Advanced Intelligent Systems For Sustainable Development AI2SD 2018 Vol 1 Advanced Intelligent Systems Applied To Agriculture Mostafa Ezziyyani
Advanced Intelligent Systems For Sustainable Development AI2SD 2018 Vol 1 Advanced Intelligent Systems Applied To Agriculture Mostafa Ezziyyani
com
https://textbookfull.com/product/advanced-intelligent-
systems-for-sustainable-development-
ai2sd-2018-vol-1-advanced-intelligent-systems-applied-to-
agriculture-mostafa-ezziyyani/
OR CLICK HERE
DOWLOAD EBOOK
https://textbookfull.com/product/intelligent-systems-for-crisis-
management-gi4dm-2018-orhan-altan/
textbookfull.com
Advanced
Intelligent Systems
for Sustainable
Development
(AI2SD’2018)
Vol 1: Advanced Intelligent Systems
Applied to Agriculture
Advances in Intelligent Systems and Computing
Volume 911
Series editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa
Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, School of Computer Science & Electronic Engineering, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Department of Information Technology, Faculty of Engineering Sciences, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA
e-mail: [email protected]
Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, Faculty of Engineering and Information, University of Technology Sydney, Sydney, NSW, Australia
e-mail: [email protected]
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wrocław University of Technology, Wrocław, Poland
e-mail: [email protected]
Jun Wang, Department of Mechanical and Automation, The Chinese University of Hong Kong, Shatin,
Hong Kong
e-mail: [email protected]
123
Editor
Mostafa Ezziyyani
Computer Sciences Department,
Faculty of Sciences and Techniques
of Tangier
Abdelmalek Essaâdi University
Souani Tangier, Morocco
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
Overview
The purpose of this volume is to honour myself and all colleagues around the world
that we have been able to collaborate closely for extensive research contributions
which have enriched the field of Applied Computer Science. Applied Computer
Science presents a appropriate research approach for developing a high-level skill
that will encourage various researchers with relevant topics from a variety of
disciplines, encourage their natural creativity, and prepare them for independent
research projects. We think this volume is a testament to the benefits and future
possibilities of this kind of collaboration, the framework for which has been put
in place.
v
vi Preface
Prof. Dr. Mostafa Ezziyyani, IEEE and ASTF Member, received the “Licence en
Informatique” degree, the “Diplôme de Cycle Supérieur en Informatique” degree
and the PhD “Doctorat (1)” degree in Information System Engineering, respec-
tively, in 1994, 1996 and 1999, from Mohammed V University in Rabat, Morocco.
Also, he received the second PhD degree “Doctorat (2)” in 2006, from Abdelmalek
Essaadi University in Distributed Systems and Web Technologies. In 2008, he
received a Researcher Professor Ability Grade. In 2015, he receives a PES grade
—the highest degree at Morocco University. Now he is a Professor of Computer
Engineering and Information System in Faculty of Science and Technologies of
Abdelmalek Essaadi University since 1996.
His research activities focus on the modelling databases and integration of
heterogeneous and distributed systems (with the various developments to the big
data, data sciences, data analytics, system decision support, knowledge manage-
ment, object DB, active DB, multi-system agents, distributed systems and media-
tion). This research is at the crossroads of databases, artificial intelligence, software
engineering and programming.
Professor at Computer Science Department, Member MA laboratory and
responsible of the research direction Information Systems and Technologies, he
formed a research team that works around this theme and more particularly in the
area of integration of heterogeneous systems and decision support systems using
WSN as technology for communication.
He received the first WSIS prize 2018 for the Category C7: ICT applications:
E-environment, First prize: MtG—ICC in the regional contest IEEE - London UK
Project: “World Talk”, The qualification to the final (Teachers-Researchers
Category): Business Plan Challenger 2015, EVARECH UAE Morocco. Project:
«Lavabo Intégré avec Robinet à Circuit Intelligent pour la préservation de l’eau»,
First prize: Intel Business, Challenge Middle East and North Africa—IBC-MENA.
Project: «Système Intelligent Préventif Pour le Contrôle et le Suivie en temps réel
des Plantes Médicinale En cours de Croissance (PCS: Plants Control System)»,
Best Paper: International Conference on Software Engineering and New
Technologies ICSENT’2012, Hammamat-Tunis. Paper: «Disaster Emergency
System Application Case Study: Flood Disaster».
He has authored three patents: (1) device and learning process of orchestra
conducting (e-Orchestra), (2) built-in washbasin with intelligent circuit tap for
water preservation. (LIRCI) (3) Device and method for assisting the driving of
vehicles for individuals with hearing loss.
He is the editor and coordinator of several projects with Ministry of Higher
Education and Scientific Research and others as international project; he has been
involved in several collaborative research projects in the context of
ERANETMED3/PRIMA/H2020/FP7 framework programmes including project
management activities in the topic modelling of distributed information systems
reseed to environment, Health, energy and agriculture. The first project aims to
Preface vii
propose an adaptive system for flood evacuation. This system gives the best
decisions to be taken in this emergency situation to minimize damages. The second
project aims to develop a research dynamic process of the itinerary in an events
graph for blind and partially signet users. Moreover, he has been the principal
investigator and the project manager for several research projects dealing with
several topics concerned with his research interests mentioned above.
He was an invited professor for several countries in the world (France, Spain
Belgium, Holland, USA and Tunisia). He is member of USA-J1 programme for
TCI Morocco Delegation in 2007. He creates strong collaborations with research
centres in databases and telecommunications for students’ exchange: LIP6,
Valencia, Poitier, Boston, Houston, China.
He is the author of more than 100 papers which appeared in refereed specialized
journals and symposia. He was also the editor of the book “New Trends in
Biomedical Engineering”, AEU Publications, 2004. He was a member of the
Organizing and the Scientific Committees of several symposia and conferences
dealing with topics related to computer sciences, distributed databases and web
technology. He has been actively involved in the research community by serving as
reviewer for technical, and as an organizer/co-organizer of numerous international
and national conferences and workshops. In addition, he served as a programme
committee member for international conferences and workshops.
He was responsible for the formation cycle “Maîtrise de Génie Informatique” in
the Faculty of Sciences and Technologies in Tangier since 2006. He is responsible
too and coordinator of Tow Master “DCESS - Systèmes Informatique pour
Management des Entreprise” and “DCESS - Systèmes Informatique pour
Management des Enterprise”. He is the coordinator of the computer science
modules and responsible for the graduation projects and external relations of the
Engineers Cycle “Statistique et Informatique Décisionnelle” in Mathematics
Department of the Faculty of Sciences and Technologies in Tangier since 2007. He
participates also in the Telecommunications Systems DESA/Masters,
“Bio-Informatique” Masters and “Qualité des logiciels” Masters in the Faculty of
Science in Tetuan since 2002.
He is also the founder and the current chair of the blinds and partially signet
people association. His activity interests focus mainly on the software to help the
blinds and partially signet people to use the ICT, specifically in Arabic countries.
He is the founder of the private centre of training and education in advanced
technologies AC-ETAT, in Tangier since 2000.
