texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
1
num_sents
int64
1
22.6k
[ "Categories\n\nPrice\n\nSize\n\nColors\n\nRed (217)\n\nYellow (179)\n\nBlack (79)\n\nBlue (283)\n\nGrey (116)\n\nPink (29)\n\nWhite (38)\n\nGreen (205)\n\nBest Jumpsuits\n\nSea Obi Tie Jumpsuit\n\n5 Review(s)\n\n$\n\nAvailability: In stock\n\nIf you are looking for Sea Obi Tie Jumpsuit, Here, you can see ratings and read reviews from real customers like you who have experienced dramatic transformations after using. ", "Take the advantage of the discounted price now! ", "Sea Obi Tie Jumpsuit is very high quality and beautiful, We've reviewed the best places to buy Sea Obi Tie Jumpsuit online. ", "Happy shopping friends! ", "I hope you find something you love! ", "Thanks so much for stopping!", "\n\nFind Sea Obi Tie Jumpsuit deals and save. ", "Read reviews and buy Sea Obi Tie Jumpsuit from the most popular stores. ", "The best place to buy Sea Obi Tie Jumpsuit for your ,We offer a large variety of styles at some of the best prices available online! ", "You can check prices and promotions by clicking on the button below.", "\n\nThere exists normally a good number of Sea Obi Tie Jumpsuit out there. ", "A number of these goods are available on-line. ", "The selection of the merchandise includes the ones from sizes, styles, and colors. ", "You might find that one could find the right Sea Obi Tie Jumpsuit for your situation with just a few tips.", "\n\nToday, household Sea Obi Tie Jumpsuit businesses are creating intelligent, stylish, along with space-saving furnishings that can fulfill many well-designed wants. ", "Considering that a lot more people are generally entering into condominiums with relatively tiny floorboards areas, these kinds of Sea Obi Tie Jumpsuit have already been extremely popular in recent years. ", "Folks currently desire furnishings which will serve many purpose, plus they desire them to be beautiful also! ", "It’s a good thing though, that this home Sea Obi Tie Jumpsuit marketplace is highly offering this desire. ", "In this article, we have presented a summary of extraordinary twice and multi-function home Sea Obi Tie Jumpsuit in which property owners will like. - ", "This dual-purpose desk functions since equally a new home workspace along with a dining room table\n\nWhat you must know before buying Jumpsuits .", "\n\n§ Incorporating Figure – Rustic bathroom vainness helps to create personality on your room. ", "Owing to past and age group, antique timber can be significantly textured and distinguished simply by don marks in addition to nail pockets. ", "You are able to install wall-mounted rest room reflect made out of repurposed wines gun barrel so you can get the barrel company's stamps, making your old-fashioned bathroom vanity a work involving specific fine art. ", "You are able to give a new lifestyle to your old solid wood framework pertaining to offering a character. ", "It is possible to change any dilapidated barn to a different artistic design with old-fashioned rest room counter. § ", "Sharing with Story – Traditional restroom vanity often explains to a story for the property owners. ", "Be it decayed barn the location where the gorgeous barn solid wood has been collected as well as refurbished area where the authentic wood of the home had been restored, rustic restroom counter provides persona for your bath tub space in a wonderful way. § ", "Offering Wealthy & Authentic Complete – You'll get rich and also real complete from antique restroom vanity. ", "Most completes are authentic as wooden o" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0010252196807414293, 0.001328944694250822, 0.0006577364401891828, 0.000856350117828697, 0.0009421930299140513, 0.0008725541410967708, 0.009092857129871845, 0.000703746743965894, 0.0007150562014430761, 0.0005692472332157195, 0.0025322323199361563, 0.0005533358198590577, 0.0005887128645554185, 0.0007752070669084787, 0.00064826913876459, 0.0007720785797573626, 0.0005964779993519187, 0.0006590945995412767, 0.0006715343915857375, 0.0020905770361423492, 0.013849274255335331, 0.0005433285259641707, 0.0011696662986651063, 0.0005727204261347651, 0.0006455680122599006, 0.0005856127827428281, 0.0008062273263931274, 0.0007986162090674043, 0.0007753145764581859 ]
0.0016
29
[ "OVA66 increases cell growth, invasion and survival via regulation of IGF-1R-MAPK signaling in human cancer cells.", "\nOvarian cancer-associated antigen 66 (OVA66), also known as CML66 (GenBank Accession No. ", "AF283301), was first identified in an ovarian carcinoma complementary DNA (cDNA) expression library and was shown to play a role in tumorigenesis. ", "Here, we find that OVA66 influences tumorigenesis by regulating the type I insulin-like growth factor receptor (IGF-1R) signaling pathway. ", "Stable knockdown of OVA66 in cancer cells attenuated phosphorylation of IGF-1R and extracellular signal-regulated kinase 1/2 (ERK1/2)-Hsp27; similarly, a higher level of p-IGF-1R and ERK1/2-Hsp27 signaling was also detected after OVA66 overexpression in HO8910 cells. ", "In vivo knockdown of OVA66 both reduced tumor burden in nude mice and decreased phosphorylation of IGF-1R, ERK1/2 and hsp27. ", "We blocked IGF-1R function both by small interfering RNA (siRNA) and with the chemical inhibitor Linsitinib (OSI-906). ", "By either method, tumorigenesis was inhibited regardless of OVA66 expression; thus, mechanistically, IGF-1R, probably, lies downstream of OVA66 in cancer cells. ", "We also found that OVA66 regulates expression of murine double minute 2 (MDM2); this attenuates ubiquitination of IGF-1R in response to IGF-1 stimulation and promotes active ERK1/2 signaling. ", "Thus, we propose that combined overexpression of OVA66 and MDM2 promotes oncogenesis by enhancing activation of the IGF-1R-ERK1/2 signaling pathway." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.000805307412520051, 0.0017994041554629803, 0.0010042173089459538, 0.00063079665414989, 0.000793134793639183, 0.0009671232546679676, 0.0007034697919152677, 0.0007735640392638743, 0.0007386512588709593, 0.0006797641981393099 ]
0.00089
10
[ "Q:\n\nHow to replace some characters after the last dot with their lower cases\n\nA simple question but I cannot solve it. ", "I got a string like this mail address:\nma <- \"something@somewhere.", "COM\"\n\nMy goal is to get:\n\"something@somewhere.com\"\n\nSo to put the to lower cases the part after the last dot. ", "I've read this, this, so I tried:\ngsub(\".*\\\\.\",\"\\\\L\\\\1\", ma, perl = T) \n[1] \"COM\" # nope\n\nAlso something like:\nlibrary(gsubfn)\noptions(gsubfn.engine = \"R\")\ngsubfn(\".*\\\\.\", ~ tolower(x), ma)\n[1] \"something@somewhere.", "COM\" # nope\n\nI'm quite confused because it seems I can fetch the part I want to replace:\ngsub(\".*\\\\.\",\"\", ma)\n[1] \"COM\"\n\nBut I cannot replace it properly. ", "If you can give an explanation with the solution, I'll gladly appreciate it, regex is not my strongest feature.", "\n\nA:\n\n\\\\L & \\\\U apply to a capturing group -- your first attempt is close but doesn't say which group to apply the command to:\nma <-\"something@somewhere.", "COM\"\ngsub('(.*\\\\.)(.*)$', '\\\\1\\\\L\\\\2', ma, perl = TRUE)\n# [1] \"something@somewhere.com\"\n\nNote we capture two groups -- the part before (and including) the ., ", "which we leave alone; and the part after the ., ", "which we move to lower-case.", "\nAlso note it may be safer to use this regex to prevent any issues with greedy matching of .:", "\ngsub('(.*\\\\.)([^.]*)$', '\\\\1\\\\L\\\\2', ma, perl = TRUE)\n# [1] \"something@somewhere.com\"\n\nA:\n\nIf you want to apply that to the second group of an email address, you could use an email like pattern with 2 capturing groups and use \\\\L for the second group.", "\n([^\\s@]+@[^\\s@]+\\.)([^\\s@]+)\n\nFor example\ngsub(\"([^\\\\s@]+@[^\\\\s@]+\\\\.)([^\\\\s@]+)\",\"\\\\1\\\\L\\\\2\", \"something@somewhere.", "COM\", perl = T) \n\nOutput\n[1] \"something@somewhere.com\"\n\nR demo | Regex demo\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006931864772923291, 0.000671707617584616, 0.0008675270946696401, 0.001093607977963984, 0.000995693844743073, 0.000539459811989218, 0.0012675219913944602, 0.0008722495404072106, 0.0007846151711419225, 0.0006926010246388614, 0.0006552306585945189, 0.000741813681088388, 0.002960660494863987, 0.0007973899482749403 ]
0.000974
14
[ "\n409 P.2d 891 (1966)\nLouise LANIGIR, Ann Chaix, Marge Arden, Theodore Arden, A Minor, Lydia Russ, Ivy Lanigir and Thomas Arden, Appellants,\nv.\nJohn Arden, Betty Arden Aka Noney M. Arden, Respondents.", "\nNo. ", "4924\nSupreme Court of Nevada\nJanuary 19, 1966\n*892 Vargas, Dillon, Bartlett & Dixon, and Robert W. Marshall, of Reno, for Appellants.", "\nBelford & Anglim, of Reno, for Respondent Betty Arden.", "\nLeslie B. Gray, of Reno, for Respondent John Arden.", "\nTHOMPSON, Justice.", "\nThis case concerns title to approximately 10 acres of land near Reno, Nevada. ", "The former owner, Philip Arden, died intestate in 1929, and title to the property vested equally in eleven surviving children as tenants in common, subject to estate administration. ", "Philip's estate was closed on February *893 8, 1937, and a final decree of distribution was entered and recorded, showing devolution of a one-eleventh interest to each of the surviving children. ", "The action below was to quiet title. ", "The plaintiffs are nine of the surviving children, and the widow and son of the tenth who died before this suit was started.[1] The defendant John Arden is the remaining surviving child of Philip, and the co-defendant Betty Arden is John's former wife.", "\nThe plaintiffs' claim to the property rests upon the February 8, 1937, decree of distribution and their assertion that, since that time no one has conveyed away his one-eleventh undivided interest as a tenant in common. ", "The defendant Betty Arden asserts a valid record title to the property as a bona fide purchaser from her former husband and co-defendant John Arden. ", "On July 29, 1960, John deeded the property to Betty, as required by the terms of a settlement agreement, incident to divorce. ", "Betty, therefore, counterclaimed to quiet title. ", "The defendant John Arden also asserts a valid record title to the property (until he conveyed it to Betty on July 29, 1960) by reason of two deeds: the first, dated February 6, 1937, signed and acknowledged by each of the surviving children (Philip, William, Theodore, John, Tom, Ann, Louise, Ivy, Lydia, Josephine and Mary) as grantors to Arthur P. Herrmann and Lena Herrmann, his wife, as grantees, and recorded at the request of John Arden on April 5, 1941, at 11:10 a.m.; the second, dated April 5, 1941, signed and acknowledged by the Herrmanns as grantors, to John Arden as grantee, and recorded at the request of John Arden on April 5, 1941, at 11:11 a.m. Furthermore, John and his co-defendant Betty each pleaded adverse possession, the statute of limitations, laches and estoppel by deed as affirmative defenses to the plaintiffs' assertion of title.", "\nThe lower court ruled in favor of the defendant Betty Arden and gave her a decree quieting title to the property. ", "It believed that her record title was valid. ", "Though not required to do so, the court also concluded that Betty had acquired title by adverse possession; that the plaintiffs were barred by limitations and laches; and that they were estopped to deny the validity of their deed dated February 6, 1937. ", "This appeal followed. ", "We hold that the lower court was wrong on every point, and reverse. ", "We shall recite the relevant evidence as each issue is discussed.", "\n1. ", "Whether Betty Arden's record title is valid depends upon the effectiveness of the deed dated February 6, 1937, from the eleven surviving children as grantors to Arthur P. Herrmann and Lena Herrmann, grantees. ", "Before the father's estate was closed, Mr. Herrmann advised the administrator that he, Herrmann, might wish to purchase the property. ", "In anticipation of sale, the administrator caused the deed to be prepared and signatures obtained. ", "As the eleven children were scattered, it took from February 6, 1937, to March 9, 1937, to secure all signatures. ", "Meanwhile, Herrmann advised the administrator that he would not purchase. ", "That advice was given the administrator before the estate was closed and before the acknowledged signatures of all grantors had been obtained. ", "The estate was closed February 8, 1937. ", "Some time later (exact date unknown, but apparently after March 9, 1937, when the last signature to the deed was acknowledged) the deed was left with the attorney who had been handling the estate. ", "The document *894 was never physically delivered to the Herrmanns. ", "A consideration for that deed never passed from the Herrmanns to the administrator of the estate or to any of the named grantors. ", "The Herrmanns do not recall ever having seen the deed, did not buy the property, and have never claimed any interest therein.", "\nMore than four years later, on April 5, 1941, the Herrmanns for some reason not disclosed by the record, were persuaded to execute a deed of this land to John Arden. ", "John Arden procured the deed of February 6, 1937, from the attorney with whom it had been left and recorded that deed on April 5, 1941, at 11:10 a.m. One minute later, the Herrmann-John Arden deed was recorded.", "\nThe tale just related is not disputed. ", "Five of the eleven grantors named in the February 6, 1937, deed testified. ", "Four were plaintiffs and the other, John Arden, a defendant. ", "Mr. Herrmann also testified. ", "All agree that the 1937 deed was prepared and signed, intending to effectuate a sale to the Herrmanns, and for no other purpose.[2] The grantors never intended for the deed to operate as a conveyance unless the Herrmanns purchased the property. ", "Cf. ", "McCord v. Robinson, 225 Ark. 177, 280 S.W.2d 222 (1955); Battle v. Anders, 100 Ark. 427, 140 S.W. 593 (1911). ", "A sale did not occur. ", "The grantors received no consideration for their deed. ", "There is no showing that the attorney with whom the deed was deposited was authorized to deliver it to John Arden four years later, nor is there evidence of authority from those grantors to John Arden to record that deed.", "\nA deed executed, acknowledged and recorded is presumed to have been delivered. ", "Whoever questions the fact of delivery must overcome the presumption by clear and convincing evidence. ", "Campbell v. Campbell, 368 Ill. 202, 13 N.E.2d 265 (1938); Klein v. Klein, 239 Iowa 40, 29 N.W.2d 163 (1947). ", "John and Betty Arden contend that the lower court was justified in ruling that the presumption of delivery was not overcome here. ", "We cannot agree. ", "Though aware that an appellate court may not weigh conflicting evidence and, in doing so, substitute its view for that of the trial court, that doctrine does not govern this case. ", "There is no conflict in the evidence received at trial on the material points we have mentioned. ", "The lower court was compelled to accept the facts as we have related them. ", "As such evidence was not diminished in value, impeached, contradicted or questioned, it must, as a matter of law, qualify as \"clear and convincing\" evidence sufficient to overcome the presumption of delivery. ", "Cf. ", "Dalton v. Dalton, 14 Nev. 419 (1879). ", "Accordingly, we hold the 1937 deed ineffectual as a conveyance from the grantors therein named to Arthur P. Herrmann and wife. ", "It follows that the deed from the Herrmanns to John Arden is equally infirm and may not defeat the plaintiffs' claim to title.", "\nAs stated before, John Arden conveyed the property in controversy to Betty Arden on July 29, 1960. ", "The lower court found that Betty was a bona fide purchaser without notice. ", "We think that finding clearly erroneous. ", "John deeded the property to Betty as required by their divorce settlement. ", "However, before doing so he asked her to contact the other Arden children for their permission. ", "Betty did contact some of them, and was notified by at least one of them that an interest was claimed. ", "This, without more, was notice of facts sufficient to cause further inquiry by Betty, thereby destroying her present claim as a bona fide purchaser. ", "Moore v. De Bernardi, 47 Nev. 46, 220 P. 544 (1923); Bailey v. Butner, 64 Nev. 1, 176 P.2d 226 (1947); Federal Savings & Loan Ins. ", "Corp. v. Urschel, 159 Kan. 674, 157 P.2d 805 *895 (1945); Blondell v. Turover, 195 Md. 251, 72 A.2d 697 (1950).", "\n2. ", "As we do not agree with the lower court on the validity of Betty Arden's record title, we must turn to examine the affirmative defenses. ", "If one of them is established, the judgment below must be affirmed.", "\n(A) Adverse possession. ", "From 1939 until the divorce in 1960 John Arden paid the taxes on the property. ", "Since the divorce, Betty has paid them. ", "After World War II, John and Betty lived on the property. ", "In 1946 they built a garage and used it as their home. ", "Later they built a home, barn, corrals and fences at a total cost of about $33,000. ", "Most of the time they ran livestock, raised, cut and baled hay. ", "From March 29, 1957, through February 29, 1960, they conveyed away five parcels. ", "In a title controversy between strangers, a court could find all requisites needed to establish the acquisition of title by adverse possession whether claiming under NRS 11.120, NRS 11.140 and NRS 11.070, or NRS 40.090; O'Banion v. Simpson, 44 Nev. 188, 191 P. 1083 (1920); Zubieta v. Tarner, 76 Nev. 243, 351 P.2d 982 (1960); Su Lee v. Peck, 49 Nev. 124, 240 P. 435 (1925). ", "Rodgers v. Carpenter, 44 Nev. 4, 189 P. 67 (1920). ", "Here, however, the title dispute is not between strangers. ", "It is between co-tenants who are brothers and sisters. ", "One requisite of adverse possession is hostility. ", "Even as between co-tenants who are not related, the tenant out of possession may assume that the permissive possession of his co-tenant is amicable until notified that it has become hostile; and the evidence needed to show hostility or notice must be stronger than that required in a case between strangers. ", "Wilkerson v. Thomas, 121 Cal. ", "App.2d 479, 263 P.2d 678 (1953); Elder v. McClaskey, 70 F. 529 (6th Cir.1895). ", "Where, as here, the co-tenants also are brothers and sisters, the relationship is not unlike that of trust and, we think, demands that the tenant in possession openly disavow the claims of his brothers and sisters, and unequivocally make his claim of sole ownership known to them. ", "Levy v. Ryland, 32 Nev. 460, 109 P. 905 (1910). ", "John Arden never told his brothers and sisters that he claimed to be the sole owner. ", "He so testified. ", "Indeed, he acknowledged the interest of brother Bill by making provision for him in the divorce settlement with Betty. ", "At that time, he also was aware that all brothers and sisters might assert an interest for he asked Betty to check with them. ", "Clearly, John's state of mind was such that he did not believe that his possession of the property and the improvements placed thereon was a hostile possession in the thoughts of his brothers and sisters. ", "Nor does the record intimate that any of the brothers and sisters believed John's possession to be hostile or adverse to their interests. ", "Co-tenants who are brothers and sisters bear a fiduciary relationship to one another. ", "Each is entitled to trust the other, and not question conduct unless its purpose is clearly made known. ", "We adopt the rule of Levy v. Ryland, supra, as equally applicable to co-tenants who are brothers and sisters. ", "Accordingly, on this record, we must view John's possession as having been with the permission of his brothers and sisters, rather than adverse or hostile. ", "Nor does the fact that John conveyed away small parcels change our view, for the first of such conveyances was on March 29, 1957, less than 5 years before this action was commenced. ", "NRS 11.070; NRS 11.080. ", "As the limitation period had not run, we need not decide whether conveyances of parts of the property by a co-tenant in possession, standing alone, would sustain a finding of hostility against a co-tenant brother or sister.[3] Cf. ", "Witherspoon *896 v. Brummett, 50 N.M. 303, 176 P.2d 187 (1946) where the co-tenant in possession conveyed away the entire tract to a stranger who took actual, open and exclusive possession; also O'Banion v. Simpson, 44 Nev. 188, 191 P. 1083 (1920).", "\n(B) Laches. ", "Especially strong circumstances must exist to sustain the defense of laches when the statute of limitations has not run. ", "Miller v. Walser, 42 Nev. 497, 181 P. 437 (1919). ", "Each case must be examined with care. ", "Cooney v. Pedroli, 49 Nev. 55, 235 P. 637 (1925). ", "Perhaps the most important inquiry is whether the party urging laches has been prejudiced by his opponent's delay in asserting rights. ", "We perceive no prejudice here and no good reason to prefer the equitable doctrine of laches to the applicable statute of limitation and, by doing so, deny a remedy to the co-tenants out of possession. ", "Witnesses were available to each side. ", "The history of the Arden family property was traced from the time of its acquisition to the time of trial. ", "Prejudice may not be claimed for lack of evidence occasioned by the delay. ", "It seems best to resolve this case on its merits, for we can ascertain the merits from the witnesses who related the family story. ", "The merits are not hidden from us. ", "As the record tells the story, there is no reason to avoid coming to grips with the case simply because time short of the legal limitation period has passed.", "\n(C) Estoppel by deed. ", "The lower court concluded that the plaintiffs, by reason \"of the execution and delivery of the deed dated February 6, 1937, are estopped to deny its validity.