to the PIC microcontroller. Figure 4 shows the condition
of over temperature.
The SMS received by user in this condition is shown in Fig. 5.
(2) In case of over vibration of motor vibration, sensor ADXL 335 will detect it
and send the response to the PIC microcontroller. Figure 6, shows the condition
Cyber Physical System of Smart Three-Phase Induction Motor … 5

Fig. 4 Condition of motor off due to over temperature

Fig. 5 SMS received by the user in case of over temperature

of over vibration.
The SMS received by the user in over vibration fault is shown in Fig. 7.
(3) In a similar manner the condition of under temperature, under humidity,
over humidity, under voltage, and over voltage occurs, if the value of these
parameters near the motor goes beyond the acceptable limits.
The user-defined acceptable ranges of input voltage, vibration, temperature,
and humidity are shown in Table 1. In each case, motor will send the SMS of
turn OFF condition to the user. When the parameter arrives, its optimum value
motor will automatically turn ON and send SMS of motor ON condition to the
user. The range of various parameters in this system are given in Table 1.
6 K. R. Saraf and P. Malathi

Fig. 6 Condition of Motor OFF due to over vibration

Fig. 7 SMS received by user in case of over vibration

Table 1 Range of various parameters


Sr. no Name of parameter Maximum acceptable value Minimum acceptable value
1 Input voltage 239 V 161 V
2 Vibration 29º angle –
3 Temperature 5º Celsius 50 °C
4 Humidity 2º Celsius 60 °C
Cyber Physical System of Smart Three-Phase Induction Motor … 7

2 Three Tier Architecture of CPS

Cyber Physical System has three tiers of architecture which includes the following
layers [4]. Figure 8 shows three-tier architecture of CPS.
Aware execution layer: This layer contains all types of physical equipment
including RFID tags and readers, actuators, and sensors. This layer is responsible
for access perception to the physical data environment. It also implements control
commands of the system. In this system, aware execution layer will contain three
sensors such as temperature sensor LM35, vibration sensor ADXL 335, humidity
sensor SY HS 230, and one rheostat.
Data transport layer: This layer performs information exchange and real-time
communication through the Internet. It uses the Internet of private network, local
area network, or communication network. It can also use other data transmission and
interaction networks for communication. It has massive information processing and
management ability. In this system, instead of the Internet wired connection of sensors
with PIC controller is used to transmit the sensing signal to PIC microcontroller.
Application control layer: This layer receives information from the data transport
layer. It generates control commands based on preset rules and judgment of control
semantics. This layer also provides feedbacks in the form of control commands to the

•The sensors of proposed system


•Security Threats - Affected by DoS attack, physical attack, line
Aware fault, electromagnetic leakage and interference etc.
Execution •Security Measures - Biometrics technology privacy protection
Layer technology, near field communication technology, secure
routing technology, safety data fusion technology and secure
positioning technology

• The internet of proposed system


• Security Threats - Affected by DoS attack, black hole attack,
Data Tranport
wormhole attack, sybil attack etc.
Layer
• Security Measures - Point to point and end to end encryption
mechanism

• It takes information from data transport layer.


• It generate and implement the control command. This will
control the proposed CPS.
Application • Security Threats - Affected by DDoS attack, user privacy
Control Layer leakage, unauthorised access, malicious code injection
• Security Measures - Enhancement in system access control
policy, encryption and authentication mechanism, network
forensic

Fig. 8 Security threats and security measures of three-tier architecture of CPS


8 K. R. Saraf and P. Malathi

physical unit through the data transport layer. This layer combines the Cyber Physical
System with industrial applications. It is used to generate intelligent solutions such as
smart transport, smart grid smart agriculture, etc. In this system, control commands
to switch the motor ON and OFF are provided by the PIC microcontroller through
three-phase relays connected with three-phase induction motor.
The details of all the attacks mentioned in Fig. 8 are given below,
Physical attacks: In this attack, the attacker causes any physical damage to CPS.
For example, if in proposed physical damage to any sensor will stop the sensing of
the corresponding physical parameter.
Equipment failure: It results in abnormal behavior of equipment due to external
unaware force or unexpected environmental conditions or aging effect. It also
partially or fully reduces the performance of equipment.
Line fault: It occurs due to the short circuit connection of conductors.
Electromagnetic Leakage: It creates electromagnetic signal radiation through
physical equipment, ground, signal lines, or power lines.
Electromagnetic interference: This attack causes disturbance in communication
due to electromagnetic signals.
Denial of service attacks: By this attack network bandwidth is highly consumed
by an attacker. Target system flooded by fake requests and it declines to provide its
services.
Routing attacks: In this attack, attacker sends fake routing information to forging
the routing process. This attack produces wrong routing interference.
Aggregation node attacks: Attack on this core node of data transmission can
create a threat to the confidentiality of data.
Direction misleading attacks: Packet received by malicious node changes source
and destination address of the packet. Due to these packets delivers to the wrong path
which results in network routing confusion.
Blackhole attack: In this attack, the attacker creates a fake channel to receive the
routed packet.
Trap doors: In any network, trap door is a secrete way of gaining access by
exploiting its vulnerabilities or any loopholes in a network. Attackers can perform
the attack using such trap doors.
Sybil attack: In this attack malicious node appears as a multiple node. This will
damage the system network.
Wormhole attack: In this attack, multiple malicious nodes are used for data
tapping. Data transmission can also be blocked by this attack. Leakage of user
privacy: The privacy collector in this layer collects various private data of the
user to provide optimum performance. This data leakage will lead to attack on
confidentiality.
Unauthorized access: In this attack, attacker gains unauthorized access to the
network which leads to private data loss.
Malicious code: Unnecessary code in the system which creates a reverse
connection to the malicious server causes loss of user’s private data.
Flood attacks or Distributed Denial of Service: In this attack, multiple compro-
mised systems are used to attack the target by flooding it with false requests.
Cyber Physical System of Smart Three-Phase Induction Motor … 9

These will create a denial of service for genuine requests. It blocks normal network
communication.
The control command forged attack: Attacker generates the false control
command in the application control layer. This command will provide complete
system access to the attacker and performs the breaching of data.

3 Conclusion

This research creates a CPS of smart three-phase induction motor. This system
detects various physical faults and performs the switching of the motor accordingly.
This system also protects the CPS against various possible threats. This system is
surrounded by various sensors such as temperature sensor to measure the temperature
of three-phase induction motor, humidity sensor to measure the humidity near the
motor, vibration sensor to detect the over vibration of the motor. Imaginary voltage
switch (rheostat) is placed in this system. The maximum and minimum acceptable
limits of all the parameters are predefined for this system. This motor can be operated
using the Internet or through SMS. Once the limit of any parameter crosses above or
below the acceptable value, this system will automatically turn OFF and the corre-
sponding SMS is sent to its user. This SMS will explain the reason of turn OFF the
system. Once the disturbed parameter reaches its acceptable limit, the system will
automatically turn ON. This motor will automatically perform the switching based
on varying environment and physical conditions. Also, this system sends the corre-
sponding SMS to the user using a GSM modem. Users can also control this system
through the Internet over a remote location. In the later part of the paper three-tier
architecture of Cyber Physical System along with all possible threats to each layer
are described. This paper also describes security measures to prevent or overcome
all these threats.

4 Future Scope

This research considers only environmental faults and vibration faults in three-phase
induction motor. The improved system can be designed to detect and overcome the
other electrical and mechanical faults in this motor. It will improve the performance
of the motor and reduces the heating and direction reversal problems.
10 K. R. Saraf and P. Malathi

References

1. CPS Steering Group (2008) Cyber-physical systems executive summary. http://precise.seas.


upenn.edu/events/iccps11/doc/CPS-Executive-Summary.pdf.
2. Kazemzadeh E, Banadkooki MZ (2015) Smart starting of induction motor by changing core
magnetic flux value. In: 2015 30th international power system conference (PSC). IEEE, pp
203–209
3. Shnibha, R. A., and A. S. Albarabar, “Smart technique for induction motors diagnosis by moni-
toring the power factor using only the measured current”, In Journal of Physics: Conference
Series, vol. 364, no. 1, p. 012062. IOP Publishing, 2012.
4. Zhang L, Qing W, Bin T (2013) Security threats and measures for the cyber-physical systems.
J. China Univ Posts Telecommun 20(2013):25–29
5. Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M (2017) Security and privacy
in cyber-physical systems: a survey of surveys. IEEE Design Test 34(4):7–17
6. Fink GA, Edgar TW, Rice TR, MacDonald DG, Crawford CE (2017) Security and privacy in
cyber-physical systems. In: Cyber-physical systems. Academic Press, pp 129–141
7. Sakr YS (2015) Security and privacy in cyber-physical systems: physical attacks and
countermeasures, PhD diss., UCLA
8. Ahmad I, Zarrar MK, Saeed T, Rehman S (2018) Security aspects of cyber physical systems. In:
2018 1st international conference on computer applications and information security (ICCAIS).
IEEE, pp 1–6
9. Chelliah BJ, Ajith AP, Samtani CG, Paul D, Bachhav C (2019) Security implications in cyber
physical systems. Int J Innovat Technol Explor Eng (IJITEE). 8(6S). ISSN: 2278–3075
10. Lu T, Zhao J, Zhao L, Li Y, Zhang X (2015) Towards a framework for assuring cyber physical
system security. Int J Secur Appl 9(3):25–40
Conventional and Fuzzy Proportional
Integral (PI) Speed Controller
of Induction Motor Drive

S. Madunisha, P. R. Dharshani, M. J. Archana, R. Saranraj,


and P. Parthasarathy

Abstract Electrical drives assume a significant job in quickly developing in the


modern time, and speed control of drive is additionally significant. Speed varying
drives were a significant piece of intensity framework, microelectronic, power plant,
etc. Ordinary controlling strategies for electrical drives required scientific formulae
of the process which was exceptionally monotonous, that fathomed by man-made
consciousness which consists of hard and delicate calculation. Man-made conscious-
ness has discovered huge application in most practical frameworks (i.e., motor drive).
As no scientific framework is required for fake astute framework, productivity and
unwavering quality of drives increment, cost and weight of drives decline. Soft
starting devices are generally utilized with the electronic engine, gives better working
attributes, and improved control. Delicate starters additionally diminishes mileage
impacts on the engine and their related drive frameworks which thusly lessen upkeep,
preserve vitality, and have a huge influence in improving framework execution so the
lifts, siphons, lifts, and transport lines can be worked all the more adequately with a
delicate starter.

