You are on page 1of 53

Intelligent Information and Database

Systems: Recent Developments Maciej


Huk
Visit to download the full and correct content document:
https://textbookfull.com/product/intelligent-information-and-database-systems-recent-
developments-maciej-huk/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Recent Developments in Data Science and Intelligent


Analysis of Information Oleg Chertov

https://textbookfull.com/product/recent-developments-in-data-
science-and-intelligent-analysis-of-information-oleg-chertov/

Recent Developments on Industrial Control Systems


Resilience Emil Pricop

https://textbookfull.com/product/recent-developments-on-
industrial-control-systems-resilience-emil-pricop/

Recent Contributions in Intelligent Systems 1st Edition


Vassil Sgurev

https://textbookfull.com/product/recent-contributions-in-
intelligent-systems-1st-edition-vassil-sgurev/

Intelligent Information and Database Systems 11th Asian


Conference ACIIDS 2019 Yogyakarta Indonesia April 8 11
2019 Proceedings Part I Ngoc Thanh Nguyen

https://textbookfull.com/product/intelligent-information-and-
database-systems-11th-asian-conference-aciids-2019-yogyakarta-
indonesia-april-8-11-2019-proceedings-part-i-ngoc-thanh-nguyen/
Intelligent Information and Database Systems 11th Asian
Conference ACIIDS 2019 Yogyakarta Indonesia April 8 11
2019 Proceedings Part II Ngoc Thanh Nguyen

https://textbookfull.com/product/intelligent-information-and-
database-systems-11th-asian-conference-aciids-2019-yogyakarta-
indonesia-april-8-11-2019-proceedings-part-ii-ngoc-thanh-nguyen/

Recent Developments in Mechatronics and Intelligent


Robotics: Proceedings of the International Conference
on Mechatronics and Intelligent Robotics (ICMIR2017) -
Volume 1 1st Edition Feng Qiao
https://textbookfull.com/product/recent-developments-in-
mechatronics-and-intelligent-robotics-proceedings-of-the-
international-conference-on-mechatronics-and-intelligent-
robotics-icmir2017-volume-1-1st-edition-feng-qiao/

Recent Developments in Mechatronics and Intelligent


Robotics: Proceedings of the International Conference
on Mechatronics and Intelligent Robotics (ICMIR2017) –
Volume 2 1st Edition Feng Qiao
https://textbookfull.com/product/recent-developments-in-
mechatronics-and-intelligent-robotics-proceedings-of-the-
international-conference-on-mechatronics-and-intelligent-
robotics-icmir2017-volume-2-1st-edition-feng-qiao/

Intelligent Information and Database Systems: 9th Asian


Conference, ACIIDS 2017, Kanazawa, Japan, April 3–5,
2017, Proceedings, Part II 1st Edition Ngoc Thanh
Nguyen
https://textbookfull.com/product/intelligent-information-and-
database-systems-9th-asian-conference-aciids-2017-kanazawa-japan-
april-3-5-2017-proceedings-part-ii-1st-edition-ngoc-thanh-nguyen/

Intelligent Information and Database Systems: 9th Asian


Conference, ACIIDS 2017, Kanazawa, Japan, April 3-5,
2017, Proceedings, Part I 1st Edition Ngoc Thanh Nguyen

https://textbookfull.com/product/intelligent-information-and-
database-systems-9th-asian-conference-aciids-2017-kanazawa-japan-
april-3-5-2017-proceedings-part-i-1st-edition-ngoc-thanh-nguyen/
Studies in Computational Intelligence 830

Maciej Huk
Marcin Maleszka
Edward Szczerbicki Editors

Intelligent
Information
and Database
Systems: Recent
Developments
Studies in Computational Intelligence

Volume 830

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Studies in Computational Intelligence” (SCI) publishes new develop-
ments and advances in the various areas of computational intelligence—quickly and
with a high quality. The intent is to cover the theory, applications, and design
methods of computational intelligence, as embedded in the fields of engineering,
computer science, physics and life sciences, as well as the methodologies behind
them. The series contains monographs, lecture notes and edited volumes in
computational intelligence spanning the areas of neural networks, connectionist
systems, genetic algorithms, evolutionary computation, artificial intelligence,
cellular automata, self-organizing systems, soft computing, fuzzy systems, and
hybrid intelligent systems. Of particular value to both the contributors and the
readership are the short publication timeframe and the world-wide distribution,
which enable both wide and rapid dissemination of research output.
The books of this series are submitted to indexing to Web of Science,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink.

More information about this series at http://www.springer.com/series/7092


Maciej Huk Marcin Maleszka
• •

Edward Szczerbicki
Editors

Intelligent Information
and Database Systems:
Recent Developments

123
Editors
Maciej Huk Marcin Maleszka
Department of Information Systems Department of Information Systems
Wrocław University of Science and Wrocław University of Science and
Technology Technology
Wrocław, Poland Wrocław, Poland

Edward Szczerbicki
Department of Management
Gdańsk University of Technology
Gdańsk, Poland

ISSN 1860-949X ISSN 1860-9503 (electronic)


Studies in Computational Intelligence
ISBN 978-3-030-14131-8 ISBN 978-3-030-14132-5 (eBook)
https://doi.org/10.1007/978-3-030-14132-5

Library of Congress Control Number: 2019932697

© Springer Nature Switzerland AG 2020


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Program Committee

Ajith Abraham, Machine Intelligence Research Labs, USA


Muhammad Abulaish, South Asian University, India
Andy Adamatzky, University of the West of England, UK
Waseem Ahmad, Waiariki Institute of Technology, New Zealand
Bashar Al-Shboul, University of Jordan, Jordan
Lionel Amodeo, University of Technology of Troyes, France
Toni Anwar, Universiti Teknologi Malaysia, Malaysia
Tsuyoshi Arai, Okayama Prefectural University, Japan
Taha Arbaoui, University of Technology of Troyes, France
Ahmad Taher Azar, Benha University, Egypt
Thomas Bäck, Leiden University, The Netherlands
Amelia Badica, University of Craiova, Romania
Costin Badica, University of Craiova, Romania
Kambiz Badie, ICT Research Institute, Iran
Zbigniew Banaszak, Warsaw University of Technology, Poland
Dariusz Barbucha, Gdynia Maritime University, Poland
Ramazan Bayindir, Gazi University, Turkey
Juri Belikov, Tallinn University of Technology, Estonia
Maumita Bhattacharya, Charles Sturt University, Australia
Leon Bobrowski, Białystok University of Technology, Poland
Bülent Bolat, Yildiz Technical University, Turkey
Veera Boonjing, King Mongkut’s Institute of Technology Ladkrabang, Thailand
Mariusz Boryczka, University of Silesia, Poland
Urszula Boryczka, University of Silesia, Poland
Zouhaier Brahmia, University of Sfax, Tunisia
Stephane Bressan, National University of Singapore
Peter Brida, University of Zilina, Slovakia
Andrej Brodnik, University of Ljubljana, Slovenia
Grażyna Brzykcy, Poznań University of Technology, Poland
Robert Burduk, Wrocław University of Science and Technology, Poland
Aleksander Byrski, AGH University of Science and Technology, Poland

v
vi Program Committee

David Camacho, Universidad Autonoma de Madrid, Spain


Tru Cao, Ho Chi Minh City University of Technology, Vietnam
Frantisek Capkovic, Institute of Informatics, Slovak Academy of Sciences,
Slovakia
Oscar Castillo, Tijuana Institute of Technology, Mexico
Dariusz Ceglarek, Poznań High School of Banking, Poland
Zenon Chaczko, University of Technology, Sydney
Goutam Chakraborty, Iwate Prefectural University, Japan
Somchai Chatvichienchai, University of Nagasaki, Japan
Chun-Hao Chen, Tamkang University, Taiwan
Rung-Ching Chen, Chaoyang University of Technology, Taiwan
Shyi-Ming Chen, National Taiwan University of Science and Technology
Suphamit Chittayasothorn, King Mongkut’s Institute of Technology Ladkrabang,
Thailand
Sung-Bae Cho, Yonsei University, South Korea
Kazimierz Choroś, Wrocław University of Science and Technology, Poland
Kun-Ta Chuang, National Cheng Kung University, Taiwan
Dorian Cojocaru, University of Craiova, Romania
Jose Alfredo Ferreira Costa, Federal University of Rio Grande do Norte (UFRN),
Brazil
Ireneusz Czarnowski, Gdynia Maritime University, Poland
Theophile Dagba, University of Abomey-Calavi, Benin
Quang A. Dang, Vietnam Academy of Science and Technology, Vietnam
Tien V. Do, Budapest University of Technology and Economics, Hungary
Grzegorz Dobrowolski, AGH University of Science and Technology, Poland
Habiba Drias, University of Science and Technology Houari Boumediene, Algeria
Maciej Drwal, Wrocław University of Science and Technology, Poland
Ewa Dudek-Dyduch, AGH University of Science and Technology, Poland
El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, Saudi
Arabia
Keiichi Endo, Ehime University, Japan
Sebastian Ernst, AGH University of Science and Technology, Poland
Nadia Essoussi, University of Carthage, Tunisia
Rim Faiz, University of Carthage, Tunisia
Simon Fong, University of Macau, Macao
Dariusz Frejlichowski, West Pomeranian University of Technology, Szczecin,
Poland
Takuya Fujihashi, Ehime University, Japan
Hamido Fujita, Iwate Prefectural University, Japan
Mohamed Gaber, Birmingham City University, UK
Ford Lumban Gaol, BINUS University, Indonesia
Dariusz Gąsior, Wrocław University of Science and Technology, Poland
Janusz Getta, University of Wollongong, Australia
Daniela Gifu, University Alexandru Ioan Cuza of Iasi, Romania
Dejan Gjorgjevikj, Ss. Cyril and Methodius University in Skopje, Macedonia
Program Committee vii

