Full download Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition Rajiv Pandey file pdf all chapter on 2024

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Artificial Intelligence and Machine

Learning for EDGE Computing 1st


Edition Rajiv Pandey
Visit to download the full and correct content document:
https://ebookmass.com/product/artificial-intelligence-and-machine-learning-for-edge-c
omputing-1st-edition-rajiv-pandey/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Sustainable Developments by Artificial Intelligence and


Machine Learning for Renewable Energies Krishna Kumar

https://ebookmass.com/product/sustainable-developments-by-
artificial-intelligence-and-machine-learning-for-renewable-
energies-krishna-kumar/

Visualization Techniques for Climate Change with


Machine Learning and Artificial Intelligence Arun Lal
Srivastav

https://ebookmass.com/product/visualization-techniques-for-
climate-change-with-machine-learning-and-artificial-intelligence-
arun-lal-srivastav/

Risk Modeling: Practical Applications of Artificial


Intelligence, Machine Learning, and Deep Learning
Terisa Roberts

https://ebookmass.com/product/risk-modeling-practical-
applications-of-artificial-intelligence-machine-learning-and-
deep-learning-terisa-roberts/

Cracking the Code: Introduction to Machine Learning for


Novices: Building a Foundation for Artificial
Intelligence 1st Edition Sarah Parker

https://ebookmass.com/product/cracking-the-code-introduction-to-
machine-learning-for-novices-building-a-foundation-for-
artificial-intelligence-1st-edition-sarah-parker/
Predicting Heart Failure : Invasive, Non-Invasive,
Machine Learning, and Artificial Intelligence Based
Methods 1st Edition Kishor Kumar Sadasivuni

https://ebookmass.com/product/predicting-heart-failure-invasive-
non-invasive-machine-learning-and-artificial-intelligence-based-
methods-1st-edition-kishor-kumar-sadasivuni/

Artificial Intelligence and Machine Learning in the


Travel Industry: Simplifying Complex Decision Making
Ben Vinod

https://ebookmass.com/product/artificial-intelligence-and-
machine-learning-in-the-travel-industry-simplifying-complex-
decision-making-ben-vinod/

Artificial Intelligence and Quantum Computing for


Advanced Wireless Networks Savo G. Glisic

https://ebookmass.com/product/artificial-intelligence-and-
quantum-computing-for-advanced-wireless-networks-savo-g-glisic/

Python Debugging for AI, Machine Learning, and Cloud


Computing: A Pattern-Oriented Approach 1st Edition
Vostokov

https://ebookmass.com/product/python-debugging-for-ai-machine-
learning-and-cloud-computing-a-pattern-oriented-approach-1st-
edition-vostokov/

Artificial Intelligence and Deep Learning in Pathology


1st Edition Stanley Cohen Md (Editor)

https://ebookmass.com/product/artificial-intelligence-and-deep-
learning-in-pathology-1st-edition-stanley-cohen-md-editor/
Artificial Intelligence and Machine
Learning for EDGE Computing
This page intentionally left blank
Artificial Intelligence
and Machine Learning
for EDGE Computing

Edited by
Rajiv Pandey
Amity University, Lucknow, India

Sunil Kumar Khatri


Amity University, Tashkent, Uzbekistan

Neeraj Kumar Singh


Department of Computing and Applied Mathematics, INPT-ENSEEIHT / IRIT, Toulouse, France

Parul Verma
Amity University, Lucknow, India
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2022 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).

Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using
any information, methods, compounds, or experiments described herein. In using such information or methods
they should be mindful of their own safety and the safety of others, including parties for whom they have a
professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability
for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or
from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
ISBN 978-0-12-824054-0

For information on all Academic Press publications


visit our website at https://www.elsevier.com/books-and-journals

Publisher: Mara Conner


Acquisitions Editor: Chris Katsaropoulos
Editorial Project Manager: Isabella C. Silva
Production Project Manager: Maria Bernard
Cover Designer: Christian Bilbow

Typeset by STRAIVE, India


Contents

Contributors xv 2 What are regression and classification


Preface xix problems? 23
3 Learning algorithms 25
3.1 Linear regression 25
3.2 Logistic regression 25
Part I 3.3 Decision tree 26
4 Evaluation metrics 26
AI and machine learning 4.1 Mean square error 27
4.2 Root mean square error 27
1. Supervised learning
4.3 Confusion matrix 27
Kanishka Tyagi, Chinmay Rane, and 4.4 Accuracy 28
Michael Manry 4.5 Recall 28
1 Introduction 3 4.6 Precision 28
2 Perceptron 3 4.7 F1 score 28
3 Linear regression 4 5 Supervised learning to detect fraudulent
3.1 Training a linear regression 5 credit card transactions 29
3.2 Steepest descent 6 5.1 Data exploration 29
3.3 Conjugate gradient 6 5.2 Data preprocessing 30
4 Logistic regression 8 5.3 Fitting and evaluation 30
4.1 Softmax classifier 9 6 Supervised learning for hand writing
5 Multilayer perceptron 9 recognition 30
5.1 Structure and notation 10 7 Conclusion 32
5.2 Initialization 11 References 32
5.3 First-order learning algorithms 11
5.4 Second-order learning 3. Unsupervised learning
algorithms 14
6 KL divergence 15 Kanishka Tyagi, Chinmay Rane,
Raghavendra Sriram, and Michael Manry
7 Generalized linear models 16
8 Kernel method 17 1 Introduction 33
9 Nonlinear SVM classifier 17 2 k-means clustering 33
10 Tree ensembles 17 3 k-means++ clustering 35
10.1 Decision trees 17 4 Sequential leader clustering 36
10.2 Random forest 18 5 EM algorithm 37
10.3 Boosting 20 6 Gaussian mixture model 38
References 21 7 Autoencoders 39
7.1 AEs: Structure, notations, and
2. Supervised learning: From theory training 39
to applications 7.2 Variants of AEs 41
8 Principal component analysis 41
Ashish Tiwari
8.1 Generic PCA derivation 42
1 Introduction 23 8.2 Advantages of PCA 44
1.1 Supervised learning 23 8.3 Assumptions behind PCA 45
1.2 Unsupervised learning 23 8.4 Comments 45

v
vi Contents

9 Linear discriminant analysis 47 5.4 PC3 dataset 72


9.1 Algorithm 47 5.5 KC1 dataset 72
9.2 Derivation of LDA algorithm 47 6 Threats to validity 72
9.3 PCA vs. LDA 48 6.1 Threats to internal validity 72
9.4 Comments and programmers 6.2 Threats to external validity 74
perspective 48 7 Conclusions 74
10 Independent component analysis 49 References 74
10.1 Limitations of ICA 49
10.2 Assumptions 51
References 51 6. Learning in sequential
decision-making under
4. Regression analysis uncertainty
Kanishka Tyagi, Chinmay Rane, Manu K. Gupta, Nandyala Hemachandra,
Harshvardhan, and Michael Manry and Shobhit Bhatnagar
1 Introduction 53 1 Introduction 75
2 Linear regression 55 2 Multiarmed bandit problem 76
3 Cost functions 56 2.1 Applications 76
3.1 MSE 56 2.2 Algorithms for multiarmed bandit
3.2 MSLE 56 problem 76
3.3 RMSE 56 2.3 Nonstationary environment 78
3.4 MAE 56 3 Markov decision process planning
4 Gradient descent 57 problem 79
5 Polynomial regression 58 3.1 Multiarmed bandits and MDP
6 Regularization 60 planning problem 79
6.1 Ridge regression 60 4 Reinforcement learning 80
6.2 Lasso regression 60 4.1 RL and MDP planning problem 80
6.3 Dropout 60 4.2 Model-free RL algorithms 82
6.4 Early stopping 60 4.3 Model-based RL algorithms 82
7 Evaluating a machine learning model 61 4.4 RL in nonstationary environment 83
7.1 Bias-variance trade-off 62 5 Summary 84
7.2 R-squared 63 Acknowledgments 84
7.3 Adjusted R-squared 63 References 85
References 63

5. The integrity of machine learning 7. Geospatial crime analysis and


algorithms against software defect forecasting with machine
prediction learning techniques
Param Khakhar and Rahul Kumar Dubey Boppuru Rudra Prathap

1 Introduction 65 1 Introduction 87
2 Related works 66 2 Related work 87
3 Proposed method 66 2.1 Motivation and objective of the
3.1 Overview 66 research 89
3.2 KMFOS 67 2.2 Literature-based problem
3.3 Dataset 68 identification 90
4 Experiment 69 2.3 List of crime keywords considered 90
4.1 Design 69 3 Methodology 90
4.2 Evaluation metrics 69 3.1 Implementation of the process 91
5 Results 69 3.2 Proposed analytic approach 91
5.1 Hyperparameters 69 4 Results and discussion 92
5.2 Individual algorithms 70 4.1 India: Crime visualization using nave
5.3 PC4 dataset 71 Bayes and K-means algorithms 92
Contents vii

