Professional Documents
Culture Documents
Textbook Future Data and Security Engineering First International Conference Fdse 2014 Ho Chi Minh City Vietnam November 19 21 2014 Proceedings 1St Edition Tran Khanh Dang Ebook All Chapter PDF
Textbook Future Data and Security Engineering First International Conference Fdse 2014 Ho Chi Minh City Vietnam November 19 21 2014 Proceedings 1St Edition Tran Khanh Dang Ebook All Chapter PDF
https://textbookfull.com/product/future-data-and-security-
engineering-5th-international-conference-fdse-2018-ho-chi-minh-
city-vietnam-november-28-30-2018-proceedings-tran-khanh-dang/
https://textbookfull.com/product/advanced-data-mining-and-
applications-10th-international-conference-adma-2014-guilin-
china-december-19-21-2014-proceedings-1st-edition-xudong-luo/
https://textbookfull.com/product/network-and-system-security-8th-
international-conference-nss-2014-xi-an-china-
october-15-17-2014-proceedings-1st-edition-man-ho-au/
https://textbookfull.com/product/combinatorial-optimization-and-
applications-8th-international-conference-cocoa-2014-wailea-maui-
hi-usa-december-19-21-2014-proceedings-1st-edition-zhao-zhang/
123
Lecture Notes in Computer Science 8860
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Switzerland
John C. Mitchell
Stanford University, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany
Tran Khanh Dang Roland Wagner
Erich Neuhold Makoto Takizawa
Josef Küng Nam Thoai (Eds.)
13
Volume Editors
Tran Khanh Dang
Nam Thoai
Ho Chi Minh City University of Technology
268 Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam
E-mail: {khanh, nam}@cse.hcmut.edu.vn
Roland Wagner
Josef Küng
Johannes Kepler University Linz
Altenberger Straße 69, 4040 Linz, Austria
E-mail: {rwagner, jkueng}@faw.jku.at
Erich Neuhold
University of Vienna
Währinger Straße 29, 1190 Wien, Austria
E-mail: erich.neuhold@univie.ac.at
Makoto Takizawa
Hosei University
3-7-2, Kajino-machi, Koganei-shi, Tokyo 184-8584, Japan
E-mail: makoto.takizawa@computer.org
in following accredited security and privacy practices. For instance, over the last
decade, the number of crimes that involve computers and the Internet has grown
at a rapid pace and the problem of scale will only escalate the cybercrime phe-
nomenon. Without doubt, the next generation of computing will depend highly
on the way large-scale cybercrimes are dealt with, both in developing appropri-
ate and efficient approaches to this problem and also on the amount of effort
we put into tackling this phenomenon. In this presentation, we discuss how the
investigators can store evidential data and conduct forensics analysis. We focus
on the data mining aspect for automatically pre-processing, analyzing the data,
and extracting evidence. This will involve redesigning the data mining process
to deal with forensic data that are noisy, dispersive, incomplete, and inconstant,
which are very challenging.”
In the second keynote speech, Professor Atsuko Miyaji discussed important
issues relevant to privacy-preserving in RFID applications. The main contents
of the speech are summarized as follows: “Wireless technologies are being devel-
oped rapidly to construct smart communications with digital data. Networked
devices automatically communicate among themselves in order to carry out effi-
cient information transaction. A radio-frequency identification (RFID) tag with
unique identification numbers uses radio waves to transmit data at a distance.
RFID is going to support new technologies such as the Internet of Things (IoT)
and Machine-to-Machine (M2M). The RFID system actuates various security
and privacy issues concerning its owners and holders without any knowledge of
users. Preventing unauthorized access to the owner data (confidentiality), tag
tracing (link-ability), identification of the owners (anonymity) are some neces-
sary privacy-protection issues of RFID systems. A supply chain management
(SCM) controls and manages all the materials and information in the logistics
process from acquisition of raw materials to product delivery to the end user. It
is crucial to construct protocols that enable the end user to verify the security
and privacy not only of the tags but also the path that the tag passes through,
which means path authentication. Path authentication is a further application
of RFID. In this talk, we summarize previous works to realize authentication
schemes, and then redefine a privacy notion of RFID. We present a new direc-
tion that enables the end user to verify the security and privacy not only of tags
but also paths that tags go through. More clearly, if a path-authenticated tag
reaches the end of its supply chain, then the path ensures that no intermediate
reader was omitted (or selected wrongly) by a tag, either deliberately or not.
