100% found this document useful (1 vote)
27 views79 pages

Ai Iot Big Data and Cloud Computing For Industry 40 Amy Neustein Download

The document discusses the anthology 'AI, IoT, Big Data, and Cloud Computing for Industry 4.0', which explores advanced technologies for the fourth Industrial Revolution. It highlights the interconnections of these technologies and their applications across various sectors, including manufacturing, healthcare, and education. The anthology is structured into five sections, covering fundamentals, emerging trends, and the integration of AI and IoT in enhancing industrial processes.

Uploaded by

chamtoausega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
27 views79 pages

Ai Iot Big Data and Cloud Computing For Industry 40 Amy Neustein Download

The document discusses the anthology 'AI, IoT, Big Data, and Cloud Computing for Industry 4.0', which explores advanced technologies for the fourth Industrial Revolution. It highlights the interconnections of these technologies and their applications across various sectors, including manufacturing, healthcare, and education. The anthology is structured into five sections, covering fundamentals, emerging trends, and the integration of AI and IoT in enhancing industrial processes.

Uploaded by

chamtoausega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

Ai Iot Big Data And Cloud Computing For Industry

40 Amy Neustein download

https://ebookbell.com/product/ai-iot-big-data-and-cloud-
computing-for-industry-40-amy-neustein-56901210

Explore and download more ebooks at ebookbell.com


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

Intelligent Network Design Driven By Big Data Analytics Iot Ai And


Cloud Computing Sunil Kumar

https://ebookbell.com/product/intelligent-network-design-driven-by-
big-data-analytics-iot-ai-and-cloud-computing-sunil-kumar-46225982

Intelligent Network Design Driven By Big Data Analytics Iot Ai And


Cloud Computing Kumar

https://ebookbell.com/product/intelligent-network-design-driven-by-
big-data-analytics-iot-ai-and-cloud-computing-kumar-232127512

Blockchain For Big Data Ai Iot And Cloud Perspectives 1st Edition
Shaoliang Peng

https://ebookbell.com/product/blockchain-for-big-data-ai-iot-and-
cloud-perspectives-1st-edition-shaoliang-peng-33562006

Iot Big Data And Ai For Improving Quality Of Everyday Life Present And
Future Challenges Iot Data Science And Artificial Intelligence
Technologies Pradeep Kumar Singh

https://ebookbell.com/product/iot-big-data-and-ai-for-improving-
quality-of-everyday-life-present-and-future-challenges-iot-data-
science-and-artificial-intelligence-technologies-pradeep-kumar-
singh-51681318
Transforming Management With Ai Bigdata And Iot Fadi Alturjman

https://ebookbell.com/product/transforming-management-with-ai-bigdata-
and-iot-fadi-alturjman-38469604

Big Data Management In Sensing Applications In Ai And Iot Renny


Fernandez

https://ebookbell.com/product/big-data-management-in-sensing-
applications-in-ai-and-iot-renny-fernandez-36346742

Serviceoriented Computing And System Integration Software Iot Big Data


And Ai As Services 8th Edition Yinong Chen

https://ebookbell.com/product/serviceoriented-computing-and-system-
integration-software-iot-big-data-and-ai-as-services-8th-edition-
yinong-chen-51641318

Agrotech Ai Big Data Iot Elena G Popkova Anastasia A Sozinova

https://ebookbell.com/product/agrotech-ai-big-data-iot-elena-g-
popkova-anastasia-a-sozinova-46084502

Ai Models For Blockchainbased Intelligent Networks In Iot Systems


Concepts Methodologies Tools And Applications Bharat Bhushan

https://ebookbell.com/product/ai-models-for-blockchainbased-
intelligent-networks-in-iot-systems-concepts-methodologies-tools-and-
applications-bharat-bhushan-50443786
Signals and Communication Technology

Amy Neustein
Parikshit N. Mahalle
Prachi Joshi
Gitanjali Rahul Shinde Editors

AI, IoT, Big


Data and Cloud
Computing
for Industry 4.0
Signals and Communication Technology

Series Editors
Emre Celebi, Department of Computer Science, University of Central Arkansas,
Conway, AR, USA
Jingdong Chen, Northwestern Polytechnical University, Xi’an, China
E. S. Gopi, Department of Electronics and Communication Engineering, National
Institute of Technology, Tiruchirappalli, Tamil Nadu, India
Amy Neustein, Linguistic Technology Systems, Fort Lee, NJ, USA
Antonio Liotta, University of Bolzano, Bolzano, Italy
Mario Di Mauro, University of Salerno, Salerno, Italy
This series is devoted to fundamentals and applications of modern methods of
signal processing and cutting-edge communication technologies. The main topics
are information and signal theory, acoustical signal processing, image processing
and multimedia systems, mobile and wireless communications, and computer and
communication networks. Volumes in the series address researchers in academia
and industrial R&D departments. The series is application-oriented. The level of
presentation of each individual volume, however, depends on the subject and can
range from practical to scientific.
Indexing: All books in “Signals and Communication Technology” are indexed
by Scopus and zbMATH
For general information about this book series, comments or suggestions, please
contact Mary James at [email protected] or Ramesh Nath Premnath at
[email protected].
Amy Neustein • Parikshit N. Mahalle •
Prachi Joshi • Gitanjali Rahul Shinde
Editors

AI, IoT, Big Data and Cloud


Computing for Industry 4.0
Editors
Amy Neustein Parikshit N. Mahalle
Linguistic Technology Systems Dept of Artificial Intelligence and Data
Fort Lee, NJ, USA Science
Vishwakarma Institute of Information
Technology
Pune, Maharashtra, India
Prachi Joshi
Vishwakarma Institute of Information Gitanjali Rahul Shinde
Technology Department of Computer Engineering
Pune, India Vishwakarma Institute of Information
Technology
Pune, India

ISSN 1860-4862 ISSN 1860-4870 (electronic)


Signals and Communication Technology
ISBN 978-3-031-29712-0 ISBN 978-3-031-29713-7 (eBook)
https://doi.org/10.1007/978-3-031-29713-7

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland
AG 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction

AI, IoT, Big Data, and Cloud Computing for Industry 4.0 offers a stimulating
discussion of some of the most advanced leading-edge technologies for the fourth
Industrial Revolution – known as “Industry 4.0.” In composing this 24-chapter
anthology, we have hand-selected contributors engaged in some of the most
fascinating work at universities, research institutes, and think tanks – spanning the
United States, Europe, and India.
Our goal in assembling this collection was to provide the reader with a com-
prehensive understanding of the interconnections of AI, IoT, Big Data, and Cloud
Computing as integral to the technologies that revolutionize the way companies
produce and distribute products and the way local governments deliver their
services. Therefore, at every phase of the supply chain, manufactures are found to be
interweaving AI, Robotics, IoT, Big Data/Machine Learning, and Cloud Computing
into their production facilities and throughout their distribution networks. Equally
important, the authors show how their research can be applied to computer vision,
cyber-security, natural language processing, healthcare, education, and agriculture.
This compendium is divided into five sections:
The first section, which presents a comprehensive exposition of the fundamentals
of Industry 4.0, begins with a rich discussion of the challenges and opportuni-
ties encountered when transitioning to Industry 4.0, thereby substituting AI and
robotics – backed by IoT and cyber-physical systems technologies – for human
labor used to perform a variety of tasks. The authors of that chapter point out that in
order to achieve full automation – in which the entire manufacturing process is sans
human intervention – we avail ourselves of sensors, actuators, and automation.
The chapter that follows provides keen insights into making the Industry 4.0
ecosystem run more smoothly. Namely, the authors explore Human Computer
Interaction (HCI) principles within the context of Industry 4.0, emphasizing the
seamless interface between humans and machines – particularly in those instances
when humans are needed for supervision, maintenance, confirmation of critical
decisions made by machines, and/or handling any malfunctioning of machinery. The
chapter expounds on how in an era where machines are getting smarter and making
human lives easier, Industry 4.0 architecture elevates the power and capability of

v
vi Introduction

machines – and how it utilizes the greater interconnectivity and communication


between already smart machines. As such, combinatorially, this makes the entire
industrial ecosystem smarter and more efficient, and less prone to error.
The next chapter provides a rich and substantive literature review of affective
computing technology, looking at among other things the different modalities,
techniques, and tools for detecting the affective state of the user. The authors
examine the published research on technologies for assessing the affective state of
the user during an e-Learning session, no doubt an excellent domain for testing the
arsenal of technologies, such as Big Data – and more specifically, data mining –
made available for Industry 4.0. They show how, in recent years, web based
education has been perceived as a support tool for instructors, as it can be easily
used at any time or at any place. However, they astutely point out that most courses
emphasize the cognitive area, while wholly ignoring the learner’s feelings and
learning mentalities due to the intrinsic remoteness of distance learning.
Given that emotions play a noteworthy part in the cognitive procedure of
individuals, technology is deficient when it fails to capture the student’s emotive
state. Thus, with the aid of affective computing technology, it is possible for
researchers to understand the learner’s affect during online learning, so that they
are able to take corrective action. The chapter presents an organized review
related to affective computing technology – exploring and enumerating the different
modalities, techniques, and emotions identified by researchers, as well as the tools
they have developed to realize e-learning practicability and improvement. Finally,
several challenges are listed for helping researchers in the course of applying
affective computing technology.
After assiduously analyzing a literature base of 61 research papers, the chapter
authors conclude that though many researchers have used the facial expression
modality for prediction of affective states, few datasets are available which rec-
ognize a broader spectrum of modalities. On the whole, there is still a lot of
potential for predicting learning emotions like confusion, engagement, frustration,
and so forth from a variety of modalities, which gives strong support for exploring
modalities beyond facial expression.
The section closes with a fascinating discussion of how enterprises are expanding
their services onto the network edge, wherein the edge performs all cloud-related
tasks with little or no interaction with the cloud. The authors demonstrate how
AI-enabled edge nodes integrated with IoT devices provide enhancements in
computation power, accuracy, and low latency in service delivery as part of the
broader benefits of intelligent edge-enabled IoT devices. The authors explain how
digital transformation is accelerating the development of the Internet of Things (IoT)
devices, pointing out that with technological advancements digital transformation is
no longer limited to the Internet of Things (IoT) but has extended to the Internet of
Everything (IoE).
That is, smart environments require digitally connecting every device and
collaborative interaction among them. Such a huge development of IoT devices is
promoting voluminous data generation, and these billions of data are being managed
by cloud data centers. Nevertheless, as the authors point out, there is a need for
Introduction vii

data to be managed, processed, and computed outside the cloud, preferably near
the data source. There is likewise a necessity to avoid overburdening of the cloud
and the same can be achieved by adopting edge computing. They explain how edge
computing convention means pushing cloud services onto the “edge” of IoT device
networks.
In the second section, which offers a diversified look at the emerging trends in
AI, we begin with the authors’ presentation of cutting-edge research in the design
of a Chatbot to understand Hindi natural language input from users. Given that
advances in machine learning have greatly improved the accuracy of NLP (natural
language processing), the use of Chatbots across many languages and dialects, and
even more importantly in under-resourced languages, opens up new frontiers for
this technology. The authors present their research on an emotionally therapeutic
Chatbot in the Hindi language. They’ve built their CBT (cognitive behavioral
therapy) Chatbot using the Transformer model architecture, using the Seq-to-Seq
transformer based on a deep learning model.
The authors open their chapter with a discussion of how Chatbots, also known
as conversational interfaces, provide a new way for users to interact with computer
systems. Chatbot software is a feature or an application for communicating directly
through natural language with online users, so as to allow their queries to be solved
without having to wait in a queue for a call center agent to pick up. The authors focus
on Covid-19 as a use case for a CBT-driven Chatbot in development which provides
frequently asked questions about COVID-19 and relevant information resources.
They emphasize the mental health aspect of the disease because Covid-19 not only
impacts physical health but mental health as well.
The authors describe their design of a special Chatbot that offers a cognitive
Patient Health Questionnaire to respond to the mental health needs of users during
the Covid-19 pandemic. Based on the user’s sentiment analysis score, the Chatbot
will then guide the user to find helpful resources to address mental health issues
such as depression. They candidly discuss the many challenges encountered while
building a Chatbot in Indian languages: namely, no appropriate data and information
in Hindi language related to COVID-19 and mental health were available. Therefore,
maintaining and adding data in the database became a tedious task. Being mor-
phologically rich, free word order languages, Indian dialects carry ambiguities and
complexities and are, therefore, complex to handle. Most of the Indian languages
fall under the low resource language category as the datasets currently available for
most Indian languages are limited when compared to the English language.
The chapter contributors explain that because the World Health Organization had
declared Covid-19 as a public health emergency of international concern (PHEIC)
making information about Covid-19 available to speakers of many languages
became a healthcare priority. Guided by this initiative to help make information
available in a public health crisis, they designed the Chatbot by collecting relevant
data from the user and then displaying the results in web and mobile devices. This
CBT-driven Chatbot is built using the Transformer model architecture, which is
based on the attention mechanism.
viii Introduction

Previously, the authors had worked on this model for the English language, and
now to advance the Chatbot in different languages, the authors are developing the
Chatbot in the Hindi Language as well. They have applied a Seq-to-Seq transformer-
based deep learning model into proposed work which presents an end-to-end
potential in the domain. They found that the development of a Chatbot in Hindi
was necessary to help people who know only Hindi language to converse with the
Chatbot easily.
The following chapter presents authors’ findings of an extensive literature review
of machine learning algorithms for predictive maintenance (PdM). The authors
explain that maintaining product and machine safety while lowering maintenance
costs has recently become a serious concern. Predictive maintenance (PdM) is one
important strategy for achieving these goals. They explain that machine learning
(ML) is a good candidate for PdM since current machines come with a large quantity
of operational data. PdM and ML for rotary systems (bearing failures) have both
been discussed extensively in review publications.
They point out that the number of articles in this sector is growing, thereby
emphasizing the necessity of a comprehensive study. Thus, they conduct an analysis
of recent academic articles that were published in the database of ScienceDirect,
Scopus, Institute of Electronics and Electrical Engineers (IEEE), and Google
Scholar from 2017 until June 2021. In summing up, they explain that predictive
maintenance is a popular issue in the context of Industry 4.0, but it comes with a
number of problems that need to be properly researched in the fields of machine
learning. Their literature review study presents a detailed overview of machine
learning algorithms for bearing failure prediction, including the most often used
ML techniques.
In the next chapter, the authors show how soil and fertilizers are an integral
part of the yield to be harvested since the right type of soil and fertilizers in
accurate amounts can enhance both the growth and health of the crops to a
substantial degree. They point out, however, that the present-day system does not
comprehend intelligent recommendations, but instead a scarcity (or nescience) of
experimentation and legacy knowledge serves to strip farmers of additional money
and time. As a result, they recommend the adoption of a system that is both effective
and user-friendly. In so doing, their chapter proposes and implements a system
to predict suitable crops and fertilizers according to geographic location and soil
quality by applying machine learning algorithms.
The authors’ proposed system mainly comprises four stages: analyzing and
visualizing the data; separating the data into training and testing sets; training
the machine learning models; and, finally, comparing the accuracy of each model.
XGBoost and Random Forest were the two models that were the most accurate when
it came to determining the most efficient recommendation model. They point out
that the highest accuracy was found to be 99.31% for crops and 90% for fertilizers,
which makes their system extremely valuable for the farmers to amplify their harvest
yield.
The next chapter closely examines the use of machine learning in cybersecurity,
which has emerged as a natural next step in modern network intrusion detection
Introduction ix