\" ", "By definition the doctrine of estoppel by deed does not touch this case. ", "That doctrine, sometimes referred to as the doctrine of after acquired title, estops a grantor from asserting that he acquired title after and not before the conveyance. ", "It forbids the grantor from denying his misrepresentation as to title contained in the deed. ", "Tiffany, Real Property, 3d ed., ", "ch. ", "29, § 1230. ", "Here all agree that the grantors named in the deed of February 6, 1937, had title to the property. ", "No one contends that they were without title on that date and later acquired it. ", "No one contends that there was a misrepresentation as to title. ", "Clearly the doctrine of estoppel by deed is not involved.", "\nFor the reasons expressed we conclude that the heirs of the estate of Philip Arden each own an undivided one-eleventh interest as tenants in common in the real property described in the judgment entered below, except Theodore Arden, deceased, whose one-eleventh interest descended to his heirs, and John Arden whose one-eleventh interest was conveyed to Betty Arden by deed dated July 29, 1960. ", "John and Betty Arden are accountable to the plaintiffs below for all sums received from those who purchased parcels of the inherited real property, and are also entitled to credit for the improvements of and payments made upon the property described in the judgment below. ", "As mentioned in footnote 1 of this opinion, some of the heirs of Philip Arden, who were plaintiffs below, withdrew from the litigation. ", "The withdrawal did not effectuate a transfer of their undivided interests in the property. ", "Accordingly, their title is the same as those who did not withdraw as parties plaintiff. ", "We therefore reverse the judgment below, and remand this cause for further proceedings in accordance with the views expressed herein.", "\nBADT, J., and ZENOFF, D.J., concur.", "\nNOTES\n[1] The eleven surviving children were: Philip Arden, William Arden, Theodore Arden, John Arden, Tom Arden, Ann Chaix, Louise Lanigir, Ivy Lanigir, Lydia Russ, Josephine Gerbig and Mary Dittman. ", "All were plaintiffs below, except John who was a defendant and Theodore who had died. ", "Theodore's widow Marge and son Theodore were also plaintiffs. ", "At the conclusion of plaintiffs' case in chief, Philip, Josephine and Mary withdrew, not wishing to assert any interest in the property. ", "Thus eight of the original eleven plaintiffs remained. ", "They lost below. ", "All but William have appealed. ", "For reasons mentioned later, the withdrawal of Philip, Josephine and Mary and the decision of William not to appeal, do not affect their interests in the property.", "\n[2] John Arden intimates that, sometime later (date unknown), his brothers and sisters agreed to give him the property. ", "The trial court ignored that intimation. ", "In any event, real property is not conveyed orally, nor may a court sensibly construe the 1937 deed to the Hermanns to be a deed of gift to John Arden.", "\n[3] The lower court ruled that the plaintiffs were barred by the limitations of NRS 11.190 which concerns actions \"other than those for the recovery of real property.\" ", "In Kerr v. Church, 74 Nev. 264, 329 P.2d 277 (1958), clear dictum advises that the applicable statute of limitation to a quiet title action is NRS 11.080. ", "That statute specifies a 5-year limitation period. ", "See also NRS 11.070.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0008659265004098415, 0.0013787426287308335, 0.0006380979903042316, 0.0006672057206742465, 0.0006697825156152248, 0.0008353214361704886, 0.0006641775835305452, 0.0008950134506449103, 0.0006276383646763861, 0.0006285230629146099, 0.0007410033140331507, 0.0006368208560161293, 0.0006886162445880473, 0.0009831360075622797, 0.0006790577317588031, 0.0006196977919898927, 0.0008380796061828732, 0.0005663793999701738, 0.0006694598705507815, 0.0007604568381793797, 0.0007180479005910456, 0.0005312050343491137, 0.0009392039501108229, 0.0006369425682350993, 0.0007743945461697876, 0.0007455091108568013, 0.0005931422929279506, 0.0007142917602322996, 0.000642342318315059, 0.000683582155033946, 0.00058193743461743, 0.0006852669757790864, 0.0006889825453981757, 0.0008287410601042211, 0.0006696548080071807, 0.0006521064206026495, 0.0006079788436181843, 0.0006255400949157774, 0.0009072776883840561, 0.0006308777374215424, 0.0005979944835416973, 0.0007784734480082989, 0.0008193764369934797, 0.0007294279057532549, 0.0006190274725668132, 0.00070137222064659, 0.0006254373001866043, 0.0007065819227136672, 0.0007806087960489094, 0.0007089923601597548, 0.0006546080112457275, 0.0006124863284640014, 0.000592550088185817, 0.0006322351400740445, 0.0006682045059278607, 0.0007784734480082989, 0.0007590298191644251, 0.0006862286245450377, 0.0008414716576226056, 0.0006079843733459711, 0.0011516924714669585, 0.0005858098738826811, 0.001377022359520197, 0.0007111154845915735, 0.0006646107067354023, 0.0010914624435827136, 0.0007736502448096871, 0.0008377953781746328, 0.0011860732920467854, 0.0006052791140973568, 0.0005701265763491392, 0.0007770523079670966, 0.0015055714175105095, 0.005018687341362238, 0.0013544518733397126, 0.0009147927048616111, 0.0010508822742849588, 0.0015197087777778506, 0.0006194952293299139, 0.0006797920214012265, 0.0007271895301528275, 0.0006405577878467739, 0.0007327721687033772, 0.0010586567223072052, 0.0006751424516551197, 0.0009401454008184373, 0.0007896244060248137, 0.0006644843961112201, 0.0007217718521133065, 0.0008097922545857728, 0.0009768500458449125, 0.0006624814704991877, 0.0005776852485723794, 0.0009410289931111038, 0.0007796200807206333, 0.002915280172601342, 0.0006354691577143967, 0.0006881557637825608, 0.0006203989614732563, 0.0005956085515208542, 0.0008671481045894325, 0.0006459708674810827, 0.0009486263152211905, 0.0009383860160596669, 0.0006123995990492404, 0.0007678992114961147, 0.0005608093924820423, 0.0007547533605247736, 0.0005921577685512602, 0.0007021286292001605, 0.0006547674420289695, 0.0005887591396458447, 0.0006828291807323694, 0.0005125016323290765, 0.0006531946128234267, 0.0005459894309751689, 0.001564163831062615, 0.0007217944948934019, 0.00080037338193506, 0.0007097745547071099, 0.0009735400672070682, 0.0006766191218048334, 0.0009292636532336473, 0.0007902503712102771, 0.0006181122153066099, 0.0006206434918567538, 0.0006738330703228712, 0.0008609482320025563, 0.0005857528885826468, 0.0005628332728520036, 0.0006130332476459444, 0.000828457938041538, 0.0006117259035818279, 0.0005764856468886137, 0.0007053366280160844, 0.0007539769867435098, 0.0022928938269615173, 0.0007194479694589972, 0.0006878849235363305, 0.0006233348394744098, 0.0024369286838918924, 0.0008821460651233792, 0.000695101625751704, 0.0006389657501131296, 0.000717992486897856, 0.000771642429754138, 0.0007230802439153194, 0.000699035357683897, 0.0005907526356168091, 0.0006423447630368173, 0.001994825666770339 ]
0.000823
151
[ "Q:\n\n\"Adapter\" or \"adaptor\"?", "\n\nIn programming, which spelling—adapter or adaptor—is standard or de facto standard? ", " Is there a difference between them?", "\nIn boost I see \"adaptor\", whereas in literature I see \"adapter\".", "\nWhich one is preferred in code?", "\n\nA:\n\nThey are both correct, though I think there's a slight preference for adapter to be used for people (such as someone who adapts a piece of music), while adaptor is used for a device or machine; thus, in computing, adaptor would generally be used. ", "Wikipedia mentions this distinction, though without any real references to back it up. ", "I would use whichever you feel more comfortable with, or the one in already in use in the code base you're working in if the word has been used already.", "\n\nA:\n\nIt is spelled Adapter in the 'Gang of Four' book (page 139) which is often considered definitive.", "\nThe term would usually be spelled Adaptor in British English.", "\nA full reference for the 'Gang of Four' book is:\n\nDesign Patterns: Elements of Reusable Object-Oriented Software by\n Erich Gamma (Author), Richard Helm (Author), Ralph Johnson (Author),\n John Vlissides (Author)\n\nA:\n\nAs an Aussie, I spell it Adaptor (an Adapter is a person who adapts, an adaptor is a device that performs adaptation). ", "My teammate (who is Kiwi) spells it Adapter (which makes our code 'interesting' at times). ", "The Yanks I know spell it Adapter, and I have no idea what the Poms use! ", "It's obviously a dialectic thing.", "\nIf your programming language supports unicode, name it with a schwa j/k\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000663583748973906, 0.0008316081948578358, 0.0007320326403714716, 0.0005772042204625905, 0.0007273555384017527, 0.0005558538250625134, 0.0005657788715325296, 0.0005411356105469167, 0.0005779342027381063, 0.0006030862568877637, 0.0006334060453809798, 0.0009633211302570999, 0.00205384218133986, 0.0006771806511096656, 0.00305830966681242 ]
0.000917
15
[ "Q:\n\nLeaflet minimap scrollwheel zoom disable\n\nI am having an issue disabling scrollwheel zoom in Leaflet Minimap. ", "\nI am instantiating the minimap with a centerFixed and a zoomLevelFixed option as per https://github.com/Norkart/Leaflet-MiniMap/pull/95 but I can still zoom with the scroll wheel; Panning is disable though. ", "\nThe following is the code\n <!", "DOCTYPE html>\n <html>\n <head>\n <meta charset=\"utf-8\" />\n <link rel=\"stylesheet\" href=\"fullscreen.css\" />\n <!-- ", "Leaflet -->\n <link rel=\"stylesheet\" \n href=\"https://unpkg.com/leaflet@1.0.1/dist/leaflet.css\" />\n <script src=\"https://unpkg.com/leaflet@1.0.1/dist/leaflet.js\" \n type=\"text/javascript\"></script>\n\n <!-- ", "Leaflet Plugins -->\n <link rel=\"stylesheet\" href=\"Control.", "MiniMap.css\" />\n <script src=\"Control.", "MiniMap.js\" type=\"text/javascript\"></script>\n\n </head>\n\n <body>\n <div id=\"map\" ></div>\n\n <script type=\"text/javascript\">\n\n var map = new L.Map('map', { scrollWheelZoom: false});\n var osmUrl='http://{s}.tile.openstreetmap.org/{z}/{x}/{y}.png';\n var osmAttrib='Map data &copy; OpenStreetMap contributors';\n var osm = new L.TileLayer(osmUrl, {/*minZoom: 5, maxZoom: 18,*/ attribution: osmAttrib});\n map.addLayer(osm);\n map.setView(new L.LatLng(59.92448055859924, 10.758276373601069),10);\n\n //Plugin magic goes here! ", "Note that you cannot use the same layer object again, as that will confuse the two map controls\n var osm2 = new L.TileLayer(osmUrl, {/*minZoom: 0, maxZoom: 13,*/ attribution: osmAttrib });\n\n var miniMap = new L.Control.", "MiniMap(osm2, \n { position: \"topright\",\n centerFixed: [40.7842, -73.9919],\n toggleDisplay: true, \n zoomLevelFixed: true\n }).addTo(map);\n </script>\n </body>\n </html>\n\nI appreciate any guidance in solving this issue. ", "Thank you!", "\n\nA:\n\nI suppose you should use disable instead of false.", "\n map.scrollWheelZoom.disable();\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0007758245337754488, 0.0006367198657244444, 0.0008908305317163467, 0.0009612335124984384, 0.0007617013761773705, 0.0007338980212807655, 0.0007832491537556052, 0.0008766793180257082, 0.0007115448825061321, 0.0005610261578112841, 0.0006529157399199903, 0.0011488907039165497, 0.0008059741812758148 ]
0.000792
13
[ "Day 01 : Arrive Delhi\n\nRepresentative from India Special Travel will pick you up on your arrival point at Delhi Airport, and transfer to your hotel for re-freshening up you will followed full day Delhi sightseeing.", "\n\nDelhi Sightseeing (Approx 7 – 8 hours)\n\nSpecial highlights of the day : Qutub Minar, Red Fort.", "\n\nOptional Places to visit : Laxmi Narayan temple, Mahatma Gandhi Museum, Akshardham temple.", "\n\nAfter freshening up visit Delhi sightseeing, including visit to Red fort, Raj Ghat, India Gate, President’s house, Qutab Minar, Lotus temple. ", "Finally in evening you will be taken back to your hotel & overnight stay in Delhi.", "\n\nDay 02 : Delhi to Jaipur 265 km ( Approx 4 – 5 hour drive) Jaipur sightseeing (Approx 5 hours)\n\nMeal Plan : Breakfast\n\nSpecial highlights of the day : Elephant ride, Pink City market , Amber Fort.", "\n\nOptional Places to visit : Birla temple, Albert hall museum.", "\n\nAfter breakfast at hotel, you will travel to Jaipur “pink city” on arrival checking your hotel, for relax and after re-freshening up you will followed by full day Jaipur sightseeing, you will visit Amber fort “enjoy an elephant ride” Jal Mahal- “water palace”, Hawa Mahal-“a palace of wind”, the city palace museum & Jantar Mantar “astronomical observatory “after sightseeing you may do shopping in famous pink city market, and night stay in Jaipur.", "\n\nDay 03 : Jaipur to Agra 245 Km (Approx 4 – 5 hours drive)\n\nMeal Plan : Breakfast\n\nSpecial highlights of the day : Agra Fort.", "\n\nOptional Places to visit : Fatehpur Sikri,\n\nAfter breakfast at hotel, you will travel to Agra home town of (Taj) on the way you’ll see Fatehpur Sikri, on arrival to Agra check into your hotel, relax and after refreshening up you will do some sightseeing like Agra Red fort, Itmad-ud-Daulah, (Baby Taj) in the evening you may have glimpse of the sunset of Taj Mahal from Mehtab Bagh, back to hotel & night stay in Agra.", "\n\nDay 04 : Taj Mahal visit to Delhi Airport transfer 230 Km (Approx 4 hour drive)\n\nMeal Plan : Breakfast,\n\nSpecial highlights of the day : Taj Mahal\n\nOptional Places to visit : Vrindavan, Mathura temple birthplace God of (Krishna)\n\nToday you will have an early start to view the sunrise over the Taj Mahal. ", "Emperor Shah Jahan built Taj Mahal in the memory of his third wife, Mumtaz Mahal. ", "Taj Mahal is world’s most beautiful monument and it’s good to see the sunset or sunrise. ", "So, in the morning you may see the spectacular view of sunrise on Taj Mahal. ", "Later return back to hotel, have breakfast,\n\nAfter breakfast at hotel, you will be taken back to Delhi airport for your next destination / homeward journey." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005258501623757184, 0.0006114746211096644, 0.0005582713056355715, 0.0005858696531504393, 0.0006351818447001278, 0.0005809938884340227, 0.0005692526465281844, 0.0009363559074699879, 0.0005662695621140301, 0.0005750094424001873, 0.0005458413506858051, 0.0008473650668747723, 0.0006117494776844978, 0.0005639633745886385, 0.0006211381987668574 ]
0.000622
15
[ "Receptor for hyaluronan-mediated motility isoform B promotes liver metastasis in a mouse model of multistep tumorigenesis and a tail vein assay for metastasis.", "\n\n@article{Du2011ReceptorFH,\ntitle={Receptor for hyaluronan-mediated motility isoform B promotes liver metastasis in a mouse model of multistep tumorigenesis and a tail vein assay for metastasis.},", "\nauthor={Yi-Chieh Nancy Du and Chen-Kung Chou and David S. Klimstra and H. E. Varmus},\njournal={Proceedings of the National Academy of Sciences of the United States of America},\nyear={2011},\nvolume={108 40},\npages={\n16753-8\n}\n}\n\nThe gene encoding the receptor for hyaluronan-mediated motility (RHAMM) is overexpressed in many human cancers. ", "However, it is unclear whether RHAMM plays a causal role in tumor initiation or progression. ", "Using somatic gene transfer in a mouse model of islet cell tumorigenesis, we demonstrate that RHAMM isoform B (RHAMM(B)) promotes tumor growth and metastases to lymph nodes and the liver. ", "The propensity of RHAMM(B)-expressing cells to metastasize to the liver was confirmed using an… CONTINUE READING" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007346267811954021, 0.0007267585606314242, 0.0006834759842604399, 0.0005908638704568148, 0.0007136609638109803, 0.000646510103251785 ]
0.000683
6
[ "ADVERTISEMENT\n\nQUIZ: How much do you know about the American West's wild horse population?", "\n\nA recent evaluation by a National Research Council committee sheds light on the National Wild Horses and Burros Program.", "\n\nNov 19, 2013\n\nBy dvm360.com staff\n\nDVM360 MAGAZINE\n\nA: The animals moved from public lands are sold or adopted, but they are also moved to short-term holding facilities and, if unadoptable, moved to long-term holding facilities. ", "As protected animals, horses and burros removed from public lands are not slaughtered or euthanized if healthy." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0008173921960406005, 0.0005747763207182288, 0.0006171047571115196, 0.004717088770121336 ]
0.001682
4
[ "Q:\n\nVagrant provision script: echo \"source /root/.venvburrito/startup.sh\" >> ~/.profile fails\n\nI'm running my vagrant provisioning with a bootstrap.sh script. ", "The script runs fine except for one line:\necho \"source /root/.venvburrito/startup.sh\" >> ~/.profile\n\nThis line fails. ", "I don't get any output about it, but when I do vagrant ssh and check the ~/.profile file I can see that source /root/.venvburrito/startup.sh is not appended to the file. ", "\nHow can I append source /root/.venvburrito/startup.sh to the file so that command is sourced every time I do vagrant ssh?", "\n\nA:\n\nThe shell (and most other) provisioners are run as the root user using sudo. ", "But for the shell provisioner you can set privileged attribute to false to run as the SSH user.", "\nExample:\nVagrant.configure(\"2\") do |config|\n # ...\n\n config.vm.provision \"shell\", path: \"bootstrap.sh\", privileged: false\nend\n\nSee the documentations for more details.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0012399890692904592, 0.0008164738537743688, 0.001221512327902019, 0.00594592047855258, 0.000830572796985507, 0.001138791092671454, 0.0007181252585723996, 0.001994825666770339 ]
0.001738
8
[ "Aging and risk: physical and sexual abuse of elders in Canada.", "\nIn this article, we review the literature on physical and sexual elder abuse within the context of risk theory and feminist sociology. ", "Employing data from the 1999 General Social Survey, we also examine several variables potentially associated with the risk for physical or sexual abuse of elders. ", "Women, Aboriginal Canadians, and elders who are divorced, living in urban areas with low income have a higher risk of physical or sexual abuse. ", "This supports risk and anxiety as factors. ", "Further testing of elder abuse using this theoretical framework is required." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.003935650456696749, 0.0010532962623983622, 0.0012102016480639577, 0.04150665923953056, 0.0005895222420804203, 0.0005611708620563149 ]
0.008143
6
[ "Marriage Act 1994\n\nThe Marriage Act 1994 (c. 34) is an Act of the Parliament of the United Kingdom. ", "Introduced as a private member's bill by Gyles Brandreth, it amended the Marriage Act 1949 to allow marriages to be solemnized in certain \"approved premises\". ", "Prior to the act, marriage ceremonies could only be conducted in churches and register offices.", "\n\nReferences\n\nExternal links\n\nCategory:United Kingdom Acts of Parliament 1994\nCategory:Family law in the United Kingdom\nCategory:Marriage law\nCategory:Marriage, unions and partnerships in the United Kingdom" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0008726735250093043, 0.0007465587696060538, 0.000590811250731349, 0.0005985361058264971 ]
0.000702
4
[ "Q:\n\nEmber-data failing to load relationships\n\nI'm having trouble loading some related models with ember-data. ", "I'm pretty sure this is a syntax error on my part, but I just can't see it. ", "Perhaps someone could be a second set of eyes for me?", "\nThe specific problem is that related models are not being displayed in my template.", "\nWithout further ado:\nNotes\n\nI'm using ember-appkit-rails. ", "\nThis is my first ember project, so please forgive my n00bness.", "\nI have a feeling that the answer may have something to do with embedded: 'always', but I have no idea how to integrate that into my code.", "\nDEBUG: Ember : 1.4.0 ember.js?body=1:3462\nDEBUG: Ember Data : 1.0.0-beta.7+canary.f482da04 ember.js?body=1:3462\nDEBUG: Handlebars : 1.3.0 ember.js?body=1:3462\nDEBUG: jQuery : 1.11.0 ember.js?body=1:3462\n\nThe problematic template\nI'd think that this should work. ", "It's almost right out of the ember-appkit-rails generators. ", "The librettist and composer names are not appearing.", "\n<h3>{{id}}</h3>\n\n<p>{{link-to 'Edit' 'operas.edit' this}} <button {{action destroyRecord this}}>Destroy</button></p>\n\n<ul>\n <li>Title: {{title}}</li>\n <li>Alternate Title: {{alternate_title}}</li>\n <li>Source: {{source}}</li>\n <li>Librettist: {{librettist.name}}</li>\n <li>Composer: {{composer.name}}</li>\n <li>Notes: {{notes}}</li>\n</ul>\n\nModels\nopera.js.es6\nexport default DS.Model.extend({\n title: DS.attr('string'),\n alternateTitle: DS.attr('string'),\n source: DS.attr('string'),\n librettistId: DS.attr('number'),\n composerId: DS.attr('number'),\n notes: DS.attr('string'),\n composer: DS.belongsTo('composer'),\n librettist: DS.belongsTo('librettist')\n});\n\nlibrettist.js.es6\nexport default DS.Model.extend({\n name: DS.attr('string'),\n operas: DS.hasMany('opera')\n});\n\ncomposer.js.es6\nexport default DS.Model.extend({\n name: DS.attr('string'),\n operas: DS.hasMany('opera')\n});\n\nActiveModel Serializer\nclass OperaSerializer < ActiveModel::Serializer\n embed :ids, include: true\n\n attributes :id, :title, :alternate_title, :source, :librettist_id, :composer_id, :notes\n has_one :composer\n has_one :librettist\nend\n\nSample JSON being returned\nThis is what I see when I look at one opera record, but the structure holds for the entire set:\n{\n \"composers\": [\n {\n \"id\": 4097,\n \"name\": \"Müller, Wenzel\"\n }\n ],\n \"librettists\": [\n {\n \"id\": 1414,\n \"name\": \"Bäuerle, Adolf\"\n }\n ],\n \"opera\": {\n \"alternate_title\": \"oder Wien in einem anderen Weltteile\",\n \"composer_id\": 4097,\n \"id\": 4166,\n \"librettist_id\": 1414,\n \"notes\": \"these are some notes\",\n \"source\": \"F116.Theater.a.d.", "Wien.260A.Mus; Mus.", "Hs.78.Mus; Mus.", "Hs.25409.Mus\",\n \"title\": \"Aline Königin von Golkonda\"\n }\n}\n\nI've also tried this approach with inline embedding ({opera: {...composer: {...}}}) but that didn't work any better.", "\nThanks for your help!", "\nPaul.", "\n\nA:\n\nthe _id are not necessary if you're using the RESTAdapter as your client-side adapter.", "\nApp.", "Opera = DS.Model.extend({\n title: DS.attr('string'),\n alternateTitle: DS.attr('string'),\n source: DS.attr('string'),\n notes: DS.attr('string'),\n composer: DS.belongsTo('composer'),\n librettist: DS.belongsTo('librettist')\n});\n\nApp.", "Librettist = DS.Model.extend({\n name: DS.attr('string'),\n operas: DS.hasMany('opera')\n});\n\nApp.", "Composer = DS.Model.extend({\n name: DS.attr('string'),\n operas: DS.hasMany('opera')\n});\n\nJSON\n{\n \"composers\": [\n {\n \"id\": 4097,\n \"name\": \"Müller, Wenzel\"\n }\n ],\n \"librettists\": [\n {\n \"id\": 1414,\n \"name\": \"Bäuerle, Adolf\"\n }\n ],\n \"opera\": {\n \"alternate_title\": \"oder Wien in einem anderen Weltteile\",\n \"composer\": 4097,\n \"id\": 4166,\n \"librettist\": 1414,\n \"notes\": \"these are some notes\",\n \"source\": \"F116.Theater.a.d.", "Wien.260A.Mus; Mus.", "Hs.78.Mus; Mus.", "Hs.25409.Mus\",\n \"title\": \"Aline Königin von Golkonda\"\n }\n}\n\nhttp://emberjs.jsbin.com/OxIDiVU/233/edit\nIf you're using the ActiveModelAdapter then you'd use the _id in the json, here's an example with the ActiveModelAdapter\nhttp://emberjs.jsbin.com/OxIDiVU/234/edit\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000643951294478029, 0.0007378830923698843, 0.0009279117221012712, 0.0010333526879549026, 0.0006844510789960623, 0.023578280583024025, 0.0005502399289980531, 0.0013138927752152085, 0.000674889306537807, 0.0006406655302271247, 0.0009527780348435044, 0.0010795899434015155, 0.0011459930101409554, 0.0006806554738432169, 0.0005757849430665374, 0.0011083564022555947, 0.001109614036977291, 0.0008479401003569365, 0.0006873885286040604, 0.0006753065390512347, 0.0006702163373120129, 0.0010795899434015155, 0.0011459930101409554, 0.0007720745634287596 ]