This would yield not only convenience and efficiency of delivery but also quality
of product.”
The success of FDSE 2014 was the result of the efforts of many people, to
whom we would like to express our gratitude. First, we would like to thank all
authors who submitted papers to FDSE 2014, especially the two invited speak-
ers. We would also like to thank the members of the committees and external
reviewers for their timely reviewing and lively participation in the subsequent
Preface VII
General Chair
Roland Wagner Johannes Kepler University Linz, Austria
Steering Committee
Elisa Bertino Purdue University, USA
Kazuhiko Hamamoto Tokai University, Japan
Abdelkader Hameurlain Paul Sabatier University, Toulouse, France
Dieter Kranzlmueller Ludwig Maximilians University, Germany
Beng Chin Ooi National University of Singapore, Singapore
A. Min Tjoa Technical University of Vienna, Austria
Nam Thoai HCMC University of Technology, Vietnam
Publication Chair
Josef Küng Johannes Kepler University Linz, Austria
Publicity Chairs
Lam Son Le HCMC University of Technology, Vietnam
Quan Thanh Tho HCMC University of Technology, Vietnam
Hoang Tam Vo National University of Singapore, Singapore
Program Committee
Pedro Antunes Victoria University of Wellington, New Zealand
Stephane Bressan National University of Singapore, Singapore
Alain Bui University of Versailles Saint-Quentin-en-
Yvelines, France
Hyunseung Choo Sungkyunkwan University, South Korea
Somsak Choomchuay King Mongkut’s Institute of Technology
Ladkrabang, Thailand
Nguyen Tuan Dang University of Information Technology,
VNUHCM, Vietnam
Thanh-Nghi Do Can Tho University, Vietnam
Dirk Draheim University of Innsbruck, Austria
Phuong Hoai Ha University of Tromsø, Norway
Kazuhiko Hamamoto Tokai University, Japan
Yo-Sung Ho Gwangju Institute of Science and Technology,
Korea
Tran Van Hoai HCMC University of Technology, Vietnam
Nguyen Viet Hung University of Trento, Italy
Nguyen Quoc Viet Hung École polytechnique fédérale de
Lausanne, Switzerland
Tran Nguyen Hoang Huy University of Vienna, Austria
Trung-Hieu Huynh Industrial University of Ho Chi Minh City,
Vietnam
Ryutaro Ichise National Institute of Informatics, Japan
Tomohiko Igasaki Kumamoto University, Japan
Muhammad Ilyas University of Sargodha, Pakistan
Koichiro Ishibashi University of Electro-Communications, Japan
Hiroshi Ishii Tokai University, Japan
Eiji Kamioka Shibaura Institute of Technology, Japan
M-Tahar Kechadi University College Dublin, Ireland
Nhien An Le Khac University College Dublin, Ireland
Ismail Khalil Johannes Kepler University Linz, Austria
Khamphong Khongsomboon National University of Laos, Laos
Hiroaki Kikuchi Meiji University, Japan
Surin Kittitornkun King Mongkut’s Institute of Technology
Ladkrabang, Thailand
Andrea Ko Corvinus University of Budapest, Hungary
Hilda Kosorus Johannes Kepler University Linz, Austria
Pierre Kuonen Applied Science University, Fribourg,
Switzerland
Lam Son Le HCMC University of Technology, Vietnam
Tan Kian Lee National University of Singapore, Singapore
Fabio Massacci University of Trento, Italy
Organization XI
External Reviewers
Nguyen Ngoc Thien An University College Dublin, Ireland
Truong Quynh Chi HCMC University of Technology, Vietnam
Nguyen Van Doan Japan Advanced Institute of Science and
Technology, Japan
Truong Quang Hai HCMC University of Technology,
Vietnam
Ngo Chan Nam Data Security Applied Research Lab, HCMUT,
Vietnam
Tran Thi Que Nguyet HCMC University of Technology, Vietnam
Huynh Van Quoc Phuong Data Security Applied Research Lab, HCMUT,
Vietnam
Nguyen Dinh Thanh Data Security Applied Research Lab, HCMUT,
Vietnam
Nguyen Thi Ai Thao HCMC University of Technology, Vietnam
Le Thi Bao Thu HCMC University of Technology, Vietnam
Le Thi Kim Tuyen Sungkyunkwan University, South Korea
Table of Contents
1 Introduction
T.K. Dang et al. (Eds.): FDSE 2014, LNCS 8860, pp. 1–15, 2014.