Keywords PI controller · Induction Motor · Fuzzy sets

1 Introduction

The profitability of assembling industry, advancement in processing plant roboti-


zation are required to improve due to scientific technology development. In the
assembling process, variable speed drives assume a significant job and possess a
significant part as far as transport lines, and fiber handling units. In earlier days, DC
motors are used but now AC motors are used as they are less expensive profoundly
decreased size, and improved unwavering quality than DC drives. DC drives can be
structured according to the application required with the wide assortment of AC-DC

S. Madunisha · P. R. Dharshani · M. J. Archana · R. Saranraj (B)


K. Ramakrishnan College of Engineering, Samayapuram, Tamilnadu, India
P. Parthasarathy
V.S.B. Engineering College, Karur, Tamilnadu, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 11
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_2
12 S. Madunisha et al.

converter accessible, anyway, enlistment engine drives have been demonstrated to


be in excess of a counterpart for DC drives in superior applications. Typically, these
motors are fixed speed drives, yet there are two techniques to change the turn speed
of AC motors. The first is to utilize a frequency change converter to change the speed
and the second is by utilizing separate windings for various paces. Utilizing separate
windings for various speeds isn’t a fitting technique as it won’t give precise speed
control and is likewise exorbitant. For exact control, a frequency change converter is
prudent as it can run a three- and single-phase AC drive at a wide range; however, the
exhibition of drive ordinarily corrupts as it is utilized external its ideal operational
speed.

2 Soft Startıng

Beginning torque assumes a significant job if there should be an occurrence of


driving high-inertial burdens. Generally switch on of the thyristor depends on the
gate terminal signal but switch off is independent of the gate signal and dependent on
circuit conditions. For thyristor drives, a commutation device is required in order to
perform turn off action along with turn on gate signal [1]. A few investigations were
done to upgrade the beginning charcterisitcs of motor [2–5]. In beginning condition,
slip is equivalent to solidarity by considering the equal circuit of motor, supply-side
impedance has the most reduced worth, as a result of that a high ebb and flow is drawn
by the engine during turning over period, in this manner, it is constantly prescribed to
utilize the drivers which limit the beginning ebb and flow [6–8], and when the engine
turns over legitimately, the high torque issue were experienced by adding additional
weight on the accessories of motor.
To overcome the beginning current and high torque issues, there are different
kinds of frameworks accessible. Some of them are:
• Direct on-line (DOL) starter,
• Star-delta starter,
• Frequency change starter, and
• Soft starter.
Up to 8 kW, DOL starter is favored for higher flows and type of start-up decrease
is required. In the star-delta course of action, the motor windings are connected in
star type so that beginning rise current and torque are controlled. Star-delta recur-
rence change technique converts AC voltage to DC. Voltage of wanted recurrence is
utilized, yet it is confounded and expensive too (Fig. 1).
A delicate beginning framework gives an amazing option requiring little to no
effort with a basic structure. It gives step-less engine control for example it permits
both the current and torque to be balanced with little augmentations. Shifting of time
taken to run the engine up to its ordinary working pace can be done using soft starters.
Figure 2 indicates the fundamental square outline of the delicate starter.
Conventional and Fuzzy Proportional Integral (PI) Speed Controller … 13

Fig. 1 Basic AC voltage controller (Soft Starter)

Fig. 2 Simulink model—conventional PI controller of induction motor drive

Delicate starters permit motor to begin, speed can be change and stop with least
weights on the hardware, which should be possible by proper modification of the
supply voltage. A few strategies for the shut circle control method to accomplish
this have been created and introduced in [9]. Right now, a sensor is required to
procure the sign criticism. A few specialists have proposed and built up a technique
for ideal delicate beginning without sensing the speed for detecting of thyristors
voltages is particularly required [10, 11]. Drives with solid-state starter incorporates
the advantages of longer engine life, improved control torque; therefore, its area
of developments regions are expanding quickly Arduino is an open-supply device
with programming layout, client arranges the plans and makes microcontrollers and
microcontroller packs for building propelled contraptions. Arduino board plans use
a selection of microchips and controllers.
14 S. Madunisha et al.

3 Control Principle

The squirrel-cage induction motor has a few focal points like ease, nearly support
free, and solid activity; however, for high powerful execution mechanical application,
their control is as yet not all that simple due to their non-direct trademark furthermore,
the assortment of rotor resistance with working condition. Vector control prompts
autonomous control of torque and transition, however, with significant detriment that
is touchy to parameter varieties, thus the exhibition of customary controllers like
PID or PI falls apart. In this way, these days a definitive objective is to expand the
strength of the control framework, with the goal that it will turn out to be progressively
resistant to vulnerability. In spite of the fact that customary controls have entrenched
hypothetical foundations on solidness and permit diverse structure goals, for example,
consistent state and transient qualities of shut circle framework, however, for that
privilege numerical model of the system should be known. On the other hand, while
using counterfeit control instruments it isn’t essential to know the logical model of
the system and besides the helplessness or cloud assortments in plant parameters
and structure can be dealt with even more suitably. A couple of works added to the
arrangement of crossbreed control plans [12].
Scaling factor in an intelligent controller is significant. Determination of appro-
priate qualities for scaling factors is dependent on the information about the cycle
to be controlled and now and then through experimentation to accomplish the most
ideal control execution. This is so on the grounds that not at all like regular non-fluffy
regulators to date rationale regulator on the grounds that changing the scaling factors
changes the standardized universe of talk, the areas, and the participation elements
of info/yield factors of fluffy rationale regulator., there is no very much characterized
technique for the good setting of scaling factors for fluffy rationale regulators. Yet,
the scaling factors are the principle boundaries utilized for tuning the fluffy.
Right now, control techniques (traditional and fake insightful) are acquainted and
applied with a backhanded field-arranged acceptance engine. In the first kind of
approach, an ordinary PI controller is acquainted all together with accomplished
speed control and beginning circumstance is watched. The structure of the PI
controller utilized is shown in Fig. 3 which is a normal equal PI controller.
This control methodology with better outcome in light of the fact that fuzzy
logic defeats the numerical challenges of demonstrating profoundly non-straight
frameworks. It reacts in a progressively steady manner to lose input parameters, its
change is exceptionally simple and entirely adaptable.

4 Simulation Results

Right now, contextual analyses have been performed. In both Simulink and Powersim
tool compartments of MATLAB programming are utilized. In the main contextual
investigation, a 38 KW motor is used.
Conventional and Fuzzy Proportional Integral (PI) Speed Controller … 15

Fig. 3 Output waveforms—conventional PI controller of induction motor drive

Motor is turned over and constrained by a PI controller whose Simulink model


is shown in Fig. 2. Three stage voltages and flows are estimated and plotted in the
initial 3 s of its activity. Likewise speeding up bend and yield torque is examined.
The charts are shown in Fig. 3. Similarly for Fuzzy Logic Based controller whose
Simulink model and output is shown in Figs. 4 and 5.
Furthermore time reaction of quickening. For instance, the abundancy of current
with an exemplary PI controller is around 480 A during start up while with fuzzy
logic controller this worth decreased to 290A.
Fuzzy logic controller makes the framework innate to vulnerability in the event
that we watch the speed waveform in Fig. 6. At time t = 1.1 s in Fig. 6 regarding load
torque and rotor speed is analyzed in which fuzzy logic based PI controller performs
well when contrasted with a conventional controller, along these lines fuzzy-based
PI controller gives a powerful control.
Now a day’s soft computing techniques are worldwide usage in controlling drive
applications in that the more basic thing for the usage of controlling of the drive will
be fuzzy logic controller. In that fuzzy logic, the choice based decision will be taken
while setting the input based on normal output conditions.
16 S. Madunisha et al.

Fig. 4 Simulink model—fuzzy logic PI controller of induction motor drive

Fig. 5 Output waveforms—fuzzy logic PI controller of induction motor drive


Conventional and Fuzzy Proportional Integral (PI) Speed Controller … 17

Fig. 6 Rotor speed comparison

5 Conclusion

An enlistment motor devours more vitality than it quite to play out its work not
exactly at full burden situation, that overabundance vitality transmitted in this type of
warmth. Presenting the man-made reasoning in framework can control plentifulness
of beginning current, spare the vitality and new savvy control structure is harsh
toward aggravation created outside or inside the framework. Furthermore, fuzzy
controller based control methodology shows better outcomes in light of the fact that
fluffy rationale beats the scientific challenges of displaying exceptionally non-straight
frameworks, the expense and multifaceted nature of the controller is diminished
and it reacts in an increasingly steady manner to uncertain readings from input
parameters. In the future some improvement methods can be used to streamline the
quantity of rule-based fuzzy logic controller, as time devoured in fuzzification and
defuzzification are especially relies upon the quantity of rules which thusly impact
the reaction of the controller.

References

1. Bose B (2006) Power electronics and motor drives advances and trends, 1st edn. Elsevier,
Academic Press
2. Say M (1984) Alternating current machines, 2nd edn. Pitman, England
3. Badr MA, Abdel Halim MA, Alolah AI (1996) A nonconventional method for fast starting of
three phase wound-rotor induction motors. IEEE Trans Energy Convers 11:701–707
4. Abdel Halim MA, Badr MA, Alolah AI (1997) Smooth starting of slip ring induction motors.
IEEE Trans Energy Convers 12:317–322
18 S. Madunisha et al.

