texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
0.09
num_sents
int64
5
5
[ "Q:\n\nWhich gender for “I did it” in French?", "\n\nIn French, if I want to say I did it, do I use the masculine le or the feminine la?", "\nShould I then say Je l'ai fait or Je l'ai faite?", "\n\nA:\n\nIf “I did it” means that you did something without explicitly stating what, you should use the neutral, thus the masculine\n\nJe l'ai fait !", "\n\nbut if you achieved something, it would be more idiomatic to use\n\nJ'ai réussi !", "\n\nIf the thing you did is explicit, then you must use its gender\n\n— Et la descente de la Tour Eiffel en snowboard ?", "\n — Je l'ai faite !", "\n\nA:\n\nUnless there's a known feminine gender behind the it, you would use the masculine\n\n— Tu as remis le rapport?", "\n — Oui, je l'ai fait!", "\n\nBut\n\n— Tu as fait la vaisselle?", "\n — Oui, je l'ai faite!", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.04081632653061224, 0.006944444444444444, 0, 0, 0.05, 0.008771929824561403, 0, 0.06060606060606061, 0, 0 ]
0.013928
5
[ "Continuous measurement of tympanic temperature with a new infrared method using an optical fiber.", "\nThe purpose of this study was to investigate the utility of an infrared tympanic thermometry by using an optical fiber for measuring tympanic temperature (Tty). ", "In the head cooling and facial fanning tests during normothermia, right Tty measured by this method (infrared-Tty) and esophageal temperature (Tes) were not affected by decreased temple and forehead skin temperatures, suggesting that the infrared sensor in this system measured the infrared radiation from the tympanic membrane selectively. ", "Eight male subjects took part in passive-heat-stress and progressive-exercise tests. ", "No significant differences among infrared-Tty, the left Tty measured by thermistor (contact-Tty), and Tes were observed at rest or at the end of each experiment, and there was no significant difference in the increase in these core temperatures from rest to the end. ", "Furthermore, there were no significant differences in the core temperature threshold at the onset of sweating and slope (the relationship of sweating rate vs. infrared-Tty and vs. contact-Tty). ", "These results suggest that this method makes it possible to measure Tty accurately, continuously, and more safely." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "[Neuropsychologic examination in the evaluation of level of consciousness in patients with a craniocerebral injury associated with multiple injuries].", "\nToday's way of life, with its high level of mechanization and need for speed brings a large number of injuries to the working population. ", "There is usually a wide range of injuries, among which are very often closed head injuries. ", "Until today the whole focus was on the restoration of organic systems and very little attention was given to subtle deficits in the area of cognition and higher intellectual functions. ", "We wanted to point out that there is a great need for neuropsychological examination from the beginning of medical treatment, which will, with tests, point out disturbances which are not visible in the early post-traumatic period, but which will get worse and prevent the normal resocialization and adaptation of the patient to their previous environment after being discharged from hospitals. ", "After the research had been carried out it was obvious that these examinations, as well as the question of destroyed integrity, needed attention because such analyses can, in an early post-traumatic phase, show recovery or the existence of definite disability. ", "We believe that neuropsychological examination needs to be equal to other forms of medical examination." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.006666666666666667, 0, 0, 0, 0, 0, 0 ]
0.000952
5
[ "You are here\n\nThe Importance of Taking Risks in Recovery\n\nSubmitted by nedic blogger on Fri, 02/05/2016 - 07:44\n\nThe recovery process is all about stepping outside of your comfort zone, facing fears, and defying the voice of the eating disorder - time and time again. ", "However, there may come a point, either in the early or later stages of recovery, when you decide that you no longer need to push or challenge yourself as much.", "\n\nThis is completely normal. ", "Even for individuals who have not been affected by eating disorders, there is an impulse to stay with what is comfortable and familiar. ", "A comfort zone is a safe place to be; but no major growth ever happens there. ", "In order to truly grow and strengthen your recovery, it is critical to continue to challenge yourself on a regular basis, whether it’s trying new restaurants, facing “fear or trigger foods”, being more flexible with exercise, taking rest-days, or resisting the urge to engage in food rituals.", "\n\nHowever, it is important to note that one of the goals of the recovery process is to push and challenge yourself in a way that feels uncomfortable, but not unsafe. ", "Additionally, recovery is not a race and it can be helpful to work to challenge yourself in small and manageable steps. ", "When you are in recovery, the voice of your eating disorder may try to convince you that you are “doing fine” and that there is no reason to challenge yourself further. ", "Holding onto even a tiny bit of an eating disorder is what keeps you from living a truly fully happy and fulfilled life.", "\n\nI think that we often avoid taking risks in life because we think that we need to wait until we feel confident enough to do so. ", "However, the paradox of this is that you will only begin to feel less afraid and gain confidence by gradually exposing yourself to what you are afraid of Susan Jeffers, Ph.D., exemplified this in her book entitled \"Feel The Fear... And Do it Anyway\" when she stated:\n\n\"I had grown up waiting for the fear to go away before I took any chances. ", "When I am no longer afraid... then! ", "For most of my life I had played the when/then game and it never worked... Fear of particular situations dissolved when I finally confronted them. ", "The doing it comes before the fear goes away.\"", "\n\nRather than trying to get rid of your fear or wait for it to go away, keep in mind that it is normal and okay to feel afraid. ", "Further, you can feel afraid and take the desired action anyway. ", "The less that you give into the voice of fear and allow it to control your actions, the more empowered and free you will feel over time.", "\n\nIt could be helpful to start by making a list of your fears that are keeping you stuck in your eating disorder (specific foods, situations, etc.) ", "and then rank them in order of the ones that are the least challenging to the most challenging. ", "That way you can start at the bottom of the list with the ones that are the least challenging, and then work your way up. ", "Additionally, if the voice of your eating disorder is particularly strong it can be helpful to find someone who can support you while you are facing your fears, such as a therapist, nutritionist, mentor, friend, partner, family member, etc. ", "Recovery from an eating disorder can be tough and you do not have to go through it alone. ", "Turning to positive relationships in your life when you are feeling triggered (rather than utilizing unhealthy behaviors) can definitely serve to strengthen your recovery.", "\n\nThis week and beyond, I would encourage you to really think about the lingering fears which may be holding you back from full recovery. ", "Imagine how great it would feel to serve as a role model to others and to be able to say that you finally gained back your life from an eating disorder. ", "You deserve so much more than living a life that is in any way controlled by an eating disorder. ", "Ultimately, true courage is not the absence of fear; rather, it is the willingness to take action despite feeling afraid. ", "Full recovery is possible; just remember to keep pushing yourself out of your comfort zone.", "\n\nJennifer Rollin, MSW, LGSW, is a mental health therapist who specializes in working with adolescents, survivors of trauma, body image concerns, and individuals experiencing mood disorders. ", "She has experience working in a variety of settings including, an outpatient mental health clinic, therapeutic group homes, and a sexual assault crisis hotline. ", "Jennifer's articles have been featured on numerous websites including: HuffingtonPost.com, PsychologyToday.com, PsychCentral.com, NationalEatingDisorders.org, Bedaonline.com, and TheProjectHeal.org. ", "For body-positive and self-love inspiration connect with Jennifer on Facebook.", "\n\nAbout this blog\n\nRead about how real life experiences impact self-concept and body image. ", "Writers reflect a diversity of opinions and perspectives.", "\n\nDisclaimer: Pieces featured on this site are forms of self-expression and should not be considered medical or professional advice. ", "NEDIC will not be held liable for any misinformation. ", "If you would like to reprint or publish any or all content, please contact our blog coordinators at nedic@uhn.ca\n\nNEDIC Helpline Evaluation Survey\n\nHave you used the NEDIC Helpline or Instant Chat before? ", "If yes, please consider taking a few minutes to complete this anonymous survey.", "\n\nThe information you provide will not be used in any way that would identify you and will remain confidential. ", "We value your feedback and will use it to improve the Helpline/Instant Chat and serve you better in the future." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0029154518950437317, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.015706806282722512, 0, 0.035175879396984924, 0.01282051282051282, 0, 0, 0, 0.018518518518518517, 0.00975609756097561, 0, 0, 0 ]
0.002314
5
[ "Double-Wall Plastic Travel Mugs, 16 oz.", "\n\nTake beverages on the go with this convenient travel mug! ", "Double-wall design keeps drinks hot or cold, plus cap screws on tightly and has a sliding sip opening for less spills. ", "It’s great for resale and also is perfect for marketing giveaways, parties, and goodie bags. ", "Case includes 36 – 16-oz. ", "double-wall plastic travel mugs assorted among blue, green, and red." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0 ]
0
5
[ "Q:\n\nGet index of class clicked in JavaScript. ", "No jQuery\n\nEdit: \nThe suggestion points to a jquery answer, which I would prefer not to use. ", "I may have done a bad job explaining this. ", "When you click on a class, I want to know which one it is of all the classes sharing that same name. ", "For instance, if there are 8 buttons on the page with a classname of 'mybutton', when I click on one, I want to know which index it was ex: mybutton[3]. ", "\nOriginal Post:\nIs there a simple way to get the index of the class you clicked? ", "I can't seem to find anything in the MouseEvent obj. ", "I have searched stackoverflow/internet but what I can find seems to be over complicated,unanswered, or using jQuery. ", "Example:\ndocument.body.addEventListener('click',function(event){\n console.log(event.target.className);\n console.log(event.target.className.index??)", "`\n });\n\nI feel like it should be simple, no?", "\n\nA:\n\nThere's no \"easy\" way to do it; that is, the DOM API doesn't directly answer that sort of question. ", "You can however simply search through the list of elements that match any characteristic you want and see which one your element matches:\nfunction indexIn(selector, element) {\n var list = document.querySelectorAll(selector);\n for (var i = 0; i < selector.length; ++i)\n if (list[i] === element) return i;\n return -1;\n}\n\nThen your handler can look through the .classList on the clicked element:\ndocument.body.addEventListener('click',function(event){\n for (var i = 0; i < this.classList; ++i)\n console.log(\"index for class \" + this.classList[i] + \": \" +\n indexIn(\".\" ", "+ this.classList[i], this));\n});\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.021739130434782608, 0, 0, 0, 0, 0, 0.018867924528301886, 0.008547008547008548, 0, 0, 0.009433962264150943, 0.0034482758620689655, 0 ]
0.004772
5
[ "WFFG-FM\n\nWFFG-FM (100.3 FM), known as \"Froggy 100.3\", is a country music radio station in the United States, licensed to Warrensburg, New York, and owned by Pamal Broadcasting. ", "The station broadcasts 24 hours a day on 100.3 MHz with 1,450 watts effective radiated power from a transmitter located near Black Spruce mountain in the town of Warrensburg, Warren County, New York. (", "shared with WCKM-FM, WCQL and the former location of WNYQ, now WQBK-FM in the Albany market), and serves the Adirondack Region and the Capital District of New York.", "\n\nWFFG-FM's signal can be heard as far south as southern Albany and Rensselaer counties, and as far north as Schroon Lake and Elizabethtown.", "\n\nHistory\nWFFG-FM signed on November 1, 1990 on 100.5 MHz with 6 kilowatts ERP as adult contemporary KB-100 with the WKBE call letters. ", "Locally owned by Karamatt Broadcasting, LLC, KB-100 aired mostly local programming with some off-peak timeslots carrying syndicated programs and also aired local programs such as high school sporting events. ", "These events, however, were soon taken by WCKM-FM when that station signed on.", "\n\nIn 1994, Karamatt filed an application to upgrade for a 6 kilowatt Class A station to a 25 kilowatt Class B1 station as a response to the then-new application of the similarly powered WNYQ with the station moving down to 100.3 MHz in the process. ", "The move took place in summer 1995; however, the increased value of the station led to its sale to Paul Bendat, owner of WABY/WABY-FM/WKLI in Albany in March 1996 after two months of running WKLI's K-Lite format under an LMA. ", "With WKLI's adult contemporary format on the decline, Bendat saw an opportunity, and both WKLI and WKBE flipped to CHR K-100 with the closing of the purchase of WKBE.", "\n\nThough the initial year of WKBE's new format did well in the ratings, outlasting upstart WHTR, the station soon began to enter a period of decline, and in February 1999, Bendat sold his stations to Tele-Media, Inc. After a three-month stunting period, the stations relaunched as modern adult contemporary The Point that May (with WKLI taking the WCPT calls in the process). ", "After two years of struggling against a relaunched WNYQ in Glens Falls as well as WFLY and WRVE in Albany, Tele-Media sold WCPT and WKBE in August 2001 to Pamal Broadcasting with the sale closing that October.", "\n\nWhile WCPT (which reverted to WKLI) took a new format, WKBE instead retained the Point format, though now programming was based out of Glens Falls. ", "This format has evolved over the last decade from the modern adult contemporary approach in place at the outset to a variation more similar to CHR and eventually to a modern rock-leaning format.", "\n\nFrom November 22, 2006 to December 25, 2006, the station stunted with a temporary Christmas music format, and after the month-long stint of Christmas music, WKBE began its lean towards a modern rock-oriented format on December 26, by introducing a new logo and slogan (Today's Modern Mix).", "\n\nAfter the relaunch in 2006, the station's playlist included mainly modern and active rock artists, such as Alanis Morissette, Evanescence, No Doubt, Red Hot Chili Peppers, and Green Day, as well as pop rock acts such as Kelly Clarkson, Christina Perri, Paramore, Neon Trees, and Avril Lavigne. ", "In the late 2000s, soul music artists such as Adele, Duffy, and KT Tunstall began to be added to the playlist; however, by 2010, the station has become closer to a true modern rock format, although the station still plays some modern AC and AAA artists which are not found on most modern rock stations. ", "By 2012, Arbitron, Mediabase and Nielsen BDS reported the station under the hot adult contemporary format.", "\n\nOn December 27, 2013, WKBE and sister station WFFG-FM swapped formats and call letters; WKBE became a country music format as Froggy 100.3 and WFFG-FM became a modern AC/AAA format as 107.1 The Point.", "\n\nExternal links\n Froggy 100.3's website\n\nFFG-FM\nFFG-FM\nCategory:Country radio stations in the United States\nCategory:Radio stations established in 1990\nCategory:Pamal Broadcasting" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.011299435028248588, 0.004975124378109453, 0.018292682926829267, 0.02142857142857143, 0.014705882352941176, 0.009615384615384616, 0.01282051282051282, 0.004016064257028112, 0.022123893805309734, 0.024096385542168676, 0.013297872340425532, 0.023923444976076555, 0.02, 0.005154639175257732, 0.006872852233676976, 0.02364864864864865, 0.013201320132013201, 0.009433962264150943, 0.0297029702970297, 0.005555555555555556 ]
0.014708
5
[ " IN THE COURT OF APPEALS\n OF THE\n STATE OF MISSISSIPPI\n NO. ", "97-KA-00398 COA\nMARVIN LEWIS BECKUM APPELLANT\nv.\nSTATE OF MISSISSIPPI APPELLEE\n\nDATE OF JUDGMENT: 01/17/96\nTRIAL JUDGE: HON. ", "RICHARD WAYNE MCKENZIE\nCOURT FROM WHICH APPEALED: FORREST COUNTY CIRCUIT COURT\nATTORNEY FOR APPELLANT: CLIFTON S. GADDIS\nATTORNEY FOR APPELLEE: OFFICE OF THE ATTORNEY GENERAL\n BY: BILLY L. GORE\nDISTRICT ATTORNEY: E. LINDSAY CARTER\nNATURE OF THE CASE: CRIMINAL - FELONY\nTRIAL COURT DISPOSITION: STRONG ARMED ROBBERY: SENTENCED TO SERVE A\n TERM OF 15 YRS IN THE CUSTODY OF THE MDOC\nDISPOSITION: AFFIRMED - 3/9/99\nMOTION FOR REHEARING FILED: 03/22/99 - DENIED 12/05/00 WITH DISSENTING\n OPINION\nCERTIORARI FILED: 12/28/2000\nMANDATE ISSUED:\n\n ON MOTION FOR REHEARING\n\n EN BANC.", "\n\n McMILLIN, C.J., FOR THE COURT:\n\n¶1. ", "The motion for rehearing is denied. ", "The original opinion in the following form is reaffirmed.", "\n\n¶2. ", "On October 4, 1993, Mary Mathis was assaulted and robbed by a man later identified as the defendant\nin this cause, Marvin Beckum. ", "Beckum was subsequently arrested and charged with the crime. ", "His initial\nappearance before a magistrate occurred on October 8, 1993, at which time bond was set at $50,000.", "\nAfter that appearance, Beckum signed a waiver of his Miranda rights and gave a statement to an\ninvestigating officer that admitted his involvement in the incident. ", "Beckum was subsequently formally\nindicted for armed robbery, tried, and convicted. ", "He has now appealed to this Court raising three issues\nwhich he claims warrant a reversal of his conviction. ", "We disagree and affirm the judgment of sentence.", "\n\n I.\n\f The First Issue: The Trial Court's Refusal to Suppress Beckum's Confession\n\n¶3. ", "Beckum sought unsuccessfully to suppress his post-arrest statement and he now raises its admission at\ntrial as reversible error. ", "The State counters Beckum's assertion of error with essentially three arguments.", "\nFirst, the State argues that the confession met all of the requirements for voluntariness under applicable\nprecedent regarding Miranda warnings and proper procedures for waiving the Fifth Amendment right to\nassistance of counsel under Miranda. ", "Second, the State seems to suggest that Beckum is procedurally\nbarred from raising the separate issue of whether his Sixth Amendment right to the presence of counsel was\nviolated by the interrogation. ", "Third, the State alternatively argues that the admission of Beckum's confession\nwas, even if improper, harmless error because of the overwhelming evidence of his guilt.", "\n\n¶4. ", "To begin our evaluation of the arguments we look to see if Beckum was in fact represented by counsel\nat the time of his confession. ", "The order entered by the magistrate conducting Beckum's initial appearance\nafter his arrest is, to a certain extent, contradictory when addressing the matter of Beckum's representation.", "\nIn the first paragraph, the order states that Beckum \"appeared in Court represented by Hon. ", "Jeff Bradley,\nAttorney of Record.\" ", "The order, however, states elsewhere that \"[t]he defendant is unrepresented,\" and\ndeclares that he was advised of his right to representation that included appointed counsel in the event he\nwas without the necessary legal fees to hire an attorney. ", "The law is well-settled that, once a suspect has\ninvoked his right to counsel after initiation of formal adversarial proceedings by the State, no subsequent\nwaiver of right to counsel connected with a police-initiated interrogation as to that crime can be effective.", "\nKirby v. Illinois, 406 U.S. 682, 688 (1972); Cannaday v. State, 455 So. ", "2d 713, 722 (Miss. 1984).", "\nThe issue, therefore, becomes whether Beckum had, at the time of his interrogation, invoked his right to\nrepresentation in regard to the particular offense involved in this case. ", "The only evidence in the record on\nthe point is the magistrate's order referred to above. ", "Beckum presented no evidence at the suppression\nhearing that he ever did anything further to invoke his right to counsel at the initial appearance or at any time\nprior to making the incriminating statement to the investigating officer. ", "We find the magistrate's rather\ninconclusive order insufficient to suggest unequivocally that Beckum had invoked his Sixth Amendment right\nto counsel. ", "The Mississippi Supreme Court, in considering a similar question in the case of Wilcher v.\nState, quoted with approval the following passage from a Fifth Circuit opinion:\n\n A defendant's Sixth Amendment right to counsel attaches upon the initiation of adversary proceedings.", "\n Michigan v. Jackson, 475 U.S. 625, 106 S.Ct. ", "1404, 89 L.Ed.2d 631 (1986). ", "Wilcher asserts that\n even if his waiver was voluntary and knowing, the questioning in this case violated the prophylactic\n rule of Michigan v. Jackson, 475 U.S. at 635, 106 S.Ct. ", "at 1411. ", "The Supreme Court held in\n Jackson that \"if police initiate interrogation after a defendant's assertion at an arraignment or similar\n proceeding, of his right to counsel, any waiver of the defendant's right to counsel for that police-\n initiated interrogation is invalid.\" ", "Id. The State argues that Wilcher never took any action to invoke his\n right to counsel and therefore had not triggered the Jackson rule.", "\n\n We recently addressed the effect of appointment of counsel on the rights of a defendant who has\n never asserted or accepted the counsel. ", "We held that a defendant's Sixth Amendment rights are not\n violated by questioning in the absence of his attorney unless the defendant has asserted his right to an\n attorney. ", "Montoya v. Collins, 955 F.2d 279 (5th Cir.1992). . . . ", "We held that \"for purposes of\n Jackson, an 'assertion' means some kind of positive statement or other action that informs a\n reasonable person of the defendant's 'desire to deal with the police only through counsel.' \" ", "Id. at 283.", "\n Thus, we concluded that Montoya's interrogation did not violate the rule of Jackson because he did\n\f not assert a right to counsel and thereby trigger its protection.", "\n\n Wilcher likewise did not assert a right to counsel in his interrogation by the officers. ", "Under Montoya\n he was not protected by the rule in Jackson and voluntarily waived his right to counsel under the Sixth\n Amendment. ", "Wilcher IV, 978 F.2d at 876.", "\n\n Therefore, because Wilcher did not request an attorney or in any way assert his Sixth Amendment\n right to counsel, his argument on this point is without merit. ", "Furthermore, the evidence indicates that,\n upon being given his Fifth Amendment/Miranda warnings, Wilcher waived his right to counsel before\n each inculpatory statement was given. ", "As a general rule, a defendant may waive his Sixth Amendment\n right to counsel when he waives his Fifth Amendment rights. ", "Patterson v. Illinois, 487 U.S. 285,\n 296, 108 S.Ct. ", "2389, 2397, 101 L.Ed.2d 261 (1988); Mettetal v. State, 602 So.2d 864, 868\n (Miss.1992).", "\n\nWilcher v. State, 697 So. ", "2d 1087, 1096-97 (Miss. 1997) (citing Wilcher v. Hargett, 978 F.2d 872 (5th\nCir. ", "1992)).", "\n\n¶5. ", "In the absence of any affirmative evidence that Beckum accepted the representation of Attorney\nBradley at the time of his initial appearance, we conclude that there is no basis to exclude Beckum's\nsubsequent apparently voluntary statement based on the violation of any right accruing to him under the\nSixth Amendment.", "\n\n¶6. ", "As to his claim that the statement was not voluntary because it was obtained while he was under the\ninfluence of narcotics and was extracted through promises of favorable treatment, the officer who took the\nstatement and another witness who was present both testified as to the voluntariness of Beckum's\nconfession. ", "The trial court concluded that the State had demonstrated that Beckum freely and voluntarily\nmade the incriminating statement after having been fully informed of those rights guaranteed him under the\nFifth Amendment to the United States Constitution. ", "Once the trial court has reached such a conclusion, this\nCourt may not interfere except when an incorrect legal standard was applied, manifest error was\ncommitted, or the decision is contrary to the overwhelming weight of the evidence. ", "Willie v. State, 585 So.", "\n2d 660, 665 (Miss. 1991). ", "On that standard of review, we find no basis to interfere with the trial court's\ndecision to admit Beckum's statement.", "\n\n II.", "\n\n The Second Issue: A Procedural Defect in Sentencing\n\n¶7. ", "Beckum complains that he was improperly sentenced because of the failure of the trial court to\nannounce his sentence in open court while he was present. ", "The record is clear that Beckum was not present\nin open court when sentence was pronounced by the trial court from the bench. ", "In fact, there is no\nindication in the record that such a pronouncement ever occurred. ", "A nunc pro tunc sentencing order was\nentered purporting to reflect the date Beckum last appeared in person in court; however, that avails the\nState nothing because the transcript of that appearance shows that the trial court did not pronounce\nsentence at that time, but rather deferred the matter because Beckum had a new attorney who said, in\nregard to the sentencing, \"I don't know what the sentence was.\" ", "Beckum's new counsel was not alone in\nthat predicament since there is no evidence that sentence had been set. ", "Uniform Circuit and County Court\nRule 11.01 requires that \"sentence shall be pronounced in open court at any time after conviction, in the\n\fpresence of the defendant . . . ", "and recorded in the minutes of the court.\" ", "U.R.C.C.C. 11.01. ", "Although a\ndefendant's right of allocution in Mississippi is not absolute (see Johnson v. State, 461 So. ", "2d 1288, 1292\n(Miss. 1984)), it is nevertheless a recognized privilege that may be exercised if asserted. ", "Entering a\njudgment of sentence without a formal sentencing proceeding in open court at which the defendant is\npresent effectively destroys even the possibility of the defendant exercising his right of allocution.", "\nNevertheless, Section 99-35-143 of the Mississippi Code states that:\n\n [a] judgment in a criminal case shall not be reversed because the transcript of the record does not\n show . . . ", "that the prisoner was present in court during the trial or any part of it, or that the court\n asked him if he had anything to say why judgment should not be pronounced against him upon the\n verdict . . . ", "unless the record show that the errors complained of were made ground of special\n exception in that court.", "\n\nMiss. Code Ann. §", "99-35-143 (Rev. 1994). ", "In Jones v. State, the defendant specifically raised as an issue\non appeal that the record did not show that he was in court when sentence was pronounced. ", "Jones v.\nState, 227 Miss. 518, 527, 86 So. ", "2d 348, 349 (1956). ", "The Mississippi Supreme Court, relying on this\nstatute, said that Jones's failure to point out this perceived procedural defect at the trial level constituted a\nwaiver of the issue on appeal. ", "Id. at 527-28, 86 So. ", "2d at 350. ", "We conclude that the same considerations\napply in this case. ", "Beckum had ample opportunity to present his grievance in the manner in which he was\nsentenced to the trial court. ", "Had he done so, we have little doubt that this defect could have been remedied\nby appropriate action of the trial court. ", "We decline to grant relief on this issue raised for the first time on\nappeal.", "\n\n III.", "\n\n The Third Issue: Denial of a Speedy Trial\n\n¶8. ", "Beckum claims that his conviction should be reversed because he was not tried within 270 days of his\nindictment as required by Section 99-17-1 of the Mississippi Code or, alternatively, because he was denied\na speedy trial as guaranteed him under the Sixth Amendment to the United States Constitution. ", "Miss. Code\nAnn. § ", "99-17-1 (Rev. 1994).", "\n\n¶9. ", "Section 99-17-1 requires that a defendant be tried no later than 270 days after his arraignment, \"[u]\nnless good cause be shown, and a continuance duly granted by the court . . . .\" ", "Miss. Code Ann. § ", "99-17-\n1 (Rev. 1994). ", "In this case, Beckum was arraigned on June 21, 1994 and was not tried until August 22,\n1995. ", "Thus, 427 days elapsed between arraignment and trial. ", "In that circumstance, the burden falls on the\nState to demonstrate good cause for the delay. ", "Vickery v. State, 535 So. ", "2d 1371, 1375 (Miss. 1988).", "\n\n¶10. ", "In this case, the State relied upon proof that, shortly before his first scheduled trial date, Beckum\nchanged attorneys of his own volition. ", "The trial was then reset for approximately three months later, but\nabout a month in advance of the second trial date, Beckum's substitute counsel moved to withdraw,\nindicating that his client had lost confidence in the attorney's ability to properly represent his interests. ", "On\nNovember 30, 1994, the trial court appointed a member of the public defender's office to represent\nBeckum, and a scheduling order was entered setting a trial date of January 19, 1995. ", "Without explanation\nappearing in the record, trial was not conducted on that date and there is no further indication in the record\nas to why Beckum's trial was delayed until August 21, 1995.", "\n\f¶11. ", "Beckum, by his own actions, prevented the trial from commencing any time prior to the November 15,\n1994, trial date. ", "Even then, the case was not triable after November 15 because of Beckum's lack of\ncounsel. ", "However, we conclude that this delay attributable to Beckum was ended by the appointment of\ncounsel to represent him on November 30, 1994. ", "Thus, we find that all delays from the date of arraignment\nuntil November 30, 1994, were attributable to Beckum's actions and served to toll the running of the\nstatutory 270 period. ", "Beginning the running of the 270 day period on November 30, 1994, even if it is\nconceded that there were no further delays chargeable to Beckum that would further toll the running of the\nperiod, it appears in the record that trial commenced on August 22, 1995, which was the 265th day.", "\nTherefore, excluding those delays caused by Beckum, there was no violation of Beckum's statutory right to\na prompt trial as set out in Section 99-17-1. ", "Miss. Code Ann. § ", "99-17-1 (Rev. 1994).", "\n\n¶12. ", "Beckum, by motion, raised the separate issue of whether his constitutional right to a speedy trial\nguaranteed under the Sixth Amendment was violated. ", "He also argues on appeal that the trial court's refusal\nto dismiss on this separate claim requires reversal. ", "However, our review of the record indicates that\nBeckum did not present any evidence to the trial court concerning this distinct question and did not obtain a\nruling from the trial court on the alleged Sixth Amendment violation by the State. ", "When the speedy trial\nmotion was brought on for hearing, the inquiry was limited entirely to whether the statutory 270 day period\nfrom arraignment had been exceeded. ", "The trial court, in ruling on the motion, stated that \"this Court is of the\nopinion that it doesn't even come close to the 270 day rule, and that being the case, is going to overrule and\ndeny [the motion].\"", "\n\n¶13. ", "Sixth Amendment speedy trial considerations are substantially different from the somewhat mechanical\ncomputation of the period from arraignment to trial necessary to determine whether a prima facie violation\nof the 270 day rule has occurred. ", "Primary among those distinctions is that the Sixth Amendment right\nattaches at the time of arrest rather than arraignment. ", "Spencer v. State, 592 So. ", "2d 1382, 1386-87 (Miss.\n1991). ", "The difference is dramatic in this case, since there was a period of over eight months from arrest to\narraignment that had no effect on the 270 day statutory violation question but would seem, on the face of it,\nto be a significant factor in any Sixth Amendment violation analysis. ", "Barker v. Wingo, 407 U.S. 514, 530\n(1972); Jenkins v. State, 607 So. ", "2d 1137, 1139 (Miss. 1992).", "\n\n¶14. ", "We begin our analysis of this issue by noting the fundamental proposition of appellate procedure that\nan appeals court will generally not reverse a trial court for matters that were not presented, in the first\ninstance, to the trial court for resolution. ", "Duplantis v. State, 708 So. ", "2d 1327, 1339 (Miss. 1998). ", "It is\nalso the case that, in regard to motion practice, the duty lies with the movant to obtain a definitive ruling\nfrom the trial court on any motion if the failure to grant the relief sought in the motion is to be preserved for\nreview on appeal. ", "Willie v. State, 585 So. ", "2d 660, 671 (Miss. 1991).", "\n\n¶15. ", "After the trial court ruled in this case, clearly limiting itself to the 270 day statutory aspect of Beckum's\nmotion, it stated into the record that it would \"give [Beckum] an opportunity to put anything further in the\nrecord [he] desire[d] to put in the record at th[at] time.\" ", "It would have been entirely appropriate at that time\nfor counsel to point out to that the separate issue of Beckum's Sixth Amendment right to a speedy trial had\nnot been addressed; however, that opportunity was declined by defense counsel. ", "We, therefore, treat this\naspect of Beckum's motion to dismiss on constitutional grounds as a matter on which the defendant failed to\nobtain a ruling from the trial court. ", "Beckum's subsequent participation in the trial without insisting that the\ntrial court first deal with this distinct aspect of his dismissal motion became, in our view, a waiver of any right\nto raise the issue on appeal.", "\n\f¶16. ", "THE JUDGMENT OF THE FORREST COUNTY CIRCUIT COURT OF CONVICTION\nOF STRONG-ARM ROBBERY AND SENTENCE OF FIFTEEN YEARS IN THE CUSTODY\nOF THE MISSISSIPPI DEPARTMENT OF CORRECTIONS IS AFFIRMED. ", "ALL COSTS OF\nTHIS APPEAL ARE ASSESSED TO FORREST COUNTY.", "\n\n SOUTHWICK, P.J., BRIDGES, LEE, PAYNE, AND THOMAS, JJ., ", "CONCUR. ", "IRVING,\n J., DISSENTS WITH SEPARATE OPINION JOINED BY KING, P.J., COLEMAN AND\n DIAZ, JJ.", "\n\n IRVING, J., DISSENTING:\n\n¶17. ", "For the reasons set forth below, I respectfully dissent from the majority's decision that Marvin\nBeckum's Sixth Amendment Rights were not violated as a result of custodial, police-initiated interrogation\nof him after his initial appearance. ", "The majority is eminently correct in holding that \"the law is well settled\nthat, once a suspect has invoked his right to counsel after initiation of formal adversarial proceedings by the\nState, no subsequent waiver of right to counsel connected with a police-initiated interrogation as to that\ncrime can be effective.\" ", "Kirby v. Illinois, 406 U.S. 682, 688 (1972); Cannaday v. State, 455 So. ", "2d\n713, 722 (Miss. 1984). ", "The majority is also correct in identifying the substantive issue to be \"whether\nBeckum had, at the time of his interrogation, invoked his right to representation in regard to the particular\noffense involved in this case.\" ", "The majority errs, however, when it concludes that \"the magistrate's order is\nthe only evidence in the record\" on the point of whether Beckum had, at the time of his interrogation,\ninvoked his right to representation in regard to the particular offense involved in this case. ", "Then, the\nmajority, relying solely on the ambiguous magistrate's order, holds that Beckum's statement given to the\nauthorities after his initial appearance (and appointment of counsel) should not be excluded because of the\nlack of \"any affirmative evidence that Beckum accepted the representation of Attorney Bradley at the time\nof his initial appearance.\"", "\n\n¶18. ", "The inconclusive order upon which the majority relies is as follows:\n\n ORDER\n\n ON THIS DAY this cause came on for Initial Appearance, and the Court, having been duly advised\n in the premises, FINDS that the Defendant in the above styled and numbered cause, appeared in\n Court represented by Hon. ", "Jeff Bradley, Attorney of Record, that said defendant was charged with\n STRONG ARMED ROBBERY defendant was advised in Open Court:\n\n 1. ", "That the defendant is not required to speak and that any statements he makes may be used against\n him.", "\n\n 2. ", "That the defendant is unrepresented, that he has the right of counsel, and that if he is unable to\n afford counsel, an attorney will be appointed to represent him.", "\n\n 3. ", "That the defendant has the right to communicate with counsel, family or friends, and that reasonable\n means will be provided to enable him to do so.", "\n\n 4. ", "That the defendant has the right to a preliminary hearing and further, the defendant was furnished a\n copy of the charges against him and a preliminary hearing (was) (was not) waived, and that said\n defendant requested that bond be set.", "\n\f IT IS, THEREFORE, ORDERED AND ADJUDGED that the defendant on this day appeared in\n open court charged with STRONG ARMED ROBBERY and that the defendant be, and is hereby,\n remanded to the custody of the Sheriff of Forrest County, Mississippi, to await action of the Grand\n Jury (with bond) (without bond) upon said charge in the amount of $50,000.", "\n\n SO ORDERED AND ADJUDGED on this the 8 day of OCTOBER, A.D., 1993.", "\n\n¶19. ", "The first unnumbered paragraph of the order states that Beckum appeared in court represented by\nHonorable Jeff Bradley, Attorney of Record. ", "Paragraph 2 of the order indicates that the defendant \"is\nunrepresented.\" ", "These two apparently conflicting statements form the basis for the majority's consternation\nover whether Beckum had invoked his right to counsel.", "\n\n¶20. ", "Rule 6.03 of the Uniform Circuit and County Court Rules entitled INITIAL APPEARANCE provides\nas follows:\n\n Every person in custody shall be taken, without unnecessary delay and within 48 hours of arrest,\n before a judicial officer or other person authorized by statute for an initial appearance.", "\n\n Upon the defendant's initial appearance, the judicial officer or other person authorized by statute shall\n ascertain the defendant's true name and address, and amend the formal charge if necessary to reflect\n this information. ", "The defendant shall be informed of the charges against him/her and provided with a\n copy of the complaint. ", "If the arrest has been made without a warrant, the judicial officer shall\n determine whether there was probable cause for the arrest and note the probable cause determination\n for the record. ", "If there was no probable cause for the warrantless arrest, the defendant shall be\n released. ", "The judicial officer shall also advise the defendant of the following:\n\n 1. ", "That the defendant is not required to speak and that any statements made may be used against\n him/her;\n\n 2. ", "If the defendant is unrepresented, that the defendant has the right to assistance of an attorney,\n and that if the defendant is unable to afford an attorney, an attorney will be appointed to represent\n him/her; (emphasis added)\n\n 3. ", "That the defendant has the right to communicate with an attorney, family or friends, and that\n reasonable means will be provided to enable the defendant to do so;\n\n 4. ", "Conditions under which the defendant may obtain release, if any;\n\n 5. ", "That the defendant has the right to demand a preliminary hearing while the defendant remains in\n custody.", "\n\n¶21. ", "A careful reading of Rule 6.03 makes it amply clear that the magistrate, in entering the subject order,\nwas simply attempting to follow the requirements of the rule, and in the process apparently, in Paragraph 2,\nleft out the word \"if\" which should have been placed after the word \"that\" and before the word \"the\" so that\nParagraph 2 of the order would have read, \"That if the defendant is unrepresented, that he has the right of\ncounsel, and that if he is unable to afford counsel, an attorney will be appointed to represent him.\"", "\n\n¶22. ", "But the quest for the answer to the question of whether Beckum had invoked his right to counsel at the\n\ftime of the police-initiated interrogation does not end here. ", "Resort to Beckum's testimony during the Motion\nto Suppress makes clear what the magistrate's order leaves unclear. ", "At Record 2, page 18, we find the\nfollowing colloquy:\n\n DIRECT EXAMINATION BY MR. ", "HELFRICH:\n\n Q. State your full name, please.", "\n\n A. Marvin Lewis Beckum.", "\n\n Q. Marvin, I'm going to ask you to speak as loudly as I'm speaking to you so everybody can hear,\n and so Ms. Oswalt can take down a correct transcript of the proceedings. ", "Marvin, do you recall\n October 8th of 1993?", "\n\n A. Yes, sir, I do.", "\n\n Q. And did you go to first appearance on the morning of October 8, 1993?", "\n\n A. Yes, sir.", "\n\n Q. That would have been a Friday; is that correct?", "\n\n A. Yes, sir.", "\n\n Q. Were you appointed a lawyer on October 8, 1993?", "\n\n A. Well, when I went to first appearance, they appointed me Jeff Bradley.", "\n\n Q. So, Jeff Bradley was appointed to represent you.", "\n\n A. Yes, sir.", "\n\n Q. On that morning, and a bond was set; is that correct?", "\n\n A. Well, actually, they-the grand larceny, they gave me 5,000 for it, but Jeff Bradley said, about the\n strong arm robbery, they didn't set a bond right then because according to what I said to DeJarnett.", "\n\n Q. All right.", "\n\n A. They let me know then, you know.", "\n\n Q. So, you were appointed an attorney at 8:30 that morning or thereabouts on October 8th, 1993.", "\n\n A. Yes, sir.", "\n\n Q. And did you see Detective DeJarnett?", "\n\n A. After first appearance.", "\n\n Q. On that morning.", "\n\n A. After first appearance.", "\n\f Q. After first appearance.", "\n\n A. Yes, sir.", "\n\n Q. Where did you see Detective DeJarnett after first appearance?", "\n\n A. He had come talked to me. ", "He supposedly been getting me some clothes from my mom, and he\n said that my mom didn't want to come up here, which I knew that wasn't true; my mom will come\n anywhere I'm at. ", "And so, we were supposed to have been going to his office, you know, for my mom\n to come there. ", "And Jeff Bradley stopped him then and asked him, Where was he going with\n Marvin Beckum; was he going to question me, and he said, No. (", "emphasis added).", "\n\n Q. And so you went to DeJarnett's office.", "\n\n A. Yes, sir.", "\n\n¶23. ", "Thus, based on the above colloquy, it is clear that counsel had been appointed to represent Beckum in\nthis case prior to the police-initiated interrogation.", "\n\n¶24. ", "The remaining question then is whether Beckum had invoked his right to counsel. ", "It is obvious that the\nmagistrate had to find Beckum indigent in order to appoint counsel for him. ", "It is also obvious that in order to\nmake the determination whether Beckum was indigent, the magistrate had to ask Beckum whether Beckum\nwanted an attorney and whether he could afford to hire an attorney himself. ", "Indeed, one of the purposes of\nthe initial appearance is to ascertain whether an accused has an attorney, wants an attorney and can afford\nan attorney. ", "Once a magistrate determines that the accused has an attorney, the inquiry ends there\nconcerning the accused's right to counsel. ", "On the other hand, if the magistrate determines that the accused is\nwithout counsel but wants counsel to represent him, then inquiry must be made as to whether the accused\ncan afford counsel. ", "It is after an accused advises that he desires counsel but cannot afford counsel that one\nis appointed for him.", "\n\n¶25. ", "While it is true that the record does not contain a transcript of the proceedings during the initial\nappearance, it does make clear, as indicated above, that counsel was appointed for Beckum during the\ninitial appearance. ", "It is also clear from Beckum's testimony as set forth above that he accepted Bradley's\nrepresentation of him. ", "This is highlighted in the colloquy where Beckum and Bradley had a discussion\nregarding the bond which was set for Beckum. ", "It is further highlighted by the fact that the attorney, Jeff\nBradley, who had just been appointed to represent Beckum, stopped Detective DeJarnett immediately after\nthe initial appearance when DeJarnett was getting ready to question Beckum. ", "According to Beckum,\nBradley stopped \"him (Detective DeJarnett) then and asked him, where was he going with Marvin Beckum;\nwas he going to question me, and he said, no.\" ", "DeJarnett testified during the Motion to Suppress and did\nnot contradict Beckum's account of the conversation between Bradley and DeJarnett.", "\n\n¶26. ", "It is, therefore, clear to me that if the record is inconclusive as to whether Beckum requested the\nappointment of counsel, it is not inconclusive as to whether he accepted counsel.", "\n\n¶27. ", "Since I am convinced on this record that counsel had been appointed for Beckum and Beckum had\naccepted the appointment, the police-initiated interrogation of Beckum violated his right to counsel under\nthe Sixth Amendment and the prophylactic rule enunciated in Michigan v. Jackson, 475 U.S. 625, 625\n\f(1986).", "\n\n¶28. ", "For the reasons set forth herein, I would reverse and remand.", "\n\n KING, P.J., COLEMAN, AND DIAZ, JJ., ", "JOIN THIS SEPARATE WRITTEN OPINION.", "\n\n IRVING, J., DISSENTING TO DENIAL OF MOTION FOR REHEARING:\n\n¶29. ", "I dissented when this case was originally decided. ", "I write to expand upon that dissent in the wake of\nthe majority's decision to deny the motion for rehearing.", "\n\n¶30. ", "The right to counsel is fundamental to the administration of our system of justice, and any wilful\nviolation of this sacred right by law enforcement should not be tolerated by the judiciary. ", "In this case, I\nbelieve Beckum's rights in this regard were not inadvertently, but knowingly and blatantly, violated by the\ninvestigating officer.", "\n\n¶31. ", "On October 4, 1993, a man went to the home of eighty-two year old Mary Mathis in Hattiesburg. ", "The\nman had performed work for Mathis previously, but she did not know his name. ", "He choked her, robbed\nher of approximately one hundred dollars and stole her car. ", "The Hattiesburg Police Department developed\nBeckum as a suspect and arrested him on October 8, 1993. ", "Exactly how they identified him as a suspect is\nuncertain, because, in addition to not knowing her attacker's name, Mathis did not know where he lived or\nany other identifying characteristics. ", "Moreover, while her stolen car was recovered, Beckum's fingerprints\nwere not found on it. ", "Thus, the only evidence offered at trial was Beckum's confession, along with the\nelderly victim's identification of him.", "\n\n¶32. ", "Beckum asserts, on appeal, that his confession was taken in violation of his right to counsel provided\nby the Sixth Amendment to the United States Constitution. ", "On the day he was arrested, Beckum entered\nan initial appearance and was represented by Jeff Bradley, a public defender. ", "Bradley also represented\nBeckum in a second, unrelated charge. ", "After the initial appearance, Charles DeJarnett, a detective with the\nHattiesburg Police Department, removed Beckum from Beckum's jail cell and took him to DeJarnett's\noffice where Beckum gave the confession.", "\n\n¶33. ", "At the suppression hearing, Beckum testified that \"we [he and DeJarnett] were supposed to have been\ngoing to his office, you know, for my mom to come there. ", "And Jeff Bradley stopped him then and asked\nhim, where was he going with Marvin Beckum was he going to question me, and he said, 'No.'\" ", "No\nwitness, including DeJarnett, contradicted Beckum's testimony as to the exchange between Bradley and\nDeJarnett.", "\n\n¶34. ", "Once the right to counsel is asserted all interrogation must cease immediately and may only\nrecommence if initiated by the accused. ", "Minnick v. Mississippi, 498 U.S. 146, 150-51 (1990); Smith v.\nIllinois, 469 U.S. 91, 95 (1984); Edwards v. Arizona, 451 U.S. 477, 484-85 (1981); Duplantis v.\nState, 644 So. ", "2d 1235, 1242-43 (Miss. 1994); Balfour v. State, 598 So. ", "2d 1203, 1208 (Miss. 1991).", "\nFurther, any subsequent waiver of rights during a state initiated interrogation is ineffective. ", "Michigan v.\nJackson, 475 U.S. 625, 635 (1986); Wilcher v. State, 697 So. ", "2d 1087, 1096 (Miss. 1997). ", "Any\nstatement taken in a state initiated interrogation from an individual who has been formally charged is in\nviolation of the rights of an accused as secured by the Fifth and Sixth Amendments to the United States\nConstitution. ", "Minnick v. Mississippi, 498 U.S. at 150-51.(1)\n\f¶35. ", "The record before us indicates, on its face, that Beckum suffered an infringement to his rights under the\nSixth Amendment to the United States Constitution. ", "Where a defendant has accepted an attorney who has\nbeen appointed to represent him at the time of his initial appearance, no further interrogation may take place\nunless initiated in a separate transaction by the attorney or his client. ", "See Kirby v. Illinois, 406 U.S. 682,\n688 (1972); Cannaday v. Tate, 455 So. ", "2d 713, 722 (Miss. 1984).", "\n\n¶36. ", "It is clear that based on Beckum's uncontradicted testimony at the suppression hearing, he had\naccepted Bradley's representation. ", "I noted in my initial dissent that the majority's argument -- that there was\nno affirmative evidence that Beckum accepted the representation of Attorney Jeff Bradley -- is simply not\nborne out by the record in this case. ", "Obviously the majority either misinterprets, or discounts altogether,\nBeckum's statements at the suppression hearing when he was recounting the events following the\nappointment of counsel to represent him.", "\n\n¶37. ", "Beckum's testimony indicates that he and his court appointed attorney, Bradley, had a discussion,\nfollowing the appointment, about bond being set on the robbery charge. ", "This is what Beckum said: \"Jeff\nBradley said, about the strong arm robbery, they didn't set a bond right then.\" ", "Clearly, Bradley would\nnot be discussing the bond matter with Beckum had Beckum not accepted his representation of him on that\ncharge. ", "It is also clear that it was after the discussion between Bradley and Beckum that Bradley saw\nDeJarnett with Beckum and inquired if DeJarnett was going to interrogate Beckum. ", "Further, Bradley's\ninquiry to DeJarnett speaks affirmatively that Beckum had accepted Bradley's representation of him. ", "Why\nwould Bradley attempt to protect Beckum if Beckum had not accepted Bradley's representation? ", "What\nmessage did Bradley's question convey to DeJarnett? ", "Can it be legitimately argued that after Bradley's\ninquiry, DeJarnett was not on notice that Bradley was representing Beckum? ", "The answers to these\nrhetorical questions are obvious, and they do not portend well for the argument that Beckum had not\ninvoked his right to counsel or that the State was without knowledge of that invocation.", "\n\n¶38. ", "The State cannot derive any strength from the fact that Beckum said nothing when his counsel asked\nDeJarnett if DeJarnett was going to question him. ", "Beckum's non-reaction was consistent with what a\ndefendant does who is being represented by counsel. ", "What was Beckum to say? ", "Nothing. ", "Nothing, that is,\nunless he wanted to talk to DeJarnett notwithstanding the fact that his counsel did not want him to do so.", "\n\n¶39. ", "It should also be noted that Bradley was Beckum's court appointed counsel. ", "That fact alone argues in\nBeckum's favor as having invoked his right to counsel. ", "While counsel may be appointed to represent a\ndefendant against a defendant's wishes, nothing in this record indicates that was the case here. ", "In fact, the\nrecord indicates that an initial appearance was held, and as a result thereof, an order was entered\nappointing Bradley as counsel for Beckum. ", "As noted in my initial dissenting opinion, the record does not\ncontain a transcript of the initial appearance hearing; however, it is reasonable to conclude that the\nappointment of counsel occurred because Bradley was an indigent who asserted his right to counsel but\nwas unable to employ counsel. ", "I arrive at this conclusion because Miss. Code Ann. § ", "99-15-15 (Rev.\n1994) permits the appointment of counsel for indigents only upon the court or judge \"being satisfied that\nsuch person is an indigent person and is unable to employ counsel.\" ", "The process of determining a person's\nindigence necessarily involves an inquiry as to the desire for counsel and the financial ability to employ\ncounsel, along with the appropriate responses from the accused. ", "These responses would necessarily include\nan affirmation by the accused of a desire for counsel. ", "There is nothing in the record to suggest that the\nappointment here was made in violation of the aforementioned statute.", "\n\f¶40. ", "As stated, we do not have the benefit of the transcript of the initial appearance hearing, but we do have\nthe benefit of knowing something about Beckum's actions immediately following the initial appearance\nhearing during which counsel was appointed. ", "We know from Beckum's uncontradicted testimony at the\nsuppression hearing that he and his court appointed attorney talked after the initial appearance hearing and\nbefore DeJarnett's interrogation of him.", "\n\n¶41. \"", "For purposes of Jackson, an 'assertion' means some kind of positive statement or other action that\ninforms a reasonable person of the defendant's 'desire to deal with the police only through counsel.\"'", "\nMontoya v. Collins, 955 F. 2d 279, 283 (1992) (quoting Michigan v. Jackson, 475 U.S. 625, 626\n(1986)). ", "This \"does not require a defendant to utter the magic words, 'I want a lawyer,' in order to assert\nhis right to counsel.\" ", "Id. at 283. ", "Courts must give \"'a broad, rather than a narrow, interpretation to a\ndefendant's request for counsel.'\" ", "Id. at 283 (quoting Connecticut v. Barrett, 479 U.S. 523 (1987)).", "\nGiving a broad interpretation to the facts pointing to Beckum's assertion of the right to counsel compels the\ninescapable conclusion that he had in fact asserted that right prior to the police-initiated interrogation by\nDeJarnett.", "\n\n¶42. ", "Montoya recognizes the legitimacy of police-initiated interrogation after the attachment of the Sixth\nAmendment right to counsel but not after the accused's assertion of that right. ", "There is a major distinction\nbetween the two. ", "The right to counsel attaches at every critical stage of the criminal process. ", "An initial\nappearance is one such critical stage. ", "A defendant may waive that right. ", "However, it is clear that Beckum\ndid not waive that right at his initial appearance, and his actions following the initial appearance indicate both\nan assertion of his right to counsel and an acceptance of the appointment of counsel. ", "Once a defendant has\nasserted the right to counsel, Jackson prohibits any further police-initiated interrogation of the defendant.", "\nJackson, 475 U.S. at 636.", "\n\n¶43. ", "In Montoya, counsel was appointed as a result of the court's own volition. ", "At the magistrate's hearing,\nMontoya did not request an attorney and said nothing when one was appointed for him. ", "The magistrate\nstated that he decided to appoint counsel for represent Montoya because Montoya was charged with\ncapital murder, not because Montoya requested the assistance of counsel. ", "Id. at 282.", "\n\n¶44. ", "Montoya is without doubt distinguishable from our case. ", "The defendant in Montoya did not request\ncounsel, did not interact with counsel after counsel was appointed, and neither said nor did anything to\nindicate that he had accepted appointed counsel. ", "Thus, he was not shielded from a police initiated effort to\nobtain a statement. ", "That is not our case. ", "In our case, Beckum conferred with his court appointed attorney\nimmediately after the appointment. ", "He and his attorney discussed bond for Beckum on the underlying\ncharge. ", "The attorney made it known to the police that he was representing Beckum and, by his inquiry, in\neffect told the police not to question his client. ", "The police thwarted counsel's effort to further protect his\nclient by lying to counsel.", "\n\n¶45. ", "Our focus, for purpose of determining whether Beckum invoked or asserted his right to counsel,\nshould be aimed not at his actions during the encounter with DeJarrett but at the appointment stage and the\nperiod immediately following. ", "Viewing the matter from this perspective, it is exceedingly clear that Beckum\nhad asserted his right to counsel by accepting court appointed counsel. ", "It is true that Beckum could still talk\nwith the police after accepting counsel, but it is also true that the discussion could not be initiated by the\npolice as was done in the case here.", "\n\n¶46. ", "After Beckum had accepted the representation by Bradley, DeJarnett escorted Beckum from\n\fBeckum's cell for the purpose of interrogating Beckum. ", "While DeJarnette was in the process of escorting\nBeckum, Bradley, Beckum's court appointed attorney, asked DeJarnett his intentions relative to\ninterrogating Beckum. ", "The only action that DeJarnett could have taken that was consistent with Beckum's\nSixth Amendment rights was to discontinue any planned interrogation. ", "Instead, DeJarnett took Beckum to\nhis office where he obtained a confession outside of Bradley's knowledge or presence. ", "This police-initiated\ninterrogation of Beckum violated his right to counsel under the Sixth Amendment and the prophylactic rule\nenunciated in Michigan v. Jackson, 475 U.S. 625, 625 (1986). ", "The confession should have been\nsuppressed.", "\n\n¶47. ", "In concluding that Beckum's conviction should be reversed and remanded for a new trial because of\nthe violation of his right to counsel, I have considered the violation in the context of harmless error.", "\nHowever, due to the magnitude of the constitutional violation, the wilful nature of the violation, as well as the\nfact that the only other evidence against Beckum was the in-court identification of him by the aged victim, I\ndo not believe the violation ought to be treated as harmless error. ", "There was no corroborating evidence of\nthe in-court identification other than Beckum's confession. ", "While eyewitness identification is powerfully\npersuasive to a jury, we know in reality it is extremely unreliable evidence. ", "We only have to recall recent\ncases where defendants who were identified by victims \"with certainty\" were later exonerated by DNA\ntesting. ", "For these reasons, I would reverse and remand for a new trial. ", "In a case such as this -- where the\npolice officer is specifically asked by the accused's attorney if he is going to engage in interrogation of the\naccused and the police officer denies any intention of doing so, yet moves forthwith with his clandestine plan\nand does just that -- it is not too much of an imposition to punish that conduct by requiring a new trial.", "\n\n KING, P.J., AND PAYNE, J., JOIN THIS DISSENTING OPINION AS TO DENIAL OF\n MOTION FOR REHEARING. ", "MOORE AND MYERS, JJ., ", "NOT PARTICIPATING.", "\n\n 1. ", "The Fifth Amendment itself creates no specific right to counsel; rather, in order to safeguard an\n individual's right to not be compelled to testify against himself, the right to counsel attaches at any\n point, including before an individual is formally charged or arraigned, when he requests counsel in an\n interrogation. ", "Miranda v. Arizona, 384 U.S. 436, 467 (1966). ", "The Sixth Amendment right to\n counsel attaches only after the initiation of proceedings against an individual. ", "U.S. v. Gouveia, 467\n U.S. 180, 190 (1984). ", "The Sixth Amendment right to counsel attaches at the point in time of the initial\n appearance. ", "Morgan v. State, 681 So.2d 82, 90 (Miss.1996); McGilberry v. State, 741 So.2d\n 894, 904 (Miss. 1999).", "\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.0033003300330033004, 0.00535475234270415, 0.022727272727272728, 0, 0, 0, 0.015384615384615385, 0, 0, 0.006060606060606061, 0, 0.009174311926605505, 0, 0.006622516556291391, 0, 0.025, 0.004081632653061225, 0.004975124378109453, 0.011904761904761904, 0, 0.007575757575757576, 0.010810810810810811, 0.010752688172043012, 0.05714285714285714, 0, 0.0037593984962406013, 0.0136986301369863, 0, 0.005555555555555556, 0, 0, 0, 0.007168458781362007, 0, 0, 0, 0, 0.006944444444444444, 0.014084507042253521, 0, 0, 0.01818181818181818, 0.004366812227074236, 0, 0.005649717514124294, 0, 0, 0.03571428571428571, 0, 0.005319148936170213, 0, 0.017543859649122806, 0.01098901098901099, 0, 0.012345679012345678, 0, 0, 0.0031545741324921135, 0.16666666666666666, 0.0031645569620253164, 0.00398406374501992, 0, 0.041666666666666664, 0, 0.00847457627118644, 0, 0.012048192771084338, 0, 0, 0, 0.0024509803921568627, 0, 0.011627906976744186, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0, 0, 0.0064516129032258064, 0, 0, 0.010416666666666666, 0, 0.09090909090909091, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.05555555555555555, 0, 0.010752688172043012, 0, 0, 0.038461538461538464, 0, 0, 0.0070921985815602835, 0.0036363636363636364, 0, 0.005263157894736842, 0, 0, 0.01098901098901099, 0, 0.005494505494505495, 0, 0.006535947712418301, 0.05555555555555555, 0, 0, 0, 0, 0.004132231404958678, 0, 0.0048543689320388345, 0, 0, 0, 0.038461538461538464, 0, 0, 0.014492753623188406, 0, 0, 0, 0, 0, 0, 0.04, 0, 0, 0.0035842293906810036, 0.004166666666666667, 0.005813953488372093, 0, 0, 0.010638297872340425, 0, 0.047619047619047616, 0, 0.04081632653061224, 0, 0.004149377593360996, 0, 0.013888888888888888, 0, 0, 0.0036231884057971015, 0.0056179775280898875, 0, 0.00949367088607595, 0.020689655172413793, 0, 0, 0, 0, 0, 0, 0, 0.0027397260273972603, 0, 0, 0.014285714285714285, 0, 0.006896551724137931, 0, 0.006600660066006601, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006024096385542169, 0.017391304347826087, 0, 0, 0.03333333333333333, 0.01098901098901099, 0, 0, 0, 0, 0, 0, 0, 0.0125, 0.017241379310344827, 0, 0, 0.009302325581395349, 0, 0, 0, 0, 0.021739130434782608, 0, 0, 0, 0, 0, 0.013888888888888888, 0, 0, 0, 0.014184397163120567, 0, 0.02040816326530612, 0, 0, 0.00641025641025641, 0, 0.0125, 0, 0.0047169811320754715, 0, 0, 0, 0, 0, 0, 0.00909090909090909, 0.016260162601626018, 0.02066115702479339, 0.011764705882352941, 0.02857142857142857, 0, 0, 0, 0.003246753246753247, 0, 0, 0.023255813953488372, 0, 0, 0, 0, 0, 0, 0, 0, 0.010638297872340425, 0, 0, 0.009900990099009901, 0, 0.011111111111111112, 0.008333333333333333, 0, 0, 0.01652892561983471, 0.015873015873015872, 0.014423076923076924, 0, 0.006369426751592357, 0.014705882352941176, 0.02631578947368421, 0, 0, 0.017341040462427744, 0, 0, 0, 0, 0, 0, 0.018867924528301886, 0, 0, 0.02666666666666667, 0, 0, 0.015384615384615385, 0.004524886877828055, 0, 0, 0.005917159763313609, 0.008928571428571428, 0.007407407407407408, 0.017142857142857144, 0.01680672268907563, 0.020618556701030927, 0.03508771929824561, 0.023809523809523808, 0.004784688995215311, 0, 0.020134228187919462, 0, 0.041666666666666664, 0, 0, 0, 0.013333333333333334, 0, 0, 0.0064516129032258064, 0.003355704697986577, 0, 0, 0, 0, 0, 0, 0.00398406374501992, 0.0049261083743842365, 0, 0, 0.019230769230769232, 0, 0, 0, 0.015384615384615385, 0, 0, 0, 0, 0, 0, 0, 0, 0.007692307692307693, 0.038461538461538464, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004291845493562232, 0, 0, 0, 0.020833333333333332, 0.018072289156626505, 0.006622516556291391, 0.016666666666666666, 0, 0, 0, 0.0049504950495049506, 0, 0.010101010101010102, 0, 0, 0, 0, 0.027777777777777776, 0.045454545454545456, 0, 0, 0, 0.043478260869565216, 0, 0.02040816326530612, 0, 0.02830188679245283, 0 ]
0.006029
5
[ "The burden of occupational injury: a 1-year prospective study in Xuan Tien Commune, Viet Nam.", "\nDeveloping nations carry a substantial portion of the global burden of injury, but without reliable injury surveillance, there is no way to characterize or prioritize the causes of work-related injury for prevention. ", "Injury data from 52 treatment sites in the Xuan Tien Commune, Vietnam with over 10,000 inhabitants were collected between January 1 and December 31, 2006. ", "Injured residents were interviewed to determine work-relatedness, relevant causes, disability, and burden. ", "Five hundred four work-related injuries were reported from formal treatment sites (incidence rate of 87 per 1,000 FTE) with a mean lost work day of 11 days. ", "Four thousand five hundred seventy-four lost work day equivalents were estimated based on actual days lost to recover plus work days lost earning income to pay for medical costs, accumulating a total direct burden to the community of 8,641 lost work day equivalents. ", "Almost half of that burden was caused by work in manufacturing. ", "First aid boxes placed in 40 manufacturing enterprises yielded the 2nd highest reporting source. ", "This study demonstrated the feasibility and value at the local level to build an active injury surveillance system which could have a large impact on preventing the burden of injuries in workplaces in Vietnam." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.010752688172043012, 0, 0, 0, 0.006369426751592357, 0, 0, 0, 0 ]
0.001902
5
[ "Ever heard of the Darknet? ", "The new digital Wild West, whose mere name is so packed with mystery that it must be something weird and dangerous beyond human understanding? ", "Well, I’ve been researching it for several years and the mystery has pretty much dissolved. ", "What’s left is the excitement of this virtual, ever changing, ever pulsating world.", "\n\nThe Darknet is sometimes perceived as an out of control and dangerous misuse of unbreakable encryption that leaves the police helpless to solve crimes. ", "Based on powerful tools like the anonymous Tor Browser and Bitcoin, the Darknet is often described as the ”dark underbelly of the Internet”. ", "News anchors refer to spaces created with Darknet technology as a sickening dens of criminals, terrorists and perverts.", "\n\nMy view was similar when I started my own research of the Darknet. ", "But labelling the Darknet only as the new criminal underworld just does not make sense. ", "It’s so much more. ", "Let’s have a look.", "\n\n\n\n\n\nSanctuary in an age of rampant violation of privacy\n\nDid you just now take a break to snicker about what kind of “research” I’ve been doing on the Darknet? ", "Well, you might be interested to learn that I’ve only learned to highly respect the fundamental value of the Darknet: privacy.", "\n\nTaking into account that privacy is an indispensable human right and how much the Internet is being monitored now, the Darknet isn’t really much different than a “do not disturb” sign. ", "Or using curtains in your bedroom. ", "These are seen as perfectly normal things to do. ", "It’s also not unheard-of for individuals and companies, like Ink Tank Media, to contribute to the Tor network by hosting relay servers, which route anonymized traffic around the world in layers of encryption.", "\n\nWe can in fact observe this in spiked interest in the Darknet and cryptocurrencies following the Edward Snowden revelations in 2013. ", "The most massive spike is believed to be caused by bots, but the interest has grown and persisted. ", "This is also implied by Google’s search trend data.", "\n\nMany legislators however seem not to have understood the implications of Snowden’s revelations. ", "You can still hear arguments like how people with nothing to hide shouldn’t care about privacy. ", "I strongly believe that everyone should care, for several reasons.", "\n\nOpposing surveillance is not paranoia\n\nCardinal Richelieu wrote in the 17th century: “If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.” ", "But we’re far beyond sampling “six lines” now. ", "Pretty much everything you do on the Internet is tracked and stored, presumably forever.", "\n\nAsk yourself how you’d feel if the numerous Western intelligence agencies that try to monitor all internet traffic started to behave like the KGB/FSB or Stasi? ", "To what extent are they doing that already?", "\n\nThis may sound a far-fetched, if you live in a safe Western democracy. ", "But regardless of how much you want to think about possible Machiavellian tendencies in current affairs, it’s undeniably true that politics can change radically given time.", "\n\nConsider that former NSA analyst and whistleblower Russel Tice claims his employer subjected then senator Obama and other leading US politicians to secret surveillance in the early 2000s. ", "How does this fit into your model of democracy?", "\n\nIn non-democratic countries, privacy tools are already a matter of life and death to countless people every day. ", "And worryingly, even some Westerners now depend on the Darknet. ", "In fact, filmmaker Laura Poitras who made the Oscar winning Edward Snowden documentary “Citizenfour” is about to release a book on the surveillance and harassment she’s now subjected to. ", "Tor is the only way she feels she can use the Internet.", "\n\nSo, privacy is important for practical reasons, but also as an ideal. ", "It’s important because of the simple reason that humans need the luxury of private space where we can be ourselves.", "\n\nAn accelerator for criminal activity, but not the root cause of it\n\nLike everything, privacy comes at a price. ", "Threats facing civilized societies are asymmetric in proportion to what law enforcement can do in a democracy. ", "There’s only so much one can do about that without losing freedom.", "\n\nPrivacy and anonymity, and the technology providing them, do indeed facilitate crimes, even very serious ones. ", "The Darknet houses marketplaces for stolen credit cards, cybercrime services and human beings. ", "It’s a convenient place for sick and sadistic people to meet and plan things too painful to even think about.", "\n\nBut just like cars aren’t the cause of bank robberies, the Darknet isn’t the reason these crimes occur. ", "Wherever there are deep shadows, there are also creatures who feel comfortable in the dark. ", "Humans have done horrible things to each other long before the Darknet, but many of them have found a home in it because of the anonymity it provides.", "\n\nIt would be foolish, however, to deny the role the Darknet has in the crimes taking place through it. ", "Therefore, the Darknet also needs policing. ", "It’s a good thing that law enforcement is doing their best to protect public safety in the darkest corners of the Internet.", "\n\nHowever, police work shouldn’t include universal breaking of privacy enhancing structures, especially in the case of non-violent crime. ", "Many good people depend on these structures – and as we’ve established, counter-measures may end up in wrong hands.", "\n\nThere’s no proof that limiting privacy leads to increased security. ", "Intelligence agencies already collect a lot of information about individuals. ", "Their main problem is not the lack of data but the capability to make sense of it. ", "For instance, Turkey warned France twice about one of the Paris attackers, but never got any response. ", "The signal was lost in the noise.", "\n\nVirtual communities and cultures fostering technical innovation\n\nThe Darknet fosters many communities of dedicated, creative people. ", "And masses of regular jerks as well.", "\n\nIt’s not unfair to call the cryptomarkets, that is, the anonymous markets operating inside the Darknet, masterpieces of criminal innovation. ", "Especially ingenious is the fact that you can openly sell illegal products without the law enforcement being able to directly crack down on it.", "\n\nAs of now, crime on the Darknet is facing serious challenges, including some erosion of the strictest privacy provided by the Tor network, as state actors discover measures for de-anonymizing very high value targets. ", "Further complicating matters, the Bitcoin community displays wilful inability to solve problems with network’s capacity for handling increased transaction volume.", "\n\nMoreover, it seems a bit like the innovation that has been characteristic of the cryptomarkets has dried up, at least temporarily. ", "Even though the trade in the cryptomarkets have grown, the marketplace aspect of the Darknet has to reinvent itself retain its vitality and avoid a decline.", "\n\nSome interesting things are in the pipeline though. ", "To name one, OpenBazaar is a decentralised market model that is going to be released in the near future. ", "Learning curves aside, it could become another example of free market ideology spawning innovation.", "\n\nYou can add to the privacy capacity of the Darknet\n\nDarknet marketplaces and cryptocurrencies go through their own cycles of booms and busts. ", "And cracks in the façade of cryptographic protocols never get smaller, but bigger over time. ", "In fact, in the case of Tor, strong anonymity protection relies on not disclosing information, only using public Wi-Fi and using secured laptops running the Tails operating system.", "\n\nWhat then can casual users contribute or get from tools like the Tor network? ", "Isn’t casual Tor surfing equal to stealing capacity from people who need it the most?", "\n\nWell, the Tor network would benefit greatly in both performance and anonymity by getting new relays, especially “bridges” for people on heavily censored connections.", "\n\n\n\n\n\nBut in a small way, Tor also relies on everyone to help Chinese dissidents, whistleblowers and LGBT activists become needles in a haystack. ", "While your everyday browser will uniquely identify you, Tor Browser is carefully tweaked to always look the same. ", "This is why you can be a helpful part of an ever growing haystack by downloading the Tor Browser today, if only to read your morning news or to browse your daily dose of cat pics. ", "You’re safe if you don’t send personal data and make sure to always install browser updates!", "\n\nEventually, you might find yourself using the Tor Browser to protect your own privacy: It’s a very good idea to use Tor for health related searches. ", "Since anyone might be buying personally identifiable information from Western data brokers and ad networks, Tor could even end up keeping your insurance premiums down.", "\n\nThis is the complex, puzzling beauty of the Darknet: every normal, law-abiding user makes the network stronger and more helpful for those in need. ", "The issues are complicated, but there are many reasons to feel good about supporting and using the Darknet.", "\n\nAntti Järventaus is a freelance researcher and an expert in communications and social ethics. ", "His interests include themes like corporate social responsibility, trend research in the Darknet and exploring the human mind. ", "He has worked with a number of global brands such as Nokia, Cirque du Soleil, Deloitte and Rovio Entertainment." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0, 0, 0, 0.014184397163120567, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009615384615384616, 0, 0, 0.0196078431372549, 0.01020408163265306, 0, 0, 0, 0, 0, 0.006172839506172839, 0, 0, 0, 0.015789473684210527, 0, 0, 0, 0.016042780748663103, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.022727272727272728, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0045662100456621, 0.006172839506172839, 0, 0, 0, 0.009523809523809525, 0, 0, 0, 0.005555555555555556, 0.0125, 0, 0.005988023952095809, 0.00684931506849315, 0.008771929824561403, 0, 0, 0, 0.005988023952095809, 0, 0, 0, 0, 0.036036036036036036 ]
0.002545
5
[ "Inappropriate prescribing in older fallers presenting to an Irish emergency department.", "\ncertain medications increase falls risk in older people. ", "to assess if prescribing modification occurs in older falls presenting to an emergency department (ED). ", "before-and-after design: presentation to ED with a fall as the index event. ", "over 70's who presented to ED with a fall over a 4-year period. ", "dispensed medication in the 12 months pre- and post-fall was identified using a primary care reimbursement services pharmacy claims database. ", "Screening Tool of Older Person's PIP (STOPP) and Beers prescribing criteria were applied to identify potentially inappropriate prescribing (PIP). ", "Polypharmacy was defined as four or more regular medicines. ", "Psychotropic medication was identified using the WHO Anatomical Therapeutic Chemical classification system. ", "Changes in prescribing were compared using McNemar's test (significance P < 0.05). ", "One thousand sixteen patients were eligible for analysis; 53.1% had at least one STOPP criteria pre-fall with no change post-fall (53.7%, P = 0.64). ", "Beers criteria were identified in 44.0% pre-fall, with no change post-fall (41.5%, P = 0.125). ", "The most significant individual indicators to change were neuroleptics, which decreased from 17.5 to 14.7% (P = 0.02) and long-acting benzodiazepines decreased from 10.7 to 8.6% (P = 0.005). ", "Polypharmacy was observed in 63% and was strongly predictive of PIP, OR 4.0 (95% CI 3.0, 5.32). ", "A high prevalence of psychotropic medication was identified pre-fall: anxiolytics (15.7%), antidepressants (26%), hypnosedatives (30%). ", "New initiation of anxiolytics and hypnosedatives occurred in 9-15%, respectively, post-fall. ", "a significant prevalence of PIP was observed in older fallers presenting to the ED. ", "No substantial improvements in PIP occurred in the 12 months post-fall, suggesting the need for focused intervention studies to be undertaken in this area." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0.009615384615384616, 0.013157894736842105, 0.015625, 0, 0, 0.016666666666666666, 0, 0.012048192771084338, 0.006711409395973154, 0, 0, 0.020833333333333332, 0, 0, 0.011904761904761904, 0 ]