systems. The authors point out that as the whole world is moving toward a digital
first economy, the number of people with malicious intent who wish to exploit
weaknesses in any system has also increased proportionally. In response to this
growing threat, there has been an emergence of a number of Intrusion Detection
Systems (IDS) to perform anomaly/outlier detection to distinguish anomalous traffic
from normal traffic.
The authors performed a comparative study of several machine learning tech-
niques on the well-known NSL-KDD Dataset, and analyzed their effectiveness for
anomaly detection. In particular, they analyzed the use of OneClass SVM, Isolation
Forest, Auto Encoders, and traditional binary classification algorithms. The authors
amassed data suggesting that a system of stacked autoencoders is the most efficient
and accurate solution for creating a network intrusion detection system.
In the next chapter, the authors present an optimized and efficient facial
recognition system using a very advanced face recognition algorithm. They point
out that facial recognition is one of the most important and widely studied topics in
the field of Computer Vision and Artificial Intelligence. The ability of automation
to detect and verify a person’s face using photography is a very important factor
in a number of domains: monitoring, device access control (laptop and mobiles),
security, tracking, law enforcement, biometrics, information security, smart cards,
surveillance systems, and so forth. Various applications help to identify specific
people in specific areas that help to find intruders. Real-time recognition is necessary
for surveillance purposes.
The authors show how their facial recognition algorithm is processed into five
main stages: (i) data collection, (ii) data cleaning, (iii) fine-tuning of the VGG16
model, (iv) model training, and (v) performance checking. The first step is collecting
face images of different people. In the second step, face images are cropped and
saved to remove unnecessary, irrelevant, or meaningless data (noise). In the third
step, a very popular image recognition model, VGG16, is fine-tuned for the specific
case of facial recognition with the help of a convolutional neural network. The
proposed work is implemented using a python module named Keras. To insure
robust experimental design, the authors measure performance using a testing dataset
that is different from the training dataset.
The section concludes with a fascinating discussion of digitization in teaching
and learning. The authors draw the reader’s attention to the fact that Covid-19
compelled students to perform their scholastic work from home, working in a
digital environment. However, they point out that both students and teachers faced
numerous problems, including internet troubles, software requirements for holding
classes, and so on. Witnessing these difficulties, the authors decided to undertake a
poll that takes into account a variety of factors such as the location of students and
professors, Internet connectivity, engagement in college work, online assessments,
etc.
The authors conducted a survey with a large sample size of 1060 students
from various departments (e.g., Computer Engineering, Electronics and Telecom-
munications Engineering, Mechanical Engineering, and Civil Engineering) and 180
teachers who likewise participated in this survey. They found that few students were
x Introduction

interested in online learning, and there were a variety of reasons for this, such as
technical limitations and problems interacting with the instructors. For example,
those residing in rural locations have to contend with more connectivity issues than
students living in cities – which served as one of the explanations given by the
students for their lack of interest and engagement in online classes. They also found
that online classes were ripe for cheating notwithstanding the precautions that were
taken.
Based on the survey results, the authors were able to ascertain which instructional
strategies engage students the most and how many students actually received
the necessary work assistance with their course assignments and class materials.
Analyzing these data, the authors could identify possible solutions to make online
learning more engaging for both students and teachers. Overall, their research can
improve online learning both during and after the pandemic, and this represents an
important contribution to e-learning.
The third section, which examines AI-based data management, architecture, and
frameworks, begins with an exciting presentation of artificial intelligence-based
voice recognition for a remotely operated robot using Arduino. Currently, there are
a variety of methods for controlling a robot. Using voice commands provides one of
the most user-friendly options. For the disabled, presented with mobility challenges,
using voice commands to control the robot’s operations is a viable solution to the
problem.
The authors show how controlling the robot using the user’s vocal commands
in conjunction with the input-data visual feeds makes it easier and more precise
for the robot to operate. Voice-controlled robots powered by artificial intelligence
(AI) assist people in saving time and effort in their daily activities and tasks.
Following the interpretation of voice instructions given by users, a set of control
data for completing a job is created by the robot’s processors. The robot can
perform different movements: going forward or backward, making turns, starting
and stopping, and activating night mode operation.
The next chapter presents the illuminating findings of a group of researchers
who have meticulously examined real-time interactive AR (augmented reality).
The authors describe multidisciplinary research covering the domains of clinical
study, computational engines, run-time interactive user interface, and software
integration, with a ready-to-deploy solution that also serves as a proof-of-concept
prototype for each stage of the AR pipeline (in effect an end-to-end demo or
reference implementation). Among other stages, the implementation encompasses
an Automatic Text Visualizer (ATV). Accordingly, the authors point out that this
is the only published work on ATV for an Indian language, specifically Hindi. The
authors faced a serious challenge given that the Hindi language is morphologically
richer and has a free word order that makes it more complex for computational
language processing. Here, the considered user domain is for cognitive learning.
Visualization may help in decreasing the cognitive load of a person who has
difficulties in comprehension, such as dyslexia. To that end, a dynamic simulation
of a behavior-rich interactive 3D virtual environment supports cognitive learning.
Introduction xi

The authors show that pedagogies such as constructivist learning, situated


learning, game-based learning, and inquiry-based learning can be reinforced by
Augmented Reality (AR). Based on Piaget’s theory of cognitive learning, they
propose visual and linguistic analytics to promote cognitive development by
effectively using AR. To that end, they hypothesize that visual images may be easy
to comprehend for a person having linguistic learning difficulties.
Prior to this work, the authors had studied, designed, and developed Preksha –
a Hindi Text Visualizer – which has a user interface to take language input and
produce a 3D virtual environment. Concomitant with their research on run-time
generation via AR technology, our present work uses cloud porting, computer
vision, interactive virtual assistance, and voice support pertaining to the important
domain of mental health support. All in all, the advancement in AR technology has
led them in the creation of an intelligent live Avatar (3D character) in the immersive
real world as an ally of the end-user. This avatar comprehends and performs actions
based on linguistic instruction using natural language processing (NLP) in text and
automatic speech recognition (ASR) in speech.
The next chapter examines sentiment analysis as a useful tool for social media
and customer analysis, allowing one to glean a summary of the views of a large
population regarding a particular topic. The authors present the findings of an
empirical survey of different techniques for sentiment analysis; they cover the
implementation, advantages, and limitations of each of these methods and conduct
an experiment to find out which of these methods is best suited for sentiment
analysis in today’s scenario. Their experiments conducted on benchmark datasets
and the results they obtained highlight the fact that supervised learning algorithms
like support vector machines (SVMs), multinomial logistic regression (MLR), and
deep learning-based algorithms like convolutional neural network (CNN) and bi-
directional recursive neural network (RNN) show improved performances over the
lexicon-based methods.
In the chapter that follows, the authors point out that their purpose is to cover Sign
Language preliminaries and a global survey of Sign Language Machine Translation
Systems with particular reference to Indian Sign Language. They explain that for
computer technology to make sense, it is imperative to have social relevance, and
the ability to serve across sections of human society where there are physical
impairments.
The authors make the incisive point that while growth of IT applications in
different real-life domains has boosted research in assistive technology for persons
with physical disabilities and for those who are visually impaired, there has
been significantly less IT-enabled technical aid observed for persons with hearing
impairment. They point to the fact that Sign Language has been a prominent source
of communication in this community for social connections. The difference in
modalities of Spoken and Sign Language has been one of the natural reasons for
communication barriers between the hearing impaired and the rest of society. They
show that advances in Machine Translation Systems have triggered the idea of
translation between Spoken Language and Sign Language, and proceed to analyze
in their chapter different issues and aspects of Sign Language Machine Translation
xii Introduction

Systems such as translation methodology, grammatical features, domain, output


interpretation, and handling of simultaneous morphological features. In addition,
they review published work on Sign Language Machine Translation Systems and
astutely identify the gaps in reported systems while proposing a tool to handle
simultaneous morphological features of sign languages at run time.
The section concludes with a chapter on how to effectively digitize Devanagari,
the official Indian language used in preparing documentation. Devanagari is the
most commonly used script in India. It is the official writing system in many
institutes or organizations for documentation purposes. Due to digitization, these
documents need to be stored in digital format. However, automatic transcription
of images of the handwritten text is a tedious task. The authors address the
problem of handwritten Devanagari character recognition. CNN (convolutional
neural networks) was found to be able to classify handwritten text. However, as the
authors revealed, CNN fails to recognize the image correctly for rotated samples –
due to the changed spatiality of the rotated image – and the pooling layer of CNN
likewise failed in cases of disfiguration and/or proportional transformation of any
image.
To meet these challenges, the authors introduced the use of capsule networks
for Devanagari text classification. That is, a capsule network uses a dynamic
routing algorithm that explores the spatial relationship among the features such
as size, feature orientation, perspective, etc. The experiment results show that the
CapsNet (capsule network) framework improves results over CNNs for handwritten
Devanagari character recognition.
In the fourth section, which examines important security issues for Industry 4.0,
we begin with a presentation of the authors’ novel research of a predictive model
that explores the effect of personalization on users’ trust and privacy concerns when
making purchases from an e-commerce site. The authors begin by elucidating that
real-time personalization is adopted by e-commerce websites to leverage business
opportunities with the offering of recommendations that meet users’ implicit needs.
However, as they aptly point out, little is known about its effect on users’ trust
and privacy concerns in the context of purchasing behavior. In their chapter they
present research on a predictive model for exploring the effect of personalization
on users’ trust and privacy concerns toward personalization, and the interrelation
of these concerns with their willingness to purchase on an e-commerce site. SEM
(Structural Equation Modeling) is used to build a model on EFA (Exploratory Factor
Analysis) and CFA (Confirmatory Factor Analysis) results.
The authors’ experimental results show how the model fits to the parameters of
personalization and the role of personalized information relevance toward the belief
of trust and privacy concerns in e-commerce websites. Their findings suggest that:
personalized recommendation is positively related to users’ satisfaction and privacy
concerns. Results show that users’ trust is not positively correlated with privacy
concerns; instead users experience a lower degree of trust when they have higher
privacy concerns. Users with higher satisfaction with ecommerce websites are likely
to develop more trust. Furthermore, they point out that users’ purchase intentions
in general are not affected by satisfaction, but satisfaction positively affects the
Introduction xiii

users’ purchase intention if their privacy concerns are addressed when generating
personalized recommendations. This points out the importance of privacy concerns
as a single variable which has an impact on users’ interaction with ecommerce sites
particularly for those returning to that ecommerce site.
In the chapter that follows, the authors focus on a particular kind of ad hoc
networking, namely, wireless sensor networks (WSN). They indicate that dynamic
WSNs are in high demand due to recent advances in hardware design, rapid growth
in wireless network communications and infrastructure, and increased user demands
for node mobility and regional delivery processes. Various studies have been
conducted to determine how to improve the reliability of routing nodes by using
cryptographic applications, confidence management, or central routing solutions
among other methods. However, as the authors show, a reliable routing structure is
required to confirm the security and efficiency of wireless sensor network routing.
In contrast, the majority of routing patterns are difficult to execute in real-
world circumstances due to the difficulty of dynamically identifying untrustworthy
routing node behavior. Simultaneously, there is no effective way to defend against
attacks from malicious hosts. In light of the aforementioned concerns, the authors
propose a secure routing system for WSNs that incorporates blockchain and rein-
forcement learning to continually enhance routing efficiency and security. Applying
blockchain, a feasible routing mechanism for gaining routing evidence from routing
nodes is presented, making routing information detectable and unalterable. The
trained reinforcement model is used by routing nodes to dynamically select more
efficient and reliable routing channels.
In the next chapter, the authors start by explaining that the popularity of digital
media is on the rise today: besides multilevel images, video, and audio, binary
document images are also digitized in many applications. These include legal
documents, digital books, maps, pictures, and architectural drawings. Security and
confidentiality of information transmitted through digital media are the primary
concerns. Employing cryptography is an imperfect solution because doing so can
expose sensitive information to intruders. Information hiding is more promising as
it focuses on imperceptibility. However, hiding information in binary media is more
difficult than color and grayscale media, as it causes more visual distortion due to
two-shade limitations. Apart from this, the hiding technique one uses needs to take
into account the requisite hiding capacity and the security of hidden information.
The authors present an approach for hiding information in binary images which
tries to address these issues. Thus, the message to be hidden is initially encrypted
by a key known to both transmitter and receiver. This encrypted message is then
represented as a two-dimensional sparse matrix and then transformed to a one-
dimensional matrix where only information about locations of black pixels “1”
in the sparse matrix is preserved. An arithmetic compression algorithm is used
to compress the sparse matrix. Black and white pixel run length (RL) pairs are
utilized for hiding information which satisfies the threshold set for RL pair length.
On the receiver side, a reverse process is applied to extract secret messages. The
encryption, sparse matrix representation, and arithmetic data compression secure the
information and enhance hiding capacity. Utilization of run length pairs minimizes
xiv Introduction

visual distortion. The authors’ study results show that high capacity information is
hidden with less distortion. As digital multimedia sources become more specialized,
the information hidden within them is used for steganography and watermarking.
In the final chapter in this section, the authors examine the Federated Learning
(FL) technique that is widely applied in many fields because models are trained
locally with participant data instead of the training data being gathered centrally.
Applications such as medical imaging, next-word prediction, and speech prediction
widely use FL because these use cases involve sensitive and private data. Although
FL avoids sharing actual data, it still faces various privacy and security concerns.
Adversaries can actively or passively attack the participant’s privacy from the shared
model. There are mainly two issues to handle in FL: (1) protecting user’s privacy;
and (2) integrity of the averaged model (gradients).
The authors point out that currently there is no single solution for privacy
preservation that applies to all situations. But applications may adopt different
Privacy Enhancing Technologies (PETs) to fulfill the additional privacy and security
priorities. Many researchers have proposed a solution to tackle FL’s security and
privacy challenges. Ongoing research addresses the possibility of improving the
privacy and security of participants’ private data using various techniques such as
Homomorphic Encryption (HE), Trusted Execution Environments (TEE), Differen-
tial Privacy Preservation (DPP), and Secure Multiparty Computation (SMC). This
chapter demonstrates how the gradients can be inverted to get the original image,
which reveals limitations in these methodologies. In light of such limitations, the
authors present ways to protect the privacy and security of participants’ data in FL.
The fifth section of this anthology, which is the last section of this book, is
devoted to Software Language Implementation, Linguistics, and Virtual Machines.
The section begins with a chapter that examines data-interoperation protocols for
independently engineered software components. The authors propose hypergraph-
based metamodels as a useful abstraction for designing data-representation formats
that mutually autonomous components can collaboratively adopt as a neutral
encoding strategy. They consider ways to rank data-formats’ expressiveness, and
compare hypergraphs to comparatively “less” expressive metamodels, such as those
implicit in XML and JSON, suggesting in concrete terms why expressiveness is
beneficial to efficient software development. Concrete examples are drawn from
Architecture, Engineering, and Construction (AEC), bioimaging, and, in particular,
Geographic Information Systems (GIS) and digital cartography. The authors take the
discussion to a broader level by considering how to properly frame the “linguistic”
nature of computer programming languages and how software applications have
their own “semantics,” in the sense of representational connections to empirical
objects.
In the next chapter, the authors explore Virtual Machines (VMs) pointing out
that because they are “virtual” and not restricted to physically realizable operations,
they provide a flexible and extensible compilation target that can promote expressive
and adaptable high-level programming languages. The authors examine hypergraph
representations of source code, and analyze how hypergraph constructions can
serve as a point of orientation for designing a VM’s instruction set; they sketch,
Introduction xv

