Content Based Microscopic Image Analysis 1st Edition Chen Li download
Content Based Microscopic Image Analysis 1st Edition Chen Li download
https://ebookname.com/product/content-based-microscopic-image-
analysis-1st-edition-chen-li/
https://ebookname.com/product/partial-differential-equations-and-
spectral-theory-1st-edition-li-chen/
https://ebookname.com/product/geometric-analysis-1st-edition-
peter-li/
https://ebookname.com/product/signal-and-image-processing-for-
remote-sensing-1st-edition-c-h-chen/
https://ebookname.com/product/orthopaedic-and-trauma-nursing-an-
evidence-based-approach-to-musculoskeletal-care-1st-edition-
sonya-clarke/
CompTIA A Certification All in One Exam Guide Sixth
Edition Michael Meyers
https://ebookname.com/product/comptia-a-certification-all-in-one-
exam-guide-sixth-edition-michael-meyers/
https://ebookname.com/product/logic-for-dummies-mark-zegarelli/
https://ebookname.com/product/radar-signal-analysis-and-
processing-using-matlab-1st-edition-bassem-r-mahafza/
https://ebookname.com/product/agricultural-production-organic-
conventional-systems-1st-edition-o-m-akinyemi/
https://ebookname.com/product/maran-illustrated-yoga-1st-edition-
marangraphics-development-group/
National Electrical Code 1st Edition National Fire
Protection Association
https://ebookname.com/product/national-electrical-code-1st-
edition-national-fire-protection-association/
Studien zur Mustererkennung
Band 39
Chen Li
λογος
Content-based Microscopic Image Analysis
DISSERTATION
vorgelegt von
M. Sc. Chen Li
geb. am 22.04.1985 in China
Siegen 2015
ISBN 978-3-8325-4253-5
ISSN 1617-0695
Acknowledgements
I would like to give my thanks and appreciation to my project leader, Dr. Kimiaki
Shirahama, for his consistent help, invaluable academic guidance and attention
during the entire process of this work. His commitment, scientific knowledge, and
continuous support during the past years were crucial not only for the accomplish-
ment of this work, but also for the expansion of my scientific knowledge and my
growing interest in scientific studies. For me, he is the Mr. Fujino to Mr. Lu Xun.
The gratitude I feel towards my wife Ning Xu is beyond expression. You are
the best! Without you, I probably would have never even started this journey, and
without you, I would not have finalised it. Thank you for all the joy and support you
have given me. Thank you for the many memorable times staying in Germany with
vi
you.
I am thankful for the financial support I received from the China Scholarship
Council, and the graduation aid programme of the DAAD at the University of Siegen.
vii
Abstract
This dissertation is structured as follows: Chapter 1 first prefaces the whole the-
sis with a brief introduction. Then, Chapter 2 reviews related CBMIA techniques
and applications. Next, a semi-automatic microscopic image classification system is
proposed in Chapter 3, using strongly supervised learning methods. In contrast, full-
automatic WSL approaches are introduced in Chapter 4. After the aforementioned
supervised learning methods, an unsupervised learning approach is developed in
Chapter 5 to solve problems regarding microscopic image clustering. Following that,
Chapter 6 introduces a CBMIA framework for the task of multi-object tracking. Then,
the proposed CBMIA methods are tested on three microbiological tasks to prove their
usefulness and effectiveness in Chapter 7, including environmental microorganism
classification, stem cell clustering and insect tracking. Finally, Chapter 8 completes
the whole dissertation with an overall conclusion of the current work and a brief plan
for the future research.
