texts
sequence | meta
dict | scores
sequence | avg_score
float64 0
1
| num_sents
int64 1
32.7k
|
---|---|---|---|---|
[
"Effects of Messages Delivered by Mobile Phone on Increasing Compliance With Shoulder Exercises Among Patients With a Frozen Shoulder.",
"\nThe aim of this study was to examine the effects of reminders, encouragement, and educational messages delivered by mobile phone on shoulder exercise compliance and improvements in shoulder function among patients with a frozen shoulder. ",
"A randomized controlled trial design was used. ",
"A convenience sample of patients with a frozen shoulder in an orthopedic outpatient clinic was recruited. ",
"All participants were instructed on how to do shoulder exercises and were provided with a printed pamphlet about shoulder exercises. ",
"Then, the intervention group received reminders, encouragement, and educational messages by mobile phone daily for the next 2 weeks, while the comparison group did not. ",
"The intervention group had higher compliance with shoulder exercises than did the comparison group (t = 2.263, p = .03) and had significant improvements in shoulder forward flexion (F = 12.067, p = .001), external rotation (F = 13.61, p = .001), and internal rotation (F = 5.903, p = .018) compared to those in the comparison group after the 2-week intervention. ",
"The text messages significantly increased patient compliance with shoulder exercises and thus improved patients' shoulder range of motion. ",
"Hospital or clinics can send appropriate messages to patients via text message platforms in order to remind and encourage them to do shoulder exercises."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.000644840591121465,
0.0006325982394628227,
0.000572238874156028,
0.000665852043312043,
0.0005370625876821578,
0.0005506071611307561,
0.0006544789066538215,
0.0006185901584103703,
0.0005546112661249936
] | 0.000603 | 9 |
[
"Monthly Archives: December 2013\n\nFOOTBALL is a numbers game: the comfortable victory over Reading made it three wins on the spin, three clean sheets, nine points from nine, six points off the play-offs… they are great digits to wave goodbye to a traumatic 2013 that has been dominated by a long downward spiral of negative numbers that led to Mogga’s P45.",
"\nBoro now have 36 goals. ",
"Only the top two Derby and Leicester have scored more. ",
"Of course, scoring goals was never the problem. ",
"Even under Tony Mowbray Boro were rattling the goals in: threes, fours, a cluster of 2-2 draws. ",
"The problem was keeping them out and no matter what combination of players were used, goals were seeping through – especially from set-plays deep in the red zone. ",
"Being two goals up wasn’t a guarantee of a point.",
"\nBut the ever open door that was Boro’s Achilles heel has slowly creaked shut under Aitor Karanka.",
"\n\nI’LL BE WITH YOU SOON. ",
"Got tomorrow’s spread to write. ",
"In the meantime, if someone wants to kick off with an appraisal of mighty Boro’s glorious defeat of table-topping Burnley and the impact of former frozen out flanker Emmanuel Ledesma, crack on….",
"\nBut a few brief observations:\n\nOH NO! ",
"Football’s Inevitability Drive is broken!Millwall away was a game that had “Scott McDonald late winner” written all over it. ",
"It was a dead cert daft quid magnet. ",
"So we are all out of pocket but who cares? ",
"Boro won and the ghost of Christmas past was far from scary.",
"\n\nOH NO! ",
"There goes the relegation cliche klaxon!",
"\nJacob Butterfield has uttered the dreaded phrase: “We’re too good to go down.”",
"\nThat will scare the hell out of a lot of battle scarred supporters – including a cocooned few who may not have even been too worried before those dread words were uttered.",
"\nIt is part of the lexicon of the lower end of the league.",
"\nEveryone knows that once you start putting up that particular linguistic defence you are already deep in the sticky stuff. ",
"Supporters of all clubs know that phrase is one of the key indicators that a basement battle is OFFICIALLY on.",
"\n\nDID you hear a loud metallic thud rumbling from the Riverside at 4.40pm on Saturday? ",
"That was the sound of the peseta dropping for Aitor Karanka.",
"\nThe defence – whichever permutation of mismatched miscreants is wearing the shirts – is just not good enough. ",
"As a unit they are deeply, fundamentally flawed.",
"\nThey lack organsation, cohesion, focus, concentration, understanding, nous and leadership. ",
"And, no matter what any given week’s short straw media muggins says, they clearly lack the ability to “learn from their mistakes.”",
"\nIt appears to be a mental weakness ingrained in the DNA of this squad. ",
"How else can you explain their repeated vulnerability to the most predictable of set play situations?",
"\n\nAS FOOTBALL united to salute the memory of Nelson Mandela, a champion of racial unity and mutual respect, Boro fans were dragged reluctantly into a divisive race row after an unsavoury Quran ripping incident by a small group in the away end at Birmingham.",
"\nThe club have reiterated their own strong line on racism but more importantly so have Boro supporters who were quick to condemn the handful of idiots. ",
"Here by popular demand (no, really) is the Kick It Out remix of this week’s Big Picture column.",
"\n\nWELL that was a sickener. ",
"Birmingham got a late, late leveller to mug Boro of what would have been a hard earned – and rare – away win and kick long suffering supporters squarely in the kisser. ",
"You would think we would have evolved six inch thick emotional armour against the stoppage time sucker punch but it still stings like hell.",
"\nLeaking deep into added time to a twice taken corner was a real blow. ",
"Especially after also conceding a needless penalty. ",
"All we needed was a harsh sending off to complete the shambolic defending full set.. Battling Boro had played with a real shape, spirit and solidity and were within touching distance of a result that could have been a turning point of the season before the familiar fatal flaw showed its face. ",
"It hurts. ",
"But it isn’t a great surprise.",
"\n\nA LAST gasp sucker punch knocked the stuffing out of Boro at Pride Park.",
"\nThe ten men had worked their nuts off to contain the Championship’s form side: “Steve McClaren’s Derby.” ",
"That Boro’s former boss engineered a painful 2-1 defeat for Boro with the goals coming in the Red Zones (45+1 and 90) was heavy with irony."
] | {
"pile_set_name": "Pile-CC"
} | [
0.002163898665457964,
0.0015199664048850536,
0.000611634342931211,
0.0009462531306780875,
0.0015652485890313983,
0.002046980196610093,
0.0008513372158631682,
0.009133371524512768,
0.015783265233039856,
0.0010972400195896626,
0.001521339057944715,
0.0006555498111993074,
0.004600857384502888,
0.029327472671866417,
0.010569451376795769,
0.0013405936770141125,
0.004537046886980534,
0.0822463110089302,
0.004105081781744957,
0.08236496895551682,
0.0007717093685641885,
0.0007629322935827076,
0.0010339992586523294,
0.0006469212239608169,
0.0011820917716249824,
0.004228536505252123,
0.0006409232155419886,
0.007833084091544151,
0.003268158994615078,
0.029637059196829796,
0.0006223464733920991,
0.0009961449541151524,
0.6415214538574219,
0.0007003970677033067,
0.030043745413422585,
0.11175224184989929,
0.31640109419822693,
0.05039823800325394,
0.0014084719587117434,
0.001277075381949544,
0.07961808890104294,
0.0007471278659068048,
0.19183747470378876,
0.04854307696223259,
0.000936423777602613
] | 0.03964 | 45 |
[
"42-letni nauczyciel z Jastrzębia-Zdroju twierdzi, że jest w związku z 17-letnią uczennicą. - ",
"To jest po prostu miłość - mówi \"Dziennikowi Zachodniemu\", któremu udało się porozmawiać z nauczycielem. - ",
"To jest prawda, że jestem w związku z dziewczyną, którą uczyłem. ",
"To jest nieetyczne, ale nie jest niezgodne z prawem - przekonuje.",
"\n\nREKLAMA\n\nMężczyzna miał poznać nastolatkę w hufcu, do którego należał od lat. ",
"Dziewczyna była harcerką. ",
"Od tamtego czasu regularnie się spotykali. ",
"Mężczyzna twierdzi, że tworzy z 17-latką związek, zostawił rodzinę, zamierza się rozwieść. ",
"42-latek przekonuje też, że zamierza się zwolnić z pracy w szkole. ",
"Podobno zaniósł do dyrektorki wypowiedzenie umowy o pracę za porozumieniem stron.",
"\n\nJest zawiadomienie do prokuratury\n\nNa razie nauczyciel został zawieszony w obowiązkach. - ",
"Złożyłam w tej w sprawie wniosek do komisji dyscyplinarnej o wszczęcie postępowania wyjaśniającego oraz zawiadomiłam prokuraturę - mówi dyrektorka szkoły w Jastrzębiu.",
"\n\nJak tłumaczy prokuratura z zawiadomienia wynika, iż jeden z nauczycieli miał obcować płciowo z jedną z uczennic powyżej lat 15, ale poniżej 18. - ",
"Śledztwo jest rozpatrywane w kierunku artykułu 199 paragrafu 3 Kodeksu Karnego, który dotyczy seksualnego nadużycia stosunku zależności – wyjaśnia prokurator.",
"\n\nWiozła uczniów do szkoły, gdy autobus zaczął płonąć. ",
"Uratowała 20 dzieci"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.011699237860739231,
0.04622741788625717,
0.10246742516756058,
0.07517296820878983,
0.2668536603450775,
0.000983483507297933,
0.10159516334533691,
0.014848582446575165,
0.014837885275483131,
0.21830624341964722,
0.04316648095846176,
0.053895436227321625,
0.02600106969475746,
0.13329847157001495,
0.004522011149674654,
0.015744104981422424
] | 0.070601 | 16 |
[
"//---------------------------------------------------------------------------\n#pragma once\n\n#include \"xrEngine/WaveForm.h\"\n#include \"gametype_chooser.h\"\n#include \"xrCommon/xr_string.h\"\n#include \"xrCommon/xr_vector.h\"\n#include \"xrCore/_rect.h\"\n#include \"xrCore/xr_trims.h\"\n#include \"xrCore/xr_shortcut.h\"\n#include \"xrCore/xr_token.h\"\n//#include \"xrCore/xrCore.h\"\n\n#ifdef __BORLANDC__\n#include \"ElTree.hpp\"\n#endif\n\n// fwd. ",
"decl.",
"\nusing RStringVec = xr_vector<shared_str>;\nstruct xr_rtoken;\n\n#pragma pack(push, 1)\n\n//---------------------------------------------------------------------------\nenum EPropType\n{\n PROP_UNDEF = -1,\n PROP_CAPTION = 0x1000,\n PROP_SHORTCUT,\n PROP_BUTTON,\n PROP_CHOOSE,\n PROP_NUMERIC, // {u8,u16,u32,s8,s16,s32,f32}\n PROP_BOOLEAN,\n PROP_FLAG,\n PROP_VECTOR,\n PROP_TOKEN,\n PROP_RTOKEN,\n PROP_RLIST,\n PROP_COLOR,\n PROP_FCOLOR,\n PROP_VCOLOR,\n PROP_RTEXT,\n PROP_STEXT,\n PROP_WAVE,\n PROP_CANVAS,\n PROP_TIME,\n\n PROP_CTEXT,\n PROP_CLIST,\n PROP_SH_TOKEN,\n PROP_TEXTURE2,\n PROP_GAMETYPE,\n};\n\n// refs\nstruct xr_token;\nclass PropValue;\nclass PropItem;\nusing PropItemVec = xr_vector<PropItem*>;\n\n//------------------------------------------------------------------------------\n#include \"xrCore/ChooseTypes.",
"H\"\n//------------------------------------------------------------------------------\ntypedef fastdelegate::FastDelegate2<PropValue*, xr_string&> TOnDrawTextEvent;\ntypedef fastdelegate::FastDelegate1<PropItem*> TOnClick;\n//------------------------------------------------------------------------------\n\nclass PropValue\n{\n friend class CPropHelper;\n friend class PropItem;\n\nprotected:\n PropItem* m_Owner;\n\npublic:\n u32 tag;\n\n // base events\n typedef fastdelegate::FastDelegate1<PropValue*> TOnChange;\n\n TOnChange OnChangeEvent;\n\n PropValue() : m_Owner(nullptr), tag(0), OnChangeEvent(nullptr) {}\n virtual ~PropValue() {}\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText) = 0;\n virtual void ResetValue() = 0;\n virtual bool Equal(PropValue* prop) = 0;\n PropItem* Owner() { return m_Owner; }\n};\n//------------------------------------------------------------------------------\n\ntemplate <class T>\nvoid set_value(T& val, const T& _val)\n{\n val = _val;\n}\n\ntemplate <class T>\nclass CustomValue : public PropValue\n{\npublic:\n typedef T TYPE;\n\n TYPE init_value;\n TYPE* value;\n\n typedef fastdelegate::FastDelegate2<PropValue*, T&> TOnBeforeEditEvent;\n typedef fastdelegate::FastDelegate2<PropValue*, T&, bool> TOnAfterEditEvent;\n TOnBeforeEditEvent OnBeforeEditEvent;\n TOnAfterEditEvent OnAfterEditEvent;\n\n CustomValue(T* val)\n {\n OnBeforeEditEvent = 0;\n OnAfterEditEvent = 0;\n set_value(value, val);\n set_value(init_value, *val);\n }\n\n virtual xr_string GetDrawText(TOnDrawTextEvent /*OnDrawText*/) { return \"\"; }\n\n virtual bool Equal(PropValue* val)\n {\n CustomValue<T>* prop = (CustomValue<T>*)val;\n return (*value == *prop->value);\n }\n\n virtual const T& GetValue() { return *value; }\n\n virtual void ResetValue() { set_value(*value, init_value); }\n\n bool ApplyValue(const T& val)\n {\n if (!(*",
"value == val))\n {\n set_value(*value, val);\n return true;\n }\n return false;\n }\n};\n\nclass PropItem\n{\n friend class CPropHelper;\n friend class TProperties;\n shared_str key;\n EPropType type;\n void* item;\n\npublic:\n using PropValueVec = xr_vector<PropValue*>;\n\nprivate:\n PropValueVec values;\n#ifdef XR_PLATFORM_WINDOWS\n TProperties* m_Owner;\n#endif\n // events\npublic:\n typedef fastdelegate::FastDelegate1<PropItem*> TOnPropItemFocused;\n TOnDrawTextEvent OnDrawTextEvent;\n TOnPropItemFocused OnItemFocused;\n TOnClick OnClickEvent;\n\npublic:\n u32 prop_color;\n u32 val_color;\n Irect draw_rect;\n\npublic:\n enum\n {\n flDisabled = (1 << 0),\n flShowCB = (1 << 1),\n flCBChecked = (1 << 2),\n flMixed = (1 << 3),\n flDrawThumbnail = (1 << 4),\n flSorted = (1 << 5),\n };\n Flags32 m_Flags;\n\npublic:\n PropItem(EPropType _type)\n : type(_type), prop_color(0), val_color(0), item(nullptr), key(nullptr), OnClickEvent(nullptr), OnDrawTextEvent(nullptr),\n OnItemFocused(nullptr)\n {\n m_Flags.zero();\n }\n virtual ~PropItem()\n {\n for (auto it = values.begin(); values.end() !",
"= it; ++it)\n xr_delete(*it);\n }\n#ifdef XR_PLATFORM_WINDOWS\n TProperties* Owner() { return m_Owner; }\n#endif\n void SetName(const shared_str& name) { key = name; }\n\n void ResetValues()\n {\n for (auto it = values.begin(); values.end() !",
"= it; ++it)\n (*it)->ResetValue();\n CheckMixed();\n }\n\n void AppendValue(PropValue* value)\n {\n if (!",
"values.empty() && !",
"value->Equal(values.front()))\n m_Flags.set(flMixed, true);\n values.push_back(value);\n }\n\n xr_string GetDrawText()\n {\n VERIFY(!values.empty());\n return m_Flags.is(flMixed) ? ",
"xr_string(\"(mixed)\") : values.front()->GetDrawText(OnDrawTextEvent);\n }\n\n void CheckMixed()\n {\n m_Flags.set(flMixed, false);\n if (values.size() > 1)\n {\n auto F = values.begin();\n auto it = F;\n ++it;\n for (; values.end() !",
"= it; ++it)\n {\n if (!(*",
"it)->Equal(*F))\n {\n m_Flags.set(flMixed, true);\n break;\n }\n }\n }\n }\n\n template <class T1, class T2>\n void BeforeEdit(T2& val)\n {\n T1* CV = smart_cast<T1*>(values.front());\n VERIFY(CV);\n if (!",
"CV->OnBeforeEditEvent.empty())\n CV->OnBeforeEditEvent(CV, val);\n }\n template <class T1, class T2>\n bool AfterEdit(T2& val)\n {\n T1* CV = smart_cast<T1*>(values.front());\n VERIFY(CV);\n if (!",
"CV->OnAfterEditEvent.empty())\n return CV->OnAfterEditEvent(CV, val);\n return true;\n }\n template <class T1, class T2>\n bool ApplyValue(const T2& val)\n {\n bool bChanged = false;\n m_Flags.set(flMixed, false);\n for (auto it = values.begin(); values.end() !",
"= it; ++it)\n {\n T1* CV = smart_cast<T1*>(*it);\n VERIFY(CV);\n if (CV->ApplyValue(val))\n {\n bChanged = true;\n if (!",
"CV->OnChangeEvent.empty())\n CV->OnChangeEvent(*it);\n }\n if (!",
"CV->Equal(values.front()))\n m_Flags.set(flMixed, true);\n }\n return bChanged;\n }\n\n PropValueVec& Values() { return values; }\n\n PropValue* GetFrontValue()\n {\n VERIFY(!values.empty());\n return values.front();\n };\n EPropType Type() { return type; }\n#ifdef __BORLANDC__\n IC TElTreeItem* Item() { return (TElTreeItem*)item; }\n#endif\n LPCSTR Key() { return key.c_str(); }\n void Enable(BOOL val) { m_Flags.set(flDisabled, !",
"val); }\n BOOL Enabled() { return !",
"m_Flags.is(flDisabled); }\n\n void OnChange()\n {\n for (auto it = values.begin(); values.end() !",
"= it; ++it)\n if (!(*",
"it)->OnChangeEvent.empty())\n (*it)->OnChangeEvent(*it);\n }\n /*\n template <class T1, class T2>\n IC void\t\t\t\tOnBeforeEdit\t()\n {\n for (auto it=values.begin(); values.end() !",
"= it; ++it){\n T1* CV\t\t= smart_cast<T1*>(*it); VERIFY(CV);\n if (CV->OnChangeEvent) \t\tCV->OnChangeEvent(*it);\n }\n }\n */\n};\n\n//------------------------------------------------------------------------------\n// values\n//------------------------------------------------------------------------------\nclass CaptionValue : public PropValue\n{\n shared_str value;\n\npublic:\n CaptionValue(const shared_str& val) { value = val; }\n virtual xr_string GetDrawText(TOnDrawTextEvent) { return value.c_str() ? ",
"value.c_str() : \"\"; }\n virtual void ResetValue() {}\n virtual bool Equal(PropValue* val) { return (value == ((CaptionValue*)val)->value); }\n bool ApplyValue(const shared_str& val)\n {\n value = val;\n return false;\n }\n};\n\nclass CanvasValue : public PropValue\n{\n shared_str value;\n\npublic:\n typedef fastdelegate::FastDelegate3<CanvasValue*, CanvasValue*, bool&> TOnTestEqual;\n typedef fastdelegate::FastDelegate3<CanvasValue*, void* /* TCanvas* */, const Irect&> TOnDrawCanvasEvent;\n\n int height;\n TOnTestEqual OnTestEqual;\n TOnDrawCanvasEvent OnDrawCanvasEvent;\n\n CanvasValue(const shared_str& val, int h) : OnDrawCanvasEvent(nullptr), OnTestEqual(nullptr), height(h) { value = val; }\n virtual xr_string GetDrawText(TOnDrawTextEvent) { return value.c_str() ? ",
"value.c_str() : \"\"; }\n virtual void ResetValue() {}\n virtual bool Equal(PropValue* val)\n {\n if (!",
"OnTestEqual.empty())\n {\n bool res = true;\n OnTestEqual(this, (CanvasValue*)val, res);\n return res;\n }\n return false;\n }\n};\n\nclass ButtonValue : public PropValue\n{\npublic:\n RStringVec value;\n int btn_num;\n typedef fastdelegate::FastDelegate3<ButtonValue*, bool&, bool&> TOnBtnClick;\n TOnBtnClick OnBtnClickEvent;\n enum\n {\n flFirstOnly = (1 << 0)\n };\n Flags32 m_Flags;\n\n ButtonValue(const shared_str& val, u32 flags)\n {\n m_Flags.assign(flags);\n OnBtnClickEvent = nullptr;\n btn_num = -1;\n xr_string v;\n int cnt = _GetItemCount(val.c_str());\n for (int k = 0; k < cnt; ++k)\n value.push_back(_GetItem(val.c_str(), k, v));\n }\n virtual xr_string GetDrawText(TOnDrawTextEvent)\n {\n shared_str t = _ListToSequence(value);\n return t.c_str() ? ",
"t.c_str() : \"\";\n }\n virtual void ResetValue() {}\n virtual bool Equal(PropValue* /*val*/) { return true; }\n bool OnBtnClick(bool& bSafe)\n {\n if (!",
"OnBtnClickEvent.empty())\n {\n bool bDModif = true;\n OnBtnClickEvent(this, bDModif, bSafe);\n return bDModif;\n }\n else\n return false;\n }\n};\n//------------------------------------------------------------------------------\n\nIC bool operator==(const xr_shortcut& A, const xr_shortcut& B) { return !!",
"A.similar(B); }\nclass ShortcutValue : public CustomValue<xr_shortcut>\n{\npublic:\n typedef fastdelegate::FastDelegate3<ShortcutValue*, const xr_shortcut&, bool&> TOnValidateResult;\n TOnValidateResult OnValidateResultEvent;\n\n ShortcutValue(TYPE* val) : CustomValue<xr_shortcut>(val) {}\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText);\n bool ApplyValue(const xr_shortcut& val)\n {\n if (!(*",
"value == val))\n {\n bool allow = true;\n if (!",
"OnValidateResultEvent.empty())\n OnValidateResultEvent(this, val, allow);\n if (allow)\n {\n set_value(*value, val);\n return true;\n }\n }\n return false;\n }\n};\n\nclass RTextValue : public CustomValue<shared_str>\n{\npublic:\n RTextValue(TYPE* val) : CustomValue<shared_str>(val){};\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string txt = GetValue().c_str() ? ",
"GetValue().c_str() : \"\";\n if (!",
"OnDrawText.empty())\n OnDrawText(this, txt);\n return txt;\n }\n};\n\nclass STextValue : public CustomValue<xr_string>\n{\npublic:\n STextValue(TYPE* val) : CustomValue<xr_string>(val){};\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string txt = GetValue();\n if (!",
"OnDrawText.empty())\n OnDrawText(this, txt);\n return txt;\n }\n};\n\nclass CTextValue : public PropValue\n{\n xr_string init_value;\n\npublic:\n LPSTR value;\n\n typedef fastdelegate::FastDelegate2<PropValue*, xr_string&> TOnBeforeEditEvent;\n typedef fastdelegate::FastDelegate2<PropValue*, xr_string&, bool> TOnAfterEditEvent;\n\n TOnBeforeEditEvent OnBeforeEditEvent;\n TOnAfterEditEvent OnAfterEditEvent;\n\n int lim;\n\n CTextValue(LPSTR val, int _lim) : value(val), init_value(val), lim(_lim)\n {\n OnBeforeEditEvent = nullptr;\n OnAfterEditEvent = nullptr;\n };\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string txt = GetValue();\n if (!",
"OnDrawText.empty())\n OnDrawText(this, txt);\n return txt;\n }\n\n virtual bool Equal(PropValue* val) { return (0 == xr_strcmp(value, ((CTextValue*)val)->value)); }\n\n bool ApplyValue(LPCSTR val)\n {\n if (0 !",
"= xr_strcmp(value, val))\n {\n xr_strcpy(value, xr_strlen(val) + 1, val);\n return true;\n }\n return false;\n }\n\n LPSTR GetValue() { return value; }\n virtual void ResetValue() { xr_strcpy(value, init_value.size() + 1, init_value.c_str()); }\n};\n//------------------------------------------------------------------------------\n\nclass ChooseValue : public RTextValue\n{\npublic:\n int subitem;\n u32 m_ChooseID;\n u32 m_ChooseFlags;\n shared_str m_StartPath;\n ChooseItemVec* m_Items;\n typedef fastdelegate::FastDelegate1<ChooseValue*> TOnChooseValueFill;\n TOnChooseValueFill OnChooseFillEvent;\n TOnDrawThumbnail OnDrawThumbnailEvent;\n void* m_FillParam;\n // utils\n void AppendChooseItem(LPCSTR name, LPCSTR hint)\n {\n VERIFY(m_Items);\n m_Items->push_back(SChooseItem(name, hint));\n }\n\n ChooseValue(shared_str* val, u32 cid, LPCSTR path, void* param, u32 sub_item_count, u32 choose_flags)\n : RTextValue(val), m_ChooseID(cid), m_StartPath(path), subitem(sub_item_count), m_Items(nullptr), m_FillParam(param),\n OnChooseFillEvent(nullptr), OnDrawThumbnailEvent(nullptr), m_ChooseFlags(choose_flags)\n {}\n};\n\ntypedef CustomValue<BOOL> BOOLValue;\n//------------------------------------------------------------------------------\n\nIC bool operator==(const WaveForm& A, const WaveForm& B) { return !!",
"A.Similar(B); }\nclass WaveValue : public CustomValue<WaveForm>\n{\npublic:\n WaveValue(TYPE* val) : CustomValue<WaveForm>(val){};\n virtual xr_string GetDrawText(TOnDrawTextEvent) { return \"[Wave]\"; }\n};\n\nIC bool operator==(const GameTypeChooser& A, const GameTypeChooser& B)\n{\n return A.m_GameType.flags == B.m_GameType.flags;\n}\nclass GameTypeValue : public CustomValue<GameTypeChooser>\n{\npublic:\n GameTypeValue(TYPE* val) : CustomValue<GameTypeChooser>(val){};\n virtual xr_string GetDrawText(TOnDrawTextEvent);\n};\n\n//------------------------------------------------------------------------------\n\nIC bool operator==(const Fcolor& A, const Fcolor& B) { return !!",
"A.similar_rgba(B); }\ntypedef CustomValue<Fcolor> ColorValue;\n//------------------------------------------------------------------------------\n\ntemplate <class T>\nclass NumericValue : public CustomValue<T>\n{\npublic:\n T lim_mn;\n T lim_mx;\n T inc;\n int dec;\n\npublic:\n NumericValue(T* val) : CustomValue<T>(val)\n {\n this->value = val;\n this->init_value = *this->value;\n dec = 0;\n };\n NumericValue(T* val, T mn, T mx, T increm, int decim)\n : CustomValue<T>(val), lim_mn(mn), lim_mx(mx), inc(increm), dec(decim)\n {\n clamp(*val, lim_mn, lim_mx);\n this->value = val;\n this->init_value = *this->value;\n };\n bool ApplyValue(const T& _val)\n {\n T val = _val;\n clamp(val, lim_mn, lim_mx);\n return CustomValue<T>::ApplyValue(val);\n }\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string draw_val;\n if (!",
"OnDrawText.empty())\n OnDrawText(this, draw_val);\n else\n draw_sprintf(draw_val, *this->value, dec);\n return draw_val;\n }\n};\n\n//------------------------------------------------------------------------------\ntemplate <class T>\nxr_string draw_sprintf(xr_string& s, const T& V, int tag)\n{\n string256 tmp;\n xr_sprintf(tmp, sizeof(tmp), \"%d\", V);\n s = tmp;\n return s;\n}\n//------------------------------------------------------------------------------\nIC xr_string draw_sprintf(xr_string& s, const float& V, int dec)\n{\n string32 fmt;\n xr_sprintf(fmt, sizeof(fmt), \"%%.%df\", dec);\n string256 tmp;\n xr_sprintf(tmp, sizeof(tmp), fmt, V);\n s = tmp;\n return s;\n}\n//------------------------------------------------------------------------------\nIC bool operator==(const Fvector& A, const Fvector& B) { return !!",
"A.similar(B); }\nIC void clamp(Fvector& V, const Fvector& mn, const Fvector& mx)\n{\n clamp(V.x, mn.x, mx.x);\n clamp(V.y, mn.y, mx.y);\n clamp(V.z, mn.z, mx.z);\n}\nIC xr_string draw_sprintf(xr_string& s, const Fvector& V, int dec)\n{\n string128 fmt;\n xr_sprintf(fmt, sizeof(fmt), \"{%%.%df, %%.%df, %%.%df}\", dec, dec, dec);\n string256 tmp;\n xr_sprintf(tmp, sizeof(tmp), fmt, V.x, V.y, V.z);\n s = tmp;\n return s;\n}\n//------------------------------------------------------------------------------\ntypedef NumericValue<u8> U8Value;\ntypedef NumericValue<u16> U16Value;\ntypedef NumericValue<u32> U32Value;\ntypedef NumericValue<s8> S8Value;\ntypedef NumericValue<s16> S16Value;\ntypedef NumericValue<s32> S32Value;\ntypedef NumericValue<float> FloatValue;\nclass VectorValue : public NumericValue<Fvector>\n{\npublic:\n VectorValue(Fvector* val, float mn, float mx, float increment, int decimal) : NumericValue<Fvector>(val)\n {\n lim_mn.set(mn, mn, mn);\n lim_mx.set(mx, mx, mx);\n inc.set(increment, increment, increment);\n dec = decimal;\n };\n};\n//------------------------------------------------------------------------------\n\nclass FlagValueCustom\n{\npublic:\n shared_str caption[2];\n enum\n {\n flInvertedDraw = (1 << 0),\n };\n Flags32 m_Flags;\n\n FlagValueCustom(u32 mask, LPCSTR c0, LPCSTR c1)\n {\n caption[0] = c0;\n caption[1] = c1;\n m_Flags.assign(mask);\n }\n virtual bool HaveCaption() { return caption[0].size() && caption[1].size(); }\n virtual bool GetValueEx() = 0;\n};\n\ntemplate <class T>\nclass FlagValue : public CustomValue<T>, public FlagValueCustom\n{\npublic:\n typedef T TYPE;\n typedef typename T::TYPE FLAG_TYPE;\n\n FLAG_TYPE mask;\n\n FlagValue(T* val, FLAG_TYPE _mask, LPCSTR c0, LPCSTR c1, u32 flags)\n : CustomValue<T>(val), FlagValueCustom(flags, c0, c1), mask(_mask)\n {}\n\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string draw_val;\n if (!",
"OnDrawText.empty())\n OnDrawText(this, draw_val);\n else\n return HaveCaption() ? ",
"caption[GetValueEx() ? ",
"1 : 0].c_str() : \"\";\n return draw_val;\n }\n virtual bool Equal(PropValue* val) { return !!",
"this->value->equal(*((FlagValue<T>*)val)->value, mask); }\n virtual const T& GetValue() { return *this->value; }\n virtual void ResetValue() { this->value->set(mask, this->init_value.is(mask)); }\n virtual bool GetValueEx() { return !!",
"this->value->is(mask); }\n\n bool ApplyValue(const T& val)\n {\n if (!",
"val.equal(*this->value, mask))\n {\n this->value->set(mask, val.is(mask));\n return true;\n }\n return false;\n }\n};\n//------------------------------------------------------------------------------\ntypedef FlagValue<Flags8> Flag8Value;\ntypedef FlagValue<Flags16> Flag16Value;\ntypedef FlagValue<Flags32> Flag32Value;\n//------------------------------------------------------------------------------\ntemplate <class T>\nbool operator==(_flags<T> const& A, _flags<T> const& B)\n{\n return A.flags == B.flags;\n}\n//------------------------------------------------------------------------------\n\nclass TokenValueCustom\n{\npublic:\n xr_token* token;\n TokenValueCustom(xr_token* _token) : token(_token) {}\n};\n\ntemplate <class T>\nclass TokenValue : public CustomValue<T>, public TokenValueCustom\n{\npublic:\n TokenValue(T* val, xr_token* _token) : TokenValueCustom(_token), CustomValue<T>(val){}\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string draw_val;\n if (!",
"OnDrawText.empty())\n OnDrawText(this, draw_val);\n else\n for (int i = 0; this->token[i].name; i++)\n if (this->token[i].id == (int)this->GetValue())\n return this->token[i].name;\n return draw_val;\n }\n};\n\n//------------------------------------------------------------------------------\ntypedef TokenValue<u8> Token8Value;\ntypedef TokenValue<u16> Token16Value;\ntypedef TokenValue<u32> Token32Value;\n//------------------------------------------------------------------------------\n\nclass RTokenValueCustom\n{\npublic:\n xr_rtoken* token;\n u32 token_count;\n RTokenValueCustom(xr_rtoken* _token, u32 _t_cnt) : token(_token), token_count(_t_cnt) {}\n};\n\ntemplate <class T>\nclass RTokenValue : public CustomValue<T>, public RTokenValueCustom\n{\npublic:\n RTokenValue(T* val, xr_rtoken* _token, u32 _t_cnt) : CustomValue<T>(val), RTokenValueCustom(_token, _t_cnt){};\n virtual xr_string GetDrawText(TOnDrawTextEvent OnDrawText)\n {\n xr_string draw_val;\n if (!",
"OnDrawText.empty())\n OnDrawText(this, draw_val);\n else\n for (u32 k = 0; k < token_count; k++)\n if ((T)token[k].id == this->GetValue())\n return *token[k].name;\n return draw_val;\n }\n};\n\n//------------------------------------------------------------------------------\ntypedef RTokenValue<u8> RToken8Value;\ntypedef RTokenValue<u16> RToken16Value;\ntypedef RTokenValue<u32> RToken32Value;\n//------------------------------------------------------------------------------\n\nclass TokenValueSH : public CustomValue<u32>\n{\npublic:\n struct Item\n {\n u32 ID;\n string64 str;\n };\n u32 cnt;\n const Item* items;\n\n TokenValueSH(u32* val, const Item* _items, u32 _cnt) : CustomValue<u32>(val), cnt(_cnt), items(_items){};\n virtual xr_string GetDrawText(TOnDrawTextEvent /*OnDrawText*/)\n {\n u32 draw_val = GetValue();\n for (u32 i = 0; i < cnt; i++)\n if (items[i].ID == draw_val)\n return items[i].str;\n return nullptr;\n }\n};\n//------------------------------------------------------------------------------\n\nclass RListValue : public RTextValue\n{\npublic:\n shared_str* items;\n u32 item_count;\n\n RListValue(shared_str* val, shared_str* _items, u32 cnt) : RTextValue(val), items(_items), item_count(cnt){};\n virtual bool Equal(PropValue* val)\n {\n if (items !",
"= ((RListValue*)val)->items)\n {\n m_Owner->m_Flags.set(PropItem::flDisabled, true);\n return false;\n }\n return RTextValue::Equal(val);\n }\n};\nclass CListValue : public CTextValue\n{\npublic:\n xr_string* items;\n u32 item_count;\n\n CListValue(LPSTR val, u32 sz, xr_string* _items, u32 cnt) : CTextValue(val, sz), items(_items), item_count(cnt){};\n virtual bool Equal(PropValue* val)\n {\n if (items !",
"= ((CListValue*)val)->items)\n {\n m_Owner->m_Flags.set(PropItem::flDisabled, true);\n return false;\n }\n return CTextValue::Equal(val);\n }\n};\n//------------------------------------------------------------------------------\n#pragma pack(pop)\n"
] | {
"pile_set_name": "Github"
} | [
0.0013784990878775716,
0.0014791757566854358,
0.0032928152941167355,
0.008510260842740536,
0.010965497232973576,
0.006824358366429806,
0.003482801839709282,
0.001546629355289042,
0.0013157485518604517,
0.00236634467728436,
0.009160203859210014,
0.004594842903316021,
0.002951761009171605,
0.010341530665755272,
0.0017246584175154567,
0.0016681173583492637,
0.0027079605497419834,
0.007127888035029173,
0.003044524695724249,
0.008120640181005001,
0.0021208205725997686,
0.0028643314726650715,
0.0038818297907710075,
0.0035999203100800514,
0.007559190038591623,
0.008666840381920338,
0.032336123287677765,
0.0015981992473825812,
0.0033295711036771536,
0.005028879269957542,
0.001260700635612011,
0.004733075387775898,
0.008452805690467358,
0.016130980104207993,
0.008032282814383507,
0.0014175436226651073,
0.0010560377268120646,
0.006885541137307882,
0.0013024043291807175,
0.004966518376022577,
0.0006950545939616859,
0.005336276255548,
0.011038342490792274,
0.005000654142349958,
0.0046960762701928616,
0.008756005205214024,
0.01770656742155552,
0.0028923298232257366,
0.005877498537302017
] | 0.005711 | 49 |
[
"Q:\n\nIs there a way to keep Telegram bot running when closing Python?",
"\n\nI've built a very simple Telegram bot by following this tutorial. ",
"So I have a file containing Python code, and when I run that code, the bot will echo what I say. ",
"\nIs it true that the bot will only work when I have Python on and the code running? ",
"Would this mean that I cannot run any other script in Python at the same time, and neither can close Python down if I want my bot to keep working?",
"\nIs there any way to get around this, so that the bot will always be 'on'?",
"\n\nA:\n\nA Telegram bot is a Python program. ",
"When you run it, it do what it is supposed to do, then, if you stop the program, the bot stop to work. ",
"The problematic is common to all programs, particularily on a server. ",
"Think about Nginx, Apache, ssh, etc. ",
"Thay are all programs, and they all stop to do their job when they are closed.",
"\nIf you want to make sure your bot will run always, you have to daemonize it. ",
"There is a lot of solutions.",
"\nYou could transform your script to be a daemon, so when you launch it, it go directly to the background and continue to run until the server is shut down (or the program crash). ",
"But in that case, do your bot will re-run if you (or somebody else) restart the computer (server) ? ",
"There is some python libraries for this purpose, like daemonize.",
"\nAnother common solution is to run your bot in a process manager. ",
"You can check supervisorctl for example, or you could decide to create a script to run your program from System V, UpStart or Systemd... This suppose you want to deploy your bot on a dedicated server or a VPS. ",
"This will be covered by the part 3 of the tutoriel you followed:\n\nThe next and final part of this series will [...] be demonstrating how to deploy the Bot to a VPS.",
"\n\nYou could also consider encapsulating your bot into an image or a container (Docker, etc.) ",
"to run it on a compatible platform.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0007826053770259023,
0.0006540929316543043,
0.0006703090039081872,
0.0008409706060774624,
0.0007657409296371043,
0.0006970232934691012,
0.001132885692641139,
0.0011267950758337975,
0.0006360562983900309,
0.0009668919956311584,
0.011495700106024742,
0.0011085252044722438,
0.000577130529563874,
0.0009702560491859913,
0.0008192655513994396,
0.0007428022800013423,
0.0008121557766571641,
0.012069456279277802,
0.0006380021804943681,
0.0006718490622006357,
0.0006713898619636893,
0.001995444530621171
] | 0.001857 | 22 |
[
"Q:\n\nBizTalk AS/2 implementation certificates\n\nI cannot add any certificates on AS2 messages in BizTalk.",
"\nSo here's what I have for the moment (I have installed 2 certificates on the BizTalk machine using the same account as the on under which the Host Instance is running.",
"\nThe 2 certificates are the following and placed in the locations:\n\\Personal\\Certificates - My own certificate 'pfx'.",
"\n\\Other People\\Certificates - Party certificate 'cer'.",
"\nSo far the importing of the certificates.",
"\nNow, when in BizTalk Administration, I go to Parties and I go on the agreement between the parties. ",
"In that window I go down to 'Signature certificate' and I check \"Override group signing certificate\". ",
"Then when I click \"browse\" I see:\n\"No certificate available.\"",
"\n\"No certificates meet the application criteria\".",
"\nAny idea on what's wrong here?",
"\n\nA:\n\nI've found it. ",
"The certificates should be installed under the same instance that the BizTalk Administration Console is openend. ",
"Otherwise the certificates could not be found.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.002328507835045457,
0.00237092818133533,
0.000595971941947937,
0.0006443964666686952,
0.0007082498050294816,
0.0010639223037287593,
0.0005690644029527903,
0.000638109864667058,
0.0006053782999515533,
0.0006627037073485553,
0.0006761063705198467,
0.0015085390768945217,
0.0006031592492945492,
0.001995444530621171
] | 0.001069 | 14 |
[
"\n110 P.3d 357 (2005)\n210 Ariz. 256\nWilliam D. FEARNOW and Elizabeth Fearnow, Plaintiffs-Appellees,\nv.\nRIDENOUR, SWENSON, CLEERE & EVANS, P.C., Defendants-Appellants.",
"\nNo. ",
"1 CA-CV 03-0650.",
"\nCourt of Appeals of Arizona, Division 1, Department B.\nApril 19, 2005.",
"\nDamore Law, P.C. by David A. Damore, Scottsdale, Attorneys for Plaintiffs-Appellees.",
"\nOsborn Maledon P.A. by Mark I. Harrison, Phoenix, Attorneys for Defendants-Appellants.",
"\n\nOPINION\nWEISBERG, Judge.",
"\n¶ 1 Ridenour, Swenson, Cleere & Evans, P.C. (\"RSCE\") appeals from the judgment *358 awarding William and Elizabeth Fearnow $86,500.00 for William Fearnow's equity interest in RSCE. ",
"The trial court concluded that the \"Voluntary Withdrawal\" provision in the Shareholder Agreement between Fearnow and RSCE unlawfully restricted Fearnow's right to practice law. ",
"Accordingly, the court found the Shareholder Agreement invalid. ",
"The court further held that Fearnow could recoup his equity interest in RSCE under the Arizona Professional Corporations Act (\"Act\"),[1] as a \"disqualified person\" who could compel RSCE to acquire his share for its fair-market value.",
"\n¶ 2 For the following reasons, we conclude that the Voluntary Withdrawal provision of the Shareholder Agreement constitutes an unlawful restriction upon Fearnow's right to practice law, but we further conclude that Fearnow has no right to compensation under the Act.",
"\n\nFACTUAL AND PROCEDURAL BACKGROUND\n¶ 3 In 1987, Fearnow became a partner in the law firm of Ridenour, Swensen, Cleere and Evans (the \"Partnership\"). ",
"Fearnow paid $33,674.42 for his partnership interest.",
"\n¶ 4 In 1991, the Partnership dissolved, and the prior partners formed the RSCE professional corporation. ",
"Fearnow received one share of stock in RSCE.",
"\n¶ 5 On November 27, 1997, RSCE executed the last version of its Shareholder Agreement, which included a section governing the \"Withdrawal of Stockholders.\" ",
"This section included a provision for the \"Voluntary Withdrawal\" of Stockholders, which stated:\nOther than retirement, a Stockholder who withdraws from the Corporation shall tender his or her Share to the Corporation for no compensation.",
"\n¶ 6 In February 1998, Fearnow voluntarily left RSCE to practice law at the firm of Walker Ellsworth, P.L.C., and took several of RSCE's clients with him. ",
"He then demanded that RSCE pay him $33,674.42 as compensation for his share of stock. ",
"When RSCE refused, the Fearnows filed this lawsuit seeking to invalidate the Voluntary Withdrawal provision of the Shareholder Agreement. ",
"The Fearnows also sought compensation from RSCE based on theories of unjust enrichment and conversion.",
"\n¶ 7 The parties filed cross-motions for summary judgment on the validity of the Voluntary Withdrawal provision of the Shareholder Agreement. ",
"The trial court (the Honorable Colin F. Campbell) ruled that the Voluntary Withdrawal provision of the Shareholder Agreement was a restriction on a lawyer's right to practice law, in violation of Ethical Rule 5.6, Arizona Rules of Supreme Court 42 (\"ER 5.6\").[2] The court concluded that the striking of the provision left a \"large gap in the [S]hareholder [A]greement ... [with] no remaining term cover[ing] what happens in the event of voluntary withdrawal or retirement.\" ",
"Because the Shareholder Agreement had no severability clause and the court could not rewrite the stricken material terms for the parties, it held the entire agreement to be invalid. ",
"The court then ordered the parties to submit additional briefing on the issue of what would be the appropriate remedy.",
"\n¶ 8 The parties filed cross-motions for summary judgment on the remedy issue. ",
"RSCE reasoned that the Fearnows had no remedy because the Act afforded none. ",
"It asserted that the Act provided that a corporation's obligation to repurchase stock arose only upon the death, dissolution or disqualification of a shareholder. ",
"RSCE argued, therefore, that Fearnow was not entitled to the compulsory repurchase of his share because he was not dead, could not be dissolved, and was not a \"disqualified person\" under the Act. ",
"Fearnow conceded he had no remedy under the Act, but sought equitable relief from the court based on restitution.",
"\n*359 ¶ 9 The trial court held that Fearnow was a \"disqualified person\" under the Act and ordered the appraisal of his share. ",
"RSCE filed a motion for reconsideration on the \"disqualified person\" issue, which the court denied.",
"\n¶ 10 The valuation issue proceeded to a bench trial before the Honorable Anna Baca. ",
"The court determined that the fair value of Fearnow's equity interest was $86,500. ",
"The court entered final judgment to that effect, and awarded the Fearnows their attorneys' fees, expert fees and costs. ",
"RSCE timely filed this appeal. ",
"We have jurisdiction over this matter pursuant to A.R.S. § 12-2101(B)(2003).",
"\n\nDISCUSSION\n¶ 11 On appeal, RSCE challenges the trial court's partial summary judgment rulings regarding both the invalidity of the Shareholder Agreement and Fearnow's status as a \"disqualified person\" under the Act. ",
"We review the grant of summary judgment de novo, viewing the evidence and any reasonable inferences therefrom in the light most favorable to the party against whom judgment was entered. ",
"Great Am. ",
"Mortg., ",
"Inc. v. Statewide Ins. ",
"Co., 189 Ariz. 123, 124-25, 938 P.2d 1124, 1125-26 (App.1997). ",
"Also, the interpretation of a contract involves questions of law which we review de novo, as we do the interpretation and construction of the ethical rules governing attorney conduct. ",
"Tobel v. Travelers Ins. ",
"Co., 195 Ariz. 363, 366, ¶ 13, 988 P.2d 148, 151 (App.1999) (interpretation of contract is subject to de novo review); Perguson v. Tamis, 188 Ariz. 425, 427, 937 P.2d 347, 349 (App.1996) (interpretation and meaning of court rule is question of law subject to de novo review).",
"\n\nI\n¶ 12 We first consider whether the Shareholder Agreement is enforceable. ",
"The trial court concluded that section 3(c) of the Shareholder Agreement was an unlawful restriction on the right of Fearnow to practice law and therefore, in violation of ER 5.6(a). ",
"At the time of the trial court proceedings, ER 5.6(a) provided:\nRestrictions on Right to Practice\nA lawyer shall not participate in offering or making:\n(a) a partnership[[3]] or employment agreement that restricts the rights of a lawyer to practice after termination of the relationship except an agreement concerning benefits upon retirement;....\nER 5.6.[4]\n¶ 13 The ethical rule guarding against restrictive covenants among lawyers was created to \"prevent[ ] lawyers from `bartering in clients,' thereby protecting the client's freedom to choose, discharge, or replace a lawyer at will.\" ",
"Anderson v. Aspelmeier, Fisch, Power, Warner & Engberg, 461 N.W.2d 598, 601 (Iowa 1990) (citations omitted); see also Cmt. [",
"1] to 2003 Amendment to ER 5.6 (\"An agreement restricting the right of lawyers to practice after leaving a firm not only limits their professional autonomy but also limits the freedom of clients to choose a lawyer.\") (",
"emphasis added).",
"\n¶ 14 Arizona courts have not directly addressed ER 5.6's prohibition on restrictive covenants. ",
"However, in Valley Medical Specialists v. Farber, 194 Ariz. 363, 982 P.2d 1277 (1999),[5] a case invalidating a restrictive *360 covenant between a doctor and his professional corporation, our supreme court analogized the medical profession and a patient's right to the doctor of his/her choice to the legal profession and a client's right to the attorney of his/her choice. ",
"Id. at 368-69, ¶¶ 16-18, 982 P.2d at 1282-83 (noting that the principle of protecting client choice justified prohibiting restrictive covenants among lawyers). ",
"The court concluded that public policy required that the special doctor-patient relationship, like the attorney-client relationship, was entitled to unique protection, and could not be unduly restricted. ",
"Id. at 369, ¶ 19, 982 P.2d at 1283.",
"\n¶ 15 Several jurisdictions have held that any financial disincentive imposed upon a departing lawyer is an invalid restriction on the right to practice law in violation of applicable ethical rules. ",
"See Dowd & Dowd, Ltd. v. Gleason, 181 Ill.2d 460, 230 Ill.Dec. 229, 693 N.E.2d 358 (1998); Anderson, 461 N.W.2d 598; Cohen v. Lord, Day & Lord, 75 N.Y.2d 95, 551 N.Y.S.2d 157, 550 N.E.2d 410 (1989). ",
"The rationale of this position is that ethical rules prevent any restrictions by lawyers that limit the ability of a person to choose his or her attorney. ",
"Cohen, 551 N.Y.S.2d 157, 550 N.E.2d at 411-12; see also Restatement (Third) of Law Governing Lawyers § 13 cmt. ",
"b (2000).",
"\n¶ 16 Meanwhile, other jurisdictions have adopted a more permissive approach, holding that reasonable financial penalties for departing lawyers do not restrict the lawyer's right to practice. ",
"See Howard v. Babcock, 6 Cal.4th 409, 25 Cal.",
"Rptr.2d 80, 863 P.2d 150, 156 (1993); Pettingell v. Morrison, Mahoney & Miller, 426 Mass. 253, 687 N.E.2d 1237, 1240 (1997). ",
"Under this approach, financial penalties are enforceable when they are reasonably linked to the actual loss suffered by the firm that is attributable to the lawyer's departure. ",
"Howard, 25 Cal.",
"Rptr.2d 80, 863 P.2d at 156 (restriction valid if a \"reasonable cost against a partner who chooses to compete with his or her former partners\"); Pettingell, 687 N.E.2d at 1240 (financial penalty valid if \"reasonable recognition of a law firm's loss due to the departure of a partner\").",
"\n¶ 17 In the instant case, however, we need not decide which standard applies in Arizona because the subject financial penalty provision is invalid under even the more permissive standard. ",
"The financial disincentive here was not based upon any actual loss suffered by RSCE due to Fearnow's departure. ",
"On the contrary, the Agreement required Fearnow to forfeit all of his capital contribution regardless of whether he actually took with him any of RSCE's clients.[6] We, therefore, affirm the trial court's holding that the Agreement is unenforceable.",
"\n\nII\n¶ 18 Next, we turn to the issue of compensation. ",
"Both parties agree that Fearnow was properly issued his share. ",
"According to RSCE, Fearnow must now return his share without compensation. ",
"However, having concluded that the Agreement is unenforceable as being against public policy, we decline to so hold.",
"\n¶ 19 Fearnow, on the other hand, argues that RSCE is required to compensate him for his share. ",
"On appeal, he asserts two theories of recovery. ",
"First, he maintains that the Act entitles him to the fair market value of his share. ",
"Alternatively, in the event his position under the Act fails, he *361 posits that he is entitled to the return of his capital contribution under the theory of unjust enrichment. ",
"We, however, disagree with both of his arguments.",
"\n\nArizona Professional Corporation Act\n¶ 20 Fearnow first contends that the repurchase of his share pursuant to the Act is mandated by the Supreme Court's opinion in Vinall v. Hoffman, 133 Ariz. 322, 651 P.2d 850 (1982). ",
"Vinall dealt with the departure of a dentist from a professional corporation. ",
"The court concluded that the Act required the corporation to repurchase the share of the departing dentist. ",
"Id. at 324, 651 P.2d at 852.",
"\n¶ 21 Vinall, however, is no longer controlling. ",
"Vinall was based on an earlier version of the Act that required the acquisition of a shareholder's shares upon, inter alia, the \"resignation\" or \"legal disqualification\" of a shareholder. ",
"A.R.S. § 10-909(D) (1995).[7] That version of the Act, however, was repealed effective January 1, 1996, and a new Act went into effect on that same date. ",
"Thus, the language of the former A.R.S. § 10-909(D) was replaced with A.R.S. § 10-2223, which remains in effect. ",
"The former provision that a shareholder's resignation obligated a corporation to acquire the shares was specifically deleted from the new Act. ",
"See A.R.S. § 10-2223.",
"\n¶ 22 Under the current Act, a professional corporation must repurchase the shares of a shareholder upon either of two circumstances: (1) the death or dissolution of the shareholder when the person to whom the shares would be devolved is not a person eligible to hold that stock pursuant to A.R.S. § 10-2220; or (2) when the shareholder becomes a \"disqualified person.\" ",
"Id. The first circumstance clearly is inapplicable here. ",
"Therefore, under the new version of the Act, Fearnow is entitled to the fair market value of his share only if he is a \"disqualified person.\"",
"\n¶ 23 The Act now defines a \"disqualified person\" as \"an individual or entity that is not or ceases to be a qualified person.\" ",
"A.R.S. § 10-2201(1). \"",
"Qualified person\" is defined as \"a person that is eligible under the chapter to be issued shares by a professional corporation.\" ",
"A.R.S. § 10-2201(7). ",
"Eligibility for the issuance of shares from a professional corporation is set forth in A.R.S. § 10-2220(A)(1), which states that a professional corporation may issue shares to \"[i]ndividuals who are licensed by law in this or another state to render a professional service described in the corporation's articles of incorporation.\" ",
"Therefore, because Fearnow is a licensed attorney, he is eligible to be issued shares by the law firm and is a \"qualified person\" under the current Act. ",
"See Lake Havasu City v. Mohave County, 138 Ariz. 552, 555, 675 P.2d 1371, 1374 (App.1983) (court must give meaning to clear and unambiguous statutory language). ",
"Furthermore, Fearnow will remain a qualified person for so long as he is licensed to practice law in Arizona or in another state. ",
"Consequently, at this time, he cannot require that RSCE repurchase his shares on the basis that he is \"disqualified\" under the Act.",
"\n¶ 24 We note that Arizona's current Act was patterned after the 1984 Model Professional Corporate Supplement to the Model Business Corporation Act (\"Model Act Supplement\"), which supports our analysis. ",
"Terence Thompom, et al, 7 Arizona Practice Series-Corporate Practice at 631 (2004 ed.). ",
"Section 3(1) of the Model Act Supplement defines a \"disqualified person\" as \"an individual or entity that for any reason is or becomes ineligible under this Supplement to be issued shares by a professional corporation.\" ",
"Section 3(8) defines a \"qualified person\" as \"an individual ... that is eligible under the Supplement to be issued shares by a professional *362 corporation.\" ",
"The official comment clarifies that the \"Supplement permits shares of a professional corporation generally to be issued only to individuals licensed in this or another state to render a professional service.\" ",
"Model Act Supplement § 3, official cmt. ",
"1. ",
"The official comment further states that \"[t]hese persons are referred to as `qualified persons.'\" ",
"Id. Consequently, the only shareholder limitation found in the new Model Act is that the shareholder be licensed in the related profession.",
"\n¶ 25 We further note that a significant goal of every uniform act, including this one, is to foster uniform interpretations by all states that adopt it. ",
"See Canon School Dist. ",
"No. ",
"50 v. W.E.S. Const. ",
"Co. Inc., 180 Ariz. 148, 154, 882 P.2d 1274, 1280 (1994) (declaring that \"[u]niform Acts should be interpreted consistently,\" and quoting the Tennessee Supreme Court, which stated that \"[i]t is axiomatic that a purpose in enacting uniform laws is to achieve conformity, not uniqueness.... This court should strive to maintain the standardization of construction of uniform acts to carry out the legislative intent of uniformity,\" Holiday Inns, Inc. v. Olsen, 692 S.W.2d 850, 853 (Tenn.1985)); Welch-Doden v. Roberts, 202 Ariz. 201, 209, ¶¶ 33, 34, 42 P.3d 1166, 1174 (App.2002) (ruling consistent with the interpretation of other jurisdictions adopting the Uniform Child Custody Jurisdiction and Enforcement Act, which was intended to reduce the potential of \"conflicting jurisdictional disputes\"). ",
"Accordingly, states should be able to enact laws patterned after model acts with the assurance that the same language enacted by different states will be similarly interpreted to reach similar results. ",
"Our conclusion is therefore bolstered by the conclusions reached by all courts that have considered the term \"disqualified\" under the Act.",
"\n¶ 26 For example, in Utah a plaintiff-attorney was fired by her firm. ",
"Berrett v. Purser & Edwards, 876 P.2d 367, 368 (Utah 1994). ",
"She then requested that the firm repurchase her shares in the professional corporation because, she alleged, she was no longer \"qualified\" to hold corporate shares. ",
"Id. The Utah Supreme Court, however, held that the Utah statute referred only to individuals who were no longer licensed in the corporation's profession. ",
"Id. at 369. ",
"The court concluded that the phrase \"no longer qualified\" did not refer to an employee whose employment relationship had been terminated, but who still was appropriately licensed. ",
"Id. at 370. ",
"The court gave the term \"qualified\" \"its logical and consistent meaning within the entire Professional Corporation Act,\" noting that if the court added to that meaning it would be exceeding its authority and legislating from the bench. ",
"Id. Moreover, in response to the plaintiff's claim that deeming her to be \"qualified\" to own shares would result in unethical ramifications, the court opined that such concerns could not alter the statute's meaning and that such employee-shareholders must take responsibility for their own failure to protect themselves in the event of termination from their firm. ",
"Id. at 371.",
"\n¶ 27 In a similar case in Florida, three attorneys, who all held shares in the same professional corporation, voluntarily discontinued employment with their firm. ",
"Corlett, Killian, Hardeman, McIntosh and Levi, P.A. v. Merritt, 478 So.2d 828, 829 (Fla.Dist.",
"Ct.",
"App.1985). ",
"The court held that the Act did not require that the professional corporation repurchase the shares of its former employees. ",
"Id. Thus, the former employees could remain shareholders in the professional corporation. ",
"Id. at 831. ",
"The Florida court, like the Utah court in Berrett, held that employee-shareholders could not look to the court for redress if they had failed to protect themselves from ethical difficulties that might arise from their continued ownership of stock in the professional corporation following the termination of their employment. ",
"Id. at 834.",
"\n¶ 28 Again, in Illinois, the appellate court opined that the state's Professional Service Corporation Act, which required a corporation to repurchase the shares of a shareholder who was \"no longer qualified,\" simply referred to shareholders who were no longer licensed in the profession and did not include those shareholders who were still licensed but whose employment relationship with the professional corporation had terminated. ",
"Trittipo v. O'Brien, 204 Ill.App.3d 662, 149 Ill.Dec. 505, 561 N.E.2d 1201, 1204-05 (1990). *",
"363 The court also commented that pursuant to the Act, licensed shareholders were not obligated to practice their profession at all; they were merely required to be licensed. ",
"Id. 149 Ill.Dec. 505, 561 N.E.2d at 1205. ",
"Hence, because the plaintiff-attorney remained licensed to practice law, the applicable statute did not require that the law firm purchase his shares. ",
"Id. Finally, the court also commented that possible ethical difficulties did not warrant unauthorized court intervention. ",
"Id. 149 Ill.Dec. 505, 561 N.E.2d at 1208.",
"\n¶ 29 We, too, recognize that the result in the instant case may expose the parties to risks of ethical improprieties; but that does not empower this court to ignore the clear language of the current Act. ",
"It simply is not our duty to legislate. ",
"See In re B.S., 205 Ariz. 611, 618, ¶ 31, 74 P.3d 285, 292 (App.2003) (court cannot add statutory requirements); State ex rel. ",
"Lassen v. Harpham, 2 Ariz.App. ",
"478, 487, 410 P.2d 100, 109 (1966) (court may not \"judicially legislate\" by adding provisions to a statute). ",
"Although another result might be preferable, given the legislative history and the plain statutory language before us, our conclusion is mandated. ",
"See Cohen v. State, 121 Ariz. 6, 9, 588 P.2d 299, 302 (1978) (\"[A] court should avoid legislating a particular result by judicial construction.",
"\").[8]\n\nUnjust Enrichment\n¶ 30 Fearnow's alternative theory of recovery, unjust enrichment, also fails. \"",
"Unjust enrichment occurs when one party has and retains money or benefits that in justice and equity belong to another.\" ",
"Trustmark Ins. ",
"Co. v. Bank One, Ariz., N.A., 202 Ariz. 535, 541, ¶ 31, 48 P.3d 485, 491 (App.2002). ",
"In the present case, RSCE has not been unjustly enriched.",
"\n¶ 31 Here, RSCE has not retained anything that belongs to Fearnow. ",
"Fearnow still owns his share in the professional corporation. ",
"Accordingly, he may exercise all shareholder rights afforded by the Professional Corporation Act. ",
"See A.R.S. § 10-2202; A.R.S. §§ 10-001 to -1702 (2004). ",
"Although Fearnow's share may be less valuable now that he has left the firm,[9] he cannot claim that he is left with fewer shareholder rights.",
"\n\nCONCLUSION\n¶ 32 For the foregoing reasons, we affirm the trial court's ruling that the Shareholder Agreement is void, but reverse the order requiring that RSCE purchase the share from Fearnow pursuant to the Act.",
"\nCONCURRING: MAURICE PORTLEY, Presiding Judge and DONN KESSLER, Judge.",
"\nNOTES\n[1] Arizona Revised Statutes (\"A.R.S.\") §§ 10-2201 to -2249 (2004).",
"\n[2] Although not at issue in this matter, the trial court also found invalid § 3(b) of the Agreement, governing \"Retirement\" of a stockholder. ",
"This provision initially required that RSCE repurchase a Stockholder's Share upon his or her retirement. ",
"However, it required a Stockholder who had retired and then resumed the private practice of law within five years to repay RSCE any amounts received for that Share, plus 10% interest.",
"\n[3] ER 1.0 defines \"partner\" as both a member of a partnership and a shareholder in a law firm organized as a professional corporation. ",
"Rule 42, Ariz. R. Sup.",
"Ct.",
"\n[4] Subsection (a) of ER 5.6 was amended on June 9, 2003, effective December 1, 2003, to read:\n\nA lawyer shall not participate in offering or making:\n(a) a partnership, shareholders, operating, employment, or other similar type of agreement that restricts the right of a lawyer to practice after termination of the relationship, except an agreement concerning benefits upon retirement....\n[5] In Valley Medical, the Arizona Supreme Court analyzed a restrictive covenant between Steven Farber, a doctor, and the professional corporation where he worked, Valley Medical Specialists (\"Valley Medical\"). ",
"That covenant precluded Dr. Farber from competing with Valley Medical for three years within a five mile radius of any of the corporation's offices, and also prohibited him from asking any present or future patients of Valley Medical to leave Valley Medical, from disclosing the identity of those patients to other Valley Medical competitors, and from providing medical care to any of Valley Medical's former patients. ",
"Id. at 365, ¶ 3, 982 P.2d at 1279. ",
"The agreement allowed Valley Medical to obtain an injunction against Dr. Farber, as well as liquidated damages, for any violation of those restrictions. ",
"Id. Accordingly, the agreement restricted Dr. Farber's right to practice medicine.",
"\n[6] RSCE also argues that Fearnow cannot claim a breach of the Ethical Rules in order to avoid a contractual obligation that he advocated, and from which he benefitted. ",
"Even accepting that as true, however, we refuse to enforce a contract that is void as against public policy. ",
"Western Corrections Group, Inc. v. Tierney, 208 Ariz. 583, 589, ¶ 24, 96 P.3d 1070, 1076 (App.2004). ",
"Our refusal to do so is in line with other jurisdictions. ",
"See White v. Medical Review Consultants, Inc., 831 S.W.2d 662, 665 (Mo.Ct.",
"App.1992)(refusing defense of estoppel and unclean hands in action invalidating lawyer contract under ER 5.6); Cohen, 75 N.Y.2d 95, 551 N.Y.S.2d 157, 550 N.E.2d 410(invalidating agreement for public policy reasons even though plaintiff had accepted benefits of agreement for years).",
"\n[7] A.R.S. § 10-909(D) provided:\n\nWithin ninety days following the death, insanity, bankruptcy, retirement, resignation, expulsion or other legal disqualification of a shareholder, all of the shares of such shareholder shall be transferred to or acquired by persons qualified to own such shares or by the corporation. ",
"Until such transfer is effected such shares shall not be entitled to be voted. ",
"Either in its articles of incorporation or its bylaws, the corporation shall fix the price or method of computing the same together with the schedule of payment therefor, for acquiring such shares, in the event the shares are not otherwise acquired within said ninety days by person qualified to own the same.",
"\n[8] Of course, nothing prevents a professional corporation from providing for the repurchase of a resigning shareholder's shares. ",
"Today we merely hold that there is not a remedy under the Act that provides for the mandatory repurchase of such shares as long as the departing shareholder remains licensed.",
"\n[9] Fearnow may \"well be left in the unfortunate position of owning unmarketable shares of stock,\" but this is \"generally true of the minority shareholders in all close corporations.\" ",
"Corlett, 478 So.2d at 834.",
"\n"
] | {
"pile_set_name": "FreeLaw"
} | [
0.0006809092010371387,
0.0013785817427560687,
0.0007737022824585438,
0.0006398847326636314,
0.0006001461297273636,
0.0005926791345700622,
0.0009053731337189674,
0.0006756387301720679,
0.0006582584464922547,
0.0006815880187787116,
0.000639307196252048,
0.000598912185523659,
0.0006182562792673707,
0.0008397759520448744,
0.0005732414429076016,
0.0007541558588854969,
0.0006075099227018654,
0.0005989299388602376,
0.0006664339452981949,
0.0030310782603919506,
0.0012790015898644924,
0.0007213269709609449,
0.0006179555202834308,
0.0007127363351173699,
0.0007622255943715572,
0.0005749913398176432,
0.0006199166527949274,
0.0008289669058285654,
0.0008462115656584501,
0.0009133692947216332,
0.0006804888253100216,
0.000694469956215471,
0.0006767667946405709,
0.0005659827729687095,
0.0006493660621345043,
0.0006279703811742365,
0.0007563351537100971,
0.0005923157441429794,
0.0006263013347052038,
0.0005902489647269249,
0.0013100516516715288,
0.002791391219943762,
0.001092548482120037,
0.0006949883536435664,
0.0006079382728785276,
0.000911644718144089,
0.0007211406482383609,
0.0005632193642668426,
0.0007871613488532603,
0.0006742174737155437,
0.0006332786870189011,
0.0006205328973010182,
0.0006472032982856035,
0.0006272831233218312,
0.000659531622659415,
0.000629972608294338,
0.0006261763046495616,
0.0007212551427073777,
0.0006328446324914694,
0.0008127192850224674,
0.0008024589624255896,
0.0007519738865084946,
0.0006589244585484266,
0.0005688613164238632,
0.0007670928607694805,
0.0008187348721548915,
0.0005540406564250588,
0.000895390403456986,
0.0006844406598247588,
0.0005851851310580969,
0.0007236937526613474,
0.0008010765304788947,
0.0005943906726315618,
0.0006217011250555515,
0.0006939141894690692,
0.0006004244787618518,
0.0007228270405903459,
0.0006266359705477953,
0.000615604454651475,
0.0007545113912783563,
0.0006152211572043598,
0.000619575846940279,
0.0009287635330110788,
0.0006695843185298145,
0.0007778058061376214,
0.0006986706866882741,
0.0007331936503760517,
0.0006671014707535505,
0.0006704048719257116,
0.0006989907124079764,
0.0006208866834640503,
0.0006596067687496543,
0.06794113665819168,
0.0006545752403326333,
0.0006327101145870984,
0.0006858118576928973,
0.0006449438515119255,
0.0007041230564936996,
0.0006446897168643773,
0.000627105007879436,
0.0006026616320014,
0.0005795882316306233,
0.0007402801420539618,
0.0005461346008814871,
0.0006005684845149517,
0.0006195764290168881,
0.0005971361533738673,
0.0005506749148480594,
0.0006631045835092664,
0.0009391900966875255,
0.0021750188898295164,
0.0006435145041905344,
0.0005813451134599745,
0.0008214089320972562,
0.0013785817427560687,
0.0016753663076087832,
0.0008438049117103219,
0.0005530113121494651,
0.0005729614640586078,
0.0006520467577502131,
0.0006840168498456478,
0.0007319492870010436,
0.0006596124148927629,
0.02222881093621254,
0.0006269630393944681,
0.1575821489095688,
0.0006126652588136494,
0.0008209554362110794,
0.0022664410062134266,
0.000560908520128578,
0.0008297390304505825,
0.0010726930340752006,
0.000706179067492485,
0.0007672419887967408,
0.0005998474080115557,
0.001806981978006661,
0.0006625326350331306,
0.005897142458707094,
0.0006094144191592932,
0.0008598725544288754,
0.0005989079363644123,
0.0014978095423430204,
0.0006532662082463503,
0.0006408938788808882,
0.001453895354643464,
0.0006219524657353759,
0.0009005200117826462,
0.0006665520486421883,
0.0007719090208411217,
0.0006778699462302029,
0.0005423992406576872,
0.0006398838013410568,
0.0008702831692062318,
0.0006643073866143823,
0.0006629342678934336,
0.0007078207563608885,
0.0006295606144703925,
0.0008790720021352172,
0.0007277288241311908,
0.0005841856473125517,
0.0006012583035044372,
0.0006673762109130621,
0.0005794065073132515,
0.0006548950914293528,
0.0005968741024844348,
0.0006174875306896865,
0.0007109023281373084,
0.0007271088543348014,
0.0006311348988674581,
0.0007817530422471464,
0.0010726930340752006,
0.0005984380841255188,
0.000870050978846848,
0.0007258583791553974,
0.0006878583808429539,
0.0012759342789649963,
0.0007241653511300683,
0.0007315737893804908,
0.000731730367988348,
0.0007652689819224179,
0.0007538555073551834,
0.0008273921557702124,
0.0007657869136892259,
0.0007038081530481577,
0.000607044028583914,
0.0006692439201287925,
0.0006219687638804317,
0.0007069086423143744,
0.0008105271263048053,
0.001995444530621171
] | 0.002094 | 190 |
[
"If you're new here, you may want to subscribe to this blog via e-mail or my RSS feed . ",
"I also am on Twitter . ",
"Thanks for visiting!",
"\n\nGary Stager says:\n\nThere are three competing visions of educational computing. ",
"Each bestows agency on an actor in the educational enterprise. ",
"We can use classroom computers to benefit the system, the teacher, or the student. ",
"Data collection, drill-and-practice test-prep, computerized assessment, or monitoring Common Core compliance are examples of the computer benefitting the system. “",
"Interactive” white boards, presenting information or managing whole-class simulations are examples of computing for the teacher. ",
"In this scenario, the teacher is the actor, the classroom a theatre, the students the audience and the computer is a prop.",
"\n\nThe third vision is a progressive one. ",
"The personal computer is used to amplify human potential. ",
"It is an intellectual laboratory and vehicle for self-expression that allows each child to not only learn what we’ve always taught, perhaps with greater efficacy, efficiency or comprehension. ",
"The computer makes it possible for students to learn and do in ways unimaginable just a few years ago. ",
"This vision of computing democratizes educational opportunity and supports what Papert and Turkle call epistemological pluralism. ",
"The learner is at the center of the educational experience and learns in their own way.",
"\n\nToo many educators make the mistake of assuming a false equivalence between “technology” and its use. ",
"Technology is not neutral. ",
"It is always designed to influence behavior. ",
"Sure, you might point to an anecdote in which a clever teacher figures out a way to use a white board in a learner-centered fashion or a teacher finds the diagnostic data collected by the management system useful. ",
"These are the exception to the rule.",
"\n\nWhile flexible high-quality hardware is critical, educational computing is about software because software determines what you can do and what you do determines what you can learn. ",
"In my opinion the lowest ROI comes from granting agency to the system and the most from empowering each learner. ",
"You might think of the a continuum that runs from drill/testing at the bottom; through information access, productivity, simulation and modeling; with the computer as a computational material for knowledge construction representing not only the greatest ROI, but the most potential benefit for the learner.",
"\n\nPiaget reminds us,“To understand is to invent,” while our mutual colleague Seymour Papert said, “If you can use technology to make things, you can make more interesting things and you can learn a lot more by making them.”",
"\n\n….",
"\n\nkindergarteners could build, program and choreograph their own robot ballerinas by utilizing mathematical concepts and engineering principles never before accessible to young children. ",
"Kids express themselves through filmmaking, animation, music composition and collaborations with peers or experts across the globe. ",
"5th graders write computer programs to represent fractions in a variety of ways while understanding not only fractions, but also a host of other mathematics and computer science concepts used in service of that understanding. ",
"An incarcerated 17 year-old dropout saddled with a host of learning disabilities is able to use computer programming and robotics to create “gopher-cam,” an intelligent vehicle for exploring beneath the earth, or launch his own probe into space for aerial reconnaissance. ",
"Little boys and girls can now make and program wearable computers with circuitry sewn with conductive thread while 10th grade English students can bring Lady Macbeth to life by composing a symphony. ",
"Soon, you be able to email and print a bicycle. ",
"Computing as a verb is the game-changer.",
"\n\nUsed well, the computer extends the breadth, depth and complexity of potential projects. ",
"This in turn affords kids with the opportunity to, in the words of David Perkins, “play the whole game.” ",
"Thanks to the computer, children today have the opportunity to be mathematicians, novelists, engineers, composers, geneticists, composers, filmmakers, etc… But, only if our vision of computing is sufficiently imaginative."