0.00592
5
[ "There is an opportunity for independent, consistent housing advice services, for all tenures and needs, to be available across all four nations in the United Kingdom.", "\n\nAdvice through the services would address housing costs, the complexity of the benefits system, and the unresponsiveness of the current housing system.", "\n\nSet-up costs of the services should be funded by national governments, with running costs split between the government, local authorities and charitable or grant funding.", "\n\nThis is one of four summaries based on a piece of policy development work called Housing and life experiences: policy development. ", "This was commissioned to explore an initial report called Housing and life experiences: making a home on a low income. ", "The reports and summaries are available to download in the related content section below.", "\n\nDownloads\n\nDownloads\n\nRelated content\n\nHousing and life experiences: making a home on a low income\n\n30th Apr 2018\n\nThis report provides a detailed analysis of the interaction between poverty and housing across the lifecourse. ", "It shows how good and stable housing can mitigate poverty, and the difficulties in trying to make and sustain a home in an increasingly expensive and constrained housing system." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0.007518796992481203, 0.008403361344537815, 0, 0, 0 ]
0.00199
5
[ "\n164 Ga. App. ", "195 (1982)\n296 S.E.2d 772\nAYERS\nv.\nTHE STATE.", "\n64711.", "\nCourt of Appeals of Georgia.", "\nDecided October 29, 1982.", "\nRonald S. Iddins, Floyd W. Keeble, Jr., for appellant.", "\nJ. Cleve Miller, District Attorney, Francis J. George, Assistant *198 District Attorney, for appellee.", "\nMcMURRAY, Presiding Judge.", "\nDefendant was convicted of the offense of theft by receiving stolen property, a felony, that is, receiving one diamond ring, property of the estate of a person now deceased, having a value of more than $200, \"knowing or should have known that said property was stolen, said property not having been received with intent to restore it to the owner.\" ", "Defendant appeals. ", "Held:\n1. ", "One of the state witnesses testified that the ring which was the property of his grandmother, now deceased, had been given to his mother for safekeeping by the grandmother during her last illness when she went to the hospital. ", "The ring was missing. ", "This witness also testified from his knowledge of purchasing a diamond ring for his wife that in comparing that jewelry with rings of equal size with that belonging to his grandmother, of equal clarity and equal value, it was his opinion that he would place the value of his grandmother's ring at *196 \"five thousand dollars.\" ", "The state then offered evidence from the principal thief that he had stolen two rings from the home of the first witness' mother and had intended to pawn it but \"sold\" it to the defendant, a pawnshop operator, \"for $28.\" ", "One ring was recovered but not the grandmother's ring. ", "The totality of the evidence, including the admission of the defendant, is that the grandmother's ring was either \"pawned\" or \"sold\" to him by the principal thief although the amount of money involved in that transaction is somewhat in conflict and also as to whether the ring was \"pawned\" or \"sold.\" ", "The defendant also admitted that he had received information from the grandson to be on the lookout for the missing ring. ", "The defendant also admitted that he had sold the \"pawned\" ring along with another although he was not sure of the amount received as it was sold for either $400 for one ring and $250 for the other.", "\nWhile the state did not prove the administration of the estate of the deceased owner it cannot be said that it failed to establish ownership of the alleged stolen property. ", "Further, the issue was theft by receiving stolen property, and the defendant should have known that the property was stolen, there being testimony that the ring was missing and the principal thief having testified that he stole it and either \"pawned\" or \"sold\" it to the defendant who had been advised that a ring of a certain description had been stolen shortly before it was pawned or sold to him. ", "The jury here had for determination whether the defendant's explanation surrounding the circumstances of his possession of the ring was adequate or inadequate in that he received it and disposed of it knowing or should have known that it was stolen and the property was not received, disposed of or retained with any intent to restore it to the owner. ", "See Code Ann. § ", "26-1806 (Ga. L. 1968, pp. ", "1249, 1292; 1969, pp. ", "857, 859, now Official Code of Georgia Annotated, § 16-8-7). ", "The evidence also established a disproportionate price between the amount paid for the \"pawned\" or \"sold\" ring and what the defendant received for it when he sold it. ", "The evidence was adequate to sustain defendant's conviction of theft by receiving stolen property. ", "Borgh v. State, 146 Ga. App. ", "649, 650 (1) (247 SE2d 137); Callahan v. State, 148 Ga. App. ", "555, 556-557 (4) (251 SE2d 790); Barfield v. State, 149 Ga. App. ", "166 (3) (253 SE2d 781). ", "Further, the evidence here was ample to establish the ownership of the stolen property even though the state failed to establish that the decedent's estate was being administered. ", "There is no merit in the first two enumerations of error.", "\n2. ", "The state established by competent evidence the value of the stolen ring, the jury having sufficient expert opinion testimony with reference thereto to determine from its own experience the valuation *197 thereof. ", "See Jones v. State, 139 Ga. App. ", "366, 367 (4) (228 SE2d 387). ", "From the evidence the jury properly concluded the diamond ring had a value in excess of $200 so as to make the crime a felony, rather than a misdemeanor under Code Ann. § ", "26-1812 (a) (Ga. L. 1968, pp. ", "1249, 1295; 1972, pp. ", "841, 842; 1978, pp. ", "1457, 1458; 1981, pp. ", "1552, 1553; 1981, p. 1576, now Official Code of Georgia Annotated, § 16-8-12, as amended by Ga. L. 1982, p. 1371, § 2). ", "While value was not an element of the crime it was relevant for the purpose of distinguishing between a misdemeanor and a felony. ", "Stancell v. State, 146 Ga. App. ", "773 (2) (247 SE2d 587).", "\n3. ", "The next enumeration of error is one in which the defendant contends that the state failed to show the defendant received the stolen item with knowledge of the theft of the item. ", "The state offered the testimony of the principal thief, 18 years of age, that he had \"sold\" the ring to the defendant for a very small amount of money ($28). ", "The defendant admits he had sold the \"pawned\" ring for considerably more money than he had paid for it or loaned out in pawn and prior to the time he \"purchased\" the ring the grandson had called him about one ring but he could not now recall the exact description as given to him. ", "His records also show an entry reflecting that the thief \"pawned\" the ring for considerably more money than that which the thief contends he received. ", "The circumstances, the time, and all the transactions before and afterwards, including conduct and behavior, as well as the character and kind of property show guilty knowledge. ", "Birdsong v. State, 120 Ga. 850 (3), 853 (48 SE 329); Saunders v. State, 145 Ga. App. ", "248, 249-250 (1) (243 SE2d 668). ", "There is no merit in the complaint that the state failed to show the defendant received the stolen item with knowledge of the theft of the item.", "\n4. ", "In the remaining enumeration of error the defendant contends that the state failed to recover the stolen property in order that the stolen ring and the ring received by the defendant could be shown to be the same item. ", "We find no merit in this complaint since the ring was shown by the circumstantial evidence to be the same, and the defendant had sold it. ", "The state is not required to recover the stolen property before bringing the criminal action. ", "We find no merit in this complaint.", "\nJudgment affirmed. ", "Banke and Birdsong, JJ., ", "concur.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0, 0, 0, 0, 0.05454545454545454, 0.019417475728155338, 0.07407407407407407, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01639344262295082, 0, 0, 0, 0.03278688524590164, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.03333333333333333, 0, 0, 0, 0.016666666666666666, 0, 0.03125, 0, 0, 0, 0, 0, 0, 0, 0.023529411764705882, 0, 0, 0, 0, 0, 0, 0, 0, 0.04, 0, 0 ]
0.005261
5
[ "Ved at gå 10 år tilbage i tiden til Jonas' tidlige år som catfish dukker en ny række spor op. ", "En hemmelig kilde hævder at kende navnet på indehaveren af de telefonnumre, som Jonas har brugt til at skrive med pigerne. ", "Og det navn går igen i flere af de historier, der er kommet frem om Jonas' aktiviteter. ", "Men vil det lykkes at få denne person i tale? ", "Er der en forbindelse mellem denne person og Jonas? ", "Og ud af det blå dukker en ny pige op, som har informationer om Jonas, der giver historien i en uventet drejning. ", "Udløber: 19. ", "aug 2021" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.010638297872340425, 0, 0.022727272727272728, 0, 0.019230769230769232, 0.017543859649122806, 0, 0 ]
0.008768
5
[ "When the LIBOR interest-rate fixing scandal broke wide open over the summer, I asked whether it was “The Crime of the Century.", "”The answer to that question relied on whether banks were understating their LIBOR submissions in order to appear stable at the height of the financial crisis, or whether LIBOR manipulation was a more widespread phenomenon involving collusion across financial institutions in order to profit off of derivative trades.", "\n\nWith the announcement yesterday of a $1.5 billion dollar fine, paid to regulators in the U.S., U.K., and Switzerland, against Swiss bank UBS., ", "we have our answer. ", "The British Financial Services Authority published a 40-page notice announcing the action, and it is rife with damning evidence that UBS employees were colluding among themselves and with traders and brokers at other institutions to manipulate interest rates for their own profit. ", "The FSA found that compared to Barclays, the transgressions at UBS were worse:\n\n“UBS’s misconduct is, although similar in nature, considerably more serious than Barclays’ because it was more widespread within the firm . . . ", "More individuals, including Managers and Senior Managers, participated in or knew about the manipulation and there were more instances of individual manipulation, across more currencies. ", "Furthermore, the extent to which UBS colluded with others was significantly greater and involved financial rewards being paid to Broker Firms.”", "\n\nThe FSA’s most damning evidence against the bank is a series of electronic messages sent between bank employees and traders and brokers outside the firm, in which fraud is overtly agreed upon. ", "In one exchange, a UBS trader begs an outside broker to help him influence a particular Japanese Yen LIBOR rate. ", "According to the FSA notice:\n\n“In the course of one campaign of manipulation, a UBS Trader agreed with his counterpart that he would attempt to manipulate UBS’s submissions in “small drops” in order to avoid arousing suspicion. ", "The Trader made it clear that he hoped to profit from the manipulation and referred explicitly to his UBS trading positions and the impact of the JPY LIBOR rate on those positions. ", "He offered to “return the favour” and entered into facilitation trades and other illicit transactions in order to incentivise and reward his counterparts.”", "\n\nThe notice goes on to quote an exchange between the trader and broker in which the trader explains, “if you keep 6s [i.e. the six month JPY LIBOR rate] unchanged today … I will f—ing do one humongous deal with you … Like a 50,000 buck deal, whatever … I need you to keep it as low as possible … if you do that …. ", "I’ll pay you, you know, 50,000 dollars, 100,000 dollars… whatever you want … I’m a man of my word.” ", "Subsequent trades between UBS and this broker generated more than $250,000 in fees to the broker, according to the FSA notice.", "\n\nThe forty page report is filled with such exchanges, making it clear that these practices were widespread at the firm, directly involving 45 employees, 11 of whom were managers. “", "At least two further Managers and five Senior Managers were also aware of the practice of the manipulation of submissions to benefit trading positions,” the report said.", "\n\nBut there is a silver lining in all of this corruption, in that these transgressions are so egregious that financial regulators have been forced to take the issue very seriously. ", "The $1.5 billion fine is a big number, more than a third of UBS’s 2011 profit. ", "But the more important development is that regulators are pursuing criminal proceedings against the bank and its employees. ", "U.K. authorities have already made several arrests in relation to the case, and U.S. authorities may follow suit. ", "In addition, the U.S. Justice Department got a Japanese subsidiary of UBS to plead guilty to wire fraud. ", "It has been rare for regulators anywhere to criminally prosecute banks, as they fear such actions could harm stability in the financial system. ", "Perhaps the action against UBS is the first crack in this dangerous point of view. ", "As an op-ed in Bloomberg News argued yesterday:\n\n“Criminal indictments, though, would do more to change the culture among the individuals who performed, aided and abetted deceitful acts, and to restore faith in markets. ", "Authorities should also force banks to divulge information on their true borrowing costs over the period in question, so the financial effect of their transgressions — and the required compensation to investors — can be calculated.”", "\n\nFor the global financial industry, this ruling is just the beginning. ", "Several other large banks should still expect enforcement actions brought against them, and any bank involved in the scandal should expect to be fighting lawsuits involving LIBOR for years to come. ", "On October 15, The Financial Times reported on a lawsuit brought against 12 of the world’s largest banks by five Alabama homeowners, which alleges that rate manipulation increased the interest they had to pay on their mortgages by thousands of dollars. ", "Given how widely used LIBOR is to price financial instruments, homeowners are just one group that could have potentially lost money due to rate manipulation. ", "In light of these suits and regulatory actions still to come, expect the financial crime of the century to be with us for years to come." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.006896551724137931, 0, 0.0071174377224199285, 0.017857142857142856, 0, 0.006993006993006993, 0.005128205128205128, 0.017699115044247787, 0.013157894736842105, 0.011049723756906077, 0, 0, 0, 0.015873015873015872, 0, 0, 0, 0.012658227848101266, 0, 0, 0.01904761904761905, 0, 0.012048192771084338, 0.004545454545454545, 0, 0, 0, 0.003952569169960474, 0, 0 ]
0.004813
5
[ "Freeman Cruisers\n\nFreeman Cruisers™ was a British manufacturer of cabin cruisers that was active between the years of 1957 and 1983. ", "It took its name from its founder, John Freeman. ", "Freeman had been previously manufacturing caravans and towing trailers before Second World War broke out, but production ceased due to the war. ", "In 1983, the assets of the company were sold to Sheridan Marine, which still produces spare parts and sells used boats from their boatyard in Moulsford, Oxfordshire. ", "Over 28 models of boat were produced by the company, and they are frequently seen on the navigable waterways of the UK. ", "In addition, Freeman Cruisers are easily able to go to sea, with a few slight modifications to their plumbing and flushing systems. ", "\n\nThe boats were constructed from high-quality materials including a fiberglass outer shell with gelcoat, and mahogany interior partitions. ", "Some models were also equipped with flushing toilets and aft cabins.", "\n\nThe first Freeman model to be produced was the 22 Mk. ", "1. ", "Most of the original series of models are modeled after the 22 Mk. ", "2, which has a distinctive step on its side decks.", "\n\nBoat Nomenclature \nGenerally, the boat's model number corresponds to the boat's completed length in feet. ", "A Freeman 23 is 23 feet long, for example. ", "However, for a full list of models available, including their variations, visit the official Freeman Cruiser website.", "\n\nReferences \n\nCategory:British boat builders\nCategory:Defunct companies of the United Kingdom\nCategory:Vehicle manufacturing companies established in 1957\nCategory:Manufacturing companies disestablished in 1983\nCategory:1957 establishments in the United Kingdom\nCategory:1983 disestablishments in the United Kingdom" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.007518796992481203, 0.02040816326530612, 0.006944444444444444, 0.006024096385542169, 0, 0.007575757575757576, 0, 0, 0, 0, 0, 0, 0, 0, 0.008547008547008548, 0 ]
0.003564
5
[ "Background {#Sec1}\n==========\n\nWe previously introduced the Residual Variation Intolerance Score (RVIS) \\[[@CR1]\\], a framework that ranks protein-coding genes based on their intolerance to functional variation, by comparing the overall number of observed variants in a gene to the observed common functional variants. ", "The basic idea behind this approach is the same as that behind approaches using phylogenetic conservation that rank genes by the degree to which they are evolutionarily conserved, except using standing human genetic variation to identify genes in which functional variation is strongly selected against and thus likely to be deleterious. ", "This approach proved successful in prioritizing genes most likely to result in Mendelian disease \\[[@CR1]\\]. ", "Using the gene as the unit of analysis however fails to represent the reality that pathogenic mutations can often cluster in particular parts of genes.", "Table 1AIC comparisons of different sets of predictorsPredictor subset 1 (AIC)Predictor subset 2 (AIC)Minimal AIC*P*Base (20390.414)subRVIS (20373.159)subRVIS0.0002Base (20390.414)subGERP (20370.726)subGERP5.3 × 10^--5^subGERP (20370.726)subRVIS (20373.159)subGERP0.296subGERP (20370.726)subRVIS + subGERP (20359.652)subRVIS + subGERP0.004subRVIS (20373.159)subRVIS + subGERP (20359.652)subRVIS + subGERP0.001This table contains the AIC comparisons between different sets of predictors. ", "All models contain the mutation rate as a covariate ([Methods](#Sec10){ref-type=\"sec\"}). ", "Entries labeled 'base' indicate models using only the mutation rate and no other predictors. *", "P* is the probability that the model with the larger AIC minimizes the information loss from the model with the lower AIC\n\nWhile there are many approaches that assess various characteristics of variants \\[[@CR2]--[@CR4]\\] which can in turn be used to try and determine whether or not a variant is likely to be pathogenic, current approaches to the problem of localizing pathogenic variants within sub-regions of a gene rely heavily on conservation to define important boundaries. ", "The thought behind this is that more conserved regions within a gene are more likely to contain pathogenic variants. ", "Another option to define genic sub regions is to utilize the functional information about the corresponding protein from databases of manually annotated proteins, such as Swiss-Prot \\[[@CR5]\\]. ", "In fact, some variant level predictors, such as MutationTaster \\[[@CR2]\\], take these data into account when they are available. ", "However, while ideally an approach that focused on parts of proteins would use divisions that correspond to functionally distinct parts of proteins, this information is not yet comprehensively available.", "\n\nHere, we take a first step at an approach to divide the gene into sub-regions and rank the resulting sub-regions by their intolerance to functional variation. ", "We use two divisions as surrogates for functionally distinct parts of the protein. ", "The first is a division into protein domains, defined by sequence homology to known conserved domains. ", "The second is a division into exons, reflecting that a gene can encode different isoforms of the protein using different exonic configurations.", "\n\nFor the protein domain division, we annotate each gene's protein domains based on the Conserved Domain Database (CDD) \\[[@CR6]\\], a collection of conserved domain sequences. ", "The coding region of each gene was aligned to the CDD. ", "The final domain coordinates for each gene were defined as the regions within the gene that aligned to the CDD and the unaligned regions between each CDD alignment.", "\n\nFollowing this, we sought to create a ranking of the resulting sub-regions that would reflect their intolerance to functional variation. ", "One common approach to this is to rank stretches of sequence by their phylogenetic conservation \\[[@CR7]\\]. ", "However, relying on conservation alone can fail to capture human specific constraint. ", "Thus, we used the RVIS approach introduced in \\[[@CR1]\\] to rank these regions solely based on human polymorphism data. ", "We therefore generated the RVIS as described in \\[[@CR1]\\], but now applied to the sequence stretches encoding the protein domains as the unit of analysis. ", "As in \\[[@CR1]\\], the scores were generated based on the NHLBI Exome Sequencing Project (ESP) exome variant calls \\[[@CR8]\\]. ", "This resulted in a genome-wide ranking of all domain encoding regions. ", "To reflect its focus on sub-regions of genes, we term this overall approach sub-region Residual Variation Intolerance Scores (subRVIS). ", "The subRVIS scores derived from this particular division into protein domains are designated domain subRVIS. ", "We then repeated this for the exonic division, generating a set of exonic scores termed exon subRVIS. ", "Following the original RVIS formulation, a lower subRVIS score indicates a more intolerant region.", "\n\nAs this approach is solely based on variation in the human population, we also constructed comparable conservation-based scores for both gene sub-divisions. ", "We based our conservation approach on GERP++ \\[[@CR7]\\], a method that assigns each genomic position a score denoting its estimated evolutionary constraint. ", "In this approach, for each sub-region we calculate the average GERP++ score across its bases. ", "We term this approach subGERP. ", "We applied subGERP to the domain regions, and term the resulting scores domain subGERP. ", "We repeated this for the exonic coordinates, and term the resulting scores exon subGERP. ", "A higher subGERP score indicates an overall more conserved region.", "\n\nTo assess these scores, we developed a model for testing the utility of these scores in predicting the presence of previously reported pathogenic variants within these sub-regions. ", "We show that domain subRVIS, domain subGERP, exon subRVIS, and exon subGERP are all significantly correlated with the presence or absence of pathogenic mutations within their corresponding regions. ", "Further, we show that by dividing the gene into sub-regions we add useful information beyond the undivided genic RVIS score.", "\n\nResults and Discussion {#Sec2}\n======================\n\nRegion definitions and score generation {#Sec3}\n---------------------------------------\n\nWe defined each gene's protein-coding region based on the consensus coding sequence project (CCDS) \\[[@CR9]\\]. ", "We divided these regions into domains based on the CDD \\[[@CR6]\\] ([Methods](#Sec10){ref-type=\"sec\"}). ", "The CDD is a collection of conserved domain sequences, represented as position-specific score matrices (PSSMs). ", "Each gene's coding sequence was aligned to CDD, using RPS-BLAST. ", "In total, we annotated 8,988 different types of domains in 16,611 genes, covering 41.5 % of coding regions. ", "The final domain coordinates for each gene were defined by both the regions of the coding sequence that aligned to the CDD and the unaligned regions between CDD alignments. ", "These coordinates are available in Additional file [1](#MOESM1){ref-type=\"media\"}. ", "Using these coordinates, there are 89,522 regions in total, an average of five regions per gene. ", "We calculated intolerance scores for these regions using the approach described in \\[[@CR1]\\] and designated these scores domain subRVIS. ", "As the division into exons is biologically relevant, in particular with respect to the splicing machinery, we also generated subRVIS scores whereby each exon constitutes a region, and termed these exon subRVIS (Additional file [2](#MOESM2){ref-type=\"media\"}).", "\n\nScore assessment frameworks {#Sec4}\n---------------------------\n\nFollowing the generation of the scores, we developed two frameworks to test how well regional intolerance scores can predict the distribution of known pathogenic variants in disease-associated genes ([Methods](#Sec10){ref-type=\"sec\"}). ", "We use information for reported pathogenic variants from two large databases: ClinVar \\[[@CR10]\\] (accessed June 2015) and the human gene mutation database (HGMD) \\[[@CR11]\\] (release 2015.1). ", "It is likely that in some cases only a portion of the gene was sequenced to detect pathogenic variants reported in these databases. ", "This is unlikely to affect the results of our test because even in such scenarios, at the time of sequencing it was unknown which regions had more intolerant subRVIS scores, and thus the sequencing efforts would not be preferentially biased towards sequencing of subRVIS intolerant regions. ", "We also limited the reported pathogenic variants to missense variants that were not adjacent to a canonical splice site (within one codon) and not predicted to cause loss of function (LoF) ([Methods](#Sec10){ref-type=\"sec\"}), as LoF variants, with some exceptions, generally damage the function of the entire protein indiscriminative of where within the protein they occur.", "\n\nOur first framework is a gene-by-gene assessment of whether regional intolerance scores can predict the distribution of known pathogenic variants within each gene ([Methods](#Sec10){ref-type=\"sec\"}). ", "Given that some genes have very few reported pathogenic variants or very few sub-regions, and that this test is applied separately to each gene, this test has limited power to detect significance. ", "We limited our dataset to genes with at least two regions and at least one reported pathogenic variant (2,888 genes in domain subRVIS, 2,910 genes in exon subRVIS; Additional file [3](#MOESM3){ref-type=\"media\"} and Additional file [4](#MOESM4){ref-type=\"media\"}).", "\n\nOur second framework tests whether regional intolerance scores can predict the presence of known pathogenic variants on a genome-wide scale. ", "This test is limited to the subset of genes for which we have reported pathogenic variants (3,046 genes; Additional file [5](#MOESM5){ref-type=\"media\"}). ", "Though this assessment is limited by our test data and does not cover all genes, this assessment can be used as an indicator to how well we expect regional intolerance scores to predict the overall distribution of pathogenic variants, and not just those that have been reported in our test data.", "\n\nGene-specific testing {#Sec5}\n---------------------\n\nFor the gene-specific testing, we focused our analyses on genes with at least two regions and at least one reported pathogenic variant. ", "In domain subRVIS, we were able to assess 2,888 genes (Additional file [3](#MOESM3){ref-type=\"media\"}). ", "For 182 of the 2,888 genes (6.3 %), we found a significant relationship between domain subRVIS and the distribution of pathogenic variants (α = 0.05, false discovery rate (FDR); Additional file [3](#MOESM3){ref-type=\"media\"}).", "\n\nWe ran the same assessment across the exon subRVIS scores. ", "Here, we were able to assess 2,910 genes (Additional file [4](#MOESM4){ref-type=\"media\"}). ", "For 102 of the 2,910 genes (3.5 %), we found a significant relationship between exon subRVIS and the distribution of pathogenic variants (α = 0.05, FDR; Additional file [4](#MOESM4){ref-type=\"media\"}).", "\n\nFor these 182 genes where domain subRVIS predicts where mutations are found, there are many different patterns represented. ", "In some cases, genes are somewhat evenly divided in more and less tolerant regions. ", "One example in this category is the *ATP1A3* gene (Fig.", " [1](#Fig1){ref-type=\"fig\"}). ", "Overall, *ATP1A3* is a highly intolerant gene \\[[@CR1]\\], which has been previously implicated with alternating hemiplegia of childhood and rapid-onset dystonia--parkinsonism \\[[@CR12], [@CR13]\\]. ", "It falls in the 3rd percentile of the overall genic intolerance scores. *", "ATP1A3* has roughly two intolerance levels. ", "The two most intolerant regions have intolerance scores of just below --1. ", "These regions occupy 43 % of *ATP1A3*'s coding region. ", "The remaining regions are more tolerant, with scores ranging from --0.573 to 0.144, with an average score of --0.145. ", "Interestingly, these more tolerant regions carry far less previously identified pathogenic mutations (Fig.", " [1](#Fig1){ref-type=\"fig\"}).Fig. ", "1Distribution of reported pathogenic variants in *ATP1A3*. ", "This figure shows the distribution of reported variants in *ATP1A3*. ", "Each CDD conserved domain type is annotated in a different color. ", "The Y axis represents the domain subRVIS scores. ", "Each reported variant is marked with a blue circle\n\nSome genes however show a far more extreme pattern. ", "Overall, the *MAPT* gene (Fig.", " [2](#Fig2){ref-type=\"fig\"}) is highly tolerant (98th percentile) despite carrying mutations that cause frontotemporal dementia \\[[@CR11], [@CR14]\\]. ", "In fact, a small proportion (26 %) is very intolerant relative to the majority of the gene.", "Fig. ", "2Distribution of reported pathogenic variants in *MAPT*. ", "This figure shows the distribution of reported variants in *MAPT*. ", "Each CDD conserved domain type is annotated in a different color. ", "The Y axis represents the domain subRVIS scores. ", "Each reported variant is marked with a blue circle\n\nStrikingly, nearly all the reported pathogenic *MAPT* variants fall within two small intolerant sub-regions of *MAPT*. ", "The third region is tolerant to variation, and therefore driving the overall genic intolerance score up despite the clear presence of a portion of the gene that causes disease when mutated. ", "Though a fraction of the reported pathogenic variants is from publications that only sequenced exons falling in the two intolerant sub-regions \\[[@CR11]\\], even when those variants are discounted the gene-specific test *P* value for *MAPT* remains unchanged and enrichment of reported pathogenic variants falling in the two intolerant regions remains clear (Fig.", " [2](#Fig2){ref-type=\"fig\"}, FDR *P* value: 0.002).", "\n\nGenome-wide testing {#Sec6}\n-------------------\n\nEncouraged by the fact that subRVIS can, for at least some genes, clearly predict where within disease-associated genes pathogenic mutations are found, we sought to assess the genome-wide prediction of the regional intolerance scores. ", "To this end, we implemented a logistic regression model to test how well regional intolerance scores can predict the presence of reported pathogenic variants within each sub-region genome-wide. ", "For each set of intolerance scores tested, we also generated and tested 1,000 negative test sets. ", "The comparison of the true *P* value to the negative set *P* values is termed the resampling *P* value ([Methods](#Sec10){ref-type=\"sec\"}). ", "We restricted the test to the subset of genes that carry reported pathogenic variants (3,046 genes, Additional file [5](#MOESM5){ref-type=\"media\"}). ", "Chromosomes Y and MT were not assessed.", "\n\nOverall, we found domain subRVIS to be predictive of the presence of pathogenic variants within domain encoding regions (*P* value: 1 × 10^--5^, resampling *P* value: 0.001, score effect size: --0.08, 3,046 genes).", "\n\nWe further wanted to verify that we were not recapturing the overall genic RVIS scores and confirm that dividing the gene into domain sub-regions is indeed adding information. ", "We created a score vector in which each domain sub-region is assigned its gene's overall genic RVIS score in place of its localized domain subRVIS score. ", "We assessed this genic score vector across the subset of genes for which we have both subRVIS and RVIS scores (Additional file [5](#MOESM5){ref-type=\"media\"}), and found that while genic RVIS is not predictive in this framework, subRVIS remains predictive for the subset of genes for which we have both subRVIS and genic RVIS scores (genic RVIS *P* value: 0.137, resampling *P* value: 0.142, score effect size: 0.03, 2,874 genes; domain subRVIS *P* value: 0.0002, resampling *P* value: 0.01, score effect size: --0. ", "07, 2,874 genes).", "\n\nTo assess the relationship between domain subRVIS and phylogenetic conservation, we similarly constructed a conservation score for each domain (domain subGERP). ", "The Pearson's correlation coefficient between domain subGERP and domain subRVIS is --0.204 (*P* value: \\<2.2 × 10^--16^; 95 % confidence interval: (--0.21, --0.197)). ", "We found that domain subGERP is also predictive in our testing framework (*P* value: 3.5 × 10^--6^, resampling *P* value: 0.001, score effect size: 0.09, 3,046 genes). ", "Furthermore, in a joint model with both domain subRVIS and domain subGERP, we found that both domain subRVIS and domain subGERP remain predictive (domain subRVIS *P* value: 0.0003, score effect size: --0.07; domain subGERP *P* value: 8.7 × 10^--5^, score effect size: 0.07; 3,046 genes), indicating that both scores add significant independent information about the localization of pathogenic variation.", "\n\nTo formally test the contribution of these different scores, we calculated and compared the Akaike information criterion (AIC) of the above model, using different predictor combinations of the two significant scores (subRVIS and subGERP). ", "Based on these comparisons neither subRVIS nor subGERP appear to be a significantly stronger predictor (Table [1](#Tab1){ref-type=\"table\"}). ", "We further found that including both subRVIS and subGERP minimizes information loss beyond subGERP alone (*P* value: 0.004) and beyond subRVIS alone (*P* value: 0.001).", "\n\nThe results above show that analyzing the intolerance of regions of genes corresponding to protein domains can provide significant information of where disease causing mutations are likely to be found. ", "However, this does not itself indicate that the use of the protein domains adds information. ", "In fact, it could be the case that any sub-divisions of genes of similar size to protein domains would allow such prediction. ", "More generally, of course, it could be that other ways of sub-dividing genes could be even more informative.", "\n\nTo explore these questions, we first tried to determine whether dividing the genes into biological domains adds information beyond dividing genes into similarly sized sub-regions without biological information. ", "We permuted the CDD domains within each gene randomly, and generated domain subRVIS scores for each of these random permutations ([Methods](#Sec10){ref-type=\"sec\"}). ", "We then assessed the prediction of these scores using the same model we used for the original scores. ", "We repeated this 100 times, and created a distribution of the effect sizes of subRVIS scores across the random permutations. ", "While we expect that many, or possibly all, of these divisions will be significantly predictive, we sought to test whether we have significantly more information in the biological division. ", "The domain division score effect size has a larger absolute value than 99 out of the 100 permuted division score effect sizes. ", "Thus, incorporating biological information does seem to contribute useful information beyond simply considering randomly assigned parts of the gene, when the units correspond in size to protein domains (permutation *P* value: 0.02; Additional File [6](#MOESM6){ref-type=\"media\"}: Figure S1).", "\n\nNext, we sought to explore whether the exonic division might do better than the division into regions of genes corresponding to protein domains. ", "With the exonic division, Pearson's correlation coefficient between exonic subRVIS and exonic subGERP is -0.126 (p-value: \\<2.2 × 10^-16^; 95 % confidence interval: \\[-0.130, -0.121\\]). ", "We found that using intolerance scores at the level of the exon is also predictive of the presence of pathogenic variants within exons (p-value: 0.0001, resampling p-value: 0.001, score effect size: -0.04, 3046 genes). ", "Further, we found that exon subGERP is also predictive in this framework (p-value: 7.8 × 10^-16^, resampling p-value: 0.001, score effect size: 0.09, 3046 genes).", "\n\nSimilar to our analysis of domain encoding regions, this does not itself indicate that the use of the biological parts is actually adding information -- it could be that simply considering parts of genes would allow comparable performance. ", "Thus, just as we did with domains, we generated 100 sets of coordinates in which we permuted the exons within each gene randomly and generated exonic subRVIS scores for these shuffled exons ([Methods](#Sec10){ref-type=\"sec\"}). ", "We then assessed the prediction of these scores. ", "The exon division score effect size has a smaller absolute value than all but one of the permuted division score effect sizes. ", "Thus, it appears that incorporating the exonic information may not contribute useful information beyond other divisions in which the units correspond in size to exons (Additional File [6](#MOESM6){ref-type=\"media\"}: Figure S2).", "\n\nExamining the relationship with variant level scores {#Sec7}\n----------------------------------------------------\n\nAlthough the subRVIS approach does not constitute a variant level predictor, we wanted to verify that the information we were gaining from subRVIS was independent from the information already available from commonly used variant level predictors. ", "Thus, we sought to explore the relationships between domain subRVIS and three variant level predictors: MutationTaster \\[[@CR2]\\], PolyPhen-2 \\[[@CR4]\\], and CADD \\[[@CR3]\\]. ", "We based our assessment on a set of 250,000 simulated variants (Additional file [7](#MOESM7){ref-type=\"media\"}) within the domain subRVIS coordinates. ", "The full results of this assessment can be found in Additional file [8](#MOESM8){ref-type=\"media\"}.", "\n\nWe found that neither PolyPhen-2 nor CADD strongly correlated with domain subRVIS, with Pearson's correlation coefficients of --0.0548 and --0.0811, respectively. ", "The negative correlation is expected, as lower subRVIS scores indicate more intolerant regions and higher PolyPhen-2 or CADD scores indicate more damaging variants.", "\n\nWe converted MutationTaster's predictions into scores on a scale of 0 to 1, with 0 corresponding to predicted pathogenic and 1 corresponding to predicted non-pathogenic ([Methods](#Sec10){ref-type=\"sec\"}). ", "The Pearson's correlation coefficient with the MutationTaster scores is 0.159. ", "Thus, domain subRVIS and MutationTaster are correlated to a higher degree than domain subRVIS and either of the other two scores (PolyPhen-2 and CADD). ", "This is not unexpected, as MutationTaster does consider protein domain information when it is available.", "\n\nGiven this overlap, we sought to explore the relationship between the MutationTaster predictions and domain sub-regions where pathogenic variants have been previously reported. ", "We divided the MutationTaster variant scores based on whether the corresponding simulated variant falls in a domain sub-region that has previously reported at least one pathogenic variant (n = 20,382 simulated variants) or not (n = 228,116 simulated variants). ", "We compared these two distributions of scores and found that they differ (*P* value: 2.48 × 10^--256^, Wilcoxon rank sum test), with lower (more likely pathogenic) variant level MutationTaster scores corresponding to variants identified in disease-associated regions.", "\n\nApplication to patient data {#Sec8}\n---------------------------\n\nWe have previously shown that neuropsychiatric case populations show an enrichment of *de novo* mutations that have a damaging (≥0.95) PolyPhen-2 score \\[[@CR4]\\] and occur in an intolerant (≤25th percentile) genic RVIS gene when compared to *de novo* mutations found among controls \\[[@CR1]\\]. ", "The idea behind this multi-tiered approach that includes both variant level and regional level prioritizations is that the interpretation of a variant's effect is more informative when it is known if the variant falls in a region that is depleted of functional variation. ", "Thus, if a variant is likely damaging to the protein and also affects an intolerant gene, it is more likely to be pathogenic and therefore we expect an enrichment of these in cases. ", "We designated mutations fitting these criteria as 'hot zone' mutations.", "\n\nWe applied this approach using the subRVIS scores in place of the genic RVIS scores on two case datasets: *de novo* mutations in autism \\[[@CR15]\\] and in epileptic encephalopathies \\[[@CR16]\\]. ", "For controls, we used the controls provided in \\[[@CR15]\\] as controls for both sets of cases ([Methods](#Sec10){ref-type=\"sec\"}).", "\n\nWe found that within the epilepsy cohort, 77 out of 366 (21 %) of the *de novo* mutations were subRVIS hot zone mutations, while only 212 out of 1345 (16 %) of the *de novo* mutations in controls were (Fisher's exact test *P* value: 0.018). ", "Using the same test with the genic RVIS scores gave a stronger signal (Fisher's exact test *P* value: 0.001). ", "In the autism cohort, we found a strong signal for genic RVIS (Fisher's exact test *P* value: 0.0001) and an insignificant subRVIS score signal (Fisher's exact test *P* value: 0.275).", "\n\nDespite the fact that, for now, genic RVIS is still more predictive, we are encouraged by the fact that we can still detect hot zone *de novo* mutation enrichment with a focus on sub-regions. ", "This is especially impressive given the smaller size of the subRVIS regions. ", "As the number of available control reference cohorts grows, the resolution of the subRVIS score is anticipated to improve.", "\n\nConclusions {#Sec9}\n===========\n\nDespite its introduction only 2 years ago, it is already clear that consideration of genic intolerance provides a valuable new dimension in the interpretation of patient genomes. ", "Intolerance scores have been used repeatedly to interpret observations of mutations in patients with unresolved or undiagnosed diseases \\[[@CR17]--[@CR22]\\] and have been used to interpret *de novo* mutations across a broad range of diseases \\[[@CR23]--[@CR26]\\].", "\n\nDespite this promise, the gene as the unit of analysis is coarse. ", "Here we have shown that sub-dividing genes into regions corresponding to protein domains or regions of the size of exons can provide significant information about where in disease causing genes pathogenic mutations are most likely to be found. ", "There are a number of ways we expect this added resolution to be useful in interpreting genomes. ", "An obvious example is to focus attention on mutations that occur in genes that are not intolerant overall, but that occur in a particularly intolerant region of the gene. ", "The reverse pattern is also important. ", "One of the most challenging aspects of the interpretation of personal genomes today is the high percentage of false positive mutations in disease databases, and the fact that these mutations clearly have higher population allele frequencies than the true positives. ", "It is very likely that these false positive mutations are preferentially drawn from the more tolerant regions of genes that cause disease, giving us a possible new pointer to candidate false positive mutations.", "\n\nTo be alert to such possibilities, we have created an online tool for plotting variants across domain sub-regions within a gene ([www.subrvis.org](http://www.subrvis.org)). ", "This tool can help researchers explore which domains within a gene their variants of interest fall in and what the corresponding subRVIS scores are. ", "We further constructed a score to reflect the degree to which genes vary in intolerance among their regions. ", "The expectation is that in some genes the intolerance to variation will be uniform across its sub-regions, while in others the intolerance to variation will vary greatly across its sub-regions. ", "Thus, this score was constructed by calculating, per gene, the standard deviation of its domain subRVIS scores. ", "Only genes with at least three domain sub-regions were assessed. ", "Though these scores can be useful in predicting whether we expect pathogenic mutations to cluster in specific sub-regions within a given gene, currently there is not a relationship between these scores and whether known pathogenic mutations actually do so. ", "These scores are available in Additional file [9](#MOESM9){ref-type=\"media\"}.", "\n\nOne important point to emphasize is that the minimum unit size that can be effective in an RVIS framework depends critically on the number of individuals that have been sequenced in the reference cohort, since the ability to distinguish different genomic regions depends on observing variation in those regions. ", "While our research shows the utility of the basic subRVIS approach, the power of this approach will steadily increase as the number of sequenced individuals increases.", "\n\nThe research presented here demonstrates the importance of accounting for protein domains in human disease studies. ", "In particular, quantifying a gene's domains' intolerance to variation has utility in identifying causal variants. ", "We anticipate that our methodology will continue to improve as we gain access to more sequencing data. ", "There are other ways, outside of conserved domains, to divide a protein into domains, such as tertiary structure. ", "Future approaches can incorporate these and other annotations to divide proteins into biologically relevant sub-regions.", "\n\nMethods {#Sec10}\n=======\n\nThe software used in this publication is available on GitHub (<https://github.com/igm-team/subrvis>), released under the MIT license.", "\n\nDefining the domains {#Sec11}\n--------------------\n\nWe define each gene's protein-coding sequence based on its Consensus Coding Sequence (CCDS release 15, accessed November 2013) entry \\[[@CR5]\\]. ", "In order to avoid multiple gene definitions, genes with multiple CCDS transcripts are assigned the gene's canonical transcript, as this is the longest and most encompassing transcript. ", "Next, each gene's CCDS entry is translated into protein sequence and aligned to CDD (version 3.11) \\[[@CR6]\\] using RPS-BLAST (version 2.2.28+). ", "No multi-domains in CDD were used, to avoid grouping multiple single domains into one sub-region in our domain definitions. ", "Only alignments with maximal E-value of 1e-2 were considered. ", "When two domains overlapped in the RPS-BLAST results, the domain with the better alignment score was kept.", "\n\nCalculating subRVIS Scores {#Sec12}\n--------------------------\n\nsubRVIS scores were calculated for the domains, exons, 100 permuted domains, and 100 permuted exons. ", "The scores were calculated using the NHLBI Exome Sequencing Project (ESP) \\[[@CR8]\\], as described in \\[[@CR1]\\]. ", "Each position in each sub-region is first checked for adequate coverage. ", "Only positions with ≥10× average coverage in the ESP were considered. ", "ESP variant calls were further filtered to only retain variants with a 'PASS' filter status. ", "Following this, using the ESP variant calls that qualify based on both these criteria, the tally of all variants per each sub-region is regressed against the count of common (\\>0.1 % minor allele frequency) non-synonymous variants in the sub-region, as per \\[[@CR1]\\]. ", "The studentized residual of each sub-region is its score. ", "Thus, the subRVIS score quantifies the departure of the observed number of common non-synonymous variants from the expectation given the total number of variants in each genomic region. ", "One of the outcomes of using the residuals from this regression as the score is that they are, by definition, orthogonal to the tally of all variants in their corresponding sub-region and thus orthogonal to the overall distribution of variants in that genomic region. ", "A total of 89,335 domain subRVIS scores (Additional file [10](#MOESM10){ref-type=\"media\"}) and 185,355 exon subRVIS scores (Additional file [11](#MOESM11){ref-type=\"media\"}) were generated. ", "Y and MT chromosome genes were not assessed.", "\n\nScore prediction test dataset {#Sec13}\n-----------------------------\n\nTo test the utility of subRVIS scores in predicting which regions are more likely to carry pathogenic variants, we required a database of known pathogenic variants. ", "We combined data from ClinVar (accessed June 2015) \\[[@CR10]\\] and HGMD (release 2015.1) \\[[@CR11]\\], filtering for ClinVar entries labeled 'Pathogenic' and HGMD entries tagged as 'DM' (disease causing mutation).", "\n\nWe then ran Variant Effect Predictor (version 73) \\[[@CR27]\\] and filtered for canonical variants that were labeled as 'missense_variant' and were not labeled as any of the following: 'incomplete_terminal_codon_variant', 'splice_region_variant', 'stop_gained', and 'stop_lost'.", "\n\nCalculating mutation rates {#Sec14}\n--------------------------\n\nAs we are testing against raw counts of pathogenic mutations, we required a covariate to account for the difference in counts that are due to sequence mutability and unrelated to intolerance. ", "For this, we calculated the mutation rates for each sub-region (Additional file [10](#MOESM10){ref-type=\"media\"} and Additional file [11](#MOESM11){ref-type=\"media\"}) based on its sequence composition \\[[@CR23]\\]. ", "This calculation is not based on any other data used in this manuscript.", "\n\nRegional score gene-specific prediction test model {#Sec15}\n--------------------------------------------------\n\nTo test whether the subRVIS scores are predictive at the single gene level, we designed and implemented a permutation test that predicts the distribution of reported pathogenic variants within a single gene using a set of scores. ", "Genes with less than two regions or less than one reported pathogenic variant were not assessed.", "\n\nLet *n*~*g*~ be the number of regions in gene $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\mathit{\\mathsf{g}} $$\\end{document}$. Let $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{Y}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$ be a vector of length *n*~*g*~ containing the counts of reported pathogenic variants across sub-regions in gene $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\mathit{\\mathsf{g}} $$\\end{document}$. Let $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{Z}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$ be a vector of length *n*~*g*~ containing the mutation rates across sub-regions in gene $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\mathit{\\mathsf{g}} $$\\end{document}$, based on sequence composition \\[[@CR23]\\]. ", "Let $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{X}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$ be a vector of length *n*~*g*~ containing the intolerance scores across sub-regions in gene $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\mathit{\\mathsf{g}} $$\\end{document}$.\n\nFor each gene, we then calculated the expected distribution of pathogenic variants within the gene based on the sub-region mutation rates and the total number of reported pathogenic variants within the gene:$$\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {E}_{\\mathsf{g}i}=\\left(\\sum_i^{n_g}{Y}_{\\mathsf{g}i}\\right)\\ast \\left(\\frac{Z_{\\mathsf{g}i}}{{\\displaystyle {\\sum}_i^{n_g}}{Z}_{\\mathsf{g}i}}\\right). ", "$$\\end{document}$$\n\nThus, $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{E}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$ is a vector of the expected number of reported pathogenic variants in each sub-region based on the gene's mutation rates and total number of reported pathogenic variants.", "\n\nFor each sub-region we subtracted the expected number of pathogenic variants $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\left({\\mathit{\\mathsf{E}}}_{\\mathit{\\mathsf{g}}}\\right) $$\\end{document}$ from the observed number of pathogenic variants $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\left({\\mathit{\\mathsf{Y}}}_{\\mathit{\\mathsf{g}}}\\right) $$\\end{document}$. This vector denotes the departure of each sub-region's tally of reported pathogenic variants from its expected tally. ", "This vector is designated $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{D}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$.\n\nWe calculated a score per gene, designated $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {\\mathit{\\mathsf{C}}}_{\\mathit{\\mathsf{g}}} $$\\end{document}$, denoting both the departure of the reported pathogenic variants distribution from the expectation and the relationship with the intolerance score:$$\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ {C}_{\\mathsf{g}}=cov\\left({D}_{\\mathsf{g}},{X}_{\\mathsf{g}}\\right). ", "$$\\end{document}$$\n\nWe expect that a lower intolerance score will correspond with higher pathogenic variant counts than expected, and therefore we expect the covariance to be negative. ", "To test this, we performed a permutation test, where each permutation has a different distribution of the reported pathogenic variants.", "\n\nFor each permutation, we drew the distribution of the reported pathogenic variants from a multinomial distribution, where the number of trials is the total tally of reported pathogenic variants for the gene and the probability for each sub-region is the fraction of the gene's mutation rate that it occupies $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\left(\\frac{Z_{\\mathsf{g}i}}{{\\displaystyle {\\sum}_i^{n_g}}{Z}_{\\mathsf{g}i}}\\right) $$\\end{document}$. Following this, we calculated the departure from expectation and the covariance as described above.", "\n\nWe repeated this *n*~*p*~  = 20,000 times. ", "To test how the intolerance score prediction for the true distribution of pathogenic variants compares to the prediction for the permuted distributions, we counted how many times out of the *n*~*p*~  = 20,000 permutations the permuted covariance is smaller than or equal to the true covariance. ", "This count is designated *G*. ", "The permutation *P* value is calculated by the following equation: (*G* + 1)/(*n*~*p*~  + 1).", "\n\nRegional score genome-wide prediction test model {#Sec16}\n------------------------------------------------\n\nTo test whether the regional scores are predictive at the level of the genome, we designed and implemented a model that predicts the presence or absence of reported pathogenic variants at each sub-region using a set of scores.", "\n\nAs the presence or absence of reported pathogenic variants in a sub-region will depend greatly on that sub-region's mutability, what we are trying to determine in this model is whether our scores can predict the presence of pathogenic variation in a sub-region after accounting for the region's mutability. ", "We divide any score predictors (subRVIS, subGERP, genic RVIS) within this model by their standard deviation in order to allow for the interpretation of the effect sizes in terms of standard deviations.", "\n\nPreviously, we were considering a single gene indexed by *g*. ", "Here, we are considering genome-wide analysis, therefore we dropped the *g *from notation. ", "Specifically, let *n* be the number of sub-regions across all the genes in the genome. ", "Let *Y* be a vector of length *n* with components (*Y*~*i*~ , *i* = 1,..., *n*) corresponding to each sub-region taking on either a 1 or a 0, respectively, denoting presence or absence of at least one non-LoF pathogenic variant within the sub-region. ", "Let *Z* be a vector of length *n* containing the sub-regions' mutation rates, based on sequence composition \\[[@CR23]\\]. ", "Let *X* be a vector of length *n* containing the sub-regions' intolerance scores, scaled across all sub-regions by dividing each intolerance score by the standard deviation of all the sub-regions' intolerance scores.", "\n\nTo evaluate the relationship between the score and the presence of pathogenic variants we fit the following logistic regression model:$$\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ logit\\left( \\Pr \\left({Y}_i=1\\right)\\right)=\\alpha +{\\beta}_1\\ast \\log \\left({Z}_i\\right)+{\\beta}_2{X}_i, $$\\end{document}$$\n\nwhere i=1,\\...,n.", "\n\nNote that *β*~2~ captures the strength of the relationship between *X*, the intolerance scores, and *Y*, while adjusting for regional mutability. ", "We refer to *β*~2~ as the 'score effect size' and report it in the text as a metric for how well a given model performs.", "\n\nNext, we wanted to assess how the model performs on negative test sets. ", "For each intolerance score genome-wide test we generated 1,000 resampled response vectors. ", "To create the resampled response vectors, we resampled the 0 s and 1 s within the true response vector (*Y*) so that sub-regions with a larger mutation rate (*Z*) were more likely to be assigned a 1. ", "Specifically, we resampled *Y* without replacement with sampling probabilities given by $\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ \\frac{Z}{{\\displaystyle {\\sum}_i^n}{Z}_i} $$\\end{document}$. The idea is that under neutrality the more mutable a region is the more likely it is to carry mutations. ", "By using this resampling method, we preserve the number of regions containing pathogenic variants and therefore the number of zeros and ones in our response vector remains the same.", "\n\nUsing the same genome-wide assessment that we used for the observed data, we tested the intolerance scores' prediction against each of the 1,000 resampled response vectors. ", "This resulted in a vector of negative test set *P* values. ", "To test how the observed set of reported pathogenic variants compares to that obtained by resampling, we enumerated, across all (*R* = 1,000) resampled datasets the number of times (*C*) the *P* value from the resampled data analysis is larger than the *P* value obtained from the observed data analysis. ", "We define our resampling *P* value as: (*R* -- *C* + 1)/(*R* + 1).", "\n\nAIC comparisons {#Sec17}\n---------------\n\nTo compare AICs between two models, we first identify the model with the lower AIC, representing the model estimated to have less information loss. ", "We designated this AIC~min~ and we designated the other AIC as AIC~max~. To calculate the relative probability that AIC~max~ is the model that minimizes information loss (designated here as *p*), we calculate:$$\\documentclass[12pt]{minimal}\n \\usepackage{amsmath}\n \\usepackage{wasysym} \n \\usepackage{amsfonts} \n \\usepackage{amssymb} \n \\usepackage{amsbsy}\n \\usepackage{mathrsfs}\n \\usepackage{upgreek}\n \\setlength{\\oddsidemargin}{-69pt}\n \\begin{document}$$ p= \\exp \\left(\\frac{AI{C}_{min}- AI{C}_{max}}{2}\\right). ", "$$\\end{document}$$\n\nThe resulting value indicates that the probability that AIC~max~ minimizes the information loss from AIC~min~ is *p*. ", "A high *p* indicates that AIC~max~ may have less information loss than AIC~min~, while a low *p* indicates that it is unlikely that AIC~max~ minimizes information loss in comparison to AIC~min~.\n\nRegion permutation test {#Sec18}\n-----------------------\n\nTo test our model on randomly permuted regions, we performed the following:For each gene we took into account the sizes of each of its sub-regions.", "We permuted the sizes of each gene's sub-regions, resulting in a set of the same sub-regions in a random order.", "We then re-divided each gene based on the permuted set of sub-regions. ", "Thus, after the permutation each gene maintains the same number and size distribution of sub-regions as in the biological division.", "For this permuted set of sub-regions, we generated sub-region intolerance scores, calculated the sub-region mutation rates and counted the number of pathogenic variants in each sub-region.", "Following this, we tested prediction across the permuted set of sub-regions using the same genome-wide assessment that we used for the biological division.", "We recorded the effect size of the intolerance scores in this assessment.", "We repeated steps (1) through (6) 100 times.", "This resulted in a vector of effect sizes that constitutes our null distribution of effect sizes for the permutation test.", "\n\nTo test how the biological division compares to the permuted divisions, we counted how many times out of the *n*~*p*~  = 100 permutations the absolute value of the permuted division score effect size is smaller than the absolute value of the biological division score effect size. ", "This count is designated *X*. ", "The permutation *P* value is calculated by the following equation: (*n*~*p*~  − *X* + 1) /(*n*~*p*~  + 1).", "\n\nGERP scores {#Sec19}\n-----------\n\nTo quantify phylogenetic conservation across sub-regions, we generated a novel vector for each sub-region division that simply reflects the average GERP++ \\[[@CR7]\\] score (where available) for those coordinates (Additional file [10](#MOESM10){ref-type=\"media\"} and Additional file [11](#MOESM11){ref-type=\"media\"}).", "\n\nMutationTaster scores {#Sec20}\n---------------------\n\nWe ran MutationTaster's QueryEngine (<http://www.mutationtaster.org/StartQueryEngine.html>, accessed September 2015) \\[[@CR2]\\] with default options, outside of the option to filter against the 1000 Genomes project. ", "By default, this option is selected. ", "As we wanted analysis results for all variants, we deselected this option.", "\n\nMutationTaster uses a Bayes classifier to determine whether a variant is a polymorphism or disease causing. ", "The classifier has four output options:disease_causing: probably deleterious.disease_causing_automatic: known to be deleterious based on existing databases.polymorphism: probably harmless.polymorphism_automatic: known to be harmless based on existing databases.", "\n\nAlong with the prediction, for each variant MutationTaster outputs an estimated probability for the prediction. ", "More information on MutationTaster can be found at <http://www.mutationtaster.org/info/documentation.html> or at \\[[@CR2]\\].", "\n\nTo convert these results into a score between 0 and 1, we devised the following criteria:If the prediction is polymorphism, use the probability as the score. ", "This will always be above 0.5. ", "Thus, predicted polymorphisms receive scores in the range of 0.5 to 1.If the prediction is disease_causing, the score is the probability subtracted from 1. ", "As the probability will always be above 0.5, the predicted disease causing variants receive scores in the range of 0 to 0.5.If the prediction is either polymorphism_automatic or disease_causing_automatic, this indicates that the variant's prediction is based on a database entry, not the Bayes classifier. ", "If the Bayes classifier disagrees with the automatic prediction, the probability will be less than 0.5. ", "In these instances, we reassigned the variant's prediction to match the Bayes classifier's and reassigned the probability to 1 minus the originally reported probability. ", "Following this, we treated the variant as described above.", "\n\nApplying the hot zone approach {#Sec21}\n------------------------------\n\nFor both the autism \\[[@CR15]\\] and epileptic encephalopathies \\[[@CR16]\\] *de novo* mutations data we limited to single-nucleotide variants, falling in regions for which we have both subRVIS and genic RVIS scores. ", "We calculated each variant's PolyPhen-2 score using PolyPhen-2 HumVar \\[[@CR4]\\]. ", "Synonymous variants were assigned 0 while canonical splice, stop gain, and stop loss variants were assigned 1. ", "Mutations present as variants in the NHLBI ESP exome variant calls \\[[@CR8]\\] were excluded.", "\n\nAll the mutations in the epileptic encephalopathies data from the Epi4K study \\[[@CR16]\\] are Sanger validated.", "\n\nFor the autism data from \\[[@CR15]\\], we required that the mutations not be called in both siblings. ", "We additionally required that either: (1) at least one of the institutes analyzing the data (Cold Spring Harbor Laboratory, Yale School of Medicine, University of Washington) had validated the mutation; or (2) at least one of the institutes labeled the mutation as a 'strong' variant call while no other institute labeled the mutation as 'not called' or 'weak'.", "\n\nEstimate of the disease risk per protein domain {#Sec22}\n-----------------------------------------------\n\nGiven the potential interest in whether some CDD protein domain types are more likely to carry reported pathogenic mutations than others, we have created a table including the tally of reported pathogenic mutations and the cumulative mutation rate for each CDD protein domain type across genes (Additional file [12](#MOESM12){ref-type=\"media\"}). ", "This table also includes the tally divided by the cumulative mutation rate. ", "This is meant to serve as an approximate estimate denoting the number of reported pathogenic mutations after controlling for mutation rate. ", "For comparative purposes, a higher value indicates more reported mutations given the sequence context.", "\n\nEthical approval {#Sec23}\n----------------\n\nNo ethical approval was required.", "\n\nAvailability of data and materials {#Sec24}\n----------------------------------\n\nThe data and materials used in this manuscript are either previously published or are available in this publication as Additional files [1](#MOESM1){ref-type=\"media\"}, [2](#MOESM2){ref-type=\"media\"}, [3](#MOESM3){ref-type=\"media\"}, [4](#MOESM4){ref-type=\"media\"}, [5](#MOESM5){ref-type=\"media\"}, [6](#MOESM6){ref-type=\"media\"}, [7](#MOESM7){ref-type=\"media\"}, [8](#MOESM8){ref-type=\"media\"}, [9](#MOESM9){ref-type=\"media\"}, [10](#MOESM10){ref-type=\"media\"}, [11](#MOESM11){ref-type=\"media\"}, and [12](#MOESM12){ref-type=\"media\"}. ", "The software used in this publication is available on GitHub (<https://github.com/igm-team/subrvis>), released under the MIT license.", "\n\nAdditional files {#Sec25}\n================\n\nAdditional file 1:**A text file in BED format containing domain subRVIS sub-region boundaries.** ", "Each sub-region name contains three fields separated by a colon - the gene name; the domain type, which is either the CDD PSSM-Id of the aligned domain or a '-' denoting that no CDD domain was aligned to this region; the domain type again followed by an underscore, followed by the occurrence number of this domain type. (", "TXT 10178 kb)Additional file 2:**A text file in BED format containing exon subRVIS sub-region boundaries.** ", "Each sub-region name contains three fields separated by a colon. ", "Although for the exon sub regions only two fields are required, we used three fields to maintain consistency with the domain sub region boundaries file. ", "Therefore the second and third fields are equal to each other. ", "The format is: the gene name; the letter 'E' followed by the exon number; the letter 'E' followed by the exon number again. (", "TXT 6710 kb)Additional file 3:**A text file of the FDR adjusted** ***P*** **values per-gene for the domain subRVIS gene-specific tests across the subset of genes for which we have at least two regions and at least one reported pathogenic variant.** (", "TXT 35 kb)Additional file 4:**A text file of the FDR adjusted** ***P*** **values per-gene for the exon subRVIS gene-specific tests across the subset of genes for which we have at least two regions and at least one reported pathogenic variant.** (", "TXT 35 kb)Additional file 5:**A text file containing the subset of genes for which we have reported pathogenic variants (3,046 genes).** ", "The columns denote whether or not we have subRVIS, RVIS, or subGERP scores for the gene in question. (", "TXT 53 kb)Additional file 6:**A PDF containing Figure S1 and Figure S2, which show the distribution of score effect sizes from random permutations.** (", "PDF 195 kb)Additional file 7:**A text file containing the set of 250,000 random variants generated for the variant level predictors comparisons with the corresponding variant prediction scores and disease-associated status (1 indicates that the domain region the variant falls in has at least one previously reported pathogenic variant, 0 indicates that it has no previously reported pathogenic variants).** (", "TXT 12240 kb)Additional file 8:**A PDF containing the full results of the comparison to variant level predictors.** (", "PDF 88 kb)Additional file 9:**A text file with the standard deviation of the domain subRVIS scores, per gene, across genes with at least three regions.** (", "TXT 671 kb)Additional file 10:**A text file of domain: subRVIS scores, subGERP scores, genic RVIS scores, pathogenic counts, mutation rates, and coverage percentages.** (", "TXT 7982 kb)Additional file 11:**A text file of exonic: subRVIS scores, subGERP scores, genic RVIS scores, pathogenic counts, mutation rates, and coverage percentages.** (", "TXT 15950 kb)Additional file 12:**A text file with an estimate of the disease risk per protein domain.** ", "The format of this table is: PSSM ID; domain name; tally of reported pathogenic mutations in this domain type across genes; cumulative mutation rate in this domain type across genes; the tally divided by the cumulative mutation rate. (", "TXT 405 kb)\n\nCDD\n\n: Conserved domain database\n\nFDR\n\n: False discovery rate\n\nHGMD\n\n: Human gene mutation database\n\nLoF\n\n: Loss-of-function\n\nPSSM\n\n: Position-specific score matrix\n\nRVIS\n\n: Residual Variation Intolerance Score\n\nsubRVIS\n\n: Sub-region Residual Variation Intolerance Score\n\n**Competing interests**\n\nThe authors declare that they have no competing interests.", "\n\n**Authors' contributions**\n\nAll authors participated in the design of the study. ", "ABG coordinated the study and developed the supporting software. ", "ABG and ASA designed the statistical models. ", "QW generated the subRVIS scores. ", "ABG prepared the manuscript with input from SP, ASA, and DBG. ", "All authors read and approved the final manuscript.", "\n\nThe authors would like to thank the NHLBI GO Exome Sequencing Project and its ongoing studies which produced and provided exome variant calls for comparison: the Lung GO Sequencing Project (HL-102923), the WHI Sequencing Project (HL-102924), the Broad GO Sequencing Project (HL-102925), the Seattle GO Sequencing Project (HL-102926), and the Heart GO Sequencing Project (HL-103010). ", "We would also like to thank Dr. Greg Gibson for helpful discussions and comments.", "\n\nFunding {#FPar1}\n=======\n\nABG is supported by the National Institute of Neurological Disorders and Stroke of the National Institutes of Health under Award Number F31NS092362. ", "SP is a National Health and Medical Research Council of Australia (NHMRC) (CJ Martin) Early Career Fellow. ", "This work was supported in part by the NIH Epi4K Sequencing, Bioinformatics and Biostatistics Core grant number U01NS077303. ", "The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health. ", "The funders had no role in design, in the collection, analysis, and interpretation of data; in the writing of the manuscript; in the decision to submit the manuscript for publication.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.006269592476489028, 0, 0.009174311926605505, 0, 0.006160164271047228, 0, 0, 0.008333333333333333, 0, 0.005154639175257732, 0.007751937984496124, 0, 0, 0, 0, 0, 0.011363636363636364, 0, 0.006097560975609756, 0, 0.009259259259259259, 0, 0.016666666666666666, 0.01282051282051282, 0.015873015873015872, 0, 0.007352941176470588, 0, 0, 0, 0, 0.006369426751592357, 0, 0, 0, 0, 0, 0, 0, 0, 0.0038910505836575876, 0.009708737864077669, 0.008928571428571428, 0.03076923076923077, 0, 0.005780346820809248, 0, 0, 0.007246376811594203, 0, 0, 0.015544041450777202, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004424778761061947, 0, 0, 0.004975124378109453, 0, 0, 0.01818181818181818, 0, 0.015228426395939087, 0, 0, 0, 0, 0, 0.009433962264150943, 0, 0, 0, 0, 0, 0, 0.03333333333333333, 0.013333333333333334, 0, 0, 0, 0, 0, 0, 0, 0, 0.0055248618784530384, 0.0196078431372549, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005813953488372093, 0, 0, 0.011976047904191617, 0, 0, 0.004149377593360996, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.003436426116838488, 0, 0.010752688172043012, 0.0045662100456621, 0, 0, 0, 0, 0, 0.004405286343612335, 0, 0.017142857142857144, 0, 0, 0.012121212121212121, 0.006097560975609756, 0.004807692307692308, 0.012658227848101266, 0.006578947368421052, 0, 0, 0, 0.003745318352059925, 0.0055248618784530384, 0, 0, 0, 0.015228426395939087, 0.007692307692307693, 0.00411522633744856, 0.01818181818181818, 0.01639344262295082, 0.005154639175257732, 0, 0, 0, 0.015209125475285171, 0, 0, 0, 0, 0, 0, 0, 0.011428571428571429, 0, 0, 0, 0, 0, 0, 0, 0.0031847133757961785, 0, 0, 0, 0, 0, 0, 0.018633540372670808, 0.010050251256281407, 0.005405405405405406, 0.020689655172413793, 0, 0, 0.009433962264150943, 0, 0.017543859649122806, 0, 0, 0, 0.007434944237918215, 0, 0, 0, 0, 0, 0, 0.018867924528301886, 0.007168458781362007, 0, 0.004672897196261682, 0, 0.0029069767441860465, 0, 0.0008213552361396304, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004975124378109453, 0, 0, 0, 0, 0.008264462809917356, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.010416666666666666, 0.007739938080495356, 0.014492753623188406, 0.00997506234413965, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.002840909090909091, 0.014705882352941176, 0, 0, 0.00909090909090909, 0, 0, 0.016129032258064516, 0, 0, 0, 0.0032679738562091504, 0.009615384615384616, 0.0058823529411764705, 0, 0.010380622837370242, 0.012195121951219513, 0, 0.010869565217391304, 0.017699115044247787, 0.009708737864077669, 0.00554016620498615, 0, 0, 0, 0, 0, 0, 0.022556390977443608, 0, 0, 0.009259259259259259, 0, 0, 0, 0, 0.004, 0.0040650406504065045, 0, 0.00980392156862745, 0.006622516556291391, 0.0024449877750611247, 0.008547008547008548, 0.0064516129032258064, 0.0058823529411764705, 0.011695906432748537, 0, 0, 0.002617801047120419, 0, 0.015384615384615385, 0.044444444444444446, 0, 0.04838709677419355, 0, 0.0025974025974025974, 0.012345679012345678, 0.022598870056497175, 0.037383177570093455, 0.016, 0.006756756756756757, 0, 0 ]
0.003601
5
