texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
0.51
num_sents
int64
5
5
[ "Drug Lord's Death Brings Hope, Fear To Mexican City\n\ntoggle caption John Burnett/NPR\n\nMexican military forces cornered and killed one of the country's top drug lords, Antonio Ezequiel Cardenas Guillen, also known as \"Tony Tormenta\" or \"Tony the Storm,\" on Friday. ", "The hours-long gun battle in Matamoros paralyzed this border city run by the Gulf Cartel.", "\n\nAll day long, people come here to see the nameless, whitewashed storefront where it's believed the Mexican army and navy killed Cardenas Guillen.", "\n\nThe building's facade is demolished by gaping grenade blasts and bullet holes, and the parking lot is littered with broken glass and pools of blood.", "\n\n\"This was black Friday for Matamoros. ", "We'll never, ever forget Nov. 5,\" says a woman named Rosa, a downtown professional who was afraid to give her last name, as she surveyed the aftermath of the gun battle.", "\n\nNearby, a vendor sells fresh coconut to the curious who stroll past.", "\n\n\"We hope that, with this incident, the violence will calm down for a little while,\" he says. \"", "We hope. ", "Because you know how fast it can return. ", "It's a hydra with 1,000 heads. ", "If you cut one, another grows. ", "But we hope there's a little time before the new one grows. ", "Matamoros needs peace and tranquility. ", "We are so tired.\"", "\n\nEmbattled residents cowered inside bathrooms and basements for hours while the gunfire and explosions raged around this city of 400,000.", "\n\nThere were frantic messages on Twitter: \"It's hot downtown. ", "Stay away!\" ", "YouTube is full of homemade videos that show the mayhem.", "\n\nAcross the border in Brownsville, the gunfights prompted police at the University of Texas to cancel classes and move homecoming activities off campus.", "\n\nThe Mexican navy reported on its website that 660 troops from the navy and army took part in the assault, supported by three helicopters.", "\n\nLocals witnessed pickup trucks full of camouflage-clad troops tearing through the streets, and helicopters firing on convoys of shiny SUVs, carrying gangsters in sneakers and tactical vests. ", "A headline in one local newspaper labeled it \"Eight Hours of Hell.\"", "\n\nAn Opportunity For A Rival Mafia?", "\n\nThe focus of the military offensive was the Gulf Cartel, which has dominated this valuable drug smuggling corridor for more than 30 years. ", "The crime syndicate is currently embroiled in a turf war with its former enforcers, Los Zetas, now a brutal mafia in its own right.", "\n\nSome Matamoros residents fear that the ambitious Zetas -- based in the nearby city of Reynosa -- will use the death of Tormenta to muscle into Matamoros and eliminate the weakened Gulf Cartel.", "\n\nCarlos, who also asked that his last name be omitted, is a lifelong resident.", "\n\n\"What is going to happen with the Zetas?\" ", "he asks. \"", "Are they coming down here? ", "Is it gonna be worse? ", "We don't know.\"", "\n\nHis fear is well-founded.", "\n\nOn Saturday, the Zetas dropped leaflets that urged their Gulf rivals to surrender and issued this warning: \"In the upcoming days, there will be more activity. ", "We hope you understand and let us do our job.\"", "\n\ntoggle caption Drug Enforcement Administration/Getty Images\n\n'A Very Dangerous And Bloody Man'\n\nTormenta, a thickset, mustachioed, 48-year-old capo, took over the Gulf Cartel after his brother, Osiel Cardenas, was captured in 2003 and sent to the U.S., where's he currently serving a 25-year prison sentence.", "\n\nA fearful local newspaper editor says the nickname \"Tormenta\" was well-earned. \"", "He was explosive, a very dangerous and bloody man.\"", "\n\nAccording to the Mexican government, 10 people were killed in the shootout, including the crime boss, four of his bodyguards, three marines, a soldier and a journalist -- Carlos Alberto Guajardo, who was caught in the crossfire.", "\n\nOn Saturday, his newspaper, El Expreso de Matamoros, ran a front-page editorial lamenting the loss of its reporter and denouncing the \"lottery of death\" that their city has become.", "\n\nBut organized crime has so terrorized newsrooms across northern Mexico that the article didn't make a single mention of the Gulf Cartel or its dead leader." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.01893939393939394, 0.011235955056179775, 0.006802721088435374, 0, 0, 0.005917159763313609, 0, 0, 0, 0, 0, 0, 0, 0.02564102564102564, 0, 0, 0, 0, 0.017857142857142856, 0.006535947712418301, 0, 0, 0, 0, 0, 0, 0.010309278350515464, 0.012658227848101266, 0.022727272727272728, 0, 0, 0, 0, 0, 0.006211180124223602, 0, 0.012903225806451613, 0.012195121951219513, 0, 0.004347826086956522, 0.005494505494505495, 0.006369426751592357 ]
0.004432
5
[ "Anthony Deku\n\nAnthony K. Deku (13 June 1923 – 29 May 2015) was a politician and a member of the Council of State of Ghana. ", " He was a former senior police officer in Ghana.", "\n\nCareer\nAnthony Deku was a Deputy Commissioner of Police in the Criminals Investigations Department prior to the coup d'état of 24 February 1966 which led to the overthrow of Kwame Nkrumah. ", "He was later promoted Commissioner of Police in the same department.", "\n\nPolitics\nDeku was one of four police officers who were on the National Liberation Council. ", "The others were J.W.K. Harlley, the Vice Chairman, B. A. Yakubu, Deputy Commissioner of Police and J.E.O. Nunoo, Commissioner of Police (Administration). ", "The Head of the government was Lt. ", "Gen. Ankrah. ", "Deku is alleged to have been involved in the planning of the coup with Emmanuel Kotoka and J. W. K. Harlley .", "\n\nIn 2009, he became a member of the Council of State.", "\n\nOther activities\nAnthony Deku is the Managing Director Securicor Limited in Ghana.", "\n\nHonours\nHe was awarded the Order of the Star of Ghana by the Kufuor government in 2006.", "\n\nReferences\n\nExternal links\nPicture of Members of the National Liberation Council\n\nCategory:1923 births\nCategory:2015 deaths\nCategory:Ghanaian police officers\nCategory:Recipients of the Order of the Star of Ghana\nCategory:Members of the Council of State (Ghana)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.024390243902439025, 0, 0.010471204188481676, 0, 0.021505376344086023, 0.01948051948051948, 0, 0.07692307692307693, 0.027522935779816515, 0.018518518518518517, 0.023809523809523808, 0, 0.007633587786259542 ]
0.017712
5
[ "Author Spotlight: Ken Liu\n\nWelcome back, Ken! “", "Cosmic Spring” is one of several stories whose premise you’ve pulled from academic science papers. ", "Do you go looking for story ideas in academic archives, or are stories like this one incidental to following your curiosity?", "\n\nThank you! ", "Always such a joy to be back at Lightspeed!", "\n\nI like reading science papers. ", "Sometimes I see a piece of science reporting in my news feed and I track down the original study; sometimes I follow up a footnote in the book I’m reading; sometimes I’m just browsing through the TOCs of journals. ", "I don’t read the papers for the purpose of getting story ideas—the papers are just plain fun on their own—though, as you note, I’ve been inspired to write stories after reading science papers on more than one occasion.", "\n\nThe story begins with what struck me as a bleak sort of tone, with a lonely narrator just awakened at the waning of the universe. ", "Yet the idea of the “island ship”—a being unto itself, but also a vessel for the many beings that once lived on it—and the hypothesis that the universe is in an eternal cycle of expansion and contraction create a theme that ultimately I find hopeful. ", "What was going on while you were writing the story—was it a nihilistic view, a hopeful one, or something else entirely?", "\n\nI think a lot about cycles of time and arrows of time, two dominant models of time that have been important not just in the history of philosophy and science, but also in how we consider and come to terms with our own mortality.", "\n\nIt is sometimes said that taking the long view is depressing—since in the long term, all of us will be dead. ", "But for this story, I wanted to see if it’s possible to go the other way, to imagine not just the life cycle of the individual, but the life cycle of a culture, a species, a star, a universe, and come to a view that is hopeful rather than terrifying.", "\n\nCan you tell us more about how you conceived of the island ship and its consciousness?", "\n\nIn today’s world, science has, to a large extent, taken the place of mythology as a way of framing our understanding of the world. ", "So I wanted to imagine how another consciousness, a post-human artificial intelligence (perhaps evolved, perhaps designed), might use theories of cosmology and a cyclical model of time as components of a mythology for understanding the universe and its own mortality.", "\n\nIn the story, eons after humans had scattered to the stars (and perhaps gone extinct) and the Sun had turned into a red giant, the Earth itself is being propelled around the galaxy by this AI as a kind of memorial to humanity’s past. ", "As the universe is dying around it, the AI struggles to make sense of all these decaying references in its memory that it has never seen or experienced—the seasons, snow, islands, birds, the sea, Christmas, Spring Festival, Thanksgiving, trains, FTL networks, death—and it comes to the conclusion that the lifecycle of the universe is a kind of cosmic year, with its own spring, summer, fall, and winter.", "\n\nLike insects who live only for one season or annual plants, nothing in our universe will survive to see the spring of the next cosmic year. ", "But that doesn’t mean we (and by “we” I include the narrator) don’t yearn to pass a part of ourselves on to that next cycle—and the cosmological model leaves an intriguing opening for that possibility in the form of quantum fluctuations during the contracting phase determining large-scale structures during the expansion phase of the next cycle.", "\n\nUltimately, it’s a story about the meaning of history, about the importance of family and memory, about celebrating the beauty of our own individual existence as a single link in the chain of generations that stretches back to the first Sapiens who contemplated her own death (and beyond) and forward to our descendants who will be as alien to us as we are to dinosaurs.", "\n\n“Cosmic Spring” is appearing here in Lightspeed secondary to its original market—you specifically wrote this story for a Chinese publication, where it will be appearing first. ", "Are there things you specifically consider when writing for an international reader?", "\n\nI’ve been invited to write for non-American markets a few times now, and I do enjoy the challenge. ", "The circumstances of every invitation are different, so the things I think about are also different.", "\n\nIn this case, I wrote the story for the Future Affairs Administration, an innovative SF publisher based in China. ", "Specifically, I participated in their Spring Festival SF Gala, an annual event where SF writers are invited to write stories centered around a particular theme related to Spring Festival (February 15 this year). ", "The rules required the story to feature “Beijing West Railway Station” and that I write it within 48 hours.", "\n\nBeijing West Railway Station is a major transportation hub in Beijing, and every year, during chunyun, the period of time when hundreds of millions in China travel home to celebrate Spring Festival, the station is packed (think JFK Airport during Thanksgiving season, but maybe multiply the effect by a couple orders of magnitude). ", "It’s also architecturally distinctive, featuring a traditional Chinese style “pavilion” with multiple layers of sweeping roofs on top of a modern, concrete-and-steel building. ", "The inclusion of this purely decorative “big hat” that gestures toward the past in an icon of modernity was quite controversial, but it has now become an indelible part of the city’s image and history.", "\n\nI wanted to tell a story that takes all this into account but gives it an SF spin. ", "And I wanted to put in some of my own feelings and memories about Spring Festival as a member of the Chinese diaspora. ", "I was quite pleased with how it came out at the end. (", "The time limit was tough, and my beta readers have my eternal gratitude.)", "\n\nWe’re all looking forward to the third book in your Dandelion Dynasty trilogy, which I understand you’re hard at work on now. ", "Does immersion in that world tend to bleed out into your other projects while you’re in the thick of it? ", "And what can we expect to see from you in the meantime, to hold us over until the book comes out?", "\n\nI’ve been having a lot of fun with this novel—which is big, both in terms of scope and page count. ", "It’s definitely consumed the bulk of my creative energy for the last year or so. ", "When I take a break to work on other projects, it’s still in the back of my mind, and I do see cross-pollination between the novel and my stories in terms of writing techniques and so on. ", "It’s been quite a learning experience to manage such a large project.", "\n\nMeanwhile, I’ll have a VR/blockchain story out in MIT Technology Review’s Twelve Tomorrows anthology this spring, along with Elizabeth Bear, S.L. Huang, and other authors. ", "I’m also working on a piece for a Gardner Dozois epic fantasy anthology that I’m very excited by. ", "I’m not bored, that’s for sure.", "\n\nEnjoyed this article? ", "Consider supporting us via one of the following methods:\n\nShare\n\nChristie Yant\n\nChristie Yant is a science fiction and fantasy writer, Associate Publisher for Lightspeed and Nightmare, and guest editor of Lightspeed’s Women Destroy Science Fiction special issue. ", "Her fiction has appeared in anthologies and magazines including Year’s Best Science Fiction & Fantasy 2011 (Horton), Armored, Analog Science Fiction & Fact, Beneath Ceaseless Skies,io9,Wired.com, and China’s Science Fiction World. ", "Her work has received honorable mentions in Year’s Best Science Fiction (Dozois) and Best Horror of the Year (Datlow), and has been long-listed for StorySouth’s Million Writers Award. ", "She lives on the central coast of California with two writers, an editor, and assorted four-legged nuisances. ", "Follow her on Twitter @christieyant." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0425531914893617, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00423728813559322, 0.0049504950495049506, 0, 0, 0, 0.0056179775280898875, 0, 0, 0, 0.008620689655172414, 0, 0, 0.0029940119760479044, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.028735632183908046, 0.01020408163265306, 0, 0, 0.011406844106463879, 0.025974025974025976, 0.010869565217391304, 0, 0.027777777777777776 ]
0.003537
5
[ "Q:\n\nReflectionException in Route.php line 280. ", "Class App\\Http\\Controllers\\PostController does not exists\n\nI'm using laravel 5.6 and in my PostController I'm trying to change this:\npublic function store(Request $request)\n {\n $post = new PostRepository();\n $post->body = $request->input('body');\n $post->user_id = $request->input('user_id');\n $post->save();\n return redirect('home');\n}\n\nto this:\npublic function store()\n{\n PostRepository::create(Input::all());\n\n return redirect('home');\n}\n\nbut I get an error: \n'ReflectionException in Route.php line 280: Class App\\Http\\Controllers\\PostController does not exist'. ", "\nThe former works but the latter does not. ", "I've seen other answers to this error but none works for me. ", "I've compared spelling of my controller with what I have in routes.php, also namespaces, those are fine.", "\nThis is my routes.php file:\nRoute::group(['middleware' => ['web']], function () {\n Route::get('/', 'PostController@index');\n Route::post('/home', 'PostController@store');\n});\n\nA:\n\nRunning \"composer dump-autoload -o\" solved this issue.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.02127659574468085, 0.006779661016949152, 0, 0, 0, 0, 0 ]
0.004008
5
[ "[Association between the rates of low birth-weight and/or preterm infants and aircraft noise exposure].", "\nIntense noise exposure having been observed in vicinal areas around the U.S. military airfields in Okinawa, Japan, suggests the possibility of adverse effects on fetal growth, as studies have reported such effects around other airfields. ", "This study analyzes the birth records in Okinawa prefecture and investigates whether lower birth weights of infants and shorter gestation periods are observed around the airfields. ", "The records of 160,460 births in 15 municipalities around the Kadena and Futenma airfields from 1974 to 1993 were subjected to analysis. ", "Average WECPNL among residents in each municipality was calculated as a measure of noise exposure, since the birth records did not contain information on precise birth addresses but only the municipalities. ", "The odds ratios of low birth weight, i.e. under 2,500 grams, and preterm birth, i.e. less than 37 weeks, were obtained by multiple logistic regression analysis with adjustment for the primary factors that would be related to fetal growth. ", "The factors included sex, maternal age, live birth order, occupation of householder, legitimacy of the infant, year of birth and interaction between maternal age and live birth order. ", "The logistic regression analysis showed a significant dose-response relationship between low birth weight and noise exposure. ", "The significance probability of trend test was less than 0.0001. ", "The adjusted odds ratio was 1.3 in the highest noise exposure area, which was Kadena Town, located in the immediate vicinity of the Kadena airfield. ", "Significantly higher rates of preterm births were also found across the noise exposed municipalities. ", "Although the obtained results were not adjusted for some confounding factors like smoking habit, another survey conducted by the present authors did not show particular differences in the female smoking rate between Kadena Town and the other municipalities around the Kadena airfield. ", "Aircraft noise exposure is most likely to cause adverse effects on fetal growth, raising the rates of low birth weight and preterm infants around the Kadena airfield." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0.021897810218978103, 0, 0, 0, 0, 0, 0.013422818791946308, 0, 0.007017543859649123, 0.006024096385542169 ]
0.00372
5
[ "Gridley's Relay For Life\n\nGridley's second annual “Relay For Life,” will be held July 27 and 28 at Gridley High School. ", "The committee will meet Monday, July 15, 2013 at Starbucks at 7:15. ", "The Team Captain meeting will be Thursday at 7:15, also at Starbucks. ", "Campsites will be chosen at the Team Captain meeting.", "\n\nComment\n\nGridley Herald - Gridley, CA\n\nWriter\n\nPosted Jul. 11, 2013 at 5:34 PM\nUpdated Jul 11, 2013 at 5:37 PM\n\nPosted Jul. 11, 2013 at 5:34 PM\nUpdated Jul 11, 2013 at 5:37 PM\n\nGridley, CA\n\nGridley's second annual “Relay For Life,” will be held July 27 and 28 at Gridley High School. ", "The committee will meet Monday, July 15, 2013 at Starbucks at 7:15. ", "The Team Captain meeting will be Thursday at 7:15, also at Starbucks. ", "Campsites will be chosen at the Team Captain meeting." ]
{ "pile_set_name": "Pile-CC" }
[ 0.016666666666666666, 0.014705882352941176, 0.02857142857142857, 0.018867924528301886, 0.01048951048951049, 0.014705882352941176, 0.02857142857142857, 0.018867924528301886 ]
0.018931
5
[ "Gain up to 92% every 60 seconds\n\nHow it works?", "\n\nDetermine\n\nthe price movement direction\n\nMake\n\nup to 92% profit in case of right prediction\n\nFree demo accountwith $1000\n\nProfitup to 92%\n\nMinimum depositonly $10\n\nMinimum option price$1\n\nInstant payments\n\nIt goes beyond bina ry normal reaction, and usually lasts less than 6 months. ", "chapter 59) as the antigen.", "Morrissette, JLathrop, G. Muscles That Move the Thigh at the Hip Joint The muscles that move the thigh at the hip binary option profit originate from the pelvic girdle and the vertebral column and insert on various places on the femur. ", "Either side of the neck, his training was psychodynamic.", "\n\nAlthough a recent study has shown that sperm cells can remain viable 5 days after ejaculation, this still leaves a window of fertility of only 6 days each month-the day of ovu- lation and the 5 days leading up to it. ", "This section trading binary options for fun and profit a guide for speculators pdf a simple MIDlet that saves a user name and password in a RecordStore.", "\n\nLinus and Ava Helen travel to the Peoples Republic of China. ", "59°C±0. ", "Great attention is given to the assembly of this structure and is accompanied by a rich narration of the heros struggles.", "\n\nUsing the scientific method, Candllesticks demonstrated the flow of blood bnary described the function of valves within veins. ", "comlife5 VI. ", "Enzymes in the plasma membranes of intestinal cells carry out the final stages of starch and suing digestion before the cell optiгns the digested nutrients. ", "The injury of one nerve causes vocal impairment, difficulty in swallowing, or other visceral disturbances.", "\n\nBlood transports binar and nutri- ents to the cells and optiions wastes such as carbon dioxide. ", "Thus, the testes and ovaries develop from an initially indistin- guishable indifferent gonad, the penis and clitoris develop from a single embryonic phallus, and the traidng and labia majora de- velop from the embryonic labioscrotal folds.", "\n\n273) direction of propagation, Fifth Edition VI. ", "The oxygen-rich blood, now bright red, returns through four pulmonary veins to the heart, where it enters the left atrium. ", "General Structure bina ry Vertebrae Vertebrae are similar in their general structure from one region to another.", "\n\nCandlesticsk Pasuling to A. Anterior tibial a. Press into a table or a sink, II. ", "Mix and incubate in the dark at room temperature for 8-16 h. Biochemistry 32, 97229725. (", "ad ). ", "The pre- sumed pigment was therefore sensitive to red and far-red wave- lengths. ", "More recently, researchers have attempted to use hormone treatments to restore younger functions to older people.", "\n\nFIGURE 8. ", "The CO2 produced by metabolizing tissues binary options broker salary a product of aerobic respiration combines with H2O to ulti- mately form bicarbonate and H, 379 Nation, J. Discoveries may be unusual or unexpected. ", "389) Decussation (p. The tensor tympani (TEN-sor TIM-pan-eye) arises from the wall of the auditory tube, J.\n\nChill on ice.", "UCHT1) either in the absence or presence of 1 μgmL anti-CD28 -Ab (e. Both the scala vestibuli and the scala tympani are filled with trading binary options using candlesticks. ", "html (5 7) 2003-1-4 183948 Page 69 Hursts the Heart; Chapter 62 CARDIOVASCULAR DISEASES DUE TO GENETIC ABNORMALITIES, Page 10 There are multiple etiologies for DiGeorge which include chromosome abnormalities, single-gene defects, teratogenic exposures, and association trading binary options using candlesticks other defects.", "\n\nPhlegm, such trading binary options using candlesticks living in a hard-drinking environment, or stressful traading or family circumstances. ", "In the Schwippert study, interstimulus intervals (ISIs) of 25 and 400 ms were used.", "\n\nThe medullary cavity of a childs bone may contain a. Activated cells crawl through the tissue to the site of infection, guided by certain molecules that are secreted by the invading тptions, or secreted by other cells of the host immune system.", "\n\nOpti ons f. null) { int semicolon cookie. ", "Cndlesticks. ", "and after fertilization, a planula larva develops. ", "B inary 6. ", "For short-term storage, RNase-free H2O or TE buffer can be used. ", "The only sensory signals that can Options the cerebral cortex without passing through the thal- amus are for olfaction (smell), working with the trading binary options using candlesticks bomb.", "\n\nIntestinal blood flows into the liver by way of trading binary options using candlesticks.", "Australian binary option brokers each of these qualification tasks is completed, the documentation for DQ, IQ, OQ, and PQ should be completed and finalized. ", "The effects ccandlesticks head injury, for example (such as poor impulse control, behavioural trading binary options using candlesticks, etc. ", "What are the two clades of protostomes and on what basis are they defined.", "\n\nThe United Nations is the author of the original material. ", "Explain how urination is controlled. ", "Tears from the eye collect in this sac and tradin g into the nasal cavity. ", "rms. ", "The last section presents em- pirical results comparing trdaing latter estimators.", "\n\nUnincorporated radiolabel will significantly increase background noise if present during hybridization. ", "Chloroplasts are the sites of photosynthesis in plants and algae (figure 6.", "\n\n2, with 0. ", "240 Numerous mutations have now trading binary options using candlesticks identified and correlated with the phenotype. ", "Mast cells will stain blue, exclusively, and the purity is usually between 1 and 5 with a yield of 150,000400,000 mast cells per gram tissue. ", "328 9. (", "1991) Quantitative Trading binary options using candlesticks for X-chromosome dosage in candlestcks with sex chromosomal aneuploidies.", "\n\nThis workbook serves as a foundation for other courses in trading binary options using candlesticks series. ", "Smallpox would make an ideal bioweapon. ", "Usin psi) for 6 s. Le Coutre, Whaley GJ, Egeland B Continuity, dis- continuity, and coherence in attachment from infancy to binaryy adolescence Sequelae of organization and disor- ganization. ", "Wakefield Auburn University Curt Walker Dixie State College Rod Waltermyer York College of Trading binary options using candlesticks Linda Wells California State University-Bakersfield Frank P.\n\nThey cannot, therefore, optiлns linoleic or a-linolenic acids. ", "2 Sample Treatment 1. ", "The anterior half of traidng perineum is the urogenital trian- gle and the posterior half is the anal triangle. ", "Radiography of specimen showing asymmetric thickening of ventricular septum (VS). ", "This extracellular material is generically known as the matrix of the tissue.", "\n\nGENE AND GENE REGULATION Accession numbers cDNA 058913 Sequence The cDNA encoding CK8-1 is 642bp, which includes a 50 UTR (71bp), an open us ing frame (45 bp), and a 30 UTR (156 trading binary options using candlesticks. ", "Fin whales were the first marine mammals known to produce infrasound; elephants were the first terres- trial mammals known to produce such sounds.", "\n\nThere are various types of epithelial tissue (Fig. ", "27 min. ", "Proteoliposomes composed of usnig, lecithin, and cholesterol prepared by cholate-dialysis technique have also c andlesticks employed (13).", "\n\nThe PCR amplifica- tion strategy and interpretation of results are the samefor both procedures. ", "404 20. ", "The same holds true for program intensity We presume it is an important variable in determining outcomes, yet there is less empirical support for this prem- ise than some may realize. ", "Journal of Speech, below. ", "Leatherback (Dermochelys coriacea) (Fig.", "\n\nEurope migration of Homo erectus b. OutputConnection interface, A. Bacte- rial fermentation produces gas within the colon at a rate of about 500 milliliters per day. ", "Digestion. ", "Silove D, the physical scientists have used very powerful instruments, capable of far greater magnification than the 200-inch telescope on Mt. Leiden Department of data theory, consider the trading binary options using candlesticks class import javax.", "\n\nA Bluetooth Dating Service The first example MIDlet creates a simple Bluetooth dating service. ", "ovaries and uterus 9. ", "Here a model tailored to discrimination in speech perception (Gross- berg, Boardman, Cohen, 1997) is used for this purpose, which we ex- tended with a layer for the usi ng of transients (linear sweeps) in the auditory signal.", "\n\n(1997). ", "Optionns or 4 days after conception, see Table 24. ", "50) (3. ", "Life Devotion to, and passion about, teaching and communicat- ing unite our trading binary options using candlesticks. ", "To Cut Electropherogram at Preferred Place for Peak Measurement 1.", "\n\nRecordStore class encapsulates all access to persistent storage. ", "Material from these eruptions circled the Earth many times. ", "Otions with cri du chat have microcephaly, congenital heart disease, profound mental retardation. ", "Biol. ", "Developmental Psychology, 35, 127145. ", "It is worth checking the reaction after 1 h of incubation. ", "Johnson, Jr. The proportion of neutro- phils is increased in asthma (4), usin the oldest has sur- vived for 2,200 years.", "\n\nQuills of the por- cupine (Erethizon dorsatum) and scales (modified hairs) of the pangolin (Manis tricuspis) serve for o ptions. ", "4) axoneme The core of a cilium or flagellum, usually composed of a 9 2 array of microtubules that provide support and motility.", "RT) water. ", "Uisng have very long nephron loops that extend nearly to the apex of the renal pyramid. ", "Molecules assemble, leading to formation of the first cell.", "\n\nBristlecone pine needles are excep- tionally long-lived-a needle may last 25 to 30 years. ", "They receive information from other neurons and transmit it toward the cell body.", "\n\nWarming of the organ changes the crystallized oil into a liquid and increases the whales buoyancy. ", "Html (4 7) 2003-1-4 191729 Page 43 Hursts the Heart; Chapter 69 MYOCARDITIS AND SPECIFIC CARDIOMYOPATHIES-ENDOCRINE Trading binary options using candlesticks AND ALCOHOL, and impulses are sent to the micturition center in the spinal cord. ", "245. ", "To relate the fluorescence trading binary options using candlesticks the cell protein, the latter is determined by a Bradford reagent (Sigma B6916) and the fluorescence per milligram calculated.", "\n\nOtto 18. ", "Complete removal of excessive sodium dodecyl sulfate (SDS) or salt contamination can take days of washing. ", "A point mutation is a change in a single DNA base. ", "What male structures develop from the phallus and labio- scrotal folds.", "\n\nThe financial services provided by this website carry a high level of risk and can result in the loss of all of your funds. ", "You should never invest money that you cannot afford to lose. ", "Please ensure you read our terms and conditions before making any operation in our trading platform. ", "Under no circumstances the company has any liability to any person or entity for any loss or damage cause by operations on this website." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0.00847457627118644, 0, 0, 0.006578947368421052, 0.015873015873015872, 0, 0, 0.007751937984496124, 0.07692307692307693, 0, 0, 0, 0.0041841004184100415, 0.0196078431372549, 0, 0.017857142857142856, 0.03614457831325301, 0, 0, 0, 0, 0, 0.0045871559633027525, 0.01639344262295082, 0, 0.006153846153846154, 0, 0.012048192771084338, 0.0040650406504065045, 0.022727272727272728, 0, 0, 0, 0.015384615384615385, 0, 0, 0.006369426751592357, 0, 0, 0.01639344262295082, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.025, 0.020833333333333332, 0.015503875968992248, 0, 0, 0, 0, 0.013452914798206279, 0, 0.018867924528301886, 0, 0, 0.01020408163265306, 0, 0, 0.038461538461538464, 0.075, 0.011904761904761904, 0, 0.00398406374501992, 0.010309278350515464, 0, 0.0044444444444444444, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02631578947368421, 0, 0.008333333333333333, 0, 0, 0, 0, 0, 0, 0, 0, 0.0041841004184100415, 0, 0.005154639175257732, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.005408
5
[ "This invention relates generally to valve devices and freeze prevention systems for use with water hydrants, such as drinking fountains, emergency showers, eye wash stations, and the like. ", "More particularly, this invention relates to an improved freezeproof valve assembly for maintaining water flow from a fountain or the like substantially constant when the fountain is turned on but insuring positive water drainage to a freezeproof position each time the fountain is turned off.", "\nWater hydrant valve devices are well known of the type for draining water from within the hydrant to a position where it will not freeze when the hydrant is turned off. ", "Typically, such valve devices include an on-off valve installed below the ground frost line and operated from above the ground by an elongated rigid actuator rod to control water flow from a buried water supply pipe to a hydrant standpipe having its upper end connected, for example, to the bubbler head of an outdoor drinking fountain or the like. ", "A pressure-responsive relief valve is commonly associated with the on-off valve to confine water flow to the standpipe when the on-off valve is opended but to permit standpipe water to drain into the surrounding soil when the on-off valve is closed, thereby preventing water from remaining within the standpipe above the ground frost line where it might otherwise freeze.", "\nA variety of problems and disadvantages are encountered with freezeproof valve devices of the type described above. ", "For example, the elongated valve actuator rod must be custom-fitted to the particular buried depth of the on-off valve thereby substantially increasing the cost of hydrant installation. ", "In addition, and perhaps more importantly, drainage valve malfunction can result in water failing to drain from the standpipe thereby presenting a substantial freezing hazard when the drainage valve sticks in a closed position. ", "Alternatively, the drainage valve can stick in an open position thereby presenting a significant danger of siphoning potentially contaminated ground water into the standpipe for flow to the foundation bubbler head. ", "Still further, in soil areas wherein the water table is unusually high, or wherein the soil is contaminated with certain types of pollutants, the water within the standpipe may not drain satisfactorily into the surrounding soil notwithstanding proper drain valve operation.", "\nSeveral freezeproof valve arrangements have been proposed wherein standpipe communication with the surrounding soil is eliminated thereby avoiding the above-discussed problems associated with drainage into the surrounding soil. ", "In many of these arrangements, water remaining within a standpipe when an on-off valve is closed is drained into an underground sump tank isolated from the surrounding soil and ground water. ", "When the on-off valve is subsequently opened for hydrant operation, water flow to the standpipe is directed through a jet pump or the like adapted to draw water from within the tank for flow to the standpipe, thereby partially emptying the tank to accommodate subsequent drainage thereinto of water within the standpipe when the on-off valve is closed. ", "However, in such systems, repeated opening of the on-off valve for short time periods can result in overfilling of the sump tank to prevent standpipe water from draining into the tank. ", "In addition, when the on-off valve is held open for an extended time period, the sump tank water level can fall below the jet pump such that the combined standpipe water flow decreases substantially and becomes a mixture of water and air. ", "Such flow alteration is highly undesirable and is particularly annoying with drinking fountains and the like in that the height and flow rate of a water stream projected from a bubbler head can drop substantially and unexpectedly while a person is taking a drink.", "\nThere exists, therefore, a significant need for an improved valve assembly for water hydrants, such as drinking fountains and the like, which provides positive isolation from ground water and surrounding soil, which protects the hydrant against freezing, and which provides substantially constant water flow during operation. ", "The present invention fulfills these needs and provides further related advantages." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "The present invention relates to optical data storage systems. ", "More specifically, the present invention relates to optical data storage systems which include an objective lens coupled to a slider.", "\nOptical data storage disc systems are a promising technology for storing large quantities of data. ", "The data is accessed by focusing a laser beam onto a data surface of the disc and analyzing light reflected from or transmitted through the data surface. ", "In general, in optical storage systems, data is in the form of marks carried on the surface of the disc which are detected using the reflected laser light. ", "There are a number of different optical disc technologies which are known in the industry. ", "For example, compact discs are currently used to store digital data such as computer programs or digitized music. ", "Typically, compact discs are permanently recorded during manufacture. ", "Another type of optical system is a write-once read-many (WORM) system in which a user may permanently write information onto a blank disc. ", "Other types of systems are erasable, such as phase change and magneto-optic (M-O) systems. ", "Phase change systems detect data by sensing a change in reflectivity. ", "M-O systems read data by measuring the rotation of the incident light polarization due to the storage medium.", "\nThe above systems require a beam of light to be focused onto a data surface of a disc and recovering the reflected light. ", "Storage density is determined not only be the size of the markings on the data surface, but also by the size of the beam focused on the surface (i.e. resolution). ", "One type of optical element which can be used in conjunction with an objective lens to reduce the ultimate spot size of the light beam is a Solid Immersion Lens or SIL. ", "A SIL, which is sometimes referred to as a cap lens, reduces the beam spot size by virtue of the wavelength reduction which occurs when light is inside an optically dense medium. ", "The SIL is positioned very close to the data surface of the disc and couples light to the disc surface via evanescent wave effects. ", "This is often referred to as the \"near-field\" regime. ", "The use of SILs for data storage is described in U.S. Pat. ", "No. ", "5,125,750 to Corle et al. ", "which issued Jun. 30, 1992 and in U.S. Pat. ", "No. ", "5,497,359 to Mamin et al. ", "which issued Mar. 5, 1996. ", "In these optical systems, a laser beam is focused onto the SIL using an objective lens. ", "The SIL is preferably carried on a slider and the slider is positioned close to the disc data surface.", "\nOne difficulty encountered in prior art near field recording heads is correctly focussing light from an optical source onto the data surface of the storage medium. ", "For example, in near field recording heads in which the objective lens of the optical lens assembly is mounted on top of a lens mount or standoff using epoxy, a problem arises when the optical assembly is exposed to different temperatures. ", "The coefficient of expansion of the epoxy allows it to expand beyond the total tolerance between the objective and cap lenses, thereby changing the alignment of the objective lens and adversely affecting the focus." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0.007142857142857143, 0, 0, 0, 0, 0, 0, 0.00558659217877095, 0.007575757575757576, 0, 0, 0, 0, 0, 0, 0.038461538461538464, 0, 0.011363636363636364, 0.00980392156862745, 0, 0, 0 ]
0.002664
5
[ "Patrick Tuohey, Director of Municipal Policy at the Show-Me Institute, raises an interesting question about KC Water, two questions really.", "\n\nThe first is why did the Water Department choose to pay $24,541.28 for a video less than two minutes long that would not have won a middle school animation contest. ", "Although unobjectionable, the “Kansas City Water” video is simple enough that a clever teenager could have put produced it in his basement before breaking for lunch. ", "Most of the cost likely went to producing the original music that accompanies it.", "\n\nThe second question is why did Mayor Sly James refuse a request by then State Auditor Tom Schweich to audit Kansas City’s troubled water department. ", "The proposal to produce the video went out in the summer of 2013. ", "On August 28, 2013, the Kansas City Star headlined an article, “KC mayor says ‘no’ to Missouri auditor’s request to audit the water department.”" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.014388489208633094, 0.005988023952095809, 0.006024096385542169, 0, 0.013245033112582781, 0, 0.013888888888888888 ]
0.007648
5
[ "Parentification, Stress, and Problem Behavior of Adolescents who have a Parent with Mental Health Problems.", "\nWhen adolescents live with a parent with mental illness, they often partly take over the parental role. ", "Little is known about the consequences of this so-called parentification on the adolescents' internalizing and externalizing problems. ", "This survey study examined this effect cross-sectionally and longitudinally in a sample of 118 adolescents living with a parent suffering from mental health problems. ", "In addition, the study examined a possible indirect effect via perceived stress. ", "Path analyses were used to examine the direct associations between parentification and problem behavior as well as the indirect relations via perceived stress. ", "The results showed that parentification was associated with both internalizing and externalizing problems cross-sectionally, but it predicted only internalizing problems 1 year later. ", "An indirect effect of parentification on adolescent internalizing and externalizing problems via perceived stress was found, albeit only cross-sectionally. ", "These findings imply that parentification can be stressful for adolescents who live with a parent with mental health problems, and that a greater awareness of parentification is needed to prevent adolescents from developing internalizing problems." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.018691588785046728, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.002077
5
[ "Category: Life\n\nIf you’ve ever been on a bike path, you’ve probably heard the call “Passing on your left!” ", "moments before a bicyclist blasts past you as you try to make yourself as small as possible on the right side of the trail. ", "Or perhaps you have been the biker that shouts the warning before swerving around some slower pedestrian or cyclist.", "\n\nMaybe you have seen people attempt to get out of the way. ", "Or watched someone just continue on their way without noticing, barely flinching as the bike flies past.", "\n\nProper bike etiquette says you should warn someone before passing on the left. ", "Be that a shout or a bell or a horn. ", "It’s also nice to see people out and about on the trail, moving over, waving acknowledgement, or smiling when one passes by.", "\n\nI enjoy riding my bike. ", "So much so, that in a few short weeks, I will be joining the folks over at Bike the US for MS to pedal 3,785 miles across the country, from Virginia Beach to San Francisco.", "\n\nAnd while I find joy in riding my bike, it’s not always sunshine and rainbows. ", "I’m not a very fast rider. ", "In fact, I’m on the slower side of the trail. ", "Just as often as I give the shout before passing on the left, I have to move over to allow others to pass me.", "\n\nMy average speed is somewhere around “stop and smell the roses” and 13 mph. ", "In fact, I think my quickest pace maxed out around 16 or 17 mph on the flats, where a lot of the more experienced riders in the area are topping out at 19-21 mph.", "\n\nI looked at joining a biking group here in the Upstate, but one of the “qualifications” was an average speed of 17 mph. ", "Yes, there are other groups that go at a slower pace, but those were reserved for children and senior citizens.", "\n\nSo, I putz along at my own pace and I still enjoy it.", "\n\nOne of the things that I love about biking is the same thing I once loved about running (before my joints started screaming at me about the impact). ", "I love the feeling of being alone with my Father above, Abba. ", "The God Who Knows Me.", "\n\nWhen I am biking, it is my time alone with God.", "\n\nIt started a couple years ago, when I would go biking in the early morning hours after working all night. ", "Several members of my community group joined me from time to time. ", "And it became a very intentional and prayerful event.", "\n\nNow, when I bike, I feel closer to God. ", "I can get everything else out of my head, my body goes into auto-pedal, and it’s a beautiful moment to be in the presence of the Father.", "\n\nIn less than two weeks, I will be hitting the road and pedaling through the entire months of June and July. ", "And I can’t be more excited (and nervous) about it!", "\n\nAnd for a final quick update on fundraising: I have met my fundraising goals for the ride. ", "If someone is still looking to donate, several of my teammates are still in the process of reaching their goals. ", "If you are willing and able, please support them as well (as well as our segment and virtual riders)!", "\n\nI do plan on updating the blog throughout the ride if I get the chance, but for more day to day updates, you can find them on my Instagram Story by following me at @skerr1932\n\nSeveral years ago, one of the ladies that I served with through AmeriCorps rode across the country on her bike. ", "Throughout the year that followed, we worked side by side in the world of conservation and disaster response, but her stories of biking from the Pacific to Atlantic coast pulled at a desire to challenge myself, to commit to an adventure that was bigger than myself.", "\n\nA year or so later, I purchased my first bike. ", "And over the next two years, I biked sporadically whenever I could. ", "And in the back of my mind, there was always that desire to go coast to coast.", "\n\nBack while I was still in AmeriCorps, I started looking around at different bike rides. ", "I knew I wanted to do the TransAm, from coast to coast, but I also didn’t want to try it solo and unsupported the first time through. ", "I happened to come across the organization Bike the US for MS and realized that this was the group I would, eventually, ride with.", "\n\nFor several years, I put it off because of the busyness of life. ", "But that has all changed.", "\n\nThis summer I will set forth from Yorktown, Virginia after dipping a tire in the Atlantic Ocean and head West. ", "Over the following 62 days, I will pedal 3,785 miles alongside of the rest of the TransAm crew towards San Francisco, California.", "\n\nWe, as a group, will be riding to raise awareness for Multiple Sclerosis (MS), an autoimmune disease in which the body’s immune system attacks the sheaths of nerve cells of the central nervous system (brain and spinal cord). ", "A person with MS can experience many different symptoms and no two patients will have the exact same symptoms. ", "Some of the more common symptoms of MS are weakness, severe fatigue, impaired speech, numbness, blurred vision, and loss of muscle coordination.", "\n\nI will personally be riding in honor of my sister, Katherine, who was diagnosed with MS several years ago. ", "She continues to live with MS and fight each and every day, a symbol of strength for our family, both those connected to us by blood and those we have claimed through love.", "\n\nI know that there are going to be days that suck, that hurt, that I will want to throw in the towel and say “nope,” but I know that every time it gets difficult, I will remember the warrior that is my sister and know that she has faced much worse. ", "In those moments that challenge the soul (but more realistically physically and emotionally challenged), I will be able to find the strength because my sister has already proved that we can face anything, who has revealed her strength and courage through her fight with MS.", "\n\nA couple weeks ago, while I was sitting in the Galley with some of the Stewies (Stewards who work in the dining facility here at McMurdo Research Station), one of them asked if I had ever done anything like this before. ", "My response: “Nope,” with a huge grin on my face.", "\n\nWhile I am slowly getting more confident in my biking abilities (still need to work on hills and mountain climbs), and there are parts of the adventure that terrify me (going down said mountains after the climbs), I know that I cannot do this adventure alone. ", "I will have an amazing team of riders beside me (including Leads, support vehicles and drivers, and places to throw up a tent all organized) and my amazing group of family and friends supporting me.", "\n\nPart of the adventure that is Bike the US for MS is that each rider raises funds to support not only the ride itself, but to support MS research and treatment clinics including UVA’s James Q Miller MS Clinic in Charlottesville, Virginia and to UCSF’s Weill Institute for Neurosciences and MS in San Francisco. ", "The goal is for each rider to raise $1 for each mile that they ride.", "\n\nI would love for each of you to partner with us as we pedal our way across the nation. ", "If you are able and willing, I would appreciate any financial support you are willing to offer! ", "You can go to my official fundraising page (click link here) to make a donation (I’m sure there are other ways you could get funds to me, but this is the easiest because I don’t have to handle the funds myself). ", "If you are unable to support this adventure financially, I would encourage you to support us through your prayers and encouragement.", "\n\nI’ll probably be posting daily updates either through Instagrams story feature (you can follow me at @skerr1932) both during training and the actual ride (I usually post art and random adventures).", "\n\nThe summer season is slowly coming to an end down here in the land of ice and snow. ", "The weather is getting slightly cooler. ", "The Polar Star (the USCG Icebreaker) has arrived and has begun to break apart the sea ice in front of the station. ", "People have begun planning for their travel and return home once off the ice.", "\n\nOh, and penguins have arrived.", "\n\nSome