] | {
"pile_set_name": "OpenWebText2"
} | [
0.000682007463183254,
0.0007615112117491663,
0.000617090379819274,
0.000636710727121681,
0.0005783000960946083,
0.000705558224581182,
0.0005959821864962578,
0.0006993717979639769,
0.0010132795432582498,
0.0005923411808907986,
0.0007749984506517649,
0.000700869713909924,
0.0006367589812725782,
0.000643317005597055,
0.0007522513042204082,
0.0007117799250409007,
0.0007182330009527504,
0.0007053568260744214,
0.0006382743595167994,
0.0008523932192474604,
0.0006042372551746666,
0.0007445839582942426,
0.0005594207905232906,
0.0006349379546009004,
0.0011045223800465465,
0.002117220079526305,
0.0006515826680697501,
0.0006720043020322919,
0.018827660009264946,
0.0016709499759599566,
0.0006999392644502223,
0.0009575615986250341,
0.000572836201172322,
0.0011003671679645777,
0.0006728922598995268
] | 0.001303 | 35 |
[
"FROM ubuntu:16.04\n\nCOPY common.sh /\nRUN /common.sh\n\nCOPY cmake.sh /\nRUN /cmake.sh\n\nCOPY xargo.sh /\nRUN /xargo.sh\n\nCOPY qemu.sh /\nRUN apt-get install --assume-yes --no-install-recommends \\\n gcc-arm-none-eabi \\\n libnewlib-arm-none-eabi && \\\n /qemu.sh arm\n\nENV QEMU_CPU=cortex-m4 \\\n CARGO_TARGET_THUMBV7EM_NONE_EABIHF_RUNNER=qemu-arm\n"
] | {
"pile_set_name": "Github"
} | [
0.009202302433550358
] | 0.009202 | 1 |
[
"Robust protocol for feeder-free adaptation of cryopreserved human pluripotent stem cells.",
"\nHuman pluripotent stem cells (hPSCs) are conventionally maintained on mouse embryonic fibroblast (MEF) feeder layers. ",
"However, downstream applications, such as directed differentiation protocols, are primarily optimized for feeder-free cultures. ",
"Therefore, hPSCs must often be adapted to feeder-free conditions. ",
"Here we propose a novel feeder-free adaptation protocol using StemFlex medium, which can be directly applied to thawed hPSC lines.",
"The direct feeder-free adaptation protocol using StemFlex culture medium on Geltrex coating led to robust hPSC cultures in approximately 2 weeks. ",
"This approach was tested with three human embryonic stem cell (hESC) lines. ",
"All lines were confirmed to be pluripotent, expressing POU5F1, SOX2, and NANOG. ",
"No chromosomal imbalances were induced by the feeder-free adaptation.",
"StemFlex medium enabled the efficient adaptation of hPSCs to feeder-free conditions directly after thawing. ",
"This protocol is easy to implement in laboratories that perform feeder-free cultures, allowing more convenient adaptation and more robust expansion of cryopreserved hPSCs, even in cases when sample quality is low or unknown."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0006587398238480091,
0.0009495952981524169,
0.00055834767408669,
0.0005845315172336996,
0.0005470377509482205,
0.0005394197069108486,
0.0005911351181566715,
0.0008574306848458946,
0.0007313448004424572,
0.0005834227777086198,
0.0005679189343936741
] | 0.000652 | 11 |
[
"Q:\n\nPost revision shows a different user edited the answer\n\nI've just stumbled across this answer, which shows Jeff as the last editor, \n\nBut, when I view the revision history it displays deceze as the editor.",
"\n\nSo, who's the real editor here? (",
"Is this a bug?)",
"\n\nA:\n\nIt's unlikely to be a bug... it's probably Jeff hacking the DB in the early days of SO. ",
"I'd guess that he deleted a revision from the PostHistory table but didn't backfill the change to the denormalised version in the Posts table that's (probably) used to render the question page.",
"\nData.",
"SE (probably) confirms this hypothesis. ",
"The LastEditorUserId in the Posts table is Jeff; but the only edit in the PostHistory table is deceze's.",
"\nI'd only call this a bug in that there's nothing to confirm consistency between the data that states the official truth and the data that's been denormalised for display. ",
"Whether you want this is a balance between determining the likelihood of data being incorrect vs. the loss of service if it is vs. the amount of system resources necessary to ensure the denormalised data is correct. ",
"My checks run daily :-).",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0005985714960843325,
0.0008187780622392893,
0.0018336049979552627,
0.0008321991772390902,
0.0006245708791539073,
0.0007056516478769481,
0.0006125306827016175,
0.0008298560278490186,
0.0007966783014126122,
0.0006304603302851319,
0.000645842810627073,
0.001995444530621171
] | 0.00091 | 12 |
[
"Teens\n\nWriting a Paper\n\nJeffrey's history teacher assigned a term paper at the beginning of the semester. ",
"Most of the class groaned, but they didn't seem too worried. ",
"Not Jeffrey, though: The thought of having to write a paper made him really anxious. ",
"Because he didn't know where to begin, he put off thinking about the assignment until closer to the due date.",
"\n\nAlthough a lot of students take Jeffrey's \"I'll deal with it later\" approach to writing papers, it's actually better for your stress levels — not to mention grades — to start working on a paper as soon as you find out about it. ",
"With some planning and time, anyone can turn a blank document on a computer screen into a good paper.",
"\n\nWriting a paper can seem intimidating at first. ",
"But putting together a strong paper really just involves a combination of things you already know how to do.",
"\n\nUnderstanding the Assignment\n\nThe first step in writing a paper is to make sure that you understand exactly what your teacher expects. ",
"Here are some questions to ask before you start researching and writing so you can be sure you are on the right track:\n\nWhat type of paper is it? ",
"Is it a report (where you just gather facts and describe a topic), a paper in which you must offer your own ideas on an issue, or both?",
"\n\nAre there specific class readings you must use as sources?",
"\n\nWhat types of sources do you have to use? ",
"Can you use only Internet sources, or do you have to use books, journals, and newspapers too? ",
"Does your teacher like you to interview people, or does he or she prefer you stick only to printed sources?",
"\n\nAre there certain types of sources that are off-limits? ",
"Obviously, blogs and personal web pages aren't considered reliable sources. ",
"But what about other websites you might want to use? ",
"Find out what your teacher thinks about your sources before you start work.",
"\n\nWhat will your teacher look for while grading your paper? ",
"For example, is your teacher looking for a casual, descriptive writing style (like a magazine article) or a research paper with a more formal tone? ",
"Is there a certain way your teacher wants you to structure your paper?",
"\n\nHow long should the paper be (how many pages or words)?",
"\n\nDoes the paper have to be typed or presented in a certain form (such as double-spaced lines, specific margins, presented in a binder)? ",
"Are there additional graphics that you also have to provide, such as illustrations or photos?",
"\n\nDo you have to provide a bibliography, footnotes, or other list of sources?",
"\n\nSometimes a teacher will assign a topic or thesis for a paper, and sometimes he or she will leave it up to students to pick their own topics (of course these have to be related to the class or subject!).",
"\n\nIf the teacher lets you choose your own topic, it's best to write a paper about something that you find really interesting. ",
"This might be an issue that you feel strongly about and want to defend (or one you disagree with and want to argue against!). ",
"After you come up with your topic, run it by your teacher before you move on to the next step — research.",
"\n\nResearching a Topic\n\nBehind every good paper is even better research. ",
"Good research means reading a lot — both as background to help you choose a topic and then to help you write your paper.",
"\n\nDepending on your chosen topic, your research could come from class textbooks, newspapers, professional journals, and websites. ",
"These are known as your sources.",
"\n\nSources need to be reliable. ",
"To find good sources, begin at your school library, where the card catalogs and search engines can direct you to materials that have been published. ",
"When a source has been chosen for your school's library collection, you can be fairly confident that it's accurate enough to use in your paper.",
"\n\nUsing Online Sources\n\nWhen doing online research, avoid people's personal pages — it's impossible to tell if the person is an expert or just sounding off. ",
"It's best to focus your research on government sites (their domain names end in .gov), non-profit organizations (they usually end in .org), and educational sites (.edu).",
"\n\nKnowing which sources are considered good — and which ones aren't — is a skill that everyone gains with experience. ",
"Get your teacher or librarian's help in deciding if a source is credible.",
"\n\nIf you don't understand what a particular source is talking about, ask your teacher what it means so you can better understand the material. ",
"Teachers can usually tell when students use information in their papers that they don't really understand.",
"\n\nKeeping Track of Sources\n\nOnce you've found a good source, make a note of it so that you can use it for your paper. ",
"Keep a notebook or computer document that has the source's title, the page number of the important information, and a few notes about why it's important. ",
"This will help you move ahead efficiently as you write. ",
"It will also help you to cite your sources correctly (more on this later).",
"\n\nWriting Your Paper\n\nThe great part about doing lots of research is that when you really know your topic, writing about it becomes easier. ",
"Still, sitting with a blank computer screen in front of you and a deadline looming can be pretty intimidating. ",
"Even if you've read countless books, websites, and journals, and have all your notes prepared, it's normal to struggle with exactly how to get started on the actual writing.",
"\n\nThe best way to begin? ",
"Just start putting ideas down on paper! ",
"The first few words don't have to be perfect (and there's a good chance they won't be) but you'll find it gets easier after you've started. ",
"And you can always revise the actual writing later — the important thing is getting your ideas down on paper. (",
"You may have learned this approach in elementary school as writing a \"web.\") ",
"After your ideas are on paper, you can start outlining them.",
"\n\nSome people like to think of their first writing attempt as a \"first draft,\" taking the pressure off of themselves to write every sentence and line perfectly. ",
"Another good tip for getting started is to write down your ideas like you're telling your parent, brother, or sister about them.",
"\n\nDon't feel that you have to write a paper in order. ",
"If you know how you want to prove your thesis, for instance, but don't know how to introduce it, you could write some or all of the supporting paragraphs before doing the introduction.",
"\n\nMost people make revisions while they're working. ",
"For example, you may be halfway through writing paragraph four when you realize there's a better way to argue the point you made back in paragraph two. ",
"This is all part of the thinking process. (",
"And it's a good reason to leave plenty of time to do your paper rather than putting it off until the last minute!)",
"\n\nIt's also a good idea to leave enough time after finishing a paper to put it aside for a few days and then go back to make revisions. ",
"Revising a paper is a step that even the best writers think is essential. ",
"When you haven't worked on your paper for a few days, any flaws or problems will stand out more: Look for things like unnecessary words, sentences that don't make sense, and points that don't follow on from or support each other.",
"\n\nCiting Your Sources\n\nYour teacher will probably want you to cite your sources (which means list the sources you used for ideas, statements, and other information in your paper). ",
"Sources can be cited in different ways — such as endnotes, footnotes, or a bibliography. ",
"Each teacher has different preferences so ask yours for guidance.",
"\n\nCitation not only shows that a paper is well researched, it also lets the reader know which ideas came from your mind and which ideas came from someone else's. ",
"The only time it's OK not to use a citation is if the content is common knowledge (like the date of a well-known battle) or if the idea is your own.",
"\n\nCiting sources is important because it can help you avoid something called plagiarism. ",
"Plagiarism is using someone else's ideas or words without giving that person proper credit for creating them. ",
"The most common ways students plagiarize are copying, quoting, or summarizing from a source without properly citing where the information came from.",
"\n\nPlagiarism is a form of cheating — just like looking over someone's shoulder to copy answers during a test. ",
"But many people who plagiarize don't realize they're doing it. ",
"That's why it's so important to keep track of sources. ",
"After weeks of research, the average student will have a hard time remembering what points he or she came up with and what points came from sources. ",
"Teachers usually are tough on plagiarism — even if the student didn't mean to plagiarize. ",
"So keep good notes on your sources!",
"\n\nDealing with Paper Stress\n\nKnowing they have a paper to write can be stressful for many students. ",
"To avoid becoming overwhelmed, take these two simple steps:\n\nStart as soon as the paper is assigned. ",
"That way you'll have plenty of time for unexpected events — such as research that takes longer than you think or realizing you don't really like the topic you chose and need to come up with another.",
"\n\nBreak the paper down into manageable \"mini-projects.\" ",
"Your first is brainstorming an idea or topic, the next task is doing research, then comes writing the paper, and after that you'll revise it. ",
"Figure out how much time you'll need for each \"mini-project\" — this will not only help you feel more in control, it will also give you an idea of how much time the overall paper will take, from research to finished product.",
"\n\nWriting papers is a learning exercise — that's why teachers assign them! ",
"Most teachers don't expect you to do it perfectly all by yourself. ",
"Even college students head to their professors after class for help. ",
"If you need help — anywhere from the brainstorming to understanding difficult material to the writing — don't be afraid to talk to your teacher."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0007139456574805081,
0.0007162808324210346,
0.0006959559977985919,
0.0006903318571858108,
0.0006221890216693282,
0.0005814869655296206,
0.0005650733946822584,
0.000582766137085855,
0.0006088530062697828,
0.0005761039210483432,
0.0006322956760413945,
0.0006919960724189878,
0.0007265962776727974,
0.0007540156948380172,
0.0027216996531933546,
0.0006836039829067886,
0.0007700558053329587,
0.0006130580441094935,
0.0013198546366766095,
0.0009897673735395074,
0.0006514718406833708,
0.0007960352231748402,
0.0008495753863826394,
0.0006248316494747996,
0.0006107736262492836,
0.0007414776482619345,
0.0006596771418116987,
0.0005726011586375535,
0.0006595580489374697,
0.0008162269950844347,
0.0005678528686985373,
0.0005155240651220083,
0.0005580954602919519,
0.0006669177091680467,
0.0005954442312940955,
0.0005486112786456943,
0.0005414294428192079,
0.0008763874066062272,
0.000565943366382271,
0.0005732182180508971,
0.0008965893648564816,
0.000649884925223887,
0.0007155777420848608,
0.0005638349102810025,
0.0006043657194823027,
0.0005514540825970471,
0.0005369008868001401,
0.0005627447389997542,
0.0008367709233425558,
0.0005794885219074786,
0.0006222142255865037,
0.0019068714464083314,
0.0006212785374373198,
0.0006445343024097383,
0.0005657607689499855,
0.0005823247483931482,
0.0007596782525070012,
0.0009216750622726977,
0.0008670353563502431,
0.0005406404379755259,
0.0005461195250973105,
0.0005508296890184283,
0.0005782443913631141,
0.0007123102550394833,
0.0005406290874816477,
0.0006312119076028466,
0.0006516820867545903,
0.0005981070571579039,
0.00053197774104774,
0.0005913390778005123,
0.0006904444308020175,
0.0007671384373679757,
0.0006705271662212908,
0.001449880190193653,
0.001232124399393797,
0.013244702480733395,
0.002050662413239479,
0.0005855326890014112,
0.0006975133437663317,
0.002453644061461091,
0.0008527737809345126,
0.0006424261373467743,
0.0006060456507839262,
0.0005667060613632202,
0.0007060441421344876,
0.0008115681703202426,
0.0006255285115912557,
0.0013480642810463905,
0.0018561867764219642,
0.0011204407783225179,
0.0014907880686223507
] | 0.000925 | 91 |
[
"High Voter Turnout a Crisis That Calls for Quick Republican Action\n\nThe media klieg lights are always on, but they dim just a tad around the close of the business day Friday. ",
"Everybody's off to happy hour, or making the week's last commute home. ",
"Media consumers take a break to spend time with friends and family, and it may be late in the weekend before they bother to consider issues affecting all society. ",
"So if you're a politician with some nefarious plan or embarassing confession, save it for late Friday -- and who knows? ",
"Maybe by the time Monday rolls around a whole bunch of other stories will have entered the news cycle and your item will be lost, forgotten.",
"\n\nThat clearly was the strategy of Florida House Republicans who had every reason to be ashamed of their effort to overhaul state voter registration laws, six months after voter drives were credited with helping Barack Obama win Florida in the presidential election. ",
"The bill would bar two forms of voter identification that were valid in 2008. ",
"It doesn't address the need for more early voting and longer hours of open polls. ",
"And it was all done lickety split after Republicans stopped what ought to have been a robust debate. ",
"South Florida Democrats are not pleased. ",
"From the article in the St. Pete Times:\n\nThe House Democratic leader, Rep. Franklin Sands, D-Weston, took\nthe floor on a point of personal privilege to condemn the council's\naction. ",
"He said the bill's contents were not made public until late\nThursday night while lawmakers were debating the budget. ",
"Sands asked\nthat the bill be returned to the same committee for more study and\ntestimony.",
"\n\n\"This morning's deliberations failed to meet the Legislature's promise of open and fair government,\" Sands said.",
"\n\nOn Sunday the Times published this furious editorial. ",
"Let's hope this story stays in the news this week."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0007369396043941379,
0.0013203916605561972,
0.0005895635113120079,
0.017880095168948174,
0.0013388379011303186,
0.002125987783074379,
0.0006120600155554712,
0.0007273994851857424,
0.08522085845470428,
0.012523791752755642,
0.0005957265966571867,
0.0006937392754480243,
0.0005755660240538418,
0.0006694031180813909,
0.0009171211277134717,
0.0006647618138231337
] | 0.00795 | 16 |
[
"KarachiSnob.com connects\nyour fine business with quality customers who\nare specifically searching for what you offer.",
"\nReach the right audience, at the right time,\nin the right way... with KarachiSnob.com.",
"Click here to get started."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0006444058963097632,
0.0006617926992475986,
0.0006798746762797236
] | 0.000662 | 3 |
[
"Why palliative care?",
"\nAnd so there we have it in a nutshell--palliative care is about caring. ",
"Caring for those who are dying and for those who look after them and then grieve their loss. ",
"Palliative care has risen like a phoenix from the ashes of neglect and bad management which, until recently, had been the lot of the dying. ",
"Perhaps this new specialty may become a guiding beacon leading a profession, somewhat bewitched and side tracked by its own scientific cleverness, back to the road of caring. ",
"I sincerely hope that as the specialty gains recognition it does not lose its present identify and fine sense of purpose."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.001067425822839141,
0.001720047788694501,
0.019949879497289658,
0.0032322080805897713,
0.0007406488293781877,
0.0005664406926371157
] | 0.004546 | 6 |
[
"Clinical evaluation and treatment of immune-mediated inner ear disease.",
"\nImmune-mediated inner ear disease, first described by McCabe in 1979, typically presents with an idiopathic, rapidly progressive bilateral sensorineural hearing loss. ",
"The course of the hearing loss occurs over weeks to months. ",
"It may occur in both sexes and at a variety of ages, but is most common in middle-aged females. ",
"It may be accompanied by tinnitus, Meniere's-like vertigo, or more commonly, ataxia or unsteadiness. ",
"Approximately 30% of patients will have associated systemic immune-mediated disease. ",
"Although refinements in laboratory tests for specific inner ear antigens are being made, and non-specific laboratory indicators of inflammatory or systemic immune disease may be useful in confirming the diagnosis, the most important diagnostic finding is the improvement in hearing seen with a trial of immunosuppressants. ",
"This report includes a typical evaluation of the patient with suspected immune-mediated inner ear disease and an illustrative case. ",
"Sensorineural hearing loss due to immune-mediated inner ear disease, although unusual as a cause of hearing loss, is important to recognize because early diagnosis and treatment can have a marked effect on the clinical outcome."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0009683144162409008,
0.012077697552740574,
0.0007094573811627924,
0.0014127560425549746,
0.0021136195864528418,
0.0007044184021651745,
0.0006352877826429904,
0.000826394185423851,
0.0009180736960843205
] | 0.002263 | 9 |
[
"Union Max Championship\n\nThe is a professional wrestling championship and the top singles accomplishment in the Japanese promotion Pro-Wrestling Basara, an affiliate and sister promotion of DDT Pro-Wrestling . ",
"The title was established in 2013 in Union Pro Wrestling, a promotion that was revived by DDT in 2005. ",
"Three days after its folding, Union was replaced by a new promotion named Pro-Wrestling Basara, which launched in January 2016.",
"\n\nTitle History\n\nCombined reigns\nAs of ,\n\nSee also\n\nProfessional wrestling in Japan\n\nReferences\n\nCategory:DDT Pro-Wrestling championships"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0010949595598503947,
0.000699960277415812,
0.0007251756615005434,
0.0006910701631568372
] | 0.000803 | 4 |
[
"Heavily funded mobility startup Lime has announced plans to let its users book electric scooters up to 15 minutes in advance.",
"\n\nThe San Mateo-based company, which recently raised a whopping $310 million at a $2.4 billion valuation, is piloting the new reservation feature in a handful of markets around the world, including Brisbane (Australia), Tel Aviv (Israel), and Lyon (France). ",
"It hasn’t said when it will expand the offering to other regions.",
"\n\nTo use the new feature, which is only available in the iOS app for now, users need to tap on their desired scooter on the map, hit the reserve button, and then ensure that they unlock the scooter within the 15 minutes. ",
"During this period, the reserved scooter will not show up for other users in the Lime app, and no one else will be able to unlock it.",
"\n\nDuring the beta period, billing will only begin when the person who has made the reservation unlocks the scooter, though the announcement seems to suggest that there may be an additional charge when — or if — this feature officially rolls out more widely.",
"\n\nWheel deal\n\nElectric scooters emerged as one of the big breakout trends of 2018, and 2019 is already shaping up for more of the same. ",
"Besides Lime’s recent raise, which took its total funding to more than $760 million since inception two years ago, Bird raised another $300 million at a $2 billion valuation, while Sweden’s Voi Technology nabbed a further $30 million.",
"\n\nLime rebranded from LimeBike last year to highlight its focus on multiple mobility options, including electric bikes and car-sharing. ",
"But it is scooters that have taken cities around the world by storm, with Lime now operating in dozens of conurbations across the Americas, Europe, the Middle East, and the Asia-Pacific region.",
"\n\nBeing able to reserve a scooter is an incremental upgrade on the surface, but it makes the service more reliable for the end user — there is nothing more annoying than planning a journey around a scooter that’s located a few blocks away, only to discover that someone else has nabbed it before you got there. ",
"This feature makes the Lime service just that little bit stickier — if a user can guarantee that there will be an available scooter, they are more likely to use the service regularly."
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0007164484704844654,
0.008022668771445751,
0.0005694132414646447,
0.0007498468039557338,
0.000883373199030757,
0.000664949300698936,
0.0006531936232931912,
0.0006525720818899572,
0.0006673920433968306,
0.001282682758755982,
0.000964628008659929,
0.0022747176699340343
] | 0.001508 | 12 |
[
"Hyperkalemia during surgery: is it an early warning of propofol infusion syndrome?",
"\nWe present a case of severe hyperkalemia in a 48-year-old man after short-term infusion of an average dose of propofol. ",
"We suspected that the hyperkalemia in this patient was a sign of propofol infusion syndrome. ",
"The patient was undergoing a video-assisted esophagectomy, for which one-lung ventilation, with air/oxygen, isoflurane, and continuous epidural analgesia was supplemented with propofol infusion. ",
"In the intraoperative period, the patient developed severe hyperkalemia with mild acidosis but no cardiovascular failure. ",
"There were no other evident causes of hyperkalemia as documented by laboratory data. ",
"The procedure was abandoned and the patient was taken to postoperative recovery, where his potassium levels returned to normal at the end of 10 h."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0008541726274415851,
0.0009837890975177288,
0.000777033856138587,
0.001040192204527557,
0.0008837087079882622,
0.0006296226638369262,
0.0007237027166411281
] | 0.000842 | 7 |
[
"Robert Bradshaw (figure skater)\n\nRobert Bradshaw (October 8, 1952 – March 26, 1996) was an American figure skater. ",
"He won gold medals at the 1972 Nebelhorn Trophy and International St. Gervais. ",
"He placed 12th at the 1973 World Championships.",
"\n\nEarly years \nRobert Bradshaw was born to Bob and Freda Bradshaw in Los Angeles, California. ",
"He and his brother Dennis grew up in Sherman Oaks, California. ",
"\n\nBradshaw married Maralee Marrs on Nov 18, 1972. ",
"Together they had a son, Dennis Bradshaw (Den Bradshaw). ",
"In addition to his skating career, he was also a master jeweler and created \"Frith and Bradshaw Jewelers\" with his partner Larry Frith. ",
"Bradshaw died from cancer on March 26, 1996.",
"\n\nSkating career \nBradshaw decided to become a figure skater at the age of eight. ",
"He was coached by Frank Carroll at Van Nuys Iceland in the San Fernando Valley. ",
"He won the silver medal in men's singles at the 1973 U.S. Figure Skating Championships. ",
"He was an alternate on the U.S. men's Olympic figure skating team. ",
"Serious tendonitis in both of his knees and a motorcycle accident forced him to turn professional.",
"\n\nBradshaw was the first figure skater to successfully perform a double axel jump initiated and performed with the arms folded in competition. ",
"This variation of the Axel requires significant height to be able to complete the rotations, rather than the more common technique of performing a lower jump with very fast rotation generated by pulling the arms into the body.",
"\n\nAfter retiring from competition, Bradshaw began teaching at Van Nuys Iceland before being offered a position as head coach at Squaw Valley Olympic Training Center in Tahoe. ",
"After moving his family to Truckee and teaching at Squaw for approximately one year, the former site of the 1960 Winter Olympics roof collapsed after the maintenance company in charge of removing the snow from the building's roof failed to maintain the building. ",
"Bradshaw moved to Sacramento, California and became head coach at Birdcage Ice Arena in Citrus Heights.",
"\n\nResults\n\nReferences\n\nCategory:1954 births\nCategory:1996 deaths\nCategory:American male single skaters"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0007572922040708363,
0.0008517145179212093,
0.0008694054558873177,
0.0006281074602156878,
0.0007877139723859727,
0.0007700040587224066,
0.0008995813550427556,
0.0007409365498460829,
0.0052166106179356575,
0.0007078635389916599,
0.0006409137859009206,
0.0008301708730868995,
0.0007347850478254259,
0.005700504872947931,
0.0007783433538861573,
0.0007694179657846689,
0.0008092062780633569,
0.0011485618306323886,
0.0006989320972934365,
0.0005837634671479464
] | 0.001246 | 20 |
[
"ESSENDON players have been given extra time to respond to ASADA allegations they used banned peptide Thymosin Beta 4.",
"\n\nThe allegations are made in show-cause notices issued last week by ASADA to 34 players on Essendon’s list in 2012.",
"\n\nLawyers for the players requested an extension to the initial 10-day deadline, which expires on Monday, to argue why they should not be placed on the Register of Findings — the trigger for the AFL to begin the process of issuing infraction notices that could lead to two-year bans.",
"\n\nThe date is after a Federal Court directions hearing on June 27 when the Bombers and James Hird will present their case that the joint AFL-ASADA investigation is unlawful. ",
"A final ruling is not expected for several months.",
"\n\nEssendon and the AFLPA called on ASADA to freeze the investigation until after the court case is resolved, but ASADA has not agreed to that request.",
"\n\nYesterday, the AFL Players Association refused to rule out further legal action against ASADA, saying the drug body’s recent actions have been “extremely disappointing”.",
"\n\nIt comes as an explosive email from the AFL to ASADA has been revealed as the reason why Essendon players believed they would escape doping bans.",
"\n\n“I would think in terms of ASADA’s duties ... that they provide that evidence so that we can give them advice based on what, if anything, has been gathered since the interim report.”",
"\n\nPrendergast also commented on the recent report suggesting nine other clubs were being investigated over health and safety matters.",
"\n\n“We were supportive of the AFL’s audit it undertook in relation to talking to all clubs in regards to the practices and procedures they have in place.”",
"\n\n“We are also comfortable with the subsequent steps the AFL have taken to deal with that matter and also the changes that we have worked through with the AFL to the anti-doping code.”",
"\n\nREAD THE AFLPA’S FULL STATEMENT AT THE BOTTOM OF THE PAGE\n\nToday’s developments come after the Herald Sun revealed an explosive email from the AFL to ASADA reveals why Essendon players believed they would escape doping bans.",
"\n\nThe email, also sent to then prime minister Julia Gillard’s office, sheds light on a major split between the AFL and ASADA over a behind-the-scenes agreement struck in February last year.",
"\n\nThe agreement stated that “to provide an immediate level of comfort ... it will be explained to players that under a no fault or negligence defence a player can receive a complete elimination of sanction”.",
"\n\nASADA handed a copy of the agreement to players and talked them through the details on February 20 last year — 15 days after footy’s doping scandal erupted.",
"\n\nSources say the players have since been of the strong belief they were not the focus of the investigation and would escape penalty over Essendon’s 2012 supplements program, owing to “exceptional circumstances” acknowledged in the agreement.",
"\n\nBut in the email from a senior AFL figure, seen by the Herald Sun, it emerges ASADA attempted to alter the agreement two weeks later.",
"\n\nRevelations of the dispute, and the league’s strong backing of the players, comes as the anti-doping agency pushes to ban 34 former and current Bombers who were issued with “show cause” notices last week.",
"\n\nThe email, which was sent on March 7 last year, says: “It is the AFL’s, Essendon Football Club’s (and its players and officials), and the AFL Players’ Association’s clear understanding that the Investigation and any subsequent actions will be conducted in accordance with your Original Statement.",
"\n\n“Further, the AFL, the Essendon Football Club (and its players and officials), and the AFL Players’ Association have all relied upon the Original Statement and the Investigation has commenced and is ongoing on the basis of this reliance.”",
"\n\nPart of the letter front he AFL to ASADA.Source:Supplied\n\nThe second half of the letter from AFL to ASADA.Source:Supplied\n\nThe email shows the extent of dealings between the AFL, ASADA and the Gillard government in the early days of the Essendon investigation.",
"\n\n“The wording released by ASADA on 20 February 2013 (Original Statement) (as detailed in Annexure A to this letter) was extensively negotiated between the AFL and ASADA, and, in our view, is clear on its face and unambiguous,” the email says.",
"\n\nSources say the agreement will be a critical element of the players’ defence to ASADA’s show-cause notices.",
"\n\nEssendon stars and their lawyers are still of the belief that players have not been administered a banned substance, but also that they would escape any sanction if it was discovered they had been deceived, provided they co-operated under the terms of the February agreement.",
"\n\nPlayers were bemused when ASADA chief executive Ben McDevitt last week appeared to suggest six-month suspensions would be available if they came forward and cooperated, which sources said they had done.",
"\n\nThe reliability of the original agreement is believed to have been a discussed at a meeting between players and their lawyers on Monday night.",
"\n\n— with Brendan Lucas\n\nActing AFLPA chief executive Ian Prendergast.",
"Source:News Limited\n\nSTATEMENT FROM ACTING AFLPA BOSS IAN PRENDERGAST:\n\n“Following the serious development of players being issued show cause notices by ASADA, and the subsequent media coverage, I’d like to provide clarity around the current situation and process from here.",
"\n\nThe players met on Monday night and were briefed by their legal team, consisting of AFL Players’ Association lawyers Bernie Shinners and Brett Murphy, in addition to Tony Hargreaves; who are jointly instructing David Grace QC and Ben Ihle of Counsel.",
"\n\nThe players’ legal team has now written to ASADA to request an extension to the 10 day period in which they were asked to respond, and to request a copy of all documents and other materials that ASADA proposes to put to the Anti-Doping Rule Violation Panel in respect of the players.",
"\n\nTo date, the players’ lawyers have not been provided with the evidence which would enable players to respond to the show cause notices, and their requests to be provided with this material have been refused.",
"\n\nThe CEO of ASADA, Ben McDevitt, has publicly urged players to come forward and co-operate with ASADA, and suggested that players may be able to utilise a plea of ‘no significant fault or negligence’, and have their penalties reduced on the basis of ‘substantial assistance’.",
"\n\nIn saying this, Mr. McDevitt seems to be suggesting that players have not fully co-operated with ASADA, yet nothing could be further from the truth. ",
"The players have done nothing but cooperate with ASADA, as they were advised to do by their Association, their club, the AFL and by ASADA officials. ",
"ASADA’s investigators have praised the players, who they considered professional, co-operative and sincere in their efforts to assist the investigation.",
"\n\nIn circumstances where not one player believes he has taken a prohibited substance, and where the players have not been provided the evidence on which ASADA relies to make this claim, why would any player consider the approach that Mr. McDevitt suggests.",
"\n\nASADA, as a model litigant, has a duty to provide players with the evidence to enable them to respond to the show cause notices. ",
"If it refuses to provide this information voluntarily, then the players will be forced to take legal action to ensure that ASADA complies with its model litigant obligations and acts fairly with respect to the players.",
"\n\nThe players’ legal team will also ask ASADA to stay the show cause process, including referral of these matters to the ADRVP, until after the club’s Federal Court action has been concluded.",
"\n\nIt is important to note that this request is not a delaying tactic — the players are, in fact, keen for this matter to be resolved, given the length of time in which this has now dragged on.",
"\n\nHowever, it makes no sense to subject players to the next stage in this process, in circumstances where the club’s legal action may subsequently render the process invalid. ",
"We therefore urge ASADA and the Club to take steps to expedite this process in the Federal Court to finalise this matter at the earliest opportunity.",
"\n\nAgain, the players’ lawyers are yet to be provided any evidence implicating players in a breach of the AFL Anti-Doping Code. ",
"In the absence of any such evidence, questions of ‘defences’ and ‘reduced sanctions’ are premature.",
"\n\nNevertheless, if the evidence does establish a breach of the code, then the steps taken by players to assure themselves that substances administered were compliant with the WADA Code must be taken into account.",
"\n\nThe players took all reasonable steps to ensure that the substances they were to be administered were compliant with the WADA Code, and were provided with written guarantees to this effect. ",
"If it turns out that those substances were not compliant, and the players were deceived by those who they were asked to trust, they should not be punished as a result.”"
] | {
"pile_set_name": "Pile-CC"
} | [
0.0007911963039077818,
0.0007556230993941426,
0.0008010257151909173,
0.0006138242897577584,
0.0005593863897956908,
0.0006218774942681193,
0.0007917627808637917,
0.0006517699221149087,
0.0005522673018276691,
0.0006652427837252617,
0.0005244246567599475,
0.0005466512520797551,
0.0006033041863702238,
0.0005708019016310573,
0.0005994484527036548,
0.0005955571541562676,
0.0005489562172442675,
0.0005726568633690476,
0.0006618638872168958,
0.0005846641142852604,
0.0005725034861825407,
0.0006077882717363536,
0.0005730417906306684,
0.0006661087973043323,
0.0006527972291223705,
0.000702197547070682,
0.0005883084377273917,
0.0008894327329471707,
0.0005451791803352535,
0.0006514678243547678,
0.0005744876689277589,
0.0006552056293003261,
0.0006561211193911731,
0.0006648876005783677,
0.0006597743486054242,
0.0005184198380447924,
0.0007888794061727822,
0.000901617284398526,
0.000640982179902494,
0.0006820987327955663,
0.0005762348300777376,
0.0006579451728612185,
0.0005683730123564601,
0.0008137860568240285,
0.0008119734120555222,
0.0005963848088867962,
0.0005979263805784285,
0.0008438105578534305
] | 0.000651 | 48 |
[
"Tripping at a Nepalese Wedding: cultural exchange in a remote Nepal village\n\nAfter spending the last year teaching English in South Korea, I traveled with my boyfriend David (also a Tripper) around Nepal, India, Thailand, Laos, Malaysia, and Singapore. ",
"In Nepal, we met up with a Tripper named Tika.",
"\n\nTika lives in Kathmandu and runs a trekking company called Adventure Mountain Explore. ",
"He kindly invited us to join him on a family trip to his wife's hometown (a remote village in Ghorka), to attend his brother-in-law's traditional wedding ceremony and celebration. ",
"It was an almost surreal experience. ",
"I had never pictured myself taking some of the craziest bus rides of my life to a wedding in a village that had previously been visited by only one other foreigner.",
"\n\nTika's family and the villagers in his wife's hometown were incredibly warm and welcoming. ",
"I think we must have met every member of the community over the three days we were there. ",
"We stayed with a neighbor who I bonded with despite the language barrier between us.",
"\n\nThe meal we shared the day after the ceremony was one of the most memorable I've had during my travels. ",
"We looked on as two goats were killed and butchered for lunch. ",
"As the meal was prepared for the entire village we played cards and drank Nepali tea with some of the local men and Tika. ",
"When lunch was ready they lined up plates in an L-shape on the grass for us to eat. ",
"We ate in shifts; when one person finished somebody else would come and fill their spot. ",
"Several women walked around giving second helpings of rice, mutton (goat) curry, and vegetables.",
"\n\nI don't think either of us have ever danced so much. ",
"The musicians, children, and women called on us to dance at every opportunity and we couldn't say no. ",
"Somebody would sing a short snippet of a song we named Jim Jim (not sure the real name) and then the trumpets would start and we would begin dancing. ",
"Watching the women of the village in their rich red clothes singing the Jim Jim song to us is one moment I will never forget.",
"\n\nI hope one day Tika and his family visit us wherever we settle down (somewhere in the U.S.?). ",
"In the meantime, David and I are continuing our travels and very much looking forward to our next Tripping adventure!",
"\n\nWant to know more about Danielle's adventures Tripping at a Nepalese wedding? ",
"Connect with her via her Tripping profile and follow her adventures via her blog.",
"If you're in Nepal, you can Trip with Tika. ",
"Click here to connect with him via his Tripping profile and here to visit his trekking company site.",
"\n\nAbout\n\nTripping is the world's largest search engine for vacation rentals. ",
"Compare top rental sites at once to get the best deal on your next trip. ",
"With over 2.5 MILLION vacation homes and short-term rentals on Tripping, you're sure to find the perfect place to stay."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0005844463012181222,
0.000695591326802969,
0.0009101289906539023,
0.0005341267096810043,
0.0006116835866123438,
0.012526982463896275,
0.0005284786457195878,
0.0005065260920673609,
0.0005870634922757745,
0.0005398754728958011,
0.044947102665901184,
0.0007645359728485346,
0.0010384648339822888,
0.0007320072036236525,
0.0029678307473659515,
0.0014602766605094075,
0.0016198448138311505,
0.0011894912458956242,
0.002062495332211256,
0.0006901727174408734,
0.0006692222668789327,
0.0006380395498126745,
0.0006765784928575158,
0.0009364607976749539,
0.0006116045988164842,
0.0008676249999552965,
0.0005881523247808218,
0.0007662209100089967
] | 0.002902 | 28 |
[
"Floodwaters turned two northern California wine country communities into islands reachable only by boat began on Wednesday, swamping thousands of homes and businesses.",
"\n\nA Guerneville neighborhood sits in floodwaters on 27 February 2019\n\nThe Russian river in wine country north of San Francisco crested at more than 46ft (14 meters) on Wednesday night, Sonoma county officials said. ",
"The river frequently floods in rainy weather but it had not reached that level in 25 years.",
"\n\nAn estimated 2,000 buildings became inundated, mainly in and around the community of Guerneville.",
"\n\n“Guerneville has essentially become an island,” the Sonoma county spokeswoman, Briana Khan, said.",
"\n\nA woman with a dog sails a kayak on a flooded street in Guerneville on 27 February 2019\n\nMailboxes sit underwater in a flooded neighborhood in Forestville.",
"\n\nJeff Bridges, a hotel co-owner who is president of the Russian River Chamber of Commerce, spent the day canoeing through Guerneville and gave a ride to a couple and their dog who were stranded in a low-lying apartment.",
"\n\nFive people whose homes were flooded were bunking down at his two-bedroom home, Bridges said.",
"\n\n“We saw quite a few fish swimming by my front porch,” he said.",
"\n\nThe flood was the fourth Bridges has experienced in 33 years and the locals took the disaster calmly.",
"\n\n“It’s the price you pay to live in paradise,” he said. “",
"Buffalo, New York, puts up with blizzards. ",
"Miami and Houston put up with hurricanes … we have floods.”",
"\n\nHomes and businesses sit under water in a flooded neighborhood of Guerneville.",
"\n\nLeft: the top of a pickup truck peeks out from under flood waters in Forestville.",
"\n\nRight: a military vehicle sits on a bridge over the Russian river in Guerneville.",
"\n\nNo injuries were reported in the Guerneville area and by Wednesday night the rain had eased, but about 3,500 people in two dozen river communities remained under evacuation orders.",
"\n\nIn addition, two sewage treatment plants were not working, leading to concerns about potential sewage spills.",
"\n\nWorkers of the Pacific Gas & Electric utility company are seen on a flooded street in Forestville.",
"\n\nThe water began receding on Thursday but is not expected to return to the river’s banks until later in the day.",
"\n\nThe river was one of several in northern California that was engorged by days of rain from western US storms. ",
"The weather system also dumped heavy snow in the Sierra Nevada, throughout the Pacific north-west and into Montana.",
"\n\nRyan Lance and Anthony Nash of the Russian River fire protection district swift water rescue team help evacuate residents in lower Guerneville."