[ "Three nine year old card playing hillbilly girls were stolen, violently beaten and raped, two were shot. ", "Incest was reality in mountain families. ", "Brothers, uncles and cousins brutally raped female family members. ", "Four children were stolen at birth, one by my parents, my uncle raped me he is possible father. ", "One baby stolen by a biker gang he's albino. ", "Two while I was in a coma for nine months. ", "I left school and home in fourth grade I never saw my brothers or sister again. ", "Most of my life was spent on highways and streets getting raped with many knives and guns pulled to my head or throat. ", "My dad was a Pentecost Oneness Preacher he went into the New Mexico court house to blow his head off. ", "My oldest sister was dismembered in a semi wreck with a little boy in her arms. ", "I hitchhiked across the states for many years. ", "Rode with many biker gangs in many states. ", "Several pregnancies I lived in the snow under a picnic table. ", "I married a war hero with a prosthetic arm he beat me with. ", "I bought houses and property I had to abandon run from the violence leaving me homeless to this day. ", "I married a gun toting wannabe Clint Eastwood who splattered my blood over all walls of our home hunted me like an animal. ", "Always running from violence I married three violent men the abuse lasted 14 years each. ", "While in a coma for nine months my mother in law found me she stole my two babies. ", "I spent many years hitchhiking in the snow searching for my kids. ", "Drug dealing was always a means to survive. ", "Hundreds of felonies ranging from Arson to terrorist acts hundreds of DUIs blessed with a Governor's pardon. ", "I had many breaks downs and heart attacks I survived. ", "I also survived a 16,000 pound building falling on me crushing my body. ", "I now have a huge list of injuries and disabilities. ", "I survived worse case in history MRSA. ", "My last daughter became an armed bank robber with Jesse James. ", "I paid my debt to society lived a productive life spent most of my life on highways prison or jails. ", "I trained managers & cooks 38 years maintained second jobs as a cook or construction or landscaper. ", "Have 4 years college majored in Secretarial Science. ", "Managed to maintain jobs & write through all the homelessness & violence. ", "My dream is to fish forever have a home & find all my children & grandchildren. ", "I'll settle for a home and fishing. \"", "APPALACHIAN INBRED HILLBILLY!\"", "\n\n(accessed March 7, 2009)Kids' Stuff: Toys and the Changing World of American Childhood1902When news of this second revolt came thither, the Father said to the Son: \"The irreconcilable foe is rising once againRather than being a replication of Berryman's image, this bear was an extension of the company's line of soft-cloth wild animal toys that was developing from, and encouraging, a growing public market Leash Up's 101 Reasons I Love My Belgian Sheepdog: A Journal to Record all the Reasons you Love your Belgian Sheepdog this type of children's playthingFacility staff have reported that residents, \"will tell the stuffed animal their thoughts and feelings because there just isn't anyone else they feel they can talk to\" (Cutler 2004, 10-11)The Chief: Ernest Thompson Seton and the Changing WestThis article provides a socio-cultural history of that transfiguration and of its relationship to the activity of teddy bear gifting: the provision of teddy bears as a means for alleviating the alienated emotional selfLes amants qui aiment bien n'crivent pas leur bonheurVariant: Of all sexual aberrations, perhaps the most curious is chastity\n\nThe variations on this myth are globally disseminated through the Smithsonian, popular publications and Labrador Retrievers: 150 page lined notebook for adults, children's picture books, and scholarly histories of Theodore RooseveltThe internet site, Teddy Bears for Hope, explains this in rhetoric comparable to spiritual belief as being an inexplicable phenomenon: \"There's just something about a Teddy Bear that's impossible to Doing Time Like A Spy: How the CIA Taught Me to Survive and Thrive in Prison the process of helping people who are homeless, we must change the way we name themThe bear looks on, winking in triumphBrian JenkinsFullscreen Spectrum Sleep Out participants are seen in their sleeping bags Thursday night on the lawn of the First Unitarian Universalist Society church in downtown BurlingtonThey did not fear men, for they did not know them, and had never received any harm from them; and there was in the monk a certain gentleness that reassured the most timid animals and that pleased these penguins Famous Leaders of Industry: The Life Stories of Boys Who Have Succeeded (Classic Reprint) Edwin Wildman is the gaiety of reflection and the joy of wisdom\n\nThe bear, having been chased into a water hole, attacked and killed one of the hunting dogsPlush Animals as Therapeutic Family Caregiving ToolsThese sections contribute to a growing body of work on the changing views of the child and the concept of childhood innocenceOrberosia is forgotten by the Penguins, her devotion abandoned, and her sanctuary desertedFolk Women and Indirection in Morrison, N Dhuibhne, Hurston, and LavinGovRoche (1910) Various formats at Internet Archive In this one, a bear sitting atop a hill observes the hunting party leaving the area carrying Lightroom for Beginners (French Edition) and dead dogs; one hunter drags behind him a live bear around the neck of which is a tag that reads, \"Back to the Zoo\"; the bear on the hill holds a newspaper with the taunting headline, \"HOW CAN Daily Responsibility Chart BEAR TO LEAVE ME!\" (", "Berryman 1902b, 1)Seneca and Epictetus, who venerated him, would have been the first to have been surprised at the resemblance, had they been called upon to institute a comparison2008 48a4f088c3" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.023255813953488372, 0, 0, 0, 0.008130081300813009, 0, 0, 0, 0, 0.009174311926605505, 0, 0, 0, 0, 0.015873015873015872, 0, 0, 0.018867924528301886, 0, 0, 0, 0.03333333333333333, 0.006589268904926263, 0.005154639175257732 ]
0.003439
5
[ "#!", "/usr/bin/env rake\n# Add your own tasks in files placed in lib/tasks ending in .rake,\n# for example lib/tasks/capistrano.rake, and they will automatically be available to Rake.", "\n\nrequire File.expand_path('../config/application', __FILE__)\n\nDummy::Application.load_tasks\n" ]
{ "pile_set_name": "Github" }
[ 0, 0.011428571428571429, 0.010752688172043012 ]
0.007394
5
[ "Q:\n\nMFC & Kinect: draw a line on Kinect's image\n\nI am currently working with Kinect, and I want to draw the bones of a skeleton on the VGA image of the kinect. ", "First, I get the picture from the kinect:\nHRESULT hr = globalNui->NuiImageStreamGetNextFrame( videoStreamHandle, 0, &frame);\nINuiFrameTexture * texture = frame.pFrameTexture;\nNUI_LOCKED_RECT lockedRect;\ntexture->LockRect( 0, &lockedRect, NULL, 0);\n\nHere we have it in a NUI_LOCKED_RECT, so we can do anything with it. ", "The most common way is to just convert it to a bitmap and put it on the screen, but I want to make some modifications to the image. ", "I use Direct2D to bring it on the screen, so I need an image format that can be converted to ID2D1Bitmap, and I must be able to draw lines and points on it. ", "What kind of image do I need?", "\n\nA:\n\nSo I figuered that there are just no image formats doing what I want. ", "No problem, because I found out about all the possibilities of Direct2D. Now I am not actually changing the image, but to the user it looks the same. ", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.025, 0.009433962264150943, 0, 0, 0, 0, 0, 0 ]
0.004304
5
[ "1,039/Smoothed Out Slappy Hours\n\n1,039/Smoothed Out Slappy Hours is a collection of early recordings by American rock band Green Day, released on October 1, 1991 by Lookout Records. ", "Often referred to as the band's debut album, the compilation combines the band's actual debut 39/Smooth and its first two extended plays Slappy and 1,000 Hours, which are all currently out of print, hence its name being an amalgamation of the album and the two EP's. ", "The album included one cover, \"Knowledge\" (originally from the Slappy EP), which was originally by influential California punk band Operation Ivy, whose singer, Jesse Michaels, contributed the artwork for the album. ", "The cover art features the same image from 39/Smooth. ", "The album has become many fans favourite since its release over the years.", "\n\nLookout! ", "re-released the album in 2004 with special limited packaging and all new enhanced CD-ROM features, including live performances and pictures. ", "The album was re-issued in the same packaging in 2007 through Reprise Records after Green Day pulled the album in August 2005, as well as all of its other material released through the label, from Lookout! ", "due to unpaid royalties. ", "The album has been certified Gold in the U.S. by the RIAA, and according to Nielsen SoundScan, it has sold 632,000 copies in the U.S. as of August 2010. ", " The album was certified Gold in the UK on July 22, 2013, representing sales of at least 100,000. ", "It has sold more than 2 million copies worldwide which is huge for an independently released album.", "\n\nRelease\nInitially released in 1991 through Lookout! ", "Records (despite the 1990 copyright date on the album), the label re-issued the album in a remastered form in 2004. ", "It was re-released on CD on January 9, 2007, by Reprise Records, the label Green Day has been signed to since leaving Lookout!. ", "In Europe, the album was already re-released by Epitaph Europe, and has remained in print. ", "It was reissued on vinyl on March 24, 2009, by Reprise in a package containing the original 10-song 39/Smooth LP along with reissues of the 1,000 Hours and Slappy EPs. ", "On the 2009 reissues, the song \"I Want to Be Alone\" is omitted.", "\n\nReception\n\nReviews of 1,039/Smoothed Out Slappy Hours were largely mixed; for example, The New Rolling Stone Album Guide gave it 2.5 out of 5 stars. ", "Brad of Punknews.org gave it 3.5 out of 5 stars, writing, \"All in all, this album succeeds at being quite good. ", "It shows obvious influences from the Clash and the Ramones, and is a good debut for a young band that would later change the course of Punk Rock forever by opening the floodgates for New School bands.\"", "\n\nTrack listing\n\nPersonnel\n\nGreen Day\n Billie Joe Armstrong – lead vocals, guitar\n Mike Dirnt – bass, backing vocals\n John Kiffmeyer – drums, percussion, backing vocals\n\nAdditional performers\n Aaron Cometbus – backing vocals, \"teeth\" on \"Knowledge\"\n\nProduction\n Andy Ernst – producer, engineer\n Green Day – producers\n John Golden – mastering\n Susie Grant – front cover photo\n Jesse Michaels – artwork\n Pat Hynes – artwork, graphic design, layout design\n Chris Appelgren; Aaron Cometbus; Rich Gargano; David Hayes – artwork\n Murray Bowles; Arica Pelino – photography\n Ted Jensen – remastering\n John Yates – packaging\n\nReferences\n\nExternal links\n\n1,039/Smoothed Out Slappy Hours at YouTube (streamed copy where licensed)\n\nCategory:Green Day compilation albums\nCategory:1991 compilation albums\nCategory:Lookout! ", "Records compilation albums\nCategory:Reprise Records compilation albums\nCategory:Epitaph Records compilation albums\nCategory:Albums produced by Andy Ernst" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.005494505494505495, 0.003745318352059925, 0.009259259259259259, 0, 0, 0, 0, 0, 0, 0.013071895424836602, 0, 0, 0, 0, 0.0078125, 0.01098901098901099, 0, 0, 0.006622516556291391, 0.017857142857142856, 0.009950248756218905, 0.013597033374536464, 0.006535947712418301 ]
0.004562
5
[ "107 F.3d 874\nNOTICE: Seventh Circuit Rule 53(b)(2) states unpublished orders shall not be cited or used as precedent except to support a claim of res judicata, collateral estoppel or law of the case in any federal court within the circuit.", "UNITED STATES of America, Plaintiff-Appellee,v.Richard Dale TALBOTT, Defendant-Appellant.", "\nNo. ", "96-2712.", "\nUnited States Court of Appeals, Seventh Circuit.", "\nSubmitted Feb. 7, 1997.*Decided Feb. 13, 1997.", "\n\nBefore BAUER, EASTERBROOK and MANION, Circuit Judges.", "\n\nOrder\n\n1\nOur first opinion in this case, 78 F.3d 1183 (1996), vacated the conviction on one count because of an error in instructing the jury, and affirmed the conviction on the other count but remanded for resentencing with a one-level reduction under the Sentencing Guidelines. ", " On remand the prosecutor dismissed the first count of the indictment, eliminating the need for a second trial. ", " The district court resentenced Talbott to 264 months' imprisonment (the original sentence had been 327 months), and he has filed another appeal.", "\n\n\n2\nTalbott's first argument is that he should not have been sentenced as an armed career criminal, because he does not have three distinct convictions for violent crimes. ", " That argument was raised, and rejected, on the first appeal. ", " 78 F.3d at 1189-90. ", " Talbott does not argue that the law changed in the interim, so the law of the case leads us to reject it again.", "\n\n\n3\nHis second argument is that 264 months' imprisonment for the \"mere\" possession of ammunition violates the cruel and unusual punishments clause of the eighth amendment. ", " But of course it was not the possession of ammunition alone that led to this sentence. ", " It was possession of ammunition by a convicted felon, coupled with three prior convictions for crimes of violence, that led to this outcome. ", " Severe recidivist enhancements for violent criminals are proper under the Constitution. ", " Rummell v. Estelle, 445 U.S. 263 (1980). ", " The only case on which Talbott relies, Solem v. Helm, 463 U.S. 277 (1983), dealt with a bad $100 check. ", " Talbott's criminal history puts him in a different class altogether. ", " The district court also was entitled to rely on the fact that Talbott's crime was related to a violent altercation involving a rifle; the dismissal of that charge did not put the facts beyond notice. ", " See United States v. Watts, 65 U.S.L.W. 3461 (U.S. Jan. 6, 1997).", "\n\n\n4\nAFFIRMED.", "\n\n\n\n*\n This successive appeal had been submitted to the original panel, which concluded that oral argument is unnecessary. ", " See Fed.", "R.App.", "P. 34(a); Cir.", "R. 34(f)\n\n\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.0449438202247191, 0, 0, 0.04081632653061224, 0, 0.03636363636363636, 0.0035460992907801418, 0, 0.006896551724137931, 0.005780346820809248, 0, 0.047619047619047616, 0.008849557522123894, 0, 0, 0, 0, 0, 0.009523809523809525, 0.014285714285714285, 0.0049504950495049506, 0.015151515151515152, 0, 0, 0, 0.16666666666666666, 0, 0.09090909090909091 ]
0.017114
5
[ "Main menu\n\nYou are here\n\nUTW\n\nWhat is the full form of UTW ?", "\n\nThis page is all about abbreviation, acronym and meaning of the given term UTW.", "\n\nUTW Stands For : Ultra Thin Whitetopping | United Taxicab Workers\n\nCategory : Miscellaneous (You might also like similar terms related to the Miscellaneous category)\nNot able to find full form or full meaning of UTW May be you are looking for other term similar to UTW.", "\nEnter your term in the search box of the website or check out 50+ related full forms given in order to find the term of your choice.", "\n\nUSA Stands For : United States Attorney | United States of America | United States Army | Union of South Africa | Ultimate Soviet Anihiliation | Under Secretary of the Army | United States Army | United States of America | Ultra Simplified Acquisition | United Space Alliance | United States of America | Upper Stage Adapter | United States of America | United States of America | United States of America | Ultimate Soviet Anihiliation | United States Army | United States of America | United States of America\n\nUCN Stands For : ultra cold neutron | Unit for Cognitive Neuroscience | United Caprine News | United Colonial Nations | Universidad Central de Nicaragua | University College Nordjylland | University College of Northern | University College of the North\n\nUSC Stands For : United States of Consciousness | University of Second Choice | University of Service and Compassion | University of Snobbish Children | University of Spoiled Children | University of Steroids and Creatine | United Sol Confederation | Stevens Center | The Ultimate Satan Conglomerate | The Univ Of Spoiled Children | U Simply Cover | Ultimate Street Car | Ultra Silent Concept | Umd Skateboard Club | Unbelievably Spoiled Children | Univ Of Southern California | Univeral Social Charge | Universidade de Santiago de CompostelaåÊ | University of | UNIVERSITY of\n\nUSS Stands For : The United States Of Saturn | United Solar Systems | United Star Ship | United States Spaceship | United States Starship | Universal Star Ship | United States Ship | Uncorrected Sum Of Squares | Uniformly Spaced Subcarriers | United Ship Of Stacey | United Space Ship | User Submissions System\n\nUSC Stands For : United States Code | United States Court | United States Code | United States Cavalry | United States Code | Universal Service Contract | USAREUR Subordinate Command | United States Code | United States Census | United States Customary | United States Supreme Court\n\nUSS Stands For : United States Senate | United Seamens Service | United States Ships | United States Ship | United States Standard | Utility Support Structure | Ultimate Short Shifter | Under Seat Steering | United States Ship | United States Senate\n\nUSA Stands For : United Stockgrowers of America | The United States Of Asia | Ull Save Alot | Ubanity Sagacity And Ardency | Unable to Solve Addition | Undefeated Southern Army | Under Saudi Arabia | Under Skirt Adventures | Under Skirt Area | United for Size Advocacy | United States Of Adultery | United States of Aggression | Universal Surveillance for All | Unlimited Supply of Arrogance | Utterly Savage Anarchy | United States of America | United Selfish of America | United States of America | University of South Alabama" ]
{ "pile_set_name": "Pile-CC" }
[ 0.03333333333333333, 0.012345679012345678, 0.014760147601476014, 0, 0.0073475385745775165 ]
0.013557
5
[ "This is a reasonably cute, traditional comic book offering from AdHouse Books. ", "Johnny Hiro's girlfriend Mayumi is kidnapped from their New York apartment by a Godzilla exact-alike. ", "This causes Hiro to attempt a rescue while heavily shuttling back to reminisce on his own life of massively unsuccessful heroics. ", "Similarly, Godzilla tromps up the street and turns inward to think on how he was defeated by a giant robot last time he hit a big city. ", "The book ends with an extended cameo by New York City Mayor Michael Bloomberg. ", "That's about it, really. ", "Chao has one of those amiable comic styles that you used to see more frequently back in the 1980s; it feels like you could spend eight or eight hundred pages in his world and enjoy every page. ", "His figures are drawn with an understated elegance, and his visual pacing within individual scenes move the eye beautifully. ", "While perhaps most noteworthy for Chao's choice to have Mayumi speak in an over the top, limited English that will likely make 60 percent of this comic's well-meaning white audience squirm, the writing in general displays understanding of comics craft.", "\n\nThe big downside to Johnny Hiro arises from the fact that so little happens. ", "Not only is the reader saddled with a passive protagonist, there's almost no plot progression. ", "Step back, and the entire episode seems to have taken a couple of minutes. ", "This gives the entire comic a weird sense of rhythm: the flashbacks aren't anchored, and therefore tend to overwhelm the present-day narrative through-line. ", "The Michael Bloomberg pay-off feels so hefty and involved and stately compared to scenes Chao burned through earlier in the comic that it's almost like this is a story solely designed to explain Mayor Bloomberg's philosophy of political service. ", "Chao would need to be a divine visual and extremely prolific cartoonist to portray his world through such limited exposure and make us appreciate its details and quirky way of doing things. ", "He's not quite that accomplished, and one doubts that even if if he were that AdHouse is going to publish a monthly. ", "What remains is a pleasant comic distinguished more by its unrealized potential than by any one unique thing it chooses to offer. ", "Like Johnny Hiro, you may by comic's end prefer to simply stare out the window." ]
{ "pile_set_name": "Pile-CC" }
[ 0.012658227848101266, 0.029411764705882353, 0.007692307692307693, 0.007352941176470588, 0.012658227848101266, 0, 0.0051813471502590676, 0, 0.007936507936507936, 0.012658227848101266, 0, 0, 0, 0.012195121951219513, 0.005263157894736842, 0.008547008547008548, 0, 0.012658227848101266 ]
0.007456
5
[ "import {Program, Watcher, RawValue, RawMap, RawEAVC} from \"./watcher\";\nimport {HTMLWatcher} from \"./html\";\n\nexport class Notice {\n element:HTMLElement = document.createElement(\"notice\");\n name:string;\n time:number;\n\n constructor(public program:Program, public id:RawValue, public type:RawValue) {\n let html = program.attach(\"html\") as HTMLWatcher;\n html.addExternalRoot(id as string, this.element);\n }\n\n clear() {\n let parent = this.element.parentElement;\n if(parent) parent.removeChild(this.element);\n // @FIXME: html.removeExternalRoot.", "\n }\n}\n\n// @FIXME: do tihs with two program isolation instead of manual rendering?", "\n\nexport class NotifyWatcher extends Watcher {\n html:HTMLWatcher;\n notices:RawMap<Notice|undefined> = {};\n root:HTMLElement;\n scroller:HTMLElement;\n wrapper:HTMLElement;\n\n setup() {\n this.html = this.program.attach(\"html\") as HTMLWatcher;\n\n this.wrapper = document.createElement(\"div\");\n this.wrapper.className = \"notify-wrapper\";\n document.body.appendChild(this.wrapper);\n this.scroller = document.createElement(\"div\");\n this.scroller.className = \"notify-scroller\";\n this.wrapper.appendChild(this.scroller);\n\n this.root = document.createElement(\"column\");\n this.root.className = \"notify-root ui-column\";\n this.scroller.appendChild(this.root);\n this.html.addExternalRoot(\"notify/root\", this.root);\n\n this.program\n .bind(\"Notices that aren't dismissed are children of the notify root.\", ({", "find, not}) => {\n let root = find(\"notify/root\");\n let wrapper = find(\"notify/notice-wrapper\");\n not(() => wrapper.notice.tag == \"notify/dismissed\");\n return [root.add(\"children\", wrapper)];\n })\n .bind(\"Decorate notices.\", ({", "find, choose, record}) => {\n let notice = find(\"notify/notice\");\n let type = choose(() => notice.type, () => \"info\");\n return [\n record(\"notify/notice-wrapper\", \"ui/row\", {notice, type}).add(\"children\", [\n notice.add(\"tag\", \"ui/row\"),\n record(\"ui/spacer\", {sort: 5, notice})\n ])\n ];\n })\n .bind(\"Notices which are dismissable get a button to do so.\", ({", "find, record}) => {\n let notice = find(\"notify/notice\", \"notify/dismissible\");\n let wrapper = find(\"notify/notice-wrapper\", {notice});\n return [wrapper.add(\"children\", [\n record(\"notify/dismiss\", \"ui/button\", {class: \"flat\", notice, sort: 15, icon: \"close-round\"})\n ])];\n })\n .commit(\"Dismissed notices are marked.\", ({", "find}) => {\n let notice = find(\"notify/notice\");\n find(\"html/event/click\", {element: find(\"notify/dismiss\", {notice})});\n return [notice.remove().add(\"tag\", \"notify/dismissed\")];\n })\n .bind(\"If a notice has a timestamp, display it.\", ({", "find, lib:{date}, record}) => {\n let notice = find(\"notify/notice\");\n let wrapper = find(\"notify/notice-wrapper\", {notice});\n return [\n wrapper.add(\"children\", [\n record(\"ui/text\", {sort: 10, notice, text: date.format(notice.timestamp, \"HH:MM:ss\")})\n ])\n ];\n })\n .commit(\"Retract timestamps for bound notices that have ceased to be.\", ({", "find}) => {\n let {notice} = find(\"notify/retract-timestamp\");\n return [notice.remove(\"timestamp\")];\n })\n .watch(\"The notify watcher attaches a timestamp to notices without one.\", ({", "find, not}) => {\n let notice = find(\"notify/notice\");\n not(() => notice.timestamp);\n return [notice.add(\"tag\", \"notify/notice\")];\n })\n .asDiffs(({adds}) => {\n let timestamp = Date.now();\n let eavs:RawEAVC[] = [];\n for(let [notice] of adds) eavs.push([notice, \"timestamp\", timestamp, 1]);\n if(eavs.length) this.program.inputEAVs(eavs);\n })\n .watch(\"The notify watcher also cleans up those timestamps when the notice goes away.\", ({", "find}) => {\n let notice = find(\"notify/notice\");\n return [notice.add(\"timestamp\", notice.timestamp)];\n })\n .asDiffs(({removes}) => {\n if(!removes.length) return;\n let eavs:RawEAVC[] = [];\n eavs.push([\"||notify/retract-timestamp\", \"tag\", \"notify/retract-timestamp\", 1]);\n for(let [notice, _, timestamp] of removes) {\n eavs.push([notice, \"timestamp\", timestamp, -1]);\n //eavs.push([\"||notify/retract-timestamp\", \"notice\", notice, 1]);\n }\n if(eavs.length) this.program.inputEAVs(eavs);\n })\n }\n}\n\nWatcher.register(\"notify\", NotifyWatcher);\n" ]
{ "pile_set_name": "Github" }
[ 0.016100178890876567, 0.012195121951219513, 0.008383233532934131, 0.0076045627376425855, 0.004651162790697674, 0.00546448087431694, 0.003745318352059925, 0.007425742574257425, 0.004878048780487805, 0.004008016032064128, 0.006389776357827476 ]
0.00735
5
[ "AP/Markus Schreiber\n\nIf the terror attacks in Paris have a silver lining, it is that they have sparked an outpouring of support for freedom of speech across the globe and across the ideological spectrum. ", "According to The Associated Press, even Sheikh Hassan Nasrallah, the leader of Hezbollah, has weighed in on the side of enlightenment, saying “that radicals have done more to disparage the Muslim prophet than journalists who published satirical cartoons mocking Islam.”", "\n\nHere in the U.S., the outrage has been virtually nonstop, expressed by media outlets, satirists and comedians, and in a marked display of solidarity, by Republican and Democratic party leaders.", "\n\nAs a nation, we are rallying around the First Amendment. ", "To quote Chicago Tribune columnist Steve Chapman from an Op-Ed published Friday:\n\n“We in Western societies almost always defer to the wisdom of Supreme Court Justice Oliver Wendell Holmes Jr., who said the basis of the First Amendment is ‘not free thought for those who agree with us but freedom for the thought that we hate.’ “", "\n\nThese are fine and uplifting sentiments, and they clearly distinguish our best political and moral values from the twisted, medieval mindsets of the jihadists who perpetrated the massacres in France. ", "But amid the celebration of our values, a question nags: Just how free is freedom of speech in America?", "\n\nThe uncomfortable truth is that here, as elsewhere around the world, freedom of expression has never come easily and is nearly always threatened in one way or another. ", "From the Salem witch trials of the 1690s to the Red Scares of the mid-20th century and the Pentagon Papers trial of Daniel Ellsberg and Anthony Russo in the early 1970s, we have persecuted and prosecuted those whose ideas we fear. ", "Intolerance and suppression of speech — along with the promotion of views favorable to dominant elites — have been hallmark American traditions.", "\n\nToday, those traditions continue in at least five critical ways:\n\n1. ", "The Equation of Money and Political Speech: In a series of decisions dating back to the 1976 case of Buckley v. Valeo and continuing through 2010’s ruling in Citizens United and April’s majority opinion in McCutcheon v. FEC, the Supreme Court has held that the expenditure of money on elections is the equivalent of political speech entitled to full First Amendment protections.", "\n\nThe result has been the development of a political system in which candidates from both major parties are increasingly indebted to corporate donors and dare not contest the priorities of their patrons. ", "The messages of third parties are effectively censored.", "\n\n2. ", "Union Busting: At the same time that the Supreme Court has promoted corporate speech, it has embraced a perverse distortion of the First Amendment when it comes to public employee unions, the last bastion of organized labor in America and a key source of funding for Democratic office seekers.", "\n\nIn two recent cases — Knox v. SEIU and Harris v. Quinn — the court has characterized union dues procedures as coercive, holding that the First Amendment right to freedom of association prohibits the collection of “fair-share” fees from government workers who elect not to join unions that nonetheless negotiate on their behalf. ", "The long-term goal is to neutralize unions as a countervailing political voice.", "\n\n3. ", "Prosecuting Whistle-Blowers: The prosecution of whistle-blowers did not end with Ellsberg. ", "Indeed, it will continue this month with the trial of former CIA officer Jeffrey Sterling, who is accused under the Espionage Act of leaking information to New York Times reporter James Risen that the CIA provided flawed nuclear weapons data to Iran in 2000. ", "As The Guardian and other publications have noted, “Only ten people in American history have been charged with espionage for leaking classified information, seven of them under Barack Obama.”", "\n\nChelsea Manning was convicted under the act in 2013. ", "NSA whistle-blower Edward Snowden awaits a similar fate should he return to the U.S.\n\n4. ", "NSA Spying: The pervasive surveillance apparatus erected by the National Security Agency doesn’t just implicate privacy rights under the Fourth Amendment. ", "Government spying also affects First Amendment rights because of the chilling effect it has on those who wish to join political, social and religious organizations the government deems worthy of monitoring.", "\n\nFirst Amendment claims lie at the heart of a federal lawsuit filed against the NSA by the San Francisco-based Electronic Frontier Foundation. ", "The case is one of five major legal challenges to the NSA pending across the country. ", "The events in Paris could deal them all a significant setback, as lawmakers and judges alike yield to arguments that more, not less, surveillance is needed to wage the unending war on terror.", "\n\n5. ", "Silencing Prisoners: The United States is home to 5 percent of the world’s people, but we have 25 percent of the world’s prison population. ", "Yet we don’t just lock up our convicts; we also try to shut them up. ", "Both the federal government and some 40 states have enacted some form of statute patterned after New York’s “Son of Sam” law, named after the moniker used by 1970s serial killer David Berkowitz, to prevent prisoners from profiting from their violent crimes by writing books or selling the rights to their stories.", "\n\nAlthough the original Son of Sam law was invalidated by the Supreme Court in 1985, such laws haven’t gone away. ", "The worst of the current crop is Pennsylvania’s “Revictimization Relief Act,” passed in October specifically to silence former Black Panther and journalist Mumia Abu-Jamal, who is serving a life term on charges of killing a police officer in 1982.", "\n\nAbu-Jamal enraged state authorities after he delivered a pretaped commencement speech in October to the graduates of Vermont’s Goddard College. ", "Under the new law, in terms that would bring smiles to the faces of any jihadist, victims of violent crime who experience “mental anguish” can sue to enjoin prisoners and released convicts from engaging in any “conduct [including uncompensated speech] which perpetuates the continuing effect of the crime on the victim.” ", "Abu-Jamal is trying to overturn the law in federal court, along with four other inmates and the Prison Radio Network, which distributes his political commentaries.", "\n\nNo doubt there are other items — attacks on academic freedom and curbs on street demonstrations and the Occupy movement, for example — that could be included in my top five.", "\n\nThe important thing is not to construct an exhaustive list, but to underscore the point that freedom of speech is not just under assault in Paris by Muslim fanatics. ", "It rests on a tenuous foundation here as well, in the very home of the First Amendment." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.00980392156862745, 0.01486988847583643, 0.005128205128205128, 0, 0.01524390243902439, 0, 0, 0, 0.008658008658008658, 0, 0, 0.010582010582010581, 0, 0, 0, 0.006825938566552901, 0.006060606060606061, 0, 0, 0.01098901098901099, 0.019305019305019305, 0.010471204188481676, 0, 0.011235955056179775, 0.0064516129032258064, 0, 0.013888888888888888, 0.011627906976744186, 0, 0, 0, 0, 0.003194888178913738, 0.008771929824561403, 0.008097165991902834, 0, 0, 0.012269938650306749, 0, 0, 0 ]
0.004719
5
[ "ESPN FAN SHOP\n\nFANTASY FOOTBALL\n\n{\"playerId\":11439,\"percentChange\":1.2,\"averageDraftPosition\":139.9,\"percentOwned\":21.6,\"fullName\":\"Pierre Garcon\",\"pointsSEASON\":85,\"seasonOutlook\":{\"outlook\":\"One year after racking up 1,346 yards and 5 TDs on an NFL-high 113 receptions, Garcon saw his production fall off a cliff in 2014. ", "A decline was expected with head coach Jay Gruden and wide receivers DeSean Jackson and Andre Roberts added to the mix. ", "But the extent of Garcon's fantasy irrelevance was a little shocking. ", "He was barely a top-55 fantasy receiver last season, hauling in 68 passes for 752 yards and three touchdowns. ", "Don't expect much better this season with Garcon again playing second fiddle to D-Jax.", "\",\"seasonId\":2015,\"date\":\"Wed May 20\"},\"positionRank\":54,\"projectedPoints\":90.007943964}" ]
{ "pile_set_name": "Pile-CC" }
[ 0.009259259259259259, 0.025, 0, 0, 0, 0 ]
0.00571
5
[ "[Tumours of the pineal region: Part II: results of treatment in 23 patients (author's transl)].", "\nThe outcome of 23 patients with tumours in the pineal region was investigated following treatment with shunting, irradiation, extirpation or with a combination of these three procedures. ", "The choice of therapy is difficult because in most cases the kind of tumour is unknown. ", "The irradiation of radioresistant lesions however causes an unnecessary injury of the surrounding tissue whereas the trial of extirpation of a radiosensitive tumour exposes the patient to an unnecessary danger. ", "After the results of therapy a method of treatment is proposed." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "1. ", "Field of the Invention\nThe present invention relates to a lighting device, a display apparatus providing the lighting device, and a television receiver providing the display apparatus.", "\n2. ", "Description of the Related Art\nRecently, a direct backlight LED lighting device (hereinafter referred to as “direct backlight device”) attracts people's attention. ", "In the direct backlight device, light emitting diodes (hereinafter referred to as “LEDs”) are arranged on the entire back surface of a liquid crystal panel as a backlight of the liquid crystal display apparatus.", "\nThe following direct backlight device has been suggested. ", "In an LED module equipped with a plurality of LEDs arranged in a plurality of rows, a box-shaped connector is arranged close to one side or two opposing sides of a rectangular substrate of the LED module. ", "The LED modules are arranged in two-dimensional directions (vertical direction and horizontal direction), and connectors of the LED modules adjacent to each other in one direction are electrically connected, so that a plurality of sizes can be supported (Conventional technique 1: for example, see FIG. ", "1a and FIG. ", "1b in Japanese Unexamined Patent Publication No. ", "2007-288194).", "\nIn the conventional technique 1, a drive circuit connector is arranged on one side of a substrate of an LED module at one end of the plurality of electrically-connected LED modules.", "\nIn the direct backlight device of the conventional technique 1, connectors protrude from the upper surface of the substrate. ", "A part of the light emitted from an LED is absorbed by a housing of the connector, which reduces a brightness around the connector, and the connector serves as a barrier to prevent a diffusion of light. ", "Due to the above reasons, a nonuniformity of brightness occurs.", "\nAccordingly, conventional technique 2 has been suggested in order to solve this nonuniformity of brightness (for example, see FIG. ", "2A and FIG. ", "2B in Japanese Unexamined Patent Publication No. ", "2007-288194). ", "In the conventional technique 2, a back wiring, instead of the connector, is formed on the back surface of the substrate of each LED module. ", "The back wirings of the LED modules adjacent to each other in one direction are electrically connected, and each LED module is electrically connected to the drive circuit connector.", "\nHowever, in the conventional technique 2, the back wiring has a particular pattern shape determined based on the number of LED modules arranged in one direction, and the back wiring of each LED module has a different pattern shape. ", "Therefore, when the number of LED modules arranged in one direction is changed, it is necessary to prepare an LED module having a back wiring having a pattern shape corresponding to the number of the LED modules.", "\nMoreover, in the conventional technique 1 and the conventional technique 2, a liquid crystal panel smaller than an LED module cannot be supported, and a liquid crystal panel having a size other than integral multiples of the size of the LED module cannot be supported (for example, 1.5 times, 2.5 times, and 3.5 times larger than the LED module).", "\nTherefore, in order to various sizes of liquid crystal panels, it is necessary to increase the types of sizes of the LED modules. ", "However, this would increase the production cost." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0.0033003300330033004, 0.08333333333333333, 0.02040816326530612, 0, 0, 0, 0, 0, 0.007575757575757576, 0.08333333333333333, 0.02040816326530612, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.008398
5
[ "[Support system for cancer patients in the north area of Fukushima].", "\nThe purpose of this study was to elucidate the support system for cancer patients in the north area of Fukushima. ", "The support system includes 3 general hospitals, 2 clinics with home-care hospice, 4 self-help groups, 5 volunteer groups, 3 doctors and nurses from special interest groups and 7 home-care medical services. ", "We displayed this system on Internet (http://www.fmu.ac.jp/home/kanwa)." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.008695652173913044, 0, 0.014084507042253521 ]
0.005695
5
[ "Bernie Sanders to announce for president tomorrow: Report\n\nVermont Public Radio is reporting that Senator Bernie Sanders will announce his intention to seek the Democratic nomination for president tomorrow. ", "Sanders, an independent who says he's a socialist, has been making noises for months about entering the race.", "\n\nHe will release a short statement and hold a campaign kickoff event in subsequent weeks, the radio said, citing several sources. ", "The senator's office did not respond to a request for comment.", "\n\nWith former Secretary of State Hillary Clinton looming as the front-runner for the Democratic nomination in 2016, few other candidates have stepped forward in the party. ", "Former Maryland Governor Martin O'Malley is expected to enter the race next month.", "\n\nSanders, a self-described socialist who caucuses with Democrats in the Senate, and liberal Democrats such as O'Malley and Senator Elizabeth Warren of Massachusetts are pressing Clinton to move to the left on economic policy by embracing tighter Wall Street regulation and a more robust social safety net.", "\n\nSanders, 73, especially has turned up the heat on the former first lady over the Trans-Pacific Partnership and a proposal to fast-track the approval of the 12-nation trade pact.", "\n\nIn a statement last week, Sanders blasted the TPP as a jobs-killer that favors corporations. ", "He then raised questions about where Clinton stands on the issue.", "\n\n\"She's going to have to be clear ... Are you on the side of working people who would suffer as a result of this disastrous trade agreement, and seeing their jobs go to China or Mexico, or are you on the side of corporate America? ", "It's not a very difficult choice,\" Sanders said at a rally protesting the TPP in Washington last week, according to CNN.", "\n\nSanders will be the most entertaining candidate in the race. ", "He says what he thinks, which is usually colorful rants against capitalism, conservatives, and anyone to his right - which is most of the planet.", "\n\nBut can Sanders really pull Hillary and the Democrats off the far left cliff? ", "Not likely. ", "Even if Elizabeth Warren entered the race, Clinton wouldn't change her stance on issues, although she might alter her rhetoric a bit. ", "Sanders won't even force her to do that, considering his miniscule potential impact on the race.", "\n\nSanders says he won't take large donations, so his campaign will be run on a shoe string. ", "Given that no one knows who he is now, with no paid media to speak of, it's likely few will ever know he's even running.", "\n\nVermont Public Radio is reporting that Senator Bernie Sanders will announce his intention to seek the Democratic nomination for president tomorrow. ", "Sanders, an independent who says he's a socialist, has been making noises for months about entering the race.", "\n\nHe will release a short statement and hold a campaign kickoff event in subsequent weeks, the radio said, citing several sources. ", "The senator's office did not respond to a request for comment.", "\n\nWith former Secretary of State Hillary Clinton looming as the front-runner for the Democratic nomination in 2016, few other candidates have stepped forward in the party. ", "Former Maryland Governor Martin O'Malley is expected to enter the race next month.", "\n\nSanders, a self-described socialist who caucuses with Democrats in the Senate, and liberal Democrats such as O'Malley and Senator Elizabeth Warren of Massachusetts are pressing Clinton to move to the left on economic policy by embracing tighter Wall Street regulation and a more robust social safety net.", "\n\nSanders, 73, especially has turned up the heat on the former first lady over the Trans-Pacific Partnership and a proposal to fast-track the approval of the 12-nation trade pact.", "\n\nIn a statement last week, Sanders blasted the TPP as a jobs-killer that favors corporations. ", "He then raised questions about where Clinton stands on the issue.", "\n\n\"She's going to have to be clear ... Are you on the side of working people who would suffer as a result of this disastrous trade agreement, and seeing their jobs go to China or Mexico, or are you on the side of corporate America? ", "It's not a very difficult choice,\" Sanders said at a rally protesting the TPP in Washington last week, according to CNN.", "\n\nSanders will be the most entertaining candidate in the race. ", "He says what he thinks, which is usually colorful rants against capitalism, conservatives, and anyone to his right - which is most of the planet.", "\n\nBut can Sanders really pull Hillary and the Democrats off the far left cliff? ", "Not likely. ", "Even if Elizabeth Warren entered the race, Clinton wouldn't change her stance on issues, although she might alter her rhetoric a bit. ", "Sanders won't even force her to do that, considering his miniscule potential impact on the race.", "\n\nSanders says he won't take large donations, so his campaign will be run on a shoe string. ", "Given that no one knows who he is now, with no paid media to speak of, it's likely few will ever know he's even running." ]
{ "pile_set_name": "Pile-CC" }
[ 0.00966183574879227, 0, 0, 0, 0.011627906976744186, 0.012195121951219513, 0.013071895424836602, 0.00558659217877095, 0.021052631578947368, 0.015384615384615385, 0, 0.016666666666666666, 0, 0, 0.0125, 0, 0.014925373134328358, 0, 0, 0, 0.006666666666666667, 0, 0, 0, 0.011627906976744186, 0.012195121951219513, 0.013071895424836602, 0.00558659217877095, 0.021052631578947368, 0.015384615384615385, 0, 0.016666666666666666, 0, 0, 0.0125, 0, 0.014925373134328358, 0, 0, 0 ]
0.006559
5
[ "First Chaos Emerald?", "\n\nChaos Emerald #1\n\nGo to the circle with a star in the middle and two sticks pointing out,when you go to one\nuse your boost[must have more than 1 tension bar]then a hole will **** you.", "When you reach\nthe special stage use your stylus to collect as many rings as possible and you will get a\nchaos\nemerald!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!", "\n!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!", "\n!!", "\n\nHelp for first chaos emerald\n\nTo get the first chaos emerald, you go in zone 1. ", "When you find a circle with two barriers\non each side.", "Jump onto one of the barriers then hold y or x to give him a boost.", "You will\nsee Sonic spin around and if You have enough boost [on the left] Sonic will jump into a\nYellow circle.", "Thats what brings you to the special stage.", "To play the special stage get the\nsylus out and you have to get more rings than it says.", "If you complete that round you will\ngo to the next round.", "If you complete that round you will get a chaos emerald.", "\n\nHow to get in the special stage\n\nNote that only Sonic can go inside special stage coz a lot of people don't know that. ", "Find\nthe weird circle with 2 sticks sticking out of them. ", "Hang on 1 of them and press the x/y\nbutton until Sonic goes into a circle then use your stylus to control him. ;-)", "\n\nwhy me\n\ni know\n\nFind circle with star inside it two handls jump on one of the hadls make sure you have\nmore then one tension bar hold x or y and sonic or blaze will get sucked in a hole you\nneed to collect at least as many rings it tells you" ]
{ "pile_set_name": "Pile-CC" }
[ 0.05, 0.005405405405405406, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008771929824561403, 0 ]
0.003775
5
[ "This disclosure generally relates to systems and methods for responding to transient conditions in power generation systems and more particularly to a power conversion system, a method for controlling the power conversion system and a wind turbine power generation system.", "\nWind turbines are becoming increasingly used as a source of renewable energy by utility companies. ", "One approach to achieving efficient conversion of mechanical power from blades of a wind turbine into electrical energy supplied to a grid is the use of a doubly fed induction generator (DFIG) combined with a power electronics converter.", "\nThe DFIG includes a stator connected to the grid and a rotor connected between the wind turbine and the grid. ", "In some embodiments, a gearbox is used between the wind turbine and the DFIG to adjust a rotational speed. ", "The power electronics converter is used to convert the mechanical power into electronic power which is then provided to the grid. ", "In one embodiment, the power electronics converter includes a source side converter, a line side converter, a DC link connecting the two converters, and one or more controllers for the source side and line side converters.", "\nWind turbines often operate in complicated conditions which impose high mechanical stresses. ", "At the wind turbine side, during grid fault or wind gust conditions, the mismatch of electrical torque and mechanical torque may result in huge mechanical stress on a tower of the wind turbine and the gearbox, which may cause the tower to shift and potentially sustain damage. ", "Additionally, electrical torque oscillations may influence the mechanical system's lifetime and cost. ", "At the grid side, when electrical power is converted and provided to the grid, if an impedance mismatch is present, some sub-sync oscillations (SSO) or low frequency oscillations (LFO) may occur within the voltage and current provided to the grid. ", "Such oscillations may cause undesired harmonic distortion.", "\nTherefore, it is desirable to provide improved systems and methods to address at least one of the above-mentioned problems." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.009009009009009009, 0.009345794392523364, 0, 0, 0, 0, 0, 0.004032258064516129, 0, 0 ]
0.001722
5
[ "Patterns of nonverbal cognitive functioning in young children with autism spectrum disorders.", "\nPrevious research demonstrates an uneven pattern of cognitive abilities in children with autism spectrum disorders (ASDs). ", "This study examined whether this uneven pattern exists within the nonverbal domain in young children. ", "We hypothesized relative strengths in perceptual abilities and weaknesses in nonverbal conceptual abilities in preschoolers with ASDs compared to groups with non-autism developmental delays and typical development. ", "Profiles were examined using the Leiter International Performance Scale-Revised. ", "The ASD group displayed clear relative strengths in visuospatial disembedding and detail-focused processing, with relative weaknesses in abstraction and concept formation. ", "This contrasted with patterns of roughly equivalent abilities in both comparison groups. ", "These findings have implications for subsequent development and may represent key features of the cognitive profile of autism." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0.012345679012345678, 0.005813953488372093, 0, 0 ]
0.00227
5
[ "Epoxy resins have a spectrum of properties that are well adapted for use in coatings, adhesives, fiber reinforced laminates, composites, engineering plastics, and specialty applications, such as potting resins and mortars. ", "Among those properties are corrosion and solvent resistance, good adhesion and electrical properties, good dimensional stability, hardness, low shrinkage on cure and many other beneficial properties.", "\nEpoxy resins and processes for their production by the reaction of dihydric phenols and epichlorohydrin in the presence of a condensing agent such as caustic soda are well known. ", "Such resins vary in their physical state from liquids to semi-solids to solids and are generally cured to thermoset conditions in the presence of chemical hardening agents such as aromatic amines. ", "Resins produced by such curing have a high molecular weight which renders them particularly suitable for use as coatings, adhesives, and laminates and for use as potting and encapsulating compositions. ", "U.S. Pat. ", "No. ", "3,293,213 and 3,370,038 teach preparation of typical epoxide resins.", "\nOne property of cured epoxide resins which is extremely desirable and useful is a high heat distortion or deflection temperature with its attendant good resistance to solvents and electricity. ", "This property is especially useful for heat resistant coatings and adhesives.", "\nUnfortunately, a major disadvantage of epoxy resins concerns an undesirable brittleness. ", "A partial solution to such a problem has been the addition of reactive liquid polymers (RLP). ", "These RLP's are generally elastomers, such as carboxyl-terminated butadiene-acrylonitrile copolymers, which precipitate out of solution during cure of the polyepoxide. ", "The precipitation results in the formation of discrete elastomer particles or domains which toughen the resin. ", "Although toughening the cured resin, such a technique results in a significantly lowered softening temperature. ", "Particle size is a major factor which determines the mechanical properties. ", "The selectivity and reactivity of the functional groups are critical in the formation of the particles. ", "Also, the curing conditions seriously affect their size and structure. ", "Another disadvantage is that the RLP is limited to low viscosity. ", "Yet another disadvantage involves the relatively poor thermal and oxidative stability of polymers comprising polymerized monomers such as butadiene.", "\nCurable epoxy resin compositions containing acrylate rubbers are disclosed in European Patent Application No. ", "78527. ", "For example, the reference discloses polyepoxides containing rubbers prepared from butyl acrylate. ", "Unfortunately, said rubbers are soluble in the polyepoxide continuous phase at temperatures above about 51.degree. ", "C., and in some instances at room temperature. ", "Thus, undesirable softening of the cured resin can readily occur. ", "In addition, it is difficult to control particle size of the dispersed phase polymerizate because dissolving and reprecipitation of said polymerizate is difficult to control. ", "Control of parameters such as particle size of the polymerizate are critical in optimizing mechanical properties of the composition.", "\nCurable blends of epoxy resins and organopolysiloxanes are disclosed in U.S. Pat. ", "Nos. ", "3,843,577 and 3,926,885. ", "Such epoxy resin composites are disclosed as being dispersions of organopolysiloxanes in an epoxy resin continuous phase. ", "Dispersing agents are employed in preparing such composites. ", "Although the composites are disclosed as having self-lubricating properties, the mechanical properties of such composites are not as great as would be desirable.", "\nIt would be highly desirable to provide a process for significantly improving the toughness of epoxy resins without sacrificing the other properties which would extend the utility of said resins. ", "It would be particularly desirable to provide a product having high heat distortion temperature properties in the cured form. ", "In addition, it would be desirable to provide a room-temperature-cured epoxy resin which has increased flexibility, ductility, and chemical and water resistance." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0.004484304932735426, 0, 0.005555555555555556, 0, 0, 0, 0, 0, 0, 0, 0, 0.010638297872340425, 0.005952380952380952, 0, 0, 0, 0, 0, 0.015151515151515152, 0, 0.009009009009009009, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001373
5
[ "Supplemental jet ventilation in a case of ARDS complicated by bronchopleural fistulae.", "\nTo present a case of unusual ventilatory strategy in a 17 year old girl with the acute respiratory distress syndrome (ARDS) complicated by bilateral bronchopleural fistulae. ", "The patient was ventilated with a combination of conventional pressure control ventilation (PCV) and high frequency jet ventilation (HFJV) for 133 and 110 days, respectively. ", "Despite prolonged hypoxia, extensive barotrauma and nosocomial infections, she survived without significant impairment of respiratory function. ", "Two years later she was healthy and independent with only mildly reduced respiratory reserve. ", "The combination of PCV and HFJV was beneficial in this case of ARDS complicated by bronchopleural fistulae. ", "The case also highlights the utility of HFJV in the desperately hypoxic patient with extensive airway disruption." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0.005714285714285714, 0, 0, 0.009259259259259259, 0 ]
0.002139
5
[ "McMaster expressed his disapproval of Trump’s course to foreign officials during the lead-up to his trip to Germany. ", "The general specifically said he’d disagreed with Trump’s decision to hold an Oval Office meeting in May with top Russian diplomats and with the president’s general reluctance to speak out against Russian aggression in Europe, according to the three foreign officials.", "\n\nMcMaster and other national security aides also advised the president against holding an official bilateral meeting with Putin.", "\n\nIn a highly unusual move, McMaster did not attend the bilateral meeting with Putin. ", "Only Trump, Secretary of State Rex Tillerson and a translator made up the U.S. side." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.017094017094017096, 0.0037313432835820895, 0.015503875968992248, 0.023255813953488372, 0.023809523809523808 ]
0.016679
5
[ "Here's a surprise: Florida's defense is still terrific and good enough to keep the Gators in contention for an SEC title. ", "In a season-opening 24-6 victory over Toledo Saturday, the defense held the Rockets to a minimal 50 rushing yards and 205 total.", "\n\nThe Gators replaced six defensive starters during the offseason but emphatically answered questions about the strength of the unit.", "\n\nThe defensive line swallowed up running back David Fluellen, holding last year's 1,400-yard rusher to 46 yards on nine carries. ", "Senior wide receiver Bernard Reedy, the same player who said the Gators could be worn down, had 50 yards on seven receptions. ", "Quarterback Terrance Owens completed only 17 of 38 passes and threw for 155 yards and an interception.", "\n\nKim Klement-USA TODAY Sports\n\nDominique Easley looked like a man-child at defensive tackle, consistently overpowering his man and making plays in the backfield. ", "Defensive end Jonathan Bullard lined up all over the line throughout the game and also got pressure to force a few poorly timed passes.", "\n\nRonald Powell, who had two knee operations, spent time at linebacker and defensive end. ", "He looked as explosive as ever and was the first Florida player to pick up a sack this season.", "\n\nAnother defender who came up big was true freshman cornerback Vernon Hargreaves III. ", "He made a nice break on the ball in the third quarter and came away with an interception. ", "He's a polished corner who will see plenty of playing time, especially if he can continue to make game-changing plays.", "\n\nWill the Gators defense be better than last years?", "\n\nYesNoSubmit Votevote to see results\n\nWill the Gators defense be better than last years?", "\n\nYes\n\n89.7%\n\nNo\n\n10.3%\n\nTotal votes: 858\n\nOverall, it was an impressive performance against an offense that averaged 445 yards last season. ", "This unit is a lot younger, and many expected it would take time for them to come together and begin playing as well as last year. ", "However, it was hard to tell the difference between 2012's defense and this year's unit. ", "Florida was aggressive, quick to the ball and held an explosive offense to two field goals.", "\n\nThe offense showed bright spots throughout the game as well. ", "The offensive line provided plenty of time for quarterback Jeff Driskel and opened up gaping running lanes for Mack Brown, who finished the game with 112 yards and two touchdowns. ", "But the defense was far more consistent, holding Toledo to only 12 first downs and setting the tone throughout the game.", "\n\nNext week's matchup against Miami will be a tougher task, but it's quite clear Florida still has one of the most talented defenses in the country." ]
{ "pile_set_name": "Pile-CC" }
[ 0.01639344262295082, 0, 0.007518796992481203, 0.007692307692307693, 0.015873015873015872, 0.00980392156862745, 0.012269938650306749, 0.007407407407407408, 0.011111111111111112, 0, 0.011494252873563218, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.011111111111111112, 0, 0 ]
0.004812
5
[ "Q:\n\nOpenLayers.", "Class with OpenLayers.", "Control.", "GetFeature\n\nI'm wondering if someone could point me in the right direction to force the BBOX of OpenLayers.", "Control.", "GetFeature to be always in long/lat coordinates. ", "I'm trying to get this with OpenLayers.", "Class, so the new control will inherit OpenLayers.", "Control.", "GetFeature with just the small modification in BBOX. ", "This is what I've done:\nOpenLayers.", "Control.myGetFeature = OpenLayers.", "Class(OpenLayers.", "Control.", "GetFeature,{\n selectBox: function(position){\n var opts = OpenLayers.", "Control.", "GetFeature(position);\n var baseSRSutm = this.map.getprojectionObject();\n var layerSRSdd = new OpenLayers.", "Projection('EPSG:4326');\n opts.params.bbox = this.map.getExtent().transform(baseSRSutm,layerSRSdd).toBBOX(null,firstLayer.reverseAxisOrder());\n }\n return opts;\n });\n\nbut I'm getting that some \"}\" are missing. ", "Is this the right way to use OpenLayers.", "Class to do what I want?", "\nAny help is much appreciated.", "\nPS. ", "I'm using OpenLayers 2.11\nEDIT:\nMoving \"return opts;\" inside the function solved the above problem but it complained about CLASS_NAME is missing. ", "Adding that, it still complained about the same, but after a couple of clicks or boxes it sent the request, however the sent bbox is still in UTM, where could the problem be? ", "here it is the code:\nvar mycontrol = function(){\n var protocol = new OpenLayers.", "Protocol.", "HTTP({\n url: 'http://www.....',\n format: new OpenLayers.", "Format.", "GeoJSON({\n ignoreExtraDims: true,\n 'internalProjection': new OpenLayers.", "Projection('EPSG:900913'),\n 'externalProjection': new OpenLayers.", "Projection('EPSG:4326')\n })\n });\n\n OpenLayers.", "Control.myGetFeature = OpenLayers.", "Class(OpenLayers.", "Control.", "GetFeature,{\n selectBox: function(position){\n var opts = OpenLayers.", "Control.", "GetFeature(position);\n var baseSRSutm = this.map.getprojectionObject();\n console.log('this is the baseSRSutm' + baseSRSutm); // doesnt appear in firebug\n var layerSRSdd = new OpenLayers.", "Projection('EPSG:4326');\n opts.params.bbox = this.map.getExtent().transform(baseSRSutm,layerSRSdd).toBBOX(null,firstLayer.reverseAxisOrder());\n console.log('this is the opts.params.bbox' + opts.params.bbox); // doesnt appear in firebug\n return opts;\n },\n CLASS_NAME: \"OpenLayers.", "Control.myGetFeature\"\n });\n\n return new OpenLayers.", "Control.myGetFeature({\n protocol: protocol,\n box: true,\n click: true,\n single: false,\n clickTolerance: 10,\n eventListeners:{\n // some stuff\n }\n });\n };\n\nbecause the console.log doesn't appear in firebug, I think the problem is in the OpenLayers.", "Control.myGetFeature and OpenLayers.", "Class. ", "It seems to me that the \"selectBox\" function is the one I need, but the subclass itself is not read by the return.", "\nPlease help on this one, thanks in advance,\n\nA:\n\nfinally it worked, the trick is to use the prototype and selectBox and then apply the conversion between the base map projection and the displayProjection, in this case between 900913 and 4326. ", "I got the idea here: http://osgeo-org.1560.n6.nabble.com/Order-Priority-of-Control-GetFeature-and-Control-WMSGetFeatureInfo-on-click-td4997282.html\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0.045454545454545456, 0, 0.018691588785046728, 0, 0.02040816326530612, 0.02564102564102564, 0.02, 0, 0.018867924528301886, 0, 0.029411764705882353, 0, 0, 0.023255813953488372, 0, 0.007874015748031496, 0.004219409282700422, 0.025, 0, 0, 0, 0.00684931506849315, 0.005714285714285714, 0.011494252873563218, 0, 0.01282051282051282, 0, 0.00980392156862745, 0.0125, 0, 0.029411764705882353, 0, 0, 0.02127659574468085, 0, 0.0136986301369863, 0.0029940119760479044, 0.015873015873015872, 0.002881844380403458, 0.027777777777777776, 0, 0, 0, 0.006711409395973154 ]
0.009303
5
[ "Physician-led: good idea or not?", "\nWhether physicians or not, leaders must possess certain skills and qualities to achieve success. ", "Take a look at what's required to be an effective leader." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0 ]
0
5
[ "Q:\n\nMYSQL with Where and Like And not in\n\nI compare two tables and output the values there was not in the rows.", "\n SELECT one, two FROM `table1` WHERE `two` NOT IN \n(SELECT `two2` FROM `table2`) AND `one` NOT IN (SELECT `one1` FROM `table2`)\n\nHow can i add a like... like row '%two' not in '%two2'?", "\ni like to check: \nSELECT one, two FROM table1 WHERE LIKE %two NOT IN (SELECT LIKE %two2 FROM table2) \n\nbecause in this tables are from time to time a 0 at first place but this i must fade out\nI have no variables only the row names. ", "Is any way i can do that?", "\n\nA:\n\nYou may invert your condition and use tricky LEFT JOIN instead. ", "Then, your query will look like this:\nSELECT one, two FROM `table1`\nLEFT JOIN `table2` ON\n `table1`.", "`one` = `table2`.", "`one1`\n OR `table1`.", "`two` = `table2`.", "`two2`\n -- List others field comparasion using OR here --\nWHERE `table2`.", "`one1` IS NULL;\n\nThat approach will help you reduce the number of subqueries and improve performance and readability greatly.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "/* \n dstr.c (c) 1997-8 Grant R. Guenther <grant@torque.net>\n Under the terms of the GNU General Public License.", "\n\n dstr.c is a low-level protocol driver for the \n DataStor EP2000 parallel to IDE adapter chip.", "\n\n*/\n\n/* Changes:\n\n 1.01 GRG 1998.05.06 init_proto, release_proto\n\n*/\n\n#define DSTR_VERSION \"1.01\"\n\n#include <linux/module.h>\n#include <linux/init.h>\n#include <linux/delay.h>\n#include <linux/kernel.h>\n#include <linux/types.h>\n#include <linux/wait.h>\n#include <asm/io.h>\n\n#include \"paride.h\"\n\n/* mode codes: 0 nybble reads, 8-bit writes\n 1 8-bit reads and writes\n 2 8-bit EPP mode\n\t\t3 EPP-16\n\t\t4 EPP-32\n*/\n\n#define j44(a,b) (((a>>3)&0x07)|((~a>>4)&0x08)|((b<<1)&0x70)|((~b)&0x80))\n\n#define P1\tw2(5);w2(0xd);w2(5);w2(4);\n#define P2\tw2(5);w2(7);w2(5);w2(4);\n#define P3 w2(6);w2(4);w2(6);w2(4);\n\n/* cont = 0 - access the IDE register file \n cont = 1 - access the IDE command set \n*/\n\nstatic int cont_map[2] = { 0x20, 0x40 };\n\nstatic int dstr_read_regr( PIA *pi, int cont, int regr )\n\n{ int a, b, r;\n\n r = regr + cont_map[cont];\n\n\tw0(0x81); P1;\n\tif (pi->mode) { w0(0x11); } else { w0(1); }\n\tP2; w0(r); P1;\n\n switch (pi->mode) {\n\n case 0: w2(6); a = r1(); w2(4); w2(6); b = r1(); w2(4);\n return j44(a,b);\n\n case 1: w0(0); w2(0x26); a = r0(); w2(4);\n return a;\n\n\tcase 2:\n\tcase 3:\n case 4: w2(0x24); a = r4(); w2(4);\n return a;\n\n }\n return -1;\n} \n\nstatic void dstr_write_regr( PIA *pi, int cont, int regr, int val )\n\n{ int r;\n\n r = regr + cont_map[cont];\n\n\tw0(0x81); P1; \n\tif (pi->mode >= 2) { w0(0x11); } else { w0(1); }\n\tP2; w0(r); P1;\n\t\n switch (pi->mode) {\n\n case 0:\n case 1: w0(val); w2(5); w2(7); w2(5); w2(4);\n\t\tbreak;\n\n\tcase 2:\n\tcase 3:\n case 4: w4(val); \n break;\n }\n}\n\n#define CCP(x) w0(0xff);w2(0xc);w2(4);\\\n\t\t w0(0xaa);w0(0x55);w0(0);w0(0xff);w0(0x87);w0(0x78);\\\n\t\t w0(x);w2(5);w2(4);\n\nstatic void dstr_connect ( PIA *pi )\n\n{ pi->saved_r0 = r0();\n pi->saved_r2 = r2();\n w2(4); CCP(0xe0); w0(0xff);\n}\n\nstatic void dstr_disconnect ( PIA *pi )\n\n{ CCP(0x30);\n w0(pi->saved_r0);\n w2(pi->saved_r2);\n} \n\nstatic void dstr_read_block( PIA *pi, char * buf, int count )\n\n{ int k, a, b;\n\n w0(0x81); P1;\n if (pi->mode) { w0(0x19); } else { w0(9); }\n\tP2; w0(0x82); P1; P3; w0(0x20); P1;\n\n switch (pi->mode) {\n\n case 0: for (k=0;k<count;k++) {\n w2(6); a = r1(); w2(4);\n w2(6); b = r1(); w2(4);\n buf[k] = j44(a,b);\n } \n break;\n\n case 1: w0(0);\n for (k=0;k<count;k++) {\n w2(0x26); buf[k] = r0(); w2(0x24);\n }\n w2(4);\n break;\n\n case 2: w2(0x24); \n for (k=0;k<count;k++) buf[k] = r4();\n w2(4);\n break;\n\n case 3: w2(0x24); \n for (k=0;k<count/2;k++) ((u16 *)buf)[k] = r4w();\n w2(4);\n break;\n\n case 4: w2(0x24); \n for (k=0;k<count/4;k++) ((u32 *)buf)[k] = r4l();\n w2(4);\n break;\n\n }\n}\n\nstatic void dstr_write_block( PIA *pi, char * buf, int count )\n\n{ int\tk;\n\n w0(0x81); P1;\n if (pi->mode) { w0(0x19); } else { w0(9); }\n P2; w0(0x82); P1; P3; w0(0x20); P1;\n\n switch (pi->mode) {\n\n case 0:\n case 1: for (k=0;k<count;k++) {\n w2(5); w0(buf[k]); w2(7);\n }\n w2(5); w2(4);\n break;\n\n case 2: w2(0xc5);\n for (k=0;k<count;k++) w4(buf[k]);\n\t\tw2(0xc4);\n break;\n\n case 3: w2(0xc5);\n for (k=0;k<count/2;k++) w4w(((u16 *)buf)[k]);\n w2(0xc4);\n break;\n\n case 4: w2(0xc5);\n for (k=0;k<count/4;k++) w4l(((u32 *)buf)[k]);\n w2(0xc4);\n break;\n\n }\n}\n\n\nstatic void dstr_log_adapter( PIA *pi, char * scratch, int verbose )\n\n{ char *mode_string[5] = {\"4-bit\",\"8-bit\",\"EPP-8\",\n\t\t\t\t \"EPP-16\",\"EPP-32\"};\n\n printk(\"%s: dstr %s, DataStor EP2000 at 0x%x, \",\n pi->device,DSTR_VERSION,pi->port);\n printk(\"mode %d (%s), delay %d\\n\",pi->mode,\n\t\tmode_string[pi->mode],pi->delay);\n\n}\n\nstatic struct pi_protocol dstr = {\n\t.owner\t\t= THIS_MODULE,\n\t.name\t\t= \"dstr\",\n\t.max_mode\t= 5,\n\t.epp_first\t= 2,\n\t.default_delay\t= 1,\n\t.max_units\t= 1,\n\t.write_regr\t= dstr_write_regr,\n\t.read_regr\t= dstr_read_regr,\n\t.write_block\t= dstr_write_block,\n\t.read_block\t= dstr_read_block,\n\t.connect\t= dstr_connect,\n\t.disconnect\t= dstr_disconnect,\n\t.log_adapter\t= dstr_log_adapter,\n};\n\nstatic int __init dstr_init(void)\n{\n\treturn paride_register(&dstr);\n}\n\nstatic void __exit dstr_exit(void)\n{\n\tparide_unregister(&dstr);\n}\n\nMODULE_LICENSE(\"GPL\");\nmodule_init(dstr_init)\nmodule_exit(dstr_exit)\n" ]
{ "pile_set_name": "Github" }
[ 0.013245033112582781, 0.00909090909090909, 0.012904547316673495 ]
0.011747
5
[ "Speke residents say an estate where a man was shot today is plagued by trouble and more needs to be done to tackle crime in the area.", "\n\nA 22-year-old man was seriously injured in the shooting when he was blasted in the arm and leg.", "\n\nEmergency services were called at around 5.25am to reports a man had been shot in Hindley Walk.", "\n\nThe victim was taken to hospital where his condition is described as “serious but not life-threatening”. ", "A car nearby also sustained gun shot damage.", "\n\nDam Wood Road, which leads on to Hindley Walk, was taped off by police this morning in a large cordon spanning around 40 houses.", "\n\nResidents told of waking to see police cars and blue flashing lights outside.", "\n\nThe cordoned off scene in Speke\n\nOne said she thought the shot she heard was a firework and looked out the window to see a dark coloured car driving off.", "\n\nShe later saw police cars and an ambulance arrive.", "\n\nForensic officers in white suits could be seen examining the scene on Dam Wood Road whilst police spoke to residents.", "\n\nThose living on the estate, opposite Liverpool John Lennon Airport, said there has been an increasing amount of crime on the surrounding streets, with several shootings in the past two years as well as problems with drugs and burglaries.", "\n\n'Most of the time it's drugs related'\n\nOne man said: “You just get fed up with it. ", "We did have a quiet spell but it’s just built up again. ", "There’s no repercussions for what anyone does. ", "Most of the time it’s drugs related.”", "\n\nAnother man agreed and said: “There’s problems with drugs. ", "There’s houses being broken into too.”", "\n\nOne woman said: “It is scary. ", "There’s been a few things gone on. ", "There should be more police around, although I know they’ve had to cut back on them. ", "It’s a shame.”", "\n\nPolice at the cordoned off scene\n\nA neighbour said: “You get used to it around here. ", "Nothing shocks us anymore, it’s just another shooting.”", "\n\nOthers said though that they weren’t aware of any trouble but preferred to keep themselves to themselves.", "\n\nOne woman said: “It’s frightening, it is scary.”", "\n\nPolice say their investigation is in its early stages and the full circumstances of the incident are unclear and the motive is unknown.", "\n\nA spokesman for Merseyside Police said detectives from the force’s Matrix Serious Organised Crime unit are leading the investigation into the shooting and officers are keeping an open mind as to the motive.", "\n\nUniformed officers have stepped up patrols in Speke to provide reassurance to the local community.", "\n\nAnyone who witnessed this incident or who has any information about it, is asked to contact the MSOC Guncrime hotline on 0800 230 0600 or Crimestoppers anonymously on 0800 555 111." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0.007692307692307693, 0, 0.0064516129032258064, 0, 0, 0.0041841004184100415, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004807692307692308, 0.01, 0.005494505494505495 ]
0.001332
5
[ "Vehicle\n\n2010 Toyota Venza 4dr Wagon (3.5L 6cyl 6A)\n\nReview\n\nAfter 6 months I still like this car. ", "I was given a loaner for a few days till mine came in. ", "The loaner had Goodyear tires. (", "Junk) Mine came with Michelin. ", "All most no noise, soft over bumps. ", "The V6 has plenty of power, drove it 2400 miles in 10 days. ", "through the smokey mountains the cruse control held with out downshifting. ", "Average mpg was 25.6 across Ohio and lower Michigan it got 26.4 (I set the cruse at the posted limit) To work and back average is 24.1mpg. ", "The seats are very comfy. ", "800 miles one day with no back or leg pain. ", "Plenty of room for big shopping trips.", "\n\nFavorite Features\n\nExhaust note! ", "Comfortable seats.", "\n\nSuggested Improvements\n\nintermittent wipers have 4 steps, 3 are so slow they are useless. ", "Passenger wiper stops travel in drivers line of sight leaving a 1 inch wide fuzzy area right where you need a clear view. ", "No lockable storage in cabin. ", "center console needs a indention for drivers knee.", "\n\n† Edmunds.com received the highest numerical score in the proprietary J.D. Power 2014 Third-Party Automotive Website Evaluation Study℠. ", "Results based on responses from 3,381 responses, measuring 14 companies and measures third-party automotive website usefulness among new and used vehicle shoppers. ", "Proprietary study results are based on experiences and perceptions of owners surveyed from January 2014. ", "Your experiences may vary. ", "Visit jdpower.com." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.03125, 0.03225806451612903, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.014492753623188406, 0, 0, 0, 0 ]
0.003545
5
[ "The human heart periodically contracts to force blood through the arteries. ", "As a result of this pumping action, pressure pulses or oscillations exist in these arteries and cause them to cyclically change volume. ", "The minimum pressure during each cycle is known as the diastolic pressure and the maximum pressure during each cycle is known as the systolic pressure. ", "A further pressure value, known as the “mean arterial pressure” (MAP) represents a time-weighted average of the measured blood pressure over each cycle.", "\nWhile many techniques are available for the determination of the diastolic, systolic, and mean atrial pressures of a patient, one such method typically used in non-invasive blood pressure monitoring is referred to as the oscillometric technique. ", "This method of measuring blood pressure involves applying an inflatable cuff around an extremity of a patient's body, such as the patient's upper arm. ", "The cuff is then inflated to a pressure above the patient's systolic pressure and then incrementally reduced in a series of small steps. ", "A pressure sensor pneumatically connected to the cuff measures the cuff pressure throughout the deflation process. ", "The sensitivity of the sensor is such that it is capable of measuring the pressure fluctuations occurring within the cuff due to blood flowing through the patient's arteries. ", "With each beat, blood flow causes small changes in the artery volume which are transferred to the inflated cuff, further causing slight pressure variations within the cuff which are then detected by the pressure sensor. ", "The pressure sensor produces an electrical signal representing the cuff pressure level combined with a series of small periodic pressure variations associated with the beats of a patient's heart for each pressure step during the deflation process. ", "It has been found that these variations, called “complexes” or “oscillations,” have a peak-to-peak amplitude which is minimal for applied cuff pressures above the systolic pressure. ", "As the cuff pressure is decreased, the oscillation size begins to monotonically grow and eventually reaches a maximum amplitude. ", "After the oscillation size reaches the maximum amplitude, the oscillation size decreases monotonically as the cuff pressure continues to decrease. ", "Oscillametric data such as this is often described as having a “bell curve” appearance. ", "Indeed, a best-fit curve, or envelope, may be calculated representing the measured oscillometric pulses. ", "Physiologically, the cuff pressure at the maximum oscillation amplitude value approximates the MAP. ", "In addition, complex amplitudes at cuff pressures equivalent to the systolic and diastolic pressures have a fixed relationship to this maximum oscillation amplitude value. ", "Thus, the oscillometric method is based upon measurements of detected oscillation amplitudes at various cuff pressures.", "\nBlood pressure measuring devices operating according to the oscillometric method detect the amplitude of the pressure oscillations at various applied cuff pressure levels. ", "The amplitudes of these oscillations, as well as the applied cuff pressure, are stored together as the device automatically changes the cuff pressures through a predetermined pressure pattern. ", "These oscillation amplitudes define an oscillometric “envelope” and are evaluated to find the maximum value and its related cuff pressure, which is approximately equal to MAP. ", "The cuff pressure below the MAP value which produces an oscillation amplitude having a certain fixed relationship to the maximum value is designated as the diastolic pressure, and, likewise, the cuff pressures above the MAP value which results in complexes having an amplitude with a certain fixed relationship to that maximum value is designated as the systolic pressure. ", "The relationships of oscillation amplitude at systolic and diastolic pressures, respectively, to the maximum value at MAP are empirically derived ratios depending on the preferences of those of ordinary skill in the art. ", "Generally, these ratios are designated in the range of 40%-80% of the amplitude at MAP.", "\nOne way to determine oscillation magnitudes is to computationally fit a curve to the recorded oscillation amplitudes and corresponding cuff pressure levels. ", "The fitted curve may then be used to compute an approximation of the MAP, systolic, and diastolic data points. ", "An estimate of MAP is taken as the cuff pressure level with the maximum oscillation. ", "One possible estimate of MAP may therefore be determined by finding the point on the fitted curve where the first derivative equals zero. ", "From this maximum oscillation value data point, the amplitudes of the oscillations at the systolic and diastolic pressures may be computed by taking a percentage of the oscillation amplitude at MAP. ", "In this manner, the systolic data point and the diastolic data point along the fitted curve may each be computed and therefore their respective pressures may also be estimated. ", "This curve fitting technique has the advantage of filtering or smoothing the raw oscillometric data. ", "However, in some circumstances it is been found that additional filtering techniques used to build and process the oscillometric envelope could improve the accuracy of the determination of the blood pressure values.", "\nThe reliability and repeatability of blood pressure computations hinges on the ability to accurately determine the oscillation amplitude. ", "However, the determination of the oscillation amplitudes is susceptible to artifact contamination. ", "As the oscillometric method is dependent upon detecting tiny fluctuations in measured cuff pressure, outside forces affecting this cuff pressure may produce artifacts that in some cases may completely mask or otherwise render the oscillometric data useless. ", "One such source of artifacts is from voluntary or involuntary motion by the patient. ", "Involuntary movements such as the patient shivering may produce high frequency artifacts in the oscillometric data. ", "Voluntary motion artifacts, such as those caused by the patient moving his or her arm, hand, or torso, may produce low frequency artifacts.", "\nPresently available systems may be able to determine whether or not collected oscillometric data has been corrupted with artifact; however, current filtering techniques are ineffective at removing artifacts that have similar frequency content as the desired oscillometric data. ", "Alternatively, non-invasive blood pressure systems may simply reject oscillometric data that has been designated as being corrupted by artifacts. ", "In these instances, more oscillometric data must be collected at each pressure step until reasonably artifact free oscillometric data may be acquired. ", "This may greatly lengthen the time for determination of a patient's blood pressure and submit the patient to increased discomfort that is associated with the inflatable cuff restricting blood flow to the associated extremity." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.006578947368421052, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01, 0, 0, 0, 0, 0.005681818181818182, 0.005361930294906166, 0.004524886877828055, 0.011494252873563218, 0, 0.009009009009009009, 0.011764705882352941, 0.007246376811594203, 0.005025125628140704, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001783