5. Hamouda RM, Alolah AI, Badr MA, Abdel Halim MA (1999) A comparative study on the
starting methodes of three phase wound-rotor induction
6. Motors part I. IEEE Trans. On Energy Conversion Vol. 14, pp. 918–922.
7. Zenginobuz G, Cadirci I, Ermis M, Barlak C (2001) Soft starting of large induction motors
at constant current with minimized starting torque pulsations. IEEE Trans Ind Appl 37:1334–
13479
8. Rashad EM, Radwan TS, Rahman MA (2004) Starting and vector control of series-connected
wound- rotor induction motor in super synchronous mode. In: 39th IAS annual meeting
conference on industry applications, vol 1, pp 32–39
9. Li WX, Lu JG, Liu MS, Zhao J (2004) Design of intelligent soft-start controller for induction
motor. In: Proceedings of 3rd international conference on machine learning and cybernetics,
vol 2, pp 908–912
10. Denai MA, Attia SA (2002) Fuzzy and neural control of an induction motor. Int J Appl Math
Comput Sci 12
11. Cleland JG, Tumer MW, Fuzzy logic control of electric motors and motors drives feasibility
study. In: United States air and energy engineering environmental protection research laboratory
agency research triangle park
12. Shen JX, Zhu ZQ, Howe D, Buckley JM (2002) Adaptive fuzzy logic speed control of PM
brushless AC drives. In: International conference on power electronics machines and drives,
pp 68–73
13. Dannenberg A (2005) Fuzzy Logic Motor Control with MSP430x14x. Texas Instruments,
Application Report, SLAA235
14. Dhayalini K (2016) Optimization of wind-thermal coordination dispatch using flower pollina-
tion algorithm. Int J Adv Chem 12(16):4963–4970
15. Manivasagam R, Saranraj R (2020) Wind turbine manufacturing supply chain. Int J Sci Technol
Res 9
16. Manivasagam R, Dharmalingam V (2014) Power quality problem mitigation by unified power
quality conditioner: an adaptive hysteresis control technique. Int J Power Electron 6:403–425
17. Manivasagam R, Parthasarathy P, Anbumozhi R (2019) Robust analysis of T-S fuzzy controller
for non linear system using H-infinity. Adv Intell Syst Comput 949:643–651
18. Miloud Y, Draou A (2005) Performance analysis of a fuzzy logic based rotor resistance
estimator of an indirect vector controlled induction motor drive. Turk J Elce Engine 13
Privacy Protection of Biometric
Templates Using Deep Learning

Shefali Arora, M. P. S. Bhatia, Harshita Kukreja, and Soumya Jain

Abstract With the growing use of biometric authentication in real-world appli-


cations, there are growing concerns related to the privacy of biometric templates
enrolled in the database. Many algorithms have been proposed for the protection
of biometric templates, however, this leads to a trade-off between the security of
templates and matching performance. In this work, we propose a robust frame-
work for improving upon the existing biometric template protection techniques. The
proposed method uses one-shot enrollment for the mapping of images against unique
binary codes assigned to them. The binary codes are obtained by binarization of
image pixels. This is followed by the use of the SHA-256 hash function, and the
class labels are generated based on the hashes templates. This is followed by the
extraction of features using a deep convolutional architecture. During verification,
the predicted labels are matched against labels generated from the hashed templates of
the users stored during enrollment. The proposed framework is capable of achieving
state-of-the-art performance.

Keywords Biometric authentication · Template security · Hashing · Deep


Learning · CNN · Binary codes · Privacy · Templates

1 Introduction

Biometric recognition involves the use of human traits that are unique to an individual.
These traits can be the face, fingerprint, iris, voice, gait, and signature among others.
Out of these, the face is the one being used in a large number of applications for recog-
nition. Face recognition can take into account several features like facial measures,
facial feature shapes, eye color, etc., to provide better performance. It also provides
an advantage to those users who have lost fingerprints or have wrinkled ones. With

S. Arora (B) · M. P. S. Bhatia


Division of Computer Engineering, Netaji Subhas Institiute of Technology, Delhi, India
H. Kukreja · S. Jain
Deparment of Computer Engineering, Indira Gandhi Delhi Technical University for Women,
Delhi, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 19
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_3
20 S. Arora et al.

the advancement in technology, the use of face recognition in providing authen-


tication has increased rapidly due to more reliability than conventional methods
like passwords, keys, and patterns. However, face templates demand a more secure
database than the conventional methods because a security breach in these templates
can reveal the identity of the concerned user. Also, it will turn out to be very costly
and time-consuming to reissue another template for the same.
This paper focuses on providing security to face templates. In our proposed
approach, we binarize the images and hash the converted strings. The hashed strings
are then passed as labels for each user and a Deep Convolutional Neural network is
applied using the proposed model/architecture. This is then evaluated on the Labeled
Faces in the Wild (LFW) Dataset and the Casia Web Face Dataset. The resulting
biometric template security system outperforms the state-of-the-art systems.
The rest of the paper is organized in the following sections. The related works
based on the biometric template security are discussed in Sect. 2. The methodology
used is presented in Sect. 3 and the results achieved using our framework being
comprised in Sect. 4. Further, Sect. 5 concludes the paper.

2 Related Work

Biometric Template Protection approaches can be broadly categorized as biometric


cryptosystems, transform-based biometrics, and a hybrid of the two methods.
Biometric cryptosystems [1, 2] were initially developed to bind biometric traits with
a cryptographic key or generate a key directly. However, with some amount of helper
data about the templates in the biometric cryptosystem [3], it can also be used as a
template protection system by matching the information to query biometric features
and obtain a cryptographic key. Error-correcting codes are further used in biometric
cryptosystems to handle the intra-class variations. The cancelable approach, on the
other hand, applies a transform function to the biometric template, and only the trans-
formed template is saved in the database [4]. Two possible approaches can be used,
salting, and non-invertible transform. Salting is invertible; the original biometric
template can be recovered with access to the key and the transformed template. A
non-invertible transform is, however, one-way and is computationally hard to invert
even if the key is known. A technique using more than one of the basic approaches
out of these is called a hybrid scheme. The authors [5] proposed a cryptographic
solution of a one-way hash to provide high template security and also addressed
the re-enrollment problem in case the templates were compromised. In terms of
matching performance, they outperformed the existing state-of-the-art systems by
7%. To overcome the trade-off between matching performance and template secu-
rity, the authors [6] proposed deep CNN along with random projection to boost the
inter-class variations, lower the extracted feature vector dimensionality and reduce
the intra-class variations. This is an example of the hybrid approach for template
security. In [7], a deep hashing component was used along with a neural network
decoder to generate a binary code. A further step in this approach was taken by [8]
Privacy Protection of Biometric Templates Using Deep Learning 21

which proposed a multimodal authentication system using feature-level fusion to


demonstrate finer results. To tackle the similarity attacks, Deep Secure Quantization
was developed by [9].

3 Methodology Used

3.1 Convolutional Neural Networks

Convolutional Neural Networks (CNN) are one of the most suitable neural networks
for images. Our CNN model employs several components like Kernel, activation
function, Pool, Fully connected layers, and softmax function.
A kernel is a filter that is passed over the image to transform it. Subsequent feature
map values are calculated consistent with the subsequent formula. Given input image
f and kernel h, convolution can be represented as follows(m and n denote the indexes
of matrices).

G[m, n] = ( f ∗h)[m, n] h[ j, k] f [m − j, n − k] (1)
j k

ReLu (The rectified linear unit) has been used as an activation function. It will
return 0 in case of any negative input, and will return the positive value back.

f (x) = max(0, x) (2)

Pooling layers are used for downsampling feature maps by summarizing the pres-
ence of features in patches of that feature map. Two types of pooling layers are max-
pooling and average pooling. Maximum pooling calculates the maximum values in
each patch of each feature map.
FC Layer is a final connected layer that takes inputs from previous layers to
calculate a final probability. The goal of convolution and pooling layers is to extract
features from the images and the final layer(s) are used to classify those features. It
has a typical equation:
 
f WT · X + b , where f is an activation function. (3)

Softmax functions are multiclass sigmoids, so they can be used to determine


probabilities of multiple classes. It is defined as

  ez j
σ z j = K (4)
k=1 ezk
22 S. Arora et al.

Fig. 1 Privacy-preserving framework

Here z is the input vector, and σ(z) is the output class probability. It is particularly
useful in multiclass classification when the input has to be one, and only one class.
The methodology of privacy preservation of templates, followed by biometric
authentication is depicted in Fig. 1.

3.2 Assignment of Binary Codes and Hashing Using


SHA-256

At the time of user enrollment, unique codes are generated for each user by binarizing
the image pixels. These binary codes are not exposed to the user and are further hashed
using the SHA-256 algorithm. The use of hashing would ensure the security of the
templates, thus preserving the privacy of enrolled users. The main steps involved in
the SHA-256 algorithm are:
1. Given a message M to be hashed, the first step is to form a padded message M’.
This consists of the message along with padding. The length is a multiple of
512.
2. The padded message M’ is parsed into N blocks of size 512 bits. Each block is
an input block of 32 bits, and there are 16 blocks in number.
3. Finally, a hash of length 256 bits is initialized (there are 8 blocks in number,
each of size 32 bits). The initial hash value is set by taking the first 32 bits of
the fractional parts of the square roots of the first eight prime numbers.

3.3 Data Augmentation

Data augmentation is useful in the case of biometric data because of the limited
number of training samples and these would be fed to deep architectures to get a
good performance. As one-shot enrolment is done, one binary code is assigned for
each user. This is followed by data augmentation to increase the number of training
Privacy Protection of Biometric Templates Using Deep Learning 23

Table 1 CNN architecture used


Name Type Number Filter Activation
of filters size
Conv1,2 Conv 16 3×3 ReLu
Pool1 Max-pooling 2×2
Conv3,4 Conv 32 3×3 ReLu
Pool2 Max-pooling 2×2
FC1 Fully connected 256 1 NA
FC2 Fully 1024 1 NA
connected
FC3 Fully connected Number of enrolled users 1 Softmax

Fig. 2 CNN architecture in the proposed framework

samples. Data augmentation is done for each face image using various operations
like flipping, re-scaling, shearing, etc. These would be fed to the deep Convolutional
Neural Network for extraction of features.

3.4 Feature Extraction Using CNN

The different layers of the CNN architecture are depicted in Table 1. Figure 2
visualizes the architecture.

3.5 Performance Metrics and Verification

The model is trained and tested using the validation set approach. We reserve 60%
of the dataset for training and the remaining 40% for validation. We also repeat the
experiments on other splits (80–20 and 20–80, however, results obtained using 60–40
split are the best).
To evaluate the performance of the system, the trained model is tested on input
images and the results obtained in this paper are evaluated in terms of False
Acceptance Rate (FAR) and Genuine Acceptance Rate (GAR).
24 S. Arora et al.