semi-formally, a mathematical overview suggesting how systems similar to the


lambda calculus can be represented in the context of hypergraphs, yielding graph-
theoretic models of such calculi that might be adopted as alternatives to their original
formulations in symbolic logic. They then outline how this approach to Virtual
Machine design and code-modeling may benefit software engineering in contexts
such as data sharing protocols and GUI front-end programming.
In the chapter that follows, the authors focus on image-processing and Computer
Vision. They consider requirements for a hypothetical Virtual Machine whose
intent is consolidation of access to image-analysis functionality by exposing sets
of Computer Vision algorithms through a common interface. They review potential
Virtual Machine features that are not unique to image-processing but may be
especially relevant to that domain, such as recognizing different varieties of number-
pairs as distinct built-in types.
In their discussion they also consider functionality that becomes consequential
insofar as GUI front-ends are engineered alongside image-processing technology,
either through user-guided algorithms (such as interactive segmentation) or through
interactive visualization wherein users review workflow architectures, intermediate
results, color histograms (and other special-purpose GUI components), or make
comparisons between distinct processing algorithms—and similar tools that help
users select and fine-tune image-analysis techniques for specific image series. The
authors provide a case study for algorithms that may be integrated with Virtual
Machines or application GUIs and summarize some facets of a novel database-
related image format and explain in detail the mathematical background of its color
models and in-memory layout for image data.
The next chapter explores animal cognition in the context of linguistics and
robotics, looking at possible models for intermediate-level languages which are
more lifelike and situationally grounded than formal computer code, but less
complex and nuanced than natural (human) language. The authors show how
“animal language” can provide a model for intermediate languages in this sense.
They focus on observations and data generated in the context of research on human-
canine interactions in the specific modality where people train dogs to use “talking
buttons,” inspired by Augmentative and Alternative Communication (AAC) devices
designed to help speech-language pathologists and their patients, such as children
on the autism spectrum. They point to studies that show how dogs (albeit a small
sample size) have achieved surprising levels of communicative sophistication –
which is not to imply that they “talk” in human language, but they (dogs) do reveal
situational and intersubjective/collaborative awareness that potentially goes beyond
dogs’ reasoning abilities even as measured by very recent dog-cognition research.
Their point is that such observations about animal cognition elucidates language at
an intermediate stage which may have applications for research in robotics.
In the last chapter in this section, as well as the coda for the book, the authors
investigate the interconnections between human language, computer languages, and
intermediate forms of communication that may be appropriate for Human-Robot
Interaction (HRI). They argue that much of the cognitive processing intrinsic to
understanding language is actually extra-linguistic, and in particular that the detailed
xvi Introduction

propositional content conveyed by linguistic expressions is, in many contexts, not


structurally present in expressions themselves (or at least, not in its entirety).
In making this argument, the authors consider semantic models which accord-
ingly construe language as providing an “interface” to cognitive “procedures” rather
than a logical encoding of predicate meaning. They propound that these approaches
have merit in the domain of human language, as they offer potential insights in
the realm of programming languages as well. The authors reflect on how linguistic
models may be adapted to human-robot communications, and outline plausible
conventions governing the interface through which humans will examine, guide,
or visualize robots’ movements and surroundings. Similarly, they consider GUI
programming elements and Human-Computer Interaction (HCI) conventions in tra-
ditional computing environments as analogs to HRI (Human Robotic Interactions),
suggesting that configurations of GUI controls—onscreen in application windows—
serve as a proxy structure for developing technologies to model robots’ orientation.
In conclusion, it has been the endeavor of the editors to marshal the most
advanced technologies in AI, IoT, Big Data, and Cloud Computing for inclusion
in a comprehensive volume that openly explores how such technologies facilitate
and guide the fourth industrial revolution – no doubt among the most creative and
most promising phases of industrial development in the history of technology.
Contents

Part I Fundamentals of Industry 4.0


1 Opting for Industry 4.0: Challenge or Opportunity . . . . . . . . . . . . . . . . . . . . 3
Kirti Wanjale, A. V. Chitre, and Ruchi Doshi
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Role of Technologies in Industry 4.0 Transformation . 4
1.1.2 Key Technologies to Transform Production Industry . . 6
1.2 Challenges When One Wants to Switch to Industry 4.0 . . . . . . . . . . 7
1.2.1 Major Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.2 Some More Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3 Benefits of Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.4 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.5 Societal Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.5.1 Relation Between Profit and Purpose . . . . . . . . . . . . . . . . . . . 17
1.5.2 Employee and Customer Advocacy Is Increased . . . . . . . 17
1.6 Case Study: Challenges in Manufacturing Sector . . . . . . . . . . . . . . . . . 18
1.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2 Exploring Human Computer Interaction in Industry 4.0. . . . . . . . . . . . . . 21
Varad Vishwarupe, Prachi Joshi, Shrey Maheshwari,
Priyanka Kuklani, Prathamesh Shingote, Milind Pande,
Vishal Pawar, and Aseem Deshmukh
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.3 Research Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.4 Research Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.5 Discussion and Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.6 Conclusion and Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

xvii
xviii Contents

3 Embedding Affect Awareness in e-Learning: A Systematic


Outline of the Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Snehal R. Rathi and Yogesh D. Deshpande
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.3 Research Strategy and Research Questions . . . . . . . . . . . . . . . . . . . . . . . . 43
3.4 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.5 Survey Outcome and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4 Edge Computing: A Paradigm Shift for Delay-Sensitive AI
Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Shalini Nigam and Mandar S. Karyakarte
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.2 Edge Computing Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.2.1 The Origin of Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.2.2 Criteria-Wise Difference Between Edge
Computing and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . 71
4.2.3 Layered Architecture of Edge Computing . . . . . . . . . . . . . . 71
4.2.4 Software and Hardware Requirements
to Implement Edge Computing (Table 4.2) . . . . . . . . . . . . . 75
4.2.5 Characteristics of Edge Computing . . . . . . . . . . . . . . . . . . . . . 75
4.2.6 Disadvantages of Edge Computing . . . . . . . . . . . . . . . . . . . . . 76
4.2.7 Overview of Edge AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2.8 Why Deep Learning with Edge Computing . . . . . . . . . . . . 77
4.2.9 Edge Intelligence-Enabled Applications of IoT . . . . . . . . 78
4.2.10 Challenges in Edge-Enabled IoT Systems . . . . . . . . . . . . . . 83
4.2.11 Research Opportunities in Edge AI and or
Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.2.12 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Part II Emerging Trends in Artificial Intelligence


5 CBT-Driven Chatbot with Seq-to-Seq Model for Indian
Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Subhash Tatale, Nivedita Bhirud, Priyanka Jain, Anish Pahade,
Dhananjay Bagul, and N. K. Jain
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.2 Literature Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.3 Proposed Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.3.1 Flow of the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.3.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.4 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Contents xix

5.5 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107


5.5.1 Training Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
5.5.2 Application Overview and the Chatbot
Interface Designed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
5.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
6 A Review of Predictive Maintenance of Bearing Failures
in Rotary Machines by Predictive Analytics Using
Machine-Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Yasser N. Aldeoes, Prasad Gokhale, and Shilpa Y. Sondkar
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
6.2 Survey and Analysis for Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
6.3 Technical Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
6.4 Predictive Maintenance and Machine-Learning Techniques. . . . . . 122
6.4.1 Supervised Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
6.4.2 Unsupervised Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
6.4.3 Reinforcement Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
6.5 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
6.6 Applications of ML Algorithms in PdM . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
6.7 Discussion and Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
7 Crop and Fertilizer Recommendation System Using
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Radha Govindwar, Shruti Jawale, Tanmayee Kalpande, Sejal Zade,
Pravin Futane, and Idongesit Williams
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
7.2 Literature Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
7.3 Proposed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
7.4 Implementation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
7.5 Crop Recommendation Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
7.6 Fertilizer Recommendation Methodology . . . . . . . . . . . . . . . . . . . . . . . . . 147
7.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
8 Comparative Analysis of Machine Learning Algorithms for
Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
P. Agarwal, D. Sheth, K. Vaghmare, and N. Sakhare
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
8.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
8.3 Methodology (Fig. 8.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
8.3.1 Dataset. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
8.3.2 Binary Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
8.3.3 One-Class Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
8.3.4 Autoencoders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
xx Contents

8.4 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161


8.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
9 Facial Recognition System Using Transfer Learning
with the Help of VGG16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Rajnishkumar Mishra, Saee Wadekar, Suraj Warbhe, Sayali Dalal,
Riddhi Mirajkar, and Saurabh Sathe
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
9.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
9.3 Proposed Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
9.3.1 Convolutional Neural Network (CNN) . . . . . . . . . . . . . . . . . 167
9.3.2 VGG-16 Neural Network Model . . . . . . . . . . . . . . . . . . . . . . . . 169
9.3.3 Transfer Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
9.3.4 Loading Dataset and Training Model . . . . . . . . . . . . . . . . . . . 172
9.4 Result and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
9.5 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
10 Digitization in Teaching and Learning: Opportunities
and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Sachin R. Sakhare, Nidhi Santosh Kulkarni, Nidhi Deshpande,
and Apurva Pingale
10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
10.2 Paper Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
10.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
10.4 Proposed Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
10.5 Dataset and Data Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
10.6 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
10.6.1 Department . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
10.6.2 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
10.6.3 Participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
10.6.4 Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
10.6.5 Online Practical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
10.6.6 Teacher-Student Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
10.6.7 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
10.6.8 Focus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
10.6.9 Internet Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
10.6.10 Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
10.6.11 Area of Living . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
10.7 Results from Teacher’s Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
10.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Contents xxi

Part III AI Based Data Management, Architecture and


Frameworks
11 AI-Based Autonomous Voice-Enabled Robot with Real-Time
Object Detection and Collision Avoidance Using Arduino . . . . . . . . . . . . . 199
Suvarna Pawar, Pravin Futane, Nilesh Uke, Sourav Patil, Riya Shah,
Harshi Shah, and Om Jain
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
11.2 Literature Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
11.3 Proposed System Design and Methodology . . . . . . . . . . . . . . . . . . . . . . . 203
11.3.1 Flowchart (Fig. 11.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.3.2 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
11.3.3 Project Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.3.4 Voice-Controlled System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
11.3.5 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.4 Robot Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.4.1 Libraries Used. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
11.4.2 Android Application Design (Fig. 11.11). . . . . . . . . . . . . . . 213
11.4.3 Development Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.4.4 Hardware Implementation (Fig. 11.14) . . . . . . . . . . . . . . . . . 214
11.5 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
11.6 Conclusion and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
11.7 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
12 Real-Time Interactive AR for Cognitive Learning. . . . . . . . . . . . . . . . . . . . . . 219
Priyanka Jain, Nivedita Bhirud, Subhash Tatale, Abhishek Kale,
Mayank Bhale, Aakanksha Hajare, and N. K. Jain
12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
12.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
12.3 Need and Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
12.4 Proposed Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
12.4.1 Scalable Cloud Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
12.4.2 Input Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
12.4.3 Computational Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.4.4 Language Processing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.4.5 Knowledge Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
12.4.6 Output Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
12.5 Result and Future Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
12.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
xxii Contents

13 Study and Empirical Analysis of Sentiment Analysis Approaches. . . . 241


Monish Gupta, Sumedh Hambarde, Devika Verma, Vivek Deshpande,
and Rakesh Ranjan
13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
13.2 Literature Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
13.2.1 Lexicon-Based Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
13.2.2 Machine-Learning-Based Methods . . . . . . . . . . . . . . . . . . . . . 243
13.2.3 Deep-Learning-Based Methods . . . . . . . . . . . . . . . . . . . . . . . . . 244
13.2.4 Datasets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
13.3 Experiment Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.3.1 Pre-processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.3.2 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
13.3.3 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
13.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
13.4.1 Results of Lexicon-Based Methods . . . . . . . . . . . . . . . . . . . . . 248
13.4.2 Results of Machine-Learning-Based Methods . . . . . . . . . 248
13.4.3 Results of Deep-Learning-Based Methods . . . . . . . . . . . . . 250
13.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
13.6 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
14 Sign Language Machine Translation Systems: A Review . . . . . . . . . . . . . . 255
Suvarna R. Bhagwat, R. P. Bhavsar, and B. V. Pawar
14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
14.2 Sign Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
14.3 Challenges of Sign Language Machine Translation . . . . . . . . . . . . . . . 258
14.3.1 Simultaneity in Articulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.3.2 Non-manual Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.3.3 Signing Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.3.4 Morphological Incorporation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
14.4 Sign Language Writing/Representation Systems . . . . . . . . . . . . . . . . . . 260
14.4.1 Annotation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
14.4.2 Pictorial Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
14.4.3 Symbolic Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
14.5 Overview of Sign Language Machine Translation
at the Global Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
14.5.1 The Zardoz System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
14.5.2 Translation from English to American Sign
Language by Machine (TEAM) . . . . . . . . . . . . . . . . . . . . . . . . . 263
14.5.3 Visual Sign Language Broadcasting (ViSiCast) . . . . . . . . 263
14.5.4 A Multi-path Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
14.5.5 Research by RWTH Aachen Group . . . . . . . . . . . . . . . . . . . . . 264
14.5.6 Project Web-Sign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
14.5.7 Machine Translation Using Examples (MaTrEx) . . . . . . 265
Contents xxiii

14.5.8 Japanese to Japanese Sign Language (JSL)


Glosses Using a Pre-trained Model . . . . . . . . . . . . . . . . . . . . . 265
14.5.9 Sign Language Production Using Generative
Adversarial Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
14.6 Overview of Sign Language Machine Translation for
Indian Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
14.6.1 INGIT: Limited Domain Formulaic
Translation from Hindi Strings to Indian Sign
Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
14.6.2 Dictionary-Based Translation Tool for Indian
Sign Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
14.6.3 Indian Sign Language Corpus for the Domain
of Disaster Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
14.6.4 Indian Sign Language from Text . . . . . . . . . . . . . . . . . . . . . . . . 268
14.7 Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
14.8 Discussion on the Designed Prototype and Proposed
Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
14.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
14.10 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
15 Devanagari Handwritten Character Recognition Using
Dynamic Routing Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Savita Lonare, Rachana Patil, and Renu Kachoria
15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
15.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
15.3 Problem with CNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.4 Capsule Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
15.5 Dynamic Routing Between Capsules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
15.6 Introduction of Devanagari Character Set . . . . . . . . . . . . . . . . . . . . . . . . . 281
15.7 Challenges in Recognizing Devanagari Character . . . . . . . . . . . . . . . . 282
15.8 Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
15.9 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
15.10 Conclusion and Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

Part IV Security for Industry 4.0


16 Predictive Model of Personalized Recommender System
of Users Purchase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Darshana Desai
16.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
16.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
16.3 Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
16.4 Research Hypotheses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
16.4.1 Personalized Recommendation, Privacy Concerns . . . . . 293
xxiv Contents

16.4.2 Personalized Recommendation and Satisfaction . . . . . . . 294


16.4.3 Privacy Concern with Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
16.4.4 Privacy Concerns and Purchase Intention . . . . . . . . . . . . . . 295
16.4.5 Satisfaction, Trust, and Purchase Intention . . . . . . . . . . . . . 295
16.5 Methodology of Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
16.5.1 Data Collection and Sampling . . . . . . . . . . . . . . . . . . . . . . . . . . 295
16.5.2 Data Analysis and Measurement Model . . . . . . . . . . . . . . . . 296
16.5.3 Confirmatory Factor Analysis and Validity Test . . . . . . . 299
16.5.4 Structural Equation Modeling (SEM). . . . . . . . . . . . . . . . . . . 300
16.6 Result and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
16.7 Conclusions and Future Scope of Research . . . . . . . . . . . . . . . . . . . . . . . 301
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
17 Rethinking Blockchain and Machine Learning for
Resource-Constrained WSN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Nilesh P. Sable and Vijay U. Rathod
17.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
17.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
17.2.1 Conventional Trustworthy Routing Systems . . . . . . . . . . . 308
17.2.2 Blockchain Network-Based Routing Mechanisms . . . . . 309
17.3 Routing Approaches with Reinforcement Learning Algorithms . 309
17.4 Blockchain and Reinforcement Learning Mechanisms
to Improve Communication Network Routing Security
and Efficiency in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
17.5 Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
17.6 Routing Algorithm Based on Reinforcement Learning
and Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
17.7 Blockchain Network Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
17.8 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
18 Secure Data Hiding in Binary Images Using Run-Length Pairs . . . . . . 321
Gyankamal Chhajed and Bindu Garg
18.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
18.2 Literature Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
18.3 Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
18.4 Proposed Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
18.4.1 Compressed Data Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
18.4.2 Information Hiding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
18.4.3 Information Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
18.5 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
18.5.1 Arithmetic Coding Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
18.5.2 Embedding Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
18.5.3 Extraction Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
18.6 Result Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
18.7 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Contents xxv