c Springer International Publishing Switzerland 2014
2 H. Kosorus, P. Regner, and J. Küng
areas, are rarely used in enterprise content management (ECM) scenarios. Inno-
vative approaches for classification, retrieval and recommendation have barely
passed the evaluation or pilot status.
This paper aims at addressing current challenges in complex enterprise con-
tent scenarios and the research gaps within the field of “document enrichment,
retrieval and recommendation”, given a very large amount of unstructured and
semi-structured domain-specific textual documents (e.g., application forms and
documents, health care and medical documents, news articles, etc.). Additionally,
we present new ideas towards overcoming these challenges and limitations.
We introduce novel techniques and approaches in the application scenario of
efficient ECM within private and public organizations. We base our claims on
the review and analysis of the current state-of-the-art in the related research
fields, and on the discovered weaknesses and limitations of existing employed
methods.
The contribution of this paper is threefold: first, it gives on overview of the
most recent related work in the related fields of ontology learning, document en-
richment, retrieval and recommendation; secondly, it introduces innovative ideas
towards document enrichment, retrieval and recommendation; and, thirdly, it
presents the expected benefits and profit of the implementation and employ-
ment of these new techniques.
The main innovative idea of this paper is exploring, extracting and using var-
ious types of contextual information and sequences to enable a more accurate,
efficient and effective document retrieval and recommendation. We organize this
idea into three main research goals. Our first goal is to use multiple knowl-
edge bases (domain-specific ontologies, structured Web data, user groups and
networks, external structure of documents, document meta-data, etc.) to infer,
extract and enrich/annotate documents with two types of contextual informa-
tion: content-dependent and -independent. Secondly, we plan to use these doc-
ument annotations to perform relevant, meaningful document retrieval to user
queries. And thirdly, as our main objective, we aim at developing a personalized,
sequence-based recommendation of documents by using the history of document
access sequences and the previously generated annotations and knowledge bases.
The rest of the paper is organized in the following way. In the next sec-
tion, we give an overview of the most recent and relevant related work in the
field of ontology learning, document enrichment, retrieval and recommendation.
Then, in Section 3 we present in more detail the previously mentioned research
goals. Finally, in Section 4, we show the benefits and consequences of implement-
ing and adopting these ideas into real ECM systems.
In some cases, we intend to use the reviewed techniques and methods, in other
cases, we plan to improve and extend them to allow for better results, more
efficiency and effectiveness when working with ECM systems. In the following,
we will review some of the most recent and related findings in the aforementioned
research fields.
process. Existing evaluation approaches can be grouped into the following cate-
gories:
Some of the most prominent ontology learning systems are: ASIUM, Text-to-
Onto, TextStorm/Clouds, SYNDIKATE, OntoLearn, CRCTOL and OntoGain.
Recent challenges in the field of ontology learning techniques include the im-
provement of term extraction and concept formation and the relation discovery
tasks. Additionally, the learning of ontologies from social data and across dif-
ferent languages has also been a topic of interest in the past decade. To further
improve the performance of term extraction and relation discovery, recent re-
search work focused on constructing very large text corpora from the Web, as
well as on using (semi-)structured Web data (e.g. Wikipedia.) and social data.
However, the results obtained so far require further investigation.
The ever growing amount of available information gave rise to many different
challenges concerning storage, management and, especially, retrieval. Text re-
trieval is the process by which users seek to find documents relevant to the
subject of their query.