0.001805
24
[ "65th issue of \"Kolekcja Wozów Bojowych\" will describe German light tank PzKpfw I, it's history of development and construction. ", "Ready-made diecast model of PzKpfw I Ausf. ", "B in 1:72 scale will be added to the magazine." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0009136904845945537, 0.006722788326442242, 0.0006320850807242095 ]
0.002756
3
[ "Angel House Plants Exotic Most Beautiful Indoor Plants Easy Care Tips A Piece Of Thing About Growing Indoor Plants Is The Low Light Conditions Most Spaces Have These Trailing House Plants Can Do Well In Low Light Or Bright Light\n\nangel house plants exotic most beautiful indoor plants easy care tips a piece of thing about growing indoor plants is the low light conditions most spaces have these trailing house plants can do well in low light or bright light." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005715106963180006 ]
0.000572
1
[ "The transition from fetal to adult life involves dramatic changes in vascular reactivity, particularly in cerebral arteries where both the capacity to contract and the ability to relax improve simultaneously during postnatal life. ", "The rates and patterns of these maturational changes, in turn, are highly susceptible to environmental stresses such as chronic hypoxia, which can potently depress pharmacomechanical coupling through multiple simultaneous effects. ", "Whereas it is clear that chronic hypoxia alters agonist-induced calcium mobilization and myofilament calcium sensitivity, the mechanisms that mediate hypoxia's effects on vascular reactivity remain unclear. ", "Hypoxia-induced changes in endothelial production and release of NO contribute to the overall cerebrovascular effects of hypoxia, but major changes in reactivity to NO are also involved. ", "Similarly, changes in cGMP metabolism contribute to the cerebrovascular effects of chronic hypoxia, but again, major changes in the mechanisms coupling cGMP to vasorelaxation are an essential component of the cerebrovascular adaptation to chronic hypoxia. ", "The single most important effector of vasorelaxation downstream of cGMP is Protein Kinase G (PKG), which in cerebral arteries mediates almost all vasodilator effects of cGMP. ", "Despite the central importance of PKG, its role in cerebrovascular function has been largely ignored, particularly in immature cerebral arteries. ", "Virtually nothing is known of the effects of chronic hypoxia on cerebrovascular PKG function in any artery type or age. ", "In light of these deficits, and the strong potential for PKG to play a key role in cerebrovascular adaptation to chronic hypoxia, the proposed studies focus on the general mechanisms involved in PKG-mediated vasorelaxation, and how these are modulated by maturation and chronic hypoxia. ", "The general hypothesis addressed by these studies is that chronic hypoxia selectively enhances the ability of Protein Kinase G to elicit cerebral vasodilatation in an age-dependent and artery-specific manner. ", "This main hypothesis, in turn, has four main corollaries, each of which proposes that hypoxia influences a mechanism whereby Protein Kinase G modulates pharmacomechanical coupling: 1) PKG modulates coupling between activation of cell surface receptors and synthesis of the second messenger IP3;2) PKG alters the ability of second messengers such as IP3 to elicit calcium entry and/or release;3) PKG influences thick filament reactivity, as indicated by the relation between cytosolic calcium and the extent of myosin light chain phosphorylation;and 4) PKG differentially enhances thin filament reactivity, as indicated by the relation between myosin fight chain phosphorylation and the production of contractile force. ", "To evaluate the main hypothesis and its corollaries, we will conduct experiments designed to: 1. ", "Quantify the distribution, abundance, and activity of cerebrovascular PKG isoforms 1alpha and 1beta using immunohistochemical, immunoblotting, and PKG activity measurements; 2. ", "Quantify the effect of PKG activation on the coupling efficiency between receptor activation and IP3 production using functional measurements of agonist affinity and simultaneous IP3 accumulation; 3. ", "Determine the effect of PKG activation on calcium entry and release using fluorometric measurements of cytosolic and organellar calcium together with microautoradiographic measurements of IP3 receptor density and binding affinity; 4. ", "Determine the effect of PKG activation on thick filament reactivity as indicated by the relation between cytosolic calcium and myosin light chain phosphorylation, measured using fluorometric measurements of cytosolic calcium together with immunoblotting of phospho- and dephospho-myosin light chain;and 5. ", "Determine the effect of PKG activation on thin filament reactivity as indicated by the relation between the extent of myosin fight chain phosphorylation, measured using immunoblotting of phospho- and dephospho-myosin light chain, and force development measured in arterial rings. ", "To address the effects of perinatal maturation on the function of Protein Kinase G, we will conduct these experiments in both term fetuses and non-pregnant adults. ", "To define the importance of arterial size and type, all experiments will be conducted in a series of arteries including the common carotid, basilar, posterior communicating, and middle cerebral arteries. ", "Finally, to enable assessment of the role of changes in Protein Kinase G function associated with hypoxic acclimatization, parallel studies will be carried out in normoxic animals and in animals acclimatized to high altitude hypoxia. ", "Together, the results of these experiments will enable an unprecedented assessment of the mechanisms whereby maturation and hypoxic acclimatization modulate the cerebrovascular role of Protein Kinase G." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.0006307890871539712, 0.0010666812304407358, 0.0012016789987683296, 0.0018020268762484193, 0.0014475052012130618, 0.000776791013777256, 0.0007062123622745275, 0.001415969803929329, 0.0008688245434314013, 0.0008043832494877279, 0.0018239972414448857, 0.0005810235743410885, 0.0006412220536731184, 0.0007183976704254746, 0.0007679829723201692, 0.0009850905044004321, 0.000937650038395077, 0.002190591301769018, 0.0006130394176580012, 0.0009777070954442024, 0.0007065988029353321 ]
0.001032
21
[ "/*\n * Licensed to the Apache Software Foundation (ASF) under one\n * or more contributor license agreements. ", " See the NOTICE file\n * distributed with this work for additional information\n * regarding copyright ownership. ", " The ASF licenses this file\n * to you under the Apache License, Version 2.0 (the\n * \"License\"); you may not use this file except in compliance\n * with the License. ", " You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.", "\n * See the License for the specific language governing permissions and\n * limitations under the License.", "\n */\npackage org.apache.drill.metastore.config;\n\nimport org.apache.drill.common.config.", "ConfigFileInfo;\n\n/**\n * Metastore {@link ConfigFileInfo} implementation which provides names of Metastore specific configuration files.", "\n */\npublic class MetastoreConfigFileInfo implements ConfigFileInfo {\n\n @Override\n public String getDefaultFileName() {\n return MetastoreConfigConstants.", "DEFAULT_RESOURCE_FILE_NAME;\n }\n\n @Override\n public String getModuleFileName() {\n return MetastoreConfigConstants.", "MODULE_RESOURCE_FILE_NAME;\n }\n\n @Override\n public String getDistributionFileName() {\n return MetastoreConfigConstants.", "DISTRIBUTION_RESOURCE_FILE_NAME;\n }\n\n @Override\n public String getOverrideFileName() {\n return MetastoreConfigConstants.", "OVERRIDE_RESOURCE_FILE_NAME;\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0006081246538087726, 0.0005401495727710426, 0.0005986080504953861, 0.0005520833656191826, 0.0005548830376937985, 0.0013000055914744735, 0.0008421489619649947, 0.0066989208571612835, 0.0016871150583028793, 0.0012985051143914461, 0.0012300395173951983, 0.0008791826548986137 ]
0.001399
12
[ "tag:blogger.com,1999:blog-5860204693678397893.post5397077586777486752..comments2012-09-12T11:21:32.926-06:00Comments on Flay-Rah: I can't believe it's VEGAN Macaroni & \"Cheese\"!sunrabbitnoreply@blogger.comBlogger5125tag:blogger.com,1999:blog-5860204693678397893.post-38540110886626301462011-03-14T20:20:54.224-06:002011-03-14T20:20:54.224-06:00Yeah, my 8 and 5 year old really like it, but my y...Yeah, my 8 and 5 year old really like it, but my youngest is still not so sure about it. ", "But this has become my go-to cheese sauce--soon I will post my vegan enchiladas with a nacho version of this cheese sauce. ", "Yum!sunrabbithttps://www.blogger.com/profile/14640812469129891547noreply@blogger.comtag:blogger.com,1999:blog-5860204693678397893.post-73100197771008593322011-03-14T18:40:45.370-06:002011-03-14T18:40:45.370-06:00My husband and I loved this. ", "My girls not so much....My husband and I loved this. ", "My girls not so much. ", "I think my mistake was calling in mac n cheese because they were expecting krafts. ", "Next time I will just call it pasta.heathermommyhttps://www.blogger.com/profile/13189662387049077692noreply@blogger.comtag:blogger.com,1999:blog-5860204693678397893.post-86412296611284353532011-02-10T15:21:38.728-07:002011-02-10T15:21:38.728-07:00I meant, if anyone can do it!!I meant, if anyone can do it!!mardymeanshttps://www.blogger.com/profile/07569326967075731639noreply@blogger.comtag:blogger.com,1999:blog-5860204693678397893.post-78590224927446698212011-02-10T15:20:53.307-07:002011-02-10T15:20:53.307-07:00Wow, that seems like a lot of work for some mac&#3...Wow, that seems like a lot of work for some mac&#39;n&#39;cheese!! ", "But if anyone&#39;s can do it I would say you can!! ", "It does look delish!mardymeanshttps://www.blogger.com/profile/07569326967075731639noreply@blogger.comtag:blogger.com,1999:blog-5860204693678397893.post-28325664871939162982011-02-04T08:15:02.711-07:002011-02-04T08:15:02.711-07:00I am definitely going to have to try this!I am definitely going to have to try this!Cherylhttps://www.blogger.com/profile/10218614720786379961noreply@blogger.com" ]
{ "pile_set_name": "Pile-CC" }
[ 0.002959631383419037, 0.0023719107266515493, 0.004232883453369141, 0.005727231968194246, 0.04517066478729248, 0.0009508341317996383, 0.0037058601155877113, 0.0026076524518430233, 0.02610361948609352 ]
0.010426
9
[ "1. ", "Field of the Invention\nThe field of the invention relates to security storage devices, and more particularly pertains to a new and improved door safe apparatus wherein the same encloses in a secure and concealed manner a container for storage of valuables therewithin.", "\n2. ", "Description of the Prior Art\nSafety storage containers and such organizations have been presented in the prior art tho heretofore been of relatively limited application due to expense and installation required for use by individuals. ", "The instant invention attempts to overcome deficiencies of the prior art by providing organization of economical and compact construction permitting retrofitt into existing or newly constructed door members. ", "Examples of the prior art apparatus include U.S. Pat. ", "No. ", "3,717,112 to WELTY sets forth a safe member securable through a hinge plate of a door organization but is of a limited volumetric capacity limiting storage of valuables therewithin as opposed to the instant invention encompassing the door cavity of an associated door.", "\nU.S. Pat. ", "No. ", "4,172,424 to DE PALAU sets forth a wall safe for mounting within a wall structure in a conventional manner.", "\nU.S. Pat. ", "No. ", "4,244,303 to KURASIK sets forth a picture frame organization employing a compartment for storage of valuables therewithin.", "\nU.S. Pat. ", "No. ", "3,999,493 to GULYA sets forth a safety container mounted rearwardly of an electrical wall plate.", "\nU.S. Pat. ", "No. ", "4,083,314 to GARVIN sets forth a further storage unit mounted within a receptacle box rearwardly of an electrical wall plate to permit concealment of the storage unit.", "\nAs such, it may be appreciated that there continues to be a need for a new and improved door safe apparatus as set forth by the instant invention which addresses both the problems of ease of use as well as effectiveness in construction in concealing a storage container within a door cavity of an associated door." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0009392039501108229, 0.000607730878982693, 0.0011860732920467854, 0.0005939818220213056, 0.0006394997471943498, 0.0007903780206106603, 0.0013787426287308335, 0.0007365875062532723, 0.0010888095712289214, 0.0013787426287308335, 0.0006325735594145954, 0.0010888095712289214, 0.0013787426287308335, 0.00068295729579404, 0.0010888095712289214, 0.0013787426287308335, 0.0007128466968424618, 0.0010888095712289214, 0.0013787426287308335, 0.0006606586975976825, 0.0005588768981397152 ]
0.000952
21
[ "Surgical treatment of partial distal biceps tendon ruptures.", "\nTo demonstrate that surgical repair of partial distal biceps tendon ruptures allows return of supination and flexion strength nearly equal to the contralateral side without compromising range of motion. ", "We performed a retrospective study of 17 patients with unilateral partial biceps tendon ruptures who underwent surgical repair between 2003 and 2009, and who returned for further evaluation and strength testing. ", "The follow-up examination included questionnaires, x-rays, strength testing, and range of motion with comparison to the opposite side. ", "We used the Baltimore Therapeutic Equipment work simulator to objectively test isometric and dynamic elbow flexion and forearm supination strength of both extremities. ", "A total of 17 patients returned for additional testing, 14 of whom had failed nonsurgical treatment. ", "One patient had asymptomatic heterotopic ossification. ", "Two patients reported mild lateral antebrachial cutaneous nerve dysesthesias. ", "There was one partial re-rupture 4 years after the original surgery. ", "The second repair consisted of suture anchor fixation; 15 months after re-repair, the patient remains asymptomatic. ", "Average postoperative Disabilities of the Arm, Shoulder, and Hand score was 9 (range, 0-33). ", "One patient had limited pronation (50 degrees degrees). ", "The average isometric and dynamic elbow flexion was 3% and 11% stronger, respectively, compared with the opposite side. ", "Average isometric supination was 6% and average dynamic supination was 10% weaker. ", "After surgical treatment of partial distal biceps tendon tears, most patients achieved good return of strength with full motion. ", "Surgical treatment of partial distal biceps tendon tears is a viable option after failed nonsurgical treatment. ", "Therapeutic IV." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0011153314262628555, 0.0009534857817925513, 0.0005941208219155669, 0.000557774561457336, 0.0005740011110901833, 0.0006460982840508223, 0.0019604016561061144, 0.003073405474424362, 0.000759089074563235, 0.0007109037251211703, 0.0007925452082417905, 0.0006803993019275367, 0.0006261685048229992, 0.000853080244269222, 0.0006800968549214303, 0.0008944362052716315, 0.0007738195126876235 ]
0.000956
17
[ "Uresiphita insulicola\n\nUresiphita insulicola is a moth in the family Crambidae. ", "It is found in Australia, where it has been recorded from Lord Howe Island, Norfolk Island and Queensland.", "\n\nThe wingspan is about 40 mm. ", "The forewings are dark brown and the hindwings are orange with broad black tips.", "\n\nReferences\n\nCategory:Moths described in 1918\nCategory:Pyraustinae" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0016006816877052188, 0.0005933008505962789, 0.0006435954128392041, 0.0007173929479904473, 0.0006372762145474553 ]
0.000838
5
[ "Laminating adhesives are widely used in the manufacture of film/foil laminates. ", "Among many such known systems, the use of polyurethane based laminating adhesives is preferred because of their many desirable properties including good adhesion, peel strength, heat seal strength and resistance to aggressive filling goods. ", "Typically, an isocyanate-containing polyurethane prepolymer obtained by the reaction of excess diisocyanate with a polyether and/or polyester containing two or more active hydrogen groups per molecule is used in combination with a second component. ", "The second component usually is a polyether polyol and/or polyester polyol. ", "The two components are combined in a predetermined ratio and applied on one of the film or foil substrates and laminated to the second substrate. ", "Application may be from a solution in a suitable solvent using gravure or smooth roll coating cylinders or from a solvent-free state using special application machinery.", "\nSolventless laminating adhesives (adhesives that can be applied at 100% solids and that do not contain either organic solvents or water) have a distinct advantage in that they can be applied and run at very high line speeds. ", "This is due to the fact that no organic solvent or water has to be removed from the adhesive by drying. ", "Solvent- or water-based laminating adhesives are limited to the application speed that the solvent or water can be effectively dried in an oven.", "\nTypical line speeds for solvent-based and water-based laminating adhesives are 300 to 600 feet per minute due to the drying restrictions. ", "Solventless adhesives, on the other hand, can be applied at 900 to even 1500 feet per minute. ", "Solventless laminating adhesives thus have a distinct advantage over solvent-based or water-borne adhesives.", "\nIn order that the proper coating weight of laminating adhesive is applied to the substrate, the adhesive must be “metered down” by transfer rolls to the application web or substrate. ", "This is generally achieved by transferring the adhesive from a “puddle” between two rolls to a second and sometimes third or fourth roll before applying to the substrate. ", "The subsequent transfer rolls turn at a speed higher than the former roll so that the adhesive is less on each subsequent roll. ", "Since these rolls are rotating at speeds up to 1000 rpm's, incomplete transfer of the adhesive typically occurs with the formation of adhesive “droplets” that are released into the air around the metering rolls. ", "These adhesive “droplets” are seen as aerosol droplets that are commonly called “adhesive mist”.", "\nAdhesive misting is undesirable for several reasons. ", "The adhesive droplets tend to collect on machinery and other surfaces to form coatings that need to be periodically removed or cleaned. ", "The droplets also can clog or constrict air vents and other exhaust or ventilation equipment. ", "If the adhesive mist contains materials which are hazardous to human health due to toxicity or allergic sensitization, care must be taken to avoid worker exposure to such materials by inhalation of the adhesive droplets or deposition of the droplets on exposed skin or mucous membranes. ", "Also, misting of the adhesive results in a loss of the adhesive, leading to increases in the cost of operating a lamination line." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0007297424599528313, 0.0006813729996792972, 0.0010332070523872972, 0.0009856204269453883, 0.0005869105225428939, 0.0005917035741731524, 0.0007917280890978873, 0.0006315795471891761, 0.0008146969485096633, 0.0006647095433436334, 0.000751222250983119, 0.000913051248062402, 0.0005901111289858818, 0.0007236137171275914, 0.0008107708999887109, 0.0006167099927552044, 0.0007870701956562698, 0.000811439414974302, 0.0005781722138635814, 0.0007381801260635257, 0.0007300346624106169, 0.0006863676244392991 ]
0.000739
22
[ "Q:\n\nJQuery Hide Function Doesn't work in Safari\n\nI have created the following code to show and hide divs. ", "This shows one div at a time and hides the others. ", "This works on all browsers except Safari.", "\nHTML\n<div class=\"buttons\">\n <a class=\"button\" id=\"showdiv1\">Div 1</a>\n <a class=\"button\" id=\"showdiv2\">Div 2</a>\n <a class=\"button\" id=\"showdiv3\">Div 3</a>\n <a class=\"button\" id=\"showdiv4\">Div 4</a>\n</div>\n<div id=\"div1\">1</div>\n<div id=\"div2\" style=\"display:none;\">2</div>\n<div id=\"div3\" style=\"display:none;\">3</div>\n<div id=\"div4\" style=\"display:none;\">4</div>\n\nJQuery\n$('#showdiv1').click( function () {\n $('div[id^=div]').hide();\n $('#div1').show();\n});\n$('#showdiv2').click( function () {\n $('div[id^=div]').hide();\n $('#div2').show();\n});\n$('#showdiv3').click( function () {\n $('div[id^=div]').hide();\n $('#div3').show();\n});\n$('#showdiv4').click( function () {\n $('div[id^=div]').hide();\n $('#div4').show();\n});​\n\nI am an absolute beginner and thought that Jquery would be the most elegant solution to showing multiple divs and it is! ", "Except for Safari!", "\nAny help would be great-fully received!", "\n\nA:\n\nI would assume the problem with Safari is because it does not raise a click event on a elements which have no href attribute. ", "\nAlso, your code can be simplified. ", "Try this instead:\n<div class=\"buttons\">\n <a class=\"button\" id=\"showdiv1\" href=\"#div1\">Div 1</a>\n <a class=\"button\" id=\"showdiv2\" href=\"#div2\">Div 2</a>\n <a class=\"button\" id=\"showdiv3\" href=\"#div3\">Div 3</a>\n <a class=\"button\" id=\"showdiv4\" href=\"#div4\">Div 4</a>\n</div>\n<div id=\"div1\" class=\"child\">1</div>\n<div id=\"div2\" class=\"child\" style=\"display:none;\">2</div>\n<div id=\"div3\" class=\"child\" style=\"display:none;\">3</div>\n<div id=\"div4\" class=\"child\" style=\"display:none;\">4</div>\n\njQuery\n$(\".button\").click(function(e) {\n e.preventDefault();\n $(\".child\").hide();\n $($(this).attr(\"href\")).show();\n});\n\nNotice the use of classes to group elements together so that you don't have so much code repetition.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.000812746468000114, 0.0006549937534146011, 0.0007304702885448933, 0.001306957216002047, 0.00089463428594172, 0.0005774127785116434, 0.000990263419225812, 0.0006221475196070969, 0.0018928167410194874, 0.001994825666770339 ]
0.001048
10