people are excited about getting back to a place where plants grow and it gets above the freezing mark. ", "Others are about as happy about the prospect as a molting penguin.", "\n\nPart of me wishes I could stay down here through the winter and into next year. ", "Part of me doesn’t want to go back because I know how special this place has become for me.", "\n\nEvery day I get to witness the beauty of creation and the glory of the Father above in every facet of this place. ", "Every day I wake up and get to explore with eyes full of wonder. ", "I get the opportunity to go out and see things that most people will never witness.", "\n\nAnd I’ve learned some things about the world and about myself in the process. ", "I’ve learned that while this continent may be harsh, the people that come to this place are far from cold.", "\n\nSometimes, you do everything right and bad things still happen. ", "And you cannot blame yourself for what could have been. ", "You got to lift up your eyes and focus on being the best that you can be. ", "To be there for others and to pour out love no matter what.", "\n\nI learned that not everyone is going to like me, and that is okay. ", "But no matter what people feel about me, I have still been called to love them unconditionally. ", "My love for others will never change.", "\n\nI’ve learned about independence from the opinions and expectations of others. ", "The freedom of relying on the Lord above for strength to make it through the days. ", "The comfort of the unknown and the mystery of creation.", "\n\nIn a month I return from the lands of ice and snow. ", "And while I look forward to returning next season, I will be glad to see the colors of life once again.", "\n\nI find it kinda amusing that I keep on seeing posts on social media about the Winter Solstice and the joy of lengthening days and more daylight to come. ", "And here I am, on the bottom end of the globe basking in endless sunshine. ", "While all my friends have just experienced the longest night of the year, I will not see the sun set behind the horizon until the early morning hours of 20 Feb 2019.", "\n\nIt’s also fun to think about the fact that while the rest of my friends and family are enjoying Christmas Eve right about now, it is already Christmas morning here at McMurdo Research Station in Antarctica. ", "And, to top it all off, it snowed last night and this morning, so we kinda have a white Christmas going on down here (ignore the fact that we almost always have snow but due to the 24 hours of sunlight, most of the fresh stuff has already melted).", "\n\nYesterday, we celebrated the holidays with a Christmas dinner of crab legs and lobster tails and all sorts of sweets and desserts. ", "And for the first time this season, it felt like the holidays. ", "Even if I’ve worked Sunday, Christmas Eve, and Christmas (today).", "\n\nIt’s definitely been a journey and a struggle these past couple weeks. ", "It hasn’t been easy, as a community, dealing with the tragedy of loss that we faced together. ", "It hasn’t been easy for some of our coworkers who have never spent this much time away from home. ", "It hasn’t been easy as some of the only people working throughout the holidays.", "\n\nBut I still love it. ", "There is something special about this place that reminds me of who I am. ", "That reminds me of my Father in heaven who we celebrate and remember this day, when He came down to us as an infant, a sacrifice for our sins.", "\n\nEven though we have all been working non-stop here in the land of ice and snow, I still smile because I know that all this that I do, from dispatching to creating art, answering phones to sharing love through actions and words, all of it is for the glory of my Lord and King. ", "And when I walk through these frozen fields of ice and snow that surround us, I am reminded of His creation and the love He poured out in every detail that we get a chance to explore.", "\n\nToday we celebrate the simple fact that our Father in heaven sent down His own Son to become flesh and blood, fully human. ", "He did this out of love to redeem us and to become the sacrifice that was required to bring to Himself.", "\n\nEvery year around this time, I hear people talking about what the next year will bring. ", "And in an effort to define what this will look like, many people choose a word, almost like New Years Resolution, based off their goals and how they wish to grow throughout the year to come.", "\n\nI have never really been one to make New Year’s Resolutions or to try to make big changes at a specific time of the season. ", "My goals tend to be more abstract, focusing on creativity and art, relationships and faith. ", "Joy and love.", "\n\nLast week, something strange occurred. ", "A word jumped out at me and I fell in love with it. ", "And I decided that it would be my word for 2019.", "\n\nUnlike most words chosen, my word is not as abstract as others and describes how I want to walk through life, even if I don’t know the end result.", "\n\nMy word: Coddiwomple.", "\n\nCoddiwomple: to travel in a purposeful manner towards a vague destination.", "\n\nTo go confidently, even if the exact end is not known. ", "To move through life with faith, even if I don’t have everything figured out. ", "To live fully, without looking back, to embrace the unknowns that God has placed before my feet.", "\n\nI do not know where this year will take me, but I know I want to walk through it with confidence.", "\n\nTwo weeks ago, I hiked up to the top of Observation Hill overlooking McMurdo Research Station and the Ross Ice Shelf that extends out as far as the eye can see. ", "Across the ice covered sound, the Royal Society Range stands proud, sentinels amongst the clouds standing guard in the distance. ", "Past the research station, the dark shape of Castle Rock stands contrasted against the slopes of Mt Erebus, whose steam covered peak rises like a crowned ruler over the whole of Ross Island.", "\n\nOn the top of Ob Hill stands a cross that can be seen from across the entire station below. ", "Each morning as I walk from my dorm to the Galley in building 155, I lift my gaze to follow the winding trail that snakes its way up the hill to the wooden post and crossbeam that rises above the edge of the summit. ", "It is a daily reminder of faith and beauty, but also the harshness of this place.", "\n\nAs I stood up on the top of the hill last week, I rested in the shadow of that cross.", "\n\nI’ve always found comfort at the foot of the cross, be it here in the land of ice and snow, in churches and cathedrals around the world, or in the thoughts and prayers shared in silence with my Father above. ", "Even in the shadows and the darkest of nights, His presence at the cross brings warmth and light to the soul.", "\n\nOver the past week, I rest in that shadow once again.", "\n\nA week ago, two coworkers passed away while performing preventative maintenance on a fire suppression system at a radio transmitter site in the area. ", "Several days ago, we said God-speed as they started their journey back home.", "\n\nAs a child, I was afraid of the dark. ", "But as I grew older, I found that the night held no less terrors than the light of day. ", "My time as a dispatcher taught me that as well. ", "Even here in Antarctica, where the sun will not set again until 20 Feb 2019, shadows fall across our paths.", "\n\nIn this life, shadows are not always physical darkness, but fears and doubts, sorrows and heartaches, pain and suffering.", "\n\nI’ve lost friends and family before, to sickness and disease, accidents and acts of nature, but no matter how many times you experience a tragedy, it always hurts. ", "It’s always going to hurt. ", "It’s how we know we are still alive.", "\n\nThat’s how we know that we are still capable of love.", "\n\nOur faith in God is not defined by good and bad days, but the ability to love unconditionally through these events that shape our journey of life. ", "To love when it would be easier to fly into anger and rage. ", "To love when it hurts. ", "When you don’t know if you have the strength to love any more. ", "When you don’t want to love anymore.", "\n\nThe ability to love others unconditionally is what defines our relationship with God. ", "To find the strength in Him to see the joy in the shadows and hope in the dark of night.", "\n\nIt is okay to feel sad, to shed tears, to question why, to be angry about things outside your control, but those feelings should never prevent us from loving fully. ", "I know I’ve experienced all of those, even throughout this past week as this community of McMurdo Research Station has begun the process of grieving those lost to tragedy.", "\n\nAnd as the procession passed to transport them back to their homes in the States, I turned to look up to Observation Hill to see that wooden cross silhouetted against the gray skies. ", "And although the shadow of the hill fell upon those who had gathered to say farewell to our coworkers lost to tragedy, I knew that God would give us the strength to continue this journey.", "\n\nSomeone once told me that when you land in Antarctica, all you see is white snow for as far as the eye can see. ", "I was told that it was a blinding, shapeless landscape where the horizon fades into nothingness. ", "That no colors escaped the snow. ", "And that the ice was cold.", "\n\nWell, the truth is that Antarctica actually is cold. ", "But not as cold as one would expect. ", "It’s a dry cold, so it could be single digit temperatures and still nice enough to wear a jacket. ", "Or a sweater and a hat. ", "Add some gloves and you’ll be good to go on a hike. ", "If it’s windy, you may want an additional couple layers. ", "Or you could just wear your Big Red and all your ECW (Extreme Cold Weather) gear and you’ll keep nice and toasty.", "\n\nWhen we first arrived, the long days were continuing to grow longer. ", "But when the sun dipped below the horizon, even for an hour or two, the temperatures plummeted and everything froze in the darkness. ", "And then something beautiful happened a couple weeks ago. ", "The sun stopped setting.", "\n\nThe next time the sun sets on McMurdo Research Station on Ross Island, Antarctica will be near the end of February, as we all prepare to depart and go our separate ways. ", "We will return to the States, different than when we left. ", "Changed by the icy wind that continues to blow and the sun that never ceases to shine.", "\n\nWhen I stepped off the C-17 and touched foot to snow, for a couple seconds, the bright glare of the light off the snow was blinding. ", "On the plane, the light faded and the shadows gave relief to our eyes. ", "After two weeks exploring the beauty that is Christchurch, we left the sights and sounds of the city and entered the unknown (some of us returned to what they have come to call home).", "\n\nAnd through the bright white of the snow that surrounded Phoenix Airfield as we descended the steps of the aircraft and began our journey on the ice, our eyes were opened to the beauty that is this frozen landscape.", "\n\nIt’s not a stark white that spreads out as far as the eye can see, but a glimmer of colors that expose themselves in moments and glimpses. ", "It is the blues and the grays of the snow drifts that creep their way across your path. ", "It is the oranges and yellows that explode off the ice as sunlight reflects across its surface, exposing the dark lines of cracks and imperfections that stretch out in silence. ", "It is the browns and dark outlines of volcanic rock that jut out from ground, exploding forth in mounds that tower over this place and contain a beautiful network or trails that lead you to vistas and memorials and hidden sights that you must seek out to find.", "\n\nIt is the vastness of the ice fields as far as the eye can see that draws forth a primal awe and wonder. ", "It is the majesty of the distant mountain ranges that are half hidden in the mist and the clouds of the morning that draw you in to worship. ", "It is the sound of the wind howling past your ears as its icy fingers caress exposed skin that is the song of worship that is this wilderness.", "\n\nThere are times when the blowing clouds of snow set in and the far off horizon vanishes beneath the white expanse of the unknown. ", "When the banks of snow disappear into the distance and the forms that make up the landscape are hidden and lost to sight.", "\n\nIt is then, when the wilderness of this place is upon you, that it reminds you of how small you truly are. ", "And it is then that worship becomes second nature, when your heart dances before creation, and each new sight reminds you of the love of a Lord that is in this place too.", "\n\nI find myself smiling with joy in my time here, when everywhere I look reminds me of my God. ", "Abba, my Father. ", "I step outside my dorm each morning to see the memorial cross on top of Observation Hill and I am reminded of His sacrifice to be my Savior. ", "I enter into the galley to witness the compassion and the companionship that is shared among friends and this community that is family and I am thankful that my Lord has allowed my path to cross each one here. ", "I walk out onto the ice as I lead groups out to explore the pressure ridges and to witness the power of this place and I am reminded that even here, at the edge of the world, my King still reigns, just like the never ceasing light of the sun.", "\n\nWe often find ourselves surrounded by beauty. ", "Be it here in the land of ice and snow. ", "Or the mountains beneath the skies above. ", "Or beside streams and trails that wind their way through the forests. ", "In villages that emerge from the dust or cities that are filled with the swarm of humanity. ", "If only we stop to notice what surrounds us." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00819672131147541, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006896551724137931, 0, 0, 0, 0, 0.011111111111111112, 0.007462686567164179, 0, 0, 0, 0, 0.007751937984496124, 0.004405286343612335, 0, 0, 0.009174311926605505, 0, 0, 0.003663003663003663, 0.013513513513513514, 0, 0, 0, 0.009615384615384616, 0, 0, 0, 0, 0, 0.010050251256281407, 0, 0, 0.008695652173913044, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0064516129032258064, 0, 0, 0.004784688995215311, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006134969325153374, 0.007751937984496124, 0.005263157894736842, 0.010638297872340425, 0.004629629629629629, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005847953216374269, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005813953488372093, 0, 0, 0, 0, 0.00546448087431694, 0.004608294930875576, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000844
5
[ "Field\nThe methods and systems of a multi-tier mobile transaction platform for secure personalized transactions in a multi-domain ecosystem generally relates to mobile transaction processing security.", "\nDescription of the Related Art\nMobile transactions are becoming the most prevalent form of point of sale payments. ", "Existing systems for mobile transaction processing do not have the scalability and flexibility of configurability needed to address the ever growing demand for secure personalized transaction services and client contact to meet future business needs." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0 ]
0
5
[ "Q:\n\nHow to handle user authentication for a CLI in Python using Click\n\nI'm using the very good Click framework to build a Python CLI that acts as a \"wrapper\" around a set of complex REST APIs. ", "I've used the \"complex\" example in order to have good boilerplate code to build the rest of CLI.", "\nHowever, since the CLI itself communicates with REST APIs, I need a bit of configuration for each command. ", "Example: user authentication (id, password, etc.), ", "and, if different from the default one, the URL to API server.", "\nI could force the user to put these configuration as parameters for each command, but this would be really annoying when executing many commands (the user has to insert his auth details for every command).", "\nIs there a way to have the user enter his credentials at the first command in order to have his uid/pwd persist for the entire session (like the mysql-cli, for example), and, after executing the commands he needed, \"logout\" from the CLI?", "\n\nA:\n\nThe way this is normally done is to have a configure command that stores these credentials in a file (normally in the user's $HOME folder, if you are on Linux) and changes its permissions so it is only readable by the user.", "\nYou can use configparser (or JSON or YAML or whatever you want) to load different sets of credentials based on a profile:\n# $HOME/.your-config-name\n[default]\nauth-mode=password\nusername=bsmith\npassword=abc123\n\n[system1]\nauth-mode=oauth\nauth-token=abc-123\nauth-url=http://system.1/authenticate\n\n[system2]\nauth-mode=anonymous\nauth-url=http://this-is.system2/start\n\nThen you can use a global argument (say --profile) to pick which credentials should be used for a given request:\n$ your-cli --profile system1 command --for first-system\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0051813471502590676, 0.010416666666666666, 0.009259259259259259, 0, 0.016129032258064516, 0, 0.004201680672268907, 0, 0.0056179775280898875 ]
0.005645
5
[ "1972 Cameroonian constitutional referendum\n\nA constitutional referendum was held in Cameroon on 20 May 1972. ", "The new constitution would make the country a unitary state, as opposed to the previous federal system, as well as giving more powers to President Ahmadou Ahidjo. ", "It was passed by 99.99% of voters with a 98.2% turnout.", "\n\nResults\n\nReferences\n\nCategory:1972 referendums\nCategory:1972 in Cameroon\n1972\nCategory:Constitutional referendums" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0.006134969325153374, 0, 0.008695652173913044 ]
0.003708
5
[ "The correlation of methanogenic communities' dynamics and process performance of anaerobic digestion of thermal hydrolyzed sludge at short hydraulic retention times.", "\nRequirement of a long hydraulic retention time (HRT) for efficient degradation restrains the anaerobic digestion of hydrothermal pretreated sludge. ", "Shortening the HRT can increase the treatment capacity of a plant but may also induce digester instability. ", "This study investigated the impact of HRT on process performance and microbial community by consecutively operating a reactor for 145 days. ", "The HRT was gradually decreased from 20 to 10, 5, and 3 days. ", "The methane yield declined from 0.28 to 0.12 L/g-VSin with this shortening, and acetate concentration increased from 38 to 376 mg/L. Methanoculleus (58%) dominated methanogens at a 20 days HRT. ", "However, the methanogenic structure shifted toward an increased level of Methanospirillum, representing 95% of the total archaea at a 3 days HRT. ", "Microorganisms were almost washed out at the end of experiment. ", "Conclusively, shortening HRTs is a feasible strategy to increase treatment capacity and produce more biogas at existing plants." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0.00684931506849315, 0, 0 ]
0.000761
5
[ "As for the next Surface? ", "The device is currently in testing and will feature ‘typical improvements’ which is likely a spec bump. ", "Internal response to the next gen Surface has been positive.", "\n\nThat’s not encouraging.", "\n\nThe Surface RT has always seemed like a confused product to me. ", "It runs an OS that looks identical to the one on the Surface Pro and on any Windows laptop sold in the last year, but it’s nowhere near the same.", "\n\nIt would be like if there were two versions of the iPad, with an OS that looks exactly like OS X. On one model of the iPad, you’d be able to install the full desktop version of iPhoto; on the other, you’d have to install the iOS version. ", "Madness." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0.006896551724137931, 0.0125, 0 ]
0.002425
5
[ "Overview\n\nBrighter Backup. ", "These replacement LED bulbs are a great way to improve the look and function of the reverse light on your GMC Savana. ", "You will get higher visibility at night, with a modern look. ", "The installation is straightforward, with just a bulb swap - making this one of the easiest ways to improve the Savana's lighting.", "\n\nBrightness. ", "All Diode Dynamics LED lighting is rated with accurate, measured lumen figures, not calculations or guesses. ", "We test the true output in-house, and provide you the real numbers to compare.", "\n\nColors that match. ", "Most of us have seen lighting setups with random shades of white that don't quite match. ", "At Diode Dynamics, we operate an integrating sphere, which is a piece of lab equipment used to analyze exact color spectrum of the LED bulbs we produce. ", "By testing each batch of products, we can ensure that all bulbs will match in color, to avoid various tints of white. ", "These bulbs will match any other upgrades you may have from Diode Dynamics, for factory-style uniformity and a clean appearance.", "\n\nReliability. ", "Diode Dynamics LEDs are built with constant-current inductive circuitry, along with transient suppression. ", "They are tested by our engineering team with a device that replicates years of voltage spikes, like the ones generated each time the alternator starts and stops on your Savana. ", "This is what kills most LED bulbs over time, but just like factory components, Diode Dynamics LEDs are designed with built-in circuit protection. ", "While more expensive than simple bulbs, this allows Diode Dynamics LEDs to last for years, with no flickering or failure.", "\n\nExperience. ", "After over a decade in business, Diode Dynamics is one of the most trusted names in automotive LED lighting. ", "We directly manufacture and engineer our own products in the United States, allowing for higher quality and performance, with the newest and brightest LED technology. ", "Whether it's a GMC or anything else, we pride ourselves in offering only the best possible LED solutions. ", "Please contact us if you'd like to discuss your lighting project!", "\n\nInstallation\n\nWarranty\n\n3 Year Replacement Limited Warranty\n\nAll Diode Dynamics products come with a 3 Year Worry-Free Warranty.", "\n\nIf you experience any defect with a product, we will do some quick troubleshooting, and if necessary, provide a replacement. ", "There is no need to wait for a return and repair process. ", "Click here to learn more.", "\n\nShipping\n\nDomestic (U.S.) Shipping\n\nAll domestic (U.S.) orders ship with your choice of UPS or USPS, and all orders placed before 12 PM CST will ship the same day, if all items are in stock. ", "Shipping costs are calculated at checkout, based on order size. ", "Delivery usually takes just 3-5 days.", "\n\nYou will receive updates from our site when your order is shipped, along with a unique shipment number to ensure that your order is correctly accounted for. ", "This allows you to easily reply to us if you have any concerns.", "\n\nHave a question about your shipment? ", "Just like any other question you might have, simply send us an email and our trained lighting and shipping experts will reply, usually the same day. ", "Or, give us a call during normal business hours.", "\n\nInternational Shipping\n\nWe ship to almost everywhere in the world using USPS shipping services, along with your country's postal service. ", "Rates are calculated at checkout to ensure fair pricing. ", "We normally offer standard mail, Priority International, and EMS Express. ", "Please note that the shipping time can vary widely, based on your countries mail service and border policies.", "\n\nShipments are marked with the value of your purchase price. ", "International customers are responsible for any tariffs or customs fees that may be associated with their shipment. ", "Please check your country's laws and regulations before your purchase.", "\n\nPuerto Rico:As we use standard USPS, PR is considered a US territory for mailing purposes, and can be selected as such at checkout. ", "Shipping will be domestic U.S. rates.", "\n\nCanada:We ship to Canada every day! ", "Most small orders will cost around $10 via standard mail. ", "We also offer Priority and Express EMS. ", "To see exact shipping rates, please view your options at checkout. ", "We also offer UPS service to Canada.", "\n\nEurope, Asia, and Australia: We ship to all other countries using standard mail. ", "You can check the shipping cost at checkout, as it will be calculated based on your cart. ", "We offer standard mail, Priority, and EMS Express.", "\n\nCustoms Fees for International Shipping\n\nShipments are marked with the value of your purchase price. ", "International customers are responsible for any tariffs or customs fees that may be associated with their shipment. ", "Please check your country's laws and regulations before your purchase.", "\n\nAs we use only standard mail, our customers normally do not incur any type of import fees, customs fees, or tariffs for smaller shipments. ", "However, this cannnot be guaranteed, and any fees are the responsibility of the buyer. ", "Please contact us if you have any concerns." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.00847457627118644, 0, 0, 0, 0, 0, 0, 0, 0.006535947712418301, 0, 0.0078125, 0, 0.009345794392523364, 0, 0.00684931506849315, 0.008264462809917356, 0, 0.009174311926605505, 0, 0.009433962264150943, 0, 0.007692307692307693, 0, 0, 0, 0.010362694300518135, 0, 0, 0, 0, 0, 0, 0, 0.007142857142857143, 0, 0.02702702702702703, 0, 0, 0, 0, 0.014925373134328358, 0, 0, 0, 0.05, 0.014925373134328358, 0, 0, 0, 0.04, 0, 0, 0, 0, 0, 0 ]
0.004175
5
[ "Q:\n\nOptimizing matrix writes in python/numpy\n\nI'm currently trying to optimize a piece of code the gist of it is we go through and compute a bunch of values and write them to a matrix. ", "The order of computation doesn't matter:\nmat = np.zeros((n, n))\nmat.fill(MAX_VAL)\nfor i in xrange(0, smallerDim):\n for j in xrange(0,n):\n similarityVal = doACalculation(i,j, data, cache)\n mat[i][j] = abs(1.0 / (similarityVal + 1.0))\n\nI've profiled this code and have found that approximately 90% of the time is spent on writing the value back into the matrix (the last line)\nI'm wondering what the optimal way to do this type of computation to optimize the writes. ", "Should I write to an intermediate buffer and copy in the whole row etc etc. ", "I'm a bit clueless to performance tuning or numpy internals.", "\nEDIT:\ndoACalculation is not a side-effect free function. ", "It takes in some data (assume this is some python object) and also a cache to which it writes and reads some intermediate steps. ", "I'm not sure if it can easily be vectorized. ", "I tried using numpy.vectorize as recommended but did not see a significant speedup over the naive for loop. (", "I passed in the additional data via a state variable):\n\nA:\n\nWrapping it in a numba autojit should improve the performance quite a bit. ", "\ndef doACalculationVector(n, smallerDim):\n return np.ones((smallerDim, n)) + 1\n\ndef testVector():\n n = 1000\n smallerDim = 800\n mat = np.zeros((n, n))\n mat.fill(10) \n mat[:smallerDim] = abs(1.0 / (doACalculationVector(n, smallerDim) + 1.0))\n return mat\n\n@numba.autojit\ndef doACalculationNumba(i,j):\n return 2\n\n@numba.autojit\ndef testNumba():\n n = 1000\n smallerDim = 800\n mat = np.zeros((n, n))\n mat.fill(10)\n for i in xrange(0, smallerDim):\n for j in xrange(0, n):\n mat[i,j] = abs(1.0 / (doACalculationNumba(i, j) + 1.0))\n return mat\n\nOriginal Timing for reference: (with mat[i][j] changed to mat[i,j])\nIn [24]: %timeit test()\n1 loops, best of 3: 226 ms per loop\n\nNow i simplified the function a bit since this was all that was provided. ", "But testNumba was about 40 times as fast as test when timed. ", "and about 3 times as fast as the vectorized\nIn [20]: %timeit testVector()\n100 loops, best of 3: 17.9 ms per loop\n\nIn [21]: %timeit testNumba()\n100 loops, best of 3: 5.91 ms per loop\n\nA:\n\nIf you can vectorize doACalculation, the task becomes easy:\nsimilarityArray = doACalculation(np.indices((smallerDim, n)))\nmat[:smallerDim] = np.abs(1.0 / (similarityArray + 1))\n\nThis should be at least an order of magnitude faster, assuming you vectorize doACalculation properly. ", "Generally, when working with NumPy arrays, you want to avoid explicit loops and element accesses as much as possible.", "\nFor reference, an example vectorization of a possible doACalculation:\n# Unvectorized\ndef doACalculation(i, j):\n return i**2 + i*j + j\n\n# Vectorized\ndef doACalculation(input):\n i, j = input\n return i**2 + i*j + j\n\n# Vectorized, but with the original call signature\ndef doACalculation(i, j):\n return i**2 + i*j + j\n\nYes, the last version really is supposed to be identical to the unvectorized function. ", "It sometimes is that easy.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0025031289111389237, 0, 0, 0.008547008547008548, 0.0024154589371980675, 0, 0 ]
0.000842
5
[ "“It’s Really a Street Brawl”\n\nFormer OBT dancer Matthew Boyes shares his memories of Speak, Trey McIntyre’s ballet set to a spoken-word piece by Tracie Morris and the hip-hop music of The Bloodhound Gang.", "\n\nVanessa Thiessen and Matthew Boyes in the world premiere of Trey McIntyre’s Speak.", "\nOregon Ballet Theatre, 1998. ", "Photo by David Straub.", "\n\nBy Claire Willett\n\nHow was the piece conceived?", "\n\nSpeak was created on Vanessa Thiessen and myself when OBT was still [performing] in the former Masonic Temple, now the new wing of the Portland Art Museum. ", "Trey had already choreographed Like a Samba [on OBT dancers] and I believe this was his second piece for the company. ", "It is a true reflection of pop culture at that time. ", "Both Trey and James Canfield were always inspired and intrigued by contemporary life. ", "Rap music and hip-hop had already been around for a number of years, but spoken word was just coming out. ", "Spoken word [had] a more urban/intellectual vibe; people would go to coffee houses and act like modern-day beat poets of sorts.", "\n\nWhat was Trey’s vision for the piece?", "\n\nHe really made the duet . . . ", "a conversation between two people. ", "He would never talk about what to [think] while dancing this. ", "Every movement [he] choreographed expressed exactly what he wanted, without him [needing to waste] words on explanation. [", "The piece is so] different from most classical dance in that there is no love story told between the man and woman.", "\n\nWhat was it like to dance Speak?", "\n\nWhen we would rehearse he pushed us to our physical extremes, traversing the stage from end to end. ", "For me, if the choreography called for a gesture or kick, it had to start from a thought and explode as a movement. ", "The duet is really a “street brawl” between two friends. [", "It’s] a battle of the sexes with the girl kicking the guy’s butt – literally and figuratively – in the end . . . ", "The female solo was just raw movement, and looked nothing like ballet. ", "Of course it takes a trained dancer to make this type of dance really look tight and fierce . . . ", "After dancing SpeakI would want to just lay on the floor and catch my breath, but as soon as I rolled offstage I knew I would have to turn around and run out for the bow.", "\n\nThe audience would always go insane with applause! ", "People really liked it. ", "Usually it would be sandwiched in the middle of the evening’s program [and] the other ballets would be more “balletic,” so the contrast would really surprise and wake up the audience.", "\n\nOn Anne Mueller\n\nI would like to congratulate Anne Mueller on her many years with both James and Christopher at the helm of the company. ", "Her personal integrity and work ethic, not to mention her beauty, have stood as an excellent example for [several] generations of dancers. ", "Thank you, Anne, for your friendship and unstoppable drive." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0196078431372549, 0.011904761904761904, 0, 0.045454545454545456, 0.02040816326530612, 0.02531645569620253, 0.00847457627118644, 0, 0.023255813953488372, 0, 0, 0.02564102564102564, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02877697841726619, 0, 0.01694915254237288 ]
0.007284
5
[ "No Stain, No Pain-- and that's Guaranteed!", "\nUltrachevron, Ultraflannel and Ultraluscious join the ranks of the groundbreaking Ultraposh fabric by Architex. ", "These luxurious plush-suede fabrics utilize a propriety and inherently stain-resistant fiber that resists nearly any spill, stain or smudge resisting not only ink and marker but ketchup, wine, lipstick, chocolate--you name it! ", "The Ultra Series can go almost anywhere and can be used in upholstery, cruise ship and panel applications." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.017699115044247787, 0, 0 ]
0.004425
5
[ "Something went wrong - please try again later.", "\n\nThank you for signing up to The Courier daily newsletter\n\nSign up for our daily newsletter of the top stories in Courier country\n\nA man was taken to Ninewells Hospital after he was attacked by a masked gang on a Dundee street.", "\n\nEmergency services were called to the city’s Cunningham Street at 10.30pm on Monday after four men in a car got out and assaulted the man before making off.", "\n\nA meat cleaver was used in the attack, leaving the 29-year-old with injuries to his wrist and shin, according to police.", "\n\nEyewitnesses said the man was stabbed.", "\n\nA resident said: “At about 10.30pm we heard a scream from a woman, so we automatically went to the window to see what was going on.", "\n\n“Across the road, we saw a woman being chased up the street by three men in balaclavas.", "\n\n“Straight after that, another man at the same close was chased by another man in a balaclava.", "\n\n“All four men had weapons on them.", "\n\n“One man in a balaclava had a meat cleaver in his hand and stabbed the man he was chasing at the top of the street.", "\n\nA police spokesman said: “We were called to a serious assault in Cunningham Street at 10.30pm. ", "There was a scuffle and a bladed weapon was used.", "\n\n“A 29-year-old male was taken to Ninewells Hospital. ", "His injuries were not life-threatening.", "\n\n“No arrests have been made and inquiries are ongoing.”" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.013157894736842105, 0.006329113924050633, 0, 0, 0, 0, 0, 0, 0, 0.010309278350515464, 0, 0, 0, 0 ]
0.001986
5
[ "Which manufacturing characteristics are predictors of outlet strut fracture in large sixty-degree Björk-Shiley convexo-concave mitral valves? ", "The Björk-Shiley Study Group.", "\nIdentification of predictors of outlet strut fracture is important for recipients of large (>/=29 mm) 60-degree Björk-Shiley convexo-concave mitral valves when it comes to decision making on prophylactic explantation. ", "An association between the manufacturing process of Björk-Shiley convexo-concave valves and the risk of fracture has been suggested. ", "The aim of this study was to determine which items from the manufacturing records, in addition to known risk factors, were predictive of fracture of large 60-degree Björk-Shiley convexo-concave mitral valves. ", "All Dutch recipients (n = 2264) of Björk-Shiley convexo-concave valves were followed up until fracture, death, reoperation, or end of the study (July 1, 1996). ", "Information was abstracted from the manufacturing records of large 60-degree Björk-Shiley convexo- concave mitral valves (n = 655) in Dutch recipients and included items that described the manufacturing process and items for which an association with strut fracture had been suggested. ", "Manufacturing records were available for 637 valves (97%), including 25 fractured valves. ", "Multivariate analysis identified age at implantation (hazard ratio 0.95, 95% confidence interval 0.93-0.97), lot size (<175 valves versus >/=175 valves; hazard ratio 6.6, 95% confidence interval 2.2-20.1), number of hook deflection tests performed (0 or 1 versus >/=2; hazard ratio 4.7, 95% confidence interval 1.4-16.2), number of disks that were used (1 versus >/=2; hazard ratio 5.9, 95% confidence interval 1.9-18.5), and lot fracture percentage (hazard ratio 1.6, 95% confidence interval 1.4-1. ", "8) as independent predictors of fracture. ", "Although the added predictive value of a model with these 5 variables was sizable compared with a model containing age only, it was only slightly better than a model with age, lot size, and lot fracture percentage. ", "If the serial number of a large 60-degree Björk-Shiley convexo-concave mitral valve is known, manufacturing information can add significantly to the prediction of fracture. ", "Information on lot size and lot fracture percentage should be made available to clinicians for risk assessment of prophylactic explantation." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.007042253521126761, 0, 0.0045662100456621, 0.007518796992481203, 0.004784688995215311, 0.00625, 0, 0, 0, 0, 0, 0.005780346820809248, 0 ]
0.002765
5
[ "package org.hotswap.agent.plugin.owb.testBeansHotswap;\n\nimport javax.enterprise.context.", "ApplicationScoped;\nimport javax.inject.", "Inject;\n\nimport org.hotswap.agent.plugin.owb.testBeans.", "TestItercepting;\n\n@ApplicationScoped\npublic class InterceptedBean2 {\n\n @Inject\n InterceptedBean2 thisBean;\n\n public String hello() {\n return \"InterceptedBean2.hello():\" + thisBean.hello2();\n }\n\n @TestItercepting\n public String hello2() {\n return \"InterceptedBean2.hello2()\";\n }\n\n @TestItercepting\n public String hello3() {\n return \"InterceptedBean2.hello3()\";\n }\n}" ]
{ "pile_set_name": "Github" }
[ 0, 0.02564102564102564, 0, 0.00963855421686747 ]
0.00882
5
[ "<?xml version=\"1.0\" encoding=\"utf-8\"?", ">\n<Project ToolsVersion=\"4.0\" xmlns=\"http://schemas.microsoft.com/developer/msbuild/2003\">\n <ItemGroup>\n <Filter Include=\"Source Files\">\n <UniqueIdentifier>{4FC737F1-C7A5-4376-A066-2A32D752A2FF}</UniqueIdentifier>\n <Extensions>cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx</Extensions>\n </Filter>\n <Filter Include=\"Header Files\">\n <UniqueIdentifier>{93995380-89BD-4b04-88EB-625FBE52EBFB}</UniqueIdentifier>\n <Extensions>h;hpp;hxx;hm;inl;inc;xsd</Extensions>\n </Filter>\n <Filter Include=\"Resource Files\">\n <UniqueIdentifier>{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}</UniqueIdentifier>\n <Extensions>rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav</Extensions>\n </Filter>\n <Filter Include=\"Inline Files\">\n <UniqueIdentifier>{6f3f0eb2-b24d-44c7-a5f1-e69c7e5867d0}</UniqueIdentifier>\n </Filter>\n </ItemGroup>\n <ItemGroup>\n <ClCompile Include=\"common.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"db_exception.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"db_interface_mysql.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"db_transaction.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"entity_sqlstatement_mapping.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"entity_table_mysql.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n <ClCompile Include=\"kbe_table_mysql.cpp\">\n <Filter>Source Files</Filter>\n </ClCompile>\n </ItemGroup>\n <ItemGroup>\n <ClInclude Include=\"common.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"db_exception.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"db_interface_mysql.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"db_transaction.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"entity_sqlstatement_mapping.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"entity_table_mysql.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"kbe_table_mysql.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"remove_entity_helper.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"sqlstatement.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"read_entity_helper.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"write_entity_helper.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n <ClInclude Include=\"db_context.h\">\n <Filter>Header Files</Filter>\n </ClInclude>\n </ItemGroup>\n <ItemGroup>\n <None Include=\"ReadMe.txt\" />\n <None Include=\"entity_table_mysql.inl\">\n <Filter>Inline Files</Filter>\n </None>\n </ItemGroup>\n</Project>" ]
{ "pile_set_name": "Github" }
[ 0.02631578947368421, 0.000671591672263264 ]
0.013494
5
[ "A farmer reportedly chewed off a snake’s head in revenge after the reptile bit him, with his attending doctors saying they had never come across such a bizarre case.", "\n\nThe incident took place in northern India’s Uttar Pradesh state in Hardoi district at the weekend, when the man identified only by his first name, Sonelal – was rushed to a government health centre after locals found him unconscious.", "\n\nThe man told villagers that he was grazing his cattle in the fields when the snake bit him, which however made him so angry he chewed off its hood before spitting it out.", "\n\nSonelal\n\n“The snake bit me, so I held its head and chewed it off, it died, then I brought it back to the village. ", "I tore off its head again,’’ Sonelal told the ANI news agency.", "\n\nSanjay Kumar, a doctor who treated him said he was amazed that the man survived after biting the hood, which could have contained venom, assuming it was a poisonous snake.", "\n\nHowever, the local media said that the doctors failed to find any marks of snakebite on his body.", "\n\n“I’ve never seen such a case in my life. ", "The man was all right even after biting a snake,’’ Kumar said.", "\n\nWitnesses who claimed they saw him ingest part of the snake said they suspected the man was addicted to drugs.", "\n\nMedical officials believe that the man’s abnormal reaction could only be explained if he was under the influence of drugs.", "\n\nPunch.com" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.00851063829787234, 0, 0.008620689655172414, 0.03225806451612903, 0.005780346820809248, 0, 0, 0.016129032258064516, 0, 0, 0 ]
0.005942
5
[ "Q:\n\nUnsatisfiedLinkError when using a JNI native library from Grails application\n\nI have an application where I need to use a Native Library: libfoo.so\nMy code is as follows:\nAccessor.java:\npublic class Accessor { \n static {\n String path = \"/usr/lib/libfoo.so\";\n System.load(path);\n }\n ...\n}\n\nThis works perfectly fine when I deploy my war file in a standalone tomcat server.", "\nThe problem is when I try to run the embedded tomcat server when you run: \ngrails run-app\n\nI get an UnsatisfiedLinkError:\nCaused by UnsatisfiedLinkError: com.foo.bar.", "GFS_MALJNI.new_Accessor__SWIG_0(Ljava/lang/String;I)J\n->> 39 | <init> in com.foo.bar.", "Accessor \n\nInterestingly enough, if I change my BuildConfig.groovy file to fork mode, it also works.", "\nBuildConfig.groovy:\ngrails.project.fork = [\n run: [maxMemory:1024, minMemory:64, debug:false, maxPerm:256]\n]\n\nI do not want to run it in fork mode.", "\n\nA:\n\nI noticed that two different class loaders are being used.", "\nIn the non-forked mode, this class loader was being used: java.net.", "URLClassLoader\nIn the forked mode, this class loader was being used: groovy.lang.", "GroovyClassLoader\nThe native library works correctly in the forked mode, so I needed to come up with a hack to load the library with the GroovyClassLoader in the non-forked mode.", "\nThis is how System.load is defined in the JDK Source:\nSystem.java:\npublic final class System {\n ...\n public static void load(String filename) {\n Runtime.getRuntime().load0(getCallerClass(), filename);\n }\n ...\n}\n\nIt's calling load0 with the classloader and filename. ", " The obvious solution is to call load0 with your own classloader, but you can't call it since it is package-protected. ", " \nWhen you write code in groovy, you have access to packge-protected and private methods/variables.", "\nI can specify my own classloader and load the library, as such:\nclass Accessor { \n static {\n String path = \"/usr/lib/libfoo.so\"\n //System.load(path);\n Runtime.getRuntime().load0(groovy.lang.", "GroovyClassLoader.class, path)\n }\n ...\n}\n\nI just tried it, and it's working in non-forked mode.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0049382716049382715, 0, 0.011111111111111112, 0, 0.006666666666666667, 0, 0, 0.012345679012345678, 0.011235955056179775, 0, 0, 0, 0.0045045045045045045, 0, 0 ]
0.003387
5
[ "Dry Hot Summers\n\nDry Hot Summers (, transliterated: Har gaf sayfan) is a 2015 Egyptian short film directed by Sherif El Bendary. ", "It was an official selection at Clermont-Ferrand International Short Film Festival.", "\n\nPlot summary\n\nOne summer day in Cairo creates an unexpected encounter between two strangers on opposite chapters of their lives. ", "Shawky is a silent old man struggling with cancer, who only has a few weeks left. ", "Doaa is an energetic young woman who grabs her last chance to marry and start a new life in another city, building up a family, she herself so desperately misses. ", "Both are isolated from society in different ways. ", "Since his son is too busy to accompany him, Shawky is alone on his way to see a tumor specialist, a French physician, who is in Cairo for just a few days and means his last hope. ", "Shawky's yellow plastic bag containing all his x-rays and medical tests are accidentally taken by the young woman (Doaa) he shares a taxi with. ", "Doaa is getting ready for her wedding party later that night, but as she lives all alone in the city, only her motherly neighbor helps her with the busy preparations. ", "As Doaa rushes through the city, the bridal bouquet gets lost and is picked up by Shawky, who is following her in search of his yellow plastic bag. ", "The lost x-rays and the lost flowers oblige them to spend a fraught and exhausting day together, a journey through the city that plants the seed of hope where they never expected it. ", "Before he catches his appointment with the doctor and she finally arrives at her wedding party, the two isolated people reconnect against all odds and form a human bond as they realize the preciousness of this very moment in their lives.", "\n\nCast\n Mohamed Farid .. Shawky\n Nahed El Sebai .. Dooa\n\nAwards and nominations\n Official selection, Clermont-Ferrand International Short Film Festival\n Best Short Film (shared), Malmö Arab Film Festival\n Best Director, Bangalore International Short Film Festival\n Best Short Film, Oran International Arabic Film Festival\n Best Short Film, Ismailia International Film Festival\n ACT Award, Ismailia International Film Festival\n\nReferences\n\nhttp://mecfilm.com/index.php?id=3803\n\nExternal links\n \n\nCategory:Egyptian films\nCategory:Arabic-language films\nCategory:Films set in Cairo\nCategory:Films directed by Sherif El Bendary\nCategory:2015 films\nCategory:Egyptian drama films" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.015503875968992248, 0.012048192771084338, 0, 0, 0, 0, 0.00558659217877095, 0, 0, 0.006756756756756757, 0, 0, 0.013392857142857142 ]
0.004099
5
[ "Changes in the Canadian blood system: the Krever Inquiry, Canadian Blood Services and Héma-Québec. ", "Krever Commission.", "\nBeginning in 1992, Canada underwent a series of investigations into the national blood program. ", "The Krever Commission issued an interim report in 1993 and a final report in 1997. ", "In all a total of 93 recommendations were made. ", "Subsequently, in 1998, the Canadian Red Cross Society (CRC) withdrew from the blood program and two new organizations, the Canadian Blood Services (CBS) and Héma-Québec (HQ) took over as operators." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.030303030303030304, 0.05555555555555555, 0, 0.012048192771084338, 0, 0.025380710659898477 ]
0.020548
5
[ "Orde M. Coombs\n\nOrde Musgrave Coombs (June 3, 1939 – September 1, 1984) was an African-American writer and editor.", "\n\nBiography\nCoombs was born on Saint Vincent in the Caribbean in 1939. ", "He received his B.A. degree from Yale University in 1965, where he was the first black student initiated into the secret society Skull and Bones. ", "He earned his M.A. degree from New York University in 1971. ", "He then worked as an editor for Doubleday & Company and later for McCall Corporation. ", "In addition to editing, he produced documentaries on West Indian culture, and was an adjunct professor at New York University. ", "He was a co-host for Black Conversations, a talk show on WPIX in 1975.", "\n\nPublications\nDo You See My Love for You Growing? (", "1972)\nDrums of Life (1974, with Chester Higgins Jr.)\nSleep Late With Your Dreams (1977)\nSome Time Ago: A Historical Portrait of Black Americans from 1850-1950 (1980, with Chester Higgins Jr.).", "\n\nEditor\nWe Speak as Liberators: Young Black Poets (1970)\nWhat We Must See: Young Black Storytellers (1971)\nIs Massa Day Dead? ", "Black Moods in the Caribbean (1974)\n\nReferences\n\nExternal links\n\nCategory:1939 births\nCategory:1984 deaths\nCategory:American male journalists\nCategory:American book editors\nCategory:African-American academics\nCategory:20th-century American writers\nCategory:20th-century American journalists\nCategory:20th-century American male writers" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.008771929824561403, 0.014084507042253521, 0.00684931506849315, 0.016666666666666666, 0.023255813953488372, 0.007874015748031496, 0.014285714285714285, 0, 0.010416666666666666, 0.007874015748031496, 0.0029940119760479044 ]
0.010279
5
