Professional Documents
Culture Documents
Full download Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition Rajiv Pandey file pdf all chapter on 2024
Full download Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition Rajiv Pandey file pdf all chapter on 2024
Full download Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition Rajiv Pandey file pdf all chapter on 2024
https://ebookmass.com/product/sustainable-developments-by-
artificial-intelligence-and-machine-learning-for-renewable-
energies-krishna-kumar/
https://ebookmass.com/product/visualization-techniques-for-
climate-change-with-machine-learning-and-artificial-intelligence-
arun-lal-srivastav/
https://ebookmass.com/product/risk-modeling-practical-
applications-of-artificial-intelligence-machine-learning-and-
deep-learning-terisa-roberts/
https://ebookmass.com/product/cracking-the-code-introduction-to-
machine-learning-for-novices-building-a-foundation-for-
artificial-intelligence-1st-edition-sarah-parker/
Predicting Heart Failure : Invasive, Non-Invasive,
Machine Learning, and Artificial Intelligence Based
Methods 1st Edition Kishor Kumar Sadasivuni
https://ebookmass.com/product/predicting-heart-failure-invasive-
non-invasive-machine-learning-and-artificial-intelligence-based-
methods-1st-edition-kishor-kumar-sadasivuni/
https://ebookmass.com/product/artificial-intelligence-and-
machine-learning-in-the-travel-industry-simplifying-complex-
decision-making-ben-vinod/
https://ebookmass.com/product/artificial-intelligence-and-
quantum-computing-for-advanced-wireless-networks-savo-g-glisic/
https://ebookmass.com/product/python-debugging-for-ai-machine-
learning-and-cloud-computing-a-pattern-oriented-approach-1st-
edition-vostokov/
https://ebookmass.com/product/artificial-intelligence-and-deep-
learning-in-pathology-1st-edition-stanley-cohen-md-editor/
Artificial Intelligence and Machine
Learning for EDGE Computing
This page intentionally left blank
Artificial Intelligence
and Machine Learning
for EDGE Computing
Edited by
Rajiv Pandey
Amity University, Lucknow, India
Parul Verma
Amity University, Lucknow, India
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2022 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using
any information, methods, compounds, or experiments described herein. In using such information or methods
they should be mindful of their own safety and the safety of others, including parties for whom they have a
professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability
for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or
from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
ISBN 978-0-12-824054-0
v
vi Contents
1 Introduction 65 1 Introduction 87
2 Related works 66 2 Related work 87
3 Proposed method 66 2.1 Motivation and objective of the
3.1 Overview 66 research 89
3.2 KMFOS 67 2.2 Literature-based problem
3.3 Dataset 68 identification 90
4 Experiment 69 2.3 List of crime keywords considered 90
4.1 Design 69 3 Methodology 90
4.2 Evaluation metrics 69 3.1 Implementation of the process 91
5 Results 69 3.2 Proposed analytic approach 91
5.1 Hyperparameters 69 4 Results and discussion 92
5.2 Individual algorithms 70 4.1 India: Crime visualization using nave
5.3 PC4 dataset 71 Bayes and K-means algorithms 92
Contents vii
10.2 Increased bandwidth 390 27. State of the art for edge security in
10.3 Global wide coverage 390 software-defined networks
10.4 Our own world will be a Wi-Fi
zone 390 Shailesh Pramod Bendale,
Jayashree Rajesh Prasad, and
10.5 Improved battery life 390 Rajesh Shardanand Prasad
11 Advantage and disadvantage of 5G
technology 391 1 Introduction 411
11.1 Important benefits 391 2 Hybrid software-defined networks 412
11.2 Other benefits of common 3 Security challenges in hybrid software-
people 391 defined networks 413
11.3 Disadvantages 391 4 Solutions for hybrid software-defined