Barbara Gładysz, Wrocław University of Science and Technology, Poland


Daniela Godoy, ISISTAN Research Institute, Argentina
Ong Sing Goh, Universiti Teknikal Malaysia Melaka, Malaysia
Antonio Gonzalez-Pardo, Universidad Autonoma de Madrid, Spain
Yuichi Goto, Saitama University, Japan
Manuel Grana, University of Basque Country, Spain
Janis Grundspenkis, Riga Technical University, Latvia
Jeonghwan Gwak, Seoul National University, South Korea
Quang-Thuy Ha, VNU-University of Engineering and Technology, Vietnam
Dawit Haile, Addis Ababa University, Ethiopia
Pei-Yi Hao, National Kaohsiung University of Applied Sciences, Taiwan
Marcin Hernes, Wrocław University of Economics, Poland
Francisco Herrera, University of Granada, Spain
Kouichi Hirata, Kyushu Institute of Technology, Japan
Bogumiła Hnatkowska, Wrocław University of Science and Technology, Poland
Huu Hanh Hoang, Hue University, Vietnam
Quang Hoang, Hue University of Sciences, Vietnam
Van-Dung Hoang, Quang Binh University, Vietnam
Jaakko Hollmén, Aalto University, Finland
Tzung-Pei Hong, National Univesity of Kaohsiung, Taiwan
Mong-Fong Horng, National Kaohsiung University of Applied Sciences, Taiwan
Jen-Wei Huang, National Cheng Kung University, Taiwan
Yung-Fa Huang, Chaoyang University of Technology, Taiwan
Maciej Huk, Wrocław University of Science and Technology, Poland
Zbigniew Huzar, Wrocław University of Science and Technology, Poland
Dosam Hwang, Yeungnam University, South Korea
Roliana Ibrahim, Universiti Teknologi Malaysia, Malaysia
Dmitry Ignatov, National Research University Higher School of Economics, Russia
Lazaros Iliadis, Democritus University of Thrace, Greece
Hazra Imran, University of British Columbia, Canada
Agnieszka Indyka-Piasecka, Wrocław University of Science and Technology,
Poland
Mirjana Ivanovic, University of Novi Sad, Serbia
Sanjay Jain, National University of Singapore, Singapore
Jarosław Jankowski, West Pomeranian University of Technology, Szczecin, Poland
Joanna Jędrzejowicz, University of Gdańsk, Poland
Piotr Jędrzejowicz, Gdynia Maritime University, Poland
Janusz Jeżewski, Institute of Medical Technology and Equipment ITAM, Poland
Geun Sik Jo, Inha University, South Korea
Kang-Hyun Jo, University of Ulsan, South Korea
Jason Jung, Chung-Ang University, South Korea
Przemysław Juszczuk, University of Economics in Katowice, Poland
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Poland
Tomasz Kajdanowicz, Wrocław University of Science and Technology, Poland
Nadjet Kamel, University Ferhat Abbes Setif1, Algeria
viii Program Committee

Hyun-Deok Kang, Ulsan National Institute of Science and Technology, South


Korea
Mehmet Karaata, Kuwait University, Kuwait
Nikola Kasabov, Auckland University of Technology, New Zealand
Arkadiusz Kawa, Poznań University of Economics and Business, Poland
Rafał Kern, Wrocław University of Science and Technology, Poland
Zaheer Khan, University of the West of England, UK
Manish Khare, Dhirubhai Ambani Institute of Information and Communication
Technology, India
Chonggun Kim, Yeungnam University, South Korea
Marek Kisiel-Dorohinicki, AGH University of Science and Technology, Poland
Attila Kiss, Eötvös Loránd University, Hungary
Jerzy Klamka, Silesian University of Technology, Poland
Goran Klepac, Raiffeisen Bank, Croatia
Shinya Kobayashi, Ehime University, Japan
Marek Kopel, Wrocław University of Science and Technology, Poland
Raymondus Kosala, BINUS University, Indonesia
Leszek Koszałka, Wrocław University of Science and Technology, Poland
Leszek Kotulski, AGH University of Science and Technology, Poland
Martin Kotyrba, University of Ostrava, Czech Republic
Jan Kozak, University of Economics in Katowice, Poland
Adrianna Kozierkiewicz, Wrocław University of Science and Technology, Poland
Bartosz Krawczyk, Virginia Commonwealth University, USA
Ondrej Krejcar, University of Hradec Kralove, Czech Republic
Dalia Kriksciuniene, Vilnius University, Lithuania
Dariusz Król, Wrocław University of Science and Technology, Poland
Marek Krótkiewicz, Wrocław University of Science and Technology, Poland
Marzena Kryszkiewicz, Warsaw University of Technology, Poland
Adam Krzyzak, Concordia University, Canada
Jan Kubíček, VSB—Technical University of Ostrava, Czech Republic
Tetsuji Kuboyama, Gakushuin University, Japan
Elżbieta Kukla, Wrocław University of Science and Technology, Poland
Julita Kulbacka, Wrocław Medical University, Poland
Marek Kulbacki, Polish-Japanese Academy of Information Technology, Poland
Kazuhiro Kuwabara, Ritsumeikan University, Japan
Halina Kwaśnicka, Wrocław University of Science and Technology, Poland
Annabel Latham, Manchester Metropolitan University, UK
Bac Le, University of Science, VNU-HCM, Vietnam
Hoai An Le Thi, University of Lorraine, France
Yue-Shi Lee, Ming Chuan University, Taiwan
Florin Leon, Gheorghe Asachi Technical University of Iasi, Romania
Horst Lichter, RWTH Aachen University, Germany
Kuo-Sui Lin, Aletheia University, Taiwan
Igor Litvinchev, Nuevo Leon State University, Mexico
Rey-Long Liu, Tzu Chi University, Taiwan
Program Committee ix

Doina Logofătu, Frankfurt University of Applied Sciences, Germany


Edwin Lughofer, Johannes Kepler University Linz, Austria
Lech Madeyski, Wrocław University of Science and Technology, Poland
Bernadetta Maleszka, Wrocław University of Science and Technology, Poland
Marcin Maleszka, Wrocław University of Science and Technology, Poland
Petra Maresova, University of Hradec Kralove, Czech Republic
Urszula Markowska-Kaczmar, Wrocław University of Science and Technology,
Poland
Mustafa Mat Deris, Universiti Tun Hussein Onn Malaysia, Malaysia
Takashi Matsuhisa, Karelia Research Centre, Russian Academy of Science, Russia
Tamás Matuszka, Eötvös Loránd University, Hungary
João Mendes-Moreira, University of Porto, Portugal
Mercedes Merayo, Universidad Complutense de Madrid, Spain
Jacek Mercik, WSB University in Wrocław, Poland
Radosław Michalski, Wrocław University of Science and Technology, Poland
Peter Mikulecky, University of Hradec Kralove, Czech Republic
Marek Miłosz, Lublin University of Technology, Poland
Kazuo Misue, University of Tsukuba, Japan
Jolanta Mizera-Pietraszko, Opole University, Poland
Leo Mrsic, IN2data Ltd Data Science Company, Croatia
Agnieszka Mykowiecka, Institute of Computer Science, Polish Academy of
Sciences, Poland
Paweł Myszkowski, Wrocław University of Science and Technology, Poland
Saeid Nahavandi, Deakin University, Australia
Kazumi Nakamatsu, University of Hyogo, Japan
Grzegorz J. Nalepa, AGH University of Science and Technology, Poland
Mahyuddin K. M. Nasution, Universitas Sumatera Utara, Indonesia
Richi Nayak, Queensland University of Technology, Australia
Fulufhelo Nelwamondo, Council for Scientific and Industrial Research, South
Africa
Huu-Tuan Nguyen, Vietnam Maritime University, Vietnam
Le Minh Nguyen, Japan Advanced Institute of Science and Technology, Japan
Loan T. T. Nguyen, Nguyen Tat Thanh University, Vietnam
Ngoc-Thanh Nguyen, Wrocław University of Science and Technology, Poland
Quang-Vu Nguyen, Korea-Vietnam Friendship Information Technology College,
Vietnam
Thai-Nghe Nguyen, Can Tho University, Vietnam
Van Du Nguyen, Wrocław University of Science and Technology, Poland
Yusuke Nojima, Osaka Prefecture University, Japan
Jerzy Nowacki, Polish-Japanese Academy of Information Technology, Poland
Agnieszka Nowak-Brzezińska, University of Silesia, Poland
Mariusz Nowostawski, Norwegian University of Science and Technology
Alberto Núñez, Universidad Complutense de Madrid, Spain
Manuel Núñez, Universidad Complutense de Madrid, Spain
Richard Jayadi Oentaryo, Singapore Management University, Singapore
x Program Committee