18.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331


References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
19 Privacy-Enhancing Techniques for Gradients in Federated
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Savita Lonare and R. Bhramaramba
19.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
19.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
19.3 FL Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
19.4 Experiments and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
19.5 Privacy-Enhancing Techniques for FL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
19.5.1 Secure Multiparty Computation (SMC) . . . . . . . . . . . . . . . . 340
19.5.2 Differential Privacy Preservation (DPP) . . . . . . . . . . . . . . . . 340
19.5.3 Homomorphic Encryption (HE). . . . . . . . . . . . . . . . . . . . . . . . . 341
19.5.4 Trusted Execution Environments (TEE) . . . . . . . . . . . . . . . . 341
19.6 Conclusion and Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

Part V Software Language Implementation, Linguistics, and


Virtual Machines
20 Multi-component Interoperability and Virtual Machines:
Examples from Architecture, Engineering, Cyber-Physical
Networks, and Geographic Information Systems . . . . . . . . . . . . . . . . . . . . . . . 347
Nathaniel Christen and Amy Neustein
20.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
20.2 Hypergraph Data Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
20.2.1 Hypergraphs as General-Purpose Data Models . . . . . . . . 356
20.2.2 Examples: Building Information Management
and Medical Imaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
20.2.3 Virtual Machines in the Context of Data
Metamodels and Database Engineering . . . . . . . . . . . . . . . . 362
20.2.4 Database Engineering and Type Theory . . . . . . . . . . . . . . . . 365
20.3 GIS Databases and Digital Cartography . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
20.3.1 Geospatial Data and GUI Events . . . . . . . . . . . . . . . . . . . . . . . . 372
20.3.2 Representing Functional Organization . . . . . . . . . . . . . . . . . . 376
20.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
21 Virtual Machines and Hypergraph Data/Code Models:
Graph-Theoretic Representations of Lambda-Style Calculi. . . . . . . . . . . 387
Nathaniel Christen and Amy Neustein
21.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
21.2 Virtual Machines and Hypergraph Code Models . . . . . . . . . . . . . . . . . . 390
21.2.1 Applicative Structures and Mathematical Foundations 395
21.2.2 Hypergraph Models of Calling Conventions . . . . . . . . . . . 403
xxvi Contents

21.3 Semantic Interpretation of Syntagmatic Graphs . . . . . . . . . . . . . . . . . . . 408


21.3.1 Distinguishing Non-constructive from
Extensional Type Semantics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
21.3.2 Syntagmatic Graph Sequences as a Virtual
Machine Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
21.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
22 GUI Integration and Virtual Machine Constructions
for Image Processing: Phenomenological and Database
Engineering Insights into Computer Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Nathaniel Christen and Amy Neustein
22.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
22.2 Type-Theoretic Constructions at the Virtual Machine Level . . . . . 432
22.2.1 Issues with Overflow/Underflow and Loop
Termination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
22.2.2 Different Variations on Enumeration Types . . . . . . . . . . . . 442
22.3 Integrating Virtual Machines with Image-Processing Operations 448
22.3.1 Exposing GUI Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
22.3.2 Extending Host Applications with
Image-Processing Workflows . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
22.3.3 Manhattan/Chebyshev Distances and
“Black–Grey” Grids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
22.3.4 XCSD Operators as Representative
Image-Processing Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
22.4 An Example Image-Processing Pipeline . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
22.4.1 From Keypoints to Superpixels . . . . . . . . . . . . . . . . . . . . . . . . . 466
22.4.2 Interactive Workflows and Assessments . . . . . . . . . . . . . . . . 470
22.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
23 The Missing Links Between Computer and Human
Languages: Animal Cognition and Robotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Nathaniel Christen and Amy Neustein
23.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
23.1.1 Comments on Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
23.2 Animal Cognition and Talking Dogs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
23.2.1 Lessons for Natural Language . . . . . . . . . . . . . . . . . . . . . . . . . . 496
23.3 Joint Attention and the Foundations of Language . . . . . . . . . . . . . . . . . 501
23.3.1 Learning from Humans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
23.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
23.4.1 Robotics and Environment Models . . . . . . . . . . . . . . . . . . . . . 519
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Contents xxvii

24 GUIs, Robots, and Language: Toward a Neo-Davidsonian


Procedural Semantics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Nathaniel Christen and Amy Neustein
24.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
24.2 Semantics and Situational Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
24.2.1 The (Provisional) Semantics of Syntactic
Dis-ambiguation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
24.2.2 From Natural to Computer Languages. . . . . . . . . . . . . . . . . . 540
24.3 GUIs, Robots, and Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
24.3.1 The Semantics of GUI Control State. . . . . . . . . . . . . . . . . . . . 549
24.3.2 3D Graphics and Robotics Front Ends . . . . . . . . . . . . . . . . . . 556
24.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Part I
Fundamentals of Industry 4.0
Chapter 1
Opting for Industry 4.0: Challenge
or Opportunity

Kirti Wanjale, A. V. Chitre, and Ruchi Doshi

1.1 Introduction

Integrating the physical and computational worlds has led to the fourth industrial
revolution, also termed as Industry 4.0. Instead of having mass and semi-customized
products it has turned to mass and fully customized products is the meaning of
Industry 4.0. Industry 4.0 gives products; Internet enabled facilities, innovative
services, Internet based diagnostics and maintenance in an efficient manner. More-
over, it helps in understanding new business models, operating concepts and smart
controls, and focusing on the user with his individual needs. These are the systems
with industrial automation that enables innovative functionality through Internet and
their access to the cyber world, thus changing the lives every day. All future factories
should operate in accordance with the Industry 4.0 concept [1]. Although this notion
was initially proposed in the context of manufacturing systems, it can be utilized in
a variety of industries, including oil and gas, chemical plants, and power plants.
The purpose of this chapter is to provide a high-level overview of Industry 4.0
technology. Our purpose is to provide a viewpoint on what Industry 4.0 is, what its
issues are in today’s setting, and what the future holds. In this chapter, we have
discussed how new technologies help in Industry 4.0 transformation, challenges

K. Wanjale
Computer Engineering Department, Vishwakarma Institute of information Technology, Pune,
India
e-mail: [email protected]
A. V. Chitre ()
EnTC Department, Vishwakarma Institute of information Technology, Pune, India
e-mail: [email protected]
R. Doshi
University of Azteca, Chalco de Díaz Covarrubias, Mexico
e-mail: [email protected]

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 3


A. Neustein et al. (eds.), AI, IoT, Big Data and Cloud Computing for Industry 4.0, Signals
and Communication Technology, https://doi.org/10.1007/978-3-031-29713-7_1
4 K. Wanjale et al.

faced to implement Industry 4.0, benefits of Industry 4.0, and finally some case
studies where Industry 4.0 is already in place. After reading this chapter, you
will come to know about various aspects of implementing Industry 4.0 standards
in industries. Also, case studies will demonstrate on how Industry 4.0 is already
implemented in various sectors.

1.1.1 Role of Technologies in Industry 4.0 Transformation

It is the digital transformation of manufacturing processes and also production


in the industry. Meaning of Industry 4.0 is with the help of information and
communication technology, switching to the intelligent networking of machines and
different processes for industry. Certain goals need to understand behind Industry
4.0 and they are as follows (Fig. 1.1):
• Automate the decision-making processes
• Monitor various assets and processes in real time
• Enable equally connected value creation networks by involving stakeholders
• Implement information technology (IT) and operational technology (OT) conver-
gence

Fig. 1.1 Goals behind Industry 4.0


1 Opting for Industry 4.0: Challenge or Opportunity 5

Automate the decision-making processes: At the very core, Industry 4.0 includes
the partial transfer of autonomy and autonomous decisions. It is possible to leverage
the information systems with the help of cyber physical systems and machines.
Monitor various assets and processes in real time: In Industry 4.0, it is important
to monitor various assets of the industry. Also, the different processes the industry
is following since long [2].
Enable equally connected value creation networks by involving stakeholders:
When it comes to Industry 4.0, stakeholder involvement is also critical. With the
support of stakeholders, we need to enable value generation networks. It is critical
to comprehend the entire industry value chain. It contains information on suppliers
as well as the sources of the materials. Components required for various types of
smart manufacturing are also critical for improved output. Regardless of the number
of intermediary procedures and stakeholders, the eventual destination of all output,
the end client, must be understood.
Revolutions are disruptive by definition, and the fourth industrial revolution,
often known as Industry 4.0, is no exception. Experts believe that this new
wave of revolution will bring about just as much change as the previous ones.
Unlike previous technological advances such as steam power, electricity, and digital
machinery, which were all based entirely on new technology, Industry 4.0 is focused
on how new and old tools may be used in novel ways [3].
Robots now work alongside industry workers, and autonomous cars refill
production line supplies, according to Industry 4.0. Designers and industrial workers
have been connected via sensor networks and communications technologies, with
intelligent machines and software interacting autonomously over the cloud, and
facilities connected in real time to suppliers and consumers.
Smart technologies, or rather smart technological utilization, offer the man-
ufacturing industry so much potential. Engineers can get instant feedback on
costs and performance predictions. Factory machines and logistics equipment can
automatically assign factory processes. Cloud-based artificial intelligence (AI)
systems can compare parts and processes to optimize performance and computer
systems equipped with machine-based learning algorithms enable robotic systems
to learn and operate with limited input from human operators.
In the manufacturing industry, it is impossible to go a day without hearing the
phrase “Industry 4.0.” Manufacturing technologies are growing to fully integrate
both automation information and data interchange, which makes sense in an age
where most firms’ final aim is digital transformation. There is no end to what
Industry 4.0 may bring to factory settings and beyond, thanks to the integration of
cyber-physical systems, augmented reality, the industrial Internet of things (IIoT),
and cloud computing.
Many businesses, however, continue to struggle with successful adoption;
according to IndustryWeek, two out of every three enterprises piloting digital
manufacturing solutions fail when scaling up to large-scale implementation.
It begs the following question: why have so many businesses recognized that
transformation is required to reach the future of digital manufacturing, but so few
have been able to realize its full potential?
6 K. Wanjale et al.

When it comes to speeding up factory transformation, edge AI and IoT are


crucial. What, on the other hand, is required to accelerate the adoption of these
technologies while also assisting businesses in avoiding the pilot stage?

1.1.2 Key Technologies to Transform Production Industry

Industry 4.0 encompasses the latest technologies that bring digital and physical
world together [4]. It has been like a new industrial stage in which several emerg-
ing technologies are converging to provide digital solutions. Generally speaking,
Industry 4.0 supports the growing trend toward automation and data exchange in
technology including the following (see Fig. 1.2):
1. IoT (Internet of things): It plays a very important role in Industry 4.0. IoT makes
possible to connect all physical devices to Internet and bring automations in the
work.
2. Industrial sensors: The sensors like proximity, temperature, acoustic, and posi-
tion which sense data from large distance brought revolutionary change in
working pattern of industries.
3. CPS (cyber physical systems): Cloud computing along with IoT is already opted
in Industry 4.0 which has changed most of the processes in industries. Also, it
secures all connected assets by applying highly secure policy to protect.
4. Digital twin: Industry 4.0 allows to simulate the change in the production line
before actual change which is also called as digital twin. It saves huge amount as

Fig. 1.2 Key technologies to


transform production industry
1 Opting for Industry 4.0: Challenge or Opportunity 7

the prototypes are available beforehand. We relate digital twin to be a digital


artifact that simulates the behavior and/or appearance of real-world objects.
Making use or combination of digital twins can further assist in predictive
analysis for real-world problems, for example, in production lines.
5. Industrial robotics: This technology has been already opted by many of the
manufacturing industries. It automates the action based on machines. It is also
useful for heavy lifting.
6. AI (artificial intelligence): AI helps in analyzing the huge data generated. Not
only analysis it is possible to add intelligence to machines based on certain
trainings.
7. Mobility/5G: Because of this technology, now it is possible to share the informa-
tion and intelligence to stakeholder at rapid speed.
8. Augmented reality: It is possible to interact with physical things virtually through
digital channels.
Implement IT and OT convergence: For better production, we need to implement
vertical and horizontal integration among various processes. A convergence is
between information technology (IT) and operational technology (OT) [5]. Without
this, there is no industrial transformation. The convergence of IT, OT, and their
backbones includes networks or communication technology and infrastructure
like cloud infrastructure, server infrastructure, storage infrastructure, and edge
infrastructure. The essence of IT and OT convergence includes the data, processes,
and people or teams. In fact, we can say that Industry 4.0 surely gives increased
productivity but along with that it helps in increasing quality, flexibility, and
efficiency too.
Overall, considering the tremendous impact and usage for improved processes
and skilled automation, the discussed technologies are instrumental in driving it. To
mention, with AI, machine learning, CPS, and IoT taking a huge leap to determine
the analytics, real-time data collection has and will carry a significant transformation
toward the manufacturing, thereby staying true to “smart factory” tag [6]. Many
companies today are using the techniques for simulation and are in position to
determine issues, predict the outcomes, and thereby build better products.

1.2 Challenges When One Wants to Switch to Industry 4.0

While Industry 4.0 has good opportunities in the world, we should not ignore the
challenges that the countries will face as they try to ride the Industry 4.0 wave.
Whenever any industry wants to adopt some changes in the industry functionalities,
there is always a bit oppose to it. In case of adopting Industry 4.0 again many
industries are facing various challenges which need to be addressed. Some of them
are as follows.
8 K. Wanjale et al.

1.2.1 Major Challenges

The pursuit of Business 4.0 presents a variety of technological obstacles, with


significant ramifications across numerous facets of today’s manufacturing industry.
Thus, it is critical to design a strategy for all parties involved in the full value chain
and to reach agreement on security concerns and the appropriate architecture prior
to execution. Additionally, some authors assert that implementing Industry 4.0 is a
difficult task that will likely take 10 or more years to complete. Adopting this new
manufacturing process entails a variety of factors and presents a variety of obstacles
and challenges, including scientific, technological, and economic difficulties, as
well as social and political ones.
Following is the mention of few of these significant challenges.
(a) Economic: Whenever an established industry would like to undergo some
changes, the cost matters a lot. It requires high economic costs. New business
model adaptation becomes necessary which again involves some costing.
Before going for some changes with respect to any factor, industry management
must be aware of the benefits, but many times it happens that they do not have
foresight to clearly understand economic benefits.
(b) Social: In case if industry decides to go for Industry 4.0, still there is a big issue
of data privacy. The security of data is a critical issue that needs to be addressed
first.
It is always observed that whenever some change is proposed, stakeholders
are a bit reluctant to the change. The main reason is employer has a threat of
redundancy of jobs [7]. It might be possible that people will lose their jobs
especially for blue-collar workers. Social advancement is consequently charac-
terized as an extension of the opportunities and open doors for individuals to
carry on with an existence that they esteem and have motivation to esteem. This
is a development of decision (UNDP, 2012). Social improvement is a significant
device for the execution of manageable turn of events, thus the quest for social
advancement cultivates economical turn of events. Supportable improvement
should be founded on working on individuals’ personal satisfaction, and that
implies that it ought to be intended to build individuals’ capacity to meet their
financial requirements without hurting the concerned employees.
(c) Political: In case of switching to new ideation, there is problem from regulatory
point of view. It is found that there is lack of rules and regulations, standards
and forms of certifications, unclear legal issues, and data security [8].
(d) Organizational/internal: From organizational perception, reliability and sta-
bility are needed for critical machine-to-machine communication. Also, it
becomes necessary to maintain the integrity of production processes which the
established organizations found bit difficult. Many of the times it is observed
that there is less support from top management.
(e) Ethical challenges: Past industrial revolutions raised their own moral difficulties
at that point, especially the substitution of talented work, such as winding, with
additional proficient mechanical weavers, the subsequent abuse of ladies and
1 Opting for Industry 4.0: Challenge or Opportunity 9

youngsters in the untalented workforce expected to work the weaving machines.