12 Challenges 391 networks 415
12.1 Technological challenges 392 4.1 QoS (quality of service) 415
12.2 Common challenges 392 4.2 DDoS (distributed denial-of-service)
13 Future scope 393 attack 415
14 Conclusions 393 4.3 MITM (man In the middle) attack 415
References 393 4.4 Programmable network solution 415
4.5 ARP poisoning 415
26. Challenges and opportunities in 4.6 DoS (denial-of-service) attack 415
edge computing architecture using 4.7 Botnet attacks 416
4.8 Platforms for hybrid software-defined
machine learning approaches
networks 416
Naman Bhoj and Robin Singh Bhadoria 5 Learning techniques for hybrid software-
defined networks 417
1 Introduction 395
5.1 Machine-learning techniques 417
2 Overview of edge computing 396
5.2 Supervised learning 417
2.1 Architecture of edge computing 396
5.3 Unsupervised learning 419
2.2 Use cases of edge computing 397
5.4 Deep learning 420
2.3 Advantages of edge computing 398
6 Discussion and implementation 420
3 Security and privacy in edge
7 Conclusions 422
computing 399
References 422
4 Intersection of machine learning and
Further reading 424
edge using enabling technologies 399
4.1 Defining AI, ML, DL 399
4.2 Enabling technologies for machine
learning and edge computing 400 28. Moving to the cloud, fog, and edge
5 Machine learning and edge bringing AI to computing paradigms:
IoT 402 Convergences and future research
6 OpenVINO toolkit 403 direction
6.1 Example of edge computing
K. Rajkumar and U. Hariharan
architecture for malaria detection 405
6.2 Edge computing architecture 1 Introduction 425
developed by industry pioneers 405 2 Features and differences between cloud,
7 Challenges in machine learning and edge fog, and edge computing 426
computing integration 406 2.1 Cloud computing 426
7.1 Different data distribution 406 2.2 Edge computing (EC) 427
7.2 Discovering edge node 406 2.3 Fog computing 428
7.3 Secure usage of edge nodes 407 3 Framework and programming
7.4 Heterogeneity in data 407 models: Architecture of fog
7.5 Energy consumption of edge computing 428
devices 407 3.1 Framework as well as programming
8 Conclusions 407 models: Data modeling within fog
References 407 computing 429
xiv Contents
Numbers in parenthesis indicate the pages on which the authors’ Santosh L. Deshpande (255), Department of Computer
contributions begin. Science & Engineering, Visvesvaraya Technological
Sherief Abdulla (145), Faculty of Engineering and University, Belagavi, Karnataka, India
Informatics, British University in Dubai, Dubai, United Anuj Diwedi (267), Manipal University Jaipur, Jaipur,
Arab Emirates Rajasthan, India
Josh Agarwal (267), Manipal University Jaipur, Jaipur, Rahul Kumar Dubey (65, 235, 279), Robert Bosch
Rajasthan, India Engineering and Business Solutions Private Limited,
K.N. Apinaya Prethi (343), Department of CSE, Bengaluru, Karnataka, India
Coimbatore Institute of Technology, Coimbatore, Imo J. Eyoh (207), Department of Computer Science,
Tamilnadu, India University of Uyo, Uyo, Akwa Ibom, Nigeria
Parth Arora (267), Manipal University Jaipur, Jaipur, A. Ganesan (325), Department of EEE, RRASE College of
Rajasthan, India Engineering, Chennai, Tamil Nadu, India
Ananya Banerjee (443), Department of Computer Science, Ashray Gupta (267), Manipal University Jaipur, Jaipur,
Kalyani Government Engineering College, Kalyani, Rajasthan, India
West Bengal, India
Manu K. Gupta (75), Department of Management Studies,
Ketaki Barde (121), M.S (Data Science), Rochester IIT Roorkee, Roorkee, India
Institute of Technology, Rochester, NY, United
States Marjan Gusev (469), Ss Cyril and Methodius University in
Skopje, Faculty of Computer Science and Engineering,
Shailesh Pramod Bendale (411), SKNCOE, Research Skopje, North Macedonia
Centre, Savitribai Phule Pune University, Pune,
India Rajeswary Hari (325), Department of Biotechnology, Dr.
