100% found this document useful (3 votes)
19 views56 pages

(Ebook PDF) Soft Computing in Wireless Sensor Networks Instant Download

The document is a promotional material for the eBook 'Soft Computing in Wireless Sensor Networks,' which discusses various optimization techniques and applications of machine learning in wireless sensor networks (WSNs). It includes chapters on intrusion detection systems, coverage optimization, and the Internet of Things in healthcare, among other topics. The book aims to provide insights into soft computing approaches for solving challenges in WSNs and is edited by Huynh Thi Thanh Binh and Nilanjan Dey.

Uploaded by

maawiahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
19 views56 pages

(Ebook PDF) Soft Computing in Wireless Sensor Networks Instant Download

The document is a promotional material for the eBook 'Soft Computing in Wireless Sensor Networks,' which discusses various optimization techniques and applications of machine learning in wireless sensor networks (WSNs). It includes chapters on intrusion detection systems, coverage optimization, and the Internet of Things in healthcare, among other topics. The book aims to provide insights into soft computing approaches for solving challenges in WSNs and is edited by Huynh Thi Thanh Binh and Nilanjan Dey.

Uploaded by

maawiahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

(eBook PDF) Soft Computing in Wireless Sensor

Networks pdf download

https://ebooksecure.com/product/ebook-pdf-soft-computing-in-
wireless-sensor-networks/

Download more ebook from https://ebooksecure.com


We believe these products will be a great fit for you. Click
the link to download now, or visit ebooksecure.com
to discover even more!

Randomly Deployed Wireless Sensor Networks 1st Edition


Xi Chen - eBook PDF

https://ebooksecure.com/download/randomly-deployed-wireless-
sensor-networks-ebook-pdf/

Handbook of HydroInformatics: Volume I: Classic Soft-


Computing Techniques 1st Edition - eBook PDF

https://ebooksecure.com/download/handbook-of-hydroinformatics-
volume-i-classic-soft-computing-techniques-ebook-pdf/

Malware Diffusion Models for Wireless Complex Networks.


Theory and Applications 1st Edition Karyotis - eBook
PDF

https://ebooksecure.com/download/malware-diffusion-models-for-
wireless-complex-networks-theory-and-applications-ebook-pdf/

(eBook PDF) Translational Medicine in CNS Drug


Development, Volume 29

http://ebooksecure.com/product/ebook-pdf-translational-medicine-
in-cns-drug-development-volume-29/
Progress in Heterocyclic Chemistry Volume 29 1st
Edition - eBook PDF

https://ebooksecure.com/download/progress-in-heterocyclic-
chemistry-ebook-pdf/

(eBook PDF) Millimeter Wave Wireless Communications

http://ebooksecure.com/product/ebook-pdf-millimeter-wave-
wireless-communications/

(eBook PDF) Advances of DNA Computing in Cryptography

http://ebooksecure.com/product/ebook-pdf-advances-of-dna-
computing-in-cryptography/

(eBook PDF) Bayesian Networks in Fault Diagnosis:


Practice and Application

http://ebooksecure.com/product/ebook-pdf-bayesian-networks-in-
fault-diagnosis-practice-and-application/

(eBook PDF) Guide to Wireless Communications 4th


Edition

http://ebooksecure.com/product/ebook-pdf-guide-to-wireless-
communications-4th-edition/
Soft Computing
in Wireless Sensor
Networks
http://taylorandfrancis.com
Soft Computing
in Wireless Sensor
Networks

Edited by
Huynh Thi Thanh Binh
Nilanjan Dey
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

© 2019 by Taylor & Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-0-8153-9530-0 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright​
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at


http://www.taylorandfrancis.com

and the CRC Press Web site at


http://www.crcpress.com
Contents

Preface..................................................................................................................... vii
Editors.......................................................................................................................ix
Contributors.............................................................................................................xi

1. Introduction to Wireless Sensor Networks................................................1


G. Bhanu Chander and G. Kumaravelan

2. Optimization Problems in Wireless Sensors Networks....................... 29


D. K. Sah, Chaya Shivalingagowda, and D. Praveen Kumar

3. Applications of Machine Learning in Wireless Sensor Networks..... 51


Ramchandra S. Mangrulkar and Prashil D. Negandhi

4. Relevance of Soft Computing Techniques in the Significant


Management of Wireless Sensor Networks............................................. 75
Mamata Rath, Bibudhendu Pati, and Binod Kumar Pattanayak

5. Soft Computing Technique for Intrusion Detection System


in Mobile Ad Hoc Networks....................................................................... 95
V. Bapuji, B. Manjula, and D. Srinivas Reddy

6. Introduction to Coverage Optimization in Wireless Sensor


Networks....................................................................................................... 115
Huynh Thi Thanh Binh and Nguyen Hai Nam

7. Energy Efficient Cluster Formation Using the Firefly Algorithm


(EECFF).......................................................................................................... 137
Anupkumar M. Bongale and Nirmala C. R.

8. Positioning Improvement of Sensors in Wireless Sensor


Networks....................................................................................................... 159
N. Pushpalatha, K. Ramani, and B. Anuradha

9. Internet of Things in Healthcare Wearable and Implantable


Body Sensor Network (WIBSNs)............................................................. 193
Anu Rathee, T. Poongodi, Monika Yadav, and Balamurugan Balusamy

Index......................................................................................................................225

v
http://taylorandfrancis.com
Preface

Recently, the Internet of Things (IoT) has received huge interest from scien-
tists and technology designers throughout the world and is considered the
next network generation in the near future. This concept starts from the idea
of building a network consisting of all real-life objects (things) in which they
can connect, interact, incorporate, and communicate data and information,
accomplishing complex tasks. This way, the strength of the Internet is fully
investigated in a highly effective way, bringing in practical applications in
many fields such as economy, information technology, military, etc. In prac-
tice, some specific applications of the IoT, namely smart home, smart traffic,
etc., have proven its feasibility, convenience and promising benefits.
However, the IoT can only be successfully applied within the support of
wireless sensor networks (WSNs). Today, the development of the Internet,
radio communications, and information technology has brought the poten-
tial development of WSNs. The sensor network might include different types
of sensors, such as earthquake sensors, magnetic field sensors, low-rate sam-
pling sensors, camera sensors, infrared sensors, sound sensors, radar, and so
on, which can monitor large areas under different conditions.
This volume is comprised of nine chapters, providing different techniques
for solving optimization problems in WSNs. An overview about WSNs is
given in Chapter 1, followed by an introduction to optimisation problems in
WSNs in Chapter 2, including major factors that need optimisation; ­problem
classification and well-known approaches to solve them; and current achieve-
ments and results. These first chapters provide readers with basic theoretical
knowledge about the topic and why it is demanding to push the boundaries
in this field. Chapter 3 discusses the application of machine learning (ML)
algorithms in WSNs, which play a crucial role in WSNs as they simplify
huge amounts of data generated and gathered at the central nodes in WSNs.
To elaborate the importance of using soft computing in this research topic,
Chapter 4 presents the relevance of soft computing techniques in the signifi-
cant management of WSNs and introduces soft computing techniques like
ant colony optimization and particle swarm optimization (PSO), artificial
neural networks (ANNs), perception, fuzzy logic, evolutionary computing,
and genetic algorithms in the management of WSNs. There is also a broad
analysis of this intelligence-based soft computing strategy as connected in
the different operational parts of wireless sensor networks. After that, the
following chapters discuss more narrowed optimization problems in WSNs
including their challenges, solutions, and achieved results. Chapter 5 con-
cerns intrusion detection systems in mobile ad hoc networks, in which the
definition of mobile ad hoc networks and different kinds of attacks are well-
elaborated. The performance of grammatical evolution is also analysed with