4.2 Geo-space-crime visualization 10 Summary 117


(hotspot detection)—Bangalore using 11 Conclusions 117
nave Bayes and K-means 12 Future enhancements 118
algorithms 94 Acknowledgments 118
4.3 Analysis of geospatial crime density References 118
using the KDE algorithm—India and
Bangalore 95
4.4 Time series analysis using ARIMA 9. Reliable diabetes mellitus
model 97 forecasting using artificial
5 Conclusions 101 neural network multilayer
References 101 perceptron
8. Trust discovery and information Vijayalakshmi Saravanan, Megha Nivurruti,
Ketaki Barde, Anju S. Pillai, and
retrieval using artificial intelligence Isaac Woungang
tools from multiple conflicting
sources of web cloud computing 1 Introduction 121
2 Related works 121
and e-commerce users
3 Methodology 122
P. Solainayagi, G.O. Jijina, K. Sujatha, 3.1 Challenges in applying machine
N. Kanimozhi, N. Kanya, and S. Sendilvelan learning algorithms 122
1 Introduction 103 4 Building the diabetic diagnostic
1.1 Trustworthiness of online or web criteria 122
information 103 5 Evaluating the diabetes outcomes using
2 Trusted computing 104 classification algorithms 127
2.1 Computational trust 104 5.1 Improving the accuracy of SVM and RF
2.2 Trust process 104 algorithms 128
3 Problem identification 105 5.2 ANN: Multilayer perceptron 130
4 Truth content discovery algorithm 105 6 Conclusions 130
5 Trustworthy and scalable service References 131
providers algorithm 106
5.1 TSSP system architecture 106
5.2 Graphical representation 106 10. A study of deep learning approach
5.3 Flow diagram of TSSP 107 for the classification of
6 Efficient feature extraction and electroencephalogram (EEG) brain
classification (EFEC) algorithm 107 signals
6.1 Graphical representation of the EFEC
Dharmendra Pathak, Ramgopal Kashyap, and
algorithm 109
Surendra Rahamatkar
6.2 Data flow diagram of EFEC
algorithm 109 1 Introduction 133
7 QUERY retrieval time (QRT) 110 2 Methods 134
7.1 Programming environment 111 3 Results 135
7.2 Comparison with state-of-the-art 3.1 EEG dataset 135
methods 111 3.2 Implementation domain 135
8 Trust content discovery and trustworthy 3.3 EEG recordings and data
and scalable service providers augmentations 136
algorithm 112 3.4 Data preprocessing techniques 136
8.1 Simulation result 113 3.5 Deep learning architectures 137
8.2 System execution time (SET) 113 3.6 Performance evaluations 139
8.3 Communication cost (CC) 113 3.7 Comparative analysis 140
8.4 Trust score (TS) 114 4 Discussion 141
9 Efficient feature xtraction and 4.1 Rationale 141
classification (EFEC) algorithm and 4.2 Proposed architecture to overcome the
customer review datasets 115 challenges 142
9.1 Performance evaluation matrix 115 5 Conclusions 143
9.2 Accuracy and F-measure 117 References 143
viii Contents

11. Integrating AI in e-procurement of 1.3 Blockchain trust builder attributes 171


hospitality industry in the UAE 2 Applications of artificial intelligence,
machine learning, and blockchain
Elezabeth Mathew and Sherief Abdulla technology 171
1 Introduction 145 2.1 Flag bearers of blockchain
2 Problem statement 146 technology 171
3 Authors’ contributions 147 2.2 Flag bearers of artificial intelligence
4 Significance of the study 147 and machine learning 173
5 Theoretical framework 148 2.3 Flag bearers of blockchain and
6 Research aims and objectives 149 artificial intelligence 173
7 Literature review 150 2.4 Blockchain initiatives by the
7.1 Big data business analytics in the government of India 175
hospitality industry 151 2.5 Current application areas of
7.2 BDBA itself has two dimensions: Big blockchain with artificial
data (BD) and business analytics intelligence 175
(BA) 152 3 It takes two to tango: Future of artificial
7.3 Deep learning and machine learning intelligence and machine learning in
techniques in the hospitality blockchain technology 176
industry 152 3.1 Sustainability 176
7.4 Ecosystem in hospitality 153 3.2 Scalability 176
7.5 Predictive analysis in the hospitality 3.3 Security 176
industry 154 3.4 Privacy 176
7.6 Agent-based technology (ABT) in the 3.5 Adaptability 176
hospitality industry 155 3.6 Efficiency 177
8 Major findings 156 3.7 Transaction speed 177
8.1 Statistics of the trend in 3.8 Performance 177
publishing 156 3.9 Validation of various elements 177
8.2 Major areas of research 157 3.10 Maintainability 177
8.3 Content analysis in the selected 3.11 Scope estimation 177
publications 158 3.12 Cost estimation 177
8.4 New proposed conceptual 3.13 Effort estimation 177
framework for the hospitality 3.14 Project-specific modus operandi 177
industry 158 4 Edge computing: A potential use case of
8.5 Conceptual model for e-procurement blockchain 178
in the hospitality industry 160 4.1 Edge computing architectures 178
8.6 Comparing various studies 161 4.2 Flag bearers of edge computing 181
8.7 Case study 161 4.3 Applications of blockchain technology
8.8 Interview and survey with subject in edge computing 183
matter expert(s) 162 5 Conclusions 183
8.9 Interview and survey validation 162 Acknowledgment 184
9 Discussions 163 References 184
10 Major gaps in the study 164
11 Conclusions 164 Part II
References 165
Data science and predictive
analysis
12. Application of artificial intelligence
and machine learning in 13. Implementing convolutional
blockchain technology neural network model for
Zeeshan Ali Siddiqui and Mohd Haroon prediction in medical imaging
1 Introduction 169 Rajiv Pandey, Archana Sahai,
and Harsh Kashyap
1.1 Blockchain characteristics 169
1.2 Advantages of blockchain 170 1 Introduction 189
Contents ix

1.1 Deep learning against machine 5 Result and discussion 217


learning 189 5.1 Graphical representation of both
1.2 Deep learning algorithms 190 features and the normalized
2 Convolutional neural networks 190 datasets 217
2.1 Computer image recognition 190 5.2 Principal component analysis
2.2 Image classification 191 result 218
2.3 Why convolutional neural 5.3 The decision boundaries of the SVM,
networks? 191 K-NN, RF, LDA, and CART training
2.4 Functional description of a CNN 192 results 223
3 Implementing CNN for biomedical 5.4 Performance evaluation of training
imaging and analysis 197 results of the five models using ROC,
3.1 Importing the essential python libraries specificity, and sensitivity 223
and Keras library 197 5.5 K-fold cross-validation results 226
3.2 Printing the folder name by using the 5.6 Testing results of the SVM, K-NN, RF,
library’s list directory function 197 LDA, and CART models for fire
3.3 Image generation for evaluation 198 outbreak prediction 229
3.4 Implementing CNN through high-level 6 Conclusions 232
library Keras 199 References 232
3.5 Making CNN model 199
3.6 Analysis of accuracy and result 201 15. Vehicle telematics: An Internet of
3.7 Plotting accuracy and loss graph for Things and Big Data approach
each epoch process 202
4 Architecture models for different image Mukul Singh, Rahul Kumar Dubey, and
Swarup Kumar
type 203
4.1 VGG 16 203 1 Introduction 235
4.2 VGG on chest X-ray dataset 203 2 Big Data 235
5 Conclusion 206 2.1 Definition and characterization 235
6 Future scope 206 2.2 Challenges with Big Data
References 206 analytics 237
2.3 Big Data architecture 237
14. Fuzzy-machine learning models 3 Big Data with cloud computing 238
for the prediction of fire 3.1 Cloud computing 238
outbreaks: A comparative analysis 3.2 Cloud computing with Big Data 240
4 Internet of Things (IoT) 240
Uduak A. Umoh, Imo J. Eyoh, 5 Vehicle telematics 241
Vadivel S. Murugesan, and 5.1 Definition and overview 241
Emmanuel E. Nyoho
5.2 How a telematics system works 241
1 Introduction 207 5.3 Architecture of a telematics
2 Related literature 208 system 241
3 Research methodology 210 5.4 Issues with the telematics system 242
3.1 Data acquisition 211 5.5 Vehicle telematics and Big Data use
3.2 Data label estimation using interval cases 242
type-2 fuzzy logic 211 5.6 Vehicle telematics data
3.3 Data normalization 213 description 243
3.4 Feature selection and dimensionality 6 Case study—Vehicle reaction time
reductions 214 prediction 243
4 Machine learning algorithms for fire 6.1 Dataset 243
outbreak prediction 214 6.2 Data preprocessing 244
4.1 Support vector machine 214 6.3 Sequence formation 244
4.2 K-nearest neighbor 215 6.4 Feature selection 244
4.3 Random forest 215 6.5 Prediction 248
4.4 Linear discriminant analysis 215 6.6 Training the model 250
4.5 Classification and regression tree 216 6.7 Evaluating the model 251
4.6 K-fold cross-validation 217 6.8 End notes 252
x Contents

