Professional Documents
Culture Documents
Textbook Advanced Hybrid Information Processing First International Conference Adhip 2017 Harbin China July 17 18 2017 Proceedings 1St Edition Guanglu Sun Ebook All Chapter PDF
Textbook Advanced Hybrid Information Processing First International Conference Adhip 2017 Harbin China July 17 18 2017 Proceedings 1St Edition Guanglu Sun Ebook All Chapter PDF
https://textbookfull.com/product/advanced-hybrid-information-
processing-first-international-conference-adhip-2017-harbin-
china-july-17-18-2017-proceedings-1st-edition-guanglu-sun/
https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-i-guan-gui/
https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-ii-guan-gui/
https://textbookfull.com/product/social-media-processing-6th-
national-conference-smp-2017-beijing-china-
september-14-17-2017-proceedings-1st-edition-xueqi-cheng/
Trusted Computing and Information Security: 11th
Chinese Conference, CTCIS 2017, Changsha, China,
September 14-17, 2017, Proceedings 1st Edition Ming Xu
https://textbookfull.com/product/trusted-computing-and-
information-security-11th-chinese-conference-ctcis-2017-changsha-
china-september-14-17-2017-proceedings-1st-edition-ming-xu/
https://textbookfull.com/product/china-satellite-navigation-
conference-csnc-2017-proceedings-volume-i-1st-edition-jiadong-
sun/
https://textbookfull.com/product/china-satellite-navigation-
conference-csnc-2017-proceedings-volume-iii-1st-edition-jiadong-
sun/
Guanglu Sun
Shuai Liu (Eds.)
219
Advanced Hybrid
Information Processing
First International Conference, ADHIP 2017
Harbin, China, July 17–18, 2017
Proceedings
123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 219
Editorial Board
Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, Hong Kong
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Florida, USA
Xuemin Sherman Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Jia Xiaohua
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Guanglu Sun Shuai Liu (Eds.)
•
Advanced Hybrid
Information Processing
First International Conference, ADHIP 2017
Harbin, China, July 17–18, 2017
Proceedings
123
Editors
Guanglu Sun Shuai Liu
Harbin University of Science Inner Mongolia University
and Technology Hohhot
Harbin China
China
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
We are delighted to introduce the proceedings of the first edition of the 2017 European
Alliance for Innovation (EAI) International Conference on Advanced Hybrid Infor-
mation Processing (ADHIP). This conference gathered together researchers, develop-
ers, and practitioners from around the world who are leveraging and developing
theories and methods for hybrid information compression, classification, and recog-
nition. The theme of ADHIP 2017 was “Data-Driven Theory, Method, and Application
in the Real World.”
The technical program of ADHIP 2017 consisted of 65 full papers in oral presen-
tation sessions of the main conference tracks. The conference tracks were: Track 1,
“Advanced Methods and Applications for Hybrid Information”; Track 2, “Real
Applications of Aspects with Hybrid Information.”
Aside from the high-quality technical paper presentations, the technical program
also featured two keynote speeches given by Dr. Guoru Ding, IEEE Senior Member,
from the National Mobile Communications Research Laboratory of China and
Dr. Wanxiang Che from the Research Center for Social Computing and Information
Retrieval, Harbin Institute of Technology.
The steering chairs and all members of the Program Committee were essential for
the success of the conference. We sincerely appreciate their constant support and
guidance. It was also a great pleasure to work with such an excellent Organizing
Committee and we thank them for their hard work in organizing and supporting the
conference. In particular, we also thank the Technical Program Committee, led by our
TPC chair, Xiaochun Cheng, who completed the peer-review process of technical
papers and compiled a high-quality technical program. We are also grateful to con-
ference manager, Lenka Bilska, for her support and all the authors who submitted their
papers to the conference.
We strongly believe that this ADHIP conference provides a good forum for all
researchers, developers, and practitioners to discuss all science and technology aspects
that are relevant to hybrid information processing. We also expect that future ADHIP
conferences will be as successful and stimulating, as indicated by the contributions
presented in this volume.