[ "Q:\n\nWhat function or method does pry use when you just pass it an object?", "\n\nI've loaded up pry and am debugging some objects. ", "Often times if I just type the name of the object pry will output a representation of it on it's own and it looks great.", "\nExample:\nFor example, it's like being at the pry prompt and doing something like:\n[1] pry(main):1> @myobj\n\nResult:\n\nConfusion:\n\nI didn't call pp @myobj or y @myobj or ap @myobj or @myobj.inspect\nIf I do call any of those I get output that looks different ( and not as beautifully formatted )\n\nQuestions:\n\nWhat method is being called to output objects this way?", "\nCan I use that method in a script file to output the format using the same nice formatting?", "\n( i.e. doing pry and then running load /path/to/my/file.rb ? )", "\n\nA:\n\nPry is a REPL - Read Evaluate Print Loop. ", " If you dig through their source code, you'll see the Print part is ultimately handled by a Proc which, by default, calls the pp class method on Pry::ColorPrinter. ", " That class inherits from ::PP which is the class responsible for the output in pp, it just does some extra stuff pertaining to colours, pagination, etc. ", " So for the most part, yes, it's just pp.", "\nHere's basically a copy-paste of their code which could give you what you want:\nrequire 'pp'\nrequire 'coderay'\n\nclass MyPrinter < ::PP\n OBJ_COLOR = begin\n code = CodeRay::Encoders::Terminal::TOKEN_COLORS[:keyword]\n if code.start_with? \"", "\\e\"\n code\n else\n \"\\e[0m\\e[0;#{code}m\"\n end\n end\n\n CodeRay::Encoders::Terminal::TOKEN_COLORS[:comment][:self] = \"\\e[1;34m\"\n\n def self.pp(obj, out = $>, width = 79)\n q = new(out, width)\n q.guard_inspect_key { q.pp obj }\n q.flush\n out << \"\\n\"\n end\n\n def text(str, width = str.length)\n if str.include?(\"\\e[\")\n super \"#{str}\\e[0m\", width\n elsif str.start_with?('#", "<') || str == '=' || str == '>'\n super highlight_object_literal(str), width\n else\n super CodeRay.scan(str, :ruby).term, width\n end\n end\n\n def pp(obj)\n super\n end\nend\n\nYou can tweak it to your liking. ", " You would then use it by saying something like MyPrinter.pp(@myobj).", "\nIf you're not worried about tweaking it and are happy to have a dependency on Pry (and all its dependencies), you don't need the above code and can simply use Pry::ColorPrinter.pp(@myobj) in your code (making sure to require pp, coderay, and pry/color_printer)\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0008483676356263459, 0.000585370056796819, 0.0005322432843968272, 0.000979808857664466, 0.0006956959841772914, 0.0006747262668795884, 0.0007035090238787234, 0.0006241296650841832, 0.0007321934681385756, 0.000659168406855315, 0.0008066191803663969, 0.003732883371412754, 0.0010272053768858314, 0.0006407314212992787, 0.0005986308678984642 ]
0.000923
15
[ "Q:\n\nHow can I read the data received in application/x-www-form-urlencoded format on Node server?", "\n\nI'm receiving data on a webhook URL as a POST request. ", "Note that the content type of this request is application/x-www-form-urlencoded.", "\nIt's a server-to-server request. ", "And On my Node server, I simply tried to read the received data by using req.body.parameters but resulting values are \"undefined\"?", "\nSo how can I read the data request data? ", "Do I need to parse the data? ", "Do I need to install any npm module? ", "Can you write a code snippet explaining the case?", "\n\nA:\n\nIf you are using Express.js as Node.js web application framework, then use ExpressJS body-parser.", "\nThe sample code will be like this.", "\nvar bodyParser = require('body-parser');\napp.use(bodyParser.json()); // support json encoded bodies\napp.use(bodyParser.urlencoded({ extended: true })); // support encoded bodies\n\n// With body-parser configured, now create our route. ", "We can grab POST \n// parameters using req.body.variable_name\n\n// POST http://localhost:8080/api/books\n// parameters sent with \napp.post('/api/books', function(req, res) {\n var book_id = req.body.id;\n var bookName = req.body.token;\n //Send the response back\n res.send(book_id + ' ' + bookName);\n});\n\nA:\n\nThe accepted answer uses express and the body-parser middleware for express. ", "But if you just want to parse the payload of an application/x-www-form-urlencoded ContentType sent to your Node http server, then you could accomplish this without the extra bloat of Express.", "\nThe key thing you mentioned is the http method is POST. ", "Consequently, with application/x-www-form-urlencoded, the params will not be encoded in the query string. ", "Rather, the payload will be sent in the request body, using the same format as the query string:\nparam=value&param2=value2 \n\nIn order to get the payload in the request body, we can use StringDecoder, which decodes buffer objects into strings in a manner that preserves the encoded multi-byte UTF8 characters. ", "So we can use the on method to bind the 'data' and 'end' event to the request object, adding the characters in our buffer:\nconst StringDecoder = require('string_decoder').StringDecoder;\nconst http = require('http');\n\nconst httpServer = http.createServer((req, res) => {\n const decoder = new StringDecoder('utf-8');\n let buffer = '';\n\n req.on('data', (chunk) => {\n buffer += decoder.write(chunk);\n });\n\n req.on('end', () => {\n buffer += decoder.end();\n res.writeHead(200, 'OK', { 'Content-Type': 'text/plain'});\n res.write('the response:\\n\\n');\n res.write(buffer + '\\n\\n');\n res.end('End of message to browser');\n });\n};\n\nhttpServer.listen(3000, () => console.log('Listening on port 3000') );\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0006705799023620784, 0.0006656036130152643, 0.0006053878460079432, 0.0008638077997602522, 0.0005810154834762216, 0.0006872541853226721, 0.0008303828653879464, 0.000754546548705548, 0.0009614602313376963, 0.0007497417973354459, 0.0005745413363911211, 0.0006996748270466924, 0.0006801824783906341, 0.0008138422854244709, 0.0006057861028239131, 0.0006179875927045941, 0.0006965253269299865, 0.0014014929765835404 ]
0.000748
18
[ "New England goalkeeper Brad Knighton won his first MLS Save of the Week honor of the season on Friday, taking home the Week 26 accolade, which is presented by Phillips 66 Lubricants, for an outstanding save on Colorado’s Dillon Powers in the Revolution’s 2-0 home win against the Rapids.", "\n\nKnighton made the stop in the 60th minute when Rapids attacker Dominique Badji got free on the left wing and hit a cross to Powers in the center of the area. ", "The midfielder headed a shot that looked ticketed for the far upper corner, but Knighton acrobatically leapt to his left to tip the ball over the bar.", "\n\nKnighton easily won the final round of voting, taking home 72 percent of the vote to beat Chicago’s Sean Johnson. ", "He topped D.C.’s Bill Hamid and Philadelphia’s John McCarthy in earlier rounds.", "\n\nClick here to check out the final results of the Week 26 bracket. ", "Follow the links to read more about Save of the Week’s new look and check out a full list of past winners." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.001037048059515655, 0.0008462321129627526, 0.0027180416509509087, 0.0010029346449300647, 0.0007585962885059416, 0.0005849709850735962, 0.000627832196187228 ]
0.001082
7
[ "We, as Anishinabek communities of the Robinson Huron Treaty (RHT) are looking forward to sitting down with new Ontario Premier Doug Ford. ", "After he was elected, the Conservative leader said, “We have taken back Ontario,” which we hope to educate him on what that means to First Nations, more specifically to RHT communities.", "\n\nFirst Nations and Crown relations have never held such prominence in Canadian political consciousness as it does today, yet the relations have never been so stagnant. ", "Often, while it appears like we are making progress, we are actually moving backwards.", "\n\nThis is evidenced by a federal government whose prime minister has exclaimed that “No relationship is more important to Canada than the relationship with Indigenous Peoples” yet his government spends record amounts of public dollars fighting First Nations rights in court.", "\n\nWell before the imposition of the Indian Act in 1876, which was meant to assimilate Indigenous People in Canada, the Crown signed treaties with First Nations with whom they recognized as sovereign nations of this land. ", "Treaties are only made amongst sovereign and independent nations.", "\n\nFor example, the Treaty of Niagara in 1764, ratified the Royal Proclamation of 1763. ", "Canada has said, “In accordance with the Royal Proclamation of 1763, many Indigenous Nations and the Crown historically relied on treaties for mutual recognition and respect to frame their relationship.”", "\n\nCanada has also said in its recently issued “Principles to Guide the Relationship between Canada and Indigenous Nations” that, “treaties have been and are intended to be acts of reconciliation.” ", "We agree with that statement. ", "We are also of the same mind when Canada said, “…historic treaties, like the Robinson Huron Treaty are frameworks for living together, including the modern expression of these relationships.”", "\n\nFinal arguments have wrapped up before the Superior Court of Justice wherein 21 First Nations have taken the governments of Ontario and Canada to court over the Crown’s failure to implement the terms of the 1850 Robinson Huron Treaty. ", "At issue is that the beneficiaries have received no increase to the $4 annuity since 1874, even though it was stipulated in the treaty that the annuity “shall be augmented from time to time.”", "\n\nThe annuities to Anishinabek were to be paid from sharing of the revenue gained from their respective territories. ", "Since the last increase in 1874, extraction or development of natural resources in the treaty territory has been profitable to developers and both levels of government. ", "However, Anishinabek, have not seen the same parity of revenue increases as our partners in the treaty.", "\n\nWhile RHT First Nations maintain the treaty relationship is the basis for the wealth that Ontarians enjoy, the other treaty partner — the Crown — has not held up its end of the bargain. ", "Instead of upholding its responsibilities under the treaty, it has abandoned them. ", "Instead of reviewing and renewing the treaty relationship, it has asserted dominance over and imposed its will upon us.", "\n\nAnishinabek are seeking to fulfil the role that our ancestors who signed the treaty always had in mind — to be nothing but full partners in the economy and in building a better society for us all. ", "This is nothing new coming from Anishinabek through their court action. ", "We articulate the same sentiments that other First Nations leaders have, that our ancestors did not intend for us to be poor in our own homelands when they signed the treaty.", "\n\nOn Valentine’s Day this year, Prime Minister Justin Trudeau promised to renew its nation-to-nation relationships. ", "The prime minister, himself, has even acknowledged that, “Instead of outright recognizing and affirming Indigenous rights, as we promised we would, Indigenous Peoples were forced to prove, time and time again, through costly and drawn-out court challenges, that their rights existed, must be recognized and implemented.”", "\n\nIt is believed that the rights outlined in RHT precede the Constitution Act of Canada, which treaty the Anishinabek leadership signed with the Crown nearly 170 years ago.", "\n\nFirst Nations have been living up to our part in this treaty relationship. ", "All we ask is for our treaty partners to remember their past, renew the treaty relationship and uphold their end of the agreement. ", "There is no doubt that as treaty partners, together, we need to once again repair and renew our relationship.", "\n\nLoading... Loading... Loading... Loading... Loading... Loading...\n\nWikwemikoong Ogimaa Duke Peltier has been chief of his community since 2012, prior to that was an elected council member since 2006, and has been a Robinson Huron Treaty Trustee since 2010.", "\n\nRead more about:" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0005701646441593766, 0.0006638738559558988, 0.0007209273753687739, 0.0005909505998715758, 0.0006329453317448497, 0.0006179758347570896, 0.0005753965233452618, 0.000545617425814271, 0.0005147900083102286, 0.0005402025999501348, 0.0005831083981320262, 0.0005441764369606972, 0.0005975250387564301, 0.0006470709922723472, 0.0009299115627072752, 0.0005146389012224972, 0.0006082043400965631, 0.0006413307855837047, 0.0006056218408048153, 0.0006322246044874191, 0.0008551111677661538, 0.0006991435657255352, 0.0014225433114916086, 0.0006918140570633113, 0.0005639612209051847, 0.0005776621401309967, 0.0005546323955059052, 0.0005624426412396133, 0.0005435023340396583, 0.000935317191760987, 0.0006090822862461209 ]
0.000655
31
[ "If you’re unaware, a woman really is suing the distributors of Drive because she thought it looked like another Fast and Furious type film. ", "It’s not. ", "While I might have some qualms with Drive, make no mistake about what kind of film it is. ", "It’s an art house film with very light trappings of a car chase film.", "\n\nStill, who sues because they don’t like a movie?" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0008959716069512069, 0.0008862860850058496, 0.0006836766260676086, 0.0012310645543038845, 0.014062106609344482 ]
0.003552
5
[ "How Big Data Can Help Millions of Refugees\n\nAlthough it can be difficult to imagine for the millions of us who live in safety and comfort, 24 people are forced to leave their homes every minute and become refugees. ", "These are people faced with violence, political unrest, or persecution, and it’s simply not safe for them to stay in their home country. ", "Currently, the ongoing conflict in Syria is driving millions of people from their homes and families, but it’s not the only country people are fleeing.", "\n\nWe mostly think of big data as a tool for businesses and smart city development, but in reality, it can serve many different purposes—including helping the most vulnerable people in the world find their footing and get help. ", "But how would this work, and is anyone taking steps to leverage this powerful tool for refugees’ benefit?", "\n\nCreating an Informed Dialogue\n\nThere is a lot of fear surrounding refugees. ", "Citizens of countries refugees try to enter often object to allowing them to create a new life in their area. ", "Much of this fear is based on misinformation or plain ignorance. ", "Although not everyone will change their mind about refugees thanks to factual information, data is a good place to start.", "\n\nThe United Nations Refugee Agency (UNHCR) and the World Bank Group have recently teamed up to encourage a more informed dialogue. ", "Their plan is to create a center known as The Joint Data Center on Forced Displacement where anonymous data will be collected on refugees and distributed to policymakers and anyone else who can use the information to make the lives of refugees better.", "\n\nIn addition to collecting data on the demographics, skills, and other information about the people seeking shelter, the center’s goal will be to find innovative and helpful uses for the data, and prompt policymakers to create solutions that work for everyone. ", "The center will likely be located in Europe and will hopefully open in 2019.", "\n\nWhere are Refugees Going?", "\n\nWithout analytics, it can be difficult to predict where refugees will decide to seek safety. ", "Although countries near their own can expect an initial influx, conflict can occur at any time, and refugees may start seeking other options if the nearest countries are unwilling to accept them. ", "Predictive analytics could hold the key to knowing where refugees will head next.", "\n\nRuhil added that, “Policymakers, spotting signs of future influx, might reroute refugees to different countries… This real-time data could also help organizations quickly and accurately shunt money and goods to the locales that need them the most.”", "\n\nThis could be especially helpful to countries like Bangladesh, which has seen the influx of refugees from Myanmar facing religious persecution. ", "While the government and citizens have responded with compassion and have handled the situation well, rerouting some of the refugees could help reduce the environmental and financial impact on host countries. ", "About 1 in 4 people in Bangladesh live in poverty.", "\n\nSolving the Employment Problem\n\nJust getting refugees out of unsafe situations is the first step, but it can’t be the last. ", "Many refugees will not be able to return to their homes for some time, if ever. ", "There’s also the issue of acculturation stress, which is a term for the negative effects of adapting to a new culture. ", "Acculturation stress can cause depression, loneliness, and other psychological issues.", "\n\nBeing welcomed into the culture and finding employment can help speed up the acculturation process. ", "Refugees can’t live in camps forever, and it’s key for their psychological health and well-being to find placement as quickly as possible. ", "Although studies on what makes placement successful or unsuccessful are relatively new, the results are promising: data indicates that algorithm-assisted placement using big data could increase the odds of refugees finding a job by 40-60%!", "\n\nAllocating the Necessary Resources\n\nBig data gives us a powerful tool in helping people who are forced to leave their homes, but we need to start using it as soon as possible. ", "The Joint Data Center on Forced Displacement is a good place to start, but the many refugees in crisis need help immediately. ", "Data collection, smart policy, and a healthy dose of compassion need to come together in order to help end the refugee crisis and help the millions of displaced people feel safe and comfortable once again." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006030178628861904, 0.0011983481235802174, 0.0007486415561288595, 0.0005421999376267195, 0.0006117506418377161, 0.0005744739901274443, 0.0006139591569080949, 0.015431498177349567, 0.0005411861930042505, 0.000512792612425983, 0.0005710154655389488, 0.0005639015580527484, 0.0005507685709744692, 0.0008425411069765687, 0.0005430512828752398, 0.0005888764280825853, 0.0006526830838993192, 0.0006418526754714549, 0.0007229341426864266, 0.0005200270679779351, 0.005261982791125774, 0.0006224114331416786, 0.0006284688133746386, 0.0006381870480254292, 0.0009509057854302227, 0.0004984688712283969, 0.0014350080164149404, 0.0006424310267902911, 0.0006133932620286942, 0.0005389333236962557, 0.0005549959605559707 ]
0.001289
31
[ "Delhi University Admission Form Download 2016\n\nUniversity of Delhi Admission 2016 UG Courses Syllabus & Details (erstwhile FYUP) Aspirant must have three years bachelor degree from any recognized university in relevant discipline with 50% to 60% marks.", "Delhi University courses highlights\n\nPh.D.\n\nM.Phil.", "\n\nPostgraduate Courses\n\nUndergraduate Courses\n\nCertificate/Diploma/Advanced Diploma\n\nGuidelines\n\nDepartment\n\ncourse\n\nRegistration Dates\n\nExam Dates\n\nApplied Psychology\n\nMA Applied Physics\n\n13th to 28th June 2016\n\n2nd of July 2016\n\nBiochemistry\n\nM.Sc. ", "Biochemistry\n\n3rd to 25th June 2016\n\nNot applicable\n\nMicrobiology\n\nM.Sc. ", "Microbiology\n\nGenetics\n\nM.Sc. ", "Genetics\n\n27th May to 27th June 2016\n\n3July 2016\n\nPlant Molecular Biology\n\nM.Sc. ", "Plant Molecular Biology & Biotechnology\n\n1st to 15th June 2016\n\n1July 2016\n\nElectronics Science\n\nM.Sc. ", "Electronics Science direct cat-A (50% seats)\n\n3rd to 28th June 2016\n\nNot applicable\n\nElectronics Science\n\nM.Sc. ", "Electronics Entrance direct cat-B (50% seats)\n\nJuly 10 2016\n\nElectronics Science\n\nM.Tech in Microwave\n\n6July 2016\n\nEligibility Criteria:\n\nApplication fee:\n\nM.A. - The candidates have to pay Rs.100/- for application\nand broacher cost and Rs.400/- as entrance exam (Rs.100/- for SC/ST candidates)\nin the form of DD.", "\n\nM.Sc. - ", "The candidates have to pay Rs.500/- as entrance exam\n(Rs.250/- for SC/ST candidates) in the form of DD." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006079582963138819, 0.0006175169255584478, 0.0006310993921943009, 0.0006036018021404743, 0.0006854590028524399, 0.0006248974823392928, 0.000629151239991188, 0.0006133205024525523, 0.0006072025862522423, 0.0007065617828629911, 0.0007778936414979398 ]
0.000646
11