It required some investment before these moral issues were tended to, yet
robotization expanded efficiency and made an entirely different circle of gifted
positions like bookkeeping and the executives. The advancements of the 4IR,
alongside the force of big tech behind their arrangement, raise moral issues that
go past the eventual fate of business; they strike at the core of being human.

1.2.2 Some More Challenges

Even after finding solution to some of the above challenging issues, organizations
still have some more challenges as follows.
1. Information management: An actionable intelligence and connected informa-
tion are very much necessary in Industry 4.0. Process excellence in a context of
relevance, innovation, and timely availability for any desired business is equally
important. In all the information either received or generated while following
processes should be managed properly is one of the big challenges in Industry
4.0 [9].
2. Cyber security or data privacy: Information or data security has also become a
major challenge. Increasing number of attacks in the industrial Internet became
big issue when industry decides to go for certain advancements.
3. Awareness gap: There are many gaps in our comprehension of the technological
developments that are occurring in the tech industry. The workforce’s require-
ments are always changing. Is it possible for your employees to keep up? When
looking for candidates to fill unfilled roles, seek for people who have “digital
dexterity,” or the ability to grasp both industrial processes and the digital tools
that support them. Business models will only be able to successfully deploy
new technology and manage operations if they have the suitable employees.
4. Data sensitivity: With the advancement of technology, there has been an
increase in worries about data and IP privacy, ownership, and management.
Is there a common example? Data is required to train and test an AI algorithm
before it can be properly implemented. The data must be provided in order
for this to happen. Many businesses, on the other hand, are hesitant to share
their data with third-party solution developers. Furthermore, our present data
governance regulations for internal usage within enterprises are insufficient to
facilitate data exchange across organizations. Data is a valuable asset, so be
sure it is safe!
5. Interoperability: The lack of separation between protocols, components, prod-
ucts, and systems is another key concern. Interoperability, unfortunately, limits
firms’ ability to innovate. Interoperability also limits possibilities for upgrading
system components because they cannot easily “swap out” one vendor for
another or one aspect of the system for another [10].
10 K. Wanjale et al.

6. Security: Threats in the manufacturing industry in terms of current and


emerging vulnerabilities are another major worry. Real-time interoperability
is possible because to the physical and digital components that make up smart
factories, but it comes with the risk of a larger attack surface. When various
machines and gadgets are connected to a single or multiple networks in a smart
factory, flaws in any one of them could make the entire system vulnerable
to attack. Companies must anticipate both enterprise system vulnerabilities
and machine-level operational weaknesses to assist tackle this issue. Many
businesses rely on their technology and solution providers to identify vulner-
abilities; therefore, they are not completely equipped to deal with these security
concerns. A cyber assault can devastate a company’s reputation as well as the
personal information of its personnel.
7. Handling data growth: As more companies become dependent on AI usage,
companies will be faced with more data that is being generated at a faster pace
and presented in multiple formats. To wade through these vast amounts of data,
AI algorithms need to be easier to comprehend. Further, these algorithms need
to be able to combine data that might be of different types and time frames [11].
8. Lack of global visibility: Many times the changes and revolutions taking place
in one region are not known to other regions. One of the possible reason could
be lack of communication or significant versatility in working culture as well.
9. Lack of innovation: If the organization is quite old, then there is a possibility
of lack of innovative ideas from senior employees due to conventional way of
thinking.
10. Insufficient investment plan: This is a very important issue faced by many of
the industries. If any change is required in any industry, then big investments
are required. And same has to be proposed in company’s budget as well. In
case if no provision is done, the situation may go panic resulting in failure in
implementation of Industry 4.0.
11. Lack of visibility the performance: In case even though company decided to go
for Industry 4.0 changes, then there has to be proper vision behind this decision.
What could be benefits or losses that company may face that study should be
ready beforehand.
12. Market Plan: Once the company opts for Industry 4.0, marketing team should
have proper plan before sending product to the market. A proper marketing
strategy needs to be defined in this case.
In spite of having some challenges or issues, following are the fields where
Industry 4.0 can be implemented:
1. Manufacturing operations and quality
2. Production asset monitoring and management
3. Inventory logistics and transportation optimization
1 Opting for Industry 4.0: Challenge or Opportunity 11

1.3 Benefits of Industry 4.0

Higher production and efficiency, improved flexibility and agility, and increased
profitability are some of the advantages of Industry 4.0, according to its proponents.
In addition, Industry 4.0 enhances the consumer experience. In addition to being
engaging and exciting, smart factory technologies should always be placed at the
center of any conversation about Industry 4.0. After all, any investment you make in
technology, improved production processes, or enhanced systems should generate
a return on your initial investment in those areas. Because of the advantages that
the technologies provide, the return on investment (ROI) prospects are enormous
with Industry 4.0. This comprises technology that improve automation, machine-to-
machine communication, production oversight, decision-making processes, and so
on.
Following diagram depicts some of the advantages of Industry 4.0 prominently
on the basis of productivity, flexibility, quality, operation, and speed improvement
perspective (see Fig. 1.3).
1. Enhanced productivity using optimization and automation
In Industry 4.0, optimization of processes and of productivity is the first
benefit that everyone can see. Basically, we can say that it is one of the
major goals of Industry 4.0 projects. In other words, it saves costs, increases
profitability, and reduces waste too. Automation can prevent errors and delays,
speed up the production, and in all improve the overall value chain and so on.
Industry 4.0 gives various solutions to optimize, from optimized asset utilization
and smoother production processes which also results into better logistics and
inventory management.

Fig. 1.3 Advantages of Industry 4.0


12 K. Wanjale et al.

2. Real-time supply chain management in a real-time working environment


Industry 4.0 also concentrates on enhanced customer centricity. It is about
the entire life cycle of products and manufacturing. If we consider the entire
value chain and ecosystem, there are many stakeholders involved in the process
manufacturing. They are all customers. And a customer always wants enhanced
productivity, regardless of where they are in this whole cycle or supply chain.
If the final customer wants good products fast and have increased expectations
regarding customer experience, quality, and service, then this impacts the whole
supply chain, all the way up to manufacturing and beyond.
3. Increased business continuity through advanced maintenance and automated
monitoring possibilities
Lets take an example that an industrial robot in a car manufacturing plant gives
up, and then it is not just the robot that is broken. Production gets affected which
leads to wastage of money and unhappy customers, and sometimes production
can be fully disrupted. On top of all the replacement or fixing, the error may
damage the reputation. Orders may get cancelled too. If industrial assets are
interconnected and can be e-monitored through the Internet of Things, then it
is possible to tackle it before they even happen and then the benefits are huge.
Alarming or alerting systems can be set up. In this case, the assets can be
proactively maintained resulting in real-time monitoring, and diagnosis becomes
possible beforehand. No wonder that asset management and maintenance are the
second largest area of IoT investments in manufacturing.
4. Better quality products
It is true that customers want speed but that does not mean they will
compromise on quality. If your production system has many sensors and IoT
techniques, then definitely you can enhance the quality of your products. The
typical components of cyber-physical systems and the Internet of Things can be
automated so as to monitor the quality aspects. On the other side, we can say that
the more the automation, the lesser the errors resulting in better quality. At the
same time, it is also true that robots are not going to take all human jobs over
soon. Many companies have increased the usage of robots, but at the same time
they hired more people.
5. Better work environment
Improving working environment based on real-time temperature, humidity,
and other data in the plant or warehouse is more important part of Industry 4.0.
Quick detection and enhanced protection in case of certain bad incidents and
accidents will give more secured work environment for the workers too. One of
the important factors that results in better work environment is the accessibility
of the data through cloud and thereby giving flexibility to the employees. The
environment will be safer and effective where the key technologies will yield
for intelligent assistance in decision-making. So, in a way, Industry 4.0 provides
improved work environment where human will be at the epitome to drive it with
technologies.
1 Opting for Industry 4.0: Challenge or Opportunity 13

6. Personalization and customization for the “new” consumer


We all know that nowadays digital tools have changed the ways we work,
shop, and live. Consumer behavior and preferences are changed. People are
now more demanding; they do require fast responses and timely informa-
tion/deliveries. On top of that consumers also like a degree of personalization,
depending on the context. They are more interested in customization as per
their needs. Consumers demand to have a direct interaction with a brand and
its manufacturing capability. Digital platforms are used to customize products as
mentioned, which in turn shortened the routes between production and delivery.
In many manufacturing sectors, these things had already happened. Along with
the consumer environment, industries have also employed customization in B2b
context.
7. Adopting state-of-the art models to generate more revenue
It is possible to transform processes, specific functions, customer service,
and experiences, but in the end true value is tapping into new revenue sources
and ecosystems. Handling innovative capabilities for customers to give advanced
maintenance services is also a prominent factor.

1.4 Applications

Nowadays, CPS has many applications as shown in Fig. 1.4. It can be found in
smart health-care wearable devices, smart grid, smart water networks, smart man-
ufacturing, smart factory, gas and oil pipelines monitoring and control, unmanned
and autonomous underwater vehicles, hybrid electrical vehicles, and greenhouse
control.

Fig. 1.4 Applications of Industries


14 K. Wanjale et al.

CPS is going to generate unique opportunities for economic growth. It will also
create skilled jobs. CPS will help ensure the health, safety, and security of the
nation. CPS is going to drive the innovation in a broad range of industries and
can lead to new products. Manufacturing techniques will increasingly rely upon
CPS technologies for advanced and computer-controlled manufacturing processes
like automated design tools [12]. It will also bring dynamism in management of
production lines, factories, and supply chains.
1. Smart manufacturing and production
• CPS in manufacturing systems is used for logistics integrated with commu-
nication abilities. In manufacturing sectors, it will be used in sensors and
actuators, robot-operated machines, laid machines, mining machines, and
welding machines to improve efficiency of production.
• Agile manufacturing, supply chain connectivity
• Intelligent controls, process, and assembly automation
Advantages
• It helps to enhance global competitiveness.
• It has increased the efficiency, agility, and reliability.
2. Transportation and mobility
• It is possible to have vehicle-based transportation CPS. Proximity detection
for safety (vehicles coming close).
• Vehicle health monitoring.
• Autonomous or smart vehicles (surface, air, water, and space).
• Vehicle-to-vehicle and vehicle-to-infrastructure communication.
• Drive-by-wire vehicle systems, plug-ins, and smart cars.
• Interactive traffic control systems.
• Next-generation air transport control.
Advantages
• It gives accident prevention and congestion reduction.
• Also, it supports greater safety and convenience of travel.
3. Energy sector
• Use of CPS in energy sector helps in demand management with distributed
generations, automated distribution with intelligent substations, wide-area
control smart grids, and data aggregation units.
• Electricity systems.
• Renewable energy supply.
• Smart oil and gas production.
• Smart electric power grid.
• Plug-in vehicle charging systems.
1 Opting for Industry 4.0: Challenge or Opportunity 15

Advantages
• CPS in this field also helps in greater reliability and security.
• CPS enables diversity of energy supply, which increases energy efficiency.
4. Civil infrastructure
• Bridges and dams
• Municipal water and wastewater treatment
• Active monitoring and control system
• Smart grids for water and wastewater
• Early warning systems
Advantages
• It increases assurance of quality.
• CPS gives more safe, secure, and reliable infrastructure.
5. Health care
• Highly accurate medical devices and systems
• Image-guided surgery and therapy (robotic surgery, accurately precisely)
• Control of fluid flow for medical purposes and biological findings
• Intelligent operating theaters and hospitals
• Engineered systems based on cognition and neuroscience (e.g., brain–
machine interface, orthotics, exoskeletons, and prosthetics)
• Personal care equipment, disease diagnosis, and prevention
• Wireless body area networks
• Assistive health-care systems
• Wearable sensors and implantable devices
Advantages
• In this industry, the use of CPS helps in expanding the life span of every
individual.
• Hospital-based to home-based health care is possible because of CPS.
• CPS-based medical instruments enable more individualized health care.
• Advanced CPS can lead to new capabilities to diagnose, treat, and prevent
disease.
6. Buildings and structures
• High-performance residential and commercial buildings
• Net-zero energy buildings and appliances
• Whole building controls, smart HVAC equipment
• Building automation systems
• Network appliance systems
16 K. Wanjale et al.

Advantages
• It has increased building efficiency, comfort, and convenience.
• Improved occupant health and safety.
• Also, we can control indoor air quality using CPS-enabled household devices.
• CPS enables early bomb disposal system and emergency response robotics to
sensor networks providing advance warning of catastrophic events.
7. Defence
• Intelligent unmanned aircraft and ground vehicles
• Autonomous and smart underwater surface sensors
• Overarching systems that integrate the nation’s fighting forces
• Soldier equipment
• Weapons and weapons platforms
• Supply equipment
• Smart (precision-guided) weapons
• Wearable computing/sensing uniforms
• Intelligent supply chain and logistics systems
Advantages
• It has increased war-fighter effectiveness.
• Increased security and agility.
• Greater capability for remote warfare reduces exposure for human war-
fighters.
8. Emergency response
• First responder equipment
• Communications equipment
• Firefighting equipment
• Detection and surveillance systems
• Resilient communications networks
• Integrated emergency response systems
Advantages
• Increased emergency responder effectiveness, safety, efficiency, and agility
• Rapid ability to respond to natural and other disasters

1.5 Societal Impact

In a Business round table held in August 2019, the fact of benefit and income
being the principal factors along with systematic procedures and ventures was
underlined by business pioneers. Our review repeats this developing comprehension
and obligation to society. A long time back, just 35% of CEOs trusted that the main
1 Opting for Industry 4.0: Challenge or Opportunity 17

associations representing things to come expected to spend more time planning


for the possible effect that new innovative arrangements might have on society. In
this year’s study, many CEOs said expanding their organizations’ positive effect on
society was among their main five wanted results of their Industry 4.0 ventures—a
sign that leaders are beginning to figure out that business plays a significant part in
forming what these innovations could mean for society.

1.5.1 Relation Between Profit and Purpose

Innovation is taking a front seat: 62% of CEOs demonstrated that creating a


gain while emphatically adding to society was an Industry 4.0 venture need for
their associations—the second-most-referred to need subsequent to preparing and
creating ability. Of those 24% proposed they are gaining a lot of headway against
this objective, a similar rate who accept their associations are in front of their rivals
in doing as such [13].
It may be advising that of those professing to make extraordinary advancement,
69% have an extensive Industry 4.0 system. Having a conclusive system will
likewise assist with dominating contenders: 60% “with methodology” guarantee to
be in front of the opposition, while just 13% “without methodology” make this same
dispute.