4 Results

4.1 Datasets Used

The following datasets have been used to evaluate the performance of the privacy-
preserving framework:
(1) Labeled Faces in The Wild: The database contains around 13,000 images of
faces collected from the web. The faces have been given labels i.e. the names
of those persons. 1680 of the people pictured have two or more distinct photos
in the data set.
(2) CASIA Web face dataset: It is annotated with 10,575 unique people with
494,414 images in total. This is the second largest public dataset available
for face verification and recognition problems.

4.2 Performance Achieved

The experimental results are shown in Tables 2 and 3. The Genuine Acceptance Rate
of the proposed method with one-shot enrolment is evaluated in Figs. 3 and 4. These
graphs help to visualize the values achieved using different optimization algorithms
like Adam and Stochastic Gradient Descent.
The results achieved can be compared in terms of the performance metric used,
with frameworks proposed in the existing studies. Table 4 shows this comparison.

Table 2 Results achieved


Database Enrolment type GAR (in %) FAR (in %)
using the proposed framework
(Adam) (Adam)
and Adam optimization
CASIA–Web One-shot 99.56 1.2
face
LFW One-shot 99.31 1.5

Table 3 Results achieved


Database Enrolment type GAR (in %) FAR (in %)
using the proposed framework
(SGD) (SGD)
and SGD optimization
CASIA–Web One-shot 99.20 1.6
face
LFW One-shot 98.97 1.82
Privacy Protection of Biometric Templates Using Deep Learning 25

Fig. 3 Results achieved using Adam optimization

Fig. 4 Results achieved using SGD optimization

Table 4 Comparison with


Method GAR
existing studies
Hybrid method [2] 90.61%@1FAR
MEB [3] 90.13%@1FAR
DCNN [4] 96.53%@0FAR
Deep belief network [10] 94.3%@1.2FAR
PCA [10] 95%@4.3FAR
Hausdorff distance [10] 92.4%@5.2FAR
Adversarial learning without perturbations 99.90%@2.75FAR
26 S. Arora et al.

5 Conclusion and Future Work

Cancellable biometric template generation using deep learning and cryptography


fulfills the requirement of securing user privacy. Securing biometric templates over
the cloud is important as a number of applications these days make use of these
services, with a lot of user data involved. In this paper, the improvised DeepCrypt
framework combines the use of deep convolutional neural networks along with a
secure cryptographic hash function to store biometric templates on the cloud server.
This technique is useful in obtaining cancellable and secure transforms, without
degrading the performance of the authentication system. The results achieved are
superior as the genuine accept rates of up to 99 percent are achieved. This ensures
the privacy of enrolled individuals.
As a part of future work, we would extend our work on the protection of other
biometric modalities. We will extend the provision of template security in other
environments capturing biometric traits in uncontrolled environments. We plan to
work on more such algorithms using deep networks on traits like gait, dynamics of
keystrokes, etc. We will also work on improving the security of existing cryptographic
functions for hashing of biometric templates.

References

1. Uludag U, Pankanti S, Prabhakar S, Jain A (2004) Biometric cryptosystems: issues and


challenges. Proc IEEE 92(6):948–960. https://doi.org/10.1109/jproc.2004.827372
2. Vetro A, Memon N (2007) Biometric system security. In: Second international conference on
biometrics.
3. Cavoukian A, Stoianov A (2007) Biometric encryption. Biometric Technol Today 15(3):11.
https://doi.org/10.1016/s0969-4765(07)70084-x
4. Jain A, Nandakumar K, Nagar A (2008) Biometric Template security. EURASIP J Adv Signal
Process 2008(1):579416. https://doi.org/10.1155/2008/579416
5. Jami S, Chalamala S, Jindal A (2019) Biometric template protection through adversarial
learning. In: 2019 IEEE international conference on consumer electronics (ICCE). https://
doi.org/10.1109/icce.2019.8661905
6. Jindal A, Rao Chalamala S, Jami S (2019) Securing face templates using deep convolutional
neural network and random projection. In: 2019 IEEE international conference on consumer
electronics (ICCE). https://doi.org/10.1109/icce.2019.8662094
7. Talreja V, Soleymani S, Valenti M, Nasrabadi N (2019) Zero-shot deep hashing and neural
network based error correction for face template protection. arXiv:1908.02706
8. Talreja V, Soleymani S, Valenti M, Nasrabadi N (2019) Learning to authenticate with deep
multibiometric hashing and neural network decoding. In: ICC 2019 - 2019 IEEE international
conference on communications (ICC). https://doi.org/10.1109/icc.2019.8761480
9. Chen Y, Wo Y, Xie R, Wu C, Han G (2019) Deep Secure Quantization: On secure biometric
hashing against similarity-based attacks. Signal Process 154:314–323. https://doi.org/10.1016/
j.sigpro.2018.09.013
10. Liu Y, Ling J, Liu Z, Shen J, Gao C (2017) Finger vein secure biometric template generation
based on deep learning. Soft Comput 22(7):2257–2265. Available: https://doi.org/10.1007/s00
500-017-2487-9.
Privacy Protection of Biometric Templates Using Deep Learning 27

11. Jindal A, Chalamala S, Jami S (2018) Face template protection using deep convolutional neural
network. In: 2018 IEEE/CVF conference on computer vision and pattern recognition workshops
(CVPRW). https://doi.org/10.1109/cvprw.2018.00087
12. Talreja V, Valenti M, Nasrabadi N (2017) Multibiometric secure system based on deep learning.
In: 2017 IEEE global conference on signal and information processing (Globalsip). https://doi.
org/10.1109/globalsip.2017.8308652
13. Sadhya D, Singh S (2017) Design of a cancelable biometric template protection scheme
for fingerprints based on cryptographic hash functions. Multimed Tools Appl 77(12):15113–
15137. https://doi.org/10.1007/s11042-017-5095-x
14. Jain A, Nandakumar A, Nagar A (2008) Biometric template security. EURASIP J Adv Signal
Process 1(579416). https://doi.org/10.1117/2.1200911.001590
A Comparative Analysis of Clustering
and Biclustering Algorithms in Gene
Analysis

Diksha Mehta, Shriya Sehgal, Tanupriya Choudhury, and Tanmay Sarkar

Abstract While dealing with high-dimensional biological data, subsets of genes that
have similar behaviour under some conditions but behave independently under others,
are frequently found. Discovering such co-expressions can aid in uncovering genomic
knowledge such as gene networks or gene interactions. A great deal of research is
being carried out on the algorithms of these approaches for decades, especially for
array mining in gene expression analysis in the field of computational biomedical. In
this paper, we compare the results of K-means, traditional clustering algorithm and
OPSM (Order-preserving submatrix problem), a biclustering algorithm on a gene
expression dataset on the basis of different parameters and examine the benefits of
co-clustering over traditional clustering methods in different applications.

Keywords Genomic knowledge · Array mining · Gene expression analysis ·


OPSM · K-means

1 Introduction

In today’s era, associated with increased computational power and the abundance
of readily available data, data analysis and its interpretation is a major challenge
faced. Data mining is an effective tool to gather relevant insights from raw data. It
means finding unknown relationships, like similarities and anomalies, and getting
patterns from the humongous batches of data to glean meaningful knowledge. This
extracted information can further be utilized in getting a wholesome meaning from
large databases particular to an area, where it can guide in decision making.

D. Mehta · S. Sehgal · T. Choudhury (B)


Department of CSE, University of Petroleum and Energy Studies(UPES), Dehradun, Uttarakhand,
India
T. Sarkar
Department of Food Technology and Biochemical Engineering, Faculty of Engineering and
Technology, Jadavpur University, Kolkata 700032, India
Government of West Bengal, Malda Polytechnic, Bengal State Council of Technical Education,
Daulatpur 732102, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 29
J. Singh et al. (eds.), Innovations in Cyber Physical Systems, Lecture Notes
in Electrical Engineering 788, https://doi.org/10.1007/978-981-16-4149-7_4
30 D. Mehta et al.

There have been numerous data mining techniques developed and being
researched for years now. Of these techniques, Clustering, Biclustering and Triclus-
tering are some of the most prominent ones. The advent of these tools and
their comprehensive utilization in a variety of applications like the stock market,
medicines, computational biology, image processing, food process technology and
many more fields has led to their massive popularity. In this article, we compare
the performance of a clustering algorithm, K-means [2] with that of a biclustering
algorithm OPSM (Order-preserving submatrix problem) [6], by identifying poten-
tially meaningful relationships among genes and/or experiments in the genome DNA
microarray dataset [10].
Section 2 gives a brief theoretical background on the fundamental concept of both
the data mining techniques. A detailed description of both the algorithm of interest
and the dataset used can be found in Sect. 3. Whereas Sect. 4 expresses the results
examined on gene expression datasets for all the aforesaid algorithms, the conclusion
of our analysis is hence presented in Sect. 5.

2 Background

2.1 Clustering

Clustering is a method of grouping the data points based on similarity into functional
and relevant subclasses called clusters [1]. Objects in one cluster have more anal-
ogous characteristics with each other than with those in the other clusters. It is an
unsupervised learning technique with no predefined classes and training examples.
The quality of the cluster is determined by the selection of the clustering algorithm.
Figure 1 summarizes the classification of clustering algorithms.

Fig. 1 Classification of clustering algorithm


A Comparative Analysis of Clustering and Biclustering … 31

Fig. 2 Basic concepts of the clustering and biclustering technique

2.2 Biclustering

Biclustering is the concurrent clustering of rows and columns in a data matrix to


identify data points that are co-regulated across a subset of conditions but not neces-
sarily across other conditions. Figure 2 explains the fundamental distinction between
clustering and biclustering techniques.

