text
stringlengths
0
6.48M
meta
dict
In digital cameras with video recording capability, one of the desired features is the ability to zoom and focus while video recording. Most cameras with this built-in feature suffer from the problem of the user hearing the sound of the zoom motor picked up by on-camera microphones. FIG. 1 is a simple block diagram of the camera where Mic1 and Mic2 are the two microphones used on the camera for audio stereo recording, S1 represents the desired voice or audio signal that should be recorded by the camera with minimum distortion and S2 represents the audio noise generated by the zoom or lens focus motor. Also in this figure, h21 and h22 represent the acoustic paths between the motor and the two microphones. Due to the small size of video cameras, the motor will be in close proximity of the two microphones and as a result most of the noise generated by zoom or focus motors will be picked up by the two microphones. To most users this noise is annoying and desirably should be eliminated. A rather expensive way of achieving this result is to use quieter zoom and focus motors. This may not be a cost effective solution, especially for low cost cameras. Another approach to this problem is to remove the noise by performing digital signal processing on the microphone signals. In most cameras the audio signals from the microphones signals are digitized using analog to digital (A/D) converters and processed by an embedded processor, which may also compress the recorded audio signals before saving them into a flash memory. A signal processing algorithm for removing the motor noise from input audio signal can be made part of the software running on the camera processor, ideally before audio compression stage. This solution can be very cost effective since it only requires a software upgrade rather than modification to expensive hardware. Although very cost effective, removing camera motor noise through digital processing of the microphone signals is a non-trivial task. The main challenge is that removing the motor noise should not distort input audio signal. Camera zoom motor noise is wideband and quasi stationary in nature, and it shares same frequency bands with the input audio signal itself. As a result, such noise cannot be eliminated using traditional DSP filtering techniques (e.g. lowpass filtering, notch filter etc.). Also single microphone noise reduction methods which rely on subtracting noise spectrum from the input signal spectrum are not very attractive since they tend to distort the original audio signal. To make matters worse, the spectrum of motor noise may change with time. This can affect the performance of the algorithms that mainly rely on a stationary noise assumption. Other approaches such as beamfoming and active noise control (ANC) have their own limitations. For example, for beamforming the geometry and number of microphones and their location affects the output performance. Also beamforming or similar approaches may require a greater number of microphones (more than two) which may not feasible on a small camera body. In addition, these methods are usually computationaly expensive to implement.
{ "pile_set_name": "USPTO Backgrounds" }
Perovskite-related oxynitrides in photocatalysis. Over the last decades photocatalytic water splitting has become of increasing importance for fundamental and applied research, since the direct conversion of sunlight into chemical energy via the production of H2 has the potential to contribute to the world's energy needs without CO2 generation. One of the unsolved challenges consists of finding a highly efficient photocatalyst that is cheap, environmentally friendly, contains exclusively abundant elements, is (photo)chemically stable and absorbs visible light. Photocatalytic efficiency is closely connected to both structural properties like crystallinity, particle size and surface area and to electronic properties like the band gap and the quantum efficiency. Hence extensive control over a large parameter field is necessary to design a good photocatalyst. A material class where the structure-composition-property relations and the influence of substitution effects are well studied is the perovskite-type family of compounds. The perovskite-related oxynitrides belong to this very flexible compound family where many of the necessary characteristics for a photocatalyst are already given and some of the intrinsic properties like the band gap can be tuned within the same crystal structure by substitution. In this work we present materials' design concepts to improve the photocatalytic efficiency of a perovskite-type catalyst and describe their effects on the photocatalytic activity.
{ "pile_set_name": "PubMed Abstracts" }
A news release regarding the Commission Schedules Information Hearing and Site Visit of Proposed Power Plant Site in Chino has been posted. To view this news release, please visit: http://www.energy.ca.gov/releases/2001_releases/2001-05-12_chino.html Thank you, Jon Doidge CEC Web Team
{ "pile_set_name": "Enron Emails" }
So Beautiful: Summer Beauty Essentials from The Body Shop for Mother’s Day The Body Shop is a perennial fave destination for picking up pampering products for mom on Mother’s Day…but instead of going the bath and body care route, why not look into the brand’s awesome beauty products? I’m highlighting a few summer beauty essentials that’ll make mom look radiant! Shade Adjusting Drops – $22 eachThis is such an ingenious idea I can’t believe I’ve never seen it again. If you’ve ever had a foundation that’s not *quite* your skin tone (especially as it darkens in the summer), this is the product for you. Add a drop to your foundation to either lighten or darken it a half-shade until you’ve got the perfect tone. Perfect for perfectionist moms! Matte Lip Liquid – $15 eachMatte lipstick is having a major moment right now. It’s easy to apply for a rich, saturated look in a flash, and it generally stays all day, even when the heat is blazing in the summer. Coming in 12 shades, The Body Shop’s formulation promises not to dry out your lips while delivering trendy, stay-put colour. Honey Bronze Drops of Sun Holiday Glow Creator – $22So you spend your days in an office but want to look like you’ve spent them resting by the beach? This washable instant bronzing formula is your new best friend. Apply directly to your body for a covetable glow, or mix it into your foundation or lotion for a more subtle effect. A must-have to avoid pasty leg syndrome! Who wants to nab all of these amazing summer beauty essentials from The Body Shop? Here’s how to enter for a chance to win it all! 1) First off! You must be a Canadian Gift Guide subscriber to enter this giveaway. Just find the ‘Gift of Gab’ box on the righthand side of this page and either hit ‘Follow’ or enter your email address. Once you’ve done that, leave me a comment by May 31, 2017 with a linkback to your favourite Mother’s Day gift idea from The Body Shop. 2) Entries are limited to one per person / per email address / per household (or more if you score bonus entries). A random draw will be conducted on or around June 1, 2017 to select the winner(s), who will have 48 hours to respond before another winner is chosen in their place. 3) Entries are limited to Canadians that have reached the age of majority in their province. Quebec is not eligible for this promotion. 5) Bonus Entry #2: Follow The Body Shop on Instagram and either Regram one of their photos and take a photo of your fave Mother’s Day gift idea from their site and share it on your own feed, tagging them in it. Leave a link back to your photo in the comments below in a separate comment. 6) Bonus Entry #3: Follow The Body Shop on Twitter and Tweet about this contest, including a link. Be sure to tag me (@cdngiftguide) and post a link back to your Tweet in a separate comment below!
{ "pile_set_name": "Pile-CC" }
Clionella bornii Clionella bornii is a species of sea snail, a marine gastropod mollusk in the family Clavatulidae. Description The size of an adult shell varies between 25 mm and 40 mm. (Freely translated from the original Latin description) The whitish shell is elongated and subturrited. The shell contains about 8 rather flat whorls (the apex is lacking). Just below the suture it shows a bipartite girdle. The space between the longitudinal ribs has a red color These interstices are as long as the ribs. The oblique ribs are numerous and increase from 11-12 on the early whorls to 18 on the body whorl, extending almost to the siphonal canal. The spiral striae show obsolete grooves and are best seen on the early whorls. The oval aperture has a length of about the length of the shell. The aperture narrows to a slender point at its top. The very short siphonal canal is slightly curved to the left. The columella is slightly curved in the middle and almost twisted. The outer lip is narrow and shows a rather deep sinus. This species is closely allied to the well-known Clionella sinuata. It differs, however, in being covered with a paler epidermis, in having below the suture a raised girdle formed by a depression or constriction around the whorls, and also in the style of coloration. Distribution This marine species occurs between Jeffrey's Bay and East London, South Africa References E.A. Smith, Diagnoses of new Species of Pleurotomidae in the British Museum; The Annals and Magazine of Natural History: Including Zoology, Botany, and Geology. 1877, vol. xix. p. 499 Kilburn, R.N. (1985). Turridae (Mollusca: Gastropoda) of southern Africa and Mozambique. Part 2. Subfamily Clavatulinae. Annals of the Natal Museum. 26(2), 417-470. External links bornii Category:Gastropods described in 1877
{ "pile_set_name": "Wikipedia (en)" }
Multiple combined therapy for severe Henoch-Schönlein nephritis in children. From 1980 through 1992, 14 children with Henoch-Schönlein nephritis (HSN) showing severe glomerular changes (grade IV or V) were given a multiple combined therapy with prednisolone, cyclophosphamide, heparin/warfarin, and dipyridamole, and were followed for 7.5+/-0.9 years. The period between the onset of nephritis and the start of therapy was 0.8+/-0.4 years. Ten patients underwent follow-up biopsy after therapy. The percentage of glomeruli having crescents/segmental lesions was significantly reduced after therapy (70%+/-5% vs. 42%+/-7%, P <0.01), due mainly to the resolution of crescents (51%+/-8% vs. 13%+/-5%, P <0.01). Thus, histological grade was significantly improved (5 grade IV and 5 grade V vs. 7 grade III and 3 grade IV, P <0.01). After an average follow-up period of 7.5 years, 9 patients showed normal urine and renal function, 4 showed minor urinary abnormalities, and 1 heavy proteinuria. No patient developed chronic renal insufficiency. These findings suggest that the multiple combined therapy could be effective. for histologically severe HSN, although a prospective controlled study should be performed.
{ "pile_set_name": "PubMed Abstracts" }
Transcranial direct current stimulation changes human endowment effect. To test whether the right inferior frontal gyrus (IFG) plays role in the endowment effect, we investigated the effects of transcranial direct current stimulation (tDCS) of the right IFG on the willingness to accept/willingness to pay (WTA/WTP) discrepancy. Twelve healthy subjects underwent anodal, cathodal and sham tDCS on separate days. Stimulation was applied over the right IFG for 20min at 2mA. Subjects participated in the pricing task where they evaluated the presented items under WTA and WTP framings during tDCS intervention. The results showed that the WTA/WTP ratio after anodal tDCS was significantly higher than that after cathodal one. In addition, we found that the reaction time during the cathodal tDCS condition was significantly longer compared to those during anodal or sham tDCS conditions. Our findings suggest the functional relevance of the right IFG for producing endowment effect.
{ "pile_set_name": "PubMed Abstracts" }
Have you heard the version of Echoes from Dave Gilmour Live in Gdansk? If I could I would take all my albums with me. Last count about 650 inc CD's, vinyl and cassettes. Even had some reel to reel at one stage plus all the downloads. Lantern Swinger Have you heard the version of Echoes from Dave Gilmour Live in Gdansk? If I could I would take all my albums with me. Last count about 650 inc CD's, vinyl and cassettes. Even had some reel to reel at one stage plus all the downloads. Yeah got that on vinyl but the best version ive ever heard was when i went to watch him in manchester for the on an island tour seeing echoes live proper blew me away, ive got my tickets for roger waters performing the wall in manchester as well comfortaly numb won't be the same without gilmour MIA Yeah got that on vinyl but the best version ive ever heard was when i went to watch him in manchester for the on an island tour seeing echoes live proper blew me away, ive got my tickets for roger waters performing the wall in manchester as well comfortaly numb won't be the same without gilmour Heard Comfortably a couple of times without Mr Gilmour - it's not the same. Saw Australian Pink Floyd perform The Wall - they were very good and they have a massive following. In fact so good, going back to see them again. They've got all the inflatables and everything. MIA Was at the Aussie Pink Floyd Concert last night. They rocked. The guy doing the Comfortably Numb solo got it licked. Note perfect. Big inflatable kangeroo as a special guest. Second half of the concert - the background film was 3D and we all had 3D specs handed out. Played all the Floyd favourites and some early stuff. Don't know what people think about cover bands but Aussie Floyd are brilliant in their own right. Light show fantastic. If you're a Floyd fan - go and see them. You won't be disappointed. :-D Midshipman Both Sides Now - Joni Mitchell (dedicated to all hermits, lovers, and men and women of Earth) Up where we belong - Joe Cocker (dedicated to my adorable Danni) I'm still standing - Elton John (dedicated to the French Resistance, SOE, Troop of Antibes, and the old Gentleman who reminded me in Nice that I would never walk alone near the Place des Anglaises) Back in Black - ACDC (Dedicated to my brothers at Garway Commandery and Fleet) And finally and perhaps most importantly...The Imperial March - written by John Williams, but best played by the Vienna Philarmonic Orchestra (Dedicated to the Late Arch-Duke Otto Von Habsburg and his most loyal Sergeant at Arms; well met Gentlemen.)
{ "pile_set_name": "Pile-CC" }
Calyptrogyne Calyptrogyne is a genus in the palm family (Arecaceae). The distribution of this genus is Central America, Colombia, and southern Mexico, with 11 of the 17 known species endemic to Panama. Calyptrogyne ghiesbreghtiana is the most widespread and best studied species in this genus. Calyptrogyne allenii (L.H.Bailey) de Nevers - Panama Calyptrogyne anomala de Nevers & A.J.Hend. - Panama Calyptrogyne baudensis A.J.Hend. - Colombia Calyptrogyne coloradensis A.J.Hend. - Panama Calyptrogyne condensata (L.H.Bailey) Wess.Boer - Panama, Costa Rica Calyptrogyne costatifrons (L.H.Bailey) de Nevers - Panama Calyptrogyne deneversii A.J.Hend. - Panama Calyptrogyne fortunensis A.J.Hend. - Panama Calyptrogyne ghiesbreghtiana (Linden & H.Wendl.) H.Wendl. - Chiapas, Tabasco, Veracruz, Belize, Guatemala, Honduras, Nicaragua, Costa Rica, Panama Calyptrogyne herrerae Grayum. - Costa Rica Calyptrogyne kunorum de Nevers - Panama Calyptrogyne osensis A.J.Hend. - Costa Rica Calyptrogyne panamensis A.J.Hend. - Panama Calyptrogyne pubescens de Nevers - Panama Calyptrogyne sanblasensis A.J.Hend. - Panama Calyptrogyne trichostachys Burret - Costa Rica Calyptrogyne tutensis A.J.Hend. - Panama References Category:Trees of Central America Category:Arecaceae genera
{ "pile_set_name": "Wikipedia (en)" }
Q: Divide array in JavaScript Welcome got fast question it's probably easy, but I'm stuck with it. I've got an array in javascript, that looks like this: var array = [1, 3, 4, 5, 6, 7]; Now I need to modify this array to look something like this: var array = ['1:3', '4:5', '6:7']; Is there elegant way to do this? A: Try this: var array = [1, 3, 4, 5, 6, 7]; var newArray = []; for (var i = 0; i < array.length; i+=2) { newArray.push(array[i] + ':' + array[i + 1]); }; Example fiddle
{ "pile_set_name": "StackExchange" }
@NyleDiMarco - we love you! Thought your fans might like to learn a few things in sign language. Nyle DiMarco is a contestant on America's Next Top Model (#ANTM) Cycle 22. He's a model, he's a compe... There was drama on a plane after a man was accused of allegedly punching a deaf pregnant woman and a service dog on a flight to Orlando over the weekend. Matthew Silvay and Hazel Ramirez, a deaf coupl... We live in a world made for people who hear. Subscribe to our channel! http://goo.gl/0bsAjO Read the full feature on DeafSpace: http://www.curbed.com/2016/3/2/11140210/gallaudet-deafspace-washington-... Gallaudet University in Washington is the world's only university with programs designed for deaf students and those who are hard-of-hearing. But hearing disorders do not keep students from learning b... According to the Gallaudet University it is the only university in the world where all the programs and services are designed keeping in mind the needs of deaf students. Located in Washington DC the u... Background: Laurene is African American, wearing a purple blouse with a black top and glasses. The background is pale yellow. Copy or click the link here for a transcript of this video: Gallaudet Un... We guarantee Lost Voice Guy will have you feeling the mega-lolz as he brings something completely different to the comedy scene. His cerebral palsy has left him unable to speak, but it certainly does...
{ "pile_set_name": "Pile-CC" }
Clinical practice guidelines for first-line/after-relapse treatment of patients with follicular lymphoma. Key points and recommendations Follicular lymphoma is a subgroup of non-Hodgkin lymphomas of B-cell origin, characterized by a pattern of remissions and continued relapses. It is the second most common type of lymphoid cancer in Western Europe, representing 22-40% of non-Hodgkin lymphomas. The annual incidence of the disease has increased in recent decades. At this time, and with the arrival of new treatment options, patients' outcomes have significantly improved. It is therefore essential to standardize recommendations for the treatment and follow-up of patients with follicular lymphoma, in each clinical scenario. Searches were performed in Medline (PubMed, 1966-present) and The Cochrane Library, using MeSH (Medical Subject Headings) terms whenever possible. The best scientific evidence was obtained from selected randomized studies and meta-analyses. For recommendations where there was no scientific evidence, the consensus of clinical experts was obtained regarding clinical and therapeutic attitudes to improve the treatment of these patients. Recommendations are compiled according to: (i) induction treatment in first-line; (ii) post-induction treatment in first-line; (iii) rescue treatment after relapse; (iv) post-induction treatment in relapse and (v) subsequent treatments. There are different recommendations for each group. They take into account different variables, such as therapeutic options, patient follow-up, laboratory and imaging data, previous response and special groups. The recommendations contained in this guide have been assigned different grades (A, B, C and D), depending on the level of evidence on which they are based (where there is no scientific evidence, they follow the consensus of Good Clinical Practice: see the Appendix). These guidelines provide healthcare professionals with updated and consensual tools for the better management of patients with follicular lymphoma.
{ "pile_set_name": "PubMed Abstracts" }
Kovancılar Kovancılar () is a town and district of Elazığ Province of Turkey. The mayor is Hacı Akpınar (AKP). The population is 20,635. References Category:Towns in Turkey Category:Populated places in Elazığ Province Category:Districts of Elazığ Province
{ "pile_set_name": "Wikipedia (en)" }
--- abstract: 'Higher dimensional super symmetry has been analyzed in terms of quaternion variables and the theory of quaternion harmonic oscillator has been analyzed. Supersymmertization of quaternion Dirac equation has been developed for massless,massive and interacting cases including generalized electromagnetic fields of dyons. Accordingly higher dimensional super symmetric gauge theories of dyons are analyzed.' author: - 'O.P.S. Negi [^1]' title: HIGHER DIMENSIONAL SUPERSYMMETRY --- Department of Physics\ Kumaun University\ S. S. J. Campus\ Almora- 263601, U.A., India\ E-mail:- ops\_negi@yahoo.co.in Introduction ============ Quaternions were very first example of hyper complex numbers having the significant impacts on mathematics & physics [@key-1] . Because of their beautiful and unique properties quaternions attached many to study the laws of nature over the field of these numbers. Quaternions are already used in the context of special relativity [@key-2], electrodynamics [@key-3; @key-4], Maxwell’s equation[@key-5], quantum mechanics[@key-6; @key-7], Quaternion Oscillator[@key-8], gauge theorie [@key-9; @key-10] , Supersymmetry [@key-11]and many other branches of Physics[@key-12] and Mathematics[@key-13].On the other hand supersymmetry (SUSY) is described as the symmetry of bosons and fermions[@key-14; @key-15; @key-16]. Gauge Hierarchy problem, not only suggests that the SUSY exists but put an upper limit on the masses of super partners[@key-17; @key-18]. The exact SUSY implies exact fermion-boson masses, which has not been observed so far. Hence it is believed that supersymmetry is an approximate symmetry and it must be broken [@key-19; @key-20]. We have considered following two motivations to study the higher dimensional supersymmetric quantum mechanics[@key-21] over the field of Quaternions. 1\. Supersymmetric field theory can provide us realistic models of particle physics which do not suffer from gauge hierarchy problem and role of quaternions will provide us simplex and compact calculation accordingly. 2\. Quaternions super symmetric quantum mechanics can give us new window to understand the behavior of supersymmetric partners and mechanism of super symmetry breaking etc. 3\. Quaternions are capable to deal the higher dimensional structure and thus include the theory of monopoles and dyons. Keeping these facts in mind and to observe the role of quaternions in supersymmetry, the theory of quaternion harmonic oscillator has been analyzed for the systems of bosons and fermions respectively in terms of commutation and anti commutation relations. Eigen values of particle Hamiltonian and number operators are calculated by imposing the restriction on the component of quaternion variables. Accordingly, the super charges are calculated and it is shown that the Hamiltonian operator commutes with the super charges representing the conversion of a fermionic state to a bosonic state and vice versa. Quaternion reformulation of N= 1 , 2 and 4 dimension supersymmetry has been investigated in terms of supercharges and super partner potential and quaternion mechanics has also been analyzed in terms of complex and quaternion quantum mechanics for N = 2 and N = 4 SUSY respectively. It has been shown that elegant frame work of quaternion quantum mechanics includes non Abelian gauge structure in contradiction to complex quantum mechanics of supersymmetry corresponding to N= 2, complex and N= 4 real dimension of supersymmetry. Definition ========== A quaternion $\phi$ is expressed as $$\begin{aligned} \phi & = & e_{\text{0}}\phi_{0}+e_{1}\phi_{1}+e_{2}\phi_{2}+e_{3}\phi_{3}\label{eq:1}\end{aligned}$$ Where $\phi_{0},\phi_{1},\phi_{2},\phi_{3}$are the real quartets of a quaternion and $e_{0},e_{1},e_{2},e_{3}$ are called quaternion units and satisfies the following relations, $$\begin{aligned} e_{0}^{2} & = & e_{0}=1\nonumber \\ e_{0}e_{i} & = & e_{i}e_{0}=e_{i}(i=1,2,3)\nonumber \\ e_{i}e_{j} & = & -\delta_{ij}+\varepsilon_{ijk}e_{k}(i,j,k=1,2,3)\label{eq:2}\end{aligned}$$ The quaternion conjugate $\bar{\phi}$ is then defined as $$\begin{aligned} \bar{\phi} & = & e_{\text{0}}\phi_{0}-e_{1}\phi_{1}-e_{2}\phi_{2}-e_{3}\phi_{3}\label{eq:3}\end{aligned}$$ Here $\phi_{0}$is real part of the quaternion defined as$$\begin{aligned} \phi_{0} & =Re\,\,\phi=\frac{1}{2}(\bar{\phi}+\phi)\label{eq:4}\end{aligned}$$ $Re\,\,\phi=\phi_{0}=0$ , then $\phi=-\bar{\phi}$ and imaginary $\phi$ is called pure quaternion and is written as $$\begin{aligned} Im\,\,\phi & = & e_{1}\phi_{1}+e_{2}\phi_{2}+e_{3}\phi_{3}\label{eq:5}\end{aligned}$$ The norm of a quaternion is expressed as $$\begin{aligned} N(\phi) & = & \bar{\phi}\phi=\phi\bar{\phi}=\phi_{0}^{2}+\phi_{1}^{2}+\phi_{2}^{2}+\phi_{3}^{2}\geq0\label{eq:6}\end{aligned}$$ and the inverse of a quaternion is described as $$\begin{aligned} \phi^{-1} & = & \frac{\bar{\phi}}{\left|\phi\right|}\label{eq:7}\end{aligned}$$ While the quaternion conjugation satisfies the following property $$\begin{aligned} \overline{(\phi_{1}\phi_{2})} & = & \bar{\phi_{2}}\bar{\phi}_{1}\label{eq:8}\end{aligned}$$ The norm of the quaternion (\[eq:6\]) is positive definite and enjoys the composition law $$\begin{aligned} N(\phi_{1}\phi_{2}) & = & N(\phi_{1})N(\phi_{2})\label{eq:9}\end{aligned}$$ Quaternion (\[eq:1\]) is also written as $\phi=(\phi_{0},\overrightarrow{\phi})$where $\overrightarrow{\phi}=$$e_{1}$$\phi_{1}+e_{2}\phi_{2}+e_{3}$$\phi_{3}$ is its vector part and $\phi_{0}$is its scalar part. The sum and product of two quaternions are $$\begin{aligned} (\alpha_{0},\overrightarrow{\alpha})+(\beta_{0},\overrightarrow{\beta}) & = & (\alpha_{0}+\beta_{0},\overrightarrow{\alpha}+\overrightarrow{\beta})\nonumber \\ (\alpha_{0},\overrightarrow{\alpha})\,(\beta_{0},\overrightarrow{\beta}) & = & (\alpha_{0}\beta_{0}-\overrightarrow{\alpha}.\overrightarrow{\beta},\,\alpha_{0}\overrightarrow{\beta}+\beta_{0}\overrightarrow{\alpha}+\overrightarrow{\alpha}\times\overrightarrow{\beta})\label{eq:10}\end{aligned}$$ Quaternion elements are non-Abelian in nature and thus represent a division ring. Field Associated with Dyons =========================== Let us define the generalized charge on dyons as [@key-22; @key-23], $$\begin{aligned} q & = & q=e\,\,-\,\, i\,\, g\,\,\,(i=\sqrt{-1})\label{eq:11}\end{aligned}$$ where e and g are respectively electric and magnetic charges. Generalized four potential $\left\{ V_{\mu}\right\} =\left(\varphi,\overrightarrow{V}\right)$associated with dyons is defined as, $$\begin{aligned} \left\{ V_{\mu}\right\} & = & \left\{ A_{\mu}\right\} -\, i\,\,\left\{ B_{\mu}\right\} =(\varphi,\overrightarrow{V)}\label{eq:12}\end{aligned}$$ where $\left\{ A_{\mu}\right\} =\left(\varphi_{e},\overrightarrow{A}\right)$and $\left\{ B_{\mu}\right\} =\left(\varphi_{g},\overrightarrow{B}\right)$are respectively electric and magnetic four potentials. We have used throughout the natural units $c=\hslash=1$. Electric and magnetic fields of dyons are defined in terms of components of electric and magnetic potentials as, $$\begin{aligned} \overrightarrow{E} & = & -\frac{\partial\overrightarrow{A}}{\partial t}-\overrightarrow{\nabla}\varphi_{e}-\overrightarrow{\nabla}\times\overrightarrow{A}\nonumber \\ \overrightarrow{H} & = & -\frac{\partial\overrightarrow{B}}{\partial t}-\overrightarrow{\nabla}\varphi_{g}-\overrightarrow{\nabla}\times\overrightarrow{B}\label{eq:13}\end{aligned}$$ These electric and magnetic fields of dyons are invariant under generalized duality transformation i.e. $$\begin{aligned} \left\{ A_{\mu}\right\} & \Rightarrow & \left\{ A_{\mu}\right\} cos\theta+\left\{ B_{\mu}\right\} sin\theta\nonumber \\ \left\{ B_{\mu}\right\} & \Rightarrow & -\left\{ A_{\mu}\right\} sin\theta+\left\{ B_{\mu}\right\} cos\theta\label{eq:14}\end{aligned}$$ The expression of generalized electric and magnetic fields given by equation (\[eq:13\]) are symmetrical and both the electric and magnetic fields of dyons may be written in terms of longitudinal and transverse components. The generalized vector electromagnetic fields associated with dyons is defined as $$\begin{aligned} \overrightarrow{\psi} & = & \overrightarrow{E}-i\,\,\overrightarrow{H}\label{eq:15}\end{aligned}$$ As such, we get the following differential form of generalized Maxwell’s equations for dyons i.e. $$\begin{aligned} \overrightarrow{\nabla}\cdot\overrightarrow{\psi} & = & J_{0}\nonumber \\ \overrightarrow{\nabla}\times\overrightarrow{\psi} & = & -i\,\,\overrightarrow{J}-i\,\,\frac{\partial\overrightarrow{\psi}}{\partial t}\label{eq:16}\end{aligned}$$ where $j_{0}$ and $\overrightarrow{J}$, are the generalized charge and current source densities of dyons, given by; $$\begin{aligned} \left\{ J_{\mu}\right\} & = & \left\{ j_{\mu}\right\} -\,\, i\,\,\left\{ k_{\mu}\right\} =\left(J_{0},\overrightarrow{J}\right)\label{eq:17}\end{aligned}$$ Substituting relation (\[eq:13\]) into equation (\[eq:15\]) and using equation (\[eq:12\]), we obtain the following relation between generalized vector field and potential of dyons i.e. $$\begin{aligned} \overrightarrow{\psi} & = & -\frac{\partial\overrightarrow{V}}{\partial t}-\overrightarrow{\nabla}\varphi-i\,\,\overrightarrow{\nabla}\times\overrightarrow{V}\label{eq:18}\end{aligned}$$ where electric and magnetic four current densities$\left\{ j_{\mu}\right\} =(\rho_{e},\,\overrightarrow{j}$)and $\left\{ k_{\mu}\right\} =(\rho_{g},$$\overrightarrow{k}\,)$Thus we write the following tensor forms of generalized Maxwell’s-Dirac equations of dyons i.e. $$\begin{aligned} F_{\mu\nu,\,\nu} & = & \partial^{\nu}F_{\mu\nu}=j_{\mu}\nonumber \\ \tilde{F}_{\mu\nu,\,\nu} & = & \partial^{\nu}\tilde{F}_{\mu\nu}=k_{\mu}\label{eq:19}\end{aligned}$$ where $$\begin{aligned} F_{\mu\nu} & = & E_{\mu\nu}-\tilde{H}_{\mu\nu}\nonumber \\ \tilde{F}_{\mu\nu} & = & H_{\mu\nu}+\tilde{E}_{\mu\nu}\label{eq:20}\end{aligned}$$ and $$\begin{aligned} E_{\mu\nu} & = & A_{\mu,\nu}-A_{\nu,\mu}\nonumber \\ H_{\mu\nu} & = & B_{\mu,\nu}-B_{\nu,\mu}\nonumber \\ \tilde{E}_{\mu\nu} & = & \frac{1}{2}\varepsilon_{\mu\nu\sigma\lambda}E^{\sigma\lambda}\nonumber \\ \tilde{H}_{\mu\nu} & = & \frac{1}{2}\varepsilon_{\mu\nu\sigma\lambda}H^{\sigma\lambda}\label{eq:21}\end{aligned}$$ The tidle denotes the dual part while $\varepsilon_{\mu\nu\sigma\lambda}$ are four indexes Levi-Civita symbol. Generalized fields of dyons given by equation (\[eq:13\]) may directly be obtained from field tensors $F_{\mu\nu}$and $\tilde{F}_{\mu\nu}$ as, $$\begin{aligned} F_{0i} & = & E^{\, i\,}\nonumber \\ F_{ij} & = & \varepsilon_{ijk}H^{\, k}\nonumber \\ \tilde{H}_{0i} & = & -H^{\, i}\nonumber \\ \tilde{H}_{ij} & = & -\varepsilon_{ijk}E^{^{k}}\label{eq:22}\end{aligned}$$ A new vector parameter S (say) may directly be obtained [@key-10; @key-12]from equation (\[eq:16\])i.e. $$\begin{aligned} \overrightarrow{S} & = & \square\overrightarrow{\psi}=-\frac{\partial\overrightarrow{\psi}}{\partial t}-\overrightarrow{\nabla}\rho-i\,\,\overrightarrow{\nabla}\times\overrightarrow{\psi}\label{eq:23}\end{aligned}$$ where $\square$represents the D’ Alembertian operator i.e. $$\begin{aligned} \square & = & \frac{\partial^{2}}{\partial t\,^{2}}-\frac{\partial^{2}}{\partial x\,^{2}}-\frac{\partial^{2}}{\partial y^{\,2}}-\frac{\partial^{2}}{\partial z\,^{2}}\label{eq:24}\end{aligned}$$ Defining generalized field tensor as $$\begin{aligned} G_{\mu\nu} & = & F_{\mu\nu}-i\,\tilde{F}_{\mu\nu}\label{eq:25}\end{aligned}$$ We may directly obtain the following generalized field equation of dyons i.e. $$\begin{aligned} G_{\mu\nu,\,\nu} & = & \partial^{\nu}G_{\mu\nu}=J_{\mu}\label{eq:26}\end{aligned}$$ where $G_{\mu\nu}=V_{\mu,\nu}-V_{\nu,\mu}$is called the generalized electromagnetic field tensor of dyons. Equation (\[eq:26\]) may also be written as follows like second order Klein-Gordon equation for dyonic fields; $$\begin{aligned} \square V_{\mu} & = & J_{\mu}\label{eq:27}\end{aligned}$$ where we have imposed the Lorentz gauge condition on both potentials and consequently to generalized potential. Equations ( \[eq:19\]) and (\[eq:26\]) are also invariant under duality transformations; $$\begin{aligned} (F,\tilde{F}) & = & (F\, cos\,\theta+\tilde{F}sin\,\theta;-F\, sin\,\theta+\,\tilde{F}\, cos\,\theta)\label{eq:28}\\ (j_{\mu},k_{\mu}) & = & (j_{\mu}cos\,\theta+k_{\mu}sin\,\theta;-j_{\mu}sin\,\theta+k_{\mu}cos\,\theta)\label{eq:29}\end{aligned}$$ where $$\begin{aligned} \frac{g}{e} & = & \frac{B_{\mu}}{A_{\mu}}=\frac{k_{\mu}}{j_{\mu}}=-tan\,\theta=Constant\label{eq:30}\end{aligned}$$ and consequently the generalized charge of a dyon may be written as $$\begin{aligned} q & = & \left|q\right|exp\,(-i\,\theta)\label{eq:31}\end{aligned}$$ The suitable Lagrangian density, which yields the field equation (\[eq:26\]) under the variation of field parameters (i.e. potential only) without changing the trajectory of particle, may be written as follows; $$\begin{aligned} \mathit{\mathsf{\mathbf{L}}} & = & -\frac{1}{4}G_{\mu\nu}^{*}G_{\mu\nu}+V_{\mu}^{*}V_{\mu}\label{eq:32}\end{aligned}$$ where [\*]{} denotes the complex conjugate. Lagrangian density given by equation (\[eq:32\]) directly leads the following expression of Lorentz force equation of motion for dyons i.e. $$\begin{aligned} f_{\mu} & = & Re\,(q^{*}G_{\mu\nu})u^{\nu}\label{eq:33}\end{aligned}$$ Where Re denotes real part and $\left\{ u^{\nu}\right\} $ is the four-velocity of the particle. Quaternion SUSY Harmonic Oscillator =================================== Let us define bosonic quaternion oscillator as the extension of complex oscillator having the decomposition [@key-8]as, $$\begin{aligned} \hat{a} & = & \frac{1}{\sqrt{6}}\left[\widehat{a}_{0}+e_{1}\widehat{a}_{1}+e_{2}\widehat{a}_{2}+e_{3}\widehat{a}_{3}\right]\label{eq:34}\end{aligned}$$ where $\widehat{a}_{0},\widehat{a}_{1},\widehat{a}_{2},\widehat{a}_{3}$are real operators . Let us defined the conjugate of equation (\[eq:34\]) as $$\begin{aligned} \hat{a}^{\dagger} & = & \frac{1}{\sqrt{6}}\left[\widehat{a}_{0}-e_{1}\widehat{a}_{1}-e_{2}\widehat{a}_{2}-e_{3}\widehat{a}_{3}\right]\label{eq:35}\end{aligned}$$ Like other oscillator, we start with the following fundamental boson commutation relations i.e. $$\begin{aligned} \left[\hat{a}\,\,,\,\,\hat{a}^{\dagger}\right] & = & 1\nonumber \\ \left[\hat{a}\,\,,\,\,\hat{a}\right] & = & 0\nonumber \\ \left[\hat{a}^{\dagger},\,\hat{a}^{\dagger}\right] & = & 0\label{eq:36}\end{aligned}$$ Then to maintain the above relations of bosonic oscillator,we get the following commutation relation between the components of bosonic oscillator in terms of imaginary quaternion units i.e. $$\begin{aligned} \left[\hat{a}_{0}\,\,,\,\,\hat{a_{1}}\right] & = & e_{1}\nonumber \\ \left[\hat{a}_{0}\,\,,\,\,\hat{a_{2}}\right] & = & e_{2}\nonumber \\ \left[\hat{a}_{0}\,\,,\,\,\hat{a}_{3}\right] & = & e_{3}\label{eq:37}\end{aligned}$$ or$$\begin{aligned} \left[\hat{a}_{0}\,\,,\,\,\hat{a_{A}}\right] & = & e_{A}(A=1,2,3)\nonumber \\ \left[\hat{a}_{\mu}\,\,,\,\,\hat{a}_{\nu}\right] & = & \,\,0\quad\forall\,\,\,\mu\neq\nu\label{eq:38}\end{aligned}$$ Let us describe the Hamiltonian for bosonic harmonic oscillator as $$\begin{aligned} \hat{H_{B}} & = & \frac{p^{2}}{2m}+\frac{1}{2}m\omega^{2}q^{2}\label{eq:39}\end{aligned}$$ which can be written in terms of as $$\begin{aligned} \hat{H_{B}} & = & \frac{1}{2}\hbar\omega(\hat{a}\,\hat{a}^{\dagger}+\hat{a}^{\dagger}\hat{a)}=\hbar\omega(\hat{a}^{\dagger}\hat{a\,+\frac{1}{2})}\label{eq:40}\end{aligned}$$ where $$\begin{aligned} \hat{a} & = & \frac{1}{\sqrt{2m\hbar\omega}}\left(m\omega\hat{q}-e_{1}\hat{p}\right)\nonumber \\ \hat{a}^{\dagger} & = & \frac{1}{\sqrt{2m\hbar\omega}}\left(m\omega\hat{q}+e_{1}\hat{p}\right)\label{eq:41}\end{aligned}$$ Then it is necessary to recover the ordinary commutation relation $\left[\hat{q},\hat{p}\right]=i$ $\hbar$ between $\hat{q}\hat{,p}$ .So, we get $$\begin{aligned} \hat{p} & = & \sqrt{\frac{m\hbar\omega}{3}}\left(-\widehat{a_{1}}+e_{3}\widehat{a_{2}}-e_{2}\widehat{a_{3}}\right)\nonumber \\ \widehat{q} & = & \widehat{a_{0}}\sqrt{\frac{\hbar}{3m\omega}}\label{eq:42}\end{aligned}$$ Now we can define the number operator as $$\begin{aligned} \widehat{N_{B}} & = & \widehat{a}\,^{\dagger}\widehat{a}\label{eq:43}\end{aligned}$$ which thus commutes with Hamiltonian $\hat{H_{B}}$i.e. $$\begin{aligned} \left[\widehat{N_{B}}\,\,,\,\,\widehat{H_{B}}\right] & = & 0\label{eq:44}\end{aligned}$$ Bosonic number operator satisfies the following relations; $$\begin{aligned} \left[\widehat{N_{B}}\,\,,\,\,\widehat{a}\,^{\dagger}\right] & = & \widehat{a}^{\dagger}\nonumber \\ \left[\widehat{N_{B}}\,\,,\,\,\widehat{a}\,\right] & = & -\widehat{a}\label{eq:45}\end{aligned}$$ which shows that $\hat{a}$ and $\hat{a}^{\dagger}$may be regarded as annihilation and creation operators. We also have $$\begin{aligned} \hat{a}{\displaystyle \left|0\right\rangle } & = & 0\nonumber \\ \hat{a}^{\dagger}\left|n\right\rangle & = & \sqrt{n+1}\left|n+1\right\rangle \nonumber \\ \hat{a}{\displaystyle \left|n\right\rangle } & = & \sqrt{n}\left|n-1\right\rangle \nonumber \\ \widehat{N_{B}}\left|n\right\rangle & = & n\left|n\right\rangle \label{eq:46}\end{aligned}$$ and the Hilbert space is then spanned by state vectors as $$\begin{aligned} \left|n\right\rangle & = & \frac{1}{\sqrt{n}!}(\hat{a}^{\dagger})^{n}\left|n\right\rangle \label{eq:47}\end{aligned}$$ where $\left|0\right\rangle $ is considered as ground or vacuum state and then must be normalized as $$\begin{aligned} \left\langle 0\mid0\right\rangle & = & 1\label{eq:48}\end{aligned}$$ and thus gives rise to the familiar results $$\begin{aligned} \widehat{H_{B}}\,\left|n\right\rangle & = & E_{n}\left|n\right\rangle =(n+\frac{1}{2})\left|n\right\rangle ;\,\,\,\, E_{n}=(n+\frac{1}{2})\label{eq:49}\end{aligned}$$ Similarly we can write the following anti commutation relation for fermionic harmonic oscillator $$\begin{aligned} \left\{ \widehat{b\,},\widehat{b}^{\dagger}\right\} & = & 1\nonumber \\ \left\{ \widehat{b\,},\widehat{b}\right\} & = & 0\nonumber \\ \left\{ \widehat{b\,}^{\dagger},\widehat{b}^{\dagger}\right\} & = & 0\label{eq:50}\end{aligned}$$ where $\widehat{b}$ is a fermionic quaternion operator and may be decomposed as $$\begin{aligned} \hat{b} & = & \frac{1}{\sqrt{6}}\left[\widehat{b}_{0}+e_{1}\widehat{b}_{1}+e_{2}\widehat{b}_{2}+e_{3}\widehat{b}_{3}\right]\nonumber \\ \hat{b}^{\dagger} & = & \frac{1}{\sqrt{6}}\left[\widehat{b}_{0}-e_{1}\widehat{b}_{1}-e_{2}\widehat{b}_{2}-e_{3}\widehat{b}_{3}\right]\label{eq:51}\end{aligned}$$ To satisfy the relations (\[eq:50\]) by fermion operators given by equation (\[eq:51\]) , it is necessary to impose the following restrictions on the various components of operators i.e., $$\begin{aligned} b_{0}^{2}+b_{1}^{2} & +b_{2}^{2}+b_{3}^{2}= & 0\nonumber \\ b_{0}^{2}- & b_{1}^{2}-b_{2}^{2}-b_{3}^{2}= & 3\nonumber \\ \left[\widehat{b_{j}}\,,\,\widehat{b}_{k}\right] & =\varepsilon_{jkl} & \widehat{b}_{l}\nonumber \\ \left[\widehat{b}\,,\,\widehat{b}_{j}\right] & =0 & \forall\,\, j,k,l=1,2,3\label{eq:52}\end{aligned}$$ We have defined through out the text $\left[\,,\,\right]$ as commutator, $\left\{ \,,\,\right\} $as anti commutator and $\varepsilon_{jkl}$ is three index Levi- Civita symbol. Like bosonic harmonic oscillator let us define the fermionic Hamiltonian as , $$\begin{aligned} \hat{H_{F}} & = & \frac{1}{2}\hbar\omega(\hat{b}\,\hat{b}^{\dagger}+\hat{b}^{\dagger}\hat{b)}=\hbar\omega(\,\hat{b}\,\hat{b}^{\dagger}-\frac{1}{2})=\hbar\omega(\widehat{N_{F}}\,\,-\frac{1}{2})\label{eq:53}\end{aligned}$$ Where $\widehat{N_{F}}\,=\hat{b}^{\dagger}\hat{b}$ and $\widehat{N_{F}}\,$can take eigen values $n_{f}=0,1$.The Hilbert space with basis vector $\left|n\right\rangle $ is now constructed in the following manner so that $$\begin{aligned} \widehat{N_{F}}\, & \left|n\right\rangle & =n_{f}\left|n\right\rangle \,\,\,\,\,\,(n_{f}=0,1)\nonumber \\ \widehat{b} & \left|1\right\rangle & =\left|0\right\rangle \nonumber \\ \widehat{b}^{\dagger} & \left|0\right\rangle & =\left|1\right\rangle \nonumber \\ \widehat{b} & \left|0\right\rangle & =0=\widehat{b}^{\dagger}\left|1\right\rangle \label{eq:54}\end{aligned}$$ The energy eigen spectra of fermionic oscillator have only two levels for eigen state $\left|0\right\rangle $or $\left|1\right\rangle $ i.e. $E_{0}=-\frac{1}{2}\hbar\omega$ and $E_{1}=+\frac{1}{2}\hbar\omega$showing that ground state energy of this oscillator is negative i.e. $E_{0}=-\frac{1}{2}\hbar\omega$ . Let us now construct a simple supersymmetric quantum mechanical system that include an oscillator with the bosonic and fermionic degrees of freedom .We call it as supersymmetric harmonic oscillator viewed in the frame work of quaternion variables. The supersymmetry is thus obtained by annihilating simultaneously one bosonic quantum and creating one fermionic quantum or vice versa. We illustrate the annihilating (supersymmetric) charges (generators) as$$\begin{aligned} \widehat{Q}= & \sqrt{\hbar\omega} & (\widehat{a}^{\dagger}\widehat{b})\nonumber \\ \widehat{Q}^{\dagger}= & \sqrt{\hbar\omega} & (\widehat{b}^{\dagger}\widehat{a})\label{eq:55}\end{aligned}$$ So the SUSY Hamiltonian becomes $$\begin{aligned} \widehat{H} & =\left\{ \widehat{Q}^{\dagger}\,,\,\widehat{Q}\right\} & =\hbar\omega\left\{ \widehat{a}^{\dagger}\,\widehat{a}\,+\widehat{b}^{\dagger}\widehat{b}\right\} =\hbar\omega(\widehat{N}_{B}+\widehat{N}_{F})\label{eq:56}\end{aligned}$$ and $$\begin{aligned} \left[\widehat{H}\,\,,\,\,\widehat{Q}\right] & = & 0=\left[\widehat{H}\,\,,\,\,\widehat{Q}^{\dagger}\right]\label{eq:57}\end{aligned}$$ where $\mathbf{\widehat{N}_{B}}$ and $\widehat{N}_{F}$ are respectively bosonic and fermionic number operators. The eigen state is described as$\left|n_{B}\,,\, n_{F}\right\rangle $ and ground state as $\left|0\,.\,0\right\rangle $so that $$\begin{aligned} \widehat{H} & \left|n_{B}\,,\, n_{F}\right\rangle & =E_{n_{B}\,,\, n_{B}}\left|n_{B}\,,\, n_{F}\right\rangle ;\,\, n_{B}=0,1,2,3,........;n_{F}=0,1.\label{eq:58}\end{aligned}$$ and we also have $$\begin{aligned} \widehat{Q}\left|n,\,1_{F}\right\rangle & = & \sqrt{n+1}\left|n+1\,,\,0\right\rangle \nonumber \\ \widehat{Q}^{\dagger}\left|n+1,\,0_{F}\right\rangle & = & \sqrt{n+1}\left|n\,,\,1\right\rangle \label{eq:59}\end{aligned}$$ These supercharges represent conversion of a fermionic state to a bosonic state and bosonic state to fermionic state or vice versa i.e. $$\begin{aligned} \widehat{Q}^{\dagger}\left|BOSON\right\rangle & = & \left|FERMION\right\rangle \nonumber \\ \widehat{Q}\left|FERMION\right\rangle & = & \left|BOSON\right\rangle \label{eq:60}\end{aligned}$$ Equations (\[eq:56\]and \[eq:57\]) are analogous to following equations of supersymmetry, $$\begin{aligned} \left\{ \widehat{Q_{\alpha}}^{\dagger},\widehat{Q}_{\beta}\right\} & = & P^{\mu}(\sigma_{\mu})_{\alpha\beta}\label{eq:61}\\ \left[\widehat{H}\,\,,\widehat{Q}_{\alpha}\right] & = & 0\label{eq:62}\end{aligned}$$ for $\mu=0$ and $\alpha=\beta=1$namely one dimensional SUSY .Supercharges always commute with the usual Hamiltonian.Thus the anti commuting charges in quaternion formalism combine to form the generators of time translation, namely the Hamiltonian $H$. The ground state of this system is the state $\left|0\right\rangle _{osc}.\left|0\right\rangle _{spin}$ or $\left|0\right\rangle _{boson}.\left|0\right\rangle _{fermion}=\left|0\,\,,\,\,0\right\rangle $where both bosonic and fermionic degrees of freedom are in the lowest energy state.As such we have analyzed the theory of supersymmetric harmonic oscillator for one dimensional supersymmetric quantum mechanics and putting the restriction accordingly. Other wise one has to extend the dimensions and to loose the hermiticity of the Hamiltonian of the supersymmetric system.Let us now try to illustrate the Supersymmetry of Dirac equation in terms of quaternion variables. Supersymmetric Quaternion Dirac Equation ========================================= The quaternion formulation of free particle Dirac equation[@key-6; @key-24; @key-25] is described as, $$\begin{aligned} i\,\,\gamma_{\mu\,\,}\partial_{\mu}\psi(x,t) & = & m\,\psi(x,t)\,\,(\mu=0,1,2,3)\label{eq:63}\end{aligned}$$ Let us discuss the supersymmetrization in terms of following three cases. Case I: For mass less free particle i.e.$m=0$ and external potential $\Phi=0$; Equation (\[eq:63\] )becomes $$\begin{aligned} i\,\,\gamma_{\mu\,\,}\partial_{\mu}\psi(x,t) & = & 0\label{eq:64}\end{aligned}$$ Let us consider the following solutions of this equation as $$\begin{aligned} \psi(x,t) & = & \psi(x)\, e^{i\,(\overrightarrow{p}\cdot\overrightarrow{x}-Et)}\label{eq:65}\end{aligned}$$ where we have taken natural units $c=\hbar=1$ and as such we get the following form of equation (\[eq:64\])i.e.$$\begin{aligned} (\gamma_{0}E\,-\gamma_{1}p_{1}-\gamma_{2}p_{2}-\gamma_{3}p_{3}) & \psi(x)= & 0\label{eq:66}\end{aligned}$$ We define the following representation of gamma matrices in terms of quaternion units i.e. $$\begin{aligned} \gamma_{0} & = & \left[\begin{array}{cc} 1 & 0\\ 0 & -1\end{array}\right]\nonumber \\ \gamma_{l} & = & e_{l}\,\left[\begin{array}{cc} 0 & 1\\ 1 & 0\end{array}\right]\,\,\,\,(l=1,2,3)\label{eq:67}\end{aligned}$$ thus equation(\[eq:66\]) takes the form $$\begin{aligned} \left\{ \left[\begin{array}{cc} 1 & 0\\ 0 & -1\end{array}\right]E-e_{l}\left[\begin{array}{cc} 0 & 1\\ 1 & 0\end{array}\right]p_{l}\right\} \left\{ \begin{array}{c} \psi_{a}\\ \psi_{b}\end{array}\right\} & = & 0\label{eq:68}\end{aligned}$$ where $\psi_{a}=\psi_{0}+i\,\psi_{1}$and $\psi_{b}=\psi_{2}-i\,\psi_{3}$.We thus obtain the following coupled equations $$\begin{aligned} \widehat{A}\psi_{a}(x) & = & E\,\psi_{b}(x)\nonumber \\ \widehat{A}^{\dagger}\psi_{b}(x) & = & E\,\psi_{a}(x)\label{eq:69}\end{aligned}$$ where $\widehat{A}\,=-e_{l}\,\widehat{p}_{l}$ and $\widehat{A}^{\dagger}=e_{l}\,\widehat{p}_{l}$.We can now decouple equation (\[eq:69\]) as $$\begin{aligned} \widehat{A}\,\widehat{A}^{\dagger}\psi_{b}(x) & = & E^{2}\psi_{b}(x)\nonumber \\ \widehat{A}^{\dagger}\widehat{A}\,\psi_{a}(x) & = & E^{2}\psi_{a}(x)\nonumber \\ P_{l}^{2}\psi_{b}(x) & = & E^{2}\psi_{b}(x)\nonumber \\ P_{l}^{2}\psi_{a}(x) & = & E^{2}\psi_{a}(x)\label{eq:70}\end{aligned}$$ where $\psi_{a}(x)$ and $\psi_{b}(x)$are eigen functions of partner Hamiltonians $H_{-}=\widehat{A}^{\dagger}\widehat{A}$ and $H_{+}=\widehat{A}\,\widehat{A}^{\dagger}$ .The supersymmetric Hamiltonian is thus described as $$\begin{aligned} \widehat{H} & = & \left[\begin{array}{cc} H_{+} & 0\\ 0 & H_{-}\end{array}\right]=\left[\begin{array}{cc} -P_{^{l}}^{2} & 0\\ 0 & P_{^{l}}^{2}\end{array}\right]\label{eq:71}\end{aligned}$$ Restricting the propagation along x-axis to discuss the quantum mechanics in two dimensional space time,we have $$\begin{aligned} \widehat{p}_{l} & = & -i\,\frac{d}{dx}\nonumber \\ e_{l}\,\widehat{p}_{l} & = & \frac{d}{dx}\nonumber \\ \widehat{H} & = & \left[\begin{array}{cc} -\frac{d^{2}}{dx^{2}} & 0\\ 0 & -\frac{d^{2}}{dx^{2}}\end{array}\right]\label{eq:72}\end{aligned}$$ or$$\begin{aligned} \widehat{H} & = & \left[\begin{array}{cc} \widehat{Q}\widehat{Q}^{\dagger} & 0\\ 0 & \widehat{Q}^{\dagger}\widehat{Q}\end{array}\right]\label{eq:73}\end{aligned}$$ where supercharges are described in terms of quaternion units i.e. $$\begin{aligned} \widehat{Q} & = & \left[\begin{array}{cc} 0 & -e_{2}^{\dagger}\frac{d}{dx}\\ 0 & 0\end{array}\right]\nonumber \\ \widehat{Q}^{\dagger} & = & \left[\begin{array}{cc} 0 & 0\\ -e_{2}^{\dagger}\frac{d}{dx} & 0\end{array}\right]\label{eq:74}\end{aligned}$$ As such we may obtain the supersymmetry algebra as $$\begin{aligned} \left[\widehat{Q\,},\widehat{H}\right] & = & \left[\widehat{Q\,},\widehat{H}^{\dagger}\right]=0\nonumber \\ \left\{ \widehat{Q\,},\widehat{Q\,}\right\} & = & \left\{ \widehat{Q\,}^{\dagger},\widehat{Q\,}^{\dagger}\right\} =0\nonumber \\ \left\{ \widehat{Q\,},\widehat{Q\,}^{\dagger}\right\} & = & \widehat{H}\label{eq:75}\end{aligned}$$ Here $\widehat{Q},$converts the upper component spinor $\left\{ \begin{array}{c} \psi_{a}\\ 0\end{array}\right\} $to a lower one $\left\{ \begin{array}{c} 0\\ \psi_{b}\end{array}\right\} $and convert the lower component Spinor $\left\{ \begin{array}{c} 0\\ \psi_{b}\end{array}\right\} $to upper one $\left\{ \begin{array}{c} \psi_{a}\\ 0\end{array}\right\} $. If $\psi$to be an eigen state of $H_{+}(H_{-})$, $\widehat{Q}$$\psi(\widehat{Q}^{\dagger}$$\psi)$is the eigen state of that of $H_{+}(H_{-})$with equal energy. Case II- $m\,\neq0$but potential $\Phi=0$. Corresponding Dirac’s equation (\[eq:63\]) with its solution (\[eq:65\])is described as $$\begin{aligned} (\gamma_{0}E\,-\gamma_{1}p_{1}-\gamma_{2}p_{2}-\gamma_{3}p_{3}-\, m) & \psi(x)= & 0\label{eq:76}\end{aligned}$$ which may be written as follows in terms of quaternion units i.e. $$\begin{aligned} \left\{ \left[\begin{array}{cc} 1 & 0\\ 0 & -1\end{array}\right]E-e_{l}\left[\begin{array}{cc} 0 & 1\\ 1 & 0\end{array}\right]p_{l}-m\left[\begin{array}{cc} 1 & 0\\ 0 & 1\end{array}\right]\right\} \left\{ \begin{array}{c} \psi_{a}\\ \psi_{b}\end{array}\right\} & = & 0\label{eq:77}\end{aligned}$$ Accordingly ,we have the following sets of equations $$\begin{aligned} \widehat{A}^{\dagger}\psi_{b} & = & (E-m)\psi_{a}\nonumber \\ \widehat{A}\,\psi_{a} & = & (E+m)\psi_{b}\nonumber \\ \widehat{A}^{\dagger}\widehat{A}\,\psi_{a} & = & (E^{2}-m^{2}\,)\psi_{a}\nonumber \\ \widehat{A}\,\widehat{A}^{\dagger}\psi_{b} & = & (E^{2}-m^{2}\,)\psi_{b}\nonumber \\ \widehat{P_{l}}^{2}\psi_{a,b} & = & (E^{2}-m^{2}\,)\psi_{a,b}\label{eq:78}\end{aligned}$$ which are the Schrödinger equation for free particle.SUSY Hamiltonian is now described as $$\begin{aligned} \widehat{H} & = & \left[\begin{array}{cc} \widehat{Q}\widehat{Q}^{\dagger} & 0\\ 0 & \widehat{Q}^{\dagger}\widehat{Q}\end{array}\right]=\left[\begin{array}{cc} \widehat{P_{l}}^{2}+m^{2} & 0\\ 0 & \widehat{P_{l}}^{2}+m^{2}\end{array}\right]\label{eq:79}\end{aligned}$$ On the similar way we get the following relations while restricting for two dimensional structure of space and time i.e. $$\begin{aligned} \widehat{H} & = & \left[\begin{array}{cc} \widehat{Q}\widehat{Q}^{\dagger} & 0\\ 0 & \widehat{Q}^{\dagger}\widehat{Q}\end{array}\right]=\left[\begin{array}{cc} -\frac{d^{2}}{dx^{2}}+m^{2} & 0\\ 0 & -\frac{d^{2}}{dx^{2}}+m^{2}\end{array}\right]\label{eq:80}\end{aligned}$$ where $$\begin{aligned} \widehat{Q} & = & \left[\begin{array}{cc} 0 & -e_{2}^{\dagger}\frac{d}{dx}+m\\ 0 & 0\end{array}\right]\nonumber \\ \widehat{Q}^{\dagger} & = & \left[\begin{array}{cc} 0 & 0\\ -e_{2}^{\dagger}\frac{d}{dx}+m & 0\end{array}\right]\label{eq:81}\end{aligned}$$ Hence we restore the property of SUSY quantum mechanics and obtain the commutation and anti commutation relations same that of equation (\[eq:75\]) for the free particle Dirac equation with mass as well. Case III- We now discuss and verify the SUSY quantum mechanics relations for $m\neq0$ with scalar potential $\Phi=V$.We extend the present theory in the same manner and express Dirac Hamiltonian in the following form; $$\begin{aligned} \widehat{H_{D}} & = & \left[\begin{array}{cc} 0 & e_{l}p_{l}\\ -e_{l}p_{l} & 0\end{array}\right]+\left[\begin{array}{cc} 0 & -i\,(m+V)\\ i\,(m+V) & 0\end{array}\right]\label{eq:82}\end{aligned}$$ or$$\begin{aligned} \widehat{H_{D}} & = & \left[\begin{array}{cc} 0 & e_{l}p_{l}-i\,(m+V)\\ -e_{l}p_{l}+i\,(m+V) & 0\end{array}\right]\label{eq:83}\end{aligned}$$ or $$\begin{aligned} \widehat{H} & = & \left[\begin{array}{cc} \widehat{Q}\widehat{Q}^{\dagger} & 0\\ 0 & \widehat{Q}^{\dagger}\widehat{Q}\end{array}\right]=\left[\begin{array}{cc} -\frac{d^{2}}{dx^{2}}+(m+V)^{2} & 0\\ 0 & -\frac{d^{2}}{dx^{2}}+(m+V)^{2}\end{array}\right]\label{eq:84}\end{aligned}$$ where$$\begin{aligned} \widehat{Q} & = & \left[\begin{array}{cc} 0 & -e_{2}^{\dagger}\frac{d}{dx}+i\,(m+V)\\ 0 & 0\end{array}\right]\nonumber \\ \widehat{Q}^{\dagger} & = & \left[\begin{array}{cc} 0 & 0\\ -e_{2}^{\dagger}\frac{d}{dx}+i\,(m+V) & 0\end{array}\right]\label{eq:85}\end{aligned}$$ Equations to satisfy the supersymmetric quantum mechanical relations given by equation (\[eq:75\]) and as such the supersymmetry is verified even for interacting case with scalar potential. Case IV- Dirac equation in Electromagnetic Field- Before writing the quaternion Dirac equation in generalized electromagnetic fields of dyons let us start with the quaternion gauge transformations. A $Q-$field (\[eq:1\]) is described in terms of following SO(4) local gauge transformations[@key-6; @key-9]; $$\begin{aligned} \phi & \rightarrow\phi' & =U\,\phi\,\bar{V\,}\,\,\,\,\,\, U,V\,\varepsilon Q\,\,,\,\,\, U\,\bar{U\,}=V\,\overline{V}=1\label{eq:86}\end{aligned}$$ The covariant derivative for this is then written in terms of two gauge potentials as $$\begin{aligned} D_{\mu}\phi & = & \partial_{\mu}\phi+A_{\mu}\phi-\phi B_{\mu}\label{eq:87}\end{aligned}$$ where potential transforms as $$\begin{aligned} A_{\mu}^{'} & = & U\, A_{\mu}\bar{U}\,+U\,\partial_{\mu}\bar{U}\,\end{aligned}$$ $$\begin{aligned} B_{\mu}^{'} & = & V\, B_{\mu}\bar{V}\,+V\,\partial_{\mu}\bar{V}\,\label{eq:88}\end{aligned}$$ and $$\begin{aligned} \bar{\phi'}\phi' & =\overline{(U\phi\bar{V)}}((U\phi\bar{V)} & =\bar{\phi}\phi=\phi_{0}^{2}+\left|\vec{\phi}\right|^{^{2}}\label{eq:89}\end{aligned}$$ Here we identify the non Abelian gauge fields $A_{\mu}$and $B_{\mu}$as the gauge potentials respectively for electric and magnetic charges of dyons described earlier in section-3.Corresponding field momentum of equation (\[eq:87\])may also be written as follows $$\begin{aligned} P_{\mu}\phi & = & p_{\mu}\phi+A_{\mu}\phi-\phi B_{\mu}\label{eq:90}\end{aligned}$$ where the gauge group $SO(4)=SU(2)_{e}\times SU(2)_{g}$ is constructed in terms of quaternion units of electric and magnetic gauges .Accordingly, the covariant derivative thus describes two different gauge field strengths i.e. $$\begin{aligned} \left[D_{\mu},D_{\upsilon}\right]\phi & = & f_{\mu\nu}\phi-\phi h_{\mu\nu}\nonumber \\ f_{\mu\nu} & = & A_{\mu,\nu}-A_{\nu,\mu}+\left[A_{\mu},A_{\nu}\right]\nonumber \\ h_{\mu\nu} & = & B_{\mu,\nu}-B_{\nu,\mu}+\left[B_{\mu},B_{\nu}\right]\label{eq:91}\end{aligned}$$ where $f_{\mu\nu}$ and $h_{\mu\nu}$ are gauge field strengths associated with electric and magnetic charges of dyons respectively.We may now write the Dirac equation as $$\begin{aligned} i\,\,\gamma_{\mu\,\,}D_{\mu}\psi(x,t) & = & m\,\psi(x,t)\,\end{aligned}$$ and accordingly with some restrictions and using the properties of quaternions we may write the Dirac equation as$$\begin{aligned} \left[\begin{array}{cc} m & e_{\mu}(p_{\mu}+A_{\mu}-B_{\mu})\\ -e_{\mu}(p_{\mu}+A_{\mu}-B_{\mu}) & m\end{array}\right]\left[\begin{array}{c} \psi_{a}\\ \psi_{b}\end{array}\right] & = & E\left[\begin{array}{c} \psi_{a}\\ \psi_{b}\end{array}\right]\label{eq:92}\end{aligned}$$ where $\varphi_{a}=\varphi_{0}+i\varphi_{1}$and $\varphi_{b}=\varphi_{2}-i\varphi_{3}$and as such we obtain the following set of equations;$$\begin{aligned} E\psi_{a}= & m\psi_{a}+e_{\mu}(p_{\mu}\psi_{b}+A_{\mu}\psi_{b}-\psi_{b}B_{\mu}) & ;\\ E\psi_{b}= & m\psi_{b}+e_{\mu}(p_{\mu}\psi_{a}+A_{\mu}\psi_{a}-\psi_{a}B_{\mu}) & ;\\ e_{\mu}(p_{\mu}\psi_{b}+A_{\mu}\psi_{b}-\psi_{b}B_{\mu}) & = & (E-m)\psi_{a}\\ e_{\mu}(p_{\mu}\psi_{a}+A_{\mu}\psi_{a}-\psi_{a}B_{\mu}) & = & (E-m)\psi_{b}\end{aligned}$$ $$\begin{aligned} \widehat{A}^{\dagger}\psi_{b} & = & (E-m)\psi_{a}=e_{\mu}(p_{\mu}\psi_{b}+A_{\mu}\psi_{b}-\psi_{b}B_{\mu})\nonumber \\ \widehat{A}\,\psi_{a} & = & (E+m)\psi_{b}=e_{\mu}(p_{\mu}\psi_{a}+A_{\mu}\psi_{a}-\psi_{a}B_{\mu})\nonumber \\ \widehat{A}^{\dagger}\widehat{A}\,\psi_{a} & = & (E^{2}-m^{2}\,)\psi_{a}\nonumber \\ \widehat{A}\,\widehat{A}^{\dagger}\psi_{b} & = & (E^{2}-m^{2}\,)\psi_{b}\label{eq:93}\end{aligned}$$ where we have restricted ourselves to the case of two dimensional supersymmetry by imposing the condition $A_{1}^{\dagger}=-A_{1},A_{2}^{\dagger}=-A_{2},A_{3}^{\dagger}=-A_{3},B_{1}^{\dagger}=-B_{1},B_{2}^{\dagger}=-B_{2},B_{3}^{\dagger}=-B_{3}$ to restore the supersymmetry.As such it is possible to supersymmetrize the Dirac equation for generalized electromagnetic fields of dyons and we obtain the commutation and anti commutation relations given by equation(\[eq:75\]) to verify the supersymmetric quantum mechanics in this case. Higher dimensional Supersymmetry ================================ Quaternion differential operator is defined as $$\begin{aligned} \partial & = & -i\,\partial_{t}+e_{1}\partial_{1}+e_{2}\partial_{2}+e_{3}\partial_{3}\nonumber \\ \overline{\partial} & = & -i\,\partial_{t}-e_{1}\partial_{1}-e_{2}\partial_{2}-e_{3}\partial_{3}\label{eq:94}\end{aligned}$$ which describes $$\begin{aligned} \partial\bar{\partial} & = & \partial_{t}^{2}+\partial_{1}^{2}+\partial_{2}^{2}+\partial_{3}^{2}\label{eq:95}\end{aligned}$$ and can be decomposed in to two dimensional from as $$\begin{aligned} \partial\partial^{\dagger}=-\nabla^{2} & = & (\frac{\partial}{\partial x}+e_{1}\frac{\partial}{\partial y})(-\frac{\partial}{\partial x}+e_{1}\frac{\partial}{\partial y})\label{eq:96}\end{aligned}$$ where ($\dagger$) changes only complex quantities with one quaternion units which plays the role of complex quantity (in C(1,i) case ) and thus is equivalent to $$\begin{aligned} -\nabla^{2} & = & (\frac{\partial}{\partial x}+i\frac{\partial}{\partial y})(-\frac{\partial}{\partial x}+i\frac{\partial}{\partial y})\label{eq:97}\end{aligned}$$ Now defining $q=(\frac{\partial}{\partial x}+i\frac{\partial}{\partial y})$ and $q^{\dagger}=(-\frac{\partial}{\partial x}+i\frac{\partial}{\partial y})$we have the negative of Laplacian $-\nabla^{2}=q\, q^{\dagger}=q^{\dagger}q$andthus describes two-dimensional free particle Supersymmetric quantum mechanics. Following Das et al[@key-21] we may now construct a two-dimensional supersymmetric theory in the following manner, $$\begin{aligned} q & = & \overrightarrow{a}\cdot\overrightarrow{(\nabla}+\overrightarrow{W}\,)\label{eq:98}\end{aligned}$$ where $\overrightarrow{W}\:$ is described as super potential, $\overrightarrow{a}=a_{x}+ia_{y}$ and $\overrightarrow{\nabla}$represents the two dimensional gradient.We may now write the super partner hamiltonians described in the previous sections as[@key-21]; $$\begin{aligned} H_{1} & =q^{\dagger}q & =\sum_{j=1}^{2}(-\nabla_{j}+W_{j})(\nabla_{j}+W_{j})-i\,\epsilon^{jk}\left\{ \nabla_{j},\nabla_{k}\right\} \nonumber \\ H_{2} & =qq^{\dagger} & =\sum_{j=1}^{2}(\nabla_{j}+W_{j})(-\nabla_{j}+W_{j})-i\,\epsilon^{jk}\left\{ \nabla_{j},\nabla_{k}\right\} \label{eq:99}\end{aligned}$$ as described earlier here also the curly brackets represent anti commutators and $\epsilon^{jk}$ is anti symmetric with $\epsilon^{12}=1$ and $\epsilon^{21}=-1$.It is to be noted that the vector super potential naturally generates a gauge field interaction structure resulting from supersymmetry algebra.Thus it is possible to say that we can take quaternion supersymmetry as N = 4 real supersymmetry because like complex quanties generat two dimensional real representation,accordingly quaternions generate four dimensional real representations. thus we need to define q in such a manner that $-\nabla^{2}=q\, q^{\dagger}=q^{\dagger}q$ and 4-dimensional supersymmetry algebra can be built accordingly in terms of three non commutating quantities but associative quantities like three quaternion units. ej. Let us assume that $q$ in free space can be written as a linear super position in terms of pure quaternion units consisting non-Abelian gauge structure and are obtained from $q$ with $q=\frac{1}{2}(q-\overline{q})$, i.e. $$\begin{aligned} q & = & {\scriptstyle {\displaystyle \sum_{j=1}^{3}e_{j}\nabla_{j}}}\end{aligned}$$ and we may write equation (\[eq:99\]) as $$\begin{aligned} H_{1} & = & q^{\dagger}q=\sum_{j=1}^{3}e_{j}e_{j}^{\dagger}(-\nabla_{j}^{2})-\sum_{j<k}^{3}(e_{j}e_{k}^{\dagger}+e_{k}e_{j}^{\dagger})\nabla_{j}\nabla_{k}\nonumber \\ H_{2} & = & qq^{\dagger}=\sum_{j=1}^{3}e_{j}^{\dagger}e_{j}(-\nabla_{j}^{2})-\sum_{j<k}^{3}(e_{j}^{\dagger}e_{k}+e_{k}^{\dagger}e_{j})\nabla_{j}\nabla_{k}\label{eq:100}\end{aligned}$$ where we may write $q=\overrightarrow{a}\cdot\overrightarrow{\nabla}$with ${\scriptstyle {\displaystyle \overrightarrow{a}=\sum_{j=1}^{3}e_{j}a_{j}}}$.The vector super potential depends on the position as $$\begin{aligned} q=\overrightarrow{a}\cdot\overrightarrow{(\nabla} & + & \overrightarrow{W)}=\sum_{j=1}^{3}e_{j}(\nabla_{j}+W_{j})\end{aligned}$$ and accordingly we may obtain the super partner Hamiltonians $qq^{\dagger}$and $q^{\dagger}q$ interms of interacting super potential [@key-21] with the assumption that the gauge interaction structure naturally arises from the requirement of super symmetry in ters of quaternions and gauge theory of dyons be dealt in this manner.The generalization of this theory to octonion is not possible because of the non associative nature of octonions.Secondly octonions can not be written directly in terms of eight dimensional matrix representation of real numbers like quaternions are written in terms four dimensional representation of real numbers. There is the difference between quaternion and octonions that the quaternion satisfies all the property of matrices while the octonions are not and the alternativity property of split octonions is still not competant to resolve these inconsistencies associated with octonions. So, it is hard to write the super symmetric extension and we will have to write it another way to visualize the supersymmetry with octonions and octonion gauge theory of dyons.thus we may conclude that many of the properties of quaternion quantum mechanics lead to the properties of supersymmetric quantum mechanics because in both the cases the energy is positive semi definite and a gauge interaction arises automatically when one defines the quaternion units in terms of Pauli spin matrices and supersymmetric charges are defined accordingly. If we describe the well known N = 4 supersymmetry, the 4-dimensional real anti symmetric matrices $\alpha_{j}$and $\beta_{J}$ for all (j = 1,2,3) associated with it [@key-26]satisfy the algebra given by $$\begin{aligned} \left\{ \alpha^{i},\,\alpha^{j}\right\} & = & \left\{ \beta^{i},\,\beta^{j}\right\} =-2\,\delta^{ij}\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\left[\alpha^{i}\,,\,\beta^{j}\right]=0\nonumber \\ \left[\alpha^{i},\,\alpha^{j}\right] & = & -2\,\varepsilon^{ijk}\alpha^{k}\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\left[\beta^{i},\,\beta^{j}\right]=-2\,\varepsilon^{ijk}\beta^{k}\label{eq:101}\end{aligned}$$ which is the algebra of quaternions. The matrices $\alpha_{j}$ and $\beta_{J}$are thus the quaternion analogue for give $4\times4$ real matrix representation of three quaternion units since the properties of $\alpha_{j}$ and $\beta_{J}$ are same as those for three non abelian quaternion units. Thus we conclude that N=4 real Super symmetry can be visualized as N=1 quaternion and N=2 complex Super symmetry and the theories of monopoles and dyons are thus be understood better in terms of hyper complex number system. [10]{} W. R. Hamilton, “Elements of quaternions”, Chelsea Publications Co., NY, (*1969*). L. Silberstein, Phil. Mag., 63 (1912) 790. P.G.Tait, “An elementary Treatise on Quaternions”, Oxford Univ. Press. (1875). B.S.Rajput, S.R.Kumar and O.P.S.Negi,Letter. Nuvovo Cimento,34 (1982) 180; 36 (1983) 75. V. Majernik, PHYSICA, 39 (2000) 9-24 and references therein. S.L.Adler, “Quaternion Quantum Mechanics and Quantum Fields”, Oxford Univ. Press, NY, (1995). D.Finklestein, J.M.Jauch, S.Schiminovich and D.Speiser, J.Math. Phys., 4 (1963) 788. D.V.Duc and V.T.Cuong, Communication in Physics, 8 (1998) 197. K.Morita, Prog. Theor. Phys., 67 (1982) 1860; 65 (1981) 2071, P.S.Bisht, O.P.S.Negi and B.S.Rajput, Int. J. Theor. Phys., 32 (1993) 2099. A.J.Davies, Phys. Rev. A49 (1994) 714. Shalini Bisht, P.S.Bisht and O.P.S.Negi, IL Nuovo Cimento, B113, (1998) 1449. A. Waser, AW-Verlag www.aw-Verlag.ch (2000); V.V.Kravchenkov, “Applied Quaternion Analysis”, Helderman Verlag, Germany (2003). M.F.Sohnius, Phys. Rep. 128 (1985) 53. P. Fayet and S.Ferrara, Phys. Rep., 32 (1977) 247. F.Cooper, A.Khare U.Sukhatme, Phys. Rep. 251 (1995) 267. V.A.Kostelecky and D.K.Campbell, “Supersymmetry in Physics”, North Holland, (1985). A. Bilal, “Introduction to Supersymmetry”, hep-th/0101055 v1. E.Witten, Nucl . Phys. B202 ((1982) 213. C.M.Hull, “The geometry of Supersymmetric Quantum Mechanics”, hep-th/9910028. A.Das,S.Okubo and S.A. Pernice, Mod. Phys. Lett., A12 (1997) 581; A.Das and S.A. Pernice,“Higher Dimensional SUSY Quantum Mechanics”, hep-th/9612125. B. S. Rajput and D. C. Joshi, Had. J., 4 (1981), 1805. B. S. Rajput and Om Prakash, Indian J. Phys., A53 (1979), 274. A.J.Davies,Phys. Rev. ,D41(1990),2628; A.Govorkov,Theor.Math.PHYS, 68 (1987) 893. P.Roteli,Mod.Phys. Lett.,A4 (1989)933; A4(1989) 1763. H.Osborn, Phys. Lett. .B83 (1979) 321; P.de Vecchia, “Duality in Supersymmetric Gauge Theories”, hep-th/9608090 and references therein. [^1]: Talk presented at conference on, “FUNCTION THEORIES IN HIGHER DIMENSIONS”, Tampere University of Technology, Tampere, Finland, June12-16, 2006.\ Address from July 01 to August 31,2006- Universität Konstanz, Fachbereich Physik, Prof. Dr. H.Dehnen,Postfach M 677, D-78457 Konstanz,Germany