[ "NEW YORK, Jan. 31, 2019 (GLOBE NEWSWIRE) -- Pomerantz LLP announces that a class action lawsuit has been filed against, Teladoc Health, Inc. (“Teladoc” or the “Company”) (NYSE: TDOC) and certain of its officers. ", "The class action, filed in United States District Court, Southern District of New York, and indexed under 18-cv-11603, is on behalf of a class consisting of all persons and entities, other than Defendants and their affiliates, who purchased or otherwise, acquired Teladoc securities between March 3, 2016, and December 5, 2018, both dates inclusive (the “Class Period”), seeking to recover damages caused by Defendants’ violations of the federal securities laws and to pursue remedies under Sections 10(b) and 20(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) and Rule 10b-5 promulgated thereunder, against the Company and certain of its top officials.", "\n\nIf you are a shareholder who purchased Teladoc securities between March 3, 2016 and December 5, 2018, both dates inclusive, you have until February 11, 2019, to ask the Court to appoint you as Lead Plaintiff for the class. ", "A copy of the Complaint can be obtained at www.pomerantzlaw.com. ", "To discuss this action, contact Robert S. Willoughby at rswilloughby@pomlaw.com or 888.476.6529 (or 888.4-POMLAW), toll-free, Ext. ", "9980. ", "Those who inquire by e-mail are encouraged to include their mailing address, telephone number, and the number of shares purchased.", "\n\nTeladoc was founded in 2002 and is headquartered in Purchase, New York. ", "The Company provides telehealth services worldwide. ", "The Company offers a portfolio of services and solutions covering 450 medical subspecialties, such as flu and upper respiratory infections, cancer, and congestive heart failure. ", "The Company provides its services through mobile devices, the Internet, video, and phone. ", "The Company serves health plans, health systems, and other entities.", "\n\nAt all relevant times, the Company purported to be committed to “the highest standards of integrity and ethics in the way it conducts business,” and, to that end, adopted a Code of Business Conduct and Ethics, which applies to all of its employees, officers and directors, including its chief executive officer, chief financial officer, and all other executive and senior officers.", "\n\nThe complaint alleges that, throughout the Class Period, Defendants made materially false and misleading statements regarding the Company’s business, operational and compliance policies. ", "Specifically, Defendants made false and/or misleading statements and/or failed to disclose that: (i) Hirschhorn was engaged in an inappropriate sexual relationship with a subordinate; (ii) Hirschhorn and this subordinate engaged in insider trading to provide themselves with undue benefits; (iii) Hirschhorn caused the subordinate to receive promotions for which she was unqualified, thereby negatively impacting the Company’s operations; (iv) the Company’s enforcement of its own purported employment and trading policies were inadequate to prevent the foregoing conduct; and (v) as a result, the Company’s public statements were materially false and misleading at all relevant times.", "\n\nOn December 5, 2018, the Southern Investigative Research Foundation (“SIRF”) published an article reporting that Teladoc’s CFO, Hirschhorn, had engaged “in an affair with . . . ", "an employee many levels below him on the company’s organizational chart.” ", "The SIRF article stated that “during their relationship, [the employee] received a series of promotions over colleagues with either more industry experience or better credentials that stunned her former colleagues.” ", "In addition, the SIRF article reported that the employee and Hirschhorn “liked to trade Teladoc Health’s stock together,” with Hirschhorn “tell[ing] her when he thought there were good opportunities to sell some shares.”", "\n\nFollowing publication of the SIRF article, Teladoc’s stock price fell $4.00 per share, or 6.69%, to close at $55.81 per share on December 6, 2018.", "\n\nThe Pomerantz Firm, with offices in New York, Chicago, Los Angeles, and Paris, is acknowledged as one of the premier firms in the areas of corporate, securities, and antitrust class litigation. ", "Founded by the late Abraham L. Pomerantz, known as the dean of the class action bar, the Pomerantz Firm pioneered the field of securities class actions. ", "Today, more than 80 years later, the Pomerantz Firm continues in the tradition he established, fighting for the rights of the victims of securities fraud, breaches of fiduciary duty, and corporate misconduct. ", "The Firm has recovered numerous multimillion-dollar damages awards on behalf of class members. ", "See www.pomerantzlaw.com." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006738096126355231, 0.0007723008166067302, 0.0005947709432803094, 0.0005941689596511424, 0.0006471503293141723, 0.0012681868392974138, 0.0005603175377473235, 0.0006024126778356731, 0.0008601557346992195, 0.0009138454333879054, 0.0006109887617640197, 0.0006828659679740667, 0.0005470958421938121, 0.0006745497812516987, 0.0020032664760947227, 0.0007559957448393106, 0.000604072876740247, 0.0005462644621729851, 0.0007531174342148006, 0.0007571063470095396, 0.0005939357215538621, 0.0006897850544191897, 0.0009077329887077212, 0.0007821252220310271, 0.0006818523979745805 ]
0.000763
25
[ "The high-volume sell-off has likely opened the doors to re-test of December lows near $3,100.", "\n\nMoreover, the long-term support level put the brakes on a sell-off back in December, and was followed by a corrective bounce to levels above $4,000.", "\n\nA strong bounce from the 200-week SMA line would likely embolden the bulls, but the probability of a bull reversal from that SMA support looks low, according to technical indicators.", "\n\nAs of writing, BTC is trading at $3,380 on Bitstamp, representing a 1.5 percent drop on a 24-hour basis.", "\n\nWeekly chart\n\nAs seen above, BTC is trading within a striking distance from the 200-week SMA of $3,298.", "\n\nThat MA support had held ground on a weekly closing basis (Sunday’s UTC close) in mid-December, possibly because the relative strength index (RSI) was reporting oversold conditions back then.", "\n\nThis time, however, that SMA support could be breached, as the RSI is currently hovering in the undersold territory.", "\n\nDaily chart\n\nThe RSI on the daily chart is also biased toward the bears, as opposed to the record oversold conditions seen in December. ", "The 5- and 10-day moving averages (MAs) are also trending south, indicating a bearish setup.", "\n\nHence, a drop to the December low of $3,122 could be on the cards.", "\n\n4-hour and hourly chart\n\nThe RSI on the 4-hour and the hourly chart is reporting oversold conditions below 30.00. ", "Therefore, a convincing break below the 200-week SMA of $3,298 could be preceded by a minor bounce.", "\n\nView\n\nBTC risks falling below the 200-week MA of $3,298. ", "A weekly close below that level could be followed by a slide to September 2017 lows near $2,970.", "\n\nA repeated failure to beat the 200-week SMA support would weaken bearish pressures. ", "A bullish reversal, however, would be confirmed only above $3,658 (the high of gravestone doji carved out on Saturday).", "\n\nDisclosure: The author holds no cryptocurrency at the time of writing." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0007499608327634633, 0.0007632410270161927, 0.002977304859086871, 0.0006372880889102817, 0.0006513898842968047, 0.0005824454710818827, 0.0006974665448069572, 0.0006076738354749978, 0.000630969472695142, 0.001073748106136918, 0.0006175445741973817, 0.0006998335011303425, 0.0006938701844774187, 0.0006572736310772598, 0.0009568616515025496, 0.0015562033513560891, 0.001105692470446229 ]
0.000921
17
[ "[Preliminary study on transdermal characteristics and sunface anesthetic effects of lidocaine hydrochloride loaded trans-activator of transcription peptide conjugated nano-niosome in animals].", "\nTo prepare a new dental topical anesthetics, lidocaine hydrochloride loaded trans-activator of transcription peptide conjugated nano-niosome (LID-TAT-N), and to evaluate its transdermal properties and topical anesthesia effects. ", "LID-TAT-N was prepared using reverse-phase evaporation method, and lidocaine loaded conventional liposome (LID-CL) was prepared in the same manner as positive control. ", "The diameter, ζ potential and encapsulation efficiency of LID-TAT-N and LID-CL were measured. ", "The skin permeation of LID-TAT-N was examined, and compared with LID-CL and lidocaine injection (LID-IJ, as negative control), using a Franz diffusion cell mounted with depilated mouse skin in vitro for 12 hours. ", "Each experiment was repeated six times. ", "The anesthetic effect of the new topical anesthetic was investigated on the cornea of rabbits. ", "The mean diameter of LID-TAT-N was smaller than that of LID-CL [(152.7 ± 10.6) nm vs. (259.5 ± 15.5) nm, P < 0.01]. ", "The 12 h cumulative permeation amount was significantly higher in LID-TAT-N group [(1 340.0 ± 97.5) µg · cm(-2)] than those of LID-CL and LID-IJ groups [(1 060.6 ± 80.2), (282.6 ± 65.1) µg · cm(-2), respectively, P < 0.05]. ", "Rabbit corneal reflex results showed that LID-TAT-N had anesthetic effect and the duration of analgesia [(24.8 ± 2.8) min] was also longer than that of LID-IJ [(14.5 ± 2.3) min, P < 0.05]. ", "LID-TAT-N had good transdermal ability, and the advanced skin penetration feature can improve its tropical anesthetic effect." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006515532149933279, 0.0006442093872465193, 0.0007601586985401809, 0.0006210816791281104, 0.0006606753449887037, 0.000588240334764123, 0.005903387907892466, 0.0006269738078117371, 0.0007055336609482765, 0.0014546465827152133, 0.0009727871511131525 ]
0.001235
11
[ "Tag Archives: raymond facey\n\nA Nassau County police officer and a motorist were fatally shot on the Cross Island Parkway in the wake of a cold-blooded ex-con’s rampage.", "\n\nNassau County Police Officer Arthur Lopez\n\nAround 11 a.m. on Tuesday, October 23, a tan sedan was involved in a hit-and-run accident on Northern Boulevard in Bayside before taking off down the Cross Island Parkway. ", "Nassau County Police Officer Arthur Lopez, 29, was driving an ESU vehicle towards the scene and saw the sedan’s damaged fender. ", "He signaled for the driver to pull over outside a Mobil station at 241st Street and Jamaica Avenue. ", "After a quick exchange of words, the driver shot Lopez several times and fled down the Cross Island Parkway. ", "Officer Clarence Hudson, Lopez’s partner, administered CPR and attempted to revive his partner at the scene.", "\n\nLopez, a decorated eight-year veteran, was taken to North Shore LIJ Hospital, where he was pronounced dead.", "\n\nAfter abandoning his damaged car, the gunman, now identified as Darrell Fuller, 33, allegedly attempted to carjack Raymond Facey, 52, near Hempstead Avenue, fatally shooting the driver in the process. ", "Fuller then took off on foot. ", "Helicopters circled the area and officers canvassed homes in Queens Village, searching for the perpetrator.", "\n\nAccording to published reports, Facey, was speaking on the phone with his daughter at the time of the incident. ", "She allegedly heard her father say “someone’s chasing me.”", "\n\nA nearby store owner described the scene as “absolutely crazy.”", "\n\n“When we’re here alone, the store is locked,” said the business owner. “", "You just don’t know who’s going to come in.”", "\n\nEllis Cathey, who lives on the corner of 112th Avenue and Colfax Street in Queens Village, left his house to take out the trash and saw helicopters circling the block and officers with automatic rifles searching the area for Fuller.", "\n\n“The helicopter got real low, I figured they were looking for somebody,” said Cathey. “", "I was searching the news channels looking for something that happened, and I saw this guy shot a cop.”", "\n\nDarrell Fuller\n\nCathey said that he saw police discover a gray hooded sweatshirt, covered in blood. ", "It was later reported that this sweatshirt belonged to the gunman.", "\n\n“I’ve lived here since 1996, I’ve never seen anything like this happen. ", "It really can happen anywhere though, I can’t think my neighborhood is immune to this.”", "\n\nAfter a multi-hour manhunt, authorities found Fuller at 111th Avenue and 173rd Street in Jamaica and arrested him. ", "He was taken to Jamaica Hospital with self-inflicted gunshot wounds. ", "He was in “stable but guarded” condition.", "\n\nIn 2004, Fuller was convicted of attempted murder, according to Nassau County Executive Ed Mangano, but released in 2009. ", "In 2010, Fuller was arrested for selling crack and served another nine months before being released on parole.", "\n\nAt a press conference earlier in the afternoon, Mangano spoke of Lopez’s bravery and dedication to helping others.", "\n\n“He was a true hero, a very dedicated police officer of eight years,” said Mangano. “", "He lost his life to a cold blooded murderer.”", "\n\nLopez, who was also a volunteer firefighter in Dix Hills, Long Island, is the second Nassau County officer to be killed in the line of duty in less than a week. ", "On Thursday, October 18, Officer Joseph Olivieri was killed when a vehicle struck him while he was responding to an accident on the Long Island Expressway.", "\n\n“We are very sorry to hear about the loss of Officer Arthur Lopez, an active member of the Dix Hills Fire Department from 2003 to 2005,” said Chief of Department Richard Granahan. “", "Our deepest sympathy goes out to his family, friends and fellow Nassau County police officers.”", "\n\nPolice captured the suspected killer of two people, including a Nassau County police office, after a witness heard gunshots coming from a car in Queens.", "\n\nAfter a multi-hour manhunt, Darrell Fuller, 33, was taken into custody by police in Queens and transferred to a local hospital with self-inflicted gunshot wounds. ", "Fuller was found at 111th Avenue and 173rd Street in Jamaica after a witness dialed 9-1-1 when they heard shots fired from within the car.", "\n\nAuthorities did not disclose Fuller’s condition.", "\n\nOfficer Arthur Lopez was shot and killed on the Cross Island Parkway after pulling over Fuller who had just left the scene of an accident on Northern Boulevard. ", "After abandoning his damaged car, the gunman allegedly attempted to car-jack a motorist, Raymond Facey, 52, of Jamaica, near Hempstead Avenue, fatally shooting the driver in the process.", "\n\nCops from Queens and Nassau County canvassed the area for Fuller who was considered armed and dangerous.", "\n\nFuller was convicted in 2004 of attempted murder, said Nassau County Executive Ed Mangano, but released in 2009. ", "In 2010, Fuller was arrested for selling crack and served another nine months before being released on parole.", "\n\n“I extend my deepest sympathies to the families of both deceased,” Mangano said." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0010894730221480131, 0.0007697032415308058, 0.0008120585698634386, 0.0009530308889225125, 0.001868752995505929, 0.0006514827255159616, 0.001512640155851841, 0.004470949061214924, 0.0025481742341071367, 0.0006423229933716357, 0.000678373733535409, 0.0017155396053567529, 0.0027847306337207556, 0.0011757212923839688, 0.002495461143553257, 0.006572828162461519, 0.0007677433313801885, 0.0048141758888959885, 0.008302070200443268, 0.0008299394976347685, 0.0007579860975965858, 0.0006867219344712794, 0.0009319347445853055, 0.048363473266363144, 0.0008117019315250218, 0.001111379126086831, 0.005054122768342495, 0.0005338701303116977, 0.0007420646725222468, 0.26403099298477173, 0.009422865696251392, 0.0009066961938515306, 0.0006696037598885596, 0.0006045976188033819, 0.0007649244507774711, 0.0014667189680039883, 0.0012461256701499224, 0.0006811580969952047, 0.007445457857102156, 0.004803530406206846, 0.0012180401245132089, 0.0009446374606341124, 0.005054122768342495, 0.0009523882763460279 ]
0.009197
44
[ "Sunday, September 20, 2015\n\nMonaco 2015Academie Rainier III\n\nThe Académie Rainier III is a specialised educational establishment for music and the dramatic arts. ", "It is managed by Monaco’s Town Hall and has the status of a conservatory. ", "Combining training with creating and performing works, the Academy, which has more than 800 pupils, organises more than a hundred recitals and concerts throughout the academic year and develops projects linked to local artistic life." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0006459240685217083, 0.0007390681421384215, 0.0006310738390311599 ]
0.000672
3
[ "package io.prometheus.client.hotspot;\n\nimport io.prometheus.client.", "Collector;\nimport io.prometheus.client.", "CounterMetricFamily;\nimport io.prometheus.client.", "GaugeMetricFamily;\n\nimport java.io.", "BufferedReader;\nimport java.io.", "FileNotFoundException;\nimport java.io.", "FileReader;\nimport java.io.", "IOException;\nimport java.lang.management.", "ManagementFactory;\nimport java.lang.management.", "OperatingSystemMXBean;\nimport java.lang.management.", "RuntimeMXBean;\nimport java.lang.reflect.", "InvocationTargetException;\nimport java.lang.reflect.", "Method;\nimport java.util.", "ArrayList;\nimport java.util.", "List;\nimport java.util.logging.", "Level;\nimport java.util.logging.", "Logger;\n\n/**\n * Exports the standard exports common across all prometheus clients.", "\n * <p>\n * This includes stats like CPU time spent and memory usage.", "\n * <p>\n * Example usage:\n * <pre>\n * {@code\n * new StandardExports().register();\n * }\n * </pre>\n */\npublic class StandardExports extends Collector {\n private static final Logger LOGGER = Logger.getLogger(StandardExports.class.getName());\n\n private final StatusReader statusReader;\n private final OperatingSystemMXBean osBean;\n private final RuntimeMXBean runtimeBean;\n private final boolean linux;\n\n public StandardExports() {\n this(new StatusReader(),\n ManagementFactory.getOperatingSystemMXBean(),\n ManagementFactory.getRuntimeMXBean());\n }\n\n StandardExports(StatusReader statusReader, OperatingSystemMXBean osBean, RuntimeMXBean runtimeBean) {\n this.statusReader = statusReader;\n this.osBean = osBean;\n this.runtimeBean = runtimeBean;\n this.linux = (osBean.getName().indexOf(\"Linux\") == 0);\n }\n\n private final static double KB = 1024;\n\n @Override\n public List<MetricFamilySamples> collect() {\n List<MetricFamilySamples> mfs = new ArrayList<MetricFamilySamples>();\n\n try {\n // There exist at least 2 similar but unrelated UnixOperatingSystemMXBean interfaces, in\n // com.sun.management and com.ibm.lang.management. ", "Hence use reflection and recursively go\n // through implemented interfaces until the method can be made accessible and invoked.", "\n Long processCpuTime = callLongGetter(\"getProcessCpuTime\", osBean);\n mfs.add(new CounterMetricFamily(\"process_cpu_seconds_total\", \"Total user and system CPU time spent in seconds.\",", "\n processCpuTime / NANOSECONDS_PER_SECOND));\n }\n catch (Exception e) {\n LOGGER.log(Level.", "FINE,\"Could not access process cpu time\", e);\n }\n\n mfs.add(new GaugeMetricFamily(\"process_start_time_seconds\", \"Start time of the process since unix epoch in seconds.\",", "\n runtimeBean.getStartTime() / MILLISECONDS_PER_SECOND));\n\n // There exist at least 2 similar but unrelated UnixOperatingSystemMXBean interfaces, in\n // com.sun.management and com.ibm.lang.management. ", "Hence use reflection and recursively go\n // through implemented interfaces until the method can be made accessible and invoked.", "\n try {\n Long openFdCount = callLongGetter(\"getOpenFileDescriptorCount\", osBean);\n mfs.add(new GaugeMetricFamily(\n \"process_open_fds\", \"Number of open file descriptors.\", ", "openFdCount));\n Long maxFdCount = callLongGetter(\"getMaxFileDescriptorCount\", osBean);\n mfs.add(new GaugeMetricFamily(\n \"process_max_fds\", \"Maximum number of open file descriptors.\", ", "maxFdCount));\n } catch (Exception e) {\n // Ignore, expected on non-Unix OSs.", "\n }\n\n // There's no standard Java or POSIX way to get memory stats,\n // so add support for just Linux for now.", "\n if (linux) {\n try {\n collectMemoryMetricsLinux(mfs);\n } catch (Exception e) {\n // If the format changes, log a warning and return what we can.", "\n LOGGER.warning(e.toString());\n }\n }\n return mfs;\n }\n\n static Long callLongGetter(String getterName, Object obj)\n throws NoSuchMethodException, InvocationTargetException {\n return callLongGetter(obj.getClass().getMethod(getterName), obj);\n }\n\n /**\n * Attempts to call a method either directly or via one of the implemented interfaces.", "\n * <p>\n * A Method object refers to a specific method declared in a specific class. ", "The first invocation\n * might happen with method == SomeConcreteClass.publicLongGetter() and will fail if\n * SomeConcreteClass is not public. ", "We then recurse over all interfaces implemented by\n * SomeConcreteClass (or extended by those interfaces and so on) until we eventually invoke\n * callMethod() with method == SomePublicInterface.publicLongGetter(), which will then succeed.", "\n * <p>\n * There is a built-in assumption that the method will never return null (or, equivalently, that\n * it returns the primitive data type, i.e. {@code long} rather than {@code Long}). ", "If this\n * assumption doesn't hold, the method might be called repeatedly and the returned value will be\n * the one produced by the last call.", "\n */\n static Long callLongGetter(Method method, Object obj) throws InvocationTargetException {\n try {\n return (Long) method.invoke(obj);\n } catch (IllegalAccessException e) {\n // Expected, the declaring class or interface might not be public.", "\n }\n\n // Iterate over all implemented/extended interfaces and attempt invoking the method with the\n // same name and parameters on each.", "\n for (Class<?", "> clazz : method.getDeclaringClass().getInterfaces()) {\n try {\n Method interfaceMethod = clazz.getMethod(method.getName(), method.getParameterTypes());\n Long result = callLongGetter(interfaceMethod, obj);\n if (result !", "= null) {\n return result;\n }\n } catch (NoSuchMethodException e) {\n // Expected, class might implement multiple, unrelated interfaces.", "\n }\n }\n\n return null;\n }\n\n void collectMemoryMetricsLinux(List<MetricFamilySamples> mfs) {\n // statm/stat report in pages, and it's non-trivial to get pagesize from Java\n // so we parse status instead.", "\n BufferedReader br = null;\n try {\n br = statusReader.procSelfStatusReader();\n String line;\n while ((line = br.readLine()) !", "= null) {\n if (line.startsWith(\"VmSize:\")) {\n mfs.add(new GaugeMetricFamily(\"process_virtual_memory_bytes\",\n \"Virtual memory size in bytes.\",", "\n Float.parseFloat(line.split(\"\\\\s+\")[1]) * KB));\n } else if (line.startsWith(\"VmRSS:\")) {\n mfs.add(new GaugeMetricFamily(\"process_resident_memory_bytes\",\n \"Resident memory size in bytes.\",", "\n Float.parseFloat(line.split(\"\\\\s+\")[1]) * KB));\n }\n }\n } catch (IOException e) {\n LOGGER.fine(e.toString());\n } finally {\n if (br !", "= null) {\n try {\n br.close();\n } catch (IOException e) {\n LOGGER.fine(e.toString());\n }\n }\n }\n }\n\n static class StatusReader {\n BufferedReader procSelfStatusReader() throws FileNotFoundException {\n return new BufferedReader(new FileReader(\"/proc/self/status\"));\n }\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0018948041833937168, 0.0010575806954875588, 0.0011267369845882058, 0.0007821726030670106, 0.0009872306836768985, 0.0009599275654181838, 0.0011903708800673485, 0.0007916665636003017, 0.0007082937518134713, 0.000986158032901585, 0.000744063698220998, 0.08251035213470459, 0.0008973988005891442, 0.0008216958376578987, 0.0008759074844419956, 0.0009221669752150774, 0.0023404008243232965, 0.0006767681334167719, 0.0012933883117511868, 0.0006391321076080203, 0.0008070717449299991, 0.0009146424126811326, 0.0006650146096944809, 0.0010166134452447295, 0.0006391321076080203, 0.0013001523911952972, 0.000915906042791903, 0.0008923311834223568, 0.0007222318090498447, 0.0009079354349523783, 0.029269667342305183, 0.0009333830676041543, 0.004099288489669561, 0.0008499122341163456, 0.0008638790459372103, 0.0006968858069740236, 0.0760597437620163, 0.000657171243801713, 0.0007290446083061397, 0.0026022186502814293, 0.001982669811695814, 0.0028573842719197273, 0.01676289550960064, 0.001072718994691968, 0.0009070473606698215, 0.004851556848734617, 0.015669289976358414 ]
0.005784
47