viii
Zusammenfassung
In der vorliegenden Dissertation werden neue Methoden zur inhaltsbasierten,
mikroskopischen Bildanalyse (CBMIA) vorgestellt. Die Ansätze basieren dabei
unter anderem auf Techniken aus dem schwach überwachten Lernen und finden
vor allem Anwendung in biologischen Aufgabenbereichen. In der inhaltsbasierten,
mikroskopischen Bildanalyse müssen Probleme wie verrauschte Bilder, Bildrotation
und Objekterkennung adressiert werden. Hierfür stützt sich der erste vorgestellte
Ansatz auf eine semi-automatisierte Technik, die eine allgemeine, überwachte Lern-
methode darstellt. Der Ansatz beruht auf der Segmentierung von Bildern, auf von der
Objektform abhängigen Merkmalen und auf der Klassifikation und Fusion von Merk-
malen. Im Gegensatz dazu handelt es sich beim zweiten Ansatz um eine schwach
überwachte Lernmethode. Die Merkmalsextraktion erfolgt hierbei durch Sparse Co-
ding (SC). Zusätzlich beinhaltet sie eine Klassifikation und Merkmalsfusion, was
letztlich zu einem voll-automatisierten System führt. Im schwach überwachten Lern-
ansatz werden die zwei Probleme, Bildrauschen und Objekterkennung, gemeinsam
mittels eines auf Bildregionen basierendem Klassifikators gelöst, während das Pro-
blem der Bildrotation mittels SC angegangen wird. Die Nützlichkeit und Effektivität
der vorgestellten Methoden wird anhand verschiedener Aufgaben aus dem Bereich
der Biologie aufgezeigt. Diese Aufgaben beinhalten die Klassifikation von Mikroor-
ganismen, Stammzellenanalyse und die automatisierte Verfolgung von Insekten.
Die Dissertation ist wie folgt aufgebaut: Kapitel 1 führt den Leser in einer
kurzen Einleitung in das Thema ein. In Kapitel 2 folgt eine Aufarbeitung von ver-
wandten Techniken aus dem Bereich der inhaltsbasierten, mikroskopischen Bild-
analyse und seiner Anwendungsbereiche. Anschließend wird in Kapitel 3 ein semi-
automatisiertes System zur Klassifizierung von Mikroskop-Bildern vorgestellt, das
auf Methoden des stark überwachten Lernens basiert. Im Gegensatz dazu wer-
den in Kapitel 4 voll-automatisierte, schwach-überwachte Lernmethoden eingeführt.
Nach den gerade erwähnten überwachten Lernmethoden wird in Kapitel 5 ein
unüberwachter Lernansatz entwickelt, um Probleme bezüglich der mikroskopischen
Bildgruppierung zu lösen. Kapitel 6 führt ein CBMI basiertes Framework zur Multi-
Objekt-Verfolgung ein. Im Anschluss werden in Kapitel 7 die vorgestellten Ansätze
anhand von drei Aufgaben aus der Mikrobiologie auf ihre Effektivität und Nütz-
lichkeit getestet. Die Aufgaben umfassen die Klassifikation von Mikroorganismen,
die Gruppierung von Stammzellen und das automatisierte Verfolgen von Insekten.
Die Dissertation wird in Kapitel 8 durch eine Zusammenfassung der Arbeit und
Aufzeigen zukünftiger Forschungsvorhaben abgeschlossen.
