0% found this document useful (0 votes)
16 views71 pages

104484948

The document provides information on various ebooks available for download, including 'Recent Trends and Best Practices in Industry 4.0' edited by Abhinav Sharma and others. It outlines the significance of applied mathematical techniques in engineering and highlights the series' focus on numerical and computational modeling. The document also lists additional ebooks and their respective links for instant download.

Uploaded by

bejanjulkas6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views71 pages

104484948

The document provides information on various ebooks available for download, including 'Recent Trends and Best Practices in Industry 4.0' edited by Abhinav Sharma and others. It outlines the significance of applied mathematical techniques in engineering and highlights the series' focus on numerical and computational modeling. The document also lists additional ebooks and their respective links for instant download.

Uploaded by

bejanjulkas6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

Download the Full Ebook and Access More Features - ebooknice.

com

(Ebook) Recent Trends and Best Practices in


Industry 4.0 (River Publishers Series in
Mathematical, Statistical and Computational
Modelling for Engineering) by Abhinav Sharma
(editor), Arpit Jain (editor), Paawan Sharma
https://ebooknice.com/product/recent-trends-and-best-
(editor), Mohendra Roy (editor) ISBN
practices-in-industry-4-0-river-publishers-series-in-
9788770228053, 8770228051
mathematical-statistical-and-computational-modelling-for-
engineering-52242474

OR CLICK HERE

DOWLOAD EBOOK

Download more ebook instantly today at https://ebooknice.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Start reading on any device today!

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason;


Viles, James ISBN 9781459699816, 9781743365571,
9781925268492, 1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

ebooknice.com

(Ebook) Vagabond, Vol. 29 (29) by Inoue, Takehiko ISBN


9781421531489, 1421531488

https://ebooknice.com/product/vagabond-vol-29-29-37511002

ebooknice.com

(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena


Alfredsson, Hans Heikne, Sanna Bodemyr ISBN 9789127456600,
9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312

ebooknice.com

(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT


II Success) by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018

ebooknice.com
(Ebook) Boeing B-29 Superfortress ISBN 9780764302725,
0764302728

https://ebooknice.com/product/boeing-b-29-superfortress-1573658

ebooknice.com

(Ebook) 29, Single and Nigerian by Naijasinglegirl ISBN


9781310004216, 1310004218

https://ebooknice.com/product/29-single-and-nigerian-53599780

ebooknice.com

(Ebook) Jahrbuch für Geschichte: Band 29 ISBN


9783112622223, 3112622227

https://ebooknice.com/product/jahrbuch-fur-geschichte-band-29-50958290

ebooknice.com

(Ebook) Harrow County 29 by Cullen Bunn, Tyler Crook

https://ebooknice.com/product/harrow-county-29-53599548

ebooknice.com

(Ebook) Organometallic Chemistry, Volume 29 by M. Green


ISBN 0854043284

https://ebooknice.com/product/organometallic-chemistry-
volume-29-2440106

ebooknice.com
Recent Trends and Best Practices in
Industry 4.0
RIVER PUBLISHERS SERIES IN MATHEMATICAL,
STATISTICAL AND COMPUTATIONAL MODELLING
FOR ENGINEERING

Series Editors:
MANGEY RAM
Lecturer (Asst. Prof.) in Automotive Engineering,

TADASHI DOHI
Hiroshima University, Japan

ALIAKBAR MONTAZER HAGHIGHI


Prairie View Texas A& M University, USA

Applied mathematical techniques along with statistical and computational data analysis has
become vital skills across the physical sciences. The purpose of this book series is to present
novel applications of numerical and computational modelling and data analysis across the
applied sciences. We encourage applied mathematicians, statisticians, data scientists and
computing engineers working in a comprehensive range of research fields to showcase dif-
ferent techniques and skills, such as differential equations, finite element method, algorithms,
discrete mathematics, numerical simulation, machine learning, probability and statistics, fuzzy
theory, etc.
Books published in the series include professional research monographs, edited vol-
umes, conference proceedings, handbooks and textbooks, which provide new insights for
researchers, specialists in industry, and graduate students. Topics included in this series are
as follows:-
• Discrete mathematics and computation
• Fault diagnosis and fault tolerance
• Finite element method (FEM) modeling/simulation
• Fuzzy and possibility theory
• Fuzzy logic and neuro-fuzzy systems for relevant engineering applications
• Game Theory
• Mathematical concepts and applications
• Modelling in engineering applications
• Numerical simulations
• Optimization and algorithms
• Queueing systems
• Resilience
• Stochastic modelling and statistical inference
• Stochastic Processes
• Structural Mechanics
• Theoretical and applied mechanics

For a list of other books in this series, visit www.riverpublishers.com


Recent Trends and Best Practices in
Industry 4.0

Editors

Abhinav Sharma
University of Petroleum and Energy Studies, India

Arpit Jain
QpiAI India Private Limited, India

Paawan Sharma
Pandit Deendayal Energy University, India

Mohendra Roy
Pandit Deendayal Energy University, India

River Publishers
Published 2023 by River Publishers
River Publishers
Alsbjergvej 10, 9260 Gistrup, Denmark
www.riverpublishers.com

Distributed exclusively by Routledge


605 Third Avenue, New York, NY 10017, USA
4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN

Recent Trends and Best Practices in Industry 4.0 / by Abhinav Sharma, Arpit
Jain, Paawan Sharma, Mohendra Roy.

© 2023 River Publishers. All rights reserved. No part of this publication may
be reproduced, stored in a retrieval systems, or transmitted in any form or by
any means, mechanical, photocopying, recording or otherwise, without prior
written permission of the publishers.

Routledge is an imprint of the Taylor & Francis Group, an informa


business

ISBN 978-87-7022-805-3 (print)


ISBN 978-87-7022-997-5 (paperback)
ISBN 978-10-0096-438-7 (online)
ISBN 978-10-0344-171-7 (master ebook)

While every effort is made to provide dependable information, the


publisher, authors, and editors cannot be held responsible for any errors
or omissions.
Contents

Preface xvii

Acknowledgement xxi

List of Figures xxiii

List of Tables xxvii

List of Contributors xxix

List of Abbreviations xxxiii

1 Artificial Intelligence in the Digital Chemical Industry, Its


Application and Sustainability 1
Praveen Kumar Ghodke, P. Swapna Reddy, Narendra Akiti,
and Hemalatha Kilari
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 AI in the Chemical Industry and Applications . . . . . . . . 3
1.2.1 AI in chemical science . . . . . . . . . . . . . . . . 5
1.2.2 AI in research and development . . . . . . . . . . . 6
1.2.3 AI in catalyst design spaces . . . . . . . . . . . . . 7
1.3 Sustainability of AI Applications . . . . . . . . . . . . . . . 9
1.3.1 Environmental aspect . . . . . . . . . . . . . . . . . 9
1.3.2 Energy aspect . . . . . . . . . . . . . . . . . . . . . 10
1.3.3 Economic aspect . . . . . . . . . . . . . . . . . . . 11
1.3.4 Time aspect . . . . . . . . . . . . . . . . . . . . . . 12
1.3.5 Safety and human factor aspect . . . . . . . . . . . 12
1.4 Digital Transformation of the Chemical Industry . . . . . . . 13
1.4.1 State of digital transformation . . . . . . . . . . . . 14
1.4.2 Key trends in digitalization . . . . . . . . . . . . . . 14
1.4.3 Optimizing production . . . . . . . . . . . . . . . . 14

v
vi Contents

1.4.4 Supporting remote operations . . . . . . . . . . . . 15


1.4.5 Reducing waste . . . . . . . . . . . . . . . . . . . . 15
1.4.6 Unlocking new growth opportunities . . . . . . . . . 16
1.4.7 Increasing supply chain visibility . . . . . . . . . . 16
1.4.8 Safety, compliance, and sustainability . . . . . . . . 16
1.5 Digital Chemical Industry 4.0 . . . . . . . . . . . . . . . . . 17
1.6 Challenges of AI in the Chemical Industry . . . . . . . . . . 19
1.7 Industry 4.0 Impact Technologies . . . . . . . . . . . . . . . 20
1.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2 Managing Transition Toward Industry 4.0: A Study on the


Implementation of Digital Manufacturing Processes 31
Vijay Anant Athavale, Ankit Bansal, Akhilesh Kumar Mishra, and
Anil Kumar Kapil
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2 Main Text . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.1 Problem formulation . . . . . . . . . . . . . . . . . 34
2.2.2 Purpose and question . . . . . . . . . . . . . . . . . 34
2.2.3 Related research . . . . . . . . . . . . . . . . . . . 34
2.2.4 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . 34
2.2.5 Strategic guidance for IIoT . . . . . . . . . . . . . . 36
2.2.6 Strategy . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2.7 Resources and competencies . . . . . . . . . . . . . 37
2.2.8 IT maturity . . . . . . . . . . . . . . . . . . . . . . 38
2.2.9 Smart manufacturing . . . . . . . . . . . . . . . . . 40
2.2.10 Method . . . . . . . . . . . . . . . . . . . . . . . . 41
2.2.11 Delimitation . . . . . . . . . . . . . . . . . . . . . 41
2.2.12 Method selection . . . . . . . . . . . . . . . . . . . 42
2.2.13 Data collection . . . . . . . . . . . . . . . . . . . . 43
2.2.14 Literature review . . . . . . . . . . . . . . . . . . . 43
2.2.15 Interview . . . . . . . . . . . . . . . . . . . . . . . 44
2.2.16 Selection and respondents . . . . . . . . . . . . . . 46
2.2.17 Ethics . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.2.18 Data analysis . . . . . . . . . . . . . . . . . . . . . 47
2.2.19 Transcription . . . . . . . . . . . . . . . . . . . . . 47
2.2.20 Coding . . . . . . . . . . . . . . . . . . . . . . . . 47
2.2.21 Method discussion . . . . . . . . . . . . . . . . . . 48
2.3 Outcomes of the Study . . . . . . . . . . . . . . . . . . . . 50
2.3.1 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . 50
Contents vii

2.3.2 Strategy . . . . . . . . . . . . . . . . . . . . . . . . 51
2.3.3 Resources and competencies . . . . . . . . . . . . . 53
2.3.4 IT maturity . . . . . . . . . . . . . . . . . . . . . . 54
2.3.5 Smart manufacturing . . . . . . . . . . . . . . . . . 55
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 55

3 Container as a Service in Cloud: An Approach to Secure


Hybrid Virtualization 59
Manoj Kumar Patra, Bibhudatta Sahoo, and Ashok Kumar Turuk
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.2 Virtualization in Cloud Computing . . . . . . . . . . . . . . 62
3.2.1 System level virtualization . . . . . . . . . . . . . . 63
3.2.2 OS level virtualization . . . . . . . . . . . . . . . . 64
3.2.3 Container vs. virtual machine . . . . . . . . . . . . 64
3.2.4 Architectural difference between VM and
container . . . . . . . . . . . . . . . . . . . . . . . 66
3.3 Container as a Service Model . . . . . . . . . . . . . . . . . 68
3.3.1 CaaS architecture . . . . . . . . . . . . . . . . . . . 68
3.4 Containerization Techniques . . . . . . . . . . . . . . . . . 69
3.4.1 Docker . . . . . . . . . . . . . . . . . . . . . . . . 70
3.4.2 Singularity . . . . . . . . . . . . . . . . . . . . . . 70
3.4.3 uDocker . . . . . . . . . . . . . . . . . . . . . . . . 70
3.5 Research Challenges . . . . . . . . . . . . . . . . . . . . . 71
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4 Automated Framework for Detecting Unknown Activity in a


Vehicular ad hoc Network 77
Atul B. Kathole, Dinesh N. Chaudhari, and Avinash P. Jadhav
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.1.1 VANET deployment challenges . . . . . . . . . . . 79
4.1.2 VANET applications . . . . . . . . . . . . . . . . . 81
4.1.3 Possible attacks on vehicular network . . . . . . . . 83
4.1.4 ML for vehicular networking . . . . . . . . . . . . . 85
4.1.5 Current challenges and opportunities . . . . . . . . . 85
4.1.5.1 Tests for vehicular networks . . . . . . . . 85
4.1.6 Research gap . . . . . . . . . . . . . . . . . . . . . 86
4.1.7 Problem statement . . . . . . . . . . . . . . . . . . 87
4.1.8 Motivation . . . . . . . . . . . . . . . . . . . . . . 88
4.2 Literature Work . . . . . . . . . . . . . . . . . . . . . . . . 88
viii Contents

4.2.1 An overview . . . . . . . . . . . . . . . . . . . . . 89
4.2.2 Mobility-based routing in VANET with security . . . 89
4.2.3 Encryption and authentication . . . . . . . . . . . . 91
4.3 Proposed Approach . . . . . . . . . . . . . . . . . . . . . . 92
4.3.1 Methodology . . . . . . . . . . . . . . . . . . . . . 94
4.3.2 Improve hybrid cooperative malicious node detection
approach (IHCMNDA) . . . . . . . . . . . . . . . . 95
4.4 Result and Discussion . . . . . . . . . . . . . . . . . . . . . 97
4.4.1 Simulation . . . . . . . . . . . . . . . . . . . . . . 97
4.4.2 Improved cooperative bait detection (ICBDS) . . . . 103
4.4.3 Improve hybrid cooperative malicious node detection
approach (IHCMNDA) . . . . . . . . . . . . . . . . 108
4.5 Conclusion and Future Work . . . . . . . . . . . . . . . . . 110