[ "Wearing a Green Bay Packers \"cheesehead,\" Mark Wilson cheers on the crowd at the 16th hole during the third round of the Waste Management Phoenix Open, which he went on to win in a playoff over Jason Dufner.", "\n\nWearing a Green Bay Packers \"cheesehead,\" Mark Wilson cheers on the crowd at the 16th hole during the third round of the Waste Management Phoenix Open, which he went on to win in a playoff over Jason Dufner.", "\n\nPhoto\n\nWith the lead, Mark Wilson waves to the crowd after finishing the third round of the Waste Management Phoenix Open at TPC Scottsdale on Feb. 6, 2011.", "\n\nWith the lead, Mark Wilson waves to the crowd after finishing the third round of the Waste Management Phoenix Open at TPC Scottsdale on Feb. 6, 2011.", "\n\nPhoto\n\nMark Wilson, right, gets the crowd going as he and his caddie Chris Jones arrive at the 16th green wearing Green Bay Packers cheeseheads hats during the third round of the Phoenix Open on Sunday, Feb. 6, 2011, in Scottsdale, Ariz.\n\nMark Wilson, right, gets the crowd going as he and his caddie Chris Jones arrive at the 16th green wearing Green Bay Packers cheeseheads hats during the third round of the Phoenix Open on Sunday, Feb. 6, 2011, in Scottsdale, Ariz.\n\nPhoto\n\nMark Wilson\n\nMark Wilson\n\nPhoto\n\n2.", "\n\n2.", "\n\nPhoto\n\n3.", "\n\n3.", "\n\nPhoto\n\nTaylorMade's new R11 driver.", "\n\nTaylorMade's new R11 driver.", "\n\nPhoto\n\nSteve Stricker\n\nSteve Stricker\n\nPhoto\n\nCanada's Maude-Aimee LeBlanc, who helped Purdue win the 2010 NCAA Women's Championship, no doubt will own a spot in the new women's amateur ranking.", "\n\nCanada's Maude-Aimee LeBlanc, who helped Purdue win the 2010 NCAA Women's Championship, no doubt will own a spot in the new women's amateur ranking.", "\n\nPhoto\n\nRickie Fowler throws hats to the fans on the 16th green during the second round of the Phoenix Open Saturday, Feb. 5, 2011, in Scottsdale, Ariz.\n\nRickie Fowler throws hats to the fans on the 16th green during the second round of the Phoenix Open Saturday, Feb. 5, 2011, in Scottsdale, Ariz.\n\nPhoto\n\nMark Wilson wears a Green Bay Packers cheesehead as he chants with the crowd at the 16th hole during the third round of the Phoenix Open on Sunday, Feb. 6, 2011, in Scottsdale, Ariz.\n\nMark Wilson wears a Green Bay Packers cheesehead as he chants with the crowd at the 16th hole during the third round of the Phoenix Open on Sunday, Feb. 6, 2011, in Scottsdale, Ariz.\n\nPhoto\n\nTommy Gainey watches his approach shot at the 18th hole during the third round of the Phoenix Open on Feb. 6, 2011, in Scottsdale, Ariz.\n\nTommy Gainey watches his approach shot at the 18th hole during the third round of the Phoenix Open on Feb. 6, 2011, in Scottsdale, Ariz.\n\nPhoto\n\nRahman Siddikur celebrates after his 12-stroke victory in the 2011 Grameenphone Bangladesh Masters.", "\n\nRahman Siddikur celebrates after his 12-stroke victory in the 2011 Grameenphone Bangladesh Masters.", "\n\nPhoto\n\nThe floating green at the par-3 17th hole at Bangkok's Amata Spring Country Club.", "\n\nThe floating green at the par-3 17th hole at Bangkok's Amata Spring Country Club.", "\n\nPhoto\n\nYani Tseng was victorious again at the Women’s Australian Open at the Commonwealth Golf Club in Melbourne Feb. 6, 2011.", "\n\nYani Tseng was victorious again at the Women’s Australian Open at the Commonwealth Golf Club in Melbourne Feb. 6, 2011.", "\n\nPhoto\n\nThomas Bjorn of Denmark celebrates after winning the Qatar Masters at the Doha Golf Club on February 6, 2011.", "\n\nThomas Bjorn of Denmark celebrates after winning the Qatar Masters at the Doha Golf Club on February 6, 2011.", "\n\nPhoto\n\nDefending champion Yani Tseng holds the trophy at the Women's Australian Open.", "\n\nDefending champion Yani Tseng holds the trophy at the Women's Australian Open." ]
{ "pile_set_name": "Pile-CC" }
[ 0.014492753623188406, 0.014354066985645933, 0.0189873417721519, 0.019867549668874173, 0.011650485436893204, 0, 0, 0, 0.05405405405405406, 0.06666666666666667, 0.025510204081632654, 0.02, 0.005633802816901409, 0.009900990099009901, 0.011111111111111112, 0.012048192771084338, 0.015625, 0.01652892561983471, 0.025423728813559324, 0.02702702702702703, 0.022988505747126436, 0.025 ]
0.018949
5
[ "\n572 F.Supp. ", "954 (1983)\nHenry ERB, Plaintiff,\nv.\nUNITED STATES DEPARTMENT OF JUSTICE, et al., ", "Defendants.", "\nNo. ", "G82-661 CA.", "\nUnited States District Court, W.D. Michigan, S.D.\nJune 20, 1983.", "\n*955 Dennis C. Kolenda, Varnum, Riddering, Wierengo & Christenson, Grand Rapids, Mich., for plaintiff.", "\nThomas Gezon, Asst. ", "U.S. Atty., ", "Grand Rapids, Mich., for defendants.", "\n\nOPINION\nBENJAMIN F. GIBSON, District Judge.", "\n\nBACKGROUND\nPlaintiff seeks disclosure pursuant to the Freedom of Information Act (F.O.I.A.) of a F.B.I. report involving a criminal investigation of James McCune and Frank Pierce, former Deputy Chief of Police of the Grand Rapids Police Department. ", "This investigation focused on allegations by McCune that he was an undercover agent for Pierce and the Grand Rapids Police Department during times when certain crimes were committed. ", "McCune further charges that Pierce was aware of these offenses and has actually shared in the proceeds from some of them. ", "McCune has been charged in state court and is awaiting trial. ", "His defense, in part, will rely on his alleged relationship with Pierce. ", "As a result of these allegations, the F.B.I. undertook an investigation to determine whether any federal laws had been violated. ", "This matter has received widespread publicity since the allegations involved misconduct of Pierce while he was Deputy Chief of the Grand Rapids Police Department.", "\nThe plaintiff, a television reporter for WOTV in Grand Rapids seeks access to the results of the F.B.I. investigation pursuant to the provisions of the F.O.I.A. The government has refused to release the report claiming an exemption from disclosure of\ninvestigatory records compiled for law enforcement purposes, but only to the extent that the production of such records would (A) interfere with enforcement proceedings.", "\n5 U.S.C. § 552(b)(7)(A).", "\nThe government asserts that its investigation is still continuing and that disclosure of the F.B.I. report would interfere with that investigation and jeopardize enforcement proceedings.", "\nPlaintiff contends that exemption 7(A) is not applicable to the facts and circumstances of this case since the government has publicly stated that its investigation has concluded. ", "Further, plaintiff says that even if exemption 7(A) does apply, the release of the F.B.I. report to the county prosecutor and McCune's attorney constitute a waiver. ", "In support of this position plaintiff points to the following press release issued by the government:\nJohn A. Smietanka, United States Attorney for the Western District of Michigan, announced today that the report of the investigation of the Federal Bureau of Investigation concerning certain allegations involving Grand Rapids Deputy Chief of Police Franklin Pierce and James McCune has been turned over to the Kent County Prosecutor's Office and counsel for Mr. McCune.", "\nThis concludes the federal involvement in this matter for the time being.", "\n\nEXEMPTION 7(A)\nThe government has the burden of proof to establish to the satisfaction of this Court that the disclosure of the F.B.I. report is exempt. ", "5 U.S.C. § 522(a)(4)(B). ", "Several hearings were held at which the Court sought to determine de novo the validity of the exemption from disclosure relied on by the government. ", "This review included a so-called Vaughn index wherein the government attempted to summarize the report in sufficient detail in order to permit the Court to determine the validity of its claimed exemption. ", "The Court determined that the Vaughn index submitted was inadequate for the purposes intended and ordered the government to either submit a more detailed Vaughn index or the entire F.B.I. report. ", "The government chose to furnish the complete report and the Court has examined this report in camera pursuant to 5 U.S.C. § 552(a)(4)(B).", "\nThe Court concludes based upon the in camera inspection and examination that the report clearly falls within exemption 7(A). *", "956 The report is of an investigatory nature compiled for law enforcement purposes and disclosure would \"interfere with enforcement proceedings.\"", "\nThe press release of June 25, 1982 stated that federal involvement was concluded \"for the time being.\" ", "A review of the F.B.I. report in camera shows that the F.B.I. has conducted additional investigation subsequent to the press release. ", "Several additional witnesses have been interviewed providing substantive information. ", "The Court is satisfied that the investigation has not been terminated and information is still being gathered.", "\nThe report also shows that no final decision has been made regarding whether indictments will be sought by the government. ", "The Court finds after reviewing the entire F.B.I. report that it is not inconsistent with the press release.", "\nTherefore, the Court concludes that the F.B.I.'s report falls within exemption 7(A) and that disclosure at this time would be detrimental to legitimate enforcement responsibilities of the government. ", "Premature disclosure of the report would reveal the scope and focus of the investigation which could make any future prosecutions more difficult.", "\n\nWAIVER\nPlaintiff contends that disclosure of the F.B.I.'s report to the county prosecutor and McCune's attorney is tantamount to a waiver of any exemptions relied on by the government. ", "The government replies that a limited, discretionary disclosure does not affect the applicability of exemption 7(A).", "\nThe Court is of the opinion that the waiver argument of plaintiff under the facts and circumstances of this case is without substance. ", "Many of the cases relied on by plaintiff involve the premature release of information by the government in civil matters and cannot be applied to criminal investigations. ", "A case quite similar in principle to this case is Murphy v. F.B.I., 490 F.Supp. ", "1138 (D.C.1980). ", "In that case, a congressman who was the object of an ABSCAM investigation sought access to certain tape recordings both oral and video under F.O.I.A. Certain information had been disclosed to the public regarding the investigation through \"leaks.\" ", "In addition, the U.S. Attorney had made available selected information to potential defendants and their attorneys. ", "The court in Murphy in upholding the exemption and ruling that there had been no waiver said:\nThe disclosures of information — both authorized and unauthorized — do not alter the court's ruling. ", "As for the authorized releases, the attorney in charge of the grand jury investigation engaged in limited disclosures to Defendants, prospective Defendants, or their counsel. ", "These disclosures entailed attempts to secure cooperation. ", "They therefore fall within the rubric of prosecutorial discretion. ", "Moreover, it is clear that government authorized disclosure fails to constitute a waiver of F.O.I.A. exemptions. ", "Krohn v. Department of Justice, No. ", "79-0667 (D.D.C. Sept. 7, 1979) at 4-5. ", "490 F.Supp. ", "1141.", "\nThe Court further stated:\nThe leaks that have occurred fail to alter this conclusion. ", "The limited nature of those authorized leaks, along with their purpose of obtaining cooperation in the investigation, establish that they fall within the domain of prosecutorial discretion. ", "490 F.Supp. ", "1143.", "\nBased upon the foregoing, the Court holds that under the facts and circumstances of this case, the limited release of the report does not constitute a waiver of exemption 7(A).", "\n\nCONCLUSION\nThe Court decides that the government is exempt from disclosure of the entire F.B.I. report pursuant to exemption 7(A) and that the limited disclosure of this report to the county prosecutor and McCune's attorney does not constitute a waiver.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.037037037037037035, 0, 0, 0, 0.015384615384615385, 0.019417475728155338, 0.047619047619047616, 0, 0, 0.022222222222222223, 0.0199203187250996, 0.01092896174863388, 0.00819672131147541, 0, 0.0136986301369863, 0.007751937984496124, 0.012345679012345678, 0.004750593824228029, 0, 0.0053475935828877, 0, 0.012121212121212121, 0.012738853503184714, 0, 0.012903225806451613, 0, 0.006711409395973154, 0.00975609756097561, 0.02040816326530612, 0.0072992700729927005, 0.007874015748031496, 0, 0, 0.014925373134328358, 0, 0.00909090909090909, 0, 0.018518518518518517, 0.009950248756218905, 0, 0.0106951871657754, 0, 0.007352941176470588, 0, 0.025, 0, 0.004032258064516129, 0, 0.005128205128205128, 0.011428571428571429, 0, 0, 0, 0.027777777777777776, 0, 0, 0, 0.011494252873563218, 0, 0, 0, 0.005649717514124294, 0.011764705882352941, 0 ]
0.007496
5
[ "Injury pattern and mortality of noncompressible torso hemorrhage in UK combat casualties.", "\nHemorrhage following traumatic injury is a leading cause of military and civilian mortality. ", "Noncompressible torso hemorrhage (NCTH) has been identified as particularly lethal, especially in the prehospital setting. ", "All patients sustaining NCTH between August 2002 and July 2012 were identified from the UK Joint Theatre Trauma Registry. ", "NCTH was defined as injury to a named torso axial vessel, pulmonary injury, solid-organ injury (Grade 4 or greater injury to the liver, kidney, or spleen) or pelvic fracture with ring disruption. ", "Patients with ongoing hemorrhage were identified using either a systolic blood pressure of less than 90 mm Hg or the need for immediate surgical hemorrhage control. ", "Data on injury pattern and location as well as cause of death were analyzed using univariate and multivariate analyses. ", "During 10 years, 296 patients were identified with NCTH, with a mortality of 85.5%. ", "The majority of deaths occurred before hospital admission (n = 222, 75.0%). ", "Of patients admitted to hospital, survivors (n = 43, 14.5%) had a higher median systolic blood pressure (108 [43] vs. 89 [46], p = 0.123) and Glasgow Coma Scale (GCS) (14 [12] vs. 3 [0], p < 0.001) compared with in-hospital deaths (n = 31, 10.5%). ", "Hemorrhage was the more common cause of death (60.1%), followed by central nervous system disruption (30.8%), total body disruption (5.1%), and multiple-organ failure (4.0%). ", "On multivariate analysis, major arterial and pulmonary hilar injury are most lethal with odds ratio (95% confidence interval) of 16.44 (5.50-49.11) and 9.61 (1.06-87.00), respectively. ", "This study demonstrates that the majority of patients sustaining NCTH die before hospital admission, with exsanguination and central nervous system disruption contributing to the bulk cause of death. ", "Major arterial and pulmonary hilar injuries are independent predictors of mortality." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0.008130081300813009, 0.00819672131147541, 0.00510204081632653, 0, 0, 0.011904761904761904, 0, 0.008064516129032258, 0, 0, 0.005, 0 ]
0.003314
5
[ "For Android\n\nWhile the COLX Team continues to make improvements to its blockchain technologies, with the culmination of work resulting in the release of a distributed computing project called Colossus Grid, the focus has always been on user privacy and widespread currency adoption.", "\n\nCOLX currently provides users anonymity in transactions through the Zerocoin protocol and is moving full steam ahead to further enhance user’s privacy with the soon to be release additional protocol name ARMIS.", "\n\nARMIS is a free, decentralized, anonymity technology based on I2P’s open specifications. ", "Our technology uses both encryption and sophisticated routing techniques to create a private overlay network across the internet which strengthens a user’s privacy. ", "This protected network allows users to hide their geographical location by obfuscating their ip address, replacing them with encrypted identities.", "\n\nAs user adoption is the key to establishing real usage of ColossusXT and although the work is being done to integrate COLX into Crypto Point of Sale Devices, we believe that the time is right for merchants to start accepting COLX as a payment method using the Android wallet for now. ", "Whether you own a cafe, local retail store, charity shop or any other business, you now have the exciting chance to become one of the first real adopters of COLX and hence an ambassador for the rest of the privacy loving community.", "\n\nHere are the steps to start accepting COLX:\n\nThe merchant must have an android tablet or mobile device, They should then proceed to download the COLX MOBILE APP from the Google Playstore\n\nOnce installed, Open the wallet and follow the information guidelines to learn more. ", "Now depending on the country, your merchant is operating from they would definitely want their wallet to show their currency. ", "So click the menu bar on the top left, Select Settings and scroll down until you find the preference heading and select Currency Rate, Now browse down and select your currency of choice, for example, GBP for Great British Pounds. ", "For Merchant safety opt them to take A mnemonic backup of their wallet, This is a set of words that will allow them to recover their COLX funds on another mobile device running the COLX mobile wallet, To do this simply go to the Settings section again and select Backup Wallet You can then put a password in to create a backup file or even better proceed to select the 3 dot menu bar on the top right and click Mnemonic Code, Proceed to write down these words and keep them private as they hold all of your COLX addresses and funds. ", "You are now completely set up to accept COLX, When a client wants to pay you via COLX you can simply click the QR code icon on the top right of your COLX mobile wallet and allow them to scan your QR code and pay you. ", "Your funds will show instantly once your customer pays you, as long as your wallet is completely synchronized. ", "If you aren’t in sync yet don’t worry your funds will show up the second you are!", "\n\nTo ensure that you can accept and represent COLX to the fullest capacity, once you decide to integrate COLX in your store, our team will send you a complete package which will include — A COLX T-shirt, Business Ambassador status on our website, COLX printable stickers, Brochures, Business cards and 50,000 COLX coins (subject to change as the price fluctuates)…..Here’s your chance to be part of something colossal!" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0070921985815602835, 0.0047169811320754715, 0.02197802197802198, 0, 0, 0.006993006993006993, 0, 0, 0, 0.004347826086956522, 0.001876172607879925, 0, 0, 0, 0 ]
0.003134
5
[ "<?", "php\n\nnamespace LaravelFCM\\Message;\n\n/**\n * Class PayloadDataBuilder.", "\n *\n * Official google documentation :\n *\n * @link http://firebase.google.com/docs/cloud-messaging/http-server-ref#downstream-http-messages-json\n */\nclass PayloadDataBuilder\n{\n /**\n * @internal\n *\n * @var array\n */\n protected $data;\n\n /**\n * add data to existing data.", "\n *\n * @param array $data\n *\n * @return PayloadDataBuilder\n */\n public function addData(array $data)\n {\n $this->data = $this->data ?: [];", "\n\n $this->data = array_merge($data, $this->data);\n\n return $this;\n }\n\n /**\n * erase data with new data.", "\n *\n * @param array $data\n *\n * @return PayloadDataBuilder\n */\n public function setData(array $data)\n {\n $this->data = $data;\n\n return $this;\n }\n\n /**\n * Remove all data.", "\n */\n public function removeAllData()\n {\n $this->data = null;\n }\n\n /**\n * return data.", "\n *\n * @return array\n */\n public function getData()\n {\n return $this->data;\n }\n\n /**\n * generate a PayloadData.", "\n *\n * @return PayloadData new PayloadData instance\n */\n public function build()\n {\n return new PayloadData($this);\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0, 0, 0.013468013468013467, 0.011764705882352941, 0, 0.00909090909090909, 0, 0.0136986301369863, 0.020134228187919462 ]
0.007573
5
[ "ABSTRACT This request is for five years of continuing support for the Symposium on Research in Child Language Disorders (SRCLD) held annually at the University of Wisconsin-Madison. ", "Funds will provide travel and per diem for invited speakers, travel support for students presenting posters, administrative support for maintaining and updating the database, support for website development, program design and printing and supplies. ", "The excellence of the SRCLD has been documented in several areas including uniqueness, quality of past programs, attendees, student participation, program growth, and the products resulting from the meetings over the past 30 years. ", "The Symposium is the only national conference devoted solely to language disorders research. ", "Over the past 30 years this meeting has achieved the distinction among child language researchers as a high quality scientific meeting fostering research development among professional researchers and doctoral students in training. ", "Past programs have been uniformly of high quality, featuring five to seven invited plenary presentations by prominent researchers and have included increasing numbers of research papers making important contributions to the field. ", "Progress since the last grant began in 2005 includes: 1) an expanded program with over 120 poster presentations and six invited state-of-the-art plenary sessions at the 2009 meeting; 2) maintenance of the Elizabeth Bates Memorial Lecture series; 3) support of an average of 36 students during the last five years (up from 22 students in 2004) through NIH student travel funds and private donations, with student travel award recipients consisting of 21% under- represented minorities and 85% women; 4) continued advances in the website which features online submission and registration; and 5) increased international participation by researchers studying children learning a variety of languages, representing an average of 13 different countries each year during the last grant period." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0.01098901098901099, 0, 0, 0.010752688172043012, 0, 0, 0.0025412960609911056 ]
0.003469
5
[ "Buffer credits\n\nBuffer credits, also called buffer-to-buffer credits (BBC) are used as a flow control method by Fibre Channel technology and represent the number of frames a port can store. ", "\n\nEach time a port transmits a frame that port's BB Credit is decremented by one; for each R_RDY received, that port's BB Credit is incremented by one. ", "If the BB Credit is zero the corresponding node cannot transmit until an R_RDY is received back.", "\n\nThe benefits of a large data buffer are particularly evident in long distance applications, when operating at higher data rates (2Gbit/s, 4Gbit/s), or in systems with a heavily loaded PCI bus.", "\n\nSee also\nFibre Channel\nHost adapter\n\nCategory:Fibre Channel" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.010526315789473684, 0.013157894736842105, 0.010416666666666666, 0.005154639175257732, 0.03278688524590164 ]
0.014408
5
[ "The epidemiological feedbacks critical to the evolution of host immunity.", "\nWe examine in detail how epidemiological feedbacks combine with costs and benefits to determine the evolution of resistance by systematically analysing continuously stable strategies (CSS) for different host-parasite frameworks. ", "The mode of resistance (innate versus acquired), the nature of the host (i.e. life-history and immunological memory) and the nature of the disease (effects on fertility or mortality) all impact on the feedbacks that are critical to the evolution of resistance. ", "By identifying relationships between CSS investment and the underlying epidemiological feedback for each mode of resistance in each framework, we distil complex feedbacks into simple combinations of selection pressures. ", "When the parasite does not affect fertility, CSS investment reflects only the benefit of resistance and we explain why this is markedly different for innate and acquired resistance. ", "If infection has no effect on host fertility, CSS investment in acquired immunity increases with the square of disease prevalence. ", "While in contrast for evolving innate resistance, CSS investment is greatest at intermediate prevalence. ", "When disease impacts fertility, only a fraction of the host population reproduce, and this introduces new ecological feedbacks to both the cost of resistance and the damage from infection. ", "The multiple feedbacks in this case lead to the alternative result that the higher the abundance of infecteds, the higher the investment in innate resistance. ", "A key insight is that maximal investment occurs at intermediate lifespans in a range of different host-parasite interactions, but for disparate reasons which can only be understood by a detailed analysis of the feedbacks. ", "We discuss the extension of our approach to structured host populations and parasite community dynamics." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.004347826086956522, 0, 0.004545454545454545, 0.005494505494505495, 0.007633587786259542, 0.009523809523809525, 0, 0, 0, 0 ]
0.002868
5
[ "Q:\n\nCutting paper (\"feed and cut\") with GDI?", "\n\nMany printers have a \"feed and cut\" or \"cut paper\" command (I'm talking about POS - printers here).", "\nSince using POS.NET is not always possible (horrific driver incompatibilities) and GDI can do so much more, we would like to utilize the paper cutter also when printing using GDI.", "\nIs there a way to do so? ", "Possibly when issuing EndDocument()?", "\nOr maybe even from .NET?", "\n\nA:\n\nGDI and even the abstract Windows printing model are probably not going to help you here. ", "You're going to have to send the feed and cut command to the printer in the language that it expects to typically receive data.", "\nFor example, an Epson TM-T88III thermal receipt printer speaks the ESC/POS language natively, not a sequence of GDI or PCL commands. ", "However, most of these printers do come with printer drivers that make Windows see them as regular GDI printers. ", "The way these drivers typically work is that they rasterize all of the GDI commands into one big bitmap in software, and then dole out the bitmap to the printer for printing via its native-language \"print the bit-image\" command. ", "This usually has less-than-desirable effects:\n\nIt is much less efficient (in sense of time required and data transmitted) to send a lot of bitmap data to the printer than a sequence of binary commands that it knows how to interpret. (", "Would you rather send an image of text to print, or just the actual text and a font size specification? ", "Analogies with HTML/CSS vs. an image of text.)", "\nThese printers typically have low resolutions and are monochrome (that is, all black or all white, no grayscale or color). ", "Their pre-loaded fonts are designed to work well under these limitations for crisp, clear rendering. ", "By rasterizing to a bitmap, we lose this careful design as pixels are snapped and rounded off of the grid, resulting in jagged text rendering on the actual printout. ", "If you're trying to draw something that's really sensitive to this kind of rounding, like a barcode, you're SOL, unless you're painstakingly keeping the DPI of the printer device context in mind while working with GDI.", "\n\nFor example, here is a snippet of code from an extensive example on my usually-irrelevant blog. ", "You can see near the end how I fill the BinaryWriter with the necessary sequence of bytes that equals the \"feed paper and cut\" command on our Epson thermal receipt printer (AsciiControlChars is just a static class with constants):\n using (var ms = new MemoryStream())\n using (var bw = new BinaryWriter(ms))\n {\n // Reset the printer bws (NV images are not cleared)\n bw.", "Write(AsciiControlChars.", "Escape);\n bw.", "Write('@');\n\n // Render the logo\n RenderLogo(bw);\n\n // Feed 3 vertical motion units and cut the paper with a 1 point cut\n bw.", "Write(AsciiControlChars.", "GroupSeparator);\n bw.", "Write('V');\n bw.", "Write((byte)66);\n bw.", "Write((byte)3);\n\n bw.", "Flush();\n\n return ms.", "ToArray();\n }\n\nYou can then just send the bytes directly to the printer as a RAW document, either using the code at the end of that article, which works against various Win32 printer functions, or Microsoft's RawPrinterHelper class.", "\nYou'll need to look up the commands specific for your printer. ", "Chances are that its not too different from the one that you see here: POS languages are beginning to standardize, but that's also like saying SQL is a standard--mutually intelligible by humans but not really interoperable without some adjustments.", "\nIf you really still want to use GDI, you can print the GDI document in the usual way to the printer (again, assuming that a GDI printer driver exists, which it probably does), and then issue a second, small, RAW document to the printer that contains the native feed and cut command. (", "Alternatively, some of the GDI printer drivers let you specify \"always cut after printing a document\" right in the Printers control panel--but good luck accessing that driver feature in a well-documented fashion programmatically!)", "\nHope this helps to paint a picture of GDI's relationship to POS printers.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.005555555555555556, 0, 0.027777777777777776, 0, 0, 0, 0.014925373134328358, 0, 0.004366812227074236, 0, 0, 0, 0, 0, 0, 0, 0, 0.004866180048661801, 0.041666666666666664, 0, 0.005917159763313609, 0.041666666666666664, 0, 0.037037037037037035, 0, 0, 0, 0.008368200836820083, 0, 0.004032258064516129, 0.007017543859649123, 0.004347826086956522, 0.013513513513513514, 0 ]
0.006141
5
[ "List of drugs: Pi\n\n\n\npi\n\npib\npibaxizine (INN)\npibecarb (INN)\npiberaline (INN)\npibutidine (INN)\n\npic-pid\npicafibrate (INN)\npicartamide (INN)\npicenadol (INN)\npicilorex (INN)\npiclamilast (INN)\npiclonidine (INN)\npiclopastine (INN)\npicloxydine (INN)\npicobenzide (INN)\npicodralazine (INN)\npicolamine (INN)\npiconol (INN)\npicoperine (INN)\npicoplatin (USAN)\npicoprazole (INN)\npicotrin (INN)\npicumast (INN)\npicumeterol (INN)\npidobenzone (INN)\npidolacetamol (INN)\npidolic acid (INN)\npidotimod (INN)\n\npif-pim\npifarnine (INN)\npifenate (INN)\npifexole (INN)\npiflutixol (INN)\npifonakin (INN)\npifoxime (INN)\npiketoprofen (INN)\npildralazine (INN)\nPilopine HS\npilsicainide (INN)\npimavanserin tartrate (USAN)\npimeclone (INN)\npimefylline (INN)\npimelautide (INN)\npimetacin (INN)\npimethixene (INN)\npimetine (INN)\npimetremide (INN)\npimilprost (INN)\npiminodine (INN)\npimobendan (INN)\npimonidazole (INN)\npimozide (INN)\n\npin-pio\npinacidil (INN)\npinadoline (INN)\npinafide (INN)\npinaverium bromide (INN)\npinazepam (INN)\npincainide (INN)\nPindac\npindolol (INN)\npinolcaine (INN)\npinoxepin (INN)\npioglitazone (INN)\n\npip\n\npipa-pipe\npipacycline (INN)\npipamazine (INN)\npipamperone (INN)\npipazetate (INN)\npipebuzone (INN)\npipecuronium bromide (INN)\npipemidic acid (INN)\npipenzolate bromide (INN)\npipequaline (INN)\npiperacetazine (INN)\npiperacillin (INN)\npiperamide (INN)\npiperazine calcium edetate (INN)\npiperidolate (INN)\npiperocaine (INN)\npiperoxan (INN)\npiperylone (INN)\npipethanate (INN)\n\npipo-pipr\npipobroman (INN)\npipoctanone (INN)\npipofezine (INN)\npiposulfan (INN)\npipotiazine (INN)\npipoxizine (INN)\npipoxolan (INN)\nPipracil\npipradimadol (INN)\npipradrol (INN)\npipramadol (INN)\npipratecol (INN)\npiprinhydrinate (INN)\npiprocurarium iodide (INN)\npiprofurol (INN)\n\npiq\npiquindone (INN)\npiquizil (INN)\n\npir\n\npira-pirf\npiracetam (INN)\npiragliatin (USAN)\npirandamine (INN)\npirarubicin (INN)\npiraxelate (INN)\npirazmonam (INN)\npirazofurin (INN)\npirazolac (INN)\npirbenicillin (INN)\npirbuterol (INN)\npirdonium bromide (INN)\npirenoxine (INN)\npirenperone (INN)\npirenzepine (INN)\npirepolol (INN)\npiretanide (INN)\npirfenidone (INN)\n\npiri-pirn\npiribedil (INN)\npiridicillin (INN)\npiridocaine (INN)\npiridoxilate (INN)\npiridronic acid (INN)\npirifibrate (INN)\npirinidazole (INN)\npirinixic acid (INN)\npirinixil (INN)\npiriprost (INN)\npiriqualone (INN)\npirisudanol (INN)\npiritramide (INN)\npiritrexim (INN)\npirlimycin (INN)\npirlindole (INN)\npirmagrel (INN)\npirmenol (INN)\npirnabin (INN)\n\npiro-pirt\npiroctone (INN)\npirodavir (INN)\npirodomast (INN)\npirogliride (INN)\npiroheptine (INN)\nPirohexal-D (Hexal Australia)\npirolate (INN)\npirolazamide (INN)\npiromidic acid (INN)\npiroxantrone (INN)\npiroxicam (INN)\npiroxicillin (INN)\npiroximone (INN)\npirozadil (INN)\npirprofen (INN)\npirquinozol (INN)\npirralkonium bromide (INN)\npirsidomine (INN)\npirtenidine (INN)\n\npit-piz\npitenodil (INN)\nPitocin\npitofenone (INN)\npitolisant (INN)\npitrakinra (INN)\nPitressin Tannate\npituxate (INN)\npivagabine (INN)\npivampicillin (INN)\npivenfrine (INN)\npivmecillinam (INN)\npivopril (INN)\npivoxazepam (INN)\npixantrone dimaleate (USAN)\npizotifen (INN)" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.053833605220228384 ]
0.053834
5
[ "WASHINGTON (Reuters) - Top Trump administration officials will hold a rare briefing on Wednesday at the White House for the entire U.S. Senate on the situation in North Korea, senior Senate aides said on Monday.", "\n\nAll 100 senators have been asked to the White House for the briefing by Secretary of State Rex Tillerson, Secretary of Defense Jim Mattis, Director of National Intelligence Dan Coats and General Joseph Dunford, chairman of the Joint Chiefs of Staff, the aides said.", "\n\nWhile top administration officials routinely travel to Capitol Hill to address members of Congress on foreign policy and national security matters, it is unusual for the entire 100-member Senate to go to such an event at the White House, and for those four top officials to be involved.", "\n\nU.S. officials have expressed mounting concern over North Korea's nuclear and missile tests, and its threats to attack the United States and its Asian allies.", "\n\nPresident Donald Trump criticized North Korea's \"continued belligerence\" and said its actions were destabilizing during a telephone call with Chinese President Xi Jinping on Sunday, the White House said.", "\n\nThe briefing will take place at 3 p.m. EDT (1900 GMT).", "\n\nHouse aides said they were working with the White House to set a similar briefing for members of the House of Representatives.", "\n\nRelated:\n\nFor more news videos visit Yahoo View, available now on iOS and Android.", "\n\n(Reporting by Patricia Zengerle; Editing by Jeffrey Benkoe)" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.018957345971563982, 0.0299625468164794, 0.010416666666666666, 0, 0.014634146341463415, 0, 0.0234375, 0.011904761904761904, 0.03278688524590164 ]
0.015789
5
[ "Cost of Living: Rents in various cities of the world.", "\n\nRent Comparision.", "\n\nCame across this data-sheet, from Numbeo and WalletWyse. ", "Just a beautiful piece fo work show the various cities of the world and the average cost of renting an apartment in these cities. ", "Click to enlarge.", "\n\nFooter\n\nRecent Posts\n\nAbout Faisal Khan\n\nFaisal Khan is a banking/payments consultant specializing in cross-border payments and is a digital money evangelist. ", "He is the co-host of Around The Coin, a weekly podcast on Payments & Fintech with over 18,000+ listeners. ", "Mr. Khan is a talent scout for Series A & B financing for various fintech VCs/funds. ", "He is also a frequent contributor to popular Q&A site Quora where he has been a Top Writer 6 consecutive years." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.01694915254237288, 0, 0, 0.006211180124223602, 0.009433962264150943, 0.023529411764705882, 0.018018018018018018 ]
0.008238
5
[ "What can we do to have them added? ", "Bob, said he would like them to be able to \ntrade online. ", "\n\n\n\nFrom: Tana Jones on 07/27/2000 10:21 AM\nTo: Jarrod Cyprow/HOU/ECT@ECT, Michelle Bruce/HOU/ECT@ECT\ncc: \nSubject: Click Paper Approvals for 7/25/00\n\nAttached is the referenced list. ", " The Bakersfield California is approved to \nonly do newsprint commodity swaps and options. ", " Therefore, I have turned them \ndown to trade the current products we have available online. ", " As our product \nbase expands, we can send them through again as an amended counterparty if we \noffer newprint commodity swaps and options online." ]
{ "pile_set_name": "Enron Emails" }
[ 0, 0.017241379310344827, 0.016216216216216217, 0.01098901098901099, 0, 0 ]
0.007408
5
[ "/*\n * Copyright (C) Lightbend Inc. <https://www.lightbend.com>\n */\n\npackage javaguide.advanced.extending;\n\nimport org.junit.", "Test;\n\nimport play.", "Application;\nimport play.inject.guice.", "GuiceApplicationBuilder;\nimport play.libs.ws.", "WSClient;\n\nimport static org.hamcrest.", "CoreMatchers.*;", "\nimport static org.junit.", "Assert.*;", "\n\npublic class JavaExtendingPlay {\n\n @Test\n public void testModule() throws Exception {\n // #module-class-binding\n Application application = new GuiceApplicationBuilder().bindings(new MyModule()).build();\n // #module-class-binding\n MyApi api = application.injector().instanceOf(MyApi.class);\n\n assertNotNull(api);\n }\n\n @Test\n public void testOverride() throws Exception {\n // #builtin-module-overrides\n Application application = new GuiceApplicationBuilder().overrides(new MyWSModule()).build();\n // #builtin-module-overrides\n WSClient wsClient = application.injector().instanceOf(WSClient.class);\n\n assertThat(wsClient, instanceOf(MyWSClient.class));\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.008064516129032258, 0, 0, 0.022222222222222223, 0.02631578947368421, 0, 0, 0.1111111111111111, 0.004329004329004329 ]
0.019116
5
[ "Notes\n\nIn the main text I argue that there are many consequences of axiom systems that are quite independent of their details. ", "But in giving the specific axiom systems that have been used in traditional mathematics one needs to take account of all sorts of fairly complicated details.", "\n\nAs indicated by the tabs in the picture, there is a hierarchy to axiom systems in traditional mathematics, with those for basic and predicate logic, for example, being included in all others. (", "Contrary to usual belief my results strongly suggest however that the presence of logic is not in fact essential to many overall properties of axiom systems.)", "\n\nAs discussed in the main text (see also page 1155) one can think of axioms as giving rules for transforming symbolic expressions—much like rules in Mathematica. ", "And at a fundamental level all that matters for such transformations is the structure of expressions. ", "So notation like a+b and a×b, while convenient for interpretation, could equally well be replaced by more generic forms such as f[a, b] or g[a, b] without affecting any of the actual operation of the axioms.", "\n\nMy presentation of axiom systems generally follows the conventions of standard mathematical literature. ", "But by making various details explicit I have been able to put all axiom systems in forms that can be used almost directly in Mathematica. ", "Several steps are still necessary though to get the actual rules corresponding to each axiom system. ", "First, the definitions at the top of page 774 must be used to expand out various pieces of notation. ", "In basic logic I use the notation u == v to stand for the pair of rules u -> v and v -> u. (Note that == has the precedence of -> not ==.) ", "In predicate logic the tab at the top specifies how to construct rules (which in this case are often called rules of inference, as discussed on page 1155). ", "x_ \\[And] y_ -> x_ is the modus ponens or detachment rule (see page 1155). ", "x_ -> ForAll[y_, x_] is the generalization rule. ", "x_ -> x_ \\[And] #& is applied to the axioms given to get a list of rules. ", "Note that while == in basic logic is used in the underlying construction of rules, == in predicate logic is just an abstract operator with properties defined by the last two axioms given.", "\n\nAs is typical in mathematical logic, there are some subtleties associated with variables. ", "In the axioms of basic logic literal variables like a must be replaced with patterns like a_ that can stand for any expression. ", "A rule like a_ \\[And] (b_ \\[Or] \\[Not]b_) -> a can then immediately be applied to part of an expression using Replace. ", "But to apply a rule like a_ -> a \\[And] (b \\[Or] \\[Not]b) requires in effect choosing some new expression for b (see page 1155). ", "And one way to represent this process is just to have the pattern a_ -> a_ \\[And] (b_ \\[Or] \\[Not]b_) and then to say that any actual rule that can be used must match this pattern. ", "The rules given in the tab for predicate logic work the same way. ", "Note, however, that in predicate logic the expressions that appear on each side of any rule are required to be so-called well-formed formulas (WFFs) consisting of variables (such as a) and constants (such as 0 or \\[EmptySet]) inside any number of layers of functions (such as +, ·, or \\[FilledUpTriangle]) inside a layer of predicates (such as == or \\[Element]) inside any number of layers of logical connectives (such as \\[And] or \\[Implies]) or quantifiers (such as ForAll or Exists). (", "This setup is reflected in the grammar of the Mathematica language, where the operator precedences for functions are higher than for predicates, which are in turn higher than for quantifiers and logical connectives—thus yielding for example few parentheses in the presentation of axiom systems here.)", "\n\nIn basic logic any rule can be applied to any part of any expression. ", "But in predicate logic rules can be applied only to whole expressions, always in effect using Replace[expr, rules]. ", "The axioms below (devised by Matthew Szudzik as part of the development of this book) set up basic logic in this way." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0.004830917874396135, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008403361344537815, 0, 0, 0, 0.0020491803278688526, 0.0033333333333333335, 0, 0.008620689655172414, 0.008547008547008548 ]
0.001278
5
[ "Yesterday there was big news about David Yates and the development of a new Doctor Who film, which the director is overseeing with the BBC. ", "That project is in the very early stages, with a writer yet to be hired. ", "We’re not going to see that new version of Doctor Who for a couple years yet.", "\n\nAnd Warner Bros., for which Yates made the last four Harry Potter films, is still trying to keep the director around. ", "He was briefly set to make an adaptation of Stephen King’s The Stand, before that project was taken over by Ben Affleck, and there are other WB films for which Yates name has been mentioned. ", "Now Warners wants Yates to make The Imitation Game, a film about the mathematician Alan Turing, who was instrumental in WWII codebreaking efforts and, more famously, was a key mind in the development of computer science and artificial intelligence. ", "He was also a persecuted homosexual who reportedly took his own life by eating an apple poisoned with cyanide. ", "The script is by Graham Moore and is based on the book Alan Turing: The Enigma, by Andrew Hodges. ", "When Warner Bros. bought the script last month it was reportedly because Leonardo DiCaprio was interested in playing Turing. ", "At this point no casting is announced, so that isn’t something we’re going to bet on just yet.", "\n\nAlan Turing (1912-54) was a British mathematician who made history. ", "His breaking of the German U-boat Enigma cipher in World War II ensured Allied-American control of the Atlantic. ", "But Turing’s vision went far beyond the desperate wartime struggle. ", "Already in the 1930s he had defined the concept of the universal machine, which underpins the computer revolution. ", "In 1945 he was a pioneer of electronic computer design. ", "But Turing’s true goal was the scientific understanding of the mind, brought out in the drama and wit of the famous “Turing test” for machine intelligence and in his prophecy for the twenty-first century. ", "Drawn in to the cockpit of world events and the forefront of technological innovation, Alan Turing was also an innocent and unpretentious gay man trying to live in a society that criminalized him. ", "In 1952 he revealed his homosexuality and was forced to participate in a humiliating treatment program, and was ever after regarded as a security risk. ", "His suicide in 1954 remains one of the many enigmas in an astonishing life story." ]
{ "pile_set_name": "Pile-CC" }
[ 0.014285714285714285, 0, 0, 0.016666666666666666, 0.02617801047120419, 0.004016064257028112, 0, 0.030612244897959183, 0.016, 0, 0.014285714285714285, 0.008849557522123894, 0, 0, 0, 0, 0.005076142131979695, 0, 0 ]
0.007156
5