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0006252963794395328,
0.0006312019540928304,
0.0006108924280852079,
0.0008213436231017113,
0.0007247621542774141,
0.0006647979025729001,
0.0007647104794159532,
0.0008458062075078487,
0.0008510683546774089,
0.0006798406247980893,
0.013145992532372475,
0.0022644815035164356,
0.000899278384167701,
0.0005785729736089706,
0.0006850427016615868,
0.0006113708950579166,
0.0006364668370224535,
0.0007639628602191806,
0.000650388072244823,
0.000662673672195524,
0.0006716707721352577,
0.0008454097551293671,
0.0006185247329995036
] | 0.001315 | 23 |
[
"---\nabstract: 'We investigate quantum interrogation techniques which allow imaging information about semi-transparent objects to be obtained with lower absorption rates than standard classical methods. ",
"We show that a gain proportional to $\\log N$ can be obtained when searching for defects in an array of $N$ pixels, if it is known that at most $M$ of the pixels can have transparencies different from a predetermined theoretical value. ",
"A logarithmic gain can also be obtained when searching for infrequently occurring large structures in arrays.'",
"\naddress: |\n ${}^1$ Hewlett-Packard Laboratories, Filton Road,\\\n Stoke Gifford, Bristol BS34 8QZ, U.K.\\\n ${}^3$ Centre for Quantum Computation, Clarendon Laboratory,\\\n Department of Physics, University of Oxford, Parks Road,\\\n Oxford OX1 3PU, U.K. \nauthor:\n- 'Adrian Kent${}^{1,2}$ and David Wallace${}^3$'\ndate: February 2001\ntitle: 'Quantum Interrogation and the Safer X-ray'\n---\n\n\\#1[\\#1|]{} \\#1[| \\#1]{} \\#1[\\#1 |]{} \\#1[| \\#1]{} \\#1\\#2[ \\#1 | \\#2 ]{} \\#1[ \\#1 ]{} \\#1\\#2[ \\#1 , \\#2 ]{} § \\#1[[**Lemma$~#1$**]{} ]{} \\#1[[**Theorem$~#1$**]{} ]{} \\#1[[**Corollary$~#1$**]{} ]{} [[v]{}]{}\n\n${}^2$ On leave from DAMTP, University of Cambridge, Silver Street, Cambridge CB3 9EW, U.K.\n\n[2]{}\n\nIntroduction\n============\n\nThe well-known Elitzur-Vaidman quantum interrogation scheme[@ev] uses interferometry in a way which sometimes allows photo-sensitive objects to be detected without absorbing a photon. ",
"In EV’s original example, starting from a mixed supply of “good” bombs that will explode if a single photon hits the trigger and of dud bombs which reflect photons without exploding, a guaranteed supply of unexploded good bombs can be produced. ",
"EV’s probabilistic scheme was significantly refined by Kwiat et al.[@kwiatetal], who showed that the probability of absorption-free detection of a photo-sensitive object can be made arbitrarily close to one by a quantum Zeno interferometry technique.",
"\n\nThese schemes both distinguish perfectly opaque from perfectly transparent (or, in the original formulation, perfectly reflecting) objects. ",
"They inspired the hope that effectively absorption-free quantum interrogation methods could also be used to discriminate semi-transparent objects of different transparencies. ",
"Such absorption-free discrimination, if possible, would be of great practical value. ",
"It could, for example, allow a “safe X-ray”, in which images of a patient’s internal structure could be obtained with arbitrarily low absorption of harmful X-rays.",
"\n\nIn fact, though, the Kwiat et al. ",
"quantum Zeno technique does not allow absorption-free discrimination between partially opaque objects[@kwiatscripta]. ",
"More generally, Mitchison and Massar have shown[@mm] that there is a non-zero bound on the probabilities of absorption involved in any scheme discriminating between two imperfectly opaque objects.",
"\n\nThe Mitchison-Massar bound might be taken as dampening hope of finding any seriously valuable imaging applications of quantum interrogation other than discriminating a partially opaque and a completely transparent object. ",
"However, such pessimism would be unjustified. ",
"We describe here two quantum interrogation schemes which show that quantum information can indeed be used to extract imaging information about semi-transparent objects with significantly reduced absorption rates. ",
"Though the safe X-ray is impossible, a somewhat safer X-ray is viable, at least in theory.",
"\n\nWe represent the object to be imaged as an array of $N$ pixels, labelled by $i$ from $1$ to $N$, with transparencies $\\alpha_i$ for the relevant radiation. ",
"That is, the interaction between a photon and the $i$-th pixel is described by $$\\ket{ \\gamma^{\\rm in}_i } \\ket{i} \\rightarrow \\alpha_i \n\\ket{ \\gamma^{\\rm out}_i } \\ket{i} + \n\\beta_i \\ket{ i^* } \\, ,$$ where $\\ket{ \\gamma^{\\rm in}_i } $ and $\\ket{ \\gamma^{\\rm out}_i}$ describe incoming and outgoing photons in a beam passing through the $i$-th pixel, $\\ket{i}$ is the initial state of the $i$-th pixel, $\\ket{ i^* }$ is the excited state of the $i$-th pixel after absorbing a photon, and $ | \\alpha_i |^2 + | \\beta_i |^2 = 1$, with $ 0 \\leq | \\alpha_i | \\leq 1 $.",
"\n\nOur aim is to extract useful imaging information about the pixel array transparencies while minimizing the expected number of photons absorbed in the array. ",
"Specifically, we are interested in quantum methods which do better in this respect than standard X-ray imaging. ",
"A standard X-ray image is effectively obtained by firing a number of photons separately through each of a number of different pixels, counting the number of outgoing photons, and statistically inferring information about the individual pixel transparencies or some joint functions thereof. ",
"This “classical” method makes no essential use of the fact that quantum information is being generated in the imaging process. ",
"Indeed, it makes no use of quantum theory at all, beyond the fact that photons are quantised. ",
"Effectively the same method could be used with classical radiation, assuming some finite bound on the sensitivity with which the amplitude of the outgoing radiation can be measured, and indeed this is how most standard imaging schemes work in practice.",
"\n\nFrom the perspective of quantum information theory, however, the classical method seems unlikely to be optimal for general problems. ",
"The pixel array behaves like a non-unitary oracle in its action on incoming quantum states. ",
"It is well known in quantum computing that interrogating a unitary oracle by quantum superposition states and processing the outputs can be far more efficient than invoking it only on the basis states which define its action. ",
"It should not be surprising that this turns out also to be true of non-unitary oracles. ",
"In fact, as we show here, it is true in simple examples which arise naturally as imaging problems.",
"\n\nTesting an array for defects\n============================\n\nConsider the following situation. ",
"We know that the transparency of pixel $i$ should be $\\alpha_i$, if nothing untoward has occurred. ",
"However, we are concerned that there may be a small number of pixels whose transparency is in fact significantly different from the theoretical value, and we wish to check on this. ",
"To be precise, we have some fixed parameter $\\epsilon$, and know that up to $M$ of the pixels may have an altered transparency $\\alpha'_i$, where $| \\alpha'_i - \\alpha_i | \\geq \\epsilon $, while the rest of the transparencies are unaltered. ",
"We wish to be statistically certain, to within some prescribed degree of confidence $(1- \\delta)$, whether or not there are any altered transparency pixels. ",
"If there are, we wish to identify them.",
"\n\nThis problem would arise, for example, for pixel arrays manufactured by a generally reliable process that occasionally suffers from some specific defect on individual pixels. ",
"It is also an idealisation of the imaging problem that arises when we have previously taken an X-ray of a (then) healthy patient and now want to know whether any significant change has occurred, if we may assume that any changes will be confined to a small part of the image.",
"\n\nIn the following discussion we take $M$, $\\delta$ and $\\epsilon$ to be fixed, with $N$ varying. ",
"We are interested in the behaviour for large $N$; in particular we assume $N$ is large compared to $M^2$, $\\epsilon^{-2}$ and $\\delta^{-1}$. We also assume the $\\alpha_i$ are generally not close to $0$ or $1$.\n\nThe classical method requires estimating the transparency of each pixel separately. ",
"This is done by firing photons through each pixel and ensuring that the transparencies can all be identified, either as the expected $\\alpha_i$ or as differing by at least $\\epsilon$, with confidence $(1- \\delta )$ that none of the $N$ identifications is erroneous. ",
"A classically obtained image giving this degree of confidence separately for each of the individual pixel identification requires $O( \\epsilon^{-2} N )$ absorptions. ",
"However, as $N$ grows, the chance that at least one of the $N$ pixel transparencies will be misestimated by more than $\\epsilon$ grows logarithmically in $N$. Allowing for this, we see that the classical solution to the problem defined requires an absorption rate of $O( \\epsilon^{-2} N \\log (N) )$.",
"\n\nConsider now the following quantum method. ",
"Each incoming photon is split into an equally weighted superposition of states incident on each of the pixels. ",
"That is: $$\\ket{\\gamma_{\\rm in} } \\rightarrow {1 \\over {\\sqrt{N}}} \\sum_{i=1}^N \n\\ket{\\gamma_{\\rm in}^i } \\, .$$ Let the actual transparency of pixel $i$ be $\\beta_i$. After passing through the pixels, the photon, if it was not absorbed, is in the state $${C \\over {\\sqrt{N}}} \\sum_{i=1}^N \\beta_i \\ket{ \\gamma_{\\rm out}^{i} } \\, ,$$ where $C$ is a normalisation constant and $\\ket{\\gamma_{\\rm out}^i }$ are the states of photons emerging on the far side of pixel $i$.\n\nWe now need to know whether the photon was absorbed or not. ",
"If the absorptions themselves are not easily detected, this can in principle be tested by carrying out a von Neumann measurement of the photon number of the outgoing beam state. ",
"Assuming no absorption, we now carry out a further von Neumann measurement, measuring the projection $P_{\\psi}$ onto the state $$\\ket{ \\psi } = {C' } \\sum_{i=1}^N \\alpha_i \\ket{\n \\gamma_{\\rm out}^i } \\, .$$ If we obtain eigenvalue $0$, we know that the normalised outgoing state was not $\\ket{\\psi}$, and hence that not all the pixel transparencies can have the theoretical value. ",
"In this case, we apply a second measurement, simultaneously measuring the projections onto the states $\\ket{\\gamma_{\\rm out}^i}$ for $i$ from $1$ to $N$. In other words, we look to see which of the outgoing beams we find a photon in. ",
"We take the answer $i$ to indicate that pixel $i$ is defective.",
"\n\nReducing the probability of a false negative — a defective pixel array producing eigenvalue $1$ throughout the sequence of tests — to $\\delta$ requires $O( \\log ( \\delta^{-1}) N \\epsilon^{-2} )$ such tests. ",
"and hence (given our assumptions about the $\\alpha_i$) this order of absorptions. ",
"Comparing the classical technique, and considering only the $N$-dependence for large $N$ (since the other parameters are fixed), we find a reduction of a factor of $O( \\log N )$ in the absorption rate.",
"\n\nWhen the defect test is positive, the probability of mis-identifying a good pixel as defective when we measure the outgoing beam is $O ( M / N )$. ",
"If this level of certainty is acceptable, a pixel thus identified as defective can be excluded from later tests. ",
"Up to $M$ defective pixels can then be identified as defective, with the probability of any erroneous identification being $O ( M^2 / N )$. ",
"If these certainty levels are insufficient, we may require more than one positive result to identify a defective pixel. ",
"For any fixed level of certainty, however, the overall gain over the classical method remains proportional to $\\log N$.\n\nThese calculations assume that the theoretical values of the $\\alpha_i$ are determined with absolute precision. ",
"In the realistic case in which these values are themselves subject to errors, of sizes bounded by $\\epsilon'$, the conclusions hold so long as $\\epsilon' \\ll (M \\epsilon / N )$.",
"\n\nSearching for infrequently occurring large structures\n=====================================================\n\nWe again consider an array of $N$ pixels, and suppose now that we are looking for a particular type of rarely occurring image. ",
"We model this as follows. ",
"Our aim is to decide, with confidence $(1 - \\delta )$, whether the array has a particular pattern $\\{ \\alpha_i^0 \\}$ of transparencies. ",
"We suppose that the prior probability of this pattern occuring is some small but non-zero number $p$, and that with probability $(1-p)$ the pixel transparencies are randomly drawn from identical independent probability distributions. ",
"To be definite, we suppose that in this latter case the pixel transparencies are uniformly distributed in the complex unit disc. ",
"We suppose also that $\\exp ( - \\sqrt{N} ) \\ll \\delta p $.",
"\n\nWe neglect constant factors throughout this section, considering only the degree of dependence on the parameters $N, \\delta, p$.\n\nClassically, we can only approach this problem by obtaining statistical estimates of some or all of the $| \\alpha_i |$, and comparing the estimates to $| \\alpha_i^0 | $. ",
"Estimating the $| \\alpha_i | $ on $r$ pixels to within error $\\epsilon$ requires $ \\approx r \\epsilon^{-2} $ photon measurements and absorptions. ",
"Suppose that $r$ such measurements produce the estimates $ | | \\alpha_i | - | \\alpha_i^0 | | < \\epsilon$. For this to give us the required confidence that we have found an example of the image requires that $\\epsilon^{r} \\approx \\delta p$. Minimizing with respect to $\\epsilon$, we find this strategy requires $\\approx - \\log ( \\delta p )$ absorptions.",
"\n\nIn a quantum approach to the problem, we proceed as in the previous example, preparing an equal superposition of photon states incident on the pixels and, if there is no absorption, testing whether the emerging state is $\\ket{ \\psi^0 } = {C' } \\sum_{i=1}^N \\alpha_i^0 \\ket{\n \\gamma_{\\rm out}^i }$. ",
"In the case where the pixel transparencies were randomly drawn from uniform distributions, the probability that they are such that the emerging state $\\ket { \\psi }$ obeys $ | \\braket{ \\psi_0 }{ \\psi } |^2 > \n{ 1 \\over { \\sqrt{N}} }$ is $\\approx \\exp ( - \\sqrt{N} )$, which is negligible in our calculations. ",
"So we may assume that a randomly drawn array will have transparencies such that $ | \\braket{ \\psi_0}{ \\psi } |^2 < { 1 \\over { \\sqrt{N}} }$. ",
"We can confidently conclude that the image sought is present after $x$ successful (and no unsuccessful) tests, where $ ( {1 \\over { \\sqrt{N} } } )^x \\approx \\delta p $, so that $x \\approx \\max ( {{ - \\log ( \\delta p ) } \\over { \\log N }} , 1 )$. ",
"As this represents the order of the number of absorptions required, we again find a logarithmic quantum advantage.",
"\n\nThese arguments generalise to a search for an infrequently occurring image which may be any one of $N$ known possibilities whose transparencies define $N$ orthogonal states $\\ket{ \\psi_i }$.",
"\n\nConclusions\n===========\n\nThe methods we have described show that quantum interrogation can have useful advantages over standard classical methods for realistic large array imaging problems. ",
"It is perhaps worth noting that these methods apply equally well to time-dependent imaging problems. ",
"A single array in our model could, for example, represent a smaller array being repeatedly probed at a sequence of times.",
"\n\nA further example of a problem in which there is a logarithmic quantum advantage has been found by Massar et al.[@mmp]. ",
"It would be good to have a general understanding of the range of problems in which there is a quantum advantage. ",
"It would also be useful to identify the advantage attainable by optimal techniques, both for the problems we have described and more generally. ",
"Here the bounds obtained in independent work by Massar et al.[@mmp] may be of help.",
"\n\nAcknowledgements\n================\n\nWe gratefully acknowledge discussions with Graeme Mitchison, and thank him in particular for stimulating us to consider the defective pixel identification step in our first quantum interrogation example. ",
"AK was supported by a Royal Society University Research Fellowship and by PPARC. ",
"DW was supported by an EPSRC Research Studentship.",
"\n\n[99]{}\n\nA. Elitzur and L. Vaidman, Found. ",
"Phys. [**",
"23**]{} 987 (1993). ",
"P. Kwiat et al., ",
"Phys. ",
"Rev. Lett. [**",
"74**]{} 4763 (1995). ",
"P. Kwiat, Physica Scripta [**T76**]{} 115 (1998). ",
"G. Mitchison and S. Massar, Phys. ",
"Rev. A. [**63**]{} 032105 (2001). ",
"S. Massar, G. Mitchison and S. Pironoio, quant-ph/0102116.",
"\n"
] | {
"pile_set_name": "ArXiv"
} | [
0.0005744682275690138,
0.0006473288522101939,
0.0006467948551289737,
0.0011285835644230247,
0.0010496380273252726,
0.0006185026140883565,
0.0007522760424762964,
0.0006048716604709625,
0.0006183131481520832,
0.0006916865240782499,
0.0006996591691859066,
0.0007067533442750573,
0.0006921101594343781,
0.0007732419762760401,
0.006651189643889666,
0.0005616503185592592,
0.0006224960088729858,
0.0009522947366349399,
0.007245875429362059,
0.0005764026427641511,
0.0005511868512257934,
0.0005854107439517975,
0.0006119544850662351,
0.0006624773377552629,
0.0006153507856652141,
0.0005614790134131908,
0.0006411349750123918,
0.0006110697286203504,
0.0006036909762769938,
0.0005652622203342617,
0.0009430225472897291,
0.0013778553111478686,
0.0005114158266223967,
0.0006153205758892,
0.0005438712541945279,
0.0005488136666826904,
0.0006302788970060647,
0.0005615782574750483,
0.0007274515810422599,
0.0006957285804674029,
0.0007257156539708376,
0.0006652367883361876,
0.0010591828031465411,
0.0007184428395703435,
0.0006282335380092263,
0.015447213314473629,
0.0005876648356206715,
0.0010809266241267323,
0.0006981309270486236,
0.02547556348145008,
0.0013765129260718822,
0.0007469903794117272,
0.0006850560312159359,
0.0010511111468076706,
0.0007539356593042612,
0.004227958153933287,
0.000659574696328491,
0.0006023070309311152,
0.0008226378704421222,
0.007058660499751568,
0.0005720417248085141,
0.0006428796914406121,
0.0007145909476093948,
0.0005922994459979236,
0.009898138232529163,
0.0006418961565941572,
0.0010043609654530883,
0.001521698315627873,
0.0013565263943746686,
0.0015373036731034517,
0.001557564246468246,
0.0010535160545259714,
0.000670921872369945,
0.0009750479366630316,
0.000645824009552598,
0.0005747861578129232,
0.0005658778245560825,
0.0006125835352577269,
0.0005701072514057159,
0.0005109599442221224,
0.0005415311316028237,
0.0005513339419849217,
0.0005854342016391456,
0.0005772669683210552,
0.0006741692777723074,
0.001444116816855967,
0.0008575210813432932,
0.0007260472630150616,
0.0012429299531504512,
0.0009571398259140551,
0.000895067525561899,
0.0008416195632889867,
0.0007745170150883496,
0.0007504880777560174,
0.0007140956586226821,
0.001995444530621171
] | 0.001515 | 96 |
[
"Q:\n\nHow to get pycharm to output colours when running pytest?",
"\n\nWhen I run pytest from terminal, I will get colours for the output, but when I run pytest from pycharm (which outputs to the Run toolbar), it is coloured the same as the rest of the stdout. ",
"\nIs there any way of getting colours out of pytest when run through pycharm?",
"\n\nA:\n\nSet --color=yes to force colored output. ",
"Either in your pytest.ini:\n[pytest]\naddopts=--color=yes\n\nOr in PyCharm, in run configuration add --color=yes in the \"Additional Arguments\" field:\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0015674155438318849,
0.0017353493021801114,
0.0014562169089913368,
0.0008735303417779505,
0.0010544604156166315
] | 0.001337 | 5 |
[
"\"TIME_SHORT_DAYS_FORMAT\" = \"%dh\";\n\n\"TIME_SHORT_DAY_FORMAT\" = \"%dh\";\n\n\"TIME_SHORT_HOURS_FORMAT\" = \"%dj\";\n\n\"TIME_SHORT_HOUR_FORMAT\" = \"%dj\";\n\n\"TIME_SHORT_MINUTES_FORMAT\" = \"%dm\";\n\n\"TIME_SHORT_MINUTE_FORMAT\" = \"%dm\";\n\n\"TIME_SHORT_SECONDS_FORMAT\" = \"%dd\";\n\n\"TIME_SHORT_SECOND_FORMAT\" = \"%dd\";\n\n\"tw__email_share_affirmative_button\" = \"Izinkan\";\n\n\"tw__email_share_detail_message_format\" = \"Dapatkan pembaruan dan informasi lainnya dari %@ bila Anda mengizinkan mereka untuk mengakses email Anda di akun Twitter @%@.\";\n\n\"tw__email_share_detail_message_not_signed_in\" = \"(belum masuk)\";\n\n\"tw__email_share_detail_message_this_app\" = \"aplikasi ini\";\n\n\"tw__email_share_heading\" = \"Sebarkan alamat email Anda\";\n\n\"tw__email_share_negative_button\" = \"Jangan sekarang\";\n\n\"tw__share_tweet\" = \"Sebarkan Tweet\";\n\n\"tw__share_tweet_generic_template_format\" = \"Lihat Tweet @%1$@: %2$@\";\n\n\"tw__share_tweet_subject_format\" = \"Tweet dari %1$@ (@%2$@)\";\n\n\"tw__sign_in_with_twitter_button\" = \"Masuk dengan Twitter\";\n\n\"tw__single_image\" = \"Satu gambar dilampirkan\";\n\n\"tw__test_string\" = \"Tes\";\n\n\"tw__tweet_image_accessibility\" = \"Lampiran\";\n\n\"tw__tweet_profile_accessibility\" = \"Profil\";\n\n\"tw__tweet_retweeted_by_user\" = \"Di-retweet oleh %@\";\n\n"
] | {
"pile_set_name": "Github"
} | [
0.0015591245610266924
] | 0.001559 | 1 |
[
"1. ",
"Field of the Invention\nThe present invention relates to techniques for communicating between integrated circuits. ",
"More specifically, the present invention relates to a method and an apparatus for using capacitively coupled communication techniques to communicate between stacked assemblies of laminated integrated circuit (IC) chips.",
"\n2. ",
"Related Art\nAdvances in semiconductor technology have made it possible to fabricate a single IC (Integrated Circuit) chip that contains hundreds of millions of transistors. ",
"One of the advantages of integrating systems onto a single IC chip is that it increases the operating speed of the overall system. ",
"This is because in an alternative design of multiple chips, the signals between system components have to cross chip boundaries, which typically reduces the system's operating speed due to the lengthy chip-to-chip propagation delays and limited number of chip-to-chip wires. ",
"In contrast, in a single-chip solution, the signals between system components no longer have to cross chip boundaries, thereby significantly increasing the overall system speed. ",
"Moreover, integrating systems onto a single IC chip significantly reduces overall costs because fewer chips are required to perform a given computational task.",
"\nHowever, some systems cannot be integrated into a single chip due to their high complexity and large size. ",
"Note that multiple IC chips are typically integrated onto a printed circuit board that contains multiple layers of signal lines for inter-chip communication. ",
"Furthermore, signal lines on an IC chip are about 100 times more densely packed than signal lines on a printed circuit board. ",
"Consequently, only a tiny fraction of the signal lines on a chip can be routed across the printed circuit board to other chips. ",
"For this reason, in such systems, inter-chip communication becomes the bottleneck for increasing the operating speed. ",
"Moreover, increases in IC integration densities are expected to exacerbate this bottleneck.",
"\nTo overcome this inter-chip communication bottleneck, researchers have recently developed an alternate technique, known as “Proximity Communication,” for communicating between semiconductor chips. ",
"Proximity Communication in an I/O technology that allows two face-to-face chips to communicate without wires. ",
"It involves integrating arrays of capacitive transmitters and receivers onto active surfaces of IC chips to facilitate inter-chip communication. ",
"If a first chip is situated face-to-face with a second chip so that transmitter regions on the first chip are capacitively coupled with receiver regions on the second chip, it is possible to transmit signals directly from the first chip to the second chip without having to route the signal through intervening signal lines within a printed circuit board.",
"\nAlthough Proximity Communication promises much higher I/O density and lower power, it requires accurate alignment between the two communicating chips. ",
"Mechanical misalignment degrades performance by reducing signal and augmenting crosstalk noise; if the chips are sufficiently misaligned, noise may dominate the desired signal, and communication may fail. ",
"There are two main types of misalignment: in-plane misalignment and chip separation. ",
"Tilt and rotation manifest as aberrations of these two effects.",
"\nSeveral techniques have been developed to mitigate in-plane misalignment in the horizontal (x, y) plane. ",
"It can be corrected by adjusting the spatial placement of data on the sending or transmitting (Tx) chip, depending on the relative position of the receiving (Rx) chip. ",
"However, the data steering circuitry is complex, costly in power, and works only over a small spatial range—typically two pad pitches. ",
"Also, the electronic alignment scheme proposed by Drost et al. ",
"in “Electronic Alignment for Proximity Communication,” IEEE International Solid-State Circuits Conference, 15-19 Feb. 2004, vol. ",
"1, 2004 only works for capacitively-coupled Proximity Communication. ",
"No analogous method has yet been developed for inductively coupled communication; in fact, crosstalk noise is a major limitation of such an inductively coupled scheme even in the absence of misalignment, because magnetic fields must have closed return paths, and these loops are often unconfined and large. ",
"Recent demonstrations of inductively-coupled data links showed that in the absence of active crosstalk reduction schemes, noise limits the achievable bit-error-rate (BER) to greater than 10−4 even for a large channel pitch of 60 microns, as described by Miura et al. ",
"in “A 1Tb/s 3 W Inductive-coupling Transceiver for Inter-Chip Clock and Data Link,” ISSC Digest Technical Papers, pp. ",
"142-143, February 2006.",
"\nChip separation also degrades performance by reducing signal level and augmenting crosstalk noise. ",
"Unfortunately, it cannot be easily corrected by electronic means. ",
"Although in theory it is possible to adapt signaling levels and pad sizes to mitigate the degradation introduced by chip separation, these schemes are overly complex and infeasible to implement in practice. ",
"Reliable communication therefore mainly relies on tight tolerances in packaging technologies that can ensure an adequately-small and well-controlled separation between the two communicating chips.",
"\nMultiple access schemes are well established in modern wireless telecommunication systems using electromagnetic (radio) waves propagating over large distances. ",
"Multiple devices in a cellular network, for example, can communicate simultaneously with a base station over the same space because each device is assigned a different time slot, frequency band, or code. ",
"The multiple access schemes used in wireless communication systems are effective at allowing multiple channels to operate across the same space over long distances with minimal interference."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0009391900966875255,
0.0005566382315009832,
0.0005758401239290833,
0.001185585861094296,
0.0006597259198315442,
0.0005675763823091984,
0.0006042573950253427,
0.0006261084927245975,
0.0006375408265739679,
0.0006045198533684015,
0.0006205920362845063,
0.0006627836264669895,
0.0006115369615145028,
0.000633862626273185,
0.0007351635722443461,
0.0005989840719848871,
0.0006534504937008023,
0.0005961776478216052,
0.0006247965502552688,
0.0005878362571820617,
0.0010852374834939837,
0.0006704122060909867,
0.0006343702552840114,
0.000649515597615391,
0.0005486104637384415,
0.0007509563001804054,
0.0006281769019551575,
0.0005952493520453572,
0.000591883494053036,
0.0007045221282169223,
0.0006597274914383888,
0.0005943570286035538,
0.0007268760818988085,
0.0008318630279973149,
0.0006618298939429224,
0.0005901173572055995,
0.00058655597968027,
0.0005900678224861622,
0.0005947165773250163,
0.0006205542013049126
] | 0.000665 | 40 |
[
"---\nabstract: 'This paper is concerned with highway traffic estimation using traffic sensing data, in a Lagrangian-based modeling framework. ",
"We consider the Lighthill-Whitham-Richards (LWR) model [@LW; @Richards] in Lagrangian-coordinates, and provide rigorous mathematical results regarding the equivalence of viscosity solutions to the Hamilton-Jacobi equations in Eulerian and Lagrangian coordinates. ",
"We derive closed-form solutions to the Lagrangian-based Hamilton-Jacobi equation using the Lax-Hopf formula [@HJDaganzo; @ABSP], and discuss issues of fusing traffic data of various types into the Lagrangian-based H-J equation. ",
"A numerical study of the [*Mobile Century*]{} field experiment [@MC] demonstrates the unique modeling features and insights provided by the Lagrangian-based approach.'",
"\nauthor:\n- |\n Ke Han$^{a}\\thanks{Corresponding author, e-mail: kxh323@psu.edu}$ Tao Yao$^{b}\\thanks{e-mail: tyy1@engr.psu.edu}$ Terry L. Friesz$^{b}\\thanks{e-mail: tfriesz@psu.edu}$\\\n \\\n $^{a}$*Department of Mathematics*\\\n *Pennsylvania State University, University Park, PA 16802, USA*\\\n $^{b}$*Department of Industrial and Manufacturing Engineering*\\\n *Pennsylvania State University, University Park, PA 16802, USA*\ntitle: |\n Lagrangian-based Hydrodynamic Model:\\\n Freeway Traffic Estimation\n---\n\nIntroduction\n============\n\nGeneral background\n------------------\n\nHighway traffic estimation and prediction are of pivotal importance for traffic operation and management. ",
"From an estimation perspective, it is desirable to have a substantial amount of information available. ",
"This has been made possible by emerging technology in fixed and mobile sensing and by the advancement of cyber-physical infrastructure, see [@MC] for a specific discussion. ",
"Depending on the characteristics of sensing devices and the underlying modeling framework, traffic sensing can be categorized as Eulerian sensing (such as using loop detector, virtual tripwire, and video camera) and Lagrangian sensing (such as using GPS and smart phone).",
"\n\nThis paper is concerned with using the Lighthill-Whitham-Richards model to estimate traffic states, subject to constraints imposed by sensing data that are large in quantity, and high in dimension. ",
"The LWR model is described by a [*partial differential equation*]{} (PDE), more specifically, by a [*scalar conservation law*]{} (SCL). ",
"For general mathematical background on SCL, the reader is referred to [@Bbook]. ",
"The LWR SCL is closely related to a Hamilton-Jacobi equation, via the Moskowitz function [@Moskowitz], also known as the Newell curve [@Newell]. ",
"It is shown in [@Evans] that a weak entropy solution to the LWR SCL leads to the viscosity solution of the corresponding H-J equation; and vise versa.",
"\n\nViability theory and Lax-Hopf formula\n-------------------------------------\n\nFrom a PDE perspective, additional information on the traffic stream provided by sensors imposes multiple initial/boundary and/or internal boundary conditions that may lead to non-existence of a well-defined solution, namely, entropy solution to the scalar conservation law; or viscosity solution to the H-J equation. ",
"Recently, [@ABSP] extended the viscosity solution of H-J equations to a solution class known as the Barron-Jensen/Frankowska solutions [@BJ; @Frankowska]. ",
"The generalized solution, called viability episolution [@Aubin], is lower semi-continuous, and satisfies the initial/boundary and/or internal boundary conditions in an inequality sense. ",
"Such a relaxation, while excluding some nice mathematical properties of the solution, does allow the PDE to incorporate multiple value conditions and produce solutions that are well-informed of traffic states transmitted by the sensors. ",
"Based on this idea, a sequence of seminal papers, [@CC1; @CC2; @Convex] were created, which performed highway traffic estimation as well as data assimilation and inverse modeling.",
"\n\nThe LWR model in Lagrangian coordinate\n--------------------------------------\n\nThe LWR model is commonly formulated as a scalar conservation law in [*Eulerian coordinate*]{} (EC), i.e. with independent variables $t$ (time) and $x$ (location). ",
"A list of selected references in this line of research includes [@BH; @BH1; @CC1; @CC2; @HJDaganzo; @HJDaganzo2; @LWRDUE; @Newell]. ",
"Another way of formulating the traffic dynamic is through [*Lagrangian coordinate*]{} (LC), which identifies $t$ (time) and $n$ (vehicle label). ",
"In contrast to EC, LC describes time evolution of traffic quantities associated with a moving vehicle. ",
"Such a framework was initially introduced by [@CF] in the context of gas dynamics. ",
"LC was introduced to traffic flow modeling by [@HJDaganzo2], and subsequently studied by [@Leclercq] and [@Yuan]. ",
"A more detailed review of the LWR model in both EC and LC is presented later in Section \\[LWREL\\].",
"\n\nThe LWR PDE in LC can be derived from the Eulerian-based PDE; and vise versa. ",
"This procedure was given an intuitive illustration in [@HJDaganzo2], provided that all quantities of interest were continuously differentiable. ",
"In [@Leclercq], the authors related the equivalence of EC- and LC-based PDEs to an earlier work [@Wagner] on gas dynamics. ",
"However, we point out that [@Wagner] studied an Euler equation, which is a system of conservation laws; results regarding such a system do not apply immediately to the scalar conservation law of interest. ",
"In this paper, we provide a rigorous proof of the equivalence between the two systems, in the context of Hamilton-Jacobi equation and viscosity solutions. ",
"The result will apply to the LWR conservation laws even if the solutions are not continuous, let alone differentiable. ",
"Technical result is presented in Section \\[LCequivalence\\].",
"\n\nAs mentioned before, solution to the H-J equation has been extended to treat multiple value conditions, using viability theory [@Aubin]. ",
"In this paper, we apply the framework of viability theory to the Lagrangian-based Hamilton-Jacobi equations. ",
"The goal is to explore the unique modeling and computational advantages of the LC in highway traffic estimation. ",
"In particular, using the Lax-Hopf formula, we derive explicit solutions to the LC-based H-J equation with various value conditions including initial/intermediate condition, upstream/downstream boundary condition, internal boundary condition, and a combination of the above. ",
"This is presented in Section \\[simplesol\\]. ",
"As pointed out by recent studies [@Leclercq] and [@Yuan], LC-based conservation law has certain computational advantage over EC-based ones, in the context of Godunov scheme [@Godunov]. ",
"Namely, the Godunov scheme reduces to an upwind scheme for LC-based conservation law, since the corresponding fundamental diagram is monotonically increasing. ",
"As we show in this paper, when solved with the Lax-Hopf formula, the LC-based H-J equation also reduces the computational complexity, compared with the EC-based H-J equation. ",
"Finally, we test the framework of Lagrangian-based traffic sensing and estimation with dataset obtained from the Mobile Century field experiment [@MC]. ",
"The Lagrangian-based approach provides traffic information associated with each moving vehicle, such as trajectory and speed. ",
"Such information are relatively difficult to obtain from the Eulerian-based approach: one has to perform partial inversion of the Moskowitz function.",
"\n\nOrganization\n------------\n\nThe rest of this paper is organized as follows. ",
"In Section \\[LWREL\\], we briefly review the Lighthill-Whitham-Richards model in both Eulerian and Lagrangian coordinates. ",
"A rigorous equivalence result regarding the EC-based and LC-based H-J equations is presented in Section \\[LCequivalence\\]. ",
"Section \\[BJF\\] introduces the notion of viability episolution and the generalized Lax-Hopf formula. ",
"Data of different sources are discussed and integrated into the Lagrangian PDE. ",
"In section \\[simplesol\\], we derive explicit solutions to the Lagrangian-based H-J equation, using the Lax-Hopf formula. ",
"In Section \\[numerical\\], we apply the Lagrangian-based computational paradigm to estimate real-world highway traffic stream.",
"\n\nThe LWR model in transformed coordinates {#LWREL}\n========================================\n\nIn this section, we review the Lighthill-Whitham-Richards model in both Eulerian and Lagrangian coordinates. ",
"The transformation between these two coordinate systems is made through a function inversion under minor assumption. ",
"In section \\[LCequivalence\\], rigorous result on the equivalence of the two systems is provided, using Hamilton-Jacobi equation and the notion of viscosity solution.",
"\n\nThe LWR model in Eulerian coordinates {#LCEulerian}\n-------------------------------------\n\nThe classical LWR PDE reads \\_t(t,x)+ f\\_x((t,x)) = 0(t,x)\\[0,+)where the subscripts denote partial derivative. ",
"The scalar conservation law above describes the temporal-spatial evolution of average vehicle density $\\rho(t,\\,x)$ and average vehicle flow $f\\big(\\rho(t,\\,x)\\big)$. The density-flow relation is articulated by the [*fundamental diagram*]{} $f(\\cdot)$ f() = v()where $\\rho_{max}$ is jam density. ",
"The average vehicle speed $v(\\rho)\\in[0,\\,v_{max}]$ is a decreasing function of density; $v_{max}$ denotes the free flow speed. ",
"The fundamental diagram is assumed to be concave with maximum $M$ attained at $\\rho^*$, where $M$ is the flow capacity.",
"\n\nWe introduce the Moskowitz function $N(\\cdot\\,,\\,\\cdot)$, also know as the Newell-curve, such that N\\_t(t,x) = f((t,x)),N\\_x(t,x) = -(t,x) Hereafter, “a.e.\" ",
"stands for “almost everywhere\". ",
"$N(t,\\,x)$ measures the cumulative number of vehicles that have passed location $x$ by time $t$. It has been shown in a number of circumstances that if $\\rho(t,\\,x)$ is the weak entropy solution to (\\[LWRE\\]), then the corresponding Moskowitz function is the viscosity solution to the following Hamilton-Jacobi equation N\\_t(t,x)-f(- N\\_x(t,x)) = 0\n\nNote that viscosity solution to (\\[HJE\\]) must be Lipschitz continuous, but not necessarily continuously differentiable due to the presence of shock waves in $\\rho(t,\\,x)$. There exists, however, more general solution classes such as the viability episolution [@ABSP], which is lower semi-continuous.",
"\n\nThe LWR model in Lagrangian coordinates {#LCLagrangian}\n----------------------------------------\n\nIn Lagrangian coordinate system, a free variable $n$ is used to identify a particular vehicle. ",
"Note that in a continuum model, $n$ is treated as a real number. ",
"The coordinate transformation from $(t,\\,x)$ to $(t,\\,n)$ is made by inverting the following Moskowitz function n = N(t,x) Throughout this article, we assume that the vehicle density is uniformly positive, i.e. there exists $\\delta>0$ such that $$\\label{reveqn1}\n\\rho(t,\\,x)~\\geq~\\delta\\qquad\\forall~(t,\\,x)\\in[0,\\,+\\infty)\\times[0,\\,L]$$ This assumption is not restrictive given the argument that if the density vanishes in certain road segments, then the domain of study can be separated into several subdomains, with each one satisfying (\\[reveqn1\\]).",
"\n\nFor each $t$ fixed, (\\[reveqn1\\]) implies that $N(t,\\,\\cdot)$ is a strictly decreasing function of $x$, whose inverse is denoted by $X(t,\\,\\cdot)$. We have x = X(t,n) where $X(t,\\,n)$ represents the location of vehicle labeled $n$ at time $t$. Identities (\\[N\\]) and (\\[X\\]) define the coordinate transformation. ",
"We have the following X\\_t(t,n) = v(t,n),X\\_n(t,n) = -s(t,n) where $v(t,\\,n)$ and $s(t,\\,n)$ denote the average speed and spacing around vehicle $n$ at time $t$, respectively. ",
"Introducing the spacing-velocity relationship v = (s) f([1s]{})sswe present the Hamilton-Jacobi equation in Lagrangian coordinate X\\_t(t,n)-(- X\\_n(t,n)) = 0\n\nEquivalence between (\\[HJE\\]) and (\\[HJnt\\]) {#LCequivalence}\n--------------------------------------------\n\nIn this section, we provide rigorous mathematical analysis on the relationship between the two H-J equations in EC and in LC. ",
"Our strategy is to show that if $N(t,\\,x)$ is the viscosity solution to (\\[HJE\\]), then its partial inverse as defined by (\\[N\\]) and (\\[X\\]), is the viscosity to (\\[HJnt\\]). ",
"The converse will hold similarly. ",
"We begin with the definition of viscosity solution to Hamilton-Jacobi equation of the form u\\_t+H(u) = 0 where the unknown $u(t,\\,x)\\in\\R^m$; $\\nabla u$ is the gradient of u with respect to $x$. In what follows, $C$, $C^1$ denotes the set of continuous and continuously differentiable functions, respectively.",
"\n\n\\[visdef\\] A function $u\\in C(\\Omega)$ is a viscosity subsolution of (\\[HJgeneral\\]) if, for every $C^1$ function $\\varphi=\\varphi(t,\\,x)$ such that $u-\\varphi$ has a local maximum at $(t,\\,x)$, there holds \\_t(t,x)+H() 0 Similarly, $u\\in C(\\Omega)$ is a viscosity supersolution of (\\[HJgeneral\\]) if, for every $C^1$ function $\\varphi=\\varphi(t,\\,x)$ such that $u-\\varphi$ has a local minimum at $(t,\\,x)$, there holds \\_t(t,x)+H() 0 We say that $u$ is a viscosity solution of (\\[HJgeneral\\]) if it is both a supersolution and a subsolution in the viscosity sense.",
"\n\nIf $u$ is a $C^1(\\Omega)$ function and satisfies (\\[HJgeneral\\]) at every $x\\in\\Omega$, then $u$ is also a solution in the viscosity sense. ",
"Conversely, if $u$ is a viscosity solution, then the equality must hold at every point $x$ where $u$ is differentiable. ",
"In particular, if $u$ is Lipschitz continuous, then it is almost everywhere differentiable, hence (\\[HJgeneral\\]) holds almost everywhere in $\\Omega$.\n\nThe next theorem establishes the equivalence between viscosity solutions to (\\[eqn1\\]) and (\\[eqn2\\]), where $f(\\cdot)$ and $\\psi(\\cdot)$ satisfy (\\[psidef\\]). ",
"N\\_t(t,x)-f(-N\\_x(t,x)) = 0 X\\_t(t,n)-(-X\\_n(t,n)) = 0\n\n\\[viscositythm\\] Assume that $N(t,\\,x), \\, (t,\\,x)\\in\\Omega\\subset (-\\infty,\\,+\\infty)\\times\\R^n$, is a viscosity solution to (\\[eqn1\\]), furthermore, assume that the density is uniformly positive, i.e. $\\rho(t,\\,x)\\geq \\delta>0,\\,\\forall (t,\\,x)\\in\\Omega$. Then function $X(t,\\,\\cdot)$ obtained by inverting $N(t,\\,\\cdot)$ is a viscosity solution to (\\[eqn2\\]).",
"\n\nBy assumption, $N(t,\\,\\cdot)$ is strictly decreasing with $$\\delta\\,|x_1-x_2|~\\leq~|N(t,\\,x_1)-N(t,\\,x_2)|~\\leq~\\rho_{max}\\,|x_1-x_2|\\qquad\\forall ~x_1,\\,x_2$$ then $X(t,\\,\\cdot)$ is also strictly decreasing with 1/\\_[max]{}|n\\_1-n\\_2| |X(t,n\\_1)-X(t,n\\_2)| 1/|n\\_1-n\\_2| n\\_1,n\\_2 We start by showing that $X(\\cdot,\\,\\cdot)$ is a subsolution. ",
"Indeed, given any $C^1$ function $Y=Y(t,\\,x)$ such that $X-Y$ has a local maximum at $(t_0,\\,n_0)$, without loss of generality, we assume $X(t_0,\\,n_0)-Y(t_0,\\,n_0)=0$, take the plane $t=t_0$ (see Figure \\[mathproof\\]).",
"\n\n![",
"Graphs of $X(t_0,\\,\\cdot)$ and $Y(t_0,\\,\\cdot)$[]{data-label=\"mathproof\"}](viscosity.pdf){width=\"45.00000%\"}\n\nSince $X-Y$ attains a local maximum at $(t_0,\\,n_0)$, by (\\[twoside\\]) there must hold $Y_n(t_0,\\,n_0) <0$. By continuity, there exists a neighborhood $\\Omega_1$ of $(t_0,\\,n_0)$ such that $ Y_n(t,\\,n)<0,~~\\forall (t,\\,n)\\in\\Omega_1$. Then, we may define $M(t,\\,\\cdot)$ to be the inverse of $Y(t,\\,\\cdot)$ in $\\Omega_1$. Obviously, $M(t,\\,n)\\in C^1(\\Omega_1)$, and $N-M$ attains a local maximum at $\\big(t_0,\\,X(t_0,\\,n_0)\\big)$. Using the fact that $N(t,\\,x)$ is a viscosity solution and applying (\\[subsol\\]), we deduce M\\_t(t,x) f(-M\\_x(t,x)) Differentiating with respect to $t$ the identity $Y\\big(t,\\, M(t,\\,x)\\big)=x$, and using (\\[a\\]), we have 0 = Y\\_t + Y\\_nM\\_t Y\\_t+Y\\_nf(-M\\_x) = Y\\_t+Y\\_nf(-[1Y\\_n]{}) = Y\\_t-(-Y\\_n) In the above deduction, we have used the fact that $M(t,\\,\\cdot)$ and $Y(t,\\,\\cdot)$ are both $C^1$, and are inverse of each other. ",
"Therefore, differentiating $n=M\\big(t,\\,Y(t,\\,n)\\big)$ w.r.t. ",
"$n$ yields $1=M_x\\cdot Y_n$.\n\nSince $Y$ is arbitrary, (\\[b\\]) implies that $X(t,\\,n)$ is a subsolution. ",
"The case for supersolution is completely similar.",
"\n\nSimilar proof can be used to show the converse: given a viscosity solution $X(\\cdot,\\,\\cdot)$ to (\\[eqn2\\]), $N(t,\\,\\cdot)$ obtained by inverting $X(t,\\,\\cdot)$ is a viscosity solution to (\\[eqn1\\]).",
"\n\nNumerical algorithm and value conditions {#BJF}\n========================================\n\nIn this section, we focus on the numerical scheme for the Hamilton-Jacobi equation \\_t X(t,n)-(-\\_n X(t,n)) = 0 in the presence of initial, boundary and internal boundary conditions. ",
"In order to avoid the issue of non-existence of solution, we adapt the notion of viability episolution [@ABSP], and proceed with a variational method known as the Lax-Hopf formula [@ABSP; @CC1; @CC2].",
"\n\nViability episolution to the Hamilton-Jacobi equation (\\[HJeqn\\]) {#LCviability}\n-----------------------------------------------------------------\n\nWe consider a domain $[0,\\,T]\\times[N_1,\\,N_2]$ for equation (\\[HJeqn\\]), where $T>0$ and $N_2> N_1> 0$. In the following definition, we make precise what we mean by value conditions, concerning (\\[HJeqn\\]).",
"\n\nA value condition $\\C(\\cdot,\\,\\cdot): \\Omega\\subset [0,\\,T]\\times[N_1,\\,N_2]\\rightarrow \\mathbb{R}$ is a lower-semicontinuous function.",
"\n\nOne may extend a value condition $\\mathcal{C}(\\cdot,\\,\\cdot)$ to the entire domain by assigning $\\mathcal{C}(t,\\,n)=+\\infty$ whenever $(t,\\,n)\\notin \\Omega$. Such a convention allows one to compare and manipulate value conditions with different domains. ",
"In order to articulate the Lax-Hopf formula, we introduce the concave transformation $\\psi^*(\\cdot)$ of the Hamiltonian $\\psi(\\cdot)$ $$\\psi^*(p)~\\doteq~\\sup_{s\\in[1/\\rho_{max},\\,+\\infty)}\\Big\\{\\psi(s)-p\\,s\\Big\\}$$ The following Lax-Hopf formula provides semi-analytical representation of viability solution, given a value condition.",
"\n\nThe viability episolution to (\\[HJeqn\\]) associated with value condition $\\mathcal{C}(\\cdot,\\,\\cdot)$ is given by X\\_(t,n) = \\_[(u,T)(\\^\\*)\\_+]{}((t-T,x+Tu)+T\\^\\*(u))\n\nSee [@ABSP]\n\nWe indicate, by a subscript, dependence of the viability solution on its value condition. ",
"So that the solution to (\\[HJeqn\\]) reads $X_{\\mathcal{C}}(t,\\,n)$. As a consequence of formula (\\[Lax\\]) the following property of [*inf-morphism*]{} holds.",
"\n\n\\[infmorphism\\][**(inf-morphism property)**]{} Let $\\mathcal{C}(\\cdot,\\,\\cdot)$ be the point wise minimum of finitely many value conditions, $$\\mathcal{C}(t,\\,n)~\\doteq~\\min_{i=1,\\ldots,m}\\mathcal{C}_i(t,\\,n)\\qquad \\forall~~ (t,\\,n)\\in[0,\\,T]\\times[N_1,\\,N_2]$$ Then X\\_(t,n) = \\_[i=1,…, m]{}X\\_[\\_i]{}(t,n)\n\nThe inf-morphism property enables the H-J equation to incorporate one or more value conditions; it can also decompose a complex problem involving multiple value conditions into smaller subproblems, each one with a single condition.",
"\n\nValue conditions for continuous solutions {#conditions}\n-----------------------------------------\n\nThe value conditions described in the previous section can be viewed as the mathematical abstraction of real-world measurements, obtained from Eulerian and Lagrangian sensing. [",
"@CC1; @CC2] have utilized the H-J equation in Eulerian coordinates to incorporate sensing data. ",
"In the rest of this paper, we not only extend their framework to Lagrangian coordinates, but also establish sufficient condition that guarantees the equivalence between these two systems, in the presence of a single value condition.",
"\n\nConsider again the two H-J equations (\\[eqn1\\]) and (\\[eqn2\\]) in EC and LC. ",
"We make two assumptions on the value condition $\\mathcal{C}$, as follows\n\n[**(A1)**]{} The domain of $\\mathcal{C}$ is a continuous curve parametrized by $\\tau\\in[\\tau_{min},\\,\\tau_{max}]$: $$\\begin{aligned}\n\\hbox{Dom}(\\mathcal{C})\\subset [0,\\,T]\\times[N_1,\\,N_2]\\qquad &\\Big(\\hbox{respectively}~~ [0,\\,T]\\times[X_1,\\,X_2]\\Big)\n\\\\\n\\hbox{Dom}(\\mathcal{C})~=~\\big(t(\\tau),\\,n(\\tau)\\big)\\qquad &\\Big(\\hbox{respectively} ~~\\big(t(\\tau),\\, x(\\tau)\\big)\\Big)\n\\\\\n&\\tau\\in[\\tau_{min},\\,\\tau_{max}]\\end{aligned}$$\n\n[**(A2)**]{} $\\mathcal{C}\\big(t(\\cdot),\\,n(\\cdot)\\big)$ is a continuous function on $[\\tau_{min},\\,\\tau_{max}]$.\n\nGiven an arbitrary continuous value condition $\\mathcal{C}(\\cdot,\\,\\cdot)$ in the Eulerian domain (e.g. measurement of a loop detector), we need to determine how to fuse such datum into the Lagrangian based PDE. ",
"The next proposition provides an answer.",
"\n\n\\[sufficient\\] [**(Sufficient condition for equivalence of value conditions)**]{}\n\nLet $\\mathcal{C}^E\\big(t(\\tau),\\,x(\\tau)\\big)$ and $\\mathcal{C}^L(t(\\tau),\\,n(\\tau)),\\,\\tau\\in[\\tau_{min},\\,\\tau_{max}]$ be two value conditions for (\\[eqn1\\]) and (\\[eqn2\\]), respectively. ",
"Then the solutions to (\\[eqn1\\]) and (\\[eqn2\\]) satisfying each value condition in the equality sense are equivalent if $$n(\\tau)~=~\\mathcal{C}^E\\big(t(\\tau),\\,x(\\tau)\\big),\\qquad x(\\tau)~=~\\mathcal{C}^L\\big(t(\\tau),\\,n(\\tau)\\big)$$\n\nLet $N_{\\mathcal{C}^E}(t,\\,x)$ be the solution to (\\[eqn1\\]) satisfying condition $\\mathcal{C}^E$, let $\\,X_{\\mathcal{C}^L}(t,\\,n)$ be the solution to (\\[eqn2\\]) satisfying condition $\\mathcal{C}^L$. For each $t$, since $N_{\\mathcal{C}^E}(t,\\,\\cdot)$ is strictly increasing, we denote its inverse by $N^{-1}_{\\mathcal{C}^E}(t,\\,\\cdot)$. Then by Theorem \\[viscositythm\\], $N^{-1}_{\\mathcal{C}^E}(\\cdot,\\,\\cdot)$ is a valid solution to the HJ equation (\\[eqn2\\]).",
"\n\nOn the other hand, for every $\\tau\\in[\\tau_{min},\\,\\tau_{max}]$ N\\^[-1]{}\\_[\\^E]{}(t(),n()) = N\\^[-1]{}\\_[\\^E]{}(t(),\\^E(t(),x())) = N\\^[-1]{}\\_[\\^E]{}(t(), N\\_[\\^E]{}(t(),x())) = x() (\\[123\\]) implies that $N^{-1}_{\\mathcal{C}^E}(\\cdot,\\,\\cdot)$ satisfies value condition $C^L\\big(t(\\tau),\\,n(\\tau)\\big)$ and thus is the unique solution to (\\[eqn2\\]) associated with value condition $\\mathcal{C}^L$. We conclude $N^{-1}_{\\mathcal{C}^E}(t,\\,n)=X_{\\mathcal{C}^L}(t,\\,n)$.\n\nProposition \\[sufficient\\] suggests that, by simply invert the Eulerian (Lagrangian) value condition $\\mathcal{C}(t(\\tau),\\,\\cdot)$, one can obtain its dual version in LC (EC). ",
"The dual value condition yields solution that is equivalent to the original solution.",
"\n\nExplicit solution with piecewise affine value conditions {#simplesol}\n========================================================\n\nIn this section we apply the Lax-Hopf formula (\\[Lax\\]) to for an explicit solution in the Lagrangian coordinates. ",
"To that end, we assume that the value conditions are [*piecewise affine*]{} (PWA). ",
"This assumption is justified on the ground of (1) an easily constructible explicit solution representation, with PWA conditions; and (2) standard result on PWA approximation of any piecewise continuous functions or curves.",
"\n\nPiecewise affine value conditions {#PWAdef}\n---------------------------------\n\nWe start with articulating piecewise affine value conditions, which includes initial/intermediate, upstream, downstream and internal conditions.",
"\n\n\\[initial\\] [**(PWA initial/intermediate condition)**]{}\n\nSet $t=t_0\\geq 0$, given real numbers $s_i\\geq0,\\,n_i,\\, i\\in\\{1,\\ldots, m_{ini}\\}$, the $j^{th}$ affine component of initial/intermediate condition is \\_[ini]{}(t,n) = -s\\_jn+d\\_j,(t,n){t\\_0}To ensure continuity, we require $$d_j~=~s_j\\,n_j-\\sum_{l=1}^{j-1}(n_{l+1}-n_l),\\qquad j~=~2,\\ldots, m_{ini}$$\n\n\\[upstream\\] [**(PWA upstream boundary condition)**]{}\n\nFix $n=N_1$, given real numbers $v^i\\geq 0,\\, t^i,\\,i\\in\\{1,\\,\\ldots,\\,m_{up}\\}$, the $j^{th}$ affine component of upstream boundary condition is defined as \\_[up]{}\\^j(t,n) = v\\^jt+b\\^j,(t,n){N\\_1} To ensure continuity of upstream boundary condition, we set $$b^j~=~-v^j\\,t^j+\\sum_{l=1}^{j-1}(t^{l+1}-t^l)v^l,\\qquad j~=~2,\\ldots, m_{up}$$\n\n\\[downstream\\] [**(PWA downstream boundary condition)**]{}\n\nFix $n=N_2$, given real numbers $v_i\\geq 0$, $t_i,\\, i\\in\\{1,\\ldots, m_{down}\\}$, the $j^{th}$ affine component of downstream boundary condition is defined as \\_[down]{}\\^j(t,n) = v\\_jt+b\\_j,(t,n){N\\_2} where $$b_j~=~-v_j\\,t_j+\\sum_{l=1}^{j-1}(t_{l+1}-t_l)v_l,\\qquad j~=~1,\\ldots, m_{down}$$\n\n\\[internal\\] [**(Affine internal boundary condition)**]{}\n\nGiven real numbers $\\alpha,\\,\\beta, t_{min},\\,t_{max},\\,n_{min},\\,n_{max}, \\, r\\geq 0$, the affine internal boundary condition is defined as \\_[int]{}(t,n) = +(t-t\\_[min]{})t, n=n\\_[min]{}+r(t-t\\_[min]{})\n\nRecall that the domain of our consideration is $[0,\\,T]\\times[N_1,\\,N_2]$, thus the upstream/downstream boundary conditions refer to (part of) the trajectories of the first and last car within our scope.",
"\n\nExplicit formulae for viability episolutions {#LCexplicit}\n--------------------------------------------\n\nIn the presence of piecewise affine (PWA) data, the solution of Lagrangian equation (\\[eqn2\\]) with a piecewise affine Hamiltonian can be computed explicitly, as given by the Lax-Hopf formula (\\[Lax\\]). ",
"We denote $s_{min}\\doteq 1/\\rho_{max},\\,s^*\\doteq 1/\\rho^*$, let $k>0$, define (s) = \n\nks,& s\\\nv\\_[max]{},& s\\[s\\^\\*, +)\n\nNotice that this fundamental diagram corresponds to a triangular density-flow relationship. ",
"Moreover, the concave transformation of $\\psi(\\cdot)$ reads \\^\\*(u) = s\\^\\*(k-u)u\n\n\\[explicit2\\] Given each affine value condition defined in (\\[pwaini\\])-(\\[affinternal\\]), and Hamiltonian (\\[pwapsi\\]), the solution to the Lagrangian Hamilton-Jacobi equation (\\[eqn2\\]) are respectively\n\n- Initial/intermediate value problem\n\n if $s_j~\\leq s^*$, X\\_[ini]{}\\^j(t,n)=\n\n -s\\_jn+d\\_j+(t-t\\_0)ks\\_j,\\\n n\\_j+k(t-t\\_0)nn\\_[j+1]{}+k(t-t\\_0);\\\n \\\n -s\\_jn\\_j+d\\_j+(t-t\\_0)s\\^\\*k-s\\^\\*(n-n\\_j),\\\n 0n-n\\_jk(t-t\\_0).",
"\n\n if $s_j~>s^*$, X\\_[ini]{}\\^j(t,n)=\n\n -s\\_jn\\_[j+1]{}+d\\_j+(t-t\\_0)s\\^\\*k-s\\^\\*(n-n\\_[j+1]{}),\\\n 0n-n\\_[j+1]{}k(t-t\\_0);\\\n \\\n -s\\_jn+d\\_j+v\\_[max]{}(t-t\\_0),\\\n n\\_jnn\\_[j+1]{}.",
"\n\n- Upstream boundary value problem X\\_[up]{}\\^j(t,n)=\n\n v\\^jt\\^[j+1]{}+b\\^j+s\\^\\*(k(t-t\\^[j+1]{})-(n-N\\_1)),\\\n 0n-N\\_1k(t-t\\^[j+1]{});\\\n \\\n v\\^jt+b\\^j-(n-N\\_1)[v\\^jk]{},\\\n {0,k(t-t\\^[j+1]{})}n-N\\_1k(t-t\\^j) .",
"\n\n- Downstream boundary value problem\n\n X\\_[down]{}\\^j(t,x)=v\\_jt\\_[j+1]{}+b\\_j+(t-t\\_[j+1]{})v\\_[max]{},(t,x)\\[t\\_[j+1]{},+){N\\_2}\n\n- Internal boundary value problem X\\_[int]{}(t,n)=\n\n +(-t\\_[min]{})\\\n n-n\\_[min]{}r(t-t\\_[min]{}),\\\n k(t-t\\_[max]{}) < n-n\\_[max]{},\\\n n-n\\_[min]{}k(t-t\\_[min]{});\\\n \\\n +[n-n\\_[min]{}r]{}+s\\^\\*k(t-t\\_[min]{}-[n-n\\_[min]{}r]{})\\\n 0 n-n\\_[min]{} < r(t-t\\_[min]{}) nn\\_[max]{};\\\n \\\n +(t\\_[max]{}-t\\_[min]{})+(t-t\\_[max]{})s\\^\\*k-s\\^\\*(n-n\\_[max]{}),\\\n 0 n-n\\_[max]{}k(t-t\\_[max]{});\n\n(\\[intsimple\\]) is well defined even if $k=r$ and $r=0$.\n\nThe proof of Proposition \\[explicit2\\] is straightforward. ",
"A simple verification reveals that the formulae for upstream, downstream and internal boundary conditions (\\[upstreamsimple\\])-(\\[intsimple\\]) can be merged into one, namely (\\[intsimple\\]). ",
"In other words, the upstream and downstream conditions can be treated as spacial cases of internal boundary conditions. ",
"This is because the wave propagation speed is always non-negative, and any value condition can only affect the solution at region with a larger $n$. This coincides with the intuition that a car cannot be affected by others behind it.",
"\n\nIn order to compute the PDE solution with more complicated value conditions, for example, the one including multiple data, we invoke the inf-morphism property from Proposition \\[infmorphism\\], and take the point wise minimum over all solutions obtained from (\\[inisimple1\\]), (\\[inisimple2\\]) and (\\[intsimple\\]).",
"\n\nThe Lax-Hopf formula is a grid-free numerical scheme in the sense that the computational procedure does not rely on a two-dimensional grid, as opposed to finite-difference schemes. ",
"In addition, the solution algorithm is highly parallelizable: the problem of fusing multiple value conditions into one PDE can be decomposed into independent sub-problems. ",
"In each sub-problem, the solution can be solved efficiently with formulae (\\[inisimple1\\])-(\\[intsimple\\]).",
"\n\nNumerical Study {#numerical}\n===============\n\nIn this section, we conduct a numerical case study using traffic data obtained from the Mobile Century field experiment [@MC]. ",
"The dataset includes vehicle trajectory data and cumulative passing vehicles measured at different locations along a highway segment. ",
"We utilize a subset of the Mobile Century dataset and fuse them into the Lagrangian Hamilton-Jacobi equation. ",
"The goal is to perform the estimation of Lagrangian quantities such as vehicle trajectories and velocities.",
"\n\nThe Mobile Century field experiment\n-----------------------------------\n\nOn February 8, 2008, an experiment in the area of traffic monitoring was launched between 9:30 am to 6:30 pm on freeway I-880 near Union City in the San Francisco Bay Area, California. ",
"This experiment involved 100 vehicles carrying GPS-enabled Nokia N95 phones. ",
"The probe vehicles repeatedly drove loops of 6 to 10 miles in length continuously for 8 hours.",
"\n\nCarried by each probe vehicle, each on-board smart phone stored its position and velocity every 3 to 4 seconds. ",
"In addition to the cell phone data, the experiment also collected data on cumulative passing vehicles at different locations along the highway. ",
"The reader is referred to [@MC] for more details on experimental design and data description.",
"\n\nDetails of the numerical study\n------------------------------\n\nThe freeway segment of our study is a 3.45 mile stretch of I-880 North Bound, between postmile 23.36, and postmile 26.82. ",
"We utilize two types of data: (i) the cumulative vehicle count, obtained via loop detector station 400536 (postmile 23.36), which counts the number of passing vehicles every 30 seconds; (ii) vehicle trajectories, recorded by on-board smart phones every 3 to 4 seconds. ",
"Our study spanned one hour, from 11:30 am to 12:30 pm, and involved a total traffic volume of approximately 5000 vehicles. ",
"We utilized data sent from 97 probe vehicles, The vehicle trajectories are plotted in Figure \\[mobiledata\\]. ",
"In order to identify the ‘label’ of those probe vehicles, we processed the data on the cumulative vehicle count obtained from Station 400536.",
"\n\nWe assume that the fundamental diagram $\\psi(\\cdot)$ in (\\[eqn2\\]) is piecewise affine. ",
"Such a fundamental diagram is calibrated with data collected form the same experiment (detail of the model calibration is omitted for brevity). ",
"The key parameters are estimated as follows. ",
"$$v_{max}~=~31.5~(meter/second),\\quad \\rho_{max}~=~0.50~(vehicle/meter),\\quad \\rho^*~=~0.055~(vehicle/meter)$$ The resulting fundamental diagram reads (s) = \n\n1.95s&2.00 < s < 18.15\\\n\\\n31.5&s 18.15\n\nNumerical results\n-----------------\n\nWe reconstructed the traffic state between postmile 23.36 and 26.82 for a period of one hour, using the numerical method discussed in Section \\[simplesol\\]. ",
"Among the 97 vehicle trajectories, we used 44 of them as training data. ",
"In other words, the viability episolution to equation (\\[eqn2\\]) was computed with the Lax-Hopf formula and 44 internal boundary conditions. ",
"Notice that the penetration rate of probe vehicles is around $0.88\\%$, given the total traffic volume in this one-hour period. ",
"Recall that the on-board smart phone recorded vehicle location every 3 to 4 seconds. ",
"However, in our actual computation, we sampled the vehicle location at a much lower frequency, namely at every 30 to 90 seconds. ",
"As we show later in this section, the numerical performance of the model remains robust under such crude measurements.",
"\n\n![",
"Recorded trajectories of 97 probe vehicles.[]{data-label=\"mobiledata\"}](dataplots.pdf){width=\"70.00000%\"}\n\nFigure \\[sol7800\\] displays the solution of the H-J equation (\\[HJeqn\\]) based on 8 vehicle trajectories (internal boundary conditions). ",
"It should be noted that the viability episolution satisfies the value conditions only in an inequality sense [@ABSP], that is $$X_{\\mathcal{C}}(t,\\,n)~\\leq~\\mathcal{C}(t,\\,n),\\qquad (t,\\,n)\\in \\hbox{Dom}(\\mathcal{C})$$ If the strict inequality holds, the value conditions and the model are said to be incompatible. ",
"The incompatibility is due to either error in measurements or inaccuracy of the model itself. ",
"A class of problems derived from incompatibility, namely data assimilation and data reconciliation, were discussed in [@Convex].",
"\n\n![",
"Solution to the Hamilton-Jacobi equation (\\[HJeqn\\]) with 8 (internal) boundary conditions. ",
"The solid lines are plots of vehicle trajectories.[]{data-label=\"sol7800\"}](solution1.pdf){width=\"85.00000%\"}\n\nThe obtained solution $X(t,\\,n)$ describes the time evolution of the location of vehicle labeled $n$. In other words, it can be used to reconstruct vehicle trajectories. ",
"We fixed several values of $n$, and plotted the curves of $X(\\cdot,\\,n)$. Two examples are shown in Figure \\[trajectory1\\] and \\[trajectory2\\]. ",
"For comparison purpose, we also included the actual vehicle trajectory reported by the smart phone in the same figure.",
"\n\n![",
"Reconstructed and measured trajectories of vehicle \\#11266[]{data-label=\"trajectory2\"}](traj2.pdf){width=\"110.00000%\"}\n\n![",
"Reconstructed and measured trajectories of vehicle \\#11266[]{data-label=\"trajectory2\"}](traj1.pdf){width=\"110.00000%\"}\n\nRecall that \\_t X(t,n) = (s(t,n)) = v(t,n) By numerically differentiating $X(t,\\,n)$ with respect to $t$, one obtains the velocity field $v(t,\\,n)$. Figure \\[vel\\] shows the velocity field involving vehicle labeled 7650 to 7950. ",
"This result was obtained by differentiating the Moskowitz function displayed in Figure \\[sol7800\\]. ",
"From Figure \\[vel\\], we clearly observe a time-varying congestion level experienced by the drivers: vehicles experience first free flow traffic, then congested traffic, and finally less congested traffic. ",
"This observation is confirmed in Figure \\[mobiledata\\], where a similar driving condition is shown for all probe vehicles.",
"\n\nFinally, we performed the task of travel time estimation using the Lagrangian approach. ",
"The travel times were estimated from the vehicle trajectories, which were again obtained by the viability episolution $X(t,\\,n)$. In order to examine the accuracy of our estimation, we compared the actual travel times of the 97 probe vehicles with the aforementioned estimated travel times. ",
"The result is summarized in Figure \\[error\\].",
"\n\n![",
"Vehicle velocity field (in meter/second) obtained from (\\[partialt\\])[]{data-label=\"vel\"}](velocity.pdf){width=\"85.00000%\"}\n\n![",
"Error of travel time estimation[]{data-label=\"error\"}](error1.pdf){width=\"70.00000%\"}\n\nConclusion\n==========\n\nThis paper applies the Lagrangian-based first-order hydrodynamic traffic model to perform highway traffic estimation, utilizing both Eulerian and Lagrangian sensing data. ",
"We briefly discuss the Lighithill-Whitham-Richards model in both Eulerian and Lagrangian coordinate systems, and provide rigorous mathematical results on the equivalence of Hamilton-Jacobi equations in these two coordinate systems. ",
"We derive closed-form solutions to the LC-based Hamilton-Jacobi equation, and discuss the issue of fusing traffic data of different sources into the H-J equation via the notion of viability episolution. ",
"A case study of the Mobile Century project demonstrates the unique modeling features and insights offered by the Lagrangian-based PDE.",
"\n\nDespite several similarities between the EC-based and LC-based approaches such as structure of the PDE and solution method, the LC has the advantage of providing information associated with a given vehicle. ",
"Such a feature needs to be further explored and engineered to facilitate the development of cyber-physical infrastructure, including the [*mobile internet*]{}. ",
"In addition, extension of LC-based PDE to a network setting is also an important aspect of future research.",
"\n\n[99]{}\n\nAubin, J.P., 1991. ",
"Viability Theory. ",
"Boston, MA: Systems and Control: Foundations and Applications. ",
"Birkh$\\ddot a$user.",
"\n\nAubin, J.P., Bayen, A.M., Saint-Pierre, P., 2008. ",
"Dirichlet problems for some Hamilton-Jacobi equations with inequality constraints. ",
"SIAM Journal on Control and Optimization 47 (5), 2348-2380.",
"\n\nBarron, E.N., Jensen, R., 1990. ",
"Semicontinuous viscosity solutions for Hamilton-Jacobi equations with convex Hamiltonians. ",
"Communications in Partial Differential Equations 15, 1713-1742.",
"\n\nBressan, A., 2000. ",
"Hyperbolic Systems of Conservation Laws. ",
"The One Dimensional Cauchy Problem, Oxford University Press.",
"\n\nBressan, A., Han, K., 2011a. ",
"Optima and Equilibria for a model of traffic flow. ",
"SIAM Journal on Mathematical Analysis 43 (5), 2384-2417.",
"\n\nBressan, A., Han, K., 2011b. ",
"Nash Equilibria for a Model of Traffic Flow with Several Groups of Drivers. ",
"ESAIM: Control, Optimization and Calculus of Variations, doi:10.1051/cocv/2011198.",
"\n\nClaudel, C.G., Bayen, A.M., 2011. ",
"Convex formulations of data assimilation problems for a class of Hamilton-Jacobi equations. ",
"SIAM Journal on Control and Optimization 49 (2), 383-402.",
"\n\nClaudel, C.G., Bayen, A.M., 2010. ",
"Lax-Hopf based incorporation of internal boundary conditions into Hamilton-Jacobi equation. ",
"Part I: Theory. ",
"IEEE Transactions on Automatic Control 55 (5), 1142-1157.",
"\n\nClaudel, C.G., Bayen, A.M., 2010. ",
"Lax-Hopf based incorporation of internal boundary conditions into Hamilton-Jacobi equation. ",
"Part II: Computational methods. ",
"IEEE Transactions on Automatic Control 55 (5), 1158-1174.",
"\n\nCourant, R., Friedrichs, K.O., 1948. ",
"Supersonic flows and shock waves. ",
"Pure and Applied Mathematics 1.",
"\n\nDaganzo, C.F., 2005. ",
"A variational formulation of kinematic waves: Basic theory and complex boundary conditions. ",
"Transportation Research Part B 39 (2), 187-196.",
"\n\nDaganzo, C.F., 2006. ",
"On the variational theory of traffic flow: well-posedness, duality and applications. ",
"Networks and Heterogeneous Media 1 (4), 601-619.",
"\n\nEvans, L.C., 2010. ",
"Partial Differential Equations. ",
"$2^{nd}$ edition. ",
"American Mathematical Society, Providence, RI.",
"\n\nFrankowska, H., 1993. ",
"Lower semicontinuous solutions of Hamilton-Jacobi-Bellman equations. ",
"SIAM Journal on Control and Optimization 31 (1), 257-272.",
"\n\nFriesz, T.L., Han, K., Neto, P.A., Meimand, A., Yao, T., 2012. ",
"Dynamic user equilibrium based on a hydrodynamic model. ",
"Transportation Research Part B, doi:10.1016/j.trb.2012.10.001.",
"\n\nGodunov, S.K., 1959. ",
"A difference scheme for numerical solution of discontinuous solution of hydrodynamic equations. ",
"Math Sbornik 47 (3), 271-306.",
"\n\nHerrera, J.C., Work, D.B., Herring, R., Ban, X.J., Jacobson, Q., Bayen, A.M., 2009. ",
"Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment, Transportation Research Part C 18 (4), 568-583.",
"\n\nLeclercq, L., Laval, J., Chevallier, E., 2007. ",
"The Lagrangian coordinate system and what it means for first order traffic flow models. ",
"In Proceedings of the $17^{th}$ International Symposium on Transportation and Traffic Theory, London.",
"\n\nLe Floch, P., 1988. ",
"Explicit formula for scalar non-linear conservation laws with boundary condition. ",
"Mathematical Models and Applied Sciences 10, 265-287.",
"\n\nLeVeque, R.J., 1992. ",
"Numerical Methods for Conservation Laws. ",
"Birkhäuser.",
"\n\nLighthill, M., Whitham, G., 1955. ",
"On kinematic waves. ",
"II. ",
"A theory of traffic flow on long crowded roads. ",
"In Proceedings of the Royal Society of London. ",
"Series A, Mathematical and Physical Sciences 229 (1178), 317-345.",
"\n\nMazare, P.E., Dehwah, A.H., Claudel, C.G., Bayen, A.M., 2011. ",
"Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model. ",
"Transportation Research Part B 45 (10), 1727-1748.",
"\n\nMoskowitz, K., 1965. ",
"Discussion of ‘freeway level of service as influenced by volume and capacity characteristics’ by D. R. Drew and C. J. Keese. ",
"Highway Research Record 99, 43-44.",
"\n\nNewell, G.F., 1993. ",
"A simplified theory of kinematic waves in highway traffic, part I: General theory. ",
"Transportation Research Part B 27 (4), 281-287.",
"\n\nRichards, P.I., 1956. ",
"Shockwaves on the highway. ",
"Operations Research 4 (1), 42-51.",
"\n\nWagner, D. 1987. ",
"Equivalence of the Euler and Lagrangian equations of gas dynamics for weak solutions. ",
"Journal of Differential Equations 68 (1), 118-136.",
"\n\nYuan, Y., Van Lint, J.W.C., Hoogendoorn, S.P., Vrancken, J.L.M., Schreiter, T., 2011. ",
"Freeway traffic state estimation using Extended Kalman Filter for first-order traffic model in Lagrangian Coordinates. ",
"2011 International Conference on Networking, Sensing and Control, Netherlands.",
"\n"
] | {
"pile_set_name": "ArXiv"
} | [
0.0005904121208004653,
0.0005790907307527959,
0.0006164886872284114,
0.0005526638124138117,
0.0007554012699984014,
0.0005310293636284769,
0.0005186916678212583,
0.0005524360458366573,
0.0005889780586585402,
0.000607674999628216,
0.0005500272964127362,
0.0006189451669342816,
0.0013863734202459455,
0.0006510976236313581,
0.0007439822074957192,
0.0006348583847284317,
0.0005820023361593485,
0.0005638940492644906,
0.0006934913690201938,
0.0006073475815355778,
0.0006214165478013456,
0.0006212791777215898,
0.0005713157006539404,
0.0005920933908782899,
0.0005799316568300128,
0.0008277024026028812,
0.0005533432704396546,
0.000560527783818543,
0.0005580521537922323,
0.0005278451135382056,
0.0005764378001913428,
0.0005818004719913006,
0.0005595343536697328,
0.0005857439828105271,
0.0005478216917254031,
0.0005928933387622237,
0.000611007388215512,
0.0005601816228590906,
0.0006189894629642367,
0.0005907621816731989,
0.0005480324034579098,
0.0005922771524637938,
0.0006034528487361968,
0.0006011722725816071,
0.0006089447415433824,
0.0005574471433646977,
0.001216350239701569,
0.0005763587541878223,
0.0006581509369425476,
0.0006126970984041691,
0.000727064092643559,
0.000542501627933234,
0.0006172842113301158,
0.00082860526163131,
0.0008001694222912192,
0.0007738246931694448,
0.0007554224575869739,
0.0014580207644030452,
0.0007222348940558732,
0.0021659063640981913,
0.00069999328115955,
0.0007859770557843149,
0.0011930776527151465,
0.001538361539132893,
0.0030683286022394896,
0.0007649273611605167,
0.027209078893065453,
0.0006427197949960828,
0.002652446273714304,
0.044812530279159546,
0.008382823318243027,
0.002414003713056445,
0.03273707628250122,
0.10102176666259766,
0.028968453407287598,
0.0010346564231440425,
0.0019055769080296159,
0.028372807428240776,
0.048963915556669235,
0.021274838596582413,
0.0006287405849434435,
0.010999157093465328,
0.0009484925540164113,
0.000716355221811682,
0.000928750669118017,
0.006584853865206242,
0.0017568006878718734,
0.0020362960640341043,
0.0044413679279387,
0.002144403988495469,
0.023013338446617126,
0.0005947910831309855,
0.0006179113406687975,
0.000550891156308353,
0.0006550333928316832,
0.005798308178782463,
0.0006611209828406572,
0.011481724679470062,
0.023794351145625114,
0.014152147807180882,
0.0006017068517394364,
0.0008268144447356462,
0.0006080851890146732,
0.0006089354283176363,
0.0006384021253325045,
0.011893993243575096,
0.0007435979787260294,
0.004831789527088404,
0.1580604910850525,
0.3333096206188202,
0.04762784764170647,
0.027699578553438187,
0.0005970479687675834,
0.0005820603109896183,
0.0007831510156393051,
0.0007910425774753094,
0.000694005168043077,
0.0006660501239821315,
0.0006937418947927654,
0.0005809244466945529,
0.0005722612841054797,
0.0005945479497313499,
0.000760987401008606,
0.0006403279257938266,
0.0006016899133101106,
0.0006154332077130675,
0.0005872742622159421,
0.0005562057485803962,
0.0005204423796385527,
0.0006648605922237039,
0.0005682362243533134,
0.0005604743491858244,
0.0005661807954311371,
0.0005276895826682448,
0.0016002487391233444,
0.0006253431201912463,
0.0005423721158877015,
0.0007239711121656001,
0.0005805356195196509,
0.0007115825428627431,
0.000630213413387537,
0.0005951959756202996,
0.0005501274135895073,
0.0005308803520165384,
0.0019055769080296159,
0.0006281057139858603,
0.0008965932065621018,
0.0008931387565098703,
0.0005671700346283615,
0.0019055769080296159,
0.0006648888229392469,
0.0006411089561879635,
0.000827437499538064,
0.0005268611130304635,
0.0019055769080296159,
0.000642548082396388,
0.0007146502612158656,
0.0006759075913578272,
0.0006183626246638596,
0.0005505871959030628,
0.0005810307920910418,
0.0005995441460981965,
0.0006628900882788002,
0.0019055769080296159,
0.0006227523554116488,
0.0006841436261311173,
0.0005435699131339788,
0.0006172715220600367,
0.0005471795448102057,
0.0005636715795844793,
0.0005277286400087178,
0.0005493119242601097,
0.000711376778781414,
0.000722921104170382,
0.0006562424241565168,
0.6388570070266724,
0.000658645061776042,
0.0006414210074581206,
0.0006438580458052456,
0.0006850361241959035,
0.0006310677854344249,
0.0006168016698211432,
0.0007273884257301688,
0.0006325883441604674,
0.0008187375497072935,
0.0007281812140718102,
0.000599019811488688,
0.0006400122656486928,
0.0007252064533531666,
0.0005908368621021509,
0.0006071224343031645,
0.0007226038724184036,
0.0006098069134168327,
0.0006102697225287557,
0.0007222620770335197,
0.0006179382326081395,
0.0007405828800983727,
0.0006450787768699229,
0.0007222620770335197,
0.0006179382326081395,
0.000635705713648349,
0.0006465692422352731,
0.0007235638331621885,
0.0006693083560094237,
0.0006269352743402123,
0.0007661405252292752,
0.0006095808930695057,
0.0006379167316481471,
0.0007595670758746564,
0.0005837687640450895,