Kouzou Ohara, Aoyama Gakuin University, Japan


Tarkko Oksala, Aalto University, Finland
Shingo Otsuka, Kanagawa Institute of Technology, Japan
Marcin Paprzycki, Systems Research Institute, Polish Academy of Sciences, Poland
Rafael Parpinelli, Santa Catarina State University (UDESC), Brazil
Danilo Pelusi, University of Teramo, Italy
Marek Penhaker, VSB—Technical University of Ostrava, Czech Republic
Hoang Pham, Rutgers University, USA
Maciej Piasecki, Wrocław University of Science and Technology, Poland
Bartłomiej Pierański, Poznań University of Economics and Business, Poland
Dariusz Pierzchała, Military University of Technology, Poland
Marcin Pietranik, Wrocław University of Science and Technology, Poland
Elias Pimenidis, University of the West of England, UK
Jaroslav Pokorný, Charles University in Prague, Czech Republic
Nikolaos Polatidis, University of Brighton, UK
Elvira Popescu, University of Craiova, Romania
Piotr Porwik, University of Silesia, Poland
Radu-Emil Precup, Politehnica University of Timisoara, Romania
Andrzej Przybyszewski, Polish-Japanese Academy of Information Technology,
Poland
Małgorzata Przybyła-Kasperek, University of Silesia, Poland
Paulo Quaresma, Universidade de Evora, Portugal
Ngoc Quoc Ly, Ho Chi Minh City University of Science, Vietnam
David Ramsey, Wrocław University of Science and Technology, Poland
Mohammad Rashedur Rahman, North South University, Bangladesh
Ewa Ratajczak-Ropel, Gdynia Maritime University, Poland
Leszek Rutkowski, Częstochowa University of Technology, Poland
Tomasz M. Rutkowski, University of Tokyo, Japan
Henryk Rybiński, Warsaw University of Technology, Poland
Alexander Ryjov, Lomonosov Moscow State University, Russia
Keun Ho Ryu, Chungbuk National University, South Korea
Virgilijus Sakalauskas, Vilnius University, Lithuania
Daniel Sanchez, University of Granada, Spain
Rafał Scherer, Częstochowa University of Technology, Poland
Juergen Schmidhuber, Swiss AI Lab IDSIA, Switzerland
Jakub Segen, Polish-Japanese Academy of Information Technology, Poland
Ali Selamat, Universiti Teknologi Malaysia, Malaysia
S. M. N. Arosha Senanayake, Universiti Brunei Darussalam, Brunei Darussalam
Tegjyot Singh Sethi, University of Louisville, USA
Andrzej Siemiński, Wrocław University of Science and Technology, Poland
Dragan Simic, University of Novi Sad, Serbia
Paweł Sitek, Kielce University of Technology, Poland
Krzysztof Ślot, Łódź University of Technology, Poland
Adam Słowik, Koszalin University of Technology, Poland
Vladimir Sobeslav, University of Hradec Kralove, Czech Republic
Program Committee xi

Kulwadee Somboonviwat, Kasetsart University, Thailand


Kamran Soomro, University of the West of England, UK
Zenon A. Sosnowski, Białystok University of Technology, Poland
Bela Stantic, Griffith University, Australia
Stanimir Stoyanov, University of Plovdiv “Paisii Hilendarski”, Bulgaria
Ja-Hwung Su, Cheng Shiu University, Taiwan
Libuse Svobodova, University of Hradec Kralove, Czech Republic
Jerzy Świątek, Wrocław University of Science and Technology, Poland
Andrzej Świerniak, Silesian University of Technology, Poland
Tadeusz Szuba, AGH University of Science and Technology, Poland
Julian Szymański, Gdańsk University of Technology, Poland
Ryszard Tadeusiewicz, AGH University of Science and Technology, Poland
Yasufumi Takama, Tokyo Metropolitan University, Japan
Maryam Tayefeh Mahmoudi, ICT Research Institute, Iran
Zbigniew Telec, Wrocław University of Science and Technology, Poland
Aleksei Tepljakov, Tallinn University of Technology, Estonia
Dilhan Thilakarathne, Vrije Universiteit Amsterdam, Netherlands
Satoshi Tojo, Japan Advanced Institute of Science and Technology, Japan
Krzysztof Tokarz, Silesian University of Technology, Poland
Bogdan Trawiński, Wrocław University of Science and Technology, Poland
Krzysztof Trojanowski, Cardinal Stefan Wyszyński University in Warsaw, Poland
Ualsher Tukeyev, Al-Farabi Kazakh National University, Kazakhstan
Aysegul Ucar, Firat University, Turkey
Olgierd Unold, Wrocław University of Science and Technology, Poland
Joost Vennekens, Katholieke Universiteit Leuven, Belgium
Jørgen Villadsen, Technical University of Denmark, Denmark
Bay Vo, Ho Chi Minh City University of Technology, Vietnam
Eva Volna, University of Ostrava, Czech Republic
Wahyono, Universitas Gadjah Mada, Indonesia
Lipo Wang, Nanyang Technological University, Singapore
Junzo Watada, Waseda University, Japan
Konrad Wojciechowski, Silesian University of Technology, Poland
Krystian Wojtkiewicz, Wrocław University of Science and Technology, Poland
Krzysztof Wróbel, University of Silesia, Poland
Marian Wysocki, Rzeszow University of Technology, Poland
Farouk Yalaoui, University of Technology of Troyes, France
Xin-She Yang, Middlesex University, UK
Tulay Yildirim, Yildiz Technical University, Turkey
Piotr Zabawa, Cracow University of Technology, Poland
Sławomir Zadrożny, Systems Research Institute, Polish Academy of Sciences,
Poland
Drago Žagar, University of Osijek, Croatia
Danuta Zakrzewska, Łódź University of Technology, Poland
Constantin-Bala Zamfirescu, Lucian Blaga University of Sibiu, Romania
Katerina Zdravkova, Ss. Cyril and Methodius University in Skopje, Macedonia
xii Program Committee

Vesna Zeljkovic, Lincoln University, UK


Aleksander Zgrzywa, Wrocław University of Science and Technology, Poland
Qiang Zhang, Dalian University, China
Maciej Zięba, Wrocław University of Science and Technology, Poland
Adam Ziębiński, Silesian University of Technology, Poland
Beata Zielosko, University of Silesia, Poland
Marta Zorrilla, University of Cantabria, Spain
Preface

The ongoing integration of various intelligent information, database systems and


technologies—including artificial intelligence, social media, multimedia, cloud
computing, and big data processing—leads to important synergy of those fields. It
results in new practical solutions and applications as well as broadens the scope
of theoretical analyses and approaches. But it also creates previously not considered
concerns and problems, related not only to the scale but also to new functionalities
of created methods and systems. This includes such issues as reliability and
long-term integrity of critical applications, energy efficiency of big data storage,
processing, organization, and quality assurance during the development of very
complex systems. Continuous research in the fields of intelligent information and
database systems provides an opportunity to identify and address those problems by
suggesting and creating further solutions and technologies.
The main goal of this book is to present and intensify practical application of
current knowledge and state of the art emerging in the field of intelligent infor-
mation and database systems. Thus, it includes a set of carefully selected research
papers presenting new methods, technologies and applications. The represented
scope of topics encompasses a wide spectrum of research subjects discussed both
from the theoretical and practical points of view. The book covers such fundamental
aspects of intelligent information and database systems as artificial and computa-
tional intelligence, nature-inspired algorithms and paradigms, collective knowledge
and ontologies, computer vision techniques, and multi-dimensional large-scale data
processing. At the same time, it presents a number of interdisciplinary topics
including social networks, system security, cloud computing, Internet of things,
business intelligence, and biomedical data analysis.
This volume in the well-established “Studies in Computational Intelligence”
series can be a valuable source of knowledge about current problems and solutions
in the field. It contains a selection of 34 chapters based on original research pre-
sented as posters during the Asian Conference on Intelligent Information and
Database Systems (ACIIDS 2019) held on 8–11 April 2019 in Yogyakarta,
Indonesia. This eleventh edition of the ACIIDS conference was organized by the

xiii
xiv Preface

Wrocław University of Science and Technology, Poland, together with BINUS


University, Indonesia, and their partners.
The book will be a useful resource and reference for researchers and practi-
tioners interested in increasing synergy between artificial intelligence and database
technologies as well as for graduate and Ph.D. students in computer science and
related fields.
Finally, on behalf of the Steering Committee, Program Committee and
Organizing Committee of the ACIIDS 2019 we would like to thank all the authors
for sharing their research during the conference. We also extend our thanks to all
reviewers for their time, engagement, and expertise. And special gratitude we
express to Prof. Janusz Kacprzyk, the editor of this series, and Dr. Thomas
Ditzinger from Springer for their interest and support for our project. The help of
those people was invaluable in the preparation of this book.