Organizing Committee
General Co-chairs
Guanglu Sun Harbin University of Science and Technology, China
Shuai Liu Inner Mongolia University, China
Web Chair
Houbing Song West Virginia University, USA
Workshops Chair
Ruolin Zhou Western New England University, USA
Publications Chair
Shuai Liu Inner Mongolia University, China
Panels Chair
Jingchao Li Shanghai Dianji University, China
Tutorials Chair
Guodong Wang South Dakota School of Mines and Technology, USA
Demos Chair
Qi Wang Nanjing Normal University, China
VIII Organization
Local Chairs
Jiazhong Xu Harbin University of Science and Technology, China
Suxia Zhu Harbin University of Science and Technology, China
Conference Coordinator
Lenka Bilska EAI (European Alliance for Innovation)
Prediction Model Based Failure Time Data for Software Reliability. . . . . . . . 265
Peng Lin, Xu Tian, Xiaojuan Wang, Xu Cao, Jiejing Cao,
Jianli Li, and Yan Gong
A Clustering Algorithm for the DAP Placement Problem in Smart Grid. . . . . 349
Guodong Wang, Yanxiao Zhao, Yulong Ying, Jun Huang,
and Robb M. Winter
1 Introduction
With the fine management of liquefied petroleum gas companies and the state to
improve the management of liquefied petroleum gas, cylinder safety management has
always been a very headache for managers. Cylinder safety management is mainly
reflected in: whether the control is not seized, scrapped cylinders continue to fill; can
control the cross-filling cylinder; can control the loss of scrap cylinders; can control the
loss of customers and other phenomena [1–3]. In order to solve the above problems, to
achieve the safety management of the Internet of things, the system depends mainly
processing. On the cylinder on the smart angle valve device, the smart angle valve
embedded with RFID smart chip and limit control device. RFID smart chip so that each
cylinder has a unique RFID code, that is, ID information. The inflatable gun is
equipped with an RFID identification device and a control inflator. The identification
device is composed of a reader and an STM32 controller. The control device on the
intelligent angle valve can only be opened after the reader and the identification. And
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
G. Sun and S. Liu (Eds.): ADHIP 2017, LNICST 219, pp. 1–11, 2018.
https://doi.org/10.1007/978-3-319-73317-3_1
2 Y. Bo et al.
then open the inflatable operation. When the cylinder inflated after the end of the filling
information (cylinder inspection, filling, release, validity, specifications, cylinder code)
through the GPRS wireless communication module uploaded to the database server,
easy to monitor the center for statistical, query and other data applications. The
inflatable system is through the RFID technology to control the cylinder is not seized,
scrap cylinders continue to fill and cylinder filling, to eliminate expired, not seized,
dangerous cylinders are used again, through the cylinder RFID coding means for each
cylinder to wear a Helmet, so that people’s lives and property from the threat [4–6]. But
the core problem of the system is the reader in the identification of cylinder ID, there
will be RFID tag collision phenomenon, resulting in the reader can not correctly
identify any one of the label information, reducing the reader’s recognition efficiency
and read and write Speed, seriously affecting the normal operation of the system.
There are two kinds of anti-collision algorithms in RFID system. ALOHA-based
uncertainty algorithm and deterministic algorithm based on binary tree (BT, binary
tree). ALOHA algorithm is a random algorithm, its operation is simple but random, low
throughput, there will be a label in a very long time can not be identified, that is, “label
hunger” phenomenon. The binary tree algorithm is a deterministic algorithm. The
algorithm does not have the phenomenon of “label hunger and thirst”, its recognition
rate is high, and the advantages of throughput are applied in the RFID system, but the
algorithm is relatively complex and the recognition time is long. In the improved binary
tree algorithm, Fikenzeller proposed a binary search algorithm [7], the advantage lies in
the idea of simple thinking, but there are many requests and return the amount of data
larger shortcomings. On this basis, Zhang Hang proposed a return binary search
algorithm [8], the advantages of the algorithm can be ordered to read and reduce the
number of requests, the disadvantage is that the amount of data returned to the label is
still large. The dynamic binary search algorithm proposed by Hsuei has improved the
first two algorithms, and the problem of reducing the number of requests but the large
amount of data returned by the tag still exists [9]. In this case, Bingcai proposed based
on the stack storage anti-collision algorithm, which reduces the amount of data returned
by the label has improved, but the number of requests for the reader did not change a
lot [10]. Above the binary search algorithm still exists too many times the number of
reader requests and the amount of data returned by the label is too large and so on [11–
13].