5 Control of Mobile Manipulator with Object Detection for EOD


Applications 117
Mukul Kumar Gupta, Vinay Chowdary, and C. S. Meera
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.1.1 Explosive ordnance disposal robots . . . . . . . . . 119
5.2 Object Detection . . . . . . . . . . . . . . . . . . . . . . . 121
5.2.1 Computer-aided design of the proposed design . . . 122
5.2.2 System architecture . . . . . . . . . . . . . . . . . . 122
5.3 Hardware Architecture . . . . . . . . . . . . . . . . . . . . 122
5.3.1 Robot-arm contol and actuation . . . . . . . . . . . 124
5.4 Object Detection . . . . . . . . . . . . . . . . . . . . . . . 124
5.4.1 TensorFlow . . . . . . . . . . . . . . . . . . . . . . 124
5.4.2 TensorFlow object detection API . . . . . . . . . . . 125
5.4.2.1 Object detection API using tensorFlow
2.0 . . . . . . . . . . . . . . . . . . . . . 125
5.5 Results and Discussion . . . . . . . . . . . . . . . . . . . . 127
5.5.1 Hardware implementation . . . . . . . . . . . . . . 127
5.5.2 Robotic arm simulation using MATLAB GUI . . . . 129
5.5.3 Simulation in gazebo using ROS . . . . . . . . . . . 129
5.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 131

6 Smart Agriculture: Emerging and Future Farming


Technologies 135
S. Sathiya, Cecil Antony, and Praveen Kumar Ghodke
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Contents ix

6.2 Role of Smart Agriculture in Yield Enhancement . . . . . . 139


6.2.1 Soil samples and its mapping . . . . . . . . . . . . . 140
6.2.2 Smart irrigation systems . . . . . . . . . . . . . . . 142
6.2.3 Smart fertilizer system . . . . . . . . . . . . . . . . 143
6.2.4 Smart disease control and pest management . . . . . 144
6.2.5 Smart monitoring of crop yields and climatic
conditions . . . . . . . . . . . . . . . . . . . . . . . 145
6.3 Technologies Involved in Precision Agriculture . . . . . . . 146
6.3.1 Wireless sensing technology in agriculture . . . . . 147
6.3.1.1 Soil monitoring sensors . . . . . . . . . . 149
6.3.1.2 Yield monitoring sensors . . . . . . . . . 149
6.3.1.3 Weeds, pest, and disease monitoring
sensors . . . . . . . . . . . . . . . . . . . 150
6.3.1.4 Field monitoring sensors . . . . . . . . . 151
6.3.2 Communication methods and latest technologies in
smart agriculture . . . . . . . . . . . . . . . . . . . 154
6.3.2.1 Mobile communication systems . . . . . . 154
6.3.2.2 ZigBee wireless technology . . . . . . . . 155
6.3.2.3 Bluetooth wireless technology . . . . . . 155
6.3.2.4 LoRa and sigFox technology . . . . . . . 155
6.3.2.5 Smartphones-based communication . . . . 156
6.3.2.6 Cloud computing . . . . . . . . . . . . . 156
6.3.2.7 Fog/edge computing . . . . . . . . . . . . 157
6.3.3 Latest technologies for large data processing . . . . 157
6.3.3.1 Big data . . . . . . . . . . . . . . . . . . 157
6.3.3.2 Artificial intelligence . . . . . . . . . . . 160
6.3.3.3 Deep learning . . . . . . . . . . . . . . . 160
6.4 Autonomous Vehicles in Smart Agriculture . . . . . . . . . 163
6.4.1 IoT-based tractors . . . . . . . . . . . . . . . . . . . 163
6.4.2 Harvesting robots . . . . . . . . . . . . . . . . . . . 164
6.4.3 UAVs in agriculture . . . . . . . . . . . . . . . . . . 165
6.5 Challenges in Smart Agriculture . . . . . . . . . . . . . . . 167
6.6 Conclusions and Future Directions . . . . . . . . . . . . . . 168

7 Plant Feature Extraction for Disease Classification 183


Amar Kumar Dey and Abhishek Sharma
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 184
7.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . 186
7.3 Features Representation and Characteristics . . . . . . . . . 187
x Contents

7.4 Texture Features . . . . . . . . . . . . . . . . . . . . . . . 187


7.4.1 Statistical methods for texture classification . . . . . 188
7.4.1.1 Advantages and limitations . . . . . . . . 189
7.4.2 Gray-level run-length matrix . . . . . . . . . . . . 189
7.4.3 Advantages and limitations . . . . . . . . . . . . . . 190
7.4.4 Histogram of gradient magnitudes . . . . . . . . . . 190
7.4.4.1 Advantages and limitations . . . . . . . . 190
7.5 Color Features Extraction . . . . . . . . . . . . . . . . . . . 191
7.5.1 Advantage and disadvantages . . . . . . . . . . . . 191
7.5.2 Color co-occurrence matrix (CCM) . . . . . . . . . 192
7.5.2.1 Advantage and disadvantages . . . . . . . 193
7.6 Shape-based Feature Extraction . . . . . . . . . . . . . . . 194
7.6.1 Advantage and disadvantages . . . . . . . . . . . . 196
7.7 Conclusion and Future Scope . . . . . . . . . . . . . . . . . 197

8 Development Methodologies for Internet of Things: For all


Commercial and Industrial Needs 203
Yazeed Alzahrani
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 204
8.2 Research Questions . . . . . . . . . . . . . . . . . . . . . . 204
8.3 Development Methodologies . . . . . . . . . . . . . . . . . 205
8.3.1 Development methodologies for IoT-based smart
cities . . . . . . . . . . . . . . . . . . . . . . . . . 205
8.3.1.1 Spatial (Geographical) IoT . . . . . . . . 206
8.3.1.2 Smart campus surveillance . . . . . . . . 207
8.3.2 Development methodologies for IoT-based automatic
driving . . . . . . . . . . . . . . . . . . . . . . . . 211
8.3.3 Development methodologies for IoT-based agricul-
ture field monitoring . . . . . . . . . . . . . . . . . 213
8.3.4 Development methodologies for IoT-based railway
monitoring . . . . . . . . . . . . . . . . . . . . . . 215
8.3.5 Development methodologies for IoT-based forest
monitoring . . . . . . . . . . . . . . . . . . . . . . 217
8.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Contents xi

9 Bio-inspired Multilevel ICHB-HEED Clustering Protocol for


Heterogeneous WSNs 225
Prateek Gupta, Amrita, Himansu Sekhar Pattanayak, Gunjan,
Lalit Kumar Awasthi, and Vachik S. Dave
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 226
9.2 Review of Literature . . . . . . . . . . . . . . . . . . . . . 227
9.3 Proposed Work . . . . . . . . . . . . . . . . . . . . . . . . 229
9.3.1 Network model for multilevel energy
heterogeneity . . . . . . . . . . . . . . . . . . . . . 229
9.3.2 MLICHBHEED protocol . . . . . . . . . . . . . . . 231
9.3.2.1 Clustering and CH election process . . . . 232
9.3.2.2 ICHB algorithm . . . . . . . . . . . . . . 232
9.3.2.3 Process of data transmission and
collection . . . . . . . . . . . . . . . . . 233
9.3.2.4 Energy depletion model for MLICHB-
HEED protocol . . . . . . . . . . . . . . 233
9.4 Results and Discussions . . . . . . . . . . . . . . . . . . . . 234
9.4.1 Network lifetime . . . . . . . . . . . . . . . . . . . 236
9.4.2 Total energy consumption . . . . . . . . . . . . . . 238
9.4.3 Number of packets sent to the base station . . . . . 242
9.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 242

10 IoT Enabled by Edge Computing for Telecomm and Industry 247


Manoj Kumar Sharma, Ruchika Mehta, and
Rajveer Singh Shekhawat
10.1 Introduction to IoT and Edge Computing . . . . . . . . . . . 248
10.1.1 IoT and edge-computing scenarios . . . . . . . . . . 250
10.1.2 IoT versus edge computing . . . . . . . . . . . . . 253
10.1.3 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . 254
10.1.4 Cloud computing and edge computing . . . . . . . 256
10.1.5 Cloud computing and edge computing: use cases . . 257
10.2 IoT and Edge Computing Framework . . . . . . . . . . . . 261
10.2.1 IoT and edge computing integrated framework . . . 263
10.2.2 Pros and cons . . . . . . . . . . . . . . . . . . . . . 264
10.2.3 Opportunities and challenges . . . . . . . . . . . . . 264
10.3 Edge Computing Devices . . . . . . . . . . . . . . . . . . 265
10.4 Telcos and Edge Computing . . . . . . . . . . . . . . . . . 266
10.4.1 Telco network modernizations challenges . . . . . . 268
10.4.2 Multi-access edge computing . . . . . . . . . . . . 268
xii Contents

10.4.2.1 Advantages of MEC . . . . . . . . . . . . 270


10.5 Task Scheduling in Edge Computing . . . . . . . . . . . . . 271
10.5.1 Scheduler-based edge computing . . . . . . . . . . 271
10.5.2 Computing task analysis . . . . . . . . . . . . . . . 272
10.5.2.1 Local execution . . . . . . . . . . . . . . 272
10.5.2.2 Full offloading . . . . . . . . . . . . . . . 273
10.5.2.3 Partial offloading . . . . . . . . . . . . . 273
10.5.3 Computing task scheduling scheme . . . . . . . . . 273
10.5.3.1 Task scheduling algorithm . . . . . . . . . 274
10.5.3.2 Bidding-model optimization and adaptive
algorithm . . . . . . . . . . . . . . . . . . 275
10.6 Security and Privacy Issues of Edge Computing . . . . . . . 276
10.6.1 Attacks classification . . . . . . . . . . . . . . . . 277
10.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 279

11 Low-energy Network Protocols 283


Hiren Kathiriya, Arjav Bavarva, and Vishal Sorathiya
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 284
11.2 IIoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
11.2.1 Network architecture . . . . . . . . . . . . . . . . . 286
11.2.2 Protocols . . . . . . . . . . . . . . . . . . . . . . . 287
11.2.3 Testbed . . . . . . . . . . . . . . . . . . . . . . . . 288
11.2.4 Criteria for implementation . . . . . . . . . . . . . . 289
11.3 Low-energy Technologies . . . . . . . . . . . . . . . . . . 290
11.4 Self-powered Network . . . . . . . . . . . . . . . . . . . . 292
11.4.1 Comparison between energy harvesting WSNs and
battery-operated WSNs . . . . . . . . . . . . . . . 292
11.4.2 Energy-harvesting sources for sensors . . . . . . . . 293
11.4.3 Energy stored by a supercapacitor . . . . . . . . . . 294
11.4.4 Proposed circuit . . . . . . . . . . . . . . . . . . . 295
11.4.5 BLE–RSL10 from ON Semiconductor . . . . . . . . 295
11.4.6 Key features of BLE-RSL10 . . . . . . . . . . . . . 295
11.4.7 Lifetime improvement of WSN . . . . . . . . . . . 298
11.4.8 Energy model for WSN . . . . . . . . . . . . . . . 299
11.4.9 Lifetime optimization in a mobile WSN with solar
energy harvesting . . . . . . . . . . . . . . . . . . . 300
11.4.10 Time-slotted approach . . . . . . . . . . . . . . . . 300
11.4.11 Optimization algorithm . . . . . . . . . . . . . . . . 300
11.5 Simulation of WSN Network and Results . . . . . . . . . . 301
Contents xiii

11.5.1 Simulation parameters . . . . . . . . . . . . . . . . 301


11.5.2 Simulation results . . . . . . . . . . . . . . . . . . 302
11.6 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . 305
11.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 305

12 Consensus Algorithms in Blockchain for Efficient and Secure


Network 309
Medini Gupta, Sarvesh Tanwar, Niranjan Lal, and Ritvik Pawar
12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 310
12.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . 311
12.2 Literature Review . . . . . . . . . . . . . . . . . . . . . . . 311
12.3 Emergence of Cryptocurrencies . . . . . . . . . . . . . . . 315
12.4 Role of Consensus Algorithms . . . . . . . . . . . . . . . . 317
12.4.1 Proof of work . . . . . . . . . . . . . . . . . . . . . 318
12.4.2 Proof of stake . . . . . . . . . . . . . . . . . . . . . 320
12.4.3 Delegated proof of stake (DPoS) . . . . . . . . . . 322
12.4.4 Byzantine fault tolerance (BFT) . . . . . . . . . . . 322
12.4.5 Proof of burn (PoB) . . . . . . . . . . . . . . . . . 322
12.4.6 Proof of capacity (PoC) . . . . . . . . . . . . . . . 323
12.4.7 Proof of elapsed time (PoET) . . . . . . . . . . . . 323
12.5 Limitation of Consensus Algorithms . . . . . . . . . . . . . 324
12.5.1 Failure of consensus . . . . . . . . . . . . . . . . . 324
12.5.2 Ledger forks . . . . . . . . . . . . . . . . . . . . . 324
12.5.3 Substandard performance . . . . . . . . . . . . . . . 324
12.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 325