Yogyakarta, Indonesia Maciej Huk


April 2019 Marcin Maleszka
Edward Szczerbicki
Contents

Part I Sensor Clouds and Internet of Things


Proposing Smart Disaster Management in Urban Area . . . . . . . . . . . . 3
Dyah Wahyu Sukmaningsih, Wayan Suparta, Agung Trisetyarso,
Bahtiar Saleh Abbas and Chul Ho Kang
Ubiquitous Rehabilitation Combining Inertial Measurement System
with Smartphone and Supported by Visual and Voice Feedback . . . . . 17
Bartłomiej Pędrys, Henryk Josiński and Konrad Wojciechowski
Decision Making Based on IoT Data Collection for Precision
Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Christine Dewi and Rung-Ching Chen
Meeting Smart City Latency Demands with SDN . . . . . . . . . . . . . . . . 43
Filip Holik
Speech Activity Detection for Deaf People: Evaluation
on the Developed Smart Solution Prototype . . . . . . . . . . . . . . . . . . . . . 55
Ales Berger and Filip Maly
Mobile Application Framework for IobT Hydrogen Skin
Moisturizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Bilguun Jargalsaikhan, Ki Yong Kim, Erdenebileg Batbaatar,
Kwang Ho Park, Pham Van Huy, Jong Yun Lee and Keun Ho Ryu
Measurement of Usability for Speech Recognition on Ok Google . . . . . 83
Emny Harna Yossy, Wayan Suparta, Agung Trisetyarso,
Bahtiar Saleh Abbas and Chul Ho Kang

Part II Machine Learning and Decision Support Systems


The Data Dimensionality Reduction and Features Weighting in the
Classification Process Using Forest Optimization Algorithm . . . . . . . . 97
Daniel Kostrzewa and Robert Brzeski

xv
xvi Contents

Recent Developments on Evolutionary Computation Techniques


to Feature Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Idheba Mohamad Ali O. Swesi and Azuraliza Abu Bakar
Semantic Web Languages: Expressivity of SWL . . . . . . . . . . . . . . . . . 123
Martin Žáček, Alena Lukasová, Marek Vajgl and Zdeňka Telnarová
Application of Distance Measurement NLP Methods for Address
and Location Matching in Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Leo Mrsic
An Investigation of Information Granulation Techniques
in Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Sani Suleiman Isah, Ali Selamat, Roliana Ibrahim and Ondrej Krejcar
Convolutional Neural Network for Satellite Image Classification . . . . . 165
Mohammed Abbas Kadhim and Mohammed Hamzah Abed
A Survey of Tacit Knowledge in Community Learning
Based on Measurement Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Winanti, Ford L. Gaol, Raymond Kosala, Suhono Harso Supangkat
and Benny Ranti
Land Cover Classification Based on Sentinel-2 Satellite Imagery
Using Convolutional Neural Network Model: A Case Study
in Semarang Area, Indonesia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Yaya Heryadi and Eka Miranda

Part III Computer Vision Techniques and Applications


Using the Game Engine in the Animation Production Process . . . . . . . 209
Artur Bąk and Marzena Wojciechowska
Visual Keyboards or QR Codes in an Inclusive School
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Vojtěch Gybas, Libor Klubal and Kateřina Kostolányová
Human Identification Based on Shallow Learning Using Facial
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Van-Dung Hoang, Cong-Hieu Le and The-Anh Pham
Steganography and Cryptography for User Data in Calendars . . . . . . 241
Péter Vörös, Péter Hudoba and Attila Kiss

Part IV Intelligent Systems in Biomedicine


Modeling and Extraction of Retinal Blood Vessels from RetCam
3 Based on Morphological Segmentation . . . . . . . . . . . . . . . . . . . . . . . 255
Alice Krestanova, Jan Kubicek, Juraj Timkovic, Marek Penhaker,
David Oczka and Jan Vanus
Contents xvii

Modelling Medical Information and Knowledge with OWL


and Topic Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Martina Husáková
Comet Assay Classification for Buccal Mucosa’s DNA Damage
Measurement with Super Tiny Dataset Using Transfer Learning . . . . 279
Afiahayati, Edgar Anarossi, Ryna Dwi Yanuaryska, Fajar Ulin Nuha
and Sri Mulyana
The New Approach to Detect Scar Healing . . . . . . . . . . . . . . . . . . . . . 291
Lukas Peter, Antonino Proto, Dan Kamensky and Iveta Bryjova
Correction of the Eye Fundus Blood Vessels Images . . . . . . . . . . . . . . 301
Janusz P. Kowalski, Grzegorz Galant, Jakub Peksinski
and Grzegorz Mikolajczak

Part V Applications of Intelligent Information Systems


Implementation of Decision Tree Algorithm on Game Agent
of First Aid Educational Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Gunawan, Asep Nurhuda and Reza Andrea
A Generic Framework for Cross Domain Recommendation . . . . . . . . 323
Muhammad Murad Khan and Roliana Ibrahim
Measurement of Service Quality of a Public Transport System,
Through Agent-based Simulation Software . . . . . . . . . . . . . . . . . . . . . 335
Mauro Callejas-Cuervo, Helver A. Valero-Bustos,
Andrea C. Alarcón-Aldana and Miroslava Mikušova
Detection of Drivers Plate at Smart Driver’s Score Application
Controlled by Voice Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Ondrej Vondra, Jan Dvorak, Ondrej Krejcar and Peter Brida
Integration Challenges for Outsourcing of Logistics Processes
in E-Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Adam Wasilewski
Performance Improvement of Open Source Based Business
Intelligence System Using Database Modeling and Outlier
Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Tsatsral Amarbayasgalan, Meijing Li, Oyun-Erdene Namsrai,
Bilguun Jargalsaikhan and Keun Ho Ryu
Designing an Intelligent Controller for Improving PEM Fuel
Cell Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
S. Dhanya, Rani Thottungal, Varghese Paul and S. Anand Hareendran
xviii Contents

The Systems’ Integration Conception for Transactional Costs


Reduction in Polish Financial Companies . . . . . . . . . . . . . . . . . . . . . . 397
Ewelina Wróbel and Marcin Hernes
Design of Reactive Systems for Control Network Traffic
on the Kubernetes Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Lubos Mercl, Vladimir Sobeslav and Peter Mikulecky
Model of the Information System in the Organization
for Controlling Current Level of Information Security . . . . . . . . . . . . 423
Jerzy Stanik, Maciej Kiedrowicz and Jarosław Napiórkowski
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Part I
Sensor Clouds and Internet
of Things
Proposing Smart Disaster Management
in Urban Area

Dyah Wahyu Sukmaningsih, Wayan Suparta, Agung Trisetyarso,


Bahtiar Saleh Abbas and Chul Ho Kang

Abstract This study identifies technology and data related to disaster management
with the concept of the Smart City. A natural disaster has a huge impact on city
sustainability, it could destroy physical infrastructure, harm people, or make activities
stop for a range of time. Environment evolvement in recent years, such as climate
change and increasing population impacted to the natural disaster casualty. It then
examines the technology to construct natural disaster management, consisting of
preparation, mitigation, response and recovery for disaster recovery. Technology,
such as IoT, GIS, big data, AUV, and Social media can be integrated to provide
a solution for the city. Furthermore, this study proposed a model for smart disaster
management that integrates ICT (Information and Communications Technology) and
Smart City domain.

Keywords Smart city · Disaster management · Natural disasters

1 Introduction

Currently, 55% of the world’s population lives in urban areas, and this proportion
is predicted to have 68% growth by 2050. Urbanization, which means a shift in

D. W. Sukmaningsih (B) · W. Suparta · A. Trisetyarso · B. S. Abbas · C. H. Kang


Computer Science Department, BINUS Graduate Program-Doctor of Computer Science, BINUS
University, Jakarta 11480, Indonesia
e-mail: dyah.wahyu@binus.ac.id
W. Suparta
e-mail: drwaynesparta@gmail.com
A. Trisetyarso
e-mail: atrisetyarso@binus.edu
B. S. Abbas
e-mail: bahtiars@binus.edu
C. H. Kang
e-mail: chkang5136@kw.ac.kr
© Springer Nature Switzerland AG 2020 3
M. Huk et al. (eds.), Intelligent Information and Database Systems:
Recent Developments, Studies in Computational Intelligence 830,
https://doi.org/10.1007/978-3-030-14132-5_1
4 D. W. Sukmaningsih et al.

the population from rural to urban areas related with world population growth, an
additional 2.5 billion people will live in urban areas by 2050, nearly 90% of them
in Asia and Africa. Many countries will have to face the challenges of their growing
urban populations, that includes some consideration about transport, housing, energy
systems, and infrastructure, as well as education, employment, health care, decent
work and a safe environment [1]. When the city becomes more important in the
future, a smart city is a concept to utilize ICT to help the citizens in a very day life
and make the city more sustainable.
A disaster is a phenomenon that causes tremendous losses of life, property and
the environment in a very short period of time. Nowadays when urbanization is at its
peak, most of the population density would be concentrated on the city. Therefore,
disasters that occur in urban areas with such a large population can cause the death of
many people and loss of property [2]. To best of our knowledge, disaster management
is rarely discussed as part of smart city initiative. Despite the fact that for any event of
a disaster will affect city sustainability. For practical reason, this paper will examine
only natural disaster, which is a disaster that caused by the mother nature. The aim
of the present research is to identify what kind of technology that can be integrated
into smart disaster management and which information and data will be provided.