vii
viii Preface

ad hoc flooding and route disruption attacks on various mobility patterns of


the nodes on the network. Chapter 6 presents an introduction to cover­
age optimisation in WSNs. The problem is classified into smaller categories
of area coverage, target coverage and barrier coverage including an in-depth
discussion about state-of-the-art solutions and recent achievements. Chapters
7 and 8 concern cluster formation and sensor positioning in WSNs, respec-
tively. For any cluster-based routing technique, the major challenge is to effi-
ciently elect the cluster head (CH) nodes. The wrong choice of CHs lead to
early death of nodes and network collapse. Chapter 7 addresses this problem
and introduces an energy efficient protocol for cluster formation in WSNs.
Chapter 8 discusses alternative effective and efficient techniques to replace
the traditional ones that are more expensive, more energy-­consuming, face
connectivity failure problems, and are less accurate in performance. This
chapter mainly focuses on sensor deployment strategies to achieve optimum
coverage areas and minimize energy consumption. Finally, Chapter 9 is con-
cerned with an elaborate and illustrative discussion about the application
of IoT in the healthcare sector. The IoT healthcare system acts as a platform
between wearable and implantable body sensor networks (WIBSNs) with
specific needs. This chapter examines the various attributes associated with
WIBSNs and analyses its workings with respect to healthcare. It also gives
the reader an overall perspective of the entire ecosystem of IoT–based health-
care and the functioning of the associated components.
We would like to express gratitude to the authors for their contributions.
It would not have been possible to reach this publication quality without the
contributions of the many anonymous referees involved in the revision and
acceptance process of the submitted manuscripts. Our gratitude is extended
to them as well. As the editors, we hope this book will stimulate further
research in medical imaging applications-based algorithmic and computer-
based approaches and utilize them in real-world clinical settings. We would
also like to thank the reviewers for their diligence in reviewing the chapters.
Special thanks go to our publisher, CRC Press/Taylor & Francis Group.
We hope that this book will present promising ideas and outstand-
ing research results supporting further development of soft computing
approaches in solving optimization problems in WSNs.

Huynh Thi Thanh Binh, PhD


Hanoi University of Science and Technology, Vietnam

Nilanjan Dey, PhD


Techno India College of Technology, Kolkata, India
Editors

Huynh Thi Thanh Binh is an associate profes-


sor and vice dean of the School of Information
and Communication Technology (SoICT) at the
Hanoi University of Science and Technology
(HUST). She is head of the Modeling, Simulation
and Optimization Lab. Her current research
interests include computational intelligence, arti-
ficial intelligence, memetic computing and evo-
lutionary multitasking. She has published more
than 80 refereed academic papers/articles and
2 books and is the editor of 1 book. She is associ-
ate editor of the International Journal of Advances in Intelligent Informatics, VNU
Journal of Science: Computer Science Communication Engineering and serves on
the Editor Board of the Journal of Computer Science and Cybernetics. She has
served as a regular reviewer, and program committee member of numer-
ous prestigious academic journals and conferences, such as IEEE Transactions
on Vehicular Technology and Journal of Information Science and Engineering. She
is chair of IEEE Computational Intelligence Society Vietnam Chapter and a
member of the IEEE Women in Computational Intelligence subcommittee
(2017–2018). She is a member of a few IEEE Asia Pacific committees: Strategic
Planning, Membership Development, Individual Benefits and Services, and
Humanitarian Technology Activities.

Nilanjan Dey was born in Kolkata, India, in


1984. He received his bachelor’s degree in infor-
mation technology from West Bengal University
of Technology in 2005; his master’s degree in
information technology in 2011 from the same
University, and his PhD in digital image process-
ing in 2015 from Jadavpur University, India.
In 2011, he was appointed as an assistant profes-
sor in the Department of Information Technology
at JIS College of Engineering, Kalyani, India,
followed by the Bengal College of Engineering
and Technology, Durgapur, India, in 2014. He
is now employed as an assistant professor in
the Department of Information Technology at Techno India College of
Technology, India. His research interests are signal processing, machine
learning, and information security.

ix
x Editors

Dr. Dey is an Associate Editor of IEEE Access and is currently the ­editor
in-chief of the International Journal of Ambient Computing and Intelligence,
International Journal of Rough Sets and Data Analysis and the International
Journal of Natural Computing Research. He is the Series Co-Editor of Springer
Tracts in Nature-Inspired Computing (STNIC), Springer; Series Co-Editor of
Advances in Ubiquitous Sensing Applications for Healthcare (AUSAH), Elsevier,
and Series Editor of Computational Intelligence in Engineering Problem Solving
and Intelligent Signal Processing and Data Analysis, CRC Press (FOCUS/
Brief Series), and Advances in Geospatial Technologies (AGT) Book Series, (IGI
Global), US.
Contributors

B. Anuradha D. Praveen Kumar


Department of Electronics Computer Science Department
and Communication Engineering Indian Institute of Technology (ISM)
SV University College of Engineering Dhanbad, India
Tirupati, India
G. Kumaravelan
Balamurugan Balusamy Department of Computer Science
School of Computing Science and Engineering
and Engineering Pondicherry University
Galgotias University Pondicherry, India
Greater Noida, India
Ramchandra S. Mangrulkar
V. Bapuji Dwarkadas J. Sanghvi College
Department of Computer Science of Engineering
Vaageswari College of Engineering Mumbai, India
Karimnagar, India
B. Manjula
Huynh Thi Thanh Binh Department of Computer Science
School of Information Kakatiya University
and Communication Technology Warangal, India
(SoICT)
Hanoi University of Science and Nguyen Hai Nam
Technology Uppsala University
Hanoi, Vietnam Uppsala, Sweden

Anupkumar M. Bongale Prashil D. Negandhi


D Y Patil College of Engineering Dwarkadas J. Sanghvi College
Ambi, India of Engineering
Mumbai, India
G. Bhanu Chander
Department of Computer Science Nirmala C. R.
and Engineering Bapuji Institute of Engineering
Pondicherry University and Technology
Pondicherry, India Davangere, India