MGR Educational & Research Institute, Chennai,
Lamia Berkani (287), Laboratory for Research in Arti- Tamil Nadu, India
ficial Intelligence, Department of Artificial Intelligence
and Data Sciences, Faculty of Informatics, USTHB Uni- U. Hariharan (425), Department of Computer Science and
versity, Algiers, Algeria Engineering, Apex Institute of Technology, Chandigarh
University, Mohali, Punjab, India
Robin Singh Bhadoria (395), Dept. of Computer Science
& Engineering, Birla Institute of Applied Sciences Mohd Haroon (169), CSE Department, Integral Uni-
(BIAS), Bhimtal, Uttarakhand, India versity, Lucknow, India
Ajay Kumar Bharti (355, 373), Department of Computer Harshvardhan (53), Department of Civil Engineering,
Science, Babu Banarasi Das University, Lucknow, Indian Institute of Technology, Delhi, India
India Nandyala Hemachandra (75), Industrial Engineering and
Shobhit Bhatnagar (75), Industrial Engineering and Oper- Operations Research, IIT Bombay, Mumbai, India
ations Research, IIT Bombay, Mumbai, India Shashi Jain (279), Department of Management Studies,
Naman Bhoj (395), Dept. of Computer Science & Engi- Indian Institute of Science, Bengaluru, Karnataka, India
neering, Birla Institute of Applied Sciences (BIAS), G.O. Jijina (103), Department of Electronics and Commu-
Bhimtal, Uttarakhand, India nication Engineering, Aarupadai Veedu Institute of
Nilesh Chandra (355, 373), Department of Computer Technology, Chennai, India
Science, Maharishi University of Information Tech- A. Kalaivani (325), Department of CSE, Saveetha School
nology, Lucknow, India of Engineering, SIMATS, Chennai, Tamil Nadu, India
xv
xvi Contributors
Rohit B. Kaliwal (255), Department of Computer Science Rajiv Pandey (189), Amity Institute of Information Tech-
& Engineering, Visvesvaraya Technological Uni- nology, Lucknow, Uttar Pradesh, India
versity, Belagavi, Karnataka, India Dharmendra Pathak (133), Amity School of Engineering
N. Kanimozhi (103), Department of Computer Applica- and Technology, Amity University Chhattisgarh,
tions, A.V.C. College of Engineering, Mayiladuthurai, Raipur, Campus, India
India Anju S. Pillai (121), Department of Electrical and Elec-
N. Kanya (103), Department of Information Technology, tronics Engineering, Amrita School of Engineering,
Dr. M.G.R. Educational and Research Institute, Amrita Vishwa Vidyapeetham, Coimbatore, India
Chennai, India R.S. Ponmagal (325), Department of CSE, School of Com-
Ramgopal Kashyap (133), Amity School of Engineering puting, SRM Institute of Science & Technology, Kat-
and Technology, Amity University Chhattisgarh, tankulathur, Chennai, Tamil Nadu, India
Raipur, Campus, India
Jayashree Rajesh Prasad (411), School of Engineering,
Harsh Kashyap (189), Amity University, Lucknow, Uttar MIT Art, Design & Technology University, Pune, India
Pradesh, India
Rajesh Shardanand Prasad (411), School of Engineering,
Imene Lydia Kerboua (287), Institute of Communication, MIT Art, Design & Technology University, Pune, India
University Lumière Lyon 2, Lyon, France
Boppuru Rudra Prathap (87), Computer Science and
Param Khakhar (65), Department of Computer Science Engineering, CHRIST (deemed to be University), Ben-
and Engineering, Indian Institute of Technology Delhi, galuru, Karnataka, India
New Delhi, Delhi, India
Surendra Rahamatkar (133), Amity School of Engi-
Santosh Kumar (305), Department of Computer Engi- neering and Technology, Amity University Chhat-
neering & Information Technology, Swarrnim Startup tisgarh, Raipur, Campus, India
& Innovation University, Gandhinagar, Gujarat, India
K. Rajkumar (425), Department of Computer Science and
Swarup Kumar (235), Robert Bosch Engineering and Engineering, Jain University, Faculty of Engineering
Business Solutions Private Limited, Bengaluru, Kar- Technology, Bangalore, Karnataka, India
nataka, India
Chinmay Rane (3, 33, 53), Quantiphi, Inc., Marlborough,
Michael Manry (3, 33, 53), Department of Electrical Engi- MA, United States
neering, The University of Texas at Arlington,
Arlington, TX, United States Archana Sahai (189), Amity Institute of Information Tech-
nology, Lucknow, Uttar Pradesh, India
Elezabeth Mathew (145), Faculty of Engineering and
Informatics, British University in Dubai, Dubai, United M. Sangeetha (343), Department of IT, Coimbatore
Arab Emirates Institute of Technology, Coimbatore, Tamilnadu, India
Eesha Mishra (305), Department of Computer Science & Vijayalakshmi Saravanan (121), Faculty, Rochester
Engineering, Maharishi University of Information Institute of Technology, Rochester, NY, United States