ix
x
CONTENTS xi
Contents
Acknowledgements v
Abstract vii
Contents xi
List of Figures xv
1 Introduction 1
1.1 Fundamental Concept of Content-based Microscopic Image Analysis . 1
1.2 Motivation of the Present Work . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 Contribution of the Present Work . . . . . . . . . . . . . . . . . . . . . . 10
1.4 Overview of this Dissertation . . . . . . . . . . . . . . . . . . . . . . . . 11
2 Related Work 13
2.1 Related Algorithms in CBMIA . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.1 Image Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.2 Shape Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.3 Sparse Coding Features . . . . . . . . . . . . . . . . . . . . . . . 17
2.1.4 Supervised Learning . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.1.5 Unsupervised Learning . . . . . . . . . . . . . . . . . . . . . . . 21
2.1.6 Object Detection and Tracking . . . . . . . . . . . . . . . . . . . 22
2.2 Biological Applications Using CBMIA . . . . . . . . . . . . . . . . . . . 26
2.2.1 Microorganism Classification . . . . . . . . . . . . . . . . . . . . 26
2.2.2 Cell Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.3 Insect Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
xii CONTENTS
List of Figures
3.2 An example of gradient theory for edge detection. (a) A brighter edge
between two darker parts. (b) A darker edge between two brighter
parts. The top row shows the original images. The middle row shows
the overall changing trends of the pixel values ignoring noise, where
brighter parts have higher pixel values than darker parts. The bottom
row shows the locations where the edges occur. . . . . . . . . . . . . . 41
3.3 Mask matrixes of Sobel edge detectors. (a) The mask matrix for x-
direction. (b) The mask matrix for y-direction. . . . . . . . . . . . . . . 41
3.4 An example for pixel values in an image patch. The left image shows
an original image of Vorticella, where nine pixels in red boxes constitute
an image patch. The left matrix shows the pixel values of the left image
patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.5 An example for the usage of mask matrix in Soble edge detection.
The left image shows the working region of the masks in an image of
Vorticella. The right image shows the objective pixel of the masks. . . . 42
3.6 An example of Sobel edge detection. (a) An original image of Vorticella.
(b) Edge detection result using the Sobel method. . . . . . . . . . . . . 43
3.7 An example of a median filter for image denoising. The top left matrix
shows the pixel values of an original image patch. The bottom array is
the ranked pixel values. The top right matrix shows the pixel values
of the filtered image patch. In the original patch, the central pixel (in
the blue box) is a noisy pixel whose value is obviously higher than its
surrounding pixels. By the filtering operation, the value of this pixel is
replaced by the median value of all the pixels (in the red box.) . . . . . 44
3.8 An example of an opening operation. (a) An original image. (b) The
image after erosion. (c) The image after dilation. . . . . . . . . . . . . . 44
3.9 An example of a closing operation. (a) An original image. (b) The
image after dilation. (c) The image after erosion. . . . . . . . . . . . . . 45
3.10 An example for a filling holes operation. (a) An original image with a
blank hole in an object. (b) The image after filling holes operation. . . 45
3.11 An example for the proposed semi-automatic segmentation approach.
(a) An original microscopic image of Rotifera. (b) Manual region se-
lection. (c) Sobel edge detection. (d) Morphological operations. (e)
Manual object selection. (f) The final segmentation result. . . . . . . . 46
3.12 An example of the continuous degree of edges. The left image is the
boundary of Paramecium. The right image shows an amplified part of
the boundary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
LIST OF FIGURES xvii
5.1 Working flow of the proposed stem cell clustering system. (a) is an
original stem cell microscopic image. (b) shows the segmented stem
cells. (c) is the feature extraction approach. (d) shows feature selection
and fusion. (e) is the final classification result, where cells with similar
shapes are classified into the same category. . . . . . . . . . . . . . . . . 78
5.2 An example of the double-stage segmentation approach. (a) shows an
original microscopic image of stem cells. (b) is the segmentation result
of the first stage. (c) shows the segmentation result of the second stage.