Nilanjan Dey Bibudhendu Pati


Department of Information Department of Computer Science
Technology and Information Technology
Techno India College of Technology Siksha ‘O’ Anusandhan University
Kolkata, India Bhubaneswar, India

xi
xii Contributors

Binod Kumar Pattanayak Anu Rathee


Department of Computer Science School of Computing Science
and Engineering and Engineering
Siksha ‘O’ Anusandhan University Galgotias University
Bhubaneswar, India Greater Noida, India

T. Poongodi D. Srinivas Reddy


School of Computing Science Department of Computer Science
and Engineering Vaageswari College of Engineering
Galgotias University Karimnagar, India
Greater Noida, India
D. K. Sah
N. Pushpalatha Computer Science Department
Annamacharya Institute Indian Institute of Technology (ISM)
of Technology and Sciences Dhanbad, India
Tirupati, India
Chaya Shivalingagowda
K. Ramani Department of Electronics
Department of I.T. and Communication
Sree Vidyanikethan Engineering GITAM University
College Visakhapatnam, India
Tirupati, India
Monika Yadav
Mamata Rath School of Computing Science
C. V. Raman College and Engineering
of Engineering Galgotias University
Bhubaneswar, India Greater Noida, India
1
Introduction to Wireless Sensor Networks

G. Bhanu Chander and G. Kumaravelan

CONTENTS
1.1 Introduction.....................................................................................................2
1.2 Wireless Sensor Networks............................................................................. 2
1.3 Types of Sensor Nodes...................................................................................3
1.3.1 Passive Sensors.................................................................................... 3
1.3.2 Active Sensors..................................................................................... 4
1.4 Sensor Node Description...............................................................................4
1.4.1 Sensing Unit.........................................................................................4
1.4.2 Processing Unit................................................................................... 5
1.4.3 Transceiver Unit.................................................................................. 5
1.4.4 Power Unit...........................................................................................6
1.5 Applications of Sensor Nodes.......................................................................7
1.5.1 Military Applications......................................................................... 7
1.5.2 Environmental Observation..............................................................8
1.5.3 Forest Fire Detection.......................................................................... 8
1.5.4 Pollution Monitoring.......................................................................... 8
1.5.5 Industrial Monitoring........................................................................8
1.5.6 Agriculture Monitoring..................................................................... 9
1.5.7 Health Monitoring.............................................................................. 9
1.5.8 Smart Home....................................................................................... 10
1.5.9 Power Grids....................................................................................... 10
1.5.10 Automobiles....................................................................................... 10
1.6 Protocol Stack of WSNs................................................................................ 10
1.6.1 Physical Layer.................................................................................... 10
1.6.2 Data Link Layer................................................................................. 12
1.6.3 Network Layer................................................................................... 12
1.6.4 Transport Layer................................................................................. 12
1.6.5 Application Layer.............................................................................. 12
1.6.6 Power Management Plane............................................................... 13
1.6.7 Mobility Management Plane........................................................... 13
1.6.8 Task Management Plane.................................................................. 13
1.7 Security Requirements in WSN.................................................................. 13
1.8 Attacks on Wireless Sensor Networks....................................................... 14
1.9 WSN Standards............................................................................................. 17

1
2 Soft Computing in Wireless Sensor Networks

1.10 Routing Protocols in WSNs......................................................................... 18


1.10.1 Sensor Protocols for Information Negotiation............................. 18
1.10.2 Low Energy Adaptive Clustering Hierarchy................................ 18
1.10.3 Threshold Sensitive Energy Efficient Sensor Network
Protocol............................................................................................... 20
1.11 WSN Simulations.......................................................................................... 21
1.12 WSN Operating Systems.............................................................................23
1.13 Challenges of WSNs..................................................................................... 24
References................................................................................................................ 26

1.1 Introduction
As the result of significant developments in the field of electronic communi-
cation, computer science, and information technology, we now have a new
computing and communication architecture known as wireless sensor net-
works (WSNs). In the past, wired sensors implemented into restricted appli-
ance areas produced low results only. Meanwhile, the convention of adapting
wireless technology produced sensor nodes which formulated more feasible
solutions prior to wired sensor nodes. Recently, there is a measurable benefit
with an immense possibility of connecting various devices and networks
together in an eloquent effort to address important issues and challenges.
The first wireless sensor network was a sound surveillance system devel-
oped by the US military in the 1950s to detect and track Soviet submarines [1].
This servicing technology is still at work today for monitoring undersea
wildlife and volcanic activity. Nowadays, with the rapid development of
the aforementioned WSN, this technology is easily deployed in the largest
geographical area that allows alike sensor nodes to gather the raw data and
communicate and transfer it in new applications [2].

1.2 Wireless Sensor Networks


Wireless sensor networks are a collection of undersized individual sensor
nodes. Depending on the application scenario, this number may be raised
to hundreds to thousands apiece, where a node is connected with additional
nodes. Each sensor node in a wireless sensor network observes its environmen-
tal phenomena and this collected information is transmitted to one or more
sink stations through a wireless link depending on the network deployment.
There are three main functionalities of sensor node: the first is sensing
its neighboring atmosphere, the second is processing the data which was
initially observed, and the third is communicating or connecting through
Introduction to Wireless Sensor Networks 3

FIGURE 1.1
Communication architecture of a wireless sensor network.

additional sensor nodes or sink stations within the network. Among these
above specifications, sensing the environment is the most important one.
WSNs can be structured in centralized, distributed, and ad hoc ways.
Figure 1.1 shows the general communication structure of a WSN. It primarily
consists of sensor field, sink node, and user or task management component.
Sensor nodes are deployed in a specific area is known as a sensor field. Each
sensor node in the sensor field is capable of sensing its own respective envi-
ronment phenomenon and routing the observed data to the sink node through
a multi-hop connection. A sink node is a special kind of sensor node which
collects data from the sensor field and performs the necessary operations or
simply forwards the collected data to the user or task manager node. In addi-
tion, it also sends queries to the sensor nodes in the network and retrieves the
required data. Finally, the user or task manager node accords an assignment
to each sensor node in the sensor field. Nevertheless, the sink node connects
with the user or task manager node via an Internet or satellite connection [1,2].

1.3 Types of Sensor Nodes


The sensor is used in a large range of constraints which correspond to healthi-
ness forms, such movements, electrical signals, thermal, and compelling energy.
Sensor nodes are mainly two types (1) passive sensors and (2) active sensors.

1.3.1 Passive Sensors
Passive sensors observe the data by active probing, which means their energy
is used only to amplify the analog signals. Passive sensors don’t require exter-
nal resources as their energy is used only to generate analog signals. These
sensors can change their physical properties (like capacitance) and generate
electrical signals. Again, these passive sensors are divided into two types’
passive omnidirectional sensors and passive narrow beam sensors.
4 Soft Computing in Wireless Sensor Networks

For passive omnidirectional sensor nodes, a particular geographical area is


given to each sensor node so that area sensor node moves and collect reliable
information and forward to the base station for further processing. The pres-
ent theoretical research work in wireless sensor networks assumes that sensor
nodes are omnidirectional. However, for passive narrow-beam sensor nodes, a
prearranged direction or notation is given to each sensor node in the same way
that cameras are able to shoot photos from only one direction. Sensor nodes can
move and collect data and transform to the base station from only one direction.