2 Literature Review

2.1 Smart City

To get insight about the concept of the smart city, we need to understand why cities
have a significant and important role in the future, especially in the social and eco-
nomic aspects of the world, and that they also have a strong impact on the envi-
ronment. A smart city definition has been reviewed by [3] and [4], keep pace with
changes in the field of information technology as a new approach to mitigate and
give solutions for the urban problem and make development more sustainable.
There also two domains that applied in this term. First, the domain where ICT
becomes a machine used in assisting cities in overcoming problems, for example,
energy grids, water management, natural resources, mobility, waste management,
and logistic. Secondly, this smart city has also been applied to “soft domain” such
as culture, education, social inclusion, government, and political innovation, where
the use of ICT is usually not too crucial, but as additional support. Neirotti classified
each domain and sub-domains in the smart city as described in Fig. 1 [5].
As state by Cocchia [4], smart city definition by Giffinger and Gudrun [6] is the
most cited, “A Smart City is a city well performing built on the ‘smart’ combination of
endowments and activities of self-decisive, independent and aware citizens”. Albino
et al. [3] has been trying to provide some of the key factors and concepts of Smart
City, therefore Smart City’s focus is not just on smart technology, but also on solving
core urban and regional issues. There are three fundamental issues that need to be
Proposing Smart Disaster Management in Urban Area 5

Fig. 1 Domain and sub-domain in smart city

addressed in cities whose smart technology can help solve these problems: culture,
metabolism and governance.
Ojo et al. [7] summarize the concept of “smart city” as an interaction between
technological innovation, organizational innovation, and policy innovation. Sectors
that are typically affected by smart city initiatives include transport, environment,
governance, energy, lifestyle and people, technology and infrastructure.
Significant progress has been made in information technology, such as sensors,
actuators, and smartphones, which create great business potential for the Internet of
Things, as all devices can be interconnected and communicate on the Internet. Then
data can be analyzed using big data technology.

2.2 Disaster Management

This paper will take a definition of disaster from two UN agencies, CRED (Centre for
Research on the Epidemiology of Disaster) and WHO (World Health Organization).
CRED defines a disaster as “a situation or event which overwhelms local capacity,
necessitating a request at national or international level for external assistance; an
unforeseen and often sudden event that causes great damage, destruction and human
suffering”. The WHO definition of natural disaster state that “A natural disaster is
an act of nature of such magnitude as to create a catastrophic situation in which
the day-to-day patterns of life are suddenly disrupted and people are plunged into
helplessness and suffering, and, as a result, need food, clothing, shelter, medical
and nursing care and other necessities of life, and protection against unfavourable
environmental factors and conditions.”
United Nation classifies natural disaster to Floods, landslides, earthquakes,
extreme temperature, storms, wildfire, volcanic activity, drought, and mass
movement-dry. Disasters occur when natural hazards that lead to the death or accident
of people who are at risk or the loss of valuables. Vulnerability emerges and increases
for various reasons, including population growth, urban development at vulnerable
sites, land use change, environmental degradation, weak governance, poverty and
inequality, and climate change [8]. UNISDR report, that between 1998 and 2017,
6 D. W. Sukmaningsih et al.

climate-related and geophysical catastrophes killed 1.3 million people and caused
another 4.4 billion injuries, homeless, displacement or emergency relief.
In managing disaster, it is necessary to understand the Disaster Management
phase, therefore solutions have to related to the following phase: preparation,
response, recovery, and mitigation. (1) Hazard mitigation is a continuous effort to
reduce the physical and social impact of future disasters. There are two main types
of mitigation: Structural mitigation and non-structural mitigation (2) preparedness,
action taken before a disaster to deal with anticipated disaster response and recovery.
(3) Response, Direct protection of life and property, damage control and minimizing
the impact of disasters. (4) Recovery, in this case both short-term activities, to restore
the vital physical and social systems, concurrently for long-term activities aimed at
restoring system to pre-disaster conditions [9, 10].
ICT (Information Communication Technology) has become an indispensable part
of implementing disaster management. The application of ICT at the beginning had
the effect of weather forecast and communication for disaster announcements. The
advance of the new technology can provide an improvement in the field of disaster
management.

2.3 Technology Solution

Smart disaster system task is to perform any action pre-disaster until post-disaster that
give warrants to save people and protect property. To properly manage disaster events,
information must be collected, such as: by sharing resources (data or information) and
coordinating, making decisions and activities. In addition, these resources and data
must be collaborated to accomplish complex tasks such as evacuation of geographic
areas and operations with actuators. The insufficiency of integrated platforms and
infrastructures leads to failure of emergency management [11].
IoT (Internet of Things)
IoT is a broadband network that uses a standard communication protocol whose point
of convergence is the Internet. The main concept of IoT is the presence of universal
objects that can be measured, derived and understood, and that can transform the
environment. Because of this, IoT is made possible by the development of various
objects and communication technologies. Example of the IoT technology found in
smart devices, including cell phones and other items such as an appliance, landmarks,
monuments, and works of art that can be general objectives [12].
Using IoT, system can integrate between internet and any device/object. Sensors
can be developed at different location for any purposes (e.g. Weather and water sys-
tem, environmental pollution, surveillance system). IoT in smart disaster system that
installs in Weather and water systems can apply some sensors to provide appropriate
information like temperature, wind speed, rain, and pressure.
Cloud-Based Big Data
Big data can also activate disaster resilience for smart cities. The use of huge data
Proposing Smart Disaster Management in Urban Area 7

and data analytics in smart city development is increasing resulting from intelli-
gence processing, exploitation, dissemination, and analysis. Today we see unusual
interdependence on a local and global scale, and today’s risks are systemic, viral,
devastating and unpredictable consequences. Therefore, traditional emergency man-
agement methods or technology cannot encounter this new challenge. Big data, with
the advantages of data collection, data merging, data storage, data analysis, data
representation, and data visualization can be used to mine patterns, analyze user
behavior, visualize, and track data among communities to overcome the underlying
vulnerability. With big data, disaster managers can identify potential risks, make
actions to prevent risks and ultimately enable the resilience of the city [13].
The development of crisis analysis-based on the big data platform offers many
applications that can improve the response to disasters. Disasters often have a sequen-
tial impact (e.g. tsunamis followed by earthquakes). Analysis platforms have to be
developed in real time to prioritize urgent problems, avoid further dangers, for exam-
ple, coordinate aid organizations and organize first responders. Some features that can
be done using big data include: Emergency services need to process large amounts of
data that are entered through multiple channels, such as first responders, satellite net-
works, sensors, and social media. Therefore, the major challenge is to develop data
integration protocols that ensure proper data collection, modeling, and messaging
systems [10].
GIS (Geographic Information System) and Remote Sensing
Natural disaster management requires many types of information that have a spatial
component. Geospatial data includes data with geographical components such as
maps, aerial photographs, GPS data, rainfall data, satellite imagery, Roads, land
use, hydrography, elevation, boundaries, image base, etc. Information from remote
sensing and GIS has proven useful in disaster management.
Remote sensing is an activity that uses satellite or sensor from aircraft to detect
and classify objects on earth. Remote sensing is one of the most advanced ways to
detect forest fires. Spaceborne (satellite) instruments with built-in sensors provide
information about forest fires on the earth’s surface. An example of remote sensing
is the use of lasers to tracking smoke plume boundaries, its top height, dispersion,
and a change of its intensity with time [14], another example of remote sensing
usability is to detect landslides [15]. Westen [16] describes GIS and remote sensing
role in disaster management: marking left by previous disasters, recognize the initial
stage of the event, monitoring events, planning evacuation route, search and rescue
operation.
Data integration for GIS and types of information are required [16, 17]:
• Data at the disaster phenomenon (e.g. floods, Landslides, earthquakes), their fre-
quency, vicinity, price, etc
• Data at the environment where the disaster possibly take regions: geology, topog-
raphy, hydrology, geomorphology, land use, soils, plant life and masses of others.
• Data on the factors that are likely destroyed if the event takes place: settlements,
infrastructure, the populace, socio-monetary statistics and so on.
8 D. W. Sukmaningsih et al.

• Data at the emergency comfort property, which embody hospitals, police stations,
hearth brigades, warehouses and loads of others.

Social Media
Nowadays, social media emerged as an important party and playing a significant role
in disaster management and response. Social media has a potential source of informa-
tion to improve the management of emergency situations such as disasters triggered
by natural hazards. Recent research has concentrated on using social media not as a
stand-alone information source but also join with other information. Social media has
advantages include crowd-sourcing, speed, and easy to access from mobile devices.
It also has disadvantages include bias in user base; confusing information between
related and informative and false content, and out-of-date information. Twitter is one
of the most used social media in term of disaster information, GPS in the smartphone
provides geo-tagged for twitter users [18, 19].
UAV (Unmanned Aerial Vehicle)/Drones
UAV (Unmanned aerial vehicle) or drone playing a vital role as first responders
during the disaster. UAV can achieve a better understanding of which infrastructure
are affected by the event, how much this infrastructure is damaged, how the traffic
infrastructure is affected and how many potential people are affected by the event
[20].
Some application of UAV in the disaster event such as Monitoring and early
warning, disaster information sharing, evacuation support, communication system,
SAR, Damage assessment.