Mostafa Ezziyyani
Contents
ix
x Contents
Abstract. Since its introduction in 2008, Google’s Android has been a blazing
success, far outstripping the market share of all other mobile operating systems.
Android ships more than one billion new devices each year, and more than 1.5
million new devices are activated every day. This growth was not without pain,
however. Recent measures estimate that 96–97% of today’s mobile malware
targets the Android operating system, and 73% of them are specifically designed
to satisfy profit motives. In addition, as the system becomes more popular and
scrutinized, the number of vulnerabilities identified has exploded. The security
of Android is a key issue for Google, the mobile OS is - by far - the most
popular in the world. The Android security mechanism is founded on an
instrument that gives users all the information about the permissions requested
by the application before installing it. The main benefit of this Android per-
mission system is to provide users an overview of the application by showing
them the requested permissions list, which can help raise awareness of its risks
on their private data. However, we still do not have enough information to allow
us to say that standard users are able to clearly understand the permissions
requested and their implications for their security. In this article, we present a
tool called “PerUpSecure” multiphases that combines dynamic and static anal-
ysis and contrary to what we know about the installation process of Android
applications that puts in front of the user only two options, either he accepts all
requested permissions or he cancels the installation, our proposed tool allows the
user to install any application with only the necessary permissions. At the end of
this article, we present the analysis results of a set of normal applications and
malicious programs collected from different markets.
1 Introduction
Today, Android captures about 85% of global smartphone shipments and continues to
generate growth of 3.2% on average per year [1]. By 2021, the volume of terminals will
climb over 1.5 billion euros units [2]. This popularity continues to grow not only
among users, but also among mobile application developers who take advantage of the
effect that Android is an open source OS. For all these reasons, Android has become a
very interesting and very easy target for cyber-attacks [3]. Indeed, the Android
malwares number has grown up recently. And these attacks are no less dangerous than
malware targeting desktop computers [4].
On 2017, Android malware already accounted for 99% of all mobile threats. Their
expansion continued, with growth of 70% between January and August, according to
the F-Secure Laboratory [5].
Android smartphones are protected by a permissions-based framework that limits
third-party applications’ access to sensitive resources such as the SMS database and
external storage on Android smartphones [6].
One of the questions that can be asked about the permissions system is the exis-
tence (or not) of a coherent underlying theoretical model. Does each permission cor-
respond to a set of unique and strictly delimited tasks? this is the same question that
arises with the model of capabilities under Linux, and in this second case the answer is
“no”: CAP_SYS_MODULE allows for example to load arbitrary kernel modules, and
thus to compromise completely the integrity of the kernel [7]. In the case of Android,
we may suspect that the permission SYSTEMPROPERTIES_WRITE defined by
the operator Sprint probably has a non-zero intersection with the permission
WRITE_SETTINGS defined by Google, while probably unknown to the analysis
tools [8].
The practical value of a mathematical study on Android permissions is however
limited. Indeed, the two major risks [9, 10] encountered in nature are:
• Malicious applications that require excessively large permissions, and abuse the
trust of users;
• Unpermitted malicious applications that exploit system vulnerabilities to gain
access to the root account and completely bypass the security model.
Almost all existing applications require unlimited access to the network, very often
to retrieve advertising content. In practice, this means that the risk posed by an
application is not limited to a set of static permissions: for example, malicious content
may be sent to the WebKit rendering engine at any time through the advertising
channel, and thus cause control of a given phone through the application.
The requested permissions may change during an update [11]. Most users trust
applications they have already installed since they may access to sensitive resources
can lead to loss of money. For example, Android malware can send messages, make
calls, and generate a large amount of network data without users being aware of it.
Moreover, access to sensitive resources can lead to leakage of users’ private infor-
mation stored in their mobile devises such as contacts, emails and even credit card
numbers which can have a dangerous impact on them.
In this paper, we present the test results of PerUpSecure tool that has three mean
stages: static analysis, dynamic analysis and applications repackaging. after the user
install PerUpSecure on his Android device, the tool inserts immediately instrumenta-
tion code into arbitrary Android applications and the monitoring code that intercepts an
application’s interactions with the system in case of updates in order to enforce various
security policies by watching these updates and the permissions that may be added
without the user permission.
Android Applications Analysis Results Using PerUpSecure Tool 3
2 PerUpSecure Tool
PerUpSecure is a tool sandbox based dynamic and static analysis that evaluate android
applications permissions in installation time through several levels after using APKtool
[12] which is integrated in our proposed tool in order to extract manifest file from APK
file. Figure 1 presents some screenshots of PerUpSecure.
In addition, we used Java reflection [13] to get all API calls contained in manifest
file, which will be used in static analysis phase. Generally, each application before
being able to be installed, goes through two analysis levels: static and dynamic. The
biggest Advantage of PerUpSecure tool is to enable the user to install an application
with only the necessary permissions instead of accepting all the requested permissions
or canceling completely the installation.
makes it light enough to run on the Android device. However, dynamic analysis
requires emulation on a more powerful machine.
When the user wants to install an application for the first time, PerUpSecure tool
preforms a static analysis in which compares the permissions requested by the appli-
cation with a predefined database that contains that all the permission requirements for
every API calls and permission specifications for more than one version of Android to
make a clear decision about what kind of permissions are requested by the application
(necessary, unnecessary or dangerous). In fact, this database contains almost all API
calls that can be required by Android applications.
Dynamic Analysis: This analysis is based on an Android virtual device founded on
QEMU [14] similar to Android SDK.
In this work, the application is installed in the standard Android emulator from the
Google Android SDK. Once application installation ended, Monkey Tool [15] which is
a program installed inside the emulator generates a set of random pseudo-streams
presented the user events such as clicks, keys, gestures, and a number of system-level
events.
The Monkey was mainly invented for stress testing applications. Our tool is placed
in the kernel space and shakes the system calls for logging. The dynamic analysis result
helps us to record application behavior at the system level. The resulting log file is
reduced to a mathematical vector to ensure a better analysis. The kernel module ensures
that every occurrence of a system call is saved with the required permission. This
ensures the registration of a complete system state and no malicious activity can be
hidden. An application system call log is saved in a separate file.
At the end of the dynamic analysis, PerUpSecure Tool receives two logs files. It
examines first the result of code analysis. If the application contains a malicious code, it
installation is automatically abort and a popup window is shown to the user explains
why the application installation is cancelled. Otherwise, PerUpSecure Tool examines
the permission result, if there are unnecessary or dangerous permissions requested by
the application, then, the tool send to user a notification that invites him either to allow
application installation with only the necessary permission or cancel completely the
installation. In the case where the user chooses to continue the installation, the tool
repackages the application in order to delete the unnecessary permissions before
allowing its installation.
Application Repackaging: In this process, we have to delete the unnecessary and
dangerous permissions from the application manifest file.