1.3.2 Active Sensors
Active sensor nodes sense the data by manipulating the environment which
means they need continuous energy to generate analog signals. Active sen-
sor nodes dynamically probe the neighboring environment and use an exter-
nal power supply of energy, which is needed to monitor and operate. Digital
sensors generate distinct indications which are later converted to digital
characterization based on the parameters measured. A single byte group
discrete values output is measured as the quantity. Analog sensors generate
continuous signals (such as temperature, pressure, and water flow), which
are measured as continuous analog signals.
Each sensor node is also called a mote but all motes are not always called
sensor nodes. Motes receive and transmit the data and employs some pro-
cessing techniques inside the sensor node, like compression, encryption etc.
So, sensor node operate like motes, but motes do not always operate as sen-
sor nodes [1–3].

1.4 Sensor Node Description


A sensor node is a tiny device that consists of four major hardware com-
ponents, namely the sensing unit, processing unit, transceiver, and power
generator. In addition, the sensor node also uses location devices such as
global positioning system (GPS) and a mobilizer. Figure 1.2 shows the basic
configuration of a sensor node.

1.4.1 Sensing Unit
A sensing unit observes its environmental phenomena for gathering infor-
mation (such as temperature, pressure, light, and displacement) as well as
producing the corresponding output as an optical or electrical signal. A
sensing unit basically consists of two parts; a sensor and an analog to digital
converter (ADC). In the sensor part, one or more sensors there produce the
analog signals, and these analog signals are transferred into digital signals
Introduction to Wireless Sensor Networks 5

FIGURE 1.2
Basic configuration of sensor node.

through the ADC and fed into a processing unit for supplementary opera-
tions. Based on the observed or gathered phenomena, sensor nodes are clas-
sified as thermal, optical, acoustic, or mechanical sensors.

1.4.2 Processing Unit
A processing unit includes two parts; storage plus a processor. A storage
component, which works as nonvolatile memory used to store programming
instructions, temporarily stores sensed data. Also, it will store processed
data on occasion. The processor in sensor node makes the sensor node col-
laborate with other nodes in the network to complete the designated exer-
cise. The microcontroller performs tasks, processes the data, and controls the
other functionalities of a sensor node. Because of some special characteris-
tics of microcontrollers, like low cost, easy attachment with supplementary
apparatuses, effortlessness of training, and squat power utilization, micro-
controllers are used in sensor nodes. ATMEL, At mega 128L, and MSP430
are the most commonly used microcontrollers because they have power sav-
ing capabilities. Among these, MSP 430 has six different power modes from
wholly energetic to wholly powered down. These kinds of power reduction
approaches enlarge the system lifetime and make the sensor node live longer.

1.4.3 Transceiver Unit
The transceiver attaches the node to the network. It is an amalgamation of
transmitter and receiver to a solitary device which works on specific radio
frequency (RF). The RF message requires modulation, filtering, multiplexing,
band bass, and demodulation, which makes it more complex and expensive.
Basically, sensor node uses industrial scientific medical bands (ISM) which
6 Soft Computing in Wireless Sensor Networks

provide a radio band at no cost with comprehensive accessibility. There are


three transmission technologies offered in wireless transmission; optical
communication, infrared, and radio frequency. First, optical communication
requires low power, line of sight, and squat at atmospheric circumstances.
Second, infrared communication has no need for antennae, but has a low
broadcasting capacity. Third, radio frequency communication is the most
relevant method best suited for wireless transmission because it provides
free spectrum at 173, 433, 868, and 915 MHz and 2.4 GHz. The progression
of a mote template is a 4 MHz Atmel AVR 8535 microcontroller amid 8 KB
instruction flash memory, 512 bytes random access memory (RAM) and
512 bytes electrically erasable programmable read only memory (EEPROM).
Tiny OS Operating systems consist of 3500 byte space of OS code as well as
4500 byte space offered for code. The evolution of another sensor node tem-
plate, namely an AMPS posse 59–206 MHz SA-1110 microprocessor, is run on
a multithreaded operating system [2–4].
The majority of sensor nodes use low-rate, wireless personal area networks
which are IEEE 802.15.4 standard. Standard meaning the transceiver has four
operational modes, like transmit, receive, idle, and sleep. In receive and idle
mode, the power consumption of the transceiver is the same. However, the
transceiver should initiate sleep mode and not be left in idle mode when it is
not actively working, otherwise considerable energy will be wasted. It will
simply interchange from sleep state to the active broadcast or receive state [1].

1.4.4 Power Unit
The sensor node is a small microelectrical appliance which consists of low
energy. The power unit sustains the sensor node in a rough and uncondi-
tional environment where changing batteries is expensive and difficult.
Mainly, sensor nodes use their energy for sensing, transmission, and data
aggregation purposes. Among these aforemention operations, the transmis-
sion of information consumes the majority of energy, compared to the other
operations. The power source of a sensor node is constituted by a recharge-
able or nonrechargeable battery. Rechargeable sensor nodes are capable to
renovate their power from the nature circumstances like solar, high tem-
perature differences, and pulsation. Non-rechargeable sensor nodes must be
competent to operate until either the assignment time is completed or the
battery is replaced. However, based on the application scenario, the lifetime
of sensor node will be decided. For example, scientists monitoring the pres-
ence or age of ice (especially in the form of glaciers) or observing the bed
slides in the ocean need the sensors able to work continuously. When the
sensors are deployed in the battlefield, finding the temperature in particular
area may need a few hours or days. In the past, the batteries of tiny sensor
nodes were manufactured with vanadium and molybdenum oxide. Future
energy exploration from the environment occured because sensor nodes
operated in irregular places. The battery for sensor nodes should be as small
Introduction to Wireless Sensor Networks 7

and efficient as possible. Nickel–zinc, lithium–ion, and nickel–metal hydride


electrochemical objects are used for their electrodes.
In addition, some routing protocols and specific applications need the loca-
tion of a sensor node because they are generally deployed in unconditional
areas and need to collaborate with other sensor nodes about their present
location for the transmission of data, which is possible by a location finding
system. A mobilizer is an optional component in the description of a sensor
node which moves the sensor node from one place to another place to com-
plete the assigned task.

1.5 Applications of Sensor Nodes


Wireless sensor networks are deployed in an irregular environment with a
wide range of applications. There are many types of sensor nodes (seismic,
acoustic and thermal, radar, visual, etc.) in WSNs which extend their basic
applications. WSNs are comprehensively used in areas such as environment
monitoring, tracking, crisis management, monitoring patients, radioactivity
detecting, detecting dangerous material such as explosives, security and sur-
veillance, underground material structures, critical infrastructure, office and
home automation, traffic control, disaster and flood intimation, and identifi-
cation [5–7].