{ "pile_set_name": "ArXiv" }
ere between 12:21 AM and 9:49 AM? 568 How many minutes are there between 9:24 PM and 5:48 AM? 504 What is 195 minutes after 6:47 PM? 10:02 PM How many minutes are there between 2:58 PM and 8:01 PM? 303 How many minutes are there between 4:16 PM and 1:49 AM? 573 How many minutes are there between 10:18 PM and 7:46 AM? 568 How many minutes are there between 2:06 PM and 7:48 PM? 342 What is 166 minutes after 6:38 AM? 9:24 AM What is 690 minutes before 2:35 AM? 3:05 PM How many minutes are there between 9:26 AM and 1:35 PM? 249 What is 149 minutes before 3:14 AM? 12:45 AM How many minutes are there between 9:54 PM and 9:12 AM? 678 What is 286 minutes before 10:43 AM? 5:57 AM What is 128 minutes after 7:42 PM? 9:50 PM How many minutes are there between 8:05 PM and 6:16 AM? 611 What is 185 minutes before 9:42 AM? 6:37 AM How many minutes are there between 1:20 PM and 7:58 PM? 398 How many minutes are there between 2:34 AM and 4:37 AM? 123 What is 394 minutes after 4:44 PM? 11:18 PM What is 137 minutes before 5:00 AM? 2:43 AM How many minutes are there between 6:59 AM and 5:22 PM? 623 How many minutes are there between 3:26 PM and 7:22 PM? 236 How many minutes are there between 11:07 AM and 6:32 PM? 445 How many minutes are there between 4:33 AM and 3:14 PM? 641 What is 128 minutes after 4:23 PM? 6:31 PM What is 676 minutes before 1:22 AM? 2:06 PM How many minutes are there between 12:41 AM and 3:45 AM? 184 How many minutes are there between 8:50 PM and 6:57 AM? 607 How many minutes are there between 1:06 PM and 4:43 PM? 217 How many minutes are there between 12:48 PM and 3:38 PM? 170 What is 514 minutes before 6:53 PM? 10:19 AM What is 139 minutes before 4:57 AM? 2:38 AM How many minutes are there between 9:18 AM and 11:21 AM? 123 What is 453 minutes after 10:37 AM? 6:10 PM How many minutes are there between 8:17 AM and 3:17 PM? 420 How many minutes are there between 3:37 AM and 1:18 PM? 581 What is 120 minutes after 10:22 PM? 12:22 AM How many minutes are there between 9:36 AM and 3:30 PM? 354 How many minutes are there between 10:53 PM and 4:37 AM? 344 How many minutes are there between 10:01 PM and 12:37 AM? 156 How many minutes are there between 4:19 PM and 8:14 PM? 235 What is 209 minutes after 8:10 PM? 11:39 PM How many minutes are there between 10:07 AM and 4:51 PM? 404 What is 505 minutes after 9:45 AM? 6:10 PM What is 197 minutes after 7:32 PM? 10:49 PM How many minutes are there between 11:16 AM and 5:23 PM? 367 How many minutes are there between 6:04 AM and 4:43 PM? 639 How many minutes are there between 2:06 AM and 6:15 AM? 249 What is 715 minutes after 2:38 AM? 2:33 PM What is 342 minutes before 7:21 PM? 1:39 PM What is 186 minutes before 9:37 AM? 6:31 AM What is 121 minutes before 8:21 PM? 6:20 PM What is 532 minutes after 1:08 AM? 10:00 AM How many minutes are there between 2:58 AM and 5:49 AM? 171 What is 504 minutes before 4:09 PM? 7:45 AM What is 142 minutes before 5:34 AM? 3:12 AM How many minutes are there between 2:36 PM and 8:21 PM? 345 How many minutes are there between 7:04 PM and 12:41 AM? 337 What is 628 minutes before 3:20 PM? 4:52 AM What is 646 minutes after 2:48 PM? 1:34 AM What is 295 minutes after 7:08 AM? 12:03 PM What is 4 minutes before 10:39 PM? 10:35 PM What is 52 minutes after 11:14 PM? 12:06 AM How many minutes are there between 12:22 AM and 8:47 AM? 505 What is 323 minutes before 7:45 PM? 2:22 PM What is 660 minutes after 5:48 PM? 4:48 AM What is 634 minutes after 4:14 PM? 2:48 AM What is 473 minutes before 11:59 AM? 4:06 AM What is 244 minutes after 7:49 AM? 11:53 AM What is 549 minutes after 10:22 PM? 7:31 AM What is 585 minutes after 8:05 PM? 5:50 AM How many minutes are there between 6:22 AM and 11:27 AM? 305 How many minutes are there between 9:38 AM and 12:28 PM? 170 What is 459 minutes before 1:16 PM? 5:37 AM How many minutes are there between 9:06 AM and 1:52 PM? 286 What is 244 minutes after 7:54 PM? 11:58 PM How many minutes are there between 2:04 PM and 9:46 PM? 462 How many minutes are there between 9:43 PM and 5:25 AM? 462 What is 10 minutes before 1:53 AM? 1:43 AM What is 558 minutes after 3:14 PM? 12:32 AM How many minutes are there between 11:02 AM and 8:38 PM? 576 What is 236 minutes before 1:23 AM? 9:27 PM What is 586 minutes before 3:44 PM? 5:58 AM What is 628 minutes after 5:59 AM? 4:27 PM What is 265 minutes before 8:29 AM? 4:04 AM What is 644 minutes before 4:22 AM? 5:38 PM How many minutes are there between 7:01 PM and 2:01 AM? 420 How many minutes are there between 10:21 PM and 11:57 PM? 96 How many minutes are there between 2:03 PM and 6:14 PM? 251 What is 238 minutes before 2:04 PM? 10:06 AM What is 406 minutes before 6:45 AM? 11:59 PM How many minutes are there between 10:34 AM and 7:40 PM? 546 What is 71 minutes after 6:49 PM? 8:00 PM How many minutes are there between 6:45 AM and 4:01 PM? 556 What is 526 minutes after 9:16 PM? 6:02 AM How many minutes are there between 12:27 AM and 12:17 PM? 710 What is 360 minutes before 5:17 PM? 11:17 AM What is 323 minutes before 7:39 AM? 2:16 AM How many minutes are there between 2:52 PM and 4:28 PM? 96 What is 171 minutes after 8:43 AM? 11:34 AM What is 663 minutes after 8:06 PM? 7:09 AM What is 539 minutes after 8:15 AM? 5:14 PM How many minutes are there between 6:24 PM and 4:34 AM? 610 What is 385 minutes before 5:56 PM? 11:31 AM How many minutes are there between 9:35 PM and 2:26 AM? 291 How many minutes are there between 7:19 PM and 3:13 AM? 474 What is 634 minutes after 9:23 AM? 7:57 PM What is 463 minutes before 8:40 AM? 12:57 AM How many minutes are there between 12:26 AM and 8:42 AM? 496 How many minutes are there between 5:11 PM and 9:23 PM? 252 How many minutes are there between 10:45 PM and 10:55 PM? 10 What is 11 minutes after 3:48 PM? 3:59 PM What is 697 minutes before 3:21 AM? 3:44 PM How many minutes are there between 10:59 AM and 9:09 PM? 610 What is 102 minutes before 5:08 PM? 3:26 PM How many minutes are there between 5:24 PM and 4:00 AM? 636 What is 4 minutes before 8:02 PM? 7:58 PM What is 49 minutes after 4:11 PM? 5:00 PM What is 589 minutes after 5:22 AM? 3:11 PM How many minutes are there between 6:52 PM and 4:05 AM? 553 What is 145 minutes after 4:41 AM? 7:06 AM What is 573 minutes before 2:10 PM? 4:37 AM How many minutes are there between 5:44 AM and 9:11 AM? 207 How many minutes are there between 9:47 PM and 7:35 AM? 588 How many minutes are there between 12:40 PM and 11:07 PM? 627 What is 715 minutes before 9:43 PM? 9:48 AM How many minutes are there between 7:10 PM and 5:15 AM? 605 How many minutes are there between 9:42 AM and 9:37 PM? 715 What is 20 minutes after 5:03 PM? 5:23 PM How many minutes are there between 9:06 AM and 1:20 PM? 254 What is 25 minutes after 3:59 PM? 4:24 PM What is 325 minutes after 3:04 AM? 8:29 AM How many minutes are there between 2:05 PM and 10:32 PM? 507 How many minutes are there between 2:03 PM and 1:19 AM? 676 How many minutes are there between 4:38 AM and 8:09 AM? 211 What is 611 minutes before 12:06 AM? 1:55 PM What is 618 minutes after 12:12 AM? 10:30 AM What is 466 minutes before 3:54 AM? 8:08 PM What is 59 minutes after 5:54 PM? 6:53 PM What is 353 minutes before 1:30 PM? 7:37 AM How many minutes are there between 3:12 AM and 9:51 AM? 399 How many minutes are there between 7:44 AM and 5:25 PM? 581 What is 669 minutes before 9:38 PM? 10:29 AM How many minutes are there between 7:04 AM and 2:54 PM? 470 What is 237 minutes before 9:42 AM? 5:45 AM How many minutes are there between 7:27 AM and 1:20 PM? 353 How many minutes are there between 11:15 AM and 10:33 PM? 678 What is 398 minutes after 2:42 AM? 9:20 AM How many minutes are there between 10:56 PM and 1:11 AM? 135 How many minutes are there between 1:08 AM and 8:07 AM? 419 How many minutes are there between 12:51 PM and 11:30 PM? 639 What is 175 minutes after 10:06 PM? 1:01 AM What is 104 minutes before 2:32 PM? 12:48 PM How many minutes are there between 11:14 AM and 5:40 PM? 386 How many minutes are there between 8:46 PM and 3:54 AM? 428 What is 611 minutes after 7:55 AM? 6:06 PM How many minutes are there between 3:19 AM and 10:43 AM? 444 How many minutes are there between 10:09 AM and 12:33 PM? 144 How many minutes ar
{ "pile_set_name": "DM Mathematics" }
[Applicability of self-rated pubertal development scale among urban Chinese adolescents]. To explore the applicability of pubertal development scale in estimating sexual maturation among urban Chinese adolescents. A cross-sectional survey was conducted among 2562 students of 4(th) to 12(th) grade in Shanghai, selected by stratified cluster sampling method. Self-reported pubertal maturation level was obtained by Pubertal Development Scale (PDS). Meanwhile, visual depiction of Tanner stages of breast, genital and pubic hair development were rated by a trained rater of the same gender. In 2562 students, the correlation between self-reported PDS and assessment from the raters were substantial, both in boys and girls (Pearson's correlation coefficients: 0.822 and 0.814, respectively). The overall agreement of pubertal development stages based on PDS and the rater's assessment were 35.24% and 51.42% for boys and girls, respectively, with Kendall's correlation coefficients as 0.713 and 0.685, respectively. Adolescents who were older, had relatively higher level of pubertal stages or adolescents from the richer families, tended to underestimate their actual level of pubertal maturation while those male subjects and overweight or obese subjects were even more likely to be so. Using the self-reported PDS, we could conveniently obtain the necessary information regarding sexual maturation among the urban adolescents. It seemed especially useful in the related epidemiological survey when physical examination was precluded by cost, privacy and other concerns.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to split a string at each character I am using ASP.NET Web Pages to create a project in which I am assigned to place each character of the user's (customer's) name in each seperate input block. For that I am getting the value from the Sql Server CE Database and then I am trying to convert it into an array of one character for each input. I have tried the following code for that var form_data = db.QuerySingle("SELECT * FROM Form_Data WHERE Form_Id =@0", form_id); var name_emp = form_data.Name_Emig; if(name_emp != null) { name_emp = name_emp.ToString().Split(''); } It generates the following Compiler error: http://msdn.microsoft.com/en-us/library/8eb78ww7(v=vs.90).aspx (Compiler error: CS1011) Which means that the character cannot be initialized by an empty value. I want to convert that value in one character each array. The name is as: Afzaal Ahmad Zeeshan. So, in each input it would be placed inside the value of it. But the code I am using isn't working. Any suggestion to split the string at each character, so the result would be {'A', 'F', 'Z', 'A', 'A', 'L' ...} It doesn't matter whether result is Capital case or lower case. I will convert it to the desired one later. A: You can try using ToCharArray(). So your code would be this: var form_data = db.QuerySingle("SELECT * FROM Form_Data WHERE Form_Id =@0", form_id); var name_emp = form_data.Name_Emig; if(name_emp != null) { name_emp = name_emp.ToCharArray(); }
{ "pile_set_name": "StackExchange" }
Q: When do the "-uple"s end? Possible Duplicate: How to form single, double, triple… and uni-, bi-, tri-… words? There's single, double, triple, quadruple... — what's next? Is there an end to the "-uple"s? A: double triple quadruple quintuple sextuple septuple octuple A: It would seem that it is tuple (or, rather, -ple) all the way beyond that: http://en.wikipedia.org/wiki/Tuple#Origin_of_name
{ "pile_set_name": "StackExchange" }
Some communications devices operate in multiple networks. A “dual-mode” GSM-ANSI Interoperability Team (GAIT) device, for example, operates in both a TDMA communications network and in a GSM communications network. A true “world phone” could similarly operate in a CDMA, a TDMA, and/or a GSM communications network. These multiple-mode devices can send and receive communications regardless of the signaling standard. Until a single, worldwide signaling standard is adopted, communications devices that can operate in multiple networks are expected to grow in popularity. Although a communications device may operate in multiple networks, the communications device must first be located. That is, the communications device is forced to activate in a particular network using a particular signaling standard. The communications device, for example, may have internal settings and programming that only permit activation and registration in a home TDMA network. A mobile telecommunications service provider controls the operating environment of the communications device to only permit activation in a known location. Once the communications device is found, communications to and from the communications device are processed. Multiple network communications devices, however, create complexities and concerns for mobile telecommunications service providers. Some mobile telecommunications service providers program a Subscriber Identity Module (SIM) to only register in the subscriber's home network. A subscriber in Los Angeles, for example, may have a different home network than a subscriber in Boston. Because each subscriber may have a different home network, multiple SIM designs are required for each market. When multiple SIM designs are required, engineering, purchasing, manufacturing, and inventory operations are complex and expensive. There is, accordingly, a need in the art for improved multiple network communications devices and methods, a need for improved activation of communications devices in a multiple network environment, and a need for improved activation and registration of communications devices that reduces the complexity and expense of multiple Subscriber Identity Modules.
{ "pile_set_name": "USPTO Backgrounds" }
Aston (Birmingham ward) Aston is a ward covering an area of north east Birmingham, including the districts of Aston. Demographics The 2011 census found that 32,286 people were living in Aston. 50.4% of the population was female and 49.6% was male. This was above and below the national and city average respectively. Aston is a very diverse community, ethnically, with 44% of the population born outside the United Kingdom. The largest ethnic group was Asian at 55%. More specifically, the Pakistani ethnic group was the largest at 38% of all Asians. Black British was the second largest ethnic group at 26%. White British was the third largest ethnic group at 18%. Islam was the most prominent religion in the ward with 54% of the ward's population stating themselves as Muslim, above the city average. Christianity was the second most prominent religion in Aston at 26%. The ethnic makeup of the area drastically changed in the 1950s and 1960s with immigration from the Commonwealth. Most of the immigrants were from the Indian subcontinent, though a significant number were from the Caribbean. Ward history The ward was created in 1911, when Birmingham gained the Aston Manor Urban District. As a typical inner city ward, which tends to lose population the boundaries have been altered on a number of occasions. Election fraud scandal In 2004 the ward saw a voter fraud scandal in which Labour councillors were guilty of a systematic attempt to rig elections. They had set up a "vote-rigging factory" in a disused warehouse, stealing and intercepting hundreds and possibly thousands of ballot papers to achieve this. Three councillors, Mohammed Islam, Muhammed Afzal and Mohammed Kazi were convicted of voter fraud, with the elections having to be rerun. All three were barred from standing in the following election. Politics The Aston ward is currently represented by two Labour councillors: Muhammad Afzal and Nagina Kauser. In recent times, it has usually returned Labour councillors; however, Election results 2010s 2000s 1990s 1980s 1970s 1960s 1950s 1940s References Category:Wards of Birmingham, West Midlands
{ "pile_set_name": "Wikipedia (en)" }
Top Stories 2017: One of best scallop harvests in years This year’s Peconic Bay scallop harvest started off with one of the strongest yields in years, according to local baymen and seafood retailers. “It’s definitely a pretty impressive year,” said Charlie Manwaring, owner of Southold Fish Market. During the first week, in fact, so many baymen brought in their 10-bushel limit that he and other market operators asked them to hold off on bringing in more so that they could catch up with the oversupply, which strained their ability to shuck and sell the mounds of shellfish. This season’s considerable bounty of scallops also affected their cost to consumers, driving prices down and offering customers a good deal on a fresh, local product. “That’s one of the reasons we told baymen to hold off, too, as we can only process so much in a day and at the same point there’s only so much business out there to buy them,” Braun Seafood manager Keith Reda said. “So if everybody’s pushing out these low-priced scallops, the people are just going to wait until it goes lower and lower.” Stephen Tettelbach, professor of biology at LIU and co-leader of Cornell Cooperative Extension’s scallop restoration program, said he witnessed some of the biggest scallops he’s seen in 30 years, a point with which Mr. Reda agreed. “This year is definitely, I think, more volume,” Mr. Reda said. “There seem to be quite a few scallops in a lot of different areas, which is a really good thing because guys can kind of spread out across the bay.” Southold Town Baymen’s Association president Nate Andruski said he anticipates a steady season through March, giving baymen the opportunity to make money all winter.
{ "pile_set_name": "Pile-CC" }
Turk's Head Building The Turk's Head Building is a 16-story office high-rise in Providence, Rhode Island. Completed in 1913, the building is one of the oldest skyscrapers in Providence. Standing tall, it is currently the 11th-tallest building in Providence. When completed in 1913, the Turk's Head Building surpassed the 1901 Union Trust building to become the tallest building in downtown (the Rhode Island State House is taller and was finished in 1904). It retained that title until 1922, when the Providence Biltmore was completed. History The building is designed in a V-shape, and architectural historian McKenzie Woodword asserts that the architects of the building "clearly had in mind Daniel Burnham's Flatiron Building" (in New York City). The skyscraper's peculiar name dates back to the early nineteenth century, when shopkeeper Jacob Whitman mounted a ship's figurehead above his store. The figurehead, which came from the ship Sultan, depicted the head of an Ottoman warrior. Whitman's store was called "At the sign of the Turk's Head". The figurehead was lost in a storm, and today a stone replica is found on the building's 3rd floor façade. After buying the building in 1997 for $4.2 million and spending $3 million renovating it, brothers Evan and Lloyd Granoff sold the building in 2008 for $17.55 million to FB Capital Partners. The Granoffs had not been actively trying to sell the building — their attorney advisor said they accepted the deal because the sum offered was well over the worth of the building. The building was also featured in one of the scenes from the Disney movie Underdog. Tenants The building is known for the longevity of its tenants. It is home to at least two tenants which have operated in the building for over a century. The investment firm Brown, Lisle/Cummings Inc., and the law firm Gardner, Sawyer, Gates & Sloan both opened their doors in 1913 and kept offices in the building for a century. Gardner, Sawyer, Gates & Sloan is notable as the firm of Ada Lewis Sawyer, Rhode Island's first female lawyer. Attorney Timothy Conlon has gained nationwide representation for his work as a divorce lawyer and in litigation involving clergy sexual abuse. Gallery References External links Category:Skyscraper office buildings in Providence, Rhode Island Category:1913 establishments in Rhode Island Category:Office buildings completed in 1913
{ "pile_set_name": "Wikipedia (en)" }
Dirigibile Italia Arctic Station The Dirigibile Italia Arctic station (in Italian: Base artica Dirigibile Italia) is an Italian research station in Ny-Ålesund, Svalbard, Norway. Managed by the National Research Council of Italy (CNR), it was inaugurated in May 1997, in memory of the airship Italia expedition of Umberto Nobile (1928). It is a 330 m² permanent research station with laboratories and offices which can host up to seven people, but it is inhabited only in case of ongoing scientific activities; the scientific studies, coordinated by the CNR Polar Network, include: "chemistry and physics of the atmosphere, marine biology, technology research, oceanography/limnology, environmental studies, human biology and medicine". The research station runs also the Amundsen-Nobile Climate Change Tower, measuring atmospheric parameters, installed by the Kings Bay and inaugurated on 30 April 2009. See also List of research stations in the Arctic Airship Italia Amundsen-Nobile Climate Change Tower National Research Council (Italy) Ny-Ålesund References External links Category:Science and technology in Italy Category:Arctic research Category:Science and technology in Svalbard Category:Ny-Ålesund Category:1997 establishments in Norway
{ "pile_set_name": "Wikipedia (en)" }
Q: What does LAST_ACK mean, as a State value in netstat? If a Windows server has several thousand ports open in LAST_ACK state (as shown by netstat), what could this mean? Is it because one endpoint is waiting for the other to respond? A: The last_ack state (if I recall my TCP stack correctly) is the state when you have received your FIN message to close the connection from your neighbour, but you still need to flush and shut down your connection. You send the final FIN yourself and wait for an ACK. Typically hanging in last_ack means your application keeps a socket open even when the the other end has finished sending data. This can happen for multiple reasons. There might be a firewall or other load balancer which loses last ACK from the client, and leaves you stuck in the last_ack state. If the connections are not timed out after a few minutes (10 or so) you probably have a bug. Have a look at the state diagram at http://tangentsoft.net/wskfaq/articles/debugging-tcp.html A: LAST_ACK means your end has received a FIN from the peer, sent an ACK, sent a FIN, and is waiting for the final ACK from the peer. At this point there is nothing further the application can do: the socket is closed. The application may even have exited. From here on it is up to TCP to resend the FIN until it gets the final ACK, or time out doing so. Not much you can do as an admin except investigate the network. A: LAST_ACK is the last state right before closing the down the TCP connection.
{ "pile_set_name": "StackExchange" }
Medical News Today: Cancer: Using tiny bubbles to starve tumors Generating tiny bubbles inside targeted blood vessels by using ultrasound may be a non-surgical way to starve tumors of their blood supply and deliver anticancer drugs, say scientists in China and France. How could bubbles be used in the fight against cancer? The method is called “gas embolotherapy,” and it involves injecting microscopic droplets of a substance into the blood vessels that feed tumors. When ultrasound is applied from an external device, the droplets generate bubbles that grow bigger and block the blood vessels. In previous work, the team was also surprised to discover that some of the bubbles got into the smaller blood vessels and caused them to rupture and become leaky. In a paper now published in the journal Applied Physics Letters, the researchers describe exploring the approach in detail to discover more about its dynamics and how it works. “We have found,” says first study author Yi Feng, an associate professor of biomedical engineering from Xi’an Jiaotong University in China, “that gas embolotherapy has great potential to not only starve tumors by shutting off blood flow, but also,” he continues, “to be used as a source of targeted drug delivery.” Cutting tumors’ blood supply Without a blood supply, solid tumors cannot grow more than a few millimeters, and neither can they spread. However, they overcome this problem by producing chemicals that trigger the formation of new blood vessels — a process called angiogenesis. Furnished with a dedicated blood supply, tumors will receive the oxygen and nutrients that help them to grow and spread into neighboring tissue and also travel to other parts of the body and set up new metastases, or secondary tumors. One approach that scientists have so far developed to stop or slow tumor growth is drugs called “angiogenesis inhibitors,” which stop the process of blood vessel formation. Another approach that has gained a lot of attention is “embolization,” in which blood vessels are blocked by injection of drugs or direct insertion of nano-sized beads. Using gas bubbles to block vessels Gas embolotherapy, a form of embolization, uses gas bubbles to block blood vessels. Prof. Feng and his colleagues used a technique called acoustic droplet vaporization (ADV) to generate the bubbles from injected droplets of “dodecafluoropentane” that incorporated a “bovine serum albumin.” They carried out their experiments on tissue taken from a rat’s intestinal mesentery, which is a flap that tethers the intestines to the wall of the abdomen and is rich in blood vessels. When they applied the ultrasound, they found that the droplets formed bubbles that came together, with some of them merging to make bigger bubbles, and then blocked the tiny blood vessels, or capillaries of the tissue. They also observed an example of “invagination,” in which a “pouch-like cavity” forms in a blood vessel and causes it to rupture. They suggest that this was the result of the bubble interacting with the blood vessel. The team suggests that these results show that gas embolotherapy could be used to smite cancer with a “double punch.” The first could cut off the tumor’s blood supply, and the second could deliver anticancer drugs. Also, the drug dosage could be reduced using this method because the blocking of the blood supply would keep the drug near the tumor for a longer time. Corresponding study author Mingxi Wan, a professor of biomedical engineering at Xi’an Jiaotong University, explains that researchers in cancer therapy are always attempting to address two issues: how to kill the tumor, and how to reduce chemotherapy side effects. “We have found that gas embolotherapy has the potential to successfully address both of these areas.”
{ "pile_set_name": "Pile-CC" }
WIGS Sort by This collection of wigs are designed especially for the dolls that are busy and DO-Not have time to sit hours to get glammed. These versatile GLUE-LESS UNITS let you go from 0 to FULL GLAM with in minutes, These wigs can be installed and removed in seconds. In addition, they are secure, comfortable and fit, feel and look like a sew-in. These customize wigs are 100% hand-made nd can be adjusted to fit any 2-3 years with proper care. Life just got easier with our Wigs-On-The-Go. *All wigs need 10 business days to be processed and 3-5 shipping days. For express service 347-799-8449 before placing order.*
{ "pile_set_name": "Pile-CC" }
Q: do scheduled Celery task still in progress when the django app will be deployed again I am new to Scheduling jobs in Django. I am using celery for the asynchronous task. My question is if I have made a task which starts when a user clicks on a button. So my website is running and it has many scheduled task in the background which will be executed at the assigned time. But before their execution, if I will redeploy my app (a new version) to the server again with some changes (not related to the things that celery needs) then will the previous tasks be still in progress or they will be terminated due to environment updation process on the server? I am using Django 2.1 deployment on AWS ElasticBeanstalk using the command line interface to deploy the application. PS: please comment if Question is not clear. A: Generally yes (with the assumption you run them on server with supervisor or something similar, not with session terminal that you stop), they would still keep running because Celery tasks are in separate process with separate workers getting task done.
{ "pile_set_name": "StackExchange" }
As no optical imaging system can ever be perfect, improvements are desirable that can correct or minimize the effect of imperfections on the resulting images. One way to improve the images produced by an optical system is to characterize the optical flaws and artifacts and correct the resulting images based on this information. One way to do this is image normalization. Image normalization is a process whereby a reference image is made of what is usually a uniform surface or other subject suitable as a reference. The reference image is made under conditions that exhibits any optical artifacts of the system. For example, a black and white CCD camera may have individual or groups of inoperative/defective pixels. These would show up as black or white spots in a reference image taken of a uniform surface. Because these artifacts are constant, they will appear in any image taken with that particular device. A normalized image can then be created by using the collected reference image, which, when properly combined, “normalizes” the flawed pixels so that they appear to have the same value as all of the remaining pixels of the image of the uniformly illuminated subject. Obviously, this technique cannot reproduce the value the flawed pixel should have been had it operated properly. However, the overall effect of the flawed pixel on the image quality is, on average, reduced, if the value is normalized instead of being left as full black or white. For example, if pixels can have values of 1 to 100, and a flawed pixel is normalized to 50, the most the pixel can be off from the true value is 50, whereas if the pixel is stuck at 1 or 100, the pixel could be off as far as 99. One skilled in the art will recognize that more sophisticated normalization methods exist for correcting images as light values are not linear, and, for example, artificial intelligence means can be employed to “normalize” known flawed areas to the values of surrounding areas, instead of to a fixed value. In the field of electron microscopy, examples of “fixed flaws” include, detector irregularities (pixel non-uniformity and fixed pattern contrast from the scintillator), dust and scratches on the scintillator surface. These flaws produce artifacts in the raw unprocessed image that can be manifested as dark shadows, excessively bright highlights, specks and mottles that alter the true pixel value data. Normalization of images to correct for optical artifacts requires that the flaws and their effect on the image is fixed. If the reference image appears different each time it is taken, it is not possible to prepare a corrective image to normalize subsequent images. One optical artifact that cannot be normalized with a single reference image is that of unequal illumination to the CCD sensor. For example, in a Transmission Electron Microscope (TEM), depending on where the imaging device is physically placed on the microscope's column, illumination of the device can be markedly brighter at the center than at the edges. If this effect is constant for all images, then it can be normalized. However, where certain operating parameters (accelerating voltage, magnification, probe size, beam intensity, etc.) of the TEM are adjustable, the effect of unequal illumination is not constant for all microscope settings. Thus, while a normalization image may be able to correct for fixed flaws, such as bad pixels, a single reference image is incapable of compensating for the effect of unequal illumination where that effect is not constant at different microscope settings (e.g., magnification or accelerating voltage). Thus, a need exists for an image normalization method that can normalize optical artifacts in a system where the artifacts vary depending on microscope parameters or other system settings.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How to correctly send the data I received via I2C over UART? I am using an atmega328p and writing firmware to display the data I receive via i2c in putty. I read the data I receive as follows: /* Receive data from slave. */ TWCR = (1<<TWINT) | (1<<TWEN) | (1<<TWEA); while(!(TWCR & (1<<TWINT))); libuart_send((char*)TWDR,1); where: void libuart_send(unsigned char *data, int data_size) { for(int i = 0; i < data_size; i++) { /* Wait for empty transmit buffer */ while ( !( UCSR0A & (1<<UDRE0)) ); /* Put data into buffer, sends the data */ UDR0 = data[i]; } } I can see with my logic analyzer that I receive 0x00: Yet when trying to see the corresponding data with putty, I just get a weird symbol as if I am casting it incorrectly: I have been trying to find out how the register TWDR is defined in order to try to understand whether or not I am casting something incorrectly, but I didn't find the information I was looking for. Note that my function libuart_send works perfectly fine when I do something like this libuart_send('A', 1);, but not when I replace the first argument by TWDR. In other words the baudrate is perfectly fine. Does anybody know why I am seing this weird character in stead of the number 0 in putty? Thanks A: You are sending a zero, the problem is that you want to see a printable representation of 0 which is character code 0x30, not raw value 0x00. You'll either need a terminal program which can display raw vales as a hexdump, or to write code on the Atmega side which expands each byte into a two character hex representation or an up to three character decimal one. A: I think you are casting it wrong. Most likely what happens is that you read the value 0x00 in TWDR and cast it as a pointer from where to read the printable character. Try this : unsigned char tempval; tempval = TWDR; libuart_send(&tempval, 1); But if the received character value is 0, this will print the NULL character, it won't print the number or character "0" which is what you may want. char tempstring[6]; tempstring[0]='0'+(tempval/100); tempval=tempval%100; tempstring[1]='0'+(tempval/10); tempval=tempval%10; tempstring[2]='0'+tempval; tempstring[3]=0x0d; tempstring[4]=0x0a; tempstring[5]=0x00; libuart_send(&tempstring, 6);
{ "pile_set_name": "StackExchange" }
457 F.2d 942 UNITED STATES of America, Plaintiff-Appellee,v.Robert King JOHNSON, Defendant-Appellant. No. 71-2144. United States Court of Appeals,Ninth Circuit. March 29, 1972. Martha Goldin (argued), of Saltzman & Goldin, Hollywood, Cal., for defendant-appellant. David P. Curnow, Asst. U. S. Atty. (argued), Robert L. Meyer, U. S. Atty., Eric A. Nobles, Asst. U. S. Atty., Los Angeles, Cal., for plaintiff-appellee. Before KOELSCH, DUNIWAY and KILKENNY, Circuit Judges. PER CURIAM: 1 Johnson appeals from his conviction of refusing to be inducted into the Armed Forces, 50 U.S.C.App. Sec. 462(a). 2 On November 25, 1969, the local board issued an order to Johnson to report for induction on December 9, 1969. He did not report. On December 9, the board received from Johnson a Current Information Questionnaire (form SSS 127) that had been sent to him on October 23, 1968, together with a note stating that "the reason I was not at Depot at 6 A.M. was I injury [sic] my right arm and I will bring my Doctor paper tomorrow." 3 The note also stated that Johnson was on probation. On January 15, 1970, the board sent Johnson an order to report for armed forces physical examination on January 26, 1970. He did not do so. On January 21, 1970, the board received from Johnson a notice stating that he was on probation and giving the name and address of his probation officer. 4 Nothing more happened until July 15, 1970, almost five months later. On that day the board sent Johnson another current information questionnaire and a form letter inquiring as to his probation. These were returned on July 29. They stated that Johnson was on probation but not in custody. On November 9, 1970, the board sent Johnson a continuing duty letter, stating that the November 25, 1969 order to report for induction had not been cancelled, and ordering him to report on November 24, 1970. Johnson reported and was found acceptable, a moral waiver having been received and his probation having been terminated. He refused to be inducted. 5 The local board took no formal action to postpone Johnson's induction under the November 25, 1969 order, but the effect of the board's action was to postpone. Cf. White v. United States, 9 Cir., 1970, 422 F.2d 1254. The regulations, however, limit the board's power to postpone; 32 C.F.R. Sec. 1632.2 permits two postponements of 60 days each. It requires issuance of a notice of postponement to the registrant and the filing of a copy of the notice in his file, including a notation of the date to which induction is postponed. These things were not done. In fact, for a period of 165 days, nothing at all happened, so far as the record shows. Under these circumstances, United States v. Stevens, 9 Cir., 1971, 438 F.2d 628, and United States v. Munsen, 9 Cir., 1971, 443 F.2d 1229, are controlling. 6 Reversed.
{ "pile_set_name": "FreeLaw" }
Q: How to fix it ? i am very very new to java package app; import java.util.Scanner; import java.util.UUID; public class AccountThis { private static Scanner scanner; public static void main( String[] args ) { //name input scanner = new Scanner( System.in ); System.out.print( "Type your name: " ); String nameInput = scanner.nextLine(); System.out.println("Hello" + " " + nameInput); //deposit input scanner = new Scanner( System.in ); System.out.print( "Type how much you want to deposit:" ); double depositInput = scanner.nextDouble(); System.out.println("you want to deposit" + " " + depositInput + "$"); public AccountThis(String id) { System.out.println("ID Generated" + "Please Write it down :" + id); } class RandomStringUUID {} public id = randID;{ UUID randID = UUID.randomUUID(); UUID randomUUIDString = randID; System.out.println(randomUUIDString ); new AccountThis( nameInput, depositInput, id); } { } } public AccountThis() { System.out.println( "created an account." ); } public AccountThis( String nameInput ) { System.out.println( " created account with name " + nameInput ); } public AccountThis(double depositInput) { System.out.println(depositInput + "$" + "added to your account!" ); } } i am new to java and i am trying to get id and assign it to the console with some text as you can see i failed a little bit if you can help me figure it out i would be very very happy btw i called it id cause i set on it all night and couldn't figure it out. A: Try this code. It is working fine import java.util.Scanner; import java.util.UUID; public class AccountThis { private static Scanner scanner; public AccountThis(String nameInput) { System.out.println(" created account with name " + nameInput); } public AccountThis() { System.out.println("created an account."); } public AccountThis(double depositInput) { System.out.println(depositInput + "$" + "added to your account!"); } public AccountThis(String nameInput, double depositInput, String id) { System.out.println(" created account with \n ID : " + id + ", \n name : " + nameInput); System.out.println(depositInput + "$" + "added to your account!"); } public static void main(String[] args) { //name input scanner = new Scanner(System.in); System.out.print("Type your name: "); String nameInput = scanner.nextLine(); System.out.println("Hello" + " " + nameInput); //deposit input scanner = new Scanner(System.in); System.out.print("Type how much you want to deposit:"); double depositInput = scanner.nextDouble(); System.out.println("you want to deposit" + " " + depositInput + "$"); UUID randID = UUID.randomUUID(); String id=randID.toString(); new AccountThis(nameInput, depositInput,id); } }
{ "pile_set_name": "StackExchange" }
/* * Copyright (c) 2020, Oracle and/or its affiliates. * * Licensed under the Universal Permissive License v 1.0 as shown at * http://oss.oracle.com/licenses/upl. */ package com.oracle.coherence.grpc.client; import com.tangosol.io.Serializer; import com.tangosol.net.ConfigurableCacheFactory; import com.tangosol.net.NamedCache; import io.grpc.Channel; import org.junit.jupiter.api.AfterAll; import org.junit.jupiter.api.BeforeAll; import java.util.HashMap; import java.util.Map; /** * An integration test for {@link NamedCacheClient} that creates instances of * {@link NamedCacheClient} using the {@link AsyncNamedCacheClient.Builder}. * <p> * This integration test runs without a CDI environment. * * @author Jonathan Knight 2019.11.07 * @since 20.06 */ class ScopedNamedCacheClientIT extends BaseNamedCacheClientIT { // ----- test lifecycle ------------------------------------------------- @BeforeAll static void setupBaseTest() throws Exception { serverHelper = new ServerHelper(SCOPE_NAME); serverHelper.start(); ccf = serverHelper.getCCF(); channel = serverHelper.getChannel(); } @AfterAll static void cleanupBaseTest() { clients.values() .stream() .flatMap(m -> m.values().stream()) .forEach(client -> { try { if (client.isActiveInternal()) { client.destroy().join(); } } catch (Throwable t) { // ignored - we're done anyway } }); serverHelper.shutdown(); } // ----- BaseNamedCacheClientIT methods --------------------------------- @Override @SuppressWarnings("unchecked") protected <K, V> NamedCacheClient<K, V> createClient(String sCacheName, String sSerializerName, Serializer serializer) { Map<String, AsyncNamedCacheClient<?, ?>> map = clients.computeIfAbsent(sCacheName, k -> new HashMap<>()); AsyncNamedCacheClient<K, V> async = (AsyncNamedCacheClient<K, V>) map.computeIfAbsent(sSerializerName, k -> AsyncNamedCacheClient.builder(SCOPE_NAME, sCacheName) .channel(channel) .serializer(serializer, sSerializerName) .build()); if (!async.isActiveInternal()) { map.remove(sSerializerName); return createClient(sCacheName, sSerializerName, serializer); } return (NamedCacheClient<K, V>) async.getNamedCache(); } @Override protected <K, V> NamedCache<K, V> ensureCache(String sName, ClassLoader loader) { return ccf.ensureCache(sName, loader); } // ----- data members --------------------------------------------------- public static final String SCOPE_NAME = "testing"; private static final Map<String, Map<String, AsyncNamedCacheClient<?, ?>>> clients = new HashMap<>(); private static ServerHelper serverHelper; private static ConfigurableCacheFactory ccf; private static Channel channel; }
{ "pile_set_name": "Github" }
Analysis of heart rate variability at rest and during aerobic exercise: a study in healthy people and cardiac patients. To analyse HRV at rest in healthy people and in patients with acute myocardial infarction (AMI) and how it changes during aerobic exercise. The heartbeat signal was recorded beat to beat for 15 minutes at rest and 15 minutes while pedalling in 10 healthy and active men (H group) and 10 cardiac patients (C group). The statistical parameters in the time domain were calculated as well as the spectral analysis applying the Fast Fourier Transform (FFT) and Poincare's graphic analysis (PGA). At rest, H group have an average SDRR (standard deviation of RR intervals) of 71.24 msec, a pRR50 (percentage of differences higher than 50 msec in RR intervals) of 9.97% and a PGA called "comet-type". The C group have a SDRR of 36.69 msec, a pRR50 of 1.69%, and a PGA "torpedo-type". These data show a low or moderate risk for healthy people and a high risk for patients. The FFT analysis lies in the very-low-frequency (VLF) zone in both groups. During exercise, H group shows a significant decrease in all parameters; the PGA turns to "torpedo-type" and the FFT remains in the VLF zone. However, C group is characterised by the maintenance of pRR50, no change in PGA and a second peak in FFT in the high-frequency zone. The HRV at rest and during aerobic exercise follows a different pattern in healthy people and in patients and it provides further information about performance during exercise.
{ "pile_set_name": "PubMed Abstracts" }
Q: How can I grow trees underground? Possible Duplicate: Can trees grow without sunlight? Ok, so I'm trying to plant this tree underground and it's surrounded by torches and directly under a 4x4 sky light. It's a normal sapling on 5 deep dirt. I've used like, 10 bonemeals on it and it isn't working. Am I doing something wrong? A: Trees need 7 blocks above them to grow, depending on sapling type. They also have a minimum horizontal requirement as well. Hollow out more space. If you use bonemeal and nothing happens, then you don't have enough space.
{ "pile_set_name": "StackExchange" }
Theoretical investigations of Rh-catalyzed asymmetric 1,4-addition to enones using planar-chiral phosphine-olefin ligands. Recently, planar-chiral phosphine-olefin ligands based on (η6 -arene)chromium(0) and (η5 -cyclopentadienyl)manganese(I), which are known as first- and second-generation, respectively, have been developed. These ligands were employed for Rh-catalyzed asymmetric 1,4-addition to enones. First-generation ligands involve high enantioselectivity for cyclic enones (>98% ee). Second-generation ligands involve high enantioselectivity for not only cyclic enones but also for acyclic enones (>98% ee). In this study, we have performed DFT calculations to investigate the origin of enantioselectivity. The theoretical values of enantioselectivities were found to be in good agreement with the experimental values obtained for a cyclic enone, 2-cyclopenten-1-one, using both the first- and second-generation ligands. Regarding an acyclic enone, 3-penten-2-one, it was found that the s-cis type decreases the enantioselectivity because the transition states in the s-cis type have a large steric repulsion. Energy decomposition analysis (EDA) and natural bond orbital (NBO) analysis indicate that it is important to study the orbital interactions in the transition states of the insertion step for the acyclic enone attacked from si-face with the second-generation ligand. © 2018 Wiley Periodicals, Inc.
{ "pile_set_name": "PubMed Abstracts" }
This invention relates generally to the field of implantable valvular prostheses and more particularly to holding tools used for implantation of valvular prostheses. To facilitate implantation of heart valve prostheses, various types of specialized holders have been developed. Such holders are intended to enable the implanting surgeon to precisely position the heart valve at its desired implant site and to securely hold the valve in place until suturing is complete. Some tools developed for use in conjunction with bioprosthetic or tissue heart valves have included a mechanism for causing inward deflection of the valves' commissure posts in order to facilitate the implantation procedure by improving the surgeon's access to the suture ring and host tissue disposed around the base of the replacement valve. One such holder, adapted for use in placing heart valves in the mitral position, is disclosed in U.S. Pat. No. 4,865,600 issued to Carpentier et al. Other such holders, adapted for use in placing valves in the aortic position, are disclosed in U.S. Pat. Nos. 5,716,401 and 5,476,510 issued to Eberhardt et al. Medtronic Hancock® mitral valves are available mounted to a holder providing a mechanism for inward deflection, as illustrated in the brochures: “A New Dimension—The Hancock II Bioprosthesis”, Medtronic Inc, 1991, publication number UC8903226EN and “A New Light on the Hancock Bioprosthesis”, Medtronic, Inc., 1988, publication number UC8801713EN, both incorporated herein by reference in their entireties. This holder includes a ratcheting spool, mounted below the sewing ring, which when rotated by means of an attached handle, pulls lengths of suture inward, in turn pulling sutures extending upward though the commissure posts and between the commissure posts downward, to deflect the commissure posts inward.
{ "pile_set_name": "USPTO Backgrounds" }
TMR-30..Power Timer Eliminate dead vehicle batteries caused by power drain from radios and data terminals that must operate while the engine is off. Allows use of accessory loads per programmed time limit while preserving battery for engine start. Programmable disconnect time limit, 15 minutes to 8 hours, so that you can match your auxiliary load use to battery capacity, providing maximum run time yet still ensuring adequate reserve for engine start Prevents dead batteries due to accessories being left on and forgotten Once power off circuit is activated, power to auxiliary circuits is automatically restored when engine started, no delay in use of equipment Low and High Voltage Disconnect Simple 3 wire installation:1) Power in from battery, 2) power out to loads, 3) chassis ground. Optional ignition sense wire resets power on without having to start engine
{ "pile_set_name": "Pile-CC" }
A Lagrangian-Eulerian approach to modeling homogeneous condensation in high density gas expansions. A computational approach to homogeneous nucleation is proposed based on Eulerian description of the gas phase expansion coupled with a Lagrangian approach to the cluster formation. A continuum, Euler/Navier-Stokes solver versatile advection code is used to model the gas transport, and a kinetic particle solver is developed in this work to simulate cluster nucleation and growth. Parameters in the new model were adjusted so as to match the known theoretical dimer formation equilibrium constants for the two gases under consideration, argon and water. Reasonable agreement between computed and available experimental data was found in terminal cluster size distributions for nozzle water expansions in a wide range of stagnation pressures. The proposed approach was found to be orders of magnitude faster than a comparable approach based on the direct simulation Monte Carlo method.
{ "pile_set_name": "PubMed Abstracts" }
The present invention relates to a machine for performing profiling operations on a valve body and, in particular, a portable machine for selectively performing cutting and grinding operations on a valve seat in the field without removal of the valve from the fluid line. In field service, the sealing interface between the valving member and its associated valve seat can be damaged to an extent that the requisite sealing is impaired and repair thereof is necessary to establish acceptable valving operation for the particular fluid control application. Such damage may occur to either the valving member or the valve seat and can occur through corrosion, erosion, frictional wear, distortion, and structural damage due to the presence of foreign objects. Whereas the valving member may be removed for repair or replacement of its sealing surfaces, the valve body is typically welded integrally to the fluid line and, particularly in the case of a large valve, can not be practically removed for valve repair. Various techniques have thus evolved for field repair of large valves. If the required repair to the sealing interface is minor, portable lapping rigs can be used for directly lapping the sealing interface between the valve member and the valve seat. However, if resurfacing of the valve seat is necessary or the damage to either the seat or the sealing member is excessive, lapping becomes impractical due to excessive time and wear to the parts. Where only the valve seat is impaired, lapping tools are available for the seat, but this approach is similarly restricted to minor repairs. When extensive valve seat repair is required, the only commercially available machines have been extremely large and bulky rigs which are mounted exteriorly of the valve bonnet and have an extentable cantilevered shaft which is translatable toward the valve seat. The rig performs cutting and grinding operations on the seat. These machines, which typically weigh around two or three thousand pounds, are not entirely satisfactory for field use, particularly where only limited access and limited overhead space is available, such as in nuclear power plants. Moreover, the configuration of the rig's extended ram may permit eccentricity of the ram with respect to the valving axis during the profile forming operation. Thus, out-of-roundness and irregular surface finish can result.
