texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
1
num_sents
int64
1
126k
[ "FOX13's Zach Crenshaw will have more on what this means on FOX13 News starting at 5." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006075716228224337 ]
0.000608
1
[ "David Ben Hassin\n\nDavid Ben Hassin (Arabic David ibn Hasin, in French sources David Hassine) (1727–1792) is considered to have been one of the greatest Jewish Moroccan poets and one of the best-known figures of Jewish liturgic poetry. ", "His piyyutim (poems) were spread through the Sephardic world. ", "He travelled to various communities in Morocco and also to Gibraltar, where his poems were well received.", "\n\nHe is the author of Tehila le David (Song of David), a collection of liturgic poems and elegies which have inspired many Moroccan singers, and of Mekoman chel zebahim (\"Place of Sacrifices\"), a versification of the slaughter rituals practiced in the ancient Temple in Jerusalem. ", "Some of his poems include his name in acrostic. ", "Moses Edrehi (1855) records that he saw a manuscript of Song of David that was sent from Meknes to the leaders of the Moroccan Jewish community in London for publication.", "\n\nHe was also the author of several Bible commentaries.", "\n\nReferences\n\nExternal links\nLoebtree genealogy\n\nCategory:1722 births\nCategory:1792 deaths\nCategory:Later Acharonim\nCategory:18th-century Moroccan poets\nCategory:Moroccan rabbis\nCategory:Sephardi rabbis\nCategory:People from Meknes\nCategory:18th-century Moroccan people\nCategory:18th-century rabbis" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.001074727508239448, 0.0021056770347058773, 0.0007362464675679803, 0.0009304251871071756, 0.0008787760743871331, 0.0006168034160509706, 0.0006818735273554921, 0.0006346919690258801 ]
0.000957
8
[ "While obesity levels increased by 156 percent between 1960 and 2009, bicycling and walking levels fell by 66 percent. ", "These are statistics from a new report by the Alliance for Biking and Walking. ", "The report, \"Bicycling and Walking in the United States: 2012 Benchmarking Report,\" ranks all 50 states and the 51 largest U.S. cities on bicycling and walking levels, safety, funding and other factors.", "\n\nThe Benchmarking Report confirms that in almost every city and state, pedestrians and bicyclists are disproportionately at risk of being killed on the road. ", "The report also reveals that pedestrians and bicyclists receive less than their fair share of transportation dollars. ", "While the report concludes that bicycling and walking create 11-14 jobs for every $1 million spent, as opposed to 7 jobs created by every $1 million spent on highway projects, pedestrian and bicycle projects receive less than 2 percent of federal transportation dollars. ", "Furthermore, according to cost-benefit analysis conducted by the study, for every $1 invested in bicycling and walking, $11.80 are gained in benefits.", "\n\nThe report adds to the evidence of health benefits of active transportation, showing that states with the highest rates of bicycling and walking are also among those with the lowest rates of obesity, diabetes and high blood pressure.", "\n\n\"The data points to one conclusion: Investing in biking and walking projects creates jobs, leads to more people biking and walking, and improves safety and public health,\" says Jeffrey Miller, president and CEO of the Alliance for Biking and Walking.", "\n\nThe report also received praise from John Pucher, an urban planning professor at Rutgers University. \"", "The wide range of environmental, social, and economic benefits of walking and bicycling, so clearly documented in this report, justify greatly increased investment in facilities and programs to encourage more walking and cycling, and to improve the safety of these most sustainable of all transportation modes,\" Pucher explained.", "\n\nHere are some other interesting findings from the report:\n\nIn 2009, 40% of trips in the United States were shorter than 2 miles, yet 87% of these trips are by car. ", "Twenty-seven percent of trips were shorter than 1 mile. ", "Still, Americans use their cars for 62% of these trips.", "\n\nSeniors are the most vulnerable bicyclists and pedestrians. ", "Adults over 65 make up 10% of walking trips, yet comprise 19% of pedestrian fatalities. ", "This age group accounts for 6% of bicycling trips, yet 10% of bicyclist fatalities.", "\n\nOn average, the largest 51 U.S. cities show a 29% increase in bicycle facilities since the 2010 report. ", "Cities report that 20,908 miles of bicycle facilities and 7,079 miles of pedestrian facilities are planned for the coming years (much of this contingent upon funding).", "\n\nThe Centers for Disease Control and Prevention and support from AARP and Planet Bike funded the report.", "\n\nDownload \"Bicycling and Walking in the United States: 2012 Benchmarking Report.\"" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.002645541215315461, 0.0005706863012164831, 0.0005997536354698241, 0.002271046629175544, 0.0009016193798743188, 0.0007455702289007604, 0.0007215916411951184, 0.0011969837360084057, 0.0005437751533463597, 0.0006245569093152881, 0.000696705945301801, 0.0005470520700328052, 0.0010623979615047574, 0.0008776760660111904, 0.0664031133055687, 0.0010755365947261453, 0.001301608164794743, 0.0005989852943457663, 0.0005487869493663311, 0.0005854637711308897, 0.0006668227142654359 ]
0.004056
21
[ "Strangers medical Records Faxed To Man's Living Room\n\nSays he wants it to stop, and it may soon after he contacted 2 On Your Side\n\nhttp://www.wgrz.com/video/2384824896001/1/Strangers-medical-Records-Faxed-To-Mans-Living-Roomhttp://bcdownload.gannett.edgesuite.net/wgrz/34300055001/34300055001_2384943584001_th-51940ad8e4b0e0e124c3ca51-806787296001.jpg?pubId=34300055001Strangers medical Records Faxed To Man's Living RoomSays he wants it to stop, and it may soon after he contacted 2 On Your SidelorekinformationRecordsmedicalprivacyHealthNewspeopleWGRZ02:42" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0023787221871316433 ]
0.002379
1
[ "9th Opera Holiday Apartment: Paris Centre 9th Park\n\nOverview\n\nBedrooms:\n\n2\n\nBathrooms:\n\n1.5\n\nSleeps\n\n7\n\nPer night\n\n€160 - €200\n\nType:\n\nApartment\n\nDescription of the Paris vacation apartment rental\n\nWelcome to our Parsian Apartment which is traditionally designed with Large carriage door entry and code lock. ", "Tiled courtyard with a perfect and secured Glassy door entrance and a lft. ", "Entry telephone in apartment.", "\n\nDeposits: 50% of total cost.", "\nBalance payable 8 weeks before entry date. ", "Paid by inter-bank transfer. ", "Bank transfers to be sent in euros.", "\n\nPayment Options: Money Order\n\nOther Fees: The laundry charge is €70.00 per booking\n\nOther Vacation Rental Amenities\n\nThe double bed is a king size four poster bed with drapes at the back. ", "The 3 single beds are all three foot beds with proper mattresses. ", "The 3rd single bed pulls out from underneath one of the others, allowing plenty of room when pushed away during the day. ", "The bed settee is double sized and has a sprung mattress. ", "All the beds have comfortable mattresses. ", "The bedrooms are separate rooms with their own doors....no odd arrangements as can be found in some apartments where you have to go through one bedroom to get to the other. ", "The bathroom is separate and off the main hall, as is the kitchen and cloakroom. ", "Bedrooms are all double glazed and carpeted for comfort and insulation." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000603831373155117, 0.0009205069509334862, 0.0006255881162360311, 0.0006908801151439548, 0.0006111584953032434, 0.0006543020717799664, 0.0005916260415688157, 0.0010382664622738957, 0.0010916745522990823, 0.0010626413859426975, 0.00072180584538728, 0.0009251896408386528, 0.0008183300378732383, 0.0008317480678670108, 0.0007204328430816531 ]
0.000794
15
[ "Leishmania-induced tyrosine phosphorylation in the host macrophage and its implication to infection.", "\nTyrosine phosphorylation is an important mechanism of cell regulation and has been recently implicated in defense strategies against a variety of pathogens. ", "We have investigated the involvement of protein tyrosine kinase activity in the Leishmania attachment, invasion and survival within macrophages, as well as promastigote ability to trigger tyrosine phosphorylation, which could contribute to leishmanicidal activity. ", "Treatment of murine macrophage monolayers with genistein, herbimycin A, tyrphostin 25 or staurosporine prior to infection decreased parasite invasion in a dose-dependent manner. ", "Contrary, addition of sodium orthovanadate, a protein tyrosine phosphatase inhibitor, phosphotyrosine and p-nitrophenyl phosphate to the interaction medium, significantly increased parasite binding and internalization, whereas phosphoserine and phosphothreonine had no effect. ", "The phosphatase activity of intact promastigotes was greater than that of macrophages. ", "Western blot analysis revealed tyrosine-phosphorylated bands from 198 to 28 kDa following macrophage challenge with promastigotes. ", "Uninfected macrophages displayed no detectable tyrosine phosphorylated proteins, possibly indicating an inducible process, while in parasites it was constitutive, as seen by the presence of 42, 40 and 35 kDa phosphoproteins on the Leishmania lysates. ", "Immunofluorescence and immunogold detection of phosphotyrosine residues in some promastigote-macrophage attachment areas, but not in the vicinity of ingested parasites, suggest that Leishmania-induced tyrosine phosphorylation is an early, local and short-lived event. ", "Genistein treatment of Leishmania-infected cells significantly enhanced the parasite burden. ", "This antagonist also diminished nitric oxide production in resting and interferon gamma/lipopolysaccharide-activated infected macrophages, which may account for the increased parasite survival. ", "We propose that protein tyrosine kinase-linked pathways regulate the Leishmania promastigote invasion and the macrophage microbicidal activity." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0017180051654577255, 0.0008648809161968529, 0.00075123505666852, 0.001243710983544588, 0.0012490346562117338, 0.0021658712066709995, 0.0011616694973781705, 0.0021475101821124554, 0.0012571034021675587, 0.001452669152058661, 0.0015639910707250237, 0.000742616830393672 ]
0.00136
12
[ "Selecting patients for monoclonal antibody therapy.", "\nThe role of the pharmacist in defining and implementing criteria for selection of patients who are most likely to benefit from monoclonal antibody therapy is discussed. ", "The introduction of new biotechnology products has raised concerns about rationing of health-care services, particularly in view of the costs of drug research and development. ", "Traditional antimicrobial therapy has not reduced morbidity and mortality from gram-negative sepsis. ", "Early clinical trials indicate that immunotherapy with new agents that supplement the host immunological response to these infections may be effective. ", "Criteria must be developed to identify patients who will obtain maximum benefits from these newer interventions. ", "Severity-stratification systems (e.g., the APACHE II scoring system) have been used to classify disease and monitor treatment outcome. ", "These techniques have been applied in clinical trials assessing E5 monoclonal antibody therapy in patients with gram-negative sepsis and in others evaluating the use of imipenem versus tobramycin and clindamycin in the treatment of intraabdominal infection. ", "Pharmacists with a knowledge of infectious-disease processes and pharmacotherapeutics can play a major role in developing criteria for identifying patients who are most likely to benefit from the products of biotechnology and thereby ensuring the cost-effective use of these products." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006142029305920005, 0.0007213764474727213, 0.0006269253790378571, 0.004080830607563257, 0.0006084408960305154, 0.0005470424075610936, 0.0005765834357589483, 0.0007317498093470931, 0.0009504645713604987 ]
0.001051
9
[ "Sequential evaluation of a medical diagnostic test with binary outcomes.", "\nIn a study evaluating a medical diagnostic test, human samples are valuable and often costly, therefore prime concerns require termination of the study if the test is evidently inefficient (or efficient) in diagnosis of diseases in order to keep the number of samples as low as possible. ", "In this paper, we propose sequential designs to evaluate the sensitivity and specificity of a diagnostic test. ", "One method allows early stopping if the sensitivity and specificity of a new medical test are both within the level of tolerance. ", "Another method terminates the study if either the sensitivity or the specificity is below the minimally acceptable level. ", "The latter method minimizes the expected sample size when the test does not meet expectations on performance, and illustrates substantial advantage of having smaller expected sample sizes in various two-stage designs compared to the sample sizes of single-stage designs when a diagnostic test is not promising." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0005746796377934515, 0.0005882030236534774, 0.0005167549825273454, 0.0005859301891177893, 0.0005752361612394452, 0.0005772801814600825 ]
0.00057
6
[ "This is a multidisciplined project dedicated to the advancement of knowledge in neurotology, to be accomplished through a balanced endeavor of basic, developmental and applied research. ", "There is a broad representation of disciplines among the individual investigators covering medical and basic sciences pertinent to the study. ", "The work is directed toward the application of modern technology, including that of computers, to the development of new diagnostic methods and the acquisition of the fundamental information for the solution of neurologic problems. ", "One of the main goals of this project is the development of objective and reliable quantitative methods for the functional evaluation of the vestibular system in normal subjects and in people with neurotologic disorders. ", "These new techniques are being developed as a result of experiences obtained in animal research. ", "The proximity of laboratories and the daily interdisciplinary cooperation make the application of concepts and techniques developed through basic research feasible and lead to rapid implementation. ", "BIBLIOGRAPHIC REFERENCES: Babin, R., Hanafee, W.N., Ward, P.H. Anatomic and radiographic correlates in the middle ear. ", "Arch. ", "Otolaryngol. ", "102:474, 1975. ", "Baloh, R.W., Konrad, H.R., Sills, A.W., Honrubia, V. The saccade velocity test. ", "Neurology 25: 1071, 1975." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.000683520978782326, 0.0005218337173573673, 0.0006638203631155193, 0.0011970681371167302, 0.0005757067119702697, 0.0005264893989078701, 0.0006978721357882023, 0.0010198423406109214, 0.001201761420816183, 0.0007580344099551439, 0.0006724767736159265, 0.00306590530090034 ]
0.000965
12
[ "【的確】報ステ出演・木村草太氏の森友解説がまっとうすぎると話題に!ネット「田〇の代わりにワイドショーに出て欲しい」\n\nhttp://xn--nyqy26a13k.jp/archives/28423\n\n2017/03/25 健康になるためのブログ\n\n\n\n\n\n\n\n\n\n木村草太さん「公文書の管理が大事。今回に関しては適正に文書が残されていないことの責任を問わなくてはいけない。分らないのであれば分からなくした人の責任。これでいいという規則であれば規則を作った人の責任。規則制定権者は財務大臣ですから、財務大臣は責任を取る覚悟で解明してほしい」 — Tad (@CybershotTad) 2017年3月24日\n\n報ステで憲法学者の木村草太さんが至極まともなことを仰っている。記録の破棄の責任、記録を破棄してもいいのならそんなルールを作った人の責任を問えと。何が問題かって無法すぎることと、嘘や約束の反故が横行してる現実だと、今の国会の騒動を見てて思いますよ。 — ", "odamichi (@odamichi) 2017年3月24日\n\n今さらだけど、昨日は報ステに木村草太さん出ていて、コメントも雰囲気もやっぱり圧倒的だなぁと思った。あの人好き。", "\n\nワイドショーも田崎さんみたいな冴えないオッサンにギャラ渡すくらいなら街中でネトウヨ捕まえてノーギャラで喋らせといて、木村さん呼んで欲しい。 — ", "はるみ (@harumi19762015) 2017年3月25日\n\nテレビ朝日の報道ステーションで首都大学東京の木村草太教授。森友学園をめぐる土地取り引きの解明が進まない理由について、交渉記録が示されないからと指摘し、「籠池理事長の人格攻撃になる異常な事態になっている」。公文書管理を見直し、財務大臣が職をかけて、解明にあたるべきと発言。 — ", "ジャーナリスト 田中稔 (@minorucchu) 2017年3月25日\n\n報道ステーションの木村草太さん\n\n\n\n「記録がなくて分からないという役人に対して、分からなくした責任を問わなければならない」\n\n\n\n今まで聞いた中で最も正しい意見 — シャア☆彡 (@char_metal) 2017年3月24日\n\n森友学園問題\n\n\n\n証人喚問以降、色々なコメンテーターの話しをテレビで見たけど、木村草太さんのが一番的確だと思った。", "\n\n他は多少なりとも忖度が入ってる(笑) — あかまっちゃん (@akmtsru) 2017年3月25日\n\n今回の森友学園について\n\n木村草太さんという人の話がごもっとも、だった。", "\n\nURL貼れるかな。pic.twitter.com/ee72SFRjfv — りっちゃん (@ritsnPC) 2017年3月25日\n\n\n\n\n\nフォローアップ:\n\n\n\n★登録無しでコメント可能。今すぐ反映 通常 | 動画・ツイッター等 | htmltag可(熟練者向)|(各説明)\n\n\n\n( ←ペンネーム新規登録ならチェック)\n\n↓ペンネーム(なしでも可能。あったほうが良い)\n\n\n\n↓パスワード(ペンネームに必須)\n\n\n\n(ペンネームとパスワードは初回使用で記録、次回以降にチェック。パスワードはメモすべし。)", "\n\n↓画像認証\n\n( 上画像文字を入力)\n\nルール確認&失敗対策\n\n画像の URL (任意):\n\n\n\n▲上へ ★阿修羅♪ > 政治・選挙・NHK223掲示板 次へ 前へ" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.004969158209860325, 0.0014449346344918013, 0.0013771874364465475, 0.0020985251758247614, 0.0019267675234004855, 0.001120682107284665, 0.0025557992048561573, 0.001151717035099864 ]
0.002081
8
[ "Debby Cromp, Real Estate Agent\n\nRE/MAX RESULTS\n\nHONESTY, INTEGRITY, EXPERIENCE AND PATIENCE\n\nThe last thing you need is to worry if your realtor is truly working for you. ", "I will treat you the way I would want to be treated if I were in your shoes. ", "I have been and remember what it was like to have a realtor your not able to trust. ", "You will never have to worry about that with me. ", "I know what it's like to move all over the country or across town with 3 kids and a dog. ", "To have to find everything all over again, from doctors, dentists, grocery store, etc. ", "I'm here to help you with even the small things that make life difficult." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0010138017823919654, 0.012714594602584839, 0.0012561697512865067, 0.0009093774133361876, 0.0016073870938271284, 0.0007346096099354327, 0.0007573510520160198 ]
0.002713
7
[ "AS Roma get a classy 'Night Rising' third-shirt from Nike\n\nIt’s been a busy week for Nike, who have been releasing kit collections for their biggest teams the last few days. ", "Their ‘Night Rising’-collection is now complete, after the introduction of this new Roma 3. ", "kit.", "\n\nRight off the bat I’m just going to name the Roma kit as my favourite, out of the new Nike third-shirts - (Not counting the PSG shirt, because no one can compete with that beauty). ", "In my opinion the Roma kit is where the unique design really comes into its own.", "\n\nUnlike on the other third kits, the main tone isn’t some incredibly bright colour, which definitely appeals more to me. ", "I’m not really a fan of the others, especially the Man City and Inter kits I dislike compared to this one. ", "That’s obviously just what I think and given the success of last season's Nike third kits, I’m probably on my own.", "\n\nWhat do you think - are you on my side, where you prefer the more toned down shirts like the new Roma shirt, or would you rather have a wild neon colourway, to catch everyone’s attention? ", "Let us know down below.", "\n\nE-Trade awards\n\nUser Award in 2011 and 2012, Social Commerce in 2012, B2C in 2013, E-Commerce Price Gold in 2013. ", "Bronze at European E-Commerce Award 2013. ", "Cross-border 2014 and 2016. ", "Users Favorite in 2017.", "\n\n#unisportlife\n\nGet the best football experience with the latest boots , gear and reviews. ", "Share your best football moment with #unisportlife" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006600997876375914, 0.0006961951148696244, 0.0011200245935469866, 0.001346968929283321, 0.0006125788786448538, 0.0006693418836221099, 0.0009715353953652084, 0.0006620557396672666, 0.0038588682655245066, 0.0007926418329589069, 0.0005802600644528866, 0.0005769201670773327, 0.0005881766555830836, 0.0006269561708904803, 0.0006125945947133005, 0.001060236245393753 ]
0.000965
16
[ "Q:\n\nHow to remove rounded corners on jqgrid\n\nI am working on an application that uses trirand jqgrid on multiple pages, along with Bootstrap 3.1 and Flat UI design. ", "\nI have modified the jqgrid styling to confirm with the theme that I am using, I would like to know the simplest way to remove the rounded corners from jqgrid.", "\n\nA:\n\nAdd the below to your CSS, beneath the jqGrid css:\n.ui-corner-all, .ui-corner-top, .ui-corner-left, .ui-corner-tl, .ui-corner-right, .ui-corner-tr, .ui-corner-bottom, .ui-corner-bl, .ui-corner-br {\n border-radius:0;\n -moz-border-radius:0;\n -webkit-border-radius:0;\n -khtml-border-radius:0;\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006408389890566468, 0.0005831592134200037, 0.0008512572385370731 ]
0.000692
3
[ "Injo of Joseon\n\nInjo of Joseon (7 December 1595 – 17 June 1649, r. 1623–1649) was the sixteenth king of the Joseon dynasty in Korea. ", "He was the grandson of Seonjo and son of Grand Prince Jeongwon (정원군). ", "King Injo was king during both the first and second Manchu invasions, which ended with the surrender of Joseon to the Qing dynasty in 1636.", "\n\nBiography\n\nBirth and background\nKing Injo was born in 1595 as a son of Grandprince Jeongwon, whose father was the ruling monarch King Seonjo. ", "In 1607, Grandprince Jeongwon's son was given the title, Prince Neungyang (綾陽都正, 능양도정) and later Grand Prince Neungyang (綾陽君, 능양군); and lived as a royal family member, unsupported by any political factions that were in control of Korean politics at the time.", "\n\nIn 1608, King Seonjo fell sick and died, and his son, Gwanghaegun, succeeded him to the throne. ", "At the time, the government was divided by various political factions; and the liberal Eastern political faction came out strong after the Seven Year War, which most actively fought against Japanese. ", "The Eastern faction split during the last days of King Seonjo in the Northern and Southern political factions. ", " The Northern faction wanted radical reform, while the Southern faction supported moderate reform. ", "At the time of Seonjo's death, the Northern faction, who gained control of the government at the time, was divided into left-wing Greater Northerners and less radical Lesser Northerners. ", "As Gwanghaegun inherited the throne, the Greater Northern political faction, which supported him as heir to the crown, became the major political faction in the royal court. ", "Meanwhile, conservative Western political faction remained a minor faction, far from gaining power; however many members of the Western faction continued to look for opportunities to return to politics as the ruling faction.", "\n\nThe coup of 1623\n\nAlthough King Gwanghaegun (光海君, 광해군) was an outstanding administrator and great diplomat, he was largely unsupported by many politicians, scholars, and aristocrats because he was not the first-born and he was born of a concubine. ", "Greater Northerners tried to stomp out those opinions, suppressing Lesser Northerners and killing Prince Imhae (臨海君, 임해군), the oldest son of Seonjo, and Grand Prince Yeongchang (永昌大君, 영창대군), the queen's son. ", "It was not Gwanghaegun's plan to keep his throne; and in fact, he actually tried to bring minor factions into the government, but was blocked by opposition from members of the Greater Northerners, such as Jeong In-hong and Yi Icheom. ", "The actions made Gwanghaegun even more unpopular among wealthy aristocrats, and they finally began plotting against him.", "\n\nIn 1623, members of the ultra-conservative Westerners faction, Kim Ja-jeom, Kim Ryu, Yi Gwi and Yi Gwal, launched a coup that resulted in the dethroning of Gwanghaegun, who was sent into exile on Jeju Island. ", "Jeong In-hong and Yi Yicheom were killed, and followed suddenly by the Westerners replacing the Greater Northerners as the ruling political faction. ", "The Westerners brought Injo to the palace and crowned him as the new King of Joseon. ", "Although Injo was king, he did not have any authority since almost all of the power was held by the Western faction that dethroned Gwanghaegun.", "\n\nYi Gwal Rebellion\nYi Gwal thought he was treated unfairly and received too small reward for his role in the coup. ", " In 1624, he rebelled against Injo after being sent to the Northern front as military commander of Pyongyang to fight against the expanding Manchus, while other major leaders of the coup were rewarded with positions in the King's court. ", "Yi Gwal led 12,000 troops, including 100 Japanese (who defected to Joseon during Japanese invasions of Korea (1592–1598)), to the capital, Hanseong, where Yi Gwal defeated a regular army under the command of General Jang Man and surrounded Hanseong in what is known as the Battle of Jeotan. ", " Injo fled to Gongju, and Hanseong fell into the hands of the rebels.", "\n\nOn February 11, 1624, Yi Gwal enthroned Prince Heungan (興安君, 흥안군) as the new king; however, General Jang Man soon came back with another regiment and defeated Yi Gwal's forces. ", "The Korean army recaptured the capital soon after, and Yi Gwal was murdered by his bodyguard, which resulted in the end of the rebellion. ", " Even though Injo was able to keep his throne, the rebellion displayed the weaknesses of royal authority, while asserting the superiority of the aristocrats, who had gained even more power by the fighting against the rebellion. ", "The economy, which was experiencing a slight recovery from Gwanghaegun's reconstruction, was once again ruined and Korea would remain in a poor economic state for a few centuries.", "\n\nWar with Manchus\n\nKing Gwanghaegun, who was considered a wise diplomat, kept his neutral policy between the Chinese Ming Dynasty, which was Joseon's traditional ally, and the growing Manchus. ", "However, following the fall of Gwanghaegun, conservative Westerners took hard-line policy toward the Manchus, keeping their alliance with Ming Dynasty. ", "The Manchus, who had up until that time remained mostly friendly to Joseon, began to regard Joseon as an enemy. ", "Han Yun, who participated in the rebellion of Yi Gwal, fled to Manchuria and urged the Manchu leader Nurhaci to attack Joseon; thus the friendly relationship between Manchu and Korea ended.", "\n\nIn 1627, 30,000 Manchu cavalry under General Amin (阿敏) and former Korean General Gang Hong-rip invaded Joseon, calling for restoration of Gwanghaegun and execution of Westerners leaders, including Kim Ja-jeom. ", "General Jang Man again fought against the Manchus, but was unable to repel the invasion. ", "Once again, Injo fled to Ganghwa Island. ", " Meanwhile, the Manchus had no reason to attack Korea and decided to go back to prepare for war against China, and peace soon settled. ", "Later, Qing and Joseon were declared brother nations and the Manchus withdrew from Korea. ", "The war is called first Manchu invasion of Korea.", "\n\nHowever, most Westerners kept their hard-line policy despite the war. ", "Nurhaci, who had generally good opinion toward Korea, did not invade Korea again; however, when Nurhaci died and Hong Taiji succeeded him as ruler of the Manchus, the Manchus again began to seek for chance for another war. ", "King Injo provided refuge to Ming General Mao Wenrong and with his unit, after they fled from the Manchus and came to Korea; this action caused the Manchus to invade Korea once again.", "\n\nIn 1636, Hong Taiji officially called his nation the Qing dynasty, and proceeded to invade Joseon personally. ", "The Manchu purposely avoided battle with General Im Gyeong Eop, a prominent Joseon army commander who was guarding the Uiju Fortress at the time. ", " A Manchurian army of 128,000 men marched directly into Hanseong before Injo could escape to Ganghwa Island, driving Injo to Namhan Mountain Fortress instead. ", "Running out of food and supplies after the Manchu managed to cut all supply lines, Injo finally surrendered to the Qing dynasty ceremoniously bowing to the Hong Taiji nine times as Hong Taiji's servant, and agreeing to the Treaty of Samjeondo, which required Injo's first and second son to be taken to China as captives. ", "\n\nJoseon then became a tributary state to the Qing Dynasty, and the Qing went on to conquer the Ming Dynasty in 1644.", "\n\nDeath of the Crown Prince\nAfter Qing conquered Beijing in 1644, the two princes returned to Korea. ", "Injo's first son, Crown Prince Sohyeon, brought many new products from the western world, including Christianity, and urged Injo for reform. ", "However, the conservative Injo would not accept the opinion; and persecuted the Crown Prince for attempting to modernize Korea by bringing in Catholicism and Western science.", "\n\nThe Crown Prince was mysteriously found dead in the King's room, bleeding severely from the head. ", "Legends say that Injo killed his own son with an ink slab that Sohyeon brought from China; however, some historians suggest he was poisoned by the fact that he had black spots all over his body after his death and that his body decomposed rapidly. ", "Many, including his wife, tried to uncover what happened but Injo ordered immediate burial and greatly reduced the grandeur of the practice of Crown Prince's funeral. ", "King Injo even shortened the funeral period for his son.", "\n\nKing Injo appointed Grand Prince Bongrim as new Crown Prince (who later became King Hyojong) rather than Prince Sohyeon's oldest son, Prince Gyeongseon. ", "Soon after, Injo ordered the exile of Prince Sohyeon's three sons to Jeju Island (from which only the youngest son, Prince Gyeongan, returned to the mainland alive) and the execution of Sohyeon's wife, Crown Princess Minhoe, for treason.", "\n\nLegacy\nToday, Injo is mostly regarded as a weak, indecisive and unstable ruler; for he caused the Yi Gwal Rebellion, two wars with the Manchus, and a devastation of the economy. ", "He is often compared to his predecessor, Gwanghaegun, who accomplished many things and was dethroned, while Injo had almost no achievements during his reign and was still given a temple name. ", "Blamed for not taking care of his kingdom, many people regard King Injo as the model for politicians not to follow; yet, he is credited for reforming the military and expanding the defense of the nation to prepare for war, since the nation had several military conflicts from 1592 to 1636. ", "Injo died in 1649. ", "His tomb is located in Paju, Gyeonggi-do.", "\n\nFamily\n Father: King Wonjong of Joseon (2 August 1580 – 29 December 1619) (조선 원종)\nGrandfather: King Seonjo of Joseon (26 November 1552 – 16 March 1608) (조선 선조)\nGrandmother: Royal Noble Consort In of the Suwon Kim clan (1555 – 10 December 1613) (인빈 김씨)\n Mother: Queen Inheon of the Neungseong Gu clan (17 April 1578 – 14 January 1626) (인헌왕후 구씨)\nGrandfather: Gu Sa-Maeng (1531 – 1 April 1604) (구사맹)\nGrandmother: Lady Shin of the Pyeongsan Shin clan (1538 – 1562) (평산 신씨)\n Consorts and their Respective Issue(s):\n Queen Inryeol of the Cheongju Han clan (16 August 1594 – 16 January 1636) (인렬왕후 한씨)\n Yi Wang, Crown Prince Sohyeon (5 February 1612 – 21 May 1645) (이왕 소현세자)\n Yi Ho, Grand Prince Bongrim (3 July 1619 – 23 June 1659) (이호 봉림대군)\n Yi Yo, Grand Prince Inpyeong (10 December 1622 – 13 May 1658) (이요 인평대군)\n Yi Gon, Grand Prince Yongseong (24 October 1624 – 22 December 1629) (이곤 용성대군)\n Unnamed daughter (1626 – 1626)\n Unnamed son \n Queen Jangryeol of the Yangju Jo clan (16 December 1624 – 20 September 1688) (장렬왕후 조씨) \n Royal Consort Gwi-in of the Okcheon Jo clan (1617 – 24 January 1652) (귀인 조씨)\n Princess Hyomyeong (1637 – 1700) (효명옹주)\n Yi Jing, Prince Sungseon (17 October 1639 – 6 January 1690) (이징 숭선군)\n Yi Suk, Prince Nakseon (9 December 1641 – 26 April 1695) (이숙 낙선군)\n Royal Consort Gwi-in of the Haepung Jang clan (? – ", "1671) (귀인 장씨) \n Royal Consort Suk-ui of the Na clan (숙의 나씨)\n Royal Consort Suk-ui of the Park clan (숙의 박씨)\n Royal Consort Suk-won of the Jang clan (숙원 장씨)\n Court Lady Lee (? – ", "1643) (상궁 이씨)\n\nHis full posthumous name\n King Injo Gaecheon Joun Jeonggi Seondeok Heonmun Yeolmu Myeongsuk Sunhyo the Great of Korea\n 인조개천조운정기선덕헌문열무명숙순효대왕\n 仁祖開天肇運正紀宣德憲文烈武明肅純孝大王\n\nModern depictions\nPortrayed by Yu In-chon in the 1986-1987 MBC TV series 500 Years of Joseon: Namhan Mountain Fortress. ", "\nPortrayed by Ahn Dae-yong in 1995 KBS TV series West Palace.", "\nPortrayed by Kim Chang-wan in the 2008 SBS TV series Iljimae.", "\nPortrayed by Choi Jung-woo in the 2008 KBS2 TV series Strongest Chil Woo.", "\nPortrayed by Lee Byung-joon in the 2000-2002 MBC TV series Tamra, the Island.", "\nPortrayed by Kim Kap-soo in the 2010 KBS2 TV series The Slave Hunters.", "\nPortrayed by Sunwoo Jae-duk in the 2012-2013 MBC TV series Horse Doctor.", "\nPortrayed by Lee Deok-hwa in the 2013 JTBC TV series Blooded Palace: The War of Flowers.", "\nPortrayed by Kim Myung-soo in the 2014 tvN TV series The Three Musketeers.", "\nPortrayed by Kim Jae-won in the 2015 MBC TV series Splendid Politics.", "\nPortrayed by Park Hae-il in the 2017 film The Fortress.", "\nPortrayed by Kang Tae-oh in the 2019 KBS2 TV series The Tale of Nokdu.", "\n\nSee also\nList of Korea-related topics\nHistory of Korea\nRulers of Korea\n\nReferences\n\nCategory:Joseon rulers\nCategory:1595 births\nCategory:1649 deaths\nCategory:17th-century Korean monarchs" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.001015530782751739, 0.000761656672693789, 0.0009756748331710696, 0.0007661592098884284, 0.0007732831872999668, 0.04139868915081024, 0.0007675955421291292, 0.000712295004632324, 0.0012525705387815833, 0.005453926045447588, 0.000785432814154774, 0.0006360229454003274, 0.0008608813514001667, 0.03264613077044487, 0.001918654888868332, 0.006306659430265427, 0.0016363264294341207, 0.040811438113451004, 0.0023543124552816153, 0.001303842174820602, 0.0007497253245674074, 0.0013337491545826197, 0.0026512935291975737, 0.042448658496141434, 0.001225706422701478, 0.009106874465942383, 0.0012423156294971704, 0.004860631190240383, 0.008516930043697357, 0.0015361090190708637, 0.008087587542831898, 0.002774306572973728, 0.005107630975544453, 0.003168536815792322, 0.005621606484055519, 0.008279177360236645, 0.002168938284739852, 0.01088725682348013, 0.0009695601765997708, 0.005853109061717987, 0.002635000040754676, 0.0014850249281153083, 0.0010320954024791718, 0.0028205481357872486, 0.005201315972954035, 0.0009344015270471573, 0.0013093824964016676, 0.0007992293103598058, 0.0018225957173854113, 0.02944408915936947, 0.011065129190683365, 0.0006623902590945363, 0.000856265309266746, 0.0011174333048984408, 0.0073101273737847805, 0.005363349337130785, 0.0007346722995862365, 0.0010268683545291424, 0.0014010232407599688, 0.0010764668695628643, 0.0011160806752741337, 0.0007527406560257077, 0.001012082095257938, 0.0006643190863542259, 0.0007165471324697137, 0.0006565673975273967, 0.000750254956074059, 0.0008758840849623084, 0.0008251375984400511, 0.0007466089446097612, 0.0014714776771143079, 0.0006203966331668198, 0.0007058907649479806, 0.0007088623242452741, 0.0006652449956163764 ]
0.004801
75
[ "/**\n * BSD-style license; for more info see http://pmd.sourceforge.net/license.html\n */\n\npackage net.sourceforge.pmd.lang.java.ast;\n\nimport net.sourceforge.pmd.annotation.", "InternalApi;\n\npublic class ASTPrimaryExpression extends AbstractJavaTypeNode {\n\n @InternalApi\n @Deprecated\n public ASTPrimaryExpression(int id) {\n super(id);\n }\n\n @InternalApi\n @Deprecated\n public ASTPrimaryExpression(JavaParser p, int id) {\n super(p, id);\n }\n\n @Override\n public Object jjtAccept(JavaParserVisitor visitor, Object data) {\n return visitor.visit(this, data);\n }\n\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0007405257201753557, 0.0015744705451652408 ]
0.001157
2
[ " In the United States Court of Federal Claims\n OFFICE OF SPECIAL MASTERS\n No. ", "13-543V\n Filed: February 19, 2016\n Not for Publication\n\n*************************************\nKEVIN McERLEAN, *\n *\n Petitioner, *\n * Damages decision based on\n v. * stipulation; influenza (“flu”)\n * vaccine; winged scapula\nSECRETARY OF HEALTH *\nAND HUMAN SERVICES, *\n *\n Respondent. ", " *\n *\n*************************************\nDonald M. Gerstein, Cheyenne, WY, for petitioner.", "\nLara A. Englund, Washington, DC, for respondent.", "\n\nMILLMAN, Special Master\n\n DECISION AWARDING DAMAGES 1\n\n On February 19, 2016, the parties filed the attached stipulation in which they agreed to\nsettle this case and described the settlement terms. ", "Petitioner alleges that he suffered from\nwinged scapula that was caused by his receipt of influenza (“flu”) vaccine on or about October 20,\n2011. ", "He further alleges that he experienced the residual effects of this injury for more than six\nmonths. ", "Respondent denies that the flu vaccine caused petitioner to suffer winged scapula or any\nother injury. ", "Nonetheless, the parties agreed to resolve this matter informally.", "\n\n\n\n\n1\n Because this unpublished decision contains a reasoned explanation for the special master’s action in this\ncase, the special master intends to post this unpublished decision on the United States Court of Federal\nClaims’ website, in accordance with the E-Government Act of 2002, 44 U.S.C. § 3501 note (2012) (Federal\nManagement and Promotion of Electronic Government Services).. Vaccine Rule 18(b) states that all\ndecisions of the special masters will be made available to the public unless they contain trade secrets or\ncommercial or financial information that is privileged and confidential, or medical or similar information\nwhose disclosure would constitute a clearly unwarranted invasion of privacy. ", "When such a decision is\nfiled, petitioner has 14 days to identify and move to delete such information prior to the document’s\ndisclosure. ", "If the special master, upon review, agrees that the identified material fits within the banned\ncategories listed above, the special master shall delete such material from public access.", "\n\f The undersigned finds the terms of the stipulation to be reasonable. ", "The court hereby\nadopts the parties’ said stipulation, attached hereto, and awards compensation in the amount and\non the terms set forth therein. ", "Pursuant to the stipulation, the court awards a lump sum of\n$200,000.00, representing compensation for all damages that would be available under 42 U.S.C.\n§ 300aa-15(a) (2012). ", "The award shall be in the form of a check for $200,000.00 made payable to\npetitioner.", "\n\n In the absence of a motion for review filed pursuant to RCFC Appendix B, the clerk of the\ncourt is directed to enter judgment herewith. ", "2\n\n\nIT IS SO ORDERED.", "\n\n\nDated: February 19, 2016 s/ Laura D. Millman\n Laura D. Millman\n Special Master\n\n\n\n\n2\n Pursuant to Vaccine Rule 11(a), entry of judgment can be expedited by each party, either separately or\njointly, filing a notice renouncing the right to seek review.", "\n 2\n\f\f\f\f\f\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0006970027461647987, 0.0016325535252690315, 0.0196467787027359, 0.000598264392465353, 0.000586783280596137, 0.0015519763110205531, 0.0006222670199349523, 0.0025205055717378855, 0.000523157010320574, 0.0005874211783520877, 0.0006940980674698949, 0.0006062391912564635, 0.0010604958515614271, 0.0005984403542242944, 0.0007085070828907192, 0.0006887843483127654, 0.0006479782168753445, 0.0007273794617503881, 0.0005601397133432329, 0.0010009023826569319 ]
0.001813
20
[ " Case: 10-20008 Document: 00511382194 Page: 1 Date Filed: 02/15/2011\n\n\n\n\n IN THE UNITED STATES COURT OF APPEALS\n FOR THE FIFTH CIRCUIT United States Court of Appeals\n Fifth Circuit\n\n FILED\n February 15, 2011\n No. ", "10-20008\n Conference Calendar Lyle W. Cayce\n Clerk\n\nUNITED STATES OF AMERICA,\n\n Plaintiff-Appellee\n\nv.\n\nJOSE LUIS RODRIGUEZ RODRIGUEZ, also known as Jose Luis Rodriguez-\nRodriguez, also known as Jose Luis Rodriguez, also known as Jose L Rodriguez,\nalso known as Jose Rodriguez-Rodriguez, also known as Joe Rodriguez,\n\n Defendant-Appellant\n\n\n Appeal from the United States District Court\n for the Southern District of Texas\n USDC No. ", "4:09-CR-461-1\n\n\nBefore HIGGINBOTHAM, GARZA, and ELROD, Circuit Judges.", "\nPER CURIAM:*\n The Federal Public Defender appointed to represent Jose Luis Rodriguez\nRodriguez (Rodriguez) has moved for leave to withdraw and has filed a brief in\naccordance with Anders v. California, 386 U.S. 738 (1967). ", "Rodriguez has not\nfiled a response. ", "Our independent review of the record and counsel’s brief\ndiscloses no nonfrivolous issue for appeal. ", "Accordingly, counsel’s motion for\n\n\n\n *\n Pursuant to 5TH CIR . ", "R. 47.5, the court has determined that this opinion should not\nbe published and is not precedent except under the limited circumstances set forth in 5TH CIR .", "\nR. 47.5.4.", "\n\f Case: 10-20008 Document: 00511382194 Page: 2 Date Filed: 02/15/2011\n\n No. ", "10-20008\n\nleave to withdraw is GRANTED, counsel is excused from further responsibilities\nherein, and the APPEAL IS DISMISSED. ", "See 5 TH C IR. ", "R. 42.2.", "\n\n\n\n\n 2\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0006626380491070449, 0.0006650548311881721, 0.000809289573226124, 0.0006415696116164327, 0.0006702473619952798, 0.0005902714328840375, 0.0007108075660653412, 0.0006590101402252913, 0.001062648487277329, 0.0006953991251066327, 0.0006458071293309331, 0.0010061379289254546, 0.0009558744495734572, 0.0010009023826569319 ]
0.00077
14
[ "[Italians in Western Australia: an isolated community in a period of aging].", "\nCharacteristics of the Italian-born population of Western Australia are examined in light of the state's large size and relative isolation. \"", "After a brief review of the gold rush of the 1890s and the agricultural settlement that followed, the paper examines the evolution in the age composition of the population, the extraordinary rapid turnover of migrants, the predominance of young males among them. ", "Brief comparisons are made with other migrant groups in 1986. ", "The importance of education for the attainment of a good income is examined....[The author finds that] mixed marriages (some inevitable because of the much greater number of males among the Italian-born) enrich both sides culturally but speed up the assimilation process.\" (", "SUMMARY IN ENG AND FRE)" ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0005528255715034902, 0.0005985524039715528, 0.0005896745715290308, 0.0005238990415818989, 0.0006246048724278808, 0.0006419909768737853 ]
0.000589
6
[ "Q:\n\nAccessing JSON objects from objects without titles in JQuery\n\nI am receiving this JSON file back from an AJAX call:\n[\n {\n \"LINKNAME\": \"Annual Training\",\n \"HITS\": 1\n },\n {\n \"LINKNAME\": \"In Focus Newsletter\",\n \"HITS\": 1\n },\n {\n \"LINKNAME\": \"NITA (secured)\",\n \"HITS\": 1\n },\n {\n \"LINKNAME\": \"Your Current Events\",\n \"HITS\": 1\n },\n] \n\nHere is my AJAX call:\n$(document).ready(function(e) {\n $.ajax({\n method: \"GET\",\n url: url,\n }).done(function(api) {\n console.log(api);\n var obj = JSON.parse(api),\n totRes = Object.keys(obj).length;\n $.each(obj.children, function (index, value) {\n alert(value);\n });\n }).fail(function( jqXHR, textStatus ) {\n alert('Service Catalog: Error loading '+jqXHR+' data. ", "Request fail caused by: '+textStatus);\n });\n});\n\nI need to be able to extract the data from the JSON and use it but since the JSON objects aren't gioven a title then I am unsure how to extarpolate the data inside the inner object. ", "Thanks in advance. ", "Please ask if you do not understand my question.", "\n\nA:\n\nYour JSON is just an array of plain objects.", "\nTo iterate over an array, you can use various methods. ", "Since you're using jQuery, I'll just suggest $.each:\nvar arr = JSON.parse(api);\n\n$.each(arr, function(i, obj) {\n // access whatever property you want... obj[LINKNAME] or whatever\n});\n\nYou can also use Array.prototype.forEach, or even just your basic for loop:\narr.forEach(function(obj) {\n // obj is the current plain object... e.g. { LINKNAME: 'whatever', HITS: 0 }\n});\n\nI would also consider paying attention to how you are referring to the objects that you are receiving. ", "While it is true that arrays are objects, and plain objects are objects, I would probably stick to referring to an array as an array, and a plain object as an object. ", "This is because what you are receiving, in the form of JSON, is an array object of plain objects (or more simply, an array of objects).", "\nCalling the array an \"object\" and referring to it as obj may confuse you when reading through the code quickly (yes, it is a good abstraction for potential extensibility if you end up not always receiving an array, but that's not the case here.)", "\nAlso, to once you have access the object in the each loop, you can iterate over the properties of the object if you need to (taken from this answer):\nvar obj = {\n \"a\": 1,\n \"b\": 2,\n \"c\": 3\n};\n\nfor (var prop in obj) {\n if (obj.hasOwnProperty(prop)) { \n // or if (Object.prototype.hasOwnProperty.call(obj,prop)) for safety...\n alert(\"prop: \" + prop + \" value: \" + obj[prop])\n }\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008295528241433203, 0.0008116017561405897, 0.0005687244120053947, 0.0006846589385531843, 0.013956649228930473, 0.0006250416045077145, 0.000677652598824352, 0.0008222930482588708, 0.0007522476953454316, 0.0006259508081711829, 0.0009104463970288634 ]
0.001933
11
[ "Q:\n\n\"Cannot convert value of type '()' to UIImage\": Swift\n\nI am trying to load a UIImage from a URL and then pass that UIImage back through a closure. ", "\nThis is the code to get the image:\nfunc getImageFromData(_ imgURL:URL, completion: @escaping imageClosure) {\n\n print(\"Download Started\")\n getDataFromUrl(url: imgURL) { data, response, error in\n guard let data = data, error == nil else {\n return\n }\n\n if let thisImage = UIImage(data: data) {\n completion(thisImage)\n }\n\n }\n\n}\n\nfunc getDataFromUrl(url: URL, completion: @escaping (Data?, ", "URLResponse?, ", "Error?) -", "> ()) {\n URLSession.shared.dataTask(with: url) { data, response, error in\n completion(data, response, error)\n }.resume()\n}\n\nthis is imageClosure\ntypealias imageClosure = (_ thisImage:UIImage) -> Void\n\nand I am calling as such\nlet thisImage:UIImage = myAPIManager.getImageFromData(thisImageURL, completion: { (thisImage:UIImage) in\n\n })\n\nand I get the error on the above line: \nCannot convert value of type '()' to specified type 'UIImage'\n\nA:\n\nYour definition of getImageFromData returns Void (a type whose only member is also called Void, a.k.a the empty tuple, ()). ", "It doesn't return an image.", "\nYou need to set the image inside the callback closure, not by assigning the non-existent return value of the function.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008796346955932677, 0.00196132087148726, 0.001955938758328557, 0.0009445316973142326, 0.0014234654372557998, 0.0007764994516037405, 0.0006863326416350901, 0.001995444530621171 ]
0.001328
8
[ "Q:\n\nAndroid/IOS Mobile application test automation : need recommendation on which framework to use?", "\n\nAppium with webdriver-io (javascript) or Appium with java, selenium is better for Mobile application testing?", "\nI am testing a mobile application which runs in both Android and IOS. ", "Need to use the browserstack service to run the test suit in different devices. ", "At present unable to decide which framework should be used. ", "Using webdriver-io will be convenient of not?", "\n\nA:\n\nIf you have good understanding of JAVAScript then you can use Appium with webdriver-io.", "\n\n2.If you have good understanding of JAVA then you can use Appium with JAVA and use page object with Page factory framework.", "\nI do not suggest selenium for mobile automation testing. ", "You can use appium for mobile automation as it has better method to deal with Native and WebView/Hybrid/Web apps/Angular based apps.", "\nIf you plan to use JAVA you can create single framework for iOS and Android using Page Factory annotations provided by Appium.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000614546297583729, 0.0006637953920289874, 0.0005898821982555091, 0.0007117144414223731, 0.0006624400848522782, 0.0007696955581195652, 0.000653017486911267, 0.0006280065863393247, 0.0006427363259717822, 0.0005698245367966592, 0.0006300972308963537, 0.001995444530621171 ]
0.000761
12
[ "1618 S. Flower St.,\nLos Angeles,\nCA90015\n\nParking Wed, Mar 46:00am+ 2hr after event\n\nThis open-air parking lot is located UNDER Freeway 10 between Venice Blvd. & ", "W. 18th St., directly across from the Toyota Central Dealer. ", "Flower St. is one-way, after crossing Venice Blvd. ", "the lot is located on the left, across from Toyota Downtown Dealer, look for the Public Parking Sign.", "\n\n48 People Recommend Parking Here\n\n32 Left Comments\n\n\"Love it\"\n\nBobby R. on Feb 12, 2015\n\n\"Excellent for on and off I 10 and a 10 miniute walk to the staple Center.\"", "\n\nLouis R. on Jan 11, 2015\n\n\"Was good. ", "Had 2 guys organizing the parking before the game at the Staples Centre.", "\nWalk to The Staples Centre was only 5-8 mins. ", "Walking that shady area at night is not the best idea, but worth saving 20 bucks.\"", "\n\nDerar A. on Dec 10, 2014\n\n\"Easy in and out with a great price. ", "My only wish is for the lot to be better marked. ", "There are a few located close-by and I wanted to be sure to get into the one I had pre-paid for.\"", "\n\nThis open-air parking lot is located UNDER Freeway 10 between Venice Blvd. & ", "W. 18th St., directly across from the Toyota Central Dealer. ", "Be aware that Flower St. is a one-way street. ", "When you are driving SW on Flower St, after crossing Venice Blvd., ", "the parking lot is located on the left and can be identified by a sign that says \"Public Parking\"." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007381407776847482, 0.0006783016142435372, 0.0008477333467453718, 0.0006512936670333147, 0.0006240817601792514, 0.0006048133946023881, 0.0006322998669929802, 0.000640756799839437, 0.0007763736648485065, 0.0006442128214985132, 0.0007158928783610463, 0.0005379868671298027, 0.0008616088889539242, 0.0006783016142435372, 0.004012230783700943, 0.0012611041311174631, 0.0006733207264915109 ]