1.5.1 Military Applications
Wireless sensor network implementation primarily began with the military
application with the formation of DARPA and enemy tracking. Since sensor
nodes are densely deployed, if some sensor nodes are destroyed by antago-
nistic actions, it doesn’t influence or affect the military operation. This makes
sensor nodes ideal for the battlefield. Using appropriate sensors in the spe-
cific network area, the identification of enemy forces, movement detection,
analysis, and progress of their movement can be achieved. Sensor nodes pro-
vide the following services in the battlefield [5]:
Battlefield Surveillance: Information from the border, battlefield and
some other vital behavior in the area will be gathered by the sensor node.
Targeting: Sensors are placed in weapons and collect information about
targets (like motion, movement, angle, distance, etc.) which can be sent to the
shooter. This sensor is used for better target estimation.
Intrusion Detection: Sensor nodes are used to identify the intrusion in
the network and sounding an alarm. The defense system will then assess an
appropriate recourse for the attack.
Monitoring Forces: Sensor nodes monitor the movement of troops and
tanks, and report that information to the base station.
8 Soft Computing in Wireless Sensor Networks

Target Classification: Some particularly designed sensors can monitor suspi-


cious objects to better track potential enemies. An endocrine-based intelligent
distributed cooperative algorithm (EIDCA) is proposed for soldier tracking.
Battle Damage Evolution: Sophisticated sensor nodes can be deployed to
estimate the damage of battle affected areas.

1.5.2 Environmental Observation
Sensor nodes play an important role to supervise and estimate the environ-
mental conditions of large geographic areas (like temperature, humidity, rain-
fall, etc.) which help in pollution monitoring, forest fire detection, and flood
detection. The first well-known wireless sensor network for weather coverage
was an automated real-world evaluation in real time (ALERT). ALERT can pro-
duce real-time information concerning rainfall and water levels to estimate the
possibility of flooding. Environmental monitoring is broadly divided into two
types; indoor and outdoor monitoring. Indoor monitoring is used for build-
ings and offices. This application involves sensing humidity, temperature, and
air quality. Examples of outdoor monitoring applications are volcanic erup-
tions, earthquakes, chemical hazard detection, and weather forecasting [6].

1.5.3 Forest Fire Detection


Sensor nodes placed in forests are used to detect fires. Some specially
designed sensor nodes are used to measure the temperature, humidity, air
direction, and the speed of air, which helps to determine the level of fire risk.
Wireless sensor networks locate the starting point of the fire and alert the
respective authorities to put it out.

1.5.4 Pollution Monitoring
Wireless sensor networks can be employed towards monitoring and exam-
ining the pollution intensity in a particular area. Sensor nodes, which are
deployed around the city, can be used to estimate the respective environ-
mental factors, and accordingly producing a warning signal when these
factors reach their aforementioned threshold limit. For example, LTE-M
module–based Zigbee wireless sensor nodes are kept on the stations of pub-
lic vehicles to collect data, and are sent to the cloud base station for further
processing of the pollution level.

1.5.5 Industrial Monitoring
Industries are mostly using wireless sensor networks for determining the
level of output quality in its operation and also in cost-reduction procedures.
For example, in nuclear power projects, sensors are used to monitor the water
level in the tank and the temperature and pressure in refrigerators. One
more central application of sensor networks is to supervise machine health.
The aspiration of this application is to detect the defective parts of equipment
Introduction to Wireless Sensor Networks 9

which need to be repaired or replaced. Inventory control is another impor-


tant problem in big industries. The globalization of larger industries makes
it difficult to manage their equipment and products, so, the management of
these companies achieved through wireless sensor networks.

1.5.6 Agriculture Monitoring
The use of wireless sensor networks in the agriculture research community
has been increasing rapidly. Sensor nodes sense parameters like tempera-
ture, humidity, soil moisture, and sunlight of the agriculture field so the nec-
essary precautionary measures will be given to its stakeholders to increase
the harvest. The LOFAR-Agro project is used in potato fields for crop moni-
toring. Here, wireless sensor networks are used to detect where the potatoes
are infected by disease. By locating such areas, the use of pesticides is mini-
mized and confined to susceptible areas.

1.5.7 Health Monitoring
In this application, patients are outfitted by collective sensors on special
points of their anatomy to supervise patient metrics, such as blood pressure,
heart rate, etc. Home-based wireless ECG monitoring systems exploiting
Zigbee technology are considered some of the applications that take advan-
tage of health monitoring. Such methods can helpful for supervising people
in their homes, along with periodic supervising by a general practitioner.
Electrocardiograms (ECG) are imperative for detecting heart disease abnor-
malities. Clinical ECG equipment may be functional for short-range inspec-
tion, but are impractical for home health use. In recent times, wireless ECG
supervising systems have been created that are compatible with Bluetooth,
as well as Zigbee, protocols. A Zigbee device is capable to advocate unfailing
multi-hop, self-organizing, and mesh network which steadies the appliance
software layers considered by the IEEE 802.15 plus Zigbee alliance. Zigbee
can provide with diminutive energy connectivity along with an undersized
rate for the equipment that necessitates prolonged battery continuation [8].
Wireless capsule endoscopy (WCE) suggests an illustrated inspection of the
entire gastrointestinal (GI) tract and the rationalized analytical progression
of undersized bowel illness, moreover the triumph over the boundaries of
conventional diagnosing equipment. In order to strengthen the WCE, compu-
tational procedures can be implemented for specific capsule localization and
tracking. For perfect understanding of the wireless capsule endoscope (WCE)
location point toward the wrongdoing position which plays an essential role
for dissimilar reasons including perfect localization of injuries plus mecha-
nized CE direction-finding. Localization is fulfilled by several localization
techniques such as received signal strength (RSS)–based localization, time of
arrived (TOA)–based localization, magnetic-based localization, image-based
localization, and date of arrived (DOA)–based localization [9].
10 Soft Computing in Wireless Sensor Networks

1.5.8 Smart Home
Remote management of home applications is achievable by using some inte-
grated, specially designed sensor nodes. Sensor nodes can be deployed in
household devices like microwaves and washing machines, and can be main-
tained without the need for human interaction. Sensor nodes share some com-
mon resources like water, heaters, and electricity in the intelligent home projects.

1.5.9 Power Grids
Wireless sensor nodes deployed in power grid applications provide neces-
sary information regarding eclectic utilization, which makes them more
efficient. Sensor nodes are used for measurement and tracking energy pro-
duction and consumption to monitor the entire surrounding area. If there
are any abnormal positions detected, the nodes will send that diagnostic
information to an authority to solve these problems.

1.5.10 Automobiles
Sensor networks have been used to monitor and track vehicles for a long time.
A common example would be video cameras that are fixed at a particular area
to observe traffic. The videos are sending to a human operator, and as a low-
cost replacement for video cameras, small sensor nodes are installed to moni-
tor traffic. Sensor nodes take pictures of traffic, which are sent to a human
operator or automatic controllers, and take control signals. Sensor nodes are
installed in particular vehicles to monitor and track their movements.