In this paper, based on the binary search algorithm, an improved algorithm based
on stack is proposed, which can reduce the number of times of reader/writer while
ensuring the redundancy of data redundancy, and effectively solve the problem that
many cylinders are embedded in the filling process RFID tag collision problem.
2 System Solutions
2.1 System Composition
With pneumatic system based on RFID intelligence cylinder design mainly consists of
four parts, respectively, inflatable terminal layer, data layer, data processing layer and
application management. The system structure diagram is shown in Fig. 1.
Application of Improved RFID Anti-collision Algorithm 3
Application management
data center
Internet
GPRS Network
3 Algorithm Principle
Role of read and write in the RFID system, if there are multiple electronic label, the
same time there can be multiple tags for energy and send information to the read/write
device that will interfere with each other, causing the cylinder embedded RFID
encoding can’t correct recognition. In this adopted a stack-based RFID binary tree
anti-collision algorithm, the principle of which is to read and write device using the
detected conflict into the stack to the current request sequence, when the conflict a
greater than 1, through the stack decide next time to read and write device sends the
request instructions, avoid the request each time from the base of the tree in the process
of identification is insufficient [14, 15]. The algorithm can reduce query times and
improve recognition efficiency.
Application of Improved RFID Anti-collision Algorithm 5
3.2 Introduction
(1) Request(ID) Request: abbreviated R(ID), within the read-write scope, the label of
all the active status is received and the ID information is returned. For example,
the R(11111111) directive, which removes the tag outside of the silent state,
returns its own ID information from the tag.
(2) Rw-data read-write Data: the reader reads and writes to the selected TAB.
(3) Push (data) into the stack: Push data into the stack.
(4) Pop () the stack instruction: the sequence of the previous entry stack.
(5) Select the ID tag.
(6) UnSelect(ID) to select: the selected tag causes it to enter the silent state and does
not respond to any instruction from the reader.
and return with * a corresponding data, namely the tag 1 and 2 is selected, and the
tag 1 and 2 data returned 11, 00 respectively, the conflict is still greater than one,
then the current sequence onto the stack, which Push(10*1100*), according to the
highest position 0 conflict rules, get the next sends the request sequences of R
(1001100 *).
c. Send R(1001100*) instruction, only 2 tags TAB is selected and no conflict occurs,
read and write device sends the Select(10011000) instructions and RW - Data
command, read the label 2 Data, at the end of the operation, send UnSelect
(10011000) instruction will be set to silent mode. Because no conflict has occurred,
it is possible to determine whether the stack is empty. When the stack is not empty,
the stack instruction Pop() is called, and the stack sequence pops up, and the next
request sequence, R(10*1100*) is sent.
d. Send R(10*1100*) instruction, 1 is selected, the tag Data returned 11 and there is no
conflict, and then to read and write device sends the Select(10111001) instructions
and RW - Data operation, upon the completion of the read and write, send UnSelect
(10111001) order will tag 2 set of silent state. Because no conflict has occurred, it is
possible to determine whether the stack is empty. When the stack is not empty, the
stack instruction Pop () is called, and the next request sequence, R(11111111), is
sent.
e. Send the R(11111111) instruction, tag 3 and tag 4, and only one conflict occurs, and
the reader receives a new sequence of 1101100x. The highest conflict location 0 and
the remaining conflicts are *, and the next time the sequence is R(11011000) and
Push(11111111).
f. Send R(11011000), the only label 4 response, Select(11011000) to be selected and
corresponding RW-Data instructions after the completion of the operation, send
UnSelect(11011000) order will tag 4 set of silent state. View the stack not empty,
and send the next instruction R(11111111).
g. To send R(11111111), because the tag 1, tag 2, and tag 3 are blocked, only the tag 3
response, the read-writer, reads and writes to it, and the recognition process is over.
3.4 Analysis
In the VC++ simulation platform, the process of transceiver and electronic tags is
implemented, and the read-write process is simulated by a large amount of data. Label
bits digit, which represeanted by K = 8, K = 16, K = 32 three conditions, the basic
dynamic binary, backward binary binary, and improved algorithm to identify the total
number of read and write, transfer the total digits are simulated, the simulation results
as shown in Figs. 4, 5, 6, 7, 8 and 9.