Each application is going through five steps before being ready to be installed in to
user device because the code in the APK file is so difficult to read by a human, since it
contains Dalvik bytecode (Dex format): extraction, decoding, modifying, encoding,
and packing. Figure 3 shows a rough overview of the process used to modify an
existing .apk file. The purpose of the extraction and decoding steps is to transform an
.apk file into an easily editable form. The modification step is an application specific
step which involves reading and modifying the bytecode. The encoding and packing
steps create a new .apk file from the modified files.
3 Experiments Results
Our dataset consists of 2279 Android apps. We made the application collection during
January-February 2018. During this period, we explored PlayStore [16] and 7 third-
party stores which are: AndroidBest [17], AndroidDrawer [18], AndroidLife [19]
Anruan [20], AppsApk [21], PandaApp [22], and SlideME [23].
Table 1 lists all the markets used in the analysis. During this analysis, we dis-
covered that all alternative markets give users the ability to download applications
without authentication. So, they need simply to the right URL to download an
application.
In exploring the web pages of the markets, we have discovered that for some of
them, these URLs can be easily predicted. For example, all applications on the
AndroidBest market can be downloaded simply by entering the following URLs
“download.php?Id=n”, where n varies from 0 to the order number of the last down-
loaded application. Also, in the case of AndroidDrawer, a crawler was developed to
parse the html pages and extract the URLs used to download the applications. After
downloading the applications, we performed a two-step analysis of our dataset using
our “PerUpSecure” tool. Our dataset occupies 17.4 GB of disk space.
dangerous permission. Permissions in Android are grouped into feature categories. This
provides a relative measure part of the protected API that is used by the applications.
A small number of permissions are required very frequently. We find that 24% of
applications request INTERNET as their only dangerous permission. we also found
that 38% of applications combine between three dangerous permissions, as for example
16% of applications require the permissions: CONTACTS, SMS and PHONE at the
same time, which means that these applications have the power to control and use the
user mobile phone to call numbers and send SMS without the user’s awareness what it
will probably lead to dangerous consequences on his banking transactions.
Although many applications ask for at least one dangerous permission, the total
number of permission requests is typically low. The most highly privileged application
in our set asks for less than half of the available 56 dangerous permissions. Figure 4
shows the distribution of dangerous permission requested.
Several important categories are requested relatively infrequently, which is a
positive finding. Permissions in the PERSONAL_INFO and COST_MONEY cate-
gories are only requested by 5% of applications. The PERSONAL_INFO category
includes permissions associated with the user’s contacts, calendar, etc.; COST_MO-
NEY permissions let applications send text messages or make phone calls without user
confirmation.
Users have reason to be suspicious of applications that ask for permissions in these
categories. As showed by Table 2, nearly all applications (82%) ask for at least one
dangerous permission, which indicates that users frequently install applications with
dangerous permissions. We were interested in the dangerous permissions most fre-
quently requested by all the applications we analyzed. Figure 5 below illustrates the
results of the analysis obtained.
8 L. Er-rajy et al.
Category Applications Permissions Requsted Unnecessary Number of DCL DCL calls Number JV Reflexion #JV ref calls
number Number Permissions Number
APP WALLPAPER 18 48 24 12 96 306 351
APP WIDGETS 42 19 5 4 38 87 390
BOOKS AND REFERENCE 10 66 17 16 132 113 369
BUSINESS 50 48 4 12 96 138 411
COMICS 17 94 18 23 188 110 363
L. Er-rajy et al.
COMMUNICATION 12 25 8 6 50 97 298
EDUCATION 40 68 27 17 136 105 305
ENTERTAINMENT 7 34 13 8 68 70 307
FINANCE 19 38 7 9 76 63 418
GAME 20 22 10 5 44 103 528
HEALTH AND FITNESS 52 77 8 19 154 168 532
LIBRARIES AND DEMO 56 88 21 22 176 193 532
LIFESTYLE 51 104 19 26 208 132 405
MEDIA AND VIDEO 16 28 12 7 56 100 394
MEDICAL 58 64 15 16 128 90 502
MUSIC AND AUDIO 13 18 7 4 36 105 551
NEWS AND MAGAZINES 51 79 33 19 158 177 575
PERSONALIZATION 51 90 23 22 180 199 561
PHOTOGRAPHY 59 109 18 27 218 138 590
PRODUCTIVITY 16 27 19 6 54 105 575
SHOPPING 59 67 23 16 134 190 695
SOCIAL 52 119 22 29 238 212 648
SPORTS 50 97 24 24 194 193 581
TOOLS 50 90 42 22 180 154 513
TRANSPORTATION 16 58 28 14 116 118 331
TRAVEL AND LOCAL 46 50 30 12 100 125 3367
WEATHER 17 70 16 17 140 65 3241
Total: 948 1697 493 414 3653 3653 18333
Android Applications Analysis Results Using PerUpSecure Tool 11
are the most highly verified permissions. Our analysis shows that the two Bluetooth
permissions are applied to 6 major classes. They are split between methods that change
state (BLUETOOTH_ADMIN) and methods that get information about the device
(BLUETOOTH). So, the BluetoothAdapter class is one of several that exploit Blue-
tooth permissions and appropriately divides most of its permissions assignments. Yet,
this receives some inconsistencies.
Unnecessary Permission: comparing two files shows that 45% applications have
unnecessary permissions, which are at the same time dangerous. Table 4 below shows
that almost all unnecessary requested by applications in our set are dangerous.
We also found that 42.5% of the applications permissions are overcrowded, with a
total of 39% unnecessary permissions. This represents a false positive rate of 7%. The
two false alerts were caused by the incompleteness of our static database. Everyone was
a special case that we did not anticipate. The last false positive was caused by an
application that integrates a website using HTML5 geolocation, which requires a
location permission. We wrote test cases for these scenarios and updated our permis-
sions database.
Code Analysis Results: Dynamic analysis shows that 19% of all PlayStore apps
contain dynamic class loading (DCL) calls. 8% of BUSINESS applications, 10% of
SHOPPING apps and 10% of TRAVEL AND LOCAL apps have the minimum per-
centage, however, 39% of GAME apps are using dynamic class loading feature. The
results can be easily understood. in recent years, games for mobile platforms have
evolved considerably. This forces a developer to write tons of code for different ver-
sions of the mobile platform. It is therefore not surprising that developers choose a
strategy when an original application (whose size is limited to 50 MB) is only an
installer, which downloads additional code from a server and loads it dynamically. On
12 L. Er-rajy et al.
average, there are 108 dynamic class load function calls per application. Considering
reflection, 78% of all applications use reflection calls that are interesting for our
dynamic analysis. The percentage reaches 98% for applications that belong to the
GAME category, which means that almost every application in this category is based
on reflection. In addition, applications in this category also show the highest average
number of reflection calls (38.13), 21.96 reflection calls per application.