{ "pile_set_name": "USPTO Backgrounds" }
DICTIONARY OF AUSTRALIAN BIOGRAPHY Angus and Robertson--1949 Ba BACKHOUSE, JAMES (1794-1869), missionary, the fourth child of James and Mary Backhouse of Darlington, Yorkshire, England, was born on 8 July 1794. His father died when he was a child and his mother brought him up in a religious atmosphere. He began work in a grocery, drug and chemical business, but his health was not good and he decided to adopt an outdoor life. An uncle helped him in the study of botany, and in 1815, with his brother Thomas, he purchased the nursery business of J. and G. Telford at York. In 1822 he married Deborah Lowe, and in 1824 he was admitted as a minister in the Society of Friends. In December 1827 his wife died leaving him with a son and a daughter. In September 1831, with G. W. Walker (q.v.), he sailed for Australia on a mission to the convicts and settlers. They arrived at Hobart in February 1832, and the next six years were spent in missionary journeys all over the then settled districts of Tasmania, New South Wales, and as far north as the site of Brisbane. Port Phillip was visited in 1837, and South and Western Australia just before they left. A Narrative of a Visit to the Australian Colonies by James Backhouse, published in 1843, tells the story of their travels and has much of interest relating to the aborigines, the convicts, the social conditions of the time, and the botany of Australia. The two missioners then went to Mauritius and South Africa and continued their work, preaching whenever a few could be gathered together to hear them. Backhouse even succeeded in learning enough Dutch to be able to preach in that language. He returned to England and arrived at London on 15 February 1841. An account of his African experiences will be found in A Narrative of a Visit to the Mauritius and South Africa, published in 1844. He took up the nursery again, and when his brother died in 1845, brought his own son James into the business. He kept up his religious work for the whole of his life, travelling and preaching much in England, Scotland and Ireland. He died at York on 20 January 1869. In addition to the works already mentioned Backhouse wrote or edited A Memoir of Deborah Backhouse (1828), Memoirs of Francis Howgill (1828), Extracts from the Letters of James Backhouse (1838-41), The Life and Correspondence of William and Alice Ellis (1849), A Short Record of the Life and Experiences of Thomas Bulman (1851), and numerous sermons, addresses and tracts. With Charles Tylor he wrote The Life and Labours of George Washington Walker (1862). His son, James Backhouse, was the author of A Handbook of European Birds (1890) and other publications. The views of Backhouse on religion and the conduct of life seem narrow after the lapse of 100 years. But he was absolutely sincere and disinterested, and this was fully recognized by the convicts, the settlers and the ruling officials. He was untiring in his advocacy of temperance, and his opinions on the treatment of convicts were sound and wise. The report on the state of prisoners in Tasmania made by Backhouse and Walker to Governor Arthur (q.v.) is printed as an appendix to A Narrative of a Visit to the Australian Colonies. The botanical work of Backhouse was also excellent. Sir J. D. Hooker in his "Introductory Essay" to his Flora Tasmaniae says of Backhouse: "The results of his journey have proved extremely valuable in a scientific point of view and added much to our familiarity with Australian vegetation". S. Backhouse, Memoir of James Backhouse; The Journal of Botany, vol. VII; Backhouse's own publications. BADHAM, CHARLES (1813-1884), classical scholar, was the son of Charles Badham, M.D., F.R.S., professor of physic at the university of Glasgow, and of Margaret Campbell, cousin of Thomas Campbell, the poet. He was born at Ludlow, Shropshire, on 18 July 1813, and at the age of seven was sent to Switzerland to be educated under Pestalozzi. He went to Eton about 1826, matriculated at Wadham College, Oxford, in 1831, and graduated B.A. in 1837 and M.A. in 1839. Dr Hawtrey, who was headmaster of Eton in Badham's time, said that in all his Eton experience he had never known a more remarkable scholar. But the long period at Oxford before he graduated suggests that his energies were not entirely given to his work and he obtained only third-class honours. He then spent seven years in Europe, and gave much study to Greek manuscripts. In the Vatican library he met the great Dutch classical scholar C. G. Cobet with whom he formed a life-long friendship. He also perfected his knowledge of French, German and Italian, and obtained an intimate knowledge of Dutch. On his return to England he was engaged in private tuition, in 1847 was ordained deacon in the Anglican Church, and in 1848 priest. He was appointed headmaster of King Edward's School, Louth, in 1851, obtained the D.D. degree of Cambridge in 1852, and in the same year published his Five Sermons. Two years later he was made headmaster of the Edgbaston proprietary school near Birmingham and, though he attached the greatest value to the teaching of Latin and Greek, made a feature of modern languages in the school and frequently took French and German classes himself. He had begun publishing critical editions of portions of the works of Euripides and Plato in 1851 which gave him a European reputation; but apparently no fit position could be found for the greatest classical scholar of his time. He was given the degree of doctor of letters by the university of Leyden in 1860, and in 1863 was made one of the examiners in classics at London university. In 1866 he was also appointed classical examiner for the Indian civil service. In the following year he became professor of classics at the university of Sydney. Badham was nearly 54 years of age when he came to Australia in April 1867. The university had been established some 15 years but had fewer than 40 students, and the professor's official duties were not heavy. But Badham was not content to laze in a backwater and he even went so far as to write to the leading newspapers in New South Wales offering to correct the exercises of students who might be studying Latin, Greek, French or German, in the country. Some years later he travelled over the country holding meetings and endeavouring to get the people to become interested in the university and to found bursaries for poor students. When the government of New South Wales decided to found a great public library at Sydney, Badham was nominated as a trustee and was elected as the first chairman of trustees. He took the greatest interest in the library, and his wide knowledge was invaluable in its early years. He became the representative man of the university, and his speeches at the annual commencements were eagerly awaited. He always insisted that there must be the same standard of examination for degrees at Sydney as in the leading British universities, and he spared no pains in helping his students to reach that standard. In August 1883 Badham was given a banquet at the town hall, Sydney, to celebrate the completion of his seventieth year, and though his health was then beginning to fail, one of the youngest of those present afterwards recorded that "Badham's speech was unforgettable". On 1 September, in a letter to the Sydney Morning Herald, Badham suggested for the first time that evening lectures should be established at the university. He had been ailing all the year and in December became very ill. He died on 27 February 1884, almost his last act being the writing of a farewell letter in Latin to his old friend Cobet. He was married twice and left a widow, four sons and four daughters. A selection from his Speeches and Lectures was published at Sydney in 1890, and there is a bursary in his memory at the university. At his funeral the coffin was carried to the grave by former students who had received the bursaries for which he had worked so hard, and it was they who subscribed for the monument over his grave, severely simple as he would have desired. Badham was a man of great charm who had many friends, including, in Europe, such distinguished men as Cobet, Dr Thompson, F. D. Maurice, Newman, Thackeray and Theodore Martin; and in Australia, Sir James Martin (q.v.), William Forster (q.v.) and Sir William Macleay (q.v.). He had a high sense of duty and a scorn of meanness or any form of dishonesty, which he did not hesitate to express. A. B. Piddington said of him: "I never knew a public man so open in censure or so little concerned to dissemble anger." His co-examiner in London, William Smith, speaking of Badham in 1816, said he had "never seen him angry or even excited", but Badham evidently grew tired of suffering fools gladly in his later years, as there is general agreement that in Sydney he was quick-tempered. As a teacher his complete absence of pedantry, his vast knowledge, his felicity of illustration and his enthusiasm held his students completely. The classics were living things to him, like most good speakers he was a natural actor, and no one who had ever heard him read great passages from the Greek ever forgot them; while many a relatively dull passage was enlivened by his native wit and humour. It was a remarkable piece of good fortune for the young university of Sydney to have had so great a man and so great a scholar in its early days. T. Butler, Memoir prefixed to Badham's Speeches and Lectures; The Library Record of Australia, October 1901; H. E. Barff, A Short Historical Account of the University of Sydney, p. 79, A. B. Piddington, Worshipful Masters: The Sydney Morning Herald, 28 February 1884; The Times, 10 April 1884. For a list of Badham's works see British Museum Catalogue, 1934. BAILEY, FREDERICK MANSON (1827-1915), botanist, son of John Bailey, nurseryman and seedsman, was born in London on 8 March 1827. His father went with his family to Australia in 1838 and arrived at Adelaide on 22 March 1839. He was appointed colonial botanist soon afterwards, and was asked to form a botanic garden. Later he resigned, began farming, and subsequently started a plant nursery at Adelaide In these ventures he was assisted by his son, F. M. Bailey, who in 1858 went to New Zealand and took up land in the Hutt Valley. In 1861 he went to Sydney and in the same year started a seedsman's business in Brisbane. For some years he was collecting in various parts of Queensland, and he also contributed articles to the newspapers on plant life. In 1874 he published a Handbook to the Ferns of Queensland, and in the following year was made botanist to the board appointed to inquire into the diseases of live stock and plants. In connexion with this, Bailey in 1879 brought out An Illustrated Monograph of the Grasses of Queensland. He was afterwards put in charge of the botanical section of the Queensland museum, in 1881 was made colonial botanist of Queensland, and held this position until his death. He published in 1881 The Fern World of Australia, and in 1883 appeared A Synopsis of the Queensland Flora, a work of nearly 900 pages to which supplementary volumes were added in later years. This work was superseded by The Queensland Flora, published in six volumes between 1899 and 1902 with an index published three years later. In the meantime there had been published in 1897 A Companion for the Queensland Student of Plant Life and Botany Abridged, a revised reissue of two earlier pamphlets. Among other works of Bailey was A Catalogue of the Indigenous and Naturalised Plants of Queensland published in 1890. This was expanded into a Comprehensive Catalogue of Queensland Plants, Both Indigenous and Naturalised, which appeared with many illustrations in 1912. Bailey died on 25 June 1915, working practically to the end in spite of his 88 years. He married in 1856 Anna Maria, daughter of the Rev. T. Waite. A son, J. F. Bailey, who survived him was successively director of the Brisbane and Adelaide botanic gardens. Bailey was awarded the Clarke medal of the Royal Society of New South Wales in 1902, and was created C.M.G. in 1911. His name has been attached to about 50 species of plants by fellow botanists, of which perhaps the best known is Acacia baileyana. A list of his writings will be found in the Proceedings of the Royal Society of Queensland for 1916, p. 7. Bailey was a kindly man of great industry who did very valuable work on the Queensland flora. He was devoted to his work; on one occasion when his office was dispensed with during a financial depression, he continued to cheerfully carry on, as he felt the work must go on whether a salary were provided or not. There was a public protest and he was soon reinstated. He was very interested in the economic side of botany, and his advice was much sought by fruit-growers and others. He takes high rank among Australian botanists. Proceedings of the Royal Society of Queensland, 1916, p. 3; The Brisbane Courier, 26 June 1915; Journal and Proceedings Royal Society of New South Wales, 1921, p. 152. BAILLIEU, WILLIAM LAWRENCE (1859-1936), financier and politician, second son of James George and Emma Baillieu, was born at Queenscliff, Victoria, on 22 April 1859. He was educated at the state school, Queenscliff, and in 1874 joined the staff of the Bank of Victoria. He was 11 years with the bank and there laid the foundation of his knowledge of finance. In 1885 he went into partnership with D. Munro as auctioneers, land and estate agents, a business carried on with success. Baillieu withdrew from this partnership in 1892 and started for himself as an auctioneer and financial agent. A few years later a brother was taken into partnership. In 1901 he was elected to the Victorian legislative council as member for the Northern Province and retained his seat until his retirement from politics in 1922. He became minister of public works and health in the Murray (q.v.) ministry in January 1909 and, with the exception of a break of 13 days, was leader of the legislative council until 1917. From 27 February 1912 he was honorary minister in the Murray, Watt, and Peacock (q.v.) ministries until 29 November 1917. His work as a politician was conscientious, and he might have had other portfolios had he wished, but his outside personal interests made many demands on his time. He had become a director of the Herald newspaper about the close of the century, and he steadily acquired large interests in the Broken Hill and other mines and industries. The 1914-18 war drew attention to the need of the British Empire to be self-contained with regard to lead and zinc, and Baillieu, working with W. S. Robinson and Sir Colin Fraser, reorganized the Broken Hill Associated Smelters at Port Pirie and brought about the formation and development of the Electrolytic Zinc Company at Risdon, Tasmania, both works of the greatest importance. The gold medal of the Institution of Mining and Metallurgy was awarded to Baillieu and Robinson jointly for this work. Baillieu made frequent visits to London and was recognized as a financial expert in all matters relating to Australia. In addition to his connexion with many financial institutions in Melbourne he also acquired pastoral interests in Queensland. At the time of his retirement in 1930 he was chairman of directors of the Broken Hill Associated Smelters, the North Broken Hill Company and the Electrolytic Zinc Company and a member of the board of directors of several other companies. He died at London on 6 February 1936. He married in 1887, Bertha, daughter of Edward Latham, who predeceased him. He was survived by three sons and four daughters. His three sons all fought with distinction in the 1914-18 war. The eldest, Lieutenant-colonel Sir Clive Latham Baillieu, born in 1889, became a well-known company director and financial expert at London. Baillieu was a big man physically and as a financier had much courage and ability. He was popularly supposed to be a millionaire, but his Victorian estate was sworn at only about £60,000. His interests, however, were very wide. He never sought honours and was an unobtrusive and frequent contributor to charities. With his brothers, also well-known in the financial world, he founded the Anzac Hostel at Brighton near Melbourne for permanently injured soldiers. In politics he was by no means a moneyed-interest representative, as he had a somewhat advanced outlook, and though his financial ventures were entered on as business propositions, in the upshot his foresight, shrewdness and determination in handling complicated interests eventually resulted in great benefits to his country. The Times, 7 February, 1936; The Argus, Melbourne, 7 and 8 February 1936, 30 September 1936; The Age, Melbourne, 7 February 1936; Cyclopedia of Victoria, 1903; Who's Who in Australia, 1938. BAIRD, SIR JOHN LAWRENCE, VISCOUNT STONEHAVEN (1874-1941), governor-general of Australia, son of Sir Alexander Baird, was born on 27 April 1874. He was educated at Eton and Christ Church, Oxford, and spent a year in Australia in 1894 as aide-de-camp to Sir Robert Duff, governor of New South Wales. He joined the diplomatic service in 1896 and during the next 12 years was stationed at Vienna, Cairo, in Abyssinia, and at Paris and Buenos Aires. He was elected to the house of commons as Unionist candidate for Rugby in 1910, and held this seat for 12 years. After the outbreak of the 1914-18 war he joined the Intelligence Corps in France and was awarded the D.S.O. in 1915. He was recalled to London in 1916 to become a parliamentary member of the air board until the close of the war. He then became parliamentary secretary to the home office and, having been elected for Ayr Burghs in 1922, became minister of transport and commissioner of works until 1924. He showed himself to be an excellent minister. In 1925 he was appointed governor-general of Australia and was thoroughly efficient and conscientious in his office, his travels extending to the mandated territory in New Guinea. In the closing years of his term, Australia was involved in a serious depression, and after his departure in September 1930, Lord Stonehaven took every opportunity to express confidence in the financial credit of Australia. The Conservative party had been defeated in 1929 and he became its chairman after his return. When the Nazi party arose in Germany he strongly opposed the policy of appeasement. "You will never buy Hitler off," he said in one of his speeches. When war broke out he supervised the arrangements for tracing missing men and the wounded in base hospitals in France. He died in Scotland after a short illness on 20 August 1941. He married in 1905, Lady Ethel Keith-Falconer, daughter of the Earl of Kintore, who survived him with two sons and three daughters. He had succeeded his father as second baronet in 1920, was created Baron Stonehaven in 1925, and Viscount Stonehaven in 1938. BAKER, SIR RICHARD CHAFFEY (1842-1911), federalist, first president of the senate, was born at North Adelaide on 22 June 1842. His father, John Baker, was born in Somerset, England, in 1813 emigrated to Tasmania, and married Miss Isabella Allan. In 1838 he visited the new settlement at Adelaide and in the following year took up land in South Australia and became a successful pastoralist. He was a member of the legislative council from 1851 to 1856 and after responsible government was established in 1857 he was a member of the new legislative council until his death on 18 May 1872. He was premier and chief secretary in the second South Australian ministry which, however, lasted only from 21 August to 1 September 1857. His son, Richard Chaffey Baker, was educated at Eton and Cambridge, where he graduated B.A. in 1864 and M.A. in 1870. He was called to the bar in June 1864 and returned to Adelaide in the same year, There he practised successfully as a barrister and in 1868, at the age of 26, was returned to the assembly at the head of the poll for Barossa. On 30 May 1870 he entered the third Hart (q.v.) ministry as attorney general, but resigned in July 1871 so that he could take over the management of the affairs of his father who had become ill. Two years later he visited England and on his return, early in 1875, Sir Arthur Blyth (q.v.) offered him a position in his cabinet which was declined. He stood for Barossa in that year and was defeated, but in 1877 he was elected to the legislative council and held his seat until federation. In June 1884 he joined the Colton (q.v.) ministry and was minister of education for 12 months. He was elected president of the legislative council in 1893 and for the following seven years worthily carried out his duties. Baker had given much study to the federation question and prepared A Manual of Reference to Authorities for the Use of the Members of the Sydney Constitutional Convention, which was published early in 1891 and must have been extremely useful to the delegates to the 1891 convention. It influenced to some extent the first draft of the constitution which was then drawn up. He was elected a representative of South Australia at the 1897 convention and was a member of the constitutional committee and chairman of committees. He was elected a senator for South Australia at the 1901 election and, when parliament met, was elected first president of the senate. He was re-elected in 1904 and retired from politics in 1906. He died on 18 March 1911. He married Miss K. E. Colley who predeceased him and was survived by two sons and a daughter. He was created C.M.G. in 1886 and K.C.M.G. in 1895. Baker was an oarsman in his youth and was always much interested in cricket and racing; he was for many years chairman of the jockey Club at Morphetville. He had large pastoral interests and helped to develop copper mining. In politics, as president of the legislative council of South Australia and president of the federal senate, he refused to be a party man and carried out his duties with ability, justice and decision. P. Mennell, The Dictionary of Australasian Biography; The Register, Adelaide, 20 May 1872, 20 March 1911. BAKER, RICHARD THOMAS (1854-1941), economic botanist, son of Richard Thomas Baker, was born at Woolwich, England, on 1 December 1854. He arrived in Australia in September 1879 and in June 1880 joined the staff of Newington College, Sydney, as science and art master. In June 1888 he obtained an appointment at the Sydney technological museum, and in 1901 succeeded J. H. Maiden (q.v.) as curator and economic botanist. In the following year he published an important work, A Research on the Eucalypts especially in regard to their essential Oils, prepared in collaboration with H. G. Smith (q.v.), second and enlarged edition, 1920. In 1908 Baker published a small work Building and Ornamental Stones of New South Wales, and in 1910, again in collaboration with H. G. Smith, another valuable piece of research, The Pines of Australia, was completed and published. In 1913 Cabinet Timbers of Australia appeared, and in 1915 two more books Building and Ornamental Stones of Australia, and Australian Flora in Applied Art. An important work, The Hardwoods of Australia and their Economics, was published with many illustrations in 1919. Baker retired from the technological museum on 30 June 1921 and in 1924 with H. G. Smith brought out Woodfibres of Some Australian Timbers. Baker was lecturer on forestry at the university of Sydney between 1913 and 1925, was a member of the Royal and Linnean Societies of New South Wales, and published over 100 papers in their journals. He was a member of the council of the Linnean Society from 1897 to 1922. He was awarded the von Mueller medal by the Australian and New Zealand Association for the Advancement of Science in 1921, and the Clarke medal of the Royal Society of New South Wales in 1922. He died on 14 July 1941. His work on the native timbers was of remarkable value. BAKER, SHIRLEY WALDEMAR (1835-1903), missionary and premier of Tonga, was born in England in 1835 of a good Devonshire family. He studied medicine, went to Australia as a young man, decided to become a missionary, and in 1860 or somewhat later was sent to Tonga by the Australian Wesleyan conference. He became head of the mission, and much in the councils of King George of Tonga, who made him his prime minister. A disagreement arose with the Wesleyan authorities at Sydney in 1879, and Baker founded an independent body under the title of the "Free Church of Tonga". Some of the natives, however, were loyal to their original church and much strong feeling was aroused, which culminated in 1887 with an attempt to shoot Baker. He escaped unhurt but his son and daughter were both wounded. Four people were executed for this crime, and many were deported to other islands. In 1888 the Rev. George Brown (q.v.) visited Tonga to inquire into the position and to endeavour to heal the breach between the two churches. He did not succeed and his reports show that Baker was using his power to the disadvantage of those who were not adherents of the Free Church. In 1890 Sir John Thurston visited Tonga and deported Baker at short notice to Auckland, where he lived for some years. He paid a short visit to Tonga in 1897, settled there again in 1900, and died there in November 1903. Baker was a man of personality and ability who for a period did good work in Tonga, but it is not easy to ascertain the truth about the happenings after the troubles began. Baker's side of the case may be found in Mennell's Dictionary of Australasian Biography, published in 1892. An opposing view is in Basil Thomson's The Diversions of a Prime Minister, pp. 3 to 25. It would probably not be wise to accept either exactly at its face value. R. L. Stevenson who called Baker "the defamed and much accused man of Tonga" found him "highly interesting to speak to" (Vailima Letters, p. 41). Probably the most trustworthy account of the position before Baker's deportation will be found in the Reports of the Rev. George Brown. These are the work of an honest and just man and it would appear from them that there was a good case for Baker's deportation. P. Mennell, The Dictionary of Australasian Biography; The Times, 30 December 1903 and 2 January 1904; G. Brown, Reports, 1890; B. Thomson, The Diversions of a Prime Minister; Blackwood's Edinburgh Magazine, February 1904. The information in the earlier Times article, in Thomson's book, and in Blackwood, appear to have a common source, and some of the statements should he accepted with caution. BALL, PERCIVAL (1844-1900), sculptor, was born in 1844. He studied at the Royal Academy schools and between 1865 and 1882 exhibited 24 works at Royal Academy exhibitions. He came to Australia in 1886 and completed the statue of Sir Redmond Barry (q.v.) which now stands in front of the public library at Melbourne. The original sculptor, James Gilbert, had died after modelling the statue in clay. Ball was given other commissions, including the statue of Sir William Wallace at Ballarat, Francis Ormond (q.v.) at Melbourne, and some portrait busts, now in the national gallery at Melbourne. In 1898 he was commissioned by the trustees of the national gallery at Sydney to design a panel for the facade of the building. He completed his design "Phryne before Praxiteles" and then left for England to superintend the casting. He died there in 1900. W. Moore, The Story of Australian Art, vol. 11, p. 83; A. Graves, The Royal Academy Exhibitors; Catalogue, National Art Gallery of New South Wales, 1928; E. La T. Armstrong, The Book of the Public Library, Museums, and National Gallery of Victoria, 1856-ig06. BANCROFT, JOSEPH (1836-1894), scientist, was born at Manchester in 1836. He studied medicine and took his medical degree at St Andrews university in 1859 and later became a member of the Royal College of Surgeons. He practised at Nottingham until 1864, but finding the English climate too severe, emigrated to Queensland and arrived in Brisbane in that year. After a short holiday he began to practise in a residential quarter of Brisbane, and soon became esteemed as a physician and surgeon. In 1867 he was appointed resident surgeon at the Brisbane General Hospital and held this position for three years. He resumed practice in 1870, found himself in much demand, but contrived to do a good deal of research. He was the discoverer of the medical properties of Duboisia myoporoides, which was afterwards largely used in ophthalmic surgery. In 1872 he investigated the properties of pituri, another of the Duboisias, and discovered its nicotine contents. In 1877 he visited the East, Europe and Africa, ostensibly on holiday, but he could not refrain from studying diseases peculiar to each country. After his return Bancroft carried on a large practice and, in addition to his scientific research on medical problems, developed his interest in economic botany. He made many experiments in his endeavours to obtain a rust-proof wheat, showed great interest in viticulture and oyster culture, studied the diseases of the banana and sugar cane, and invented a preparation of pemmican or desiccated beef. The medical properties of numerous native plants were investigated; he prepared a pamphlet, Contribution to Pharmacy from Queensland, for the colonial and Indian exhibition held in London in 1886, and just before his death he was one of a sub-committee appointed by the Medical Society of Queensland to assist in the revision of the British Pharmacopoeia He made important researches in leprosy and became well known through his studies in filaria disease; he was the first to discover the mature parasite Filaria bancrofti. Of a kindly and genial disposition Bancroft was a leading scientist of his period in Queensland. He was at various times vice-president of the Australasian Association for the Advancement of Science, president of the Queensland Medical Board, of the Royal Society of Queensland, and the Medical Society of Queensland. He died suddenly at Brisbane on 16 June 1894 and was survived by his wife, a daughter, and a son, Dr Thomas L. Bancroft (1860-1933), who also did valuable scientific work. The Brisbane Courier, 18 June 1894; The British Medical Journal, August 1894; F. M. Burnet, The Medical Journal of Australia, 22 August 1942; Proceedings of the Linnean Society of New South Wales, vol. LXVIII, p. V. BANFIELD, EDMUND JAMES (1852-1923), was born at Liverpool, England, on 4 September 1852. He was brought to Australia by his father, who became proprietor of a newspaper at Ararat, Victoria. On this paper Banfield received his first training in journalism. He had experience with newspapers in Melbourne and Sydney, and in 1882 went to Townsville, Queensland, where he became sub-editor of the Townsville Bulletin. In 1884 he visited England, the voyage providing the material for a pamphlet, The Torres Strait Route from Queensland to England. In England he met his future wife and they were married at Townsville in 1886. Banfield remained on the staff of the Townsville Bulletin until 1897. He was a man full of nervous energy, and 15 years of hard work led to a breakdown in health. He obtained a lease of a large portion of Dunk Island off the coast of North Queensland and settled down with his wife to more than 25 years of a comparatively solitary life. A house was constructed, fruit-trees and vegetables were planted, he had goats and cattle which provided milk, butter and occasionally meat, and there were limitless fish in the surrounding seas. Most important of all were the immense possibilities of the nature study which made up so much of the charm of his books. In 1901 Banfield took the place, for nine months, of a former colleague at Townsville who was travelling abroad. Except for occasional short holidays in Australia, he spent the rest of his days on the island. In 1907 he wrote a tourists' guide for the Queensland government, Within the Barrier, and in 1908 appeared his Confessions of a Beachcomber which immediately gave him a place of his own among Australian writers. This was followed by My Tropic Isle in 1911, and Tropic Days in 1918. His Last Leaves from Dunk Island was published posthumously in 1925. The title of Banfield's first serious book was misleading; he was no mere picker-up of unconsidered trifles. Its suggestion came from the fact that the breaking up of a wreck on the coast many miles away resulted in much debris from the vessel drifting in to the island. He worked hard on his plantation, and in its early days he found that work on a tropic island had its own difficulties. Once these were overcome he could get enough leisure to study the vegetable, bird and sea life of the island, and, before they were taken away and placed on a reservation, the aborigines. Visitors came too and were made welcome by Banfield and his wife. Banfield found health again for many years on his "Isle of Dreams--this unkempt, unrestrained garden where the centuries gaze upon perpetual summer". He became ill towards the end of May 1923 and died on 2 June. His wife survived him, but there were no children. Banfield had the essential sanity that made such a life possible. He was kindly, humorous, industrious, mercurial in temperament, rapid in speech. Though not a scientist he was an excellent observer. He loved nature and had a hatred of the taking of wild life, and it is these qualities that give his books their more than transient value. A. H. Chisholm, Introduction, Last Leaves from Dunk Island; May Guthrie in The Argus, Melbourne (early in 1935); The Queenslander, 16 June 1923. BANKS, SIR JOSEPH (1744-1820), was born in Argyle-street, London, on 4 January 1743-4. (Parish register quoted in Sir Joseph Banks and the Royal Society, p. 61, 13 February is usually given as the date of his birth.) He was the son of William Banks, a prosperous country squire and member of the house of commons, and his wife Sarah, daughter of William Bate. Banks was sent first to Harrow and then to Eton, but was not distinguished as a scholar, though he early developed a taste for botany and natural history. Proceeding to Oxford he again showed little disposition to study except in his favourite subjects. He left Oxford in December 1763, and inherited a large estate from his father who had died in 1761. He kept up his interest in science and began to make friends among the scientific men of his day. In 1766 he was elected to the Royal Society, and in the same year made a trip to Newfoundland and Labrador with a view of studying their natural history. In August 1768 he sailed with James Cook (q.v.) on the Endeavour and was away nearly three years. The first object of the expedition was to observe the transit of Venus, but the Endeavour also sailed round the world touching at many places, including New Zealand 8 October 1769, and Australia 28 April 1770. This was the beginning of Banks's interest in Australia; he was to do much for it in later years. He arrived back in England on 12 July 1771 and immediately became famous. He intended to go with Cook on his second voyage which began on 13 May 1772, but difficulties arose about the accommodation for Banks and his assistants, and he decided not to go. In July of the same year he visited Iceland and returned with many botanical specimens. He kept in touch with most of the scientists of his time, and added a fresh interest when elected to the Dilettante Society in 1774. He was afterwards secretary of this society from 1778 to 1797. On 30 November 1778 he was elected president of the Royal Society, a position he was to hold with great distinction for over 41 years. He married in March 1779, Dorothea. daughter of W. W. Hugesson, and settled in a large house in Soho-square, which continued to be his London residence for the remainder of his life. There he welcomed the scientists, students and authors of his period, and many distinguished foreign visitors. He had as librarian and curator of his collections, Dr Solander (q.v.), Dr Jonas Dryander, and Robert Brown (q.v.) in succession. In 1781 Banks was made a baronet. Towards the end of 1783 he came into conflict with the secretaries of the Royal Society and a section of the members, who considered that the president was taking too much power to himself. The position really was that Banks was not content to be a mere figure-head, and among other things had come to the conclusion that some members were being admitted to the society without proper qualifications. There were several stormy meetings but on each occasion a large majority of the members supported the president. A new chief secretary, Dr Blagden, who had Banks's support, was elected in May 1784, and after that there was no further trouble. Banks's right to the title "the father of Australia" has been questioned with some ability by Captain .1. H. Watson who holds that James Mario Matra (q.v.) really deserved it (see Jnl. and Proc. R.A.H.S., vol. 10, p. 152). Matra's proposal was made in 1783, but four years earlier Banks, giving evidence before a committee of the house of commons, had stated that in his opinion the place most eligible for the reception of convicts "was Botany Bay, on the coast of New Holland". His interest did not stop there, for when the settlement was made, and for 20 years afterwards, his fostering care and influence was always being exercised. He was in fact the general adviser to the government on all Australian matters. He arranged that a large number of useful trees and plants should be sent out in the supply ship Guardian which, however, was unfortunately wrecked, and every vessel that came from New South Wales brought plants or animals or geological and other specimens to Banks. He was continually called on for help in developing the agriculture and trade of the colony, and his influence was used in connexion with the sending out of early free settlers one of whom, a young gardener George Suttor (q.v.), afterwards wrote a memoir of Banks. The three early governors, Phillip (q.v.), Hunter (q.v.), and King (q.v.), were continually in correspondence with him, and his influence was frequently used to clear up difficulties or to bring some good to the colony. He was interested in the explorations of Flinders (q.v.), Bass (q.v.), and Lieutenant Grant (q.v.), and among his paid helpers were George Caley (q.v.), Robert Brown (q.v.), and Allan Cunningham (q.v.). Something may be suggested of the important position of Banks in the community by the fact that it was he who wrote to Bligh (q.v.) offering him the position of governor of New South Wales. He had been the patron who had obtained for Bligh the command of the Bounty, and the unfortunate termination of its voyage had not injured Banks's belief in his protégé. He believed in discipline, and the letters he had received from Hunter and King had convinced him that a strong man would be required to deal with the evils of the spirit traffic in the young colony. Banks supported Bligh in his differences with Captain Short on the voyage out, and was in constant correspondence with him. After his deposition he did all he could to allay the anxieties of Mrs Bligh who had immediately turned to him for help. During the court-martial of Johnston (q v.) he was in constant touch with Bligh, and was a true friend to him during that trying time. Banks's health began to fail early in the nineteenth century and he suffered much from gout every winter. After 1805 he practically lost the use of his legs, and had to be wheeled to his meetings in a chair. His mind remained as vigorous as ever. He had been a member of the Society of Antiquaries nearly all his life, and he developed very much his interest in archaeology in his later years. Kew Gardens had always been a special interest, and his collectors had contributed much to its development. Generally he had done most valuable work for both horticulture and agriculture. In May 1820 he forwarded his resignation as president of the Royal Society but withdrew it at the request of the council. On 19 June he died. Lady Banks survived him but there were no children. Banks was a tall, well proportioned man, courtly in manner, yet unaffected and kindly in his relations with everyone. He had a large income and was able to employ able helpers to collect for him and look after his collections. He published little himself. A pamphlet on The Propriety of allowing a Qualified Exportation of Wool appeared in 1782 and another, A Short Account of the cause of the Disease in Corn, called by farmers the blight, the mildew and the rust, in 1805. A shortened version of the journal kept by Banks during Cook's first voyage was edited by Sir Joseph D. Hooker and published in 1896. The original journal, with a large mass of Banks's papers and correspondence, are now in the Mitchell library, Sydney. His portrait was painted several times by the leading artists of his period, including West, Reynolds, Dance, Lawrence and Phillips. Banks's influence in the early days of Australia has already been suggested, and his advice was always wise and disinterested. He has been criticized on the ground that he used his influence against John Macarthur (q.v.) when he was doing so much to develop the wool industry in Australia. It should, however, be remembered that Banks knew the whole story of Macarthur's relations with the various governors, and he may well be forgiven if he showed some mistrust of him. Apart from Australia, Banks had a great position in scientific circles, and the extent and value of his labours can hardly be overstated. Edward Smith, The Life of Sir Joseph Banks; G. Mackaness, Sir Joseph. Banks, His Relations with Australia; J. H. Maiden, Sir Joseph Banks the "Father of Australia"; Sir Joseph Banks and the Royal Society, London, 1844; Sir J. D. Hooper, Journal of the Right Hon. Sir Joseph Banks; Historical Records of New South Wales, vols. I to VI; G. B. Barton, History of New South Wales from the Records; Introductory Sketch, vol. I. Historical Records of Australia, ser. I, vols. II to IV. BANNERMAN, CHARLES (1851-1930), cricketer, was born at Woolwich, Kent, England, on 3 July 1851. He was taken to Australia in his early youth, became well-known as a cricketer at Sydney, and in March 1877 made history by scoring the first hundred ever made by an Australian against an English eleven. His score was 165 when he retired hurt, the remainder of the team making only 80 runs between them. Australia eventually won the match by 45 runs. He went with the first Australian team to England and was top of the averages in a low-scoring year with 24.2. After his return to Australia he played with moderate success for a few years, one of his last scores of note being 60 not out against an English team captained by Lord Harris. Falling into ill-health he gave up playing first-class cricket, but acted at times as a coach at Sydney, Melbourne, and Christchurch, New Zealand, and was well-known as an efficient umpire. He kept up a keen interest in the game, had a regular seat in the pavilion at Sydney at all first-class matches, and there met all the great cricketers of his time. Everyone who saw Bannerman play agreed that he was a great batsman, a master of strokes, skilful and polished, and though his career was so short he was for many years a legend in Australian cricket. He died suddenly at Sydney on 20 August 1930 leaving a widow, two sons and three daughters. His brother, Alexander Chalmers Bannerman (1857-1924), always known as Alec, was also a good cricketer of quite a different type. He had a long career in first-class cricket as an opening batsman, and was a valuable foil to great hitters like Bonner, McDonnell and Lyons. His patience was inexhaustible, but his slowness did not help the game as a spectacle. It is recorded that in an innings of 91 spread over three days, he scored from only five balls out of 204 bowled to him by one of the bowlers. He was a magnificent field, and in later days a good coach. BANNISTER, SAXE (1790-1877), first attorney-general of New South Wales and miscellaneous writer, son of John Bannister of Steyning, Sussex, was born in 1790, matriculated at Queen's College, Oxford, in December 1808 and graduated B.A. 1813, M.A. 1815 (Alumni Oxonienses 1715-886). Becoming a barrister he was appointed the first attorney-general of New South Wales in March 1823, and he arrived in Sydney in the early part of 1824. He had been given a salary of £600 a year with the right to practise as an advocate, but he became discontented with his position, and in October 1825 was in conflict with Governor Brisbane (q.v.) on the question whether he was bound to draft a bill which seemed to him to be repugnant to the laws of England. He appears to have taken his office and his responsibilities far too seriously, and though Darling (q.v.) spoke of Bannister as "often misled by an injudicious zeal, but indefatigable, conscientious and honourable in the highest degree", he found it extremely difficult to work with him. In September 1826, in a dispatch to under-secretary Hay, Darling described one of Bannister's letters to the governor as "very offensive and insolent". In April 1826 Bannister wrote to Darling to say that he could no longer hold his office at its present remuneration, and in October 1826 he was informed that his resignation had been accepted. This furnished Bannister with a grievance for the rest of his long life. He left for England on 22 October 1826 and afterwards did a large amount of writing; the British Museum Catalogue lists about 30 of his publications. Many are pamphlets but among the longer works are: Statements and Documents relating to Proceedings in New South Wales in 1824, 1825 and 1826 (1827), Humane Policy; or Justice to the Aborigines (1830), (the references to Australian aborigines are few and not important), British Colonization and Coloured Tribes (1838), and William Paterson, the Merchant Statesman (1858). Bannister died at Thornton Heath, England, on 16 September, 1877. BARKER, COLLET (1784-1831), was born in 1784 (Dict.Nat.Biog.). Little is known of his early life, but he entered the army as an ensign in the 39th regiment of foot on 23 January 1806, became a lieutenant in May 1809, and captain in June 1825. He was at Sydney in 1828 and was sent to Raffles Bay in northern Australia, where he arrived on 13 September and took command. He established friendly relations with the aborigines, and showed great courage in trusting himself with them alone. In September 1829 the settlement was abandoned and Barker sailed for the Swan River where he arrived about a month later. After a stay of some days he went on to King George's Sound and took charge of the settlement there from 3 December 1829. When Sturt (q.v.) returned after his exploration of the Murray in 1830 he recommended that the coast at the head of St Vincent's Gulf should be examined to ascertain whether another channel from the Murray entered the sea there. He suggested that Barker would be a suitable man for this work, Governor Darling (q.v.) agreed, and on 13 April 1831 Barker with a small party arrived at Cape Jervis on the ship Isabella. He examined the coast on the eastern side of the gulf for over 60 miles and found that there was no channel. With four companions he made his way to the ranges, ascended Mount Lofty, and definitely fixed its geographical position. He rejoined the remainder of his companions on 21 April, and six days later with a small party left the ship at a point about 12 miles north of Cape Jervis, and went overland to trace the connexion between Lake Alexandrina and Encounter Bay. On 30 April an outlet to the sea was reached, which was comparatively narrow, and Barker swam across, went over a sandhill, and was never seen again. His companions watched from their side of the water until next day and then went back to their ship. A few days later it was learned through friendly aborigines that Barker had been speared and his body thrown into the sea, Sturt considered that he had suffered for the sins of white sealers against the blacks. Barker was held in the highest regard by Sturt and his fellow officers. He had courage and great understanding of aboriginal races. Had he lived he would probably have done valuable work as a pioneer and explorer. There is a monument in his honour at Mount Barker, South Australia, and a tablet to his memory is in St James's church, Sydney. BARKER, FREDERIC (1808-1882), second Anglican bishop of Sydney, son of the Rev. John Barker, was born at Baslow, Derbyshire, England, on 17 March 1808. He was educated at Grantham school and Jesus College, Cambridge, where he graduated B.A. He was ordained in 1832, and placed in charge of the perpetual curacy of Upton, Cheshire. Subsequently he was at St Mary's, Edgehill, an important church at Liverpool, for 19 years. In April 1854 he became vicar of Baslow, but soon afterwards was appointed bishop of Sydney and was consecrated on 30 November 1854. He arrived at Sydney on 25 May 1855, and was installed on 31 May at the temporary cathedral. Two of his early tasks were the completion of the arrangements for the building of Moore College for theological students, and the quickening of interest in the completion of the cathedral. He next began a series of visitations in his diocese, then covering an immense area. He quickly realized it must be subdivided, and two new dioceses were established--Goulburn in 1863, and Bathurst in 1869. As metropolitan of Australia he was also concerned in the establishment of dioceses at Perth (1856), Brisbane (1859), Grafton and Armidale (1866), Ballarat (1875), and North Queensland (1878). He visited England in 1863, succeeded in raising a considerable sum for the prosecution of the work of his church, and gave many addresses on Australia in different parts of England. The first synod of the diocese of Sydney met in December 1866, and dealt with many problems such as the relations of the Church in Australia with the Church in England, and the framing of a constitution for the cathedral. In 1868 the re-opening of The King's School, Parramatta, was successfully arranged with the Rev. G. F. Macarthur as headmaster. In October 1872 the formation of the general synod of the dioceses of Australia including Tasmania was accomplished. Barker visited England again in 1871 and 1877 and was able to bring the needs of the new dioceses before the Society for Propagating the Gospel and other societies. In 1878 steps were taken to provide more adequate religious instruction to children attending state primary schools, and early in 1880 a "church buildings loan fund" for the diocese of Sydney was established. In December of that year Barker had a stroke of paralysis, and in March 1881 he went on a voyage to Europe hoping that the rest would benefit his health. There was an improvement for some months, but in March 1882 he had a second attack and died at San Remo on 6 April 1882. He married (1) in 1840, Jane Sophia, daughter of John Harden and (2) in 1878, Mary Jane, daughter of Edward Woods. He had no children. Barker was six feet five in height, dignified and scholarly in appearance. He was strongly evangelical and his teaching was based simply on the Bible. He had much quiet tenacity of purpose, and during his episcopacy of 27 years the number of churches and the number of clergy more than doubled. He published in 1851 Thirty-six Psalms with Commentary and Prayer, and in 1859 A Charge Delivered to the Clergy of the Diocese of Sydney. He was also one of the contributors to The Supposed Sacrament of Penance. A Course of Sermons (1838); and On the Rise of the Errors of the Church of Rome, A Course of Sermons (1840). W. A. Cowper, Episcopate of the Right Reverend Frederic Barker, D.D.; Two Sermons Preached at Baslow; P. Mennell, The Dictionary of Australasian Biography; J. H. Heaton, Australian Dictionary of Dates; British Museum Catalogue. BARNES, GUSTAVE (1878-1921), artist, was born in England in 1878 and was brought to Adelaide while a child by his father, who established a modelling business. On leaving school Barnes had some training in modelling, but he was also a musician, and at 21 years of age went to Europe to continue his study of the violin. He obtained employment at the Doulton pottery works as a designer, painter and modeller, and during his evenings studied at South Kensington. After being away 10 years his father died and Barnes returned to Adelaide to carry on the business. He did a good deal of landscape painting, and was much interested in black and white work. In 1915 he was employed to classify and catalogue prints and drawings at the art gallery of South Australia and shortly afterwards was made curator of the gallery. He proved himself to be conscientious and able, and his early death on 14 March 1921 was much regretted. He married while in England and his wife survived him with two children. A modest, versatile man, he was a good musician, and as an artist worked in modelling, etching, and painting in both water-colour and oil. He is represented by three pictures in the Adelaide gallery. He took up painting at a comparatively late age, and some of his work suggests that had he lived longer he might have reached a higher position in Australian art than is usually given him. The Register, Adelaide, 15 March 1921; The Advertiser, Adelaide, 15 March 1921; W. Moore, The Story of Australian Art; Art of the British Empire Overseas, (The Studio), p. 40. BARNES, JOHN (1868-1938), politician, was born at Hamilton, South Australia, in 1868. He was educated at a primary school, and subsequently worked as a farm labourer, shearer, miner and general bush worker. In his swag he carried copies of works by Henry George, Robert Blatchford and other writers on economic and social questions and he thus became largely self-educated. He was an early member of the Shearers' Union, afterwards the Australian Workers' Union, became general secretary in 1908 and afterwards president. He was secretary of the Victoria-Riverina branch for a period, and held that position when he was elected a federal senator for Victoria in 1913. He was defeated at the general election held in 1919 but was again elected in 1922 and in 1928. He was assistant minister for works and railways from 22 October 1929 to 3 March 1931 and then vice-president of the executive council and leader of the government in the senate until 6 January, 1932. He was then leader of the opposition in the senate until 30 June 1935. Though he held his seat until this date he had been defeated at the general election held in 1934. He was re-elected to the senate in 1937 but died at Melbourne on 31 January 1938. He married and left a widow, one son and five daughters. Barnes was a man of strong personality who never entirely lost his boyishness; he was the most notorious practical joker in federal politics. But his strong sense of humour, which helped to prevent him being an extremist, went hand in hand with complete earnestness and belief in the cause of Labour. He could fight hard and speak bluntly, but there was no malice in his bluntness, and he was probably the most loved man in the house. He was a leading spirit in union circles for many years before he entered politics, and his political sagacity, complete honesty, and unswerving loyalty made him a power in the Labour party for the last 25 years of his life. BARNEY, GEORGE (1792-1862), engineer, lieutenant-governor of Gladstone colony, was born in London on 19 May 1792 and entered the army at 16. He served in the Peninsular war and for many years in the West Indies. He was a captain in the royal engineers when Governor Bourke (q.v.), in July 1834, asked that a civil engineer should be sent to Sydney to take charge of the construction of a large circular wharf and other public works. Captain Barney was selected in response to this request, and came to Sydney about the beginning of 1836 in command of a branch of the ordinance, with instructions that he was also to take charge of and superintend the buildings belonging to the military, and convict departments. Bourke stated in February 1836 that Barney was engaged in removing obstructions to the navigation of the Parramatta River, and asked that leave might be granted him to undertake the duty of colonial engineer at a salary of £500 a year and travelling charges. This was granted in September 1837, and in 1838 Barney brought forward a scheme for the sale of the barracks in Sydney, as the land was now valuable, the proceeds to be used for new buildings at Sydney and Newcastle. In 1839 he prepared a report on the defence of the harbours in the colony and made various recommendations. The English authorities, however, declined to consider the question until they had received plans and estimates of the proposed work. Governor Gipps (q.v.) supported Barney and with the aid of convict labour the preparing of the ground for the guns was begun in 1840. In January 1843 Gipps spoke very highly of Barney, but stated he had so many other duties it was scarcely possible for him to give the required attention to his colonial appointment. Barney returned to England in 1844 and in May 1846, now a lieutenant-colonel, was appointed "lieutenant-governor of North Australia". In 1822 J T Bigge (q.v.) had recommended the establishment of a convict settlement at Port Curtis on the east coast of Queensland. The project had been more than once revived, and as some difficulty was being experienced in finding work for time-expired convicts in Tasmania, it was now decided to try the experiment of sending them to a new area and giving them land and a certain amount of government help. Lord Stanley and W. E. Gladstone, successive secretaries of state for the colonies, had fathered the project, and Gladstone had selected Barney as a man used to authority and with previous Australian experience. He arrived in Sydney on 15 September 1846, quickly surveyed the coast in a small steamer, and decided that Port Curtis was the most suitable place for a settlement. Returning to Sydney a barque, the Lord Auckland, was chartered, and on 8 January 1847 sailed with Barney and his family, various officials, and a small military force. The party arrived at an unfavourable period and there was much discomfort from the extreme heat. In the meantime there had been a change of ministries in England, Earl Grey had succeeded Gladstone, and had promptly vetoed the whole project. News of this reached Barney on 15 April 1847 and the party returned to Sydney. Barney was criticized in some quarters, but the Gladstone colony was never given a chance to succeed. In later years the thriving town of Gladstone was established on the site, and the harbour is one of the finest in Australia. Barney was afterwards appointed successively chief commissioner of crown lands, and surveyor-general of New South Wales. He died at Sydney on 16 April 1862. BARRALLIER, FRANCIS (1773-1853), he is sometimes given the second name of Louis or Luis, was born in the year 1773. His father, who was a French emigré, was a surveyor in the British navy. Barrallier came to Australia in April 1800 was appointed an ensign in the New South Wales Corps in July 1800, and was made engineer and artillery officer in August 1801. In the previous March he had sailed with Lieutenant James Grant (q.v.) in the Lady Nelson to further explore Bass Strait, and had been responsible for the charting of Western Port and other parts of the coast, before a return was made to Sydney, which was reached on 14 May 1801. In June a voyage with Grant was made to the Hunter River, where a survey was made by Barrallier of Coal Harbour and part of the river. In November 1802 he was directed by Governor King (q.v.) to endeavour to find a way over the mountains to the west of Sydney. He did not succeed in crossing the range, but travelled a distance of 147 miles into the mountains beyond the Nepean. His finishing point was "towards the head of Christy's Creek, about 15 or 16 miles in a direct line southerly from Jenolan Caves". (See Barrallier's Journal, Appendix A, H.R. of N.S.W., vol. V, and a careful analysis of it by R. H. Cambage, p. 11, vol. III, Jnl. and Proc., R.A.H.S.). Barrallier arrived in Sydney again on 24 December 1802. In the following May he resigned from the New South Wales Corps and left for England. In 1805 he was appointed a lieutenant in the 90th regiment, in 1806 was at St Vincent, and in 1809 was present at the capture of the Island of Martinique. He was made a captain in 1812, spent some years making a military survey of the Island of Barbadoes, was present at the capture of Guadaloupe in 1814, and was appointed surveyor-general of the island. He returned to England in 1818, in 1819 was a captain in the 33rd regiment, and in 1832 in the 73rd regiment. He became brevet-major in 1840, brevet lieutenant-colonel in 1846, and died in London on 11 June 1853. He was a man of pleasant personality, an able engineer, and a brave and competent explorer. During his journey in the mountains he managed his small party well, was on good terms with the aborigines, and had he kept to the ridges might have succeeded in his mission. BARRINGTON, GEORGE (1755-1804), whose real name was Waldron, pickpocket, was born near Dublin in October 1755. His father, Henry Waldron, was a silversmith, his mother's name was Naish or Naith. The various early memoirs of Barrington were all catchpenny books in which accuracy was not a consideration, and none of Barrington's statements about himself may be accepted without suspicion. All that can be said with certainty of his early life is that he obtained a certain amount of education, and while still a youth began a career of pocket-picking. He dressed well and got into good society, and when brought before the court had so plausible and ready a tongue that he usually succeeded in evading punishment. In January 1777 he was sentenced to three years' hard labour at the Woolwich hulks, but was released in 1778 after serving about a year of his sentence. This experience did not act as a deterrent, as he was in trouble several times during the next 10 years, yet on nearly every occasion he was either discharged or escaped comparatively lightly. In September 1790 he was accused of robbing a man of his watch, found guilty, and sentenced to be transported for seven years. Barrington arrived in Sydney in August 1791. There is no evidence for the story of his having prevented a mutiny during the voyage, but he seems to have found favour with the authorities very soon after his arrival. An extract from the journal of George Thompson in May 1792, mentions that "Barrington holds the post of head-constable at Parramatta and is a very diligent officer" (H.R. of N.S.W., vol. II, p. 796). Governor Phillip (q.v.) granted Barrington conditional emancipation in November 1792, and in the Dublin Chronicle of 4 June 1793 it was stated that "Governor Phillip tells many curious stories of His Majesty's subjects in Botany Bay. Barrington is high constable of the settlement and administers justice with an impartial hand". (ibid, p. 809). This, however, suggests that Barrington's position was more important than it really was. Governor Hunter (q.v.) in a letter dated 20 August 1796 said: "He (Barrington) has constantly done the duty of chief constable at Parramatta, and in that office has been indefatigable in keeping the public peace and in guarding private property. It is much to be regretted that a man of this description, because once having offended the laws of his country, should be ever afterwards considered as unworthy of favour." In the following September he was appointed superintendent of convicts. In March 1801 a statement appeared in the government and general orders that Barrington had, from infirmity, resigned his position as head constable and that the governor had directed that half his salary was to be continued to him. Despite this, his name still appeared as chief constable in the list of civil and military officers holding land in November 1802. About this time he became a lunatic and he died on 27 December 1804. Barrington is the reputed author of A Voyage to New South Wales (1795), The History of New South Wales (1802), and other works. There is no evidence to show that they were written by Barrington and he never claimed them. The books relating to Australia were compiled from the works of Phillip, Hunter, Collins and others, and it has been suggested that their author may have been F. G. Waldron, a writer of the period, who was possibly related to Barrington (E. A. Petherick, the Athenaeum, 19 February 1898, and Notes and Queries, 19 November 1898). The famous prologue supposed to have been recited at the opening of a playhouse at Sydney on 16 January 1796 containing the lines: "True patriots all, for be it understood, We left our country for our country's good." was also not written by Barrington. In The History of New South Wales, 1802, it is not even attributed to him, it is simply stated that the lines were spoken. (On the question of the real authorship see the Native Companion, March 1907). It would have been quite in keeping if Barrington had claimed the authorship, for the central idea was probably "conveyed" from another source. In Farquhar's comedy The Beaux' Stratagem Aimwell says: "You have served abroad sir?" Gibbet: "Yes, sir, in the plantations; 'twas my lot to be sent into the worst service. I would have quitted it indeed, but a man of honour, you know----Besides, 'twas for the good of my country that 1 should be abroad." Act III, scene II. R. S. Lambert, The Prince of Pickpockets; Historical Records of New South Wales, vols. II and V; Historical Records of Australia, ser. I, vols. I to V; E. A. Petherick, Athenaeum, 19 February 1898; Notes and Queries, 19 November 1898. A. W. Jose, Journal and Proceedings Royal Australian Historical Society, vol. XIII, pp. 292-4; Times Literary Supplement, 27 November 1930. A remarkable amount of information relating to Barrington is recorded in J. A. Ferguson's Bibliography of Australia, especially on pp. 13 to 17, vol. I. BARROW, JOHN HENRY (1817-1874), journalist and politician, was born in England in 1817. He studied for the Congregational ministry at Hackney College and had his first charge at Market Drayton in Shropshire. He was then transferred to Bradford in Yorkshire where he began writing for the Bradford Observer. He went to Adelaide in 1851 and obtained a position in the office of the South Australian Register. He also did work on the literary side and, when Andrew Garran (q.v.) went to Sydney, succeeded him as principal leader writer. He began preaching at Kensington and the Clayton Chapel was built for him, but though an excellent preacher, Barrow was doubtful whether his real work lay in church life, and he resigned his pastorate in 1858 to enter the house of assembly for East Torrens. In the same year he left the Register to become editor and manager of the newly established South Australian Advertiser whose first issue appeared on 12 July. The first number of the Chronicle came out a few days later, and in 1863 the Express was started as an evening paper. Though these papers were conducted with ability, the controlling company did not prosper, and it was wound up in 1864. The papers passed into the hands of a proprietary of eight persons of whom Barrow was one, and in 1871 Barrow and Thomas King became the sole proprietors. Barrow was editor of the Advertiser until he fell into ill-health a few months before his death. To most people the editing of a newspaper is a sufficiently exacting piece of work, but Barrow was a man of tireless energy and contrived also to carry out the duties of a member of parliament (during nearly the whole of this period. He did not seek re-election for the assembly in 1860 but in 1861 became a member of the legislative council. In 1870 he was one of the South Australian delegates to the intercolonial conference held at Melbourne, in 1871 he resigned from the council, and in 1872 became member for Sturt in the house of assembly. He joined the seventh Ayers (q.v.) ministry as treasurer in March of that year and held the position until Ayers resigned in July 1873. About this time Barrow's health completely broke down, and though he went to the intercolonial conference at Sydney as one of the South Australian delegates in the hope that change of scene might lead to its improvement, it continued to deteriorate, and he died at Adelaide on 22 August 1874. He was married twice and left a widow, three sons and three daughters. Barrow had a great reputation in his time as a speaker and journalist. It was said of him that he had exuberant fancy, genial humour, a great gift for getting the essentials of any problem, a faculty for understanding and interpreting public feeling, and a wonderful command of plain and effective language. He was not a party man and was only once in office, but though he originated little in parliament, as editor and politician he exercised a personal influence and had much political power. The South Australian Advertiser, 24 August 1874; The South Australian Register, 24 August 1874; John H. Barrow, M.P., Notices of his Life, Labours and Death. BARRY, ALFRED (1826-1910), Anglican bishop of Sydney, second son of Sir Charles Barry, architect of the houses of parliament, London, was born at London on 15 January 1826. Educated at King's College, London, and Trinity College, Cambridge, he had a distinguished academic career, being fourth wrangler and seventh classic. He was ordained deacon in 1850 and priest in 1853, and was successively headmaster of Leeds Grammar School, principal of Cheltenham College, and principal of King's College, London. He was a canon of Worcester from 1871 and of Westminster Abbey from 1881. In 1883 he was appointed third bishop of Sydney and was consecrated on 1 January 1884. He was bishop of Sydney for just over five years but much of his time was spent in England. Resigning early in 1889 he returned to England and was assistant bishop at Rochester for two years, was made a canon of Windsor in 1891, was Bampton lecturer in 1892, and Hulsean lecturer at Cambridge in 1895. He was rector of St James, Westminster, from 1895 to 1900, and assistant bishop' at London from 1896 to 1900, He died at Windsor on 1 April 1910. He married in 1851, Louisa, daughter of Canon T. S. Hughes, who survived him with two sons. Barry was a man of fine intellect, shrewd, sagacious, a hard worker, and an excellent preacher. Yet his episcopate at Sydney was not a success, partly because in spite of his many gifts, he suffered from a reserved manner and a want of personal magnetism. He was a voluminous writer, the British Museum Catalogue lists about 60 books and pamphlets. These are largely lectures and sermons, and include First Words in Australia, a collection of sermons preached in April and May 1884 and published at Sydney in the same year. His most popular book was The Teacher's Prayer-Book; being the Book of Common Prayer with Introduction and Notes. This ran into many editions. His Life and Works of Sir Charles Barry was published in 1867. BARRY, JOHN ARTHUR (1850-1911), journalist and storywriter, was born at Torquay, Devonshire, England, in 1850. His parents died when he was a child, and going to sea at 13 he was in the merchant service for 12 years. Leaving with a first mate's certificate he came to Australia in the 1870s, and after working on Queensland, spent some years as a drover, boundary rider and station manager. He began writing for the press and contributed stories to the Australasian, Sydney Mail, Queenslander, the Town and Country Journal, the Pall Mall Gazette, and others. In 1893 he spent a holiday in England and published a collection of his stories, Steve Brown's Bunyip and other Stories. He had become acquainted with Rudyard Kipling who wrote an introductory poem for the volume. Barry returned to Australia and about 1896 joined the staff of the Sydney Evening News, and in the same year another collection of his stories was published, In the Great Deep: Tales of the Sea. This was followed by two novels, The Luck of the Native Born (1898), and A Son of the Sea (1899). Three collections of short stories followed, Against the Tides of Fate (1899), Red Lion and Blue Star (1902), and Sea Yarns (1910). South Sea Shipmates, a sea story, was published posthumously in 1914. Barry died at Sydney on 23 September 1911. He was a man of lovable character who had had an adventurous life, and much of his work is based on his own experiences. His novels are readable, if somewhat conventional, and his short stories, some of which appeared in leading popular magazines in England, are usually thoroughly competent pieces of direct writing. BARRY, SIR REDMOND (1813-1880), judge, first chancellor of the university of Melbourne, first president of the trustees of the public library of Victoria, was the third son of Major-general Henry Green Barry and his wife Phoebe, daughter of John Armstrong Drought. He was born at Ballyclough near Glenworth, County Cork, Ireland, in June 1813. At first intended for the army he went to school in England but returned to Ireland to take up the study of law. He graduated B.A. at Trinity College, Dublin, in 1837 and was called to the Irish bar in 1838. He decided to go to Sydney but stayed only a few weeks and in November 1839 went to Melbourne, then only a very small settlement. He soon had a good practice and, a few months after the establishment of a court of requests in 1842, was made commissioner, at a salary of £100 a year. He showed his interest in the cultural life of the community by allowing people interested in literature to use the library at his house in Bourke-street, and he was also one of the founders and the first president of the Mechanics' Institute, afterwards the Athenaeum Library' He was one of the early founders of the Melbourne Hospital and joined in the agitation for the separation of the Port Phillip district from New South Wales. He was appointed solicitor-general in 1851, and in January 1852 became a judge of the supreme court. He had thus reached a distinguished position at the early age of 38, but his most valuable work was yet to come. It is always difficult to ascertain who began any particular movement and Barry did so much for both the university of Melbourne and the public library of Victoria, that there has been a tendency to think of him as the founder of both of these institutions. In the case of the university the position is quite clear. H. C. E. Childers (q.v.) was undoubtedly the founder, but directly the university bill became law, Lieutenant-governor La Trobe (q.v.) invited Barry to become the first chancellor pro tem, and on 17 May 1853 he was elected to this position by the council of the university and held it until his death. He took the greatest interest in it. The council meetings were generally held at the Judges Chambers where he presided over the deliberations with suave masterfulness. He realized from the beginning that the whole plan of the institution, and especially the buildings and curriculum, must be adequate for present conditions and yet capable of future expansion. The university owed much to his fostering care and when he died there was great difficulty in finding a worthy successor. His work for the public library was if possible even more important and more personal. When the date of opening the library had been fixed the first consignment of books from England had not arrived, and when they did come there was barely three days in which to unpack and arrange them. Barry took off his coat and helped in the good work and kept his assistants toiling until midnight. He visited the library almost daily, drafted the correspondence, and took part in making up the lists of books to be bought. The library became his special hobby; other trustees might neglect their duties and be absent from meetings but he was never absent, and he carried out the necessary business whether a quorum were present or not. His interest was extended to the national gallery and museums which gradually developed from the original institution, and during his visits to Europe and America he lost no opportunity of furthering their welfare. All this was done while he was conscientiously carrying out his duties as a judge of the supreme court. On occasions he was acting chief justice, and in the winter of 1876 he administered the government of Victoria during the absence of the governor and the chief justice. He was created a K.C.M.G. in 1877. He died at Melbourne after a short illness on 23 November 1880. He had never married. His statue stands in front of the public library at Melbourne. Barry was a man of imposing presence. Though not a great lawyer, he was a sound, patient and courteous judge. He was kindly and charitable, very much the gentleman of the old school, and though no doubt vain and a little pompous, no other Melbourne man of his time did so much for education, literature and art. E. La T. Armstrong, The Book of the Public Library; Sir Ernest Scott, A History of the University of Melbourne; The Argus, Melbourne, 24 November 1880; The Age, Melbourne, 24 November 1880; Alumni Dublinienses, 1924. BARTON, SIR EDMUND (1849-1920), federalist and first prime minister of Australia, son of William Barton, a share broker and estate agent, was born at Sydney on 18 January 1849. He was educated at Sydney Grammar School and at the university of Sydney, where he graduated B.A. with honours in classics in 1868, and M.A. in 1870. He was Lithgow scholar in 1866, Cooper scholar in 1867, and medallist for classics in 1868. On leaving the university he was articled to Burton Bradley, a solicitor, and he also read with G. E. Davis, a well-known barrister of the period. He was called to the bar in 1871, was successful as a barrister, and might indeed have become the leading advocate of his time. He, however, became attracted by politics and in 1877 was a candidate for the university seat in the legislative assembly. He lost the election by a few votes, but two years later was successful, and held the seat until the university was disfranchised in 1880. He was elected unopposed for Wellington in that year and became a representative of East Sydney from 1882 to 1887. He was elected speaker in January 1883 and held this position until early in 1887, showing great ability in carrying out his duties. He lost his seat in 1887 and was nominated to the legislative council. In January 1889 he joined the Dibbs (q.v.) cabinet as attorney-general but the ministry lasted for only about seven weeks. Barton was taking much interest in federation and in 1890 was on the editorial committee of the Australian Federalist, a periodical for the discussion of federal problems. It did not appear until January 1891 and then ran for only two numbers. Barton was one of the representatives of New South Wales at the convention which met at Sydney in March 1891 and was a member of the constitutional committee. This committee framed the first draft of a bill to constitute the Commonwealth of Australia. The final stages of this drafting were completed by a sub-committee consisting of Griffith (q.v.), Kingston (q.v.), Inglis Clark (q.v.) and Barton. With a few verbal and minor alterations the bill was accepted by the convention and became the ground work of the constitution eventually adopted. Two great difficulties were in the path to federation, the reconciling of the rights of the large and the small states, and the conflict between protection and freetrade. Barton entered the legislative assembly again in 1891 as a member for East Sydney, and when in October Parkes was defeated the old leader recognized that his health would not allow him to stand the strain of political leadership. He sent for Barton who then agreed to undertake the leadership of the federal movement. Dibbs, who succeeded Parkes, asked Barton to join his cabinet as attorney-general, but his request was refused several times, as Dibbs and most of the other members of the proposed ministry were opposed to federation. Eventually Barton realized that as a private member he could do little for federation, and agreed to join the ministry on the distinct understanding that he was to have a free hand on that question, that the ministers as a body should support a resolution expressing a general approval of the convention bill, that ministers would not give support to destructive amendments, and that the government would bring the question forward early in the next session. Barton stated his own position very clearly in a speech in the assembly. "There is one great thing," he said, "which above all others actuates me in my political life, and will actuate me until it is accomplished, and that is the question of the union of the Australian colonies." In November 1892 he succeeded in carrying a resolution in the assembly approving of the convention bill, but it was impossible to do more at this time. In December he visited Corowa and Albury and as a result branches of the Australian federation league were established in these and other towns. In July 1893 after a public meeting held at the Town Hall, Sydney, an Australasian federation league was constituted. It was received with apathy by some, with suspicion by others, but nevertheless it formed a rallying ground for the really earnest federalists of Sydney and did much useful organizing and educational work during the federal campaign. Barton had endeavoured to persuade the freetraders to join him in forming this league and would not enter into a discussion of the fiscal question. But party feeling was too strong and their leader Reid (q.v.) held aloof. Branches of the league were, however, formed in the other colonies, conferences were held, and plans of action were prepared which had much influence in eventually bringing about federation. On 7 December 1893, the Dibbs government was defeated upon a motion of censure on Barton, attorney-general, and O'Connor (q.v.), minister for justice, who had accepted briefs in an action against the state railway commissioner. Both resigned and Barton lost his seat in July 1894 and dropped out of local politics for a period. He was doing a large amount of educational work in connexion with federation, and during the four years from January 1893 to February 1897, addressed nearly 300 meetings in New South Wales. At the election of representatives of New South Wales, to be sent to the federal convention held on 4 March 1897, Barton headed the poll with over 100,000 votes out of 139,850 voters. He was chairman of the constitutional committee and of its drafting committee and brought the bill before the convention. Its framework followed closely the 1891 bill, but various amendments and safeguards were introduced and the financial clauses were considerably altered. Barton handled the convention with great ability, and with some amendment the bill was passed. When