Figure 4 through Fig. 6: (1) when the tag number is certain, the total number of
reads and reads increases as the number of tags increases; (2) the label number, tag
number are at the same time, the basic dynamic binary algorithm to identify the total
number of binary and almost unanimously, the improved algorithm based on stack and
backward binary total number. So the stack based improvement algorithm and the
backward binary are better than the basic binary and dynamic binary algorithm.
8 Y. Bo et al.
1000 1000
Basic Binary Basic Binary
900 900 Dynamic Binary
Dynamic Binary
Backward Binary Backward Binary
800 800
Improved Algorithm Improved Algorithm
700 700
Number of recognition
Number of recognition
600 600
500 500
400 400
300 300
200 200
100 100
0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags
Fig. 4. K ¼ 8 Fig. 5. K ¼ 16
1000 2000
Basic Binary Basic Binary
900 Dynamic Binary 1800 Dynamic Binary
Backward Binary Backward Binary
800 1600
Improved Algorithm Improved Algorithm
Transmission total number of bits
700 1400
Number of recognition
600 1200
500 1000
400 800
300 600
200 400
100 200
0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags
Fig. 6. K ¼ 32 Fig. 7. K ¼ 8
4000 8000
Basic Binary Basic Binary
3500 Dynamic Binary 7000 Dynamic Binary
Backward Binary Backward Binary
Transmission total number of bits
3000 6000
2500 5000
2000 4000
1500 3000
1000 2000
500 1000
0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags
Fig. 8. K ¼ 16 Fig. 9. K ¼ 32
From Figs. 7, 8 and 9: (1) The total number of transmissions increases as the
number of tabs increases, as the number of tags increases. (2) When the number of tags
is certain, the number of total digits transferred by the four algorithms increases as the
number of tabs increases. (3) When the number of tabs and the number of tags is
identical, the total number of bits of the stack based improvement algorithm is the
smallest.
Application of Improved RFID Anti-collision Algorithm 9
By Figs. 4, 5, 6, 7, 8 and 9, it is so easy to get: (1) under the same conditions, the
improved algorithm and backward binary algorithm based on stack in the identification
of the total number of almost the same, but the improved algorithm in the data
transmission is far less than backward binary algorithm. So according to the total
number of identification number and transmission of the simulation result shows that
the improved algorithm is superior to the basic binary, dynamic binary, backward
binary algorithm.
SQL database
Surveillance system
GPRS Cylinder
Cylinder information User information
communication information query
management module management module
module module
User
Inflatable Cylinder Revision of inform Cylinder Cylinder
delete New
terminal Cylinders information cylinder ation information information
users users
device inquiry information modifi entry inquiry
cation
information in the database includes the information such as the RFID number of the
steel bottle, the time information for filling, the time of scrap, the charge record, the
filling station number of the cylinder, etc.
5 Conclusion
References
1. Shijie, X.: Design and implementation of the RFID based cylinder management system.
Xiamen University (2007)
2. Rong, H.: Application of radio frequency identification technology in cylinder safety
traceability. China Autom. Ident. Technol. 02, 72–74 (2013)
3. Chao, Z., Shouyuan, C., Zengzhen, S., Jian, L., Lijuan, L., Lin, L.: Development of logistics
tracking system based on RFID, GPS and GPRS. Electron. Des. Eng. 05, 147–149 (2015)
4. Jin, T., Yahui, W., Xuemei, F., Shujun, Z., Donghui, C.: Fresh agricultural products cold
chain logistics status monitoring information system. J. Jilin Univ. (Eng. Sci.) 06, 1707–
1711 (2015)
5. Lin, L.: Design and implementation of IT - based network operation and maintenance
management system. Huazhong Normal University (2012)
6. Jedda, A., Khair, M.G., Hussein, T.M.: Decentralized RFID coverage algorithms using
writeable tags. Comput. Netw. 07, 257–261 (2016)
7. Finkenzeller, K.: Radio Frequency Identification Technology. Electronic Industry Press,
Beijing (2006)