4 Conclusion
References
1. Deloitte: State of the smart Consumer and business usage patterns. Mobile, Glob. Surv.
Consum. Cut, UK (2017)
2. IDC: Smartphone market shares (2017). https://www.idc.com/promo/smartphone-market-
share/os
3. Suarez-tangil, G., Stringhini, G.: Eight Years of Rider Measurement in the Android Malware
Ecosystem: Evolution and Lessons Learned, arXiv, pp. 1–18 (2017)
4. Rajesh, B., Reddy, P., Patil, M., Pareek, H.: Droidswan: detecting malicious android
applications based on static. In: Conference on Communications Security & Information
Assurance, May 2015
5. Ahvanooey, M.T., Li, P.Q., Rabbani, M., Rajput, A.R.: A survey on smartphones security:
software vulnerabilities, malware, and attacks. Int. J. Adv. Comput. Sci. Appl. 8(10), 30–45
(2017)
6. Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-rotaru, C., Lafayette, W.: Android
Permissions: a perspective combining risks and benefits, pp. 13–22 (2012)
7. Reshetova, E., Karhunen, J., Nyman, T., Asokan, N.: Security of OS-level virtualization
technologies. In: Conference Security, IT (2014)
8. Skillen, A., Van Oorschot, P.C.: Deadbolt: locking down android disk encryption. In:
Proceedings of the Third ACM Workshop on Security and Privacy on Smartphones Mobile
Devices, pp. 3–14. ACM (2013)
9. Wijesekera, P., Columbia, B., Baokar, A., Hosseini, A., Egelman, S., Wagner, D.: Android
permissions remystified: a field study on contextual integrity T. In: USENIX Security
Symposium, pp. 499–514 (2015)
10. Chen, K.Z., Johnson, N., Silva, S.D., Macnamara, K., Magrino, T., Wu, E., Rinard, M.,
Song, D.: Contextual policy enforcement in android applications with permission event
graphs. In: NDSS (2013)
Android Applications Analysis Results Using PerUpSecure Tool 13
11. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In:
Proceedings of 18th Conference on Computer & Communications Security - CCS ’11,
p. 627 (2011)
12. Zhang, X., Breitinger, F., Baggili, I.: Rapid Android Parser for Investigating DEX Files
(RAPID), vol. 17, pp. 28–39 (2016)
13. Barros, P., Millstein, S., Vines, P., Dietl, W., Amorim, M., Ernst, M.D.: Static analysis of
implicit control flow: resolving Java reflection and android intents. In: 2015 30th IEEE/ACM
International Conference on Automated Software Engineering (ASE) (2015)
14. Ding, J.: PQEMU : A parallel system emulator based on QEMU. In: 2011 IEEE 17th
International Conference Parallel Distributed Systems (2011)
15. A. Developers: UI/Application Exerciser Monkey. August, 2012. http://developer.android.
com/%0Atools/help/monkey.html
16. G. Play: Android official market. https://play.google.com/store/apps
17. A. Market: AndroidBest. http://androidbest.ru/
18. A. Market: AndroidDrawer. http://www.androiddrawer.com/
19. A. Market: AndroidLife. http://androidlife.ru/
20. A. Market: Anruan. http://www.anruan.com/
21. A. Market: AppsApk. http://www.appsapk.com/
22. A. Market: PandaApp. http://android.pandaapp.com/
23. A. Market: SlideME
24. Barrera, D., Van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of
permission-based security models and its application to android. Security 1, 73–84 (2010)
25. Enck, W., Ongtang, M., Mcdaniel, P.: Understanding android security. IEEE Secur. Priv.
(1), 50–57 (2009)
Effect of Climate Change on Growth,
Development and Pathogenicity
of Phytopathogenic Telluric Fungi
1 Introduction
containing the mycelial implants were incubated in the dark for 7 days. Two perpen-
dicular diameters per colony were measured daily without opening the Petri dishes and
the growth rate was calculated on the basis of these two diameters.
Fig. 1. In vitro growth at 25 °C of P. capsici (A), F. oxysporum (B) and R. solani (C), in agar
medium
The impact of climate change is more difficult to predict with these organisms since
the uncertainty related to rainfall forecasts in the near future is greater than for tem-
perature averages. Nevertheless, several studies show that climate change will have a
positive effect on some species by increasing their establishment capacity, their growth
rate and the duration of the epidemic [3]. Climate extremes also have a role to play in
the infectivity of a pathogen by promoting its entry, for example, by a wound to the
plant caused by hail, drought or frost. The resistance of the cultivated plant can thus be
compromised by these wounds or by physiological or morphological changes, as
mentioned above [14]. For example, the expected future decline in snow cover in
southern Quebec and its isolation capacity may, however, be detrimental to certain
cereal diseases, for example, which could see their winter survival rate drop. Soil-
dwelling genera (Botrytis, Fusarium, Phytophthora, Pythium, Rhizoctonia, Sclerotinia,
Sclerotium, Verticillium) are less likely to be affected by this phenomenon due to
survival structures such as sclerotia or hyphae [3]. Warm periods with droughts may
reduce the intensity of some pathogens, but may also reduce plant resistance to disease
[15]. Some species such as Podosphaera, Sphaerotheca, Uncinula and Ustilago could
however benefit from a drier and hotter climate. A study of vine blight, a disease
developing at cooler temperatures (10 to 24 °C), predicts an increase in the intensity of
infections with an increase in temperature and a decrease in precipitation [16, 17]. An
expansion of the range of pathogens is also to be expected [18] in connection with the
increase in temperatures. The extension of the growing season duration would allow
greater inoculum production for some species and increase the frequency and intensity
of infections. Since moisture is a major factor in the development of most fungal
infections, increased precipitation favored spore dispersal of some species. The amount
of precipitation accumulated in southern Quebec, however, should not vary signifi-
cantly by 2050 for the summer period [19]. Further work on the influence of tem-
perature on the different life stages of Curvularia lunata: Mycelial growth and
sporulation of isolates are average at 20 °C and optimal at 28 °C. According to several
authors [20, 21], temperatures between 15 and 33 °C are optimal for the growth of the
Curvularia sp mycelium. However, some species of this genus can develop over a wide
range of temperatures [22]. At 35 °C, mycelial growth and sporulation of C. lunata,
although small, are still possible. But after exposure of cultures to temperatures of 5
and 40 °C, both growth and sporulation are inhibited. The inability of certain fungi to
grow at high temperatures [23] may be directly related to their inability to synthesize, at
these temperatures, substances necessary for growth, such as vitamins [24].
Effect of Climate Change on Growth, Development and Pathogenicity 19
3 Conclusion
P. capsici, R. solani and F. oxysporum have a short survival time at temperatures below
0 °C and moreover it is mostly active at temperatures of 22 to 25 °C for R. solani, from
24 to 27 °C. C for F. oxysporum and 30–35 °C for P. capsici. Its thermal requirements
probably limit their current spatio-temporal distribution and their virulence. Today,
most of the research on impacts and adaptation has focused on the biophysical effects
of climate change. The results suggest that the most important challenges will be
related to the increasing frequency and intensity of extreme weather events such as
floods, droughts and storms. In contrast, many systems should be able, subject to
appropriate adjustments, to tolerate a gradual and limited warming of temperatures, and
even to take advantage of them at times. Thus, in some areas, the increase in tem-
perature could promote and/or inhibit the growth of pathogens. Although plant
pathogens encompass several types of organisms, this section focuses mainly on fungal
infections, dominant in Morocco in our case in the Larache Region. There are also gaps
in research on the impact of climate change on bacteria, viruses and nematodes, ene-
mies that can cause considerable damage to crops while the methods of struggle are
almost non-existent. Climate change will have an effect on plant physiology, which
may in turn alter the passive resistance of plants to disease. Physiological or physical
changes in the plant, related to climate change, may decrease or increase susceptibility
to pathogens. An increase in the incidence of diseases and plant susceptibility could
potentially limit the range of crops/cultivars available in the future. As far as fungicides
are concerned, their effectiveness in controlling pathogens is likely to be affected by
temperature increases that could reduce their toxicity or frequent rainfall events that
increase leaching before they enter the plant. We report a few studies have focused on
modeling the impacts of climate change on pathogens. In fact, they need moisture at
different stages of their life cycle and the modeling of precipitation and especially of
relative humidity presents a greater range of uncertainty than temperature modeling.