3 Research Method

This paper proposes the model for mapping disaster management and smart city
domain. Following this model, apply technology related to disaster management
solution. This paper examines from a study that has ever existed, then put techno-
logical solutions related to the domains in smart cities that are connected to disaster
management.
For the purpose of understanding how social media used during the rainy season,
this paper examines twitter usage monitor tweet related to “banjir” (flood) in Indone-
sia. Flooding is an event that often occurs during the rainy season in Indonesia. The
event not only happened because of high rainfall but also because of human factors
and infrastructure. The peak of a rainy season usually happened in January until
February, but the data gathered from early December when rainy season has just
begun.
The data were collected by querying using NodeXL (basic) and Twitter API from
28 November 2018 to 2 December 2018, this collection contains on average about
1262 tweets and mention, and data was sampled by tweet every day after 06.00 p.m.
We further filtered tweets by keyword “banjir”.
Proposing Smart Disaster Management in Urban Area 9

But, to request tweet with a geolocation, that indicates user location, there is
difficulty that NodeXL follows rule from twitter search and location search was de-
activate. Consequently, for analyzing user location to match with tweets in urban
area, we use manual searching for city in Indonesia, like “Jakarta”, “surabaya” and
other location that indicates place in city area like “fatmawati” which is sub-district
in Jakarta.
Afterward, we further cleansing tweet and excluded those outside Indonesia and
“mentions” and “replies to” type of tweet. Total tweet collected are 290, tweet then
classified based on the thematic coding, tweet coded manually and group into seven
thematic group adapted categories from [18]. Group of thematic categories consist
of (1) ‘volunteer actions’, (2) ‘media reports’, (3) ‘traffic conditions’, (4), ‘first-
hand observations’, (5) ‘official actions’, (6) ‘infrastructure damage’ and (7) ‘other’.
Table 4 present result from tweet thematic classification.
This study also classifies tweet by its content, using classification adapted from
[21], these categories are related-informative, related-not informative and not related.
Related category concern about tweets that talks “banjir” as flood event no other
meaning of the word. For example “banjir itu berkah” (the flood is a blessing) was
categorize as not related. Informative category use for tweets that gives useful infor-
mation to flood event and not for other purposes. For example “yg mau melintasi
jalur purwodadi pati harap berhati, Banjir yg arusnya kuat dari atas” (who want
to cross the purwodadi pati, please be careful) categorize into related-informative.
Tweet categorization based on relatedness presented in Table 3.

4 Results and Discussion

4.1 Smart Disaster Management

A sustainable city is inseparable with managing disaster event. Combining possible


technology will make it more effective and useful for both the city and its citizen.
Figure 2 describes a technology which already uses in disaster management. The
model integrates technology with smart city domain with the intention to give more
quick and reliable solution for the future event.
An action was taken in every phase of disaster management that state by National
Research Council (NRC) [9] mapping into smart city domain described by Neirotti
et al. [5] to give clear visibility for authorities and citizen. Action and data provide
from disaster management described in Table 1, every phase is fulfilled by smart city
domain and contribution that smart city should plan in disaster management.
Furthermore, technologies solution for smart disaster management describe in
Table 2. In addition, these technologies will provide information which available for
authorities to use and optimize to gain advantage from smart disaster system pre-
sented. This solution was obtained from previous literature and research, for instance
[16] already presented the utilization of GIS and remote sensing for every phase of
10 D. W. Sukmaningsih et al.

Table 1 Mapping disaster phase and smart city domain


Smart city domain Disaster phase
Preparedness Mitigation Response Recovery
City logistics Mapping Logistic Send logistic
logistic route evacuation along with the
support rescue team
People mobility Mapping • Evacuate • Alarm
evacuation geographical people
route area through
• Tracking mobile
people phone
location • Prediction
population
displacement
• Identify area
affected
Pollution control Install IoT in • Analyze data • Spatial
water and from remote monitoring
weather sensing
system • Analyze
anomaly of
precursor
Public safety • Potential risk • Crowd- • Sending • Predicting
identification sourcing for search and future event
• Identify disaster rescue team and impact
important information
place for • Early
people warning
Health care Mapping • Dispatch
rescue team emergency
route and rescue
team
• Disaster
response
system
Building Mapping • Damage
danger zone assessment
for
reconstruction
• Update
danger zone
Proposing Smart Disaster Management in Urban Area 11

Fig. 2 Smart disaster management

disaster management. Recent technology introduced UAV and drones for image cap-
ture and aerial data gathering, using UAVs can make observations of disaster-affected
areas faster and real-time [20].
Finally big data consolidate all the data and analyze them then provide valuable
information for agency, government and emergency services personnel. With the aid
of these information, it is expected that decision making can be done more accurately.
In some cases, there is a combination and integration between each technology, data
from different platform has enormous amount of specific data (location, sensor,
spatial), big data can provide real-time information for emergency services.
The flood forecasting system design for the Krishna River valley with GIS and
meteorological data. The map is created with ArcGIS, which includes the depth of
inundation and the degree of flooding with presentation maps. This information will
be available to the relevant authorities in the near future in order to take the necessary
action [22].
Recent experience shows that the public can use social media and Web 2.0 inter-
active Web sites to communicate effectively and inform online colleagues about
event location information by creating map-based mashups. Cartographer Experts
and emergency response professionals can benefit and collect various types of infor-
mation [23].
Study on Floods in Germany and how related information from Twitter and real-
time event show significantly information from Twitter as disaster response and
monitoring management. From that study found that Tweets related to the high of
water level related to the proximity of the tweet. The study correlates the proximity of
Another random document with
no related content on Scribd:
room—Mother Mary Monica, at her own earnest request,
being allowed to remain with us and oversee our
proceedings. We began with a good washing and combing
all round (not a nice piece of work by any means), and then
dressed them in clean clothes, of which we had a plenty by
us made up for our regular autumn doles. The dear old
Mother was as pleased as a child with a new doll. I can't say
the same for the poor children, who were strange, and
scared, and at first hardly to be pacified; but by degrees
they seemed to find the comfort of being clean, and by
night they were all merrily at play, as if nothing had
happened to them. We made up as many cot beds as there
were children, and my own bed was moved into the room.
Sister Anne also slept in the room till she was taken sick,
when Amice was allowed to take her place.

I don't think, for my own part, that I was ever happier than
when playing with these children, or teaching them their
hornbook and the use of their little fat fingers. The oldest is
about ten, a wise motherly little maid, and a great help to
us with the others. The youngest is only three—the sole
survivor of Roger Smith's family. Considering what the
family was like, we may hope her loss may prove a gain.

There were many different opinions in the house concerning


the sheltering of these orphans. Sister Catherine, who has
not had so much to say about discipline since her dismissal
from office, opened her mouth once more to protest against
the great irregularity of our taking the babes, and the utter
impropriety of their being committed to the care of the
youngest person in the house. But Sister Placida, who is
great in the history of this and other orders, and who has
no objection (or so I think) to putting down Sister
Catherine, brought so many precedents to bear against her,
that she was fain to betake herself to her humility, her usual
refuge when worsted. Some were terrified at the notion of
bringing infection into the house; but in general, I must say,
the Sisters were very kind to the poor children, and very
glad of an excuse to slip away, and play with them.

It was two weeks after the pestilence broke out in the


village before it appeared in the house. Sister Bridget was
the first victim. She was taken in the night, with the heat
and sweat, and, poor creature, had no more wit than to rise
and stand for half an hour or more at the open window of
her cell, till Mother Gertrude, making her rounds,
discovered her state. She was taken at once to the
infirmary, and died in a few hours, very happy and
resigned, and saying, with almost her last breath, poor
thing, that everybody had been very kind to her. From that
time we had a new case or two every day for a week.
Almost every one who had resolution enough to remain
quietly in bed and bear the all but intolerable discomfort of
the heat and bad odor, recovered; but many were light-
headed, and unless watched every moment, would throw off
the clothes and otherwise expose themselves: and every
one who got the slightest chill died without remedy.

It was a trying time, and one which showed what people


were made of; for the discipline of the family was
necessarily much relaxed, the care of the sick being the
principal matter, and each one showed in her true colors—
very unexpected colors some of them have been. Mother
Gabrielle, who has always been rather fussy and fidgetty,
and especially apt to be scared on small occasions, and to
fret over little accidents and losses, was as calm and
cheerful as a summer morning, till she was taken down
herself, when she made a most edifying end. Mother
Superior, though calm and composed, was very sad. Mother
Gertrude, just as usual.
In general I must say the Sisters have behaved very well.
Sister Catherine was the most alarmed of anybody, and
made herself rather a trouble by going round asking
everybody's pardon and wanting to kiss their feet, which
was not always quite convenient when one had a jug of
barley water, or a crying babe in one's arms. She wanted to
help in the infirmary, but she cried so, and was besides so
unwilling to obey orders without some little variation of her
own, that Sister Placida dispensed with her help very
suddenly. At last she took to her own bed with a kind of
nervous fever; and as she was not very sick, everybody was
rather glad to have her out-of-the-way.

Sister Mary Paula was quite different. From the first she
attended steadily to her work, speaking but little, but very
kind and sober in her demeanor. One morning, when I went
to the kitchen for the children's dinner, at ten o'clock, she
stopped me.

"Rosamond, did you know who it was told the Bishop of


your sending a love token to your cousin?"

"Nay!" said I. "I had not an idea, nor do I wish to know,


since no harm has come of it."

"Well, it was I!" said she, bluntly, turning scarlet as she


spoke. "My brother is the Bishop's chaplain, and when he
came to see me, I managed to slip a note into his hand,
telling him the whole story, as I had heard it!"

"But, dear Sister, how could you do that, since yourself told
me you could not write?" I asked, in amazement.

"I did not write it—that was done by another hand!" she
answered me. "But 'twas I conveyed it to my brother. I
fancied, or tried to fancy, that I was moved by zeal for
religion and for the honor of this house; but my eyes have
been opened lately, and I see things more clearly. 'Twas
mere spite and envy, because I thought you a favorite. I
desired to bring you into disgrace, or to cause your removal
from the house; and I beg your pardon."

"I am sure you have it, with all my heart!" said I, kissing
her. "Nay, there is naught to pardon, since all turned out to
my advantage at last."

"Yes, the stones we threw returned on our own heads!" she


answered. "And so they ought. Here, take these cakes for
your brats. Do they all keep well?"

"All!" I told her, but added that she did not look well herself,
and I feared she was working too hard.