0.000916
17
[ "Mooball, New South Wales\n\nMooball is a locality in the Tweed Shire, New South Wales, Australia.", "\n\nHistory \nIn 2016, an usually high number of cancer cases in residents of Mooball raised concerns about whether there were radioactive elements introduced through a local sand mining business.", "\n\nReferences\n\nCategory:Northern Rivers\nCategory:Tweed Shire" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0010829390957951546, 0.000608375936280936, 0.0005926481098867953 ]
0.000761
3
[ "FBI helped infiltrate Minnesota protest against police murders\n\nBy Zaida Green\n\n24 March 2015\n\nA protest at the Mall of America last December against police violence was monitored by an FBI Joint Terrorism Task Force cell in close collaboration with local police and mall security, emails obtained by the Intercept show. ", "The protest, called by Black Lives Matter in response to the wave of police killings last year, drew 3,000 demonstrators to the second largest mall in the United States, located in Bloomington, Minnesota, near Minneapolis.", "\n\nThe FBI was alerted to the protest by a confidential tipster who had discovered Facebook posts about the protest. ", "An email by a member of the cell, detailing the time and location of the protest, was then forwarded to the command staff of the Bloomington Police Department.", "\n\nBloomington police infiltrated planning meetings, and Mall of America security created a fake Facebook profile to befriend and monitor members of Black Lives Matter Minneapolis. ", "Mall of America gathered still images and videos of social media activity and compiled profiles of people deemed to be the “ringleaders,” which were forwarded to the local police department and city attorney’s office.", "\n\nTen people believed to be the organizers of the protest were charged by the City of Bloomington with three to eight misdemeanors. ", "An eleventh person, Pamela Twiss, was “identified” and charged after she sent a letter to the city attorney’s office asking them to drop their charges. ", "In addition to these charges, the city and Mall of America are alleging $25,000 in police costs and $40,000 in mall security costs respectively, totaling $65,000 in restitution. ", "No injuries or property damage occurred as a result of the rally.", "\n\nAround 750 emails between the Mall of America and the City of Bloomington, sent in the days leading up to and following the protest, were obtained by data researcher Tony Webstervia through a Freedom of Information Act request. ", "Mall of America officials, the office of Bloomington’s city attorney Sandra Johnson, members of the local political establishment, and the Bloomington Police Department collaborated closely to spy on and prosecute the protesters, often corresponding multiple times within an hour.", "\n\nOf prime importance in the discussions was the need to deter future demonstrations at the mall, particularly those “trying to prove a point.” ", "In an email sent to Bloomington Police Department command staff and Mall of America Director of Security Johnson raised the possibility of charging the organizers of the Black Lives Matter rally with criminal offenses. “", "To do that we need copies of all of their media interviews, their Facebook page, and any footage we can recover. … ", "Can BPD assemble the interviews and other evidence? ", "Can MOA assist in getting us what footage and evidence they have? ", "I would also like an estimate of the cost to the City and the MOA for this event.”", "\n\nThe email was cc’d to Johnson’s assistant attorneys, members of the local political establishment, and Mall of America corporate attorney Kathleen Allen. ", "In another email, Johnson explained, “My office cannot do that—it would require us to be witnesses in our own prosecutions.”", "\n\nAllen responded, “We fully support all efforts by your office to charge the organizers and key leaders with additional criminal charges. … ", "Dan Jasper and our Public Relations Department are currently working on gathering all intel, interviews, etc. ", "from traditional and social media. ", "Doug Reynolds and his security team will also be pulling similar information. … [", "P]lease let us know what else you need to support your efforts. ", "We are happy to help.”", "\n\nJohnson referred to the Mall of America rally as “a powder keg just waiting for a match,” and compared the Mall of America to an “assault victim” and the peaceful demonstrators to an “assailant.” ", "In an interview on the BPD Roll Call, Johnson justified the prosecution of the protesters, saying, “That assailant may not assault this victim again, but [they] might assault another victim … the most effective way of deterring future criminal conduct is to go after the organizers, the ringleaders.”", "\n\nThis is not the first time that Mall of America has collaborated with the police and intelligence apparatus. ", "In 2005, Mall of America formed its own counterterrorism unit, the Risk Assessment and Mitigation (RAM), and hired former Israeli sergeant and security agent Michael Rozin as Security Manager to lead it.", "\n\nThe security program he created for Mall of America was presented to the U.S. House of Representatives’ Committee on Homeland Security as a model for security in the private sector. ", "Both Douglas Reynolds, Mall of America’s Security Director, and Sam Root, the Mall of America Intelligence Analyst who crafted the fake Facebook profile of “Nikki Larson,” had careers in the U.S. Army spanning over two decades.", "\n\nThe neighboring city of Minneapolis, less than 11 miles away, has in recent years also acted as a staging ground for domestic repression and state surveillance. ", "Minneapolis was the site of unannounced urban warfare exercises in August last year, and sent representatives to the Obama administration’s global terrorism summit in February.", "\n\nThe author also recommends:\n\nLegal attack on Minnesota protest against police murders\n\n[7 January 2015]\n\nPlease enable JavaScript to view the comments powered by Disqus." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006668265559710562, 0.0038565006107091904, 0.0006624078378081322, 0.0005830939626321197, 0.004934654571115971, 0.0007015751325525343, 0.0008241887553595006, 0.000841955712530762, 0.0007542234961874783, 0.0009629421401768923, 0.0005685005453415215, 0.0005977981491014361, 0.0005681628827005625, 0.0007219079998321831, 0.0005854484625160694, 0.000635592092294246, 0.0007944775279611349, 0.0008141773287206888, 0.0006310726166702807, 0.0006479430012404919, 0.0006855609244666994, 0.000559506646823138, 0.0006154633592814207, 0.0006297072977758944, 0.0006449791835620999, 0.0005465972935780883, 0.04332755506038666, 0.0009774724021553993, 0.0006374681834131479, 0.0007950940052978694, 0.0005590301007032394, 0.000635279982816428, 0.00055202521616593, 0.0005869432352483273, 0.0006152677815407515 ]
0.002106
35
[ "Steps created\\( 2 \\)\nSteps requeued\\( 3 \\) resumed\\( 4 \\)\nSteps scheduled\\( 5 \\) inflight\\( 0, 0 \\)\n\\[CnC\\] End step my_step\\(0\\)\n\\[CnC\\] End step my_step\\(1\\)\n\\[CnC\\] Start step my_step\\(0\\)\n\\[CnC\\] Start step my_step\\(1\\)\n\\[CnC\\] Start step my_step\\(1\\)\n\\[CnC\\] Start step my_step\\(1\\)\n\\[CnC\\] Start step my_step\\(1\\)\n\\[CnC\\] Suspend step my_step\\(1\\)\n\\[CnC\\] Suspend step my_step\\(1\\)\n\\[CnC\\] Suspend step my_step\\(1\\)\n\\[CnC\\] step my_step\\(0\\): Put item my_items\\[0\\] = 0\n\\[CnC\\] step my_step\\(0\\): Put item my_items\\[1\\] = 1\n\\[CnC\\] step my_step\\(0\\): Put item my_items\\[2\\] = 2\n\\[CnC\\] step my_step\\(0\\): Put item my_items\\[3\\] = 3\n\\[CnC\\] step my_step\\(1\\): Delay item my_items\\[0\\] = not ready\n\\[CnC\\] step my_step\\(1\\): Delay item my_items\\[1\\] = not ready\n\\[CnC\\] step my_step\\(1\\): Delay item my_items\\[2\\] = not ready\n\\[CnC\\] step my_step\\(1\\): Delay item my_items\\[3\\] = not ready\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[0\\] = 0\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[0\\] = 0\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[0\\] = 0\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[1\\] = 1\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[1\\] = 1\n\\[CnC\\] step my_step\\(1\\): Unsafe get item my_items\\[2\\] = 2\n" ]
{ "pile_set_name": "Github" }
[ 0.05243375897407532 ]
0.052434
1
[ "---\nabstract: 'The same-sign diboson process $pp\\to W^\\pm W^\\pm jj$ has been measured at the LHC using leptonic decay channels of the $W$ bosons, with production cross sections of two fiducial regions reported to be consistent with the standard model expectations within 1 sigma. ", "These results constrain new physics models with a modified $W^+W^+W^-W^-$ vertex. ", "We consider in particular the Georgi-Machacek model in which the quartic $W$ boson vertex is effectively modified due to mediations of new Higgs bosons in the model. ", "The relevant gauge-gauge-scalar couplings are all proportional to the vacuum expectation value of the isospin triplets, which can be of $\\mathcal{O}(10)$ GeV because of custodial vacuum alignment. ", "Using the current 8-TeV data at the LHC, we exclude parameter space on the plane of the triplet vacuum expectation value and the new Higgs boson mass. ", "The expected discovery reach at the 14-TeV LHC is also studied.'", "\nauthor:\n- 'Cheng-Wei Chiang'\n- Shinya Kanemura\n- Kei Yagyu\ntitle: 'Novel Constraint on Parameter Space of the Georgi-Machacek Model by Current LHC Data'\n---\n\nIntroduction \\[sec:intro\\]\n==========================\n\nSince its discovery in 2012 summer, the 126-GeV Higgs boson has attracted a lot of interest in studying its detailed properties. ", "Most of such studies are trying to address the question whether it is exactly the one predicted by the Standard Model (SM) or, equivalently, whether it is one of scalar bosons in models with an extension of the Higgs sector. ", "An extended Higgs sector generally leads to a modification of cross sections of various SM processes due to an effect of additional Higgs bosons. ", "It is therefore an important program to study how we can extract the structure of the Higgs sector from modified cross sections.", "\n\nRecently, the ATLAS Collaboration presented the first measurement of the $pp\\to W^\\pm W^\\pm jj$ process with leptonic decays of the $W$ bosons based on their $20.3$ fb$^{-1}$ collision data at $\\sqrt{s} = 8$ TeV [@ATLAS_SSW]. ", "They determined the production cross sections in both inclusive and vector boson scattering (VBS) fiducial regions, with the latter being a subset of the former and more sensitive to electroweak processes. ", "Such data provide constraints on the size of effective $W^+W^+W^-W^-$ vertex that can be significantly modified by mediations of doubly-charged Higgs bosons $H^{\\pm\\pm}$; i.e., $W^\\pm W^\\pm\\to H^{\\pm\\pm}\\to W^\\pm W^\\pm$ through the $W^\\pm W^\\pm H^{\\mp\\mp}$ couplings.", "\n\nThe magnitude of $W^\\pm W^\\pm H^{\\mp\\mp}$ couplings is proportional to the vacuum expectation value (VEV) of an additional Higgs multiplet with a representation larger than the isospin doublet. ", "Usually, such a VEV is constrained to be smaller than a few GeV by the electroweak $\\rho$ parameter, as is the case in, [*e.g.*]{}, the minimal Higgs triplet model [@HTM]. ", "In this case, the modification in the quartic $W$ boson coupling is sufficiently small to be neglected. ", "However, this constraint is circumvented in the Georgi-Machacek (GM) model [@GM] in which a pair of complex and real triplet fields with vacuum alignment are introduced, thereby preserving the custodial symmetry and permitting an [O]{}(10) GeV triplet VEV[^1]. ", "Even though a Higgs sector with an isospin septet field also maintains $\\rho = 1$ at tree level [@septet], it has an accidental U(1) symmetry that could lead to an unwanted Nambu-Goldstone (NG) boson once it is spontaneously broken. ", "We therefore consider the GM model as the minimal well-defined model.", "\n\nIn addition to large $W^\\pm W^\\pm H^{\\mp\\mp}$ vertices, such a large triplet VEV also gives rise to sizeable $ZW^\\pm H^\\mp $ vertices, where $H^\\pm$ are physical singly-charged Higgs bosons. ", "The $ZW^\\pm H^\\mp $ vertices are known to be small in multi-doublet models, because they appear at loop levels [@multi1; @multi2; @multi3]. ", "The size of the vertices is also suppressed in the minimal Higgs triplet model due to the small triplet VEV, similar to the case of $W^\\pm W^\\pm H^{\\mp\\mp}$ vertices. ", "Thus, the measurement of $ZW^\\pm H^\\mp$ vertices is another probe of the GM model. ", "The feasibility studies of measuring the $ZW^\\pm H^\\mp$ vertices have been done in Refs.", " [@HWZ_LHC1; @HWZ_LHC2; @HWZ_LHC3] for the LHC, and in Refs.", " [@HWZ_ILC1; @HWZ_ILC2] for future linear colliders.", "\n\nFurthermore, the large triplet VEV deviates the coupling constants for the SM-like Higgs boson $h$ with the weak gauge bosons $hVV$ and the fermions $hf\\bar{f}$ from their SM values. ", "Unlike the Higgs sector composed of only singlets and doublets, the $hVV$ couplings can be larger than the SM predictions as a result of the larger isospin representation, serving as a distinctive feature of the GM model.", "\n\nIn this work, we compare the cross section of the VBS region driven by the data with its prediction in the GM model. ", "We then show that a significant portion of the parameter space has been ruled out by the ATLAS data. ", "We also estimate the discovery reach for the new Higgs bosons using the same process at the 14-TeV LHC. ", "Based on the above constraint, one can find an upper bound on the triplet VEV for each given mass of the new Higgs bosons. ", "This upper bound in turn determines possible ranges of the $hVV$ and $hf\\bar{f}$ coupling constants and thus the signal strengths for the $gg\\to h\\to VV$ modes in a very predictive way.", "\n\nThis paper is organized as follows. ", "The GM model is briefly reviewed in Section \\[sec:GM\\]. ", "Section \\[sec:LHC\\] shows our primary results based on the latest ATLAS data. ", "Our findings are summarized in Section \\[sec:summary\\].", "\n\nGeorgi-Machacek Model \\[sec:GM\\]\n================================\n\nThe Higgs sector in the GM model is composed of an isospin doublet field, $\\phi$, with hypercharge $Y=1/2$, a complex triplet field, $\\chi$, with $Y=1$, and a real triplet field, $\\xi$, with $Y=0$, where the electric charge $Q$ is given by $Q=T_3+Y$ with $T_3$ being the third component of the isospin. ", "These fields can be expressed in the $SU(2)_L\\times SU(2)_R$ covariant form as: $$\\begin{aligned}\n\\hspace{-5mm}\\Phi=\n\\begin{pmatrix}\n\\phi^{0*} & \\phi^+ \\\\\n-(\\phi^+)^* & \\phi^0\n\\end{pmatrix},~\n\\Delta=\n\\begin{pmatrix}\n\\chi^{0*} & \\xi^+ & \\chi^{++} \\\\\n-(\\chi^+)^* & \\xi^0 & \\chi^{+} \\\\\n(\\chi^{++})^* & -(\\xi^+)^* & \\chi^{0} \n\\end{pmatrix}. ", "\n\\label{eq:Higgs_matrices}\\end{aligned}$$ The neutral components are parameterized as $$\\begin{aligned}\n\\phi^0&=\\frac{1}{\\sqrt{2}}(v_\\phi+\\phi_r+i\\phi_i), \\notag\\\\\n\\chi^0&=v_\\chi+\\frac{1}{\\sqrt{2}}(\\chi_r+i\\chi_i),\\quad \\xi^0=v_\\xi+\\xi_r, \\label{eq:neutral}\\end{aligned}$$ where $v_\\phi$, $v_\\chi$ and $v_\\xi$ are the VEV’s of $\\phi$, $\\chi$ and $\\xi$, respectively. ", "Under the $SU(2)_L\\times SU(2)_R\\times U(1)_Y$ symmetry, the most general Higgs potential contains four dimensionful and five dimensionless parameters, and its explicit form can be found, for example, in Ref.", " [@Chiang_Yagyu_GM].", "\n\nWhen the two triplet fields develop aligned VEV’s, $v_\\chi=v_\\xi \\equiv v_\\Delta$, the $SU(2)_L\\times SU(2)_R$ symmetry reduces to the custodial $SU(2)_V$ symmetry. ", "In that case, the $W$ boson mass $m_W$ and the $Z$ boson mass $m_Z$ have the same form as in the SM; i.e., $m_W^2 = g^2v^2/4$ and $m_Z^2=g^2v^2/(4\\cos^2\\theta_W)$, where $v^2$ is related to the Fermi constant $G_F$ by $v^2\\equiv v_\\phi^2+8v_\\Delta^2=1/(\\sqrt{2}G_F)$, and $\\theta_W$ is the weak mixing angle. ", "Therefore, the electroweak $\\rho$ parameter defined by $\\rho_{\\text{tree}} \\equiv m_W^2/(m_Z^2\\cos^2\\theta_W)$ is unity at tree level.", "\n\nThe component scalar fields can be classified into irreducible representations of $SU(2)_V$ multiplets. ", "The scalar fields from the doublet $\\Phi$ are decomposed as ${\\bf 2}\\otimes {\\bf 2}={\\bf 3}\\oplus{\\bf 1}$, and those from the triplet $\\Delta$ as ${\\bf 3}\\otimes {\\bf 3}={\\bf 5}\\oplus{\\bf 3}\\oplus{\\bf 1}$. As a result, we have one 5-plet, two 3-plet and two singlet representations, where the latter two can mix with each other with mixing angles $\\theta_H$ and $\\alpha$. The mixing angle $\\theta_H$ is defined by $\\sin\\theta_H=2\\sqrt{2}v_\\Delta/v$, while $\\alpha$ is determined by the quartic coupling constants in the Higgs potential. ", "The 5-plet states are physical and denoted by ($H_5^{\\pm\\pm},H_5^\\pm,H_5^0$). ", "On the other hand, one linear combination of the two 3-plets corresponds to the NG bosons ($G^\\pm,G^0$) that become the longitudinal components of the $W$ and $Z$ bosons, respectively. ", "The other linear combination gives the physical 3-plet Higgs bosons ($H_3^\\pm,H_3^0$). ", "Furthermore, after diagonalizing the mass matrix for the two $SU(2)_V$ singlet fields, we obtain two CP-even neutral Higgs bosons. ", "One of them should be identified as the 126-GeV Higgs boson at the LHC. ", "Due to the custodial symmetry, Higgs bosons belonging to the same $SU(2)_V$ multiplet are degenerate in mass.", "\n\nSeven of the nine parameters in the Higgs potential can be converted into the following physical parameters: four mass parameters for the 5-plet, 3-plet and two singlet Higgs bosons, one mixing angle $\\alpha$, and two VEV’s $v$ and $v_\\Delta$. The remained two parameters, which are given as the coefficients of the trilinear scalar vertices, enter the mass formulas of the Higgs bosons. ", "One can tune the two parameters to realize the decoupling limit, where the 5-plet, 3-plet and one of the singlet Higgs bosons are much heavier than the electroweak scale. ", "These parameters can be constrained by such theoretical arguments as perturbative unitarity [@Aoki_Kanemura] and vacuum stability [@Logan].", "\n\nIn the following, we summarize a few characteristic features of the GM model. ", "First, the triplet VEV $v_\\Delta$ can be $\\mathcal{O}$(10) GeV, with an upper limit of about 80 GeV as required by the perturbativity of the top Yukawa coupling. ", "Such a large triplet VEV gives rise to distinctive phenomenology in collider experiments [@Chiang_Yagyu_GM; @Nomura; @An-Li; @Englert]. ", "Second, the $hVV$ couplings ($V=W,Z$) for the SM-like Higgs boson $h$ can be larger than their SM values. ", "The ratios of the $hVV$ and $hf\\bar{f}$ couplings to their respective SM values are given by $$\\begin{aligned}\nc_{hVV}^{}=c_H c_\\alpha +\\sqrt{\\frac{8}{3}}s_Hs_\\alpha , ~\nc_{hff}^{}=\\frac{c_\\alpha}{c_H}, \n\\label{eq:cratio}\\end{aligned}$$ where $c_H$, $s_H$, $c_\\alpha$ and $s_\\alpha$ are respectively $\\cos\\theta_H$, $\\sin\\theta_H$, $\\cos\\alpha$ and $\\sin\\alpha$. It is the group factor $\\sqrt{8/3}$ in $c_{hVV}$ that makes it possible for the $hVV$ couplings to be larger than their SM values. ", "This feature is not shared by models extended with only multi-doublets and/or singlets. ", "Therefore, $c_{hVV} > 1$ is one crucial signature to identify the GM model, particularly when $v_\\Delta$ is sizeable.", "\n\nFinally, the 3-plet Higgs bosons are “fermion-philic\"; [*i.e.*]{}, they couple to fermions due to their components from $\\Phi$ through mixing, but they do not couple to the weak gauge bosons. ", "In fact, properties of the 3-plet Higgs bosons are quite similar to those of the CP-odd and singly-charged Higgs bosons in the Type-I two Higgs doublet model. ", "Its phenomenology has been studied a lot in the literature [@Type-I]. ", "On the contrary, the 5-plet Higgs bosons are “gauge-philic”; namely, they have interactions with the weak gauge bosons, but they do not couple to SM fermions because they involve purely components in the $\\Delta$ field. ", "Thus, they decay dominantly into gauge boson pairs [^2]. ", "Magnitudes of the 5-plet Higgs couplings with the weak bosons are all proportional to $v_\\Delta$: $$\\begin{aligned}\n&(H_5^{\\pm\\pm}W^\\mp W^\\mp): \\frac{g}{\\sqrt{2}}m_Ws_H,~\n(H_5^{\\pm}W^\\mp Z): -gm_Zs_H,\\notag\\\\\n&(H_5^{0}W^+W^-): -\\frac{gm_Ws_H}{\\sqrt{3}},~\n(H_5^{0}ZZ): \\frac{2 gm_Zs_H}{\\sqrt{3}c_W}. ", "\\end{aligned}$$ When $v_\\Delta$ is large, cross sections of the VBS processes can be significantly modified due to the mediation of the 5-plet Higgs bosons through the above vertices. ", "We therefore expect the cross section measured by ATLAS to impose a strong constraint on the model.", "\n\nCurrent LHC Constraint \\[sec:LHC\\]\n==================================\n\nFor the same-sign diboson process of $pp\\to jjW^\\pm W^\\pm$ with $W^\\pm \\to \\ell^\\pm \\nu$ ($\\ell=e,\\mu$) measured by the ATLAS [@ATLAS_SSW], the 5-plet Higgs bosons $H_5^{\\pm\\pm}$ and $H_5^0$ can contribute through $s$-channel and $t$-channel, respectively. ", "For definiteness, we fix the $hVV$ couplings at their SM values. ", "We have checked that the VBS cross section varies by less than 1% when the $hVV$ couplings are changed by $30\\%$ and, therefore, the bound on $v_\\Delta$ is essentially unchanged within the range. ", "Under this assumption, the modification of the VBS cross section of $pp\\to jjW^\\pm W^\\pm$ process depends only on $v_\\Delta$ and $m_{H_5}$, the mass of $H_5^{\\pm\\pm}$ and $H_5^0$. In Ref.", " [@ATLAS_SSW], the signal events are classified as the inclusive region and the VBS region. ", "In both of the cases, the following basic kinematic cuts are imposed: $$\\begin{aligned}\n&p_T^\\ell > 20~\\text{GeV},~p_T^j > 30~\\text{GeV},~E_T\\hspace{-4.0mm}/\\hspace{2mm}>40~\\text{GeV},\\notag\\\\\n&|\\eta^\\ell|<2.5,~|\\eta^j|<4.5,\\notag\\\\\n&\\Delta R_{\\ell\\ell}>0.3,~\\Delta R_{jj} > 0.4,~\\Delta R_{\\ell j} > 0.3,\\notag\\\\\n&M_{jj} > 500~\\text{GeV},~M_{\\ell\\ell} > 20~\\text{GeV}, \\label{basic}\\end{aligned}$$ where $p_T^X$, and $\\eta^X$ and $M_{XX}$ are the transverse mass and pseudorapidity for $X$, respectively. ", "The distance between $X$ and $Y$ is denoted by $\\Delta R_{XY}$, and $E_T\\hspace{-4mm}/\\hspace{2mm}$ is the missing transverse energy. ", "The signal events for the inclusive region are obtained by only taking the above cuts. ", "For the VBS region, one further imposes the following cut: $$\\begin{aligned}\n|\\Delta y_{jj}| > 2.4, \n\\label{eq:rapidity}\\end{aligned}$$ where $\\Delta y_{jj}$ is the rapidity difference between the dijets. ", "We note that the cross section of the inclusive region includes contributions from both electroweak and strong processes, while that of the VBS region mainly the electroweak processes due to the cut in Eq.", " (\\[eq:rapidity\\]). ", "From the measured $pp\\to jj\\ell^\\pm \\ell^\\pm E_T\\hspace{-4mm}/\\hspace{2mm}$ events and Monte Carlo background simulations, the fiducial cross sections for the inclusive and VBS regions are respectively derived to be 2.1$\\pm$0.5(stat)$\\pm$0.3(sys) fb and 1.3$\\pm$0.4(stat)$\\pm$0.2(sys) fb [@ATLAS_SSW]. ", "The corresponding SM cross sections quoted in Ref.", " [@ATLAS_SSW] are 1.52$\\pm$ 0.11 fb and 0.95$\\pm$0.06 fb. ", "Therefore, the SM predictions are consistent with the measured fiducial cross sections within 1$\\sigma$.\n\nIn the following numerical analysis, we use [MadGraph5]{} [@MG5] for simulations and [CTEQ6L]{} for the parton distribution functions. ", "Before comparing the cross sections in the GM model with the fiducial values, we first calibrate the SM cross sections. ", "Our SM simulations give the inclusive cross section as 1.66 fb and the VBS cross section as 1.06 fb. ", "We will thus multiply the factors 0.92 (=1.52 fb/1.66 fb) and 0.90 (=0.95 fb/1.06 fb) to the cross sections simulated in our analysis in the inclusive and VBS regions, respectively. ", "We confirm that the VBS region has a better sensitivity than the inclusive region. ", "For example, using the analysis based on the VBS (inclusive) region, we obtain in the case of $m_{H_5}=200$ GeV the upper limit of 27 GeV (32 GeV) at the 68% CL and 33 GeV (40 GeV) at the 95% CL for $v_\\Delta$. Therefore, we concentrate on the VBS cross section in the following analysis.", "\n\n![", "image](limit_8TeV_v3.eps){width=\"75mm\"} ![", "image](limit_14TeV_v2.eps){width=\"75mm\"}\n\nThe left plot in Fig.", " \\[Fig:VBA\\] shows the excluded parameter region on the $m_{H_5}$- $v_\\Delta$ plane according to the current 20.3 fb$^{-1}$ data of 8-TeV LHC. ", "The region above the black (red) curve is excluded at the 68% (95%) CL. ", "The most severe upper bound on $v_\\Delta$ is about 30 GeV at the 95% CL in the case of $m_{H_5}=200$ GeV. When a larger value of $m_{H_5}$ is taken, the bound on $v_\\Delta$ becomes more relaxed due to smaller production cross sections. ", "When $m_{H_5}$ is taken to be smaller than about 200 GeV, a milder bound on $v_\\Delta$ is also obtained, as more events from the 5-plet Higgs bosons are rejected by the kinematic cuts in Eq.", " (\\[basic\\]). ", "As a comparison, we also show by the green dashed curve in this plot the constraint from the measurement of $R_b^{\\text{exp}}=0.21629\\pm 0.00066$ [@PDG], which depends on the mass of 3-plet Higgs bosons $m_{H_3}$ and $v_\\Delta$ [@Haber; @Chiang_Yagyu_GM]. ", "The region above the dashed curve is excluded at 95% CL.", "\n\nBy applying the same analysis for the VBS region to the case of 14-TeV collisions, one can calculate expected cross section deviations from the SM predictions for different luminosities. ", "In the right plot of Fig.", " \\[Fig:VBA\\], we show the expected 5-sigma reach for excess in the $pp\\to jj W^\\pm W^\\pm$ process at the 14-TeV LHC on the $m_{H_5}$- $v_\\Delta$ plane. ", "The integrated luminosity is assumed to be 30, 100 and 300 fb$^{-1}$ for the three curves. ", "Similar to the analysis of 8-TeV data, the discovery reach becomes the largest at around $m_{H_5}=200$ GeV, where a 5-sigma discrepancy is expected in the cases of $v_\\Delta \\gtrsim 24$, 17 and 12 GeV for the luminosity of 30, 100, 300, and 3000 fb$^{-1}$, respectively. ", "The constraint from $R_b$ is also displayed in this plot.", "\n\n![ ", "The green region on the $\\alpha$-$v_\\Delta$ plane marks the region where $\\mu_{VV}$, defined in Eq.", " (\\[mu\\_VV\\]), are within $1.0\\pm 0.1$. The contours for the $hVV$ coupling ratio, $c_{hVV}$, and those for the $hff$ coupling ratio, $c_{hff}$, are also superimposed as blue dashed and red dotted curves, respectively. []{", "data-label=\"Fig:mu_VV\"}](contour_v6_wo_grid.eps){width=\"90mm\"}\n\nFig.", " \\[Fig:mu\\_VV\\] shows the contours of signal strengths for the $h\\to VV$ channel defined by $$\\begin{aligned}\n\\mu_{VV}^{}\\equiv \n\\frac{\\sigma(gg\\to h)\\times \\mathcal{B}(h\\to VV)}{\\sigma(gg\\to h)_\\text{SM}\\times \\mathcal{B}(h\\to VV)_\\text{SM}}, \\label{mu_VV}\\end{aligned}$$ from the gluon fusion production mechanism, where $\\sigma(gg\\to h)$ and $\\mathcal{B}(h\\to VV)$ are respectively the gluon fusion cross section and the branching ratio of the $h\\to VV$ decay. ", "It is seen that even in the case with $\\mu_{VV}^{}\\simeq 1$ as favored by the current LHC data, there are regions with $c_{hVV}^{}>1$. This is because the enhancement in $\\mathcal{B}(h\\to VV)$ is compensated by the suppression in the gluon fusion cross section due to $c_{hff}^{}<1$. This signifies the importance of studying the VBS process in addition to the gluon fusion process in order to reliably fix the exact values of $hVV$ and $hff$ couplings. ", "Signatures of enhanced VBS processes in the GM model at the LHC had been studied in Ref.", " [@An-Li]. ", "Finally, we comment on precision measurements of the $hVV$ couplings at future collider experiments such as the High-Luminosity LHC (HL-LHC) and the International Linear Collider (ILC). ", "At the ILC, the $hVV$ couplings are supposed to be measured at about 1 % accuracy [@ILC_TDR; @ILC_White] with the 500-GeV collisions and an integrated luminosity of 500 fb$^{-1}$. By combining the independent measurements of $\\mu_{VV}^{}$ at the HL-LHC and the $hVV$ couplings at the ILC, we will be able to determine parameters of the GM model, such as $\\alpha$ and masses of extra Higgs bosons [^3] even if we cannot directly discover them at the early stage.", "\n\nConclusions \\[sec:summary\\]\n===========================\n\nWe have studied the constraint on the GM model based on the first measurement of the same-sign diboson process $pp\\to W^\\pm W^\\pm jj$ by the ATLAS Collaboration. ", "In the GM model, the doubly-charged and neutral Higgs bosons in the $SU(2)_V$ 5-plet contribute to the above process. ", "Because the gauge-gauge-scalar vertices for the 5-plet Higgs bosons are all proportional to the triplet VEV $v_\\Delta$, we have established the excluded parameter space on the $m_{H_5}$-$v_\\Delta$ plane. ", "For example, we have found that the upper bound on $v_\\Delta$ is about 30, 37 and 55 GeV for the case of $m_{H_5}=200$, 400 and 600 GeV at the 95% CL, respectively. ", "We have also analyzed the expected 5-sigma reach for the same process at the 14-TeV LHC. ", "As an example, assuming the integrated luminosity of 300 fb$^{-1}$, we expect a 5-sigma deviation for $v_\\Delta=$ 12, 19 and 38 GeV when $m_{H_5}=200$, 500 and 1000 GeV, respectively.", "\n\nAcknowledgments {#acknowledgments .unnumbered}\n===============\n\nS.K. thanks the hospitality of NCTS, Taiwan during his visit where part of this work was done. ", "This work was supported in part by the Ministry of Science and Technology of R. O. C. under Grant Nos.", " NSC-100-2628-M-008-003-MY4, NSC-101-2811-M-008-014, the National Science Foundation under Grant No.", " NSF PHY11-25915, and Grant-in-Aid for Scientific Research from JSPS and MEXT, Nos. ", "22244031, 24340046 and 23104006.", "\n\n[99]{}\n\nATLAS Collaboration, No. ", "ATLAS-CONF-2014-013. ", "W. Konetschny and W. Kummer, Phys.", " Lett.", " B [**70**]{}, 433 (1977); T. P. Cheng and L. -F. Li, Phys.", " Rev. D [**22**]{}, 2860 (1980). ", "H. Georgi and M. Machacek, Nucl.", " Phys.", " B [**262**]{}, 463 (1985); M. S. Chanowitz and M. Golden, Phys.", " Lett.", " B [**165**]{}, 105 (1985). ", "A. G. Akeroyd, C. W. Chiang and N. Gaur, JHEP [**1011**]{}, 005 (2010) \\[arXiv:1009.2780 \\[hep-ph\\]\\]. ", "G. Aad [*et al.*]{} ", "\\[ATLAS Collaboration\\], Phys.", " Rev. D [**85**]{}, 032004 (2012); S. Chatrchyan [*et al.*]{} ", "\\[CMS Collaboration\\], Eur.", " Phys.", " J. C [**72**]{}, 2189 (2012). ", "S. Kanemura, K. Yagyu and H. Yokoya, Phys.", " Lett.", " B [**726**]{}, 316 (2013); S. Kanemura, M. Kikuchi, K. Yagyu and H. Yokoya, arXiv:1407.6547 \\[hep-ph\\].", "\n\nJ. Hisano and K. Tsumura, Phys.", " Rev. D [**87**]{}, 053004 (2013); S. Kanemura, M. Kikuchi and K. Yagyu, Phys.", " Rev. D [**88**]{}, 015020 (2013). ", "J. A. Grifols and A. Mendez, Phys.", " Rev. D [**22**]{}, 1725 (1980). ", "M. Capdequi Peyranere, H. E. Haber and P. Irulegui, Phys.", " Rev. D [**44**]{}, 191 (1991). ", "S. Kanemura, Phys.", " Rev. D [**61**]{}, 095001 (2000); Eur.", " Phys.", " J. C [**17**]{}, 473 (2000).", "\n\nE. Asakawa and S. Kanemura, Phys.", " Lett.", " B [**626**]{}, 111 (2005). ", "E. Asakawa, S. Kanemura and J. Kanzaki, Phys.", " Rev. D [**75**]{}, 075022 (2007). ", "S. Godfrey and K. Moats, Phys.", " Rev. D [**81**]{}, 075026 (2010).", "\n\nS. Kanemura, K. Yagyu and K. Yanase, Phys.", " Rev. D [**83**]{}, 075018 (2011).", "\n\nY. Shinzaki, Talk given at LCWS, 2014.", "\n\nC. -W. Chiang and K. Yagyu, JHEP [**1301**]{}, 026 (2013). ", "M. Aoki and S. Kanemura, Phys.", " Rev. D [**77**]{}, 095009 (2008) \\[Erratum-ibid.", " D [**89**]{}, no. ", "5, 059902 (2014)\\]. ", "K. Hartling, K. Kumar and H. E. Logan, arXiv:1404.2640 \\[hep-ph\\].", "\n\nC. W. Chiang, T. Nomura and K. Tsumura, Phys.", " Rev. D [**85**]{}, 095023 (2012). ", "C. Englert, E. Re and M. Spannowsky, Phys.", " Rev. D [**89**]{}, 095014 (2013). ", "C. -W. Chiang, A. -L. Kuo and K. Yagyu, JHEP [**1310**]{}, 072 (2013). ", "For reviews on THDMs, see G. C. Branco, P. M. Ferreira, L. Lavoura, M. N. Rebelo, M. Sher and J. P. Silva, Phys.", " Rept.", "  [**516**]{}, 1 (2012).", "\n\nJ. Alwall, M. Herquet, F. Maltoni, O. Mattelaer and T. Stelzer, JHEP [**1106**]{}, 128 (2011).", "\n\n\\[ILC Technical Design Report\\], H. Baer, [*et al.*]{}, ", "arXiv:1306.6352 \\[hep-ph\\]. ", "\\[ILC Higgs White Paper\\], D. M. Asner, [*et al.*]{}, ", "arXiv:1310.0763 \\[hep-ph\\]. ", "J. Beringer et al. (", "Particle Data Group), Phys.", " Rev. D[**86**]{}, 010001 (2012).", "\n\nH. E. Haber and H. E. Logan, Phys.", " Rev. D [**62**]{}, 015011 (2000).", "\n\n[^1]: If this alignment of triplet VEV’s is relaxed, the upper bound on the triplet VEV’s can be similar to that in the minimal triplet Higgs model. ", "In such a case, the $W^\\pm W^\\pm\\to H^{\\pm\\pm}\\to W^\\pm W^\\pm$ process is negligible, and the pair production $pp\\to H^{++}H^{--}$ and the associated production with singly-charged Higgs bosons $pp\\to H^{\\pm\\pm}H^\\mp$ can be used for the $H^{\\pm\\pm}$ production at the LHC. ", "From the same-sign dilepton data at the LHC with the collision energy to be 7 TeV, the lower bound for the mass of $H^{\\pm\\pm}$ has been derived to be about 400 GeV [@dilepton] and about 60 GeV [@diboson] when $H^{\\pm\\pm}$ mainly decay into the same-sign leptons and dibosons, respectively.", "\n\n[^2]: When the mass of the 3-plet Higgs bosons is smaller than that of the 5-plet Higgs bosons, the latter can decay into the former and a weak gauge boson.", "\n\n[^3]: When $c_{hVV}\\neq 1$ is found in future experiments, one can obtain upper limits on the masses of extra Higgs bosons from the unitarity and vacuum stability bounds [@An-Li].", "\n" ]
{ "pile_set_name": "ArXiv" }
[ 0.0007109345751814544, 0.0007969908183440566, 0.0007536088232882321, 0.0008790189167484641, 0.0006561530171893537, 0.0005367305129766464, 0.0006270918529480696, 0.0005940135451965034, 0.0008000534144230187, 0.0005639499286189675, 0.0007411957485601306, 0.0005792704178020358, 0.0029982675332576036, 0.0044595832005143166, 0.0008793376618996263, 0.004243746865540743, 0.000817932013887912, 0.0007921857759356499, 0.0005710051627829671, 0.010170992463827133, 0.0026557128876447678, 0.0011907240841537714, 0.000968861160799861, 0.002682337537407875, 0.0007988631841726601, 0.0007700920687057078, 0.0021355636417865753, 0.001161710824817419, 0.000530988909304142, 0.0005547021864913404, 0.000587042304687202, 0.0007752348319627345, 0.002289232797920704, 0.00055746576981619, 0.0005733081488870084, 0.000572873861528933, 0.0005736893508583307, 0.0014985543675720692, 0.005640044342726469, 0.035782020539045334, 0.0008685750071890652, 0.0007474265294149518, 0.0014873113250359893, 0.0029375595040619373, 0.0014288205420598388, 0.0006167332176119089, 0.0018399268155917525, 0.000977025949396193, 0.0017591404030099511, 0.0009247256093658507, 0.001050767139531672, 0.0006828333716839552, 0.0009895645780488849, 0.0006960481987334788, 0.0007457215106114745, 0.0006094330456107855, 0.0005382628296501935, 0.001054517226293683, 0.0011700857430696487, 0.0038399002514779568, 0.022052709013223648, 0.0013862756313756108, 0.0006711886380799115, 0.003109534503892064, 0.0011896278010681272, 0.0005927020683884621, 0.002974899485707283, 0.0006924694171175361, 0.02092227153480053, 0.000877545156981796, 0.0005419534863904119, 0.0032441236544400454, 0.007728667464107275, 0.000804650888312608, 0.0008739849436096847, 0.0005561861325986683, 0.005192731972783804, 0.0011879700468853116, 0.0005568592459894717, 0.0007337651331909001, 0.0005458007799461484, 0.0006982632912695408, 0.006171670276671648, 0.000650816538836807, 0.006360576953738928, 0.0006470429361797869, 0.0005775564350187778, 0.0006667865091003478, 0.0005942046409472823, 0.0005506399320438504, 0.0005886576254852116, 0.0019055769080296159, 0.000715161208063364, 0.0006316988146863878, 0.0007107279379852116, 0.0007363029872067273, 0.0007373326225206256, 0.0008835668559186161, 0.0007430533296428621, 0.0006669152062386274, 0.000603817286901176, 0.0005708253011107445, 0.0006342200795188546, 0.0007821978651918471, 0.0006043838220648468, 0.0006541910697706044, 0.000895569974090904, 0.0019055769080296159, 0.0008693035924807191, 0.0008476969669573009, 0.0006182108772918582, 0.001925714430399239, 0.00113322411198169, 0.0005910508916713297, 0.0008070924086496234, 0.0005777361802756786, 0.000655026757158339, 0.0007665681187063456, 0.0007632722845301032, 0.0008818662026897073, 0.0007040979689918458, 0.0005200223531574011, 0.0006346880691125989, 0.000595117686316371, 0.0005922025884501636, 0.0006934286211617291, 0.000625498709268868, 0.0007286834297701716, 0.0006774762878194451, 0.0006795792141929269, 0.0010086322436109185, 0.0019435402937233448, 0.0007854020223021507, 0.0007163474219851196, 0.0010815091663971543, 0.0012429299531504512, 0.0007806512294337153, 0.0019435402937233448, 0.0009730221354402602, 0.0008698098827153444, 0.0007281700964085758, 0.0007362819160334766, 0.0007061097421683371, 0.0007276172400452197, 0.0012429299531504512, 0.000796900421846658, 0.0007753075333312154, 0.0019435402937233448, 0.0007204507128335536, 0.0009284538682550192, 0.0007784745539538562, 0.0007215664954856038, 0.0008501227712258697, 0.0006932555115781724, 0.0011375134345144033, 0.000712768582161516, 0.0007742089219391346, 0.0007312179659493268, 0.0012429299531504512, 0.0007634868961758912, 0.0007933045271784067, 0.0019435402937233448, 0.0008036037324927747, 0.000755466113332659, 0.0007415673462674022, 0.0008840329246595502, 0.0007130933227017522, 0.0007237392710521817, 0.0007304681930691004, 0.0006183243240229785, 0.0007372841355390847, 0.0008292267448268831, 0.000935071730054915, 0.0010597894433885813, 0.0008566635078750551, 0.0007257923134602606, 0.0008033908670768142, 0.0007313426467590034, 0.0008374768658541143, 0.0007387100486084819, 0.0007583306869491935, 0.0006083727348595858, 0.0027770872693508863, 0.000786872988101095, 0.0007022058707661927, 0.0006838515982963145, 0.0008631809032522142, 0.0006689723231829703, 0.001029130071401596, 0.0006436509429477155, 0.0006568469107151031, 0.0007484846864826977, 0.0009584561921656132, 0.0007138997316360474, 0.0008804564131423831, 0.002421438926830888, 0.0008442601538263261, 0.0015594267752021551, 0.0007932437001727521, 0.001995444530621171 ]
0.001564
200
[ "News\n\nPoor People's Campaign Update\n\nMay 31, 2018\n\nCWAers and retirees have been joining tens of thousands of people across the country to participate in nonviolent direct actions to fight back against the structures that are undermining our democracy and supporting economic injustice.", "\n\nThis renewal of the Poor People's Campaign comes 50 years after Dr. Martin Luther King, Jr., first put forth his vision of a multi-racial movement to address the root causes of poverty. ", "CWA's Human Rights Growth Fund is supporting work with the Poor People's Campaign." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0010997997596859932, 0.0014981355052441359, 0.0010432328563183546 ]
0.001214
3
[ "Evidence of a significant role for Fas-mediated apoptosis in HCV clearance during pegylated interferon plus ribavirin combination therapy.", "\nThe role of apoptosis in treatment-induced HCV clearance is controversial. ", "We sought to assess the kinetics of serum apoptosis-related cytokines during pegylated interferon-α2a or -α2b plus weight-based ribavirin therapy for genotype 1 chronic HCV infection. ", "Serum levels of soluble Fas (sFas), soluble Fas ligand (sFasL) and soluble tumour necrosis factor receptor I (sTNF-RI) were measured at baseline, week 12 and 24 weeks after the end of therapy. ", "Sustained virological response (SVR) was achieved in 46% of the 164 included patients, 29% had a non-response (NR) and 25% had relapse (RR). ", "NR patients presented with higher levels of sFasL at baseline and lower levels of sTNF-RI at week 12 as compared to RR and SVR patients. ", "Lower concentrations of sFas were observed in SVR patients 24 weeks after treatment as compared to RR and NR patients. ", "An increase in sFas at week 12 followed by a significant drop 24 weeks after therapy was observed among SVR patients. ", "An increase in sFasL during and after treatment was observed in RR and SVR patients. ", "NR patients exhibited an earlier drop in sTNF-RI levels as compared to RR and SVR patients. ", "Virological response during HCV therapy was associated with an increase of sFas and sFasL, and maintenance of increased concentrations of sTNF-RI." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006330898613668978, 0.0005805034888908267, 0.0005932259955443442, 0.0006223112577572465, 0.0006338167004287243, 0.0007142627728171647, 0.0006806685123592615, 0.0006540308240801096, 0.0006103601772338152, 0.0007223573629744351, 0.0006458230782300234 ]
0.000645
11
[ "Q:\n\nComparison on numeric part of string in MySQL\n\nI have a field that contains version information such as:\nV12.0\nV1.0\nBE0.50\nVV24\n\nI want to query for version greater then n. The number I want to do the comparison on is preceded by a non-fixed number of characters. ", "Is it possible to do something like: \nSELECT version FROM table WHERE int_part(version) > 10\n\nV12.0\nVV24\n\nA:\n\nIn this case it seems that version number appears in end only, alphabets are in beginning. ", "So, probable solution will be to reverse the string, type cast it to get numbers, then reverse back the number obtained. ", "\nTry following solution\n SELECT version\n FROM table\n HAVING CAST(REVERSE(IF(LOCATE(\".\", ", "version), (CAST(REVERSE(version) AS DECIMAL(4,2))), (CAST(REVERSE(version) AS UNSIGNED INTEGER)))) AS DECIMAL(4,2)) > 12;\n\nHope it helps...\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000680477125570178, 0.0006765262223780155, 0.000720434240065515, 0.0007473828154616058, 0.0006605620728805661 ]
0.000697
5
[ "True, true, and unrelated: tubal patency, tubal architecture, and tubal function.", "\n\"To understand the actual world as it is, not as we should wish it to be, is the beginning of wisdom.\" - ", "Bertrand Russell." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006004891474731266, 0.0006136847659945488, 0.0007627859013155103 ]
0.000659
3
[ "Just days after being hit with eight more felony charges, XXXTentacion is now being given a break as he awaits his domestic violence trial. ", "According to TMZ, the Florida rapper will reportedly be released from prison later today (Dec. 20) and put on house arrest for the next two months.", "\n\nThe outlet reports that X will be under \"very restrictive house arrest conditions\" while he awaits his next court date on Jan. 24, 2018. ", "While the conditions and rules of the house arrest are not exactly clear, XXXTentacion's attorney, David Bogenschultz, says that the judge will allow the South Florida rapper to visit a local studio to record in order to fulfill his contractual obligations.", "\n\nBeing that he has been hit with new felony charges tied to witness tampering, XXXTentacion is restricted from having any contact with the victims or any witness in the current case.", "\n\nAfter 60 days, the 17 entertainer's house arrest will expire, which is when his legal team will be pushing to have him released on bond for the remainder of the trial.", "\n\nWith this release, fans can anticipate some new music to come from Tentacion soon, as well as a possible response to his new felony charges, but for now, we'll keep track of his case in court." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008969341404736042, 0.0021233430597931147, 0.0005935420631431043, 0.000633460411336273, 0.0015812464989721775, 0.0007256281678564847, 0.0005527103785425425 ]
0.002168
7
[ "\n365 F.Supp. ", "138 (1973)\nRobert John WOLCOTT\nv.\nJohn J. NORTON, Warden, Federal Correctional Institution, Danbury, Connecticut.", "\nCiv. ", "A. No. ", "B-604.", "\nUnited States District Court, D. Connecticut.", "\nJanuary 8, 1973.", "\n*139 Robert John Wolcott, pro se.", "\nAndrew B. Bowman, Asst. ", "U. S. Atty., ", "Bridgeport, Conn., for respondent.", "\n\nMEMORANDUM OF DECISION\nNEWMAN, District Judge.", "\nThe petitioner, presently serving an eighteen-month sentence at the Federal Correctional Institution at Danbury, Connecticut, seeks to obtain credit for time spent in state custody during the pendency of federal parole violator charges against him.[1]\nOn November 18, 1969, the petitioner, who had been serving a five-year sentence for interstate transportation of a stolen motor vehicle, was mandatorily released from federal custody and placed under parole supervision, which was to last until May 1, 1971. ", "On March 11, 1970 he was arrested by New York state authorities in Nassau County and charged with possession of stolen property. ", "The same day, the Nassau County court denied petitioner bail in connection with this charge, basing its decision solely on the ground that a federal parole violator warrant had been issued for him. ", "In fact, the warrant did not issue until March 12, when it was lodged as a detainer against petitioner, but federal authorities, informed on March 11 of petitioner's arrest, apparently indicated to the state court on that date that the warrant would be immediately forthcoming. ", "The Government concedes that the state judge based his denial of bail on the existence of the federal parole violator charges, even though the federal warrant formalizing the charges was not issued until the following day.", "\nThe petitioner pled guilty to the state charges on June 8, 1970, and was sentenced on July 28, 1970, to one year in Nassau County Jail, the sentence to be computed as beginning on March 11. ", "The petitioner had been held in state custody continuously from that date until the date of sentence.", "\nWolcott was released from Nassau County Jail on January 4, 1971, having received sixty-five days good time, and apparently was taken into federal custody on this date. ", "On January 11, 1971, at a hearing before the United States Parole Board at the Federal House of Detention in New York City, the petitioner's parole was revoked, and he was ordered to serve the remainder of his term of seventeen months and nineteen days. ", "During this period of incarceration, on October 26, 1971, the petitioner was sentenced to an additional eighteen months consecutive term for escape, which he is presently serving.", "\nPetitioner contends that the period in state custody from March 11, 1970, to July 28, 1970, should be viewed as time spent in jail awaiting disposition of the federal parole violator charges and, under 18 U.S.C. § 3568, should be credited against his federal sentence.[2] The Government agrees that normally where state bail is refused because of the pendency of federal parole violator charges, the state pretrial time should be credited against the ultimate service of the federal time. ", "See Davis v. Attorney General, 425 F.2d 238 (5th Cir. ", "1970); Jackson v. Attorney General, 447 F.2d 747 (5th Cir. ", "1971); Willis v. United States, 409 F.2d 830 (5th Cir. ", "1971). ", "But the Government contends such pretrial *140 time should not be credited against Wolcott's federal sentence since it has already been credited against his state sentence.", "\nNo issue is raised as to whether it is constitutionally permissible for New York to require Wolcott to serve time for possessing stolen goods and for the United States to require him to serve, in addition, the balance of his sentence for interstate car theft, even though service of this balance results from an act that violates state law. ", "Cf. ", "Gilbert v. United States, 299 F.Supp. ", "689 (S.D. N.Y.1969). ", "The sole question is whether Congress, in enacting § 3568, intended to give a prisoner in Wolcott's circumstances credit for his state pre-sentence time.", "\nSection 3568 was amended in 1966 to make certain that pretrial detention time was credited against the sentence finally imposed. ", "P.L. 89-465, 80 Stat. ", "214 (1966). ", "The House amended the Senate version of the bill by inserting the phrase \"or acts\" in the sentence that now reads \"The Attorney General shall give any such person credit toward service of his sentence for any days spent in custody in connection with the offense or acts for which sentence was imposed.\" ", "The report of the House Judiciary Committee explains that this addition was made to cover the situation where a person is arrested and held on one charge and subsequently convicted and sentenced on a lesser charge; moreover, the change \"would also include credit for time spent in State custody on a charge which subsequently evolves as a Federal offense.\" ", "U.S.Code Cong. & ", "Admin.", "News, p. 2306 (1966). ", "The evident purpose was to make sure that no prisoner failed to get credit for pretrial detention time even if that time was served in state custody.", "\nThat purpose has no application to Wolcott. ", "He did receive credit for pretrial detention time against his state sentence. ", "What he now seeks is to have his state pretrial detention time credited twice: once against his state sentence and a second time against the balance of his federal sentence. ", "There is no basis for concluding that Congress intended such a result. ", "Other courts faced with this claim have likewise declined to award double credit. ", "Doss v. United States, 449 F.2d 1274 (8th Cir. ", "1971); Radcliffe v. Clark, 451 F.2d 250 (5th Cir. ", "1971); Wener v. United States (unpublished) (4th Cir. ", "1969), cited in Radcliffe v. Clark, supra at 251.", "\nFinally, there is no basis for concluding that Congress intended § 3568 to provide credit against Wolcott's federal sentence for the time spent serving his state sentence after it was imposed. ", "Cf. ", "Siegel v. United States, 436 F.2d 92 (2d Cir. ", "1970); Jefferson v. United States, 389 F.2d 385 (2d Cir. ", "1968).", "\nAccordingly, the papers may be filed and the petition is dismissed.", "\nNOTES\n[1] Although petitioner has not exhausted his administrative remedies, United States v. Morgan, 425 F.2d 1388 (5th Cir. ", "1970); Langston v. United States, 310 F.Supp. ", "147 (W.D.Pa.1970), defendant concedes that recourse to such remedies would be futile, inasmuch as the Bureau of Prisons has taken the position that the circumstances of this case do not entitle petitioner to the relief he seeks.", "\n[2] The sentence toward which Wolcott seeks credit is the five-year term for interstate transportation of a stolen motor vehicle. ", "The petitioner, however, has now served that sentence in full and is now serving a consecutive term for escape. ", "The petitioner would, nonetheless, be benefited if the former sentence were credited as he seeks, inasmuch as the credit would reduce the term of the earlier sentence and cause the consecutive sentence to commence at an earlier date. ", "Thus the credit would, in effect, be transferred to the sentence presently being served.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.000932016409933567, 0.0006776238442398608, 0.0010461080819368362, 0.0010562067618593574, 0.0008858740911819041, 0.0007168073207139969, 0.0007500197389163077, 0.0009538066224195063, 0.031354423612356186, 0.00093490956351161, 0.0006624890374951065, 0.0006342493579722941, 0.0006695958436466753, 0.001443144865334034, 0.0007894513546489179, 0.0006749960593879223, 0.0006698431097902358, 0.0010077620390802622, 0.0008976280223578215, 0.0009571138070896268, 0.000697289768140763, 0.0012423309963196516, 0.000742123054806143, 0.0007165959104895592, 0.0008146445034071803, 0.0008343927329406142, 0.0007707851473242044, 0.0007574105984531343, 0.0008885813876986504, 0.0007784119225107133, 0.0014746392844244838, 0.0007712921360507607, 0.0007606906001456082, 0.0006110502290539443, 0.0009107335354201496, 0.0007060596253722906, 0.0007297803531400859, 0.0005678518209606409, 0.0006808059988543391, 0.009803005494177341, 0.0006620979984290898, 0.0009192312136292458, 0.0008253817795775831, 0.0007048696279525757, 0.0007244594162330031, 0.0006415282841771841, 0.0008150945068337023, 0.0009481152519583702, 0.0007007004460319877, 0.0008025652496144176, 0.0006621954962611198, 0.0006822567665949464, 0.0007784119225107133, 0.001021105796098709, 0.0007928333943709731, 0.0007870128029026091, 0.0006132313283160329, 0.0007260047714225948, 0.0008594273822382092, 0.0006573186838068068, 0.0009111254476010799, 0.0011555198580026627, 0.0006203268421813846, 0.0006303591071628034, 0.001995444530621171 ]