13 Blockchain Protocols and Algorithms 329


H. Echchaoui, A. Miloud-Aouidate, and R. Boudour
13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 330
13.2 Blockchain Technology and Industry 4.0 . . . . . . . . . . . 331
13.2.1 Basic concepts . . . . . . . . . . . . . . . . . . . . 331
13.2.2 Related works . . . . . . . . . . . . . . . . . . . . . 333
13.2.3 Algorithm or protocol? . . . . . . . . . . . . . . . . 334
13.3 Known Blockchain Consensus Algorithms . . . . . . . . . 335
13.3.1 Popular algorithms . . . . . . . . . . . . . . . . . . 336
13.3.1.1 Proof of work (PoW) . . . . . . . . . . . 336
13.3.1.2 Proof of stake . . . . . . . . . . . . . . . 337
13.3.1.3 Federated byzantine agreement
(FBA) . . . . . . . . . . . . . . . . . . . 338
xiv Contents

13.3.2 Derivative algorithms . . . . . . . . . . . . . . . . . 338


13.3.2.1 Algorithms based on pow . . . . . . . . . 339
13.3.2.2 Algorithms based on Pos . . . . . . . . . 340
13.3.2.3 Algorithms based on FBA . . . . . . . . . 343
13.4 Less-known Blockchain Consensus Algorithms . . . . . . . 345
13.4.1 Algorithms based on PoW . . . . . . . . . . . . . . 345
13.4.2 Algorithms based on PoS . . . . . . . . . . . . . . . 347
13.4.3 Algorithms based on FBA . . . . . . . . . . . . . . 349
13.4.4 Hybrid algorithms . . . . . . . . . . . . . . . . . . 352
13.4.5 PoX algorithms . . . . . . . . . . . . . . . . . . . . 353
13.5 Blockchain Protocols . . . . . . . . . . . . . . . . . . . . . 355
13.5.1 Bitcoin . . . . . . . . . . . . . . . . . . . . . . . . 355
13.5.2 Ethereum . . . . . . . . . . . . . . . . . . . . . . . 356
13.5.3 Corda . . . . . . . . . . . . . . . . . . . . . . . . . 357
13.5.4 Quorum . . . . . . . . . . . . . . . . . . . . . . . 357
13.5.5 Hyperledger . . . . . . . . . . . . . . . . . . . . . . 358
13.5.6 EOSIO . . . . . . . . . . . . . . . . . . . . . . . . 358
13.5.7 NEM (New Economy Movement) . . . . . . . . . . 359
13.5.8 Multichain . . . . . . . . . . . . . . . . . . . . . . 359
13.5.9 Consensus algorithms and protocols
classification . . . . . . . . . . . . . . . . . . . . . 359
13.6 Blockchain Applications . . . . . . . . . . . . . . . . . . . 359
13.6.1 How to develop a blockchain application? . . . . . 359
13.6.2 Example of blockchain application in industry
4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 363
13.6.3 How to choose a blockchain consensus algorithm
and protocol? . . . . . . . . . . . . . . . . . . . . . 364
13.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 365

14 Cybersecurity in Autonomous Driving Vehicles 373


Manoj Kumar Sharma, Ruchika Mehta, and Rajveer Singh
Shekhawat
14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 374
14.1.1 Industry 4.0 . . . . . . . . . . . . . . . . . . . . . 375
14.1.2 Autonomous vehicles and industry 4.0 . . . . . . . 376
14.1.3 Criteria to use autonomous vehicles in industrial
operation . . . . . . . . . . . . . . . . . . . . . . . 378
14.2 IoT and Cybersecurity . . . . . . . . . . . . . . . . . . . . 378
14.2.1 Cybersecurity—risk assessment . . . . . . . . . . . 379
Contents xv

14.3 Autonomous Driving Applications . . . . . . . . . . . . . . 381


14.3.1 Autonomous vehicle road behavior . . . . . . . . . 382
14.4 Autonomous Driving Vehicle: Enabling Technologies . . . 383
14.4.1 Functional framework of autonomous vehicle . . . . 384
14.4.1.1 Position, mapping and localization . . . . 384
14.4.1.2 Deep learning algorithms, sensor fusion,
guidance and control . . . . . . . . . . . . 385
14.4.1.3 Communications . . . . . . . . . . . . . . 386
14.4.1.4 Sensing and perception . . . . . . . . . . 386
14.4.1.5 Data ownership and privacy . . . . . . . . 387
14.4.1.6 Embedded systems . . . . . . . . . . . . 388
14.4.1.7 Variable data acquisition (VDA) . . . . . 389
14.5 Autonomous Vehicle Security . . . . . . . . . . . . . . . . 389
14.5.1 Protection methods . . . . . . . . . . . . . . . . . . 390
14.5.2 Potential security risks of AV crowdsourcing . . . . 390
14.5.2.1 Attacks on automotive control
systems . . . . . . . . . . . . . . . . . . 391
14.5.2.2 Electronic control unit attack . . . . . . . 391
14.5.2.2.1 In-vehicle network attack . . . . 391
14.5.2.2.2 Automotive key attack . . . . . 392
14.5.2.2.3 Attacks on autonomous driving
system components . . . . . . . 392
14.5.3 Attacks on V2X communications technologies . . . 392
14.5.3.1 VANET attack . . . . . . . . . . . . . . . 393
14.5.3.2 Bluetooth attack . . . . . . . . . . . . . . 393
14.5.4 Autonomous vehicle defense . . . . . . . . . . . . 393
14.5.4.1 Security architectures for autonomous
defense . . . . . . . . . . . . . . . . . . 393
14.5.4.1.1 Control area network and elec-
tronic control unit
security . . . . . . . . . . . . . 393
14.5.4.1.2 Vehicular ad hoc networks secu-
rity (VANET) . . . . . . . . . . 395
14.5.4.1.3 Security design and process . . 395
14.5.5 Security by design . . . . . . . . . . . . . . . . . . 395
14.5.5.1 Adversarial model . . . . . . . . . . . . . 396
14.5.5.2 Trust model and security . . . . . . . . . 397
14.5.5.3 Security mechanisms . . . . . . . . . . . 397
xvi Contents

14.5.5.4 Autonomous vehicle operational model


and security objectives . . . . . . . . . . . 398
14.5.5.5 Safety standards for autonomous
vehicle . . . . . . . . . . . . . . . . . . . 399
14.5.5.6 Security perimeter . . . . . . . . . . . . . 400
14.5.6 Autonomous vehicle security management . . . . . 400
14.6 Cyberattacks on Autonomous Vehicle . . . . . . . . . . . . 400
14.6.1 Security and privacy threats: case of autonomous
automated vehicles . . . . . . . . . . . . . . . . . . 401
14.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 402

Index 407

About the Editors 409


Preface

In the 21st century, world experienced rapid change of technology across


the industries which leads to the evolution of Fourth Industrial Revolution
interchangeably used with Industry 4.0. It revolutionized the way industries
design, manufacture, and optimize their products and represents a new stage
in the organization and control of the industrial value chain.
Industrialists are integrating digital technologies such as internet of things
(IoT), artificial intelligence (AI) and machine learning, blockchain tech-
nology in the production and throughout their operations. These modern
technologies lead to improvement and automation of the industry. Since
Industry 4.0 is multidisciplinary in nature, this book combines multitude of
technologies from different domains. Keeping this in mind the book has been
organized into four sections.
CPS: Advancements in Connected Industrial Systems and Robotics
CPS are not limited to industrial floors anymore. They now comprise of com-
plex systems such as state-of-the-art robotics systems, drones, self-driving
cars, and many more. The applications of these systems are changing how
the industry functions. Chapter 1 provides application of AI techniques in
digitizing modern chemical industries and how it aids in sustainability goals.
In the chemicals field, digital transformation success necessitates a complete,
holistic approach that considers the entire asset lifespan, from design to oper-
ations and maintenance. The chapter not only discusses the applications but
also the practical challenge that arise during digital transformation. Chapter
2 provides data collected from semi-structured interviews with employees
of an industrial manufacturing enterprise who are involved toward migrating
old-generation industrial systems to a more modern platform. The chapter
lays down a systematic plan as adopted/suggested by industry practitioners.
Chapter 3 provides a guide of how to deploy container as a service (CaaS)
in cloud environments. Authors provide the architecture and implementation
of CaaS, along with the advantage and disadvantages of the technology.
Chapter 4 provides an automated framework for detecting unknown activity
in vehicular ad hoc networks. This improves traffic security and efficiency

xvii
xviii Preface

by providing low-latency traffic security applications. The authors suggest


an improved hybrid cooperative malicious node detection approach com-
bined with automated predication offer security against external attackers
in vehicular ad hoc network (VANETs). Chapter 5 presents the control of
mobile manipulator with object detection for explosive ordnance disposal
(EOD) application for a remotely operated mobile manipulator. The robot
prototype is an unmanned ground vehicle (UGV) with multi-terrain tracked
wheel chassis and a 6-degree of freedom (DOF) robotic arm mounted on the
top along with FPV camera for visual feedback.
AI: Machine Learning, Deep Learning Algorithms, and Applications
Smart agriculture and precision farming techniques are some of the key
applications of current industrial revolution directly effecting sustainable
development goals (SDG). Smart agriculture is a perfect example of interplay
of IoT/sensor networks, AI, cyberphysical systems (CPS), and blockchain for
various stages of farming due to the highly complex nature of the subject.
Chapter 6 reviews the existing and emerging sensors along with wireless
network and other communication technologies, IoT and AI focused on agri-
cultural industry. It also addresses the challenges of the latest technologies
and extends toward the discussion on future direction of smart agriculture.
Chapter 7 discusses the application of machine vision in the field of plant dis-
ease identification. The study focuses on a thorough examination of machine
learning-based extraction methods, as well as their benefits and drawbacks.
It covers a wide range of features, based on shape, texture, and color for
different diseases in diverse cultivations.
IoT and WSN bringing Enhanced Connectivity to Edge Devices
IoT brought a disruption in industrial communication. The edge devices
suddenly saw a huge multi-fold rise in resourceful and the industry had tons
of datapoints based on which the various operations can be optimized and
synchronized to a higher degree of accuracy. Chapter 8 provides a guide
to system development for scientists/engineers working in the field of IoT.
The chapter provides detailed insights from the secure-software develop-
ment methodology for different IoT applications. Various methodologies
are analyzed for two different parameters, that is, physical infrastructure,
emerging technologies. The chapter explores the various aspects such as
lifecycle, technologies, architecture, and frameworks. Chapter 9 proposes a
novel multi-level intelligent cluster head selection based on bacterial foraging
optimization (ICHB-HEED) (MLICHBHEED) protocol consisting of vary-
ing energy levels in heterogeneous model based on ICHB-HEED protocol.
Preface xix

The hybrid energy-efficient distributed (HEED) protocol is a clustering tech-


nology that is frequently used in WSNs. ICHB-HEED is a smart cluster head
election protocol using BFOA (bacterial foraging optimization algorithm).
The authors report an improvement in energy efficiency while delivering
improved network performance. Chapter 10 presents a comprehensive liter-
ature review of IoT applications with edge computing and their respective
architectures. Chapter 11 summarizes recent developments in low-energy
network protocols. The chapter also proposes a novel self-powered network
based on varying node energy levels. Hardware design and simulation results
have been provided to verify the optimized performance of the proposed
network.
Cybersecurity: Blockchain Technology and Applications
With more complexity of communication systems in Industry 4.0 and depen-
dency on internet and cloud technology security was never more critical
than in current generation of industrial systems. Blockchain is state–of-the-
art cybersecurity technique that not only disrupted the financial markets but
is significantly altering the supply chain, logistics, energy management, and
various other facets of today’s connected industries. Chapter 12 is focused on
detailed application analysis of consensus algorithm in blockchain to provide
an efficient and secure network by using emergence of cryptocurrencies as
an example. Chapter 13 provides a systematic study of various blockchain
protocols and algorithms. Here, the authors investigate a wide range of
blockchain algorithms and protocols’ applications in literature to summarize
their properties in a comprehensive classification under different criteria in
the form of a tree structure which acts as a quick guide to diverse set of
researchers looking to employ these. Chapter 14 provides various security
threats to self-driving cars discussing via case studies and possible techniques
for security management and prevention of the attacks/threats.
Editors:
Abhinav Sharma
University of Petroleum and Energy Studies, India
Arpit Jain
QpiAI India Private Limited, India
Paawan Sharma
Pandit Deendayal Energy University, India
Mohendra Roy
Pandit Deendayal Energy University, India
Acknowledgement

The Editor acknowledges River Publishers for this opportunity and profes-
sional support. My special thanks to Mr. Rajeev Prasad, River Publishers for
the excellent support, he provided us to complete this book. Thanks to the
chapter authors and reviewers for their availability for this work.