0.000617701152805239,
0.0007042817887850106,
0.0006951973191462457,
0.0011182293528690934,
0.0006469255313277245,
0.0007777935243211687,
0.0006386297172866762,
0.0006013428210280836,
0.0007185424910858274,
0.0006750079919584095,
0.0006219187052920461,
0.0006789684412069619,
0.0006166811799630523,
0.0006524443160742521,
0.0007171995821408927,
0.0005487762973643839,
0.0007214864017441869,
0.0006096232682466507,
0.000607996538747102,
0.0006819810369051993,
0.000588992377743125,
0.0005981840076856315,
0.0006927954382263124,
0.000588469672948122,
0.0018214700976386666,
0.0007218014216050506,
0.0006837678956799209,
0.0011519683757796884,
0.0006245367112569511,
0.0006523901829496026,
0.0006353644421324134,
0.0007674445514567196,
0.0005749143892899156,
0.0005996921681798995,
0.0007243520230986178,
0.0005752519937232137,
0.0006751347100362182,
0.0006963673513382673,
0.0006311445031315088,
0.0005962938885204494,
0.0006787535967305303,
0.001433124067261815,
0.0006307169678620994,
0.0006682758685201406,
0.000705683312844485,
0.0006487688515335321,
0.0008080354309640825,
0.0006434362730942667,
0.000589637435041368,
0.001995444530621171
] | 0.00709 | 260 |
[
"Q:\n\nRead committed Snapshot VS Snapshot Isolation Level\n\nCould some one please help me understand when to use SNAPSHOT isolation level over READ COMMITTED SNAPSHOT in SQL Server?",
"\nI understand that in most cases READ COMMITTED SNAPSHOT works, but not sure when go for SNAPSHOT isolation.",
"\nThanks\n\nA:\n\nREAD COMMITTED SNAPSHOT does optimistic reads and pessimistic writes. ",
" In contrast, SNAPSHOT does optimistic reads and optimistic writes.",
"\nMicrosoft recommends READ COMMITTED SNAPSHOT for most apps that need row versioning.",
"\nRead this excellent Microsoft article: Choosing Row Versioning-based Isolation Levels. ",
" It explains the benefits and costs of both isolation levels. ",
" \nAnd here's a more thorough one:\nhttp://msdn.microsoft.com/en-us/library/ms345124(SQL.90).aspx\n\nA:\n\n[![",
"Isolation levels table][2]][2]\nSee the example below:\nRead Committed Snapshot\nChange the database property as below\nALTER DATABASE SQLAuthority\nSET READ_COMMITTED_SNAPSHOT ON WITH ROLLBACK IMMEDIATE\nGO\n\nSession 1\nUSE SQLAuthority\nGO\nBEGIN TRAN\nUPDATE DemoTable\nSET i = 4\nWHERE i = 1\n\nSession 2\nUSE SQLAuthority\nGO\nBEGIN TRAN\nSELECT *\nFROM DemoTable\nWHERE i = 1\n\nResult – Query in Session 2 shows old value (1, ONE) because current transaction is NOT committed. ",
"This is the way to avoid blocking and read committed data also.",
"\nSession 1\nCOMMIT\n\nSession 2\nUSE SQLAuthority\nGO\nSELECT *\nFROM DemoTable\nWHERE i = 1\n\nResult – Query in Session 2 shows no rows because row is updated in session 1. ",
"So again, we are seeing committed data.",
"\nSnapshot Isolation Level\nThis is the new isolation level, which was available from SQL Server 2005 onwards. ",
"For this feature, there is a change needed in the application as it has to use a new isolation level.",
"\nChange database setting using below. ",
"We need to make sure that there is no transaction in the database.",
"\nALTER DATABASE SQLAuthority SET AllOW_SNAPSHOT_ISOLATION ON\n\nNow, we also need to change the isolation level of connection by using below\nSession 1\nUSE SQLAuthority\nGO\nBEGIN TRAN\nUPDATE DemoTable\nSET i = 10\nWHERE i = 2\n\nSession 2\nSET TRANSACTION ISOLATION LEVEL SNAPSHOT\nGO\nUSE SQLAuthority\nGO\nBEGIN TRAN\nSELECT *\nFROM DemoTable\nWHERE i = 2\n\nResult- Even if we have changed the value to 10, we will still see old record in session 2 (2, TWO).",
"\nNow, let’s commit transaction in session 1\nSession 1\nCOMMIT\n\nLet’s come back to session 2 and run select again.",
"\nSession 2\nSELECT *\nFROM DemoTable\nWHERE i = 2\n\nWe will still see the record because session 2 has stated the transaction with snapshot isolation. ",
"Unless we complete the transaction, we will not see latest record.",
"\nSession 2\nCOMMIT\nSELECT *\nFROM DemoTable\nWHERE i = 2\n\nNow, we should not see the row as it's already updated.",
"\nSee: SQL Authority, Safari Books Online\n\nA:\n\nNo comparison of Snapshot and Snapshot Read Committed is complete without a discussion of the dreaded \"snapshot update conflict\" exception that can happen in Snapshot, but not Snapshot Read Committed. ",
"\nIn a nutshell, Snapshot isolation retrieves a snapshot of committed data at the start of a transaction, and then uses optimistic locking for both reads and writes. ",
" If, when attempting to commit a transaction, it turns out that something else changed some of that same data, the database will rollback the entire transaction and raise an error causing a snapshot update conflict exception in the calling code. ",
" This is because the version of data affected by the transaction is not the same at the end of the transaction as it was at the start.",
"\nSnapshot Read Committed does not suffer from this problem because it uses locking on writes (pessimistic writes) and it obtains snapshot version information of all committed data at the stat of each statement. ",
" \nThe possibility of snapshot update conflicts happening in Snapshot and NOT Snapshot Read Committed is an extremely significant difference between the two.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0007177790394052863,
0.000528233649674803,
0.0022327671758830547,
0.0005887395236641169,
0.0005864665727131069,
0.0005558535922318697,
0.0006004768656566739,
0.0006741381366737187,
0.0007515358738601208,
0.0008482900448143482,
0.0007340798620134592,
0.0005747998948208988,
0.0006364826112985611,
0.0005502562271431088,
0.0006649090792052448,
0.0006917448481544852,
0.0006469100480899215,
0.0006783297867514193,
0.0005359102506190538,
0.0005857464857399464,
0.0006092434050515294,
0.0006489265360869467,
0.0008917883387766778,
0.0007342096068896353,
0.0006467195926234126,
0.0019141846569254994,
0.0005742596695199609,
0.001995444530621171
] | 0.0008 | 28 |
[
"Clock recovery circuits are used in high-speed receivers to recover timing information from an incoming data signal. ",
"A basic clock recovery circuit 101 implemented as part of an integrated circuit (IC) is illustrated in FIG. ",
"1. ",
"Digital information in the incoming data signal arrives at a signaling pin 103 of the IC. ",
"The digital information is often encoded to ensure a minimum transition density needed for clock recovery. ",
"The clock recovery circuit 101 generates a recovered clock from the incoming data signal, which is then fed over a feedback path 105 to an input of the clock recovery circuit. ",
"Both the feedback path and the incoming data signal are compared by a phase detector 109, which determines whether the recovered clock signal is early or late relative to the incoming data signal. ",
"Phase difference information from the phase detector is passed through a filter 113 and accumulated to control a charge pump 115. ",
"In turn, the charge pump 115 generates a control signal for a variable frequency oscillator (VFO) 117, which advances or delays frequency and phase of the recovered clock in order to align its edges with the incoming data signal. ",
"This structure implements a phase-locked loop (PLL) that, over time, closely aligns the recovered clock with phase and frequency of the incoming data signal. ",
"An offset circuit 106 creates a phase-shifted copy of the recovered clock to generate a sampling clock, used to align a data sampler 107 to the midpoint of a data interval. ",
"In some cases the offset circuit 106 is an integral part of VFO 117. ",
"As indicated by reference numeral 111, the data sampler 107 can itself be a part of the phase detector 109, with a single circuit 111 used for both clock and data recovery.",
"\nConventional clock recovery designs such as depicted in FIG. ",
"1A are often rooted in a form of binary phase detector known as a “bang-bang” or Alexander phase detector. ",
"Comprised of relatively simple logic, a bang-bang phase detector identifies logic state transition between successive digital symbols and takes an “edge sample” exactly at the expected transition time. ",
"If the recovered clock is precisely aligned with the transition edges of the data signal (discounting intersymbol interference), the edge sample should be exactly at the voltage midpoint between logic states. ",
"However, depending on direction of transition, an edge sample offset from the midpoint means the edge sampling clock is early or late relative to the data signal. ",
"This early and late information is used to incrementally advance or retard the recovered clock to align it with the transitions in the incoming data signal.",
"\nBinary phase detectors are advantageous in that they typically use simple logic and are well suited for power-efficient digital clock recovery designs. ",
"However, designs based on these circuits are often characterized by large steady state dithering and low bandwidth, due to high-loop latency attributable to filtering of up and down binary signals and converting these signals into a VFO control signal.",
"\nBy contrast, linear phase detection techniques result in a phase-error signal proportional to the difference between an incoming data signal and a recovered clock, and these techniques therefore promise significantly lower steady state dither jitter at higher loop bandwidth. ",
"However, linear phase detection techniques often suffer from large static phase error and unreliable operation at high frequencies; they are also difficult to combine with digital filtering techniques. ",
"To elaborate, conventional linear phase detection techniques generate variable-width pulse signals that gate pull-up and pull-down of a signal line to generate a VFO control signal. ",
"Manufacturing variations, capacitive effects, and other issues make it difficult to match precisely these impedances so as to reliably avoid unintended static phase offset. ",
"In addition, as the data rates increase, it becomes correspondingly difficult to generate suitable variable-width pulses, i.e., these pulse-widths and associated processing should be of high precision and should be relatively short when compared to a unit interval (which is difficult at higher speeds). ",
"As implied earlier, processing typically requires (a) only generating clock recovery updates when there is a transition in the incoming data signal, (b) correctly correlating early or late transitions with a leading or lagging recovered clock, and (c) applying low pass filtering so as to minimize the effects of random noise. ",
"Specific filtering requirements become more complex for non-conventional signaling techniques, such 4-PAM signaling.",
"\nWhat is needed is an improved high-bandwidth clock recovery architecture that is area and power efficient and that provides reduced static phase error and dither jitter. ",
"Such an architecture would be well-suited to increasingly-small digital designs and digital designs that are power sensitive. ",
"Ideally, such an architecture would combine benefits of conventional binary phase detection and linear phase detection techniques while omitting their respective disadvantages. ",
"Further still, such an architecture ideally would accommodate non-traditional signaling techniques, such as multi-PAM (MPAM) signaling. ",
"The present invention addresses these needs and provides further, related advantages.",
"\nThe subject matter defined by the enumerated claims may be better understood by referring to the following detailed description, which should be read in conjunction with the accompanying drawings. ",
"This description of one or more particular embodiments, set out below to enable one to build and use various implementations of the technology set forth by the claims, is not intended to limit the enumerated claims, but to exemplify their application to certain methods and devices. ",
"The description set out below exemplifies (i) a clock recovery circuit that uses two-point control of a phase-locked loop (PLL), (ii) an integrated circuit having one or more such clock recovery circuits, and (iii) related methods, systems and devices. ",
"While the specific examples are presented, the principles described herein may also be applied to other methods and devices as well."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0006476663984358311,
0.0005838577635586262,
0.0009391900966875255,
0.000562841072678566,
0.0005582303274422884,
0.0006309192976914346,
0.000577963946852833,
0.0006321865948848426,
0.0007599713862873614,
0.0006463723839260638,
0.0006304351263679564,
0.0006079976446926594,
0.0005571385263465345,
0.000635546981357038,
0.0007005825755186379,
0.000618027406744659,
0.000637184246443212,
0.0005761884385719895,
0.056287068873643875,
0.0006113307317718863,
0.0006686822162009776,
0.0006930160452611744,
0.000775912485551089,
0.0006513114203698933,
0.0006325388676486909,
0.0005720622139051557,
0.0006560742040164769,
0.0005795382894575596,
0.0008060344844125211,
0.0005988326156511903,
0.0006125884829089046,
0.0005953693180344999,
0.000549063493963331,
0.0005164644680917263,
0.0005833535687997937,
0.0005749749252572656,
0.0005281351623125374
] | 0.002135 | 37 |
[
"The present invention relates to new antifungal polypeptides that exhibit broad-spectrum antifungal activity against pathogenic and other fungi. ",
"Specifically, the present invention relates to a variant amino acid sequence defensin protein derived from an alfalfa antifungal protein and its use as an antifungal polypeptide in plant disease control against plant pathogenic fungi. ",
"The present invention relates to the antifungal polypeptides obtainable from plants in the genus Medicago. ",
"The antifungal polypeptides may be applied directly to a plant, applied to a plant in the form of microorganisms that produce the polypeptides, or the plants may be genetically modified to produce the polypeptides. ",
"The present invention also relates to microorganisms and plants transformed with DNA sequences encoding the amino acid sequence variant alfalfa antifungal protein (AFP), and compositions useful in controlling plant pathogenic fungi.",
"\nProtection of agriculturally important crops from insects and diseases has become a major concern in the agricultural industry. ",
"Fungus infection is a particular problem in damp climates and is additionally a major concern during crop storage. ",
"Plants have developed a certain degree of natural resistance to pathogenic fungi; however, modern growing methods, harvesting and storage systems frequently provide a favorable environment for plant pathogens.",
"\nAdding to the problem is the number of different fungi that may cause problems. ",
"Fungal damage can be caused by a fungus of genera such as Alternaria, Ascochyta, Botrytis, Cercospora, Colletotrichum, Diplodia, Erysiphe, Fusarium, Gaeumanomyces, Helminthosporium, Macrophomina, Nectria, Peronospora, Phoma, Phymatotrichum, Phytophthora, Plasmopara, Podosphaera, Puccinia, Pythium, Pyrenophora, Pyricularia, Rhizoctonia, Scerotium, Sclerotinia, Septoria, Thielaviopsis, Uncinula, Venturia, and Verticillium among others. ",
"Therefore, fungicidal compounds are not always effective because antifungal activity associated with a particular compound may be limited to a few species.",
"\nOne approach to inhibiting plant pathogenic activity has been to identify and isolate compounds that exhibit high levels of activity against these pathogens. ",
"Several classes of polypeptides and proteins exhibiting antifungal activity against a variety of plant pathogenic fungi have been isolated (Bowles, 1990; Brears et al., ",
"1994). ",
"The antifungal polypeptides and proteins include chitinases, cysteine-rich chitin-binding proteins, β-1,3-glucanases, permatins (including zeamatins), thionins, ribosome-inactivating proteins, and non-specific lipid transfer proteins. ",
"These proteins are believed to play important roles in plant defense against fungal infection. ",
"The use of natural protein products to control plant pathogens has been demonstrated, for example, in EPO 0 392 225.",
"\nRecently, another group of plant proteins has been found to function as defensins in combating infections by plant pathogens (PCT International Publication WO 93/05153). ",
"The plant defensins are a family of small proteins that possess potent antimicrobial and antifungal activity (for review, see Broekaert et al., ",
"1997). ",
"The plant defensins are characterized by a conserved pattern of eight cysteine residues forming what has been referred to as a cysteine-stabilized α-helix that stabilizes folding characteristics of these proteins (Kobayashi et al., ",
"1991). ",
"Multiple sequence comparisons of several defensins reveal that these proteins have eight cysteines, two glycines, an aromatic residue, and one acidic residue in common (Broekaert et al., ",
"1995). ",
"This small degree of sequence conservation suggests that the cysteine-stabilized α-helix motif provides a scaffold for accommodating a variety of antimicrobial activities. ",
"Two small cysteine-rich proteins isolated from radish seed that exhibit this conserved motif, Rs-AFP1 and Rs-AFP2, were found to inhibit the growth of many pathogenic fungi when the pure protein was added to an in vitro antifungal assay medium. ",
"Transgenic tobacco plants containing the gene encoding Rs-AFP2 protein were found to be more resistant to attack by fungi than non-transformed plants. ",
"Defensin amino acid sequence variants of the radish Rs-AFP2 were identified that exhibited improved antifungal activity (De Samblanx et al, 1997). ",
"Certain amino acid modifications to non-conserved amino acids based on the alignment of the protein with a host of other plant defensins resulted in improvement in the antifungal activity of Rs-AFP2, particularly in the presence of Ca2+. ",
"The amino acid variants all contained an arginine substitution for a naturally occurring amino acid, which increased the net positive charge on the resulting amino acid sequence variant.",
"\nProteins similar to radish seed Rs-AFP2 have been isolated from seeds of other plants (WO 93/105153; Broekaert et al., ",
"1995). ",
"All the proteins in this group share similarity in their amino acid sequence, but differ in their antifungal activities against various fungi, especially in the presence of different mono- and divalent salts. ",
"The activity of some antifungal proteins is dramatically reduced in the presence of 1 mM CaCl2 and 50 mM KCl (Terras et al., ",
"1992). ",
"The usefulness of an antifungal protein for genetically engineering plant disease resistance can be greatly influenced by the sensitivity of the antifungal activity to salt concentration, since metal ions such K+, Na+, Ca2+ and Mg2+ are required for normal physiological functions and are therefore abundantly present in plant cells. ",
"Furthermore, the small size of these proteins suggests that minor modifications to the amino acid sequence could effect dramatic changes in the biological activity of the proteins.",
"\nRecombinant DNA technology has recently led to the development of transgenic plants that can express proteins that have antimicrobial activity against certain pests. ",
"For example, methods for transforming a wide variety of different dicotyledonous plants and obtaining transgenic plants have been reported in the literature (see Gasser and Fraley, 1989; Fisk and Dandekar, 1993; Christou, 1994). ",
"Similarly, methods for producing transgenic plants among the monocotyledonous plants are also well documented. ",
"Successful transformation and plant regeneration have been achieved in asparagus (Asparagus officinalis; Bytebier et al. ",
"1987), barley (Hordeum vulgare; Wan and Lemaux, 1994), maize (Zea mays; Rhodes et al. ",
"1988; Gordon-Kamm et al., ",
"1990; Fromm et al. ",
"1990; Koziel et al., ",
"1993), oats (Avena sativa; Somers et al., ",
"1992), orchardgrass (Dactylis glomerata; Horn et al., ",
"1988), rice (Oryza sativa; including indica and japonica varieties; Toriyama et al., ",
"1988; Zhang et al., ",
"1988; Luo and Wu 1988; Zhang and Wu, 1988; Christou et al., ",
"1991), rye (Secale cereale; De la Pena et al., ",
"1987), sorghum (Sorghum bicolor; Cassas et al., ",
"1993), sugar cane (Saccharum spp.; ",
"Bower and Birch, 1992), tall fescue (Festuca arundinacea; Wang et al., ",
"1992), turfgrass (Agrostis palustris; Zhong et al., ",
"1993), and wheat (Triticum aestivum; Vasil et al., ",
"1992; Troy Weeks et al., ",
"1993; Becker et al., ",
"1994).",
"\nA number of publications have discussed the use of plant and bacterial glucanases, chitinases, and lysozymes produced in transgenic plants exhibiting increased resistance to various microorganisms such as fungi (EP 0 292 435, EP 0 290 123, EP 0 392 225, EP 0 307 841, EP 0 332 104, EP 0 440 304, EP 0 418 695, EP 0 448 511, WO 91/06312, WO 88/00976, WO 90/07001 and U.S. Pat. ",
"No. ",
"4,940,840). ",
"The protection obtained from expression of osmotin-like proteins is discussed in WO 91/18984. ",
"Alfalfa AFP (AlfAFP) is a member of the plant defensin family isolated from the seeds of alfalfa, Medicago sativa, and exhibits broad spectrum antifungal activity including activity against the potato pathogen Verticillium dahliae and the wheat pathogen Fusarium graminearum (U.S. Pat. ",
"Nos. ",
"6,121,436, and 6,316,407). ",
"Expression of AlfAFP in potato was shown to confer resistance to early dying disease caused by Verticillium in potato (Gao et al, 2000). ",
"However, plants expressing AlfAFP also show a reduction in potato tuber size. ",
"AlfAFP was unable to provide an adequate level of protection to plants infected with Fusarium head blight even though the protein exhibited in vitro efficacy against Fusarium graminearum. ",
"\nThere is thus a continuing need to identify biocidal compounds, particularly those that will be effective against plant pathogenic fungi, whether applied as compositions directly to an infected plant or expressed in transgenic plants in amounts sufficient to provide protection against the pathogens."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0006395317614078522,
0.0006140393088571727,
0.0006965906941331923,
0.0006566221127286553,
0.000585641828365624,
0.0006157082971185446,
0.0006279937224462628,
0.0005695264553651214,
0.0007690052734687924,
0.002658745739609003,
0.0006257180939428508,
0.0005873305490240455,
0.0006178191979415715,
0.0007681447314098477,
0.0008598049753345549,
0.0006052029202692211,
0.0005753830773755908,
0.0005789212882518768,
0.0006373029900714755,
0.0007741957088001072,
0.0005988365737721324,
0.00074430659878999,
0.0006181246135383844,
0.0007688169716857374,
0.0006137104937806726,
0.0006809566402807832,
0.0007515262113884091,
0.0007428716635331511,
0.0006604537484236062,
0.0006755221984349191,
0.0006550177349708974,
0.0007688169716857374,
0.0006483955075964332,
0.0006696315249428153,
0.0007605288992635906,
0.0006221286021173,
0.0005769248236902058,
0.0006555248401127756,
0.0005633165710605681,
0.0005877771181985736,
0.0007256140233948827,
0.0009686097037047148,
0.0006303461850620806,
0.0007011460256762803,
0.0006466138293035328,
0.0006898929132148623,
0.0007401083712466061,
0.0006354143843054771,
0.0006391073693521321,
0.000688236381392926,
0.0006275707273744047,
0.019398557022213936,
0.0007538465433754027,
0.0007227636524476111,
0.000684719649143517,
0.0007983855903148651,
0.0006173350848257542,
0.0006398579571396112,
0.0007681447314098477,
0.0006139877950772643,
0.0013785817427560687,
0.000793610408436507,
0.000620063510723412,
0.0008326353854499757,
0.0008322071516886353,
0.0007479626801796257,
0.0007429867400787771,
0.0006474945694208145,
0.0010624960996210575,
0.0005715831648558378
] | 0.000991 | 70 |
[
"Q:\n\nHow to import data from PostgreSQL to Hadoop?",
"\n\nI'm just a beginner in Hadoop and one of my colleges asked me for help in migrating some of PostgreSQL tables to Hadoop. ",
"Since I don't have much experience with PostgreSQL (I know databases though), I am not sure what would be the best way for this migration to happen. ",
"One of my ideas was to export the tables as gson data and then to process them from the Hadoop, as in this example: http://www.codeproject.com/Articles/757934/Apache-Hadoop-for-Windows-Platform. ",
"Are there better ways to import data (tables & databases) from PostgreSQL to Hadoop?",
"\n\nA:\n\nSqoop (http://sqoop.apache.org/) is a tool precisely made for this. ",
"Go through the documentation, sqoop provides the best and the easiest way to transfer your data.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.001030781539157033,
0.0008142584119923413,
0.0006038719438947737,
0.000601230829488486,
0.0007361355819739401,
0.0007350830128416419,
0.0005930625484324992,
0.001995444530621171
] | 0.000889 | 8 |
[
"Ledsham railway station\n\nLedsham railway station was on the Chester and Birkenhead Railway near Little Sutton and about a mile from the hamlet of Ledsham on the Wirral Peninsula in Cheshire, England. ",
"The station was originally named 'Sutton' but renamed Ledsham on the opening of the Hooton to Helsby branch to avoid confusion with the newly built station named Little Sutton. ",
"The station opened on 23 September 1840 at the same time as the railway line, and was closed on 20 July 1959 due to a decline in passenger numbers. ",
"\n\nIn October 1839, Sutton was the scene of a serious riot. ",
"On completion of the works a gang of Irish navvies working from the Birkenhead end met with a gang of English & Welsh navvies working from the Chester end when the contractors' wages clerk for the Irish gang made off with the pay for his men. ",
"Violent fighting between the two gangs ensued over two days involving some 2,000 men; military were sent from Liverpool and Chester, including a piece of ordnance from Chester, and 28 rioters were jailed.",
"\n\nIn 1891, the track from Ledsham Junction (half a mile south of the station) to Rock Ferry was quadrupled and Ledsham Station acquired four platforms. ",
"After the station closed the quadruple track was reduced to double in the 1970s. ",
"Two remaining platforms were in existence until the 1990s when they were demolished to accommodate a new road bridge which was built on the realignment of the A550. ",
"The double track through the station site now forms part of the Wirral Line to Chester, operated by Merseyrail.",
"\n\nServices\n\nReferences\n\nFurther reading\n\nExternal links\nLedsham railway station on Disused Stations\n\nCategory:Disused railway stations in Cheshire\nCategory:Former Birkenhead Railway stations\nCategory:Railway stations opened in 1840\nCategory:Railway stations closed in 1959\nCategory:1840 establishments in England\nCategory:1959 disestablishments in England"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0008155734976753592,
0.0007827041554264724,
0.0006270335288718343,
0.0026807738468050957,
0.0013433682033792138,
0.004071788862347603,
0.0006507135694846511,
0.0008140582358464599,
0.0006488764192909002,
0.0009298393270000815,
0.0006757433293387294
] | 0.001276 | 11 |
[
"\n\nClojure, Multi-core, AWS Cluster Compute & Lattes - brisance\nhttp://dosync.posterous.com/clojure-multi-core-amazon-cluster-compute-lat\n\n======\nalmost\nFrom the article:\n\n \n \n (defn ping []\n (-> (http/get \"http://localhost:5123\" :as :string) \n :content))\n \n (defn multi-ping []\n (->> (repeatedly 16 #(ping))\n (apply str)))\n \n\nCan anyone tell me what --> and ->> do in this context? ",
"I've been trying to\nfind out myself but given that they're both impossible to search for on\nGoogle...\n\n~~~\nKirinDave\nThey're called \"thrush\" but many of us pronounce them \"thread\" and \"thread\nend\".",
"\n\n(-> x expr1 expr2 ... exprN) evaluates x, then takes the result and puts it as\nthe _first_ argument in expr1, evaluates that, and puts the result in the\n_first_ argument of expr2, repeating until exprN, where the result is\nreturned.",
"\n\n(->> x expr1 expr2 exprN) does the same thing, but instead of making it the\nfirst argument it makes it the _last_ argument of subsequent expressions.",
"\n\nClojure's culture generally agrees that the \"subject\" of function calls should\nbe the first argument, so in general the -> operator is all you need.",
"\nSometimes you're shuttling data around, and then ->> comes into play.",
"\n\nPlease note that multi-ping in this is atypical and constructed that way for\ndidactic purposes (i.e., to be transformed later). ",
"Usually you'd see it as:\n\n \n \n (defn multi-ping [] (apply str (repeat 16 ping)))\n \n\nFor readability, some people might prefer to use a let. ",
"I think with only 2\nlevels of nesting, it should be pretty easy to see what's up and I wouldn't\nbother, but that'd look like:\n\n \n \n (defn [] multi-ping\n (let [pings (repeat 16 ping)]\n (apply str pings)))\n\n~~~\nswannodette\nI went ahead and changed my code to use let. ",
"I agree there's no reason to\nthrow people off on such a simple snippet.",
"\n\n~~~\nalmost\nProbably a good idea, but thanks anyway for introducing me to another cool\nfeature of Clojure!",
"\n\n------\nskorgu\nI was confused by:\n\n> In fact for $3.20 (the price of a latte) I can play around with Clojure code\n> on a high performance 8-core 64bit server for two hours.",
"\n\nAn m2.4xlarge spot instance is ~$0.80/hr and has \"26 EC2 Compute Units (8\nvirtual cores with 3.25 EC2 Compute Units each)\".",
"\n\nAre the cluster instances that much closer to bare metal than 'normal' ec2\ninstances or am I missing something?",
"\n\n~~~\nswannodette\n33.5 EC2 compute units and very low latency between instances. ",
"More details\nhere:\n\n<http://aws.amazon.com/ec2/hpc-applications/>\n\n~~~\nskorgu\nI suppose he's going for the 16 cores instead of 8 given the interconnect\nisn't used. ",
"It would be interesting to see a performance comparison between\nthe xlarges and the cluster instances on simple speedups like this.",
"\n\n"
] | {
"pile_set_name": "HackerNews"
} | [
0.0006867010379210114,
0.0012934549013152719,
0.0008407951681874692,
0.0009303794358856976,
0.0006615949678234756,
0.10307927429676056,
0.0005606196355074644,
0.0006968440138734877,
0.0007003592909313738,
0.0016922781942412257,
0.0006055174162611365,
0.0006695798365399241,
0.0006136203883215785,
0.0007316902047023177,
0.0007413462153635919,
0.0005837962962687016,
0.0005361991934478283,
0.001995444530621171
] | 0.006534 | 18 |
[
"Simultaneous spectrophotometric determination of nitroaniline isomers after cloud point extraction by using least-squares support vector machines.",
"\nCloud point extraction has been used for the preconcentration of m-nitroaniline, o-nitroaniline and p-nitroaniline and later simultaneous spectrophotometric determination using polyethylene glycol tert-octylphenyl ether (Triton X-100) as surfactant. ",
"The resolution of a ternary mixture of the nitroaniline isomers (after extraction by cloud point) by the application of least-squares support vector machines (LS-SVM) was performed. ",
"The chemical parameters affecting the separation phase and detection process were studied and optimized. ",
"Under the optimum experimental conditions (i.e. pH 7.0, Triton X-100=0.6%, equilibrium time 20 min and cloud point 75 degrees C), calibration graphs were linear in the range of 0.2-20.0, 0.1-15.0 and 0.1-17.0 microg ml(-1) with detection limits of 0.08, 0.05 and 0.06 microg ml(-1) for m-nitroaniline, o-nitroaniline and p-nitroaniline, respectively. ",
"The experimental calibration matrix was designed with 21 mixtures of these chemicals. ",
"The concentrations were varied between calibration graphs concentrations of nitroaniline isomers. ",
"The root mean square error of prediction (RMSEP) for m-nitroaniline, o-nitroaniline and p-nitroaniline were 0.0146, 0.0308 and 0.0304, respectively. ",
"This procedure allows the simultaneous determination of nitroaniline isomers in synthetic and real matrix samples good reliability of the determination was proved."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0006289841840043664,
0.0006905095069669187,
0.0005814304458908737,
0.000524739152751863,
0.0006133114802651107,
0.0005674782441928983,
0.0006001464207656682,
0.0006843040464445949,
0.0005387976998463273
] | 0.000603 | 9 |
[
"INTRODUCTION {#sec1-1}\n============\n\nThe management protocol for differentiated thyroid cancer includes whole body iodine-131 imaging to detect residual thyroid tissue and distant metastasis after thyroidectomy. ",
"However, the diagnostic dose of radioiodine may fail to detect the non-functioning or poorly functioning metastasis. ",
"Hybrid SPECT-CT imaging may be used in such cases to detect both the functioning and non-functioning metastases in the same study.",
"\n\nCASE REPORT {#sec1-2}\n===========\n\nA 43-year-old Asian female reported to our institute with a mass in the anterior part of her neck, increasing in size for the past one year, with retrosternal extension. ",
"Fine needle aspiration cytology was inconclusive with regard to the benign or malignant nature of the mass. ",
"The patient underwent total thyroidectomy and papillary thyroid carcinoma was diagnosed on histopathology. ",
"Whole body iodine-131 scan (I-131 WBS) was performed after six weeks of thyroxine abstinence, using a dual-head gamma camera fitted with medium energy collimators (Infinia Hawkeye 4, GE, Milwaukee, USA), 48 hours after oral administration of 74 MBq of I-131. ",
"A large radioiodine--avid focus was seen in the neck, in the midline, with an additional focus in the upper part of the left lung \\[[Figure 1](#F0001){ref-type=\"fig\"}\\]. ",
"Mild, irregular tracer uptake was also detected in both lung bases, suggestive of pulmonary metastases.",
"\n\n![",
"Post-thyroidectomy whole-body Iodine-131 scan showing radioiodine--avid foci in the neck and upper part of the left lung. ",
"Mild, irregular tracer uptake is also seen in both lung bases](IJNM-25-29-g001){#F0001}\n\nHybrid SPECT-CT fusion imaging was then performed on the same camera. ",
"The focus in the neck was localized to the residual thyroid tissue, 1 cm below the lower border of the thyroid cartilage, on the left side \\[[Figure 2a](#F0002){ref-type=\"fig\"}\\]. ",
"In addition, multiple radio-opaque nodules were detected in both the lungs, on the CT image. ",
"Radioiodine concentration was seen in a few of these nodules on the fused SPECT-CT images; most of the nodules did not show any radioiodine avidity at the dose used \\[[Figure 2b](#F0002){ref-type=\"fig\"}‐[d](#F0002){ref-type=\"fig\"}\\]. ",
"The patient was subsequently given high-dose radioiodine therapy at another institute by one of the authors (CSB). ",
"The post-therapy I-131 WBS acquired there showed extensive I-131 avid metastases in both lungs \\[[Figure 3](#F0003){ref-type=\"fig\"}\\].",
"\n\n![",
"a) Hybrid SPECT-CT fusion shows I-131 uptake in the residual thyroid tissue on the left side of the neck; b-d) Multiple radio-opaque nodules are seen in both lungs, with radioiodine concentration in a few of these nodules](IJNM-25-29-g002){#F0002}\n\n![",
"Post therapy whole body scan shows extensive I-131 avid metastases in both lungs](IJNM-25-29-g003){#F0003}\n\nDISCUSSION {#sec1-3}\n==========\n\nThe lung is one of the most common sites for distant metastases from differentiated thyroid carcinoma (DTC).\\[[@CIT1]\\] The reported rate of pulmonary metastases from DTC varies from 2 to 20%.\\[[@CIT2]\\] I-131 WBS plays an important diagnostic role in the detection of lung metastasis from DTC. ",
"However, in cases with considerable residual thyroid tissue, even post-therapy WBS may fail to show I-131 concentration in the lungs owing to significant neck uptake.\\[[@CIT3]\\] It has been reported that the sensitivity of a chest X-ray in the detection of lung metastases (52%) is lower than that of WBS (64%) and thoracic CT (82%).\\[[@CIT4]\\] It is generally believed that the CT images provided by a SPECT-CT system are of little diagnostic value as they do not possess the image properties of a diagnostic CT.\\[[@CIT5]\\] However, while the hybrid system CT component cannot replace a CT scan of diagnostic quality, it appears to be sufficient for the anatomical localization of scintigraphic foci.\\[[@CIT6]\\] Integrated I-131 SPECT-CT imaging has an additional value in patients with thyroid cancer, for characterization of equivocal tracer uptake seen on planar imaging as well as for precise localization of malignant lesions in the neck, chest, and skeleton. ",
"This localization of I-131 uptake may have a clinical impact on patient management by influencing referral for I-131 treatment, tailoring of the administered radioiodine dose, and / or the addition of surgery or external radiation therapy when indicated.\\[[@CIT7]\\] While most previous studies have performed this procedure after a therapeutic dose of radioiodine,\\[[@CIT8]\\] the present case illustrates that hybrid SPECT-CT fusion may identify the full extent of pulmonary metastases, when combined with low-dose (diagnostic) I-131 whole body scan.",
"\n\nThe authors gratefully acknowledge the technical assistance of Mr. Madan Parmar in the acquisition and processing of the SPECT-CT images.",
"\n\n**Source of Support:** Nil\n\n**Conflict of Interest:** None declared\n"
] | {
"pile_set_name": "PubMed Central"
} | [
0.000905413762666285,
0.000847094226628542,
0.0005510466289706528,
0.0012237436603754759,
0.0006501881871372461,
0.0007254321244545281,
0.0009056743001565337,
0.0006721100071445107,
0.0006151689449325204,
0.0019055769080296159,
0.0012953089317306876,
0.0005824582185596228,
0.0007065819227136672,
0.000597013218794018,
0.0006547586526721716,
0.0005816657212562859,
0.0006425767787732184,
0.0019055769080296159,
0.0006789671606384218,
0.0007201579282991588,
0.0007776690763421357,
0.0006106350920163095,
0.0005014351918362081,
0.000870332180056721
] | 0.000839 | 24 |
[
"<pe-steps [(activeIndex)]=\"activeIndex\" (change)=\"onChangeStep($event)\">\n <!-- ",
"Hierarchical data with zero configuration -->\n <pe-step label=\"Hierarchical data with zero configuration\">\n <p-organizationChart [value]=\"dataBasic\"></p-organizationChart>\n </pe-step>\n\n <!-- ",
"Advanced customization -->\n <pe-step label=\"Advanced customization\">\n <p-organizationChart [value]=\"dataAdvanced\" styleClass=\"company\">\n <ng-template let-node pTemplate=\"department\">\n <div class=\"node-header ui-corner-top\">\n {{node.label}}\n </div>\n <div class=\"node-content ui-corner-bottom\">\n <img src=\"/assets/data/avatar/{{node.data.avatar}}\" width=\"32\">\n <div>{{node.data.name}}</div>\n </div>\n </ng-template>\n <ng-template let-node pTemplate=\"default\">\n {{node.label}}\n </ng-template>\n </p-organizationChart>\n </pe-step>\n\n <!-- ",
"Selection and events -->\n <pe-step label=\"Selection and events\">\n <p-organizationChart [value]=\"dataAdvanced\" styleClass=\"company\"\n selectionMode=\"single\" [(selection)]=\"selectedNode\"\n (onNodeSelect)=\"onNodeSelect($event)\">\n <ng-template let-node pTemplate=\"department\">\n <div class=\"node-header ui-corner-top\">\n {{node.label}}\n </div>\n <div class=\"node-content ui-corner-bottom\">\n <img src=\"/assets/data/avatar/{{node.data.avatar}}\" width=\"32\">\n <div>{{node.data.name}}</div>\n </div>\n </ng-template>\n <ng-template let-node pTemplate=\"default\">\n {{node.label}}\n </ng-template>\n </p-organizationChart>\n </pe-step>\n</pe-steps>\n\n<p-dialog header=\"VCard\" [(visible)]=\"display\"\n modal=\"modal\" width=\"320\" [responsive]=\"true\">\n <i class=\"fa fa-address-card-o\"></i>\n <ul style=\"padding: 0.2em 0.8em;\">\n <li>Full name: {{selectedVCard?.fullName}}</li>\n <li>Birthday: {{selectedVCard?.birthday}}</li>\n <li>Address: {{selectedVCard?.address}}</li>\n <li>E-mail: {{selectedVCard?.email}}</li>\n </ul>\n</p-dialog>\n\n<p-growl [value]=\"msgs\"></p-growl>"
] | {
"pile_set_name": "Github"
} | [
0.0006770661566406488,
0.0008605270995758474,
0.0007461391505785286,
0.0008849140722304583
] | 0.000792 | 4 |
[
"Pedal or peroneal bypass: which is better when both are patent?",
"\nWe compared autogenous vein pedal and peroneal bypasses, focusing on extremities that could have a bypass to either artery. ",
"From 1985 to 1993 we performed a total of 175 pedal and 77 peroneal autogenous vein bypasses for rest pain (n = 75, 30%) and tissue loss (n = 177, 70%). ",
"One hundred ninety-six (78%) in situ saphenous vein and 56 (22%) reversed or composite vein bypasses were performed. ",
"One hundred fifty-two of these 252 bypasses were performed in extremities with both the pedal and peroneal arteries patent by arteriography. ",
"The vascular surgeon chose to perform 99 pedal and 53 peroneal vein bypasses in these 152 extremities. ",
"The angiogram score of the outflow arteries were similar for pedal and peroneal bypasses with the Society for Vascular Surgery and the International Society for Cardiovascular Surgery and modified scoring systems. ",
"At 2 years the primary and secondary patency rates for pedal bypasses (70% and 77%) were not significantly different compared with those for peroneal bypasses (60% and 72%). ",
"Limb salvage rates at 2 years were similar for pedal and peroneal bypasses for all patients (74% and 73%), patients with both pedal and peroneal arteries patent (83% and 72%), diabetics (76% and 66%), and patients with tissue necrosis (77% and 71%). ",
"Pedal and peroneal artery bypasses with equivalent angiogram scores have similar long-term graft patency and limb salvage. ",
"The choice between pedal or peroneal artery bypass should be based on the quality of vein and the surgeon's preference."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0008031547185964882,
0.0007254956872202456,
0.0011655476409941912,
0.000661770929582417,
0.0011917561059817672,
0.0012266471749171615,
0.0007916021277196705,
0.000702977180480957,
0.00079120765440166,
0.0016024078940972686,
0.0005953420768491924
] | 0.000933 | 11 |
[
"The instant invention relates generally to hair grooming devices and more specifically it relates to a hair coloring comb. ",
"Numerous hair grooming devices have been provided in prior art that are adapted to apply hair dye, perfume, viscous solutions, water, treatment solutions and the like to the hair. ",
"For example, U.S. Pat. ",
"Nos. ",
"4,747,420 to Alaimo; 4,934,388 to Gibbs; 5,056,480 to Murray, Sr. ",
"and 5,059,050 to Guglielmo all are illustrative of such prior art.",
"\nWhile these units may be suitable for the particular purpose to which they address, they would not be as suitable for the purposes of the present invention as heretofore described."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.000602338055614382,
0.0006214973982423544,
0.0007750851800665259,
0.0008322071516886353,
0.0008996851393021643,
0.0012159240432083607,
0.0005738030886277556
] | 0.000789 | 7 |
[
"Release of calcitonin gene-related peptide-like (CGRP-LI) immunoreactivity from rat isolated soleus muscle by low pH, capsaicin and potassium.",
"\nCapsaicin (10 microM), KCl (80 mM) or superfusion with a low pH medium (pH 5 or 6) produced a significant increase of calcitonin gene-related peptide-like immunoreactivity (CGRP-LI) outflow from the superfused rat isolated soleus muscle. ",
"CGRP-LI outflow produced by capsaicin or pH 5 medium was totally abolished in a calcium free medium containing EDTA (1 mM) and the effect of pH 5 medium was prevented by a previous application of capsaicin. ",
"Ruthenium red (10 microM) produced a marked inhibition of CGRP-LI release produced by capsaicin or pH 5 medium (69 and 84%, resp.), ",
"without affecting that evoked by KCl. ",
"These findings demonstrate that protons activate capsaicin-sensitive primary afferents in rat skeletal muscle through a Ruthenium red-sensitive mechanism. ",
"Proton-induced CGRP-LI release in skeletal muscle could be of relevance during exercise and/or skeletal muscle ischemia."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0009379010298289359,
0.0011704742209985852,
0.0006366309826262295,
0.0007804284687153995,
0.0006845786701887846,
0.0011111340718343854,
0.0008763105724938214
] | 0.000885 | 7 |
[
"Abstract\n\nObjective\n\nThe objective of the study was to evaluate the ability of the noninvasive magnetic resonance techniques to monitor the scaffold-aided process of articular cartilage repair.",
"\n\nMaterials and methods\n\nDefects of 4 mm in diameter and 3 mm in depth were created in right knees of 30 adolescent white New Zealand rabbits. ",
"Fourteen rabbits were implanted with poly(lactide-co-glycolic acid) (PLGA) scaffold trimmed to match the size and the shape of the defect (PLGA+ group). ",
"No procedure was applied to the remaining 16 animals (PLGA− group). ",
"Animals were sacrificed sequentially at 4, 12, and 24 weeks after the surgery and magnetic resonance T2-weighted images (400 MHz) of the dissected bone plugs at eight different echo times were taken to derive T2 relaxation time. ",
"The images and the T2 time dependencies versus the tissue depth were statistically analyzed. ",
"Histological results of bone plugs were evaluated using semiquantitative histological scales.",
"\n\nResults\n\nThe results obtained for PLGA repair tissue were evaluated versus the PLGA− group and the healthy tissue harvested from the opposite knee (reference group), and compared with histological results (hematoxylin and eosin staining). ",
"The magnetic resonance images and T2 relaxation time profiles taken 4 weeks after surgery for both the PLGA− and PLGA+ group did not reveal the tissue reconstruction. ",
"After 12 weeks of treatment T2 time dependence indicates a slight reconstruction for PLGA+ group. ",
"The T2 time dependence obtained for PLGA+ samples taken after 24 weeks of treatment resembled the one observed for the healthy cartilage, indicating tissue reconstruction in the form of fibrous cartilage. ",
"The tissue reconstruction was not observed for PLGA− samples.",
"\n\nConclusion\n\nThe study revealed correlation between magnetic resonance and histology data, indicating the potential value of using MRI and spatial variation of T2 as the noninvasive tools to evaluate the process of articular cartilage repair. ",
"It also suggested, that the PLGA scaffold-aided treatment could help to restore the proper architecture of collagen fibrils.",
"\n\nKeywords\n\nCartilage repair T2 spatial variation MRI T2 anisotropy PLGA\n\nAbbreviations\n\nPGA\n\nPoly(glycolic acid)\n\nPLA\n\nPoly(lactic acid)\n\nPLGA\n\nPoly(lactide-co-glycolic acid)\n\nROI\n\nRegion of interest\n\nFOV\n\nField of view\n\nSFM\n\nSerum-free medium\n\nPLGA+\n\nGroup treated with PLGA scaffold\n\nPLGA−\n\nGroup treated without PLGA scaffold\n\nThis work was supported by Government Granted Project KBN 3 PO5 E 049 23."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0006805420271120965,
0.0016650344477966428,
0.0011439976515248418,
0.0006002273876219988,
0.0006236123736016452,
0.0005648192600347102,
0.0006291760946623981,
0.0006317453808151186,
0.0005822955863550305,
0.0005654141423292458,
0.0038544111885130405,
0.0005701156915165484,
0.0005903361598029733,
0.0009432349470444024,
0.0008460225653834641
] | 0.000966 | 15 |
[
"Right alongside the cash and credit cards, I keep a number of strange things in my wallet.",
"\n\nThe largest is a folded-up page from the July 6, 2009 issue of Fortune magazine. ",
"In a profile, Scott Boras, widely regarded as the most powerful agent in professional baseball, describes a dinner with one of his mentors after a record-breaking contract:\n\n“He said that if you are really effective at what you do, 95% of the things said about you will be negative. ",
"Keep your head on straight, don’t get emotional, take the heat, and just make sure your clients are smiling.”",
"\n\nDoing anything remotely interesting will bring criticism. ",
"Attempting to do anything large-scale and interesting will bring armies of detractors and saboteurs. ",
"This is fine – if you are willing to take the heat.",
"\n\nThere are good reasons to be willing, even eager.",
"\n\nColin Powell makes the case: pissing people off is both inevitable and necessary. ",
"This doesn’t mean that the goal is pissing people off. ",
"Pissing people off doesn’t mean you’re doing the right things, but doing the right things will almost inevitably piss people off.",
"\n\nUnderstand the difference.",
"\n\nBeing responsible sometimes means pissing people off. ",
"Good leadership involves responsibility to the welfare of the group, which means that some people will get angry at your actions and decisions. ",
"It’s inevitable, if you’re honorable. ",
"Trying to get everyone to like you is a sign of mediocrity: you’ll avoid the tough decisions, you’ll avoid confronting the people who need to be confronted, and you’ll avoid offering differential rewards based on differential performance because some people might get upset. ",
"Ironically, by procrastinating on the difficult choices, by trying not to get anyone mad, and by treating everyone equally “nicely” regardless of their contributions, you’ll simply ensure that the only people you’ll wind up angering are the most creative and productive people in the organization.",
"\n\n\n\nDon’t go through life with kid gloves on. ",
"The stakes are too high, and it is oftentimes more important to give people what they need, rather than what they want.",
"\n\nThis includes ourselves. ",
"By facing the fire early and often, we ensure the confidence and breathing room later to do bigger and better things.",
"\n\nOr to just sit back in a hammock with the peace of mind that only comes with belief that you did your best.",
"\n\nBe criticized for doing small “safe” things, or be criticized for doing big things that you’re passionate about. ",
"That is the choice. ",
"The criticism will come either way, whether in the form of self-talk (the former) or ankle biters (the latter).",
"\n\nLet the critics criticize. ",
"It’s the builders who count.",
"\n\nA version of this post first appeared on FourHourWorkWeek.com. ",
"Tim Ferriss is the #1 bestselling author of The 4-Hour Workweek, The 4-Hour Body and The 4-Hour Chef.",
"\n\n"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0006968785310164094,
0.0005745361559092999,
0.0006115864962339401,
0.009893923997879028,
0.0011320216581225395,
0.04582070931792259,
0.0006692592287436128,
0.0005745867965742946,
0.3161967098712921,
0.6198460459709167,
0.825045108795166,
0.000795783766079694,
0.7255225777626038,
0.0007488545961678028,
0.001069365651346743,
0.05730002373456955,
0.003174734301865101,
0.14227448403835297,
0.0009962065378203988,
0.000740058661904186,
0.0007170747849158943,
0.019729457795619965,
0.0006100751925259829,
0.000835943385027349,
0.0007670526392757893,
0.0014886424178257585,
0.00877419300377369,
0.0006301479297690094,
0.0006595200393348932,
0.001995444530621171
] | 0.092996 | 30 |
[
"Lazio confirm Hoedt for July\n\nBy Football Italia staff\n\nThe saga of Wesley Hoedt's transfer from AZ Alkmaar to Lazio is over, as the Biancocelesti confirm that he will be joining them in July.",
"\n\nThe player had his medicals with the team today as negotiations went on to bring the player in either before the end of this transfer window or in time for the summer.",
"\n\nThe clubs have reached an agreement for the latter, as club spokesman Stefano De Martino spoke to Lazio Style Radio 89.3 and revealed the final details.",
"\n\n“Hoedt is going to be a Lazio player from July 1st. ",
"On that date he'll be able to wear the Biancocelesti jersey.”",
"\n\nThe club further confirmed the news via their Twitter account.",
"\n\nImage via @OfficialSSLazio\n\nWatch Serie A live in the UK on Premier Sports for just £9.99 per month including live LaLiga, Eredivisie, Scottish Cup Football and more. ",
"Visit: https://www.premiersports.com/subscribenow"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0006516692810691893,
0.000624955864623189,
0.0005392202874645591,
0.000977574847638607,
0.0012966619106009603,
0.0005615769769065082,
0.0006624736124649644,
0.0006381749408319592
] | 0.000744 | 8 |
[
"Q:\n\nWhat affects air quality indoors after home improvement?",
"\n\nWe installed a new A/C in the corner room of our house a little while back, because we wanted to use it as a nursery. ",
"Installation went fine and the little one sleeps in there every night. ",
"A few months later we decided to get a baby cam, which happens to have an air quality monitor build in. ",
"I noticed strange things happening to the air quality in the room, which reaches concerning levels at times, hence my question:\nWhat affects air quality indoors after home improvement?",
"\nCould the A/C unit itself blow in bad air?",
"\nCould the carpet or the ceiling cause bad air quality?",
"\nCould furniture (mattress / sofa / closet / drawer) cause bad air quality?",
"\nNow, I am obviously aware that keeping the windows closed and consuming air should gradually worsen the air quality, but what has been happening the last nights is more weird than that - the air quality suddenly goes from pretty good to bad in a matter of a few minutes. ",
"Now it could be a problem with the sensor, of course, but I did confirm with a secondary sensor, who gave similar results.",
"\nSo, any idea what could cause sudden bursts of pollution into the air?",
"\nIs that an indication of mold or would you expect an A/C to be able to actually worsen the air quality (I generally thought it would improve it)?",
"\n\nA:\n\n\"Air quality\" is an ambiguous phrase.",
"\nThis baby monitor that you bought, on what basis does it determine the air quality in the room? ",
"Carbon monoxide, carbon dioxide, radon, particulates, pollen, VOCs, smoke?",
"\nThere are literally thousands of things that can affect air quality. ",
"I don't think I would get too worried about a baby monitor, that doubles as an air quality sensor, giving you an overall poor reading without knowing why it is showing a poor reading.",
"\nOpen the room (and your house) once a week and get fresh air into the room. ",
"If you are really concerned get a better piece of equipment to monitor your air quality that shows specifics about the content of the air. ",
"That would give you a better idea how to remedy poor air quality.",
"\nGood luck!",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0006309643504209816,
0.000569558993447572,
0.0011157537810504436,
0.0006100636092014611,
0.0005471172044053674,
0.011579212732613087,
0.0009280929807573557,
0.0006996128358878195,
0.0007249487098306417,
0.0006678731297142804,
0.0012069903314113617,
0.0005960960988886654,
0.0005655378918163478,
0.0007552760653197765,
0.001032219734042883,
0.0006090413080528378,
0.0014304283540695906,
0.0012176834279671311,
0.0005774972960352898,
0.0007817518780939281,
0.0007107228739187121,
0.001995444530621171
] | 0.001343 | 22 |
[
"My blog on Fashion and beauty,and nail art, mainly inspired by my day to day life, I'm not a profesional but I hope to inspire others.",
"\nxx\nPlease contact me laurajanethomas6@gmail.com\n\nWednesday, 20 November 2013\n\nSad News\n\nSad News\n\nThis is Laura's mum, I write with sadness to inform all of Laura s followers, if they have not heard that Laura was tragically killed on July 21st this year. ",
"It has been with very mixed givings as to whether to write this as I know Laura s last blog was written the day before the accident.",
"\n\nLaura was involved in a road traffic accident as a passenger in a vehicle that had broken down on the side of the road. ",
"As her family and friends have been truly devastated it has taken a while to put together a Community Facebook page Little Laura, and we are in the process of building a webpage all in Little Laura's name to continue the fundraising work that Laura was doing for RDA (Riding for the disabled) and giving support to the primary school that Laura loved working for, Marshlands.",
"\n\nLooking through this blog has given family and friends tremendous support and all the lovely photographs that have been posted.",
"\n\nLaura was only twenty, but packed a lot of things into her short life, she will always be remembered as a bright sparkingly beautiful star with a caring and compassionate personality towards others."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0006276904023252428,
0.0007423784118145704,
0.0005684182397089899,
0.0007861257181502879,
0.0005407450371421874,
0.0005101657588966191,
0.0009962460026144981
] | 0.000682 | 7 |
[
"Harry Potter Fans Will Be Able to Buy Butterbeer Doughnuts Soon Album\n\nOctober 12, 2017 04:00 Views: 10\n\nThe magic of Harry Potter is coming to Sugar Shack Donuts.",
"\n\nThe chain’s Virginia Beach location recently unveiled an upcoming flavor that will be familiar to fans of the J.K. Rowling books and films: butterbeer. ",
"Inspired by the drink sold in the wizard village of Hogsmeade, the doughnuts look absolutely delicious. ",
"Not only are they covered in glaze, gold sprinkles, and stars, the sweet treats are topped with golden snitches made from doughnut holes. ",
"Yum.",
"\n\nThe Virginia Beach shop’s Instagram account showed them off on in early October, teasing that they’d be available later in the month.",
"\n\n“Yes, we will have Butterbeer Donuts this month, but no we don’t yet,” the caption read. “",
"In the meantime, bring your favorite HP novel for a free house donut today. ",
"Physical books only, no ebooks.”",
"\n\nYes, we will have Butterbeer Donuts this month, but no we don’t yet. ",
"In the meantime, bring your favorite HP novel for a free house donut today. ",
"Physical books only, no ebooks. #",
"vbdonuts #virginiabeach #harrypotter #butterbeer #donuts #donutshop #sugarshack #sugarshackdonuts\n\nThe doughnuts are expected to be in short supply once they launch, the shop told Hello Giggles. ",
"The Virginia Beach location so far only plans to sell them on a limited number of dates: Oct. 14, 15, 21, and 22. ",
"Those hoping to try the butterbeer doughnuts are advised to call ahead.",
"\n\nAh, if only we could summon them. ",
"We might just have to enjoy the doughnuts via pictures and envy the lucky Muggles who get to eat them."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0025930677074939013,
0.0006524924538098276,
0.0007614038186147809,
0.0022676954977214336,
0.0008262654882855713,
0.0005740366759710014,
0.006011927034705877,
0.0011696062283590436,
0.0006547715165652335,
0.005243348423391581,
0.0011696062283590436,
0.0006317267543636262,
0.013954930007457733,
0.0005927464226260781,
0.0007171287434175611,
0.00089499686146155,
0.00103571021463722
] | 0.002338 | 17 |
[
"Q:\n\nDisable Escape key in Safari for getting out of full screen mode\n\nI use Safari in Full Screen mode on OS X Mavericks all the time. ",
" I also use the escape key in web pages fairly frequently for various things (depends on the webpage).",
"\nOne unfortunate side effect of these two facts is that I will occasionally turn off Full Screen mode inadvertently by hitting the escape key on a page that doesn't intercept the escape key.",
"\nIs there a way to disable the \"Escape turns off full screen mode\" behavior in Safari?",
"\n\nA:\n\nNow, you could go ahead and brute-force disable the Escape key in\n Safari. ",
"But that'd defeat the purpose of still allowing Escape to work\n as a shortcut in the aforementioned places, which I'd rather avoid.",
"\n\nSee here for an example to remap Escape to ⌥Escape with a Keyboard Maestro macro:\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0008859212975949049,
0.0005845624255016446,
0.0010409147944301367,
0.0008863866096362472,
0.001686207833699882,
0.0009414025116711855,
0.0006914215628057718
] | 0.00096 | 7 |
[
"The present invention relates generally to a system for dispensing particles. ",
"In particular, the invention relates to an apparatus and method for monitoring and controlling the velocity of particles in a pneumatic product application system.",
"\nAgricultural implements such as air seeders and row crop planters employ pneumatic means to convey product such as seed and fertilizer from a centralized hopper to distribution on the ground. ",
"Controlling particle flow at an acceptable operating speed can be a difficult task Too much air velocity and thus increased particle velocity can result in product damage and product bouncing or blowing out of the ground furrow. ",
"High particle velocity can also result in increased wear on the plastic air lines of an air seeder and excess consumption of fan power. ",
"Too little air velocity can result in plugging of air delivery lines.",
"\nThe air velocity is difficult to optimize for a number of reasons. ",
"The minimum carry velocity varies for different product mass flow rates and for different product types, both of which may change during a field operation.",
"\nAnother issue adding to the difficulty in optimizing the air flow velocity occurs when the configuration of the cart is altered. ",
"The delivery hoses in the air system may be reconfigured in a number of ways upsetting the balance of the air flow system. ",
"Even during field operation, if the air seeding system operates on a side slope, the resistance to particle flow will become greater in the line which have raised and vice versa for the lower lines.",
"\nPrior art methods of monitoring the particle flow of a system generally count the seeds at some point in the delivery system to ensure the proper number of seeds is being placed into the ground. ",
"Other systems simply monitor the air flow velocity, which provides a general indication of operating levels, but is not accurate since different products have different carry velocities.",
"\nMany air carts are equipped with methods of adjusting the air flow through the delivery lines by means of damping mechanisms and fan speed adjustment. ",
"One such system is disclosed in United States provisional patent application Ser. ",
"No. ",
"60/086,422. ",
"This prior art system requires interaction of the operator to increase or decrease the air velocity.",
"\nThe drawbacks of prior art include the need for manual adjustments to damping mechanisms and fan speed, complexity of the manual adjustments, and lost time and money on operation and maintenance of the air carts.",
"\nThere are also further difficulties when the air cart is configured for double or triple shoot applications since each product may have a different carrying velocity.",
"\nThus, there is a need for a system of monitoring and controlling particle velocity automatically in an air delivery system"
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.000578817562200129,
0.0005483480053953826,
0.0006052315002307296,
0.0008714636787772179,
0.0007532113813795149,
0.000941620150115341,
0.0005861592362634838,
0.0005405752453953028,
0.0006156880408525467,
0.0006038396968506277,
0.0006314931670203805,
0.0005691322148777544,
0.0006061866297386587,
0.0006206372636370361,
0.000611300696618855,
0.0013785817427560687,
0.0008141544531099498,
0.0006959894672036171,
0.0007002411875873804,
0.0006467236089520156,
0.0006351745687425137
] | 0.000693 | 21 |
[
"include README.md\nrecursive-include synnefo/webproject/static *\nrecursive-include synnefo/webproject/templates *\nrecursive-include docs *\nprune docs/_build\nrecursive-include extras *\n"
] | {
"pile_set_name": "Github"
} | [
0.0011453840415924788
] | 0.001145 | 1 |
[
"High power devices such as IGBTs (insulated gate bipolar transistors), power MOSFETs (metal oxide semiconductor field effect transistors), power diodes, etc. ",
"are typically assembled by sawing (dicing) individual dies from a wafer and placing the individual dies in packages. ",
"Electrical connections are made to each packaged die by wire bonding, metal ribbons, metal clips, etc. ",
"It is advantageous for many power devices with a vertical current path between electrodes at opposing sides of the die to be made as thin as possible to reduce the on-state resistance (Rdson) of the device. ",
"However, conventional high power semiconductor packages are not designed for very thin dies, e.g. dies <50 μm thick. ",
"Dies that are less than 50 μm thick are highly susceptible to cracking during the sawing (dicing) and die attach processes due to the forces involved. ",
"As such, conventional semiconductor dies typically have a vertical current path much thicker than 50 μm. ",
"Dies of such thickness have higher Rdson and inefficient heat transfer due to the thick semiconductor limitation. ",
"In addition, most conventional packages provide only single-sided or double-sided cooling which lowers continuous heat dissipation for high power devices."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0008209323859773576,
0.003442365676164627,
0.0005999374552629888,
0.0007150654564611614,
0.0007179261301644146,
0.001198354410007596,
0.000620595645159483,
0.0009581850026734173,
0.0006591245182789862
] | 0.001081 | 9 |
[
"Performance of the Advia Centaur second-generation troponin assay TnI-Ultra compared with the first-generation cTnI assay.",
"\nA cardiac troponin concentration above the 99th percentile limit of a reference population is a sensitive marker of myocardial necrosis. ",
"Current guidelines require troponin assays to have a total imprecision of < or =10% at the 99th percentile limit. ",
"In this study, the Advia Centaur second-generation TnI-Ultra assay was validated and compared with its predecessor the cardiac troponin I (cTnI) assay, with a focus on the current guidelines for diagnosis of acute myocardial damage. ",
"An imprecision profile of the TnI-Ultra assay was evaluated by analysing different pools over 20 days. ",
"The imprecision of the cTnI assay was used as comparison. ",
"The reference range was established based on TnI-Ultra analysis in 221 individuals. ",
"The cTnI concentration that could be determined with a total imprecision of 10% was 0.05 microg/L for the TnI-Ultra assay and 0.3 microg/L for the cTnI assay. ",
"The 99th percentile limit in the distribution of a reference population was 0.06 microg/L as determined with the TnI-Ultra assay. ",
"The TnI-Ultra assay provides significantly improved sensitivity when compared with the cTnI assay and a total imprecision of < or =10% is obtained at the 99th percentile limit of value distribution of a reference population. ",
"Using the TnI-Ultra assay, slightly increased cTnI concentration can be detected reliably following the current guidelines."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0010437329765409231,
0.003366871504113078,
0.0009210350690409541,
0.0009419372654519975,
0.0005652221152558923,
0.000702063029166311,
0.0005464949645102024,
0.0006521101458929479,
0.0007139963563531637,
0.0006297663785517216,
0.0005877154762856662
] | 0.00097 | 11 |
[
"Q:\n\nflag declined with message \"declined - Answers don't need to be flagged just because they're link-only.\"",
"\n\nAlthough these types of flags have been received positively in the past (you can see my flagging history, if you are allowed). ",
"I strongly believe that links should be used in comments and not answers.",
"\nStack Overflow itself have been providing this flagging option while reviewing low quality or other type of answers.",
"\n\nA:\n\nHe's right, they don't. ",
"We should also note that you flagged three link-only answers on that particular question. ",
"Doesn't that tell you something about the question? ",
"That just maybe it's the question's fault and not the answer's?",
"\nThe right course of action here is not deleting all the answers for being link-only, but deleting the question for soliciting those link-only answers (and because, in this case, it's a terrible question). ",
"Instead casting a single flag on the question explaining why you think it should be deleted would be an appropriate action that moderators could better evaluate. ",
"Something like:\n\nThis question is just filled with link-only answers. ",
"It is closed and has low views and should be deleted.",
"\n\nPlease don't just look at answers and think \"oh it's only a link, I should flag it.\" ",
"That's a bad train of thought. ",
"Actually evaluate the answer in the context of the question.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0006695948541164398,
0.0005486904992721975,
0.0005657796282321215,
0.0005887159495614469,
0.0011319882469251752,
0.0005751377320848405,
0.0007158447406254709,
0.0007355259149335325,
0.0007725334144197404,
0.000652988557703793,
0.0007761516608297825,
0.0013196083018556237,
0.0006362675921991467,
0.0011504556750878692,
0.0005494420183822513,
0.001995444530621171
] | 0.000837 | 16 |
[
"Preferential response of acute myeloid leukemias with translocation involving chromosome 17 to human recombinant granulocyte colony-stimulating factor.",
"\nInduction of proliferation and differentiation in response to the addition of recombinant human granulocyte colony-stimulating factor (G-CSF) was studied by both suspension and semisolid cultures in a series of acute myeloid leukemias (AML). ",
"Induction of proliferation by G-CSF alone was observed in six of 27 cases of AML. ",
"All acute promyelocytic leukemias with the specific chromosomal translocation t(15;17) and one case of myelomonocytic leukemia with balanced chromosomal translocation involving chromosome 17 at band q12q21 were induced to proliferate strongly by the G-CSF. ",
"However, contrary to the long-term proliferative effect observed with granulocyte/macrophage colony-stimulating factor (GM-CSF), G-CSF activity can be characterized by its capability to initiate and promote the growth of responding AML cells but not to sustain long-term proliferation. ",
"Finally, no terminal differentiation was found, as assessed by morphology, cytochemistry, and cell surface marker analysis. ",
"These results indicate that G-CSF may be sufficient to provide a specific signal for induction of a transient proliferation in AML without induction of terminal differentiation. ",
"The cells with the highest response are clonal leukemia cells, all bearing a translocation involving the chromosome region 17q12q21 in which the G-CSF gene has been recently located."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0008255760767497122,
0.0005840584053657949,
0.0005842059617862105,
0.0007329666404984891,
0.0007026212988421321,
0.000558632193133235,
0.000544789363630116,
0.0007323208265006542
] | 0.000658 | 8 |
[
"Clinical results of percutaneous closure of large secundum atrial septal defects in children using the Amplatzer septal occluder.",
"\nWe reviewed our experience using the Amplatzer septal occluder (AGA Medical, Golden Valley, MN, USA) to close large, secundum-type atrial septal defects (ASDs) in children. ",
"Between June 2002 and December 2005, 52 patients (mean age 13.5 +/- 8.7 years) underwent transcatheter closure of large (> or =25 mm), secundum ASDs with the use of the Amplatzer septal occluder (ASO). ",
"Groups 1 and 2 included patients with a retroaortic rim of <5 mm (n = 39) or > or =5 mm (n = 13), respectively. ",
"All procedures were performed with general anesthesia and transesophageal echocardiographic guidance except for 10 patients, which involved local anesthesia and three-dimensional transthoracic echocardiography. ",
"Successful device implantations, device sizes, approaches, complications, and closure rates were assessed. ",
"Device implantation was successful in 50 patients (96.1%), with no difference between groups (95% vs 100%, P>0.05). ",
"In 2 patients, implantation failed because of embolism or deployment failure. ",
"Device were larger in group 1 than in group 2 (29.7 +/- 4.2 vs 26.7 +/- 3.8 mm, P = 0.04). ",
"The right upper pulmonary-vein approach was more common in group 1 than in group 2 (P = 0.0001). ",
"Complications and closure rates did not differ between the groups (P > 0.05). ",
"Transcatheter closure of large, secundum ASD by using the ASO device was feasible, and complication rates were low. ",
"A deficient retroaortic rim did not preclude successful device implantation; however, a large device may be needed to close large ASD. ",
"Close long-term follow-up is necessary to determine the safety of transcatheter closure of large ASDs in children."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.01385644543915987,
0.0018978150328621268,
0.0016080919886007905,
0.0006244575488381088,
0.000606769579462707,
0.0005496594239957631,
0.0006030563381500542,
0.0009098848677240312,
0.0006382989813573658,
0.0005915848887525499,
0.0005701461341232061,
0.0010703625157475471,
0.0008323431247845292,
0.0009285857086069882
] | 0.001806 | 14 |
[
"Welcome to my blog!",
"\n\nAs a lighting designer for over 25 years, I have helped create an incredible array of environments. ",
"Lighting, a crucial part of any event, helps enhance the mood while creating a logical path for eye to follow. ",
"It is with this approach that I speak as a digital photographer and image maker.",
"\n\n(well, thats all I have for now. ",
"Check back soon for more profound words....LOL)\n\nAug212015\n\nClouds……\n\nSo when did WordPress 4.3 come out? ",
"Some nice new updates from what I can see from the 3 minute intro video. ",
"Someday I’m actually going to have to take a few hours and actually learn WordPress from the ground up. ",
"At the very least, I might want to search for a cheat sheet online. ",
"Siri?",
"\n\nBeen bumbling about the interface for over 7 years now and I STILL feel like I am barely getting by. ",
"I guess that just part of the fun though. ",
"Dive in and learn to swim later….",
"\n\n(mike, whats with all the ….",
"’s?)",
"\n\nAaaannyway!",
"\n\nTodays image\n\nSharing my work. ",
"That was the original purpose of this blog. ",
"Inspired by Trey Ratcliff, my journey into the world of HDR, travel, and event illumination felt like a great foundation of content of which to share on a daily basis. ",
"Hard to believe it was over 7 years ago that I posted for the first time! ",
"A challenge to do this daily though. ",
"Trey, I don’t know how you do it!!!",
"\n\nThis blog has of course changed a bit over the past few years (I’m actually about to launch yet another theme again soon!), ",
"but its still in essence the same. ",
"A jumbled collage of random observations of nothing with some cool images to keep you interested! ",
"Its been a little difficult to keep posting on a daily basis as there are so many places to share your art, not of which were really either available when I started this, or places that I was a part of. ",
"I think I might need a social media schedule 🙂\n\nTill then, let the randomness continue….",
"\n\nHere is a quick one I cooked up from a recent “cloud and storm chasing” afternoon here down in South Florida. ",
"Lots happening up in the sky this time of year. ",
"I wonder how many people actually take to time to enjoy the view. ",
"Do you?"