Technology, Lucknow, Uttar Pradesh, India Rahul Saxena (267), Manipal University Jaipur, Jaipur,
Vadivel S. Murugesan (207), Department of Industrial Rajasthan, India
Production Engineering, National Institute of Engi- S. Sendilvelan (103), Department of Mechanical Engi-
neering, Mysore, India neering, Dr. M.G.R. Educational and Research Institute,
G. Nalinashini (325), Department of EIE, RMD Engi- Chennai, India
neering College, Chennai, Tamil Nadu, India Shambhavi Sharma (315), Amity University, Noida, Uttar
S. Nithya (343), Department of CSE, Coimbatore Institute Pradesh, India
of Technology, Coimbatore, Tamilnadu, India R. Shree Charran (279), Department of Management
Megha Nivurruti (121), M.S (Data Science), Rochester Studies, Indian Institute of Science, Bengaluru, Kar-
Institute of Technology, Rochester, NY, United States nataka, India
Emmanuel E. Nyoho (207), Department of Computer Zeeshan Ali Siddiqui (169), CSE Department, Integral
Science, University of Uyo, Uyo, Akwa Ibom, Nigeria University, Lucknow, India
Vipin Pal (267), NIT Meghalaya, Shillong, Meghalaya, Mukul Singh (235), Indian Institute of Technology Delhi,
India Delhi, New Delhi, India
Contributors xvii
Vaishali Singh (355, 373), Department of Computer Kanishka Tyagi (3, 33, 53), Aptiv Advanced Research
Science, Maharishi University of Information Tech- Center, Agoura Hills, CA, United States
nology, Lucknow, India Uduak A. Umoh (207), Department of Computer Science,
P. Solainayagi (103), Department of Computer Science and University of Uyo, Uyo, Akwa Ibom, Nigeria
Engineering, Aarupadai Veedu Institute of Technology, Isaac Woungang (121), Ryerson University, Toronto, ON,
Chennai, India Canada
Raghavendra Sriram (33), Paccar Inc., Mt Vernon, WA, Anju Yadav (267), Manipal University Jaipur, Jaipur,
United States Rajasthan, India
K. Sujatha (103, 325), Department of Electrical and Elec- Sofiane Zeghoud (287), Department of Computer Science
tronics Engineering, Dr. M.G.R. Educational and and Engineering, School of Electronic Information and
Research Institute, Chennai, Tamil Nadu, India Electrical Engineering, Shanghai Jiao Tong University,
Ashish Tiwari (23), Masters in Computer Applications, Shanghai, China
Jamia Millia Islamia University, New Delhi, India
This page intentionally left blank
Preface
Artificial intelligence (AI) is not a new buzzword. The concept has been going hand in hand ever since the machines have
been considered for computational solutions. The question always remains the same; can we program a computer with all
the intricacies of human beings and can a computer be a replacement for human beings in certain places? The question is
still unanswerable, as we are still in the process of making computers smarter day by day.
Machine learning (ML) is a subset of AI. It is popular and used to analyze a huge amount of data that is being produced
by various applications. Nowadays, ML is one of the crucial aspects of versatile systems. Be it automation or making
systems intelligent to draw some inferences, ML is taking place concurrently. A variety of applications are exploiting
the potential benefits of ML like speech recognition, image recognition, medical diagnosis, fraud detection, prediction,
to name a few. The important aspect of ML is its iterative approach where models are adapted by exposure of a new
set of data every time. These models keep on learning and adapting from the previous decisions and results.
ML and predictive analytics have different approaches to any problem. The ML approach is versatile, liberal, more
adaptive toward various applications, whereas predictive analytics is automated through ML tools. Predictive analytics
works on historical data for making future predictions. It generates future insights with a significant degree of precision.
Predictive analytics is a wonderful tool that can use sophisticated models to forecast trends based on past and current data.
Predictive analytics helps organizations to plan strategically; for example, retailers use various predictive models to
forecast their inventory requirements, airlines make use of predictive analytics to forecast the price of their tickets. The
hospitality industry also makes use of predictive analytics to forecast the number of guests at any particular event. By pre-
dictive analytics campaigns, the organization can forecast customer responses and purchases for the promotion of cross-
selling. Human behavior analysis can also be performed using predictive analytics, which is used to predict criminal
behavior in human beings. Predictive analytics play a crucial role in versatile applications these days.