it came before parliament in New South Wales he had charge of it in the legislative council, where it met with much opposition. Several amendments were proposed, one of them being that Sydney should be the federal capital. These, with many other suggested amendments from the legislatures of the other colonies, were considered at the Sydney meeting of the convention held in September 1897, and the Melbourne session held in March 1898. On 24 March Barton, at a meeting at the Sydney town hall, made a great speech in explaining the bill and disposing of the criticisms of its opponents. Between then and the referendum held on 3 June 1898, he spoke admirably and forcibly at the principal towns in New South Wales in favour of the "Yes" vote. His efforts were not successful, for though there was a small majority, only 71,965 out of the required 80,000 votes had been obtained. At the New South Wales election held in July, Barton decided to oppose Reid at East Sydney, but could not match Reid in dealing with a popular audience, and was defeated. The federalists had, however, reduced Reid's party majority from 37 to 2. Deakin (q.v.) was able to write to Barton pointing out that in spite of his apparent overthrow he had "achieved a real and permanent success". Reid having succeeded in getting a few modifications in the bill at a premiers' meeting, fought for it at the second referendum, and with Barton and Reid speaking on the one side, a large majority was obtained. In 1900 Barton went to London with Deakin, Kingston (q.v.), Dickson (q.v.) and Sir Philip Fysh (q.v.), as leader of a delegation to watch the passage of the bill through the Imperial parliament. The main difficulty arose over the clauses relating to appeals to the privy council. Barton, Deakin and Kingston stood firmly for the bill as presented. Joseph Chamberlain objected to the limitation of the right of appeal, and the contest was a dour one. Eventually the bill was passed after a compromise had been agreed to which the Australian representatives felt did not affect the principle involved. When the Commonwealth was inaugurated, there was a general feeling that Barton should be commissioned to form the first ministry. Lord Hopetoun (q.v.), however, invited Sir William Lyric to become the first prime minister of Australia. His reason for doing so was that Lyric was premier of the mother colony. He could scarcely be expected to be aware that Lyric had reached that position by a fortuitous combination of circumstances and had been one of the strongest opponents of federation. Lyric strove vigorously to form a cabinet, but Deakin for one was prepared to serve only under Barton. Lyric had to advise the governor-general to send for Barton, and on 31 December 1900 his ministry was formed. It was apparently a very strong ministry, but it held some intractable spirits. The problems before parliament were difficult, particularly the question of free trade and protection, in connexion with which there was much strength of feeling. The Labour party which held the balance of power was divided on this issue, but thoroughly united over all other questions of policy. It was a loquacious house with three parties in it, and its leader had no easy task; but during Barton's term as prime minister, in addition to the many necessary "machinery measures" for which Deakin as attorney-general was responsible, some important legislation was passed, including a customs tariff act, defence and naval agreement acts, the sugar bounty act, the immigration restriction act, and the judiciary act, which brought about the establishment of the high court. Much time was spent on the conciliation and arbitration and other bills which did not become law. Barton had fought a long and strenuous campaign for federation, but that cause was won, and he had no liking for the atmosphere of intrigue that was now developing in the federal house. In 1902 he went to England to attend the Imperial conference, and in September 1903 he was content to leave the political sphere and become senior puisne judge of the newly constituted high court of Australia. Some of his friends urged him to become chief justice, but Barton realized fully the claims of Sir Samuel Griffith who was given that position. On the high court bench, Barton at first showed a tendency to concur with the chief justice. It would be easy to take the view that he was a tired man scarcely in the condition to show his full powers in conflict with so masterful a personality as Griffith. But this is not borne out by A. N. Smith, a well-known journalist of the period, who, in his Thirty Years: The Commonwealth of Australia, 1901-31, says: "In the courts, however, it was known that many of the judgments read by the chief justice had been written by Mr Justice Barton". If, however, Barton did show any indolence at this period, it was only a passing phase for, after an attack of typhoid fever, both mind and body appeared to develop new vigour, and he began a series of judgments marked by great intellectual power and clearness of expression. In his last few years his health gradually weakened and he died suddenly from heart failure on 7 January 1920. He became a member of the privy council in 1901 and was created G.C.M.G. in 1902. He was an honorary bencher of Gray's Inn, London, and was given the honorary degrees of D.C.L. by Oxford, and LL.D. by Cambridge and Edinburgh universities. He also received the freedom of the city of Edinburgh in 1902. He married in 1877, Jean Mason Ross. Lady Barton survived him with four sons and two daughters. His eldest son, Edmund Alfred Barton born on 29 May 1879, was appointed a judge of the New South Wales district court in 1933. Barton had a fine presence and retained his good looks throughout his life. His eyes had remarkable beauty and expression. His old opponent Reid said of him in his autobiography, that for personal charm, combined with intellectual weight, he would place Barton even higher than Deakin. His wide culture and great learning was almost a disadvantage when he was dealing with men of ordinary calibre. He was not naturally a great orator, and as a young man was diffident about his ability as a speaker. With experience he became a good debater, logical and impressive, though sometimes too involved in style; and when he dealt with a subject so near to his heart as federation, he spoke with great effect. He has frequently been accused of indolence; the truth was that he liked taking things quietly, but when circumstances called for it, worked strenuously and at high pressure for long periods. It has been stated that he nearly wore out his associates when the Commonwealth bill was being drafted and one of his secretaries has spoken of him as "a terrific worker into the small hours". He despised the tricks of the parliamentary game, and could never put party before state. His record is one of sustained public service. It was only a man of great public spirit who could have kept the cause of federation alive in New South Wales in the last 10 years of the nineteenth century. Parkes, old and waning in health, had lost his influence, Reid was doubtful and apparently an opportunist, Lyne, Dibbs and other well-known politicians were hostile. Barton never lost faith, he imposed his faith on others, and by sheer force of character prevailed. BARTON, GEORGE BURNETT (1836-1901), miscellaneous writer, born in 1836, was the second son of William Barton of Sydney and elder brother of Sir Edmund Barton (q.v.). He was called to the bar in 1860, but became a journalist and was the first editor of Sydney Punch. From 1865 to 1868 he was reader in English literature at the university of Sydney; his introductory lecture, The Study of English Literature, was published in 1866. In the same year appeared his Literature in New South Wales and Poets and Prose Writers of New South Wales, the first volumes of a bibliographical and critical character to be published in Australia. Both books were very able pieces of work and are still consulted. Barton went to New Zealand a few years later, and for about two years was editor of the Otago Daily Times. He practised for some time as a barrister and solicitor at Dunedin, and in 1875 published A Digest of the Law and Practice of Resident Magistrates and District Courts. He returned to Australia and in the eighties did much writing for the Evening News and the Sydney Morning Herald. He was then commissioned by the government to write the History of New South Wales From the Records, of which he completed only the first volume, published in 1889. His The True Story of Margaret Catchpole was published posthumously in 1924. He died in September 1901. P. Mennell, The Dictionary of Australasian Biography; Robert Richardson, The Bulletin, 21 September 1901. BASEDOW, HERBERT (1881-1933), anthropologist, was born at Kent Town, South Australia, on 27 October 1881. He was the youngest son of M. P. F. Basedow, who was minister of education in the W. Morgan (q.v.) ministry. Educated at Prince Alfred College, the School of Mines, Adelaide, and Adelaide university, Basedow subsequently studied at the universities of Heidelberg, Göttingen, Breslau and Zürich, and graduated M.A., Ph.D., and B.Sc. He entered the geological department of South Australia and became assistant government geologist. He accompanied or led several exploratory expeditions, developed an interest in the aborigines, and lived a considerable time among them. After leaving the geological department, Basedow was appointed in 1909 to take charge of the aborigines' department for the Commonwealth government in the Northern Territory. In 1925 he published The Australian Aboriginal, a volume of over 400 pages with many illustrations. This was reprinted in 1929. In 1927 he stood for Barossa in the South Australian house of assembly as an independent candidate, was elected head of the poll, and held the seat until 1930. He was again elected for the same constituency in April 1933. He died on 4 June 1933. He married Olive Nell, daughter of A. C. Noyes, who survived him. His Knights of the Boomerang, Episodes from a Life Spent Among the Native Tribes of Australia, was published posthumously in 1935, and Basedow was also the author of various pamphlets on anthropology and geology. He was an able man whose energies were dissipated in too many directions for pre-eminence to be reached in any one of them. His most important work, The Australian Aboriginal, is the work of a scientific observer writing largely from his own experience. BASS, GEORGE (1763-1803?), was born at Aswarby, near Sleaford, Lincolnshire, probably in 1763. His father, a farmer, died while he was a child, his mother gave him a good education and apprenticed him to a surgeon at Boston. He entered the navy as a surgeon and was on the Reliance in that capacity when she sailed for Australia in February 1795. Matthew Flinders (q.v.) was also on board and the two became fast friends. It was early determined that if opportunity offered they would endeavour to complete the examination of the east coast of New South Wales. Bass had brought out from England a small boat named the Tom Thumb, of about 8 feet keel and 5 feet beam, a remarkably small vessel in which to sail along an ocean coast. After their arrival at Sydney in September, they went southward in this boat, entered Botany Bay, and explored the George's River for a considerable distance. The report given Governor John Hunter (q.v.) on their return led to the settlement of Bankstown, one of the earliest towns established in Australia. Towards the end of March 1796 the two friends sailed again in their small boat and thoroughly explored Port Hacking after encountering a storm on the way that nearly swamped them. The Reliance was then being repaired and Bass was able to get leave to endeavour to find a way over the mountains to the west of Sydney. He gathered a small party together but after spending 15 days on the work, could not find a pass and returned to Sydney. In June 1797 Bass found further employment in investigating a report that coal had been seen on the coast by a shipwrecked sailor south of Port Hacking. A seam of coal six feet deep was found in the face of a cliff. Towards the end of the year Bass obtained the use of a whaleboat, 28 feet 7 inches long, which was manned with six volunteers from the king's ships. His instructions were to examine the coast south of Sydney, as far as he could go with safety. On 3 December the boat started on its long journey, on 10 December Jervis Bay was reached, and nine days later Twofold Bay was discovered. There was a fair passage to Cape Howe, but gales were then experienced for several days, and it was not until 2 January 1798 that Wilson's Promontory was reached. Meanwhile the whaleboat had begun to leak badly. Next day smoke was discovered on an island near the promontory, which on investigation was found to be occupied by a party of seven escaped convicts. They were nearly starving and Bass, after doing what he could for them, told them he would call at the island on his return. He then went on to Western Port which was reached on 5 January. Twelve days were spent in examining this harbour, but provisions were running short and Bass thought it wise to return. On 18 January 1798 the return journey was begun and, after landing on Wilson's Promontory, Bass visited the island on which he had found the convicts; but it was impossible for him to find room for them in his boat. Two that were very feeble, he took on board, the other five he placed on the mainland, provided them with a musket, fishing lines and a compass, and advised them to endeavour to get back to Sydney along the coast. They were never heard of again. On 2 February Bass continued his voyage and arrived at Sydney on 25 February. He had travelled about 1200 miles in an open boat, often in bad weather, along an unknown coast and had added greatly to the knowledge of the country. He also became satisfied in his own mind that there was a strait between Tasmania and the mainland. Early in September 1798 Governor Hunter wrote to Secretary Nepean to say that he was fitting out a decked boat, and that he proposed sending Flinders and Bass to settle that question and to sail round Tasmania. Their voyage began in the Norfolk, a sloop of 25 tons, on 7 October 1798, and the task was accomplished when the Norfolk entered Port Jackson again on 12 January 1799. The existence of the strait had been settled, Port Dalrymple had been discovered, and a large amount of information had been collected. At the instance of Flinders the strait was named after his companion, Bass Strait. It is possible that Bass, who was of farming stock, may have considered settling near Sydney, as at about this time 100 acres of land were granted to him at Bankstown. He returned to England in 1799 and in October 1800 was married to Elizabeth Waterhouse, a sister of the captain of the Reliance. Early in 1801 he sailed for Australia again in the Venus, which had been purchased by a company consisting of Bass's mother, wife, and some of his friends. The cargo was to be sold at Sydney. She arrived at Port Jackson on 28 August 1801, and in November Bass contracted with the acting-governor, Philip Gidley King (q.v.), to obtain pork from the Society Islands for the use of the colony. He made several voyages and on 5 February 1803 sailed away for the last time. In May 1803 King, in a dispatch to Lord Hobart, mentioned that Bass had sailed for the coast of Peru to endeavour to get a breed of guanacoes (a kind of wild llama), and that he had given him a certificate to the Spanish government to that effect. Presumably this was to be considered a passport. Bass is occasionally referred to in King's dispatches of this period, and writing in December 1804 he says that he had "been in constant expectation of hearing from thence (Otaheite) by Mr Bass to whom, there is no doubt, some accident has occurred". A Captain Campbell of the Harrington is stated to have brought intelligence on his return from a voyage in January 1804 that Bass had been captured by the Spaniards, that his vessel and crew had been seized, and the captives sent to the mines in South America. (Note on p. 518 H.R. of N.S.W., vol. V.). King does not refer to this story, and there appears to be no evidence as to who received this report. Robert Brown (q.v.) writing to Banks on 21 February 1805 said of Bass--"it is feared he has either fallen a sacrifice to the treachery of the South Sea islanders, or what is fully as probable has exposed himself to be captured on the coast of Peru." A note on pp. 669-71, Vol. iv, ser. i, Historical Records of Australia, discusses some of the various statements and rumours regarding the fate of Bass. He may have gone down with his vessel, and it is also possible that he may have been captured by the Spaniards and sent to the mines. If so he probably died not later than in 1808. A Lieutenant Fitzmaurice, who was in Chile and Peru between September 1808 and April 1809, stated that the whole of the British prisoners in those countries had been repatriated by 1808. Bass was a tall, handsome man of great courage and resourcefulness, eminently qualified to undertake the remarkable work he carried out, a man "whose ardour for discovery was not to be repressed by any obstacle or deterred by danger". (Flinders, A Voyage to Terra Australis, vol. I, p. XCVII). Historical Records of Australia, ser. I, vols. II to V; Historical Records of New South Wales, vol. V; Flinders, A Voyage to Terra Australis, vol. I; Sir Ernest Scott, The Life of Matthew Flinders; J. H. Heaton, Australian Dictionary of Dates; David Collins, An Account of the English Colony in New South Wales, chapters XX and XXI. BATMAN, JOHN (1801-1839), was born at Parramatta, New South Wales, on 21 January 1801. (A. S. Kenyon papers at the public library Melbourne.) His father, William Batman, came to Sydney in 1797. In 1821 John Batman, with his brother Henry, went to Tasmania and took up land in the north-east near Ben Lomond. In this wild country Batman became an experienced bushman, and took a prominent part with other settlers in hunting down the bushrangers who were terrorizing that part of the country. For his services in connexion with the capture of Brady, a notorious bushranger of the period, he was given an additional grant of land by the government. About this time Batman became interested in the aborigines who, in their conflicts with the settlers, seemed likely to be exterminated. With the approval of the government, Batman tried methods of conciliation, and induced many to come in and surrender themselves. It was felt at that time by the more humane members of the white community that the only hope for the blacks lay in their being segregated in some special area. Flinders island was selected for this purpose, and though the experiment was not a success, it seemed to be a great improvement on the "shoot at sight" principle that was being adopted by many colonists. Batman's efforts were commended by the governor, Colonel Arthur (q.v.), and a further grant of 2000 acres of land was made to him. A great deal of Batman's land, however, was of a wild character. He had heard from various sources of the possibilities of developing what is now southern Victoria, and as early as 1825 he had discussed with John Helder Wedge (q.v.) a project to send an exploring expedition across the Strait. In January 1827 this idea was revived, and Batman, in conjunction with J. T. Gellibrand (q.v.), sent a letter to Sir Ralph Darling (q.v.) applying for a grant of land on the mainland, and suggesting that it should be proportionate to the amount of stock proposed to be sent over under the management of Batman, who would permanently settle there. The governor replied that he had no power to grant their request. Batman at this time was in prosperous circumstances and was employing a large number of station hands. Some five years passed and it was then decided to form a syndicate, afterwards named the Port Phillip Association, to carry the question further. Fifteen men including Batman, Wedge and Gellibrand were associated in this movement, and on 10 May 1835 Batman, accompanied by three white assistants and six blacks, sailed from Launceston for Port Phillip, where they arrived on 29 May. Batman's journal of this expedition, now preserved at the Melbourne public library, may be found printed, with trifling amendments in the spelling and composition, in chapter IX of Bonwick's Port Phillip Settlement. After a preliminary examination of the country to the west of Port Phillip Batman sailed up to near the present site of Williamstown, landed at the mouth of the Yarra, and followed it up to where it is joined by the Saltwater, now Maribyrnong, river. He followed the course of this river for some distance in a northerly direction, and then proceeded east to the Merri Creek. There Batman met a party of aborigines and purchased about 600,000 acres of their land. Batman tells us he explained fully to them what his object was, but it is problematical what the aborigines thought they were doing when they affixed their marks to Batman's documents. No doubt the blankets, knives, tomahawks, etc., that he gave them were very welcome. Batman then made his way back to the Saltwater River and came to the Yarra on 7 June. He had intended sailing next day for Tasmania, but the wind being adverse it was decided to explore the Yarra in a boat, and fresh water was found near the present site of Melbourne. It was on this day that Batman made the famous entry in his diary:--"This will be the place for a village." He left some of his party at Indented Head and returned to Tasmania, having given his representatives instructions to put off any person who might trespass on the land he had purchased. The Port Phillip Association then wrote to the secretary of state for the war and colonial departments requesting him to ratify the title to the land obtained from the natives. This was refused, and it was not until April 1839 that the representatives of the association were informed that they would be allowed compensation to the extent of £7000. Meanwhile the party at Indented Head had been reinforced on 7 August 1835 by the arrival of J. H. Wedge and Henry Batman and his family. On 29 August a party organized by John Pascoe Fawkner (q.v.) sailed up the Yarra and started to make a settlement on the site of Melbourne. Four days later Wedge arrived and informed the members of Fawkner's party that they were trespassing. But Wedge had no means of enforcing his claim, and indeed in the eyes of the law all were trespassers. Fawkner himself arrived on 11 October and Batman on 9 November, but it was not until 20 April 1836 that Batman's family reached Melbourne. They lived for a time on Batman's Hill near the site of the present Spencer-street railway station, and Batman conducted a store, and farmed land. He was apparently in fairly good circumstances for, at the second sale of Melbourne town allotments, he gave the highest price, £100, for the allotment on the north-west corner of Flinders- and Swanston-streets, but when he died on 6 May 1839 after a long illness, his affairs were found to be very involved. Five years later a petition addressed to the queen by his widow and children for a grant of land was refused, on the ground that there was no power to accede to it. His only son was drowned in the Yarra before he was 10 years old. The family survives through his daughter Maria who married for the second time Robert Fennell, and his fourth daughter Elizabeth Mary who married William Weire of Geelong. Batman was a courageous and adventurous man, with all the resources of a bushman used to working in virgin country. Good-looking in his youth, he was well-mannered and kindly, and his humanity to the blacks was far in advance of his age. There is no possibility of obtaining general agreement on his claim to be the founder of Melbourne. Batman certainly wrote in his diary "This will be the place for a village", but it is not unlikely that he was more concerned with obtaining grazing country than founding a town. The party organized by Fawkner erected the first buildings in Melbourne, and Fawkner actually settled in Melbourne before Batman did. Both played an important part in the founding of the colony of Victoria and its capital. It would be futile to try to apportion the credit due to each. No contemporary portrait of Batman has survived. The drawing in the historical section of the public library at Melbourne was done by Charles Nuttall (q.v.) from a picture by Frederick Woodhouse called "The Settlers' first meeting with Buckley" in which Batman appears as the central figure. This was painted in 1861 and it is possible that the artist had something to work from, as Batman's daughter Mrs Weire considered it to be "a remarkable likeness" of her father. Her testimony, however, has little value as she was less than 10 years old when her father died. BAUER, FERDINAND (1760-1826), botanical artist, was born at Feldsberg, Austria, on 20 January 1760. His father was court painter to the reigning Prince of Lichtenstein. In 1784 Dr John Sibthorp, who was visiting Vienna, engaged Bauer to accompany him on a voyage to Greece and the Greek islands as natural history painter. Bauer returned with Sibthorp to England to finish the drawings for his Flora Graeca. There he met Sir Joseph Banks (q.v.), and in 1801 was appointed botanical draughtsman to the expedition to Terra Australis under Captain Matthew Flinders (q.v.). He sailed on the Investigator with Flinders and proved to be a most capable and industrious draughtsman. He had made 700 drawings of plants and animals by July 1802, and about 12 months later he speaks of having completed nearly 600 more. He returned to England in 1805. In 1813 Bauer began his Illustrationes Florae Novae Hollandiae which was not a financial success, partly because the artist was so conscientious that he endeavoured to do all the work himself including the colouring of the plates. He returned to Austria in August 1814 but continued to do much work for English publications including Lambert's Pinus and Lindley's Digitalis, etc. He died on 17 March 1826. A brother, Francis Bauer, F.R.S., F.L.S. (1758-1840), was botanical painter to George III and did work of great merit. The name of Bauer has been perpetuated in several Australian plants, and Cape Bauer on the Australian coast was named after Ferdinand by Flinders. BAVIN, SIR THOMAS RAINSFORD (1874-1941), premier of New South Wales and judge, was the son of a Methodist clergyman the Rev. Rainsford Bavin. He. was born at Kaiopoi, New Zealand, on 5 May 1874 and was educated at Auckland Grammar School, Newington College, Sydney, and the university of Sydney. He graduated B.A. in 1894 and LL.B. in 1897 winning the Wigram Allen scholarship in 1895. He was called to the New South Wales bar and took part in the fight for federation. In 1900 he was acting-professor of law at the university of Tasmania, and when Barton (q.v.) became prime minister of Australia in 1901, acted as his private secretary. He later held the same position with Deakin (q.v.). He then practised at the bar in Sydney, sometimes as counsel for trade unions, and was chairman of various wages boards. In 1911 he was appointed chairman of a royal commission to inquire into the cost of living. When the 1914-18 war broke out Bavin became a naval intelligence officer. He declined the offer of a judgeship in 1917, and in the same year was elected to the legislative assembly as a nationalist. He had, however, had too many opportunities of seeing both sides of social questions to be quite happy on the conservative side of the house, and with others formed the Progressive party, which afterwards became the Country party. Bavin resigned from the Nationalist party in 1920, but accepted office in the coalition ministry formed by Sir George Fuller in December 1921 which resigned directly the house met. Fuller, however, formed another ministry in April 1922 in which Bavin was attorney-general until the ministry resigned in June 1925. Fuller resigned his leadership soon after, and Bavin was leader of the opposition until October 1927, when he became premier and colonial treasurer. At the premiers' conference held in August 1930 Bavin was a leading figure, but his policy of economy was unpopular in New South Wales and his party was defeated at the election held in October 1930. Bavin fought this election in a state of failing health, in 1932 was obliged to resign his leadership of the party, and in the following year retired from politics. He was made a judge of the supreme court in 1935, but his health failed to improve and he died at Sydney on 31 August 1941. He married Edyth, daughter of F. E. Winchcombe, M.L.C., who survived him with a son and three daughters. He was created K.C.M.G. in 1933. A selection from his speeches was published in 1933 under the title Thomas Rainsford Bavin Extracts from his Speeches 1923-1932, and his Macrossan (q.v.) lecture, Sir Henry Parkes His Life and Work, was published early in 1941. Bavin was a highly cultured man of wide sympathies, much strength of character, and great courage. His political life covered a bitter period, and in the heat of conflict during the 1930 election bitter things were said against him. In reality he was much liked on both sides of the house. He tried to apply to public affairs "the same standard of right and wrong, of honesty and dishonesty, of justice and injustice, that we demand in private life". He had an important share in the political life of his time, which would have been greater if be had been granted normal health. The Sydney Morning Herald, 1 September 1941; The Australian Quarterly, September 1941; Burke's Peerage etc., 1939; Foreword to the selection from his speeches; Calendar, university of Sydney, 1897; The Bulletin, 16 October 1935. BAYLEBRIDGE, WILLIAM (1883-1942), originally Charles William Blocksidge, poet, son of G. H. Blocksidge, auctioneer and estate agent, was born at East Brisbane on 12 December 1883. He was educated at Brisbane Grammar School and by a private tutor David Owen, M.A., a good classical scholar. He went to London in 1908 and published a volume of poems, Songs of the South, which was followed a year later by Australia to England and other Verses. Both these books were suppressed shortly after publication. In 1910 no fewer than four volumes were privately printed, Moreton Miles, Southern Songs, A Northern Trail, and The New Life, of which copies were sent to the principal public libraries, but few, if any, were sold to the public. There was no publisher's name on any of the volumes, and there was nothing to suggest where they had been printed. One of these books, however, The New Life, was reviewed in the Bulletin on 14 March 1912, and the anonymous reviewer, probably A. H. Adams (q.v.), pronounced it "an astonishing thing to have come from Australia--astonishing in its crudeness and occasional strength, equally astonishing in its gassy rhetoric and its foolishness". In another place he suggested that here was "a new prophet, a new poet--or a new lunatic". But evidently the effects of the volume's strength were greater than those of its weakness, for the book was referred to several times in later issues. Life's Testament, c. 1914, A Wreath, c. 1916, and Seven Tales, 1916, were also privately printed, and attracted no notice, but in 1919 a volume of Selected Poems was issued by Gordon and Gotch at Brisbane which slowly made its way, helped by a literary group at Melbourne of whom Vance and Nettie Palmer and Frank Wilmot (q.v.) were the leaders. Baylebridge had returned to Queensland in 1919. He had travelled extensively in Europe, Egypt and the East, and is stated to have done "special literary work" during the 1914-18 war. His familiarity with the subjects of the stories in his An Anzac Muster, privately printed in 1921, suggests that he had personal experience at the front, but there appears to be no evidence to show that he belonged to any of the fighting forces. Baylebridge lived the last 20 years of his life at Sydney. He was continually revising his poems and his philosophical writings in prose. His National Notes, first published in 1913, had a third edition in 1936. He received his first authoritative recognition as a poet in Nettie Palmer's Modern Australian Literature, published in 1924, and the inclusion of seven of his poems in An Australasian Anthology, published in 1927, was a confirmation of the standing Baylebridge had gained in Australian poetry. He had completed a volume containing a sequence of 123 sonnets in 1927 but it was not published until 1934. H. A. Kellow, in his Queensland Poets, states definitely on page 217 that this volume was published in 1927, but this is a mistake. Kellow discusses the sonnets and probably Baylebridge had lent him the typescript and told him that he intended to publish in that year. When the book did appear in 1934 it was widely and well reviewed. Kellow had hailed him in 1930, as bidding fair to be "the greatest literary figure that Queensland has yet produced", but with the publication of Love Redeemed Baylebridge took an acknowledged place as one of the leading Australian poets. In 1939 he published a collected edition of his earlier poems under the title of This Vital Flesh, which was awarded the gold medal of the Australian Literature Society as the most important volume of Australian poetry of its year. A small volume of Sextains appeared in the same year, also Life's Testament, a reprint of the first section of This Vital Flesh. Baylebridge contemplated issuing a volume or volumes of his later poems, also a popular edition of his prose tales An Anzac Muster, but they did not reach publication. He died at Sydney on 7 May 1942. He never married. Baylebridge was tall, fair and good-looking, a good athlete in his youth, a good musician, and a sound man of business; he was interested in the Stock Exchange and was in a good financial position. He was pleasant in manner, an interesting conversationalist, perfectly normal and without suggestion of eccentricity, yet inclined to retire into himself and live a separate life with his poetry and philosophy. In reality he was anxious for recognition, but whether consciously or not adopted methods of publication which made this difficult to be given. He was interested in the format of books and his were always beautifully printed. His philosophy as expressed in National Notes was much less original than he thought and will not be an important part of his fame. His prose in An Anzac Muster in spite of its mannerisms is excellent; at times it ranks with the best that has been written in Australia. This book was issued in an edition of 100 copies and is exceedingly rare. His place in Australian poetry has been sufficiently indicated. Unfortunately the bibliography of his works is confused, as some of the poems appear over and over again in differing versions. It is to be wished that both a complete edition and a careful selection will some day be issued. On the question of the poet's name there is some doubt. His name was originally Charles William Blocksidge. Up to 1923 at least he was signing his letters "W. Blocksidge" but not long afterwards he adopted the name of William Baylebridge, both in private life and for his books. He does not seem to have gone through any process of law, but there appears to be no reason why his wishes should not be respected. His death notice in the Sydney Morning Herald of 8 May 1942 gave his name as "William Baylebridge". BAYLEY, ARTHUR WELLESLEY (1865 1896), prospector, discoverer of the Coolgardie goldfield, was born at Newbridge, Victoria, on 27 March 1865. When only 16 years of age he went to North Queensland and did prospecting and mining work at Charters Towers, Hughenden, Normanton, Croydon and Palmer. He then went to Western Australia and landed at Fremantle with about thirty shillings in his pocket. He walked to Southern Cross, and while working there a few months later heard that gold had been discovered about 130 miles to the east. Bayley kept this in mind and determined some day to prospect this country himself. In January 1889 he went to the Nullagine diggings and Roebourne in the north-west. He had some success, and after returning to Perth worked again at Southern Cross. Hearing that gold had been found on the Ashburton he again returned to Perth, made to the north and found good gold at Ford's Creek. While prospecting the Murchison he found Bayley's Island in Lake Austin which also yielded good returns. He became associated with W. Ford whom he had known in Queensland, who had heard of gold having been found to the east of Southern Cross, and in June 1892 the two men with five horses set out to find it. Soon after reaching the site of Coolgardie they found a nugget, and within a few days had picked up about 80 ounces of gold. More rich alluvial gold was found and the two men were then compelled to return to Southern Cross for supplies. On returning to the field a quartz outcrop with gold in it was found, which became the famous Bayley's Reward mine. The two men returned to Southern Cross with 554 ounces of gold, which they showed to the warden on 17 September 1892. A reward lease was granted to them, and on 20 September the Coolgardie field was declared open. There was a tremendous rush to the field from Southern Cross, much gold was found, and in a few years Coolgardie was a thriving town. Bayley and Ford sold their claim to a company for £6000 and a sixth interest and Bayley, having returned to Victoria, took up land near Avenel, and lived in prosperous circumstances. Though a strong athletic man he fell into ill health, possibly on account of privations he had suffered while a prospector, and died at Avenel of congestion of the lungs on 29 October 1896. He left a widow but no children. Bayley was an energetic personality with great courage and resource and was much liked. No matter what his circumstances might be he was always willing to help anyone in a less fortunate position. His success as a prospector was the result of great experience and perseverance. His associate Ford, a man of reserved and cautious temperament, though 13 years older had a love and respect for Bayley "that amounted almost to reverence". Ford went to the east and lived at Sydney, where he died on 16 October 1932. The accounts of the finding of Bayley's Reward do not always agree. The varying versions are recorded in the paper by Sir John Kirwan mentioned below. BAYNTON, BARBARA JANET AINSLEIGH (1862-1929), author, daughter of Robert Laurence Kilpatrick, was born at Scone, Hunter River district, New South Wales, in 1862. In 1880 she married Hay Frater and in 1890 Dr Thomas Baynton. A few years later she began contributing short stories to the Bulletin and six of these were published in 1902 under the title of Bush Studies. In 1907 appeared Human Toll, a novel, and in 1917 Cobbers, a reprint of Bush Studies, with two additional stories. During the 1914-18 war Mrs Baynton was living in England and in 1921 she married her third husband Baron Headley. She died at Melbourne on 28 May 1929. She was survived by Lord Headley, and two sons and a daughter by the first marriage. Barbara Baynton's reputation rests on half a dozen short stories, written with much ability and power, and uncompromising in their stark realism. The building up of detail, however, is at times overdone, and lacking humorous relief, the stories tend to give a distorted view of life in the back-blocks.
{ "pile_set_name": "Pile-CC" }
Egypt Roiling: Deaths At Protests; Two Americans Reportedly Kidnapped In Cairo earlier today, a masked Egyptian protester prepared to throw back a tear gas canister fired by security forces. Mahmud HamsAFP/Getty Images Originally published on February 3, 2012 7:23 am The news from Egypt is grim again today: -- "At least two people have been shot and killed in the Egyptian city of Suez, as police used live rounds to hold back crowds during a protest over security forces' failure to prevent a deadly football riot," al-Jazeera reports. And it adds that "one person was killed in Cairo just feet away from the Interior Ministry, as police in Cairo set off salvos of tear gas and fired birdshot." Reuters says a police officer has also reportedly been killed in Cairo. The protests stem from authorities' failure to control the crowd after a soccer game Wednesday in Port Said. A riot erupted, leaving around 80 people dead and about 1,000 injured. Many Egyptians are angry about a lack of security in their country. -- The Guardian writes that "gunmen in Egypt's Sinai peninsula have kidnapped two American women in an apparent attempt to hold them for ransom, security sources said. Security in the isolated desert region has deteriorated since the overthrow of Hosni Mubarak last February. South Sinai's Red Sea coast is a major tourism hub for Egypt."
{ "pile_set_name": "Pile-CC" }
Giant cucumbers attack Ukraine A housewife in the Ukrainian city of Ternopol has cultivated really huge cucumbers which are two meters long. Specialists say, this is not the limit. The woman had bought regular cucumber seeds in spring. It is quite natural that she expected to see habitual cucumbers in the garden, not more. The woman says: “There have been lots of blossoms all the spring long, no cucumbers at all. We haven’t visited the garden for quite a long time, but when we came we saw the cucumbers were enormous.” Specialists say, the plant is called Laginaria which has been brought from South and East Asia. Its vegetables can be eaten when they are still unripe. A botanist from the Ternopol teacher’s training college says that only practice can demonstrate if the plant is viable in the Ukrainian climate. He says, it is also possible to make plates and dishes from such huge cucumbers, like people in African and Asiatic countries do. The woman who cultivated the huge cucumbers isn’t going to make plates, but will can them for the winter instead.
{ "pile_set_name": "Pile-CC" }
Monday, April 26, 2010 Park Ranger Images That Stay With You As a National Park Ranger you work in some of the most interesting and spectacular settings in our country. Most people believe that park rangers sleep dreaming about the vast vistas and beautiful sunsets they get to enjoy each day. The reality is quite different. As a young park ranger I believed in the above image until I had to deal with my first dead body. Little did I know that this would be the first of many such situations I would have to face in my career. I ended up providing emergency care to victims and investigating deaths of people from auto and motorcycle crashes, gunshot wounds, drowning, drug overdoses, falls from cliff faces, and suicides. Several of these bodies floated in my dreams for years and still appear on occasion. One such incident was in 1982 while working on the Blue Ridge Parkway. There was a young man in Galax, Virginia that was cruising with his 15 year old cousin in a Pontiac Trans Am. They met two teenage girls in a parking lot hangout and asked them to go for a ride in the impressive muscle car. They ended up on the Blue Ridge Parkway where the driver lost control of the car in a sharp curve at the state line with North Carolina going at speeds estimated of 80mph. The Trans Am went directly into a large oak tree killing the two girls and driver instantly. The bodies were torn and smashed to the point that no one could identify them. The lone survivor was the cousin who was in the back seat awake and screaming as it took the Rescue Squad an hour to cut him from the wreckage. His body was cut wide open from one leg through his groin and down his other leg. EMT’s worked to stem the bleeding as the Jaws of Life worked to cut him from the mangled car. The survivor did not even know the last names of the girls they had picked up. High school rings with initials on their lifeless fingers led local agency investigators to get the high school principal out of bed in an attempt to match the names in the year book for the upcoming graduating class. Once at the hospital I was able to get the survivor to tell me where they met the girls. In that parking lot was found a lone car registered to the parents of one of the girls picked out as a possible victim from the yearbook. The Virginia State Police handled notifying the families of the tragedy relieving me of that tough duty. They found two next door neighbors home with every light on in the house. It was 3 a.m. and both families knew something was wrong. At the hospital I finally had a few moments to start writing down some notes for the required investigative report. I had before me the official report form and I started to fill out the blank spaces. On these forms you placed all the information about the driver and passengers in neatly placed boxes outlined in black. To the right of the identity information the investigator had to check one of three boxes titled at the top of the column as; No Injury, Injury, or Fatality. By the time I had checked the third fatality box all the emotion and sense of loss of what I had been dealing with came upon me like a flood from a broken dam. My eyes began to swell up with moisture, my heart rate increased, and my writing hand began to tremble. I found an empty waiting room and sat for a few minutes to get myself back together. Eventually my supervisor found me and I cannot remember what he said or did, I wish I could, but he helped me to recover my composure and move on. The part of this tragic event that stays with me to this day is the checking off of three young human lives on a government form in a small sterile hospital waiting room. These are not scenes and visions that most new park rangers consider at the beginning of their career nor are they prepared to deal with. I thought that something was wrong with me for a long time since these topics were never discussed or dealt with by peers. You kept it inside and kept on going. You did not want others to know that you were not made of stone and macho enough to be a ranger. It took some time, and although I was not obsessed with these images it made it much easier to deal with once I knew others had the same experiences. The crashed Trans Am as described in the story above. That is me in the upper left hand corner holding the flashlight. You can see EMS personnel trying to remove the lone survivor from the back seat. The Book BUY NOW Award "A Park Ranger's Life: Thirty Two Years Protecting Our National Parks" is a collection of stories from the career of retired National Park Ranger Bruce Bytnar. You will find stories about bears, lost hikers, criminals, forest fires, and learn the true story of the challenges and rewards of being a National Park Ranger. "A Park Ranger's Life" has received praise from those with backgrounds in our National Parks and readers interested in learning more about our parks and a career as a ranger. The book has been adopted by universities across the country as required reading for students studying resource protection and park related curriculmns.
{ "pile_set_name": "Pile-CC" }
There are ever increasing numbers of devices within the home, other buildings or the outdoor environment that have processing and communication capabilities which allow them to interact with other processing devices. Everyday objects and relatively small scale processing devices may be connected to each other and to central platforms as part of the “Internet of Things”. For example, a sprinkler system in the home may gather information from various moisture sensors and control the activation of sprinklers based on the moisture information. Also, a healthcare provider may use wireless sensors (e.g. a heart rate monitor or a sensor for monitoring that a patient is taking their prescribed medicine) to track the health of patients while at home. Hence, in a variety of applications, there may be a central application providing apparatus which interacts with one or more agent devices which provide data to the application providing apparatus and/or are controlled by the application providing apparatus. The agent devices may differ considerably in terms of complexity, processing resources, hardware and purpose. It can be important to provide trust between the agent device and the application providing apparatus so that the application provider can trust the validity of the data received from the agent device and the agent device can trust any commands received from the application providing apparatus. However, since many agent devices in the Internet of Things may have little processing capability, providing resources in the agent device for establishing the trusted relationship with the application providing apparatus can be difficult and may significantly increase the cost of the agent device. The rapid and wide deployment of such agent devices means there is also a desire to make installation as quick and efficient as possible.
{ "pile_set_name": "USPTO Backgrounds" }
Give Me My Name Back "Give Me My Name Back" is a song recorded by Australian singer Meg Mac and released on 12 October 2018. It is the lead single from her second studio album Hope due for release in June 2019. Upon release Mac told Billboard: "'Give Me My Name Back' is a song for those who have suffered emotional and physical abuse, it's for the women who are standing up and speaking out, those discriminated against in the LGBTQI community, the Indigenous people of Australia and the children abused by the church. It's for everyone who has lost an important part of themselves and need to reclaim their identity, dignity and self-worth in order to move forward with their lives." Reception Al Newstead from ABC called the song her "most empowering anthem yet" saying "It's a bit of a change from the raw, vintage-sounding soul of her debut album, Low Blows. There's more space and synthetic sounds, all grounded by Meg's foundation-shifting set of pipes. The result is a rallying cry, an empowering anthem encouraging others to join in solidarity and take a stand." Matthew Forbes from Outlet Mag said: "'Give Me My Name Back' achieves its desire for a wide-reaching message through its direct and all-encompassing lyricism, which are given even more weight by Meg's characteristically enthralling vocal performance. The track ventures forward in time from the vintage soul that defined her debut album to the more synthetic and futuristic territory she's explored on tracks like "Grandma’s Hands", resulting in an instrumental that's rich in texture. Despite this, the song, much like its lyrics, is at its most powerful in the simple moments – specifically, the bridge, in which the instrumental is reduced to a drum beat, letting the stirring lyrics and gorgeous harmonies take the forefront." Music video The music video for "Give Me My Name Back" was produced, directed and edited by Claudia Sangiorgi Dalimore and released on 11 October 2018. The music video had an all-female cast and crew. Charts References Category:2018 songs Category:2018 singles Category:Songs with feminist themes Category:Meg Mac songs
{ "pile_set_name": "Wikipedia (en)" }
BROWNSBURG, Ind. (July 9, 2018) – Entering six events in six days, five of which against the infamous Pennsylvania Posse, Tony Stewart’s recent stretch of competition was action-packed and successful, earning a trio of top-ten finishes in the Keystone State before ending the week with an All Star Circuit of Champions feature start during the 10th Annual Lou Blaney Memorial at Sharon (Ohio) Speedway. Stewart, driver of the Tony Stewart/Curb-Agajanian Racing/Rush Truck Centers/Textron Off Road/Ford Performance/Curb Records/Sage Fruit/No. 14 sprint car, entered five rounds of Pennsylvania Sprint Speedweek from July 2-6, visiting five different facilities across much of Central Pennsylvania and northern Maryland. After not qualifying for feature action at Lincoln Speedway on July 2, Stewart rebounded big and finished fourth, fifth, eleventh, and eighth during visits to Grandview (Pa.) Speedway, Port Royal (Pa.) Speedway, Hagerstown (Md.) Speedway, and Williams Grove (Pa.) Speedway, respectively. The trio of top-ten finishes bumped his season top-ten count to 26, 17 of which occurring inside the top-five. Although pulling off of the speedway early after starting ninth, Stewart ended his near-week long campaign with an Arctic Cat All Star Circuit of Champions presented by Mobil 1 main event start at Sharon Speedway on Saturday, July 7. Stewart, a former winner of the prestigious event – his first 410c.i. sprint car victory – earned his fifth row starting position by finishing fifth during his respective dash. A heat race victory sealed his position in one of the two All Star dashes. “We got rolling in PA pretty well. The original plan was to head back east on Sunday and visit Selinsgrove to end PA Sprint Speedweek, but my guys are dragging; they are tired and they need some rest. I figured it was time to head home,” Stewart said of his long trip. “I wish I could say the same about our performance at Sharon Speedway. We’ve been successful there in the past. We just didn’t have it on Saturday.” Tony Stewart’s upcoming plans are still in the works. Tentatively, Smoke is scheduled to join the All Star Circuit of Champions for a pair events in Western Pennsylvania, visiting Eriez Speedway and Pittsburgh’s Pennsylvania Motor Speedway on Friday and Saturday, July 20 & 21. ADDITIONAL MEDIA: Fans are encouraged to follow the progress of Tony Stewart, Tony Stewart Racing and the No. 14 Rush Truck Centers/Textron Off Road/Ford Performance/Curb Records/Sage Fruit/J&J Auto Racing motorsports team on the Web and on social media. More information can be found at www.tonystewartracing.com, as well as at www.tonystewart.com. Tony Stewart: Facebook at https://www.facebook.com/TonyStewart/ or on Twitter at https://twitter.com/TonyStewart Tony Stewart Racing: Facebook at www.facebook.com/TonyStewartRacing or on Twitter and Instagram @TonyStewart_Rcg.
{ "pile_set_name": "Pile-CC" }
Q: numpy get index where value is true >>> ex=np.arange(30) >>> e=np.reshape(ex,[3,10]) >>> e array([[ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9], [10, 11, 12, 13, 14, 15, 16, 17, 18, 19], [20, 21, 22, 23, 24, 25, 26, 27, 28, 29]]) >>> e>15 array([[False, False, False, False, False, False, False, False, False, False], [False, False, False, False, False, False, True, True, True, True], [ True, True, True, True, True, True, True, True, True, True]], dtype=bool) I need to find the rows that have true or rows in e whose value are more than 15. I could iterate using a for loop, however, I would like to know if there is a way numpy could do this more efficiently? A: To get the row numbers where at least one item is larger than 15: >>> np.where(np.any(e>15, axis=1)) (array([1, 2], dtype=int64),) A: You can use nonzero function. it returns the nonzero indices of the given input. Easy Way >>> (e > 15).nonzero() (array([1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2]), array([6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9])) to see the indices more cleaner, use transpose method: >>> numpy.transpose((e>15).nonzero()) [[1 6] [1 7] [1 8] [1 9] [2 0] ... Not Bad Way >>> numpy.nonzero(e > 15) (array([1, 1, 1, 1, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2]), array([6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9])) or the clean way: >>> numpy.transpose(numpy.nonzero(e > 15)) [[1 6] [1 7] [1 8] [1 9] [2 0] ... A: A simple and clean way: use np.argwhere to group the indices by element, rather than dimension as in np.nonzero(a) (i.e., np.argwhere returns a row for each non-zero element). >>> a = np.arange(10) >>> a array([0, 1, 2, 3, 4, 5, 6, 7, 8, 9]) >>> np.argwhere(a>4) array([[5], [6], [7], [8], [9]]) np.argwhere(a) is the same as np.transpose(np.nonzero(a)). Note: You cannot use a(np.argwhere(a>4)) to get the corresponding values in a. The recommended way is to use a[(a>4).astype(bool)] or a[(a>4) != 0] rather than a[np.nonzero(a>4)] as they handle 0-d arrays correctly. See the documentation for more details. As can be seen in the following example, a[(a>4).astype(bool)] and a[(a>4) != 0] can be simplified to a[a>4]. Another example: >>> a = np.array([5,-15,-8,-5,10]) >>> a array([ 5, -15, -8, -5, 10]) >>> a > 4 array([ True, False, False, False, True]) >>> a[a > 4] array([ 5, 10]) >>> a = np.add.outer(a,a) >>> a array([[ 10, -10, -3, 0, 15], [-10, -30, -23, -20, -5], [ -3, -23, -16, -13, 2], [ 0, -20, -13, -10, 5], [ 15, -5, 2, 5, 20]]) >>> a = np.argwhere(a>4) >>> a array([[0, 0], [0, 4], [3, 4], [4, 0], [4, 3], [4, 4]]) >>> [print(i,j) for i,j in a] 0 0 0 4 3 4 4 0 4 3 4 4
{ "pile_set_name": "StackExchange" }
Williams-Sonoma Stainless-Steel Prep Serve Salad Servers, Set of 2 We designed and developed our exclusive line of stainless-steel kitchen tools by drawing upon more than 50 years of culinary experience. Crafted of heavy-gauge steel, these professional-quality utensils are ergonomically designed to ensure excellent balance and precise control—for a difference you can really feel in your hand. Perfect for tossing and serving your favorite salads, this versatile set is also great for prepping and serving side dishes and desserts.
{ "pile_set_name": "Pile-CC" }
406 F.Supp. 430 (1975) Clancy CUNNINGHAM, Petitioner, v. The DISTRICT COURT OF the THIRTEENTH JUDICIAL DISTRICT OF the STATE OF MONTANA et al., Respondents. L. R. BRETZ, Petitioner, v. Roger CRIST, as Warden of the Montana State Penitentiary, Deer Lodge, Montana, and John Moe, as Sheriff of Missoula County, Montana, Respondents. Merrel CLINE, Relator, v. The STATE OF MONTANA and Roger Crist, Warden, Montana State Penitentiary, Respondents. Nos. CV-75-112-BLG—CV-75-114-BLG. United States District Court, D. Montana, Billings Division. December 31, 1975. Moses, Kampfe, Tolliver & Wright, Billings, Mont., for Clancy Cunningham. Charles F. Moses, Moses, Kampfe, Tolliver & Wright, Billings, Mont., for L. R. Bretz. W. William Leaphart, The Leaphart Law Firm, Helena, Mont., for relator Merrel Cline. Richard Dzivi, Special Pros., Robert L. Woodahl, Atty. Gen. for the State of Montana, Helena, Mont., for respondents. MEMORANDUM AND ORDER BATTIN, District Judge. The above-named petitioners have individually submitted petitions for writs *431 of habeas corpus. Due to the similarity of issues, the cases were consolidated. BACKGROUND FACTS. Petitioner Cunningham Petitioner was charged in Information No. 9017, filed on August 24, 1973, in Yellowstone County, with first degree assault. On March 21, 1974, a jury was impaneled and sworn, and the omnibus instruction was read. Prior to the swearing of any witness, the State was granted a motion to dismiss due to the unavailability of the key witness. A second Information alleging third degree assault was filed on May 20, 1974. On August 16, 1974, the Yellowstone County District Court granted petitioner's motion to quash the Information because of double jeopardy. On May 2, 1975, the Supreme Court of Montana reversed the District Court's order, holding that further prosecution was not barred by double jeopardy provisions of the United States and Montana Constitutions. State of Montana v. Cunningham, Mont., 535 P.2d 186 (1975). The Supreme Court denied petitioner's petition for rehearing on May 20, 1975. The matter was set for trial on November 11, 1975. Petitioners Bretz and Cline Information No. 3921 was filed on October 3, 1974, in Lewis and Clark County, charging petitioners with the commission of nine felonies. On March 13, 1975, a jury was impaneled and sworn, but no witnesses were sworn. The trial court then granted a motion by petitioners to dismiss one count. The State filed and the District Court granted a motion to dismiss the remaining counts on April 4, 1975, before any witnesses were sworn; a second Information, No. 3963, alleging the commission of two felonies by petitioners, was filed on the same day. Petitioners' motion to dismiss on the grounds of double jeopardy was filed on April 25, 1975, and the District Court denied it on May 1, 1975. Petitioner Bretz filed a petition for habeas corpus with the Supreme Court of Montana, alleging double jeopardy. This was denied by that court on July 23, 1975. Bretz v. Sheriff, Mont., 539 P.2d 1191 (1975). On September 2, 1975, the Supreme Court denied a rehearing. A trial commenced in the District Court of the First Judicial District on June 16, 1975, and on July 2, 1975 petitioners were found guilty of obtaining money by false pretenses — the same count that had been dismissed as the result of petitioners' motion. ISSUES. 1. Is Section 95-1711 of the Revised Codes of Montana, 1947, constitutional in light of the double jeopardy provisions of the Fifth Amendment to the United States Constitution and the Montana Constitution? 2. Assuming that the United States Supreme Court were to hold that jeopardy attaches in state proceedings when the jury is sworn, does the doctrine of "manifest necessity" require that a further trial be held as to petitioners Bretz and Cline? DISCUSSION. A. Application of Fifth Amendment to the States. There is no doubt that the double jeopardy prohibition contained in the Fifth Amendment to the United States Constitution applies to the States. Benton v. Maryland, 395 U.S. 784, 89 S.Ct. 2056, 23 L.Ed.2d 707 (1969). The Court in Benton stated: "In 1937, this Court decided the landmark case of Palko v. Connecticut, 302 U.S. 319, 58 S.Ct. 149, 82 L.Ed. 288. Palko, although indicted for first-degree murder, had been convicted of murder in the second degree after a jury trial in a Connecticut state court. The State appealed and won a new trial. Palko argued that the Fourteenth Amendment incorporated, as against the States, the Fifth Amendment requirement that no person `be subject for the same offense to be twice put in jeopardy of life or limb.' The Court disagreed. Federal double jeopardy standards were not *432 applicable against the States. Only when a kind of jeopardy subjected a defendant to `a hardship so acute and shocking that our polity will not endure it,' id. at 328, 58 S.Ct. [149], at 153, did the Fourteenth Amendment apply. The order for a new trial was affirmed. In subsequent appeals from state courts, the Court continued to apply this lesser Palko standard. See, e. g., Brock v. North Carolina, 344 U.S. 424, 73 S.Ct. 349, 97 L.Ed. 456 (1953). "Recently, however, this Court has `increasingly looked to the specific guarantees of the [Bill of Rights] to determine whether a state criminal trial was conducted with due process of law.' Washington v. Texas, 388 U.S. 14, 18, 87 S.Ct. 1920, 1922, 18 L.Ed.2d 1019 (1967). In an increasing number of cases, the Court `has rejected the notion that the Fourteenth Amendment applies to the States only a "watered-down, subjective version of the individual guarantees of the Bill of Rights . . .."' Malloy v. Hogan, 378 U.S. 1, 10-11, 84 S.Ct. 1489, 1495, 12 L.Ed.2d 653 (1964). Only last Term we found that the right to trial by jury in criminal cases was `fundamental to the American scheme of justice,' Duncan v. Louisiana, 391 U.S. 145, 149, 88 S.Ct. 1444, 1447, 20 L.Ed.2d 491 (1968), and held that the Sixth Amendment right to a jury trial was applicable to the States through the Fourteenth Amendment. For the same reasons, we today find that the double jeopardy prohibition of the Fifth Amendment represents a fundamental ideal in our constitutional heritage, and that it should apply to the States through the Fourteenth Amendment. Insofar as it is inconsistent with this holding, Palko v. Connecticut is overruled." (Footnotes omitted.) Benton, supra, at 793-794, 89 S.Ct. at 2062. But the Court has been careful to distinguish between substantive rights and procedures. A review of the Court's actions concerning the right to trial by jury clearly establishes that the Court has determined that as long as the substance of the right is maintained, then the procedure by which the result is reached is wholly within the discretion of the State. See 47 Am.Jur.2d 640, 641. As held in Duncan, supra, the due process clause of the Fourteenth Amendment imposes the Sixth Amendment trial by jury right upon the States. Rule 23(b) of the Federal Rules of Criminal Procedure, established to protect these rights, requires that a jury shall consist of twelve persons and that a verdict shall be unanimous. Despite this federal rule, several States have differing provisions. Oregon and Louisiana, for example, have determined that notwithstanding the federal requirement of unanimity, a conviction could be attained on a less than unanimous jury vote. The Supreme Court has held that the States have the right and power to set such procedures and that the federal rule was strictly for use in federal trials. Apodaca v. Oregon, 406 U.S. 404, 92 S.Ct. 1628, 32 L.Ed.2d 184 (1972); Johnson v. Louisiana, 406 U.S. 356, 92 S.Ct. 1620, 32 L.Ed.2d 152 (1972). Similarly, the Supreme Court has determined that a State can provide for a jury trial of less than twelve persons — again notwithstanding federal rules to the contrary. Williams v. Florida, 399 U.S. 78, 90 S.Ct. 1893, 26 L.Ed.2d 446 (1970). Clearly, the Supreme Court has not mandated that States accept the federal procedure as long as the State procedure preserves the constitutional objective. Montana's procedural rule does not present a "watered-down version" of the constitutional right. The defendants' substantive rights receive no less protection under the Montana statute than under federal procedures, for, practically speaking, the swearing of the jury and the swearing of the first witness occur nearly at the same point in time. Since the substance of the right has been clearly preserved, then the object of the constitutional provision guaranteeing that the defendant shall not be placed in jeopardy twice has been met. *433 As the Montana Supreme Court stated in Cunningham, supra, 535 P.2d at 189: "We find no substantial difference between the two rules. Montana policy as enunciated by its legislature is that the trial does not start until the first witness is sworn. Sound policy reasons exist for this rule, principally that the jury as the trier of the facts has nothing to consider until the first witness is called and sworn. This appears entirely consistent with the constitutional standard that jeopardy does not attach until the defendant has been put to trial before the trier of the facts. Serfass v. United States (1975), supra [420 U.S. 377, 95 S.Ct. 1055, 43 L.Ed.2d 265]." The Court, noting that they could perceive no inherent merit in the federal rule over Montana's state law, further stated: ". . . It has been said that the federal rule is designed to prevent prosecutorial manipulation. Illinois v. Somerville [88 Ill.App.2d 212, 232 N.E.2d 115], supra. It has further been said that the federal rule guarantees the defendant his valued right to have his trial completed before the tribunal and jury selected for his case. Wade v. Hunter (1949) 336 U.S. 684, 69 S.Ct. 834, 93 L.Ed. 974; United States v. Jorn, supra [400 U.S. 470, 91 S.Ct. 547, 27 L.Ed.2d 543 (1971)]. "We fail to see in what manner the federal rule protects against these abuses to a greater extent than Montana law. Prosecutorial manipulation can be effected as readily under one rule as under the other. If bent on manipulation, a federal prosecutor can move to dismiss after the jury is selected but before it is sworn, as readily as a state prosecutor can move to dismiss after the jury is sworn but before the first witness is called. In either case, the real protection against prosecutorial manipulation is the discretion of the trial judge in granting or denying dismissal. Here, for example, the judge could have, but did not, dismiss with prejudice. "Nor do we see any greater protection in the federal rule as far as securing to defendant the right to have his trial completed before the court and jury selected to try his case. Montana adheres to this principle also. It all depends on when the trial is considered to have commenced — whether on selection and swearing of the jury as in the federal courts, or on swearing the first witness as in Montana state courts." Cunningham, supra, at 188. The United States Supreme Court has never rendered any blanket holding to the effect that a State could not decide at what point jeopardy has attached. The petitioners have cited Breed v. Jones, 421 U.S. 519, 95 S.Ct. 1779, 44 L.Ed.2d 346 (1975), which they contend holds that the States cannot decide for themselves when Fifth Amendment jeopardy attaches. This is clearly not the holding of that case. The sole issue in that case was whether a juvenile court adjudication constituted a trial, thereby establishing double jeopardy on a subsequent adult trial for the same offense. The Court, addressing itself primarily to the unique nature of juvenile proceedings and the legal rights of juveniles, concluded that such a proceeding was, in fact, like a trial and jeopardy attached. Nowhere in the opinion does the Court baldly assert that a State cannot determine at what point a trial commences. Nor does the Court ever attempt to impose any federal procedural rule upon the California Juvenile Court. The sole concern in Breed, as it is in the instant case, is not whether federal procedures were followed, but whether federally guaranteed rights were violated. The Arizona Supreme Court, faced with the same conflict between federal and state rules, upheld the constitutionality of their own state rule. The Court concluded: "The United States Supreme Court has held that the double jeopardy clause of the Fifth Amendment to the United States Constitution is applicable to the States. [Citations omitted.] *434 They did not define what constituted jeopardy and we believe the States are still allowed a certain degree of discretion as to what amounts to jeopardy. We hold, as a matter of law, that jeopardy had not attached in this case." State v. Padilla, 107 Ariz. 134, 483 P.2d 549, 553 (1971); cert. den. 404 U.S. 1049, 92 S.Ct. 718, 30 L.Ed.2d 740 (1971). I agree with that Court's holding. Therefore, I conclude that the statute does not violate the United States Constitution nor the Montana Constitution, Article II, Section 25. State of Montana v. Cunningham, supra, 535 P.2d 186. B. Manifest Necessity. Assuming that jeopardy attaches in state proceedings when the jury is sworn, the doctrine of manifest necessity would nevertheless require that a further trial be held as to petitioners Bretz and Cline. The State alleges in its brief and oral argument that petitioners were well aware of a typographical error as to one count in the information — specifically, a date of 1973 which had inadvertently been typed "1974". The State continues that the petitioners, knowing of this error, waited until the jury was sworn and then moved for dismissal. The State, considering that it was the most important of the nine counts, dismissed the remaining eight counts and refiled the information charging two counts — alternative pleading of a single offense. The petitioners contend that their motion to dismiss was simply to require the prosecution to conform the evidence to the pleadings and that there was no reliance by the defendants on any defect in the pleadings. Regardless of how the parties attempt to characterize the factual situation, it appears that the flaw was nothing more than a typographical defect, which should not bar the continuation and completion of the trial. The United States Supreme Court has been confronted with similar situations. In concluding that jeopardy had not attached, the Court in Illinois v. Somerville, 410 U.S. 458, 93 S.Ct. 1066, 35 L.Ed.2d 425 (1973), stated: ". . . The interest of the public in seeing that a criminal prosecution proceed to verdict, either of acquittal or conviction, need not be forsaken by the formulation or application of rigid rules that necessarily preclude the vindication of that interest. This consideration, whether termed the `ends of public justice,' [citation omitted] or, more precisely, `the public's interest in fair trials designed to end in just judgments,' [citation omitted] has not been disregarded by this Court." Somerville, supra, at 463, 93 S.Ct. at 1070. To prevent the refiling of an information and subsequent trial as the result of such a typographical defect certainly precludes the public's interest in a fair trial designed to end in a just judgment. As the Ninth Circuit recently stated: "To adopt appellee's argument would require a mechanical formula to determine when jeopardy attaches. This approach well could undermine the policies and purposes of the constitutional safeguard. `Whether jeopardy attaches is based on flexible policy considerations rather than hard and fast rules . . .' United States v. Brown, 481 F.2d 1035, 1040 (8 Cir. 1973); see Illinois v. Somerville, 410 U.S. 458, 467, 93 S.Ct. 1066, 35 L.Ed.2d 425 (1973); United States v. Jorn, supra, at 480, 91 S.Ct. 547." U. S. v. Choate, 527 F.2d 748, 1975. Therefore, it is ordered that the petitions for writs of habeas corpus are denied.
{ "pile_set_name": "FreeLaw" }
Q: How can i see the live parse tree using Antlr4 Ide in Eclipse? I'm new using Antlr4 but I know that exist a plugin for Eclipse. I have a simple question...After I created the g4 file how can I visualize the live parse tree in order to see the tree of an input expression? Thanks A: After installing Antlr4Ide plugin in Eclipse: Window>Show View>Other, Antlr4>Parse tree Activate g4 file Click parsing rule in g4 file, Parse tree now shows active rule above source editor box In the parse tree view you see a live source editor on the left, with syntax highlighting for your language. When you enter code in your language there, the tree will update on the right. The antlr console shows parsing errors at the same time. A: Currently there is no provision for viewing live parse tree in ANTLR 4 IDE for Eclipse. Meanwhile, you can see the parse tree using -gui switch in the command line. It also provides a feature of saving the parse tree as PNG.
{ "pile_set_name": "StackExchange" }
*-180. -540 Multiply -0.4 and -0.00179. 0.000716 -100 * -0.03 3 Multiply -0.3 and -0.956. 0.2868 20*0.1 2 -0.3 times 101.9 -30.57 Product of -0.2 and 0.702. -0.1404 -0.2 times 0.149 -0.0298 Calculate -0.0282*0.1. -0.00282 Work out -3 * 0.45. -1.35 Product of 4.2 and -55. -231 Product of -159 and 0.5. -79.5 Calculate 0.4*1.53. 0.612 What is the product of 0.5 and 2003? 1001.5 7 * -0.04 -0.28 503 * 0.4 201.2 Multiply 4.267 and 2. 8.534 Multiply -1 and 5542. -5542 -23 * 5 -115 Work out 0.23221 * -2. -0.46442 What is -25 times -0.8? 20 What is 4 times -276? -1104 Product of 620 and -1. -620 0.3*1.4 0.42 0.004*0.03 0.00012 What is the product of -46.5 and 0? 0 Product of 1.52 and -0.3. -0.456 What is 7 times -0.04? -0.28 What is 0.3 times -441? -132.3 -0.4*-7.9 3.16 0.4*8.38 3.352 Product of -2 and -4. 8 Calculate -0.1*27.1. -2.71 Calculate -0.6*-0.4. 0.24 Work out -6 * -15.37. 92.22 What is 37 times -28? -1036 What is the product of 0.1 and 0.0348? 0.00348 Multiply -0.5 and -1304. 652 What is the product of 0.1 and 5? 0.5 Product of 0 and -172.9. 0 0.4 * 33 13.2 -68751*0.4 -27500.4 What is -0.1 times 11.7? -1.17 What is the product of 28 and -0.5? -14 26449 times 0.5 13224.5 Work out -1 * -8. 8 Product of 3305 and 4. 13220 Product of -322 and -0.2. 64.4 Calculate -44*16. -704 0.06*1715 102.9 3 * -0.507 -1.521 Multiply -2.73 and 1.3. -3.549 Product of 0 and 0.0553. 0 Calculate 0.02145*-0.5. -0.010725 What is the product of -1596 and 4? -6384 0.1 * 22 2.2 Calculate -0.4*-1556. 622.4 -0.2*27 -5.4 What is 10 times -241? -2410 0.7 * 1044 730.8 What is the product of 14 and -3.5? -49 Product of 0.003 and -10. -0.03 What is 363 times 12? 4356 Product of 187 and -2. -374 What is 8 times -233? -1864 What is the product of -3779 and -0.1? 377.9 0.02 * -0.078 -0.00156 -888*-0.3 266.4 Product of 0.653 and -0.4. -0.2612 What is 5 times 5.049? 25.245 -1.395 * -0.1 0.1395 Multiply -0.7 and -3.9. 2.73 -290 * 0.1 -29 What is the product of -1.4 and 231? -323.4 137 * -0.12 -16.44 What is the product of -12 and 1.5? -18 What is 0.4 times -0.0917? -0.03668 Work out 36.8 * 2.5. 92 0.6 times 23 13.8 470 times 4 1880 Work out 5 * 21. 105 What is the product of 0.2 and 36? 7.2 What is the product of -43 and 4? -172 -5 * -0.353 1.765 Product of -1.33 and -3. 3.99 What is the product of 0.219 and 1? 0.219 Calculate 0.2*0.01719. 0.003438 What is -2 times -5.79? 11.58 Work out 0.778 * -6. -4.668 What is the product of 0.1 and 121? 12.1 What is -96 times 0? 0 Product of -0.217 and -3. 0.651 Product of 0.2 and -0.013. -0.0026 Product of 0.3 and -15. -4.5 Calculate 0.8*-1.3. -1.04 What is the product of 4 and -147? -588 Work out 3 * 0.017. 0.051 Calculate -142*4. -568 What is -3.47 times -0.5? 1.735 Work out 0.259 * 10. 2.59 Calculate -1.74*0.09. -0.1566 Calculate -0.13*1. -0.13 -970 * -0.3 291 7152 * 5 35760 Multiply -3 and -0.366. 1.098 Calculate -0.03*-112.3. 3.369 Calculate 1.1*4. 4.4 Work out 3.4 * 208. 707.2 What is the product of 4.6 and -4? -18.4 What is 252 times 0? 0 Calculate -1.7*-10. 17 0.46 * -14 -6.44 Product of 2 and -0.0193. -0.0386 -98 * 0.2 -19.6 Product of 0.07287 and 0. 0 -107*-0.064 6.848 -0.2 times 2.53 -0.506 What is 42 times 0.5? 21 Work out 25 * 0.9. 22.5 What is 2.52 times 0.1? 0.252 What is -2 times -15? 30 Calculate -1*0.21. -0.21 Work out -0.063 * 0.7. -0.0441 What is 1.76 times 0.1? 0.176 What is 0.139 times -0.5? -0.0695 Work out 0.0612 * 6. 0.3672 Product of 8 and -43. -344 Calculate 3*-1639. -4917 18 times -10 -180 3907 * -0.6 -2344.2 What is -0.1 times 265? -26.5 Multiply 0.5 and -42. -21 What is 0.4 times 20? 8 428*1.5 642 Product of 0 and 7399. 0 0.037*0.028 0.001036 Calculate 0.069*-23. -1.587 16.2 times -1.65 -26.73 What is 0.347 times -0.4? -0.1388 What is the product of -1 and 0.04? -0.04 What is 179 times 7.5? 1342.5 Work out 0 * -233. 0 Multiply -1 and -0.0649. 0.0649 -0.4*7.9 -3.16 49*-1.8 -88.2 What is -75 times -6? 450 0*-0.68 0 Multiply -3 and -5.7. 17.1 Product of 1320 and -5. -6600 Work out 0.4 * -241. -96.4 What is -14 times -5? 70 Multiply -0.4 and 81. -32.4 Product of -0.1 and 13. -1.3 What is the product of 0.3 and -4571? -1371.3 -0.05*-0.18 0.009 163 * -0.6 -97.8 60 * 0.3 18 -144 times 0.02 -2.88 What is -4 times -728? 2912 5 times -39 -195 Calculate 0.3*-5474. -1642.2 Product of -0.231 and 4. -0.924 Calculate -57*0.1. -5.7 Product of 0.4 and 298. 119.2 Multiply 4.9 and -0.7. -3.43 Multiply 0.3 and 2.5. 0.75 -0.174 * 1.62 -0.28188 Product of -19.3 and -2. 38.6 Multiply -5 and 0.674. -3.37 -215 times -9 1935 Calculate 0.1325*-0.4. -0.053 What is the product of -984 and -7? 6888 Product of -0.2 and 0.322. -0.0644 Calculate 0.04*-2.76. -0.1104 -1.2 * -0.243 0.2916 Multiply 3 and -16.86. -50.58 Multiply -0.234 and 3. -0.702 Work out -0.093 * 0.38. -0.03534 Product of -0.2 and 0.036. -0.0072 What is the product of -0.31 and 64? -19.84 What is 0.031 times -0.7? -0.0217 0 * 4.93 0 Work out -16 * -296. 4736 What is the product of -2.296 and 0.2? -0.4592 0.3 times 31 9.3 What is 0.058 times -46? -2.668 -0.06 times -123 7.38 -4*-0.0231 0.0924 3.98*0.08 0.3184 Product of 0.212 and 2. 0.424 Multiply 0.031 and -0.02. -0.00062 Multiply -1.77 and -35. 61.95 89.3 times 1 89.3 What is the product of -3 and 0.12? -0.36 Multiply -447 and 1. -447 Multiply -2 and -0.048. 0.096 What is 284 times -7? -1988 Calculate -35*0.11. -3.85 10 * -0.71 -7.1 Work out -0.4 * 1913. -765.2 Calculate 1181*16. 18896 Multiply -0.03 and -6.72. 0.2016 -0.1 times 0.1379 -0.01379 Product of -11835 and -0.2. 2367 -2 * -10.96 21.92 What is the product of -0.1 and -0.55? 0.055 Calculate -0.3*40.3. -12.09 5 times 298.2 1491 40 * -0.2 -8 118*-0.2 -23.6 Work out -0.02 * -58. 1.16 -3720*0.4 -1488 Product of 5 and -14. -70 What is the product of 0.08 and 1? 0.08 What is 0.12 times -0.3? -0.036 What is 2 times 1.864? 3.728 Work out 0.02 * -140.6. -2.812 0.5 * 926 463 What is -2 times 0.412? -0.824 What is the product of -3 and 0.37? -1.11 Product of 15485 and -0.2. -3097 Calculate -4*-0.219. 0.876 -140 times -5 700 What is the product of -12 and 7.2? -86.4 What is -50 times -0.07? 3.5 What is the product of 7 and -0.2496? -1.7472 -4.3*2 -8.6 Multiply -67 and 22. -1474 -25.2 * 14 -352.8 Multiply -0.5 and 2.6. -1.3 -58*-0.07 4.06 19 times 2 38 7788 * 0 0 What is -0.1 times 37.49? -3.749 What is -0.3 times -2.593? 0.7779 Multiply -0.04 and 0.1. -0.004 Calculate 0.043*3. 0.129 479 * -11 -5269 What is -4 times -1548? 6192 What is the product of -1 and 101? -101 What is the product of 1 and -4.1? -4.1 Product of -13 and -3. 39 Work out -2 * -2478. 4956 What is the product of 383.3 and 5? 1916.5 Product of 198 and 6. 1188 223*3 669 What is the product of -53 and -27? 1431 What is the product of 31.3 and 0.3? 9.39 What is 1 times 3.44? 3.44 What is the product of -1.55 and 0.5? -0.775 Calculate 0.3*-1159. -347.7 Product of -14 and -8.5. 119 What is the product of 2 and 0.027? 0.054 Calculate 0.009*0.08. 0.00072 141.1 * 2 282.2 Work out -2.4 * -0.05. 0.12 Work out -1 * 0.1442. -0.1442 Work out -0.26 * 23. -5.98 Multiply -1 and -292. 292 What is -0.09 times 1? -0.09 -0.5 times 283 -141.5 Product of -0.7 and 18. -12.6 -2.2 * 4 -8.8 -0.7 times -7.5 5.25 Work out 0.103 * -3.9. -0.4017 What is the product of 0.5 and -1424? -712 1*43 43 Product of 0.6 and 3252. 1951.2 Product of -5 and -2768. 13840 17 times 0.17 2.89 -24*-8.1 194.4 Calculate -438*0.4. -175.2 -617.2 times 0.3 -185.16 Product of 10327 and 4. 41308 Multiply -45 and -0.7. 31.5 Product of -34 and 18. -612 Calculate -0.1773*1. -0.1773 Multiply -4.4 and 2. -8.8 Work out -14 * 0.7. -9.8 Product of 5.18 and 0.1. 0.518 0.34 * 4 1.36 Calculate -0.4*733. -293.2 Product of 25 and -0.0428. -1.07 What is the product of 3.88 and -0.2? -0.776 -12*3.9 -46.8 Work out 324 * 0.04. 12.96 -0.001 * 4 -0.004 178 * 5.8 1032.4 -2*-121 242 Multiply 7.1 and 4. 28.4 Work out 0.11 * -246. -27.06 Work out -4 * -76. 304 -0.64 * 1 -0.64 What is the product of 1 and 100? 100 5*-15 -75 Calculate 148*0.3. 44.4 -255.7*-0.2 51.14 Product of 4 and 9.47. 37.88 Calculate 8*111. 888 -0.3 * -0.066 0.0198 2.99 times -1 -2.99 -76*-8 608 Calculate 1*4.9. 4.9 Calculate -0.5*101. -50.5 Product of 5.355 and 0.5. 2.6775 Multiply 564 and -0.3. -169.2 -3 * 106 -318 Produc
{ "pile_set_name": "DM Mathematics" }
Hydraulix Cherry Picker Build your own hydraulic cherry picker ! Hydraulix is an extremely original range which enables children to learn about hydraulics during play. They learn how to build up hydraulic equipement and how it operates.Afterwards they can use it to play and to have great fun. Dimensions : 26x17x5,5 cm Hydraulix has 4 models : An excavator , a cherry picker , platform lift and a scissor lift. Made from wood.