(d) is the final segmentation result combined by (b) and (c). . . . . . . 80
5.3 Five types of edges. (a) Vertical (0◦ ) edge. (b) 45◦ edges. (c) Horizontal
(90◦ ) edge. (d) 135◦ edge. (e) Uncertain edge. . . . . . . . . . . . . . . 81
5.4 An example of EHD. (a) An image of Actinophrys. (b) An image of
Aspidisca. (c) EHDs of (a) and (b). The blue bins represent the EHD of
(a), and the red bins show the EHD of (b). The horizontal axis shows
the five types of edges. The vertical axis shows the amount of edges. . 82
5.5 An example of EHD in different directions. (a) An image of Paramecium
(deviation to the right). (b) An image of Paramecium (deviation to the
left). (c) EHDs of (a) and (b), where the horizontal axis shows the five
types of edges. (d) Modified EHDs of (a) and (b), where the horizontal
axis shows edges in an ascending order. The blue bins represent the
edges of (a), and the red bins show the edges of (b). The vertical axis
displays the amount of edges. . . . . . . . . . . . . . . . . . . . . . . . 82
5.6 An example of Hu moments. (a) is the original image of Ceratium. (b),
(c), and (d) are the deformed results of (a) with translation, 0.5 time
scaled and 180◦ rotation, respectively. (e), (f), (g), and (h) are the visible
histograms of Hu moments of (a), (b), (c), and (d), separately. The
horizontal axis in each histogram shows seven Hu moments, and the
vertical axis shows their normalised values in [0, 1]. . . . . . . . . . . . 84
5.7 An example of SCF on an image of Synchaeta. . . . . . . . . . . . . . . 86
5.8 An example of k-means clustering. The red, orange and blue points
show three classes of data. The purple points are the clustering centres
of these three classes, respectively. The red, orange and blue circles
represent the ranges of Euclidean distances of these three classes. . . . 87
5.9 An example of the silhouette plot for clustering evaluation. The hori-
zontal axis shows the value of the silhouette plot’s measurement. The
vertical axis shows the clustering numbers of points in each cluster. . 88
LIST OF FIGURES xix
6.1 Sample frames of (a, e) merge or (b, c, d) occlusion. Merged targets are
difficult to be differentiated at bounding box level, thus it is proposed
to estimate the position of the tip of each target, which is denoted as a
solid circle in the corresponding colour. . . . . . . . . . . . . . . . . . . 92
6.2 Object detections at ten consecutive frames including merged and false
negative bounding boxes. The identification of each bounding box,
shown in a different colour, is a challenging task. The label for each
body part is denoted as 1: Left antenna; 2: Left mandible; 3: Proboscis;
4: Right mandible; 5: Right antenna. . . . . . . . . . . . . . . . . . . . . 92
6.3 The flowchart of the overall tracking framework: the yellow blocks
highlight the interactive part, while the blue blocks denote the auto-
mated computation part. . . . . . . . . . . . . . . . . . . . . . . . . . . 94
6.4 Associative odor-reward learning paradigm in honey bees. A bee that
has learnt the association between an odorant and a food-reward ex-
tends its proboscis when stimulated with the learnt odorant: (a) Before
odorant stimulation. (b) Odorant released indicated by the LED. (c)
Sugar rewarding. (d) During odorant stimulation. . . . . . . . . . . . . 95
6.5 The closed up sample video frame of an ant. In the case of an ant,
two antennae (yellow and blue bounding boxes) and its mouthparts
(purple and green bounding boxes) need to be tracked (i.e. n = 4). . . . 97
6.6 The initial interest points in (a) (Denoted by blue stars) are detected
by a corner detector within the green bounding box. The number of
successfully tracked points reduces dramatically over time (b) ten, (c)
six and (d) zero. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
6.7 The first row are detected antennae, the second row are detected
mandibles, and the third row are detected proboscis. . . . . . . . . . . 98
6.8 An example of the voting process of 1vs1 MSVM, where ω2 obtains the
highest voting number of 4 and is identified as the final classification
result. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
6.9 An example of linking tracks through merge condition: the shaded
lines indicate the tracks at bounding box level, and the circles indicate
p p
the tips. t31 , t32 indicate the tail and head of the pth tracklet of the
proboscis (i.e. label 3) T3p p , respectively. . . . . . . . . . . . . . . . . . 103
t31 ,t32
7.3 EM classification results on BGF and ISH, where ‘F’, ‘GC’ and ‘S’ on the