1.5.2 Employee and Customer Advocacy Is Increased

At the point when inquired as to why their organizations decide to concentrate


on cultural issues, 42% of CEOs referred to the valuable chance to produce
income which recommends that benefit and income proceed to drive associations’
procedures and inspirations. Numerous recent college graduates wish to work
for organization that have a history of making money. Associations that do not
uphold more extensive cultural responsibilities could begin seeing it influence
their enrolment, maintenance, and generally speaking main concerns [14]. Issues
that appear to have soar in significance for leaders are environmental change and
natural manageability [15]. A long time back, as it were 10% of CEOs said their
organizations could impact ecological manageability to a huge degree. This year,
48% see handling environmental change as a top liability; 38% put empowering
manageability at the same need level.
With a rising number of horrendous, environment-related occasions influencing
populaces and geologies, CEOs are starting to feel, or possibly figure out, the
business basics of environmental change. Almost 50% of CEOs (48%) totally
concur that the impacts of environmental change will adversely influence their
associations, and very nearly 90% totally or to some degree concur.
18 K. Wanjale et al.

1.6 Case Study: Challenges in Manufacturing Sector

Let us consider the case study of manufacturing sector that if these industries ready
to opt for Industry 4.0 then what all issues they may have to face. Also refer to
Fig. 1.5.
(a) Shortening of product life cycle: The complete product development life cycle
gets changed. As some sort of automation is involved in this, it might be possible
that product may get ready in less time period. So being an owner of the
company one has to focus a lot on this [16].
(b) Reduction of lot sizes: It is well known that in industry the scale is always versus
cost. If we increase the scale, the manufacturing cost varies accordingly. And
same selling cost may be not possible with reduced scale.
(c) Increased diversity of versions: Industry also need to opt for diversity in
productions versions. If a company is producing 300 mg and 500 mg pouches,
then there is a need to produce small pouches too for better selling of the
product.
(d) Shortening of ROI: We all know that every investor always thinks about return
of investments. If company is opting for Industry 4.0, a thought has to be given
on ROI.

Fig. 1.5 Challenges in manufacturing sector


1 Opting for Industry 4.0: Challenge or Opportunity 19

(e) Energy efficient: One needs to address the issue of power required after opting
for Industry 4.0. As many of the processes transition to automation, how much
extra electricity would be required? That is also an issue.

1.7 Conclusion

Industry 4.0 is future of industries. If one wants to survive in the competitions


companies should opt the changes happening around. As previously stated, the
integration of smart products with smart manufacturing, smart logistics, smart
networks, and the Internet of Things results in the transformation of existing value
chains and the emergence of new and innovative business models, positioning the
smart factory as a critical component of future smart infrastructures. Numerous
benefits and revenues will accrue as a result of this new infrastructure approach.
Indeed, virtual and augmented prototyping facilitates the interactive exploration
of all product functionalities by all stakeholders. Industry 4.0 enables a new
method of doing business and a new source of value creation, particularly for
traditional manufacturing firms. One of Industry 4.0’s most significant disruptors
is the ever-increasing value and importance of data. Businesses must view data as
a rare and valuable raw commodity. As a result, businesses will need to rethink
how they approach and manage massive amounts of data and information. This
will be one of the most significant issues confronting traditional manufacturing
firms. Utilizing dynamically programmable production technology in conjunction
with increased machine flexibility (e.g., flexible grip hooks) has a number of
advantages, including increased customization, more dynamic resource/capacity
allocation, shorter changeover times, and reduced production complexity due to
fewer constraints. This enables more rapid, cost-effective, simple, and diversified
manufacturing methods. Industry 4.0 provides numerous benefits to businesses
across multiple dimensions.
When the fourth generation of the industry arrived, it created an opportunity
for reliability engineering to improve system dependability by utilizing big data, the
Internet of things, and quick response to changes. In contrast, increasing complexity,
dependencies and interconnections between components, dynamic behavior, and
newer components like CPS and sensors provide difficulties for reliability engineers.
In order to keep up with the times, traditional approaches must be updated and a new
framework for reliability, risk, safety, and security should be devised. In this chapter,
the concept of Industry 4.0 is introduced, as well as some of the potential difficulties
it presents. It is not a pure or faultless review, and it is not focused on specific areas
of Industry 4.0 and reliability engineering, but we are there to gain a perspective
on these themes and to share our experiences. Some important problems such as
system modeling, data, CPS, uncertainty, the interface problem, human–machine
interaction, optimization, and other topics are taken into consideration. Throughout
20 K. Wanjale et al.

each part, the underlying principle of the object is described, and some potential
new study possibilities are suggested. Today, multicomponent system modeling, the
interdependence of these components, the optimization of the supply chain while
also optimizing maintenance and production, and the modeling of resilience are all
receiving increased attention.

References

1. “A Roadmap to Industry 4.0: Smart Production, Sharp Business and Sustainable Develop-
ment”, Springer Science and Business, Media LLC, 2020
2. Michael Sony,” Design of cyber physical system architecture for industry 4.0 through lean six
sigma: conceptual foundations and research issues”, Production & Manufacturing Research
2020, VOL. 8, NO. 1, 158–181
3. “Industrial Internet of Things”, Springer Science and Business Media LLC, 2017
4. Jeschke, S, Brecher, C, Song, H. Industrial Internet of Things. Cham: Springer, 2017.
5. Zhang, Y, Qiu, M, Tsai, C-W. Health-CPS: healthcare cyber-physical system assisted by cloud
and big data. IEEE Syst J 2017; 11: 88–95
6. J Lee, B Bagheri, HA Kao, A cyber-physical systems architecture for industry 4.0-based
manufacturing systems Manufacturing letters, 2015 - Elsevier
7. Colombo, AW, Bangemann, T, Karnouskos, S. Industrial cloud-based cyber-physical systems:
the IMC-AESOP approach. Cham: Springer, 2014
8. Shah Ahsanul Haque, Syed Mahfuzul Aziz, “False Alarm Detection in Cyber-physical Systems
for Healthcare Applications”, AASRI Procedia, 2013
9. Zhang, Z., Wang, H., Wang, C., Fang, H. Interference mitigation for cyber-physical wireless
body area network system using social networks IEEE Transactions on Emerging Topics in
Computing 2013
10. Yilmaz, T., Munoz, M., Foster, R. N., Hao, Y. Wearable wireless sensors for healthcare
applications Proceedings of the International Workshop on Antenna Technology (iWAT ’13)
2013
11. Haque, S. A., Aziz, S. M. Storage node based routing protocol for wireless sensor networks
Proceedings of the 7th International Conference on Sensing Technology (ICST ’13) 2013
Wellington, New Zealand
12. Avrunin, G. S., Clarke, L. A., Osterweil, L. J., Goldman, J. M., Rausch, T. Smart checklists for
human-intensive medical systems Proceedings of the IEEE/IFIP 42nd International Conference
on Dependable Systems and Networks Workshops (DSNW ’12) 2012 Boston, Mass, USA
13. Lee, I., Sokolsky, O., Chen, S., Hatcliff, J., Jee, E., Kim, B., King, A., Mullen-Fortino, M., Park,
S., Roederer, A., Venkatasubramanian, K. K. Challenges and research directions in medical
cyber-physical systems Proceedings of the IEEE, 2012
14. Tang, L. A., Yu, X., Kim, S., Han, J., Peng, W. C., Sun, Y., Leung, A., La, P. T. Multidimen-
sional sensor data analysis in cyber-physical system: an atypical cube approach International
Journal of Distributed Sensor Networks 2012.
15. Huang, Q., Ye, L., Yu, M., Wu, F., Liang, R. Medical information integration based cloud com-
puting Proceedings of the International Conference on Network Computing and Information
Security (NCIS ’11) May 2011
16. Wang, J., Abid, H., Lee, S., Shu, L., Xia, F. A secured health care application architecture for
cyber-physical systems Control Engineering and Applied Informatics 2011
Chapter 2
Exploring Human Computer Interaction
in Industry 4.0

Varad Vishwarupe, Prachi Joshi, Shrey Maheshwari, Priyanka Kuklani,


Prathamesh Shingote, Milind Pande, Vishal Pawar, and Aseem Deshmukh

2.1 Introduction

Affiliation of industrial machines, brought about by the collaboration of automation


technology, machine learning, and communication abilities for the independent
running of an industry is the concrete objective of the Industry 4.0 framework.
Industry 4.0 plays an important role in the manufacturing industry by ensuring
security, flexibility, customization, time efficiency, and a dynamic environment as
well as increased productivity and quality [1, 2]. Through connecting smart devices
and machinery, employing self-learning solutions, and enhancing self-direction
capabilities, it is envisioned that the communication cost is reduced while flexibility
for manufacturing, mass customization capabilities, production speed, and quality
are increased [3–5].

V. Vishwarupe ()
Department of Computer Science, University of Oxford, Oxford, UK
Human Inspired AI Research, London, UK
e-mail: [email protected]
P. Joshi
Department of AI & DS, Vishwakarma Institute of Information Technology, Pune, India
S. Maheshwari
R&D Division, Tata Elxsi, Pune, India
P. Kuklani
School of Engineering, Northeastern University, Boston, MA, USA
P. Shingote · M. Pande · V. Pawar
Maharashtra Institute of Technology WPU, Pune, India
e-mail: [email protected]
A. Deshmukh
Business Analytics Division, System Applications and Products (SAP), Pune, India

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 21


A. Neustein et al. (eds.), AI, IoT, Big Data and Cloud Computing for Industry 4.0, Signals
and Communication Technology, https://doi.org/10.1007/978-3-031-29713-7_2
22 V. Vishwarupe et al.

Though the number of benefits of Industry 4.0 is tempting, Industry 4.0


also reveals several challenges or in a more critical way obstacles to improving
productivity at the workplace [6]. One such challenge is the work division between
manpower and machines, which allows us to explore Industry 4.0-catered human–
computer interaction (HCI) to reap the benefits of automated and smart machines,
without compromising on the strength of the current manpower. Work division
would enable a role change of humans to shift from low-level operations—which
can be dangerous, dirty, difficult, and dull tasks—to high expertise and safe tasks [7–
10]. Moreover, human intelligence and intervention remain a key role because of the
safety, security, social aspects, and uncertainties posed by such autonomous systems
[11–14]. Even with the dangerous roles out of the way of industry workers with the
fourth industrial revolution, a good design and Human-Computer Interaction (HCI)
in place would be required to make humans adept in the newly defined roles, so as to
operate complex machines with negligible or no error. Thus, this research work aims
to review the current vision of HCI and user experience (UX) design of Industry 4.0
and recommends practices best suited for the fourth industrial revolution.

2.2 Related Work

With the increasing stress on human satisfaction, ease and focus on better experi-
ences, there has been an emerging trend in research work related to human-centered
design and development of HCI from an Industry 4.0 perspective. Extracts from
such work are mentioned in this section, for obtaining a better picture of the overall
context. A good user experience (UX) and intuitive HCI is the cornerstone for the
smooth operation of any industry, and with Industry 4.0 mechanisms, these become
crucial. A system needs to be designed to generate positive UX for increasing user
association and encouragement [15–18] presented that bad user interface design
can lower user motivation to use a system. Beard-Gunter [19] worked with HCI
design in industries to develop and optimize engagement metrics compared to
games. To ensure the effectiveness of a system, a proper balance is required to
be maintained between usability and system functionality [20, 21]. Considering
design elements in developing the industrial automation system can facilitate the
meaningful interactions between the system and the user [22–24].
Recent advances in artificial intelligence (AI) and HCI have seen remarkable
contributions that have shaped the world. From being a virtual concept in scientific
fiction(sci-fi) a few years ago, AI is literally changing the way we act and interpret
the world around us. HCI and AI can be coined as two sides of the same coin
according to us, and can be termed as entailing the same story in different ways
or entailing different parts of the same story, but ultimately working in unison for
a common goal. Ben Shneiderman, one of the pioneers in the field of HCI, has
emphasized the use of AI in collaboration with HCI researchers to further develop
the field of human-inspired AI [27–35].
There has also been a huge upheaval in the way HCI is used in the manufacturing
industry to optimize for quality and not cost. The work of Dudley, Jacques, and
2 Exploring Human Computer Interaction in Industry 4.0 23

Kristensson is particularly intriguing in this regard wherein they have tweaked a


very important facet of Bayesian optimization, the activation function: a particularly
important statistical machine learning method to improve user interface design using
crowdsourcing [4]. The use of virtual reality (VR) and mixed reality (MR) as a
driving force for the domain of HCI has been on the rise too [5, 6]. Using intuitive
user interfaces (IUI), VR and MR gadgets, and head-mounted displays (HMDs)
have also made it possible to interact with the physical medium in a way that is
more immersive. Simulation of touch displays for people with motor disabilities,
gesture typing, 3D-based VR models, gaze-based motion tracking gadgets are also
some of the advancements that have helped in fusing the two realms of AI and HCI,
by developing smart and interactive systems [7–11].
The use of AI-based HCI systems and HCI-oriented AI systems has also been
observed, especially in the medicine sector. AI-based diagnosis is difficult to
identify diseases and in areas where human intervention seems to have stuck a dead
end, enables clinicians to find out ways which are improving health care such as
Suckling et al.’s work on gender classification in task functional brain networks
[14, 15]. Use of AI–HCI conjunct systems in improving language models for natural
languages also depicts the pervasive nature of the said field. Korhonen et al. have
done some remarkable work in this regard [16, 17]. Inferring web page relevance,
use of HCI models in certain Internet of things (IoT) tasks, generating personalized
recommendations for certain users in the browser, and also using few facets of HCI
in the development of smart set-top box TV recommendation systems have enabled
the development of smart AI based systems [12, 18–22].
While there has been a substantial work at the crossroads of AI and HCI, it is
still not extensive enough to be able to use HCI and AI in scenarios wherein it
becomes difficult to have experts from both the fields working together such as
cyber-physical systems [24–26]. Thus, it is important that the stakeholders from
respective fields are shown what, when, why, and how they can contribute, what are
the major roles for each discipline and its experts are, and how can AI be used as a
catalyst for developing HCI systems, and vice versa. In the context of this chapter,
we try to gather insights from the previous works in the aforementioned and present
our research that shall help develop this exciting field of knowledge.
When it comes to HCI in Industry 4.0, we need to understand the prior work in
the context of a plethora of subfields, namely human–machine interaction (HMI),
virtual, augmented, and mixed reality applications in the context of cyber-physical
systems, and surveys which have been conducted keeping HCI and HMI under the
purview on Industry 4.0 as a research topic. A large number of surveys covering
peculiar aspects of HMI or human factors in I4.0 has been identified in the endeavor
of collecting relevant literature for this chapter. The vast majority of these studies
are specifically oriented toward either VR or AR applications, or both, within I4.0
operations and, thus, covers only a subset of this chapter’s scope. Büttner et al.
conduct a survey on AR and VR applications in I4.0 manufacturing activities, more
precisely on the available platform technologies and application areas, creating a
small-scale design space for such Mixed Reality applications in manufacturing [36].
Random documents with unrelated
content Scribd suggests to you:
HERMAN MELVILLE
1819-1891