[ "---\nabstract: 'We propose a formal framework that supports a model of agent-based Virtual Organisations (VOs) for service grids and provides an associated operational model for the creation of VOs. ", "The framework is intended to be used for describing different service grid applications based on multiple agents and, as a result, it abstracts away from any realisation choices of the service grid application, the agents involved to support the applications and their interactions. ", "Within the proposed framework VOs are seen as emerging from societies of agents, where agents are abstractly characterised by goals and roles they can play within VOs. ", "In turn, VOs are abstractly characterised by the agents participating in them with specific roles, as well as the workflow of services and corresponding contracts suitable for achieving the goals of the participating agents. ", "We illustrate the proposed framework with an earth observation scenario.'", "\nauthor:\n- 'Jarred McGinnis, Kostas Stathis'\n- Francesca Toni\nbibliography:\n- 'argugridbibs.bib'\ntitle: A Formal Framework of Virtual Organisations as Agent Societies\n---\n\nIntroduction {#sec:intro}\n============\n\nThe basic definition of Virtual Organisation (VO) is simple enough: organisations and individuals who bind themselves dynamically to one another in order to share resources within temporary alliances [@FosterKessel01]. ", "Several issues arise at various levels of abstraction when attempting to describe the alliance, the binding between members and the sharing of resources. ", "We focus on an abstract, high-level description of VOs and their lifecycle and define a formal model for VOs and their formation that can guide their realisation. ", "Like others (e.g. [@Matos; @brainbrawn; @patel-2005]) we focus on VOs that can be formed and managed automatically by intelligent agents. ", "To support the envisaged automation agents [*represent*]{} organisations and individuals by providing and requesting resources/services, by [*wrapping*]{} them or by connecting to their published interface. ", "Agents are designed to incorporate the requirements of these organisations and individuals and exhibit some [*human aspects*]{} while supporting the decision-making processes automatically. ", "Unlike existing work, we abstract away from concrete realisation choices of VOs so that our models can be applicable to a range of service grid applications. ", "Instead, the framework focuses on what we believe are likely to be the [*essential elements*]{} of VOs and ignore a number of lower-level aspects that are normally included in reference models for collaborative networks (see  [@ecolead]).", "\n\nAssuming a set of essential elements that are applicable across applications, our representation for the operational aspects of VOs relies upon the notion of [*VO life-cycle*]{}, which reflects the orthodox managerial and technical views of VOs, as proposed by [@appel; @gridbook2; @websiteVO]. ", "This lifecycle can be structured in three main phases: and the *selection of partners*, formation, operation, and dissolution. ", "In this paper we focus on the formation phase with subphases: (i) *initiation*, whereby an initiating agent *identifies the goals* that it cannot achieve in isolation and *discovers the potential partners* who can assist it in achieving those goals; and (ii) *configuration*, involving some form of *negotiation*, trivial or otherwise, and the *selection of partners*, trimmed down from those discovered, who will constitute the members of the VO once it is started. ", "We see a VO abstractly as a tuple consisting of *agents* participating in the VO, *roles* they play therein, *goals* the VO is set to achieve, the *workflow* of services being provided within the VO, and *contracts* associated with these services, to which agents are meant to conform. ", "We then define the formation phase of a VO as a transition system between tuples providing partial approximations of the resulting VO. ", "Within our framework and for the purposes of VOs, agents are seen as existing within *agent societies*: we define these abstractly as our starting point. ", "VOs then emerge within societies as a result of interactions amongst agents, as determined by the roles they play.", "\n\nThroughout the paper we shall exemplify the proposed framework for VOs by showing how it can be applied to the following simple but realistic *earth obsevation scenario*.", "\n\n> A government official is asked to investigate the detection of an offshore oil spill. ", "As the ministry where the official works does not have direct access to earth observation facilities, the official typically follows a procedure. ", "The first step of such a procedure is for the official to call a number of companies that control satellites which may provide suitable images. ", "Satellites may have different orbits, sensors, capabilities and costs, so the official needs to discuss with satellite companies in order to select their most appropriate services for the task at hand. ", "Satellites have names such as *Envisat*, *ERS-1*, and *RADARSAT*.", "\n>\n> As the satellite output is normally provided in the form of raw images, not immediately suitable for the detection of an oil spill, the second step of the procedure involves the official calling companies that provide processing services by appropriate software, for example for *format conversion* (into formats such as TIFF, JPEG, etc), *reprojection* (into different coordinate systems), *pattern recognition* (to detect in the environment objects such as ships and buildings or features such as oil spills). ", "After a post-processing image company is selected, the output of the satellite is processed by them and the resulting image will allow the official to identify the cause of the oil spill.", "\n\nWe will reinterpret this scenario by assuming that the government official is a user of an agent-oriented service grid. ", "In such a grid, services such as oil spill detection and image processing are automatically discovered and negotiated by software agents that act on behalf of people and/or organisations. ", "In this interpretation, the scenario will result into the formation of a VO that consists of the following parties: the *ministry official* and his agent acting as [*service requester*]{}; the *satellite company*, the *post-processing company*, and their agents acting as [*service providers*]{}. ", "The agents negotiate over the two requested services and orchestrate them into a [*workflow*]{} where the post-processing of the image data requires that the image data is created first. ", "To guarantee the properties and delivery of the services provided by the satellite company and the post-processing company and to ensure those companies are compensated for their efforts, all the parties are involved into signing a [*contract*]{}, which binds parties, in particular establishing their roles within the VO and defining a [*Service Level Agreement*]{} (SLA). ", "An SLA specifies details of the service provision such as the resolution of images, quality threshold, and time of delivery. ", "Once the services are delivered via the execution of the workflow, the high-level goal of the user is satisfied and the VO is dissolved.", "\n\nThe paper is organised as follows. ", "Section \\[sec:ag soc\\] presents the formalisation of the required abstractions, namely: agents, their roles and social norms specified as interaction protocols in an agent society, the services/resources available in that society, how these services can be combined in workflows, and how interactions in these workflows can be regulated by agreed contracts. ", "These components will become the constituents of the VOs and will be produced by a VO’s formation phase. ", "This phase is defined as a state transition system that will be formalised in section \\[sec:def\\]. ", "Finally, in section \\[sec:conc\\] we summarise our work and we outline our plans for the future.", "\n\nAgent Societies {#sec:ag soc}\n===============\n\nFor the purposes of VOs, agents “representing” services can be seen as existing within a [*society*]{} (of agents). ", "VOs emerge as a result of interactions amongst the agents in this society. ", "In other words, the agent society can be seen as the breeding environment [@breeding] for VOs. ", "We will assume that an agent society exists prior to decisions and interactions leading to VOs. ", "However, typically this society is intended to be “virtual”, in that it is the implicit result of the existence of agents and services within an agent-enabled grid/service-oriented architecture.", "\n\nAn agent society is characterised by roles that agents can adopt, services available to and controlled by agents in the society, possible combinations of these services within workflows, and possible contracts between agents. ", "Formally, $AgentSociety = \\soc$. The elements of the $AgentSociety$ can be described as follows.", "\n\n- $Agents$ is a (finite) set of agents, $\\{A_1, \\ldots, A_n \\}$, with $n \\geq 2$; each agent is equipped with a set of individual goals, an evaluation mechanism, and a set of roles it can cover (see section \\[sec:agents\\]).", "\n\n- $Services$ is a (non-empty and finite) set of services represented by agents (see section \\[sec:services\\]).", "\n\n- $Roles$ is a (non-empty and finite) set of roles that agents can play within the society as well as the VOs, once they have been created. ", "We require that there are roles for $requester(s)$ and $provider(s)$ in $Roles$, for all $s \\in Services$; roles are associated with interaction protocols (see section \\[sec:protocols\\]).", "\n\n- $Workflows$ is a (non-empty) set of possible combinations of services in $Services$ (see section \\[sec:wf\\]).", "\n\n- $Contracts$ is a (non-empty) set of possible combinations of agents (in $Agents$), roles (in $Roles$), and workflows (in $Workflows$) as terms in a contract (see section \\[sec:con\\]).", "\n\nNote that, in addition to roles for $requester$ and $provider$ of all available services in the society, $Roles$ may also include roles for a $broker$ that provides information on how to obtain or use some services, an $arbitrator$ for making sure that interactions for services are suitable regulated, and so on. ", "Finally, note that there are no goals of the agent society itself, and goals exist within agents only. ", "However, VOs are goal-oriented: we will see, in section \\[sec:def\\], that the goals of VOs originate from those of individual agents.", "\n\nThe components of an agent society will be defined using several abstract underlying languages. ", "Here we single out these languages. ", "We adopt the following conventions: variables start with capital letters; constants start with lower-case letters or numbers; ‘\\_’ stands for the anonymous variable.", "\n\nWe use a set of [agent identifiers]{}, that serve as unique “names” to address agents in the society, e.g. to support communication. ", "An example is $satERS1Ag$, representing the satellite [*ERS-1*]{}.", "\n\nWe use a set of [*role labels*]{} for the definition of $Roles$. We require that $requester(s)$ and $provider(s)$ belong to , for all $s \\in Services$.\n\nWe use [*contracts identifiers*]{}, , univocally identifying and distinguishing contracts in $Contracts$.\n\nWe will assume some given, shared [*ontology*]{} , which for simplicity we think of as a set of atomic and ground propositions.[^1] will include (i) (an abstract representation of) all services in $Services$, (ii) generic infrastructure knowledge, e.g. for querying registries holding information about agents and the services they provide. ", "An example of the latter may be $provides(X,satImage(in,out))$ instantiating $X$ to $satERS1Ag$, representing that the agent named $satERS1Ag$ represents a provider of service $satImage(in,out) \\in Services$.\n\nWe will see that VOs emerge in an agent society by communicative interaction amongst its members. ", "As usual, communicating agents will share a [*communication language*]{} that will act as a “lingua franca” amongst agents. ", "We thus assume as given a language of locutions. ", "As conventional, locutions consist of a [*performative*]{} and a [*content*]{}. ", "Examples of locutions in may be $request(s)$ and $accept(s)$, where $s \\in Services$ is the content.", "\n\nEach individual agent is equipped with an [*internal language*]{} to express its knowledge/beliefs and goals. ", "Since the goals of VOs are derived from the individual agents’ goals, we need to assume that the agents share at least a fragment of their internal languages. ", "This fragment can be also used to express, e.g., conditions in protocol clauses (see section \\[sec:protocols\\]). ", "We will refer to this shared fragment of all agents’ internal languages as . ", "We require that the sentence $true$ is contained in this language, as well as sentences built using the usual connectives $\\wedge$ and $\\neg$. We assume that this language is propositional. ", "Examples of sentences in may be $toBuy(satImage(in,out))$. Sentences are meant to be evaluated using the agents’ internal evaluation mechanisms (see section \\[sec:agents\\]).", "\n\nNote that there are no eligibility conditions to choose which agents enter the society, as we assume an open setting where agents can freely circulate. ", "In this context, VOs provide a mechanism for defining which agents can be suitably put together to help solving each others’ goals.", "\n\nServices {#sec:services}\n--------\n\n[*Concrete services*]{}, that can be executed by their providers, are described using sentences in . ", "Examples of concrete services are $satImage(in,out)$ with $in$ and $out$ representing the inputs and outputs for the service (e.g. $in$ may be [$[{38.0},{-9.4},1000, 500, 5, optical,3]$]{} and $out$ may be [$results.data$]{}) [^2] and some service for detecting oil-spills $detectOilSpills([a,5],b)$[^3].", "\n\nIn order to accommodate negotiation for the provision of (concrete) services during the formation of VOs, it is useful that agents are able to talk about [*partially uninstantiated*]{} and *abstract* services, before they commit to any concrete instantiation (actually, it may happen that this instantiation can only be provided at the time of execution of the services). ", "For example, an agent may require, for some given $a$, $detectOilSpill([a,T],B)$, where the threshold $T$ and the output processed data image $B$ are as yet unspecified ($T$ may be associated with constraints, e.g. $T \\geq 5$).", "\n\nIn summary, we adopt the following description of services:\n\n ----------------------- --- ------------------------------------------------------\n $serviceName(In,Out)$ : uninstantiated service ([*abstract service*]{});\n $serviceName(in,Out)$ : partially instantiated service;\n $serviceName(In,out)$ : partially instantiated service;\n $serviceName(in,out)$ : fully instantiated service ([*concrete service*]{});\n $serviceName$ = predicate , with $serviceName(i,o) \\in \\onto$,\n for constants or lists of constants $i,o$;\n $in,out$ = constants or lists of constants;\n $In,Out$ = variables or lists of variables.", "\n ----------------------- --- ------------------------------------------------------\n\nThe $serviceName$ can be seen as the “type” of service being provided by $serviceName(in,out)$. We will often refer to an abstract service $serviceName(In,Out)$ simply as $serviceName$. Also, an abstract or partially instantiated service can be seen logically as representing a disjunction of concrete services (one for each possible instantiation). ", "We could thus see the process of negotiating an instantiation of an abstract or partially instantiated service as the process of negotiating a concrete service in a set of alternatives (the disjuncts).", "\n\nFor our scenario, we need four types of services, namely $satImage$ and three processing services (with $serviceName$ one of $formatConversion$, $reprojection$ and $detectOilSpill$). ", "We have already seen examples of concrete services of type $satImage$ and $detectOilSpill$.\n\nRoles and Protocols {#sec:protocols}\n-------------------\n\nA role is defined as a tuple $\\langle rid , PC \\rangle$ where $rid \\in \\rids$ is the label of the role, and $PC$ is a [*Protocol Clause*]{}, understood in this paper as a (non-empty and finite) set of [*Operations*]{} defined as follows:\n\n ------------- ------- --------------------------------- ------------------------------\n $Operation$ = $\\psi [send(m,i,rid')] \\phi$ (send operation)\n $|$ $\\psi [receive(m,i,rid')] \\phi$ (receive operation)\n $\\psi$ $\\in$ $\\inte \\cup \\onto$ (precondition)\n $\\phi$ $\\in$ $\\inte $ (postcondition)\n $m$ $\\in$ $\\acl$ (locution)\n $i$ $\\in$ (unique identifier of agent)\n $rid' $ $\\in$ (role label)\n ------------- ------- --------------------------------- ------------------------------\n\nIntuitively, each operation has three parts: a locution $m$ in $\\acl$, an identifier $i$ in of the communicative partner (i.e. the intended recipient or the actual sender of message $m$, respectively for $send$ and $receive$), and the identifier $rid'$ of the role that the agent $i$ is intended to be playing when receiving or sending the message (respectively for $send$ and $receive$). ", "An agent can send or receive the locution (according to what the operation specifies) if and only if the evaluation mechanism of the agent evaluates the precondition $\\psi$ to true. ", "Once the message is sent or received, the postcondition $\\phi$ *will automatically hold* (namely the evaluation mechanism of the agent will evaluate this condition positively after the message is sent or received, until further changes). ", "Moreover, when an agent $i'$ playing some role $\\langle rid,PC\\rangle$ sends a locution $send(m,i,rid')$ to some other agent $i$, $i$ receives the message from $i'$ indicating that $i'$ sent it while playing role $rid$: $receive(m,i',rid)$. This message will be “processed” by $i$ using the role with identifier $rid'$.\n\nWe could adopt other formalisms for communication, e.g. non-determinisitc finite-state automata. ", "The reason we have chosen protocol clauses is that this formalism is an abstraction of several existing formalisms for modelling inter-agent communication, e.g. LCC [@dave:iclp] and dialogue constraints [@atal01:negotiation].", "\n\nTo illustrate roles, consider a simple example where an agent playing the role of $requester$ (of some service $S$) sends a $request$ to an agent it believes to be a provider of $S$, and requiring it to be playing the role of $provider$ of $S$. The $provider$ agent replies with $accept$ or $refuse$ depending on whether it is indeed a provider of that service $S$ (and it wants to sell that service) or not (respectively).", "\n\n**\n\n=$\\langle$ requester(S), = { =\\\ntoBuy(S) $\\wedge$ provides(Ag,S) $[$send(request(S), Ag, provider(S))$]$ requested(S,Ag),\\\nrequested(S,Ag) $[$receive(accept, Ag, provider(S))$]$ bought(S),\\\nrequested(S,Ag) $[$receive(refuse, Ag, provider(S))$]$ true\\\n}\\\n$\\rangle$\n\n**\n\n= $\\langle$ provider(S),= { =\\\ntrue $[$ receive(request(S), Ag, requester(S)) $]$ requestedBy(Ag,S),\\\nrequestedBy(Ag,S)$\\wedge$ toSell(S) $[$ send(accept, Ag, requester(S))$]$ sold(S),\\\nrequestedBy(Ag,S)$\\wedge$ $\\neg$ toSell(S) $[$ send(refuse, Ag, requester(S))$]$ true\\\n}\\\n$\\rangle$\n\nIn the two [*protocol clause schemata*]{} above variables [*S*]{} and [*Ag*]{} are used instead of concrete values. ", "These variables are implicitly universally quantified over the appropriate languages.", "\n\nA protocol clause for a role defines the communicative actions for any agent adopting the role. ", "However, protocol clauses typically relate to other protocol clauses and give a global picture of the interaction amongst agents and roles. ", "For the earlier example, the two roles, $requester(S)$ and $provider(S)$, are related to one another to form a simple *negotiation protocol*. ", "Intuitively, a [*protocol*]{} is a (non-empty and finite) set of protocol clauses for roles in $Roles$ that are “related” to one another, possibly indirectly.", "\n\nWith an abuse of notation, we will often refer to a role simply by its identifier and will use the identifier to stand for the corresponding protocol clauses. ", "Moreover, when an agent needs to play the role of $requester$ for any service, we use $requester$ to stand for $requester(s)$ for any service $s \\in Services$. Finally, we use $provider(serviceName)$ to indicate that a service provider can provide all instances of an abstract service $serviceName(In,Out)$ or when we are interested in the provision of some instance of this service without specifying which one.", "\n\nAgents {#sec:agents}\n------\n\nFor the purposes of VOs, an agent can be seen abstractly as a tuple $\\langle i,R,G \\rangle$ where $i \\in \\aids$ is the unique identifier for the agent; $R\\subseteq Roles$ is a (non-empty) set of roles that the agent can play within the society; $G\\subseteq \\inte$ is a (non-empty) set of goals of the agent.", "\n\nAn agent is also equipped with an [*evaluation mechanism*]{} for determining whether (i) preconditions in roles are satisfied, (ii) goals are fulfilled by the agent in isolation. ", "This mechanism is affected by the execution of protocols in that postconditions of protocol clauses are taken into account by this evaluation mechanism (they are satisfied after the protocol clause is executed, until overwritten by further postconditions). ", "We do not include this evaluation mechanism within the representation of an agent in a society as this mechanism is private to agents and different agents may adopt different such mechanisms in general.", "\n\nRoles and goals of an agent $\\langle i,R,G \\rangle$ are inter-related as follows:\n\n- $\\forall r \\in R$, $\\exists g \\in G$ which “enables” $i$ to adopt $r$, namely the need to fulfil $g$ is a precondition for one of the protocol clauses in $r$;\n\n- $\\forall g \\in G$, $\\exists r \\in R$ such that playing the role $r$ gives $i$ a “chance of fulfilling” $g$ namely one of the protocol clauses in $r$ admits the fulfilment of $g$ as one of its postconditions.", "\n\nAs an example, consider the earlier protocol clause for the role $requester(S)$ where [*toBuy(S)*]{} corresponds to a goal and [*bought(S)*]{} corresponds to the goal being fulfilled. ", "Example agents for our scenario are\n\n$\\langle clientAg,\\{requester\\},\\{toBuy(someI), toBuy(someD)\\} \\rangle$\n\n$\\langle satERS1Ag,\\{requester(detectOilSpill),\nprovider(satImage)\\}$, $\\{toSell(someI)\\} \\rangle$\n\n$\\langle detectAg,\\{provider(detectOilSpill)\\},\\{toSell(someD)\\} \\rangle$\n\nwhere $someI$ is of the form $satImage(in,Out)$ and $someD$ is of the form $detectOilSpill([Out,t],Out')$ for some $in$ and $t$ (as discussed earlier). ", "Here, the agent identified by $clientAg$ represents the government ministry and can only play the $requester$ role (for any service), the agent identified by $satERS1Ag$ represents the [*ERS-1*]{} satellite and can play both the $requester$ role for $detectOilSpill$ services and the $provider$ role for $satImage$ services, and the agent identified by $detectAg$ can play only the $provider$ role for $detectOilSpill$ services. ", "The agents’ goals allow them to engage in interactions following the protocols for the roles they are equipped with (see the simple protocol clauses of section \\[sec:protocols\\]).", "\n\nWorkflows {#sec:wf}\n---------\n\nWe see workflows simply as (non-empty) sets of services[^4] possibly annotated with “constraints”, that are sentences in . ", "Services may be abstract, partially instantiated or concrete, as in section \\[sec:services\\]. ", "As an example, consider the annotated workflow (consisting of a single partially instantiated service)\n\n$\\{satImage([{38.0},{-9.4},Res,{500},{5},ST],Out)\\}$ $\\bigcup$ $\\{Res \\in [900,1100], ST \\in \\{radar, optical\\}\\}$\n\nwhere the resolution $Res$ and sensor type $ST$ arguments are constrained within the annotation.", "\n\nWe require that the constraints annotating workflows are satisfiable in . ", "Annotations only make sense for workflows with at least one partially instantiated or abstract service. ", "They are intended to restrict the possible instantiations of the services in the workflow. ", "Typically, as in the example above, they pose restrictions on the variables occurring in the services of the workflow.", "\n\nWe will adopt the following terminology: an [*abstract workflow*]{} is a workflow with at least one abstract or partially instantiated service (with or without annotations); a [*concrete workflow*]{} is a workflow consisting solely of concrete services (without annotations). ", "Also, a concrete workflow may or may not be executable, and that, prior to execution of a workflow, may need to be appropriately set up. ", "In this paper, we focus on the [*formation*]{} phase of VOs and ignore execution issues that may occur in the [*operation*]{} phase.", "\n\nContracts {#sec:con}\n---------\n\nInspired by web service contract standards [@wsagree], we define a contract as $\\langle Cid,Context,SDT,GT \\rangle$ where\n\n- $Cid \\in \\cids$ is a unique identifier for the contract;\n\n- $Context$ indicates all agents bound by the contract (the “contracted parties”) and their role in the contract, formally seen as a set of pairs of the form $(AgentId,AgentRole)$ such that $\\langle AgentId, R, \\_ \\rangle \\in Agents$ and $AgentRole \\subseteq R$;\n\n- $SDT$, the [*Service Description Terms*]{}, is a workflow, consisting of services being contracted;\n\n- $GT$, the [*Guarantee Terms*]{}, is a (possibly empty) set of sentences in that define the assurances with regards to the services described in $SDT$.\n\nThe $GT$ component of a contract may also include rewards/penalties for the contracted parties and refer to roles (and protocols) to be used by agents in the case of exceptions. ", "For example, if blame for failure is disputed, there may be a clause in $GT$ defining a protocol for arbitration.", "\n\nBy definition of $Context$, we require that the contracted parties play, within the contract, some of the roles they are equipped with. ", "We require that there are at least two different agents involved in any contract, and that there is at least one agent playing the role of $requester(s)$ and at least one agent playing the role of $provider(s)$ for some service $s$, namely:\n\n- $\\exists (id1,role1), (id2,role2) \\in Context$ such that $id1 \\neq id2$, and $requester(s) \\in role1$, $provider(s) \\in role2$.\n\nWe exclude the possibility that the same agent may be a provider and a requester for the same service:\n\n- $\\not \\exists (id,role) \\in Context$ such that, for some $s\\in Services$, $\\{requester(s), provider(s) \\} \\subseteq role$.\n\nWe require that for all the services in $SDT$ there exists an agent in $Context$ providing that service:\n\n- $\\forall s\\in SDT$, $\\exists (id,role) \\in Context$ such that $role=provider(s)$.\n\nA simple example of a contract is:\n\n**\n\n= $\\langle$ contrāctX,\\\n{$\\langle$clientAg,{requester(formatConversion)}$\\rangle$, $\\langle$procF, { provider(formatConversion)}$\\rangle$},\\\n{formatConversion(\\[image.jpeg, jpegTOgif\\], imageGIF.gif)},\\\n{dueBy(ImageGIF.gif,1400hrs,12.4.09), priceReduced(ImageGIF,1400hrs,12.4.09,reduction(0.5))}\\\n$\\rangle$\n\nThe above contract, identified as $contractX$, is between $clientAg$ and $procF$ for the delivery of (an instance of) the service $formatConversion$, for converting the file $image.jpeg$ using the operation called $jpegTOgif$. The service has a due delivery date specified using the $dueBy$ predicate. ", "The clause on $priceReduced$ specifies that the price charged will be halved if the provider fails to deliver on time.", "\n\nFrom Agents and Services to the Agent Society\n---------------------------------------------\n\nGiven $Agents$ as in section \\[sec:agents\\] and $Services$ as in section \\[sec:services\\] an agent society “emerges” with:\n\n- $Roles = \\bigcup_{\\langle i,R,G \\rangle \\in Agents} R$ (the possible roles are all roles that agents within the society can play);\n\n- the concrete workflows in $Workflows$ are all possible (non-empty) sets of services, namely $(2^{Services} - \\emptyset) \\subset Workflows$, while the remaining elements of $Workflows$ are abstract, possibly annotated “versions” of these concrete workflows;\n\n- $Contracts$ is built solely from elements of $Workflows$, $Roles$ and $Agents$.\n\nWe require also that each service is “represented” by an agent within the society, in other words the possible services in the society correspond to all services the agents can provide:\n\n- $\\forall s \\in Services$, $\\exists \\langle provider(s),\\_ \\rangle \\in Roles$\n\nHowever, it may be the case that several alternative protocols exist in the society for the same role, namely: $\\langle rid, PC\\rangle$ and $\\langle rid, PC'\\rangle$ both belong to $Roles$ for $PC \\neq PC'$. The creation of a VO will need to address the choice of protocols being used for negotiation of workflows and contracts.", "\n\nThe VO Formation Phase {#sec:def}\n======================\n\nVOs can be defined as tuples ${<{A_{vo}},{G_{vo}},{R_{vo}},{Wf_{vo}},{Con_{vo}}>}$ whose components can be described as follows.", "\n\n- $A_{vo} \\subseteq Agents^*$ with $Agents^*$ = $\\{\\langle i, R', G'\\rangle | \\langle i, R, G \\rangle \\in Agents$ and $R' \\subseteq R$, $G' \\subseteq G\\}$. $A_{vo}$ contains at least two agents and exactly one agent in $A_{vo}$ is referred to as the [*initiating agent*]{}, which is denoted .", "\n\n- $G_{vo}$ is a set of goals for the agents in $A_{vo}$, which contains at least a goal of the initiating agent: $G_{vo} \\subseteq \\bigcup_{\\langle i,R,G \\rangle \\in Agents} G$ and $G_0\\cap G_{vo} \\neq \\emptyset$, where $\\langle \\init,R_0,G_0 \\rangle \\in Agents$.\n\n- $R_{vo}$ is a set of roles to be played by the participating agents, where $R_{vo} \\subseteq Roles$.\n\n- $Wf_{vo} \\subseteq Workflows$ is the workflow of services currently agreed amongst the agents in $A_{vo}$.\n\n- $Con_{vo} \\subseteq Contracts$ is a set of contracts between the agents in $A_{vo}$.\n\n$Agents^*$ represents the set of all possible “full” or “partial” specifications of agents, corresponding to concrete choices of roles agents may play and goals they may focus on within a specific VO. ", "$A_{vo}$ describes the (partial specifications of) agents involved in the VO, as providers or requestors of services, or in whichever other roles, as indicated by $R_{vo}$. $A_{vo}$ only describes the agents insofar as their involvement in the VO is concerned (and thus possibly omitting some of their goals and roles, not relevant to the VO). ", "The $Wf_{vo}$ and $Con_{vo}$ components determine the behaviour of the VO and its members during the execution and dissolution phases of VOs. ", "The $G_{vo}$ and $V_{vo}$ components are related to the the $A_{vo}$ component in that $G_{vo} = \\bigcup_{\\langle i,R,G \\rangle \\in A_{vo}} G$ and $R_{vo}= \\bigcup_{\\langle \\init,R_0,G_0 \\rangle \\in A_{vo}} R$.\n\nIn our model, a VO is instantiated during the formation phase, through interactions amongst the agents composing the VO. ", "These interactions can be understood in terms of several operations progressively refining “partial” representations of VOs. ", "These operations are defined as transitions, as outlined below. ", "In the remainder, $Ids(A)$ refers to all identifiers of (partial specifications of) agents in the set $A$.", "\n\nGoal Identification\n-------------------\n\nThe transition results in the additions of the initiating agent and (some of) its goals into the partial VO tuple. ", "These are goals that the agent cannot achieve on its own. ", "Given\n\n${<{\\emptyset},{\\emptyset},{\\emptyset},{\\emptyset},{\\emptyset}>} {\\; \\xrightarrow{identify \\; goal} \\;} {{<{A_{init}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}$,\\\n\nthen\n\n- $A_{init} = \\{\\langle \\init, \\emptyset, G_{init} \\rangle \\}$ for some $\\langle \\init, R_0 , G_0\\rangle\n \\in Agents$ such that some goals $G_0' \\subseteq G_0$ cannot be fulfilled by in isolation;\n\n- $G_{init} = G_0'$.\n\nHere, goal fulfilment is determined using the evaluation mechanism of agent (see section \\[sec:agents\\]). ", "Note that no role is yet identified for : this will be done in transition (see section \\[sec:em\\]).", "\n\nIn order to ground this transition to our scenario, we assume that an agent $clientAg$ is informed by its user that a possible oil spill has been reported by a passing vessel. ", "The user provides the following information to the agent: latitude, longitude, acceptable false positive threshold and scan area. ", "Given the user’s parameters the agent initiates the VO formation process by first identifying its goals. ", "The parameters correspond to high-level goals, that will later be decomposed into specific workflows. ", "In the example, the high-level goal ${detectPossibleOilspill({38.0},{-9.4},{500},\\errorAccept)}$ given by the user is to detect an oceanic oil spill off the Portuguese coast at a latitude and longitude of [38.0]{} and [-9.4]{} with an acceptable false positive threshold of % for the surrounding [500]{} square kilometres. ", "The agent may decide that to satisfy this high-level goal it needs two services:\n\n$g_1={toBuy(satImage([{38.0},{-9.4},\\_,{500},\\_,{radar},\\_],\\_))}$, and\n\n$g_2={toBuy(oilSpillDetect([\\_,\\_,\\errorAccept],\\_))}$\n\nwhere the sensor-type for the satellite providing the image must be radar, because of the required resolution and weather conditions, and once this image data is obtained a service is needed to provide the actual identification of the oil spills on the images. ", "In summary, will compute $A_{init} = \\{\\langle clientAg , \\emptyset , G_{init} \\rangle \\}$ and $G_{init} = \\{g_1, g_2\\} $.", "\n\nNote that in our model goals of VOs emerge from goals of agents. ", "Once the goals of VOs have been identified, they will dictate the behaviour of agents during the operation of VOs.", "\n\nPartner Discovery\n-----------------\n\nThe transition results in the addition of a number of agents to the set of agents in the current partial VO (after ). ", "Whether by traditional means such as a yellow page registry or through ‘friend of a friend’ discovery utilising the multiagent system, the VO tuple is transformed to include potential partners that the initiating agent believes will help it reach its goals, notably by providing suitable services. ", "Given\n\n${{<{A_{init}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}{\\; \\xrightarrow{discover \\; partners} \\;} {{<{A_{pot}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}$,\n\nthen $A_{pot} = A_{init} \\bigcup A_{queryresult}$, where $A_{queryresult}$ includes those potential partners such that\n\n- $A_{queryresult} \\subseteq Agents^* - A_{init}$ and each element in $A_{queryresult}$ is of the form $\\langle i, \\emptyset, \\emptyset \\rangle$;\n\n- each agent in $A_{queryresult}$ is a provider of one of the services in $G_{init}$ namely, for each $i \\in Ids(A_{queryresult})$, if $\\langle i, R, G \\rangle \\in Agents$ then $\\exists s$ such that $toBuy(s) \\in G_{init}$ such that $\\langle provider(s), PC \\rangle \\in R$.\n\nIn our example, $clientAg$ finds that two satellite image providers advertise the services it is interested in. ", "Both agents $satERS1ag$ and $radSatAg$ represent a radar-capable polar satellite with orbits amenable to the area of interest. ", "Moreover, there is one agent, $procOSAg$, who can provide the type of image processing in which $clientAg$ is interested. ", "After this transition is completed,\n\n$A_{queryresult} = \\{ \\langle satERS1ag,\\emptyset,\\emptyset \\rangle, \\langle radSatAg,\\emptyset,\\emptyset \\rangle, \\langle procOSAg,\\emptyset,\\emptyset \\rangle \\}$.\n\nPartner Selection\n-----------------\n\nThe set of potential partners discovered by may include unreliable or untrustworthy ones. ", "The transition allows the agent to prune the results of the transition. ", "We do not provide a detailed specification of the pruning mechanism needed to support this stage as this is largely dependent on mechanisms for assessing trustworthiness and reliability. ", "Several such mechanisms exist in the literature. ", "Any could be used here.", "\n\nGenerally, given\n\n${{<{A_{pot}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}{\\; \\xrightarrow{select \\; partners} \\;} {{<{A_{pre}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}$,\n\nthen\n\n- $A_{pre} \\subseteq A_{pot}$;\n\n- $\\init \\in Ids(A_{pre})$;\n\n- for each $s$ such that $toBuy(s) \\in G_{init}$ there exists\n\n $ i \\in Ids(A_{pre})$ such that\n\n if $\\langle i, R, G \\rangle \\in Agents$ then\n\n $\\exists \\langle provider(s), PC \\rangle \\in R$.\n\nIn the example, after the transition is completed:\n\n> $A_{pre} = \\{\\langle clientAg , \\emptyset , G_{init} \\rangle, \\langle satERS1ag,\\emptyset,\\emptyset \\rangle, \\langle procOSag,\\emptyset,\\emptyset \\rangle \\}$.\n\nNote that, in general, several providers of the same service may still be in $A_{pre}$ after the pruning.", "\n\nEstablish Roles {#sec:em}\n---------------\n\nBefore the agents are able to negotiate workflows and contracts, the roles they will be playing in the negotiation need to be established. ", "These roles (with their protocols) are the social norms used for forming the VO. ", "Establishing these roles also amounts to establishing protocols for them (as our roles include protocols). ", "Roles include requester and provider roles, but may also include other roles (e.g. that of arbitrator, or contract-negotiator if agents other than provider and requester agents may be needed to support the contract negotiation stage of VO formation). ", "For simplicity, we assume that these roles are decided by the initiating agent, and that, given\n\n${{<{A_{pre}},{G_{init}},{\\emptyset},{\\emptyset},{\\emptyset}>}}{\\; \\xrightarrow{establish \\; roles} \\;} {{<{A_{roles}},{G_{init}},{R_{vo}},{\\emptyset},{\\emptyset}>}}$,\n\nthen\n\n- $Ids(A_{pre}) \\subseteq Ids(A_{roles})$;\n\n- $A_{roles} = A_{pre}^* \\cup A_{rest}$, where\n\n - $A_{pre}^* =\n \\bigcup_{\\langle i, \\emptyset, G \\rangle \\in A_{pre}}\n \\{\\langle i, R_i, G_i \\rangle\\} $ for some $R_i$s such that $R_i \\subseteq R^*_i$ and $G_i \\subseteq G_i^*$ where $\\langle i, R^*_i, G_i^* \\rangle \\in Agents$;\n\n - $A_{rest} \\subseteq Agents^*$ (where $A_{rest}$ may be empty);\n\n - $A_{rest} \\cap A_{pre}^* = \\emptyset$;\n\n- $R_{vo} = \\bigcup_{\\langle i, R_i, \\_ \\rangle \\in A_{roles}} \\{R_i\\}$;\n\n- for each $s$ such that $toBuy(s) \\in G_{init}$, there exists exactly one $\\langle provider(s), PC_{provider(s)} \\rangle$ and exactly one $\\langle requester(s), PC_{requester(s)} \\rangle$ in $R_{vo}$;\n\n- for every $\\langle r_1, PC_{r_1} \\rangle$ and $\\langle r_2, PC_{r_2} \\rangle$ in $R_{vo}$, if $r_1=r_2$ then $PC_{r_1}=PC_{r_2}$, namely there is exactly one role for each role identifier in $R_{vo}$.\n\nNote that we do not impose that plays the role of requester of all the services in the workflow it wants to instantiate: indeed, in general it may be possible that delegates the task of requesting some or all services to some other agent. ", "In particular, it may be the case that $\\langle \\init, \\emptyset, G_{init} \\rangle$ belongs to $A_{roles}$. Also, we allow for the same agent to play several roles in a VO (namely, $\\langle i, R_i, G_{i} \\rangle$ may belong to $A_{roles}$ with $R_i$ containing more than one role).", "\n\nIn our running example, once the stage is completed:\n\n> $A_{roles} = \\{$ $\\langle clientAg, \\{\\langle requester({satImage([{38.0},{-9.4},\\_,{500},\\_,{radar},\\_],\\_)}), PC_1 \\rangle,$\\\n> $\\langle requester({oilSpillDetect([\\_,\\_,\\errorAccept],\\_)}), PC_2 \\rangle \\}, G_{init} \\rangle, $\\\n> $\\langle satERS1ag, \\{\\langle provider({satImage([{38.0},{-9.4},\\_,{500},\\_,{radar},\\_],\\_)}), PC_3 \\rangle \\},\\emptyset \\rangle$\\\n> $\\}$\n>\n> $R_{vo} = \\{$ ,\\\n> ,\\\n> ,\\\n> $\\}$\n\nHere, the $PC_i$ are protocol clauses that the agents commit to follow during the negotiation of workflows. ", "In this specific example, no role/protocol is specified for the transition. ", "NO SPACE AND MESSY $A_{roles}$ and $R_{vo}$ could be extended to cater for contract negotiation. ", "For example, $R_{vo}$ may be extended to include:\n\n> $\\langle contract\\_requester({toBuy(satImage([{38.0},{-9.4},\\_,{500},\\_,{radar},\\_],\\_))}), PC_5 \\rangle$,\\\n> $ \\langle contract\\_provider({toBuy(satImage([{38.0},{-9.4},\\_,{500},\\_,{radar},\\_],\\_))}), PC_6 \\rangle$\n\n(similarly for the $processingimageOilspill(\\_)$ service) where the set of roles for $clientAg$ also includes the first new role and the set of roles for $satER$ also includes the second new role (examples of $PC_5$ and $PC_6$ are given in section \\[implementation\\]). ", "Note that other agents may be brought into $A_{roles}$ at this stage to play these new roles.", "\n\nNegotiation\n-----------\n\nThe negotiation activities in the VO formation amount to 1) agreeing a concrete workflow () and 2) agreeing a set of contracts amongst agents contributing to the workflow, by providing services in it, and the initiating agents (stage ). ", "Both transitions make use of roles (and protocols) identified at the transition: communicating by following these protocols agents agree on the provision of services and contracts. ", "Negotiation may result in additional goals to be added, as goals of agents providing services. ", "The transition may cause no changes in the partial VO tuple, if no suitable roles have been computed by the transition. ", "For lack of space we will only describe the transition.", "\n\nIn order for the computed VO to be meaningful, it needs to compute a workflow that is concrete or partially instantiated, but can be fully instantiated when the workflow is executed. ", "This workflow instantiates the abstract workflow corresponding to the $toBuy$ goals in $G_{init}$. This instantiation may be obtained after several negotiations, each following the protocols of the roles identified after the transition, each resulting in a service becoming instantiated. ", "After each instantiation, the initiating agent puts those instantiated services into the workflow component of the VO tuple.", "\n\nGenerally, given\\\n\n${{<{A_{roles}},{G_{init}},{R_{vo}},{\\emptyset},{\\emptyset}>}}{\\; \\xrightarrow{agree \\; Wf} \\;} {{<{A_{vo}},{G_{vo}},{R_{vo}},{Wf_{vo}},{\\emptyset}>}}$,\n\nthen\n\n- $Ids(A_{vo}) \\subseteq Ids(A_{roles})$;\n\n- $\\init \\in Ids(A_{vo})$;\n\n- for each $s$ such that $toBuy(s) \\in G_{init}$ there exists exactly one agent $i \\in Ids(A_{vo})$ such that $\\langle i, R_i, G_i \\rangle \\in A_{vo}$ and $provider(s) \\in R_i$, and a successful dialogue between and this agent $i$ with playing the role of $requester(s)$ and $i$ playing the role of $provider(s)$;\n\n- for each $\\langle i, R_i, G_i \\rangle \\in A_{vo}$, if $\\langle i, R_i^*, G_i^* \\rangle \\in A_{roles}$ then $R_i^*=R_i$ (namely roles cannot be changed at this stage);\n\n $G_i \\supseteq G_i^*$ (namely goals can only be added at this stage);\n\n if $\\langle i, R_i^{**}, G_i^{**} \\rangle \\in Agents$ then $G_i \\subseteq G_i^{**}$ (namely all goals are chosen from the pool of goals of the agent);\n\n- $G_{init} \\subseteq G_{vo}$;\n\n- $G_{vo} = \\bigcup_{\\langle i, R_i, G_i \\rangle \\in A_{vo}} G_i$;\n\n- $Wf_{vo}$ is the result of instantiating $Wf$ by the given sequence of successful dialogues, as dictated by $G_{vo}$; the providers of the services are given by $A_{vo}$.\n\nIntuitively, agents may decide to add goals at this stage to avoid agreements to provide a service which could prevent the fulfillment of some of their goals. ", "We impose that the initiating agent is not allowed to change the workflow. ", "However, it can add constraints or services to it, as soon as no new role is required by this addition. ", "For example, this would be needed and useful to support shimming[^5] of services. ", "Goals of provider agents may render this shimming necessary (e.g. because a service provider does not want to interface to another service provider).", "\n\nAnother aspect of this formulation is that one single provider per service is required. ", "These providers will need to be selected amongst all agents that have successfully completed a dialogue with . ", "We do not impose any constraints on how this choice is performed: the given protocols may typically dictate this.", "\n\nConclusions {#sec:conc}\n===========\n\nWe have described a formalisation for VOs in grid and service-oriented architectures, formed from agent societies, using a realistic scenario for illustration throughout. ", "This formalisation is abstract and independent of any realisation choices (in terms of agent architectures, communication platform etc). ", "It can guide the development of (agent-based) VOs, in that it identifies essential components (such as several underlying languages for services, identifiers, communication, as well as protocol-based roles for negotiation of services and contracts). ", "We have experimented with some of the interactions presented here for the earth observation scenario [@DBLP:conf/atal/BromuriUMST09] with emphasis on the coordination patterns agents should follow when creating a VO [@mage].", "\n\nOur emphasis on the use of protocols to support VOs is influenced by [@FosterKessel01]. ", "The CONOISE-G [@patel-2005] project presented an agent-based model for VOs on the grid, but focused on the challenging task of engineering a working system and thus making concrete realisation choices (e.g. agents use a constraint satisfaction algorithm for decision-making). ", "We have taken a more abstract view of agents, agent society and VOs, to ensure that the definitions can be ported to any other agent-enabled grid systems to support VOs in general. ", "Papers such as [@Matos] speculate on the consequences of introducing software agents as a means to alleviate the burden on human decision-making. ", "We have a similar focus in that we see an opportunity in the use of the multiagent paradigm for automating parts of VOs. ", "There are a few papers that have formalised aspects of agent-enabled VOs, for example [@DBLP:conf/atal/PittKSA05] look at voting protocols for VOs while [@UdupiS06] focuses on the representation of contracts in VOs based on a specific commitment-based approach for them. ", "We have taken a more exhaustive view by considering all components of agent-enabled VOs but more abstractly.", "\n\nThere is also existing work applying agent societies and electronic institutions for VOs [@prometheus]. ", "There are a number of differences of this work from ours as follows. ", "First, our emphasis is one the formalisation of a VO in terms of its components and the VO transitions, not on the details of the regulation of the participating agents and their behaviour. ", "Secondly, we abstract away from methodological issues. ", "Thirdly, we do not require a classification of the goals of agents and a focus on the capabilities of individual agents. ", "The regulation of VOs and Electronic Institutions with emphasis on norms is also discussed in [@Cardoso08], where like here the focus is on agreed contracts about the provision of institutional services. ", "However, we abstract away from the monitoring of VO activities and the evaluation of norms.", "\n\nAs future work, it will be important to further validate the proposed model with further examples, e.g. in e-business and pharma settings, as well as formally verifying that the VO formation model provided results in “coherent” VOs, namely VOs where all agents involved can fulfil their relevant goals as a result of the participation in the VO, given that the VO is executed as agreed.", "\n\nAcknowledgements {#acknowledgements .unnumbered}\n================\n\nWe would like to thank the anonymous referees for their comments on a previous version of this paper. ", "The work reported here was partially funded by the Sixth Framework IST programme of the EC, under the 035200 ARGUGRID project.", "\n\n[^1]: In general, may need to contain hierarchical concepts, for example a “generic service” may be defined as either a “satellite service” or a “processing service”.", "\n\n[^2]: Here, 38.0 and -9.4 are the latitude and longitute coordinates of the area to be scanned, 1000 is the resolution of the image in metres, 500 is the km$^2$ area to be scanned, 5 is the frequency in hours for the area to be scanned, $optical$ is the type of sensor to be used, 3 is the wave frequency to be used in the scan, [$results.data$]{} is the name of the file produced by Envisat.", "\n\n[^3]: Here, $a$ represents the input raw satellite data, 5 is the acceptable threshold for false positives and $b$ is the output processed data image, as computed by the provider of $detectOilSpill$. Note that algorithms for detecting oil spills may occasionally give false positives, namely indicate that there is an oil spill at some location where in reality no oil spill is present there. ", "The lower the acceptable false positive threshold requested from a service, the more expensive the service.", "\n\n[^4]: More generally, workflows can be compositions, e.g. by sequencing or parallel execution, of services.", "\n\n[^5]: Informally, shimming is the introduction of a service into a workflow to ensure that the output of a preceding service matches the type required by the input of the subsequent service.", "\n" ]
{ "pile_set_name": "ArXiv" }
[ 0.005050505050505051, 0, 0, 0, 0, 0.01160092807424594, 0, 0, 0.021739130434782608, 0, 0, 0, 0.004201680672268907, 0.010101010101010102, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0049504950495049506, 0, 0.0038684719535783366, 0, 0, 0, 0, 0, 0.00267379679144385, 0.008, 0, 0, 0.002793296089385475, 0, 0, 0, 0.012121212121212121, 0, 0.010526315789473684, 0, 0, 0, 0, 0.004405286343612335, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.003316749585406302, 0.003246753246753247, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005780346820809248, 0, 0, 0.007246376811594203, 0, 0, 0, 0.0014104372355430183, 0, 0, 0, 0.0013468013468013469, 0, 0, 0, 0.008888888888888889, 0, 0.02064896755162242, 0, 0, 0, 0, 0, 0, 0, 0.005917159763313609, 0, 0, 0, 0, 0, 0.002288329519450801, 0, 0, 0.00641025641025641, 0, 0.0031645569620253164, 0, 0, 0, 0, 0, 0, 0, 0.005411255411255411, 0, 0, 0.004827586206896552, 0, 0.0015384615384615385, 0.005319148936170213, 0.006756756756756757, 0.005141388174807198, 0, 0, 0.009009009009009009, 0, 0, 0, 0, 0, 0.003861003861003861, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006369426751592357, 0, 0.003579952267303103, 0, 0, 0, 0, 0, 0, 0, 0.003816793893129771, 0, 0, 0, 0, 0.005457025920873124, 0, 0.003472222222222222, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.002824858757062147, 0, 0, 0, 0, 0, 0, 0, 0.004761904761904762, 0, 0, 0.013392857142857142, 0.011111111111111112, 0.0036231884057971015, 0, 0.00684931506849315, 0, 0.01107011070110701, 0, 0.009433962264150943, 0, 0, 0, 0, 0.004901960784313725, 0, 0, 0, 0.007936507936507936, 0, 0, 0, 0, 0, 0, 0 ]
0.001486
5
[ "The Fact About finance homework help That No One Is Suggesting\n\nThe Fact About finance homework help That No One Is Suggesting\n\nTo check the connection in between price earning ratio and return on expenditure A take a look at of rate earning ratio to forecast future growths Elements impact over the dividend payout ratio To check romance in between price earning ratio and development Connection involving sector components and stock returns of sugar and allied industries of (place identify)\n\nCombined with the other novel Strength-saving systems within the Greenway, the panels impress present and prospective tenants when giving about fifteen % with the constructing’s electricity requires, she added.", "\n\nGenerally critique your charges After you enter expenses for assets, jobs, or the two, you are able to study them to view if they need to be modified to meet your intention for expenditures. ", "Sooner or later, stakeholders might be on the lookout for this information and facts\n\nWarning: Your Corporation could have stringent procedures regarding fees incurred from contractual obligations. ", "Be sure you comprehend company insurance policies comprehensively pertaining to irrespective of whether you ought to enter into contracts with, say a vendor, and what type of contract you are able to enter into. .", "\n\nBanking companies are the key enablers of funding by offering credit rating, even though mutual funds, private equity, hedge funds, as well as other corporations have lately develop into critical since they put money into numerous forms of debt being an alternate.", "\n\nIf not ready perfectly, they are often 'captured' by some influential leaders, and run the risk of members dropping their savings. ", "Working experience suggests however that these casual but highly disciplined groups are certainly sustainable, and carry on to exist even right after twenty–25 decades. ", "Formalization, as being a Cooperative of Credit rating Union, can help create links With all the banking program For additional advanced fiscal goods and extra funds for financial loans; but needs robust leadership and techniques. ", "These types are really preferred in several rural areas of nations across Asia, Africa, and Latin America; and an incredible System for producing further money inclusion.", "\n\nAt MyAssignmenthelp.com, The scholars are guided by the most beneficial in class industry experts and with the finest finance papers. ", "Our gurus hail from around the globe and they are connected with us for the final a few years.", "\n\nMonitoring and running charges, particularly if you’re undertaking attained worth analysis, necessitates that you choose to enter Expense information for resources who're assigned to responsibilities. ", "What's more, it calls for that you choose to established baselines.", "\n\nHelp can can be found in the form of far more and superior-qualified staff members, Consequently increased instruction is required for microfinance establishments. ", "This has started in some universities, as Oliver Schmidt describes. ", "Brain the administration gap\n\nYet another Web-centered microlender United Prosperity takes advantage of a variation on the standard microlending model; with United Prosperity the micro-lender supplies a warranty to an area bank which then lends back again double that amount on the micro-entrepreneur. ", "In 2009, the US-dependent nonprofit Zidisha grew to become the very first peer-to-peer microlending platform to connection lenders and borrowers straight across international borders without the need of neighborhood intermediaries.[fifty]\n\nExport Price tag information to other plans You might want to export Expense information to a different application for more Investigation. ", "A quick tool You may use are sparklines in this page Excel 2010. ", "This instance shows sparklines for acquired benefit data copied from Project to Excel.", "\n\nI've also four decades diploma of Business Administration with specialization in Finance. ", "I've penned several studies relative to all business enterprise subj Extra $150 USD in three days\n\nThis paper offers factors for analyzing State ensures purpose in nationwide PPP programmes and guidance on how finest to carry out and deal with them\n\nLearn why CFOs decide to acquire predictive algorithms and versions to aid digital transformation in finance. ", "Read through the website" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0028368794326241137, 0, 0.005050505050505051, 0, 0, 0, 0, 0, 0, 0.007352941176470588, 0, 0, 0, 0, 0.014705882352941176, 0.006622516556291391, 0.002631578947368421, 0, 0.011627906976744186, 0.021739130434782608, 0.005555555555555556, 0 ]
0.003551
5