xxi
List of Figures

Figure 1.1 AI application in chemical industries. . . . . . . . 4


Figure 1.2 Catalyst identification process using ML-based
technique. . . . . . . . . . . . . . . . . . . . . . . 8
Figure 1.3 Pathway to finding new drugs using
AI-techniques. . . . . . . . . . . . . . . . . . . . . 9
Figure 3.1 Conventional cloud service model. . . . . . . . . . 62
Figure 3.2 Types of virtualization. . . . . . . . . . . . . . . . 63
Figure 3.3 Architecture of VM. . . . . . . . . . . . . . . . . . 67
Figure 3.4 Architecture of container. . . . . . . . . . . . . . . 67
Figure 3.5 Container as a service (CaaS) model. . . . . . . . . 69
Figure 4.1 VANET architecture using intermediator. . . . . . . 81
Figure 4.2 Flow of improved cooperative bait detection
scheme. . . . . . . . . . . . . . . . . . . . . . . . 95
Figure 4.3 Steps in simulation result of DSR. . . . . . . . . . 98
Figure 5.1 Explosive ordnance disposal robots. . . . . . . . . 121
Figure 5.2 Block diagram of control system. . . . . . . . . . . 123
Figure 5.3 Hardware architecture of the proposed model. . . . 123
Figure 5.4 Annotating image. . . . . . . . . . . . . . . . . . . 126
Figure 5.5 (a) Robot prototype in indoor environment, (b)
Robot prototype in outdoor environment. . . . . . . 127
Figure 5.6 Object detection results in a laboratory environment. 128
Figure 5.7 Robotic arm simulation using MATLAB GUI. . . 129
Figure 5.8 (a) Mobile robot simulation in gazebo, (b) Robot
perspective. . . . . . . . . . . . . . . . . . . . . . 130
Figure 5.9 Three-link manipulator MATLAB GUI simulation. 130
Figure 6.1 Evolution of agricultural technology. . . . . . . . . 137
Figure 6.2 Key factors of smart agriculture implementation. . 138
Figure 6.3 IoT-based agricultural monitoring. . . . . . . . . . 140
Figure 6.4 Smart agriculture based on wireless technology. . . 148
Figure 6.5 Sensor systems in smart agriculture. . . . . . . . . 148

xxiii
xxiv List of Figures

Figure 6.6 Architecture of convolutional neural network


(CNN)-based deep learning model. . . . . . . . . . 161
Figure 7.1 Basic blocks used for plant disease detection. . . . 185
Figure 7.2 Color features extraction of infected leaf sample:
(a) Original RGB image, (b) Red color channel, (c)
Green color channel, (d) Blue color channel. . . . . 192
Figure 7.3 A three-by-three mask is divided into four two-by-
two grids using CCM approach . . . . . . . . . . . 193
Figure 7.4 The possible scan pattern motifs. . . . . . . . . . . 193
Figure 7.5 Leaf image geometry. . . . . . . . . . . . . . . . . 194
Figure 8.1 Physical infrastructure of smart cities. . . . . . . . 208
Figure 8.2 Emerging technologies for smart cities. . . . . . . . 210
Figure 8.3 Emerging technologies for automatic driving. . . . 212
Figure 8.4 Emerging technologies for automatic driving. . . . 212
Figure 8.5 Physical infrastructure of agriculture field monitoring.214
Figure 8.6 Emerging technologies for agriculture field moni-
toring. . . . . . . . . . . . . . . . . . . . . . . . . 214
Figure 8.7 Physical infrastructure of railway monitoring. . . . 216
Figure 8.8 Emerging technologies for railway monitoring. . . 216
Figure 8.9 Physical infrastructure of forest monitoring. . . . . 217
Figure 8.10 Emerging technologies for forest monitoring. . . . 218
Figure 9.1 Network model showing different types of SNs in
the network for MLICHBHEED protocol at the 5-
level of heterogeneity. . . . . . . . . . . . . . . . . 235
Figure 9.2 Number of remaining alive SNs after each round for
MLICHBHEED protocols at varying heterogeneity
levels. . . . . . . . . . . . . . . . . . . . . . . . . 239
Figure 9.3 Residual energy of the network after each round for
MLICHBHEED protocols at varying heterogeneity
levels. . . . . . . . . . . . . . . . . . . . . . . . . 241
Figure 9.4 Number of packets sent to the BS by different
MLICHBHEED protocols in each round. . . . . . . 241
Figure 10.1 Edge computing issues. . . . . . . . . . . . . . . . 251
Figure 10.2 IoT Framework. . . . . . . . . . . . . . . . . . . . 251
Figure 10.3 Lifecycle of IoT devices. . . . . . . . . . . . . . . 253
Figure 10.4 Technologies Incorporated in Industry 4.0. . . . . . 255
Figure 10.5 Edge computing-based vehicle convoy. . . . . . . . 258
Figure 10.6 Cloud gaming using edge computing. . . . . . . . 259
Figure 10.7 Smart transport model using edge computing. . . . 260
List of Figures xxv

Figure 10.8 Typical edge computing architecture. . . . . . . . . 262


Figure 10.9 Edge computing architecture. . . . . . . . . . . . . 262
Figure 10.10 Edge computing network structure. . . . . . . . . . 263
Figure 10.11 Telco edge cloud platform. . . . . . . . . . . . . . 267
Figure 10.12 Multi-access edge omputing. . . . . . . . . . . . . 269
Figure 10.13 Simple MEC working. . . . . . . . . . . . . . . . 269
Figure 10.14 Scheduler-based edge computing. . . . . . . . . . 272
Figure 10.15 Task analysis. . . . . . . . . . . . . . . . . . . . . 274
Figure 10.16 Algorithm: Task scheduling algorithm. . . . . . . . 275
Figure 10.16 Bidding task scheduling. . . . . . . . . . . . . . . 276
Figure 11.1 Concept of IIoT network. . . . . . . . . . . . . . . 285
Figure 11.2 Industrial IoT architecture. . . . . . . . . . . . . . 289
Figure 11.3 (a) Coverage and data rate in IIOT technology, (b)
Terminal, connection cost and energy efficiency in
IIOT enabling technologies. . . . . . . . . . . . . . 291
Figure 11.4 Network architecture in low-powered WAN network. 291
Figure 11.5 Potential energy-harvesting sources for sensors. . . 294
Figure 11.6 Duty cycle power considerations for Bluetooth low-
energy technology. . . . . . . . . . . . . . . . . . 295
Figure 11.7 Solar-powered wireless sensor node using BLE. . . 296
Figure 11.8 Supercapacitor charging circuit. . . . . . . . . . . 296
Figure 11.9 Supercapacitor charger circuit using solar panel. . . 297
Figure 11.10 Supercapacitor charger circuit using solar panel. . . 297
Figure 11.11 BLE–RSL10 from ON Semiconductor. . . . . . . . 298
Figure 11.12 Model presentation for radio energy. . . . . . . . . 299
Figure 11.13 Improvement in the mobile sensor nodes activity
levels using a time slot technique. . . . . . . . . . 300
Figure 11.14 Average activity levels. . . . . . . . . . . . . . . . 302
Figure 11.15 Normalized residual energies. . . . . . . . . . . . . 303
Figure 11.16 Average activity over life span. . . . . . . . . . . . 304
Figure 11.17 Energy consumption. . . . . . . . . . . . . . . . . 304
Figure 12.1 Rise of top 5 cryptocurrencies in January 2022. . . 316
Figure 12.2 Working of PoW. . . . . . . . . . . . . . . . . . . 320
Figure 12.3 Working of PoS. . . . . . . . . . . . . . . . . . . . 321
Figure 13.1 Pillars of blockchain technology. . . . . . . . . . . 332
Figure 13.2 Blockchain technology characteristics. . . . . . . . 333
Figure 13.3 Taxonomy of alternative consensus protocols. . . . 334
Figure 13.4 Most known consensus algorithms . . . . . . . . . 336
Figure 13.5 Proof of work. . . . . . . . . . . . . . . . . . . . . 337
xxvi List of Figures

Figure 13.6 Proof of stake. . . . . . . . . . . . . . . . . . . . . 338


Figure 13.7 Popular algorithms based on PoW. . . . . . . . . . 340
Figure 13.8 Popular algorithms based on PoS. . . . . . . . . . 341
Figure 13.9 Proof of burn. . . . . . . . . . . . . . . . . . . . . 342
Figure 13.10 Popular algorithms based on FBA. . . . . . . . . . 343
Figure 13.11 Alternative algorithms based on PoW. . . . . . . . 345
Figure 13.12 Alternative algorithms based on PoS. . . . . . . . . 348
Figure 13.13 Alternative algorithms based on FBA. . . . . . . . 350
Figure 13.14 Hybrid algorithms. . . . . . . . . . . . . . . . . . 352
Figure 13.15 PoX algorithms . . . . . . . . . . . . . . . . . . . 354
Figure 13.16 Popular blockchain protocols. . . . . . . . . . . . . 356
Figure 13.17 Total number of transactions on the Bitcoin
blockchain. . . . . . . . . . . . . . . . . . . . . . 356
Figure 13.18 Quorum party. . . . . . . . . . . . . . . . . . . . . 358
Figure 13.19 Blockchain consensus algorithms and protocols. . . 361
Figure 13.20 Steps to develop a blockchain application. . . . . . 361
Figure 14.1 Industrial Revolution. . . . . . . . . . . . . . . . . 376
Figure 14.2 Manufacturing technology platform vision for 2030. 377
Figure 14.3 Cybersecurity risk assessment framework. . . . . . 380
Figure 14.4 Functional architecture of the EDI DbW car. . . . . 385
Figure 14.5 Intercommunication and software framework. . . . 387
Figure 14.6 Perception overview. . . . . . . . . . . . . . . . . 387
Figure 14.7 Safety controller’s software architecture. . . . . . . 388
Figure 14.8 Attacks on autonomous vehicle. . . . . . . . . . . 391
Figure 14.9 Autonomous vehicle defense. . . . . . . . . . . . . 394
Figure 14.10 Security management. . . . . . . . . . . . . . . . . 396
List of Tables

Table 2.1 Respondents from the industrial company . . . . . . 44


Table 2.2 Summary of categorization and coding. . . . . . . . . 49
Table 3.1 Difference between virtual machine and container . . 65
Table 4.1 Parameter used in ad hoc network for simulation . . . 99
Table 6.1 List of various sensors used in smart agriculture. . . . 152
Table 6.2 List of communication technologies used in smart
agriculture. . . . . . . . . . . . . . . . . . . . . . . 158
Table 6.3 List of research works carried out on plant disease
detection using deep learning methods. . . . . . . . . 162
Table 6.4 List of autonomous vehicles and its functions for
smart agriculture. . . . . . . . . . . . . . . . . . . . 169
Table 7.1 Significant five Haralick texture features . . . . . . . 188
Table 7.2 Description of different types of primitive along with
mathematical relations . . . . . . . . . . . . . . . . 190
Table 9.1 Parameters for simulation . . . . . . . . . . . . . . . 236
Table 9.2 Number of sensors in five-level heterogeneity for
MLHEED and MLICHBHEED protocols . . . . . . 237
Table 9.3 Categorization of energies in five-level heterogeneity
for MLHEED and MLICHBHEED protocols . . . . 238
Table 9.4 Round number when first and last nodes are dead . . 239
Table 9.5 Percentage increase in network energy and the corre-
sponding increase in network lifetime for MLICHB-
HEED protocol . . . . . . . . . . . . . . . . . . . . 240
Table 9.6 Number of packets sent to BS after each round . . . . 240
Table 11.1 Comparison between energy harvesting WSNs and
battery-powered WSNs . . . . . . . . . . . . . . . . 293
Table 12.1 Analysis of Ethereum in the years 2015–2022 . . . . 317
Table 12.2 Attributes of good consensus algorithm . . . . . . . . 318
Table 12.3 Comparative analysis of different consensus algorithm 319
Table 13.1 Chapter’s organizational structure . . . . . . . . . . . 331

xxvii
xxviii List of Tables

Table 13.2 The upsides and downsides of the most well-known


consensus algorithms . . . . . . . . . . . . . . . . . 339
Table 13.3 Most-known consensus algorithms . . . . . . . . . . 343
Table 13.4 Alternative algorithms based on PoW . . . . . . . . . 347
Table 13.5 Alternative algorithms based on PoS . . . . . . . . . 349
Table 13.6 Alternative algorithms based on FBA . . . . . . . . . 350
Table 13.7 Hybrid algorithms . . . . . . . . . . . . . . . . . . . 353
Table 13.8 PoX algorithms . . . . . . . . . . . . . . . . . . . . 355
Table 13.9 Hyperledger frameworks . . . . . . . . . . . . . . . 358
Table 13.10 Pros and cons of blockchain protocols . . . . . . . . 360
Table 13.11 The application’s technical choices . . . . . . . . . . 364
List of Contributors