HERMAN MELVILLE

At intervals during the last forty years, Herman Melville has been
discovered by intellectuals, belauded, a little read, and once more
forgotten. It is typical of the man and of his perverse withdrawal
from the lettered world, that even before his death he was the
subject of spasmodic battues by appreciative readers, who sought to
startle into activity their idol's reputation by methods suited to the
enlivenment of an author long dead and hidden by the undergrowth
of time.
The latest and the most thorough stimulation to which the repute of
Melville has been subjected is now at full stretch. Whatever its
critical shortcomings, this concerted attempt to write a new name on
the roll of nineteenth-century genius bids fair to achieve one
important triumph—the immortalization of Moby Dick and,
consequentially, of the man who wrote it.
A very minor result of the same Melville boom is his inclusion in this
book. Save in the matter of date, he has little in common with the
other writers here treated. They are of Victorianism Victorian; he, if
he belongs to any period or to any genealogy, is of the ageless,
race-less family of the lonely giants. That his fellows between these
covers are all lesser novelists than he, I am unprepared to admit.
Trollope excels him in humour, wisdom and depth of understanding;
he must rank, as master of technique, below all save Whyte-Melville
and perhaps Disraeli. But he has a quality of grandeur, a majesty of
isolation that they lack, and his very inchoate bitterness of spirit
transcends by its datelessness their well-rounded friendliness and
their complacent wit.
If that were not enough, he differs from them also in the very
texture and subject of his work. His mysticism, for all its yearning
and its gloom, is of a spiritual quality far rarer than that of their
materialism, for all its vivacity and its aspiration. Between him and
Reade is a certain soul resemblance, but the advantage in this is
Melville's. He directly influenced the Englishman,[4] and beside his
remote immensity Reade, even at his most massive and his most
contentious, seems but a dwarf, roaring disgruntlement against the
walls of Grub Street.
4. There is in existence the copy of Moby Dick in which Reade made extensive
notes and excisions, maybe with the idea of issuing an abbreviated version.
Readers of Love Me Little, Love Me Long will immediately detect the
influence of Melville's great book on the whaling narrative related by Frank
Dodd to Mr. Fountain and to his lovely niece.
Melville's books are the strange mirror of a strange life. The young
writer, famous at thirty, who yet lives out a diminuendo of
appreciation to an old age of disappointed poverty, is no unfamiliar
figure. One thinks immediately of William Harrison Ainsworth, from
the foppish eminence of his early twenties to the last sad years in a
Tonbridge villa, when he laboured at the regular production of three-
volume fiction—one novel a year at seventy-five pounds the time—
alone amid the memories of vanished splendour. But the man who
as a youth wins reputation in letters and passes, of deliberate
purpose, maturity and age in other, non-literary, pursuits is a scarcer
type, of which Melville is an unusual example.
Born in 1819, he published Typee at the age of twenty-seven, Moby
Dick five years later, and The Piazza Tales in 1856. From then until
his death, in 1891, he wrote little, and, to the even greater
detriment of his fame, withdrew entirely from the society of writers,
hiding his name and his very existence behind the screen of an
obstinate reserve.
I have no intention here either of summarizing the life or of passing
judgment on the works of Herman Melville. The former is related in
detail by Professor Raymond Weaver, whose large biography is of so
recent date that any shorter presentment of the facts must merely
be a précis of the information therein contained. The respective
merits of the outstanding books are already (and will remain for long
enough) the sport of literary publicists, to whose views and counter-
views I refer the curious. One feature, nevertheless, of
contemporary opinion challenges to protest my amateur temerity.
Apart from Moby Dick, the neo-Melvillian has little beyond
patronizing approval for the books of his hero; Typee (1846) and
Omoo (1847) are interesting records of travel, remarkable mainly for
the early date of their appearance and as forerunners of the South
Sea School in letters and in painting. Mardi (1849), Redburn (1849),
and White Jacket (1850) claim respect as autobiography and for
passages that reveal their author's genius struggling toward a more
complete expression. These are the rising steps to the crowning
summit of Melville's work. There, unique and peerless, stands Moby
Dick; beyond it the terraces fall away again, and even more steeply
than they rose.
Is this opinion a just one? I am a little uncertain. With no desire to
denigrate Moby Dick or to deny it the first place in importance
among Melville's books, I would venture that his genius is more
perfectly and skilfully revealed in a volume of stories belonging to
the so-called decadence. The Piazza Tales are liable to be dismissed
by the critic of to-day with kindly condescension as “the best of the
later work,” a judgment as misleading as it is easily explained. In
some degree the worship of Moby Dick and the comparative neglect
of the other work are inevitable corollaries to the Melville boom at its
present stage. During the first period of any new æsthetic wonder,
the peculiar transcends the normal in the imagination of disciples.
Let the case of Melville be paralleled with that of Tintoretto's pupil,
Greco. When first set in the revival of interest in this painter's work,
he was most admired when most bizarre. He won favour for the
contrast he presented to his immediate forerunners and his
contemporaries. The name of Greco stood for certain mannerisms in
colour and composition, and, the more a Greco picture revealed
those mannerisms, the better a Greco it was judged to be. Already,
from the hand of time, this formula of appreciation is suffering
adjustment, but Melville is to-day precisely at the point where
yesterday Greco stood. Like the master of Toledo, he has peculiar
and noticeable tricks of matter and of style. Because Moby Dick is of
these tricks more redolent than the author's other books, it tickles
the palate of contemporary enthusiasm more thoroughly than do
they.
Such preference is by its very nature tenacious. Moby Dick, for all
that it is unmistakably Melville, is far from flawless. What if Melville
recognized its weaknesses? What if he deplored those very
characteristics that are to-day lauded as his priceless individuality
and chief claim to fame? With all its vastness and its wonder, the
epic story of Ahab and the great white whale displays the faults of
its author as strikingly as it reveals his talents. In years to come,
when the glamour of oddity has paled a little, it will be admitted that
the book labours under a sad weight of intolerable prolixity. Nor is
this prolixity implicit in the greatness of Melville's writing. This is
proved by the two chief stories in The Piazza Tales. Benito Cereno
and The Encatadas hold in the small compass of their beauty the
essence of their author's supreme artistry. They are profound and
lovely and tenderly robust, but they are never tedious and never
wilful. Surely it were generous to admit that Melville sought to
improve on Moby Dick and that, in the matter of technical control,
he succeeded? These two stories cannot as literary achievement
compare with their vast and teeming predecessor. That is natural.
But they may not be ignored as the last glimmer of a dying lamp.
They mark the highest technical level of their author's work, and,
had not within a year or two of their appearance the darkness of
self-distrust descended on him, might well have proved a revelation
of something yet to come from the brain of Herman Melville,
something destined—but for the treacherous inhibition of human
frailty—to excel in power everything to which that brain had
previously given birth.
BIOGRAPHY
HERMAN MELVILLE, MARINER AND MYSTIC. By Raymond M.
Weaver. New York. Doran. 1921. London: Humphrey Milford.
1922.
This long and careful book is based on the papers and
information of the Melville family and represents the sum of
present-day knowledge of Melville's life and ideas.
NOTE
Collectors should observe the fact that it was the custom of
American publishers in the fifties and sixties to bind one edition in
cloths of various colours for the purposes of window display.
Consequently Melville's first American editions are met with in a
variety of colourings which, in the matter of date of issue, rank
equally.
I.—EDITIONES PRINCIPES
FICTION, POETRY, TRAVEL

1846

*TYPEE: A Peep at Polynesian Life during a Four Months Residence


in A Valley of the Marquesas with notices of the French
Occupation of Tahiti and the Provisional Cession of the Sandwich
Islands to Lord Paulet. By Herman Melville. Part One. (Part Two.)
New York. Wiley and Putnam, London: John Murray, Albemarle
Street. 1846. 2 vols. Sm. Cr. 8vo (5 × 7¼).
Vol. I. pp.[5] Vol. II. pp.[5]
5. That the pagination of these volumes must be omitted is a misfortune
that was unpreventable. A detailed description of the books was sent me
from America, but the slip on which the actual pagination was set out
did not arrive.
The half-titles to both volumes read: Wiley and Putnam's Library
of American Books: Typee: A Peep at Polynesian Life. On the
verso of half-title to Vol. I. is a list of books of travel; on that to
Vol. II. the titles in the Library of American Books. Vol. I.
contains a map. Dark green cloth, gilt. Fawn end-papers.

1846

NARRATIVE OF A FOUR MONTHS RESIDENCE AMONG THE


NATIVES OF A VALLEY OF THE MARQUESAS ISLANDS: Or A Peep
at Polynesian Life. By Herman Melville. London: John Murray,
Albemarle Street, 1846. 1 vol. Sm. Cr. 8vo (4¾ × 7). Pp. xvi +
(ii) + 285 + (1). Publisher's advertisements, 16 pp., dated
March, 1846, bound in at end. A sketch map of the Marquesas
Islands on page (xviii) faces page (1). Red cloth, gilt, blocked in
blind. White end-papers.
Note—A volume in Murray's “Colonial and Home Library” (No. 15). Subsequently
named Typee. The lettering on the spine reads: Colonial and Home Library Vol XV
Melvilles Marquesas Islands Murray.

1847

*TYPEE: A Peep at Polynesian Life during a Four Months Residence


in A Valley of the Marquesas. Revised Edition with a Sequel. By
Herman Melville. New York: Wiley and Putnam. London: John
Murray, Albemarle Street. 1847. 1 vol. Sm. Cr. 8vo (5 × 7¼).
Pp[6]. Of this book pp. 291-307 are occupied by the sequel to
Typee entitled The Story of Toby, and not previously published.
Map faces title-page.
6. See footnote to previous page.

1847

TYPEE: Or A Narrative of a Four Months Residence Among The Natives


of a Valley of the Marquesas Islands: Or A Peep at Polynesian Life. By
Herman Melville. London: John Murray, Albemarle Street. 1847. 1
vol. Sm. Cr. 8vo (4¾ × 7). Pp. xvi + 301 + (1). Pp. 287-301 are
occupied by The Story of Toby, a sequel to Typee not previously
published. Publisher's advertisement precedes half-title proper,
occupying reverse of a series half-title of “The Home and
Colonial (sic) Library,” these two pages being inset on other than
text paper. Publisher's catalogue, Fcap. 8vo, 16 pp., dated March,
1847, bound in at end. Red cloth, gilt, uniform with preceding
item. Yellow end-papers.
Note—The lettering on the spine is identical with that of the 1846 issue.

1847
OMOO: A Narrative of Adventures in the South Seas. By Herman
Melville, author of Typee. New York: Harper and Brothers,
Publishers. London: John Murray. 1847. 1 vol. Cr. 8vo (4⅞ ×
7⅜). Pp. (408). The pagination of this volume is very confusing.
Pp. (1)-(16) are paged xv + (i). Pp. 17-389 are so paged, p.
(390) is unpaged, pp. (391)-(399) are paged (xv) to xxiii, p.
(400) is unpaged, and pp. (401)-(408) are paged (1) to 8. Title-
page printed in red and black, half-title in red. Line-engraved
map printed separately facing title. Blue cloth, blocked in gold
and blind. White end-papers.
Note—As an example of the varieties to be met with among American publications
of this date, I append a collation of this same book, made by a friend from a copy
seen in the United States. The variation of binding and end-papers is unimportant
(see note on p. 220).

1847

*OMOO: A Narrative of Adventures in the South Seas. By Herman


Melville, author of Typee. New York: Harper and Brothers,
Publishers. London: John Murray, 1847. 1 vol. Cr. 8vo (4⅞ ×
7⅜). Pp. 398, of which (1)-(9) are unpaged, (10)-(17) are paged
in roman numerals, 18-389 in arabic numerals, while pp. (390)-
(398) are occupied by publishers' advertisements. Publishers'
catalogue, 16 pp., bound in at end. Title-page printed in red and
black, half-title in red. Line-engraved map facing title-page.
Brown cloth, blocked in gold. Marbled end-papers.

1847

OMOO: A Narrative of Adventures in the South Seas, being a


sequel to the Residence in the Marquesas Islands. By Herman
Melville, author of Typee. London: John Murray, Albemarle
Street. 1847. 1 vol. Sm. Cr. 8vo (4¾ × 7). Pp. xiii + (i) + 321 +
(1). Line-engraved map printed on text paper facing title-page.
Red cloth, gilt, uniform with preceding item. Pale yellow end-
papers.
Notes—(i) The lettering on the spine reads: Adventures in the South Seas Murray.
(ii) A volume in Murray's “Colonial and Home Library” (No. 22). The Preface is
dated New York, January 28, 1847.
(iii) Contemporary announcements of Murray's “Colonial and Home Library” speak
of an issue of this book in two parts, “sewed,” and numbered respectively 43 and
44 of the series. I have never seen such wrappered issues, but, to judge by their
numbering in the Library, they postdate the edition above described.

1849

MARDI AND A VOYAGE THITHER. By Herman Melville, author of


Typee and Omoo. London: Richard Bentley, New Burlington
Street. 1849. 3 vols. Ex. Cr. 8vo (4⅞ × 7¾).
Vol. I. pp. x + 336 + (2).
Vol. II. pp. x + 335 + (3).
Vol. III. pp. viii + 348.
Titles printed in two colours. Pale apple-green cloth, gilt, blocked
in blind. Blue and white decorated end-papers, printed with
publisher's advertisements.
Note—This book was published on March 16, 1849. The English edition predates
the American one. 1,000 copies were printed.

1849

MARDI: AND A VOYAGE THITHER. By Herman Melville. New York:


Harper and Bros. Publishers, 82 Cliff Street. 1849. 2 vols. Ex. Cr.
8vo (4⅞ × 7⅜).
Vol. 1. pp. (376). The paging is very irregular. Pp. (1) to (6) are
blank and unpaged; p. (7) is title-page; p. (8) bears note of the
book's official registration; p. (9) bears dedication; p. (10) is
blank; p. (11) bears preface dated New York, January, 1849; p.
(12) is blank; p. (13) is half-title; p. (14) is blank; pp. (15) to
(18) are occupied by List of Contents paged (ix) to xii; pp. (19)
to (371) are paged (13) to 365; pp. (372) to (376) are blank and
unpaged. Pp. (1) (2) and (375) (376) are pasted down to front
and back inside end-papers.
Vol. II. pp. (408), of which pp. (1)-(6) are blank and unpaged; p.
(7) is title-page; p. (8) bears note of the book's official
registration; p. (9) is half-title; p. (10) is blank; pp. (11)-(14) are
occupied by List of Contents paged (ix) to xii; pp. (15) to (393)
are paged (9) to 387; p. (394) is blank and unpaged; pp. (395)-
(402) are occupied by publishers' advertisements paged (1) to 8;
pp. (403)-(408) are blank and unpaged. Pp. (1) (2) and (407)
(408) are pasted down to front and back inside end-papers.
It should be noted that in each volume the printed half-title
follows the title-page.
Dark green cloth, blocked in gold and blind. Yellow end-papers.

1849

REDBURN: His First Voyage. Being the Sailor boy confessions and
reminiscences of the son of a gentleman in the Merchant
Service. By Herman Melville. Author of Typee, Mardi etc. London:
Richard Bentley, New Burlington Street, 1849. 2 vols. Ex. Cr. 8vo
(4⅞ × 7¾).
Vol. I. pp. viii + 316. No half-title.
Vol II. pp. viii + 314.
Dark blue cloth, gilt, blocked in blind, white end-papers
patterned in blue and printed with publisher's advertisements.
Notes—(i) This book was published on September 29, 1849. The English edition
predates the American one. 750 copies were printed.
(ii) I have seen a copy of this edition bearing on the case the name of T. C. Newby
as publisher, but with the Bentley title-page. This was probably a “remainder”
copy, for Newby frequently bought sheets of books that had not sold when
originally published, and issued them at a cheaper price wholly or partially over his
imprint.