0.00144
65
[ "Zanzibar, the Tiny Island That Set World Records\n\nZanzibar is the semi-autonomous part of Tanzania in East Africa. ", "It is composed of the Zanzibar Archipelago in the Indian Ocean, 16-31 miles off the coast of the mainland. ", "It is famous for holding the record of being involved in the shortest war on record (37 minutes before surrendering to the British in 1896). ", "On another note, it is the world’s #1 producer of cloves." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006597039173357189, 0.000606493791565299, 0.0006729326560162008, 0.0011743808863684535 ]
0.000778
4
[ "Poly(vinylamine) microgel-dextran composite hydrogels: characterisation; properties and pH-triggered degradation.", "\nThe present study involves an investigation of the formation, characterisation and triggered-degradation of mixed dispersions involving cationic poly(vinylamine-co-bis(ethyl vinylamine) ether) (PVAM-BEVAME) microgel (MG) particles and partially oxidised dextran (Dexox). ", "In this approach to colloidal hydrogel composite formation, imine bonds were formed by reaction between aldehyde groups of Dexox and the primary amine groups on the MG particles. ", "The composite hydrogels contained MG particles that were externally cross-linked by Dexox to form an elastically effective network with high storage modulus (G') values and low tanδ (=G″/G', where G″ is the loss modulus) values. ", "The G' values for the MG-Dexox gels increased exponentially with increasing mass ratio (MR) of Dexox to MG. ", "Interestingly, the yield strains determined from rheology also increased with MR and yield strains of up to 130% were measured. ", "Au nanoparticles of comparable size to the Dexox chains adsorbed to the surface of the MG particles, which suggests that the pore size of the MG particles may have been smaller than that of the Dexox coils. ", "The MG-Dexox gels were also subjected to acidic conditions to demonstrate pH-triggered gel network breakdown via imine bond cleavage. ", "We show that new PVAM MG/aldehyde mixtures studied here for the first time form ductile and versatile colloidal gels and our new method provides a route to increasing ductility of hydrogels containing MG particles." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006467569037340581, 0.0006058291182853281, 0.0006600922788493335, 0.0007001517224125564, 0.0006887090858072042, 0.0005400007357820868, 0.000669865810777992, 0.0007214737124741077, 0.0006677531055174768 ]
0.000656
9
[ "February 07, 2012\n\nSmart Audio Sues Apple with Delco Electronics Patent\n\nTexas based Smart Audio Technologies has filed a patent infringement lawsuit against Apple in the Delaware District Court. ", "The patent infringement lawsuit concerns Apple's media players in respect to their ability to \"modify a play list of a random access player.\" ", "Oddly Smart Audio only identifies the iPod nano by name. ", "Yet the most interesting aspect of this case, if there is one, is that Smart Audio's key exhibit is that of patent assigned to Delco Electronics.", "\n\nThe patent that Apple is allegedly infringing upon is that of patent 6,185,163. ", "This particular patent is duly noted as being assigned to Delco Electronics Corporation regarding a \"Vehicle audio system having random access player with play list control dated February 6, 2001. ", "Below are patent figures 1 and 2. ", "The second patent figure clearly illustrates a \"Playlist\" feature, which is at the center of this lawsuit.", "\n\nOne of the points worth mentioning about this patent, is that all of the patent claims are prefaced with either the phrasing \"A vehicle audio system,\" or \"The vehicle audio system.\" ", "Does Apple have a Vehicle Audio System? ", "Not at the moment. ", "So how does Apple's handheld media players relate to the claims about a vehicle audio system? ", "Yes, I'm shaking my head like you are on this one. ", "Is this another patent troll case? ", "Well, that's for you to judge.", "\n\nNotice:Patently Apple presents only a brief summary of certain legal cases/ lawsuits which are part of the public record for journalistic news purposes. ", "Readers are cautioned that Patently Apple does not offer an opinion on the merit of the case and strictly presents the allegations made in said legal cases / lawsuits. ", "A lawyer should be consulted for any further details or analysis. ", "About Comments: Patently Apple reserves the right to post, dismiss or edit comments. ", "On most legal cases, comments will be closed. ", "See our Legal Archives for other patent infringement cases.", "\n\nComments\n\nYes it's a patent troll case. ", "These are idiotic....how did someone get/allow a patent for \"a play list modification system that provides alteration of a play list without interrupting the generation of an output by the random access player, the play list modification system having:\"?", "\n\nThat's like allowing a patent for placing records in a particular order and then reshuffling them before/at the time of play.", "\n\nSeriously, it's gotten to where I think I could patent \"3-4 inch green leafy blades that protrude from the earth\" so I can sue anyone with a lawn." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0015354376519098878, 0.0006608542171306908, 0.0006369371549226344, 0.0005611157394014299, 0.0007894449518062174, 0.0005553390947170556, 0.0005901501863263547, 0.0006604858208447695, 0.0005512176430784166, 0.0008061715634539723, 0.0007235800148919225, 0.000641383056063205, 0.06473610550165176, 0.0051050614565610886, 0.0007399243768304586, 0.0005867513827979565, 0.0005924580618739128, 0.0005331130232661963, 0.0006154009606689215, 0.0005705470684915781, 0.0005770972347818315, 0.0012693807948380709, 0.7568187713623047, 0.0006854446837678552, 0.018957575783133507 ]
0.03442
25
[ "SCM Timișoara\n\nSCM Timișoara is a Romanian sports society from Timișoara, Romania, founded in 1947.", "\n\nExternal links \n Official website \n \n\nCategory:Sports clubs established in 1947\nCategory:Multi-sport clubs in Romania\nCategory:Sport in Timișoara\nSCM Timișoara" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0011551484931260347, 0.0006905213813297451 ]
0.000923
2
[ "Read all the latest BPOTY News Features about the competition: the latest posts are highlighted below. ", "Visit the News Features Page for all the posts. ", "Here we also showcase our photographers and contributors through their photography, exploring subjects we think will prove thought-provoking and inspirational. ", "The articles are mainly supplied by the BPOTY community and comprise everything from individual stories behind images to personal photographic experiences, and photographic techniques to conservation issues. ", "We are always happy to receive articles and ideas from you for these features so please do get in touch. ", "Subscribe to the BPOTY newsletter and never miss a thing." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005567417247220874, 0.0005916762165725231, 0.0005385930999182165, 0.000601522799115628, 0.000503424322232604, 0.0016471423441544175 ]
0.00074
6
[ "Q:\n\nHeader in the top\n\nAt that time I need two view pages in one page. ", "So that in the session i do something like this: \n <?", "php\n session_start();\n if(isset($_SESSION['login_id']) && !", "empty($_SESSION['login_id'])){ \n ?", "> \n\n ///My HTML CODE///\n <? ", "\n }\n else {\n ?", ">\n\n //Diffetent View HeRe//\n <? ", "\n }\n require_once('../libraries/config/configPDO.php');\n ?", ">\n\nBut now I just need to make it become one page and redirect it if they not logged in. ", "\n <?", "php\n session_start();\n if(isset($_SESSION['login_id']) && !", "empty($_SESSION['login_id'])){ \n ?", "> \n\n ///My HTML CODE///\n <? ", "\n }\n else {header(\"Location: login.php\");\n ?", ">\n\n <? ", "\n }\n require_once('../libraries/config/configPDO.php');\n ?", ">\n\nBut as you see, I put the header redirect at the bottom of the page. ", "\nHow to make it simple, so that I set header location in the top of the page.", "\n\nA:\n\nTry with - \nsession_start();\nif(empty($_SESSION['login_id'])){ \n header(\"Location: login.php\");\n exit;\n} else {\n //HTML\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0005859868251718581, 0.000736785470508039, 0.0007319816504605114, 0.0007591777248308063, 0.0009875467512756586, 0.0009503043838776648, 0.0010213319910690188, 0.0008239991148002446, 0.0006032035453245044, 0.0010000212350860238, 0.0007319816504605114, 0.0007591777248308063, 0.0009875467512756586, 0.0007381045143119991, 0.0010388923110440373, 0.0008239991148002446, 0.0005895155481994152, 0.0005997670232318342, 0.0009010371286422014 ]
0.000809
19
[ "Luxury electric automaker Tesla Motors Inc (NASDAQ: TSLA) saw a ray of sunshine on Thursday after its earnings report gave investors reason to believe the company has a bright future.", "\n\nTesla shares have seen a significant decline over the past year, as uncertainty about the firm's forward momentum weighed on sentiment, but based on the company's fourth-quarter results, the automaker may be in a better position than initially perceived.", "\n\nA Bright Future\n\nOn the company's earnings call, CEO Elon Musk was able to reassure investors with positive sales figures. ", "Deliveries in the fourth quarter rose 75 percent from one year ago, and the Model S trumped competitors like the Mercedes-Benz S-Class, whose sales fell 13 percent during the same quarter. ", "In the coming year, Musk said he expects deliveries to rise to between 80,000 and 90,000 for the Model S.\n\nNot All Roses\n\nWhile there were some bright spots in Tesla's earnings report, the results weren't all positive. ", "The firm lost $0.87 per share, worse than analysts' expectations of $0.12 EPS. ", "This year, the company forecasts to continue losing money for the first three quarters before turning a profit at the end of 2016.", "\n\nModel 3\n\nInvestors are looking forward to the company's Model 3 vehicle, set to debut at the end of March. ", "The lower-cost vehicle will become available for pre-order at the end of the month, and should go into production beginning in 2017.", "\n\nMany expect the Model 3 to put Tesla in a stronger position in the electric-car market, as it is a much more affordable Tesla vehicle with a price point of just $35,000. ", "If the car is a hit among the public, the company could increase its annual vehicle deliveries to 500,000 by 2020." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005794957396574318, 0.0005576836410909891, 0.0005442122928798199, 0.0006495248526334763, 0.0005920754047110677, 0.001453757518902421, 0.0007200625259429216, 0.0005433660699054599, 0.0005518371472135186, 0.000658000644762069, 0.000581076426897198 ]
0.000676
11
[ "27 Shares Share\n\nIt’s easy to be excited about facts when they support our own opinions. ", "It’s nice to believe that uncomfortable facts are fake. ", "Likewise, it’s comforting to believe that everyone who disagrees with us is ignorant. ", "When the truth is so obvious, we say, “How could anyone but an uneducated bumpkin deny it?”", "\n\nAnd yet, it seems that much of our knowledge is incomplete and that our deeply held beliefs may be more fragile than we imagine.", "\n\nI was thinking about this recently when I listened to a podcast about evolution. ", "It was a discussion about some events that happened last November at the venerable Royal Society in London. ", "It turns out that some well-respected scientists think that perhaps evolution isn’t just due to “random mutation and natural selection over time.”", "\n\nAccording to some researchers at the meeting, our DNA is even more amazing than previously believed. ", "It appears that external stressors change the way plant and animal DNA works so that creatures adapt much more rapidly than we thought. ", "This doesn’t necessarily mean evolution is wrong; but certainly, our understanding of it is probably incomplete.", "\n\nThis poses a challenge to some beliefs that have been held in exactly the same way by scientists, and the lay public, for a very, very long time. ", "Can we handle the change in paradigm? ", "Could we “adapt” if we suddenly found out that evolution is a bit off? ", "After saying for years that it was a not a theory but a hard fact?", "\n\nThe science of medicine changes all the time. ", "For the past 20 years, physicians in training were taught that they should never hesitate to boldly give narcotic pain medication to patients who asked for them. ", "Because after all, “why would anyone mislead their doctor?” ", "And who were physicians to judge? ", "We were told, “You can’t create an addict in the ER.”", "\n\nExcept, according to some pesky researchers, it appears you can. ", "Some people can become addicted after a very short course of pain medication. ", "They’re just wired that way. ", "And now pain pills and heroin are killing people in staggering numbers. ", "Our venerable, white-coat-clad instructors were wrong. (", "What? ", "Physicians and professors wrong? ", "Perish the thought.) ", "And now, we have to face the facts and change our behaviors as doctors.", "\n\nNew, intriguing information presents itself all the time in many areas of study. ", "The bacteria in our guts may have to do with obesity and mental health. ", "Litter boxes may contribute to human mental illness due to a parasite cats sometimes carry. ", "Socialism in Venezuela is a disaster. ", "Foreign aid sometimes worsens international crises. ", "Who knows what’s next?", "\n\nBut what if we discovered a slam-dunk gene for religious faith that was so powerful that those who had it couldn’t help but believe? ", "Could their detractors still regard them as simpletons or haters? ", "What if we learned that the absence of that gene made for equally solid atheists? ", "How would we believers treat them? ", "What if some transgender people really have a body dysmorphic problem like anorexia? ", "Or that there is a genetic marker that indeed makes them identify with another gender? ", "What if discussing it isn’t hatred, bigotry or compromise, but compassion? ", "What if we find, someday, that the science of climate change isn’t settled?", "\n\nObviously, science advances. ", "We love that idea until it bumps into us. ", "What would we do when science, or new historical information, or some other new finding puts our personal beliefs in question? ", "Can we let go of our political correctness? ", "Or religious rigidity? ", "Can we stop calling our opponents rude names? ", "Are we OK with new facts when they contradict ideas dear to us?", "\n\nIt’s hard to let go. ", "But just as we look back on our ancestors and smile about their quaint beliefs, someone will eventually do the same to ours. ", "It will likely be the case that we were wrong about many things in ways we could never have imagined.", "\n\nAs times change and knowledge grows, we should all be a lot kinder in the way we view the opinions of others and cautious in the way we view our own. ", "Today’s unassailable fact could become tomorrow’s flat earth. ", "A little humility, a little willingness to open our eyes and the courage change our minds, are probably in order all around.", "\n\nEdwin Leap is an emergency physician who blogs at edwinleap.com and is the author of the Practice Test and Life in Emergistan.", "\n\nImage credit: Shutterstock.com" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005610804655589163, 0.002236270345747471, 0.1587029993534088, 0.0777224600315094, 0.0006111899856477976, 0.0005360957002267241, 0.0005536027601920068, 0.0005672440165653825, 0.0005486630252562463, 0.000717463088221848, 0.0006508063524961472, 0.0005817372584715486, 0.0006677302881143987, 0.0008827046840451658, 0.0006886481423862278, 0.0007206862210296094, 0.0007583393016830087, 0.0012359274551272392, 0.0019330352079123259, 0.0028463290072977543, 0.0009833223884925246, 0.0009831140050664544, 0.0007602332625538111, 0.8072479963302612, 0.0008580207941122353, 0.000964215025305748, 0.0009376169764436781, 0.013214058242738247, 0.0011986825847998261, 0.0005481915432028472, 0.574571967124939, 0.028690863400697708, 0.010163477621972561, 0.000954126997385174, 0.0008553144289180636, 0.0019040077459067106, 0.0874330997467041, 0.0014620132278651, 0.0009476533741690218, 0.6709921360015869, 0.0009411576320417225, 0.0010993399191647768, 0.000633483927231282, 0.0006465945043601096, 0.0005678607267327607, 0.0006481965538114309, 0.0010018589673563838, 0.0008029661257751286, 0.014536370523273945, 0.0006973080453462899, 0.0023357693571597338, 0.0006330111064016819, 0.0005821213708259165, 0.0005422239773906767, 0.002171402098610997, 0.0006296217907220125, 0.0006986177177168429, 0.0006676424527540803 ]
0.042918
58
[ "Q:\n\nAnt execution output encoding? ", "How to use UTF-8?", "\n\nI have a file encoded in UTF-8 which I want to read in java, change some things in the input and print the result to terminal (standard output) and to another file. ", "I read and write the files and write to stdout with streams constructed to interpret UTF-8 encoding. ", " \nEverything is fine when I'm manually compiling and running everything, the output file contains UTF-8 signs, the stdout also prints them to terminal. ", "\nThe problem is when I want to compile and run the program using ant. ", "The output (written to terminal) produced by ant doesn't seem to use UTF-8 signs, as Polish diactrics are changed to '?'. ", "Is there any way of forcing ant to use UTF-8? ", "Also, can I check somehow which encoding is it using at present? ", " \nI searched for an answer, but all I found was how to make ant interpret UTF-8 encoded .java files.", "\n\nA:\n\nYou could try setting -Dfile.encoding=UTF-8 this will set the encoding to UTF-8.", "\nYou may also want to check if your console encoding is UTF-8 (depends on the OS).", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006989411194808781, 0.0008357713231816888, 0.000604802742600441, 0.0005921131814830005, 0.0006627088296227157, 0.0019978429190814495, 0.0006788820028305054, 0.0015581866027787328, 0.0007274778326973319, 0.0007145238923840225, 0.0006391704082489014, 0.0005850953166373074, 0.001995444530621171 ]
0.000945
13
[ "Q:\n\nThe requested resource is not available Glassfish 4\n\nI have recently started working on web applications and was trying to set up a practise project to try out different things. ", "But I am stuck at a very initial stage and I googled a lot but could not find the solution to my problem. ", "I have associated the project with an EAR project and the ear is deployed on the server.", "\nThis is the project setup I am facing problems with :\nweb.xml\n <?", "xml version=\"1.0\" encoding=\"UTF-8\"?", ">\n <web-app xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n xmlns=\"http://xmlns.jcp.org/xml/ns/javaee\"\n xsi:schemaLocation=\"http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/web-app_3_1.xsd\"\n id=\"WebApp_ID\" version=\"3.1\">\n <display-name>College Administration</display-name>\n <servlet>\n <servlet-name>loginServlet</servlet-name>\n <servlet-class>kumar.suraj.college.administration.login.", "LoginServlet</servlet-class>\n </servlet>\n <servlet-mapping>\n <servlet-name>loginServlet</servlet-name>\n <url-pattern>/login</url-pattern>\n </servlet-mapping>\n </web-app>\n\napplication.xml\n <?", "xml version=\"1.0\" encoding=\"UTF-8\"?", ">\n <application xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns=\"http://xmlns.jcp.org/xml/ns/javaee\" xsi:schemaLocation=\"http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/application_7.xsd\" id=\"Application_ID\" version=\"7\">\n <display-name>web-college-administrationEar</display-name>\n <module>\n <web>\n <web-uri>web-college-administration.war</web-uri>\n <context-root>web-college-administration</context-root>\n </web>\n </module>\n </application>\n\nglassfish-web.xml\n <?", "xml version=\"1.0\" encoding=\"UTF-8\"?", ">\n\n <!", "DOCTYPE glassfish-web-app PUBLIC \"-//GlassFish.org//DTD GlassFish Application Server 3.1 Servlet 3.0//EN\" \"http://glassfish.org/dtds/glassfish- web-app_3_0-1.dtd\">\n <glassfish-web-app>\n <context-root>web-college-administration</context-root>\n </glassfish-web-app>\n\nlogin.jsp\n <!", "DOCTYPE html>\n <html>\n <head>\n <meta http-equiv=\"Content-Type\" content=\"text/html; charset=ISO-8859-1\">\n <title>Login Page</title>\n </head>\n <body>\n <form name=\"login\" action=\"login\" method=\"post\" accept-charset=\"utf-8\">\n <label for=\"usermail \">Email</label> \n <input type=\"email\" name=\"usermail\" placeholder=\"yourname@email.com\" required>\n <br/> \n <label for=\"password \">Password</label> \n <input type=\"password\" name=\"password\" placeholder=\"password\" required> \n <br/> \n <input type=\"submit\" value=\"Login\">\n </form>\n </body>\n </html>\n\nLoginServlet.java\npackage kumar.suraj.college.administration.login;\n\nimport java.io.", "IOException;\nimport javax.servlet.", "ServletException;\nimport javax.servlet.http.", "HttpServlet;\nimport javax.servlet.http.", "HttpServletRequest;\nimport javax.servlet.http.", "HttpServletResponse;\n\n/**\n* Servlet implementation class LoginServlet\n*/\npublic class LoginServlet extends HttpServlet {\n private static final long serialVersionUID = 1L;\n\n/**\n * @see HttpServlet#HttpServlet()\n */\npublic LoginServlet() {\n super();\n // TODO Auto-generated constructor stub\n}\n\n/**\n * @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse\n * response)\n */\n@Override\nprotected void doGet(final HttpServletRequest request, final HttpServletResponse response)\n throws ServletException, IOException {\n // TODO Auto-generated method stub\n response.getWriter().append(\"Served at: \").append(request.getContextPath());\n response.getWriter().append(\"Hello Suraj\");\n}\n\n/**\n * @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse\n * response)\n */\n@Override\nprotected void doPost(final HttpServletRequest request, final HttpServletResponse response)\n throws ServletException, IOException {\n // TODO Auto-generated method stub\n this.doGet(request, response);\n }\n\n}\n\nThe login.jsp is placed in WebContent/WEB-INF folder of my project.", "\nWhen I hit the url http://localhost:53809/web-college-administration/login\nI get the following out put \"Served at: /web-college-administrationHello Suraj\" as per the doGet method of LoginServlet.java.", "\nBut when I hit the url http://localhost:53809/web-college-administration/login.jsp I get the following error :\n HTTP STATUS 404 - NOT FOUND\n type status report\n message Not Found\n description The requested resource is not available.", "\n\nAnd in eclipse console I get the following message : \n 2016-07-03T16:34:18.969+0530|Severe: PWC6117: File \"null\" not found.", "\n\nCould someone please tell me what is wrong with my setup ?", "\n\nA:\n\nThe login.jsp is placed in WebContent/WEB-INF folder of my project.", "\n\nCould you please put login.jsp in WebContent folder of your project in eclipse then clean the project and try the URL: http://localhost:53809/web-college-administration/login.jsp again?", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006038799765519798, 0.0006132301641628146, 0.0006364323198795319, 0.0007395282154902816, 0.0006190649583004415, 0.0007011844427324831, 0.0018476148834452033, 0.0006190649583004415, 0.0008126748143695295, 0.0006190649583004415, 0.006172851659357548, 0.0007860882324166596, 0.0007572456961497664, 0.0011314846342429519, 0.001287910039536655, 0.000947651918977499, 0.0009422514704056084, 0.004483248572796583, 0.0007188246818259358, 0.0006504562916234136, 0.0006894945981912315, 0.000622869876679033, 0.0006811334169469774, 0.000853590841870755, 0.001995444530621171 ]
0.001221
25
[ "0D\n\n0D (zero D) or 0-D may refer to:\n\nOD, IATA code for Darwin Airline\n0day, abbreviation for a Zero-day attack\n0x0D, the hex representation of Newlines on some platforms\n0d, a term describing zero Dimension\n0DFx, and American punk band\nZero-dimensional space\n\nSee also\n 0° (disambiguation)\nD0 (disambiguation)\nOD (disambiguation)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0009113086271099746 ]
0.000911
1
[ "After a nearly five-month investigation, a Hartley County, Texas, grand jury decided Wednesday not to indict Colorado state Sen. Suzanne Williams in connection with a fatal accident in December.", "\n\n“I think while it is a horrific tragedy, not all tragedies are crimes,” said Williams’ attorney David Lane. “", "Sometimes tragedies are just tragic.”", "\n\nHartley County District Attorney David Green presented the grand jury with evidence about the Dec. 26 crash that killed Brianna Gomez, 30, who was pregnant.", "\n\nHe emerged without a charge from the jurors and declined to discuss why he thinks the jurors declined to indict.", "\n\nWilliams, D-Aurora, issued a statement through the Senate majority office but declined to answer questions.", "\n\n“I’m sure this has been a horrible experience for the Gomez family, as it has been for mine,” she said. “", "I’m relieved that the Grand Jury decided not to indict. ", "This was a tragic accident.", "\n\n“I would like to thank everyone who gave their support and prayers to the Gomez family and to my family. ", "I will always keep them in my thoughts and prayers.”", "\n\nThe grand jury’s decision means Williams will not face serious charges in the crash, but Texas Trooper Gabriel Medrano said Williams might have to answer a traffic citation.", "\n\n“It’s a possibility she will be ticketed,” Medrano said. “", "If citations are warranted, they can file through the justice of the peace. ", "It’s up to the lead investigator.”", "\n\nMedrano said the grand jury’s decision does not mean investigators changed their mind about who they believe was responsible for the fatal accident.", "\n\nWith Williams at the wheel, according to Texas state troopers, her 2010 Honda CR-V veered into the southbound traffic lane of U.S. 385 near Channing, in the Texas Panhandle, and hit a GMC Yukon driven by Eric Gomez.", "\n\n“Eric Gomez was not at fault,” Medrano said.", "\n\nCoping with wife’s loss\n\nBrianna Gomez was seven months pregnant. ", "The couple’s son, Curran, was born by emergency C-section after the collision. ", "He weighed just 3 pounds, 1 ounce and spent 10 weeks in a hospital intensive- care unit. ", "He now weighs 11 pounds.", "\n\nLane said authorities certainly took their time and reviewed an abundance of investigative materials.", "\n\n“They did a very thorough job,” he said. “", "Based on what I know, I think they made a good decision. ", "There is no criminal culpability on her part.”", "\n\nEric Gomez, who is a biology teacher and assistant wrestling and football coach at Amarillo High School, said it is not up to him to judge Williams, and he won’t.", "\n\nHowever, he is concerned about raising a family of three children on one salary. ", "He said he has two nannies, who care for Curran and his 2- and 6-year-old sisters.", "\n\nHe said he returned to the classroom and told his students they should buckle down and study and not focus on what happened to him.", "\n\nBut at night when he goes to his room filled with pictures of his wife, he said, it is very difficult. ", "This past week has been particularly tough with Mother’s Day, his birthday and his 10th wedding anniversary all happening within days of the grand jury hearing.", "\n\n“It’s definitely opening up a wound,” Eric Gomez said. “", "My concern is with my family.”", "\n\nGrandsons out of seats\n\nWilliams’ son, Todd, was seriously injured in the crash with a fractured neck, back and pelvis. ", "He was not wearing a seat belt and was ejected during the accident. ", "He is still undergoing rehabilitation.", "\n\nTodd Williams said it was his fault that his two sons were not in their seat belts on the night of the accident. ", "He took them out of child seats without talking to his mother about it because they were uncomfortable, he said.", "\n\n“My mom didn’t have anything to do with that,” he said.", "\n\nBy the time the accident happened, he said, he was reading “Where the Wild Things Are” to his kids to put them to sleep.", "\n\nKirk Mitchell: 303-954-1206 or kmitchell@denverpost.com" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007030723500065506, 0.0007587564759887755, 0.002231704303994775, 0.0007538310601375997, 0.001035137684084475, 0.0006244640098884702, 0.0006096226861700416, 0.0007802607724443078, 0.0031696741934865713, 0.0005570230423472822, 0.0006819489062763751, 0.0006433713133446872, 0.0009697265923023224, 0.0005529177724383771, 0.0006432112422771752, 0.0007030147244222462, 0.0007732154917903244, 0.0009361409465782344, 0.001435625716112554, 0.0007650808547623456, 0.004546829964965582, 0.03223907947540283, 0.0005555906100198627, 0.0007844405481591821, 0.0005124349263496697, 0.0014685036148875952, 0.0008468723390251398, 0.001313565531745553, 0.006431886926293373, 0.0014924613060429692, 0.0022699686232954264, 0.0007044572848826647, 0.0011728521203622222, 0.0010504998499527574, 0.002035795245319605, 0.0009527203510515392, 0.0008960364502854645, 0.000980219803750515, 0.002238520421087742, 0.003942990209907293, 0.001668924349360168, 0.0007506983820348978 ]
0.0021
42
[ "Poly glycidyl methacrylate-co-ethylene dimethacrylate porous monolith as a versatile platform for the development of separations and solid-phase extractions in sequential injection analyzers.", "\nWe demonstrated that the porous structure and the reactivity of the epoxy group in the poly glycidyl methacrylate-co-ethylene dimethacrylate monolith can be a platform for the development of separation and extraction methods based on sequential injection analysis. ", "The epoxy group was functionalized to produce monoliths affording complexing and ion exchange properties. ", "Derivatization with iminodiacetate and sodium sulfite produced weak and strong cation exchangers, respectively. ", "Derivatization with ethylenediamine produced a weak anion exchanger, and the treatment of the ethylenediamine-modified monolith with chloroacetate produced another weak cation exchanger. ", "All the monoliths also worked as chelating sorbents. ", "The columns were prepared inside 50 × 2.01 mm id fused-silica lined stainless steel tubing and exhibited permeabilities between 0.76 and 4.92 × 10-13 m2 , which enabled the application of flow rates between 5 and 15 μL/s by the syringe pumps used in sequential injection analyzers. ", "These columns separated proteins by cation or anion exchange in a sequential injection chromatograph in both synthetic mixtures and in egg white. ", "Additionally, the online solid-phase extraction of copper ions was demonstrated in a sequential injection analyzer with the same columns. ", "Postcolumn derivatization with ethylenediamine and spectrophotometric detection was used for the copper detection." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0008346125250682235, 0.0006424310267902911, 0.0007044874946586788, 0.0013467028038576245, 0.003964515868574381, 0.012762864120304585, 0.000619481026660651, 0.0007784813060425222, 0.000560919230338186, 0.0007032807916402817 ]
0.002292
10
[ "Leaders of North Carolina's flagship university are meeting to decide the fate of a Confederate monument torn down by protesters.", "\n\nThe chancellor and trustees of the University of North Carolina at Chapel Hill were finalizing a plan Monday for the century-old bronze statue known as \"Silent Sam.\" ", "They didn't immediately release details, and went into closed session to discuss it. ", "They were scheduled to reopen their meeting later in the morning.", "\n\nThe separate Board of Governors, which oversees the statewide university system, will have final say over where to put the statue, which has been stored at an undisclosed location since it was toppled in August.", "\n\nThe statue of an anonymous soldier was erected on a main campus quad in 1913. ", "Demonstrators called it a racist symbol." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.000580812047701329, 0.0006963424966670573, 0.0005617316346615553, 0.0006062591564841568, 0.0006295098573900759, 0.0005818784120492637, 0.011505811475217342 ]
0.002166
7
[ "Willoughby District may benefit from federal greening program\n\nDowntown Juneau could a green facelift. ", "The City and Borough of Juneau Lands Committee recently discussed the idea to enter Alaska’s capital in the Greening America’s Capitals program.", "\n\nThe Environmental Protection Agency’s Office of Policy, U.S. Department of Housing and Urban Development and the U.S. Department of Transportation have partnered to help U.S. capitals develop a vision of “environmentally friendly neighborhoods that incorporate innovative green building and green infrastructure strategies,” according to the program’s request for letters of interest.", "\n\nPlanning Commissioner and Lands Committee liaison Nathan Bishop reported to his fellow commissioners on June 12 the program could be applied to the Willoughby District.", "\n\nTo enter, city staff would submit a letter of interest to the Office of Sustainable Communities.", "\n\n“If you are accepted, they’ve accepted five communities in the previous two years, five communities in each year,” city staff said, “they send design professionals … to come and work with the community. ", "The concept here is to take the conceptual Willoughby plan and take it to the next step.”", "\n\nOne example of “greening” Willoughby is to look at whether Juneau’s LEED energy efficiency building standards are sufficient, staff said. ", "The city may also look at public transit and the possibility of a trolley in the area.", "\n\nThe designers are funded by the EPA and would help Juneau produce schematic designs and illustrations “intended to catalyze or complement a larger planning process for the pilot neighborhood,” according to the Greening America’s Capitals website.", "\n\nJuneau introduced a land use plan for the Willoughby District in 2011. ", "The plan works as a blueprint for development in the district for the next two decades. ", "The plan was adopted in the city’s Comprehensive Plan in April.", "\n\nJackson, Miss., Lincoln, Neb., Montgomery, Ala., Phoenix, Ariz. and Washington, D.C. were the capitals the EPA chose in 2011. ", "As an example, Jackson’s city officials asked Greening America’s Capital’s designers to help make a main street friendly for bike and pedestrian traffic as well as line the street with trees to shade pedestrians, according to EPA’s website.", "\n\nLetters of interest are due to EPA’s Office of Sustainable Communities by July 29.", "\n\nFor more information visit goo.gl/ZmCaF, or contact EPA’s Abby Hall at hall.abby@epa.gov." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000605867535341531, 0.0005468542221933603, 0.0005142331356182694, 0.0005393020110204816, 0.0005215309211052954, 0.000501276517752558, 0.0005979907582513988, 0.0005917506641708314, 0.0005117186228744686, 0.0005740484339185059, 0.0005791958537884057, 0.0005604508332908154, 0.0005562974838539958, 0.0005798034253530204, 0.0006030391086824238, 0.0005447158473543823, 0.0006079742452129722 ]
0.000561
17
[ "Crystal structures of ligand-bound saccharopine dehydrogenase from Saccharomyces cerevisiae.", "\nThree structures of saccharopine dehydrogenase (l-lysine-forming) (SDH) have been determined in the presence of sulfate, adenosine monophosphate (AMP), and oxalylglycine (OxGly). ", "In the sulfate-bound structure, a sulfate ion binds in a cleft between the two domains of SDH, occupies one of the substrate carboxylate binding sites, and results in partial closure of the active site of the enzyme due to a domain rotation of almost 12 degrees in comparison to the apoenzyme structure. ", "In the second structure, AMP binds to the active site in an area where the NAD+ cofactor is expected to bind. ", "All of the AMP moieties (adenine ring, ribose, and phosphate) interact with specific residues of the enzyme. ", "In the OxGly-bound structure, carboxylates of OxGly interact with arginine residues representative of the manner in which substrate (alpha-ketoglutarate and saccharopine) may bind. ", "The alpha-keto group of OxGly interacts with Lys77 and His96, which are candidates for acid-base catalysis. ", "Analysis of ligand-enzyme interactions, comparative structural analysis, corroboration with kinetic data, and discussion of a ternary complex model are presented in this study." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006850031786598265, 0.0008243320626206696, 0.0006255648331716657, 0.00080626190174371, 0.000752422958612442, 0.0008314069709740579, 0.0009030861547216773, 0.0005206085625104606 ]
0.000744
8
[ "Click chemistry decoration of amino sterols as promising strategy to developed new leishmanicidal drugs.", "\nA series of 1,2,3-triazolylsterols was prepared from pregnenolone through reductive amination and copper(I)-catalyzed azide-alkyne cycloaddition (click chemistry). ", "The newly generated stereocenter of the key propargylamino intermediate provided a mixture of diastereomers which were separated chromatographically, and the configuration of the R isomer was determined by X-ray crystallography. ", "Ten triazolyl sterols were prepared, and the products and intermediates were screened in vitro against different parasites, with some compounds presenting IC50 values in the low micromolar range against Leishmania donovani." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006364149739965796, 0.0007815322023816407, 0.0006165230297483504, 0.0006291268509812653 ]
0.000666
4
[ "Passa e Fica\n\nPassa e Fica is a municipality in the state of Rio Grande do Norte in the Northeast region of Brazil.", "\n\nSee also\nList of municipalities in Rio Grande do Norte\n\nReferences\n\nCategory:Municipalities in Rio Grande do Norte" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0012335999635979533, 0.0005604216712526977 ]
0.000897
2
[ "When I first switched over to iOS 8, I found that the predictive typing function, while helpful, was a bit distracting, almost to the point of being annoying. ", "I eventually turned it off.", "\n\nCrimson Keyboard offers a personalized predictive typing function, but instead of the suggestion bar, words are displayed just above keys. ", "Plus, instead of autocorrecting your misspelled words (and sometimes leading to hilarious miss-typed text messages), you will see suggested corrections in red.", "\n\nThe app uses an intelligent prediction engine called Adaptxt, which learns words that you use often in order to suggest them to you as you type. ", "The more you use the app, the more words it learns. ", "When you start typing, words will appear above letters they begin with. ", "Swipe upward on a key to select the word, or continue typing to call up additional suggestions.", "\n\nIt also works with multiple languages simultaneously. ", "After enabling one of the supported languages, like Danish, French, German, Spanish, and more, the keyboard will automatically detect when you’ve started typing in that language and automatically switch over.", "\n\nIf you make a mistake spelling a word, or have your own way of spelling something, instead of automatically correcting it to what the app thinks you meant, it will offer suggestions in red. ", "That way, if you intended to spell a word that way, nothing happens. ", "However, if you truly misspelled a word, you can select the correction from the available options.", "\n\nThe app also includes a split space bar that appears automatically whenever a sentence might need a comma or period. ", "When you are typing, the space bar is displayed. ", "Whenever you tap the space bar, after moving your cursor on screen, it will switch to the comma and period options instead.", "\n\nIt will also recognize names and information from your device’s Contacts list and include it in predictive suggestions. ", "So, if your friend spells her name with a “K” instead of a “C,” Crimson won’t try to correct it.", "\n\nThe keyboard was designed to be nearly identical to Apple’s so that users don’t have to adjust to a new layout. ", "There are a few minor changes, which you can turn off or tweak yourself in the settings section. ", "For example, you can switch themes to change the color accent or disable the split space bar feature.", "\n\nCrimson costs $1.99. ", "It is currently only supported on the iPhone, but will receive iPad optimization in a future update. ", "Download it in the app store today.", "\n\nBe sure to check out other third-party iOS 8 default keyboard apps we’ve spotlighted." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006477401475422084, 0.0007895551971159875, 0.0005778826889581978, 0.0010019438341259956, 0.0005838461220264435, 0.0005968408659100533, 0.0006010800716467202, 0.0006871939403936267, 0.0006237066118046641, 0.0005721110501326621, 0.0006973545532673597, 0.00204508937895298, 0.0006210497231222689, 0.0006569460965692997, 0.0006535797729156911, 0.0006547331577166915, 0.0005658842856064439, 0.005134668666869402, 0.0006683188257738948, 0.0006076634163036942, 0.0006334942881949246, 0.000760943628847599, 0.0006002314039506018, 0.0006533284904435277, 0.0005531391361728311 ]
0.000888
25
[ "353 F.2d 777\nGOTTLIEB CONTRACTING, INC., ", "Plaintiff-Appellant,v.UNITED STATES of America, Defendant-Appellee.", "\nNo. ", "171.", "\nDocket 30002.", "\nUnited States Court of Appeals Second Circuit.", "\nArgued November 17, 1965.", "\nDecided December 2, 1965.", "\n\nNelson Rosenbaum, New York City, for plaintiff-appellant.", "\nMorton Hollander, Department of Justice, Washington, D. C. (John W. Douglas, Asst. ", "Atty. ", "Gen., John C. Eldridge, Department of Justice, Washington, D. C., and Joseph P. Hoey, U. S. Atty. ", "for Eastern District of New York, Brooklyn, N. Y., on the brief), for defendant-appellee.", "\nBefore LUMBARD, Chief Judge, and MEDINA and WATERMAN, Circuit Judges.", "\nMEDINA, Circuit Judge.", "\n\n\n1\nAfter public competitive bidding, Gottlieb Contracting, Inc., entered into a contract with the Government for \"Rehabilitation of Electrical Service to Family Quarters, Quentin Street, Manhattan Beach, New York.\" ", "The contract provided for the installation of certain wall vents \"near the [clothes] dryer electrical outlet.\" ", "The contractor was required to install the vents in the outer walls of the building rather than in inner walls leading to other inside rooms, at an expense of $2051.74 more than what the contractor expected to pay for installations in the inner walls. ", "On cross-motions for summary judgment the claim against the Government for reimbursement of the $2051.74 was rejected and Gottlieb Contracting, Inc., appeals.", "\n\n\n2\nAppellant has tried to persuade us as matter of law that \"near\" means only a few inches from outlets in plaster and two-by-four stud walls leading to inner rooms, rather than in exterior masonry walls some eight or ten feet distant and leading to the open air. ", "We think this contention is disposed of by the following comment in the decision of the Armed Services Board of Contract Appeals, on the appeal, as provided in the Disputes Clause1 of the contract, from the ruling of the Contracting Officer rejecting appellant's claim:\n\n\n3\n\"As a reasonably intelligent bidder, appellant was charged with knowledge, and had actual knowledge, that the dryer outlet was for the purpose of supplying electric current to a clothes dryer to be installed nearby and that the purpose of a dryer vent is to provide a means whereby moisture evaporated from the clothes can be exhausted from the dryer to the outside without escaping into the room where the dryer is installed. ", "In the context used the word `near' means no more than that the dryer vent be installed at a place not too distant from the dryer outlet so that the dryer can conveniently use both the dryer electrical outlet and the dryer vent. ", "A dryer vent is not normally used to exhaust moisture from one room into another, and under well established principles of contract interpretation appellant should have interpreted Note 7 as calling for the installation of a dryer vent to be used for its normal purpose, unless some other intent was clearly expressed. ", "The use of the word `near' was not inconsistent with the vent being installed in an outside wall eight or ten feet from the outlet; and, hence, there was no inconsistency between the requirement that the vent be `near' the outlet and the requirement that the vent be installed in an outside wall so it could be used for its normal purpose.\"", "\n\n\n4\nThis was not a case of \"defective design,\" but one of the common, garden variety of disputes calling for an understanding of the factual background and the use of common sense. ", "The meaning of \"near\" could not be understood except in the light of the facts above described. ", "Thus only factual issues are involved, and Judge Bruchhausen properly held, under the terms of the Disputes Clause, that the decision of the Armed Services Board of Contract Appeals was final and conclusive. ", "See United States v. Hamden Co-Operative Creamery Co., 2 Cir., ", "1961, 297 F.2d 130, 133-135; 41 U.S.C. § 321.", "\n\n\n5\nAffirmed.", "\n\n\n\nNotes:\n\n\n1\n 28. ", "DISPUTES\n(a) Except as otherwise provided in this contract, any dispute concerning a question of fact arising under this contract which is not disposed of by agreement shall be decided by the Contracting Officer, who shall reduce his decision to writing and mail or otherwise furnish a copy thereof to the Contractor. ", "The decision of the Contracting Officer shall be final and conclusive unless, within 30 days from the date of receipt of such copy, the Contractor mails or otherwise furnishes to the Contracting Officer a written appeal addressed to the Secretary. ", "The decision of the Secretary or his duly authorized representative for the determination of such appeals shall be final and conclusive unless determined by a court of competent jurisdiction to have been fraudulent, or capricious, or arbitrary, or so grossly erroneous as necessarily to imply bad faith, or not supported by substantial evidence. ", "In connection with any appeal proceeding under this clause, the Contractor shall be afforded an opportunity to be heard and to offer evidence in support of its appeal. ", "Pending final decision of a dispute hereunder the Contractor shall proceed diligently with the performance of the contract and in accordance with the Contracting Officer's decision.", "\n\n\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0008606193005107343, 0.0006740767857991159, 0.0013785817427560687, 0.0009916971903294325, 0.0008496450609527528, 0.0009307562722824514, 0.0006834867526777089, 0.0006624843226745725, 0.0005965704331174493, 0.0007638070965185761, 0.002001298824325204, 0.000887399772182107, 0.0006091095274314284, 0.0007541792583651841, 0.0007818397716619074, 0.0005770287825725973, 0.0006319922977127135, 0.0006574831786565483, 0.000733463151846081, 0.0006449663196690381, 0.0006015474209561944, 0.0006535202846862376, 0.0006883337628096342, 0.0007354638655669987, 0.0006518448353745043, 0.0005803668755106628, 0.0005922624259255826, 0.000727108446881175, 0.0007549554575234652, 0.0008115955861285329, 0.0007757209823466837, 0.000552693847566843, 0.0005628204089589417, 0.0006754497881047428, 0.0005559820565395057, 0.0005348753766156733, 0.001995444530621171 ]