] | {
"pile_set_name": "Pile-CC"
} | [
0.0013690371997654438,
0.0005431610625237226,
0.0005531265051104128,
0.0006113516865298152,
0.0008359074709005654,
0.0007380370516330004,
0.0005386305856518447,
0.0006108597735874355,
0.003721662564203143,
0.0010803918121382594,
0.0006740739336237311,
0.0006744060665369034,
0.013651330955326557,
0.0009492008248344064,
0.0008544546435587108,
0.030074983835220337,
0.0006592353456653655,
0.0007064187084324658,
0.0005289442487992346,
0.0006222824449650943,
0.0005963061121292412,
0.0060015954077243805,
0.0006150156841613352,
0.000667160318698734,
0.0009299647645093501,
0.0005663810297846794,
0.0006446399493142962,
0.0006480183801613748,
0.0006149957189336419,
0.0005838727811351418,
0.005406869109719992
] | 0.002493 | 31 |
[
"Vans Vault Sk8-Hi Boat Strap – Java Brown\n\nA sick markdown of $70 off retail has been located at Kith for two select sizes of the java brown Vans Vault Sk8-Hi Boat Strap LX editions! ",
"Boasting a canvas upper with pattern-embossed premium leather accounting for the midfoot strap and heel wrap, dark brown leather also lines the perimeter of the shoe just above the midsole while the insides are lined with light blue & white cotton material. ",
"These are a dope look for the casual office setting or for a night out and who could be mad at more than 60% savings?!",
"\nSize 11.5 and 13 ONLYKith currently ships internationally to Canada, Mexico, Australia and Europe"
] | {
"pile_set_name": "Pile-CC"
} | [
0.0011358096962794662,
0.0006663056556135416,
0.07033857703208923,
0.000858232204336673
] | 0.01825 | 4 |
[
"It's back dated to the oldest outstanding trade with the counterparty. ",
" \n\n\n\n\tClement Abrams@ENRON\n\t09/08/2000 04:31 PM\n\t\t\n\t\t To: Tana Jones/HOU/ECT@ECT\n\t\t cc: \n\t\t Subject: Re: Duke Energy Marketing Limited Partnership/Enron Canada Corp.\n\nHey,\n\nWhat's with the out dated effective date. ",
"1996? ",
"I had just got to Enron in \nDecember 1996.",
"\n\nClem\n\n\n\n\tTana Jones@ECT\n\t09/05/00 05:02 PM\n\t\t \n\t\t To: Clement Abrams/Corp/Enron@ENRON, Cindy Richardson/Corp/Enron@ENRON\n\t\t cc: \n\t\t Subject: Duke Energy Marketing Limited Partnership/Enron Canada Corp.\n\n Attached for your approval is the form of Enron Corp. Guaranty in favor of \nthe referenced Counterparty, which guarantees the obligations of ENA under \nan ISDA Master Agreement. ",
" We will need the standard executed copy.",
"\n\n In addition, we will need the following closing documents: Certificate of \nIncumbency.",
"\n\n Upon approval and execution, please call me at x33399 to pick up the \ndocuments. ",
" Thank you for your assistance in this matter."
] | {
"pile_set_name": "Enron Emails"
} | [
0.0005469467723742127,
0.0006020201253704727,
0.0007673103245906532,
0.0006080614402890205,
0.0005936877569183707,
0.0005936521338298917,
0.000731731706764549,
0.0005084261065348983,
0.0005194350378587842
] | 0.000608 | 9 |
[
"NEW YORK, April 4, 2017 – WorkFusion RPA Express, a free Robotic Process Automation (RPA) product for enterprise operations, has launched globally, designed for businesses to begin or accelerate their digitization efforts.",
"\n\nOver 2000 users from 850 companies have participated in WorkFusion RPA Express Early Access program since February 2016, and the initial participants have seen as much as 30% increase in speed of RPA adoption.",
"\n\nEPAM Systems, Inc., one of WorkFusion’s partners, improved delivery for its banking and financial services clients’ by using RPA Express to automate data entry, generate invoices and offers, create new accounts, and exchange information between systems. “",
"RPA Express is part of a broader cognitive services strategy to help our clients fuel growth, uncover new opportunities and stay competitive,” said Eli Feldman, CTO, Advanced Technology, EPAM. “",
"Our first impressions working with RPA Express are very positive.”",
"\n\nRPA Express lets customers automate the manual work of integrating Citrix, Oracle, SAP and other vital core systems by eliminating the “swivel chair” tasks of entering credentials, navigating application interface, and performing core systems functions. ",
"While some RPA vendors provide free trials, WorkFusion is the first software company to provide a scalable, unlimited RPA product for free.",
"\n\nHeads up! ",
"On May 22, 2018, we updated our Privacy Policy and Terms of Service to make them clearer and to address some new privacy laws in Europe. ",
"If you keep using Automation.com after May 25, 2018, you're letting us know that you're okay with the updates."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0005847797729074955,
0.0005496792728081346,
0.0005804793909192085,
0.0005758546758443117,
0.0005392608582042158,
0.000683325866702944,
0.0005839964142069221,
0.0008238715236075222,
0.0005302772624418139,
0.0005567032494582236
] | 0.000601 | 10 |
[
"Q:\n\nDo monads not guarantee the applicability of layered/non-layered monadic values to non-layered/non-monadic functions, and is this a good/bad thing?",
"\n\nI'm just trying to get monads, so bear with me if I ask a bad question, but...\nIf monads only require:\n\n(a -> M a), where M is the monadic type constructor, and\n(M a -> (a -> M b) -> M b), which is the bind operation (which I understand as mapping a monad onto a non-monadic to monadic value function)\n\n...doesn't this mean that:\n\n(M a -> a) and\n(M (M a) -> M a) are not implicitly required?",
"\n\nWon't this usually cause a problem?",
"\n\nSuppose we have a set of functions, S, which all have the type (x -> y), where x and y are arbitrary types.",
"\nNow, suppose I program using a set of monadic functions M, where their types are x -> M y.\n\nDoesn't this mean that once I turn a type into M y, I can't use any of the (x -> y) functions? ",
"Or, can I assume that I can do (M x -> (x -> y) -> (y -> M y) -> M y)?",
"\nFurthermore, don't we usually want to extract the original type when programming? ",
" When switching between something, like async a -> a or maybe a -> a... Isn't that a common operation? ",
"I can definitely see the case where somebody wants to optimize a monad out if they see it as negligible (e.g. a logging monad).",
"\nAdditionally, what about layered monads without flattening? ",
"I understand that lists can be seen as monads where restricting flattening is a clear and logical choice, but what about the hypothetical case of async (async a) monadic values where async has no flatten function? ",
"Does bind only imply one layer of \"monadic reduction\" where we can often assume that (M a -> (a -> M a) -> M a) can often be seen as (M a -> (M a -> a) -> (a -> M a) -> M a), and (M M a -> (a -> M a) -> M a or M M a) may not work? ",
"Is there a true difference between flattening and non-flattening monads?",
"\n\nA:\n\nWon't this usually cause a problem?",
"\n\nYou might say that this is \"by design\". ",
"One of the possible uses is IO; once you have a value tainted with IO, you have to \"bubble up\"; you can't hide the fact that a function is doing IO under a pure value.",
"\n\nwouldn't that mean I either have to manually convert each (a -> b) -> (a -> M b) by applying a monadic constructor somewhere?",
"\n\nThis is easier than you think because every Monad is also a Functor and an Applicative Functor:\nrandomDice :: IO Int\nrandomDice = randomRIO (1,6)\n\ncheat :: Int -> Int\ncheat = (+1)\n\nmain = do\n dice <- randomDice\n dice' <- cheat <$> randomDice\n\nHaving all of the fmap, <$>, liftA/liftM and pure/return machinery at our disposal, it makes it very simple to easily use pure functions in the monadic contexts.",
"\n\n(M (M a) -> M a) is not implicitly required\n\nThat one is false. ",
"You only need bind to implement it.",
"\njoin :: (Monad m) => m (m a) -> m a\njoin x = x >>= id\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0008182586752809584,
0.0009647696278989315,
0.0008369089337065816,
0.000873745942953974,
0.0009697892819531262,
0.0023982247803360224,
0.0006504925549961627,
0.0007224685978144407,
0.0005444150301627815,
0.0007432904676534235,
0.000746716046705842,
0.0012562834890559316,
0.0008444398990832269,
0.0008288634126074612,
0.0006325090071186423,
0.0010640356922522187,
0.0007213386124931276,
0.0011257135774940252,
0.0015000012936070561,
0.0006026033079251647,
0.01941058225929737
] | 0.001822 | 21 |
[
"Check out our new site Makeup Addiction\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nadd your own caption\n\nI Have 99 problems and they're all due monday"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.03917454928159714
] | 0.039175 | 1 |
[
"Q:\n\nHow to subset a local macro in Stata\n\nSuppose I have a local macro containing some variable names\nlocal indep \"cat dog pig\"\n\nHow do I drop pig from the macro, if I want the macro to contain only cat and dog?",
"\n\nA:\n\nThe context is that you want to remove variable names from a string listing them. ",
"The subinstr() solution in the OP's answer works only if the text to remove occurs just once as an entire variable name, and does not occur as part of another variable name. ",
"Thus the result of removing pig from this list with equivalent but not identical syntax is \n. ",
"local names \"cat dog pig piglet\"\n\n. ",
"local names : subinstr local names \"pig\" \"\", all\n\n. ",
"di \"`names'\"\ncat dog let\n\nThat is not what you want. ",
"The solution is to insist that what is removed must be a word. ",
"In Stata, words are or could be separated by spaces (other than being bound by double quotes); in the case of Stata variable names, distinct variable names are always distinct words. ",
"\n. ",
"local names \"cat dog pig piglet\"\n\n. ",
"local names : subinstr local names \"pig\" \"\", word\n\n. ",
"di \"`names'\"\ncat dog piglet\n\nWhen handling lists of variable names, Stata doesn't care about multiple spaces rather than single spaces, so neither need you. ",
"But if they offend, they can be reduced to single spaces. ",
"\nSee also the functions subinstr() and subinword() for approaches similar in spirit. ",
"In some older versions of Stata there were rather strict limits on string length for such functions, which made use of the construct used above : subinstr advisable for all but very short lists. ",
"\nHere, however, is a quite different solution: \n. ",
"local names \"cat dog pig piglet\"\n\n. ",
"local pig \"pig\"\n\n. ",
"local names : list names - pig\n\n. ",
"di \"`names'\"\ncat dog piglet\n\nIn a program, that is often much better, especially if you want to remove several names (more generally \"words\") at once. ",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.08254535496234894,
0.0007072468870319426,
0.0006799176917411387,
0.20101475715637207,
0.19454029202461243,
0.05587179213762283,
0.025935009121894836,
0.0008064304711297154,
0.0006259334622882307,
0.0021375224459916353,
0.19454029202461243,
0.029245194047689438,
0.011472603306174278,
0.0006912898388691247,
0.0005854094051755965,
0.0007028864347375929,
0.0006095282733440399,
0.19454029202461243,
0.831748366355896,
0.18517304956912994,
0.0021907996851950884,
0.001995444530621171
] | 0.091744 | 22 |
[
"1. ",
"Field of the Invention\nThe present invention relates to wiper devices for reciprocatingly wiping, for example, the rear or front windshield or head lamps of an automobile, the sight glasses of some industrial equipments and so forth. ",
"More particularly, the invention is concerned with a wiper device having a rise-up mechanism.",
"\n2. ",
"Description of the Prior Art\nWiper devices have been known, each of which has a mechanism which, when the wiper switch is turned off, lowers the wiper blades to a position below the lower end of their wiping stroke. ",
"When the wiper switch is turned on again, this mechanism operates to raise the blades up to the operating position before wiping is commenced. ",
"This mechanism, therefore, is generally referred to as a \"rise-up mechanism\". ",
"Usually, this rise-up mechanism is used in a concealed-type automotive wiper device which is adapted to conceal the wiper blades below the bonnet when the wiper device is not used. ",
"The rise-up mechanism is used also in a wiper device for a power-driven automotive rear windshield adapted to be raised and lowered by remote control. ",
"Namely, in order to permit a smooth upward and downward movement of the power-driven rear windshield, the rise-up mechanism usually keeps the wiper blades away from the rear windshield and puts them into contact with the rear windshield only when wiping becomes necessary. ",
"The rise-up mechanism is used also in various equipments having power-driven windows to keep the wiper blades below or above the area to be wiped so as not to hinder the movement of the window panels. ",
"Thus, the term \"rise-up mechanism\" should be interpreted to also include a mechanism which keeps the wiper blades at a position above the upper end of the wiping stroke, when the blades are not in operation.",
"\nAn example of a rise-up mechanism is shown in the specification of U.S. Pat. ",
"No. ",
"3,253,206. ",
"This mechanism has a crank arm connected to an output shaft driven by a wiper motor through a worm gear having a center offset from the axis of the output shaft, so that a crank pin provided on the crank shaft moves along a non-circular path so as to move, when the wiper switch is turned off, the wiper blades to a position out of the area wiped by the wiper blades during the wiping operation. ",
"This rise-up mechanism, however, requires a complicated construction including a special eccentric blade driving mechanism and a solenoid-actuated clutch for controlling the switch.",
"\nUnder this circumstance, there is an increasing demand for a wiper device having a rise-up mechanism of a simple construction."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0009391900966875255,
0.0006178854964673519,
0.0006266553536988795,
0.001185585861094296,
0.0006607219693250954,
0.001128467032685876,
0.000637507124338299,
0.0007289949571713805,
0.0007014126749709249,
0.0008413285249844193,
0.0007327107014134526,
0.0006333719356916845,
0.0006179735064506531,
0.0013785817427560687,
0.0008843880495987833,
0.0011430139420554042,
0.0006841856520622969,
0.0006024815957061946
] | 0.000819 | 18 |
[
"Review: Hello Waffle shadows\n\n\n\n\n\nHello Waffle's description: \"Ocean green with intense gold shift and green sparkles.\"",
"\n\n\n\nMy verdict: I am so glad Christine allowed me to buy this one. ",
"I am not a full size person, but Archean Earth is just worth it. ",
"It is the prettiest green ever and it's definitely made its way onto my all around favourite shades list. ",
"It is quite bright and it just makes your eyelids look like they're glowing. ",
"I love that it doesn't lean bright blue like a lot of greens do.",
"\n\nHello Waffle's description: \"Rose gold shimmer, more on the rosy side.\"",
"\n\n\n\nMy verdict: 23 is so damn gorgeous. ",
"It's similar to Fyrinnae's Rapunzel Had Extensions, but where that leans gold on me, 23 truly is a lot rosier with a hint of orange. ",
"It is a lovely, neutral all over shade for lazy days, but it's also a great base colour for crazier looks. ",
"The apparent patchiness is due to the veins on my wrist, since it applies extremely smoothly and evenly.",
"\n\nHello Waffle's description: \"Satin greyed purple with a copper sheen.\"",
"\n\n\n\nMy verdict: Another one of Hello Waffle's famed purples. ",
"It's part of the Catssic Literature collection, which is an absolute must-have for someone like me. ",
"I mean, I'm a lit student and I have a cat tattoo (and two darling kitties). ",
"Match made in heaven. ",
"Catticus Finch is a true chameleon: it ranges from a slightly purple-y grey to bright lavender with an almost pink shift, depending on how you apply it. ",
"It needs PE to truly have that gorgeous shift, but using it over normal primer makes a perfectly office-safe neutral. ",
"Then again, even the full-on purple with copper shift is muted enough for work, since it is still quite light.",
"\n\nHello Waffle's description: \"Green duochrome over a periwinkle sky blue with flecks of starry gold.\"",
"\n\n\n\nMy verdict: To this day, The Great Catsby is still one of the only blues I own and actually wear. ",
"It is bright, it is fun, it is absolutely gorgeous! ",
"It is much brighter than the swatches on the HW site make it appear to be, but the green shift is almost impossible to photograph. ",
"It actually looks more green than blue on me in natural daylight. ",
"It really is quite daring, but it also makes for a kick-ass liner if you're not quite brave enough to use it on your lid. ",
"It still amazes me how well this shade captures the feel of that one scene in the Great Gatsby.",
"\n\nHello Waffle's description: I didn't actually write these down when they were available, oops.",
"\n\n\n\nMy verdict: This shadow was part of the Kitty Kingdom Collection and it is no longer available for purchase (except for some leftover stock which will be listed later this month). ",
"As you might know from my previous posts, I love all things gold and this truly is very, very gold. ",
"It is cooler than Box Cat, ranging from olive to yellow gold depending on the lighting. ",
"It isn't anything you haven't seen before, though, so don't fret if you aren't able to pick it up when Christine relists the extra stock. ",
"Oh and excuse the wonky swatch: I got attacked by some melting snow the second I stepped outside to take these pictures.",
"\n\nHello Waffle's description: Kitty Kingdom shade. ",
"I'm an idiot.",
"\n\n\n\nMy verdict: Skittles' more orange sister. ",
"It is more copper than it is gold and it is very, very bright. ",
"I've had it look both brown and orange, depending on the angle and the lighting. ",
"Again, very pretty but not worth fretting over if you can't buy it.",
"\n\nHello Waffle's description: Yep, still an idiot.",
"\n\n\n\nMy verdict: Pepper! ",
"might just be the single most unique shadow I own and I'm still a little undecided whether or not that's a good thing. ",
"The base is a greyish green that appears very pale (and slightly chalky) when you apply too much but blends out to a more golden green, while the red glitters are absolutely huge. ",
"I love the colour in my swatches, but I find it quite hard to apply evenly and it might just be a little too unique for me. ",
"I really need to play with it a little more and see if I can make it work.",
"\n\nHello Waffle's description: \"Copper with gold shimmer.\"",
"\n\n\n\nMy verdict:I'd call this orange instead of copper, but that's really just semantics. ",
"It's quite bright, with a dark base that shows itself in unnatural lighting. ",
"I love oranges (okay, okay, copper) so this shade is right up my alley. ",
"The shimmer is quite subtle, as opposed to some of the more glittery Hello Waffle shades.",
"\n\nHello Waffle's description: \"Golden silver shimmer.\"",
"\n\n\n\nMy verdict: I have no idea what to call this one. ",
"It looks grey in the bag, but shifts between a dark silver and a coppery goldish brown when applied. ",
"I didn't actually expect to like it much when I saw the sample baggy, but it truly transforms into something incredibly interesting and versatile on my skin. ",
"It's a lovely base colour but it's also perfect for a one shade look since it changes so much depending on lighting and application.",
"\n\nHello Waffle's description: \"Shimmery orange peach that leans copper with a gold undertone.\"",
"\n\n\n\nMy verdict: This shade is mad gorgeous. ",
"Pun intended. ",
"It is part of the seasonal Painted Flowers collection, so unfortunately this one is unavailable right now, but I just had to include it. ",
"It is described as a orange peach, but instead of a copper undertone, I seem to get a shift that is much more of a soft pink. ",
"It's hard to properly photograph it. ",
"It is very sparkly, but the colour is muted enough that it is still very wearable. ",
"I really need to depot this one and use it one more often.",
"\n\nWhoops. ",
"I swatched these the day after Christmas, but then life happened and I forgot to edit and post them. ",
"Chrismas itself was pretty much just one big food coma, followed by both my parents and myself falling ill with the flu. ",
"Fun times. ",
"It did help us balance out all the extra calories, but not quite voluntarily. ",
"The day after Christmas also brought us at least 10cm of snow, which turned to ice within a day and washed away with the rain a couple of days later. ",
"The woes of living in the Netherlands.2015 so far has been a bit of a blur. ",
"Time's been passing quickly, but it doesn't really feel like it has truly started yet. ",
"Lectures are done (no more Groningen! ",
"no more spending 16 hours a week on the train!) ",
"so I've been at my parents' for the past couple of weeks, only going to Utrecht to meet up with a friend. ",
"The plan was to work out a lot, but my stomach's been playing up again so I mostly just cuddled with Luna while working on my many deadlines. ",
"None of my final assignments are very taxing but they still need to be done, so I've been slowly but surely getting them done. ",
"Three more assignments and two more finals and then the semester is finally over. ",
"I can't wait to finally have some normalcy again, some time to cook and sleep and not have to sit on a train for four hours a day. ",
"I'll be starting my MA thesis soon (writing it, the planning and drafting stages are done already), which will be the only thing requiring me to go up to Groningen from time to time. ",
"I also really need to find an internship, yaiks.",
"Okay, enough mindless chatter. ",
"Onto the business of the day, which is Hello Waffle swatches! ",
"The shop has been closed since the massive Black Friday sale, but it will be reopening for its first birthday tomorrow (on the 12th) with a brand new site and another massive sale. ",
"She has a gorgeous new collection of mattes and everything is 20% off with the codetill January 14th, 9am EST. ",
"I have so many items in my cart already that it's a little embarrassing. ",
"Okay, very embarrassing...Just to enable you guys even further, I wanted to post some swatches of my Black Friday order and some random samples I bought off someone on IMAM. ",
"I have fallen head over heels in love with Hello Waffle, both with the shop and with the products. ",
"Seriously, they have the prettiest purples ever.",
"Christine offers halflings (1/3 tsp in a 3 gram jar) for $3.25 and full sizes (3/4 tsp with sifter) for $6.00. ",
"The prices are currently listed in CAD, which is why they appear a little higher. ",
"Sample packs are around $6.25 for five and $12.50 for ten, but she also sells sample sets of each collection. ",
"There is an option to buy have your sample sets send by lettermail, which is significantly cheaper than normal shipping. ",
"The lettermail listing includes the shipping costs in the price and needs to be checked out separately. ",
"Hello Waffle used to have a flat rate international shipping of $6, but this has changed recently and I'm not quite sure what it is now. ",
"It seems to be 8.34 CAD for most countries, which translates to about $7.00 USD.Her current TAT is 10-20 business days, beginning the following business day from order placement. ",
"I ordered most of these during the Black Friday sale and poor Christine got ridiculously swamped, so it took a little longer to ship my package. ",
"There were some problems with the make up bags, but my order shipped as soon as they arrived. ",
"I ordered on the 28th and the 30th of November, the combined order shipped on the 10th of December and it arrived on the 16th. ",
"Very decent for international shipping, which unfortunately doesn't come with tracking.",
"Christine is the absolute best. ",
"I'm not saying this to be a suck-up: she is actually the nicest indie owner I have encountered so far. ",
"She let me buy Archean Earth even when it wasn't part of her Black Friday catalogue and answered all of my emails and silly little requests with astonishing speed and patience. ",
"I ended up placing two orders, which she combined before refunding me the surplus in shipping costs. ",
"When my order arrived, I noticed she had upgraded my halfling of 23 as well as giving me a free Catssic Literature sticker to match my make up bag.",
"These swatches were done over Fyrinnae's Pixie Epoxy. ",
"They are loose powders and need a sticky base to work properly.",
"I love Hello Waffle, plain and simple. ",
"The formula truly is a very loose powder, but it's so easy to work with and it blends so well. ",
"They're not as flashy as for instance Femme Fatale's duochromes, which makes them extremely wearable, but they're bright enough to create some crazy looks. ",
"I wasn't blown away by the Kitty Kingdom shades, but considering the time frame between idea and realisation as well as the cause, it's still money well spent. ",
"They're decent shadows, just not as great as the other ones. ",
"And honestly, Christine is the absolute queen of purples and rose golds. ",
"My wallet is weeping already because I need more, more, more.",
"You can buy Hello Waffle's shadows here . ",
"She'll be reopening tomorrow, the 12th of January at 10am EST. ",
"Useto get 20% off your order.",
"These opinions are my own. ",
"I was not compensated in any way for this post."
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0005722465575672686,
0.0006988051463849843,
0.0022709902841597795,
0.0013530845753848553,
0.0007715873070992529,
0.0007290665525943041,
0.0006366136367432773,
0.49218833446502686,
0.000983062433078885,
0.0015700632939115167,
0.0006283341208472848,
0.0006264885305427015,
0.001086677541024983,
0.0013157998910173774,
0.0008040675311349332,
0.0011522481217980385,
0.0009772335179150105,
0.0008483720594085753,
0.0006709100562147796,
0.0006390218040905893,
0.0012636026367545128,
0.0006830793572589755,
0.0005919610848650336,
0.0005842677783221006,
0.43602561950683594,
0.0006699663936160505,
0.000660860852804035,
0.0007431583944708109,
0.000645900028757751,
0.0005713736754842103,
0.002517470857128501,
0.012877991423010826,
0.0006266004638746381,
0.8184431791305542,
0.0050607831217348576,
0.0007117551285773516,
0.0005594234680756927,
0.003832436166703701,
0.929146409034729,
0.0014352252474054694,
0.0006538772722706199,
0.0006748185260221362,
0.0006839323905296624,
0.0005929040489718318,
0.0007060592761263251,
0.0008246267098002136,
0.0006143442587926984,
0.001682549947872758,
0.0007086259429343045,
0.0008208972285501659,
0.0006876430124975741,
0.0006285419804044068,
0.0006179075571708381,
0.0005766298854723573,
0.0005989093333482742,
0.017488930374383926,
0.0010737701086327434,
0.0005602890159934759,
0.0006138883181847632,
0.0006774647044949234,
0.0006140302284620702,
0.0005178304272703826,
0.004502680152654648,
0.0007697193650528789,
0.03459765762090683,
0.0006520480383187532,
0.0006615984020754695,
0.000869795389007777,
0.0008548732730560005,
0.0006163688376545906,
0.001423605834133923,
0.003170858370140195,
0.0006116588483564556,
0.002671624766662717,
0.0006646908004768193,
0.0007933407905511558,
0.002668550470843911,
0.0005422862595878541,
0.0029511533211916685,
0.006865725386887789,
0.0010697431862354279,
0.0009322628611698747,
0.010319188237190247,
0.002579620573669672,
0.0014311866834759712,
0.0006754961214028299,
0.05464368313550949,
0.000868345785420388,
0.0005868959706276655,
0.0006197217153385282,
0.0005859346711076796,
0.0005517351091839373,
0.0005972892395220697,
0.000592025404330343,
0.001502333558164537,
0.0006601825589314103,
0.0007431821431964636,
0.0005841472884640098,
0.0007600612589158118,
0.4698561131954193,
0.0019022105261683464,
0.0006103360210545361,
0.002666525775566697,
0.012193713337182999,
0.0014307840028777719,
0.0006419885321520269,
0.000674065260682255,
0.019897431135177612,
0.0005636917194351554,
0.0013230444164946675,
0.00618803221732378,
0.8636794686317444,
0.0008594220853410661,
0.0007616229704581201,
0.021283362060785294,
0.0008632882381789386,
0.000601390958763659
] | 0.036863 | 117 |
[
"Ethical issues in the introduction of case management for elderly people.",
"\nAs case management is under development in France for elderly people, this study sets out to identify and analyse key situations responsible for ethical dilemmas for French case managers. ",
"We based our study on the analyses of individual interviews made with case managers and focus-group discussions, bringing together all case managers working in local organisations running for at least a year. ",
"We identified three situations giving rise to ethical dilemmas: in the order of importance, the refusals of care, the practicalities of collecting and sharing personal data and the allocation of resources. ",
"These three situations can lead to conflict between the principle of beneficence and those of respect for autonomy, non-maleficence and justice. ",
"We describe here how French case managers practically deal with these situations."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0005522354622371495,
0.0005197919090278447,
0.0005238326266407967,
0.0005367251578718424,
0.000818358501419425,
0.0005611609667539597
] | 0.000585 | 6 |
[
"Lately I’ve been listening to episodes of the podcast Stuff You Missed in History Class. ",
"Earlier this week I listened to an episode on the architect Antoni Gaudi (shown in his younger years above), who is best known for buildings like Casa Milà, and the yet-unfinished church La Sagrada Familia. ",
"In the latter part of the podcast, I was surprised to hear about the circumstances surrounding Gaudi’s death. ",
"As Gaudi became older in age, he began to care less about his personal appearance and looked rather disheveled, albeit that he devoted care and attention to his work project at La Sagrada Familia. (",
"Gaudi also appears to have been camera-shy during his later years, because I couldn’t find any photographs of him in such a disheveled state!).",
"\n\nAfter leaving the La Sagrada Familia work site on June 7, 1926, Gaudi was struck by a tram. ",
"Due to his disheveled appearance, people at the scene did not recognize the famous architect and the taxi drivers refused to drive a vagabond to the hospital. (",
"The taxi drivers were subsequently fined.) ",
"Since Gaudi was not immediately helped (and also was ultimately taken to a pauper’s hospital), by the time he was found by his friends he was in very poor condition. ",
"He died three days after the accident, on June 10, 1926. ",
"His funeral was a very large affair in the city of Barcelona, and he was buried in the crypt of La Sagrada Familia.",
"\n\nIf Gaudi had not been mistaken for a vagabond, perhaps he could have received better medical attention and his life would have been spared! ",
"What a tragedy!",
"\n\nThis story made me think about other instances in which artists have been described as unkempt or disheveled in their appearance, including those Renaissance artists written about by Vasari. ",
"I realize that by writing this post I am fostering the “artist-genius” construct in a way (in the sense that these artists are creative nonconformists who care more about the appearance of their art than their own appearance), but it still is interesting to consider. ",
"Here are a few particular examples that I wanted to highlight:\n\nParmigianino: Vasari writes that Parmigianino’s obsession with alchemy affected the artist’s personal appearance, “changing [him] from a dainty and gentle person into an almost savage man with long and unkempt beard and locks, a creature quite different from his other self.”",
"\n\nVasari writes that Gherardi was very unconcerned about his personal appearance, who would wear his cloak inside out or two different types of shoes. ",
"When Duke Cosimo de Medici questioned Gherardi on his inside-out cloak, Gherardi, responded, “…but let your Excellency look at what I paint and not my manner of dressing.",
"”2 The Duke responded by sending Gherardi a reversible cloak, so the cloak could never be inside-out!",
"\n\nPerhaps given Van Gogh’s emotional health issues, it is unsurprising that this artist is described as unkempt. ",
"However, I was interested to learn that Van Gogh seemed to deliberately dress in an unkempt fashion. ",
"I was about to write that is seems contradictory for one to consciously try to appear unkempt, but upon second thought, it seems like a lot of fashion trends strive for just that effect!",
"\n\nMoritz Nahr, Gustav Klimt in front of the entrance to his studio at Josefstädter Strasse 21, 1912.",
"\n\nGustave Klimt is described as having a long, disheveled beard. ",
"It seems fairly groomed in the photograph above, but I wanted to draw attention to the floor-length smock that Klimt would typically wear when he was painting in his studio (see above). ",
"Perhaps Klimt was not as disheveled and unkempt as some of other artists mentioned here, but his mode of dress was a little bizarre, to say the least (especially since he typically did not wear anything else underneath the smock!). ",
"Oddly, he posed for many photographs dressed in this smock, including one of him in a boat!.",
"\n\nWhat other artists do you know of that are described as unkempt or disheveled in their appearance?",
"\n\nEditor’s note: I was recently contacted by Sophie Jackson, a gaming journalist and writer. ",
"Sophie wrote an article which featured a several paintings with depictions of card games. ",
"I had never seen some of these paintings before, which so it was fun to discover them through Sophie’s article. ",
"Although I rarely feature guest posts from outsiders, I feel like this article fits well with my blog (I’m reminded of when I set out on a quest to find depictions of laundresses), and I’m happy to feature Sophie’s post here.",
"\n\nArtistic Depictions of Card Games between 1880 and 1980\n\nby Sophie Jackson\n\nFrom Caravaggio to Picasso, Boulogne to Cézanne, the depiction of card games in major works of art has become an increasingly popular subject of study amongst critics. ",
"Many have focused on how the controversial but enduring topic of gambling and its place in society has, as with all major social issues, been examined by artists in various ways throughout the centuries. ",
"These artworks offer us unique insight into the spread of specific games, the changing manner in which they’re played and – in the case of games such as poker – the legal history. ",
"Inspired by Francesco Esposito’s original article, this piece seeks to comment on individual artistic depictions of card games over a time period of one hundred years, starting with Gustave Caillebotte’s ‘Game of Bezique’ from 1880.",
"\n\nGustave Caillebotte, “Game of Bezique,” 1880\n\nBorn into a wealthy family, Caillebotte was brought up in Paris and pursued a career in painting after returning home from the Franco-Prussian war. ",
"His art typically depicted the intimate, every-day ongoings you might find in a 19th century upper-class household.1 Caillebotte’s subjects were usually engaged in some leisurely activity, whether it be piano playing, sewing or high tea. ",
"Bezique was a popular card game in Paris during the latter half of the 1800s, deriving from its earlier variant, ‘Piquet.’ ",
"In Caillebotte’s Game of Bezique, a group of men are crowded around a card table in observation of the trick-taking game being played between the younger and older gentlemen.",
"\n\nCaillebotte is particularly famed for his ability to portray a perspective of depth in his paintings, a quality especially prominent in his paintings of balcony and window views. ",
"Though not as notable in Game of Bezique, the man seated on the sofa in the distance certainly contributes a depth perspective to the painting, as he seems far removed from the action and somewhat generally out of place. ",
"Perhaps he does not know how to play, or maybe there is a more metaphorical purpose to his inclusion. ",
"Perhaps his presence symbolises a depressive state which renders him incapable of enjoying social and trivial activities such as a card game amongst friends.",
"\n\nJohn George Brown, “Bluffing,” 1885\n\nThough Brown had himself endured the hardships of an impoverished childhood, the street urchins depicted in his paintings were always cheery and healthy-looking. ",
"Paintings of anything too grim or sordid would have been unpopular with the upperclass, to which the majority of Brown’s commissioners belonged. ",
"In this particular painting we see two poor children, with ripped clothes and dirty feet, deeply immersed in a card game. ",
"The title Bluffing might suggest the game is some variation of poker; however the boys could also be playing ‘cheat.’ ",
"The mischievous and smug look on the boy to the left indicates he is the one ‘bluffing,’ whilst the other boy frowns with frustration as he looks down upon his cards. ",
"The pale and plain background focuses our eyes on the boys and their cards – indeed, the boys themselves seem totally absorbed by the game. ",
"Brown was known to have said he painted underprivileged boys because he, too, “was once a poor lad like them.",
"”2 A pack of cards would have offered plenty of pastime for poor children without many toys. ",
"Perhaps Brown had fond childhood memories of playing cards on the streets.",
"\n\nAlbert Beck Wenzell, “A Showdown,” 1895\n\nWenzell’s paintings typically depicted scenes of wealth and optimism, reflecting the Belle Epoque age in which he lived. ",
"His subjects and setting were fantastically exaggerated with opulent detail and radiant colours, accurately capturing the wave of content that moved across the West at that time. ",
"Wenzell had himself grown up in a wealthy environment and been educated in Paris and Munich. ",
"Painting what he knew, Wenzell portrayed the luxurious and somewhat hedonistic lifestyle of the era’s upperclass. ",
"The artist was usually commissioned by rich American families who wanted artwork that depicted casual yet glamorous scenes. ",
"Wenzell therefore focused on beautiful, fashionably clad women interacting with older gentlemen in a familiar home setting.3 In A Showdown, however, Wenzell portrays only men, chewing cigars and dressed in business suits, engaged in what appears to he be the later stages of a poker game. ",
"Special attention should be given to the body language of all players. ",
"It seems almost as if the men are attempting to adopt a relaxed pose to ease the tension, but end up looking especially rigid as a result. ",
"The gentlemen to the far right looks particularly distressed, whilst the gentlemen to the left is slouching so far back in his chair that he looks uncomfortable. ",
"The painting’s title A Showdown confirms the confrontational and competitive nature of the scene. ",
"In poker, ‘showdown’ is the term used to describe the requirement for final players to show their hands at the end of the game. ",
"Clearly, a dramatic moment is about to unfold.",
"\n\nWilliam Holbrook Beard, ‘The Poker Game’, 1887\n\nDogs aren’t the only animals to have been painted at the card table. ",
"American painter Beard had a fascination with nature and famously portrayed wild animals in a disturbingly humanistic manner.4The Poker Game is particularly unsettling in its depiction of chimps in Renaissance or Baroque clothing, gathered around a table. ",
"Most of the chimps are deeply concentrated on the card game at stake, though the servant and monk merely observe. ",
"Another chimp seems to be advising one of the players, whose four cards in hand, along with a fifth being passed to him, would indicate they are playing a five-card draw. ",
"The dark, stone setting and candlelight seems to imply the scene takes place in a castle room. ",
"Perhaps the non-participating chimp to the far left is the king, watching his subjects play cards and drink wine.",
"\n\nNorman Rockwell, “The Bid,” 1948\n\nRockwell’s influential art has undoubtedly become symbolic of American culture. ",
"Characterised by sunny colours and cheerful scenes, his illustrations depict sportsmen, industrial workers and the atomic family – all of whom in some way represented the American Dream. ",
"During the war, his paintings instilled a sense of righteousness and triumph, a sentiment with which the American government was keen to inspire people when they published Rockwell’s art as motivational posters. ",
"In The Bid, Rockwell depicts a casual and pleasant card game between friends in post-war America. ",
"The sandy floor, bright shades and sleeveless shirts of the women suggests the subjects are playing during the summer. ",
"Contrasting businessmen with a beach-like setting, Rockwell blends business with pleasure – reflective of the upper class lifestyle in late ’40s America. ",
"The mismatch of chairs is a charming detail, as it implies the seating was arranged hurriedly and without care, as if the card game was a spur-of-the-moment idea. ",
"Along with good company and good weather, the subjects in this postcard-esque painting are said to be enjoying a game of ‘Bridge.’",
"\n\nLeRoy Neiman, “Stud Poker,” 1980\n\nThe very distinctive style of LeRoy Neiman can be characterized by his brisk brush strokes and hazy colouring, a method which seemed to capture the motion of his subjects and atmosphere of his setting. ",
"There are few places as bright and bustling as a casino, which perhaps explains with Neiman chose Vegas as the setting for so many of his artworks. ",
"Titled simply Stud Poker, this lively depiction of players around a card table is curiously reminiscent of Monet’s gardens. ",
"Indeed, the colourful chips on the green card table might as well be lillies in a pond. ",
"When looking at the poker players in closer detail, one can start to differentiate the features of each character, most of whom appear to be formally-dressed men – with the exception of a red-headed woman. ",
"Vibrant, busy and modern; the impressionistic and expressionist Stud Poker is a perfect example of Neiman’s eccentric style.",
"\n\nMost fascinating, when comparing the depiction of card games in art, is a consideration of how these games can be said to transcend social class. ",
"Not only have card games been infallibly popular over the past centuries, but they have always appealed equally to peasants as they have to kings. ",
"Another aspect worth studying is how the type of card game depicted in art changes depending upon era and, at times, the nationality of the painter. ",
"One should also note how, in the last two 20th century paintings sampled above, there are women participating in the games. ",
"This marks a shift in social attitudes, reflecting the move from ‘gentlemen’s poker nights’ toward a tendency of more gender-inclusive games. ",
"The final facet worth considering is how the depiction of gambling in art has often hinted toward its legal status during the artist’s era. ",
"Whilst many popular works of art have portrayed betting activities taking place in dark back rooms, between shifty and drunken characters, paintings such as Neiman’s Stud Poker shows the incorporation of gambling into mainstream culture. ",
"In short, the depiction of card games, as seen in works of art, can offer us insight into the unique and fascinating role these social yet competitive games play in our society.",
"\n\nI’ve been thinking about Wayne Thiebaud’s paintings today, mostly because I have eaten way too many chocolate doughnuts over the past few days. ",
"Thiebaud doesn’t have as many paintings of doughnuts as he does of cakes and other sweets, but he does have a few (such as the one shown above, or this one of doughnuts and cupcakes).",
"\n\nThe thing that I love most about Thiebaud’s paintings of desserts is his handling of the paint itself. ",
"Thiebaud applies the paint thickly; it almost feels like he’s painting with frosting itself (see detail below). ",
"The desserts have a true sense of tactility, which I think makes them seem even more desirable as tasty treats! (",
"I guess it’s a good thing that Cookie Monster didn’t see a Thiebaud painting in when he visited art museums in New York earlier this year, or he would have tried to eat it!)",
"\n\nThinking about Wayne Thiebaud has also reminded me of Jim Gaffigan’s standup comedy, which often is about his love of delicious-yet-unhealthy food. ",
"Gaffigan must not have been aware of Thiebaud’s art before he made his joke about artists and still life paintings. ",
"This is what Gaffigan says in his show Obsessedabout fruit (a healthy type of food that he dislikes!):",
"\n\n“…we haven’t wanted [to eat] fruit for hundreds of years. ",
"That’s why there’s so many paintings in museums of just bowls of fruit. ",
"Because you could start painting a bowl of fruit, you could leave for a couple of days, come back, and no one would have touched the bowl of fruit. ",
"But if you’re painting a doughnut? ",
"You better finish it up in the first sitting! ",
"You can’t even take a bathroom break – ‘Hey, what happened to my doughnut?’ ",
"Your friends are [like], ‘Oh, some fat guy came in here! ",
"Anyway, I’m going to get some milk and take a nap.’ ",
"That’s why there’s no doughnut art. ",
"It’s sad, really. ",
"When’s the last time you saw a painting of a doughnut?” (",
"Audio clip of Obsessed found HERE, starting at 2:34).",
"\n\nTo be fair though, it’s good to acknowledge that Wayne Thiebaud paints his doughnuts and cakes “from his imagination and from long-ago memories of bakeries and diners.",
"”1 So, maybe Thiebaud just likes to eat doughnuts and cakes too, and he doesn’t have the patience to study them! ",
"Thiebaud does, however, also paint from life: he paints human figures (such as his wife Betty Jean, who is shown on the left in Two Kneeling Figures), and also sketches California landscapes outdoors and then returns to his studio to paint.",
"\n\nAnyhow, do you know of other images of doughnuts, cakes or other treats in art, besides those by Thiebaud? ",
"I thought of a few:\n\nFor the past few months, I have been listening to podcasts of A History of the World in 100 Objects while I exercise. ",
"The clips are engaging and interesting, and they provide some distraction for me while I run. ",
"I’ve learned and pondered a lot of things in the process, and I wanted to write down a few snippets of things that have stood out of me in the various episodes I have heard.",
"\n\nThe Standard of Ur:I first learned about the Standard of Ur when I was in high school, I think. ",
"But I’ve never thought much about the size of this object. ",
"Neil MacGregor describes this as “the size of a small briefcase” which looks “almost like a giant bar of Toblerone.",
"”1\n\nI’ve never realized that this famous object was so small! ",
"Since it has the nickname of a “standard,” I just assumed that it was a larger size. ",
"I also was interested to learn that the inlaid stone and shell come from various locations: Afghanistan (lapis lazuli), India (red marble), and shell (the Gulf).2 These various mediums indicate that the Sumerians had an extensive trade network.",
"\n\nIf you are interested in learning more about the Standard of Ur and theories surrounding its original function, see HERE.",
"\n\nHead of Augustus: I enjoyed learning about this head because it reminded me of discussions that I hold with my students about how ancient art was/is mutilated and stolen in times of war. ",
"This statue is no different. ",
"It once was part of a complete statue that was on the border of modern Egypt and Sudan. ",
"However, an army from the Sudanese kingdom of Meroë invaded this area in 25 BC (led by “the fierce one-eyed queen Candace”), and this army took the statue back to Meroë.3 The head was buried beneath a temple that was dedicated to this particular Sudanese victory, which meant that every person walking up the stairs to the temple would insult the emperor by stepping on his head.4 Even today, sand of the African desert is visible on the sculpture.",
"\n\nThe David Vases: I begin listening to this episode without any prior knowledge of these vases, so I was surprised to learn that these were from China (I assumed when reading the episode title that the vases had some nude figure which depicted the biblical David, à la Michelangelo or Donatello.) ",
"Nope! ",
"These Chinese vases are named after their most famous owner, Sir Percival David.",
"\n\nThe thing that is most interesting to me is that, since these vases are dated 13 May 1351, we know that this level of fine quality blue-and-white porcelain predates the Ming dynasty (the dynasty from 1358-1644, which is typically associated with fine blue and white porcelain). ",
"In fact, we also know that the blue and white tradition is not Chinese in origin, but Middle Eastern! ",
"Neil MacGregor explains how Chinese potters used Iranian blue pigment cobalt (which was known in China as huihui qing – “Muslim blue”).5 Interestingly, Chinese artists even used Iranian blue pigment for exports sent to the Middle East, to meet the Iranian demand for blue and white ware after the Mongol invasion destroyed pottery industries in the area.6 It’s interesting to me that Iranian blue traveled to China, only to travel back to its area of origin as export pottery decoration.",
"\n\nSainte-Chapelle, Paris, completed 1248. ",
"Image courtesy Wikipedia.",
"\n\nSainte-Chapelle and the Crown of Thorns:This chapel was not featured in the podcast specifically, but it was discussed at length in the episode for the Holy Thorn Reliquary. ",
"Sainte-Chapelle is a church that was built basically to be a reliquary, to house the Crown of Thorns. ",
"Surprisingly, the Crown of Thorns cost more than three times the amount paid to build Sainte-Chapelle!7 Today the Crown of Thorns is housed in Notre Dame Cathedral in Paris; it was moved there by Napoleon in the 19th century.",
"\n\nI was particularly intrigued by the discussion of the Crown of Thorns coming to Paris, and I wanted to learn more on my own. ",
"Louis IX dressed in a simple tunic (without royal robes) and walked through the streets barefoot while he carried the relic. ",
"The barefoot king is depicted in the Relics of the Passion window in Sainte-Chapelle. ",
"I also learned through my own research that the Crown of Thorns, while on its way to Paris, was housed in a cathedral in Sens overnight. ",
"This moment was honored in a window from Tours, which depicts Louis IX holding the thorns on a chalice.",
"\n\nThe other thing I found interesting about the arrival of the Crown of Thorns is that this elevated the status of France among the Christian countries of Europe. “",
"When the crown arrived, it was described as being on deposit with the king of France until the Day of Judgment, when Christ would return to collect it and the kingdom of France would become the kingdom of heaven.",
"”8\n\nAre there any episodes/chapters from A Short History of the World in 100 Objects that you particularly enjoy? ",
"Please share!",
"\n\n1 Neil MacGregor, A History of the World in 100 Objects (New York: Penguin Group, 2011), p. 72.",
"\n\n2 Ibid., ",
"72-73.",
"\n\n3 Ibid., ",
"225\n\n4 Ibid.",
"\n\n5 Ibid, 413.",
"\n\n6 Ibid.",
"\n\n7 Ibid., ",
"425. ",
"Sainte-Chapelle cost 40,000 livres to build. ",
"The Crown of Thorns was bought from the Venetians for 135,000 livres (400 kilograms of gold). ",
"MacGregor writes that The Crown of Thorns was “probably the most valuable thing in Europe at the time.”",
"\n\nThis morning, in preparation for class, I was looking at a digital copy of the Book of Kells. ",
"I previously have written about how I think it is important to consider the exuberant decoration of the Chi-Rho-Iota page (known as the “Incarnation” page, folio 34r) in relation to the accompanying joyful text, which announces the birth of Christ. ",
"As I was looking at the digital copy of the book further, it struck me how this design is significant in relation to the context of the Book of Kells itself, since the Chi-Rho-Iota page is directly preceded by a carpet page (see above).",
"\n\nCarpet pages (sometimes called “cross-carpet pages”) are illuminated manuscripts which have a design that is generally in the shape of a rectangle (filling the outline of the page itself), with interlace and decorative geometric forms woven within the general rectangular form. ",
"Such pages appear in Christian, Islamic, and Jewish illuminated manuscripts. ",
"Usually, there is hardly any text on these pages, or no text at all. ",
"The designs of these manuscripts usually are quite symmetrical and typically have a strong vertical axis (and sometimes horizontal axes as well, which often forms the shape of a cross). ",
"There are several possible origins for this type of carpet design, but I am drawn to the idea that these “carpets” are reminiscent of Islamic prayer rugs, for I think they may have also had a similar function: these carpets can serve as an aid to meditation in the sense that they alert the reader that the subsequent Gospel text is important, and the reader should mentally prepare before looking at the following pages within the book or codex.1\n\nTo see the relationship between carpet pages and other pages in the text, consider how the carpet page from the Book of Matthew in the Lindisfarne Gospels precedes the incipit page (see image of these two pages HERE). ",
"This is a really complex and gorgeous carpet page (see below), which includes snake-like creatures whose mouths clamp down on their own writhing bodies (see this image detail).",
"\n\nLindisfarne Gospels, Carpet Page for Book of John, folio 210v, early 8th century\n\nLindisfarne, Carpet Page, Book of Mark, folio 94v, early 8th century\n\nDo you have any favorite carpet pages? ",
"If you know of any other connections between carpet pages and Islamic prayer rugs, please share! ",
"I did find an abstract for a lecture that explored the possibility of how illuminated Islamic manuscripts may have factored into the production of physical carpets themselves, although these historical connections are still unclear.",
"\n\nAbout\n\nThis blog focuses on making Western art history accessible and interesting to all types of audiences: art historians, students, and anyone else who is curious about art. ",
"Alberti’s Window is maintained by Monica Bowen, an art historian and professor."