7 Conclusions 253 2 Literature review 279


References 253 3 Theoretical background 280
3.1 Edit distance 280
16. Evaluate learner level assessment 3.2 Embeddings 280
in intelligent e-learning systems 4 Modeling 281
using probabilistic network model 4.1 Modified Levenstien distance (edit
score) 281
Rohit B. Kaliwal and Santosh L. Deshpande 4.2 Embedding cosine score 282
1 Introduction 255 4.3 Ensemble model 282
2 Related work 256 5 Experimental settings 282
3 Contribution of intelligent e-learning 5.1 Datasets 282
system using BN model 256 5.2 Evaluation tasks 283
3.1 Outline of intelligent tutoring 5.3 Evaluation metrics 283
systems 256 6 Results and discussion 283
3.2 Methods of handling uncertainty 258 6.1 Evaluation of baseline models 283
3.3 Bayesian network (BN) 258 6.2 Evaluation of ensemble models 284
4 Learner assessment model 260 7 Conclusions 286
4.1 Design model 261 References 286
5 Results and discussions 263
6 Conclusions and future work 264 19. Neural hybrid recommendation
References 265 based on GMF and hybrid MLP
Lamia Berkani, Sofiane Zeghoud, and
17. Ensemble method for Imene Lydia Kerboua
multiclassification of COVID-19
1 Introduction 287
virus using spatial and frequency
2 Theoretical background and related
domain features over X-ray images works 288
Anju Yadav, Rahul Saxena, Vipin Pal, 2.1 Recommender systems 288
Ashray Gupta, Parth Arora, Josh Agarwal, and 2.2 Machine learning- and deep learning-
Anuj Diwedi based recommendation 288
1 Introduction 267 3 Neural hybrid recommendation
1.1 Contribution and organization of (NHybF) 289
paper 267 3.1 Description of the model layers 290
2 Literature review 268 3.2 Training 292
3 Proposed methodology 269 4 Experiments 294
3.1 Dataset description 269 4.1 Implementation of the recommender
3.2 Preprocessing 269 system 294
3.3 Feature extraction 269 4.2 Evaluation metrics 294
3.4 Supervised classifiers 271 4.3 Datasets 294
4 Result analysis 272 4.4 Evaluation results 295
4.1 Feature extraction methods analysis for 4.5 Discussion 302
the multiclassification 273 5 Conclusions 302
5 Discussion and conclusions 276 References 302
5.1 Discussion 276
5.2 Conclusions 276 20. A real-time performance
References 276 monitoring model for processing
of IoT and big data using machine
18. Chronological text similarity with learning
pretrained embedding and edit Eesha Mishra and Santosh Kumar
distance
1 Introduction 305
R. Shree Charran, Rahul Kumar Dubey, and 1.1 Monitoring system using IoT-based
Shashi Jain
sensors 305
1 Introduction 279 1.2 Big data processing 306
Contents xi

1.3 Involvement of machine learning in 4 Results and discussion 334


manufacturing industries 306 4.1 Development of the deep learning
2 Experimental study 306 neural network model 334
2.1 System modeling 306 4.2 Development of fuzzy controller for
2.2 System implementation 306 AHS 334
2.3 Fault detection prediction model 306 4.3 Development of the hybrid deep
3 Major findings 309 learning neuro-fuzzy model 336
3.1 Monitoring system 309 5 Validation of model 339
3.2 IoT-based sensor performance 309 6 Discussions on performance
3.3 Big data processing performance 309 evaluation 339
3.4 Fault detection prediction model 309 7 Conclusions 339
4 Conclusions 313 8 Future scope 340
References 313 References 340

21. COVID-19 prediction from chest 23. An intelligent framework to assess


X-ray images using deep core competency using the level
convolutional neural network prediction model (LPM)
Shambhavi Sharma S. Nithya, M. Sangeetha, and
K.N. Apinaya Prethi
1 Introduction 315
1.1 Contributions of this study 316 1 Introduction 343
1.2 Literature review 316 2 Related work 343
2 Methodology 317 2.1 Summary of limitations 344
2.1 Dataset development 317 2.2 Limitations that are considered for
2.2 Data augmentation 317 design 344
2.3 Proposed architecture 318 3 Existing applications 344
2.4 Model development 319 3.1 JAGRAN JOSH computer GK quiz 345
3 Results and discussions 320 3.2 EDU ZIP the knowledge hub 345
4 Conclusions 322 3.3 TREE KNOX computer quiz 345
References 323 4 Proposed system 345
Further reading 323 4.1 Architecture of the system 345
4.2 Experimental setup 346
22. Hybrid deep learning neuro-fuzzy 5 Experimental 350
networks for industrial parameters 5.1 Classical methods of conducting
tests 350
estimation
5.2 Exam conducted through the level
K. Sujatha, G. Nalinashini, R.S. Ponmagal, prediction model 350
A. Ganesan, A. Kalaivani, and Rajeswary Hari 5.3 Comparison of the classic exam
1 Introduction 325 method and the level prediction
1.1 Literature survey 326 model 351
1.2 Research gaps 327 6 Conclusions 352
1.3 Objectives of this work 327 References 352
2 Preliminaries 327
2.1 Deep learning neural network (DNN)
controller 328 Part III
2.2 Fuzzy logic controller 329 Edge computing
2.3 Hybrid deep learning neuro-fuzzy
logic controller (HDNFLC) 330 24. Edge computing: A soul to Internet
3 Methodology 331 of things (IoT) data
3.1 Development of the deep learning
neural network (DNN) model 331 Vaishali Singh, Ajay Kumar Bharti, and
3.2 Development of the fuzzy logic (FLC) Nilesh Chandra
model 332 1 Introduction 355
3.3 Hybrid deep learning neuro-fuzzy 2 Edge computing characteristics 355
system 333 2.1 Dense geographical distributions 355
xii Contents

2.2 Mobility support 356 8 Pertinent open issues which require


2.3 Location awareness 356 additional investigations for edge
2.4 Proximity 357 computing 369
2.5 Low latency 357 8.1 Privacy and security 369
2.6 Heterogeneity 357 8.2 Convergence and consistency 370
3 New challenges in Internet of technology 8.3 Managing edge resources 370
(IoT): Edge computing 357 8.4 Software and hardware updates 370
3.1 Data aggregation amount and rate of 8.5 Service delivery and mobility 370
IoT devices 357 8.6 Cost 370
3.2 Latency 357 8.7 Collaborations between
3.3 Network bandwidth constraints 358 heterogeneous edge computing
3.4 Resource constrained devices 358 systems 370
3.5 Uninterrupted services with 9 Conclusions 370
intermittent connectivity to the References 371
cloud 358
3.6 Security challenges 358 25. 5G: The next-generation
3.7 Scalability 359 technology for edge
3.8 Privacy 359 communication
3.9 Domination of few stakeholders
(monopoly vs. open IoT Nilesh Chandra, Vaishali Singh, and
Ajay Kumar Bharti
competition) 359
4 Edge computing support to IoT 1 Introduction 373
functionality 359 2 History 374
4.1 Device management 360 2.1 1G: That is where it all started 375
4.2 Security 360 2.2 2G: Cultural revolution 375
4.3 Priority messaging 360 2.3 3G: “Pack-switching” version 376
4.4 Data aggregation 360 2.4 4G: Broadcast time 376
4.5 Data replication 361 2.5 5G: Internet of things age 376
4.6 Cloud enablement 361 3 5G technology 377
4.7 IoT image and audio processing 361 3.1 1G: Radio access network 378
5 IoT applications: Cloud or edge 3.2 Core network 378
computing? 361 4 5G cellular network 378
6 Benefits and potential of edge computing 5 Components used in 5G technology/
for IoT 363 network 379
6.1 Low latency 364 5.1 3GPP on 5G 379
6.2 Less power consumption by IoT 5.2 Spectrum for 5G and frequency 379
devices 364 5.3 MEC (multiaccess edge
6.3 Simpler, cheaper devices 364 computing) 380
6.4 Bandwidth availability and efficient 5.4 NFV (network function virtualization)
data management 364 and 5G 380
6.5 Network connectivity 364 5.5 5G RAN architecture 380
6.6 Network security 365 5.6 eCPRI 381
6.7 Autonomy 365 5.7 Network slicing 381
6.8 Data privacy 365 5.8 Beamforming 381
6.9 Data filtering/prioritization 365 6 Differences from 4G architecture 381
6.10 Support to 5G technology 365 6.1 Worldwide adoption of 5G 382
7 Use case: Edge computing in IoT 365 7 Security of 5G architecture 382
7.1 Autonomous vehicles 365 8 5G time period 382
7.2 Smart cities 366 9 Case study on 5G technology 382
7.3 Smart grid 366 9.1 5G use cases and services 383
7.4 Industrial manufacturing 367 9.2 The 5G project use cases 383
7.5 Health care 367 9.3 Smart mobility 388
7.6 Cloud gaming 368 10 5G advancement 389
7.7 Augmented reality devices 368 10.1 Superspeed 389
Contents xiii

10.2 Increased bandwidth 390 27. State of the art for edge security in
10.3 Global wide coverage 390 software-defined networks
10.4 Our own world will be a Wi-Fi
zone 390 Shailesh Pramod Bendale,
Jayashree Rajesh Prasad, and
10.5 Improved battery life 390 Rajesh Shardanand Prasad
11 Advantage and disadvantage of 5G
technology 391 1 Introduction 411
11.1 Important benefits 391 2 Hybrid software-defined networks 412
11.2 Other benefits of common 3 Security challenges in hybrid software-
people 391 defined networks 413
11.3 Disadvantages 391 4 Solutions for hybrid software-defined
12 Challenges 391 networks 415
12.1 Technological challenges 392 4.1 QoS (quality of service) 415
12.2 Common challenges 392 4.2 DDoS (distributed denial-of-service)
13 Future scope 393 attack 415
14 Conclusions 393 4.3 MITM (man In the middle) attack 415
References 393 4.4 Programmable network solution 415
4.5 ARP poisoning 415
26. Challenges and opportunities in 4.6 DoS (denial-of-service) attack 415
edge computing architecture using 4.7 Botnet attacks 416
4.8 Platforms for hybrid software-defined
machine learning approaches
networks 416
Naman Bhoj and Robin Singh Bhadoria 5 Learning techniques for hybrid software-
defined networks 417
1 Introduction 395
5.1 Machine-learning techniques 417
2 Overview of edge computing 396
5.2 Supervised learning 417
2.1 Architecture of edge computing 396
5.3 Unsupervised learning 419
2.2 Use cases of edge computing 397
5.4 Deep learning 420
2.3 Advantages of edge computing 398
6 Discussion and implementation 420
3 Security and privacy in edge
7 Conclusions 422
computing 399
References 422
4 Intersection of machine learning and
Further reading 424
edge using enabling technologies 399
4.1 Defining AI, ML, DL 399
4.2 Enabling technologies for machine
learning and edge computing 400 28. Moving to the cloud, fog, and edge
5 Machine learning and edge bringing AI to computing paradigms:
IoT 402 Convergences and future research
6 OpenVINO toolkit 403 direction
6.1 Example of edge computing
K. Rajkumar and U. Hariharan
architecture for malaria detection 405
6.2 Edge computing architecture 1 Introduction 425
developed by industry pioneers 405 2 Features and differences between cloud,
7 Challenges in machine learning and edge fog, and edge computing 426
computing integration 406 2.1 Cloud computing 426
7.1 Different data distribution 406 2.2 Edge computing (EC) 427
7.2 Discovering edge node 406 2.3 Fog computing 428
7.3 Secure usage of edge nodes 407 3 Framework and programming
7.4 Heterogeneity in data 407 models: Architecture of fog
7.5 Energy consumption of edge computing 428
devices 407 3.1 Framework as well as programming
8 Conclusions 407 models: Data modeling within fog
References 407 computing 429
xiv Contents