5
[ "They say variety is the spice of life—but it can be downright poisonous to your career path. ", "Maybe it took you a while to figure out your passion, so you dabbled in this and that. ", "Perhaps you made a few detours in light of the tough job market. ", "Or maybe you’re one of the millions of people juggling distinct part-time gigs rather than one full-time role.", "\n\nExploring different options can work in your favor because it broadens your experience and exposes you to a variety of fields. ", "Problem is, when you apply for a position you really want that speaks to your skill set and professional goals, hiring managers might pass you up in favor of candidates who took a more linear route.", "\n\nCareer experts are seeing an increase in jack-of-all-trades job hunters, something they attribute to a couple of different factors. \"", "Because of all the layoffs during the recession, workers were forced to take jobs they didn’t really want that might not have been the best fit,\" says Hannah Morgan, career strategist at Career Sherpa. ", "The go-getter spirit of the millennial generation also comes into play. ", "If millennials don’t receive promotions as quickly as they’d like, they tend to move on to a more desirable position, says Morgan, even if it’s not exactly on their career trajectory.", "\n\nYet despite all the job hopefuls with generalist backgrounds, employers are increasingly seeking candidates who have specialized expertise. ", "Since there’s no longer an expectation of lifetime employment with a single company, many companies aren’t committed to developing and training employees, Morgan says. \"", "They know someone is out there who has the exact skills they want, and it makes their lives easier not to train them,\" she says.", "\n\nIf your resume features some seemingly unconnected positions, the trick is to weave them together into a cohesive narrative that assures employers you possess the skills they’re after and gets them excited about hiring you. ", "Here are strategies that can help you do just that—so you can transform your job-hopper history from a liability to an advantage.", "\n\nTake a hard look at where you’ve been career-wise and where you want to go. ", "Then begin to paint a picture for hiring managers that explains why your job history actually has been a logical progression, although your path has been circuitous. ", "For example, you had one job in marketing and another in accounting because ultimately you want to manage a company, and you sought experience in both departments to round out your knowledge.", "\n\nOnce you bridge each job to the next, make light of the benefits of having a generalist background. ", "Rather than something to play down, you recast it as a marketable skill. \"", "Let’s say an employer wants someone who comes up to speed quickly,\" Morgan says. \"", "A job-hopper has done that.\" ", "In your resume and cover letter, brand yourself as someone who makes a fast impact in the workplace.", "\n\nIn addition, \"generalists can provide a broad perspective to the business, which can be very valuable,\" says Sharlyn Lauby, an author, speaker, and president of consulting firm ITM Group. \"", "But organizations still need generalists to produce—so make sure your resume can show specific results, and quantify them whenever possible.\" ", "Including a line like \"mastered new operating procedures and increased efficiency by 15% within three months\" highlights how you’ve made a speedy, measurable improvement.", "\n\nWithout those details, your resume could send the wrong message. \"", "If you are not specific about your contributions in each role on your resume, some readers may assume the reason you keep moving from job to job is that you aren’t succeeding or you don’t know what you want to do,\" says Miriam Salpeter, owner of Keppie Careers. \"", "Instead of just creating a laundry list of the tasks you’ve done in each role, incorporate detailed explanations of skills you used and outline your accomplishments.\"", "\n\nRemember that recruiters get dozens of job applications daily, and if they don’t immediately see that you fit the description of the employee they’re looking for, they may move on. \"", "Candidates need to help recruiters help them,\" Lauby says. ", "Your resume and cover letter need to make connections that tell the complete story.", "\n\nThe best way to do that is to tailor your resume and cover letter to fit the job description. ", "Many job hunters simply skim the company’s posting, slightly tweak their resume accordingly, and shoot it off to HR. ", "But if you want to set the hiring manager’s mind at ease about your wide-ranging history, don’t gloss over this crucial piece of info. \"", "The job description explains point-blank what the employer is looking for,\" Morgan says. \"", "What you talk about on your resume has to match up exactly.\"", "\n\nOf course, we aren’t suggesting that you regurgitate the same language used in the description; instead, include a separate, concrete example from your experience that speaks to each requirement. ", "For instance, Morgan suggests that if the job posting mentions that the candidate must be able to generate new business, one of the bullet points on your resume should touch on a moment when you did precisely that.", "\n\nThe looser the connection, the more creative thinking required on your part—e.g., you developed outreach to a new community or improved customer relations with a key client, leading them to recommend your services to others. \"", "It’s possible you have a very similar experience in a different industry,\" Morgan says. ", "The goal is to find a common point of intersection between your past and the position you’re applying for.", "\n\nIf you have the sense that your work history might be problematic for the employer you’re meeting with, it’s a good idea to address it. \"", "Know what your elephants in the room are,\" Morgan says.", "\n\nWhen asked about your experience and qualifications, explain how your past jobs have taught you to use the particular skills that the hiring manager is looking for. ", "For example, your tech skills are top-notch because job-hopping forced you to quickly master many programs. ", "Acclimating to different work environments has polished your team building and collaboration smarts, which helped enhance the business. ", "Clarify that you moved around because you naturally seek challenges and the opportunity to make a measurable impact. \"", "Say, ‘I was looking for a greater challenge in the workplace, so I moved on to find that challenge and make an impact more quickly,’\" Morgan suggests.", "\n\nIf the employer directly asks about your short-term track record, it could be a sign that she worries you might jump ship if you join her team. \"", "Emphasize that you contribute your utmost in every job,\" Salpeter says. \"", "Then elaborate on the skills you’ll bring to her organization, why you’re so excited about the position, and how well prepared you are to contribute on day one.\"", "\n\nPay close attention to the summary portion of LinkedIn, where you can clarify your top skills as well as the direction you hope to head in career-wise before employers even get to the actual resume listing your experience. ", "Salpeter suggests phrasing things in a way that sets you up as a challenge seeker who gets results fast. ", "Eliminate doubt about your commitment to the job by saying something like, \"I’ve had the opportunity to use xyz expertise to accomplish [fill in the blank] in various roles over the past several years. ", "Working in different environments kept my skills sharp and allowed me to stay on the cutting edge. ", "As a result, my employers see that I’m able to accomplish more in a short period of time than many people who have been at the organization long term. ", "I’m always continuing to learn, and hope to work for a company that will allow me to grow and contribute at increasing levels over time.\"", "\n\nSocial media can also help foster the impression of commitment—something that a too-broad background might imply you’re lacking. \"", "Use your Twitter feed or actively participate in a LinkedIn group to demonstrate your professional know-how and interest,\" Salpeter says. \"", "Consistently sharing insights, articles, and resources with people shows that you’re well informed about the field and you follow it closely.\"", "\n\nOnce you put all these techniques in play, hiring managers should be able to clearly understand the rationale behind your all-over-the-map job choices and see how they fit naturally together. ", "You’ll be perceived as perhaps an even more powerful candidate than someone who’s climbed the ladder with laser-like focus." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0.0049504950495049506, 0, 0.00546448087431694, 0, 0.005917159763313609, 0, 0, 0, 0, 0, 0, 0, 0, 0.012195121951219513, 0, 0, 0.010471204188481676, 0, 0, 0, 0.0076045627376425855, 0, 0, 0.01694915254237288, 0, 0, 0, 0, 0.011111111111111112, 0, 0, 0.004672897196261682, 0, 0.011363636363636364, 0, 0, 0.01818181818181818, 0, 0, 0, 0, 0.006666666666666667, 0, 0.0136986301369863, 0, 0, 0, 0, 0, 0, 0, 0, 0.014388489208633094, 0, 0, 0 ]
0.00228
5
[ "Deekay Knight\n\n__NOTOC__\n\nThe Deekay Knight was a British two-seat cabin monoplane designed by S.C.Hart-Still and built in 1937 by the Deekay Aircraft Corporation at Broxbourne in Hertfordshire, England. ", "It was built to test methods of wing construction that would later be suitable for plastic skinning.", "\n\nDevelopment\nThe Knight was a conventional looking low-wing monoplane, with a fixed tailwheel landing gear, the main legs housed in trouser fairings and powered by a nose-mounted 90 hp (67 kW) Blackburn Cirrus Minor piston engine. ", "It had an enclosed cabin with side-by-side seating for two. ", "It had an unusual wing construction which used four spars and interspars instead of ribs. ", " Though the wing was made of wood throughout, with a stressed plywood skin, the purpose of its novel construction was to explore methods suitable for later use with plastic materials. ", " The wing was tested at the Royal Aircraft Establishment Farnborough and the root fittings but not the wing failed at 12.3 times the weight of the aircraft, well beyond the target load factor of 9. ", "Only one aircraft, registered G-AFBA, was built which was scrapped sometime during the Second World War.", "\n\nSpecifications\n\nReferences\n\nNotes\n\nBibliography\n\nCategory:1930s British civil utility aircraft\nCategory:Low-wing aircraft\nCategory:Single-engined tractor aircraft\nCategory:Aircraft first flown in 1937" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.00980392156862745, 0, 0.004310344827586207, 0, 0, 0, 0.010101010101010102, 0.009615384615384616, 0 ]
0.003759
5
[ "Q:\n\nBearer error=\"invalid_token\", error_description=\"The signature is invalid\"\n\nI have a angular application that request a token from azure. ", "The login went well and I get a token. ", "This token is now send from the angular app to a net core webapi application. ", "Net core should verify this token but failed. ", "I think the webapi should also contact azure to validate the token because it has no knowledge of the private and public key that is needed to verify the token.", "\nAt the moment it is not clear why it is failing. ", "Both angular app and the webapi are running local on my computer.", "\nThe error is: Microsoft.", "IdentityModel.", "Tokens.", "SecurityTokenInvalidSignatureException: 'IDX10500: Signature validation failed. ", "No security keys were provided to validate the signature.'", "\nmy net core 2 config is:\nvar tokenValidationParameters = new TokenValidationParameters\n {\n\n RequireExpirationTime = true,\n RequireSignedTokens = false,\n ValidateIssuerSigningKey = true,\n ValidateIssuer = true,\n ValidIssuer = \"8d708afe-2966-40b7-918c-a39551625958\",\n ValidateAudience = true,\n ValidAudience = \"https://sts.windows.net/a1d50521-9687-4e4d-a76d-ddd53ab0c668/\",\n ValidateLifetime = false,\n ClockSkew = TimeSpan.", "Zero\n };\n services.", "AddAuthentication(options =>\n {\n options.", "DefaultScheme = JwtBearerDefaults.", "AuthenticationScheme;\n\n }).AddJwtBearer(options =>\n {\n\n options.", "Audience = \"8d708afe-2966-40b7-918c-a39551625958\";\n options.", "ClaimsIssuer = \"https://sts.windows.net/a1d50521-9687-4e4d-a76d-ddd53ab0c668/\";\n options.", "RequireHttpsMetadata=false;\n options.", "TokenValidationParameters = tokenValidationParameters;\n options.", "SaveToken = true;\n });\n\nA:\n\nThat is quite a lot of configuration you have :)\nThe two mandatory settings are the Audience and Authority:\nservices\n .AddAuthentication(JwtBearerDefaults.", "AuthenticationScheme)\n .AddJwtBearer(o =>\n {\n o.Audience = \"8d708afe-2966-40b7-918c-a39551625958\";\n o.Authority = \"https://login.microsoftonline.com/a1d50521-9687-4e4d-a76d-ddd53ab0c668/\";\n });\n\nYou are missing the Authority so it does not know where to load the signing public keys from.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0.04, 0.07142857142857142, 0, 0, 0, 0.007029876977152899, 0, 0, 0.029411764705882353, 0.009900990099009901, 0, 0.019230769230769232, 0, 0, 0.01015228426395939, 0.012861736334405145, 0 ]
0.008334
5
[ "Five days ago, Earl Morrall passed away at the age of 79. ", "His story is well-known to many, but it’s one worth recounting for the uninitiated.", "\n\nBorn in Muskegon, Michigan, Morrall was a star quarterback and baseball player at Michigan State. ", "He made it to the College World Series in 1954 as an infielder, and a year later he guided the Spartans to a 9-1 record as a senior and a victory over UCLA in the Rose Bowl. ", "Morrall was selected by San Francisco with the 2nd overall pick in the 1956 draft, where he sat behind Y.A. Tittle for a year.", "\n\nIn that draft, Pittsburgh used the first overall pick on safety/kicker Gary Glick, who had been a jack of all trades in college, but the team quickly had buyer’s remorse. ", "After the 49ers selected John Brodie with the third pick in the 1957 draft, the Steelers saw an opportunity to acquire Morrall, and did so by sending two future first round picks (and linebacker Marv Matuszak) to the 49ers for Morrall.1\n\nWhy was Pittsburgh so desperate to trade for him? ", "Because Pittsburgh really needed a passer: the only other quarterbacks on the roster at the time were a pair of 22-year-olds named Len Dawson (yes that Len Dawson), whom the Steelers selected with the 5th pick in the ’57 draft, and Jack Kemp (yes that Jack Kemp). ", "The Steelers knew you couldn’t count on young quarterbacks — the team released a 22-year-old Johnny Unitas two years earlier — which explains the trade with the 49ers. ", "As a reminder, just about everything Pittsburgh did before 1970 was a disaster.", "\n\nMorrall produced solid numbers as the Steelers starter in ’57, but threw seven interceptions in his first two starts with the Steelers in 1958. ", "Pittsburgh’s head coach at the time was Buddy Parker, who had coached the Lions from 1951 to 1956. ", "Parker was not content to turn the job over to Dawson, so he traded Morrall and a pair of picks2 to Detroit for his old quarterback, Bobby Layne.", "\n\nMorrall started 26 games in 7 years in Detroit, mostly sitting on the bench behind Tobin Rote, Jim Ninowski, and Milt Plum. ", "Backing up Rote was understandable: in 1956, Rote led the NFL in passing yards and touchdowns while with the Packers, and in ’57 he won the championship for Detroit when he replaced Layne for the stretch run.3 Plum was outstanding with the Browns from ’59 to ’61, so it makes sense that Morrall couldn’t supplant Plum from ’62 to ’64. ", "The weird one was Ninowski, who ironically was the man Morrall passed the torch to at Michigan State. ", "But while this Sparatan was no Morrall, he managed to start 18 games in ’60 and ’61 for the Lions. ", "In any event, the best quarterback in Detroit from 1958 to ’64 wasn’t Plum or Rote, but Morrall.", "\n\nMorrall played well with the Lions, but could never convince George Wilson to hand him the job (Morrall generally played well, but injuries or the random bad game seemed to doom him whenever he had a chance to steal the starting spot). ", "One special moment for him came in 1960 in Baltimore. ", "That day, Unitas hit Lenny Moore for what appeared to be the game-winning touchdown pass with just 14 seconds remaining. ", "But, incredibly, Morrall somehow threw a short pass to Jim Gibbons that turned into a 65-yard, game-winning touchdown as time expired.", "\n\nBut short bursts of success aside, Morrall mostly toiled in Detroit for most of his twenties. ", "Then, in 1965, his manifest destiny was fulfilled as he was called upon to replace Y.A. Tittle. ", "By the ’60s, of course, Tittle was a Giant, but he retired after the 1964 season. ", "New York went into training camp in ’65 without much of a replacement for Tittle; then in August, it dawned on the team that they might need a quarterback.", "\n\nIn a complicated, three-team deal involving the Browns, the Giants acquired Morrall from Detroit (the Lions were content with Plum). ", "Nine years after being drafted by the 49ers, Morrall was finally the heir apparent to Tittle. ", "Morrall played well — the Giants ranked 5th out of 14 teams in ANY/A — and he fit well with notorious deep threat star receiver Homer Jones. ", "Unfortunately, the success was short-lived, as Morrall regressed significantly to start the 1966 season. ", "A mid-season injury left Morrall with a 1-5-1 record and ugly passing numbers (although backup Gary Wood was even worse). ", "New York finished 1-12-1, and decided the only way to save the franchise was to trade for Fran Tarkenton.", "\n\nMorrall could not compete with that Hall of Fame quarterback, of course, and Tarkenton had a magnificent season in 1967, starting all fourteen games and leading the NFL in touchdown percentage. ", "Morrall threw just 24 passes and appeared to be in for more of the same in 1968. ", "At 34 years of age and with a 30-33-2 career record, Morrall appeared finished. ", "But with Morrall, things were never as they appeared.", "\n\nAnother August trade was in the winds. ", "Don Shula, who had been with Morrall in Detroit, was now the head coach in Baltimore, where Johnny Unitas was dealing with elbow issues. ", "Shula sent a draft pick to New York to acquire his old pal as a cheap insurance policy. ", "Then, in Baltimore’s final preseason game, Unitas felt something pop in his elbow, and the Colts were suddenly Morrall’s team. ", "The 34-year-old then turned in the finest season of his career — heck, it’s arguably the greatest season ever had by a 34-year-old quarterback. ", "He led the NFL in touchdown passes, yards per attempt, yards per completion, and passer rating. ", "Morrall started every game as the Colts went 13-1 and Morrall was named MVP by the AP, the UPI, and the NEA.4\n\nIn two playoff games, Morrall threw for 449 yards on 47 pass attempts as the Colts cruised to an NFL title. ", "All that was left to cap the magnificent season was beating Joe Namath and the AFL champion Jets. ", "Of course, we know what happened there. ", "Morrall completed just 6 of 17 passes for only 71 yards, while managing to throw three interceptions. ", "The most memorable of those came with 25 seconds left in the first half with the Colts at the Jets 41-yard line.", "\n\nThe play was a flea flicker, with Morrall giving the ball to Tom Matte on what looked like a sweep to the right; Matte then reversed course and threw it back to Morrall, who was supposed to throw it to a wide open Jimmy Orr. ", "Orr was open on the left side of the field at the 10-yard line, but Morrall didn’t see him. ", "Instead, the pass, which was intended for Jerry Hill, was picked off by Jim Hudson. ", "The most famous play of Morrall’s career was his worst, although Matte has blamed himself for a poor pitch (another explanation was that the sun caused a blind spot for Morrall right in the area occupied by Hill). ", "The Colts would lose, 16-7, and Morrall’s magnificent year ended in heartbreak.", "\n\nUnitas returned for the ’69 and ’70 seasons, leaving Morrall to start just three games over that time. ", "The Colts made it back to the Super Bowl in 1970, where Morrall would surprisingly get a chance for redemption In the 2nd quarter, the Colts faced 1st and 10 on the Cowboys 36, trailing 13-6. ", "Unitas looked deep for Eddie Hinton, but was crushed by George Andrie as he made the throw. ", "The pass was intercepted by Mel Renfro, and Unitas’ day was finished.", "\n\nMorrall entered with 2:48 left in the half, trailing by a touchdown; at the time, the Colts had a 37.5% chance of winning. ", "There would be no heroic last-minute drive or pass-for-the-ages, but Morrall completed 7 of 15 passes for 147 yards in relief of Unitas. ", "The Colts would win the ugliest Super Bowl ever, and Morrall would at least get to experience the feeling of walking off the field as a Super Bowl champion.", "\n\nIn 1971, Morrall (age 37) and Unitas (38) were on their last legs. ", "Morrall started the first 9 games of the season: his numbers were not impressive, but he managed to sport a 7-2 record. ", "Unitas started the last five games and the Colts two playoff performances, but that season marked the end of the era. ", "Morrall was waived in April 1972; in August, the Colts traded a first round pick for Marty Domres, who would replace Unitas later that season.", "\n\nWho was it that spent $100 to claim a 38-year-old quarterback off waiver? ", "Morrall’s old coach, Don Shula, of course, who once again claimed Morrall for insurance purposes only. ", "With future Hall of Famer Bob Griese as the starter, it seemed likely that Morrall would spend his days mentoring. ", "Then, Griese suffered a fractured fibula and dislocated ankle in the fifth game of the season; Morrall came off the bench and led Miami to a victory over San Diego.", "\n\nAnd then he won his first game as starter. ", "And then he won another. ", "And another. ", "And another. ", "By the end of the year, Morrall had won ten games, and the Dolphins had finished the regular season 14-0. ", "Miami was a run-heavy team, as every Paul Warfield historian knows, but Morrall also posted the top ANY/A average of any passer with at least 100 throws in 1972.", "\n\nMorrall started the Dolphins first two playoff games, both wins, of course. ", "Against the Browns, a 35-yard strike from Morrall to Warfield set up the game-winning score. ", "But the next week against Pittsburgh, Shula switched to Griese in the third quarter of the AFC Championship Game, and never looked back. ", "Griese started Super Bowl VII and got the glory, but it was Morrall who was the quarterback for most of Miami’s wins that year.", "\n\nYou’ve probably heard the stat the no quarterback has ever won Super Bowls with two different teams. ", "Inherent in that statement is the concept that no quarterback has been the starter for two different franchises, otherwise, someone like Jim McMahon (who was Brett Favre’s backup on the 1996 Packers) would qualify. ", "Morrall didn’t start Super Bowl V or Super Bowl VII, but Morrall has come closer to meeting this bit of trivia than anyone else. ", "He came off the bench, with the Colts trailing, and helped his team win Super Bowl V. And he played Phil Simms‘ to Griese’s Jeff Hostetler two years later. ", "Some day, some quarterback will win Super Bowls with different teams, but for now, Morrall is the leader in the clubhouse.", "\n\nMorrall played in 21 seasons, tied with Vinny Testaverde for the second most by a quarterback, ever (George Blanda played for 26 years). ", "But even after retiring, he was not done with the game of football: or associating with star quarterbacks. ", "Morrall stayed in Miami after his playing days and became the quarterbacks coach of the Hurricanes. ", "While his playing career intertwined him with names like Tittle, Dawson, Kemp, Layne, Plum, Rote, Tarkenton, Unitas, Namath, and Griese, his coaching career connected him to Vinny Testaverde, Bernie Kosar and Jim Kelly.", "\n\nMorrall may not be a Hall of Fame quarterback, but one of the tests applied to Hall of Fame candidates is “can you write the history of the game without mentioning this man?” ", "Morrall wasn’t just connected with great quarterbacks, his name is intertwined with some of the great moments in NFL history. ", "One can’t discuss the ’60s and ’70s for very long without mentioning Earl Morrall, and that’s a pretty darn impressive legacy in its own right.", "\n\nThe trade occurred in September 1957, so the two first round picks were Pittsburgh’s 1958 and 1959 selections. ", "Neither panned out for San Francisco — the players selected were Jim Pace and Dan James. [", "↩]\n\nGreat tribute to one of the more interesting careers in NFL history. ", "The fact that he even became mayor of a small town just adds to the uniqueness of his story. ", "Great football-focused piece, as usual.", "\n\nKurt Warner was 2:37 away from winning two Super Bowls with two different teams. ", "I’d argue that’s closer than Earl Morrall’s career.", "\n\nTom\n\nGood point…this is totally off-topic, but every time the words “Super Bowl” and “Kurt Warner” come up, my mind instantly flashes to James Harrison lumbering down the field for that 99-yard pick six…yeah, he was pretty close to winning that one.", "\n\nJames\n\nMorrall made the Pro Bowl twice, once in 1957 and then again in 1968 – is that the longest gap between Pro Bowls?", "\n\nChase Stuart\n\nI’d have to look, but nothing would surprise me when it comes to quarterbacks.", "\n\nChase Stuart\n\nIt’s the second longest. ", "Kerry Collins made the Pro Bowl in 1997 and then 2008.", "\n\nJames\n\nSo close! ", "I’m once again in awe of your database and skills.", "\n\nKibbles\n\nHow does ’97-’08 count as longer than ’57-’68? ", "Aren’t they both the same length?", "\n\nTom\n\nThis was an absolutely great read, thanks for putting this up. ", "Morrall is a perfect example of the NFL player who was great, but for whatever reason – luck, injuries, timing, too many “off” days, luck – just didn’t get to that pinnacle of greatness we normally associate with NFL Hall of Fame quarterbacks. ", "But I completely agree with your last sentence…Morrall was one of those players whose name kept popping up in all these football books I had as a kid, and I’d always be thinking “Who is this guy?”. ", "In any event, I’d give him my vote for the HoF. Thanks again for a great read.", "\n\nChase Stuart\n\nThanks, Tom. ", "Glad you enjoyed!", "\n\nRichie\n\nthe Steelers saw an opportunity to acquire Morrall, and did so by sending two future first round picks (and linebacker Marv Matuszak) to the 49ers for Morrall.", "\n\nI guess this goes back to your comment yesterday about teams not valuing draft picks. ", "2 first round picks (and a player) for a top prospect who didn’t play well in his first year. ", "I assume a 1-6 TD-Int differential had a different meaning in 1957 than it does now, but taking a QB from the top of the draft who didn’t play much as a rookie and comparing him to recent players would be guys like JaMarcus Russell, Trent Dilfer, Steve McNair and Philip Rivers. ", "I cannot imagine any of those guys fetching 2 first round picks after their rookie seasons.", "\n\nRichie\n\nSun at a Super Bowl? ", "LOLs\n\nChase Stuart\n\nLol!", "\n\nRichie\n\nPretty interesting that the 68 Colts and 72 Dolphins are both in the discussion for greatest teams ever – and Morrall was accidentally the main QB for both.", "\n\nAlso, I just realized that the 99 Rams are an all-time great team, and their QB was an accident. ", "The 2001 Patriots were the start of one of the all-time great franchise runs, with an accidental QB.", "\n\nChase Stuart\n\n’98 Vikings, too. ", "Then again, I’m cheating because I have a post on backup QBs coming up 🙂\n\nRichie\n\nGood one. ", "Set the scoring record with a backup QB. (", "I can’t believe 4 teams have passed them already.)", "\n\nRandom, mostly unrelated, observation:\nAs I was looking that up, I see that the 1950 Rams set the NFL scoring record with 466 points. ", "It took 31 years for an NFL team to beat that record (81 Chargers). [", "There were 2 AFL teams and 1 AAFC team that bested 466 points.]", "\n\nsacramento gold miners\n\nHow can the 1968 Colts be considered one of the greatest teams ever when they couldn’t win their final game? ", "I’d have to put those Colts with the 2007 Patriots as teams with outstanding regular seasons only. ", "A baseball equivalent would be the 2001 Seattle Mariners.", "\n\nWonderful piece, Mr. Stuart, but I think I have some new information for you.", "\n\nAccording to the Pro Sports Transactions database (see below), the original “undisclosed” “high draft choice” that the Colts traded to the Giants for Morrall on August 25, 1968 was not “exercised” (whatever that precisely means) and they instead sent George “Butch” Wilson to New York on September 2, 1968. ", "Wilson was one of two tight ends that the Colts had selected in the second round of the 1963 draft; as the other was John Mackey – who still gets my vote as the best tight end in pro football history – Wilson caught only 11 passes with the Colts in five years. ", "Unfortunately for the Giants – and how often one must use that phrase about that team during the 60’s and 70’s! – ", "Wilson caught only 14 more passes over the next two seasons." ]
{ "pile_set_name": "Pile-CC" }
[ 0.017241379310344827, 0, 0.01, 0.011494252873563218, 0.007936507936507936, 0.005780346820809248, 0.010416666666666666, 0.01893939393939394, 0.011904761904761904, 0, 0.0136986301369863, 0.020202020202020204, 0.013793103448275862, 0.023809523809523808, 0.014925373134328358, 0.0196078431372549, 0.020202020202020204, 0, 0.008403361344537815, 0, 0.01652892561983471, 0.007462686567164179, 0.010416666666666666, 0.010416666666666666, 0.024390243902439025, 0.0064516129032258064, 0.02962962962962963, 0.010638297872340425, 0.014184397163120567, 0, 0.00819672131147541, 0.009523809523809525, 0.01020408163265306, 0, 0, 0, 0, 0.014598540145985401, 0.011363636363636364, 0.015748031496062992, 0, 0.010416666666666666, 0.0228310502283105, 0.01020408163265306, 0, 0, 0, 0.00881057268722467, 0.010869565217391304, 0.023809523809523808, 0.014018691588785047, 0.012658227848101266, 0.01904761904761905, 0.005208333333333333, 0.03260869565217391, 0.028985507246376812, 0, 0.014598540145985401, 0.01282051282051282, 0.028985507246376812, 0, 0.00847457627118644, 0.014084507042253521, 0, 0.019417475728155338, 0.008695652173913044, 0, 0, 0, 0, 0, 0.018867924528301886, 0.018633540372670808, 0, 0.021505376344086023, 0.0072992700729927005, 0.015748031496062992, 0, 0.009302325581395349, 0.007751937984496124, 0.01282051282051282, 0.01639344262295082, 0.014388489208633094, 0, 0, 0.0273972602739726, 0.005649717514124294, 0.007936507936507936, 0.006993006993006993, 0, 0.022222222222222223, 0.0136986301369863, 0, 0, 0.024096385542168676, 0.0196078431372549, 0.00398406374501992, 0.00819672131147541, 0.010638297872340425, 0.024390243902439025, 0.018518518518518517, 0, 0, 0, 0, 0.014285714285714285, 0.00819672131147541, 0, 0, 0.06896551724137931, 0, 0.01775147928994083, 0, 0, 0.014336917562724014, 0, 0, 0.08333333333333333, 0.006024096385542169, 0, 0, 0.029411764705882353, 0.010869565217391304, 0, 0, 0.014705882352941176, 0.014492753623188406, 0, 0, 0.010101010101010102, 0.017543859649122806, 0.012658227848101266, 0.012944983818770227, 0.011494252873563218, 0.008771929824561403, 0.016666666666666666 ]
0.010612
5
[ "Metastasectomy for Stage IV Melanoma in the Era of Effective Systemic Agents.", "\nThere is an increasing body of literature that strongly suggests that complete metastasectomy for stage IV melanoma can improve overall survival. ", "Before 2011, the efficacy of systemic therapy for melanoma was poor, making surgical resection the mainstay for treatment and the only realistic chance for cure. ", "Now, in just a short time span (2011-2014), we have six Food & Drug Administration (FDA)-approved drugs for patients with stage IV metastatic melanoma. ", "In the absence of prospective clinical trials evaluating the most advantageous sequence and timing for systemic therapy and surgical resection in the setting of stage IV melanoma, the treating surgical and medical oncologists must jointly devise individual treatment plans that take into account the advantages and disadvantages of each modality. ", "This multidisciplinary approach gives the patient the best chance for prolonged survival. ", "This article briefly reviews the FDA-approved systemic therapy options, discusses the data for site-specific metastasectomy, critiques the previous stage IV metastasectomy trials, and presents a view for moving forward with a multidisciplinary approach in mind." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0.006578947368421052, 0, 0, 0.0038314176245210726 ]
0.001487
5
[ "// MESSAGE FILE_TRANSFER_RES PACKING\n\n#define MAVLINK_MSG_ID_FILE_TRANSFER_RES 112\n\ntypedef struct __mavlink_file_transfer_res_t\n{\n uint64_t transfer_uid; ///< Unique transfer ID\n uint8_t result; ///< 0: OK, 1: not permitted, 2: bad path / file name, 3: no space left on device\n} mavlink_file_transfer_res_t;\n\n#define MAVLINK_MSG_ID_FILE_TRANSFER_RES_LEN 9\n#define MAVLINK_MSG_ID_112_LEN 9\n\n\n\n#define MAVLINK_MESSAGE_INFO_FILE_TRANSFER_RES { \\\n\t\"FILE_TRANSFER_RES\", \\\n\t2, \\\n\t{ { \"transfer_uid\", NULL, MAVLINK_TYPE_UINT64_T, 0, 0, offsetof(mavlink_file_transfer_res_t, transfer_uid) }, \\\n { \"result\", NULL, MAVLINK_TYPE_UINT8_T, 0, 8, offsetof(mavlink_file_transfer_res_t, result) }, \\\n } \\\n}\n\n\n/**\n * @brief Pack a file_transfer_res message\n * @param system_id ID of this system\n * @param component_id ID of this component (e.g. 200 for IMU)\n * @param msg The MAVLink message to compress the data into\n *\n * @param transfer_uid Unique transfer ID\n * @param result 0: OK, 1: not permitted, 2: bad path / file name, 3: no space left on device\n * @return length of the message in bytes (excluding serial stream start sign)\n */\nstatic inline uint16_t mavlink_msg_file_transfer_res_pack(uint8_t system_id, uint8_t component_id, mavlink_message_t* msg,\n\t\t\t\t\t\t uint64_t transfer_uid, uint8_t result)\n{\n#if MAVLINK_NEED_BYTE_SWAP || !", "MAVLINK_ALIGNED_FIELDS\n\tchar buf[9];\n\t_mav_put_uint64_t(buf, 0, transfer_uid);\n\t_mav_put_uint8_t(buf, 8, result);\n\n memcpy(_MAV_PAYLOAD_NON_CONST(msg), buf, 9);\n#else\n\tmavlink_file_transfer_res_t packet;\n\tpacket.transfer_uid = transfer_uid;\n\tpacket.result = result;\n\n memcpy(_MAV_PAYLOAD_NON_CONST(msg), &packet, 9);\n#endif\n\n\tmsg->msgid = MAVLINK_MSG_ID_FILE_TRANSFER_RES;\n\treturn mavlink_finalize_message(msg, system_id, component_id, 9, 124);\n}\n\n/**\n * @brief Pack a file_transfer_res message on a channel\n * @param system_id ID of this system\n * @param component_id ID of this component (e.g. 200 for IMU)\n * @param chan The MAVLink channel this message was sent over\n * @param msg The MAVLink message to compress the data into\n * @param transfer_uid Unique transfer ID\n * @param result 0: OK, 1: not permitted, 2: bad path / file name, 3: no space left on device\n * @return length of the message in bytes (excluding serial stream start sign)\n */\nstatic inline uint16_t mavlink_msg_file_transfer_res_pack_chan(uint8_t system_id, uint8_t component_id, uint8_t chan,\n\t\t\t\t\t\t\t mavlink_message_t* msg,\n\t\t\t\t\t\t uint64_t transfer_uid,uint8_t result)\n{\n#if MAVLINK_NEED_BYTE_SWAP || !", "MAVLINK_ALIGNED_FIELDS\n\tchar buf[9];\n\t_mav_put_uint64_t(buf, 0, transfer_uid);\n\t_mav_put_uint8_t(buf, 8, result);\n\n memcpy(_MAV_PAYLOAD_NON_CONST(msg), buf, 9);\n#else\n\tmavlink_file_transfer_res_t packet;\n\tpacket.transfer_uid = transfer_uid;\n\tpacket.result = result;\n\n memcpy(_MAV_PAYLOAD_NON_CONST(msg), &packet, 9);\n#endif\n\n\tmsg->msgid = MAVLINK_MSG_ID_FILE_TRANSFER_RES;\n\treturn mavlink_finalize_message_chan(msg, system_id, component_id, chan, 9, 124);\n}\n\n/**\n * @brief Encode a file_transfer_res struct into a message\n *\n * @param system_id ID of this system\n * @param component_id ID of this component (e.g. 200 for IMU)\n * @param msg The MAVLink message to compress the data into\n * @param file_transfer_res C-struct to read the message contents from\n */\nstatic inline uint16_t mavlink_msg_file_transfer_res_encode(uint8_t system_id, uint8_t component_id, mavlink_message_t* msg, const mavlink_file_transfer_res_t* file_transfer_res)\n{\n\treturn mavlink_msg_file_transfer_res_pack(system_id, component_id, msg, file_transfer_res->transfer_uid, file_transfer_res->result);\n}\n\n/**\n * @brief Send a file_transfer_res message\n * @param chan MAVLink channel to send the message\n *\n * @param transfer_uid Unique transfer ID\n * @param result 0: OK, 1: not permitted, 2: bad path / file name, 3: no space left on device\n */\n#ifdef MAVLINK_USE_CONVENIENCE_FUNCTIONS\n\nstatic inline void mavlink_msg_file_transfer_res_send(mavlink_channel_t chan, uint64_t transfer_uid, uint8_t result)\n{\n#if MAVLINK_NEED_BYTE_SWAP || !", "MAVLINK_ALIGNED_FIELDS\n\tchar buf[9];\n\t_mav_put_uint64_t(buf, 0, transfer_uid);\n\t_mav_put_uint8_t(buf, 8, result);\n\n\t_mav_finalize_message_chan_send(chan, MAVLINK_MSG_ID_FILE_TRANSFER_RES, buf, 9, 124);\n#else\n\tmavlink_file_transfer_res_t packet;\n\tpacket.transfer_uid = transfer_uid;\n\tpacket.result = result;\n\n\t_mav_finalize_message_chan_send(chan, MAVLINK_MSG_ID_FILE_TRANSFER_RES, (const char *)&packet, 9, 124);\n#endif\n}\n\n#endif\n\n// MESSAGE FILE_TRANSFER_RES UNPACKING\n\n\n/**\n * @brief Get field transfer_uid from file_transfer_res message\n *\n * @return Unique transfer ID\n */\nstatic inline uint64_t mavlink_msg_file_transfer_res_get_transfer_uid(const mavlink_message_t* msg)\n{\n\treturn _MAV_RETURN_uint64_t(msg, 0);\n}\n\n/**\n * @brief Get field result from file_transfer_res message\n *\n * @return 0: OK, 1: not permitted, 2: bad path / file name, 3: no space left on device\n */\nstatic inline uint8_t mavlink_msg_file_transfer_res_get_result(const mavlink_message_t* msg)\n{\n\treturn _MAV_RETURN_uint8_t(msg, 8);\n}\n\n/**\n * @brief Decode a file_transfer_res message into a struct\n *\n * @param msg The message to decode\n * @param file_transfer_res C-struct to decode the message contents into\n */\nstatic inline void mavlink_msg_file_transfer_res_decode(const mavlink_message_t* msg, mavlink_file_transfer_res_t* file_transfer_res)\n{\n#if MAVLINK_NEED_BYTE_SWAP\n\tfile_transfer_res->transfer_uid = mavlink_msg_file_transfer_res_get_transfer_uid(msg);\n\tfile_transfer_res->result = mavlink_msg_file_transfer_res_get_result(msg);\n#else\n\tmemcpy(file_transfer_res, _MAV_PAYLOAD(msg), 9);\n#endif\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.014084507042253521, 0.009966777408637873, 0.009174311926605505, 0.008832807570977918 ]
0.010515
5
[ "Leaked slides reveal AMD's plans for client CPU and GPU offerings in 2018 and 2019. ", "Towards the end of 2018, we will likely see more information regarding Zen 2 and Vega 20. ", "The slides also reveal an increased performance of Ryzen 5 Pro Mobile compared to the Intel Kaby Lake Core i5 CPU.", "\n\nReviews , News , CPU , GPU , Articles , Columns , Other \"or\" search relation. ", "5G , Accessory , AMD , Android , Apple , ARM , Audio , Bay Trail , Business , Cannon Lake , Charts , Chinese Tech , Chromebook , Coffee Lake , Comet Lake , Console , Convertible / 2-in-1 , Cryptocurrency , Cyberlaw , Deal , Desktop , Fail , Foldable , Gadget , Galaxy Note , Galaxy S , Gamecheck , Gaming , Geforce , Google Nexus / Pixel , How To , Ice Lake , Internet of Things (IoT) , iOS , iPad Pro , iPhone , Kaby Lake , Lakefield , Laptop , Launch , Linux / Unix , MacBook , Mini PC , Monitor , MSI , OnePlus , Opinion , Phablet , Project Athena , Renoir , Review Snippet , Rocket Lake , Rumor , Ryzen (Zen) , Security , Smart Home , Smartphone , Smartwatch , Software , Storage , Tablet , ThinkPad , Thunderbolt , Tiger Lake , Touchscreen , Ultrabook , Virtual Reality (VR) / Augmented Reality (AR) , Wearable , Whiskey Lake , Windows , Workstation , XPS , Zen 3 (Vermeer) Ticker\n\nAnother roadmap has leaked and this time, its about AMD. ", "The slides, which were obtained by Informatica Cera, reveal some interesting (and to an extent, obvious) facts about AMD's plans for the next year and after. ", "Before we move onto the details, please do note that the authenticity of the slides has not been completely verified so do take this information with a pinch of salt. ", "A 'masterpiece' contender\n\nFirst up, Matisse and Picasso — and no, we aren't talking about great artists here. ", "These are supposedly codenames for AMD CPUs and APUs set to land in 2019. ", "Matisse will be the desktop CPU and will likely be based on the Zen 2 architecture. ", "AMD said that they have enough headroom for squeezing in more IPC and clock speeds. ", "We could see more IPCs in Zen 2, which will help sustain the pressure on Intel. ", "There are no revisions of the current Zen architecture planned for 2018. ", "However, Pinnacle Ridge will succeed the current Summit Ridge lineup and offer a performance boost.", "\n\nOn the APU side, we see that Raven Ridge is pushed to 2018 (bummer!). ", "We have reported earlier that Ryzen 5 'Raven Ridge' is offering up to 48% higher multi-core performance compared to the 'Bristol Ridge' A12-9800 APU. ", "What we didn't know at that time was the number of stream processors (SPs) that the on-die Vega GPU would contain. ", "We now get to know from the slide that the on-die Vega GPU in 'Raven Ridge' could have up to 11 compute units (CUs), which means up to 704 SPs (each CU comprises of 64 SPs). ", "A possible error on the slide is the mention of 'Bristol Ridge' APUs featuring Polaris GPUs. ", "This could mean two things — either the slide is not accurate or, Polaris (GCN 4th gen) and GCN 1.2 (Tonga/Fiji, 3rd gen) have been used interchangeably, given that there is not much difference between the 3rd and 4th generations of GCN (Graphics Core Next). '", "Raven Ridge' would be continue well into 2019, refreshed as Picasso with a performance boost.", "\n\nVega 20 — Fastha and more powerful\n\nWe also get to see AMD's plans for the newly launched Vega GPU architecture. ", "The current Vega 10 GPU is part of the Radeon Vega 64 and 56, and also the Vega Frontier Edition. ", "While Vega 10 is based on a 14nm process, Vega 20 will be based on a 7nm process. ", "Vega GPUs manufactured in 2018 will, however, feature Global Foundries' new 12nm LP process. ", "AMD will also be releasing the next version of its EPYC server-centric CPU codenamed, Rome: both Vega 20 and EPYC-Rome will support the PCIe Gen4 bus. ", "It is also interesting to note that AMD will be iterating upon its ROCm (Radeon Open Compute) platform in Q1 2018. ", "ROCm is an open-source framework for Hyperscale-class GPU computing. ", "Going by the slide, Vega 20 seems capable of taking on Higher Order Reasoning computing tasks made possible by ROCm 2.1.", "\n\nFight to the finish" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.03571428571428571, 0, 0.02631578947368421, 0.0125, 0.020127118644067795, 0.012658227848101266, 0, 0.018018018018018018, 0.013513513513513514, 0.011904761904761904, 0.023809523809523808, 0.0125, 0, 0.010101010101010102, 0.013888888888888888, 0.006666666666666667, 0.008695652173913044, 0.011494252873563218, 0.021505376344086023, 0.015384615384615385, 0.021505376344086023, 0.017391304347826087, 0.02040816326530612, 0, 0, 0.026490066225165563, 0.008695652173913044, 0.014492753623188406, 0, 0 ]
0.012793
5
[ "Platinum Games’ designer Hideki Kamiya has been up to all sorts of mischief recently – he revealed earlier that a little bit of friendly office rivalry between The Wonderful 101 and Bayonetta 2 boosts the games’ development – and today he’s been politely frank on Twitter to those fans asking if Bayonetta 2 or The Wonderful 101 will ever be released out-with Nintendo’s home console and land on the PlayStation 3. ", "Here’s what he reiterated, on behalf of JP Kellams original tweets back in February, to those who continued to question Platinum on whether the games would make an appearance on the Sony console:\n\n“REPEAT: We are a developer. ", "Nintendo are the ones kind enough to fund and publish our W101 and Bayo 2 projects. (", "1/2) “So if Nintendo says “We are publishing Bayo 2 on PS3/360.” ", "Then it will happen. ", "So please go ask them, not us. (", "2/2)\n\n“It’s supposed to mean what it says. ", "If you want a PS3 version ask Nintendo. ", "You might also want to ask for PS3 Zelda. ", "<- by JP”\n\nThanks, Zyph" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.004819277108433735, 0.01327433628318584, 0.023529411764705882, 0.03076923076923077, 0, 0, 0, 0.025, 0.023809523809523808, 0.043478260869565216 ]
0.016468
5
[ "Twitter has handed over to Senate investigators the profile names of 201 accounts linked to Russian interference in the 2016 presidential election, according to The Associated Press.", "\n\nA source told the AP that the profile names or \"handles\" were handed over sometime this week.", "\n\nTwitter has faced scrutiny from lawmakers probing Russian election interference after company executives gave a closed-door briefing to congressional investigators last month.", "\n\nADVERTISEMENT\n\nSen. Mark Warner Mark Robert WarnerIntelligence chief says Congress will get some in-person election security briefings Overnight Defense: Trump hosts Israel, UAE, Bahrain for historic signing l Air Force reveals it secretly built and flew new fighter jet l Coronavirus creates delay in Pentagon research for alternative to 'forever chemicals' House approves bill to secure internet-connected federal devices against cyber threats MORE (Va.), the top Democrat on the Senate Intelligence Committee, said Twitter demonstrated an “enormous lack of understanding” of the issue during the briefing and called its presentation to investigators “frankly inadequate on almost every level.\"", "\n\nPolitico had also reported that the social media company had deleted tweets and other data that was considered to be important to officials probing alleged Russian election meddling.", "\n\nThe officials, who spoke anonymously to Politico, said they believed the social platform was one of the Kremlin’s most important tools in its attempts to meddle in the U.S. election.", "\n\nRussian actors utilized bots, fake users, Twitter campaigns and exaggerated or fake stories to try to sway Americans, according to the officials.", "\n\nTwitter is schedule to appear before the Senate Intelligence Committee on Nov. 1." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.01098901098901099, 0.010526315789473684, 0, 0.01002865329512894, 0, 0.010869565217391304, 0, 0.012048192771084338 ]
0.006808
5
[ "Color A short history of color theory\n\nOf all the subjects presented in this book, this part devoted to color theory might be the most perplexing one. ", "Although a basic understanding of the color spectrum is rather easy to develop, color theory is an almost infinitely complex subject with roots in both science and art. ", "It can therefore be a daunting task to learn about color composition in a way that is true to both art history and scientific truth, and I have seen many designers stumbling on the most basic of questions: Is yellow a primary color? ", "Which color combinations are harmonic? ", "What is the true complementary color to blue?", "\n\nI hope that this chapter on the history of color theory can help answer some of these questions by highlighting both the mistakes and successes of key figures in the field. ", "In this abbreviated and narrow introduction, I am especially interested in the conflict between the two distinct but related fields that both operate under the term ‘color theory’: Artistic color theory, which is concerned with the visual effects of color combination in the fine arts, and scientific color theory, which describes the nature of color through increasingly complex but precise color models. ", "The following chapters will build on lessons learned in this chapter, and it is my belief that it is essential for designers to develop a solid understanding of this history in order to make good decisions about color.", "\n\nOne of the first known theories about color can be found in On Colors, a short text written in ancient Greece. ", "The text was originally attributed to Aristotle, but it is now widely accepted to have been written by members of his Peripatetic school. ", "Based on observations of how color behaves in nature, the text argues that all colors exist in a spectrum between darkness and light, and that four primary colors come from the four elements: fire, air, water, and earth. ", "This can seem rather weird and speculative today, but these observations made sense at the time: A plant is green above ground and white in its roots, thus the color must come from the sun. ", "Likewise, a plant left to dry will lose its vivid colors, thus water provides color too. ", "This theory is typical of how color theorists for centuries used color to establish a general theory of the universe. ", "Despite the erroneous theory, On Colors has a series of important observations, like the fact that “darkness is not a colour at all, but is merely an absence of light”1 – a discovery propelled by watching how clouds darken as they thicken2.", "\n\nLike so many other areas of science, Isaac Newton completely redefined the conventional theories on the behavior of light when he published the first edition of Opticks in 1704. ", "Rather than seeing light as a void of color, Newton discovered that white light is a combination of all colors across the color spectrum. ", "The basics of his experiments was a well-known phenomena: When you shine white light through a prism, the light is split into colors from across the color spectrum. ", "However, Newton discovered that he could recombine these spectral colors to once again turn them into white light.", "\n\nNewton's color circle used seven colors mapped to a musical octave starting at the tone D.\n\nNewton also discovered that if he blended the first color (red) and last color (violet) of the color spectrum, he could produce magenta, an extra-spectral color that does not exist in the rainbow. ", "This prompted him to wrap the color spectrum into a circle, beginning a tradition of using basic shapes to represent the relationship between colors. ", "Newton used a circle because it could be used to predict the result of color mixing for two colors by pointing to the color midway between these colors. ", "The colors on Newton’s circle have asymmetric distances to each other because Newton wanted the circle to have seven colors – the exact number of days in a week and musical notes in an octave3.", "\n\nWhile Newton was interested in a scientific explanation of color, the German poet Wolfgang von Goethe dedicated his book Theory of Colors from 1810 to a more human-centered analysis of the perception of color. ", "Through a series of experiments that measured the eye’s response to certain colors, Goethe created what is arguably the most famous color circle of all time. ", "The circle had three primary colors – magenta, yellow, and blue – which he believed could mix all other colors in the spectrum.", "\n\nGoethe's color circle with magenta, yellow, and blue primary colors.", "\n\nThis publication was in many ways at odds with Newton’s theories, as Goethe believed that the prism, not the light, was responsible for the creation of color, and that darkness was not an absence of light. ", "Although Newton eventually won the argument about the nature of light, Goethe’s work is important to us because it focuses on the cognitive effect that color has on humans. ", "His research on the effects of after-images and optical illusions is especially interesting, because it points towards the later works of Johannes Itten and Josef Albers4.", "\n\nEven though Newton's and Goethe’s color circles may seem to be at odds with each other, they are in some way both correct as they illustrate the behavior of color in different material. ", "Newton describes how his spectral colors can mix most visible colors including white, and this is true because light mixes in an additive way: Combining lights of different colors will eventually result in white light. ", "Goethe describes how his three primary colors can mix most visible colors including black, and this is true because pigments mix in a subtractive way: Combining paints of different colors will eventually result in black paint by subtracting waves of light.", "\n\nRGB in additive color mixing. ", "CMY in subtractive color mixing.", "\n\nIn a quest to create a unified notation for color – like we know it from musical notation – artists soon started depicting the color spectrum as 3D solids. ", "A concurrent example of this can be found in Tobias Mayer’s color triangle from his book The Affinity of Color Commentary, published posthumously in 1775. ", "Mayer sought to accurately define the number of individual colors the human eye can see, and this required him to add another dimension to represent the variations of brightness for each color. ", "Mayer painted the corners of a triangle with the three traditional primary colors from painting – red, yellow, and blue – and connected the corners by mixing the opposing colors together. ", "Unlike the traditional color circle, he created many variations of this triangle by stacking triangles of different brightnesses on top of each other. ", "This made it possible to define a color by its position within a 3D space, a technique still used to this day. ", "Mayer ultimately failed at creating a color model with perceptually uniform steps, as he did not understand the irregularities of the human eye5.", "\n\nTobias Mayer's color triangles.", "\n\nThe German painter Philipp Otto Runge took this same approach when creating his spherical representation of the color spectrum, published in his Color Sphere manuscript in 1810. ", "Runge’s sphere had white and black poles with colored bands running between them. ", "However, like many other representations of color before it, the model did not differentiate between brightness and saturation, which meant that the resulting model had little variation in color intensity. ", "This sphere had the same problem as Mayer’s triangle, as the steps were not perceptually uniform6.", "\n\nPhilipp Otto Runge's color sphere.", "\n\nMichel Eugène Chevreul attempted to fix this problem in his hemispherical color system from 1839. ", "Rather than mixing colors by focusing on the amount of paint used, he based his selections solely on what perceptually appeared to be the correct mixture. ", "Inspired by the work of Goethe, Chevreul used after-images to test the validity of his mixtures. ", "When a person stares at a green square for a long time and then looks at a white wall, a magenta square will appear. ", "This happens because of fatigue in the green photoreceptors in the eye, and Chevreul used this to establish the complementary colors in his model7.", "\n\nMichel Eugène Chevreul's color sphere.", "\n\nOne of the most historically significant color solids was created by the American painter Albert Henry Munsell in the early 1900’s. ", "Like his peers before him, Munsell wanted to create a model with perceptually uniform steps, and although he was a painter, his approach was very scientific: He used human test subjects and a range of mechanical instruments he invented to create a remarkably accurate model. ", "One important detail about Munsell’s color system is that he divided the color space into three new dimensions: The hue determined the type of color (red, blue, etc), the value determined the brightness of the color (light or dark), and the chroma determined the saturation of the color (the purity of the color). ", "These dimensions are still used to this day in some representations of the RGB color model.", "\n\nVisualization of Albert Henry Munsell's color tree from the 1943 renotation.", "\n\nMunsell first tried to arrange his colors in a sphere, but noted that “the desire to fit a chosen contour, such as the pyramid, cone, or cube, coupled with a lack of proper tests, has led to many distorted statements of colour relations”8. ", "Essentially, Munsell realized that his color solid had to have an irregular shape to fit his colors. ", "The explanation for this is rather simple. ", "Colors with low brightness have much fewer visible colors between zero and full saturation (colors with zero brightness only have one, black). ", "Likewise, some hues have more range than others. ", "You can mix more visible colors between red and white than between yellow and white, because yellow is a lighter color. ", "Another important detail of Munsell’s color system is that he prefered the use of a mathematical syntax over color names to indicate a color’s position within the color space. ", "This is not unlike how we define colors in programming languages today. ", "Munsell’s color system had its flaws and inconsistencies, but it managed to bridge art and science in a way not done before, and it still forms the basis of the curriculum at many fine art institutions.", "\n\nMany of the European art movements in the early 20th century had a profound interest in the subjective experience of art, and although the Bauhaus school in Germany was a school focused on a modern approach to art, design, and architecture, two important publications on color and perception were written by Bauhaus faculty: The Art of Color by Johannes Itten9 and Interaction of Color by Josef Albers10.", "\n\nAs a follower of the Mazdaznan religion, Itten’s view of the arts was highly influenced by his spiritual beliefs. ", "Following a strict vegetarian diet, he was famous for performing rhythmic breathing exercises with his students in order to have them realize their full creative potential11. ", "In his mind – like Goethe’s – it was the subjective experience of color that mattered, and his book focuses on how color can be combined to invoke feelings in the viewer. ", "The central idea in Itten’s work is the existence of seven color contrasts that artists must master in order to know the effect of their color choices. ", "Some of these contrasts are simple, like the contrast of light and dark that exists when colors of different brightnesses appear next to each other, or the contrast of hue that can be seen when colors of different hues are used together12. ", "These observations can still be used by aspiring designers to guide decisions around color, as they give us a way to classify color and think systematically about their use. ", "Itten even operated with a RYB color sphere remarkably similar to that of Runge to help explain these ideas. ", "Other of Itten’s contrasts can seem rather arbitrary, like his law of simultaneous contrast that states how certain colors create visual effects when used together. ", "Itten often uses his own subjective experience to establish a generalized theory on color and perception, as demonstrated in the quote below.", "\n\n“For the solution of many problems, however, there are objective considerations that outweigh subjective preferences. ", "Thus a meat market may be decorated in light green and blue-green tones, so that the various meats will appear fresher and redder. [...] ", "If a commercial artist were to design a package for coffee bearing yellow and white stripes, or one with blue polka-dots for spaghetti, he would be wrong because these form and color features are in conflict with the theme.” ", "Johannes Itten 13\n\nHere, Itten’s personal preferences towards the color palette bleed into an unnecessarily strict generalization about color and subject. ", "Who is to say that yellow stripes or blue polka-dots cannot be used effectively when designing food product labeling?", "\n\nJosef Albers, a student of Itten’s at the Bauhaus, took a more demonstrative approach in his Interaction of Color from 1963. ", "Using opaque pieces of colored paper, Albers sets out to show the highly dynamic nature of color, particularly how humans tend to perceive a color based on the colors around it. ", "Rather than trying to establish some unified theory about why color behaves this way, Albers describes how students can repeat these experiments to experience it on their own. ", "This has made The Interaction of Color one of the most important and timeproof books on color composition. ", "Pictured below is one of his most famous examples with two small squares on colored backgrounds. ", "The viewer naturally assumes that the squares are filled with colors from the opposite backgrounds, when they in reality are the exact same color.", "\n\nThese two small squares have the same color. ", "Click the button to verify.", "\n\nAs illustrated above, our art history is full of arguments over the nature of primary colors, which is in part caused by the confusion over subtractive and additive color models. ", "It is notoriously hard to mix yellow from darker paints, which is why Goethe and other artists thought of yellow as a ‘pure’ color with qualities different from the rest of the color spectrum. ", "We know today that the concept of primary colors is actually a rather arbitrary one, and there is no such thing as ‘pure’ primary colors for pigments. ", "One can choose any three colors to mix a subset of the spectrum, and although some primaries can mix a wider range of colors, it is impossible to mix the entire visible color spectrum in a subtractive color model.", "\n\n“The conclusion [...] is that primary colors are only useful fictions. ", "They are either imaginary variables adopted by mathematical models of color vision, or they are imperfect but economical compromises adopted for specific color mixing purposes with lights, paints, dyes or inks.” ", "Bruce MacEvoy 14\n\nThese discoveries are deeply integrated into the devices that we all use on a daily basis. ", "The industry standard for desktop printers and other pigment-based printing mechanisms with subtractive color mixing is to have three colors based on the CMY color model: cyan, magenta, and yellow. ", "It is now well understood that this particular set of colors can mix an acceptable range of colors in ink. ", "Printers also have a black ink because these primary colors cannot mix to a true black, and it has the added advantage of saving costly colored ink. ", "However, professional printers can have many more ink cartridges for better color accuracy. ", "Epson, a leader in digital printing technologies, uses ten ink colors in their UltraChrome® HDR technology.", "\n\nAdditive RGB and subtractive CMY share complementary colors.", "\n\nThe industry standard for computer screens and other light-based display technologies with additive color mixing is to have three primaries per pixel based on the RGB color model: red, green, and blue. ", "These three colors mix to an acceptable range of the visible color spectrum, where the exact amount is decided by the quality of the monitor, but also the computer’s graphics card. ", "Any digital design tool today will allow designers to define colors based on a combination of these three primaries. ", "A special bonus of the RGB and CMY color models is that even though they have different primary colors, they share complementary colors.", "\n\nJust like there is common agreement on the scientific nature of color today, it is also known that the human experience of color is a highly complex and subjective phenomenon. ", "It is generally accepted that it is impossible to create a simple, predictive theory about color harmony – the type of approach that Goethe and Itten believed in. ", "A number of factors determine your response to a specific combination of colors, including gender, age, mood, personal background, and current trends in society15. ", "In some sense, this should be a relief to aspiring designers. ", "For one, it relieves them from participating in irrelevant discussions about which color circle has the ‘correct’ complementary colors. ", "Also, without a simple algorithm to find harmonic colors, the student has no choice but to use their own eyes.", "\n\nWhen reading this account of artists and scientists who dedicated their professional lives to the creation of models that help other artists make educated decisions about color composition, it should be clear that the way designers today interact with color – the color picker – leaves much to be desired. ", "The color picker is as omnipresent as it is broken: With no significant changes over the last decade, it fails to provide a meaningful visual representation of the color spectrum, even though such models has existed for more than 300 years. ", "Instead, it uses a rectangular area to show a single hue at a time, and designers are left with no way to visualize the relationship between the selected colors, or even understand the difference between a perceptually uniform color model and its counterpart. ", "The consequence is that this entire history of color theory is neglected in modern design tools, which means that it is lost on students too.", "\n\nLuckily, we are not bound to digital design tools in this book. ", "In the following chapters, we will examine color models, color spaces, and many techniques that can be used to generate color schemes in code. ", "In order to not make the same mistakes as the people before us, these chapters will not seek to propose a unified theory about which colors are best for certain scenarios. ", "Instead, we will get to know the color palette, and learn how to see the effects of different color combinations. ", "This will hopefully lead to students developing a sound theoretical foundation upon which to base their practice." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0.008849557522123894, 0.007246376811594203, 0, 0, 0, 0, 0.004166666666666667, 0.011111111111111112, 0, 0, 0, 0, 0, 0, 0.0051813471502590676, 0.0047169811320754715, 0, 0, 0, 0.004807692307692308, 0, 0.005847953216374269, 0, 0.0045662100456621, 0, 0, 0.03125, 0, 0, 0, 0.005319148936170213, 0, 0.009009009009009009, 0, 0, 0.005555555555555556, 0, 0, 0.01020408163265306, 0.027777777777777776, 0, 0, 0, 0, 0, 0, 0.007462686567164179, 0.0036363636363636364, 0.0031847133757961785, 0, 0.01282051282051282, 0, 0.009900990099009901, 0, 0, 0, 0, 0.005681818181818182, 0, 0.0049504950495049506, 0.0049261083743842365, 0.017241379310344827, 0, 0, 0.006578947368421052, 0, 0, 0.009174311926605505, 0, 0, 0, 0, 0, 0.0064516129032258064, 0, 0.031496062992125984, 0, 0.005681818181818182, 0.009345794392523364, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009174311926605505, 0.005050505050505051, 0, 0, 0, 0.018691588785046728, 0.016129032258064516, 0, 0, 0, 0.007352941176470588, 0, 0.006134969325153374, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.002819
5
[ "He Is Legend\n\nHe Is Legend is an American rock band from Wilmington, North Carolina. ", "The band's lineup is front man Schuylar Croom, guitarist Adam Tanbouz, bassist Matt Williams, and drummer Jesse Shelley.", "\n\nHistory\n\nFormation and beginnings\nThe band's roots reach back into the late 1990s when Adam Tanbouz, Steven Bache, Matt Williams, and vocalist Schuylar Croom began writing and performing around Wilmington, NC while still in high school. ", "In 2003, having previously played under the names of Stronghold, No One Wins, and The Uriah Omen, the name He Is Legend was adopted by members Tanbouz, Bache, Bell, Croom, and Williams. ", "The name He Is Legend is an adaptation of the 1954 book I am Legend by Richard Matheson. ", "After releasing their first EP in June 2004 entitled 91025, the band signed on with Solid State Records and released their first full-length album in November, I Am Hollywood, which was followed by almost two years of extensive touring in the United States and Europe, the band temporarily relocated to California to record their next release. ", " However, the release almost never saw the light of day as the group would almost break up right after they had finished recording. ", " Suck Out the Poison was released on October 3, 2006.", "\n\nDeparture of McKenzie Bell, Mitchell Marlow, and Worth Weaver\nSoon after the release of Suck Out the Poison, guitarist McKenzie Bell left the band. ", "He was replaced by guitarist Mitch Marlow (previously of Classic Case). ", "During their tour with Chimaira, DragonForce, and Killswitch Engage in spring of 2007, the first few weeks were played as a 4-piece without Marlow. ", "During the Peanut Butt Tour '07, a different second guitarist, Worth Weaver, was seen playing in Marlow's spot. ", "At their show at the School of Rock in New Jersey, Bache stated that Marlow had accidentally booked himself to produce a record for another band back in North Carolina. ", "The dates of recording coincided with much of the tour, so he was not able to tour with the band. ", "Worth stepped in and was, by the account of Bache, excellent in his performance. ", "At their final show before beginning their tour in Australia, Marlow performed with the band, confirming that at the time he was still a member of He Is Legend.", "\n\nThe band's performances throughout the 2009 SXSW festival featured them as a four-piece once again. ", "After a Plano, Texas performance on March 17, Tanbouz stated that Weaver, not performing with the band that evening, is planning on getting married soon and he would be focusing more on his solo musical career with his personal studio and music. ", "Worth Weaver had begun standing in on the 2007 \"Peanut Butt Tour\" with the band.", "\n\nIt Hates You (2008–2009)\nAccording to a recent blog, He Is Legend announced that they will be taking a musical sabbatical in the forest surrounding North Carolina recording studio, Warrior Sound Studio. ", "The blog continues, saying that the material written during this hiatus will be used to create a record \"literally made of solid gold (figuratively speaking).\"", "\n\nOn April 24, 2008, He Is Legend posted four demo songs from their sabbatical, entitled \"Decisions Decisions Decisions\", \"Stranger Danger\", \"Don't Touch That Dial\", and \"Everyone I Know Has Fangs\" from the upcoming record.", "\n\nOn April 16, 2009, the band confirmed that their newest album, It Hates You was being released through Tragic Hero records on July 21, 2009. ", " (Originally set to be released on June 23). ", " On May 27, 2009, the band posted \"The Primarily Blues\" and in early July \"China White III\", and \"Future's Bright, Man\" on their Myspace.", "\n\nIt Hates You was released on July 21, 2009 and produced by Mitchell Marlow and Allen Jacob at Warrior Sound in Chapel Hill, NC, with additional production by Kit Walters.", "\n\nHiatus and new projects\nIn September 2009, it was announced that He Is Legend is taking an \"indefinite hiatus,\" although the band itself made no public announcement of their hiatus.", "\n\nFrom September 2009 until February 2010, frontman Schuylar Croom filled in on vocals for Dallas Taylor with Maylene and the Sons of Disaster.", "\n\nReunion\nOn December 29, 2010, the band did a reunion show in Wilmington, NC.", "\n\nOn October 16, 2011, it was announced that He Is Legend will be playing their first show since taking an indefinite hiatus in 2009. ", "The show took place on October 31, 2011, at the Satellite Bar and Lounge in Wilmington, North Carolina. ", "On December 22, 2011, frontman Schuylar Croom announced that there would be a new He Is Legend album released in 2012.", "\n\nIn January 2012 the band played two more shows in the North Carolina area, and in March, the band embarked on a 3-date tour of the east coast, playing in Baltimore, Maryland, Jermyn, Pennsylvania, and New York City. ", "The band toured once more throughout November–December 2012, but no other news regarding the promised new album were announced.", "\n\nHeavy Fruit (2013–2015)\nOn June 1, 2013, He Is Legend stated on their Facebook page, that Steve Bache had left the band, on good terms, after moving to a new city to pursue a higher education which would allow him a career in life. ", "They compared finding a new drummer to \"trying to find a kick ass drumming needle in a hay stack.\" ", "Luckily, they came upon an acquaintance, Sam Huff, whom had previously played in a band with friends of theirs. ", "He Is Legend stated that \"within 15 minutes of rehearsing one of our newer ideas with Sam we realized that he was the perfect person for the position.\"", "\n\nOn July 14, 2013, the band announced 6 new tour dates, and stated it will be the band's last tour before entering the studio to record their fourth album.", "\n\nOn August 27, 2013, it was announced that He Is Legend had officially begun working on their fourth studio album, with producer Mitch Marlow (Filter, A Skylit Drive), who was also the band's former rhythm guitarist. ", "In September, the band announced a full US tour for October–November 2013, while taking a break from recording the album.", "\n\nOn January 29, 2014, the band announced new material via Twitter with the following statement, \"Dudes and dude babes, we will be premiering our first song from our new album on Friday. ", "Spread the word.\" ", "The band's new single, \"Something Witchy\", premiered on February 2, 2014, on YouTube.", "\n\nOn February 19, 2014, the band announced on their official Facebook page that they had finished recording their new album. ", "Though no release date was announced, it will be released through Tragic Hero Records.", "\n\nOn June 10, 2014, the band announced on their official Facebook page that they will be touring North America with Maylene and the Sons of Disaster and Wilson. ", "The band also announced August 23, 2014 as the release party for their new album at Ziggy's By The Sea in Wilmington, NC.", "\n\nOn June 17, 2014, He Is Legend announced on their official Facebook page that their new album, entitled Heavy Fruit, will be released August 19, 2014. ", "They also premiered a new single, \"Miserable Company.\"", "\n\nFew (2015–2018)\nOn November 2, 2015, He Is Legend announced on their official Facebook page that they are launching a crowdfunding campaign to fund their upcoming record. ", "The crowdfunding proved successful, closing on December 2, 2015, having raised 124% of the stated goal, recording of the album would begin soon thereafter.", "\n\nOn March 28, 2017, He Is Legend premiered the music video for \"Air Raid\" on Loudwire\n\nWhite Bat (2019)\nOn October 31, 2018, He Is Legend released the single \"White Bat\". ", "Schuylar Croom wrote, \"We are so stoked to finally be able to let you know we have a new record coming next year. ", "Stay tuned for Preorder info... But for now enjoy the first single and title track White Bat\".", "\n\nOn April 25, 2019, the band revealed the track listing for White Bat, along with the second single \"Boogiewoman\".", "\n\nWhite Bat was released on June 28th, 2019.", "\n\nBand members\n\nCurrent members\n Schuylar Croom – lead vocals (2003–present)\n Adam Tanbouz – lead guitar (2003–present)\n Matty Williams – bass (2003–present)\n Jesse Shelley – drums (2016–present)\n\nFormer members\n McKenzie Bell – rhythm guitar, live backing vocals (2003–2006)\n Steven Bache – drums, percussion (2003–2013)\n Sam Huff – drums, percussion (2013–2016)\nLive musicians\n Denis Desloge – rhythm guitar (2014–2017)\n Joshua Snow – rhythm guitar (2013–2014)\n Worth Weaver – rhythm guitar (2007–2009, 2010–2013)\n Mitchell Marlow – rhythm guitar (2006–2007)\n\nTimeline\n\nDiscography \n\nStudio albums\n2004: I Am Hollywood\n2006: Suck Out the Poison U.S. No.", " 158\n2009: It Hates You U.S. No.", " 126\n2014: Heavy Fruit U.S. No.", " 148\n2017: few U.S. No.", " 170\n2019: White Bat\n\nEPs\n2004: 91025\n2006: Black Unicorn Split\n\nCompilations\n2006: The Song Lives On: A Tribute to Third Eye Blind\n contributed \"Wounded\" (Third Eye Blind cover)\n2006: This Is Solid State Vol. ", "6\n contributed \"Stampede\"\n\nMusic videos\n2004: \"The Seduction\"\n2006: \"Attack of the Dungeon Witch\"\n2017: \"Air Raid\"\n2017: \"Sand\"\n2018: \"White Bat\"\n2019: \"Boogie Woman\"\n\nReferences\n\nExternal links\n \n\nCategory:Alternative rock groups from North Carolina\nCategory:American hard rock musical groups\nCategory:Heavy metal musical groups from North Carolina\nCategory:Stoner rock musical groups\nCategory:Solid State Records artists\nCategory:Tragic Hero Records artists" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0.03333333333333333, 0.016736401673640166, 0.021505376344086023, 0.011235955056179775, 0.0029069767441860465, 0, 0.018867924528301886, 0.03333333333333333, 0.013888888888888888, 0.02027027027027027, 0.017857142857142856, 0.01775147928994083, 0, 0.024691358024691357, 0.00625, 0, 0.0040650406504065045, 0.0125, 0.004878048780487805, 0, 0, 0, 0, 0, 0.01744186046511628, 0, 0.02097902097902098, 0, 0, 0, 0.00847457627118644, 0, 0, 0.004273504273504274, 0, 0.008928571428571428, 0.006622516556291391, 0, 0.009174311926605505, 0, 0, 0, 0.011764705882352941, 0, 0.011627906976744186, 0.012422360248447204, 0.008264462809917356, 0.006535947712418301, 0, 0, 0, 0, 0, 0.02127659574468085, 0.008695652173913044, 0, 0.013740458015267175, 0, 0.03225806451612903, 0, 0.004761904761904762, 0.004357298474945534 ]
0.007487
5