8. Hang, Z., Minghao, T., Hui, C.: Improved backplane binary anti-collision algorithm.
Comput. Eng. Appl. 25, 208–211 (2011)
9. Chuiyi, X., Yigang, H., Bing, L., Gefeng, F.: Improvement of dynamic binary tree search
algorithm. Comput. Eng. (02), 260–262+265 (2015)
10. Bingcai, C., Dongsheng, X., Guochang, G., Lili, G.: An RFID anti-collision algorithm based
on stack storage. Comput. Appl. (06), 1483–1486 (2009)
11. Xue, W., Zhihong, Q., Zhengchao, H., Yiman, L.: Research on RFID anti-collision
algorithm based on binary tree. J. Commun. 06, 49–57 (2014)
12. Bo, F., Jintao, L., Weimin, Z., Ping, Z., Zhenhua, D.: A new anti-collision algorithm for
RFID tag identification. J. Autom. 06, 632–638 (2008)
13. Duroc, Y., Vera, G.A., Martin, J.G.: Modified RSSI technique for the localization of passive
UHFRFID tags in LOS channels. Int. J. Microwave Wirel. Technol. 55, 27–32 (2013)
14. Zhenya, C., Tai, J.: An Ethernet-based anti-trailing elevator access control system. Comput.
Eng. Appl. 22, 232–237 (2016)
15. Hsu, C.-H., Chen, Y.-M., Kang, H.-J.: Performance-effective and low-complexity redundant
reader detection in wireless RFID networks. EURASIP J. Wirel. Commun. Netw. 1, 12–16
(2008)
User-Controlled Encrypted Data Sharing
Model in Cloud Storage
1 Introduction
A substantial number of people, in their learning, working and living store, share their
information through an open network. Cloud storage services, a new form of network
application model, emerged and gathered numerous different types of storage devices
through the application of software co-functioning to realize external data storage and
business access services through using clustering applications, grid technology and
distributed file systems and other functions, ensures data security and saves storage
space effectively [1–3]. Users can store their data in remote cloud storage stored
centers, access on-demand and user-friendly for enterprises to save costs, improve
availability and reliability. However, corporate users lost a fundamental physical
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
G. Sun and S. Liu (Eds.): ADHIP 2017, LNICST 219, pp. 12–20, 2018.
https://doi.org/10.1007/978-3-319-73317-3_2
User-Controlled Encrypted Data Sharing Model in Cloud Storage 13
control for their data stored in the cloud, which will doubt their confidentiality and
integrity of the data, and inevitably raises its concerns about data security and privacy
aspects. There are two points about the reason: First, the cloud service providers are
facing a wide range of internal and external attacks following malicious enemies
deleting or destroying user data. Second, the cloud service providers may be dishonest,
they may seek to save their reputation or interests while trying to hide the information
of theft or destruction of the data stored in the cloud. Thus, based on the complexity of
the dynamic and open cloud storage environment and other features, users rely entirely
on untrusted cloud storage providers and other data storage and management factors,
how to securely share data in the open cloud storage environments is a problem need to
be solved for cloud storage applications.
To have these problems worked out, and to guarantee a safe cloud storage service
of data sharing for general users or business users, a secure storage for cloud sharing
model is proposed based on CP-ABE technology. It is functioning actively by user and
systems with triple encryption to secure user-controlled access for the data in cloud
storage.
The main contributions of this paper are:
(1) User-controlled encrypted data. Based on symmetric encryption, CP-ABE and
MD5 technology, it is triple encrypted and integrities checking for the data. It
promises access permissions of the encrypted data by user-controlled, ensuring
the security of data stored and shared in the cloud storage.
(2) Trusted third party. The introduction of a trusted certification authority as a third
party authorized purposed to store key information, monitor and audit user access
data to achieve security data sharing.
The remainder of this paper is organised as follows: Sect. 2 introduces the termi-
nology and the related work. Symbol description is in Sect. 3, and we also introduce
the proposed the data sharing model and application scene. In Sect. 4, we detail the
security encryption and algorithm design. In Sect. 5, we present the results and analysis
for the experiment. Finally, we conclude in Sect. 6, and briefly touch on the future
work.