4 Moving cloud to edge computing 431 2.3 Proposed blockchain-enabled smart


4.1 The necessity for edge computing 431 grid framework 457
4.2 Challenges in industries that are 2.4 Result discussion 460
different 431 2.5 Proposed work benefit 464
5 Case study: Edge computing for 2.6 Comparative analysis 464
intelligent aquaculture 435 3 Conclusions 465
5.1 Technology considerations 436 References 465
5.2 Guide architectures 437
5.3 Logically centralized control 30. AI cardiologist at the edge
plane 437
5.4 Architectural considerations Marjan Gusev
that are shaping future edge 1 Introduction 469
computing 439 2 Related work 470
6 Conclusions 441 2.1 Internet of medical things 470
References 441 2.2 Health-care edge computing IoT
solutions 470
2.3 ML and DL with edge computing 470
29. A comparative study on IoT-aided 3 Architectural approach 471
smart grids using blockchain 3.1 Postcloud architectures 471
platform 3.2 Dew computing solution 471
3.3 Autonomous AI-based solution 471
Ananya Banerjee 4 ECGalert use case 472
1 Introduction to smart grid, IoT role, and 4.1 Functional description 472
challenges of smart grid 4.2 AI solution at the edge 473
implementations 443 5 Discussion 474
1.1 Introduction 443 5.1 Challenges 475
2 Secure smart grid using blockchain 5.2 Benefits and disadvantages 475
technology 456 6 Conclusions 475
2.1 Blockchain’s opportunities and References 476
emerging solutions in energy
sector 456
2.2 Blockchain-based smart grid 457 Index 479
Contributors

Numbers in parenthesis indicate the pages on which the authors’ Santosh L. Deshpande (255), Department of Computer
contributions begin. Science & Engineering, Visvesvaraya Technological
Sherief Abdulla (145), Faculty of Engineering and University, Belagavi, Karnataka, India
Informatics, British University in Dubai, Dubai, United Anuj Diwedi (267), Manipal University Jaipur, Jaipur,
Arab Emirates Rajasthan, India
Josh Agarwal (267), Manipal University Jaipur, Jaipur, Rahul Kumar Dubey (65, 235, 279), Robert Bosch
Rajasthan, India Engineering and Business Solutions Private Limited,
K.N. Apinaya Prethi (343), Department of CSE, Bengaluru, Karnataka, India
Coimbatore Institute of Technology, Coimbatore, Imo J. Eyoh (207), Department of Computer Science,
Tamilnadu, India University of Uyo, Uyo, Akwa Ibom, Nigeria
Parth Arora (267), Manipal University Jaipur, Jaipur, A. Ganesan (325), Department of EEE, RRASE College of
Rajasthan, India Engineering, Chennai, Tamil Nadu, India
Ananya Banerjee (443), Department of Computer Science, Ashray Gupta (267), Manipal University Jaipur, Jaipur,
Kalyani Government Engineering College, Kalyani, Rajasthan, India
West Bengal, India
Manu K. Gupta (75), Department of Management Studies,
Ketaki Barde (121), M.S (Data Science), Rochester IIT Roorkee, Roorkee, India
Institute of Technology, Rochester, NY, United
States Marjan Gusev (469), Ss Cyril and Methodius University in
Skopje, Faculty of Computer Science and Engineering,
Shailesh Pramod Bendale (411), SKNCOE, Research Skopje, North Macedonia
Centre, Savitribai Phule Pune University, Pune,
India Rajeswary Hari (325), Department of Biotechnology, Dr.
MGR Educational & Research Institute, Chennai,
Lamia Berkani (287), Laboratory for Research in Arti- Tamil Nadu, India
ficial Intelligence, Department of Artificial Intelligence
and Data Sciences, Faculty of Informatics, USTHB Uni- U. Hariharan (425), Department of Computer Science and
versity, Algiers, Algeria Engineering, Apex Institute of Technology, Chandigarh
University, Mohali, Punjab, India
Robin Singh Bhadoria (395), Dept. of Computer Science
& Engineering, Birla Institute of Applied Sciences Mohd Haroon (169), CSE Department, Integral Uni-
(BIAS), Bhimtal, Uttarakhand, India versity, Lucknow, India
Ajay Kumar Bharti (355, 373), Department of Computer Harshvardhan (53), Department of Civil Engineering,
Science, Babu Banarasi Das University, Lucknow, Indian Institute of Technology, Delhi, India
India Nandyala Hemachandra (75), Industrial Engineering and
Shobhit Bhatnagar (75), Industrial Engineering and Oper- Operations Research, IIT Bombay, Mumbai, India
ations Research, IIT Bombay, Mumbai, India Shashi Jain (279), Department of Management Studies,
Naman Bhoj (395), Dept. of Computer Science & Engi- Indian Institute of Science, Bengaluru, Karnataka, India
neering, Birla Institute of Applied Sciences (BIAS), G.O. Jijina (103), Department of Electronics and Commu-
Bhimtal, Uttarakhand, India nication Engineering, Aarupadai Veedu Institute of
Nilesh Chandra (355, 373), Department of Computer Technology, Chennai, India
Science, Maharishi University of Information Tech- A. Kalaivani (325), Department of CSE, Saveetha School
nology, Lucknow, India of Engineering, SIMATS, Chennai, Tamil Nadu, India

xv
xvi Contributors

Rohit B. Kaliwal (255), Department of Computer Science Rajiv Pandey (189), Amity Institute of Information Tech-
& Engineering, Visvesvaraya Technological Uni- nology, Lucknow, Uttar Pradesh, India
versity, Belagavi, Karnataka, India Dharmendra Pathak (133), Amity School of Engineering
N. Kanimozhi (103), Department of Computer Applica- and Technology, Amity University Chhattisgarh,
tions, A.V.C. College of Engineering, Mayiladuthurai, Raipur, Campus, India
India Anju S. Pillai (121), Department of Electrical and Elec-
N. Kanya (103), Department of Information Technology, tronics Engineering, Amrita School of Engineering,
Dr. M.G.R. Educational and Research Institute, Amrita Vishwa Vidyapeetham, Coimbatore, India
Chennai, India R.S. Ponmagal (325), Department of CSE, School of Com-
Ramgopal Kashyap (133), Amity School of Engineering puting, SRM Institute of Science & Technology, Kat-
and Technology, Amity University Chhattisgarh, tankulathur, Chennai, Tamil Nadu, India
Raipur, Campus, India
Jayashree Rajesh Prasad (411), School of Engineering,
Harsh Kashyap (189), Amity University, Lucknow, Uttar MIT Art, Design & Technology University, Pune, India
Pradesh, India
Rajesh Shardanand Prasad (411), School of Engineering,
Imene Lydia Kerboua (287), Institute of Communication, MIT Art, Design & Technology University, Pune, India
University Lumière Lyon 2, Lyon, France
Boppuru Rudra Prathap (87), Computer Science and
Param Khakhar (65), Department of Computer Science Engineering, CHRIST (deemed to be University), Ben-
and Engineering, Indian Institute of Technology Delhi, galuru, Karnataka, India
New Delhi, Delhi, India
Surendra Rahamatkar (133), Amity School of Engi-
Santosh Kumar (305), Department of Computer Engi- neering and Technology, Amity University Chhat-
neering & Information Technology, Swarrnim Startup tisgarh, Raipur, Campus, India
& Innovation University, Gandhinagar, Gujarat, India
K. Rajkumar (425), Department of Computer Science and
Swarup Kumar (235), Robert Bosch Engineering and Engineering, Jain University, Faculty of Engineering
Business Solutions Private Limited, Bengaluru, Kar- Technology, Bangalore, Karnataka, India
nataka, India
Chinmay Rane (3, 33, 53), Quantiphi, Inc., Marlborough,
Michael Manry (3, 33, 53), Department of Electrical Engi- MA, United States
neering, The University of Texas at Arlington,
Arlington, TX, United States Archana Sahai (189), Amity Institute of Information Tech-
nology, Lucknow, Uttar Pradesh, India
Elezabeth Mathew (145), Faculty of Engineering and
Informatics, British University in Dubai, Dubai, United M. Sangeetha (343), Department of IT, Coimbatore
Arab Emirates Institute of Technology, Coimbatore, Tamilnadu, India
Eesha Mishra (305), Department of Computer Science & Vijayalakshmi Saravanan (121), Faculty, Rochester
Engineering, Maharishi University of Information Institute of Technology, Rochester, NY, United States
Technology, Lucknow, Uttar Pradesh, India Rahul Saxena (267), Manipal University Jaipur, Jaipur,
Vadivel S. Murugesan (207), Department of Industrial Rajasthan, India
Production Engineering, National Institute of Engi- S. Sendilvelan (103), Department of Mechanical Engi-
neering, Mysore, India neering, Dr. M.G.R. Educational and Research Institute,
G. Nalinashini (325), Department of EIE, RMD Engi- Chennai, India
neering College, Chennai, Tamil Nadu, India Shambhavi Sharma (315), Amity University, Noida, Uttar
S. Nithya (343), Department of CSE, Coimbatore Institute Pradesh, India
of Technology, Coimbatore, Tamilnadu, India R. Shree Charran (279), Department of Management
Megha Nivurruti (121), M.S (Data Science), Rochester Studies, Indian Institute of Science, Bengaluru, Kar-
Institute of Technology, Rochester, NY, United States nataka, India
Emmanuel E. Nyoho (207), Department of Computer Zeeshan Ali Siddiqui (169), CSE Department, Integral
Science, University of Uyo, Uyo, Akwa Ibom, Nigeria University, Lucknow, India
Vipin Pal (267), NIT Meghalaya, Shillong, Meghalaya, Mukul Singh (235), Indian Institute of Technology Delhi,
India Delhi, New Delhi, India
Contributors xvii