This uncertainty is reflected in a range of potentially variable biological responses. In
addition, the biology of pathogens is also very different from one species to another in
terms of their responses to climatic parameters, making it difficult to establish gener-
alities about the impact of climate change on climate change on these. The agricultural
sector will have to adapt to climate change in a variety of ways. One of the constraints
it will face is crop pests, since the biology of pests is very sensitive to climate change.
In this context, anticipated climate change by 2050 will potentially affect the crop /
pathogen relationships of crops. It is essential to realize right now that the pressure
caused by crop pathogens will change with climate change. This is particularly true in
the context where the sector is seeking to reduce the use of pathogen control products
that have adverse effects on the environment and human health.
Another Random Scribd Document
with Unrelated Content
Was it, after all, a mistake that she should have given this man her
solicitude and confidence?
A knock at the door fell almost as loudly upon her ears as the
crash of ordnance had done. When a second and sharper knock
resounded, she summoned her voice to answer.
“Madame, it is I,” came in low tones from without. “If you can find
it convenient to open—”
At the sound of the voice she gained courage. Monsieur had come
to her. Trembling, yet still undismayed, she crept to the door and
opened it.
The face of the Frenchman was dark and impassive. If the night
had brought a new resolution to her, it was plain that monsieur was
in no wise different from yesterday. All this she noted while her hand
still clung falteringly to the knob of the door.
“Madame,” he began, “the matter is most urgent. If it will please
you to follow me—”
Mistress Barbara with difficulty found her tongue.
“Where, monsieur. What—”
“Madame, I pray that you will make haste. There is little time to
lose. I should be at this moment upon the deck.”
“Monsieur would take me—?”
“Below the water-line, madame. There will be a fight. Shots may
be fired. I would have you in safety.”
Alas for Mistress Barbara’s crafty plans and gentle resolutions. In a
moment they were dissipated by the imperturbability, the tepid
indifference of his manner, which should have been so different in
the face of a situation which promised so much that was ominous to
her. His coolness fell about her like a bucket of water, and sent a
righteous anger to her rescue, so that her chill terror was driven
forth for the nonce by a flush of hot blood. When she spoke, her
voice rang clear with a certain bitter courage.
“Safety!” she cried. “Monsieur is too kind. I shall prefer to be killed
here—here in the decent privacy of the cabin.”
“Madame,” said he, in impatience, “it is no time for delay. There
must be no obstacle to your obedience.”
She looked at him in an angry wonder. If this were mock insult, it
had too undisguised a taste to be quite palatable.
“Monsieur,” she said, stamping her foot in a rage, “I go nowhere
for you. Nowhere. I will die before I follow you. Battle or no battle,
here I shall remain. Am I a lackey or a woman-of-all-work that you
order me thus! Safety! If you value my safety, why do you permit
them to make war over my very head? No, no. You are transparent—
a very tissue of falsities. I read you as an open book, monsieur.”
She paused a moment for the lack of breath.
“I do not believe in you. How do you repay me for what I have
done? Refuse me, deny me, and order me about like a willful child
with your insolent glare and your cool, puckered brow. What is my
safety to you? I do not believe—”
“Madame, you must come at once.”
“Never!” she cried. “Never! No power shall move me from the
spot. Nothing—” At this moment a crash ten times more dreadful
than the first shook the vessel like a hundred thunderbolts.
Cornbury, in blissful ignorance of the battle raging below, had
opened the battle above with the entire starboard broadside.
Mistress Barbara stammered, faltered, and fell back towards the
table, trembling with fear. She put her hands to her ears as though
to blot out the sounds. And then, in a supplicating dependence
which set at naught all the hot words that had poured from her lips,
she leaned forward listlessly upon the table.
“Take me,” she said, brokenly. “Take me. I am all humility. I will
go, monsieur.”
A soft light she had seen there before crept into the eyes of Bras-
de-Fer. As though unconscious, she saw his extended arms thrust
forward to her support and heard as from a distance the resonant
voice, the notes of which, with a strange, sweet insistence, sang
among her emotions until, like lute strings, they sang and trembled
in return. And the chord which they awoke to melody rang through
every fiber of her being with a new-pulsing joy, a splendid delight,
like the full-throated song of praise of a bird at early morn.
She felt his hand seek hers. She made no move to resist him. She
could not. Something in the break of his voice, the reverence in his
touch, sought and subdued her. In a moment she learned that the
love of a life had come and that all else was as nothing.
“Barbara! Barbara!” he was saying. “Look at me, chérie. Tell me
that you are not angry. I have tried so hard to leave you—so hard. I
have spoken to you bitterly and coldly, that your mind might be
poisoned and frozen against me, that you might hate and despise
me for the unworthy thing that I am. Alas! it is my own heart that I
have pierced and broken. Look up at me, Barbara. I cannot bear to
see you thus. Ah, if you had only opposed me in anger, I could have
continued the deception. Your anger was my refuge. It was the only
thing that made my cruelty possible. It cried aloud like a naked
sword. I welcomed it, and set steel upon steel that I might shield my
heart. But now, listless, yielding, submissive, you disarm me, you rob
me of my only weapon. I am yours. Do with me what you will.”
His voice trembled, and he bent his head upon her hand to hide
the excess of his emotion. As she felt the touch of his lips, she
started and moved ever so slightly, but with no effort to withdraw.
When he lifted his head it was to meet eyes that wavered and
looked away.
“Do not turn from me, Barbara. Do not add to the deep measure
of my contrition. The cup is full. Add to it but one drop and it will
overflow. Requite me with tenderness, madame, if you can find it in
your heart, for mine is very near to breaking. Look in my eyes,
where my love glows like a beacon. Listen, and you will hear it speak
in my voice like a young god. Can you not feel my very finger-tips
singing into your palms the cadences of my heart’s chorus? Is it not
thus that women wish to be loved? Search my heart as you will,
you’ll find an answer there to every wish and every prayer.”