0.000787
37
[ "Health indicators and risks among people experiencing homelessness in Melbourne, 1995-1996.", "\nDuring the study's first stage, 284 homeless people from crisis and long-term accommodation sites were surveyed using stratified, systematic sampling. ", "The second stage involved a survey of a convenience sample of 100 homeless people from squats and the streets. ", "Participants completed a questionnaire, Mantoux testing was performed and blood taken for gamma-interferon assay, liver and renal function tests. ", "The group's health status was poor, with 72% experiencing medical conditions in the preceding two years and 77% symptoms in the month prior to interview. ", "Bronchitis, asthma and gastroenteritis were the most commonly reported conditions; productive and persistent coughing, shortness of breath and wheezing the commonest symptoms. ", "Twenty-one per cent had Mantoux reactions 15 mm or greater, 28% a raised GGT and 19% a raised ALT. ", "Seventy-seven per cent smoked, 74% were current drinkers, 28% had injected drugs at some time in their lives and 14% were regularly injecting drugs. ", "Forty-four per cent had experienced mental illness, 49% of whom reported depression and 15% schizophrenia. ", "Homeless people in Melbourne have poor health status and engage in behaviours that place their health at risk. ", "The high number of respiratory and gastro-intestinal complaints, the high level of cigarette smoking and injecting drug use (IDU) and the proportion likely to be infected with Mycobacterium tuberculosis (MTb) are all issues with important health consequences. ", "Participants recruited from the street had significantly poorer health and engaged in more risk behaviours than those from accommodation sites; those from the accommodated sample were more likely to be infected with Mtb." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0005600815638899803, 0.0005642196047119796, 0.0006961416802369058, 0.0007110016304068267, 0.0008366238907910883, 0.007297901902347803, 0.00121950579341501, 0.003429453819990158, 0.021412963047623634, 0.003839400364086032, 0.0012154950527474284, 0.0007949621649459004 ]
0.003548
12
[ "Q:\n\nTwo-part Star Trek episode with a Borg ship closing in on the Enterprise, then flies past because it's being chased\n\nWhat episode opens with a Borg ship closing in on the Enterprise, then flies past because it's being chased?", "\nIt was a two-part show. ", "\n\nA:\n\nMy selection for a scene with the Borg that most closely matches your description is:\nStar Trek: Voyager, Season 3 Episodes 26, Scorpion: Part I\n\nIn the second act, Voyager is approaching Borg space determined to avoid the Borg territory back to the Alpha Quadrant by riding what they dubbed the Northwest Corridor. ", "Filled with gravimetric disturbances, it would hide them from the Borg and is surprisingly Borg-free.", "\n\nAs the approach the corridor, they are surprisingly confronted by fifteen Borg vessels that are on a collision course. ", "But instead of engaging Voyager, they fly right past it instead.", "\n\nThis episode debuts the menace of Species 8472, an alien species from a subspace dimension dubbed \"fluidic space\".", "\n\nThere are four other Borg episode pairs but only one of them is a Star Trek Next Generation episode that includes Borg cube starships. ", "By process of elimination you can only be discussing:\nStar Trek: The Next Generation, Season 3 Episode 26 and Season 4, Episode 1: The Best of Both Worlds, Parts 1 and 2.", "\nBest of Both Worlds Part 1\n\nIn the second act, the Borg vessel approaches the Enterprise and demands the individual surrender of Captain Jean Luc Picard. ", "The Borg attack the Enterprise and surprise, the Enterprise's weapons are ineffective. ", "After adapting phasers to escape the Borg tractor beam, the Enterprise flees the scene with the Borg giving chase.", "\n\nIn the third act, the Enterprise hides in a nearby nebula, makes repairs and attempts to design new weapons. ", "The Borg drop space mines to drive the Enterprise out of the nebula. ", "We don't see the Borg cube move again until Enterprise leaves the nebula, flying past the Borg cube. ", "The cube pursues.", "\n\nThis is the only scene in this episode that even partially matches the Enterprise passing a Borg Cube.", "\n\nBest of Both Worlds Part 2\nIn this continued confrontation with the Borg, Captain Jean Luc Picard is kidnapped and converted into Locutus of Borg, to act as an intermediary for the peaceful surrender of the Federation to the Borg.", "\n\nThis episode opens with the Enterprise directly confronting the Borg cube, preparing to use the deflector array as a weapon system.", "\n\nThe Enterprise fails to even cause a scratch due to the Borg's integration of Picard's knowledge. ", "The Borg cube leaves the Enterprise heading toward Sector 001. ", "The Enterprise is unable to give chase since its warp core was damaged after using it to power the deflector weapon.", "\n\nIt will take the Enterprise eight hours to repair the warp engines. ", "This causes them\nto miss the battle at Wolf 359 where the Federation defenses are wiped out. ", "The Enterprise is never again able to catch up to the Borg cube during the remainder of the episode.", "\n\nGiven your description and after watching both episodes, there is no scene where the Borg cube approaches the Enterprise and then leaves as you describe.", "\n\nThe only other two part episode with the Borg in the Next Generation series is Descent, Part 1 and 2 and there are no Borg Cubes in those episodes.", "\n\nA:\n\nIt sounds like you're referring to the two-part Voyager episode \"Scorpion\" (1997).", "\n\nVoyager is passed by an armada of Borg cubes.", "\n\nA:\n\nIf it's TNG, then it's the first scene of \"Best of Both Worlds, part II\" (1990). ", "The Enterprise's weapon fails (because the Borg got Picard/Locutus), and then they warp off to sector 001 with the Enterprise unable to pursue.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000715063710231334, 0.0011852855095639825, 0.0006289503071457148, 0.0008644249755889177, 0.0006344114081002772, 0.0006303417030721903, 0.0007158775115385652, 0.0007583306869491935, 0.0005417784559540451, 0.0006376717938110232, 0.005680978298187256, 0.0006855298997834325, 0.0007026982493698597, 0.0023180267307907343, 0.0007986043929122388, 0.0006623280351050198, 0.000858471030369401, 0.0006469337968155742, 0.0007232652860693634, 0.0009539724560454488, 0.0008575692772865295, 0.0008837869972921908, 0.0007299863500520587, 0.0017122647259384394, 0.000707428902387619, 0.0005735171143896878, 0.0007548173307441175, 0.0005715052247978747, 0.0008241349132731557, 0.000620029226411134, 0.0018996503204107285, 0.001995444530621171 ]
0.001046
32
[ "\"\"\"\n Dwarf - Copyright (C) 2018-2020 Giovanni Rocca (iGio90)\n\n This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either version 3 of the License, or\n (at your option) any later version.", "\n\n This program is distributed in the hope that it will be useful,\n but WITHOUT ANY WARRANTY; without even the implied warranty of\n MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ", " See the\n GNU General Public License for more details.", "\n\n You should have received a copy of the GNU General Public License\n along with this program. ", " If not, see <https://www.gnu.org/licenses/>\n\"\"\"\n\nclass CpuRegister():\n __slots__ = ['name', 'description', 'value']\n\n def __init__(self, name, value, description=None):\n self.name = name\n self.value = value\n self.description = 'Register'\n if description:\n self.description = description\n" ]
{ "pile_set_name": "Github" }
[ 0.0005680326139554381, 0.0005842552636750042, 0.0005788954440504313, 0.0005805735127069056, 0.0006496146088466048 ]
0.000592
5
[ "Effect of tolbutamide on myocardial energy metabolism.", "\nExposure of rat hearts perfused with 5 mM glucose and 5 mM acetate to tolbutamide led to a dramatic stimulation in glucose utilization and glycolytic flux. ", "This effect was concentration dependent, with the largest response occurring at a tolbutamide concentration of 0.6 mM. Measurement of tissue glycogen content revealed that the higher concentrations of tolbutamide also enhanced glycogenolysis, indicating that the increase in glycolysis was caused by an increase in both glucose consumption and glycogen mobilization. ", "On the basis of the determination of key metabolic intermediates, it was concluded that the stimulation of anaerobic metabolism was mediated by an activation of both phosphofructokinase and phosphorylase. ", "The observed increase in glycolytic flux was associated with a rise in lactate production; however, the most pronounced effect of the drug was the stimulation of glucose oxidation. ", "Thus the percentage of oxygen used in the oxidation of glucose was dramatically increased. ", "Calculations also revealed that the contribution of glucose to overall ATP production rose from 8% in the absence of tolbutamide to about 30% in the presence of the sulfonylurea." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0008111128117889166, 0.000678143638651818, 0.0006908494979143143, 0.0006022972520440817, 0.0005805848632007837, 0.0005697636515833437, 0.0006107986555434763 ]
0.000649
7
[ "Emanuel Zanders\n\nEmanuel Zanders (born July 31, 1951) was an American football offensive lineman in the National Football League for the New Orleans Saints and Chicago Bears. ", " He played college football at Jackson State University.", "\n\nZanders is a member of the New Orleans Saints Hall of Fame 25 Years All-Time Team. ", "He was a Saints captain from 1976-1979. ", "In 1979, he was voted as the Saints Offensive Lineman of the Year. ", "Other honors Zanders received in his professional career was the Soulful Saints, Inc. Offensive Player of the Year, 1978 and the National Sports Foundation Offensive Player of the Year, 1980.", "\n\nZanders was inducted into the Jackson State University Sports Hall of Fame in 2004.", "\n\nCategory:1951 births\nCategory:American football offensive guards\nCategory:Chicago Bears players\nCategory:Living people\nCategory:New Orleans Saints players\nCategory:Jackson State Tigers football players\nCategory:People from Demopolis, Alabama" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0013767705531790853, 0.0021640232298523188, 0.0008143053855746984, 0.0006357147940434515, 0.0007900037453509867, 0.0006834984524175525, 0.0007801618776284158, 0.0006390580092556775 ]
0.000985
8
[ "Pilots walk past an Egyptian Rafale fighter jet (Image: Egypt Independent)\n\nThe French Dassault is expected to receive an additional order of 12 Rafale fighter jets from Egypt during the visit of French President Emmanuel Macron later this week.", "\n\nBetween Paris and Cairo, there is a real convergence on the Rafale issue to the point that it is increasingly possible that an announcement for the sale of twelve additional Rafale intervenes during the visit of Emmanuel Macron in Egypt (27 -29 January), La Tribune reported Wednesday.", "\n\nEgypt has been facing opposition from the French Treasury to obtain the same favourable financial package it obtained for the original order, but President Emmanuel Macron is said to have intervened to ensure that the Egyptian purchase goes through.", "\n\nIn February 2015, France agreed to deliver 24 Rafale fighter jets to Egypt at a cost of € 5.2 billion (US$5.9 billion) (including a FREMM multipurpose frigate and a supply of missiles).", "\n\nEgypt received the third batch of three Rafale fighter jets flown solely by Egyptian pilots from France in April 2017. ", "This marked the joining of the single-seat model (Rafale EM) to the Egyptian Air Force. ", "Egypt took delivery of the fourth batch of two Rafale EM fighter jets in July 2017.", "\n\nIn June 2016, Egypt started negotiations with Dassault to acquire 12 additional Rafales which was an option on the original contract. ", "An Egyptian delegation visited France in November 2017 to move negotiations forward, with a deal for the additional dozen possible before year-end." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005685374489985406, 0.000546350609511137, 0.0005797763587906957, 0.0006509101949632168, 0.000663584447465837, 0.0006722647231072187, 0.0007169691962189972, 0.0005785129033029079, 0.0005556880496442318 ]
0.000615
9
[ "Distinguishing pathogenic from non-pathogenic microbes presents an interesting challenge to the host immune system and is critical for eliciting the appropriate immune response to combat the invading pathogen. ", "Vacuolar pathogens have evolved multiple strategies to manipulate host functions to promote intracellular survival, necessitating co-evolution of immune molecular sensory networks that detect the pathogen attempts at subversion. ", "To dissect how this process occurs at the molecular level we have developed methodology that monitors modifications on host proteins to reverse-engineer the host response networks to pathogenic infection in silico. ", "To this end, we are using the respiratory pathogen Legionella pneumophila as a model organism to decipher specific regulation of host cellular pathways to pathogenic challenge. ", "The overall goal of the project is to use biochemical and molecular approaches to characterize how cellular pathways in macrophages utilize regulatory molecular modifications, such as ubiquitin, to specifically alter the outcome of signaling cascades in response pathogenic infection. ", "Specific emphasis is placed on the cellular cascades that coordinate the cytokine response of innate immune cells." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.0006261667585931718, 0.0007210287149064243, 0.0005437624058686197, 0.0006521150935441256, 0.0005979155539534986, 0.0006446915795095265 ]
0.000631
6
[ "Selena Gomez Goes Apartment Hunting\n\nAbout Photo #524162:\nSelena Gomez replies to an email on her phone as she arrives at an office building in Los Angeles on Monday afternoon (January 14). ", "The 20-year-old actress looks… Read The Post Here" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005839868681505322, 0.007031057495623827 ]
0.003808
2
[ "\n\nOkCupid Doesn’t Care How You Find Love, As Long As You Never Ever Use Firefox - superduper33\nhttp://www.slate.com/blogs/the_slatest/2014/03/31/okcupid_urges_members_to_boycott_firefox_because_of_ceo_s_opposition_to.html\n\n======\nkirkbackus\nWell now, if you really want to stick it to him, you should just disable\nJavaScript altogether! ", "Brendan Eich created it after all.", "\n\n" ]
{ "pile_set_name": "HackerNews" }
[ 0.020031671971082687, 0.000715618662070483, 0.001995444530621171 ]
0.007581
3
[ "Chelsea Handler is the most overpaid person on television, according to study of obvious things\n\nUsing the somewhat-scientific method of dividing her salary by the number of viewers she attracts, in addition to watching her show, the L.A. Times has determined that Chelsea Handler is the most overpaid personality on television. ", "According to the paper's research, Handler receives $12 million a year to find the puns in the day's tabloid reports for a mere 718,000 viewers, a figure that works out to a staggering $16.70 she's being paid per each Chelsea Lately watcher—an amount that could potentially provide similar, yet more lasting laughs with the purchase of a \"Take Me Drunk, I'm Home\" novelty T-shirt.", "\n\nOf course, the Times' methodology doesn't take into account all mitigating variables, such as the actual number of episodes that someone like David Letterman or Jon Stewart tapes a year, the advertising value of the attractive 18-49 demo they bring in, the sexual favors provided by Handler to her former boss, etc. ", "But it's still an interesting breakdown of who's actually worth what, including the surprising revelation that, according to this formula, both Ashton Kutcher and Jersey Shore's Snooki are somehow considered underpaid. ", "That's because, despite Kutcher's $17 million deal to keep Two And A Half Men afloat, he's really only earning $1.16 for every viewer pacified, which only seems fair when you consider it compensation for the actual value of the jokes. ", "Meanwhile, Snooki takes in a relatively paltry 16 cents per viewer, though this is less of an imbalance once you factor in that no one should be giving her money to do that in the first place. ", "Pointing out such disparities is expected to have little to no impact, however, other than the shock of discovering that Judge Judy somehow makes $45 million a year. ", "So why is she so mad all the time? ", "Seems like she'd be able to take a little bull for $45 million." ]
{ "pile_set_name": "Pile-CC" }
[ 0.011913686990737915, 0.0017734296852722764, 0.0008295437437482178, 0.0006393592921085656, 0.0007435685838572681, 0.000705044949427247, 0.0006869189674034715, 0.04628537595272064, 0.5618663430213928 ]
0.069494
9
[ "Comparison of length judgments and the Müller-Lyer illusion in monkeys and humans.", "\nVisuo-spatial magnitude judgements are abstract in that they are detached from the specific sensory parameters on which they are based. ", "Nevertheless, the visual system is actively reconstructing and interpreting the outside world, which sometimes causes reproducible geometric illusions. ", "Here, we investigated the visual length perception of rhesus macaques, an Old World monkey species, in a delayed match-to-sample task and compared the non-human primates' performance to the length judgment of human participants under identical conditions. ", "The quantitative analysis of the length discrimination shows that humans and macaques both show a distance and size effect in judging length and have almost identical length judgment characteristics as determined by the widths of the discrimination functions and the Weber fractions. ", "Moreover, both monkeys and humans were subject to the geometric Müller-Lyer illusion caused by inward or outward pointing 'arrows' at the ends of a line, resulting in over- or underestimation of length, respectively. ", "The strength of the illusion effects (i.e., the magnitude of length misjudgement for stimuli with inward and outward pointing arrows at the end of the lines) was in the range between 1.17 and 1.57° of visual angle for both monkeys and the human participants, and thus very similar between the two primate species. ", "Our results suggest that the visuo-spatial mechanisms underlying simple horizontal line-length perceptions in the human and macaque monkey are qualitatively and quantitatively similar, offering the possibility to investigate the neural correlates of geometric illusions in the monkey and to translate the findings to the human visual system." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0023057712242007256, 0.0006029985961504281, 0.0006195734604261816, 0.0007163228001445532, 0.0006690644659101963, 0.0020020208321511745, 0.0006807715981267393, 0.0006603165529668331 ]
0.001032
8
[ "Q:\n\nPHP: DatePeriod with last day of month\n\nI'd like to work with PHP DateInterval to iterate through months:\n$from = new DateTime();\n$from->setDate(2014, 1, 31);\n\n$period = new DatePeriod($from, new DateInterval('P1M'), 12);\n\nI'd expect it to returns 31 January, 28 February (as the DateInterval is 1 month), but it actually returns 31 January, 3 March, 3 of April... hence skipping February.", "\nIs there any way to do this simply?", "\nThanks!", "\nEDIT : as a refernece, here is a solution that seems to cover most use cases:\n$date = new DateTime('2014-01-31');\n$start = $date->format('n');\n\nfor ($i = 0; $i < 28; $i++) {\n $current = clone $date;\n $current->modify('+'.$i.' ", "month');\n\n if ($current->format('n') > ($start % 12) && $start !", "== 12) {\n $current->modify('last day of last month');\n }\n\n $start++;\n\n echo $current->format('Y-m-d').PHP_EOL;\n}\n\nA:\n\nYou can use DateTime::modify():\n$date = new DateTime('last day of january');\necho $date->format('Y-m-d').PHP_EOL;\n\nfor ($i = 1; $i < 12; $i++) {\n $date->modify('last day of next month');\n echo $date->format('Y-m-d').PHP_EOL;\n}\n\nEDIT: I think I didn't understand your question clearly. ", "Here is a new version:\n$date = new DateTime('2014-01-31');\n\nfor ($i = 0; $i < 12; $i++) {\n $current = clone $date;\n $current->modify('+'.$i.' ", "month');\n\n if ($current->format('n') > $i + 1) {\n $current->modify('last day of last month');\n }\n\n echo $current->format('Y-m-d').PHP_EOL;\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006810834747739136, 0.000729951832909137, 0.0007347135688178241, 0.0006498152506537735, 0.0007110358565114439, 0.0006803944706916809, 0.0007244769367389381, 0.0007555755437351763 ]
0.000708
8
[ "Measurement and partial characterization of the multiple forms of neurokinin A-like immunoreactivity in carcinoid tumours.", "\nAn antiserum raised against neurokinin A has been used to demonstrate storage and release of neurokinin A-like immunoreactivity by carcinoid tumours. ", "The antiserum showed reactivity towards members of the tachykinin family of polypeptides in the order: neurokinin A greater than eledoisin greater than neurokinin B greater than kassinin greater than substance P greater than physalaemin but the magnitude of the cross-reactivity with substance P and physalaemin was less than 1% of that of neurokinin A. A sensitive (IC50 238 fmol/ml; minimum detectable concentration, 9 fmol/ml) radioimmunoassay was set up using this antiserum. ", "Extracts of metastatic tumour tissue from four patients with a primary carcinoid tumour in the midgut contained both neurokinin A-like immunoreactivity (NKA-LI) and substance P-like immunoreactivity (SP-LI). ", "The concentrations (pmol/g wet weight) of NKA-LI and SP-LI in the tumours were: patient A 210, 201; patient B 2276, 6849; patient C 1198, 834 and patient D 424, 379. ", "Analysis of the tumour extracts by reverse phase HPLC indicated that the NKA-LI was heterogeneous. ", "Under two different conditions of chromatography, one component was eluted with the same retention time as neurokinin A. Two further components were more hydrophobic than neurokinin A but were not eluted with the retention time of neurokinin B. Analysis of these components by gel filtration indicated a molecular weight in the 3000-4000 range suggesting that they may be related to neuropeptide K, an N-terminally extended form of neurokinin A. NKA-LI and SP-LI were undetectable in the plasma of patients A and D but were elevated in patient B (NKA-LI 1005 +/- 114; SP-LI 345 +/- 85 fmol/ml) and patient C (NKA-LI 80 +/- 31; SP-LI 21 +/- 13 fmol/ml)." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0009538842714391649, 0.0022586605045944452, 0.0011270128889009356, 0.0007581053068861365, 0.0006760106771253049, 0.0006254689069464803, 0.0009200830827467144 ]
0.001046
7
[ "Static content\n" ]
{ "pile_set_name": "Github" }
[ 0.0007013501599431038 ]
0.000701
1
[ "\n882 So.2d 1059 (2004)\nEASTERN FUNDING, L.L.C., Appellant,\nv.\nGilda I. ROMAN, d/b/a Unique Dry Cleaner, and Martin Roman, Appellees.", "\nNo. ", "4D03-2795.", "\nDistrict Court of Appeal of Florida, Fourth District.", "\nAugust 25, 2004.", "\nGordon A. Dieterle of McClosky, D'Anna, Ioannou & Dieterle, LLP, Boca Raton, for appellant.", "\nPatrick S. Cousins of Cousins Law Firm, P.A., West Palm Beach, for appellee Martin Roman.", "\nPOLEN, J.\nAppellant, Eastern Funding, L.L.C., has timely appealed a non-final order on entitlement to arbitration. ", "The central issue below and on appeal is whether the parties' underlying Lease Agreement evidenced a transaction involving interstate commerce so as to render it subject to the Federal Arbitration Act. ", "This issue presents a pure question of law, therefore we apply a de novo standard of review. ", "See Stacy David, Inc. v. Consuegra, 845 So.2d 303, 306 (Fla. 2d DCA 2003). ", "For the reason that follows we affirm.", "\nThis appeal arises from an alleged breach of contract for leased dry cleaning equipment. ", "Group Leasing entered into a Lease Agreement with Gilda Roman. ", "The Lease Agreement provided for monthly payments to be mailed to Group Leasing's New York address. ", "There was also a provision in the Lease Agreement for any dispute arising from the lease to be submitted to binding arbitration with the American Arbitration Association in accordance with its rules, to take place in New York. ", "Gilda Roman and her husband, Martin Roman, executed a personal guaranty. ", "Shortly after the Lease Agreement was executed, Group Leasing assigned all of its rights and interest in the Lease Agreement to the Appellant, Eastern Funding.", "\nIt is alleged that at some point, Gilda Roman failed to pay the monthly lease payments. ", "Pursuant to the Lease Agreement, Eastern Funding elected to accelerate the remaining payments. ", "Eastern Funding filed suit in Palm Beach County for breach of contract and breach of guaranty against the Romans. ", "Martin Roman was timely served, but Gilda Roman was not. ", "Martin Roman filed a Motion to Dismiss for failure to apply the arbitration *1060 clause, which dictated that arbitration be completed in New York. ", "The trial court granted the motion, ordering that the parties shall arbitrate in New York pursuant to the Lease Agreement.", "\nOn appeal, Eastern Funding argues that because the arbitration was to take place in a foreign forum, the arbitration clause is not enforceable if one party objects prior to an arbitration award. ", "See § 682.02, Fla. Stat. (", "2003). ", "In Damora v. Stresscon International, Inc., 324 So.2d 80, 81-82 (Fla.1975), the Supreme Court addressed this issue, holding:\nThe Florida courts have no statutory authority under Chapter 682 to compel arbitration in another jurisdiction.... Absent the statutory authority of Chapter 682 to enforce the arbitration provision, the controlling law of this state clearly makes an arbitration provision voidable at the instance of either party and prohibits its being used as a bar to an action by either party in a court of competent jurisdiction.", "\n\nSee also Romar Transports, Ltd., Inc. v. Iron and Steel Co. of Trinidad and Tobago, Ltd., 386 So.2d 572, 574 (Fla. 4th DCA 1980). ", "Nevertheless, there is a well-established exception to the general rule announced in Damora. ", "In Butcher & Singer, Inc. v. Frisch, 433 So.2d 1360, 1361 (Fla. 4th DCA 1983), this court held that the general rule does not apply to valid and enforceable arbitration agreements applying federal law, even though foreign state law is incorporated in the arbitration agreement. ", "See Coastal Health Care Group, Inc. v. Schlosser, 673 So.2d 62, 65 (Fla. 4th DCA 1996). ", "As such, Florida courts must enforce arbitration agreements that are subject to the Federal Arbitration Act even if the arbitration agreement is not subject to Florida law.", "\nThe Federal Arbitration Act applies only to [a] written provision in ... a contract evidencing a transaction involving commerce.... 9 U.S.C. § 2. ", "The Federal Arbitration Act was discussed in Coastal Health Care, 673 So.2d at 66, in which this court noted:\nThe [Supreme] Court's recent case of Allied-Bruce Terminix Co. v. Dobson, [513 U.S. 265] 115 S.Ct. ", "834, 130 L.Ed.2d 753 (1995), addressed the reach of the Federal Arbitration Act and how the phrase transaction involving commerce should be construed. ", "After noting that some state courts and federal district courts have interpreted the Act's language as requiring the parties to a contract to have contemplated an interstate commerce connection, the Court held that such language should be read broadly. ", "Specifically, the word involving is broad and is the functional equivalent of affecting. ", "115 S.Ct. ", "at 839. ", "The Court reiterated its earlier pronouncement that the interstate commerce language should be read broadly to extend the Act's reach to the limits of Congress' Commerce Clause power. [ ] ", "115 S.Ct. ", "at 840; Perry v. Thomas, 482 U.S. 483, 107 S.Ct. ", "2520, 96 L.Ed.2d 426 (1987).", "\nCoastal Health Care then discussed whether an interstate transaction meant that the transaction had to turn out in fact to involve interstate commerce or whether the parties had to \"contemplate\" an interstate transaction. ", "See Dobson, 513 U.S. at 276-77, 115 S.Ct. ", "834. ", "Coastal Health Care held that a commerce in fact interpretation was more faithful to the statute than the contemplation of the parties interpretation which would require costly litigation. ", "673 So.2d at 66.", "\nIn Coastal Health Care, this court found the following transactions to be interstate transactions: (1) several meetings took place in North Carolina; (2) discussions took place by telephone across state lines; (3) a Florida corporation acquired stock through its parent Delaware corporation *1061 with its principal place of business in North Carolina; (4) North Carolina employees and residents were involved in the negotiations; (5) closing took place in North Carolina; and (6) all notices and communications were sent across state lines to North Carolina. ", "Id.\nAt bar, Eastern Funding is a Delaware corporation, with its primary place of business in New York. ", "Roman, however, was operating out of Florida. ", "Likewise, the monthly rent payments were to be mailed from Florida across state lines to New York. ", "Finally, all correspondence whether by mail or telephone occurred across state lines. ", "Similar to our holding in Coastal Health Care, we hold that the Federal Arbitration Act is applicable as the Lease Agreement involves interstate commerce. ", "Consequently, the trial court did not err in granting Roman's Motion to Dismiss and in ordering the parties to arbitrate in New York. ", "We find Eastern Funding's remaining issues to be unpersuasive and hereby affirm.", "\nAFFIRMED.", "\nMAY, J., and GOLD, MARC H., Associate Judge, concur.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0006507911020889878, 0.0013785817427560687, 0.0012193141737952828, 0.0007709672790952027, 0.0007144882110878825, 0.0007796093123033643, 0.0006594043807126582, 0.0006294255726970732, 0.0005936300731264055, 0.0005883642588742077, 0.0006408310146071017, 0.0005400620866566896, 0.000737302063498646, 0.0005740323103964329, 0.0005337503389455378, 0.0005430722376331687, 0.01637435331940651, 0.000578065577428788, 0.0007126823184080422, 0.0005737858591601253, 0.0009991622064262629, 0.0007626165170222521, 0.0007620617980137467, 0.000604637956712395, 0.0006061430322006345, 0.0006455972325056791, 0.0007573907496407628, 0.0006979635800234973, 0.0006522555486299098, 0.0005691926926374435, 0.0006789991748519242, 0.0006452423403970897, 0.0006318790838122368, 0.0007351646781899035, 0.0006360011175274849, 0.0006100315949879587, 0.0005617613787762821, 0.0006676217308267951, 0.0008828220888972282, 0.0007423224742524326, 0.0006031790981069207, 0.0008828220888972282, 0.0007747783092781901, 0.0007262483704835176, 0.000556702958419919, 0.0006491588428616524, 0.0010736508993431926, 0.0006075499695725739, 0.0009499051375314593, 0.0005863586557097733, 0.0006570083787664771, 0.0008789844578132033, 0.0006753689958713949, 0.0005840534577146173, 0.0005716626765206456, 0.0008314544684253633, 0.0006034186226315796, 0.0007905580569058657, 0.0006482836324721575, 0.001995444530621171 ]
0.000988
60
[ "Q:\n\nConvert input word into vector matrix\n\nI wold like some help of converting an input (word or number or mix) into a single row vector, such as the following:\nIf input is \">DAVID123<\" I want it to be as {>,D,A,V,I,D,1,2,3,<}\nwhere all letters considered as unknown variables. ", "\n\nA:\n\nTry\nToExpression[Select[Characters[\">DAVID123<\" ],StringMatchQ[#,LetterCharacter]&]]\n\nwhich will give you a vector of\n{D,A,V,I,D}\n\nas symbols or variables, but C and D and E and I and K have predefined meaning inside of Mathematica and may cause you grief.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007659237016923726, 0.005633800756186247, 0.001995444530621171 ]
0.002798
3
[ " PRECEDENTIAL\n\n UNITED STATES COURT OF APPEALS\n FOR THE THIRD CIRCUIT\n _____________\n\n No. ", "16-3384\n _____________\n\n JOHN R. ZIMMERMAN\n\n v.\n\n THOMAS W. CORBETT; LINDA L. KELLY;\n FRANK G. FINA; K. KENNETH BROWN, II; MICHAEL\n A. SPROW; ANTHONY J. FIORE; GARY E. SPEAKS,\n Appellants\n _____________\n\n APPEAL FROM THE UNITED STATES DISTRICT\n COURT\n FOR THE MIDDLE DISTRICT OF PENNSYLVANIA\n (No. ", "1-13-cv-02788)\n District Judge: Honorable Yvette Kane\n _____________\n\n Argued\n February 7, 2017\n ____________\n\n Before: McKEE, COWEN, and FUENTES, Circuit Judges\n\n (Opinion Filed: October 16, 2017)\n ______________\n\nJoshua M. Autry, Esq. [", "ARGUED]\nFrank J. Lavery, Jr., Esq.", "\nLavery Faherty Patterson\n225 Market Street\nSuite 304, P.O. Box 1245\nHarrisburg, PA 17108\n\fAmy Zapp, Esq.", "\nOffice of Attorney General of Pennsylvania\nStrawberry Square\nHarrisburg, PA 17120\n\n Attorneys for Appellants Thomas W. Corbett, Jr.,\nFrank G. Fina, K. Kenneth Brown, II, Michael A. Sprow,\nAnthony J. Fiore, Gary E. Speaks\n\nFrank J. Lavery, Jr., Esq.", "\nAmy Zapp, Esq.", "\n\n Attorneys for Appellant Linda L. Kelly\n\nDevon M. Jacob, Esq. [", "ARGUED]\nP.O. Box 837\nMechanicsburg, PA 17055\n\n Attorney for Appellee\n\n ______________\n\n OPINION OF THE COURT\n ______________\n\nMcKEE, Circuit Judge.", "\n\n I. INTRODUCTION\n\n Appellants are current and former high ranking\nofficials of the Commonwealth of Pennsylvania, including a\nformer Attorney General who subsequently became\nGovernor.1 They appeal the District Court’s partial denial of\n\n1\n Specifically, they are: Thomas W. Corbett, former Attorney\nGeneral and Governor of Pennsylvania, Frank G. Fina, Chief\nDeputy Attorney General in the Office of Attorney General\nfor the Commonwealth of Pennsylvania, K. Kenneth Brown,\nII, a Senior Deputy Attorney General in the Office of\nAttorney General for the Commonwealth of Pennsylvania,\nMichael A. Sprow, a Senior Deputy Attorney General in the\n\n 2\n\ftheir motion for judgment on the pleadings in an action that\nJohn Zimmerman, a former employee of the state legislature,\nfiled against them under 42 U.S.C. § 1983. ", "Zimmerman\nalleged that Appellants were all involved in bringing criminal\ncharges against him and that those charges amounted to\nmalicious prosecution in violation of both the Fourth and\nFourteenth Amendments of the United States Constitution\nand Pennsylvania law.2\n\n For the reasons that follow, we conclude that there was\nprobable cause to initiate those criminal proceedings and that\nZimmerman can therefore not establish a prima facie case of\nmalicious prosecution. ", "We will therefore reverse the District\nCourt’s order insofar as it denied Appellants’ motion for\njudgment on the pleadings.3\n\n II. ", "FACTS AND PROCEDURAL HISTORY\n\n This case stems from criminal charges filed against\nZimmerman, who was a member of the staff of John M.\nPerzel. ", "Perzel was a member of the Pennsylvania General\nAssembly representing the 172nd Legislative District in the\n\nOffice of Attorney General for the Commonwealth of\nPennsylvania, Anthony J. Fiore, a Special Agent in the Office\nof Attorney General for the Commonwealth of Pennsylvania\nand Director of the Bureau of Investigations for the Office of\nInspector General for the Commonwealth of Pennsylvania,\nand Gary E. Speaks, a Special Agent in the Office of Attorney\nGeneral of the Commonwealth of Pennsylvania. ", "Each of\nthem was a defendant in the suit Zimmerman filed. ", "For the\nsake of clarity, we will collectively refer to them as the\n“Appellants.”", "\n2\n The District Court dismissed all claims against Defendant\nLinda L. Kelly, former Attorney General of Pennsylvania.", "\n3\n The District Court’s order denying Appellants’ motion for\njudgment on the pleadings is immediately appealable because\nit denied Appellants’ assertion of qualified immunity.", "\nMitchell v. Forsyth, 472 U.S. 511, 530 (1985). ", "Because we\nconclude that the uncontested facts do not establish the\nelements of malicious prosecution, we do not need to reach\nthe issue of qualified immunity.", "\n\n 3\n\fPennsylvania House of Representatives. ", " Corbett, then\nAttorney General of Pennsylvania, conducted an investigation\nafter receiving information “that members of the Democratic\ncaucus received bonuses for campaign related work\nperformed on state time.", "”4 Zimmerman, Perzel, and Corbett\nwere all Republicans. ", "In September 2007, Perzel asked\nZimmerman to arrange a meeting with Corbett.5 “Corbett\nwanted Perzel to back him for Governor. . . ", ".[,]”6 but Perzel\nrefused.7 At the time, both Corbett and Perzel intended to run\nfor Governor in 2010.8\n\n In November 2009, Corbett announced grand jury\npresentments resulting in criminal charges against ten ranking\nRepublicans including “Perzel and his staff (one legislator\nand nine staff members), in what is now commonly referred\nto as [the] ‘Computergate’ [scandal].”9 Pursuant to that\ninvestigation, the grand jury subpoenaed on the House\nRepublican Campaign Committee (the “HRCC”) seeking\nproduction of campaign material.10\n\n Zimmerman was one of the nine staff members\narrested pursuant to this investigation.11 Zimmerman was\ncharged with intentionally hindering an investigation “by\nconcealing or destroying evidence of a crime.", "”12 Those\ncharges arose from allegations that he caused boxes\ncontaining campaign material that was the subject of a grand\njury subpoena to be moved from their original location to a\nlocation controlled by the HRCC to prevent the grand jury\nfrom finding them. ", " Appellants claimed that a male\nconspirator telephoned the HRCC from Zimmerman’s desk\nphone and warned that boxes of campaign material would be\ndelivered to the HRCC. ", "Appellants also alleged that\n\n4\n 55a ¶¶ 15–16.", "\n5\n 55a ¶¶ 17.", "\n6\n 56a ¶ 22.", "\n7\n 56a ¶ 24.", "\n8\n 55a ¶ 22.", "\n9\n 57a ¶ 32.", "\n10\n Appellant Br. ", "at 11; see also 222a.", "\n11\n 57a ¶ 33.", "\n12\n 77a ¶ 122.", "\n\n 4\n\fZimmerman was typically at his desk, and that campaign\nmaterial was actually moved to the HRCC after the call.13\n\n Based on evidence of that phone call from\nZimmerman’s line, Zimmerman was charged with (1)\nHindering Apprehension or Prosecution; (2) Obstructing\nAdministration of Law or Other Governmental Function; (3)\nCriminal Conspiracy for Hindering Apprehension or\nProsecution; and (4) Criminal Conspiracy for Obstructing\nAdministration of Law or Other Governmental Function.14\nAppellants subsequently dismissed the charges against\nZimmerman.", "\n\n Subsequently, Zimmerman filed the instant complaint.", "\nHe alleged that Appellants maliciously prosecuted him in\nviolation of the Fourth and Fourteenth Amendments as well\nas Pennsylvania law.", "\n\n Appellants moved to dismiss Zimmerman’s complaint\npursuant to Federal Rule of Civil Procedure 12(b)(6). ", "The\nDistrict Court concluded inter alia that Appellants were not\nentitled to qualified immunity on claims arising from\nallegations that (1) they manufactured witness testimony and\nintimidated witnesses prior to the grand jury proceedings; (2)\nthey destroyed exculpatory evidence; and (3) Fiore signed a\ncriminal complaint and affidavit of probable cause that\ncontained false and misleading statements. ", "This appeal\nfollowed.", "\n\n III. ", "JURISDICTION AND STANDARD OF REVIEW\n\n The District Court had jurisdiction under 28 U.S.C. §\n1331. ", "Our jurisdiction is based upon 28 U.S.C. § 1291. ", "We\nreview a denial of a motion for judgment on the pleadings de\nnovo.15 “A motion for judgment on the pleadings based on\nthe defense that the plaintiff has failed to state a claim is\nanalyzed under the same standards that apply to a Rule\n\n\n13\n Appellant Br. ", "at 11; 81a ¶ 146; 62a ¶ 69.", "\n14\n 76a ¶ 120.", "\n15\n Allah v. Al–Hafeez, 226 F.3d 247, 249 (3d Cir. ", "2000).", "\n\n 5\n\f12(b)(6) motion.", "”16 A motion for judgment on the pleadings\nshould be granted if the movant establishes that “there are no\nmaterial issues of fact, and he is entitled to judgment as a\nmatter of law.", "”17 In considering a motion for judgment on the\npleadings, a court must accept all of the allegations in the\npleadings of the party against whom the motion is addressed\nas true and draw all reasonable inferences in favor of the non-\nmoving party.18\n\n IV. ", "DISCUSSION\n\n Appellants advance several arguments, including\narguments that the District Court erred in denying their claim\nof qualified immunity. ", "However, our resolution of this appeal\nbegins and ends with Zimmerman’s failure to establish a\nprima facie case of malicious prosecution.", "\n\n To prevail on his malicious prosecution claim under §\n1983, Zimmerman must establish that “(1) the defendant[s]\ninitiated a criminal proceeding; (2) the criminal proceeding\nended in [his] favor; (3) the defendant[s] initiated the\nproceeding without probable cause; (4) the defendant[s] acted\nmaliciously or for a purpose other than bringing the plaintiff\nto justice; and (5) [he] suffered deprivation of liberty\nconsistent with the concept of seizure as a consequence of a\nlegal proceeding.", "”19 Similarly, to prove a malicious\nprosecution claim under Pennsylvania law, a plaintiff must\nshow that the defendant “instituted proceedings against the\nplaintiff 1) without probable cause, 2) with malice, and 3) the\nproceedings must have terminated in favor of the plaintiff.", "”20\n\n16\n Revell v. Port Auth. ", "of NY, NJ, 598 F.3d 128, 134 (3d Cir.", "\n2010).", "\n17\n Sikirica v. Nationwide Ins. ", "Co., 416 F.3d 214, 220 (3d Cir.", "\n2005) (citing Soc’y Hill Civic Ass’n v. Harris, 632 F.2d 1045,\n1054 (3d Cir. ", "1980)).", "\n18\n See Allah, 226 F.3d at 249.", "\n19\n 34a (citing Halsey v. Pfeiffer, 750 F.3d 273, 296–97 (3d\nCir. ", "2014) (quoting Johnson v. Knorr, 477 F.3d 75, 82 (3d\nCir. ", "2007))).", "\n20\n Kelley v. Gen. Teamsters, Chauffeurs & Helpers, Local\nUnion 249, 544 A.2d 940, 941 (Pa. 1988).", "\n\n 6\n\f Probable cause exists if “the facts and circumstances\nwithin [the Officer’s] knowledge and of which [he] had\nreasonably trustworthy information were sufficient to warrant\na prudent man in believing” that a crime had been\ncommitted.21 “Probable cause . . . ", "requires more than mere\nsuspicion; however, it does not require that the officer have\nevidence sufficient to prove guilt beyond a reasonable\ndoubt.", "”22\n\n The criminal proceeding against Zimmerman did end\nin his favor, and Zimmerman contends (as he must) that\nAppellants initiated the prosecution without probable cause.", "\nHowever, Zimmerman does not dispute any of the following:\n(1) a man called the HRCC from Zimmerman’s phone line\nand told the HRCC to expect a delivery of boxes of campaign\nmaterial; (2) Zimmerman was usually at his desk; or (3)\nboxes containing campaign material were moved to the\nHRCC as promised in the call from Zimmerman’s phone line.", "\nInstead, he claims that many others had access to his phone,\nhe “was not present when the boxes were moved, and had no\nknowledge of the same.", "”23 He also argues that Room 414,\nwhere the boxes were taken, was commonly referred to as\n“Perzel’s Office” and that this room “actually consisted of a\ncluster of eight rooms and the woman’s restroom. ", "Both\nPerzel’s and Representative Sandra J. Major’s offices were\nlocated [there].”24 The door to this space was left open during\nbusiness hours, and “anyone in the Capital could walk into\n[that room].”25 When seated at his desk, Zimmerman “could\n\n21\n Beck v. State of Ohio, 379 U.S. 89, 91 (1964).", "\n22\n Orsatti v. New Jersey State Police, 71 F.3d 480, 482–83\n(3d Cir. ", "1995).", "\n23\n 63a ¶ 72.", "\n24\n Appellee Br. ", "at 14; see also 59a ¶ 43-45; 75a ¶ 115(f)(vi)\n(“The Defendants withheld from the grand jury the fact that\nLochetto’s and Zimmerman’s presence or absence from the\nCapital could have been tracked, at least in part, through the\naccess card system for the parking garage.”).", "\n25\n Appellee Br. ", "at 14–15; see also 59a ¶ 47; 75a ¶ 115(f)(ii)\n(“The Defendants withheld from the grand jury the fact that\nliterally anyone in the Capital building (including but not\nlimited to, capital police, the cleaning crew, Sandra Majors’\n\n 7\n\fnot see the front door to Room 414 or the conference room.", "”26\nZimmerman further argues that Appellants “knew that [his]\nphone line was on numerous phones within [that room], not\njust on [his] phone, and could have been utilized by almost\nanyone.", "”27 In sum, Zimmerman argues that because anyone\ncould have moved the subpoenaed materials to Room 414 and\nanyone could have used “[his] phone line” to call the HRCC,\nAppellants did not have probable cause to arrest him.", "\n\n However, given the uncontested facts, while\nZimmerman’s arguments may well have been sufficient to\nraise a reasonable doubt that would have resulted in an\nacquittal at trial, they do not negate the fact that Appellants\nhad probable cause to prosecute him.28 There is no dispute\nthat Zimmerman was normally at his desk, that a male\nconspirator called from Zimmerman’s office desk phone line\nto tell the HRCC to expect a delivery of boxes of campaign\nmaterial, or that boxes of campaign material were then moved\nto a location controlled by the HRCC. ", "Moreover, the fact that\nPerzel’s office consisted of several rooms, and there was\n“unfettered access to Room 414,”29 does not negate the\n\nstaff of three, and a receptionist), had unfettered access to\nRoom 414 and could have placed the call to the HRCC\nfrom multiple phones using Zimmerman’s telephone line,\nand could have moved the boxes in question.”).", "\n26\n 60a ¶ 51; see also 75a ¶ 115(f)(v).", "\n27\n Appellee Br. ", "at 15; 74a–75a ¶ 115(f)(i), (iii) (“The\nDefendants withheld from the grand jury the fact that\nZimmerman’s telephone line could be accessed on\nthe receptionist’s a n d [others’] telephones, and likely on\nother telephones in Room 414. . . . ", "The Defendants withheld\nfrom the grand jury the fact that the call was likely placed by\n[Mark] Miller[, the Director of Messenger Services,] during\nhis special trip to Room 414 as noted in the messenger log.”).", "\n28\n See Michigan v. DeFillippo, 443 U.S. 31, 36 (1979) (“[T]he\nConstitution permits an officer to arrest a suspect without a\nwarrant if there is probable cause to believe that the suspect\nhas committed or is committing an offense. . . . [", "T]he mere\nfact that the suspect is later acquitted of the offense for which\nhe is arrested is irrelevant to the validity of the arrest.”).", "\n29\n 75a ¶ 115(f)(ii).", "\n\n 8\n\fpossibility that Zimmerman was the person who called the\nHRCC in an effort to conceal evidence. ", "Accordingly, even\nassuming that Zimmerman’s allegations are true, Appellants\nstill had probable cause to prosecute Zimmerman for\nconcealing or destroying the evidence that was the subject of\nthe grand jury subpoena. ", "Thus, Appellants are entitled to a\njudgment on the pleadings pursuant to Federal Rule of Civil\nProcedure 12(c).30\n\n V. CONCLUSION\n\n For the foregoing reasons, we reverse the District\nCourt’s decision denying Appellants’ motion for judgment on\nthe pleadings. ", "31\n\n\n\n\n30\n Zimmerman asks this Court to issue appropriate sanctions\nagainst Appellants. ", "We find no need to discuss or impose\nsanctions.", "\n31\n Because we conclude that Appellants had probable cause to\ninitiate this prosecution, we need not address Zimmerman’s\nremaining arguments since he cannot establish the underlying\nclaim of malicious prosecution.", "\n\n 9\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0009482082678005099, 0.0010120836086571217, 0.0008010020246729255, 0.0006507468060590327, 0.0007476249593310058, 0.0006578175816684961, 0.0008700776379555464, 0.0005837245262227952, 0.0009256569319404662, 0.0006906405324116349, 0.0008279583998955786, 0.0008753042202442884, 0.000582809210754931, 0.0006828184123151004, 0.0006981352344155312, 0.0005458559026010334, 0.000722920463886112, 0.0007850593538023531, 0.0007191586773842573, 0.000605108099989593, 0.0008394091273657978, 0.0006552063277922571, 0.004798745270818472, 0.0007960423827171326, 0.0008846092387102544, 0.000842879933770746, 0.0013528120471164584, 0.0007329051732085645, 0.0006840673740953207, 0.0007246506866067648, 0.0007413621060550213, 0.0007400114554911852, 0.0007448593969456851, 0.0008539956179447472, 0.0006932079559192061, 0.0007540272199548781, 0.0007713520317338407, 0.0008465894497931004, 0.0007082259398885071, 0.001173074939288199, 0.000759590941015631, 0.0008692800183780491, 0.0007603074773214757, 0.0012429648777469993, 0.000665562110953033, 0.0007205920992419124, 0.0008367278496734798, 0.000674444658216089, 0.0007625598227605224, 0.001222046441398561, 0.0007551076705567539, 0.0007680854760110378, 0.0006180795608088374, 0.0007270281203091145, 0.0006529506063088775, 0.0007616897346451879, 0.0007788066286593676, 0.0007691151695325971, 0.0011785742826759815, 0.0007538378704339266, 0.0007440905901603401, 0.0010070085991173983, 0.0007875945884734392, 0.07259495556354523, 0.0008460595854558051, 0.0015291061718016863, 0.0007488660630770028, 0.0007028489490039647, 0.0008983154548332095, 0.0008001041715033352, 0.0008289151592180133, 0.0007746266201138496, 0.0007523968815803528, 0.000669214641675353, 0.0006743450649082661, 0.0007136402418836951, 0.0006136397132650018, 0.0009863455779850483, 0.0007688169716857374, 0.0007164808339439332, 0.001596416812390089, 0.0005506029701791704, 0.0016698383260518312, 0.0005829575238749385, 0.0005946230376139283, 0.0007448004907928407, 0.0007796260179020464, 0.000636571494396776, 0.0006215880275703967, 0.0016888235695660114, 0.0006047748611308634, 0.0005858740769326687, 0.0013224976137280464, 0.002327037276700139, 0.0006632133154198527, 0.0006857007974758744, 0.001083915587514639, 0.0006388409528881311, 0.0008146119653247297, 0.0007110351580195129, 0.0006967968656681478, 0.001227615517564118 ]