Vaishali Singh (355, 373), Department of Computer Kanishka Tyagi (3, 33, 53), Aptiv Advanced Research
Science, Maharishi University of Information Tech- Center, Agoura Hills, CA, United States
nology, Lucknow, India Uduak A. Umoh (207), Department of Computer Science,
P. Solainayagi (103), Department of Computer Science and University of Uyo, Uyo, Akwa Ibom, Nigeria
Engineering, Aarupadai Veedu Institute of Technology, Isaac Woungang (121), Ryerson University, Toronto, ON,
Chennai, India Canada
Raghavendra Sriram (33), Paccar Inc., Mt Vernon, WA, Anju Yadav (267), Manipal University Jaipur, Jaipur,
United States Rajasthan, India
K. Sujatha (103, 325), Department of Electrical and Elec- Sofiane Zeghoud (287), Department of Computer Science
tronics Engineering, Dr. M.G.R. Educational and and Engineering, School of Electronic Information and
Research Institute, Chennai, Tamil Nadu, India Electrical Engineering, Shanghai Jiao Tong University,
Ashish Tiwari (23), Masters in Computer Applications, Shanghai, China
Jamia Millia Islamia University, New Delhi, India
This page intentionally left blank
Preface

Artificial intelligence (AI) is not a new buzzword. The concept has been going hand in hand ever since the machines have
been considered for computational solutions. The question always remains the same; can we program a computer with all
the intricacies of human beings and can a computer be a replacement for human beings in certain places? The question is
still unanswerable, as we are still in the process of making computers smarter day by day.
Machine learning (ML) is a subset of AI. It is popular and used to analyze a huge amount of data that is being produced
by various applications. Nowadays, ML is one of the crucial aspects of versatile systems. Be it automation or making
systems intelligent to draw some inferences, ML is taking place concurrently. A variety of applications are exploiting
the potential benefits of ML like speech recognition, image recognition, medical diagnosis, fraud detection, prediction,
to name a few. The important aspect of ML is its iterative approach where models are adapted by exposure of a new
set of data every time. These models keep on learning and adapting from the previous decisions and results.
ML and predictive analytics have different approaches to any problem. The ML approach is versatile, liberal, more
adaptive toward various applications, whereas predictive analytics is automated through ML tools. Predictive analytics
works on historical data for making future predictions. It generates future insights with a significant degree of precision.
Predictive analytics is a wonderful tool that can use sophisticated models to forecast trends based on past and current data.
Predictive analytics helps organizations to plan strategically; for example, retailers use various predictive models to
forecast their inventory requirements, airlines make use of predictive analytics to forecast the price of their tickets. The
hospitality industry also makes use of predictive analytics to forecast the number of guests at any particular event. By pre-
dictive analytics campaigns, the organization can forecast customer responses and purchases for the promotion of cross-
selling. Human behavior analysis can also be performed using predictive analytics, which is used to predict criminal
behavior in human beings. Predictive analytics play a crucial role in versatile applications these days.
The use of predictive analytics in various applications has generated a demand for real-time analytics. A huge amount of
data mining and analytics is involved in the versatile domain and requires data to be stored and processed in cloud servers.
However, the coming decade is ready to witness the transformation of cloud computing to edge computing. Edge com-
puting refers to processing at the edge rather than processing at a central location like in cloud computing. Edge computing
processes the data near to the data source. Edge computing performs the computational task near the target devices. The
unlimited growth of data in the IoT setup and limitations of network layers are leading to the need for edge computing
scenarios. Edge computing processes the data physically close to the target devices, or on the device itself.
The major motive of edge computing is to deliver concrete data or information to the end users, in many of the use cases
especially healthcare, in real time. It is considered to be of great help in reducing the cost of connectivity by simply trans-
ferring data or information that is important instead of sending the bulk of raw data produced from various IoT sensors.
Besides this, filtering data and sending only crucial data to cloud/storage server reduces the load on the network and
decreases the need for computing resources.
Edge computing is considered an improvement over the cloud. It reduces the amount of data that must be transferred to
the cloud for processing and analysis purposes. The major benefit of edge computing is low latency, which is quite high in
comparison to cloud computing. Edge computing has an upper hand over cloud computing as it provides resource opti-
mization, reduction in network traffic, leading to a low risk of a data bottleneck.
Edge computing and cloud computing may work in unison to provide maximum benefits. The data are processed in
two parts, where real-time analytics is performed at the edge server and for complex data analytics, the cloud server is
involved. This combination may give better results as edge computing may perform better by reducing latency. This pro-
vides the context for this book, which aims to present current trends in the application of AI and ML in the IoT domain at
the edge. The book includes real-life use cases to demonstrate the application of various ML and predictive analytics
algorithms. The book also provides an insight into the edge computing scenario in various contexts.

xix
Another random document with
no related content on Scribd:
“Essex,” 32-gun frigate, her action with the “Alert,” ii. 35, 377;
arrives with despatches, 52, 56;
sails in July, 1812, 377;
returns to port, 378.
Essex county In Massachusetts, declaration of meeting, ii. 402.
Eustis, William, appointed Secretary of War, i. 9;
orders Wilkinson not to camp at Terre aux Bœufs, 172, 174;
authorizes Harrison to buy Indian land in the Wabash valley, ii.
82;
approves Harrison’s purchase, 85;
orders Harrison to preserve peace with Indians, 88, 93;
orders the Fourth Regiment to Indiana, 92, 93;
his lost letter of Sept. 18, 1811, to Harrison, 95;
appears before the Committee of Foreign Relations, 129;
his supposed incompetence, 168, 206, 392, 395, 396, 397,
398;
his duties in 1812, 168;
on recruiting, 294;
his letters to William Hull, announcing war, 299;
and ordering conquests in Canada, 302;
his orders to Dearborn to repair to Albany, 306, 308, 309;
and to take direction of militia at Niagara, 310, 321, 340;
resigns, 422.
Exchange, turn of, against England, in 1808, i. 47.

Fagan, agent of Fouché, i. 239.