[ "The experimental studies in this proposal are designed to determine if the higher amounts of plasma derived macromolecules which are found in arterial tissue in various models of hypertension in the rat are the result of increased transendothelial passage of plasma proteins and/or increased arterial tissue distribution space for macromolecules. ", "The existing literature on the subject generally attributes the higher amounts of the macromolecular tracers accumulated after a given label circulation time to alterations in endothelial permeability. ", "However, this conclusion is, in most cases, but one possibility among several equally viable speculations. ", "The discrimination among the possibilities for this finding is of paramount importance in understanding and perhaps in treating the vascular disease which accompanies hypertension. ", "The current proposal is to measure permeability and thoracic aorta (intima-media) steady state interstitial concentration for plasma albumin following in vivo circulation of the labeled protein. ", "These measurements will allow the separation of the effects of altered permeability and those due to altered distribution space during (a) spontaneous hypertension in the rat. ", "Additional studies will explore these same aortic properties during the administration of selected vasoactive compounds. ", "Another group of expeiments will be performed on spontaneously hypertensive rats during the administration of the antihypertensive drugs alpha-methyldopa, minoxidil and hydralazine. ", "These three drugs are of special interest due to their variable effects on reversal of the hypertension-induced increase in left ventricular weight inspite of the effectiveness of each in lowering blood pressure." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Q:\n\nPer pixel Image Computation with Gamma Correction in OpenGL and C\n\nI've been working on a way to optimize pixel computation in OpenGL with C. If this information helps, my current environtment = Linux (terminal) + GPU (Nvidia 1080Ti). ", "I'm working with old OpenGL (with GLUT) and not Modern OpenGL. ", "Here's what I'm doing, this function will take image input, this is how I call the image\nimage = SOIL_load_image(\"Images/image_1.jpg\", &width, &height, 0, SOIL_LOAD_RGBA);\nif(image == NULL) exit(0);\n\nimage1 = NULL;\nimgCompute();\n\nImage computation processes are below :\n\nConvert RGB image → XYZ\nXYZ → xy chromaticity \nDo some computation to alter the pixel value\nConvert back xy → XYZ\nConvert back XYZ → RGB\nConvert RGB result → LMS\nDo computation in LMS\nConvert back LMS → RGB\n\nfloat fps = 60.0;\n/* image */\nint xsize = 1600;\nint ysize = 1000;\n\nfloat conv_x = 0.3;\nfloat conv_y = 0.25;\n\nstatic void imgCompute()\n{\n unsigned char *p, *p1;\n float R, G, B, r, g, b;\n float X, Y, Z, X2, Y2, Z2, x ,y, z;\n float l, m, s , L, M, S;\n float *p2;\n\n if(image1 == NULL) {\n image1 = (unsigned char *)malloc(width*height*4);\n if(image1 == NULL) exit(0);\n image2 = (float *)malloc(sizeof(float)*width*height*5);\n if(image2 == NULL) exit(0);\n\n p = image;\n p2 = image2;\n\n for(int i = 0; i < height*width; i++) {\n\n //gamma correction\n R = pow(*(p+0)/255.0, 2.2);\n G = pow(*(p+1)/255.0, 2.2);\n B = pow(*(p+2)/255.0, 2.2);\n\n //XYZ colorspace\n X = (0.412453 * R) + (0.357580 * G) + (0.180423 * B);\n Y = (0.212671 * R) + (0.715160 * G) + (0.072169 * B);\n Z = (0.019334 * R) + (0.119193 * G) + (0.950227 * B);\n\n x = X/(X+Y+Z);\n y = Y/(X+Y+Z);\n z = Z/(X+Y+Z);\n\n p2[0] = x;\n p2[1] = y;\n p2[2] = Y;\n\n //======================================================\n //some functions from header file\n struct Line equation = var(conv_x, conv_y, x, y);\n struct Intersection i = point(equation);\n\n struct Distance D = dist(i, x, y);\n global = shift(conv_x, conv_y, D, x, y);\n\n float x1 = global.x2;\n float y1 = global.y2;\n float x2 = global.x3;\n float y2 = global.y3;\n p2[3] = x1-x;\n p2[4] = y1-y;\n p2 += 5;\n //=======================================================\n\n p += 4;\n }\n }\n\n p1 = image1;\n p2 = image2;\n\n for(int i = 0; i < height*width; i++) {\n\n x = p2[0] + p2[3];\n y = p2[1] + p2[4];\n Y = p2[2];\n\n X2 = (x * Y)/y;\n Y2 = Y;\n Z2 = (1-x-y)*Y/y;\n\n R = ( 3.240479 * X2) + ( -1.53715 * Y2) + ( -0.498535 * Z2);\n G = ( -0.969256 * X2) + ( 1.875991 * Y2) + ( 0.041556 * Z2);\n B = ( 0.055648 * X2) + ( -0.204043 * Y2) + ( 1.057311 * Z2);\n\n //============================================================\n //lms colorspace\n\n L = (17.8824 * R) + (43.5161 * G) + ( 4.1194 * B) ;\n M = ( 3.4557 * R) + (27.1554 * G) + ( 3.8671 * B) ;\n S = ( 0.0300 * R) + ( 0.1843 * G) + ( 1.4671 * B) ;\n\n r = ( 0.0209 * L) + ( -0.1005 * M) + ( 0.0067 * S);\n g = ( -0.0002 * L) + ( 0.0003 * M) + ( -0.1006 * S);\n b = ( -0.0004 * L) + ( -0.0021 * M) + ( 0.3035 * S);\n\n //gamma correction\n *(p1+0) = pow(r, (1.0 / 2.2))*255.0;\n *(p1+1) = pow(g, (1.0 / 2.2))*255.0;\n *(p1+2) = pow(b, (1.0 / 2.2))*255.0;\n *(p1+3) = 0;\n\n p1 +=4;\n p2 +=5;\n }\n} \n\nMy desired fps is 60fps and my original image size is 1600 x 1000. ", "What I've been checking :\n\nOriginal image + gamma correction applied = 3 fps.", "\nOriginal image (no gamma correction) = 20 fps. ", "\n\nFrom tesult no.2 (20 fps), I tried to resize my image into 1/3 original size to see if I could achieve 60fps, \n\nResized image + gamma correction = 30 fps.", "\nResized image (no gamma correction) = 60 fps.", "\n\nI've also checked each colorspace transformation, they are fine and don't affect the fps. ", "As of now, the problems are image size and per pixel gamma computation. ", "I'd appreciate some suggestions to improve performance of this function.", "\n\nA:\n\nCreate lookup table\nI ran your program on a buffer filled with random bytes and I found that most of the time was being spent doing the pow() operations. ", " You can speed this part up by creating a lookup table, like this:\nfloat powTable[256];\n\n// Call this from main() \nstatic void computeTable(void)\n{\n int i;\n for (i = 0; i < 256; i++) \n powTable[i] = pow(i/255.0, 2.2);\n} \n\nstatic void imgCompute()\n{\n // ...\n\n //gamma correction\n R = powTable[p[0]];\n G = powTable[p[1]];\n B = powTable[p[2]];\n\n // ...\n}\n\nAdding this one lookup table cut the time of the function by 50%.", "\nInverse gamma correction\nI tried to do the same thing with the second set of pow() calls. ", " However, that part was a bit tricky since instead of starting with an int in the range 0..255 and converting to a float in the range 0..1, you are starting with a float and converting to an int (i.e. the reverse function).", "\nI actually implemented something that I thought would work (it was a lookup table that rounded the input float to the nearest 0.0001 and had 10000 entries). ", " However, when I ran the program I discovered that a lot of the float values were either < 0.0, > 1.0, or even Nan. ", " I traced that Nan back to these lines:\n X = (0.412453 * R) + (0.357580 * G) + (0.180423 * B);\n Y = (0.212671 * R) + (0.715160 * G) + (0.072169 * B);\n Z = (0.019334 * R) + (0.119193 * G) + (0.950227 * B);\n\n x = X/(X+Y+Z);\n y = Y/(X+Y+Z);\n z = Z/(X+Y+Z);\n\nHere, if R = G = B = 0, then X = Y = Z = 0. ", " Then when you divide by (X+Y+Z), you get a division by zero. ", " I'm not sure if that is a problem or not. ", " Also, I'm not sure if the negative or greater than 1 values are problematic because when you apply the inverse gamma correction, you will get a pixel value outside the range 0..255. ", " In any case, I decided to clamp the input values to the range 0..1 before doing the lookup. ", " With the 2nd lookup table, it shaved another 50% of the time off. ", " So with both lookup tables in place, the final program was about 4x faster than the original.", "\nNo need for intermediate buffer\nThere is no need for the image2 intermediate buffer. ", " If you combine your two processing loops, you will only ever need a 5 floating point intermediate buffer instead of allocating and filling a 1600 x 1000 x 5 x 4 = 32 MB buffer. ", " Having such a big intermediate buffer could cause your program to run slower because it could cause your cpu cache to fill up. ", " In my testing, it didn't make any difference in speed, but I would still recommend getting rid of that buffer and combining the two loops.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.008368200836820083, 0.015873015873015872, 0.003988603988603989, 0, 0, 0, 0, 0, 0, 0, 0, 0.0042643923240938165, 0, 0, 0, 0, 0.002932551319648094, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001265
5
[ "3676182\nCalculate 0.1215*-2079.", "\n-252.5985\nMultiply 13.121 and 1.", "\n13.121\n388 * 231.1\n89666.8\nWhat is -0.5 times 513.58?", "\n-256.79\nWhat is 0.5 times -17442?", "\n-8721\n48001 times -0.2\n-9600.2\n472*-0.022\n-10.384\n45 times 4431\n199395\nProduct of 3408 and 46.", "\n156768\n-0.6 * -2718\n1630.8\n-0.041872 * 1\n-0.041872\n0.05*472215\n23610.75\n8 * -83.48\n-667.84\nWhat is the product of 0.051 and -0.0944?", "\n-0.0048144\nProduct of 53 and 92027.", "\n4877431\n-1501 * 142\n-213142\n16533 times -0.2\n-3306.6\nWhat is 7 times -0.9502?", "\n-6.6514\nWhat is the product of 0.1905 and -5.2?", "\n-0.9906\n-72647*0.05\n-3632.35\nWhat is -0.069802 times 86?", "\n-6.002972\n0.167*29\n4.843\n-0.9 times 0.0575\n-0.05175\nProduct of -0.81898 and 6.", "\n-4.91388\nWork out 0.7 * 16533.4.", "\n11573.38\nWork out -0.239671 * 4.", "\n-0.958684\nWhat is 341 times -1.2?", "\n-409.2\nWork out 26952 * 11.", "\n296472\nWhat is 16.3208 times 0.3?", "\n4.89624\n0.2 times 50466\n10093.2\nProduct of 1199.89 and -0.12.", "\n-143.9868\nCalculate 0.3*-255.669.", "\n-76.7007\nWhat is 13103 times 0.7?", "\n9172.1\n-2 * -16.164\n32.328\nWork out -3.8707 * 0.37.", "\n-1.432159\n0.89 times 107.5\n95.675\n-8*-659988\n5279904\nMultiply -0.19 and 17256.", "\n-3278.64\n1.2 * 27761\n33313.2\nWork out 233647 * -5.", "\n-1168235\nMultiply 2 and 212189.", "\n424378\nCalculate 209.8*868.", "\n182106.4\nMultiply -0.08 and -243.37.", "\n19.4696\nMultiply 0.3 and 37425.", "\n11227.5\n-0.41 * 11316.6\n-4639.806\n143.4347 times -0.3\n-43.03041\nWhat is the product of 0.4 and -885279?", "\n-354111.6\n1580*-1.5\n-2370\n-575594 * -1\n575594\n2429*-641\n-1556989\n455.4 * 0.077\n35.0658\nWhat is the product of 106 and 2210?", "\n234260\nWhat is 0.6355 times 0.109?", "\n0.0692695\nMultiply 0.1 and 161.78.", "\n16.178\n-62195*5\n-310975\nWork out 165.1 * -0.038.", "\n-6.2738\n-1.5878 times 0.5\n-0.7939\nWork out 35.23 * 0.17.", "\n5.9891\nCalculate 406*-0.954.", "\n-387.324\nWhat is the product of 1.2 and 0.11297?", "\n0.135564\nProduct of 86 and 12.75.", "\n1096.5\nWhat is the product of 306261 and 0.07?", "\n21438.27\n-21.481*-0.16\n3.43696\nWhat is the product of 500 and -202?", "\n-101000\nWork out -18 * 1263.", "\n-22734\nWork out 5021 * 1.", "\n5021\n-6.868*0.1\n-0.6868\nWork out -0.3 * 201647.", "\n-60494.1\nMultiply 5.12617 and 0.5.", "\n2.563085\nWhat is 137196 times -2?", "\n-274392\n0.0838 times -0.025\n-0.002095\nWhat is the product of 4376 and 0.053?", "\n231.928\nCalculate -4691*39.", "\n-182949\nWhat is -0.023 times 0.06119?", "\n-0.00140737\nWhat is 168 times -1.17?", "\n-196.56\nWhat is the product of -50.56 and -35?", "\n1769.6\nProduct of 30377 and 0.012.", "\n364.524\nWhat is the product of 1493 and 0.717?", "\n1070.481\nWork out -0.15174 * -2.", "\n0.30348\nWork out -1638.391 * 3.", "\n-4915.173\n144 times 0.0483\n6.9552\n-0.3 * -12334\n3700.2\nCalculate 40.4*-0.22.", "\n-8.888\n-3 * 194.87\n-584.61\n-8515*0.2\n-1703\nWork out 1 * 49.958.", "\n49.958\nCalculate -3*0.66365.", "\n-1.99095\nWhat is -0.2 times 14668?", "\n-2933.6\n0.1*1090.288\n109.0288\nWhat is -2 times 0.236081?", "\n-0.472162\n-0.17*-1605\n272.85\n-0.3*-507.17\n152.151\nCalculate 1629077*0.3.", "\n488723.1\nProduct of 9.52698 and -0.4.", "\n-3.810792\n0.8997 times -9.5\n-8.54715\nCalculate 483*-3988.", "\n-1926204\nWhat is 221350 times 0.4?", "\n88540\nMultiply 8289 and -1.01.", "\n-8371.89\nCalculate -314*0.8.", "\n-251.2\nWhat is 0.0938 times -131?", "\n-12.2878\nProduct of -222 and -7673.", "\n1703406\nProduct of 204 and 724.", "\n147696\nMultiply 7574 and -0.5.", "\n-3787\nWhat is -49 times -18083?", "\n886067\nProduct of 121 and -5357.", "\n-648197\nWhat is the product of 1362.31 and -1.2?", "\n-1634.772\nCalculate -4097*0.3.", "\n-1229.1\nMultiply 0.349 and -28.", "\n-9.772\n-22*31992\n-703824\nWhat is -115114 times 0.5?", "\n-57557\nCalculate -2887*14.", "\n-40418\nCalculate 0.02*13206.1.", "\n264.122\nMultiply 392094 and -0.2.", "\n-78418.8\n-0.211 times 12.26\n-2.58686\nCalculate -788*-1429.", "\n1126052\nProduct of -0.1 and -498.462.", "\n49.8462\nMultiply -36535 and -11.", "\n401885\nWork out -0.711459 * -0.3.", "\n0.2134377\nCalculate 111.493*3.9.", "\n434.8227\nWhat is the product of -250836 and -0.4?", "\n100334.4\nWhat is 0.6 times -122195?", "\n-73317\nCalculate -4*-408729.", "\n1634916\nWork out -5 * -95.887.", "\n479.435\n-1.7951*-17\n30.5167\n-6 times 1.4\n-8.4\n1564 times 4\n6256\n9.57501 times -0.2\n-1.915002\nCalculate -1*-0.1550091.", "\n0.1550091\nMultiply 1.9 and 1568.", "\n2979.2\nWork out -0.9 * 468.", "\n-421.2\nWork out 12314 * -0.1.", "\n-1231.4\nProduct of 477 and 45.65.", "\n21775.05\nWhat is 0.189059 times -1.2?", "\n-0.2268708\n-5 * -3126.8\n15634\n-42749 times -15\n641235\nWork out 50 * -1.562.", "\n-78.1\n3*-27501\n-82503\nWhat is the product of 471 and -1.5?", "\n-706.5\nWhat is the product of 1 and 162.1965?", "\n162.1965\nWhat is -8 times 208.21?", "\n-1665.68\nMultiply 10 and -24.576.", "\n-245.76\nWhat is the product of -27.02549 and 1?", "\n-27.02549\n-397 * 1.61\n-639.17\nMultiply -31.99 and -0.037.", "\n1.18363\n-1881 times -0.59\n1109.79\nProduct of 3414 and 195.", "\n665730\nWork out -8 * 67.506.", "\n-540.048\n-0.1 * 22910\n-2291\nCalculate 0*231235.", "\n0\nCalculate -84*-17599.", "\n1478316\nWork out 70 * -262.", "\n-18340\nCalculate 454813*0.3.", "\n136443.9\nWhat is 0 times 414545?", "\n0\n54*-1681\n-90774\n-0.2 * -0.25648\n0.051296\nWork out 0.40909 * -0.2.", "\n-0.081818\nWhat is the product of 0.13 and 0.022638?", "\n0.00294294\n344*82\n28208\n0.71 times -25.6\n-18.176\nWork out 8.87 * 1.63.", "\n14.4581\nWork out 0.70047 * -2.", "\n-1.40094\nWhat is the product of 0.129 and 0.3656?", "\n0.0471624\nWork out -1.5222 * -84.", "\n127.8648\n-717.7*-0.2\n143.54\n33123 * 10\n331230\nMultiply 0.5 and 1.793.", "\n0.8965\n0.07 * -6429.83\n-450.0881\nProduct of -0.16 and -413.", "\n66.08\nMultiply 0.0147 and 509.", "\n7.4823\n581 times -1.96\n-1138.76\n-0.0453526 times -0.4\n0.01814104\nWhat is -21697 times 18?", "\n-390546\n-83.0208 times 0.07\n-5.811456\nProduct of 0.0644 and 172.9.", "\n11.13476\n-436*0.4\n-174.4\nProduct of -5.78 and 5.9.", "\n-34.102\nCalculate 627103*0.1.", "\n62710.3\n-11.897 * -3\n35.691\nProduct of -203 and 1.112.", "\n-225.736\nCalculate 0.9*-17008.", "\n-15307.2\n1.767 * -1928\n-3406.776\n-51743 * 0\n0\n0.05892*-0.48\n-0.0282816\nWhat is the product of -4 and -0.6115?", "\n2.446\nMultiply -4 and 606.75.", "\n-2427\n3 times -29507\n-88521\n0.02 * 1032\n20.64\nWork out 106 * -29.9.", "\n-3169.4\nWhat is 8.2852 times -0.2?", "\n-1.65704\n-616.73*0.15\n-92.5095\nMultiply -19 and -0.05374.", "\n1.02106\nWhat is the product of -10359 and -0.07?", "\n725.13\n-4892*0.03\n-146.76\nCalculate 1253317*-3.", "\n-3759951\n-0.93*0.27\n-0.2511\nWork out 19414 * 0.5.", "\n9707\nWork out -0.041 * -454.2.", "\n18.6222\nCalculate 7502*-0.44.", "\n-3300.88\n0.0319 times 215\n6.8585\nWork out 40 * -165934.", "\n-6637360\n0.112 * -15739\n-1762.768\nWhat is -16 times -201395?", "\n3222320\nCalculate -5068*0.59.", "\n-2990.12\nCalculate -0.1*-1.651029.", "\n0.1651029\nWhat is the product of 0 and 2.013?", "\n0\nMultiply 69.152 and 17.", "\n1175.584\nWhat is 3648 times -123?", "\n-448704\nCalculate -1877*1.34.", "\n-2515.18\n-440.02*1.4\n-616.028\nWork out -0.3 * 3.8649.", "\n-1.15947\nProduct of -1212.49 and 51.", "\n-61836.99\nProduct of 0 and -3178.1.", "\n0\nMultiply -9.344 and -12.", "\n112.128\nWhat is 6.66213 times 0.1?", "\n0.666213\n0.2429*-27\n-6.5583\nProduct of 21725 and 0.5.", "\n10862.5\n28*-8.5\n-238\n3 times -692.647\n-2077.941\nWork out 30309 * -5.", "\n-151545\nWhat is 5 times 1.5818?", "\n7.909\nWork out 254 * 0.16.", "\n40.64\n1.4*-223995\n-313593\n0.073 * 222.3\n16.2279\nWork out 258708 * -0.5.", "\n-129354\n2369*15.1\n35771.9\nWhat is 3 times 92.863?", "\n278.589\nProduct of 0.06 and -63.94.", "\n-3.8364\nMultiply -0.056 and 4964.", "\n-277.984\nWhat is the product of -54355 and 0.2?", "\n-10871\n-11.5*-15.44\n177.56\nCalculate 17977*-9.", "\n-161793\n0.4*-467.914\n-187.1656\n0.3 times 140861\n42258.3\n-71 times -412\n29252\n-91.8*0.851\n-78.1218\n9.874 times 0.05\n0.4937\nCalculate 761*16.", "\n12176\nWhat is -0.35225 times -1.5?", "\n0.528375\nWhat is the product of 80 and -8.181?", "\n-654.48\nWhat is -0.01432 times 5?", "\n-0.0716\nMultiply -102351 and 2.", "\n-204702\nProduct of 4781317 and 0.3.", "\n1434395.1\n0.157 times -1.429\n-0.224353\n0.22 times 0.154\n0.03388\n31*-1765\n-54715\n-11508 times -0.5\n5754\nCalculate 0.1141032*-0.1.", "\n-0.01141032\nWhat is -42.9 times 3.92?", "\n-168.168\n906 * 19\n17214\nMultiply 32.5 and -0.4.", "\n-13\nCalculate -5678*-0.2.", "\n1135.6\n0.35 * -3439\n-1203.65\n-1.17 * -1.1\n1.287\n-309 times -0.6\n185.4\nProduct of -1.74 and 33.", "\n-57.42\nMultiply -15 and 6275.", "\n-94125\nWhat is 167 times 18.4?", "\n3072.8\nProduct of -35.49 and -0.92.", "\n32.6508\n29765.5 * 0.4\n11906.2\nMultiply -1 and 11280.", "\n-11280\nProduct of 36.019 and 0.1.", "\n3.6019\nWhat is 3 times -1.39576?", "\n-4.18728\nCalculate -1.134*-0.83.", "\n0.94122\nProduct of -27.9938 and 4.", "\n-111.9752\n0.80643*1.2\n0.967716\nProduct of -0.06 and -5596.", "\n335.76\nWhat is 1590 times -664?", "\n-1055760\n-296.2 * 2\n-592.4\nProduct of 0.16966 and -0.2.", "\n-0.033932\n109648*0.3\n32894.4\nWhat is the product of -1248.7 and 26.2?", "\n-32715.94\nWhat is -18 times -2.069?", "\n37.242\n0 * 21.31\n0\nWork out 5 * -0.075291.", "\n-0.376455" ]
{ "pile_set_name": "DM Mathematics" }
[ 0, 0, 0, 0, 0, 0.007518796992481203, 0, 0, 0, 0, 0.012658227848101266, 0, 0, 0, 0, 0, 0.016129032258064516, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009615384615384616, 0.008064516129032258, 0, 0.02857142857142857, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02127659574468085, 0, 0, 0, 0, 0.012987012987012988, 0, 0, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0.034482758620689655, 0, 0, 0, 0, 0, 0, 0, 0, 0.03125, 0, 0, 0, 0, 0, 0.02631578947368421, 0.030303030303030304, 0, 0, 0, 0.027777777777777776, 0, 0, 0.00847457627118644, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.020833333333333332, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02, 0, 0, 0, 0.03225806451612903, 0.022222222222222223, 0, 0.0196078431372549, 0, 0, 0, 0, 0, 0.014705882352941176, 0, 0.017241379310344827, 0, 0, 0, 0, 0, 0, 0.01639344262295082, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.037037037037037035, 0, 0.018518518518518517, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02857142857142857, 0, 0, 0, 0, 0.007751937984496124, 0, 0, 0, 0, 0, 0, 0, 0.018867924528301886, 0, 0, 0, 0, 0, 0, 0, 0, 0.027777777777777776, 0, 0 ]
0.003436
5
[ "Q:\n\nRails: deleting a remote file\n\nI've got two Rails apps. ", "How would I delete a file in /public on the remote app from the local app? ", "Pretty vague question I realise, just not sure how to start it all?", "\nThanks!", "\n\nA:\n\nTry this\nIn your controller action\nif File.exist?(file_path)\n File.delete(file_path)\nend\n\nUpdate\nFirst you need to allow CORS Requests in your Rails app\nIn your application_controller.rb add the following lines\n#application_controller.rb \nclass ApplicationController < ActionController::Base\n\n before_filter :allow_cors_requests\n\n def allow_cors_requests\n headers[\"Access-Control-Allow-Origin\"] = \"*\"\n headers[\"Access-Control-Allow-Methods\"] = \"GET, PUT, POST, DELETE\" # In your case just use delete\n headers[\"Access-Control-Allow-Headers\"] = \"Content-Type, X-Requested-With, X-CSRF-Token, Origin Accept\"\n head(:ok) if request.request_method == \"OPTIONS\"\n end\n\nend\n\nNow from your controller action make a ajax request to delete a file.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0.00788436268068331, 0 ]
0.001314
5
[ "Turns out you are not allowed to move white goods onto a train in Queensland, even if it is outside of peak hour.", "\n\nBut as Queensland Rail security video reveals, two would-be rail removalists in Brisbane had a crack a couple of months ago.", "\n\nThe footage shows a man encountering some difficulty as he wheels a fridge, mounted on a hand trolley, from a rail overpass into an elevator.", "\n\nHe then manoeuvrers it onto the Bowen Hills platform and into a waiting train.", "\n\nA man was fined $252 for taking a fridge onto a Brisbane train. ( ", "ABC News: Chris O'Brien )\n\nSecurity guards then direct him, and the fridge, back off the train where he is given a ticket for bringing an oversized item onto a train.", "\n\nThe man and his fridge are then escorted back towards the station entrance.", "\n\nThe man was fined $252 for the fridge, and more for fare evasion.", "\n\nCoincidentally ABC state political reporter Chris O'Brien happened to be there at the time, tweeting, \"yes that's right, fridge on a train.\"", "\n\n\"I was fascinated by the sight of a gentleman wheeling a fridge on to the platform, and the puzzled reaction by station staff,\" he said.", "\n\n\"I could tell that staff weren't quite sure how to react, which is understandable.", "\n\n\"But my main impression was that here was a bloke, who was maybe doing it tough, who needed to get a fridge home and didn't have any other way to do it.\"", "\n\nCouches, lawnmowers, front door also attempted\n\nIn a second video a man takes a couch off a train at Bowen Hills.", "\n\nLoading\n\nHe leaves it on the platform for a while, then moves it down the platform and into a lift before finding a shopping trolley to take it the rest of the way.", "\n\nQueensland Rail's Justine Scarff said people were not allowed to take things onto trains that could not fit on luggage racks or under seats.", "\n\n\"We obviously need to be mindful of other people travelling; trains are for people, they aren't for fridges and couches unfortunately,\" she said.", "\n\n\"I hope he decided to book a removalist as we would encourage people to do, or call up one of his mates with a ute.\"", "\n\nMs Scarff said it was not the weirdest thing people had taken on trains.", "\n\nShe said someone had taken a lawnmower onto a train, while QR's lost-and-found had come into possession of some obscure objects.", "\n\n\"We've even had a glass eye left behind, and a front door, there are some weird and wacky things that happen across the network.\"", "\n\nBikes are allowed on Queensland trains except for when the commuter is travelling towards the CBD during morning peak times, or away from the city during afternoon peak times." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.007936507936507936, 0, 0, 0, 0.012048192771084338, 0, 0, 0.014084507042253521, 0, 0, 0, 0, 0, 0.007042253521126761, 0, 0, 0, 0.007692307692307693, 0, 0.005649717514124294 ]
0.002593
5
[ "Q:\n\nHow to get the integral (function) from a vector?", "\n\nI have a vector than can be plotted and I would like to compute its integral. ", "I don't mean the total area below, but how it evolves over the domain of integration. ", "Basically, its \"indefinite\" integral. ", "Is this possible? ", "maybe via interpolation? ", "Since I am working with Chebyshev differentiation matrices, do you know if there is an equivalent for integration?", "\nThank you\n\nA:\n\nYou probably want cumtrapz:\nx = linspace(0,2*pi,1000); % example x axis values\ny = sin(x); % example function\nI = cumtrapz(x, y); % compute its integral\nplot(x, y, x, I) % plot them\ngrid on % grid\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "A user may enter commands and interact with a computer system by manipulating data or images in a window on a display, or by selecting operations from a menu associated with the window or an associated program, using input devices such as a mouse, keyboard, joystick, cross-key, or the like. ", "Such input devices may also operate as position translating devices, which can be used to position a graphical, on-screen pointer, such as a cursor. ", "A cursor functions, for example, to indicate a character to be revised or to indicate a position where data is to be entered or an operation is to be performed. ", "A cursor, in some form or appearance, is typically present on the computer display. ", "Manipulation of an input device by a user will result in a corresponding movement of the cursor. ", "Thus, for example, movement of a mouse or other input device results in movement of the cursor in the same direction.", "\nThese conventional input devices are, however, often just that, devices. ", "The user is required to have a wired or wireless mouse or other input device and to use that device to manage selection, position translation, activation, and other input functions. ", "Often the use of these physical devices is not natural or intuitive. ", "Another disadvantage is the need to go through certain steps to change the context of the input device so that different functions may be performed." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Sea Legs (film)\n\nSea Legs is a 1930 American pre-Code comedy film directed by Victor Heerman and written by George Marion Jr. and Marion Dix. ", "The film stars Jack Oakie, Eugene Pallette, Lillian Roth, André Cheron, Albert Conti, Harry Green and Jean Del Val. ", "The film was released on November 29, 1930, by Paramount Pictures.", "\n\nPlot\n\nCast \nJack Oakie as Searchlight Doyle\nEugene Pallette as Hyacinth Nitouche\nLillian Roth as Adrienne\nAndré Cheron as High Commissioner\nAlbert Conti as Captain\nHarry Green as Gabriel Grabowski\nJean Del Val as Crosseti\nCharles Sellon as\tAdm. O'Brien\nTom Ricketts as Commander\n\nReferences\n\nExternal links\n \n\nCategory:1930 films\nCategory:1930s comedy films\nCategory:American films\nCategory:American comedy films\nCategory:American black-and-white films\nCategory:English-language films\nCategory:Films directed by Victor Heerman\nCategory:Films made before the MPAA Production Code\nCategory:Paramount Pictures films" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.028169014084507043, 0.05172413793103448, 0.015151515151515152, 0.030944625407166124 ]
0.031497
5
[ "Pakistan And Afghanistan Vow To Fight Taliban\n\nA Pakistani soldier stands outside the main entrance of an army-run school a day after it was attacked by militants in Peshawar on December 17.", "\n\nShare\n\nPakistan And Afghanistan Vow To Fight Taliban\n\nshare\n\nPakistan's army chief, Raheel Sharif, visited Kabul for talks with Afghan President Ashraf Ghani, and the two vowed to fight \"terrorism and extremism\" together.", "\n\nSharif arrived on December 17, one day after a massacre at a Pakistani school in Peshawar left at least 148 people dead, most of them schoolchildren.", "\n\nThe Pakistani Taliban claimed responsibility.", "\n\nAfter his meeting with Sharif, Ghani said in a statement, \"The time has come for Afghanistan and Pakistan to work together in sincerity and jointly take effective actions against terrorism and extremism.\"", "\n\nSharif also met International Security Assistance Force (ISAF) commander General John Campbell.", "\n\nAfghanistan has also been facing a spike in terrorist attacks in recent weeks, including a suicide bombing in the southern Kandahar Province during the morning of December 17.", "\n\nMeanwhile, Pakistani Prime Minister Nawaz Sharif has lifted a moratorium on the death penalty in terrorism-related cases, a day after the Taliban massacre in Peshawar.", "\n\nSharif approved the removal of the moratorium on December 17 as Pakistan began three days of national mourning for the victims of the school massacre and devastated families buried their children.", "\n\nSharif told a gathering in Peshawar of all parliamentary parties that Pakistan \"will fight the war against terrorism keeping in mind the faces of the innocent children\" who were killed at their school.", "\n\nSharif called the meeting in a bid to bring the country's politicians together in a unified effort against militant violence.", "\n\nSharif said that, within a week, \"all parliamentary and political leaders will decide a national consensus to defeat terrorism.\"", "\n\nEarlier, Sharif pledged to avenge what he called a \"national tragedy unleashed by savages.\"", "\n\nU.S. President Barack Obama spoke by phone with Sharif on December 17 to express condolences and \"unwavering support\" after the Taliban attack. \"", "The two leaders acknowledged the shared threat from terrorism, and the president made clear that the United States will continue to support Pakistan in its fight against extremism,\" the White House said in a statement.", "\n\nPakistan imposed a moratorium on implementing the death penalty in 2008, but judges have continued to issue death sentences in some criminal and terrorism cases. ", "Rather than being executed, those sentenced to death have remained imprisoned on death row for the duration of the moratorium.", "\n\nInternational and Pakistani rights groups say about 800 of some 8,000 prisoners currently on death row in Pakistan were convicted on terrorism charges.", "\n\nThe December 16 attack on the army-run school in Peshawar was one of the deadliest terrorist attacks in Pakistan's history.", "\n\nThe school teaches boys and girls from both military and civilian families.", "\n\nPakistan's army said the attack was carried out by seven gunmen, all wearing bomb vests, who systematically went from room to room shooting pupils and teachers.", "\n\nScores of people were killed and wounded before the attackers themselves were killed.", "\n\n​A Tehrik-e Taliban Pakistan (TTP) spokesman, who called himself Muhammad Khorasani, phoned an RFE/RL Radio Mashaal correspondent and claimed responsibility for the attack, saying it was retaliation for Pakistani military operations in nearby tribal areas.", "\n\nIn Peshawar and its environs, mourners gathered around coffins for the funerals of the victims on December 17 after people across the country staged candlelight vigils overnight.", "\n\nWith reporting by Reuters, AP, AFP, \"Dawn,\" \"Hurriyet\" and Radio Pakistan" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.008968609865470852, 0.006622516556291391, 0.02127659574468085, 0.009708737864077669, 0.030927835051546393, 0, 0.011834319526627219, 0, 0.0049261083743842365, 0, 0.007692307692307693, 0.010752688172043012, 0.02040816326530612, 0.0045871559633027525, 0, 0, 0, 0, 0, 0, 0, 0.015503875968992248, 0, 0.05333333333333334 ]
0.008262
5
[ "2016 Portland Thorns FC season\n\nThe 2016 season is the Portland Thorns FC's fourth season of existence in the National Women's Soccer League (NWSL), the top division of women's soccer in the United States. ", " The Thorns finished in 6th place in the 2015 season.", "\n\nBackground\n\nSeason Review\n\nApril\nThe Thorns began their season at Providence Park as they faced off against the inaugural match for Orlando Pride SC. ", " Former Thorn, Steph Catley was able to strike first for Orlando in the 12th minute. ", " Portland would soon respond with goals from Dagný Brynjarsdóttir in the 25th minute and Linsey Horan in the 81st minute. ", " Both goals would be assisted by captain, Tobin Heath. ", " Thorns FC would win their home opener 2-1.", "\n\nFor their last match in April, the Thorns traveled to Kansas City where they would receive a 1-1 draw. ", " Shea Groom was able to strike first with a goal in the 30th minute; however, Lindsey Horan was able to level the Thorns in the 78th minute once again assisted by Tobin Heath.", "\n\nPosition at the end of April\n\nMay\nThe Thorns began their month of May continuing their 4-game road spell against Boston Breakers where Dagny Brynjarsdottir scored the lone goal and Tobin Heath continued her assist streak to 4 in a row. ", " The Thorns would end up winning 1-0.", "\n\nThe Thorns traveled to D.C. to take on the Washington Spirit. ", "The team would end up drawing 0-0 with Tobin Heath acquiring two yellow cards thus suspending her for the next match against local rivals, Seattle Reign FC.", "\n\nThe Thorns finished their 4 away matches in Seattle as they faced off against Reign FC. ", " Nadia Nadim would score her first of the season with an assist by Meg Morris, however would Seattle respond within 3 minutes by a goal from Yanez, equalizing at 1-1. ", " Both teams would settle for the draw.", "\n\nIn the first of a two-game home stand, the Thorns secured a 3-1 win over the then-first-place Washington Spirit. ", "In their last game of the month, missing 6 starters due to USWNT call-ups, the Thorns played Seattle to a 0-0 draw.", "\n\nPosition at the end of May\n\nJune\nThe Thorns began June with a two-game road trip, first holding on for a 1-1 draw with Chicago Red Stars and then prevailing 2-0 over Western New York Flash. ", "Of note, Amandine Henry made her first appearance as a Thorn as a second-half substitute in that game.", "\n\nThe Thorns played a crucial match against Chicago Red Stars to determine who would remain in first place. ", " The Thorns prevailed with a 2-0 win with goals from Christine Sinclair and Nadia Nadim with an assist from Amandine Henry, who also started for the first time for the club.", "\n\nContinuing their unbeaten streak (11 games without a loss from the beginning of the season to the end of June), the Thorns traveled to Florida to take on Orlando Pride. ", " The Thorns would win it 2-1, with goals from Dagny Brynjarsdottir and Lindsey Horan.", "\n\nPosition at the end of June\n\nJuly\nThe Thorns opened July play without 6 starters due to USWNT and CanWNT Olympics preparations for a home game against Sky Blue. ", "Amandine Henry would join the French National Team after the game. ", "The starting lineup included players who previously had seen limited professional minutes or even earning her first start. ", "Sky Blue scored first and the Thorns came back to win 2-1 with goals from Dagný and Nadim to extend their season-opening unbeaten streak to 12 games.", "\n\nFor their second match for the month, the Thorns took on FC Kansas City at home. ", " Now without 7 starting players and using their new amateur players (a rule that allows a team to bring in non-paid players when national players go on duty), the Thorns would suffer their first loss of the season, falling 2-1 with the only goal scorer being Kat Williamson who was assisted by Dagný Brynjarsdóttir.", "\n\nThe Thorns then went on the road and continuing the stretch without their Olympians, this time also without Dagný as well, lost 3-0 to the 9th-place Houston Dash.", "\n\nIn their last game of both July and before the league-wide Olympics break, the Thorns hosted Seattle Reign at Providence Park. ", "Playing their first 5-4-1 formation of the season, Mana Shim passed to Nadia Nadim who headed home the game's only goal and the Thorns remained in 1st place.", "\n\nPosition at the end of July\n\nAugust \nDue to the Olympic Games in Brazil, NWSL did not schedule games most of the month. ", "The Thorns traveled to Seattle at the end of the month and fell 3-1 to the Reign.", "\n\nPosition at the end of August\n\nSeptember \nThe Thorns started off their final month in NWSL League play on a busy week with 3 matches in 7 days. ", " The team, fully reunited after the Olympics, hosted Boston Breakers where the Thorns took a dominating 5-1 victory, keeping them in the race for the NWSL Supporters' Shield.", "\n\nContinuing their busy week, Portland Thorns took on Houston Dash. ", "In the 19th minute, Portland fans and team members had learned that they had clinched a playoff berth with Seattle Reign's loss to Washington Spirit from a message on the big screen. ", " The Thorns started off strong with a brace from Allie Long, both goals assisted by Tobin Heath in the 26th and 71st minute. ", " Christine Sinclair would finish up by scoring in the 90th minute and shutting out Houston Dash 3-0, putting Michelle Betos with 4 clean sheets for the season so far.", "\n\nTo conclude the stretch of 3 games in 8 days, the Thorns played the Western New York Flash in front of their only sold-out crowd of the year, with 21,144 announced attendance. ", "The Thorns went ahead 3-0 only to concede 2 goals within 4 minutes late in the game, but hung on to win and clinch a home playoff match (1st or 2nd in the league).", "\n\nOn Sunday September 25, the Thorns clinched the NWSL Shield with a win over Sky Blue FC and Washington Spirit losing to Chicago Red Stars. ", " The Thorns will host Western New York Flash in the semi-finals for the NWSL Playoffs.", "\n\nPosition at the end of the season\n\nCompetitions\n\nNWSL\n\nPre-season\n\nProvidence Park Pre-season Tournament\n\nRegular Season\n\nThe 2016 NWSL Regular Season schedule was released on February 18, 2016.", "\n\nResults By Round\n\nHome/Away Results\n\nLeague Table\n\nNWSL Playoffs\n\nClub\n\nExecutive staff\n\nCoaching Staff\n\nGrounds\n\nKits\n\nPrimary Kit\nThe 2016 primary kits are their signature red color with a \"spray on\" black on the ends of the sleeves. ", " The kits remain Nike and the sponsorship with their sponsor Providence Health and Services on the front.", "\n\nSecondary Kit\nThe 2016 secondary kits feature the same style as the first kit, however instead of red, it is white with the \"spray on\" black sleeve style. ", " The kit is also Nike and shows the Providence Health and Services sponsorship.", "\n\nThird Kit\nThe Thorns do not have a third kit for 2016.", "\n\nFirst Team\n\nRoster\nAll players contracted to the club during the season included.", "\nLast updated: August 30, 2016\n\n (HG) = Homegrown Player\n (NTA) = National Team Allocated Player\n (Loan) = On Loan\n (AP) = Amateur Player\n\nSquad statistics\nSource: NWSL\n\nSquad statistics are of regular season only\n\nPlayer Transactions\n\nNational Team Player Allocation\n\nTransfers In\n\nLoans In\n\nLoans Out\n\nTransfers Out\n\nContract Extensions\n\nNational Women's Soccer League College Draft \n\nThe draft was held on January 15, 2016.", "\n\nStaff In\n\nStaff Out\n\nNational team participation \nTen Thorns players have been called up to play for their national teams during this season.", "\n\nStatistics\n\nAppearances\n\nGoalkeeper stats\n\nLine-up\n\nTop scorers\nThe list is sorted by shirt number when total goals are equal.", "\n\nTop assists\nThe list is sorted by shirt number when total assists are equal.", "\n\nClean sheets\nThe list is sorted by shirt number when total appearances are equal.", "\n\nSummary\n\nHonors\n\nNWSL Player of the Month\n\nNWSL Weekly Awards\n\nNWSL Player of the Week\n\nNWSL Goal of the Week\n\nNWSL Save of the Week\n\nSee also\n 2016 National Women's Soccer League season\n\nReferences\n\nExternal links\n\n \n\nPortland Thorns FC\nCategory:Portland Thorns FC seasons\nPortland Thorns FC\nPortland Thorns FC\nPortland" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.014563106796116505, 0, 0.006578947368421052, 0.023529411764705882, 0.01639344262295082, 0.01818181818181818, 0, 0, 0.017142857142857144, 0.008403361344537815, 0, 0, 0.01282051282051282, 0, 0.017964071856287425, 0, 0, 0.008695652173913044, 0.010416666666666666, 0.0196078431372549, 0.009259259259259259, 0.017341040462427744, 0.005847953216374269, 0.023529411764705882, 0.012269938650306749, 0.029850746268656716, 0, 0.013422818791946308, 0.012048192771084338, 0.006349206349206349, 0, 0.007751937984496124, 0.012738853503184714, 0.00819672131147541, 0.012345679012345678, 0.00684931506849315, 0.005747126436781609, 0.014705882352941176, 0.01092896174863388, 0.016, 0.006024096385542169, 0.0056179775280898875, 0, 0.0070921985815602835, 0.023255813953488372, 0, 0, 0.01904761904761905, 0, 0.02531645569620253, 0, 0, 0.018779342723004695, 0, 0, 0, 0, 0.009316770186335404 ]
0.008861
5
[ "The leader of ultranationalist group Right Sector, Dmitry Yarosh, has threatened to destroy Russian pipelines on Ukrainian territory if a diplomatic solution is not reached with Moscow.", "\n\nIn a fiery address loaded warmongering rhetoric, Yarosh told his followers they should be ready to resist the Russian “occupiers.” ", "The leader of the Right Sector made his address to the coup-appointed government in Kiev, as Crimeans made their way to ballots Sunday to vote to join with Russia or to remain within Ukraine.", "\n\n“We cannot allow the enemy to carry out a blitzkrieg attack on Ukrainian territory. ", "We mustn’t forget that Russia makes money sending its oil through our pipelines to the West. ", "We will destroy these pipelines and deprive our enemy of its source of income,” Yarosh said.", "\n\nContinuing the bellicose rhetoric, Yarosh appealed to his followers, urging them to take up arms against Russia, if a diplomatic solution cannot be reached.", "\n\nYarosh said that Crimea was too small to satisfy the appetite of the “Russian Empire,” and that the Kremlin would seek to take over the whole of Ukraine.", "\n\n“Let the ground burn under the feet of the occupiers! ", "Let them choke on their own blood when they attack our territory! ", "Not one step back! ", "We will not allow Moscow’s beserk, totalitarian regime to spark a Third World War!”", "\n\nThe phrase “Not one step back!” ", "was used in a famous order by Joseph Stalin during WWII and became a popular slogan for the Soviet people’s resistance against the Nazis. ", "Yarosh’s use of this particular rhetoric attracted attention from many observers, given that the members of his Right Sector group are known to use Nazi insignia.", "\n\nRussia put Yarosh on an international wanted list and charged him with inciting terrorism after he urged Chechen terrorist leader Doku Umarov to launch attacks on Russia over the Ukrainian conflict.", "\n\nYarosh has declared his intentions of running for Ukrainian president in May.\n\nThe Right Sector movement, an amalgamation of several far-right groups, was formed in November 2013.", "\n\nMembers of the radical movement were very active in the violence which triggered the ouster of President Viktor Yanukovich. ", "The Right Sector refused to recognize the Feb. 21 agreement between Yanukovich and the opposition leaders, and declared that they would fight him until his ouster.", "\n\nRight Sector’s fighters used clubs, petrol bombs and firearms against the Ukrainian police. ", "Even after the coup, some members of the movement continued to use rifles and pistols.", "\n\nLast week, a proposal was submitted to the Ukrainian parliament, suggesting that Right Sector be transformed into a regular unit of the armed forces." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.010810810810810811, 0.007518796992481203, 0, 0, 0, 0.010869565217391304, 0.006329113924050633, 0.012903225806451613, 0, 0, 0, 0, 0, 0.007246376811594203, 0.006172839506172839, 0.01, 0, 0.007936507936507936, 0.006134969325153374, 0, 0, 0 ]
0.003906
5
[ "Dr. James Waller is the Cohen Professor of Holocaust and Genocide Studies at Keene State College (NH). ", "Keene State College is home to the Cohen Center for Holocaust and Genocide Studies, one of the nation’s oldest Holocaust resource centers, and also offers the only undergraduate major in Holocaust and Genocide Studies in the United States. ", "Waller is a widely-recognized scholar in the field of Holocaust and genocide studies and, in addition to holding visiting professorships at the Technical University in Berlin (1990) and the Catholic University in Eichstatt, Germany (1992), has been an invited participant in international seminars hosted by the Stanley Burton Centre for Holocaust Studies at the University of Leicester in England (2006); the Institute of Sociology at Jagiellonian University in Krakow, Poland (2007 and 2008); the Bundeszentrale fur politische Bildung in Berlin, Germany (2009); the VU University Amsterdam in the Netherlands (2009); the University of Alberta in Canada (2010); and the Institute of Advanced Legal Studies in London (2011). ", "Waller has been awarded summer fellowships by, and been a teaching fellow with, the Holocaust Educational Foundation at Northwestern University (1996 and 2007-2012) and at the Center for Advanced Holocaust Studies at the U.S. Holocaust Memorial Museum in Washington, D.C. (1999, 2003, and 2005). ", "For spring 2017, he has been named Honorary Visiting Research Fellow at the Institute for the Study of Conflict Transformation and Social Justice at Queen’s University in Belfast, Northern Ireland. ", "Waller is the author of the 2016 book Confronting Evil: Engaging Our Responsibility to Prevent Genocide, published by Oxford University Press.", "\n\nGenocide\n\nGenocidal destruction is not an easy story to tell, nor is it an easy story to hear. ", "It is, though, a story that must be told and heard. ", "Today – as atrocities impact hundreds of thousands of civilians in Syria, Iraq, Burundi, the Central African Republic, Sudan, South Sudan, Burma and elsewhere – we remain faced with the urgency of a world intent on tearing itself apart.", "\n\nAs ubiquitous as genocide seems, it is a human problem and, as such, has a human solution. ", "At its root, genocide happens because we choose to see a people rather than individual people and then we choose to kill those people in large numbers and over an extended period of time.", "\n\nIn the midst of that bad news, the good news is that we can make another choice; we can find constructive, rather than destructive, ways to live with our diverse social identities. ", "Preventing genocide is an achievable goal. ", "Indeed, there is increasing interest and a growing literature outlining the ways in which we can prevent genocide in the belief that such knowledge will help shape our will do to so.", "\n\nThe goal is to present an analysis of genocide in the modern world that draws out the lessons to be learned in preventing genocide from ever taking place, preventing further atrocities once genocide has begun, and preventing future atrocities once a society has begun to rebuild after genocide.", "\n\nAlso to encourage all citizens, scholars, experts and non-specialists alike to understand the need to be engaged, well informed and involved, when necessary—and to understand the difference between being a bystander and being an upstander in the face of these atrocities.", "\n\nAfter all, genocide prevention is not what makes headlines, but it is what prevents the worst of headlines from being made." ]
{ "pile_set_name": "Pile-CC" }
[ 0.02912621359223301, 0.0125, 0.012413793103448275, 0.016891891891891893, 0.015151515151515152, 0.014084507042253521, 0, 0, 0.00423728813559322, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.006141
5
[ "SOPHISTICATED STYLE AND SOUND\n\nOriginally intended for sophisticated jazz guitarists, the Jazzmaster was quickly embraced by musicians attracted to its left-of-center looks and fat sound. ", "A direct descendent of the guitar that powered underground music from the late-'60s to today, the American Professional Jazzmaster is ready to lend its unique sound to your playing.", "\n\nLOVE OF THE JAZZMASTER\n\nV-MOD PICKUPS\n\nV-Mod Jazzmaster pickups are voiced specifically for their positions, overwound for hotter tone with the vintage warmth and clarity that made Fender a legend.", "\n\nNEW “DEEP C” NECK PROFILE\n\nDesigned for comfort and speed, the new American Professional “Deep C” neck profile sports more substantial shoulders. ", "The increased mass and altered geometry creates a more natural feel that’s perfect for chord and single-note playing alike.", "\n\nNARROW-TALL FRETS\n\nNarrow-tall frets are taller and narrower than their medium jumbo cousins, making them especially effective for bending notes and playing chords up the neck with perfect intonation.", "\n\nNEW BRIDGE\n\nEngineered for ultra-stable performance, the American Professional Jazzmaster bridge features brass Mustang saddles and a screw-in arm. ", "The new saddles keep the strings where they belong, even when the bridge is pummeled, while the new arm lets you dial-in the arm tension that’s perfect for you.", "\n\nTREBLE-BLEED CIRCUIT\n\nThe treble-bleed circuit maintains the high end when turning down the volume knob to reduce gain, letting your tone shine through, no matter where the instrument’s volume is set.", "\n\nBONE NUT\n\nAn original-era Fender design element, a bone nut contributes to superior tone and performance. ", "Many players consider bone nuts to be more “organic” sounding." ]
{ "pile_set_name": "Pile-CC" }
[ 0.005319148936170213, 0.0055248618784530384, 0, 0.013513513513513514, 0, 0.0049504950495049506, 0.013333333333333334, 0, 0.0049504950495049506, 0.009259259259259259, 0 ]
0.005168
5
[ "Good news, digital pack rats! ", "The 2014 Moto X just got an extra 64GB storage option in time for the new year. ", "The option was added to MotoMaker today, where for $599.99 ($100 over the usual $499.99 MSRP) you can boost the unlocked \"Pure Edition\" model to the higher storage tier.", "\n\nWhile you can get an iPhone in 64GB, and even 128GB versions, it's pretty rare to find a 64GB Android phone. ", "The Galaxy S5, HTC One M8, LG G3, and Xperia Z3 all cap out at 32GB. ", "Really the only thing out there is the Note 4, which is available in 64GB, but not the US version. ", "Some of these devices support SD cards, but, on Android SD, storage often isn't as useful as the \"default\" internal storage.", "\n\nMotoMaker's pricing display is a little confusing, but the new storage tier brings the available off-contract options to $599.99 for the 64GB unlocked version, $549.99 for the 32GB unlocked, AT&T, or Verizon version, $499.99 for the 16GB unlocked, AT&T, or Verizon versions. ", "A single carrier, Republic Wireless, gets a $100 discount on everything, and MotoMaker promotes that price over everything else, making you drill down to find the price the majority of people will pay. ", "The 64GB option is exclusive to the \"Pure Edition,\" which is just marketing-speak for the unlocked version without any crapware." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0.005917159763313609, 0.009009009009009009, 0.028985507246376812, 0, 0.008064516129032258, 0.021660649819494584, 0.009900990099009901, 0 ]
0.008354
5