3 Methodology

3.1 Clustering: K-Means

K-means[13, 14] is an unsupervised, deterministic and iterative technique [2] that


divides the dataset into K distinct clusters. It is one of the most traditional and
widely used clustering algorithms for its simplicity and speed [3, 4, 15, 16]. The
fundamental idea behind this technique is to define K centroids placed at different
locations randomly and associate every data point closest to its closest centroid.
Once that is done, the new centroids [17–20] are calculated and the data points are
re-binded to their closest centre. This step is iterated until the centroids do not change
their positions anymore. The main aim of the algorithm is to minimize the squared
error function shown in (1) [5]. The flowchart of the algorithm is shown in Fig. 3.


c 
ci
 
J(Y) = xi − y  2 (1)
j
i=1 j=1

where ||xi −yj ||: Euclidean distance between xi and yj .


ci : The number of data points in the ith cluster,
c: The number of centroids.
Another random document with
no related content on Scribd:
W. C. Nicholas, one of the foremost Jeffersonians of Virginia, and John
Breckenridge of Kentucky, who had returned on a visit to his native State. It
does not appear that Madison participated in this conference, although he
was in complete accord with its purpose. There the plan was perfected to
launch a movement of protest against the Alien and Sedition Laws through
the Legislatures of the various States in resolutions pronouncing them
violative of the Constitution and void. While Jefferson, recalling the
occasion a quarter of a century later, thought that he had been pressed to
frame such resolutions, it is unlikely that the plan did not originate in his
own mind. He had an uncanny faculty for calling forth suggestions from
others to meet his views. On one point his memory was clear—there was to
be the utmost secrecy as to the part he played. That he did prepare a draft is
thoroughly established; that the draft finally submitted to the Kentucky
Legislature, while based on the Jeffersonian draft, was the work of John
Breckenridge has been convincingly maintained.[1577]
This dashing young leader of the Kentucky Democracy had been a
marked figure from his earliest youth. More than six feet in height, spare and
muscular in build, with the strength and grace of carriage born of his
wilderness training, he looked the leader of men. His hair, a rich chestnut
tending to auburn, disclosed something of his ardent temperament and was
not unlike that of his idolized chief. His brown eyes could be stern or tender.
His address was easy and dignified, and his manner not without that touch of
gravity which creates confidence in the follower. There was much of
tenderness and everything of generosity in his nature to explain the love
which enveloped him wherever he went.
Born of Scotch-Irish stock in Virginia thirty-eight years before, his had
been an extraordinary career. Scarcely was he out of college when, without
any effort on his part, he was elected to the Virginia House of Delegates at
the age of nineteen. When the House refused him his seat because of his age,
his loyal constituents elected him again. Again refused his seat, he was
elected for the third time, and seated. During the next five years he
distinguished himself by his industry and ability no less than by the charm of
his personality. It was about this time that the young man ascended the hill to
Monticello to sit at the feet of the god of his idolatry. Jefferson was
impressed by ‘the large scope of his mind,’ his great store of information,
and ‘the moral direction’ of his ideas.[1578] There had to be something
extraordinary in the man to whom Gallatin looked a little later as the man
best qualified to continue the work of Jefferson, Madison, and himself.[1579]
At the bar Breckenridge distinguished himself by his erudition, his
industry, and the fluency and force of his arguments, which were notably
free from the floridity then so popular in the South. Elected to Congress
when thirty-three, he had abandoned his seat to remove to Lexington,
Kentucky, where he acquired a large plantation and settled down to the
practice of his profession. Almost immediately he was deeply engaged in
politics. He was made President of the Democratic Society of Kentucky and
became one of the most engaging of the Democratic leaders of the pioneer
State. Returning to Kentucky with the Jefferson draft, he made some
changes, and on November 8th presented the Resolutions to the Legislature.
The debate was brief, and on the 10th they were adopted.
The Virginia Resolutions, written by James Madison after conferences
with Jefferson, were introduced in the Legislature of that State by the
celebrated John Taylor of Caroline. These, too, were speedily adopted after a
brilliant debate in which their sponsor and Giles crossed swords with the
eloquent George Keith Taylor.
The primary purpose of these Resolutions was to concentrate attention on
the Alien and Sedition Laws. They were to be sent to the Legislatures of all
the States where they would be thoroughly discussed. Jefferson was too wise
to have expected a favorable response from Legislatures dominated by the
Federalists. But there would be debate, agitation, newspaper controversy—
the hated laws would have the searchlight turned full upon them. Historians
have been interested in these Resolutions because they set forth in the most
impressive manner the compact theory of the Union on which the
nullificationists and secessionists were to seize much later as justification for
their course. We are interested here in the contemporary view and the
political aspect. The reader of to-day is apt to overlook the fact that they
were primarily intended as a protest against interference with the freedom of
speech and the liberty of the press, and only ‘incidentally they gave
expression to a theory concerning the nature of the federal union.’[1580] That
this was the general contemporary interpretation is shown in the actions of
the other Legislatures. Thus Maryland, Federalist, rejected the Resolutions
as ‘highly improper’ because ‘a recommendation to repeal the Alien and
Sedition Laws would be unwise and impolitic.’[1581] Thus Delaware,
Federalist, dismissed them as a ‘very unjustifiable interference with the
general government.’ Thus New Hampshire, Federalist, declared the
obnoxious laws ‘constitutional and ... highly expedient.’ The Federalists of
Rhode Island pronounced them ‘within the powers delegated to Congress
and promotive of the welfare of the United States.’
Only in Massachusetts did the Federalists make a comprehensive and
argumentative reply to the effect that the constitutionality of measures could
only be passed upon by the Supreme Court. The Alien and Sedition Laws
were defended as in no wise interfering with the liberty of the press. And
here, strangely enough, Democrats were found to support the Resolutions in
speeches of no mean merit. In John Bacon of Berkshire the Jeffersonians had
their sole representative in the State Senate. Formerly a minister of the Old
South Church, and a speaker of some ability, he delivered a carefully
prepared speech assailing the constitutionality of the oppressive laws, and
gave it to the press.[1582] Dr. Aaron Hill of Cambridge, a Jeffersonian in the
House, acted similarly in that body—and on both Hill and Bacon the
floodgates of falsehood and abuse were opened. In an open letter to Bacon in
the ‘Centinel,’ he was charged with having been a Tory, with having
quarreled with the congregation at the Old South, with having owned, as
slaves, a married couple, and with having sold the husband into a distant
State.[1583] When Bacon proved the charges shamelessly false, the
‘Centinel’ took no notice.[1584] Dr. Hill fared quite as badly when students
from Harvard exercised their learning by smashing the windows and
casements of his home.[1585] And it was at this juncture that Thomas Adams,
of the ‘Independent Chronicle,’ was indicted and Abijah Adams was thrown
into a cell for criticizing the action of the Legislature.[1586]
Everywhere the Federalist papers made the Resolutions the occasion for a
justification of the Alien and Sedition Laws; everywhere the Jeffersonians,
usually refraining from a discussion of the theory of the Federal Union
advanced, made them the pretext for a denunciation of the laws. And
significantly enough, it was reserved for the favorite Federalist organ of
‘Porcupine’ to preach and all but urge secession. Replying to a
correspondent who had denied the right of secession, ‘Porcupine’ said:
‘Does he imagine that the industrious and orderly people of New England
will ever suffer themselves to be governed by an impious philosopher or a
gambling profligate imposed upon them by Virginia influence? If he does, he
knows very little of New England. The New Englanders know well that they
are the rock of the Union. They know their own value; they feel their
strength, and they will have their full share of influence in the federal
government, or they will not be governed by it. It is clear that their influence
must decrease; because ... the Middle and Southern States are increasing in
inhabitants five times as fast as New England is. If Pennsylvania joins her
influence to that of New England the balance will be kept up; but the
moment she decidedly throws it into the scale with Virginia the balance is
gone, New England loses her influence in the national Government, and she
establishes a Government of her own.’[1587] This reflects the spirit of the
times when the two parties faced each other for the decisive battle of 1800.
The Alien and Sedition Laws and the Terror were issues; the Kentucky and
Virginia Resolutions played scarcely any part at all.
CHAPTER XVIII