{ "pile_set_name": "Pile-CC" }
Pseudomonas aeruginosa PAO1 bacterial artificial chromosomes: strategies for mapping, screening, and sequencing 100 kb loci of the 5.9 Mb genome. Pseudomonas aeruginosa is an opportunistic bacterial pathogen frequently found in nosocomial infections and is a major cause of morbidity and mortality in patients with cystic fibrosis. To facilitate molecular studies of this organism, we have generated a bacterial artificial chromosome (BAC) library. Genomic DNA was isolated from the prototype strain PAO1, partially digested with HindIII, size selected after pulsed-field gel electrophoresis, and used to construct a BAC library using the pBeloBAC11 vector. DNAs from approximately 850 clones, representing more than 9.5-fold physical coverage of the 5.9-Mb PAO1 genome, were analyzed after SpeI and HindIII digestions and agarose gel electrophoresis. The BAC library had clones with insert fragments ranging from 20 to more than 290 kb. A subset of 264 BACs having inserts > 80 kb, representing > 4 genome equivalents, were rearrayed into 96-well plates, and a clone pooling and PCR screening strategy was developed. The PCR library screening enabled the identification and recovery of BACs containing genes implicated in cell division and in cell wall biosynthesis, as well as a series of known genes mapping to different regions of the PAO1 chromosome. A physical and genetic map was constructed for the 98-kb pMOC5 BAC clone, which spans the entire fts-mur locus. Chromosome walking from each end of the pMOC5 clone placed it within a contig spanning 243 kb. The BAC library and screening resources now allow a PCR-based screening of a P. aeruginosa genomic library for any gene of interest. The restriction fragment analysis of overlapping clones indicated that BAC clones stably maintain and propagate Pseudomonas DNA, providing evidence that the PAO1 BAC library is an appropriate reagent for genome sequencing.
{ "pile_set_name": "PubMed Abstracts" }
Q: Strange gradle error android studio Error:org.gradle.api.internal.changedetection.state.DefaultFileCollectionSnapshotter$FileCollectionSnapshotImpl cannot be cast to org.gradle.api.internal.changedetection.state.OutputFilesCollectionSnapshotter$OutputFilesSnapshot Possible causes for this unexpected error include:Gradle's dependency cache may be corrupt (this sometimes occurs after a network connection timeout.) Re-download dependencies and sync project (requires network)The state of a Gradle build process (daemon) may be corrupt. Stopping all Gradle daemons may solve this problem. Stop Gradle build processes (requires restart)Your project may be using a third-party plugin which is not compatible with the other plugins in the project or the version of Gradle requested by the project.In the case of corrupt Gradle processes, you can also try closing the IDE and then killing all Java processes. A: I solved this by deleting appDirectory/.Gradle/2.10 and then use sync project with gradle
{ "pile_set_name": "StackExchange" }
Q: Finding orthogonal basis in $\mathbb R^4$ from given vectors I have two subsets of $\mathbb R^4$ $S=((-1,0,1,1),(0,1,1,1),(1,0,0,1))$ and $T=(x,y,z,x-y+2z)$ I've proved that T is a subspace of $\mathbb R^4$ and that S is a basis for T. So far, so good! I have to show that 2 of the vectors are orthogonal, which I have done, namely $(-1,0,1,1)$ and $(1,0,0,1)$ as their product is equal to zero. I now need to find an orthogonal basis for "T". I presume I need to use Gram-Schmidt process, but am struggling as to how to find two more orthogonal vectors to start with. Would any starting vector need to be in the form $(x,y,z,x-y+2z)$? Any hints/help much appreciated! A: Why two more vectors? Since $\dim T=3$, you only need one more vector. So, apply Gram-Schmidt to $e_1=(-1,0,1,1)$, $e_2=(1,0,0,1)$, and $e_3=(0,1,1,1)$. The fact that $e_1$ and $e_2$ are orthogonal will make your computations easier.
{ "pile_set_name": "StackExchange" }
Important information Suitable for: We've designed this course to appeal to all major roles on a data warehouse project on the Microsoft platform. It's for data warehouse team managers, system architects, ETL system architects and developers, data warehouse operational staff, and BI application designers and developers. Course programme A data warehouse is a collection of data gathered and organized so that it can easily by analyzed, extracted, synthesized, and otherwise be used for the purposes of further understanding the data. It may be contrasted with data that is gathered to meet immediate business objectives such as order and payment transactions, although this data would also usually become part of a data warehouse.
{ "pile_set_name": "Pile-CC" }
519 P.2d 360 (1974) Jana K. HOTCHKISS, by her father and next friend, C. W. Hotchkiss, et al., Petitioners, v. Deborah Ann PREBLE and Parker E. Preble, Respondents. No. C-356. Supreme Court of Colorado, En Banc. February 19, 1974. Harden & Napheys, Ralph B. Harden, Fort Collins, for petitioners. Yegge, Hall & Evans, Don R. Evans, Robert W. Harris, Denver, Fischer & Wilmarth, Fort Collins, for respondents. *361 PRINGLE, Chief Justice. In this proceeding, certiorari was granted to review the decision of the Court of Appeals in Hotchkiss v. Preble, Colo. App., 508 P.2d 397. The case arises out of an automobile accident wherein the defendant-respondent was the driver and plaintiff-petitioner was her passenger. The issue for review involves the application of the "guest" statute, C.R.S.1963, 13-9-1. The trial court submitted to the jury in the form of a special interrogatory the issue of whether petitioner was respondent's guest. The jury found that the host-guest relationship did not exist and returned a verdict for petitioner. The Court of Appeals held that, as a matter of law, petitioner was a guest within the meaning of the statute and that it was reversible error to have submitted the issue to the jury. Petitioner contends that the Court of Appeals erred in holding that the petitioner was a guest as a matter of law. The evidence shows that the petitioner and respondent had been friends for some time prior to the accident. The girls had taken a number of trips together where petitioner had been respondent's passenger and was expected to and did pay her share of the cost of the gasoline used. In December 1969, respondent invited petitioner to go with her to Steamboat Springs for a skiing holiday. The girls decided that respondent would purchase the gasoline for the trip to Steamboat Springs and petitioner would pay for the gasoline on the way back. Respondent purchased the gasoline, and they went to Steamboat Springs. There the girls stayed with respondent's parents in their trailer. On the day of the accident, respondent's father had occasion to use his daughter's car, and he filled it with gasoline. Because of electrical problems in the trailer, the girls were told they could not stay in the trailer after the parents' departure. Thus, respondent decided to go to Craig to have a duplicate key made for the trailer so she and the petitioner would be able to stay in the trailer without the parents' knowledge. The girls went to Craig and on the return trip the collision occurred, resulting in petitioner's injuries. We begin by pointing out that it is not the passenger who must establish that he was not a guest, but rather it is the person who is relying on the "guest" statute who has the burden of establishing that the passenger was a guest. Houghtaling v. Davis, 140 Colo. 327, 344 P.2d 176; Dobbs v. Sugioka, 117 Colo. 218, 185 P.2d 784. The general rule is that a person is not a guest if he confers a benefit upon the owner or operator of a car which is sufficiently real, tangible and substantial and is an inducing cause for furnishing the transportation. Klatka v. Barker, 124 Colo. 588, 239 P.2d 607. Sharing expenses of an automobile trip is an incident of a relationship between passenger and driver which may negate the guest-host relationship required under the "guest" statute. See Eads v. Spoden, 172 Colo. 231, 472 P.2d 131. Here there was evidence from which the jury could find that such a sharing expense situation existed, that it was a real, tangible and substantial benefit to the driver, that an inducing cause to the driver to take this passenger was her agreement to share the expenses, and that it was of mutual benefit to both parties. This is in contra-distinction to Mears v. Kovacic, 152 Colo. 362, 381 P.2d 991, where the arrangement was made as a favor to the passenger and for his sole benefit. It is, of course, not necessary that the payment be the only cause or even the primary inducement for the carrying of the passenger to exempt the relationship from one of guest and host. There was sufficient evidence here to, at least, go to the jury on the question of whether the guest-host relationship existed here. Under such circumstances, an appellate court may not substitute its judgment for that of the jury. The judgment of the Court of Appeals is reversed and the case is remanded to the *362 Court of Appeals for determination of the other issues raised therein. GROVES and ERICKSON, JJ., concur in the result. GROVES, Justice and ERICKSON, Justice (concurring in the result): In our view, the effect of this opinion is to overrule Mears v. Kovacic, 152 Colo. 362, 381 P.2d 991 (1963), and it should be overruled.
{ "pile_set_name": "FreeLaw" }
West Street Cemetery West Street Cemetery (also known as Farnham Civil Cemetery) on West Street in Farnham in Surrey is one of four cemeteries in the Farnham area owned and maintained by Farnham Town Council. The two Cemetery chapels have been Grade II listed buildings on the Historic England Register since 1990. History A Burial Board was formed in Farnham in 1853 with the view to opening a cemetery in the town. The Board originally considered three plots of land in Farnham and at first accepted land at Willey Mill from Charles Knight; however, the total cost including the building of the two chapels would have cost nearly £3,500 and the Vestry would only sanction £3000. In May 1855 the Vestry suggested an alternative piece of land from Knight but the negotiations broke down so a plot of 15.8 acres in West Street was eventually bought from Thomas Pearce at a cost of £1200 plus £125 to buy out a Mr Mathers, a tenant on the site at the time. The Cemetery Lodge located at the original gates was built by Goddards of East Street in Farnham. The Cemetery opened in 1856. A Richard Wooderson was appointed Sexton on £10 per annum, and he moved into the Lodge on 1 May 1856 with the first burial taking place on 3 May that year; during the first decade of the Cemetery's existence there were about 80 to 90 burials a year. A newspaper report of 1931 records that four men were employed at the Cemetery. The Lodge became the first project of the Farnham Trust; the building having been condemned by Farnham Urban District Council (FUDC) the members of the Farnham Trust leased the building from FUDC, restored it and let it to a tenant. By 1980 additional restoration work was needed when internal dry rot was found. A long lease from Waverley District Council was obtained and the Trust then sold the lease. The Lodge is now privately owned, and a new lodge has been built at the new entrance further along on the West Street frontage. In about 1870 the two chapels were built, one for Church of England services and the other for Nonconformist services. The Cemetery came under the control of the Joint Burial Committee in 1895 and Farnham Council on 27 July 1926. In 1947 an additional area of 16.2 acres was obtained of which 9.6 acres were turned over to the Cemetery for use as an additional area for burials. This new burial ground is beyond a vintage brick wall which bisects the two halves of the Cemetery. A report in 1947 records that common graves with a single burial at 6 ft could be reused after about 14 years. After passing into the hands of Waverley District Council it was transferred to Farnham Town Council in 2006. The West Street Garden of Reflection is a quiet area where people may sit and reflect. There are a number of military burials of all three Services maintained by the Commonwealth War Graves Commission - 23 from World War I and 17 from World War II. The Cemetery Chapels The Cemetery chapels were built of random rubble with Bath stone window surrounds and a slate roof in about 1870 in the Gothic style. The front has two gables divided by a central gabled bell-cote while the rear elevation has three gables. The chapels were provided with plain wooden altars and pews. By 2013 the chapels were disused and a meeting was held to discuss their future - whether they should be converted for use as workshops, homes or community centres. Today (2019) the Chapels are used by a local designer who uses it as a workshop. Notable burials John Morgan Cobbett (1800-1877), son of William Cobbett and MP for Oldham (1872-1877) Mike Hawthorn (1929–1959), British racing driver who became the United Kingdom's first Formula One World Champion driver in 1958 References External links West Street Cemetery - Find a Grave Category:Farnham Category:Cemeteries in Surrey Category:Commonwealth War Graves Commission cemeteries in England Category:Buildings and structures in Farnham Category:1856 establishments
{ "pile_set_name": "Wikipedia (en)" }
Phytalmia mouldsi Phytalmia mouldsi is in the subfamily Phytalmiinae which includes all of the antlered fruit flies. They were discovered by M. S. Moulds in 1977 and are found only in an isolated rainforest of Australia. Antlered flies, collectively, are notable for their unique mating behavior and the unusual antler-like extensions on the heads of the males. Description This species exhibits sexual dimorphism where the females and males look different from one another. The males have red, paddle-shaped, antler-like protrusions on their cheek region that will bend under pressure. The females have no antlers. The males are generally larger than the females and have longer back legs than females. The male characteristics (size, long back legs, antlers) are most likely a result of sexual selection. The longer back legs and larger size give males an advantage when engaging in vertical pushing contests with other males. Females have a smaller rear to foreleg ratio because they do not engage in pushing contests. Antler size is strongly correlated with body size in males. It is hypothesized that antlers developed as size indicators and not as weapons so that the males can avoid wasting time and energy in fights against larger males. Also, males have pronounced spines on their fore femurs that are used to grip females. Range Phytalmia mouldsi lives only in one rainforest area on the northeast coast of the Cape York Peninsula of Australia. They lay their eggs and the larvae only eat one specific species of decaying tree: Dysoxylum gaudichaudianum. Mating behavior Phytalmia mouldsi uses a resource defense mating system. In this system the males search for a desirable spot for the females to deposit their eggs, and then they guard that spot and await interested females. They will fight off other males who want that spot even while mating with or guarding a female. When a female approaches the male will extend its wings out and keep the female from reaching the oviposit site. The male will then mount the female and latch on behind the wings of the female. This is called a “wing-lock.” The male will hold onto the female in this way during copulation and while the female is ovipositing. This way the male can protect his egg site and the female from other males. If one male challenges another male for his site or his female the males will judge each other and if one is substantially smaller than the other the smaller one will forfeit without a fight. If the males are equally sized, however, they will engage in a shoving contest in which they stand on their hind four legs and shove each other with their epistomal margins of their heads pressed together. This “stilting” has been observed in several other species of fruit flies. Their antlers are not used to jab or push as in some other species of antlered flies; instead the antlers are used more as a tool to judge the size of one’s opponent. If a male is significantly smaller than his opponent it would not be worth his energy to compete and lose. After copulation and ovipositing, the male will release the female from the “wing-lock” and the two will part ways. The male will stay to protect the egg site, sometimes for several days, waiting for more females to come by. The female will likewise search for more oviposition sites and encounter more guarding males. Experimentation When antlers were removed or shortened the larger males were still more successful in encounters with other males (larger males won 75 percent of the time). However, larger males with their antlers removed engaged more often in energy-consuming stilting contests than males of comparable size with intact antlers. This suggests that the males do use antler size to judge to size of their opponent when deciding whether to engage in a fight. A similar phenomenon is seen in other parts of the animal kingdom. Most similar are stalk-eyed flies; the males compare eye stalk spans to determine the winner and avoid an energy-consuming encounter (6). Evolution of antlers in Phytalmiinae It is hypothesized that antlers in flies evolved several times because the antlers serve different purposes in other antlered fly species. Other species use antlers to push or prod their opponent whereas the P. mouldsi uses them only to size-up their opponent. In fact, P. mouldsi has the least complex antlers of the Phytalmiinae subfamily. The six other antlered species in Phytalmiinae include P. cervicornis, P. alcicornis, P. biarmata, P. megalotis, P. antilocapra, and P. robertsi. Recent research about antlered flies In 2005, a study was conducted on several species of Phytalmia to determine is environmental stresses negatively impacted development of antlers. It was hypothesized that the stresses, specifically deforestation, would cause the males to grow more asymmetrical antlers. Only one species, Phytalia biarmata, showed increased asymmetry in deforested areas; so, the data did not strongly support the hypothesis. References External links Author. Title. Publisher, date. Category:Diptera of Australasia Category:Phytalmiinae
{ "pile_set_name": "Wikipedia (en)" }
Menu appetizer Easy Mini Pizzas A kid-friendly snack or a quick and easy dinner idea. So versatile, because you can use English muffins, prepared pizza crusts or flatbreads for the crust -- then add on an assortment of favorite toppings. A kid-friendly snack or a quick and easy dinner idea. So versatile, because you can use English muffins, prepared pizza crusts or flatbreads for the crust -- then add on an assortment of favorite toppings.
{ "pile_set_name": "Pile-CC" }
NOTE: ->*nix Systems: use the configure script and everything should work without problems. ->MSW: FIRST you need the mingw compiler (i think cygwin must work too, but you will have to modify the configure.in and change MINGW32 for CYGWIN) Then, run configure and pray. If it finds everything it needs (the only thing missed may be the pthreads library) is ready to compile. Basic Installation ================== These are generic installation instructions. The `configure' shell script attempts to guess correct values for various system-dependent variables used during compilation. It uses those values to create a `Makefile' in each directory of the package. It may also create one or more `.h' files containing system-dependent definitions. Finally, it creates a shell script `config.status' that you can run in the future to recreate the current configuration, a file `config.cache' that saves the results of its tests to speed up reconfiguring, and a file `config.log' containing compiler output (useful mainly for debugging `configure'). If you need to do unusual things to compile the package, please try to figure out how `configure' could check whether to do them, and mail diffs or instructions to the address given in the `README' so they can be considered for the next release. If at some point `config.cache' contains results you don't want to keep, you may remove or edit it. The file `configure.in' is used to create `configure' by a program called `autoconf'. You only need `configure.in' if you want to change it or regenerate `configure' using a newer version of `autoconf'. The simplest way to compile this package is: 1. `cd' to the directory containing the package's source code and type `./configure' to configure the package for your system. If you're using `csh' on an old version of System V, you might need to type `sh ./configure' instead to prevent `csh' from trying to execute `configure' itself. Running `configure' takes awhile. While running, it prints some messages telling which features it is checking for. 2. Type `make' to compile the package. 3. Optionally, type `make check' to run any self-tests that come with the package. 4. Type `make install' to install the programs and any data files and documentation. 5. You can remove the program binaries and object files from the source code directory by typing `make clean'. To also remove the files that `configure' created (so you can compile the package for a different kind of computer), type `make distclean'. There is also a `make maintainer-clean' target, but that is intended mainly for the package's developers. If you use it, you may have to get all sorts of other programs in order to regenerate files that came with the distribution. Compilers and Options ===================== Some systems require unusual options for compilation or linking that the `configure' script does not know about. You can give `configure' initial values for variables by setting them in the environment. Using a Bourne-compatible shell, you can do that on the command line like this: CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure Or on systems that have the `env' program, you can do it like this: env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure Compiling For Multiple Architectures ==================================== You can compile the package for more than one kind of computer at the same time, by placing the object files for each architecture in their own directory. To do this, you must use a version of `make' that supports the `VPATH' variable, such as GNU `make'. `cd' to the directory where you want the object files and executables to go and run the `configure' script. `configure' automatically checks for the source code in the directory that `configure' is in and in `..'. If you have to use a `make' that does not supports the `VPATH' variable, you have to compile the package for one architecture at a time in the source code directory. After you have installed the package for one architecture, use `make distclean' before reconfiguring for another architecture. Installation Names ================== By default, `make install' will install the package's files in `/usr/local/bin', `/usr/local/man', etc. You can specify an installation prefix other than `/usr/local' by giving `configure' the option `--prefix=PATH'. You can specify separate installation prefixes for architecture-specific files and architecture-independent files. If you give `configure' the option `--exec-prefix=PATH', the package will use PATH as the prefix for installing programs and libraries. Documentation and other data files will still use the regular prefix. In addition, if you use an unusual directory layout you can give options like `--bindir=PATH' to specify different values for particular kinds of files. Run `configure --help' for a list of the directories you can set and what kinds of files go in them. If the package supports it, you can cause programs to be installed with an extra prefix or suffix on their names by giving `configure' the option `--program-prefix=PREFIX' or `--program-suffix=SUFFIX'. Optional Features ================= Some packages pay attention to `--enable-FEATURE' options to `configure', where FEATURE indicates an optional part of the package. They may also pay attention to `--with-PACKAGE' options, where PACKAGE is something like `gnu-as' or `x' (for the X Window System). The `README' should mention any `--enable-' and `--with-' options that the package recognizes. For packages that use the X Window System, `configure' can usually find the X include and library files automatically, but if it doesn't, you can use the `configure' options `--x-includes=DIR' and `--x-libraries=DIR' to specify their locations. Specifying the System Type ========================== There may be some features `configure' can not figure out automatically, but needs to determine by the type of host the package will run on. Usually `configure' can figure that out, but if it prints a message saying it can not guess the host type, give it the `--host=TYPE' option. TYPE can either be a short name for the system type, such as `sun4', or a canonical name with three fields: CPU-COMPANY-SYSTEM See the file `config.sub' for the possible values of each field. If `config.sub' isn't included in this package, then this package doesn't need to know the host type. If you are building compiler tools for cross-compiling, you can also use the `--target=TYPE' option to select the type of system they will produce code for and the `--build=TYPE' option to select the type of system on which you are compiling the package. Sharing Defaults ================ If you want to set default values for `configure' scripts to share, you can create a site shell script called `config.site' that gives default values for variables like `CC', `cache_file', and `prefix'. `configure' looks for `PREFIX/share/config.site' if it exists, then `PREFIX/etc/config.site' if it exists. Or, you can set the `CONFIG_SITE' environment variable to the location of the site script. A warning: not all `configure' scripts look for a site script. Operation Controls ================== `configure' recognizes the following options to control how it operates. `--cache-file=FILE' Use and save the results of the tests in FILE instead of `./config.cache'. Set FILE to `/dev/null' to disable caching, for debugging `configure'. `--help' Print a summary of the options to `configure', and exit. `--quiet' `--silent' `-q' Do not print messages saying which checks are being made. To suppress all normal output, redirect it to `/dev/null' (any error messages will still be shown). `--srcdir=DIR' Look for the package's source code in directory DIR. Usually `configure' can determine that directory automatically. `--version' Print the version of Autoconf used to generate the `configure' script, and exit. `configure' also accepts some other, not widely useful, options.
{ "pile_set_name": "Github" }
Thursday, 19 June 2008 ‘3 A.M.’ by WYCKHAM PORTEOUS (Cordova Bay CBR-0352) We all know the story, how Paul McCartney intended “Please Please Me” as a maudlin Roy Orbison-inspired ballad, but how George Martin thought different. He got them to speed it up, then speed it up some more, until it became the catchy spring-loaded Pop-anthem we know today. What Victoria DC-born singer-songwriter Wyckham Porteous does is rewind the tape. Slow it back down to their original Orbisong blueprint, his rasping drawl emphasised by the melancholy whine of John Ellis’ pedal steel, with the resonance of Steven Drake’s sitar to reference a later Beatles phase. And it works remarkably well, so well that it grabbed immediate listener-response when Bob Harris gave it a spin on Radio Two. Oddly so, because this is the same Wyckham who once said ‘it’s easier for me to create than to copy’ by way of explaining his early aversion to covers. In fact, he’s been around awhile with an already impressive rap-sheet of original songs, think ‘sexanddrinking’ (2001), and the original “3am” on ‘Looking For Ground’ (1996) produced by Austin-based Jimmy LaFave for the Bohemia Beat label. Yet each stand-out cover here is matched to original songs that shift around, nudging and colliding with each other like atoms in some diverse molecular structure. Songs awash with out-of-sync time-shifted narratives – ‘it’s 3am by your clock, and it’s midnight by mine’ which, in the hands of lesser lyricists might sound indulgent and angsty, a tone that starts from the opening words - ‘if you look around tonight, you see the world is not alright’, augmented by Angela Harris’ background voice and Ellis’ banjo. And after a while, just when you feel his pained vocals might start to grate, he pulls out a new take on Springsteen’s “Hungry Heart”, or Ben E King’s “Spanish Harlem” that sends you back to admire the lyric-sheet afresh. It’s difficult not to draw analogies – “Deep In The Water” has an early Cat Stevens “Father And Son” feel to it, the stand-out “Ancient Highway” is a Kerouac narrative come adrift from ‘Blood On The Tracks’ (“Shelter From The Storm” perhaps?), and the compelling “Young Man Walking” is ripped from the Leonard Cohen songbook. But, like he sings it, ‘there is truth in contradiction’, and his battered alt.country croon draws those well-worn roads together into thematic unity. Working towards this end there’s Immediate-veteran Andrew Loog Oldham out-back of the production desk, although he’s ditched the London ‘wall of sound’ that was once his specialty, in favour of a stripped-down predominantly acoustic set-up, 39:17-minutes laid down virtually live in three December days, with sympathetic additions input by a pool of well-honed musicians. We all know these stories, but a great tale is worth re-telling… Hull is a long way from Detroit. But late-winter 1966 I drive my Honda 305cc clear across from one side of Hull to the other, deep into the fringe-hazardous dockland old town, because the jukebox in the ‘Queens Head’ back-bar has the Miracles “Going To A Go-Go” on it, and we play it on repeat. Smokey Robinson wears many faces. He’s done this interview-thing before. How do you break through the fact that he’s talked to more journalists than are recommended for your mental health, and been asked every question you could possibly invent, plus countless more than you couldn’t? Only connect, perhaps by starting with a personal memory like that one? Check out the cuttings of old interviews. He tends to talk softly, politely. His voice is high and melodic, what more would you expect? When the mood takes him, he can provide answers that are way-briefer than the questions. ‘Yes’. ‘No’. Sometimes less. A nod of the head, stylishly of course, or a dismissive ‘uh-uh’. He’s been through this before. For you, this is the one-off you never thought you’d get to. He’s sitting down opposite you. Taller – at six foot, and neater, than you’d anticipated. Take a good look at his face. Light-skinned, light-green eyes. Unexpected, despite watching all that immaculate old TV concert-footage. The sharpest suits. The finest hooks. Film-clips and choruses that flash-flood you down nostalgia boulevard. So, another tour, more dates, don’t the attractions of performance ever get tedious? ‘Never, never, never, man. There’s always something left to do in show business. Another song, better than the last one. Another record. I love live work, it’s a big part of my life. The challenge goes on and keeps me feeling good. Retire? It would kill me!’The Miracles were Motown’s debut signing. William ‘Smokey’ Robinson was only seventeen, still scoring excellent grades at high school, when he first met Berry Gordy Jrn. Smokey had already written over a hundred songs, neatly typed into a school notebook, ‘and they were all rhymed up pretty good’. It was 1957. It was Smokey who suggested that ex-Boxer Gordy should use his songwriting royalties from hits by Jackie Wilson to set up and distribute his own records. So Gordy quit his day-job in the Ford factory, borrowed $600, and the Miracles dancey “Way Over There” became the first release on his upstart Tamla label at the very dawn of the sixties. Then “Shop Around” broke both group and label nationally – an R&B chart no.1, climbing to no.2 on the Pop chart, although it was issued on the distinctive black/silver London records for its UK debut. Gordy had struck multi-platinum, and the young Detroit North Ender went on to provide him with a multitude of hits. The Beatles’ second album features a stand-out version of Smokey’s “You’ve Really Got A Hold Of Me”, a song of addictive masochistic-dependency. Yet even before that, schoolgirl Popstrel Helen Shapiro had covered “Shop Around” on the old green Columbia label. Then the Rolling Stones did “My Girl”, before Otis Redding got around to it. The Stones also later covered “Going To A Go-Go” as well. It must have been bizarre for Smokey, in far-off Detroit, to suddenly discover his songs were being fanatically collected, performed, and recorded by long-haired beat groups somewhere on the far side of the Atlantic. When did he first become aware that there were foreign audiences devoted to his music? Stranger still, that as Motown was sophisticating black music into a slick radio-friendly Hitsville USA – a calculatedly vanilla ‘Sound Of Young America’, the Rolling Stones and their blue-eyed Soul ilk were breaking back through onto the American charts with a rawness directly derived from Motown’s older discredited Chess rivals in Chicago.When I saw the Beatles at the Hull ABC they’d deliberately selected Mary Wells as their guest support. The Fabs were big Motown-fans. And Mary Wells was Motown’s biggest star. She was the first Motown artist to chart in the UK, with “My Guy” – one of a number of songs Smokey wrote for her (“Two Lovers” was another). It must have been weirdly disconcerting for the other members of the Miracles to see Smokey giving away his finest songs to other artists. How did they react? He wrote hits clear across the Motown stable, from the Temptations (on the first volume of their ‘Greatest Hits’ eight of the twelve tracks are Smokey songs, including “The Way You Do The Things You Do”) to Marvin Gaye (“Ain’t That Peculiar”), from the Marvelettes (“Don’t Mess With Bill”), Four Tops (“Still Water (Love)”), and the Contours to The Jackson Five. Then artists beyond Motown began recording his songs too, Linda Ronstadt (“Ooo Baby Baby”), Elvis Costello (“Head To Toe”), Bryan Ferry (“Tracks Of My Tears”), Aretha and Otis, and much more of the same, and that’s no shame. Someone estimated around four-thousand songs in total. So how did that operate? Did he specifically set out with a brief to script a hit for a specific artist, or did he write what came to mind, and then farm them out later as he deemed appropriate? After all, Motown operated on conveyor-belt principles replicated from Detroit’s auto-industry. He’s spoken of writing “My Guy”, then calculatedly gender-switching the formula to craft “My Girl”. Can genius arrive by equation? ‘Some people say they write from experience. Not me’ he commented. ‘I write songs no matter what mood I’m in. It’s my work, dig? When I write a sad song, it isn’t consciously because of some personal experience. I’ve never consciously written a song from personal experience. You see, I can just feel it. I just feel it, you dig? I can’t force myself to write about things that don’t naturally occur to me.’ Can creativity work to a schedule? ‘You can never tell in this business’ shaking his head ruefully, ‘I only wish I could.’‘Not a day goes by that I don’t write something’ he told journalist Yvonne Roberts (‘Observer’ 2nd February 1992). ‘I’m not a moody songwriter, I don’t need to go to the Caribbean to produce. It’s a gift from god, it just comes. Matter of fact, you could say a phrase right now that might inspire me to write a song.’ He elaborates, out buying pearls with a friend, he told the sales assistant ‘I just hope the wife likes them’. ‘I second that emotion’ said the friend. A slip of the tongue, and the superfine “I Second That Emotion” became a hit in 1967 (no.27). And an even bigger hit two years later for Diana Ross & The Supremes with The Temptations (no.18). Startled to hear a new riff improvised by Miracles’ guitarist Marv Tarplin, who he’s worked with some thirty years, he found himself thinking ‘I’ll be doggone’. And the bitter-sweet “I’ll Be Doggone” was a hit for Marvin Gaye in 1965. ‘I hate to hear haphazard songs where it says one thing in one verse and then something else in the next’ he rationalises. ‘That’s a drag. Or a song which doesn’t mean anything at all and it’s a hit. You see a lot of those. They’re nothing, and they’re a hit. Very bad. For myself though, I’ve always believed in sticking to the basic thing that will never die, and by that I mean the relationship between man and woman. When that’s over, everything’s over. We have no new words or chords or notes. You’ve just to take the same tools and express them differently. Forget the moon in June, and never press the same buttons.’Way back then, we grooved to the Miracles. But they weren’t really up there with the Temptations, or Wilson Pickett, or James Brown. It was possible to lose a Miracles’ record in the blizzard of more muscular punching soul. Yet oddly, as the years accumulated into decades, in retrospect, my appreciation of the craft and beauty of Smokey’s songs has only escalated. His writing skill. His melodies. His instantly-recognisable spun-sugar honeyed vocals woven into the swooping interplay of voices. Of course, there’s schmaltz and sentimentality, but we listen to Smokey where we wouldn’t listen to the bloated bombast of Alexander O’Neal, Luther Vandross, or even Barry White because there’s a vulnerability, a sensitivity behind even the most saccharine Smokey. The real hidden voice of soul. Mods and Soul-boys revered him from the start. They watched avidly as the Miracles did “Mickey’s Monkey” on the 1965 ‘Ready Steady Go’ Motown TV-special, a show guest-hosted by a gushing Dusty Springfield. They might even have made it to the groundbreaking – if poorly attended ‘Motown Revue’ tour, appearing through dismal March 1965 dates at ABC movie-theatres alongside The Supremes, Stevie Wonder and special guest star Georgie Fame. But it was only with “Tracks Of My Tears” – as late as May 1969, that the Miracles finally cracked the UK Top Ten. He’s told the story any number of times. ‘I was dealing with a sad story, a cat who’d been cut deep, hurt by heartache. I knew my man was suffering strong. What I lacked though, was a chorus…’ So what if you cried so hard that it etched channels into your face? That’s the way he described it. Like… yes, but surely it’s also a metaphor for other, more narcotic forms of addiction than love? Isn’t that what track-marks are about? And the seductive ache, the hurt you can touch?Then there’s the superlative “The Love I Saw In You Was Just A Mirage” which – even after playing it across years, is still one of the few songs that has the ability to literally choke me up. No-one can break a heart like Smokey does, effortlessly falling just the right side of over-sentimentality. If there’s a more desolately beautiful song of hurt than “The Love I Saw In You”, I’ve yet to hear it. As the verses unfold and he stretches out the clever internal rhymes, her ‘untrue kisses’ lured him on ‘just like the desert shows a thirsty man / a green oasis where there’s only sand’. Her illusion of sweetness is used to rhyme ‘mirage’ with both ‘heartache’s camouflage’, and ‘the way you wrecked my life was like sabotage’, more ludicrous – yet more perfectly apt images are impossible to imagine. He dextrously springs the most unpredictable metaphor and simile, a writing process that’s quite unconscious if you accept the clues he trails to tease inquisitive interviewers. It was crusty old Ezra Pound who said that ‘every popular song has at least one line or sentence that is perfectly clear – the line that fits the music’. Smokey fits more than just about anyone elseBob Dylan’s most provocative and repeated quote named Smokey ‘America’s greatest living poet’. Beyond anything else, the claim was intended as a teasingly calculated smart-ass stab away from the pretensions of literary academia into an alignment with street-Pop. But that’s not to imply it was also insincere. Smokey rhymes like no-one else in music, combining the honed writing-to-demand sparkle of the Brill Building with an ear for polished melody to challenge the best of Bacharach, Jim Webb or Lennon/McCartney. Only a handful of writers have ever fused the eloquent to the populist the way Smokey does on “Tracks Of My Tears” with ‘just like Pagliacci did, I try to keep my sadness hid’, or turn such marvellous economy as the couplet from “If You Can Want” that goes ‘just like ‘push’ can turn to ‘shove’, ‘like’ can turn to ‘love’…’. But has anyone ever asked Smokey about his favourite poet? There’s something about his current set that suggests he might nominate George Gershwin. Relating more to the traditional crafts of lyric-writing. As though he feels he’s parascended above R&B, or black music, and evolved into the more rarefied air of the ‘classic’ Great American Songbook Pop. Where the clever rhyme and lyric-fit reached its purest expression.Packaged as a 2-CD ‘50th Anniversary Edition’ (2006) Smokey’s ‘Definitive Collection’ now comes bound-in with his thirteen-track ‘Timeless Love’ – interpreting velvety jazz and big-band Swing items from the decades before Soul existed. Taking knowing melodic liberties with Sammy Cahn’s “Time After Time” and Cole Porter’s “Night And Day”, the orchestra expansive and perfectly rehearsed for Sinatra’s “Fly Me To The Moon”, plus songs by Kurt Weill and Gershwin. ‘Cats like Cole Porter were really writing songs. When you heard a song it meant something,’ he explains. He oozes new silky phrasings into the oh-so-familiar “I’ve Got You Under My Skin”, emotes “You Go To My Head” and even transmutes “Tea For Two” into some kind of contemporary relevance. And sure, he does them immaculately… of course he does, you’d expect nothing less. While such studies are redirecting his own energies, to become more intimate than before, more personal. ‘I want to take my time now, and try to write standards, songs that will live for decades...’ But what about Jackie Wilson, Frankie Lymon, Sam Cooke… ‘The slyest rhymes, the sharpest suits, in miracles made real…’ (“When Smokey Sings” by ABC) When and why was he first called ‘Smokey’? Did his mother really advise him to “Shop Around”? ‘I was loved when I was a child’ he concedes, ‘I mean really loved. Perhaps that’s why I came through’. Influences? – ‘there were a group of things, but it boils down to one thing – the music we grew up with. The Spaniels, the Dells, Hank Ballard & The Midnighters, Clyde McPhatter & The Drifters, oh, and Frankie Lymon & The Teenagers. Not only them, but the Five Quills, which is a group maybe you never heard of… because they were a group in our neighbourhood. And we wanted to sing better than them. There were ten-thousand groups in our neighbourhood, and we’d have parties, try to shoot them down, see who’s best.’ So who was best? ‘The Four Tops’ after only the slightest moment of hesitation. ‘That wasn’t even their name, Motown gave them that name. But they were the most dynamite group. They could really sing, they had harmonies together. They were the feared group.’Smokey’s own purest doo-wop high falsetto bothered him at first. ‘Should a cat like me be singing like a chick?’ But soon it became his trademark sound. At nineteen he married fellow-Miracle Claudette Rogers. They stayed together twenty-seven years. But in his autobiography he admits ‘my heart was changing, my soul rearranging. It’s the man thing. The wandering eyes. I just can’t help it.’ A musician to his finger-tips, even his prose chimes like a lyric. Just as the closely-woven matrix of the Miracles harmonies enhanced his signature ‘sound’.A wrinkle in time ago, a Chinn/Chapman group called Smokey emerged from Bradford. It was mid-1975. They were advised to change their name to Smokie to avoid litigation from Motown. By then the label was enjoying a $40-million turn-over. And Motown was evolving, well advanced in the process of splitting its acts in two. It began by adding ‘Diana Ross &’ to the Supremes credits. Then it was Martha ‘Reeves’ & The Vandellas. Soon, it was ‘Smokey Robinson &’ the Miracles too. The next step was divorce, and twice the chart acts. The Supremes had hits. So did Diana Ross. Smokey had hits (starting with “Just My Soul Responding” in 1974). So – briefly, did the Miracles, with replacement frontman William Griffin (remember “Love Machine” in 1976?). Was that the plan all along? Was it part of a corporate policy over which he had little control? Or was it merely… inevitable? In fact, as he’s pointed out, the separation would have come earlier. Instead, a guy called John Marshall of UK Motown intervened, he lifted a previously overlooked four-year-old album-track, “Tears Of A Clown”, and issued it as a single in September 1970, giving the Miracles their only UK no.1. A success that was rapidly repeated in America, revitalising the group and extending their career for a few years more.Smokey rode every aspect of the sixties, writing and producing, harmonising and performing, while also working as vice-president within the administrative structure of the company, the architect of some of its finest moments. There’s got to be a million stories there. But where to start? Yet it was only later that he developed dependence problems with cocaine. Perhaps that was due to Motown’s relocation from the hard industrial disciplines of chilly Detroit to the laid-back hedonism of Los Angeles? But no, says Smokey. Los Angeles? ‘I adore the place. It has so many celebrities, I don’t have to allow my life to be a prison. I can run, play golf, meet people, act normal.’ Perhaps it was the changing times, the loss of the corporate ‘family’ vibe as Stevie Wonder, Marvin Gaye, Diana Ross, and Smokey spun-off into their own separate star-continuums. And as the politics got harder. After all, Smokey was changing tack too, and was soon contributing some pretty uncompromising tracks himself. “Just My Soul Responding” is based around a Native American tribal chant performed by Navajho singer Tom Bee, emphasising a more direct lyric-content than anything he’d attempted before. Starting ‘I was born and raised in the ghetto, my skin is black’ it then questions the on-going Vietnam conflict with ‘don’t try to tell me I’m unpatriotic, I deserve an explanation’. But no. Apparently the coke thing was nothing as profound as that. ‘I got into cocaine’ he admits, ‘ninety-nine percent who get off on drugs get off having fun with their friends. And I mean fun. Then, one day, they look up, and the fun is killing them. I was doing nothing but sitting at home alone, listening to my answering-machine and taking this stuff. My head would be pounding, veins bulging, heart going on, cold sweats, shortness of breath and still I’d be taking the stuff…’ Until he found Jesus. But all the while, despite some flawed moments and lack-lustre albums, there were more major landmark hits such as 1979’s feel-good “Cruisin’”, the smoky-hued no.1 “Being With You” (1981) and the infectious “Just To See Her” (1987) to re-establish his credentials as a poet of the close-up zone while proving beyond doubt he’s still more than capable of doing the do.Now, he’s vegetarian, teetotal, and he works out. How does he set about selecting a set-list to perform from such a wealth of back-catalogue? Are there songs he particularly enjoys singing, and – conversely, are there songs that are now too difficult for him to perform? He’s spoken of deliberately lowering the pitch of his ethereal falsetto to a counter-tenor, adjusting it to accommodate the changing range of his age. What other preparations does he undertake for a tour? Does he have regrets – ‘no’. A smile delivered with all the confidence that four decades of success can bring, ‘if they’d given me a questionnaire the day before I was born asking what I might like to be, I’d fill it out exactly the way I’m living…’ So the best gig I’ve ever attended? - it was in the music lounge of a pub in Leeds, which has now been closed down because of its drug notoriety. I wrote about it twice, for two different magazines, under two different aliases. Both of them are here. Bo Diddley died on Monday, June 2nd 2008. BO DIDDLEY and OFFSPRING at ‘Fforde Green’, Leeds In 1963 he toured with the Rolling Stones. In 1979 he toured with Clash. Tonight he does a fifties rap back to when ‘some of you wasn’t even born – BUT YOU WAS BEIN’ DISCUSSED!’ An allusion of names he’s worked with on boards and plastic over a slow growling bass figure, ‘Muddy Waters, John Lee Hooker, Jimmy Reed, Willie Dixon, Chuck Berry, the magnificent Elvis Presley’. He jive-wires the tremelo on his custom-made angular oblong Kinman, adds some Doo-wop vocal effects in the style of his antique “I’m Sorry”, then cranks up to ‘Carl Perkins, Eddie Cochran, Gene Vincent, the Rolling Stones – I’VE SEEN ‘EM ALL. I’ve been on stage with ‘em all!’ He’s indisputable proof of his macho bragging, but he ain’t no mere aspic-preserved artefact, no walking repository of Rock’s vintage violence. Some things get meaner as they get older, and the Diddler’s the 1950’s last delinquent, his Diddleybeat developed so heavy it needs an HGV license, and it’s all lit up by a big avuncular grin like a fluorescent Wurlitzer jukebox cram-full of hits. ‘The line I shoot / will never miss’, a gaudy earthy earthquake, a stumbling, lurching, shuddering, juddering, reverberating, beatific beat that crawls up inside your skull and plays your eyelids like drums. It’s a synthesis, a copulatory coupling of the hypnotically ponderous naïve with the cunning, shell-shocked complexity in all directions and dimensions simultaneously, like a rhythmic Jackson Pollock chromatic explosion. He might not have actually invented the riff that bears his name – some claim to detect its spoor all the way back to African drum-choir slave-chants, but its chrome’s not even tarnished, and it’s good for some considerable mileage yet. He runs through “Mona” (which the Stone’s mis-track list as “I Need You Baby” on their premier album), “Roadrunner” with its slide quivering in glissando glide-paths up and down the pleasure-centres of your spine, and “Hey, Bo Diddley” which extends its booming shuffling primeval rhythm for ever, and is never one microsecond too long. And that’s his survival strategy these twenty-eight years, and still fresh, each number (from the first chord instantly recognisable) is spun out over the low burn of the Diddley Daddies’ extemporising into such incessant compulsions that the actual token verse ploughed in there arbitrarily along its vapour trail is just punctuation, a reference point to orientate by. The rest is immediate, no fade-off, no drop-out, just famous axe in place, famous feathered bejewelled hat on head. “I’m A Man” becomes an entire theatre of effects and humour, musical talking guitar conversation with Stuff Smith (Fender Stratocaster), and ball-bouncing pitch and toss on the bass-strings with Brother Ron (Fender Jazz Bass). This is his regular American band, all blacks-&-reds with headset radio-mics, their sound moulded tight as traps forcing Big Bad Bo to new highs of lethal natural electricity. No pick-up musicians they, there’s Terri McDaniel sensuously programming a Rhodes Opus 3 Moog, and Bo’s other daughter – Tammi, deliciously flagellating the Pearl drum-kit while feeding in soulful vocals. As Offspring they are a first-division force in their own right as their warm-up set proves, a Funk mutation of eighties R&B, street-hard on “Not Alone” and “Hard Times”, outstanding with “Why Do Fools Fall In Love” making connections that by-pass the fey Diana Ross version and plugging directly into the socket of Frankie Lymon’s bratty original. And with the Daddy Diddley they’re more than just background ornamentation, but a superb foil to his ageless Diddleyitus, his key jungle-rhythms, his Chicago-blues based energy, raw and throbbing as an open wound. From the intro to the outro it’s peak experience with the ‘Fforde Green’ Music Lounge sweat-dripping crush-full, the epicentre of aural storm, the whole room megaton-trembling and shaking in seismic stun-waves from floor to ceiling with every tribal denomination in attendance, Skins, Punks, Teds, Hippies, Angels and Rockabilly Rebels – and all attentions fixed on the paunchy gunslinger. That’s exactly how it should be, and no-one can do it like Bo Diddley do it. Mr Diddley is 53 years old. His biggest British hit – “Pretty Thing”, reached no.34 on the chart in October 1963. BY ANDREW DARLINGTON Published in:-‘HOT PRESS Vol.6 No.12’ (Ireland – July 1982) BO DIDDLEY and ONE O’CLOCK JUMP at ‘Fforde Green’, Leeds Bo Diddley might have opened the door for Beatdom legions, but he was sho’ ‘nuff left holding the handle! In the 1940’s it was white Benny Goodman who was ‘King Of Swing’, not Duke Ellington or Count Basie. Just as Elvis Presley was ‘King Of Rock ‘n’ Roll’, not Chuck Berry or Bo Diddley. Just as the Rolling Stones became ‘Kings of R&B’ in the 1960’s, rather than Howlin Wolf, John Lee Hooker, Jimmy Reed… or Bo Diddley. The process is identical. So now Mick Jagger sells out the Roundhay Park arena, while Bo Diddley crams out the Music Lounge of a downtown Leeds pub a little way down the road apiece. He ain’t ‘bout to complain, ‘I wanna thank you Ladies and Gennlemen’ he booms, ‘for my survival through the Rock ‘n’ Roll crisis’ – he might’ve been using that same line at least since 1971, but he sure as hell means it. ‘Indeed he-deed he-do.’ We’re talking Titans here, I’ve got to confess, from the first riffling shimmering chords of “Bo Diddley” all critical faculties get bludgeoned and we’re into a totally submissive situation, it’s like five-hundred bands I must have seen thus far into 1982, and this gig destroys them all effortlessly, obliterates ‘em with a grin, stomps ‘em into derisive mush. Bo’s the self-bragged ‘Original Originator’, the ‘Gunslinger’ with the .38 pistol on his hip and the rose on his chest, the Roadrunner, the Grand Diddley Daddy of ‘em all, the man who is five-hundred percent M-A-N! Flamboyant, unsubtle, a raucously dirty urban thunder that’s an undiluted amalgam of heavily accentuated backbeats so primitive, so instinctive, they’re practically antediluvian, in combination with a tremulous muzzy distorted sophistication and technical skill. A shaman rhythm pattern set to the pulse of his near-phonetic soubriquet. But setting stage we first got some ‘Chicken-Shack-Fleetwood-Mac-John-Mayall-Can’t-Fail’ Blues from Leeds five-piece One O’Clock Jump, a carefully observed blend of sweaty rhythm ‘n’ booze with all the right inputs. From Louis Jordan’s “Saturday Night Fish Fry”, to “How Blue Can You Get?” stood out on Chris Davis’ honking sax, a band to see, but a taster this night. Ellas ‘Bo’ McDaniel’s prime-time Golden Decade stuff might’ve been cut at Chess (2120 South Michigan Avenue, Chicago) a quarter-century back, but there’s still sweet nuthin’ to touch it. After his autobiographical vinyl-debut – “Bo Diddley” from 1955, comes “Roadrunner” with resonating Exocet runs up and down the fret, a groove-talking jive-dancing golden crazy argot full of exuberant celebrations of his own self-mythology, the “I’m A Man” riff leading into a glorious ten-minute work-out of self-sabotaging humour, musical ingenuity, mock guitar conversations and sharp tricks. With all the natural pacing and energy theatrics that come with twenty-eight years of touring. A feast of incandescence channelled thru Turbo five-speed oblong guitar punched in over his paunch. His pink two-piece suit with glitter seams and deeper pink two-shade shirt with balloon sleeves rapidly getting sweat-stuck to his solid totem-like body. A guru of Rock ‘n’ Rhythm from feather-brimmed voodoo hat down to sensible black-tie shoes. ‘Are you serious – about Rock ‘n’ Roll?’ he demands of the audience, as his tight family band – the Offspring, quiz him back, ‘Are you serious – Bo?’ Daughters Terri (on keyboards, crescent tambourine, and bump ‘n’ grind Duchess dance) and Tammi (on drums and back-up vocals). ‘Brother’ Ron on bass and send-ups, and ‘Stuff’ Smith on second lead. A group fully-wired and miked-up, supporting, driving and revving Diddley in a way that, for e.g., Chuck Berry’s last-minute tour pick-up bands never can. They provoke comparisons with the vinyl originals - recorded with Jerome Green, Frank Kirkland, Billy Boy Arnold and half-sister the ‘Duchess’, and in every way such uneven parallels prove complimentary. This could be Bo’s best-ever live band, and his performance / rapport is inspired, fired on stoking internal combustion. Through “Hold On”, “Mona”, “Let Me See You Rock ‘n’ Roll”, “Fifties Rap”, and “Hey, Bo Diddley” every one’s a stone killer, the seminal bantering riffs become long chugging launch pads to stratosphere-high R&B eternities. But the encore he plays exclusively for Mike and Maggie who just got wed. On stage he greets them, and advises – with a furtive glance at his band, ‘I don’t wanna put no bad luck on you – but, GO FORTH AND MULTIPLY!!!’ They ask for “Diddleyitus” which comes at full-tilt on guitar distortion, then Bo doubling with Tammi on drums in a percussive jungle that not only shows up Bow Wow Wow’s “I Want Candy” as derivative (and even THAT is second-hand Strangeloves!), but shows ‘em the door, handle and all, politely but firmly. Diddley’s the original, but the original is STILL THE GREATEST! From my collection‘SUBVERSIVE ART AT POPULAR PRICES’(Purple Heather Publications, UK – January 1988),also on ‘LEEDS ALTERNATIVE CABARET: THE CASSETTE’(UK – June 1988), and on the telephone‘DIAL-A-POEM’ (Liverpool 27th November 1980),also on the vinyl album‘NO SONGS TOMORROW’ by U.V. Pop (Flowmotion LP, UK – April 1984)U.V. Pop track played 'a couple of times' on ‘Radio Aire’ by Len Liggins on his‘alternative/ Indie’ spot. 'Religion is a real danger to the survival of civilisation... it will be the death of us all, the end of humanity' - Christopher Hitchens 'Twenty years from now you will be more disappointed by the things you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbour. Catch the trade winds in your sails. Explore. Dream. Discover...' - Mark Twain
{ "pile_set_name": "Pile-CC" }
package warnings import ( "fmt" "github.com/pkg/errors" ) // WarnShouldUseUpdate is the message printed to the user when they attempt // to use "ship init" with a present state file on disk var WarnShouldUseUpdate = warning{msg: `To build on your progress, run "ship update"`} var WarnCannotRemoveState = warning{msg: `Existing state was found that Ship cannot automatically remove. Please delete the existing state and try again.`} // WarnShouldMoveDirectory is the message printed to the user when they attempt to run ship when files like `base` or // `overlays` are already present func WarnShouldMoveDirectory(dir string) error { return warning{msg: fmt.Sprintf(`Found existing directory %q. To avoid losing work, please move or remove %q before proceeding, or re-run with --rm-asset-dest.`, dir, dir)} } func WarnFileNotFound(filePath string) error { return warning{msg: fmt.Sprintf(`File %q was not found.`, filePath)} } type warning struct { msg string } func (w warning) Error() string { return w.msg } func IsWarning(err error) bool { cause := errors.Cause(err) _, ok := cause.(warning) return ok } func StripStackIfWarning(err error) error { if IsWarning(err) { return errors.Cause(err) } return err }
{ "pile_set_name": "Github" }
The role of diet in vulnerability to noise-induced cochlear injury and hearing loss. The influence of dietary nutrient intake on the onset and trajectory of hearing loss during aging and in mediating protection from challenges such as noise is an important relationship yet to be fully appreciated. Dietary intake provides essential nutrients that support basic cellular processes related to influencing cellular stress response, immune response, cardiometabolic status, neural status, and psychological well-being. Dietary quality has been shown to alter risk for essentially all chronic health conditions including hearing loss and tinnitus. Evidence of nutrients with antioxidant, anti-inflammatory, and anti-ischemic properties, and overall healthy diet quality as otoprotective strategies are slowly accumulating, but many questions remain unanswered. In this article, the authors will discuss (1) animal models in nutritional research, (2) evidence of dietary nutrient-based otoprotection, and (3) consideration of confounds and limitations to nutrient and dietary study in hearing sciences. Given that there are some 60 physiologically essential nutrients, unraveling the intricate biochemistry and multitude of interactions among nutrients may ultimately prove infeasible; however, the wealth of available data suggesting healthy nutrient intake to be associated with improved hearing outcomes suggests the development of evidence-based guidance regarding diets that support healthy hearing may not require precise understanding of all possible interactions among variables. Clinical trials evaluating otoprotective benefits of nutrients should account for dietary quality, noise exposure history, and exercise habits as potential covariates that may influence the efficacy and effectiveness of test agents; pharmacokinetic measures are also encouraged.
{ "pile_set_name": "PubMed Abstracts" }
The present invention pertains to wheelchairs for human travel and methods of manual propulsion of such wheelchairs. In particular, the present invention is a propulsive device and wheelchair including a mechanism with a continuous reciprocating linear or elliptical input path. A large number and portion of the population in the U.S. use wheelchairs to cope with mobility impairments. The limitations imposed on these persons as a result of their reliance on wheelchairs significantly reduces their quality of life. In addition, many wheelchair users experience musculoskeletal injuries of the shoulder, elbow and wrist. These injuries are caused by the high force exertions, repetitive motions and awkward postures inherent in use of standard wheelchairs. In addition, the basic propulsive mode with a conventional wheelchair is one of asymmetric muscle use (push mode) leading to unbalanced muscle development. These problems may be complicated by limited upper extremity dexterity of those wheelchair users having spinal cord injuries. Fifty to 70 percent of wheelchair users experience some sort of shoulder pain, rotator tear, or impingement problem that can permanently hinder mobility and increase medical costs. The incidence of carpal tunnel syndrome among wheelchair users has been reported to be as high as 63 percent and research indicates that this may be a result of nerve compression from forceful exertions of the hand and wrist during wheelchair operation. Repetitive strikes of the heel of the hand against the wheel rim of conventional wheelchairs may cause pain and numbness of the thumb and fingers. The interaction of the user's body and their wheelchair is a direct consequence of the basic design of the conventional wheelchair and the associated necessary mode of propulsion. The design of the typical manual wheelchair has endured, largely unchanged, due to its simplicity. Relatively recently, advances to wheelchair design have addressed the need for improved propulsive mechanisms. Various wheel cranks, geared hubs and the like have been proposed in the prior art to reduce the necessary force for propulsion. However, these prior art devices do not effectively allow for altering the user's posture nor modify the basic propulsive motion itself the primary factors contributing to injury. What is needed is a mechanism for propelling a wheelchair which allows for increased use of large muscle groups in symmetric operation, improved posture and reduced contact pressure to the user.
{ "pile_set_name": "USPTO Backgrounds" }
Energy secretary backs mix of power sources February 07, 2014 | posted by The Institute U.S. Energy Secretary Ernest Moniz, with San Antonio Mayor Julian Castro, spoke to high school students on Thursday about their solar car. Photo Credit: Helen L. Montoya, Staff During a visit to San Antonio Thursday, Energy Secretary Ernest Moniz said President Barack Obama's push for use of all energy sources - his "all of the above" energy policy - is the best solution to meet the nation's power needs. At the same time, he said it's a clear goal of the administration to reduce carbon emissions, which means building capacity for clean energy and fostering innovation. Costs for wind and solar are falling, he said, which is aiding the push for renewables. Energy efficiency, from more efficient lighting to appliances, also is playing a part. Moniz stated the administration's case in a town hall meeting of students and community residents at the University of Texas at San Antonio's downtown campus, where he praised the city and the university for being leaders in clean energy and innovation. Before the town hall talk, Moniz briefly looked over students' renewable- energy projects and stopped to ask questions of Madison High School students about a solar-powered car on display. After his talk, Moniz declined to discuss the status of the proposed Keystone XL pipeline, saying it is a State Department matter. He also demurred when asked whether it's a good idea to lift the nation's almost total ban on exporting oil, saying it's an issue for the Commerce Department to consider. But Moniz didn't shy away from saying the administration's "holistic" energy strategy includes support of advances in nuclear-reactor construction. For example, the Energy Department is working to finalize a loan guarantee for the construction of two small modular nuclear reactors in Georgia, he said. "Nuclear power plants have been getting bigger and bigger," he said, and the capital requirements are enormous. The plan in Georgia is to build smaller reactors, "which have very good safety characteristics" that would be less expensive, he said. "The idea is that if you go small enough, you can build all of the guts of the plant in a factory, put it on a flatbed truck and take it to the site," Moniz said. "So you get the quality control in the factory environment and you get the stable workforce in the manufacturing environment." The smaller reactor "sounds very promising, but we don't know until we do it," he said. As for nuclear waste, Moniz said that Yucca Mountain, a proposed nuclear waste site in Nevada, "is not viable. There are very strong objections to it. It was not a consent-based process." An independent commission has recommended that the nation have a "consent-based process that provides by far the better conditions for success," he said. Another important step would be for Congress to authorize a pilot site where spent fuel could be stored. The site would store spent fuel from reactors that have been shut down. It would be a site or sites "where there is no reactor - there is only spent fuel. That would be a sensible first step," Moniz said. Moniz said that the nation's energy boom also is prompting an analysis of energy infrastructure that may be completed by year's end. "If we need to draw down the Strategic Petroleum Reserve - and we move through pipelines or maritime - now we find that some of the pipelines have changed direction," he said. "So that's why we're looking comprehensively at the whole infrastructure." The outcome of the analysis, he said, "will be a set of recommendations of what the federal government can do to help evolve the infrastructure in the right direction, so that it's smart and resilient for the 21st century."
{ "pile_set_name": "Pile-CC" }
Northrop Grumman Systems Corp, Aerospace Systems, has been awarded a a multi-year, fixed-price-incentive-firm target contract valued at more than $3.6 billion by the U.S. Navy to deliver 25 new E-2D Advanced Hawkeye aircrafts. “The E-2D Advanced Hawkeye is the Navy’s primary airborne early warning and battle management command and control platform,” said Navy Capt. John S. Lemmon, program manager, E-2/C-2 Airborne Tactical Data System Program Office, in a release. Developed and produced by Northrop Grumman, the E-2D Advanced Hawkeye is the world’s only aircraft specifically designed as a carrier-based airborne early warning and control (AEW&C) system. With its structurally distinctive design – a rotating rotodome and four vertical stabilizer tail configuration – the E-2D Advanced Hawkeye provides unprecedented, 360-degree surveillance to the warfighter. The E-2D Advanced Hawkeye will see more powerful upgrades from its predecessors, like the AN/APY-9 radar system, which “allows the warfighter to ‘see’ a greater number of targets at much greater distances – as well as new avionics and a glass cockpit.”
{ "pile_set_name": "Pile-CC" }
A prospective, randomized-controlled pilot study of ursodeoxycholic acid combined with mycophenolate mofetil in the treatment of primary sclerosing cholangitis. Ursodeoxycholic acid has been ineffective in the treatment of primary sclerosing cholangitis. Because the pathogenesis of primary sclerosing cholangitis is related to immune destruction of bile duct epithelium, several immune suppressive agents have been evaluated. Mycophenolate mofetil is a potent immunosuppressant that is now widely used in organ transplantation. In this pilot study to determine if mycophenolate mofetil when combined with ursodeoxycholic acid could prevent evidence of clinical progression and improve the biochemical, histological and/or cholangiographic features of primary sclerosing cholangitis compared with patients treated with ursodeoxycholic acid alone. Twenty-five patients with well-defined primary sclerosing cholangitis were randomized to ursodeoxycholic acid (13-15 mg/kg/day) with or without mycophenolate mofetil (1000 mg b.d.). Cholangiography and liver biopsy were performed at study entry and after 2 years of treatment. Symptoms, clinical features of liver disease and biochemical tests were monitored at 3-month intervals. The mean age 44 years, 58% male, 84% Caucasian and 64% had ulcerative colitis. After 2 years, there were no differences in laboratory values, histological stage or cholangiograms between patients treated with ursodeoxycholic acid alone and those treated with mycophenolate mofetil + ursodeoxycholic acid. Mycophenolate mofetil combined with ursodeoxycholic acid does not appear to provide additional benefit compared with standard doses of ursodeoxycholic acid alone in the treatment of primary sclerosing cholangitis.
{ "pile_set_name": "PubMed Abstracts" }
Hiroko Saito is a Japanese former swimmer. She competed in the women's 100 metre butterfly at the 1964 Summer Olympics. References Category:1945 births Category:Living people Category:Japanese female swimmers Category:Olympic swimmers of Japan Category:Swimmers at the 1964 Summer Olympics Category:Place of birth missing (living people)
{ "pile_set_name": "Wikipedia (en)" }
The present invention relates in general to waveform synthesizers for producing test signals, and more particularly to apparatus for generating test signals providing a reference standard for test and inspection of compatible quadrature amplitude modulation stereo transmission and reception equipment and similar equipment having complex modulation schemes. In recent years, compatible quadrature amplitude modulation systems of stereo broadcasting, as marketed by Motorola, Inc. under their trademark "C-Quam", have begun to come into substantial commercial use. The "C-Quam" or compatible quadrature amplitude modulation system is a system of stereo broadcasting in which separate left and right stereo program information can be transmitted over ordinary AM broadcast stations and received in AM receivers equipped with a suitable decoder circuit. Also, ordinary receivers not so equipped with the decoder circuit can receive the program monaurally without serious distortion, and thus the system provides compatibility with ordinary AM receivers as well as the AM receivers equipped with the special decoder circuits. The "C-Quam" system is described in considerable detail in a number of Motorola, Inc. U.S. patents, including particularly U.S. Pat. Nos. 4,2l8,586 granted Aug. 19, 1980 and 4,338,491 granted July 6, 1982. Additional Motorola, Inc. patents describing the "C-Quam" system or components thereof include U.S. Pat. Nos. 4,159,396 and 4,159,398 granted June 26, 1979, 4,192,968 granted Mar. 11, 1980, 4,170,716 granted Oct. 9, 1979, 4,164,623 granted Aug. 14, 1979, 4,169,968 granted Oct. 2, 1979, 4,172,966 granted Oct. 30, 1979 and 4,371,747 granted Feb. 1, 1983. The circuitry required to encode and decode the stereo program material is rather complex and requires critical tuning of many components. Both the encoder and the decoder must be so tuned. Ordinarily, under present practice they are tuned one against the other. It is not too difficult to obtain satisfactory encoding and decoding for the pair, but to my knowledge no direct and independent means have been developed to verify that the encoder generates the defined system signal. Presently, indirect means are used such as spectral analysis of the encoded signal to determine if the encoded signals are proper. The equation for the compatible quadrature system or "C-Quam" system signal for the Motorola, Inc. system has been determined, the signal equation for such system being as follows: ##EQU1## where: E.sub.c =Complete "C-Quam" signal voltage for any time t A.sub.c =Unmodulated carrier amplitude PA0 L(t)=Left channel program voltage at any time t PA0 R(t)=Right channel program voltage at any time t PA0 .omega..sub.c =2.pi.f.sub.c, rad/sec PA0 f.sub.c =Carrier frequency Hz PA0 t=Time, sec. PA0 M.sub.s =Modulation index for L+R program PA0 M.sub.d =Modulation index for L-R program PA0 50.pi.t=25 Hz pilot tone The E.sub.c equation (1) shows that the carrier is amplitude modulated with the sum of the left and right program sources (L(t)+R(t)) and is phase modulated by the difference between the left and right program sources (L(t)-R(t)). Additionally, a pilot tone, which is the 50 .pi. t factor in the equation and in this embodiment is a 25 Hz pilot tone, of low level, phase modulates the carrier. The phase angle modulation is modified by the inverse tangent function (tan.sup.-1) to accomplish compatibility. Observation of the equation (1) indicates that the generated signal is of a complex wave form. Present test signal generators utilizing analog elements experience troublesome stability problems. Thus, if such analog signal generators were used to generate a signal wave form in accordance with the "C-Quam" system signal equation, the generated test signal would drift and be distorted to such an extent that its use to test either an encoder or decoder would be impractical.