1.6 Protocol Stack of WSNs


In WSNs, sensor node energy consumption has an effect on the configura-
tion of protocol layers in addition to managing the sensed data at every level.
Protocol stacks (see Figure 1.3) are used in sensor and sink nodes inside the
network and consist of a physical layer, data link layer, network layer, trans-
port layer, application layer, power management plane, mobility manage-
ment plane, and task management plane [1–4].

1.6.1 Physical Layer
The physical layer is designed for modulation, carrier frequency generation,
and transmission, as well as for receiving techniques, signal detection, and
frequency selection. The transmission links of wireless sensor networks are
twisted based on infrared, optical, and radio. Sensor nodes present employ-
ment based on radio frequency design. So, the physical layer typically takes
care of communication-based radio links.
Introduction to Wireless Sensor Networks 11

WSN protocol stack suite.


FIGURE 1.3
12 Soft Computing in Wireless Sensor Networks

1.6.2 Data Link Layer


The data link layer is compiled with error detection, error control, and
medium-access control plus data stream. The medium access control (MAC)
layer set of rules deal with energy conservation and avoiding a collision
with neighboring nodes. MAC layers also handle another important issue
called energy consumption, where the MAC layer allows sensor nodes to
self-organize by establishing communication links hop-by-hop. For design-
ing a MAC layer protocol for a wireless sensor network, we ought to obtain
dissimilar limitations like recovery failures, power preservation (suitable for
low-power devices), and limited computational ability.

1.6.3 Network Layer
The network layer permits direction-finding of statistics data throughout a
wireless communication channel. Sensor networks are without infrastruc-
ture and are multi-hop, where each sensor node as source node collects
sensed data and transmits the sensed data to the reliable sink node. So, it
is important for the network layer to route the data in the direction of sink
node. Because of limited power resource protocols which are designed in
traditional and ad hoc networks, this method is not appropriate for wireless
sensor networks. We have numerous tactics to route the data as a routing
power expenditure through a vacant power platform on vigor metrics, and
data-centric routing stands on important dissemination.

1.6.4 Transport Layer
The transport layer affords logical communication among the application
process operations on different hosts within the main network and supple-
mentary networks. The transport layer mostly preserves data flow when the
application layer demands it. Designing a set of rules on the network layer
is very complicated, since the sensor node parameters are mostly affected by
numerous limitations like restricted power and memory. This layer is princi-
pally compulsory, while the organization is premeditated to be contacted via
the Internet or extra peripheral networks.

1.6.5 Application Layer
The application layer sustains several contradictory software applications on
the sensibility assignment. There are many application areas which are well-
designed, although prospective relevance layer protocols for sensor networks
are still laregly unsophisticated. There are three eventual relevant layer proce-
dures designed for the application layer, which are as follows: the sensor man-
agement protocol (SMP), the sensor query and data dissemination protocol
(SQDDP), and the task assignment and data advertisement protocol (TADAP).
Discovering Diverse Content Through
Random Scribd Documents
The Project Gutenberg eBook of Vivian's
Lesson
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: Vivian's Lesson

Author: Elizabeth W. Grierson

Illustrator: Hilda Cowham

Release date: December 10, 2015 [eBook #50659]


Most recently updated: October 22, 2024

Language: English

Credits: Produced by Emmy, MFR and the Online Distributed


Proofreading Team at http://www.pgdp.net (This file was
produced from images generously made available by The
Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK VIVIAN'S LESSON


***
VIVIAN’S LESSON
They made such a pretty picture that
there was quite a burst of applause.
V. L. Page 33.
VIVIAN’S LESSON
By
ELIZABETH W. GRIERSON
Author of
‘Children’s Tales from Scottish Ballads,’
‘The Children’s Book of Edinburgh,’ &c.

WITH TEN ILLUSTRATIONS


by
Hilda Cowham

LONDON AND EDINBURGH


W. & R. CHAMBERS, LIMITED
Philadelphia: J. B. LIPPINCOTT COMPANY
1907
Edinburgh:
Printed by W. & R. Chambers, Limited.
CONTENTS.
CHAPTER PAGE
I.WHAT BEGAN IT 1
II. AN INVITATION 11
III.GOING TO LONDON 19
IV. THE CHRISTMAS TREE 29
V. A FALSE STEP 40
VI. A GAME OF HIDE-AND-SEEK 54
VII. ANOTHER INVITATION 70
VIII. THE BROKEN WINDOWS 80
IX. THE MAN IN THE SUMMER-HOUSE 92
X. BURGLARS 103
XI. THE DOCTOR’S VISIT 121
XII. THE DARK SHADOW 135
XIII. A DREARY HOMECOMING 156
XIV. VIVIAN CONQUERS 166
XV. ANOTHER MYSTERY 179
XVI. A VAIN SEARCH 193
XVII. MADAME GENVIÈVE 203
XVIII. RUNNING AWAY 214
XIX. THE JOURNEY 223
XX. MONSIEUR THE VICOMTE DE CHOISIGNY 236
XXI. THE OPINION OF DR JULES 245
XXII. MR MAXWELL FINDS OUT THE TRUTH 254
XXIII. A HAPPY MEETING 265
XXIV. A FRESH BEGINNING 277
XXV.WESTWARD HO! 285
LIST OF ILLUSTRATIONS.
PAGE
They made such a pretty picture that there was quite a
burst of applause Frontispiece.
They were a merry party as they walked across the
snowy meadow to church 17
The children set to work and transformed the hall into
a perfect bower 29
‘But what is that bundle of rags for?’ went on Vivian,
putting up his hand to pull them down 59
Isobel lay down with a story-book on the schoolroom
sofa, and soon fell into a heavy sleep 64
There, to his horror, looking through the gap, was a
rough-looking man, with a stubbly beard, and a
92
dirty white muffler twisted loosely round his
neck
At last a tiny red speck appeared under the yellow
lamp, and began to move slowly up the road 162
‘Thou lazy dreamer!’ she said, pulling him to his feet by
205
the collar of his blue cotton blouse
He sank gratefully into the soft bed of straw which the
kind countryman made up for him, and had
fallen into a feverish sleep 231
‘Mother, oh mother!’ he cried. . . . ‘Can you forgive me?’ 266
VIVIAN’S LESSON.
CHAPTER I.

WHAT BEGAN IT.