She trembled and swayed in his arms like a slender shrub in a
storm. It seemed as though, in his fervor, he were running the
gamut of her every vulnerable sensibility. But as she felt his breath
warm upon her hair and cheek she raised her eyes until they looked
into his; then drew away from him with a gentle firmness. She was
perturbed and shaken with the compounding of new emotions. She
could not see all things clearly. She only knew that what she had
expected least had come to pass. She had burnished her woman’s
weapons in vain. She had sought to delude and beguile, and had
only deluded and beguiled herself. As she had promised herself, she
had drawn aside the mask, but she had unmasked herself at the
same time. She had sought and she had found so many things that
she knew not which way to turn. She must do something to gain
time to think and plan. It was all so different to London. In spite of
herself, she knew that he had conquered, and a suffusion of shame
that she had been so easily won mounted to her neck and forehead,
and she turned her head away. And then, in a last obedience to that
instinct of self-preservation which sets a woman upon the defensive
when she knows not what she would defend (nor would defend it if
she could), she broke away from him and stood alone, pulsing with
the effort, but triumphant.
“Monsieur,” she breathed with difficulty, “it is unfair—to—to—press
me so.”
But he was relentless. “Ah, madame, am I then despised, as on
that night in Dorset Gardens? Nay, I am as God made me—not the
thing you would have supposed—”
“Monsieur, have pity.”
“Ah, then look at me again, Barbara. Look in my face and deny.
Look in my eyes, chérie—deny me if you can.”
She felt his arms encircle her, and she struggled faintly.
“No, no. It is not so.”
“Look me in the eyes, Barbara; I will not believe it else. If I am
nothing to you, look me in the eyes and tell me so.”
“No! No! No!”
She raised her face until her closed eyes were on a level with his
own. Then she opened them with an effort to look at him, as though
to speak.
A deafening crash again shook the Sally, so that the ship’s dry
bones rattled and quivered under their feet like a being with the
ague, and she seemed about to shake her timbers asunder. Mistress
Barbara’s answer was not spoken, for at this rude sound a fit of
trembling seized her again and she sank listlessly into the protecting
shelter of his arms, and hid her face upon his bosom in a
commingling of terror and wonderment that were only half real.
“No, no,” she sobbed at last, “it is not true. It is not true.”
Bras-de-Fer bent over her in a blind adoration and gently touched
his lips to her hair. She made no further effort to resist him. Then,
when the tear-stained face was raised to his own, in her eyes he
read a different answer to his pleading.
“Bien adorée!” he whispered, kissing her tenderly—“Barbara!”
The hand within his own tightened and the lissome figure came
closer to his own. “Take me away, monsieur,” she murmured. “Take
me away. Oh, I am so weary—so weary.”
“Struggle no more,” he whispered. “Courage; all will yet be well.
Come with me below to safety, and it will soon be over.”
He had moved away from her towards the door, and would have
withdrawn his hand, but she held it with both of her own while her
eyes looked into his with an anxious query.
“Oh, I,” he said, with a smile—“I shall be in no danger, madame.
That I promise you. ’Tis but a Spanish merchantman, with little skill
in war. Why, Sally will run her aboard in the skipping of a shot. And
now”—as they moved towards the door—“but a little while and I
shall be with you again, to keep guard over your door, to keep guard
upon you always—always.”
CHAPTER XV
MUTINY
J acquard conducted Mistress Barbara aft to the cabin until the boat
could be prepared. And Monsieur silently followed, his eyes dim
with tears at the loss of this friend to whose helpful skill both he and
Mistress Barbara owed their lives. When they were safe within,
Jacquard blurted forth:
“It was the best I could do, monsieur, the very best I could do.
The danger is not yet past. There is no safety for you or madame
upon the same ship with Yan Gratz.”
Bras-de-Fer silently wrung his hands.
“It is a desperate journey for a lady tried already to the point of
breaking, Jacquard. If they would but land us—”
“Ah, monsieur. It were madness to try them again. Have you not
seen their temper?”
“No, no, monsieur, I am strong!” cried Barbara. “See! I am strong.
Let us leave this dreadful charnel-ship. If I must die, let it be alone
upon the broad ocean. That at least is clean of evil intent.”
“Nay, madame,” continued the Frenchman. “If they would but sail
us—”
“No, no. Let us go at once. I can meet death bravely if need be,
but not here.”
“Monsieur, it will not be so bad,” broke in Jacquard. “The sea has
gone down, and, although a long swell is running, it is low and
smooth. A fair breeze draws from the west. The pinnace is stanch.
The day is young. By the morrow you should raise the palms of
Guanahani above the sea. I shall see you well provided with food,
water, and weapons. Upon San Salvador are friendly Caribs, and in
due course—”
“Mon ami,” said Bras-de-Fer at last, “you are right. Were it not for
madame, perhaps, I should yet make some small effort to establish
myself upon the Sally. They have beaten me, but I am grieving little.
I have no stomach for this life, my friend. The letting of blood in any
but honest warfare sickens me and turns me to water. I leave the
dogs without regret. But you, you and my gallant Cornbury.” He
paused a moment, his hand to his brow, then raised his head with a
glad smile.
“Jacquard, will you not come with us? If we get safe ashore I can
perhaps give you a service which will requite you.”
But Jacquard was wagging his head.
“No, no, monsieur. It is too late. I am too old a bird. Would ye clip
the eagle’s wings? Would ye pen the old falcon in a gilded humming-
bird cage? I’ve chosen to fly broadly, and broadly I’ll fly till some
stray bullet ends my flapping. And now make ready, madame. A
warm cloak against the night air, a pillow—for boat-thwarts are none
too soft; and when ye are ready I shall be at the door.” And he
vanished, his bullet head, with its round wool cap, scraping at the
door-jamb as he passed.
When he had gone, Barbara sank upon the bench at the table.
Had it not been for the strong arms of Bras-de-Fer she must have
fallen to the deck. Tired nature, overwrought nerves, rebellious,
refused to obey.
“But a little while, Barbara, dear, and we will be alone. Courage,
brave one! Courage! We will soon gain the shore. Then, a ship—and
—life!”
“Ah, monsieur, I am weary. So weary that I fear for this journey in
the open boat. God grant we may reach its ending.” Her head fell
forward upon his breast and she breathed heavily as one in a deep
sleep.
He laid her gently so that her arms rested upon the table. Then he
quickly prepared a package of articles which would be most
necessary for her. Jewels there were and a packet of his own money.
He found a flask of eau-de-vie, and when he had aroused her he
gently forced her to drink a half-tumbler of it mixed with water.
Presently Jacquard and Barthier came with the papers for him to
sign. When this was done they all went upon the deck. The Spanish
prize lay at a distance of several cables’ lengths, and, from a
movement among the spars, was getting under way in charge of the
prize crew. Alongside, at the starboard gangway, rode the pinnace.
It looked so small, so masterless and helpless, by the side of the
larger vessels in that infinity of ocean, that Mistress Barbara shivered
as she looked down into it. But one glance around the decks to
where the prostrate figures had lain reconciled her to her lot.