{ "pile_set_name": "USPTO Backgrounds" }
Q: nth-child pattern starting after a particular child How can you do an nth-child pattern like below: div:nth-child(3n+1){ background: #FF7100; } div:nth-child(3n+2){ background: #FFB173; } div:nth-child(3n+3){ background: #A64A00; } but to skip for instance the first child and only start this pattern after the first child. I tried chaining it like below but it did not seem to work: div:nth-child(n+1):nth-child(3n+1) { background: #FF7100; } A: Use :not(:first-child) selector to skip the first-child. div:not(:first-child):nth-child(3n+1) { background: #FF7100; } div:nth-child(3n+2) { background: #FFB173; } div:nth-child(3n+3) { background: #A64A00; } <div>1</div> <div>2</div> <div>3</div> <div>4</div> <div>5</div> <div>6</div> <div>7</div> <div>8</div> <div>9</div> <div>10</div> If you wanna skip first element for each style, try this div:nth-child(1) ~ div:nth-child(3n+1) { background: #FF7100; } div:nth-child(2) ~ div:nth-child(3n+2) { background: #FFB173; } div:nth-child(3) ~ div:nth-child(3n+3) { background: #A64A00; } <div>1</div> <div>2</div> <div>3</div> <div>4</div> <div>5</div> <div>6</div> <div>7</div> <div>8</div> <div>9</div> <div>10</div>
{ "pile_set_name": "StackExchange" }
You Can Do IT – Take off the limitations I have talked to so many people who feel as though they have nothing to offer the people & the world around them. I don’t believe that! I want you to know, that I am a firm believer in the fact that everyone has something to give…something uniquely them…something that will bless the people around them if they will only take the time to share. Lynda, a good friend of mine from Happy Little Homestead, shared this amazing video with me, and I knew that I had to share it with you. Here are a few questions to ask yourself… 1. Why are we living with limitations? 2. Why do we go through life feeling like we have nothing to give because there might be someone who does it better? 3. Why do we value the gifts & talents of others, while feeling like we are bankrupt in that area? STOP!!! You are unique ~ You have something to give ~ You are special ~ You do not have to live with self imposed limits anymore! Take a few minutes to watch, listen to Diane’s story, and be inspired to see what you can “give back” of your talents & treasure to the world around you! Fiona on May 10, 2011 Great message. Even when it feels like you have nothing to offer, there is something about you that makes you unique, and that uniqueness is something that only YOU can offer to the world. Thanks for sharing! sumru on September 7, 2011 Emilio Ulloa on August 15, 2012 Your email address will not be published. Required fields are marked * Name (required) Mail (will not be published) (required) Website About Creative living ideas for your home & garden. You'll find inspirations for gardening, home decor, how-to, recipes, and much more. Our goal is to inspire you to find joy in the smallest of things, and to live each day to fullest! Blessings ~ Pearl Sanborn
{ "pile_set_name": "Pile-CC" }
// Protocol Buffers - Google's data interchange format // Copyright 2008 Google Inc. All rights reserved. // https://developers.google.com/protocol-buffers/ // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // This file defines the map container and its helpers to support protobuf maps. // // The Map and MapIterator types are provided by this header file. // Please avoid using other types defined here, unless they are public // types within Map or MapIterator, such as Map::value_type. #ifndef GOOGLE_PROTOBUF_MAP_H__ #define GOOGLE_PROTOBUF_MAP_H__ #include <iterator> #include <limits> // To support Visual Studio 2008 #include <set> #include <utility> #include <google/protobuf/stubs/common.h> #include <google/protobuf/arena.h> #include <google/protobuf/generated_enum_util.h> #include <google/protobuf/map_type_handler.h> #include <google/protobuf/stubs/hash.h> #if __cpp_exceptions && LANG_CXX11 #include <random> #endif namespace google { namespace protobuf { template <typename Key, typename T> class Map; class MapIterator; template <typename Enum> struct is_proto_enum; namespace internal { template <typename Derived, typename Key, typename T, WireFormatLite::FieldType key_wire_type, WireFormatLite::FieldType value_wire_type, int default_enum_value> class MapFieldLite; template <typename Derived, typename Key, typename T, WireFormatLite::FieldType key_wire_type, WireFormatLite::FieldType value_wire_type, int default_enum_value> class MapField; template <typename Key, typename T> class TypeDefinedMapFieldBase; class DynamicMapField; class GeneratedMessageReflection; } // namespace internal // This is the class for google::protobuf::Map's internal value_type. Instead of using // std::pair as value_type, we use this class which provides us more control of // its process of construction and destruction. template <typename Key, typename T> class MapPair { public: typedef const Key first_type; typedef T second_type; MapPair(const Key& other_first, const T& other_second) : first(other_first), second(other_second) {} explicit MapPair(const Key& other_first) : first(other_first), second() {} MapPair(const MapPair& other) : first(other.first), second(other.second) {} ~MapPair() {} // Implicitly convertible to std::pair of compatible types. template <typename T1, typename T2> operator std::pair<T1, T2>() const { return std::pair<T1, T2>(first, second); } const Key first; T second; private: friend class ::google::protobuf::Arena; friend class Map<Key, T>; }; // google::protobuf::Map is an associative container type used to store protobuf map // fields. Each Map instance may or may not use a different hash function, a // different iteration order, and so on. E.g., please don't examine // implementation details to decide if the following would work: // Map<int, int> m0, m1; // m0[0] = m1[0] = m0[1] = m1[1] = 0; // assert(m0.begin()->first == m1.begin()->first); // Bug! // // Map's interface is similar to std::unordered_map, except that Map is not // designed to play well with exceptions. template <typename Key, typename T> class Map { public: typedef Key key_type; typedef T mapped_type; typedef MapPair<Key, T> value_type; typedef value_type* pointer; typedef const value_type* const_pointer; typedef value_type& reference; typedef const value_type& const_reference; typedef size_t size_type; typedef hash<Key> hasher; Map() : arena_(NULL), default_enum_value_(0) { Init(); } explicit Map(Arena* arena) : arena_(arena), default_enum_value_(0) { Init(); } Map(const Map& other) : arena_(NULL), default_enum_value_(other.default_enum_value_) { Init(); insert(other.begin(), other.end()); } template <class InputIt> Map(const InputIt& first, const InputIt& last) : arena_(NULL), default_enum_value_(0) { Init(); insert(first, last); } ~Map() { clear(); if (arena_ == NULL) { delete elements_; } } private: void Init() { elements_ = Arena::Create<InnerMap>(arena_, 0, hasher(), Allocator(arena_)); } // re-implement std::allocator to use arena allocator for memory allocation. // Used for google::protobuf::Map implementation. Users should not use this class // directly. template <typename U> class MapAllocator { public: typedef U value_type; typedef value_type* pointer; typedef const value_type* const_pointer; typedef value_type& reference; typedef const value_type& const_reference; typedef size_t size_type; typedef ptrdiff_t difference_type; MapAllocator() : arena_(NULL) {} explicit MapAllocator(Arena* arena) : arena_(arena) {} template <typename X> MapAllocator(const MapAllocator<X>& allocator) : arena_(allocator.arena()) {} pointer allocate(size_type n, const void* hint = 0) { // If arena is not given, malloc needs to be called which doesn't // construct element object. if (arena_ == NULL) { return static_cast<pointer>(::operator new(n * sizeof(value_type))); } else { return reinterpret_cast<pointer>( Arena::CreateArray<uint8>(arena_, n * sizeof(value_type))); } } void deallocate(pointer p, size_type n) { if (arena_ == NULL) { #if defined(__GXX_DELETE_WITH_SIZE__) || defined(__cpp_sized_deallocation) ::operator delete(p, n * sizeof(value_type)); #else ::operator delete(p); #endif } } #if __cplusplus >= 201103L && !defined(GOOGLE_PROTOBUF_OS_APPLE) && \ !defined(GOOGLE_PROTOBUF_OS_NACL) && \ !defined(GOOGLE_PROTOBUF_OS_EMSCRIPTEN) template<class NodeType, class... Args> void construct(NodeType* p, Args&&... args) { // Clang 3.6 doesn't compile static casting to void* directly. (Issue // #1266) According C++ standard 5.2.9/1: "The static_cast operator shall // not cast away constness". So first the maybe const pointer is casted to // const void* and after the const void* is const casted. new (const_cast<void*>(static_cast<const void*>(p))) NodeType(std::forward<Args>(args)...); } template<class NodeType> void destroy(NodeType* p) { p->~NodeType(); } #else void construct(pointer p, const_reference t) { new (p) value_type(t); } void destroy(pointer p) { p->~value_type(); } #endif template <typename X> struct rebind { typedef MapAllocator<X> other; }; template <typename X> bool operator==(const MapAllocator<X>& other) const { return arena_ == other.arena_; } template <typename X> bool operator!=(const MapAllocator<X>& other) const { return arena_ != other.arena_; } // To support Visual Studio 2008 size_type max_size() const { // parentheses around (std::...:max) prevents macro warning of max() return (std::numeric_limits<size_type>::max)(); } // To support gcc-4.4, which does not properly // support templated friend classes Arena* arena() const { return arena_; } private: typedef void DestructorSkippable_; Arena* const arena_; }; // InnerMap's key type is Key and its value type is value_type*. We use a // custom class here and for Node, below, to ensure that k_ is at offset 0, // allowing safe conversion from pointer to Node to pointer to Key, and vice // versa when appropriate. class KeyValuePair { public: KeyValuePair(const Key& k, value_type* v) : k_(k), v_(v) {} const Key& key() const { return k_; } Key& key() { return k_; } value_type* value() const { return v_; } value_type*& value() { return v_; } private: Key k_; value_type* v_; }; typedef MapAllocator<KeyValuePair> Allocator; // InnerMap is a generic hash-based map. It doesn't contain any // protocol-buffer-specific logic. It is a chaining hash map with the // additional feature that some buckets can be converted to use an ordered // container. This ensures O(lg n) bounds on find, insert, and erase, while // avoiding the overheads of ordered containers most of the time. // // The implementation doesn't need the full generality of unordered_map, // and it doesn't have it. More bells and whistles can be added as needed. // Some implementation details: // 1. The hash function has type hasher and the equality function // equal_to<Key>. We inherit from hasher to save space // (empty-base-class optimization). // 2. The number of buckets is a power of two. // 3. Buckets are converted to trees in pairs: if we convert bucket b then // buckets b and b^1 will share a tree. Invariant: buckets b and b^1 have // the same non-NULL value iff they are sharing a tree. (An alternative // implementation strategy would be to have a tag bit per bucket.) // 4. As is typical for hash_map and such, the Keys and Values are always // stored in linked list nodes. Pointers to elements are never invalidated // until the element is deleted. // 5. The trees' payload type is pointer to linked-list node. Tree-converting // a bucket doesn't copy Key-Value pairs. // 6. Once we've tree-converted a bucket, it is never converted back. However, // the items a tree contains may wind up assigned to trees or lists upon a // rehash. // 7. The code requires no C++ features from C++11 or later. // 8. Mutations to a map do not invalidate the map's iterators, pointers to // elements, or references to elements. // 9. Except for erase(iterator), any non-const method can reorder iterators. class InnerMap : private hasher { public: typedef value_type* Value; InnerMap(size_type n, hasher h, Allocator alloc) : hasher(h), num_elements_(0), seed_(Seed()), table_(NULL), alloc_(alloc) { n = TableSize(n); table_ = CreateEmptyTable(n); num_buckets_ = index_of_first_non_null_ = n; } ~InnerMap() { if (table_ != NULL) { clear(); Dealloc<void*>(table_, num_buckets_); } } private: enum { kMinTableSize = 8 }; // Linked-list nodes, as one would expect for a chaining hash table. struct Node { KeyValuePair kv; Node* next; }; // This is safe only if the given pointer is known to point to a Key that is // part of a Node. static Node* NodePtrFromKeyPtr(Key* k) { return reinterpret_cast<Node*>(k); } static Key* KeyPtrFromNodePtr(Node* node) { return &node->kv.key(); } // Trees. The payload type is pointer to Key, so that we can query the tree // with Keys that are not in any particular data structure. When we insert, // though, the pointer is always pointing to a Key that is inside a Node. struct KeyCompare { bool operator()(const Key* n0, const Key* n1) const { return *n0 < *n1; } }; typedef typename Allocator::template rebind<Key*>::other KeyPtrAllocator; typedef std::set<Key*, KeyCompare, KeyPtrAllocator> Tree; typedef typename Tree::iterator TreeIterator; // iterator and const_iterator are instantiations of iterator_base. template <typename KeyValueType> struct iterator_base { typedef KeyValueType& reference; typedef KeyValueType* pointer; // Invariants: // node_ is always correct. This is handy because the most common // operations are operator* and operator-> and they only use node_. // When node_ is set to a non-NULL value, all the other non-const fields // are updated to be correct also, but those fields can become stale // if the underlying map is modified. When those fields are needed they // are rechecked, and updated if necessary. iterator_base() : node_(NULL), m_(NULL), bucket_index_(0) {} explicit iterator_base(const InnerMap* m) : m_(m) { SearchFrom(m->index_of_first_non_null_); } // Any iterator_base can convert to any other. This is overkill, and we // rely on the enclosing class to use it wisely. The standard "iterator // can convert to const_iterator" is OK but the reverse direction is not. template <typename U> explicit iterator_base(const iterator_base<U>& it) : node_(it.node_), m_(it.m_), bucket_index_(it.bucket_index_) {} iterator_base(Node* n, const InnerMap* m, size_type index) : node_(n), m_(m), bucket_index_(index) {} iterator_base(TreeIterator tree_it, const InnerMap* m, size_type index) : node_(NodePtrFromKeyPtr(*tree_it)), m_(m), bucket_index_(index) { // Invariant: iterators that use buckets with trees have an even // bucket_index_. GOOGLE_DCHECK_EQ(bucket_index_ % 2, 0); } // Advance through buckets, looking for the first that isn't empty. // If nothing non-empty is found then leave node_ == NULL. void SearchFrom(size_type start_bucket) { GOOGLE_DCHECK(m_->index_of_first_non_null_ == m_->num_buckets_ || m_->table_[m_->index_of_first_non_null_] != NULL); node_ = NULL; for (bucket_index_ = start_bucket; bucket_index_ < m_->num_buckets_; bucket_index_++) { if (m_->TableEntryIsNonEmptyList(bucket_index_)) { node_ = static_cast<Node*>(m_->table_[bucket_index_]); break; } else if (m_->TableEntryIsTree(bucket_index_)) { Tree* tree = static_cast<Tree*>(m_->table_[bucket_index_]); GOOGLE_DCHECK(!tree->empty()); node_ = NodePtrFromKeyPtr(*tree->begin()); break; } } } reference operator*() const { return node_->kv; } pointer operator->() const { return &(operator*()); } friend bool operator==(const iterator_base& a, const iterator_base& b) { return a.node_ == b.node_; } friend bool operator!=(const iterator_base& a, const iterator_base& b) { return a.node_ != b.node_; } iterator_base& operator++() { if (node_->next == NULL) { TreeIterator tree_it; const bool is_list = revalidate_if_necessary(&tree_it); if (is_list) { SearchFrom(bucket_index_ + 1); } else { GOOGLE_DCHECK_EQ(bucket_index_ & 1, 0); Tree* tree = static_cast<Tree*>(m_->table_[bucket_index_]); if (++tree_it == tree->end()) { SearchFrom(bucket_index_ + 2); } else { node_ = NodePtrFromKeyPtr(*tree_it); } } } else { node_ = node_->next; } return *this; } iterator_base operator++(int /* unused */) { iterator_base tmp = *this; ++*this; return tmp; } // Assumes node_ and m_ are correct and non-NULL, but other fields may be // stale. Fix them as needed. Then return true iff node_ points to a // Node in a list. If false is returned then *it is modified to be // a valid iterator for node_. bool revalidate_if_necessary(TreeIterator* it) { GOOGLE_DCHECK(node_ != NULL && m_ != NULL); // Force bucket_index_ to be in range. bucket_index_ &= (m_->num_buckets_ - 1); // Common case: the bucket we think is relevant points to node_. if (m_->table_[bucket_index_] == static_cast<void*>(node_)) return true; // Less common: the bucket is a linked list with node_ somewhere in it, // but not at the head. if (m_->TableEntryIsNonEmptyList(bucket_index_)) { Node* l = static_cast<Node*>(m_->table_[bucket_index_]); while ((l = l->next) != NULL) { if (l == node_) { return true; } } } // Well, bucket_index_ still might be correct, but probably // not. Revalidate just to be sure. This case is rare enough that we // don't worry about potential optimizations, such as having a custom // find-like method that compares Node* instead of const Key&. iterator_base i(m_->find(*KeyPtrFromNodePtr(node_), it)); bucket_index_ = i.bucket_index_; return m_->TableEntryIsList(bucket_index_); } Node* node_; const InnerMap* m_; size_type bucket_index_; }; public: typedef iterator_base<KeyValuePair> iterator; typedef iterator_base<const KeyValuePair> const_iterator; iterator begin() { return iterator(this); } iterator end() { return iterator(); } const_iterator begin() const { return const_iterator(this); } const_iterator end() const { return const_iterator(); } void clear() { for (size_type b = 0; b < num_buckets_; b++) { if (TableEntryIsNonEmptyList(b)) { Node* node = static_cast<Node*>(table_[b]); table_[b] = NULL; do { Node* next = node->next; DestroyNode(node); node = next; } while (node != NULL); } else if (TableEntryIsTree(b)) { Tree* tree = static_cast<Tree*>(table_[b]); GOOGLE_DCHECK(table_[b] == table_[b + 1] && (b & 1) == 0); table_[b] = table_[b + 1] = NULL; typename Tree::iterator tree_it = tree->begin(); do { Node* node = NodePtrFromKeyPtr(*tree_it); typename Tree::iterator next = tree_it; ++next; tree->erase(tree_it); DestroyNode(node); tree_it = next; } while (tree_it != tree->end()); DestroyTree(tree); b++; } } num_elements_ = 0; index_of_first_non_null_ = num_buckets_; } const hasher& hash_function() const { return *this; } static size_type max_size() { return static_cast<size_type>(1) << (sizeof(void**) >= 8 ? 60 : 28); } size_type size() const { return num_elements_; } bool empty() const { return size() == 0; } iterator find(const Key& k) { return iterator(FindHelper(k).first); } const_iterator find(const Key& k) const { return find(k, NULL); } // In traditional C++ style, this performs "insert if not present." std::pair<iterator, bool> insert(const KeyValuePair& kv) { std::pair<const_iterator, size_type> p = FindHelper(kv.key()); // Case 1: key was already present. if (p.first.node_ != NULL) return std::make_pair(iterator(p.first), false); // Case 2: insert. if (ResizeIfLoadIsOutOfRange(num_elements_ + 1)) { p = FindHelper(kv.key()); } const size_type b = p.second; // bucket number Node* node = Alloc<Node>(1); alloc_.construct(&node->kv, kv); iterator result = InsertUnique(b, node); ++num_elements_; return std::make_pair(result, true); } // The same, but if an insertion is necessary then the value portion of the // inserted key-value pair is left uninitialized. std::pair<iterator, bool> insert(const Key& k) { std::pair<const_iterator, size_type> p = FindHelper(k); // Case 1: key was already present. if (p.first.node_ != NULL) return std::make_pair(iterator(p.first), false); // Case 2: insert. if (ResizeIfLoadIsOutOfRange(num_elements_ + 1)) { p = FindHelper(k); } const size_type b = p.second; // bucket number Node* node = Alloc<Node>(1); typedef typename Allocator::template rebind<Key>::other KeyAllocator; KeyAllocator(alloc_).construct(&node->kv.key(), k); iterator result = InsertUnique(b, node); ++num_elements_; return std::make_pair(result, true); } Value& operator[](const Key& k) { KeyValuePair kv(k, Value()); return insert(kv).first->value(); } void erase(iterator it) { GOOGLE_DCHECK_EQ(it.m_, this); typename Tree::iterator tree_it; const bool is_list = it.revalidate_if_necessary(&tree_it); size_type b = it.bucket_index_; Node* const item = it.node_; if (is_list) { GOOGLE_DCHECK(TableEntryIsNonEmptyList(b)); Node* head = static_cast<Node*>(table_[b]); head = EraseFromLinkedList(item, head); table_[b] = static_cast<void*>(head); } else { GOOGLE_DCHECK(TableEntryIsTree(b)); Tree* tree = static_cast<Tree*>(table_[b]); tree->erase(*tree_it); if (tree->empty()) { // Force b to be the minimum of b and b ^ 1. This is important // only because we want index_of_first_non_null_ to be correct. b &= ~static_cast<size_type>(1); DestroyTree(tree); table_[b] = table_[b + 1] = NULL; } } DestroyNode(item); --num_elements_; if (GOOGLE_PREDICT_FALSE(b == index_of_first_non_null_)) { while (index_of_first_non_null_ < num_buckets_ && table_[index_of_first_non_null_] == NULL) { ++index_of_first_non_null_; } } } private: const_iterator find(const Key& k, TreeIterator* it) const { return FindHelper(k, it).first; } std::pair<const_iterator, size_type> FindHelper(const Key& k) const { return FindHelper(k, NULL); } std::pair<const_iterator, size_type> FindHelper(const Key& k, TreeIterator* it) const { size_type b = BucketNumber(k); if (TableEntryIsNonEmptyList(b)) { Node* node = static_cast<Node*>(table_[b]); do { if (IsMatch(*KeyPtrFromNodePtr(node), k)) { return std::make_pair(const_iterator(node, this, b), b); } else { node = node->next; } } while (node != NULL); } else if (TableEntryIsTree(b)) { GOOGLE_DCHECK_EQ(table_[b], table_[b ^ 1]); b &= ~static_cast<size_t>(1); Tree* tree = static_cast<Tree*>(table_[b]); Key* key = const_cast<Key*>(&k); typename Tree::iterator tree_it = tree->find(key); if (tree_it != tree->end()) { if (it != NULL) *it = tree_it; return std::make_pair(const_iterator(tree_it, this, b), b); } } return std::make_pair(end(), b); } // Insert the given Node in bucket b. If that would make bucket b too big, // and bucket b is not a tree, create a tree for buckets b and b^1 to share. // Requires count(*KeyPtrFromNodePtr(node)) == 0 and that b is the correct // bucket. num_elements_ is not modified. iterator InsertUnique(size_type b, Node* node) { GOOGLE_DCHECK(index_of_first_non_null_ == num_buckets_ || table_[index_of_first_non_null_] != NULL); // In practice, the code that led to this point may have already // determined whether we are inserting into an empty list, a short list, // or whatever. But it's probably cheap enough to recompute that here; // it's likely that we're inserting into an empty or short list. iterator result; GOOGLE_DCHECK(find(*KeyPtrFromNodePtr(node)) == end()); if (TableEntryIsEmpty(b)) { result = InsertUniqueInList(b, node); } else if (TableEntryIsNonEmptyList(b)) { if (GOOGLE_PREDICT_FALSE(TableEntryIsTooLong(b))) { TreeConvert(b); result = InsertUniqueInTree(b, node); GOOGLE_DCHECK_EQ(result.bucket_index_, b & ~static_cast<size_type>(1)); } else { // Insert into a pre-existing list. This case cannot modify // index_of_first_non_null_, so we skip the code to update it. return InsertUniqueInList(b, node); } } else { // Insert into a pre-existing tree. This case cannot modify // index_of_first_non_null_, so we skip the code to update it. return InsertUniqueInTree(b, node); } // parentheses around (std::min) prevents macro expansion of min(...) index_of_first_non_null_ = (std::min)(index_of_first_non_null_, result.bucket_index_); return result; } // Helper for InsertUnique. Handles the case where bucket b is a // not-too-long linked list. iterator InsertUniqueInList(size_type b, Node* node) { node->next = static_cast<Node*>(table_[b]); table_[b] = static_cast<void*>(node); return iterator(node, this, b); } // Helper for InsertUnique. Handles the case where bucket b points to a // Tree. iterator InsertUniqueInTree(size_type b, Node* node) { GOOGLE_DCHECK_EQ(table_[b], table_[b ^ 1]); // Maintain the invariant that node->next is NULL for all Nodes in Trees. node->next = NULL; return iterator(static_cast<Tree*>(table_[b]) ->insert(KeyPtrFromNodePtr(node)) .first, this, b & ~static_cast<size_t>(1)); } // Returns whether it did resize. Currently this is only used when // num_elements_ increases, though it could be used in other situations. // It checks for load too low as well as load too high: because any number // of erases can occur between inserts, the load could be as low as 0 here. // Resizing to a lower size is not always helpful, but failing to do so can // destroy the expected big-O bounds for some operations. By having the // policy that sometimes we resize down as well as up, clients can easily // keep O(size()) = O(number of buckets) if they want that. bool ResizeIfLoadIsOutOfRange(size_type new_size) { const size_type kMaxMapLoadTimes16 = 12; // controls RAM vs CPU tradeoff const size_type hi_cutoff = num_buckets_ * kMaxMapLoadTimes16 / 16; const size_type lo_cutoff = hi_cutoff / 4; // We don't care how many elements are in trees. If a lot are, // we may resize even though there are many empty buckets. In // practice, this seems fine. if (GOOGLE_PREDICT_FALSE(new_size >= hi_cutoff)) { if (num_buckets_ <= max_size() / 2) { Resize(num_buckets_ * 2); return true; } } else if (GOOGLE_PREDICT_FALSE(new_size <= lo_cutoff && num_buckets_ > kMinTableSize)) { size_type lg2_of_size_reduction_factor = 1; // It's possible we want to shrink a lot here... size() could even be 0. // So, estimate how much to shrink by making sure we don't shrink so // much that we would need to grow the table after a few inserts. const size_type hypothetical_size = new_size * 5 / 4 + 1; while ((hypothetical_size << lg2_of_size_reduction_factor) < hi_cutoff) { ++lg2_of_size_reduction_factor; } size_type new_num_buckets = std::max<size_type>( kMinTableSize, num_buckets_ >> lg2_of_size_reduction_factor); if (new_num_buckets != num_buckets_) { Resize(new_num_buckets); return true; } } return false; } // Resize to the given number of buckets. void Resize(size_t new_num_buckets) { GOOGLE_DCHECK_GE(new_num_buckets, kMinTableSize); void** const old_table = table_; const size_type old_table_size = num_buckets_; num_buckets_ = new_num_buckets; table_ = CreateEmptyTable(num_buckets_); const size_type start = index_of_first_non_null_; index_of_first_non_null_ = num_buckets_; for (size_type i = start; i < old_table_size; i++) { if (TableEntryIsNonEmptyList(old_table, i)) { TransferList(old_table, i); } else if (TableEntryIsTree(old_table, i)) { TransferTree(old_table, i++); } } Dealloc<void*>(old_table, old_table_size); } void TransferList(void* const* table, size_type index) { Node* node = static_cast<Node*>(table[index]); do { Node* next = node->next; InsertUnique(BucketNumber(*KeyPtrFromNodePtr(node)), node); node = next; } while (node != NULL); } void TransferTree(void* const* table, size_type index) { Tree* tree = static_cast<Tree*>(table[index]); typename Tree::iterator tree_it = tree->begin(); do { Node* node = NodePtrFromKeyPtr(*tree_it); InsertUnique(BucketNumber(**tree_it), node); } while (++tree_it != tree->end()); DestroyTree(tree); } Node* EraseFromLinkedList(Node* item, Node* head) { if (head == item) { return head->next; } else { head->next = EraseFromLinkedList(item, head->next); return head; } } bool TableEntryIsEmpty(size_type b) const { return TableEntryIsEmpty(table_, b); } bool TableEntryIsNonEmptyList(size_type b) const { return TableEntryIsNonEmptyList(table_, b); } bool TableEntryIsTree(size_type b) const { return TableEntryIsTree(table_, b); } bool TableEntryIsList(size_type b) const { return TableEntryIsList(table_, b); } static bool TableEntryIsEmpty(void* const* table, size_type b) { return table[b] == NULL; } static bool TableEntryIsNonEmptyList(void* const* table, size_type b) { return table[b] != NULL && table[b] != table[b ^ 1]; } static bool TableEntryIsTree(void* const* table, size_type b) { return !TableEntryIsEmpty(table, b) && !TableEntryIsNonEmptyList(table, b); } static bool TableEntryIsList(void* const* table, size_type b) { return !TableEntryIsTree(table, b); } void TreeConvert(size_type b) { GOOGLE_DCHECK(!TableEntryIsTree(b) && !TableEntryIsTree(b ^ 1)); typename Allocator::template rebind<Tree>::other tree_allocator(alloc_); Tree* tree = tree_allocator.allocate(1); // We want to use the three-arg form of construct, if it exists, but we // create a temporary and use the two-arg construct that's known to exist. // It's clunky, but the compiler should be able to generate more-or-less // the same code. tree_allocator.construct(tree, Tree(KeyCompare(), KeyPtrAllocator(alloc_))); // Now the tree is ready to use. size_type count = CopyListToTree(b, tree) + CopyListToTree(b ^ 1, tree); GOOGLE_DCHECK_EQ(count, tree->size()); table_[b] = table_[b ^ 1] = static_cast<void*>(tree); } // Copy a linked list in the given bucket to a tree. // Returns the number of things it copied. size_type CopyListToTree(size_type b, Tree* tree) { size_type count = 0; Node* node = static_cast<Node*>(table_[b]); while (node != NULL) { tree->insert(KeyPtrFromNodePtr(node)); ++count; Node* next = node->next; node->next = NULL; node = next; } return count; } // Return whether table_[b] is a linked list that seems awfully long. // Requires table_[b] to point to a non-empty linked list. bool TableEntryIsTooLong(size_type b) { const size_type kMaxLength = 8; size_type count = 0; Node* node = static_cast<Node*>(table_[b]); do { ++count; node = node->next; } while (node != NULL); // Invariant: no linked list ever is more than kMaxLength in length. GOOGLE_DCHECK_LE(count, kMaxLength); return count >= kMaxLength; } size_type BucketNumber(const Key& k) const { // We inherit from hasher, so one-arg operator() provides a hash function. size_type h = (*const_cast<InnerMap*>(this))(k); // To help prevent people from making assumptions about the hash function, // we use the seed differently depending on NDEBUG. The default hash // function, the seeding, etc., are all likely to change in the future. #ifndef NDEBUG return (h * (seed_ | 1)) & (num_buckets_ - 1); #else return (h + seed_) & (num_buckets_ - 1); #endif } bool IsMatch(const Key& k0, const Key& k1) const { return std::equal_to<Key>()(k0, k1); } // Return a power of two no less than max(kMinTableSize, n). // Assumes either n < kMinTableSize or n is a power of two. size_type TableSize(size_type n) { return n < static_cast<size_type>(kMinTableSize) ? static_cast<size_type>(kMinTableSize) : n; } // Use alloc_ to allocate an array of n objects of type U. template <typename U> U* Alloc(size_type n) { typedef typename Allocator::template rebind<U>::other alloc_type; return alloc_type(alloc_).allocate(n); } // Use alloc_ to deallocate an array of n objects of type U. template <typename U> void Dealloc(U* t, size_type n) { typedef typename Allocator::template rebind<U>::other alloc_type; alloc_type(alloc_).deallocate(t, n); } void DestroyNode(Node* node) { alloc_.destroy(&node->kv); Dealloc<Node>(node, 1); } void DestroyTree(Tree* tree) { typename Allocator::template rebind<Tree>::other tree_allocator(alloc_); tree_allocator.destroy(tree); tree_allocator.deallocate(tree, 1); } void** CreateEmptyTable(size_type n) { GOOGLE_DCHECK(n >= kMinTableSize); GOOGLE_DCHECK_EQ(n & (n - 1), 0); void** result = Alloc<void*>(n); memset(result, 0, n * sizeof(result[0])); return result; } // Return a randomish value. size_type Seed() const { // random_device can throw, so avoid it unless we are compiling with // exceptions enabled. #if __cpp_exceptions && LANG_CXX11 try { std::random_device rd; std::knuth_b knuth(rd()); std::uniform_int_distribution<size_type> u; return u(knuth); } catch (...) { } #endif size_type s = static_cast<size_type>(reinterpret_cast<uintptr_t>(this)); #if defined(__x86_64__) && defined(__GNUC__) uint32 hi, lo; asm("rdtsc" : "=a" (lo), "=d" (hi)); s += ((static_cast<uint64>(hi) << 32) | lo); #endif return s; } size_type num_elements_; size_type num_buckets_; size_type seed_; size_type index_of_first_non_null_; void** table_; // an array with num_buckets_ entries Allocator alloc_; GOOGLE_DISALLOW_EVIL_CONSTRUCTORS(InnerMap); }; // end of class InnerMap public: // Iterators class const_iterator : public std::iterator<std::forward_iterator_tag, value_type, ptrdiff_t, const value_type*, const value_type&> { typedef typename InnerMap::const_iterator InnerIt; public: const_iterator() {} explicit const_iterator(const InnerIt& it) : it_(it) {} const_reference operator*() const { return *it_->value(); } const_pointer operator->() const { return &(operator*()); } const_iterator& operator++() { ++it_; return *this; } const_iterator operator++(int) { return const_iterator(it_++); } friend bool operator==(const const_iterator& a, const const_iterator& b) { return a.it_ == b.it_; } friend bool operator!=(const const_iterator& a, const const_iterator& b) { return !(a == b); } private: InnerIt it_; }; class iterator : public std::iterator<std::forward_iterator_tag, value_type> { typedef typename InnerMap::iterator InnerIt; public: iterator() {} explicit iterator(const InnerIt& it) : it_(it) {} reference operator*() const { return *it_->value(); } pointer operator->() const { return &(operator*()); } iterator& operator++() { ++it_; return *this; } iterator operator++(int) { return iterator(it_++); } // Allow implicit conversion to const_iterator. operator const_iterator() const { return const_iterator(typename InnerMap::const_iterator(it_)); } friend bool operator==(const iterator& a, const iterator& b) { return a.it_ == b.it_; } friend bool operator!=(const iterator& a, const iterator& b) { return !(a == b); } private: friend class Map; InnerIt it_; }; iterator begin() { return iterator(elements_->begin()); } iterator end() { return iterator(elements_->end()); } const_iterator begin() const { return const_iterator(iterator(elements_->begin())); } const_iterator end() const { return const_iterator(iterator(elements_->end())); } const_iterator cbegin() const { return begin(); } const_iterator cend() const { return end(); } // Capacity size_type size() const { return elements_->size(); } bool empty() const { return size() == 0; } // Element access T& operator[](const key_type& key) { value_type** value = &(*elements_)[key]; if (*value == NULL) { *value = CreateValueTypeInternal(key); internal::MapValueInitializer<google::protobuf::is_proto_enum<T>::value, T>::Initialize((*value)->second, default_enum_value_); } return (*value)->second; } const T& at(const key_type& key) const { const_iterator it = find(key); GOOGLE_CHECK(it != end()); return it->second; } T& at(const key_type& key) { iterator it = find(key); GOOGLE_CHECK(it != end()); return it->second; } // Lookup size_type count(const key_type& key) const { const_iterator it = find(key); GOOGLE_DCHECK(it == end() || key == it->first); return it == end() ? 0 : 1; } const_iterator find(const key_type& key) const { return const_iterator(iterator(elements_->find(key))); } iterator find(const key_type& key) { return iterator(elements_->find(key)); } std::pair<const_iterator, const_iterator> equal_range( const key_type& key) const { const_iterator it = find(key); if (it == end()) { return std::pair<const_iterator, const_iterator>(it, it); } else { const_iterator begin = it++; return std::pair<const_iterator, const_iterator>(begin, it); } } std::pair<iterator, iterator> equal_range(const key_type& key) { iterator it = find(key); if (it == end()) { return std::pair<iterator, iterator>(it, it); } else { iterator begin = it++; return std::pair<iterator, iterator>(begin, it); } } // insert std::pair<iterator, bool> insert(const value_type& value) { std::pair<typename InnerMap::iterator, bool> p = elements_->insert(value.first); if (p.second) { p.first->value() = CreateValueTypeInternal(value); } return std::pair<iterator, bool>(iterator(p.first), p.second); } template <class InputIt> void insert(InputIt first, InputIt last) { for (InputIt it = first; it != last; ++it) { iterator exist_it = find(it->first); if (exist_it == end()) { operator[](it->first) = it->second; } } } // Erase and clear size_type erase(const key_type& key) { iterator it = find(key); if (it == end()) { return 0; } else { erase(it); return 1; } } iterator erase(iterator pos) { if (arena_ == NULL) delete pos.operator->(); iterator i = pos++; elements_->erase(i.it_); return pos; } void erase(iterator first, iterator last) { while (first != last) { first = erase(first); } } void clear() { erase(begin(), end()); } // Assign Map& operator=(const Map& other) { if (this != &other) { clear(); insert(other.begin(), other.end()); } return *this; } void swap(Map& other) { if (arena_ == other.arena_) { std::swap(default_enum_value_, other.default_enum_value_); std::swap(elements_, other.elements_); } else { // TODO(zuguang): optimize this. The temporary copy can be allocated // in the same arena as the other message, and the "other = copy" can // be replaced with the fast-path swap above. Map copy = *this; *this = other; other = copy; } } // Access to hasher. Currently this returns a copy, but it may // be modified to return a const reference in the future. hasher hash_function() const { return elements_->hash_function(); } private: // Set default enum value only for proto2 map field whose value is enum type. void SetDefaultEnumValue(int default_enum_value) { default_enum_value_ = default_enum_value; } value_type* CreateValueTypeInternal(const Key& key) { if (arena_ == NULL) { return new value_type(key); } else { value_type* value = reinterpret_cast<value_type*>( Arena::CreateArray<uint8>(arena_, sizeof(value_type))); Arena::CreateInArenaStorage(const_cast<Key*>(&value->first), arena_); Arena::CreateInArenaStorage(&value->second, arena_); const_cast<Key&>(value->first) = key; return value; } } value_type* CreateValueTypeInternal(const value_type& value) { if (arena_ == NULL) { return new value_type(value); } else { value_type* p = reinterpret_cast<value_type*>( Arena::CreateArray<uint8>(arena_, sizeof(value_type))); Arena::CreateInArenaStorage(const_cast<Key*>(&p->first), arena_); Arena::CreateInArenaStorage(&p->second, arena_); const_cast<Key&>(p->first) = value.first; p->second = value.second; return p; } } Arena* arena_; int default_enum_value_; InnerMap* elements_; friend class ::google::protobuf::Arena; typedef void InternalArenaConstructable_; typedef void DestructorSkippable_; template <typename Derived, typename K, typename V, internal::WireFormatLite::FieldType key_wire_type, internal::WireFormatLite::FieldType value_wire_type, int default_enum_value> friend class internal::MapFieldLite; }; } // namespace protobuf } // namespace google #endif // GOOGLE_PROTOBUF_MAP_H__
{ "pile_set_name": "Github" }
I've seen it and it still looks good to me
{ "pile_set_name": "Enron Emails" }
Treading Water While Sea Levels Rise At the UN climate talks that ended wearily on Saturday night in Warsaw, negotiators showed little appetite for making firm climate finance commitments or promising ambitious climate action. But they did succeed, again, in keeping hope alive for a 2015 agreement. The final outcome was a broad framework agreement that outlines a system for pledging emissions cuts and a new mechanism to tackle loss and damage. There were new pledges and payments for reducing deforestation through REDD+[4] and for the Adaptation Fund[5], however the meeting did little more than avoid creating roadblocks on the road to a Paris agreement in 2015. In one of the few new financial commitments, the United Kingdom, Norway, and the United States together contributed $280 million to building sustainable landscapes through the BioCarbon Fund[6] set up by the World Bank Group. At the same time, COP19 was an increasingly emotional Conference of Parties to the UN Framework Convention on Climate Change. The overture to this round of climate drama was provided by Typhoon Haiyan. Haiyan added, sadly, more to the mounting evidence of the costs of failure in tackling climate change. The language is inexorably moving towards one of solidarity, of justice. But for the moment, this framing is insufficient to prevent emission reduction commitments from moving backwards. And yet again, as was the case in the climate conferences in Cancun, Durban, Doha, and now Warsaw, outside the official negotiations, there is growing pragmatic climate action driven by climate leaders from every walk of life. The sense of urgency and opportunity is building, it just fails to translate into textual agreement. In Warsaw, more than in other COPs, in the corridors, the discussions were about the retooling of economies. In discussions on how we would mobilize the talisman figure of $100 billion in climate finance, the conversation moved easily to the fiscal policies and subsidies[12] that too often undermine climate goals. The discussions on how to use precious public climate finance to attract investment from institutional investors and pension funds moved to include how, if climate poses a systemic risk to long-term growth and competitiveness, we would bring the science, data, and evidence to those with responsibility for economic health at a national and international level more purposefully than has been done before outside the World Bank Group. In Warsaw too, after a decision[13] one year ago in Doha on the role gender plays in climate, several powerful women stand out as advocates for action. Mary Robinson, through the Mary Robinson Foundation for Climate Justice[14], has been fearless for many years in raising the role women play in solutions as well as the gender differences in the impacts. She has been joined over the years by powerful women playing a role as hosts, from Connie Hedegaard to Patricia Espinosa to Maite Nkoana-Mashabane. Christiana Figueres, as the first woman Executive Secretary of the UNFCCC, is a powerful symbol for many. In the halls and corridors at Warsaw, the sense of urgency and practicality was embodied, increasingly, by women. Brazil Environment Minister Izabella Teixeira called for "fifty shades of green." She argues that we need multiple approaches to addressing the climate challenge, and most of them require moving away from entrenched positions and focusing on what works in each sector of the economy. Secretary Lucille Sering, Vice Chair of the Climate Change Commission of the Philippines, was everywhere at the Warsaw COP. Her frustration at the international community’s ability to regulate emissions was masked by a calm determination to drive environmental action. Her passion is informed by her own experience. She knows first-hand[17] the impact of extreme weather and the tragic human and financial losses that follow. These women are looking for solutions that build resilience and enable farmers, foresters, fishermen, women, and the urban poor to prosper and economies to grow. We know that an African farmer will practice climate-smart agriculture[18], not because it reduces emissions, but because it puts food on the table and cash in his or her pocket. Recognizing the economic imperative for climate action is vital. If the World Bank Group can help countries identify the low-carbon growth patterns that deliver local needs for jobs and resilience, we can make a major contribution to tackling the climate challenge. There are thousands of Izabellas, Lindiwes, and Lucilles. Radically pragmatic, if they are supported and support each other, future gatherings in Lima and Paris will do more than tread water. We will be able to plunge forward, perhaps against the tide to begin with, but the tide will turn.
{ "pile_set_name": "Pile-CC" }
During operation of a motor driven walk-behind garden tool, such as a walk-behind lawn mower, vibrations originating from the engine and an operating unit, such as a cutting unit, might be transmitted to the handle assembly of the tool, and further to the hands of an operator. It is well known that exposing an operator to such vibrations can be injurious, and cause problems such as the white finger syndrome. Moreover, components of the garden tool may be damaged and/or come loose. So far, two main categories of solutions are used in order to minimize the amount of vibrations reaching the hands of the operator. The first category includes garden tools having anti-vibrated handles. EP1613143B1 discloses a lawn mower in which the handle assembly is provided with vibration damping means. A major drawback with solutions based on anti-vibrated handles is that the operator might experience that the handle feels non-rigid and that it becomes more difficult to manoeuvre the garden tool. The second category of solutions has resulted in garden tools having anti-vibrated engines. U.S. Pat. No. 4,813,218 discloses a lawn mower in which damping means are provided between the engine and a cover portion of the lawn mower. A drawback with this solution is that the vibration levels of the engine might result in worn out or damaged engine components. However, a remaining problem is that the engine in this case is subjected to high vibration levels, which in turn may result in motor wear and a reduced motor life. In order to reduce the vibration levels in the engine, EP1631141B1 proposes a lawn mower in which the engine is rigidly connected with the cover portion, whereas damping means are provided between the cover portion and a wheel frame of the lawn mower. According to this solution, the vibration levels of the engine will be reduced by the mass of the cover portion, counteracting the movements of the engine. However, the vibration levels of the engine will still be problematic. Moreover, using a grass collector will be troublesome when the lawn mower is designed according to EP1631141B1.
{ "pile_set_name": "USPTO Backgrounds" }
Q: JTabbedPane Component takes up entire window I'm new to Java and the entire swing development. I'm working on a Window with three tabs and adding each component to those tabs. I started by adding a textfield to the 3rd tab, but it's taking up the entire tab. I'm sure if I add other components it will make room, but isn't there a way to make it so it doesn't initially take up the entire Tabbed Pane? package literature.windows; import java.awt.*; import javax.swing.*; public class MainWindow extends JFrame { JPanel storiesPanel = new JPanel(); JPanel plotPanel = new JPanel(); JPanel charactersPanel = new JPanel(); JTextField addCharacterTextField = new JTextField("Enter Character's Name", 25); public MainWindow() { setSize(800, 600); JTabbedPane tabs = new JTabbedPane(); tabs.addTab("Stories", storiesPanel); tabs.addTab("Plot", plotPanel); tabs.addTab("Characters", charactersPanel); add(tabs); tabs.setTabComponentAt(2, addCharacterTextField); setVisible(true); } } A: You are currently setting the entire tab component for that tab. Instead you need to add the JTextField to the container/panel for that tab. Replace tabs.setTabComponentAt(2, addCharacterTextField); with charactersPanel.add(addCharacterTextField);
{ "pile_set_name": "StackExchange" }
The effect of different speaker accents on sentence comprehension in children with speech sound disorder. There is substantial evidence that a speaker's accent, specifically an unfamiliar accent, can affect the listener's comprehension. In general, this effect holds true for both adults and children as well as those with typical and impaired language. Previous studies have investigated the effect of different accents on individuals with language disorders, but children with speech sound disorders (SSDs) have received little attention. The current study aims to learn more about the ability of children with SSD to process different speaker accents. Fifteen children with SSD aged between 4;01 and 5;11 years, and 16 typically developing children matched on language ability, age, socioeconomic status, gender and cognitive ability participated in the current study. A sentence comprehension task was carried out with each child, requiring them to follow instructions of increasing length spoken in three different accents - (i) a local Irish (Cork) accent, (ii) a regional North American accent and (iii) a non-native Indian English accent. Results showed no significant group difference and speaker accent did not significantly impact children's performance on the task. The results are discussed in relation to factors that influence accent comprehension, and their implications for children's underlying phonological representations.
{ "pile_set_name": "PubMed Abstracts" }
/* zmalloc - total amount of allocated memory aware version of malloc() * * Copyright (c) 2009-2010, Salvatore Sanfilippo <antirez at gmail dot com> * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * * Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * Neither the name of Redis nor the names of its contributors may be used * to endorse or promote products derived from this software without * specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #ifndef __ZMALLOC_H #define __ZMALLOC_H /* Double expansion needed for stringification of macro values. */ #define __xstr(s) __str(s) #define __str(s) #s #if defined(USE_TCMALLOC) #define ZMALLOC_LIB ("tcmalloc-" __xstr(TC_VERSION_MAJOR) "." __xstr(TC_VERSION_MINOR)) #include <google/tcmalloc.h> #if TC_VERSION_MAJOR >= 1 && TC_VERSION_MINOR >= 6 #define HAVE_MALLOC_SIZE 1 #define zmalloc_size(p) tc_malloc_size(p) #else #error "Newer version of tcmalloc required" #endif #elif defined(USE_JEMALLOC) #define ZMALLOC_LIB ("jemalloc-" __xstr(JEMALLOC_VERSION_MAJOR) "." __xstr(JEMALLOC_VERSION_MINOR) "." __xstr(JEMALLOC_VERSION_BUGFIX)) #define JEMALLOC_MANGLE #include <jemalloc/jemalloc.h> #if JEMALLOC_VERSION_MAJOR >= 2 && JEMALLOC_VERSION_MINOR >= 1 #define HAVE_MALLOC_SIZE 1 #define zmalloc_size(p) JEMALLOC_P(malloc_usable_size)(p) #else #error "Newer version of jemalloc required" #endif #elif defined(__APPLE__) #include <malloc/malloc.h> #define HAVE_MALLOC_SIZE 1 #define zmalloc_size(p) malloc_size(p) #endif #ifndef ZMALLOC_LIB #define ZMALLOC_LIB "libc" #endif void *zmalloc(size_t size); void *zcalloc(size_t size); void *zrealloc(void *ptr, size_t size); void zfree(void *ptr); char *zstrdup(const char *s); size_t zmalloc_used_memory(void); void zmalloc_enable_thread_safeness(void); float zmalloc_get_fragmentation_ratio(void); size_t zmalloc_get_rss(void); #ifndef HAVE_MALLOC_SIZE size_t zmalloc_size(void *ptr); #endif #endif /* __ZMALLOC_H */
{ "pile_set_name": "Github" }
One concern with resurfacing arthroplasty of the hip is the viability of the diminished femoral head. During the surgical procedure, the blood supply to the remaining part of the head might be damaged ([@CIT0004], [@CIT0008], [@CIT0010], [@CIT0005]). ^18^F-fluoride positron emission tomography (F-PET) is a sensitive and non-invasive diagnostic method for analysis of bone metabolism ([@CIT0003]) associated with new bone formation ([@CIT0012]), and bone viability ([@CIT0013]). Validation studies to correlate F-PET with bone histomorphometry have been performed ([@CIT0006], [@CIT0009]). In a previous prospective study of 14 patients ([@CIT0014]) who received an ASR resurfacing arthroplasty (DePuy Johnsson and Johnsson, Warsaw, IN), F-PET/CT scans were performed 1 week, 4 months, and 12 months after surgery. 4 of these 14 patients were found to have lost bone metabolism (measured by F-PET/CT) in the remaining part of their femoral heads, assessed as osteonecrosis, without any symptoms and without signs on plain radiographs. All 14 patients had had normal metabolism at the F-PET scan 1 week after surgery. Between the 4-month and the 12-month postoperative PET scans, 4 of the 14 patients had developed an area with no metabolism. In another F-PET/CT study of 32 patients ([@CIT0015]) with an ASR or DUROM resurfacing arthroplasty (Zimmer, Warsaw, IN), we performed the scans retrospectively 18--48 months after surgery. 7 cases in that study were found to have pathological non-metabolic areas in their femoral heads without there being symptoms or signs on radiographs. For the 11 cases that had been found to have lost bone metabolism in these 2 previous studies ([@CIT0014], [@CIT0015]), we investigated how their bone metabolism had developed 3--6.5 years after surgery. Patients and methods {#ss2} ==================== The present study included patients who were previously shown to have developed areas without metabolism in their resurfaced femoral heads ([@CIT0014], [@CIT0015]). These 11 patients (8 males), with a mean age of 45 (32--67) years at the time of surgery, were analyzed using plain radiography, clinical examination, and repeated F-PET scans. The mean follow-up time was 4.5 (3--6.5) years. 5 of the 11 cases were analyzed twice in this study, and 6 once, after their earlier scans ([Table](#T1){ref-type="table"}). ###### Area of low uptake (\< 0.65 SUV), given in cm2, in 11 hip joints containing prosthetic components, cement, and bone without tracer uptake. Values in parenthesis denote time (in months) after surgery Case Age at surgery PET 1 PET 2 PET 3 ------ ---------------- ----------- ----------- ----------- 1 35 8.9 (14) 11.3 (29) 13.9 (54) 2 39 9.7 (12) 12.4 (22) 25.9 (38) 3 58 17.6 (12) 10.3 (24) 13.1 (36) 4 67 9.3 (12) 14.0 (24) 12.7 (36) 5 43 9.5 (34) 9.6 (52) 6 47 10.2 (34) 10.2 (57) 17.2 (79) 7 56 14.8 (27) 14.5 (42) 8 40 8.8 (27) 8.7 (41) 9 51 14.3 (30) 10.2 (45) 10 32 8.6 (63) 8.5 (77) 11 32 7.1 (55) 7.2 (69) PET analysis {#ss3} ------------ We used a Siemens/CTI Exact HR+ scanner (Siemens/CTI, Knoxville, TN) for the PET measurements. Patients were placed in the supine position on the camera bed. The legs were stabilized by using a vacuum cushion. A venous catheter was inserted in an antecubital or dorsal hand vein for injection of tracer. 40 min after intravenous injection of 150 MBq \[^18^F\]-fluoride, a 15-cm section of the body covering the acetabulum and intertrochanteric region was scanned in 2D whole-body mode for 15 min. A 10-min transmission scan for attenuation correction was performed after completing the emission acquisition. The CT image from the former study was co-registered and fused with the HR+ PET images to indicate exact anatomical locations in the analysis. The quantitative emission scans were corrected for attenuation, scatter, and decay and reconstructed by a process of iterative reconstruction. Also, non-attenuation corrected emission scans were reconstructed. Standardized uptake values (SUVs) were calculated by the formula: SUV of tissue = activity in tissue (Bq/mL) × body weight (g) / total injected dose (Bq). Setting average body density to 1 g/mL, this expression gives a unit less value of the regional tissue activity in proportion to the average activity per mL for the entire body. The non-attenuation corrected images were evaluated qualitatively to rule out uptake artifacts related to motion. Quantitative ^18^F uptake in the 14 contralateral healthy femoral heads, analyzed in coronal projection, of the patients in our earlier report ([@CIT0014]) was mean 1.8 (0.80--3.41) SUV 1 year after surgery. In order to analyze the size of the region without normal metabolism in the femoral heads, we measured the area with an uptake of less than 0.65 SUV in the coronal projection of the hips, in the middle of the femoral component. The low-uptake area included the prosthesis, cement, and low-uptake bone. We also performed a visual inspection of the scans. It was not possible to analyze the low-uptake region as volume due to disturbance from the partial volume effect. Results {#ss4} ======= The clinical results were good; they were unchanged in all patients compared to the previous reports ([@CIT0014], [@CIT0015]). None of the patients suffered from hip pain. Radiographic results {#ss5} -------------------- All implants were assessed to be stable, and unchanged from the plain radiographs taken postoperatively. PET results {#ss6} ----------- All PET images clearly showed the fluoride uptake in the hip and upper femur, including the low-uptake areas. The area of low uptake corresponded to the acetabular and femoral prosthetic components, the bone cement, and most of the bone tissue region inside the femoral component ([Figure 1](#F1){ref-type="fig"}). ![F-PET scan of a resurfaced hip. Low tracer uptake by prosthetic components, cement, and bone. The dotted red line indicates area of low uptake (\< 0.65 SUV), which appears black.](ORT-0300-9734-083-022_g001){#F1} From the first PET scan to last one, the mean area of low uptake for all 11 cases had increased from 10.8 to 12.9 cm^2^ (Table and [Figure 2](#F2){ref-type="fig"}). ![Time scale of development of areas of low tracer uptake in the femoral heads for the 11 cases.](ORT-0300-9734-083-022_g002){#F2} Discussion {#ss7} ========== One of the main concerns after reintroduction of hip resurfacing arthroplasties during recent years has been the viability of the femoral head. Until recently, it has not been possible to study bone metabolism under the metal femoral component of a resurfacing THA---but F-PET, in contrast to radiographic methods, enables us to visualize the metabolism and viability of bone in the remaining part of the head. The patients in the present study featured in one or other of 2 previous F-PET studies. In the prospective study ([@CIT0014]), the volume of bone in the femoral heads that had reduced uptake of the F-tracer (indicating lack of new bone formation) appeared in the late postoperative time period, 4--12 months after surgery. This finding excludes the possibility of low-uptake bone being spongious bone mixed with bone cement from the time of surgery. In our retrospective F-PET study of 35 resurfacing THAs analyzed 2--5 years after surgery ([@CIT0015]), 3 were clinical failures. In addition, 7 of the 32 F-PET-scanned arthroplasties had areas of low uptake in the femoral heads bone, which were assessed as being loss of bone metabolism. In an F-PET study of 10 resurfacing THAs that were analyzed 10--33 months after surgery ([@CIT0002]), the metabolism in part of the head in 1 case had declined to half of the normal level. There have been reports of late failures with femoral neck fractures after resurfacing THA. [@CIT0007] studied a large number of resurfacing revisions by means of histology and morphology. They found that fractures involving the rim of the implant occurred during the first months, whereas fractures within the femoral head often took place closer to 1 year after surgery. [@CIT0001] also analyzed failed surface arthroplasties. They found that neck fractures occurred a few months after surgery, while failures from loosening of the femoral component often took place 17--100 months after surgery. [@CIT0011] analyzed 2 groups of failed resurfacing arthroplasties (failures from neck fractures and failures from other causes). The group with failure from neck fracture was found (to a higher degree) to be associated with osteonecrosis in the retrieved heads, compared to the group with failures for other reasons. The 11 cases of resurfacing THA in this study, which all had areas of reduced bone metabolism, were all asymptomatic 3--6.5 years after surgery. There were still no signs of failure on plain radiographs. Surprisingly, in 5 of the cases the region of low uptake had become further enlarged, indicating progression. On 3 occasions, the area of low uptake had decreased from one PET scan to the next (Table), when a swift increase in uptake then ensued. This finding raises the interesting question of whether the bone tissue without any detectable metabolism was actually in a state of necrosis, or whether the bone may have been in a state of chronic but reversible ischemia, indicating that healing of metabolically damaged bone may occur without any clinical consequences. The present study shows that relatively large metabolic changes can occur in the residual femoral head a long time after surgery in resurfacing THA. Apparently, the biology underlying the F-PET-derived findings of absence of bone metabolism is diverse and includes the possibility of spontaneous healing. This is encouraging, and might lead to novel therapeutic approaches if the mechanisms could be more thoroughly understood. Given the difficulties associated with obtaining histopathological material from asymptomatic patients, the use of PET with ^18^F-fluoride and other relevant tracers of bone activity in longitudinal studies should be explored further. The long-term clinical implications of our findings are still unclear. However, the presence of regions without any metabolism in the femoral head adjoining the femoral component, in combination with the observation that late failure in resurfacing arthroplasty can be due to femoral neck fracture, indicate that implant loosening in THA may be attributable to metabolic changes in bone. This leads us to the conclusion that resurfacing THA should be used with caution until the long-term outcomes of the procedure have been determined. JS: design and data collection, KS and JM: performed surgery and data collection, ON: design, analysis and interpretation of data, GU: design, data collection, analysis and interpretation of data. All the authors prepared the manuscript. This work was supported financially by the Center for Research and Development, Uppsala University/County Council of Gävleborg, Sweden. No competing interests declared.