“Federal Republican” newspaper, ii. 406, 407.
Federalist party, deprived of grievances, i. 77;
praise Madison, 78, 158;
make common cause with Jackson, 158;
described by Giles, 180.
Federalists, in Congress, Foster’s reports of their conduct and
advice, ii. 171–175;
their reception of Henry’s documents, 183, 184;
cease attempts to discuss war, 227, 228;
their attitude towards the war, 398, 399;
support Clinton for the presidency, 410.
Fenwick, John R., lieut.-colonel of Light Artillery, ii. 352.
Ferdinand VII., proposed kingdom for, in America, i. 239;
cedes Florida by treaty of 1819, ii. 236.
Fernandina in East Florida, seized by United States, ii. 240;
occupation disavowed and maintained, 242, 243.
Finances in 1809, i. 163, 178;
customs-revenue in 1807, 1808, 1809, 1810, 290, 319;
military and naval appropriations of the Eleventh Congress,
357;
in 1811; ii. 126;
Gallatin’s estimates for war, 156–159;
war-taxes proposed by Gallatin, 166;
approved by the House, 166, 167;
laid aside, 167, 168;
in 1812, 432, 433;
in 1813, 438–448.
(See Loans.)
Findlay, James, colonel of Ohio volunteers, ii. 298, 315, 326.
Findley, William, member of Congress from Pennsylvania,
favors war, ii. 145.
Florida, Napoleon’s retention of, i. 32, 33;
Napoleon insinuates an idea regarding, 408;
Foster instructed to protest against the seizure of, ii. 23;
his protest, 37;
Monroe’s reception of the protest, 38, 39.
Florida, East, Madison asks authority to occupy, i. 326, 327;
Congress authorizes occupation of, 327;
commissioners sent to take possession of, 327;
revolutionized, ii. 237–243;
bill for occupation of, 243.
Florida, West, revolution in, i. 307–315;
Madison orders occupation of, 310–312, 318;
Claiborne takes possession of, 313;
organized as part of Orleans Territory, 314;
protest of British chargé, 314, 315;
Giles’s bill for annexing to Orleans Territory, 320;
debate on annexation, 320–323;
Macon’s bill, admitting, as a part of Louisiana, 323, 324;
remains a separate territory, 326;
divided by act of Congress, ii. 236;
ceded by Spain in 1819, 237.
Forfeitures under the Non-importation act, ii. 436–443.
Fort Dearborn, Chicago, ii. 110, 294;
garrison massacred, 334.
Fort Erie, ii. 343, 347, 348, 358.
Fort George, ii. 300, 343, 347;
Brock’s headquarters, 341, 348, 349, 351.
Fort Harrison, ii. 95, 106, 294.
Fort Niagara, bombarded, ii. 355.
Fortifications, appropriation for, in 1809, i. 85;
appropriation asked for, in 1810, 319.
Foster, Augustus John, appointed British minister to the United
States, ii. 16, 21;
F. J. Jackson’s opinion of, 22;
his instructions, 22, 23;
arrives at Washington, 37, 52;
protests against the seizure of Florida, 37;
reports Monroe’s language about Spanish America, 38;
protests against the non-importation, 39;
narrows the issue to Fox’s blockade and the Orders in
Council, 40, 41;
reports Monroe’s language on the revocation of the French
decrees, 42;
threatens retaliation for the non-importation, 44;
reports that the Orders in Council are the single object of
irritation, 45;
settles the “Chesapeake” affair, 121, 122;
his report of executive temper in November, 1811, 131;
his report of Gallatin’s language about taxes, 156;
his report of the conduct of Federalists in Congress, 172–175;
receives instructions, March 21, 1812, 191;
communicates them, 192;
his report of Monroe’s remarks on recent French spoliations,
195, 198;
his report of Madison’s and Monroe’s remarks on the embargo
of April, 1812, 199;
suggests Madison’s re-election, 213.
Fouché, Joseph, Duc d’Otrante, Napoleon’s minister of police, i.
222;
opposes the commercial system, 224;
sends an agent to the British government, 238, 239;
disgraced and exiled, 241.
France, alienation between United States and, i. 28–41, 141–
151;
difficulties of commerce with, 152, 245;
value of spoliations in 1809, 1810, 242, 243;
contract with, 339, 340;
unfriendly language of the annual message toward, ii. 125;
Madison’s language regarding, 187, 218, 224;
theory of contract with, apparently abandoned, 223;
Monroe’s language regarding, 232.
(See Napoleon.)
Fremantle, Colonel, letter on the situation of Parliament, i. 58.
Frigates. (See Navy, “President,” “Constitution,” “United States,”
“Chesapeake,” “Congress,” “Constellation,” “Essex,” and
“Adams.”)
“Frolic,” British sloop-of-war, ii. 379;
her action with the “Wasp,” 380.
Fulton’s torpedo, i. 209.

Gallatin, Albert, Secretary of the Treasury, his appointment as


Secretary of State defeated, i. 4–8;
his quarrel with Samuel Smith, 10;
his conversation with Turreau about the Floridas, 38, 39;
his remarks to Turreau on renewing intercourse with Great
Britain, 74;
his letters on Erskine’s disavowal, 110, 111;
his expectations from Jackson’s mission, 110, 116, 117;
his feud with Giles, Smith, and Leib, 159;
his letter of remonstrance to Jefferson, 160, 161, 164;
his enemies, 167;
his annual report of 1809, 178;
his bill for excluding British and French ships, 183 (see
Macon);
his remarks on Napoleon’s secret confiscations, 259;
his remarks to Turreau on revival of non-intercourse against
England, 303;
gives notice of revival of non-intercourse against England,
304;
his annual report of 1810, 319;
his dependence on the bank, 329, 335;
asks an increase of duties, 357;
his letter of resignation, 360–366;
Serurier’s estimate of, ii. 46;
his annual report of November, 1811, 126;
attacked by Giles, 148, 149;
delays his estimates, 156;
his war-taxes, 156–159, 165, 166, 204;
reported June 26, 235;
his loan of 1812, 206, 207;
believed to think war unnecessary, 225;
complains of Congress, 234, 235;
reports tax-bills to Congress, 235;
his instructions at the outbreak of war, 301;
his opinion of Eustis, 397, 398;
claims department of State, 424;
his annual report of Dec. 5, 1812, 433, 438;
his views on the forfeiture of merchandise imported in 1812,
439, 440;
his attitude toward war-taxation, 446.
Gardenier, Barent, member of Congress from New York, his
remarks on Jefferson and Madison, i. 79, 80;
supports Macon’s bill, 185;
cause of changing rule of previous question, 353.
Gaudin, Duc de Gaete, orders of, i. 348.
George III., king of England, becomes insane, i. 288; ii. 2.
George, Prince of Wales, his Whig associations, ii. 3, 4;
becomes Prince Regent, Feb. 6, 1811, 14;
retains Spencer Perceval’s ministry, 14;
his audience of leave for William Pinkney, 16, 18–20;
his conditional declaration of April 21, 1812, that the Orders in
Council should be withdrawn, 254, 282.
Gerry, Elbridge, elected governor of Massachusetts in 1810 and
1811, i. 215; ii. 115;
defeated in 1812, 204;
nominated for the vice-presidency, 214;
elected, 413.
“Gershom,” American brig, burned by French squadron, ii. 193,
198.
Gholson, Thomas, member of Congress from Virginia, moves
new rule of previous question, i. 353.
Giles, William Branch, senator from Virginia, defeats Gallatin’s
appointment as Secretary of State i. 4–7;
votes for mission to Russia, 11;
his report on F. J. Jackson, 178, 179, 182, 183;
wishes energy of government, 180, 189;
his bill for the annexation of West Florida, 319, 320;
his speech on the Bank charter, 333;
his political capacity, 363;
reports bill for raising twenty-five thousand troops, ii. 147;
his speech attacking Gallatin, 148, 149;
his factiousness, 150;
his admission of errors, 154;
his speech on the volunteer bill, 161;
votes for war, 229;
votes against occupying East Florida, 243;
on seamen’s bill, 454.
Gore, Christopher, elected governor of Massachusetts in 1809,
i. 12;
invites F. J. Jackson to Boston, 213;
defeated in the election of 1810, 215;
and in 1811, ii. 115.
“Grace Ann Greene,” American vessel released by Napoleon, i.
391.
Graham, John, his account of public opinion in Kentucky, ii. 394.
Grandpré, Louis, i. 306, 307.
Grenville, Lord, on Canning, i. 49.
Grétry, i. 235.
Grundy, Felix, member of Congress from Tennessee, ii. 122,
137, 196;
on Committee of Foreign Relations, 124, 128;
his speech in favor of war, 137–141;
favors large army, 152;
opposes war-power, 161;
against frigates, 164;
on embargo, 201;
on the political effects of war, 213;
on forfeitures, 443;
reports bill for regulation of seamen, 452, 453.
“Guerriere,” British frigate, ii. 25;
“Little Belt” mistaken for, 26–30;
Captain Dacres of, 37;
joins Broke’s squadron, 368;
chases “Constitution,” 370;
captured by “Constitution,” 372–375.
Gunboats, i. 168.

Hamilton, Paul, appointed Secretary of the Navy, i. 9, 206;


his orders to Commodore Rodgers of June 9, 1810, ii. 26;
of May 6, 1811, 25;
his supposed incompetence, 169, 290, 395, 398;
his orders to Rodgers, Decatur, and Hull in June, 1812, 363–
365, 368;
his orders of September, 1812, 378;
resigns, 428.
Hammond, George, Under Secretary for Foreign Affairs, i. 45.
Hampton, Wade, brigadier-general in U. S. army, i. 169;
takes command at New Orleans, 175; ii. 291.
Hanson, A. C., ii. 407.
Harper, Robert Goodloe, ii. 144.
Harrison, Fort, ii. 95, 106, 294.
Harrison, William Henry, governor of Indiana Territory, ii. 68;
his account of Indian affairs, 69–73;
his treaties of 1804 and 1805, 75, 77;
his influence in the dispute about slavery in Indiana, 75–77;
his interview with the Prophet in August, 1808, 80;
his treaty of Sept. 30, 1809, 83, 84;
his interview with Tecumthe of Aug. 12, 1810, 85–88;
his letter to Tecumthe June 24, 1811, 90;
his talk with Tecumthe July 27, 1811, 91;
instructed to avoid hostilities, 93;
raises military forces, 93;
sends army up the Wabash valley, 94;
constructs Fort Harrison, 95;
marches on Tippecanoe, 97;
his arrival, 98–100;
his camp, 102;
attacked, 103;
his return to Vincennes, 106;
Humphrey Marshall’s opinion of, 107;
his estimate of the effect of his campaign, 107, 108;
appointed by Kentucky to command expedition to recover
Detroit, 392, 420;
unable to advance, 412.
Hauterive, Alexandre Maurice, Comte d’, charged with
negotiations with Armstrong, i. 140, 141.
Hawkesbury, Lord. (See Liverpool.)
Hay, George, his advice to Monroe, ii. 421.
Henry, John, secret agent of Sir James Craig, his report on
disunion, i. 14;
recalled, 86;
demands money, ii. 176;
comes to Boston, 177;
employs Crillon to negotiate with Monroe, 178;
obtains fifty thousand dollars, 179;
sails for Europe, 180;
papers of, 182;
supposed effect of, in Florida affairs, 241;
Holland, exempted from the non-intercourse, i. 72, 90–92, 112.
(See Louis Bonaparte.)
Holland, Lord, ii. 275.
Holstein, Duchy of, i. 413.
“Hornet,” sloop-of-war, brings despatches, ii. 215, 217;
cruises with Rodgers’ squadron, 365, 366;
at Boston, 378, 381;
her second cruise, 384;
blockades the “Bonne Citoyenne,” 384.
Howell, Jeremiah B., senator from Rhode Island, votes against
occupying West Florida, ii. 243.
Hull, Isaac, captain in U. S. navy, commands “Constitution,” ii.
364;
his orders, 364;
chased by a British squadron, 369–371;
captures “Guerriere,” 372–375;
takes command at New York, 383.
Hull, William, governor of Michigan Territory, ii. 292;
appointed brigadier-general, 292, 298;
his advice regarding the defence of Detroit, 296;
his march to Detroit, 298;
his loss of papers, 300;
arrives at Detroit, 301;
invades Canada, 302, 317;
his proclamation, 303;
his required campaign, 311;
decides to besiege Malden, 312–314;
sudden discovery of his danger, 314, 315;
evacuates Canada, 315;
his situation at Detroit, 322–329;
his capitulation, 332, 334;
Jefferson’s opinion of, 336, 398.