Akiti, Narendra, Design & Engineering, Jubilant Pharmova Limited, India


Alzahrani, Yazeed, School of Computing and Information Technology,
University of Wollongong, Australia
Amrita, Banasthali Vidyapith, India
Antony, Cecil, School of Biotechnology, National Institute of Technology
Calicut, India
Athavale, Vijay Anant, Walchand Institute of Technology, India
Awasthi, Lalit Kumar, National Institute of Technology, India
Bansal, Ankit, Chitkara University Institute of Engineering and Technology,
Chitkara University, India
Bavarva, Arjav, Department of Information and Communication Technol-
ogy, Marwadi University, India
Boudour, R., Embedded Systems Laboratory, Annaba University, Algeria
C. S., Meera, Advanced Remanufacturing and Technology Centre, A* STAR,
Singapore
Chaudhari, Dinesh N., Department of Computer Sci & Engineering JDIET,
India
Chowdary, Vinay, School of Engineering, University of Petroleum and
Energy Studies, India
Dave, Vachik S., Walmart Global Tech, USA
Dey, Amar Kumar, Department of Electronics & Telecommunication Engi-
neering, Bhilai Institute of Technology, India
Echchaoui, H., Embedded Systems Laboratory, Annaba University, Algeria
Ghodke, Praveen Kumar, Department of Chemical Engineering, National
Institute of Technology Calicut, India

xxix
xxx List of Contributors

Gunjan, SRM University Delhi-NCR, India


Gupta, Medini, Amity Institute of Information Technology, Amity University,
Uttar Pradesh, India
Gupta, Mukul Kumar, School of Engineering, University of Petroleum and
Energy Studies, India
Gupta, Prateek, University of Petroleum & Energy Studies, India
Jadhav, Avinash P., Department of Computer Sci & Engineering JDIET,
India
Kapil, Anil Kumar, College of Technology, Surajmal University, India
Kathiriya, Hiren, Department of Electronics and Communication, R K
University, India
Kathole, Atul B., Department of Computer Engineering, PCCOEIndia
Kilari, Hemalatha, Davidson School of Chemical Engineering, Purdue
University, USA
Lal, Niranjan, Computer Science and Engineering, SRM Institute of Science
and Technology, India
Mehta, Ruchika, Manipal University Jaipur, India
Miloud-Aouidate, A., Embedded Systems Laboratory, Annaba University,
Algeria
Mishra, Akhilesh Kumar, Panipat Institute of Engineering and Technology,
India
Patra, Manoj Kumar, Department of Computer Science and Engineering,
National Institute of Technology, India
Pattanayak, Himansu Sekhar, Bennett University Greater Noida, India
Pawar, Ritvik, Mahatma Gandhi University, Meghalaya, India
Reddy, P. Swapna, Department of Chemical Engineering, National Institute
of Technology, India
S., Sathiya, Department of Instrumentation & Control Engineering, Dr. B. R.
Ambedkar National Institute of Technology Jalandhar, India
Sahoo, Bibhudatta, Department of Computer Science and Engineering,
National Institute of Technology, India
List of Contributors xxxi

Sharma, Abhishek, Department of Electrical & Electronics, Ariel Univer-


sity, Israel
Sharma, Manoj Kumar, Manipal University Jaipur, India
Shekhawat, Rajveer Singh, Manipal University Jaipur, India
Sorathiya, Vishal, Department of Information and Communication Technol-
ogy, Marwadi University, India
Tanwar, Sarvesh, Amity Institute of Information Technology, Amity Univer-
sity, Uttar Pradesh, India
Turuk, Ashok Kumar, Department of Computer Science and Engineering,
National Institute of Technology, India
List of Abbreviations

AMQP Advanced message queuing protocol


ANN Artificial neural networks
ANPBFT Advanced PBFT-based consensus
API Application program interface
APTEEN Adaptive periodic TEEN
BFOA Bacterial foraging optimization algorithm
BFT Byzantine fault tolerance
CA Certification authority
CaaS Containers as a service
CAE Convolutional auto encoder
CNN Convolutional neural network
CoAP Constrained application protocol
CPI Chemical process industry
CPS Cyber-physical system
CR Cognitive radio
CSP Cloud service provider
CWSI Crop water stress index
Dapps Decentralized applications
DcBFT Democratic Byzantine fault tolerance
DDPoS Delegated proof of stake with downgrade
DHCRA Distributed hierarchical clustering routing
algorithm
DOF Degrees of freedom
DOS Denial of service
DPoS Delegated proof of stake
DRBFT Delegated randomization Byzantine fault
tolerance
EESSC Energy-efficiency semi-static cluster
HER Electronic health record

xxxiii
xxxiv List of Abbreviations

EH-WSN Energy harvesting wireless sensor network


ENO Energy-neutral operation
EOD Explosive ordnance disposal
FAO Food and Agriculture Organization
FBA Federated Byzantine Agreement
FLS Fuzzy logic system
FPGA Field- programmable gate array
GAN Generative adversarial network
GDP Gross domestic product
GHG Greenhouse gas
GLCM Gray-level co-occurrence matrix
GNSS Global navigation satellite system
GPDCNN Global pooling dilated CNN
GPS Global positioning system
HEBM Hierarchical energy balancing multipath
HEED Hybrid energy-efficient distributed
HTE High-throughput experimentation
HTTP Hypertext transfer protocol
IaaS Infrastructure as a service
ICPS Industrial cyber-physical systems
ICT Information and communication technology
IHCMNDA Improve hybrid cooperative malicious node
detection approach
IIoT Industrial Internet of Things
IoS Internet of services
IoT Internet of Things
IRT Infrared thermography
ISCP Improved SCP protocol
IWN industrial wireless network
JSON JavaScript object notation
KPI Key performance indicator
LCA Life cycle assessment
LEACH Low-energy adaptive clustering hierarch
LEICP Low-energy intelligent clustering protocol
LIDAR Light detection and ranging
LMP Locational marginal pricing
List of Abbreviations xxxv

LoRaWAN Long-range wide area network


LoWPAN Low-power wireless personal area network
LPWAN Low-power wide area network
M2M Machine to machine
MAEC Multi-access edge computing
MANET Mobile ad hoc network
MEC Mobile edge computing
MEMS Micro-electromechanical systems
MLC Manufacturing Leadership Council
MODIS Moderate resolution imaging spectroradiometer
MpoC Metaheuristic proof of criteria
MQTT Message queuing and telemetry transport
MSigBFT Multisignature Byzantine fault tolerance
MTEEN Modified TEEN
MVP Minimum viable product
NDVI Normalized difference vegetation index
NEM New Economy Movement
NFV Net function virtualization
ONPOB Online benefit generating
OS Operating system
PaaS Platform as a service
PEGASIS Power-efficient gathering for information
systems
PFL Power fluctuation level
PKI Critical public infrastructure
PM Physical machine
PoB Proof of burn
PoC Proof of capacity
PoCO Proof of contribution
PoCt Proof of concept
PoET Proof of elapsed time
PoEv Proof of evolution
PoEWAL Proof of elapsed work and luck
PoI Proof of importance
PoPL Proof of play
PoR Proof of reputation
xxxvi List of Abbreviations

PoRX Proof of reputation X


PoS Proof of stake
PoSe Proof of search
PoSn Proof of sincerity
PoSP Proof of service power
PoTS Proof of TEE-stake
PoW proof of work
PSO Particle swarm optimization
QoS Quality of service
RDV Register, deposit, vote
RFID Radio-frequency identification
RL Reinforcement learning
ROI Region of interest
RSSI Received signal indicator
RTO Real-time optimization
RTT Round-trip time
SaaS Software as a service
SDN Software-defined net
SGX Software guard extensions
SMOS Soil moisture and ocean salinity
SN Sensor node
SoC System-on-chip
SSCM Site-specific crop management
TCP/IP Transmission control protocol/internet
protocol
TEA Techno-economic analysis
TEE Trusted execution environment
TFOD Tensorflow object detection
UGV Unmanned ground vehicle
UID Unique identification
UNL Unique node list
URDF Universal robot description format
VANET Vehicular ad hoc networks
VDA Variable data acquisition
VM Virtual machine
VRT Variable rate technology
List of Abbreviations xxxvii

WAN Wide area network


WSN Wireless sensor network
XMPP Extensible messaging and presence
protocol
YAC Yet another consensus
1
Artificial Intelligence in the Digital Chemical
Industry, its Application and Sustainability

Praveen Kumar Ghodke1 , P. Swapna Reddy2 , Narendra Akiti3 , and


Hemalatha Kilari4
1,2 Department of Chemical Engineering, National Institute of Technology,
India
3 Design & Engineering, Jubilant Pharmova Limited, India
4 Davidson School of Chemical Engineering, Purdue University, USA

Abstract
The chemical manufacturing industries are at the forefront of innovation,
exploring novel technologies through “smart manufacturing” and “industrial
modernization” using computational approaches to cater to increasing market
demands and stringent regulations. Digital design enables the manufactur-
ers to understand and streamline the process development and production
using process systems engineering tools. The present drive toward industrial
automation advancements such as Industry 4.0, Pharma 4.0, and smart man-
ufacturing also enables technological developments in research to percolate
into industries to meet product quality, safety, and profitability challenges.
It is envisaged that the promises of continuous manufacturing will be real-
ized with the evolution of digitalization technologies in various stages of
design, development, and implementation. Further, artificial intelligence (AI)
and machine learning-based intelligent systems are gaining popularity in all
engineering and science disciplines due to their ability to solve real-world
challenges. In the chemicals field, digital transformation success necessitates
a complete, holistic approach that considers the entire asset lifespan, from
design to operations and maintenance. However, it has also led to far-reaching
impacts on technology and the workforce worldwide. In the present work,

1
2 Artificial Intelligence in the Digital Chemical Industry, Its Application

we concentrate on practical applications of AI in chemical manufacturing


industries in the digital transformation of the chemical industry, discussing
the challenges and technological impacts.

Keywords: Artificial intelligence, machine learning, chemical industry 4.0,


digital transformation, smart manufacturing.

1.1 Introduction
The chemical sector is extremely important to the world economy. The
chemical sector is expected to contribute $10.7 trillion to the world’s gross
domestic product (GDP) in 2025. The chemical process industry is the most
energy-intensive and largest emitter of greenhouse gases (GHGs) industry
[1]. The petrochemical and chemical industries emitted 764 million tons of
greenhouse emissions (CO2 -equivalent tons) in 2018, an increase of 8% from
2016. (IEA, 2020b) [2]. Chemical manufacturing also frequently involves
potentially dangerous ingredients and high-pressure/high-temperature set-
tings, resulting in fires, explosions, and other chemical accidents. Chemical
mishaps could result in deaths and financial and social losses. Many attempts
have been made in the chemical industry to develop and deploy technologies
to decrease environmental burdens, improve energy efficiency, and improve
operational safety [3].
AI is a new technology that has gotten much attention over several
decades. AI is a collection of cutting-edge technologies that can execute
tasks similar to human intellect. AI divides into deep learning, IoT, heuris-
tics, and machine learning [4]. The process of human cognition reveals via
AI cognition and logic deduction. Another sort of AI is machine learn-
ing, which can learn and enhance the performance of specific tasks based
on previous experiences. Artificial neural networks (ANN), support vector
machines, and random forests are just a few machine learning approaches
developed. Heuristics are frequently employed to solve high-dimensional
issues by simulating natural biological evolution or animal societies’ collec-
tive behavior (e.g., particle swarm optimization, ant colony optimization).
Hybrid approaches and agent-based modeling are two other AI strategies [5].
The chemical industry is increasingly interested in adopting AI to solve
problems, including process modeling, optimization, control, and fault iden-
tification and diagnostics. The chemical industry’s environmental, economic,
and social sustainability are intertwined. According to an Accenture poll,
94% of executives in the chemical and advanced materials industries predict
1.2 AI in the Chemical Industry and Applications 3

an industry-wide digitalization, with AI playing a pivotal role in facilitating


the digital revolution [6]. Many research studies looked at AI applications,
digital transformation, impacts, and obstacles in the chemical sector. On the
other hand, these assessments focused on AI applications and looked at the
long-term ramifications of deploying AI in the chemical sector.
Some studies have shown that AI could help achieve sustainable develop-
ment goals, but little industry-specific research, particularly in the chemical
industry, has been done [7]. A few studies looked at the effects of AI on higher
education, government administration, and policymaking. All three studies
are concerned with social and policy ramifications, but none have built frame-
works for assessing sustainability. The present study analyzes the research
on AI in the chemical industry, digitalization, and the quantitative/qualitative
assessment of AI technologies’ sustainability-related consequences. Identify-
ing the new chemical molecule/drug or catalyst process is described based
on the ML models, generative network methods, and learning models such
as RL and ANN. Additionally, the sustainability of AI-based learning was
emphasized in the future prospectus.