{ "pile_set_name": "PubMed Central" }
I[NTRODUCTION]{.smallcaps} {#sec1-1} ========================== Surface osteosarcomas are rare primary bone tumors, which include a group of heterogeneous lesions with similar clinical, radiological, pathological and management end points. These tumors account for about 3-6% of all osteosarcomas.[@ref1] The main variants of surface osteosarcomas are the parosteal, perisoteal and the high grade surface osteosarcomas. Conventionally parosteal osteosarcomas are low grade tumors but dedifferentiated variants of parosteal ostesoarcoma are not uncommon.[@ref2][@ref3][@ref4] The high grade surface osteosarcomas have the worst prognosis. Various differences between parosteal, periosteal and high grade surface osteosarcomas are enumerated in [Table 1](#T1){ref-type="table"}. According to Grimer *et al*., the main factors that differentiate a parosteal from a periosteal osteosarcoma is that a parosteal tumor arises on the surface of the bone and has a high degree of structural differentiation, with a densely ossified mass radiologically and a low grade histological picture.[@ref5] Periosteal osteosarcoma, on the other hand, arises from under the periosteum and the typical radiological feature is the periosteal elevation encircling a good proportion of the bone. ###### Differences amongst various subtypes of surface osteosarcomas ![](IJOrtho-48-255-g001) P[AROSTEAL]{.smallcaps} O[STEOSARCOMA]{.smallcaps} {#sec1-2} ================================================== The diagnostic criteria to designate a surface osteosarcoma as parosteal osteosarcoma were defined by Okada *et al*.[@ref6] They concluded that radiographically, the lesion should have arisen from the surface of the bone, histologically, the tumor should be well differentiated (Grade 1 or 2); it should be characterized by well formed osteoid within a spindle-cell stroma and medullary involvement if any should be \<25% of the medullary cavity. Demographics {#sec2-1} ------------ Most studies on surface osteosarcomas are limited by small numbers, making it difficult to understand the actual demographics of the disease process. In a study by Song *et al*. a very high preponderance of female patients was seen.[@ref7] There were 10 females in a group of 11 parosteal osteosarcomas in this retrospective study, treated over a period of 17 years. Most other studies show an equal propensity of surface osteosarcomas in both genders. Parosteal osteosarcomas show a mild female preponderance (male: female = 2:3). In one of the largest series of 226 parosteal osteosarcomas, the average age of patients was 28 years (range 8-64 years).[@ref6] In a review of 29 cases of dedifferentiated parosteal osteosarcomas from the Rizzoli Institute, the average age was 36 years (range 15-85 years).[@ref2] It is therefore clear that the mean age of surface osteosarcomas is high when compared to conventional osteosarcomas, but the exact period of the decade when these occur is variable in most series. Dedifferentiated parosteal osteosarcomas, which are high grade lesions, can occur in a wide age distribution. Histopathology {#sec2-2} -------------- Histological grade of the lesion is essential to classify surface osteosarcomas. The commonly used four tier grading system is based on the original Broder\'s grading.[@ref8] The numeric grade of the tumor from 1 to 4 was equated to the percentage of anaplasia within the tumor (from ≤25% to 100%). Parosteal osteosarcomas are usually Grade 1/Grade 2 osteosarcomas that either lack or have minimal anaplasia and it is difficult to recognize these entities as neoplasms on cytological basis alone. Grossly, they appear as hard lobulated mass attached to the underlying cortex[@ref9] \[[Figure 1](#F1){ref-type="fig"}\]. Nodules of cartilage may be present within the substance of the tumor, or there can be an incomplete cartilage cap at the surface. Microscopic examination will demonstrate parallel, well formed bony trabeculae in a hypocellular stroma with or without osteoblastic rimming \[[Figure 2](#F2){ref-type="fig"}\]. Should a focus of anaplasia is identified within what is otherwise a Grade 1 tumor, then the lesion is termed "dedifferentiated" and it is assumed to follow an aggressive course.}Dedifferentiated parosteal osteosarcomas can be either synchronous (diagnosed at presentation) or metachronous (diagnosed at the time of recurrence). Cytogenetic analysis of parosteal osteosarcoma has demonstrated gain of 12q13-15 sequence contained within supernumerary ring chromosomes.[@ref9][@ref10] This characteristic cytogenetic abnormality is uncommon in conventional osteosarcoma. Such ring chromosomes are noted in other low grade malignant mesenchymal neoplasms such as well differentiated liposarcoma and dermatofibrosarcoma protruberans.[@ref1] The loci for SAS gene is located in q13-15 region of chromosome 12 and this gene is found to be amplified in surface osteosarcoma.[@ref11] Other genes, which were frequently found to be either co-amplified or over expressed in parosteal osteosarcoma include CDK4 and MDM2 \[[Figure 3](#F3){ref-type="fig"}\].[@ref12] ![Plain radiograph of the knee (lateral view) in a 26 year old lady with a parosteal osteosarcoma of the posterior surface of distal femur (commonest location)](IJOrtho-48-255-g002){#F1} ![A photomicrograph (×20) of a parosteal osteosarcoma showing well formed bony trabeculae in a hypocellular stroma with or without osteoblastic rimming](IJOrtho-48-255-g003){#F2} ![(a and b) 3-D CT reconstruction of a parosteal osteosarcoma of the distal third of the femur in a 24-year-old male patient](IJOrtho-48-255-g004){#F3} Clinical presentation {#sec2-3} --------------------- The most common location of a parosteal osteosarcoma is the posterior and distal part of the femoral metaphysis \[[Figure 1](#F1){ref-type="fig"}\]. This is followed by the proximal tibial metaphysis and the proximal humeral metaphysis. These three locations accounted for \>80% lesions in the Okada *et al*. series.[@ref6] In contrast, dedifferentiated parosteal osteosarcomas involve long bones (femur, humerus and tibia in order) as was seen in a series from the Rizzoli Institute.[@ref2] The clinical presentation is varied with most patients coming late for consultation in view of the lesion being slow growing. The commonest presentation is pain and swelling with \>80% of the lesions being around the knee joint. In Okada\'s *et al*. series of 189 parosteal osteosarcomas, 80 patients were painless.[@ref6] Swelling was the most common feature in this series. Swelling was followed by pain as the second common feature in their series, seen in 66 patients. 33% of the patients in this series had limitation of knee movements. Systemic metastasis is rare in parosteal osteosarcomas. In Okada *et al*. series, none of the patients had metastasis at presentation.[@ref6] Song *et al*. reviewed the records of 22 parosteal osteosarcoma patients and none of them had metastatic disease at presentation.[@ref13] In a series of 63 cases of parosteal osteosarcoma treated between 1978 and 2007, Zaikova *et al*. reported 9 (14.3%) patients developing metastases at a median of 22 months (6-123 months).[@ref14] Five patients developed both locoregional and metastases. Seven patients in this series died from the tumor, while two patients were alive with metastatic disease. Imaging {#sec2-4} ------- The radiological picture of surface osteosarcomas is characteristic. Campanacci *et al*. had described parosteal osteosarcomas as "...lesions projecting from the periosseous tissues with a mushroom-like radiographic appearance".[@ref15] On plain X-rays parosteal osteosarcoma appears as a heavily mineralized mass attached to the cortex with a broad base. In their study Okada *et al*. they found that most tumors (70%) had a cortical attachment of 1 cm or more.[@ref6] The tumor has a tendency to wrap around the involved bone as it grows. Around 80% tumors involved either half or less than half the circumference of bone. The underlying cortex can be normal, thickened, or destroyed. A thin lucent zone between the tumor and the host bone was noted in \>50% cases of parosteal osteosarcoma. However, this lucent zone was more evident on computerized tomography (CT) rather than on a radiograph \[[Figure 2](#F2){ref-type="fig"}\]. Periosteal new bone formation and medullary involvement are extremely rare (\<10%). Lucent areas within the substance of tumor, as noted in plain radiograph and CT scan, could indicate the presence of dedifferentiated areas in parosteal osteosarcoma.[@ref2] Positron emission tomography-CT scans can be a valuable tool in the evaluation of such lesions.[@ref16] They can demonstrate areas of high metabolic activity inside the lesion that can be specifically targeted and biopsied. Treatment {#sec2-5} --------- All surface osteosarcomas need surgical excision regardless of the grade of the lesion. Parosteal osteosarcomas, being low grade lesions, can be treated by upfront wide excision without adjuvant chemotherapy and they require either marginal or wide excision. The technique of hemicortical resection for treating parosteal osteosarcomas was first described by Campanacci *et al*. in 1982 \[[Figure 4](#F4){ref-type="fig"}\].[@ref17] The decision on whether a lesion can be addressed by hemicortical excision should be taken after carefully evaluating the preoperative imaging modalities and histopathological grade. Only those lesions not involving the neuro vascular bundle in which surgical excision would not include the adjacent articular surface and at least one third of the bone\'s circumference would remain after excision should undergo hemicortical resection.[@ref18] The technique involves marking the line of resection around the base of tumor taking surgical margin into account and creating a unicortical window along this line with the help of a saw. The defect can be reconstructed using either bone cement, autograft (e.g. fibular autograft), allograft or pasteurized/autoclaved/irradiated host bone \[Figure [4A](#F4){ref-type="fig"} and [B](#F5){ref-type="fig"}\]. Song *et al*. retrospectively reviewed the results of 22 parosteal osteosarcoma patients treated by hemicortical excision and reconstruction.[@ref13] The 10-year overall survival was 85.7% with an event free survival of 54.5%. Seven of their patients underwent intralesional excision due to mis-diagnosis and all of them developed local recurrence. Two of the 5 patients who underwent marginal excision developed local recurrence of which one lesion was dedifferentiated, whereas the other was histological Grade 2. None of their patients developed local recurrence after wide excision. Zaikova *et al*., in their review of 63 patients, reported a local recurrence rate of 46% following intra-lesional excision as compared to 20% following marginal excision and 0% following wide excision.[@ref14] Wide margin following hemicortical resection was also reported by Liu *et al*.[@ref18] None of their patients developed local recurrence. Thus, we find that en-bloc resection with wide surgical margins is the gold standard, while hemicortical excision has a role in selected cases of parosteal osteosarcoma. ![(a) Clinical photograph of a 20-year-old male patient showing parosteal osteosarcoma of the right proximal tibia (b) Per-operative pictures of the same patient showing hemicortical resection of the anterior tibia (note the K wire holding the patellar tendon) (c) Same patient showing wound closure over a gastrocnemius flap (d and e) At 4 years postsurgery followup showing healed scar and range of motion](IJOrtho-48-255-g005){#F4} ![(a and b) Plain radiographs (anteroposterior and lateral views) of the leg (followup after 3 years) showing good consolidation of the hemicorticotomy (c) MRI (T2 weighted image) of the tibia showing mainly a hyperintense surface mass with minimal involvement of the medullary cavity](IJOrtho-48-255-g006){#F5} Differential diagnoses {#sec2-6} ---------------------- Surface osteosarcomas can mimic benign conditions such as osteochondorma and myositis ossificans. Song *et al*. in their study have reported that five cases of parosteal osteosarcomas that were treated with intralesional therapy mistaking them for benign conditions and all of these presented with local recurrence.[@ref7] Diagnosing these tumors need a high index of suspicion. All clinicoradiologically doubtful lesion needs to be biopsied to confirm the diagnosis. Cartilage cap of parosteal osteosarcoma, if present, lacks the columnar arrangement of cells and shows mild cellular atypia thus differentiating it from osteochondroma. Difficulty in diagnosing these lesions gets compounded when they present at unusual locations. For example, parosteal osteosarcoma arising from the bones of hand need to be differentiated from Nora\'s lesion (Bizarre parosteal osteochondromatous proliferation) and Turret\'s exostosis.[@ref19] P[ERIOSTEAL]{.smallcaps} O[STEOSARCOMA]{.smallcaps} {#sec1-3} =================================================== Periosteal osteosarcoma is an intermediate grade chondroblastic osteosarcoma arising on the surface of the bone.[@ref9] Demographics {#sec2-7} ------------ Most surface osteosarcomas have a slightly higher age of occurrence when compared to conventional osteosarcomas. However, in a study including 40 patients of periosteal osteosarcoma, the mean age of patients was 20 years (range 10-37 years).[@ref20] Thus, amongst these surface lesions, the periosteal subtype tends to occur at a younger age, followed by parosteal and high grade surface osteosarcomas, which are more common during the third decade. Periosteal osteosarcomas are more common in males. Histopathology {#sec2-8} -------------- Unni *et al*. first described periosteal osteosarcoma, as a distinct entity.[@ref21] The lesion is characterized by lobulated islands of malignant cartilage and areas of moderately high-grade spindle cells located peripherally. Trabeculae of mature osteoid are absent and the lesion shows little tendency to invade skeletal muscles. Clinical presentation {#sec2-9} --------------------- Pain and swelling are the usual presenting symptoms. However, periosteal osteosarcoma is considered to be more painful and runs a rapid course when compared to parosteal osteosarcoma. This subtype of surface osteosarcoma affects tibia more commonly than femur and the location is typically metadiaphyseal.[@ref21] The tibial lesions are more common in the proximal third, whereas the femoral lesions are more common in the middle and distal third. Periosteal osteosarcomas resemble parosteal variety in having lower incidence of systemic metastasis. In a series of 119 patients of perisoteal osteosarcoma, Grimer *et al*. noted metastasis in 17 patients (14%), a previous local recurrence (*n* = 4), lung metastases (*n* = 16) and bone metastasis in the opposite leg (*n* = 1). Two patients had both lung and bone recurrences in this study.[@ref5] Imaging {#sec2-10} ------- Periosteal osteosarcomas are surface lesions with nonhomogenous calcified spiculations perpendicular to the cortex giving a "sunburst appearance".[@ref9] The lesion decreases in density from the cortical base to the surface. A radiological review of 40 cases of periosteal osteosarcoma found that the lesion usually appears as a broad based soft tissue mass causing extrinsic erosion of thickened underlying diaphyseal cortex and perpendicular periosteal reaction extending into the soft tissue component \[[Figure 5](#F6){ref-type="fig"}\].[@ref20] According to Murphey *et al*., reactive marrow changes are common but true marrow invasion is rare.[@ref20] However, certain other authors report high (20-70%) incidence of medullary invasion.[@ref22][@ref23] ![(a) Plain radiograph anteroposterior view of the upper right femur with hip point in a 14-year old boy showing a destructive expansile lesion arising from the medial cortex of a upper femur. Histologically it was a periosteal osteosarcoma (b) MRI of the same patient showing a huge soft tissue component of the surface lesion. Typical of a periosteal osteosarcoma](IJOrtho-48-255-g007){#F6} Treatment {#sec2-11} --------- Periosteal osteosarcomas should be treated with en-bloc resection with wide margins based on established oncological principles as with conventional osteosarcomas. Controversy prevails over the need for neo-adjuvant chemotherapy in periosteal osteosarcomas, which are intermediate grade lesions. Revell *et al*. retrospectively reviewed 17 cases of periosteal osteosarcoma at a mean followup of 52 months.[@ref23] Patients in their study were given chemotherapy if tumor showed high grade histological features or if medullary involvement was present in magnetic resonance imaging (MRI). Ten of their patients received neo-adjuvant chemotherapy, 4 received adjuvant chemotherapy while 3 patients did not receive any adjuvant therapy. One patient with positive surgical margin developed local recurrence while the survival rate at 52 months was 100%. They advocated neo-adjuvant chemotherapy for all periosteal osteosarcoma patients with high areas or medullary involvement. Cesari *et al*. reported their experience of treating 33 periosteal osteosarcoma patients.[@ref22] Nineteen patients did not receive any adjuvant treatment, 14 received adjuvant chemotherapy and 4 received neo-adjuvant chemotherapy. They did not report any criteria used to decide on whether to administer chemotherapy or not and they did not follow fixed chemotherapy protocol in within any group. All 14 patients subjected to chemotherapy had Grade 3 tumors. The 10 year overall survival rate was 86% in the chemotherapy group and 83% in the only local therapy group. They concluded that adjuvant chemotherapy did not improve survival. Grimer *et al*. reviewed the effect of chemotherapy on the outcome of periosteal osteosarcoma patients. This was a multicenter review from the European Musculo Skeletal Oncology collaboration.[@ref5] No criteria were followed, while deciding whether or not to administer chemotherapy. The protocol also differed among different centers. They could not demonstrate the use of chemotherapy as a prognostic factor for periosteal osteosarcomas. However, survival was related to appearance of local recurrence (*P* \< 0.0001) and none of patients with \>90% necrosis following neo-adjuvant chemotherapy developed local recurrence. Given the uncertainty regarding the benefit of chemotherapy and the lack of universally accepted chemotherapy protocols, only a randomized controlled trial (RCT) can provide an answer. However, periosteal osteosarcoma, being a rare disease, is not an ideal candidate for a RCT.[@ref23] The authors opine that the decision on whether to administer chemotherapy or not has to be taken at the individual tumor board taking into consideration the local factors affecting such decision. In our institute, we prefer neo-adjuvant chemotherapy in most periosteal osteosarcoma patients. The rationale is that we work in a resource constrained environment where a delay in surgery is expected due to long waiting list and the patient receives neo-adjuvant chemotherapy, while awaiting his/her surgical slot. Differential diagnosis {#sec2-12} ---------------------- Periosteal osteosarcomas need differentiation from conventional osteosarcomas, which are high grade tumors and periosteal chondroma, a benign cartilaginous tumor. Confusion prevails over the term "juxtacortical chondrosarcoma", supposedly the malignant counterpart of periosteal chondroma. Some authors classify juxtacortical chondrosarcoma and periosteal osteosarcoma as different entities, while others use juxtacortical chondrosarcoma as a synonym for periosteal osteosarcoma, thus confirming that both the lesions are one and the same.[@ref9][@ref24] H[IGH]{.smallcaps} G[RADE]{.smallcaps} S[URFACE]{.smallcaps} O[STEOSARCOMA]{.smallcaps} {#sec1-4} ======================================================================================= According to Staals *et al*., the first description of high grade surface osteosarcoma was by Francis in 1964.[@ref25] As the name suggests, high grade surface osteosarcomas are highly malignant lesions that has the ability to metastasize and cause death similar to conventional osteosarcoma. Demographics {#sec2-13} ------------ Majority of the studies on surface oseosarcomas focus only on low grade parosteal variety, thus limiting our understanding on the other surface osteosarcomas. In a study on 46 patients of high grade surface osteosarcoma, the mean age was found to be 25 years (range 8-70 years).[@ref26] In another study from Rizzoli Institute, there were 19 males and 6 females with a mean age of 21 years.[@ref25] High grade surface osteosarcomas, like periosteal osteosarcomas, are commoner in males.[@ref27] Histopathology {#sec2-14} -------------- The histology of high grade surface osteosarcomas demonstrates areas of spindle cells with cellular atypia (Broder\'s Grade 3 or 4) and varied amounts of osteoid formation.[@ref8] Grade 3 tumors lack cellular pleomorphism (marked variation in size and shape of nuclei) as opposed to Grade 4 tumors that show marked pleomorphism. The most common histologic subtype was osteoblastic followed by chondroblastic subtype.[@ref25] Clinical presentation {#sec2-15} --------------------- High grade surface osteosarcomas follow an aggressive clinical course. They most frequently involved the midfemur followed by distal femur and midtibia.[@ref26] Pain and swelling are the usual presenting symptoms. Imaging {#sec2-16} ------- High grade surface osteosarcomas present a similar radiological picture as other surface osteosarcomas \[[Figure 3](#F3){ref-type="fig"}\]. Okada *et al*. have reported several radiological features that might aid identification of these lesions.[@ref26] Most high grade surface osteosarcomas presented dense to moderate mineralization with a fluffy, immature appearance which was more prominent at the base of the lesion. The lesions were attached to the host bone with a broad base and a lucent zone between the lesion and host bone was rare as was circumferential bony involvement. In contrast to periosteal osteosarcomas, spiculated periosteal reaction perpendicular to host bone was rarely encountered in high grade surface osteosarcomas. Treatment {#sec2-17} --------- Neo-adjuvant chemotherapy is the standard of care for high grade surface osteosarcomas. The chemotherapy protocol is similar to conventional osteosarcoma and all lesions should undergo excision with wide oncological margins. Metastatic lesions need to be treated in a similar way as conventional osteosarcoma. In the Rizzoli Institute study, the 5-year overall survival was 82% and disease free survival was 70%.[@ref25] Differential diagnosis {#sec2-18} ---------------------- High grade surface osteosarcomas need to be differentiated from the parosteal and periosteal subtypes as the treatment principles differ. The other differentials include extra skeletal osteosarcoma and periosteal Ewing\'s sarcoma without medullary involvement. C[ONCLUSION]{.smallcaps} {#sec1-5} ======================== Surface osteosarcomas are distinct clinicopathological entities. Their recognition is important as the prognosis and treatment protocols differ significantly from conventional osteosarcoma. Radiological tools such as CT scan and MRI are vital to the diagnosis and surgical planning of these lesions. Although all of them are neoplastic lesions, the malignant potential varies significantly with parosteal osteosarcoma being the least malignant followed by periosteal and high grade surface subtypes in that order. Dedifferentiated parosteal osteosarcoma is a high grade lesion and its management is similar to high grade surface osteosarcoma. Parosteal osteosarcoma can be treated by upfront surgery without neo-adjuvant chemotherapy, while high grade lesions should be subjected to neo-adjuvant protocol similar to conventional osteosarcoma. The role of neo-adjuvant chemotherapy in periosteal osteosarcoma is controversial. Overall, surface osteosarcomas carry either similar or better prognosis when compared to conventional osteosarcomas depending upon the subtype and hence, the need to identify the different subtypes cannot be over emphasized. **Source of Support:** Nil. **Conflict of Interest:** None.
{ "pile_set_name": "PubMed Central" }
from typing import Any, Optional from boto.compat import StandardError class BotoClientError(StandardError): reason: Any def __init__(self, reason, *args) -> None: ... class SDBPersistenceError(StandardError): ... class StoragePermissionsError(BotoClientError): ... class S3PermissionsError(StoragePermissionsError): ... class GSPermissionsError(StoragePermissionsError): ... class BotoServerError(StandardError): status: Any reason: Any body: Any request_id: Any error_code: Any message: str box_usage: Any def __init__(self, status, reason, body: Optional[Any] = ..., *args) -> None: ... def __getattr__(self, name): ... def __setattr__(self, name, value): ... def startElement(self, name, attrs, connection): ... def endElement(self, name, value, connection): ... class ConsoleOutput: parent: Any instance_id: Any timestamp: Any comment: Any output: Any def __init__(self, parent: Optional[Any] = ...) -> None: ... def startElement(self, name, attrs, connection): ... def endElement(self, name, value, connection): ... class StorageCreateError(BotoServerError): bucket: Any def __init__(self, status, reason, body: Optional[Any] = ...) -> None: ... def endElement(self, name, value, connection): ... class S3CreateError(StorageCreateError): ... class GSCreateError(StorageCreateError): ... class StorageCopyError(BotoServerError): ... class S3CopyError(StorageCopyError): ... class GSCopyError(StorageCopyError): ... class SQSError(BotoServerError): detail: Any type: Any def __init__(self, status, reason, body: Optional[Any] = ...) -> None: ... def startElement(self, name, attrs, connection): ... def endElement(self, name, value, connection): ... class SQSDecodeError(BotoClientError): message: Any def __init__(self, reason, message) -> None: ... class StorageResponseError(BotoServerError): resource: Any def __init__(self, status, reason, body: Optional[Any] = ...) -> None: ... def startElement(self, name, attrs, connection): ... def endElement(self, name, value, connection): ... class S3ResponseError(StorageResponseError): ... class GSResponseError(StorageResponseError): ... class EC2ResponseError(BotoServerError): errors: Any def __init__(self, status, reason, body: Optional[Any] = ...) -> None: ... def startElement(self, name, attrs, connection): ... request_id: Any def endElement(self, name, value, connection): ... class JSONResponseError(BotoServerError): status: Any reason: Any body: Any error_message: Any error_code: Any def __init__(self, status, reason, body: Optional[Any] = ..., *args) -> None: ... class DynamoDBResponseError(JSONResponseError): ... class SWFResponseError(JSONResponseError): ... class EmrResponseError(BotoServerError): ... class _EC2Error: connection: Any error_code: Any error_message: Any def __init__(self, connection: Optional[Any] = ...) -> None: ... def startElement(self, name, attrs, connection): ... def endElement(self, name, value, connection): ... class SDBResponseError(BotoServerError): ... class AWSConnectionError(BotoClientError): ... class StorageDataError(BotoClientError): ... class S3DataError(StorageDataError): ... class GSDataError(StorageDataError): ... class InvalidUriError(Exception): message: Any def __init__(self, message) -> None: ... class InvalidAclError(Exception): message: Any def __init__(self, message) -> None: ... class InvalidCorsError(Exception): message: Any def __init__(self, message) -> None: ... class NoAuthHandlerFound(Exception): ... class InvalidLifecycleConfigError(Exception): message: Any def __init__(self, message) -> None: ... class ResumableTransferDisposition: START_OVER: str WAIT_BEFORE_RETRY: str ABORT_CUR_PROCESS: str ABORT: str class ResumableUploadException(Exception): message: Any disposition: Any def __init__(self, message, disposition) -> None: ... class ResumableDownloadException(Exception): message: Any disposition: Any def __init__(self, message, disposition) -> None: ... class TooManyRecordsException(Exception): message: Any def __init__(self, message) -> None: ... class PleaseRetryException(Exception): message: Any response: Any def __init__(self, message, response: Optional[Any] = ...) -> None: ... class InvalidInstanceMetadataError(Exception): MSG: str def __init__(self, msg) -> None: ...
{ "pile_set_name": "Github" }
My daughter (who’s 7) has an iPad mainly because they have to use them at school, an iPod that she sometimes listens to on the bus (with volume limited headphones :wink:) and she has a cheap phone that she keeps in her school bag in case she misses the bus, school would ring us anyway but it makes her feel better. I guess compared to when I was her age she has lots of other things that I didn’t, TV in her room, loads of toys, a fairly expensive bike etc. But all that being said I don’t think she is particularly spoilt, she knows that no means no and it is very rare that she gets a treat without earning it through chores or as a reward. When we go on holiday or out on a trip she has a certain amount of pocket money and she can use that to buy whatever she wants, once it’s gone it’s gone. She would barge her way to the front for a balloon at parties though, she learned pretty quickly that Dutch kids don't queue! don't get me started on children with telly's in their bedroom, in all of our family and all close friends bar one, it is a no no. the one with the telly is a lazy, spoiled, pushy type with no manners. a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. edit ; a bedroom is for sleeping and getting rest to set you up for the day a head. imo, they should be gadget free, even for adults. don't get me started on children with telly's in their bedroom, in all of our family and all close friends bar one, it is a no no. the one with the telly is a lazy, spoiled, pushy type with no manners. a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. I had a TV in my (shared with my brother) bedroom when I was a kid. Can't remember when I got it, but certainly had it right through secondary. a bedroom is for sleeping and getting rest to set you up for the day a head. imo, they should be gadget free, even for adults. the one with the telly is a lazy, spoiled, pushy type with no manners. You know about correlation and causation? You don't think that might be down to the parents rather than the fact that they have a TV in their room? I had a TV in my room when I was a kid, and was never any of those things. I suspect there are quite a few kids with no TV in their bedrooms who are lazy and spoiled too. don't get me started on children with telly's in their bedroom, in all of our family and all close friends bar one, it is a no no. the one with the telly is a lazy, spoiled, pushy type with no manners. a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. The telly in her room is in a seperate play area with a couch (it was 2 rooms knocked into one) so she can't watch it in bed. She gets up fine every morning. She concentrates very well because she has a teacher who engages with her and a small class size. I doubt she'll be walking any time soon, school is 30 miles away. Wtf?! I know, teaching kids how to use everday technology whatever next? They don't even use chalk boards or ink pens anymore. All their homework is app based, all of their books are available electronically, artwork they do is scanned and pictures taken during lessons are uploaded so we can see it, their diary is automatically updated and all of that fits onto something the size of a notepad, amazing isn't it. You're not still chopping trees down are you? Of course, but do they force you to buy an iPad? I'm not entirely comfortable with that, despite being very much into technolgy myself. If they are going to do everything electronically they should provide the means. Bunnyhop - Member don't get me started on children with telly's in their bedroom, in all of our family and all close friends bar one, it is a no no. the one with the telly is a lazy, spoiled, pushy type with no manners. a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. Walk to school? WTF? This is a mountain bike forum. I don't want to chat to any parent whose child walks instead of riding a bike. What the hell sort of children are being raised around here?! most teachers and child psychologists (sp ?) would say the same and i've given reasons above. as a walk leader one of my jobs was to encourage children to walk to school to help counteract obesity and discourage short journeys by car, which is causing many children to have asthma. research showed that almost all children that had a telly in their room were unlikely to walk to school and were tired the next day. Go back 100 years and they were saying the same thing about shoeschimney sweeps Our children will grow up in a world far more connected via devices and technology than we can currently imagine. So perhaps they should learn how to use these devices at an early age? In the 50's Elvis was corrupting the minds of teenagers, most of who turned into our parents. Charlie and Chocolate Factory 1964 features a number of different children with repellant behavoir, no TV's in bedrooms or tablets back then... a child with its own telly is less lightly to get up early for school, will have less concentration at school and is less likely to walk to school. I'm not sure what, if anything you are, or are hoping to, infer from this. Most normal children dislike getting up early every day, especially for school. Why would there be a correlation between TVs in the bedroom and walking to school? But it doesn't demonstrate causality. Fwiw, our two kids, almost every night without fail, will try and read in bed after lights out, and will often fall asleep with lights or torches on. The eldest gets driven to school. Our children will grow up in a world far more connected via devices and technology than we can currently imagine. So perhaps they should learn how to use these devices at an early age? Nah, not really imo. 'Using the devices' isn't complicated, any fool can do it, at any age. Doing something useful with it, that requires education independent of the device. So the current students we have were all born in the age of the internet. Never known anything else - yet are often pretty hopeless at actually finding the information they need off it. My extensive research has shown that if given Cocoa Pops for breakfast, then daughter number one will then favour Candy Crush over Angry Birds. Daughter number two doesn't really like cereal, preferring toast, and doesn't have a television in her room, but does have a Wii, and as a direct result of this prefers playing Cut the Rope * I had a TV in my room and walked to school. I have asthma. * My kids don't have TVs in their room and generally walk, but are sometimes driven. They don't have asthma. I suspect that many of the negative influences of TV on kids that we all know for a fact happen are actually a combination of rose-tinted spectacles and the shockingly bad reporting of academic studies* that we're inflicted with in this country. * assuming they were academic studies and not just a phone poll carried out on behalf of a travel agent, insurance company or TV channel, which then gets reported as something more, before being picked up on by the education secretary as the basis for his reforms.
{ "pile_set_name": "Pile-CC" }
Can Dogs Get Colds? by Sam Salvati - 8/22/19 No one enjoys the pesky and fast-spreading common cold, and we all have been subjected to its symptoms. Brought on by a viral infection in our airways, a cold can linger for days, making us cough, sneeze, and feel fatigued. But do dogs get colds? And if so, how do the symptoms manifest in our furry friends? Respiratory Infections in Dogs Dogs can catch respiratory infections just like humans. Despite our vaccines for many common viral infections in dogs, some unvaccinated canines are at risk of contracting viral respiratory infections, such as kennel cough, which is an upper respiratory infection in dogs. If you notice an unusually high breathing rate in your pup while it's resting, you should seek veterinary aid. Cold Treatment for Dogs In the case where your dog is showing any of the symptoms listed above, you should visit a veterinarian immediately to get your dog assessed and treated. Although no medical assistance is typically required for dog colds, occasionally, medical treatment is absolutely necessary in order to save your pooch's life. Under no circumstances should you give your dog over-the-counter cold medication as most types can be harmful to animals. Your vet will provide you with any necessary, safe medication. Pasadena native Sam Salvati is the adoring dog dad to Pablo, Ester and Farris. He enjoys keeping abreast of and writing about the latest developments in pet care.
{ "pile_set_name": "Pile-CC" }
<Blog & NewsArthur Holm’s Dynamic3Share is in the landmark EC3 building in Dubai! Blog > Arthur Holm’s Dynamic3Share is in the landmark EC3 building in Dubai! This magnificent building was constructed by Dubai’s Roads & Transport Authority(RTA) to house the Enterprise Command & Control Centre (EC3) offices. Its futuristic and distinctive design has already made it a landmark building, within a city of landmark buildings. The superstructure, which is also known by its shorter name the EC3, consists of a ground floor and five storeys with a total floor area of 10,900 sq m. Inside this gigantic nerve-centre is the biggest and most sophisticated control central of its kind worldwide, in terms of utilising smart technologies with the ability to control & integrate various RTA transit modes. Five subsidiary control rooms for managing transport & road network in Dubai Indeed, this state-of-the-art command centre will be crucial to the RTA to enable the control of all mass transit systems (such as the Dubai Metro, Dubai Tram, public buses, taxis and marine transit modes), and to meet the requirements of the everyday traffic control systems, which will be vital for upcoming mega-events like Expo 2020. The smart building design meets international green building specifications, and will qualify for an Environment Friendly green building award (Gold Class of LEED Classification). The impressive screens show simultaneous images The centre is the first of its kind in the Middle East and will increase the RTA’s efforts into transforming Dubai into the smartest city worldwide in terms of transport. So, it’s with great pride that Arthur Holm announces that the Dynamic3Share monitor solution has been chosen to be installed inside the core of the beating heart of the EC3 conference rooms. The product is unique and as such, offers the best options in monitor functionality (the screen rises, leans, rotates 180° and retracts neatly into the work surface, facing up or down). In keeping with the office’s colour themes, some of the monitors have been customised with a White Satin finish, and the rest are in classic Silver aluminium. The Dynamic3 has been integrated with the innovative DynamicShare system, giving a smart HDMI signal selection and distribution option. Sheikh Mohammed bin Rashid, Vice President & Ruler of Dubai, Sheikh Hamdan bin Mohammed, Crown Prince of Dubai, are given a presentation seated in front of the Dynamic3Share The entire centre has been equipped with the latest smart technologies, and most importantly ensuring the system is flexible to accommodate and catch up with the rapid technological advancements. This really is a centre of the future!
{ "pile_set_name": "Pile-CC" }
This is a small brown basilisk (Basiliscus vittatus). Here in Belize they are also known as “Jesus Christ lizards,” because of their ability to run across the surface of water for short distances. Photographed on April 10, 2009. The weather in Placenia has been somewhat windy and overcast for the last day or two, which is apparently unheard of for this time of year. This morning there was a hint of sunrise, but the wind was still blowing. I used a slow shutter speed to show the movement of the palm leaves. Photographed on April 9, 2009. This isn’t directly photography-related, but I’ve recently been taking the Kindle e-book reader with me when I travel. It’s a good alternative to bringing the half dozen books I might otherwise carry. Those weight savings are especially nice when I’m already loaded down with photo gear. Anyways, this was just a fun shot I setup while reading by the pool…feels very 2009 to me. When I noticed this detail on the orchid in our kitchen, I felt that focusing in on it would make for an interesting image. It’s difficult to make novel images of flowers, because they are such popular subjects. Hopefully this one feels at least a little unique. Photographed on February 10, 2009.
{ "pile_set_name": "Pile-CC" }
Evaluation of metal mobility from copper mine tailings in northern Chile. This work shows the results obtained on a copper mine tailing in the Antofagasta Region, Chile. The tailing was classified as saline-sodic with high concentrations of metals, especially Cu and Fe, with pH 8.4. Our objectives were to (1) compare the physicochemical properties of the tailing with surrounding soils of the mine under study, and (2) evaluate the effect of two amendments (CaCO3 and compost) and their mixtures on Cu(2+), Mn, Fe, Zn, Mg(2+), and K(+) and Ca(2+), SO4 (2-), NO3 (-), and PO4 (3-) leaching. The data obtained were submitted to variance and covariance analysis. The results from the comparison between both substrates showed that in general, the tailing presented greater content of metals. Regarding tailing leaching, pH, electrical conductivity (EC), and concentration of the elements of interest were measured. The statistical analysis showed that Cu(2+) leaching and immobilization of Fe occurred to the greatest extent with compost. The EC decreased throughout the experiment with irrigation and increased upon treatment with compost. The major interactions found among the chemical parameters were (1) tailings without treatment, Cu(2+)/Fe and NO3 (-)/SO4 (2-); (2) tailings treated with CaCO3, Cu(2+)/K(+); (3) tailings treated with compost, NO3 (-)/SO4 (-2) and EC/Cu(2+); and (4) tailings treated with both amendments, EC/Fe and Cu(2+)/Fe. The ANOVA showed that the number of irrigations and the amendments statistically significantly affected the copper mobility and the organic amendment significantly influenced the iron mobility.
{ "pile_set_name": "PubMed Abstracts" }
Auchterlonie Auchterlonie or Ouchterlony, Scottish surname from Forfar in the county of Angus, may refer to: Dorothy Auchterlonie (1915–1991), academic Laurie Auchterlonie (1868–1948), golfer William Auchterlonie (1872–1963), golfer James Auchterlony, a soldier in Regiment of Jacob Shaw, in Russian service from 1610th. In 1672 James Auchterlony served as a witness to the will of Alexander 11th Lord Forbes in Stockholm. Örjan Ouchterlony (1914–2004) was a Swedish bacteriologist and immunologist who is credited with the creation of the Ouchterlony double immuno diffusion test in the 1940s. Ouchterlony, Swedish noble family of Scottish origin. Descents of John Ouchterlony († 1778), from Dundee in Scotland. Notes References Category:Surnames of Scottish origin
{ "pile_set_name": "Wikipedia (en)" }
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. The subproject and investigator (PI) may have received primary funding from another NIH source, and thus could be represented in other CRISP entries. The institution listed is for the Center, which is not necessarily the institution for the investigator. We are developing a hydrogelation strategy, based on the triggered self-assembly of peptides, to aid in liver regeneration after cancer resection surgery. We will design hydrogels that can encapsulate cells in vitro that can be subsequently injected in vivo. We have designed peptides that, when dissolved in aqueous solutions, form an ensemble of random coil conformations rendering them fully soluble. However, when we add an exogenous stimulus, such as cell culture media, the peptides fold into a [unreadable]-hairpin conformation. These folded peptides undergo rapid self-assembly forming a highly crosslinked hydrogel. When the selfassembly mechanism triggers hydrogelation in the presence of hepatocytes, gels become impregnated with cells. A unique characteristic of these gels is that when an appropriate shear stress is applied, the gel will shear-thin, becoming a viscous gel. However, after the application of shear has stopped, the viscous gel quickly self-heals producing a gel with mechanical rigidity nearly identical to the original hydrogel before shear-thinning. The gels'material properties, such as the gelation kinetics, mechanical rigidity and recovery kinetics after shear-thinning, will be tuned via peptide design to enable them to be delivered via syringe. With syringe delivery, the resulting gel/cell constructs can be shear-thin-delivered to targeted tissue where they quickly recover, adopting a shape that compliments the wound site. After delivery, the gels remain localized at the point of application (e.g. they do not run). We will investigate the cytocompatibility and biocompatibility of the gels, as well as the ability of the gel/cell constructs to be delivered in a spatially localized manner to rat liver tissue. We will test their ability to aid in the regeneration of resected rat liver. We have assembled the following team to address the aims of this proposal: Cindy Farach-Carson, a cell and molecular biologist, Dr. Joe Bennett M.D., a liver cancer surgeon, Darrin Pochan, an expert in hydrogel materials, and Joel Schneider, an expert in peptide design, synthesis and materials. Collectively, the expertise of the team spans material design, characterization, in vitro cell compatibility, and in vivo biocompatibility.
{ "pile_set_name": "NIH ExPorter" }
local b = import 'b.jsonnet'; local a(x) = import 'a.jsonnet'; // Not a proper import! true
{ "pile_set_name": "Github" }
Q: Higher Order Derivatives problem involving the position of a particle Given the position of a particle is $$s(t)=t^3-12t^2+36t-20$$ a. Find the velocity and acceleration functions b. When is the particle moving to the right? c. When is the particle speeding up? Here is my work. I am particularly concerned with parts b and c of this question. Have I solved this correctly? Note that my answer for part c. should read 'when $t>4$' A: Part $a$ looks good! For part $b$ you must get two intervals. See if you can use below hint $$ab \gt 0 \implies (a\gt 0 \text{ and } b\gt 0) \text{ or } (\color{blue}{a\lt 0 \text{ and } b\lt 0})$$
{ "pile_set_name": "StackExchange" }
Q: How to introduce to your new teacher when you have a middle name or more than one different name My teachers and my friends call me Kitty in school, while my colleagues and my boss call me Kay in the office. My friends and my colleagues have called me different names, but I have never told them which I preferred. Now I am going to learn how to swim, which means I will meet some new people in the swimming lessons. I wonder how to introduce myself to the new teacher because I have two different names. Should I say this? You can call me Kitty or Kay And then in the full name row of the registration form, should I write "Kitty Kay myFamilyName" or just "Kitty myFamilyName"? A: Basically, you can have people call you whatever name you want. If you introduce yourself, you can either state your legal name, followed by how you want to be called (appropriate for semi-formal settings, like starting a new job) "My name is FirstName LastName, but you can call me NickName." in informal settings, just give your nickname: "Hi, I'm NickName!" On any formal documentation you should use your legal name and omit the nickname. You can always ask the instructor to call you NickName. If you have a middle name, it's up to you if you want to use it (or, in the US, use the initial). Some people will find think weird to be given a looong list of names for a plain introduction - remember that some people have many first names... Once you have reached a certain age, you might even want to introduce yourself by your last name only, depending a bit on the culture you live in: "Hi, I'm Ms (or Mrs.) LastName!".
{ "pile_set_name": "StackExchange" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec001} ============ One of the central obstacles in controlling many pathogen-borne diseases is their exceptional ability to adapt through evolutionary changes \[[@pgen.1005404.ref001]\]. Large population sizes and high mutation rates in many pathogens make them extremely effective at evolving to evade the immune system or resist drug treatments \[[@pgen.1005404.ref002]--[@pgen.1005404.ref006]\]. Our ability to prevent or even predict such escape mutations is hampered by limited knowledge of the effects of new mutations on pathogen fitness. This problem is made especially difficult because the effect of any particular mutation is often dependent on the genetic background in which it occurs, a phenomenon called epistasis \[[@pgen.1005404.ref007]--[@pgen.1005404.ref016]\]. Epistasis is particularly common among mutations that arise in response to strong selection pressures. For example, resistance mutations that arise under drug treatments often carry substantial fitness costs which are alleviated by secondary, compensatory, mutations \[[@pgen.1005404.ref007],[@pgen.1005404.ref010],[@pgen.1005404.ref014]--[@pgen.1005404.ref016]\]. Likewise, mutations that facilitate immune escape are in several cases known to be epistatic with other, compensatory or permissive, mutations \[[@pgen.1005404.ref017],[@pgen.1005404.ref018]\]. The surface proteins hemagglutinin (HA) and neuraminidase (NA) of the human influenza A virus evolve under strong selection pressures imposed by the human immune system and, possibly, antiviral drugs \[[@pgen.1005404.ref004],[@pgen.1005404.ref019]\]. It is therefore expected that epistasis may play an important role in the evolution of these proteins. Several previous studies have found that epistasis within each of these proteins is widespread, so that mutations in a given protein are often beneficial only in the presence of mutations at other sites in the same protein \[[@pgen.1005404.ref019]--[@pgen.1005404.ref021]\]. Aside from intra-gene epistasis, we also might expect inter-gene epistasis, especially in the case of the HA and NA proteins of influenza viruses, which serve complementary physiological functions. HA facilitates the attachment of the virus to the cell surface, whereas NA catalyzes the separation of the ready-made virus particles from the cell. Thus, mutations that increase receptor-binding avidity of HA should promote mutations in NA that increase its cleavage activity \[[@pgen.1005404.ref022],[@pgen.1005404.ref023]\] and vice versa \[[@pgen.1005404.ref024],[@pgen.1005404.ref025]\]. HA and NA jointly determine sensitivity to neuraminidase inhibitors, with mutations in HA compensating for the reduction in binding affinity of NA caused by the inhibitors \[[@pgen.1005404.ref026],[@pgen.1005404.ref027]\]. Other, as yet unknown, molecular interaction mechanisms may also lead to inter-gene epistasis. Indirect evidence also suggests that interactions between HA and NA may be strong; for example, reassortments giving rise to new combinations of HA and NA lead to a temporary increase in the rate of accumulation of mutations in these genes, likely due to changes adjusting the genes to each other \[[@pgen.1005404.ref028],[@pgen.1005404.ref029]\]. Here we present a method toWe set out to detect signatures of inter-gene epistasis, and apply it to understand the evolutionary history of influenza surface proteins. The method we develop is an extension of techniques previously developed for detecting intra-gene epistasis \[[@pgen.1005404.ref021],[@pgen.1005404.ref030]\]. The idea behind it is simple: epistasis will tend to induce temporal clustering of mutations along the phylogeny of an adapting protein, with mutations at one site followed rapidly by mutations at another, interacting site. In the case of mutations within a single protein it is straightforward to develop this idea into a rigorous statistical test, by quantifying the time that separates subsequent mutations along the protein's phylogeny. All the sites within a single influenza protein share a common phylogenetic history: recombination events within an influenza virus RNA segment are exceedingly rare \[[@pgen.1005404.ref031]\], and so sites that reside on the same segment of the viral genome are completely linked. However, influenza viruses undergo frequent reassortment events, so that sites residing on different segments typically have different genealogies---a complication that obscures the temporal order of mutations occurring on different RNA segments. To resolve this complication, here we develop a method for inferring the relative temporal order of mutations at sites that have different evolutionary histories, and then use this information to detect temporal clustering of such mutations in influenza viruses. We find that origination of mutant alleles at many sites in NA facilitated the spread of subsequent mutations in HA and vice versa, implying that inter-gene epistasis has shaped the molecular evolution of influenza viruses. Results {#sec002} ======= Inferring reassortment events between HA and NA genes {#sec003} ----------------------------------------------------- We reconstructed individual phylogenetic trees for each of the two surface proteins HA and NA for the two major influenza subtypes circulating in humans, H3N2 and H1N1. As expected, HA and NA phylogenies of the same subtype were incongruent. Using software GIRAF \[[@pgen.1005404.ref032]\], we identified taxa that descended from within-subtype reassortant ancestors and thus inferred the positions of reassortment events on the phylogenies of an individual segment (see [Materials and Methods](#sec015){ref-type="sec"} for details). We inferred a total of 15 reassortment events between these two segments in subtype H3N2, and 5 events in subtype H1N1. We found that 847 out of 1,376 H3N2 isolates and 201 out of 745 H1N1 isolates are descendants of at least one reassortment event, which is consistent with previous findings \[[@pgen.1005404.ref029],[@pgen.1005404.ref033],[@pgen.1005404.ref034]\]. To completely resolve incongruences between individual segment phylogenies, we assumed that reassortments are the only source of true differences between the phylogenies of individual segments. This assumption imposes a constraint that phylogenies of different segments may differ by at most as many rooted subtree prune-regraft (rSPR) operations as there are reassortment events, and otherwise be identical. We reconstructed such "constrained" phylogenies of individual segments using previously inferred "unconstrained" individual segment phylogenies as templates (see [Materials and Methods](#sec015){ref-type="sec"} for details). Identifying pairs of sites involved in positive inter-gene epistasis {#sec004} -------------------------------------------------------------------- Accelerated origination of mutations at one site (referred to as "trailing" site) following a genetic change at another site (referred to as "leading" site) indicates that mutations at the trailing site are more beneficial after a mutation occurs at the leading site, and thus indicate positive epistasis \[[@pgen.1005404.ref021],[@pgen.1005404.ref030]\]. Here we are specifically interested in situations when leading and trailing sites are located in different genes and therefore have potentially different evolutionary histories. This fact complicates the inference of the temporal order of mutations. Consider mutations *i* and *ii* in the toy example presented in [Fig 1A](#pgen.1005404.g001){ref-type="fig"}. While both of them obviously occurred on the line of descent of isolate *b*, it is not immediately clear whether mutation *i* in segment 1 occurred before or after mutation *ii* in segment 2. We therefore cannot say a priori whether mutation *ii* facilitated mutation *i*, or mutation *i* facilitated mutation *ii*, or there was no interaction between them at all. ![Mapping mutations between segments in the presence of reassortments.\ **(A)** Individual toy phylogenies for segments 1 (left) and 2 (right) with respective mutations. **(B)** Segment 1 phylogeny with segment 2 "background" mutations mapped onto it (left) and segment 2 phylogeny with segment 1 "background" mutations mapped onto it (right). *a--d*, leaf nodes; *e--g*, internal nodes; *h*, virtual node arising due to the reassortment event; *r*, root node; nodes corresponding to the two segments of the same isolate are denoted with the same letter. Each mutation is identified by a roman numeral and a unique symbol colored according to the segment in which it occurred. Mutation *ii* in segment 2 maps onto two branches of the segment 1 phylogeny, once as a regular mutation onto branch *ra* and once as a virtual mutation (denoted by parentheses) onto branch *fh*.](pgen.1005404.g001){#pgen.1005404.g001} To resolve such ambiguities, we estimate the temporal order of mutations in different genes using the constrained phylogenies constructed above. Specifically, in order to study accelerated origination of mutations in one gene (referred to as the "foreground" gene) that follow mutations in the other gene (referred to as the "background" gene), we map all mutations in the background gene onto the phylogeny of the foreground gene. Since the constrained phylogenies are topologically identical with the exception of a relatively small number of reassortment events, most branches of the background tree correspond to unique branches of the foreground tree. Most mutations in the background gene are therefore unambiguously mapped onto branches of the foreground-gene phylogeny. In the toy example shown in [Fig 1](#pgen.1005404.g001){ref-type="fig"} branches *gb*, *ec*, and *ed* in the segment 2 phylogeny correspond to branches *fb*, *ec*, *ed* of the segment 1 phylogeny, respectively. Therefore, when considering segment 2 as the background gene, mutation *iv* unambiguously occurs on branch *fb* of the segment 1 phylogeny ([Fig 1B](#pgen.1005404.g001){ref-type="fig"}). Ambiguities in mapping background-gene mutations onto the foreground-gene phylogeny arise at branches that precede and follow reassortment events, such as branches *rg*, *ga*, and *re* in the segment 2 phylogeny in [Fig 1A](#pgen.1005404.g001){ref-type="fig"}. For instance, mutation *iii* in segment 2 could occur either on branch *rf* or on branch *fe* of the segment 1 phylogeny. We resolve such ambiguities by placing background mutations onto the distal branch of the foreground phylogeny (e.g., in [Fig 1](#pgen.1005404.g001){ref-type="fig"}, mutation *iii* is placed on branch *fe*). This choice minimizes the potential number of mutation pairs that contribute to our epistasis statistic (see below and [Materials and Methods](#sec015){ref-type="sec"}). Finally, reassortment events themselves represent genetic changes in the background gene which may potentially elicit epistatic responses in the foreground gene. Indeed, when viewed as an event on the line of descent of a foreground-gene isolate, each reassortment event is a replacement of the genetic background gene, equivalent to gain of multiple simultaneous mutations which we call "virtual". To account for the possibility that some of such virtual mutations in the background gene lead to acceleration in rates of origination of mutations at foreground-gene sites, we mark each reassortment events by a "virtual" node on the foreground-gene phylogeny. All foreground-gene mutations that occur on the respective branch are then placed after the virtual node. Here we make a simplifying assumption that reassortment events precede all mutations on the respective branch (see [Materials and Methods](#sec015){ref-type="sec"} for details). Even though this assumption introduces an error in our inference of relative order of mutations, this error is small because the fraction of branches involved in reassortment events is small. To illustrate this procedure, consider again the toy example in [Fig 1](#pgen.1005404.g001){ref-type="fig"}. When considering segment 1 as the foreground gene, we posit that the reassortment (virtual node *h*) precedes mutation *i* on branch *fb* (segment 1) and mutation *iv* on branch *gb* (segment 2) which is also mapped onto branch *fb* of the segment 1 phylogeny ([Fig 1B](#pgen.1005404.g001){ref-type="fig"}). This reassortment event replaces background segment 2 variant that carries no mutations (present at node *f*) with a segment 2 variant descendent from node *g* that has mutation *ii*. Thus, mutation *ii* is a virtual mutation in the background gene, and is placed on the virtual branch *fh*. Note that mutation *ii* is also mapped onto branch *ra* of segment 1 phylogeny. An alternative approach where we do not introduce the virtual node but assume a random order of all mutations (including virtual ones) within an edge yields qualitatively similar results (see [Materials and Methods](#sec015){ref-type="sec"}). Once all genetic changes in the background gene are mapped onto the foreground-gene phylogeny, we can use our previously developed method \[[@pgen.1005404.ref021]\] for detecting acceleration in the rate at which mutations arise on our phylogeny at sites in the foreground gene following mutations in the background gene. To do so, we compute the epistasis statistic for each pair of sites *(i*, *j)* where the leading site *i* is in the background gene and the trailing site *j* is in the foreground gene (see [Materials and Methods](#sec015){ref-type="sec"}). The epistasis statistic tends to be large for those pairs of sites in which a mutation at the trailing site quickly follows a mutation at the leading site and for which such mutations at the trailing site occur in multiple descendant lineages. We measure time between the leading and the trailing mutation as the number of synonymous mutations in the foreground gene that occur between them. As in our previous study \[[@pgen.1005404.ref021]\], we exclude all mutations at terminal branches because many such mutations are likely to be deleterious or spurious. Finally, to identify the pairs of sites with the epistasis statistic greater than expected by chance (which we call "putatively epistatic pairs"), we randomly reshuffle foreground-gene mutations among branches of the foreground-gene phylogeny while keeping the mapped background-gene mutations fixed. This permutation procedure preserves the number of mutations on each branch and the number of mutations observed at each sites, but breaks all potential associations between background- and foreground-gene mutations. It produces the null distributions of the epistasis statistic for all pairs of sites simultaneously and allows us to estimate the false discovery rate (FDR) for the number of putatively epistatic pairs at a desired nominal *P*-value threshold \[[@pgen.1005404.ref021]\]. Importantly, our procedure does not take into account linkage between sites or temporal variation in the external selection pressure, which can inflate the epistasis statistic for some pairs and will lead to an underestimate of FDR. Thus, our list of putatively epistatis pairs of sites will likely contain some pairs that do not actually interact but have a significantly elevated value of the epistasis statistic for other reasons, e.g., hitchhiking. We discuss this important caveat in section "Confounding effect of hitchhiking on inference of epistasis" below and provide an estimate of the fraction of truly interacting pairs in our list. Prevalence of inter-gene epistasis in influenza surface proteins {#sec005} ---------------------------------------------------------------- We considered both HA and NA as foreground and background genes, for both subtypes. In all cases, we found a higher than expected number of nonsynonymous site pairs with high values of the epistasis statistic in our data, implying abundant positive inter-gene epistasis between amino acid-changing mutations (Tables[1](#pgen.1005404.t001){ref-type="table"} and [S3](#pgen.1005404.s004){ref-type="supplementary-material"}, Figs [2](#pgen.1005404.g002){ref-type="fig"}--[4](#pgen.1005404.g004){ref-type="fig"} and [S1](#pgen.1005404.s005){ref-type="supplementary-material"}). The observed number of epistatic pairs was significantly greater than expected for all considered nominal *P*-value thresholds below 0.05 in three of the four comparisons: (N2, H3), (H3, N2), and (H1, N1). Here and hereafter, the first segment listed in a pair is the background, and the second segment is the foreground. In the fourth comparison (N1, H1), it was significant for nominal *P*-values of 0.005 and below ([S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}). Hereafter, we refer to these thresholds as "liberal *P*-value thresholds". To form conservative lists of putatively epistatic pairs of nonsynonymous sites, we chose the threshold nominal *P*-values that minimize the FDR, while still retaining enough sites for the downstream analyses ([Table 1](#pgen.1005404.t001){ref-type="table"}, see [Materials and Methods](#sec015){ref-type="sec"}; hereafter, "conservative *P*-value thresholds"). At conservative thresholds, the number of epistatically interacting pairs of nonsynonymous sites is about 5 times greater than expected by chance in three of the four comparisons: (N2, H3), (H3, N2), and (H1, N1), and about 2.5 times greater than expected in the remaining comparison (N1, H1) ([Table 1](#pgen.1005404.t001){ref-type="table"}; [S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}). ![Example of putative inter-gene epistasis between sites N1-78 and H1-153.\ Mutations at sites N1-78 and H1-153 are marked by orange and blue circles, respectively; mutations at site N1-275 are marked by green circles. Site N1-275 was found to form a highly scoring intra-gene epistatic pair with site N1-78 in our previous study \[[@pgen.1005404.ref021]\] (see text for details). Only mutations that form consecutive pairs are shown (see [Materials and Methods](#sec015){ref-type="sec"}); see [S1 Data](#pgen.1005404.s011){ref-type="supplementary-material"} for all mutations. Vertical bars show years in which the isolates where sampled. The inset shows the inferred directionality of epistatic interactions with arrows pointing from the leading to the trailing sites.](pgen.1005404.g002){#pgen.1005404.g002} ![Example of putative inter-gene epistasis between sites H1-222 and N1-274.\ Mutations at sites H1-222 and N1-274 are marked by orange and blue circles, respectively; mutations at site N1-275 are marked by green circles. Site N1-275 was found to form a highly scoring inter-gene epistatic pair with site N1-274 in our previous study \[[@pgen.1005404.ref021]\] (see text for details). Only mutations that form consecutive pairs are shown (see [Materials and Methods](#sec015){ref-type="sec"}); see [S2 Data](#pgen.1005404.s012){ref-type="supplementary-material"} for all mutations. Vertical bars show years in which the isolates where sampled. The inset shows the inferred directionality of epistatic interactions with arrows pointing from the leading to the trailing site.](pgen.1005404.g003){#pgen.1005404.g003} ![Example of putative inter-gene epistasis between sites N2-126 and H3-63 and H3-81.\ Mutations at sites N2-126 and glycosylation motifs starting at sites H3-63 and H3-81 are marked by orange, blue and green circles, respectively. All three mutations affecting the H3-63 glycosylation motif occurred at site H3-63 and created a new glycosylation site. Two mutations affecting the H3-81 glycosylation motif occurred at site H3-81 and one occurred at site H3-83, but all of them destroyed an existing glycosylation motif. Only mutations that form consecutive pairs are shown (see [Materials and Methods](#sec015){ref-type="sec"}); see [S3 Data](#pgen.1005404.s013){ref-type="supplementary-material"} for all mutations. Vertical bars show years in which the isolates where sampled. The inset shows the inferred directionality of epistatic interactions with arrows pointing from the leading to the trailing site.](pgen.1005404.g004){#pgen.1005404.g004} 10.1371/journal.pgen.1005404.t001 ###### Pairs of sites in HA and NA evolving under positive inter-gene epistasis. ![](pgen.1005404.t001){#pgen.1005404.t001g} Subtype H3N2 H1N1 ------------------------------------------------------------------------- ---------- ---------- --------- --------- Number of sequences 1,376 745 Gene pair (background, foreground) (N2,H3) (H3,N2) (N1,H1) (H1,N1) Foreground protein sites, total 563 459 566 470 Foreground protein sites, variable[\*](#t001fn001){ref-type="table-fn"} 173 147 130 122 Total number of site pairs 25,431 25,431 15,860 15,860 Timescale parameter τ[\*\*](#t001fn002){ref-type="table-fn"} 62 50 62 52 "Conservative" nominal *P*-value threshold 5×10^−4^ 5×10^−4^ 0.001 0.001 Significant pairs (expected) 5.92 4.78 5.76 5.18 Significant pairs (observed) 29 24 13 25 FDR, % 20 20 44 21 Distinct leading sites 23 21 13 25 Distinct trailing sites 13 11 5 6 \*Number of sites variable on internal branches \*\*See [Materials and Methods](#sec015){ref-type="sec"} and Ref. \[[@pgen.1005404.ref021]\] At conservative *P*-value thresholds, between 11% and 19% of nonsynonymous sites were involved in epistasis as leading, and between 4% and 8%, as trailing, depending on the considered pair of genes. For example, among the variable nonsynonymous sites in H3, 8% (13/173) were involved as trailing sites in epistasis with N2, and 12% (21/173) were involved as leading sites ([Table 1](#pgen.1005404.t001){ref-type="table"}). Overall, between 20% (53/261 for N1) and 31% (123/392 for N2) of all observed nonsynonymous mutations occurred at sites that we classify as epistatically interacting (either leading, trailing, or both). The mean time between putatively epistatic leading and trailing mutations in different genes was about 5 years ([S2 Fig](#pgen.1005404.s006){ref-type="supplementary-material"}), similarly to our finding for intra-gene epistasis \[[@pgen.1005404.ref021]\]. Confounding effect of hitchhiking on inference of epistasis {#sec006} ----------------------------------------------------------- Evolution in large populations with limited recombination (such as influenza A) proceeds via selective sweeps whereby neutral and deleterious "hitchhiker" mutations linked to one or multiple advantageous "driver" mutations proceed to fixation all together \[[@pgen.1005404.ref035]--[@pgen.1005404.ref040]\]. Linkage may confound inferences of epistasis from phylogenetic patterns of mutations. For example, imagine that mutations at multiple sites sweep to fixation together but only one of these mutations facilitates a rapid spread of subsequent mutations at a trailing site. On the resulting genealogy, all mutations that participate in the sweep will form consecutive pairs with the trailing mutations, which will elevate the epistasis statistic for all such site pairs. Since our permutation procedure does not account for linkage, it may call all of these pairs as putatively epistatic. Thus, we expect a certain number of putatively epistatic pairs to be hitchhiking-induced false positives. In this section we show that this effect indeed takes place. We also show that it cannot account for all of the signal of epistasis that we see, and we provide a conservative estimate for the fraction of truly epistatic site pairs among all putatively epistatic pairs. To show that hitchhiking confounds our ability to detect epistasis, we repeated our analyses using synonymous mutations in the background gene as leading and synonymous or nonsynonymous mutations in the foreground gene as trailing (syn-syn or syn-nsyn pairs, respectively). We found many putatively epistatic site pairs among syn-nsyn mutations ([S3 Fig](#pgen.1005404.s007){ref-type="supplementary-material"}). Since synonymous mutations have little or no effect on protein structure, we expect that there would be few (if any) real epistatic interactions between synonymous mutations in one gene and non-synonymous mutations in another gene. (However, true syn-nsyn epistasis may potentially arise from viral RNA-protein interactions during packaging.) Synonymous substitutions nonetheless participate in selective sweeps that also involve non-synonymous mutations \[[@pgen.1005404.ref038]\], some of which may experience epistatic interactions. Thus, significant values of the epistasis statistic among syn-nsyn pairs most likely arise as a result of hitchhiking. To confirm this, we found that for most of putatively epistatic syn-nsyn pairs, there exists a putatively epistatic pair of non-synonymous sites (nsyn-nsyn pair) with the same trailing mutations and a leading site whose phylogenetic distribution of non-synonymous mutations is identical to that of the leading synonymous mutations in the syn-nsyn pair. Such cases comprise 53% of all syn-nsyn pairs for (N1,H1), 64% for (H1,N1), 74% for (N2,H3), and 67% for (H3,N2) for the liberal *P*-value thresholds. As expected, the fraction of syn-nsyn site pairs that have a corresponding nonsyn-nonsyn pair with an identical phylogenetic distribution of mutations is lower for those syn-nsyn pairs that are formed by multiple leading mutations (e.g., 36% for (H3,N2)), compared with pairs formed by just one leading mutation (e.g., 75% for (H3,N2)). Finally, as expected, the signal of epistasis among syn-syn pairs was very weak or non-existent ([S4 Fig](#pgen.1005404.s008){ref-type="supplementary-material"}). The small residual signal may still be attributed to hitchhiking or to a small number of as yet unexplained real genetic interactions. Overall, our method does not reliably identify which of the leading mutations that co-occur on the same edges of the phylogeny actually precipitate subsequent epistatic trailing mutations. However, we can provide a conservative estimate for the number of truly epistatic pairs among all putatively epistatic pairs. To do this, we grouped together all nsyn-nsyn pairs with identical phylogenetic distributions of leading and trailing mutations and ordered them according to the lowest *P*-value in such "phylogenetic group" ([S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}). Each group with a low group *P*-value signifies that the trailing mutations raise in frequency together unexpectedly rapidly after a previous selective sweep that involves the leading mutations. This implies that at least one of the leading sites exhibits positive epistasis with at least one of the trailing sites. An average phylogenetic group involves 1.54 site pairs for (N1,H1), 1.85 for (H1,N1), 1.59 for (H3,N2), and 1.64 for (N2,H3). Thus, assuming that each group includes only one truly epistatic pair, we estimate that the fractions of truly epistatic site pairs constitute 65% for (N1,H1), 54% for (H1,N1), 63% for (H3,N2), and 61% for (N2,H3); the actual fractions may be even higher, as there may be multiple drivers with identical phylogenetic distributions \[[@pgen.1005404.ref038],[@pgen.1005404.ref041]\]. As an additional evidence supporting our claim that not all putatively epistatic pairs are results of hitchhiking, we repeated our analysis for a restricted subset of site pairs where a mutation at the trailing site follows a mutation at the leading site in at least two independent locations on the genealogy ([Fig 5](#pgen.1005404.g005){ref-type="fig"}). In this smaller subset of data, we still observe more site pairs with high values of the epistasis statistic than expected, and this excess is statistically significant ([S5 Fig](#pgen.1005404.s009){ref-type="supplementary-material"}, [S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}). Putatively epistatic site pairs revealed in this analysis must have a smaller fraction of hitchhiking-induced pairs because the same non-interacting mutations will only rarely follow each other closely in two or more distinct sweeps. ![Numbers of leading and trailing mutations at putatively epistatic site pairs in different gene pairs.\ Circle area corresponds to the number of site pairs with each number of leading and trailing mutations at liberal (grey) or conservative (orange) *P-*value thresholds. To gauge the scale, the numbers of pairs at conservative *P-*value thresholds are shown next to the orange circles.](pgen.1005404.g005){#pgen.1005404.g005} Reassortments and inter-gene epistasis {#sec007} -------------------------------------- The direct effect of reassortments on our results was moderate: between 67% and 91% of pairs of nonsynonymous mutations at putatively epistatic site pairs were not separated by any reassortment events ([S1 Table](#pgen.1005404.s002){ref-type="supplementary-material"}). In over 75% of all putatively epistatic site pairs, the majority of consecutive mutations did not span any reassortment events. To analyze the association between reassortments and inter-gene epistasis, we asked whether putatively epistatic pairs are formed more frequently than expected with leading mutations that arose during reassortments, i.e., mutations at virtual nodes. We found that for 6% (N2, H3), 20% (H3, N2), 0% (N1, H1) and 10% (H1, N1) of trailing mutations at putatively epistatic pairs of sites the corresponding leading mutation was at a virtual node ([S1 Table](#pgen.1005404.s002){ref-type="supplementary-material"}). This is more than expected (10%) for N2 (binomial *P*-value = 4 × 10^−4^), less than expected (19%) for H3 (binomial *P-*value = 2 × 10^−4^), and not significantly different from what is expected for N1 and H1. Therefore, in N2, a substantial number of trailing mutations compensates for the changes in the genetic background brought about by reassortment events. Inter-gene versus intra-gene epistasis {#sec008} -------------------------------------- How does the extent of inter-gene epistasis compare to the extent of intra-gene epistasis? To address this question, we repeated the analyses of intra-gene epistasis from Ref. \[[@pgen.1005404.ref021]\] with the data for each of the four genes analyzed here (H1, N1, H3, and N2) and compared the number of putatively epistatic inter- and intra-gene site pairs for each FDR value ([S6 Fig](#pgen.1005404.s010){ref-type="supplementary-material"}). We found that the number of intra- and inter-gene putatively epistatic pairs is comparable when trailing mutations occur in HA and leading mutations occur in HA or NA, respectively ([S5 Fig](#pgen.1005404.s009){ref-type="supplementary-material"}). At the same time, the number of putatively epistatic inter-gene pairs exceeds that of intra-gene pairs by as much as a factor of 3 when trailing mutations occur in NA ([S6 Fig](#pgen.1005404.s010){ref-type="supplementary-material"}). We also compared the sets of sites involved in inter-gene epistasis to sets of sites involved in intra-gene epistasis \[[@pgen.1005404.ref021]\]. The overlap between these two groups of sites was slightly higher than expected by chance for the H3 leading and the N2 trailing sites in the (H3,N2) gene pair ([Table 2](#pgen.1005404.t002){ref-type="table"}), but this difference was not significant after Bonferroni correction. 10.1371/journal.pgen.1005404.t002 ###### Comparisons of sets of sites evolving under inter-gene vs. intra-gene epistasis. ![](pgen.1005404.t002){#pgen.1005404.t002g} Inter-gene epistasis Intra-gene epistasis \[[@pgen.1005404.ref021]\] Enrichment or depletion ---- ---------------------- ------------------------------------------------- ------------------------- -------- ----------- ----------- H3 **leading** **21** **leading** **50** **0.040** **0.960** trailing 13 trailing 79 0.070 0.928 N2 leading 23 leading 35 0.651 0.354 **trailing** **11** **trailing** **58** **0.013** **0.985** H1 leading 25 leading 54 0.187 0.813 trailing 5 trailing 66 0.731 0.267 N1 leading 13 leading 39 0.075 0.925 trailing 6 trailing 57 0.651 0.349 For HA and NA proteins, the subsets of leading and trailing sites in inter-gene epistatic pairs (subset 1) were compared with the subsets of leading and trailing sites in intra-gene epistatic pairs (subset 2). Significantly (*P*\<0.05) enriched categories (*P* ~+~) are in boldface, and depleted (*P* ~--~), in italic. Enrichment of functional sites among epistatic sites {#sec009} ---------------------------------------------------- Next, we investigated whether sites that were implicated in inter-gene epistasis occurred preferentially in parts of the HA and NA proteins with known functional significance. In particular, we compared the sets of putatively epistatic sites with the sets of epitopic sites \[[@pgen.1005404.ref020],[@pgen.1005404.ref042]--[@pgen.1005404.ref046]\], glycosylation sites \[[@pgen.1005404.ref047],[@pgen.1005404.ref048]\], sites that are responsible for antigenic cluster transitions \[[@pgen.1005404.ref036],[@pgen.1005404.ref049]--[@pgen.1005404.ref051]\], as well as sites that evolve under uniform or lineage-specific positive selection. The sites in HA identified as interacting with NA occurred in all parts of HA protein, with the majority of them located in known antigenic epitopes. This is expected because our method has more power to identify epistasis at sites that are more variable, and most of variable sites are also epitopic. However, we can control for this bias by comparing the set of putatively epistatic sites that we discover in real datasets with the corresponding sets of sites discovered in permuted datasets (see [Materials and Methods](#sec015){ref-type="sec"}). Using this approach, we find that leading sites in HA are actually not enriched for epitopic sites or sites under uniform or lineage-specific positive selection ([Table 3](#pgen.1005404.t003){ref-type="table"}). But they are enriched for sites responsible for differences between antigenic clusters \[[@pgen.1005404.ref036],[@pgen.1005404.ref049]\] ([Table 3](#pgen.1005404.t003){ref-type="table"}). On the other hand, cluster-transition sites are slightly underrepresented among trailing sites in H3. Finally, glycosylation sites \[[@pgen.1005404.ref052]\] are underrepresented among trailing sites in both H3 and H1 ([Table 3](#pgen.1005404.t003){ref-type="table"}). 