The use of predictive analytics in various applications has generated a demand for real-time analytics. A huge amount of
data mining and analytics is involved in the versatile domain and requires data to be stored and processed in cloud servers.
However, the coming decade is ready to witness the transformation of cloud computing to edge computing. Edge com-
puting refers to processing at the edge rather than processing at a central location like in cloud computing. Edge computing
processes the data near to the data source. Edge computing performs the computational task near the target devices. The
unlimited growth of data in the IoT setup and limitations of network layers are leading to the need for edge computing
scenarios. Edge computing processes the data physically close to the target devices, or on the device itself.
The major motive of edge computing is to deliver concrete data or information to the end users, in many of the use cases
especially healthcare, in real time. It is considered to be of great help in reducing the cost of connectivity by simply trans-
ferring data or information that is important instead of sending the bulk of raw data produced from various IoT sensors.
Besides this, filtering data and sending only crucial data to cloud/storage server reduces the load on the network and
decreases the need for computing resources.
Edge computing is considered an improvement over the cloud. It reduces the amount of data that must be transferred to
the cloud for processing and analysis purposes. The major benefit of edge computing is low latency, which is quite high in
comparison to cloud computing. Edge computing has an upper hand over cloud computing as it provides resource opti-
mization, reduction in network traffic, leading to a low risk of a data bottleneck.
Edge computing and cloud computing may work in unison to provide maximum benefits. The data are processed in
two parts, where real-time analytics is performed at the edge server and for complex data analytics, the cloud server is
involved. This combination may give better results as edge computing may perform better by reducing latency. This pro-
vides the context for this book, which aims to present current trends in the application of AI and ML in the IoT domain at
the edge. The book includes real-life use cases to demonstrate the application of various ML and predictive analytics
algorithms. The book also provides an insight into the edge computing scenario in various contexts.
xix
Another random document with
no related content on Scribd:
“Essex,” 32-gun frigate, her action with the “Alert,” ii. 35, 377;
arrives with despatches, 52, 56;
sails in July, 1812, 377;
returns to port, 378.
Essex county In Massachusetts, declaration of meeting, ii. 402.
Eustis, William, appointed Secretary of War, i. 9;
orders Wilkinson not to camp at Terre aux Bœufs, 172, 174;
authorizes Harrison to buy Indian land in the Wabash valley, ii.
82;
approves Harrison’s purchase, 85;
orders Harrison to preserve peace with Indians, 88, 93;
orders the Fourth Regiment to Indiana, 92, 93;
his lost letter of Sept. 18, 1811, to Harrison, 95;
appears before the Committee of Foreign Relations, 129;
his supposed incompetence, 168, 206, 392, 395, 396, 397,
398;
his duties in 1812, 168;
on recruiting, 294;
his letters to William Hull, announcing war, 299;
and ordering conquests in Canada, 302;
his orders to Dearborn to repair to Albany, 306, 308, 309;
and to take direction of militia at Niagara, 310, 321, 340;
resigns, 422.
Exchange, turn of, against England, in 1808, i. 47.
McArthur, Duncan, colonel of Ohio militia, ii. 298, 326, 328, 332,
334.
“Macedonian,” British frigate, capture of, ii. 382, 383.
McKee, John, ii. 237.
Macon, Nathaniel, member of Congress from North Carolina,
votes with Federalists, i. 182;
his bill for excluding British and French shipping, 183, 184;
bill defeated by Senate, 185, 191, 193;
Samuel Smith’s motives for defeating, 185–188, 192, 193;
his bill No. 2, 194, 195;
adopted by Congress, 197, 198;
his remark on manufacturing influence, 197;
his speech on reducing the army and navy in 1810, 201;
his bill admitting the State of Louisiana, with West Florida, into
the Union, 323–326;
not candidate for speaker, ii. 123, 124;
his account of the opinions prevailing at Washington, 129;
supports war, 145;
his remark on France and England, 196.