1.2 AI in the Chemical Industry and Applications


AI has had a significant impact on all sections of the chemical industry,
with tremendous potential that has revolutionized value chain management,
enhanced efficiency, and opened up new ways to market [8]. There has been
much excitement about transforming the business by combining cutting-edge
technology for creating, collecting, and storing data at reduced prices with
advances in computational power to tackle previously impossible difficulties.
Companies have demonstrated a readiness to use technology to increase
quality, service level, and operational efficiency.
The chemical study explores the structure and properties of matter and
the chemical reactions that transform things into other substances and so
play a “central” role in other disciplines. As a result, chemistry is a data-
rich discipline of science that contains complicated information derived from
hundreds of years of experimentation and, more recently, decades of compu-
tational analysis. Chemical research is still a labor-intensive process due to
the infinite complexity of the variety of material compounds [9]. Chemicals
offer a unique chance to accomplish substantial advances through AI due to
their high complexity and large amounts of data. To begin with, the types of
molecules that are structured from atoms are nearly limitless, resulting in an
infinite chemical universe. The interconnectedness between these molecules
4 Artificial Intelligence in the Digital Chemical Industry, Its Application

and all potential combinations of variables, such as temperature, substrates,


and solvents, is enormous, resulting in an infinite reaction space [10].
Exploring the infinite chemical and reaction space and navigating to
the best ones with the desired attributes is thus almost impossible with
only human efforts. Second, in the chemical study, the vast number of
molecules and their interactions with their surroundings introduce a new
degree of complexity that cannot be predicted merely using physical laws
[11]. Figure 1.1 shows the possible application of AI methods in chemical
industries. In the petroleum industry, AI is applied in surface geological
frameworks, reservoir engineering, and product quality detection. AI has
many applications in wastewater treatment plants, such as assessing water and
wastewater quality, wastewater monitoring system, and quality detection. In
manufacturing, fault detection and diagnosis are performed using an AI-based
model and also used in digital designs. Similarly, AI is applied to automated
system design process operation, modeling and optimization, and real-time
control in process system engineering.
Many notions, principles, and theories have been generalized during cen-
turies of research on trivial (i.e., single-component) systems. When the scale
changes, symmetry breaks down in larger, more complex systems, and the
rules shift from quantitative to qualitative, nontrivial complications emerge.
Chemical research is thus incorrectly guided by heuristics and fragmentary

Figure 1.1 AI application in chemical industries.


1.2 AI in the Chemical Industry and Applications 5

rules accumulated over the previous centuries, yielding progress that only
proceeds through trial and error due to the lack of systematic and analytical
theory toward the structures, properties, and transformations of macroscopic
substances [12]. ML will be able to recognize patterns in vast amounts of
data, providing an unparalleled means of coping with complexity and altering
chemical research by revolutionizing the way data is handled. Currently, AI
is being used in every sub-field of chemistry, including research and data
creation tools like analytical chemistry and computational chemistry and
applications in organic chemistry, catalysis, and medical research. While AI
has a wide range of applications in technology, it also has a wide range of
applications in chemical science. Let’s look at some of the ways that AI can
be used in the chemical sciences [13].

1.2.1 AI in chemical science


The detection of molecular characteristics is the first and most important use
of AI in chemical science. Scientists have been manually detecting the chem-
ical characteristics of molecules since determining a molecule’s attributes is
a time-consuming process. However, AI has aided this process and allowed
scientists to detect chemical features. It has simplified the manual detec-
tion process, making chemical treatments more efficient [14]. Furthermore,
scientists have been able to assess the potential of a hypothetical molecule
by identifying molecular characteristics. As past data empowers computers
to interpret current data, AI algorithms have aided the study of chemistry.
Machine learning technologies can now sift through massive datasets of
existing molecules and their attributes, generating new possibilities based
on the data. It has the potential to speed up and reduce the cost of finding
new medication candidates. While molecular property detection is helpful
in chemical science, AI in molecular design has led to groundbreaking
discoveries in the discipline. Scientists have collected historical data and
manufactured chemical bonds by creating molecules. Scholars have advanced
in their discovery of molecules by incorporating AI algorithms, which will
undoubtedly aid them in making groundbreaking discoveries in AI chem-
ical synthesis. Furthermore, creating molecules leads to various practical
applications that have significantly advanced the area of chemistry [15].
The process of drug discovery is one of the essential uses of AI in
chemical research. Identifying medications has shown to be highly beneficial
in healthcare and science. MIT researchers used a machine-learning system
to discover a novel antibiotic molecule. The drug destroyed several of the
6 Artificial Intelligence in the Digital Chemical Industry, Its Application

world’s most troublesome bacteria in laboratory tests, including some kinds


resistant to all known antibiotics. Scientists are working hard to identify
pharmaceuticals to build new molecules and formulate excellent medicines
for curing fatal ailments when new diseases emerge on the surface [16].
When molecules are broken down to determine their building blocks, this
is known as a retrosynthesis reaction. As the phrase implies, the synthesis
process (to generate something) will carry backward to uncover a molecule’s
building blocks. Unlike now, when scientists employ AI to perform retrosyn-
thesis reactions, scientists performed this process manually in the past. The
process was lengthy that required a significant amount of time and resources.
However, with the advent of artificial intelligence, this procedure can now
be performed with the assistance of computers, making it more accurate and
efficient [17].
Finally, the use of AI in chemical science has enabled scientists to
perform predictive analyses. Computers produce advanced AI algorithms and
patterns that indicate predictive analysis for the future using past data and
understanding current data [18]. Computers are fed data that improves their
interpretation skills and empowers them to work along the lines of human
intellect using machine learning or deep learning algorithms. This application
is critical because it emphasizes the potential repercussions or influence of
specific chemical bonds, compounds, or even medications, which can help
steer future steps in the right path.

1.2.2 AI in research and development


R&D is critical to industry innovation, especially in organizations that deal
with sustainability. AI has been used to improve chemical synthesis design by
predicting and optimizing chemical reactions. Catalyst screening and design
have both been investigated using machine learning. Several studies have
emphasized AI’s potential in assisting the production of environmentally
friendly chemicals and materials [19]. A study looked into the usage of
artificial neural networks to evaluate and increase job happiness in research
labs and those technical aspects. Every business has a plan to implement
procedures, tools, and techniques. Let’s look at how AI can be applied to
the chemical sector in a larger sense [20].
Most gamers concentrate on AI-assisted research that can deliver quick
and precise results. Advanced research uses machine learning technologies
and computerized permutations and combinations to recognize molecules,
develop formulas, and determine the quantity of a chemical [21]. AI aids in
Other documents randomly have
different content
casting off of that ancient chrysalis of “coverture.” Have you by
chance yet met among your acquaintances the woman who is
refusing to part with her own name? Mary McArthur, the great
English labour leader, is the wife of Mr. Anderson, a member of
Parliament and she is the mother of a baby. But she has never
ceased to be herself. “You call yourself Miss McArthur,” a curious
inquirer remarked to her one day, “and yet they say your cook tells
that you are very respectable.”
There are numbers of women like this in London and in New York,
who are preferring their own identity to that of their husbands. The
German and Scandinavian women going a little farther say, “Let us
at mature age take an adult title.” Master Jones, you know, does not
wait for the day of his marriage to emerge from his adolescence as
“Mr.” Jones, Fraulein is but a diminutive, “little Frau,” a prefix of
immaturity. Rosika Schwimmer, touring America for a lecture bureau,
assured inquiring reporters: “Of course I am Frau Schwimmer. Why
shouldn’t I be? I have passed my 35th birthday.” The Imperial Union
of Women Suffragists of Germany in convention assembled, not long
ago decided to adopt the adult title Frau for all women of mature
age, the “unity title,” they call it. In this first faint stirring, there is
significance of wide changes.
She whose identity had so disappeared at the altar, that the law
actually wrote her down on the statute books as civiliter mortua, one
“civilly dead,” is about to be restored to the status of an individual.
The long road, along which the woman movement of yesterday
made its slow way, is now at the sharpest turning.
The struggle of women in all lands to be released from the
discriminations that have limited their human activities set free the
spinster some time ago. The point of view that is now generally
accepted about her, and without contravention in the most advanced
countries, was most definitely formulated some sixty years ago in
Scandinavia. There they put on the statute books a law abolishing
the previous male guardianship over unmarried women and
permitting a person “of staid age and character” to manage her own
affairs. At first this was a privilege to be granted only on special
appeal to the king. But at last the right of self-government at 21 was
established for all unmarried women. So radical a departure from
custom was of course not accomplished without misgivings. There
were those who feared that for a woman to manage her own affairs,
was not in accordance with true womanly dignity and the dictates of
religion. They said, The majority of women do not want it. Why, then,
give them a responsibility they do not wish or ask for? But in spite of
those objections, the spinster came to be recognised as a
responsible individual.
For so long now has the world been accustomed to seeing her
going about, doing as she pleases almost as any other adult, that we
have forgotten that she ever couldn’t. She can acquire education.
She can own property. She has been able for some time now to get
into a great many occupations and professions: only her difficulty
was to get up. And there has been that limitation to her income. It
has remained stationary at a figure seldom passing two-thirds that of
a man’s income. The teaching profession affords statistics that are
world-wide testimony to the situation that has prevailed from, say,
Newark, N. J., to Archangel, Russia: there have been women school
teachers working for a less wage than the man school janitor: there
have been women professors at the head of high school
departments at a salary less than that of the men subordinates
whom they directed. Still, in all of her personal affairs, a spinster in
every country has been for a long time now as free as the rest of the
people.

SIGNING AWAY HER FREEDOM


Then, on the day that the ring is slipped on her finger, she has put
her name to a contract that has more or less signed away her liberty,
according to the part of the world in which she happens to live. In
Finland, for instance, where the position of women has been in many
respects as advanced as anywhere in the world, even a woman
member of Parliament at her marriage reverts to type, as it were:
though she still sits in Parliament, she passes under the
guardianship of her husband! In Sweden, she lost her vote: for that
country, in 1862 the first to grant the municipal franchise to women,
cautiously withheld it until 1909 from married women. There is,
indeed, almost no land in which marriage does not in some way limit
for the rest of her life a woman’s participation in world affairs. She
may have lost property rights, personal rights, political rights, or
perhaps she has lost her job, her right to work and be paid for it. At
any rate, she must look around to determine how many of these
things may have happened to her. Any of them that haven’t, are
special exemptions from that universal ruling of all nations that a
woman on marriage enters into a state of coverture, with its
accompanying legal disability. “Disability” is defined by Dicey’s
“Digest” as the “status of being an infant, lunatic, or married woman.”
And there you are.
It was from that predicament that the earliest woman’s rights’
associations sought to extricate the woman who had taken the
wedding veil and ring. Susan B. Anthony’s first most famous
achievement back in the sixties was a law establishing the right of a
married woman in New York State to the ownership of her own
clothes! By specific enactments since then, one and another of the
rights to which other human beings are naturally born have been
bestowed on married women. The most clearly defined of these, and
the most widely recognised at last, are the right to their separate
property and the right to their own earnings, which prevails in most of
the United States. The Married Women’s Property Act accomplished
it in England. In France, after 14 years of agitation for it, Mme.
Jeanne Schmall and the Société l’Avant Courriere in 1907 at last
secured the law giving to the married woman the free disposition of
her salary. But these concessions it is not easy to disentangle from
that basic notion, which is warp and woof of the whole fabric of law,
that a married woman has passed under the guardianship of her
husband.
For in Germany and Scandinavia and France, “separate property”
to ensure her title to it, must be specially secured to her by an
antenuptial contract. In Sweden, her earnings are hers, only if they
remain in cash. In France she is permitted to invest them in bonds,
provided first she either makes affidavit before a notary proving her
ownership or brings a written permit from her husband. In the State
of Washington, the supreme attempt to confer equality on woman
finds expression in the statute: “All laws which impose or recognise
civil disabilities upon a wife which are not imposed or recognised as
existing as to the husband, are abolished.” But in spite of that most
laudable effort, the end is not yet attained. For the State of
Washington is still enmeshed in the community property system, by
which the management and control of the common property in
marriage is vested in the husband. And although the law has been
distinctly framed that a married woman is entitled to her own
earnings, it practically takes them away from her by requiring her to
count them in with the community property which is under her
husband’s control. The atomic theory, you see, was not more firmly
fixed in science than is this idea that has been embedded in the
social structure that a married woman is legally, civilly, and politically
a minor!
Even in these United States, where the mention of the “subjection
of woman” raises a smile, so largely has it by the grace of the
American man been permitted to become a dead letter, the
employment of married women has remained against public policy.
Many boards of education have by-laws about it. Even these women
teachers who commit matrimony and conceal it are almost invariably
later on detected and dropped from the pay roll when found guilty of
maternity. Business houses have shared in the prejudice. A Chicago
bank as lately as 1913 adopted a rule requiring the resignation of
woman employés on marriage. Because the married woman, the
bank president said, “should be at home, not at a typewriter or an
adding machine.” Similarly a United States civil service regulation
reads: “No married woman will be appointed to a classified position
in the postal service, nor will any woman occupying a classified
position in the postal service be reappointed to such position when
she shall marry.”
A world has been arranged, you see, on the assumption of the
complete eclipse of the personality of the married woman—with the
burden resting on her to disprove it in the legal situations where she
has come to be recognised as an individual. Custom prefers that a
married woman should be a dependent person. It was an idea that
fifty years of feminist bombardment had not dislodged from the
popular mind. Now in four years of war, it has crumbled.
“Women wanted,” called the world in need, wanted even though
married! And out of the seclusion and separation to which she was
hitherto consigned, the woman with the ring has come to find her
wage envelope. All regulations against her employment are now
rescinded in Europe, as soon they will be here. The working woman
in particular has been given her release. The state, you remember,
will now cook her meals and care for her children. And it was all a
mistake that attributed infant mortality to the industrial employment of
mothers. Now it is found that a wife’s wage envelope really reduces
infant mortality by improving environment. There will be fewer of Mrs.
Webber’s children, you know, dying in three rooms than in two!
The ban on the married woman in the civil service and in the
professions is lifted. The Association of Austrian Women’s
Organisations in their 1916 convention passed the resolution
demanding the abolition of the “celibacy clause” for women office
holders. And although no country has as yet formally erased this
from the statute books, governments have at least tacitly consented
to remember it no more against a woman that she has married. That
is why Dr. Edith Russell is again practising medicine in the public
health service and Prof. Elsa von Stuttgart is teaching philosophy.
Especially in medicine is it recognised that the married woman
physician is more than ever fitted for a part in the campaign for the
conservation of child life. And if she is also a mother, so much the
better. Why was it never thought of before? Of course a person who
has had a baby is the real expert who knows more about it than the
person who never can have one. Women formerly dropped from the
civil service on account of marriage have been recalled all over
Europe. Even Germany has opened to them post, telegraph, and
railway positions. So many masters in Germany’s upper high schools
are at the front, that married women have been called to these
positions. Hundreds of married women have been reinstated in the
school rooms of England. Detroit, Mich., the other day repealed its
regulations which forbade the employment of married women as
teachers in the public schools. It is Russia that has led all lands in
her recognition of the woman teacher, not only refusing longer to
penalise her for marriage but actually, as we have seen, establishing
for her the principle of equal pay for equal work.