‘C OME on, Vivian. It is high time we were going home; you know
we promised mother that we would come off the ice at half-
past four.’
‘Well, so we will; but it is only five-and-twenty past now, so we
have plenty of time for one turn more. Come on, old stupid; you are
always frightened of being late;’ and the younger of the speakers, a
brown-eyed, mischievous-looking lad of about eleven, swung off
with his three companions, leaving his brother standing watching
them, a troubled look on his face.
He hated to make a fuss, and he did not want to leave the ice a
moment sooner than he could help; but a promise is a promise, and
he had given his word that they would be ready to leave the pond at
the half-hour. It was later than they were generally allowed to stay;
but it was Saturday afternoon, and there were signs of a thaw, so,
as the ice might not last till Monday, their father had agreed to an
extra half-hour on condition that they left the ice punctually and
hurried home.
Vivian had given his word readily enough, and had meant to keep
it; but now, as he flew round and round the pond, crying ‘Just one
turn more,’ he seemed to have forgotten all about his promise.
Ronald sat down and took off his skates, then stepped on the
path, and stood buckling them together.
‘Come on, Vivi,’ he entreated. ‘It is the half-hour now, and you
know how anxious mother will be.’
‘All right,’ said Vivian a little sulkily, ‘I suppose I must; but it is an
awful nuisance, when we may not have such lovely ice all winter
again.’
‘I should think so,’ struck in Fergus Strangeways. ‘I am thankful
that father doesn’t make us come in so soon. Why, the moon will be
up in no time, and we will stay on quite late. Captain Laing and he
are coming down before dinner, and Captain Laing promised to show
us how to cut the “Figure Eight.”’
‘How jolly!’ said Ronald a little wistfully, while Vivian bent his head
over his straps and pretended not to hear.
‘Couldn’t you stay, really?’ asked Charlie Strangeways, Fergus’s
elder brother; ‘you could come in and have tea with us. I dare say
Dr Armitage would know where you were; it is going to be lovely
moonlight, and it isn’t as if we were to be alone all the time. I don’t
suppose that he would have minded if he had known that the dad
and Captain Laing were coming.’
‘Oh, do let us stay, Ronald! I’m sure father wouldn’t mind. You
know he did say that he would have taken us out by moonlight
himself if he had not been so busy,’ pleaded Vivian.
‘No, Charlie,’ said Ronald firmly. ‘It is very good of you to ask us,
and it would have been splendid fun; but father didn’t know about
your father and Captain Laing, and he would wonder where we
were. Besides, we promised.—So hurry up, Vivian.’
‘What a stick you are, Ronald!’ said Fergus; ‘you can’t change a
bit, even when circumstances change. Just because Dr Armitage said
that you couldn’t be out alone here after dark, you spoil all the fun
by going off, although it is very different now that father and Captain
Laing are coming.’
‘Don’t be stupid, Fergus,’ put in Charlie good-naturedly. ‘If they
promised, they must go. Besides, it is a long way over to Holmend;
it is easy for us with our house close by.’
Charlie was fifteen, and a public school boy, so his word carried
weight with it, and his brother was silent, while Vivian took up his
skates more cheerfully.
‘We’ll see you in the beginning of the week,’ went on Charlie; ‘we
are going to practise shooting on Tuesday if the frost doesn’t hold,
we have got such jolly little pistols from Uncle Don; they carry quite
a long way, and one can kill a bird with them. You must come over
and bring yours; the Doctor is going to give you a pair for Christmas,
isn’t he?’
Poor Vivian turned hot all over. If there was one thing in the world
he was frightened of, it was being laughed at. As a rule, the boys
were at liberty to choose their Christmas presents; and when, a
fortnight before, Fergus had told him of his uncle’s intended present,
he had instantly agreed to ask his father for the same, and great
had been his disappointment and dismay when his request met with
a grave refusal.
‘A pistol for your Christmas present! Not if I know it, my boy.
What! Fergus and Vere and Charlie going to have them? Well, if I
mistake not, they will be in my hands shortly. No, no; if their father
likes to risk their lives, that is no reason why I should risk yours.
Now, don’t look so glum; I know what I am talking about. If you had
seen the case I saw over at Whitforth the other day: a lad older than
either Ronald or you had got hold of one of these pistols, and it
went off in his little brother’s face. I don’t want to harrow your
feelings, but,’ and the Doctor’s voice dropped, and he spoke sadly,
‘that poor little chap will never be able to see again. No; I’ll give you
anything you like, in reason, for your Christmas present, but a pistol
is out of the question.’
At the time the explanation had been sufficient, but now Vivian’s
eager little spirit felt very rebellious.
Fergus Strangeways was just a year older than he was, and surely
he was as capable of being careful as Fergus. How Fergus and Vere
would laugh at him if they knew the whole story! He flashed a
warning look at Ronald, but Ronald did not seem to understand.
‘We may come out to watch,’ he said in his quiet voice; ‘but father
won’t let us have pistols yet. He says we are too young. He has
promised to give us proper guns when we are sixteen. He will not let
us shoot before that.’
The pitying looks on his companions’ faces were quite lost on
Ronald, who was only thinking of his promise to be home in good
time; but they stung Vivian even more than the words that followed.
‘What a nuisance it must be to be so well looked after! You’ll grow
into regular muffs if you don’t look out.’
‘I would give you a licking for that, just to judge if the symptoms
are beginning, but I haven’t time to-night,’ said Ronald, with a laugh,
conscious that none of the boys could stand up against him; and he
walked off whistling through the woods, followed by Vivian, who was
fuming with rage and injured pride.
‘What made you go and give me away like that?’ he asked
presently. ‘You know there is a talk of our going to Aunt Dora’s next
week. I know, anyhow, because mother had a letter, and if only you
had held your tongue I would have said that very likely we would be
away from home, and they need never have known anything about
father not letting us have these pistols. Now Fergus will go all over
the place laughing at us for a couple of babies;’ and he kicked at the
fallen leaves viciously in his vexation.
‘As if I minded what Fergus Strangeways says!’ retorted Ronald
scornfully; ‘why, he’s the veriest little ass going. He may get a pistol,
but I bet you a sixpence that he daren’t let it off, in spite of all his
bluster. Besides, I knew nothing about any invitation to Aunt Dora’s;
and if I had, I wouldn’t have been such a sneak as to pretend that
that was the reason that we couldn’t go to shoot with them. Of
course it is a nuisance. I would have liked a pistol as well as you;
but father would not have hindered us having one if he had not had
good reasons, and now that he has promised us that lovely camera
I’m sure we can’t grumble.’
‘That’s all very well for you,’ growled Vivian; ‘you always were a
bit of a muff, with your music, and your photographs, and your
collections. “The paragon” the other boys call you behind your back,
for they say that you haven’t enough spirit in you to do anything
wrong.’
‘They had better say it to my face then, and I’ll give them what
for, and you too for listening to such rot,’ said Ronald hotly; and then
he laughed at his own vehemence. ‘Don’t let us quarrel on Christmas
Eve,’ he went on pleasantly; ‘I’ll race you across the meadow.’
They set off at a run, and by the time they had reached the
garden gate, hot and breathless, they had almost forgotten the
cause of their anger.
‘There is mother at the window, and Dorothy,’ cried Vivian, waving
his cap. ‘Doesn’t a lit-up room look jolly and comfortable when one
is outside? After all, I am rather glad that we didn’t stay any longer
at the lake, for I am awfully hungry, and I expect there is a
scrumptious tea in the schoolroom.’
As they went into the hall of the long, low red house, a little
figure in white ran out to meet them.
‘Hurry, quick!’ she lisped, ‘we’s going to have tea wif muvver, an’
then we’s going to dec’rate. Black has brought in such a lot of green
stuff, heaps an’ heaps, all p’ickles. Dorothy knows, ’cause she hurted
her fingers.’
‘Dorothy was well warned, so it was her own fault,’ said a clear
voice behind her, and Mrs Armitage appeared in the hall. Tall, slim,
and graceful, with a wealth of rippling hair and a sweet pale face, it
was no wonder that to the boys mother was the centre of their
world.
‘Quickly, boys, run upstairs, get off those dirty boots, and get
ready for tea. Father has been called out, and may not be home till
quite late, so I will have it with you in the schoolroom, and
afterwards we will try to get the hall decorated before he comes
back. You know how he loves to see the greenery.’
After tea, Ellen the housemaid was pressed into the service, so
the decorations went on merrily; and as Vivian stood on a ladder
fastening up the wreaths of bright holly which his mother’s quick
fingers wove so rapidly, while little Dorothy ran about, proud in the
belief that she was helping every one, he thought quite pityingly of
the Strangeways, who had no mother or little sister, although they
might possess pistols and skate in the moonlight while he had to
come home.
CHAPTER II.