Madison, James, inauguration of, i. 1;
his inaugural address, 2, 3, 4;
offers the Treasury to Robert Smith, 7, 379;
appoints Robert Smith Secretary of State, 8;
his Cabinet, 9, 10;
nominates J. Q. Adams to Russia, 11;
his letter to Erskine accepting settlement of the “Chesapeake
affair,” 68–70, 89;
issues proclamation renewing intercourse with England, 73,
74;
his views of the change in British policy, 75, 76, 81, 83;
his message of May 23, 1809, 76, 77;
his popularity, 80, 85, 86;
on the disavowal of Erskine’s arrangement, 112;
revives non-intercourse against England, 114;
his negotiation with F. J. Jackson, 117, 122–132;
described by Jackson, 120;
his message of Nov. 29, 1809, 176, 177;
special message of Jan. 3, 1810, asking for volunteers, 179;
his opinions of Samuel and Robert Smith, 186;
dissensions in his cabinet, 188;
remarks on the experiment of unrestricted commerce, 210,
211;
his reply to Napoleon’s note on the right of search and
blockade, 250;
his anger at Napoleon’s confiscations, 292;
his instructions of June 5, 1810, to Armstrong on
Champagny’s reprisals, 293, 294;
his devotion to commercial restrictions, 293, 295;
his instructions of July 5, 1810, to Armstrong requiring
indemnity, 295, 296, 297, 299;
his decision to accept the conditions of Champagny’s letter of
August 5, 296–301;
revives non-intercourse against Great Britain, 303, 304;
takes military possession of West Florida, 308–312, 318;
his supposed character, 310;
his annual message of Dec. 5, 1810, 314, 317–319;
asks authority to take possession of East Florida, 327;
appoints commissioners for East Florida, 327;
decides to enforce the non-intercourse against Great Britain,
347;
his doubts regarding Napoleon’s folly, 350;
his irritation at Smith’s proposed inquiry from Serurier, 350,
351;
offers the State Department to Monroe, 366, 372, 374;
his parting interview with Robert Smith, 375–377;
his anger with Smith, 378;
his translation of bien entendu, 387, 388;
his success in maintaining his own system in the Cabinet, ii.
61, 62;
his discontent with Napoleon’s conduct, 63, 64, 125, 187, 218,
224;
his orders to maintain peace with the northwestern Indians,
88, 93;
his attitude toward war with England, 118, 125, 129, 131, 175,
196, 197, 213;
his annual message of Nov. 5, 1811, 124;
entertains Crillon, 179, 185;
his message communicating Henry’s papers, 181;
his embargo message, 193, 198, 199;
his comments on the conduct of the Senate, 203;
sustains non-importation, 205;
renominated for the presidency, 214;
perplexed by the French decrees, 218;
his letter to Barlow threatening war on France, 218, 259;
his view of the “immediate impulse” to war with England, 220,
226;
his war message, 221–226;
signs declaration of war, and visits departments, 229;
his measures regarding East Florida, 237, 239, 241, 243;
his remarks on Napoleon’s Russian campaign, 265;
his remarks in August, 1812, on the Canadian campaign, 337;
re-elected President, 413;
wishes Monroe to command western army, 419, 420, 425;
his annual message of 1812, 430–433.
Maguaga, battle of, ii. 325.
Malden, British trading post on the Detroit River, ii. 73, 80, 85,
300;
to be besieged by Hull, 303, 314;
British force at, 312, 313.
Manufactures, growth of, in 1809–1810, i. 15–19;
political influence of, 197;
protection of, 319.
Maret, Hugues Bernard, Duc de Bassano, Napoleon’s secretary,
i. 143;
succeeds Champagny as Minister of Foreign Affairs, 401;
his report to Napoleon of March 10, 1812, ii. 216, 253;
his negotiation with Joel Barlow, 248–263;
his instructions to Serurier of October, 1811, on the revocation
of the Decrees, 248, 249;
communicates Decree of St. Cloud to Barlow and Serurier,
255–257;
his instructions to Dalberg, 260;
invites Barlow to Wilna, 263;
dismisses his guests, 264.
Marmont, Marshall, his story of Decrès, i. 222.
Marshall, Humphrey, on W. H. Harrison, ii. 107.
Maryland, her electoral vote, ii. 406, 413.
Massa, Duc de, letter from, i. 347.