WHAT IT MEANS TO BE A MINOR


Like this, the married woman has to-day been welcomed in
industry, in commerce, and in the professions. This person of affairs
abroad in the world a minor! It is more than a disability that she
herself must endure. It becomes an annoyance to the world to have
her so. According to Bacon’s Abridgement, a very imposing volume,
it is still written that “the law looks upon husband and wife but as one
person and therefore allows but of one will between them, which is
placed in the husband.” But you see what a far cry it is from the
woman in London or Paris or Berlin to “the one” on the western front.
How is she to “obey” that man in the Vosges or on the Somme since
she cannot have telegraphic communication about her daily
movements? And without it, the French woman was left in a helpless
tangle in the Napoleonic code.
Madelaine de Ranier at the head of a great business concern in
Paris found herself forbidden to sign a check, unable to open a bank
account. The Count had enlisted on the second day after war was
declared and he had left with her a sum of gold. When it was
exhausted and she faced the need of funds, she was unable to
negotiate a loan on valuable bonds that she owned. Oh, the bonds
were all right. The difficulty was that she was a married woman. And
though very rich, she nevertheless was obliged to turn to friends who
relieved her immediate financial necessities. Now in the drawer of
her office desk there is a legal paper bearing the seal of France:
across the bottom is printed “Bon pour autorisation maritale” and
beneath is the Count’s signature. Until he had consented to make
this arrangement, sending on from the front this “authorisation of the
husband,” she was prohibited from transacting any business. For a
married woman in France might not sell property or mortgage it or
acquire it or sign a business contract or go to law without the
consent of her husband! Women acting temporarily as mayors of
some of the French villages, from which almost the entire male
population has been mobilised, have found it necessary in order to
execute municipal papers to turn to a male citizen for his signature,
even though he might not be able to write and could only make his
mark. Finally in 1916, the situation came up, for legal decision. The
validity of a building contract entered into by a French woman was
questioned in court. The judge after mature deliberation rendered a
decision that although the woman was not empowered to sign the
contract, yet as she had acted with the tacit consent of her husband
and in his interest and that of the country, the court would uphold the
validity of the act. “It is necessary,” he said, “that for the welfare of
France, women shall take the place of men and perform duties which
have hitherto been considered outside their sphere.” The Union
Fraternelle des Femmes at once began pressing Parliament for the
removal from the statute books of the requirement for “maritale
autorisation.” And not long ago the Chamber of Deputies passed the
bill granting to married women for the period of the war, permission
to demand from the courts the right to do without this legal formality.
Italy in 1917 completely swept away this same ancient restriction.
The bill introduced by the Italian Minister of Justice, Signor Sacchi,
abrogated not only maritale autorisation, but “every other law which
in the field of civil and commercial rights curtails the capacities of
Italian women.” Speaking for the measure in Parliament, Signor
Sacchi declared it an “act of justice—of reparation almost, to which
women have now more right than ever.”
But these civil disabilities have not been limited to Latin countries.
You may find them anywhere as a hang-over from past ages. It is
simply the natural corollary to that old doctrine of coverture that the
acts of the dependent person should lack authority before the law.
Even in the State of Washington, a wife may not sue alone in a court
of law to recover personal damages: her husband must join with her
in the suit. Everywhere in the professions and in business, woman’s
progress has been blocked because the courts, looking into the law
books, found the status of this person in question. If her protected
position more or less prevents her from entering into legal contracts,
doubt is cast on all of her agreements. What prudent business man
would wish to engage in a business transaction with her? There are
provisions of the Married Women’s Property Act in England, which
make her not liable to imprisonment for refusal to pay her debts. And
who would choose to be represented in a court of law by an
advocate who, though to-day in clear possession of all of her
capacities, may to-morrow cease to be “responsible” before the law?
For any woman, though not yet married, is always subject to that
liability! That was what the courts of the United States decided when
the first women began to apply for admission to the legal profession.
And it is to correct the position in which women are placed by the
common law that their admission to the practice of law in America
has been by the slow process of an “enabling act” from State to
State. In England, where this common law still bars the way, their
present appeal now before Parliament is significantly entitled “A Bill
to remove disqualifications on the ground of sex or marriage for the
admission of persons as solicitors.”
There is still another “disability” which is causing to-day perhaps
the most world-wide concern of all. A spectacular figure has been
silhouetted against the background of the great war. In the tranquil
days of peace, a woman might have been all her life married to a
man of differing nationality without making the discovery that she
had thereby lost her own: by law when she married, she became of
her husband’s nationality. When the troops began to march in 1914,
a wife like this suddenly found herself a woman without a country.
Frightened English women married to Germans resident in London,
panic-stricken German women married to Englishmen who
happened to be resident in Berlin, knew not which way to turn for a
haven from the terrors of war. Pronounced aliens in their home land,
their position was even worse than that of, the woman of actual
enemy birth who was stranded in a foreign country when the war
burst. She could at least go home. But where should a woman who
was married to an enemy alien go?
Her own country turned on her coldly with the declaration, His
people are your people. And nowhere in the world would she be so
little welcome as among his people now at war with and bitterly
hostile to hers. There are instances where these women have been
obliged to find refuge in neutral countries. In some lands they have
been permitted to remain in the place of their birth, but under police
espionage. A man and his wife, you know, are one. And if he controls
her absolutely, from her slippers to her principles, is it likely that she
will dare to be a free agent in her war sympathies? As a matter of
fact, this war has developed that she is always more or less under
the cold suspicion even of relatives and neighbours, of having along
with the loss of her own nationality lost also her patriotism. Who shall
say but that in obedience to her husband she may be a spy? I stood
at the desk in the Bow Street Police Station registering my arrival in
London one war day, when a timid voice of inquiry at my side also
addressed the sergeant: “I want to ask,” she said diffidently, “if I
could possibly have my mail sent here to police headquarters? You
see, it’s letters from my husband interned here in England because
he’s a German. I’m an English woman. But every boarding house in
London where I try to live, as soon as that envelope marked ‘Enemy
Internment Camp’ arrives in my mail, turns me out.”
Like this, the “alien wife” has to be shunted about in many lands
to-day. Even a woman who has not so lost her nationality may not
travel without all of the credentials of her marital status to establish it.
If you apply for a passport at Washington, you are asked for your
husband’s birth certificate and under some conditions your marriage
certificate. A married man is not asked for his. Why this inquiry into
your personal affairs? Because it is tacitly assumed that you are so
under the authority of another person that there is no knowing what
he may make you do. By all law and religion you have been taught to
obey him. Then if he told you to blow up a ship, would you? The only
way to make sure that you are a “safe” person to be at large, is to
make sure of your husband’s loyalty. For your identity is not your
own, you see, it’s his. If he happens to be French or Russian or
German or Hottentot, so you must be.

WOMAN’S COMING OF AGE


That’s the way that men have made the world. Now see it
beginning to be made over. Women everywhere are crying out in
their conventions and associations that the married woman’s own
nationality should be restored to her. America is the first country to
take action about it. And here, because women have arrived at the
halls of government, it is more than resolution and petition. The
United States Congress has before it a bill proposing the repeal of
the law compelling women to relinquish their American citizenship on
marriage to foreigners. The bill was introduced, let us note, by the
Hon. Jeanette Rankin, the first woman to be a member of the
national law-making body.
What was it man said a little while ago: “You do not need a vote,
my dear. I will represent you in government and make the laws for
you.” So all over the world he did. But isn’t it plain now that he made
a mess of some of the laws he made for her? It is a conviction that
has crystallised simultaneously in all countries that woman in her
present independent sphere of activity has won her right to self-
determination in all matters personally important to her. That is why
measures for her enfranchisement are so universally under way. Let
her vote for herself. Let her represent herself. No one else has been
able successfully to do this for her. And it may be that now she will
be able to make better arrangements for herself than others have for
her in this world where certainly a great deal has gone wrong.
So we have arrived at woman’s coming of age. She who used to
be by the most ancient family law passed as a chattel from the
guardianship of a father to that of a husband, is now to be an
individual. It is only now that she could be. In a way they were right
yesterday who refused to regard her as a responsible person. For
she wasn’t. Under the coercion of coverture, she even had to think
the way that pleased the person who paid her bills! To-day with a
wage envelope in one hand and a ballot in the other, she is as much
of a human being as any one else is. As such, she is in a position to
find the full status of her own personality. For the first time since
history began, she will be under no one else’s authority.
No greater revolution than this will have been wrought by the
Great World War. It is going to be safe to permit to wives in all lands
that they retain their own nationality. The reason is clear: because no
one can compel this new woman, even though she is a wife, to be a
spy, or anything else that she does not wish to be. Or anything else
that she does not wish to be!
In those words, the woman movement of to-day full-throated
carols a hope for humanity that has not echoed before in all the
epics or the sagas or the inspired revelations since the fall of man.
Who giveth this woman in marriage? She who was a bondwoman
now is free. And church and state shall hear her terms!
Oh, yes, they shall! For a reform of the institution on which society
rests is all that will prevent a rebellion against it. What do women
want? This woman who turns the ring on her finger? Read the
publications that during the past decade have said: The Free
Woman, edited by Dora Marsden in England; Minna Cauer’s Die
Frauenbewegung and Marie Stritt’s Die Frauenfrage and Helene
Stocker’s Die Neue Generation in Germany; La Française, edited by
Jane Misme in France; and Margaret Sanger’s The Woman Rebel in
New York; the teachings of Dr. Alice Vickerey in London and of Dr.
Aletta Jacobs in Amsterdam. There were even women in the radical
vanguard of that woman movement of yesterday who were ready to
end marriage if it were not mended.
The world—and man who made it—had no adequate conception
of the hurt that was smothered and smouldering in the heart of her
over whom he exercised his dominion and power. Windows were
heard smashing in England. Over in Germany there had begun a
breaking with less noise about it, so that the world in general did not
know. In the Kaiser’s kingdom right in the face of the mailed fist,
traditions not to be so easily repaired as glass were being shattered.
But it was the suffragette outburst in London that caught public
attention. Thoughtful men who honestly wanted to know—and never
could understand—turned to each other with the question, Why do
women do this? And no man could tell.
Gentlemen, come with me. There is sitting in Westminster in 1910
a Royal Commission on Marriage and Divorce. Not yet even have
their findings changed English law. But the commission was
appointed to make inquiry into these matters in response to a rising
feeling of unrest over the present arrangements. Witnesses, to give
evidence that it may be determined what ought to be done, are in
1910 being called. This government commission, it should be noted,
quite contrary to precedent, includes among the churchmen and
statesmen who have been appointed to decide the question, also
two women. One of them, the Lady Francis Balfour, is interrogating a
witness whom she has summoned to the stand because she has a
particular point that she wishes to elucidate. He is the Bishop of
Birmingham, whose church insists that at marriage the woman
passes indissolubly into the power of the husband. To the man, it is
permitted that he may divorce her for adultery. But so long as these
two shall live, not even for that offence on his part may she have
release. He may beat her. He may flay her soul. But she is his—
unless she gets all of these details spread on the public records and
the judges of the courts decide that there are enough of them legally
to constitute “cruelty.” Then, for adultery together with this cruelty on
the part of a husband, a few English women have been allowed
divorce. But it is very difficult and very expensive and very offensive
to the clergy when it has been actually accomplished.
The Lady Francis Balfour is speaking. To the Bishop of
Birmingham she is saying: “Let me take a concrete case. You may
have a woman who is a Christian and you may have her husband ill
using her in some sort of way. We have had evidence put before us,
which is of course known to us all, that there are even men who live
on the prostitution of their wives. Now, is that not a contract which
has been broken on the one side in the worst possible way? Are they
twain one flesh? Is that for better and for worse?”
Bishop of Birmingham: “Yes, I am afraid so.”
Lady Francis Balfour: “And is that wife to stick to that husband,
she being a Christian, and to do as he commands her?”
Bishop of Birmingham: “Yes, I am afraid so.”

WHAT WOULD MEN HAVE DONE?