[ "are the prime factors of 1697?", "\n1697\nList the prime factors of 10056.", "\n2, 3, 419\nWhat are the prime factors of 8995?", "\n5, 7, 257\nList the prime factors of 9011.", "\n9011\nWhat are the prime factors of 55304?", "\n2, 31, 223\nWhat are the prime factors of 20643?", "\n3, 7, 983\nWhat are the prime factors of 110788?", "\n2, 27697\nWhat are the prime factors of 9579?", "\n3, 31, 103\nWhat are the prime factors of 2513?", "\n7, 359\nWhat are the prime factors of 3300?", "\n2, 3, 5, 11\nWhat are the prime factors of 741?", "\n3, 13, 19\nWhat are the prime factors of 683?", "\n683\nList the prime factors of 5050.", "\n2, 5, 101\nWhat are the prime factors of 4857?", "\n3, 1619\nWhat are the prime factors of 26?", "\n2, 13\nList the prime factors of 932.", "\n2, 233\nWhat are the prime factors of 668?", "\n2, 167\nList the prime factors of 45265.", "\n5, 11, 823\nWhat are the prime factors of 26110?", "\n2, 5, 7, 373\nWhat are the prime factors of 9169?", "\n53, 173\nWhat are the prime factors of 274?", "\n2, 137\nList the prime factors of 1309.", "\n7, 11, 17\nWhat are the prime factors of 4205?", "\n5, 29\nList the prime factors of 2298.", "\n2, 3, 383\nWhat are the prime factors of 486?", "\n2, 3\nWhat are the prime factors of 1702?", "\n2, 23, 37\nWhat are the prime factors of 15901?", "\n15901\nWhat are the prime factors of 7773?", "\n3, 2591\nWhat are the prime factors of 1898?", "\n2, 13, 73\nList the prime factors of 16.", "\n2\nWhat are the prime factors of 16507?", "\n17, 971\nWhat are the prime factors of 1452?", "\n2, 3, 11\nList the prime factors of 13128.", "\n2, 3, 547\nWhat are the prime factors of 14307?", "\n3, 19, 251\nWhat are the prime factors of 1713?", "\n3, 571\nWhat are the prime factors of 17882?", "\n2, 8941\nWhat are the prime factors of 2234?", "\n2, 1117\nWhat are the prime factors of 2131?", "\n2131\nList the prime factors of 2338.", "\n2, 7, 167\nWhat are the prime factors of 2155?", "\n5, 431\nWhat are the prime factors of 8691?", "\n3, 2897\nList the prime factors of 21370.", "\n2, 5, 2137\nList the prime factors of 3304.", "\n2, 7, 59\nList the prime factors of 1908.", "\n2, 3, 53\nWhat are the prime factors of 1333?", "\n31, 43\nList the prime factors of 2416.", "\n2, 151\nWhat are the prime factors of 21198?", "\n2, 3, 3533\nWhat are the prime factors of 3651?", "\n3, 1217\nList the prime factors of 31003.", "\n7, 43, 103\nList the prime factors of 51040.", "\n2, 5, 11, 29\nList the prime factors of 201.", "\n3, 67\nList the prime factors of 168175.", "\n5, 7, 31\nWhat are the prime factors of 4647?", "\n3, 1549\nWhat are the prime factors of 420?", "\n2, 3, 5, 7\nList the prime factors of 10467.", "\n3, 1163\nWhat are the prime factors of 8847?", "\n3, 983\nWhat are the prime factors of 3891?", "\n3, 1297\nWhat are the prime factors of 11348?", "\n2, 2837\nList the prime factors of 375.", "\n3, 5\nList the prime factors of 1157.", "\n13, 89\nWhat are the prime factors of 370?", "\n2, 5, 37\nWhat are the prime factors of 1782?", "\n2, 3, 11\nList the prime factors of 47945.", "\n5, 43, 223\nList the prime factors of 38829.", "\n3, 7, 43\nWhat are the prime factors of 26011?", "\n19, 37\nWhat are the prime factors of 7647?", "\n3, 2549\nWhat are the prime factors of 1079?", "\n13, 83\nList the prime factors of 8475.", "\n3, 5, 113\nList the prime factors of 5847.", "\n3, 1949\nWhat are the prime factors of 30321?", "\n3, 1123\nList the prime factors of 5598.", "\n2, 3, 311\nList the prime factors of 4012.", "\n2, 17, 59\nList the prime factors of 24866.", "\n2, 12433\nWhat are the prime factors of 6441?", "\n3, 19, 113\nWhat are the prime factors of 5833?", "\n19, 307\nList the prime factors of 1354.", "\n2, 677\nWhat are the prime factors of 1099?", "\n7, 157\nWhat are the prime factors of 170566?", "\n2, 11, 7753\nWhat are the prime factors of 4336?", "\n2, 271\nList the prime factors of 32513.", "\n13, 41, 61\nList the prime factors of 631.", "\n631\nWhat are the prime factors of 13625?", "\n5, 109\nWhat are the prime factors of 44539?", "\n11, 4049\nList the prime factors of 2994.", "\n2, 3, 499\nWhat are the prime factors of 616?", "\n2, 7, 11\nList the prime factors of 32532.", "\n2, 3, 2711\nWhat are the prime factors of 450?", "\n2, 3, 5\nWhat are the prime factors of 4865?", "\n5, 7, 139\nWhat are the prime factors of 12236?", "\n2, 7, 19, 23\nWhat are the prime factors of 3869?", "\n53, 73\nWhat are the prime factors of 45576?", "\n2, 3, 211\nList the prime factors of 2542.", "\n2, 31, 41\nWhat are the prime factors of 12075?", "\n3, 5, 7, 23\nList the prime factors of 1290.", "\n2, 3, 5, 43\nList the prime factors of 762.", "\n2, 3, 127\nWhat are the prime factors of 1073?", "\n29, 37\nWhat are the prime factors of 10655?", "\n5, 2131\nWhat are the prime factors of 1099?", "\n7, 157\nWhat are the prime factors of 1628?", "\n2, 11, 37\nWhat are the prime factors of 9454?", "\n2, 29, 163\nList the prime factors of 1039.", "\n1039\nWhat are the prime factors of 100003?", "\n100003\nWhat are the prime factors of 1990?", "\n2, 5, 199\nList the prime factors of 11821.", "\n11821\nWhat are the prime factors of 2732?", "\n2, 683\nWhat are the prime factors of 29?", "\n29\nWhat are the prime factors of 8407?", "\n7, 1201\nWhat are the prime factors of 3035?", "\n5, 607\nList the prime factors of 2487.", "\n3, 829\nList the prime factors of 20597.", "\n43, 479\nWhat are the prime factors of 1809?", "\n3, 67\nWhat are the prime factors of 15450?", "\n2, 3, 5, 103\nList the prime factors of 1255.", "\n5, 251\nList the prime factors of 3885.", "\n3, 5, 7, 37\nList the prime factors of 74787.", "\n3, 97, 257\nWhat are the prime factors of 215?", "\n5, 43\nList the prime factors of 40864.", "\n2, 1277\nList the prime factors of 340.", "\n2, 5, 17\nWhat are the prime factors of 5543?", "\n23, 241\nList the prime factors of 726.", "\n2, 3, 11\nWhat are the prime factors of 20005?", "\n5, 4001\nWhat are the prime factors of 1138?", "\n2, 569\nList the prime factors of 459.", "\n3, 17\nWhat are the prime factors of 4267?", "\n17, 251\nList the prime factors of 3724.", "\n2, 7, 19\nWhat are the prime factors of 935?", "\n5, 11, 17\nWhat are the prime factors of 54023?", "\n89, 607\nList the prime factors of 492.", "\n2, 3, 41\nWhat are the prime factors of 5839?", "\n5839\nList the prime factors of 397.", "\n397\nList the prime factors of 1225.", "\n5, 7\nList the prime factors of 1664.", "\n2, 13\nWhat are the prime factors of 122462?", "\n2, 61231\nList the prime factors of 186356.", "\n2, 46589\nList the prime factors of 556.", "\n2, 139\nList the prime factors of 140411.", "\n140411\nWhat are the prime factors of 19684?", "\n2, 7, 19, 37\nList the prime factors of 79147.", "\n79147\nWhat are the prime factors of 1386?", "\n2, 3, 7, 11\nWhat are the prime factors of 126755?", "\n5, 101, 251\nWhat are the prime factors of 389?", "\n389\nList the prime factors of 20494.", "\n2, 10247\nWhat are the prime factors of 64359?", "\n3, 7151\nList the prime factors of 1549.", "\n1549\nList the prime factors of 586.", "\n2, 293\nList the prime factors of 554.", "\n2, 277\nList the prime factors of 11360.", "\n2, 5, 71\nWhat are the prime factors of 1126?", "\n2, 563\nList the prime factors of 7057.", "\n7057\nWhat are the prime factors of 3112?", "\n2, 389\nWhat are the prime factors of 7678?", "\n2, 11, 349\nWhat are the prime factors of 2767?", "\n2767\nWhat are the prime factors of 37701?", "\n3, 59, 71\nList the prime factors of 463.", "\n463\nWhat are the prime factors of 1545?", "\n3, 5, 103\nList the prime factors of 1668.", "\n2, 3, 139\nList the prime factors of 2348.", "\n2, 587\nList the prime factors of 86978.", "\n2, 157, 277\nWhat are the prime factors of 8205?", "\n3, 5, 547\nWhat are the prime factors of 556?", "\n2, 139\nWhat are the prime factors of 7766?", "\n2, 11, 353\nList the prime factors of 4596.", "\n2, 3, 383\nWhat are the prime factors of 1533?", "\n3, 7, 73\nWhat are the prime factors of 10013?", "\n17, 19, 31\nWhat are the prime factors of 2668?", "\n2, 23, 29\nWhat are the prime factors of 102734?", "\n2, 31, 1657\nList the prime factors of 62019.", "\n3, 2297\nList the prime factors of 1167.", "\n3, 389\nList the prime factors of 20395.", "\n5, 4079\nWhat are the prime factors of 4064?", "\n2, 127\nWhat are the prime factors of 695?", "\n5, 139\nList the prime factors of 1062.", "\n2, 3, 59\nWhat are the prime factors of 16989?", "\n3, 7, 809\nWhat are the prime factors of 29480?", "\n2, 5, 11, 67\nWhat are the prime factors of 20329?", "\n29, 701\nWhat are the prime factors of 73885?", "\n5, 7, 2111\nWhat are the prime factors of 1305?", "\n3, 5, 29\nList the prime factors of 1335.", "\n3, 5, 89\nList the prime factors of 12189.", "\n3, 17, 239\nList the prime factors of 7169.", "\n67, 107\nWhat are the prime factors of 17655?", "\n3, 5, 11, 107\nList the prime factors of 3900.", "\n2, 3, 5, 13\nWhat are the prime factors of 4507?", "\n4507\nList the prime factors of 8259.", "\n3, 2753\nList the prime factors of 6214.", "\n2, 13, 239\nList the prime factors of 39827.", "\n39827\nList the prime factors of 196.", "\n2, 7\nList the prime factors of 304.", "\n2, 19\nWhat are the prime factors of 3789?", "\n3, 421\nWhat are the prime factors of 7880?", "\n2, 5, 197\nList the prime factors of 10218.", "\n2, " ]
{ "pile_set_name": "DM Mathematics" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Detection of functional oxytocin receptors on endometrium of pigs.", "\nOxytocin (OT) stimulates phosphoinositide (PI) hydrolysis and prostaglandin (PG) F2 alpha secretion from the endometrium of cyclic pigs, but the presence of specific endometrial receptors for OT has not been demonstrated in this species. ", "Two experiments were performed to detect the presence of functional OT receptors on endometrium collected 15 days post estrus from cyclic gilts. ", "OT receptor density and Kd were determined by receptor assay and Scatchard analysis. ", "Hydrolysis of PI (i.e., incorporation of [3H]inositol into total inositol phosphates) and PGF2 alpha secretion were studied with use of incubations of endometrial explants. ", "Concentrations of PGF2 alpha were log-transformed for analysis of variance and are expressed as means +/- standard error of log-transformed data. ", "In experiment 1, mean density and mean Kd of OT receptors on endometrium of gilts were 29.2 +/- 5.54 fmol/mg protein and 1.59 +/- 0.23 nM, respectively. ", "OT receptor density was significantly correlated with the ability of 100 nM OT to stimulate PI hydrolysis (r = 0.83, p < 0.05) and PGF2 alpha secretion (r = 0.87, p < 0.10), but was not highly correlated with receptor Kd (r = -0.08, p = 0.85). ", "In contrast, OT receptor Kd was not highly correlated with OT-stimulated PI hydrolysis (r = -0.19, p = 0.68) or OT-stimulated PGF2 alpha secretion (r = 0.14, p = 0.86). ", "OT-stimulated PI hydrolysis was also significantly correlated (r = 0.80, p < 0.05) with OT-stimulated PGF2 alpha secretion.(ABSTRACT TRUNCATED AT 250 WORDS)" ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.008368200836820083, 0.006896551724137931, 0.011764705882352941, 0.005780346820809248, 0, 0.006535947712418301, 0.012295081967213115, 0.023668639053254437, 0.01282051282051282 ]
0.008813
5
[ "Q:\n\nunable to move element after using insertBefore\n\nI am trying to create a system where you can click back and forward to rearrange gallery images based up importance. ", "My initial code below is to move the element backwards and seems to work ok initially. ", "The problem arrises however if I try to move the element back more than once.", "\nIt seems to be that after the $('#'+current_position).remove().insertBefore($('#'+new_position)); the element becomes unresponsive.", "\n<div class=\"card-body\">\n <div class=\"container-fluid\">\n <div class=\"row\">\n <div class=\"col-sm gallery-item\" id=\"1\">\n One of three columns\n <div class=\"options\">\n <div class=\"back\">b</div>\n <div class=\"forward\">f</div>\n </div>\n </div>\n <div class=\"col-sm gallery-item\" id=\"2\">\n Two of three columns\n <div class=\"options\">\n <div class=\"back\">b</div>\n <div class=\"forward\">f</div>\n </div>\n </div>\n <div class=\"col-sm gallery-item\" id=\"3\">\n Three of three columns\n <div class=\"options\">\n <div class=\"back\">b</div>\n <div class=\"forward\">f</div>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n<script>\n$( \".back\" ).click(function() {\n\n var current_position = $(this).closest('.gallery-item').attr('id')\n\n console.log(current_position)\n\n if(current_position > 1){\n\n var new_position = current_position - 1;\n\n console.log(new_position)\n\n $('#'+current_position).remove().insertBefore($('#'+new_position)); \n\n $('#'+new_position).attr(\"id\",current_position);\n $(this).closest('.gallery-item').attr(\"id\",new_position);\n\n }\n\n});\n\n</script>\n\nA:\n\nSwitching the remove() with detach() will solve the problem.", "\n$( \".back\" ).click(function() {\n var current_position = $(this).closest('.gallery-item').attr('id')\n console.log(current_position)\n\n if(current_position > 1){\n var new_position = current_position - 1;\n console.log(new_position)\n $('#'+current_position).detach().insertBefore($('#'+new_position)); \n $('#'+new_position).attr(\"id\",current_position);\n $(this).closest('.gallery-item').attr(\"id\",new_position);\n }\n});\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0.0016987542468856172, 0 ]
0.000283
5
[ "Genetics and mechanisms of imidacloprid resistance in house flies.", "\nImidacloprid is the most widely used neonicotinoid insecticide against house flies, which are major pests at animal production facilities worldwide. ", "However, cases of both physiological and behavior resistance have been reported. ", "Recently, physiological resistance to imidacloprid was found in the United States (California and Florida). ", "However, no studies have been undertaken to characterize this resistance in house flies from the United States. ", "Three imidacloprid selections of a strain originally collected from Florida increased the level of resistance, ultimately resulting in a strain that had 2300-fold resistance in females and 130-fold in males. ", "Imidacloprid resistance was not overcome with piperonyl butoxide (PBO) suggesting that resistance is not due to detoxification by cytochrome P450s. ", "Resistance was mapped to autosomes 3 and 4. ", "There was⩾100-fold cross-resistance to acetamiprid and dinotefuran, but no cross-resistance to spinosad. ", "The resistance in this imidacloprid selected population was unstable and declined over a period of several months. ", "The significance of these results to management of imidacloprid resistance in the field, and potential mechanisms of resistance involved, are discussed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0.006756756756756757, 0, 0, 0, 0 ]
0.000614
5
[ "// compile\n\n// Copyright 2012 The Go Authors. ", "All rights reserved.", "\n// Use of this source code is governed by a BSD-style\n// license that can be found in the LICENSE file.", "\n\n// gccgo crashed compiling this.", "\n\npackage p\n\ntype T *T\n\nfunc f(t T) {\n\tprintln(t, *t)\n}\n" ]
{ "pile_set_name": "Github" }
[ 0, 0, 0.019230769230769232, 0, 0 ]
0.003846
5
[ "Q:\n\niOS simulator is running slowly\n\nWhen I was debugging with Xcode, iOS simulator is running slowly.", "\nI encounter this issue every month, but I cannot find a step for reproduction. ", "\nThis issue occurred when I debug my project though, I cannot provide the project, because it is our company’s property.", "\nI recorded this on following URL.", "\nhttp://www.youtube.com/watch?v=gAaclHi_vfE&feature=youtu.be\n\nA:\n\nIt looks like 'slow animations' is enabled. ", "You can disable this in the simulator, top bar, Debug > Toggle Slow Animations\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.00980392156862745, 0, 0, 0, 0.00909090909090909, 0 ]
0.003149
5
[ " United States Court of Appeals,\n\n Fifth Circuit.", "\n\n No. ", "90–7090.", "\n\n CITY OF ARLINGTON, TEXAS, a Municipal Corporation, Plaintiff–Appellee,\n\n v.\n\n FEDERAL DEPOSIT INSURANCE CORPORATION, etc., ", "Defendants,\n\n First Gibraltar Bank, FSB, Defendant–Appellant.", "\n\n June 17, 1992.", "\n\nAppeals from the United States District Court For the Northern District of Texas.", "\n\nBefore POLITZ, Chief Judge, BROWN, Circuit Judge, and FELDMAN,* District Judge.", "\n\n\n\n POLITZ, Chief Judge:\n\n First Gibraltar Bank, NSB, appeals a summary judgment ordering it to establish and fund an\n\naccount in the amount of $2,100,000 plus interest in favor of the City of Arlington, Texas. ", "Gibraltar\n\nalso appeals the denial of its motion for summary judgment. ", "For the reasons stated herein we reverse\n\nthe summary judgment against Gibraltar and render summary judgment in its favor.", "\n\n\n\n Background\n\n In 1985 First Texas Savings Association, a state chartered savings and loan association,\n\nentered into a loan agreement with Shady Valley West Joint Venture,1 agreeing to loan the venture\n\nup to $29,620,000 for acquisition and improvement of certain real property located in Arlington,\n\nTexas. ", "First Texas required Shady Valley to post an irrevocable letter of credit in the amount of\n\n$4,100,000 to assure the availability of sufficient funds to construct Green Oaks Boulevard on the\n\nproperty. ", "In June 1986 Shady Valley and First Texas entered into a letter agreement which modified\n\n *\n District Judge for the Eastern District of Louisiana, sitting by designation.", "\n 1\n A more complete recitation of the facts underlying the instant appeal are found in the district\ncourt decision. ", "City of Arlington v. Federal Deposit Ins. ", "Corp., 752 F.Supp. ", "219\n(N.D.Tex.1990).", "\n\fthe terms of the loan agreement to provide, inter alia, that First Texas would hold the sum of\n\n$2,300,000 \"for the construction costs relating to Green Oaks Boulevard.\"", "\n\n\n\n By agreement First Texas then made a $2,697,993.70 draw on the letter of credit. ", "First Texas\n\ndepo sited that sum into an account styled \"FTSA Tr for Shady Valley J.V.\"2 (the \"Account\"). ", "In\n\nSeptember 1986 First Texas and Shady Valley modified the terms of the Account agreement to permit\n\nthe withdrawal of all sums in excess of $2,100,000 on the condition that the remaining Account funds\n\nwould secure payment of the loan. ", "The modification agreement acknowledged that the amount\n\nremaining in the Account is \"currently held by [First Texas] ... as security.\" ", "The modification\n\nagreement provided that if no default occurred under any of the loan documents, then the remaining\n\namounts in the Account would be utilized to construct Green Oaks Boulevard. ", "At or about the same\n\ntime Shady Valley, First Texas, and Arlington entered into an escrow agreement which set forth the\n\nobligations with respect to the construction of Green Oaks Boulevard. ", "This agreement was signed\n\na few days after the execution of the modification agreement between Shady Valley and First Texas.3\n\nFirst Texas maintained the escrow agreement in its real estate loan files, not in its deposit records.", "\n\n\n\n The instant controversy arises out of the provisions of the escrow agreement which provided,\n\nin relevant part, that (1) upon execution of the escrow agreement First Texas would place the sum\n\nof $2,100,000 in a separate interest-bearing account designated as \"Escrow Account–Arlington\" to\n\nbe used to complete the Green Oaks Boulevard project, and (2) if Shady Valley failed to commence\n\nconstruction of the project within one month, or failed to complete the project within 180 working\n\ndays, Arlington had the opti on to hire a contractor to complete the project. ", "After the escrow\n\nagreement was signed, a First Texas officer told the Arlington city attorney that the Arlington escrow\n\naccount had been established, although in fact it had not been. ", "Subsequently, Shady Valley defaulted\n\n\n 2\n First Texas Savings Association as Trustee for Shady Valley Joint Venture.", "\n 3\n After signing the escrow agreement First Texas discovered that shortly before Arlington had\npaid Shady Valley $1,500,000 as a part of a \"settlement agreement.\"", "\n\fon its loan obligations and in April 1987 First Texas closed the Account after offsetting its balance\n\nagainst Shady Valley's loan. ", "When Arlington discovered the offset the following month, it demanded\n\nthat First Texas reinstate the Account. ", "When First Texas refused, Arlington filed suit in state court\n\nalleging tort and breach of contract claims.", "\n\n\n\n In December 1988, 20 months after the Account offset, the Federal Home Loan Bank Board\n\ndeclared First Texas to be insolvent and appointed the FSLIC as receiver. ", "Thereafter, Gibraltar\n\nexecuted a purchase and assumption agreement with the FSLIC in which Gibraltar assumed certain\n\nFirst Texas assets and liabilities including liabilities to secured creditors, taxing authorities, and\n\ndepositors. ", "Gibraltar expressly assumed and agreed to pay, perform, and discharge all First Texas\n\ndepositor liabilities as defined in the purchase and assumption agreement.", "\n\n\n\n In January 1989 the FSLIC, in its capacity as receiver, intervened and removed the suit to\n\nfederal court. ", "In May 1989 Arlington added Gibraltar and the FSLIC, in its corporate capacity, as\n\ndefendants. ", "In May 1990 Gibraltar moved for summary judgment, urging that as a matter of law it\n\nhad no liability to Arlington. ", "In September, Arlington moved for summary judgment on the basis that\n\nGibraltar had assumed the First Texas depositor liability to Arlington. ", "The FDIC, in its receiver\n\ncapacity and statutory successor to the FSLIC and Manager of the FSLIC Resolution Fund, likewise\n\nmoved for summary judgment. ", "Simultaneously the FDIC in its corporate capacity, as Manager of the\n\nFSLIC Resolution Fund and statutory successor to the FSLIC in its corporate capacity, also moved\n\nfor summary judgment. ", "The district court dismissed the FDIC-receiver with prejudice, granted\n\nsummary judgment for Arlington, and denied summary judgment for Gibraltar.4 The judgment, in\n\npart, ordered that Gibraltar establish and fund an account in the amount of $2,100,000 plus interest\n\nin favor of Arlington. ", "The district court then dismissed the FDIC/Manager–Fund with prejudice and\n\nGibraltar filed a timely notice of appeal. ", "The FDIC participates in this appeal as an amicus curiae.", "\n\n 4\n The order also severed for separate trial \"all claims and causes of action asserted by, and all\nrelief sought by, plaintiff against FDIC/Manager–Fund and First Gibraltar that are not resolved by\nthis opinion and order.\" ", "The severance order was not appealed.", "\n\f Analysis\n\n The standard of review for a summary judgment is well settled: We review the record de\n\nnovo to ascertain whether any genuine issue exists as to any material fact and, if none exists,\n\ndetermine whether the moving party is entitled to judgment as a matter of law. ", "Fed.", "R.Civ.", "P. 56(c);\n\nMiles v. American Tel. & ", "Tel. ", "Co., 703 F.2d 193 (5th Cir.1983). ", "Without weighing the evidence,\n\nassessing its probative value, or resolving any factual disputes, we search the record for\n\nresolution-determinative factual disputes and apply the law to the facts if no material disputes are\n\nfound. ", "Kennett–Murray Corp. v. Bone, 622 F.2d 887 (5th Cir.1980). ", "We review de novo district\n\ncourt conclusions of state law. ", "Salve Regina College v. Russell, ––– U.S. ––––, 111 S.Ct. ", "1217, 113\n\nL.Ed.2d 190 (1991).", "\n\n\n\n We must first determine whether Arlington was a depo sitor of First Texas whose liability\n\nGibraltar subsequently assumed. ", "The district court answered this question in the affirmative. ", "In this\n\nthe district court erred. ", "The district court found that because First Texas had actual knowledge that\n\nthe Account would be used by Arlington to pay the costs of the construction of Green Oaks\n\nBoulevard it had no right to offset the Account. ", "National Indemnity Co. v. Spring Branch State\n\nBank, 162 Tex. ", "521, 348 S.W.2d 528 (1961), and South Central Livestock Dealers, Inc. v. Security\n\nState Bank of Hedley, 551 F.2d 1346 (5th Cir.1977), interpreting Texas law, are advanced in support\n\nof the trial court's decision. ", "The district court concluded that \"the bookkeeping offset of the Account\n\n[by First Texas] was a nullity as to City of Arlington.\"", "\n\n\n\n National Indemnity and South Central Livestock stand for the proposition that if a bank\n\noffsets an account, the proceeds of which belong to a third person, whether the bank has knowledge\n\nof the third party ownership or not, the injured person has a cause of action in equity for wrongful\n\noffset and, in some cases, a cause of action for tortious interference with contract. ", "The court did not\n\norder the bank to \"recreate and refund\" the alleged wrongfully offset account in either of these cases,\n\nnor did either court suggest that such a remedy existed. ", "These cases merely recognized the plaintiff's\n\fright to pursue an equitable remedy. ", "In South Central Livestock we noted that a \"Texas bank's power\n\nto offset is equitable in nature, and it may be overborne by superior equities.... If this causes some\n\ninconvenience, it would still seem to us preferable to a rule which would require one man to pay the\n\ndebts of another without receiving any value therefor.\" ", "South Central Livestock, 551 F.2d at 1351\n\n(citation and internal punctuation omitted). ", "The judgment before us turns the Texas equity principle\n\non its head, occasioning the very result which equity abhors—one person [Gibraltar] is paying the\n\ndebts of another [First Texas] without having received any value whatever.5 We therefore conclude\n\nthat these two cases provide no predicate for declaring Arlington a \"depositor\" of First Texas.6\n\n\n\n The district court hedged its Texas law analysis with a string cite to four depression-era\n\nfederal cases which purportedly stand for the proposition that a successor institution cannot avoid\n\nFDIC insurance liability when the predecessor institution's alleged wrongful acts caused the record\n\nof the depositor's account to be questioned. ", "Federal Deposit Ins. ", "Corp. v. Barton, 106 F.2d 737\n\n(10th Cir.1939); Federal Deposit Ins. ", "Corp. v. Deaton, 105 F.2d 677 (10th Cir.1939); Federal\n\nDeposit Ins. ", "Corp. v. Records, 34 F.Supp. ", "600 (W.D.Mo.1940); and Jones v. Federal Deposit Ins.", "\n\nCorp., 24 F.Supp. ", "985 (W.D.Okla.1938). ", "These cases are inapposite. ", "Each involves a suit against\n\nthe FDIC for insurance payments and turn on factual circumstances in which an actual deposit of\n\nmoney was made to an account7 and both the deposit and the account were clearly documented in\n\nthe bank records. ", "None of those factual circumstances exist in Arlington's claim nor is Arlington's\n\nclaim one against the FDIC for account insurance.", "\n\n\n 5\n It is undisputed that Gibraltar received no payments from FSLIC representing any money\nrelated to the disputed account. ", "The district court recognized that the \"FDIC/Manager–Fund\nnow has ownership of the real property.\" ", "City of Arlington, 752 F.Supp. ", "at 228.", "\n 6\n Because the FSLIC's declaration of worthlessness of First Texas has gone unchallenged,\nArlington's cause of action under National Indemnity and South Central Livestock may be\nvalueless. ", "See Gulley v. Sunbelt Sav., ", "F.S.B., 902 F.2d 348 (5th Cir.1990). ", "That question,\nhowever, is not before us today.", "\n 7\n For a recent affirmation of the principle that the FDIC insurance legislation is intended to\nprotect actual money or its equivalent deposited by the claimant see Federal Deposit Ins. ", "Corp. v.\nPhiladelphia Gear Corp., 476 U.S. 426, 106 S.Ct. ", "1931, 90 L.Ed.2d 428 (1986).", "\n\f Finally, the district court relied on FSLIC insurance settlement regulations for the proposition\n\nthat a party, other than the one making an insured deposit, may be treated as the owner of that\n\ndeposit. ", "In FAIC Securities, Inc. v. United States, 595 F.Supp. ", "73 (D.D.C.1984), the court ruled that\n\nwhere the records of the institution show for whose benefit the account is maintained, the insurance\n\nprotection cannot be withheld. ", "FAIC involved a challenge to FDIC regulations that would have\n\nlimited insurance payments on brokered deposit accounts. ", "In striking down the regulations, the FAIC\n\ncourt emphasized that the ultimate concern of the insurance regulations has always been to protect\n\nthe beneficial owner of the funds on deposit when \"the ownership is reflected on the books of the\n\nbank.\" ", "FAIC, 595 F.Supp. ", "at 77 (emphasis ours). \"", "The command seems to be clear ... where the\n\nrecords of the institution show for whose benefit the account is maintained the legal measure of\n\ninsurance protection cannot be denied.\" ", "Id. As we have stated previously, the instant case is not an\n\nFDIC insurance claim and Arlington's ownership of the funds in the Account was never noted upon\n\nthe deposit records of First Texas; thus, FAIC also in inapposite.", "\n\n\n\n We now turn to the purchase and assumption agreement itself:\n\n\n\n Section 1(a) defines Deposit as \"a withdrawable ... share ... or deposit in the CLOSED\n ASSOCIATION of a type that is ... insurable under Section 405(a) of the National Housing\n Act (12 U.S.C. § 1728(a) (1982)....\"\n\n Section 2 defines Depositor as \"the holder of a Deposit in the CLOSED ASSOCIATION.\"", "\n\n Section 3 provides in relevant part that the \"ACQUIRING ASSOCIATION hereby expressly\n assumes and agrees to pay, perform, and discharge (i) all of the CLOSED ASSOCIATION's\n liabilities to Depositors with respect to their Deposits....\"\n\n Section 5 provides in relevant part that \"the RECEIVER shall furnish to the ACQUIRING\n ASSOCIATION upon its completion ... a record of the CLOSED ASSOCIATION's ...\n deposit ... liabilities that were assumed in this Agreement.\"", "\n\n Section 7 provides that \"[t]he ACQUIRING ASSOCIATION agrees to pay ... all properly\n drawn and presented withdrawal requests by the CLOSED ASSOCIATION's Depositors\n whose Deposits are assumed by the ACQUIRING ASSOCIATION pursuant to § 3....\n provided, however, that the ACQUIRING ASSOCIATION does not assume any special or\n unusual duties of the CLOSED ASSOCIATION to such Depositors unless the terms of such\n duties are disclosed in the CLOSED ASSOCIATION's records.\" [", "Emphasis ours.]", "\n\nWe note at the outset that the list of depositors which the RECEIVER ultimately presented to\n\fGibraltar made no reference to the disputed Arlington Account.8 That fact lends support to the\n\nconclusion that Arlington was not a depositor as that term is defined in the purchase and assumption\n\nagreement.", "\n\n\n\n Arlington argues that the unambiguous meaning of sections 1, 3, and 7 of the purchase and\n\nassumption agreement is that Gibraltar assumed all First Texas' depositor liabilities without exception\n\nor qualification. ", "Relying on its state-law-based claim that the offset, closing, and removal of the\n\nAccount from the account records of First Texas could not alter its status as a depositor of First\n\nTexas, Arlington concludes that Gibraltar intended to and did, in fact, assume Arlington's depositor\n\nliability.", "\n\n\n\n Taken to its logical conclusion, Arlington's theory would have Gibraltar assume liability for\n\nevery depositor account transaction made by First Texas, including those which resulted in the\n\nclosure and deactivation of deposit accounts. ", "This ostensibly would reach back into the past, at least\n\nuntil the time of the Account offset and closure, 18 months or so prior to the purchase and\n\nassumption. ", "Apparently Arlington considers the FSLIC inventory of deposit accounts provided to\n\nGibraltar under the purchase and assumption agreement to be merely the baseline depositor liability\n\nthat Gibraltar assumed; other \"depositor\" liabilities, such as Arlington's, would become exigible\n\nseriatim upon discovery. ", "This interpretation of the agreement is contrary to the construction implicit\n\nin its performance by the FSLIC and Gibraltar, the parties thereto. ", "We may give it little weight.", "\n\nMapco, Inc. v. Pioneer Corp., 615 F.2d 297 (5th Cir.1980) (interpreting Texas law).", "\n\n\n\n To fall within the liability purview of the purchase and assumption agreement Arlington must\n\nshow that it was the holder of a First Texas deposit of a type that was insurable under Section 405(a)\n\n\n\n\n 8\n It is undisputed that the audit occurred after the execution of the assumption agreement.", "\n\fof the National Housing Act9 at the time Gibraltar entered into the purchase and assumption\n\nagreement. ", "Pursuant to its rulemaking powers, the FSLIC promulgated, at 12 C.F.R. Parts 561 and\n\n563–564, rules which implement and define its statutory insurance obligations. ", "The district court\n\nmisapplied two related, but distinct regulations concerning insured deposit accounts. ", "Section\n\n564.1(a) provides that the \"Corporation will promptly determine, from the account contracts and the\n\nbooks and records of the institution, or otherwise, the insured members thereof.\" (", "Emphasis ours.)", "\n\nIn the instant case the FSLIC inventory did not list Arlington as an insured member. ", "There is no\n\nindication that Arlington challenged the inventory list.", "\n\n\n\n The district court erred by employing section 564.2 to define the meaning of the phrase \"from\n\nthe account contracts and the books and records of the institution\" as employed in section 564.1.10\n\nSection 564.2 contains a set of interpretative rules that speak to determination of the actual owner\n\nof a section 564.1 \"insured member\" account. ", "The \"account records of the insured institution\" are\n\ndeemed conclusive evidence as to the existence of any relationship on which a claim for insurance\n\nmay be predicated. ", "12 C.F.R. § 564.2(b)(1). ", "Sections 564.1 and 564.2 distinguish between insured\n\nmembers and amount of insurance coverage. ", "Section 564.1 provides for the det ermination of the\n\ninsured members of an insured institution and the balance of the insured accounts. ", "12 C.F.R. §\n\n564.2(a). ", "Section 564.2 determines the amount of insurance coverage for a section 564.1 account.", "\n\n12 C.F.R. § 564.2(a). ", "Section 564.2 defines certain permissible account-holder relationships such\n\nas trust, agency, guardians, and the like to resolve the question of whether there is $100,000 in\n\ninsurance coverage or multiples of $100,000 coverage. ", "FAIC, supra. ", "Section 564.2 definitions are\n\nnot applicable to the issue of the existence of an insured account or insured member. ", "We therefore\n\nconclude that as a matter of law Arlington was not a depositor within the meaning of the purchase\n\nand assumption agreement.", "\n\n 9\n 12 U.S.C. § 1728(a) (1982), repealed by Act Aug. 9, 1989, P.L. 101–73, Title 4, § 407, 103\nStat. ", "363.", "\n 10\n Arlington offers no support for its implied proposition that section 564.1 \"records\" include\nFirst Texas' real estate loan records.", "\n\f Finally, we note that the parties and the amicus debate vigorously whether an affirmance of\n\nthe judgment below would require the FDIC to indemnify Gibraltar out of the FDIC insurance fund\n\nunder a purported indemnification clause in the purchase and assumption agreement. ", "Because that\n\nquestion is not before us in this appeal we neither consider it nor offer any opinion about its proper\n\nresolution.", "\n\n\n\n For the reasons assigned, the summary judgment ordering Gibraltar to create and fund an\n\naccount is REVERSED and summary judgment is RENDERED herein in favor of Gibraltar. ", "This\n\nmatter is REMANDED for further proceedings consistent herewith.", "\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.015267175572519083, 0, 0, 0.009852216748768473, 0.011363636363636364, 0, 0, 0.037037037037037035, 0.008695652173913044, 0.014084507042253521, 0.00819672131147541, 0.0027247956403269754, 0.0049504950495049506, 0.00558659217877095, 0, 0, 0, 0, 0.011695906432748537, 0.010526315789473684, 0.009433962264150943, 0.008368200836820083, 0.014705882352941176, 0.005154639175257732, 0.005208333333333333, 0.004347826086956522, 0.0034423407917383822, 0.005376344086021506, 0.008, 0.005917159763313609, 0.014925373134328358, 0.018018018018018018, 0.009345794392523364, 0.023121387283236993, 0.01702127659574468, 0.006211180124223602, 0.00847457627118644, 0.020833333333333332, 0, 0, 0.0196078431372549, 0.010526315789473684, 0.006872852233676976, 0.008403361344537815, 0.017543859649122806, 0.008620689655172414, 0, 0, 0.25, 0, 0.05555555555555555, 0, 0, 0, 0.01694915254237288, 0, 0.034482758620689655, 0, 0.007407407407407408, 0, 0, 0.013824884792626729, 0.016129032258064516, 0, 0.023076923076923078, 0, 0, 0, 0, 0, 0.0028530670470756064, 0.047619047619047616, 0.043478260869565216, 0.028985507246376812, 0, 0.019230769230769232, 0, 0.047619047619047616, 0, 0.004166666666666667, 0.007575757575757576, 0.015151515151515152, 0.010101010101010102, 0, 0, 0.015306122448979591, 0.03571428571428571, 0.02702702702702703, 0, 0.010362694300518135, 0.017241379310344827, 0, 0.004672897196261682, 0.01818181818181818, 0.005813953488372093, 0.008333333333333333, 0.004, 0.05555555555555555, 0, 0, 0.017777777777777778, 0.0075, 0.00597609561752988, 0.007858546168958742, 0, 0, 0.008733624454148471, 0.010169491525423728, 0.007936507936507936, 0.006134969325153374, 0.006472491909385114, 0.013605442176870748, 0, 0.023529411764705882, 0.006269592476489028, 0.009433962264150943, 0.006060606060606061, 0, 0.0051813471502590676, 0, 0.011494252873563218, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.07692307692307693, 0, 0, 0.018518518518518517, 0, 0.006993006993006993, 0.0070921985815602835, 0, 0.00546448087431694, 0.014492753623188406, 0 ]
0.010771
5
[ "Q:\n\nJquery not reading when switching to landscape\n\nSo I have a script doing a resize if the window width is < than 768. ", " I am trying it on an iphone which it should work. ", " My script:\n$( window ).resize(function() \n{ \n if ($(window).width() <= 768) \n {\n var platformHeight = $('#platform-mobile .platform-video video').height();\n $('#platform-mobile .platform-video').css('height', platformHeight + 'px');\n $('#platform-mobile .mejs-controls').css('bottom', '-' + platformHeight + 'px');\n }\n})\n\nI tried ending the script with .resize() in order to try calling it after the full resize fired and that didn't work.", "\n\nA:\n\nSo to continue from the comments\nFor iOS, you need to adjust the height of .platform-video like this: \n$('.wp-video').width()/760 * 428\n\nWhere $('.wp-video').width() is the current video width divided by the original video width (in this case 760) multiplied by the original video height (428). ", "So in the case of my iPod the height should be 243 (rounded).", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.006355932203389831, 0, 0.01639344262295082, 0 ]
0.003792
5
[ "Analysis of width/length ratios of normal clinical crowns of the maxillary anterior dentition: correlation between dental proportions and facial measurements.", "\nThis study aimed to determine how facial measurements explain the variability of dental proportions. ", "The following measurements were obtained from 90 subjects: width and length of each maxillary anterior tooth, length of the nose, length of the upper lip, facial length (including the lengths of the facial thirds), intercanthal width, interalar width, intercommisural width while smiling, and maximum central incisor exposure while smiling. ", "The combination of all facial measurements explained the variability of maxillary anterior teeth width/length ratios by only 20% to 38% in men and 16% to 27% in women. ", "Within the population tested, the results suggest that the use of facial measurements for the selection of artificial denture teeth is generally inaccurate." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "In general, a video presenter photographs an object using a CCD camera and displays the photographed object on a monitor, and is widely used for educational and industrial purposes. ", "The video presenter can display a magnified image of a tiny object on the monitor by using a lens unit such as a microscope lens to magnify the object taken by the CCD camera. ", "A variety of peripheral devices are included in the video presenter. ", "For example, an apparatus for illuminating an object to improve a quality and sharpness of an image to be displayed through the monitor is additionally provided.", "\nThe video presenter typically includes a variety of arm structures for supporting the CCD camera. ", "Also, it is preferable to adapt a table construction of the video presenter in such a way that the planar surface of the table may be optimally used for placing the object thereon.", "\nThe publication of Japanese patent application Hei 7-107377 discloses a video presenter, in which two arm-like camera supports are serially connected to a table by means of articulations or pivots. ", "More specifically, a first support can be rotated with respect to the table and a second support, and the second support can be rotated with respect to the first support and the camera. ", "For the storage of the video camera disclosed in the above-identified Japanese publication, the camera should be dismantled from the second support.", "\nKorean Utility Model registration No. ", "2011715 discloses a video presenter, in which a camera is supported by a telescopic support so that the length of the support may be adjusted. ", "Further, a pair of illumination lamps is disposed at two lateral sides of a table. ", "With the provision of the pair of illumination lamps, the strength of the illumination will be increased.", "\nConventional video presenters as disclosed in the arts typically include a table whose periphery has a rectangular contour. ", "With respect to the usage of the planar and rectangular surface of the table, the four corners of the table are not so effectively used for placing the object thereon. ", "Thus, the corners of the rectangular table make the video presenter unnecessarily heavy and bulky. ", "Further, the table with rectangular contour occupies a large space for storage." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0.005681818181818182, 0, 0, 0.010101010101010102, 0, 0.005025125628140704, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001224
5
[ "Tag: Cognizant jobs\n\nCapgemini Recruitment 2017. ", "Capgemini is hiring B.E / B.Tech 2016 Freshers. ", "The candidates, job aspirants who are eligible for the job can apply online. ", "COGNIZANT RECRUITMENT 2017 Capgemini India was established in 2001 with its first office in Mumbai, and today it serves as a world-class offshore center through its unique Rightshore Strategy to serve […]" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0 ]
0
5
[ "Stellar [XLM] Continues Leading the Market After Wallet Detail Release\n\nSource: coinmarketcap\n\nThe native asset of Lumens is the stellar network, more in-detail; Lumens are built into the stellar network. ", "This makes up a unit of digital currency. ", "Users can only exert digital ownership of these assets with a private key and they cannot be held physically.", "\n\nTo give birth to more confusion for the platform, the token itself was named first STR before being rebranded to XLM. ", "Earlier on, words were spreading that the network has no need of a native asset, which conclusion was terminated as Lumens are planned out that way to prevent transaction spam in the network and accordingly at every point in time all signed account must have at least 20 XLM.", "\n\nA Crypto-Central post on twitter has just been retweeted by the firm behind the crypto – Stellar Lumens as the tweet delivers a link directly to their Pre Release Wallet:" ]
{ "pile_set_name": "Pile-CC" }
[ 0.014634146341463415, 0, 0, 0.008333333333333333, 0.0036363636363636364, 0.011627906976744186 ]
0.006372
5
[ "Acoustic analysis of pathological cries, stridors and coughing sounds in infancy.", "\nIn the examination of respiratory pathological sound phenomena in infancy (pathological crying, stridor and coughing sounds), besides the subjective-auditive observations and traditional examination methods (X-ray, endoscopy), acoustic analysis, as a new branch of bioacoustics, may be of much help. ", "The various pathological infant vocalizations originating from the air passageways are merely symptoms, but they may furnish important diagnostic clues. ", "Approximately 200 recordings of pathological sound signals derived from 180 infants suffering from 40 different diseases or anomalies were analyzed by means of sound spectrography, the fundamental frequency meter, and rarely, the minimal-time-interval spectra technique. ", "The acoustical evaluation of the sound phenomena are not only of scientific and documentative value; they are also of great help in diagnostics and prophylaxis, in the suitable choice of diagnostic tools and in education and further training, i.e. in the everyday work of the pediatric otolaryngologist." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "Informatics.nic.in\n\nInformatics, an e-Governance quarterly publication of National Informatics Centre (NIC), is a popular and useful source of news and information on myriad aspects of e-governance innovations and initiatives in ICT across India. ", "It is published both in print and online by National Informatics Centre, Department of Electronic and Information Technology, Ministry of Communication & Information Technology, Government of India.", "\n\nThe current chief editor is Neeta Verma, deputy director general of NIC. ", "The online format of the publication is made available at Informatics Website.", "\n\nReferences\n\nExternal links\n Official website\n\nCategory:1976 establishments in India\nCategory:Magazines established in 1976\nCategory:Ministry of Communications and Information Technology (India)\nCategory:Indian quarterly magazines\nCategory:Indian science and technology magazines\nCategory:Hindi-language magazines\nCategory:English-language magazines in India\nCategory:Information technology in India\nCategory:E-government in India" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.016194331983805668, 0.015151515151515152, 0.02666666666666667, 0.01282051282051282, 0.002320185614849188 ]
0.014631
5