] | {
"pile_set_name": "Pile-CC"
} | [
0.00065594696206972,
0.0005848073633387685,
0.0006683181272819638,
0.0012996409786865115,
0.0012386786984279752,
0.009738228283822536,
0.032985057681798935,
0.0006707538268528879,
0.002604507841169834,
0.0013823147164657712,
0.0012675232719630003,
0.10772273689508438,
0.10622161626815796,
0.0009261597879230976,
0.0006007307674735785,
0.0015293544856831431,
0.0013082624645903707,
0.0012076596030965447,
0.0012532053515315056,
0.0024910802021622658,
0.0018717722268775105,
0.0007346848724409938,
0.0007995104533620179,
0.014428887516260147,
0.0007872363203205168,
0.010694878175854683,
0.09032943099737167,
0.007218783255666494,
0.0005849238950759172,
0.0006073858239687979,
0.0005769823328591883,
0.0005576464463956654,
0.0005817566416226327,
0.0005341608193702996,
0.0005496376543305814,
0.0006137836026027799,
0.000888494192622602,
0.000732221407815814,
0.0008188132778741419,
0.0010307742049917579,
0.0007197723025456071,
0.0006542836781591177,
0.0006803351570852101,
0.004629072267562151,
0.009045564569532871,
0.0034626086708158255,
0.0407179519534111,
0.006117085460573435,
0.008613694459199905,
0.000760669179726392,
0.07197186350822449,
0.044186342507600784,
0.0006944133201614022,
0.0007035019807517529,
0.0006183803780004382,
0.0006372728967107832,
0.000812495534773916,
0.0006764908321201801,
0.0008024231065064669,
0.0006205409299582243,
0.0005976274842396379,
0.0009358975221402943,
0.0006157226744107902,
0.0009180400520563126,
0.0006534408312290907,
0.0012850514613091946,
0.0008846396231092513,
0.0007117232889868319,
0.0034487363882362843,
0.0006143267382867634,
0.014789207838475704,
0.0006902466993778944,
0.0006473970133811235,
0.000983062433078885,
0.00061688048299402,
0.000676760682836175,
0.0007812111871317029,
0.0006335140787996352,
0.0007328531937673688,
0.0006645182147622108,
0.0006506280042231083,
0.0007667291793040931,
0.0007423666538670659,
0.0007680217968299985,
0.001153692603111267,
0.0005947380559518933,
0.0007325030164793134,
0.0005521317943930626,
0.0007469359552487731,
0.0008525166776962578,
0.0005642407923005521,
0.0006895402912050486,
0.0005614166730083525,
0.0006587128154933453,
0.000671727058943361,
0.0007013357826508582,
0.0007815060671418905,
0.0006173342117108405,
0.002445044694468379,
0.0014068278251215816,
0.0012596443993970752,
0.019187329337000847,
0.0009068503277376294,
0.0007175136706791818,
0.0018383614951744676,
0.006677357479929924,
0.0007301602163352072,
0.004897853825241327,
0.7870346307754517,
0.003208837239071727,
0.001769503578543663,
0.0008349060663022101,
0.0011968475300818682,
0.001082955626770854,
0.0006270714802667499,
0.00264615542255342,
0.0007499748026020825,
0.0007179254316724837,
0.0005511555937118828,
0.0006176929455250502,
0.0005360139766708016,
0.0006108446978032589,
0.0006378389080055058,
0.005408923141658306,
0.0014272904954850674,
0.0005941689596511424,
0.0005244228523224592,
0.00054902583360672,
0.0013953554444015026,
0.0010856428416445851,
0.0006751601467840374,
0.0008390856673941016,
0.0005574274691753089,
0.036229703575372696,
0.0007012328715063632,
0.000546980882063508,
0.000728109385818243,
0.0006206177640706301,
0.0006270395242609084,
0.0006587929092347622,
0.0005691194674000144,
0.0009436543332412839,
0.0007344591431319714,
0.0005255702999420464,
0.0008031229372136295,
0.0007817511213943362,
0.0005310313426889479,
0.0005852807662449777,
0.0005500147235579789,
0.0010609935270622373,
0.0007312879315577447,
0.0007018041214905679,
0.0006487166392616928,
0.000798130757175386,
0.0008581950096413493,
0.000799521163571626,
0.0009011354995891452,
0.0008213573019020259,
0.000799778732471168,
0.0007955225300975144,
0.0007680400158278644,
0.0018871012143790722,
0.0008207712671719491,
0.0007665958837606013,
0.0005971207865513861,
0.0006100897444412112,
0.0005457797087728977,
0.0006201459327712655,
0.0006297673098742962,
0.0007004230283200741,
0.0005693763378076255,
0.0005407772841863334,
0.0007761861197650433,
0.0007869978435337543,
0.0005827189306728542,
0.0005182101158425212,
0.0005513497744686902,
0.0007314524846151471
] | 0.00886 | 178 |
[
"A fan in Europe looks to have received the Skylanders Imaginators Starter Pack nearly 2 weeks ahead of the release.",
"\n\nHe posted some images of the unboxing, but more importantly shared images of the Poster as well, which confirms the Skylanders Imaginators lineup.",
"\n\nWe’ve known the names and had seen some in-game representations, but this is the first time we’ve seen the figures themselves.",
"\n\nHere are the remaining Skylanders Imaginators figures that Skylanders has yet to officially unveil. ",
"Head to SkylandersInquirer.com for the names and more info! #",
"Skylanders #skylandersimaginators #Skylander A photo posted by Jason Inquires (@jasoninquires) on Sep 28, 2016 at 9:09am PDT\n\nBe sure to get your figure pre-orders in now to get them at the bundle rates.",
"\n\nTake a look at all the images below:\n\nSource: DarkSpyro\n\nBe sure to check out my weekly podcast , The Toys For Games ‘Cast . ",
"Talk all things in ‘Toys To Life’ genre!"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0005806806148029864,
0.0006005584145896137,
0.0005436106002889574,
0.0013389469822868705,
0.000904369167983532,
0.0007317282143048942,
0.0006642098305746913,
0.0013929237611591816
] | 0.000845 | 8 |
[
"\n776 N.W.2d 101 (2009)\n2009 WI App 158\nFLYNN\nv.\nFLYNN.",
"\nNo. ",
"2008AP2692.",
"\nCourt of Appeals of Wisconsin.",
"\nSeptember 2, 2009.",
"\nUnpublished Opinion Affirmed.",
"\n"
] | {
"pile_set_name": "FreeLaw"
} | [
0.0008647033828310668,
0.0013785817427560687,
0.0010502401273697615,
0.000829779717605561,
0.0007068503764458001,
0.0006329363095574081,
0.001995444530621171
] | 0.001066 | 7 |
[
"This invention relates to a method and an apparatus for automatically setting the weaving reversing position in automatic arc welding wherein the electrode is subjected to weaving or to-and-fro oscillating movement within the transverse extent of the welding groove or bevel."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0006598667241632938
] | 0.00066 | 1 |
[
"Alexander Coggin\n\nPhotographer\n\nAlexander Coggin has an utterly unique way of looking at the world. ",
"Now based in London after several years in Berlin, the American is happiest wandering the streets with his camera, feeding his visual curiosity and capturing scenes and subtexts he happens across.",
"\n\nWith an extraordinary eye for the unusual, the unexpected and the unlikely, he captures fantastic combinations of colour and texture. ",
"The subjects change according to what he finds, but he conjures weird and wonderful compositions from even the most everyday scenarios.",
"\n\nA trained actor, his theatrical training still influences his image-making – he is interested in backstory, body language, and the gap between perception and reality. ",
"His bold use of flash adds a magical realism to his pictures, which wouldn’t look out of place on the big screen."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0007192412740550935,
0.0006688942085020244,
0.0006144766812212765,
0.0006844543386250734,
0.0006545677897520363,
0.0006412577931769192
] | 0.000664 | 6 |
[
"Q:\n\nDistinct SQLite query-result to Python List or Tuple\n\nI have a query that returns e.g. the following result:\nRow1: \"Schmidt\"\nRow2: \"Schmidt, Meier\"\nRow3: \"Mustermann, Schmidt\"\n\nQuestion: how do I get the results in a Python tuple or list etc:?",
"\nI would like the following list: \n\"Meier, Mustermann, Schmidt\".",
"\n\nEach name appears only once.",
"\nPython code which executes the query (used to populate entries for a comboBox):\nclass DatabaseManager(object):\n def init(self, db):\n self.conn = sqlite3.connect(db)\n self.cur = self.conn.cursor()\ndef get_names(self):\n sSql = \"SELECT DISTINCT name \"\\\n \" FROM patient \"\\\n \" ORDER BY 1\"\n return self.cur.execute(sSql)\n\nAnd this is called from an instance which populates the results into a comboBox:\ndef populate_names(self, combobox):\n rows = self.db.get_names()\n for row in rows:\n combobox.addItem(row[0])\n\nA:\n\nCreate an empty list to hold the names.",
"\nLoop through each name in the query result.",
"\nIf the current name is not already in the list, add it.",
"\nSomething like this:\nnames = []\nfor row in sql_result:\n if row['name'] not in names:\n names.append(row['name'])\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0006251747836358845,
0.0005707202944904566,
0.0005810772418044508,
0.0008437410579062998,
0.0006405495223589242,
0.0006786385201849043,
0.0006147964741103351
] | 0.000651 | 7 |
[
"Chemiluminescent detection of senescence-associated β galactosidase.",
"\nIdentifying molecules that serve as markers for cell aging is a goal that has been pursued by several groups. ",
"Senescence-associated β galactosidase (SA-βgal) staining is broadly used and very easily detected. ",
"β-gal is a lysosomal enzyme strongly correlated to the progression of cell senescence. ",
"Here, we describe a simple, fast, and quantitative protocol to quantify SA-βgal activity in cell lysate extracts by a chemiluminescent method using galacton as substrate."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0008104290463961661,
0.0005365997785702348,
0.0006583927315659821,
0.0009614501032046974,
0.0006410609930753708
] | 0.000722 | 5 |
[
"Age-related differences in nephrotoxicity of cadmium.",
"\nNephrotoxic effects can be quantified by measurement of renal excretion of p-amino-hippurate (PAH). ",
"Intraperitoneal administration of cadmium in increasing single doses to adult rats is followed by a biphasic effect on renal PAH excretion. ",
"Administration of low doses (250 or 500 micrograms/100 g b.wt. ",
"CdCl2) results in a significant increase whereas a single dose of 750 micrograms/100 g b.wt. ",
"CdCl2 is followed by a distinct diminution of renal PAH excretion. ",
"Repeated administrations of 500 micrograms/100 g b.wt. ",
"CdCl2 for 2 or 3 consecutive days result in a marked reduction of PAH excretion which is reversible 5 or 6 d following administration. ",
"In juvenile rats cadmium does not produce any statistically significant alteration in renal PAH excretion, likely caused by the immaturity of renal tubular transport processes."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.0009667730773799121,
0.0063707055523991585,
0.02941306121647358,
0.0007796278805471957,
0.0008607234340161085,
0.5065840482711792,
0.0008705747895874083,
0.1078202947974205,
0.008833040483295918
] | 0.073611 | 9 |
[
"PIA Press ReleaseMonday, January 02, 2012\n\nISABELA CITY, Basilan, Jan 2 (PIA) – The Office of the Presidential Adviser on the Peace Process (OPAPP) announced that the national government has recently signed a memorandum of agreement with key provinces under the Autonomous region in Muslim Mindanao (ARMM) to implement PAMANA or Payapa at Masaganang Pamayanan program (Peaceful and Resilient Communities).",
"\n\nThe agreements (MOA) with the local government units of Maguindanao, Lanao del Sur, Tawi-Tawi, Basilan and Sulu was formalized, Friday (December 30, 2011), their partnership with the national government to implement PAMANA.",
"\n\n“The MOA signing for PAMANA projects in peace and development communities of MNLF is good news in this season of hope; it is a good way to end the year and start 2012 where implementation of the projects will start right away,” Deles pointed out in her speech.",
"\n\nShe said that the 1996 FPA ushered in the constitution of PDCs, one of the mechanisms for the rehabilitation of the rebels and communities, providing them with new opportunities to find peaceful means of livelihood and other social and economic benefits.",
"\n\nAlthough PAMANA is not part of the implementation of the peace pact, it still supports the PDCs as the government’s direct action to further spur the economic activities of the people in MNLF areas.",
"\n\nOPAPP said the agreements provide for funds that will be used for projects in Peace and Development Communities or PDCs of the Moro National Liberation Front (MNLF) in the ARMM.",
"\n\nAs part of the President Aquino III administration’s affirmative action agenda for Muslim Mindanao, a budget of Php718-M was earmarked under PAMANA to benefit MNLF members in communities formerly known as MNLF bases that were transformed into Peace and Development Communities during the implementation of the 1996 GPH-MNLF Final Peace Agreement. ",
"As with regular PAMANA projects, the PAMANA-PDC projects will be implemented through partnership agreements with provincial government units.",
"\n\nFor this endeavor, OPAPP has engaged the Federation of United Mindanawan Bangsamoro Women Multi-Purpose Cooperative (FUMBWMPC) to ensure that beneficiary communities are prepared for the entry of PAMANA. ",
"FUMBWMPC likewise acts as the third-party monitor for the transparent and accountable implementation of the projects in PDCs.",
"\n\nPAMANA, which is the government’s program and framework for peace and development, aims to reduce poverty, improve governance and empower communities in situations of conflict.",
"\n\nMeanwhile, the ARMM provincial governors expressed their gratitude to the national government.",
"\n\n“I’m glad that our provincial local government is part of the implementation of the PAMANA projects,” Tawi-Tawi governor Sahali said.",
"\n\nParallel to this, Akbar lauded President Benigno Aquino III in giving priority to peace and development projects in the province where “different elements are situated.”",
"\n\nMoreover, Sulu Gov. Tan conveyed appreciation to local governments and stakeholders for their active participation in peace building. “",
"We are hopeful for genuine peace because the government shows dedication and seriousness in peace efforts.”",
"\n\nAdiong said that the present administration shows and undertakes efforts that “the peace and development needs of Muslim citizens in the country especially in the south are given attention by the national government.”",
"\n\nOn the other hand, Utto related that the signing of the MOA means more peace and development efforts in ARMM communities and signals that the work for just and lasting peace will be successful."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0005368589190766215,
0.0005938790854997933,
0.0005767694674432278,
0.0005432679317891598,
0.0005876376526430249,
0.0007362861069850624,
0.0006568393437191844,
0.0006021155859343708,
0.000993520487099886,
0.004373718984425068,
0.0006952920812182128,
0.0005215221899561584,
0.0006253920146264136,
0.0005578726413659751,
0.000523446302395314,
0.0004962239181622863,
0.0005840740050189197,
0.0005545372841879725
] | 0.00082 | 18 |
[
"Q:\n\nCan a Condition be neither Necessary nor Sufficient?",
"\n\nI've consulted the four introductory logic textbooks below, and none moot the case of an un-necessary and in-sufficient condition. ",
"Do such conditions exist?",
"\nI don't quote from Peter Smith's An Introduction to Formal Logic (Cambridge Introductions to Philosophy) for my library doesn't carry the 2 edn (Aug. 6 2020).",
"\nNicholas J.J. Smith, Logic: The Laws of Truth (2012). ",
"p 181.",
"\n\n “P is a sufficient condition for Q” means that having the property P is\nenough for something to have the property Q; that is, if something is P,\nthen it is Q. So we regard this statement as meaning the same thing as “all\nPs are Qs,” and we translate it as $∀x(Px →Qx)$. For example, “weighing\nmore than a ton is sufficient for being heavy” says the same as “anything that\nweighs more than a ton is heavy.” “",
"P is a necessary condition forQ” means that\nsomething cannot possess the property Q if it does not possess the property\nP—in other words, something possesses the property Q only if it possesses\nthe property P. So we regard this statement as meaning the same thing as\n“all Qs are Ps,” and we translate it as $∀x(Qx →Px)$. For example, “weighing\nmore than a pound is necessary for being heavy” says the same as “only things\nthat weigh more than a pound are heavy” and as “anything that is heavy\nweighs more than a pound.” ",
"Thus, “P is a necessary and sufficient condition\nfor Q” says the same thing as “all Ps and only Ps are Qs,” and translates as\n$∀x(Px →Qx) ∧ ∀x(Qx →Px)$, or equivalently $∀x(Px ↔Qx)$.\n\nCopi, Cohen, Rodych. ",
"Introduction to Logic (2019 15 ed). ",
"p 282.",
"\n\nThe notions of necessary and suffi cient conditions provide other formulations of\nconditional statements. ",
"For any specifi ed event, many circumstances are necessary for it\nto occur. ",
"Thus, for a normal car to run, it is necessary that there be fuel in its tank, that\nits spark plugs be properly adjusted, that its oil pump be working, and so on. ",
"So if the\nevent occurs, every one of the conditions necessary for its occurrence must have been\nfulfilled. ",
"Hence to say\n\nThat there is fuel in its tank is a necessary condition for the car to run.",
"\n\np 283.",
"\n\ncan equally well be stated as\n\nThe car runs only if there is fuel in its tank.",
"\n\nwhich is another way of saying that\n\nIf the car runs then there is fuel in its tank.",
"\n\nAny of these is symbolized as $R \\supset F$ . ",
"Usually “ q is a necessary condition for p” is symbolized as $p \\supset q$. Likewise, “ p only if q ” is also symbolized as $p \\supset q$.\n For a specified situation there may be many alternative circumstances, any one of which is sufficient to produce that situation. ",
"For a purse to contain more than a dollar,\nfor example, it is sufficient for it to contain five quarters, or eleven dimes, or twenty-one\nnickels, and so on. ",
"If any one of these circumstances obtains, the specified situation will be\nrealized. ",
"Hence, to say “That the purse contains five quarters is a sufficient condition for it\nto contain more than a dollar” is to say “If the purse contains five quarters then it contains\nmore than a dollar.” ",
"In general, “ p is a sufficient condition for q ” is symbolized as $p \\supset q$.\n\nLepore, Cumming. ",
"Meaning and Argument: An Introduction to Logic Through Language (2012 2nd rev. ",
"edn.) ",
"p 83\n\nIf $\\alpha$ is a sufficient condition for $\\beta$, then if $\\alpha$ obtains, $\\beta$ obtains as well.",
"\n\np 84\n\nIf $\\alpha$ is a sufficient condition for $\\beta$, then if $\\beta$ obtains, $\\alpha$ obtains as well.",
"\n\nI couldn't find anything relevant in Harry Gensler's Introduction to Logic (2017 3 ed).",
"\n\nA:\n\nGiven that $(P\\rightarrow Q)\\lor (Q\\rightarrow P)$ is a tautology (it's the same as (¬∨)∨(¬∨)), it is impossible for a statement to be both not necessary and not sufficient under the definitions given by Copi, Cohen and Rodych.",
"\n\nHowever, if we use the definition given by Nicholas J.J. Smith which involves quantification, it is possible for a statement to both be not necessary and not sufficient.",
"\nConsider $\\forall x(Px\\rightarrow Qx)\\lor\\forall x(Qx\\rightarrow Px)$ in a model with a domain consisting of two objects $\\{a,b\\}$, and interpretation $Pa=1,Qa=0,Qb=1,Pb=0$. This means that neither of $\\forall x(Px\\rightarrow Qx)$ or $\\forall x(Qx\\rightarrow Px)$ are true.",
"\nA worded example of this would be the following: An odd number is neither a necessary nor sufficient condition for that same number to be even.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0009612467838451266,
0.0005699361208826303,
0.0007683380390517414,
0.0006546888616867363,
0.0006317505030892789,
0.0009420359274372458,
0.0011438003275543451,
0.0012418495025485754,
0.0021185160148888826,
0.0006396082462742925,
0.0008958533289842308,
0.000591576739680022,
0.0005936487577855587,
0.0007958785863593221,
0.0005556493997573853,
0.0008959831320680678,
0.0008763465448282659,
0.0006790703628212214,
0.0009366045123897493,
0.07546358555555344,
0.005761778447777033,
0.0010669571347534657,
0.000546600145753473,
0.0010121723171323538,
0.029799211770296097,
0.0006509368540719151,
0.0007120204390957952,
0.0011358713964000344,
0.0011370378779247403,
0.0006143560167402029,
0.0008917272207327187,
0.0005779857165180147,
0.0046753366477787495,
0.0007766296621412039,
0.001995444530621171
] | 0.004095 | 35 |
[
"Temporary spontaneous thrombosis of a splenic artery pseudoaneurysm in chronic pancreatitis during intravenous octreotide administration.",
"\nSplenic artery pseudoaneurysm is a well-known and potentially life-threatening complication of pancreatitis for which immediate endovascular or surgical treatment is indicated. ",
"An unusual case of spontaneous thrombosis of a splenic artery pseudoaneurysm with associated partial splenic infarction was encountered in the setting of chronic pancreatitis during intravenous octreotide administration, with recanalization 9 months later."
] | {
"pile_set_name": "PubMed Abstracts"
} | [
0.003147328272461891,
0.0034545541275292635,
0.0012231114087626338
] | 0.002608 | 3 |
[
"Amanda Coyne\n\nThe Greenville News\n\nU.S. Sen. Lindsey Graham said in January that choosing between Sen. Ted Cruz and Donald Trump for the Republican presidential nomination was \"like choosing between getting shot or poisoned.\" ",
"On Friday morning, he recommended that President-elect Trump nominate Cruz to the U.S. Supreme Court.",
"\n\n\"I would put Ted Cruz on that list. ",
"I would suggest that President Trump look within the Senate,\" Graham said when asked who Trump should nominate for the court's current vacancy. \"",
"There is some talent there. ",
"There is no stronger constitutional conservative than Ted Cruz.\"",
"\n\nGraham, who ran against Trump and Cruz in the Republican presidential primary, had supportive words Friday for the president-elect that he had vocally criticized throughout the presidential campaign, and who he did not vote for. ",
"Graham voted for independent presidential candidate Evan McMullin over Trump on election day.",
"\n\n\"He is my president,\" Graham said of Trump at a Veteran's Day celebration at Greenville Memorial Hospital.",
"\n\nGraham expressed hope that Trump would begin his administration by pursuing legislation to repair infrastructure, which he described as an issue with bipartisan appeal. ",
"That same issue was at the forefront of debate in the South Carolina Statehouse during this year's session.",
"\n\n\"I believe we need to rebuild our roads and bridges. ",
"Focus on something that Republicans and Democrats can agree upon,\" Graham said. \"",
"Enact your agenda, but if you can start out with putting points on the board, bringing us together -- we’re going to repeal and replace Obamacare, but that comes later in the year.",
"\n\n\"The very best thing President Trump can do for us is do something that unites the country, unites Republicans and Democrats. ",
"Then we’ll get to fighting each other, which is part of democracy. ",
"It’s OK to disagree, but there’s so many things we agree upon.\"",
"\n\nSouth Carolina's senior senator also expressed hope that Trump would increase the size of the military, saying it is \"insane\" that the U.S. armed forces are at their smallest level since World War II.",
"\n\n\"As long as there's one Marine with a rifle, the country will be safe. ",
"Looking at our budget, we might be down to one Marine,\" Graham joked while addressing a crowd of veterans, military families and hospital employees at the event.",
"\n\nGraham, a retired Air Force colonel, also called for reform to the Department of Veteran's Affairs, saying military veterans should be able to go to any health care provider and have that care fully covered by their benefits."
] | {
"pile_set_name": "OpenWebText2"
} | [
0.011600428260862827,
0.0008391531882807612,
0.0021790422033518553,
0.0005948318867012858,
0.0006464166799560189,
0.0007392589468508959,
0.0007742321467958391,
0.0008726972155272961,
0.0006230485741980374,
0.0006861636065877974,
0.000596319732721895,
0.0006882268935441971,
0.0015505768824368715,
0.0006746227736584842,
0.005343296565115452,
0.006793508771806955,
0.0005346428952179849,
0.0009689548751339316,
0.0009301193640567362,
0.0005659930175170302,
0.0006592039717361331
] | 0.001851 | 21 |
[
"Q:\n\nSort String Numbers\n\nI have a column of type varchar that stores many different numbers. ",
"\nSay for example see the picture \nIt should short as \n12-1\n12-13\n12-105\n12-127\n12-168\nThanks\n\nA:\n\n1You can try something like that:\nSELECT *, SUBSTRING_INDEX(row_name, '-', 1) as some_sort\nFROM table_name\nORDER BY some_sort\n\nSo i guess (not tested, but idea in that way) : \n12-34,12-46,12-95,12-135...etc\nBut question quality is low, so i can only guess what u want to do.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0007861448684707284,
0.0006495824782177806,
0.001995444530621171
] | 0.001144 | 3 |
[
"/*\n * Copyright (c) 1990, 1993, 1994, 1995, 1996\n *\tThe Regents of the University of California. ",
" All rights reserved.",
"\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that: (1) source code distributions\n * retain the above copyright notice and this paragraph in its entirety, (2)\n * distributions including binary code include the above copyright notice and\n * this paragraph in its entirety in the documentation or other materials\n * provided with the distribution, and (3) all advertising materials mentioning\n * features or use of this software display the following acknowledgement:\n * ``This product includes software developed by the University of California,\n * Lawrence Berkeley Laboratory and its contributors.'' ",
"Neither the name of\n * the University nor the names of its contributors may be used to endorse\n * or promote products derived from this software without specific prior\n * written permission.",
"\n * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED\n * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF\n * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.",
"\n */\n\n#ifdef HAVE_CONFIG_H\n#include <config.h>\n#endif\n\n#include <pcap-types.h>\n\n#include <memory.h>\n#include <stdio.h>\n#include <string.h>\n\n#include \"pcap-int.h\"\n\n#include <pcap/namedb.h>\n\n#ifdef HAVE_OS_PROTO_H\n#include \"os-proto.h\"\n#endif\n\nstatic inline int skip_space(FILE *);\nstatic inline int skip_line(FILE *);\n\n/* Hex digit to integer. */",
"\nstatic inline u_char\nxdtoi(u_char c)\n{\n\tif (c >= '0' && c <= '9')\n\t\treturn (u_char)(c - '0');\n\telse if (c >= 'a' && c <= 'f')\n\t\treturn (u_char)(c - 'a' + 10);\n\telse\n\t\treturn (u_char)(c - 'A' + 10);\n}\n\n/*\n * Skip linear white space (space and tab) and any CRs before LF.",
"\n * Stop when we hit a non-white-space character or an end-of-line LF.",
"\n */\nstatic inline int\nskip_space(FILE *f)\n{\n\tint c;\n\n\tdo {\n\t\tc = getc(f);\n\t} while (c == ' ' || c == '\\t' || c == '\\r');\n\n\treturn c;\n}\n\nstatic inline int\nskip_line(FILE *f)\n{\n\tint c;\n\n\tdo\n\t\tc = getc(f);\n\twhile (c !",
"= '\\n' && c !",
"= EOF);\n\n\treturn c;\n}\n\nstruct pcap_etherent *\npcap_next_etherent(FILE *fp)\n{\n\tregister int c, i;\n\tu_char d;\n\tchar *bp;\n\tsize_t namesize;\n\tstatic struct pcap_etherent e;\n\n\tmemset((char *)&e, 0, sizeof(e));\n\tfor (;;) {\n\t\t/* Find addr */\n\t\tc = skip_space(fp);\n\t\tif (c == EOF)\n\t\t\treturn (NULL);\n\t\tif (c == '\\n')\n\t\t\tcontinue;\n\n\t\t/* If this is a comment, or first thing on line\n\t\t cannot be Ethernet address, skip the line. */",
"\n\t\tif (!",
"PCAP_ISXDIGIT(c)) {\n\t\t\tc = skip_line(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t\tcontinue;\n\t\t}\n\n\t\t/* must be the start of an address */\n\t\tfor (i = 0; i < 6; i += 1) {\n\t\t\td = xdtoi((u_char)c);\n\t\t\tc = getc(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t\tif (PCAP_ISXDIGIT(c)) {\n\t\t\t\td <<= 4;\n\t\t\t\td |= xdtoi((u_char)c);\n\t\t\t\tc = getc(fp);\n\t\t\t\tif (c == EOF)\n\t\t\t\t\treturn (NULL);\n\t\t\t}\n\t\t\te.addr[i] = d;\n\t\t\tif (c !",
"= ':')\n\t\t\t\tbreak;\n\t\t\tc = getc(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t}\n\n\t\t/* Must be whitespace */\n\t\tif (c !",
"= ' ' && c !",
"= '\\t' && c !",
"= '\\r' && c !",
"= '\\n') {\n\t\t\tc = skip_line(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t\tcontinue;\n\t\t}\n\t\tc = skip_space(fp);\n\t\tif (c == EOF)\n\t\t\treturn (NULL);\n\n\t\t/* hit end of line... */\n\t\tif (c == '\\n')\n\t\t\tcontinue;\n\n\t\tif (c == '#') {\n\t\t\tc = skip_line(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t\tcontinue;\n\t\t}\n\n\t\t/* pick up name */\n\t\tbp = e.name;\n\t\t/* Use 'namesize' to prevent buffer overflow. */",
"\n\t\tnamesize = sizeof(e.name) - 1;\n\t\tdo {\n\t\t\t*bp++ = (u_char)c;\n\t\t\tc = getc(fp);\n\t\t\tif (c == EOF)\n\t\t\t\treturn (NULL);\n\t\t} while (c !",
"= ' ' && c !",
"= '\\t' && c !",
"= '\\r' && c !",
"= '\\n'\n\t\t && --namesize !",
"= 0);\n\t\t*bp = '\\0';\n\n\t\t/* Eat trailing junk */\n\t\tif (c !",
"= '\\n')\n\t\t\t(void)skip_line(fp);\n\n\t\treturn &e;\n\t}\n}\n"
] | {
"pile_set_name": "Github"
} | [
0.0006442687008529902,
0.0006133938441053033,
0.0005665173521265388,
0.0006735713686794043,
0.0006466977065429091,
0.0018754247575998306,
0.004083897918462753,
0.0012212976580485702,
0.010056359693408012,
0.037826057523489,
0.007002144120633602,
0.0014506432926282287,
0.03599727898836136,
0.04062328860163689,
0.0014526898739859462,
0.01123560406267643,
0.008040440268814564,
0.011862204410135746,
0.03020484372973442,
0.0014526898739859462,
0.01123560406267643,
0.008040440268814564,
0.004894269164651632,
0.3603914976119995,
0.002319409977644682
] | 0.023776 | 25 |
[
"Q:\n\ngetting this error in Caret\n\nI'm getting the following error and I don't know what may have gone wrong. ",
"\nI'm using R Studio with the 3.1.3 version of R for Windows 8.1 and using the Caret package for datamining.",
"\nI have the following training data: \nstr(training)\n'data.frame': 212300 obs. ",
"of 21 variables:\n\n $ FL_DATE_MDD_MMDD : int 101 101 101 101 101 101 101 101 101 101 ...\n\n $ FL_DATE : int 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 ...\n\n $ UNIQUE_CARRIER : Factor w/ 13 levels \"9E\",\"AA\",\"AS\",..: 11 10 2 5 8 9 11 10 10 10 ...\n\n $ DEST : Factor w/ 150 levels \"ABE\",\"ABQ\",\"ALB\",..: 111 70 82 8 8 31 110 44 53 80 ...\n\n $ DEST_CITY_NAME : Factor w/ 148 levels \"Akron, OH\",\"Albany, NY\",..: 107 61 96 9 9 29 106 36 97 78 ...\n\n $ ROUNDED_TIME : int 451 451 551 551 551 551 551 551 551 551 ...\n\n $ CRS_DEP_TIME : int 500 520 600 600 600 600 600 600 602 607 ...\n\n $ DEP_DEL15 : Factor w/ 2 levels \"0\",\"1\": 1 2 1 1 1 1 1 2 1 1 ...\n\n $ CRS_ARR_TIME : int 746 813 905 903 855 815 901 744 901 841 ...\n\n $ Conditions : Factor w/ 28 levels \"Blowing Snow\",..: 2 2 2 2 2 2 2 2 2 2 ...\n\n $ Dew.",
"PointC : num -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 ...\n\n $ Events : Factor w/ 10 levels \"\",\"Fog\",\"Fog-Rain\",..: 1 1 1 1 1 1 1 1 1 1 ...\n\n $ Gust.",
"SpeedKm.h : num NA NA NA NA NA NA NA NA NA NA ...\n\n $ Humidity : int 68 68 71 71 71 71 71 71 71 71 ...\n\n $ Precipitationmm : num NA NA NA NA NA NA NA NA NA NA ...\n\n $ Sea.",
"Level.",
"PressurehPa: num 1021 1021 1022 1022 1022 ...\n\n $ TemperatureC : num -9.4 -9.4 -10 -10 -10 -10 -10 -10 -10 -10 ...\n\n $ VisibilityKm : num 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 ...\n\n $ Wind.",
"Direction : Factor w/ 18 levels \"Calm\",\"East\",..: 9 9 7 7 7 7 7 7 7 7 ...\n\n $ WindDirDegrees : int 320 320 330 330 330 330 330 330 330 330 ...\n\n $ Wind.",
"SpeedKm.h : num 20.4 20.4 13 13 13 13 13 13 13 13 ...\n\n - attr(*, \"na.action\")=Class 'omit' Named int [1:22539] 3 32 45 87 94 325 472 548 949 1333 ...\n\n .. ..- attr(*, \"names\")= chr [1:22539] \"3\" \"32\" \"45\" \"87\" ...\n\nand when I execute the following command: \nldaModel <- train(DEP_DEL15~.,data=training,method=\"lda\",preProc=c(\"center\",\"scale\"),na.remove=TRUE)\n\nI get:\n\nSomething is wrong; all the Accuracy metric values are missing:\n Accuracy Kappa\n Min. ",
" : NA Min. ",
" : NA\n 1st Qu.: ",
"NA 1st Qu.: ",
"NA\n Median : NA Median : NA\n Mean :NaN Mean :NaN\n 3rd Qu.: ",
"NA 3rd Qu.: ",
"NA\n Max. ",
" : NA Max. ",
" : NA\n NA's :1 NA's :1\n Error in train.default(x, y, weights = w, ...) : Stopping\n\nA:\n\nIt is probably due to having about outcome factor with levels \"0\" and \"1\". ",
"\nThere is a specific warning issued when this happens: At least one of the class levels are not valid R variables names; This may cause errors if class probabilities are generated because the variables names will be converted to: X0, X1\"\nIt seems that people uniformly ignore warnings so I'm going to make this throw an error in the next version. ",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0012230543652549386,
0.0006449631764553487,
0.0006375241209752858,
0.0017626783810555935,
0.0009082018514163792,
0.009472322650253773,
0.0009167385287582874,
0.0010624753776937723,
0.0006178297917358577,
0.0006970289978198707,
0.0010678661055862904,
0.0008665624773129821,
0.0008672592812217772,
0.0006558478926308453,
0.0007821684121154249,
0.0019979930948466063,
0.0009033852256834507,
0.0007146001444198191,
0.0007060044445097446,
0.001995444530621171
] | 0.001425 | 20 |
[
" FILED\n UNITED STATES COURT OF APPEALS\n NOV 07 2018\n FOR THE NINTH CIRCUIT MOLLY C. DWYER, CLERK\n U.S. COURT OF APPEALS\n\n\n\n\nDEISY YAQUELIN ORDONEZ- No. ",
" 17-71840\nGODOY; CALEB JOEL SAUCEDA-\nORDONEZ, Agency Nos. ",
" A206-843-750\n A206-843-751\n Petitioners,\n\n v. ORDER WITHDRAWING\n MEMORANDUM\nJEFFERSON B. SESSIONS III, Attorney DISPOSITION, GRANTING\nGeneral, PETITION FOR REHEARING,\n AND DENYING PETITION FOR\n Respondent. ",
" REHEARING EN BANC\n\n\nBefore: ROGERS,* BYBEE, and WATFORD, Circuit Judges.",
"\n\n Judges Bybee and Watford voted to grant the petition for rehearing, and\n\nJudge Rogers voted to deny the petition for rehearing. ",
"The memorandum\n\ndisposition filed on June 29, 2018 is withdrawn.",
"\n\n Judges Bybee and Watford voted to deny the petition for rehearing en banc,\n\nand Judge Rogers recommended denying the petition for rehearing en banc. ",
"The\n\nfull court has been advised of the petition for rehearing en banc, and no judge has\n\nrequested a vote on whether to rehear the matter en banc. ",
"Fed. ",
"R. App. ",
"P. 35.",
"\n\n\n\n *\n The Honorable John M. Rogers, United States Circuit Judge for the\nU.S. Court of Appeals for the Sixth Circuit, sitting by designation.",
"\n\f The petition for panel rehearing is GRANTED. ",
"The petition for rehearing\n\nen banc is DENIED.",
"\n\n\n\n\n 2\n\f FILED\n NOT FOR PUBLICATION\n NOV 07 2018\n UNITED STATES COURT OF APPEALS MOLLY C. DWYER, CLERK\n U.S. COURT OF APPEALS\n\n\n FOR THE NINTH CIRCUIT\n\n\nDEISY YAQUELIN ORDONEZ- No. ",
" 17-71840\nGODOY; CALEB JOEL SAUCEDA-\nORDONEZ, Agency Nos. ",
" A206-843-750\n A206-843-751\n Petitioners,\n\n v. MEMORANDUM*\n\nJEFFERSON B. SESSIONS III, Attorney\nGeneral,\n\n Respondent.",
"\n\n\n On Petition for Review of an Order of the\n Board of Immigration Appeals\n\n Argued and Submitted April 11, 2018\n Pasadena, California\n\nBefore: ROGERS,** BYBEE, and WATFORD, Circuit Judges.",
"\n\n Deisy Ordonez–Godoy appeals the Board of Immigration Appeals’ (“BIA”)\n\ndenial of her petition for asylum, withholding of removal, and relief under the\n\n\n *\n This disposition is not appropriate for publication and is not precedent\nexcept as provided by Ninth Circuit Rule 36-3.",
"\n **\n The Honorable John M. Rogers, United States Circuit Judge for the\nU.S. Court of Appeals for the Sixth Circuit, sitting by designation.",
"\n\fConvention Against Torture. “",
"Where, as here, the BIA adopts the IJ’s decision\n\nwhile adding some of its own reasoning, we review both decisions.”",
"\n\nLopez–Cardona v. Holder, 662 F.3d 1110, 1111 (9th Cir. ",
"2011). “",
"We review\n\nconstitutional claims and questions of law de novo and review factual findings\n\nunder the deferential substantial evidence standard, treating them as ‘conclusive\n\nunless any reasonable adjudicator would be compelled to conclude to the\n\ncontrary.’” ",
"Id. (quoting 8 U.S.C. § 1252(b)(4)(B)). ",
"The IJ found Ordonez–Godoy\n\ncredible, and thus we accept her statements as true.",
"\n\n To be eligible for asylum, Ordonez–Godoy must establish that she is unable\n\nor unwilling to return to Honduras “because of persecution or a well-founded fear\n\nof persecution on account of race, religion, nationality, membership in a particular\n\nsocial group, or political opinion.” ",
"Mashiri v. Ashcroft, 383 F.3d 1112, 1119 (9th\n\nCir. ",
"2004) (quoting 8 U.S.C. § 1101(a)(42)(A)). “[",
"I]f an applicant establishes past\n\npersecution, it triggers a rebuttable presumption of a well-founded fear of future\n\npersecution.” ",
"Salazar–Paucar v. INS, 281 F.3d 1069, 1073–74 (9th Cir. ",
"2002).",
"\n\n“We have repeatedly held that threats may be compelling evidence of past\n\npersecution, particularly when they are specific and menacing and are accompanied\n\nby evidence of violent confrontations [and] near confrontations.” ",
"Mashiri, 383\n\nF.3d at 1119.",
"\n\n\n 2\n\f 1. ",
"Ordonez–Godoy established past persecution based on her membership\n\nthrough marriage in a politically active family. ",
"Ordonez–Godoy and her husband’s\n\nfamily lived in a small town in Honduras controlled by the National Party. ",
"A\n\nfamily organization, the Figueroas, backed the party through violence and\n\nintimidation. ",
"The Figueroas began targeting Ordonez–Godoy’s family, who\n\nopposed the National Party, in 2011 when her husband drove a man the Figueroas\n\nhad shot to the hospital. ",
"Over the next three years, until Ordonez–Godoy entered\n\nthe United States, Ordonez–Godoy’s husband and family received death threats by\n\nphone and in person, which were specific, direct, and menacing, and accompanied\n\nby violent and fatal attacks. ",
"Once, when Ordonez–Godoy’s husband and father\n\nwere running late for work, they drove past a vehicle resembling their family car,\n\nwhich had been attacked, killing two people and injuring two others inside the car.",
"\n\nShortly after this shooting, the Figueroas called and threatened Ordonez–Godoy’s\n\nfather-in-law, stating that the family “had gotten lucky” and “were still in danger of\n\ndeath.” ",
"Ordonez–Godoy’s husband fled the country and entered the United States\n\nin April 2012.",
"\n\n While Ordonez–Godoy remained in Honduras, four members of her\n\nhusband’s family were murdered and three others survived assassination attempts.",
"\n\nHer husband’s aunt was shot in the face while holding her baby in her lap and the\n\n\n 3\n\faunt’s partner was killed, but the kids in the home “were able to run under the beds\n\nand hide.” ",
"Ordonez–Godoy’s husband’s uncle was shot while laying on a\n\nhammock outside with his children, and Ordonez–Godoy and her in-laws heard the\n\nshots from their home. ",
"The murders were coming “one after another.” ",
"The family\n\nlived in fear, stayed at home, ceased working, and the police did nothing to address\n\nthe threats. ",
"Family members left the city, went into hiding, or fled the country.",
"\n\nOrdonez–Godoy entered the United States with her five-year-old son in July 2014.",
"\n\nThe threats, attacks, and murders provide compelling evidence of past persecution.",
"\n\nSee id. at 1121 (“Viewed cumulatively, . . . ",
"evidence of a death threat, violent\n\nphysical attacks against [the petioner’s] husband and sons, a near-confrontation\n\nwith a violent mob, vandalism, economic harm and emotional trauma compels a\n\nfinding of past persecution.”).",
"\n\n 2. ",
"Having shown past persecution, Ordonez–Godoy is entitled to a\n\npresumption of a well-founded fear of future persecution. ",
"Id. at 1119. ",
"An\n\napplicant may establish a well-founded fear by showing a “pattern or practice” of\n\npersecution of people she is “similarly situated” or “closely tied” to. ",
"Mgoian v.\n\nI.N.S., 184 F.3d 1029, 1035–36 (9th Cir. ",
"1999) (citations omitted). ",
"A family is a\n\n“prototypical example” of a similarly situated group. ",
"Id. at 1036 (citations\n\nomitted). “[",
"W]e have explicitly held that an individual applicant may be eligible\n\n\n 4\n\ffor asylum, even in the absence of direct persecution against [the petitioner]\n\npersonally, if she is able to demonstrate a well-founded fear of persecution based\n\non acts of violence against her friends or family members.” ",
"Id. Ordonez–Godoy\n\nhas established a well-founded fear of future persecution.",
"\n\n The BIA held that Ordonez–Godoy could not show that “any harm suffered\n\nby her or her relatives was on account of her family or a political opinion.” ",
"The\n\nfacts compel a contrary conclusion. ",
"The attacks against Ordonez–Godoy’s family\n\nshow a pattern of killing the members of her husband’s family who participated in\n\npolitics and those who supported them. ",
"Ordonez–Godoy is similarly situated to\n\nher husband’s family; she lived with them and participated in the political\n\ncampaigns that got them killed. ",
"Although the Figueroas once told Ordonez–Godoy\n\nthat they had no particular interest in her specifically, that fact alone is not\n\ndispositive—neither physical harm nor direct threats are required to find\n\npersecution. ",
"Mashiri, 383 F.3d at 1120; Mgoain, 184 F.3d at 1037; see also Hoxha\n\nv. Ashcroft, 319 F.3d 1179, 1183 (9th Cir. ",
"2003) (“Because the record reveals that\n\nthe amount of persecution directed toward [the targeted group] generally is\n\nextensive, the level of individualized risk [the petitioner] must show . . . ",
"is\n\ncomparatively low.”). ",
"As long as her husband’s family remains a target,\n\nOrdonez–Godoy is in danger, even if she is collateral to the political feud.",
"\n\n\n 5\n\f In Mgoian v. I.N.S., the petitioner’s uncle was murdered, and two other\n\nuncles and her parents fled the country in light of death threats. ",
"184 F.3d at\n\n1033–34. ",
"The BIA found the petitioner failed to “link” these events “in any\n\nmeaningful way to her fear of being persecuted.” ",
"Id. at 1033. ",
"On appeal, we\n\ngranted the petition for review, finding the petitioner showed “much more than\n\nmere isolated violence” and provided “ample proof that the violence against her\n\nfamily members [was] ‘closely tied’ to her.” ",
"Id. at 1036–37. ",
"The “violent acts\n\nagainst other members of the group put her on notice that she may be next.” ",
"Id. at\n\n1037. ",
"Like the petitioner in Mgoian, Ordonez–Godoy “fully demonstrated that\n\nacts of violence occurred against her family members and that those acts are\n\nsufficiently connected to her personally to justify a well-founded fear of\n\npersecution in any person similarly situated.” ",
"Id. at 1036.1 Ordonez–Godoy\n\nprovided facts that would compel a reasonable fact finder to find she has a well-\n\nfounded fear of future persecution.",
"\n\n We grant Ordonez–Godoy’s petition for review, reverse the decision of the\n\nBIA, and remand so the Attorney General may exercise his discretion to determine\n\nwhether to grant Ordonez–Godoy asylum. ",
"8 U.S.C. § 1158(b)(1).",
"\n\n\n\n 1\n Because we find that Ordonez–Godoy established a claim of asylum, we do\nnot address her remaining claims.",
"\n 6\n\fPETITION GRANTED.",
"\n\n\n\n\n 7\n\f FILED\n NOV 7 2018\nOrdonez-Godoy v. Sessions, 17-71840 (CA9) MOLLY C. DWYER, CLERK\n U.S. COURT OF APPEALS\nJudge Rogers, Circuit Judge, dissenting\n\n The BIA’s denial of Ordonez-Godoy’s application for asylum should be\n\nupheld. “",
"In order to reverse the BIA, we must determine ‘that the evidence not only\n\nsupports [a contrary] conclusion, but compels it—and also compels the further\n\nconclusion’ that the petitioner meets the requisite standard for obtaining relief,”\n\nGarcia-Milian v. Holder, 755 F.3d 1026, 1031 (9th Cir. ",
"2014) (alteration in original)\n\n(quoting INS v. Elias-Zacarias, 502 U.S. 478, 481 n.1 (1992)), but here the record\n\ndoes not compel reversal.",
"\n\n Substantial evidence supports the BIA’s conclusion that Ordonez-Godoy did\n\nnot suffer past persecution. ",
"Ordonez-Godoy was never physically harmed or directly\n\nthreatened by the Figueroas. ",
"Ordonez-Godoy credibly testified to threats against her\n\nhusband by the Figueroas, but she also testified that she was not on the Figueroas hit\n\nlist, and she did not testify that any threats were made against her specifically.",
"\n\nMoreover, she testified that during her only direct interaction with the Figueroas—\n\nwhen an armed group of gang members came to her home shortly after her husband\n\nfled Honduras—a gang member told her he was friends with her father and expressed\n\nno interest in harming her. ",
"Ordonez-Godoy remained in the country for nearly two\n\nyears following the incident without harm.",
"\n\fOrdonez-Godoy v. Sessions, No. ",
"17-71840; dissent\n\n\n Absent a sufficient showing of past persecution, Ordonez-Godoy cannot\n\nbenefit from a presumption of a fear of future persecution, and substantial evidence\n\nsupports the BIA’s determination that Ordonez-Godoy did not establish a well-\n\nfounded fear of future persecution on account of a protected ground. ",
" First,\n\nsubstantial evidence supports the BIA’s conclusion that Ordonez-Godoy is unlikely\n\nto be persecuted based on her relationship with her husband’s politically active\n\nfamily. ",
"During Ordonez-Godoy’s single direct encounter with the Figueroas they\n\nexpressed no desire to harm her even though they were aware that she was living\n\nwith her husband’s family; she lived in her husband’s family’s home for nearly two\n\nmore years without incident; and there is no evidence that anyone in Ordonez-\n\nGodoy’s hometown has been specifically targeted because of his or her relationship\n\nwith the Sauceda-Velasquez family.",
"\n\n Substantial evidence also supports the BIA’s conclusion that Ordonez-Godoy\n\ndid not establish a well-founded fear of future persecution based on her political\n\nopinion. ",
"It is true that the Figueroas have targeted her husband’s uncle and cousin,\n\nwho were political candidates for mayor, as well as her husband’s aunt and other\n\nuncle, who served as campaign managers. ",
"But the record here does not compel the\n\nfinding that the Figueroas imputed these political beliefs to Ordonez-Godoy. ",
"Again,\n\nOrdonez-Godoy has had a single interaction with the Figueroas and they expressed\n\nno interest in harming her, despite knowing that she lived with her husband’s\n\n\n ~2~\n\fOrdonez-Godoy v. Sessions, No. ",
"17-71840; dissent\n\n\npolitically active family. ",
"She lived with her husband’s family without incident\n\nthroughout the mayoral campaign, and she lived in Honduras without harm for more\n\nthan a year after the assassination of her husband’s uncle. ",
"Her husband’s parents\n\nhave continued to live in Honduras since that time without harm, despite the\n\ninclusion of her father-in-law on the Figueroas’ hit list.",
"\n\n The IJ and BIA looked at the record and decided that, although awful violence\n\nhad been visited upon members of Ordonez-Godoy’s family, Ordonez-Godoy\n\nherself had not demonstrated that she was the target of such violence. ",
"Regardless of\n\nwhether or not we agree with that conclusion, there is substantial evidence to support\n\nit, and reasonable factfinders would not be compelled to disagree with it.",
"\n\nApplication of the deferential standard of review set forth by the Supreme Court and\n\nthis Circuit requires denial of the petition.",
"\n\n Given that Ordonez-Godoy’s asylum petition was properly denied, I address\n\nbriefly her remaining claims. ",
"First, because Ordonez-Godoy failed to establish\n\neligibility for asylum, she necessarily failed to satisfy the higher standard for\n\nwithholding of removal. ",
"Second, we do not have jurisdiction to consider the merits\n\nof Ordonez-Godoy’s CAT claim because Ordonez-Godoy did not appeal the IJ’s\n\nadverse CAT decision to the BIA, and so failed to exhaust her administrative\n\nremedies with respect to that claim.",
"\n\n\n\n\n ~3~\n\fOrdonez-Godoy v. Sessions, No. ",
"17-71840; dissent\n\n\n Finally, Ordonez-Godoy was not denied due process. ",
"First, the transcript of\n\nOrdonez-Godoy’s hearing does not support her assertion that the IJ demonstrated\n\nactual bias or prejudgment. ",
"Second, Ordonez-Godoy’s claim that the IJ denied her\n\ndue process by denying her motion to consolidate was not adequately raised before\n\nthe BIA. ",
"Last, the BIA’s evidentiary rulings did not deny Ordonez-Godoy due\n\nprocess.",
"\n\n The petition for review should be denied.",
"\n\n\n\n\n ~4~\n\f"
] | {
"pile_set_name": "FreeLaw"
} | [
0.0007011005654931068,
0.0007640687981620431,
0.0008347764378413558,
0.0006271958700381219,
0.0007179473177529871,
0.0005570710636675358,
0.0007149779121391475,
0.0005723913782276213,
0.0022228865418583155,
0.0009975661523640156,
0.0007855537114664912,
0.0006408762419596314,
0.000598540180362761,
0.0007159641827456653,
0.0007322715828195214,
0.0007640687981620431,
0.0007726261974312365,
0.0005995967076160014,
0.0007214427459985018,
0.0006520519964396954,
0.0009846893372014165,
0.000550300523173064,
0.0009173654252663255,
0.0007346355123445392,
0.0006615120801143348,
0.0007926380494609475,
0.0006222228403203189,
0.0008304133079946041,
0.0009441516594961286,
0.0006987519445829093,
0.0014692491386085749,
0.0008080517291091383,
0.0007574596675112844,
0.0007308138301596045,
0.0007424622308462858,
0.0009165459778159857,
0.0011812762822955847,
0.0008125717868097126,
0.0022544467356055975,
0.002964890329167247,
0.011861578561365604,
0.0014466865686699748,
0.016775615513324738,
0.0011151741491630673,
0.0018898292910307646,
0.06333905458450317,
0.018847603350877762,
0.017233019694685936,
0.0051453979685902596,
0.0024182505439966917,
0.0009692563908174634,
0.001614331966266036,
0.000668344902805984,
0.0017814950551837683,
0.001185585861094296,
0.0009725008276291192,
0.006867373827844858,
0.0007283943123184144,
0.0014708001399412751,
0.0006225238321349025,
0.0006522543262690306,
0.0006620535277761519,
0.0007673805812373757,
0.0020221888553351164,
0.0008089900366030633,
0.0007847504457458854,
0.009568699635565281,
0.000916880089789629,
0.001102095004171133,
0.0007406449876725674,
0.000605015258770436,
0.0008324434165842831,
0.002047936897724867,
0.0024786617141216993,
0.0007829843088984489,
0.0011242420878261328,
0.0018459397833794355,
0.0007143690017983317,
0.0010794129921123385,
0.015980208292603493,
0.00362789211794734,
0.0008199566509574652,
0.0011323682265356183,
0.0008500657277181745,
0.0007661383133381605,
0.0006304741837084293,
0.0005980420974083245,
0.0007326419581659138,
0.0006874861428514123,
0.0006144698709249496,
0.0008180196746252477,
0.0009840211132541299,
0.0010774964466691017,
0.0014546411111950874,
0.0006737637449987233,
0.0007262383005581796,
0.0008086474845185876,
0.0007298631826415658,
0.00119557767175138,
0.0007225966546684504,
0.0014815672766417265,
0.0006920138839632273,
0.0009948902297765017,
0.0007326646009460092,
0.0009560110047459602,
0.0015235323226079345,
0.0007551825256086886,
0.0005742500652559102,
0.0007254300289787352,
0.0006206683465279639,
0.0006765752914361656,
0.0006604959489777684,
0.000723634788300842,
0.0006834355881437659,
0.0007513908785767853,
0.0007618567324243486,
0.0006509461672976613,
0.0006245224503800273,
0.002130652079358697
] | 0.00231 | 119 |
[
"IN LIFE THERE ARE MANY LOVES, AND IN MINE ONE PASSION: SCULPTURE\n\nAnn Jon is a professional sculptor who has studied, created, exhibited and taught sculpture for more than 40 years, locally, regionally, nationally and internationally, in America and in Europe.",
"\n\nShe grew up in Denmark, and her work is inspired by that country’s medieval architecture, by ancient cultures worldwide, and more recently, by the topography and spirituality of mountains, canyons and deserts.",
"\n\nHer sculptures are informed by studies and intuition. ",
"They range in scale from the intimate to the monumental, and use both traditional and experimental materials and techniques.",
"\n\nSince 1998 she has been the Director of SculptureNow, a non-profit art and educational organization which presents an annual exhibition of large-scale, outdoor sculptures in the Berkshires, and offers sculpture programs for students in the public schools.",
"\n\nShe has curated and organized numerous public art exhibitions and is committed to promoting sculpture in the public arena and to giving young people the opportunity to create their own three-dimensional art.",
"\n\nHer current studio and home is in one of the Berkshire Hilltowns.",
"\n\nWhen she is not in her studio, office, or out teaching in a school, she cross-country skis, hikes, and kayaks."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0006213625892996788,
0.0006217343616299331,
0.0005486873560585082,
0.0006067212671041489,
0.0006664723041467369,
0.0006416070973500609,
0.0007450592238456011,
0.001263739774003625
] | 0.000714 | 8 |
[
"Sieh sofort die neuesten unterhaltungen\n\nInformation\n\nSieh sofort die neuesten unterhaltungen zu jedem thema. ",
"Dmc plumbing & tutaj bukmacher heating holds current mn licenses for plumbing & pipefitting, including high-pressure steam/condensate and medical gas applications our contracting history includes design-build construction, traditional plan & spec projects, cost plus fee applications, and we are an experienced best value contractor. ",
"Very professional, courteous & time efficient. ",
"Electric boillers are very simple and work in the same way as a kettle, heating water that passes over an element they can come in a variety of different types and there are options that are identical in shape and size to a gas or oil boiler with few moving parts they are exceptionally quiet and low-maintenance. ",
"You are implying that we mugged him off and that is not true,\" he said \"we are an emergency plumber, and we charge emergency rates we are expensive, but we did agree the charge with him before we did the work he could have got someone else to do the job but chose not to.\". ",
"Government and industry are working together on a robot-like autopilot system that could eliminate the need for a second human pilot in the cockpit. ",
"We ensure that our products are installed correctly every time - guaranteed! ",
"From our experience, a large percentage of pipe blockages are simply hair or toilet paper or other blockages that have not damaged the drainage system and the $99 offer is great value in those circumstances. ",
"A combi boiler as described above is a combination boiler which essentially means it combines two typically separate household functions (water heating and central heating) into one highly efficient unit the resultant system means that the need for a hot water tank is gone since the water flowing through the system is heated at source when the hot water tap is turned on, hence the name “combi”. ",
"If your pressure gauge has dropped to 0-bar, that doesn’t necessarily mean it’s faulty; that’s just as good an indication of a leak, as a faulty pressure gauge. ",
"If you are concerned that an appliance is not operating safely, or your appliances are not in good working order, have a safety inspection carried out by a registered gas installer. ",
"Ballycullen road,firhouse,dublin 24. ",
"A combi (or combination) boiler is an ingenious space-saving idea, and an increasingly popular choice in uk homes in fact, combis now account for well over half of all the new domestic boilers installed in britain every year. ",
"If you are in need of a boiler service, then don’t hesitate to get in contact with a member of our team at egp plumbers on 0116 264 5115 or you can use our contact form and a member of our team with get in contact with you promptl. ",
"Wood cottages, codsall wood. ",
"Every month, one lucky winner will be selected at random to receive a £100 voucher. ",
"Had never used them and found them today on yelp they deserve their 5 star rating! ",
"they came same day and knocked out a kitchen sink leak by quickly replacing a cracked pvc part charlie was super nice and polite.... You may be looking for advice, or just researching your options? ",
"let us help, we can guide you through the process with our expert knowledge what’s more, all of our help and advice is free! ",
"call us today and book your home visit. ",
"Our friendly, knowledgeable staff can help find the parts you’ll need to complete virtually any size plumbing or heating job. ",
"If this is your first repair, your boiler may not need replacing just yet compare the cost of the repair to the cost of replacing a repair averages between. ",
"If you're based in england or wales, please contact the energy saving advice service 9esas) on 0300 123 1234 advisors are available from monday to friday, between 9am to 8pm (calls cost no more than a national rate call). ",
"Some boiler comfort features include. ",
"You'll get a landlord gas safety certificate for all your landlord owned gas appliances we cover repairs to your boiler and controls, including thermostat and programmer with parts, and unlimited callouts if you choose our landlord heating cover, we'll also cover repairs to your radiators and pipework, hot water cylinder and full central heating system. ",
"Ap provides around-the-clock plumbing services when you need us we’ll be there with a fully stocked truck 24 hours a day, 365 days a year! ",
"Atmospheric, open-combustion furnaces and boilers, as well as fan-assisted furnaces and boilers, should be vented into masonry chimneys, metal double-wall chimneys, or another type of manufactured chimney masonry chimneys should have a fireclay, masonry liner or a retrofitted metal flue liner. ",
"Providing total customer service and total peace of mind is our promise and that's what we deliver with emergency response service, any time of the night or day, whatever the weather. ",
"Please enter your cintas order number and the zip code of the ship-to address on your order. ",
"Plumbers, gasfitters and drainlayers. ",
"Bob the plumber charges by the job, not the hour, which saves you money know the price before we do the work! ",
"In the case of property owned by the council, contact housing services, using the details below, to report the problem. ",
"What is the 'sim swap' scam and how to protect yourself. ",
"The survey itself covers a number of areas of the property’s drainage it is not just about looking at the drains themselves in terms of any damage all of the information in the home buyer drain survey can then be used during the purchase process for many people it can have an affect on offer figures but for others it is just useful to make plans on what work needs to be done post purchase. ",
"Advanced got my heating working quickly and gave me an estimate for a new system. ",
"Tree roots damaging drains in mk40. ",
"To check out, your trolley needs to be £40 for delivery. ",
"Social investment manager tim craven. ",
"We are dublin's largest independent boiler repair specialists we have gained an outstanding reputation within the boiler and central heating industry we have been trading in excess of 40 years this means we have the experience and knowledge to have your heating system up and running again in no time there have thousands of types makes and models of boilers manufactured within the last four decades, so experience is vital you can rest assured that our specialist technicians can solve your problem we have some senior technicians with over 35 years experience specializing solely with boilers this means you are in safe hands. ",
"Find out about the which? ",
"car survey. ",
"Dhs also work in partnership with. ",
"This can prove problematic in smaller homes, most of which should almost certainly opt for the combi option larger homes, though, will benefit from the ability to provide oodles of hot water to several sources at once. ",
"The best case scenario is we find a bunch of nappies, sanitary pads or other waste that we can flush away to fix the problem worst case, there’s a cracked pipe that’s allowing soil to enter and water to escape. ",
"For all the latest deals, guides and loopholes - join the 10m who get it. ",
"Joule cyclone electric boiler system fit combines all the advantages of electric wet space heating with the cyclone pre plumbed cylinder available in sizes 6kw – 12kw on the boiler side with a 200l un-vented cyclone cylinder other models are available talk to the office today to find out more. ",
"Call now for a fast response, and check out our plumbing. ",
"It is important for your boiler’s health to make sure that you utilise baxi-certified and gas safe engineers to carry out any installations and repairs on your home’s unit it may appear that there are savings to be made using unofficial third-party engineers and installers however, this opens up your appliance to problems along the line and will break your warranty. ",
"Phone: 01425 653889 | 07770770080. ",
"We understand that replacing your boiler can feel like an big expense or investment that you can probably do without. ",
"Buying a new gas boiler is not something people tend to do everyday, so it is easy to see why some people can find the process of browsing the boilers available a little bit confusing below we have tried to make it a bit easier for you buy outlining the differences between the different gas boiler types available. ",
"Brand new heatrea sadia electric boiler 9kw for sale pls contact on 07427128355 sell price £1499.00. ",
"We have great offers in your area not your location? ",
"We have been in the plumbing business for over thirty years we are a family owned. ",
"Wall mounted gas fired combi boiler with large lcd display. ",
"California boiler maintains a fleet of self-contained, skid-mounted boilers and boiler support equipment available for rent. ",
"If you're interested in real technical nitty gritty, why not take a look at a few of the many patents covering how kettle-like appliances work? ",
"here are four i've picked out, but you'll find lots more in the records. ",
"Make plumbing solutions your 24-hour emergency plumbing service company call now for your low-cost estimate! ",
"Proudly serving toronto, mississauga, oakville, thornhill, richmond hill, aurora, newmarket, pickering, ajax, whitby & oshawa. ",
"A combi – or combination – boiler is a single, compact unit that functions as both a water heater and a central heating boiler this space saver heats water immediately, rather than heating and storing, which removes the need for a bulky hot water storage cylinder or cold water storage tank, as found with old boiler systems. ",
"Baxi back boilers are fitted behind the fireplace and small, compact units that are capable of heating enough boiling hot water for both central heating system and heated water purposes if installed along with an indirect hot water cylinder the baxi back boiler must be installed by a gas safe registered engineer. ",
"A system boiler ensures a supply of hot water is pumped efficiently to radiators around the home and to a hot water cylinder to supply baths, showers and hot taps."