1849

REDBURN: His First Voyage. Being the sailor boy confessions and
reminiscences of the son of a gentleman in the Merchant
Service. By Herman Melville, Author of Typee, Mardi. New York:
Harper and Bros., Publishers, 82 Cliff Street. 1849. 1 vol. Cr. 8vo
(4⅞ × 7½). Pp. (420). The numbering of pages is very erratic.
Pp. (1)-(6) are blank and unpaged; p. (7) is title-page; p. (8)
bears note of the book's official registration; p. (9) bears
dedication; p. (10) is blank; pp. (11)-(17) are occupied by List of
Contents paged (v)-xi; p. (12) is blank; pp. (13) to 390 are so
paged; pp. (391)-(394) are unpaged and occupied by
advertisements of other works by Melville; pp. (395)-(406) form
a publishers' list, dated October, 1849, and paged (1) to 14; pp.
(407) and (408) are occupied by publishers' advertisements,
undated, but paged (1) and 2; pp. (409)-(412) are blank; pp.
(413) and (414) are pasted down to inside back end-paper. No
printed half-title. Purple-brown cloth, gilt, blocked in blind.
Yellow end-papers.
Note—Copies of the first edition are found with fewer advertisement pages at the
end. These may well, in view of the irregular nature of American bookmaking at
that period, be contemporary in issue with those more extensively furnished, but
the collector will naturally prefer a copy as complete as possible.

1850

WHITE JACKET: Or The World in a Man of War. By Herman Melville.


London: Richard Bentley, New Burlington Street, 1850. 2 vols.
Ex. Cr. 8vo (4¾ × 7¾).
Vol. I. pp. vi + 322.
Vol. II. pp. iv + 315 + (1).
No half-titles. Pale blue cloth, gilt, blocked in blind. Yellow end-
papers, printed with publisher's advertisements.
Notes—(i) This book was published on January 23, 1850. The English edition
predates the American one. 1,000 copies were printed.
(ii) Vol. I. pp. iii and iv contain a preface dated October, 1849, and different in
content from the note on p. iv of the American edition, dated March, 1850.

1850

WHITE JACKET: Or The World in a Man of War. By Herman Melville.


Author of Typee, Omoo, Mardi and Redburn. New York: Harper
and Bros., Publishers, 82 Cliff Street. London: Richard Bentley.
1850. 1 vol. Cr. 8vo (4⅞ × 7½). Pp. (484). Here again the
paging is irregular. Of the preliminary matter pp. (1)-(6) are
blank; p. (7) is title-page; p. (8) bears note of the book's official
registration; p. (9) bears quotation from Fuller's Good Sea-
Captain; p. (10) bears author's note, dated New York, March,
1850; pp. (11)-(13) are occupied by List of Contents and are
paged in roman numerals, (v) to vii; p. (14) is blank; pp. (15) to
(471) are paged (9) to 465; p. (472) is blank; pp. (473)-(476)
are unpaged and occupied by advertisements of other works by
Melville; pp. (477) (478) are also unpaged and occupied by
publishers' advertisements; pp. (479)-(484) are blank and
unpaged. No printed half-title. Dark brown or blue-grey cloth,
gilt, blocked in blind. Yellow end-papers.
Note—The varieties of binding are of simultaneous date.

1851

THE WHALE. By Herman Melville, author of Typee, Omoo, Redburn,


Mardi, White Jacket. (Quotation from Paradise Lost.) London:
Richard Bentley, New Burlington Street. 1851. 3 vols. Ex. Cr. 8vo
(4¾ × 7¾).
Vol. I. pp. viii + 312.
Vol. II. pp. iv + 303 + (1).
Vol. III. pp. iv + 328.
Quarter cream cloth blocked in gold; bright blue embossed cloth
sides, blocked in blind. Pale yellow end-papers.
Notes—(i) This book was published on October 18, 1851. The English edition
predates the American one. 500 copies were printed.
(ii) Vol. I. only has half-title, on which the story is described as The Whale or Moby
Dick.

1851

MOBY DICK: Or The Whale. By Herman Melville, Author of Typee,


Omoo, Redburn, Mardi, White-Jacket. New York: Harper and
Bros. Publishers. London: Richard Bentley. 1851. 1 vol. Cr. 8vo
(4⅞ × 7⅜). Pp. (xxx) [paged as xxiii + (i)] + 634 + (12).
Epilogue occupies p. (635). Publishers' advertisements, 6 pp.,
occupy pp. (637)-(642). Pp. (i) (ii) and (647) (648) are pasted
down to front and back inside end-papers. No printed half-title.
Slate-blue or scarlet cloth, gilt. Orange end-papers.
Notes—(i) The varieties of binding are of simultaneous date.
(ii) This book was expurgated for publication in England, the American text
containing thirty-five passages not included in Bentley's edition (see previous
item).

1852

PIERRE: Or The Ambiguities. By Herman Melville. New York: Harper


and Bros., Publishers, 329 and 331 Pearl Street, Franklin Square.
1852. 1 vol. Cr. 8vo (4⅞ × 7⅜). Pp. (xii) [paged as viii] + 495 +
(6). Pp. (i) (ii) and (501) (502) are pasted down to front and
back inside end-papers. No printed half-title. Dark grey cloth,
gilt, blocked in blind. Dark grey end-papers.

1852

PIERRE: Or The Ambiguities. By Herman Melville. London: Sampson


Low Son and Co., 47 Ludgate Hill. 1852. 1 vol. Cr. 8vo (5 × 7½).
Pp. viii + 495 + (i). No half-title. Blue embossed cloth, gilt,
blocked in blind. Pale yellow end-papers.
Notes—(i) This book was published in November, 1852.
(ii) This English edition consists of American printed sheets with cancel title. It is
as scarce as, if not scarcer than, the American edition, the bulk of which was
destroyed by fire.

1855

ISRAEL POTTER: His Fifty Years of Exile. By Herman Melville. Author


of Typee, Omoo etc. New York: G. P. Putnam and Co., 10 Park
Place. 1855. 1 vol. Cr. 8vo (4⅞ × 7⅜). Pp. (280) [paged as (2)
+ 276 + (2)]. No printed half-title. Purple-brown cloth, gilt,
blocked in blind. Yellow end-papers.
Note—On the case, this book is entitled “Fifty Years Exile.” A pirated edition, under
the title The Refugee, was published in Philadelphia in [1865].

1855

ISRAEL POTTER: His Fifty Years of Exile. By Herman Melville, author


of Typee, Omoo etc. London: G. Routledge and Co., Farringdon
Street. 1855. 1 vol. Fcap. 8vo (4 × 6½). Pp. 174. Bright yellow
paper wrappers printed in black. The outside back wrapper is
occupied by publishers' advertisements. Also issued
simultaneously in cloth.
Note—This book was published in April, 1855.

1856

THE PIAZZA TALES. By Herman Melville, author of Typee, Omoo,


etc. etc. New York: Dix and Edwards, 321 Broadway. London:
Sampson Low, Son and Co. 1856. 1 vol. Cr. 8vo (4¾ × 7⅛). Pp.
(vi) + 431 + (11). No printed half-title. Publishers'
advertisements, unpaged and undated, occupy pp. (433)-(439).
Purple-brown cloth, blocked in gold and blind. Grey-blue end-
papers.
Contents: The Piazza—Bartleby—Benito Cereno—The Lightning-Rod Man—The
Encantadas; or Enchanted Islands—The Bell-Tower.
Notes—(i) This book was published in May or June, 1856.
(ii) It is doubtful whether copies of this book were ever actually issued in England,
despite the fact that Sampson Low and Co. advertised the book at 9s. in June,
1856. At the most, copies may exist with an English cancel title, but even this is
improbable in view of the joint imprint on the New York edition. It will be noted
that when previously Low imported Melville sheets (cf. Pierre, 1852) they inserted
their own title-page and bound the book differently for English issue, but in that
case their name was not printed on the American edition.
(iii) Copies of the first American edition exist, with pale yellow end-papers. These
are thinner in quality than the grey-blue ones above mentioned, and not chalk
surfaced to the extent usual with American tinted papers of the period. Indeed,
they have more the appearance of English than of American end-papers, but it is
difficult to believe that Sampson Low and Co. could have imported sheets and
cases from America, merely carrying out in this country the process of binding.

1857

THE CONFIDENCE MAN: His Masquerade. By Herman Melville, Author


of The Piazza Tales, Omoo etc. etc. New York: Dix Edwards and
Co., 321 Broadway. 1857. 1 vol. Cr. 8vo (4⅞ × 7½). Pp. (x)
[paged as vi] + 394 + (4). No printed half-title. Purple-brown
cloth, gilt, blocked in blind. Dark green end-papers.
1857

THE CONFIDENCE MAN: His Masquerade. By Herman Melville, author


of The Piazza Tales, Omoo, Typee etc. etc. Authorized edition.
London: Longman, Brown, Green, Longmans and Roberts. 1857.
1 vol. Fcap. 8vo (4¼ × 6¾). Pp. vi + 354. No half-title.
Publishers' catalogue, 24 pp., dated September, 1855 [sic],
bound in at end. Yellow-brown cloth, gilt, blocked in blind. Brick-
red end-papers, partially printed with publishers' advertisements.
Note—This book was published in April, 1857.

1866

BATTLEPIECES AND ASPECTS OF THE WAR. By Herman Melville.


New York: Harper and Bros., Publishers, Franklin Square. 1866. 1
vol. Cr. 8vo (4¾ × 7⅜). Pp. (298), of which pp. (i)-(6) are blank
and unpaged; p. (7) is title-page; p. (8) bears note of the book's
official registration; p. (9) bears dedication; p. (10) is blank; p.
(11) bears Author's Note; p. (12) is blank; pp. (13)-(16) are
occupied by List of Contents paged (vii)-x; pp. (17) to (278) are
paged (11) to 272; pp. (279)-(284) are blank and unpaged. No
printed half-title. Brown or violet cloth, gilt. Chocolate end-
papers.
Note—There was no English edition of this book.

1876

CLAREL: A Poem and a Pilgrimage in the Holy Land. By Herman


Melville. In four parts. I. Jerusalem. II. The Wilderness. III. Mar
Saba. IV. Bethlehem. New York: G. P. Putnam's Sons, No. 182
Fifth Avenue, 1876. 2 vols. Sq. 16mo (6⅞ × 5⅛).
Vol. I. pp. (304), of which pp. (8) and (9) are paged ii and iii, pp.
(10) and (11) unpaged, and pp. (12)-(304) are paged 8 to 300.
Vol. II. pp. (312). In this volume the paging is even more erratic;
pp. (i)-(5) are unnumbered, p. (6) is numbered iv, pp. (7), (8),
and (9) are unnumbered, pp. (10) to (309) are numbered 304 to
571, pp. (310) to (312) are unnumbered.
Bright green cloth, gilt. Chocolate end-papers.
Note—This book was published in July, 1876. There was no English edition.

1888

JOHN MARR AND OTHER SAILORS, WITH SOME SEA PIECES. New
York: De Vinne Press. 1888. 1 vol. Fcap. 8vo (4½ × 6¾). Pp.
(iv) + 103 + (1). Cream paper wrappers printed in black.
Note—Only twenty-five copies of this edition were printed.

1891

*TIMOLEON etc. New York: Canton Press. 1891. 1 vol. (4½ × 7).
Pp. (72), of which (1)-(5) are unnumbered, (6) is paged in
roman numerals, pp. 7-70 in arabic numerals, and (71) and (72)
unnumbered. Buff paper wrappers, printed in black.
Note—Only twenty-five copies of this edition were printed.
II.—BOOKS PARTIALLY WRITTEN
BY HERMAN MELVILLE
There are only two items that it is possible to list under this heading,
and to each one of them Melville's contribution is so slight as to
make unnecessary their detailed collation. P. 30 of the Memorial to
James Fenimore Cooper, published in one volume by Putnam, New
York, in 1852, bears a letter from Melville in praise of Cooper
addressed to the Committee organizing the Cooper celebration. Pp.
399 and 400 of The History of Pittsfield, Massachusetts from 1800 to
1876, by J. E. A. Smith, and published in Springfield by C. W. Bryan
and Co., 1876, bear an account of Major Thomas Melville written by
Herman Melville, but not nominally attributed to him.
INDEX OF BOOK-TITLES

After Dark (Collins), 130, 139


American Senator, The (Trollope), 33, 64
Angelo (Reade), Play, 170
Antonina (Collins), 136
Arab's Ride to Cairo, The (Whyte-Melville), 191
Armadale (Collins), Novel, 131, 142
Armadale (Collins), Play, 152
Art (Reade), Play, 178
Australia and New Zealand (Trollope), 60
Autobiography, An (Trollope), 71
Ayala's Angel (Trollope), 33, 68

Barchester Towers (Trollope), 22, 39


Basil (Collins), 134, 138
Battlepieces and Aspects of the War (Herman Melville), 232
Belton Estate, The (Trollope), 31, 33, 49
Bertrams, The (Trollope), 28, 29, 40
Bessie's Troubles at Home (Gaskell), 207, 210
Bible Characters (Reade), 169
Black and White (Collins), Play, 153
Black but Comely (Whyte-Melville), 187, 199
Black Robe, The (Collins), 132, 133, 148
Blind Love (Collins), 132, 151
Bones and I (Whyte-Melville), 195
Bones at Rothwell, The (Whyte-Melville), 200
Box Tunnel, The (Reade), 162
British Sports and Pastimes (Trollope), 72
Brookes of Bridlemere, The (Whyte-Melville), 187, 194

Can you Forgive Her? (Trollope), 23, 24, 28, 29, 45


Castle Richmond (Trollope), 26, 28, 41
Cerise (Whyte-Melville), 187, 194
Children of the New Forest, The (Marryat), 80, 95
Christie Johnstone (Reade), Novel, 160
Christie Johnstone (Reade), Play, 178
Christmas Storms and Sunshine (Gaskell), 204, 206, 210
Clarel (Herman Melville), 232
Claverings, The (Trollope), 28, 31, 32, 52
Clergymen of the Church of England (Trollope), 49
Cloister and the Hearth, The (Reade), 163
Code of Signals for the use of Vessels Employed in the Merchant Service, A
(Marryat), 82
Commentaries of Cæsar, The (Trollope), 57
Confidence Man, The (Herman Melville), 231, 232
Coningsby (Disraeli), 110, 111, 119
Considerations on the Copyright Question (Collins), 147
Contarini Fleming (Disraeli), 107, 108, 109, 115
Contraband (Whyte-Melville), 187, 196
Countess and the Dancer, The (Reade), Play, 177
Courier of Lyons, The (Reade), Play, 171
Course of True Love never did Run Smooth, The (Reade), 161
Cousin Henry (Trollope), 33, 66
Cousin Phillis (Gaskell), 210
Cranford (Gaskell), 206
Cream (Reade), 162
Crisis Examined, The (Disraeli), 117

Dangerous Path, The (Reade), Play, 178


Dark Night's Work (Gaskell), 209
Dead Secret, The (Collins), 130, 139
Diary in America, A (Marryat). Part 1, 89; part 2, 90
Diary of a Blasé, The (Marryat), 88
Did he Steal it? (Trollope), Play, 55
Digby Grand (Whyte-Melville), 186, 189
Doctor Thorne (Trollope), 22, 40
Doctor Wortle's School (Trollope), 33, 67
Dora (Reade), Play, 173
Double Marriage, The (Reade), Play, 174
Dream Woman, The (Collins), Play, 154
Drink (Reade), Play, 179
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.

More than just a book-buying platform, we strive to be a bridge


connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.

Join us on a journey of knowledge exploration, passion nurturing, and


personal growth every day!

ebookbell.com

You might also like