[ "These are two possibly conflicting fascinations, as previously pointed out by Christopher Malmo here at Motherboard . ", "That's because bitcoin is incredibly energy intensive: at the time of Malmo's piece, he calculated that a single bitcoin transaction requires as much electricity as the daily consumption of 1.6 American households, and that number has increased since then. \"", "Adopting Bitcoin as a major currency anytime in the next few decades,\" he wrote, \"would just exacerbate anthropogenic climate change by needlessly increasing electricity consumption until it's too late.\"", "\n\nThe total bitcoin mining network currently comprises a calculation speed of over 800 petahashes per second, which requires over 10,000 metric tonnes of hardware, considering that even the newer machines weigh over 12 kilograms each (15 grams per GHash/sec. ", "on average in the analysis below). ", "That is enough material to build another Eiffel tower .*", "\n\nI started with the the amount of operational mining hardware (measured as the hashrate in number of hashes per second), and the efficiency of the hardware (which can be measured in Joules per hash).", "\n\nThis network of so-called bitcoin \"miners\" ensures the security of the system, but unfortunately also consumes a lot of electricity—currently about 350 megawatts according to my own calculations, which is roughly equivalent to the electricity demand of 280,000 American households .", "\n\nAs I have some experience in developing energy scenarios, I wanted to see how this could develop into the future. ", "My findings weren't much more encouraging. ", "According to my calculations, if the bitcoin network keeps expanding the way it has done recently, it could lead to a continuous electricity consumption that lies between the output of a small power plant and the total consumption of a small country like Denmark by 2020.", "\n\nLet's have a look at the efficiency of those ASIC miners over time. ", "I took an existing comparison of bitcoin mining hardware , to which I added a few miners myself and looked up all their first shipping dates, based on various sources (company specifications, blog-posts, first reviews, etc.). ", "After exclusion of the ones that were never actually shipped to customers, and after exclusion of some of the early highly inefficient ASIC miners because they didn't fit any trend, I ended up with a list of 53 types of bitcoin miners and plotted their efficiencies against their original shipping dates as can be seen below.", "\n\nIn the beginning of the bitcoin phenomenon, miners used any laptop or computer to generate bitcoins. ", "As the difficulty of mining bitcoin increased—part of the cryptocurrency's design—miners upgraded to graphics cards, and then more sophisticated hardware. ", "The state of the art is dedicated bitcoin mining chips (called application specific integrated circuits, or ASICs). ", "ASICs have been available for three years , so we have a small basis to explore the improvements in the efficiency of mining hardware.", "\n\nDrawing a trend from the other 46 miners has been done in two distinctly different ways, to represent both an optimistic as well as a more pessimistic assumption for the future development.", "\n\nI further excluded the USB miners (red squares) from any trend analysis, because regardless of their high efficiency, their purchase prices (per hash) are generally so much higher than for other miners that they are not likely to contribute a significant share of the total hashrate of the bitcoin network.", "\n\nThough these trend lines give us a hint of the future to come, they are only based on the efficiency of new mining hardware, and as such don't represent the efficiency of the current bitcoin network, which still partially depends on the calculation power of older, less efficient mining devices. ", "To approximate the effective efficiency of the whole network I assumed that the growth of the network's hashrate determined the amount of newly installed mining capacity each month, and then used weighted averaging over a period of either three or five years to represent the efficiency of the total stock of bitcoin mining hardware in an optimistic and pessimistic case respectively. ", "The resulting long term trends of both new and effective electricity consumption per hash can be seen below.", "\n\nThe pessimistic trend line is based on the average of all ASIC miners (the blue dots) and has the form of a power equation, thus it starts with a higher electricity consumption and though it assumes a continued increase in efficiency, it leads to a slightly higher future projection of electricity consumption per hash as compared to the optimistic approach. ", "For the optimistic case, I based the trend line only on the most efficient devices brought on the market (indicated with a black outline in the graph), and assumed an exponential decrease in electricity demand per hash, which actually represented the best fit to the data and leads to an even higher long-term efficiency.", "\n\nKnowing that the efficiency of the miners was only one part of the equation, the other part started haunting me at night. ", "Could it be that as bitcoin usage grows, the total hashrate of the bitcoin network kept growing at such a speed that it would outcompete the increase in efficiency of the miners? ", "Could it be that the total energy consumption would keep on growing?", "\n\nMy internal torment between environmental concerns and my enthusiasm about bitcoin mellowed somewhat when I saw these initial results. ", "Apparently, the technological advancements at chipmakers and hardware manufacturers made sure that in the future, bitcoin miners will probably become more than three times as efficient. ", "I could rest assured without a feeling of guilt. ", "Or could I?", "\n\nAs can be seen in the graph below, the high growth in hashrate originated mostly in the early days of ASIC mining, thus averaging over the more modest growth in more recent months should give a more balanced indication of the expected growth.", "\n\nThat couldn't be right. ", "The bitcoin price was increasing rapidly in 2013, hitting $1,000 apiece in late 2013 and again in early 2014 . ", "This price runup seemed like an anomaly fueled by hype, so it didn't seem accurate to use in my calculations for expected hashrate growth. ", "I had to find a more realistic estimate.", "\n\nTo complete the picture and answer this question, I dug up the historic development of the monthly hashrate at blockchain.info . ", "Since the introduction of the first ASIC mining hardware in January 2013, the average monthly growth of the network's hashrate has been a daunting 37 percent. ", "If we use that as a proxy for the monthly growth in the years to come, the bitcoin network would require more electricity than is currently generated globally, by the end of 2016 (yes, December this year, regardless even of the assumptions for mining efficiency).", "\n\nThe other rate is a bit more pessimistic (for the environment, not for the network security), and is based on the period that includes the three months preceding and following these 12 months (the larger blue box), leading to a 12 percent monthly increase.", "\n\nI applied two growth rates on the current 800 Peta hashes per second, one being optimistic and defined by the average of the network growth rate in the 12 months with the lowest growth since the introduction of ASIC miners (covered by the small blue box, which in fact was a period with a flat or sometimes even declining bitcoin price), leading to a 5 percent growth rate each month.", "\n\nOthers have argued that the halving of the mining reward will lead to increased bitcoin scarcity and therefore a quick increase in the bitcoin price, which would possibly lead to an even higher growth in hashrate quickly after the gap. ", "Again, it is impossible to say who is right. ", "But to somehow account for the diminishing block-reward, I assumed that the hashrate will either stop growing and stabilize during the six months following the halving of the block-reward (optimistic) or that it will simply keep growing as it did historically (pessimistic).", "\n\nHowever, the long-term effect on the total hashrate of this halving is unknown. ", "Some have argued that the reduced bitcoin reward would lower the incentive to bitcoin miners, possibly even leading to a large decrease in mining activity (what some call the \"mining gap\") as electricity costs will make mining unprofitable until the price of bitcoin rises again.", "\n\nTwo other factors that may influence the growth rate of the network's total hashrate are the bitcoin block size and the halving of the bitcoin block-reward, expected to happen this summer . ", "I've not accounted for any outcome of the discussion on the block size , as it is still being debated and the outcome is unknown still. ", "However, the block-reward halving is by design, based on the idea that bitcoin transaction fees will slowly take over as the main incentive for mining, thus it may have severe consequences on the energy consumption.", "\n\nObviously, these growth rates are highly uncertain and are always related to the bitcoin price, as miners will keep adding hashpower as long as it is profitable. ", "However, the price of bitcoin has been so volatile that it is simply impossible to predict. ", "Therefore I use the previously mentioned historic average growth in hashrate as a conservative (5 percent) and a more daring (12 percent) estimate of the stable growth for the years to come.", "\n\nWith the combination of both optimistic and pessimistic assumptions on the energy consumption of the bitcoin network we have in fact created two wildly different scenarios on how the bitcoin future may unfold. ", "What would this mean for the environmental impact of bitcoin by, say, January 2020? ", "The table below summarizes the main assumptions and gives an indication of the expected power consumption of the bitcoin network.", "\n\nThe results show that in an optimistic scenario, the increase in electricity consumption of the bitcoin network compared to now is not shocking, from around 350 MW to around 417 MW, but still on the order of one small power station. ", "If things play out a little less favorably, however, the bitcoin network may draw over 14 Gigawatts of electricity by 2020, equivalent to the total power generation capacity of a small country, like Denmark for example.", "\n\nThis is by no means a comprehensive analysis and these numbers should be taken with a pinch of salt, but the conclusion is an important one: If the network of bitcoin miners keeps expanding the way it has done, the increased efficiency of mining devices is most likely offset, leaving us anywhere between a slight growth or an explosion of the total energy consumption.", "\n\nEven in the optimistic scenario, just mining one bitcoin in 2020 would require a shocking 5,500 kWh, or about half the annual electricity consumption of an American household. ", "And even if we assume that by that time only half of that electricity is generated by fossil fuels, still over 4,000 kg of carbon dioxide would be emitted per bitcoin mined. ", "It makes you wonder whether bitcoin could still be called a virtual currency, when the physical effects could become so tangible.", "\n\nPersonally, I haven't given up on the idea of distributed network transactions, but a radical rethinking of how these may be secured would be beneficial, be it at least for the environment. ", "Perhaps a system where all miners are rewarded for their pledged surplus in CPU processing power, but the actual hashing is performed only by a few thousand randomly selected and continuously changing CPUs, would be a solution. ", "We could throw the remnants of our destructive arms race for hashing power out the window, perhaps find a way to make a few old miners useful in functional calculations, and use the rest of them to build a rusty totem in honor of Satoshi." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.01694915254237288, 0, 0, 0.003861003861003861, 0, 0, 0, 0, 0, 0, 0, 0.014285714285714285, 0, 0, 0, 0, 0, 0.007462686567164179, 0, 0.003246753246753247, 0, 0, 0, 0.002770083102493075, 0, 0.008064516129032258, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007633587786259542, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00851063829787234, 0, 0, 0, 0, 0, 0, 0, 0.004201680672268907 ]
0.001184
5
[ "Steely Dan's Aja (33 1/3 Series)\n\nAja was the album that made Steely Dan a commercial force on the order of contemporaries like Fleetwood Mac, the Eagles and Chicago. ", "A double-platinum, Grammy-winning best seller, it lingered on the Billboard charts for more than a year and spawned three hit singles. ", "Odd, then, that its creators saw it as an \"ambitious, extended\" work, the apotheosis of their anti-rock, anti-band, anti-glamour aesthetic. ", "Populated by 35 mostly jazz session players, Aja served up prewar song forms, mixed meters and extended solos to a generation whose idea of pop daring was Paul letting Linda sing lead once in a while." ]
{ "pile_set_name": "Pile-CC" }
[ 0.011976047904191617, 0.014814814814814815, 0, 0.005 ]
0.007948
5
[ "\nFacebook Shuts Down Facebook Lite - barredo\nhttp://www.allfacebook.com/2010/04/facebook-lite-killed/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+allfacebook+%28Facebook+Blog%29&utm_content=Google+Reader\n======\npie\nI really liked the idea of Facebook Lite, but it always felt significantly\nslower, and content was often quite stale, rendering a product that seemed\nawkward to use and possibly even incomplete.", "\n\nThis eventually drove me back to regular Facebook. ", "Guess it's time to stop\nhoping for improvements so I can switch back.", "\n\n------\nryandvm\nThis was the only way I found Facebook tolerable and they shut it down. _", "sigh_\nLike Apple, Facebook somehow manages to regularly insult their users without\nsuffering the slightest damage for it.", "\n\nPerhaps I can cobble together a facsimile for myself with Yahoo Pipes...\n\n~~~\nthrow_away\nHere's a little hint that I've been preaching to everyone who complains that\nfb is unusable (I suspect due to all the farmwars and mafiaville junk): if you\nclick the \"hide\" button next to the post you can choose to ban the application\nrather than the person. ", "And this blocks all posts from that application from\nany friend. ", "You do it once to block out every annoying app you don't care to\nsee and then you only have to add a new one once every couple of weeks as they\ncome out. ", "As a result, my vanilla fb feed is as readable as the lite.fb\nversion.", "\n\n~~~\nspanf\nhiding an app with the fb \"hide\" button only hides it from your feed, it\ndoesnt stop that app getting your private info or sending you invitations to\nadd the app.", "\n\nblocking applications is the best way of halting the tidal wave of these\nannoying apps, Facebook Purity <http://www.fbpurity.com> adds a \"block app\"\nbutton which makes it a much quicker process to block the applications. ", "ever\nwonder why facebook dont provide a \"block app\" button, because the application\ndevelopers still want to access all your data and be able to send you\ninvitations to add your app, and they and facebook dont want to give you the\noption because it helps the apps spread virally, and the constant\nupdates/invites etc from apps are one factor that makes fb \"sticky\" or in\nother words keeps people on the site refreshing the page, and increasing ad\nimpressions.", "\n\n~~~\nthrow_away\nis this still necessary if you've never opted into the app? ", "I've never played\nfarmville or allowed it to see any of my data, but lots of my friends have.", "\ndoes this mean that farmville can see privileged information?", "\n\n------\nfinnomenon\nthis might help a little: <http://www.fbpurity.com/>\n\n------\ntehdik\nSo weak.", "\n\n" ]
{ "pile_set_name": "HackerNews" }
[ 0.0023584905660377358, 0, 0, 0, 0.008264462809917356, 0.002857142857142857, 0, 0, 0, 0, 0.008968609865470852, 0, 0, 0, 0, 0.010416666666666666, 0 ]
0.001933
5
[ "In Brief\n\nSolar energy in the United Kingdom broke another record Friday, with the National Grid reporting that solar panels supplied almost a quarter of the country's electricity demands at midday.", "\n\nHere Comes the Sun\n\nThe Beatles may have well predicted the future for their mother country as the Sun now shines bright in the United Kingdom. ", "According to the National Grid, almost 25 percent of Great Britain’s electricity demand was served by solar at midday Friday. ", "The clean energy source generated 8.7 gigawatts, which is more than the previous record set on May 10, when solar generated 8.48 gigawatts.", "\n\n“We now have significant volumes of renewable energy on the system, and as this trend continues, our ability to forecast these patterns is becoming more and more important,” Duncan Burt, who oversees the National Grid’s control room operations, told theIndependent.", "\n\n“This is a colossal achievement … and sends a very positive message to the U.K. that solar has a strong place in the decarbonization of the U.K. energy sector,” Paul Barwell, chief executive of the Solar Trade Association, pointed out.", "\n\nAs Barwell noted, this marks the first time solar panels generated more electricity in the U.K. than nuclear plants. ", "Natural gas and coal remain the country’s top suppliers of electricity, however.", "\n\nStacking up on Renewables\n\nThis milestone is obviously a win for renewables and a sign that nations are moving toward cleaner energy sources.", "\n\nThe steady rise of solar energy is made possible in part by the decrease in the cost of solar panels. ", "At the same time, it doesn’t hurt that the solar industry is also providing jobs in places desperate for them, such as the U.S. As Hannah Martin, head of energy for Greenpeace UK, told theIndependent, “All around the world, solar power keeps beating new records as costs come down and power generation goes up. ", "In the U.S., more people were employed in generating electricity from solar last year than from coal, oil, and gas combined.”" ]
{ "pile_set_name": "Pile-CC" }
[ 0.005050505050505051, 0.00684931506849315, 0.007936507936507936, 0, 0.011235955056179775, 0.008438818565400843, 0.008403361344537815, 0, 0.006993006993006993, 0, 0.00964630225080386, 0 ]
0.005379
5
[ "Consulting\n\nSQL Server\n\nRelease 1.0.22 is out and available at the Is It SQL home page. ", "The biggest feature here is database mirroring.", "\n\nThere are two ways to see database mirroring. ", "The first is on a server page it will show the databases that are mirrored. ", "There is also a global database mirroring page that shows all mirrored databases. ", "There’s an added column named “priority” that highlights databases that aren’t connected and synchronized. ", "It also shows shows databases that have send or receive queues. ", "Since the column is sortable it should always show databases with “stuff” going on at the top.", "\n\nPlease note that you’ll need to sign up for the newsletter for instructions on how to enable the beta features. ", "You can find the link on Is It SQL page.", "\n\nData that is pulled from servers when the page is refreshed is now identified with a little lightning bolt. ", "Most data is cached every minute but some data refreshes with each page load. ", "This helps identify which is which. ", "The basic rule of thumb is that everything is cached except what has the lightning bolt.", "\n\nRelease 1.0.20 is out. ", "You can download it from my corporate site at http://www.scalesql.com/isitsql/. This release adds a beta feature to allow you tag servers and then filter the list by tag.", "\n\nInstructions for enabling beta features are available when you sign up for the newsletter. ", "The newsletter is limited to Is It SQL features and releases.", "\n\nThe current release automatically tags servers based on their version. ", "This release also tags servers based on their domain too. ", "It allows you to enter user-defined tags for each server. ", "Common tags I’ve been using include development, test, production, disaster recovery, physical location, virtual vs. physical, application support, reporting, SSAS, SSRS, etc.", "\n\nWhen I first starting writing this tool and using it I mostly focused on the key production servers. ", "While testing this feature I’ve gradually added more servers to it. ", "It’s been very helpful keeping an eye on servers I rarely look at but seem to have weird issues (cough, dev boxes, cough). ", "Tagging allows me to filter those out of my main list but still be able to find them when I need them.", "\n\nYou can download the latest build of Is It SQL from my consulting site. ", "You can now view the databases on a server. ", "And you can click on a column header to sort that column.", "\n\nAnd no, my fantasy baseball team in 2015 didn’t do very well. ", "Unfortunately this year is much the same.", "\n\nHere are a few other improvements:\n\nThe Active Task page for a server no longer displays tasks waiting on BROKER_RECEIVE_WAITFOR.", "\n\nThe menu bar stays on top when scrolling down. ", "And I’m really surprised how much this little change has made the whole application so much more usable.", "\n\nThere’s better error reporting if you launch the application and the port is already in use. ", "I mainly see this when I launch the application and it’s already running as a service.", "\n\nIt prioritizes ODBC 13 over ODBC 11. ", "And it will gracefully fail back to earlier drivers until it finds one it can use.", "\n\nIf you’re running as a service, just stop the service, copy over IsItSql.", "EXE, and restart the service. ", "There’s never any installation needed. ", "And my email is at the bottom of the README if you have any questions or concerns.", "\n\nThis release includes a few minor bug fixes and smaller enhancements. ", "Thanks to everyone that tried it out and reported back. ", "At the bottom of the README.html I include my email address if you’d like to provide feedback. ", "I’d love to hear what you like or what needs work.", "\n\nOne of my goals for this application was to know if a server was unreachable or it returned an error running any of the polling queries. ", "These servers show up in red in the list on the main page. ", "They are also displayed at the top of every page in a nice red box. ", "Previously some pages didn’t display the servers with errors at the top. ", "One page even displayed them twice. ", "I guess it really, really wanted you to fix whatever the issue was.", "\n\nI also excluded sessions running a WAITFOR command from the active sessions that are displayed when you look at the detail for a server. ", "A number of system SPIDs seem to use it. ", "And it seems a bit of my code does too. ", "I’m finding I don’t want to see it more than I want to see it. ", "I’m not sure this is the right answer and I’ll revisit it one of these days.", "\n\nThe database size was a simple sum of sys.master_files which included snapshots. ", "Which ballooned the size reported if you had a lot of snapshots. ", "For now I’ve excluded snapshots from the size total. ", "I’m hoping in the next release to add back the actual size on the disk from the snapshot. ", "That’s what I want to see anyway.", "\n\nYou might not have noticed but the columns in the main page are sortable. ", "Just click on a header and they’ll sort. ", "They also remember their sort order across refreshes. ", "I changed a few of the columns to sort in descending order by default. ", "So CPU percentage and database size will show the largest values first. ", "I also need some type of icon indicating that these columns sort and what the order is but that’s going to be a future enhancement.", "\n\nThat’s it for this release. ", "The install should be as simple as stopping the service, copying over the executable and restarting the service. ", "If you have any issues, email me at the address at the bottom of the README. ", "You can download the latest build at www.scalesql.com/downloads/isitsql.1.0.18.zip.", "\n\nI’ve been working on a simple monitoring tool for SQL Server over the last few months. ", "I often find myself asking “What just happened?” ", "and “Was it SQL Server?”. ", "I wanted a small utility I could leave running at clients that would answer that question. ", "It needed to be simple enough that a non-SQL Server person could look at it and get an idea if there was an issue with SQL Server. ", "But also sophisticated enough that it would point me in the right direction.", "\n\nIt will capture the following information for each server every minute:\n\nCPU Usage for SQL Server and non-SQL Server tasks\n\nBatch requests per second\n\nDisk Read and Write volume and Page Life Expectancy\n\nThe largest waits grouped together. ", "For example, the PAGEIO* waits are all grouped together as Disk IO waits. ", "You can customize this mapping for your environment.", "\n\nIt also captures some basic information about the server including the version, restart date and aggregate database size.", "\n\nWhen you bring up a server page it will show the currently running queries and the last 60 minutes of the metrics above. ", "When someone reports an issue I can look at the last hour for any server with just two clicks. ", "And quickly answer: “Is It SQL Server?”", "\n\nI also wanted this to be very simple to use and install. ", "It can run as a simple command line executable. ", "It doesn’t require .NET or Java or even SQL Server. ", "The only requirement is some flavor of ODBC driver for SQL Server which nearly every server has. ", "It hosts a self-contained web server that displays the information you’re looking for. ", "It includes an option to install itself as a service so it runs in the background and is always available. ", "Adding servers is as simple as putting their names into a text file.", "\n\nAll the big servers I monitor already have a fancy monitoring solution. ", "But I’ve never been happy with the solutions for the second tier of servers or the smaller clients that won’t buy a dedicated monitoring solution. ", "So this is what I’ve been using.", "\n\nI’m pleased to announce that ClearTrace Build 51 is now available for download. ", "If you’re using a previous build (especially build 50) I encourage you to download this version.", "\n\nThis build should load the latest version of the SMO libraries installed on your machine. ", "If you’re using SQL Server 2016, you need the SQL Server engine AND SQL Server Management Studio installed. ", "I believe this is the only way to get the complete SMO library. ", "This also means that when SQL Server 2036 is released it will automatically support it – and hopefully all the releases between now and then.", "\n\nThis version has a new sort named “CPU & Reads”. ", "It sorts based on the rank of each statement for CPU and Reads. ", "If you choose to display the top 15 statements and choose this sort you will get the top 7 of CPU and the top 7 of Reads. ", "Assuming there will be some overlap it will then fill up to 15 with using the highest ranking statements. ", "Or to put it in terms you might better understand, the ORDER BY looks like this:\n\nThe build also fixes a small parsing bug for statements that look like this: EXEC sp_executesql @statement=N'SELECT 1'. ", "The combination of EXEC and sp_executesql was making the actual statement disappear. ", "That’s fixed.", "\n\nWe were experiencing trouble installing SQL Server 2014 onto a Windows 2012 R2 VM. ", "These are new production boxes so I was being very careful. ", "The problem manifest itself in two ways:\n\nA clean installation using our service account got almost all the way through and then failed with the Unauthorized Operation message. ", "It was painful to get out of the installer. ", "I would just hang on a cancel and then eventually exit.", "\n\nInstalling using Local System worked but then we couldn’t switch to use our service account. ", "We received the same error. ", "This error included an 0x80070005 error code.", "\n\nI have a number of other SQL Server 2014 installations on Windows 2012 R2 so this surprised me. ", "The detailed error log included this:\n\nA search through the Internet revealed a number of possibilities. ", "I tried to run the installation as Administrator. ", "I wasn’t very hopeful on that since the first thing the installer does is pop up the UAC prompt. ", "Someone also suggested disabling the UAC functionality. ", "I didn’t try that. ", "We also copied the installation media of the mounted DVD into a regular directory. ", "That didn’t help either.", "\n\nWe finally discovered that the team that preps the VMs was now removing both “ABC\\Domain Users” and “Authenticated Users” from the local “Users” group. ", "And that was the issue. ", "Putting the service account back in that group fixed the issue.", "\n\nI’ve decided to stop using the year as part of the version. ", "I did that to match SQL Server branding but it doesn’t work for ClearTrace. ", "The current build supports SQL Server 2008, SQL Server 2008 R2, SQL Server 2012, and SQL Server 2014. ", "It tries to load the most recent SMO and goes backwards until it successfully loads an SMO library. ", "Always use the most recent version of ClearTrace and it should support any current SQL Server.", "\n\nIf you’re having issues with ClearTrace you can visit the new ClearTrace Support Forums. ", "That’s the best place to ask questions or report bugs.", "\n\nThe latest build adds a number of features. ", "The first is an option that doesn’t reprocess trace files. ", "I regularly generate large traces that have many files and I’m too impatient to wait for them all to finish. ", "The script I use generates a unique name for each trace file. ", "This option allows me to skip the trace files that have already been loaded.", "\n\nI also fixed a pseudo-memory leak that had been hanging around for a LONG time. ", "One of my early uses of ClearTrace was for a client that had lots of prepared SQL. ", "In the trace file I would find lots of sp_execute 32423445 or some such. ", "That number identifies the prepared SQL statement. ", "ClearTrace captures the statement that prepares that SQL and reports back the actual SQL executed. ", "This was all being stored in memory. ", "Either I wasn’t clearing it properly or I didn’t understand how it got cleared but this structure was ballooning up. ", "I’d regularly fill up memory to just under 2GB and watch the application crash. ", "Now the application clears this structure after each trace file. ", "If you want better handling of prepared SQL just increase the trace file size. ", "That will capture more of the prepared SQL statements.", "\n\nTrace Groups allow you to group traces together. ", "They are especially helpful to view changes over time. ", "I typically have one trace group per server. ", "I’ve seen users that have dozens and dozens of trace groups with all kinds of fancy names. ", "So I made the Trace Group Name drop down wider and hopefully easier to work with.", "\n\nIf you capture statement level traces and you have lots of nested stored procedures you’ll see lots of EXEC statements in your list of statements. ", "If you end up a few layers deep you can see LOTS of EXEC statements. ", "So I added an entry to the Events drop down filter to exclude statements that start with EXEC. ", "All it does is eliminate anything that starts with “EXEC”. ", "So far it’s been helpful.", "\n\nI also fixed the history tab to work better with statements. ", "And by “better” I mean it actually works now. ", "You should get a statements history without the application blowing up.", "\n\n(And if you downloaded build 46 please update to build 47. ", "It’s just minor bug fixes around how statements are displayed in the grid. ", "Or not displayed as was happening in some situations.)", "\n\nAaron Bertrand wrote the post I always start with on troubleshooting 18456 errors. ", "I’ve always struggled tracking down the root cause of state 11 though. ", "I’ve seen it intermittently occur and then clean itself up. ", "One of the reported causes is difficultly connecting to a domain controller so that kind of fits.", "\n\nBut this time it was occurring and not going away. ", "People have suggested deleting and recreating the login, running as Administrator, disabling UAC, etc.", "\n\nIn our case, the login had been given permission through a Windows Group. ", "That group had been removed, thus the user no longer had permission. ", "But rather than give a standard login failure, it gave the state 11 error. ", "That left me heading down a rabbit hole until xp_logininfo cleared up that they just didn’t have access. ", "My only guess is that because they’d logged in before there was some artifact left on the system and the result was a slightly different login failure error message.", "\n\nI’m hoping this might help the next person tracking down the dreaded state 11.", "\n\nSQL Saturday #300 is coming up right here in Kansas City on September 13th, 2014. ", "This is our fifth SQL Saturday which means it's the fifth anniversary of our now infamous BBQ Crawl. ", "We get together on Friday afternoon before the event and visit a few local joints. ", "We've done nice places and we've done dives. ", "We haven’t picked the venues yet but I promise you’ll be well fed!", "\n\nAnd if you’re thinking about the BBQ crawl you should think about submitting a session. ", "Our call for speakers closes Tuesday, July 15th so you just have time!", "\n\nIf you’re going to be at the event, contact me and I’ll get you added to the list.", "\n\nPASS launched a Global Growth Initiative in the Summer of 2011 with the appointment of three international Board advisors. ", "Since then we’ve thought and talked extensively about how we make PASS more relevant to our members outside the US and Canada. ", "We’ve collected much of that discussion in our Global Growth site. ", "You can find vision documents, plans, governance proposals, feedback sites, and transcripts of Twitter chats and town hall meetings. ", "We also address these plans at the Board Q&A during the 2012 Summit.", "\n\nOne of the biggest changes coming out of this process is around how we elect Board members. ", "And that requires a change to the bylaws. ", "We published the proposed bylaw changes as a red-lined document so you can clearly see the changes.", "\n\nOur goal in these bylaw changes was to address the changes required by the global growth initiatives, conduct a legal review of the document and address other minor issues in the document. ", "There are numerous small wording changes throughout the document. ", "For example, we replaced every reference of “The Corporation” with the word “PASS” so it now reads “PASS is organized…”.", "\n\nBoard Composition\n\nThe biggest change in these bylaw changes is how the Board is composed and elected. ", "This discussion starts in section VI.2. ", "This section now says that some elected directors will come from geographic regions. ", "I think this is the best way to make sure we give all of our members a voice in the leadership of the organization. ", "The key parts of this section are:\n\nThe remaining Directors (i.e. the non-Officer Directors and non-Vendor Appointed Directors) shall be elected by the voting membership (“Elected Directors”). ", "Elected Directors shall include representatives of defined PASS regions (“Regions”) as set forth below (“Regional Directors”) and at minimum one (1) additional Director-at-Large whose selection is not limited by region. ", "Regional Directors shall include, but are not limited to, two (2) seats for the Region covering Canada and the United States of America.", "\n\nAdditional Regions for the purpose of electing additional Regional Directors and additional Director-at-Large seats for the purpose of expanding the Board shall be defined by a majority vote of the current Board of Directors and must be established prior to the public call for nominations in the general election. ", "Previously defined Regions and seats approved by the Board of Directors shall remain in effect and can only be modified by a 2/3 majority vote by the then current Board of Directors.", "\n\nCurrently PASS has six At-Large Directors elected by the members. ", "These changes allow for a Regional Director position that is elected by the members but must come from a particular region. ", "It also stipulates that there must always be at least one Director-at-Large who can come from any region.", "\n\nWe also understand that PASS is currently a very US-centric organization. ", "Our Summit is held in America, roughly half our chapters are in the US and Canada and most of the Board members over the last ten years have come from America. ", "We wanted to reflect that by making sure that our US and Canadian volunteers would continue to play a significant role by ensuring that two Regional seats are reserved specifically for Canada and the US.", "\n\nOther than that, the bylaws don’t create any specific regional seats. ", "These rules allow us to create Regional Director seats but don’t require it. ", "We haven’t fully discussed what the criteria will be in order for a region to have a seat designated for it or how many regions there will be. ", "In our discussions we’ve broadly discussed regions for\n\nUnited States and Canada\n\nEurope, Middle East, and Africa (EMEA)\n\nAustralia, New Zealand and Asia (also known as Asia Pacific or APAC)\n\nMexico, South America, and Central America (LATAM)\n\nAs you can see, our thinking is that there will be a few large regions. ", "I’ve also considered a non-North America region that we can gradually split into the regions above as our membership grows in those areas.", "\n\nThe regions will be defined by a policy document that will be published prior to the elections. ", "I’m hoping that over the next year we can begin to publish more of what we do as Board-approved policy documents.", "\n\nWhile the bylaws only require a single non-region specific At-large Director, I would expect we would always have two. ", "That way we can have one in each election. ", "I think it’s important that we always have one seat open that anyone who is eligible to run for the Board can contest. ", "The Board is required to have any regions defined prior to the start of the election process.", "\n\nBoard Elections – Regional Seats\n\nWe spent a lot of time discussing how the elections would work for these Regional Director seats. ", "Ultimately we decided that the simplest solution is that every PASS member should vote for every open seat. ", "Section VIII.3 reads:\n\nCandidates who are eligible (i.e. eligible to serve in such capacity subject to the criteria set forth herein or adopted by the Board of Directors) shall be designated to fill open Board seats in the following order of priority on the basis of total votes received: (i) full term Regional Director seats, (ii) full term Director-at-Large seats, (iii) not full term (vacated) Regional Director seats, (iv) not full term (vacated) Director-at-Large seats. ", "For the purposes of clarity, because of eligibility requirements, it is contemplated that the candidates designated to the open Board seats may not receive more votes than certain other candidates who are not selected to the Board.", "\n\nWe debated whether to have multiple ballots or one single ballot. ", "Multiple ballot elections get complicated quickly. ", "Let’s say we have a ballot for US/Canada and one for Region 2. ", "After that we’d need a mechanism to merge those two together and come up with the winner of the at-large seat or have another election for the at-large position.", "\n\nWe think the best way to do this is a single ballot and putting the highest vote getters into the most restrictive seats. ", "Let’s look at an example:\n\nThere are seats open for Region 1, Region 2 and at-large. ", "The election results are as follows:\n\nCandidate A (eligible for Region 1) – 550 votes\n\nCandidate B (eligible for Region 1) – 525 votes\n\nCandidate C (eligible for Region 1) – 475 votes\n\nCandidate D (eligible for Region 2) – 125 votes\n\nCandidate E (eligible for Region 2) – 75 votes\n\nIn this case, Candidate A is the winner for Region 1 and is assigned that seat. ", "Candidate D is the winner for Region 2 and is assigned that seat. ", "The at-large seat is filled by the high remaining vote getter which is Candidate B.\n\nThe key point to understand is that we may have a situation where a person with a lower vote total is elected to a regional seat and a person with a higher vote total is excluded. ", "This will be true whether we had multiple ballots or a single ballot.", "\n\nBoard Elections – Vacant Seats\n\nThe other change to the election process is for vacant Board seats. ", "The actual changes are sprinkled throughout the document.", "\n\nPreviously we didn’t have a mechanism that allowed for an election of a Board seat that we knew would be vacant in the future. ", "The most common case is when a Board members moves to an Officer role in the middle of their term. ", "One of the key changes is to allow the number of votes members have to match the number of open seats. ", "This allows each voter to express their preference on all open seats. ", "This only applies when we know about the opening prior to the call for nominations. ", "This all means that if there’s a seat will be open at the start of the next Board term, and we know about it prior to the call for nominations, we can include that seat in the elections. ", "Ultimately, the aim is to have PASS members decide who sits on the Board in as many situations as possible.", "\n\nWe discussed the option of changing the bylaws to just take next highest vote-getter in all other cases. ", "I think that’s wrong for the following reasons:\n\nAll voters aren’t able to express an opinion on all candidates. ", "If there are five people running for three seats, you can only vote for three. ", "You have no way to express your preference between #4 and #5.", "\n\nDifferent candidates may have different information about the number of seats available. ", "A person may learn that a Board member plans to resign at the end of the year prior to that information being made public. ", "They may understand that the top four vote getters will end up on the Board while the rest of the members believe there are only three openings. ", "This may affect someone’s decision to run. ", "I don’t think this creates a transparent, fair election.", "\n\nBoard members may use their knowledge of the election results to decide whether to remain on the Board or not. ", "Admittedly this one is unlikely but I don’t want to create a situation where this accusation can be leveled.", "\n\nI think the majority of vacancies in the future will be handled through elections. ", "The bylaw section quoted above also indicates that partial term vacancies will be filled after the full term seats are filled.", "\n\nRemoving Directors\n\nSection VI.7 on removing directors has always had a clause that allowed members to remove an elected director. ", "We also had a clause that allowed appointed directors to be removed. ", "We added a clause that allows the Board to remove for cause any director with a 2/3 majority vote. ", "The updated text reads:\n\nAny Director may be removed for cause by a 2/3 majority vote of the Board of Directors whenever in its judgment the best interests of PASS would be served thereby.", "\n\nNotwithstanding the foregoing, the authority of any Director to act as in an official capacity as a Director or Officer of PASS may be suspended by the Board of Directors for cause.", "\n\nCause for suspension or removal of a Director shall include but not be limited to failure to meet any Board-approved performance expectations or the presence of a reason for suspension or dismissal as listed in Addendum B of these Bylaws.", "\n\nThe first paragraph is updated and the second and third are unchanged (except cleaning up language). ", "If you scroll down and look at Addendum B of these bylaws you find the following:\n\nCause for suspension or dismissal of a member of the Board of Directors may include:\n\nInability to attend Board meetings on a regular basis.", "\n\nInability or unwillingness to act in a capacity designated by the Board of Directors.", "\n\nFailure to fulfill the responsibilities of the office.", "\n\nInability to represent the Region elected to represent\n\nFailure to act in a manner consistent with PASS's Bylaws and/or policies.", "\n\nMisrepresentation of responsibility and/or authority.", "\n\nMisrepresentation of PASS.", "\n\nUnresolved conflict of interests with Board responsibilities.", "\n\nBreach of confidentiality.", "\n\nThe bold line about your inability to represent your region is what we added to the bylaws in this revision. ", "We also added a clause to section VII.3 allowing the Board to remove an officer. ", "That clause is much less restrictive. ", "It doesn’t require cause and only requires a simple majority.", "\n\nThe Board of Directors may remove any Officer whenever in their judgment the best interests of PASS shall be served by such removal.", "\n\nOther\n\nThere are numerous other small changes throughout the document.", "\n\nProxy voting. ", "The laws around how members and Board members proxy votes are specific in Illinois law. ", "PASS is an Illinois corporation and is subject to Illinois laws. ", "We changed section IV.5 to come into compliance with those laws. ", "Specifically this says you can only vote through a proxy if you have a written proxy through your authorized attorney.", "\n\nEnglish language proficiency. ", "As we increase our global footprint we come across more members that aren’t native English speakers. ", "The business of PASS is conducted in English and it’s important that our Board members speak English. ", "If we get big enough to afford translators, we may be able to relax this but right now we need English language skills for effective Board members.", "\n\nCommittees. ", "The language around committees in section IX is old and dated. ", "Our lawyers advised us to clean it up. ", "This section specifically applies to any committees that the Board may form outside of portfolios. ", "We removed the term limits, quorum and vacancies clause. ", "We don’t currently have any committees that this would apply to. ", "The Nominating Committee is covered elsewhere in the bylaws.", "\n\nElectronic Votes. ", "The change allows the Board to vote via email but the results must be unanimous. ", "This is to conform with Illinois state law.", "\n\nImmediate Past President. ", "There was no mechanism to fill the IPP role if an outgoing President chose not to participate. ", "We changed section VII.8 to allow the Board to invite any previous President to fill the role by majority vote.", "\n\nNominations Committee. ", "We’ve opened the language to allow for the transparent election of the Nominations Committee as outlined by the 2011 Election Review Committee.", "\n\nRevocation of Charters. ", "The language surrounding the revocation of charters for local groups was flagged by the lawyers. ", "We have allowed for the local user group to make all necessary payment before considering returning of items to PASS if required.", "\n\nBylaw notification. ", "We’ve spent countless meetings working on these bylaws with the intent to not open them again any time in the near future. ", "Should the bylaws be opened again, we have included a clause ensuring that the PASS membership is involved. ", "I’m proud that the Board has remained committed to transparency and accountability to members. ", "This clause will require that same level of commitment in the future even when all the current Board members have rolled off.", "\n\nI think that covers everything. ", "I’d encourage you to look through the red-line document and see the changes. ", "It’s helpful to look at the language that’s being removed and the language that’s being added. ", "I’m happy to answer any questions here or you can email them to feedback@sqlpass.org.", "\n\nThere’s another update to my little utility to script a SQL Server’s configuration. ", "I use this for two purposes. ", "First, I use it to keep my database mirroring servers up to date. ", "Second, I capture the output in a version control system and keep that for historical reference.", "\n\nIn release 3.0.9 I made the following changes:\n\nRewrote the encrypted trigger scripting. ", "It will now list the encrypted triggers in a comment in the table script but can’t actually script them.", "\n\nIt now scripts any server event notifications.", "\n\nYou can script a single database using the /scriptdb flag. ", "Please note that it will also script the instance and system databases when it does this.", "\n\nIt will script any user-defined endpoints. ", "This will capture your mirroring endpoints and more importantly any service broker endpoints.", "\n\nIt will gracefully skip database mail on the Express Edition.", "\n\nIt still doesn’t support SQL Server 2012. ", "I think that’s the next feature to add though.", "\n\nAlways script model, master and msdb to capture any user-defined objects in those databases\n\nLogins are now scripted so that everything for a login is grouped together.", "\n\nThere’s a second section in the logins that handles default databases. ", "In many cases a login’s default database is a mirror target and can’t be set. ", "This is now handled gracefully. ", "It also includes a separate section for all default databases so those can be quickly set in the event of a disaster.", "\n\nScript credentials\n\nScript proxy accounts\n\nScript database mail\n\nMy goal is still to get everything outside a database scripted. ", "This release is enough that I can keep my mirror target servers in sync with their principals.", "\n\nNihao! ", "One of the largest changes PASS is going through is the the expansion outside the US and Canada. ", "We’ve had international chapters and events in Europe since the early 2000’s. ", "But nothing on the scale we’re seeing now. ", "Since January 1st there have been 18 SQL Saturday events outside North America and 19 events in North America. ", "We hope to have three international SQLRally events outside the US in FY13 (budget willing). ", "I don’t know the exact percentage of chapters outside the US but it’s got be 50% or higher.", "\n\nWe recently started an effort to remake the Board to better reflect the growing global face of PASS. ", "This involves assigning some Board seats to geographic regions. ", "You can ask questions about this in our feedback forum, participate in a Twitter chat or ask questions directly of Board members. ", "You can email me at if you’d like to ask a question directly. ", "We’re doing this very slowly and deliberately in hopes that a long communication cycle gives us a chance to address all the issues that our members will raise.", "\n\nAfter the Summit we passed a budget exception allocating an extra $20,000 for Board members to travel to local events. ", "I think it’s important for Board members to visit new areas and talk to more of our members. ", "I sent out an email asking where people had attended events outside their home city. ", "Here’s the list I got back: Albuquerque, Amsterdam, Boston, Brisbane, Chicago, Colorado Springs, Columbus, Dallas, Houston, Jacksonville, Las Vegas, London, Louisville, Minneapolis, New York City, Orange County, Orlando, Pensacola, Perth, Philadelphia, Phoenix, Redmond, Seattle, Silicon Valley, Sydney, Tampa Bay, Vancouver, Washington DC and Wellington. (", "Disclaimer: Some of this travel was paid for by employers or Board members themselves. ", "Some of this travel may have been completed before the Summit. ", "That’s still one heck of a list!)", "\n\nThe last SQL Saturday event this fiscal year is SQL Saturday Shanghai. ", "And that’s one I’m attending. ", "This is our first event in China and is being put on in cooperation with the local Microsoft office. ", "Hopefully this event will be the start of a growing community in China that includes chapters, SQL Saturdays and maybe a SQLRally or two in the future. ", "I’m excited to speak with people that are just starting down this path and watching this community grow.", "\n\nI encourage you to visit the PASS Global Growth site and read through the material there. ", "This is the biggest change we’ve made to our governance since I’ve been on the Board. ", "You need to understand how it affects you and how it affects the organization.", "\n\nAnd wish me luck on the 15 hour flight to Shanghai on Friday afternoon. ", "Rob Farley flies from Australia to the US for PASS events multiple times per year and I don’t know how he does it so often. ", "I think one of these is going to wipe me out. (", "And Nihao (knee-how) is Chinese for Hello.)", "\n\nThe next Kansas City SQL Saturday is coming up on August 4th. ", "We’ll have the usual SQL Saturday goodness: lots of technical sessions, great networking events and a fantastic speaker dinner. ", "And we’ll have the Third Annual Kansas City SQL Saturday BBQ Crawl.", "\n\nOn Friday afternoon we’ll visit a few BBQ places in town. ", "We tend to order big sampler plates and just share everything around. ", "It’s a great way to try a variety of styles. ", "This year we’ll be hitting an all new selection of BBQ joints.", "\n\nYou don’t need to be a speaker to attend. ", "However the call for speakers is open until June 28th (hint, hint). ", "Locals and out-of-towners are all welcome.", "\n\nIf you’re interested in attending send me an email and I’ll get you added to the list.", "\n\nWe finish in plenty of time to get you to the speaker dinner – as if you could eat any more." ]
{ "pile_set_name": "Pile-CC" }
[ 0.011363636363636364, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0058823529411764705, 0, 0, 0, 0, 0, 0.011428571428571429, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.013333333333333334, 0.03333333333333333, 0, 0.012195121951219513, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007194244604316547, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.012987012987012988, 0.012048192771084338, 0.011235955056179775, 0, 0, 0, 0.007633587786259542, 0, 0.004132231404958678, 0.02702702702702703, 0, 0, 0, 0, 0, 0, 0, 0.038461538461538464, 0.010309278350515464, 0, 0, 0, 0, 0, 0, 0, 0, 0.010869565217391304, 0.009259259259259259, 0.015625, 0, 0, 0, 0, 0, 0.009900990099009901, 0.023529411764705882, 0, 0.011764705882352941, 0, 0, 0, 0, 0, 0, 0, 0.01020408163265306, 0, 0, 0.010309278350515464, 0.017857142857142856, 0, 0, 0, 0, 0, 0, 0, 0.02631578947368421, 0.029411764705882353, 0.02, 0.02127659574468085, 0.01098901098901099, 0, 0, 0, 0, 0, 0, 0, 0.024096385542168676, 0, 0.0196078431372549, 0.030303030303030304, 0, 0, 0, 0, 0.012658227848101266, 0.018518518518518517, 0, 0, 0, 0, 0, 0.006711409395973154, 0.014492753623188406, 0.010526315789473684, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0196078431372549, 0.013157894736842105, 0, 0, 0.009523809523809525, 0, 0, 0, 0.009900990099009901, 0, 0, 0, 0.011111111111111112, 0, 0, 0.008, 0, 0, 0, 0.014705882352941176, 0.010638297872340425, 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0, 0.006309148264984227, 0.016483516483516484, 0, 0, 0, 0.013157894736842105, 0.00625, 0, 0, 0, 0, 0.00949367088607595, 0, 0, 0.008849557522123894, 0, 0, 0.008403361344537815, 0.010752688172043012, 0, 0, 0.0041928721174004195, 0.008658008658008658, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00980392156862745, 0, 0.007751937984496124, 0.010101010101010102, 0, 0, 0, 0.0053475935828877, 0.009345794392523364, 0, 0, 0, 0, 0, 0.008130081300813009, 0.006896551724137931, 0, 0, 0.008849557522123894, 0, 0, 0, 0, 0, 0.010101010101010102, 0.010638297872340425, 0.00546448087431694, 0.008333333333333333, 0, 0.008968609865470852, 0.011494252873563218, 0, 0.007633587786259542, 0, 0, 0.015873015873015872, 0, 0, 0.012345679012345678, 0, 0, 0, 0, 0, 0.011363636363636364, 0, 0, 0, 0, 0, 0.0196078431372549, 0.006802721088435374, 0, 0, 0, 0.010101010101010102, 0, 0, 0.016666666666666666, 0, 0.012345679012345678, 0, 0, 0.010526315789473684, 0.009009009009009009, 0, 0.013986013986013986, 0, 0, 0, 0, 0, 0.009259259259259259, 0.010526315789473684, 0.008, 0, 0, 0, 0.011764705882352941, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.022727272727272728, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009009009009009009, 0, 0, 0.009708737864077669, 0.015625, 0.007692307692307693, 0, 0, 0.008264462809917356, 0.010752688172043012, 0, 0, 0.011494252873563218, 0, 0, 0.0136986301369863, 0, 0.009900990099009901, 0.006578947368421052, 0, 0, 0.011627906976744186, 0, 0, 0.008064516129032258, 0, 0.023255813953488372, 0, 0, 0.014925373134328358, 0.016666666666666666, 0, 0, 0.016129032258064516, 0, 0, 0, 0, 0 ]
0.003433
5
[ "---\nabstract: 'We visually and quantitatively determine the host galaxy morphologies of 94 intermediate redshift ($0.2 \\le z < 1.2$) active galactic nuclei (AGN), selected using [*Chandra*]{} X-ray and [*Spitzer*]{} mid-infrared data in the Extended Groth Strip. ", "Using recently developed morphology measures, the second-order moment of the brightest $20\\%$ of a galaxy’s flux ($M_{20}$) and the Gini coefficient, we find that X-ray–selected AGN mostly reside in E/S0/Sa galaxies ($53^{+11}_{-10}\\%$), while IR–selected AGN show no clear preference for host morphology. ", "X-ray–selected AGN hosts are members of close pairs more often than the field population by a factor of $3.3\\pm1.4$, but most of these pair members appear to be undisturbed early-type galaxies and do not tend to show direct evidence of gravitational perturbations or interactions. ", "Thus, the activation mechanism for AGN activity remains unknown, even for pair members.'", "\nauthor:\n- 'C. M. Pierce, J. M. Lotz, E. S. Laird, L. Lin, K. Nandra, J. R. Primack, S. M. Faber, P. Barmby, S. Q. Park, S. P. Willner, S. Gwyn, D. C. Koo, A. L. Coil, M. C. Cooper, A. Georgakakis, A. M. Koekemoer, K. G. Noeske, B. J. Weiner, and C. N. A. Willmer'\ntitle: 'AEGIS: Host Galaxy Morphologies of X-ray and Infrared–selected AGN at $0.2 \\le z < 1.2$'\n---\n\nIntroduction\n============\n\nGalaxy interactions and major mergers are currently the most popular explanation for energetically active galactic centers (e.g., Jogee 2005), commonly termed active galactic nuclei (AGN). ", "Both the frequency of disturbed morphologies and the presence of AGN correlate with the host galaxy’s IR luminosity (e.g., Sanders & Mirabel 1996). ", "However, using measures such as concentration, rotational asymmetry ([*C*]{}, [*A*]{}; Conselice 2003), and near–neighbor frequency, some studies failed to find a correlation between X-ray–selected AGN and galaxy interactions (e.g., Grogin et al. ", "2003, 2005, hereafter G03, G05). ", "Thus, galaxy interactions may correlate more strongly with IR–luminous AGN or may be less apparent for X-ray-luminous AGN. ", "Recent galaxy merger simulations also suggest a connection between disturbed morphologies, AGN, and hard X-ray spectra (e.g., DiMatteo, Springel, & Hernquist 2005, hereafter DSH05; Hopkins et al.", " 2005a, 2005b, hereafter H05a, H05b).", "\n\nThe Gini coefficient, which measures the distribution of flux amongst a galaxy’s pixels ([*G*]{}; Abraham 2003), and the second-order moment of the brightest $20\\%$ of a galaxy’s flux ($M_{20}$; Lotz, Primack, & Madau 2004, hereafter LPM04), have been shown to be robust to high $z$ for determining the morphologies of potentially disturbed objects. ", "In particular, $M_{20}$ is more sensitive to merger signatures than other measures of concentration. ", "Morphologically undisturbed galaxies form a well-defined sequence, correlated with Hubble type, in the $G-M_{20}$ plane; merging and interacting galaxies are separated from this sequence by having a high [*G*]{} for a given $M_{20}$ (LPM04).", "\n\nIn this work, we classify X-ray and IR–selected AGN host galaxy morphologies using [*G*]{}, $M_{20}$, [*C*]{}, [*A*]{}, and visual inspection of [*Hubble Space Telescope*]{} Advanced Camera for Surveys (ACS) images in the Extended Groth Strip (EGS; Davis et al.", " 2006, hereafter D06; Lotz et al.", " 2006). ", "We also use Deep Extragalactic Evolutionary Probe 2 (DEEP2) spectroscopic velocities to determine the frequency of close kinematic galaxy pairs (Lin et al.", " 2004, 2006). ", "Throughout, we use $H_{0} = 70$ km s$^{-1}$ Mpc$^{-1}$, $\\Omega_{\\Lambda} = 0.7$, and $\\Omega_{M} = 0.3$.\n\nSamples\n=======\n\nWe use spectroscopic redshifts from the DEEP2 redshift survey (Davis et al.", " 2003; D06) and photometric redshifts from the Canada–France–Hawaii Telescope Legacy Survey (CFHTLS) Deep Field 3 in [*ugriz*]{}. ", "At $I < 23.5$, $\\sigma_{z,phot} = 0.08(1 + z)$ with a $7\\%$ catastrophic failure rate[^1]. ", "The inaccuracy of photometric redshifts for very blue objects (i.e., QSOs; Georgakakis et al.", " 2006a) should not significantly affect the present work because such objects are generally excluded due to the compactness of the host galaxies. ", "Photometric redshifts of $I < 23.5$ galaxies agree well with the redshifts implied by IRAC colors (e.g., Barmby et al.", " 2006). ", "The median redshifts of the samples (described below; field galaxies: 0.67, X-ray–selected AGN hosts: 0.74, and IR–selected AGN hosts: 0.46) differ by $\\Delta z \\le 0.28$.\n\nOur field galaxy sample consists of all EGS galaxies imaged by ACS and meeting the following criteria: $I < 23.5$ (AB), $0.2 \\le z < 1.2$, $\\langle S/N \\rangle$ per pixel $\\ge$ 2.5 ([*G*]{}, $M_{20}$, and [*C*]{}) or $\\langle S/N \\rangle$ per pixel $\\ge$ 4.0 ([*A*]{}), and elliptical Petrosian radius $r_{P} \\ge$ 03 (Lotz et al.", " 2006). ", "We used the observed [*V*]{} ([*I*]{}) band images of the field galaxies at $0.2 \\le z < 0.6$ ($0.6 \\le z < 1.2$) to approximate the rest-frame [*B*]{} band morphologies. ", "We use [*G*]{} and $M_{20}$ to classify galaxies in the same manner as the EGS study by Lotz et al.", " (2006). ", "We also use [*C*]{} and [*A*]{} to identify interacting galaxies ($A\\ge0.35$), early-type galaxies ($A < 0.35$, $C \\ge 4.0$), and late-type galaxies ($A < 0.35$, $C < 4.0$; Conselice 2003; G03; G05). ", "The second column of Table 1 shows the sizes of the field galaxy, X-ray–selected AGN, and IR–selected AGN samples for various criteria.", "\n\nOur initial X-ray sample consists of 156 sources from the 200–ks pointing in the Groth–Westphal Strip (Nandra et al.", " 2005) and 409 sources from three 100–ks pointings from early EGS data (Georgakakis et al.", " 2006b) obtained using the [*Chandra X-ray Observatory*]{} (D06). ", "The on-axis flux limit for hard band–selected sources in the 200–ks (100–ks) observation corresponds to $L_{2-10 \\ \\rm{keV}} = 2.4\\times10^{42}$ erg s$^{-1}$ ($7.2\\times10^{42}$ erg s$^{-1}$) at $z = 1$. [*Chandra*]{} sources were matched to ACS images by requiring a positional offset between the host and the source of $<$ 15 for [*Chandra*]{} off-axis angles (OAAs) $<$50 and an offset $<$ 20 for OAAs $\\ge$50. ", "Of the 367 [*Chandra*]{} sources in the region imaged by the ACS, 80 matched galaxies with $I < 23.5$ at $0.2 \\le z < 1.2$, of which $1.5\\%$ are expected to be spurious matches. ", "Two of the X-ray sources match a single galaxy, so the sample contains 79 galaxies and 80 AGN. ", "Detection of hard X-ray photons (2-7 keV) and $L_{\\rm 2-10 \\ keV} > 10^{41}$ erg s$^{-1}$ indicate that all 80 ACS-matched sources are expected to be AGN. ", "Fifty-seven AGN have hosts that meet the S/N and size criteria for $G-M_{20}$ classification. ", "Of these, 37 have high quality spectroscopic redshifts; photometric redshifts are used for the remaining 20. ", "Eleven of the excluded hosts are compact and show no underlying host galaxy, eight have very bright central point sources but are visually classifiable, and four have extended light but low surface brightnesses. (", "See Table 1.)", "\n\nUsing data from the [*Spitzer*]{} Infrared Array Camera (IRAC; Fazio et al.", " 2004; D06), we select as AGN the 1,785 sources whose mid-infrared spectral energy distributions follow a power law with a negative spectral index ($f_{\\nu}\\propto\\nu^{\\alpha}$; $\\alpha < 0$), with a ${\\chi}^2$ probability of its being a good fit $P({\\chi}^2) > 0.1$ (e.g., Neugebauer et al.", " 1979; Alonso-Herrero et al.", " 2006). ", "These were matched to ACS images by requiring a positional offset of $<$ 20. ", "Of the 420 ACS objects matched to IR–selected AGN, 29 have $I < 23.5$ and $0.2 \\le z < 1.2$; $2.6\\%$ are expected to be spurious matches. ", "Seventeen galaxies meet the S/N and size criteria for $G-M_{20}$ classification. ", "Of these, 7 have high quality spectroscopic redshifts; photometric redshifts are used for the remaining 10. ", "Seven of the excluded hosts are compact and show no underlying host galaxy, four have very bright central point sources but are visually classifiable, and one has low surface brightness. (", "See Table 1.)", "\n\nThe regions imaged by [*Chandra*]{}, IRAC, and ACS contain 367 X-ray–selected AGN (199 matched to host galaxies) and 881 IR–selected AGN (372 matched to host galaxies). ", "AGN in 50 of the host galaxies were selected by both X-ray and IR methods. ", "Nine of these 50 AGN hosts have $I < 23.5$ and $0.2 \\le z < 1.2$. Of the nine, two match hosts that have $r_{P} \\ge 0\\farcs3$ and $\\langle S/N \\rangle$ per pixel $\\ge$ 2.5, and seven have bright central point sources, making them too compact for $G-M_{20}$ analysis.", "\n\nTo identify close kinematic galaxy pairs (e.g., Patton et al.", " 2002), we created a spectroscopic sample of galaxies with $I < 23.5$ and spectroscopic redshifts $0.2 \\le z < 1.2$. The sample includes 3,139 field galaxies, 48 X-ray–selected AGN hosts, and 11 IR–selected AGN hosts. ", "Using the kinematic pairs identified by Lin et al.", " (2004, 2006) with $\\Delta M_{V} \\le 2$ ($\\Delta M_{I} \\le 2$) for $0.2 \\le z < 0.6$ ($0.6 \\le z < 1.2$), we determined the fractions of AGN hosts and field galaxies with kinematic pairs in our spectroscopic sample. ", "The number of identified pairs is a lower limit as we may miss some companions due to the incompleteness of the spectroscopic sample. ", "The spectroscopic redshift sampling rate among neighbors (separation $<10\\farcs0$, $\\Delta M_{I} \\le 2$, $\\Delta M_{V} \\le 2$) of AGN hosts is $0.48\\pm0.13$, compared to $0.66\\pm0.02$ among neighbors of galaxies without AGN. ", "The lower sampling rate around AGN indicates that the differences discussed in §3 may also be lower limits.", "\n\nResults\n=======\n\nGalaxies Hosting X-ray–selected AGN\n-----------------------------------\n\nX-ray–selected AGN are mostly found in E/S0/Sa hosts. ", "This is clear from the $G-M_{20}$ classification of the X-ray–selected AGN hosts shown in Figure 1. ", "E/S0/Sa hosts are much more common and Sc/d/Irr hosts are much less common than the field population, Sb/bc hosts are represented at the same rate as the field population, and mergers are more common among AGN hosts by a factor of $2.3\\pm0.7$ ($1.7\\sigma$ result; Table 1). ", "A two-dimensional K–S test (Fasano & Franceschini 1987; hereafter FF87) is inconsistent with the [*G*]{} and $M_{20}$ values of the X-ray–selected AGN hosts and field galaxies being drawn from the same population ($p=8.5\\times10^{-8}$). ", "Selecting only galaxies brighter than $M_{B} < -20.5$ (Vega), increases the fraction of E/S0/Sa field galaxies, but the fraction of E/S0/Sa X-ray–selected AGN hosts remains significantly higher (Table 1). ", "Visual classification of the 66 visually classifiable hosts (cf.", " §2) provides similar results (Table 1). ", "The $C-A$ statistics are consistent with those found by G05. ", "Our finding that most X-ray–selected AGN are hosted by E/S0/Sa galaxies is consistent with previous findings that AGN tend to be hosted by massive ellipticals or bulge-dominated galaxies (e.g., Kauffmann et al.", " 2003; G05). ", "It is also consistent with their red and luminous positions on the color-magnitude diagram (Nandra et al.", " 2006).", "\n\nX-ray–selected AGN hosted by E/S0/Sa galaxies tend to have softer X-ray spectra[^2] (median HR$=-0.46$) than those hosted by Sc/d/Irr galaxies (median HR$=0.55$), consistent with the expectation that E/S0/Sa galaxies contain less obscuring gas. ", "However, the detection of soft spectra from four X-ray–selected AGN hosted by morphologically disturbed galaxies may indicate surprisingly low levels of obscuration.", "\n\nSeven of the 48 ($15^{+8}_{-5}\\%$) X-ray–selected AGN in the spectroscopic sample are associated with kinematic pairs; in comparison, $4.5\\pm0.39\\%$ of field galaxies are associated with kinematic pairs. ", "Our results suggest that the X-ray sources have a higher companion rate by a factor $3.3\\pm1.4$ ($1.7\\sigma$ result). ", "This is greater than that found by G05; however, we find that the companion pairing rate decreases if we only use projected separation to identify pairs. ", "Most X-ray–selected AGN in kinematic pairs are hosted by relatively undisturbed early-type galaxies.", "\n\nGalaxies Hosting IR–selected AGN\n--------------------------------\n\nIR–selected AGN inhabit host galaxies of all types, as shown by the $G-M_{20}$ classification of the IR–selected AGN hosts in Figure 2. ", "A two-dimensional K–S test (FF87) is consistent with the IR–selected AGN hosts and field galaxies being drawn from the same population ($p=0.3$). ", "The $C-A$ results similarly indicate little morphological distinction between IR–selected AGN hosts and the field galaxies. ", "Visual classification results suggest a slight shift from Sc/d/Irr hosts to E/S0/Sa hosts (Table 1). ", "Two of the 11 IR–selected AGN in the spectroscopic sample are associated with kinematic pairs, hinting that kinematic pairs may be more common among IR–selected AGN than the field galaxies (cf.", " §3.1), but this result is statistically weak in our small sample.", "\n\nDiscussion\n==========\n\nThe relatively high fraction of X-ray–selected AGN in kinematic pairs supports models that predict that galaxy interactions are responsible for the activation of some galactic nuclei (e.g., DSH05, H05ab). ", "However, most AGN are found in undisturbed, isolated systems, implying that interactions may not be the main method by which AGN are turned on or that the timescales for interactions and AGN activity differ significantly from what is suggested by simulations.", "\n\nX-ray and IR AGN selection methods select AGN with different host galaxy morphologies. ", "A two-dimensional K–S test (FF87) is inconsistent with the X-ray– and IR–selected AGN hosts being drawn from the same population ($p=5.4\\times10^{-3}$). ", "IR selection via a power-law misses many AGN hosted by E/S0/Sa galaxies; although all X-ray–selected AGN with $I < 23.5$ and $0.2 \\le z < 1.2$ are detected by IRAC, most do not have power-law SEDs (see also Barmby et al.", " (2006) who found that only $40\\%$ of [*Chandra*]{} sources have IRAC power laws). ", "X-ray selection misses many AGN hosted by Sc/d/Irr galaxies. ", "Using the AGN with $I < 23.5$ and $0.2 \\le z < 1.2$ that are selected by both X-ray and IR methods, $f_{8 \\mu{\\rm m}}/f_{0.5-7 {\\rm keV}} = 2.4\\pm0.5$ (consistent with Elvis et al.", " 1994, Table 15); this predicts detectable X-ray emission from the IR–selected AGN, yet many of these objects are not detected by [*Chandra*]{}. ", "The disparity between the morphologies of X-ray– and IR–selected AGN suggests that the methods may select AGN at different stages or orientations with varied levels of gas, that galaxy light from the hosts of some X-ray–selected AGN may overwhelm the IR emissions (so that the measured IR emissions do not follow a power-law), or that star-forming field galaxies are contaminating the IR–selected AGN sample.", "\n\nThe observation of soft X-ray spectra from four X-ray–selected AGN hosted by morphologically interacting galaxies may contradict predictions from H05b that soft X-rays from AGN hosted by interacting galaxies should be highly attenuated. ", "However, most of our X-ray–selected AGN are less luminous than the QSO simulated by Hopkins (2006ab). ", "Though it is not surprising that many X-ray–selected AGN hosted by E/S0/Sa galaxies have soft spectra, soft X-ray–selected AGN hosted by interacting galaxies are unexpected. ", "Dissipationless mergers would explain unobscured nuclei but would be unlikely to provide enough gas to trigger AGN. ", "Thus, the observed interactions were probably not responsible for these AGN.", "\n\nThis work is based in part on observations made with [*Hubble Space Telescope*]{}, [*Spitzer Space Telescope*]{}, which is operated by the Jet Propulsion Laboratory, California Institute of Technology under a contract with NASA, and MegaPrime/MegaCam at the Canada-France-Hawaii Telescope (see D06 for full acknowledgement). ", "We thank the referee for helpful comments. ", "We acknowledge support from NASA grant HST-AR-10675-01-A (CMP); the NOAO Leo Goldberg Fellowship (JML); NSF grants AST-0071198 and AST-0507483, NASA grants HST-GO-10134.18-A, and Chandra-GO5-6141A CalSpace (DCK); and NASA, through Hubble Fellowship grant HF-01182.01-A, awarded by the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., for NASA, under contract NAS 5-26555 (ALC).", "\n\n0.5cm=1\n\nAbraham, R. G., van den Bergh, S., & Nair, P. 2003, ApJ, 588, 218\n\n0.5cm=1\n\nAlonso-Herrero, A., et al.", " 2006, ApJ, 640, 167\n\n0.5cm=1\n\nBarmby, P., et al.", " 2006, ApJ, 642, 126\n\n0.5cm=1\n\nConselice, C. J. 2003, ApJS, 147, 1\n\n0.5cm=1\n\nDavis, M., et al.", " 2003, SPIE, 4834, 161\n\n0.5cm=1\n\n—.", " 2006, this volume (D06)\n\n0.5cm=1\n\nDi Matteo, T., Springel, V., & Hernquist, L. 2005, Nature, 433, 604 (DSH05)\n\n0.5cm=1\n\nElvis, M., et al.", " 1994, ApJS, 95, 1\n\n0.5cm=1\n\nFasano, G., & Franceschini, A. 1987, MNRAS, 225, 155 (FF87)\n\n0.5cm=1\n\nFazio, G. G., et al.", " 2004, ApJS, 154, 10\n\n0.5cm=1\n\nGehrels, N. 1986, ApJ, 303, 336\n\n0.5cm=1\n\nGeorgakakis, A., et al.", " 2006a, MNRAS, submitted\n\n0.5cm=1\n\n—.", " 2006b, this volume\n\n0.5cm=1\n\nGrogin, N. A., et al.", " 2003, ApJ, 595, 685 (G03)\n\n0.5cm=1\n\n—.", " 2005, ApJ, 627, L97 (G05)\n\n0.5cm=1\n\nHopkins, P. F., Hernquist, L., Martini, P., Cox, T. J., Robertson, B., Di Matteo, T., & Springel, V. 2005a, ApJ, 625, L71 (H05a)\n\n0.5cm=1\n\nHopkins, P. F., Hernquist, L., Cox, T. J., Di Matteo, T., Martini, P., Robertson, B., & Springel, V. 2005b, ApJ, 630, 705 (H05b)\n\n0.5cm=1\n\nJogee, S. 2005, in AGN Physics on All Scales (Berlin: Springer), in press (astro-ph/0408383)\n\n0.5cm=1\n\nKauffmann, G., et al.", " 2003, MNRAS, 346, 1055\n\n0.5cm=1\n\nLin, L., et al.", " 2004, ApJ, 617, L9\n\n0.5cm=1\n\n—.", " 2006, this volume\n\n0.5cm=1\n\nLotz, J., et al.", " 2006, ApJ, submitted (astro-ph/0602088)\n\n0.5cm=1\n\nLotz, J., Primack, J., & Madau, P. 2004, AJ, 128, 163 (LPM04)\n\n0.5cm=1\n\nNandra, K., et al.", " 2005, MNRAS, 356, 568\n\n0.5cm=1\n\n—.", " 2006, this volume\n\n0.5cm=1\n\nNeugebauer, G., Oke, J. B., Becklin, E. E., & Matthews, K. 1979, ApJ, 230, 79\n\n0.5cm=1\n\nPatton, D. R., et al.", " 2002, ApJ, 565, 208\n\n0.5cm=1\n\nSanders, D. B., & Mirabel, I. F. 1996, ARA&A, 34, 749\n\n[lcrrrr]{} Field & 4435 & 8$\\pm$0.4 & 18$\\pm$0.6 & 18$\\pm$0.6 & 56$\\pm$1\\\nX-ray & 57 & 18$^{+7}_{-5}$ & 53$^{+11}_{-10}$ & 16$^{+7}_{-5}$ & 14$^{+7}_{-5}$\\\nIR AGN & 17 & 18$^{+17}_{-10}$ & 18$^{+17}_{-10}$ & 18$^{+17}_{-10}$ & 47$^{+23}_{-16}$\\\nField & ... & ... & ... & ... & ...\\\nX-ray & 66 & 18$^{+7}_{-5}$ & 47$^{+10}_{-8}$ & 18$^{+7}_{-5}$ & 17$^{+7}_{-5}$\\\nIR AGN & 21 & 24$^{+16}_{-10}$ & 29$^{+17}_{-11}$ & 19$^{+15}_{-9}$ & 29$^{+17}_{-11}$\\\nField & 1504 & 9$\\pm$0.8 & 27$\\pm$1 & 17$\\pm$1 & 47$\\pm$2\\\nX-ray & 36 & 14$^{+9}_{-6}$ & 53$^{+15}_{-12}$ & 19$^{+10}_{-7}$ & 14$^{+9}_{-6}$\\\nField & 2636 & 3$^{+0.4}_{-0.3}$ & 10$\\pm$0.6 & ... & 87$\\pm$2\\\nX-ray & 30 & 0$^{+6}_{-0}$ & 30$^{+14}_{-10}$ & ... & 70$^{+19}_{-15}$\\\nIR AGN & 7 & 0$^{+26}_{-0}$ & 0$^{+26}_{-0}$ & ... & 100$^{+54}_{-37}$\\\n\n[^1]: See http://astrowww.phys.uvic.ca/grads/gwyn/cfhtls/.\n\n[^2]: Hardness ratio: HR $\\equiv$ (H-S)/(H+S); H$=2-7$ keV counts; S$=0.5-2$ keV counts. ", "At $z=0$, HR $>-0.25$ ($<-0.25$) indicates high (low) attenuation of soft-band X-rays by gas and dust. ", "Due to redshifting of the energy bands, high-$z$ sources may have harder spectra than observed.", "\n" ]
{ "pile_set_name": "ArXiv" }
[ 0.0076045627376425855, 0.013071895424836602, 0.0035587188612099642, 0, 0.008576329331046312, 0.006756756756756757, 0.008097165991902834, 0.06060606060606061, 0.016260162601626018, 0.010256410256410256, 0.02702702702702703, 0.005681818181818182, 0, 0, 0.019011406844106463, 0.06060606060606061, 0, 0.01935483870967742, 0, 0.01507537688442211, 0.023076923076923078, 0, 0, 0, 0.00847457627118644, 0, 0.01195219123505976, 0, 0, 0.020202020202020204, 0, 0.015, 0.014814814814814815, 0, 0.011111111111111112, 0.015151515151515152, 0.004830917874396135, 0, 0, 0.012903225806451613, 0, 0, 0, 0, 0.012987012987012988, 0.010309278350515464, 0.03571428571428571, 0, 0, 0.014492753623188406, 0.012345679012345678, 0, 0, 0, 0.011695906432748537, 0, 0, 0.015873015873015872, 0.013761467889908258, 0.02, 0.004629629629629629, 0, 0.013333333333333334, 0.009345794392523364, 0.0136986301369863, 0.01, 0.0036496350364963502, 0.008438818565400843, 0.004878048780487805, 0, 0, 0.01639344262295082, 0.01904761904761905, 0.07692307692307693, 0.009523809523809525, 0, 0.016194331983805668, 0.006060606060606061, 0.0048543689320388345, 0, 0.006493506493506494, 0.01, 0.014634146341463415, 0.00684931506849315, 0.008064516129032258, 0.009900990099009901, 0.010362694300518135, 0, 0.004347826086956522, 0.007722007722007722, 0, 0.006535947712418301, 0.013636363636363636, 0, 0.03278688524590164, 0.005555555555555556, 0.013793103448275862, 0.014705882352941176, 0.008368200836820083, 0.029411764705882353, 0.017241379310344827, 0.008620689655172414, 0.013157894736842105, 0.01529051987767584, 0, 0.0400890868596882, 0.04424778761061947, 0.02040816326530612, 0.010638297872340425, 0.02857142857142857, 0.028985507246376812, 0.025210084033613446, 0.010416666666666666, 0.02702702702702703, 0, 0.05128205128205128, 0.03189066059225513, 0.04081632653061224, 0.03125, 0.022222222222222223, 0.03546099290780142, 0.02857142857142857, 0.036231884057971016, 0.007714561234329798, 0, 0, 0 ]
0.012297
5