2 Related Work
Ciphertext access control mechanism is a cloud storage data security approach, which
uses the data encryption keys, and achieves the access control target through the control
key access permissions. It is an important solution for protecting the privacy of user
data in the untrusted server-side scene. CP-ABE uses a set of attributes to represent a
user, generates user’s private keys in accordance with their properties set, and asso-
ciates with the ciphertext and the access control policy. The user can decrypt the
ciphertext only when the user’s private key attributes meet the ciphertext access control
policies. It is a suitable ciphertext access control mechanism in cloud storage envi-
ronments, encrypted data for user groups satisfied certain conditions, and does not
encrypted by determining the user groups individually. The authors proposed CP-ABE
mechanisms, which are flexible to satisfy the requirements for customizing access
14 Y. Wu et al.
policy by the data owner in cloud storage environment [4, 5]; Jung et al. proposed a
multi-authorities mechanism for preserving privacy data in cloud storage environments
with CP-ABE access control program, which uses globally unique identifier for the
user to prevent users conspiracy [6]; The authors proposed the CP-ABE programs for
multi-authority in cloud storage to solve the key escrow problem [7, 8]. In this paper,
the authors adopt CP-ABE access control policies to encrypt plaintext file encryption
key, improving encryption efficiency, while add a trusted third party to solve the key
escrow problem.
After obtaining the ciphertext, it also needs to be considered to provide users with
data integrity verification. The techniques in this research field include: hash functions,
public key cryptography, digital signatures, Merkle hash trees, and so on. The authors
proposed some more efficient data integrity verification methods, making use of these
methods, the client will be able to verify the integrity of the data being damaged only
through exchanging minimal data with the cloud platform [9, 10]; the authors proposed
a data integrity dynamic authentication service, which processed blocks and generated
verification labels before storing the data, then stored the processed data into the cloud
server, and verified the integrity of the data by selecting the method of random sam-
pling [11, 12]. In this paper, the authors adopt MD5 data integrity verification program,
which can verify whether data integrity suffered damage through a series of simple
digest value.
Once upon a time, in the far away days, when the beasts walked
the land, and talked like real people, the bear had a long, beautiful,
bushy tail, as fine as the tail of any other creature, and you may be
sure he was very proud of it.
One winter day the bear was out traveling, and whom should he
meet but Brother Fox, hastening along with a string of fish dangling
down his back.
“Ah,” said Bruin, “stop a bit, friend; where did you find such fat
fish?”
Now, very likely Brother Fox had helped himself to the fish from
some one’s larder, but he never told the bear; not he.
“It is a secret, about these fish,” he said to Bruin; “come close, and
I will tell you.”
So Bruin went close to Brother Fox, and Brother Fox said:
“You must go to the river where the ice is thick, make a hole in the
ice, sit down with your tail in the hole, and wait for the fish to bite.
When your tail smarts, pull it out, quickly. That is the way to fish.”
“Oh, is it?” said Bruin. “Well, if you say it is so, it must be true,
Brother Fox,” and he walked toward the river swinging his tail as he
went, and Brother Fox hid behind a tree to laugh up his sleeve, and
watch.
Well, poor old Bruin got a stick, and made a hole in the ice. Then
he sat down with his long, beautiful, bushy tail in the water and
waited, and, oh, it was very cold indeed.
He waited, and waited, and then his tail began to smart. He gave a
quick pull to bring up the fish, and, alas, the ice had frozen fast
again.
Off came the bear’s beautiful, long, bushy tail, and he never was
able to put it on again.
And that is why the bear has a short, stumpy tail, because he tried
to fish, as Brother Fox told him to, through the ice.
WHY THE BEAR
SLEEPS ALL
WINTER.
Once upon a time, little Brother Rabbit lived, quite sober and
industrious, in the woods, and just close by lived a big, brown Bear.
Now little Brother Rabbit never troubled his neighbors in those
days, nor meddled with their housekeeping, nor played any tricks the
way he does now. In the fall, he gathered his acorns, and his pig
nuts, and his rabbit tobacco. On a frosty morning, he would set out
with Brother Fox for the farmer’s; and while Brother Fox looked after
the chicken yards, little Brother Rabbit picked cabbage, and pulled
turnips, and gathered carrots and parsnips for his cellar. When the
winter came, he never failed to share his store with a wandering field
mouse, or a traveling chipmunk.