0.001574
102
[ "Treadwell, Georgia\n\nTreadwell is an unincorporated community in Murray County, in the U.S. state of Georgia.", "\n\nHistory\nA variant name was \"Amzi\". ", "A post office called Amzi was established in 1894, and remained in operation until 1909. ", "In 1900, the community had 35 inhabitants.", "\n\nReferences\n\nCategory:Unincorporated communities in Murray County, Georgia\nCategory:Unincorporated communities in Georgia (U.S. state)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0009791309712454677, 0.0005916066002100706, 0.0006778340321034193, 0.0006262377137318254, 0.0005497573874890804 ]
0.000685
5
[ "En juin 2003, le chef de l’État français, Jacques Chirac, s’engage devant la communauté internationale à diviser par quatre ses émissions de gaz à effet de serrePhénomène naturel permettant un accroissement de la température de l'atmosphère d'une planète grâce à la présence de certains gaz... d’ici à 2050. ", "L’objectif ambitieux est repris un an plus tard dans le « plan climat », confirmé lors du Grenelle de l’Environnement de 2007 et dans la loi de transition énergétiqueLa transition énergétique désigne le passage du système actuel de production d'énergie... déposée en 2014.", "\n\nMais d’où vient ce facteur 4 ? ", "Pour le comprendre, il faut imaginer que tous les habitants de notre planète consomment équitablement de l’énergie. ", "Dans cette hypothèse, il faudrait, pour stopper l’accumulation du dioxyde de carboneAvec la vapeur d'eau, c’est le principal gaz à effet de serre (GES) de l'atmosphère terrestre... (C0 2 ) dans l’atmosphère et stabiliser le réchauffement climatiqueLe réchauffement climatique, appelé aussi réchauffement planétaire ou réchauffement global, est un phénomène d'augmentation de la température moyenne des océans... , que chacun n’émette pas plus de 500 kg de carbone par an. ", "Or, le français moyen en émet 2 tonnes, dont une grande partie vient du secteur énergétique. ", "C’est deux fois plus que la moyenne mondiale, mais trois fois moins que des pays comme les États-Unis et presque quatre fois moins que le petit état du Koweït ! ", "Pour parvenir à l’objectif des 500 kg de carbone émis par an par habitant, la France doit donc diviser par quatre ses rejets de gaz à effet de serre.", "\n\nLa France a déjà manqué les objectifs prévus par la directive européenne de 2001\n\nLa France a-t-elle les moyens d’atteindre ses objectifs de réduction de gaz à effet de serre ? ", "Le pays a déjà misé très tôt sur les énergies nucléaire et hydraulique, qui représentent à elles seules près de 90 % de la production d’électricité. ", "Les efforts devront donc venir de nouveaux leviers que résument bien les engagements pris en 2007 par l’Union européenne sous le terme des « 3 fois 20 ».", "\n\nA l’horizon 2020, elle prévoit, en se basant sur les niveaux de 1990, d’augmenter de 20 % l’efficacité énergétiqueEn économie, l'efficacité énergétique désigne les efforts déployés pour réduire la consommation d'énergie d'un système... , diminuer de 20 % les émissions de CO 2 , et couvrir 20 % des besoins énergétiques totaux par des énergies renouvelables. ", "Sur ce dernier point, la France a déjà manqué les objectifs prévus par la directive européenne de 2001, à savoir d’amener à 21 % la part des énergies renouvelables dans sa production totale d’électricité d’ici 2010, alors qu'elle oscille aujourd'hui autour de 18 %.", "\n\nForcée de reconnaître son échec, la France s'est engagée vis-à-vis de ses partenaires européens lors du Grenelle de l’environnement de 2007, cette fois de façon contraignante, à ce que 23 % de sa consommation énergétique totale soit d'origine renouvelable en 2020, contre 13,7 % en 2014.", "\n\nLa production d’énergie éolienne se rapproche de la rentabilité\n\nPour accompagner cette transformation, le pays et ses acteurs publics peuvent agir simultanément sur la recherche et l’innovation, afin de développer des technologies plus performantes et de moindre coût, le soutien à l’industrie, notamment dans les phases initiales des entreprises innovantes, et le soutien au marché, par des réglementations sur le prix du rachat de l’électricité.", "\n\nL’ambition est généralement d’aboutir à des filières industrielles mûres et compétitives permettant d’accélérer le déploiement des nouveaux systèmes énergétiques. ", "La production d'énergie éolienne terrestre se rapproche de la rentabilité (6,7 centimes le kWh contre 4,5 centimes dans une centrale nucléaire) et la pose, ces dernières années, d’environ 500 éoliennes par an ont fait de l'Hexagone le troisième marché en Europe, derrière l'Allemagne et l'Espagne. ", "L’énergie solaire présente quant à elle de nombreux défis. ", "Le rendement de conversion du rayonnement du soleil en électricité des meilleurs systèmes industriels dépasse tout juste 20 %, et le coût de l’électricité produite reste élevé, même si la tendance est à la baisse.", "\n\nL’efficacité énergétique concerne notamment le parc automobile\n\nL’autre transformation essentielle concerne l’efficacité énergétique, qui vise à la réduction de la consommation tout en satisfaisant les mêmes besoins, tandis que certains préconisent la sobriété énergétique en réduisant à la fois la consommation et les besoins.", "\n\nLes transports, qui contribuent pour 34 % des émissions de gaz à effet de serre en France (13 % dans le monde) sont au cœur de la problématique. ", "Pour le secteur automobile, les premières étapes sont déjà inscrites dans les politiques publiques européennes par des réglementations obligeant d’une part les constructeurs automobiles à vendre des véhicules émettant en moyenne moins de gaz à effet de serre (90 g de CO 2 /km en 2020 contre environ 137 g constaté en 2011), et d’autre part les vendeurs de carburants à incorporer une fraction de biocarburantsUn biocarburant est un carburant produit à partir de matières végétales ou animales... dans leurs produits. ", "En parallèle, les politiques publiques favorisent la recherche et le développement de nouveaux types de véhicules, hybrides ou électriques, moins émetteurs de gaz à effet de serre. ", "Ces transformations nécessitent le développement de nouvelles infrastructures, comme les bornes de recharge de batterie, et engagent une réflexion sur de nouvelles modalités d’usage.", "\n\nLa « fracture énergétique » et l’isolation de l’habitat\n\nEnfin, dans un pays où l'habitat représente près de 50 % de la consommation totale de l'énergie, servant à chauffer les locaux ou produire de l'eau chaude, se pose aujourd'hui la question de la « fracture énergétique ». ", "Les classes les plus pauvres, qui logent dans des bâtiments vieillissants, mal isolés et par conséquent gourmands en énergie, ne peuvent plus payer leur facture. ", "Cette « précarité énergétiqueLa précarité énergétique désigne l'état de personnes ou groupes qui n'ont pas d'accès suffisant et régulier, dans leur logement ou lieux de vie... » est une nouvelle donne sociale implique un retour de l'État dans la maîtrise des prix de l'énergie sur tout le territoire.", "\n\nLe parc immobilier français existant (environ 30 millions de logements) se renouvelle lentement - le taux de renouvellement des logements anciens est inférieur à 1 % par an - c’est pourquoi l’isolation de l’habitat apparaît comme une mine d’économies d’énergies.", "\n\nLes dépenses énergétiques, essentiellement dues au chauffage, contribuent à 23 % des émissions de gaz à effet de serre en France. ", "La première démarche a d’abord consisté à créer des normes de qualité énergétique des bâtiments et des réglementations plus contraignantes pour les nouvelles constructions. ", "L’isolation des bâtiments anciens se développe actuellement par des programmes technologiques visant par exemple à créer des matériaux nouveaux. ", "Par ailleurs, le gouvernement s’est engagé à la rénovation et à l’isolation thermique de 400 000 logements par an." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0010710795177146792, 0.0010665240697562695, 0.001614628592506051, 0.2945672571659088, 0.005827132146805525, 0.0047516897320747375, 0.023477105423808098, 0.004106056876480579, 0.0015434208326041698, 0.002888578223064542, 0.0011202353052794933, 0.0012056234991177917, 0.0009107347577810287, 0.0017664192710071802, 0.002255329629406333, 0.0015399972908198833, 0.0013108884450048208, 0.0027655710000544786, 0.005794689059257507, 0.007803842891007662, 0.0014212514506652951, 0.00267391768284142, 0.001433459110558033, 0.0013441535411402583, 0.0012207342078909278, 0.006058503873646259, 0.0040177772752940655, 0.0014069436583667994, 0.008430717512965202, 0.0019710250198841095, 0.001534809242002666, 0.0010847465600818396 ]
0.0125
32
[ "In this episode of the VR Pimp Podcast I speak with Laura Cebrian from Reality Lovers. ", "I last interviewed Laura in April of 2017 (VRPP 04) when Reality Lovers was preparing to celebrate their 1 year anniversary. ", "They’ve kept quite busy over the past year and a half with a number of new developments including the launch of their MILF site Mature Reality and their transgender site TS Virtual Lovers.", "\n\nLaura and I discuss the evolution of their 3 websites along with a rumored announcement about some changes that could be coming in the very near future. ", "We also talk about how Reality Lovers has continued to focus on producing innovative content with dual perspective scenes, green screen technology and their Mica’s Sommerhaus der Pornostars and Sex and Fun Downtown parody series." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0006017742562107742, 0.0005371793522499502, 0.0017548915930092335, 0.000519919500220567, 0.0037578693591058254 ]
0.001434
5
[ "Q:\n\nКак добавить \\ в строку в Java\n\nПишу программу которая бы создавала bat-ник для копирования файлов с одной папки в другую. ", "И, увы, столкнулся с проблемой когда надо вставить символ \\. Пример кода:\nString text = \"COPY \" + where + \" \"+ kuda + \" \"+ \"/H \" + \"\\\" + \"@pause\"; \n\nКак можно вписать этот символ?", "\n\nA:\n\n\"\\\"\n\nЭкранировать надо спецсимволы:\n\"\\\\\"\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.004104686435312033, 0.0011953925713896751, 0.0010098264319822192 ]
0.002103
3
[ "// This file is part of Eigen, a lightweight C++ template library\n// for linear algebra.", "\n//\n// Copyright (C) 2014 Benoit Steiner <benoit.steiner.goog@gmail.com>\n//\n// This Source Code Form is subject to the terms of the Mozilla\n// Public License v. 2.0. ", "If a copy of the MPL was not distributed\n// with this file, You can obtain one at http://mozilla.org/MPL/2.0/.\n\n#ifndef EIGEN_CXX11_TENSOR_TENSOR_CHIPPING_H\n#define EIGEN_CXX11_TENSOR_TENSOR_CHIPPING_H\n\nnamespace Eigen {\n\n/** \\class TensorKChippingReshaping\n * \\ingroup CXX11_Tensor_Module\n *\n * \\brief A chip is a thin slice, corresponding to a column or a row in a 2-d tensor.", "\n *\n *\n */\n\nnamespace internal {\ntemplate<DenseIndex DimId, typename XprType>\nstruct traits<TensorChippingOp<DimId, XprType> > : public traits<XprType>\n{\n typedef typename XprType::Scalar Scalar;\n typedef traits<XprType> XprTraits;\n typedef typename XprTraits::StorageKind StorageKind;\n typedef typename XprTraits::Index Index;\n typedef typename XprType::Nested Nested;\n typedef typename remove_reference<Nested>::type _Nested;\n static const int NumDimensions = XprTraits::NumDimensions - 1;\n static const int Layout = XprTraits::Layout;\n};\n\ntemplate<DenseIndex DimId, typename XprType>\nstruct eval<TensorChippingOp<DimId, XprType>, Eigen::Dense>\n{\n typedef const TensorChippingOp<DimId, XprType>& type;\n};\n\ntemplate<DenseIndex DimId, typename XprType>\nstruct nested<TensorChippingOp<DimId, XprType>, 1, typename eval<TensorChippingOp<DimId, XprType> >::type>\n{\n typedef TensorChippingOp<DimId, XprType> type;\n};\n\ntemplate <DenseIndex DimId>\nstruct DimensionId\n{\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE DimensionId(DenseIndex dim) {\n eigen_assert(dim == DimId);\n }\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE DenseIndex actualDim() const {\n return DimId;\n }\n};\ntemplate <>\nstruct DimensionId<Dynamic>\n{\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE DimensionId(DenseIndex dim) : actual_dim(dim) {\n eigen_assert(dim >= 0);\n }\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE DenseIndex actualDim() const {\n return actual_dim;\n }\n private:\n const DenseIndex actual_dim;\n};\n\n\n} // end namespace internal\n\n\n\ntemplate<DenseIndex DimId, typename XprType>\nclass TensorChippingOp : public TensorBase<TensorChippingOp<DimId, XprType> >\n{\n public:\n typedef typename Eigen::internal::traits<TensorChippingOp>::Scalar Scalar;\n typedef typename Eigen::NumTraits<Scalar>::Real RealScalar;\n typedef typename XprType::CoeffReturnType CoeffReturnType;\n typedef typename Eigen::internal::nested<TensorChippingOp>::type Nested;\n typedef typename Eigen::internal::traits<TensorChippingOp>::StorageKind StorageKind;\n typedef typename Eigen::internal::traits<TensorChippingOp>::Index Index;\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE TensorChippingOp(const XprType& expr, const Index offset, const Index dim)\n : m_xpr(expr), m_offset(offset), m_dim(dim) {\n }\n\n EIGEN_DEVICE_FUNC\n const Index offset() const { return m_offset; }\n EIGEN_DEVICE_FUNC\n const Index dim() const { return m_dim.actualDim(); }\n\n EIGEN_DEVICE_FUNC\n const typename internal::remove_all<typename XprType::Nested>::type&\n expression() const { return m_xpr; }\n\n EIGEN_DEVICE_FUNC\n EIGEN_STRONG_INLINE TensorChippingOp& operator = (const TensorChippingOp& other)\n {\n typedef TensorAssignOp<TensorChippingOp, const TensorChippingOp> Assign;\n Assign assign(*this, other);\n internal::TensorExecutor<const Assign, DefaultDevice>::run(assign, DefaultDevice());\n return *this;\n }\n\n template<typename OtherDerived>\n EIGEN_DEVICE_FUNC\n EIGEN_STRONG_INLINE TensorChippingOp& operator = (const OtherDerived& other)\n {\n typedef TensorAssignOp<TensorChippingOp, const OtherDerived> Assign;\n Assign assign(*this, other);\n internal::TensorExecutor<const Assign, DefaultDevice>::run(assign, DefaultDevice());\n return *this;\n }\n\n protected:\n typename XprType::Nested m_xpr;\n const Index m_offset;\n const internal::DimensionId<DimId> m_dim;\n};\n\n\n// Eval as rvalue\ntemplate<DenseIndex DimId, typename ArgType, typename Device>\nstruct TensorEvaluator<const TensorChippingOp<DimId, ArgType>, Device>\n{\n typedef TensorChippingOp<DimId, ArgType> XprType;\n static const int NumInputDims = internal::array_size<typename TensorEvaluator<ArgType, Device>::Dimensions>::value;\n static const int NumDims = NumInputDims-1;\n typedef typename XprType::Index Index;\n typedef DSizes<Index, NumDims> Dimensions;\n typedef typename XprType::Scalar Scalar;\n typedef typename XprType::CoeffReturnType CoeffReturnType;\n typedef typename PacketType<CoeffReturnType, Device>::type PacketReturnType;\n static const int PacketSize = internal::unpacket_traits<PacketReturnType>::size;\n\n\n enum {\n // Alignment can't be guaranteed at compile time since it depends on the\n // slice offsets.", "\n IsAligned = false,\n PacketAccess = TensorEvaluator<ArgType, Device>::PacketAccess,\n Layout = TensorEvaluator<ArgType, Device>::Layout,\n CoordAccess = false, // to be implemented\n RawAccess = false\n };\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE TensorEvaluator(const XprType& op, const Device& device)\n : m_impl(op.expression(), device), m_dim(op.dim()), m_device(device)\n {\n EIGEN_STATIC_ASSERT((NumInputDims >= 1), YOU_MADE_A_PROGRAMMING_MISTAKE);\n eigen_assert(NumInputDims > m_dim.actualDim());\n\n const typename TensorEvaluator<ArgType, Device>::Dimensions& input_dims = m_impl.dimensions();\n eigen_assert(op.offset() < input_dims[m_dim.actualDim()]);\n\n int j = 0;\n for (int i = 0; i < NumInputDims; ++i) {\n if (i !", "= m_dim.actualDim()) {\n m_dimensions[j] = input_dims[i];\n ++j;\n }\n }\n\n m_stride = 1;\n m_inputStride = 1;\n if (static_cast<int>(Layout) == static_cast<int>(ColMajor)) {\n for (int i = 0; i < m_dim.actualDim(); ++i) {\n m_stride *= input_dims[i];\n m_inputStride *= input_dims[i];\n }\n } else {\n for (int i = NumInputDims-1; i > m_dim.actualDim(); --i) {\n m_stride *= input_dims[i];\n m_inputStride *= input_dims[i];\n }\n }\n m_inputStride *= input_dims[m_dim.actualDim()];\n m_inputOffset = m_stride * op.offset();\n }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE const Dimensions& dimensions() const { return m_dimensions; }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE bool evalSubExprsIfNeeded(Scalar* /*data*/) {\n m_impl.evalSubExprsIfNeeded(NULL);\n return true;\n }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE void cleanup() {\n m_impl.cleanup();\n }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE CoeffReturnType coeff(Index index) const\n {\n return m_impl.coeff(srcCoeff(index));\n }\n\n template<int LoadMode>\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE PacketReturnType packet(Index index) const\n {\n EIGEN_STATIC_ASSERT((PacketSize > 1), YOU_MADE_A_PROGRAMMING_MISTAKE)\n eigen_assert(index+PacketSize-1 < dimensions().TotalSize());\n\n if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) && m_dim.actualDim() == 0) ||\n\t(static_cast<int>(Layout) == static_cast<int>(RowMajor) && m_dim.actualDim() == NumInputDims-1)) {\n // m_stride is equal to 1, so let's avoid the integer division.", "\n eigen_assert(m_stride == 1);\n Index inputIndex = index * m_inputStride + m_inputOffset;\n EIGEN_ALIGN_MAX typename internal::remove_const<CoeffReturnType>::type values[PacketSize];\n for (int i = 0; i < PacketSize; ++i) {\n values[i] = m_impl.coeff(inputIndex);\n inputIndex += m_inputStride;\n }\n PacketReturnType rslt = internal::pload<PacketReturnType>(values);\n return rslt;\n } else if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) && m_dim.actualDim() == NumInputDims - 1) ||\n\t (static_cast<int>(Layout) == static_cast<int>(RowMajor) && m_dim.actualDim() == 0)) {\n // m_stride is aways greater than index, so let's avoid the integer division.", "\n eigen_assert(m_stride > index);\n return m_impl.template packet<LoadMode>(index + m_inputOffset);\n } else {\n const Index idx = index / m_stride;\n const Index rem = index - idx * m_stride;\n if (rem + PacketSize <= m_stride) {\n Index inputIndex = idx * m_inputStride + m_inputOffset + rem;\n return m_impl.template packet<LoadMode>(inputIndex);\n } else {\n // Cross the stride boundary. ", "Fallback to slow path.", "\n EIGEN_ALIGN_MAX typename internal::remove_const<CoeffReturnType>::type values[PacketSize];\n for (int i = 0; i < PacketSize; ++i) {\n values[i] = coeff(index);\n ++index;\n }\n PacketReturnType rslt = internal::pload<PacketReturnType>(values);\n return rslt;\n }\n }\n }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE TensorOpCost\n costPerCoeff(bool vectorized) const {\n double cost = 0;\n if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) &&\n m_dim.actualDim() == 0) ||\n (static_cast<int>(Layout) == static_cast<int>(RowMajor) &&\n m_dim.actualDim() == NumInputDims - 1)) {\n cost += TensorOpCost::MulCost<Index>() + TensorOpCost::AddCost<Index>();\n } else if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) &&\n m_dim.actualDim() == NumInputDims - 1) ||\n (static_cast<int>(Layout) == static_cast<int>(RowMajor) &&\n m_dim.actualDim() == 0)) {\n cost += TensorOpCost::AddCost<Index>();\n } else {\n cost += 3 * TensorOpCost::MulCost<Index>() + TensorOpCost::DivCost<Index>() +\n 3 * TensorOpCost::AddCost<Index>();\n }\n\n return m_impl.costPerCoeff(vectorized) +\n TensorOpCost(0, 0, cost, vectorized, PacketSize);\n }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE CoeffReturnType* data() const {\n CoeffReturnType* result = const_cast<CoeffReturnType*>(m_impl.data());\n if (((static_cast<int>(Layout) == static_cast<int>(ColMajor) && m_dim.actualDim() == NumDims) ||\n (static_cast<int>(Layout) == static_cast<int>(RowMajor) && m_dim.actualDim() == 0)) &&\n result) {\n return result + m_inputOffset;\n } else {\n return NULL;\n }\n }\n\n protected:\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE Index srcCoeff(Index index) const\n {\n Index inputIndex;\n if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) && m_dim.actualDim() == 0) ||\n\t(static_cast<int>(Layout) == static_cast<int>(RowMajor) && m_dim.actualDim() == NumInputDims-1)) {\n // m_stride is equal to 1, so let's avoid the integer division.", "\n eigen_assert(m_stride == 1);\n inputIndex = index * m_inputStride + m_inputOffset;\n } else if ((static_cast<int>(Layout) == static_cast<int>(ColMajor) && m_dim.actualDim() == NumInputDims-1) ||\n\t (static_cast<int>(Layout) == static_cast<int>(RowMajor) && m_dim.actualDim() == 0)) {\n // m_stride is aways greater than index, so let's avoid the integer division.", "\n eigen_assert(m_stride > index);\n inputIndex = index + m_inputOffset;\n } else {\n const Index idx = index / m_stride;\n inputIndex = idx * m_inputStride + m_inputOffset;\n index -= idx * m_stride;\n inputIndex += index;\n }\n return inputIndex;\n }\n\n Dimensions m_dimensions;\n Index m_stride;\n Index m_inputOffset;\n Index m_inputStride;\n TensorEvaluator<ArgType, Device> m_impl;\n const internal::DimensionId<DimId> m_dim;\n const Device& m_device;\n};\n\n\n// Eval as lvalue\ntemplate<DenseIndex DimId, typename ArgType, typename Device>\nstruct TensorEvaluator<TensorChippingOp<DimId, ArgType>, Device>\n : public TensorEvaluator<const TensorChippingOp<DimId, ArgType>, Device>\n{\n typedef TensorEvaluator<const TensorChippingOp<DimId, ArgType>, Device> Base;\n typedef TensorChippingOp<DimId, ArgType> XprType;\n static const int NumInputDims = internal::array_size<typename TensorEvaluator<ArgType, Device>::Dimensions>::value;\n static const int NumDims = NumInputDims-1;\n typedef typename XprType::Index Index;\n typedef DSizes<Index, NumDims> Dimensions;\n typedef typename XprType::Scalar Scalar;\n typedef typename XprType::CoeffReturnType CoeffReturnType;\n typedef typename PacketType<CoeffReturnType, Device>::type PacketReturnType;\n static const int PacketSize = internal::unpacket_traits<PacketReturnType>::size;\n\n enum {\n IsAligned = false,\n PacketAccess = TensorEvaluator<ArgType, Device>::PacketAccess,\n RawAccess = false\n };\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE TensorEvaluator(const XprType& op, const Device& device)\n : Base(op, device)\n { }\n\n EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE CoeffReturnType& coeffRef(Index index)\n {\n return this->m_impl.coeffRef(this->srcCoeff(index));\n }\n\n template <int StoreMode> EIGEN_DEVICE_FUNC EIGEN_STRONG_INLINE\n void writePacket(Index index, const PacketReturnType& x)\n {\n EIGEN_STATIC_ASSERT((PacketSize > 1), YOU_MADE_A_PROGRAMMING_MISTAKE)\n\n if ((static_cast<int>(this->Layout) == static_cast<int>(ColMajor) && this->m_dim.actualDim() == 0) ||\n\t(static_cast<int>(this->Layout) == static_cast<int>(RowMajor) && this->m_dim.actualDim() == NumInputDims-1)) {\n // m_stride is equal to 1, so let's avoid the integer division.", "\n eigen_assert(this->m_stride == 1);\n EIGEN_ALIGN_MAX typename internal::remove_const<CoeffReturnType>::type values[PacketSize];\n internal::pstore<CoeffReturnType, PacketReturnType>(values, x);\n Index inputIndex = index * this->m_inputStride + this->m_inputOffset;\n for (int i = 0; i < PacketSize; ++i) {\n this->m_impl.coeffRef(inputIndex) = values[i];\n inputIndex += this->m_inputStride;\n }\n } else if ((static_cast<int>(this->Layout) == static_cast<int>(ColMajor) && this->m_dim.actualDim() == NumInputDims-1) ||\n\t (static_cast<int>(this->Layout) == static_cast<int>(RowMajor) && this->m_dim.actualDim() == 0)) {\n // m_stride is aways greater than index, so let's avoid the integer division.", "\n eigen_assert(this->m_stride > index);\n this->m_impl.template writePacket<StoreMode>(index + this->m_inputOffset, x);\n } else {\n const Index idx = index / this->m_stride;\n const Index rem = index - idx * this->m_stride;\n if (rem + PacketSize <= this->m_stride) {\n const Index inputIndex = idx * this->m_inputStride + this->m_inputOffset + rem;\n this->m_impl.template writePacket<StoreMode>(inputIndex, x);\n } else {\n // Cross stride boundary. ", "Fallback to slow path.", "\n EIGEN_ALIGN_MAX typename internal::remove_const<CoeffReturnType>::type values[PacketSize];\n internal::pstore<CoeffReturnType, PacketReturnType>(values, x);\n for (int i = 0; i < PacketSize; ++i) {\n this->coeffRef(index) = values[i];\n ++index;\n }\n }\n }\n }\n};\n\n\n} // end namespace Eigen\n\n#endif // EIGEN_CXX11_TENSOR_TENSOR_CHIPPING_H\n" ]
{ "pile_set_name": "Github" }
[ 0.0007133423932828009, 0.0007005227962508798, 0.000908784510102123, 0.004682949278503656, 0.003200763836503029, 0.010404856875538826, 0.00119169766549021, 0.0011047902517020702, 0.0008422717801295221, 0.0022842567414045334, 0.0009851312497630715, 0.002497423905879259, 0.001443773042410612, 0.0015523199690505862, 0.0008422717801295221, 0.0009282924584113061 ]
0.002143
16
[ "Karting Nation Karting Swindon, Wiltshire the best Karting circuit in Wiltshire, South West England. ", "With its ideal location Karting Swindon, Wiltshire offers easy transport access to the surrounding Wiltshire region. ", "Whats more with Karting package prices starting at just £17.50 you wount find a better price.", "\n\nKarting Nation Karting Swindon, Wiltshire offers a wide range of Karting packages and events suitable for all age groups, including children. ", "If you are planning a Karting kids party, birthday party, stag party, hen party or corporate event in Wiltshire South West England, then look no further than Karting Nation Karting Swindon, Wiltshire.", "\n\nKarting Swindon, Wiltshire is one of the premier Wiltshire South West England Karting circuits, with full public liability insurance and risk assessment. ", "Karting Nation ensure that your Karting event is handled efficiently and with the minimum of delay so you can just look forward to a fun filled day.", "\n\nWelcome to the premier Karting circuit in Swindon, Wiltshire & the South West England.", "\n\nINDOOR CIRCUIT Karting doesn't come any faster or any more thrilling than at this brilliant circuit. ", "The indoor 530m tarmac circuit offers drivers some of the most exhilarating bends and speed friendly stra...\n\nSituated in the heart of Wiltshire and close to both Swindon and Devizes, our cracking circuit is easy to reach from all over the South West and we have good transport links courtesy of our proximity..." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000836855499073863, 0.0005724906804971397, 0.0010268116602674127, 0.0011289077810943127, 0.0013920696219429374, 0.0008291118429042399, 0.0006544383359141648, 0.000698466319590807, 0.0010217343224212527, 0.0006098452722653747 ]
0.000877
10
[ "Q:\n\nShowing that a Matrix is Nonsingular\n\nLet $n$ be a positive integer and let $F$ be a field. ", "Let $A \\in M_{n×n}(F )$ be a matrix for which there exists a matrix $ B \\in M_{n×n}(F )$ satisfying $I + A + AB = O$. Show that $A$ is nonsingular.", "\nSince $I + A + AB = O$, we can get\n$$I+A(I+B)=0$$\n$$A[-(I+B)]=I$$\nI know it seems $-(I+B)$ is the inverse of $A$, however, I am not sure how to get\n$-(I+B)A=I$. I may choose a wrong way to solve this problem. ", "I am really stuck with this question.", "\n\nA:\n\n\\begin{align*} I_n + A + AB & = O \\\\\nI_n + A(I_n + B) & = O \\\\\nA(I_n + B) & = -I_n.", "\n\\end{align*} Take determinant of both sides gives $$\\text{det}(A)\\text{det}(I_n+B) = (-1)^n,$$ hence $\\text{det}(A)$ is non-zero and $A$ is invertible.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0024040979333221912, 0.01266211736947298, 0.002280961023643613, 0.0007275216048583388, 0.061467815190553665, 0.0020822295919060707, 0.001995444530621171 ]
0.011946
7
[ "Permanent Australian visa for Hobart teenager delayed\n\nVisa Bureau is not affiliated with the Australian Government but is an independent UK company. ", "Australian visas are available from the Australian Government at a lower cost or for free when you apply directly. ", "Our comprehensive visa and immigration services include immigration advice from registered migration agents, a 100% success rate, document checking and expedited visa processing.", "\n\nThe permanent Australian visa case for Buddhaholy Siu will not be reviewed by the Immigration Minister Chris Evans just yet, reports The Mercury.", "\n\nThe 13-year-old had his permanent Australian visa application rejected by the Department of Immigration and Citizenship (DIAC) last year because he does not satisfy the requirements needed to obtain Australian residency.", "\n\nWhile the teenager applied for a permanent Australian visa last year, his case is still waiting intervention from Senator Evans to review his case as an exceptional circumstance. ", "Despite being born in Hobart, Buddhaholy was moved to Canada by his mother before he could obtain his Australian citizenship. ", "He was subsequently returned to Australia to be put under the care of a Buddhist leader in Hobart, Master Wang Xin-De.", "\n\nUnder Australian immigration law, Buddhaholy needs an Australian citizen, permanent Australian visa holder or eligible New Zealand citizen to sponsor him for an Australian child visa. ", "As Master Wang is legally Buddhaholy's guardian but is not his natural, step or adoptive parent, he cannot sponsor him for the Australian child visa.", "\n\nA DIAC spokesperson has said the Minister is waiting for advice from a Tasmanian welfare authority before making a judgment on Buddhaholy's case.", "\n\nThe Australian Visa Bureau is an independent consulting company specialising in helping people with emigrating to Australia." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005842655664309859, 0.0005414139595814049, 0.0005420836969278753, 0.0005767176044173539, 0.0009017178090289235, 0.0005352331208996475, 0.000904716900549829, 0.0010076641337946057, 0.0007180321263149381, 0.0009924826445057988, 0.0006822697469033301, 0.0005648674559779465 ]
0.000713
12
[ "Why do we need to Think Pink?", "\n\nSouth Africa’s Favorite Cricket Event for a Cause is back!#PitchUpinPick for PinkDay 2019\n\nOne of most the most anticipated events on South Africa’s cricketing calendar is back! ", "Cricket South Africa (CSA), together with Momentum and the Central Gauteng Lions; have announced that the 8th Momentum One Day International (ODI) PinkDay will take place during the third ODI between South Africa and Pakistan on Sunday 27 January 2019, at the Bidvest Wanderers Stadium.", "\n\nThis legendary event, which has become something of an institution in South Africa, is celebrated for reasons far beyond its quirky and fun-filled invitations for cricketers and fans alike to #PitchUpinPink. ", "In 2018 alone, the event raised over R 1.7 million for the critically important work and research being done by The Breast Care Unit at the Charlotte Maxeke Johannesburg Academic Hospital.", "\n\nAccording to Carel Bosman, Head of Sponsorships at Momentum, the 2019 event is set to see the biggest and most successful PinkDay ever. “", "We have our sights set on raising R 5 million this time around, if we can get all South Africans involved. ", "The money raised goes to an incredibly heartfelt cause that touches most of us at some point in our lives. ", "Together with our ‘Partners in Pink’, we appeal to the public to get behind this worthy cause and ‘Pitch up in Pink’. ", "We believe that collectively we can make a difference in the fight against Breast Cancer.”", "\n\nEvery rand raised from PinkDay will go towards supporting hundreds, possibly even thousands, of women and men with breast cancer, by offering significant support to the team at Charlotte Maxeke Johannesburg Academic Hospital’s Breast Care Unit. ", "The unit, run by Doctor Sarah Nietz and her team of dedicated specialist nurses, provides access to quality breast care, regardless of geographical location and socio-economic status. ", "The unit sees up to 350 women with newly diagnosed breast cancer every year and provide a service to seven district hospitals. ", "Patients from other provinces and all over Africa are also accommodated.", "\n\nEvent hosts, Cricket South Africa (CSA), Momentum and the Central Gauteng Lions are pulling out all the stops to make sure that the objective of increasing Breast Cancer awareness is met and that more money than ever before will be raised for the nominated hospital. ", "Central Gauteng Lions as founding partners to this event has also, again, pledged their support.", "\n\n“The PinkDay international has become our marque event and we are very excited to be associated with this amazing activity in support of Breast Cancer awareness. ", "The Central Gauteng Lions will be going the extra mile to support the 2019 campaign, with many exciting activations scheduled to take place at the Bidvest Wanderers Stadium,” says Greg Fredericks, CEO of Central Gauteng Lions.", "\n\n“Over the years, PinkDay has helped us as CSA to showcase our support for the greater cause,” says Thabang Moroe, CEO of CSA. “", "We compete with teams from all over the globe. ", "But in the world of breast cancer, in the world of cancer, this unites us and it really makes a difference. ", "Being entirely together, it’s really taught us a lot from the very beginning with our stakeholders, Momentum and Central Gauteng Lions. ", "I’ve been at the Bidvest Wanderers Stadium for most of the PinkDay encounters and people put pink ribbons [on] and say to me, ‘This is for my family member.’ ", "It’s powerful. ", "It’s certainly made a difference. ", "We as CSA are so proud and we’re not finished, but we certainly have taken it to a great level, and may it long continue to change lives of the broader South African public.”", "\n\nAs tickets to the PinkDay ODI will sell out quickly, supporters are encouraged to secure theirs as soon as possible. ", "Tickets will be available from 26 November 2018 from www.Ticketpros.co.za.", "\n\nPledge your support in 2019 and #PitchUpInPink. ", "Visit www.PinkDay.co.za for more information.", "\n\nSignup to our newsletter\n\nInstagram\n\nThis error message is only visible to WordPress admins\n\nError: No connected account.", "\n\nPlease go to the Instagram Feed settings page to connect an account.", "\n\nSearch:\n\nCOPYRIGHT South Africa - The Good News. ", "All rights strictly reserved.", "\nThe views expressed on this website are those of www.sagoodnews.co.za and do not necessarily reflect the views of our sponsors.", "\nNo part of this website may be reproduced or transmitted in any form or by any means, electronic, or mechanical, or recording or stored in any retrieval system, without the written permission of the editor. ", "However, direct links to the site or articles may be used. ", "Should your company, or organisation wish to re-use or re-publish any content, contact the editor: contact@sagoodnews.co.za" ]
{ "pile_set_name": "Pile-CC" }
[ 0.17783106863498688, 0.0017840848304331303, 0.0006735011120326817, 0.0006915866397321224, 0.000598628306761384, 0.0007245356682687998, 0.0016135390615090728, 0.000562130706384778, 0.032293450087308884, 0.0025945170782506466, 0.003926462028175592, 0.0008570273057557642, 0.010911030694842339, 0.0005691566038876772, 0.000739948998671025, 0.0006563281058333814, 0.0010938767809420824, 0.0007634403300471604, 0.0008638259605504572, 0.0008465261198580265, 0.00637521967291832, 0.0008769834530539811, 0.0007027454557828605, 0.0011108688777312636, 0.0006750960601493716, 0.0005838325014337897, 0.000774240237660706, 0.0006119722384028137, 0.000710544700268656, 0.0006918292492628098, 0.0008940089028328657, 0.0005630908417515457, 0.0006394480005837977, 0.0006091858958825469, 0.0005776847247034311, 0.0006557347369380295, 0.0005559039418585598, 0.0006704735569655895 ]
0.006812
38
[ "Q:\n\nhow to revalue some row of a column with respect of another column?", "\n\nI have 2 columns in a matrix\n a1 a2\n 1 3\n NA 3\n 8 4\n NA 2\n NA 1\n\nI want to put the value of a1 to a2 wherever it is not NA.", "\noutput:\n a1 a2\n 1 1\n NA 3\n 8 8\n NA 2\n NA 1\n\nA:\n\nThe fastest (and in my opinion, simplest) way would be to use simple subsetting. ", "However, I'll also give the ifelse way of doing it in base r and data.table (which can be more memory efficient) as well.", "\nlibrary(microbenchmark)\nlibrary(data.table)\n\nsubset_method <- function(mat) {\n mat[!is.na(mat[,'a1']), 'a2'] <- mat[!is.na(mat[,'a1']), 'a1']\n return(mat)\n}\n\nifelse_method <- function(mat) {\n mat[,'a2'] <- ifelse(is.na(mat[,'a1']), mat[,'a2'], mat[,'a1'])\n return(mat)\n}\n\ndt_sub_method <- function(dt) {\n d <- copy(dt)\n d[!is.na(a1), a2 := a1][]\n}\n\ndt_ie_method <- function(dt) {\n d <- copy(dt)\n d[, a2 := ifelse(is.na(a1), a2, a1)][]\n}\n\nset.seed(1234)\nn = 1e4\nmat <- matrix(rpois(2*n, 3), ncol = 2)\ncolnames(mat) <- c('a1', 'a2')\ninds <- sample(1:n, floor(.25*n))\nmat[inds, 1] <- NA\ndt <- data.table(mat)\n\nhead(mat, 10)\n#> a1 a2\n#> [1,] 1 2\n#> [2,] 3 3\n#> [3,] 3 3\n#> [4,] 3 6\n#> [5,] 5 1\n#> [6,] 3 2\n#> [7,] 0 2\n#> [8,] 2 1\n#> [9,] 4 2\n#> [10,] 3 3\nret <- subset_method(mat)\nhead(ret, 10)\n#> a1 a2\n#> [1,] 1 1\n#> [2,] 3 3\n#> [3,] 3 3\n#> [4,] 3 3\n#> [5,] 5 5\n#> [6,] 3 3\n#> [7,] 0 0\n#> [8,] 2 2\n#> [9,] 4 4\n#> [10,] 3 3\ntimes <- microbenchmark(subset_method(mat), ifelse_method(mat), \n dt_sub_method(dt), dt_ie_method(dt))\ntimes\n#> Unit: microseconds\n#> expr min lq mean median uq max\n#> subset_method(mat) 157.401 169.1010 249.3690 174.9015 279.3505 3402.801\n#> ifelse_method(mat) 237.500 247.2510 361.2280 260.7010 446.9510 3219.001\n#> dt_sub_method(dt) 656.601 785.0015 927.3231 840.8010 901.7510 6646.801\n#> dt_ie_method(dt) 493.701 546.2515 698.5841 577.6515 725.6015 3532.701\n#> neval\n#> 100\n#> 100\n#> 100\n#> 100\n\nCreated on 2019-09-17 by the reprex package (v0.3.0)\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008002895046956837, 0.0006291682366281748, 0.0006830396596342325, 0.0005994638777337968, 0.0027287898119539022 ]
0.001088
5
[ "21 Server Security Tips to Secure Your Server\n\nHackers are always on the lookout for server vulnerabilities. ", "It is your responsibility to ensure your data is safe and secure.", "\n\nMinimize risks and be confident your data is safe on secure servers by implementing our server security tips and best practices.", "\n\nSecure Server Connectivity\n\n1. ", "Establish and Use a Secure Connection\n\nWhen connecting to a remote server, it is essential to provide a secure channel for communication.", "\n\nUsing the SSH (Secure Shell) Protocol is the best way to establish a protected connection. ", "Unlike the previously used Telnet, SSH access encrypts all the data transmitted in the exchange.", "\n\nYou need to install the SSH Daemon and to have an SSH Client with which you issue commands and manage servers to gain remote access using the SSH protocol.", "\n\nBy default, SSH uses port 22. ", "Everyone, including hackers, knows this. ", "Most people do not configure this seemingly insignificant detail. ", "However, changing the port number is an easy way to reduce the chances of hackers attacking your server. ", "Therefore, the best practice for SSH is to use port numbers between 1024 and 32,767.", "\n\n2. ", "Use SSH Keys Authentication\n\nInstead of a password, you can authenticate an SSH server using a pair of SSH keys, a better alternative to traditional logins. ", "The keys carry many more bits than a password and are uncrackable by most modern computers. ", "The popular RSA 2048-bit encryption is equivalent to a 617-digit password.", "\n\nThe key pair consists of a public key and a private key.", "\n\nThe public key has several copies, one of which remains on the server, while others are shared with users. ", "Anyone that has the public key has the power to encrypt data, while only the user with the corresponding private key can read this data. ", "The private key is not shared with anyone and must be kept secure. ", "When establishing a connection, the server asks for evidence that the user has the private key, before allowing privileged access.", "\n\n3. ", "Secure File Transfer Protocol\n\nTo transfer files to and from a server without danger of hackers compromising or stealing data it is vital to use File Transfer Protocol Secure (FTPS) such as FileZilla. ", "It encrypts data files and your authentication information.", "\n\nFTPS uses both a command channel and a data channel, and the user can encrypt both. ", "Bear in mind that it only protects the files during transfer. ", "As soon as they reach the server, the data is no longer encrypted. ", "For this reason, encrypting the files before sending them adds another layer of security.", "\n\n4. ", "Secure Sockets Layer Certificates\n\nSecure your web administration areas and forms with Secure Socket Layer (SSL) that guards’ information passed between two systems via the internet. ", "SSL can be used both in server-client and in server-server communication.", "\n\nThe program scrambles data so that sensitive information (such as names, ID, credit card numbers, and other personal information) is not stolen in transit. ", "Websites that have the SSL certificate have HTTPS in the URL, indicating they are secure.", "\n\nNot only does the certificate encrypt data, but it is also used for user authentication. ", "Therefore, by managing certificates for your servers, it helps establish user authority. ", "Administrators can configure servers to communicate with centralized authority and any other certificate that the authority signs.", "\n\n5. ", "Use Private Networks and VPNs\n\nAnother way to ensure secure communication is to use private and virtual private networks (VPNs), such as OpenVPN. ", "Unlike open networks which are accessible to the outside world and therefore susceptible to attacks from malicious users, private and virtual private networks restrict access to selected users.", "\n\nPrivate networks use a private IP to establish isolated communication channels between servers within the same range. ", "This allows multiple servers under the same account to exchange information and data without exposure to a public space.", "\n\nWhen you want to connect to a remote server as if doing it locally through a private network, use a VPN, such as OpenVPN. ", "It enables an entirely secure and private connection and can encompass multiple remote servers. ", "For the servers to communicate under the same VPN, they must share security and configuration data.", "\n\nServer User Management\n\n6. ", "Monitor Login Attempts\n\nUsing intrusion prevention software to monitor login attempts is a way to protect your server against brute force attacks. ", "These automated attacks use a trial-and-error method, attempting every possible combination of letters and numbers to gain access to the system.", "\n\nIntrusion prevention software oversees all log files and detects if there are suspicious login attempts. ", "If the number of attempts exceeds the set norm, intrusion prevention software blocks the IP address for a certain period or even indefinitely.", "\n\n7. ", "Manage Users\n\nEvery server has a root user who can execute any command. ", "Because of the power it has, the root can be very hazardous to your server if it falls into the wrong hands. ", "It is widespread practice to disable the root login in SSH altogether. ", "Since the root user has the most power, hackers focus their attention on trying to crack the password of that specific user. ", "If you decide to disable this user entirely, you will put attackers in a significant disadvantage and save your server from potential threats.", "\n\nTo ensure outsiders do not misuse root privileges, you can create a limited user account. ", "This account does not have the same authority as the root but is still able to perform administrative tasks using sudo commands.", "\n\nTherefore, you can administer most of the tasks as the limited user account and use the root account only when necessary.", "\n\nServer Password Security\n\n8. ", "Establish Password Requirements\n\nThe first thing is to set password requirements and rules that must be followed by all members on the server.", "\n\nDo not allow empty or default passwords. ", "Enforce minimum password length and complexity. ", "Have a lockout policy. ", "Do not store passwords using reversible encryption. ", "Force session timeout for inactivity & enable two-factor authentication.", "\n\n9. ", "Set Password Expiration Policy\n\nSetting an expiration date for a password is another routine practice when establishing requirements for users. ", "Depending on the level of security required, a password may last a couple of weeks or a couple of months.", "\n\n10. ", "Use Passphrases For Server Passwords\n\nThere are several reasons why using a passphrase rather than a password can help elevate server security. ", "The main difference between the two is that a passphrase is longer and contains spaces between the words. ", "Therefore, it is often a sentence, but it does not have to be one.", "\n\nFor example, a password passphrase may be: Ilove!ToEatPizzaAt1676MainSt.", "\n\nThe given example is longer than a usual password, and it contains upper and lowers case letters, numbers, and unique characters.", "\n\nFurthermore, it is much easier to remember a passphrase than a string of random letters. ", "Finally, since it consists of 49 characters, it is more difficult to crack.", "\n\n11. ", "Password Don’ts\n\nIf you want to maintain a secure server, there are a few things you want to avoid when it comes to passwords. ", "Firstly, be mindful where you store passwords. ", "Do not write them on pieces of paper and hide them around the office.", "\n\nIt is generally advisable not to use personal information like your birthday, hometown, pet names and other things that can connect you, the user, to the password. ", "These are extremely easy to guess, especially by people who know you personally.", "\n\nPasswords that only contain simple dictionary words are also easy to crack, especially by dictionary (brute force) attacks. ", "Mindful of the same risk, try to avoid repeating sequences of characters in the same password.", "\n\nFinally, do not use the same password for multiple accounts. ", "By recycling passwords, you put yourself at significant risk. ", "If a hacker manages to get access to a single account, all other accounts with the same password may be in danger. ", "Try to use a different password for every separate account and keep track of them using a password manager such as KeePass.", "\n\nOther Best Practices To Secure a Server\n\n12. ", "Update and upgrade software regularly\n\nRegularly updating the software on a server is a crucial step in keeping it safe from hackers. ", "Outdated software has already been explored for its weak points, leaving it open for hackers to take advantage of these and harm your system. ", "If you keep everything up-to-date, you ensure that it is updated to protect itself in the first line of defense.", "\n\nAutomatic updates are one way to guarantee that no updates are forgotten. ", "However, allowing the system to make such changes on its own may be risky. ", "Before updating your production environment, it is good practice to examine how the update performs in a test environment.", "\n\nMake sure to update the server control panel routinely. ", "You also need to regularly update content management systems, if you use one, as well as any plugins it may have. ", "Each new release includes security patches to fix known security issues.", "\n\n13. ", "Remove or Turn Off All Unnecessary Services\n\nIncrease server security by reducing the so-called attack vector.", "\n\nThis cybersecurity term refers to installing and maintaining only the bare minimum requirements needed to keep your services running. ", "Just enable the network ports used by the OS and installed components. ", "The less you have on the system, the better.", "\n\nA Windows OS server should only have required operating system components. ", "A Linux operating system server should have a minimal installation with only the needed programs installed.", "\n\nSince most Linux distributions listen for incoming connections on the internet, you want to configure a firewall to allow only specific ports and deny all other unnecessary communication.", "\n\nCheck for dependencies before installing software on your system to ensure you are not adding anything you do not need. ", "Additionally, inspect which dependencies were auto-started on your system and whether you want them there.", "\n\n14. ", "Hide Server Information\n\nTry to provide as little information about the underlying infrastructure as possible. ", "The less is known about the server, the better.", "\n\nAlso, it is a good idea to hide the version numbers of any software you have installed on the server. ", "Often they reveal, by default, the exact release date which can aid hackers when searching for weaknesses. ", "It is usually simple to remove this information by deleting it from the HTTP header of its greeting banner.", "\n\n15. ", "Use Intrusion Detection Systems\n\nTo detect any unauthorized activities, use an intrusion detection system (IDS) which monitors processes running on your server. ", "You may set it to check day-to-day operations, run periodical automated scans, or decide to run the IDS manually.", "\n\n16. ", "File Auditing\n\nFile auditing is another good way to discover unwanted changes on your system.", "\n\nIt is keeping a record of all the characteristics of your system when it is in a good, “healthy,” state and comparing it to the current state. ", "By comparing the two versions of the same system side to side, you can detect all the inconsistencies and track their origin.", "\n\n17. ", "Service Auditing\n\nService auditing explores what services are running on the server, their protocols, and which ports they are communicating through. ", "Being aware of these specifics helps configure attack surfaces in the system.", "\n\n18. ", "Set Up and Maintain a Firewall\n\nUsing CSF (ConfigServer and Firewall) is essential in tightening up security on your server. ", "It allows only specific vital connections, locking down access to other services.", "\n\nSet up a firewall during the initial server setup or when you make changes to the services the server offers. ", "By default, a typical server runs different services including public, private and internal services.", "\n\nPublic services are generally run by web servers that need to allow access to a website. ", "Anyone can access these services, often anonymously, over the internet.", "\n\nPrivate services are used when dealing with a database control panel, for example. ", "In that case, a number of selected people require access to the same point. ", "They have authorized accounts with special privileges inside the server.", "\n\nInternal services are ones that should never be exposed to the internet or outside world. ", "They are only accessible from within the server and only accept local connections.", "\n\nThe role of the firewall is to allow, restrict & filter access according to the service the user is authorized for. ", "Configure the firewall to restrict all services except those mandatory for your server.", "\n\n19. ", "Back Up Your Server\n\nAlthough the previously mentioned steps are designed to protect your server data, it is crucial to have a backup of the system in case something goes wrong.", "\n\nStore encrypted backups of your critical data offsite or use a cloud solution.", "\n\nWhether you have automated backup jobs or do them manually, make sure to make a routine of this precautionary measure. ", "Also, you should test backups, doing comprehensive backup testing. ", "This should include “sanity checks” in which administrators or even end users verify that data recovery is coherent.", "\n\n20. ", "Create Multi-server Environments\n\nIsolation is one of the best types of server protection you can have.", "\n\nFull separation would require having dedicated bare metal servers that do not share any components with other servers. ", "Although this is the easiest to manage and provides the most security, it is also the most expensive.", "\n\nHaving isolated execution environments in a data center allow the so-called Separation of Duties (SoD) and setting server configuration according to the functions the server fulfills.", "\n\n21. ", "Create Virtual Isolated Environments\n\nIf you cannot afford or do not require full isolation with dedicated server components, you can also choose to isolate execution environments.", "\n\nDoing so helps you deal with any security problems that may arise, ensuring other data is not compromised. ", "You can choose between containers (which sit on top of the host OS) or VM virtualization which are much easier to set up.", "\n\nAnother option for virtualized environments in a UNIX operating system is creating chroot jails. ", "Chroot is separating a process from the central operating system’s root directory and allowing it to access only files within its directory tree. ", "However, this is not complete isolation and should be practiced only with other security measures.", "\n\nWrapping up: Securing Your Server\n\nAfter reading this article and following the security recommendations, you should be more confident in your server security.", "\n\nMany of the security measures should be implemented during the initial set up of the server, while others should be part of continuous or periodic maintenance. ", "If your server monitoring is not automated, make sure to design and follow scheduled security checks." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0012391022173687816, 0.0007722004083916545, 0.0005798079073429108, 0.0006965253269299865, 0.0006031126831658185, 0.000670040724799037, 0.000828088610433042, 0.0009178606560453773, 0.0007226149318739772, 0.0008594994433224201, 0.0006103680352680385, 0.002350949216634035, 0.0006234082393348217, 0.001185585861094296, 0.0007678804686293006, 0.0010794525733217597, 0.0007083896198309958, 0.0006494205445051193, 0.0005855823401361704, 0.0007922020158730447, 0.0005811617593280971, 0.0005924298893660307, 0.00117425003554672, 0.0009040655568242073, 0.0008465612190775573, 0.0007207985036075115, 0.0007554074400104582, 0.000697453913744539, 0.0007765778573229909, 0.0012900278670713305, 0.0007290064240805805, 0.000641243124846369, 0.0008739029290154576, 0.0008399815415032208, 0.0007020941120572388, 0.000580103020183742, 0.0009158056927844882, 0.0013671480119228363, 0.0007541339728049934, 0.0010547126876190305, 0.0006166444509290159, 0.0006522278999909759, 0.0007809923845343292, 0.0006389754707925022, 0.0005748834228143096, 0.0007237693062052131, 0.0011705796932801604, 0.0009071718086488545, 0.0007778379949741066, 0.0006948903319425881, 0.0013101339573040605, 0.0007419203757308424, 0.0006622039945796132, 0.001083569135516882, 0.0010602722177281976, 0.0017957250820472836, 0.0007237427635118365, 0.0006986426888033748, 0.000608961854595691, 0.0008263076306320727, 0.000658532022498548, 0.0011506008449941874, 0.0007920291391201317, 0.03434900566935539, 0.0008752095745876431, 0.00057974987430498, 0.00135024543851614, 0.0007241563871502876, 0.0005792044685222208, 0.0011672148248180747, 0.0008157841512002051, 0.0008273901767097414, 0.0006489126244559884, 0.0022042528726160526, 0.0006234029424376786, 0.0007333317189477384, 0.0008201149175874889, 0.0011401979718357325, 0.0010732500813901424, 0.0007045082747936249, 0.0016476457240059972, 0.0006712755421176553, 0.0005936851957812905, 0.0016876284498721361, 0.0011281396728008986, 0.0009636644972488284, 0.0010628934251144528, 0.0008060383843258023, 0.003923885989934206, 0.0006591241690330207, 0.0011922568082809448, 0.005970561411231756, 0.0007655483204871416, 0.000675140880048275, 0.0005729767726734281, 0.0005424240371212363, 0.0005979990237392485, 0.0005770502029918134, 0.000574539415538311, 0.0011604013852775097, 0.0008813769090920687, 0.0006607559625990689, 0.0006206310936249793, 0.0021475201938301325, 0.0006656620535068214, 0.0006038880674168468, 0.0007107116398401558, 0.0006279288209043443, 0.0006230150465853512, 0.0013701459392905235, 0.000711598084308207, 0.000732520071323961, 0.0006232098676264286, 0.0008149263449013233, 0.0006517631118185818, 0.0013238334795460105, 0.0007471363060176373, 0.0006183721125125885, 0.0011094417423009872, 0.0006877714768052101, 0.0005805576802231371, 0.0005736079183407128, 0.001153186080045998, 0.0005605448386631906, 0.0005766774411313236, 0.0012020498979836702, 0.0009110537939704955, 0.0006735553615726531, 0.0009369051549583673, 0.0006067438516765833, 0.0006473612738773227, 0.0005493314820341766, 0.0005827475688420236, 0.0005330730928108096, 0.0005909517058171332, 0.0015133944107219577, 0.0006432805676013231, 0.0008149737259373069, 0.0014193585375323892, 0.0012845105957239866, 0.0008653359836898744, 0.0008715168223716319, 0.0010254941880702972, 0.0006878924905322492, 0.0007077337359078228, 0.0012712616007775068, 0.0006796990637667477, 0.0006722317193634808, 0.0006208896520547569, 0.0005982407601550221, 0.001112641766667366, 0.0006405605236068368, 0.0006519295857287943, 0.0005951185594312847, 0.0008141198777593672, 0.0008930680924095213, 0.0005866370629519224, 0.0005662884213961661, 0.0005341404466889799, 0.0006700679077766836 ]
0.001106
160
[ "53 Shares 0\n\n\n\n53\n\n0\n\n\n\n\n\n\n\nA local source in Nineveh province announced on Wednesday, that an ISIS member beheaded his father because he approved his family’s displacement to Makhmour district in south of Mosul.", "\n\nSharing details the source said, “One ISIS member on Thursday evening beheaded his father at Ghazlani region in western Nineveh. ", "The attack was made as the deceased approved the exodus of his family from Agrarian Reform neighborhood to Makhmour district in south of Mosul. ”", "\n\n“The killer collected a number of his close associates and members of the organization and filmed the entire execution,” further added the source seeking anonymity.", "\n\nFurther reports indicate that a more decisive action shall be cinsidered facing the terrorists as ISIS armed terrorists and al-Qaeda affiliated groups are teaching the younger generations the Wahhabi extremist ideology, not to mention giving them lessons on how to make bombs and use arms.", "\n\nAccording to a report published by The Times, sources reported that ISIS has set up camps for thousands of young boys called “Lion cubs of the Caliphate” by the extremist groups, who are taught to even spy on their parents or even kill them.", "\n\nThe report stated that “ISIS is raising a very serious jihadi generation, kids are growing, learning and teaching what they’ve learnt,” quoting Mohammad Allaw, an activist in the city of Deir Ezzor who uses a pseudonym. ", "The parents, who see their children feeding on extremist thought, find themselves helpless as their children get more involved in the extremist ideology of ISIS.", "\n\nPointing out that 2000 children were attending an ISIS training camp in the city of Mayadin, 25km south of Deir Ezzor, the activist went on to say that “The child becomes more violent and brutal than the ISIS members themselves, as kids are like white paper, where you can write and copy whatever you desire.”", "\n\nThose living under ISIS rule report that the militant group has focused huge resources in the training and indoctrination of children as young as six or seven." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.001046610064804554, 0.001286138198338449, 0.0007463073125109076, 0.0006538074812851846, 0.0016277056420221925, 0.0342240184545517, 0.002511408645659685, 0.005510883405804634, 0.0035177927929908037, 0.0022324889432638884 ]
0.005336
10
[ "Introduction {#jcmm12774-sec-0001}\n============\n\nThe adult articular cartilage has a limited ability for self‐repair [1](#jcmm12774-bib-0001){ref-type=\"ref\"} as a result of the absence of vascularization in this highly specialized tissue. ", "Options to provide reparative cells in sites of cartilage lesions include autologous chondrocyte implantation and marrow‐stimulating techniques to recruit chondroregenerative bone marrow‐derived mesenchymal stem cells (MSCs) [2](#jcmm12774-bib-0002){ref-type=\"ref\"}, [3](#jcmm12774-bib-0003){ref-type=\"ref\"}, [4](#jcmm12774-bib-0004){ref-type=\"ref\"} but the outcome of such procedures do not meet the original hyaline cartilage as the repair tissue is commonly made of a fibrocartilaginous structure (type‐I collagen instead of type‐II collagen proteoglycans) of lesser mechanical quality and that does not integrate with the adjacent, original cartilage [5](#jcmm12774-bib-0005){ref-type=\"ref\"}. ", "A promising approach might be to conveniently supply the lesions with bone marrow concentrates [6](#jcmm12774-bib-0006){ref-type=\"ref\"} composed of chondrogenically competent MSCs (\\~1%) that specifically commit towards the chondrocyte phenotype under adapted treatment conditions among other cell populations (haematopoietic progenitor cells, haematopoietic cells, fibroblasts) [7](#jcmm12774-bib-0007){ref-type=\"ref\"}, [8](#jcmm12774-bib-0008){ref-type=\"ref\"} rather than using isolated progenitors that necessitate more complex steps of preparation and expansion [6](#jcmm12774-bib-0006){ref-type=\"ref\"}. ", "Yet, despite encouraging attempts to treat patients with bone marrow concentrates [9](#jcmm12774-bib-0009){ref-type=\"ref\"}, [10](#jcmm12774-bib-0010){ref-type=\"ref\"}, [11](#jcmm12774-bib-0011){ref-type=\"ref\"}, [12](#jcmm12774-bib-0012){ref-type=\"ref\"}, [13](#jcmm12774-bib-0013){ref-type=\"ref\"}, [14](#jcmm12774-bib-0014){ref-type=\"ref\"}, [15](#jcmm12774-bib-0015){ref-type=\"ref\"}, restoration of the articular cartilage tissue in its full integrity has not been reported to date, showing the urgent need for novel, effective regimens.", "\n\nDirect genetic modification of bone marrow aspirates to overexpress chondrogenic and/or chondroreparative factors may offer improved tools to enhance the healing response in sites of cartilage injury upon local transplantation [16](#jcmm12774-bib-0016){ref-type=\"ref\"}, [17](#jcmm12774-bib-0017){ref-type=\"ref\"}, [18](#jcmm12774-bib-0018){ref-type=\"ref\"}. ", "In marked contrast with the substantial information available on gene transfer to target isolated MSCs, little is known on the possibility to transduce marrow concentrates as a less invasive approach for improved cartilage repair. ", "While various groups reported the ability of adenoviral vectors to mediate gene transfer in rabbit and sheep models [19](#jcmm12774-bib-0019){ref-type=\"ref\"}, [20](#jcmm12774-bib-0020){ref-type=\"ref\"}, [21](#jcmm12774-bib-0021){ref-type=\"ref\"}, showing effective but relatively short‐term transgene (transforming growth factor beta -- TGF‐β, bone morphogenetic protein 2 -- BMP‐2, Indian hedgehog -- IHH) expression levels (some days) at high (10^10^--10^11^) vector doses, we recently tested the potential of applying recombinant vectors derived from the human non‐pathogenic adeno‐associated virus (AAV) to human marrow aspirates in the light of the reduced toxicity and immunogenicity of this vector class that can be maintained over extended periods of time as stable and safe episomes [18](#jcmm12774-bib-0018){ref-type=\"ref\"}. ", "Specifically, we showed that rAAV can achieve elevated (\\~90%) gene transfer efficiencies and durable (125 days) transgene expression at much lower (8 × 10^5^) vector doses in the absence of adverse reactions [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, allowing for enhanced chondrogenic differentiation upon therapeutic gene delivery of the transcription factor SOX9 [22](#jcmm12774-bib-0022){ref-type=\"ref\"} of and insulin‐like growth factor I (IGF‐I) [23](#jcmm12774-bib-0023){ref-type=\"ref\"}.", "\n\nIn this study, we tested the ability of the potent chondrogenic and chondroreparative TGF‐β factor [24](#jcmm12774-bib-0024){ref-type=\"ref\"}, [25](#jcmm12774-bib-0025){ref-type=\"ref\"}, [26](#jcmm12774-bib-0026){ref-type=\"ref\"}, [27](#jcmm12774-bib-0027){ref-type=\"ref\"} to stimulate the biological and chondrogenic activities in human marrow aspirates *via* rAAV gene transfer in the light of our previous findings showing activation of such processes when applying the same vector to isolated hMSCs [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "Our results show that administration of rAAV promotes an effective, significant production of TGF‐β, leading to enhanced levels of proliferation, biosynthesis and chondrogenic differentiation in the aspirates while reducing hypertrophy/terminal differentiation and osteo‐/adipogenic events, showing the value of applying such samples in site of cartilage damage during transplantation protocols.", "\n\nMaterials and methods {#jcmm12774-sec-0002}\n=====================\n\nReagents {#jcmm12774-sec-0003}\n--------\n\nAll reagents were from Sigma‐Aldrich (Munich, Germany), unless otherwise identified. ", "Recombinant TGF‐β (rTGF‐β) was purchased at Peprotech (Hamburg, Germany) and the dimethylmethylene blue dye at Serva (Heidelberg, Germany). ", "The anti‐TGF‐β (V) and anti‐SOX9 (C‐20) antibodies were from Santa Cruz Biotechnology (Heidelberg, Germany), the anti‐type‐II collagen (II‐II6B3) antibody from the NIH Hybridoma Bank (University of Iowa, Ames, USA), the anti‐type‐I collagen (AF‐5610) antibody from Acris (Hiddenhausen, Germany) and the anti‐type‐X collagen (COL‐10) from Sigma‐Aldrich. ", "Biotinylated secondary antibodies and the ABC reagent were obtained from Vector Laboratories (Alexis Deutschland GmbH, Grünberg, Germany). ", "The hTGF‐β Quantikine ELISA was from R&D Systems (Wiesbaden, Germany) and the type‐II, ‐I and ‐X collagen ELISAs from from Antibodies‐Online (Aachen, Germany).", "\n\nPlasmids and rAAV vectors {#jcmm12774-sec-0004}\n-------------------------\n\nAll plasmids are based on the same parental AAV‐2 genomic clone, pSSV9 [29](#jcmm12774-bib-0029){ref-type=\"ref\"}, [30](#jcmm12774-bib-0030){ref-type=\"ref\"}. ", "rAAV‐*lacZ* carries the *lacZ* gene encoding the *Escherichia coli* β‐galactosidase (β‐gal) and rAAV‐hTGF‐β a human TGF beta 1 (hTGF‐β) cDNA fragment (1.2 kb), both under the control of the cytomegalovirus immediate‐early (CMV‐IE) promoter [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}, [28](#jcmm12774-bib-0028){ref-type=\"ref\"}, [31](#jcmm12774-bib-0031){ref-type=\"ref\"}. ", "Conventional (not self‐complementary) rAAV vectors were packaged using the 293 adenovirus‐transformed embryonic kidney cell line. ", "Helper functions were provided by Adenovirus 5 in combination with rep and cap functions of a pAd8 helper plasmid as previously described [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "Purification, dialysis and titration of the vector preparations *via* real‐time PCR were performed, averaging 10^10^ transgene copies/ml with approximately 1/500 functional recombinant viral particles [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}, [28](#jcmm12774-bib-0028){ref-type=\"ref\"}, [31](#jcmm12774-bib-0031){ref-type=\"ref\"}.", "\n\nrAAV‐mediated gene transfer {#jcmm12774-sec-0005}\n---------------------------\n\nBone marrow was aspirated from the distal femurs of patients undergoing total knee arthroplasty (\\~10 ml, *n* = 3). ", "All patients included in the study provided informed consent and the procedures were in accordance with the Helsinki Declaration. ", "The study was approved by the Ethics Committee of the Saarland Physicians Council (Application 06/08). ", "Aspirates were immediately aliquoted in a volume of 100 μl per well in 96‐well plates and transduced with 40 μl vector (*i.e*. ", "8 × 10^5^ functional recombinant viral particles, MOI = 10 ± 3) [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Samples were incubated for up to 21 days with various differentiation medium (Table [1](#jcmm12774-tbl-0001){ref-type=\"table-wrap\"}), with careful weekly medium change to induce chondro‐, osteo‐, and adipogenic differentiation [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Under continuous chondrogenic induction, mostly MSCs in the samples will commit towards the chondrocyte phenotype [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "As we previously noted that the use of these media does not impede the effects of gene transfer *via* rAAV on the differentiation processes *versus* basal medium in aspirates [23](#jcmm12774-bib-0023){ref-type=\"ref\"}, uninduced conditions were not further tested here.", "\n\n###### \n\nInductive media for chondrogenic, adipogenic and osteogenic differentiation\n\n Pathway Medium\n ---------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------\n Chondrogenesis 4.5 g/l DMEM high glucose, 100 U/ml penicillin, 100 μl/ml streptomycin, 6.25 μg/ml insulin, 6.25 μg/ml transferrin, 6.25 μg/ml selenious acid, 5.35 μg/ml linoleic acid, 1.25 μg/ml BSA, 1 mM sodium pyruvate, 37.5 μg/ml ascorbate 2‐phosphate, 10^−7^ M dexamethasone and 10 ng/ml TGF‐β3\n Osteogenesis StemPro Osteogenesis Differentiation Kit (Life Technologies, Darmstadt, Germany)\n Adipogenesis StemPro Adipogenesis Differentiation Kit (Life Technologies)\n\nJohn Wiley & Sons, Ltd\n\nTransgene expression {#jcmm12774-sec-0006}\n--------------------\n\nTransforming growth factor‐β production was monitored by ELISA at the denoted time‐points by absorbance measurements on a GENios spectrophotometer/fluorometer (Tecan, Crailsheim, Germany) and by immunohistochemistry using a specific TGF‐β antibody, a biotinylated secondary antibody, and diaminobenzidine as a chromogen (ABC method) [28](#jcmm12774-bib-0028){ref-type=\"ref\"}, [31](#jcmm12774-bib-0031){ref-type=\"ref\"}. ", "A control condition with omission of the primary antibody was included to check for secondary immunoglobulins. ", "All sections were examined under light microscopy (Olympus BX45; Olympus, Hamburg, Germany).", "\n\nBiochemical analyses {#jcmm12774-sec-0007}\n--------------------\n\nThe aspirates were resuspended in a total volume of 100 μl of fresh DMEM and digested with papain (final concentration 75 μg/ml) at 60°C [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The DNA contents were measured by fluorimetry using Hoechst 22358 and the proteoglycan contents by binding to dimethylmethylene blue dye [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The type‐II, ‐I and ‐X collagen contents were determined by ELISA [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Values were normalized to total cellular proteins monitored *via* Pierce Thermo Scientific Protein Assay (Fisher Scientific, Schwerte, Germany).", "\n\nFor the determination of ALP activity, osteogenically induced aspirates were mixed with an equal volume of substrate buffer (4‐nitrophenyl phosphate -- pNPP ‐ mixed 1:1 with 4.8% 2‐amino‐2‐methyl‐1‐propanol -- 2‐AMP) for measurement of OD^530nm^ [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Adipogenically induced samples were resuspended in 150 μl of staining solution (three volumes of Oil Red O 0.3% in 2‐propanol and two volumes H~2~O) and incubated for 15 min. ", "at room temperature followed by dissolution in 100% 2‐propanol and by measuring OD^530nm^ [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "All measurements were performed on a GENios spectrophotometer/fluorometer (Tecan).", "\n\nHistological and immunohistochemical analyses {#jcmm12774-sec-0008}\n---------------------------------------------\n\nAspirates were collected and fixed in 4% formalin with subsequent dehydration in graded alcohols, paraffin embedding and sectioning at 3 μm. ", "Haematoxylin and eosin staining was performed to evaluate cellularity and toluidine blue and alizarin red staining for the detection of matrix proteoglycans and matrix mineralization respectively [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The expression of type‐II, ‐I and ‐X collagen and of SOX9 was evaluated by immunohistochemistry using specific primary antibodies, biotinylated secondary antibodies and the ABC method [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Control conditions were included by omitting the primary antibodies. ", "All sections were examined under light microscopy (Olympus BX45; Olympus).", "\n\nHistomorphometry {#jcmm12774-sec-0009}\n----------------\n\nTransgene expression was monitored by evaluating the percentage of TGF‐β^+^ cells to the total number of cells on immunohistochemical sections [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Cell proliferation was evaluated by counting the total cells per standardized area on haematoxylin and eosin‐stained sections [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The intensities of toluidine blue and alizarin red staining and those of type‐II, ‐I and ‐X collagen and SOX9 immunostaining were monitored at magnification ×20 by inverting the pictures to greyscale mode, adapting background DAB signal for comparable range and measuring the mean grey value per total area covered with cells (mm^2^) [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The data were recorded at three random standardized sites or with 10 serial histological and immunohistochemical sections for each parameter, test and replicate condition using the SIS analySIS program (Olympus) and Adobe Photoshop (Adobe Systems, Unterschleissheim, Germany) and are given as mean intensity of staining or immunostaining per mm^2^ of total cell area [23](#jcmm12774-bib-0023){ref-type=\"ref\"}.", "\n\nReal‐time RT‐PCR analyses {#jcmm12774-sec-0010}\n-------------------------\n\nTRIzol reagent (Ambion^®^ Life Technologies, Thermo Scientific, Schwerte, Germany) and RNeasy Protect Mini Kit (Qiagen, Hilden, Germany) were used to extract total cellular RNA from all chondrogenically differentiated aspirates on day 21 post‐transduction. ", "The procedure included an on‐column RNase‐free DNase treatment (Qiagen) and extracted RNA was eluted in 30 μl of RNase‐free water followed by reverse transcription using the 1st Strand cDNA Synthesis kit for RT‐PCR (AMV; Roche Applied Science, Mannheim, Germany) with aliquots of 8 μl RNA eluate. ", "The resulting cDNA products (≥2 μl per sample) were finally amplified by real‐time RT‐PCR with Brilliant SYBR Green QPCR Master Mix (Stratagene, Agilent Technologies, Waldbronn, Germany) on an Mx3000P QPCR operator system (Stratagene) under the following conditions: (95°C, 10 min.), ", "amplification by 55 cycles (denaturation at 95°C, 30 sec.; ", "annealing at 55°C, 1 min.; ", "extension at 72°C, 30 sec.), ", "denaturation (95°C, 1 min.) ", "and final incubation (55°C, 30 sec.). ", "Primers for selected gene profiles are listed in Table [2](#jcmm12774-tbl-0002){ref-type=\"table-wrap\"} and applied at a final concentration of 150 nm. ", "Controls consisting of water and non‐reverse‐transcribed mRNA were included and confirmation of the product specificities was done *via* melting curve analysis and agarose gel electrophoresis as previously described [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "The MxPro QPCR Software (Stratagene) was used for measurements of the threshold cycle (Ct) value of each gene of interest and all values were normalized to GAPDH expression using the 2^−ΔΔCt^ method [23](#jcmm12774-bib-0023){ref-type=\"ref\"}.", "\n\n###### \n\nPrimers used for RT‐PCR\n\n -----------------------------------------------------------------------------\n Gene Primer sequences (5′--3′)\n ------------------------------------------------- ---------------------------\n SOX9[a](#jcmm12774-note-0001){ref-type=\"fn\"} ACACACAGCTCACTCGACCTTG\\\n GGGAATTCTGGTTGGTCCTCT\n\n COL2A1[a](#jcmm12774-note-0001){ref-type=\"fn\"} GGACTTTTCTCCCCTCTCT\\\n GACCCGAAGGTCTTACAGGA\n\n ACAN[a](#jcmm12774-note-0001){ref-type=\"fn\"} GAGATGGAGGGTGAGGTC\\\n ACGCTGCCTCGGGCTTC\n\n COL1A1[b](#jcmm12774-note-0002){ref-type=\"fn\"} ACGTCCTGGTGAAGTTGGTC\\\n ACCAGGGAAGCCTCTCTCTC\n\n COL10A1[c](#jcmm12774-note-0003){ref-type=\"fn\"} CCCTCTTGTTAGTGCCAACC\\\n AGATTCCAGTCCTTGGGTCA\n\n MMP13[c](#jcmm12774-note-0003){ref-type=\"fn\"} AATTTTCACTTTTGGCAATGA\\\n CAAATAATTTATGAAAAAGGGATGC\n\n ALP[b](#jcmm12774-note-0002){ref-type=\"fn\"} TGGAGCTTCAGAAGCTCAACACCA\\\n ATCTCGTTGTCTGAGTACCAGTCC\n\n RUNX2[b](#jcmm12774-note-0002){ref-type=\"fn\"} GCAGTTCCCAAGCATTTCAT\\\n CACTCTGGCTTTGGGAAGAG\n\n GAPDH[d](#jcmm12774-note-0004){ref-type=\"fn\"} GAAGGTGAAGGTCGGAGTC\\\n GAAGATGGTGATGGGATTTC\n -----------------------------------------------------------------------------\n\nChondrogenic markers.", "\n\nOsteogenic markers.", "\n\nHypertrophic and terminal differentiation markers.", "\n\nHousekeeping gene (control).", "\n\nSOX9: SRY (sex determining region Y)‐box 9; COL2A1: type‐II collagen α1; ACAN: aggrecan; COL1A1: type‐I collagen α1; COL10A1: type‐X collagen α1; MMP13: matrix metallo‐proteinase 13; ALP: alkaline phosphatase; RUNX2: runt‐related transcription factor 2; GAPDH: glyceraldehyde‐3‐phosphate dehydrogenase.", "\n\nJohn Wiley & Sons, Ltd\n\nStatistical analyses {#jcmm12774-sec-0011}\n--------------------\n\nEach condition was performed in duplicate in two independent experiments for each patient. ", "Data are expressed as mean ± S.D. of separate experiments. ", "The *t*‐test and Mann--Whitney rank‐sum test were used where appropriate. ", "Any *P*‐value of less than 0.05 was considered statistically significant.", "\n\nResults {#jcmm12774-sec-0012}\n=======\n\nEffective TGF‐β overexpression *via* rAAV in chondrogenically induced human bone marrow aspirates {#jcmm12774-sec-0013}\n-------------------------------------------------------------------------------------------------\n\nHuman bone marrow aspirates were first transduced with the candidate rAAV‐hTGF‐β vector *versus* control (rAAV‐*lacZ*) condition and cultivated for up to 21 days to test the ability of rAAV to promote the overexpression of the candidate TGF‐β factor in conditions of chondrogenic induction. ", "Transgene expression analyses revealed significantly higher immunoreactivity to TGF‐β in the aspirates transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* (1553.2 ± 147.0 and 1056.9 ± 221.1 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.5‐fold difference, *P* = 0.002) (Fig. [", "1](#jcmm12774-fig-0001){ref-type=\"fig\"}). ", "These results were supported by an estimation of the TGF‐β production levels, revealing significantly higher values on days 7 and 21 (up to 2.9‐fold difference, *P* ≤ 0.021) (Table [3](#jcmm12774-tbl-0003){ref-type=\"table-wrap\"}).", "\n\n![", "Detection of TGF‐β overexpression *via* rAAV‐mediated gene transfer in chondrogenically induced human bone marrow aspirates. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β (40 μl each vector) and kept in chondrogenic medium (Table [1](#jcmm12774-tbl-0001){ref-type=\"table-wrap\"}) for 21 days. ", "The samples were processed to monitor TGF‐β production by immunohistochemical analysis (magnification ×20; representative data) with corresponding histomorphometric assessments and by estimating the transduction efficiencies as described in the [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}. ", "\\*Statistically significant compared with rAAV‐*lacZ*.](JCMM-20-430-g001){#jcmm12774-fig-0001}\n\n###### \n\nProduction of TGF‐β in chondrogenically induced human bone marrow aspirates *via* rAAV‐mediated gene transfer\n\n Days post‐transduction rAAV‐*lacZ* rAAV‐hTGF‐β\n ------------------------ -------------- -------------------------------------------------------\n 7 178.5 (10.0) 511.1 (116.9)[a](#jcmm12774-note-0006){ref-type=\"fn\"}\n 14 49.4 (7.1) 112.5 (56.3)\n 21 5.8 (3.1) 16.1 (5.9)[a](#jcmm12774-note-0006){ref-type=\"fn\"}\n\nStatistically significant compared with rAAV‐*lacZ*.", "\n\nValues are expressed as means pg/24 hrs/mg total proteins (S.D.).", "\n\nJohn Wiley & Sons, Ltd\n\nProliferative and chondrogenic effects of rAAV‐mediated overexpression of TGF‐β in chondrogenically induced human bone marrow aspirates {#jcmm12774-sec-0014}\n---------------------------------------------------------------------------------------------------------------------------------------\n\nThe aspirates were next transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* and induced towards chondrogenesis to evaluate the effects of TGF‐β overexpression upon the proliferative activities and potential for chondrogenic differentiation in the samples. ", "As we previously reported a lack of deleterious effects of rAAV gene transfer upon the potency of bone marrow aspirates [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, we did not further include a condition without vector treatment in this study.", "\n\nA quantitative analysis by haematoxylin and eosin staining revealed significantly higher cell densities in the presence of rAAV‐hTGF‐β compared with rAAV‐*lacZ* (402.0 ± 98.9 and 276.0 ± 66.2 pixels/cell area and 118.8 ± 27.1 and 47.2 ± 27.2 cells/mm^2^ after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "an up to 2.5‐fold difference, always *P* ≤ 0.004) (Fig. [", "2](#jcmm12774-fig-0002){ref-type=\"fig\"}). ", "These results were further confirmed *via* a biochemical assay to monitor the DNA contents in the aspirates, revealing significantly higher values with rAAV‐hTGF‐β compared with rAAV‐*lacZ* (3.6 ± 2.0 and 0.7 ± 0.6 μg/mg total proteins after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 5.1‐fold difference, *P* = 0.018) (Fig. [", "2](#jcmm12774-fig-0002){ref-type=\"fig\"}).", "\n\n![", "Effects of rAAV‐mediated TGF‐β overexpression upon the proliferative activities in chondrogenically induced human bone marrow aspirates. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β as described in Figure [1](#jcmm12774-fig-0001){ref-type=\"fig\"} and kept in chondrogenic medium for 21 days. ", "The samples were processed to evaluate the cell densities on haematoxylin and eosin‐stained histological sections (magnification ×20; representative data) and to monitor the DNA contents by Hoechst 22358 assay as described in the [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}. ", "\\*Statistically significant compared with rAAV‐*lacZ*.](JCMM-20-430-g002){#jcmm12774-fig-0002}\n\nTo monitor the effects of TGF‐β overexpression upon the chondrogenic events in the aspirates, the samples were further processed for the cartilage‐specific proteoglycans, type‐II collagen, and SOX9 markers by histological and immunohistochemical analyses. ", "Significantly increased intensities were detected in the aspirates transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* for toluidine blue staining (1059.4 ± 284.1 and 545.1 ± 173.7 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.9‐fold difference, *P* = 0.005), anti‐type‐II collagen immunostaining (1151.5 ± 260.8 and 888.9 ± 85.8 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.3‐fold difference, *P* = 0.037), and anti‐SOX9 immunostaining (1069.8 ± 76.8 and 938.9 ± 20.9 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.2‐fold difference, *P* = 0.028) (Fig. [", "3](#jcmm12774-fig-0003){ref-type=\"fig\"}). ", "A biochemical analysis of the proteoglycan and type‐II collagen contents confirmed these results, showing higher values in the presence of rAAV‐hTGF‐β (64.3 ± 13.8 and 50.8 ± 2.9 ng proteoglycans/mg total proteins and 2.7 ± 0.9 and 0.8 ± 0.1 ng type‐II collagen/mg total proteins after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "an up to 3.4‐fold difference, always *P* ≤ 0.047) (Fig. [", "3](#jcmm12774-fig-0003){ref-type=\"fig\"}). ", "In addition, an analysis of the gene expression profiles in the aspirates by real‐time RT‐PCR revealed increases in the expression of ACAN (1.6‐fold), COL2A1 (1.4‐fold), and SOX9 (6.8‐fold) after 21 days in the aspirates transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* (always *P* ≤ 0.028) (Fig. [", "5](#jcmm12774-fig-0005){ref-type=\"fig\"}).", "\n\n![", "Detection of cartilage‐specific components in chondrogenically induced human bone marrow aspirates overexpressing TGF‐β. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β as described in the Figures [1](#jcmm12774-fig-0001){ref-type=\"fig\"} and [2](#jcmm12774-fig-0002){ref-type=\"fig\"} and kept in chondrogenic medium for 21 days. ", "The samples were processed to monitor the deposition of proteoglycans and of type‐II collagen (toluidine blue staining and immunodetection, respectively) and the expression of SOX9 (immunodetection) (all at magnification ×20; representative data), including histomorphometric analyses and an estimation of the proteoglycan and type‐II collagen contents as described in the [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}. ", "\\*Statistically significant compared with rAAV‐*lacZ*.](JCMM-20-430-g003){#jcmm12774-fig-0003}\n\nHypertrophic/terminal differentiation was also monitored in the aspirates to evaluate the impact of TGF‐β overexpression in the samples. ", "An immunohistochemical analysis revealed significantly lower intensities in the aspirates transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* for alizarin red staining (734.9 ± 48.0 and 968.7 ± 192.6 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.3‐fold difference, *P* = 0.016), type‐I collagen immunostaining (789.5 ± 64.7 and 921.2 ± 117.9 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.2‐fold difference, *P* = 0.043), and type‐X collagen immunostaining (777.4 ± 136.1 and 992.3 ± 116.3 pixels/cell area after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.3‐fold difference, *P* = 0.001) (Fig. [", "4](#jcmm12774-fig-0004){ref-type=\"fig\"}). ", "A biochemical analysis performed to estimate the type‐I and ‐X collagen contents supported these findings, showing lower values in the presence of rAAV‐hTGF‐β (8.0 ± 0.1 and 10.4 ± 0.9 ng type‐I collagen/mg total proteins and 2.6 ± 0.7 and 4.1 ± 0.9 ng type‐X collagen/mg total proteins after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, up to 1.6‐fold difference, always *P* ≤ 0.041) (Fig. [", "4](#jcmm12774-fig-0004){ref-type=\"fig\"}). ", "Also, an analysis of the gene expression profiles in the aspirates monitored by real‐time RT‐PCR revealed decreases in the expression of type‐I (4.3‐fold) and type‐X collagen (13.1‐fold) after 21 days in the aspirates transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* (always *P* ≤ 0.003) (Fig. [", "5](#jcmm12774-fig-0005){ref-type=\"fig\"}). ", "Such profiles were accompanied by a reduced expression of markers of terminal differentiation and osteogenesis with rAAV‐hTGF‐β (3.2‐, 2.2‐, and 3.5‐fold decreased MMP13, ALP, and RUNX2 expression after 21 days, respectively), although statistical significance was not reached in the conditions applied here (always *P* ≤ 0.210) (Fig. [", "5](#jcmm12774-fig-0005){ref-type=\"fig\"}).", "\n\n![", "Detection of hypertrophy and terminal differentiation in chondrogenically induced human bone marrow aspirates overexpressing TGF‐β. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β as described in the Figures [1](#jcmm12774-fig-0001){ref-type=\"fig\"}, [2](#jcmm12774-fig-0002){ref-type=\"fig\"}, [3](#jcmm12774-fig-0003){ref-type=\"fig\"} and kept in chondrogenic medium for 21 days. ", "The samples were processed to monitor matrix mineralization (alizarin red staining) and the expression of type‐I and type‐X collagen (immunodetection) (all at magnification ×20; representative data), including histomorphometric analyses and an estimation of the type‐I and ‐X collagen contents as described in the [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}. ", "\\*Statistically significant compared with rAAV‐*lacZ*.](JCMM-20-430-g004){#jcmm12774-fig-0004}\n\n![", "Gene expression analyses by real‐time RT‐PCR in chondrogenicallyinduced human bone marrow aspirates overexpressing TGF‐β. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β as described in the Figures [1](#jcmm12774-fig-0001){ref-type=\"fig\"}, [2](#jcmm12774-fig-0002){ref-type=\"fig\"}, [3](#jcmm12774-fig-0003){ref-type=\"fig\"}, [4](#jcmm12774-fig-0004){ref-type=\"fig\"} and kept in chondrogenic medium for 21 days. ", "The samples were processed to monitor the expression profiles of aggrecan (ACAN), type‐II collagen (COL2A1), the transcription factor SOX9, type‐I collagen (COL1A1), type‐X collagen (COL10A1), matrix metallo‐proteinase 13 (MMP13), alkaline phosphatase (ALP), and the transcription factor RUNX2, with GAPDH serving as a housekeeping gene and internal control for normalization. ", "Ct values were generated for each target gene and fold inductions (relative to rAAV‐*lacZ*‐treated aspirates) were measured by using the 2^−ΔΔCt^ method as described in the [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}. ", "\\*Statistically significant compared with rAAV‐*lacZ*.](JCMM-20-430-g005){#jcmm12774-fig-0005}\n\nEffects of rAAV‐mediated overexpression of TGF‐β in osteogenically and adipogenically induced human bone marrow aspirates {#jcmm12774-sec-0015}\n-------------------------------------------------------------------------------------------------------------------------\n\nThe aspirates were also transduced with rAAV‐hTGF‐β compared with rAAV‐*lacZ* and induced towards osteogenesis and adipogenesis to evaluate the influence of TGF‐β overexpression on the potential for osteo‐/adipogenic differentiation in the samples. ", "While a trend towards enhanced adipogenic differentiation (Oil Red O staining) was seen in the presence of rAAV‐hTGF‐β compared with rAAV‐*lacZ* (4.13 ± 0.36 and 2.04 ± 0.37 OD^530nm^ after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a twofold difference), osteogenic differentiation (ALP activity) was attenuated with TGF‐β (0.49 ± 0.07 and 0.75 ± 0.25 OD^530nm^ after 21 days in the TGF‐β‐ *versus lacZ*‐treated samples, respectively, *i.e*. ", "a 1.5‐fold difference), although statistical significance was not reached in the conditions applied here (*P* = 0.076 and *P* = 0.234 respectively) (Fig. [", "6](#jcmm12774-fig-0006){ref-type=\"fig\"}).", "\n\n![", "Detection of osteogenic and adipogenic differentiation in osteogenically and adipogenically induced human bone marrow aspirates overexpressing TGF‐β. ", "The aspirates were transduced with rAAV‐*lacZ* or rAAV‐hTGF‐β as described in the Figures [1](#jcmm12774-fig-0001){ref-type=\"fig\"}, [2](#jcmm12774-fig-0002){ref-type=\"fig\"}, [3](#jcmm12774-fig-0003){ref-type=\"fig\"}, [4](#jcmm12774-fig-0004){ref-type=\"fig\"}, [5](#jcmm12774-fig-0005){ref-type=\"fig\"} and kept either in osteogenic or adipogenic medium (Table [1](#jcmm12774-tbl-0001){ref-type=\"table-wrap\"}) for 21 days. ", "The samples were processed to monitor the ALP activities and evaluate Oil Red O staining, respectively, as described in [Materials and methods](#jcmm12774-sec-0002){ref-type=\"sec\"}.](JCMM-20-430-g006){#jcmm12774-fig-0006}\n\nDiscussion {#jcmm12774-sec-0016}\n==========\n\nAdministration of genetically modified marrow concentrates to site of cartilage lesions *via* transfer of chondrogenic and/or chondroreparative factors using the clinically adapted rAAV vectors may provide convenient, single‐step therapeutic approaches to enhance cartilage repair compared with the more complex and invasive implantation of isolated progenitor cells [6](#jcmm12774-bib-0006){ref-type=\"ref\"}. ", "In this study, we examined the ability of rAAV to deliver a functional TGF‐β gene cassette to human marrow concentrates in the light of the pleiotropic, chondrogenic properties of this growth factor [24](#jcmm12774-bib-0024){ref-type=\"ref\"}, [25](#jcmm12774-bib-0025){ref-type=\"ref\"}, [26](#jcmm12774-bib-0026){ref-type=\"ref\"}, [27](#jcmm12774-bib-0027){ref-type=\"ref\"} and with our previous findings showing that such a strategy was capable of stimulating such activities in isolated human MSCs [28](#jcmm12774-bib-0028){ref-type=\"ref\"}.", "\n\nWe first observed that transduction with rAAV led to higher levels of TGF‐β expression in the hTGF‐β‐treated concentrates compared with control (*lacZ*) treatment over the period of evaluation (21 days), in good agreement with our previous results in hMSCs [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "The concentrations achieved *via* rAAV‐hTGF‐β gene transfer over time were in the range of those noted in hMSCs (\\~16.1 and \\~24.1 pg rhTGF‐β/mg total proteins on day 21 in the aspirates and in isolated cells respectively) [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "Our findings further indicate that overexpression of TGF‐β *via* rAAV led to increased levels of proliferative, biosynthetic and chondrogenic activities in the aspirates over time relative to control treatment, possibly because of the prolonged production of the growth factor permitted by stable rAAV gene transfer [32](#jcmm12774-bib-0032){ref-type=\"ref\"} and concordant with the effects of TGF‐β when applied in a recombinant form [24](#jcmm12774-bib-0024){ref-type=\"ref\"}, [25](#jcmm12774-bib-0025){ref-type=\"ref\"}, [26](#jcmm12774-bib-0026){ref-type=\"ref\"}, [27](#jcmm12774-bib-0027){ref-type=\"ref\"} or used by us to target isolated hMSCs [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "Of note, the levels of proliferation in the TGF‐β‐treated aspirates were higher than those noted with hMSCs (\\~3.6 μg *versus* \\~26.4 ng DNA/mg total proteins, respectively, *i.e*. ", "a 136‐fold difference) [28](#jcmm12774-bib-0028){ref-type=\"ref\"}, possibly because of the presence of other mitogenic factors in the aspirates and/or to effects from other marrow cell populations modified early on by rAAV while later on, under continuous chondrogenic activation mostly chondrogenically induced, rAAV‐modified MSCs may control this process (paracrine *versus* autocrine effects). ", "We thus anticipate that their depletion may prevent the effects of TGF‐β in conditions of permanent chondrogenic activation over the current extended period of evaluation. ", "Still, work would be needed to confirm this hypothesis by modifying aspirates devoid of the MSC subpopulation. ", "In contrast, the levels of matrix synthesis were lower in the aspirates compared with those observed in isolated hMSCs (\\~2.7 *versus* \\~9.5 ng type‐II collagen/mg total proteins on day 21, respectively, *i.e*. ", "a 3.5‐fold difference; \\~64.3 ng *versus* \\~378.5 μg proteoglycans/mg total proteins, respectively, *i.e*. ", "a 5.8 × 10^3^‐fold difference) [28](#jcmm12774-bib-0028){ref-type=\"ref\"}, possibly because of a lower state of activation of chondroprogenitor cells in the aspirates compared with that acquired during cell expansion, to adverse effects from distinct, residual cells, and/or to prevalent mitogenic *versus* anabolic effects of TGF‐β in aspirates as noted in chondrocytes [33](#jcmm12774-bib-0033){ref-type=\"ref\"}. ", "It cannot be excluded that the levels of matrix synthesis may still increase upon TGF‐β treatment beyond the time‐point selected here according to the relevant literature [19](#jcmm12774-bib-0019){ref-type=\"ref\"}, [20](#jcmm12774-bib-0020){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}. ", "Such effects are most likely mediated by binding of TGF‐β to its receptor (TβRII‐TβRI complex with R‐Smad cascade) and work is ongoing to test this hypothesis by performing receptor blocking studies [34](#jcmm12774-bib-0034){ref-type=\"ref\"}. ", "Finally, we report that in the conditions tested here, application of the candidate rAAV‐hTGF‐β vector delayed hypertrophic and osteogenic differentiation in the aspirates, in association with reduced levels of MMP13 (marker of terminal differentiation), ALP (osteogenic marker) and RUNX2 (transcription factor controlling the osteoblastic expression of COL1, COL10 and MMP13). ", "This is in striking contrast with our previous findings in isolated hMSCs, where the same vector stimulated instead these processes compared with control treatment [28](#jcmm12774-bib-0028){ref-type=\"ref\"}. ", "Again, this might be the result of effects from other, beneficial factors present in the aspirates and/or of specific control pathways possibly activated in the presence of other marrow cell populations [35](#jcmm12774-bib-0035){ref-type=\"ref\"}.", "\n\nIn conclusion, the results of this study show the value of providing therapeutic rAAV vectors to human bone marrow concentrates to enhance the chondrogenic differentiation processes for implantation in sites of cartilage injury. ", "Work is ongoing to support the practicability of the approach by applying modified aspirates to focal defects [6](#jcmm12774-bib-0006){ref-type=\"ref\"}, [19](#jcmm12774-bib-0019){ref-type=\"ref\"}, [20](#jcmm12774-bib-0020){ref-type=\"ref\"}, [21](#jcmm12774-bib-0021){ref-type=\"ref\"}, [36](#jcmm12774-bib-0036){ref-type=\"ref\"}, [37](#jcmm12774-bib-0037){ref-type=\"ref\"}. ", "Also important, the cell subpopulations promoting the chondrogenic events in the aspirates are currently being characterized [7](#jcmm12774-bib-0007){ref-type=\"ref\"}, [8](#jcmm12774-bib-0008){ref-type=\"ref\"}, [38](#jcmm12774-bib-0038){ref-type=\"ref\"} to address the cell heterogeneity of the aspirates. ", "Also, it remains to be seen whether gene transfer of TGF‐β will be sufficient to achieve full repair in the lesions, and co‐application of other candidates might be necessary, like for instance the cartilage oligomeric matrix protein, BMPs, IGF‐I, basic fibroblast growth factor‐2, SOX transcription factors, zinc‐finger protein 145 (ZNF145), Indian hedgehog (Ihh) or human telomerase (hTERT) [22](#jcmm12774-bib-0022){ref-type=\"ref\"}, [23](#jcmm12774-bib-0023){ref-type=\"ref\"}, [39](#jcmm12774-bib-0039){ref-type=\"ref\"}, [40](#jcmm12774-bib-0040){ref-type=\"ref\"}, [41](#jcmm12774-bib-0041){ref-type=\"ref\"}, [42](#jcmm12774-bib-0042){ref-type=\"ref\"}, [43](#jcmm12774-bib-0043){ref-type=\"ref\"}, [44](#jcmm12774-bib-0044){ref-type=\"ref\"}, [45](#jcmm12774-bib-0045){ref-type=\"ref\"}, [46](#jcmm12774-bib-0046){ref-type=\"ref\"}, [47](#jcmm12774-bib-0047){ref-type=\"ref\"}. ", "Combined gene transfer will be possible using rAAV as transduction with this class of vectors does not lead to gene transfer interference [48](#jcmm12774-bib-0048){ref-type=\"ref\"}. ", "Overall, our results show the benefits of a direct modification of marrow aspirates *via* rAAV for the future treatment of cartilage defects.", "\n\nConflicts of interest {#jcmm12774-sec-0018}\n=====================\n\nThe authors confirm that there are no conflicts of interest.", "\n\nThis research was funded by grants from the German Osteoarthritis Foundation (*Deutsche Arthrose‐Hilfe e.V*.). ", "We thank R. J. Samulski (The Gene Therapy Center, University of North Carolina, Chapel Hill, NC), X. Xiao (The Gene Therapy Center, University of Pittsburgh, Pittsburgh, PA) and E. F. Terwilliger (Division of Experimental Medicine, Harvard Institutes of Medicine and Beth Israel Deaconess Medical Center, Boston, MA) for providing genomic AAV‐2 plasmid clones and the 293 cell line.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0008626283379271626, 0.0008204705663956702, 0.0006522425101138651, 0.0007814829587005079, 0.0007296193507499993, 0.0007151006138883531, 0.0006167543469928205, 0.0006059680017642677, 0.0006214266177266836, 0.0006471737287938595, 0.000694776070304215, 0.0006342279375530779, 0.0006597997853532434, 0.0005868834559805691, 0.0006016982952132821, 0.0007837270386517048, 0.0007741897716186941, 0.0006379468250088394, 0.0006580555345863104, 0.0006271172314882278, 0.0010225869482383132, 0.0005260125617496669, 0.0005895219510421157, 0.0007077789050526917, 0.0006439169519580901, 0.000605698034632951, 0.000632232113275677, 0.0005525031592696905, 0.0018763730768114328, 0.0006738844094797969, 0.0005399141227826476, 0.0006680453079752624, 0.0006173415458761156, 0.0005715289735235274, 0.000604573346208781, 0.0006196676404215395, 0.0006694075418636203, 0.000606358575168997, 0.0006229928112588823, 0.0007091069128364325, 0.0006311421166174114, 0.0005926150479353964, 0.0005814431933686137, 0.0005433736369013786, 0.0007556288037449121, 0.0005911863408982754, 0.0006001475849188864, 0.0005621770396828651, 0.0007506236433982849, 0.0006236204062588513, 0.0005893419147469103, 0.0006211829604580998, 0.0006657260819338262, 0.0006290798191912472, 0.0006162507925182581, 0.0006242408999241889, 0.0005430093733593822, 0.0005822200910188258, 0.0005954763037152588, 0.021582890301942825, 0.00084756372962147, 0.001667952281422913, 0.0006059596198610961, 0.0009097110596485436, 0.0006226683617569506, 0.0005721221677958965, 0.0023541587870568037, 0.0017394718015566468, 0.0009729405865073204, 0.0007334264228120446, 0.000660092628095299, 0.0006417918484658003, 0.0005566210020333529, 0.0019055769080296159, 0.0007892083958722651, 0.0006420568097382784, 0.0005648488295264542, 0.00091714778682217, 0.0005622183089144528, 0.001046906691044569, 0.0005809072754345834, 0.0006873212987557054, 0.0013598967343568802, 0.0006465048645623028, 0.000676193623803556, 0.0006568600074388087, 0.0006465048645623028, 0.0019055769080296159, 0.0008109570480883121, 0.0006444108439609408, 0.0005735537270084023, 0.0006551832193508744, 0.0006866269977763295, 0.0006658949423581362, 0.000686128914821893, 0.0006603914662264287, 0.0006491102394647896, 0.0006727880681864917, 0.0018852234352380037, 0.0006491102394647896, 0.0005816721240989864, 0.0006488479557447135, 0.0019055769080296159, 0.0008105900487862527, 0.0006337919621728361, 0.0005941748968325555, 0.0006298813968896866, 0.0006797534879297018, 0.0006609322736039758, 0.0006798956892453134, 0.0006890426739118993, 0.0006471388624049723, 0.0006149039836600423, 0.0006471388624049723, 0.000581836502533406, 0.0006488479557447135, 0.0006071007228456438, 0.0006488479557447135, 0.0019055769080296159, 0.0008981895516626537, 0.0006500849849544466, 0.0005748872645199299, 0.000718684634193778, 0.0006398563855327666, 0.0006999872857704759, 0.0006441025761887431, 0.000579885789193213, 0.0011688893428072333, 0.0006311857141554356, 0.0006781943375244737, 0.0005839251098223031, 0.000646261207293719, 0.0019055769080296159, 0.0010519454954192042, 0.0006932878168299794, 0.0006659380742348731, 0.0005918635288253427, 0.0005523436120711267, 0.0006036785780452192, 0.0006692117894999683, 0.0007262988947331905, 0.0006195309688337147, 0.000649763853289187, 0.0006078088190406561, 0.0006827796460129321, 0.0009638636838644743, 0.0006259746151044965, 0.0005640916060656309, 0.0006139582837931812, 0.0006011949153617024, 0.000583791290409863, 0.0005887658917345107, 0.0006636024918407202, 0.0006582797504961491, 0.0006142511847428977, 0.0006993358838371933, 0.0006125563522800803, 0.00067311548627913, 0.0009086194913834333, 0.0006597181200049818, 0.0005785205867141485, 0.001995444530621171 ]