[ "Q:\n\nChapter heading\n\nI was trying to personalize the chapter and section headings using titlesec for my master thesis using the following code\n\\documentclass{book}\n\\usepackage{tikz}\n\\usepackage{titlesec}\n\\usepackage{lipsum}\n\n\\makeatletter\n\\titleformat{\\chapter}[display]\n{}% format\n{\\raggedleft \\@chapapp{} \\thechapter}% label\n{1ex} % sep\n{\\raggedleft \\Huge \\scshape \\bfseries} % before\n[\\normalfont {\\tikz \\shade[left color=blue!20,right color=blue, shading angle=45] (0,0) rectangle (\\textwidth,5pt);}]% after\n\\makeatother\n\n\\begin{document}\n\\chapter{Introduction}\n\\lipsum[1]\n\\end{document}\n\nWhich gives the following output\n\nWhat I want is simply to remove the space between the chapter name and the TikZ drawing and define the vertical space between the drawing and the text (the only one I can get to work is between the chapter and the chapter name). ", "Also which is best for this, titlesec or define all of this as a class file? ", "\nI've also tried the second option with similar problems:\n\\documentclass{book}\n\\makeatletter\n\\usepackage{tikz}\n\\usepackage{palatino}\n\\usepackage[T1]{fontenc}\n\\usepackage{titlesec}\n\\def\\@makechapterhead#1{%\n\\vspace*{10\\p@}%\n{\\parindent \\z@ \\raggedleft \\reset@font%\n\\@chapapp{} \\thechapter\\par\\nobreak%\n{\\Huge \\scshape \\bfseries #1\\par\\nobreak%\n\\vspace{5pt}\n{\\tikz \\shade[left color=blue!20,right color=blue, shading angle=45] (0,0) rectangle (\\textwidth,5pt);}}\\par\\nobreak%\n\\vspace{40pt}\n}}%\n\\begin{document}\n\\chapter{Introduction}\n\\chapter{Internal Structure}\n\\section{Internal Strut}\n%\\section{part 1}\n\\end{document}\n\nA:\n\nInsert the line directly in the vertical list:\n\\makeatletter\n\\def\\@makechapterhead#1{%\n \\vspace*{10\\p@}%\n {\\parindent \\z@ \\raggedleft \\reset@font\n \\@chapapp{} \\thechapter\\par\\nobreak\n {\\Huge \\scshape \\bfseries #1\\vadjust{\\putline}\\par\\nobreak}%\n \\vspace{40pt}\n }}\n\\makeatother\n\\newcommand{\\putline}{%\n \\kern10pt %%% <-- adjust here\n \\hbox{\\tikz \\shade[left color=blue!20,right color=blue, shading angle=45] (0,0) rectangle (\\textwidth,5pt);}%\n}\n\nAdjust the amount of kerning as you like.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.00461361014994233, 0, 0.0035650623885918, 0 ]
0.002045
5
[ "FILE - In this May 15, 2017, file photo, British cybersecurity researcher Marcus Hutchins, branded a hero for slowing down the WannaCry global cyberattack, pauses during an interview in Ilfracombe, England. ", "Hutchins is facing a new charge of lying to the FBI in an indictment accusing him of developing malware to steal banking information. ", "The allegation is among four new charges federal prosecutors filed Wednesday, June 6, 2018, against Hutchins. ", "It means he now faces 10 charges of computer fraud and trying to access computers without authorization. (", "AP Photo/Frank Augstein, File)\n\nFILE - In this May 15, 2017, file photo, British cybersecurity researcher Marcus Hutchins, branded a hero for slowing down the WannaCry global cyberattack, pauses during an interview in Ilfracombe, England. ", "Hutchins is facing a new charge of lying to the FBI in an indictment accusing him of developing malware to steal banking information. ", "The allegation is among four new charges federal prosecutors filed Wednesday, June 6, 2018, against Hutchins. ", "It means he now faces 10 charges of computer fraud and trying to access computers without authorization. (", "AP Photo/Frank Augstein, File)\n\nMILWAUKEE (AP) — A British cybersecurity researcher credited with stopping a worldwide computer virus last year faces new charges, including lying to the FBI, in an updated indictment Wednesday accusing him of developing malware to steal banking information.", "\n\nMarcus Hutchins now faces 10 charges alleging that he created and distributed malware known as Kronos, including four new ones in the revised indictment in the Eastern District of Wisconsin. ", "The prosecutors’ updated filing comes as a federal judge weighs a request from Hutchins’ attorneys to suppress the statements he made to the FBI when the agents detained him Aug. 2. ", "His attorneys argue he wasn’t properly informed of his rights.", "\n\nADVERTISEMENT\n\nMoments after the charges were filed, he sent tweets asking for donations for his defense and disparaging prosecutors. ", "He used profanity to describe prosecutors in one tweet he has since deleted.", "\n\nHutchins, 23, has pleaded not guilty. ", "One of his attorneys, Brian Klein, called the updated indictment “meritless.”", "\n\n“It only serves to highlight the serious flaws in this prosecution,” he said in a statement. “", "We expect Marcus to be vindicated and then he can return to doing what he loves: keeping us all safe from malicious software.”", "\n\nHutchins arrest was a shock because months earlier he had been lauded as a hero for finding a “kill switch” to the WannaCry virus which crippled computers worldwide, encrypting files and making them inaccessible unless people paid a ransom ranging from $300 to $600.", "\n\nFBI agents detained him in Las Vegas before he boarded a flight home to England and interrogated him for nearly two hours. ", "The agents have said Hutchins spoke to them voluntarily but lied by denying that he was involved in the creation of Kronos.", "\n\nThe updated indictment contains new details of the FBI’s investigation of Hutchins, including aliases of people he allegedly conspired with online to advertise and sell Kronos. ", "Prosecutors say Hutchins and another individual posted a video on YouTube in 2014 to “demonstrate how Kronos worked and to promote the sale of Kronos” — a detail not disclosed in the original indictment.", "\n\nThe indictment said the crimes happened between July 2014 and July 2015, but prosecutors have not offered any details about the number of victims.", "\n\nIn Wednesday’s filing, prosecutors accuse Hutchins of also creating and distributing malware called UPAS Kit, designed to collect people’s credit card information and other personal information. ", "Prosecutors allege that happened on July 2012." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.00966183574879227, 0.014925373134328358, 0.00909090909090909, 0, 0.012552301255230125, 0.014925373134328358, 0.00909090909090909, 0, 0.010344827586206896, 0.010362694300518135, 0.01098901098901099, 0, 0, 0, 0.025, 0.012987012987012988, 0, 0, 0.007462686567164179, 0.008, 0.016260162601626018, 0.01675977653631285, 0.019704433497536946, 0, 0.01015228426395939, 0 ]
0.008395
5
[ "Food & Drink The World's Best Breakfast: Which Country's Morning Meal Is Tops?", "\n\nSara Norris/Thrillist\n\nAmericans are kinda obsessed with breakfast, to the point where we sometimes eat it for every meal of the day. ", "Except actual breakfast, as we overslept. ", "Anachronisms aside, breakfast in the US is a sacred feast that we're absolutely certain we do better than anywhere else in the world. ", "But do we, really? ", "We examined 18 traditional morning meals from across the globe and ranked 'em from \"least nourishing\" to \"even better than French Toast Sticks\".", "\n\n\n\n18. ", "Australia What it is: Toast with Vegemite (sometimes with cheese)\n\nWhy it placed where it did: There’s literally only one food group represented here. ", "And a bacterial byproduct. ", "C'mon Australia, you've got emus. ", "Can we at least get some giant eggs?", "\n\n17. ", "Russia What it is: Kasha (a type of porridge), blini (blintzes)\n\nWhy it placed where it did: Again, not too many food groups represented in a traditional Russian breakfast, and the color palette’s a little limited as well. ", "If you're a fan of beige and/or wearing khakis, this is the breakfast for you.", "\n\n16. ", "Japan What it is: Rice, boiled fish, miso soup\n\nWhy it placed where it did: A traditional Japanese breakfast involves a lot of fish and tofu and fermented soybeans, which can be kinda... fragrant. ", "Granted, it's probably hella healthy, but we want substance! ", "And fried stuff! ", "Keep reading.", "\n\n15. ", "Myanmar What it is: Mohinga (fish broth, rice noodles, lemongrass, garlic, ginger, onions, and, sometimes, fried fish cakes)\n\nWhy it placed where it did: Mohinga is both the most popular breakfast in Myanmar and its national dish, so it’s gotta be pretty good. ", "It’s also eaten for almost every other meal. ", "An exceptional breakfast should offer foods you can’t get the rest of the day! ", "Except when you have breakfast for dinner. ", "But that's different!", "\n\n14. ", "France What it is: Toasted baguette with jam/honey/butter/Nutella\n\nWhy it placed where it did: The French are minimalists when it comes to breakfast, but at least they offer customization options where the topping of the bread is concerned. ", "Where they lose major points is its lack of heartiness. ", "It's the most important meal of the day, and we definitely eat it every morning, Mom.", "\n\n13. ", "Malaysia What it is: Nasi lemak (coconut rice, anchovies, hot sauce, peanuts, and boiled egg)\n\nWhy it placed where it did: Lots of food groups represented here and a flavor profile that borders on the aggressive. ", "It's a polarizing dish even in Malaysia, where it's eaten at all times of the day. ", "Gonna pass on the anchovies.", "\n\n12. ", "Philippines What it is: Silog (meats and rice)\n\nWhy it placed where it did: The Philippines doesn’t care what you eat with your breakfast rice, as long as it’s something. ", "They’ve got a variety of different silogs, like tapsilog (dried beef & rice), hotsilog (hot dog & rice), and spamsilog (spam & rice). ", "It's (si)log!", "\n\n11. ", "Pakistan What it is: Halwa poori (unleavened fried bread, chickpeas, and sweet tahini loaf)\n\nWhy it placed where it did: Now we're getting into interesting flavor combination territory! ", "Pakistan’s most popular breakfast is an intriguing sweet & savory combination that includes chickpea stew, fried bread, and even a sugary treat -- it's like dessert for breakfast! ", "With a lot of stew!", "\n\n10. ", "Switzerland What it is: Bürli (rolls), Tilsiter cheese, cold cuts, butter & jam, soft boiled eggs, coffee, tea, fresh fruit, muesli\n\nWhy it placed where it did: Switzerland’s spread places it square in the middle of the pack, in true Swiss fashion. ", "Plenty of options, but in the end, you’re probably just gonna get some muesli.", "\n\n9. ", "Mexico What it is: Chilaquiles (tortilla chips simmered in mole) or tripe with eggs\n\nWhy it placed where it did: Chilaquiles are so delicious, they placed Mexico here on their merits alone. ", "Otherwise, there aren’t too many food groups or options represented. ", "Still, we’re entering must-try territory.", "\n\n8. ", "Israel What it is: Israeli salad (cucumber, tomato), feta, shakshuka (eggs poached in tomato), hummus, tahini, pita, olives\n\nWhy it placed where it did: Displaying a wide variety of options is Israel, whose hotel buffets would be the envy of every other buffet in the world, if buffets were sentient. ", "Shakshuka is especially good served with some bread to mop up the yolk. ", "But the absence of meat docks them some points.", "\n\n7. ", "Thailand What it is: Fried egg, fried rice, porridge, curries\n\nWhy it placed where it did: A typical Thai breakfast involves a lot of spicy stuff, which is just what you need to jump start your metabolism in the morning. ", "Unfortunately, there ain't a ton of starch to be found, which is one of the key ingredients of any breakfast.", "\n\n6. ", "United States What it is: Eggs, toast, bacon or sausage, pancakes, home fries\n\nWhy it placed where it did: Our breakfast is as diverse as our landscape and brings in elements from breakfasts all over the world. ", "It skews towards the fatty and hearty, but could benefit from a few more textural differences and food groups.", "\n\n4 (tie). ", "England What it is: Full English breakfast (fried egg, sausage, fried mushrooms, baked beans, hash browns, toast, and grilled tomato)\n\nWhy it placed where it did: Holy breakfast, Batman! ", "The UK’s traditional breakfasts are downright loony (and not in the Canadian way) and offer up a huge amount of food from pretty much every food group. ", "Not to mention the fact that most of it is fried.", "\n\n4 (tie). ", "Ireland What it is: Full Irish breakfast (bacon rashers, sausage, fried egg, white & black pudding, toast, fried tomato, Irish tea)\n\nWhy it placed where it did: Very similar to the full English, except for the inclusion of white & black pudding and Irish tea.", "\n\n3. ", "Scotland What it is: Full Scottish breakfast (fried egg, back bacon, sausage links, black pudding, buttered toast, baked beans, tea, tattie scones)\n\nWhy it placed where it did: The full Scottish edges out its English and Irish counterparts due to the copious amounts of meat, and the fact that you can get “tattie scones”, which are 1) a form of potato bread, and 2) ridiculously fun to say out loud.", "\n\n2. ", "Turkey What it is: Feta, tomato, cucumber, olives, toast, cherry jam, spicy Turkish sausage, Turkish tea\n\nWhy it placed where it did: Even the DMV doesn't give out as many plates as you'll see on a Turkish kitchen table, as they go fully HAM on breakfast (without the inclusion of actual ham). ", "The only downside to this is that cleanup must take forever." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.01282051282051282, 0.007352941176470588, 0, 0, 0, 0, 0, 0.006622516556291391, 0, 0, 0, 0, 0, 0, 0, 0.005076142131979695, 0, 0, 0, 0, 0.007662835249042145, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005847953216374269, 0.022388059701492536, 0, 0, 0.005376344086021506, 0, 0, 0, 0.008032128514056224, 0, 0, 0, 0, 0, 0, 0.0033222591362126247, 0.013888888888888888, 0, 0, 0, 0, 0, 0, 0, 0, 0.0053475935828877, 0, 0, 0, 0.007722007722007722, 0, 0, 0, 0.006802721088435374, 0 ]
0.001714
5
[ "A 1011 anos-luz do sistema solar, reside o\nque é provavelmente o buraco negro mais próximo\ndo planeta Terra.", "\nEsses monstros cósmicos surgem após o colapso\nde estrelas muito grandes, em uma explosão\ncolossal chamada supernova.", "\nBuracos negros são aberrações gravitacionais,\ncapazes de sugar qualquer coisa que se atreva\na chegar perto demais.", "\nNem a mesmo a luz consegue escapar, e até\nmesmo o tempo deixa de existir.", "\nMas o que aconteceria se um buraco negro surgisse\naqui na Terra?", "\nSerá que isso é possível?", "\nEu sou William Tofoli, narrador do Mistérios\ndo Mundo, e aqui está o que aconteceria se\num buraco negro fosse criado em laboratório.", "\nSe você gostar do vídeo, não se esqueça\nde deixar o like, se inscrever no canal Mistérios\ndo Mundo e ativar as notificações.", "\nPara entender mais o que são e como funcionam\nesses corpos celestes, recomendamos que você\nprimeiro assista ao nosso vídeo sobre “buracos\nnegros e o fim do tempo”.", "\nBem-vindo ao Grande Colisor de Hádrons, ou\nabreviando, o LHC. ", "100 metros sob a fronteira\nfranco-suíça, esconde-se o que é sem dúvidas\num dos maiores feitos da engenharia humana.", "\nUm túnel em forma de anel com 27 quilômetros\nque tem uma função singular: empurrar partículas\nsubatômicas para perto da velocidade da luz,\ncriando níveis extremos energia que não\nsão observados naturalmente em nenhuma outra\nsituação na Terra.", "\nO LHC, operado pelo CERN (Organização Europeia\npara a Pesquisa Nuclear), é o maior acelerador\nde partículas do mundo, e desde que foi inaugurado\nem setembro de 2008, tem ajudado os físicos\na solucionar alguns dos mistérios que permeiam\na nossa realidade.", "\nE antes da máquina gigante entrar em operação,\numa das especulações era de que buracos\nnegros capazes de engolir a Terra fossem criados.", "\nBem, o enorme colisor de partículas já fez\nboa parte do seu trabalho, e até agora não\nhá notícias de que a Terra tenha sido destruída.", "\nMas sim, buracos negros podem ser criados\nno LHC.", "\nEm teoria.", "\nEinstein nos ensinou que a matéria deforma\no tecido do espaço-tempo, e quanto mais matéria\nestá em uma região do espaço, mais esse\ntecido é deformado, atraindo objetos próximos.", "\nQuando há muita matéria em um volume muito\npequeno, o espaço-tempo fica tão curvo que\nse torna impossível escapar de sua atração\ngravitacional.", "\nEmbora eles só surjam quando o núcleo de\nestrelas enormes colapsa sobre si mesmo, eles\ntecnicamente podem surgir sempre que há muita\nmatéria em um lugar muito pequeno.", "\nÉ aí que o Grande Colisor de Hádrons entra\nem cena.", "\nÉ claro os cientistas não podem criar um\nburaco negro como aquele do centro de nossa\ngaláxia, que tem uma massa de milhões de\nvezes a do nosso Sol.", "\nNem se fizéssemos um acelerador de partículas\ndo tamanho do planeta poderíamos criar um\nobjeto tão grande.", "\nO que cientistas podem criar são apenas os\nchamados buracos negros microscópicos.", "\nEles só existem em um nível quântico extremamente\npequeno, muito menor do que a menor coisa\nque você pode imaginar.", "\nPara se ter ideia, um desses buracos negros\ntem uma massa cerca de 40 milhões de vezes\nmenor que a de uma bactéria.", "\nEm muitos dos experimentos, o LHC colide partículas\nmuito leves, como prótons, a uma velocidade\nde 99,99% a da luz, o que acaba originando\noutras partículas.", "\nIsso permite aos cientistas entender várias\ncoisas sobre o funcionamento do mundo subatômico.", "\nFoi assim, por exemplo, que em 2013 confirmamos\na existência do bóson de Higgs, partícula\nque até então só existia em teoria, e cuja\nfunção é conferir massa a todas as outras\npartículas.", "\nE sim, através dessas colisões, buracos\nnegros microscópicos podem em tese surgir.", "\nE tão rápido quanto nascem, eles morrem.", "\nDe tão pequenos, só existem por um milionésimo\nde segundo, e logo em seguida perdem energia\ne evaporam, através de um fenômeno bem conhecido\nno mundo científico: a radiação Hawking.", "\nPara um buraco negro criado em laboratório\nser estável, ele deve ter uma massa de pelo\nmenos (0,00002) zero virgula zero zero zero\nzero dois gramas, o que requer uma tecnologia\nmuito além da que temos no LHC.", "\nMas mesmo um objeto desse tamanho não seria\ncapaz de crescer e devorar tudo ao seu redor.", "\nBom, pelo menos não tão rápido.", "\nUm buraco negro desse tamanho levaria até\n9 octilhões de anos para atingir a massa\nde 1 quilo.", "\nE mais um decilhão de anos para engolir toda\na Terra.", "\nEntão, podemos ficar tranquilos.", "\nA Terra não será destruída toda vez que\nos físicos decidirem fazer algo legal.", "\nE você, gostou de aprender um pouco sobre\nburacos negros?", "\nConte nos comentários.", "\nE aproveite para sugerir novos temas para\nnosso canal.", "\nAté a próxima!", "\n" ]
{ "pile_set_name": "YoutubeSubtitles" }
[ 0, 0.008547008547008548, 0.017391304347826087, 0.013513513513513514, 0.015384615384615385, 0, 0.022556390977443608, 0.016, 0.006097560975609756, 0, 0, 0.01646090534979424, 0.00784313725490196, 0.0072992700729927005, 0.02962962962962963, 0, 0, 0.0056179775280898875, 0.027777777777777776, 0.017857142857142856, 0.019230769230769232, 0, 0.009345794392523364, 0.024390243902439025, 0.008620689655172414, 0.008620689655172414, 0.012658227848101266, 0.031914893617021274, 0.016042780748663103, 0.024096385542168676, 0, 0, 0.023923444976076555, 0, 0.03125, 0.010526315789473684, 0.018518518518518517, 0, 0.0379746835443038, 0, 0.043478260869565216, 0, 0, 0 ]
0.012104
5
[ "Space for Transparency This blog by Transparency International provides an independent and informed viewpoint on corruption. ", "It gives a space to start a worldwide conversation on possible solutions to overcome corruption, and on governance, transparency and accountability.", "\n\nThousands of people in Argentina have taken to the streets this year to protest, showing their discontent with the government by banging on kitchen pots and pans. ", "Pablo Secchi, Executive Director of Poder Ciudadano, the Transparency International Chapter in Argentina, explains why they are frustrated and what corruption has to do with it. ", "Lea este […]\n\nSpace for Transparency\n\nThis blog by Transparency International provides an independent and informed viewpoint on corruption. ", "It gives a space to start a worldwide conversation on possible solutions to overcome corruption, and on governance, transparency and accountability." ]
{ "pile_set_name": "Pile-CC" }
[ 0.008, 0, 0, 0.011235955056179775, 0.014285714285714285, 0 ]
0.005587
5
[ "Q:\n\nIs there a way to select the output device for an audio from a web page?", "\n\nHere is the problem,\nThe webapp i'm building have audio notifications and a vide conference option, so the user normally is going to have speakers and a headset connected to the PC, my client wants that the audio notifications will be played in the main speakers, and the video conference can be done using the headset.", "\nRight now I'm using all html5 for audio and webrtc for video conference, I couldn't find any info about how to do this. ", "May be with flash but not can't find this either.", "\nthanks in advance\n\nA:\n\nSolutions in this space are emerging via the use of WebRTC. ", "You can see a sample of a working solution at https://webrtc.github.io/samples/src/content/devices/input-output/\nBrowser support for this is limited right now though.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0.012048192771084338, 0 ]
0.001721
5
[ "A mãe de uma menina de oito anos descobriu que a filha sofria abusos sexuais de um amigo da família após ela ser diagnosticada com o vírus HPV no município de Venâncio Aires, no Rio Grande do Sul. ", "O suspeito, de 39 anos, que não teve o nome divulgado, foi preso na última terça-feira (12), segundo a Polícia Civil.", "\n\nA criança reclamava de coceiras no corpo quando foi levada a um posto de saúde. ", "Diante da suspeita, ela foi encaminhada para exame de corpo de delito, que confirmou que os estupros ocorreram durante meses.", "\n\nA menina foi ouvida na delegacia do município, com auxílio de psicólogo e assistente social, e confirmou que era abusada e sofria ameaças do homem. ", "O preso havia se hospedado várias vezes na casa da família nos últimos meses, conforme o relato.", "\n\nInterrogado, o suspeito negou os abusos, mas se contradisse no depoimento. ", "O delegado Felipe Cano pediu a prisão temporária de 30 dias, justificada também por ele não ter endereço fixo. ", "O inquérito deve ser concluído nos próximos dias, com provável indiciamento do homem por crime de estupro de vulnerável. ", "A pena prevista é de oito a quinze anos de reclusão." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.015228426395939087, 0, 0, 0.016, 0, 0.020833333333333332, 0.012987012987012988, 0.009009009009009009, 0.008264462809917356, 0 ]
0.008232
5
[ "Arrowsmith Island\n\nArrowsmith Island (, ) is a mostly ice-covered island in the Pitt group of Biscoe Islands, Antarctica. ", " It is 2.53 km long in west-southwest to east-northeast direction and 900 m wide.", "\n\nThe island is named after the British cartographer Aaron Arrowsmith (1750-1823) who published a map of the south polar region in 1794.", "\n\nLocation\n\nArrowsmith Island is located at , 1.43 km southeast of Pickwick Island, 500 m south of Tupman Island and 900 m northwest of Fizkin Island. ", " British mapping in 1971.", "\n\nMaps\n British Antarctic Territory: Graham Coast. ", " Scale 1:200000 topographic map. ", " DOS 610 Series, Sheet W 65 64. ", " Directorate of Overseas Surveys, UK, 1971.", "\n Antarctic Digital Database (ADD). ", "Scale 1:250000 topographic map of Antarctica. ", "Scientific Committee on Antarctic Research (SCAR). ", "Since 1993, regularly upgraded and updated.", "\n\nReferences\n\n Bulgarian Antarctic Gazetteer. ", "Antarctic Place-names Commission. (", "details in Bulgarian, basic data in English)\n Arrowsmith Island. ", "SCAR Composite Antarctic Gazetteer.", "\n\nExternal links\n Arrowsmith Island. ", "Copernix satellite image\n\nCategory:Islands of the Biscoe Islands\nCategory:Bulgaria and the Antarctic" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.00819672131147541, 0, 0.007352941176470588, 0, 0, 0.0196078431372549, 0, 0, 0, 0, 0, 0.0392156862745098, 0, 0.021739130434782608, 0.02857142857142857, 0, 0.02857142857142857, 0, 0.02 ]
0.009119
5
[ " NUMBER 13-08-00639-CR\n\n COURT OF APPEALS\n\n THIRTEENTH DISTRICT OF TEXAS\n\n CORPUS CHRISTI - EDINBURG\n\n\nVALDEMAR VASQUEZ, III, Appellant,\n\n v.\n\nTHE STATE OF TEXAS, Appellee.", "\n\n\n On appeal from the 377th District Court of Victoria County, Texas.", "\n\n\n MEMORANDUM OPINION\n\n Before Justices Rodriguez, Garza, and Vela\n Memorandum Opinion by Justice Garza\n\n Appellant, Valdemar Vasquez, III, was charged by indictment with aggravated\n\nassault with a deadly weapon, a first-degree felony. ", "See TEX . ", "PENAL CODE ANN . § ", "22.02(a),\n\n(b)(1) (Vernon Supp. ", "2008). ", "Vasquez pleaded “not guilty” to the charge alleged in the\n\nindictment, and the case was tried to a jury. ", "At the conclusion of the trial, the jury found\n\nVasquez guilty of the offense, sentenced him to ten years’ confinement in the Institutional\n\nDivision of the Texas Department of Criminal Justice, and imposed a $10,000 fine. ", "See\n\fid. § 12.32 (Vernon 2003) (providing that a first-degree felony conviction is punishable by\n\nconfinement “for any term of not more than 99 years or less than 5 years” and “a fine not\n\nto exceed $10,000\"). ", "The trial court certified Vasquez’s right to appeal, and he now brings\n\nthis appeal. ", "We affirm.", "\n\n I. ANDERS BRIEF\n\n Pursuant to Anders v. California, 386 U.S. 738, 744 (1967), Vasquez’s\n\ncourt-appointed appellate counsel has filed a brief with this Court, stating that his review\n\nof the record yielded no grounds or error upon which an appeal can be predicated.", "\n\nAlthough counsel’s brief does not advance any arguable grounds of error, it does present\n\na professional evaluation of the record demonstrating why there are no arguable grounds\n\nto be advanced on appeal. ", "See In re Schulman, 252 S.W.3d 403, 407 n.9 (Tex. ", "Crim.", "\n\nApp. ", "2008) (“In Texas, an Anders brief need not specifically advance ‘arguable’ points of\n\nerror if counsel finds none, but it must provide record references to the facts and\n\nprocedural history and set out pertinent legal authorities.”) (", "citing Hawkins v. State, 112\n\nS.W.3d 340, 343-44 (Tex. ", "App.–Corpus Christi 2003, no pet.)); ", "Stafford v. State, 813\n\nS.W.2d 503, 510 n.3 (Tex. ", "Crim. ", "App. ", "1991).", "\n\n In compliance with High v. State, 573 S.W.2d 807, 813 (Tex. ", "Crim. ", "App. [", "Panel Op.]", "\n\n1978), Vasquez’s counsel has carefully discussed why, under controlling authority, there\n\nare no errors in the trial court's judgment. ", "Counsel has informed this Court that he has:\n\n(1) examined the record and found no arguable grounds to advance on appeal, (2) served\n\na copy of the brief and counsel’s motion to withdraw on Vasquez, and (3) informed\n\n\n\n\n 2\n\fVasquez of his right to review the record and to file a pro se response within thirty days.1\n\nSee Anders, 386 U.S. at 744; Stafford, 813 S.W.2d at 510 n.3; see also In re Schulman,\n\n252 S.W.3d at 409 n.23. ", "More than an adequate period of time has passed, and Vasquez\n\nhas not filed a pro se response. ", "See In re Schulman, 252 S.W.3d at 409.", "\n\n II. ", "INDEPENDENT REVIEW\n\n Upon receiving an Anders brief, we must conduct a full examination of all the\n\nproceedings to determine whether the case is wholly frivolous. ", "Penson v. Ohio, 488 U.S.\n\n75, 80 (1988). ", "We have reviewed the entire record and counsel's brief and have found\n\nnothing that would arguably support an appeal. ", "See Bledsoe v. State, 178 S.W.3d 824,\n\n826-28 (Tex. ", "Crim. ", "App. ", "2005) (“Due to the nature of Anders briefs, by indicating in the\n\nopinion that it considered the issues raised in the briefs and reviewed the record for\n\nreversible error but found none, the court of appeals met the requirement of Texas Rule\n\nof Appellate Procedure 47.1.”); ", "Stafford, 813 S.W.2d at 509. ", "Accordingly, we affirm the\n\njudgment of the trial court.", "\n\n III. ", "MOTION TO WITHDRAW\n\n In accordance with Anders, Vasquez’s attorney has asked this Court for permission\n\nto withdraw as counsel. ", "See Anders, 386 U.S. at 744; see also In re Schulman, 252\n\nS.W.3d at 408 n.17 (citing Jeffery v. State, 903 S.W.2d 776, 779-80 (Tex. ", "App.–Dallas\n\n1995, no pet.) (", "noting that “[i]f an attorney believes the appeal is frivolous, he must\n\nwithdraw from representing the appellant. ", "To withdraw from representation, the appointed\n\n\n\n 1\n The Texas Court of Crim inal Appeals has held that “the pro se response need not com ply with the\nrules of appellate procedure in order to be considered. ", "Rather, the response should identify for the court\nthose issues which the indigent appellant believes the court should consider in deciding whether the case\npresents any m eritorious issues.” ", "In re Schulman, 252 S.W .3d 403, 409 n.23 (Tex. ", "Crim . ", "App. ", "2008) (quoting\nW ilson v. State, 955 S.W .2d 693, 696-97 (Tex. ", "App.–W aco 1997, no pet.)).", "\n\n 3\n\fattorney must file a motion to withdraw accompanied by a brief showing the appellate court\n\nthat the appeal is frivolous”) (citations omitted)). ", "We grant counsel’s motion to withdraw.", "\n\nWithin five days of the date of this Court’s opinion, counsel is ordered to send a copy of\n\nthe opinion and judgment to Vasquez and to advise him of his right to file a petition for\n\ndiscretionary review.2 See TEX . ", "R. APP. ", "P. 48.4; see also In re Schulman, 252 S.W.3d at\n\n412 n.35; Ex parte Owens, 206 S.W.3d 670, 673 (Tex. ", "Crim. ", "App. ", "2006).", "\n\n\n\n\n DORI CONTRERAS GARZA,\n Justice\n\nDo not publish.", "\nTEX . ", "R. APP. ", "P. 47.2(b).", "\nMemorandum Opinion delivered and\nfiled this the 20th day of August, 2009.", "\n\n\n\n\n 2\n No substitute counsel will be appointed. ", "Should Vasquez wish to seek further review of this case\nby the Texas Court of Crim inal Appeals, he m ust either retain an attorney to file a petition for discretionary\nreview or file a pro se petition for discretionary review. ", "Any petition for discretionary review m ust be filed within\nthirty days from the date of either this opinion or the last tim ely m otion for rehearing that was overruled by this\nCourt. ", "See T EX . ", "R. A PP . ", "P. 68.2. ", "Any petition for discretionary review m ust be filed with this Court, after which\nit will be forwarded to the Texas Court of Crim inal Appeals. ", "See T EX . ", "R. A PP . ", "P. 68.3; 68.7. ", "Any petition for\ndiscretionary review should com ply with the requirem ents of Rule 68.4 of the Texas Rules of Appellate\nProcedure. ", "See T EX . ", "R. A PP . ", "P. 68.4.", "\n\n 4\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.002380952380952381, 0.014084507042253521, 0.016611295681063124, 0, 0, 0.03125, 0, 0.009523809523809525, 0.013452914798206279, 0, 0.011764705882352941, 0, 0.006472491909385114, 0, 0, 0.2, 0, 0, 0.01818181818181818, 0, 0.04, 0.16666666666666666, 0, 0, 0, 0.16666666666666666, 0, 0, 0.0072992700729927005, 0.006329113924050633, 0.010526315789473684, 0.02631578947368421, 0, 0.0058823529411764705, 0.024390243902439025, 0, 0, 0.16666666666666666, 0, 0.0036363636363636364, 0.06896551724137931, 0, 0, 0.022222222222222223, 0.007518796992481203, 0, 0, 0.008888888888888889, 0, 0.020833333333333332, 0, 0, 0.015873015873015872, 0.037037037037037035, 0, 0, 0.013761467889908258, 0.125, 0.019801980198019802, 0.16666666666666666, 0, 0, 0, 0, 0.125, 0.09090909090909091, 0, 0, 0.013157894736842105, 0, 0, 0, 0, 0.020833333333333332, 0, 0, 0, 0.007575757575757576, 0, 0, 0, 0 ]
0.02088
5
[ "FIFA Football 2005 is an older edition of the famous FIFA series of association football (soccer) games published by Electronic Arts. ", "As a complete sports simulation game, it lets you manage your team and control the action as you play against your rivals. ", "The objective is to take a team from the lower divisions and turn them into champions.", "\n\nJust like all other games in the FIFA franchise, you'll control players and teams that actually exist in real life. ", "Though you have to remember that the game was launched near the end of 2004, so you won't see any of the stars that rose to fame recently.", "\n\nInteresting Improvements Over Previous Years\n\nThe 2005 version of FIFA Football features several improvements to earlier editions of the game. ", "You now have access to a \"create a player\" mode, which lets you create a player of your own and customize him based on your preferences. ", "The new 15-season career mode puts you in the role of a football team manager. ", "You'll be responsible for managing all aspects of your team, including the players on your roster and the backroom staff like fitness coaches, scouts and team doctors. ", "This mode is a bit more complex than others and takes some time to get used to, but can be very interesting for those who want to get involved with the inner workings of a football team.", "\n\nThe graphics and animations are excellent, as they look noticeably smoother than in the previous versions. ", "The game's audio is much better too. ", "You get to hear real crowd sounds as you play, over 40 different soundtracks of background music and commentary from John Motson and Ally McCoist. ", "While the graphics are decent for a game that is over 12 years old, you can't expect the same level of realism as in more modern video games. ", "Some of the player models have a slightly \"blocky\" appearance during gameplay. ", "Also, when viewed from some angles, the stadium crowds may look flat like they were cardboard cutouts.", "\n\nSimple and Fun to Play\n\nFIFA Football includes first-touch gameplay, giving you more realistic game physics combined with greater control over players. ", "At the same time, the controls are relatively simple to master, even for casual gamers. ", "You just need to spend a few minutes going through the provided tutorials to understand how to execute various plays on the pitch.", "\n\nThere are four difficulty settings to choose from, allowing you to enjoy the game whether you just want to have some fun or are into a challenge. ", "The game's AI is very good overall, but isn't perfect. ", "You may notice computer-controlled rival players occasionally doing plays that make little sense, like having an almost certain chance of scoring, yet choosing to pass the ball to a teammate instead.", "\n\nFinally, as this is an older game, it runs very well on less powerful PCs. ", "It only requires a 700 MHz CPU, 256 MB of RAM and a 32 MB video card to work.", "\n\nPros\n\nFeatures real teams and players.", "\n\nDecent graphics and sounds for an older game.", "\n\nControls are easy to learn.", "\n\nWorks fine on older PCs.", "\n\nCons\n\nRival player AI is sometimes buggy.", "\n\nVisuals not as realistic as in newer games.", "\n\nFIFA Football is a soccer simulation game based around FIFA teams and players. ", "It combines the realism of using famous players and teams with the ability to take control of those icons and command the game. ", "The player has the ability to simulate historical games or just play exhibition matches and see how well it goes. ", "Sports simulation games are nothing new, but the addition of FIFA engagement and realism is what sets FIFA Football apart.", "\n\nThe game was last updated in 2005. ", "This means that modern simulations will likely surpass the game in most dimensions. ", "The intervening nine years have brought many changes to the world of computing and games. ", "In fact, FIFA Football may not even run on a Windows Vista computer. ", "A previous version of Windows, like XP, might work, but Windows XP no longer has official support, so running it is a security risk.", "\n\nFurthermore, the game is also missing the most recent nine years of football history. ", "That includes the 2006, 2010, and 2014 World Cups, in addition to general changes to team lineups. ", "For football fanatics who really want to get the best experience in simulating FIFA, other, more modern games would probably do a better job.", "\n\nThat is not to say that FIFA Football is a poorly made game. ", "It has all the hallmarks of a game that had a lot of work put into it. ", "Unfortunately, it is simply too old. ", "It is hard enough to find a system capable of running it. ", "Newer alternatives will be better by almost every metric. ", "FIFA Football is free, but there exist free or cheap football simulators that are simply more modern than FIFA Football. ", "Look elsewhere, FIFA fans." ]
{ "pile_set_name": "Pile-CC" }
[ 0.022388059701492536, 0, 0, 0.00847457627118644, 0, 0.006896551724137931, 0, 0, 0, 0, 0, 0, 0.013605442176870748, 0, 0, 0, 0, 0, 0, 0, 0.01818181818181818, 0, 0, 0.025974025974025976, 0, 0, 0, 0, 0.023255813953488372, 0, 0.012345679012345678, 0, 0, 0.01639344262295082, 0, 0, 0, 0.028985507246376812, 0.022727272727272728, 0, 0, 0.0070921985815602835, 0.015873015873015872, 0, 0, 0, 0, 0.01652892561983471, 0.038461538461538464 ]
0.005657
5
[ "906 F.2d 147\nUNITED STATES of America, Plaintiff-Appellee,v.Armando GARCIA-FLORES, Defendant-Appellant.", "\nNo. ", "89-5625\n\nSummary Calendar.", "\nUnited States Court of Appeals,Fifth Circuit.", "\nJuly 18, 1990.", "\nArmando Garcia-Flores, Anthony, N.M., pro se.", "\nLeRoy Morgan Jahn, Philip Police, Asst. ", "U.S. Attys., ", "Helen M. Eversberg, U.S. Atty., ", "San Antonio, Tex., ", "for plaintiff-appellee.", "\nAppeal from the United States District Court for the Western District of Texas.", "\nBefore WILLIAMS, JOLLY and DUHE, Circuit Judges.", "\nPER CURIAM:\n\nFacts and Proceedings Below\n\n1\nArmando Garcia-Flores pled guilty to conspiring to distribute cocaine. ", " The district court imposed sentence and the defendant did not pursue a direct appeal. ", " Garcia filed a pro se motion to vacate his conviction and sentence under 28 U.S.C. Sec. ", "2255 on the grounds that (1) the guilty plea had been involuntary, (2) the trial court failed to inform him of his right to appeal his sentence; (3) the sentencing court misapplied the guidelines; (4) Garcia's attorney failed to object to the perceived sentencing errors. ", " The magistrate recommended that Garcia's habeas corpus petition be denied and the district court adopted this recommendation. ", " Garcia now appeals. ", " We affirm the district court's decision to deny habeas corpus relief.", "\n\nRight to Appeal Sentencing\n\n2\nGarcia has abandoned three of the four issues that he raised below, see United States v. Prince, 868 F.2d 1379 (5th Cir.), ", "cert. ", "denied, --- U.S. ----, 110 S.Ct. ", "321, 107 L.Ed.2d 312 (1989) and the only issue he now urges before this Court is that the sentencing court violated Fed.", "R.Crim.", "P. 32(a) by failing to apprise him of his right to appeal his sentence when sentence was imposed.", "\n\n\n3\nFed.", "R.Crim.", "P. 32(a) states \"There shall be no duty on the court to advise the defendant of any right of appeal after sentence is imposed following a plea of guilty or nolo contendere, except that the court shall advise the defendant of any right to appeal the sentence.\" ", " No such warning was given at sentencing but the sentencing court did mention \"should appeals be filed, then the [pre-sentence] report will be made available for review for appellate purposes only.\" ", " Two months prior to sentencing, at rearraignment, the following exchange occurred between the sentencing court and Garcia:\n\n\n4\nTHE COURT: A sentence imposed pursuant to the sentencing guidelines may be subject to appellate review. ", " That means that if I sentence you and I don't follow the guidelines, and I give you less sentence than the Government consents--or the guidelines require, the Government may appeal that. ", " And if I give you more than the sentencing guidelines require, you have the right to appeal. ", " Do you understand?", "\n\n\n5\nGARCIA-FLORES: Yes, I do.", "\n\n\n6\nGarcia concedes that he was informed of his right to appeal the sentence but argues that the warning was deficient for two reasons: (1) he was not informed of his right at sentencing but prior thereto at rearraignment; and (2) the language of the warning was deficient.", "\n\n\n7\n(1) Our cases have never required a strict compliance with Rule 32(a)(2).1 In Godin v. United States, 495 F.2d 560 (5th Cir.) ", " (per curiam), cert. ", "denied, 419 U.S. 995, 95 S.Ct. ", "308, 42 L.Ed.2d 268 (1974), for example, the court sent a letter informing the defendant of his right to appeal. ", " We held that the defendant need not be informed in open court of this right but must merely be \"apprised of his right to appeal in substantial compliance with the rule.\" ", " Id. at 561. ", " In Chapman v. United States, 469 F.2d 634 (5th Cir.1972), the defendant was not appraised of this right by the sentencing court. ", " The government argued that this was harmless error because the defendant was notified by his attorney. ", " We agreed and remanded so that it could be determined whether the attorney actually informed the defendant of his right. ", " Godin and Chapman teach us, therefore, that a violation of Rule 32(a)(2) in the form of notice of right to appeal before rather than after imposition of sentence is harmless so long as the defendant is fully informed of this right. ", " The sentencing court's explanation of defendant's right of appeal given at rearraignment satisfies the rule's dictates.", "\n\n\n8\n(2) Nor does the language used by the court violate Rule 32(a)(2). ", " The purpose of the rule is to require the court to notify a defendant of his right to appeal. ", " The language of the court, while not as clear as might be desired, sufficed to inform Garcia of this right. ", " Further, he acknowledged that he understood his right.", "\n\nConclusion\n\n9\nFor the foregoing reasons, the judgment of the district court is AFFIRMED.", "\n\n\n\n1\n Prior to November 1, 1987, Rule 32(a)(2) did not require a court to inform a defendant who pled guilty of his right to appeal the sentence. ", " See Marrow v. United States, 772 F.2d 525, 528-29 (9th Cir.1985). ", " Rule 32(a)(2) has long required, however, the sentencing court to inform a defendant who did not plead guilty of his right to appeal the conviction and sentence. ", " Our cases construing 32(a)(2)'s requirement that the sentencing court inform a defendant who does not plead guilty of his right to appeal are authoritative on the rule's new requirement. ", " What constitutes adequate notice of the right to appeal is the same regardless of whether the defendant pleads guilty or not guilty\n\n\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.019417475728155338, 0, 0, 0.043478260869565216, 0, 0.043478260869565216, 0.07317073170731707, 0, 0.0625, 0, 0, 0, 0.04081632653061224, 0.008620689655172414, 0, 0.011235955056179775, 0.0036496350364963502, 0.007874015748031496, 0.047619047619047616, 0, 0.0064516129032258064, 0, 0, 0.016666666666666666, 0, 0, 0, 0, 0, 0, 0.00425531914893617, 0, 0, 0, 0, 0.0036231884057971015, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004291845493562232, 0, 0, 0, 0.009174311926605505, 0, 0, 0, 0, 0, 0, 0 ]
0.007128
5
[ " In the\n\nUnited States Court of Appeals\n For the Seventh Circuit\n\nNo. ", "08-3473\n\nV ALERO E NERGY C ORPORATION,\nin its own right and as successor to\nUltramar Diamond Shamrock Corporation,\n\n Petitioner-Appellant,\n v.\n\n\nU NITED S TATES OF A MERICA,\n Respondent-Appellee.", "\n\n\n Appeal from the United States District Court\n for the Northern District of Illinois, Eastern Division.", "\n No. ", "06 C 6730—Matthew F. Kennelly, Judge.", "\n\n\n\n A RGUED F EBRUARY 18, 2009—D ECIDED JUNE 17, 2009\n\n\n\n\n Before R OVNER, E VANS, and T INDER, Circuit Judges.", "\n E VANS, Circuit Judge. ", "In this appeal, Valero Energy\nCorporation asks us to take a close look at the tax\npractitioner-client privilege. ", "Valero sought to protect\nseveral documents under this privilege, and the result\nwas a mixed bag—some documents were shielded from\nthe Internal Revenue Service, while others were not.", "\n\f2 No. ", "08-3473\n\nValero now contends that by reaching this decision, the\ndistrict court misconstrued not only the privilege, but\nalso an exception to the privilege, which grants the gov-\nernment access to certain documents when tax shelters\nare promoted.", "\n Valero is a large company involved in crude oil\nrefining (it’s the largest refiner in the United States ac-\ncording to its Web site) and oil-product marketing. ", "The\nTexas-based giant got even bigger in December 2001,\nwhen it acquired Ultramar Diamond Shamrock Corpora-\ntion (UDS), an oil company with Canadian subsidiaries.", "\nThis acquisition not only expanded Valero’s reach north-\nward, it also resulted in some pretty hefty tax savings.", "\nBefore the deal took place, UDS consulted with Ernst &\nYoung about restructuring and refinancing its Canadian\noperations. ", "Valero, in turn, called on its long-time advisors\nat Arthur Anderson to review Ernst & Young’s plan and\nprovide further tax advice. ", "At this time, the Canadian\ncurrency was in a slump vis-à-vis the United States\ndollar, and Valero took advantage. ", "In 2002, shortly after\nthe acquisition was completed, Valero realized\n$105 million in tax-deductible foreign currency losses\n(under 26 U.S.C. §§ 987, 988) through a complicated series\nof transactions implemented with Arthur Anderson’s\nhelp. ", "The transactions included the creation of spin-off\nentities, several same-day wire transfers of cash, a large\ndistribution from one of the Canadian subsidiaries to a\nUnited-States-based parent, re-classification of a\nseparate foreign subsidiary as a branch of Valero for\ntax purposes, and the extinguishment of debt.", "\n\fNo. ", "08-3473 3\n\n This loss was big enough to catch the government’s eye,\nand the IRS began investigating. ", "The IRS eventually\nissued a summons to Arthur Andersen, seeking all docu-\nments related to\n tax planning, tax research, or tax analysis, by or for,\n Ultramar Diamond Shamrock (including any of its\n subsidiaries or partnerships, both domestic and for-\n eign) and Valero Energy Corporation (including any\n of its subsidiaries or partnerships, both domestic\n and foreign) in connection with their 2001, 2002 and\n 2003 Canadian and U.S. income taxes . . . .", "\nValero, as a third party, asked the district court to quash\nthe summons. ", "See 26 U.S.C. § 7609(b). ", "It argued that the\nsummons was overbroad and that many documents\nwere protected by either the work-product doctrine or\nthe tax practitioner-client privilege. ", "The privilege\nshields communications between a federally authorized\ntax practitioner and her client “to the extent the com-\nmunication would be considered a privileged communica-\ntion if it were between a taxpayer and an attorney.”", "\n26 U.S.C. § 7525(a)(1). ", "The government countered by\narguing that the scope of the summons was appropriate\nand that even if the tax practitioner-client privilege ap-\nplied, the documents were discoverable since they were\nmade in connection with the promotion of a tax shelter, a\nstatutory exception to the privilege. ", "Id. at § 7525(b). ", "The\ngovernment presented little evidence to back up this\nclaim and rested, instead, on Valero’s failure to deny\nthat saving on taxes was one of its motivations for the\n2002 transactions.", "\n\f4 No. ", "08-3473\n\n There was no clear victor in this first dispute. ", "The\ndistrict court concluded that the IRS issued the sum-\nmons in good faith and that it was not overly broad. ", "The\ncourt rejected Valero’s claim of privilege under the work-\nproduct doctrine but, after an in camera, document-by-\ndocument review, sustained its claim of privilege\nunder the tax practitioner-client privilege. ", "In doing so,\nthe court rejected the government’s argument regarding\nthe tax shelter promotion exception, noting that it failed\nto meet its burden to prove the exception’s applicability\nby simply relying on Valero’s silence. ", "The court then\ndirected Valero to produce any documents withheld\nbased only on the overbreadth and work-product objec-\ntions.", "\n This order resulted in a second round of document\nproduction. ", "Valero found new documents responsive to\nthe summons and sought to keep some of them out of the\ngrasp of the government by again asserting the tax\npractitioner-client privilege. ", "The government then filed a\nmotion to enforce the summons before the district court,\narguing, as it did before, that the privilege did not apply,\nand if it did, the tax-shelter exception required Valero\nto produce the documents. ", "This time, though, the gov-\nernment acted with more gusto. ", "It supported its argu-\nment with a detailed declaration from the IRS agent\nconducting the investigation into Valero’s tax liabilities.", "\nAttached to this declaration were several exhibits—\nincluding e-mails, billing records, and minutes from\nValero’s board meetings—to bolster the contention that\none of the driving purposes behind the multitude of\ntransactions in 2002 was to avoid paying taxes. ", "Valero\n\fNo. ", "08-3473 5\n\nresponded by asserting that Arthur Anderson was not\ntrying to sell or peddle a corporate tax shelter, and there-\nfore the exception was inapplicable. ", "It contended that the\nrigamarole was necessary for paying off public debt,\nsaving some Canadian taxes, and restructuring the busi-\nness operations. ", "The foreign currency losses, Valero\nmaintained, were a natural result of fulfilling these\ngoals. ", "The government, however, poked holes in these\npurported motivations, arguing that the savings in\nUnited States taxes were much more substantial than\nany savings in Canadian taxes and that Valero could\nhave achieved these purposed aims in a more direct\nmanner without triggering the foreign currency losses.", "\n The added support won over the district court. ", "After\nanother round of in camera, document-by-document\nreview, the court rejected some of Valero’s claims of\nprivilege outright. ", "The court did sustain the privilege\nfor other documents but held that some of these docu-\nments were discoverable since they fell within the excep-\ntion for documents promoting tax shelters. ", "This time, the\ncourt reasoned, the government had met its burden. ", "The\ncourt found that it had laid a foundation in fact that\nArthur Andersen promoted (by providing input and\nhelping to organize) a multi-step plan, a significant pur-\npose of which was to avoid federal income taxes.", "\n Valero appeals this second ruling. ", "It has combed\nthrough the documents that the district court found\nunprotected and has identified a subset that, it argues,\nshould have been privileged. ", "We granted a stay, allowing\nthe contested documents to remain under seal, and Valero\n\f6 No. ", "08-3473\n\nhas provided a sealed appendix containing these docu-\nments for our review. ", "Valero first attacks the district\ncourt’s finding that a group of documents were not privi-\nleged since they concerned “business or accounting\nadvice or state tax issues.” ", "Valero argues that the district\ncourt clearly erred in its assessment of 14 of these docu-\nments, emphasizing that they cover federal tax issues.", "\n We begin by noting that there is no general accountant-\nclient privilege. ", "United States v. Frederick, 182 F.3d 496, 500\n(7th Cir. ", "1999). ", "In 1998, Congress provided a limited shield\nof confidentiality between a federally authorized tax\npractitioner and her client. ", "This privilege is no broader\nthan the existing attorney-client privilege. ", "It merely\nextends the veil of confidentiality to federally authorized\ntax practitioners who have long been able to practice\nbefore the IRS, see 5 U.S.C. § 500(c); 31 C.F.R. § 10.3, to\nthe same extent communications would be privileged\nif they were between a taxpayer and an attorney. ", "26\nU.S.C. § 7525(a)(1) (privilege does not apply in criminal\nproceedings). ", "Nothing in the statute “suggests that these\nnonlawyer practitioners are entitled to privilege when\nthey are doing other than lawyers’ work . . . .” ", "Frederick,\n182 F.3d at 502; see also United States v. BDO Seidman, 337\nF.3d 802, 810 (7th Cir. ", "2003) (BDO II). ", "Accounting\nadvice, even if given by an attorney, is not privileged.", "\n This means that the success of a claim of privilege\ndepends on whether the advice given was general account-\ning advice or legal advice. ", "Admittedly, the line between\na lawyer’s work and that of an accountant can be\nblurry, especially when it involves a large corporation\n\fNo. ", "08-3473 7\n\nlike Valero seeking advice from a broad-based accounting\nfirm like Arthur Anderson. ", "But we have set some guide-\nposts to help distinguish between the two. ", "For starters, the\npreparation of tax returns is an accounting, not a legal\nservice, therefore information transmitted so that it\nmight be used on a tax return is not privileged. ", "In re\nGrand Jury Proceedings, 220 F.3d 568, 571 (7th Cir. ", "2000);\nFrederick, 182 F.3d at 500-01; United States v. Lawless, 709\nF.2d 485, 487 (7th Cir. ", "1983). ", "On the other side of the\nspectrum, communications about legal questions raised\nin litigation (or in anticipation of litigation) are privileged.", "\nIn re Grand Jury Proceedings, 220 F.3d at 571; Frederick, 182\nF.3d at 502. ", "Of course, there is a grey area between\nthese two extremes, but to the extent documents are\nused for both preparing tax returns and litigation, they\nare not protected from the government’s grasp. ", "In re\nGrand Jury Proceedings, 220 F.3d at 571; Frederick, 182 F.3d\nat 501. ", "This circumscribed reading of the tax practitioner-\nclient privilege is in sync with our general take on privi-\nleges, which we construe narrowly because they are\nin derogation of the search for truth. ", "United States v.\nEvans, 113 F.3d 1457, 1461 (7th Cir. ", "1997).", "\n On top of that, our review of the district court’s ruling\nis deferential, and we will reverse only if it is clearly\nerroneous. ", "Findings regarding privilege are fact-intensive,\ncase-specific questions that fall within the district\ncourt’s expertise, and, under these circumstances, “a\nlight appellate touch is best.” ", "Frederick, 182 F.3d at 499.", "\nAnd as is the case with any privilege, the one seeking\nits protection must carry the burden of showing that it\napplies. ", "United States v. BDO Seidman, LLP, 492 F.3d 806,\n\f8 No. ", "08-3473\n\n822 (7th Cir. ", "2007) (BDO III). ", "The narrowness of the tax\npractitioner-client privilege, our deferential standard of\nreview, and the allocation of the burden of proof all\npose high hurdles for Valero. ", "Obstacles, as it turns out,\nValero is unable to overcome.", "\n Valero’s contention that the documents consist of\nfederal tax advice misses the mark. ", "As we’ve noted, there\nis no general privilege between a federal tax practitioner\nand her client—it’s not enough that the communications\nraised federal tax topics. ", "Many of these documents\nconsist of worksheets containing financial data and esti-\nmates of tax liability, while others discuss deductions\nand the calculations of gains and losses. ", "These documents\ncontain the type of information generally gathered to\nfacilitate the filing of a tax return, and such accounting\nadvice is not covered by the privilege, Frederick, 182 F.3d\nat 500, whether or not the information made it on the\ntax returns filed by Valero, Lawless, 709 F.2d at 487. ", "Still\nother documents raise issues about Valero’s inventory\nmethods, compensation packages, or general structure,\nand analyze how they affect tax computations. ", "While\nthese documents contain some legal analysis, it comes\npart and parcel with accounting advice, and is therefore\nalso open to the government. ", "In re Grand Jury Proceedings,\n220 F.3d at 571. ", "Simply asserting that the documents\ndiscuss federal tax issues does not convince us that the\ndistrict court clearly erred in finding them discoverable.", "\n Next, Valero contends that nine other documents should\nbe privileged because the district court, in its view,\nwrongly concluded that they were accessible because they\n\fNo. ", "08-3473 9\n\nconsisted of internal documents passed amongst the\naccountants and not the client. ", "This argument, however,\nmisconstrues the district court’s order. ", "The district\ncourt concluded that several memoranda and notes to\nthe file written by the accountants were not privileged\nbecause they “do not reflect a communication between a\nclient and a tax practitioner for the purpose of providing\nfederal income tax advice.” (", "emphasis added). ", "In fact, in\nother parts of its order (as Valero itself notes) the district\ncourt extended the privilege to cover internal documents\nthat did not involve the client. ", "The order is a bit vague\nas to why certain documents fell outside of the privilege.", "\nBut one can hardly blame the court—providing too much\ndetail could spill the beans about the documents, even\nbefore Valero could ask for a stay. ", "Regardless, Valero\nhas not presented any convincing arguments to over-\nturn the ruling. ", "It again asserts that the documents did\nin fact discuss federal tax issues. ", "But as we have\nalready stated, that alone is not enough.", "\n Although we consider the applicability of the privilege\nhere to be a close question with regard to some of the\ndocuments, our review is highly deferential, and Valero’s\narguments fall short of this demanding standard.", "\nHaving reached this conclusion, we need only quickly\naddress Valero’s final contention with regards to these\ndocuments. ", "It maintains that the district court abused its\ndiscretion by failing to afford Valero an opportunity to\nbolster its claim of privilege in either an ex parte hearing\nor by propounding sealed, written questions. ", "While\ntestimony from those who produced the documents\nin question may be necessary to evaluate a claim of privi-\n\f10 No. ", "08-3473\n\nlege, In re Grand Jury Proceedings, 220 F.3d at 572, it is not\nalways required. ", "Here, the district court had adequate\ninformation to evaluate the claim of privilege after re-\nviewing the documents themselves, and we find no\nabuse of discretion in its course of conduct.", "\n The more interesting question raised by this appeal\nconcerns an exception to the tax practitioner-client privi-\nlege. ", "As we’ve noted, Valero’s claim of privilege wasn’t a\ncomplete bust. ", "The district court agreed that Valero met\nits initial burden as to some of the documents but\nordered a subset to be released after it concluded that\nthey fell into a statutory exception to the privilege. ", "The\nprivilege does not cover any written communications\nwith a corporate representative or agent “in connection\nwith the promotion of the direct or indirect participation\nof the person in any tax shelter . . . .” ", "Id. at § 7525(b)(2)\n(emphasis added). ", "Valero disputes the court’s finding\nby attacking its interpretation of the statutory exception.", "\nFew courts have examined this exception and none have\nsquarely addressed the question that Valero raises\nhere: namely, what exactly does it mean to promote a\ntax shelter?", "\n The parties have plucked two different definitions of\npromotion out of the dictionary. ", "Valero, seeking to narrow\nthe application of the tax shelter exception, contends\nthat promotion means the “active furtherance of sale of\nmerchandise through advertising or other publicity.”", "\nValero takes it a step further and urges us to consider the\ntax practitioner’s merchandise to be prepackaged, tax-\nshelter products. ", "Since Arthur Anderson provided Valero\n\fNo. ", "08-3473 11\n\nwith an individualized tax reduction plan, not a one-size-\nfits-all scheme, Valero contends that the documents are\nbeyond the government’s reach. ", "The government,\nunsurprisingly, reads promotion more expansively to\nmean “furtherance” or “encouragement” and asks us to\naffirm the district court’s decision to release the docu-\nments under the tax-shelter exception.", "\n A statute is not ambiguous simply because one of its\nwords is susceptible to two meanings. ", "When inter-\npreting a statute we must read it as a whole, as opposed\nto looking at single words in isolation, see United States v.\nMorton, 467 U.S. 822, 828 (1984), and doing so here goes\na long way to resolving this controversy. ", "Valero’s reading\nof the statute creates an unnecessary conflict. ", "While\nCongress left promotion up to judicial interpretation, it\ntook care to define tax shelter by explicit reference to\nanother section of the tax code. ", "For purposes of the ex-\nception, a tax shelter is “(I) a partnership or other entity,\n(II) any investment plan or arrangement, or (III) any other\nplan or arrangement, if a significant purpose of such\npartnership, entity, plan, or arrangement is the avoidance\nor evasion of Federal income tax.” ", "26 U.S.C.\n§ 6662(d)(2)(C)(ii). ", "Nothing in this definition limits tax\nshelters to cookie-cutter products peddled by shady\npractitioners or distinguishes tax shelters from individual-\nized tax advice. ", "Instead, the language is broad and en-\ncompasses any plan or arrangement whose significant\npurpose is to avoid or evade federal taxes. ", "See BDO III,\n492 F.3d at 823 (noting that the tax shelter exception\nis broad “but such breadth does not make the text am-\nbiguous”). ", "By advocating such a narrow definition of\n\f12 No. ", "08-3473\n\npromotion, Valero is, through the back door, proposing a\ndefinition of tax shelters at odds with the text of the\nstatute. ", "We decline to read such a contradiction into\nthe statute. ", "This definition of tax shelter is broad and\ncould, as Valero points out, include some legitimate\nattempts by a company to reduce its tax burden. ", "But it\nis not our place to tinker with the unambiguous defini-\ntion provided by Congress. ", "And even under this defini-\ntion, tax shelters are not boundless. ", "Only plans and\narrangements with a significant—as opposed to an ancil-\nlary—goal of avoiding or evading taxes count.", "\n But Valero goes further and argues that accepting the\ndefinition of promotion put forth by the district court\nwould effectively read the word out of the statute by\ngranting the government access to any documents con-\nnected to a tax shelter. ", "And if that’s the case, Valero\nurges, the exception will swallow the privilege. ", "We dis-\nagree. ", "Promotion, even under the broader reading, limits\nthe exception to written communications encouraging\nparticipation in a tax shelter, rather than documents\nthat merely inform a company about such schemes,\nassess such plans in a neutral fashion, or evaluate the\nsoft spots in tax shelters that a company has used in the\npast. ", "In fact, the district court’s ruling here belies Valero’s\nalarmist argument. ", "Even operating under a broad defini-\ntion of promotion, the court sustained some of Valero’s\nclaims of privilege. ", "The district court’s understanding\nof promotion does place limits on the exception, just not\nthe limits that Valero wants.", "\n This same observation also undermines Valero’s\nreliance on United States v. Textron Inc. and Subsidiaries,\n\fNo. ", "08-3473 13\n\n507 F. Supp. ", "2d 138 (D. R.I. 2007). ", "The Textron court is\namong the few to have examined the scope of the tax-\nshelter exception, and thus, even though Textron is not\nbinding authority, it deserves a close look. ", "In that case,\nthe IRS sought tax-accrual work papers prepared by\nTextron’s in-house accountants and lawyers. ", "Those\npapers identified items on tax returns susceptible to\nchallenge by the IRS and estimated, in percentage\nterms, Textron’s chances of prevailing in any litigation\nover those issues. ", "Textron refused to release the work\npapers, arguing that they were protected by the tax\npractitioner-client privilege (among others). ", "The govern-\nment countered by contending that the work papers were\nfair game under the tax-shelter exception. ", "The district\ncourt, however, disagreed with the government,\nreasoning that the work papers reflected opinions “re-\ngarding the foreseeable tax consequences of transactions\nthat, already, had taken place, not future transactions\nthey were seeking to promote.” ", "Id. at 148.1 Textron thus\nstands for the rather uncontroversial principle that you\ncan’t promote participation in something once the deed\nis already done. ", "While the court did mention that the\n\n\n\n1\n The district court went on to find that Textron waived the\nprivilege by releasing the work papers to its outside accoun-\ntants, and the First Circuit reviewed the case without discussing\nthe tax practitioner-client privilege. ", "United States v. Textron\nInc. and Subsidiaries, 553 F.3d 87 (1st Cir. ", "2009) (addressing\nclaims regarding work-product doctrine). ", "The First Circuit\nhas since vacated this decision and will rehear the case en banc.", "\nUnited States v. Textron, No. ", "07-2631 (1st Cir. ", "Mar. 25, 2009).", "\n\f14 No. ", "08-3473\n\nTextron accountants were not “peddlers of corporate tax\nshelters,” id., that dicta does Valero little good since\nthere is a fundamental difference between the docu-\nments Textron sought to shield from the government and\nthose that Valero seeks to protect. ", "Valero’s documents\nconcern the structure of (what was then) future trans-\nactions, not those that have already taken place.", "\n What’s more, the district court’s definition of “promo-\ntion” jibes with the IRS’s broad summons power. ", "26 U.S.C.\n§ 7602(a). ", "Our system of federal taxation relies on self-\nreporting and the taxpayer’s forthright disclosure of\ninformation. ", "The government’s power to compel disclosure\nof relevant information is the flip side of that coin. ", "The\nsummons power is the looming threat that helps keep\nthe taxpayer honest, and the more honest taxpayers\nthere are, the more equitably the tax burden is shouldered.", "\nBecause the IRS’s investigatory power is a linchpin in\nour system, courts are reluctant to restrict it “absent\nunambiguous directions from Congress.” ", "United States v.\nArthur Young & Co., 465 U.S. 805, 816 (1984) (citations\nomitted); see also BDO II, 337 F.3d at 810. ", "The privilege\nchips away at the IRS’s summons power: we will not\nbroaden it by narrowly interpreting exceptions without\nclear direction from Congress. ", "The word “promotion” is\nnot a clear enough signal to place such a limit on the\nIRS’s summons power.", "\n Perhaps anticipating this conclusion, Valero turns to\nthe legislative history of the tax-shelter exception to\nbolster its argument. ", "For starters, since the statute is\nunambiguous we need not turn to the legislative history\n\fNo. ", "08-3473 15\n\nto interpret its meaning. ", "BDO III, 492 F.3d at 824. ", "But\neven if we were to consider it, it would do little to\nsupport Valero’s position. ", "The strongest endorsement for\nValero’s argument comes from Senator Connie Mack, who\nstated during a conference committee that the exception\nshould be “narrow” and target “written promotional and\nsolicitation materials used by the peddlers of corporate\ntax shelters.” ", "144 Cong. ", "Rec. ", "S7667 (1998). ", "But the view\nof one senator cannot trump the unambiguous statutory\ntext. ", "See Barnhart v. Sigmon Coal Co., 534 U.S. 438, 457\n(2002); Brill v. Countrywide Home Loans, Inc., 427 F.3d 446,\n448 (7th Cir. ", "2005) (“[W]hen the legislative history stands\nby itself, as a naked expression of ‘intent’ unconnected to\nany enacted text, it has no more force than an opinion\npoll of legislators—less, really, as it speaks for fewer.”).", "\nValero also points to Senator Daniel Moynihan’s com-\nments expressing dismay at the confusion that would, in\nhis view, arise from the privilege and its exception. ", "Senator\nMoynihan thought that the privilege would be “a right\nthat most taxpayers will never be eligible to assert, and\nmany will be surprised to learn about [its] limitations.” ", "144\nCong. ", "Rec. ", "S7621 (1998). ", "Senator Moynihan, although\nimplying support for a broader privilege, highlighted\nthe narrowness of the privilege as written in the statute.", "\nHis statement does Valero more harm than good.", "\n Finally, Valero points to the conference report which\nclarifies that “the promotion of tax shelters [is not a] part\nof the routine relationship between a tax practitioner and\na client,” and should not “adversely affect such routine\nrelationships.” ", "H.R. Rep. No. ", "105-199 at 269 (1998). ", "A\nconference report, unlike the words of a single senator,\n\f16 No. ", "08-3473\n\nis often a good record of Congress’s intent, Bassiouni v.\nF.B.I., 436 F.3d 712, 716 (7th Cir. ", "2006), but the report does\nnot go nearly as far as Valero contends. ", "The report does\nnothing to confine the exception to actively marketed tax\nshelters or prepackaged products. ", "In fact, in the same\nparagraph relied upon by Valero, the report reiterates the\nbreadth of the definition of tax shelters to include “any\npartnership, entity, plan, or arrangement a significant\npurpose of which is the avoidance or evasion of income\ntax.” ", "H.R. Rep. No. ", "105-599 (1998).", "\n We close by noting what this opinion does not do. ", "At\nthis early stage, we are not evaluating the propriety of\nValero’s tax-reduction plan. ", "The IRS only wants access to\ndocuments, it is not (in this appeal) asking Valero to\npay anything. ", "It is not pointing any fingers. ", "The govern-\nment’s burden to overcome the privilege is relatively\nlight—it need only show that there is some foundation\nin fact that a particular document falls within the tax-\nshelter exception. ", "BDO III, 492 F.3d at 822. ", "We affirm the\ndistrict court’s holding that the IRS has met this burden\nand leave for another day any other issues which may\npercolate out of this squabble between Valero and the\ngovernment.", "\n Accordingly, the judgment of the district court is AFFIRMED.", "\nThe partial stay of the district court’s judgment is dissolved.", "\n\n\n\n\n 6-17-09\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0.017699115044247787, 0.006211180124223602, 0.008, 0, 0.02702702702702703, 0.008620689655172414, 0.038461538461538464, 0.008849557522123894, 0.01098901098901099, 0, 0, 0.006134969325153374, 0.012345679012345678, 0.008771929824561403, 0.016260162601626018, 0.022727272727272728, 0.008771929824561403, 0.008298755186721992, 0.0031645569620253164, 0, 0.006802721088435374, 0.006423982869379015, 0.013513513513513514, 0, 0, 0, 0, 0, 0, 0.005376344086021506, 0, 0, 0.009009009009009009, 0.004694835680751174, 0.004464285714285714, 0.008, 0, 0.0056179775280898875, 0.004366812227074236, 0, 0.014925373134328358, 0.0038314176245210726, 0.08333333333333333, 0.004830917874396135, 0, 0.010309278350515464, 0.0032679738562091504, 0, 0.007751937984496124, 0, 0, 0.004651162790697674, 0, 0, 0.007142857142857143, 0, 0.005813953488372093, 0.006896551724137931, 0, 0.017857142857142856, 0, 0.007874015748031496, 0, 0.007042253521126761, 0, 0, 0.021052631578947368, 0.0625, 0, 0, 0, 0.013793103448275862, 0, 0, 0, 0.010869565217391304, 0, 0, 0.013157894736842105, 0, 0.013333333333333334, 0, 0, 0, 0, 0, 0.07407407407407407, 0, 0.0196078431372549, 0, 0.058823529411764705, 0.005917159763313609, 0.03508771929824561, 0.011235955056179775, 0, 0, 0.010067114093959731, 0.00625, 0, 0.02127659574468085, 0, 0, 0, 0, 0, 0, 0.006060606060606061, 0, 0.00684931506849315, 0.011363636363636364, 0, 0, 0.004545454545454545, 0.008264462809917356, 0, 0, 0, 0, 0, 0.014705882352941176, 0.004901960784313725, 0, 0, 0.010526315789473684, 0.005847953216374269, 0, 0.005291005291005291, 0.007462686567164179, 0.046511627906976744, 0, 0, 0, 0.004347826086956522, 0.015384615384615385, 0, 0.006802721088435374, 0.03225806451612903, 0, 0, 0.007518796992481203, 0, 0.007633587786259542, 0, 0.006896551724137931, 0.011111111111111112, 0, 0, 0.004081632653061225, 0.0125, 0, 0, 0.012987012987012988, 0.008771929824561403, 0.00819672131147541, 0.02608695652173913, 0.013333333333333334, 0.043478260869565216, 0.011428571428571429, 0.009174311926605505, 0.010752688172043012, 0.007462686567164179, 0, 0, 0.0064516129032258064, 0.007407407407407408, 0.04285714285714286, 0, 0.024096385542168676, 0.03225806451612903, 0, 0, 0, 0.011320754716981131, 0.008130081300813009, 0.009345794392523364, 0.047619047619047616, 0, 0, 0, 0.013245033112582781, 0.02564102564102564, 0.013245033112582781, 0.010101010101010102, 0.007407407407407408, 0, 0, 0.07692307692307693, 0.011764705882352941, 0.00749063670411985, 0.1, 0, 0, 0, 0.015873015873015872, 0, 0.012195121951219513, 0.0056179775280898875, 0, 0, 0, 0.007194244604316547, 0, 0, 0, 0, 0, 0.009708737864077669, 0.014705882352941176, 0, 0.00392156862745098, 0, 0, 0, 0, 0.02040816326530612, 0, 0, 0.07692307692307693, 0.010526315789473684, 0, 0, 0 ]
0.008415
5
[ "Films get sequels all the time, but it’s rare for a musical artist to release an album that’s a direct continuation of a previous work. ", "Leave it to avant-garde art legend Yoko Ono to buck convention for what seems like the thousandth time in her career. ", "The 82-year-old Ono is preparing to release the sequel to 2007’s Yes, I’m A Witch, and she’s appropriately calling it Yes, I’m A Witch Too. ", "The album features collaborative remixes from an all-star cast of musicians that includes Moby, Death Cab for Cutie, tUnE-yArDs, Peter Bjorn and John, Penguin Prison, Miike Snow, and Cibo Matto.", "\n\nToday, Ono is sharing “Give Me Something”, her collaboration with LA glam rockers Sparks. “", "Give Me Something” was originally released on 1980 on Ono’s duet album with John Lennon, Double Fantasy. ", "The Sparks remix first appeared in 2010, but it will receive its first proper release on Yes, I’m A Witch Too.", "\n\n\n\nYes, I’m A Witch Too will arrive on limited-edition double vinyl, CD, and all digital formats via Manimal on February 19th, the day after Ono’s 83rd birthday. ", "Listen in to “Give Me Something” below.", "\n\nYes, I’m A Witch Too album artwork:" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.00847457627118644, 0.007142857142857143, 0.030927835051546393, 0.021505376344086023, 0.01904761904761905, 0.00909090909090909, 0.012269938650306749, 0, 0 ]
0.010846
5
[ "A man has been injured after being attacked by two men with iron bars in Bushmills, County Antrim, on Monday night.", "\n\nThe 22-year-old victim was walking on Bridge Street in the village when he was attacked at about 20:00 GMT.", "\n\nHe suffered injuries to his arms and legs. ", "Both of the attackers were wearing masks and dark clothes.", "\n\nOne was said to be about 5ft 6ins tall, the other about 6ft. ", "They escaped on foot in the direction of the river.", "\n\nPolice have appealed for witnesses to contact them." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.008695652173913044, 0, 0, 0, 0, 0, 0 ]
0.001242
5