ADAMS PULLS DOWN THE PILLARS

M EANWHILE, the Federalist leaders, having, as they thought, cowed


and crushed the Democrats, were engaged in an internecine strife for
control. There was to be war—at all hazards a war. It was to be a
Federalist war, with Jeffersonians rigidly excluded from all places of
command. But more than that, it had to be a war personally conducted by
Alexander Hamilton—with no unseemly interference from John Adams.
This was the grim determination of the radical Federalists everywhere, even
the Essex Junto, in the President’s own State, sharing it with the three
leading members of the Adams Cabinet. Thus, when Adams one day
casually asked Pickering who should be made Commander-in-Chief of the
army, and the spectacled Puritan unhesitatingly answered, ‘Colonel
Hamilton,’ there was an ominous silence. When, on another occasion, the
same question elicited the identical answer, with a similar silence, even
Pickering must have sensed the situation. But when, after a third question
had brought the same answer, and Adams, a little annoyed, had rejected the
suggestion with the sharp observation, ‘It is not his turn by a great deal,’
Pickering might have dropped his plans without disgrace.[1588] But nothing
was more remote from his intentions. It was at this time that the
conspirators, including the three members of the Cabinet, put their heads
together to devise ways and means of forcing the appointment of their idol.
The chief command would naturally be offered to Washington, who would
accept the position in an honorary sense, but old age and infirmities would
make his activities and authority but perfunctory. The important thing was to
secure the second position for Hamilton—and even there was a rub. Adams
was prejudiced.
Then, one day, Adams ordered McHenry to Mount Vernon to proffer the
chief command to Washington, with a request for advice in the formation of
the officers’ list. The names of several eligibles for the leading posts,
enumerated by Adams, might be mentioned. Hamilton was among them, but
he was fourth on the list. That day McHenry hastened to Pickering, and the
conspiracy against the President in his own household began to unfold. It
was agreed that Pickering should send a personal letter on ahead urging
Hamilton for second place, McHenry should reënforce Pickering’s plea in
person, Hamilton should be instantly notified and a letter from him should
be delivered to Washington along with the commission from Adams. Thus,
when the smug-faced little War Secretary, more familiar with the pen of the
rhymester than with the sword of the soldier, bade his chief adieu and set out
upon his mission, he was the messenger of his chief’s dearest enemy,
prepared to exhaust his ingenuity in thwarting the plans of the man of whom
he was a subordinate and on whose mission he went forth.
As early as June, Washington had planned to make Hamilton Inspector-
General, but without placing him ahead of Pinckney or Knox, both of whom
outranked him in the old army.[1589] Just what treachery McHenry practiced
as he sat on the veranda at Mount Vernon those July days will never be
positively known. That he pleaded the cause of Hamilton against the wishes
of his chief there can be no doubt. That it was he who suggested that
Washington should make his own acceptance conditional on having absolute
power in the selection of his subordinates is more than probable. At any rate,
when he returned to Philadelphia he carried in Washington’s handwriting the
names of the three Major-Generals—Hamilton, Pinckney, and Knox, in the
order given. In this order Adams, who assumed that their relative positions
would be determined by himself, sent them to the Senate and they were
confirmed.
Soon the Federalist camp was in fermentation as to whether Knox,
favored by the President, or Hamilton, preferred by the party bosses, should
be second in command. Pinckney, who accepted slights with the same
contrite spirit with which his brother had stepped aside for Jay in London,
agreed to serve under the Federalist leader, but Knox, not so humble,
refused, and the crisis came. Personally fond of Knox, the quarrel was
embarrassing to Washington, but it had never been the habit of the
Hamiltonians to spare him where their wishes were involved. Soon Hamilton
was bombarding Mount Vernon with letters strikingly lacking in the spirit of
humility. His claims were superior to those of Knox or Pinckney, and the
Federalists preferred him to the former.[1590] ‘If I am to be degraded beneath
my just claims in public opinion, ought I acquiesce?’ he wrote the
sympathetic Pickering.[1591] To McHenry he wrote that he would not
surrender the first place to which he ‘had been called by the voice of the
country’;[1592] to Washington that the Federalists of New England favored
him over Knox.[1593]
All the while the three leading members of the Cabinet were concocting
plans for the humiliation of Adams, taking their orders from Hamilton, who,
from his law office in New York, was directing the fight of the President’s
trusted advisers against their chief. One day the angels looked down and
smiled through tears on the spectacle of McHenry writing a letter to Knox
fixing his status, from a model in the handwriting of Alexander Hamilton.
[1594] As Adams stubbornly held his ground, one by one all the
Hamiltonians of consequence were drawn into the conspiracy against him.
One evening the secretarial conspirators sat about a table phrasing a
persuasive note to Adams which Wolcott, the most consummate deceiver of
the three, should sign and send as his personal view. ‘Public opinion’
favored Hamilton, Washington preferred him, and ‘Knox [has] no popular
character even in Massachusetts.’[1595] Having dispatched this cunning
letter, Wolcott immediately wrote his real chief in New York that ‘measures
have been taken to bring all right,’ and requesting Hamilton neither to do nor
to say anything ‘until you hear from me.’[1596] Another little caucus of
conspirators in Boston: present, Cabot, Ames, and Higginson; purpose, the
framing of a letter to Adams that Cabot should sign, assuring the President
of a ‘remarkable uniformity of sentiment’ in New England for Hamilton
over Knox.[1597] Having sent this letter, Cabot wrote confidentially to
Pickering suggesting that General Wadsworth, who was ‘accustomed to tell
[Knox] his faults,’ should be enlisted in the cause.[1598] Meanwhile
Pickering, more sinister, if less deceptive than the others, was seeking to
intimidate his chief by having Hamiltonian Senators declare that the officers
had been confirmed with the understanding that Hamilton stood at the head.
[1599]
All this time, Iago-like letters were going forth from members of the
Cabinet to Washington conveying the impression that Adams was
contemptuously indifferent to the great man’s wishes. The effect was all that
could have been desired. In a surprisingly offensive note, Washington wrote
peremptorily to the President demanding to know ‘at once and precisely’
what was to be expected.[1600] Such a letter from a less popular idol would
have elicited an answer sharp and decisive; but, taking discretion for the
wiser course, Adams swallowed his pride and wrote a conciliatory note, not
neglecting, however, to remind the man who had presided over the
Constitutional Convention that under the Constitution the President, and no
one else, ‘has the authority to determine the rank of the officers.’[1601] Thus
the issue was closed, with Hamilton triumphant, but with Adams awaiting
only an opportunity for revenge. The tiny cloud that had appeared in the
beginning of the Administration was now dark and large and threatening.

II

Having won with Hamilton, the Federalist leaders now turned to another
part of their programme—the rigid exclusion of Jeffersonians from
commissions in the army. This was to be a Federalist war, nothing less. Even
Washington, who had, by this time, become a partisan Federalist, was in
sympathy with the view that the friends of Jefferson, Madison, Hancock, and
Sam Adams should be proscribed. This appears in his consultations with
John Marshall as to the personnel of the army,[1602] and in a letter to
McHenry referring to the ‘erroneous political opinions’ of an applicant.[1603]
This enlistment of Washington in the proscriptive policies of the Federalists
is directly traceable to the Iagos who were writing him all the while.
Hamilton was solemnly assuring him that the Democrats were ‘determined
to go every length with France’ and to ‘form with her a perpetual offensive
and defensive alliance and to give her a monopoly of our trade.’[1604]
Thus one day Adams sat in conference with Washington on the
organization of the army. Knowing Aaron Burr as a brave and able officer
anxious to fight, he wished to recognize the Democrats by giving him a
commission. Washington, much under the influence of Hamilton, conceded
Burr’s capacity, but opposed his appointment because he was a master of
intrigue. Through the mind of Adams, hampered in his plans at every turn,
flashed the vivid memory of how his predecessor had forced him to
humiliate his own friends in the appointment of Hamilton—‘the most
restless, impatient, artful, indefatigable, and unprincipled intriguer in the
United States.’ But—as he afterward wrote—he was ‘not permitted to
nominate Burr.’[1605] Here again the traitors in the Cabinet had played their
part.[1606]
But the war was not to be national, but Federalist. ‘Every one of them
[Democrats] ought to be rejected, and only men of fair property employed in
the higher and more confidential grades,’ wrote a Federalist Representative
to Wolcott.[1607] When Adams’s son-in-law applied for a commission his
application was held until he sent a certificate that he had not interfered in a
gubernatorial election in New York.[1608] So zealously did the minor
politicians enter into this policy of proscription that some of the wiser
leaders began to take alarm. Even a friend of McHenry at Baltimore was
moved to protest. ‘They seemed to imagine that nothing was left to be done
but to exterminate every one who had been on the Democratic side’ he
complained.[1609] Even Hamilton finally thought fit to call for a moderation
of the programme. ‘It does not seem advisable,’ he wrote McHenry, ‘to
exclude all hope and to give to appointments too absolute a party
feature.’[1610] But there was no relenting in party circles, and no one had
done more to arouse this fanatical spirit than Hamilton himself.
The climax of stupidity was reached in the case of Frederick A.
Muhlenberg, former Speaker of the House, a leader and oracle among the
Germans of Pennsylvania, but no blind follower of Federalism. In a spirit of
pure patriotism he had personally offered the service of his sword to Adams,
whose wish to accept it was again thwarted by Washington, acting under the
inspiration of the Federalist leaders. Whereupon Muhlenberg marched with
the Germans as a body into the Jeffersonian camp and enlisted for another
war.[1611]
Under this proscriptive program the Jeffersonians remained mute but for
a few sarcastic comments in their press. ‘General Washington must have
some very keen reflection,’ said the ‘Independent Chronicle,’ ‘in taking
command of the army of the present day, in seeing so many new friends who
were his old enemies during the Revolution.’[1612] When it was reported that
Robert Goodhue Harper had been made Commissioner-General, it chortled,
‘What lawyer would not plead for such a fee?’[1613] And it had reflected on
Adams’s ‘pretence’ for piety in connection with his appointment of
Hamilton, ‘who published a book to prove that he was an adulterer.’[1614]
Bitter as were the reflections of Adams on reading such observations, it
could have mattered little to Hamilton. Everything he had started out to get
he got. He wanted a war with France—and got it. He wanted the command
directly under Washington as he had wanted nothing else in his life—and got
it, by striding to his sword over the humiliated pride of the President. He
wanted an army of fifty thousand men, and, if he fell short in this, he
nevertheless had an army. He was on the crest of the wave, the most
powerful man in America, and he was happy.