Between Bras-de-Fer and Jacquard there was but one hearty
hand-shake. The very lack of more effusive demonstration between
them meant more than many words could have done. And as
monsieur passed over the gangway and down into the vessel there
was little in his demeanor to show the sting of his defeat at the
hands of these devils of the sea, whom he had sought, and
unsuccessfully, to bring into the domain of a proper humanity. A
scornful laugh broke from among the men as he disappeared over
the side, and Yan Gratz, waving a pistol, piped obscene threats and
criticism from the quarter-deck. But presently, when Mistress
Barbara had been slung over the side in a whip from the main-yard,
Jacquard disappeared from the rail, and the falsetto of the
Dutchman was no longer heard.
The mast in the pinnace had been stepped, and the sail, strong
and serviceable, but none too large, flapped impatiently in the
breeze. And so when Barbara was seated, white and dark-eyed,
showing with a painful effort a last haughty disdain to the rascals at
the portholes and bulwarks, Bras-de-Fer shipped his tiller and hauled
his sheet aft to the wind. The little vessel bounced in a sprightly,
joyous fashion, the brown sail bulged stanchly, and in a moment a
patch of green water, ever growing wider, flashed and trembled
between the pinnace and the Saucy Sally. Among the row of dark
heads along the rail Bras-de-Fer looked for only one, and to him he
presently turned and raised his hat in salute. Jacquard replied; and
then his long arms went flying and his hoarse voice cried aloud the
orders to set the vessel upon her course. Presently the yards flew
around, the vessel squared away, and the Saucy Sally was but a
memory. A vessel nameless, without identity, was sailing away from
them upon the sea, and they were alone.
Barbara looked no more. She had seated herself upon the gratings
at the bottom of the craft, her arms resting upon the stern thwart.
But now that all immediate danger had passed and she sat safe and
at peace, the wonderful spirit and courage to which she had nerved
herself in a moment failed her. Her head fell forward upon her arms
and she sank inert and prone at the feet of the Frenchman. Scarce
realizing what had happened, yet fearful that some dreadful fate had
intervened to take his love from him, he dropped the tiller and fell
upon his knees by her side, his mind shaken by the agony of the
moment; for her face had taken a kind of waxen, leaden color more
terrifying than mere pallor, and the lips, save for a faint-blue tinge,
became under his very eyes of the same deathly hue. He dashed
handful after handful of the sea-water into her face and rubbed her
chill arms and hands. He poured a draught of the rum between her
cold lips. But she moved not. Beseech her as he might, there was no
response to his petitions. He sought the pulse; he could feel nothing.
The breath had ceased. Oh, God! Had the cup of happiness been
placed at their lips only to sip? Was it to be poured out before his
very eyes? He cried aloud in his agony and raised the face to his
own, kissing it again and again, as if by the warmth of his own
passion he could awaken it to life.
“My love! my love!” he cried. “Come back to me! Come back to me
again! Open thine eyes! Breathe but my name! Come back to me,
my love!”
He had waited an eternity. At last, as he put his ear to her breast,
a sound, ever so faint, but still a sound, told him that the heart was
pulsing anew. He forced a generous draught of the rum through her
lips and madly renewed his efforts to arouse the blood. Several
moments more he struggled in pitiful suspense, and then a gentle
color flowed under the marble skin, a touch of pink rose to the blue
lips, the eyelids quivered a moment and then opened. He hauled the
sail to shield her from the glare of the sun, and held a cup of fresh
water to her lips. She looked at him, but no words came from her
lips. Instead, she breathed a sigh and with a faint smile relinquished
herself and fell back peacefully into his arms. Once or twice she
opened her eyes in an effort to speak, but each time he soothed her
and bade her rest. He was but a man, and it needed a gentler hand
to cope with such an emergency; but now that the danger was past
he felt instinctively that nature would seek in her own ways to
restore, and he let her lie quiet, pillowed in the curve of his arm
against his breast. And so, presently, her breathing was regular, and
she slept.
He could not know how long it had been since they left the Sally,
but by the sun he saw that there was yet an hour or two of the day.
The ships were become mere dull blotches upon the sky, and from
his position the lower tier of guns seemed just at the line of the sea.
Time was precious, for the land lay a full day’s sail, even should the
breeze continue to favor them, and he could not tell how long it
would blow thus steadily. Fearful of awakening Barbara and yet
anxious to take advantage of every favorable opportunity, he
reached for the sheet and tiller and set the little vessel upon her
course. She heeled gladly to the wind, and the coursing of the water
beneath her long keel made a sound grateful to his ears. He had
taken the Sally’s position upon the charts before leaving, and steered
a course which should surely fetch a sight of the land upon the
morrow. If the breeze held and the night were clear, he could steer
by the stars. He blessed the habits of his training, in which he had
studied the heavens in his night watches, wherever he might be.
There was no sign of any disturbance of the elements. The heavy
swell now and then shook the wind out of his tiny sail, but not a
cloud flecked the sky above him, and the sea which glittered and
sprang playfully at the sides of the pinnace seemed to beckon to him
gladly in hopeful augury for the hours to come.
The apprehensions that he had felt were dissipated in the mellow
glow of the southern sun. Had he been alone, this voyage in an
open boat over an unknown sea would have filled him with delight.
But the slender figure at his side, which lay pale and silent in the
shadow of the gunwale, filled him with vague alarms.
On, on into the void, the tiny vessel crept. The sun sank low in the
sky and dropped, a red ball, behind the disk of sea. The dusk swept
up over the ocean like the shadow of a storm, and night drew a
purplish curtain across the smiling heaven. The stars twinkled into
sudden life, and night fell, clear, warm, spangled, while the soft,
stealthy seas crept alongside and leaped and fawned at the shearing
prow of the pinnace. An arching moon arose and sailed, a silver
boat, high into the heavens. But Bras-de-Fer moved not and Barbara
still slept. Continually his keen eyes swept the dark rim of the
horizon for a blur of sail or the sign of any portentous movement of
the elements. He knew the horrors of this southern ocean, and the
catlike purring of the silken seas did not deceive him; for in the
swaying deep he could feel the great rhythmical pulse of the heart of
the sea, which spoke a continuous, sullen, ominous threat of
resistless might, ready at the turn of a mood to rise, engulf, and
devour.
By midnight the wind fell, and with the flapping of the idle sail
Barbara awoke.
She lay for some moments, her eyes winking at the swinging
stars, then pushed the cloak aside, lifted her head, and looked wide-
eyed around and into the face of Bras-de-Fer.
“I have slept?” she asked, bewildered—“I have slept in this boat?”
He bent forward over her eager delight.
“The clock around, Barbara, dear. You were so weary, so weary, I
have let you rest.”
“Ah, yes, I remember. The Saucy Sally—”
“An evil dream, a nightmare. See; we are borne upon a fairy sea.
All the world is at peace. This infinity of beauty is ours—it is for us
alone.”
She shuddered a little and drew closer to him. “Oh, it is so vast, so
inscrutable, this treacherous, pitiless water! Have we come nearer to
the land?”
“Fifteen leagues at least. The wind has failed us but this half-hour.
After you have eaten and drunk you shall sleep again, and when you
awake I promise you land under the very lid of the eye.”
“And you—have you not slept?”