] | {
"pile_set_name": "Pile-CC"
} | [
0.05107773095369339,
0.0005506037850864232,
0.0005997887928970158,
0.0007601446122862399,
0.00864165648818016,
0.000616519246250391,
0.0007557270582765341,
0.001989880111068487,
0.0006720603560097516,
0.0011033823247998953,
0.0007698081317357719,
0.0010000559268519282,
0.0006369295297190547,
0.000772329920437187,
0.0007711388752795756,
0.0006488198414444923,
0.0029465549159795046,
0.0009451578953303397,
0.000555628736037761,
0.0019584721885621548,
0.000536118692252785,
0.0007970933220349252,
0.0006100981263443828,
0.000567262468393892,
0.000679764780215919,
0.0007517400081269443,
0.000660994031932205,
0.0005940356058999896,
0.0005705718649551272,
0.023868408054113388,
0.0024605668149888515,
0.0006035221158526838,
0.04472200199961662,
0.0005329090054146945,
0.0006025527836754918,
0.0006582894711755216,
0.0006026682094670832,
0.000677499221637845,
0.0005724431830458343,
0.0009056941489689052,
0.0006932267569936812,
0.0007394569693133235,
0.000613508396781981,
0.006682483945041895,
0.0008398843347094953,
0.0005955685628578067,
0.000708147301338613,
0.000863412395119667,
0.0009888116037473083,
0.0018129055388271809,
0.0006006468320265412,
0.0007487389375455678,
0.0006173303700052202,
0.0006312714540399611,
0.0015596315497532487,
0.000677799223922193,
0.0006106953369453549,
0.000583878078032285,
0.0007702986476942897,
0.0006780689582228661,
0.0007980912341736257,
0.0006186577375046909,
0.000760486931540072
] | 0.00292 | 63 |
[
"\n99 Ariz. 342 (1965)\n409 P.2d 45\nIn the Matter of a Member of the State Bar of Arizona, William ROGERS, Jr., Respondent.",
"\nNo. ",
"8689.",
"\nSupreme Court of Arizona, En Banc.",
"\nDecember 16, 1965.",
"\nRex H. Moore, Phoenix, for State Bar of Arizona.",
"\nMcFARLAND, Justice.",
"\nThis is a disbarment proceeding. ",
"A complaint against William Rogers, Jr., of San Francisco, California, accusing him of unprofessional conduct as a member of the Bar of this state was filed with the local administrative committee, for District No. ",
"4-B of the State Bar.",
"\nThis complaint was heard by the administrative committee. ",
"Respondent was duly served personally and by publication with an Order to Show Cause. ",
"The order of the local administrative board found \"that Respondent has not answered, appeared or otherwise responded to said Order to Show Cause save and except by letter\" directed to the local committee in which respondent, in response to the Order to Show Cause, admitted the truth of the charges, but not the implications set forth, and stated he *343 would make restitution.[1] However, the committee received no further communication or proof of restitution. ",
"Respondent was not represented by counsel at this hearing. ",
"The proceedings were reported by a reporter, and a transcript of his notes is a part of the files. ",
"A majority of the committee found respondent guilty of the charges as set forth in the Order to Show Cause, to-wit:\n\"That on or about July 28, 1959, you, while acting as attorney for Mildred Shelton, Guardian of the estate of Kathleen Shelton, a minor, collected $2,500.00 in satisfaction of a judgment in Cause No. ",
"99033 in the Superior Court of Maricopa County, Arizona, rendered in favor of the aforesaid minor for damages for personal injuries sustained by said minor; and filed a satisfaction of said judgment, but that you thereafter failed, neglected and refused to account to said guardian or said minor for said sum or any part thereof; and\n\"That on or about July 28, 1959, you, while acting as attorney for Mildred Shelton, Guardian of the estate of Danny Shelton, a minor, collected $250.00 in satisfaction of a judgment in Cause No. ",
"99033 in the Superior Court of Maricopa County, Arizona, rendered in *344 favor of the aforesaid minor for damages for personal injuries sustained by said minor and filed a satisfaction of said judgment; but that you thereafter failed, neglected and refused to account to said guardian or said minor for said sum or any part thereof.\"",
"\nA complete record of these proceedings, together with the committee's recommendation, was lodged with the Board of Governors of the State Bar, as required by Rule 35 of the Rules of the Supreme Court, 17 A.R.S., and the Board of Governors, without taking additional evidence and following respondent's failure to reply to the charges or appear before the Board of Governors, either in person or by attorney, after having been notified of the hearing[2], sent the complete record to this court with a recommendation of disbarment.",
"\nThe Board of Governors of the Bar filed its recommendations with this court on October 8, 1965. ",
"Respondent was sent notice of the recommendation, but has not requested to be allowed to file briefs or make oral argument. ",
"Rule 37 of the Rules of the Supreme Court states:\n\"Rule 37. ",
"Proceedings Before Court; Brief and Oral Argument; Decision\n\"If the respondent desires to file briefs and make oral arguments on the record as to why the recommendations of the board should not be adopted, he shall file with the clerk of this court his request therefor within twenty days after the mailing of such notice. ",
"Following the filing of such request, this court shall fix a time for the filing of briefs by respondent and the examiner and for argument. ",
"Following the date fixed for such argument, or twenty days after the mailing of such notice if no request has been filed by respondent, this court shall consider the recommendations and the record and render its decision.\"",
"\nIn the case of In re Peterson, 96 Ariz. 47, 391 P.2d 599, we held:\n\"The conduct of respondent here is unconscionable, as we said in [Re] Graham, 58 Ariz. 192, 202, 203, 118 P.2d 1093, 1097:\n\"`To refuse to return the $330.65 to the admitted owner but instead appropriate it to one's own use does, as the administrative committee found, constitute professional misconduct and calls for disbarment of the person guilty thereof.'\" ",
"96 Ariz. at 49, 391 P.2d at 600.",
"\nWe hold, from the record and the evidence in the instant case, as was found by *345 the administrative committee, that the acts of the respondent constituted professional misconduct and call for his disbarment.",
"\nRespondent is hereby disbarred.",
"\nLOCKWOOD, C.J., STRUCKMEYER, V.C.J., and BERNSTEIN and UDALL, JJ., ",
"concur.",
"\nNOTES\n[1] San Francisco, California\n June 10, 1965\n Local Administrative Committee\n State Bar of Arizona\n Title and Trust Bldg.,",
"\n Phoenix, Arizona\n\nGentlemen:\nI want to apologize, first of all, for not having written this letter sooner and perhaps thereby have avoided unnecessary efforts on the part of members of the committee and the bar who are charged with the task of investigating Mrs. DeSoto's (Mildred Shelton) complaint. ",
"However, the delay was not intentional. ",
"I have been diligently attempting to discover the facts so that I could advise you of them.",
"\nFirst of all, the charges set forth in the order to show cause are true. ",
"I have no defense to any matter set forth therein and my appearance would therefore be futile.",
"\nIn admitting these charges, however, I do not admit any implications that are not set forth therein. ",
"This matter together with the funds was entrusted to another party when I left Phoenix and I am now unable to determine what transpired after I left. ",
"I realize that this does not relieve me of the duty to account for the funds, and I am presently in the process of obtaining the money to reimburse the estate of the Shelton children. ",
"A delay in the arrangements has been partly responsible for my delay in writing this letter. ",
"I wanted to be able to offer the definite assurance of when the funds would be forthcoming before writing, but since the time is growing short I do not want to cause any more inconvenience to the committee.",
"\nIn making these admissions I do want to state that my guilt lies in misplacing my trust and in being too gullible. ",
"I realize that these actions can be as detrimental to a client's welfare as an intentional defalcation, however, and I will accordingly submit this letter for the committee's determination. ",
"As soon as final arrangements have been completed so that I may make restitution I will advise the committee and I will abide by any instructions of the committee in that regard.",
"\n Very sincerely yours,\n /s/ William Rogers Jr.\n\n[2] Respondent was sent by registered mail, return receipt requested, a copy of the recommendations of the committee. ",
"The Postmaster of the City of San Francisco, California, returned the letter to the State Bar on July 27, 1965, as unclaimed.",
"\n"
] | {
"pile_set_name": "FreeLaw"
} | [
0.000679494405630976,
0.0013785817427560687,
0.0010809205705299973,
0.0006788198952563107,
0.0007854525465518236,
0.0006836450193077326,
0.0010173198534175754,
0.001576028997078538,
0.0008119154954329133,
0.0008142173173837364,
0.0006467378116212785,
0.0006730166496708989,
0.0006721670506522059,
0.0006520915194414556,
0.0005846485146321356,
0.0007137790089473128,
0.0010272464714944363,
0.0012681627413257957,
0.0006234599277377129,
0.0006136323790997267,
0.0005952944047749043,
0.0007177954539656639,
0.0005768549744971097,
0.0005697596352547407,
0.0005506619927473366,
0.0007366384379565716,
0.0007639173418283463,
0.0007599160890094936,
0.0010144109837710857,
0.0007525786641053855,
0.0006776442169211805,
0.000656209303997457,
0.0005628287326544523,
0.0007036400493234396,
0.000540230656042695,
0.0007143057300709188,
0.0022857622243463993,
0.0006483278120867908,
0.0005482100532390177,
0.0006227443227544427,
0.0005577003466896713,
0.0006713328184559941,
0.009317104704678059,
0.0005396673223003745,
0.0005636957357637584,
0.0005524757434614003,
0.0005660699098370969,
0.001995444530621171
] | 0.000974 | 48 |
[
"Pyrgulina pretiosa\n\nPyrgulina pretiosa is a species of sea snail, a marine gastropod mollusk in the family Pyramidellidae, the pyrams and their allies.",
"\n\nReferences\n\n Higo, S. & Goto, Y. (1993) A Systematic List of Molluscan Shells from the Japanese Is. ",
"and the Adjacent Area. ",
"Elle Scientific Publications, Yao, Japan, xxii + 693 + 13 + 149 pp.",
"\n\nExternal links\n To World Register of Marine Species\n\nCategory:Pyramidellidae\nCategory:Gastropods described in 1932"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.001851157983765006,
0.0005915375659242272,
0.000647789565846324,
0.0006440630531869829,
0.0006059168954379857
] | 0.000868 | 5 |
[
"Q:\n\nPHP Passing variables to a function and losing values\n\nI am passing some variables to a function to round and add a dollars sign but when the values get into the function they have lost their values.",
"\nformatDollars($cost, $taxedCost, $shipping, $total)\n\nfunction formatDollars($cost, $taxedCost, $shipping, $total) {\n $taxedCost = '$'.round($taxedCost, 2);\n $shipping = '$'.round($shipping, 2);\n $total = '$'.round($total, 2);\n $cost = '$'.round($cost, 2);\n return array($cost, $taxedCost, $shipping, $total);\n}\n\nlist($cost, $taxedCost, $shipping, $total) = formatDollars();\n\nWhen I output I get the dollar signs but all my numbers have become zero.",
"\n\nA:\n\nI ended up finding the answer to my own quesion\nIn the line that I send variables to the function it did not like not having a variable to equal to, so when I ended up saying my variables equalled sending to the function.",
"\nfunction formatDollars($numberFormatted)\n {\n $numberFormat = '$'.round($numberFormatted, 2);\n return $numberFormat;\n }\n $cost = formatDollars($cost);\n $taxedCost = formatDollars($taxedCost);\n $shipping = formatDollars($shipping);\n $total = formatDollars($total);\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0012594452127814293,
0.0009775902144610882,
0.0006856948602944613,
0.0009687772835604846
] | 0.000973 | 4 |
[
"#include <stdio.h>\n#include <assert.h>\n#include <string.h>\n\ntypedef struct tree23 tree23_t;\ntypedef struct tree23_leaf tree23_leaf_t;\n\nstruct tree23 {\n int extra[0];\n int x1, x2;\n tree23_t *left, *middle, *right;\n};\n\nstruct tree23_leaf {\n int extra[0];\n int x1, x2;\n};\n\ntypedef struct tree23_root tree23_root_t;\n\nstruct tree23_root {\n tree23_t *root;\n char depth;\n char extra_words;\n char reserved[2];\n};\n\nchar heap[10000000], *heap_a = heap;\n\nint lp = 0, np = 0, ld = 0, nd = 0;\n\nvoid *zmalloc (int size) {\n void *p = heap_a;\n heap_a += size;\n return p;\n}\n\nvoid zfree (void *data, int size) {\n}\n\nstatic void *tree23_lookup (tree23_root_t *R, int x) {\n tree23_t *T = R->root;\n int i;\n if (!",
"T) {\n return 0;\n }\n for (i = R->depth; i > 0; i--) {\n if (x < T->x1) {\n T = T->left;\n } else if (x == T->x1) {\n return T->extra;\n } else if (x > T->x2) {\n T = T->right;\n } else if (x == T->x2) {\n return T->extra + R->extra_words;\n } else {\n T = T->middle;\n }\n if (!",
"T) {\n return 0;\n }\n }\n\n if (T->x1 == x) {\n return ((tree23_leaf_t *) T)->extra;\n } else if (T->x2 == x) {\n return ((tree23_leaf_t *) T)->extra + R->extra_words;\n }\n\n return 0;\n}\n\nstatic tree23_t *new_leaf (int x, int extra) {\n tree23_t *L = (tree23_t *) (zmalloc (sizeof (tree23_leaf_t) + 8*extra) + 8*extra);\n L->x1 = L->x2 = x;\n lp++;\n return L;\n}\n\n\nstatic tree23_t *new_node2 (int x, tree23_t *l, tree23_t *r, int extra) {\n //printf (\"new_node: np = %d\\n\", np);\n tree23_t *N = (tree23_t *) (zmalloc (sizeof (tree23_t) + 8*extra) + 8*extra);\n N->x1 = x;\n N->x2 = x;\n N->left = l;\n N->right = r;\n np++;\n //printf (\"new_node exit: np = %d\\n\", np);\n return N;\n}\n\n\nstatic void free_leaf (tree23_t *pp, int extra) {\n //printf (\"delete leaf\\n\");\n pp->x1 = pp->x2 = 0;\n ++ld;\n zfree ((char *) pp - 8*extra, sizeof (tree23_leaf_t) + 8*extra);\n}\n\n\nstatic void free_node (tree23_t *pp, int extra) {\n //printf (\"delete node\\n\");\n pp->left = pp->middle = pp->right = 0;\n pp->x1 = pp->x2 = 0;\n ++nd;\n zfree ((char *) pp - 8*extra, sizeof (tree23_t) + 8*extra);\n}\n\nstatic void dump_rec (tree23_t *T, int depth, int extra) {\n int i;\n if (!",
"T) return;\n printf (\"[ \");\n if (depth--) {\n dump_rec (T->left, depth, extra);\n printf (\"%d\", T->x1);\n for (i = -extra; i < 0; i++) {\n printf (\":%d\", T->extra[i]);\n }\n putchar (' ');\n if (T->x2 > T->x1) {\n dump_rec (T->middle, depth, extra);\n printf (\"%d\", T->x2);\n for (i = -2*extra; i < -extra; i++) {\n printf (\":%d\", T->extra[i]);\n }\n putchar (' ');\n }\n dump_rec (T->right, depth, extra);\n } else {\n printf (\"%d\", T->x1);\n for (i = -extra; i < 0; i++) {\n printf (\":%d\", ((tree23_leaf_t *) T)->extra[i]);\n }\n putchar (' ');\n if (T->x2 > T->x1) {\n printf (\"%d\", T->x2);\n for (i = -2*extra; i < -extra; i++) {\n printf (\":%d\", ((tree23_leaf_t *) T)->extra[i]);\n }\n putchar (' ');\n }\n }\n printf (\"] \");\n}\n\nstatic void dump (tree23_root_t *R) {\n dump_rec (R->root, R->depth, R->extra_words);\n}\n\n//x1 has least bit set if it's leaf\n//x2 has least bit set if it's equal to x1 (fake node)\n\n// does not check whether the element is already there\nstatic void tree23_insert (tree23_root_t *R, int x, int *Data) {\n tree23_t *st[40];\n int x_Data[8];\n tree23_t *cur, *s, *l;\n int sp, extra_words = R->extra_words;\n\n#define Extra_words\textra_words\n#define x1_Data\t\textra-Extra_words\n#define x2_Data\t\textra-Extra_words*2\n#define DATA(__x)\t(__x##_Data)\n#define\tCPY(__x,__y)\t{if(Extra_words>0) {memcpy(__x,__y,Extra_words*4);}}\n#define DCPY(__x,__y)\tCPY(DATA(__x),DATA(__y))\n#define\tLET(__x,__y)\t{__x = __y; DCPY(__x,__y);}\n#define IS_2N(__t)\t((__t)->x1 == (__t)->x2)\n#define IS_3N(__t)\t(!",
"IS_2N(__t))\n#define LEAF(__t)\t((tree23_leaf_t *)(__t))\n\n //empty tree case\n if (!",
"R->root) {\n R->root = new_leaf (x, extra_words);\n CPY(DATA(R->root->x1), Data);\n R->depth = 0;\n return;\n }\n\n sp = 0;\n cur = R->root;\n while (sp < R->depth) {\n st[sp++] = cur;\n if (x < cur->x1) {\n cur = cur->left;\n } else if (x > cur->x2) {\n cur = cur->right;\n } else {\n cur = cur->middle;\n }\n }\n \n //leaf split\n if (IS_3N(cur)) {\n //case 1. ",
"two-element leaf: have cur:[ B D ]\n if (x < cur->x1) {\n // cur:[ B D ] + x:A --> [ A B D ] --> (new)s:[ A ] new_x:B (cur)l:[ D ]\n s = new_leaf (x, Extra_words);\n CPY (DATA(s->x1), Data)\n LET (x, cur->x1);\n LET (cur->x1, cur->x2);\n l = cur;\n } else if (x > cur->x2) {\n // cur:[ B D ] + x:E --> [ A D E ] --> (cur)s:[ B ] new_x:D (new)l:[ E ]\n l = new_leaf (x, Extra_words);\n CPY (DATA(l->x1), Data)\n LET (x, cur->x2)\n cur->x2 = cur->x1;\n s = cur;\n } else {\n // cur:[ B D ] + x:C --> [ A C E ] --> (cur)s:[ B ] new_x:C (new)l:[ D ]\n l = new_leaf (cur->x2, Extra_words);\n CPY (DATA(l->x1), DATA(cur->x2))\n CPY (DATA(x), Data);\n cur->x2 = cur->x1;\n s = cur;\n }\n } else {\n //case 2. ",
"single-element leaf: have cur:[ B ]\n if (x < cur->x1) {\n // cur:[ B ] + x:A --> cur:[ A B ]\n LET (cur->x2, cur->x1);\n cur->x1 = x;\n CPY (DATA(cur->x1), Data);\n } else {\n // cur:[ B ] + x:C --> cur:[ B C ]\n cur->x2 = x;\n CPY (DATA(cur->x2), Data);\n }\n return;\n }\n\n while (sp) {\n cur = st[--sp];\n // here cur is a parent node cur: [ ... old_cur:[.E.G.] ... ]\n // we are replacing its subtree [.E.G.] with two: s:[.E.] x:F l:[.G.]\n if (IS_3N(cur)) {\n //case 1. ",
"two-element internal node\n // cur: [ (left) x1 (middle) x2 (right) ]\n if (x < cur->x1) {\n // s l middle right\n // cur: [ old_cur:[.E.G.] x1:H [.I.] x2:J [.K.] ]\n // --> [ s:[.E.] x:F l:[.G.] x1:H [.I.] J [.K.] ]\n // --> (new)new_s:[ s:[.E.] x:F l:[.G.] ] new_x:H (cur)new_l:[ [.I.] J [.K.] ]\n s = new_node2 (x, s, l, Extra_words);\n DCPY(s->x1, x);\n LET (x, cur->x1);\n LET (cur->x1, cur->x2);\n cur->left = cur->middle;\n l = cur;\n } else\n if (x > cur->x2) {\n // left middle s l\n // cur: [ [.A.] B [.C.] D old_cur:[.E.G.] ]\n // --> [ [.A.] x1:B [.C.] x2:D s:[.E.] x:F l:[.G.] ]\n // --> (cur)new_s:[ [.A.] x1:B [.C.] ] new_x:D (new)new_l:[ s:[.E.] x:F l:[.G.] ]\n l = new_node2 (x, s, l, Extra_words);\n DCPY(l->x1, x);\n LET (x, cur->x2);\n cur->right = cur->middle;\n cur->x2 = cur->x1;\n s = cur;\n } else {\n //left s l right\n // cur: [ [.C.] x1:D old_cur:[.E.G.] x2:H [.I.] ]\n // --> [ [.C.] x1:D s:[.E.] x:F l:[.G.] x2:H [.I.] ]\n // --> (cur)new_s:[ [.C.] x1:D s:[.E.] ] new_x:F (new)new_l:[l:[.G.] x2:H [.I.] ]\n l = new_node2 (cur->x2, l, cur->right, Extra_words);\n DCPY(l->x1, cur->x2);\n cur->right = s;\n cur->x2 = cur->x1;\n s = cur;\n }\n } else {\n //case 2. ",
"single-element internal node\n // cur: [ (left) x1=x2 (right) ]\n if (x < cur->x1) {\n // s l right\n // cur: [ old_cur:[.E.G.] x1:H [.I.] ]\n // --> [ s:[.E.] x:F l:[.G.] x1:H [.I.] ]\n cur->left = s;\n cur->middle = l;\n cur->x1 = x;\n DCPY(cur->x2, cur->x1);\n DCPY(cur->x1, x);\n } else {\n //left s l \n // cur: [ [.C.] x1:D old_cur:[.E.G.] ]\n // --> [ [.C.] x1:D s:[.E.] x:F l:[.G.] ]\n cur->middle = s;\n cur->right = l;\n LET(cur->x2, x);\n }\n return;\n }\n\n }\n\n //root split\n // here s:[.E.] x:F l:[.G.] comes to the top\n // create new root [ [.E.] F [.G.] ]\n R->root = new_node2 (x, s, l, Extra_words);\n R->depth++;\n CPY (DATA(R->root->x1), Data);\n}\n\n\n// does not check that the element is already there\nstatic int tree23_delete (tree23_root_t *R, int x) {\n int *P = 0, *PP = 0;\n tree23_t *st[40];\n int sp, *y_Data = 0;\n tree23_t *cur = R->root, *up, *succ;\n int extra_words = R->extra_words;\n\n for (sp = 0; sp < R->depth; sp++) {\n st[sp] = cur;\n if (x > cur->x2) {\n cur = cur->right;\n } else if (x < cur->x1) {\n cur = cur->left;\n } else if (x == cur->x1) {\n P = &cur->x1;\n y_Data = DATA(cur->x1);\n if (cur->x2 == cur->x1) {\n PP = &cur->x2;\n }\n x++;\n break;\n } else if (x < cur->x2) {\n cur = cur->middle;\n } else {\n P = &cur->x2;\n y_Data = DATA(cur->x2);\n x++;\n break;\n }\n }\n\n // if x belongs to an inner node:\n // - P points to the key equal to (original) x in node cur\n // - PP points to cur->x2 if cur->x2 = cur->x1 = (original) x\n // - x equals original x+1 for some reason\n // if x is in a leaf, cur is this leaf, and P=PP=0\n\n while (sp < R->depth) {\n st[sp++] = cur;\n if (x < cur->x1) {\n cur = cur->left; // actually will go left at all steps except the first one\n } else if (x > cur->x2) {\n cur = cur->right;\n } else {\n cur = cur->middle;\n }\n }\n\n // now cur is the leaf containing next value after (original) x, if x was in a inner node\n // otherwise, cur is the leaf containing x\n\n if (P) {\n // case 1: x was found in some inner node, ancestor of leaf cur\n // then x':=cur->x1 is the next value in tree after x\n // and we replace references to x with references to x'\n *P = cur->x1;\n if (PP) {\n *PP = cur->x1;\n }\n DCPY (y, cur->x1); // copy extra data words as well\n // after that, we just need to remove x' from leaf node cur\n if (cur->x1 < cur->x2) {\n // case 1a: cur: [ x' y ] , replace with [ y ]\n LET (cur->x1, cur->x2);\n return 1;\n }\n } else if (x == cur->x1) {\n if (x < cur->x2) {\n // case 0a: x was found in leaf cur: [ x y ], x < y\n // replace with [ y ]\n LET (cur->x1, cur->x2);\n return 1;\n }\n } else if (x == cur->x2) {\n // case 0b: x was found in leaf cur: [ u x ], u < x\n // simply replace it with [ u ]\n cur->x2 = cur->x1;\n return 1;\n } else {\n // x NOT FOUND in tree (?)",
"\n return 0;\n }\n\n // here we have to remove x' from leaf node cur: [ x' ]\n\n //oh, no...\n //printf (\"%d\\n\", sp);\n if (sp == 0) {\n // we are deleting the root!",
"\n free_leaf (cur, Extra_words);\n R->root = 0;\n return 1;\n }\n\n up = st[--sp];\n // up is the parent of leaf cur: [ x' ] ( we are deleting x': \"cur --> []\")\n if (up->right == cur) {\n if (IS_2N(up)) {\n // up: [ (left) x1 cur:[ x' ] ]\n if (IS_2N(up->left)) {\n // up: [ [ u ] x1 cur:[ x' ] ]\n // --> [ [ u ] x1 [] ]\n // --> [ succ:[ u x1 ] ]\n LET (up->left->x2, up->x1);\n free_leaf (cur, Extra_words);\n succ = up->left;\n //continue to the top\n } else {\n // up: [ [ u v ] x1 cur:[ x' ] ]\n // --> [ [ u v ] x1 [] ]\n // --> [ [ u ] v [ x1 ] ]\n cur->x1 = cur->x2 = up->x1;\n DCPY (cur->x1, up->x1);\n LET (up->x1, up->left->x2);\n up->left->x2 = up->left->x1;\n up->x2 = up->x1;\n return 1;\n }\n } else {\n // up: [ (left) x1 (middle) x2 cur:[ x' ] ]\n if (IS_2N(up->middle)) {\n // ! ",
"ELIMINATED CASE: if (up->left->x2 == up->left->x1) \n // up: [ (left) x1 [ u ] x2 cur:[ x' ] ]\n // --> [ (left) x1 [ u ] x2 [] ]\n // --> [ (left) x1 [ u x2 ] ]\n LET (up->middle->x2, up->x2);\n up->x2 = up->x1;\n up->right = up->middle;\n free_leaf (cur, Extra_words);\n return 1;\n } else {\n // up: [ (left) x1 [ u v ] x2 cur:[ x' ] ]\n // --> [ (left) x1 [ u v ] x2 [] ]\n // --> [ (left) x1 [ u ] v [ x2 ] ]\n LET (cur->x1, up->x2);\n cur->x2 = cur->x1;\n LET (up->x2, up->middle->x2);\n up->middle->x2 = up->middle->x1;\n return 1;\n }\n }\n } else if (up->left == cur) {\n if (IS_2N(up)) {\n // up: [ cur:[ x' ] x1 (right) ]\n if (IS_2N(up->right)) {\n // up: [ cur:[ x' ] x1 succ:[ y ] ]\n // --> [ ? ? ",
"succ: [ x1 y ] ]\n DCPY (up->right->x2, up->right->x1)\n LET (up->right->x1, up->x1);\n free_leaf (cur, Extra_words);\n succ = up->right;\n //continue to the top\n } else {\n // up: [ cur:[ x' ] x1 [ y z ] ]\n // --> [ [] x1 [ y z ] ]\n // --> [ [ x1 ] y [ z ] ]\n LET (cur->x1, up->x1);\n cur->x2 = cur->x1;\n LET (up->x1, up->right->x1);\n up->x2 = up->x1;\n LET (up->right->x1, up->right->x2);\n return 1;\n }\n } else {\n // up: [ cur:[ x' ] x1 (middle) x2 (right) ]\n if (IS_2N(up->middle)) {\n // ! ",
"ELIMINATED CASE: if (up->right->x2 & 1) {\n // up: [ cur:[ x' ] x1 [ y ] x2 (right) ]\n // --> [ [] x1 [ y ] x2 (right) ]\n // --> [ [ x1 y ] x2 (right) ]\n DCPY (up->middle->x2, up->middle->x1);\n LET (up->middle->x1, up->x1);\n up->left = up->middle;\n LET (up->x1, up->x2);\n free_leaf (cur, Extra_words);\n return 1;\n } else {\n // up: [ cur:[ x' ] x1 [ y z ] x2 (right) ]\n // --> [ [] x1 [ y z ] x2 (right) ]\n // --> [ [ x1 ] y [ z ] x2 (right) ]\n LET (cur->x1, up->x1);\n cur->x2 = cur->x1;\n LET (up->x1, up->middle->x1);\n LET (up->middle->x1, up->middle->x2);\n return 1;\n }\n }\n } else { \n // here cur == up->middle\n // up: [ (left) x1 cur:[ x' ] x2 (right) ]\n if (IS_2N(up->left)) {\n // up: [ [ v ] x1 cur:[ x' ] x2 (right) ]\n if (IS_2N(up->right)) {\n // up: [ [ v ] x1 cur:[ x' ] x2 [ y ] ]\n // --> [ [ v ] x1 [] x2 [ y ] ]\n // --> [ [ v ] x1 [ x2 y ] ]\n DCPY (up->right->x2, up->right->x1);\n LET (up->right->x1, up->x2);\n up->x2 = up->x1;\n free_leaf (cur, Extra_words);\n return 1;\n } else {\n // up: [ [ v ] x1 cur:[ x' ] x2 [ y z ] ]\n // --> [ [ v ] x1 [] x2 [ y z ] ]\n // --> [ [ v x1 ] x2 [ y z ] ]\n // ! ",
"WAS: --> [ [ v ] x1 [ x2 ] y [ z ] ]\n LET (up->left->x2, up->x1);\n LET (up->x1, up->x2);\n free_leaf (cur, Extra_words);\n return 1;\n }\n } else {\n // up: [ [ u v ] x1 cur:[ x' ] x2 (right) ]\n // --> [ [ u v ] x1 [] x2 (right) ]\n // up: [ [ u ] v cur:[ x1 ] x2 (right) ]\n LET (cur->x1, up->x1);\n cur->x2 = cur->x1;\n LET (up->x1, up->left->x2);\n up->left->x2 = up->left->x1;\n return 1;\n }\n }\n\n // we come here exactly in two of the above cases:\n // namely, if `cur`, its parent `up` and sibling `succ` are 2-nodes\n // then the subtree at `up` contains only 3 elements, and after removal of x'\n // it must contain only two entries, which is impossible\n \n // here: succ: [.u.v.] ",
"is the new replacement for the tree at `up`\n // informally: \"current\" value of `up` is assumed to be [ succ:[.u.v.] ]",
"\n // \tbut actually `up` cannot be a \"1-node\", so we want to correct this\n\n while (sp) {\n cur = up;\n up = st[--sp];\n // now `cur` is the root of the subtree to be replaced with `succ`\n // `up` is the parent of `cur`\n if (up->right == cur) {\n // up: [ ... cur:(right) ]\n if (IS_2N(up)) {\n // up: [ (left) x1 cur:(right) ]\n if (IS_2N(up->left)) {\n // up: [ [.t.] ",
"x1 cur:(right) ]\n // --> [ [.t.] ",
"x1 cur:[ (succ) ] ] , succ has incorrect depth!",
"\n // --> [ new_succ:[.t.x1 (succ) ] ]\n // after that: succ is at a good place, but up is to be replaced with [ new_succ ]\n LET (up->left->x2, up->x1);\n up->left->middle = up->left->right;\n up->left->right = succ;\n free_node (cur, Extra_words);\n succ = up->left;\n } else {\n // up: [ [.s.t.] ",
"x1 cur:(right) ]\n // --> [ [.s.t.] ",
"x1 cur:[ (succ) ] ]\n // --> [ [.s.] ",
"t cur:[.x1 (succ) ] ]\n LET (cur->x1, up->x2);\n cur->x2 = cur->x1;\n cur->right = succ;\n cur->left = up->left->right;\n LET (up->x1, up->left->x2);\n up->x2 = up->x1;\n up->left->x2 = up->left->x1;\n up->left->right = up->left->middle;\n return 1;\n }\n } else {\n // up: [ (left) x1 (middle) x2 cur:(right) ]\n if (IS_2N(up->middle)) {\n // up: [ (left) x1 [.t.] ",
"x2 cur:[ (succ) ] ]\n // --> [ (left) x1 [.t.x2.(succ)] ]\n up->right = up->middle;\n LET (up->right->x2, up->x2);\n up->x2 = up->x1;\n up->right->middle = up->right->right;\n up->right->right = succ;\n free_node (cur, Extra_words);\n return 1;\n } else {\n // up: [ (left) x1 [.s.t.] ",
"x2 cur:[ (succ) ] ]\n // --> [ (left) x1 [.s.] ",
"t cur:[.x2 (succ)] ]\n LET (cur->x1, up->x2);\n cur->x2 = cur->x1;\n cur->right = succ;\n cur->left = up->middle->right;\n LET (up->x2, up->middle->x2);\n up->middle->x2 = up->middle->x1;\n up->middle->right = up->middle->middle;\n return 1;\n }\n }\n } else if (up->left == cur) {\n // up: [ cur:(left) ... ]\n if (IS_2N(up)) {\n // up: [ cur:(left) x1 (right) ]\n if (IS_2N(up->right)) {\n // up: [ cur:[ (succ) ] x1 [.y.] ]",
"\n // --> [ new_succ:[ (succ) x1.y.] ]",
"\n DCPY (up->right->x2, up->right->x1);\n LET (up->right->x1, up->x1);\n up->right->middle = up->right->left;\n up->right->left = succ;\n succ = up->right;\n free_node (cur, Extra_words);\n //continue to the top\n } else {\n // up: [ cur:[ (succ) ] x1 [.y.z.] ]",
"\n // --> [ cur:[ (succ) x1. ] ",
"y [.z.] ]",
"\n LET (cur->x1, up->x1);\n\t cur->x2 = cur->x1;\n cur->left = succ;\n cur->right = up->right->left;\n up->right->left = up->right->middle;\n LET (up->x1, up->right->x1);\n up->x2 = up->x1;\n LET (up->right->x1, up->right->x2);\n return 1;\n }\n } else {\n // up: [ cur:(left) x1 (middle) x2 (right) ]\n if (IS_2N(up->middle)) {\n // up: [ cur:[(succ)] x1 [.y.] ",
"x2 (right) ]\n // --> [ [(succ) x1.y.] ",
"x2 (right) ]\n DCPY (up->middle->x2, up->middle->x1);\n LET (up->middle->x1, up->x1);\n up->middle->middle = up->middle->left;\n up->middle->left = succ;\n up->left = up->middle;\n LET (up->x1, up->x2);\n free_node (cur, Extra_words);\n return 1;\n } else {\n // up: [ cur:[(succ)] x1 [.y.z.] ",
"x2 (right) ]\n // --> [ [(succ) x1.] ",
"y [.z.] ",
"x2 (right) ]\n cur->left = succ;\n cur->right = up->middle->left;\n LET (cur->x1, up->x1);\n cur->x2 = cur->x1;\n up->middle->left = up->middle->middle;\n LET (up->x1, up->middle->x1);\n LET (up->middle->x1, up->middle->x2);\n return 1;\n }\n }\n } else {\n // now up->middle == cur\n // up: [ (left) x1 cur:[(succ)] x2 (right) ]\n if (IS_2N(up->left)) {\n // up: [ [.s.] ",
"x1 cur:[(succ)] x2 (right) ]\n // --> [ [.s.x1 (succ)] x2 (right) ]\n LET (up->left->x2, up->x1);\n up->left->middle = up->left->right;\n up->left->right = succ;\n LET (up->x1, up->x2);\n free_node (cur, Extra_words);\n return 1;\n } else {\n // up: [ [.s.t.] ",
"x1 cur:[(succ)] x2 (right) ]\n // --> [ [.s.] ",
"t [.x1 (succ)] x2 (right) ]\n LET (cur->x1, up->x1);\n cur->x2 = cur->x1;\n cur->right = succ;\n cur->left = up->left->right;\n up->left->right = up->left->middle;\n LET (up->x1, up->left->x2);\n up->left->x2 = up->left->x1;\n return 1;\n }\n }\n }\n\n // If we come here, this means that `up` is the root\n // and we want to replace it with \"1-node\" [ (succ) ]\n // Instead, we decrease the depth by one, and make `succ` the new root\n\n free_node (up, Extra_words);\n R->root = succ;\n R->depth--;\n\n return 1;\n}\n\nstatic int *sort_rec (tree23_t *T, int *st, int depth) {\n if (--depth >= 0) {\n st = sort_rec (T->left, st, depth);\n *st++ = T->x1;\n if (T->x2 > T->x1) {\n st = sort_rec (T->middle, st, depth);\n *st++ = T->x2;\n }\n st = sort_rec (T->right, st, depth);\n } else {\n *st++ = T->x1;\n if (T->x2 > T->x1) {\n *st++ = T->x2;\n }\n }\n return st;\n}\n\nstatic int *sort (tree23_root_t *R, int *st) {\n if (!",
"R->root) {\n return st;\n }\n return sort_rec (R->root, st, R->depth);\n}\n\nstatic int check_rec (tree23_t *T, int ll, int rr, int depth) {\n if (!",
"T) {\n return 0;\n }\n if (T->x1 <= ll || T->x1 >= rr || T->x2 <= ll || T->x2 >= rr) {\n return 0;\n }\n if (T->x1 > T->x2) {\n return 0;\n }\n if (--depth >= 0) {\n if (!",
"check_rec (T->left, ll, T->x1, depth) || \n !",
"check_rec (T->right, T->x2, rr, depth)) {\n return 0;\n }\n if (T->x1 < T->x2) {\n return check_rec (T->middle, T->x1, T->x2, depth);\n }\n }\n return 1;\n}\n\nstatic int check (tree23_root_t *R) {\n if (!",
"R->root) {\n if (R->depth) {\n return -1;\n }\n return 0;\n }\n if (R->depth < 0) {\n return -1;\n }\n return check_rec (R->root, -1 << 31, ~(-1 << 31), R->depth) ? ",
"R->depth : -1;\n}\n\nstatic void count_rec (tree23_t *T, int depth, int *A) {\n if (--depth < 0) {\n A[1]++;\n A[0]++;\n if (T->x2 > T->x1) {\n A[0]++;\n }\n } else {\n A[2]++;\n count_rec (T->left, depth, A);\n if (T->x1 < T->x2) {\n A[0]++;\n count_rec (T->middle, depth, A);\n }\n A[0]++;\n count_rec (T->right, depth, A);\n }\n}\n\n\nstatic void count (tree23_root_t *R, int *A) {\n A[0] = A[1] = A[2] = 0;\n if (!",
"R->root) {\n return;\n }\n count_rec (R->root, R->depth, A);\n}\n\ntree23_root_t Root;\n\nint arr[1000000];\n\n\nint main (int argc, const char *argv[]) {\n int n, t, p, i, j;\n int counters[3], extra[4];\n int *tmp;\n if (argc >= 2 && !",
"strcmp (argv[1], \"-e\")) {\n Root.extra_words = 1;\n }\n scanf (\"%d\", &n);\n for (i = 0; i < n; i++) {\n scanf (\"%d\", &t);\n switch (t) {\n case 1:\n scanf (\"%d\", &p);\n if (!",
"tree23_lookup (&Root, p)) {\n extra[0] = p+3;\n tree23_insert (&Root, p, extra);\n }\n break;\n case 2:\n scanf (\"%d\", &p);\n puts (tree23_lookup (&Root, p)?\"YES\":\"NO\");\n break;\n case 3:\n scanf (\"%d\", &p);\n tmp = sort (&Root, arr);\n p = tmp - arr;\n for (j = 0; j < p; j++)\n printf (\"%d%c\", arr[j], '\\n');\n break;\n case 4:\n scanf (\"%d\", &p);\n if (tree23_lookup (&Root, p))\n tree23_delete (&Root, p);\n break;\n }\n //dump (T);\n if (check (&Root) < 0) printf (\"BAD TREE\\n\");\n }\n printf (\"%d\\n\", check (&Root));\n dump (&Root);\n tmp = sort (&Root, arr);\n p = tmp - arr;\n for (j = 0; j < p; j++)\n printf (\"%d%c\", arr[j], '\\n');\n count (&Root, counters);\n printf (\"leaves allocated %d\\nnodes allocated %d\\nleaves freed %d\\nnodes freed %d\\nleaves current %d\\nnodes current %d\\n\", lp, np, ld, nd, lp - ld, np - nd);\n printf (\"leaves in tree %d\\nnodes in tree %d\\nnumbers in tree %d\\n\", counters[1], counters[2], counters[0]);\n return 0;\n}\n"
] | {
"pile_set_name": "Github"
} | [
0.009549025446176529,
0.004344332497566938,
0.0236591175198555,
0.01906628906726837,
0.001101796398870647,
0.003326224396005273,
0.0057182046584784985,
0.0036803896073251963,
0.012192565016448498,
0.009893765673041344,
0.006782960146665573,
0.02256796509027481,
0.01912577636539936,
0.04196765273809433,
0.008775225840508938,
0.01556653156876564,
0.0006217192276380956,
0.003857968607917428,
0.0009301796671934426,
0.005563674494624138,
0.002522110240533948,
0.0008840312366373837,
0.0010403729975223541,
0.0299306008964777,
0.008936704136431217,
0.0014138388214632869,
0.040178485214710236,
0.0008958588005043566,
0.005619066767394543,
0.001218882156535983,
0.0009084251360036433,
0.020433474332094193,
0.0015078261494636536,
0.005904325749725103,
0.0011378510389477015,
0.0010544242104515433,
0.028769707307219505,
0.006573690567165613,
0.0015125832287594676,
0.014089224860072136,
0.0016767722554504871,
0.004351993557065725,
0.0007768813520669937,
0.0013639085227623582,
0.0010294836247339845,
0.003028607927262783,
0.0026383809745311737,
0.0014722442720085382,
0.007725559640675783
] | 0.008508 | 49 |
[
"In conventional computing systems, a frame buffer is provided in the system's hardware which is used to store the contents of the display of the computing system at any given time. ",
"The term “frame buffer”, as used herein, refers to the entire video display interface including acceleration hardware and other components as appropriate. ",
"The frame buffer is traditionally controlled and manipulated by a software program which regulates access to the display as requested by various application programs running on the computing system. ",
"For example, in a computing system utilizing the X Windows display protocol, an 8 bit frame buffer can be provided in the computer's hardware and controlled through the X Windows application program interface. ",
"The X Windows protocol permits a number of programs, known as X clients, to communicate with the interface, known as the X server, and thus modify the viewable display.",
"\nConventionally, an 8 bit frame buffer can display up to 256 different colors typically from a palette of 224 (or 16,777,216) colors. ",
"Each of the 256 colors can be designated and selected by a X client, through a color lookup table known as a “colormap.” ",
"A conventional colormap for an 8 bit frame buffer has 256 (28) addressable entries or cells, each cell representing a “pixel” value defining a color displayable on the display. ",
"FIG. ",
"1 shows an example of a colormap, having 256 cells. ",
"Each cell contains a multi-bit field which, among other things, dictates the color associated with the cell, and whether the cell is a read-only cell or a read/write cell. ",
"By default, the colormap cells are considered “empty” until allocated and initialized by the server at the request of an X client. ",
"The color of an empty cell is undefined. ",
"The operation of a colormap and the X Windows protocol is described in “The Xlib Programming Manual”, by O'Reilly and Associates Inc. publishers, 1988 (ISBN 0-937175-13-7), which is hereby expressly incorporated by reference in its entirety.",
"\nThe application programs (i.e., the X clients) running on the computing system manipulate the cells in a colormap through the X server interface, and the frame buffer hardware accesses the cells in the colormap to determine the color of any pixel displayed. ",
"The mechanism typically takes this form: the client may request that a specific color be made available to it by allocating an entry in the default colormap. ",
"The X server will attempt to satisfy the request but may refuse if there are no unallocated cells available. ",
"At this point, the client has several options: for example, it may try to allocate a different color, ignore the error and assume that the request succeeded, or exit with an error. ",
"Alternatively, it may create a “private colormap” which gives the client a full set of 256 cells that are not shared with any other client.",
"\nIn conventional computing systems, a display or colormap “flashing” problem occurs if the display hardware of the computing system is equipped with a frame buffer capable of accessing only a single hardware colormap at any one time. ",
"For example, Sun Microsystems' CG6 frame buffer hardware, or the GX hardware, is an 8 bit frame buffer which supports only one colormap at any one time. ",
"As the user moves between a client that uses the default colormap and one that has defined a private colormap, the X server automatically updates the values in the frame buffer's hardware colormap.",
"\nFor example, the default colormap may have used cells 0 and 1 to display black and white. ",
"But the private colormap may have entirely different R, G, B values, and thus colors, in these locations.",
"\nWhen the default colormap switches out, the private colormap values are applied to all of the displayed color images and windows, with the result that windows and images displayed in on the screen may appear to be abnormally or seemingly randomly colored since these images relied upon the values stored in the default colormap. ",
"The image associated with the X client which allocated the private colormap will, of course, appear as it should, since it is now using the colors from the private colormap. ",
"If the user then activates a window which relies on the default colormap, the default colormap is then applied to all images and the image associate with the private colormap will then appear to be abnormally or randomly colored. ",
"This problem is referred to herein variously as “display flashing”, “colormap flashing”, or simply “flashing”.",
"\nWhat is needed is a method and computer program product for reducing display flashing in a computing system where the display hardware of the computing system is equipped with a frame buffer capable of accessing only a single hardware colormap at any one time. ",
"The system and method should operate transparently with respect to legacy software applications, and should not require any changes to the hardware of the computing system or display devices. ",
"It with this background in mind that the present invention was developed."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0006121968617662787,
0.000600772793404758,
0.000638197991065681,
0.0006183520890772343,
0.0006355234072543681,
0.0006747760344296694,
0.0005924681900069118,
0.0006643516826443374,
0.0008292015991173685,
0.0005998433334752917,
0.0007347300415858626,
0.0007467050454579294,
0.0010428642854094505,
0.0005921018891967833,
0.0006318510859273374,
0.0005587208434008062,
0.0006608592229895294,
0.0007809083326719701,
0.0006255192565731704,
0.000755859655328095,
0.0006740199169144034,
0.0006529132951982319,
0.0006077926373109221,
0.0005696893204003572,
0.0006453488022089005,
0.0006155032315291464,
0.0007602528785355389,
0.0010515152243897319,
0.0006125770742073655,
0.000561434542760253,
0.0005685032811015844
] | 0.000675 | 31 |
[
"Q:\n\nDjango + OS X + MySQL + first session variable retrieval = crash\n\nAm experienced with Django, Apache, WSGI, MySql, etc. ",
"and have this environment setup and working fine on another OS X computer running Lion. ",
"Django session backend is db, session middleware and app are both enabled properly in settings. ",
"During first request of site view, we set a request.session key/value, which this first time thru works fine. ",
"On subsequent view though when we check if the key/value exists, we get a server-level 500 error that even with Debug mode on doesn't make it to the python interpreter to generate a full stack trace exception. ",
"The apache log generates the following messages...\n[Mon Apr 16 14:26:22 2012] [notice] Apache/2.2.21 (Unix) DAV/2 mod_wsgi/3.3 Python/2.7.1 mod_ssl/2.2.21 OpenSSL/0.9.8r configured -- resuming normal operations\n[Mon Apr 16 14:26:27 2012] [info] mod_wsgi (pid=2362): Create interpreter 'snap.joe|'.",
"\n[Mon Apr 16 14:26:27 2012] [info] [client 127.0.0.1] mod_wsgi (pid=2362, process='snap', application='snap.joe|'): Loading WSGI script '/var/www/venvs/snap_env/snap/wsgi/wsgi.py'.",
"\n[Mon Apr 16 14:26:32 2012] [error] [client 127.0.0.1] Premature end of script headers: wsgi.py\n[Mon Apr 16 14:26:33 2012] [notice] child pid 2362 exit signal Bus error (10)\n\nHave checked that a MySQL db table django_session row is added properly with session_data and also the cookie set in the browser after the first request contains the proper/matching session_id. ",
"If I add a simple request.session.flush() just before the existing session code, we can bypass the error obviously because there is never anything in the session. ",
"One more thing, the value we are adding to the session key/value store is a Django QuerySet object. ",
"Again, this is working on a live CentOS server, and also another Mac OS X Lion machine (albeit running Python 2.6 instead of 2.7).",
"\nAny ideas folks? ",
"Many thanks!",
"\n\nA:\n\nSee documented reasons at:\nhttp://code.google.com/p/modwsgi/wiki/FrequentlyAskedQuestions#Apache_Process_Crashes\nand follow further links for possible workarounds.",
"\nIn short, can be shared library version conflict, using mod_python at same time, or extension module for Python that doesn't work with sub interpreter.",
"\nIf this is only Python site on that Apache, set:\nWSGIApplicationGroup %{GLOBAL}\n\nfor one potential quick solution.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0005805662949569523,
0.0007765860063955188,
0.0005879908567294478,
0.0005376646877266467,
0.0006356670055538416,
0.0006510466919280589,
0.0006484403274953365,
0.0007532904273830354,
0.0006198392366059124,
0.000619505881331861,
0.0006713187322020531,
0.000732510641682893,
0.0006700330995954573,
0.0005659565795212984,
0.0006669453578069806,
0.0006432673544622958,
0.001995444530621171
] | 0.000727 | 17 |
[
"Jennifer Aniston created a commotion Tuesday morning on social networks, posting her first picture on Instagram.",
"\n\n“And now we’re friends on Instagram too. ",
"Hi Instagram,” wrote the actress, making a small nod to the “Friends” series.",
"\n\nFor her first publication, the 50-year-old American released a selfie with David Schwimmer, Matt LeBlanc, Courtney Cox, Lisa Kudrow and Matthew Perry, the actors she shared with “Friends” .",
"\n\nAccording to the magazine “People“, the appearance of the popular actress on Instagram has not been without problems.",
"\n\nSeveral Internet users had difficulty subscribing to Aniston’s account, completely invisible on the social network.",
"\n\nThe account, yet named simply @jenniferaniston does not appear when it is typed in the search box on Instagram.",
"\n\n“We know that many people have a hard time subscribing to Jennifer’s account, the ridership is amazing,” said a spokeswoman for the star in the magazine “People“.",
"\n\nShortly after noon, some 244,000 people were already following the account of the actress, but this number may swell dramatically in the coming hours!",
"\n\nCheck out the super viral Instagram post below!",
"\n\nView this post on Instagram And now we’re Instagram FRIENDS too. ",
"HI INSTAGRAM 👋🏻 A post shared by Jennifer Aniston (@jenniferaniston) on Oct 15, 2019 at 6:03am PDT\n\nSource: Tvanouvelles"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0006468521314673126,
0.0007200903492048383,
0.0006491508102044463,
0.0010604934068396688,
0.0007527378620579839,
0.0007988304714672267,
0.0006830344791524112,
0.0006783106946386397,
0.0007810426177456975,
0.001672587008215487,
0.0007309974753297865,
0.0006257023778744042
] | 0.000817 | 12 |
[
"Q:\n\nParsing the information of a URL out of a HTML tags in C\n\nMy application gets as part of its data a large html formatted file that contains large amounts of links. ",
"Something like what you would get if you search anything on Google or Yahoo or other search engines: a list of URLs and the description or other text.",
"\nI've been trying to come out with a function that can parse the URL and the description and save them into a text file but it's proven hard, at least to me. ",
"So, if I have:\n<a href=\"http://www.w3schools.com\">Visit W3Schools</a>\nI would parse http://www.w3schools.com and Visit W3Schools and save them in a file.",
"\nAny way to achieve this? ",
"in plain C?",
"\nAny help is appreciated.",
"\n\nA:\n\nYou really need a proper html parser, but for something quick and dirty, try:\nbool get_url(char **data, char **url, char **desc)\n{\n bool result = false;\n char *ptr = strstr(*data, \"<a\");\n\n if(NULL !",
"= ptr)\n {\n *data = ptr + 2;\n\n ptr = strstr(*data, \"href=\\\"\");\n if(NULL !",
"= ptr)\n {\n *data = ptr + 6;\n *url = *data;\n\n ptr = strchr(*data, '\"');\n if(NULL !",
"= ptr)\n {\n *ptr = '\\0';\n *data = ptr + 1;\n\n ptr = strchr(*data, '>');\n if(NULL !",
"= ptr)\n {\n *data = ptr + 1;\n *desc = *data;\n\n ptr = strstr(*data, \"</a>\");\n if(NULL !",
"= ptr)\n {\n *ptr = '\\0';\n *data = ptr + 4;\n result = true;\n }\n }\n }\n }\n }\n\n return result;\n}\n\nNot that data gets updated to be beyond the data parsed (it's an in-out parameter) and that the string passed in gets modified. ",
"I'm feeling lazy/too busy to do full solutions with memory allocated return strings.",
"\nAlso you probably ought to return errors on the cascade of close scope braces (except the first one) which is partly why I stacked them up like that. ",
"There are other neater solutions that can be adapted to be more generic.",
"\nSo basically you then call the function repeatedly until it returns false.",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0007440580520778894,
0.0006885080365464091,
0.0007005672669038177,
0.0010048341937363148,
0.0007048414554446936,
0.0008641466265544295,
0.0005385419935919344,
0.2045113891363144,
0.02077917382121086,
0.04612762853503227,
0.03409437835216522,
0.02130478248000145,
0.0012474985560402274,
0.0009374803048558533,
0.0007192765478976071,
0.0005828555440530181,
0.0010855942964553833,
0.001995444530621171
] | 0.018813 | 18 |
[
"Four Business Ideas For Women\n\nIf you are a female that has that yearning deep within you to go in to business for yourself, this article is for you. ",
"Sometimes having the entrepreneurial spirit just isn’t enough to go for it. ",
"It helps to have some ideas to think about for the imagination to start those creative juices flowing. ",
"A good way to figure out what kind of business to start is by examining your interests and goals. ",
"Something that converges the two would be the ideal business for anyone. ",
"Also, knowing what you want to gain from the business will help guide you down the right path. ",
"To help out I have listed a few business ideas for women below. ",
"Consider one or a combination and you may just have a one of a kind service to build a business around.",
"\n\nProfessional Blogging\n\nIf you like to write, start a blog around your favorite topic or niche. ",
"There’s lots of money made like this. ",
"All you need is a computer and a little creativity. ",
"Then, research ways to monetize the traffic and you will be on your way.",
"\n\nSocial Media Consultant\n\nIf you are social media savvy and enjoy Twitter, Facebook, etc. ",
"you could start a business that helps people promote their products. ",
"This has the potential of unlimited growth. ",
"You can start by building fan pages for small businesses and doing product launches. ",
"Who knows what it could turn in to?",
"\n\nProofreading and Editing\n\nIf you are good with English and grammar you can give a very useful service of proofreading and editing. ",
"There are many people who have great ideas but have a hard time putting them on paper properly. ",
"This is where you can come in and save the day. ",
"Also, this is something that could be done from a home office. ",
"There’s nothing like making a living from the comfort of your home.",
"\n\nWeb Design\n\nIf you have any experience with WordPress you can design websites. ",
"There are many small businesses that would love to give their money to a local hardworking web designer like yourself. ",
"All you have to do is walk in the door with a portfolio of what you can do for them and you’re on your way. ",
"This is a very light maintenance business with recurring income. ",
"It’s not too often you hear those two characteristics when describing a business. ",
"Also, like the proofreading, it could be done at home.",
"\n\nWhile the above ideas could be done by a man or a woman I am under the belief that the fairer sex has a little more finesse and talent for detail than their male counterparts. ",
"There are many exceptions to this but I have personally witnessed women thrive in these businesses. ",
"That said, take these ideas and come up with something you will enjoy doing for a long time. ",
"Create a web design business that provides social media consulting. ",
"Start a blog that gives tips about editing and proofreading while offering the service as well. ",
"My father always told me if I could find a way to make a living doing what I love then I would never work a day in my life. ",
"I think this is true but I’m still looking. ",
"Good luck with your entrepreneurial pursuits!"
] | {
"pile_set_name": "Pile-CC"
} | [
0.07769051939249039,
0.0007565983105450869,
0.0005239017773419619,
0.0005501179839484394,
0.0005741406348533928,
0.0005892236949875951,
0.002306143054738641,
0.0005843621911481023,
0.0006770483450964093,
0.0007137197535485029,
0.0008448330918326974,
0.0014871640596538782,
0.0006979499012231827,
0.0006836905959062278,
0.0005663656629621983,
0.0006167269893921912,
0.0008565125172026455,
0.0006771561456844211,
0.0007139086374081671,
0.0013171182945370674,
0.0006152542773634195,
0.0027706811670213938,
0.0006806143210269511,
0.001171325333416462,
0.020096667110919952,
0.0006230577710084617,
0.0005748146795667708,
0.0006452177185565233,
0.0010909369448199868,
0.0007911028806120157,
0.0006114201387390494,
0.0007046181126497686,
0.0007880300399847329,
0.0010066988179460168,
0.0006160528864711523,
0.0007246537716127932
] | 0.003526 | 36 |
[
"Q:\n\nRun batch file from SQL\n\nI want to run batch file from SQL Job without using exec xp_cmdshell.",
"\nAny idea?",
"\nThanks\n\nA:\n\nInstead of running batch file, i have created power shell and ran it from SQL job. ",
"It satisfy my requirement and resolved my issue. ",
"\n\n"
] | {
"pile_set_name": "StackExchange"
} | [
0.0008002124959602952,
0.000751500076148659,
0.0006280356901697814,
0.0005662007606588304,
0.001995444530621171
] | 0.000948 | 5 |
[
"The day marked the one-year anniversary of the pair's engagement. ",
"It had been rumored that Aniston and Theroux were going to secretly tie the knot on Aug. 10 under the guise of the actor's birthday.",
"\n\nIn July, Aniston told the Associated Press they hadn't set a date yet. \"",
"We just want to do it when it's perfect, and we're not rushed, and no one is rushing from a job or rushing to a job. ",
"And, you know, we already feel married,\" she explained."
] | {
"pile_set_name": "Pile-CC"
} | [
0.000617102487012744,
0.0006317273364402354,
0.0006783303688280284,
0.0007022898062132299,
0.0006661538500338793
] | 0.000659 | 5 |
[
" United States Court of Appeals,\n\n Fifth Circuit.",
"\n\n No. ",
"91–6091.",
"\n\n Charles D. CRONEN, Plaintiff–Appellant,\n\n v.\n\n TEXAS DEPARTMENT OF HUMAN SERVICES, Jean Roberts, Ann Valdez–Haines, Donna\nL. Burns, Socorro Alonzo, and the State of Texas, Defendants–Appellees.",
"\n\n Nov. 23, 1992.",
"\n\nAppeal from the United States District Court for the Southern District of Texas.",
"\n\nBefore GOLDBERG, SMITH, and EMILIO M. GARZA, Circuit Judges.",
"\n\n JERRY E. SMITH, Circuit Judge:\n\n Charles Cronen brought suit against the defendants seeking relief for denial of food stamp\n\nbenefits. ",
"The district court granted summary judgment in favor of the defendants on grounds of\n\nEleventh Amendment and qualified immunity. ",
"We affirm in part, vacate in part, and remand.",
"\n\n I.\n\n Cronen, an indigent Vietnam veteran, resides in Harris County, Texas, where he owns a parcel\n\nof land.1 Cronen also owns an old inoperative van that he keeps on the property. ",
"Around the van,\n\nCronen has constructed a series of shacks which, along with the van, sometimes serve as his shelter.",
"\n\nThese shacks, unfortunately, do not keep out thieves, who stole some of the tools he uses to build\n\nhis shacks.",
"\n\n To prevent further theft of what few possessions he has, Cronen rented private storage space.",
"\n\nCronen also claims that he lives in his storage space from time to time because it has electricity, which\n\nhe cannot afford to have in his shacks. ",
"Because, according to Cronen, the postal service will not\n\ndeliver mail to his property, he also rents a post office box.",
"\n\n Cronen works when he can find employment. ",
"His work, however, does not provide sufficient\n\n\n 1\n We describe the facts of this case based upon the pleadings and exhibits filed by Cronen. ",
"Our\ndescription of the facts should not be construed as establishing their truth for purposes of further\nproceedings in this action.",
"\n\fresources for him to rent an apartment. ",
"He also finds work more easily during certain periods of the\n\nyear, causing his income to fluctuate from month to month.",
"\n\n II.",
"\n\n Since April 1985, Cronen periodically has received food stamp benefits. ",
"He alleges, however,\n\nthat the Texas Department of Human Services improperly calculated his benefits. ",
"Cronen wished to\n\ndeduct the following expenses as shelter costs for purposes of computing his food stamp benefits:\n\nbuilding materials used to construct his shacks, storage rental, and his post office box. ",
"He also\n\ndesired to have his benefits calculated using income averaging and contended that he should be able\n\nto deduct the cost of travel to the food stamp office. ",
"Cronen raised these claims in several\n\nunsuccessful administrative appeals. ",
"Defendants Jean Roberts, Ann Valdez–Haines, and Donna Burns\n\nconducted the hearings on Cronen's claims; defendant Socorro Alonzo served as the other\n\ndefendants' supervisor and Cronen's caseworker.",
"\n\n In February 1989, Cronen filed a pro se complaint alleging that defendants wrongfully denied\n\nhim food stamps to which he was entitled. ",
"He sought restoration of his past benefits, an injunction\n\nagainst future violations of the Food Stamp Act (the \"Act\"), $25,000 for suffering as a result of lost\n\nbenefits, and costs and attorney's fees. ",
"His complaint alleged violations of numerous federal statutes,\n\nthe Constitution, and the common law.",
"\n\n On September 1, 1989, the district court dismissed Cronen's suit for want of prosecution\n\npursuant to its Local Rule 13(b). ",
"He appealed, and we vacated and remanded for further\n\nproceedings. ",
"On January 15, 1991, defendants moved to dismiss on grounds of improper service,\n\nlimitations, sovereign immunity, qualified immunity, and quasi-judicial immunity. ",
"Cronen then filed\n\na supplement to his complaint alleging 42 U.S.C. § 2000d–7, 28 U.S.C. § 1337, and various sections\n\nof the Act, 7 U.S.C. § 2011 et seq., ",
"as additional sources of jurisdiction and relief.",
"\n\n The district court treated the motion to dismiss as a motion for summary judgment.",
"\n\nDefendants submitted no summary judgment evidence, relying solely upon Cronen's complaint. ",
"The\n\ndistrict court granted the motion, holding that the Eleventh Amendment barred the claims against\n\nTexas and the Texas Department of Human Services and that the individual defendants were entitled\n\fto qualified immunity. ",
"Cronen appeals each of these holdings.",
"\n\n III.",
"\n\n Because this case comes to us on summary judgment, we review the district court's ruling de\n\nnovo to determine whether there is any genuine issue of material fact and the moving party is entitled\n\nto judgment as a matter of law. ",
"Williams v. Adams, 836 F.2d 958, 960 (5th Cir.1988). ",
"We view the\n\nevidence, and reasonable inferences from it, in the light most favorable to the nonmovant, Cronen,\n\nand will affirm only if the defendants \"ha[ve] established [their] right to the judgment with such clarity\n\nthat the nonmoving party cannot recover ... under any discernible circumstances.\" ",
"Id. at 961\n\n(citations and single quotation marks omitted).",
"\n\n A.\n\n We first address Cronen's claims against Texas (the \"state\") and the Texas Department of\n\nHuman Services (the \"agency\") for damages and injunctive relief. ",
"The state and the agency properly\n\nargue that they are not \"persons\" for purposes of liability under 42 U.S.C. § 1983 (1988). ",
"See Will\n\nv. Michigan Dep't of State Police, 491 U.S. 58, 71, 109 S.Ct. ",
"2304, 2312, 105 L.Ed.2d 45 (1989).",
"\n\nThe district court properly dismissed this claim pursuant to Fed.",
"R.Civ.",
"P. 12(b)(6).",
"\n\n Cronen asserts an implied cause of action under the Act as a further basis for relief.2 In\n\nVictorian v. Miller, 813 F.2d 718 (5th Cir.1987) (en banc ), we decided that a private right of action\n\nis available under section 1983 to remedy violations of the Act. ",
"We reserved judgment, however, on\n\nthe question of whether the Act itself creates an implied cause of action. ",
"Id. at 724 n. 13. ",
"Because\n\nwe hold that the Eleventh Amendment bars Cronen's claims against the state and the agency, we again\n\ndecline to address this issue.3\n\n 2\n Cronen originally raised the possibility of an implied cause of action in an amendment to his\noriginal complaint. ",
"He apparently failed to obtain leave of the district court to file his amendment\nand simply added an additional paragraph without reiterating the content of his original complaint.",
"\nWe find no objection to these defects in the record or in defendants' brief. ",
"We therefore treat the\nadditional arguments as part of Cronen's claim on appeal. ",
"See Lewis v. Thigpen, 767 F.2d 252,\n259 (5th Cir.1985) (pro se litigants not held to strict compliance with formal pleading rules).",
"\n 3\n As our holding raises the possibility that this issue will arise on remand, we add a brief\ncomment to guide the district court. ",
"Cronen may seek to amend his complaint on remand to\npursue injunctive relief against one or more state officials in their official capacity. ",
"Because such\na claim could not be brought under § 1983, see Will, 491 U.S. at 71, 109 S.Ct. ",
"at 2312, Cronen\n\f B.\n\n \"It is clear, of course, that in the absence of consent a suit in which the State or one of its\n\nagencies or departments is named as the defendant is proscribed by the Eleventh Amendment.\"",
"\n\nPennhurst State School & Hosp. ",
"v. Halderman, 465 U.S. 89, 100, 104 S.Ct. ",
"900, 908, 79 L.Ed.2d\n\n67 (1984) (citations omitted). \"",
"This jurisdictional bar applies regardless of the nature of the relief\n\nsought.\" ",
"Id. On the other hand, Congress may abrogate Eleventh Amendment immunity in certain\n\ncircumstances. ",
"See Pennsylvania v. Union Gas Co., 491 U.S. 1, 109 S.Ct. ",
"2273, 105 L.Ed.2d 1\n\n(1989); Atascadero State Hosp. ",
"v. Scanlon, 473 U.S. 234, 105 S.Ct. ",
"3142, 87 L.Ed.2d 171 (1985);\n\nFitzpatrick v. Bitzer, 427 U.S. 445, 96 S.Ct. ",
"2666, 49 L.Ed.2d 614 (1976).",
"\n\n Cronen argues that Congress abrogated Eleventh Amendment Immunity for violations of the\n\nAct in passing 42 U.S.C.A. § 2000d–7 (West Supp.1992), which provides in part,\n\n (a) General provision\n\n (1) A State shall not be immune under the Eleventh Amendment of the Constitution\n of the United States from suit in Federal court for a violation of section 794 of Title 29, title\n IX of the Education Amendments of 1972, the Age Discrimination Act of 1975 [42 U.S.C.A.\n § 6101 et seq.], ",
"title VI of the Civil Rights Act of 1964 [42 U.S.C.A. § 2000d et seq.] ",
"or the\n provisions of any other Federal statute prohibiting discrimination by recipients of Federal\n financial assistance.",
"\n\nCronen contends that the Act constitutes a \"Federal statute prohibiting discrimination by recipients\n\nof Federal financial assistance.\" ",
"As authority for this proposit ion, he relies upon 7 U.S.C.A. §\n\n2020(c) (West 1988), which provides, \"In the certification of applicant households for the food stamp\n\nprogram, there shall be no discrimination by reason of race, sex, religious creed, national origin, or\n\npolitical beliefs.\"",
"\n\n We find this argument unpersuasive. ",
"Section 2000d–7(a)(1) lends itself to at least two\n\ninterpretations. ",
"One can, as Cronen urges, interpret the final clause as abrogating Eleventh\n\nAmendment immunity under any federal statute prohibiting discrimination and involving the\n\n\n\n\ncould pursue that claim only as an implied cause of action. ",
"In this regard, we note that the\nSeventh Circuit has held that the Act creates such an implied cause of action. ",
"See Haskins v.\nStanton, 794 F.2d 1273, 1275 (7th Cir.1986). ",
"Our reasoning in Victorian appears consistent\ntherewith.",
"\n\fdistribution of any federal financial assistance.4 Under Cronen's interpretation, the general subject\n\nmatter of the statute makes no difference.",
"\n\n We find a second interpretation of the statute more persuasive, concluding that Congress\n\nintended to abrogate Eleventh Amendment immunity only for statutes that deal solely with\n\ndiscrimination by recipients of federal financial assistance. ",
"Each of the four statutes listed in section\n\n2000d–7 aims to prevent various types of discrimination by recipients of any type of federal financial\n\nassistance; they are \"antidiscrimination\" statutes. ",
"The Act, on the other hand, constitutes a\n\ncomprehensive federal entitlement program that happens to include a provision prohibiting\n\ndiscrimination in disbursing these entitlements. ",
"In other words, this statute prohibits discrimination\n\nin the disbursement of a specific type of federal financial assistance and cannot be deemed an\n\n\"antidiscrimination\" statute; thus, the Act is not the kind of statute Congress was referring to in\n\nsection 2000d–7.",
"\n\n Even if this were not so, our holding would not change. ",
"In order for Congress to abrogate\n\nEleventh Amendment immunity, it must make \"its intention unmistakably clear in the language of the\n\nstatute.\" ",
"Atascadero State Hosp., ",
"473 U.S. at 242, 105 S.Ct. ",
"at 3147. ",
"Congress may have done so\n\nfor the four specifically enumerated statutes in section 2000d–7. ",
"Given the two possible (and we\n\nthink reasonable) interpretations of the last phrase of section 2000d–7, however, we conclude that\n\nCongress has not sufficiently expressed itself to support a finding of abrogation for claims brought\n\nunder the Act.",
"\n\n Cronen also argues that the Act itself abrogates the states' Eleventh Amendment immunity,\n\nciting 7 U.S.C. §§ 2016(f), 2020(e), and 2023(b) (1988). ",
"Basically, Cronen asserts that because these\n\nsections provide for a restoration of wrongfully withheld benefits, Congress must have meant to\n\nabrogate immunity, as these provisions otherwise would be rendered nugatory. ",
"See Gomez v. Illinois\n\n\n 4\n Cronen does not allege that the state discriminated against him on the basis of race, sex,\nreligion, national origin, or political beliefs. ",
"Were we to hold that § 2000d–7 abrogates immunity\nunder the Act, we would also have to decide whether it does so only for a discrimination claim or,\nalternatively, for any type of claim. ",
"This further ambiguity lends additional support to our holding\nthat Congress has not made its intention to abrogate immunity under the Act \"unmistakably clear\nin the language of the statute.\" ",
"Atascadero State Hosp., ",
"473 U.S. at 242, 105 S.Ct. ",
"at 3147.",
"\n\fState Bd. ",
"of Educ., ",
"811 F.2d 1030, 1036 (7th Cir.1987).",
"\n\n We find no merit in this argument. ",
"These provisions are not rendered meaningless absent\n\nabrogation, as actions for restoration of benefits can be brought in state court. ",
"See Testa v. Katt, 330\n\nU.S. 386, 67 S.Ct. ",
"810, 91 L.Ed. ",
"967 (1947) (state courts must hear claims brought under federal\n\nlaw). ",
"The language of these provisions also fails to meet the Atascadero standard of unmistakable\n\nclarity. ",
"We therefore find no intent to abrogate immunity in the Act.",
"\n\n C.\n\n Next, Cronen avers that the Eleventh Amendment does not bar his claim for retroactive\n\nbenefits because these benefits would be paid entirely by the federal government. ",
"See Bermudez v.\n\nDepartment of Agric., ",
"490 F.2d 718 (D.C.Cir.), ",
"cert. ",
"denied, 414 U.S. 1104, 94 S.Ct. ",
"737, 38\n\nL.Ed.2d 559 (1973) (federal government liable for retroactive food stamp benefits); see also\n\nRobinson v. Block, 869 F.2d 202, 214 (3d Cir.1989). ",
"Had Cronen sued a state official in his official\n\ncapacity, this argument might have merit.5 In such a suit, a federal court may award prospective\n\ninjunctive relief that has only an ancillary effect on the state treasury. ",
"Quern v. Jordan, 440 U.S. 332,\n\n337, 99 S.Ct. ",
"1139, 1143, 59 L.Ed.2d 358 (1979); see Ex parte Young, 209 U.S. 123, 28 S.Ct. ",
"441,\n\n52 L.Ed. ",
"714 (1908). ",
"Here, of course, an injunction requiring an award of retroactive benefits would\n\nhave no effect on the state treasury.",
"\n\n The Supreme Court, however, has never extended the Ex parte Young fiction to states\n\nthemselves; the Court's prior decisions establish that a state qua state cannot be sued for damages\n\nor injunctive relief, absent waiver or abrogation. ",
"Pennhurst, 465 U.S. at 100, 104 S.Ct. ",
"at 908.",
"\n\nConsequently, the source of the damages is irrelevant when the suit is against the state itself or a state\n\nagency. ",
"We hold that the Eleventh Amendment bars Cronen's claims against Texas and the Texas\n\nDepartment of Human Services.",
"\n\n IV.",
"\n\n\n 5\n Several circuits have accepted Cronen's argument. ",
"See Robinson v. Block, 869 F.2d 202 (3d\nCir.1989); Bennett v. White, 865 F.2d 1395 (3d Cir.1989); Foggs v. Block, 722 F.2d 933 (1st\nCir.1983); Jordan v. Weaver, 472 F.2d 985 (7th Cir.1973). ",
"Contra Rothstein v. Wyman, 467\nF.2d 226 (2d Cir.1972).",
"\n\f We now address the claims against the individual defendants. ",
"At the outset, we note that\n\nCronen's complaint does not specify whether his suit is brought against the individual defendants in\n\ntheir personal capacity, official capacity, or both. ",
"Cro nen, however, in his \"Additional Material\n\nOpposing Defendant's Motion to Dismiss,\" asserts that the suit is against the individuals in their\n\npersonal capacity. ",
"Thus, we need not address the issues that would arise were the suit also brought\n\nagainst the defendants in their official capacity.",
"\n\n A.\n\n The district court held that the individual defendants were entitled to qualified immunity\n\nagainst Cronen's claim for damages.6 Executive officials who must necessarily exercise discretion in\n\nthe scope of their duties are granted qualified immunity from damage suits. ",
"Harlow v. Fitzgerald,\n\n457 U.S. 800, 807, 102 S.Ct. ",
"2727, 2732, 73 L.Ed.2d 396 (1982). ",
"Because qualified immunity\n\nconstitutes an affirmative defense, the defendant must both plead and establish his entitlement to the\n\ndefense. ",
"Gomez v. Toledo, 446 U.S. 635, 640, 100 S.Ct. ",
"1920, 1923, 64 L.Ed.2d 572 (1980). ",
"To\n\nestablish such entitlement, he must show that the conduct in question occurred while he was acting\n\n\"in his official capacity and within the scope of his discretionary authority.\" ",
"Garris v. Rowland, 678\n\nF.2d 1264, 1271 (5th Cir.1982). ",
"The burden t hen shifts to the plaintiff \"to rebut this \"good faith'\n\ndefense.\" ",
"Saldana v. Garza, 684 F.2d 1159, 1163 (5th Cir.1982).",
"\n\n Although Cronen, in his pleadings, states that he is suing the individual defendants only in\n\ntheir personal capacity, he also says that they were acting in their official capacity, but he disputes that\n\nthey were acting within the scope of their discretionary authority. ",
"As we understand Cronen's\n\nargument, the defendants allegedly acted outside their discretionary authority because they failed to\n\nfollow or correctly apply the federal food stamp regulations as required by law; in other words, they\n\nhad no discretion to act in a manner contrary to law.",
"\n\n We think Cronen misinterprets the meaning of discretionary authority, as his view would\n\n 6\n Cronen's suit seeks retroactive benefits as well as damages for \"suffering.\" ",
"Damages for\nemotional suffering can be compensable under § 1983. ",
"See Hamilton v. Rodgers, 791 F.2d 439,\n444–45 (5th Cir.1986); Baskin v. Parker, 602 F.2d 1205, 1209 (5th Cir.1979). ",
"Likewise,\ndamages for physical suffering are compensatory in nature and therefore recoverable under §\n1983. ",
"See Baskin, id.\n\femasculate the \"good faith\" prong of the qualified immunity defense. ",
"Under Cronen's approach, we\n\nwould look to see whether the defendant acted contrary to law. ",
"If he had, he would be acting outside\n\nhis discretionary authority and, thus, not entitled to immunity. ",
"The \"good faith\" prong would\n\ndisappear from the analysis, and an official who acted wrongly would rarely be entitled to immunity.",
"\n\nThat result would conflict with the purpose of qualified immunity—allowing officials to exercise\n\ndiscretion without fear of liability when they make mistakes.",
"\n\n An official acts within his discretionary authority when he performs non-ministerial acts within\n\nthe boundaries of his official capacity. ",
"Here, the individual defendants handle appeals of food stamp\n\napplicants. ",
"In carrying out their duties, they necessarily must interpret the general language of\n\nstatutes and regulations and apply them to concrete circumstances.",
"\n\n Cronen further contends that the defendants did not act in good faith. ",
"We must affirm the\n\ndecision of the district court unless we find a material issue of fact as to whether the defendants\n\nviolated \"clearly established statutory or constitutional right s of which a reasonable person would\n\nhave known.\" ",
"Harlow v. Fitzgerald, 457 U.S. 800, 818, 102 S.Ct. ",
"2727, 2738, 73 L.Ed.2d 396\n\n(1982) (emphasis added). ",
"This is an objective, rather than subjective, test.",
"\n\n Cronen makes several claims regarding his food stamp benefits. ",
"He first calls attention to 7\n\nC.F.R. § 273.9(d)(5)(i) (1992), which provides in part,\n\n ... Shelter costs shall include only the following: (A) Continuing charges for the shelter\n occupied by the household, including rent, mortgage, or other continuing charges leading to\n the ownership of the shelter such as loan repayments for the purchase of a mobile home,\n including interest on such payments.",
"\n\nCronen claims that he is entitled to a deduction for rent on his storage space and post office box and\n\nthat he can deduct the cost of the materials used to build his shacks and the transportation costs for\n\nthese materials as \"continuing charges leading to ownership.",
"\"7 Cronen also points to 7 C.F.R. §\n\n273.10(c)(3)(i) (1992), which states in part, \"Households, except destitute households, and PA\n\n[Public Assistance] households subject to a monthly reporting requirement, may elect to have income\n\n\n 7\n Cronen also claims he is entitled to a deduction for the cost of transportation between his\nproperty and the food stamp office. ",
"We agree with the defendants that there is no statutory or\nregulatory basis for such a deduction.",
"\n\faveraged.\" ",
"Cronen claims this provision allows him to elect income averaging and that the defendants\n\nprevented him from doing so.",
"\n\n We first consider whether the defendants violated any clearly established statutory or\n\nconstitutional rights. ",
"States participating in the food stamp program must follow the federal\n\nregulations. ",
"7 U.S.C.A. § 2014(b) (West 1988); 7 U.S.C.A. § 2020(e) (West 1988). ",
"If defendants\n\nrefused to follow well-established federal regulations, they would violate clearly established rights.",
"\n\n As far as Cronen's claims for shelter cost deductions are concerned, we cannot say the\n\ndefendants violated clearly established rights. ",
"The regulations do not specifically address Cronen's\n\nclaimed deductions. ",
"The defendants simply applied the general language to Cronen's circumstances.",
"\n\nQualified immunity was designed to protect just this sort of judgment. ",
"We express no opinion on the\n\nreasonableness of defendant's interpretation but hold only that neither these regulations, nor any other\n\nauthority, clearly establishes Cronen's right to the shelter cost deductions.",
"\n\n We reach a different conclusion when considering Cronen's claim that he was entitled to elect\n\nincome averaging. ",
"The language of the federal regulation allows Cronen to elect income averaging\n\nunless he is destitute or receiving public assistance. ",
"We find nothing in the record indicating that\n\neither exception applies to Cronen. ",
"The reports of the various caseworkers indicate that Texas will\n\nnot allow income averaging unless the claimant is self-employed or is eligible in the application month\n\nand ineligible the following month. ",
" The plain language of section 273.10(c)(3)(i) does not\n\ncontemplate such restrictions, and Texas has not offered any legal basis for imposing these additional\n\nrequirements. ",
"As an official colorably violates a clearly established right where he simply chooses\n\nnot to follow binding federal regulations, Cronen has produced sufficient evidence to survive\n\nsummary judgment.",
"\n\n Because Cronen has established the existence of a material issue of fact as to the violation of\n\nthe clearly established right to income-average, we also must consider whether the defendants\n\nreasonably should have known of the right. ",
"That, too, is a factual issue inappropriate for resolution\n\non summary judgment. ",
"There is evidence that the defendants did know, as Cronen provided\n\nphotocopies of the pertinent regulations to them. ",
"Cronen claims the defendants told him they were\n\fnot complying with the regulations and that one defendant even said they did not have to comply\n\ntherewith. ",
"Accordingly, as Cronen has presented ample evidence to raise a material issue of fact as\n\nto whether the individual defendants are entitled to qualified immunity, we vacate the summary\n\njudgment in their favor as to this issue only.",
"\n\n B.\n\n The district court did not address Cronen's claim for injunctive relief. ",
"Because we vacate and\n\nremand, we need not address this issue, which the district court should address on remand.",
"\n\n V.\n\n We AFFIRM the summary judgment in favor of Texas and the Texas Department of Human\n\nServices on the ground of Eleventh Amendment immunity. ",
"Intimating no view as to the ultimate\n\nresolution of the merits, we VACATE the summary judgment in favor of the individual defendants\n\nas to the income-averaging issue o nly and REMAND for further proceedings on that issue and\n\nAFFIRM the summary judgment in all other respects.",
"\n\f"
] | {
"pile_set_name": "FreeLaw"
} | [
0.0008487245650030673,
0.0013785817427560687,
0.0010930955177173018,
0.0007280868594534695,
0.0006937379948794842,
0.0008669449016451836,
0.0006869212375022471,
0.0008168214117176831,
0.0006394552765414119,
0.0006593189318664372,
0.000972315960098058,
0.0008270725957117975,
0.018740540370345116,
0.0010829142993316054,
0.0009522339096292853,
0.0007400325848720968,
0.0008171160006895661,
0.00063234445406124,
0.0006026432965882123,
0.0008552801446057856,
0.0006583252688869834,
0.0011519683757796884,
0.000619036378338933,
0.0006821136921644211,
0.0006522705079987645,
0.0005603082245215774,
0.0007887050160206854,
0.0007030211272649467,
0.0010230863699689507,
0.000686412793584168,
0.000746826350223273,
0.0007059476338326931,
0.0005757500766776502,
0.000703432597219944,
0.0008853394538164139,
0.0005712546990253031,
0.0007988460129126906,
0.0007250035996548831,
0.0006687766290269792,
0.0007739294087514281,
0.0012429648777469993,
0.0005688447854481637,
0.0007301588193513453,
0.0006659238133579493,
0.0006187608814798295,
0.0006685449625365436,
0.0006813301588408649,
0.0008512264466844499,
0.0007091833394952118,
0.0008043971029110253,
0.0010372980032116175,
0.0007267353939823806,
0.0006685953121632338,
0.0005926800658926368,
0.0011305834632366896,
0.000665418803691864,
0.0007851854315958917,
0.0005648499354720116,
0.0007199009414762259,
0.0006804888253100216,
0.0005587165942415595,
0.0008062972337938845,
0.0007385791395790875,
0.0006504193879663944,
0.0009493066463619471,
0.0010763161117210984,
0.0006463144673034549,
0.0006452774396166205,
0.0007254297379404306,
0.0008898238884285092,
0.000867741066031158,
0.0009758719243109226,
0.0008692066767252982,
0.0007332639070227742,
0.0007121673552319407,
0.000665075785946101,
0.0006851964863017201,
0.0007718053529970348,
0.0006823601434007287,
0.0007477111066691577,
0.000621771439909935,
0.0007644310826435685,
0.0005960586131550372,
0.0006973266135901213,
0.000599261955358088,
0.0006646917900070548,
0.0005751056596636772,
0.000690281915012747,
0.0007488859700970352,
0.0007649477338418365,
0.0006936417776159942,
0.0006031696102581918,
0.0033001569099724293,
0.0008324882364831865,
0.0006981774931773543,
0.0005741174099966884,
0.0005996781401336193,
0.0007317651761695743,
0.0006941109895706177,
0.0013318919809535146,
0.0006099388701841235,
0.0005821613012813032,
0.0033001569099724293,
0.0008324882364831865,
0.0006981774931773543,
0.0008226340287365019,
0.0007406329968944192,
0.0007002048077993095,
0.000656000105664134,
0.0006471449742093682,
0.0007124405819922686,
0.0008307065581902862,
0.000659522193018347,
0.0006345685687847435,
0.000631233851891011,
0.000749254017136991,
0.0007643218268640339,
0.0007480966742150486,
0.0010973613243550062,
0.0008439440280199051,
0.0006427846965380013,
0.0008628962677903473,
0.0007268406334333122,
0.0008786148391664028,
0.0007293090457096696,
0.0007140235975384712,
0.0006106086657382548,
0.0007908857660368085,
0.0008545243181288242,
0.0007386019569821656,
0.0007093623862601817,
0.0007971821469254792,
0.0013316390104591846,
0.0008531549829058349,
0.0007752337260171771,
0.0008886601426638663,
0.0005740777123719454,
0.0006391137139871716,
0.0007754989201202989,
0.0005969287594780326,
0.0007111253216862679,
0.0008827531128190458,
0.0007058060145936906,
0.0006415374809876084,
0.0008675795397721231,
0.0006472227396443486,
0.0005993013619445264,
0.0007876876625232399,
0.0008631039527244866,
0.0008181815501302481,
0.0007041824865154922,
0.0007165450369939208,
0.0009029468055814505,
0.0012800345430150628,
0.0007307557389140129,
0.001000028452835977,
0.09171659499406815,
0.000641226302832365,
0.000988762709312141,
0.0008018731023184955,
0.0007329030777327716,
0.0007722692098468542,
0.0005725193186663091,
0.0005619145813398063,
0.0007413758430629969,
0.0005661362083628774,
0.0008908355375751853,
0.0006351564079523087,
0.0007551921880804002,
0.0006980417529121041,
0.0006301164394244552,
0.0008714831783436239,
0.0006099086604081094,
0.0005893806810490787,
0.0008009345037862659,
0.0006700215744785964,
0.000556414423044771,
0.000590108276810497,
0.0007032740395516157,
0.0006593713769689202,
0.0007299800054170191,
0.0007959342910908163,
0.0006266786949709058,
0.0006325386348180473,
0.0006599894259124994,
0.0006327562150545418,
0.0008323652436956763,
0.0008319771732203662,
0.0005740139749832451,
0.0006492732791230083,
0.0006627880502492189,
0.0006236959015950561,
0.000666321546304971,
0.000615485361777246,
0.0006547861266881227,
0.0006700024241581559,
0.0009294176707044244,
0.0006984177161939442,
0.000691823021043092,
0.0006138181197457016,
0.001995444530621171
] | 0.001322 | 201 |
[
"Chamaco\n\nChamaco is a masculine given name and may refer to:\n\nChamaco Ramirez (1941–1983), Puerto Rican singer and composer\nChamaco Rivera (born 1946), Puerto Rican singer and composer\nChamaco Valaguez (born 1957), Mexican professional wrestler\n\nCategory:Masculine given names"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0007126008276827633
] | 0.000713 | 1 |
[
"Sunlight on Campaign Finance Disclosure\n\nJune 2, 2014, 2:30 p.m.\n\nThe recent Supreme Court decisions in the Citizens United and McCutcheon cases opened the door to an unfettered, unregulated influx of money into elections from corporations and labor unions. ",
"A first step in addressing the multitude of problems the decision created is disclosure. ",
"It is incumbent upon Congress to immediately create a robust, rapid transparency regime that takes full advantage of technology. ",
"This requires real-time, online transparency on every level of influence, from independent expenditures to lobbying to bundled campaign contributions.",
"\n\nNow that the Supreme Court has struck down overall contribution limits, the only remaining pillar of our campaign finance system is disclosure. ",
"Unfortunately, our current system of disclosure is not up to the task imposed by the Supreme Court. ",
"The Real Time Transparency Act Of 2014 is a crucial move toward a more transparent system that requires campaign contributions of $1,000 or more to candidates, committees and parties to be public within 48 hours."