"Nay, I am well enough," she said, "but Rosamond, will you


pray for me? My mind is distracted with all this work and
worry, and I fear my prayers are of little value."

I told her I did not believe such distraction hurt our prayers,
and reminded her of what Father Fabian had said about
offering our work and our very distractions. She kissed me
again and I went my way. That was the last time I ever saw
her alive. She dropped that evening in the chapel, and died
before midnight. It seemed the signal for a new outbreak of
the disease. Three of my charge were attacked, and two
died, and of the Sisters, three within the next three days.
Mother Gabrielle was the last, and I do think she died as
much as anything from sheer fatigue. I had no touch of the
disorder, though I nursed all the children who had it, and
also Sister Anne, whom we hoped at one time might
recover; but she had a relapse, I think from getting up too
soon, despite the warnings of Mother Mary Monica.

Now things have returned to their usual course, save that


with the Bishop's approbation, we have kept the three
children who survived, and have also taken in two more.
Amice and I have the charge of teaching and overseeing
them, under the real superintendence of Mother Gertrude
and the nominal care of Mother Mary Monica, which mostly
consists in telling them stories, cutting out figures, and
begging off from pains and penalties. What a dear old
grandmother she would have made!

I have heard but once from my friends in London, who are


all well. My father is coming home in a few weeks.

CHAPTER XVII.

October 28.

AMICE, is sick—I don't know what ails her, but she has been
growing thin and pale ever since the pestilence, and now
she has been obliged to take to her bed. She does not
suffer much, save from her weakness, which so affects her
nerves that she can hardly bear any one in the room with
her, but prefers to stay alone. The doctor says she is to
have her way in all things—a sentence which always sounds
to me like that of death. My heart is like to break with the
thought, but there is no help. Nobody will ever know what
she has been to me.

CHAPTER XVIII.

All Saints' Day, Nov. 2.

IT seems as if there were never more to be peace in this


devoted house. Magdalen Jewell, the woman who lived at
Grey Tor, the woman who nursed her neighbors all through
the sickness, and has since been a mother to many an
orphan, and a dutiful daughter to many a widow, Magdalen
Jewell is accused of heresy, apprehended, and shut up in
Saint Ethelburga's vault, till she can be removed to a
stronger prison. 'Tis a shame, and I will say it. They have
no business to put such an office on us, but Father Fabian,
who, I do suspect, likes the business no more than I do,
says 'tis done in hopes that the persuasions of himself and
Mother Superior may bring her to a better mind. They say
there is no doubt of her guilt.

Indeed, she herself denies it not, but glories in it, and is full
of joy. I heard her myself singing of some hymn, as I
judged. They say she was suspected a long time, and a man
whom she had nursed in the sickness, spying upon her at
night through the window, saw her many times reading in a
great bound book she had. He giving information, the house
was searched, and the book found. It proved to be a copy of
the Scriptures in the vulgar tongue. Magdalen being
apprehended, showed neither surprise nor fear, but
confessed all, and gloried, as she said, that she was
counted worthy to die for her religion. And now she is shut
up in that horrible place, and Mother Gertrude—she who
has always seemed too kind to hurt a fly, is her keeper, and
unless she recants she must needs be burned. It is utterly
horrible!

And they are all so hard-hearted against her! Father Fabian


says it is a sin to pity a heretic, and so say all the Sisters.
Even Mother Gertrude, though she offers many prayers for
her conversion, says she deserves her fate, and even that
the man who betrayed her did a good deed, in thus laying
aside all the ties of natural affection. But I cannot think so.
The man seems to me a horrible wretch and traitor, far
more deserving of the stake than this good, kind woman,
who has sacrificed everything to her neighbors.

My whole mind is in a tumult, and for the first time I feel as


if I would give anything to leave the shadow of this roof and
never see it again. And that dear old chapel, that I so loved,
and where I had such sweet comfort, to be so used! I
cannot write nor even think. I would Amice were well, but
she is more feeble than she has been, and last night she
begged that Mother Gertrude might sleep in the room with
her, though she would not have her sit up.
CHAPTER XIX.

Nov. 4.

MAGDALEN JEWELL hath escaped, at the least she hath


disappeared, and no one knows what has become of her. It
seems impossible that she could have got out, as there are
no means whatever of opening the door from the inside,
and the key hath never left Mother Gertrude's care. Some
of the Sisters think that the ghost or demon, or whatever it
is that hath heretofore avenged sacrilege in that chapel,
hath torn her in pieces and carried her off bodily, but they
say there are no signs of any such struggle. The very cruse
of water which Mother Gertrude carried to the prisoner last
night is standing half emptied on the floor, but the bread is
all gone, so she must have eaten her supper.

Mother Gertrude, on rising, found poor Amice very much


worse, faint and exhausted, which delayed her a little.
When she went to the prison, she called as usual, but there
was no answer. She looked through the grating in the door,
usually masked by a panel on the outside, but could see
nothing. Becoming scared, she sent for Mother Superior and
Father Fabian, who had the tower and vault thoroughly
searched, but nothing was to be found, save what had
always been there. It is a most wonderful chance. I don't
think Father Fabian believes very much in the demon, or he
would not have searched the grounds so carefully, or asked
so many questions. Mother Gertrude takes charge of all the
keys at night, and places them under her pillow; and beside
that, who was to steal them, supposing that such a theft
were possible? Mother Gertrude is a heavy sleeper, but
Amice is a very light one, specially since her illness, and she
declares most positively, that she is certain nobody was in
the room last night, save herself and Mother Gertrude.

It is all a dark mystery. Magdalen was to have been


removed to Exeter to-day, but now Father Fabian must go
instead, and give the best account he may of the matter. I
cannot say that I believe very much in the demon, any
more than Father Fabian. My notion is that some friend from
outside hath found a way of helping the poor woman, or
that there is some way of escape from the tower which we
know not of.

Anyhow, I am glad she is gone, and so I can't but think


there are some others, if they would say so. The tower
being open, some of us young ones ventured to explore it,
and even into the vaults below. The tower is simply what it
looks to be—a structure of great unhewn stone, with
projections here and there like shelves, and the remains of
a stone staircase, though where it should lead to I cannot
guess. Another stone stairs leads down to the vault, which
is perfectly dark, save for one narrow slit at the very top,
going into the garden. Here was once a shrine, whereof the
altar and crucifix still remain. A row of niches runs all
round, of which two have been built up, doubtless for burial
purposes, and there are the dusty remains of several
coffins, such as are used for nuns, beside two or three of
lead and stone. 'Tis a dismal and dreadful place, and it
seems horrible to think any living being should be confined
there. Yet, the story goes that it has sometimes been used
as a prison for nuns guilty of grave offences.

I drew a long breath, when I got into the free air of heaven
once more, and I must say, I was glad to think poor
Magdalen had escaped.

I could be as light-hearted as a bird, only that my dear


Amice is so much worse. She is very low indeed, too
exhausted to speak; but she lies quietly in her bed, with a
look of most heavenly peace on her face. She seems most
of the time engaged in inward prayer and thanksgiving, for
her eyes are closed and her lips move, and now and then
she opens her eyes with such a wondrous smile, as if she
saw the glories of heaven open before her. What shall I do
when she is gone? I dare not think. I have been sitting by
her a great part of the day, and now Mother Gertrude tells
me, she has asked that I may watch beside her this night,
and dear Mother hath given permission. I am most thankful
for the privilege, for I would not lose one moment of her
dear society.
CHAPTER XX.

Nov. 8th.

AMICE CROCKER, my dearest friend, is dead and buried—


buried in a dishonored grave, by the poor lady who was
prisoner in the Queen's room so long. She died a heretic,
they say, without the sacraments, and they tell me it is
sinful in me to love her longer. But I will love her, to the
latest day of my life. I don't believe she is lost either, and
nothing shall ever make me think so. Oh, that last night
when I sat by her side, and she told me all!

Well, she is gone, and naught can hurt her more. I think
Mother Gertrude will soon follow, for she seems utterly
broken down. She might well say that no good would come
of the Queen's visit. And if Amice should be right, after all,
and we wrong! I must not, I dare not think of it! Alack and
woe is me! I would I had died in the sickness, or ever I had
lived to see this sorrowful day!
CHAPTER XXI.

Corby End, April 20, 1530.

I LITTLE thought, a year ago, that another April would see


me quietly at home in my father's house, and with such a
companion—still less that I could be quite content in such a
companionship. If any one had told me so, I should have
laughed or been angry, I hardly know which, and yet I am
quite ready to confess that 'tis all for the best.

My father, my Lady and Harry are all gone to make a visit at


Fulton Manor, where is now much company to celebrate the
wedding of Sir Thomas' eldest daughter. I was to have gone
with them, but when the day came the weather was damp
and cold; and as I am only just beginning to be strong
again, my Lady and I both thought I should be better at
home. Father and Harry were much disappointed, and I saw
Harry was a little disposed to lay the blame on my Lady, but
a little quiet reasoning and some coaxing finally made him
own that all was for the best. So here I am, in sole
possession of the house, and for the first time I have got
out my book of chronicles.

I have read it all over, and pasted in the loose leaves where
they belong, as even should I return to the convent I shall
not take it with me. I am minded to continue it, especially
as I can now write freely and without concealment. My
stepmother never interferes in my private matters. Even
Mrs. Prue, who began by attributing to her almost every
fault of which woman is capable, now grudgingly admits
that my Lady minds her own business, and is passing good-
natured. In fact, only for that one mortal sin of marrying my
father, I think the old woman would allow her new lady to
be a mistress of good conditions.