When searching for information, users usually describe their information need
using several keywords, which may happen to be different from the words used
in the actually relevant documents. Since language is inherently ambiguous and
since queries tend to be rather short, the returned results might lack documents
relevant to the user’s request. This problem is known as the vocabulary problem
[7] or the word mismatch problem. Therefore, the ineffectiveness of information
retrieval systems is mainly caused by the inaccuracy with which a query formed
by a few keywords models the actual user information need [5].
In order to improve the results of document retrieval and bridge the gap
between the user’s search intent and the document’s full-text, two main ap-
proaches were adopted: automatic query expansion (AQE) [5] and automatic
document annotation. Among these, we also mention here other methods: in-
teractive query refinement, relevance feedback, word sense disambiguation and
search results clustering. One of the most natural and successful technique was
the idea of query expansion. The idea behind query expansion is to expand the
query term issued by the user with suitable, related terms in order to match
the documents’ vocabulary. According to [10], query expansion leads to higher
recall, however, it decreases the retrieval precision. This is usually caused by the
fact that the context of the query is not known or the terms used in the query
On Context- and Sequence-Aware Document Enrichment 5
are rather conceptual and, therefore, the expansion of the query might still not
match the user’s search intent. An alternative solution to the vocabulary problem
is automatic document annotation or enrichment.
Document enrichment or annotation refers to the process of automatically ex-
panding documents with annotations using external knowledge bases. These an-
notations can vary from meta-data (e.g. author, time stamp of creation, location,
system information, etc.) to content-dependent information (e.g. topic, keywords,
concepts, etc.). The idea of document enrichment emerged from the need of re-
trieving relevant and meaningful documents to user queries.
Current research work in this area uses strictly the document’s content and
use some kind of external (semi-)structured data, such as Wikipedia [10] or other
knowledge bases to enrich documents and enable a more efficient and effective
retrieval.
finding new terms correlated with the original query terms [3,8,13,14]. In [3],
a new framework for query reformulation was introduced that uses multiple
information sources (a large web corpus, articles and titles from Wikipedia) for
weighting the explicit query concepts as well as selecting relevant and diverse
set of weighted expansion terms.
Although very successful and broadly adopted by many retrieval systems,
recent research work suggests that while AQE has a high recall, it lacks retrieval
precision [10].
A somewhat complementary technique to AQE is automatic document an-
notation and enrichment, which was described in more detail in the previous
section. The idea behind this approach is to bridge the gap between the user’s
query and the available documents by enriching the extracted document-terms
using external knowledge bases (e.g. taxonomies, ontologies, structured Web
data, etc.). Recent research results show that such methods can outperform
state-of-the-art query expansion and vector space model-based approaches [10].
Both techniques of query expansion and document enrichment require some
kind of matching method between the query terms and the document terms.
These can vary from simple set comparisons to more advanced semantic simi-
larity measures. An overview of state-of-the-art similarity measures is presented
in [11], where the authors also introduce a new short-text semantic similarity
measure.
Modeling query graphs from user activity logs has been widely adopted for
Web search engines to identify search intents and produce reliable, useful rec-
ommendations [1,16,19]. A more recent work [16] tries to leverage three types
of objects: queries, web pages and Wikipedia concepts collaboratively for learn-
ing generic search intents and constructs a heterogeneous graph to represent
multiple types of relationships between them.
3 Approach
Despite the very rich and vast amount of related work in these four fundamental re-
search fields, many challenges and open issues have been identified (see Section 2)
that require further investigation and new perspectives on the matter. Motivated
by this research gap and based on the previous work of the authors [11,12,15], we
introduce new concepts and ideas towards an improved document management
experience with enterprise content management (ECM) systems.
The aim of this work is to address these challenges in the restricted domain of
document enrichment, retrieval and recommendation in order to develop generic,
domain- and language-independent solutions that enable an improved and effi-
cient user work experience. Our proposed approach will use various external
knowledge bases and structured Web data sources to enrich the collection of
documents with two categories of context information: content-dependent (i.e.
semantic context) and content-independent (or external information), encom-
passing a wide spectrum of document context. In order to do this, we need
to (semi-)automatically construct domain-specific knowledge bases that match
the requirements and specifications of their individual, complex application area
(e.g. health care and medical documents, news archives, digital libraries, etc.).