0.000885
162
[ "\n11 Wis.2d 449 (1960)\nSOHNS and others, Respondents,\nv.\nJENSEN, Appellant.", "\nSupreme Court of Wisconsin.", "\nOctober 5, 1960.", "\nNovember 1, 1960.", "\n*453 For the appellant there was a brief by Jacob Carian of West Allis, attorney, and Joseph A. Melli of Madison of counsel, and oral argument by Mr. Robert D. Sundby of Madison, and Mr. Carian.", "\nFor the respondents there was a brief by Grootemaat, Cook & Franke of Milwaukee, and oral argument by Robert E. Cook.", "\nHALLOWS, J.\n1. ", "Was there an adequate administrative remedy? ", "The defendant contends that the plaintiffs had an adequate administrative remedy which they did not exhaust. ", "In its written opinion the court stated that the plaintiffs were entitled to maintain this suit under sec. ", "59.97 (8), Stats. ", "While this part of the decision is not in the findings of fact, this court may refer to the opinion to supplement the findings. ", "Estate of Wallace (1955), 270 Wis. 636, 72 N. W. (2d) 383. ", "The court on appeal will also assume when a finding is not made on an issue which appears from the record to exist, that it was determined in favor of or in support of the judgment. ", "Smith v. Janesville (1870), 26 Wis. 291; Bautz v. Adams (1907), 131 Wis. 152, 111 N. W. 69.", "\nWe cannot agree with the defendant that there was an adequate administrative remedy available to the plaintiffs. ", "The answer to the amended complaint alleged that, after a meeting, the Racine county planning commission informed the defendant through the office of the zoning administrator that the defendant was in business prior to the passing of the Racine county zoning ordinance and he could continue his business. ", "The action on the part of the planning commission was not such an administrative order, determination, or decision that would entitle the plaintiffs to appeal therefrom under the zoning ordinance to the board of adjustment. ", "From the record it appears that the planning commission is *454 a committee of the Racine county board of supervisors created by an ordinance of the Racine county board. ", "At no place are its duties set forth. ", "Nor does the ordinance provide for appeals from or any procedure for hearings by the commission. ", "It was testified the hearing was not a public hearing, the witnesses were not sworn, no minutes of the meeting were kept, and the purpose of the meeting was to help out the town officials. ", "The notice of the hearing, the so-called \"unsworn affidavits,\" and other material relating to the hearing were offered in evidence. ", "The planning commission having no duty or authority to make any determination or decision of whether the defendant's automobile-wrecking business was or was not a nonconforming use, its action was immaterial on that question when offered in evidence. ", "The trial court was not in error in ruling Exhibits D and F were inadmissible.", "\nOn appeal, the defendant argued that the action of the planning commission, upon being sent to him by the zoning administrator, became the administrator's decision and an appeal to the board of adjustment should have been taken by the plaintiffs from that decision. ", "The zoning administrator testified the action of the planning commission was not his decision and, in effect, he merely relayed by letter to the defendant what the planning commission decided. ", "Under these circumstances, it cannot be claimed that such a letter on behalf of the planning commission was a decision, determination, or order by an administrative officer from which the plaintiffs were entitled to appeal to the board of adjustment.", "\nThe defendant further argued that the granting of the zoning permit was such an order and the plaintiffs were aggrieved parties and should have appealed. ", "However, the plaintiffs had no knowledge of the issuance of the zoning permit which was a building permit and is so designated in the ordinance. ", "The plaintiffs had no objection to a shed being built on the defendant's property in connection with the *455 conduct of his garage business. ", "The mere fact that the plaintiffs lived next to or in the vicinity of the defendant's premises was not sufficient under the facts of this case to give them notice of the use of the shed, nor were they required to examine the records of the administrative officer to determine whether or not their interests were affected. ", "The defendant was not only operating a garage, but also conducting the alleged unlawful automobile-wrecking yard. ", "The construction of the shed did not impart notice of its use to the plaintiffs and, if the plaintiffs had asked the administrative officer regarding the use of the shed, his records did not indicate that it was to be used in connection with the wrecking yard. ", "The application was significantly silent in disclosing its use.", "\nWe cannot hold that the plaintiffs were aggrieved persons within the meaning of the ordinance and a determination made by an administrative officer from which the plaintiffs were required to appeal. ", "The defendant relies on Ferch v. Schroedel (1942), 241 Wis. 457, 6 N. W. (2d) 176, State ex rel. ", "Morehouse v. Hunt (1940), 235 Wis. 358, 291 N. W. 745, and other cases. ", "These cases are not in point. ", "An adjoining or nearby property owner who has no notice of an administrative order, has no knowledge of such order, and has not participated in the proceedings resulting from the order, cannot be deemed to be an aggrieved party who is required to appeal within the meaning of the zoning ordinance. ", "The Racine county ordinance does not provide any procedure by which property owners may institute complaints or for the holding of hearings by the administrative officer on such complaints. ", "It has been held that the adjoining property owners are not aggrieved parties under substantially similar situations. ", "State ex rel. ", "A. Hynek & Sons Co. v. Board of Appeals (1954), 267 Wis. 309, 64 N. W. (2d) 741, 66 N. W. (2d) 623; Evans v. Roth (1947), 356 Mo. 237, 201 S. W. (2d) 357. ", "As said in *456 Fidelity Trust Co. v. Downing (1946), 224 Ind. 457, 463, 68 N. E. (2d) 789:\n\"To hold otherwise would be to hold that every property owner in any particular district would be compelled to take notice of every action of such officer or board.\"", "\nThe same reasoning applies to the occupancy permit which was issued automatically upon the completion of the shed. ", "This permit was not offered in evidence. ", "The testimony shows, however, that the administrative officer did not know the purpose for which the shed was to be used, and each of the administrative officials, i.e., zoning administrator and deputy zoning administrator, stated he issued the permit either by direction or by implication of the other. ", "A certificate of occupancy, or occupancy permit, may be issued under the zoning ordinance only when the building and the proposed use thereof conforms to all the requirements of the ordinance. ", "It is clear from the record that this permit was issued in violation of the ordinance by one who misunderstood the ordinance and who did not determine whether the proposed use of the shed conformed to the zoning ordinance. ", "No one knew of the issuance of this permit except the defendant and the office of the administrative officer. ", "Under the circumstances, this is not such an administrative order which required the plaintiffs, who were then engaged in a lawsuit with the defendant, to appeal.", "\nThere is no requirement in sec. ", "59.97 (8), Stats.", ",[1] that an owner of real estate in the district must appeal an administrative decision as a condition to exercising his right to enforce compliance of the ordinance. ", "The words \"aggrieved party\" as used in the ordinance have a much-more-limited meaning than the language of this section. ", "Even *457 without this express authority, a private person may enjoin a violation of an ordinance when there is no practical remedy. ", "Actions for penalties are brought by public authorities, not private citizens, and there may be cases where a private person has suffered irreparable damage which is special and different than that suffered by the general public. ", "Holzbauer v. Ritter (1924), 184 Wis. 35, 198 N. W. 852. ", "We conclude that the trial court was not in error in holding that the plaintiffs could commence a suit under sec. ", "59.97 (8), Stats.", "\n2. ", "Does the evidence sustain the finding of the trial court? ", "It is contended that the trial court gave no weight to the administrative determination of the zoning administrator and his deputy that the defendant's use of his premises constituted a valid nonconforming use. ", "We have reviewed the record. ", "We do not find that the trial court did not take into consideration the actions of the zoning administrators in granting the building permit and occupancy permit. ", "The trial court was not bound by their action. ", "In considering their testimony the court gave it such weight as it deserved under the circumstances. ", "There was other testimony that the defendant first engaged in the automobile-wrecking business no earlier than 1953. ", "Some testimony on behalf of the defendant showed he salvaged automobile parts on a very limited basis incidental to his garage business prior to July 6, 1949. ", "Such acts did not constitute conducting an automobile-wrecking yard. ", "The defendant's records for 1949 did not disclose any purchase or sale of used or scrapped automobiles or the sale of salvaged metal. ", "The first recorded purchase of a junked automobile was in 1953. ", "No such purchases were shown in 1954, but the defendant's records showed approximately 10 invoices indicating sales of scrap metal in 1955. ", "Prior to 1958 the defendant stored and accumulated the majority of his junked automobiles less than *458 750 feet from the center of the highway and burned automobiles within that distance.", "\nThe defendant was employed full time in Milwaukee until March 21, 1949, less than four months prior to the passage of the zoning ordinance. ", "He conducted an open house, or grand opening, of his garage business in September, 1949, and purchased his first tow truck in November or December of that year. ", "His state income-tax return for 1949 describes his business as \"garage\" and shows no inventory at the close of that year. ", "The 1949 personal-property tax return showed property of less than $80 consisting of greases, oils, gas, and parts only. ", "The first reported sale, purchase, or inventory of wrecked cars was in his 1955 return, in which year he also reported for the first time income from junk. ", "In 1950, the defendant advertised himself in the telephone book as operating a garage. ", "There was no reference to automobile wrecking or junking. ", "In 1955, such advertising did include automobile wrecking. ", "There are also in the record exhibits consisting of photographs taken during 1952 and 1954 which do not show any wrecked or junked vehicles on the defendant's premises. ", "It is the duty of the trial court to determine the credibility of the witnesses, and the record discloses that one of the witnesses for the defendant expressed such little regard for the sanctity of the oath as to destroy his credibility. ", "The findings of fact of the trial court were not contrary to the great weight and clear preponderance of the evidence.", "\n3. ", "Estoppel. ", "The defendant contends that the plaintiffs are estopped from maintaining this action because the defendant has built up a substantial business. ", "The question was not directly passed upon by the trial court and was not raised as an issue in the pleadings by the defendant. ", "Where an issue is neither pleaded nor litigated in the trial court, this court ordinarily will not consider it on appeal, and we do not propose to do so in this case. ", "Murphy v. Martin (1883), 58 Wis. 276, 16 N. W. 603.", "\n*459 4. ", "Are the defendant's salvaging operations a conforming use? ", "We find no merit in the defendant's contention that because the zoning ordinance prohibits in commercial district \"A\" the wrecking of vehicles and the storage of salvaged parts, and only prohibits in commercial district \"B\" the operation of automobile-wrecking yards, that salvaging and storing of parts therefrom on the premises is a conforming use in commercial district \"B.\" In district \"A\" the ordinance prohibits the acts of wrecking automobiles and the storage of parts salvaged therefrom as incidental to the operation of a filling station. ", "The business of operating an automobile-wrecking yard is not permitted in district \"A\" because it is not one of the specified uses allowed. ", "In district \"B\" the ordinance prohibits the acts as a separate and distinct business of operating an automobile-wrecking yard and excludes such business under general retail and wholesale business uses. ", "The concept of the automobile-wrecking yard business includes the salvaging of parts. ", "The storage of parts which are salvaged as a part of the wrecking operation on the premises is prohibited. ", "Perhaps the ordinance does not prevent the storage of automobile parts, whether new or used, or salvaged, in a garage when the salvaged parts are obtained from some source other than the wrecking of cars on the defendant's premises.", "\nTrial was had on the basis that salvaging of parts and burning of vehicles was done in the defendant's operation of the automobile-wrecking yard. ", "This construction of the meaning of an automobile-wrecking yard was part of the pretrial stipulation and order and was binding on the court and the parties. ", "See Hansen v. Oregon, ante, p. 399, 105 N. W. (2d) 815.", "\n5. ", "Nuisance. ", "The last question raised by the defendant is whether the operation of the automobile-wrecking yard constituted a private nuisance. ", "The gist of the complaint was that the defendant's operation in burning the junked vehicles caused such serious, material, and permanent injury to the *460 plaintiffs by reason of the smoke, smells, and stench, as to constitute a nuisance. ", "The injunction on this ground enjoined only the burning of automobiles at any time on the defendant's premises, but not the rest of the defendant's business, as the defendant argues. ", "The injunction based on the violations of the zoning ordinance enjoined the defendant from conducting an automobile-wrecking yard, and included the burning of vehicles as a part of that use of the premises. ", "There was no pleading or issue that the entire wrecking-yard operation constituted a nuisance. ", "Sec. ", "280.01, Stats., ", "provides for an action to abate a private nuisance. ", "The trial court granted an injunction on the authority of Pennoyer v. Allen (1883), 56 Wis. 502, 14 N. W. 609, which we agree rules this case. ", "The plaintiffs' cause of action for nuisance is basically an action in equity for abatement. ", "Kamke v. Clark (1955), 268 Wis. 465, 67 N. W. (2d) 841, 68 N. W. (2d) 727. ", "During the years 1956-1958, the defendant's operation in burning automobiles created extremely black, dense smoke containing soot to a large degree, as well as smells predominately of burning rubber, oil, and grease. ", "Some plaintiffs live adjoining the defendant's property and other plaintiffs live nearby; one has a residence, a tavern, and picnic ground; another has a residence and greenhouse; another has only a residence. ", "On occasion smoke penetrated the plaintiffs' residences and left quantities of soot on furniture and walls. ", "The smell was offensive and noxious. ", "Even though a business may be lawful, nevertheless it may be conducted in such a way as to amount to a nuisance either because of its location, as in Hasslinger v. Hartland (1940), 234 Wis. 201, 290 N. W. 647, or because of the effect of the operation.", "\nWhile Pennoyer v. Allen, supra, is the leading case on what amounts to a nuisance, this court has passed upon the question many times since. ", "In McCann v. Strang (1897), 97 Wis. 551, 72 N. W. 1117, this court stated that a lawful *461 trade carried on in close proximity to a dwelling house could constitute a nuisance and that the test was whether the particular trade was of such a character as would be likely to be physically annoying to a person of ordinary sensibilities. ", "The distinction between nuisances per se and other nuisances was pointed out in Rogers v. John Week Lumber Co. (1903), 117 Wis. 5, 93 N. W. 821. ", "See Holman v. Mineral Point Zinc Co. (1908), 135 Wis. 132, 115 N. W. 327 (sulphuric-acid plant in close proximity to plaintiff's property); Anstee v. Monroe Light & Fuel Co. (1920), 171 Wis. 291, 177 N. W. 26 (gas plant from which smoke was so thick and odor so bad as to affect the comfort, if not the health, of the plaintiff). ", "In Dolata v. Berthelet Fuel & Supply Co. (1949), 254 Wis. 194, 36 N. W. (2d) 97, this court held that a business which necessarily impregnates the atmosphere with disagreeable, unwholesome, or offensive matter may become a nuisance to those occupying adjacent property when such property owners are substantially impaired in the comfort and enjoyment of their premises. ", "Smoke is not a nuisance per se, but smoke and soot and offensive odors may constitute a nuisance in fact when they interfere with the use and enjoyment by persons of ordinary sensibilities of their property.", "\nThe defendant contends the injunction should only enjoin him from operating the automobile-wrecking yard in such a manner that the burning operations would not constitute a nuisance to the public. ", "The difficulty with this argument is that the burning of automobiles is not a permitted use under the ordinance. ", "Furthermore, the defendant did not show that such burning of automobiles can be done without serious injury to these plaintiffs' use of their property. ", "Although the defendant has not burned automobiles since 1958, there is no evidence that he has permanently ceased burning automobiles. ", "The evidence indicates that he would continue to do so if not enjoined. ", "We believe the trial court correct in *462 granting the injunction enjoining the defendant from burning automobiles because it constituted a private nuisance. ", "An injunction looks to the future and it is the proper remedy to abate the contemplated acts when in the past similar acts have caused sufficient harm to the plaintiffs to constitute a nuisance.", "\nThe plaintiffs' brief exceeded 50 pages. ", "Permission is requested pursuant to Supreme Court Rule 10, sec. ", "251.264, Stats., ", "to tax costs for the additional pages. ", "We believe a brief of 50 pages would have been adequate to answer the defendant's brief even though it also exceeded 50 pages, and therefore permission to tax costs for the additional pages is not granted.", "\nBy the Court.—Judgment affirmed.", "\nNOTES\n[1] \"Such ordinances shall be enforced by appropriate fines and penalties. ", "Compliance with such ordinances may also be enforced by injunctional order at the suit of such county or the owner or owners of real estate within the district affected by such regulation.\"", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0007697164546698332, 0.0008159384597092867, 0.0007679986883886158, 0.0007963766693137586, 0.0006193187437020242, 0.000558149185962975, 0.0007236848468892276, 0.0007076301262713969, 0.0006396521348506212, 0.0007041730568744242, 0.0006527421646751463, 0.0005797178018838167, 0.0006308047450147569, 0.000692191009875387, 0.0008393339230678976, 0.0005838858778588474, 0.0005945649463683367, 0.0007280156714841723, 0.0006257037748582661, 0.0006257795612327754, 0.0006345664733089507, 0.000608757312875241, 0.0006126491934992373, 0.0006657943013124168, 0.0007575950003229082, 0.0006173913134261966, 0.000591244432143867, 0.0005707934615202248, 0.0010199234820902348, 0.00059705221792683, 0.0007884191581979394, 0.0006767854792997241, 0.0009439820423722267, 0.0006580062909051776, 0.0005690565449185669, 0.00557722756639123, 0.0008160955039784312, 0.0007564898114651442, 0.0006297013023868203, 0.007388616446405649, 0.000697766721714288, 0.0015680291689932346, 0.0013644249411299825, 0.000847480958327651, 0.0006486977799795568, 0.0006101885810494423, 0.0006313408957794309, 0.0005941109266132116, 0.000605873588938266, 0.0005911418702453375, 0.0005621794844046235, 0.0008597521227784455, 0.000722300261259079, 0.0006527421646751463, 0.0007654571090824902, 0.0020221436861902475, 0.000718481547664851, 0.0006526438519358635, 0.0008736986201256514, 0.0008629732183180749, 0.0006527421646751463, 0.001185585861094296, 0.0007142964750528336, 0.0006389928166754544, 0.000542474677786231, 0.0005999683053232729, 0.0007368929218500853, 0.0005730436532758176, 0.0006565360818058252, 0.0005654885317198932, 0.005082676652818918, 0.0005829764413647354, 0.0005636237910948694, 0.0006184734520502388, 0.0010003643110394478, 0.0005979206180199981, 0.0006244736141525209, 0.0005879857926629484, 0.0008582768496125937, 0.0011683522025123239, 0.000643814739305526, 0.0018658983753994107, 0.0008789388230070472, 0.0005681043257936835, 0.0007489423733204603, 0.0007036119350232184, 0.00117425003554672, 0.0010809205705299973, 0.0006569278775714338, 0.000633372226729989, 0.000598094251472503, 0.0008221532334573567, 0.0013028087560087442, 0.0009071757085621357, 0.0006746134022250772, 0.0007629748433828354, 0.0007287292974069715, 0.000997531577013433, 0.0008282902417704463, 0.0006745748687535524, 0.0011493739439174533, 0.0007513883174397051, 0.0007288192282430828, 0.0013671480119228363, 0.04982377961277962, 0.0010791452368721366, 0.004109770990908146, 0.0006633068551309407, 0.0007264342275448143, 0.0029032279271632433, 0.0012736431090161204, 0.0006676283665001392, 0.0016633588820695877, 0.0006275216583162546, 0.0008361361105926335, 0.0008869873126968741, 0.00475632818415761, 0.0006700630765408278, 0.02660283073782921, 0.13663926720619202, 0.000712560722604394, 0.0006500041927210987, 0.0007163402042351663, 0.0008236062130890787, 0.0008091647177934647, 0.00081066187703982, 0.02913712151348591, 0.0008510305779054761, 0.0009045308106578887, 0.0011220648884773254, 0.0007917013135738671, 0.0006413457449525595, 0.0006504466873593628, 0.0006900112493894994, 0.000601425941567868, 0.0006507855141535401, 0.0007122789393179119, 0.0008772137225605547, 0.000551793200429529, 0.0006467701168730855, 0.0006077007274143398, 0.0006432042573578656, 0.001995444530621171 ]
0.002632
143
[ "Thank you for responding to this Weblog (blog). ", "We wish to maintain a high level of integrity and responsibility among our participants.", "\nIn the spirit of camaraderie of the blogsphere, interested parties are welcomed to reproduce or quote materials published in this weblog WITH THE CONDITION that they are credited to akadirjasin.blogspot.com/akadirjasin.com to avoid misunderstanding.", "Thank you.", "\n\nTo be honest, Zaid's take on Pakatan's PM candidate actually makes sense. ", "The country's elections ever since the independence almost always decided by the voters living in rural areas together with the Felda settlers. ", "The only way to make them sway towards Pakatan Harapam is to nominate Mahathir as their candidate for prime minister post. ", "I'm afraid there's no other way.", "\n\nPakatan have to be strategic in their thinking. ", "At the moment they are too idealistic. ", "The country's real-politic don't work that way. ", "If you're refusing to acknowledging this reality, you're forever doomed. ", "Please do not let your egos and prides clouded your judgments. ", "Please get real otherwise you're forever being in the opposition.", "\n\nNot being able to this fact will make them blind of what need to be done in order to defeat Umno BN and form the government. ", "What's actually on Pakatan's mind when they trying to propose Wan Azizah as top choice? ", "Let's be honest she does not quite have it. ", "She's too lighweight. ", "She is not like her husband. ", "She doesn't the touch, the charisma to sway the hearts and minds of the Malays voters. ", "Especialy those in the rural areas. ", "Mahathir has that.", "\n\nIn short she doesn't have enough clout to move the 'Malay's mountain'. ", "To do that you gonna need someone of great stature. ", "Someone massive, a heavyweight whose able to land mighty punches to the target. ", "That someone is no other than Mahathir. ", "Even Muhyiddin and Mukhriz will not make the cut. ", "They won't be able to sway the Malay voters let alone Wan Azizah or Azmin or even Mat Sabu. ", "In order to capture Putrajaya Pakatan needs Mahathir magic.", "\n\nWithout him there's no way Umno can be defeated. ", "Love him or hate him, there's no other way. ", "If Pakatan doesn't trust him, at the moment, he is indispensable to the opposition. ", "He's highly instrumental to energize the Malays' psyche towards massive and all around change of heart. ", "The biggest change in their lives. ", "Without Mahathir's presence they will not budge.", "\n\nPakatan don't have much time left. ", "They have to be quick. ", "To come out with their PM's candidate. ", "They can't afford to waste any more time. ", "The clock is ticking. ", "They need to start now. ", "Malays' core sentiment are not easy to stir. ", "It takes time. ", "The sooner you start, you will stand a better chance. ", "Just name Mahathir as your candidate. ", "That's all.", "\n\nIf you choose Mahathir, Malays votes in rural areas and the Felda settlers are already in the bag. ", "The rest are just an icing on the cake.", "\n\n\"God allows something BAD to happen so that GOOD can prevail from it.", "\"-Unknown\n\n\"Having 'Knowledge' will give you power,but having 'Character' will grant you respect.", "\"-Bruce Lee\n\n\"Difference between a criminal act and IQ deficiency; one is a legal problem while the other is a medical issue.", "\"-Unknown\n\n\"I believe in the brotherhood of man, all men, but I don't believe in brotherhood with anybody who doesn't want brotherhood with me. ", "I believe in treating people right, but I'm not going to waste my time trying to treat somebody right who doesn't know how to return the treatment.", "\"-Malcolm X\n\n\"Progress is the activity of today and the assurance of tomorrow.", "\"-Unknown\n\n\"If you can't just explain it simply,means you don't understand it well enough.", "\"-Albert Einstein\n\n\"There are 2 ways to be fooled.", "One is to believe what is not true;Two is to refuse to accept what is true.", "\"-Soren KierKegaard\n\nWRITING for The Malaysian Insight, Jahabar Sadiq asked a simple question that deserves an appropriate answer: Why does Parti Pribumi Bersatu Malaysia (Bersatu) harp on 1MDB, when the 2,881 respondents in an internal poll have stated that their number one concern is the increasing cost of living?", "\n\nFirst of all, Bersatu is not the only party \"harping\" on 1MDB. ", "Tuan Ibrahim of PAS has raised the issue. ", "DAP has, of course, highlighted it the most through Tony Pua. ", "But, as the author correctly noted, even Anwar Ibrahim had raised it in 2010, before the job was taken over by Rafizi Ramli in PKR. ", "In other words, all parties are raising the issue and this includes, first and foremost, some members of Umno.", "\n\nDr Mahathir Mohamad, Muhyiddin Yassin and Mukhriz Mahathir had all raised within the internal structure of the party. ", "But to no avail. ", "Thus, Bersatu was formed to check the rot in Umno and the stain that the latter has left on the honour and dignity of the Malays.", "\n\nSecondly, the gargantuan size of the issue does not allow one to remain impervious to it. ", "The author said that the average or rural voters cannot compute or comprehend anything in the billions of ringgit. ", "Dr Mahathir has raised the same point too. ", "But he has not given up, precisely because the voters fail to understand. ", "It was now his duty to make them see the gravity of the situation.", "\n\nThe job of exposing systemic and scurrilous corruption cannot be left solely to the countries that are investigating the financial malfeasance. ", "As the author may note, there are six (or more) ongoing investigations into 1MDB. ", "If this issue had been left to the device of \"outsiders” only, wherein the pride of Malaysians? ", "In fact, the whole of the country would stand accused of being cavalier with high larceny.", "\n\nThirdly, The Malaysian Insider then, has gained a strong following by exposing 1MDB almost on a daily basis in 2015. ", "It didn't seem to lose any readers and followers. ", "In fact, it is on this basis that it was probably bought over by The Edge, before it reincarnated as The Malaysian Insight. ", "Has the new online portal dropped 1MDB? ", "No. ", "It can't. ", "Precisely because this is an issue of serious national importance, with grave ramifications. ", "If 1MBD does not rationalise its debts – and it doesn't seem like it can – Malaysian taxpayers would be looking at paying picking up the tab of RM43 billion or more.", "\n\nGranted that no one in Malaysia has been held criminally responsible, it is all the more vital to focus on the 1MDB issue. ", "Perhaps the presentation to the people needs to be simplified given the complexity of 1MDB story involving a web of extra-territorial and international financial and non-financial institutions. ", "Perhaps some Phd candidate in the field of finance, financial crime or even strategy should take up a research on this web of deceitful financial interplay.", "\n\nFourth, since when is the focus on 1MDB a zero sum game? ", "By latching onto 1MDB, since when did Bersatu forgo other issues? ", "It didn't, and it won’t. ", "In fact, in the history of all political parties in Malaysia, none has resorted to using focus groups and opinion surveys right from the very inception of the party to understand the \"voice of the people.\"", "\n\nBersatu has done just that. ", "It has canvassed the views of thousands of voters in order to warn Umno of its egregious violation of the fiduciary and financial rights of the Malaysian taxpayers. ", "That shows Bersatu is truly a people’s movement that has evolved into a political party with very specific aims and objectives as enshrined in its constitution.", "\n\nFifth, granted that the financial malfeasance of 1MDB is due to the financial ineptness of the Malaysian prime minister cum financial minister, indeed, cum public official as alleged, isn't it only apt to hold him to account, as he has failed in all three portfolios, as alleged? ", "As the prime Minister, his dereliction of duties, as alleged, suggests a sheer indifference to corruption that had affected the entire fifth and fourth floor of his office, if not Umno in its entirety.", "\n\nAs the sitting finance minister, some RM44 billion or more is allegedly now the debt of Malaysia's sovereign fund that is 1MDB. ", "If Khazanah, the sovereign fund of Malaysia, had mismanaged the funds, wouldn't heads be rolling now? ", "Yes, they would. ", "But in the case of 1MDB, there has been zero culpability and accountability. ", "Instead those who had wanted to initiate investigations into 1MDB had been either sacked, transferred or, in one case, even transferred to the Prime Minister’s Office. ", "Done with such arrogated impunity.", "\n\nLast but not least, the debt of 1MDB could have been used to build basic amenities for the poor and under privileged people in Malaysia, without reference to race, creed and colour. ", "Yet, instead of using the money to defray the economic pain and burden of the average Malaysian, the US Department of Justice investigations alone show that they splurged – yes, splurged – on art pieces, paintings, obscene movies, fancy condominiums in New York and elsewhere. ", "If this is not conspicuous corruption and money laundering, both of which impact the living standards of the average Malaysian, what is?", "\n\nA media portal like The Malaysian Insight can serve Malaysia by focusing on, among others, issues of corruption, malfeasance, abuse of power, and grand larceny. ", "It does itself a disservice by resorting to telling Bersatu – and by logical extension, other parties – to drop the issues from their agenda and re-education campaign. ", "If anything, The Malaysian Insight should ask if there is anything it can do to help the Malaysian voters, both rural and urban, to understand the severity of the 1MDB problem. ", "It is important that the rural voters, and that includes the Felda settlers, be told of what is happening in 1MDB in a simplified manner. ", "Telling them about the Islamic Medium Term Notes that 1MDB had issued may not be the way to do it.", "\n\nBersatu is willing to convene a cross party dialogue, with The Malaysian Insight in attendance, on why this issue can and will break Umno-led Barisan National (BN). ", "Perhaps the author is right in suggesting that the average voter cannot comprehend the magnitude and scale of the alleged state-sponsored heist when it crosses the billion ringgit threshold, but the ongoing explanation cannot just stop. ", "In fact, as the survey has showed, many of them are not sure about or do not understand the 1MDB issues. ", "It is incumbent upon us, all parties and the media, to explain the issues in a more simplified way, as Dr Mahathir, Muhyddin and Mukhriz have done after the survey.", "\n\nThe education system in Malaysia, weak as it is, still teaches students to differentiate between thousands and millions. ", "All the students need to do to undestand is to break the figures up decimally. ", "Thus, RM44 billion would be 440 times of RM100 million; or 4,400 times of 10 million; or 44,000 times of one million; 440,000 times of 100,000; or 4,400,000 of 10,000; or 44,000,000 of 1,000.", "\n\nWhichever the permutation, the Malaysian prime minister doesn't care. ", "Had he done so, he would have spent the money in any one of the combination above in building better schools, hospitals, and universities. ", "This 1MDB debacle is actually a huge \"corruption tax\" that the people need to bear, through no fault of theirs except in voting for Barisan Nasional. – ", "May 11, 2017.", "\n\nDr Rais Hussin Mohamed Ariff is a Bersatu Supreme Council member and the Bersatu policy and strategy bureau head.", "\n\nAbout Me\n\nI was born in 1947 in Kedah. ", "I came from a rice farming family. ", "I have been a journalist since 1969. ", "I am the Editor-in-Chief of magazine publishing company, Berita Publishing Sdn Bhd. ", "I was Group Editor NST Sdn Bhd and Group Editor-in-Chief of NSTP Bhd between 1988 and 2000. ", "I write fortnightly column “Other Thots” in the Malaysian Business magazine, Kunta Kinte Original in Berita Harian and A Kadir Jasin Bercerita in Dewan Masyarakat. ", "Books: Biar Putih Tulang (1998), Other Thots – Opinions & Observations 1992-2001 (2001), The Wings of an Eagle (2003), Mencari Dugalia Huso (2006), Damned That Thots (2006), Blogger (2006), PRU 2008-Rakyat Sahut Cabaran (2008), Komedi & Tragedi-Latest in Contemporary Malaysian Politics (2009) and Membangun Bangsa dengan Pena (2009)." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005126865580677986, 0.0005212115938775241, 0.0006008698255755007, 0.0005551139474846423, 0.0006358542013913393, 0.0005390761652961373, 0.004034713376313448, 0.0008126387256197631, 0.0013739772839471698, 0.0007038295152597129, 0.0008061209227889776, 0.187886580824852, 0.00538999680429697, 0.005145976319909096, 0.012278242036700249, 0.0007717777043581009, 0.0007252686191350222, 0.8364545106887817, 0.0892290249466896, 0.0022766785696148872, 0.0006799974362365901, 0.0007193955243565142, 0.002155025489628315, 0.000577365979552269, 0.023585529997944832, 0.0009823663858696818, 0.0014830160653218627, 0.001286770449951291, 0.0013014482101425529, 0.0023010678123682737, 0.0239853672683239, 0.0011698177549988031, 0.0007051830762065947, 0.0010430624242872, 0.0013856085715815425, 0.0014297052985057235, 0.0019294938538223505, 0.0011005013948306441, 0.01741957664489746, 0.004284530412405729, 0.0011456644861027598, 0.000680840399581939, 0.0006494004628621042, 0.0007858496974222362, 0.0008606537594459951, 0.0010915009770542383, 0.0007249518530443311, 0.005480690859258175, 0.0012851402861997485, 0.0005603621830232441, 0.0009932501707226038, 0.0007170601165853441, 0.000909864844288677, 0.0006486822385340929, 0.000632148643489927, 0.0008168960921466351, 0.001485357410274446, 0.0006055606645531952, 0.0008055760990828276, 0.0006506877834908664, 0.0006298690568655729, 0.0005761530483141541, 0.000602626008912921, 0.0007550842710770667, 0.0008375411271117628, 0.006597983185201883, 0.005150548182427883, 0.0008989349007606506, 0.0005709155811928213, 0.0009857603581622243, 0.0007383261690847576, 0.0016886844532564282, 0.0005363119416870177, 0.000999217969365418, 0.007578765042126179, 0.0005865146522410214, 0.0007888151449151337, 0.0006149517721496522, 0.0008548830519430339, 0.0013785817427560687, 0.0009143126662820578, 0.0006355243385769427, 0.0008750673732720315, 0.000572689576074481, 0.0005337196053005755, 0.0006270126323215663, 0.001137882936745882, 0.0007508976850658655, 0.0008755432208999991, 0.00056597706861794, 0.0007209070608951151, 0.000936046417336911, 0.0007079670904204249, 0.0031139645725488663, 0.0008782458025962114, 0.0006432498921640217, 0.000696678995154798, 0.0009215103927999735, 0.0006459138821810484, 0.0006207588594406843, 0.002587504219263792, 0.0011621065204963088, 0.0019085064996033907, 0.0007726817857474089, 0.0009394017979502678, 0.0010091507574543357, 0.0005289689870551229, 0.0005343226948752999, 0.0005544536979869008, 0.000719911593478173, 0.0008220529416576028, 0.0006065943744033575, 0.0005617819842882454, 0.0018254539463669062, 0.0007739165448583663, 0.000894532015081495, 0.007846168242394924, 0.0008727529202587903, 0.0025224534329026937, 0.0007526270346716046, 0.0008770552813075483, 0.0006868011550977826, 0.0007030358538031578, 0.0006291664903983474, 0.0006739868549630046, 0.0006713604088872671, 0.0009832479991018772, 0.0034318033140152693 ]
0.010546
128
[ "#!", "/bin/bash\n\nfunction refresh {\n\t[[ ! ", "$1 || ! ", "$2 ]] && help_err refresh\n\tlocal threshhold=$1\n\tlocal castle=$2\n\t# repos is a global variable\n\t# shellcheck disable=SC2154\n\tlocal fetch_head=\"$repos/$castle/.git/FETCH_HEAD\"\n\tpending 'checking' \"$castle\"\n\tcastle_exists 'refresh' \"$castle\"\n\n\tif [[ -e $fetch_head ]]; then\n\t\tlocal last_mod\n\t\tlast_mod=$(stat -c %Y \"$fetch_head\" 2> /dev/null || stat -f %m \"$fetch_head\")\n\t\tif [[ $((T_START-last_mod)) -gt $threshhold ]]; then\n\t\t\tfail \"outdated\"\n\t\t\treturn \"$EX_TH_EXCEEDED\"\n\t\telse\n\t\t\tsuccess \"fresh\"\n\t\t\treturn \"$EX_SUCCESS\"\n\t\tfi\n\telse\n\t\tfail \"outdated\"\n\t\treturn \"$EX_TH_EXCEEDED\"\n\tfi\n}\n\nfunction pull_outdated {\n\tlocal threshhold=$1; shift\n\tlocal outdated_castles=()\n\twhile [[ $# -gt 0 ]]; do\n\t\tlocal castle=$1; shift\n\t\tlocal repo=\"$repos/$castle\"\n\t\tif [[ ! ", "-d $repo ]]; then\n\t\t\t# bogus argument, skip. ", "User has already been warned by refresh()\n\t\t\tcontinue\n\t\tfi\n\t\tlocal fetch_head=\"$repo/.git/FETCH_HEAD\"\n\t\t# When in interactive mode:\n\t\t# No matter if we are going to pull the castles or not\n\t\t# we reset the outdated ones by touching FETCH_HEAD\n\t\tif [[ -e $fetch_head ]]; then\n\t\t\tlocal last_mod\n\t\t\tlast_mod=$(stat -c %Y \"$fetch_head\" 2> /dev/null || stat -f %m \"$fetch_head\")\n\t\t\tif [[ $((T_START-last_mod)) -gt $threshhold ]]; then\n\t\t\t\toutdated_castles+=(\"$castle\")\n\t\t\t\t! ", "$BATCH && touch \"$fetch_head\"\n\t\t\tfi\n\t\telse\n\t\t\toutdated_castles+=(\"$castle\")\n\t\t\t! ", "$BATCH && touch \"$fetch_head\"\n\t\tfi\n\tdone\n\task_pull \"${outdated_castles[@]}\"\n\treturn \"$EX_SUCCESS\"\n}\n\nfunction ask_pull {\n\tif [[ $# -gt 0 ]]; then\n\t\tif [[ $# == 1 ]]; then\n\t\t\tmsg=\"The castle $1 is outdated.\"", "\n\t\telse\n\t\t\tOIFS=$IFS\n\t\t\tIFS=,\n\t\t\tmsg=\"The castles $* are outdated.\"", "\n\t\t\tIFS=$OIFS\n\t\tfi\n\t\tif prompt_no 'refresh' \"$msg\" 'pull?'; ", "then\n\t\t\t# shellcheck source=lib/commands/pull.sh disable=SC2154\n\t\t\tsource \"$homeshick/lib/commands/pull.sh\"\n\t\t\tfor castle in \"$@\"; do\n\t\t\t\tpull \"$castle\"\n\t\t\tdone\n\t\tfi\n\tfi\n\treturn \"$EX_SUCCESS\"\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.01251957006752491, 0.0013506029499694705, 0.0029924034606665373, 0.002999507822096348, 0.013327328488230705, 0.0014702050248160958, 0.0010755745461210608, 0.0018143255729228258, 0.0040336172096431255, 0.0032310346141457558, 0.0010519379284232855 ]
0.00417
11
[ "Biological markers as outcome measures for Alzheimer's disease interventions--real problems and future possibilities.", "\nBecause the biological pathological process is observed decades years before the clinical onset of Alzheimer's disease (AD), there is a theoretical ad-vantage in using biological markers for the early diagnosis of AD. ", "Neuro-psychological test batteries, brain imaging and biological markers are expected to be used for screening and differential diagnosis of dementia and also for evaluation of the efficacy of early intervention. ", "No single biological marker can serve all the purposes of screening, differential diagnosis and measurement of severity. ", "Biological markers that reflect molecular stress, such as oxidative, ribotoxic, and nitroso stress, need to be developed, particularly for measuring the clinical outcomes of interventions. ", "As well as providing a better understanding of the molecular pathogenesis of AD, there is a possibility of finding a surrogate marker of AD, which might fulfill the requirement of sufficient sensitivity and specificity for AD diagnosis, as well as indicating the disease-modifying activity of interventions. ", "In this study we examine whether the mechanism of secretase activity will offer a new surrogate marker of AD." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0005845340201631188, 0.0005881718825548887, 0.0006845930474810302, 0.0006179941119626164, 0.0005574912647716701, 0.0005248321685940027, 0.0005609737709164619 ]
0.000588
7
[ "Expression and purification of human endostatin from Hansenula polymorpha A16.", "\nEndostatin (EDN), an endogenous angiogenesis inhibitor of 20 kDa, was originally isolated from the supernatant of culture murine hemangioendothelioma cell line. ", "Interest in EDN arises from its therapeutic potential as anti-tumor and anti-angiogenesis agents. ", "However, it is difficult to obtain sufficient quantities of native EDN from its natural resources. ", "We report here the construction of a pMIRH-type vector pLRG29 by introducing the 25s rDNA of Hansenua wingei and the Km(R) gene into the YIp vector pSML12 and the EDN expression vector pLRG-EDN by cloning the human EDN cDNA into pLRG29. ", "Human EDN was expressed in Hansenula polymorpha (H.p.) ", "A16 (pLRG-EDN) as a secreted soluble protein. ", "The yield of the secreted EDN was 65 mg/L in shake flask. ", "The secreted EDN was purified to a purity of 98 % by the use of SP Sepharose FF ion-exchange chromatography and Sepharose-heparin Hi Trap affinity chromatography. ", "The MTT and chicken embryo chorioallantoic membrane assay demonstrated that the human EDN produced from H. polymorpha inhibited in vitro the proliferation of human umbilical vein endothelial cells and in vivo the neovascularization induced by bFGF." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.000781217881012708, 0.0009243758395314217, 0.0006234869943000376, 0.0006848970660939813, 0.0006266643758863211, 0.0008179265423677862, 0.0006291832542046905, 0.0007385981734842062, 0.0015288623981177807, 0.0010948051931336522 ]
0.000845
10
[ "Role of shear stress in the blister formation of cerebral aneurysms.", "\nThe development of cerebral aneurysms is related to hemodynamic stress. ", "To elucidate the role of shear stress in the blister formation of cerebral aneurysms. ", "Among 82 aneurysms detected during catheter-based 3D rotational angiography (3DRA), 4 aneurysms enlarged with blister formation during a mean follow-up period of 10.1 month. ", "Three of these 4 aneurysms were analyzed in this study. ", "The regions of blister formation were characterized by comparing 3DRA before and after blister formation, and computational fluid dynamic simulations were performed based on the aneurysm geometry before blister formation. ", "The spatially averaged shear magnitude was lower in the aneurysm region (0.97 ± 0.39 Pa) than in the parent artery (2.75 ± 0.92 Pa). ", "The spatially averaged shear magnitude of the blister-forming area was extremely low (0.48 ± 0.12 Pa), and the shear magnitude dropped precipitately to subphysiological levels, resulting in a high shear gradient near the border of the blister-forming area. ", "These data suggest that low shear magnitude may trigger the progression of cerebral aneurysms and that blister formation is associated with high shear gradient in the large region of low shear magnitude on the aneurysm wall." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0010195401264354587, 0.0009685935219749808, 0.0008828759309835732, 0.0008299276232719421, 0.0008224655175581574, 0.0006293790647760034, 0.0006924974150024354, 0.0007337098941206932, 0.0007721356232650578 ]
0.000817
9