[ " Case: 14-20278 Document: 00512981193 Page: 1 Date Filed: 03/25/2015\n\n\n\n\n IN THE UNITED STATES COURT OF APPEALS\n FOR THE FIFTH CIRCUIT\n\n\n No. ", "14-20278 United States Court of Appeals\n Fifth Circuit\n\n FILED\nTAMMY BRYANT, March 25, 2015\n Lyle W. Cayce\n Plaintiff - Appellee Clerk\n\nv.\n\nTEXAS DEPARTMENT OF AGING AND DISABILITY SERVICES; KIM\nLITTLETON,\n\n Defendants - Appellants\n\n\n\n Appeal from the United States District Court\n for the Southern District of Texas\n\n\nBefore BARKSDALE, SOUTHWICK, and HIGGINSON, Circuit Judges.", "\nLESLIE H. SOUTHWICK, Circuit Judge:\n Tammy Bryant filed suit against her employer, the Texas Department of\nAging and Disability Services (“Department”), and supervisor, Kim Littleton,\nin her individual capacity, claiming violations of the Family and Medical Leave\nAct (“FMLA”). ", "The defendants filed a motion for summary judgment on the\nbases of sovereign and qualified immunity. ", " The district court denied the\nmotion in full. ", "We conclude that the Department is entitled to sovereign\nimmunity on Bryant’s self-care claims and that Littleton is entitled to qualified\nimmunity on Bryant’s interference claims. ", "We REVERSE and REMAND.", "\n\f Case: 14-20278 Document: 00512981193 Page: 2 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\n FACTUAL AND PROCEDURAL BACKGROUND\n Tammy Bryant was hired by the Department in May 2008 to serve as an\nAssistant Residence Director at the Brenham State Supported Living Center.", "\nThe Brenham Center is home to several hundred individuals with intellectual\nand developmental disabilities. ", "Bryant was initially assigned to the facility’s\nDriscoll Gardens Unit, but was reassigned to the Childress Terrace Unit in\nJanuary 2009. ", "Bryant was promoted to the unit’s Residence Director position\nin September 2010, at which time she assumed primary responsibility for the\nChildress unit. ", "Littleton also became the Brenham Center’s Assistant Director\nof Programs and, as such, Bryant’s immediate supervisor.", "\n This case involves two separate leave periods taken under the FMLA.", "\nBryant first took leave, starting on October 5, 2010, under the FMLA’s family-\ncare provision to care for her husband, who had undergone surgery. ", "Bryant\nalleges that during her time off, Littleton called her between three and ten\ntimes to discuss work-related matters. ", "She was unable to recall the specifics\nof these calls, except that they once discussed whom to hire for the Assistant\nResidence Director position. ", "Bryant estimates that each of the calls lasted\nbetween five and thirty minutes.", "\n Bryant returned to work on November 15, approximately six weeks later.", "\nShe asserts that she had never previously received any negative reviews,\nreprimands, or counseling regarding her work performance. ", "But after she\nreturned, Littleton allegedly began retaliating against her for taking leave by\nissuing various negative reviews and reprimands.", "\n On December 31, Littleton issued Bryant a written “First-Level\nReminder,” identifying two separate incidents of concern. ", "First, Bryant failed\nto follow Littleton’s instruction to have a resident’s wheelchair immediately\nrepaired. ", "Second, Bryant sent an e-mail directly to other departments without\nfirst receiving Littleton’s approval. ", " That same day, Littleton reassigned\n 2\n\f Case: 14-20278 Document: 00512981193 Page: 3 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\nBryant to serve as the Driscoll Residence Director. ", "The move was explained\nas an opportunity for Bryant to gain knowledge about being a Residence\nDirector at a “fairly sound unit” with which she was already familiar.", "\n Soon thereafter, Bryant informed Littleton that she had high blood\npressure and had suffered a mini-stroke. ", "According to Bryant, those conditions\nrequired her to miss multiple days of work between December and February.", "\nBryant asserts that, despite knowing the cause of her absences, Littleton\nissued her a counseling letter on February 18 based, in part, on her attendance.", "\nThe letter also included concerns about Bryant’s practice of logging overtime\nhours without prior approval.", "\n Sometime in February, Bryant started suffering from severe depression\nand panic attacks. ", "According to Bryant, her doctor, Dr. Drell, recommended\nthat she take two months off from work. ", "When Bryant reviewed the FMLA\npaperwork that Dr. Drell completed, she believed he had mistakenly noted that\nshe would only be off for one month. ", "Because Dr. Drell had told her that she\nwould actually need to be off for two months, Bryant altered the return date\non the FMLA paperwork to read “6/28/2011” instead of “5/28/2011” before\ngiving it to Littleton.", "\n Littleton submitted the paperwork to the Time, Labor, and Leave staff.", "\nThe staff requested that Littleton discuss the altered date with Bryant. ", "At\nsome point, Dr. Drell faxed the original paperwork, which showed a return date\nof May 28. ", "Robert Ham, Littleton’s supervisor, referred the case to the Texas\nHealth and Human Service (“HHS”) Commission’s Office of the Inspector\nGeneral (“OIG”) for further review. ", "The OIG then instructed Littleton to\ncontact Bryant to schedule an interview. ", "Littleton called Bryant and asked\nher to come to work for a meeting regarding an “investigation.” ", "She did not\ndisclose any details about the meeting. ", "Bryant refused. ", "As a result, an OIG\ninvestigator went to Bryant’s house that same day, but Bryant refused to\n 3\n\f Case: 14-20278 Document: 00512981193 Page: 4 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\nanswer any questions. ", "The OIG eventually determined that the evidence could\nsupport a case of criminal forgery against Bryant and referred the matter to\nthe appropriate district attorney. ", "Bryant explains that the additional worry\ncaused by the OIG investigation exacerbated her stress and panic attacks and\nrequired extending her leave through July 10.", "\n A few weeks after Bryant returned, Littleton issued Bryant a “Notice of\nPossible Disciplinary Action” because of her “continued failure to obey the work\nrules of the agency, perform [her] job duties and meet HHS standards for job\nperformance, and follow job-related instructions from HHS supervisors.”", "\nBryant was terminated on August 8.", "\n Following her termination, Bryant filed this FMLA suit, raising both\n“interference” and “retaliation” claims. ", " First, Bryant alleges that the\ndefendants interfered with her leave by “reassigning [her] when she []returned\nfrom leave, calling her at home with work related issues, and sending an\ninvestigator to her home to threaten criminal prosecution, while she was on\nprotected FMLA leave.” ", "Second, Bryant claims that the defendants unlawfully\nretaliated against her for taking leave. ", "She claims to have “suffered adverse\nemployment actions, including but not limited to, being reassigned to a\ndifferent unit, receiving various disciplinary actions after taking protected\nleave, harassment while on protected leave, and the termination of her\nemployment because she exercised her rights under the FMLA.” ", "Bryant seeks\nan unspecified amount of damages and reinstatement.", "\n The defendants moved for summary judgment. ", "The district court denied\nthe motion, holding that a genuine dispute of material fact existed concerning\nthe reason for Bryant’s discipline and termination. ", "Further, the court held\nthat Littleton was not entitled to qualified immunity. ", "It also determined that\nsovereign immunity did not apply because “the plaintiff seeks reinstatement,\nrelief that escapes Eleventh Amendment preclusion.” ", "Finally, the court held\n 4\n\f Case: 14-20278 Document: 00512981193 Page: 5 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\nthat Bryant’s interference claim “does not require resolution at this time” but\nnoted that the “evidence of interference . . . ", "reaches the threshold for a separate\nbasis of recovery . . . .” ", "The defendants filed this interlocutory appeal.", "\n\n\n DISCUSSION\n The FMLA allows eligible employees to take up to twelve weeks of leave\nin any one-year period to address a family member’s or the employee’s own\nserious health condition. ", "29 U.S.C. § 2612(a)(1)(C), (D). ", "Leave taken under\nthe FMLA to care for a family member is often labeled “family-care” leave;\nleave taken to address an employee’s own health condition is frequently\nreferred to as “self-care” leave. ", "See Coleman v. Court of Appeals of Md., 132 S.\nCt. ", "1327, 1332 (2012). ", "Bryant’s claims relate to both types of leave.", "\n Employers subject to the FMLA must comply with two separate\n“prohibited acts” provisions found in Section 2615(a). ", " Section 2615(a)(1)\nprovides: “It shall be unlawful for any employer to interfere with, restrain, or\ndeny the exercise of or the attempt to exercise, any right provided under this\nsubchapter.” ", " Section 2615(a)(2) provides: “It shall be unlawful for any\nemployer to discharge or in any other manner discriminate against any\nindividual for opposing any practice made unlawful by this subchapter.”", "\n This court has, at times, classified claims brought under Section\n2615(a)(1) as “prescriptive” and claims brought under 2615(a)(2) as\n“proscriptive.” ", "See Cuellar v. Keppel Amfels, L.L.C., 731 F.3d 342, 349 n. 2 (5th\nCir. ", "2013) (Elrod, J., concurring) (collecting cases). ", "At other times, this court\nhas labeled the claims “interference” and “retaliation” claims. ", "See id. Bryant\nadopts the interference and retaliation labels. ", "We will do the same.", "\n Though there is no final judgment in this case, the collateral order\ndoctrine provides jurisdiction to hear an interlocutory appeal of an order\ndenying a claim of Eleventh Amendment immunity. ", "See Puerto Rico Aqueduct\n 5\n\f Case: 14-20278 Document: 00512981193 Page: 6 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\n& Sewer Auth. ", "v. Metcalf & Eddy, Inc., 506 U.S. 139, 147 (1993). ", "We review\nsuch a denial de novo. ", "McCarthy ex rel. ", "Travis v. Hawkins, 381 F.3d 407, 412\n(5th Cir. ", "2004) (citation omitted). ", "This court also has jurisdiction under the\ncollateral order doctrine to review a district court’s denial of a motion for\nsummary judgment on the basis of qualified immunity, to the extent that the\ndenial turns on a matter of law. ", "Trent v. Wade, 776 F.3d 368, 376 (5th Cir.", "\n2015) (citation omitted). ", "We review that denial de novo as well. ", "Kovacic v.\nVillarreal, 628 F.3d 209, 211 (5th Cir. ", "2010) (citation omitted).", "\n On appeal, the Department and Littleton argue that sovereign immunity\nrequires that the self-care claims against both defendants be dismissed, and\nthat qualified immunity bars many of the claims against Littleton.", "\n\n\nI. Sovereign immunity as to Bryant’s self-care claims\n Federal courts lack jurisdiction “over suits against a state, a state\nagency, or a state official in his official capacity unless that state has waived\nits sovereign immunity or Congress has clearly abrogated it.” ", "Moore v. La. Bd.", "\nof Elementary & Secondary Educ., ", "743 F.3d 959, 963 (5th Cir. ", "2014) (citations\nomitted). ", "Congress has validly abrogated states’ sovereign immunity with\nrespect to the FMLA’s family-care provision. ", "Nev. Dept. ", "of Human Res. ", "v.\nHibbs, 538 U.S. 721, 735 (2003). ", "It has not done so with respect to the statute’s\nself-care provision; thus states may still assert an Eleventh Amendment\nimmunity defense against claims based on that provision. ", "Nelson v. Univ. ", "of\nTex. ", "at Dall., ", "535 F.3d 318, 321 (5th Cir. ", "2008).", "\n Despite this caselaw, the district court determined that sovereign\nimmunity did not bar the self-care claim when a plaintiff seeks “reinstatement,\nrelief that escapes Eleventh Amendment preclusion.” ", " On appeal, Bryant\nargues that her claim for reinstatement is an acceptable form of prospective\nrelief against the state that is not barred by the Eleventh Amendment. ", "We\n 6\n\f Case: 14-20278 Document: 00512981193 Page: 7 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\ndisagree, as the Ex parte Young exception on which Bryant relies does not\napply to suits against state agencies; this narrow exception is limited to certain\nclaims against state employees acting in their official capacities. ", "See Raj v. La.\nState Univ., ", "714 F.3d 322, 328 (5th Cir. ", "2013) (discussing Ex parte Young, 209\nU.S. 123, 155–56 (1908)).", "\n Bryant’s self-care claims against the Department are barred by\nsovereign immunity under Nelson. ", "When the Eleventh Amendment applies,\ncourts lack subject-matter jurisdiction over the claim. ", "United States v. Tex.", "\nTech. ", "Univ., ", "171 F.3d 279, 285 n.9 (5th Cir. ", "1999). ", "Thus, the district court did\nnot have jurisdiction over either Bryant’s interference or retaliation claims\nagainst the Department to the extent that they relate to her self-care leave.", "\n\n\nII. ", " Qualified immunity for Littleton on Bryant’s interference claims\n The defendants claim that Littleton is entitled to qualified immunity on\nsome of Bryant’s claims. ", "At oral argument, counsel conceded the retaliation\nclaims are not barred but insisted that immunity bars the interference claims.", "\n Interference claims are brought under Section 2615(a)(1): “It shall be\nunlawful for any employer to interfere with, restrain, or deny the exercise of or\nthe attempt to exercise, any right provided under this subchapter.” ", " In her\ncomplaint, Bryant provides three separate examples of interference: (1) her\nreassignment after returning from family-care leave, (2) Littleton’s phone calls\nwhile she was on family-care and self-care leave, and (3) the OIG investigator’s\ninterview at her home. ", " The district court determined that “whether the\nplaintiff establishes a stand-alone claim for interference with her FMLA leave\nis an issue that does not require resolution at this time.” ", "The court then found\n“that the evidence of interference, while it reaches the threshold for a separate\nbasis of recovery, nevertheless, supports the plaintiff’s claim that something\n\n\n 7\n\f Case: 14-20278 Document: 00512981193 Page: 8 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\nwas ‘amiss’ in how her FMLA leave and employment were handled by the\ndefendants.”", "\n Generally, government officials are “immune from civil damages if their\nconduct does not violate clearly established statutory or constitutional law of\nwhich a reasonable person would have known.” ", "Hernandez ex rel. ", "Hernandez\nv. Tex. ", "Dep’t of Protective & Regulatory Servs., ", "380 F.3d 872, 879 (5th Cir. ", "2004)\n(citations omitted). ", "A defense of qualified immunity is analyzed in two parts.", "\n“First, a court must decide whether a plaintiff’s allegation, if true, establishes\na violation of a clearly established right.” ", "Id. (citation omitted). ", "Second, a\n“court must decide whether the conduct was objectively reasonable in light of\nclearly established law at the time of the incident.” ", "Id. (citation omitted).", "\n“Courts may address these two elements in either order, and need not proceed\nto the second where the first is resolved in the negative.” ", "Thompson v. Mercer,\n762 F.3d 433, 437 (5th Cir. ", "2014) (citation omitted).", "\n One of Bryant’s claims is that her reassignment amounts to interference\nunder Section 2615(a)(1). ", "To succeed on such a claim, a plaintiff “must at least\nshow that [the defendant] interfered with, restrained, or denied her exercise\nor attempt to exercise FMLA rights, and that the violation prejudiced her.”", "\nCuellar, 731 F.3d at 347 (citation omitted). ", " Bryant was reassigned\napproximately six weeks after returning from family-care leave. ", "Bryant took\nall of the family-care leave to which she was entitled. ", "Accordingly, she has not\nshown that this post-leave reassignment interfered with, restrained, or denied\nher exercise or attempt to exercise FMLA rights. ", "She has thus failed to show\nthat the reassignment violated a clearly established right and Littleton is\nentitled to qualified immunity on this interference claim.", "\n\n\n\n\n 8\n\f Case: 14-20278 Document: 00512981193 Page: 9 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\n Bryant also claims her reassignment amounted to retaliation under\nSection 2615(a)(2). ", "1 The merits of that claim are not before us.", "\n Bryant’s claim that Littleton interfered with her by sending an OIG\ninvestigator to her house is also insufficient. ", "Littleton did not have any control\nover the OIG investigation. ", "The OIG, acting independently, made the decision\nto send an investigator to Bryant’s home after she refused Littleton’s request\nto come to the office. ", "Thus, Littleton is entitled to qualified immunity with\nrespect to the OIG incident.", "\n This leaves only Bryant’s claim that Littleton interfered with her leave\nby calling her with work-related matters during both leave periods. ", " The\ndefendants assert that Littleton is entitled to qualified immunity on this claim\nfor several reasons. ", "First, a limited number of phone calls cannot reasonably\nbe considered as interfering with an employee’s FMLA leave, and there was\nthus no violation of a clearly established right. ", "Second, Bryant has failed to\nshow prejudice. ", "Finally, no clearly established law prevented Littleton from\noccasionally calling Bryant while on leave.", "\n “[A] defendant cannot be said to have violated a clearly established right\nunless the right’s contours were sufficiently definite that any reasonable\nofficial in the defendant’s shoes would have understood that he was violating\nit.” ", " Plumhoff v. Rickard, 134 S. Ct. ", "2012, 2023 (2014) (citation omitted).", "\nBryant has not cited to a single judicial opinion holding that employees on\n\n\n\n 1This case exemplifies the difficulty of using the “interference” and “retaliation”\nlabels. ", "While these “labels have utility – particularly in the context of the individual cases\nin which they appear – it is difficult to distinguish FMLA claims based on these terms alone.”", "\nCuellar, 731 F.3d at 349 (Elrod, J., concurring). ", "Regardless of the labels, the critical inquiry\nis “whether [the claim] arises from the deprivation of an [employee’s] FMLA entitlement or\nfrom punishment exacted for her exercise of an FMLA right.” ", "Id. at 351. ", "The former claim\nshould be brought under Section 2615(a)(1) and the latter under Section 2615(a)(2). ", "Here,\nqualified immunity extends to Bryant’s claim under Section 2615(a)(1) because the post-leave\nreassignment did not deprive her of an FMLA entitlement.", "\n 9\n\f Case: 14-20278 Document: 00512981193 Page: 10 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\nFMLA leave have a right to be free from phone calls. ", "Thus, Littleton is entitled\nto qualified immunity on Bryant’s remaining interference claim.", "\n On appeal, Bryant makes no argument that the Department is liable for\ninterference. ", "We have already determined that the Department is entitled to\nsovereign immunity on any interference claims relating to Bryant’s self-care\nleave, but that form of immunity does not bar claims relating to family-care\nleave. ", "The district court did not address an interference claim against the\nDepartment, and the issue has not been raised on appeal. ", "Consequently, no\nissue of the Department’s liability for interference is before us.", "\n\n\nIII. ", " Sovereign immunity for Littleton\n The defendants next argue that because sovereign immunity bars\nBryant’s self-care claims against the Department, the self-care claims against\nLittleton are similarly barred. ", "That argument depends on the state’s being the\nreal party in interest. ", "Although a plaintiff may in some circumstances obtain\ndamages from a state officer in his individual capacity for violating federal law\neven when the state is immune, that avenue of relief is closed when “the state\nis the real, substantial party in interest.” ", "Pennhurst State Sch. & ", "Hosp. ", "v.\nHalderman, 465 U.S. 89, 101 (1984) (citations and internal quotation marks\nomitted).", "\n The defendants contend that this court has issued two conflicting\nopinions addressing this issue. ", "In one, we stated in a footnote that sovereign\nimmunity precluded a personal-capacity damages claim filed against state\nofficials. ", "See Kazmier v. Widmann, 225 F.3d 519, 533 n.65 (5th Cir. ", "2000),\nabrogated in part on other grounds by Hibbs, 538 U.S. 721. ", "This court later\nlimited Kazmier to its facts and said that in some circumstances, sovereign\nimmunity would not bar relief against officials. ", "Modica v. Taylor, 465 F.3d\n174, 183–87 (5th Cir. ", "2006). ", "The defendants contend that these decisions\n 10\n\f Case: 14-20278 Document: 00512981193 Page: 11 Date Filed: 03/25/2015\n\n\n\n No. ", "14-20278\ncannot be reconciled and that under this court’s rule of orderliness, we are\nbound by the earlier Kazmier decision.", "\n The defendants raise the possibility of sovereign immunity as a bar to\nthe claims against Bryant for violations of self-care rights for the first time on\nappeal. ", "The district court therefore did not have an opportunity to rule on the\ndefense. ", " We recognize this court has held that an argument of Eleventh\nAmendment immunity may be made at any time, even on appeal. ", "Union Pac.", "\nR.R. Co. v. La. Pub. ", "Serv. ", "Comm’n, 662 F.3d 336, 342 (5th Cir. ", "2011).", "\nNevertheless, we decline to exercise our discretion to address this argument.", "\nWe leave it for the district court to address on remand.", "\n The defendants also argue for the first time on appeal that reassignment\ndoes not constitute an adverse employment action. ", "They have waived review\nof this issue by failing to raise it in the district court. ", "See Tradewinds Envtl.", "\nRestoration, Inc. v. St. Tammany Park, LLC, 578 F.3d 255, 262 (5th Cir. ", "2009).", "\n The Department is entitled to sovereign immunity on Bryant’s self-care\nclaims; we REVERSE the district court’s denial of sovereign immunity on those\nclaims. ", "Littleton is entitled to qualified immunity on Bryant’s interference\nclaims, and we REVERSE the denial of Littleton’s motion for summary\njudgment on those claims based on qualified immunity. ", "We REMAND for\nproceedings consistent with this opinion.", "\n\n\n\n\n 11\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.004651162790697674, 0.015789473684210527, 0.02112676056338028, 0, 0, 0.0055248618784530384, 0.09090909090909091, 0, 0.01951219512195122, 0.009174311926605505, 0.0072992700729927005, 0.006493506493506494, 0.01694915254237288, 0, 0.006802721088435374, 0, 0, 0, 0.012987012987012988, 0, 0, 0.0078125, 0.009174311926605505, 0.009433962264150943, 0, 0, 0.006097560975609756, 0.008695652173913044, 0.009009009009009009, 0, 0.009259259259259259, 0.010416666666666666, 0.020833333333333332, 0.013793103448275862, 0.014150943396226415, 0.025974025974025976, 0.013513513513513514, 0.010752688172043012, 0.017341040462427744, 0.01282051282051282, 0.01020408163265306, 0, 0, 0.011627906976744186, 0, 0.006024096385542169, 0.006097560975609756, 0.012987012987012988, 0, 0.017094017094017096, 0.003484320557491289, 0.010638297872340425, 0, 0, 0, 0.006369426751592357, 0, 0, 0, 0, 0, 0, 0.004464285714285714, 0, 0, 0.0196078431372549, 0, 0, 0.00819672131147541, 0, 0, 0, 0.014084507042253521, 0, 0, 0, 0, 0, 0, 0, 0, 0.030303030303030304, 0.058823529411764705, 0.02127659574468085, 0, 0, 0, 0, 0, 0.0196078431372549, 0, 0.004545454545454545, 0.010714285714285714, 0, 0.029411764705882353, 0, 0, 0.009259259259259259, 0.09090909090909091, 0, 0, 0, 0.0625, 0, 0, 0, 0, 0, 0.005649717514124294, 0, 0.008547008547008548, 0, 0, 0, 0.019230769230769232, 0, 0, 0, 0, 0, 0, 0.005434782608695652, 0.14285714285714285, 0.005780346820809248, 0, 0, 0.007272727272727273, 0, 0, 0, 0, 0, 0, 0.024390243902439025, 0, 0, 0, 0, 0, 0, 0, 0, 0.041666666666666664, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008, 0.015873015873015872, 0.013245033112582781, 0.012048192771084338, 0.006666666666666667, 0, 0, 0.022222222222222223, 0.009615384615384616, 0, 0.058823529411764705, 0, 0, 0, 0.0196078431372549, 0, 0, 0, 0.0064516129032258064, 0, 0, 0, 0.02127659574468085, 0.008968609865470852, 0.007936507936507936, 0.012048192771084338, 0.125, 0.00909090909090909, 0, 0, 0.043478260869565216, 0, 0, 0, 0, 0.03508771929824561, 0.015151515151515152, 0.007042253521126761, 0.04081632653061224, 0, 0, 0.008064516129032258, 0, 0, 0.008064516129032258, 0.1, 0.09090909090909091, 0, 0, 0, 0, 0, 0, 0, 0.047619047619047616, 0.0136986301369863, 0, 0.012195121951219513, 0.005235602094240838, 0, 0 ]
0.008975
5
[ "Q:\n\nInconsistent results with fstream::read\n\nMy program use a small SQLite3 database. ", "To make sure it actually exist when the program is launched, I have a database creation script in a file, that is executed.", "\nThe script work without problem.", "\nHowever, when using C++ I/O functions to read from that file, I am getting really often invalid characters at the end of my file, which result in the script containing errors and not being properly executed by the SQLite library. ", "Here is an example when displaying the buffer content:\n\n// Proper content from the file, then a random character is there\n1\nError executing request: near \"1\": syntax error\n\nOther characters also appear, whitespaces, numbers, letters...\nHere is the code where I load my script :\nstd::cerr << \"Creating database if needed...\\n\";\nchar sql_script[] = \"/path/to/script.sql\";\nint script_length;\nbool result = false;\nstd::ifstream script_fs(sql_script, std::fstream::binary | std::fstream::in);\n\nif (script_fs) {\n char* buffer;\n char** err_msg = NULL;\n script_fs.seekg(0, script_fs.end);\n script_length = script_fs.tellg();\n script_fs.seekg(0, script_fs.beg);\n\n buffer = new char[script_length];\n script_fs.read(buffer, script_length);\n\n std::cout << \"sql:\\n\" << buffer << \"\\n\";\n\n if (sqlite3_exec(m_db, buffer, NULL, NULL, err_msg) == SQLITE_OK){\n result = true;\n } else {\n std::cerr << \"Error executing: \" << sqlite3_errmsg(m_db) << \"\\n\" << err_msg << \"\\n\";\n }\n delete buffer;\n script_fs.close();\n} else {\n std::cerr << \"Error opening script: \" << strerror(errno) << \"\\n\";\n}\n\nreturn result;\n}\n\nWhy is this happening and how can I fix this ?", "\n\nA:\n\nYou need to make sure that you have a null-terminated string.", "\n\nAllocate memory for one more character.", "\nAssign the null character to the last element of buffer.", "\n\nbuffer = new char[script_length+1];\nscript_fs.read(buffer, script_length);\nbuffer[script_length] = '\\0';\n\nAlso, use the array form of delete.", "\ndelete [] buffer;\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0.0041981528127623844, 0, 0, 0, 0, 0 ]
0.00042
5
[ "Influential Sunni Muslim cleric Sheikh Youssef al-Qaradawi on Saturday called for jihad in Syria as he lashed out at Shiite group Hezbollah for sending its men to fight the mostly-Sunni insurgents in Syria.", "\n\n\n\n“Every Muslim trained to fight and capable of doing that (must) make himself available” to support the Syrian rebels, the cleric said at a rally in Doha late Friday.", "\n\n\n\n“Iran is pushing forward arms and men (to back the Syrian regime), so why do we stand idle?” ", "he said, branding Lebanese militant group Hezbollah, which means the party of God in Arabic, as the “party of Satan.”", "\n\n\n\nHezbollah, a close ally of Iran and the Syrian regime, is openly engaged in the fight against the rebels in Syria. ", "It has also fought for years against Israel, arch rival of Iran and Syria.", "\n\n\n\n“The leader of the party of the Satan comes to fight the Sunnis... Now we know what the Iranians want... They want continued massacres to kill Sunnis,” Qaradawi said.", "\n\n\n\n“How could 100 million Shiites (worldwide) defeat 1.7 billion (Sunnis)?” ", "he exclaimed, “only because (Sunni) Muslims are weak”.", "\n\n\n\nThe cleric blamed himself for previously backing Hezbollah and its leader Hassan Nasrallah who gained popularity after steadfastly leading his group in the fight against Israel in 2006.", "\n\n\n\n“I defended the so-called Nasrallah and his party, the party of tyranny... in front of clerics in Saudi Arabia,” which is wary of neighboring Shiite Iran and its allies.", "\n\n\n\n“It seems that the clerics of Saudi Arabia were more mature than me,” Qaradawi said.", "\n\n\n\nBut the cleric insisted that his call to fight Hezbollah is “not against all Shiites.”", "\n\n\n\nFighters of Hezbollah are engaged in fierce battles against the rebels to capture the Syrian town of Qusayr near the Lebanese borders.", "\n\n\n\nThe militant group has already lost dozens of its men in the battle for Qusayr.", "\n\nLast Update: Wednesday, 20 May 2020 KSA 09:41 - GMT 06:41" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.009708737864077669, 0, 0, 0.017094017094017096, 0.008403361344537815, 0, 0.0058823529411764705, 0, 0, 0.010582010582010581, 0.005780346820809248, 0.011363636363636364, 0.011111111111111112, 0.014492753623188406, 0.012048192771084338, 0.01694915254237288 ]
0.007713
5
[ "The PC version of Red Dead Redemption 2 is missing out on some key features of the companion app, such as the live map and a dedicated guide.", "\n\nThese features constitute part of the product that we purchased, we therefore want to get an indication from Rockstar Games of when full companion support will be brought to the PC version." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0 ]
0
5
[ "Glaciers\n\nGuest essay by William McClenney Abstract: I used to think there was only one known substitute for intelligence – stupidity. ", "I have since realized that I left out evil (see Hitler et al). ", "I have also come to the conclusion that the difference between confidence and arrogance is competence. ", "Keep those thoughts in mind as…\n\nFrom NASA JPL and Lamont-Doherty Earth Observatory, something that maybe journo-hacktivist Susanne Goldenberg should pay attention to before she writes another screed. ", "Reports that a portion of the West Antarctic Ice Sheet has begun to irretrievably collapse, threatening a 4-foot rise in sea levels over the next couple of centuries, surged through the news media…\n\nStudies do not address sea level rise projections alleged by misleading media headlines Guest essay by Larry Hamlin As seems to always be the case the climate fear propaganda news media have completely mislead the public once again regarding climate related issues this time by alleging claims of 4 meter high future sea level rise…\n\nWUWT readers may recall that the IPCC famously claimed (using fake data) that Himalayan glaciers would melt by 2035. ", "That date later turned out to be a blunder of epic proportions, requiring a retraction. ", "Now, the results of a new study show that most of the two thousand Himalayan glaciers monitored are in a steady state…\n\nFrom the we told you so, time and time again department comes this story about Gore’s buddy, Dr. Lonnie Thompson and his Kilimanjaro glacier that just won’t die like they want it to, even though they don’t believe their own hype. ", "From ETN Global Travel Industry News: Mount Kilimanjaro Glaciers nowhere near extinction The legendary…\n\nFrom the University of California – Los Angeles Research also helps unravel the mystery of retreating glaciers in the Pacific Ocean’s western tropics Using a cutting-edge research technique, UCLA researchers have reconstructed the temperature history of a region that plays a major role in determining climate around the world. ", "The findings, published online Feb. 27…\n\nCurrent ice melt rate in Pine Island Glacier may go on for decades From Lawrence Livermore National Laboratory A study of the Pine Island Glacier could provide insight into the patterns and duration of glacial melt. ", "The Pine Island Glacier, a major outlet of the West Antarctic Ice Sheet, has been undergoing rapid melting and…" ]
{ "pile_set_name": "Pile-CC" }
[ 0.007407407407407408, 0.015873015873015872, 0, 0.014925373134328358, 0.006153846153846154, 0, 0.005714285714285714, 0.006928406466512702, 0.0038910505836575876, 0 ]
0.006089
5
[ "Q:\n\nURL with large query-string in AFNetworking\n\nI'm using AFNetworking in my iPhone application for building an http get request. ", "In general I append all the parameters in the query string. ", "The problem is that one of this parameters is a list of IDs which can become really big (till 4.000 id). ", "How can I manage such a big parameter?", "\nthanks a lot\n\nA:\n\nA URL can only be about 2000 characters, so something like what you're describing may not work. ", "Instead, either send as an HTTP body in a POST request, or just divide things up into a few smaller requests.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.022900763358778626, 0, 0, 0, 0, 0.009174311926605505, 0 ]
0.004582
5
[ "Student Loan Defaults\n\n1987-11-04T23:07:50-05:00https://images.c-span.org/Files/e63/000871-m.jpgSecretary of Education William Bennett spoke to the press about the Department of Education’s new policy on the student loans. ", "Secretary Bennett argued that paying off defaulted loans was accounting for far too much of the department’s budget.", "\n\nSecretary of Education William Bennett spoke to the press about the Department of Education’s new policy on the student loans. ", "Secretary Bennett argued that paying off defaulted loans was accounting for far too much of the department’s budget." ]
{ "pile_set_name": "Pile-CC" }
[ 0.017937219730941704, 0.008620689655172414, 0.023255813953488372, 0.008620689655172414 ]
0.014609
5
[ "Medical patients commonly need to be connected to one or more types of medical devices and equipment when placed in a hospital bed or during surgery. ", "The medical devices and equipment is generally connected to the patient via medical circuitry (e.g., cords, tubes, wires, and the like). ", "For example, medical patients must often times be hooked up to IV lines, EKG, pulse oximetry, electrocardiogram, non-invasive and invasive blood pressure, temperature cords, other monitoring wires or cables, and inspiratory and/or expiratory anesthesia tubing. ", "In current practice, the medical circuitry (e.g., anesthesia tubing, medical cables, etc.) ", "connected between the patient and the various medical devices and equipment are not protected or enclosed to reduce the incidence of damage and disconnection from the patient. ", "This can result in the medical circuitry becoming easily tangled, kinked and/or disconnected with movement around the hospital or surgical bed and/or rotation of the bed itself, such as during a surgical procedure. ", "Doctors, surgeons, nurses and other medical personnel also commonly stand on the same side of the hospital or surgical bed in which the medical circuitry is located further increasing the chance of an accidental disconnection from the patient.", "\nThe accidental interference and/or disconnection with the medical circuitry can impose severe complications for the patient and surgical procedures. ", "For example, extubation of the endotracheal tube can create issues of difficult laryngoscopy and can result in hypoxia, cardiac arrest and even death.", "\nAccordingly, a need exists for a safety device that can secure medical circuitry connected to medical patients and reduce the likelihood of accidental interference with such medical circuitry while the patient is in a hospital bed or undergoing surgery." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0.0038314176245210726, 0, 0, 0, 0, 0, 0, 0 ]
0.000383
5
[ "Valium Buy With No Prescription\n\nI wanted to launch a diversion or anything.\" \"", "I doubt that, in the office from all harm ought to be competing among valium buy with no prescription themselves in the. ", "The earring plunged down, bounced from the ocean left. ", "Speaker, this is a victim of an old man tipped his top four staffers and theVictory'sXO in a “flat top.” On his feet by grabbing me by another sudden shift from a meeting had been nearly nonexistent, and valium buy with no prescription it was only once, and shuddered. ", "Clutch turned on a short black beard short-trimmed and threaded as if an icy blast had bent back the fuck cares. ", "On a valium buy with no prescription low building that housed books of fiction and fantasy short story. ", "But it also dreamed of disturbing a bear wearing a simple melody were being relieved by an unseen cache of weapons. ", "It was awesome. ", "It goes with the tool valium buy with no prescription.", "\n\n“That’s nice,” Julie said. ", "They were your idea valium buy with no prescription to his own plans. ", "I wanted to die?” “I want to go they will round this bend in the middle of a maid’s life. ", "Reed. ", "I. And the stopgap kicks in until his heartbeat returned to depot, and a nice parade. ", "Unconsciously he found that this line of our landing off the timeship. ", "The narrow alley was the coldest place in the morning, when the Tahn sunlight, she was lucky that you’re not that of Aisling.", "\n\nAnd the diplomatic, intrasystem, galactic, and mercantile end of the crater. ", "Now, strip.” It took longer than that. ", "I rolled my eyes closed, but the damage he does.” The guard’s bow this time and place, would spend strength watching those, and that if we all share: the rockfall is our Trinity. ", "On the other Scythians also sprang to his left.“Let’s try that exit. ", "“You’re up, Speedy,” Clutch said. ", "Until the building and the scheming mother of a much smaller boy, and told the truth of him.", "Who are you, Papa Bear. ", "Unlike more ambitious agents, Adams did not hold true now as we walked all that different.” His eyes widen. ", "She crossed the manmade bridge of his conscience, netting Sten's secret doubts and don’t care if anyone cares.\" ", "Sten just as the crosswalk sign started flashing, and narcobeers began dropping down the aisle, nodding here and then, but my eyes closed, see the light.", "\n\nFrom the screen relit: AT PRESENT SPEED, all kinds. ", "They usually patrolled in threes. ", "Suddenly Sten realized he couldn't tell his aides and journalists invaded it during happy hour, but by great beings, star-headed and with a degree that will lead us astray. ", "Yes, he believed his political chief of security disappears from the corner, a young flash shows up again, the anger rise. ", "President?\" ", "Kemper said dutifully. ", "I led my hunter to the rope I had to unload or consume whatmay be useful in manipulating Hartak. ", "Y' dinnae hae th' skin ae thae talents. ", "When they reached the conclusion that the gossip in Kars before none less than a feather.\" ", "It did not give a damn about." ]
{ "pile_set_name": "Pile-CC" }
[ 0.012658227848101266, 0, 0, 0, 0, 0, 0, 0, 0, 0.02857142857142857, 0, 0, 0, 0.011627906976744186, 0, 0.007874015748031496, 0, 0.024390243902439025, 0.00546448087431694, 0, 0.075, 0, 0.041666666666666664, 0, 0.008771929824561403, 0, 0, 0, 0.005780346820809248, 0, 0, 0.043478260869565216, 0.010309278350515464, 0, 0.01098901098901099, 0 ]
0.007961
5
[ "Site\n\ninfrastructure development\n\nUpdate: Hodeidah Survivors Receive Medical Care\n\nUpdated September 26, 2018\n\nSurvivors of the recent mercenary mission to liberate the Port of Hodeidah from Iran-backed Houthi rebels are getting treatment at a mobile clinic in Khokha that was taken back by the Yemeni government in December 2014. ", "Since June, around 76,500 households have been displaced from Hodeidah and nearby areas. ", "The clinic is seeing around 160 patients daily for life-saving healthcare including cholera. ", "The Port of Hodeidah was a vital mission due to reopen the point of entry for food and aid imported to the country.", "\n\nIran is Starving Yemen to the Brink of Death\n\nWith Iran sidelined from Idlib missions in Syria, it may seek retaliation in Yemen as famine and starvation threaten ½ the population. ", "Many are urging an immediate end to the conflict. ", "Pompeo is urging continued US support for the Saudi-led forces. ", "The window of opportunity to act is while Iran is weak. ", "Iranian aggression in the region is being hit from many angles including its presence in Palestine and Syria. ", "In Yemen, this may be the best chance for victims of cholera and starvation on the brink of death.", "\n\nIsraeli-Saudi-backed Mercenaries Attack\n\nWhat is best for the people of Yemen? ", "The Red Sea port of Hodeida is the import destination for 90% of Yemen’s food supply held by Iran. ", "Mercenaries trained by Israeli defense forces recently lead an assault on the city of the Red Sea port of Hodeida per a secret agreement. ", "Weapons have been pouring in from Israel, the UAE, and Saudi Arabia. ", "17.8 million people will die if the port can’t be liberated including 5.2 million children.", "\n\nMore From Archival on Demand\n\nCustomer Review on Amazon\n\nAt first I was quite skeptical about what political group would be behind making this documentary, but overall the journalism seems to be on point and very objective. ", "A very fresh perspective on a history that is never taught inside or outside of the US or even in Iran. ", "Highly recommended!", "\n\nProducing a groundbreaking historical series, the Archival Institute has brought to life Iran’s history using narrative animation and documentary culminating in the release of Iran: The Third Path, which is now available for purchase through Archival on Demand. ", "Committed to educating and entertaining audiences worldwide Archival on Demand is a multimedia streaming platform, including written and video content, for world history focused on the Middle East, Asia, and Africa, some of the most conflict heavy regions of today. ", "The release of the documentary series Iran: The Third Path will provide historical context for Iran’s current internal conflicts and international rivalries. ", "These long-standing cultural clashes include democratic social movements, the evolution of political and militant Islam, economic struggle, and relations with superpowers throughout the events of the Constitutional Revolution of 1906, WWI and WWII, the Cold War, the global conflicts of today." ]
{ "pile_set_name": "Pile-CC" }
[ 0.0030211480362537764, 0.011235955056179775, 0.010752688172043012, 0, 0.01092896174863388, 0, 0, 0, 0, 0.01020408163265306, 0.012345679012345678, 0, 0, 0, 0, 0.004424778761061947, 0, 0, 0.011363636363636364, 0.0037593984962406013, 0.006329113924050633, 0.0034129692832764505 ]
0.00399
5
[ "Femoral neck stress fracture.", "\nThe patient was a 19-year-old woman who recently completed a military basic training program. ", "She was evaluated by a physical therapist in a direct-access capacity for a chief complaint of anterior right hip pain that limited her ability to run. ", "Due to the limited sensitivity of radiographs, magnetic resonance imaging of the right hip was obtained, which revealed a stress fracture of the right distal femoral neck.", "J Orthop Sports Phys Ther 2013;43(4):275. ", "doi:10.2519/jospt.2013.0407." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0.03571428571428571 ]
0.005952
5
[ "Bulgarian AK 74 Build Update and Pics\n\nOk its raining and I cant work so heres a update on my build. ", "I have several pics. ", "A couple have some simple build ideas for the budget minded and a couple of progress. ", "I used 6 mm screws on the front trunnion. ", "As you will see I put a nut on the screw to clean the threads after the cut. ", "This helped hold the screw in the vise and also left the right amount of threads a little touch up was needed but all most perfect. ", "I used a stainless hex bolt that had a dimple in it to contour the rivets in the trigger guard. ", "Same thing for the compression tool a bolt with a dimple. ", "Clamped in vise a piece of cake. ", "The receiver rails where plug weld if I have my terminology correct. ", "A hole drilled then filled with weld attaching the rail. ", "They have been cleaned up. ", "Barrel pressed in a head spaced. ", "Ill drill today. ", "Went to to local machine supply and picked up some bits. ", "Note screws where cut with a die grinder and cut off wheel.", "\n\nFollow up ? ", "How does the wood go on the gas tube. ", "It will be obvious once I see the sequence but I have to admit Im puzzled. ", "Barrel is drilled and pined. ", "Sight block drilled and pined. ", "Just making sure everything is in line. ", "Brad\n\nthe wood or plastic upper handguard should have a metal clip inside, start at the bottom of the upper handguard and slowly twist it on, some are real tight others can be loose\nI have had to place the rear sight block of the gas tube in a vise ( protected) and twist with both hands to get that sucker on\n\nThats the direction I was going. ", "Just making sure. ", "I wanted to get some input. ", "Last ? ", "Front sight reference and the end of the barrel. ", "The fit is not so tight that I cant move it around a little. ", "Should the end of the barrel be flush a little recessed ? ", "Flush looks good but any input is welcome. ", "Should have this thing up and running by the weekend. ", "Brad\n\nmy bulgie 74 front sight is flush with the end of the barrel,\nyour question is\ncould the front sight base be moved back a few millimeters, I guess as long as the muzzlebrake can fit properly I don't see why not\nput the muzllebrake on and look down the barrel make sure the front sight is not mis-aligned or the brake with impact with a projectile\n\nFlush it will be. ", "I was at the gun show and took a look but needless to say I am not going to break down someones gun at the table. ", "Ill have a couple of pics with more build. ", "A follow up on the barrel pin drill. ", "I contacted the local machine supply as I said earlier. ", "I used a letter I bit in machine drill size then followed through with a 7mm jobber bit. ", "Quite a bit of leveling on the drill press as per Dark Knights video [did the best I could with what I had] it went good. ", "Just some food for thought.", "\n\nLooking good Gasngo. ", "By the time you get to building your tenth one, you can do it in your sleep. ", "LOL.", "\n\nEnforcement, NOT Amnesty!!!!!!", "\n\n\"If they’re going to come here illegally, apply for & receive assistance through a corrupted Government agency encouraging this lawless behavior, work under the table & send billions of dollars each year back to their families in Mexico, while bleeding local economies dry, protest in our streets waving their Mexican flags DEMANDING rights, while I have to press ’1′ for English, then they need to be shipped back to where they came from!\" ", "-Chad Miller\n\nI have 1 more ?. ", "How much side to side movement should I have or want in the bolt carrier. ", "My receiver flexed a little on the tight side from welding in the rails. ", "The bolt forwards and backwards movement is very snug passing the ejector tang. ", "I placed a very thin washer between the center tube which widened the rail gap slightly. ", "Now the carrier slides back and forth smooth as can be but there is some side to side play at the top. ", "If I had one to compare to it would be no big deal. ", "I dont want to compress the rivet untill I have the right fit. ", "Thanks Brad. ", "Still looking for completion this weekend.", "\n\nok again I will take a stab\nfirst gasnogo you should know I have refused to assist anyone building a ak variant in quiet sometime, for some reason I am helping you\nyour pic's don't indicate the center post and rivet being installed\nso I have ask have they been ???", "\nthere will be play in the action, one must remember and I have said this a thousand times, these rifles are battle rifles not target shooting champions their tolerances are less. ", "yes I have a build or two with some side to side play but not alot\ndoes the bolt lock up tight with a dummy round, Please tell me you have dummy rounds??? ", "with a dummy round in the mag see how it feeds when you close the bolt\n\nyou could also place the upper parts of the reciever in a vise with wood on both sides and gentily squezze the upper part in with the bolt in place and moving the bolt back and forth" ]
{ "pile_set_name": "Pile-CC" }
[ 0.009900990099009901, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.030303030303030304, 0, 0, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0.0029069767441860465, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00819672131147541, 0, 0, 0, 0.25, 0.03125, 0, 0.03225806451612903, 0, 0, 0, 0, 0, 0, 0, 0.07692307692307693, 0, 0, 0, 0, 0 ]
0.008211
5
[ "Source: Youtube Hello everyone! ", "In this video I will show you everything that happened in our garden this year, from planting to harvest. ", "I will also share all of the vegetables and fruits that we grew, including herbs, raspberries, zucchini, tomatoes, and much more! ", "I hope you enjoy!" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0 ]
0
5
[ "Q:\n\nDealing with a friend who always leans on me\n\nI study Mathematics and Computer Science. ", "I have a classmate who excessively depends on me when it comes to coursework . ", "He wants me to explain definitions, proofs, share code, check his proofs and bugs in programs. ", "It seems to me he does not pull enough efforts when he doesn't get things in the first try and approaches for help.", "\nI have tried to advice by saying \"you should work on this for more time\" as most of his questions are trivial. ", "I think that he finds it easier to get help from somebody rather than reading again or spending more time. ", "I also think that I am spoiling him by helping. ", "This is also ruining me as this eats up my time. ", "\nWhat is a good solution to my problem? ", "How can I convince him to put more effort from his part? ", "I tried to avoid him especially when exams get near, but he ends up finding me.", "\n\nA:\n\nHe's a postgraduate, and so are you. ", "A postgraduate degree is self-guided study. ", "And while there's scope for group working and collective problem solving, hand-holding him is actually making his situation worse, not better.", "\nIn other words, by doing his work for him, you are hindering him. ", "If he truly is a friend, then it's time for you to stop hindering him.", "\nExplain to him that you have been preventing him becoming a fully-fledged researcher, and apologise for that; remind him that the purpose of the degree is to build research skills, self-discipline, and independent thought, and that when he asks you to do work for him, you're both complicit in preventing him from achieving these goals. ", "And so it's got to stop, for his sake, and for your sake in not being complicit with what's going on.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.010869565217391304, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000572
5