“Madame, I am a very owl of birds. But I have the hunger of a
lynx.”
Then while she took the helm he set before her the food which
Jacquard had provided. There were sea-biscuit, boucan, preserved
fruits from the store of the San Isidro, and a pannikin of rum-and-
water.
It was not until she ate that she discovered how hungry she was;
Bras-de-Fer had eaten nothing for eight-and-forty hours. And so like
two children they sat and supped hungrily. When the meal was
done, Bras-de-Fer arranged the bread-bags and the pillow so that
she might sleep in greater comfort, but she would not have it so.
“No, no,” she insisted, “I am well again and strong. If you do not
sleep I shall not.” And so resolute was her tone that he forbore to
press her further.
But sleep was the furthest from his own eyes. He felt not even the
faintest touch of weariness. She leaned back upon his arm again,
and so, hand in hand, they sat in their little vessel, mute and
spellbound at the completeness of their happiness, which even the
presence of grim danger was powerless to steal away from them.
The air was sweet and balmy and brushed their cheeks like the
breath from an angel’s wing. The first pungent aromatic odor of the
land reached their nostrils, mingled delicately with the salt of the
sea. In silence they watched the planets burn and glow red like
molten iron against the star-bepowdered sky, across which the placid
moon sailed down upon its promised course. Flying stars vied with
each other in the brightness of their illuminations in their honor. And
presently, shaming them into darkness, a giant meteor shot like a
flaming brand across the spacious sky, spurning and burying in its
splendid pathway a myriad of the lesser embers; which, when it was
done, peeped forth again timidly upon the velvet night, ashamed of
their small share in its glory. All of this they saw reflected doubly on
an ocean of gray satin, which sent the bright reflections in wriggling
rays like so many snakes of fire to mingle and play amid the glow of
the caressing surges, which gushed languidly at their very feet.
To have spoken would have been to break the spell which bound
them to the infinite. And so they sat enthroned in these wonderful
dominions of which for the nonce they were prince and princess.
“Thou art content?” he asked at last.
She did not answer him at once. When she did, it was softly and
with eyes which sought the distant horizon away from him.
“If to be content means to breathe freely, deeply, the pure air of
heaven, to thank God for the present, to care not what evil has been
or what evil may be, to be engulfed in quiet delight, to be swathed
in peace, then, monsieur, I am content.”
He flushed warmly, and the arm about her tightened. He sought
her lips with his own. She did not resist him. And so before the high,
effulgent altar of God’s heaven, with the surges for choristers, the
stars for candles, and the voices of the sentient night for company,
he plighted her his troth.
It was then that she swept away the only shadow that remained
upon their love. With head bowed, in deep contrition he told her of
his madness that first night upon the Saucy Sally, when he had
wildly railed at fate, at all things, and promised to wreak upon her
he knew not what dire vengeance.
“Our accounts are balanced, then,” she smiled. “We shall begin
anew. For I, too, have many times denied you in my heart and on
my lips. And I know that I have loved you always.”
“Adorée!” he whispered.
It was Barbara, as if to belie her own happiness, who first broke
the spell of witchery that had fallen upon them. Her eyes, which had
aimlessly sought the horizon, stopped and dilated as she fixed her
gaze upon one spot which trembled and swam in the light. Bras-de-
Fer started up, straining his eyes to where she pointed.
“Look!” she cried. “Is it—”
There, her rigging and sails clearly drawn in lines of ice, a
phantom of the thing that she was, hung a vessel. She had crept up
on some flaw of wind, her sail in the shadow, and now upon another
tack had thrown her white canvases to the reflection of the sky.
“It is no phantom,” cried monsieur, in delight. “A ship, Barbara,
chérie! By her build a man-of-war, not two leagues distant.”
“Will she have seen us, do you think?”
“If she has not, it will be but a matter of moments.”
He ran forward to where the provisions and weapons had been
put under a piece of pitched canvas. He drew forth a musket, and
loaded it with an extra charge of powder. Barbara put her fingers to
her ears as the gun roared forth its salute.
The silent night was split and riven asunder by the mighty echoes;
the robe of enchantment fell, the prince and princess were prince
and princess no longer. Barbara sighed. Their throne was but a
rugged boat and themselves but castaways wildly seeking a refuge.
The dream of an hour was over. But none the less she helped
monsieur load the muskets, and cried gladly when a flash and a puff
of smoke came from the side of the stranger, and the low
reverberation of the echoes of the shot told her that they were
rescued.
The ship came slowly down. ’Twas evident she brought the wind
with her, for about the pinnace all was a dead calm. Barbara’s
qualms that she, too, might be a boucanier were speedily set at rest;
for as she came nearer they discovered that she sat tall upon the
water, and the glint of her ordnance along her larboard streaks
proclaimed her trade. No sign of her nationality she gave until she
had come within long earshot. Then a round, honest English voice
rang heartily:
“Ahoy the boat! Who are ye? Whence d’ye come?”
To this Bras-de-Fer replied that they were castaways, marooned,
and in sore need of help. The ship, they learned, was his Majesty’s
Royal Maid, war brig of his excellency the governor of Jamaica.
“See, madame,” he murmured as the ship drew near. “’Tis
manifest you are my destiny. While you have frowned, Dame
Fortune would have none of me. And now she is benignity itself.” He
paused, sighing. “And yet I could almost wish she had not smiled so
soon.”
Her hand under cover of the cloak sought his. “Insatiable man,
can you not be content?”
“It was too, too sweet an enchantment to be so soon ended.”
“Nay,” she whispered. “It is but just begun.”
THE END
“The Books You Like to Read
at the Price You Like to Pay”
PEACOCK FEATHERS
The eternal conflict between wealth and love. Jerry, the idealist
who is poor, loves Mimi, a beautiful, spoiled society girl.
MISTRESS ANNE
A girl in Maryland teaches school, and believes that work is worthy
service. Two men come to the little community; one is weak, the
other strong, and both need Anne.
CONTRARY MARY
An old-fashioned love story that is nevertheless modern.
GLORY OF YOUTH
A novel that deals with a question, old and yet ever new—how far
should an engagement of marriage bind two persons who discover
they no longer love.
RED ASHES
A gripping story of a doctor who failed in a crucial operation—and
had only himself to blame. Could the woman he loved forgive him?
THE NOVELS OF
GRACE LIVINGSTON HILL
(MRS. LUTZ)
May be had wherever books are sold. Ask for Grosset & Dunlap’s list.
THE NOVELS OF
GRACE LIVINGSTON HILL
(MRS. LUTZ)
May be had wherever books are sold. Ask for Grosset & Dunlap’s list.
THE MIDLANDER
THE FASCINATING STRANGER
GENTLE JULIA
ALICE ADAMS
RAMSEY MILHOLLAND
THE GUEST OF QUESNAY
THE TWO VAN REVELS
THE MAGNIFICENT AMBERSONS
MONSIEUR BEAUCAIRE
SEVENTEEN
PENROD
PENROD AND SAM
THE TURMOIL
THE GENTLEMAN FROM INDIANA
THE FLIRT
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com