[ "Q:\n\nu'\\ufeff' in Python string\n\nI get an error with the following patter:\nUnicodeEncodeError: 'ascii' codec can't encode character u'\\ufeff' in position 155: ordinal not in range(128)\n\nNot sure what u'\\ufeff' is, it shows up when I'm web scraping. ", "How can I remedy the situation? ", "The .replace() string method doesn't work on it. ", "\n\nA:\n\nI ran into this on Python 3 and found this question (and solution).", "\nWhen opening a file, Python 3 supports the encoding keyword to automatically handle the encoding.", "\nWithout it, the BOM is included in the read result:\n>>> f = open('file', mode='r')\n>>> f.read()\n'\\ufefftest'\n\nGiving the correct encoding, the BOM is omitted in the result:\n>>> f = open('file', mode='r', encoding='utf-8-sig')\n>>> f.read()\n'test'\n\nJust my 2 cents.", "\n\nA:\n\nThe Unicode character U+FEFF is the byte order mark, or BOM, and is used to tell the difference between big- and little-endian UTF-16 encoding. ", " If you decode the web page using the right codec, Python will remove it for you. ", " Examples:\n#!", "python2\n#coding: utf8\nu = u'ABC'\ne8 = u.encode('utf-8') # encode without BOM\ne8s = u.encode('utf-8-sig') # encode with BOM\ne16 = u.encode('utf-16') # encode with BOM\ne16le = u.encode('utf-16le') # encode without BOM\ne16be = u.encode('utf-16be') # encode without BOM\nprint 'utf-8 %r' % e8\nprint 'utf-8-sig %r' % e8s\nprint 'utf-16 %r' % e16\nprint 'utf-16le %r' % e16le\nprint 'utf-16be %r' % e16be\nprint\nprint 'utf-8 w/ BOM decoded with utf-8 %r' % e8s.decode('utf-8')\nprint 'utf-8 w/ BOM decoded with utf-8-sig %r' % e8s.decode('utf-8-sig')\nprint 'utf-16 w/ BOM decoded with utf-16 %r' % e16.decode('utf-16')\nprint 'utf-16 w/ BOM decoded with utf-16le %r' % e16.decode('utf-16le')\n\nNote that EF BB BF is a UTF-8-encoded BOM. ", " It is not required for UTF-8, but serves only as a signature (usually on Windows).", "\nOutput:\nutf-8 'ABC'\nutf-8-sig '\\xef\\xbb\\xbfABC'\nutf-16 '\\xff\\xfeA\\x00B\\x00C\\x00' # Adds BOM and encodes using native processor endian-ness.", "\nutf-16le 'A\\x00B\\x00C\\x00'\nutf-16be '\\x00A\\x00B\\x00C'\n\nutf-8 w/ BOM decoded with utf-8 u'\\ufeffABC' # doesn't remove BOM if present.", "\nutf-8 w/ BOM decoded with utf-8-sig u'ABC' # removes BOM if present.", "\nutf-16 w/ BOM decoded with utf-16 u'ABC' # *requires* BOM to be present.", "\nutf-16 w/ BOM decoded with utf-16le u'\\ufeffABC' # doesn't remove BOM if present.", "\n\nNote that the utf-16 codec requires BOM to be present, or Python won't know if the data is big- or little-endian.", "\n\nA:\n\nThat character is the BOM or \"Byte Order Mark\". ", " It is usually received as the first few bytes of a file, telling you how to interpret the encoding of the rest of the data. ", " You can simply remove the character to continue. ", " Although, since the error says you were trying to convert to 'ascii', you should probably pick another encoding for whatever you were trying to do.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.006754813715815544, 0.0006569360848516226, 0.0008720608311705291, 0.0005558064440265298, 0.0006157696479931474, 0.0009807125898078084, 0.000912363815587014, 0.0006761495023965836, 0.0008375798352062702, 0.0050863479264080524, 0.0006302377441897988, 0.0032144407741725445, 0.014270531944930553, 0.0013376997085288167, 0.0007785428315401077, 0.001414374215528369, 0.000718860246706754, 0.0007506665424443781, 0.000599798746407032, 0.0006535747670568526, 0.0009397545363754034, 0.001994825666770339 ]
0.002057
22
[ "Port Anderson, Mississippi\n\nPort Anderson is a ghost town in Washington County, Mississippi, United States.", "\n\nHistory\nThe area was settled around 1820 on the banks of the Mississippi River by Major John Lewis Martin (a nephew of Meriwether Lewis), and his son-in-law, John Anderson. ", " Using slave labor, they established a successful plantation there.", "\n\nPort Anderson is today covered by the Mississippi River, and the nearby shore is uninhabited bottomland.", "\n\nReferences\n\nCategory:Former populated places in Washington County, Mississippi\nCategory:Former populated places in Mississippi\nCategory:Mississippi populated places on the Mississippi River\nCategory:1820 establishments in the United States" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0009562593186274171, 0.0005742799257859588, 0.026272622868418694, 0.0007563956896774471, 0.0005833060131408274 ]
0.005829
5
[ "INTRODUCTION {#sec1-1}\n============\n\nRestriction enzyme, also known as restriction endonucleases, recognizes the specific base sequences in double stranded (ds) DNA and cleave both of its strands at the specific places. ", "Approximately 3000 restriction enzymes, spreading over 230 different DNA sequences, have been discovered. ", "They are mostly found in bacteria, but can also be isolated from viruses, archea, and eukaryotes.\\[[@ref1]\\]\n\n*Hin*dIII is a kind of restriction enzyme, commonly isolated from the *Haemophilus influenzae d* bacteria.\\[[@ref2]\\] It possesses the polymorphic restriction site on to the intron 19 of factor VIII gene.\\[[@ref3]\\] This factor is found as an important factor for the blood-coagulation procedure. ", "The gene of factor VIII is found to be located on the long arm of X-chromosome at Xq^28^ locus. ", "It has a length of 186 kb; possess 26 exons and 25 introns. ", "Out of which, exon 14 and 26 are the largest in their length, i.e., 3106 and 1958 bp, respectively, whereas, the other 24 exon ranges in size between 69 and 262 bp.\\[[@ref4][@ref5]\\]\n\nThe translation product of the factor VIII gene results in a synthesis of mature protein of 2332 amino acids with a molecular weight of 265 kDa. ", "Factor VIII protein is found in plasma as a part of complex glycoprotein (thromboplastin) and as an essential cofactor for the activation of factor X and XI. ", "Factors X and XI are the most important amplifier for the cascade mechanism of blood clotting. ", "Several heterogeneous mutations/changes, i.e., point mutations, deletions, insertions, and rearrangements/inversions\\[[@ref6]\\] have been identified in the factor VIII gene, and these described mutations in the factor VIII gene are found to be responsible for causing the Hemophilia disease.\\[[@ref7]\\]\n\nHemophilia disease also called \"The Royal Disease\" was discovered by Haldane in the royal families of Europe. ", "The main symptom of this disease is the lack of blood clotting. ", "Ordinarily blood clotting takes place within 5--6 min at a bleeding wound in a person, so that further bleeding stops. ", "But in persons suffering from the Hemophilia-A disease, blood clotting may take a time of 30 min--24 h and sometimes may cause the death of the patients due to the lack of the blood clotting, i.e., hemorrhage. ", "This condition occurs due to the lack of the thromboplastin protein in blood plasma and the nonactivation of factor X and factor XI because of the mutations in the factor VIII gene.", "\n\nFactor VIII gene mutations/changes can be detected using the restriction fragment length polymorphism (RFLP) molecular-marker technique. ", "RFLPs are the first type of DNA-based marker, which have been recognized to track the hemophilic inheritance.\\[[@ref8]\\] It is a kind of molecular-marker technique, in which the DNA molecule produces the different set of fragments, due to cleavage with a restriction enzyme. ", "These enzymes possess the specific restriction sites within a DNA molecule, and cut the ds DNA in to the different polymorphic fragments. ", "These polymorphic fragments are found as a basis for the polymorphism. ", "Similarly, the *Hin*dIII restriction enzyme possesses the restriction site in the intron 19 of the important blood-coagulating factor VIII gene, and can be used to find out the polymorphism in the different hemophilic and nonhemophilic individuals.\\[[@ref3][@ref9]\\]\n\nTherefore, an attempt has been made to find out the polymorphism using *Hin*dIII-based upon the restriction-fragment length polymorphism molecular-marker technique in the hemophilic and non-hemophilic patients.", "\n\nMATERIALS AND METHODS {#sec1-2}\n=====================\n\nSample collection {#sec2-1}\n-----------------\n\nBlood samples of 17 families were taken for the analysis. ", "About 5--8 ml of peripheral blood of the different individuals (i.e., P, PM, PF, and PS) were taken in the vials with an anticoagulant Ethylenediamine tetra acetic acid (0.5 M) in the ratio of 1:9. ", "Finally, the samples were stored at 4°C. ", "The above samples were provided by the \"Hemophilia Society,\" Lucknow.", "\n\nHere, P: Patient\n\nPM: Patient\\'s mother\n\nPF: Patient\\'s father\n\nPS: Patient\\'s sister\n\nDNA isolation {#sec2-2}\n-------------\n\nThe DNA was extracted from the peripheral blood by using rapid lysis method.\\[[@ref10]\\] In this method, the following reagents were used:\n\nBuffers and other reagents\n\nLysis buffer consisting of 11% sucrose (w/v); 1% Triton X (v/v); 0.1% MgCl~2~ (w/v); 0.15% Tris buffer (v/v) and autoclaved.", "Proteinase buffer consisting of 5% NaCl (w/v); 9% EDTA (w/v, pH 8.0), stored at 4°C.10% SDS.Phenol: Chloroform (4:1, v/v).70% ethanol (v/v); 100% ethanol or absolute alcohol (v/v).", "\n\nQualitative analysis of DNA {#sec2-3}\n---------------------------\n\nQuality and purity of the extracted DNA was checked by running the samples on 0.8% (w/v) agarose gel.", "\n\nPCR amplification of the extracted DNA {#sec2-4}\n--------------------------------------\n\nPCR reactions were performed in a 17.5 µl volume containing 1.5 µl of 10× Taq buffer (100 mM Tris pH 9.0; 500 mM KCl; 15 mM MgCl~2~; 0.1% gelatin), 200 mM (0.2 mM) of each dNTPs (Bangalore Genei™, Bangalore, India), 0.2 μM of each forward and reverse primer (Operon Biotechnologies, Germany), 1 unit of Taq DNA polymerase (Bangalore, India), and 10 ng of DNA for the optimum amplification.", "\n\nThe PCR conditions were as follows: First, the samples were incubated for 30 cycles of denaturation at 94°C for 1 min, annealing at 50--60°C for 1 min, and extension at 72°C for 2 min. ", "Then, reactions were completed by incubating the samples at final extension for 10 min at 72°C. ", "PCR reactions were conducted in a Mastercycler Gradient PCR system (Eppendorf, Hamburg, Germany). ", "The amplified PCR products were resolved by electrophoresis on 2% (w/v) agarose gel stained with ehtidium bromide (0.5 μg/ml) and run in 1× Tris Boric acid EDTA buffer (89 mM Tris, 89 mM Boric acid, and 2.24 mM Na~2~ EDTA, pH 8.0) for 2--3 h at 60 V. Finally, the resolved DNA bands were observed under the UV transilluminator chamber.", "\n\nRestriction digestion of the amplified products {#sec2-5}\n-----------------------------------------------\n\nFor the RFLP methodology, good quality of amplified PCR products were selected. ", "The restriction digestion of the amplified PCR products were performed in a 20.0 μl volume containing 2.0 μl of 10× digestion buffer, 0.5 μl *Hin*dIII restriction enzyme (Bangalore, India), 8.0 μl of amplified PCR product and 9.5 μl of HPLC water. ", "Then the samples were incubated for the digestion at 37°C in a water bath for 4--5 h. After the restriction digestion of the PCR products, they were loaded on to the 2.5% (w/v) agarose gel and 8% (w/v) polyacryl amide gel electrophoresis (PAGE) gel\\[[@ref11]\\] and run at 60 V for 1--2 hours. ", "Finally, the resolved bands were observed under the ultraviolet light (UV) light and scored for their presence/absence variation in different individuals with respect of the *Hin*dIII polymorphism.", "\n\nRESULTS AND DISCUSSION {#sec1-3}\n======================\n\nIn this study, a total of 17 families were analyzed for the hemophilic and nonhemophilic variation using *Hin*dIII-based RFLP technique. ", "The variation between the hemophilic and nonhemophilic specifically male patients were find out on the basis of the patient mother (female) as a carrier/informative (heterozygosity), infected (positive allelic) and uninfected (negative allelic) \\[[Table 1](#T1){ref-type=\"table\"}\\]. ", "Out of these 17 families, 8 mothers were informative (±) and rest of them were found to be in noninformative in condition. ", "The observed heterozygosity rate was found to be 47.5% and positive allele frequency (infected) was 26%, whereas negative allele frequency (uninfected) was 74%. ", "The heterozygosity and infected/uninfected conditions were observed on the basis of *Hin*dIII restriction digestion of the amplified region of the intron 19 of the factor VIII gene. ", "The gene of factor VIII polymorphism site intron 19 is 608 bp long. ", "After digestion with *Hin*dIII RFLP markers, the gene frequency is found as: for positive allele, it is 427, 100, and 81 bp; for negative allele, it is 427 and 181 bp; and for heterozygosity, it is 427, 181, 100, and 81 bp \\[Figures [1a](#F1){ref-type=\"fig\"} and [b](#F1){ref-type=\"fig\"}\\].", "\n\n###### \n\nHeterozygosity, infected, and uninfected hemophilic individuals in the studied 17 families\n\n![](", "JNSBM-1-25-g001)\n\n![(", "a) *Hin*dIII PCR--RFLP products on agarose gel: Lane 1 showing the undigested sample, lane 2 showing the case of negative allele (uninfected mother); lane 3 showing the heterozygosity ± (informative mother) and lane 4 showing the positive allele (infected mother). ", "Lane 5 is 100 bp DNA ladder. (", "b) *Hin*dIII PCR--RFLP products on 8% PAGE gel: Lane 2 showing the undigested sample; lane 3 showing the case of negative allele (uninfected mother); lane 4, 6, 7, and 8 showing the heterozygosity ± (informative mother) and lane 5 showing the positive allele (infected mother). ", "Lane 1 is 100 bp DNA ladder.](JNSBM-1-25-g002){#F1}\n\nIn this study, female patients were used as a base for the variation between the hemophilic and nonhemophilic male patients due to the fact that only these act as a carrier for it. ", "Hemophilia A is the most common cause of X-linked inherited-bleeding disorder resulting from a defect in factor VIII gene located on long arm of X-chromosome. ", "This disorder affects about 1 out of 5000 male births throughout the world. ", "Due to the inadequate medical facility for management of the disease, the DNA-based genetic diagnosis has assumed a great importance. ", "In fact, a direct detection of the mutation is the most accurate and reliable approach for carrier detection and parental diagnosis. ", "The limitation has overcome by the use of a linkage-based RFLP analysis in factor VIII gene. ", "Therefore, in this study, we had used *Hin*dIII-based RFLP technique to differentiate the hemophilic and nonhemophilic male patients, which is based on the female X-linked variation either as a carrier or infected or uninfected mothers.", "\n\nWe want to express our sincere thanks to the Head of the Department of Microbiology, Doon P.G., Paramedical College and Hospital, Dehradun, Uttarakhand, India and the Head of the Department of Pathology, K.G. Medical University, Lucknow, Uttar Pradesh, India.", "\n\n**Source of Support:** Nil\n\n**Conflict of Interest:** None declared.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0007844207575544715, 0.0006075853016227484, 0.0009211869328282773, 0.0006193709559738636, 0.0008171588997356594, 0.0006832786602899432, 0.0008796988404355943, 0.0006442367448471487, 0.0006907517672516406, 0.003570390399545431, 0.0062666237354278564, 0.00853789784014225, 0.001010581967420876, 0.0005780443316325545, 0.0008689003298059106, 0.0007954964530654252, 0.0005729077383875847, 0.0008251615217886865, 0.0007173437625169754, 0.0016857472946867347, 0.0005800060462206602, 0.0006854188395664096, 0.0033245456870645285, 0.0008343966910615563, 0.0006739450618624687, 0.0006139354663901031, 0.0005691465921700001, 0.0005770037532784045, 0.0005665513454005122, 0.0006470173830166459, 0.0006355182267725468, 0.0006364835426211357, 0.0006761298282071948, 0.0005574006936512887, 0.0009284171392209828, 0.0011738546891137958, 0.0009366088779643178, 0.0007781660533510149, 0.000651155598461628, 0.0006838499684818089, 0.0012204772792756557, 0.002599839586764574, 0.0013639696408063173, 0.0010816729627549648, 0.0006351954652927816, 0.001600158168002963, 0.0008540175040252507, 0.0017726565711200237, 0.00993410125374794, 0.0006127843516878784, 0.0005948301986791193, 0.00062794319819659, 0.0015851242933422327, 0.0005296493764035404, 0.0007684753509238362, 0.001994825666770339 ]
0.001368
56
[ "Sable Island Preservation Trust was established as a non-profit, charitable organization in 1997 in response to Environment Canada’s announcement that it was closing the main station on Sable Island. ", "The founding members believed that a continuous human presence was essential [...]More →" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005707929376512766, 0.0006393202929757535 ]
0.000605
2
[ "/*Gitment TAB 颜色调整*/\n.gitment-editor-tab{\n transition: color 0.25s, background 0.25s, border-color 0.25s;\n -moz-transition: color 0.25s, background 0.25s, border-color 0.25s;\t/* Firefox 4 */\n -webkit-transition: color 0.25s, background 0.25s, border-color 0.25s;\t/* Safari 和 Chrome */\n -o-transition: color 0.25s, background 0.25s, border-color 0.25s;\n}\n.gitment-editor-tab:hover{\n color: white;\n background: black;\n border-color: black;\n}\n.gitment-editor-submit{background-color: #ff321e !", "important}" ]
{ "pile_set_name": "Github" }
[ 0.0011381137883290648, 0.0007014180300757289 ]
0.00092
2
[ "Related literature {#sec1}\n==================\n\nFor background to Schiff bases and for related structures, see: Shafiq *et al.* (", "2009*a* [@bb6],*b* [@bb7]): For graph-set notation, see: Bernstein *et al.* (", "1995[@bb1]).", "\n\nExperimental {#sec2}\n============\n\n {#sec2.1}\n\n### Crystal data {#sec2.1.1}\n\nC~14~H~12~ClN~3~O~2~·H~2~O*M* *~r~* = 307.73Triclinic,*a* = 7.1693 (5) Å*b* = 7.4964 (4) Å*c* = 14.5966 (9) Åα = 90.138 (2)°β = 95.835 (1)°γ = 115.755 (2)°*V* = 701.94 (8) Å^3^*Z* = 2Mo *K*α radiationμ = 0.29 mm^−1^*T* = 296 K0.28 × 0.18 × 0.14 mm\n\n### Data collection {#sec2.1.2}\n\nBruker Kappa APEXII CCD diffractometerAbsorption correction: multi-scan (*SADABS*; Bruker, 2005[@bb2]) *T* ~min~ = 0.942, *T* ~max~ = 0.95910105 measured reflections2491 independent reflections2151 reflections with *I* \\> 2σ(*I*)*R* ~int~ = 0.027\n\n### Refinement {#sec2.1.3}\n\n*R*\\[*F* ^2^ \\> 2σ(*F* ^2^)\\] = 0.047*wR*(*F* ^2^) = 0.135*S* = 1.172491 reflections198 parametersH atoms treated by a mixture of independent and constrained refinementΔρ~max~ = 0.24 e Å^−3^Δρ~min~ = −0.35 e Å^−3^\n\n {#d5e512}\n\nData collection: *APEX2* (Bruker, 2009[@bb3]); cell refinement: *SAINT* (Bruker, 2009[@bb3]); data reduction: *SAINT*; program(s) used to solve structure: *SHELXS97* (Sheldrick, 2008[@bb8]); program(s) used to refine structure: *SHELXL97* (Sheldrick, 2008[@bb8]); molecular graphics: *ORTEP-3* (Farrugia, 1997[@bb4]) and *PLATON* (Spek, 2009[@bb9]); software used to prepare material for publication: *WinGX* (Farrugia, 1999[@bb5]) and *PLATON*.", "\n\nSupplementary Material\n======================\n\nCrystal structure: contains datablocks global, I. DOI: [10.1107/S1600536810025213/hb5528sup1.cif](http://dx.doi.org/10.1107/S1600536810025213/hb5528sup1.cif)\n\nStructure factors: contains datablocks I. DOI: [10.1107/S1600536810025213/hb5528Isup2.hkl](http://dx.doi.org/10.1107/S1600536810025213/hb5528Isup2.hkl)\n\nAdditional supplementary materials: [crystallographic information](http://scripts.iucr.org/cgi-bin/sendsupfiles?hb5528&file=hb5528sup0.html&mime=text/html); [3D view](http://scripts.iucr.org/cgi-bin/sendcif?hb5528sup1&Qmime=cif); [checkCIF report](http://scripts.iucr.org/cgi-bin/paper?hb5528&checkcif=yes)\n\nSupplementary data and figures for this paper are available from the IUCr electronic archives (Reference: [HB5528](http://scripts.iucr.org/cgi-bin/sendsup?hb5528)).", "\n\nThe authors acknowledge the provision of funds for the purchase of diffractometer and encouragement by Dr Muhammad Akram Chaudhary, Vice Chancellor, University of Sargodha, Pakistan.", "\n\nComment\n=======\n\nWe have reported crystal structures of Schiff bases containing pyridne (Shafiq *et al.*, ", "2009*a*, 2009*b*) and as a part of this project, we report herein the structure and synthesis of the title compound (I, Fig. ", "1).", "\n\nIn (I) the group A (C1--C8/O1/CL1) of 5-chloro-2-hydroxyacetophenone, the central group B (N1/N2/C9/O2) and the pyridine ring C (C10---C14/N3) are planar with r. m. s. deviation of 0.0330, 0.0182 and 0.0082 Å, respectively. ", "The dihedral angle between A/B, A/C and B/C is 6.62 (11), 58.08 (10) and 52.98 (14)°, respectively. ", "There exist intramolecular H-bonding of O---H···N type forming an S(6) ring motif (Bernstein *et al.*, ", "1995). ", "The water molecule acts as donar as well as accepter and therefore interconnects three molecules. ", "Due to intra as well as intermolecular H-bondings of O---H···O and O---H···N types (Table 1, Fig. ", "2), the title compound is stabilized in infinite one dimensional polymeric chains. ", "In the polymeric chains *R*~4~^4^(16) ring motifs are formed. ", "The π--π interactions exist between the centroids of pyridine rings at distance of 3.864 (2) Å \\[symmetry: -*x*, -*y*, 1 - *z*\\] and at 4.013 (2) Å \\[symmetry: 1 - *x*, 1 - *y*, 1 - *z*\\]. ", "The C---H···π interaction (Table 1) also plays an important role in stabilizing the structure.", "\n\nExperimental {#experimental}\n============\n\nTo a hot stirred solution of 5-chloro-2-hydroxyacetophenone (1.71 g, 0.01 mole) in ethanol, 25 ml nicotinic acid hydrazide (1.37 g, 0.01 mol) was added. ", "The resultant mixture was then heated under reflux for 7--8 h. The reaction was monitored through TLC. ", "The precipitate were formed were collected by suction filteration. ", "The resultant crude material was dried and recrystalized in 1,4-dioxan:ethanol(1:2) to affoard light brown needles of (I).", "\n\nRefinement {#refinement}\n==========\n\nThe coordinates of H-atoms of water molecule were refined. ", "The H-atoms were positioned geometrically (O--H = 0.82, N--H = 0.86, C--H = 0.93--0.96 Å) and refined as riding with *U*~iso~(H) = *xU*~eq~(C, N, O), where *x* = 1.5 for methyl and *x* = 1.2 for all other H-atoms.", "\n\nFigures\n=======\n\n![", "View of the title compound with displacement ellipsoids drawn at the 50% probability level. ", "The dotted line shows the intramolecular H-bond.](e-66-o1880-fig1){#Fap1}\n\n![", "The partial packing of (I), which shows that molecules form infinite one dimensional polymeric chains with different ring motifs.](e-66-o1880-fig2){#Fap2}\n\nCrystal data {#tablewrapcrystaldatalong}\n============\n\n ---------------------------- ---------------------------------------\n C~14~H~12~ClN~3~O~2~·H~2~O *Z* = 2\n *M~r~* = 307.73 *F*(000) = 320\n Triclinic, *P*1 *D*~x~ = 1.456 Mg m^−3^\n Hall symbol: -P 1 Mo *K*α radiation, λ = 0.71073 Å\n *a* = 7.1693 (5) Å Cell parameters from 1770 reflections\n *b* = 7.4964 (4) Å θ = 2.6--28.4°\n *c* = 14.5966 (9) Å µ = 0.29 mm^−1^\n α = 90.138 (2)° *T* = 296 K\n β = 95.835 (1)° Needle, light brown\n γ = 115.755 (2)° 0.28 × 0.18 × 0.14 mm\n *V* = 701.94 (8) Å^3^ \n ---------------------------- ---------------------------------------\n\nData collection {#tablewrapdatacollectionlong}\n===============\n\n ------------------------------------------------------------ --------------------------------------\n Bruker Kappa APEXII CCD diffractometer 2491 independent reflections\n Radiation source: fine-focus sealed tube 2151 reflections with *I* \\> 2σ(*I*)\n graphite *R*~int~ = 0.027\n Detector resolution: 8.20 pixels mm^-1^ θ~max~ = 25.3°, θ~min~ = 2.8°\n ω scans *h* = −8→8\n Absorption correction: multi-scan (*SADABS*; Bruker, 2005) *k* = −8→8\n *T*~min~ = 0.942, *T*~max~ = 0.959 *l* = −16→17\n 10105 measured reflections \n ------------------------------------------------------------ --------------------------------------\n\nRefinement {#tablewraprefinementdatalong}\n==========\n\n ------------------------------------- -------------------------------------------------------------------------------------------------\n Refinement on *F*^2^ Primary atom site location: structure-invariant direct methods\n Least-squares matrix: full Secondary atom site location: difference Fourier map\n *R*\\[*F*^2^ \\> 2σ(*F*^2^)\\] = 0.047 Hydrogen site location: inferred from neighbouring sites\n *wR*(*F*^2^) = 0.135 H atoms treated by a mixture of independent and constrained refinement\n *S* = 1.17 *w* = 1/\\[σ^2^(*F*~o~^2^) + (0.0375*P*)^2^ + 0.8617*P*\\] where *P* = (*F*~o~^2^ + 2*F*~c~^2^)/3\n 2491 reflections (Δ/σ)~max~ \\< 0.001\n 198 parameters Δρ~max~ = 0.24 e Å^−3^\n 0 restraints Δρ~min~ = −0.35 e Å^−3^\n ------------------------------------- -------------------------------------------------------------------------------------------------\n\nSpecial details {#specialdetails}\n===============\n\n -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------\n Geometry. ", "Bond distances, angles *etc*. ", "have been calculated using the rounded fractional coordinates. ", "All su\\'s are estimated from the variances of the (full) variance-covariance matrix. ", "The cell e.s.d.