right side of feature names represent that features are extracted from
segmentation results by the full-automatic, GrabCut and the proposed
semi-automatic methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
7.4 Examples of segmentation results. From left to right, each row shows
the original and ground truth images of EMs (Aspidisca, Codosiga and
Ceratium), the segmentation results by the full-automatic method, the
results by GrabCut, and the results by the proposed semi-automatic
method. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
7.5 EM classification results of five features on ground truth images. . . . 115
7.6 EM classification results of five features on results by the proposed
semi-automatic segmentation method. . . . . . . . . . . . . . . . . . . . 115
7.7 EM classification results using early fusion, late fusion and MKL. ‘G’
means using ground truth images, and ‘S’ means using the segmenta-
tion results by the proposed semi-automatic method. . . . . . . . . . . 117
7.8 The localisation results of the improved RBSVM. . . . . . . . . . . . . 120
7.9 EM classification results using late fusion in the WSL framework. . . . 121
7.10 A comparison of the double-stage segmentation to other methods. (a)
An original image; (b) The ground truth image; (c) Double-stage; (d)
Watershed; (e) Region Growing; (f) Thresholding; (g) Normalised Cut;
(h) Contour detection and hierarchical image segmentation. Different
colours are used to distinguish neighbouring segmented cells. . . . . . 123
7.11 Silhouette plot of stem cell clustering. . . . . . . . . . . . . . . . . . . . 125
7.12 Two snapshots of the GUI: Initial tracking hypothesis on a KF (a) and
user corrected labels (b). LocoTracker enables users to correct tracking
errors including mismatches, false positives and false negatives. . . . 126
7.13 (a) KF ratio vs. Iteration number of ten tested videos: The user query
stops at a KF ratio of 0.1 ∼ 0.18, and the KF ratio drops dramatically
within five iterations. (b) Tracking error vs. annotation time: The
TE for all bee videos drops below 0.05 at the final interaction, while
additional annotation time is about one second on each frame. . . . . 128
7.14 Results of four tracking methods. . . . . . . . . . . . . . . . . . . . . . . 129
7.15 Ten consecutive sample frames of the final tracking results under merge
condition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
7.16 Three trajectories of tips of 100 frames in the videos shown in Figure 6.4
are drawn on one of the video frames: The orange dots denote the tips
of the right antenna, red for the proboscis and blue for the left antenna. 131
7.17 Working flow of the proposed EM-CBMIR system. . . . . . . . . . . . . 134
LIST OF FIGURES xxi
7.18 Comparison of EM-CBMIR results using ISH on ground truth (GT) and
semi-automatic segmented (S-Seg) images. The horizontal axis shows
the AP and mean AP (µ). The vertical axis shows the value of AP and
mean AP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
7.19 Examples of EM-CBMIR results using ISH. The first column shows the
query images. From the second to the last column, the database images
are sorted by their ISH similarities from high to low. The images in red
bounding boxes are the relevant images. . . . . . . . . . . . . . . . . . 135
7.20 An example of the MPEG-7 dataset. . . . . . . . . . . . . . . . . . . . . 136
7.21 EM classification results of PSIFT and MPSIFT features. SIFT & PSIFT
shows the classification result of early fusion of SIFT and PSIFT. Simi-
larly, SIFT & MPSIFT shows that of SIFT and MPSIFT. . . . . . . . . . 139
xxii LIST OF FIGURES
LIST OF TABLES xxiii
List of Tables
“ARSÈNE LUPIN.”
During the next ten minutes, Ganimard read and re-read the letter
of Arsène Lupin. Monsieur and Madame de Crozon, Monsieur
d’Hautrec and Monsieur Gerbois were holding an animated
discussion in a corner of the room. At last, the count approached the
detective, and said:
“My dear monsieur, after your investigation, we are no nearer the
truth than we were before.”
“Pardon me, but my investigation has established these facts: that
the blonde Lady is the mysterious heroine of these exploits, and that
Arsène Lupin directed them.”
“Those facts do not solve the mystery; in fact, they render it more
obscure. The blonde Lady commits a murder in order to steal the
blue diamond, and yet she does not steal it. Afterward she steals it
and gets rid of it by secretly giving it to another person. How do you
explain her strange conduct?”
“I cannot explain it.”
“Of course; but, perhaps, someone else can.”
“Who?”