Based on the two types of context information, we plan to develop innovative
document retrieval and recommendation approaches that allow users to access
fast and reliably only the relevant and useful documents. Moreover, we aim to
leverage not only the document annotations, but also the sequential data of
user activity log in order to make predictions about the user’s future informa-
tion needs. The history of the users’ sequential document access allows us to
collaboratively learn patterns and identify common search goals.
In order to (semi-)automatically construct the domain-specific knowledge
base, we intend to use state-of-the-art techniques and tools from the field of
ontology learning. However, we will focus our research towards improving spe-
cific tasks and addressing current challenges, like the discovery of non-taxonomic
relations, concept formation and axiom learning; defining and developing eval-
uation approaches to assess the resulting ontology and refine the learning pro-
cess. We want to address the knowledge acquisition bottleneck (i.e. acquiring
the knowledge necessary for learning ontologies) by using multiple sources of
structured Web data (e.g. Wikipedia) and the problem of coping with very large
document collections. Our aim is to learn ontologies through an iterative pro-
cess, moving from initial and lightweight to formal, heavyweight ontologies, while
continuously improving and extending with the growing database of documents.
8 H. Kosorus, P. Regner, and J. Küng
The learned ontologies will serve as a knowledge base for document enrich-
ment. While current approaches focus mainly on content-based annotations, our
goal is to enrich documents with both content-dependent and -independent infor-
mation by using multiple knowledge bases, with the aim to enable an improved
and efficient document retrieval experience. Additionally, existing methods to-
wards matching user queries to documents use rather simple, limited similarity
measures (Jaccard index [7], Dice’s coefficient) that are not enable to identify
complex or conceptual search requests and retrieve relevant results.
In order to address the vocabulary problem and improve the retrieval qual-
ity, we intend to develop a hybrid approach towards document retrieval that
combines both query expansion and document enrichment (content-dependent
and -independent annotations). Moreover, to enable a better matching between
queries and documents, innovative semantic similarity measures will be adopted
based on the learned ontologies. Our goal is to allow users to perform complex,
conceptual queries, while still maintaining a high retrieval quality.
While document retrieval answers to temporary information needs, in applica-
tion domains where users manage, maintain and request documents to perform
clear tasks over a longer period of time (e.g. maintaining a patient’s file case for
diagnosis, writing reports over previous related articles), identifying user goals
and predicting future search intents can play a crucial role in improving the
user’s work experience.
To address this important aspect, we direct our main focus towards the devel-
opment of innovative context-aware and personalized recommendation methods
that leverage the available history of user document access and the existing
document annotations, both content-dependent and -independent context infor-
mation.
Based on the above mentioned limitations and challenges, we formulate the
following research objectives:
1. advances in ontology learning,
2. content-dependent and -independent document enrichment,
3. context-aware document retrieval, and
4. context- and sequence-aware personalized document recommendation,
in the presence of:
– very large unstructured and semi-structured document collections,
– complex application domains,
– conceptual user queries, and
– sequential user activity data.
In the following, we will elaborate in detail on the above mentioned research
objectives and present our first ideas and approaches with respect to each of
them.
within the learning process. However, there are still certain challenges and lim-
itations that need to be addressed in order to allow automatic, heavyweight,
application-independent and cross-language ontologies to be developed. One of
our goals is to advance the current research in this field and address particular
limitations that will improve the performance of the next technical goals.
A detailed study of the state-of-the-art in ontology learning has revealed
several weaknesses and open issues (see Section 2.1). We intend to tackle and
improve the following aspects:
– The knowledge acquisition bottleneck by using (semi-)structured collabora-
tively maintained Web data resources (e.g. Wikipedia, DBPedia, Austrian
Social Security Law, organization-specific process instructions, etc.), an al-
ready existing initial large set of domain-specific documents and other tax-
onomies (WordNet, Wiktionary, OpenThesaurus, etc.);
– Data cleanliness – manage noise, richness, diversity and validity of the re-
sources used for ontology learning;
– Cross-language ontology learning – allow ontologies to be language-
independent;
– Cope with very large domain-specific document collections – these will not
only serve as a basis for the initial construction of the ontology, but also
during the entire process, at each iteration;
– Move from lightweight to formal ontologies through an iterative process –
extending the initial lightweight ontologies to a full-fledged ones;
– Improve ontology learning tasks:
• Term extraction,
• Concept formation,
• Taxonomic and non-taxonomic relation discovery, and
• Axiom learning.