[ "Schnitzelmitkartoffelsalat\n\nSchnitzelmitkartoffelsalat (literally \"Schnitzelwithpotatosalad\", schnitzel with potato salad) is a German phrase that is used to test the operations of search engines and the methods of search engine optimization. ", "It was first mentioned on 15 November 2002 by Steffi Abel in the newsgroup de.comm.infosystems.www.authoring.misc, in a proposal to use it for what became the first recorded SEO contest. ", "The phrase was chosen for being arbitrary and having not appeared in the Google index up to that point.", "\n\nThe goal was to examine the way Google read different types of HTML construction. ", "Eventually, it became used in an unofficial contest to see which sites could receive the higher rankings. ", "It has also become a synonym for expressions that cannot yet be found in search engine indexes.", "\n\nA new expression in an April 2005 contest is Hommingberger Gepardenforelle.", "\n\nResults in different search engines\n\nSee also \n Nigritude ultramarine\n\nExternal links \n Discussion in de.comm.infosystems.www.authoring.misc\n \n\nCategory:Google Search\nCategory:German words and phrases" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0020814023446291685, 0.0005789284477941692, 0.0006012866506353021, 0.0005852185422554612, 0.0006063773180358112, 0.0006934606935828924, 0.0006746741710230708, 0.0006471435190178454 ]
0.000809
8
[ "While the recent buzz on Bitcoin and Ethereum has gone cold as of late, Ripple has quietly been making quite a run within mainstream circles. ", "Making fast friends within the banking industry of late, Ripple is starting to make an impact and may offer a future alternative to established global trading icons like SWIFT. ", "However, something happened Monday morning that has never happened before in the history of Ripple. ", "Here what we know so far.", "\n\nTrading doubles within a half an hour\n\nAccording to CoinMarketCap, Ripple has reached a new all-time market capitalization high in early Monday morning trading, or Sunday night if you are in the West. ", "In one hour, Ripple trading volumes went from $3.25 million to over $8 million, pushing the market cap to a new record of over $1.25 Billion.", "\n\nHowever, Ripple trading on September 15th, 2016 reached higher levels, rates of over $22M, and Ripple’s values did not increase nearly this dramatically. ", "Crypto Compare does corroborate that Ripple trading levels did spike Sunday/Monday.", "\n\nThis story is developing and we will learn more as the day and week progresses, but there is one theory that may explain it, depending on their influence. ", "Crypto Facilities out of London has released information on a Ripple/XRP Futures/Derivatives trading platform that will launch on Tuesday morning. ", "Here is part one of their five-part tweet on the subject.", "\n\n1/5 Documentation for XRP Futures now available on https://t.co/7wbSJPuTss, trading to launch Tuesday 11th, 8:00 am UTC — CryptoFacilitiesLtd (@CryptoFLtd) October 9, 2016\n\nGiven that the primary volume buyers of Ripple at this point seem to be banks, and we all know the affinity bankers have for trading derivatives, this could explain the phenomenon. ", "For a detailed description of their new platform, click here. ", "Potentially, the bankers got wind of the new system and are moving in on it.", "\n\nRipple recently made news with their new Global Payments Steering Group (GPSG) that seeks to create a global bankers’ network that works off of proprietary Blockchain. ", "The banks involved include Bank of America/Merrill Lynch, Santander, UniCredit, Standard Chartered, Westpac Banking Corporation, and Royal Bank of Canada.", "\n\nTime will tell if this is a new sustainable market value for Ripple, but it appears that it has made quite an impression on the institutional market. ", "We’ll update this story as it progresses.", "\n\nUPDATE:\n\nWhen Cointelegraph contacted CoinMarketCap about this, this was their official response, discussing their use of “payroutes” in establishing their metrics:\n\nThe Ripple Charts API was (and still is) reporting a price of $0.25 from one of the higher volume exchanges, Payroutes, which throws of the weighted average of;our Ripple price.", "We've disabled that feed for now to correct the price. ", "There isa forum post on xrpchat that might help explain it more in detail.", "\n\nOn XRPChat.com, the speculation is rampant. ", "Poster zero-2-9 sees the following possibility for the Ripple situation:\n\n\"The issue is that Coinmarketcap includes a gateway that issues USD (in this case USD.payroutes) that is valued a lot lower than USD from gateways that deserve more trust (e.g. Gatehub, Bitstamp). ", "One USD.gatehub = 40 USD.payroutes currently. ", "If you include the Payroutes price in your average USD/XRP price, then you get a distorted view.\"" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0008173056412488222, 0.0005618923460133374, 0.000625243061222136, 0.0006118602468632162, 0.0005681249313056469, 0.0005754236481152475, 0.0005935791414231062, 0.0008344380185008049, 0.000520773814059794, 0.0005873890477232635, 0.0009560949401929975, 0.0005680380272679031, 0.0005334088345989585, 0.0005990791833028197, 0.0006657546618953347, 0.0005951282219029963, 0.0005535805830731988, 0.0005494132055900991, 0.0005822123493999243, 0.0014799308264628053, 0.0005928718019276857, 0.0008939015679061413, 0.0005797949270345271, 0.0007161699468269944, 0.0007042032666504383 ]
0.000675
25
[ "Here is the first look at the new MSI Lightning.", "\n\nMSI is slowly preparing R9 290X and GTX 780 Ti Lightning cards. ", "Today I share with you pictures of the first custom R9 290X board. ", "So how do we know it’s R9 290X? ", "Well it has the same memory layout and missing CrossFire fingers. ", "That should be enough for a proof.", "\n\nAssuming that this a final PCB revision then MSI R9 290X Lightning would require two 8-pin power connectors and one 6-pin power connector. ", "I think that’s quite a lot of power to be delivered to one card only. ", "It also seems like R9 290X Lightning would feature 12+3+2 phase power design. ", "That said the PCB is very much alike to GTX 480 Lightning, which had 6-pin power connector devoted to memory.", "\n\nLast but not least MSI will provide V-Check points to allow direct measurement of GPU, memory and auxiliary lines voltages. ", "I could also mention Military Class IV components, but since there aren’t any on the picture I don’t think that’s necessary.", "\n\nOn a contrary to R7970 Lightning, R9 290X will be equipped with a default set of display outputs: two DVIs, HDMI and DisplayPort.", "\n\nBased on what MSI told me I expect MSI R9 290X Lightning to be released early next year." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0007266214233823121, 0.00071546999970451, 0.0005413760663941503, 0.0007450595148839056, 0.0006622772198170424, 0.0011950054904446006, 0.0008142801816575229, 0.0006394190131686628, 0.0006452694069594145, 0.0007777575519867241, 0.0006017928826622665, 0.0005711918347515166, 0.0008272786508314312, 0.0006654952303506434 ]
0.000723
14
[ "[Interaction between neutrophils and endothelial cells following ischemia/reperfusion].", "\nThe adherence of activated neutrophils to endothelial cells during ischemia/reperfusion injury is mediated by inside-out signal transduction. ", "Subsequently, outside-in signal transduction occurs following ligation of adhesion molecules with their ligands triggering respiratory bursts of neutrophils. ", "In addition, neutrophil elastase enhances CC- and CXC-chemokine production by monocytes and macrophages. ", "MCP-1, a CC-chemokine, enhances tissue factor production by macrophages and increases ICAM-1 expression on endothelial cells. ", "Chemotaxis and respiratory bursts of neutrophils are augmented by CXC-chemokines. ", "Furthermore, neutrophil elastase inactivates anticoagulants including antithrombin III, heparin cofactor II, and thrombomodulin, suggesting that neutrophil elastase aggravates microcirculatory disturbance after ischemia/reperfusion. ", "Thus neutrophil elastase modulates the interation of neutrophils and endothelial cells during ischemia/reperfusion injury. ", "Taken together with these observations, a therapeutic regimen with antibodies against adhesion molecules in combination with neutrophil elastase inhibitor and anticoagulants may attenuate ischemia/reperfusion injury." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.001215650700032711, 0.0012527829967439175, 0.000897925638128072, 0.004545505158603191, 0.002063651569187641, 0.005524083506315947, 0.004328181967139244, 0.0022853980772197247, 0.0007401701295748353 ]
0.002539
9
[ "The need for miniaturized power sources for micro-electro-mechanical systems (MEMS) and micro-electronics has long been recognized. ", "Much work has already been done on micro-scale batteries, and micro-scale heat engines. ", "Micro-scale heat engines are a particularly attractive option, because of the very high density energy storage afforded by the hydrocarbon fuels they burn. ", "Thus, a micro-heat engine which could convert the chemical energy stored in a hydrocarbon fuel to mechanical or electrical energy could form the basis of a very compact power supply.", "\nAttempts to construct a micro-heat engine have been directed to redesigning the hardware for conventional large-scale heat engines to be fabricated on the micro-scale. ", "So far, these attempts are still in the developmental stages and have not yet proven to be successful.", "\nAlthough not true heat engines, thermally driven devices have been constructed on the micro-scale. ", "In one such device, water contained in a cavity, when heated, pushes a drive shaft. ", "Upon cooling, the water condenses and the capillary action of the liquid pulls the drive shaft back in. ", "However, because the device uses electrical power to heat and vaporize the working fluid and because there is no provision to cyclically heat and cool the working fluid, the device functions as an actuator, not as a true heat engine. ", "Other thermally driven actuators rely on the thermal expansion of solids, or the change in shape of so-called shape-memory alloys to exert forces over small distances. ", "Again, these devices are not true heat engines because they do not operate cyclically, and they do not transform thermal energy into mechanical or electrical power.", "\nPiezoelectric thin films have been used for years as power transducers in MEMS and micro-electronic devices. ", "Piezoelectric films are an attractive option for power transduction because of the relative ease with which such devices can be produced using conventional micro-machining methods. ", "Generally speaking, micro-machining involves processing techniques, such as micro-lithography and etching, that were developed and refined for use in the manufacture of integrated circuits. ", "Micro-machining allows fine control of dimensions and is commonly employed for producing parts from silicon. ", "However, micro-machining is not restricted in its application to the formation of workpieces from silicon or other materials conventionally used in the manufacture of integrated circuits, and it is known to apply micro-machining to other materials.", "\nIn most applications of piezoelectric films, such as in micro-actuators, pumps and valves, electrical power is converted to mechanical power. ", "Micro-sensors that utilize piezoelectric films also have been used for mechanical to electrical transduction, however, such devices are not capable of producing usable electrical power to any significant degree. ", "Thus, it would be desirable to utilize piezoelectric thin films for converting energy in one form, such as thermal energy or kinetic energy, to useful electrical energy to power MEMS and micro-electronic devices.", "\nAlong with the need for miniaturized power sources is the need for micro-devices that are designed to remove heat from MEMS and micro-electronics. ", "In particular, integrated circuit manufacturers are already reaching limits on micro-processor speed and performance imposed by high operating temperatures. ", "Consequently, reducing chip operating temperatures by removing waste heat through active cooling is considered to be among the most promising strategies available to the micro-processor industry for overcoming these obstacles. ", "Thus, it would be desirable to implement a piezoelectric film in a micro-heat pump for cooling applications of MEMS and micro-electronics.", "\nTherefore, there exists a strong need for piezoelectric micro-transducers for use with MEMS and micro-electronic devices." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0006158550386317074, 0.0006078496226109564, 0.0005644459743052721, 0.0006420824793167412, 0.0005989869823679328, 0.0006435196846723557, 0.0005886200233362615, 0.0008765282109379768, 0.0007985829724930227, 0.0008193467510864139, 0.0007146944990381598, 0.0007530528237111866, 0.0006734561175107956, 0.0006456102128140628, 0.0006106418441049755, 0.0006681739469058812, 0.0006032055243849754, 0.0006888689822517335, 0.0006555376457981765, 0.0006274519837461412, 0.0007151274476200342, 0.0005851348978467286, 0.0006076990975998342, 0.0006134628201834857, 0.0006471875822171569 ]
0.000663
25
[ "package mgo\n\nimport (\n\t\"testing\"\n\t\"time\"\n\n\t\"github.com/go-playground/locales\"\n\t\"github.com/go-playground/locales/currency\"\n)\n\nfunc TestLocale(t *testing.", "T) {\n\n\ttrans := New()\n\texpected := \"mgo\"\n\n\tif trans.", "Locale() !", "= expected {\n\t\tt.Errorf(\"Expected '%s' Got '%s'\", expected, trans.", "Locale())\n\t}\n}\n\nfunc TestPluralsRange(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\trules := trans.", "PluralsRange()\n\t// expected := 1\n\t// if len(rules) !", "= expected {\n\t// \tt.Errorf(\"Expected '%d' Got '%d'\", expected, len(rules))\n\t// }\n\n\tfor _, tt := range tests {\n\n\t\tr := locales.", "PluralRuleUnknown\n\n\t\tfor i := 0; i < len(rules); i++ {\n\t\t\tif rules[i] == tt.expected {\n\t\t\t\tr = rules[i]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif r == locales.", "PluralRuleUnknown {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, r)\n\t\t}\n\t}\n}\n\nfunc TestPluralsOrdinal(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \texpected: locales.", "PluralRuleOne,\n\t// },\n\t// {\n\t// \texpected: locales.", "PluralRuleTwo,\n\t// },\n\t// {\n\t// \texpected: locales.", "PluralRuleFew,\n\t// },\n\t// {\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\trules := trans.", "PluralsOrdinal()\n\t// expected := 4\n\t// if len(rules) !", "= expected {\n\t// \tt.Errorf(\"Expected '%d' Got '%d'\", expected, len(rules))\n\t// }\n\n\tfor _, tt := range tests {\n\n\t\tr := locales.", "PluralRuleUnknown\n\n\t\tfor i := 0; i < len(rules); i++ {\n\t\t\tif rules[i] == tt.expected {\n\t\t\t\tr = rules[i]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif r == locales.", "PluralRuleUnknown {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, r)\n\t\t}\n\t}\n}\n\nfunc TestPluralsCardinal(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \texpected: locales.", "PluralRuleOne,\n\t// },\n\t// {\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\trules := trans.", "PluralsCardinal()\n\t// expected := 2\n\t// if len(rules) !", "= expected {\n\t// \tt.Errorf(\"Expected '%d' Got '%d'\", expected, len(rules))\n\t// }\n\n\tfor _, tt := range tests {\n\n\t\tr := locales.", "PluralRuleUnknown\n\n\t\tfor i := 0; i < len(rules); i++ {\n\t\t\tif rules[i] == tt.expected {\n\t\t\t\tr = rules[i]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif r == locales.", "PluralRuleUnknown {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, r)\n\t\t}\n\t}\n}\n\nfunc TestRangePlurals(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\tnum1 float64\n\t\tv1 uint64\n\t\tnum2 float64\n\t\tv2 uint64\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \tnum1: 1,\n\t// \tv1: 1,\n\t// \tnum2: 2,\n\t// \tv2: 2,\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\trule := trans.", "RangePluralRule(tt.num1, tt.v1, tt.num2, tt.v2)\n\t\tif rule !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, rule)\n\t\t}\n\t}\n}\n\nfunc TestOrdinalPlurals(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \tnum: 1,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleOne,\n\t// },\n\t// {\n\t// \tnum: 2,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleTwo,\n\t// },\n\t// {\n\t// \tnum: 3,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleFew,\n\t// },\n\t// {\n\t// \tnum: 4,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\trule := trans.", "OrdinalPluralRule(tt.num, tt.v)\n\t\tif rule !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, rule)\n\t\t}\n\t}\n}\n\nfunc TestCardinalPlurals(t *testing.", "T) {\n\n\ttrans := New()\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\texpected locales.", "PluralRule\n\t}{\n\t// {\n\t// \tnum: 1,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleOne,\n\t// },\n\t// {\n\t// \tnum: 4,\n\t// \tv: 0,\n\t// \texpected: locales.", "PluralRuleOther,\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\trule := trans.", "CardinalPluralRule(tt.num, tt.v)\n\t\tif rule !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, rule)\n\t\t}\n\t}\n}\n\nfunc TestDaysAbbreviated(t *testing.", "T) {\n\n\ttrans := New()\n\tdays := trans.", "WeekdaysAbbreviated()\n\n\tfor i, day := range days {\n\t\ts := trans.", "WeekdayAbbreviated(time.", "Weekday(i))\n\t\tif s !", "= day {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", day, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 0,\n\t// \texpected: \"Sun\",\n\t// },\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"Mon\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"Tue\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"Wed\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"Thu\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"Fri\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"Sat\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "WeekdayAbbreviated(time.", "Weekday(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestDaysNarrow(t *testing.", "T) {\n\n\ttrans := New()\n\tdays := trans.", "WeekdaysNarrow()\n\n\tfor i, day := range days {\n\t\ts := trans.", "WeekdayNarrow(time.", "Weekday(i))\n\t\tif s !", "= day {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", string(day), s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 0,\n\t// \texpected: \"S\",\n\t// },\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"M\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"T\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"W\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"T\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"F\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"S\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "WeekdayNarrow(time.", "Weekday(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestDaysShort(t *testing.", "T) {\n\n\ttrans := New()\n\tdays := trans.", "WeekdaysShort()\n\n\tfor i, day := range days {\n\t\ts := trans.", "WeekdayShort(time.", "Weekday(i))\n\t\tif s !", "= day {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", day, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 0,\n\t// \texpected: \"Su\",\n\t// },\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"Mo\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"Tu\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"We\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"Th\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"Fr\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"Sa\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "WeekdayShort(time.", "Weekday(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestDaysWide(t *testing.", "T) {\n\n\ttrans := New()\n\tdays := trans.", "WeekdaysWide()\n\n\tfor i, day := range days {\n\t\ts := trans.", "WeekdayWide(time.", "Weekday(i))\n\t\tif s !", "= day {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", day, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 0,\n\t// \texpected: \"Sunday\",\n\t// },\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"Monday\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"Tuesday\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"Wednesday\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"Thursday\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"Friday\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"Saturday\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "WeekdayWide(time.", "Weekday(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestMonthsAbbreviated(t *testing.", "T) {\n\n\ttrans := New()\n\tmonths := trans.", "MonthsAbbreviated()\n\n\tfor i, month := range months {\n\t\ts := trans.", "MonthAbbreviated(time.", "Month(i + 1))\n\t\tif s !", "= month {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", month, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"Jan\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"Feb\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"Mar\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"Apr\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"May\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"Jun\",\n\t// },\n\t// {\n\t// \tidx: 7,\n\t// \texpected: \"Jul\",\n\t// },\n\t// {\n\t// \tidx: 8,\n\t// \texpected: \"Aug\",\n\t// },\n\t// {\n\t// \tidx: 9,\n\t// \texpected: \"Sep\",\n\t// },\n\t// {\n\t// \tidx: 10,\n\t// \texpected: \"Oct\",\n\t// },\n\t// {\n\t// \tidx: 11,\n\t// \texpected: \"Nov\",\n\t// },\n\t// {\n\t// \tidx: 12,\n\t// \texpected: \"Dec\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "MonthAbbreviated(time.", "Month(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestMonthsNarrow(t *testing.", "T) {\n\n\ttrans := New()\n\tmonths := trans.", "MonthsNarrow()\n\n\tfor i, month := range months {\n\t\ts := trans.", "MonthNarrow(time.", "Month(i + 1))\n\t\tif s !", "= month {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", month, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"J\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"F\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"M\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"A\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"M\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"J\",\n\t// },\n\t// {\n\t// \tidx: 7,\n\t// \texpected: \"J\",\n\t// },\n\t// {\n\t// \tidx: 8,\n\t// \texpected: \"A\",\n\t// },\n\t// {\n\t// \tidx: 9,\n\t// \texpected: \"S\",\n\t// },\n\t// {\n\t// \tidx: 10,\n\t// \texpected: \"O\",\n\t// },\n\t// {\n\t// \tidx: 11,\n\t// \texpected: \"N\",\n\t// },\n\t// {\n\t// \tidx: 12,\n\t// \texpected: \"D\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "MonthNarrow(time.", "Month(tt.idx))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestMonthsWide(t *testing.", "T) {\n\n\ttrans := New()\n\tmonths := trans.", "MonthsWide()\n\n\tfor i, month := range months {\n\t\ts := trans.", "MonthWide(time.", "Month(i + 1))\n\t\tif s !", "= month {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", month, s)\n\t\t}\n\t}\n\n\ttests := []struct {\n\t\tidx int\n\t\texpected string\n\t}{\n\t// {\n\t// \tidx: 1,\n\t// \texpected: \"January\",\n\t// },\n\t// {\n\t// \tidx: 2,\n\t// \texpected: \"February\",\n\t// },\n\t// {\n\t// \tidx: 3,\n\t// \texpected: \"March\",\n\t// },\n\t// {\n\t// \tidx: 4,\n\t// \texpected: \"April\",\n\t// },\n\t// {\n\t// \tidx: 5,\n\t// \texpected: \"May\",\n\t// },\n\t// {\n\t// \tidx: 6,\n\t// \texpected: \"June\",\n\t// },\n\t// {\n\t// \tidx: 7,\n\t// \texpected: \"July\",\n\t// },\n\t// {\n\t// \tidx: 8,\n\t// \texpected: \"August\",\n\t// },\n\t// {\n\t// \tidx: 9,\n\t// \texpected: \"September\",\n\t// },\n\t// {\n\t// \tidx: 10,\n\t// \texpected: \"October\",\n\t// },\n\t// {\n\t// \tidx: 11,\n\t// \texpected: \"November\",\n\t// },\n\t// {\n\t// \tidx: 12,\n\t// \texpected: \"December\",\n\t// },\n\t}\n\n\tfor _, tt := range tests {\n\t\ts := string(trans.", "MonthWide(time.", "Month(tt.idx)))\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtTimeFull(t *testing.", "T) {\n\n\t// loc, err := time.", "LoadLocation(\"America/Toronto\")\n\t// if err !", "= nil {\n\t// \tt.Errorf(\"Expected '<nil>' Got '%s'\", err)\n\t// }\n\n\t// fixed := time.", "FixedZone(\"OTHER\", -4)\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 5, 1, 0, loc),\n\t// \texpected: \"9:05:01 am Eastern Standard Time\",\n\t// },\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 20, 5, 1, 0, fixed),\n\t// \texpected: \"8:05:01 pm OTHER\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtTimeFull(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtTimeLong(t *testing.", "T) {\n\n\t// loc, err := time.", "LoadLocation(\"America/Toronto\")\n\t// if err !", "= nil {\n\t// \tt.Errorf(\"Expected '<nil>' Got '%s'\", err)\n\t// }\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 5, 1, 0, loc),\n\t// \texpected: \"9:05:01 am EST\",\n\t// },\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 20, 5, 1, 0, loc),\n\t// \texpected: \"8:05:01 pm EST\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtTimeLong(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtTimeMedium(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 5, 1, 0, time.", "UTC),\n\t// \texpected: \"9:05:01 am\",\n\t// },\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 20, 5, 1, 0, time.", "UTC),\n\t// \texpected: \"8:05:01 pm\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtTimeMedium(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtTimeShort(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 5, 1, 0, time.", "UTC),\n\t// \texpected: \"9:05 am\",\n\t// },\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 20, 5, 1, 0, time.", "UTC),\n\t// \texpected: \"8:05 pm\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtTimeShort(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtDateFull(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 0, 1, 0, time.", "UTC),\n\t// \texpected: \"Wednesday, February 3, 2016\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtDateFull(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtDateLong(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 0, 1, 0, time.", "UTC),\n\t// \texpected: \"February 3, 2016\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtDateLong(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtDateMedium(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 0, 1, 0, time.", "UTC),\n\t// \texpected: \"Feb 3, 2016\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtDateMedium(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtDateShort(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tt time.", "Time\n\t\texpected string\n\t}{\n\t// {\n\t// \tt: time.", "Date(2016, 02, 03, 9, 0, 1, 0, time.", "UTC),\n\t// \texpected: \"2/3/16\",\n\t// },\n\t// {\n\t// \tt: time.", "Date(-500, 02, 03, 9, 0, 1, 0, time.", "UTC),\n\t// \texpected: \"2/3/500\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtDateShort(tt.t)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtNumber(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\texpected string\n\t}{\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 2,\n\t// \texpected: \"1,123,456.56\",\n\t// },\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 1,\n\t// \texpected: \"1,123,456.6\",\n\t// },\n\t// {\n\t// \tnum: 221123456.5643,\n\t// \tv: 3,\n\t// \texpected: \"221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \texpected: \"-221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \texpected: \"-221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: 0,\n\t// \tv: 2,\n\t// \texpected: \"0.00\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \texpected: \"0.00\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \texpected: \"0.00\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtNumber(tt.num, tt.v)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtCurrency(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\tcurrency currency.", "Type\n\t\texpected string\n\t}{\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1,123,456.56\",\n\t// },\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 1,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1,123,456.60\",\n\t// },\n\t// {\n\t// \tnum: 221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"-$221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "CAD,\n\t// \texpected: \"-CAD 221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: 0,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$0.00\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$0.00\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "CAD,\n\t// \texpected: \"CAD 0.00\",\n\t// },\n\t// {\n\t// \tnum: 1.23,\n\t// \tv: 0,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1.00\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtCurrency(tt.num, tt.v, tt.currency)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtAccounting(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\tcurrency currency.", "Type\n\t\texpected string\n\t}{\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1,123,456.56\",\n\t// },\n\t// {\n\t// \tnum: 1123456.5643,\n\t// \tv: 1,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1,123,456.60\",\n\t// },\n\t// {\n\t// \tnum: 221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$221,123,456.564\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"($221,123,456.564)\",\n\t// },\n\t// {\n\t// \tnum: -221123456.5643,\n\t// \tv: 3,\n\t// \tcurrency: currency.", "CAD,\n\t// \texpected: \"(CAD 221,123,456.564)\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$0.00\",\n\t// },\n\t// {\n\t// \tnum: -0,\n\t// \tv: 2,\n\t// \tcurrency: currency.", "CAD,\n\t// \texpected: \"CAD 0.00\",\n\t// },\n\t// {\n\t// \tnum: 1.23,\n\t// \tv: 0,\n\t// \tcurrency: currency.", "USD,\n\t// \texpected: \"$1.00\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtAccounting(tt.num, tt.v, tt.currency)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n\nfunc TestFmtPercent(t *testing.", "T) {\n\n\ttests := []struct {\n\t\tnum float64\n\t\tv uint64\n\t\texpected string\n\t}{\n\t// {\n\t// \tnum: 15,\n\t// \tv: 0,\n\t// \texpected: \"15%\",\n\t// },\n\t// {\n\t// \tnum: 15,\n\t// \tv: 2,\n\t// \texpected: \"15.00%\",\n\t// },\n\t// {\n\t// \tnum: 434.45,\n\t// \tv: 0,\n\t// \texpected: \"434%\",\n\t// },\n\t// {\n\t// \tnum: 34.4,\n\t// \tv: 2,\n\t// \texpected: \"34.40%\",\n\t// },\n\t// {\n\t// \tnum: -34,\n\t// \tv: 0,\n\t// \texpected: \"-34%\",\n\t// },\n\t}\n\n\ttrans := New()\n\n\tfor _, tt := range tests {\n\t\ts := trans.", "FmtPercent(tt.num, tt.v)\n\t\tif s !", "= tt.expected {\n\t\t\tt.Errorf(\"Expected '%s' Got '%s'\", tt.expected, s)\n\t\t}\n\t}\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0006348187453113496, 0.0007829902460798621, 0.0007424880750477314, 0.0007248240290209651, 0.0007114663021638989, 0.0007579856901429594, 0.0007450410630553961, 0.0013082287041470408, 0.0007542108651250601, 0.0007384827476926148, 0.0017976792296394706, 0.0008426090353168547, 0.0007579856901429594, 0.0007450410630553961, 0.0007691961945965886, 0.0009851945796981454, 0.0008583590388298035, 0.0013082287041470408, 0.0007250719936564565, 0.0007384827476926148, 0.0017976792296394706, 0.0008431169553659856, 0.0007579856901429594, 0.0007450410630553961, 0.0007691961945965886, 0.0013082287041470408, 0.0007340889424085617, 0.0007384827476926148, 0.0017976792296394706, 0.0008791177533566952, 0.0011610769433900714, 0.0007340851007029414, 0.0010231862543150783, 0.001082012546248734, 0.0008505879086442292, 0.0007664834265597165, 0.000719188479706645, 0.0007342079188674688, 0.0008211037493310869, 0.0007695587701164186, 0.0010231862543150783, 0.0014814297901466489, 0.0008539496921002865, 0.0007664834265597165, 0.000719188479706645, 0.0007305566105060279, 0.0010231862543150783, 0.0010369502706453204, 0.0008513485663570464, 0.0008200176525861025, 0.0006832187063992023, 0.0006924552144482732, 0.0010253170039504766, 0.0008311824058182538, 0.0006924552144482732, 0.0020961102563887835, 0.0008495143265463412, 0.0008200176525861025, 0.0006766033475287259, 0.0007254939409904182, 0.0010253170039504766, 0.0009333057678304613, 0.0007254939409904182, 0.0020961102563887835, 0.0007417917368002236, 0.0008200176525861025, 0.0006664529792033136, 0.0005996418767608702, 0.0010253170039504766, 0.0008231334504671395, 0.0005996418767608702, 0.0020961102563887835, 0.0008280964684672654, 0.0008200176525861025, 0.0006234730244614184, 0.0006304339040070772, 0.0010253170039504766, 0.0007803800981491804, 0.0006304339040070772, 0.0020961102563887835, 0.000837792525999248, 0.0006930830422788858, 0.000620558625087142, 0.0007116995402611792, 0.0008923902059905231, 0.0007548989960923791, 0.0007116995402611792, 0.0014874025946483016, 0.0008817131747491658, 0.0006930830422788858, 0.0006689506117254496, 0.0008371697622351348, 0.0008923902059905231, 0.0008573249797336757, 0.0008371697622351348, 0.0014874025946483016, 0.0007875244482420385, 0.0006930830422788858, 0.0006104035419411957, 0.0006287897122092545, 0.0008923902059905231, 0.0007493685698136687, 0.0006287897122092545, 0.0015953007386997342, 0.0009145360672846437, 0.0007727406919002533, 0.0007792914984747767, 0.0009254709002561867, 0.0007243495783768594, 0.0007214507204480469, 0.0006301669054664671, 0.0006300422828644514, 0.013390271924436092, 0.0008873326005414128, 0.0007727406919002533, 0.0007792914984747767, 0.000962826597969979, 0.0007214507204480469, 0.0006338840466924012, 0.0006218149210326374, 0.007235047407448292, 0.0008090675692074001, 0.0010067246621474624, 0.0007214507204480469, 0.0006328584859147668, 0.0007315616239793599, 0.0006327936425805092, 0.0006544349016621709, 0.006309336982667446, 0.000754724198486656, 0.0010067246621474624, 0.0007214507204480469, 0.0006328584859147668, 0.0006963573396205902, 0.0006327936425805092, 0.0006462811725214124, 0.001860910328105092, 0.0009468366042710841, 0.0010067246621474624, 0.0007214507204480469, 0.000649795401841402, 0.0006230684812180698, 0.00831548310816288, 0.0008862269460223615, 0.0010067246621474624, 0.0007214507204480469, 0.000649795401841402, 0.000627497211098671, 0.005641453433781862, 0.0008321809582412243, 0.0010067246621474624, 0.0007214507204480469, 0.000649795401841402, 0.0006233833264559507, 0.0029084354173392057, 0.0007751232478767633, 0.0010067246621474624, 0.0007214507204480469, 0.000649795401841402, 0.0006826343014836311, 0.0006764866411685944, 0.0006454028189182281, 0.0015035993419587612, 0.0008569602505303919, 0.0008189587388187647, 0.004852752201259136, 0.0008999835117720068, 0.0007824163185432553, 0.0006756036309525371, 0.0007361731259152293, 0.0007469327538274229, 0.0007277926779352129, 0.0007135396008379757, 0.0006741221295669675, 0.0006510054226964712, 0.0006510054226964712, 0.00064732605824247, 0.0006543273339048028, 0.0024490838404744864, 0.0008405288681387901, 0.0007824163185432553, 0.0006756036309525371, 0.0007361731259152293, 0.0007469327538274229, 0.0007277926779352129, 0.000749347556848079, 0.000725294288713485, 0.0006510054226964712, 0.00064732605824247, 0.0006543273339048028, 0.002027923706918955, 0.0008798288181424141, 0.0008014536579139531, 0.006520803552120924, 0.0009754684870131314 ]
0.001115
195
[ "Multivariate analysis and list mode processing of murine hemopoietic subpopulations for cytokinetic studies.", "\nMultivariate analyses and list mode data processing were used to obtain cytokinetic information on flow cytometrically distinct hemopoietic subpopulations. ", "In one application, viable, unfixed hemopoietic subpopulations were discriminated on the basis of cyanine dye fluorescence and orthogonal light scatter; Hoechst dye fluorescence was measured to determine the proliferative status of the subpopulations. ", "In another application, ethanol-fixed mouse bone marrow cells were triply stained with Hoechst dye, rhodamine-conjugated wheat germ agglutinin (WGA), and a fluorescein-labeled monoclonal antibody against bromodeoxyuridine. ", "In both of these studies, flow cytometric data for all three variables were acquired in list mode fashion, stored on magnetic tape, and processed by list mode software on a computer-based multivariable pulse-height analyzer. ", "In the first application, subpopulations distinguished by cyanine dye intensity and light scatter appeared to be more related to cell lineage and cell size than proliferative status. ", "In the second application, WGA affinity discriminated two subpopulations in mouse bone marrow S-phase cells in each subpopulation that actively incorporated bromodeoxyuridine (BrdUrd). ", "List mode data processing obviates the need for routine electronic sorting of cells and thus facilitates characterization of discriminated subpopulations. ", "In this regard, it is particularly useful for the study of flow cytometrically distinct, low frequency subpopulations." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0007407949888147414, 0.0006509123486466706, 0.0008714997675269842, 0.0009456744883209467, 0.0005875337519682944, 0.0006363198044709861, 0.0008130565984174609, 0.0008087530150078237, 0.000574004661757499 ]
0.000737
9
[ "Considerable attention has focused on stem cells such as embryonic stem cells and non-embryonic stem cells, and their uses in a range of therapies. ", "The availability of stem cells from non-embryonic tissues can greatly contribute to cell replacement therapies such as bone marrow transplants, gene therapies, tissue engineering, and in vitro organogenesis. ", "Production of autologous stem cells to replace injured tissue would also reduce the need for immune suppression interventions. ", "Beyond their potential therapeutic applications, homogenous preparations of, for example, adult stem cells would have another important benefit, the ability to study their molecular and biochemical properties.", "\nThe existence of stem cells in somatic tissues is well established by functional tissue cell transplantation assays (Reisner et al., ", "1978). ", "However, their individual identification has been difficult to accomplish. ", "Even though their numbers have been enriched by methods such as immuno-selection with specific antibodies, there are no known markers that uniquely identify stem cells in somatic tissues (Merok and Sherley, 2001). ", "Secondly, adult stem cells are often present in only minute quantities, are difficult to isolate and purify, and their numbers may decrease with age.", "\nMammalian adult stem cells replicate by asymmetric self-renewal to replenish cells in tissues that undergo cell turnover but maintain a constant cell mass (J. L. Sherley, Stem Cells 20, 561 (2002); M. Loeffler, C. S. Potten, in Stem Cells (ed, Potten, C. S.) 1-27 (Academic Press, London, 1997)). ", "Each asymmetric adult stem cell division yields a new stem cell and a non-stem cell sister. ", "The non-stem cell sister becomes the progenitor of the differentiated cells responsible for mature tissue functions (Loeffler, 1997; Sherley, 2002). ", "In contrast, embryonic stem cells exhibit symmetric self-renewal (Stead E, et al., ", "Oncogene 21(54):8320-33 (2002); Savatier P, et al., ", "Oncogene (3):809-18 (1994)).", "\nCells display a range of expression states at certain times or in response to environmental stimuli, e.g. from resting to replicating. ", "Recently attention has focused on identifying gene patterns, including mRNA patterns and protein expression patterns, connected with such different states. ", "This is sometimes referred to as gene profiling—where transcriptomes associated with a specific state are identified. ", "Being able to identify certain genes (and/or associated proteins and/or transcripts) that are associated with a cell being in a specific state permits one to readily identify and screen for specific cells, even from a population of related cells.", "\nThus, despite the need for methods to identify and isolate specific cells from an individual, it has not been possible to readily do so. ", "Accordingly, it would be desirable to have a method to identify markers associated with different cells and/or different cells states in mammalian tissues." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0005490920157171786, 0.0005942584248259664, 0.000649674388114363, 0.0005346526158973575, 0.0005911652115173638, 0.000795713160187006, 0.000563221808988601, 0.0006072017131373286, 0.0007054132875055075, 0.0006177229224704206, 0.0006996925221756101, 0.0007660668343305588, 0.0006363173597492278, 0.0006584642687812448, 0.0006745561840943992, 0.000600563595071435, 0.0005355615285225213, 0.000626775436103344, 0.0006174463196657598, 0.0005874242633581161, 0.0005529664922505617 ]
0.000627
21
[ "package com.mashibing.juc.c_018_01_Unsafe;\n\n//import sun.misc.*;", "\n\nimport sun.misc.", "Unsafe;\n\npublic class HelloUnsafe {\n static class M {\n private M() {}\n\n int i =0;\n }\n\n public static void main(String[] args) throws InstantiationException {\n Unsafe unsafe = Unsafe.getUnsafe();\n M m = (M)unsafe.allocateInstance(M.class);\n m.i = 9;\n System.out.println(m.i);\n }\n}\n\n\n" ]
{ "pile_set_name": "Github" }
[ 0.0011626967461779714, 0.0009524017805233598, 0.001410944852977991 ]
0.001175
3
[ "Playing God: Testing, Modeling, and Imitating Blood Miracles in Eighteenth-Century Europe.", "\nIn the late Middle Ages, rumors began to spread throughout Europe regarding blood miracles associated with the relics of martyrs. ", "Centuries-old blood, pulverized or solidified and black in color, was said to return to its original bright red color, or else to liquefy or bubble under certain circumstances or on certain dates in the liturgical calendar. ", "With the Reformation, in Protestant countries most of these relics were either destroyed or forgotten. ", "In Catholic countries, on the contrary, blood miracles multiplied, reaching a peak between the seventeenth and eighteenth centuries. ", "This article reconstructs the debate that sprang up in eighteenth-century Europe over the blood of Saint Januarius and the attempts made to disprove its miraculous properties, often not in written works, but by staging highly theatrical demonstrations. ", "It examines the way in which, with phenomena as complex as miracles, the activities of testing alleged facts, creating elucidative models, and staging imitations intertwined over the centuries, often overlapping and becoming confused." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0007200666004791856, 0.0006626835092902184, 0.006552509032189846, 0.0006505014607682824, 0.0009031498339027166, 0.0006167939864099026, 0.0006178068579174578 ]
0.001532
7
[ "We noticed that you're using an unsupported browser. ", "The TripAdvisor website may not display properly. ", "We support the following browsers:\nWindows:Internet Explorer,\nMozilla Firefox,\nGoogle Chrome.", "\nMac:Safari.", "\n\n“If you have mobility issues ask for a room on the first floor!” (", "DanielK442)\n\nOct 13, 2014\n\n“There is no good room unless the establishment has been stripped of all its soiled bed linens, bed-covers, mattresses, pillows, carpets, and the plumbing torn out and replaced with a system that works and does not stink. ", "Mold is a health hazard, stay here if you do not object to risking your lungs and overall health.” (", "glamborghini)\n\nGetting There: It couldn't be easier to find. ", "Take the Metro to Saint-Paul exit and walk towards Bastille and the Hotel is on the left hand side of the street. ", "It has a large sign outside so it is impossible to miss.", "\nThe Room: As we arrived the owner of the Hotel told us we were being downgraded to a...\nMore\n\nMy partner, son and I have just returned from 3 nights at the Sully hotel.", "\nThe hotel itself was great, it had a bed and bathroom. ", "What more do you need? ", "We went to see the sights of Paris not sit in the hotel!!! ", "It also has free Wifi for guests.", "\nThe staff was helpful and very friendly.", "\nThe only...\nMore\n\nI've stayed in a good few budget hotels in Paris; this one could be worse, but it has some serious drawbacks. ", "I chose it because of the location; I love the Marais quarter, and the metro connections are good. ", "The building itself is unappealing, a hole in the wall entrance and a narrow frontage on five floors--and there's no lift...\nMore\n\nJust an average hotel in a great location- walking distance to the Bastille, the Seine, and Notre Dame in a lovely neighborhood. ", "The room was small and needed some upkeep, but had a private bath which was also small but modern and clean. ", "Our room overlooked a courtyard so we could open the window for air and got no street...\nMore\n\nWon't waste time writing about this disgusting health hazard as it has no redeeming features apart from its location. ", "There is nothing/nothing good to write about it. ", "We had booked for one night, checked in, went to our room, noticing that the smell became worse the further up the stairs we went, left our cases outside the door, looked at...\nMore\n\nMy favourite, if rather Surreal, hotel in Paris. ", "Nothing is quite what it seems or works in the way you expect, but for me, this is its great charm, and Hotel Sully has been weaving its spell for years.", "\n\nWhen booking, thought \"you get what you pay for\" - ie 1 star, Previous reviews were mixed with some dreadful,\nBrilliantly located hotel, no lift (As expected) but 77 steps with suitcases and no offer of assistance. ", "Toilet down a flight of stairs, shower with fungus growing in it, and the STENCH eminating from the shower/handbasin room was unbelievable. ", "A...\nMore\n\nPerfect location. ", "Small and very very old rooms. ", "Friendly staff. ", "They help us with hot water for my tea when i was ill. ", "Explain everything about sightseeings) yes, rooms are small and old, but it is perfect price for room with bath in this location\n\nStaying in Le Marais\n\nNeighborhood Profile\n\nLe Marais\n\nThe Marais is a winding maze of multi-faceted streets that beg to be explored. ", "It bursts with small boutiques, historic buildings, cozy traditional restaurants, and hidden parks. ", "Around each corner, you'll come across little gems of architecture spanning the centuries, from understated medieval towers to classical libraries and 17th century splendor. ", "This neighborhood unites a rich mix of people of all ages, but it's best known for the gay scene mostly in the south and the Jewish community around Rue des Rosiers.", "\n\nAmenities\n\nQuestions? ", "Get answers from hotel staff and past guests. ", "Ask a question\n\nHighlights\n\nFree High Speed Internet ( WiFi )\n\nRoom types\n\nFamily Rooms\n\nInternet\n\nFree Internet\n\nPublic Wifi\n\nFree High Speed Internet ( WiFi )\n\nAdditional Information about Hotel de Sully\n\nAddress: 48, rue Saint Antoine, Paris, France\n\nLocation:France > Ile-de-France > Paris> Le Marais\n\nPrice Range (Based on Average Rates):\n$\n\nNumber of rooms: 48\n\nReservation Options:\n\nTripAdvisor is proud to partner with Expedia, Booking.com, Hotels.com, Travelocity, Venere, Priceline, Agoda and Odigeo so you can book your Hotel de Sully reservations with confidence. ", "We help millions of travelers each month to find the perfect hotel for both vacation and business trips, always with the best discounts and special offers.", "\n\nAlso Known As:\n\nDe Sully Hotel\n\nOwners: What's your side of the story?", "\n\nRegister now for free — and start getting automatic notification of new reviews, responding to traveler feedback, adding new photos to your listing and much more.", "\n\n* TripAdvisor LLC is not a booking agent and does not charge any service fees to users of our site... (more)\n\nWe noticed that you're using an unsupported browser. ", "The TripAdvisor website may not display properly. ", "We support the following browsers:\nWindows:Internet Explorer,\nMozilla Firefox,\nGoogle Chrome.", "\nMac:Safari.", "\n\nTripAdvisor LLC is not responsible for content on external web sites. ", "Taxes, fees not included for deals content." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007815529825165868, 0.0006436847033910453, 0.0007103656535036862, 0.0009618990588933229, 0.000846833863761276, 0.016186371445655823, 0.002748542232438922, 0.0006892650271765888, 0.001153668388724327, 0.0006810117629356682, 0.0006042700842954218, 0.0006182065117172897, 0.0009662496740929782, 0.0007785829366184771, 0.0006744941929355264, 0.00054564030142501, 0.0006303005502559245, 0.0005345504032447934, 0.0008269157260656357, 0.0008979414706118405, 0.00163532723672688, 0.0008265222422778606, 0.0008159430581144989, 0.0007583231199532747, 0.0006290297606028616, 0.12306730449199677, 0.0007122399983927608, 0.004149816930294037, 0.00062654132489115, 0.0007749770302325487, 0.0006943775806576014, 0.0006151974084787071, 0.0006776393856853247, 0.005842496640980244, 0.0007118267240002751, 0.0016858532326295972, 0.0005848567234352231, 0.0005184633191674948, 0.0006863983580842614, 0.0006714758346788585, 0.0007806854555383325, 0.0006436847033910453, 0.0007103656535036862, 0.0009618990588933229, 0.0006609134143218398, 0.0006259746151044965 ]
0.00399
46
[ "Closest Phobos flyby gathers data\n\nThe European Mars Express (Mex) probe has made its closest flyby of the Martian moon Phobos, passing just 67km (42 miles) from its surface.", "\nNo manmade object has ever been so near to the natural satellite.", "\nThe approach is one of a series being made by Mex as it seeks to understand the origin of the moon.", "\nPrevious flybys have indicated that Phobos has an extremely low density, suggesting that its surface probably hides many large interior voids.", "\nScientists suspect the moon is simply a collection of planetary rubble that coalesced around the Red Planet sometime after its formation." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006323860725387931, 0.0007525592227466404, 0.0005568316555581987, 0.0007693299558013678, 0.000636038719676435 ]
0.000669
5