The Count hesitated, so the Countess replied, frankly:
“There is only one man besides yourself who is competent to
enter the arena with Arsène Lupin and overcome him. Have you any
objection to our engaging the services of Herlock Sholmes in this
case?”
Ganimard was vexed at the question, but stammered a reply:
“No ... but ... I do not understand what——”
“Let me explain. All this mystery annoys me. I wish to have it
cleared up. Monsieur Gerbois and Monsieur d’Hautrec have the same
desire, and we have agreed to send for the celebrated English
detective.”
“You are right, madame,” replied the detective, with a loyalty that
did him credit, “you are right. Old Ganimard is not able to overcome
Arsène Lupin. But will Herlock Sholmes succeed? I hope so, as I
have the greatest admiration for him. But ... it is improbable.”
“Do you mean to say that he will not succeed?”
“That is my opinion. I can foresee the result of a duel between
Herlock Sholmes and Arsène Lupin. The Englishman will be
defeated.”
“But, in any event, can we count on your assistance?”
“Quite so, madame. I shall be pleased to render Monsieur Sholmes
all possible assistance.”
“Do you know his address?”
“Yes; 219 Parker street.”
That evening Monsieur and Madame de Crozon withdrew the
charge they had made against Herr Bleichen, and a joint letter was
addressed to Herlock Sholmes.
CHAPTER III.
HERLOCK SHOLMES OPENS
HOSTILITIES.
At the very moment in which Lupin left me, Herlock Sholmes rose
from the table, and looked at his watch.
“Twenty minutes to nine. At nine o’clock I am to meet the Count
and Countess at the railway station.”
“Then, we must be off!” exclaimed Wilson, between two drinks of
whisky.
They left the restaurant.
“Wilson, don’t look behind. We may be followed, and, in that case,
let us act as if we did not care. Wilson, I want your opinion: why
was Lupin in that restaurant?”
“To get something to eat,” replied Wilson, quickly.
“Wilson, I must congratulate you on the accuracy of your
deduction. I couldn’t have done better myself.”
Wilson blushed with pleasure, and Sholmes continued:
“To get something to eat. Very well, and, after that, probably, to
assure himself whether I am going to the Château de Crozon, as
announced by Ganimard in his interview. I must go in order not to
disappoint him. But, in order to gain time on him, I shall not go.”
“Ah!” said Wilson, nonplused.
“You, my friend, will walk down this street, take a carriage, two,
three carriages. Return later and get the valises that we left at the
station, and make for the Elysée-Palace at a galop.”
“And when I reach the Elysée-Palace?”
“Engage a room, go to sleep, and await my orders.”
Quite proud of the important rôle assigned to him, Wilson set out
to perform his task. Herlock Sholmes proceeded to the railway
station, bought a ticket, and repaired to the Amiens’ express in
which the Count and Countess de Crozon were already installed. He
bowed to them, lighted his pipe, and had a quiet smoke in the
corridor. The train started. Ten minutes later he took a seat beside
the Countess, and said to her:
“Have you the ring here, madame?”
“Yes.”
“Will you kindly let me see it?”
He took it, and examined it closely.
“Just as I suspected: it is a manufactured diamond.”
“A manufactured diamond?”
“Yes; a new process which consists in submitting diamond dust to
a tremendous heat until it melts and is then molded into a single
stone.”
“But my diamond is genuine.”
“Yes, your diamond is; but this is not yours.”
“Where is mine?”
“It is held by Arsène Lupin.”
“And this stone?”
“Was substituted for yours, and slipped into Herr Bleichen’s tooth-
powder, where it was afterwards found.”
“Then you think this is false?”
“Absolutely false.”
The Countess was overwhelmed with surprise and grief, while her
husband scrutinized the diamond with an incredulous air. Finally she
stammered:
“Is it possible? And why did they not merely steal it and be done
with it? And how did they steal it?”
“That is exactly what I am going to find out.”
“At the Château de Crozon?”