] | {
"pile_set_name": "Pile-CC"
} | [
0.0006506586796604097,
0.00053686328465119,
0.0005842847749590874,
0.0005571451620198786,
0.0006673535681329668,
0.0006426845793612301,
0.0005581310833804309
] | 0.0006 | 7 |
[
"BC’s Oil and Gas Commission: A captured regulator Photo © Garth Lenz By Ben Parfitt\n\nIn June 2015 “in an effort to expedite” the building of a pipeline by Alliance Pipeline Ltd., a company called Synergy Land Services submitted falsified documents to British Columbia’s Oil and Gas Commission.",
"\n\nThe documents were deliberately altered to suggest that archaeological work was done at two sites when in fact it had only been done at one. ",
"Yet the imprimatur of the professional archaeologist somehow magically made it onto both documents.",
"\n\nTwo years later when the Commission (OGC) issued an “administrative finding” on the matter, it noted how Synergy’s “applications were altered to include different geographic areas and different purposes from the initial applications while retaining original signatures of the archeologist and Alliance’s company representative.”",
"\n\nFraud is a serious criminal matter. ",
"Under BC’s Oil and Gas Activities Act, which guides the OGC’s work, companies found to have submitted false or misleading documents may be liable to fines of up to half a million dollars.",
"\n\nSynergy subsequently laid the blame for what happened on a junior employee who didn’t know better. ",
"The employee was let go and the company allegedly altered its hiring practices to “add a training component on documentation expectations.”",
"\n\nWhile the OGC later said it was not satisfied that Synergy took “all reasonable steps” to ensure the fraud did not occur, it concluded that the company had done enough to prevent it happening again.",
"\n\nThe company was not even ordered to pay a token dime by way of a fine.",
"\n\nUnfortunately, this is not an isolated incident. ",
"When it comes to vigorously enforcing the rules, the OGC rarely does and today I published a report outlining this.",
"\n\nRegulatory failure\n\nIn just the past two-and-a-half years, three spectacular examples of regulatory failure by the OGC have surfaced.",
"\n\nIn May 2017, word surfaced that the OGC had allowed dozens of unlicensed dams to be built on its watch by fossil fuel companies that impounded massive amounts of water behind the structures to use in their controversial, earthquake-inducing fracking operations.",
"\n\nMany of those “illegal works” (two of the largest unlicensed dams were described as such by BC’s Environmental Assessment Office) were subsequently found to have serious design flaws that could have had deadly consequence for any oil and gas industry personnel or landowners working or living immediately downstream.",
"\n\nThen, in late fall 2017, it was learned that the OGC had knowledge of numerous gas wells that had failed and were leaking methane into groundwater. ",
"What did the OGC do with that knowledge? ",
"It hid it from the public for four years, only confirming it after a copy of its “internal” audit was leaked to an investigative reporter.",
"\n\nIn spring 2018, word surfaced about yet another damaging OGC audit. ",
"This one itemized how numerous oil and gas companies had violated operational rules aimed at protecting some of the most threatened caribou populations in the province. ",
"Once again, the OGC suppressed that information, only acknowledging it after it fell into outside hands.",
"\n\nThe worst that appears to have happened in all three cases involving multiple violations of provincial regulations is that the OGC ordered the offending companies to fix their mistakes.",
"\n\nSuch orders, however, are not official findings of wrongdoing—something that the OGC appears intent on avoiding.",
"\n\nTo demonstrate this, the BC office of the Canadian Centre for Policy Alternatives looked at 115 different enforcement actions posted on the OGC website. ",
"Fully 99 of those actions involved orders where no finding of guilt was made. ",
"Another two involved tickets. ",
"Only 14 involved administrative tribunals where harsher penalties could theoretically be meted out. ",
"Even then, they rarely were.",
"\n\nIn total, the penalties resulting from those 14 investigations totaled $92,750, a drop in the bucket compared to the more than $5 million in penalties that could have been levied.",
"\n\nCompeting interests\n\nFrom its advent 21 years ago to the present day, the OGC has outperformed on its key mandate of being a “single-window” agency that fast tracks industry development applications. ",
"But it has underperformed, spectacularly, when it comes to holding that same industry to account when it does wrong—as it all too frequently does. ",
"This suggests that the agency is captured by the industry it regulates, which is never a good thing as far as the public interest is concerned.",
"\n\nThis state of affairs will continue and likely get worse with a predicted rapid run-up in natural gas drilling and fracking operations that would be required if one or more liquefied natural gas plants materialize on BC’s coast.",
"\n\nThere is one effective way to reform the current state of affairs, something that both a former all-party committee of the provincial legislature recommended in the aquaculture or salmon-farming industry and that BC Auditor General Carol Bellringer more recently recommended for regulation of the province’s mining industry.",
"\n\nWhen regulators are essentially tasked with both expediting development applications and simultaneously policing the industry that it grants development approvals to, problems inevitably arise. ",
"Bellringer quite rightly concluded in the case of the mining sector that a provincial agency saddled with such a dual role was caught in an “irreconcilable conflict.”",
"\n\nTo end that conflict and restore public confidence, one agency should review and subsequently approve or deny industry applications. ",
"A second very separate agency should do the policing work and ensure that companies abide by the rules. ",
"When those rules are broken, it should fall to the stand-alone compliance and enforcement agency to determine what the appropriate penalties will be.",
"\n\nBritish Columbians deserve to see this simple yet vital reform enacted along with a handful of other reforms aimed at turning the OGC from an agency captured by the industry it regulates to one that more properly serves the people of the province.",
"\n\nTopics: Environment, resources & sustainability, Features, Fracking & LNG, Transparency & accountability"
] | {
"pile_set_name": "OpenWebText2"
} | [
0.0005966810276731849,
0.0005685832584276795,
0.0005959072150290012,
0.0005345926620066166,
0.03873340040445328,
0.001158948172815144,
0.0008795412722975016,
0.000701323093380779,
0.0007607582956552505,
0.0020681964233517647,
0.0006632625591009855,
0.0005672221886925399,
0.00073644780786708,
0.000691156426910311,
0.0006261380622163415,
0.0006647693808190525,
0.001248425804078579,
0.000639381178189069,
0.0005723943468183279,
0.0007527540437877178,
0.0007125906413421035,
0.0015068529173731804,
0.0010540280491113663,
0.0005415143095888197,
0.0009226130205206573,
0.0006375751690939069,
0.0006618630141019821,
0.0009498997242189944,
0.0006598469335585833,
0.0005888183950446546,
0.0006503632175736129,
0.0005856608040630817,
0.0010654863435775042,
0.0005490854964591563,
0.0005970365600660443,
0.0006284335977397859,
0.0005905517027713358,
0.0006798590766265988,
0.0006136070005595684,
0.0006338752573356032,
0.0006479112198576331
] | 0.001689 | 41 |
[
"Dedovo\n\nDedovo (Bulgarian: Дедово) is a village in the Rodopi Municipality of Bulgaria. ",
"It is located roughly 26 kilometers from Plovdiv, and because of its high altitude of around 1500 meters it offers cool temperatures to many people who own holiday homes there during the summer to escape the heat of the cities. ",
"The town comprises multiple cafés and shops.",
"\n\nReferences\n\nExternal links\n http://www.maplandia.com/bulgaria/plovdiv/dedovo/\n MAP\n Facebook\n\nCategory:Villages in Plovdiv Province"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0016304680611938238,
0.0006185972597450018,
0.0005982364527881145,
0.000579876359552145
] | 0.000857 | 4 |
[
"Basic Instinct\n\nBasic Instinct is a 1992 American neo-noir erotic thriller film directed by Paul Verhoeven and written by Joe Eszterhas, and starring Michael Douglas and Sharon Stone. ",
"The film follows a police detective, Nick Curran (Douglas), who is investigating the brutal murder of a wealthy rock star. ",
"During the investigation Curran becomes involved in a torrid and intense relationship with the prime suspect, Catherine Tramell (Stone), an enigmatic writer.",
"\n\nEszterhas developed the script in the 1980s, which became a subject of a bidding war until Carolco Pictures acquired the rights to the film. ",
"From there, Verhoeven signed on to direct and Douglas and Stone joined the project, after many actresses were considered the role of Tramell. ",
"Before its release, Basic Instinct generated heated controversy due to its overt sexuality and graphic depictions of violence, including a scene of rape. ",
"It was strongly opposed by gay rights activists, who criticized the film's depiction of homosexual relationships and the portrayal of a bisexual woman as a murderous psychopath. ",
"In a 2006 interview, Stone alleged that a scene in which her vulva was exposed as she crossed her legs was filmed without her knowledge.",
"\n\nBasic Instinct premiered in Los Angeles on March 18, 1992, and was released in the United States by TriStar Pictures on March 20, 1992. ",
"The film received mixed reviews from critics, who praised the performances of its cast, original score, and editing, but criticized its writing and character development. ",
"Despite initial mixed critical reception and public protest, Basic Instinct was a box office success, grossing $352 million worldwide, making it the fourth highest grossing film of 1992. ",
"Several versions of the film have been released on videocassette, DVD, and Blu-ray including a director's cut with extended footage previously unseen in North American cinemas. ",
"\n\nThe film has contemporarily been recognized for its groundbreaking depictions of sexuality in mainstream Hollywood cinema, and has been referred to by scholars as \"a neo-noir masterpiece that plays with, and transgresses, the narrative rules of film noir.\" ",
"A 2006 sequel, Basic Instinct 2, starred Stone and was made without Verhoeven's involvement, but received negative reviews from critics and was not particularly successful at the box office.",
"\n\nPlot\n\nIn San Francisco, homicide detective Nick Curran investigates the murder of retired rock star Johnny Boz, who has been brutally stabbed to death with an ice pick during sex with a mysterious blonde woman. ",
"Nick's only suspect is Boz's bisexual girlfriend, crime novelist Catherine Tramell, who has written a novel that mirrors the crime. ",
"It is concluded that either Catherine is the murderer or someone is attempting to frame her. ",
"Catherine is uncooperative and taunting during the investigation, smoking and exposing herself during her interrogation. ",
"She has an alibi and passes a lie detector test. ",
"Nick discovers Catherine has a history of befriending murderers, including her girlfriend Roxy, who killed her two younger brothers, on impulse, when she was sixteen years of age, and Hazel Dobkins, who killed her husband and children for no apparent reason.",
"\n\nNick, who accidentally shot two tourists while high on cocaine during an undercover assignment, attends counseling sessions with police psychologist Dr. Beth Garner, with whom he has an on and off affair. ",
"Nick discovers that Catherine is basing the protagonist of her latest book on him, wherein his character is murdered after falling for the wrong woman. ",
"Nick also learns that Catherine has bribed Lt. ",
"Marty Nielsen of Internal Affairs for information from Nick's psychiatric file and that Beth had previously given it to Nielsen after he threatened to recommend Nick's termination. ",
"Nick assaults Nielsen in his office, and later becomes a prime suspect when Nielsen is killed. ",
"Nick suspects Catherine, and when his behavior deteriorates, he is put on leave.",
"\n\nNick and Catherine begin a torrid affair with the air of a cat-and-mouse game. ",
"Nick arrives at a club and witnesses Catherine doing coke with Roxy and another man. ",
"Nick and Catherine dance and make out, and are later observed having violent sex in Catherine’s bed by Roxy. ",
"Catherine ties Nick to the headboard with a white silk scarf, just as Boz was tied by the mystery blonde, but does not kill him. ",
"Roxy, jealous of Nick, attempts to run him over with Catherine's car, but dies when the car crashes. ",
"Catherine grieves over Roxy's death and tells Nick about a previous lesbian encounter at college that went awry. ",
"She claims that the girl became obsessed with her, causing Nick to believe that Catherine may not have killed Boz. ",
"Nick identifies the girl as Beth, who acknowledges the encounter, but she claims it was Catherine who became obsessed. ",
"Additionally, Nick discovers that Beth and Catherine's college professor was also killed with an ice pick in an unsolved homicide, and that the events inspired one of Catherine's early novels.",
"\n\nNick comes across the final pages of Catherine's book in which the fictional detective finds his partner's body in an elevator. ",
"Catherine then breaks off their affair, causing Nick to become upset and suspicious. ",
"Nick later meets his partner Gus Moran, who has arranged to meet with Catherine's college roommate at an office building, hoping to reveal what really went on between Catherine and Beth. ",
"As Nick waits in the car, Gus is stabbed to death with an ice pick in the elevator. ",
"Recalling the last pages of Catherine’s book, Nick runs into the building, only to find Gus' body in a manner similar to the scene described. ",
"Beth turns up as if out of nowhere and explains that she received a message to meet Gus. ",
"Nick suspects Beth has murdered Gus and, believing that she is reaching for a gun, shoots her, but discovers that Beth was only fingering an ornament on her key chain.",
"\n\nEvidence collected in Beth's apartment reveal her as the killer of Boz, Nielsen, Moran, and her own husband, along with collections of photos and newspaper clippings of Catherine that imply an obsession with her. ",
"Nick is left confused and dejected. ",
"He returns to his apartment where Catherine meets him. ",
"She explains her reluctance to commit to him and the two have sex. ",
"As they discuss their future, an ice pick is revealed to be under the bed.",
"\n\nCast\n\n Michael Douglas as Detective Nick Curran\n Sharon Stone as Catherine Tramell\n George Dzundza as Detective Gus Moran\n Jeanne Tripplehorn as Dr. Beth Garner\n Denis Arndt as Lieutenant Phillip Walker\n Leilani Sarelle as Roxanne \"Roxy\" Hardy\n Bruce A. Young as Andrews\n Chelcie Ross as Captain Talcott\n Dorothy Malone as Hazel Dobkins\n Wayne Knight as John Correli\n Daniel von Bargen as Lieutenant Marty Nielsen \n Stephen Tobolowsky as Dr. Lamott\n Benjamin Mouton as Harrigan\n Jack McGee as Sheriff\n Bill Cable as Johnny Boz\n James Rebhorn as Dr. McElwaine\n\nProduction\nThe screenplay, written in the 1980s, was popular enough to prompt a bidding war; it was eventually purchased by Carolco Pictures, for a reported US$3 million. ",
"Eszterhas, who had been the creative source for several other blockbusters, including Flashdance (1983) and Jagged Edge (1985), wrote the film in 13 days. ",
" Paul Verhoeven had suggested changes to the script that Eszterhas disagreed with, one of which included a lesbian sex scene that Eszterhas called \"exploitative.\" ",
"With Verhoeven unwilling to budge, Joe Eszterhas and producer, Irwin Winkler, left over creative differences. ",
"\n\nGary Goldman was subsequently hired to do four different re-writes of the script, at the advice of Paul Verhoeven. ",
"After the fourth re-write, Verhoeven admitted his proposals were \"undramatic\" and \" really stupid\", and by the fifth draft, the script had been reverted back to Eszterhas' original, with minor visual and dialogue changes. ",
"Joe Eszterhas received sole writing credit for the film.",
"\n\nIn preparation for the car chase scene, Douglas reportedly drove up the steps on Kearny Street in San Francisco for four nights by himself. ",
"Douglas recommended Kim Basinger for the role of Catherine Tramell, but Basinger declined. ",
"He also proposed Julia Roberts, Greta Scacchi and Meg Ryan, but they also turned down the role, as did Michelle Pfeiffer, Geena Davis, Kathleen Turner, Ellen Barkin, and Mariel Hemingway. ",
"Verhoeven considered Demi Moore. ",
"Stone, who was eventually selected for the role, was a relative unknown until the success of this film, but had previously worked with Verhoeven on Total Recall. ",
"She was paid $500,000, a minimal amount considering the film's extensive production budget. ",
"Michael Douglas was determined to have another A-list actress starring in the movie with him, worried to take the risk on his own, he's quoted saying, \"I need someone to share the risks of this movie,\" he insisted. \"",
"I don't want to be up there all by myself. ",
"There's going to be a lot of s*** flying around.\"",
"\n\nFilming in San Francisco was attended by gay and lesbian rights activists and demonstrators, and San Francisco Police Department riot police were present at every location daily to deal with the crowds. ",
"Protesters outside of filming locations held signs that said \"Honk if you love the 49ers\" and \"Honk if you love men\". ",
"The protesters brought lasers and whistles with them as well in order to interfere with the filming. ",
"Even though the police were there on set and a restraining order was in place, producer, Alan Marshall, had to individually pick out each protester he wanted arrested. ",
"This resulted in chaos on set, leading to a citizen's arrest on Alan Marshall. ",
"The arrest didn't lead to anything with the local police department. ",
"\n\nIn the scene in which Stone's vulva was exposed on camera as she crossed her legs, Stone claimed to believe that the character's not wearing underwear would only be alluded to and not shown. ",
"She said she had been wearing white underwear until Verhoeven said they reflected light on the camera lens and asked her to take them off, assuring her that only shadow would be visible. ",
"Stone said that it was not until she saw the film in a screening room with a test audience that she became aware of it, leading her to slap Verhoeven in the face and leave the screening. ",
"However, Verhoeven strongly denied her claim, and said she was fully aware in advance that her vulva would be filmed.",
"\n\nSoundtrack\n\nThe film score to Basic Instinct was composed by Jerry Goldsmith, and garnered him nominations for an Academy Award and a Golden Globe Award. ",
" Goldsmith said, \"Basic Instinct was probably the most difficult I've ever done. ",
"It's a very convoluted story with very unorthodox characters. ",
"It's a murder mystery, but it isn't really a murder mystery. ",
"The director, Paul Verhoeven, had a very clear idea of how the woman should be, and I had a hard time getting it. ",
"Because of Paul pushing me, I think it's one of the best scores I've ever written. ",
"It was a true collaboration.\"",
"\n\nApart from the score, professionally released music did not play a major part in the film. ",
"The scene in which source music plays a prominent role occurs during the club scene; Curran, Tramell, and Roxy are seen at Downtown San Francisco. ",
"It features \"Blue\" by Chicago house music performer LaTour and \"Rave the Rhythm\" by the group Channel X. It also features \"Movin' on Up\" by Jeff Barry and Ja'Net DuBois.",
"\n\nThe soundtrack was released on March 17, 1992. ",
"A considerably expanded release of Goldsmith's score, featuring previously omitted sections and alternative compositions of certain elements, was issued by Prometheus Records in 2004.",
"\n\nOriginal Motion Picture Soundtrack\n \"Main Title (Theme from Basic Instinct)\" – 2:13\n \"Crossed Legs\" – 4:49\n \"Night Life\" – 6:03\n \"Kitchen Help\" – 3:58\n \"Pillow Talk\" – 4:59\n \"Morning After\" – 2:29\n \"The Games Are Over\" – 5:53\n \"Catherine's Sorrow\" – 2:41\n \"Roxy Loses\" – 3:37\n \"An Unending Story\" – 7:56\n\nThe Complete Original Motion Picture Soundtrack\n \"Main Title\" – 2:13\n \"First Victim\" – 1:39\n \"Catherine & Roxy\" – 5:14\n \"Shadows\" – 0:41\n \"Profile\" – 0:49\n \"Don't Smoke\" – 2:26\n \"Crossed Legs\" – 4:49\n \"Beth & Nick\" – 2:21\n \"Night Life\" – 6:03\n \"Home Visit\" – 1:13\n \"Your Wife Knew\" – 1:44\n \"Untitled\" – 0:52\n \"That's Real Music\" – 0:27\n \"One Shot\" – 1:27\n \"Kitchen Help\" – 3:58\n \"Pillow Talk\" – 4:59\n \"Morning After\" – 2:29\n \"Roxy Loses\" – 3:37\n \"Catherine's Sorrow\" – 2:41\n \"Wrong Name\" – 2:22\n \"She's Really Sick\" – 1:31\n \"It Won't Sell\" – 1:02\n \"Games Are Over\" – 5:53\n \"Evidence\" – 1:39\n \"Unending Story / End Credits\" – 9:23\n \"First Victim\" (alternate version) – 1:34\n\nDistribution\n\nThe film was entered into the 1992 Cannes Film Festival.",
"\n\nMPAA rating\nBasic Instinct is rated R for \"strong violence and sensuality, and for drug use and language\". ",
"It was initially given a commercially restrictive NC-17 rating by the MPAA for “graphic depictions of extremely explicit violence, sexual content, and strong language”, but under pressure from TriStar and Carolco, Verhoeven cut 35–40 seconds to gain an R rating. ",
"Verhoeven described the changes in a March 1992 article in The New York Times: \nThe film was subsequently re-released in its uncut format on video and later on DVD.",
"\n\nHome media\nFollowing the theatrical version, the film was first released in its uncut format in an unrated version onto video in 1992, running at 129 minutes. ",
"This was followed by a DVD release in 1997, in a \"barebones\" format that contained the R-rated version. ",
"A Collector's Edition was released on DVD in 2001, containing the uncut version of the film with a commentary by Camille Paglia and a small ice-pick (the villain's weapon of choice). ",
"This version of the film, running 127 minutes, was re-released twice: in 2003 and 2006.",
"\n\nIn March 2006, the unrated version (also known as the Director's Cut) was re-released on DVD and labeled as the Ultimate Edition. ",
"In 2007, the film was released on Blu-ray with the Director's Cut label.",
"\n\nThe film was cut by 35–40 seconds to avoid an NC-17 rating on its theatrical release in 1992, with some violence and sexually explicit content removed. ",
"The missing or censored material (later released on video and DVD unrated as the director's cut) included:\n The murder of Johnny Boz in the opening scene. ",
"In the director's cut, the killer is seen stabbing him in his neck, in the chest, and through his nose. ",
"In addition, Tramell is still having violent sex with him while stabbing him at the same time.",
"\n The scene where Nick has sex with Beth is cut in the US theatrical version, as he is seen ripping off her clothes and forcing her over the couch, before a cut to the two of them lying on the floor. ",
"In the uncut version they are seen having rougher sex.",
"\n The scene where Nick and Tramell have sex after going to the club is longer and much more explicit in the uncut version.",
"\n\nReception\n\nBox office\nBasic Instinct opened in theaters in the United States and was one of the highest-grossing films of 1992, after its March 29 release. ",
"In its opening weekend, the film grossed $15 million. ",
"It was the fourth highest-grossing film of 1992, grossing $352,927,224 worldwide.",
"\n\nCritical response\nThe film's critical reaction was mixed. ",
"On Rotten Tomatoes, the film holds a score of 53% based on 62 reviews, with an average rating of 5.8/10 and the consensus: \"Unevenly echoing the work of Alfred Hitchcock, Basic Instinct contains a star-making performance from Sharon Stone, but is ultimately undone by its problematic, overly lurid plot.\" ",
"On Metacritic the film holds a score of 41 based on 28 critics, indicating \"mixed or average\" reviews. ",
"Audiences polled by CinemaScore gave the film an average grade of \"B+\" on an A+ to F scale.",
"\n\nJanet Maslin of The New York Times praised the film, saying \"Basic Instinct transfers Mr. Verhoeven's flair for action-oriented material to the realm of Hitchcockian intrigue, and the results are viscerally effective even when they don't make sense.\" ",
"Peter Travers of Rolling Stone also praised the film, saying it was a guilty pleasure film; he also expressed admiration for Verhoeven's direction, saying \"[his] cinematic wet dream delivers the goods, especially when Sharon Stone struts on with enough come-on carnality to singe the screen,\" and praised Stone's performance: \"Stone, a former model, is a knockout; she even got a rise out of Ah-nold in Verhoeven's Total Recall. ",
"But being the bright spot in too many dull movies (He Said, She Said; Irreconcilable Differences) stalled her career. ",
"Though Basic Instinct establishes Stone as a bombshell for the Nineties, it also shows she can nail a laugh or shade an emotion with equal aplomb.\"",
"\n\nThe international critical reception was favorable, with Australian critic Shannon J. Harvey of the Sunday Times calling it one of the \"1990s['] finest productions, doing more for female empowerment than any feminist rally. ",
"Stone – in her star-making performance – is as hot and sexy as she is ice-pick cold.\"",
"\n\nThe film was not without its detractors. ",
"Roger Ebert of the Chicago Sun-Times dismissed the film, giving it two out of four stars, stating that the film is well-crafted, yet dies down in the last half hour: \"The film is like a crossword puzzle. ",
"It keeps your interest until you solve it. ",
"Then it's just a worthless scrap with the spaces filled in.\" ",
"Dave Kehr of the Chicago Tribune also gave a negative review, calling it psychologically empty: \"Verhoeven does not explore the dark side, but merely exploits it, and that makes all the difference in the world.\"",
"\n\nAccolades\n\nControversy\nThe film generated controversy due to its overt sexuality and graphic depictions of violence, including a scene of rape. ",
"During principal photography, the film was protested against by gay rights activists who felt that the film followed a pattern of negative depiction of homosexuals in film. ",
"Members of the lesbian and bisexual activist group LABIA protested against the film on its opening night. ",
"Others also picketed theatres to dissuade people from attending screenings, carrying signs saying \"Kiss My Ice Pick\", \"Hollywood Promotes Anti-Gay Violence\" and \"Catherine Did It!\"/\"Save Your Money—The Bisexual Did It\". ",
"Verhoeven himself defended the groups' right to protest, but criticized the disruptions they caused, saying \"Fascism is not in raising your voice; the fascism is in not accepting the no.\"",
"\n\nFilm critic Roger Ebert mentioned the controversy in his review, saying \"As for the allegedly offensive homosexual characters: The movie's protesters might take note of the fact that this film's heterosexuals, starting with Douglas, are equally offensive. ",
"Still, there is a point to be made about Hollywood's unremitting insistence on typecasting homosexuals—particularly lesbians—as twisted and evil.\" ",
"Camille Paglia denounced gay activist and feminist protests against Basic Instinct, and called Sharon Stone's performance \"one of the great performances by a woman in screen history\", praising her character as \"a great vamp figure, like Mona Lisa herself, like a pagan goddess\".",
"\n\nThe film was also widely criticized for glamorizing cigarette smoking. ",
"Screenwriter Joe Eszterhas was later diagnosed with throat cancer and publicly apologized for glamorizing smoking in his films.",
"\n\nReferences\n\nExternal links\n\n \n \n \n \n\nCategory:1992 films\nCategory:1990s crime thriller films\nCategory:1990s erotic films\nCategory:1990s LGBT-related films\nCategory:1990s mystery thriller films\nCategory:1990s psychological thriller films\nCategory:1990s romance films\nCategory:American crime thriller films\nCategory:American erotic thriller films\nCategory:American films\nCategory:American LGBT-related films\nCategory:American mystery thriller films\nCategory:American psychological thriller films\nCategory:American romantic thriller films\nCategory:Carolco Pictures films\nCategory:English-language films\nCategory:Erotic mystery films\nCategory:Erotic romance films\nCategory:Female bisexuality in film\nCategory:1990s feminist films\nCategory:Film controversies\nCategory:Films about murderers\nCategory:Films about narcissism\nCategory:Films about psychopaths\nCategory:Films about rape\nCategory:Films about writers\nCategory:Films directed by Paul Verhoeven\nCategory:Films scored by Jerry Goldsmith\nCategory:Films set in San Francisco\nCategory:Films shot in San Francisco\nCategory:LGBT-related romance films\nCategory:LGBT-related thriller films\nCategory:American neo-noir films\nCategory:Obscenity controversies in film\nCategory:Police detective films\nCategory:Films with screenplays by Joe Eszterhas\nCategory:StudioCanal films\nCategory:TriStar Pictures films\nCategory:American feminist films"
] | {
"pile_set_name": "Wikipedia (en)"
} | [
0.0010076852049678564,
0.0016270416090264916,
0.0007999935769475996,
0.0006447259802371264,
0.0008019873639568686,
0.010214138776063919,
0.16227829456329346,
0.024499105289578438,
0.0006226006662473083,
0.0005925207515247166,
0.0008239673334173858,
0.0005766057292930782,
0.001133045880123973,
0.0007565337582491338,
0.22422128915786743,
0.005484967492520809,
0.0031192537862807512,
0.025823893025517464,
0.00357168004848063,
0.028361031785607338,
0.021047577261924744,
0.0010737363481894135,
0.002290385542437434,
0.0008123638690449297,
0.00631720433011651,
0.005637720692902803,
0.012209557928144932,
0.001480859937146306,
0.30930787324905396,
0.009597759693861008,
0.1094963476061821,
0.007086305879056454,
0.008335529826581478,
0.0008318551117554307,
0.0006625777459703386,
0.0008706244989298284,
0.015117070637643337,
0.000682035053614527,
0.11248096078634262,
0.0007365710334852338,
0.000885184679646045,
0.04265604168176651,
0.0008947235182859004,
0.0010805483907461166,
0.0008618285646662116,
0.12846678495407104,
0.0008256331784650683,
0.0010990273440256715,
0.0006445766775868833,
0.007125766482204199,
0.0007737166597507894,
0.000661881931591779,
0.011961189098656178,
0.0006462337914854288,
0.000648398301564157,
0.0008198164869099855,
0.0007273128721863031,
0.0008979407139122486,
0.0006258970825001597,
0.0007246669265441597,
0.0006462121964432299,
0.008002963848412037,
0.2727344334125519,
0.002821496454998851,
0.0016798322321847081,
0.0007887152023613453,
0.00089103082427755,
0.0009105491917580366,
0.0007712951046414673,
0.0013213708298280835,
0.0015045976033434272,
0.038300856947898865,
0.015189263969659805,
0.0006063036271370947,
0.0007089427672326565,
0.0007741499575786293,
0.0009841996943578124,
0.0008048214367590845,
0.0005842674872837961,
0.0005752603174187243,
0.0006150505505502224,
0.0005711820558644831,
0.000632509880233556,
0.0005915448418818414,
0.0005762862274423242,
0.0033240183256566525,
0.000889686169102788,
0.0008474499336443841,
0.0006178339244797826,
0.0005661192699335515,
0.0006597853498533368,
0.0006886448245495558,
0.0006212317966856062,
0.0007014059810899198,
0.0007189842872321606,
0.0008866869029588997,
0.0007217924576252699,
0.052148621529340744,
0.9326756596565247,
0.08206135779619217,
0.47546854615211487,
0.01810624450445175,
0.0006146833766251802,
0.0006949164671823382,
0.0008691251277923584,
0.000617336540017277,
0.0008075909572653472,
0.0007301620207726955,
0.0007647954626008868,
0.0006263180985115469,
0.0007688283803872764,
0.0014712134143337607,
0.0006597937899641693,
0.0007745129987597466,
0.02516717091202736,
0.0012726705754175782,
0.0006982946069911122,
0.0006743212579749525,
0.0025126785039901733,
0.000914445030502975,
0.009062052704393864,
0.015199159272015095,
0.002649590838700533,
0.05250168219208717,
0.00190305570140481,
0.005356744863092899,
0.38209694623947144,
0.0029921559616923332,
0.02791786380112171,
0.04335641488432884,
0.0018564827041700482
] | 0.029289 | 131 |
[
"1. ",
"Field of the Invention\nThe present invention relates to an electromagnetic field intensity computing apparatus for computing the intensity of the electromagnetic field of an electric circuit device based on the moment method.",
"\n2. ",
"Description of the Related Art\nSince an unnecessary electric wave emitted by an electric circuit device interferes with TV, radio, or other electric waves, various strict restrictions have been put in place in many countries. ",
"For example, Japan has issued the VCCI Standard, the U.S. has issued the FCC Standard, and Germany has issued the VDE Standard.",
"\nTo meet such electric wave restrictions, various actions should be taken using shielding technologies, filtering technologies, etc. ",
"Accordingly, it is necessary to quantitatively simulate these actions to determine the extent to which extent the electric wave can be reduced. ",
"Since the simulation of the electromagnetic analysis requires a long process time using a computer, it is necessary to prepare a high-speed and high-precision computing apparatus to compute the intensity of the electromagnetic field of an electric circuit device.",
"\nIn a method of computing the electromagnetic field intensity, the electromagnetic field intensity of an object can be easily computed by a well-known logic equation, given a current flowing through each portion of the object. ",
"The current value can be logically obtained by solving the Maxwell equations (electromagnetic wave equations) under given conditions. ",
"However, no exact solution has been obtained by equations under complicated boundary conditions on an object of an optional shape.",
"\nTherefore, any solution for obtaining the current used by the electromagnetic field intensity computing apparatus refers to, more or less, an approximation. ",
"A typical approximate computation can be a small loop antenna approximation, a distributed constant line approximation, or a moment method.",
"\nIn the small loop antenna approximation method, the wiring connecting the wave source circuit and the load circuit is treated as a loop antenna. ",
"In this approximation, the current through the loop is assumed to be flat and computed by the method of computing the concentrated constant circuit.",
"\nFIGS. ",
"1A and 1B illustrate the small loop antenna approximation.",
"\nFIG. ",
"1A shows a circuit model comprising a driver 10 that is a wave source circuit; a receiver 11 that is a load circuit; a wiring 14 connecting the driver 10 to the receiver 11, and a dielectric portion 12 inserted between the grounding wire layer 13 and wiring 14.",
"\nIn FIG. ",
"1A, the distance between the driver 10 and receiver 11 is l and the distance between the wiring 14 and the grounding wire layer 13 is h.\nFIG. ",
"1B is a diagram showing the equalizing circuit of the circuit model shown in FIG. ",
"1A.\nIn FIG. ",
"1B, the driver 10 is represented by an equalizing circuit comprising a power source V, resistor R.sub.1, and capacitor C.sub.1. ",
"The receiver 11 can be represented by an equalizing circuit comprising a capacitor C.sub.2.",
"\nA line current I flows as a loop as shown in FIG. ",
"1B. The area of the loop is represented by S (=lh). ",
"The straight line below the line current I shown at the upper portion in FIG. ",
"1B indicates that the line current I is constant (flat) regardless of the position of the line.",
"\nThe line current I can be computed through a concentrated constant circuit comprising the equalizing circuit of the driver 10 and receiver 11 by the following equation (1). ##",
"EQU1##\nThen, using the line current I computed by the above equation (1), a radial electromagnetic field E is computed by the following approximation (2). ##",
"EQU2##\nAs described above, the computation according to the small loop antenna approximation involves a very simple equation, and the computation can be performed at a high speed.",
"\nHowever, since the line current I is assumed to be constant on the line, the current distribution on the line varies when the frequency f refers to a high frequency, thereby considerably lowering the precision.",
"\nThus, the computation using the small loop antenna approximation is the simplest method of all the above listed approximations, but in practice it is not used at all because it is inferior in precision if the size of the loop cannot be ignored when compared with the wave length of the electromagnetic wave.",
"\nThe distributed constant circuit approximation refers to a method of considering the current distribution to improve the precision.",
"\nThe distributed constant circuit approximation refers to a method of obtaining a current value by applying the equation of the distributed constant line to an object to be represented as a one-dimensional structure by an approximation.",
"\nThe computation can be easily done in this method. ",
"The computation time and storage capacity are increased in proportion to the number of analysis elements. ",
"Furthermore, the analysis is made including the reflection and resonance of a line, etc. ",
"Therefore, in the distributed constant circuit approximation, a high-speed and high-precision analysis can be made on an object to which a one-dimensional approximation can be applied.",
"\nFIGS. ",
"2A and 2B show the above described distributed constant line approximation.",
"\nThe circuit model shown in FIG. ",
"2A is the same as that shown in FIG. ",
"1A, and the detailed description is omitted here.",
"\nFIG. ",
"2B shows the equalizing circuit of the circuit shown in FIG. ",
"2A.\nIn FIG. ",
"2B, the equalizing circuit of the driver 10 and receiver 11 is the same as that shown in FIG. ",
"1B.\nWhen the frequency f becomes high and the wave length .lambda. ",
"becomes shorter than the line length l in FIG. ",
"2A, a standing wave current flows through the line and the distribution of the current varies with the line position. ",
"In FIG. ",
"2B, for instance, the value of the line current I is larger on the driver 10 side while the value of the line current I is smaller on the receiver 11 side. ",
"The value of the line current I at a certain point is represented by I(x) while the voltage at a certain point is represented by V(x), where x indicates a variable representing the distance from the receiver 11, that is, the origin (x=0). ",
"The driver 10 refers to (x=L).",
"\nIn FIG. ",
"2B, \"Zo\" indicates a characteristic impedance in a distributed constant line. \"",
"Z.sub.",
"L \" indicates a characteristic impedance at the receiver 11. ",
"`.beta.",
"` indicates a wave number and is represented by (.beta.=.omega./c=2.pi./.lambda.). ",
"The wave length .lambda. ",
"is represented by (.lambda.=c/f). ",
"The `c` indicates the velocity of light.",
"\nThe current distribution I(x) of the line can be obtained by the following equation (3). ##",
"EQU3##\nAs described above, the computation done using the distributed constant line approximation allows a high-speed and high-precision analysis to be made on an object to be processed as a one-dimensional structure by an approximation.",
"\nHowever, some objects that cannot be processed as one-dimensional structures by an approximation are not analyzed.",
"\nThe moment method is one of the solutions of an integral equation derived from the Maxwell electromagnetic wave equations, and can process a 3-dimensional object. ",
"In this method, an object is divided into small elements to compute an electric current.",
"\nThus, since a 3-dimensional object can be processed by the moment method, an electromagnetic field intensity computing apparatus for computing the electromagnetic field intensity of an electric circuit device does computation mainly by the moment method.",
"\nIn the computation by the moment method, a metal portion to be analyzed is divided into a mesh form to obtain a mutual impedance Zij among the divided metal portions. ",
"Then, the following moment equation, which governs the mutual impedance Zij, wave source Vi, and electric current Ii flowing through the divided metal portions, is solved to obtain a current value EQU [Zij][Ii]=[Vi] (4)\nUsing the computation result, the electromagnetic field intensity can be obtained. ",
"The \"[ ]\" in equation (4) indicates a matrix.",
"\nThe following reference 1 describes the above mentioned moment method.",
"\nH. N. Wang, J. H. Richmond and M. C. Giilreath:\n\"Sinusoidal reaction formulation for radiation and scattering from conducting surface\", IEEE TRANSACTIONS ANTENNAS PROPAGATION, vol. ",
"AP-23, 1975\nAs described above, a current value cannot be obtained in the distributed constant line approximation when an object cannot be processed as a one-dimensional structure. ",
"Therefore, the entire device including the printed board and the housing cannot be analyzed.",
"\nIn the moment method, the entire electric circuit device including the printed board and the housing can be analyzed.",
"\nHowever, the method has the following problems (1) through (5).",
"\n(1) When the size of the device to be analyzed becomes large, the amount of computation also becomes large. ",
"Therefore, the analysis cannot be made within a practical period of time using a current computer.",
"\n(2) The conventional electromagnetic field intensity computing apparatus uses the moment method with dielectric portions on the printed board in the electric circuit device divided into a mesh form to obtain simultaneous equations using, and with the equalizing current and magnetic current flowing on the surface set as unknown values.",
"\nTherefore, a greater number of patches forming a mesh requires a longer time in solving the simultaneous equations in the moment method and also requires a large memory capacity.",
"\n(3) A long time is required in computing the immittance matrix elements among the divided surface patches in a mesh form.",
"\n(4) The above mentioned mutual impedance Zij has been computed using a double-precision real number to perform a high-speed operation. ",
"However, this computation cannot output an exact value of the mutual impedance Zij.",
"\nIn detail, in the computation using the double-precision real numbers, lower-order significant numbers are lost when performing multiplication. ",
"Therefore, computing the mutual impedance Zij in this method may result in the loss of digits when the electric length (length in emitted magnetic wave length units) of the metallic mesh becomes short. ",
"As a result, the mutual impedance Zij cannot be obtained exactly.",
"\n(5) The cable pigtail portion (terminating unit of a cable) applicable to the moment method has not been appropriately developed to analyze the electromagnetic radiation from the cable pigtail.",
"\nTo solve the above listed problem (1), in the Japanese Patent Application Number 6-27109, the Applicant of the present invention has suggested a method of computing current distribution by dividing an electric circuit device to be analyzed into a portion to which the distributed constant line approximation can be applied and a portion to which the approximation cannot be applied, and by computing the current distribution in the distributed constant line approximation for the applicable portion and computing the current distribution in the moment method for the inapplicable portion.",
"\nTo solve the problem (2), in the Japanese Patent Application Number 6-95363, the Applicant of the present invention has suggested a computing method in which a capacitance model of a transmission line is designed and a dielectric portion is converted into a capacitor having the capacity .DELTA.C=C.sub.0 (.epsilon. ",
"eff-1) per unit length. ",
"In this method, C.sub.0 indicates the capacity per unit length, in a vacuum, of the metallic pattern having the dielectric portion inserted. \"",
".epsilon. ",
"eff\" indicates an effective dielectric constant.",
"\nThe method (Japanese Patent Application Number 6-27109) obtained by combining the above described distributed constant line approximation with the moment method, and the method (Japanese Patent Application Number 6-95363) for the capacitance model of a transmission line have been only effective in a circuit of an electric current through a transmission line.",
"\nAs a method of reducing the computation time for immittance matrix elements among the surface patches, the method disclosed by the following reference 2 has been conventionally used.",
"\nE. H. Newman and D. M. Pozar:\n\"Considerations for Efficient Wire/Surface Modelling\" IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION vol. ",
"AP-28, No.1, JANUARY 1980 (reference 2)\nIn the above mentioned reference 2, if relative positions are equal to each other between the surface patches on a plate to be analyzed, then the mutual impedances are also equal to each other. ",
"Thus, the mutual impedance is computed between the patches having unique relative positions. ",
"The result is used for the matrix elements having similar relative positions.",
"\nHowever, in the method described by the reference 2, only the relative positions of the patches on a single board are referred to, but this method does not disclose the reduction of the amount of computation by analyzing the relative positional relationships among the patches on a plurality of plates.",
"\nSince the plate to be analyzed can be in various forms, the method of extracting the patches having equal relative positional relationships on one or more plates and then automatically detecting from among them the patches having unique relative positional relationships has not been developed yet. ",
"Therefore, much time and labor have been required to check the relative positional relationships among the patches and extract the relative positions.",
"\nTo solve the problem (4), in the Japanese Patent Application Number 6-95362, the Applicant of the present invention has suggested a computing method in which a normal computing unit and high-precision computing unit are provided to compute the mutual impedance to obtain the electromagnetic field intensity. ",
"The high-precision computing unit is used when it is anticipated by checking the wave length, element length, and distance that there is a possibility to lose digits.",
"\nThe above described high-precision computation can be done using real numbers of multiple-precision and using multiple-length integers. ",
"In either computation, since the number of digits increases, the computation time is greatly extended.",
"\nFinally, the above described problem (5) is explained in detail.",
"\nAn object to be analyzed by the electromagnetic field intensity computing apparatus can be a housing, a printed substrate and a cable of an electric circuit device. ",
"The electric wave radiation from the cable is mainly caused by the pigtail, that is, the terminal processing unit of a cable.",
"\nFIGS. ",
"3A through 3C show the radiation mechanism from the pigtail.",
"\nIn FIG. ",
"3A, 20 is a coaxial cable, and 21 is a housing of the electric circuit device.",
"\nWhen the read wire of a pigtail portion is long and the pigtail portion is not shielded, a common mode current I.sub.3 is induced when the electromagnetic field generated by line currents I.sub.1 and I.sub.2 as shown in FIG. ",
"3A is radiated onto the shielded portion of the coaxial cable 20.",
"\nIn this case, the line current I.sub.1 is almost equal to the line current I.sub.2 (I.sub.1.apprxeq.",
"I.sub.2), and the differential mode offsets the electric wave radiation. ",
"However, the common code current I.sub.3 is not offset. ",
"Accordingly, the common code current I.sub.3 causes a serious electric wave.",
"\nIn the case shown in FIG. ",
"3A, the conventional method of computing the electromagnetic field intensity is the method shown in FIG. ",
"3B. In this method, the value of the electric wave radiation is computed by equivalently computing the voltage V generated on the lead line of the pigtail portion and designing an antenna to be inserted between the housing 21 and the coaxial cable 20.",
"\nThe equivalent circuit is shown in FIG. ",
"3C. In FIG. ",
"3C, Zin indicates an impedance in the coaxial cable 20. ",
"Z1 indicates the impedance in a pigtail lead line. ",
"Ra indicates the radiation resistor from the coaxial cable 20. ",
"An antenna structure is generated using the housing 21 of the electric circuit device as a ground to generate an electric wave.",
"\nFIGS. ",
"4A and 4B show the problems in calculating the electromagnetic field intensity of the pigtail portion.",
"\nAs shown in FIG. ",
"4A, when a load Z0 is connected to the tip of the coaxial cable 20 of a device, the device has a pigtail portion also at a load unit. ",
"This may cause further electromagnetic wave radiation. ",
"In this case, no housing is provided at the tip of the coaxial cable 20. ",
"Therefore, no antenna model can be produced.",
"\nThus, the electric current flowing through the lead line may be analyzed by the moment method without producing an antenna model. ",
"At this time, the following problems (a) through (c) should be solved.",
"\n(a) How is the shield of the thick and cylindrical coaxial cable 20 connected to a thin pigtail lead line 22?",
"\n(b) How is the coaxial cable 20 connected to the housing 21 if the coaxial cable 20 is directly connect ed to the housing?",
"\n(c) The electric current through the shield of the coaxial cable 20 normally flows in parallel with the cable, but flows toward a pigtail lead line 22 when the current approaches the pigtail, and changes its flow from the parallel to vertical direction as shown in FIG. ",
"41. ",
"How is the current represented and processed?",
"\nAs described above, the electromagnetic field intensity computing apparatus for computing the electromagnetic field intensity of an electric circuit device according to the moment method conventionally has the above listed problems (1) through (5). ",
"To solve the problems, the Applicant of the present invention has suggested the above described solution.",
"\nHowever, the suggested solution has been insufficient to precisely compute the electromagnetic field intensity at a high speed."
] | {
"pile_set_name": "USPTO Backgrounds"
} | [
0.0009391900966875255,
0.0005830889567732811,
0.001185585861094296,
0.0005899848765693605,
0.0005736756720580161,
0.000581414089538157,
0.0006666266708634794,
0.0005577678675763309,
0.0005693785496987402,
0.0005694414721801877,
0.0005941720446571708,
0.0005642450996674597,
0.0005827805725857615,
0.0006020485307089984,
0.0006076110294088721,
0.0007230330375023186,
0.0005778735503554344,
0.0008292015991173685,
0.0006556110456585884,
0.0006813188083469868,
0.000667234999127686,
0.0006251691374927759,
0.0007207854650914669,
0.0007711576763540506,
0.0006924453191459179,
0.0006247045239433646,
0.0006640481879003346,
0.0006137520540505648,
0.0006219364586286247,
0.0005928766331635416,
0.0006570087280124426,
0.0005719793844036758,
0.0006193830631673336,
0.0005972707876935601,
0.0006272146129049361,
0.0006220384384505451,
0.0005496879457496107,
0.0005481201806105673,
0.000547516334336251,
0.0005722699570469558,
0.0007230330375023186,
0.0005979015841148794,
0.000632711045909673,
0.0006755781942047179,
0.000601836247369647,
0.0008292015991173685,
0.0006280691595748067,
0.0007349142106249928,
0.0006343433633446693,
0.0007966661942191422,
0.0008018069784156978,
0.000640926300548017,
0.0006813188083469868,
0.0006542359478771687,
0.0006406533066183329,
0.0006819713162258267,
0.0006813188083469868,
0.000645115680526942,
0.0021574946586042643,
0.0005822572857141495,
0.0015440932475030422,
0.0006671001901850104,
0.0007155378116294742,
0.0006871366640552878,
0.0006124787032604218,
0.0006155648734420538,
0.0005810850416310132,
0.0005774686578661203,
0.0006108033703640103,
0.0006693692412227392,
0.0006298819207586348,
0.0006181623321026564,
0.0005852002068422735,
0.000619786384049803,
0.0005448866868391633,
0.0006902151508256793,
0.0006063492619432509,
0.0006138444878160954,
0.0005728640244342387,
0.0006190545973367989,
0.0006068042712286115,
0.0006027515628375113,
0.0006083350162953138,
0.0005745964008383453,
0.0005662274779751897,
0.0006742601981386542,
0.0006874284008517861,
0.0005707172676920891,
0.0007250195485539734,
0.0007047799881547689,
0.0006426049512811005,
0.0005774102755822241,
0.0007074704044498503,
0.0008807849953882396,
0.0006143000791780651,
0.0009472827659919858,
0.0008253137348219752,
0.0006336056394502521,
0.0005546353640966117,
0.0006076764548197389,
0.0005698826862499118,
0.0005726230447180569,
0.0006225007236935198,
0.0005533015937544405,
0.0005409765290096402,
0.0005483420682139695,
0.0006081538740545511,
0.0005993739468976855,
0.0005943906726315618,
0.0005555440438911319,
0.0005664392956532538,
0.000583487271796912,
0.0008223298937082291,
0.0007230330375023186,
0.0013497356558218598,
0.0006813188083469868,
0.0007675334345549345,
0.0007895479793660343,
0.0006428907508961856,
0.0008576072286814451,
0.0007854893337935209,
0.0006542921182699502,
0.00328667345456779,
0.0006124396459199488,
0.0005756817990913987,
0.0007365148630924523,
0.0006440532160922885,
0.0007170765311457217,
0.0006778960814699531,
0.0008801805088296533,
0.0007513933815062046,
0.0005956145469099283,
0.0007230330375023186,
0.0007223233697004616,
0.0006297628278844059,
0.0008192069362848997,
0.000907482230104506,
0.0006127858650870621,
0.0006248048739507794,
0.0005959935369901359,
0.000569286523386836,
0.0011545863235369325,
0.0008772868313826621,
0.000731039559468627,
0.001106628798879683,
0.0006639073835685849,
0.0005707822856493294,
0.0005587530904449522,
0.0005669772508554161
] | 0.0007 | 149 |