Figure 1 shows the concept behind the role of the ontology learning and the
document enrichment tasks, and the interaction and dependency between their
constituent parts.
Based on these two types of contextual data, we formulate the following ob-
jectives:
– Content-dependent document enrichment – based on the constructed on-
tology, identify relevant and meaningful terms and concepts to annotate
documents with; and
– Content-independent document enrichment: system context, user groups and
networks, geographical context, structural context (possibly also based on
various knowledge-bases).
The idea behind this approach is that by using a rich document context
(both content-dependent and -independent) we will be able to cope with concep-
tual queries and significantly improve the retrieval and recommendation results.
Our aim is to help the users be more efficient in their tasks and answer their
information need by guiding them towards useful and relevant documents.
The first three objectives serve as a foundation for the achievement of the fourth
and main goal.
The above described new document retrieval approach addresses only tempo-
rary, momentary user information needs and it can be effective and efficient only
in particular situations (e.g. when the accomplishment of the user’s current task
requires a single successful query).
However, when users manage, maintain and request documents to perform a
related chain of tasks over a longer period of time (e.g. maintaining a patient’s file
case for diagnosis, writing reports over previous related articles, etc.), identifying
user goals and predicting future search intents can play a crucial role in improving
the user’s work experience.
Our fourth and the main technical objective is, therefore, to develop a person-
alized document recommendation approach that uses the rich document context
annotations (see objective B) and the user activity log (i.e. sequence of document
access). The aim of this approach is to
Figure 3 shows the concept behind the context- and sequence-aware person-
alized document recommendation approach and highlights the relevant compo-
nents of the overall system that enable the execution of this task.
References
1. Baeza-Yates, R.: Graphs from search engine queries. In: van Leeuwen, J., Italiano,
G.F., van der Hoek, W., Meinel, C., Sack, H., Plášil, F. (eds.) SOFSEM 2007.
LNCS, vol. 4362, pp. 1–8. Springer, Heidelberg (2007)
2. Baeza-Yates, R.A., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-
Wesley Longman Publishing Co., Inc., Boston (1999)
3. Bendersky, M., Metzler, D., Croft, W.B.: Effective query formulation with multiple
information sources. In: Proceedings of the Fifth ACM International Conference on
Web Search and Data Mining, WSDM 2012, pp. 443–452. ACM, New York (2012)
4. Burke, R.: Hybrid recommender systems: Survey and experiments. User Modeling
and User-Adapted Interaction 12(4), 331–370 (2002)
5. Carpineto, C., Romano, G.: A survey of automatic query expansion in information
retrieval. ACM Comput. Surv. 44(1), 1:1–1:50 (2012)
6. Chen, J., Chen, T., Guo, H., Yu, T., Wang, W.: Context-aware document rec-
ommendation by mining sequential access data. In: Proceedings of the 1st In-
ternational Workshop on Context Discovery and Data Mining, ContextDD 2012,
pp. 6:1–6:7. ACM, New York (2012)
7. Furnas, G.W., Landauer, T.K., Gomez, L.M., Dumais, S.T.: The vocabulary prob-
lem in human-system communication. Commun. ACM 30(11), 964–971 (1987)
8. Giunchiglia, F., Kharkevich, U., Zaihrayeu, I.: Concept search: Semantics enabled
syntactic search. In: Proceedings of the Workshop on Semantic Search (SemSearch
2008) at the 5th European Semantic Web Conference (ESWC 2008), pp. 109–123
(2008)
On Context- and Sequence-Aware Document Enrichment 15
Title: The Cornhill Magazine (vol. XLII, no. 251 new series, May
1917)
Author: Various
Language: English
STENCILLING
IN OIL COLOURS
Will not run or spoil delicate fabrics.
By Special Appointment to Their Majesties the King and Queen and H.M.
Queen Alexandra.