[ "\n842 F.Supp. ", "1553 (1994)\nNur MOHAMMAD a/k/a Noor Ahmad, Petitioner,\nv.\nWilliam SLATTERY, Director of the New York District of the Immigration and Naturalization Service, Respondent.", "\nNo. ", "93 Civ. ", "0497 (CHT).", "\nUnited States District Court, S.D. New York.", "\nFebruary 2, 1994.", "\n*1554 Paul, Weiss, Rifkind, Wharton & Garrison, New York City (Andrew Herwitz, of counsel), for petitioner.", "\nMary Jo White, U.S. Atty., ", "S.D.N.Y., New York City (James A. O'Brien, Sp. ", "Asst. ", "U.S. Atty., ", "of counsel), for respondent.", "\n\nORDER AND OPINION\nTENNEY, District Judge.", "\nOn May 23, 1990, the Immigration Judge (\"IJ\") for the New York District denied Nur *1555 Mohammad a/k/a Noor Ahmad's application for asylum under 8 U.S.C. § 1158(a) after an in absentia hearing. ", "Petitioner (\"Ahmad\") brought three subsequent motions to reopen the hearing, one before the IJ and two before the Board of Immigration Appeals (\"BIA\" or \"Board\"). ", "All were denied. ", "He now seeks an order reversing those decisions and remanding his asylum application for a determination on the merits. ", "Jurisdiction is proper with this court pursuant to 8 U.S.C. § 1105a(10)(b). ", "For the reasons set out below, the petition is granted.", "\n\nBACKGROUND\nPetitioner Ahmad arrived in the United States on March 3, 1990 after fleeing his native Afghanistan. ", "Before fleeing, he was imprisoned and tortured for nine months by the government.[1] Also, petitioner presented evidence that his father, three cousins and uncle were murdered, and his brother injured, by government forces. ", "See Affidavit of Mary E. Davis, attorney for petitioner, sworn to on June 30, 1992. ", "Petitioner claims that the formerly Soviet-backed Afghanistan government is hostile towards his family for aiding the Mujahedin, and that government forces would have tortured or killed him had he remained in Afghanistan. ", "The persecution of the fundamentalist Islamic Mujahedin sect and its supporters by the former Afghanistan government is well documented. ", "See Exhibits Attached to Petition for a Writ of Habeus Corpus (\"Pet. ", "Exh.\") ", "at Exhibits F, G, H, I and J.\nDoubting that the Afghanistan government would authorize his departure from the country, petitioner arrived at JFK International Airport on a flight from Pakistan without travel documents and was excludable pursuant to 8 U.S.C. § 1182(a)(7)(A)(i)(I).[2] Petitioner declared his intent to seek asylum and was informed that a hearing would be held to determine whether he should be excluded and deported. ", "Pet. ", "Exh. ", "C. On May 10, 1990, the office of the Immigration Judge sent petitioner a notice that his case was scheduled for a hearing on May 23, 1990. ", "R. at 51.[3] The notice contained a warning that failure to appear for the hearing could result in an in absentia determination by the IJ. ", "However, petitioner, having recently changed residences, failed to receive this notice. ", "R. at 53. ", "At the hearing held in his absence, the IJ found that Ahmad had failed to appear \"without reasonable cause,\" denied his application for lack of prosecution, and ordered that he be excluded from the United States pursuant to § 212(a)(20) of the Immigration and Nationality Act of 1952, 8 U.S.C. § 1182(a)(7)(A)(i)(I). ", "R. at 45. ", "On May 29, 1990, the INS informed petitioner by mail that he had until June 11, 1990 to appeal the decision to the BIA. ", "R. at 56.", "\nSometime after this, petitioner received the notice of hearing from a friend with whom he lived before the change of address. ", "He then retained counsel and on July 13, 1990, filed an application to reopen the hearing. ", "The IJ noted that petitioner had still not explained his failure to file a change of address notice until after the in absentia hearing and denied his request on August 21, 1990. ", "R. at 42.", "\nPetitioner appealed the denial of his application to reopen to the BIA, asserting that Ahmad had reasonable cause for his absence, and that the IJ's refusal to reopen the exclusion proceeding was unreasonable, arbitrary, and an abuse of discretion. ", "On December 3, *1556 1990, the BIA, citing 8 C.F.R. § 265.1,[4] dismissed the appeal on the grounds that petitioner had failed to provide notice of his address change within ten days after his move, and that this precluded any showing of reasonable cause for his absence from the hearing. ", "R. at 33.", "\nPetitioner then sought to reopen the BIA's December 3 decision. ", "Petitioner explained that his failure to notify the Immigration Office of his change of address stemmed from his ignorance of English and his lack of counsel or advice on Immigration and Naturalization Service (INS) procedures, and he described the merits of his asylum petition. ", "Once again the BIA held that petitioner's failure to notify the INS of his change of address precluded any showing of reasonable cause for his absence. ", "R. at 3. ", "Petitioner filed a petition for a writ of habeas corpus in this court, seeking to reverse the order of exclusion and deportation.", "\nThe petition was originally before Judge Peter K. Leisure, who referred it to Magistrate Judge Naomi Reice Buchwald (\"MJ\") pursuant to 28 U.S.C. § 636(b)(1)(B). ", "On April 30, 1993, the MJ issued a Report and Recommendation (the \"Report\"), advising that the order denying petitioner's motion for a rehearing be reversed and that petitioner be granted a new exclusion hearing before the IJ. ", "After the parties filed their responses to the Report, Judge Leisure transferred the petition to me.", "\n\nDISCUSSION\n\nI. Magistrate Judge's Report.", "\nIn submissions before the MJ, the government argued that the BIA's order should be upheld both because the petitioner had failed to exhaust his administrative remedies and because the BIA decision was sound on the merits. ", "However, the MJ limited her discussion to the latter point, since at oral argument the government's position had been that, even if petitioner had made all of his arguments before the IJ on his initial motion to reopen, that motion was correctly denied. ", "Report at 6, n. 8.", "\nPetitioner argued that he had been denied a full and fair hearing on the merits of his asylum claim. ", "He stated that because he moved from his original residence at approximately the same time that the INS sent notice of his hearing, and because he did not receive notice of the hearing from his former roommate, with whom he had arranged to forward his mail, until after the hearing date, he had \"reasonable cause\" for his failure to attend the hearing. ", "He further argued that the BIA abused its discretion by refusing to consider relevant factors when denying him a new hearing on the merits of his asylum claim.", "\nThe government's position was that violation of 8 C.F.R. § 265.1 prevented any showing of reasonable cause for petitioner's failure to attend the deportation hearing. ", "According to the regulation, an alien under threat of exclusion must notify the INS of any address change within ten days of the change. ", "The regulation itself does not discuss the consequences of failing to notify the INS of an address change. ", "However, the government argued that the IJ has discretion to consider the failure to notify when reviewing an application to reopen an exclusion proceeding. ", "In the present case, the IJ relied upon petitioner's violation of the ten day notice provision to support his finding that no reasonable cause existed upon which to reopen the exclusion proceeding. ", "The BIA affirmed the IJ's decision on the same grounds.", "\nThe MJ recommended granting the habeus petition. ", "She found that the use of in absentia proceedings is improper without \"obstructionist tactics\" on the alien's part. ", "The MJ also noted that petitioner was never apprised *1557 of section 265.1 or of the fact that noncompliance would prevent him from establishing \"reasonable cause\" for his failure to appear at the hearing. ", "She found that failure to consider his lack of actual notice of the hearing in light of these factors was a serious flaw in the IJ's initial refusal to grant petitioner a rehearing. ", "Report at 8. ", "Lastly, the MJ found that the BIA had compounded the error by failing to balance the equities of petitioner's case, including his lack of notice and his meritorious asylum claim, against his failure to comply with section 265.1. ", "Id. at 13.", "\n\nII. ", "Respondent's Objections to the Magistrate Judge's Report.", "\nThe standard of review for a Magistrate Judge's Report with objections is de novo. ", "28 U.S.C. § 636(b)(1).", "\n\na. Exhaustion Requirements.", "\nRespondent argues that this court cannot consider the grounds upon which the Report rests because many of them were never raised before the BIA, and therefore petitioner failed to exhaust his administrative remedies. ", "The remedy sought here, the reopening of petitioner's exclusion hearing, was presented before the BIA on two separate occasions.", "\nGenerally, the petitioner's appeal of first resort to the BIA with respect to the remedy sought on review satisfies the administrative exhaustion requirement. ", "Athehortua-Vanegas v. I.N.S., 876 F.2d 238, 240 (1st Cir.1989); see also Gurbisz v. United States Immigration and Naturalization Service, 675 F.Supp. ", "436, 442 (N.D.Ill.1987). ", "However, respondent points to Second Circuit precedent in which parties on appeal from an administrative hearing were denied relief even though they proceeded through the proper administrative channels, on grounds that they had failed to exhaust administrative remedies with respect to the particular claim presented. ", "While petitioner, at different stages of review, presented more elaborate and refined versions of his initial arguments before the BIA, these elaborations did not rise to the level of new claims for relief, never presented before the administrative tribunal. ", "Therefore, the Second Circuit cases cited by respondent are inapposite. ", "See, e.g., Correa v. Thornburgh, 901 F.2d 1166, 1171 (2d Cir.1990) (claim not raised before the BIA was that alien had actually effected entry into U.S., which would trigger a different section of the immigration statute); Augustin v. Sava, 735 F.2d 32, 36 (2d Cir.1984) (same).", "\nMoreover, the exhaustion requirement may be waived by the reviewing court as a matter of discretion when its imposition fails to serve underlying policy considerations. ", "Diapulse Corporation of America v. F.D.A., 500 F.2d 75, 78 (2d Cir.1974); see also Jean v. Nelson, 711 F.2d 1455, 1506 (11th Cir.1983); Sagermark v. I.N.S., 767 F.2d 645, 648 (9th Cir.1985), cert. ", "denied, 476 U.S. 1171, 106 S.Ct. ", "2895, 90 L.Ed.2d 982 (1986). ", "The policy concerns behind the exhaustion requirement — \"that an administrative agency should have a full opportunity to resolve a controversy or correct its own errors before judicial intervention\" Sagermark, 767 F.2d at 648 — have been amply met in this case by petitioner's three prior appearances before the INS in search of the remedy for which he now petitions this court.", "\nIn addition, the administrative exhaustion requirement may be waived by the reviewing court when failure to consider alternative theories may lead to an unjust result. ", "See Tenneco Oil Co. v. Dept. ", "of Energy, 475 F.Supp. ", "299, 309 (D.Del.1979): \"[t]here may always be exceptional cases or particular circumstances which will prompt a reviewing or appellate court, where injustice might otherwise result to consider questions of law which were neither pressed nor passed upon by the court or administrative agency below\" (quoting Hormel v. Helvering, 312 U.S. 552, 557, 61 S.Ct. ", "719, 721, 85 L.Ed. ", "1037 (1941)). ", "In the present case, petitioner has presented a colorable claim for asylum and has brought forward persuasive evidence *1558 that he may be imprisoned or killed were he to return to Afghanistan. ", "Therefore, the BIA's refusal to allow petitioner to present the merits of his claim before the INS on the basis of a largely ministerial regulation creates the possibility of an unjust result.", "\n\nb. Standard of Review.", "\nRespondent also objects to what it terms the MJ's \"de novo assessment of whether petitioner merits reopening of his proceedings.\" ", "Generally, judicial review of BIA decisions must proceed under an abuse of discretion standard. ", "Thomas v. I.N.S., 976 F.2d 786, 789 (1st Cir.1992); Wijeratne v. I.N.S., 961 F.2d 1344, 1348 (7th Cir.1992). ", "While formulation of the abuse of discretion standard is by no means invariable, the Second Circuit has interpreted it to require that the BIA's decision \"[was] made without a rational explanation, inexplicably departed from established policies, or rested on an impermissible basis such as invidious discrimination against a particular race or group or ... on other considerations that Congress could not have intended to make relevant.\" ", "Wong Wing Hang v. I.N.S., 360 F.2d 715, 719 (2d Cir.1966).", "\nAs respondent argues, it is \"well settled that a reviewing court may not reweigh the factors relevant to a discretionary determination by the BIA.\" ", "Respondent's Objections at 8 (citing I.N.S. v. Rios-Pineda, 471 U.S. 444, 452, 105 S.Ct. ", "2098, 2103, 85 L.Ed.2d 452 (1985); I.N.S. v. Jong Ha Wang, 450 U.S. 139, 144, 101 S.Ct. ", "1027, 1031, 67 L.Ed.2d 123 (1981)). ", "However, when the BIA's decision is fact-sensitive and failure to address relevant factors is of sufficient magnitude, the court may reconsider the merits of the decision. ", "See Mejia-Carrillo v. United States Immigration and Naturalization Service, 656 F.2d 520, 522 (9th Cir.1981) (BIA's decision may be reversed only for an abuse of discretion, such as failure to consider all relevant facts). ", "See also Seatrain International, S.A. v. Federal Maritime Com., ", "598 F.2d 289, 292 (D.C.Cir.1979) (interpreting 5 U.S.C. § 706(2)(A)). ", "In addition, an agency's conclusions of law are reviewable under a higher standard than that of \"abuse of discretion.\" ", "H.W. Wilson Co. v. United States Postal Service, 580 F.2d 33, 37 (2d Cir.1978) (\"when the question is one of law and does not implicate the expertise of the agency, we must provide a stricter standard of review\").", "\nIn the present case, the MJ recognized that she was limited to determining only \"whether the decision was arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.\" ", "Report at 12 (quoting 5 U.S.C. § 706(2); I.N.S. v. Abudu, 485 U.S. 94, 100, 106, 108 S.Ct. ", "904, 909, 912, 99 L.Ed.2d 90 (1988); Vargas v. I.N.S., 938 F.2d 358, 360 (2d Cir.1991)). ", "Respondent argues that the MJ erred by not applying the standard of review suggested by I.N.S. v. Doherty, ___ U.S. ___, 112 S.Ct. ", "719, 116 L.Ed.2d 823 (1992). ", "In that case, the Supreme Court applied solely the \"abuse of discretion\" standard in reviewing a BIA order denying reopening of an asylum claim. ", "Id. at ___, 112 S.Ct. ", "at 724.", "\nHowever, even accepting that \"abuse of discretion\" alone is the appropriate standard in this case, the court believes that the scope of the MJ's review was proper. ", "The MJ partially addressed her inquiry to the fairness of the procedures governing the BIA's discretion in this case, rather than to the authorized use of discretion itself. ", "This line of inquiry is permissible. ", "Charles Gordon & Stanley Mailman, Immigration Law and Procedure, § 81.09[1] at 81-141 (Rev.Ed. ", "1993); see also In re Cartellone, 148 F.Supp. ", "676, 679 (D.C.Ohio 1957) (\"Administrative Procedure Act authorizes a review by the court and inquiry as to fairness of hearing\"), aff'd, 255 F.2d 101 (6th Cir.1958), cert. ", "denied, 358 U.S. 867, 79 S.Ct. ", "99, 3 L.Ed.2d 99 (1958).", "\nMoreover, the examining court may engage in a searching review of the rationale for an administrative agency's decision to determine whether the agency's action was based on a consideration of relevant factors. ", "See Mejia-Carrillo, 656 F.2d at 522; cf. *", "1559 Sanchez v. I.N.S., 755 F.2d 1158, 1161 (5th Cir.1985) (applying the abuse of discretion standard to alien's attempt to avoid deportation via claim of extreme hardship). ", "Finally, the MJ characterized the BIA's central finding, that petitioner's noncompliance with section 265.1 precluded reasonable cause for his failure to appear at the hearing, as a legal conclusion, for which a higher standard of review is appropriate. ", "H.W. Wilson, 580 F.2d at 37. ", "An examination of the MJ's Report reveals that the scope of her review is consistent with these guidelines.", "\n\nc. The Merits.", "\nAccording to 8 C.F.R. § 3.2, \"[m]otions to reopen in deportation proceedings shall not be granted unless it appears to the Board that evidence sought to be offered is material and was not available and could not have been discovered or presented at the former hearing.\" ", "In addition, the United States Supreme Court has held that motions to reopen may be denied for petitioner's lack of a reasonable explanation for failure to present an asylum claim at the initial hearing or for failure to establish a prima facie case for asylum. ", "I.N.S. v. Abudu, 485 U.S. 94, 104-105, 108 S.Ct. ", "904, 911-12, 99 L.Ed.2d 90 (1987).", "\nOn all three of his motions petitioner offered material evidence not previously available or presented to the BIA. ", "This evidence consisted of the merits of his asylum claim and affidavits concerning the circumstances of his failure to receive actual notice of his exclusion hearing. ", "However, the Board refused to reopen exclusion proceedings. ", "In both of its decisions on this matter, the Board relied exclusively upon petitioner's failure to comply with 8 C.F.R. § 265.1, requiring aliens to file a change of address notice within ten days. ", "The MJ concluded that the BIA had abused its discretion by inexplicably departing from established INS policies in denying petitioner's motion to reopen his hearing, Report at 14, and recommended that the INS reopen his hearing.", "\nThe court concurs with the MJ's result, but not her analysis. ", "There was no evidence in the record of established INS policies with respect to granting motions to reopen exclusion hearings or to holding such hearings in absentia. ", "It may be, as the MJ states in her Report at 14, that in no case has a motion to reopen an in absentia hearing been denied on such blameless conduct as was relied upon by the BIA in this case. ", "However, this lack of cases does not imply a consistent administrative policy on the part of the INS.", "\nLikewise, the MJ's finding that the use of in absentia proceedings is improper without \"obstructionist tactics\" on the alien's part is not supported by INS precedent or other judicial interpretations of the immigration laws, and does not seem necessary to reach her result in this case. ", "In any event, whether the BIA inexplicably departed from established policies cannot be satisfactorily determined from the record.", "\nHowever, while the court is unable to conclude that the BIA violated established policies, it is equally unable to absolve the BIA of error in this case. ", "Examination of an agency decision under the abuse of discretion standard includes a determination of whether agency action was based upon a consideration of relevant factors. ", "Mejia-Carrillo, 656 F.2d at 522; see also Howard v. I.N.S., 930 F.2d 432, 434 (5th Cir.1991) (reviewing BIA's final order of deportation for \"error in law and [whether] reasonable, substantial and probative evidence on the record considered as a whole supports its factual findings\"). ", "Moreover, in reviewing BIA decisions \"an evaluation of the agency's treatment of the evidence [before it] is part of review of discretionary agency action.\" ", "Coriolan v. I.N.S., 559 F.2d 993, 998 (5th Cir. ", "1977). ", "In the present case, the BIA's treatment of the evidence before it was so cursory as to amount to no review at all.", "\nAt the time the BIA issued its decision, petitioner's motion to reopen proceedings on his asylum claim had already been through three stages of review. ", "At each level, the petitioner supplemented previous filings with additional testimonial evidence going to his lack of fault in failing to notify the INS of his *1560 change of address and to the merit of his asylum claim, which remained unheard. ", "The petitioner's evidence demonstrated that he had made good faith efforts to comply with INS procedures throughout the exclusion proceedings and that his failure to comply with section 265.1 was prompted mainly by his lack of English language ability and by his ignorance of the provision and its requirements. ", "Evidence was also presented supporting the merits of petitioner's asylum claim.", "\nPetitioner also argued that by failing to receive actual notice of his exclusion hearing, he had been deprived of his right to a full and fair hearing on the merits of his asylum claim. ", "This claim has merit. ", "See Sewak v. I.N.S., 900 F.2d 667, 672 (3rd Cir. ", "1990) (claim that deportation order issued in absentia is improper when alien lacked actual notice of the hearing had merit); see also 8 U.S.C. § 1226(a) (alien subject to exclusion has statutory right to hearing on the merits of his application). ", "However, while the BIA's decision mentioned the lack of actual notice, it was given no weight because the petitioner violated § 265.1 by failing to provide a change of address notice within ten days of moving from his last known address.", "\nThe decision to discount petitioner's lack of actual notice was error on the part of the BIA. ", "In this case, the INS mailed a notice of hearing form to petitioner's last known address on May 10, 1990. ", "The mailing was intended to notify petitioner that a hearing on his asylum claim was scheduled for May 23, 1990. ", "This provided Ahmad with a window of less than two weeks between the time notice was sent and the scheduled hearing. ", "According to uncontested evidence submitted by petitioner Ahmad, at approximately the time notice of his exclusion hearing was sent Ahmad moved from the apartment of the friend with whom he had been staying in Woodside, New York to another friend's apartment in Brooklyn.", "\nExcept for his failure to appear on May 23, 1990, Ahmad has complied with all INS procedures. ", "It is uncontested that petitioner failed to receive actual notice of his May 23 exclusion hearing. ", "However, while the BIA suggests that petitioner is at fault for this, he is not wholly blameworthy: Ahmad made arrangements with his former roommate to forward his mail, and according to an uncontested affidavit submitted by this roommate, the mail was forwarded several weeks after petitioner moved. ", "R. at 30. ", "By then Ahmad's hearing had already been held, and he had been excluded in absentia. ", "The INS itself contributed to his failure to appear by allowing less then two weeks between the notice of hearing and the hearing date.", "\nThis court cannot conclude that petitioner, who has what appears to be a meritorious prima facie case for asylum[5] supported by medical evidence of his torture and abuse at the hands of the Afghanistan government, should be entirely prevented from presenting any of this evidence to the INS because of failure to appear at an exclusion hearing for which he lacked actual notice. ", "This is so even though Ahmad's lack of notice was partially his fault; his failure to comply with the technical provisions of 8 C.F.R. 265.1 does not justify the harsh penalty here proposed. ", "See Sakhavat v. I.N.S., 796 F.2d 1201, 1204 (9th Cir.1986) (BIA's denial of motion to *1561 reopen was an abuse of discretion where agency failed to adequately consider petitioner's meritorious prima facie case for asylum, even though petitioner had failed to request asylum at his initial hearing, where petitioner had reasonable cause).", "\nAccording to 8 U.S.C. § 1253(h)(1), \"[t]he Attorney General shall not deport or return any alien ... to a country if the Attorney General determines that such alien's life or freedom would be threatened in such country on account of race, religion, nationality, membership in a particular social group, or political opinion.\" ", "The BIA, as the judicial arm of an executive agency, has a regulatory mandate to conduct a discretionary balancing of the facts in its decisions. ", "See 8 C.F.R. § 208.10 (\"failure to appear may be excused for other serious reasons in the discretion of the Asylum Officer\"). ", "However, its broad discretion should not extend to the scrupulous enforcement of a ministerial regulation at the cost of petitioner's statutory right to a hearing on his facially valid claim, especially where he has complied with all INS procedures of which he was aware. ", "See Doherty v. United States Dept. ", "of Justice, Immigration and Naturalization Service, 908 F.2d 1108, 1114 (2d Cir.1990) (\"right to apply for asylum or withholding of deportation carries with it right to a hearing `where the likelihood of persecution can be fairly evaluated'\"), rev'd on other grounds, ___ U.S. ___, 112 S.Ct. ", "719, 116 L.Ed.2d 823 (1992).", "\nTherefore, to the extent that the BIA's decision implies that failure to comply with section 265.1 precludes a showing of reasonable cause without regard to the circumstances leading to the failure to comply, it is an abuse of discretion. ", "See Report at 13-14 (analyzing legal authority on exclusion proceedings and concluding that a per se rule concerning violations of section 265.1 is unwarranted); cf. ", "Augustin v. Sava, 735 F.2d at 37 (\"the protected right to avoid deportation or return to a country where the alien will be persecuted warrants a hearing where the likelihood of persecution can be fairly evaluated\"); Sewak, 900 F.2d at 672.", "\nThis court is wary of usurping agency discretion, and is aware of the impropriety of substituting its judgment for that of the BIA within matters under the agency's jurisdiction. ", "However, what is uncontested is that courts may not reweigh factors already considered by the administrative tribunal. ", "This implies that some weighing was done by the tribunal in the first instance. ", "Reviewing courts would be abdicating their own responsibility if they failed to correct agency decisions which denied any weight to relevant factors in the record before them.", "\n\nCONCLUSION\nFor the reasons stated above, petitioner's habeas corpus motion is granted. ", "The court orders the exclusion proceedings reopened for consideration on the merits of petitioner's asylum application and his claim for withholding deportation. ", "The hearing is to be held within 60 days of the filing of this order unless an extension is sought for good cause shown.", "\nSo ordered.", "\nNOTES\n[1] Respondent has not specifically challenged any of the facts of petitioner's asylum claim, arguing instead that the asylum claim is not properly before this court.", "\n[2] 8 U.S.C. § 1182(a)(7)(A)(i)(I), formerly 8 U.S.C. § 1182(a)(20), authorizes exclusion for any immigrant:\n\nwho is not in possession of a valid unexpired immigrant visa, reentry permit, border crossing identification card, or other valid entry document as required by this chapter, and a valid unexpired passport, or other suitable travel document, or document of identity and nationality if such document is required under the regulations....\n[3] Citations to \"R.\" are to the certified administrative record of proceedings.", "\n[4] 8 C.F.R. § 265.1 is entitled \"Forms\" and states in part:\n\nexcept for those exempted by section 263(b) of the Act, all aliens in the United States required to register under section 262 of the Act shall report each change of address and new address within 10 days on Form AR-11.", "\n[5] An applicant for asylum may establish his or her eligibility if he or she can prove either past persecution by objective documentation or a well-founded fear of persecution. ", "Carcamo-Flores v. I.N.S., 805 F.2d 60, 65 (2nd Cir.1986) (citing 8 U.S.C. §§ 1158(a), 1101(a)(42)(A)). ", "Petitioner has presented a variety of evidence tending to establish his persecution, imprisonment and torture by the Afghanistan government. ", "His own testimony concerning the nature and extent of his injuries are supported by the affidavit of an examining physician, who stated that petitioner's current health problems and the scars on his body are all consistent with petitioner's description of his treatment at the hands of government forces. ", "See, Affidavit of Ariel Dan Teitel, M.D., sworn to on May 18, 1992.", "\n\nMoreover, the BIA itself has admitted that the fundamentalist Islamic Mujahedin sect, whom petitioner and his family aided with food and supplies, have been targeted for political and religious persecution by the repressive Afghanistan government. ", "See Matter of Izatula, Interim Decision 3127, 1990 WL 385750 [on FIM-BIA specialized database], 1990 BIA LEXIS, 6 (Feb. 6, 1990). ", "While circumstances have changed somewhat since petitioner fled the country, the consequence of the fall of the Soviet Union for Afghanistan is unclear. ", "At present, the country is embroiled in a civil war. ", "Diplomats Escape Afghanistan as Brief Truce Stills the Guns, New York Times, A4 (Jan. 9, 1994). ", "In any event, petitioner's fear of persecution in Afghanistan seems no less justified now than it was in 1990.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0.017857142857142856, 0, 0, 0.09090909090909091, 0.022222222222222223, 0, 0.037037037037037035, 0.03571428571428571, 0.02127659574468085, 0, 0, 0, 0, 0, 0.018404907975460124, 0, 0, 0, 0, 0.008771929824561403, 0, 0.011904761904761904, 0.0045045045045045045, 0.0072992700729927005, 0.014492753623188406, 0, 0.0023094688221709007, 0, 0, 0, 0.007194244604316547, 0, 0, 0.00946372239747634, 0, 0.008333333333333333, 0, 0, 0, 0.00558659217877095, 0, 0.012, 0.0034602076124567475, 0, 0.015384615384615385, 0.014285714285714285, 0, 0, 0, 0.018518518518518517, 0.004405286343612335, 0.02, 0, 0.004484304932735426, 0, 0, 0.00980392156862745, 0.0028328611898017, 0, 0, 0, 0, 0.006369426751592357, 0.005050505050505051, 0.01818181818181818, 0, 0, 0, 0.005494505494505495, 0, 0, 0, 0, 0, 0.011904761904761904, 0, 0, 0, 0, 0, 0.006666666666666667, 0, 0.0031446540880503146, 0, 0.013888888888888888, 0.01079136690647482, 0, 0.015228426395939087, 0, 0, 0.005291005291005291, 0, 0, 0, 0, 0, 0, 0, 0.010416666666666666, 0.041666666666666664, 0, 0, 0.01834862385321101, 0.00683371298405467, 0.017241379310344827, 0, 0, 0.011363636363636364, 0, 0.005813953488372093, 0.008968609865470852, 0.046875, 0, 0, 0.009389671361502348, 0, 0, 0, 0, 0, 0.006896551724137931, 0, 0, 0, 0.005747126436781609, 0, 0.021052631578947368, 0, 0, 0, 0, 0, 0, 0, 0.003937007874015748, 0.06896551724137931, 0, 0.0625, 0.0036900369003690036, 0.003816793893129771, 0, 0, 0, 0, 0.016666666666666666, 0.005050505050505051, 0.008771929824561403, 0, 0, 0, 0.009900990099009901, 0.003472222222222222, 0, 0.0064516129032258064, 0, 0.010526315789473684, 0, 0.020833333333333332, 0, 0.017391304347826087, 0, 0, 0.003205128205128205, 0, 0.0053475935828877, 0, 0.02040816326530612, 0, 0.004219409282700422, 0, 0.009433962264150943, 0, 0.008547008547008548, 0.007380073800738007, 0.021052631578947368, 0, 0.0033222591362126247, 0, 0.011764705882352941, 0.007407407407407408, 0.0026246719160104987, 0.005235602094240838, 0.0029585798816568047, 0, 0, 0, 0.003676470588235294, 0.02857142857142857, 0.00684931506849315, 0, 0.004166666666666667, 0, 0.008368200836820083, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0070921985815602835, 0, 0.014925373134328358, 0.008, 0, 0, 0, 0.041666666666666664, 0, 0 ]
0.005619
5
[ "Ph 1300 65 95 65\n\n2019 Trading Hours\n\nMonday to Saturday 10am to 6pm\n\nIn Store Services\n\nWe are always happy to assist in suggestions with designs for jewellery ideas and design inspirations. ", "We even offer the option to have inhouse styling done matching jewellery to your outfit. ", "However, for more detailed one on one service an appointment will need to be made, and a fee charged at an hourly rate of $70.00 inclusive of gst. ", "This is additional to the cost of the Beads and or jewellery.", "\n\nRepairs\n\nWe specialise in solving beading problems and other jewellery and accessory repairs. ", "We bring old favourites back to life with our instore repair and alteration service.", "\n\nWholesale Beads Prahran\n\nAdult Classes\n\nLearn how to make your own beautiful jewellery in just 3 hours for $99.", "\n\nAlternate Wednesdays and Saturdays.", "\n\nAlternate Thursdays and Fridays\n\n10am to 1pm\n\nEvenings by appointment (minimum 4 persons) - $99 per person\n\nThis includes all materials to make one pair of earrings and a necklace or bracelet. (", "various techniques)\n\nNo previous experience is required.", "\n\nBOOKINGS ARE ESSENTIAL\n\n50% Payment is required to confirm the booking, balance due at the end of the class. ", "Deposits are non-refundable. ", "Reschedule your class - we can reschedule with a minimum of 48hours notice, sent via email only. ", "Please see the email address above. ", "NB only 1 reschedule permitted per person." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.023809523809523808 ]
0.001587
5
[ "Q:\n\nWider vertical space with some tables (those causing overfull \\hboxes?)", "\n\nWith the following code:\n\\documentclass[a4paper]{report}\n\\usepackage{lipsum}\n\n\\begin{document}\na\n\\begin{center}\n\\begin{tabular}{|c|c|c|}\n\\hline\nOrd & Esplicito (Adam-Bashforth) & Implicito (Adam-Moulton) \\\\\\hline\n0 & & $y_{n+1}=y_n+hf_{n+1}$ Eulero implicito \\\\\\hline\n1 & $y_{n+1}=y_n+hf_n$, Eulero esplicito & $y_{n+1}=y_n+\\frac{h}{2}(f_{n+1}+f_n)$ Greg-Nickolson \\\\\\hline\n2 & $y_{n+1}=y_n+\\frac{h}{2}(2f_n-f_{n-1})$ & $y_{n+1}=y_n+\\frac{h}{12}(5f_{n+1}+8f_n-f_{n-1})$ \\\\\\hline\n3 & $y_{n+1}=y_n+\\frac{h}{12}(23f_n-16f_{n-1}+5f_{n-2})$ & \\\\\\hline\n\\end{tabular}\n\\end{center}\n\\lipsum[1]\n\\begin{center}\n\\begin{tabular}{|c|c|c|}\n\\hline\nOrd & Esplicito (Adam-Bashforth) & Implicito (Adam-Moulton) \\\\\\hline\n0 & & $y_{n+1}=y_n+hf_{n+1}$ Eulero implicito \\\\\\hline\n2 & $y_{n+1}=y_n+\\frac{h}{2}(2f_n-f_{n-1})$ & $y_{n+1}=y_n+\\frac{h}{12}(5f_{n+1}+8f_n-f_{n-1})$ \\\\\\hline\n3 & $y_{n+1}=y_n+\\frac{h}{12}(23f_n-16f_{n-1}+5f_{n-2})$ & \\\\\\hline\n\\end{tabular}\n\\end{center}\nb\n\\begin{center}\n\\begin{tabular}{|c|c|c|}\n\\hline\nOrd & Esplicito (Adam-Bashforth) & Implicito (Adam-Moulton) \\\\\\hline\n0 & & $y_{n+1}=y_n+hf_{n+1}$ Eulero implicito \\\\\\hline\n2 & $y_{n+1}=y_n+\\frac{h}{2}(2f_n-f_{n-1})$ & $y_{n+1}=y_n+\\frac{h}{12}(5f_{n+1}+8f_n-f_{n-1})$ \\\\\\hline\n\\end{tabular}\n\\end{center}\nc\n\\end{document}\n\nI get:\n\nThe examples make me suspect the greater vertical space, which is what troubles me, is due to the overfull \\hbox generated by the tables with the greater vertical space (which is between text above the table and the table). ", "Why does that happen? ", "Is my suspicion right?", "\n\nA:\n\nThe space is obviously caused by the overfull table and it may be fruitful to understand the reason. ", "What you see as an excess vertical space is an empty line.", "\nWhen you do \\\\ inside center you're closing a paragraph, so the effect is reproducible just by\n\\documentclass{article}\n\\begin{document}\na\n\\begin{center}\\tracingparagraphs=1\n\\vrule height 1pt depth 0pt width 1.2\\textwidth % an overlong indivisible object\n\\end{center}\nb\n\\end{document}\n\nThe \\tracingparagraph=1 will make TeX report in the .log file its computations, which are\n@firstpass\n[]\n@\\penalty via @@0 b=0 p=0 d=100\n@@1: line 1.2 t=100 -> @@0\n@secondpass\n[]\n@\\penalty via @@0 b=0 p=0 d=100\n@@1: line 1.2 t=100 -> @@0\n|\n@\\par via @@1 b=* p=-10000 d=*\n@@2: line 2.3- t=100 -> @@1\n\nThe first pass over the paragraph, that consists just of the box represented by | doesn't obviously succeed. ", "The [] bit represents the indentation box (which is 0pt wide).", "\nThe second pass shows a feasible break at the start of the paragraph (@@0, always present, because a new paragraph starts on new line) and then a penalty (which is inserted by the \\item command implicitly inserted by \\begin{center}). ", "This penalty provides a line break point, which is then used because it allows a non overfull line to be typeset. ", "However, the overlong rule causes TeX to throw in the towel.", "\nA very different situation is when just \\centering is used:\n\\documentclass{article}\n\\begin{document}\na\n\\begingroup\\centering \\tracingparagraphs=1\n\\vrule height 1pt depth 0pt width 1.2\\textwidth\n\\par\\endgroup\nb\n\\end{document}\n\nthat reports\n@firstpass\n[]\\OT1/cmr/m/n/10 a \n@ via @@0 b=0 p=0 d=100\n@@1: line 1.2 t=100 -> @@0\n@secondpass\n[]\\OT1/cmr/m/n/10 a \n@ via @@0 b=0 p=0 d=100\n@@1: line 1.2 t=100 -> @@0\n|\n@\\par via @@1 b=* p=-10000 d=*\n@@2: line 2.3- t=100 -> @@1\n\nHere no penalty is added in the paragraph, so the only feasible break point is at the end. ", "No “vertical space” (actually an empty line) is added.", "\nHowever you shouldn't be making overfull lines to begin with, so the discussion is just academic.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.013333333333333334, 0.010575016523463317, 0, 0, 0, 0, 0.004322766570605188, 0, 0, 0, 0.016666666666666666, 0.005357142857142857, 0, 0, 0 ]
0.00335
5
[ "Alpha males dominating boardrooms and treating the office like the Colosseum must come to an end to allow 'feminine traits' to be expressed and equally valued, Cheryl Giovannoni, chief executive of the Girls' Day School Trust (GDST), suggests\n\nMen should stop trying to be like Gladiator Russell Crowe in the boardroom if there is ever going to be complete gender parity in the workplace, an education chief has said.", "\n\nAlpha males dominating boardrooms and treating the office like the Colosseum must come to an end to allow 'feminine traits' to be expressed and equally valued, Cheryl Giovannoni, chief executive of the Girls' Day School Trust (GDST), suggests.", "\n\nSpeaking at the annual conference, she explained that for too many women, the boardroom represents a combative environment which undermines their influence when leadership should in fact be a 'gender diverse concept'.", "\n\n'To those who see themselves not so much as leaders of complex organisations but gladiators striding into the arena, this has to stop.", "\n\n'The meeting room is not the Colosseum. ", "And, frankly, you are not Russell Crowe,' the education chief, who was a high flyer at advertising giant Ogilvy & Mather before moving to GDST, said.", "\n\nThe top girls' school leader suggested that different socialisation experiences between girls and boys often means they exhibit leadership traits differently to men who have been encouraged to display dominant behavioural traits from early age.", "\n\n'To those who see themselves not so much as leaders of complex organisations but gladiators striding into the arena, this has to stop. '", "The meeting room is not the Colosseum. ", "And, frankly, you are not Russell Crowe,' the education chief said\n\nMen should stop trying to be like Gladiator Russell Crowe in the boardroom, the education chief said\n\n'We need to create a modern world where these powerful feminine traits are equally valued and expressed by both men and women,' Ms Giovannoni, whose trust represents 25 primarily independent schools, added.", "\n\nMs Giovannoni made headlines last year when she urged parents and carers not to wrap girls in cotton wool - arguing that they are 'far stronger, resilent and feistier' than people think.", "\n\nHer comments came in relationship to data on the concerning rise of sexting among thousands of under-age school children." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.007194244604316547, 0.00816326530612245, 0, 0, 0.023809523809523808, 0.020134228187919462, 0, 0, 0.02564102564102564, 0.007978723404255319, 0, 0 ]
0.007743
5
[ "(a) Field of the Invention\nThe present invention generally relates to a synchronization channel. ", "More particularly, the present invention generally relates to a synchronization channel for a direct communication between terminals.", "\n(b) Description of the Related Art\nA wireless access system uses a division duplex for a bi-directional communication. ", "In general, a time division duplex (TDD) for dividing time resources to form an uplink and a downlink and a frequency division duplex (FDD) for dividing frequency resources to form the uplink and the downlink are used. ", "The TDD needs a transition time gap (TTG) when a transmitting operation and a receiving operation are switched.", "\nRecently, a direct communication between terminals is developed for a reliable wireless communication in degraded network conditions. ", "For example, IEEE 802.16n or IEEE 802.16.1a standard group is working on this research. ", "The direct communication uses some of infra communication resources, and a voice/video communication and data transmission/reception between the terminals can be performed in the infra communication system and green field condition where the infra communication system is destroyed. ", "A distributed synchronization scheme is used for synchronization of a direct communication terminal, and some of the direct communication resources are used to transmit a synchronization channel for the distributed synchronization.", "\nIn the direct communication, the terminal can receive data through a dedicated channel after transmitting the synchronization channel, and can transmit data through the dedicated channel after receiving the synchronization channel. ", "In this case, a transmitting/receiving (Tx/Rx) transition time is required between the synchronization channel and the dedicated channel. ", "However, when the Tx/Rx transition time is inserted in a synchronization channel structure of a conventional direct communication, the terminal cannot transmit some data of the synchronization channel message part. ", "In this case, because the terminal should increase a code rate of the message part to transmit all data, reliability of the message can be deteriorated. ", "Further, if a fixed Tx/Rx transition time is inserted although some terminals require the Tx/Rx transition time, resource efficiency is decreased." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.0045662100456621, 0.009009009009009009, 0, 0.022727272727272728, 0, 0, 0, 0, 0, 0, 0 ]
0.002593
5
[ "[The clinical study of protraction face mask combining with MEAW technique to correct skeletal Class III malocclusion in the early permanent tooth].", "\nTo investigate the clinical effects of combined multiloop Edgewise arch wire(MEAW) with protraction facemask to treat Class III malocclusion in early permanent dentition, and compare the changes of the periodental tissue and teeth between pre- and post- treatment to explore the mechenism of the method applied to correct Class III malocclusion. ", "23 cases with Class III malocclusion were selected, including 11 males and 12 females, aged from 12 to 14 years old. ", "MEAW and protraction facemask were used to treat Class III malocclusion in early permanent dentition. ", "Lateral cephalometric films were taken for comparison in three stages:before the treatment(T1), seven months (T2) after treatment and in the end of the treatment(T3).SPSS10.0 software package was used for statistical analysis. ", "The alveolar bone changes mainly happaned in the T2 stage, SNA increased by 2.37 degrees in average, OP-MP increased by 4.85 degrees in average; Wits increased by 2. ", "50 degrees in average. ", "The difference was significant(P<0.05). ", "However there was no significant difference between T2 and T3 stage. ", "In the T2 stage,the overjet and overbite increased 4.43mm and 2.66mm in average, and increase continued after treatment. ", "It is suggested that MEAW with protraction facemask is an effective technique to treat Class III malocclusion in early permanent dentition by improving maxillary growth." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0.004405286343612335, 0.012048192771084338, 0, 0, 0.014492753623188406, 0.008264462809917356, 0 ]
0.003565
5
[ "iPhone XS Max has the best smartphone display ever, according to display testing and calibration firm DisplayMate Technologies.", "\n\niPhone XS Max has a number of notable improvements over the original iPhone X, including higher peak brightness and better color accuracy, and matches or sets smartphone display records in a number of areas, according to Dr. Raymond M. Soneira, President of DisplayMate Technologies.", "\n\nFor example, DisplayMate says the iPhone XS Max has a peak full-screen brightness of up to 660 nits for the sRGB and DCI-P3 color gamuts, which improves screen visibility in high ambient lighting conditions. ", "By comparison, the iPhone X achieved a peak full-screen brightness of 634 nits in its year-ago tests.", "\n\nDisplayMate measured the iPhone XS Max's screen reflectance to be 4.7 percent, close to the lowest that it has ever measured for a smartphone. ", "As a result of this high brightness and low reflectance, the iPhone XS Max has one of the best contrast ratings in high ambient light on any smartphone it has ever tested.", "\n\nDisplayMate provides an extensive overview of the iPhone XS Max display, concluding that it is a \"very impressive top tier smartphone display.\"", "\n\nBased on our extensive Lab Tests and Measurements the iPhone XS Max receives our DisplayMate Best Smartphone Display Award, earning DisplayMate's highest ever A+ grade by providing considerably better display performance than other competing smartphones.", "\n\nOf note, the iPhone XS and iPhone XS Max use the same display technologies.", "\n\nDisplayMate's iPhone XS Max OLED Display Technology Shoot-Out article is a worthwhile read for anyone looking for comprehensive analysis and testing of the iPhone XS Max display. ", "DisplayMate has been a provider of display calibration software for consumers and technicians since 1991." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.007874015748031496, 0.007017543859649123, 0.004761904761904762, 0, 0, 0, 0, 0.00390625, 0, 0, 0.009523809523809525 ]
0.003008
5
[ "is the nearest to 0.2? ", " (a) 0.1 (b) w (c) -2\na\nLet c = -1.3 - 3.7. ", "Let w = c - 0. ", "Let f = 49.1 + -49.2. ", "What is the closest to -2/3 in w, -3, f?", "\nf\nLet z be (-4)/14 - (-256)/14. ", "Let j be 2 + -1 - 22/z. Let h = 0.88 - 0.78. ", "What is the closest to -1/3 in 0, j, h?", "\nj\nLet f = -48.5 + 48. ", "Let p = -24 - -42. ", "Let r be (-51)/p + (4 - 1). ", "Which is the closest to f? ", " (a) 1 (b) -2/9 (c) r\nb\nLet q = 803 - 808. ", "Which is the nearest to -2/9? ", " (a) -1/4 (b) -5/4 (c) q (d) 0.4\na\nSuppose 4*o = -2*c + 16, 5*c + 5*o = -6 + 36. ", "Let i = -0.044 + -0.856. ", "Let w = -2.1 + i. What is the nearest to 3 in c, 1/7, w?", "\nc\nSuppose -4*k + 37 - 45 = 0. ", "Let z = k - -1. ", "Which is the nearest to -1? ", " (a) -2 (b) z (c) 1/4\nb\nLet j = -9 - -9. ", "Let g be (-2)/(1 - -1) - 2/(-2). ", "Let d be (8/36)/(4/6). ", "Which is the closest to g? ", " (a) -4 (b) d (c) j\nc\nLet i = 46 - 45.7. ", "Let z be (-45)/66 - (-6)/33. ", "Which is the nearest to z? ", " (a) -0.3 (b) i (c) -1/6\na\nLet y = -1.9 + 2. ", "Let x = -15.43 - -16. ", "Let m = 0.07 - x. Which is the nearest to y? ", " (a) m (b) -0.3 (c) -5\nb\nLet n be 61/(-36) - 3/(-12). ", "Let v = n - -16/9. ", "Let o be (10/(-1))/(-2) + 0. ", "Which is the nearest to -2/9? ", " (a) v (b) o (c) 0\nc\nSuppose -5*n + 1 + 9 = 0. ", "Let r = -32.9 - -35. ", "Let u = r - 2. ", "Which is the nearest to n? ", " (a) 0.2 (b) 0.3 (c) u\nb\nLet m(l) = -l**3 + 10*l**2 + 9*l + 7. ", "Let h be m(11). ", "Let i be (5 - 4) + h/9. ", "What is the closest to 2 in -1, i, -1/3?", "\n-1/3\nSuppose k + 2*i = -9, 0 = -k + 2*i - 3*i - 6. ", "Let b be 3 - ((-30)/4)/k. ", "Let p = -41 - -41. ", "What is the nearest to p in 2/7, 2, b?", "\n2/7\nLet g be 2 - (2 + 0 + 9). ", "Let i = -4020 + 4025. ", "What is the closest to 3 in 1/7, i, g?", "\ni\nLet h(u) = u + 2. ", "Suppose -5*q - 10 - 10 = 0. ", "Let k be h(q). ", "Let s be (-27)/(-12) - 1/1. ", "What is the closest to -0.1 in s, 7, k?", "\ns\nLet p = -49 - -83. ", "Suppose -5*y - p = 2*u, 4*y - 5 = 5*u - 2*u. ", "Let i = u + 8. ", "Which is the nearest to i? ", " (a) -0.2 (b) -2 (c) 1/5\nc\nLet r = 0 + -1. ", "Let z be ((-2)/3)/(r/(-3)). ", "Let i = 144 + -158. ", "Which is the nearest to -0.1? ", " (a) 5 (b) z (c) i\nb\nLet x(v) = -14*v + 420. ", "Let s be x(30). ", "What is the nearest to s in 5/2, -4, 3, 24?", "\n5/2\nLet q = 3461 + -3464. ", "Suppose -3*i - 1 = -16. ", "Let c = 59/35 - 9/7. ", "What is the nearest to c in q, i, -6?", "\nq\nLet l = 113 - 905/8. ", "Let a = -110.26 + 110.3. ", "What is the nearest to 2/5 in l, a, 0?", "\na\nLet t = -3 - -4. ", "Let q = 3114 + -3112. ", "What is the nearest to -2 in -4/7, q, t?", "\n-4/7\nLet u be (-52)/(-39) - (-35)/3. ", "Let i be 52/u + (-44)/10. ", "What is the closest to i in -0.3, 0.5, 5?", "\n-0.3\nSuppose 6*l + 214 = 220. ", "Which is the nearest to l? ", " (a) 35/8 (b) -0.2 (c) -4 (d) -3/4\nb\nLet l = 146 + -145. ", "What is the nearest to 0.1 in -5, l, 0.01?", "\n0.01\nLet n = -542.7 - -542. ", "What is the closest to -2 in n, 0.1, -4/5, -2/3?", "\n-4/5\nLet q = -130 - -648/5. ", "Let k = -553/2 + 268. ", "Let z = k + 7. ", "Which is the closest to q? ", " (a) -0.2 (b) -1/7 (c) z\na\nLet y be (-2)/(((-2800)/(-165))/35 + (-6)/(-33)). ", "Let j = 512/231 - 58/21. ", "Let p = 0.3 - 0.2. ", "Which is the closest to p? ", " (a) j (b) 4 (c) y\na\nLet h = -0.1603 + -11.8397. ", "Which is the nearest to -0.1? ", " (a) h (b) -0.02 (c) 2/11\nb\nLet g = -0.5 + 4.5. ", "Let x = 7 - 8.4. ", "Let d = 1.5 + x. Which is the closest to 1/3? ", " (a) d (b) g (c) 2/7\nc\nLet o = -1041.5 - -1041. ", "Which is the closest to -23? ", " (a) o (b) -0.03 (c) 4\na\nSuppose k + 7 = 5*f - 0*f, 3*k - 4*f - 1 = 0. ", "Let q be (3/30)/(k/18). ", "Which is the nearest to q? ", " (a) 3 (b) -1 (c) -1/2\nc\nSuppose 45*w - 36*w = 0. ", "What is the nearest to 0 in -1/7, w, 2?", "\nw\nLet r = -5.2 - -5.7. ", "What is the nearest to -0.1 in -1, r, 0.1?", "\n0.1\nLet u = 1 - 0.8. ", "Let k(m) = 2 - 145*m - 2*m**2 + 154*m + 0. ", "Let j be k(5). ", "Which is the nearest to -0.2? ", " (a) 0.4 (b) j (c) u\nc\nLet p = -18.8 + 13.8. ", "What is the closest to -5 in 1/4, p, 2/5?", "\np\nLet w = 1.27 - 3.27. ", "Which is the nearest to -14? ", " (a) 3 (b) w (c) 0.5\nb\nSuppose -3*f + 51 - 39 = 0. ", "Which is the nearest to -3? ", " (a) -2 (b) f (c) -0.1\na\nLet r be 3/(-2) - (5 - 6). ", "Let t = -6.36 + 1.36. ", "Which is the nearest to r? ", " (a) 0.7 (b) -4 (c) t\na\nLet f be ((-2)/(-6))/(4/3). ", "Let r = -2/1193 + 2400/8351. ", "Which is the nearest to 2/9? ", " (a) r (b) -1 (c) f\nc\nLet s = 9 + -3. ", "Let w = s + -5.93. ", "Let p = w + 0.13. ", "Which is the nearest to -0.2? ", " (a) -1 (b) p (c) 0\nc\nLet u = -4 + 4.4. ", "Let p = 10.2 - 14.2. ", "Let s = -1.25 + 6.25. ", "Which is the nearest to -1? ", " (a) s (b) p (c) u\nc\nSuppose 0 = 33*y - 40*y - 28. ", "What is the closest to y in -2/7, 1/4, 5?", "\n-2/7\nLet h = -1622/5 - -325. ", "What is the nearest to -7 in 2, h, 1?", "\nh\nLet x be (-2)/(-11)*2 - 6/33. ", "What is the nearest to 2/5 in x, -22, 2/3?", "\nx\nLet x = 29 - 30. ", "Let m be ((-2)/30)/(2/6). ", "What is the nearest to m in 0, x, 2?", "\n0\nLet a = 2.5 + -3. ", "Let p = 0.7948 - -0.2052. ", "What is the nearest to 3 in p, 1/7, a?", "\np\nLet f(m) = m**3 + 10*m**2 + m - 4. ", "Let x be f(0). ", "Which is the nearest to 0.08? ", " (a) x (b) -0.1 (c) 0.2\nc\nLet x = -28.358 - 0.142. ", "Let m = x + 28. ", "Which is the nearest to 0? ", " (a) m (b) -4 (c) 1\na\nSuppose 6*x + 2045 = 2075. ", "What is the closest to 4 in x, -4, -1/4?", "\nx\nLet c be 19/7 + (-6)/2. ", "Let n = 111 - 1001/9. ", "What is the closest to c in 5, n, 0.01?", "\nn\nLet h be 17/(-30) - 4/(-10). ", "Let o = -3.068 + -0.932. ", "What is the closest to 6 in o, h, 1/2?", "\n1/2\nLet l = -1.76 + 5.76. ", "What is the closest to -0.1 in -2/19, 5, 3/4, l?", "\n-2/19\nSuppose 0*t + 12 = -3*t. ", "Let f be ((-2)/t)/((-8)/48). ", "Which is the closest to -1/4? ", " (a) 3 (b) f (c) -0.4\nc\nLet n = 1 + -1.1. ", "Let d = -13 + -9. ", "Let c = d - -21.7. ", "What is the closest to n in c, -2/11, -1?", "\n-2/11\nLet r be ((-3)/(-15))/(17/(-19)). ", "Let k be 9/(-12) - 39/(-68). ", "Let w = r + k. Which is the nearest to -2? ", " (a) -0.2 (b) w (c) 3/7\nb\nLet d = 5.0646 + -0.0646. ", "What is the nearest to 1/3 in -3, -2, -7, d?", "\n-2\nLet r = 2 - -2. ", "Let l be 40/(-75)*1/r. Let o = 244/3 - 80. ", "Which is the closest to -0.1? ", " (a) -0.4 (b) o (c) l\nc\nLet b be (0 - 0) + (-50)/(-13) + -4. ", "What is the closest to -85 in -4, b, 0.1?", "\n-4\nLet r = 3 - 2.96. ", "Let j = 66.46 + -67. ", "Let s = r + j. What is the closest to 0 in -5, -4/3, s?", "\ns\nLet l = 0.1 + -0.5. ", "Let f = 10/3 + -3. ", "Let t = 670 + -669.5. ", "Which is the closest to f? ", " (a) l (b) t (c) -3/5\nb\nLet q = 311 + -311.2. ", "Which is the nearest to 2/3? ", " (a) -2/11 (b) 5 (c) q (d) -0.01\nd\nLet u = -11 + -21. ", "Let k = 32.04 + u. Which is the closest to k? ", " (a) 3 (b) -0.5 (c) -3\nb\nLet o = 17.6 + -19.6. ", "Let l be 3 - ((-1)/(-14))/(1/30). ", "Which is the nearest to o? ", " (a) l (b) 0.5 (c) 5\nb\nLet v = 3078 - 3080. ", "Suppose 5*x = 2*f - 15, 3*x + 0*x = -5*f - 9. ", "Which is the nearest to 0.4? ", " (a) f (b) v (c) 4\na\nLet s = 314 - 943/3. ", "What is the closest to 7 in 1/5, s, -3?", "\n1/5\nLet r = 25 + -23.9. ", "Let b = r + -0.1. ", "Let x = -280 - -1121/4. ", "What is the nearest to x in -3, b, -1?", "\nb\nLet b = 42 + -18. ", "Let f = 24.2 - b. Let s = -0.4 + f. What is the nearest to -0.1 in s, 1/2, -2/7?", "\ns\nLet t = 219.5 - 219. ", "What is the closest to -2/5 in 13, 0.3, t, 3?", "\n0.3\nLet m(b) = -b**2 - 13*b + 45. ", "Let y be m(-16). ", "What is the nearest to -19 in 0, y, -1/4?", "\ny\nLet q(r) = -r**2 - 7*r. ", "Let s be q(-7). ", "Let g be 5 - (2 + -1 + 360/100). ", "Which is the nearest to 1? ", " (a) -5 (b) s (c) g\nc\nSuppose -4*h = -5*h + 4*w + 23, 5*h + w = 10. ", "Let b = 8 + -8. ", "What is the closest to b in h, -5, -4?", "\nh\nLet i = -277 + 281. ", "What is the nearest to -31 in -5, i, -0.3?", "\n-5\nLet w = 0.45 + -0.469. ", "Let z = 12.981 - w. Which is the nearest to 0? ", " (a) z (b) -3 (c) 0.4\nc\nLet h = 0.155 - 0.555. ", "Which is the nearest to 2? ", " (a) h (b) -2 (c) 3\nc\nLet l = -1.8 + 2. ", "Let i be 2/(-3) - (3 - (-212)/(-48)). ", "What is the nearest to l in i, 2, -2?", "\ni\nLet d = -2.1 + 13.1. ", "Let f = -10.1 - -1.1. ", "Let v = f + d. What is the closest to -1 in v, -3, 0.4?", "\n0.4\nLet t = -10188 - -10186. ", "Let d = 1 - -2. ", "Let u = 2 - d. What is the nearest to u in -4, t, -2/17?", "\n-2/17\nLet q = 881 - 888. ", "What is the closest to q in 1/3, 0.5, -1/7, -4?", "\n-4\nLet j = 1.56 - 0.26. ", "What is the nearest to 0 in -7, 3/7, j, -2/9?", "\n-2/9\nLet v = 6 - 5.6. ", "Let w = 37 - 37. ", "Which is the closest to w? ", " (a) -0.5 (b) 0.2 (c) v\nb\nLet w be 0 + (1 - 28/25). ", "Let x = -43/150 - w. Which is the closest to 4? ", " (a) 1 (b) -5 (c) x\na\nLet m be 56/(-21)*(3 + 35/(-12)). ", "Which is the closest to 11? ", " (a) m (b) -1/3 (c) 0.4\nc\nLet k = 8 + -5. ", "Let w be (-7 + 9 + -1)/(-5). ", "Let i be ((-1)/2)/((-3)/(-24)). ", "Which is the nearest to 0.1? ", " (a) i (b) w" ]
{ "pile_set_name": "DM Mathematics" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.03333333333333333, 0, 0, 0, 0, 0, 0.03571428571428571, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.03333333333333333, 0, 0, 0, 0, 0, 0, 0, 0.025, 0.019230769230769232, 0, 0, 0, 0, 0, 0, 0, 0.03571428571428571, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.04, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.038461538461538464, 0, 0, 0.023809523809523808, 0, 0, 0, 0, 0, 0, 0, 0.034482758620689655, 0, 0, 0, 0, 0, 0, 0, 0, 0.025, 0, 0, 0, 0.023809523809523808, 0, 0, 0.03571428571428571, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.06666666666666667, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02631578947368421, 0, 0, 0, 0, 0, 0, 0, 0, 0.04878048780487805, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02564102564102564, 0, 0, 0, 0.02631578947368421, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.01818181818181818, 0.03333333333333333, 0, 0.017857142857142856, 0, 0, 0, 0.022222222222222223, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.002835
5
[ "Knowledge, attitudes, and practices among mothers of children with epilepsy: A study in a teaching hospital.", "\nKnowledge about epilepsy and attitudes towards patients with epilepsy can affect measures taken to manage epilepsy and seizures. ", "Support and understanding of mothers is invaluable in enabling children with epilepsy to develop normal life skills in living with epilepsy. ", "In order to identify the educational needs of mothers of children with epilepsy, their knowledge, attitudes, and practices should be assessed. ", "Therefore, we interviewed a group of mothers of children with epilepsy who were referred to a pediatric neurology clinic in a teaching hospital. ", "The objective of this study was to assess knowledge, attitudes, and practices among mothers of children with epilepsy in order to identify their educational needs. ", "In the period of August 2014 to January 2015, mothers whose children were diagnosed with epilepsy for at least six months participated in this cross sectional study, while returning to the neurology clinic of a pediatric hospital for usual follow-up. ", "Data were collected through face-to-face interviews, held by trained female general practitioners. ", "The interviewer used questions from a questionnaire. ", "The knowledge section of the questionnaire included questions regarding prevalence and general knowledge about epilepsy, its etiology, symptoms, and seizure provoking factors. ", "The attitudes section included statements regarding the mother's attitudes towards epilepsy and patients with the disease. ", "The practice section included questions about first-aid measures taken by mothers who had witnessed generalized seizures by the time of interview. ", "Responses of 206 participants were analyzed. ", "At least 83% of mothers knew that epilepsy is a noncontagious neurological disorder which can be treated by regular drug therapy. ", "In spite of demonstrating good knowledge scores, the majority of mothers felt the need for further training in epilepsy. ", "More than 98% of mothers were against the idea that patients with epilepsy should hide their disease. ", "Though having been referred to physicians, 84% of mothers had provided their children with at least one ineffective treatment, mostly based on superstitions. ", "Mothers' level of knowledge of epilepsy was good, and their attitudes towards epilepsy were mainly positive. ", "Regarding the right first-aid measures at time of the last seizure, mothers' practices were acceptable. ", "However, there is still room for improvement regarding avoiding the wrong measures. ", "It is suggested that both practice-related issues and other aspects of epilepsy be taken into account in epilepsy-related education programs." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Tom Hanks as Mr. Rogers\n\nAs I write this, we are just over a month away from the release of Tom Hanks’ new biopic, A Beautiful Day in the Neighborhood. ", "The trailer has sparked nostalgia for Mr. Rogers; drawing people back to his model of kindness, especially to children.", "\n\nAs a child of the times, I can tell you that Fred Rogers showed me kindness through a black and white TV screen that few adults ever showed me in real life.", "\n\nAnd I’m pretty sure he wouldn’t have sicced bears on me.", "\n\nElisha was No Mr. Rogers\n\nThe second story in our journey through the Stranger Things from the Bible takes us to 2 Kings and the wicked city of Bethel. ", "It’s here that newly appointed prophet, Elisha, is verbally assaulted by youths and responds with a curse. ", "God hears his “prayer” and promptly responds by sending two bears out of the woods to maul them.", "\n\nDisturbing story? ", "You bet! ", "Stranger thing from the Bible? ", "Of course! ", "But it’s a lot of fun to preach!", "\n\nThe story of 2 Kings 2 from a 1453 French manuscript.", "\n\nTimeless Lessons . . . ", "and Bears\n\nI had looked for an excuse to preach this story for years. ", "At one time, I had considered preaching it with the title, “Bears Win by 42.” ", "That’s perhaps a little insensitive to the heart of the story, though. ", "Also, it would likely only appeal to Bears fans.", "\n\nStill, it would be a lot of fun!", "\n\nPart of the challenge of preaching it is the story is much broader than we first realize. ", "This isn’t just about boys, bears, and a bald prophet. ", "The story really begins at the start of the chapter, with Elijah’s assumption. ", "It continues with a trip through Jericho and then finally the incident at Bethel. ", "The bears are just the culmination of a really bad day and Israel’s rebellion into wickedness.", "\n\nElisha and the Bears by Panistheman (Deviantart)\n\nMaybe not the best coloring page for your Sunday School class.", "\n\nCheck Your Presuppositions\n\nThere are a few issues that we need to check when reading the story. ", "I cover them in the sermon as best I could at the time. ", "The age of the “small boys” is one issue. ", "The Hebrew would allow for them to be anywhere from 12-30 years old (and Elisha is likely only 25). ", "This isn’t a matter of the man of God feeling threatened by the local elementary school thugs. ", "And, of course, the text only tells us that 42 were mauled. ", "It says nothing about how many were doing the actual jeering.", "\n\nI wish I had read Derek Rishmawy’s excellent article on the passage before I wrote my sermon. ", "He offers some intriguing takes on Elisha’s baldness and what it might mean. ", "He’s researched the passage well and has much to offer.", "\n\nElisha and the Bears\n\nThis is, without a doubt, the most popular of the sermons from my Stranger Things from the Bible series. ", "The audio file has been played three times as much as the other sermons. ", "I’ve also found it’s a great sermon for when I’m a guest preacher. ", "As I often say, “This one’s got legs.”" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.02631578947368421, 0.008403361344537815, 0.006329113924050633, 0, 0.01948051948051948, 0, 0, 0, 0, 0, 0, 0, 0.01818181818181818, 0, 0, 0, 0, 0.020833333333333332, 0, 0, 0, 0.012658227848101266, 0.012195121951219513, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.010416666666666666, 0, 0, 0, 0, 0, 0 ]
0.003457
5
[ "Evoked hemodynamic response estimation using ensemble empirical mode decomposition based adaptive algorithm applied to dual channel functional near infrared spectroscopy (fNIRS).", "\nThe quality of the functional near infrared spectroscopy (fNIRS) recordings is highly degraded by the presence of physiological interferences. ", "It is crucial to efficiently separate the evoked hemodynamic responses (EHRs) from other background hemodynamic activities prior to any further processing. ", "This paper presents a novel algorithm for physiological interferences reduction from the dual channel fNIRS measurements using ensemble empirical mode decomposition (EEMD) technique. ", "The proposed algorithm is comprised of two main steps: (1) decomposing reference signal into its constituents called intrinsic mode functions (IMFs) and (2) adaptively defining appropriate weights of the corresponding IMFs to estimate the proportion of physiological interference in standard channel measurement. ", "Performance of the proposed algorithm was evaluated using both synthetic and semi-real brain hemodynamic data based on four parameters of relative mean squared error (rMSE), Pearson's correlation coefficient (R(2)), percentage estimation error of peak amplitude (EPA) and peak latency (EL). ", "Results obtained from synthetic data revealed that both the EEMD based normalized least mean squares (EEMD-NLMS) and EEMD based recursive least squares (EEMD-RLS) methods could reduce the average rMSE by at least 34% and 49%, respectively, when compared with widely used methods: block averaging, band-pass filtering and principal and/or independent component analysis. ", "Furthermore, the two proposed methods outperform the regression method in reducing rMSE by at least 21% and 35% respectively when applied to semi-real data. ", "An effective algorithm for estimating the EHRs from raw fNIRS data was proposed in which no assumption about the amplitude, shape and duration of the responses is considered." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0.00546448087431694, 0, 0.010309278350515464, 0.010810810810810811, 0, 0 ]
0.002954
5
[ "The prophet Ezekiel extols the sons of Zadok as staunch opponents of paganism during the era of its pagan worship and indicates their birthright to unique duties and privileges in the future temple (Ezekiel 42:13, 43:19).", "\n\nContents\n\nZadok was a patrilineal descendant of Eleazar the son of Aaron the high priest.(2 Samuel 8:17; 1 Chronicles 24:3) The lineage of Zadok is presented in the genealogy of Ezra (his descendant) as being of ninth generation of direct patrilineal descent from Phineas the son of Eleazar; Ezra 7:1, see 1 Chronicles 5:30 where he is placed ninth in descent from Phineas.", "\n\n..Zadok, The son of Ahitub, son of Amaryah, son of Azaryah, son of Mirayoth, son of Zerachyah, son of Uzzi, son of Bukki, son of Avishua, son of Phineas\n\n—Ezra 7:1-4\n\nIn chronological order, Zadok is first mentioned as coming to support David at Hebron.[1] During the rebellion of Absalom, Zadok is mentioned, as he and the Levites wished to accompany the fleeing David and bring along the Ark of the Covenant, but the king instructed them to remain at Jerusalem, where they could do him better service,[2] so that it actually happened that Ahimaaz, the son of Zadok, along with Jonathan, the son of Abiathar, brought the fleeing king a life saving message.[3] In all these passages Zadok is mentioned in precedence to Abiathar.[citation needed]\n\nBoth Zadok and Abiathar were functioning in tandem as high priests at the time of David's hasty exit from Jerusalem. ", "But, when King David sought advice from the Urim and Thummim by way of Abiathar a divine response was not given, leading to his dismissal from high-priesthood[citation needed]. ", "Subsequently, when Adonijah endeavoured to secure the throne, Abiathar sided with him, leading king Solomon (David's son) to expel him from Jerusalem and reinforce Zadok's high-priesthood, who, along with Nathan the Prophet, supported King Solomon's accession to throne.[4]\n\nAccording to 1 Kings 1:39, Zadok officiated at the anointing ceremony of Solomon as king.", "\n\nThe Hebrew Bible records how before his death, Aaron was accompanied by his brother Moses and his sons Elazar and Ithamar. ", "Upon entry to the cave where he was to die, Aaron saw his brother Moshe dress his elder son Elazer with the clothes of the high priesthood, as initiation to high priesthood. ", "Jewish commentaries on the Bible say that this initiation ceremony served as the catalyst for the stipulation that all future candidates of high priesthood be patrilineal descendants of Elazar the elder son of Aaron and not Ithamar, the younger son.", "\n\nSimilarly, the Hebrew Bible relates how, at the time Phineas son of Eleazar appeased God's anger, he merited the divine blessing of God:\n\nPhineas the son of Eleazar the son of Aaron the priest..Behold I give to him my covenant of peace, and will be his, and his progeny after him, (a) covenant of everlasting priesthood in turn of his zealousness for his God, and he atoned for the sons of Israel\n\nThe Dead Sea Scrolls portray a central role for 'the sons of Zadok the Priests' within the community; the 'Teacher of Righteousness' (Moreh Zedek) named as founder may point to a Zadokite.[citation needed] while the phrase \"To be as one in following the Law and (sharing) wealth and reconcilling (based on) the mouth of the sons of Tzadok the keepers of the covenant\" from the Community Rule document[citation needed] suggest that the leaders of the community were sons of Zadok.", "\n\nRabbinical commentators explain that the continuity of high priesthood is put forth to the descendants of Phineas from this noted verse.[5] According to some rabbinical commentators[who?] ", "Phineas sinned due to his not availing his servitude of Torah instruction to the masses at the time leading up to the Battle of Gibeah. ", "In addition, he also failed to address the needs of relieving Jephthah of his vow. ", "As consequence, the high priesthood was taken from him and given to the offspring of Ithamar, essentially Eli and his sons.", "\n\nA number of scholars indicate that Zadok was the subject of the prophecy of Elkanah when Zadok of the progeny of Eleazar was ultimately appointed as high priest.[6][7]\n\nZadok, as a patrilineal descendant of Phinehas (son of Elazar) resumed the high priesthood. ", "His sons were Ahimaaz and Azariah followed by his descendants who held the high priesthood up to the destruction of The First Temple and, following the building of the second temple, resumed the high priesthood, as per Joshua the High Priest (along with Ezra) being of Zadokite lineage.", "\n\nThe attempt to trace his genealogy back to Eleazar, the third son of Aaron, as opposed to Abiathar, his contemporary and colleague, who was regarded as a descendant of Eli and considered a member of the house of Ithamar, was first made by the Chronicler (I Chronicles 5:30-34 [A. V. vi. ", "4-8]; comp. ", "6:35-38 [A. V. 6:50-53]), thus assuring the preeminence of the Zadokites over the descendants of Eli. ", "In the beginning of his career he was associated with Abiathar (2 Samuel 20:25) and with his son (ib. ", "8:17; I Chron. ", "24:3, 6, 31). ", "The hypothesis has accordingly been advanced that Zadok officiated in the Tabernacle at Gibeon (I Chron. ", "16:39; comp. ", "I Kings 3:4), while the sons of Eli were stationed as high priests at Jerusalem or, more probably, at Shiloh (compare Keil on I Kings 1:8) Such a division of functions is very doubtful, however; and it is more plausible to suppose that Zadok gradually won equality of rank with the sons of Eli by his good fortune in gaining the favor of David.[citation needed]\n\nAccording to the Chronicler, a certain Zadok, as a young man, had been one of those who joined David at Hebron and helped him win the crown of all Israel, his house then including twenty-two captains; (I Chron 12:29) and Josephus expressly identifies this Zadok with the high priest of the same name (Antiquities of the Jews 7:2, § 2).", "\n\nAccording to the Masoretic Hebrew text, David addressed the priest with the words \"ha-Kohen ha-ro'eh attah,\" (\"You are the seer-priest\") (II Sam. ", "15:27) and the Vulgate consequently regards Zadok as a seer, although this interpretation is regarded by many scholars as incorrect. ", "These two difficult words are emended by Wellhausen to \"ha-Kohen ha-Rosh Atta\" (\"You are the chief priest\"), thus implying the promise of the high-priesthood to him. ", "On the suppression of the rebellion, the king sent Zadok and Abiathar to the elders of Judah, urging them to hasten to bring the monarch back (ib. ", "19:12) Zadok again manifested his loyalty to the king when he espoused the cause of Solomon against Adonijah, (I Kings 1:8 et seq.) ", "and in his gratitude the new king appointed him sole high priest (ib. ", "ii. ", "35). ", "In his account of this event Josephus states (Antiquities 8,1, § 3) that Zadok was a scion of the house of Phinehas, and consequently a descendant of Eleazar.", "\n\nHistorical data show that the high-priesthood remained in the progeny of the Zadokites from the time of Zadok up until the rise of the Maccabees, in about 167 BCE.[citation needed] The descendants of Zadok increased in rank and influence, so that his son Azariah was one of the princes of Solomon,(1 Kings 4:2) and the Ahimaaz who married a daughter of Solomon was probably another of Zadok's children (1 Kings 4:15) Either Zadok himself or his grandson was the ruler of the Aaronite priests (1 Chronicles 27:17), and Jerusha, the mother of Jotham, is apparently termed the daughter of Zadok to emphasize her noble lineage, since her father may have been a descendant of the first Zadok (2 Kings 15:33; 2 Chronicles 27:1).", "\n\nThe house of Zadok occupied the high priesthood through much of the Second Temple's time, from Jehoshua ben Jehozadak after the Exile, down to Simon II (much praised in Ben Sira 50), his eldest son Onias III, and his usurping second son Jason (or Jehoshua), who introduced the programme of Hellenization that eventually led to the Maccabean Revolt.", "\n\nJosephus records that Onias IV went to Leontopolis in the Egyptian nome of Heliopolis with a significant following, and for lending military support to the Ptolemaic Pharaoh was given land to build a temple to rival the Temple in Jerusalem (although Josephus also ascribes this to Onias III, while dating the project so as to suggest Onias II). ", "It has been suggested that Onias or members of his Zadokite house may have also founded the community at Qumran.", "\n\nThe popular founder of Reform Judaism, Abraham Geiger, was of the opinion that the Sadducee (\"Tzadoki\" in Mishnaic pronunciation) sect of Judaism drew their name from Zadok, with the leaders of the sect proposed as the sons of Zadok.[8]\n\nChazalic literature took a dim view of both the Sadducees and Boethusian groups not only due to their perceived carefree approach to keeping to written Torah and oral Torah law, but also due to their attempts to persuade common-folk to join their ranks (Sifri to Deuteronomy)[9]\n\nMaimonides, in his treatise to Pirkei Avot, views the Sadducees as Gonvei Da'at (\"stealers of knowledge\") of the greater Jewish nation and of intentionally negating the Chazalic interpretation of Torah (Torah Shebal Peh Rambam to Avoth chap. ", "2). ", "Likewise, in his Mishneh Torah treatise the Rambam defines the Sadducees as \"Harming Israel and causing the nation to stray from following God\" (Hilchoth Avodah Zarah 10:2).", "\n\nConsidering the lack of Chazalic documentary indicating a connection between Zadok the first high priest and Zadok the student of Antignos of Sokho, along with the 13 plus generations between the two Zadok's, Rabbinic figures tend to put a damper on that association[citation needed]. ", "Additional aspects disproving that association include a Chazalic mention that the Sadducee and Boethusian groups favored using vessels of gold and silver whereas the common vessel usage of priests, to negate transmission of impurity, were typically of stone.", "\n\nSome have speculated that as Zadok does not appear in the text of Samuel until after the conquest of Jerusalem, he was actually a Jebusite priest co-opted into the Israelitestate religion. ", "Harvard Divinity School Professor Frank Moore Cross refers to this theory as the \"Jebusite Hypothesis,\" criticizes it extensively, but terms it the dominant view among contemporary scholars, in Canaanite Myth and Hebrew Epic: Essays in the History of the Religion of Israel.[10] Further support for the Jebusite Hypothesis may be drawn from Zadok's participation in the conspiracy among native Jerusalemites (i.e., Jebusites), including Nathan and Bathsheba, that displaced the non-Jerusalemite senior heir to King David's throne, Adonijah, in favor of Bathsheba's son Solomon (1 Kings 2:27, 35, 39), thus highjacking the throne and succession for the party of the conspirators.", "\n\nElsewhere in the Bible, the Jebusites are described in a manner that suggests that they worshipped the same God (El Elyon) as the Israelites, in the case of Melchizedek. ", "Further support for this theory comes from the fact that other Jebusites or residents of pre-Israelite Jerusalem bore names invoking the principle or god Zedek (Tzedek) (see for example Melchizedek and Adonizedek). ", "Under this theory the Aaronic lineage ascribed to Zadok is a later, anachronistic interpolation.[11]\n\n^H. H. Rowley, \"Zadok and Nehushtan\", Journal of Biblical Literature 58:113-41 (1939), states that the Bible provides two different genealogies for Zadok (2 Sam 8:17 and 1 Chron 24:3; see also 1 Chron 5:30-34, 6:35-38), \"but of these one is almost certainly due to textual corruption, and the other to the pious fabrication of a later age.\" ", "Rowley follows this statement with an analysis too long to summarize here." ]
{ "pile_set_name": "Pile-CC" }
[ 0.004524886877828055, 0.010666666666666666, 0.009237875288683603, 0.005649717514124294, 0.0027472527472527475, 0.016, 0.017241379310344827, 0.008032128514056224, 0.004550625711035267, 0.005263157894736842, 0.007352941176470588, 0.012048192771084338, 0.016260162601626018, 0, 0.006993006993006993, 0.01730103806228374, 0, 0.00980392156862745, 0, 0.06666666666666667, 0, 0.009523809523809525, 0, 0.0071633237822349575, 0.013513513513513514, 0.007518796992481203, 0, 0, 0, 0, 0, 0, 0.012658227848101266, 0.0055248618784530384, 0.022857142857142857, 0.008645533141210375, 0.008928571428571428, 0.01968503937007874, 0, 0.023121387283236993, 0.003484320557491289, 0.003861003861003861, 0, 0.007374631268436578, 0.011627906976744186, 0.018604651162790697, 0.006772009029345372, 0.013513513513513514 ]
0.008848
5
[ "l’albatros (plus cooking demos)\n\nTo celebrate my birthday last weekend (if you’ve never met me, it was my 29th), Jamie took me to dinner at L’Albatros. ", "He knows me so well – all I wanted was good wine and cheese to accompany it and he picked the perfect spot.", "\n\nThis was our third visit to the restaurant. ", "On prior visits, we sat in the same room, the one that’s to the right of the bar. ", "This time we sat to the left of the bar in the cozy brick room with a fireplace and views of the patio.", "\n\nWe started off with a wonderful bottle of the Normon petite syrah, of which I think I enjoyed the majority. ", "I passed on the cauliflower soup for fear of making the same mistake on previous visits (filling up on soup and not being able to fully enjoy anything else) and instead opted for the beat salad. ", "I peaked at nearby diners’ tables and they all seemed to be oohing and ahhing over the soup. ", "Chef Bruell’s creativity really shines, in my opinion, with soups. ", "None the less I opted to pass on what I know would have been wonderfully tasty for something that was just okay (the beet salad actually only had a hint of beets). ", "Regardless, it’s not the salads that draw one into L’Albtros or keep bringing us back.", "\n\nFor dinner, I ordered the braised leg of lamb over pasta risotto and rosemary jus while Jamie once again chose the Saturday night special: beef bourguignon with pearl onions, mushrooms and burgandy reduction. ", "Our server shared with us that this continues to be one of the most popular items and they sell out each Saturday by 8 p.m.\n\nWow. ", "There really isn’t a better way to describe our meals. ", "Before we even took a bite, we knew we were in for a treat based on aromas alone. ", "When you can smell your dish approaching, you know it’s going to impress you. ", "Jamie’s dish was even better than we remembered from our first visit. ", "And the lamb – that just might be the best lamb I’ve had out in a long time.", "\n\nAnd to top it all off – and what made Jamie bring me here in the first place – five glorious cheeses handpicked from Brandon Chrostowski, manager/fromager. ", "Honestly, I would love to share exactly what I had, but I was feeling too good from the wine to bother writing anything down, and the more and more I turn 29, the less and less I can remember. ", "But it doesn’t matter – just tell Brandon what you like and he’ll happily set you up on a wonderful journey that will delight your palate.", "\n\nIt was a perfect evening and a delicious way to end an already good day that started off at the farmer’s market at Shaker Square (purchases at Ohio Honey and Tea Hill Farms) and breakfast at Vine & Bean (more on that later).", "\n\n___________________________________________________________________Speaking of Zack Bruell, if you’re a fan, you might be interested to know he’s offering his version of cooking classes: Take 45 with Zack at Table 45.", "\n\nThe interactive cooking demonstrations and tastings will feature Bruell preparing his signature eclectic fare, providing techniques, tips and insight in Table 45’s state-of-the art open kitchen. ", "Sessions will feature a different theme every month; the first is Tandoori oven cooking.", "\n\nTake 45 will take place every other Tuesday at 6 p.m., beginning June 23, and accommodates up to eight participants. ", "The demonstrations cost $55 per person, including chef-prepared cuisine. ", "Optional wine pairings are available for $25 per person. ", "Reservations are required. ", "Call 216-707-4045." ]
{ "pile_set_name": "Pile-CC" }
[ 0.013157894736842105, 0, 0, 0, 0, 0.01818181818181818, 0, 0, 0, 0, 0.011627906976744186, 0.004739336492890996, 0, 0, 0, 0, 0.014285714285714285, 0, 0.012658227848101266, 0, 0.007246376811594203, 0.01327433628318584, 0.0045662100456621, 0.005076142131979695, 0.011363636363636364, 0, 0, 0, 0, 0.05555555555555555 ]
0.005724
5