\\'s are taken into account in the estimation of distances, angles and torsion angles\n Refinement. ", "Refinement of *F*^2^ against ALL reflections. ", "The weighted *R*-factor *wR* and goodness of fit *S* are based on *F*^2^, conventional *R*-factors *R* are based on *F*, with *F* set to zero for negative *F*^2^. The threshold expression of *F*^2^ \\> σ(*F*^2^) is used only for calculating *R*-factors(gt) *etc*. ", "and is not relevant to the choice of reflections for refinement. *", "R*-factors based on *F*^2^ are statistically about twice as large as those based on *F*, and *R*- factors based on ALL data will be even larger.", "\n -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------\n\nFractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å^2^) {#tablewrapcoords}\n==================================================================================================\n\n ----- --------------- -------------- --------------- -------------------- --\n *x* *y* *z* *U*~iso~\\*/*U*~eq~ \n Cl1 −0.33027 (14) 0.26260 (13) −0.24936 (5) 0.0523 (3) \n O1 0.3445 (3) 0.2717 (4) 0.01706 (15) 0.0491 (8) \n O2 0.4191 (3) 0.2364 (4) 0.25756 (15) 0.0544 (8) \n N1 0.1131 (3) 0.2425 (3) 0.14368 (15) 0.0338 (7) \n N2 0.0986 (4) 0.2273 (4) 0.23701 (15) 0.0347 (7) \n N3 0.2974 (4) 0.0892 (5) 0.53373 (18) 0.0523 (10) \n C1 −0.0064 (4) 0.2462 (4) −0.01053 (18) 0.0311 (8) \n C2 0.1854 (4) 0.2739 (4) −0.04006 (19) 0.0365 (9) \n C3 0.2156 (5) 0.3040 (5) −0.1323 (2) 0.0505 (11) \n C4 0.0595 (6) 0.3026 (5) −0.1958 (2) 0.0502 (11) \n C5 −0.1289 (5) 0.2703 (4) −0.16794 (19) 0.0391 (9) \n C6 −0.1630 (4) 0.2451 (4) −0.07681 (19) 0.0347 (8) \n C7 −0.0461 (4) 0.2199 (4) 0.08716 (18) 0.0306 (8) \n C8 −0.2576 (5) 0.1709 (6) 0.1141 (2) 0.0476 (10) \n C9 0.2671 (4) 0.2336 (4) 0.28988 (19) 0.0343 (9) \n C10 0.2551 (4) 0.2337 (4) 0.39173 (18) 0.0341 (9) \n C11 0.2132 (4) 0.3709 (5) 0.4384 (2) 0.0398 (9) \n C12 0.2188 (5) 0.3679 (5) 0.5328 (2) 0.0500 (11) \n C13 0.2599 (5) 0.2246 (6) 0.5769 (2) 0.0537 (13) \n C14 0.2966 (5) 0.0971 (5) 0.4425 (2) 0.0421 (10) \n O3 0.7770 (3) 0.2277 (4) 0.34221 (16) 0.0478 (8) \n H1 0.31433 0.26059 0.07012 0.0736\\* \n H2 −0.01187 0.21446 0.26025 0.0416\\* \n H3 0.34320 0.32529 −0.15140 0.0608\\* \n H4 0.08174 0.32343 −0.25733 0.0605\\* \n H6 −0.29067 0.22721 −0.05904 0.0416\\* \n H8A −0.27145 0.29111 0.12362 0.0715\\* \n H8B −0.27573 0.10118 0.17002 0.0715\\* \n H8C −0.36158 0.08889 0.06588 0.0715\\* \n H11 0.18180 0.46339 0.40644 0.0478\\* \n H12 0.19538 0.46062 0.56616 0.0598\\* \n H13 0.26161 0.22236 0.64064 0.0645\\* \n H14 0.32550 0.00545 0.41125 0.0505\\* \n H3A 0.657 (6) 0.217 (5) 0.314 (3) 0.0574\\* \n H3B 0.735 (6) 0.139 (5) 0.387 (3) 0.0574\\* \n ----- --------------- -------------- --------------- -------------------- --\n\nAtomic displacement parameters (Å^2^) {#tablewrapadps}\n=====================================\n\n ----- ------------- ------------- ------------- ------------- -------------- --------------\n *U*^11^ *U*^22^ *U*^33^ *U*^12^ *U*^13^ *U*^23^\n Cl1 0.0600 (5) 0.0632 (5) 0.0309 (4) 0.0269 (4) −0.0066 (3) 0.0055 (3)\n O1 0.0391 (12) 0.0743 (16) 0.0436 (12) 0.0329 (12) 0.0093 (10) 0.0112 (12)\n O2 0.0426 (12) 0.1011 (19) 0.0355 (12) 0.0456 (13) 0.0069 (10) 0.0129 (12)\n N1 0.0346 (12) 0.0435 (14) 0.0252 (12) 0.0192 (11) 0.0011 (9) 0.0024 (10)\n N2 0.0313 (12) 0.0509 (14) 0.0248 (12) 0.0209 (11) 0.0026 (9) 0.0032 (10)\n N3 0.0568 (17) 0.079 (2) 0.0347 (14) 0.0416 (16) 0.0083 (12) 0.0156 (14)\n C1 0.0344 (14) 0.0286 (14) 0.0287 (14) 0.0127 (12) 0.0015 (11) 0.0001 (11)\n C2 0.0393 (16) 0.0394 (16) 0.0347 (15) 0.0204 (13) 0.0056 (12) 0.0032 (12)\n C3 0.0509 (19) 0.069 (2) 0.0438 (18) 0.0342 (18) 0.0205 (15) 0.0110 (16)\n C4 0.067 (2) 0.063 (2) 0.0297 (16) 0.0352 (19) 0.0135 (15) 0.0081 (14)\n C5 0.0493 (18) 0.0391 (16) 0.0281 (14) 0.0199 (14) −0.0012 (12) 0.0013 (12)\n C6 0.0338 (14) 0.0366 (15) 0.0316 (15) 0.0141 (12) 0.0012 (11) 0.0001 (12)\n C7 0.0314 (14) 0.0326 (14) 0.0282 (14) 0.0148 (12) 0.0015 (11) 0.0004 (11)\n C8 0.0356 (16) 0.079 (2) 0.0296 (15) 0.0264 (16) 0.0031 (12) 0.0055 (15)\n C9 0.0307 (14) 0.0450 (17) 0.0301 (14) 0.0197 (13) 0.0014 (11) 0.0039 (12)\n C10 0.0270 (13) 0.0469 (17) 0.0267 (14) 0.0153 (12) −0.0004 (11) 0.0020 (12)\n C11 0.0356 (15) 0.0473 (17) 0.0368 (16) 0.0192 (14) 0.0000 (12) 0.0014 (13)\n C12 0.0470 (18) 0.068 (2) 0.0382 (17) 0.0284 (17) 0.0032 (14) −0.0074 (16)\n C13 0.053 (2) 0.092 (3) 0.0261 (16) 0.041 (2) 0.0038 (14) 0.0042 (16)\n C14 0.0458 (17) 0.057 (2) 0.0322 (16) 0.0302 (16) 0.0057 (13) 0.0064 (14)\n O3 0.0364 (12) 0.0757 (17) 0.0380 (12) 0.0304 (12) 0.0052 (9) 0.0118 (11)\n ----- ------------- ------------- ------------- ------------- -------------- --------------\n\nGeometric parameters (Å, °) {#tablewrapgeomlong}\n===========================\n\n ---------------------- ------------ ----------------------- ------------\n Cl1---C5 1.755 (4) C5---C6 1.376 (4)\n O1---C2 1.349 (4) C7---C8 1.492 (5)\n O2---C9 1.223 (4) C9---C10 1.498 (4)\n O1---H1 0.8200 C10---C11 1.385 (4)\n O3---H3A 0.89 (5) C10---C14 1.382 (4)\n O3---H3B 0.91 (4) C11---C12 1.375 (4)\n N1---N2 1.378 (3) C12---C13 1.377 (5)\n N1---C7 1.285 (4) C3---H3 0.9300\n N2---C9 1.348 (4) C4---H4 0.9300\n N3---C14 1.333 (4) C6---H6 0.9300\n N3---C13 1.330 (5) C8---H8C 0.9600\n N2---H2 0.8600 C8---H8A 0.9600\n C1---C7 1.479 (4) C8---H8B 0.9600\n C1---C6 1.403 (4) C11---H11 0.9300\n C1---C2 1.412 (4) C12---H12 0.9300\n C2---C3 1.389 (4) C13---H13 0.9300\n C3---C4 1.375 (5) C14---H14 0.9300\n C4---C5 1.370 (6) \n \n C2---O1---H1 109.00 C9---C10---C14 119.0 (3)\n H3A---O3---H3B 102 (4) C9---C10---C11 122.9 (3)\n N2---N1---C7 120.6 (3) C10---C11---C12 118.8 (3)\n N1---N2---C9 116.3 (3) C11---C12---C13 118.5 (3)\n C13---N3---C14 116.9 (3) N3---C13---C12 123.9 (3)\n N1---N2---H2 122.00 N3---C14---C10 123.7 (3)\n C9---N2---H2 122.00 C2---C3---H3 120.00\n C2---C1---C6 118.2 (2) C4---C3---H3 120.00\n C2---C1---C7 122.3 (3) C5---C4---H4 120.00\n C6---C1---C7 119.5 (3) C3---C4---H4 120.00\n C1---C2---C3 119.6 (3) C1---C6---H6 120.00\n O1---C2---C3 117.1 (3) C5---C6---H6 120.00\n O1---C2---C1 123.3 (3) C7---C8---H8B 109.00\n C2---C3---C4 120.9 (3) C7---C8---H8C 109.00\n C3---C4---C5 119.7 (3) H8A---C8---H8B 110.00\n Cl1---C5---C6 119.2 (3) H8A---C8---H8C 109.00\n Cl1---C5---C4 119.7 (2) H8B---C8---H8C 109.00\n C4---C5---C6 121.1 (3) C7---C8---H8A 109.00\n C1---C6---C5 120.4 (3) C10---C11---H11 121.00\n N1---C7---C8 124.7 (2) C12---C11---H11 121.00\n C1---C7---C8 120.6 (3) C13---C12---H12 121.00\n N1---C7---C1 114.7 (3) C11---C12---H12 121.00\n O2---C9---N2 122.8 (3) N3---C13---H13 118.00\n O2---C9---C10 121.7 (3) C12---C13---H13 118.00\n N2---C9---C10 115.5 (3) N3---C14---H14 118.00\n C11---C10---C14 118.1 (3) C10---C14---H14 118.00\n \n C7---N1---N2---C9 173.6 (3) O1---C2---C3---C4 178.1 (3)\n N2---N1---C7---C1 178.2 (2) C1---C2---C3---C4 −1.5 (5)\n N2---N1---C7---C8 −1.8 (4) C2---C3---C4---C5 −0.3 (5)\n N1---N2---C9---O2 −5.8 (4) C3---C4---C5---Cl1 −178.5 (3)\n N1---N2---C9---C10 175.2 (2) C3---C4---C5---C6 2.0 (5)\n C14---N3---C13---C12 0.8 (6) Cl1---C5---C6---C1 178.6 (2)\n C13---N3---C14---C10 −1.4 (6) C4---C5---C6---C1 −1.9 (4)\n C6---C1---C2---O1 −178.0 (3) O2---C9---C10---C11 126.3 (3)\n C6---C1---C2---C3 1.6 (4) O2---C9---C10---C14 −50.7 (4)\n C7---C1---C2---O1 2.4 (4) N2---C9---C10---C11 −54.6 (4)\n C7---C1---C2---C3 −178.0 (3) N2---C9---C10---C14 128.4 (3)\n C2---C1---C6---C5 0.1 (4) C9---C10---C11---C12 −175.7 (3)\n C7---C1---C6---C5 179.7 (3) C14---C10---C11---C12 1.3 (5)\n C2---C1---C7---N1 6.1 (4) C9---C10---C14---N3 177.6 (3)\n C2---C1---C7---C8 −173.9 (3) C11---C10---C14---N3 0.4 (5)\n C6---C1---C7---N1 −173.5 (2) C10---C11---C12---C13 −1.9 (5)\n C6---C1---C7---C8 6.6 (4) C11---C12---C13---N3 0.9 (6)\n ---------------------- ------------ ----------------------- ------------\n\nHydrogen-bond geometry (Å, °) {#tablewraphbondslong}\n=============================\n\n ------------------------------------------------\n Cg2 is the centroid of the C1--C6 phenyl ring.", "\n ------------------------------------------------\n\n --------------------- ---------- ---------- ----------- ---------------\n *D*---H···*A* *D*---H H···*A* *D*···*A* *D*---H···*A*\n O1---H1···N1 0.82 1.84 2.555 (3) 144\n N2---H2···O3^i^ 0.86 2.06 2.898 (4) 166\n O3---H3A···O2 0.89 (5) 1.88 (5) 2.760 (4) 171 (3)\n O3---H3B···N3^ii^ 0.91 (4) 2.01 (4) 2.885 (4) 161 (4)\n C8---H8A···Cg2^iii^ 0.96 2.99 3.763 (4) 139\n --------------------- ---------- ---------- ----------- ---------------\n\nSymmetry codes: (i) *x*−1, *y*, *z*; (ii) −*x*+1, −*y*, −*z*+1; (iii) −*x*, −*y*+1, −*z*.", "\n\n###### Hydrogen-bond geometry (Å, °)\n\n*Cg*2 is the centroid of the C1--C6 phenyl ring.", "\n\n *D*---H⋯*A* *D*---H H⋯*A* *D*⋯*A* *D*---H⋯*A*\n ----------------------- ---------- ---------- ----------- -------------\n O1---H1⋯N1 0.82 1.84 2.555 (3) 144\n N2---H2⋯O3^i^ 0.86 2.06 2.898 (4) 166\n O3---H3*A*⋯O2 0.89 (5) 1.88 (5) 2.760 (4) 171 (3)\n O3---H3*B*⋯N3^ii^ 0.91 (4) 2.01 (4) 2.885 (4) 161 (4)\n C8---H8*A*⋯*Cg*2^iii^ 0.96 2.99 3.763 (4) 139\n\nSymmetry codes: (i) ; (ii) ; (iii) .", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.0006337472586892545, 0.0006269588484428823, 0.0007591267349198461, 0.06942415982484818, 0.0007748425705358386, 0.0005393433966673911, 0.0006372446659952402, 0.0005772732547484338, 0.0008433845359832048, 0.0007680034032091498, 0.000649585563223809, 0.0006168501568026841, 0.0007688525365665555, 0.0006448651547543705, 0.0007470580749213696, 0.0006090643000788987, 0.003065647091716528, 0.0008774285088293254, 0.000576363701839, 0.0008996700635179877, 0.000553489604499191, 0.001078840927220881, 0.0005999751156195998, 0.0006688715657219291, 0.002270454540848732, 0.0010872926795855165, 0.0006082472391426563, 0.0007090393337421119, 0.00958648044615984, 0.0006244640098884702, 0.0006025881157256663, 0.0007078686030581594, 0.0006412745569832623, 0.7573127746582031, 0.2706134617328644, 0.0005559378769248724, 0.14962103962898254, 0.03992041200399399, 0.02457841858267784, 0.0008812760934233665, 0.020782526582479477, 0.001994825666770339 ]
0.032644
42
[ "// Boost string_algo library predicate.hpp header file ---------------------------//\n\n// Copyright Pavol Droba 2002-2003.", "\n//\n// Distributed under the Boost Software License, Version 1.0.", "\n// (See accompanying file LICENSE_1_0.txt or copy at\n// http://www.boost.org/LICENSE_1_0.txt)\n\n// See http://www.boost.org/ for updates, documentation, and revision history.", "\n\n#ifndef BOOST_STRING_PREDICATE_HPP\n#define BOOST_STRING_PREDICATE_HPP\n\n#include <boost/algorithm/string/config.hpp>\n#include <boost/range/begin.hpp>\n#include <boost/range/end.hpp>\n#include <boost/range/iterator.hpp>\n#include <boost/range/const_iterator.hpp>\n#include <boost/range/as_literal.hpp>\n#include <boost/range/iterator_range_core.hpp>\n\n#include <boost/algorithm/string/compare.hpp>\n#include <boost/algorithm/string/find.hpp>\n#include <boost/algorithm/string/detail/predicate.hpp>\n\n/*! ", "\\file boost/algorithm/string/predicate.hpp\n Defines string-related predicates. ", "\n The predicates determine whether a substring is contained in the input string \n under various conditions: a string starts with the substring, ends with the \n substring, simply contains the substring or if both strings are equal.", "\n Additionaly the algorithm \\c all() checks all elements of a container to satisfy a \n condition.", "\n\n All predicates provide the strong exception guarantee.", "\n*/\n\nnamespace boost {\n namespace algorithm {\n\n// starts_with predicate -----------------------------------------------//\n\n //! '", "Starts with' predicate\n /*!", "\n This predicate holds when the test string is a prefix of the Input.", "\n In other words, if the input starts with the test.", "\n When the optional predicate is specified, it is used for character-wise\n comparison.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Comp An element comparison predicate\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T, typename PredicateT>\n inline bool starts_with( \n const Range1T& Input, \n const Range2T& Test,\n PredicateT Comp)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range1T>::type> lit_input(::boost::as_literal(Input));\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range2T>::type> lit_test(::boost::as_literal(Test));\n\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<Range1T>::type Iterator1T;\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<Range2T>::type Iterator2T;\n\n Iterator1T InputEnd=::boost::end(lit_input);\n Iterator2T TestEnd=::boost::end(lit_test);\n\n Iterator1T it=::boost::begin(lit_input);\n Iterator2T pit=::boost::begin(lit_test);\n for(;\n it!=InputEnd && pit!=TestEnd;\n ++it,++pit)\n {\n if( !(", "Comp(*it,*pit)) )\n return false;\n }\n\n return pit==TestEnd;\n }\n\n //! '", "Starts with' predicate\n /*!", "\n \\overload\n */\n template<typename Range1T, typename Range2T>\n inline bool starts_with( \n const Range1T& Input, \n const Range2T& Test)\n {\n return ::boost::algorithm::starts_with(Input, Test, is_equal());\n }\n\n //! '", "Starts with' predicate ( case insensitive )\n /*!", "\n This predicate holds when the test string is a prefix of the Input.", "\n In other words, if the input starts with the test.", "\n Elements are compared case insensitively.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Loc A locale used for case insensitive comparison\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T>\n inline bool istarts_with( \n const Range1T& Input, \n const Range2T& Test,\n const std::locale& Loc=std::locale())\n {\n return ::boost::algorithm::starts_with(Input, Test, is_iequal(Loc));\n }\n\n\n// ends_with predicate -----------------------------------------------//\n\n //! '", "Ends with' predicate\n /*!", "\n This predicate holds when the test string is a suffix of the Input.", "\n In other words, if the input ends with the test.", "\n When the optional predicate is specified, it is used for character-wise\n comparison.", "\n\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Comp An element comparison predicate\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T, typename PredicateT>\n inline bool ends_with( \n const Range1T& Input, \n const Range2T& Test,\n PredicateT Comp)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range1T>::type> lit_input(::boost::as_literal(Input));\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range2T>::type> lit_test(::boost::as_literal(Test));\n\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<Range1T>::type Iterator1T;\n typedef BOOST_STRING_TYPENAME boost::detail::\n iterator_traits<Iterator1T>::iterator_category category;\n\n return detail::\n ends_with_iter_select( \n ::boost::begin(lit_input), \n ::boost::end(lit_input), \n ::boost::begin(lit_test), \n ::boost::end(lit_test), \n Comp,\n category());\n }\n\n\n //! '", "Ends with' predicate\n /*!", "\n \\overload\n */\n template<typename Range1T, typename Range2T>\n inline bool ends_with( \n const Range1T& Input, \n const Range2T& Test)\n {\n return ::boost::algorithm::ends_with(Input, Test, is_equal());\n }\n\n //! '", "Ends with' predicate ( case insensitive )\n /*!", "\n This predicate holds when the test container is a suffix of the Input.", "\n In other words, if the input ends with the test.", "\n Elements are compared case insensitively.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Loc A locale used for case insensitive comparison\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T>\n inline bool iends_with( \n const Range1T& Input, \n const Range2T& Test,\n const std::locale& Loc=std::locale())\n {\n return ::boost::algorithm::ends_with(Input, Test, is_iequal(Loc));\n }\n\n// contains predicate -----------------------------------------------//\n\n //! '", "Contains' predicate\n /*!", "\n This predicate holds when the test container is contained in the Input.", "\n When the optional predicate is specified, it is used for character-wise\n comparison.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Comp An element comparison predicate\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T, typename PredicateT>\n inline bool contains( \n const Range1T& Input, \n const Range2T& Test,\n PredicateT Comp)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range1T>::type> lit_input(::boost::as_literal(Input));\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range2T>::type> lit_test(::boost::as_literal(Test));\n\n if (::boost::empty(lit_test))\n {\n // Empty range is contained always\n return true;\n }\n \n // Use the temporary variable to make VACPP happy\n bool bResult=(::boost::algorithm::first_finder(lit_test,Comp)(::boost::begin(lit_input), ::boost::end(lit_input)));\n return bResult;\n }\n\n //! '", "Contains' predicate\n /*!", "\n \\overload\n */\n template<typename Range1T, typename Range2T>\n inline bool contains( \n const Range1T& Input, \n const Range2T& Test)\n {\n return ::boost::algorithm::contains(Input, Test, is_equal());\n }\n\n //! '", "Contains' predicate ( case insensitive )\n /*!", "\n This predicate holds when the test container is contained in the Input.", "\n Elements are compared case insensitively.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Loc A locale used for case insensitive comparison\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T>\n inline bool icontains( \n const Range1T& Input, \n const Range2T& Test, \n const std::locale& Loc=std::locale())\n {\n return ::boost::algorithm::contains(Input, Test, is_iequal(Loc));\n }\n\n// equals predicate -----------------------------------------------//\n\n //! '", "Equals' predicate\n /*!", "\n This predicate holds when the test container is equal to the\n input container i.e. all elements in both containers are same.", "\n When the optional predicate is specified, it is used for character-wise\n comparison.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Comp An element comparison predicate\n \\return The result of the test\n\n \\note This is a two-way version of \\c std::equal algorithm\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T, typename PredicateT>\n inline bool equals( \n const Range1T& Input, \n const Range2T& Test,\n PredicateT Comp)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range1T>::type> lit_input(::boost::as_literal(Input));\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range2T>::type> lit_test(::boost::as_literal(Test));\n\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<Range1T>::type Iterator1T;\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<Range2T>::type Iterator2T;\n \n Iterator1T InputEnd=::boost::end(lit_input);\n Iterator2T TestEnd=::boost::end(lit_test);\n\n Iterator1T it=::boost::begin(lit_input);\n Iterator2T pit=::boost::begin(lit_test);\n for(;\n it!=InputEnd && pit!=TestEnd;\n ++it,++pit)\n {\n if( !(", "Comp(*it,*pit)) )\n return false;\n }\n\n return (pit==TestEnd) && (it==InputEnd);\n }\n\n //! '", "Equals' predicate\n /*!", "\n \\overload\n */\n template<typename Range1T, typename Range2T>\n inline bool equals( \n const Range1T& Input, \n const Range2T& Test)\n {\n return ::boost::algorithm::equals(Input, Test, is_equal());\n }\n\n //! '", "Equals' predicate ( case insensitive )\n /*!", "\n This predicate holds when the test container is equal to the\n input container i.e. all elements in both containers are same.", "\n Elements are compared case insensitively.", "\n\n \\param Input An input sequence\n \\param Test A test sequence\n \\param Loc A locale used for case insensitive comparison\n \\return The result of the test\n\n \\note This is a two-way version of \\c std::equal algorithm\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T>\n inline bool iequals( \n const Range1T& Input, \n const Range2T& Test,\n const std::locale& Loc=std::locale())\n {\n return ::boost::algorithm::equals(Input, Test, is_iequal(Loc));\n }\n\n// lexicographical_compare predicate -----------------------------//\n\n //! ", "Lexicographical compare predicate\n /*!", "\n This predicate is an overload of std::lexicographical_compare\n for range arguments\n\n It check whether the first argument is lexicographically less\n then the second one.", "\n\n If the optional predicate is specified, it is used for character-wise\n comparison\n\n \\param Arg1 First argument \n \\param Arg2 Second argument\n \\param Pred Comparison predicate\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T, typename PredicateT>\n inline bool lexicographical_compare(\n const Range1T& Arg1,\n const Range2T& Arg2,\n PredicateT Pred)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range1T>::type> lit_arg1(::boost::as_literal(Arg1));\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<Range2T>::type> lit_arg2(::boost::as_literal(Arg2));\n\n return std::lexicographical_compare(\n ::boost::begin(lit_arg1),\n ::boost::end(lit_arg1),\n ::boost::begin(lit_arg2),\n ::boost::end(lit_arg2),\n Pred);\n }\n\n //! ", "Lexicographical compare predicate\n /*!", "\n \\overload\n */\n template<typename Range1T, typename Range2T>\n inline bool lexicographical_compare(\n const Range1T& Arg1,\n const Range2T& Arg2)\n {\n return ::boost::algorithm::lexicographical_compare(Arg1, Arg2, is_less());\n }\n\n //! ", "Lexicographical compare predicate (case-insensitive)\n /*!", "\n This predicate is an overload of std::lexicographical_compare\n for range arguments.", "\n It check whether the first argument is lexicographically less\n then the second one.", "\n Elements are compared case insensitively\n\n\n \\param Arg1 First argument \n \\param Arg2 Second argument\n \\param Loc A locale used for case insensitive comparison\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename Range1T, typename Range2T>\n inline bool ilexicographical_compare(\n const Range1T& Arg1,\n const Range2T& Arg2,\n const std::locale& Loc=std::locale())\n {\n return ::boost::algorithm::lexicographical_compare(Arg1, Arg2, is_iless(Loc));\n }\n \n\n// all predicate -----------------------------------------------//\n\n //! '", "All' predicate\n /*!", "\n This predicate holds it all its elements satisfy a given \n condition, represented by the predicate.", "\n \n \\param Input An input sequence\n \\param Pred A predicate\n \\return The result of the test\n\n \\note This function provides the strong exception-safety guarantee\n */\n template<typename RangeT, typename PredicateT>\n inline bool all( \n const RangeT& Input, \n PredicateT Pred)\n {\n iterator_range<BOOST_STRING_TYPENAME range_const_iterator<RangeT>::type> lit_input(::boost::as_literal(Input));\n\n typedef BOOST_STRING_TYPENAME \n range_const_iterator<RangeT>::type Iterator1T;\n\n Iterator1T InputEnd=::boost::end(lit_input);\n for( Iterator1T It=::boost::begin(lit_input); It!=InputEnd; ++It)\n {\n if (!", "Pred(*It))\n return false;\n }\n \n return true;\n }\n\n } // namespace algorithm\n\n // pull names to the boost namespace\n using algorithm::starts_with;\n using algorithm::istarts_with;\n using algorithm::ends_with;\n using algorithm::iends_with;\n using algorithm::contains;\n using algorithm::icontains;\n using algorithm::equals;\n using algorithm::iequals;\n using algorithm::all;\n using algorithm::lexicographical_compare;\n using algorithm::ilexicographical_compare;\n\n} // namespace boost\n\n\n#endif // BOOST_STRING_PREDICATE_HPP\n" ]