10.1371/journal.pgen.1005404.t003 ###### Comparisons of sets of sites evolving under inter-gene epistasis with sets of sites with known properties. ![](pgen.1005404.t003){#pgen.1005404.t003g} Inter-gene epistasis Category Enrichment or depletion -------- ---------------------- ---------- ------------------------------------------------------------- ---------------------------------------------------- -------- ----------- ----------- H3-HA1 leading 19 **antigenic** \[[@pgen.1005404.ref036]\] **44** **0.023** **0.975** **antigenic** \[[@pgen.1005404.ref049]\] **49** **0.035** **0.965** antigenic \[[@pgen.1005404.ref050]\] 7 0.255 0.745 epitopic \[[@pgen.1005404.ref042],[@pgen.1005404.ref043]\] 131 0.128 0.873 glycosylation \[[@pgen.1005404.ref047]\] 7 0.253 0.748 trailing 9 *antigenic* \[[@pgen.1005404.ref036]\] *44* 0.993 0.005 *antigenic* \[[@pgen.1005404.ref049]\] *49* 1.000 0.000 *antigenic* \[[@pgen.1005404.ref050]\] *7* 0.990 0.008 epitopic \[[@pgen.1005404.ref042],[@pgen.1005404.ref043]\] 131 0.670 0.333 *glycosylation* \[[@pgen.1005404.ref047]\] *7* 0.978 0.020 H3-HA0 leading 21 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 17 0.355 0.648 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 27 0.470 0.535 trailing 13 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 17 0.945 0.053 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 27 0.908 0.090 N2 leading 23 pitopic \[[@pgen.1005404.ref043]--[@pgen.1005404.ref045]\] 45 0.620 0.378 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 10 0.593 0.405 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 16 0.405 0.595 trailing 11 epitopic \[[@pgen.1005404.ref043]--[@pgen.1005404.ref045]\] 45 0.158 0.840 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 10 0.558 0.440 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 16 0.910 0.088 H1-HA1 leading 21 antigenic \[[@pgen.1005404.ref051]\] 41 0.160 0.838 epitopic \[[@pgen.1005404.ref020]\] 32 0.133 0.865 glycosylation \[[@pgen.1005404.ref048]\] 11 0.528 0.470 trailing 5 antigenic \[[@pgen.1005404.ref051]\] 41 0.708 0.295 epitopic \[[@pgen.1005404.ref020]\] 32 0.138 0.863 *glycosylation* \[[@pgen.1005404.ref048]\] *11* 0.958 0.040 H1-HA0 leading 25 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 6 0.588 0.415 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 12 0.515 0.483 trailing 5 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 6 0.318 0.680 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 12 0.258 0.740 N1 leading 13 epitopic \[[@pgen.1005404.ref046]\] 12 0.138 0.863 *uniform positive* [^*a*^](#t003fn002){ref-type="table-fn"} *-* *2* 0.993 0.005 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 6 0.945 0.053 glycosylation \[[@pgen.1005404.ref048]\] 13 0.713 0.285 trailing 6 epitopic \[[@pgen.1005404.ref046]\] 12 0.160 0.838 uniform positive[^a^](#t003fn002){ref-type="table-fn"} \- 2 0.253 0.745 lineage positive[^b^](#t003fn003){ref-type="table-fn"} \- 6 0.193 0.808 glycosylation \[[@pgen.1005404.ref048]\] 13 0.130 0.868 For HA and NA proteins, the subsets of leading and trailing sites in inter-gene epistatic pairs (subset 1) were compared with the subsets of leading and trailing sites in a range of other categories (subset 2). Significantly (*P*\<0.05) enriched categories (*P* ~+~) are in boldface, and depleted (*P* ~--~), in italic. ^a^Sites under uniform positive selection (HyPhy model IFEL). ^b^Sites under lineage-specific positive selection (HyPhy model MEME). We found no enrichment of epitopic, positively selected, or glycosylation sites among sites in NA that are involved in inter-gene epistasis ([Table 3](#pgen.1005404.t003){ref-type="table"}). To better understand what types of sites in NA comprise the putatively epistatic set, we searched the literature for evidence of functional consequences of mutations at sites that we identified. (Such a systematic analysis was impractical for HA because much less site-specific functional data is available for this protein.) We carried out this search for each of the 31 distinct sites in N2 (23 leading, 11 trailing sites, and 3 sites falling into both types), and for each of the 19 epistatic sites in N1 (13 leading and 6 trailing). We found that inter-gene epistasis in both N1 and N2 may be related to NA catalytic activity and resistance to inhibitors ([S2 Table](#pgen.1005404.s003){ref-type="supplementary-material"}). Specifically, we found that N2 sites 370, 372, 401 and 432, which are homologous to the second sialic-binding site (hemadsorption site) of avian influenza viruses, are the trailing sites in 58% (14/24) of the discovered epistatic pairs, including 13 pairs with the lowest *P*-values, and that they are leading sites in 10% (3/29) of the discovered epistatic pairs ([S2 Table](#pgen.1005404.s003){ref-type="supplementary-material"}). Although the function of these sites in human influenza has not been directly demonstrated, it is thought that they affect catalytic efficiency of NA \[[@pgen.1005404.ref053]\]. Among the remaining epistatic sites, leading sites 126 and 248 and trailing site 127 affect binding of NA inhibitors. In addition, two more leading sites, 215 and 332, although not shown to affect NA activity, were reported to often mutate in response to NA inhibitor treatment. Finally, two leading sites, 172 and 399, and one trailing site 263 were previously inferred to distinguish the reassortant H3N2 clades \[[@pgen.1005404.ref033]\]. In N1, three leading sites 59, 386 and 388 (70, 390, and 392 in N2 numbering), and trailing site 434, undergo host-specific position-specific glycosylation, likely affecting enzymatic activity of NA \[[@pgen.1005404.ref054]\]. Leading sites 6 and 14 and trailing site 15 are located in the transmembrane domain, which affects viral sialidase activity through its effect on NA tetramer assembly and transport to the membrane \[[@pgen.1005404.ref055],[@pgen.1005404.ref056]\]. Leading site 149 and trailing sites 83, 275, 267 and 287 (274, 266, and 286 in N2 numbering) affect sialic acid binding; mutations at sites 267 and 275 were also shown to affect resistance to oseltamivir, including the mutation at site 275 which gave rise to the common oseltamivir-resistant H1N1 subtype. Finally, mutations at leading site 78, and trailing site 83, arise with H275Y in naturally oseltamivir-resistant strains. Examples of biologically plausible explanations for epistasis {#sec010} ------------------------------------------------------------- Finally, we present several examples of implicated epistatic site pairs with biologically plausible explanations for the mechanism of their epistatic interactions. ### Leading site 78 in N1, trailing site 153 in H1 {#sec011} We found a strong signal of epistasis between sites N1-78 and H1-153 (site 156 in H3 numbering; [S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}, [Fig 2](#pgen.1005404.g002){ref-type="fig"}). Site N1-78 was also implicated in an intra-gene epistatic interaction with site N1-275 (site 274 in N2 numbering) \[[@pgen.1005404.ref021]\]; mutation at site N1-275 causes oseltamivir resistance \[[@pgen.1005404.ref052]\]. Mutations at site N1-78 predated H275Y mutations at least twice ([Fig 2](#pgen.1005404.g002){ref-type="fig"}). Importantly, mutations at site 153 in H1 are known to be responsible for changes in receptor binding affinity \[[@pgen.1005404.ref020]\], suggesting that a single mutation (N1-78) may precipitate further functionally important mutations in multiple genes. ### Leading site 222 in H1, trailing sites 274 and 430 in N1 {#sec012} We found a strong signal of epistatic interactions between site H1-222 (site 225 in H3 numbering) and sites N1-274 and N1-430 ([S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}, [Fig 3](#pgen.1005404.g003){ref-type="fig"}), both of which, in turn, were implicated in intra-gene epistasis with site N1-275 \[[@pgen.1005404.ref021]\]. Interestingly, mutations at site N1-430 modify activity of NA \[[@pgen.1005404.ref053]\], while mutations at site H1-222, which is part of the receptor binding site, have been shown to compensate mutations in NA that confer resistance to NAI \[[@pgen.1005404.ref054]\]. Since resistance to NAI depends on the balance between catalytic activities of HA and NA \[[@pgen.1005404.ref023],[@pgen.1005404.ref055]\], mutations at these sites may be important for maintaining this balance. ### Leading site 126 in N2, trailing sites 63 and 81 in H3 {#sec013} We found a strong signal of epistasis between leading site N2-126 and trailing sites H3-63 and H3-81 ([Fig 4](#pgen.1005404.g004){ref-type="fig"}). Site N2-126 frequently mutates in MDCK lines \[[@pgen.1005404.ref056]\], and the observed mutation H126P is implicated to be important for the avian to human host shift of the H3N2 subtype \[[@pgen.1005404.ref057]\]. Sites H3-63 and H3-81 are parts of known glycosylation motifs \[[@pgen.1005404.ref047],[@pgen.1005404.ref058]\]. The loss of glycosylation site at position 81 in 1974 follows the gain of glycosylation site at position 63 in 1973 soon after beginning of H3N2 pandemic in 1968 \[[@pgen.1005404.ref058]\], possibly in response to the H126P mutation in N2. Mutations at site H3-63 in three independent lineages created a new glycosylation site, while the old glycosylation site was concordantly lost either via a mutation at site H3-81 (twice) or a mutation at site H3-83 (once; [Fig 4](#pgen.1005404.g004){ref-type="fig"}). Glycosylation of HA often masks epitopes \[[@pgen.1005404.ref058],[@pgen.1005404.ref059]\] and loss of glycosylation at site 81 may also affect receptor binding \[[@pgen.1005404.ref060]\]. We speculate that adaptation to the new host occurred via a change in receptor-binding activity of NA that in turn precipitated compensatory mutations in HA glycosylation patterns. Discussion {#sec014} ========== We developed a phylogeny-based method for detecting positive epistasis between mutations at sites that are incompletely linked. This approach provides the first systematic procedure for identifying such genetic interactions from sequence data sampled over time. We demonstrated the power of this method by applying it to data from human influenza A virus where we found dozens of putative epistatic interactions between sites in the surface proteins HA and NA. Our analysis cannot take the place of a direct experimental assay to unambiguously demonstrate epistasis between a specific pair of mutations in influenza viruses. Still, several of the most significant pairs of sites implicated by this statistical procedure have known biological functions that provide a plausible mechanistic basis for the observed patterns of coordinated molecular evolution. While powerful, our method of detecting epistasis between incompletely linked sites has three limitations. First, it relies on our knowledge of recombination breakpoints and on our ability to accurately infer phylogenies, detect recombination events and map mutations from one phylogeny onto another. Since within-segment recombination in influenza is rare \[[@pgen.1005404.ref031]\] and the main source of horizontal exchange of genetic material is reassortment, RNA segments represent well-defined linkage blocks, which simplifies our analysis. Although in principle our method of detecting epistasis through temporal clumping of mutations on the phylogeny should be applicable to systems with recombination (e.g., HIV), a practical implementation becomes cumbersome because recombination breakpoints need to be determined and mutations need to be mapped onto several different phylogenies. Even in influenza, an accurate detection of reassortments is difficult, especially between closely related taxa \[[@pgen.1005404.ref029],[@pgen.1005404.ref032]\], and the mapping of mutations is inherently ambiguous. The second limitation is inherent to the problem of detecting epistasis from temporal mutation data, and is discussed in detail in a previous study using such techniques \[[@pgen.1005404.ref021]\]. The problem is that our method (as well as any method utilizing the same data) will identify sites as trailing in epistatic pairs if mutations at these sites are temporally clustered for any reason---including reasons that are not caused by epistatic interactions *per se*. In theory, temporally correlated substitutions may arise due to episodes of positive selection or relaxed negative selection that are correlated between sites of the two genes. If this scenario is common, we would typically expect the inverse of a site pair with a high epistatic score to also be high-scoring. However, among the pairs defined under the conservative *P-*value threshold, we do not observe a single such pair. While there were several site pairs with a significant inverse pair among the pairs defined under the liberal *P*-value threshold, these pairs do not have lower *P*-values than the remaining pairs, arguing against the temporally correlated selective constraint as the predominant explanation for our results. Furthermore, the sites detected by our method do not tend to experience lineage-specific positive selection ([Table 3](#pgen.1005404.t003){ref-type="table"}), again arguing against this explanation. Finally, hitchhiking of mutations at linked sites is a major confounding factor for our method. This problem is relevant for human influenza A because hitchhiking is widespread in its evolution \[[@pgen.1005404.ref035]--[@pgen.1005404.ref039]\]. However, hitchhiking alone cannot account for all of the detected epistasis signal because our randomization procedure preserves the number of mutations at each branch, and thus accounts for temporal non-uniformity of evolutionary rates. Nevertheless, the list of epistatic pairs is likely contaminated with hitchhikers that co-occur on branches together with the actual leading mutations \[[@pgen.1005404.ref021]\]. Hitchhiking is apparently the leading cause of most of the epistatic signal that we observe between leading synonymous sites and trailing non-synonymous sites. By contrast, by grouping site pairs into phylogenetic groups with identical phylogenetic distributions of mutations, we estimate that less than 50% of putatively epistastic non-synonymous pairs arose due to hitchhiking. In each phylogenetic group, those site pairs with lower *P*-values and those that have multiple leading mutations are more likely to be the true epistatic pairs. Keeping these caveats in mind, we turn to the interpretation of our observation of epistasis between mutations in the HA and NA. Between 20% and 31% of all mutations occurred at sites involved in epistatic interactions as either leading or trailing. The numbers of putatively epistatic site pairs where the leading mutation occurs in NA and the trailing mutation occurs in HA and vice versa are similar. The mean times between consecutive mutations at such sites are also similar between each other ([S2 Fig](#pgen.1005404.s006){ref-type="supplementary-material"}) and to those in intra-gene epistasis \[[@pgen.1005404.ref021]\]. Thus, both mutations in HA facilitated by prior mutations in NA and mutations in NA facilitated by prior mutations in HA appear to be common. The evolution of these two segments of the human influenza virus is therefore tightly coordinated. Moreover, trailing sites in NA more frequently follow a leading mutation in HA than a leading mutation in NA itself. What is the molecular basis for such coordinated evolution? We searched for enrichment of various properties among epistatically interacting sites. In HA, we found no enrichment of epistatic sites among the positively selected sites. In fact, it is somewhat surprising that the detected putatively epistatic sites are not particularly rapidly evolving, despite the fact that our method has more power to detect epistasis at sites with more mutations \[[@pgen.1005404.ref021]\]. We do observe, however, an enrichment of leading sites among the HA sites responsible for antigenic shifts. This suggests that the changes in HA driven by immune system pressure are frequently compensated by mutations in NA. Conversely, antigenic sites and glycosylation sites were underrepresented among the trailing sites of HA, suggesting that the HA trailing sites compensating for the mutations in NA comprise a novel potentially interesting set of functional sites in this protein. We also found no enrichment of positional or functional categories in epistatic sites in NA. This lack of clear pattern is consistent with experimental data and implies that genetic interactions occur through a wide range of mechanisms, and that the sites involved in them are hard to predict a priori \[[@pgen.1005404.ref060],[@pgen.1005404.ref061]\]. However, we observed that many epistatic sites in NA are involved in NAI resistance, modulation of NA activity, or both. Why do the sites affecting these traits interact with HA? Some of the observed interactions (e.g., site N1-78 ([Fig 2](#pgen.1005404.g002){ref-type="fig"}), and sites N1-274 and N1-430 ([Fig 3](#pgen.1005404.g003){ref-type="fig"})) could be directly attributed to the requirement to balance the activities of HA and NA to maintain viral fitness, especially in the presence of NAI \[[@pgen.1005404.ref055]\]. Other interactions may affect this balance indirectly. For example, sites in the signal peptide of HA appear to occasionally interact with sites in the transmembrane domain of NA, e.g., site H1-16 forms a putatively epistatic pair with site N1-15 ([S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}). These types of mutations likely affect the efficiency of membrane localization of the respective surface proteins \[[@pgen.1005404.ref062]\], and mutations in the transmembrane domain may also influence NA activity through their effect on tetramer assembly \[[@pgen.1005404.ref063]\]. Some of the putatively epistatic site pairs that we detected have been experimentally confirmed. For example, a number of mutations in HA of H1N1 closely predated the 2007 spread of the H275Y (274 in N2 numbering) oseltamivir resistance mutations in NA. Recently, 7 of these HA sites were experimentally tested for interactions \[[@pgen.1005404.ref061]\]. These experiments showed that HA that carries the derived residues at all seven sites is well adapted to both the ancestral H275 (sensitive) and the derived Y275 (resistant) variant of NA. At the same time, three out of seven reconstructed reversions in HA (at sites 82, 141 and 189) had large fitness defects in the context of the derived NA variant, implying that mutations at these sites compensated for the H275Y mutation in NA \[[@pgen.1005404.ref061]\]. Remarkably, all three of these HA sites form high-ranking pairs in our analysis with the site 275 in NA ([S3 Table](#pgen.1005404.s004){ref-type="supplementary-material"}, sites 99, 157, 205 in our numbering). Finally, a recent experimental study \[[@pgen.1005404.ref027]\] confirmed the involvement of site 275 in intragenic epistatic interactions predicted in our previous work \[[@pgen.1005404.ref021]\]. Trailing mutations in N2 frequently compensate for the changes in H3, and possibly in other genes \[[@pgen.1005404.ref029]\], brought about by reassortments. Furthermore, the N2 sites that are involved in intra-gene epistasis as trailing are enriched in sites that experience post-reassortment mutations \[[@pgen.1005404.ref029]\], and in sites involved in inter-gene epistasis as trailing ([Table 2](#pgen.1005404.t002){ref-type="table"}). These findings support our interpretation that NA is the gene most actively involved as trailing in epistatic interactions, with mutations at it compensating a range of other events both in the same \[[@pgen.1005404.ref021]\] and in other genes ([Table 2](#pgen.1005404.t002){ref-type="table"}; \[[@pgen.1005404.ref029]\]); and show that the same set of sites in N2 might tune the protein function in response to various changes of genetic background of H3N2 IAV. More generally, our results suggest that the evolution of a protein depends strongly on its genomic context, with a substantial number of adaptive mutations representing responses to mutations that previously occurred in other proteins. Such evolutionary coupling between different proteins has also been observed in several experimental systems \[[@pgen.1005404.ref013],[@pgen.1005404.ref015],[@pgen.1005404.ref023],[@pgen.1005404.ref064]--[@pgen.1005404.ref066]\]. However, estimating the fraction of mutations that are driven by direct adaptation to the external environment versus by selection to balance or compensate the effects of prior mutations elsewhere in the genome remains an important open problem. Materials and Methods {#sec015} ===================== Sequences {#sec016} --------- We downloaded all complete human H3N2 influenza A isolates (N = 2,205) available on 27 October 2011 and all complete human seasonal H1N1 influenza A isolates (N = 1,180) available on 12 November 2012 from the flu database \[[@pgen.1005404.ref067]\]. The amino acid sequences were aligned using MUSCLE \[[@pgen.1005404.ref068],[@pgen.1005404.ref069]\], and the alignments were reverse translated using PAL2NAL \[[@pgen.1005404.ref070]\]. Genotypes containing truncated sequences or long stretches of unidentified nucleotides were discarded. The 3 genotypes of H3N2 subtype carrying indels were discarded. We also discarded all genotypes of H1N1 that were sampled prior to 1936 because they had large (15--16 amino acids) gaps between amino acid positions 42 and 77 in the NA protein. In all sequences, the alignment columns with gaps in more than 10% of all sequences were excluded from further consideration; in the remaining alignment columns, gaps were substituted with the consensus nucleotide. Four isolates of H1N1 subtype (A/New Jersey/1976, A/Wisconsin/301/1976, A/Iowa/CEID23/2005, A/Switzerland/5165/2010) were discarded as swine-origin influenza virus (SOIV) \[[@pgen.1005404.ref071]--[@pgen.1005404.ref073]\]. Three isolates of H3N2 subtype (A/Ontario/RV123/2005, A/Ontario/1252/2007 and A/Indiana/08/2011) were discarded as SOIV triple reassortants \[[@pgen.1005404.ref074]\]. Many of the genotypes had NA genes with identical nucleotide sequences; among each such set of genotypes, we only retained one random genotype. This reduced our sample to 1,376 isolates for H3N2 subtype, and 745 isolates for H1N1 subtypes. For HA and NA proteins of H1N1, the numbering scheme used through the text is relative to the proteins of the A/AA/Huston/1945 isolate, unless stated otherwise. Inferring the temporal order of mutations in two reassorting segments {#sec017} --------------------------------------------------------------------- We asked whether a mutation at a particular site in HA segment facilitates a subsequent mutation at a particular site in NA segment, or vice versa. To address this, we need to reconstruct the phylogenetic trees for each of the two segments, infer the position of reassortments on these trees, and establish the temporal order of mutations in different segments relative to each other. We achieve this goal in three steps, which are described in detail below. Briefly, in the first step, based on topological incongruencies between the phylogenetic trees of individual segments, we identify the so-called reassortment sets, i.e., sets of taxa that are likely descendants of reassortant viruses. In the second step, we reconstruct the so-called constrained phylogenies of the segments, i.e., phylogenies that are topologically identical everywhere except for branches that correspond to reassortment events. This allows us to map, in the third step, the mutations that occur on branches of one phylogeny to the branches of another phylogeny. ### Inferring the reassortment and the "trunk" sets {#sec018} We used GiRaF \[[@pgen.1005404.ref032]\] to identify sets of taxa that are descendant to reassortment events. To reduce the computational burden associated with this step, we first clustered isolates with nucleotide identity exceeding 99.5% across the concatenated HA-NA sequence using CD-HIT \[[@pgen.1005404.ref075]\], and retained for the GiRaF analysis one random sequence from each cluster, for a total of 225 H3N2 and 169 H1N1 isolates. GiRaF takes as input the sets of phylogenetic trees sampled from their posterior distributions for each segment. We obtained 1000 such trees per segment using MrBayes \[[@pgen.1005404.ref076]\] with the GTR+I+Γ model, 2 million iterations, sampling one tree every 2000 iterations. The output of GiRaF is a collection of taxon sets each of which consists of descendants of a likely reassortment event. Because GiRaF attempts to infer nested reassortments and because of phylogenetic noise, these sets are generally overlapping, i.e., the same taxon may be included into multiple sets. However, to infer subtrees with topologies unaffected by reassortments, we need non-overlapping sets of taxa each descendant to the same past reassortment event (or the same series of such events). To construct such non-overlapping sets, we sorted the GiRaF sets according to the fraction of taxa shared with other sets, from high to low. All taxa in the highest-ranking set were then considered as one set of reassortants. We then excluded these taxa from all lower-ranking sets, resorted the remaining GiRaF sets, and repeated the procedure. Thus, for example, if GiRaF set 1 was fully nested within a larger GiRaF set 2, we inferred two non-overlapping sets of reassortants: those of set 1, and those of set 2 excluding those of set 1. A GiRaF set not overlapping any other GiRaF sets always produced a set of reassortants of its own. By this procedure, each taxon was included either into a unique reassortment set (denoted by the most recent reassortment event), or into the set of non-reassortant taxa which we refer to as the "trunk" set. We then ascribed the isolates removed in the clustering step to the same set as their representative cluster sequence. ### Reconstructing constrained phylogenies {#sec019} Given *N* sets of taxa (*N*--1 reassortment sets and one trunk set), we reconstruct two complete phylogenies (one per segment) that differ by exactly *N*--1 rooted subtree prune-regraft (rSPR) operations corresponding to *N*--1 reassortment events. We call such phylogenies "constrained". To assemble constrained phylogenies, we start by reconstructing two standard maximum likelihood phylogenies (one per segment) using PhyML \[[@pgen.1005404.ref077]\] (model GTR+I+Γ) and rooting these phylogenies with the oldest isolate as the outgroup (A/Albany/18/1968 for H3N2, and A/Henry/1936 for H1N1). We use these phylogenies as templates for reconstructing constrained phylogenies. Next, for each reassortment or trunk set of taxa, we reconstruct an unrooted phylogenetic subtree from the alignment of concatenated HA and NA sequences by maximum likelihood using PhyML \[[@pgen.1005404.ref077]\] (model GTR+I+Γ). To root each such subtree, we compare the locations of the most recent common ancestors (MRCAs) of this set of taxa on two template trees. In the absence of phylogenetic noise, MRCAs on both segments would be identical, in which case the root of the concatenate-based subtree would be placed unambiguously. However, in general, MRCAs based on different template phylogenies are different. We therefore place the root of the concatenate-based subtree in such a way that its position is most similar to both alternative MRCA positions according to a trade-off function described in [S1 Text](#pgen.1005404.s001){ref-type="supplementary-material"}. As a result of this procedure, we obtain *N*--1 reassortment rooted subtrees and one trunk rooted subtree. We then assemble these subtrees into two complete constrained phylogenies (one per segment) that differ by exactly *N*--1 rSPR operations as follows. In the absence of noise, i.e., if reassortments were the only source of differences between the two template phylogenies, each reassortment set would be either mono- or paraphyletic on each template phylogeny. Each reassortment subtree could then be unambiguously grafted into a unique branch of another (paraphyletic) subtree, in exact accordance with the template tree. However, some reassortment sets are polyphyletic on the template trees, making the grafting procedure ambiguous. Our algorithm resolves such ambiguities on the basis of a tradeoff between two criteria: maximizing topological similarity between the constrained and the template phylogeny for each segment, and minimizing the length of the resulting constrained phylogeny (see [S1 Text](#pgen.1005404.s001){ref-type="supplementary-material"} for details). The result of this assembly is a pair of phylogenetic trees, one tree per segment, that differ from each other by *N--*1 rSPR operations, as desired. Once the topologies of the constrained phylogenies are reconstructed, we optimize their branch lengths and infer ancestral sequences using HyPhy with the nucleotide REV+Rate Het. model \[[@pgen.1005404.ref078]\]. ### Establishing temporal order of events on the phylogeny {#sec020} Our goal is to detect mutations in one segment that occurred after mutations in another segment. If we analyze mutations in segment 1 that occurred after mutations in segment 2, we say that "segment 2 forms the genetic background for segment 1", or that "segment 2 is in the background" and "segment 1 is in the foreground". To study such mutations in segment 1, we map mutations in the background segment (segment 2) onto the foreground-segment phylogeny. Since the topologies of each reassortment and trunk subtree are identical for both segments by construction (see above), each branch of the background tree maps to a unique branch of the foreground tree (we call such branches "unambiguous"), with the exception of branches that are involved in the rSPR operations (we call such branches "ambiguous"). Thus, mutations in the background segment that occur on unambiguous branches map onto unique branches of the foreground phylogeny. Consider a toy example shown in [Fig 1](#pgen.1005404.g001){ref-type="fig"}. Node *b* forms a single reassortment set, and the remaining nodes form the trunk set. Correspondingly, the constrained phylogenies shown for the two segments differ by a single rSPR operation involving the branch leading to node *b*. Therefore, branches *gb*, *ec*, and *ed* in the segment 2 phylogeny map to branches *fb*, *ec*, *ed* of the segment 1 phylogeny, respectively, and mutation *iv* in segment 2 unambiguously occurs on branch *fb* of the segment 1 phylogeny ([Fig 1B](#pgen.1005404.g001){ref-type="fig"}). Now consider ambiguous branches, such as branches *rg*, *ga*, and *re* in the segment 2 phylogeny in [Fig 1A](#pgen.1005404.g001){ref-type="fig"}. Each rSPR corresponding to each reassortment event removes one node (prune operation), thus merging a pair of successive branches, and adds one node (regraft operation), thus splitting a branch. Therefore, each reassortment event results in one branch of the background phylogeny corresponding to a pair of branches of the foreground phylogeny (1-to-2 map) and another pair of branches of the background phylogeny corresponding to another branch of the foreground phylogeny (2-to-1 map). In [Fig 1](#pgen.1005404.g001){ref-type="fig"}, a pair of branches *rg* and *ga* of the segment 2 phylogeny corresponds to branch *ra* of the segment 1 phylogeny, and branch *re* of the segment 2 phylogeny corresponds to the pair of branches *rf* and *fe* of the segment 1 phylogeny. In 2-to-1 maps, all mutations that occur on either of the two branches in the background segment are unambiguously mapped onto a single branch of the foreground segment phylogeny. In [Fig 1](#pgen.1005404.g001){ref-type="fig"}, mutation *ii* in segment 2 maps unambiguously onto branch *ra* of the segment 1 phylogeny. The situation is more difficult in the 1-to-2 maps, where each mutation that occurs on such ambiguous branch in the background segment could map onto either one of the two branches in the foreground segment. In [Fig 1](#pgen.1005404.g001){ref-type="fig"}, mutation *iii* in segment 2 could occur either on branch *rf* or on branch *fe* of the segment 1 phylogeny. We resolve this ambiguity by placing all such background mutations onto the distal branch of the foreground phylogeny (e.g., in [Fig 1](#pgen.1005404.g001){ref-type="fig"}, mutation *iii* is placed on branch *fe*). This choice minimizes the number of consecutive potentially epistatic mutation pairs that can form between the background and the foreground sites (see below). Finally, each reassortment event maps onto the branch of the foreground segment phylogeny that leads to the most recent common ancestor of the corresponding reassortment subtree. We refer to such branches as "reassortment-carrying branches", or RCBs. We signify the occurrence of a reassortment event by adding a "virtual" node on the RCB and placing all foreground mutations that occur on the RCB after the virtual node. Thus, we make a simplifying assumption that the reassortment event precedes all mutations on the RCB. For example, in [Fig 1B](#pgen.1005404.g001){ref-type="fig"}, reassortment (virtual node *h*) precedes mutations *i* and *iv* on branch *fb* of segment 1 phylogeny. (Alternative approach of randomly shuffling all mutations, including virtual ones, within the edge yielded a highly similar rank order of epistasis statistic *P*-values (Spearman's rho \> 0.98).) When viewed as an event on the foreground phylogeny, each reassortment event is equivalent to an instantaneous replacement of the background segment sequence present in the parent node of the foreground RCB with the background segment sequence present at the parental node of corresponding RCB on the background segment phylogeny. In the example shown in [Fig 1B](#pgen.1005404.g001){ref-type="fig"}, the reassortment event replaces segment 2 which carries no mutations (present at node *f*) with a segment 2 descendent from node *g* that has mutation *ii*. Thus, this reassortment event is equivalent to the occurrence of mutation *ii* in the background segment. This "virtual" mutation is placed on the virtual branch *fh*. This procedure of mapping background mutation onto the foreground phylogeny guarantees that the order of background mutations is preserved. All procedures for construction of constrained gene trees were implemented in C++ with bio++ package \[[@pgen.1005404.ref079],[@pgen.1005404.ref080]\]. Mapping of mutations was implemented in Perl and used Bio::Phylo package \[[@pgen.1005404.ref081]\]. Inferring positive epistasis {#sec021} ---------------------------- ### Epistasis statistic {#sec022} To infer positive epistasis between mutations at two sites mapped onto the same phylogeny, we employ the method previously described in \[[@pgen.1005404.ref021]\]. Briefly, for each pair of sites (*i*,*j*), we first identify the set *S* ~*ij*~ of all consecutive mutations pairs, i.e. such mutation pairs where a mutation at site *i* is on the line of descent of a mutation at site *j* with no other mutations at either site occurring in between. We then compute the epistasis statistic for this pair which in the simplest case is given by $$E_{\tau}(i,j) = {\sum\limits_{\pi \in S_{ij}}{\text{exp}\left\{ {{- t_{\pi}}/\tau} \right\}}},$$ where the summation is taken over all consecutive mutation pairs, *t* ~π~ is the time (measured in synonymous mutations) between the mutations in the pair π, and τ is the time-scale parameter which we choose to be equal to the average time 〈*t* ~*π*~〉 averaged over all mutations at all site pairs ([Table 1](#pgen.1005404.t001){ref-type="table"}). For a more general expression of the epistasis statistic see \[[@pgen.1005404.ref021]\]. The epistasis statistic for site pair (*i*,*j*) is large when (a) the set of consecutive mutation pairs is large and (b) when the mutations at the trailing site quickly follow the mutations at the leading site. Thus, site pairs with an unusually high epistasis statistic likely evolve under positive epistasis. Nonsynonymous leading and nonsynonymous trailing, synonymous leading and nonsynonymous trailing, and synonymous leading and synonymous trailing pairs of mutations are considered separately. ### Identifying epistatic site pairs and computing the false discovery rate (FDR) {#sec023} In order to identify site pairs with unusually high values of the epistasis statistic, we obtained the null distribution for the epistasis statistic at all site pairs simultaneously by randomly reshuffling mutations at all sites in the foreground gene among all branches of the phylogeny while keeping the mapped background mutations in place. This is more conservative than permuting both background and foreground mutations because this procedure preserves more features of the data. This permutation conserves the number of mutations at each site and on each branch thus controlling for possible biases introduced by differences in variability among sites and by the heterogeneity of mutations on the phylogeny \[[@pgen.1005404.ref021]\]. We carried out 10,000 permutations for each analysis. Using the resulting null distributions for each site pair, we obtained the list of site pairs that were significant at any given nominal *P*-value (observed positives, OP). To estimate the number of false positives (FP) that we expect to find at a given nominal *P*-value, we selected 400 out of 10,000 permutations as fake datasets and calculated the number of significant site pairs in each of these fake datasets at that *P*-value. Thus, we obtained the null distribution of the number of significant pairs for each nominal *P*-value, which allowed us to estimate the expected number of FP (EFP) under the null hypothesis as well as the *P*-value for the number of OP. The FDR is then given by the ratio EFP/OP. To test the robustness of our method with respect to hitchhiking, we carried out the same analysis as described above but restricted to those pairs of sites that had two or more non-virtual leading mutations. The fact that mutations are non-virtual guarantees that they arose as independent events rather than by a single event and subsequent reassortment. In particular, we first found those pairs of sites that exhibited two or more non-virtual leading mutations in the real dataset (real total, RT) as well as in each of 400 fake datasets (fake total, FT). Note that because the number of such site pairs differs from on datasets to another, we could no longer meaningfully compare the absolute number of observed positives (OP) with the expected absolute number of positives (EFP) among such pairs. Instead we obtained the *P*-value for the observed fraction of positives (OP/RT) by comparing it with the distribution of the fraction of positives (FP/FT) in the fake datasets. Testing for functional enrichment among sites involved in inter-gene epistasis {#sec024} ------------------------------------------------------------------------------ Lists of epitopic sites of HA were taken from \[[@pgen.1005404.ref042],[@pgen.1005404.ref043]\] for H3N2 and from \[[@pgen.1005404.ref020]\] for H1N1. Lists of epitopic sites of NA were taken from \[[@pgen.1005404.ref043]--[@pgen.1005404.ref045]\] for H3N2, and from \[[@pgen.1005404.ref046]\] for H1N1. Sites involved in intra-gene epistasis in HA and NA of H3N2 and H1N1 were taken from \[[@pgen.1005404.ref021]\]. Sites that may carry mutations changing the antigenic properties of isolates were taken from \[[@pgen.1005404.ref036],[@pgen.1005404.ref049],[@pgen.1005404.ref050]\] for H3, and from \[[@pgen.1005404.ref051]\] for H1. Glycosylation sites were taken from \[[@pgen.1005404.ref047]\] for H3-HA1, and from \[[@pgen.1005404.ref048]\] for H1-HA1 and H1-NA. Sites in H1, N1, H3 and N2 under uniform positive selection were inferred by HyPhy IFEL method \[[@pgen.1005404.ref082]\], and under lineage-specific selection, by HyPhy MEME method \[[@pgen.1005404.ref083]\] (*P*-value \< 0.05) using Datamonkey web service \[[@pgen.1005404.ref084],[@pgen.1005404.ref085]\] (<http://www.datamonkey.org>). To test whether a particular set of sites *S* is enriched or depleted among the top-ranking epistatic leading sites compared to the random expectation, we used the following procedure. First, we defined for each site its leading *P*-value as the lowest nominal *P*-value among all site pairs with this site as leading. We then defined the leading test statistic as the difference between the medians of site's leading *P*-value for sites in *S* and for sites not in *S*. The null distribution of this test statistic was determined from the 400 fake datasets generated from the no-epistasis null hypothesis as explained above. An analogous procedure was used to find enrichment among the top-ranking epistatic trailing sites. For each pair of genes, we considered "leading-trailing" pairs of mutations to be provisionally "reassortment-induced" if the leading mutation was virtual, and the trailing mutation occurred in the same reassortment set. To test whether the reassortment-induced pairs are overrepresented, we analyzed the fraction of such mutations among all pairs of mutations at epistatic site pairs in the same reassortment set. The expected fraction was obtained from our 'fake' datasets (see above). We tested the null hypothesis that the observed number of reassortment-induced pairs of mutations was sampled from a binomial distribution with the probability of success equal to the expected fraction of such mutation pairs. Supporting Information {#sec025} ====================== ###### Building constrained phylogenies. (DOC) ###### Click here for additional data file. ###### Distribution of locations of consecutive mutation pairs relative to reassortment events. (XLS) ###### Click here for additional data file. ###### Properties of epistatic sites in N1 and N2 neuraminidases. (XLS) ###### Click here for additional data file. ###### Putatively epistatic site pairs at liberal *P*-value thresholds. "Phylogenetic group" refers to a group of site pairs where the leading and the trailing mutations occurred on the same sets of tree branches. Site pairs formed by more than one leading mutation are in bold. The last 12 columns identify the location of consecutive mutations relative to reassortment events: the first letter denotes whether the leading and the trailing mutations are located on the same (S) or different (D) reassortment subtrees; the second and the third letters denote the branch types on which the leading and the trailing mutations are located: R = reassortment-carrying branch; V = virtual branch; I = any other internal branch. Sheet 1: (N2,H3). Sheet 2: (H3,N2). Sheet 3: (N1,H1). Sheet 4: (H1,N1). (XLS) ###### Click here for additional data file. ###### The number of observed (orange line) and expected (black line) epistatic nsyn-nsyn pairs significant at each nominal *P*-value threshold in different gene pairs. In each gene-pair annotation, the first gene refers to the background and the second gene refers to the foreground. Small (large) circles denote cases when the observed number exceeds the expectation according to the permutation test at significance level 0.05 (0.01). Arrows show the "conservative" *P-*value thresholds (see [Results](#sec002){ref-type="sec"} and [Materials and Methods](#sec015){ref-type="sec"} for details). In the (N1,H1) analysis we found no significant pairs at nominal *P*-value thresholds below 0.001. (PDF) ###### Click here for additional data file. ###### The distribution of average times (in years) between putatively epistatic leading and trailing nonsynonymous mutations in different gene pairs. (PDF) ###### Click here for additional data file. ###### The number of observed (blue line) and expected (black line) epistatic syn-nsyn pairs at each nominal *P*-value threshold in different gene pairs. Notations as in [S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}. (PDF) ###### Click here for additional data file. ###### The number of observed (blue line) and expected (black line) epistatic syn-syn pairs at each nominal *P*-value threshold in different gene pairs. Notations as in [S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}. (PDF) ###### Click here for additional data file. ###### The fraction of observed (orange line) and expected (black line) epistatic nsyn-nsyn pairs among site pairs with at least two distinct leading mutations, significant at each nominal *P*-value threshold in different gene pairs. Notations as in [S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}. (PDF) ###### Click here for additional data file. ###### The expected number of true positive epistatic pairs (which is given by OP--EFP, see [Materials and Methods](#sec015){ref-type="sec"}) in the inter-gene (orange line) and intra-gene (blue line) epistasis analysis, at each FDR. Notations as in [S1 Fig](#pgen.1005404.s005){ref-type="supplementary-material"}. (PDF) ###### Click here for additional data file. ###### Phylogenetic tree in FigTree \[[@pgen.1005404.ref086]\] format with all mutations at sites N1-78, N1-275, and H1-153 highlighted. (TRE) ###### Click here for additional data file. ###### Phylogenetic tree in FigTree \[[@pgen.1005404.ref086]\] format with all mutations at sites H1-222, N1-274, N1-430, and N1-275 highlighted. (TRE) ###### Click here for additional data file. ###### Phylogenetic tree in FigTree \[[@pgen.1005404.ref086]\] format with all mutations at sites N2-126, H3-63 and H3-81 highlighted. (TRE) ###### Click here for additional data file. We thank Vsevolod Makeev, Alexey Kondrashov, and Mikhail Roytberg for valuable discussions. [^1]: The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: ADN SK JBP GAB. Performed the experiments: ADN SK. Analyzed the data: ADN SK. Contributed reagents/materials/analysis tools: ADN SK. Wrote the paper: ADN SK JBP GAB.
{ "pile_set_name": "PubMed Central" }
The Pistons defeated the Trail Blazers by a final score of 93-73. Svi Mykhailiuk led the Pistons with a game-high 18 points (6-13 FG, 4-10 3pt FG), along with 4 assists, while Bruce Brown contributed 17 points (6-14 FG), 10 assists and 3 blocks in the vic
{ "pile_set_name": "Pile-CC" }
Dragoševac Dragoševac is a village in the municipality of Jagodina, Serbia. According to the 2002 census, the village has a population of 501 people. References Category:Populated places in Pomoravlje District
{ "pile_set_name": "Wikipedia (en)" }
The demand for ever higher performance in computer graphics has lead to the continued development of more and more powerful graphics processing subsystems and graphics processing units (GPUs). However, it may be desirable to achieve performance increases by modifying and/or otherwise utilizing existing graphics subsystems and GPUs. For example, it may be more cost effective to obtain performance increases by utilizing existing equipment, instead of developing new equipment. As another example, development time associated with obtaining performance increases by utilizing existing equipment may be significantly less, as compared to designing and building new equipment. Moreover, techniques for increasing performance utilizing existing equipment may be applied to newer, more powerful graphics equipment when it become available, to achieve further increases in performance. On approach for obtaining performance gains by modifying or otherwise utilizing existing graphics equipment relates to the use of multiple GPUs to distribute the processing of images that would otherwise be processed using a single GPU. While the use of multiple GPUs to distribute processing load and thereby increase overall performance is a theoretically appealing approach, a wide variety of challenges must be overcome in order to effectively implement such a system. To better illustrate the context of the present invention, description of a typical computer system employing a graphics processing subsystem and a GPU is provided below. FIG. 1 is a block diagram of a computer system 100 that includes a central processing unit (CPU) 102 and a system memory 104 communicating via a bus 106. User input is received from one or more user input devices 108 (e.g., keyboard, mouse) coupled to bus 106. Visual output is provided on a pixel based display device 110 (e.g., a conventional CRT or LCD based monitor) operating under control of a graphics processing subsystem 112 coupled to system bus 106. A system disk 107 and other components, such as one or more removable storage devices 109 (e.g., floppy disk drive, compact disk (CD) drive, and/or DVD drive), may also be coupled to system bus 106. System bus 106 may be implemented using one or more of various bus protocols including PCI (Peripheral Component Interconnect), AGP (Advanced Graphics Processing) and/or PCI-Express (PCI-E); appropriate “bridge” chips such as a north bridge and south bridge (not shown) may be provided to interconnect various components and/or buses. Graphics processing subsystem 112 includes a graphics processing unit (GPU) 114 and a graphics memory 116, which may be implemented, e.g., using one or more integrated circuit devices such as programmable processors, application specific integrated circuits (ASICs), and memory devices. GPU 114 includes a rendering module 120, a memory interface module 122, and a scanout module 124. Rendering module 120 may be configured to perform various tasks related to generating pixel data from graphics data supplied via system bus 106 (e.g., implementing various 2-D and or 3-D rendering algorithms), interacting with graphics memory 116 to store and update pixel data, and the like. Rendering module 120 is advantageously configured to generate pixel data from 2-D or 3-D scene data provided by various programs executing on CPU 102. Operation of rendering module 120 is described further below. Memory interface module 122, which communicates with rendering module 120 and scanout control logic 124, manages interactions with graphics memory 116. Memory interface module 122 may also include pathways for writing pixel data received from system bus 106 to graphics memory 116 without processing by rendering module 120. The particular configuration of memory interface module 122 may be varied as desired, and a detailed description is omitted as not being critical to understanding the present invention. Graphics memory 116, which may be implemented using one or more integrated circuit memory devices of generally conventional design, may contain various physical or logical subdivisions, such as a pixel buffer 126 and a command buffer 128. Pixel buffer 126 stores pixel data for an image (or for a part of an image) that is read and processed by scanout module 124 and transmitted to display device 110 for display. This pixel data may be generated, e.g., from 2-D or 3-D scene data provided to rendering module 120 of GPU 114 via system bus 106 or generated by various processes executing on CPU 102 and provided to pixel buffer 126 via system bus 106. In some implementations, pixel buffer 126 can be double buffered so that while data for a first image is being read for display from a “front” buffer, data for a second image can be written to a “back” buffer without affecting the currently displayed image. Command buffer 128 is used to queue commands received via system bus 106 for execution by rendering module 120 and/or scanout module 124, as described below. Other portions of graphics memory 116 may be used to store data required by GPU 114 (such as texture data, color lookup tables, etc.), executable program code for GPU 114 and so on. Scanout module 124, which may be integrated in a single chip with GPU 114 or implemented in a separate chip, reads pixel color data from pixel buffer 118 and transfers the data to display device 110 to be displayed. In one implementation, scanout module 124 operates isochronously, scanning out frames of pixel data at a prescribed refresh rate (e.g., 80 Hz) regardless of any other activity that may be occurring in GPU 114 or elsewhere in system 100. Thus, the same pixel data corresponding to a particular image may be repeatedly scanned out at the prescribed refresh rate. The refresh rate can be a user selectable parameter, and the scanout order may be varied as appropriate to the display format (e.g., interlaced or progressive scan). Scanout module 124 may also perform other operations, such as adjusting color values for particular display hardware and/or generating composite screen images by combining the pixel data from pixel buffer 126 with data for a video or cursor overlay image or the like, which may be obtained, e.g., from graphics memory 116, system memory 104, or another data source (not shown). Operation of scanout module 124 is described further below. During operation of system 100, CPU 102 executes various programs that are (temporarily) resident in system memory 104. These programs may include one or more operating system (OS) programs 132, one or more application programs 134, and one or more driver programs 136 for graphics processing subsystem 112. It is to be understood that, although these programs are shown as residing in system memory 104, the invention is not limited to any particular mechanism for supplying program instructions for execution by CPU 102. For instance, at any given time some or all of the program instructions for any of these programs may be present within CPU 102 (e.g., in an on-chip instruction cache and/or various buffers and registers), in a page file or memory mapped file on system disk 128, and/or in other storage space. Operating system programs 132 and/or application programs 134 may be of conventional design. An application program 134 may be, for instance, a video game program that generates graphics data and invokes appropriate rendering functions of GPU 114 (e.g., rendering module 120) to transform the graphics data to pixel data. Another application program 134 may generate pixel data and provide the pixel data to graphics processing subsystem 112 for display. It is to be understood that any number of application programs that generate pixel and/or graphics data may be executing concurrently on CPU 102. Operating system programs 132 (e.g., the Graphical Device Interface (GDI) component of the Microsoft Windows operating system) may also generate pixel and/or graphics data to be processed by graphics card 112. Driver program 136 enables communication with graphics processing subsystem 112, including both rendering module 120 and scanout module 124. Driver program 136 advantageously implements one or more standard application program interfaces (APIs), such as Open GL, Microsoft DirectX, or D3D for communication with graphics processing subsystem 112; any number or combination of APIs may be supported, and in some implementations, separate driver programs 136 are provided to implement different APIs. By invoking appropriate API function calls, operating system programs 132 and/or application programs 134 are able to instruct driver program 136 to transfer geometry data or pixel data to graphics card 112 via system bus 106, to control operations of rendering module 120, to modify state parameters for scanout module 124 and so on. The specific commands and/or data transmitted to graphics card 112 by driver program 136 in response to an API function call may vary depending on the implementation of GPU 114, and driver program 136 may also transmit commands and/or data implementing additional functionality (e.g., special visual effects) not controlled by operating system programs 132 or application programs 134. In some implementations, command buffer 128 queues the commands received via system bus 106 for execution by GPU 114. More specifically, driver program 136 may write one or more command streams to command buffer 128. A command stream may include rendering commands, data, and/or state commands, directed to rendering module 120 and/or scanout module 124. In some implementations, command buffer 128 may include logically or physically separate sections for commands directed to rendering module 120 and commands directed to display pipeline 124; in other implementations, the commands may be intermixed in command buffer 128 and directed to the appropriate pipeline by suitable control circuitry within GPU 114. Command buffer 128 (or each section thereof) is advantageously implemented as a first in, first out buffer (FIFO) that is written by CPU 102 and read by GPU 114. Reading and writing can occur asynchronously. In one implementation, CPU 102 periodically writes new commands and data to command buffer 128 at a location determined by a “put” pointer, which CPU 102 increments after each write. Asynchronously, GPU 114 may continuously read and process commands and data sets previously stored in command buffer 128. GPU 114 maintains a “get” pointer to identify the read location in command buffer 128, and the get pointer is incremented after each read. Provided that CPU 102 stays sufficiently far ahead of GPU 114, GPU 114 is able to render images without incurring idle time waiting for CPU 102. In some implementations, depending on the size of the command buffer and the complexity of a scene, CPU 102 may write commands and data sets for frames several frames ahead of a frame being rendered by GPU 114. Command buffer 128 may be of fixed size (e.g., 5 megabytes) and may be written and read in a wraparound fashion (e.g., after writing to the last location, CPU 102 may reset the “put” pointer to the first location). In some implementations, execution of rendering commands by rendering module 120 and operation of scanout module 124 need not occur sequentially. For example, where pixel buffer 126 is double buffered as mentioned previously, rendering module 120 can freely overwrite the back buffer while scanout module 124 reads from the front buffer. Thus, rendering module 120 may read and process commands as they are received. Flipping of the back and front buffers can be synchronized with the end of a scanout frame as is known in the art. For example, when rendering module 120 has completed a new image in the back buffer, operation of rendering module 120 may be paused until the end of scanout for the current frame, at which point the buffers may be flipped. Various techniques for implementing such synchronization features are known in the art, and a detailed description is omitted as not being critical to understanding the present invention. The system described above is illustrative, and variations and modifications are possible. A GPU may be implemented using any suitable technologies, e.g., as one or more integrated circuit devices. The GPU may be mounted on an expansion card, mounted directly on a system motherboard, or integrated into a system chipset component (e.g., into the north bridge chip of one commonly used PC system architecture). The graphics processing subsystem may include any amount of dedicated graphics memory (some implementations may have no dedicated graphics memory) and may use system memory and dedicated graphics memory in any combination. In particular, the pixel buffer may be implemented in dedicated graphics memory or system memory as desired. The scanout circuitry may be integrated with a GPU or provided on a separate chip and may be implemented, e.g., using one or more ASICs, programmable processor elements, other integrated circuit technologies, or any combination thereof. In addition, GPUs embodying the present invention may be incorporated into a variety of devices, including general purpose computer systems, video game consoles and other special purpose computer systems, DVD players, handheld devices such as mobile phones or personal digital assistants, and so on. While a modern GPU such as the one described above may efficiently process images with remarkable speed, there continues to be a demand for ever higher graphics performance. By using multiple GPUs to distribute processing load, overall performance may be significantly improved. However, implementation of a system employing multiple GPUs relates to significant challenges. Of particular concern is the coordination of the operations performed by various GPUs. The present invention provides innovative techniques related to the timing of GPU operations relevant in a multiple GPU system.
{ "pile_set_name": "USPTO Backgrounds" }
Q: List.split() not cross platform? Recently I had some trouble writing code in Ubuntu and make it work in Windows. Code on both platforms: Output Ubuntu (that's what I want): Output Windows: As you can see, split on windows adds a '/' instead of splitting the list by '/'. Is the list.split() not cross platform? A: Use os.sep Ex: import os importpath = __file__ print(importpath.split(os.sep))
{ "pile_set_name": "StackExchange" }
Cockrell Hill Transfer Location Cockrell Hill Transfer Location is a bus-only station located along Jefferson Boulevard, west of Cockrell Hill Rd. in Dallas, Texas (USA). Unlike many transit centers, Cockrell Hill Transfer Location does not provide parking, however it does provide indoor seating in an air conditioned facility available during weekday rush hours. Connecting bus routes The facility is served by DART Routes , , , , and . References Category:Dallas Area Rapid Transit Category:Bus stations in Dallas
{ "pile_set_name": "Wikipedia (en)" }
Fulfilling expectations, Paris-based Cite Films has closed key early major territories at this year’s Cannes Film Market on Un Certain Regard player “The Desert Bride,” one of the highest-profile Latin American movies on the Riviera. Buying distributors include some of the strongest arthouse players in their territories, such as Spain’s Golem, Brazil’s Imovision and Cineart for Benelux. Switzerland’s Filmcoopi, Greece’s Strada, and China’s Time In Portrait Ent. have also stepped up to the plate for the feature debut of Argentine directorial duo Cecilia Atán and Valeria Pivato, a romantic road movie which is “the feel-good story of a woman’s metamorphosis, the transformation of her life and vision of herself, made delicately step-by-step, about someone who was a bird in a cage and finds her freedom and rediscovers life,” Cité Films founder Raphael Berdugo said at Cannes. “The Desert Bride” has received “serious interest” from the U.S. and Turkey , Scandinavia, the U.K. and Italy, he added. Deals roll off a distribution deal for France with Memento Films, one of France’s most prestigious upscale distributors, announced in the week before Cannes, plus the triumph of “The Desert Bride” at France’s Toulouse Cinelatino Fest in March, where the film walked off with the two big prizes at its 31st Films in Progress. The film suggests it’s never too late to discover a true identity. That may certainly appeal to the ever maturer theatrical audiences for movies in some countries. In France, maturer 50+ spectators generated 37.9% of the total box office in 2015, vs. 30.4% for under-25s, according to a CNC study. The gap has risen every year since 2012. Atán and Valeria Pivato’s first feature is produced from Argentina by Atán, Pivato, Eva Lauria, Raul Aragon and El Perro en La Luna. Oscar-winning Haddock Films (“The Secret in Their Eyes”) co-produces. Ceibita Films co-produces from Chile as Argentina-Chile co-productions, once a rarity, lift off thanks to new bilateral state funding. Paris-based Lucero Garzon serves as an associate producer.
{ "pile_set_name": "Pile-CC" }
Android development has its own Swift - hasseg http://blog.futurice.com/android-development-has-its-own-swift ====== jo_ I feel like this overlooks one of the more fundamental problems to Android development. It's not an issue with Java, it's an issue of Android being a cathedral of complexity. There are four dozen ways to accomplish the same tasks, each of which utilizes a different (but ultimately incompatible) piece of the API. You can build your Activity and embed your Fragment in it which houses a ListView to display your--- wait no maybe I should override ListView. No, people say that's a bad idea. Okay I'll override this object which ListView displays. Okay that kinda' works well enough. I'll figure out how to style that later. Okay now I need this thing to go to this other activity when cli-- maybe I should just replace the Fragment, since we're kinda' using the same data. No wait. I'll change the activity. Okay it looks like there's no function to do that. I'll go back to changing the Fragment to something else. Okay, that's giving me an exception. Lemme find where I can change the Activity... Oh, I have to do it elsewhere. Well I can hack my way around that. It doesn't end. "Button is actually a special type of view with extra properties." Great, so everything is a... You know what, I don't care. I feel like I did in the mid 2000's with game development: there are a thousand libraries which each are so complex that it's impossible to get good work out of them. Instead, I always ended up falling back to the simplest home-rolled solution. Except in the case of Android, there's really nothing more fundamental. I can (and do) use PhoneGap because it makes my life _significantly_ easier in many respects, but I think Android really needs to be restructured on a more fundamental level. ~~~ kllrnohj No, if you're reaching for PhoneGap it's because you already know HTML/CSS/JS and just don't want to learn Android's UI. Android's building blocks are simpler and more predictable than HTML/CSS is, so clearly complexity is very much not the issue you are having. It's just lack of knowledge and a lack of motivation to learn it. Which is fine, just not at all what you are claiming. Android's pieces do force you in to a significant amount of upfront complexity which makes rapid prototyping hard, but that complexity pays off a hundred times over when you start fleshing out the application into a real project. It's very critical infrastructure as the app complexity increases. ~~~ jo_ You're probably right. I'm not convinced you're right, but I'll operate on the assumption you are and offer a feeble defense with anecdotal (and experiential) evidence to explain why I would rather use Android UI but consistently turn to PhoneGap. I knew Java first, then picked up HTML/CSS/JS on my own. I'm cozy enough with Swing and I'm getting there with JavaFX. I would rather develop in Java with Swing or even JavaFX. I reach for PhoneGap because I can develop my application 'live'. Make code changes, switch windows, changes are live. I can pull up the UI panel and make adjustments to styles to see what looks good. I can test the entire application and debug it before I push it to my device. If something fails to load, I can see why without waiting for an emulator to spin up and without pushing to the device. Plus, if the application crashes in my browser, I can pull up the debug console and step through it. I'm sure all these things are possible with ADB, too. There are lots of little things which irritate me with native Android development. I'm still releasing apps and every so often I try to do a native one. Whenever I do, though, I always find myself stuck on something that seems infuriatingly simple or clear -- something that 'Just Shouldn't Happen," and I look over at PhoneGap and I know that, despite JS being kinda' shitty, and despite the lack of consistency in HTML5/CSS, it still beckons for silly reasons like, "Small annoyances are more soluble! You don't have to rebuild and reupload to fix a null-pointer error! You can use the REPL to play with objects in memory!" and so on. Maybe I am reluctant to learn the nuance of Android UI on a subconscious level. Maybe I'm reinforcing my own beliefs when I sit down with an Android UI book or go through the UI tutorials online. I've just never felt the workflow was very intuitive, and the small (though frequent) irritations are enough to drive me back to something which is worse architecturally and more time consuming in the long run, but doesn't have the little things that make it unpleasant to work. CAR ANALOGY! I have two routes to work: one of them is short, but goes directly through the city and has a crazy merge that I need to do to get there. Some days I take this route because "it would be totally great if I'd just get familiar with it," and I start out fine. Except for the insane merge which is backed up for a few blocks. I'm driving fine, and I feel like now that it's over I'm home free. Oh. This street has construction. Sudden stops. My head is starting to hurt. Nearly half way there. Okay, I don't see a way around this route. I have to backtrack because I made a wrong turn early on. More construction. Traffic lights that aren't working right (or are, but I'm mixing them up with the ones facing perpendicular traffic). Finally at work. I'm irritable and still have a whole day ahead of me. The other route is really long. I get on the onramp and it's slow but I'm always moving. Quick scuttle and I'm free to drive. The roads are unfinished and there's an omnipresent farty smell, but I'm moving at a comfortable pace and I'm pretty relaxed. Oh, the bridge my route takes is out. Well, I'll travel down the way a bit. No problem, though it's going to take longer. Swoop around and I arrive at my destination. On the way there I also picked up a Strawman at a barn to use in my analogy. ~~~ kllrnohj Well, a lot of that gets back to "Android is hard to do rapid prototyping in". I would looove something faster to iterate with personally, but I can also understand how it could be detrimental in the long run. It's too easy to take prototype code and ship it, instead of fixing up the underlying architecture to play nice with all the various lifecycle and different device configuration stuffs. Fragments are a pain to deal with in the early stages, but they force you to modularize your app in such a way that makes long term maintainince and UI changes easier. You can now see changes "live" in Android studio with the preview pane, which is getting pretty good these days. If you haven't played with that I'd suggest giving it a shot. The emulator is a disaster, I only ever develop on real devices. Pushing isn't that slow, but it's definitely not as nice as just hitting refresh in a browser. ------ eddieroger Article is down for me. Here's a mirror (minus graphics and CSS): [http://webcache.googleusercontent.com/search?q=cache:http://...](http://webcache.googleusercontent.com/search?q=cache:http://blog.futurice.com/android- development-has-its-own-swift) The article felt like it was trying to rationalize something, like Android needs a Swift. I'm not sure that's the case. The main point of the argument by my reading was "less lines of code are possible," but that's not what Swift is trying to bring the to the table (although no header files are nice). Swift's biggest advantage is that since Apple has redefined the rules of the language and don't need to stay C compliant, they can change the optimizer and enforce rules differently. Less lines of code are a side effect. ~~~ DCKing > The article felt like it was trying to rationalize something, like Android > needs a Swift. Android probably doesn't need a Swift as much as iOSX did, but there's still a lot to be gained from having a less verbose programming language (and corresponding platform API). Objective C, despite its older features and unfamiliar syntax, was more expressive already than Java was. With Swift, they removed the legacy and made the syntax familiar. But I don't think this is the answer. If you debug Scala on Android at least you don't have to make a mental mapping of what the corresponding Java translation of your function would look like. A true new language with good features and 'light' syntax would be great. Google already has such a language: Dart. But Google has already said that at IO 2014 that Java is the language for Android and it will stay that way. ~~~ lobo42 > But I don't think this is the answer. If you debug Scala on Android at least > you don't have to make a mental mapping of what > the corresponding Java > translation of your function would look like. Again, this is also not the case with Xtend. See this screencast : [https://vimeo.com/38425995](https://vimeo.com/38425995) ~~~ DCKing Ah, my apologies. The CoffeeScript metaphor is not completely valid. ------ izacus The question about those code-generating languages in connection with Android is always: How HARD is it to debug? Because most of them fail badly as soon as you need to do any complicated breakpoint debugging (non-matching line numbers, broken local variable inspection, useless and misleading stack traces) and that loses more time than the language change will ever gain. After all, most of the time we're developing for Android, we're dealing with Android API's and another language does not address warts connected with those. Also powerful utilities like IDEA/AS provide alot of assistance with writing / folding / managing Java 6 issues without debugging issues. The other important questions: how big of a space hit is the standard library? E.g. Scala on Android will generate/include alot of methods which means you hit the 64k method limit of DEX format pretty quickly. That means you have to use Proguard for each build (even development) and Proguard pass can easily run for several minutes even on a 16G SSD equipped machine - killing development speed. ~~~ frowaway001 > That means you have to use Proguard for each build (even development) and > Proguard pass can easily run for several minutes even on a 16G SSD equipped > machine - killing development speed. No, not really. You can just install the standard library on your Android device for development, and only use ProGuard on the final release. ~~~ izacus Not when you reach 64k methods together with libraries for a debug build. Of course, unless you want to go through the joy that is loading another .dex file :) ~~~ oehme The library you would use for Android (xbase.lib.slim), has about 2.5k methods. ------ newgame Another, imho, more appealing Swift on Android is Kotlin [http://kotlinlang.org/](http://kotlinlang.org/) It shares many features with Xtend but offers more. It has the opposite "problem" wrt IDE support though: Great IDEA support but no Eclipse support. ~~~ staltz Does it compile to Java source code? ~~~ theGimp According to the FAQ page, it compiles to Java bytecode. _Is it Java Compatible? Yes. The compiler emits Java byte-code._ [http://kotlin-web-site.jetbrains.org/docs/reference/faq.html](http://kotlin- web-site.jetbrains.org/docs/reference/faq.html) ~~~ higherpurpose Does that violate the new ruling in favor of Oracle lately? If not, what if Oracle pursues that in the future, too? If I were Google I'd be like on needles about continuing to support Java on Android, and I'd start looking for a complete replacement (which will take years to come to fruition anyway, so all the more reason to start now). ------ rdtsc There is the scripting layer so you can use kivy and Python. But I am really hoping Dart would get there, it is just a really nice language. ------ curtis17 Imo Android needs a Swift because: 1\. Java is too verbose/tedious. Developers are looking for something richer/more expressive. 2\. Oracle. Java is non- open. Ultimately, the language that will become the Swift on Android is the language that makes it a core goal. This alt-Java could even be blessed by Google. Google could eventually cut Java out of the picture: Swift4Java -> Dalvik/ART. Xtend, Kotlin and Scala are possibilities. Kotlin has the Jetbrains Android Studio relationship going for it. Also compiles down to JS so could target Chrome/ChromeOS as well. Not as heavy as Scala - less of a learning curve. Xtend is good, and compiling to Java source could be an advantage. But Google do seem to be leaning towards Jetbrains rather than Eclipse. ------ programminggeek If I were to pick any language to do Android dev that wasn't Java, it would be Kotlin. It's a great language with a great IDE. I haven't done Android projects with it, but if I were hell bent on not using Java, that'd be my choice. ------ hrjet The nice thing about Xtend is that it has a light run-time library. I wish Scala had a core-library that could be used in Android and such other constrained projects. Perhaps a library without specialisation and/or without collections could be made. About Xtend, I think it is not production ready yet. Having tried it in some POCs I hit several snags, such as incomplete support for inner classes and anonymous classes. (Some support has been added recently, though not sure if it handles all cases fine). ~~~ frowaway001 Scala modularized its standard library recently, so it should be smaller by default already. Remember that deploying on Android involves a ProGuard step, so the size of the standard library doesn't matter that much anyway. ~~~ hrjet The modularization reduced the API surface, but in terms of size of binary, didn't have much effect (about 20% size reduction). ProGuard is useful during deployment but cumbersome during development cycle. ~~~ frowaway001 As already mentioned, it's not necessary to use ProGuard during the development cycle. ------ donniezazen As someone new to both programming and Android development, I think the biggest help is not some easy language but the questions and problems that have been asked on sites like StackOverflow. You can replace the language but how do you replace that whole stack of help articles written for Java for Android. ------ lobo42 The second part of this InfoQ article features a getting started on Xtend and Android: [http://www.infoq.com/articles/unusual-ways-to-create-a- mobil...](http://www.infoq.com/articles/unusual-ways-to-create-a-mobile-app) ------ ethagnawl I've always been intrigued by the possibility of using Clojure or JRuby to build Android applications. There are toolkits (Lein Droid, Ruboto, etc.) and tutorials for both, but the edges are still _very_ rough. ------ mncolinlee My question is why Xtrend instead of Kotlin or Scala? Both languages have good reasons to recommend them and both already support Android today. ~~~ rsynnott Mentioned in the article; many JVM languages have substantial performance issues under Dalvik. Scala certainly does; not sure about Kotlin. ~~~ eeperson Is this actually true for Scala? I was under the impression that statically typed languages run basically the same as Java on Android. Granted it has some other issues (such as running in to limits on the number of classes). ------ k__ > It is best understood as “CoffeeScript for Java”, or as “Java 10″. I wish it would look like CoffeeScript ------ artribou Annnnddd... we killed it. ------ cferreyra Seems like the link is broken ------ ytch How about golang? ~~~ izacus What's with this Go obsession in connection with Android? Go's design and the way it works is terribly suited for Android development and currently isn't even capable of plugging into JNI bridging architecture of Dalvik/ART. Not to mention that Go is a language built for static binaries running on a distributed server and the code running with alot of callbacks, external exceptions and user-input looks horrible. ~~~ jamieomatthews This is a proposal that's starting to get some serious traction. [https://docs.google.com/document/d/1y9hStonl9wpj-5VM- xWrSTuE...](https://docs.google.com/document/d/1y9hStonl9wpj-5VM- xWrSTuEJFUAxGOXOhxvAs7GZHE/mobilebasic?pli=1) In theory, Go could absolutely be used for android development ~~~ izacus In theory, anything can be used for Android development. In reality, the cost of JNI bridging, reboxing objects and the fact that Android APIs heavily use Java objects as parameters makes usage of any non-JVM compatible languages horribly ugly, clunky and rather pointless performance and code-quality wise.
{ "pile_set_name": "HackerNews" }