That’s all, gentlemen. You and I will go. There will be other
witnesses and days of testimony. But isn’t this enough? What would
you yourselves do if your church and your state handed you over
body and soul, like this, to any other human being to have and to
hold and to exercise this power and dominion over you? I don’t
believe you’d ever stop at all to parade and respectfully to petition
about it. I think you’d be mobbing and rioting and bombing right
away. And if they had arrested you and put you in Holloway Jail,
you’d have raised the roof and torn down the whole social structure!
Well, in England women broke windows. In Germany, as I have
said, they broke more. “Your statutes have limited the liberties of the
woman who marries. Then you shall never limit us,” was the gauntlet
thrown down to society by the extremists. They were university
women, some of them with doctor of philosophy degrees, who
scathingly refused the ring and faced free love instead. They were
quite frank about it—and quite fearless. I have talked with them there
in Berlin. They looked at me as clear eyed, when they told me of
what they had done, as any women who have walked ringed and
veiled down a church aisle into legal wedlock. Well, they seemed to
think it was the only way, to act directly instead of to agitate.
And they got out the book of the church ritual that they had
repudiated. And they turned to a paragraph and said to me, Read.
And I read: “The woman’s will, as God says, shall be subject to the
man and he shall be her master: that is, the woman shall not live
according to her free will ... and must neither begin nor complete
anything without the man. Where he is, there must she be and bend
before him as her master, whom she shall fear and to whom she
shall be subject and obedient.”
So I write it here, gentlemen, for you to see. And again, I submit,
What would you do if they had said it that way to you? Be fair. Could
any ring have held you?
It was natural, I think, that revolt should be most bitter in England
and in Germany, the two countries where women were driven to the
verge of desperation. A Frenchman may hold the reins of his
authority so gaily that a woman with skill evades them. And the dear
American man will pass them right over to you if you’re a woman of
any judgment and finesse at all. But in those lands where a wife
must not only promise to obey, but also they made her, the eruption
was due. Action and reaction are equal in the old law of physics, and
you can pretty accurately measure the rebound by that. It was
because the ring hurt worse in Germany than anywhere else in the
world, that they just tore it off. But the marriage strike that was
started in Germany wasn’t staying there.
In nearby Sweden, a woman who is a very prominent lawyer and a
man who is a university professor, decided to do with an
announcement in a newspaper instead of a ceremony in a church—
and the lady remains a lawyer. It was the only way that she could.
The law of that land places the woman, on the day that she marries,
under her husband’s guardianship, and pronounces her incompetent
thereafter to act as an attorney in court! The newspaper
announcement as it is now used in Scandinavia is called the
“conscience marriage.”
There were also Anglo-Saxon women who had rebelled. In
London, an Oxford graduate who had done with window breaking
told me quite candidly that she was living what she called the
“unorthodox life.” And there were others in her particular London
suburb. In New York City, even, there are women who have
preferred the “free union.”
You see how near it was to being wrecked, this an institution more
revered by society than all of the cathedrals and art galleries. Only
this war, probably, could have averted the disaster. Now this new
woman, with her wage envelope and her vote, has become
articulate. She can speak as one who can pay the rent, about how
“we” shall live.
Oh, it’s not either Hampstead or Long Island. Never mind for a
while whether the lace curtains will be long enough or shall the floors
be done over. Yesterday her domain was the home. To-day it’s the
wide, wide world to be set to order. For the first time she’s facing her
destiny, with the right to decide more than the parlour carpet or her
satin slippers or even her sociological principles.
How “we” shall live and love together, is the question for
consultation. And there is statute and dogma and custom and
convention and tradition to be done over. These have been handed
down until they are many of them past all usefulness. Some of them
are moth-eaten and quite outworn. None of them, please note this,
gentlemen, none of them is of her selection. Just think of that.
There’s not a code in the world that was formulated by a woman.
The creeds that have come from Rome and Wittenberg and
Westminster were not even submitted for woman’s inspection. And
marriage was made for her by law courts and church councils to
which she was not even asked. There was not so much as a by-
your-leave to the lady, in the matter of her most intimate personal
concern. Oh, isn’t this clearly where the reconstruction of civilisation
shall commence?

MAKING OVER MARRIAGE


Only for the man in khaki to come home again it waits. Then with
the new woman, together at last, they can build the new world aright.
For never again shall we permit any such skewed and twisted and
one-sided job as that of the past. “Dear,” she will say, “you did it as
well as you could, probably, that old world. But the trouble was, that
you did it alone.”
And with a little whimsical smile, she’ll quote for him the old
proverb that “two heads are better than one.” Then perhaps they will
walk in the garden in the evening. And with her hand in his arm, she
will speak as she never could speak before—as a free woman who
has found her soul! There were things, I think, that God forgot when
he talked to Moses and to St. Paul. But now he’s told them to her.
Listen: “Marriage,” she will say, “marriage, dear, we must make
over so that it shall be something very sweet and very sacred.”
Oh, it wasn’t always that yesterday. There are women who know it
wasn’t. When a man could say to the woman the law gave to him,
“Come unto me to-night, or I shall not give you money with which to
buy shoes for the children to-morrow.” Or he may have said, “the
slippers for your pretty feet”—when marriage was that way,
everything in it divine just died! It shall never be so again.
Hear the new woman. “We shall have more love about marriage
and less law,” she will say. “And we shall never let them lock us in.
Love always laughed even yesterday at the clumsy locksmiths who
thought they had bolted and barred the Doll’s House with ordinance
and ritual. For how love cometh, we may not say, who are mute
before so much as the mystery of the tint of the rose or the perfume
of the lilies in June. Nor how love goeth, dare we define.
Presumptuous mortals who have thought to hold back love with law
and enactment, have made of marriage an empty form, echoing with
the mockery of the happiness that fled.”
Well, we will say that she is talking like this under the stars. The
next morning at breakfast she will come right to the point. And I know
where she will begin. “That old doctrine of coverture,” she will say,
“take it away!” There is a place for the relics of an antiquated
civilisation. In the museum of the Tower of London they have in a
glass case the little model of the rack and thumb screw. The
executioner’s block and the headsman’s axe is an important and
impressive exhibit. And there are the coats of mail of early warriors.
It is customary, I believe, to put there all things that are passing into
desuetude: a hansom cab went in the other day. Now let them take
also this ancient doctrine of coverture, and put it in a glass case for
future generations to wonder at its barbarity. Then may the marriage
contract be rewritten with a really free hand.
How it will be done all over the world, we even at present may
prophesy. See already Scandinavia. The northern sky was alight with
the forecast of woman’s freedom, even before this war broke.
Contemporaneously with the enfranchisement of women up there,
completed in Denmark only in 1915, almost the first act of
governments in which all of the people were for the first time
represented, was to appoint a marriage commission. On it are both
men and women from the three lands, Norway, Denmark, and
Sweden. It is still at work revising the marriage laws. The task is not
completed. But there are important sections of the new code ready:
they have taken the “obey” out of the marriage service; they have
stipulated for divorce by mutual consent, that is by request of the
parties interested, who are to be let out of wedlock as simply and as
easily as they were let in. Further personal rights and property rights
are all being defined and arranged on the new basis of equality of
morality and duty and responsibility and on the assumption that the
wife is a separate personality from her husband.
The nearby country of Finland, where the woman movement has
always kept step with Scandinavia, has also taken similar action.
The Law Committee of the Finnish Parliament had in 1917 appealed
to local authorities and other qualified bodies for suggestions on the
subject of the reform of the marriage laws. Seven women’s
associations united in formulating the pronouncement which was
returned. There is no paragraph about divorce for the reason that
Finland has already accomplished divorce by mutual consent. For
the rest, it is probably the most complete presentment available of
the new woman’s point of view. This is what she asks:—
1. That the guardianship of the husband shall cease, and the
married woman have an equal right of action in all legal matters,
even against her husband; that she shall have the right to plead in
courts of law and to carry on business independently.
2. That the married couple shall have equal responsibilities and
rights as regards the children and provide for them together.
3. That the husband and wife shall have equal right to represent
the family in public matters. If either party uses this right improperly,
it can be taken from him or her by the courts on the demand of the
other party.
4. If either husband or wife should be a cause of danger to the
other, the party who is endangered shall have the right to separate
from the other. The courts shall be empowered to decide whether the
circumstances are such as to entitle the complaining party to receive
maintenance.
5. That if a married couple separates, the party who retains the
care of the child shall decide the question of the child’s education. If
this right be misused, the other party shall have the right to appeal to
the courts for rectification.
6. That if any labour contract or business be conducted by one of
the parties to the detriment of the family, the other party shall have
the right of appeal to the courts with the object of annulling the
contract or forbidding the business.
7. That in regard to the property of married couples, there shall be
three possible alternative methods of arrangement: (a) Joint
possession in the case of earned income. (b) Joint possession of
every description of property. (c) Separation of property.
8. Several points must be taken into consideration in regard to the
working of these different methods of arrangement: (a) That the
distinction between real and other descriptions of property shall
cease. (b) That each party shall have control over his or her
separate property and the income derived from it and over all earned
income. (c) That each party shall be bound to contribute to the
maintenance of the family in proportion to his or her means, either in
work or in financial resource. (d) That in case of joint possession, the
whole income, earned or unearned, of each party shall belong to the
common family fund. (e) That in the case of joint possession, both
parties shall have equal rights of disposition. These rights shall be
used by them jointly in such a manner that neither party shall be able
to dispose of the property without the consent of the other, and no
transaction can take place without the consent of both parties. (f)
That the party who gives the chief labour and attention to the home
shall have a due share of the common property and of the earned
income, with full power to defray his or her personal expenses and
those of the home.
9. Before marriage, the contracting parties shall agree on which of
the three systems the property shall be arranged. This agreement
shall be capable of alteration after marriage with due legal formalities
and safeguards.
10. Husband and wife shall inherit from each other on the same
footing with the children.
This memorial from the Finnish women coincides perfectly in spirit
with the new laws in process of construction for Scandinavia. When
the Dutch Parliament, which has just conferred a new measure of
suffrage on the women of the Netherlands, was in 1917 debating the
matter, an alarmed reactionary rose to object: “But how can married
women vote? For married women are not free. They are like soldiers
in barracks, who have lost the liberty to express their thoughts.”

THE NEW FATHERHOOD


Sir, that’s just the point. But the liberty that was lost, is found. No
one, as we have seen, is going to compel this new woman to be
anything that she does not want to be. Let us not forget this now as
she goes on talking. For she is coming presently to that which is at
the heart of the whole woman question, nay, more, the human
question.
“Dear,” she is going to say, “there is that which matters more than
all the rest for us now to decide. It’s the children, the children are on
my mind.” Then she is going to emphasise how important it is that
parenthood shall be equalised. By the laws that men have made
about it, quite universally, equally in fact in England and Germany
and France and Italy and Russia and the United States, the father is
the only parent. His will decides its religion, its education, and all of
the conditions under which the child shall be reared. There are a few
of the United States, most notably those where women vote and one
or two others in which pressure has been brought to bear by the
feminists, where the law has been corrected. Also in Scandinavia
and in Australia, as soon as women have come into the vote, one of
their first efforts has been to establish what is known as “equal
guardianship,” the right of a married mother to her own child. To an
unmarried mother, by a strange perversity in the statutes of men, is
conceded not only all the right to the child but there is put upon her
all of the responsibility of its parenthood.
The new woman is not going to rest content to have it stand that
way. Already the world is being forced to a new deal for childhood.
The sins of the fathers are being lifted from the children on whom
society in the past has so heavily visited them. A baby has broken no
law. Why brand it, then, as “illegitimate”? War babies crying in all
lands have brought statesmen to startled attention. Government after
government has arranged for what is called the “separation
allowance” to go to the woman at home to whom the soldier at the
front knows that it belongs—even though she has no marriage lines
to show. So the War Office pen writes off one discrimination. Of
children who used to be called “illegitimate,” 50,000 born annually in
England and 180,000 born annually in Germany will now be entitled
to start life with equal financial government aid that the others get.
It is the first step in the direction of the new arrangements about
parenthood. The polite fiction that used to pass, that there were any
children without fathers, is going to be ruled out of court. Of all the
laws that have been written that evidence the difference in the point
of view of men and women, see the illegitimacy laws. Napoleon put it
in his code “La recherche de la paternité est interdite,” and it was
only in 1913 that the feminists of France, led by Margaret Durand,
succeeded in getting that edict modified so that a woman in France
is no longer “forbidden” to look for the father of her child. Up in
Norway, where women vote, they put on the statute books in 1915 a
very different law: it commands that the father of the child shall be
found. This is the famous law framed by Johan Castberg, minister of
justice, and inspired by his sister-in-law, Fru Kathe Anker Moler. The
draft of the bill was submitted in advance to the women’s clubs of the
country: the National Women’s Council of Norway stamped it with
the seal of approval. So that there can be no doubt but that it has put
the matter as a woman thinketh. Even the title of the new law
significantly omits all objectionable reference: it is a “Law Concerning
Children whose Parents have not Married Each Other.” They are
equally entitled to a father’s name and support and to an inheritance
in his property as are any other kind of children. The father must be
found! Not even if the paternity is a matter of doubt among three
men or six men or any several men, can any of them, or all of them,
escape behind “exceptio plurium,” which in other lands affords them
protection. In Norway, they are every one of them a party to the
possible obligation. And the financial responsibility of fathering the
child in question is distributed pro rata among them. What the
Norwegian law accomplishes, you see, is the abolition of anonymous
paternity.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like