[ "Sirolimus Immunoprophylaxis and Renal Histological Changes in Long-Term Cardiac Transplant Recipients: A Pilot Study.", "\nThe effects of sirolimus (SIR), as a substitution for calcineurin inhibitor (CNI) immunoprophylaxis, on renal function in very-long-term cardiac transplant recipients have been a matter of controversy. ", "To assess the impacts of SIR as a substitution for CNI on renal function up to 24 months in long-term cardiac recipients as well as the renal histological changes in patients with suspected CNI-induced nephrotoxicity. ", "A total of 23 cardiac transplant recipients aged 57.7 ± 11.2 years, 91 months post-cardiac transplantation were recruited; 15 patients were randomized to CNI-free immune suppression with SIR, and 8 patients were allocated to continue their CNI regimens. ", "Serum creatinine and calculated serum creatinine clearance were measured at prespecified time points up to 24 months. ", "Renal structure and function were assessed by renal biopsies, renal ultrasound, and magnetic resonance imaging at baseline. ", "There were no significant changes in creatinine clearance during the course of the study in patients treated with SIR. ", "However, SIR-treated patients exhibited a significant decrease in 24-hours and nighttime systolic and diastolic blood pressures. ", "Typical findings of significant hypertensive renal disease were detected in 9 of the 11 (82%) patients. ", "Features of chronic CNI toxicity were detected in 6 (55%) patients. ", "There is a very high rate of hypertensive renal disease concomitantly with some degree of CNI toxicity in long-term cardiac transplant recipients with renal dysfunction. ", "This very high rate of hypertension-related disease may limit the impact of SIR on improving renal function long term following cardiac transplantation." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.008547008547008548, 0.0049261083743842365, 0.013761467889908258, 0.007874015748031496, 0, 0.008064516129032258, 0, 0, 0, 0.014705882352941176, 0, 0 ]
0.004823
5
[ ";; Test `call` operator\n\n(module\n ;; Auxiliary definitions\n (func $const-i32 (result i32) (i32.const 0x132))\n (func $const-i64 (result i64) (i64.const 0x164))\n (func $const-f32 (result f32) (f32.const 0xf32))\n (func $const-f64 (result f64) (f64.const 0xf64))\n (func $const-i32-i64 (result i32 i64) (i32.const 0x132) (i64.const 0x164))\n\n (func $id-i32 (param i32) (result i32) (local.get 0))\n (func $id-i64 (param i64) (result i64) (local.get 0))\n (func $id-f32 (param f32) (result f32) (local.get 0))\n (func $id-f64 (param f64) (result f64) (local.get 0))\n (func $id-i32-f64 (param i32 f64) (result i32 f64)\n (local.get 0) (local.get 1)\n )\n\n (func $swap-i32-i32 (param i32 i32) (result i32 i32)\n (local.get 1) (local.get 0)\n )\n (func $swap-f32-f64 (param f32 f64) (result f64 f32)\n (local.get 1) (local.get 0)\n )\n (func $swap-f64-i32 (param f64 i32) (result i32 f64)\n (local.get 1) (local.get 0)\n )\n\n (func $f32-i32 (param f32 i32) (result i32) (local.get 1))\n (func $i32-i64 (param i32 i64) (result i64) (local.get 1))\n (func $f64-f32 (param f64 f32) (result f32) (local.get 1))\n (func $i64-f64 (param i64 f64) (result f64) (local.get 1))\n\n ;; Typing\n\n (func (export \"type-i32\") (result i32) (call $const-i32))\n (func (export \"type-i64\") (result i64) (call $const-i64))\n (func (export \"type-f32\") (result f32) (call $const-f32))\n (func (export \"type-f64\") (result f64) (call $const-f64))\n (func (export \"type-i32-i64\") (result i32 i64) (call $const-i32-i64))\n\n (func (export \"type-first-i32\") (result i32) (call $id-i32 (i32.const 32)))\n (func (export \"type-first-i64\") (result i64) (call $id-i64 (i64.const 64)))\n (func (export \"type-first-f32\") (result f32) (call $id-f32 (f32.const 1.32)))\n (func (export \"type-first-f64\") (result f64) (call $id-f64 (f64.const 1.64)))\n\n (func (export \"type-second-i32\") (result i32)\n (call $f32-i32 (f32.const 32.1) (i32.const 32))\n )\n (func (export \"type-second-i64\") (result i64)\n (call $i32-i64 (i32.const 32) (i64.const 64))\n )\n (func (export \"type-second-f32\") (result f32)\n (call $f64-f32 (f64.const 64) (f32.const 32))\n )\n (func (export \"type-second-f64\") (result f64)\n (call $i64-f64 (i64.const 64) (f64.const 64.1))\n )\n\n (func (export \"type-all-i32-f64\") (result i32 f64)\n (call $id-i32-f64 (i32.const 32) (f64.const 1.64))\n )\n (func (export \"type-all-i32-i32\") (result i32 i32)\n (call $swap-i32-i32 (i32.const 1) (i32.const 2))\n )\n (func (export \"type-all-f32-f64\") (result f64 f32)\n (call $swap-f32-f64 (f32.const 1) (f64.const 2))\n )\n (func (export \"type-all-f64-i32\") (result i32 f64)\n (call $swap-f64-i32 (f64.const 1) (i32.const 2))\n )\n\n ;; Composition\n\n (func (export \"as-binary-all-operands\") (result i32)\n (i32.add (call $swap-i32-i32 (i32.const 3) (i32.const 4)))\n )\n\n (func (export \"as-mixed-operands\") (result i32)\n (call $swap-i32-i32 (i32.const 3) (i32.const 4))\n (i32.const 5)\n (i32.add)\n (i32.mul)\n )\n\n (func (export \"as-call-all-operands\") (result i32 i32)\n (call $swap-i32-i32 (call $swap-i32-i32 (i32.const 3) (i32.const 4)))\n )\n\n ;; Recursion\n\n (func $fac (export \"fac\") (param i64) (result i64)\n (if (result i64) (i64.eqz (local.get 0))\n (then (i64.const 1))\n (else\n (i64.mul\n (local.get 0)\n (call $fac (i64.sub (local.get 0) (i64.const 1)))\n )\n )\n )\n )\n\n (func $fac-acc (export \"fac-acc\") (param i64 i64) (result i64)\n (if (result i64) (i64.eqz (local.get 0))\n (then (local.get 1))\n (else\n (call $fac-acc\n (i64.sub (local.get 0) (i64.const 1))\n (i64.mul (local.get 0) (local.get 1))\n )\n )\n )\n )\n\n (func $fib (export \"fib\") (param i64) (result i64)\n (if (result i64) (i64.le_u (local.get 0) (i64.const 1))\n (then (i64.const 1))\n (else\n (i64.add\n (call $fib (i64.sub (local.get 0) (i64.const 2)))\n (call $fib (i64.sub (local.get 0) (i64.const 1)))\n )\n )\n )\n )\n\n (func $even (export \"even\") (param i64) (result i32)\n (if (result i32) (i64.eqz (local.get 0))\n (then (i32.const 44))\n (else (call $odd (i64.sub (local.get 0) (i64.const 1))))\n )\n )\n (func $odd (export \"odd\") (param i64) (result i32)\n (if (result i32) (i64.eqz (local.get 0))\n (then (i32.const 99))\n (else (call $even (i64.sub (local.get 0) (i64.const 1))))\n )\n )\n\n ;; Stack exhaustion\n\n ;; Implementations are required to have every call consume some abstract\n ;; resource towards exhausting some abstract finite limit, such that\n ;; infinitely recursive test cases reliably trap in finite time. ", "This is\n ;; because otherwise applications could come to depend on it on those\n ;; implementations and be incompatible with implementations that don't do\n ;; it (or don't do it under the same circumstances).", "\n\n (func $runaway (export \"runaway\") (call $runaway))\n\n (func $mutual-runaway1 (export \"mutual-runaway\") (call $mutual-runaway2))\n (func $mutual-runaway2 (call $mutual-runaway1))\n\n ;; As parameter of control constructs and instructions\n\n (memory 1)\n\n (func (export \"as-select-first\") (result i32)\n (select (call $const-i32) (i32.const 2) (i32.const 3))\n )\n (func (export \"as-select-mid\") (result i32)\n (select (i32.const 2) (call $const-i32) (i32.const 3))\n )\n (func (export \"as-select-last\") (result i32)\n (select (i32.const 2) (i32.const 3) (call $const-i32))\n )\n\n (func (export \"as-if-condition\") (result i32)\n (if (result i32) (call $const-i32) (then (i32.const 1)) (else (i32.const 2)))\n )\n\n (func (export \"as-br_if-first\") (result i32)\n (block (result i32) (br_if 0 (call $const-i32) (i32.const 2)))\n )\n (func (export \"as-br_if-last\") (result i32)\n (block (result i32) (br_if 0 (i32.const 2) (call $const-i32)))\n )\n\n (func (export \"as-br_table-first\") (result i32)\n (block (result i32) (call $const-i32) (i32.const 2) (br_table 0 0))\n )\n (func (export \"as-br_table-last\") (result i32)\n (block (result i32) (i32.const 2) (call $const-i32) (br_table 0 0))\n )\n\n (func $func (param i32 i32) (result i32) (local.get 0))\n (type $check (func (param i32 i32) (result i32)))\n (table funcref (elem $func))\n (func (export \"as-call_indirect-first\") (result i32)\n (block (result i32)\n (call_indirect (type $check)\n (call $const-i32) (i32.const 2) (i32.const 0)\n )\n )\n )\n (func (export \"as-call_indirect-mid\") (result i32)\n (block (result i32)\n (call_indirect (type $check)\n (i32.const 2) (call $const-i32) (i32.const 0)\n )\n )\n )\n (func (export \"as-call_indirect-last\") (result i32)\n (block (result i32)\n (call_indirect (type $check)\n (i32.const 1) (i32.const 2) (call $const-i32)\n )\n )\n )\n\n (func (export \"as-store-first\")\n (call $const-i32) (i32.const 1) (i32.store)\n )\n (func (export \"as-store-last\")\n (i32.const 10) (call $const-i32) (i32.store)\n )\n\n (func (export \"as-memory.grow-value\") (result i32)\n (memory.grow (call $const-i32))\n )\n (func (export \"as-return-value\") (result i32)\n (call $const-i32) (return)\n )\n (func (export \"as-drop-operand\")\n (call $const-i32) (drop)\n )\n (func (export \"as-br-value\") (result i32)\n (block (result i32) (br 0 (call $const-i32)))\n )\n (func (export \"as-local.set-value\") (result i32)\n (local i32) (local.set 0 (call $const-i32)) (local.get 0)\n )\n (func (export \"as-local.tee-value\") (result i32)\n (local i32) (local.tee 0 (call $const-i32))\n )\n (global $a (mut i32) (i32.const 10))\n (func (export \"as-global.set-value\") (result i32)\n (global.set $a (call $const-i32))\n (global.get $a)\n )\n (func (export \"as-load-operand\") (result i32)\n (i32.load (call $const-i32))\n )\n\n (func $dummy (param i32) (result i32) (local.get 0))\n (func $du (param f32) (result f32) (local.get 0))\n (func (export \"as-unary-operand\") (result f32)\n (block (result f32) (f32.sqrt (call $du (f32.const 0x0p+0))))\n )\n\n (func (export \"as-binary-left\") (result i32)\n (block (result i32) (i32.add (call $dummy (i32.const 1)) (i32.const 10)))\n )\n (func (export \"as-binary-right\") (result i32)\n (block (result i32) (i32.sub (i32.const 10) (call $dummy (i32.const 1))))\n )\n\n (func (export \"as-test-operand\") (result i32)\n (block (result i32) (i32.eqz (call $dummy (i32.const 1))))\n )\n\n (func (export \"as-compare-left\") (result i32)\n (block (result i32) (i32.le_u (call $dummy (i32.const 1)) (i32.const 10)))\n )\n (func (export \"as-compare-right\") (result i32)\n (block (result i32) (i32.ne (i32.const 10) (call $dummy (i32.const 1))))\n )\n\n (func (export \"as-convert-operand\") (result i64)\n (block (result i64) (i64.extend_i32_s (call $dummy (i32.const 1))))\n )\n\n ;; Test correct argument passing\n\n (func $return-from-long-argument-list-helper (param f32 i32 i32 f64 f32 f32 f32 f64 f32 i32 i32 f32 f64 i64 i64 i32 i64 i64 f32 i64 i64 i64 i32 f32 f32 f32 f64 f32 i32 i64 f32 f64 f64 f32 i32 f32 f32 f64 i64 f64 i32 i64 f32 f64 i32 i32 i32 i64 f64 i32 i64 i64 f64 f64 f64 f64 f64 f64 i32 f32 f64 f64 i32 i64 f32 f32 f32 i32 f64 f64 f64 f64 f64 f32 i64 i64 i32 i32 i32 f32 f64 i32 i64 f32 f32 f32 i32 i32 f32 f64 i64 f32 f64 f32 f32 f32 i32 f32 i64 i32) (result i32)\n (local.get 99)\n )\n\n (func (export \"return-from-long-argument-list\") (param i32) (result i32)\n (call $return-from-long-argument-list-helper (f32.const 0) (i32.const 0) (i32.const 0) (f64.const 0) (f32.const 0) (f32.const 0) (f32.const 0) (f64.const 0) (f32.const 0) (i32.const 0) (i32.const 0) (f32.const 0) (f64.const 0) (i64.const 0) (i64.const 0) (i32.const 0) (i64.const 0) (i64.const 0) (f32.const 0) (i64.const 0) (i64.const 0) (i64.const 0) (i32.const 0) (f32.const 0) (f32.const 0) (f32.const 0) (f64.const 0) (f32.const 0) (i32.const 0) (i64.const 0) (f32.const 0) (f64.const 0) (f64.const 0) (f32.const 0) (i32.const 0) (f32.const 0) (f32.const 0) (f64.const 0) (i64.const 0) (f64.const 0) (i32.const 0) (i64.const 0) (f32.const 0) (f64.const 0) (i32.const 0) (i32.const 0) (i32.const 0) (i64.const 0) (f64.const 0) (i32.const 0) (i64.const 0) (i64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (i32.const 0) (f32.const 0) (f64.const 0) (f64.const 0) (i32.const 0) (i64.const 0) (f32.const 0) (f32.const 0) (f32.const 0) (i32.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f64.const 0) (f32.const 0) (i64.const 0) (i64.const 0) (i32.const 0) (i32.const 0) (i32.const 0) (f32.const 0) (f64.const 0) (i32.const 0) (i64.const 0) (f32.const 0) (f32.const 0) (f32.const 0) (i32.const 0) (i32.const 0) (f32.const 0) (f64.const 0) (i64.const 0) (f32.const 0) (f64.const 0) (f32.const 0) (f32.const 0) (f32.const 0) (i32.const 0) (f32.const 0) (i64.const 0) (local.get 0))\n )\n)\n\n(assert_return (invoke \"type-i32\") (i32.const 0x132))\n(assert_return (invoke \"type-i64\") (i64.const 0x164))\n(assert_return (invoke \"type-f32\") (f32.const 0xf32))\n(assert_return (invoke \"type-f64\") (f64.const 0xf64))\n(assert_return (invoke \"type-i32-i64\") (i32.const 0x132) (i64.const 0x164))\n\n(assert_return (invoke \"type-first-i32\") (i32.const 32))\n(assert_return (invoke \"type-first-i64\") (i64.const 64))\n(assert_return (invoke \"type-first-f32\") (f32.const 1.32))\n(assert_return (invoke \"type-first-f64\") (f64.const 1.64))\n\n(assert_return (invoke \"type-second-i32\") (i32.const 32))\n(assert_return (invoke \"type-second-i64\") (i64.const 64))\n(assert_return (invoke \"type-second-f32\") (f32.const 32))\n(assert_return (invoke \"type-second-f64\") (f64.const 64.1))\n\n(assert_return (invoke \"type-all-i32-f64\") (i32.const 32) (f64.const 1.64))\n(assert_return (invoke \"type-all-i32-i32\") (i32.const 2) (i32.const 1))\n(assert_return (invoke \"type-all-f32-f64\") (f64.const 2) (f32.const 1))\n(assert_return (invoke \"type-all-f64-i32\") (i32.const 2) (f64.const 1))\n\n(assert_return (invoke \"as-binary-all-operands\") (i32.const 7))\n(assert_return (invoke \"as-mixed-operands\") (i32.const 32))\n(assert_return (invoke \"as-call-all-operands\") (i32.const 3) (i32.const 4))\n\n(assert_return (invoke \"fac\" (i64.const 0)) (i64.const 1))\n(assert_return (invoke \"fac\" (i64.const 1)) (i64.const 1))\n(assert_return (invoke \"fac\" (i64.const 5)) (i64.const 120))\n(assert_return (invoke \"fac\" (i64.const 25)) (i64.const 7034535277573963776))\n(assert_return (invoke \"fac-acc\" (i64.const 0) (i64.const 1)) (i64.const 1))\n(assert_return (invoke \"fac-acc\" (i64.const 1) (i64.const 1)) (i64.const 1))\n(assert_return (invoke \"fac-acc\" (i64.const 5) (i64.const 1)) (i64.const 120))\n(assert_return\n (invoke \"fac-acc\" (i64.const 25) (i64.const 1))\n (i64.const 7034535277573963776)\n)\n\n(assert_return (invoke \"fib\" (i64.const 0)) (i64.const 1))\n(assert_return (invoke \"fib\" (i64.const 1)) (i64.const 1))\n(assert_return (invoke \"fib\" (i64.const 2)) (i64.const 2))\n(assert_return (invoke \"fib\" (i64.const 5)) (i64.const 8))\n(assert_return (invoke \"fib\" (i64.const 20)) (i64.const 10946))\n\n(assert_return (invoke \"even\" (i64.const 0)) (i32.const 44))\n(assert_return (invoke \"even\" (i64.const 1)) (i32.const 99))\n(assert_return (invoke \"even\" (i64.const 100)) (i32.const 44))\n(assert_return (invoke \"even\" (i64.const 77)) (i32.const 99))\n(assert_return (invoke \"odd\" (i64.const 0)) (i32.const 99))\n(assert_return (invoke \"odd\" (i64.const 1)) (i32.const 44))\n(assert_return (invoke \"odd\" (i64.const 200)) (i32.const 99))\n(assert_return (invoke \"odd\" (i64.const 77)) (i32.const 44))\n\n(assert_exhaustion (invoke \"runaway\") \"call stack exhausted\")\n(assert_exhaustion (invoke \"mutual-runaway\") \"call stack exhausted\")\n\n(assert_return (invoke \"as-select-first\") (i32.const 0x132))\n(assert_return (invoke \"as-select-mid\") (i32.const 2))\n(assert_return (invoke \"as-select-last\") (i32.const 2))\n\n(assert_return (invoke \"as-if-condition\") (i32.const 1))\n\n(assert_return (invoke \"as-br_if-first\") (i32.const 0x132))\n(assert_return (invoke \"as-br_if-last\") (i32.const 2))\n\n(assert_return (invoke \"as-br_table-first\") (i32.const 0x132))\n(assert_return (invoke \"as-br_table-last\") (i32.const 2))\n\n(assert_return (invoke \"as-call_indirect-first\") (i32.const 0x132))\n(assert_return (invoke \"as-call_indirect-mid\") (i32.const 2))\n(assert_trap (invoke \"as-call_indirect-last\") \"undefined element\")\n\n(assert_return (invoke \"as-store-first\"))\n(assert_return (invoke \"as-store-last\"))\n\n(assert_return (invoke \"as-memory.grow-value\") (i32.const 1))\n(assert_return (invoke \"as-return-value\") (i32.const 0x132))\n(assert_return (invoke \"as-drop-operand\"))\n(assert_return (invoke \"as-br-value\") (i32.const 0x132))\n(assert_return (invoke \"as-local.set-value\") (i32.const 0x132))\n(assert_return (invoke \"as-local.tee-value\") (i32.const 0x132))\n(assert_return (invoke \"as-global.set-value\") (i32.const 0x132))\n(assert_return (invoke \"as-load-operand\") (i32.const 1))\n\n(assert_return (invoke \"as-unary-operand\") (f32.const 0x0p+0))\n(assert_return (invoke \"as-binary-left\") (i32.const 11))\n(assert_return (invoke \"as-binary-right\") (i32.const 9))\n(assert_return (invoke \"as-test-operand\") (i32.const 0))\n(assert_return (invoke \"as-compare-left\") (i32.const 1))\n(assert_return (invoke \"as-compare-right\") (i32.const 1))\n(assert_return (invoke \"as-convert-operand\") (i64.const 1))\n\n(assert_return (invoke \"return-from-long-argument-list\" (i32.const 42)) (i32.const 42))\n\n;; Invalid typing\n\n(assert_invalid\n (module\n (func $type-void-vs-num (i32.eqz (call 1)))\n (func)\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-num-vs-num (i32.eqz (call 1)))\n (func (result i64) (i64.const 1))\n )\n \"type mismatch\"\n)\n\n(assert_invalid\n (module\n (func $arity-0-vs-1 (call 1))\n (func (param i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $arity-0-vs-2 (call 1))\n (func (param f64 i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $arity-1-vs-0 (call 1 (i32.const 1)))\n (func)\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $arity-2-vs-0 (call 1 (f64.const 2) (i32.const 1)))\n (func)\n )\n \"type mismatch\"\n)\n\n(assert_invalid\n (module\n (func $type-first-void-vs-num (call 1 (nop) (i32.const 1)))\n (func (param i32 i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-second-void-vs-num (call 1 (i32.const 1) (nop)))\n (func (param i32 i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-first-num-vs-num (call 1 (f64.const 1) (i32.const 1)))\n (func (param i32 f64))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-second-num-vs-num (call 1 (i32.const 1) (f64.const 1)))\n (func (param f64 i32))\n )\n \"type mismatch\"\n)\n\n(assert_invalid\n (module\n (func $type-first-empty-in-block\n (block (call 1))\n )\n (func (param i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-second-empty-in-block\n (block (call 1 (i32.const 0)))\n )\n (func (param i32 i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-first-empty-in-loop\n (loop (call 1))\n )\n (func (param i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-second-empty-in-loop\n (loop (call 1 (i32.const 0)))\n )\n (func (param i32 i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-first-empty-in-then\n (if (i32.const 0) (then (call 1)))\n )\n (func (param i32))\n )\n \"type mismatch\"\n)\n(assert_invalid\n (module\n (func $type-second-empty-in-then\n (if (i32.const 0) (then (call 1 (i32.const 0))))\n )\n (func (param i32 i32))\n )\n \"type mismatch\"\n)\n\n\n;; Unbound function\n\n(assert_invalid\n (module (func $unbound-func (call 1)))\n \"unknown function\"\n)\n(assert_invalid\n (module (func $large-func (call 1012321300)))\n \"unknown function\"\n)\n" ]
{ "pile_set_name": "Github" }
[ 0.0019392372333548805, 0, 0.001246591351772497 ]
0.001062
5
[ "Mangalagiri Sarees and Fabrics\n\nMangalagiri Sarees and Fabrics are produced by performing handicraft weaving in Mangalagiri, a town in Guntur district of the Indian state of Andhra Pradesh. ", "It was registered as one of the handicraft in the geographical indication from Andhra Pradesh by Geographical Indications of Goods (Registration and Protection) Act, 1999. ", "The Mangalagiri fabric is produced by weaving with the help of pitlooms from combed yarn by warp and woof interlacing. ", "The fabric then undergoes the process of dyeing. ", "The Nizam design is another characteristic of the fabric.", "\n\nHistory \nThe occupation of weaving is as old as 400 years as per some inscriptions found at this region. ", "There was a migratory period for the weavers during the rule of Qutub Shahi due to increase in taxes.", "\n\nStages of production \n\nThe production of the Mangalagiri sari includes different stages which includes:\n\nRaw materials – pure cotton yarn, silver and gold zaris, synthetic and natural dyes and some chemicals.", "\nCotton purification – This process involves boiling of hank cotton to remove certain impurities, soaked overnight, rinsed and made suitable for dyeing process.", "\nDyeing – it involves bleaching technique for white saris and for colored ones, Vat dyes are used.", "\nRemoval of excess dye – dyed or bleached yarn undergoes soaking in boiling water with some techniques to cut out excess dyeing.", "\nDrying – after the above process, the yarn is dried and also adds light sensitive colors in shades\n\nPre-loom process\n\nWinding of hank yarn into warp and weft – charka, shift bamboo and bobbin are used to form warp. ", "While, the weft is made with help of a pirn.", "\nStreet sizing – the warp extension, spraying of rice conjee ensures suitable weaving followed by drying.", "\nWeaving process – it involves Warp and Weft method of weaving and sometimes replaced by Jacquard weaving. ", "Usage of only pitlooms for weaving, designing and cutting per the goods demand undertakes\nCutting & folding – woven cloth undergoes cutting per the goods demand\nInspection of sarees – inspection by the master weaver to rectify flaws\nMarketing – the period of 1985 bought revolution with new market for dress materials than the saris\n\nSarees \nMangalagiri saris are unique variety, woven from cotton and has the most characteristic features such like zari on the border and no woven designs on the body. ", "As the town is also the abode of Lord Narasimha Temple, the saris are also used by the devotees for devotional purposes.", "\n\nSee also \nList of Geographical Indications in India\n\nReferences \n\nCategory:Geographical indications in Andhra Pradesh\nCategory:Guntur district\nCategory:Saris\nCategory:Culture of Andhra Pradesh\nCategory:Amaravati" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.005263157894736842, 0.011627906976744186, 0, 0, 0.017543859649122806, 0, 0.009900990099009901, 0, 0.00625, 0, 0, 0, 0, 0, 0.009345794392523364, 0, 0.008333333333333333, 0.004694835680751174 ]
0.004053
5
[ "Memo to Newspapers: Stop Thinking Like a Portal\n\nUpdated: The story of homeless radio announcer Ted Williams became an Internet sensation this week, as a video of him got passed around on Twitter and in the blogosphere, and quickly led to appearances on the Today Show (s ge) and job offers from around the country. ", "But the video that started it all — an interview with a reporter from the Columbus Dispatch newspaper in Ohio — is no longer available on YouTube (s goog). ", "In yet another example of a newspaper that can’t see the forest for the dead trees, there is just a statement from the video-hosting site that the clip “has been removed due to a copyright claim by The Dispatch.”", "\n\nAdvertisement\n\nA web editor in the Dispatch newsroom seemed confused when asked why the paper ordered YouTube to take the clip down. “", "It’s our video, and someone put it there without our permission,” he said. ", "All of which is true; the original clip was copied from the Dispatch site and uploaded to YouTube, and therefore the newspaper had a pretty clear copyright claim. ", "The video can still be seen at the Dispatch website, along with other videos related to the Williams story. ", "But how many people are going to watch the video there? ", "Likely a fraction of the 13 million who watched it on YouTube.", "\n\nIn fact, not only does it make little sense to pull a video after it has already been seen by 13 million people — not to mention the fact that there are half a dozen other versions available at YouTube, including one from the Associated Press newswire — but the Williams story might not even have happened if it wasn’t for YouTube. ", "Although the link to the Dispatch site could have been shared on Twitter and other social networks just as easily as the link to the YouTube video was, the newspaper doesn’t allow its video to be embedded, and therefore, it likely wouldn’t have spread so far so quickly. ", "Williams might never have come to the attention of any of the companies now offering him jobs.", "\n\nThe larger issue here, of course, is one of control over content, something newspapers and other traditional media outlets seem determined to fight for, whether through copyright takedowns or by putting up paywalls, or by shipping iPad (s aapl) apps that don’t allow users to share or even link to content. ", "Few publishers — apart from The Guardian, which launched an ambitious “open platform” last year, and some equally forward-thinking outlets such as the Journal Register Co. in New Jersey, with its web-first strategy — seem to have really embraced the idea that content can’t be bottled up and locked behind walls any more, and that there is more to be gained by letting it be shared than there is to be lost.", "\n\nIn the late 1990s, everyone wanted to become a “portal:” a destination site where users would get all their email and news and entertainment and so on. ", "Yahoo (s yhoo) and AOL (s aol) and Microsoft (s msft) spent billions building these businesses. ", "Then along came Google, with its single search box and the complete opposite approach: It does its best to send you away as quickly as possible. ", "That’s because the web giant doesn’t think of itself as a “content” or media company. ", "It is simply providing a service — and to the extent that it does a good job of providing that service, readers are more willing to come back, and to click on related ads. ", "Pretty simple, really.", "\n\nWhat has the Dispatch gained by removing its video from YouTube? ", "It hasn’t stopped people from sharing the video, and it likely hasn’t convinced anyone to go to its website other than readers who were already going there anyway — and even when they get to the video, there are no comments or any other social or community elements to keep them there. ", "All the takedown has done is make the newspaper look like a company that doesn’t really understand what it’s doing online, or why.", "\n\nUpdate: As noted by a commenter here who lives in Columbus (and who wrote a blog post about the takedown of the video), the Dispatch has created a YouTube channel and uploaded a copy of the Ted Williams video — something it probably should have done before, rather than after (the new version of the video had 136 views at last check). ", "The editor of the paper has also written a blog post about the incident.", "\n\nThey don’t ‘get it’! ", "Employing people who ‘get it’ issin’t the solution – the problem is that the guy at the top of the rung is stifling innovation and slowing everyone else down. ", "So Change has to come from top-down, not keeping relics in lofty positions\n\nAs several people have pointed out, I have a feeling this has much less to do with protecting a copyright, as it does losing 13 million impressions and potential clicks on their webpage’s ads. ", "Not having the foresight to post the video on their own YouTube, they went into, “OH CRAP!” ", "mode and pulled it. ", "Completely understand, but it was much too late.", "\n\nAs always, you’re right on, Matthew. (", "Hope you’re doing well, by the way.)", "\n\nReleasing the videos on YouTube — with ads included — can be a good additional source of revenue for newspapers.", "\n\nThe ads don’t necessarily have to be YouTube ads, either; Just edit the videos to include the ads at the beginning. ", "This way, once a video goes “viral” (I really hate that term) the news organization can make some money.", "\n\nSeriously, though, it was not under their copyright? ", "It was never NOT under their copyright. ", "Upon creation it is theirs, no?", "\n\nWhat they should’ve done is had the video and it’s page views transferred to them, rather than serve YT with some take down notice, and save everyone the trouble. ", "Y’all got the props from the media. ", "Funny, too, how it’s a VIDEO from a dead tree paper that got attention, not PRINT.", "\n\nMany newspapers have “partner sites” with YouTube where I believe they make advertising revenue, although it’s usually very little I imagine. ", "The paper where I used to work, the Orlando Sentinel, has a partner site – http://www.youtube.com/orlandosentinel.", "\n\nWhat the paper could have done when the thing went viral is talk to YouTube, set up a partner site and get the video up there and try to get something out of it that.", "\n\nOf course a better solution would have been for the paper to have had its own YouTube site before this even started. ", "As you mention in your post, having embeddable videos on their site would also help.", "\n\nA good example of a newspaper that capitalized on a YouTube hit is the Gainesville Sun and their “don’t tase me bro” video from 2007.", "\n\nThanks, Etan — that’s a great counter-example. ", "It appears (as another commenter noted above) that the paper has created a YouTube channel now and uploaded a new copy of the video. ", "A good idea, but feels a little like closing the barn door after the horses have fled.", "\n\nI live in Columbus and the Dispatch is my hometown newspaper, so when I heard they requested the removal of the video, I naturally decided to blog about it, too. ", "I reached out to the Dispatch this AM, who directed me to contact the editor. ", "Instead of responding to my questions, the editor sent me an email that said he would be releasing a statement. ", "The statement is now available, and the Dispatch created a YouTube channel and posted the video there (something that they should have done days ago).", "\n\nMy post includes an excerpt from the statement, if you want to read it. ", "However, it’s unlikely that it will change anyone’s opinion about the paper’s social media savyness …\n\nI have a feeling some editor said: “Why aren’t we making money on this clip? ", "If we put it in our system, we can put pre-roll/mid-roll/post-roll/whatever.”", "\n\nMathew: Would your response point to the brand equity and awareness built by getting 20-million views on the clip via youtube?", "\n\nIMHO, they should’ve put a “burn” of their logo in the bottom left or top right hand corner of the clip to ensure the Columbus Dispatch is seen at all times during the clip — not just at the end. ", "I have a feeling that would be a lot more valuable to the organization than the revenue attached to serving up views in house.", "\n\nA bad thing happens to newspaper, thus a knee-jerk “newspapers don’t get it” story. ", "Sure trying to remove the video from youtube without having copies of the video on youtube yourself is foolish, the larger problem is that people — even “legit” bloggers, wire services etc. ", "see news clips as fair game and don’t hesitate to give credit to the original source.", "\n\nFor example, Gigaom didn’t bother to credit the Ohio paper with the image capture either.", "\n\nFurther, in cases like the “bedroom intruder” the viral derivative works chopped out the original reporting…\n\nEveryone learns their lesson at some point and burns their url and credits all over the video so as to benefit from the piracy and/or viral video creation or at least makes folks work" ]
{ "pile_set_name": "Pile-CC" }
[ 0.0031645569620253164, 0.01282051282051282, 0, 0.014705882352941176, 0, 0.012269938650306749, 0.018518518518518517, 0, 0.016129032258064516, 0.011976047904191617, 0.007380073800738007, 0.010638297872340425, 0.006472491909385114, 0.004914004914004914, 0, 0.020833333333333332, 0.006896551724137931, 0, 0, 0, 0.029850746268656716, 0, 0, 0.008875739644970414, 0, 0, 0, 0, 0.010869565217391304, 0, 0, 0, 0, 0.008771929824561403, 0.00847457627118644, 0, 0, 0, 0, 0, 0, 0, 0.006944444444444444, 0.017543859649122806, 0.005952380952380952, 0.008403361344537815, 0, 0.007407407407407408, 0, 0.007518796992481203, 0, 0.006097560975609756, 0, 0, 0.006666666666666667, 0, 0, 0, 0, 0.010101010101010102, 0, 0, 0, 0, 0.01098901098901099, 0 ]
0.004563
5
[ "It takes time to apologise. ", "I get it. ", "But …\n\nPost navigation\n\nIt has taken full NINE daysfor the CEO of the SMRT to come out and take ownership of the flooding incident of the North South Line that happened on October 7th.", "\n\nIn addition to the leadership of the SMRT, we have the transport minister also apologise for the inconvenience caused and blames people down the line – the Bishan maintenance team was at fault. ", "In that article, it also says that “that the bonuses of the team at fault would be affected”. ", "How about all of those from those individuals and above right up to the CEO also have a similar bonus freeze (by percentage not quantum)?", "\n\nAnyone who has done NS would know that if someone in your platoon messes up, everyone is punished. ", "This forces everyone to encourage and nudge all to do well. ", "And since the CEO was a former general, he should be au fait with that shared misery model. ", "Why not do so here?", "\n\nThe CEO says that it is bad culture of the organisation to blame. ", "I can appreciate that. ", "I hope this happened because of the downplaying of engineering as the core competency of the business by the previous management.", "\n\nSo, it would appear that it was complacency and failure to follow procedures that is at fault.", "\n\nYes, there has to be thorough investigations and probably that is the reason for the 9 day delay for the leadership to be heard (I am trying to give them the benefit of the doubt).", "\n\nWhy was it so difficult for the management to come out and speak shortly after the incident? ", "And update it over the following days?", "\n\nLet me raise something that would be good to have an answer to (I can’t verify it):Why are there statements being made that the individual who was “disciplined” had actually retired late last year/early this year. ", "I really hope this is not true and is pure speculation, but would be good for the SMRT to put it to rest." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.005434782608695652, 0.01020408163265306, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.010416666666666666, 0, 0, 0, 0, 0.009523809523809525 ]
0.001873
5
[ "Q:\n\nIs it safe to use a 100 watt LED bulb in a 3-way lamp that specifies using incandescent bulbs only?", "\n\nI purchased a 100 watt LED and a 3 way lamp, but now that it is all assembled I have just read in the instructions:\n\nLamp is rated for max 150 watt incandescent, Type A E-26, 3-way bulb. ", "DO NOT USE HALOGEN BULB WITH THIS LAMP. ", "Halogen bulbs operate at a higher temperature and pose a fire hazard\n\nThey don't mention LED. ", "Is it safe for me to use the LED bulb? ", "I just don't want to start a fire and I didn't see anything posted about safety warnings in the instructions.", "\n\nA:\n\nI'm assuming this is a 100 watt equivalent bulb, that is actually only running 18-20 watts. ", " Using a 100 watt equivalent will be safe as they run much cooler than even an incandescent.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0.010638297872340425, 0, 0, 0, 0, 0 ]
0.001182
5
[ "<?", "xml version=\"1.0\" ?", ">\n<notes>\n<em>CScout</em> implements the\nC language as defined in ANSI X3.159-1989.", "\nIn addition, it supports the following extensions:\n<ol>\n<li> Preprocessor directives can appear within a call to a function-like macro (gcc)</li>\n<li> Initializers and compound literals can be empty (gcc)</li>\n<li> The <code>alignof</code> operator can be used on types (gcc) </li>\n<li> A declaration expression as the first element of a <code>for</code> statement (C99)\n<li> The <code>restrict</code> qualifier and the <code>inline</code> specifier (C99)\n<li> The <code>_Bool</code> type (C99)\n<li> The <code>_Thread_local</code> storage class specifier (C11)\n<li> Initialization designators (C99)\n<li> Array initialization designators can include ranges (gcc) </li>\n<li> ANSI-style function definitions can be nested (gcc) (gcc also allows\nnested K&R-style function definitions)</li>\n<li> The equals sign following an initializer designator is optional (gcc) </li>\n<li> Array and structure initialization (gcc)\n<li> Compound literals (C99)\n<li> Declarations can be intermixed with statements (C99).", "\n<li> Recognise <code>__atribute__(__unused__)</code> for determining which\nidentifiers should not be reported as unused (gcc).", "\n<li> <code>//</code> line comments (common extension)\n<li> <code>__asm__</code> blocks (gcc)\n<li> <code>enum</code> lists ending with a comma (common extension)\n<li> Anonymous <code>struct/union</code> members (gcc, Microsoft C)\n<li> Allow <code>case</code> expression ranges (gcc).", "\n<li> An enumeration list can be empty (Microsoft C)\n<li>Allow braces around scalar initializers (common extension).</li>\n<li> Indirect <code>goto</code> targets and the label address-of operator (gcc).", "\n<li> <code>__typeof</code> keyword (gcc)\n<li> A compound statement in brackets can be an expression (gcc)\n<li> Macros expanding from <code>/##/</code> into\n<code>//</code> are then treated as a line comment (Microsoft C)\n<li> Exception handling using the <code>__try __except __finally __leave</code> keywords (Microsoft C) </li>\n<li> <code>#include_next</code> preprocessor directive (gcc)\n<li> <code>#warning</code> preprocessor directive (gcc)\n<li> Variable number of arguments preprocessor macros\n(support for both the gcc and the C99 syntax)\n<li> Allow empty member declarations in aggregates (gcc)\n<li> <code>long long</code> type (common extension)\n<li> A semicolon can appear as a declatation (common extension)\n<li> An aggregate declaration body can be empty (gcc)\n<li> Aggregate member initialization using the member: value syntax (gcc)\n<li> Statement labels do not require a statement following them (gcc)\n<li> #ident preprocessor directive (gcc)\n<li> Allow assignment to case expressions (common extension)\n<li> Accept an empty translation unit (common extension).", "\n<li> Support locally declared labels (<code>__label__</code>) (gcc).", "\n<li> The second argument of a conditional expression can be omitted (gcc).", "\n<li> Dereferencing a function yields a function (common extension).", "\n</ol>\nMany other compiler-specific extensions are handled by suitable\nmacro definitions in the <em>CScout</em> initialization file.", "\n</notes>\n" ]
{ "pile_set_name": "Github" }
[ 0, 0.05263157894736842, 0.011904761904761904, 0.006993006993006993, 0, 0.0035335689045936395, 0.0049504950495049506, 0.0027829313543599257, 0, 0, 0, 0, 0 ]
0.006369
5
[ "\nIn The\n\n\nCourt of Appeals\n\n\nNinth District of Texas at Beaumont\n\n\n____________________\r\n\n\nNO. ", "09-07-096 CR\n\n____________________\n\n\nCHRISTOPHER DEWAYNE OOTEN, Appellant\n\n\nV.\n\n\nTHE STATE OF TEXAS, Appellee\n\n\n\n\nOn Appeal from the Criminal District Court \nJefferson County, Texas\n\nTrial Cause No. ", "90411\n\n\n\n\nMEMORANDUM OPINION\n We have before the Court a motion from the appellant, Christopher Dewayne Ooten,\r\nto withdraw his appeal. ", " See Tex. ", "R. App. ", "P. 42.2. ", " A request to dismiss the appeal is signed\r\nby appellant personally and by counsel of record. ", " No opinion has issued in this appeal. ", " The\r\nmotion is granted, and the appeal is therefore dismissed.", "\n\tAPPEAL DISMISSED.", "\n __________________________________\n CHARLES KREGER\n Justice\nOpinion Delivered May 16, 2007\nDo not publish\nBefore McKeithen, C.J., Kreger and Horton, JJ.", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.010526315789473684, 0.020100502512562814, 0.014705882352941176, 0, 0.125, 0.1111111111111111, 0, 0, 0, 0, 0.009389671361502348, 0 ]
0.024236
5
[ "While white evangelicals are gleefully destroying their own reputation by continually making excuses for Donald Trump, there are many Christians who rightfully call them out.", "\n\nWriting for Sojourners, progressive Jim Wallis delivers a scathing critique that every Christian Trump supporter should sit down and hear:\n\nTRUMP EVANGELICALS have so completely and uncritically offered their faithful allegiance to the man in the White House that they have compromised the gospel of Jesus Christ — whose values the president’s life has stood antithetically against. ", "The result in the way the country now views evangelicals, and white Christians in general, has been devastating to the integrity of faith in America and caused great confusion around the world…\n\nYou can understand the anger. ", "Wallis is an evangelical who’s upset that others have sullied that word.", "\n\nThe article doesn’t just scold evangelicals for supporting Trump; it goes into detail regarding the specific ways that this brand of Christianity is wreaking havoc on society: by enabling racism (and white supremacists), poverty, domestic violence, and rape culture.", "\n\nWallis paints a vivid picture of the kind of person most likely to promote these dangerous views: white, straight, relatively wealthy Christian men who have likely never suffered a legitimate case of persecution in their lives.", "\n\nThe United States may very well see a significant drop-off in the percentage of citizens who identify as Christian as a result of what those Trump-supporting evangelicals are doing now.", "\n\nWe could also see a separation of the “wheat” from the “chaff.” ", "That is, a separation of decent Christians from the toxic ones. ", "That’s what Wallis is hoping for, and hopefully others like him will be inspired to speak up and call out the pro-Trumpers in their midst. ", "There’s no reason the Religious Left, inspired by their faith, can’t be a force in politics when it comes to promoting progressive values.", "\n\nIt begins with courageous evangelicals who will vote against Trump and his party — and urge others in their churches to do the same.", "\n\n(Image via Shutterstock)\n\n" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.005747126436781609, 0.005194805194805195, 0, 0.013888888888888888, 0.0037313432835820895, 0, 0, 0, 0, 0.007194244604316547, 0, 0.007462686567164179, 0 ]
0.003325
5
[ "Q:\n\nMicrosoft SQL Trigger: Will multiple join records pointing to the same record fail to update?", "\n\nBackground:\n\nI have a set of products for each numbered week starting at 1.", "\nI have a product \"library\" which is week zero holding the last saved product from any time period.", "\nI have a trigger that fires upon update or insert which keeps the \"library\" item up to date from the inserted items.", "\n\nSince there can be duplicate products in the same event using a \"sequence\" field, my join will create multiple records to update from, which target the same library record.", "\nSome questions:\n\nWill these multiples fail the update command? ", " \nIs there a better way to update the single library product?", "\n\nCode: \n-- PK is ID, Week #, and Sequence #\nupdate p set p.name = i.name\nfrom product p join inserted i on\n p.id = i.id and p.week = 0 and p.sequence = 1 \n\nNote: \"inserted\" can have multiple events. ", " ID is like a UPC, Week is an identity, and Sequence is like an identity, but starts at 1 for each week. ", " You can have a sequence of 2 while not having a sequence of 1 because they can delete products.", "\nSample Data:\n ID  WeekSequence  Name  \n12345 1     3      Lego   inserted first\n12345 2     2    Lego Toy inserted second\n12345 2     3    Lego Toy inserted second\nResult data:\n ID  WeekSequence  Name  \n12345 0     1    Lego Toy Was \"Lego\" now is \"Lego Toy\"\n\nA:\n\nAccording to this BOL entry:\n\nUse caution when specifying the FROM\n clause to provide the criteria for the\n update operation. ", "The results of an\n UPDATE statement are undefined if the\n statement includes a FROM clause that\n is not specified in such a way that\n only one value is available for each\n column occurrence that is updated,\n that is, if the UPDATE statement is\n not deterministic.", "\n\nIn other words, if an UPDATE statement uses a FROM clause that has multiple rows meeting the criteria to update a single row, it is unknown which row of new data will be used. ", " In your sample data, it is unknown whether the result was updated from the name in the row with Sequence=2 or Sequence=3.", "\nSo, if it doesn't matter which row is used for the update, what you're currently doing will work just fine. ", " If this is a problem however, you need to write your update's FROM and WHERE clauses so that only one row is returned for each item, possibly something like the following:\n;with insert2 as (\n select id, week, sequence, name,\n row_number() over(partition by id order by week desc, sequence desc) as [descOrd]\n from inserted\n)\nupdate p\nset p.name = i.name\nfrom product p\n join insert2 i on p.id = i.id and p.week = 0 and p.sequence = 1\nwhere i.descOrd=1\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.010309278350515464, 0, 0, 0, 0, 0, 0, 0.00980392156862745, 0.01904761904761905, 0, 0.01020408163265306, 0.003703703703703704, 0.0056179775280898875, 0, 0, 0.002150537634408602 ]
0.003802
5
[ "Livestock Guardian Dogs at Work Another Side of The Great Pyrenees Mountain Dog\n\n\n\n\n\nHere are real life accounts of the Great Pyrenees used as Livestock Guardian Dogs in the protection of reforestation workers and shepherds in the interior of British Columbia.", "\n\nAs pets and show dogs, we know the Great Pyr well. ", "And some of us have seen the Pyr in action as livestock guardian dogs on the farm or have seen the guarding instinct as it protects the home and family. ", "But this article shows the Great Pyr at work in the rugged country of British Columbia. ", "You will be amazed at just how much protection there is in a Great Pyr!", "\n\nThe Club thanks Mr. Dennis Loxton, the Western Silvicultural Contractors' Association and BC Forest Safety Council for granting express permission to reproduce the following article for the benefit of visitors to our site.", "\n\nAt the end of this page look for the link to an amazing story of a family pet that protected its family from a Bear attack.", "\n\n\n\nBear Dogs: A Silvicultural Tool by Dennis Loxton.", "\n\nBears—and the possibility of being eaten by one—are a very real part of normal life for BC silvicultural workers today. ", "It does not have to be so. ", "I firmly believe that dogs, and particularly livestock guardian dogs, can reduce bear attacks on BC silvicultural workers. (", "By the way, I’m not trying to sell you a dog.) ", "I believe that nobody should be asked to work in silviculture in the forests of BC without a guard dog, and that livestock guardian dogs should be accepted as a standard silvicultural tool on all BC reforestation projects.", "\n\nI have been a silvicultural contractor for 34 years (17 years tree planting contracting, employing 100 to 200 planters per year, and 17 years as a sheep vegetation management (sheep veg. ", "mgmt.) ", "contractor using approximately 6,000 sheep per year. ", "We have always worked way out in the boonies and we have taken more sheep further out bush than anybody in Canadian history. ", "Lots of our sheep veg. ", "mgmt. ", "work was in the Stewart area of BC, which is famous for its high grizzly and black bear populations.", "\n\nWe were laughed at and told we were nuts when we first proposed to take 6,000 sheep to plantations 100 km out bush from Stewart on the west coast, but we were confident that good BC shepherds and 50 dogs would keep the sheep safe. ", "We pride ourselves in being good shepherds and we try not to harm or kill any animals, including predators, for any reason. ", "The fact that we have only lost a total of eight sheep to bears and wolves in our 17-year sheep veg. ", "mgmt. ", "contracting experience speaks for itself. ", "We believe that our sheep are safer from predation when they are out bush with us and guarded by livestock guardian dogs than they would be at home in most Canadian sheep farmers’ fields. ", "The neighbor’s dog would probably kill far more than eight sheep over a 17-year period.", "\n\nI have used dogs to guard silvicultural workers and sheep from bear attacks for about 30 years, and I personally never go into the forest without at least one dog. ", "Most dogs will guard you against bears, but livestock guardian dogs will guard you better. ", "Just as Greyhounds were bred to run and Labradors were bred to retrieve ducks, livestock guardian dogs were bred to guard. ", "Now it’s simply a matter of choosing the best tool for the job.", "\n\nLivestock guardian dogs have evolved over about 5,000 years of selective breeding and ruthless culling. ", "People ate dog for most of that time and it is only recently that man could afford to feed large, non-productive, pet dogs. ", "Guardian dogs that ran away from attacking bears or wolves usually ended up as supper for the farmer. ", "They certainly were not fed or used for breeding. ", "The end result of this 5,000-year breeding program is that today’s guardian dogs have had fear bred right out of them. ", "They will guard your family, livestock, chickens, or silvicultural workers against anything, fearlessly, until they die.", "\n\nThe word “fearless,” in the case of our faithful Great Pyrenees dog “Tiger,” means a 150-pound dog squaring off with a very determined 1,000-pound grizzly bear and not backing down at all.", "\n\nThe previous year, some tourists had stolen Tiger and taken him over the border into Alaska. ", "He stopped eating, got sick and very skinny. ", "Eventually they took him to an animal shelter, where the staff decided to give him a haircut. ", "Tiger put a stop to that about half way through the shearing process. ", "The RCMP located him for us and we got him back via the mail plane, $1,400 later. ", "He was a mess. ", "Then, one of his pack mates mouthed off about his bad hair cut and a major dog fight exploded. ", "Tiger took a pounding and was in really bad shape, so off to the vet we rushed. ", "He barely pulled through, but by the next summer he was his normal happy, tough self and back at work.", "\n\nThe shepherds were trailing the 1,500 sheep flock down a logging road, through the dense forest to another block. ", "Suddenly, right at the perfect place for an ambush (a switch back with a steep drop off on one side), a large, predatory grizzly charged into the rear of the flock—determined to get a sheep. ", "Two of the dogs were able to hold back the snarling grizzly, lunging and ducking the bear’s swatting claws, until the other guardian dogs arrived. ", "My son Daniel was only a few meters away and had a better view of the fight than he would have preferred. ", "He scrambled back into the centre of the flock, which is the safest place for a shepherd in a bear attack situation. (", "The theory being, “If the bear really wants something to eat, better a sheep than us.”)", "\n\nThe bear retreated, disappearing into the forest with the dogs at his heels. ", "The shepherds took this opportunity to get the flock briskly moving again. ", "Soon, Daniel was jogging along after the sheep—making him the last animal in line.", "\n\nTurning to look behind him, Daniel stopped dead. ", "The grizzly was right there, sprinting straight at him, almost on top of him.", "\n\n“You think you’ll react in a situation like that,” Daniel recalled, “but it happened so fast. ", "I just blinked, stood there and waited to die.”", "\n\nSuddenly Tiger was there, blasting past Daniel, 150 pounds of teeth and viciousness. ", "The dog’s attack deflected the bear’s charge off to the side of the road, and almost certainly saved my son’s life. ", "Within seconds the other guardian dogs arrived to help Tiger. ", "A major battle exploded right behind Daniel as he pushed his way into the safety of the flock.", "\n\nThe dogs were able to drive the bear back into the forest and the dog pack took up their defensive positions all around the flock again. ", "Minutes later, the flock reached the open block. ", "No sooner had they arrived than the bear attacked yet again, charging straight up the road towards where shepherd girl Lesley was frozen in fear. ", "The crew yelled at her to jump into the middle of the flock, but she could not move. ", "Suddenly there was Tiger again, fighting like crazy, and once again, he held the grizzly off until the other dogs arrived. ", "Another huge battle erupted and the dogs chased the bear back into the forest again. ", "Lesley jumped into the safety of the flock. ", "The dog pack returned to their defensive positions, evenly distributed around the flock, all extremely serious and definitely on guard again.", "\n\nWe set up a temporary camp. ", "The dogs worked all night, full alert, deadly serious, fearless guardians doing their job. ", "The bear left during the night and next morning we all just went back to our sheep veg. ", "mgmt work.", "\n\nLater, a movie crew filmed a documentary for the television program Dogs With Jobs featuring “Tiger: Bear Dog,” which showed in 63 countries. ", "Tiger did actually tree a black bear for the film crew, but he was only playing and wagging his tail the whole time.", "\n\nThe early sheep farmers of Canada and the USA imported the finest European guardian dogs, so Canada already has excellent guardian dogs. ", "I usually purchase mine for $400 to $600 per pup, and since they can work for about 8 or 9 years, I see them as one of the great bargains of today. ", "They work well as individuals, but better in pairs. ", "They use excellent team work with complicated strategies that continue to amaze even my most experienced shepherds. ", "For example, if a young yearling black bear comes onto a plantation, the experienced older dogs will instruct the younger dogs to run up and chase it away, but if a large grizzly comes, they clearly instruct the younger dogs to stay with the flock while the biggest and toughest dogs attack the bear.", "\n\nWe used to think that a pack of three guardian dogs was ample for bears. ", "Then we went further north and saw the size of the northern grizzlies, and encountered packs of 12 wolves. ", "We learned to increase the guardian dog packs to eight dogs per 1,500 sheep flock. ", "It also needs mentioning that the shepherds have four Australian Kelpie sheep herding dogs per flock. ", "The Kelpie breed is half dingo and very hardy. ", "They love chasing bears. ", "When a bear comes and the guardian dogs take off after it, the herding dogs get involved too, so the bear is confronted by a dog pack of about a dozen barking, snarling dogs. (", "Definitely a serious deterrent for even the most hungry grizzly!)", "\n\nIn the case of silvicultural workers, I think that one livestock guardian dog per plantation would do the job, but a pair would be much better. ", "Since bears are opportunists looking for an easy meal, when they encounter the dogs, it usually doesn’t take them long to decide that they are better off eating berries and fish or something that represents less hassle. ", "It is all about the “hassle factor.”", "\n\nThe dogs rarely actually bite a bear, but they put on such a show of viciousness that they clearly represent a huge hassle to that bear. ", "It will usually leave as quickly as it can. (", "Don’t think the dogs are afraid to bite the bear, but rather that this is their strategy: be as intimidating and as big a hassle as possible, and chase the bear away without harming it.) ", "Although the guardian dogs seem quite gentle and laid back, they are also large, very powerful, quick and vicious animals. ", "However, they never show that side of their character unless the situation requires that response.", "\n\nMost guardian dog owners have no idea how much dog they have. ", "They will tell you that “they own a Great Pyrenees, but he’s not really much of a guard dog and in fact he’s a big, friendly, tail wagging goof.", "\n\nHe loves to hang out with the wife and kids. ", "All of the neighbor’s kids love him, babies hang on his tail and ride him, but he wouldn’t harm a fly. ", "We all like him so we keep him.” ", "I hear that story often and then I try to explain that their dog has never had reason to show his tough side, so they have never seen that side of him, but should someone or something threaten to harm the family, that dog would instantly transform into one powerful, ferocious animal that will never back off. ", "It will not stop until the danger is past and that the speed and viciousness of the response will absolutely shock them. ", "Of course they don’t get it. ", "Fair enough—how could they? ", "How could they ever grasp that “Fluffy” the gentle giant is really the equivalent of a lion in a dog’s body? ", "I have witnessed that transformation dozens of times and it really is always a shock to experience.", "\n\n\n\nOne example I witnessed was a dog fight between two mature male Great Pyrenees guardian dogs and a large mature male Hungarian Kuvasz. ", "The fight exploded right in front of another shepherd and myself. ", "It was a territorial dispute, and the Pyrenees were brothers who had decided to kill the Kuvasz. ", "We were able to get our shepherds crooks hooked onto the collars of the two Pyrenees, and we pulled them off of the Kuvasz. ", "The whole fight lasted seconds, but already my Kuvasz was clearly dying. ", "He weighed about 150 pounds and was one of our best dogs, so we quickly made a “bush stretcher” out of two long sticks and our sweatshirts and carried him to the truck. ", "We rushed him to the vet 100 km away. ", "He was almost dead on arrival but we told the vet to hit him with everything that he had and try his best to save him.", "\n\nThe vet examined him, then asked, “Did the driver of the truck stop after running over him?” ", "We explained that it was a dog fight that only lasted seconds and that we were right there and had witnessed the whole thing. ", "The vet refused to believe us. ", "He pointed out the numerous broken bones, major internal damage, the rips and deep gashes all over etc and to this day I think that he still believes that a truck ran over my dog.", "\n\nOf course the dog died. ", "The crazy part of it all is that I have seen those same two Great Pyrenees lick and comfort a sick lamb all day and then be clearly quite distressed when they could not save its life.", "\n\nThe five most popular livestock guardian dog breeds available in Canada are France’s Great Pyranee, the Hungarian Kuvasz, the Italian Maremma, the Turkish Akbash, and the Komondor.", "\n\nThey are all excellent, but I feel that some of these breeds are much more suitable for the job of guarding silvicultural workers than others.", "\n\nI really like and so recommend the Great Pyrenees for the job. ", "They always seem happy and friendly, but underneath all of that tail wagging and smiling is a big, serious dog. ", "When he “kicks into gear and goes to work,” he definitely means business. ", "They are a large breed usually weighing about 150 pounds, but sometimes getting up to 200 lbs body weight. ", "The Pyrenees is more of a “big bruiser,” than an athlete, with a deep, powerful voice. ", "He is a low metabolism animal and so he eats about the same amount of food as an average sized dog. ", "He is very hardy animal and completely happy sleeping out in the snow in mid winter. ", "He doesn’t seem to need much of anything. ", "I have seen some Pyrenees guarding sheep flocks on the prairies, while living completely “off the land”, catching and eating gofers, mice and rabbits. ", "They were in good condition and doing just fine.", "\n\nThe Kuvasz is also a very impressive dog, but more of an athlete, burning up more energy and so eating more food. ", "He is a powerful, fast runner and he charges the bear immediately upon detecting it. ", "A dog pack combining both Great Pyrenees and Kuvasz works wonderfully, but the Kuvasz loves to patrol a very large area and so is harder to keep at home during the off season.", "\n\nThe Italian Maremma is also an excellent dog, similar in nature to the Pyrenees, powerful and effective. ", "I think that they are marvelous workers and my shepherds definitely like them on their work site. ", "Project manager Jolene Shepherd prefers a dog pack combining Great Pyrenees, Kuvasz and Maremma, with each breed bringing their particular strong points to the pack. ", "Her projects have never had a sheep killed by a predator, so it makes sense to me.", "\n\nThe Komondor is also a large and very serious guardian dog breed. ", "He has been bred to grow long dreadlocks that reach the ground. ", "When he comes running at you he looks strange and very scary. ", "The idea of the dreadlocks is that they mat together, get sticks etc. ", "caught up in then and form a type of natural fang proof armor. ", "This is very effective protection when fighting a wolf pack. ", "Most owners shear them annually. ", "Shearing dogs is a chore that I’d rather not bother with, so I don’t have much experience with the Komondor breed.", "\n\nThe Turkish Akbash is an extremely serious dog, but very aggressive and I don’t like them. ", "One Akbash owner tried to justify the breed’s temperament by explaining “whereas other guardian dog breeds were bred to guard against predators, the Akbash was bred to guard against predators and bandits.” ", "Great! ", "I think that it is beyond the capability of any dog to sort out the bandits from the legitimate clients in the BC forest industry. ", "Clearly somebody will get bitten by a big angry dog. ", "Because of this issue, I definitely do not recommend the use of Akbash to guard BC silvicultual workers.", "\n\nWhen training livestock guardian dogs to guard your workers against bear attack, it really is not as complicated as most people would think. ", "Firstly, guardian dogs want to guard you, they can’t help it, that’s their strongest instinct. ", "Its better if there is an older, experienced dog to teach them the ropes (for example, to chase the bears off of the block that you are working on, but not to bother going off into the forest looking for grizzlies to chase). ", "Bonding them to the crew is easy enough. ", "They should simply feed them, pat them, befriend them and the dogs will want to hang out with the crew and guard them 24/7.", "\n\nWhen the crew arrives on the block, the first job is to release the dogs. ", "They will immediately and happily go to work. ", "They will run around the block and chase away any animal that they encounter. ", "This does not take long, usually about the same amount of time that a crew takes to get their gear together before they start work. ", "The dogs will continue patrolling the work site all day, and they really love their job. ", "At the end of the day they will jump up into the back of the pickup truck and go home with the crew. ", "If you are in a camp situation, they will patrol and guard the camp all night. ", "I believe that the added safety that guardian dogs bring to the work site increases crew productivity, which helps to offset some of the costs of purchasing and maintaining the dogs.", "\n\nYou don’t really have to bother teaching them much, the guarding comes naturally, but some things that seem really obvious, I had to learn the hard way. ", "To begin with, don’t forget to teach them to (1) come when they are called, (2) jump up into the truck on command and (3) lead. ", "As silly as this may sound, we have had dogs that nobody bothered to teach to get into the truck or to lead. ", "This happened easily enough. ", "We had 50 working dogs at the time\n\nand the guardian dogs arrived with the sheep on sheep liners. ", "They followed the flock from plantation to plantation all summer. ", "There was no reason to ever lead them or ask them to get into the pickup truck.", "\n\nThen, later in the season, three dogs tried to get a porcupine to leave the block. ", "They got too close and got a few quills each. ", "Then they got vexed and regardless of the pain, tore that porcupine to bits. ", "With about 300 quills in the mouth, nose and throat of each dog, we had to take them all to the vet—but they would not jump up into the truck. ", "It took two people to load them, which meant two lost man-days as both shepherds had to go to town and physically carry three 150-pound dogs into and out of the vet clinic. ", "Everybody felt foolish. ", "Most of all, the contractor (me) felt particularly foolish, since the total bill for the event (wages, vet, truck etc) was over $1,000. ", "Well, that’s contracting. ", "Picking up the odd unexpected bill seems to be part of it all.", "\n\nAs a point of interest, and because it often comes up in conversations about guardian dogs, the old-as-time technique used by shepherds for bonding dogs to sheep flocks is to take a puppy from its litter just as a ewe is about to have twin lambs, then when the first lamb is born, they get her afterbirth and rub it all over the puppy. ", "When the second lamb is born, they put the puppy beside the newborn lamb when the ewe is not looking and (usually) she can be tricked into thinking that she gave birth to the puppy. ", "The ewe will lick it clean and care for it. ", "The puppy accepts that the lambs are his new litter mates and grows up with them. ", "That dog will guard those lambs and ewe, plus all of their friends and relatives, which of course is the whole flock, for the rest of his life.", "\n\nRegarding the feeding of guardian dogs, commercial dog food is the simplest, but in a camp situation, camp scraps are usually ample. ", "If buying dog food, better formulations from middle-of-the-road brands are good enough. ", "I think that the most prestigious brands and top-of-the-line formulas are overrated and too expensive, while the cheaper stuff (as with all low bids) is usually low on product and high on filler—leaving you with more dog turds for somebody to clean up later.", "\n\nWe feed our dogs once per day and always before we eat our supper. “", "Free feeding” works well in the off season, but not during the work season, because the dog will often be preoccupied with guarding his food bowl against his fellow pack members. ", "It’s best to avoid that kind of distraction from his job. ", "Working dogs need to be wormed twice a year and we find that spring and fall treatments work best. ", "They also need to be vaccinated annually.", "\n\nMy first experience with bears, tree planting, and wishing that I had a dog with me, all happened on the same day, about 34 years ago. ", "It was in the very early days of BC tree planting contracting that three friends and myself took a “fly in” tree planting contract. ", "The helicopter dropped our trees, gear and us off and the pilot said that he would be back in a month. ", "We were on the other side of a river and mountains and pretty well nowhere. ", "It was a very “lean show” without radio, First Aid supplies, firefighting equipment or much of anything. ", "We did, however, have a mail order .303 rifle ($30 incl. ", "S and H) in case bears came. ", "Our previous bear experience was limited to koala bears. ", "Basically we didn’t have a clue.", "\n\nWe limped home to camp at dusk after our first day of planting to see three bears leaving our trashed camp. ", "They had eaten about half of our food and we were on strict rations thereafter. ", "The bears hung around every day and night, despite the huge slash fire that we kept burning. ", "We had plenty of slash, but it did not work, as the fire did not bother the bears after a while. ", "We probably kept the fire going because it made us feel better. ", "Warning shots did not work either. ", "I wished that I had my dog with me, but he was in Australia. ", "Then it started to rain and our cheap boots and raingear fell apart. ", "Things were getting fairly rough at that point, but we were young and making good money, so we continued working from daylight to dark, seven days a week, until we had planted all of the trees. ", "Needless to say, we were fairly feral by the time the helicopter came. ", "I decided to become a tree planting contractor after that, but vowed to get much more serious about bears, bear dogs, boots, rain gear, equipment and contracting in general.", "\n\nWe soon had the best equipped, best fed tree planters with the best camps, boots and raingear in the industry, and all of our camps had a camp bear dog. ", "The BC tree planting industry quickly became the world leader in high quality, high production reforestation, employing thousands of young Canadians. ", "It was fun to enjoy the status of being amongst the top few tree planting contractors in BC, and so, one of the top tree planting contractors in the world.", "\n\nHowever, things were still not perfect regarding bears. ", "The camp cooks demanded that the bear dog stay in camp, and so the planters themselves were still exposed to potential bear attack. ", "Girls were chased off of the block three times over a two-day period. ", "They said the young black bear was “only playing.” ", "Other planters did not see it as fun and would not get out of the truck. ", "I took the camp dog to the block for a few days to deal with it. ", "Meanwhile another black bear had come to camp, trashed some tree planters’ tents and finally was shot by the foreman as it sat eating granola, right in the middle of the cook tent. ", "The cooks were angry with me for taking the dog to the block, and demanded “their” dog back. ", "When I brought the dog back to camp, another bear showed up on the block and scared another planter. ", "I lost patience with the whole situation and shot that bear.", "\n\nThings got crazy at that point as I had completely misjudged how many animal rights activists I had employed. ", "A large potion of the crew threatened to quit in protest over the shooting of the second bear, as he was only about half grown and had looked quite cute. ", "The obvious lesson I learned was that I needed more dogs, one for camp and others for the work sites.", "\n\nI saw some (rookie) tree planters walk up too close to a large black bear to “get a better photo.” ", "Bear information and bear avoidance lectures became a standard part of our tree planter training program from then on.", "\n\nThe speech went something like this: “Bears live here and bears eat people. ", "They don’t prefer to eat people, its just that they eat pretty well anything including vegetation, berries, fish, carrion, apple pies, garbage, toothpaste, grubs, insects, people, deer, moose, cows, sheep, bears, candy, etc. ", "They don’t hate you or like you. ", "They don’t care. ", "You are just protein to them. ", "Just like a shark or crocodile, they find food and they eat it. ", "Bears hunt by stealth and ambush. ", "They are very fast (much faster than you), very strong (they can kill a moose), silent, and invisible (they can sneak up and catch a deer, which is all ears and eyes). ", "They can climb trees, and they are searching for food every waking minute. ", "But they are opportunists, always looking for an easy meal (like the candy and cookies hidden in your tent). ", "Many of them are already spoiled by easy food from sloppy campers, fishermen, and garbage dumps, and some are even problem town bears relocated to your work site by your Government. ", "But you are smarter than bears, so use your brain! ", "Don’t keep food in your tent, don’t go up to them for a better photo, and do trust your “sixth sense”: if you feel like you are in danger, you probably are. ", "So leave. ", "Most of all, don’t represent easy protein.”", "\n\nIn the case of shepherds we add, “and if a bear comes, go to the centre of the flock, keep as many sheep as you can between him and you, then let the dogs deal with it.” ", "Most silvicultural workers already know all of this, but a surprising number of them don’t. ", "I feel that the speech is always worthwhile anyway.", "\n\nLast year I had a reminder of how little some silvicultural workers know about bears. ", "Four of us were doing regeneration surveys. ", "I was at the far end of the block with my personal dog. ", "A colleague named Ben was at the opposite end. ", "When he neared the tree line, he was charged by a large black bear. ", "She had very young, twin cubs. ", "He dropped his new stainless steel shovel, jumped over a small cliff and ran back to the truck, yelling into his radio the whole time. ", "At the truck they decided that since we had finished the job, except for the two plots Ben had left to do, we should all go back to Ben’s section together (safety in numbers theory) retrieve Ben’s shovel, do the two plots, then go home. ", "They were quite surprised when I said “I’m not going and what’s more, one of you is going to die.” ", "The fact that the bear had newborn cubs and would not care if there were 100 of us, had not entered the minds of these three fairly bush-savvy country boys. ", "About one month later, two of us went back with five dogs, finished the job, got Ben’s shovel and all was fine. ", "Ben was so traumatized by that bear experience that he quit the silviculture industry and got a job as a fashion model in Indonesia. ", "The BC silviculture industry lost another good man to bears.", "\n\nOn one of our sheep veg. ", "mgmt. ", "contracts in the McBride area, we were visited by a different black bear every day for 39\n\nconsecutive days. ", "We think that we were working on a wildlife trail between the valley and the alpine pastures. ", "The dogs chased all of them away without incident. ", "The shepherds had developed such confidence in their dog pack that they saw the bear visits (and subsequent dog explosions) as a pleasant interruption in an otherwise fairly boring day.", "\n\n\n\nOn another cut block in the Stewart area, we were visited by 8 individual grizzly bears in a one week period. ", "This was not fun. ", "We did not want to be there, but the client threatened us with contract termination if we refused to do that block. ", "Meanwhile, in downtown Hyder (only 100 km from our work site) a grizzly killed and partially ate a man behind the pub. ", "The bears on our block did not really do anything wrong, it’s just that it was quite stressful that they were grizzly bears, that they were so big and that they were there on our worksite.", "\n\nTwo of them in particular were unusually huge. ", "I was totally unprepared for the size of them, despite the numerous bear movies and documentaries I had seen, plus all of the previous bear experiences of my more than 30 years of bush work. ", "They were much bigger than I had ever realized that they could possibly get. ", "They looked and behaved like two big bulls.", "\n\nWe were at camp and all of our dogs were with the sheep flock when these two giants started casually walking towards us. ", "Obviously those two grizzlies knew that they were the kings of the forest. ", "They clearly were not afraid of us whatsoever. ", "We felt completely naked, and fairly stupid. ", "I realized that our travel trailers were basically cardboard boxes, that my .303 rifle was a toy, and that I don’t shoot well anyway. ", "It was terrifying. ", "We were about to jump into the truck and race away when those two monsters simply changed directions and casually wandered away when they felt like it. ", "Nothing had really happened—except that I got another reminder of the vulnerability of all silvicultural workers, and of my own mortality. ", "I am now much more serious about bears and the danger they represent to us.", "\n\nIn conclusion, I will repeat that I believe that bear dogs should become a normal, everyday BC silvicultural tool. ", "If you think that buying and caring for dogs is too much trouble, I suggest you just look at it as though the next silvicultural worker to be killed may be you—and then decide whether getting a few dogs is worth the extra effort or not.", "\n\n\n\n\n\n\n\n\n\n\n\nThe Club once again thanks Mr. Dennis Loxton, the Western Silvicultural Contractors' Association and BC Forest Safety Council for granting express permission to reproduce this article for the benefit of visitors to our site.", "\n\nThe article provides great insight into the lives of Great Pyrs as livestock guardian dogs.", "\n\n\n\nHere is the story of a family pet that defended its family against a Bear attack.", "\n\n\n\nLet's leave our livestock guardian dogs and go home." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.007692307692307693, 0, 0, 0, 0, 0.013392857142857142, 0.008, 0.03773584905660377, 0.00819672131147541, 0, 0.008064516129032258, 0, 0.009009009009009009, 0, 0, 0, 0.008, 0, 0, 0.02, 0.012875536480686695, 0, 0, 0, 0, 0.005319148936170213, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005263157894736842, 0, 0, 0, 0, 0.012195121951219513, 0, 0, 0, 0.00980392156862745, 0, 0, 0, 0.009433962264150943, 0, 0, 0, 0, 0.012195121951219513, 0.0196078431372549, 0, 0, 0, 0, 0, 0, 0.010638297872340425, 0, 0, 0.00684931506849315, 0, 0, 0, 0.022727272727272728, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00980392156862745, 0.02127659574468085, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006944444444444444, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007194244604316547, 0, 0.010309278350515464, 0.008064516129032258, 0.0136986301369863, 0.005917159763313609, 0, 0, 0, 0, 0, 0, 0, 0, 0.01098901098901099, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008620689655172414, 0, 0.017142857142857144, 0, 0, 0.024096385542168676, 0, 0.014705882352941176, 0, 0, 0, 0, 0, 0, 0.008771929824561403, 0.010752688172043012, 0, 0, 0.007633587786259542, 0, 0.009615384615384616, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007575757575757576, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.006666666666666667, 0.0064516129032258064, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00847457627118644, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.02127659574468085, 0, 0, 0, 0.012658227848101266, 0, 0, 0.008928571428571428, 0.007518796992481203, 0.016666666666666666, 0, 0, 0, 0, 0, 0, 0.008771929824561403, 0, 0, 0, 0, 0, 0.005235602094240838, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008547008547008548, 0, 0.01694915254237288, 0.010752688172043012, 0.011764705882352941, 0 ]
0.002048
5