Illinois Territory, population in 1810, i. 289.


Impressment becomes a casus belli, ii. 116–118;
not expressly mentioned as such by Pinkney, 18;
or in the annual message, 125;
treated by House Committee of Foreign Relations, 134, 135;
mentioned by Grundy, 139;
by Madison’s war-message, 222;
only obstacle to peace, 430–432, 450–452;
extent of, 451, 452.
Impressments, i. 74, 292, 351, 352.
India, career of Marquess Wellesley in, i. 266.
Indiana Territory, population in 1810, i. 289;
created in 1800, ii. 68;
its dispute about the introduction of slavery, 75;
adopts second grade of territorial government, 76.
Indians in 1810, i. 318;
in the Northwest, ii. 69;
their condition described by Governor Harrison, 69;
trespasses on their territory, 70;
effects of intoxication upon, 71, 72;
murders committed upon, 72, 73;
Jefferson’s policy toward, 73–75;
Harrison’s treaties with, in 1804 and 1805, 75;
Tecumthe and the Prophet, 78;
Jefferson’s refusal to recognize them as a confederated body,
79;
establishment at Tippecanoe Creek, 79–81;
their hostility to cessions of land, 82, 87;
their land-cession of Sept. 30, 1809, 83, 84;
their outbreak imminent in 1810, 85;
outbreak delayed by British influence, 85;
their interview with Harrison, Aug. 12, 1810, 86–88;
government wishes peace with, 89;
of the Six Nations in Upper Canada, wish to remain neutral,
319;
their employment in war by the British, 320;
murders by, 393, 394.
Infantry, Fourth Regiment of, ordered to Indiana July, 1811, ii.
92, 93;
arrives, 94;
part of the expedition to Tippecanoe, 96;
losses in the battle, 104;
its share in the battle, 107;
ordered to Detroit, 110;
marches to Detroit, 298;
at the battle of Maguaga, 325.
Invisibles, the, i. 363.

Jackson, Francis James, his reputation, i. 96.


appointed British minister to the United States, 97;
his instructions, 99–105;
sails for America, 105;
Gallatin’s expectations from, 111, 117;
arrives at Washington, 115, 116;
his impressions, 117–120;
his negotiation, 120–132;
rupture with, 132;
his anger, 154, 155;
his complaints, 156;
his reception in Baltimore and New York, 157;
discussed before Congress, 176, 178, 179, 182;
his letters from New York and Boston, 212–218;
returns to England, 219;
his treatment by Wellesley, 218, 219, 269, 271, 272;
his influence with the British government, ii. 13;
his account of Pinkney’s “inamicable leave,” 20;
his opinion of Augustus J. Foster, 22;
his death, 22.
Jackson, Mrs. F. J., i. 115, 157.
“Java,” British frigate, her action with the “Constitution,” ii. 385,
386.
Jefferson, Thomas, Turreau’s anger with, i. 34;
Gallatin’s remarks on, 38, 39;
the “National Intelligencer” on, 75;
Randolph’s remarks on, 78;
Robert Smith’s remarks on, 84;
intermediates with Monroe, 161, 162;
expenditures of his administration, 200, 205, 206;
considered too timid by Robert Smith, ii. 48;
his Indian policy, 69, 73–75, 78, 79, 81;
his opinion of William Hull, 336, 398;
his expectation of the conquest of Canada, 337;
his opinion of Van Rensselaer, 398.
Jesup, Thomas S., acting adjutant-general at Detroit, ii. 329.
Johnson, Richard Mentor, member of Congress from Kentucky,
i. 197, 203; ii. 122;
his war speech, 142;
on the dangers of a navy, 164;
on the treason of opposition, 212.
Jones, Jacob, captain in U. S. navy, commands the “Wasp,” ii.
379;
his action with the “Frolic,” 380;
captured, 381;
takes command of the “Macedonian,” 383.
Jones, Walter, his letter to Jefferson, on dissensions in
Madison’s Cabinet, i. 188.
Jones, William, appointed Secretary of the Navy, ii. 428, 429.

Kentucky, enthusiasm for the war, ii. 390;


number of men in the field, 391, 393;
distaste for the regular army, 391, 394.
Key, Philip Barton, member of Congress from Maryland, i. 185.
King, Rufus, his supposed opposition to Clinton, ii. 410.

Labouchere, i. 238, 239.


Lambert, Henry, captain of the British frigate “Java,” ii. 385, 386.
Langdon, John, of New Hampshire, nominated for the Vice-
Presidency, ii. 214.
Lansdowne, Marquis of, ii. 275.
Lauriston, Marquis de, French ambassador to Russia, i. 418.
Lee, Henry, crippled by Baltimore rioters, ii. 407, 408.
Leib, Michael, senator from Pennsylvania, i. 181, 189, 191; ii.
229, 243;
votes against Bank charter, 337;
his political capacity, 364.
Licenses of trade, British, i. 59, 64;
scandal of, 273;
debate on, 274, 275;
Canning’s remarks on, 278, 280;
Sidmouth’s conditions on, 281;
Castlereagh proposes to abandon, 221, 282.
Licenses, Napoleon’s system of, i. 246–249;
promised abandonment of, 392, 393;
continued issue of, 400;
repudiated by Napoleon, 414, 417, 422;
municipal character of, ii. 43;
their continued issue, 54;
extension of, 250.
Lincoln, Levi, declines appointment as justice, i. 359.
Lingan, James Maccubin, killed by Baltimore rioters, ii. 407, 408.
“Little Belt,” British sloop of-war, affair of, i. 25–37, 45, 270.
Livermore, Edward St. Loe, member of Congress from
Massachusetts, i. 184.
Liverpool, Lord, on American partiality to France, i. 50;
succeeds Castlereagh at the War Department, 263.
Lloyd, James, senator from Massachusetts, ii. 183.
Loan for 1810, i. 178;
of 1812, for eleven millions, ii. 169;
partial failure of, 207;
of 1813, for twenty millions, 433, 448.
Long, Charles, joint paymaster-general of the forces, i. 58.
Louis Bonaparte, king of Holland, resists Napoleon’s decrees, i.
146;
his interview with Armstrong, 147, 148;
threatened by Napoleon, 236, 237, 240;
stipulates seizure of American ships, 240, 274;
abdicates, 242.
Louisiana, government offered to Monroe, i. 162;
proposed as a kingdom for the French Bourbons, 239;
admitted into the Union, 323–326; ii. 235.
Lowndes, William, member of Congress from South Carolina, ii.
122, 164;
his hostility to non-importation, 205, 234, 445, 448;
opposes compromise of forfeitures, 442.
Lyon, Matthew, member of Congress from Kentucky, i. 358.