III

Feeling that supreme fortune was within his grasp, Hamilton threw all his
enthusiasm and vitality into the task of perfecting the army and organizing
the Nation for war. ‘The law has abandoned him, or rather he has forsaken
it,’ wrote a friend to King.[1615] Preparing the plan for the fortification of
New York Harbor, he personally superintended its execution. He had worked
out to the minutest detail the organization of the army and all he lacked was
men and a declaration of war. But alas, he was confronted on every hand by
disheartening difficulties. The recruiting fell pathetically short of
anticipations, the War Department under the Secretary of his own choosing
was pitifully inefficient, and, while the army was woefully below the
provisions of Congress, even the fragment was not adequately clothed or
provisioned, and there was a deficiency of tents. In a rage, Hamilton wrote
angrily to McHenry: ‘Why, dear friend, why do you suffer the business of
providing to go on as it does? Every moment proves the insufficiency of the
existing plan and the necessity of auxiliaries. I have no doubt that at
Baltimore, New York, Providence, and Boston additional supplies of
clothing may promptly be procured and prepared by your agents, and it
ought to be done, though it may enhance the expense. ‘Tis terrible ... that
there should be wants everywhere. So of tents. Calls for them are repeated
from Massachusetts where better and cheaper than anywhere else they can
certainly be provided.’[1616]
The truth is that the hysteria for getting at the throat of the French
democracy was over almost as soon as it began, and the masses commenced
to reflect on the cost, as the war measures grew apace. Jefferson, noting the
increasing boldness of opposition in Pennsylvania, where petitions were
signed by four thousand people protesting against the Alien and Sedition
Laws, standing armies, and extraordinary war powers for the President, and
observing similar unrest in New Jersey and New York, and ‘even in New
Hampshire,’ was fearful of insurrection. ‘Nothing could be so fatal,’ he
wrote. ‘Anything like force would check the progress of public
opinion.’[1617]
When Wolcott tried to float a loan, he found the moneyed men cold to the
regular legal rate of interest, for their patriotic passion had suffered a chill
when it came to cash. After all, business was business, and why should the
Federalist men of money fail to get in on the profits? It was not hard to
persuade Wolcott, who had a sentimental weakness for the financiers, and he
could see nothing unreasonable in a demand for eight per cent. The rates for
stocks were good, commercial prospects were alluring, and after all, eight
per cent would be but ‘moderate terms.’ Adams, sore from the unmerciful
pummeling from his party, was outraged at such a rate,[1618] but Wolcott
persisted—it was the only way. War was war as business was business.
Finally, in sheer disgust, Adams capitulated to necessity with the
exclamation: ‘This damned army will be the ruin of this country; if it must
be so, it must; I cannot help it. Issue your proposals as you please.’[1619]
When Hamilton had urged that all the resources of revenue be seized upon,
Adams thought him mad, but it soon became evident that something of the
sort would be necessary.[1620]
Aha, said the ‘Independent Chronicle,’ ‘ “millions for defence but not one
cent for tribute.” This has been the language of those who are in favor of
war. The patriotism of such persons is every day becoming more and more
evident. A loan of five million has been attempted, but instead of the old
legal rate of six per cent these modern patriots have required the moderate
premium of Eight. At this rate we shall soon verify the first part of the
motto, viz., “millions for defence,” but whether the latter is not violated by
the extra interest is left to the decision of those who are to bear the
burdens.’[1621] And they who were to pay the piper gave an acquiescent nod.
The taxes which the war party had levied with such patriotic abandon
aroused bitter resentment. Among the Germans of Pennsylvania, the taxes on
houses, lands, and windows were considered the beginning of a system
which would extend to everything. The immediate outcome was an
insurrection led by John Fries, an ignorant son of a German farmer, and the
marching of the troops and the easy dissipation of the incipient rebellion
against the assessors.[1622]
About that time Hamilton arrived in Philadelphia. ‘For what purpose?’
inquired ‘The Aurora.’ ‘Can it be to foment another insurrection and thereby
to increase the energies of the Government? What distinguished citizen is
there in the counties of Northampton and Bucks that he wishes to glut his
vengeance upon? Does he wish that Easton may be burned to afford him a
pretext for military execution?’[1623] If there were no executions, the people
had a touch of military rule. A troop of horse from Lancaster committed
outrages on citizens at Reading, and Jacob Schneider, a local editor,
commented with severity upon their actions. On their return through
Reading these troops went to the editor’s office, tore his clothing from his
back, dragged him to the Market House, and were preparing to give him
twenty-five lashes when troops from Philadelphia interfered.[1624] The
brutality of the soldiers shocked the country. The prisoners taken on the
expedition were treated with the same unnecessary cruelty which marked the
treatment of the rebels in the Whiskey Insurrection. Ignorant or besotted
with partisan passion, under a lax discipline, and contemptuous of the civil
government, many soldiers strutting about in uniforms, insulting and
attacking citizens, convinced the majority of the people that the
Jeffersonians were right in their observations upon the evils of standing
armies.
No one had denounced these excesses with greater vehemence than
William Duane, editor of ‘The Aurora.’ One day some petty officers in
uniforms, swords and pistols on their persons, said by Duane to have
numbered thirty and by his enemies to have been fifteen, entered his office.
With drawn pistols the compositors and pressmen were driven into a corner
and kept at bay by a part of the assailants. Some grasped and held Duane’s
hands while others beat him over the head with the butt end of a pistol. Then
with ten gallant soldiers participating in the assault on the one man, he was
brutally dragged downstairs into Franklin Court, where the assault was
repeated. He was knocked down and kicked. The editor’s request to be
permitted to fight any one of them was ignored, and had not his sixteen-year-
old son thrown himself across his father’s body, and a number of Democrats
arrived to give battle, he would have been murdered in cold blood. That
night armed Democrats went to the ‘Aurora’ office prepared to give shot for
shot if an attempt should be made to destroy the plant.[1625] ‘Porcupine’
chortled, and young Fenno declared that ‘the punishment of this caitiff is of
no more consequence than that of any other vagabond.’ Besides, did not
every one know that ‘the infernal Aurora and the United Irishman who
conducts it’ were ‘expressly chargeable with the Northampton
Insurrection?’[1626]
With such encouragement from the organs of the Administration, these
outrages by soldiers soon became commonplace wherever they were
assembled, with uniformed ruffians swaggering down the streets pushing
civilians into the gutters, taking liberties with women, picking quarrels while
drunk, and slashing and lunging with dirk and sword.[1627] This bullying
spirit affected the petty officers and reached a climax when civil officials,
armed with a warrant for a thief who had escaped to the soldiers near
Philadelphia, were literally kicked out of the camp, their warrant cursed and
trampled.[1628] With the tide rising rapidly against both the war and the
army, the recruiting lagged. Adams in later years recalled that the army was
as unpopular ‘as if it had been a ferocious wild beast let loose upon the
nation to devour it.’[1629] With the recruiting officers putting forth their
utmost efforts, ‘with all the influence of Hamilton, reënforced by the
magical name of Washington,’ they were unable to ‘raise one half of their ...
little army.’[1630] Duane wrote that before the law creating the army passed
‘there were 15,000 applications for commissions—since the passing of the
law there have been only 3000 soldiers.’[1631] There is more than a touch of
irony in the fact that while the Administration papers were vilifying the
Irish, ‘three fifths of the men enlisted were Irish immigrants.’[1632]
But there was another reason for the failure in recruiting—the people
soon concluded that some one had cried ‘wolf’ when there was no wolf. No
one, including Hamilton, believed that France had the most remote notion of
warring on the United States. The impression grew that the army was
intended for purposes other than the protection of the country from a foreign
foe. Meanwhile, the taxes were bearing hard, the national debt was mounting
and the passion for peace returned. Right gallantly the war party sought to
reawaken the fine frenzy of the hysterical days of the X Y Z papers. The
preachers were as distressed over the possibility of peace as the politicians,
and a convention of ministers in Boston issued a war cry. ‘You will see by
these things that the clergy are not asleep this way,’ wrote a Massachusetts
man to Wolcott. ‘They ought everywhere to be awake.’[1633] From the New
York ‘Commercial Advertiser’ came a pathetic attempt to sweep back the
rising tide for peace: ‘The necessity in times like the present in cherishing
the war spirit ... is evident.’[1634] Apropos of the report that the French were
ready to make every concession to our interest and pride, the ‘Centinel’ in
Boston sent forth the warning, ‘The trying time is now approaching’;[1635]
but the rabble, as the masses were called, could see nothing distressing in
winning a war without the loss of a drop of blood. Fenno’s ‘Gazette,’
commenting on the business stagnation, promised that ‘a war with France
would within two months revivify every department of society, commerce
would be invigorated, the funds would rise, and every employment of life
would receive new vigor.’[1636] This sordid note he was soon to strike again.
[1637] But it was all unavailing. The enlistments dwindled to nothing,
common soldiers were actually cheering the Democratic Governor in the
streets of Philadelphia, no one feared an invasion, and, as Wolcott confided
to Fisher Ames, ‘no one has thought it prudent to say that the army is kept to
suppress or prevent rebellions.’[1638] To make matters all the worse,
desertions multiplied until the harassed McHenry was writing Hamilton
urging executions. The little rhymester was far beyond his depths, scolded
by Washington, kicked like a flunky by Hamilton in one or two letters a day.
But the idea of shooting a deserter was a bit too high-toned for Hamilton.
‘There must be some caution,’ he wrote, ‘not to render our military system
odious by giving it the appearance of being sanguinary.’[1639] Adams was
prepared for extreme measures, but it was decided to leave the decision with
Hamilton and McHenry—which meant with Hamilton. ‘If the virtuous
General Hamilton is determined upon shooting every soldier who deserts,’
said ‘The Aurora,’ ‘Billy Wilcox’s court martial will be kept at pretty
constant duty. In a Daily Advertiser of last week no less than ten of these
strayed gentlemen are advertised for apprehension at $10 a head.’[1640]
But Hamilton was too wise to shoot.