Massachusetts, election of 1809, i. 12;
tonnage of, 15;
manufactures of, 17–19;
resolutions of legislature regarding F. J. Jackson, 214;
election of, 1810, 215;
Republican control of, in 1810 and 1811, ii. 115;
Federalists recover control of, in 1812, 204;
gives trouble to Dearborn, 305;
refuses to obey call for militia, 309;
temper of, 397–401, 409;
Federalist majority in the Congressional elections of 1812,
413.
Massassinway, council at, ii. 111.
Matthews, George, appointed commissioner to take possession
of East Florida, ii. 237;
his proceedings, 238–240;
disavowed, 240–242.
Mecklenburg, Grand Duchy of, closes its ports to American
commerce, i. 413.
“Melampus,” British frigate, ii. 25.
Merry, Anthony, i. 118, 119, 120, 121.
Message, first annual of President Madison, May 23, 1809, i. 76;
annual, of Nov. 29, 1809, 176–178;
special, of Jan. 3, 1810, asking for volunteers, 179;
annual, of Dec. 5, 1810, 317–319;
special, of Feb. 19, 1811, on the revocation of the French
decrees, 347, 348;
annual, of Nov. 5, 1811, ii. 124–126;
special, of March 9, 1812, communicating John Henry’s
papers, 181;
special, of April 1, 1812, recommending an embargo for sixty
days, 198;
of April 24, 1812, asking for two Assistant Secretaries of War,
206;
of June 1, 1812, recommending a declaration of war with
England, 221–226;
annual, of Nov. 4, 1812, 430–433.
Michigan territory, population in 1810, i. 289.
Michillimackinaw, Island of, ii. 294;
captured by British expedition, 314, 320.
Militia, constitutional power of Congress over, ii. 159, 160, 400;
Cheves’s opinion on the war power, 160;
act authorizing call for one hundred thousand, 204, 390;
refuses to cross the frontier, 351, 352, 360;
of Kentucky, 391, 393.
Miller, James, Lieutenant-Colonel of Fourth U. S. Infantry, at
Detroit, ii. 326, 328.
Mitchell, D. B., Governor of Georgia, ii. 242.
Mobile, ii. 236.
Monroe, James, Madison’s advances to, i. 159, 161, 162;
his state of mind, 162;
offered the State Department, 366;
his acceptance and policy, 368–374;
takes charge, 380;
Secretary of State, April 1, 1811, ii. 50;
his sensitiveness about the title to West Florida, 38;
his reply to Foster’s protest against the seizure of Florida, 38,
39;
blames Jonathan Russell for questioning the revocation of the
French decrees, 42;
asserts the revocation of the French decrees, 42, 43;
abandons task of reconciliation with England, 44;
requires revocation of the Orders in Council, 45;
delays Barlow’s departure, 50;
his remonstrances to Serurier about Napoleon’s conduct, 51,
54, 188, 189, 194, 195, 200, 217;
his remarks on protection accorded to commerce, 58;
his acceptance of Madison’s policy, 59–61;
affirms to Foster the repeal of Napoleon’s decrees, 65;
his letter of June 13, 1812, to John Taylor, of Caroline, 66;
his language to Serurier, in October, 1811, 120;
informs Serurier, in November, of executive plan, 129;
agrees to assist the independence of Spanish America, 130;
negotiates purchase of Henry’s papers, 178–180;
his remarks to Foster on Wellesley’s instructions, 192;
his conference with House Committee of Foreign Relations,
March 31, 1812, 197;
his remarks on the embargo, 199, 200, 202;
his relations toward Matthews and the occupation of East
Florida, 238, 240, 241, 242;
his criticisms on the conduct of the war, 396, 397;
assures Serurier he will not negotiate for peace, 415;
proposes to negotiate, 416;
proposes to take a military commission, 419, 420;
hesitates between civil or military control of the war, 421–423;
becomes acting Secretary of War, 423;
excites jealousy, 424, 425;
abandons military career, 425, 426;
offers to prohibit the employment of foreign seamen, 451.
“Moniteur,” The, ii. 253.
Montalivet, Comte de, Napoleon’s Minister of the Interior, i. 221;
his efforts for American commerce, 223, 224.
Moore, Sir John, his Spanish campaign, i. 26, 47, 48.
Morier, J. P., British chargé at Washington, i. 219;
his protest against the seizure of West Florida, 315.
Mountmorris, Lord, i. 265.