“No. I shall leave the train at Creil and return to Paris. It is there
the game between me and Arsène Lupin must be played. In fact, the
game has commenced already, and Lupin thinks I am on my way to
the château.”
“But—”
“What does it matter to you, madame? The essential thing is your
diamond, is it not?”
“Yes.”
“Well, don’t worry. I have just undertaken a much more difficult
task than that. You have my promise that I will restore the true
diamond to you within ten days.”
The train slackened its speed. He put the false diamond in his
pocket and opened the door. The Count cried out:
“That is the wrong side of the train. You are getting out on the
tracks.”
“That is my intention. If Lupin has anyone on my track, he will
lose sight of me now. Adieu.”
An employee protested in vain. After the departure of the train,
the Englishman sought the station-master’s office. Forty minutes
later he leaped into a train that landed him in Paris shortly before
midnight. He ran across the platform, entered the lunch-room, made
his exit at another door, and jumped into a cab.
“Driver—rue Clapeyron.”
Having reached the conclusion that he was not followed, he
stopped the carriage at the end of the street, and proceeded to
make a careful examination of Monsieur Detinan’s house and the
two adjoining houses. He made measurements of certain distances
and entered the figures in his notebook.
“Driver—avenue Henri-Martin.”
At the corner of the avenue and the rue de la Pompe, he
dismissed the carriage, walked down the street to number 134, and
performed the same operations in front of the house of the late
Baron d’Hautrec and the two adjoining houses, measuring the width
of the respective façades and calculating the depth of the little
gardens that stood in front of them.
The avenue was deserted, and was very dark under its four rows
of trees, between which, at considerable intervals, a few gas-lamps
struggled in vain to light the deep shadows. One of them threw a
dim light over a portion of the house, and Sholmes perceived the
“To-let” sign posted on the gate, the neglected walks which encircled
the small lawn, and the large bare windows of the vacant house.
“I suppose,” he said to himself, “the house has been unoccupied
since the death of the baron.... Ah! if I could only get in and view
the scene of the murder!”
No sooner did the idea occur to him than he sought to put it in
execution. But how could he manage it? He could not climb over the
gate; it was too high. So he took from his pocket an electric lantern
and a skeleton key which he always carried. Then, to his great
surprise, he discovered that the gate was not locked; in fact, it was
open about three or four inches. He entered the garden, and was
careful to leave the gate as he had found it—partly open. But he had
not taken many steps from the gate when he stopped. He had seen
a light pass one of the windows on the second floor.
He saw the light pass a second window and a third, but he saw
nothing else, except a silhouette outlined on the walls of the rooms.
The light descended to the first floor, and, for a long time, wandered
from room to room.
“Who the deuce is walking, at one o’clock in the morning, through
the house in which the Baron d’Hautrec was killed?” Herlock
Sholmes asked himself, deeply interested.
There was only one way to find out, and that was to enter the
house himself. He did not hesitate, but started for the door of the
house. However, at the moment when he crossed the streak of
gaslight that came from the street-lamp, the man must have seen
him, for the light in the house was suddenly extinguished and
Herlock Sholmes did not see it again. Softly, he tried the door. It was
open, also. Hearing no sound, he advanced through the hallway,
encountered the foot of the stairs, and ascended to the first floor.
Here there was the same silence, the same darkness.
He entered, one of the rooms and approached a window through
which came a feeble light from the outside. On looking through the
window he saw the man, who had no doubt descended by another
stairway and escaped by another door. The man was threading his
way through the shrubbery which bordered the wall that separated
the two gardens.
“The deuce!” exclaimed Sholmes, “he is going to escape.”
He hastened down the stairs and leaped over the steps in his
eagerness to cut off the man’s retreat. But he did not see anyone,
and, owing to the darkness, it was several seconds before he was
able to distinguish a bulky form moving through the shrubbery. This
gave the Englishman food for reflection. Why had the man not made
his escape, which he could have done so easily? Had he remained in
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com