I suppose I had better begin just where I left off.

The night before Amice died, she begged that I alone might
sit with her, saying that Mother Gertrude needed unbroken
rest, which was true. Amice was so manifestly near her end
that Mother Superior did not like to refuse her anything,
and Mother Gertrude somewhat unwillingly gave way. The
dear Mother would have spent the whole night in prayer for
her niece at the shrine of St. Ethelburga, had not Mother
Superior laid her commands on her to go to bed and rest all
night.

"Sit close by me, dear Rosamond," said Amice, "you know I


cannot speak loud now, and I have much to say."

"You must not tire yourself by talking," said I.

"It will make no difference," she answered.

"I feel that my end is very near. Doubtless what I did last
night may have hastened my death, but I do not regret it; I
would do it again."

"What you did last night!" I repeated, struck with a sudden,


most strange thought. "Do you mean, Amice, that you—" I
could not finish the sentence.

"Hush!" said she. "Even so, Rosamond. I took the keys from
under Mother Gertrude's pillow (you know how sound she
sleeps, especially when she has been disturbed), opened
the doors and let the prisoner free."
"But the outer door—that heavy iron door!" I exclaimed, in
amazement.

"I did not open the outer door. She climbed over the wall
there by the beehives. The gardener had left his ladder
close by. I wonder they did not find it in the search this
morning."

"I dare say he had taken it away before that he might not
be blamed for his carelessness," said I. "But Amice, even
then I see not how you accomplished it. We have thought
you so weak."

"And so I have been," said she. "The day before, I could


hardly rise without help, and after I got back to my bed, I
lay for many hours so utterly exhausted that I many times
thought myself dying. But at least I had the strength to call
nobody, for I wished above all things that Magdalen might
have time to escape. She told me at parting that with three
hours' vantage, she would defy even the King's
bloodhounds to find her; and I was determined she should
lose that vantage through no fault of mine."

"But, if you had died, Amice—died without confession and


the sacraments," said I. I knew that she had not confessed
for a long time, putting off the Father by saying she was too
weak, and that it hurt her to talk.

"I should not have died without confession, dearest


Rosamond," said she, with an heavenly smile. "I have
known this many a day that there needs no priest to make
a confession valid, but that to every truly penitent heart the
way to the very throne of Heaven is open, and that the
blood of Jesus Christ cleanseth from all sin. If I regretted
aught, it was that I must die without another kind of
confession—the confessing my faith openly before men. I
have longed to do so, but I shame to say it—I have been
afraid. But now I fear no longer."

I was utterly dumbfounded, and could not speak a word.

"Shall I tell you the whole?" she asked, presently. "Or are
you too much shocked to hear more? You will not cast me
off, will you, Rosamond?"

"Never!" said I, finding my voice at last. "But, dearest


Amice, consider. Think of your fair fame—of Mother
Gertrude and dear Mother Superior!"

"I have thought of all," she answered; "yea, many times


overt and though I grieve to grieve them, yet I must needs
speak. I have denied Him before men too long already: I
must needs confess Him before I die, come what may. Give
me some cordial, Rosamond. I must keep myself up till to-
morrow, at least."

I gave her the cordial, and after a little rest, she began once
more:

"Rosamond, do you remember the day we were dusting the


chairs in the Queen's room, and you showed me one, the
velvet whereof was spotted with small spots, as of drops of
water? Mother Gertrude sent you to the wardrobe just
then."

"I remember it well," I answered; "and that looking from


the window I saw you reading some ragged leaves which
you put into your bosom. I meant to ask what they were,
but in the multitude of business, I forgot."

"Exactly so!" said Amice. "I was dusting the chair, and on
taking up the cushion, which I found to be moveable, there
fell out these leaves. I took them up to read them, thinking
they might throw some light on the poor lady's history, but
I had read little when I knew what I had found—something
I had long desired to see. It was a written copy of the
Gospel of St. John, done into English. Doubtless the poor
prisoner had managed to bring it with her, and had found a
convenient hiding-place for her treasure in this chair, which
she had watered with her tears."

"I had read but a few words when I was interrupted; but
those words were engraven on my mind as with a pen of
steel. They were these: 'God so loved the world that he
gave his only son for the intent that none that believe in
him should perish, but should have everlasting life. For God
sent not his son into the world to condemn the world, but
that the world through him might be saved.'"

"Rosamond, I was as a man walking through desolate


moors and among quaking bogs and thorny thickets, to
whom a flash of light from Heaven showed for one moment
the right and safe road. It was but a glimpse. I had no more
time to read then, nor for some hours after; but that night,
in recreation, I did find time for a few more verses. By the
first peep of light next morning I was up and at my window,
and thenceforth the morning star seldom found me
sleeping. I placed the book of the Gospel inside my prayer-
book, for better concealment, but after I had once read it
through, and for fear it might be taken from me, I learned it
all off by heart."

"I remember how we used to smile at your early rising,"


said I; "we little thought what you were about."

"This went on for a while," continued Amice, (I set down her


own words as near as I can remember them): "and then I
came near a discovery. You know how light of foot was
Mistress Anne. Well, one day, when I had ventured, as I
seldom did, to take out my book while I was waiting in the
Queen's anteroom, she came behind me and peeped over
my shoulder, and before I could hinder, snatched the leaves
from my hand. I thought then that all was lost; but after
teasing me awhile in her childish fashion, she gave me back
my treasure, and said she would get me a better book than
that, even the whole New Testament, done into fair English
by one Master Tyndale."

"But mind!" she added, "I don't stand sponsor for all his
notions, and I wont be answerable for the consequences to
yourself. This much I may say. 'Twas a very learned and
good man gave me the book, and he says 'tis true to the
original Greek, out of which it was translated by Master
Tyndale."

"And have you read it?" I asked her.

"Not I," says she, "save only a chapter, here and there; but
let me tell you, Mistress Amice, if this book gains ground, as
'tis like to do, your priests and nuns and mitred abbots will
fly away like ghosts and owls before the sunrising. Nay,
unless some I know are the more mistaken, the cock has
crowed already."

"That very night she gave me the book, and before she left,
she added another which was sent her from London, namely
Master Tyndale's exposition of certain passages. But I cared
not so much for that, as for the other. Then came the
sickness, when the discipline of the house being so much
relaxed, I had more time to read and study and compare.
Rosamond, how amazed was I to find that there is in the
New Testament no single hint of any worship being paid to
our Lord's mother—nay, our Lord Himself saying, that those
who did His Father's will, were even to Him as His own
mother."
"'Tis not the right Gospel," said I. "Why Amice, only think
how our Lady is honored throughout all Christendom.
Depend upon it, you have been deceived."

"Who would dare to carry out such a deception?" said she.


"Every learned man in Christendom would be against him."

I cannot now write down all she said, as how she had found
the teaching of our Lord so much more simple and plain,
than those in the lives of the saints—how Himself had
declared that whosoever did but believe on Him, had
already everlasting life—how Christ being already offered
for sin, there was no more sacrifice, but all was perfected in
Him; and much more which I did not, and do not yet
understand. But she ended by saying, that she could no
longer keep silence, since the Lord had commanded all to
confess Him before men, and had declared that He would
deny all who did not thus confess Him.

"I cannot die with a lie on my lips," she said. "I dare not
thus go into the presence of my God, where I must soon
stand; for God doth hate lying above measure, inasmuch as
He hath declared that all liars shall have their part in the
second death. Besides, were it not utterly base to deny
Him, who hath done and will do so much for me?"

I used many arguments with her, but could prevail nothing,


even when I spoke of Mother Gertrude and her sorrow, at
which Amice wept so vehemently, that I was alarmed; but
when she was again composed, she said she had thought of
that many times, and with many prayers and tears, but yet
she could see her duty in no other way.

Oh, I cannot tell all she said. I would I could remember and
set down every word, but much has gone from me. She
bade me take comfort concerning her, when she was gone,
saying that nothing they could do would work her any real
injury. She told me how happy her new faith had made her,
despite many perplexities concerning her duty—how at the
last she had seen her way clear, and what peace she had
felt in the thought that her free salvation had been provided
for in Christ, and she had but to believe, and be saved.

"What, even if you were wicked?" said I.

"Don't you see, dear Rosamond, that one who really


believed in our Lord could not be wicked? If he really and
truly believed that the Lord died for him, he would desire to
do what that Lord commanded, and to be like Him. He
would know that Christ makes keeping His commands the
very test of faith and love, even as He saith: 'He that hath
my commands and keepeth them, He it is that loveth me.'"

I asked what she had done with her Testament, and she
told me she had given it to Magdalen Jewell, knowing that
she should need it no longer.

"There are many things therein which I don't understand,


but they will soon be made plain," said she. "Is it not
almost morning, Rosamond? Draw the curtain and see."

I did so. Lo the dawn was stealing on, and in the east
shone, glorious to see, the morning star.

"There is the emblem of my Lord!" said Amice, clasping her


hands; "There is the bright and morning star. It is the last
dawning I shall see on earth! To-morrow. Rosamond, and
whenever you think of me, remember that I am resting
where there is no need of sun or moon: 'For the brightness
of God did lighten it, and the Lamb was the light of it.' 'They
shall hunger no more neither thirst any more, neither shall
the sun light on them nor any heat. For the Lamb which is
in the midst of the seat shall feed them and shall lead them

You might also like