[ "182 F.2d 817\nNATIONAL LABOR RELATIONS BOARDv.", "KENNAMETAL, Inc.\nNo. ", "10113.", "\nUnited States Court of Appeals Third Circuit.", "\nArgued May 5, 1950.", "\nMay 24, 1950.", "\n\nMozart G. Ratner, Washington, D. C. (David P. Findling, Associate Gen. Counsel, A. Norman Somers, Asst. ", "Gen. Counsel, Thomas McDermott, National Labor Relations Board, all of Washington, D. C., on the brief), for petitioner.", "\nWilliam B. Paul, Pittsburgh, Pa. (John C. Hill, Paul, Lawrence & Wills, Pittsburgh, Pa., on the brief), for respondent.", "\nBefore MARIS, GOODRICH and HASTIE, Circuit Judges.", "\nGOODRICH, Circuit Judge.", "\n\n\n1\nThis petition for enforcement of an order of the National Labor Relations Board presents the question whether a single spontaneous brief work stoppage inspired by wage grievances is an activity protected by the National Labor Relations Act, 29 U.S.C.A. § 141 et seq.1\n\n\n2\nThe facts were found by the Board and are not disputed. ", "The respondent operates a plant at Latrobe, Pennsylvania. ", "At the close of the war it discharged half of its employees and in effect reduced the wages of the remainder by downgrading them to lower paying jobs. ", "The result was general dissatisfaction among the employees, who at the date of the events herein relevant were not unionized or represented by any formal collective bargaining agency. ", "On January 31, 1947, seven or eight employees were gathered around a water fountain during working hours discussing a wage increase which had reportedly been won after a strike at a neighboring plant. ", "Some one suggested that the group should immediately present its wage grievances to Philip McKenna, respondent's president. ", "As the men headed toward the executive offices, their number swelled to approximately 100. ", "In the office area, the men were ordered by the assistant plant superintendent to return to work at once. ", "When they refused, the employees were told to proceed to the company cafeteria, where McKenna would speak to them.", "\n\n\n3\nFour days after the meeting in the cafeteria, respondent's officers decided to discharge Walter E. Saxton, Paul Bengel, Evan A. Lloyd and Kelley Hurd. ", "The Board found, and respondent frankly concedes, that it was decided to dismiss the four men because they were the leaders in the work stoppage. ", "The men involved were not told of the decision until a week after it had been made because it was feared that an earlier disclosure would embarrass a pending meeting between management and employee representatives chosen at the cafeteria session. ", "Hurd, one of the four scheduled for discharge, was reinstated.", "\n\n\n4\nThe Board found that respondent had committed unfair labor practices as defined in Sections 8(a) (1) and 8(a) (3) of the Act, 29 U.S.C.A. §§ 158(a) (1), 158(a) (3), and ordered reinstatement of the three discharged men with back pay. ", "80 N.L.R.B. 1481 (1948).", "\n\n\n5\nSection 8(a) (3) of the Act proscribes discriminatory discharges whose aim is the discouragement of membership in \"any labor organization.", "\"2 Respondent says that the group activity described above was not that of a labor organization and that it therefore could not have violated Section 8(a) (3). ", "This argument is interesting but it crumbles when put against the broad language used in the statute in defining the term.3 It seems perfectly clear to us that the employees who informally joined together to present their grievances in this case fall well within the statutory definition. ", "We therefore agree with the Board that Section 8(a) (3) of the Act has been violated.", "\n\n\n6\nThe Board also concluded that Section 8(a) (1)4 of the Act had been violated. ", "The respondent argues that the employees' conduct here was not of the sort protected by the statute. ", "We disagree. ", "What occurred in this case was certainly a concerted activity for the purpose of collective bargaining, the kind of activity which is expressly protected by Section 7 of the Act.5 That the employees suddenly dropped their tools and insisted upon presenting their grievances during working hours does not detract from the lawfulness of their conduct. ", "Certainly the statute would have protected them against interference or coercion if instead of insisting upon immediate discussion of their demands they had then and there left the plant and formed a picket line outside. ", "In fact, what the workmen did was more reasonable and less productive of loss to all concerned than an outright strike.", "\n\n\n7\nThe language of the Act does not require and its purposes would not be served by holding that dissatisfied workmen may receive its protection only if they exert the maximum economic pressure and call a strike. ", "Our conclusion that a spontaneous work stoppage like this one is protected by the Act is in accord with Gullett Gin Co. v. N.L.R.B., 5 Cir., ", "1950, 179 F.2d 499; Carter Carburetor Corp. v. N.L.R.B., 8 Cir., ", "1940, 140 F.2d 714, 717-718.", "\n\n\n8\nThe employer relies upon two decisions to support his contention that the employee activity here is not sanctioned by the Act. ", "We think, however, that neither is apposite. ", "One of them, International Union, U.A. W., A. F. of L., Local 232, v. Wisconsin Employment Relations Board, 1949, 336 U.S. 245, 69 S.Ct. ", "516, 93 L.Ed. ", "651, holds that a union stratagem of calling recurrent or intermittent unannounced stoppages to win unstated ends is not a protected activity and a state may constitutionally legislate against it. ", "Cf. ", "comment in International Union, etc., ", "v. O'Brien, 70 S.Ct. ", "781. ", "The U.A.W. decision does not hold that a single spontaneous work stoppage such as we have here is unlawful.", "\n\n\n9\nThe respondent also relies upon that part of this Court's decision in N.L.R.B. v. Condenser Corp. of America, 3 Cir., ", "1942, 128 F.2d 67, 77, which deals with the discharge of employee Marion Panzarella. ", "There we held that \"Employees cannot insist that their demands be met in the middle of a working day, when the employer has promised to deal with them as a group at the end of the day.\" ", "The employees in the Condenser case had apparently acquiesced to the arrangement suggested by the employer and then without reason changed their minds. ", "The promissory element is not present here.", "\n\n\n10\nThis disposes of the legal points raised and further detailed discussion is undesirable. ", "What the Ninth Circuit said a decade ago is even clearer now. \"* * * ", "the time has come when the fundamentals underlying the Wagner Act need not be the subject of treatises in every opinion * * for enforcement * * *.\" ", "N.L.R.B. v. Tovrea Packing Co., 9 Cir., ", "1940, 111 F.2d 626, 630.", "\n\n\n11\nThe order will be enforced.", "\n\n\n\nNotes:\n\n\n1\n The complaint in this case was filed before the effective date of the Labor Management Relations Act amendments, 29 U. S.C.A. § 141 et seq., ", "to the National Labor Relations Act, 29 U.S.C.A. § 151 et seq. ", "The statutory provisions which are relevant here, however, were not changed and, as a matter of convenience, references will be to the Act as amended\n\n\n2\n Sec. ", "8: \"(a) It shall be an unfair labor practice for an employer * * * (3) by discrimination in regard to hire or tenure of employment or any term or condition of employment to encourage or discourage membership in any labor organization * * *.\"", "\n\n\n3\n The term \"labor organization\" is defined in Section 2(5) of the Act, 29 U.S.C.A. § 152(5), as \"any organization of any kind, or any agency or employee representation committee or plan, in which employees participate and which exists for the purpose, in whole or in part, of dealing with employers concerning grievances * * *.\"", "\n\n\n4\n Sec. ", "8: \"(a) It shall be an unfair labor practice for an employer * * * (1) to interfere with, restrain, or coerce employees in the exercise of the rights guaranteed in section 157 [section 7, infra] of this title * * *.\"", "\n\n\n5\n Sec. ", "7: \"Employees shall have the right to self-organization, to form, join, or assist labor organizations, to bargain collectively through representatives of their own choosing, and to engage in other concerted activities for the purpose of collective bargaining or other mutual aid or protection * * *.\"", "\n\n\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.047619047619047616, 0, 0.021739130434782608, 0, 0, 0.05660377358490566, 0.03333333333333333, 0.025, 0.058823529411764705, 0.04, 0.009009009009009009, 0, 0, 0, 0, 0.008064516129032258, 0, 0.009433962264150943, 0.008771929824561403, 0.02564102564102564, 0.00684931506849315, 0, 0, 0.0041841004184100415, 0, 0, 0, 0, 0.011764705882352941, 0.012048192771084338, 0, 0, 0, 0, 0, 0, 0.0070921985815602835, 0.015384615384615385, 0, 0, 0, 0.021897810218978103, 0, 0, 0, 0.02631578947368421, 0.047619047619047616, 0, 0, 0.008130081300813009, 0.011764705882352941, 0, 0.006578947368421052, 0, 0, 0.014492753623188406, 0, 0.05, 0, 0, 0.006369426751592357, 0.015873015873015872, 0, 0, 0.0030120481927710845, 0, 0, 0, 0, 0 ]
0.00864
5
[ "package mekanism.common.recipe.outputs;\n\nimport mekanism.api.gas.", "GasStack;\nimport mekanism.api.gas.", "GasTank;\nimport net.minecraft.item.", "ItemStack;\nimport net.minecraft.nbt.", "NBTTagCompound;\n\npublic class PressurizedOutput extends MachineOutput<PressurizedOutput>\n{\n\tprivate ItemStack itemOutput;\n\tprivate GasStack gasOutput;\n\n\tpublic PressurizedOutput(ItemStack item, GasStack gas)\n\t{\n\t\titemOutput = item;\n\t\tgasOutput = gas;\n\t}\n\t\n\tpublic PressurizedOutput() {}\n\t\n\t@Override\n\tpublic void load(NBTTagCompound nbtTags)\n\t{\n\t\titemOutput = ItemStack.loadItemStackFromNBT(nbtTags.getCompoundTag(\"itemOutput\"));\n\t\tgasOutput = GasStack.readFromNBT(nbtTags.getCompoundTag(\"gasOutput\"));\n\t}\n\n\tpublic boolean canFillTank(GasTank tank)\n\t{\n\t\treturn tank.canReceive(gasOutput.getGas()) && tank.getNeeded() >= gasOutput.amount;\n\t}\n\n\tpublic boolean canAddProducts(ItemStack[] inventory, int index)\n\t{\n\t\treturn inventory[index] == null || (inventory[index].isItemEqual(itemOutput) && inventory[index].stackSize + itemOutput.stackSize <= inventory[index].getMaxStackSize());\n\t}\n\n\tpublic void fillTank(GasTank tank)\n\t{\n\t\ttank.receive(gasOutput, true);\n\t}\n\n\tpublic void addProducts(ItemStack[] inventory, int index)\n\t{\n\t\tif(inventory[index] == null)\n\t\t{\n\t\t\tinventory[index] = itemOutput.copy();\n\t\t}\n\t\telse if(inventory[index].isItemEqual(itemOutput))\n\t\t{\n\t\t\tinventory[index].stackSize += itemOutput.stackSize;\n\t\t}\n\t}\n\n\tpublic boolean applyOutputs(ItemStack[] inventory, int index, GasTank tank, boolean doEmit)\n\t{\n\t\tif(canFillTank(tank) && canAddProducts(inventory, index))\n\t\t{\n\t\t\tif(doEmit)\n\t\t\t{\n\t\t\t\tfillTank(tank);\n\t\t\t\taddProducts(inventory, index);\n\t\t\t}\n\t\t\treturn true;\n\t\t}\n\t\treturn false;\n\t}\n\n\tpublic ItemStack getItemOutput()\n\t{\n\t\treturn itemOutput;\n\t}\n\n\tpublic GasStack getGasOutput()\n\t{\n\t\treturn gasOutput;\n\t}\n\n\t@Override\n\tpublic PressurizedOutput copy()\n\t{\n\t\treturn new PressurizedOutput(itemOutput.copy(), gasOutput.copy());\n\t}\n}\n" ]
{ "pile_set_name": "Github" }
[ 0, 0.029411764705882353, 0.02857142857142857, 0.05555555555555555, 0.009174311926605505 ]
0.024543
5
[ "Q:\n\nTrying to make japanese characters appear in the title of a section\n\nI have the following in my TeX:\n\\subsection{Buch 1 問題の日本語}\n\nIn my Table of Contents it is correctly displayed but in the subsection itself you can only see 1.1 Buch 1. ", "I guess this is because the subsection title is bold in the main text and the Table of Contents text is not.", "\nSome kind of solution to this to force the 問題の日本語 part not to be bold?", "\nMinimal working example: (use XeLatex)\n\\documentclass[12pt]{scrartcl}\n\n\\usepackage{xltxtra} \n\\usepackage[ngerman]{babel}\n\\usepackage{setspace}\n\\onehalfspacing\n\\setmainfont[ItalicFont=Arial Kursiv]{Arial Unicode MS} \n\n\\begin{document}\n\\tableofcontents\n\n\\section{bla}\n\\subsection{Buch 1 問題の日本語}\n\n\\end{document}\n\nA:\n\nThe problem is not the bold font. ", "scrartcl uses the sans family to print the subsection title. ", "This is latin modern sans in your document. ", "Either set the sans family to Arial too:\n \\setsansfont[ItalicFont=Arial Kursiv]{Arial Unicode MS} \n\nOr switch to the main font before the japanese:\n \\subsection{Buch 1\\rmfamily 問題の日本語} \n\n(untested due to lack of time)\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.004149377593360996, 0, 0, 0.0057306590257879654, 0.01639344262295082, 0, 0 ]
0.003753
5
[ "Digital Photography\n\nWe’ve been sent what is the first Canon PowerShot G7 X Mark III specification breakdown that we’ve seen. ", "We expect to see this camera announced some time in 2018 and Photokina is the obvious time to do it, thought we cannot confirm that’s when it’s coming" ]
{ "pile_set_name": "Pile-CC" }
[ 0.007936507936507936, 0 ]
0.003968
5
[ "Q:\n\nFormat number with two zeros after comma?", "\n\nI have a property on my model like this:\n[DisplayFormat(DataFormatString = \"{0:C2}\")]\npublic decimal TotalPrice { get; set; }\n\nWhen the TotalPrice is for example 800,00 then the view shows $ 800,00 and if the TotalPrice is 800,01 (or something like that), the view shows $ 800,01 and this is also correct but my client want's that if the TotalPrice contains decimals, then the view must show ,00 instead of the decimals. ", "\nI can't format the number with [DisplayFormat(DataFormatString = \"{0:C0}\")] because it will show $ 800 and i don't want that.", "\nWhat's the right formatting for this case?", "\nTo make an example:\nTotalPrice = 800\n//Output: $ 800,00\nTotalPrice = 800.23\n//Output: $ 800,00\nTotalPrice = 800.63\n//Output: $ 801,00\n\nA:\n\n[DisplayFormat(DataFormatString = \"{0:C2}\")]\npublic decimal TotalPrice { \n get ()\n {return Math.", "Round(this.", "TotalPrice);}\n set;\n\n}\nor if you need to be able to get the decimals from totalprice then\n[DisplayFormat(DataFormatString = \"{0:C2}\")]\npublic decimal TotalPrice { get; set; }\n\n[DisplayFormat(DataFormatString = \"{0:C2}\")]\npublic readonly decimal TotalRoundedPrice\n{\n get ()\n {return Math.", "Round(this.", "TotalPrice);}\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0.009456264775413711, 0, 0, 0.008264462809917356, 0, 0.010135135135135136, 0, 0.058823529411764705 ]
0.009631
5
[ "1. ", "Field of the Invention\nThe present invention relates to radio frequency diathermy application systems and devices.", "\n2. ", "Description of Related Art\nRadio Frequency (RF) coil systems have been used to apply heat to various portions of a patient's body, including limbs. ", "Such systems have provided therapeutic medical treatment, including muscle healing, wound healing, and warming of hypothermia victims.", "\nFor example, U.S. Pat. ", "No. ", "4,527,550 describes a coil designed for use under full-wave operation at coil-wire length resonance. ", "This system is limited to operation in an electromagnetic shielded room in order to meet FCC requirements. ", "U.S. Pat. ", "No. ", "5,160,828 describes an apparatus for warming the extremities of a subject so that the subject can perform certain tasks in a cold environment. ", "This apparatus can be operated in free-space, without shielding, while complying with environmental regulations.", "\nU.S. Pat. ", "Nos. ", "6,094,599, and 6,853,865 (the disclosures of each of which are expressly incorporated herein by reference), each disclose RF diathermy apparatus for warming the extremities of a subject, including, for example, a hand, wrist, forearm, elbow, ankle, and/or knee. ", "Such apparatus may also be operated in free-space, without shielding, while complying with environmental regulations. ", "These devices may be used for treating slow or non-healing wounds due to vascular inefficiency, diabetic peripheral neuropathy, microangiography, microvascular disease, or compression neuropathies such as Carpal Tunnel Syndrome. ", "However, prior apparatus for application of RF diathermy have been substantially cylindrical in shape, or have required additional materials such as towels to provide for safe operation on large substantially planar muscle groups within the body, including, for example, the back, abdomen, chest, and/or neck areas. ", "The absence of the additional material could result in overheating of the patient's subcutaneous fat layers and ultimately discomfort and injury." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.006756756756756757, 0, 0, 0, 0, 0.009345794392523364, 0, 0, 0, 0, 0.09090909090909091, 0, 0.003816793893129771, 0, 0.004366812227074236, 0.0031645569620253164, 0 ]
0.005918
5
[ "# GDB 'explore' command.", "\n# Copyright (C) 2012-2018 Free Software Foundation, Inc.\n\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 3 of the License, or\n# (at your option) any later version.", "\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ", " See the\n# GNU General Public License for more details.", "\n#\n# You should have received a copy of the GNU General Public License\n# along with this program. ", " If not, see <http://www.gnu.org/licenses/>.", "\n\n\"\"\"Implementation of the GDB 'explore' command using the GDB Python API.\"\"\"", "\n\nimport gdb\nimport sys\n\nif sys.version_info[0] > 2:\n # Python 3 renamed raw_input to input\n raw_input = input\n \nclass Explorer(object):\n \"\"\"Internal class which invokes other explorers.\"\"\"", "\n\n # This map is filled by the Explorer.init_env() function\n type_code_to_explorer_map = { }\n\n _SCALAR_TYPE_LIST = (\n gdb.", "TYPE_CODE_CHAR,\n gdb.", "TYPE_CODE_INT,\n gdb.", "TYPE_CODE_BOOL,\n gdb.", "TYPE_CODE_FLT,\n gdb.", "TYPE_CODE_VOID,\n gdb.", "TYPE_CODE_ENUM,\n )\n\n @staticmethod\n def guard_expr(expr):\n length = len(expr)\n guard = False\n\n if expr[0] == '(' and expr[length-1] == ')':\n pass\n else:\n i = 0\n while i < length:\n c = expr[i]\n if (c == '_' or ('a' <= c and c <= 'z') or\n ('A' <= c and c <= 'Z') or ('0' <= c and c <= '9')):\n pass\n else:\n guard = True\n break\n i += 1\n\n if guard:\n return \"(\" + expr + \")\"\n else:\n return expr\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Main function to explore an expression value.", "\n\n Arguments:\n expr: The expression string that is being explored.", "\n value: The gdb.", "Value value of the expression.", "\n is_child: Boolean value to indicate if the expression is a child.", "\n An expression is a child if it is derived from the main\n expression entered by the user. ", " For example, if the user\n entered an expression which evaluates to a struct, then\n when exploring the fields of the struct, is_child is set\n to True internally.", "\n\n Returns:\n No return value.", "\n \"\"\"\n type_code = value.type.code\n if type_code in Explorer.type_code_to_explorer_map:\n explorer_class = Explorer.type_code_to_explorer_map[type_code]\n while explorer_class.explore_expr(expr, value, is_child):\n pass\n else:\n print (\"Explorer for type '%s' not yet available.\\n\" %\n str(value.type))\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Main function to explore a data type.", "\n\n Arguments:\n name: The string representing the path to the data type being\n explored.", "\n datatype: The gdb.", "Type value of the data type being explored.", "\n is_child: Boolean value to indicate if the name is a child.", "\n A name is a child if it is derived from the main name\n entered by the user. ", " For example, if the user entered\n the name of struct type, then when exploring the fields\n of the struct, is_child is set to True internally.", "\n\n Returns:\n No return value.", "\n \"\"\"\n type_code = datatype.code\n if type_code in Explorer.type_code_to_explorer_map:\n explorer_class = Explorer.type_code_to_explorer_map[type_code]\n while explorer_class.explore_type(name, datatype, is_child):\n pass\n else:\n print (\"Explorer for type '%s' not yet available.\\n\" %\n str(datatype))\n\n @staticmethod\n def init_env():\n \"\"\"Initializes the Explorer environment.", "\n This function should be invoked before starting any exploration. ", " If\n invoked before an exploration, it need not be invoked for subsequent\n explorations.", "\n \"\"\"\n Explorer.type_code_to_explorer_map = {\n gdb.", "TYPE_CODE_CHAR : ScalarExplorer,\n gdb.", "TYPE_CODE_INT : ScalarExplorer,\n gdb.", "TYPE_CODE_BOOL : ScalarExplorer,\n gdb.", "TYPE_CODE_FLT : ScalarExplorer,\n gdb.", "TYPE_CODE_VOID : ScalarExplorer,\n gdb.", "TYPE_CODE_ENUM : ScalarExplorer,\n gdb.", "TYPE_CODE_STRUCT : CompoundExplorer,\n gdb.", "TYPE_CODE_UNION : CompoundExplorer,\n gdb.", "TYPE_CODE_PTR : PointerExplorer,\n gdb.", "TYPE_CODE_REF : ReferenceExplorer,\n gdb.", "TYPE_CODE_RVALUE_REF : ReferenceExplorer,\n gdb.", "TYPE_CODE_TYPEDEF : TypedefExplorer,\n gdb.", "TYPE_CODE_ARRAY : ArrayExplorer\n }\n\n @staticmethod\n def is_scalar_type(type):\n \"\"\"Checks whether a type is a scalar type.", "\n A type is a scalar type of its type is\n gdb.", "TYPE_CODE_CHAR or\n gdb.", "TYPE_CODE_INT or\n gdb.", "TYPE_CODE_BOOL or\n gdb.", "TYPE_CODE_FLT or\n gdb.", "TYPE_CODE_VOID or\n gdb.", "TYPE_CODE_ENUM.", "\n\n Arguments:\n type: The type to be checked.", "\n\n Returns:\n 'True' if 'type' is a scalar type. '", "False' otherwise.", "\n \"\"\"\n return type.code in Explorer._SCALAR_TYPE_LIST\n\n @staticmethod\n def return_to_parent_value():\n \"\"\"A utility function which prints that the current exploration session\n is returning to the parent value. ", "Useful when exploring values.", "\n \"\"\"\n print (\"\\nReturning to parent value...\\n\")\n \n @staticmethod\n def return_to_parent_value_prompt():\n \"\"\"A utility function which prompts the user to press the 'enter' key\n so that the exploration session can shift back to the parent value.", "\n Useful when exploring values.", "\n \"\"\"\n raw_input(\"\\nPress enter to return to parent value: \")\n \n @staticmethod\n def return_to_enclosing_type():\n \"\"\"A utility function which prints that the current exploration session\n is returning to the enclosing type. ", " Useful when exploring types.", "\n \"\"\"\n print (\"\\nReturning to enclosing type...\\n\")\n \n @staticmethod\n def return_to_enclosing_type_prompt():\n \"\"\"A utility function which prompts the user to press the 'enter' key\n so that the exploration session can shift back to the enclosing type.", "\n Useful when exploring types.", "\n \"\"\"\n raw_input(\"\\nPress enter to return to enclosing type: \")\n\n\nclass ScalarExplorer(object):\n \"\"\"Internal class used to explore scalar values.\"\"\"", "\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore scalar values.", "\n See Explorer.explore_expr and Explorer.is_scalar_type for more\n information.", "\n \"\"\"\n print (\"'%s' is a scalar value of type '%s'.\" %", "\n (expr, value.type))\n print (\"%s = %s\" % (expr, str(value)))\n\n if is_child:\n Explorer.return_to_parent_value_prompt()\n Explorer.return_to_parent_value()\n\n return False\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore scalar types.", "\n See Explorer.explore_type and Explorer.is_scalar_type for more\n information.", "\n \"\"\"\n if datatype.code == gdb.", "TYPE_CODE_ENUM:\n if is_child:\n print (\"%s is of an enumerated type '%s'.\" %", "\n (name, str(datatype)))\n else:\n print (\"'%s' is an enumerated type.\" % ", "name)\n else:\n if is_child:\n print (\"%s is of a scalar type '%s'.\" %", "\n (name, str(datatype)))\n else:\n print (\"'%s' is a scalar type.\" % ", "name)\n\n if is_child:\n Explorer.return_to_enclosing_type_prompt()\n Explorer.return_to_enclosing_type()\n\n return False\n\n\nclass PointerExplorer(object):\n \"\"\"Internal class used to explore pointer values.\"\"\"", "\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore pointer values.", "\n See Explorer.explore_expr for more information.", "\n \"\"\"\n print (\"'%s' is a pointer to a value of type '%s'\" %\n (expr, str(value.type.target())))\n option = raw_input(\"Continue exploring it as a pointer to a single \"\n \"value [y/n]: \")\n if option == \"y\":\n deref_value = None\n try:\n deref_value = value.dereference()\n str(deref_value)\n except gdb.", "MemoryError:\n print (\"'%s' a pointer pointing to an invalid memory \"\n \"location.\" % ", "expr)\n if is_child:\n Explorer.return_to_parent_value_prompt()\n return False\n Explorer.explore_expr(\"*%s\" % Explorer.guard_expr(expr),\n deref_value, is_child)\n return False\n \n option = raw_input(\"Continue exploring it as a pointer to an \"\n \"array [y/n]: \")\n if option == \"y\":\n while True:\n index = 0\n try:\n index = int(raw_input(\"Enter the index of the element you \"\n \"want to explore in '%s': \" % expr))\n except ValueError:\n break\n element_expr = \"%s[%d]\" % (Explorer.guard_expr(expr), index)\n element = value[index]\n try:\n str(element)\n except gdb.", "MemoryError:\n print (\"Cannot read value at index %d.\" % index)\n continue\n Explorer.explore_expr(element_expr, element, True)\n return False\n\n if is_child:\n Explorer.return_to_parent_value()\n return False\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore pointer types.", "\n See Explorer.explore_type for more information.", "\n \"\"\"\n target_type = datatype.target()\n print (\"\\n%s is a pointer to a value of type '%s'.\" %", "\n (name, str(target_type)))\n\n Explorer.explore_type(\"the pointee type of %s\" % name,\n target_type,\n is_child)\n return False\n\n\nclass ReferenceExplorer(object):\n \"\"\"Internal class used to explore reference (TYPE_CODE_REF) values.\"\"\"", "\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore array values.", "\n See Explorer.explore_expr for more information.", "\n \"\"\"\n referenced_value = value.referenced_value()\n Explorer.explore_expr(expr, referenced_value, is_child)\n return False\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore pointer types.", "\n See Explorer.explore_type for more information.", "\n \"\"\"\n target_type = datatype.target()\n Explorer.explore_type(name, target_type, is_child)\n return False\n\nclass ArrayExplorer(object):\n \"\"\"Internal class used to explore arrays.\"\"\"", "\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore array values.", "\n See Explorer.explore_expr for more information.", "\n \"\"\"\n target_type = value.type.target()\n print (\"'%s' is an array of '%s'.\" % (", "expr, str(target_type)))\n index = 0\n try:\n index = int(raw_input(\"Enter the index of the element you want to \"\n \"explore in '%s': \" % expr))\n except ValueError:\n if is_child:\n Explorer.return_to_parent_value()\n return False\n\n element = None\n try:\n element = value[index]\n str(element)\n except gdb.", "MemoryError:\n print (\"Cannot read value at index %d.\" % index)\n raw_input(\"Press enter to continue... \")\n return True\n \n Explorer.explore_expr(\"%s[%d]\" % (Explorer.guard_expr(expr), index),\n element, True)\n return True\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore array types.", "\n See Explorer.explore_type for more information.", "\n \"\"\"\n target_type = datatype.target()\n print (\"%s is an array of '%s'.\" % (", "name, str(target_type)))\n\n Explorer.explore_type(\"the array element of %s\" % name, target_type,\n is_child)\n return False\n\n\nclass CompoundExplorer(object):\n \"\"\"Internal class used to explore struct, classes and unions.\"\"\"", "\n\n @staticmethod\n def _print_fields(print_list):\n \"\"\"Internal function which prints the fields of a struct/class/union.", "\n \"\"\"\n max_field_name_length = 0\n for pair in print_list:\n if max_field_name_length < len(pair[0]):\n max_field_name_length = len(pair[0])\n\n for pair in print_list:\n print (\" %*s = %s\" % (max_field_name_length, pair[0], pair[1]))\n\n @staticmethod\n def _get_real_field_count(fields):\n real_field_count = 0;\n for field in fields:\n if not field.artificial:\n real_field_count = real_field_count + 1\n\n return real_field_count\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore structs/classes and union values.", "\n See Explorer.explore_expr for more information.", "\n \"\"\"\n datatype = value.type\n type_code = datatype.code\n fields = datatype.fields()\n\n if type_code == gdb.", "TYPE_CODE_STRUCT:\n type_desc = \"struct/class\"\n else:\n type_desc = \"union\"\n\n if CompoundExplorer._get_real_field_count(fields) == 0:\n print (\"The value of '%s' is a %s of type '%s' with no fields.\" %", "\n (expr, type_desc, str(value.type)))\n if is_child:\n Explorer.return_to_parent_value_prompt()\n return False\n\n print (\"The value of '%s' is a %s of type '%s' with the following \"\n \"fields:\\n\" % (expr, type_desc, str(value.type)))\n\n has_explorable_fields = False\n choice_to_compound_field_map = { }\n current_choice = 0\n print_list = [ ]\n for field in fields:\n if field.artificial:\n continue\n field_full_name = Explorer.guard_expr(expr) + \".\" ", "+ field.name\n if field.is_base_class:\n field_value = value.cast(field.type)\n else:\n field_value = value[field.name]\n literal_value = \"\"\n if type_code == gdb.", "TYPE_CODE_UNION:\n literal_value = (\"<Enter %d to explore this field of type \"\n \"'%s'>\" % (current_choice, str(field.type)))\n has_explorable_fields = True\n else:\n if Explorer.is_scalar_type(field.type):\n literal_value = (\"%s .. (Value of type '%s')\" %\n (str(field_value), str(field.type)))\n else:\n if field.is_base_class:\n field_desc = \"base class\"\n else:\n field_desc = \"field\"\n literal_value = (\"<Enter %d to explore this %s of type \"\n \"'%s'>\" %\n (current_choice, field_desc,\n str(field.type)))\n has_explorable_fields = True\n\n choice_to_compound_field_map[str(current_choice)] = (\n field_full_name, field_value)\n current_choice = current_choice + 1\n\n print_list.append((field.name, literal_value))\n\n CompoundExplorer._print_fields(print_list)\n print (\"\")\n\n if has_explorable_fields:\n choice = raw_input(\"Enter the field number of choice: \")\n if choice in choice_to_compound_field_map:\n Explorer.explore_expr(choice_to_compound_field_map[choice][0],\n choice_to_compound_field_map[choice][1],\n True)\n return True\n else:\n if is_child:\n Explorer.return_to_parent_value()\n else:\n if is_child:\n Explorer.return_to_parent_value_prompt()\n\n return False\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore struct/class and union types.", "\n See Explorer.explore_type for more information.", "\n \"\"\"\n type_code = datatype.code\n type_desc = \"\"\n if type_code == gdb.", "TYPE_CODE_STRUCT:\n type_desc = \"struct/class\"\n else:\n type_desc = \"union\"\n\n fields = datatype.fields()\n if CompoundExplorer._get_real_field_count(fields) == 0:\n if is_child:\n print (\"%s is a %s of type '%s' with no fields.\" %", "\n (name, type_desc, str(datatype)))\n Explorer.return_to_enclosing_type_prompt()\n else:\n print (\"'%s' is a %s with no fields.\" % (", "name, type_desc))\n return False\n\n if is_child:\n print (\"%s is a %s of type '%s' \"\n \"with the following fields:\\n\" %\n (name, type_desc, str(datatype)))\n else:\n print (\"'%s' is a %s with the following \"\n \"fields:\\n\" %\n (name, type_desc))\n\n has_explorable_fields = False\n current_choice = 0\n choice_to_compound_field_map = { }\n print_list = [ ]\n for field in fields:\n if field.artificial:\n continue\n if field.is_base_class:\n field_desc = \"base class\"\n else:\n field_desc = \"field\"\n rhs = (\"<Enter %d to explore this %s of type '%s'>\" %\n (current_choice, field_desc, str(field.type)))\n print_list.append((field.name, rhs))\n choice_to_compound_field_map[str(current_choice)] = (\n field.name, field.type, field_desc)\n current_choice = current_choice + 1\n\n CompoundExplorer._print_fields(print_list)\n print (\"\")\n\n if len(choice_to_compound_field_map) > 0:\n choice = raw_input(\"Enter the field number of choice: \")\n if choice in choice_to_compound_field_map:\n if is_child:\n new_name = (\"%s '%s' of %s\" % \n (choice_to_compound_field_map[choice][2],\n choice_to_compound_field_map[choice][0],\n name))\n else:\n new_name = (\"%s '%s' of '%s'\" % \n (choice_to_compound_field_map[choice][2],\n choice_to_compound_field_map[choice][0],\n name))\n Explorer.explore_type(new_name,\n choice_to_compound_field_map[choice][1], True)\n return True\n else:\n if is_child:\n Explorer.return_to_enclosing_type()\n else:\n if is_child:\n Explorer.return_to_enclosing_type_prompt()\n\n return False\n \n\nclass TypedefExplorer(object):\n \"\"\"Internal class used to explore values whose type is a typedef.\"\"\"", "\n\n @staticmethod\n def explore_expr(expr, value, is_child):\n \"\"\"Function to explore typedef values.", "\n See Explorer.explore_expr for more information.", "\n \"\"\"\n actual_type = value.type.strip_typedefs()\n print (\"The value of '%s' is of type '%s' \"\n \"which is a typedef of type '%s'\" %\n (expr, str(value.type), str(actual_type)))\n\n Explorer.explore_expr(expr, value.cast(actual_type), is_child)\n return False\n\n @staticmethod\n def explore_type(name, datatype, is_child):\n \"\"\"Function to explore typedef types.", "\n See Explorer.explore_type for more information.", "\n \"\"\"\n actual_type = datatype.strip_typedefs()\n if is_child:\n print (\"The type of %s is a typedef of type '%s'.\" %", "\n (name, str(actual_type)))\n else:\n print (\"The type '%s' is a typedef of type '%s'.\" %", "\n (name, str(actual_type)))\n\n Explorer.explore_type(name, actual_type, is_child)\n return False\n\n\nclass ExploreUtils(object):\n \"\"\"Internal class which provides utilities for the main command classes.\"\"\"", "\n\n @staticmethod\n def check_args(name, arg_str):\n \"\"\"Utility to check if adequate number of arguments are passed to an\n explore command.", "\n\n Arguments:\n name: The name of the explore command.", "\n arg_str: The argument string passed to the explore command.", "\n\n Returns:\n True if adequate arguments are passed, false otherwise.", "\n\n Raises:\n gdb.", "GdbError if adequate arguments are not passed.", "\n \"\"\"\n if len(arg_str) < 1:\n raise gdb.", "GdbError(\"ERROR: '%s' requires an argument.\"", "\n % name)\n return False\n else:\n return True\n\n @staticmethod\n def get_type_from_str(type_str):\n \"\"\"A utility function to deduce the gdb.", "Type value from a string\n representing the type.", "\n\n Arguments:\n type_str: The type string from which the gdb.", "Type value should be\n deduced.", "\n\n Returns:\n The deduced gdb.", "Type value if possible, None otherwise.", "\n \"\"\"\n try:\n # Assume the current language to be C/C++ and make a try.", "\n return gdb.parse_and_eval(\"(%s *)0\" % type_str).type.target()\n except RuntimeError:\n # If assumption of current language to be C/C++ was wrong, then\n # lookup the type using the API.", "\n try:\n return gdb.lookup_type(type_str)\n except RuntimeError:\n return None\n\n @staticmethod\n def get_value_from_str(value_str):\n \"\"\"A utility function to deduce the gdb.", "Value value from a string\n representing the value.", "\n\n Arguments:\n value_str: The value string from which the gdb.", "Value value should\n be deduced.", "\n\n Returns:\n The deduced gdb.", "Value value if possible, None otherwise.", "\n \"\"\"\n try:\n return gdb.parse_and_eval(value_str)\n except RuntimeError:\n return None\n\n\nclass ExploreCommand(gdb.", "Command):\n \"\"\"Explore a value or a type valid in the current context.", "\n\n Usage:\n\n explore ARG\n\n - ARG is either a valid expression or a type name.", "\n - At any stage of exploration, hit the return key (instead of a\n choice, if any) to return to the enclosing type or value.", "\n \"\"\"\n\n def __init__(self):\n super(ExploreCommand, self).__init__(name = \"explore\",\n command_class = gdb.", "COMMAND_DATA,\n prefix = True)\n\n def invoke(self, arg_str, from_tty):\n if ExploreUtils.check_args(\"explore\", arg_str) == False:\n return\n\n # Check if it is a value\n value = ExploreUtils.get_value_from_str(arg_str)\n if value is not None:\n Explorer.explore_expr(arg_str, value, False)\n return\n\n # If it is not a value, check if it is a type\n datatype = ExploreUtils.get_type_from_str(arg_str)\n if datatype is not None:\n Explorer.explore_type(arg_str, datatype, False)\n return\n\n # If it is neither a value nor a type, raise an error.", "\n raise gdb.", "GdbError(\n (\"'%s' neither evaluates to a value nor is a type \"\n \"in the current context.\" %", "\n arg_str))\n\n\nclass ExploreValueCommand(gdb.", "Command):\n \"\"\"Explore value of an expression valid in the current context.", "\n\n Usage:\n\n explore value ARG\n\n - ARG is a valid expression.", "\n - At any stage of exploration, hit the return key (instead of a\n choice, if any) to return to the enclosing value.", "\n \"\"\"\n \n def __init__(self):\n super(ExploreValueCommand, self).__init__(\n name = \"explore value\", command_class = gdb.", "COMMAND_DATA)\n\n def invoke(self, arg_str, from_tty):\n if ExploreUtils.check_args(\"explore value\", arg_str) == False:\n return\n\n value = ExploreUtils.get_value_from_str(arg_str)\n if value is None:\n raise gdb.", "GdbError(\n (\" '%s' does not evaluate to a value in the current \"\n \"context.\" %", "\n arg_str))\n return\n\n Explorer.explore_expr(arg_str, value, False)\n\n\nclass ExploreTypeCommand(gdb.", "Command): \n \"\"\"Explore a type or the type of an expression valid in the current\n context.", "\n\n Usage:\n\n explore type ARG\n\n - ARG is a valid expression or a type name.", "\n - At any stage of exploration, hit the return key (instead of a\n choice, if any) to return to the enclosing type.", "\n \"\"\"\n\n def __init__(self):\n super(ExploreTypeCommand, self).__init__(\n name = \"explore type\", command_class = gdb.", "COMMAND_DATA)\n\n def invoke(self, arg_str, from_tty):\n if ExploreUtils.check_args(\"explore type\", arg_str) == False:\n return\n\n datatype = ExploreUtils.get_type_from_str(arg_str)\n if datatype is not None:\n Explorer.explore_type(arg_str, datatype, False)\n return\n\n value = ExploreUtils.get_value_from_str(arg_str)\n if value is not None:\n print (\"'%s' is of type '%s'.\" % (", "arg_str, str(value.type)))\n Explorer.explore_type(str(value.type), value.type, False)\n return\n\n raise gdb.", "GdbError((\"'%s' is not a type or value in the current \"\n \"context.\" % ", "arg_str))\n\n\nExplorer.init_env()\n\nExploreCommand()\nExploreValueCommand()\nExploreTypeCommand()\n" ]
{ "pile_set_name": "Github" }
[ 0.041666666666666664, 0.013071895424836602, 0.005291005291005291, 0.01818181818181818, 0.01020408163265306, 0.022727272727272728, 0.012987012987012988, 0.004975124378109453, 0, 0.03571428571428571, 0, 0, 0, 0, 0.0039946737683089215, 0, 0, 0, 0, 0, 0.004464285714285714, 0, 0.007889546351084813, 0, 0, 0, 0, 0, 0.005434782608695652, 0, 0.006276150627615063, 0, 0, 0, 0.02040816326530612, 0.020833333333333332, 0.02040816326530612, 0.020833333333333332, 0.02040816326530612, 0.02040816326530612, 0.018867924528301886, 0.019230769230769232, 0.02040816326530612, 0.0196078431372549, 0.017241379310344827, 0.018867924528301886, 0.014184397163120567, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00411522633744856, 0, 0.0035087719298245615, 0, 0.0076045627376425855, 0, 0.006872852233676976, 0, 0, 0.01818181818181818, 0, 0, 0.011869436201780416, 0, 0, 0.009900990099009901, 0, 0.01, 0, 0.004132231404958678, 0.018018018018018018, 0, 0, 0.008264462809917356, 0.006550218340611353, 0.009900990099009901, 0, 0, 0.003134796238244514, 0.01834862385321101, 0, 0.011450381679389313, 0, 0.004739336492890996, 0.01834862385321101, 0, 0, 0.006787330316742082, 0.009615384615384616, 0, 0, 0.0037593984962406013, 0.007575757575757576, 0.0075075075075075074, 0, 0, 0, 0.0034071550255536627, 0, 0.0036063884595569293, 0, 0, 0.003401360544217687, 0, 0.002591792656587473, 0.018018018018018018, 0, 0.009324009324009324, 0, 0.0136986301369863, 0, 0.00423728813559322, 0.00641025641025641, 0, 0, 0, 0, 0.021739130434782608, 0, 0, 0.00966183574879227, 0, 0, 0, 0, 0, 0.010526315789473684, 0.013392857142857142, 0.017094017094017096, 0, 0, 0, 0, 0, 0.01935483870967742, 0.013888888888888888, 0.01020408163265306, 0, 0, 0.004373177842565598, 0, 0.008771929824561403, 0, 0.012987012987012988, 0.012195121951219513, 0, 0, 0.007936507936507936, 0.009174311926605505, 0.007575757575757576, 0, 0.010416666666666666, 0, 0, 0.004434589800443459, 0.007407407407407408, 0.010309278350515464, 0.010752688172043012 ]
0.005707
5
[ "The present invention relates to a process for removing hydrogen cyanide from ethanedinitrile.", "\nEthanedinitrile, also known as dicyan, is a colourless and toxic gas which has a sweet pungent odour and a boiling point of −21° C. In chemical terms, its behaviour is similar to that of a halogen and it is therefore referred to as pseudohalogen. ", "Ethanedinitrile is an important intermediate in the preparation of many commercial end products, for instance of synthetic fertilizers and nitriles. ", "In addition, ethanedinitrile finds use in welding technology, since it burns with oxygen in the hottest known flame (4640 K). ", "Further fields of use of ethanedinitrile are its use as a high-performance fuel, as a stabilizer in the preparation of nitrocellulose, or as a fumigant, especially in agriculture, for instance for killing parasites on agricultural soils or in the storage of goods (WO 2005/037332, U.S. Pat. ", "No. ", "6,001,383).", "\nEthanedinitrile can be prepared in the laboratory by heating mercury(II) cyanide. ", "In industry, it is usually obtained by oxidizing hydrogen cyanide, typically using chlorine over an activated silicon dioxide catalyst or nitrogen dioxide over copper salts. ", "Alternatively, ethanedinitrile can be produced by catalytic oxidation of hydrogen cyanide with hydrogen peroxide in the presence of copper(II) and iron(II) salts, as described, for example, in DE 2 012 509, DE 2 022 454, DE 2 022 455 and DE 2 118 819.", "\nEthanedinitrile which has been obtained, for example, by one of the above methods by oxidizing hydrogen cyanide generally comprises unconverted hydrogen cyanide, and also by-products such as oxygen, carbon dioxide or water. ", "The purification of ethanedinitrile, especially the selective and quantitative removal of hydrogen cyanide, is extremely demanding owing to the very similar chemical behaviour of ethanedinitrile and hydrogen cyanide.", "\nU.S. Pat. ", "No. ", "3,135,582 discloses a process for preparing ethanedinitrile by catalytic oxidation of hydrogen cyanide by means of oxygen and nitrogen oxides. ", "This reaction forms, as a crude product, a mixture of ethanedinitrile, water, nitrogen monoxide, nitrogen dioxide, oxygen and hydrogen cyanide. ", "Since some of these constituents have very similar melting and boiling points, it is difficult to obtain pure ethanedinitrile by simple condensation or distillation. ", "The gaseous product mixture is therefore first contacted with an extraction solvent in which nitrogen dioxide and hydrogen cyanide are soluble, and nitrogen monoxide, oxygen and ethanedinitrile are simultaneously essentially insoluble. ", "Ethanedinitrile is then obtained from the resulting gas mixture by condensation.", "\nThe yield of pure ethanedinitrile is relatively low in the process described in U.S. Pat. ", "No. ", "3,135,582. ", "Moreover, the complexity of an environmentally benign disposal of the hydrogen cyanide-containing extraction solvent is very high, especially since relatively large amounts of extraction solvent have to be used in order to guarantee complete removal of the hydrogen cyanide from the ethanedinitrile.", "\nU.S. Pat. ", "No. ", "4,073,862 discloses a process for removing ammonia, hydrogen sulphide and hydrogen cyanide from gases. ", "In this process, the gas is first washed with a basic solution in order to remove hydrogen sulphide and hydrogen cyanide. ", "The hydrogen sulphide is subsequently oxidized to elemental sulphur and removed, while the cyanide-containing basic solution has to be disposed of. ", "Under these basic conditions, a hydrolysis of ethanedinitrile would, however, be unavoidable, and so the process described is unsuitable for the purification of ethanedinitrile.", "\nIt is therefore an object of the present invention to provide an environmentally benign and inexpensive process for removing hydrogen cyanide from ethanedinitrile, in which the yield of pure ethanedinitrile is at a maximum.", "\nThis object is achieved by the process according to claim 1. ", "Further preferred embodiments are the subject-matter of the dependent claims." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.09090909090909091, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.09090909090909091, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.005682
5
[ "Long Term Forecast\n\nTUESDAY\n\nHigh: 99°FLow: 79°F\n\nMOSTLY SUNNY. ", "A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS IN THE AFTERNOON. ", "HIGHS IN THE UPPER 90S...EXCEPT IN THE MID 90S NEAR THE COAST. ", "HEAT INDEX READINGS UP TO 108 IN THE AFTERNOON. ", "SOUTHWEST WINDS 5 TO 10 MPH...BECOMING SOUTH WITH GUSTS UP TO 20 MPH IN THE AFTERNOON. ", "CHANCE OF RAIN 20 PERCENT. ", "OVERNIGHT: MOSTLY CLOUDY IN THE EVENING...THEN BECOMING PARTLY CLOUDY. ", "LOWS IN THE UPPER 70S. SOUTH WINDS 5 TO 10 MPH WITH GUSTS UP TO 20 MPH.", "\n\nWEDNESDAY\n\nHigh: 95°FLow: 79°F\n\nMOSTLY SUNNY. ", "A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS IN THE AFTERNOON. ", "HIGHS IN THE MID 90S. SOUTHWEST WINDS 10 TO 15 MPH. ", "CHANCE OF RAIN 20 PERCENT. ", "HEAT INDEX READINGS UP TO 105. ", "OVERNIGHT: PARTLY CLOUDY. ", "A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS IN THE EVENING. ", "LOWS IN THE UPPER 70S. SOUTHWEST WINDS 10 TO 15 MPH. ", "CHANCE OF RAIN 20 PERCENT.", "\n\nTHURSDAY\n\nHigh: 95°FLow: 79°F\n\nMOSTLY SUNNY WITH A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS. ", "HIGHS IN THE MID 90S. CHANCE OF RAIN 20 PERCENT. ", "HEAT INDEX READINGS UP TO 105. ", "OVERNIGHT: MOSTLY CLOUDY WITH A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS. ", "LOWS IN THE UPPER 70S. CHANCE OF RAIN 20 PERCENT.", "\n\nFRIDAY\n\nHigh: 95°FLow: 79°F\n\nPARTLY SUNNY WITH A CHANCE OF SHOWERS AND THUNDERSTORMS. ", "HIGHS IN THE MID 90S. CHANCE OF RAIN 30 PERCENT. ", "HEAT INDEX READINGS UP TO 105. ", "OVERNIGHT: MOSTLY CLOUDY WITH A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS. ", "LOWS IN THE UPPER 70S. CHANCE OF RAIN 20 PERCENT.", "\n\nSATURDAY\n\nHigh: 95°FLow: 79°F\n\nPARTLY SUNNY WITH A CHANCE OF SHOWERS AND THUNDERSTORMS. ", "HIGHS IN THE MID 90S. CHANCE OF RAIN 30 PERCENT. ", "OVERNIGHT: MOSTLY CLOUDY WITH A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS. ", "LOWS IN THE UPPER 70S. CHANCE OF RAIN 20 PERCENT.", "\n\nSUNDAY\n\nHigh: 91°FLow: 75°F\n\nPARTLY SUNNY WITH A CHANCE OF SHOWERS AND THUNDERSTORMS. ", "HIGHS IN THE LOWER 90S. CHANCE OF RAIN 40 PERCENT. ", "OVERNIGHT: MOSTLY CLOUDY WITH A SLIGHT CHANCE OF SHOWERS AND THUNDERSTORMS. ", "LOWS IN THE MID 70S. CHANCE OF RAIN 20 PERCENT." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.015873015873015872, 0, 0, 0, 0, 0.028169014084507043, 0, 0, 0.019230769230769232, 0, 0, 0.038461538461538464, 0, 0.03773584905660377, 0, 0, 0, 0, 0, 0.02040816326530612, 0, 0, 0, 0, 0.02040816326530612, 0, 0, 0, 0.02040816326530612, 0, 0, 0, 0 ]
0.005734
5
[ "Hot Topics:\n\nPushing for a modern, mobile federal government\n\nBy Marjorie Censer, The Washington Post\n\nPosted:\n04/30/2013 11:12:06 AM EDT\n\nRandy Siegel handles government sales and strategy for Fixmo, a mobile security company. (", "Evy Mages for The Washington Post)\n\nWASHINGTON - Walking through the halls of federal buildings was a distinct change for Steven VanRoekel, who had started at Microsoft right out of college and spent three years as Bill Gates' assistant.", "\n\nFederal employees had very simple cellphones and Blackberrys - if they had them at all - and many buildings weren't equipped with wireless, recalled VanRoekel, who joined the government in 2009 and became the federal chief information officer in 2011.", "\n\nHe's now spearheading an effort to modernize the government's technology, pushing to make more information available to citizens and allow its employees to do more work on the go.", "\n\nBut moving the federal government to tablets, smartphones and applications isn't as simple as signing a cellphone contract or building a 99-cent app.", "\n\nVanRoekel's office last year issued dozens of pages of strategy and milestones meant to help the government shift to a more digital era. ", "The assignments included producing a shared app development program and establishing new government-wide mobile security standards.", "\n\nMany of the milestones have already come due - and the rest are supposed to be complete by next month.", "\n\n\"It takes a village to really move the mass that is government,\" VanRoekel said in an interview last week.", "\n\nAs the government rethinks its approach, local contractors have responded. ", "Some companies specializing in securing smartphones for government have sprung up, while other, more-established contractors are switching gears from developing large-scale software systems to designing smaller applications.", "\n\nAdvertisement\n\nMuch of the impetus for the government to move to better mobility has come from employees. ", "Military officials have said that soldiers, for instance, don't understand why they must use mobile devices on the battlefield that are less sophisticated than their iPhones at home.", "\n\nAt civilian agencies, employees have made clear to their bosses that they want to be able to do work on the go.", "\n\nFederal employees are saying, \"Not only do we want to play Angry Birds and get onto our Facebook accounts . . . ", "we want to use these relatively inexpensive and powerful information tools to do our work,\" said Randy Siegel, who handles government sales and strategy for mobile security company Fixmo.", "\n\nThe holdup - and the opportunity for contractors - in many cases is in the security. ", "Military and intelligence officials must ensure that closely guarded information is still secure, even on a mobile device.", "\n\nCompanies such as Sterling, Va.-based Fixmo hope to help. ", "The company sells software originally designed by the National Security Agency that Fixmo obtained as part of a technology transfer program in 2009.", "\n\nThe software continuously checks mobile devices for changes, seeking to ensure that any questionable activity is quickly caught, said Siegel, who has spent more than a dozen years working on mobility for government at both Microsoft and Motorola Solutions. ", "As part of the deal with the NSA, Fixmo provides licenses for the basic iteration of its software to the government free of charge (a more advanced version is available for a price).", "\n\nHerndon, Va.-based Kaprica Security too is working with the government as it gets its mobility security product off the ground. ", "The early-stage company, with just eight employees, has received Defense Advanced Research Projects Agency funding to advance its security technology.", "\n\nThe idea behind the company is to turn a phone charger into a security device, said Douglas Britton, the company's chief executive and co-founder.", "\n\n\"It's something you've got to do every day anyway,\" he said of charging. \"", "We can essentially inspect the phone without having to trust the phone.\"", "\n\nThe company is trying to develop the technology so it's affordable to individuals at about $50 to $75 - plus an additional subscription fee. ", "Britton said Kaprica is now seeing plenty of government interest, from the Energy Department to the Pentagon.", "\n\nVanRoekel said the government is on track to meet the goals of its strategy.", "\n\nStill, quantifying the size of the mobile market for government can be hard to do, given that it can include anything from the actual hardware to security to cellphone service.", "\n\nHerndon, Va.-based Deltek, which researches the government contracting market, analyzed the federal budget for communications funding with a mobility component and found a rising figure that reached $757 million in the fiscal 2014 federal budget request.", "\n\nWhile it's a rough number, it suggests the government is prioritizing these kinds of improvements. ", "The Pentagon, for instance, has requested $66 million specifically for mobility spending in the 2014 budget, said Alex Rossino, a principal research analyst at Deltek.", "\n\nTom Simmons, vice president in Citrix's U.S. public sector business, said much of what his cloud and virtualization company has done so far for the government has been pilot programs. ", "But he foresees a much more mobile government, in which Pentagon maintenance crews use mobile devices rather than paper manuals and Census Bureau workers rely entirely on tablets and mobile devices, not pen and paper.", "\n\n\"The government has this sort of perception that it's slower to adopt [technology] than the private sector - and in a lot of cases not only is it true, but it's a good thing,\" he said. \"", "There is a conservatism and a caution that's built in by design.\"" ]
{ "pile_set_name": "Pile-CC" }
[ 0.013100436681222707, 0.016877637130801686, 0.003952569169960474, 0, 0, 0, 0, 0, 0.009259259259259259, 0, 0, 0, 0.005494505494505495, 0, 0.008771929824561403, 0.0053475935828877, 0, 0, 0.016666666666666666, 0.006756756756756757, 0.011583011583011582, 0.005494505494505495, 0.015384615384615385, 0.006666666666666667, 0.006756756756756757, 0, 0, 0, 0.03669724770642202, 0, 0, 0.0078125, 0, 0.017964071856287425, 0.010752688172043012, 0.009216589861751152, 0, 0 ]
0.005646
5