IV

The war cry was sinking to a hoarse whisper when Dr. James Logan, who
had entertained the Washingtons, and who was a follower of Jefferson,
quietly slipped out of Philadelphia one day and sailed for France—and the
war hawks were in a frenzy. When Logan, at his own expense and wholly on
his own volition, went to Paris, it was to determine the state of the public
mind there for himself. He was a leading citizen, his family familiar to
society, his home one of the most cultured in the community, and, aside from
being a friend of the French democracy, he was a Quaker and an enemy of
war. He felt that the country had been deceived by war propaganda, and he
determined to find out for himself.
The war wing of the Federalist Party knew that an investigation in Paris
was the one thing they could not afford. No one knew better that war was
unnecessary and that the French were ready if not eager to recede. Harrison
Gray Otis knew it best of all because his fellow Federalist of Boston and
classmate, Richard Codman, was writing him from Paris of the French
disposition for peace and conciliation. But this was being carefully
concealed from the American people. Thus, when Logan sailed it was
clearly the cue for the war party to hint darkly of weird conspiracies with the
French and a factional embassy from the Democrats. Soon Harper, who had
a supersensitive nose for conspiracies and treason, was hinting mysteriously
on the floor of the House of a traitorous correspondence between the French
Directory and the Jeffersonian Party. The truth is that, when Logan foolishly
made a mystery of his departure and almost surreptitiously stole out of
Philadelphia, he carried letters from Jefferson and Governor McKean. Four
or five days before his departure he had informed Jefferson of his purpose
and asked for letters of introduction and a certification of his citizenship. It
was not a secret that Jefferson was opposed to a preventable war, but no
instructions were given the Doctor, no communication was sent by Jefferson,
and there was no conspiracy at all.[1641] Thus, on his own volition Logan
went to Paris, talked with Otis’s Federalist friend Codman and other
Americans, conversed with leading Frenchmen, dined with Merlin, met
Talleyrand, and ascertained, as he had expected, that peace could be
preserved with honor. A simple, honest man, with none of the crooked
mental twists of the professional politician, he returned with the confident
expectation that the President and his advisers would be glad to get the
benefit of his observations. He reached Philadelphia to find himself the
object of immeasurable abuse.
Not doubting that Pickering would be glad to have his impressions,
Logan went first to him. This was, in truth, a ludicrous performance, and a
Federalist paper was moved to mirth because he had ‘actually unfolded his
budget to Pickering’ and ‘needless to say’ returned ‘with a bug in his
ear.’[1642] Going on to Trenton, the temporary seat of government, he saw
Washington, to be received with more than his customary coldness. He had a
message from Lafayette to Washington. ‘Aye,’ said the General. And one
from Kosciusko. ‘Aye,’ said Washington. Whereupon Logan courteously
proffered him the use of his home, which the Washingtons had often found
agreeable, while in Philadelphia, to have his offer curtly declined. Even
Pinckney haughtily refused the use of Logan’s carriage when the General
was seeking a conveyance to the capital. ‘This fellow Logan had the
unparalleled effrontery to offer the General a seat in his carriage,’ sneered a
war paper.[1643] Some historians insist that Adams treated him
contemptuously, and this seems probable in the light of the latter’s letter to
Pickering,[1644] albeit Gibbs records that Adams was much impressed with
Logan’s story and with his sincerity and candor.[1645] The letter was written
to Pickering, however, before the interview was granted.
When Congress met, Logan found himself the subject of a bitter debate
brought on by the introduction of the so-called ‘Logan Law’ prohibiting
unofficial meddling in international affairs. Harper had followed his cue and
found his conspiracy. Logan had actually presented a paper to the Directory
as from one having authority. The story was all too thin, the facts too badly
twisted, and the Jeffersonians under the leadership of Gallatin showed their
teeth. The climax came when Harper read the paper which Logan was
presumed to have presented. Then, through frank letters in ‘The Aurora,’
Logan brought out the truth to the discomfiture of the war hawks. In view of
the scurvy treatment he has received, his own statement is one of value. He
had been met at Hamburg by Lafayette, who had furnished him with the
means to proceed to Paris. There he found negotiations at an end. Knowing
no law, ‘moral or political,’ that prevented him from serving his country, he
had sought interviews with leading characters and found France anxious for
peace. Whereupon he had suggested the lifting of the embargo on American
shipping detained in French ports and the release of American sailors held
prisoners. He had not gone to Paris ‘at the direction or on the request or on
the advice of any person whatever.’ He went for his own pleasure, on his
own views, and at his own expense.[1646] Not only had the memorial Harper
had read to the house not been presented by him, it had not been written by
him, but by a good Federalist who was an intimate friend and correspondent
of Harrison Gray Otis, and he had refused the request to present it on the
ground of its ‘having too much the appearance of an official act.’[1647] The
absolute veracity of this story was known to Otis, who was intimate with
Harper, for he had a letter from Codman in verification, and to the effect that
Logan had told Talleyrand that in the event of war all parties in America
would rally around the Government ‘and oppose all its enemies.’[1648]
Thus there was a conspiracy, a peculiarly ugly conspiracy, of the war
hawks to ruin an honest, patriotic, if Quixotic man because of his
interference with their plans to manufacture a needless and therefore a
criminal war.
But there was a special reason for the war party’s rage over Logan. About
this time Elbridge Gerry, one of the three envoys, who had stayed over in
Paris on the invitation of Talleyrand, had returned with a similar story. The
Federalists had been outraged by his failure to leave with his colleagues, and
on his return to his home in Cambridge he found himself socially ostracized.
Adams, who was his friend, had severely condemned him for continuing his
conferences in Paris.[1649] So bitter was the feeling against him, that the war
party did not scruple to terrorize his family in his absence. His wife received
anonymous letters charging that a woman was responsible for his lingering
in Paris. With only women and children in his house, their nights were made
hideous with yells and bonfires under their windows; and one morning Mrs.
Gerry looked out of the window on a miniature guillotine smeared with
blood. On his return, Gerry had gone to Philadelphia and left his dispatches,
which Pickering had published with his intemperate comments. The
Federalists were well pleased with Pickering’s excoriation.
And Jefferson? So different was his conception of public opinion that he
was delighted. Seizing upon the Gerry correspondence as a complete answer
to the X Y Z papers, he wrote Edmund Pendleton that it was too voluminous
for the masses, and urging him to prepare ‘a capitulation ... stating
everything ... short, simple, and leveled to every capacity ... so concise, as,
omitting nothing material, may yet be printed in handbills, of which we
could print and disperse ten or twelve thousand copies under letter covers,
through all the United States by the members of Congress when they return
home.’[1650]
Meanwhile, Gerry had hastened to Quincy, and in the rambling frame
house of the President was going over the situation with him.

The restoration of peace with France would mean the end of the army
created with so much expense and trouble. So determined were the
Hamiltonians on war that they were ready to wreck the Federalist Party on
the issue. Many explanations have been offered. Wolcott had hinted in his
letter to Ames that an army was wanted for domestic use.[1651] That was the
common charge of the Democrats. That there was another and more
portentous reason we may be sure, albeit the public, and even John Adams,
was ignorant of it.
At that time a queer little Latin-American soldier of fortune, Francesco de
Miranda, was living in London, playing about Downing Street, and
conferring with Rufus King, the American Minister, who, next to Morris,
was the ablest of Hamilton’s lieutenants. There was a possibility that at any
time England might be forced to war on Spain should that country enter into
the struggle on the side of France. The United States was then engaged in a
quarrel with Spain. It was the idea of Miranda to enlist England and the
United States in a grand revolutionary scheme in South America. He had
discussed it with the British Ministers and with King, who was in
correspondence with Hamilton. It involved an alliance between the English-
speaking countries. This had been hinted at, as we have seen, long before, by
Hamilton in a letter to Pickering, who was in favor of entering into such an
alliance without delay. It was the plan of Miranda for England to furnish the
ships, not exceeding twenty, men and money; the United States to supply no
less than seven thousand soldiers, two thousand of these being cavalry. The
lure of Florida and Cuba was held out to the United States.[1652] Here was a
grand scheme of conquest that appealed irresistibly to Hamilton’s ambition
for military glory.[1653] Entirely unknown to Adams or Washington,
Hamilton had been in correspondence with the soldier of fortune, and in
communication with him through King who was managing the London end
of the affair. He made it plain to King that in the event of a successful issue
he would want the United States to be the principal agency. ‘The command
in this case would very naturally fall upon me, and I hope I should
disappoint no favorable anticipations,’ he wrote. He thought the country not
quite ripe for the enterprise, but ‘we ripen fast, and it may, I think, be rapidly
brought to maturity if an efficient negotiation for the purpose is at once set
on foot.’[1654] To Miranda he was writing that he would not embark in the
affair ‘unless patronized by the Government of this country.’ An army of
twelve thousand men was being raised. ‘General Washington has resumed
his station at the head of our armies, I am second in command.’[1655] In the
autumn of 1798, he was writing Senator Gunn on the importance of heavy
cannon for fortifications and mortars in the case of a siege. ‘If we engage in
war our game will be to attack where we can. France is not to be considered
as separated from her ally. Tempting objects will be within our grasp.’[1656]
In January, 1799, Hamilton was writing Otis in the same strain. ‘If universal
empire is still to be the pursuit of France, what can tend to defeat that
purpose better than to detach South America from Spain.... The Executive
ought to be put in a situation to embrace favorable conjunctures for effecting
that separation.’[1657] With all this Pickering was familiar and in sympathy,
but Adams was in total ignorance. In time the subject was cautiously
broached to him, to be rejected with the curt notation that we were not at war
with Spain. But the record is too clear to leave the South American project
out of consideration in seeking the reason for the intense desire for war—and
a large army. Through all this period, Hamilton had visions of himself on
horseback, at the head of troops in South America, with England as an ally.
[1658]
Never had Hamilton felt himself so near the top of the world. When
Congress met in the fall of 1798, he had a plan ready for a complete change
in the formation of the Nation. This provided for eighty United States
District Courts;[1659] the division of old States into new ones for any
territory having as many as 100,000 people on the request of any
considerable number—which would or could have made seven States out of
Virginia; and for the extension and more rigid enforcement of the Sedition
Law.
It was on this state of affairs that Adams, perplexed, harassed, worried by
the serious illness of Abigail, aching under the humiliations visited upon him
by the bosses of his party, meditated during the summer and early fall of
1798. And he thought seriously, too, on what Gerry had told him of the
temper of France.

VI

This had almost persuaded him that a new mission to France was feasible,
when a letter from Murray at The Hague, indicating uneasiness in Paris lest
the United States be forced into an alliance with England, convinced him.
Thus, about the middle of October, in a letter to Pickering, he submitted two
questions for the consideration of the Cabinet. ‘Should there be a declaration
of war?’ ‘Could proposals for further negotiations be made with safety, and
should a new envoy be named, prepared to sail on assurances that he would
be received?’
That letter fell like a bomb in the camp of the war conspirators. How
Pickering must have scowled, and McHenry grumbled, and Wolcott
shrugged his shoulders with a cynical grin when they sat down to meditate
on its meaning. That more important personages were informed we may be
sure. To that note, however, the Cabinet did not deign to reply. Had not
Adams declared that he would never send another envoy unless solemnly
assured that he would be received? No such assurance had come. Then why
discuss it—even on the request of the President? However, a Message would
have to be sent to Congress, and with Adams in a conciliatory frame of mind
it was imperative that something definite await him on his arrival. Thus the
conspirators sat down to the framing of a Message that would defeat the very
purpose the letter had indicated. Hamilton and Pinckney were summoned to
the conference. The result was a paragraph putting it squarely up to France
to take the initiative in the matter of a renewal of negotiations. Wolcott, who,
better than any of the others, could hide his treachery behind an ingratiating
urbanity, was put forward as the author. Reaching the capital, Adams
summoned his Cabinet to go over the Message. All went well until the
fateful paragraph was reached, and instantly the keen eye of the suspicious
old man caught its full significance. That, he would not accept, and an open
struggle began. With earnestness and even heat the obnoxious paragraph was
urged upon him, but Adams planted his feet and stood. He would rewrite
that paragraph to conform to his personal view of the proprieties.[1660]
The Cabinet conspirators retired with the realization that there were dark
days ahead. Adams in his substitute held forth the olive branch to the extent
of declaring that no new envoy would be sent unless assurances were
forthcoming that he would be properly received. Washington, Hamilton, and
Pinckney, in uniforms, sat in the chamber when the Message was read. Two
of these, at least, had grave forebodings. Then it was that the conspirators
determined to override Adams by meeting his plan for negotiations with an
immediate declaration of war. A caucus of the Federalists was called. The
most brilliant and fiery orators were primed for the occasion. The proposal
was made and supported with eloquence. The vote was taken, and by a small
majority Adams triumphed over his foes. This was the most significant
incident yet—it meant that Hamilton had lost control of the party councils.
[1661] With that knowledge, Pickering made no further attempt to conceal his
bitter hostility to his chief. Ordered to prepare a treaty that would be
acceptable, he ignored the request. Asked to moderate his report on the

You might also like