Now, in those days, old Bear was not content to do his own
housekeeping, and doze in the sun, and gather wild honey in the
summer, and dig for field mice in the winter. He was full of mischief,
and was always playing tricks. Of all the beasts of the wood, the one
he loved best to trouble was sober little Brother Rabbit.
Just as soon as Brother Rabbit moved to a new tree stump, and
filled his bins with vegetables, and his pantry with salad, along came
old Bear and carried off all his stores.
Just as soon as Brother Rabbit filled his house with dry, warm
leaves for a bed, creepy, creepy, crawly, along came old Bear, and
tried to squeeze himself into the bed, too, and of course he was too
big.
At last, Brother Rabbit could stand it no longer, and he went to all
his friends in the wood to ask their advice.
The first one he met was Brother Frog, sitting on the edge of the
pond, and sticking his feet in the nice, cool mud.
“What shall I do, Brother Frog?” asked Brother Rabbit; “Brother
Bear will not leave me alone.”
“Let us ask Brother Squirrel,” said Brother Frog.
So the two went to Brother Squirrel, cracking nuts in the hickory
tree.
“What shall we do, Brother Squirrel?” asked Brother Frog; “Brother
Bear will not leave Brother Rabbit alone.”
“Let us ask Brother Mole,” said Brother Squirrel, dropping his nuts.
So the three went to where Brother Mole was digging the cellar for
a new house, and they said:
“What shall we do, Brother Mole? Brother Bear will not leave
Brother Rabbit alone.”
“Let us ask Brother Fox,” said Brother Mole.
So Brother Mole, and Brother Squirrel, and Brother Frog, and
Brother Rabbit went to where Brother Fox was combing his brush
behind a bush, and they said to him:
“What shall we do, Brother Fox? Brother Bear will not leave
Brother Rabbit alone.”
“Let us go to Brother Bear,” said Brother Fox.
So they all went along with little Brother Rabbit, and they hunted
and hunted for old Bear, but they could not find him. They hunted
and hunted some more, and they peeped in a hollow tree. There lay
old Bear, fast asleep.
“Hush,” said Brother Fox.
Then he whispered to Brother Frog, “Bring a little mud.”
And he whispered to Brother Squirrel, “Bring some leaves.”
And he whispered to Brother Mole, “Bring some dirt, little brother.”
And to Brother Rabbit he said, “Stand ready to do what I tell you.”
So Brother Frog brought mud, Brother Squirrel brought leaves,
Brother Mole brought dirt, and Brother Rabbit stood ready.
Then Brother Fox said to Brother Rabbit, “Stop up the ends of
Brother Bear’s log.”
So Brother Rabbit took the mud and the leaves and the dirt, and
he stopped up the ends of the log. Then he hammered hard with his
two back feet, which are good for hammering. And they all went
home, for they thought that old Bear would never, never get out of
the log.
Well, old Bear slept and slept, but after a while he awoke, and he
opened one eye. He saw no sunshine, so he thought it was still
night, and he went to sleep again.
After another while, he awoke again, but he heard the rain and
sleet beating outside, and it was very warm and dry inside.
“What a very long night,” said old Bear, and he curled up his paws,
and he went to sleep again.
This time, he just slept, and slept, until it began to be very warm
inside the log, and he heard in his dreams the footsteps of birds
outside.
Then he awoke, and he stretched himself, and he shook himself.
He rubbed his eyes with his paws, and he poked away the mud, and
the leaves, and the dirt, and he went outside.
But was he not surprised?
It had been a frosty night when he had gone to sleep, and now the
woods were green. Old Bear had slept all winter.
“That was a fine, long sleep,” said old Bear, as he set out for little
Brother Rabbit’s house to see if he had anything good for breakfast;
“I shall sleep again, next fall.”
So every summer, old Bear plays tricks on little Brother Rabbit, but
when the fall comes, he creeps away to a warm, dark place to sleep
until spring.
And so have his grandchildren, and his great-grandchildren ever
since.
Transcriber’s Notes
pg 25 Changed: “The rice is too salt,”
to: “The rice is too salty,”
*** END OF THE PROJECT GUTENBERG EBOOK ONCE UPON A
TIME ANIMAL STORIES ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.