AN INVITATION.

C HRISTMAS Day dawned clear and bright. All prospects of a thaw


seemed to be gone, for the frost had been very keen during the
night, and every little twig on the trees glittered in the sunshine as if
it were set with diamonds.
‘What a day for skating!’ said Ronald at breakfast-time, after
good-mornings and good wishes had been passed round. ‘It almost
makes one wish that Christmas had not fallen on a Sunday this year.’
‘Oh Ronnie!’ said little Dorothy aghast. ‘You touldn’t go skating to-
day. Tink of the pudding, and we’s going to have ’sert. I saw muvver
putting it out—oranges, an’ nuts, an’ ’nannas.’
‘Yes; but, Pussy, Christmas dinner is like the frost, it doesn’t last
for ever,’ said Ronald, lifting his little sister into her place between his
mother’s chair and his own, while everyone laughed at her remark.
‘Never mind,’ said Mrs Armitage, ‘even if it had been a week-day—
what with church, and dinner, and presents—there would not have
been much time for skating; besides,’ glancing out of the window as
she spoke, ‘I do not think that it will last like this all day. I fancy we
will have a fresh fall of snow ere night. Here comes father, so you
may begin, boys.’
Dr Armitage was a pleasant-looking man, of about middle age,
with a kind, open face, and keen gray eyes. The likeness between
him and his eldest son would have told a stranger at once what
relationship there was between them.
‘Well, boys,’ he said cheerfully, turning over a pile of letters as he
spoke, ‘has mother told you the news yet?’
‘What news?’ they asked eagerly, while their mother shook her
head in mock displeasure.
‘Oh Jack, you cannot keep a secret!’ she said, laughing. ‘I did not
mean to tell them till after church. It will keep running in their heads
all through the service. However, there is no help for it now.—How
would you like to go to London, boys? To Aunt Dora’s, for a whole
week by yourselves?’
‘To Aunt Dora’s, mother? Has she asked us? Oh yes, I remember,
Vivian said’—— Ronald broke off abruptly.
Vivian’s remark of the previous afternoon about an invitation to
Aunt Dora’s had flashed into his mind, and he was just going to ask
him how he had heard the news when a frightened, warning look on
his brother’s face checked him.
‘Oh, how jolly!’ he went on, in some embarrassment, after a
moment’s hesitation; ‘we have never been away ourselves before.
Will you let us go, mother?’
His mother did not seem to notice his confusion, nor the puzzled
look which he wore as he relapsed into silence, and sat watching his
brother, who was talking rapidly, his eager little face flushed and his
eyes sparkling.
‘Yes, I think so,’ she replied, ‘if you promise to be very good boys.
You are old enough now to be trusted away from home alone, so
father and Dorothy and I must make up our minds to a quiet house
for a week, for I wrote to Aunt Dora yesterday to say that you will
be at Victoria at four o’clock on Monday afternoon.’
Breakfast was finished amidst much excited discussion as to what
should be taken in the way of garments and portmanteau. A listener
would have thought that the boys were going to America at least;
but to lads of eleven and thirteen a first visit to London alone is a
treat indeed.
As they were running upstairs to get ready for church, Mrs
Armitage laid her hand on Vivian’s shoulder and drew him into her
room.
‘What did Ronald mean at breakfast by saying that you had told
him about Aunt Dora’s invitation, Vivian?’ she asked. ‘How did either
of you come to hear of it?’
The little boy rubbed the point of his toe uneasily on the carpet.
‘Ronald is always thinking that I say things,’ he answered
evasively, ‘and getting a fellow into a scrape. If he would only mind
his own business.’
‘Nay, Vivian, that is unjust; you know Ronald would be the last
person in the world to get you into a scrape; and in this case there is
no scrape to get into, unless you choose to make one. If by any
chance you found out anything about the invitation, as it seems you
must have done, it probably was a mistake.’
‘Yes, mother, that was just it, it was a mistake,’ said Vivian,
interrupting her eagerly. ‘There was a letter of Aunt Dora’s lying on
your desk, and I saw a bit of it when you sent me to get those
receipts.’
‘But you must have taken time to read it, did you not?’ said his
mother gravely; ‘that could not be a mistake. I thought perhaps you
had heard father talking to me about it; we sometimes hear things
that are not intended for us to hear, but then the honourable thing
to do is to say frankly that you did hear it. To read a letter that is not
intended for you is quite a different matter. I did not think a son of
mine would have done that.’
The tears came into Vivian’s eyes. He loved his mother
passionately, and any appeal from her touched his proud little heart.
‘It really was a mistake at first, mother. When I was looking about
for those receipts, I saw the letter lying spread out, and I could not
help seeing one sentence. “I hope you will let the boys,” it began,
and I did so much want to know what it was that Aunt Dora wanted
you to let us do, so I took up the piece of paper and looked over on
the other side. I was sorry in a moment, but I did not like to tell.’
‘No, that is just it,’ said his mother. ‘You did not like to tell, and so
you were tempted at breakfast this morning to talk as if you knew
nothing about it. That was not exactly telling a lie, Vivian; but do
you not think that it was acting one? I think that is your besetting
sin, my boy. You know that we all have a sin that we must specially
fight against, and I want you to try and fight against yours. You
have not the moral courage to confess when you have done
something wrong, but you try to shuffle and explain things away, so
as to hide what you have done. You have plenty of courage in other
ways, quite as much, if not more, than Ronald. You have the kind of
courage that would make you fight, or face danger; but there is a
higher kind of courage than that, and I want you to try and gain it. I
mean the courage that will tell the truth, even when the truth is not
pleasant, and when you may get laughed at for telling it, and which
will own up to a fault rather than try to hide it.

You might also like