THE
CHURCH ARMY
HAS MANY HUNDREDS OF
RECREATION HUTS,
TENTS, AND CLUBS,
which are giving REST, COMFORT and RECREATION to men of
both the Services (all are welcomed), at home and on the Western
Front (many of them actually under the enemy’s shell-fire), at
ports and bases in France, in Malta, Egypt, Macedonia, East
Africa, Mesopotamia, and India. Light refreshments, games,
music, provision for drying clothing, baths, letter-writing, &c., &c.;
also facilities for Sunday and weekday services.
MORE ARE URGENTLY NEEDED,
especially in the devastated area captured from the enemy on the
West Front.
Huts cost £400; Tents £200;
Equipment £100; Maintenance
£5 abroad, £2 at home, weekly.
Cheques crossed ‘Barclay’s, a/c Church Army,’ payable to Prebendary Carlile,
D.D., Hon. Chief Secretary, Headquarters, Bryanston Street, Marble Arch,
London, W.1.
PAN YAN
THE WORLD’S BEST
PICKLE
It adds 50% to the value of your Meat Purchases.
On sale everywhere at Popular Prices.
Maconochie Bros., Ltd. London
THE
CORNHILL MAGAZINE.
MAY 1917.
BRING UP THE GUNS.
by boyd cable.
When Jack Duncan and Hugh Morrison suddenly had it brought
home to them that they ought to join the New Armies, they lost little
time in doing so. Since they were chums of long standing in a City
office, it went without saying that they decided to join and ‘go through
it’ together, but it was much more open to argument what branch of
the Service or regiment they should join.
They discussed the question in all its bearings, but being as
ignorant of the Army and its ways as the average young Englishman
was in the early days of the war, they had little evidence except
varied and contradictory hearsay to act upon. Both being about
twenty-five they were old enough and business-like enough to
consider the matter in a business-like way, and yet both were young
enough to be influenced by the flavour of romance they found in a
picture they came across at the time. It was entitled ‘Bring up the
Guns,’ and it showed a horsed battery in the wild whirl of advancing
into action, the horses straining and stretching in front of the
bounding guns, the drivers crouched forward or sitting up plying whip
and spur, the officers galloping and waving the men on, dust swirling
from leaping hoofs and wheels, whip-thongs streaming, heads
tossing, reins flying loose, altogether a blood-stirring picture of
energy and action, speed and power.
‘I’ve always had a notion,’ said Duncan reflectively, ‘that I’d like to
have a good whack at riding. One doesn’t get much chance of it in
city life, and this looks like a good chance.’
‘And I’ve heard it said,’ agreed Morrison, ‘that a fellow with any
education stands about the best chance in artillery work. We’d might
as well plump for something where we can use the bit of brains
we’ve got.’
‘That applies to the Engineers too, doesn’t it?’ said Duncan. ‘And
the pottering about we did for a time with electricity might help there.’
‘Um-m,’ Morrison agreed doubtfully, still with an appreciative eye
on the picture of the flying guns. ‘Rather slow work though—digging
and telegraph and pontoon and that sort of thing.’
‘Right-oh,’ said Duncan with sudden decision. ‘Let’s try for the
Artillery.’
‘Yes. We’ll call that settled,’ said Morrison; and both stood a few
minutes looking with a new interest at the picture, already with a
dawning sense that they ‘belonged,’ that these gallant gunners and
leaping teams were ‘Ours,’ looking forward with a little quickening of
the pulse to the day when they, too, would go whirling into action in
like desperate and heart-stirring fashion.
‘Come on,’ said Morrison. ‘Let’s get it over. To the recruiting-office
—quick march.’
And so came two more gunners into the Royal Regiment.
Rudyard Kipling.
II.
To make that fellowship apparent, at a glance, at least from certain
points of view, I have devised the appended diagram. There you see
represented, as it were, the streams of the history of our two nations
from their farthest origins down to our own times. Please note the
scale of centuries. See both streams rising about eight or six
centuries before Christ in the same mountain—if I may say so
figuratively—in the same mountain of the Celtic race. They spring, as
you see, from the same source, and, though geographically divided,
their waters remain a long time of the same colour—green in my
draught.