McArthur, Duncan, colonel of Ohio militia, ii. 298, 326, 328, 332,
334.
“Macedonian,” British frigate, capture of, ii. 382, 383.
McKee, John, ii. 237.
Macon, Nathaniel, member of Congress from North Carolina,
votes with Federalists, i. 182;
his bill for excluding British and French shipping, 183, 184;
bill defeated by Senate, 185, 191, 193;
Samuel Smith’s motives for defeating, 185–188, 192, 193;
his bill No. 2, 194, 195;
adopted by Congress, 197, 198;
his remark on manufacturing influence, 197;
his speech on reducing the army and navy in 1810, 201;
his bill admitting the State of Louisiana, with West Florida, into
the Union, 323–326;
not candidate for speaker, ii. 123, 124;
his account of the opinions prevailing at Washington, 129;
supports war, 145;
his remark on France and England, 196.
Madison, James, inauguration of, i. 1;
his inaugural address, 2, 3, 4;
offers the Treasury to Robert Smith, 7, 379;
appoints Robert Smith Secretary of State, 8;
his Cabinet, 9, 10;
nominates J. Q. Adams to Russia, 11;
his letter to Erskine accepting settlement of the “Chesapeake
affair,” 68–70, 89;
issues proclamation renewing intercourse with England, 73,
74;
his views of the change in British policy, 75, 76, 81, 83;
his message of May 23, 1809, 76, 77;
his popularity, 80, 85, 86;
on the disavowal of Erskine’s arrangement, 112;
revives non-intercourse against England, 114;
his negotiation with F. J. Jackson, 117, 122–132;
described by Jackson, 120;
his message of Nov. 29, 1809, 176, 177;
special message of Jan. 3, 1810, asking for volunteers, 179;
his opinions of Samuel and Robert Smith, 186;
dissensions in his cabinet, 188;
remarks on the experiment of unrestricted commerce, 210,
211;
his reply to Napoleon’s note on the right of search and
blockade, 250;
his anger at Napoleon’s confiscations, 292;
his instructions of June 5, 1810, to Armstrong on
Champagny’s reprisals, 293, 294;
his devotion to commercial restrictions, 293, 295;
his instructions of July 5, 1810, to Armstrong requiring
indemnity, 295, 296, 297, 299;
his decision to accept the conditions of Champagny’s letter of
August 5, 296–301;
revives non-intercourse against Great Britain, 303, 304;
takes military possession of West Florida, 308–312, 318;
his supposed character, 310;
his annual message of Dec. 5, 1810, 314, 317–319;
asks authority to take possession of East Florida, 327;
appoints commissioners for East Florida, 327;
decides to enforce the non-intercourse against Great Britain,
347;
his doubts regarding Napoleon’s folly, 350;
his irritation at Smith’s proposed inquiry from Serurier, 350,
351;
offers the State Department to Monroe, 366, 372, 374;
his parting interview with Robert Smith, 375–377;
his anger with Smith, 378;
his translation of bien entendu, 387, 388;
his success in maintaining his own system in the Cabinet, ii.
61, 62;
his discontent with Napoleon’s conduct, 63, 64, 125, 187, 218,
224;
his orders to maintain peace with the northwestern Indians,
88, 93;
his attitude toward war with England, 118, 125, 129, 131, 175,
196, 197, 213;
his annual message of Nov. 5, 1811, 124;
entertains Crillon, 179, 185;
his message communicating Henry’s papers, 181;
his embargo message, 193, 198, 199;
his comments on the conduct of the Senate, 203;
sustains non-importation, 205;
renominated for the presidency, 214;
perplexed by the French decrees, 218;
his letter to Barlow threatening war on France, 218, 259;
his view of the “immediate impulse” to war with England, 220,
226;
his war message, 221–226;
signs declaration of war, and visits departments, 229;
his measures regarding East Florida, 237, 239, 241, 243;
his remarks on Napoleon’s Russian campaign, 265;
his remarks in August, 1812, on the Canadian campaign, 337;
re-elected President, 413;
wishes Monroe to command western army, 419, 420, 425;
his annual message of 1812, 430–433.
Maguaga, battle of, ii. 325.
Malden, British trading post on the Detroit River, ii. 73, 80, 85,
300;
to be besieged by Hull, 303, 314;
British force at, 312, 313.
Manufactures, growth of, in 1809–1810, i. 15–19;
political influence of, 197;
protection of, 319.
Maret, Hugues Bernard, Duc de Bassano, Napoleon’s secretary,
i. 143;
succeeds Champagny as Minister of Foreign Affairs, 401;
his report to Napoleon of March 10, 1812, ii. 216, 253;
his negotiation with Joel Barlow, 248–263;
his instructions to Serurier of October, 1811, on the revocation
of the Decrees, 248, 249;
communicates Decree of St. Cloud to Barlow and Serurier,
255–257;
his instructions to Dalberg, 260;
invites Barlow to Wilna, 263;
dismisses his guests, 264.
Marmont, Marshall, his story of Decrès, i. 222.
Marshall, Humphrey, on W. H. Harrison, ii. 107.
Maryland, her electoral vote, ii. 406, 413.
Massa, Duc de, letter from, i. 347.
Massachusetts, election of 1809, i. 12;
tonnage of, 15;
manufactures of, 17–19;
resolutions of legislature regarding F. J. Jackson, 214;
election of, 1810, 215;
Republican control of, in 1810 and 1811, ii. 115;
Federalists recover control of, in 1812, 204;
gives trouble to Dearborn, 305;
refuses to obey call for militia, 309;
temper of, 397–401, 409;
Federalist majority in the Congressional elections of 1812,
413.
Massassinway, council at, ii. 111.
Matthews, George, appointed commissioner to take possession
of East Florida, ii. 237;
his proceedings, 238–240;
disavowed, 240–242.
Mecklenburg, Grand Duchy of, closes its ports to American
commerce, i. 413.
“Melampus,” British frigate, ii. 25.
Merry, Anthony, i. 118, 119, 120, 121.
Message, first annual of President Madison, May 23, 1809, i. 76;
annual, of Nov. 29, 1809, 176–178;
special, of Jan. 3, 1810, asking for volunteers, 179;
annual, of Dec. 5, 1810, 317–319;
special, of Feb. 19, 1811, on the revocation of the French
decrees, 347, 348;
annual, of Nov. 5, 1811, ii. 124–126;
special, of March 9, 1812, communicating John Henry’s
papers, 181;
special, of April 1, 1812, recommending an embargo for sixty
days, 198;
of April 24, 1812, asking for two Assistant Secretaries of War,
206;
of June 1, 1812, recommending a declaration of war with
England, 221–226;
annual, of Nov. 4, 1812, 430–433.
Michigan territory, population in 1810, i. 289.
Michillimackinaw, Island of, ii. 294;
captured by British expedition, 314, 320.
Militia, constitutional power of Congress over, ii. 159, 160, 400;
Cheves’s opinion on the war power, 160;
act authorizing call for one hundred thousand, 204, 390;
refuses to cross the frontier, 351, 352, 360;
of Kentucky, 391, 393.
Miller, James, Lieutenant-Colonel of Fourth U. S. Infantry, at
Detroit, ii. 326, 328.
Mitchell, D. B., Governor of Georgia, ii. 242.
Mobile, ii. 236.
Monroe, James, Madison’s advances to, i. 159, 161, 162;
his state of mind, 162;
offered the State Department, 366;
his acceptance and policy, 368–374;
takes charge, 380;
Secretary of State, April 1, 1811, ii. 50;
his sensitiveness about the title to West Florida, 38;
his reply to Foster’s protest against the seizure of Florida, 38,
39;
blames Jonathan Russell for questioning the revocation of the
French decrees, 42;
asserts the revocation of the French decrees, 42, 43;
abandons task of reconciliation with England, 44;
requires revocation of the Orders in Council, 45;
delays Barlow’s departure, 50;
his remonstrances to Serurier about Napoleon’s conduct, 51,
54, 188, 189, 194, 195, 200, 217;
his remarks on protection accorded to commerce, 58;
his acceptance of Madison’s policy, 59–61;
affirms to Foster the repeal of Napoleon’s decrees, 65;
his letter of June 13, 1812, to John Taylor, of Caroline, 66;
his language to Serurier, in October, 1811, 120;
informs Serurier, in November, of executive plan, 129;
agrees to assist the independence of Spanish America, 130;
negotiates purchase of Henry’s papers, 178–180;
his remarks to Foster on Wellesley’s instructions, 192;
his conference with House Committee of Foreign Relations,
March 31, 1812, 197;
his remarks on the embargo, 199, 200, 202;
his relations toward Matthews and the occupation of East
Florida, 238, 240, 241, 242;
his criticisms on the conduct of the war, 396, 397;
assures Serurier he will not negotiate for peace, 415;
proposes to negotiate, 416;
proposes to take a military commission, 419, 420;
hesitates between civil or military control of the war, 421–423;
becomes acting Secretary of War, 423;
excites jealousy, 424, 425;
abandons military career, 425, 426;
offers to prohibit the employment of foreign seamen, 451.
“Moniteur,” The, ii. 253.
Montalivet, Comte de, Napoleon’s Minister of the Interior, i. 221;
his efforts for American commerce, 223, 224.
Moore, Sir John, his Spanish campaign, i. 26, 47, 48.
Morier, J. P., British chargé at Washington, i. 219;
his protest against the seizure of West Florida, 315.
Mountmorris, Lord, i. 265.

Napoleon, his Spanish campaign, i. 22–28;


his severity toward American commerce, 30–32;
withholds Florida, 32, 33;
his causes for rupture with the United States, 39, 40;
his war with Austria in 1809, 106, 134;
learns the repeal of the embargo and of the British Orders,
136;
his first reply to Armstrong’s communication, 137;
drafts Decree withdrawing the Milan Decree, 139;
cause of his hesitation, 140, 141;
lays aside his repealing Decree, 141;
his draft of Vienna Decree of August 4, 1809, 143, 144, 230,
233, 236;
his view of the right of search, 137, 145, 149;
quarrels with his brother Louis, 146, 147;
his increased severity toward the United States, 150–152,
220;
calls a Cabinet council on commerce, Dec. 19, 1809, 220,
221;
discussions with Montalivet, 221, 223;
his note to Gaudin on American ships, 224;
his want of money, 225, 226, 237;
calls for a report from Champagny, Jan. 10, 1810, 226, 227;
his dislike for Armstrong, 228, 229;
his condition for the revocation of his Decrees, 229;
his draft of note asserting retaliation on the Non-intercourse
Act, 230, 231;
his reply to Armstrong’s remonstrances, 234, 235;
his memory, 235;
his decree of Rambouillet, 236;
his threats of annexing Holland, 238, 246;
his annexation of Holland, 241, 242;
his reflections on Macon’s act, 244, 245;
his license system, 246;
his instructions to Champagny ordering announcement that
the Decrees will be withdrawn, 253;
dictates letter of August 5, 1810, 253;
his idea of a trap, 257, 383;

You might also like