{ "pile_set_name": "Github" }
[ 0.001056879060342908, 0.0007203518180176616, 0.0005679373862221837, 0.0014386846451088786, 0.0007843804196454585, 0.0008385386317968369, 0.000861834327224642, 0.0006058294093236327, 0.0011669069062918425, 0.001367263263091445, 0.0008918228559195995, 0.0006053653196431696, 0.0005593792302533984, 0.002216168213635683, 0.019195303320884705, 0.001367263263091445, 0.001301970798522234, 0.0010563350515440106, 0.0008918228559195995, 0.0006053653196431696, 0.0006993635324761271, 0.0012382074492052197, 0.0014241690514609218, 0.0007851959089748561, 0.000621977960690856, 0.0005593792302533984, 0.0011056119110435247, 0.0014241690514609218, 0.001516119111329317, 0.001145411399193108, 0.0006919205188751221, 0.000621977960690856, 0.0006993635324761271, 0.0012680708896368742, 0.0011769633274525404, 0.0006717462674714625, 0.0005593792302533984, 0.0013349112123250961, 0.0011769633274525404, 0.0013473564758896828, 0.0010786158964037895, 0.0006717462674714625, 0.0006993635324761271, 0.0014368060510605574, 0.001073440769687295, 0.0006756786606274545, 0.0005593792302533984, 0.002526446944102645, 0.017850518226623535, 0.001073440769687295, 0.0011856869095936418, 0.0009317416115663946, 0.0006756786606274545, 0.0006993635324761271, 0.0009842925937846303, 0.0008332267752848566, 0.005196536425501108, 0.0008767874678596854, 0.0008332267752848566, 0.001448875991627574, 0.0007922329241409898, 0.0021557339932769537, 0.000668556138407439, 0.0008378045167773962, 0.002910892479121685, 0.0007578347576782107, 0.0017944698920473456, 0.0011738328030332923 ]
0.001626
68
[ "595 F.2d 1226\nU. S.v.", "McCrary\nNo. ", "78-5234\nUnited States Court of Appeals, Sixth Circuit\n1/16/79\n\n1\nE.D.Mich.", "\n\nAFFIRMED\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.0023025539703667164, 0.0011180759174749255, 0.0008092387579381466, 0.0008297903696075082 ]
0.001265
4
[ "var inc = (x) => x + 1\n\nexpect(10 |> inc).toBe(11);\n" ]
{ "pile_set_name": "Github" }
[ 0.000986667932011187 ]
0.000987
1
[ "Q:\n\nJava methods getting euclidean distance\n\npublic class Point\n{ \n// Placeholders for xcoordinate, ycoordinate, and quadrants\nint xcoord = 0;\nint ycoord =0;\ndouble distance = 0.0;\nString quadrant = (\"NW\");\n\n//moveUp changes the y coordinate \nvoid moveUp (int x) {\n int moveUp = ycoord + x;\n ycoord= moveUp;\n System.out.println(moveUp);\n }\n// moveDown changes the y coordinate \nvoid moveDown (int y){\n int moveDown = ycoord - y;\n ycoord =moveDown;\n System.out.println(moveDown);}\n// moveLeft changes the x coordinate \nvoid moveLeft (int f){\n int moveLeft = xcoord -f ;\n xcoord = moveLeft;\n System.out.println(moveLeft);}\n// moveRight changes the x coordinate \nvoid moveRight (int h) {\n int moveRight = xcoord +h ;\n xcoord = moveRight;\n System.out.println(moveRight);}\n\n// This takes the y coordinate and the xcoordinate and places it into a quadrant. ", "Then it returns the quadrant.", "\nString quadrant () { \n if (xcoord >= 0 && ycoord >=0){\n return quadrant = (\"NE\"); }\n else if ( xcoord < 0 && ycoord < 0 ) {\n return quadrant = (\"SW\");}\n else if (xcoord <0 && ycoord >0 ){\n return quadrant = (\"NW\");}\n else if (xcoord >0 && ycoord <0){\n return quadrant = (\"SE\");}\n else {\n return quadrant = (\"Origin\");} \n}\n//euclidean distance (?)", "\nPoint distance (Point other) {\n Point result = new Point(); \n result.ycoord = Math.abs (ycoord - other.ycoord);\n result.xcoord = Math.abs (xcoord- other.xcoord); \n result.distance = Math.sqrt((result.ycoord)*(result.ycoord) +(result.xcoord)*(result.xcoord));\n System.out.println(result);\n return result;\n\n }\n\n} \n\nHere is the whole code. ", "What I'm having trouble with is for some reason my distance method isn't working properly and I don't know why. ", "It returns Point@24a42c89, instead of any number. ", "Please let me know why it is returning this instead of a number. ", "Thanks so much. ", "I'm a beginner and have little knowledge on Java.", "\n\nA:\n\nYou are getting a Point as a result because you are returning a Point object. ", "There is no reason to declare a Point object when calculating the distance between two points. ", "The results of all calculations here are numbers, so declare all variables as double:\ndouble distance (Point other) {\n double deltaX = ycoord - other.ycoord;\n double deltaY = xcoord - other.xcoord;\n double result = Math.sqrt(deltaX*deltaX + deltaY*deltaY);\n return result; \n}\n\nNote there is no need for Math.abs() since squaring two numbers always results in a non-negative number.", "\nThis also removes the need of storing a distance value in every point. ", "This should make sense because a point is a pair of (x, y) coordinates, but does not have an inherent distance. ", "Rather \"distance\" is a relationship between two points.", "\n\nA:\n\nYour method returns a Point because you return result which is an instance of Point. ", "If you want a double (value) for the distance you should do it this way:\n//euclidean distance (?)", "\ndouble distance (Point other) {\n Point result = new Point(); \n result.ycoord = Math.abs (ycoord - other.ycoord);\n result.xcoord = Math.abs (xcoord- other.xcoord); \n result.distance = Math.sqrt((result.ycoord)*(result.ycoord) +(result.xcoord)*(result.xcoord));\n System.out.println(result);\n return result.distance; \n }\n} \n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.001387636992149055, 0.0006690882728435099, 0.0009520974708721042, 0.001097336644306779, 0.0007483180961571634, 0.0007313893875107169, 0.0005985276075080037, 0.0005977064138278365, 0.0007795951678417623, 0.0010157256620004773, 0.0007382614421658218, 0.0013282817089930177, 0.0006486356141977012, 0.000612448959145695, 0.00066526880254969, 0.0008849536534398794, 0.000590572482906282, 0.001168053480796516 ]
0.000845
18
[ "Extracellular proteins play important roles in, among other things, the formation, differentiation and maintenance of multicellular organisms. ", "The fate of many individual cells, e.g., proliferation, migration, differentiation, or interaction with other cells, is typically governed by information received from other cells and/or the immediate environment. ", "This information is often transmitted by secreted polypeptides (for instance, mitogenic factors, survival factors, cytotoxic factors, differentiation factors, neuropeptides, and hormones) which are, in turn, received and interpreted by diverse cell receptors or membrane-bound proteins. ", "These secreted polypeptides or signaling molecules normally pass through the cellular secretory pathway to reach their site of action in the extracellular environment.", "\nSecreted proteins have various industrial applications, including as pharmaceuticals, diagnostics, biosensors and bioreactors. ", "Most protein drugs available at present, such as thrombolytic agents, interferons, interleukins, erythropoietins, colony stimulating factors, and various other cytokines, are secretory proteins. ", "Their receptors, which are membrane proteins, also have potential as therapeutic or diagnostic agents. ", "Efforts are being undertaken by both industry and academia to identify new, native secreted proteins. ", "Many efforts are focused on the screening of mammalian recombinant DNA libraries to identify the coding sequences for novel secreted proteins. ", "Examples of screening methods and techniques are described in the literature [see, for example, Klein et al., ", "Proc. ", "Natl. ", "Acad. ", "Sci. ", "93:7108-7113 (1996); U.S. Pat. ", "No. ", "5,536,637)].", "\nMembrane-bound proteins and receptors can play important roles in, among other things, the formation, differentiation and maintenance of multicellular organisms. ", "The fate of many individual cells, e.g., proliferation, migration, differentiation, or interaction with other cells, is typically governed by information received from other cells and/or the immediate environment. ", "This information is often transmitted by secreted polypeptides (for instance, mitogenic factors, survival factors, cytotoxic factors, differentiation factors, neuropeptides, and hormones) which are, in turn, received and interpreted by diverse cell receptors or membrane-bound proteins. ", "Such membrane-bound proteins and cell receptors include, but are not limited to, cytokine receptors, receptor kinases, receptor phosphatases, receptors involved in cell-cell interactions, and cellular adhesin molecules like selectins and integrins. ", "For instance, transduction of signals that regulate cell growth and differentiation is regulated in part by phosphorylation of various cellular proteins. ", "Protein tyrosine kinases, enzymes that catalyze that process, can also act as growth factor receptors. ", "Examples include fibroblast growth factor receptor and nerve growth factor receptor.", "\nMembrane-bound proteins and receptor molecules have various industrial applications, including as pharmaceutical and diagnostic agents. ", "Receptor immunoadhesins, for instance, can be employed as therapeutic agents to block receptor-ligand interactions. ", "The membrane-bound proteins can also be employed for screening of potential peptide or small molecule inhibitors of the relevant receptor/ligand interaction.", "\nEfforts are being undertaken by both industry and academia to identify new, native receptor or membrane-bound proteins. ", "Many efforts are focused on the screening of mammalian recombinant DNA libraries to identify the coding sequences for novel receptor or membrane-bound proteins." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.0005627975915558636, 0.0005695562576875091, 0.0006075539859011769, 0.0005967905162833631, 0.0006020590662956238, 0.001016296329908073, 0.0005635262932628393, 0.0005392829771153629, 0.0005289735272526741, 0.0005472424090839922, 0.0009954050183296204, 0.0011819303035736084, 0.0009485092014074326, 0.0008691698894836009, 0.0006821000715717673, 0.0013787426287308335, 0.000893168558832258, 0.0005369505379348993, 0.0005695562576875091, 0.0006075539859011769, 0.0007479666383005679, 0.000682563055306673, 0.0006210547871887684, 0.0010803260374814272, 0.0005738924955949187, 0.0007673194631934166, 0.0005427196156233549, 0.0005324018420651555, 0.000535837491042912 ]
0.00072
29
[ "Modeling functional resting-state brain networks through neural message passing on the human connectome.", "\nIn this work, we propose a natural model for information flow in the brain through a neural message-passing dynamics on a structural network of macroscopic regions, such as the human connectome (HC). ", "In our model, each brain region is assumed to have a binary behavior (active or not), the strengths of interactions among them are encoded in the anatomical connectivity matrix defined by the HC, and the dynamics of the system is defined by the Belief Propagation (BP) algorithm, working near the critical point of the network. ", "We show that in the absence of direct external stimuli the BP algorithm converges to a spatial map of activations that is similar to the Default Mode Network (DMN) of the brain, which has been defined from the analysis of functional MRI data. ", "Moreover, we use Susceptibility Propagation (SP) to compute the matrix of long-range correlations between the different regions and show that the modules defined by a clustering of this matrix resemble several Resting State Networks (RSN) determined experimentally. ", "Both results suggest that the functional DMN and RSNs can be seen as simple consequences of the anatomical structure of the brain and a neural message-passing dynamics between macroscopic regions. ", "With the new model, we explore predictions on how functional maps change when the anatomical brain network suffers structural alterations, like in Alzheimer's disease and in lesions of the Corpus Callosum. ", "The implications and novel interpretations suggested by the model, as well as the role of criticality, are discussed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.0006877967971377075, 0.0005438264342956245, 0.0006049448857083917, 0.0005956757813692093, 0.000581716769374907, 0.0006429508212022483, 0.0006528273806907237, 0.00054248480591923 ]
0.000607
8
[ "Lee Green News- Leegate Update\n\nA massive thank you to everyone who submitted responses to Lewisham’s Leegate consultation by the15th April deadline.", "\n\nWe will let you know when we have uploaded them on our website (forwarded by the council after removing personal details) and hope you enjoy reading them as much as we do. ", "It’s great to see so much community engagement in this vital local issue.", "\n\nLewisham have now said that they will consider responses sent after the deadline, so if you have not done so it’s still important to write to planning@lewisham.gov.uk telling them if you agree or object to the proposals.", "\n\nYou must include your name, address and the reference DC/14/90032. ", "Details of the plans can be found on www.abetterleegreen.com." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005488308961503208, 0.0005254819407127798, 0.0005221999599598348, 0.0005364210810512304, 0.0005641319439746439, 0.0005929961334913969 ]
0.000548
6
[ "CBU just had an amazing 10 days of Bible study and spiritual refreshment in Israel. ", "If we are wiling to leave the tourist trail, we discover that Israel is not a monolithic bloc of orthodox Jews but a diverse nation in need of spiritual awakening....Read More ➔" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0005827455897815526, 0.006494069006294012 ]
0.003538
2
[ "(CNN) The worst Super Bowl in history has just ended, and I am debating whether to:\n\nA. Go to bed.", "\n\nB. Throw bricks at my television screen.", "\n\nC. Rush to YouTube and start watching \"Diff'rent Strokes\" reruns.", "\n\nD. Find some sort of hypnotist who — with enough session time, or with simple surgery — can forever eradicate the last four hours from my brain.", "\n\nJeff Pearlman\n\nI am not exaggerating. ", "Super Bowl LIII was not merely bad. ", "It was a boring, lame, non-suspenseful, never-ending, drool-puddle exercise in all that can suck about professional football and the surrounding hoopla. ", "If one is a fan of batted down passes and 2-yard runs up the gut; of the majestic follow through of a punter's leg and the flight of a field goal as it misses the mark ... well, mazel tov. ", "The NFL will happily sell you a $175 commemorative short-sleeve hoodie\n\nOr, put differently: My mother and father — Hall of Fame-worthy sports ignoramuses— spent their afternoon having tea on a neighbor's patio while eating dried prunes and debating the merits of General Electric's line of dishwashers.", "\n\nI envy them.", "\n\nUnder normal circumstances, I might not be so upset. ", "The Super Bowl, though, is my thing. ", "The first one I watched was held on Jan. 25, 1981. ", "I was an 8-year-old kid in Mahopac, New York, and the matchup between the Philadelphia Eagles and Oakland Raiders promised to be one of the great nights of my life. ", "So I slipped on the Vince Ferragamo Rams jersey Grandma had bought me for Chanukah, knelt before our 13-inch color Zenith and prepared for the explosive miracle that is professional football at the highest level. ", "In my right hand, I cradled a John Riggins-autographed pigskin. ", "In my left, I held a numerical roster of both teams.", "\n\nThen I lined up a bunch of Coca-Colas (Not Pepsi — sorry NFL) and absorbed.", "\n\nThe game was technically poor — a 27-10 Raider blowout that featured Eagles quarterback Ron Jaworski launching one fluttering quail after another. ", "I loved it. ", "The colors, the player introductions. ", "I loved the bright lights of the Louisiana Superdome, shining off the silver Oakland helmets. ", "I loved the Afros and the mustaches and the eye paint and the very fact that a Homo sapien named \"Petey\" Perot (Eagles lineman) walked the Earth. ", "These weren't mere men. ", "They were the grandest of gladiators, performing athletic ballet.", "\n\nThe Super Bowl — that Super Bowl — turned me into a fan, and year after year I anticipated the game and all its trimmings. ", "Not every matchup was fantastic, and not all of the performances legendary. ", "But even when, say, the Chicago Bears pummeled the New England Patriots 46-10 in Super Bowl XX, there were legitimate issues to discuss. ", "Would Walter Payton score his touchdown? (", "No) Was Jim McMahon clinically insane? (", "Sorta) Were the Bears the greatest defense of all-time? (", "Yes)\n\nNow, as I sit here ramming myriad sharp objects into my eyeballs, I ponder all the things that went so terribly wrong with Super Bowl LIII. ", "Sure, 97% of America is sick and tired of Tom Brady's perfectness and Bill Belichick's lumpy sweatshirt. ", "But this is so much more than the mere dry-mouthed fatigue of a hackneyed storyline.", "\n\nNo, this is the NFL failing to address the uncalled pass interference penalty from two weeks ago — one that would have almost certainly resulted in the far-superior New Orleans Saints (not the Rams) being in Atlanta.", "\n\nThis is the NFL trying to convince us (via advertisements featuring Martin Luther King Jr.'s speeches) that the whole Colin Kaepernick thing never happened; that — hey! — ", "we love when blacks speak out, just as long as it doesn't affect our image or our profits.", "\n\nThis is the NFL bringing forth the lamest halftime show in modern memory, in part because Adam Levine of Maroon 5 felt empowered to (ew) remove his shirt, and in part because so many musicians made clear by their absence that they would no longer support the league's entertainment efforts.", "\n\nThis is also the league's hype machine coming home to roost. ", "Back in the day, the Super Bowl lead-up meant two hours of pregame analysis. ", "Nowadays, though, it's an endless barrage of questions, comments, podcasts, Tweets, shows, more shows, more shows, more shows.", "\n\nIt's one prediction after another; one talking head after another after another. ", "Who will win? ", "What will the score be? ", "Is Tom Brady near the end? ", "Is Todd Gurley better than Freeman McNeil? ", "Will this be a great Super Bowl, a double great Super Bowl or the greatest Super Bowl since the last great Super Bowl?", "\n\nUltimately, what we're left with are two football teams playing a game.", "\n\nA game that stunk.", "\n\nThis commentary has been updated to include the writer's affiliations, appearing in the Editor's Note." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.1130768358707428, 0.1023583635687828, 0.0018287957645952702, 0.06172836944460869, 0.0008747114916332066, 0.001027325284667313, 0.5635999441146851, 0.01995883136987686, 0.03314615786075592, 0.01011236198246479, 0.0006690756417810917, 0.000986664555966854, 0.0005662296316586435, 0.0010258059483021498, 0.0012315982021391392, 0.14195354282855988, 0.0005502236308529973, 0.0006937276921235025, 0.02197817899286747, 0.0009043898317031562, 0.000609207374509424, 0.0006744951824657619, 0.0441456213593483, 0.0037273454945534468, 0.003851367859169841, 0.0009768565651029348, 0.000751327839680016, 0.0007707704207859933, 0.001041179639287293, 0.01785278506577015, 0.0014985022135078907, 0.0011426927521824837, 0.09077469259500504, 0.0007940956274978817, 0.0008257435983978212, 0.0007853445131331682, 0.13198648393154144, 0.0009375007939524949, 0.004292724188417196, 0.0006195614114403725, 0.0010940904030576348, 0.0016816469142213464, 0.0018077940912917256, 0.0009777788072824478, 0.0008654188131913543, 0.0008246573270298541, 0.0008971179486252367, 0.0007457066676579416, 0.026088139042258263, 0.0005430412129499018 ]
0.028437
50
[ "Knob Creek\n\nPROJECT DETAILS\n\nBACKGROUND\nKnob Creek was in need of an engaging display that promoted their private barrel program with distributors in the field that tied into the look and feel of their distillery.", "\n\nEXECUTION\nAMD delivered a display that not only met the immediate need for their promotional program but addressed the brands need for retaining the foot print with updated messaging after the promotional run was over. ", "The lifespan of the display was drastically increased by including the post-promo signage with the initial display.", "\n\nRESULTS\nKnob Creek’s expectations were exceeded by the design, strength and functionality of the display as well as the longevity if provides. ", "This has been a re-order program for them and will be in 800 distributor stores supporting this promotion and eventually converting to support traditional Knob Creek product." ]
{ "pile_set_name": "Pile-CC" }
[ 0.000540758715942502, 0.0005556406686082482, 0.0005713910795748234, 0.0005443405825644732, 0.0006433173548430204 ]
0.000571
5

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
0
Add dataset card